Warning: Permanently added '[localhost]:15201' (ED25519) to the list of known hosts. [ 59.337119][ T40] audit: type=1400 audit(1772051226.367:62): avc: denied { execute } for pid=5923 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.346336][ T40] audit: type=1400 audit(1772051226.377:63): avc: denied { execute_no_trans } for pid=5923 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/25 20:27:08 parsed 1 programs [ 61.004417][ T40] audit: type=1400 audit(1772051228.037:64): avc: denied { node_bind } for pid=5923 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.154347][ T40] audit: type=1400 audit(1772051230.187:65): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.162222][ T40] audit: type=1400 audit(1772051230.187:66): avc: denied { mount } for pid=5933 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.165424][ T5933] cgroup: Unknown subsys name 'net' [ 63.172253][ T40] audit: type=1400 audit(1772051230.197:67): avc: denied { unmount } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.307926][ T5933] cgroup: Unknown subsys name 'cpuset' [ 63.314752][ T5933] cgroup: Unknown subsys name 'rlimit' [ 63.522457][ T40] audit: type=1400 audit(1772051230.547:68): avc: denied { setattr } for pid=5933 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.530091][ T40] audit: type=1400 audit(1772051230.547:69): avc: denied { create } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.536694][ T40] audit: type=1400 audit(1772051230.557:70): avc: denied { write } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.543196][ T40] audit: type=1400 audit(1772051230.557:71): avc: denied { read } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.589488][ T5936] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 64.393876][ T5933] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.246487][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 66.246500][ T40] audit: type=1400 audit(1772051233.277:82): avc: denied { execmem } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.254503][ T40] audit: type=1400 audit(1772051233.277:83): avc: denied { create } for pid=5941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 66.260494][ T40] audit: type=1400 audit(1772051233.277:84): avc: denied { read write } for pid=5941 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 66.267951][ T40] audit: type=1400 audit(1772051233.277:85): avc: denied { open } for pid=5941 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 66.271090][ T5287] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 66.275323][ T40] audit: type=1400 audit(1772051233.287:86): avc: denied { ioctl } for pid=5941 comm="syz-executor" path="socket:[1679]" dev="sockfs" ino=1679 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 66.278055][ T5287] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 66.288710][ T5287] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 66.292573][ T5287] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 66.296170][ T5287] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 66.303950][ T40] audit: type=1400 audit(1772051233.337:87): avc: denied { read } for pid=5941 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.312653][ T40] audit: type=1400 audit(1772051233.337:88): avc: denied { open } for pid=5941 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.322446][ T40] audit: type=1400 audit(1772051233.337:89): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.365842][ T40] audit: type=1400 audit(1772051233.397:90): avc: denied { mount } for pid=5941 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.380060][ T40] audit: type=1400 audit(1772051233.407:91): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/syzkaller.iQCaXC/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 66.401422][ T5941] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 66.649459][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.652014][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.665644][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.668116][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.052823][ T5966] chnl_net:caif_netlink_parms(): no params data found [ 67.102559][ T5966] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.108584][ T5966] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.110917][ T5966] bridge_slave_0: entered allmulticast mode [ 67.115170][ T5966] bridge_slave_0: entered promiscuous mode [ 67.124987][ T5966] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.127265][ T5966] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.129565][ T5966] bridge_slave_1: entered allmulticast mode [ 67.132220][ T5966] bridge_slave_1: entered promiscuous mode [ 67.150592][ T5966] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.154956][ T5966] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.173141][ T5966] team0: Port device team_slave_0 added [ 67.177206][ T5966] team0: Port device team_slave_1 added [ 67.191844][ T5966] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.194066][ T5966] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.202379][ T5966] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.207327][ T5966] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.209495][ T5966] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.217655][ T5966] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.239957][ T5966] hsr_slave_0: entered promiscuous mode [ 67.242294][ T5966] hsr_slave_1: entered promiscuous mode [ 67.358821][ T5966] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 67.364708][ T5966] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 67.368596][ T5966] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 67.372690][ T5966] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 67.389226][ T5966] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.391535][ T5966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.394776][ T5966] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.397123][ T5966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.433891][ T5966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.447463][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.451431][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.458681][ T5966] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.466480][ T80] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.469670][ T80] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.477707][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.480442][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.591861][ T5966] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.615637][ T5966] veth0_vlan: entered promiscuous mode [ 67.620769][ T5966] veth1_vlan: entered promiscuous mode [ 67.637390][ T5966] veth0_macvtap: entered promiscuous mode [ 67.641328][ T5966] veth1_macvtap: entered promiscuous mode [ 67.651202][ T5966] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.659375][ T5966] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.669745][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.673659][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.677470][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.681095][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.777117][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.874668][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.957773][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.076780][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/25 20:27:16 executed programs: 0 [ 69.461052][ T5287] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.464599][ T5287] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.468206][ T5287] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.472543][ T5287] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.475609][ T5287] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.575288][ T6045] chnl_net:caif_netlink_parms(): no params data found [ 69.632433][ T6045] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.635717][ T6045] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.639096][ T6045] bridge_slave_0: entered allmulticast mode [ 69.643287][ T6045] bridge_slave_0: entered promiscuous mode [ 69.648204][ T6045] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.651775][ T6045] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.654974][ T6045] bridge_slave_1: entered allmulticast mode [ 69.659018][ T6045] bridge_slave_1: entered promiscuous mode [ 69.687738][ T6045] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.694651][ T6045] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.721332][ T6045] team0: Port device team_slave_0 added [ 69.726221][ T6045] team0: Port device team_slave_1 added [ 69.750787][ T6045] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.753902][ T6045] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.764747][ T6045] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.771032][ T6045] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.773668][ T6045] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.782803][ T6045] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.822447][ T6045] hsr_slave_0: entered promiscuous mode [ 69.825612][ T6045] hsr_slave_1: entered promiscuous mode [ 69.828626][ T6045] debugfs: 'hsr0' already exists in 'hsr' [ 69.831096][ T6045] Cannot create hsr debugfs directory [ 71.304692][ T12] bridge_slave_1: left allmulticast mode [ 71.306740][ T12] bridge_slave_1: left promiscuous mode [ 71.309048][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.315188][ T12] bridge_slave_0: left allmulticast mode [ 71.317173][ T12] bridge_slave_0: left promiscuous mode [ 71.319121][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.343219][ T40] kauditd_printk_skb: 22 callbacks suppressed [ 71.343229][ T40] audit: type=1400 audit(1772051238.367:114): avc: denied { create } for pid=6054 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.352541][ T40] audit: type=1400 audit(1772051238.367:115): avc: denied { write } for pid=6054 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.360762][ T40] audit: type=1400 audit(1772051238.367:116): avc: denied { append } for pid=6054 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.387692][ T40] audit: type=1400 audit(1772051238.417:117): avc: denied { unlink } for pid=6057 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.494009][ T5287] Bluetooth: hci0: command tx timeout [ 71.501139][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 71.510767][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 71.515579][ T12] bond0 (unregistering): Released all slaves [ 71.725817][ T12] hsr_slave_0: left promiscuous mode [ 71.728593][ T12] hsr_slave_1: left promiscuous mode [ 71.731153][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 71.734027][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 71.737629][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 71.740580][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 71.751765][ T12] veth1_macvtap: left promiscuous mode [ 71.754204][ T12] veth0_macvtap: left promiscuous mode [ 71.756206][ T12] veth1_vlan: left promiscuous mode [ 71.758176][ T12] veth0_vlan: left promiscuous mode [ 71.882928][ T12] team0 (unregistering): Port device team_slave_1 removed [ 71.891349][ T12] team0 (unregistering): Port device team_slave_0 removed [ 72.264860][ T6045] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.269100][ T6045] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.273296][ T6045] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.277410][ T6045] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.332656][ T6045] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.340880][ T6045] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.348498][ T80] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.351182][ T80] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.358325][ T61] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.360530][ T61] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.751820][ T6045] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.776472][ T6045] veth0_vlan: entered promiscuous mode [ 72.781483][ T6045] veth1_vlan: entered promiscuous mode [ 72.799900][ T6045] veth0_macvtap: entered promiscuous mode [ 72.804586][ T6045] veth1_macvtap: entered promiscuous mode [ 72.817060][ T6045] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.828486][ T6045] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.838263][ T80] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.845667][ T194] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.850107][ T194] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.857034][ T194] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.966476][ T1227] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.970663][ T1227] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.986809][ T1227] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.990241][ T1227] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.037406][ T40] audit: type=1404 audit(1772051240.067:118): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 73.056421][ T40] audit: type=1400 audit(1772051240.087:119): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.084658][ T40] audit: type=1400 audit(1772051240.117:120): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.101421][ T40] audit: type=1400 audit(1772051240.127:121): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.114986][ T40] audit: type=1400 audit(1772051240.147:122): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.130262][ T40] audit: type=1400 audit(1772051240.157:123): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.573177][ T5287] Bluetooth: hci0: command tx timeout [ 75.663093][ T5287] Bluetooth: hci0: command tx timeout [ 76.361524][ T40] kauditd_printk_skb: 176 callbacks suppressed [ 76.361536][ T40] audit: type=1400 audit(1772051243.387:300): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.373662][ T40] audit: type=1400 audit(1772051243.407:301): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.387159][ T40] audit: type=1400 audit(1772051243.417:302): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.424415][ T40] audit: type=1400 audit(1772051243.457:303): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.441299][ T40] audit: type=1400 audit(1772051243.467:304): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.455612][ T40] audit: type=1400 audit(1772051243.487:305): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.485985][ T40] audit: type=1400 audit(1772051243.517:306): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.501499][ T40] audit: type=1400 audit(1772051243.527:307): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.516226][ T40] audit: type=1400 audit(1772051243.547:308): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.542003][ T40] audit: type=1400 audit(1772051243.567:309): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.707062][ T1417] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.709700][ T1417] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.743103][ T5287] Bluetooth: hci0: command tx timeout [ 81.367133][ T40] kauditd_printk_skb: 261 callbacks suppressed [ 81.367145][ T40] audit: type=1400 audit(1772051248.397:571): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.380005][ T40] audit: type=1400 audit(1772051248.407:572): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.390994][ T40] audit: type=1400 audit(1772051248.417:573): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.423359][ T40] audit: type=1400 audit(1772051248.457:574): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.438001][ T40] audit: type=1400 audit(1772051248.467:575): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.452701][ T40] audit: type=1400 audit(1772051248.477:576): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.474568][ T40] audit: type=1400 audit(1772051248.507:577): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.486844][ T40] audit: type=1400 audit(1772051248.517:578): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.499045][ T40] audit: type=1400 audit(1772051248.527:579): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.523095][ T40] audit: type=1400 audit(1772051248.547:580): avc: denied { read write } for pid=6045 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.434537][ T80] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.541406][ T80] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.621442][ T80] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.704999][ T80] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.811491][ T80] bridge_slave_1: left allmulticast mode [ 84.813636][ T80] bridge_slave_1: left promiscuous mode [ 84.815547][ T80] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.821143][ T80] bridge_slave_0: left allmulticast mode [ 84.823914][ T80] bridge_slave_0: left promiscuous mode [ 84.827201][ T80] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.039520][ T80] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 85.045232][ T80] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 85.050276][ T80] bond0 (unregistering): Released all slaves [ 85.438137][ T80] hsr_slave_0: left promiscuous mode [ 85.441030][ T80] hsr_slave_1: left promiscuous mode [ 85.443438][ T80] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 85.446449][ T80] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 85.449409][ T80] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 85.451883][ T80] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 85.457647][ T80] veth1_macvtap: left promiscuous mode [ 85.459512][ T80] veth0_macvtap: left promiscuous mode [ 85.461399][ T80] veth1_vlan: left promiscuous mode [ 85.463197][ T80] veth0_vlan: left promiscuous mode [ 85.601884][ T80] team0 (unregistering): Port device team_slave_1 removed [ 85.614939][ T80] team0 (unregistering): Port device team_slave_0 removed [ 86.373320][ T40] kauditd_printk_skb: 11823 callbacks suppressed [ 86.373332][ T40] audit: type=1400 audit(1772051253.397:12404): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.382721][ T40] audit: type=1400 audit(1772051253.407:12405): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.388994][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 86.389611][ T40] audit: type=1400 audit(1772051253.407:12406): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.391617][ T5638] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 86.399745][ T40] audit: type=1400 audit(1772051253.407:12407): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.401982][ T5638] audit: backlog limit exceeded [ 86.402273][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 86.411761][ T40] audit: type=1400 audit(1772051253.407:12408): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.412178][ T5638] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 86.944210][ T10] cfg80211: failed to load regulatory.db [ 91.383127][ T40] kauditd_printk_skb: 39376 callbacks suppressed [ 91.383140][ T40] audit: type=1400 audit(1772051258.407:51784): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.391591][ T40] audit: type=1400 audit(1772051258.417:51785): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.398569][ T40] audit: type=1400 audit(1772051258.417:51786): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.405076][ T40] audit: type=1400 audit(1772051258.417:51787): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.405347][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 91.411703][ T40] audit: type=1400 audit(1772051258.417:51788): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.414004][ T5638] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 91.420422][ T40] audit: type=1400 audit(1772051258.417:51789): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.423306][ T5638] audit: backlog limit exceeded [ 91.430046][ T40] audit: type=1400 audit(1772051258.417:51790): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.393146][ T40] kauditd_printk_skb: 41053 callbacks suppressed [ 96.393189][ T40] audit: type=1400 audit(1772051263.417:91962): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.402301][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 96.404538][ T40] audit: type=1400 audit(1772051263.427:91963): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.406642][ T5638] audit: audit_lost=298 audit_rate_limit=0 audit_backlog_limit=64 [ 96.414764][ T40] audit: type=1400 audit(1772051263.427:91964): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.417340][ T5638] audit: backlog limit exceeded [ 96.425887][ T40] audit: type=1400 audit(1772051263.427:91965): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.428776][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 96.436542][ T40] audit: type=1400 audit(1772051263.427:91966): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.439315][ T5638] audit: audit_lost=299 audit_rate_limit=0 audit_backlog_limit=64 [ 101.403012][ T40] kauditd_printk_skb: 41245 callbacks suppressed [ 101.403024][ T40] audit: type=1400 audit(1772051268.427:132617): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.413178][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 101.414219][ T40] audit: type=1400 audit(1772051268.437:132618): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.416628][ T5638] audit: audit_lost=498 audit_rate_limit=0 audit_backlog_limit=64 [ 101.425010][ T40] audit: type=1400 audit(1772051268.437:132619): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.428186][ T5638] audit: backlog limit exceeded [ 101.437094][ T40] audit: type=1400 audit(1772051268.437:132620): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.439746][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 101.448046][ T40] audit: type=1400 audit(1772051268.437:132621): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.448086][ T40] audit: type=1400 audit(1772051268.437:132622): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0