Warning: Permanently added '[localhost]:39759' (ED25519) to the list of known hosts. [ 60.272073][ T40] audit: type=1400 audit(1770457394.713:62): avc: denied { execute } for pid=5934 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.279152][ T40] audit: type=1400 audit(1770457394.713:63): avc: denied { execute_no_trans } for pid=5934 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/07 09:43:16 parsed 1 programs [ 61.692399][ T40] audit: type=1400 audit(1770457396.133:64): avc: denied { node_bind } for pid=5934 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 64.087636][ T40] audit: type=1400 audit(1770457398.533:65): avc: denied { mounton } for pid=5944 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 64.093737][ T5944] cgroup: Unknown subsys name 'net' [ 64.099063][ T40] audit: type=1400 audit(1770457398.533:66): avc: denied { mount } for pid=5944 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.108426][ T40] audit: type=1400 audit(1770457398.543:67): avc: denied { unmount } for pid=5944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.270706][ T5944] cgroup: Unknown subsys name 'cpuset' [ 64.275807][ T5944] cgroup: Unknown subsys name 'rlimit' [ 64.502065][ T40] audit: type=1400 audit(1770457398.943:68): avc: denied { setattr } for pid=5944 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 64.511983][ T40] audit: type=1400 audit(1770457398.943:69): avc: denied { create } for pid=5944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.520314][ T40] audit: type=1400 audit(1770457398.943:70): avc: denied { write } for pid=5944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.527064][ T40] audit: type=1400 audit(1770457398.943:71): avc: denied { read } for pid=5944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.559833][ T5947] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 65.363485][ T5944] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 67.385957][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 67.385974][ T40] audit: type=1400 audit(1770457401.823:82): avc: denied { execmem } for pid=5952 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 67.396695][ T40] audit: type=1400 audit(1770457401.823:83): avc: denied { read } for pid=5953 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 67.405375][ T40] audit: type=1400 audit(1770457401.823:84): avc: denied { open } for pid=5953 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 67.415311][ T40] audit: type=1400 audit(1770457401.823:85): avc: denied { mounton } for pid=5953 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 67.424161][ T40] audit: type=1400 audit(1770457401.863:86): avc: denied { mounton } for pid=5953 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=2836 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 67.433806][ T40] audit: type=1400 audit(1770457401.873:87): avc: denied { mount } for pid=5953 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 67.443229][ T40] audit: type=1400 audit(1770457401.873:88): avc: denied { mounton } for pid=5953 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 67.453303][ T40] audit: type=1400 audit(1770457401.873:89): avc: denied { mount } for pid=5953 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 67.522529][ T40] audit: type=1400 audit(1770457401.963:90): avc: denied { mount } for pid=5958 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 67.531347][ T40] audit: type=1400 audit(1770457401.963:91): avc: denied { mounton } for pid=5958 comm="syz-executor" path="/syzkaller.SfaCma/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 67.547966][ T5958] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 68.390124][ T5985] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 68.400118][ T5985] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 68.407493][ T5985] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 68.411445][ T5985] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 68.415120][ T5985] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.148172][ T1235] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.151444][ T1235] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.172338][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.174894][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.930005][ T6029] chnl_net:caif_netlink_parms(): no params data found [ 69.983803][ T6029] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.986939][ T6029] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.989335][ T6029] bridge_slave_0: entered allmulticast mode [ 69.992200][ T6029] bridge_slave_0: entered promiscuous mode [ 69.997653][ T6029] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.000362][ T6029] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.003231][ T6029] bridge_slave_1: entered allmulticast mode [ 70.007213][ T6029] bridge_slave_1: entered promiscuous mode [ 70.027183][ T6029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.032312][ T6029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.048475][ T6029] team0: Port device team_slave_0 added [ 70.051615][ T6029] team0: Port device team_slave_1 added [ 70.066443][ T6029] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.068619][ T6029] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.076701][ T6029] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.081619][ T6029] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.083840][ T6029] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.092906][ T6029] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.118848][ T6029] hsr_slave_0: entered promiscuous mode [ 70.121149][ T6029] hsr_slave_1: entered promiscuous mode [ 70.289255][ T6029] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 70.295994][ T6029] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 70.300870][ T6029] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 70.304950][ T6029] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 70.387832][ T6029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.400600][ T6029] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.408987][ T72] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.412196][ T72] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.423631][ T1235] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.426715][ T1235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.590463][ T6029] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.622732][ T6029] veth0_vlan: entered promiscuous mode [ 70.630732][ T6029] veth1_vlan: entered promiscuous mode [ 70.656077][ T6029] veth0_macvtap: entered promiscuous mode [ 70.660078][ T6029] veth1_macvtap: entered promiscuous mode [ 70.673385][ T6029] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 70.679213][ T6029] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 70.690359][ T1145] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.694659][ T1145] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.697666][ T1145] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.701301][ T1145] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.793423][ T1235] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 70.846282][ T1235] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 70.915395][ T1235] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 70.975685][ T1235] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/07 09:43:25 executed programs: 0 [ 71.119695][ T5987] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.122932][ T5987] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.126339][ T5987] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.130346][ T5987] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.133861][ T5987] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.234116][ T6056] chnl_net:caif_netlink_parms(): no params data found [ 71.296975][ T6056] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.299358][ T6056] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.301698][ T6056] bridge_slave_0: entered allmulticast mode [ 71.304330][ T6056] bridge_slave_0: entered promiscuous mode [ 71.308563][ T6056] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.310941][ T6056] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.313219][ T6056] bridge_slave_1: entered allmulticast mode [ 71.315845][ T6056] bridge_slave_1: entered promiscuous mode [ 71.333166][ T6056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.337646][ T6056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.352042][ T6056] team0: Port device team_slave_0 added [ 71.355093][ T6056] team0: Port device team_slave_1 added [ 71.368053][ T6056] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 71.370280][ T6056] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 71.378270][ T6056] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 71.382554][ T6056] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 71.384719][ T6056] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 71.393786][ T6056] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.431435][ T6056] hsr_slave_0: entered promiscuous mode [ 71.434583][ T6056] hsr_slave_1: entered promiscuous mode [ 71.437343][ T6056] debugfs: 'hsr0' already exists in 'hsr' [ 71.439777][ T6056] Cannot create hsr debugfs directory [ 73.147093][ T64] Bluetooth: hci0: command tx timeout [ 74.165023][ T1235] bridge_slave_1: left allmulticast mode [ 74.167045][ T1235] bridge_slave_1: left promiscuous mode [ 74.169696][ T1235] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.175089][ T1235] bridge_slave_0: left allmulticast mode [ 74.178675][ T1235] bridge_slave_0: left promiscuous mode [ 74.181163][ T1235] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.388214][ T1235] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 74.392325][ T1235] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 74.395698][ T1235] bond0 (unregistering): Released all slaves [ 74.491730][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 74.491742][ T40] audit: type=1400 audit(1770457408.933:112): avc: denied { create } for pid=6065 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 74.500747][ T40] audit: type=1400 audit(1770457408.933:113): avc: denied { write } for pid=6065 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2096 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 74.509331][ T40] audit: type=1400 audit(1770457408.933:114): avc: denied { append } for pid=6065 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2096 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 74.522849][ T1235] hsr_slave_0: left promiscuous mode [ 74.526986][ T1235] hsr_slave_1: left promiscuous mode [ 74.529882][ T1235] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.533099][ T1235] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 74.540542][ T1235] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.543684][ T1235] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 74.550170][ T40] audit: type=1400 audit(1770457408.993:115): avc: denied { unlink } for pid=6068 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2096 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 74.562513][ T1235] veth1_macvtap: left promiscuous mode [ 74.565106][ T1235] veth0_macvtap: left promiscuous mode [ 74.568947][ T1235] veth1_vlan: left promiscuous mode [ 74.571409][ T1235] veth0_vlan: left promiscuous mode [ 74.847943][ T1235] team0 (unregistering): Port device team_slave_1 removed [ 74.877409][ T1235] team0 (unregistering): Port device team_slave_0 removed [ 75.236426][ T64] Bluetooth: hci0: command tx timeout [ 75.650799][ T6056] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 75.656266][ T6056] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 75.661422][ T6056] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 75.665529][ T6056] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 75.708891][ T6056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.718760][ T6056] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.725715][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.728854][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.745721][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.748735][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.872834][ T6056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.908838][ T6056] veth0_vlan: entered promiscuous mode [ 75.915468][ T6056] veth1_vlan: entered promiscuous mode [ 75.933413][ T6056] veth0_macvtap: entered promiscuous mode [ 75.939172][ T6056] veth1_macvtap: entered promiscuous mode [ 75.951155][ T6056] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.959486][ T6056] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.967355][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.970555][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.975175][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.978907][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.009893][ T60] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.012792][ T60] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.027511][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.029931][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.060351][ T40] audit: type=1404 audit(1770457410.503:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 76.082295][ T40] audit: type=1400 audit(1770457410.523:117): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.089812][ T40] audit: type=1400 audit(1770457410.533:118): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.097419][ T40] audit: type=1400 audit(1770457410.533:119): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.117415][ T40] audit: type=1400 audit(1770457410.563:120): avc: denied { write } for pid=5934 comm="syz-execprog" path="pipe:[2899]" dev="pipefs" ino=2899 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 76.125575][ T40] audit: type=1400 audit(1770457410.563:121): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.429073][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.431236][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.306058][ T64] Bluetooth: hci0: command tx timeout [ 79.386426][ T64] Bluetooth: hci0: command tx timeout [ 79.505740][ T40] kauditd_printk_skb: 182 callbacks suppressed [ 79.505757][ T40] audit: type=1400 audit(1770457413.943:304): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.518948][ T40] audit: type=1400 audit(1770457413.953:305): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.532416][ T40] audit: type=1400 audit(1770457413.983:306): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.555694][ T40] audit: type=1400 audit(1770457413.993:307): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.568222][ T40] audit: type=1400 audit(1770457414.013:308): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.579025][ T40] audit: type=1400 audit(1770457414.023:309): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.608243][ T40] audit: type=1400 audit(1770457414.053:310): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.619628][ T40] audit: type=1400 audit(1770457414.063:311): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.630484][ T40] audit: type=1400 audit(1770457414.073:312): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.667650][ T40] audit: type=1400 audit(1770457414.113:313): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.537596][ T40] kauditd_printk_skb: 261 callbacks suppressed [ 84.537613][ T40] audit: type=1400 audit(1770457418.983:575): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.550161][ T40] audit: type=1400 audit(1770457418.993:576): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.561866][ T40] audit: type=1400 audit(1770457419.003:577): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.598513][ T40] audit: type=1400 audit(1770457419.043:578): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.613974][ T40] audit: type=1400 audit(1770457419.053:579): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.627135][ T40] audit: type=1400 audit(1770457419.073:580): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.654785][ T40] audit: type=1400 audit(1770457419.093:581): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.665793][ T40] audit: type=1400 audit(1770457419.103:582): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.677820][ T40] audit: type=1400 audit(1770457419.123:583): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.704555][ T40] audit: type=1400 audit(1770457419.143:584): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.674582][ T24] cfg80211: failed to load regulatory.db [ 87.710452][ T60] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.770840][ T60] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.885330][ T60] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.987278][ T60] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 88.072330][ T60] bridge_slave_1: left allmulticast mode [ 88.074274][ T60] bridge_slave_1: left promiscuous mode [ 88.076749][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.082221][ T60] bridge_slave_0: left allmulticast mode [ 88.084601][ T60] bridge_slave_0: left promiscuous mode [ 88.087407][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.275810][ T60] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 88.280700][ T60] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 88.285498][ T60] bond0 (unregistering): Released all slaves [ 88.587338][ T60] hsr_slave_0: left promiscuous mode [ 88.591158][ T60] hsr_slave_1: left promiscuous mode [ 88.593962][ T60] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 88.597288][ T60] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 88.601025][ T60] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 88.604135][ T60] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 88.614965][ T60] veth1_macvtap: left promiscuous mode [ 88.617243][ T60] veth0_macvtap: left promiscuous mode [ 88.619059][ T60] veth1_vlan: left promiscuous mode [ 88.620777][ T60] veth0_vlan: left promiscuous mode [ 88.950053][ T60] team0 (unregistering): Port device team_slave_1 removed [ 88.972524][ T60] team0 (unregistering): Port device team_slave_0 removed [ 89.546363][ T40] kauditd_printk_skb: 10524 callbacks suppressed [ 89.546376][ T40] audit: type=1400 audit(1770457423.993:11109): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.555498][ T40] audit: type=1400 audit(1770457423.993:11110): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.562471][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.562484][ T5644] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 89.562492][ T5644] audit: backlog limit exceeded [ 89.562533][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.562541][ T5644] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 89.562549][ T5644] audit: backlog limit exceeded [ 89.562591][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.565201][ T40] audit: type=1400 audit(1770457423.993:11111): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.555973][ T40] kauditd_printk_skb: 39077 callbacks suppressed [ 94.555987][ T40] audit: type=1400 audit(1770457428.993:48441): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.561488][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.564720][ T40] audit: type=1400 audit(1770457429.003:48442): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.566866][ T5644] audit: audit_lost=586 audit_rate_limit=0 audit_backlog_limit=64 [ 94.573531][ T40] audit: type=1400 audit(1770457429.003:48443): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.576036][ T5644] audit: backlog limit exceeded [ 94.576325][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.582646][ T40] audit: type=1400 audit(1770457429.003:48444): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.584192][ T5644] audit: audit_lost=587 audit_rate_limit=0 audit_backlog_limit=64 [ 94.586523][ T40] audit: type=1400 audit(1770457429.003:48445): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.565991][ T40] kauditd_printk_skb: 42803 callbacks suppressed [ 99.566004][ T40] audit: type=1400 audit(1770457434.013:90114): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.571442][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.574651][ T40] audit: type=1400 audit(1770457434.013:90115): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.576818][ T5644] audit: audit_lost=966 audit_rate_limit=0 audit_backlog_limit=64 [ 99.583652][ T40] audit: type=1400 audit(1770457434.013:90116): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.586218][ T5644] audit: backlog limit exceeded [ 99.593004][ T40] audit: type=1400 audit(1770457434.013:90117): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.595018][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.601741][ T40] audit: type=1400 audit(1770457434.013:90118): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.603765][ T5644] audit: audit_lost=967 audit_rate_limit=0 audit_backlog_limit=64 [ 104.575999][ T40] kauditd_printk_skb: 44388 callbacks suppressed [ 104.576012][ T40] audit: type=1400 audit(1770457439.023:133900): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.581820][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.584667][ T40] audit: type=1400 audit(1770457439.023:133901): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.586820][ T5644] audit: audit_lost=1170 audit_rate_limit=0 audit_backlog_limit=64 [ 104.593426][ T40] audit: type=1400 audit(1770457439.023:133902): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.595995][ T5644] audit: backlog limit exceeded [ 104.596232][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.602613][ T40] audit: type=1400 audit(1770457439.023:133903): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.604169][ T5644] audit: audit_lost=1171 audit_rate_limit=0 audit_backlog_limit=64 [ 104.606353][ T40] audit: type=1400 audit(1770457439.023:133904): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0