Warning: Permanently added '[localhost]:41404' (ED25519) to the list of known hosts. [ 54.729046][ T40] audit: type=1400 audit(1769942915.412:62): avc: denied { execute } for pid=5924 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 54.743348][ T40] audit: type=1400 audit(1769942915.412:63): avc: denied { execute_no_trans } for pid=5924 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/01 10:48:37 parsed 1 programs [ 56.326804][ T40] audit: type=1400 audit(1769942917.012:64): avc: denied { node_bind } for pid=5924 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 58.442763][ T40] audit: type=1400 audit(1769942919.122:65): avc: denied { mounton } for pid=5934 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 58.452433][ T5934] cgroup: Unknown subsys name 'net' [ 58.453371][ T40] audit: type=1400 audit(1769942919.132:66): avc: denied { mount } for pid=5934 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 58.461160][ T40] audit: type=1400 audit(1769942919.142:67): avc: denied { unmount } for pid=5934 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 58.657952][ T5934] cgroup: Unknown subsys name 'cpuset' [ 58.664521][ T5934] cgroup: Unknown subsys name 'rlimit' [ 58.865943][ T40] audit: type=1400 audit(1769942919.552:68): avc: denied { setattr } for pid=5934 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 58.873184][ T40] audit: type=1400 audit(1769942919.552:69): avc: denied { create } for pid=5934 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.879659][ T40] audit: type=1400 audit(1769942919.552:70): avc: denied { write } for pid=5934 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.887881][ T40] audit: type=1400 audit(1769942919.552:71): avc: denied { read } for pid=5934 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.909385][ T5936] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 59.625056][ T5934] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 61.367239][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 61.367251][ T40] audit: type=1400 audit(1769942922.052:82): avc: denied { execmem } for pid=5941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 61.375510][ T40] audit: type=1400 audit(1769942922.052:83): avc: denied { read } for pid=5942 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.382215][ T40] audit: type=1400 audit(1769942922.062:84): avc: denied { open } for pid=5942 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.389774][ T40] audit: type=1400 audit(1769942922.062:85): avc: denied { mounton } for pid=5942 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 61.454354][ T40] audit: type=1400 audit(1769942922.142:86): avc: denied { module_request } for pid=5942 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 61.471472][ T5942] chnl_net:caif_netlink_parms(): no params data found [ 61.516566][ T5942] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.519186][ T5942] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.521557][ T5942] bridge_slave_0: entered allmulticast mode [ 61.524535][ T5942] bridge_slave_0: entered promiscuous mode [ 61.528570][ T5942] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.530858][ T5942] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.533632][ T5942] bridge_slave_1: entered allmulticast mode [ 61.536299][ T5942] bridge_slave_1: entered promiscuous mode [ 61.551425][ T5942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.556653][ T5942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.571779][ T5942] team0: Port device team_slave_0 added [ 61.575408][ T5942] team0: Port device team_slave_1 added [ 61.588687][ T5942] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 61.590916][ T5942] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 61.599123][ T5942] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 61.603861][ T5942] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 61.606080][ T5942] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 61.614147][ T5942] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.637348][ T5942] hsr_slave_0: entered promiscuous mode [ 61.639591][ T5942] hsr_slave_1: entered promiscuous mode [ 61.730377][ T5942] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 61.736568][ T5942] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 61.741735][ T5942] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 61.746448][ T5942] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 61.764791][ T5942] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.767211][ T5942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.769848][ T5942] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.772204][ T5942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.806514][ T5942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.816438][ T61] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.819631][ T61] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.829592][ T5942] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.835684][ T82] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.838830][ T82] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.845882][ T82] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.848172][ T82] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.890237][ T40] audit: type=1400 audit(1769942922.572:87): avc: denied { sys_module } for pid=5942 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 61.952848][ T5942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.977866][ T5942] veth0_vlan: entered promiscuous mode [ 61.985598][ T5942] veth1_vlan: entered promiscuous mode [ 61.999160][ T5942] veth0_macvtap: entered promiscuous mode [ 62.002954][ T5942] veth1_macvtap: entered promiscuous mode [ 62.013870][ T5942] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 62.021010][ T5942] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 62.030733][ T61] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.034070][ T61] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.037734][ T61] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.040767][ T61] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.073232][ T40] audit: type=1400 audit(1769942922.752:88): avc: denied { mount } for pid=5942 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 62.082175][ T40] audit: type=1400 audit(1769942922.752:89): avc: denied { mounton } for pid=5942 comm="syz-executor" path="/syzkaller.EsuM7y/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 62.092455][ T40] audit: type=1400 audit(1769942922.752:90): avc: denied { mount } for pid=5942 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 62.101454][ T40] audit: type=1400 audit(1769942922.752:91): avc: denied { mounton } for pid=5942 comm="syz-executor" path="/syzkaller.EsuM7y/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 62.115413][ T5942] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 62.202429][ T61] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 62.272884][ T61] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 62.339054][ T61] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 62.436400][ T61] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 63.376824][ T82] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 63.379362][ T82] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.398972][ T1161] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 63.402869][ T1161] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.465030][ T6018] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 63.468310][ T6018] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 63.471119][ T6018] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 63.475064][ T6018] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 63.477841][ T6018] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/02/01 10:48:44 executed programs: 0 [ 64.121643][ T6018] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 64.125297][ T6018] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 64.127982][ T6018] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 64.131410][ T6018] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 64.134445][ T6018] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 64.215757][ T6041] chnl_net:caif_netlink_parms(): no params data found [ 64.257073][ T6041] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.259473][ T6041] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.261755][ T6041] bridge_slave_0: entered allmulticast mode [ 64.264641][ T6041] bridge_slave_0: entered promiscuous mode [ 64.268202][ T6041] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.270459][ T6041] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.272836][ T6041] bridge_slave_1: entered allmulticast mode [ 64.276588][ T6041] bridge_slave_1: entered promiscuous mode [ 64.290820][ T6041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.295320][ T6041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.309816][ T6041] team0: Port device team_slave_0 added [ 64.313482][ T6041] team0: Port device team_slave_1 added [ 64.326043][ T6041] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.328226][ T6041] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 64.336155][ T6041] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.340899][ T6041] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.343145][ T6041] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 64.350994][ T6041] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.373564][ T6041] hsr_slave_0: entered promiscuous mode [ 64.375762][ T6041] hsr_slave_1: entered promiscuous mode [ 64.377870][ T6041] debugfs: 'hsr0' already exists in 'hsr' [ 64.379765][ T6041] Cannot create hsr debugfs directory [ 65.519542][ T61] bridge_slave_1: left allmulticast mode [ 65.521436][ T61] bridge_slave_1: left promiscuous mode [ 65.523959][ T61] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.529820][ T61] bridge_slave_0: left allmulticast mode [ 65.531603][ T61] bridge_slave_0: left promiscuous mode [ 65.534096][ T61] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.744464][ T61] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 65.749780][ T61] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 65.754354][ T61] bond0 (unregistering): Released all slaves [ 65.898359][ T61] hsr_slave_0: left promiscuous mode [ 65.900506][ T61] hsr_slave_1: left promiscuous mode [ 65.902544][ T61] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 65.904979][ T61] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 65.908163][ T61] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 65.910444][ T61] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 65.919338][ T61] veth1_macvtap: left promiscuous mode [ 65.921264][ T61] veth0_macvtap: left promiscuous mode [ 65.924485][ T61] veth1_vlan: left promiscuous mode [ 65.926333][ T61] veth0_vlan: left promiscuous mode [ 66.157326][ T61] team0 (unregistering): Port device team_slave_1 removed [ 66.178139][ T61] team0 (unregistering): Port device team_slave_0 removed [ 66.205238][ T6018] Bluetooth: hci0: command tx timeout [ 66.498431][ T6041] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 66.502334][ T6041] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 66.506137][ T6041] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 66.510021][ T6041] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 66.554443][ T6041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.562639][ T6041] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.567485][ T82] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.569791][ T82] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.575704][ T82] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.578007][ T82] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.700141][ T6041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.719787][ T6041] veth0_vlan: entered promiscuous mode [ 66.725288][ T6041] veth1_vlan: entered promiscuous mode [ 66.737736][ T6041] veth0_macvtap: entered promiscuous mode [ 66.741422][ T6041] veth1_macvtap: entered promiscuous mode [ 66.749414][ T6041] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.756532][ T6041] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.766681][ T82] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.770622][ T1161] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.774118][ T1161] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.777403][ T1161] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.082602][ T1161] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.087021][ T1161] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.100940][ T1147] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.104198][ T1147] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.162310][ T40] kauditd_printk_skb: 24 callbacks suppressed [ 67.162323][ T40] audit: type=1404 audit(1769942927.842:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 67.198033][ T40] audit: type=1400 audit(1769942927.882:117): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.218008][ T40] audit: type=1400 audit(1769942927.902:118): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.231036][ T40] audit: type=1400 audit(1769942927.912:119): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.257116][ T40] audit: type=1400 audit(1769942927.942:120): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.274327][ T40] audit: type=1400 audit(1769942927.952:121): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.289503][ T40] audit: type=1400 audit(1769942927.972:122): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.313547][ T40] audit: type=1400 audit(1769942928.002:123): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.325099][ T40] audit: type=1400 audit(1769942928.012:124): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.337235][ T40] audit: type=1400 audit(1769942928.022:125): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 68.293501][ T6018] Bluetooth: hci0: command tx timeout [ 70.363116][ T6018] Bluetooth: hci0: command tx timeout [ 72.174862][ T40] kauditd_printk_skb: 275 callbacks suppressed [ 72.174874][ T40] audit: type=1400 audit(1769942932.862:401): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.185507][ T40] audit: type=1400 audit(1769942932.862:402): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.222692][ T40] audit: type=1400 audit(1769942932.902:403): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.234182][ T40] audit: type=1400 audit(1769942932.912:404): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.244270][ T40] audit: type=1400 audit(1769942932.932:405): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.270327][ T40] audit: type=1400 audit(1769942932.952:406): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.280439][ T40] audit: type=1400 audit(1769942932.962:407): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.288848][ T40] audit: type=1400 audit(1769942932.972:408): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.325702][ T40] audit: type=1400 audit(1769942933.012:409): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.334079][ T40] audit: type=1400 audit(1769942933.022:410): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.443160][ T6018] Bluetooth: hci0: command tx timeout [ 76.206372][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.208589][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.203288][ T40] kauditd_printk_skb: 272 callbacks suppressed [ 77.203299][ T40] audit: type=1400 audit(1769942937.882:683): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.215321][ T40] audit: type=1400 audit(1769942937.902:684): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.226342][ T40] audit: type=1400 audit(1769942937.912:685): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.262138][ T40] audit: type=1400 audit(1769942937.942:686): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.274005][ T40] audit: type=1400 audit(1769942937.962:687): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.285565][ T40] audit: type=1400 audit(1769942937.972:688): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.314063][ T40] audit: type=1400 audit(1769942938.002:689): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.327588][ T40] audit: type=1400 audit(1769942938.012:690): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.340798][ T40] audit: type=1400 audit(1769942938.022:691): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.373449][ T40] audit: type=1400 audit(1769942938.062:692): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.147146][ T61] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 78.223230][ T61] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 78.291463][ T61] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 78.417763][ T61] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 78.543681][ T61] bridge_slave_1: left allmulticast mode [ 78.545541][ T61] bridge_slave_1: left promiscuous mode [ 78.547407][ T61] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.553426][ T61] bridge_slave_0: left allmulticast mode [ 78.555221][ T61] bridge_slave_0: left promiscuous mode [ 78.557680][ T61] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.785092][ T61] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 78.789847][ T61] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 78.793960][ T61] bond0 (unregistering): Released all slaves [ 79.188258][ T61] hsr_slave_0: left promiscuous mode [ 79.191007][ T61] hsr_slave_1: left promiscuous mode [ 79.194078][ T61] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 79.197200][ T61] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 79.200836][ T61] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 79.204177][ T61] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 79.216512][ T61] veth1_macvtap: left promiscuous mode [ 79.218925][ T61] veth0_macvtap: left promiscuous mode [ 79.221347][ T61] veth1_vlan: left promiscuous mode [ 79.223794][ T61] veth0_vlan: left promiscuous mode [ 79.521000][ T61] team0 (unregistering): Port device team_slave_1 removed [ 79.542642][ T61] team0 (unregistering): Port device team_slave_0 removed [ 82.213287][ T40] kauditd_printk_skb: 29407 callbacks suppressed [ 82.213372][ T40] audit: type=1400 audit(1769942942.902:29938): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.225493][ T40] audit: type=1400 audit(1769942942.902:29939): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.233510][ T40] audit: type=1400 audit(1769942942.902:29940): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.237864][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.241480][ T40] audit: type=1400 audit(1769942942.902:29941): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.243970][ T5641] audit: audit_lost=55 audit_rate_limit=0 audit_backlog_limit=64 [ 82.243988][ T5641] audit: backlog limit exceeded [ 82.244160][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.252137][ T40] audit: type=1400 audit(1769942942.902:29942): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.254780][ T5641] audit: audit_lost=56 audit_rate_limit=0 audit_backlog_limit=64 [ 86.444194][ T1331] cfg80211: failed to load regulatory.db [ 87.223090][ T40] kauditd_printk_skb: 46163 callbacks suppressed [ 87.223107][ T40] audit: type=1400 audit(1769942947.902:74551): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.234208][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.234685][ T40] audit: type=1400 audit(1769942947.912:74552): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.237052][ T5641] audit: audit_lost=575 audit_rate_limit=0 audit_backlog_limit=64 [ 87.245919][ T40] audit: type=1400 audit(1769942947.912:74553): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.248997][ T5641] audit: backlog limit exceeded [ 87.249525][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.257735][ T40] audit: type=1400 audit(1769942947.912:74554): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.259281][ T5641] audit: audit_lost=576 audit_rate_limit=0 audit_backlog_limit=64 [ 87.259291][ T5641] audit: backlog limit exceeded [ 92.233444][ T40] kauditd_printk_skb: 37063 callbacks suppressed [ 92.233456][ T40] audit: type=1400 audit(1769942952.922:110496): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.242069][ T40] audit: type=1400 audit(1769942952.922:110497): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.244504][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.248616][ T40] audit: type=1400 audit(1769942952.922:110498): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.250914][ T5641] audit: audit_lost=951 audit_rate_limit=0 audit_backlog_limit=64 [ 92.257230][ T40] audit: type=1400 audit(1769942952.922:110499): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.260399][ T5641] audit: backlog limit exceeded [ 92.267305][ T40] audit: type=1400 audit(1769942952.922:110500): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.270126][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.276003][ T40] audit: type=1400 audit(1769942952.922:110501): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.243189][ T40] kauditd_printk_skb: 41899 callbacks suppressed [ 97.243202][ T40] audit: type=1400 audit(1769942957.932:152174): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.248843][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.251657][ T40] audit: type=1400 audit(1769942957.932:152175): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.253808][ T5641] audit: audit_lost=1028 audit_rate_limit=0 audit_backlog_limit=64 [ 97.260133][ T40] audit: type=1400 audit(1769942957.932:152176): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.262579][ T5641] audit: backlog limit exceeded [ 97.268936][ T40] audit: type=1400 audit(1769942957.932:152177): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.270783][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.277013][ T40] audit: type=1400 audit(1769942957.932:152178): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.278965][ T5641] audit: audit_lost=1029 audit_rate_limit=0 audit_backlog_limit=64