Warning: Permanently added '[localhost]:9141' (ED25519) to the list of known hosts. [ 58.498453][ T40] audit: type=1400 audit(1769891022.539:62): avc: denied { execute } for pid=5929 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 58.505808][ T40] audit: type=1400 audit(1769891022.549:63): avc: denied { execute_no_trans } for pid=5929 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/01/31 20:23:43 parsed 1 programs [ 59.713913][ T40] audit: type=1400 audit(1769891023.749:64): avc: denied { node_bind } for pid=5929 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 61.715633][ T40] audit: type=1400 audit(1769891025.759:65): avc: denied { mounton } for pid=5940 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 61.723381][ T40] audit: type=1400 audit(1769891025.759:66): avc: denied { mount } for pid=5940 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.725217][ T5940] cgroup: Unknown subsys name 'net' [ 61.733780][ T40] audit: type=1400 audit(1769891025.769:67): avc: denied { unmount } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.898073][ T5940] cgroup: Unknown subsys name 'cpuset' [ 61.904142][ T5940] cgroup: Unknown subsys name 'rlimit' [ 62.049779][ T40] audit: type=1400 audit(1769891026.089:68): avc: denied { setattr } for pid=5940 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 62.060944][ T40] audit: type=1400 audit(1769891026.089:69): avc: denied { create } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.068856][ T40] audit: type=1400 audit(1769891026.089:70): avc: denied { write } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.082422][ T40] audit: type=1400 audit(1769891026.089:71): avc: denied { read } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.098992][ T5942] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 62.807912][ T5940] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 64.384439][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 64.384455][ T40] audit: type=1400 audit(1769891028.429:82): avc: denied { execmem } for pid=5947 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 64.395342][ T40] audit: type=1400 audit(1769891028.429:83): avc: denied { read } for pid=5948 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 64.404282][ T40] audit: type=1400 audit(1769891028.429:84): avc: denied { open } for pid=5948 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 64.412590][ T40] audit: type=1400 audit(1769891028.429:85): avc: denied { mounton } for pid=5948 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 64.445224][ T40] audit: type=1400 audit(1769891028.489:86): avc: denied { mount } for pid=5948 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 64.452080][ T40] audit: type=1400 audit(1769891028.489:87): avc: denied { mounton } for pid=5948 comm="syz-executor" path="/syzkaller.FjmF0t/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 64.460409][ T40] audit: type=1400 audit(1769891028.489:88): avc: denied { mount } for pid=5948 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 64.467370][ T40] audit: type=1400 audit(1769891028.489:89): avc: denied { mounton } for pid=5948 comm="syz-executor" path="/syzkaller.FjmF0t/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 64.475672][ T40] audit: type=1400 audit(1769891028.489:90): avc: denied { mounton } for pid=5948 comm="syz-executor" path="/syzkaller.FjmF0t/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 64.484198][ T40] audit: type=1400 audit(1769891028.499:91): avc: denied { unmount } for pid=5948 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 64.493361][ T5948] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 64.623115][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.632029][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.649425][ T1144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.651886][ T1144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.326902][ T5981] chnl_net:caif_netlink_parms(): no params data found [ 65.370659][ T5981] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.372886][ T5981] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.377306][ T5981] bridge_slave_0: entered allmulticast mode [ 65.379999][ T5981] bridge_slave_0: entered promiscuous mode [ 65.384585][ T5981] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.387239][ T5981] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.389518][ T5981] bridge_slave_1: entered allmulticast mode [ 65.392208][ T5981] bridge_slave_1: entered promiscuous mode [ 65.419072][ T5981] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.424629][ T5981] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.440272][ T5981] team0: Port device team_slave_0 added [ 65.443431][ T5981] team0: Port device team_slave_1 added [ 65.456620][ T5981] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.458839][ T5981] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.467025][ T5981] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.471840][ T5981] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.474200][ T5981] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.482217][ T5981] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.515869][ T5981] hsr_slave_0: entered promiscuous mode [ 65.519104][ T5981] hsr_slave_1: entered promiscuous mode [ 65.615778][ T5981] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 65.679599][ T5981] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 65.686201][ T5981] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 65.690282][ T5981] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 65.730246][ T5981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.750320][ T5981] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.760191][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.762589][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.769779][ T1144] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.772098][ T1144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.875404][ T5981] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.897680][ T5981] veth0_vlan: entered promiscuous mode [ 65.902630][ T5981] veth1_vlan: entered promiscuous mode [ 65.917525][ T5981] veth0_macvtap: entered promiscuous mode [ 65.921234][ T5981] veth1_macvtap: entered promiscuous mode [ 65.931194][ T5981] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.937530][ T5981] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.944488][ T62] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.947591][ T62] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.951014][ T62] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.954464][ T62] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.026675][ T62] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.084175][ T62] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.152771][ T62] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.244667][ T62] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.344137][ T6015] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 66.347331][ T6015] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 66.350161][ T6015] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 66.353323][ T6015] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 66.357876][ T6015] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/01/31 20:23:51 executed programs: 0 [ 67.310028][ T6015] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.314293][ T6015] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.317176][ T6015] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.320045][ T6015] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.322523][ T6015] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.450154][ T6048] chnl_net:caif_netlink_parms(): no params data found [ 67.498443][ T6048] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.501261][ T6048] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.504352][ T6048] bridge_slave_0: entered allmulticast mode [ 67.508251][ T6048] bridge_slave_0: entered promiscuous mode [ 67.513623][ T6048] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.516235][ T6048] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.518913][ T6048] bridge_slave_1: entered allmulticast mode [ 67.522088][ T6048] bridge_slave_1: entered promiscuous mode [ 67.541070][ T6048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.545913][ T6048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.562207][ T6048] team0: Port device team_slave_0 added [ 67.565608][ T6048] team0: Port device team_slave_1 added [ 67.578281][ T6048] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.580489][ T6048] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.588574][ T6048] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.592708][ T6048] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.595048][ T6048] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.602830][ T6048] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.625488][ T6048] hsr_slave_0: entered promiscuous mode [ 67.627680][ T6048] hsr_slave_1: entered promiscuous mode [ 67.629686][ T6048] debugfs: 'hsr0' already exists in 'hsr' [ 67.631535][ T6048] Cannot create hsr debugfs directory [ 69.334443][ T6015] Bluetooth: hci0: command tx timeout [ 69.501336][ T62] bridge_slave_1: left allmulticast mode [ 69.503994][ T62] bridge_slave_1: left promiscuous mode [ 69.506992][ T62] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.515337][ T62] bridge_slave_0: left allmulticast mode [ 69.517745][ T62] bridge_slave_0: left promiscuous mode [ 69.520267][ T62] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.538315][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 69.538326][ T40] audit: type=1400 audit(1769891033.579:112): avc: denied { create } for pid=6058 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 69.549521][ T40] audit: type=1400 audit(1769891033.579:113): avc: denied { write } for pid=6058 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 69.559758][ T40] audit: type=1400 audit(1769891033.579:114): avc: denied { append } for pid=6058 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 69.584267][ T40] audit: type=1400 audit(1769891033.629:115): avc: denied { unlink } for pid=6062 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 69.791213][ T62] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 69.795473][ T62] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 69.799246][ T62] bond0 (unregistering): Released all slaves [ 69.981257][ T62] hsr_slave_0: left promiscuous mode [ 69.984406][ T62] hsr_slave_1: left promiscuous mode [ 69.987242][ T62] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 69.990296][ T62] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 69.993276][ T62] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 69.998831][ T62] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 70.011921][ T62] veth1_macvtap: left promiscuous mode [ 70.016875][ T62] veth0_macvtap: left promiscuous mode [ 70.019052][ T62] veth1_vlan: left promiscuous mode [ 70.021401][ T62] veth0_vlan: left promiscuous mode [ 70.242725][ T62] team0 (unregistering): Port device team_slave_1 removed [ 70.262302][ T62] team0 (unregistering): Port device team_slave_0 removed [ 70.733714][ T6048] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 70.739305][ T6048] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 70.743391][ T6048] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 70.747993][ T6048] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 70.804081][ T6048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.815167][ T6048] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.821839][ T1144] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.824839][ T1144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.832848][ T1144] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.835892][ T1144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.954279][ T6048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.980451][ T6048] veth0_vlan: entered promiscuous mode [ 70.985679][ T6048] veth1_vlan: entered promiscuous mode [ 70.999121][ T6048] veth0_macvtap: entered promiscuous mode [ 71.178298][ T6048] veth1_macvtap: entered promiscuous mode [ 71.186360][ T6048] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.193050][ T6048] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.201672][ T46] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.204974][ T46] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.208768][ T46] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.211568][ T46] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.290962][ T46] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 71.300017][ T46] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 71.332115][ T46] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 71.335283][ T46] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 71.394246][ T40] audit: type=1404 audit(1769891035.429:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 71.414048][ T6015] Bluetooth: hci0: command tx timeout [ 71.428194][ T40] audit: type=1400 audit(1769891035.469:117): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.446047][ T40] audit: type=1400 audit(1769891035.489:118): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.457874][ T40] audit: type=1400 audit(1769891035.499:119): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.488585][ T40] audit: type=1400 audit(1769891035.529:120): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.503586][ T40] audit: type=1400 audit(1769891035.539:121): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.493670][ T6015] Bluetooth: hci0: command tx timeout [ 74.549102][ T40] kauditd_printk_skb: 171 callbacks suppressed [ 74.549114][ T40] audit: type=1400 audit(1769891038.589:293): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.560597][ T40] audit: type=1400 audit(1769891038.599:294): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.587466][ T40] audit: type=1400 audit(1769891038.629:295): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.606149][ T40] audit: type=1400 audit(1769891038.649:296): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.614883][ T40] audit: type=1400 audit(1769891038.659:297): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.644879][ T40] audit: type=1400 audit(1769891038.689:298): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.658927][ T40] audit: type=1400 audit(1769891038.699:299): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.671443][ T40] audit: type=1400 audit(1769891038.709:300): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.704742][ T40] audit: type=1400 audit(1769891038.749:301): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.715625][ T40] audit: type=1400 audit(1769891038.759:302): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.573734][ T6015] Bluetooth: hci0: command tx timeout [ 76.217361][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.219401][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 79.557816][ T40] kauditd_printk_skb: 265 callbacks suppressed [ 79.557829][ T40] audit: type=1400 audit(1769891043.599:568): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.603921][ T40] audit: type=1400 audit(1769891043.649:569): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.617198][ T40] audit: type=1400 audit(1769891043.659:570): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.626457][ T40] audit: type=1400 audit(1769891043.669:571): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.663427][ T40] audit: type=1400 audit(1769891043.699:572): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.672974][ T40] audit: type=1400 audit(1769891043.709:573): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.681710][ T40] audit: type=1400 audit(1769891043.719:574): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.721545][ T40] audit: type=1400 audit(1769891043.759:575): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.731797][ T40] audit: type=1400 audit(1769891043.769:576): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.742314][ T40] audit: type=1400 audit(1769891043.779:577): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.566579][ T1144] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.632412][ T1144] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.702747][ T1144] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.773056][ T1144] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.886241][ T1144] bridge_slave_1: left allmulticast mode [ 82.888126][ T1144] bridge_slave_1: left promiscuous mode [ 82.890025][ T1144] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.898088][ T1144] bridge_slave_0: left allmulticast mode [ 82.900493][ T1144] bridge_slave_0: left promiscuous mode [ 82.902959][ T1144] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.141497][ T1144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 83.145781][ T1144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 83.149633][ T1144] bond0 (unregistering): Released all slaves [ 83.534793][ T1144] hsr_slave_0: left promiscuous mode [ 83.536939][ T1144] hsr_slave_1: left promiscuous mode [ 83.538961][ T1144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 83.541274][ T1144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 83.544081][ T1144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 83.546525][ T1144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 83.554840][ T1144] veth1_macvtap: left promiscuous mode [ 83.556640][ T1144] veth0_macvtap: left promiscuous mode [ 83.558456][ T1144] veth1_vlan: left promiscuous mode [ 83.560209][ T1144] veth0_vlan: left promiscuous mode [ 83.755802][ T1144] team0 (unregistering): Port device team_slave_1 removed [ 83.771634][ T1144] team0 (unregistering): Port device team_slave_0 removed [ 84.563600][ T40] kauditd_printk_skb: 14238 callbacks suppressed [ 84.563619][ T40] audit: type=1400 audit(1769891048.609:14594): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.575361][ T40] audit: type=1400 audit(1769891048.609:14595): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.581098][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.582007][ T40] audit: type=1400 audit(1769891048.609:14596): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.584244][ T5645] audit: audit_lost=75 audit_rate_limit=0 audit_backlog_limit=64 [ 84.590941][ T40] audit: type=1400 audit(1769891048.609:14597): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.593314][ T5645] audit: backlog limit exceeded [ 84.601968][ T40] audit: type=1400 audit(1769891048.609:14598): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 84.603882][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 84.610337][ T40] audit: type=1400 audit(1769891048.609:14599): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.454999][ T60] cfg80211: failed to load regulatory.db [ 89.573533][ T40] kauditd_printk_skb: 50056 callbacks suppressed [ 89.573545][ T40] audit: type=1400 audit(1769891053.609:64078): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.579264][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.582094][ T40] audit: type=1400 audit(1769891053.619:64079): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.584276][ T5645] audit: audit_lost=269 audit_rate_limit=0 audit_backlog_limit=64 [ 89.592177][ T40] audit: type=1400 audit(1769891053.619:64080): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.593318][ T5645] audit: backlog limit exceeded [ 89.599902][ T40] audit: type=1400 audit(1769891053.619:64081): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.601785][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 89.608005][ T40] audit: type=1400 audit(1769891053.619:64082): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 89.610049][ T5645] audit: audit_lost=270 audit_rate_limit=0 audit_backlog_limit=64 [ 94.583561][ T40] kauditd_printk_skb: 47967 callbacks suppressed [ 94.583573][ T40] audit: type=1400 audit(1769891058.619:111008): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.590117][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.592270][ T40] audit: type=1400 audit(1769891058.629:111009): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.594213][ T5645] audit: audit_lost=618 audit_rate_limit=0 audit_backlog_limit=64 [ 94.594223][ T5645] audit: backlog limit exceeded [ 94.594383][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.600828][ T40] audit: type=1400 audit(1769891058.629:111010): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.603675][ T5645] audit: audit_lost=619 audit_rate_limit=0 audit_backlog_limit=64 [ 94.605254][ T40] audit: type=1400 audit(1769891058.629:111011): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.607436][ T5645] audit: backlog limit exceeded [ 99.593617][ T40] kauditd_printk_skb: 43156 callbacks suppressed [ 99.593633][ T40] audit: type=1400 audit(1769891063.639:152185): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.600280][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.602797][ T40] audit: type=1400 audit(1769891063.639:152186): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.604977][ T5645] audit: audit_lost=1281 audit_rate_limit=0 audit_backlog_limit=64 [ 99.604989][ T5645] audit: backlog limit exceeded [ 99.612430][ T40] audit: type=1400 audit(1769891063.639:152187): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.615314][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.616793][ T40] audit: type=1400 audit(1769891063.639:152188): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.623429][ T5645] audit: audit_lost=1282 audit_rate_limit=0 audit_backlog_limit=64 [ 99.625596][ T40] audit: type=1400 audit(1769891063.639:152189): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0