[ 52.685887][ T40] audit: type=1400 audit(1772161455.914:61): avc: denied { siginh } for pid=5910 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:60698' (ED25519) to the list of known hosts. [ 59.429111][ T40] audit: type=1400 audit(1772161462.704:62): avc: denied { execute } for pid=5930 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.439246][ T40] audit: type=1400 audit(1772161462.704:63): avc: denied { execute_no_trans } for pid=5930 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/27 03:04:24 parsed 1 programs [ 60.844794][ T40] audit: type=1400 audit(1772161464.114:64): avc: denied { node_bind } for pid=5930 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.283381][ T40] audit: type=1400 audit(1772161466.554:65): avc: denied { mounton } for pid=5940 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.294052][ T40] audit: type=1400 audit(1772161466.564:66): avc: denied { mount } for pid=5940 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.297595][ T5940] cgroup: Unknown subsys name 'net' [ 63.305758][ T40] audit: type=1400 audit(1772161466.574:67): avc: denied { unmount } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.462697][ T5940] cgroup: Unknown subsys name 'cpuset' [ 63.469537][ T5940] cgroup: Unknown subsys name 'rlimit' [ 63.640240][ T40] audit: type=1400 audit(1772161466.914:68): avc: denied { setattr } for pid=5940 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.648089][ T40] audit: type=1400 audit(1772161466.914:69): avc: denied { create } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.654649][ T40] audit: type=1400 audit(1772161466.914:70): avc: denied { write } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.661823][ T40] audit: type=1400 audit(1772161466.914:71): avc: denied { read } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.720360][ T5943] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 64.569758][ T5940] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.220336][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 66.220350][ T40] audit: type=1400 audit(1772161469.494:82): avc: denied { execmem } for pid=5947 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.228846][ T40] audit: type=1400 audit(1772161469.494:83): avc: denied { read } for pid=5948 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.235764][ T40] audit: type=1400 audit(1772161469.494:84): avc: denied { open } for pid=5948 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.243532][ T40] audit: type=1400 audit(1772161469.494:85): avc: denied { mounton } for pid=5948 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.293287][ T59] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.296474][ T59] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.314397][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.317040][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.324200][ T40] audit: type=1400 audit(1772161469.594:86): avc: denied { mount } for pid=5948 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.331566][ T40] audit: type=1400 audit(1772161469.594:87): avc: denied { mounton } for pid=5948 comm="syz-executor" path="/syzkaller.oitQjK/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 66.339741][ T40] audit: type=1400 audit(1772161469.594:88): avc: denied { mount } for pid=5948 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 66.346858][ T40] audit: type=1400 audit(1772161469.604:89): avc: denied { mounton } for pid=5948 comm="syz-executor" path="/syzkaller.oitQjK/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 66.355471][ T40] audit: type=1400 audit(1772161469.604:90): avc: denied { mounton } for pid=5948 comm="syz-executor" path="/syzkaller.oitQjK/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 66.365725][ T40] audit: type=1400 audit(1772161469.604:91): avc: denied { unmount } for pid=5948 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 66.382450][ T5948] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 67.971311][ T6001] chnl_net:caif_netlink_parms(): no params data found [ 68.028386][ T6001] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.032385][ T6001] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.034867][ T6001] bridge_slave_0: entered allmulticast mode [ 68.037823][ T6001] bridge_slave_0: entered promiscuous mode [ 68.042439][ T6001] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.044801][ T6001] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.047099][ T6001] bridge_slave_1: entered allmulticast mode [ 68.050040][ T6001] bridge_slave_1: entered promiscuous mode [ 68.068990][ T6001] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.073555][ T6001] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.091694][ T6001] team0: Port device team_slave_0 added [ 68.094879][ T6001] team0: Port device team_slave_1 added [ 68.108975][ T6001] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.111203][ T6001] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.119974][ T6001] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.125105][ T6001] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.127312][ T6001] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.135544][ T6001] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.159345][ T6001] hsr_slave_0: entered promiscuous mode [ 68.161671][ T6001] hsr_slave_1: entered promiscuous mode [ 68.338622][ T6001] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.345705][ T6001] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.351097][ T6001] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.355924][ T6001] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.411354][ T6001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.421398][ T6001] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.429281][ T105] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.431807][ T105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.440008][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.443251][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.584803][ T6001] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.618951][ T6001] veth0_vlan: entered promiscuous mode [ 68.629748][ T6001] veth1_vlan: entered promiscuous mode [ 68.651826][ T6001] veth0_macvtap: entered promiscuous mode [ 68.659435][ T6001] veth1_macvtap: entered promiscuous mode [ 68.671667][ T6001] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.680404][ T6001] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.699566][ T59] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.703623][ T59] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.712035][ T59] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.715811][ T59] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.808335][ T46] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.884794][ T46] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.949103][ T46] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.025271][ T46] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.337763][ T6039] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.341864][ T6039] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.345619][ T6039] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.350551][ T6039] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.354336][ T6039] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/02/27 03:04:33 executed programs: 0 [ 69.855724][ T6039] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.860346][ T6039] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.864125][ T6039] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.868223][ T6039] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.871715][ T6039] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 70.005651][ T6050] chnl_net:caif_netlink_parms(): no params data found [ 70.058141][ T6050] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.061484][ T6050] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.063915][ T6050] bridge_slave_0: entered allmulticast mode [ 70.067466][ T6050] bridge_slave_0: entered promiscuous mode [ 70.072483][ T6050] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.075688][ T6050] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.079096][ T6050] bridge_slave_1: entered allmulticast mode [ 70.082996][ T6050] bridge_slave_1: entered promiscuous mode [ 70.100105][ T6050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.104771][ T6050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.126118][ T6050] team0: Port device team_slave_0 added [ 70.129928][ T6050] team0: Port device team_slave_1 added [ 70.146096][ T6050] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.148691][ T6050] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.157021][ T6050] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.162237][ T6050] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.164487][ T6050] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.173320][ T6050] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.200206][ T6050] hsr_slave_0: entered promiscuous mode [ 70.202707][ T6050] hsr_slave_1: entered promiscuous mode [ 70.205074][ T6050] debugfs: 'hsr0' already exists in 'hsr' [ 70.206926][ T6050] Cannot create hsr debugfs directory [ 71.948329][ T5286] Bluetooth: hci0: command tx timeout [ 72.204991][ T46] bridge_slave_1: left allmulticast mode [ 72.207569][ T46] bridge_slave_1: left promiscuous mode [ 72.210749][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.216952][ T46] bridge_slave_0: left allmulticast mode [ 72.219833][ T46] bridge_slave_0: left promiscuous mode [ 72.221866][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.385685][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 72.390281][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 72.393914][ T46] bond0 (unregistering): Released all slaves [ 72.468664][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 72.468678][ T40] audit: type=1400 audit(1772161475.744:112): avc: denied { create } for pid=6059 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.478091][ T40] audit: type=1400 audit(1772161475.744:113): avc: denied { write } for pid=6059 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2098 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.486239][ T40] audit: type=1400 audit(1772161475.744:114): avc: denied { append } for pid=6059 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2098 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.520810][ T40] audit: type=1400 audit(1772161475.794:115): avc: denied { unlink } for pid=6062 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2098 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.557695][ T46] hsr_slave_0: left promiscuous mode [ 72.560151][ T46] hsr_slave_1: left promiscuous mode [ 72.562285][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 72.565305][ T46] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 72.573893][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 72.577321][ T46] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 72.588607][ T46] veth1_macvtap: left promiscuous mode [ 72.591222][ T46] veth0_macvtap: left promiscuous mode [ 72.593663][ T46] veth1_vlan: left promiscuous mode [ 72.595999][ T46] veth0_vlan: left promiscuous mode [ 72.787841][ T46] team0 (unregistering): Port device team_slave_1 removed [ 72.795046][ T46] team0 (unregistering): Port device team_slave_0 removed [ 73.169957][ T6050] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.175191][ T6050] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.182517][ T6050] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.188098][ T6050] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.255674][ T6050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.267019][ T6050] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.272357][ T59] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.274663][ T59] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.282110][ T105] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.284452][ T105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.532903][ T6050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.559715][ T6050] veth0_vlan: entered promiscuous mode [ 73.565806][ T6050] veth1_vlan: entered promiscuous mode [ 73.585479][ T6050] veth0_macvtap: entered promiscuous mode [ 73.592379][ T6050] veth1_macvtap: entered promiscuous mode [ 73.606912][ T6050] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.616350][ T6050] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.634583][ T105] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.641124][ T105] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.662342][ T105] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.666118][ T105] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.719440][ T105] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.722859][ T105] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.744461][ T95] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.752105][ T95] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.790664][ T40] audit: type=1404 audit(1772161477.064:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 73.810919][ T40] audit: type=1400 audit(1772161477.084:117): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.834414][ T40] audit: type=1400 audit(1772161477.104:118): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.847213][ T40] audit: type=1400 audit(1772161477.114:119): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.866701][ T40] audit: type=1400 audit(1772161477.134:120): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.877529][ T40] audit: type=1400 audit(1772161477.144:121): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.027621][ T5286] Bluetooth: hci0: command tx timeout [ 76.118839][ T5286] Bluetooth: hci0: command tx timeout [ 76.842587][ T1418] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.845592][ T1418] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.499619][ T40] kauditd_printk_skb: 191 callbacks suppressed [ 77.499637][ T40] audit: type=1400 audit(1772161480.774:313): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.520984][ T40] audit: type=1400 audit(1772161480.794:314): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.533071][ T40] audit: type=1400 audit(1772161480.804:315): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.559139][ T40] audit: type=1400 audit(1772161480.834:316): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.570796][ T40] audit: type=1400 audit(1772161480.844:317): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.580933][ T40] audit: type=1400 audit(1772161480.854:318): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.619681][ T40] audit: type=1400 audit(1772161480.894:319): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.632993][ T40] audit: type=1400 audit(1772161480.904:320): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.647983][ T40] audit: type=1400 audit(1772161480.924:321): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.678529][ T40] audit: type=1400 audit(1772161480.954:322): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.198186][ T5286] Bluetooth: hci0: command tx timeout [ 82.507888][ T40] kauditd_printk_skb: 251 callbacks suppressed [ 82.507908][ T40] audit: type=1400 audit(1772161485.784:574): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.540011][ T40] audit: type=1400 audit(1772161485.814:575): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.558618][ T40] audit: type=1400 audit(1772161485.834:576): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.569441][ T40] audit: type=1400 audit(1772161485.844:577): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.595690][ T40] audit: type=1400 audit(1772161485.864:578): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.606087][ T40] audit: type=1400 audit(1772161485.874:579): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.616712][ T40] audit: type=1400 audit(1772161485.884:580): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.660573][ T40] audit: type=1400 audit(1772161485.934:581): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.670602][ T40] audit: type=1400 audit(1772161485.944:582): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.681838][ T40] audit: type=1400 audit(1772161485.954:583): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.714531][ T95] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.891370][ T95] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.962152][ T95] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.045289][ T95] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.175511][ T95] bridge_slave_1: left allmulticast mode [ 86.178918][ T95] bridge_slave_1: left promiscuous mode [ 86.181382][ T95] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.186235][ T95] bridge_slave_0: left allmulticast mode [ 86.188791][ T95] bridge_slave_0: left promiscuous mode [ 86.190758][ T95] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.384987][ T95] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 86.391088][ T95] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 86.395177][ T95] bond0 (unregistering): Released all slaves [ 86.732876][ T95] hsr_slave_0: left promiscuous mode [ 86.736009][ T95] hsr_slave_1: left promiscuous mode [ 86.739024][ T95] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 86.742560][ T95] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 86.747117][ T95] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 86.750769][ T95] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 86.760609][ T95] veth1_macvtap: left promiscuous mode [ 86.763334][ T95] veth0_macvtap: left promiscuous mode [ 86.765860][ T95] veth1_vlan: left promiscuous mode [ 86.768312][ T95] veth0_vlan: left promiscuous mode [ 86.975846][ T95] team0 (unregistering): Port device team_slave_1 removed [ 86.987146][ T95] team0 (unregistering): Port device team_slave_0 removed [ 87.070851][ T53] cfg80211: failed to load regulatory.db [ 87.522768][ T40] kauditd_printk_skb: 8819 callbacks suppressed [ 87.522781][ T40] audit: type=1400 audit(1772161490.794:9370): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.535321][ T40] audit: type=1400 audit(1772161490.794:9371): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.537751][ T5639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.542668][ T40] audit: type=1400 audit(1772161490.794:9372): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.544906][ T5639] audit: audit_lost=12 audit_rate_limit=0 audit_backlog_limit=64 [ 87.552720][ T40] audit: type=1400 audit(1772161490.794:9373): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.555921][ T5639] audit: backlog limit exceeded [ 87.562906][ T40] audit: type=1400 audit(1772161490.794:9374): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.562933][ T40] audit: type=1400 audit(1772161490.794:9375): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.562954][ T40] audit: type=1400 audit(1772161490.794:9376): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.528119][ T40] kauditd_printk_skb: 41328 callbacks suppressed [ 92.528131][ T40] audit: type=1400 audit(1772161495.804:50705): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.538667][ T5639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.539334][ T40] audit: type=1400 audit(1772161495.804:50706): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.542092][ T5639] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 92.550595][ T40] audit: type=1400 audit(1772161495.804:50707): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.550637][ T40] audit: type=1400 audit(1772161495.804:50708): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.554153][ T5639] audit: backlog limit exceeded [ 92.562801][ T40] audit: type=1400 audit(1772161495.804:50709): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.562840][ T40] audit: type=1400 audit(1772161495.804:50710): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.572995][ T5639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.537527][ T40] kauditd_printk_skb: 39454 callbacks suppressed [ 97.537542][ T40] audit: type=1400 audit(1772161500.804:89344): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.547944][ T40] audit: type=1400 audit(1772161500.814:89345): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.549509][ T5639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.555665][ T40] audit: type=1400 audit(1772161500.814:89346): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.558389][ T5639] audit: audit_lost=288 audit_rate_limit=0 audit_backlog_limit=64 [ 97.565348][ T40] audit: type=1400 audit(1772161500.814:89347): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.568106][ T5639] audit: backlog limit exceeded [ 97.568452][ T5639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.577575][ T40] audit: type=1400 audit(1772161500.814:89348): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.579153][ T5639] audit: audit_lost=289 audit_rate_limit=0 audit_backlog_limit=64 [ 102.547501][ T40] kauditd_printk_skb: 41140 callbacks suppressed [ 102.547520][ T40] audit: type=1400 audit(1772161505.814:130044): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.552903][ T5639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.558768][ T40] audit: type=1400 audit(1772161505.824:130045): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.560983][ T5639] audit: audit_lost=438 audit_rate_limit=0 audit_backlog_limit=64 [ 102.569180][ T40] audit: type=1400 audit(1772161505.824:130046): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.571678][ T5639] audit: backlog limit exceeded [ 102.572014][ T5639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.579404][ T40] audit: type=1400 audit(1772161505.824:130047): avc: denied { read } for pid=5639 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.580943][ T5639] audit: audit_lost=439 audit_rate_limit=0 audit_backlog_limit=64 [ 102.580954][ T5639] audit: backlog limit exceeded