[ 52.896125][ T40] audit: type=1400 audit(1772492891.701:60): avc: denied { rlimitinh } for pid=5906 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 52.902803][ T40] audit: type=1400 audit(1772492891.701:61): avc: denied { siginh } for pid=5906 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:40230' (ED25519) to the list of known hosts. [ 58.957666][ T40] audit: type=1400 audit(1772492897.781:62): avc: denied { execute } for pid=5926 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 58.966194][ T40] audit: type=1400 audit(1772492897.781:63): avc: denied { execute_no_trans } for pid=5926 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/03/02 23:08:19 parsed 1 programs [ 60.246122][ T40] audit: type=1400 audit(1772492899.071:64): avc: denied { node_bind } for pid=5926 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 62.506275][ T40] audit: type=1400 audit(1772492901.331:65): avc: denied { mounton } for pid=5936 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 62.516694][ T40] audit: type=1400 audit(1772492901.341:66): avc: denied { mount } for pid=5936 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.518443][ T5936] cgroup: Unknown subsys name 'net' [ 62.530449][ T40] audit: type=1400 audit(1772492901.361:67): avc: denied { unmount } for pid=5936 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.663717][ T5936] cgroup: Unknown subsys name 'cpuset' [ 62.670189][ T5936] cgroup: Unknown subsys name 'rlimit' [ 62.865493][ T40] audit: type=1400 audit(1772492901.691:68): avc: denied { setattr } for pid=5936 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 62.874000][ T40] audit: type=1400 audit(1772492901.691:69): avc: denied { create } for pid=5936 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.881972][ T40] audit: type=1400 audit(1772492901.691:70): avc: denied { write } for pid=5936 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.890729][ T40] audit: type=1400 audit(1772492901.691:71): avc: denied { read } for pid=5936 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.915276][ T5939] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 63.563075][ T5936] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 65.099479][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 65.099492][ T40] audit: type=1400 audit(1772492903.931:82): avc: denied { execmem } for pid=5943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 65.107364][ T40] audit: type=1400 audit(1772492903.931:83): avc: denied { read } for pid=5944 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.114094][ T40] audit: type=1400 audit(1772492903.931:84): avc: denied { open } for pid=5944 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.121801][ T40] audit: type=1400 audit(1772492903.931:85): avc: denied { mounton } for pid=5944 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 65.173197][ T40] audit: type=1400 audit(1772492904.001:86): avc: denied { module_request } for pid=5944 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 65.191446][ T5944] chnl_net:caif_netlink_parms(): no params data found [ 65.237970][ T5944] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.240886][ T5944] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.243234][ T5944] bridge_slave_0: entered allmulticast mode [ 65.245977][ T5944] bridge_slave_0: entered promiscuous mode [ 65.250126][ T5944] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.252723][ T5944] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.254991][ T5944] bridge_slave_1: entered allmulticast mode [ 65.257740][ T5944] bridge_slave_1: entered promiscuous mode [ 65.273762][ T5944] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.278163][ T5944] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.294588][ T5944] team0: Port device team_slave_0 added [ 65.297758][ T5944] team0: Port device team_slave_1 added [ 65.311222][ T5944] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.313438][ T5944] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.321512][ T5944] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.326186][ T5944] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.328414][ T5944] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.336458][ T5944] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.360682][ T5944] hsr_slave_0: entered promiscuous mode [ 65.362969][ T5944] hsr_slave_1: entered promiscuous mode [ 65.458865][ T5944] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 65.464603][ T5944] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 65.468838][ T5944] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 65.473484][ T5944] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 65.490627][ T5944] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.493029][ T5944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.495833][ T5944] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.498210][ T5944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.533220][ T5944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.543115][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.546178][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.552722][ T5944] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.558442][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.560937][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.567268][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.569701][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.628180][ T40] audit: type=1400 audit(1772492904.451:87): avc: denied { sys_module } for pid=5944 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 65.703749][ T5944] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.734094][ T5944] veth0_vlan: entered promiscuous mode [ 65.743035][ T5944] veth1_vlan: entered promiscuous mode [ 65.769749][ T5944] veth0_macvtap: entered promiscuous mode [ 65.775609][ T5944] veth1_macvtap: entered promiscuous mode [ 65.791950][ T5944] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.800990][ T5944] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.812212][ T1142] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.815316][ T1142] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.818787][ T1142] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.821852][ T1142] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.841989][ T40] audit: type=1400 audit(1772492904.671:88): avc: denied { mount } for pid=5944 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 65.852728][ T40] audit: type=1400 audit(1772492904.671:89): avc: denied { mounton } for pid=5944 comm="syz-executor" path="/syzkaller.h2ZPEb/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 65.863762][ T40] audit: type=1400 audit(1772492904.671:90): avc: denied { mount } for pid=5944 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 65.873789][ T40] audit: type=1400 audit(1772492904.671:91): avc: denied { mounton } for pid=5944 comm="syz-executor" path="/syzkaller.h2ZPEb/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 65.886671][ T5944] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 65.945638][ T13] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.039306][ T13] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.134147][ T13] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.228196][ T13] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.398324][ T63] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 66.402323][ T63] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 66.404964][ T63] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 66.407292][ T63] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 66.410119][ T63] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.029363][ T60] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.033117][ T60] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.060065][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.063805][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 2026/03/02 23:08:26 executed programs: 0 [ 68.035033][ T5284] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 68.038174][ T5284] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 68.041178][ T5284] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 68.043918][ T5284] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 68.046593][ T5284] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 68.168080][ T6043] chnl_net:caif_netlink_parms(): no params data found [ 68.212620][ T6043] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.215359][ T6043] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.218021][ T6043] bridge_slave_0: entered allmulticast mode [ 68.221120][ T6043] bridge_slave_0: entered promiscuous mode [ 68.224490][ T6043] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.227092][ T6043] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.230079][ T6043] bridge_slave_1: entered allmulticast mode [ 68.233648][ T6043] bridge_slave_1: entered promiscuous mode [ 68.250085][ T6043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.254727][ T6043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.275401][ T6043] team0: Port device team_slave_0 added [ 68.278646][ T6043] team0: Port device team_slave_1 added [ 68.296703][ T6043] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.298995][ T6043] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.307359][ T6043] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.312203][ T6043] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.314398][ T6043] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.324737][ T6043] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.355824][ T6043] hsr_slave_0: entered promiscuous mode [ 68.358114][ T6043] hsr_slave_1: entered promiscuous mode [ 68.360402][ T6043] debugfs: 'hsr0' already exists in 'hsr' [ 68.362276][ T6043] Cannot create hsr debugfs directory [ 68.842885][ T13] bridge_slave_1: left allmulticast mode [ 68.844965][ T13] bridge_slave_1: left promiscuous mode [ 68.847272][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.853388][ T13] bridge_slave_0: left allmulticast mode [ 68.855180][ T13] bridge_slave_0: left promiscuous mode [ 68.857067][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.987082][ T13] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 68.993675][ T13] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 68.998873][ T13] bond0 (unregistering): Released all slaves [ 69.183417][ T13] hsr_slave_0: left promiscuous mode [ 69.186556][ T13] hsr_slave_1: left promiscuous mode [ 69.189635][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 69.192830][ T13] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 69.196789][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 69.200233][ T13] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 69.209757][ T13] veth1_macvtap: left promiscuous mode [ 69.212449][ T13] veth0_macvtap: left promiscuous mode [ 69.214497][ T13] veth1_vlan: left promiscuous mode [ 69.216812][ T13] veth0_vlan: left promiscuous mode [ 69.332693][ T13] team0 (unregistering): Port device team_slave_1 removed [ 69.339241][ T13] team0 (unregistering): Port device team_slave_0 removed [ 69.793140][ T6043] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 69.797630][ T6043] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 69.801676][ T6043] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 69.805672][ T6043] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 69.855701][ T6043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.864374][ T6043] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.869380][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.871842][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.878785][ T1142] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.882014][ T1142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.994592][ T6043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.121024][ T63] Bluetooth: hci0: command tx timeout [ 70.311615][ T6043] veth0_vlan: entered promiscuous mode [ 70.318446][ T6043] veth1_vlan: entered promiscuous mode [ 70.336259][ T6043] veth0_macvtap: entered promiscuous mode [ 70.340695][ T6043] veth1_macvtap: entered promiscuous mode [ 70.348813][ T6043] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 70.367235][ T6043] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 70.378889][ T102] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.382603][ T102] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.387676][ T102] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.392151][ T102] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.454605][ T43] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 70.457216][ T43] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 70.480747][ T43] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 70.483409][ T43] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 70.519614][ T40] kauditd_printk_skb: 24 callbacks suppressed [ 70.519651][ T40] audit: type=1404 audit(1772492909.341:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 70.540260][ T40] audit: type=1400 audit(1772492909.371:117): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.573337][ T40] audit: type=1400 audit(1772492909.401:118): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.595275][ T40] audit: type=1400 audit(1772492909.421:119): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.605664][ T40] audit: type=1400 audit(1772492909.441:120): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.615885][ T40] audit: type=1400 audit(1772492909.451:121): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.657136][ T40] audit: type=1400 audit(1772492909.481:122): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.667838][ T40] audit: type=1400 audit(1772492909.501:123): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.687250][ T40] audit: type=1400 audit(1772492909.511:124): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.708734][ T40] audit: type=1400 audit(1772492909.531:125): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.199680][ T63] Bluetooth: hci0: command tx timeout [ 74.279395][ T63] Bluetooth: hci0: command tx timeout [ 75.539558][ T40] kauditd_printk_skb: 259 callbacks suppressed [ 75.539570][ T40] audit: type=1400 audit(1772492914.371:385): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.551173][ T40] audit: type=1400 audit(1772492914.381:386): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.563886][ T40] audit: type=1400 audit(1772492914.391:387): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.598028][ T40] audit: type=1400 audit(1772492914.421:388): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.612476][ T40] audit: type=1400 audit(1772492914.441:389): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.624920][ T40] audit: type=1400 audit(1772492914.451:390): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.661235][ T40] audit: type=1400 audit(1772492914.491:391): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.673981][ T40] audit: type=1400 audit(1772492914.501:392): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.685886][ T40] audit: type=1400 audit(1772492914.511:393): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.710980][ T40] audit: type=1400 audit(1772492914.541:394): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.359906][ T63] Bluetooth: hci0: command tx timeout [ 76.363314][ T1417] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.365774][ T1417] ieee802154 phy1 wpan1: encryption failed: -22 [ 80.577959][ T40] kauditd_printk_skb: 258 callbacks suppressed [ 80.577975][ T40] audit: type=1400 audit(1772492919.401:653): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.589515][ T40] audit: type=1400 audit(1772492919.411:654): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.602726][ T40] audit: type=1400 audit(1772492919.431:655): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.638137][ T40] audit: type=1400 audit(1772492919.461:656): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.653927][ T40] audit: type=1400 audit(1772492919.481:657): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.663285][ T40] audit: type=1400 audit(1772492919.491:658): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.689588][ T40] audit: type=1400 audit(1772492919.521:659): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.707973][ T40] audit: type=1400 audit(1772492919.531:660): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.717171][ T40] audit: type=1400 audit(1772492919.551:661): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.748932][ T40] audit: type=1400 audit(1772492919.571:662): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.083577][ T1158] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.260813][ T1158] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.327670][ T1158] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.418686][ T1158] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.504641][ T1158] bridge_slave_1: left allmulticast mode [ 82.507383][ T1158] bridge_slave_1: left promiscuous mode [ 82.510373][ T1158] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.515111][ T1158] bridge_slave_0: left allmulticast mode [ 82.517302][ T1158] bridge_slave_0: left promiscuous mode [ 82.520926][ T1158] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.665559][ T1158] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 82.672704][ T1158] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 82.677762][ T1158] bond0 (unregistering): Released all slaves [ 83.098508][ T1158] hsr_slave_0: left promiscuous mode [ 83.100949][ T1158] hsr_slave_1: left promiscuous mode [ 83.103139][ T1158] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 83.105748][ T1158] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 83.110313][ T1158] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 83.113530][ T1158] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 83.119405][ T1158] veth1_macvtap: left promiscuous mode [ 83.121252][ T1158] veth0_macvtap: left promiscuous mode [ 83.123088][ T1158] veth1_vlan: left promiscuous mode [ 83.125059][ T1158] veth0_vlan: left promiscuous mode [ 83.284818][ T1158] team0 (unregistering): Port device team_slave_1 removed [ 83.296953][ T1158] team0 (unregistering): Port device team_slave_0 removed [ 85.579809][ T40] kauditd_printk_skb: 21557 callbacks suppressed [ 85.579826][ T40] audit: type=1400 audit(1772492924.411:22220): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.590467][ T40] audit: type=1400 audit(1772492924.411:22221): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.592262][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 85.597716][ T40] audit: type=1400 audit(1772492924.411:22222): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.600756][ T5636] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 85.600777][ T5636] audit: backlog limit exceeded [ 85.609463][ T40] audit: type=1400 audit(1772492924.411:22223): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.613117][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 85.615005][ T40] audit: type=1400 audit(1772492924.411:22224): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.624281][ T5636] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 86.609911][ T24] cfg80211: failed to load regulatory.db [ 90.589061][ T40] kauditd_printk_skb: 36611 callbacks suppressed [ 90.589076][ T40] audit: type=1400 audit(1772492929.411:58511): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.601055][ T40] audit: type=1400 audit(1772492929.421:58512): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.601591][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.610188][ T40] audit: type=1400 audit(1772492929.421:58513): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.613107][ T5636] audit: audit_lost=111 audit_rate_limit=0 audit_backlog_limit=64 [ 90.622227][ T40] audit: type=1400 audit(1772492929.421:58514): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.625104][ T5636] audit: backlog limit exceeded [ 90.633906][ T40] audit: type=1400 audit(1772492929.421:58515): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.636893][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.645166][ T40] audit: type=1400 audit(1772492929.421:58516): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.599178][ T40] kauditd_printk_skb: 41484 callbacks suppressed [ 95.599196][ T40] audit: type=1400 audit(1772492934.421:99231): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.606056][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.608454][ T40] audit: type=1400 audit(1772492934.431:99232): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.610635][ T5636] audit: audit_lost=369 audit_rate_limit=0 audit_backlog_limit=64 [ 95.610647][ T5636] audit: backlog limit exceeded [ 95.610793][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.618098][ T40] audit: type=1400 audit(1772492934.431:99233): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.620438][ T5636] audit: audit_lost=370 audit_rate_limit=0 audit_backlog_limit=64 [ 95.622446][ T40] audit: type=1400 audit(1772492934.431:99234): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.624534][ T5636] audit: backlog limit exceeded [ 100.609155][ T40] kauditd_printk_skb: 39642 callbacks suppressed [ 100.609167][ T40] audit: type=1400 audit(1772492939.431:138319): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.618178][ T40] audit: type=1400 audit(1772492939.441:138320): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.625381][ T40] audit: type=1400 audit(1772492939.441:138321): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.632757][ T40] audit: type=1400 audit(1772492939.441:138322): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.640065][ T40] audit: type=1400 audit(1772492939.441:138323): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.647155][ T40] audit: type=1400 audit(1772492939.441:138324): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.650185][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.654341][ T40] audit: type=1400 audit(1772492939.441:138325): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.656579][ T5636] audit: audit_lost=557 audit_rate_limit=0 audit_backlog_limit=64 [ 100.664430][ T40] audit: type=1400 audit(1772492939.441:138326): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0