[ 52.940203][ T40] audit: type=1400 audit(1772520409.406:59): avc: denied { write } for pid=5903 comm="sh" path="pipe:[7193]" dev="pipefs" ino=7193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 52.950828][ T40] audit: type=1400 audit(1772520409.406:60): avc: denied { rlimitinh } for pid=5903 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 52.958556][ T40] audit: type=1400 audit(1772520409.406:61): avc: denied { siginh } for pid=5903 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:37478' (ED25519) to the list of known hosts. [ 61.198224][ T40] audit: type=1400 audit(1772520417.686:62): avc: denied { execute } for pid=5923 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.205476][ T40] audit: type=1400 audit(1772520417.686:63): avc: denied { execute_no_trans } for pid=5923 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/03/03 06:46:59 parsed 1 programs [ 62.557116][ T40] audit: type=1400 audit(1772520419.036:64): avc: denied { node_bind } for pid=5923 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 64.933841][ T40] audit: type=1400 audit(1772520421.416:65): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 64.943573][ T40] audit: type=1400 audit(1772520421.426:66): avc: denied { mount } for pid=5933 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.945555][ T5933] cgroup: Unknown subsys name 'net' [ 64.955729][ T40] audit: type=1400 audit(1772520421.436:67): avc: denied { unmount } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.092120][ T5933] cgroup: Unknown subsys name 'cpuset' [ 65.099127][ T5933] cgroup: Unknown subsys name 'rlimit' [ 65.293062][ T40] audit: type=1400 audit(1772520421.776:68): avc: denied { setattr } for pid=5933 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 65.301315][ T40] audit: type=1400 audit(1772520421.776:69): avc: denied { create } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.308280][ T40] audit: type=1400 audit(1772520421.776:70): avc: denied { write } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.314999][ T40] audit: type=1400 audit(1772520421.776:71): avc: denied { read } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.360563][ T5936] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 66.256737][ T5933] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 68.179338][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 68.179358][ T40] audit: type=1400 audit(1772520424.666:82): avc: denied { execmem } for pid=5943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 68.190902][ T40] audit: type=1400 audit(1772520424.666:83): avc: denied { read } for pid=5944 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.200579][ T40] audit: type=1400 audit(1772520424.666:84): avc: denied { open } for pid=5944 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.211098][ T40] audit: type=1400 audit(1772520424.666:85): avc: denied { mounton } for pid=5944 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 68.251898][ T40] audit: type=1400 audit(1772520424.736:86): avc: denied { mount } for pid=5944 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 68.261630][ T40] audit: type=1400 audit(1772520424.736:87): avc: denied { mounton } for pid=5944 comm="syz-executor" path="/syzkaller.u85X7n/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 68.272176][ T40] audit: type=1400 audit(1772520424.736:88): avc: denied { mount } for pid=5944 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 68.279484][ T40] audit: type=1400 audit(1772520424.746:89): avc: denied { mounton } for pid=5944 comm="syz-executor" path="/syzkaller.u85X7n/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 68.288013][ T40] audit: type=1400 audit(1772520424.746:90): avc: denied { mounton } for pid=5944 comm="syz-executor" path="/syzkaller.u85X7n/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 68.296327][ T40] audit: type=1400 audit(1772520424.746:91): avc: denied { unmount } for pid=5944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 68.306200][ T5944] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 69.892248][ T5285] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.896694][ T5285] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.903034][ T5285] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.907157][ T5285] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.913786][ T5285] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 70.544350][ T6012] chnl_net:caif_netlink_parms(): no params data found [ 70.631264][ T6012] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.634997][ T6012] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.637663][ T6012] bridge_slave_0: entered allmulticast mode [ 70.641851][ T6012] bridge_slave_0: entered promiscuous mode [ 70.654132][ T6012] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.657148][ T6012] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.660409][ T6012] bridge_slave_1: entered allmulticast mode [ 70.664244][ T6012] bridge_slave_1: entered promiscuous mode [ 70.691883][ T6012] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.698451][ T6012] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.720102][ T6012] team0: Port device team_slave_0 added [ 70.723523][ T6012] team0: Port device team_slave_1 added [ 70.739752][ T6012] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.742757][ T6012] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.754347][ T6012] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.760811][ T6012] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.764004][ T6012] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.775049][ T6012] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.804621][ T6012] hsr_slave_0: entered promiscuous mode [ 70.806986][ T6012] hsr_slave_1: entered promiscuous mode [ 70.901977][ T6012] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 70.911296][ T6012] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 70.917582][ T6012] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 70.924335][ T6012] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 70.999375][ T6012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.015858][ T6012] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.023145][ T91] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.025555][ T91] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.033571][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.035929][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.160714][ T6012] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.186716][ T6012] veth0_vlan: entered promiscuous mode [ 71.192681][ T6012] veth1_vlan: entered promiscuous mode [ 71.209282][ T6012] veth0_macvtap: entered promiscuous mode [ 71.214310][ T6012] veth1_macvtap: entered promiscuous mode [ 71.224711][ T6012] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.231388][ T6012] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.240311][ T46] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.245277][ T46] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.250133][ T46] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.253739][ T46] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.371961][ T91] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.430215][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 71.433029][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 71.459235][ T91] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.470681][ T1239] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 71.473859][ T1239] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 71.514056][ T91] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.610329][ T91] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/03/03 06:47:08 executed programs: 0 [ 71.828559][ T63] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.832366][ T63] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.835328][ T63] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.838997][ T63] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.842758][ T63] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.962976][ T6042] chnl_net:caif_netlink_parms(): no params data found [ 72.022592][ T6042] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.026318][ T6042] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.032668][ T6042] bridge_slave_0: entered allmulticast mode [ 72.035731][ T6042] bridge_slave_0: entered promiscuous mode [ 72.038971][ T6042] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.041320][ T6042] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.044483][ T6042] bridge_slave_1: entered allmulticast mode [ 72.048611][ T6042] bridge_slave_1: entered promiscuous mode [ 72.070391][ T6042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.077005][ T6042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.102633][ T6042] team0: Port device team_slave_0 added [ 72.110485][ T6042] team0: Port device team_slave_1 added [ 72.133577][ T6042] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.135906][ T6042] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 72.144097][ T6042] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.148552][ T6042] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.150822][ T6042] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 72.159238][ T6042] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.188065][ T6042] hsr_slave_0: entered promiscuous mode [ 72.190921][ T6042] hsr_slave_1: entered promiscuous mode [ 72.193106][ T6042] debugfs: 'hsr0' already exists in 'hsr' [ 72.195038][ T6042] Cannot create hsr debugfs directory [ 73.928117][ T5285] Bluetooth: hci0: command tx timeout [ 74.559231][ T91] bridge_slave_1: left allmulticast mode [ 74.561597][ T91] bridge_slave_1: left promiscuous mode [ 74.564729][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.571914][ T91] bridge_slave_0: left allmulticast mode [ 74.574413][ T91] bridge_slave_0: left promiscuous mode [ 74.577125][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.784781][ T91] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 74.792438][ T91] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 74.797678][ T91] bond0 (unregistering): Released all slaves [ 74.882651][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 74.882664][ T40] audit: type=1400 audit(1772520431.366:112): avc: denied { create } for pid=6051 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 74.893499][ T40] audit: type=1400 audit(1772520431.366:113): avc: denied { write } for pid=6051 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2113 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 74.902038][ T40] audit: type=1400 audit(1772520431.366:114): avc: denied { append } for pid=6051 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2113 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 74.922228][ T91] hsr_slave_0: left promiscuous mode [ 74.924460][ T91] hsr_slave_1: left promiscuous mode [ 74.925953][ T40] audit: type=1400 audit(1772520431.406:115): avc: denied { unlink } for pid=6054 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2113 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 74.926770][ T91] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.939145][ T91] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 74.943221][ T91] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.945655][ T91] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 74.952366][ T91] veth1_macvtap: left promiscuous mode [ 74.954252][ T91] veth0_macvtap: left promiscuous mode [ 74.956085][ T91] veth1_vlan: left promiscuous mode [ 74.958441][ T91] veth0_vlan: left promiscuous mode [ 75.062930][ T91] team0 (unregistering): Port device team_slave_1 removed [ 75.069440][ T91] team0 (unregistering): Port device team_slave_0 removed [ 75.411228][ T6042] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 75.422094][ T6042] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 75.428837][ T6042] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 75.435684][ T6042] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 75.475178][ T6042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.486762][ T6042] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.492731][ T201] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.495718][ T201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.504759][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.507912][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.656681][ T6042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.688375][ T6042] veth0_vlan: entered promiscuous mode [ 75.700462][ T6042] veth1_vlan: entered promiscuous mode [ 75.718313][ T6042] veth0_macvtap: entered promiscuous mode [ 75.722794][ T6042] veth1_macvtap: entered promiscuous mode [ 75.733487][ T6042] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.756362][ T6042] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.762722][ T46] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.766143][ T46] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.769288][ T46] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.772826][ T46] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.818837][ T46] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.822339][ T46] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.864989][ T201] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.869759][ T201] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.911166][ T40] audit: type=1404 audit(1772520432.386:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 75.937762][ T40] audit: type=1400 audit(1772520432.416:117): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.966714][ T40] audit: type=1400 audit(1772520432.446:118): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.983261][ T40] audit: type=1400 audit(1772520432.466:119): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.001490][ T40] audit: type=1400 audit(1772520432.486:120): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.013560][ T5285] Bluetooth: hci0: command tx timeout [ 76.017504][ T40] audit: type=1400 audit(1772520432.496:121): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.342754][ T1417] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.345275][ T1417] ieee802154 phy1 wpan1: encryption failed: -22 [ 78.087577][ T5285] Bluetooth: hci0: command tx timeout [ 79.889884][ T40] kauditd_printk_skb: 207 callbacks suppressed [ 79.889901][ T40] audit: type=1400 audit(1772520436.376:329): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.918559][ T40] audit: type=1400 audit(1772520436.406:330): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.932393][ T40] audit: type=1400 audit(1772520436.416:331): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.952248][ T40] audit: type=1400 audit(1772520436.436:332): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.971017][ T40] audit: type=1400 audit(1772520436.456:333): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.985170][ T40] audit: type=1400 audit(1772520436.466:334): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.995275][ T40] audit: type=1400 audit(1772520436.476:335): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.018987][ T40] audit: type=1400 audit(1772520436.506:336): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.030921][ T40] audit: type=1400 audit(1772520436.516:337): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.041756][ T40] audit: type=1400 audit(1772520436.526:338): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.168147][ T5285] Bluetooth: hci0: command tx timeout [ 84.917473][ T40] kauditd_printk_skb: 262 callbacks suppressed [ 84.917487][ T40] audit: type=1400 audit(1772520441.396:601): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.929019][ T40] audit: type=1400 audit(1772520441.416:602): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.937959][ T40] audit: type=1400 audit(1772520441.416:603): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.965596][ T40] audit: type=1400 audit(1772520441.446:604): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.976737][ T40] audit: type=1400 audit(1772520441.456:605): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.987733][ T40] audit: type=1400 audit(1772520441.476:606): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.030378][ T40] audit: type=1400 audit(1772520441.516:607): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.042255][ T40] audit: type=1400 audit(1772520441.526:608): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.054058][ T40] audit: type=1400 audit(1772520441.536:609): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.084920][ T40] audit: type=1400 audit(1772520441.566:610): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.578503][ T50] cfg80211: failed to load regulatory.db [ 87.332302][ T91] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.456893][ T91] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.526037][ T91] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.598045][ T91] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.711545][ T91] bridge_slave_1: left allmulticast mode [ 87.713433][ T91] bridge_slave_1: left promiscuous mode [ 87.715921][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.722552][ T91] bridge_slave_0: left allmulticast mode [ 87.725096][ T91] bridge_slave_0: left promiscuous mode [ 87.728873][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.882089][ T91] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 87.886604][ T91] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 87.890298][ T91] bond0 (unregistering): Released all slaves [ 88.252832][ T91] hsr_slave_0: left promiscuous mode [ 88.255885][ T91] hsr_slave_1: left promiscuous mode [ 88.259068][ T91] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 88.262283][ T91] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 88.266187][ T91] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 88.270019][ T91] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 88.278196][ T91] veth1_macvtap: left promiscuous mode [ 88.280739][ T91] veth0_macvtap: left promiscuous mode [ 88.283229][ T91] veth1_vlan: left promiscuous mode [ 88.285571][ T91] veth0_vlan: left promiscuous mode [ 88.462473][ T91] team0 (unregistering): Port device team_slave_1 removed [ 88.469412][ T91] team0 (unregistering): Port device team_slave_0 removed [ 89.927569][ T40] kauditd_printk_skb: 19012 callbacks suppressed [ 89.927585][ T40] audit: type=1400 audit(1772520446.416:18879): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.939092][ T40] audit: type=1400 audit(1772520446.416:18880): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.945883][ T40] audit: type=1400 audit(1772520446.416:18881): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.947844][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.954123][ T40] audit: type=1400 audit(1772520446.416:18882): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.956476][ T5637] audit: audit_lost=249 audit_rate_limit=0 audit_backlog_limit=64 [ 89.964751][ T40] audit: type=1400 audit(1772520446.416:18883): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.967937][ T5637] audit: backlog limit exceeded [ 89.968431][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.976608][ T40] audit: type=1400 audit(1772520446.416:18884): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.937370][ T40] kauditd_printk_skb: 42339 callbacks suppressed [ 94.937383][ T40] audit: type=1400 audit(1772520451.416:60211): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.943547][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.946887][ T40] audit: type=1400 audit(1772520451.426:60212): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.949152][ T5637] audit: audit_lost=588 audit_rate_limit=0 audit_backlog_limit=64 [ 94.949167][ T5637] audit: backlog limit exceeded [ 94.949306][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.956026][ T40] audit: type=1400 audit(1772520451.426:60213): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.958648][ T5637] audit: audit_lost=589 audit_rate_limit=0 audit_backlog_limit=64 [ 94.960257][ T40] audit: type=1400 audit(1772520451.426:60214): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.962367][ T5637] audit: backlog limit exceeded [ 99.947441][ T40] kauditd_printk_skb: 44610 callbacks suppressed [ 99.947454][ T40] audit: type=1400 audit(1772520456.426:102947): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.953936][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.956306][ T40] audit: type=1400 audit(1772520456.436:102948): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.958562][ T5637] audit: audit_lost=1216 audit_rate_limit=0 audit_backlog_limit=64 [ 99.958575][ T5637] audit: backlog limit exceeded [ 99.958877][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.965592][ T40] audit: type=1400 audit(1772520456.436:102949): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.968173][ T5637] audit: audit_lost=1217 audit_rate_limit=0 audit_backlog_limit=64 [ 99.969911][ T40] audit: type=1400 audit(1772520456.436:102950): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.972145][ T5637] audit: backlog limit exceeded [ 104.957547][ T40] kauditd_printk_skb: 38152 callbacks suppressed [ 104.957564][ T40] audit: type=1400 audit(1772520461.436:140926): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.968394][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.969262][ T40] audit: type=1400 audit(1772520461.446:140927): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.971485][ T5637] audit: audit_lost=1277 audit_rate_limit=0 audit_backlog_limit=64 [ 104.980632][ T40] audit: type=1400 audit(1772520461.446:140928): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.984223][ T5637] audit: backlog limit exceeded [ 104.993328][ T40] audit: type=1400 audit(1772520461.446:140929): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.996664][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 105.005090][ T40] audit: type=1400 audit(1772520461.446:140930): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 105.008224][ T5637] audit: audit_lost=1278 audit_rate_limit=0 audit_backlog_limit=64