[ 53.162539][ T40] audit: type=1400 audit(1770518153.581:61): avc: denied { siginh } for pid=5908 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:19384' (ED25519) to the list of known hosts. [ 59.796223][ T40] audit: type=1400 audit(1770518160.241:62): avc: denied { execute } for pid=5927 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.805203][ T40] audit: type=1400 audit(1770518160.251:63): avc: denied { execute_no_trans } for pid=5927 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/08 02:36:01 parsed 1 programs [ 61.255055][ T40] audit: type=1400 audit(1770518161.701:64): avc: denied { node_bind } for pid=5927 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.410655][ T40] audit: type=1400 audit(1770518163.861:65): avc: denied { mounton } for pid=5937 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.418543][ T40] audit: type=1400 audit(1770518163.871:66): avc: denied { mount } for pid=5937 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.420232][ T5937] cgroup: Unknown subsys name 'net' [ 63.429674][ T40] audit: type=1400 audit(1770518163.881:67): avc: denied { unmount } for pid=5937 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.581922][ T5937] cgroup: Unknown subsys name 'cpuset' [ 63.587524][ T5937] cgroup: Unknown subsys name 'rlimit' [ 63.742405][ T40] audit: type=1400 audit(1770518164.191:68): avc: denied { setattr } for pid=5937 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.750252][ T40] audit: type=1400 audit(1770518164.191:69): avc: denied { create } for pid=5937 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.756656][ T40] audit: type=1400 audit(1770518164.191:70): avc: denied { write } for pid=5937 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.762681][ T40] audit: type=1400 audit(1770518164.191:71): avc: denied { read } for pid=5937 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.799372][ T5940] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 64.829958][ T5937] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.638124][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 66.638142][ T40] audit: type=1400 audit(1770518167.091:82): avc: denied { execmem } for pid=5945 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.721103][ T40] audit: type=1400 audit(1770518167.171:83): avc: denied { read } for pid=5946 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.728357][ T40] audit: type=1400 audit(1770518167.171:84): avc: denied { open } for pid=5946 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.735702][ T40] audit: type=1400 audit(1770518167.171:85): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.764980][ T40] audit: type=1400 audit(1770518167.211:86): avc: denied { mount } for pid=5946 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.772375][ T40] audit: type=1400 audit(1770518167.211:87): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/syzkaller.SeLwLk/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 66.781098][ T40] audit: type=1400 audit(1770518167.221:88): avc: denied { mount } for pid=5946 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 66.788003][ T40] audit: type=1400 audit(1770518167.221:89): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/syzkaller.SeLwLk/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 66.795888][ T40] audit: type=1400 audit(1770518167.221:90): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/syzkaller.SeLwLk/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 66.804552][ T40] audit: type=1400 audit(1770518167.221:91): avc: denied { unmount } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 66.813776][ T5946] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 67.092439][ T1156] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.095949][ T1156] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.130759][ T1156] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.133311][ T1156] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.722555][ T5980] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.725851][ T5980] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.730120][ T5980] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.732948][ T5980] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.735543][ T5980] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 68.659782][ T6010] chnl_net:caif_netlink_parms(): no params data found [ 68.728787][ T6010] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.732035][ T6010] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.734731][ T6010] bridge_slave_0: entered allmulticast mode [ 68.738739][ T6010] bridge_slave_0: entered promiscuous mode [ 68.743548][ T6010] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.746810][ T6010] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.750141][ T6010] bridge_slave_1: entered allmulticast mode [ 68.754377][ T6010] bridge_slave_1: entered promiscuous mode [ 68.779148][ T6010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.785154][ T6010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.856930][ T6010] team0: Port device team_slave_0 added [ 68.860827][ T6010] team0: Port device team_slave_1 added [ 68.875386][ T6010] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.877963][ T6010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.887012][ T6010] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.892792][ T6010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.895121][ T6010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.906146][ T6010] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.961373][ T6010] hsr_slave_0: entered promiscuous mode [ 68.963849][ T6010] hsr_slave_1: entered promiscuous mode [ 69.123883][ T6010] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 69.130081][ T6010] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 69.134771][ T6010] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 69.139587][ T6010] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 69.184593][ T6010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.194914][ T6010] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.200589][ T1156] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.203152][ T1156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.210347][ T1156] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.212627][ T1156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.335148][ T6010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.371633][ T6010] veth0_vlan: entered promiscuous mode [ 69.381027][ T6010] veth1_vlan: entered promiscuous mode [ 69.403738][ T6010] veth0_macvtap: entered promiscuous mode [ 69.410731][ T6010] veth1_macvtap: entered promiscuous mode [ 69.424610][ T6010] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.435384][ T6010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.444715][ T1156] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.449000][ T1156] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.453830][ T1156] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.458483][ T1156] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.574969][ T13] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.659703][ T13] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.739401][ T13] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.841335][ T13] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/08 02:36:10 executed programs: 0 [ 70.161366][ T5290] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 70.165559][ T5290] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 70.170035][ T5290] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 70.174068][ T5290] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 70.177102][ T5290] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 70.280414][ T6046] chnl_net:caif_netlink_parms(): no params data found [ 70.328327][ T6046] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.330735][ T6046] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.333004][ T6046] bridge_slave_0: entered allmulticast mode [ 70.335635][ T6046] bridge_slave_0: entered promiscuous mode [ 70.339071][ T6046] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.341336][ T6046] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.343566][ T6046] bridge_slave_1: entered allmulticast mode [ 70.346420][ T6046] bridge_slave_1: entered promiscuous mode [ 70.364797][ T6046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.369785][ T6046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.384613][ T6046] team0: Port device team_slave_0 added [ 70.388139][ T6046] team0: Port device team_slave_1 added [ 70.401465][ T6046] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.403659][ T6046] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.411814][ T6046] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.416406][ T6046] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.418649][ T6046] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.426886][ T6046] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.454760][ T6046] hsr_slave_0: entered promiscuous mode [ 70.457877][ T6046] hsr_slave_1: entered promiscuous mode [ 70.460014][ T6046] debugfs: 'hsr0' already exists in 'hsr' [ 70.461945][ T6046] Cannot create hsr debugfs directory [ 72.186972][ T5980] Bluetooth: hci0: command tx timeout [ 72.897081][ T13] bridge_slave_1: left allmulticast mode [ 72.899650][ T13] bridge_slave_1: left promiscuous mode [ 72.902744][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.910756][ T13] bridge_slave_0: left allmulticast mode [ 72.913250][ T13] bridge_slave_0: left promiscuous mode [ 72.916426][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.936679][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 72.936693][ T40] audit: type=1400 audit(1770518173.381:112): avc: denied { create } for pid=6056 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.948759][ T40] audit: type=1400 audit(1770518173.381:113): avc: denied { write } for pid=6056 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2078 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.959397][ T40] audit: type=1400 audit(1770518173.391:114): avc: denied { append } for pid=6056 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2078 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 73.003699][ T40] audit: type=1400 audit(1770518173.451:115): avc: denied { unlink } for pid=6059 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2078 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 73.145534][ T13] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 73.150695][ T13] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 73.155263][ T13] bond0 (unregistering): Released all slaves [ 73.302844][ T13] hsr_slave_0: left promiscuous mode [ 73.305764][ T13] hsr_slave_1: left promiscuous mode [ 73.310203][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 73.313284][ T13] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 73.316597][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 73.318882][ T13] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 73.329878][ T13] veth1_macvtap: left promiscuous mode [ 73.331706][ T13] veth0_macvtap: left promiscuous mode [ 73.333515][ T13] veth1_vlan: left promiscuous mode [ 73.335287][ T13] veth0_vlan: left promiscuous mode [ 73.579704][ T13] team0 (unregistering): Port device team_slave_1 removed [ 73.595234][ T13] team0 (unregistering): Port device team_slave_0 removed [ 74.143369][ T6046] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.148877][ T6046] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.154545][ T6046] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.160447][ T6046] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 74.232626][ T6046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.245281][ T6046] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.254550][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.257716][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.266408][ T5980] Bluetooth: hci0: command tx timeout [ 74.270829][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.273841][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.480954][ T6046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.510011][ T6046] veth0_vlan: entered promiscuous mode [ 74.514784][ T6046] veth1_vlan: entered promiscuous mode [ 74.535591][ T6046] veth0_macvtap: entered promiscuous mode [ 74.541702][ T6046] veth1_macvtap: entered promiscuous mode [ 74.555573][ T6046] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.564654][ T6046] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.582466][ T1147] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.588444][ T1147] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.593314][ T1147] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.597316][ T1147] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.646411][ T1156] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.649660][ T1156] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.673174][ T1156] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.676510][ T1156] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.711486][ T40] audit: type=1404 audit(1770518175.161:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 74.728091][ T40] audit: type=1400 audit(1770518175.181:117): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.740384][ T40] audit: type=1400 audit(1770518175.191:118): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.750766][ T40] audit: type=1400 audit(1770518175.211:119): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.785349][ T40] audit: type=1400 audit(1770518175.231:120): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.798330][ T40] audit: type=1400 audit(1770518175.251:121): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.349268][ T5980] Bluetooth: hci0: command tx timeout [ 76.349575][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.353741][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.975966][ T40] kauditd_printk_skb: 170 callbacks suppressed [ 77.975983][ T40] audit: type=1400 audit(1770518178.421:292): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.990778][ T40] audit: type=1400 audit(1770518178.441:293): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.002493][ T40] audit: type=1400 audit(1770518178.451:294): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.025293][ T40] audit: type=1400 audit(1770518178.471:295): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.040380][ T40] audit: type=1400 audit(1770518178.491:296): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.054912][ T40] audit: type=1400 audit(1770518178.501:297): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.086687][ T40] audit: type=1400 audit(1770518178.541:298): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.099368][ T40] audit: type=1400 audit(1770518178.551:299): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.112504][ T40] audit: type=1400 audit(1770518178.561:300): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.136328][ T40] audit: type=1400 audit(1770518178.591:301): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.436284][ T5980] Bluetooth: hci0: command tx timeout [ 82.979085][ T40] kauditd_printk_skb: 262 callbacks suppressed [ 82.979101][ T40] audit: type=1400 audit(1770518183.431:564): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.992507][ T40] audit: type=1400 audit(1770518183.451:565): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.019505][ T40] audit: type=1400 audit(1770518183.471:566): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.032895][ T40] audit: type=1400 audit(1770518183.481:567): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.046976][ T40] audit: type=1400 audit(1770518183.501:568): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.079554][ T40] audit: type=1400 audit(1770518183.531:569): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.089675][ T40] audit: type=1400 audit(1770518183.541:570): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.106138][ T40] audit: type=1400 audit(1770518183.551:571): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.135523][ T40] audit: type=1400 audit(1770518183.581:572): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.150917][ T40] audit: type=1400 audit(1770518183.601:573): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.065206][ T1147] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.179272][ T1147] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.297454][ T1147] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.390153][ T1147] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.539594][ T1147] bridge_slave_1: left allmulticast mode [ 86.541850][ T1147] bridge_slave_1: left promiscuous mode [ 86.544147][ T1147] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.552207][ T1147] bridge_slave_0: left allmulticast mode [ 86.554081][ T1147] bridge_slave_0: left promiscuous mode [ 86.555983][ T1147] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.602375][ T1346] cfg80211: failed to load regulatory.db [ 86.710588][ T1147] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 86.715587][ T1147] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 86.719437][ T1147] bond0 (unregistering): Released all slaves [ 87.031145][ T1147] hsr_slave_0: left promiscuous mode [ 87.034056][ T1147] hsr_slave_1: left promiscuous mode [ 87.036746][ T1147] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 87.039621][ T1147] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 87.043098][ T1147] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 87.045951][ T1147] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 87.057248][ T1147] veth1_macvtap: left promiscuous mode [ 87.059424][ T1147] veth0_macvtap: left promiscuous mode [ 87.061646][ T1147] veth1_vlan: left promiscuous mode [ 87.063691][ T1147] veth0_vlan: left promiscuous mode [ 87.346948][ T1147] team0 (unregistering): Port device team_slave_1 removed [ 87.368825][ T1147] team0 (unregistering): Port device team_slave_0 removed [ 87.987765][ T40] kauditd_printk_skb: 12076 callbacks suppressed [ 87.987778][ T40] audit: type=1400 audit(1770518188.441:12557): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.997260][ T40] audit: type=1400 audit(1770518188.441:12558): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.003846][ T40] audit: type=1400 audit(1770518188.441:12559): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.010834][ T40] audit: type=1400 audit(1770518188.441:12560): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.017632][ T40] audit: type=1400 audit(1770518188.441:12561): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.017758][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 88.024128][ T40] audit: type=1400 audit(1770518188.441:12562): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.027281][ T5641] audit: audit_lost=32 audit_rate_limit=0 audit_backlog_limit=64 [ 88.033795][ T40] audit: type=1400 audit(1770518188.441:12563): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.037097][ T5641] audit: backlog limit exceeded [ 92.996154][ T40] kauditd_printk_skb: 40360 callbacks suppressed [ 92.996171][ T40] audit: type=1400 audit(1770518193.441:52924): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.004716][ T40] audit: type=1400 audit(1770518193.451:52925): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.011551][ T40] audit: type=1400 audit(1770518193.451:52926): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.012743][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.019413][ T40] audit: type=1400 audit(1770518193.451:52927): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.021735][ T5641] audit: audit_lost=33 audit_rate_limit=0 audit_backlog_limit=64 [ 93.029511][ T40] audit: type=1400 audit(1770518193.451:52928): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.031827][ T5641] audit: backlog limit exceeded [ 93.032221][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.040503][ T40] audit: type=1400 audit(1770518193.451:52929): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.006126][ T40] kauditd_printk_skb: 44133 callbacks suppressed [ 98.006138][ T40] audit: type=1400 audit(1770518198.461:96482): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.017213][ T40] audit: type=1400 audit(1770518198.461:96483): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.021786][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 98.024904][ T40] audit: type=1400 audit(1770518198.461:96484): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.027292][ T5641] audit: audit_lost=228 audit_rate_limit=0 audit_backlog_limit=64 [ 98.027305][ T5641] audit: backlog limit exceeded [ 98.027467][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 98.034486][ T40] audit: type=1400 audit(1770518198.461:96485): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.037191][ T5641] audit: audit_lost=229 audit_rate_limit=0 audit_backlog_limit=64 [ 98.038692][ T40] audit: type=1400 audit(1770518198.461:96486): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.016223][ T40] kauditd_printk_skb: 41115 callbacks suppressed [ 103.016236][ T40] audit: type=1400 audit(1770518203.471:136092): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.024931][ T40] audit: type=1400 audit(1770518203.471:136093): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.031868][ T40] audit: type=1400 audit(1770518203.471:136094): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.038420][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.038900][ T40] audit: type=1400 audit(1770518203.471:136095): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.041070][ T5641] audit: audit_lost=733 audit_rate_limit=0 audit_backlog_limit=64 [ 103.049344][ T40] audit: type=1400 audit(1770518203.471:136096): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.051770][ T5641] audit: backlog limit exceeded [ 103.052056][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.059513][ T40] audit: type=1400 audit(1770518203.471:136097): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0