Warning: Permanently added '[localhost]:6873' (ED25519) to the list of known hosts. [ 58.426624][ T40] audit: type=1400 audit(1769792722.710:62): avc: denied { execute } for pid=5935 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 58.436719][ T40] audit: type=1400 audit(1769792722.710:63): avc: denied { execute_no_trans } for pid=5935 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/01/30 17:05:24 parsed 1 programs [ 59.741947][ T40] audit: type=1400 audit(1769792724.030:64): avc: denied { node_bind } for pid=5935 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 61.837645][ T40] audit: type=1400 audit(1769792726.120:65): avc: denied { mounton } for pid=5947 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 61.846696][ T40] audit: type=1400 audit(1769792726.130:66): avc: denied { mount } for pid=5947 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.848573][ T5947] cgroup: Unknown subsys name 'net' [ 61.859370][ T40] audit: type=1400 audit(1769792726.140:67): avc: denied { unmount } for pid=5947 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.955394][ T5947] cgroup: Unknown subsys name 'cpuset' [ 61.960013][ T5947] cgroup: Unknown subsys name 'rlimit' [ 62.112314][ T40] audit: type=1400 audit(1769792726.400:68): avc: denied { setattr } for pid=5947 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 62.119980][ T40] audit: type=1400 audit(1769792726.400:69): avc: denied { create } for pid=5947 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.126571][ T40] audit: type=1400 audit(1769792726.400:70): avc: denied { write } for pid=5947 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.133458][ T40] audit: type=1400 audit(1769792726.400:71): avc: denied { read } for pid=5947 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.174308][ T5949] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 62.885503][ T5947] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 64.505037][ T40] kauditd_printk_skb: 9 callbacks suppressed [ 64.505053][ T40] audit: type=1400 audit(1769792728.790:81): avc: denied { execmem } for pid=5954 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 64.516207][ T40] audit: type=1400 audit(1769792728.800:82): avc: denied { read } for pid=5955 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 64.524753][ T40] audit: type=1400 audit(1769792728.800:83): avc: denied { open } for pid=5955 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 64.534103][ T40] audit: type=1400 audit(1769792728.800:84): avc: denied { mounton } for pid=5955 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 64.568528][ T40] audit: type=1400 audit(1769792728.850:85): avc: denied { mount } for pid=5955 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 64.575723][ T40] audit: type=1400 audit(1769792728.850:86): avc: denied { mounton } for pid=5955 comm="syz-executor" path="/syzkaller.GKEwt5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 64.583753][ T40] audit: type=1400 audit(1769792728.860:87): avc: denied { mount } for pid=5955 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 64.592439][ T40] audit: type=1400 audit(1769792728.860:88): avc: denied { mounton } for pid=5955 comm="syz-executor" path="/syzkaller.GKEwt5/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 64.603093][ T40] audit: type=1400 audit(1769792728.860:89): avc: denied { mounton } for pid=5955 comm="syz-executor" path="/syzkaller.GKEwt5/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 64.614024][ T40] audit: type=1400 audit(1769792728.860:90): avc: denied { unmount } for pid=5955 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 64.628390][ T5955] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 64.931992][ T5966] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 64.934962][ T5966] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 64.937683][ T5966] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 64.940958][ T5966] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 64.943777][ T5966] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 65.181108][ T1147] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.183765][ T1147] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.201750][ T46] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.205017][ T46] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.078494][ T6003] chnl_net:caif_netlink_parms(): no params data found [ 66.140772][ T6003] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.144865][ T6003] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.148023][ T6003] bridge_slave_0: entered allmulticast mode [ 66.152454][ T6003] bridge_slave_0: entered promiscuous mode [ 66.158255][ T6003] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.161620][ T6003] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.164043][ T6003] bridge_slave_1: entered allmulticast mode [ 66.167269][ T6003] bridge_slave_1: entered promiscuous mode [ 66.187210][ T6003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.193893][ T6003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.219572][ T6003] team0: Port device team_slave_0 added [ 66.226689][ T6003] team0: Port device team_slave_1 added [ 66.252082][ T6003] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 66.254949][ T6003] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 66.267462][ T6003] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 66.283075][ T6003] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 66.286022][ T6003] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 66.297010][ T6003] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 66.335966][ T6003] hsr_slave_0: entered promiscuous mode [ 66.339262][ T6003] hsr_slave_1: entered promiscuous mode [ 66.444131][ T6003] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 66.449822][ T6003] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 66.454949][ T6003] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 66.459214][ T6003] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 66.500778][ T6003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.514837][ T6003] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.523295][ T62] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.525852][ T62] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.532874][ T1163] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.535206][ T1163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.642719][ T6003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.666798][ T6003] veth0_vlan: entered promiscuous mode [ 66.674478][ T6003] veth1_vlan: entered promiscuous mode [ 66.697441][ T6003] veth0_macvtap: entered promiscuous mode [ 66.703425][ T6003] veth1_macvtap: entered promiscuous mode [ 66.715451][ T6003] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.723122][ T6003] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.731632][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.735824][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.738712][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.743667][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.823773][ T62] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.921358][ T62] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.978824][ T62] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.065992][ T62] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/01/30 17:05:31 executed programs: 0 [ 67.681963][ T5966] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.685468][ T5966] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.688615][ T5966] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.692305][ T5966] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.695708][ T5966] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.829554][ T6052] chnl_net:caif_netlink_parms(): no params data found [ 67.878860][ T6052] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.881285][ T6052] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.883562][ T6052] bridge_slave_0: entered allmulticast mode [ 67.886190][ T6052] bridge_slave_0: entered promiscuous mode [ 67.890497][ T6052] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.892689][ T6052] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.894865][ T6052] bridge_slave_1: entered allmulticast mode [ 67.897406][ T6052] bridge_slave_1: entered promiscuous mode [ 67.913200][ T6052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.918693][ T6052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.934428][ T6052] team0: Port device team_slave_0 added [ 67.937577][ T6052] team0: Port device team_slave_1 added [ 67.953348][ T6052] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.955824][ T6052] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.963983][ T6052] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.968410][ T6052] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.970903][ T6052] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.978741][ T6052] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.002804][ T6052] hsr_slave_0: entered promiscuous mode [ 68.004972][ T6052] hsr_slave_1: entered promiscuous mode [ 68.007045][ T6052] debugfs: 'hsr0' already exists in 'hsr' [ 68.009009][ T6052] Cannot create hsr debugfs directory [ 69.750708][ T64] Bluetooth: hci0: command tx timeout [ 69.937882][ T62] bridge_slave_1: left allmulticast mode [ 69.940190][ T62] bridge_slave_1: left promiscuous mode [ 69.942533][ T62] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.948232][ T62] bridge_slave_0: left allmulticast mode [ 69.950701][ T62] bridge_slave_0: left promiscuous mode [ 69.953111][ T62] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.129019][ T62] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 70.133621][ T62] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 70.137254][ T62] bond0 (unregistering): Released all slaves [ 70.194024][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 70.194035][ T40] audit: type=1400 audit(1769792734.480:111): avc: denied { create } for pid=6066 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 70.203491][ T40] audit: type=1400 audit(1769792734.490:112): avc: denied { write } for pid=6066 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 70.212935][ T40] audit: type=1400 audit(1769792734.490:113): avc: denied { append } for pid=6066 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 70.243187][ T40] audit: type=1400 audit(1769792734.530:114): avc: denied { unlink } for pid=6069 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 70.288879][ T62] hsr_slave_0: left promiscuous mode [ 70.291857][ T62] hsr_slave_1: left promiscuous mode [ 70.294767][ T62] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 70.297732][ T62] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 70.301887][ T62] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 70.304936][ T62] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 70.317959][ T62] veth1_macvtap: left promiscuous mode [ 70.320517][ T62] veth0_macvtap: left promiscuous mode [ 70.322853][ T62] veth1_vlan: left promiscuous mode [ 70.325697][ T62] veth0_vlan: left promiscuous mode [ 70.573789][ T62] team0 (unregistering): Port device team_slave_1 removed [ 70.590401][ T62] team0 (unregistering): Port device team_slave_0 removed [ 71.125522][ T6052] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 71.129814][ T6052] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 71.135685][ T6052] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 71.142844][ T6052] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 71.212190][ T6052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.222841][ T6052] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.228641][ T1147] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.230979][ T1147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.241826][ T1147] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.244134][ T1147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.448659][ T6052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.482339][ T6052] veth0_vlan: entered promiscuous mode [ 71.487882][ T6052] veth1_vlan: entered promiscuous mode [ 71.502869][ T6052] veth0_macvtap: entered promiscuous mode [ 71.506419][ T6052] veth1_macvtap: entered promiscuous mode [ 71.524425][ T6052] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.537195][ T6052] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.549725][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.554499][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.558637][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.564449][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.626188][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 71.628969][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 71.652105][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 71.654622][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 71.688383][ T40] audit: type=1404 audit(1769792735.970:115): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 71.716147][ T40] audit: type=1400 audit(1769792736.000:116): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.724174][ T40] audit: type=1400 audit(1769792736.010:117): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.732315][ T40] audit: type=1400 audit(1769792736.020:118): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.774083][ T40] audit: type=1400 audit(1769792736.060:119): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.783991][ T40] audit: type=1400 audit(1769792736.070:120): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.830848][ T64] Bluetooth: hci0: command tx timeout [ 73.911744][ T64] Bluetooth: hci0: command tx timeout [ 75.235113][ T40] kauditd_printk_skb: 188 callbacks suppressed [ 75.235132][ T40] audit: type=1400 audit(1769792739.520:309): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.247086][ T40] audit: type=1400 audit(1769792739.530:310): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.255477][ T40] audit: type=1400 audit(1769792739.530:311): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.298825][ T40] audit: type=1400 audit(1769792739.580:312): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.307995][ T40] audit: type=1400 audit(1769792739.590:313): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.318923][ T40] audit: type=1400 audit(1769792739.600:314): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.349689][ T40] audit: type=1400 audit(1769792739.630:315): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.363881][ T40] audit: type=1400 audit(1769792739.650:316): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.375355][ T40] audit: type=1400 audit(1769792739.660:317): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.399748][ T40] audit: type=1400 audit(1769792739.680:318): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.990053][ T64] Bluetooth: hci0: command tx timeout [ 76.476689][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.479387][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 80.250912][ T40] kauditd_printk_skb: 261 callbacks suppressed [ 80.250923][ T40] audit: type=1400 audit(1769792744.540:580): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.274424][ T40] audit: type=1400 audit(1769792744.560:581): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.287517][ T40] audit: type=1400 audit(1769792744.570:582): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.309291][ T40] audit: type=1400 audit(1769792744.590:583): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.323216][ T40] audit: type=1400 audit(1769792744.610:584): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.336519][ T40] audit: type=1400 audit(1769792744.620:585): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.369094][ T40] audit: type=1400 audit(1769792744.650:586): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.381647][ T40] audit: type=1400 audit(1769792744.670:587): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.392651][ T40] audit: type=1400 audit(1769792744.680:588): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.431902][ T40] audit: type=1400 audit(1769792744.720:589): avc: denied { read write } for pid=6052 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.057450][ T1163] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.128498][ T1163] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.194292][ T1163] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.292295][ T1163] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.429824][ T1163] bridge_slave_1: left allmulticast mode [ 83.432848][ T1163] bridge_slave_1: left promiscuous mode [ 83.435380][ T1163] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.440952][ T1163] bridge_slave_0: left allmulticast mode [ 83.442826][ T1163] bridge_slave_0: left promiscuous mode [ 83.444754][ T1163] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.632614][ T1163] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 83.638997][ T1163] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 83.644698][ T1163] bond0 (unregistering): Released all slaves [ 84.024253][ T1163] hsr_slave_0: left promiscuous mode [ 84.027124][ T1163] hsr_slave_1: left promiscuous mode [ 84.029849][ T1163] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 84.032935][ T1163] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 84.036712][ T1163] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 84.039811][ T1163] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 84.051721][ T1163] veth1_macvtap: left promiscuous mode [ 84.054071][ T1163] veth0_macvtap: left promiscuous mode [ 84.056462][ T1163] veth1_vlan: left promiscuous mode [ 84.058746][ T1163] veth0_vlan: left promiscuous mode [ 84.323520][ T1163] team0 (unregistering): Port device team_slave_1 removed [ 84.339722][ T1163] team0 (unregistering): Port device team_slave_0 removed [ 85.260439][ T40] kauditd_printk_skb: 14490 callbacks suppressed [ 85.260451][ T40] audit: type=1400 audit(1769792749.550:14999): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.268990][ T40] audit: type=1400 audit(1769792749.550:15000): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.275954][ T40] audit: type=1400 audit(1769792749.550:15001): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.279090][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 85.282426][ T40] audit: type=1400 audit(1769792749.550:15002): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.282470][ T40] audit: type=1400 audit(1769792749.550:15003): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.285195][ T5645] audit: audit_lost=28 audit_rate_limit=0 audit_backlog_limit=64 [ 85.294158][ T40] audit: type=1400 audit(1769792749.550:15004): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.294202][ T40] audit: type=1400 audit(1769792749.550:15005): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.303141][ T5645] audit: backlog limit exceeded [ 86.711249][ T1473] cfg80211: failed to load regulatory.db [ 90.270089][ T40] kauditd_printk_skb: 43176 callbacks suppressed [ 90.270113][ T40] audit: type=1400 audit(1769792754.560:57099): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.281975][ T40] audit: type=1400 audit(1769792754.560:57100): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.291200][ T40] audit: type=1400 audit(1769792754.560:57101): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.300288][ T40] audit: type=1400 audit(1769792754.560:57102): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.309167][ T40] audit: type=1400 audit(1769792754.560:57103): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.317034][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.317253][ T40] audit: type=1400 audit(1769792754.560:57104): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.319183][ T5645] audit: audit_lost=390 audit_rate_limit=0 audit_backlog_limit=64 [ 90.325881][ T40] audit: type=1400 audit(1769792754.560:57105): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.328316][ T5645] audit: backlog limit exceeded [ 95.279987][ T40] kauditd_printk_skb: 44366 callbacks suppressed [ 95.280005][ T40] audit: type=1400 audit(1769792759.560:101085): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.285772][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.291143][ T40] audit: type=1400 audit(1769792759.570:101086): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.293221][ T5645] audit: audit_lost=520 audit_rate_limit=0 audit_backlog_limit=64 [ 95.301622][ T40] audit: type=1400 audit(1769792759.570:101087): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.304128][ T5645] audit: backlog limit exceeded [ 95.304403][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.312608][ T40] audit: type=1400 audit(1769792759.570:101088): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.314150][ T5645] audit: audit_lost=521 audit_rate_limit=0 audit_backlog_limit=64 [ 95.316827][ T40] audit: type=1400 audit(1769792759.570:101089): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.290117][ T40] kauditd_printk_skb: 40775 callbacks suppressed [ 100.290130][ T40] audit: type=1400 audit(1769792764.580:139857): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.300979][ T40] audit: type=1400 audit(1769792764.580:139858): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.308876][ T40] audit: type=1400 audit(1769792764.580:139859): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.309200][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.316747][ T40] audit: type=1400 audit(1769792764.580:139860): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.319383][ T5645] audit: audit_lost=1191 audit_rate_limit=0 audit_backlog_limit=64 [ 100.326352][ T40] audit: type=1400 audit(1769792764.580:139861): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.329627][ T5645] audit: backlog limit exceeded [ 100.336512][ T40] audit: type=1400 audit(1769792764.580:139862): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.338430][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64