[ 43.962007][ T40] audit: type=1400 audit(1772122337.769:60): avc: denied { rlimitinh } for pid=5829 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 43.968652][ T40] audit: type=1400 audit(1772122337.769:61): avc: denied { siginh } for pid=5829 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:38392' (ED25519) to the list of known hosts. [ 59.793910][ T40] audit: type=1400 audit(1772122353.629:62): avc: denied { execute } for pid=5922 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.802022][ T40] audit: type=1400 audit(1772122353.629:63): avc: denied { execute_no_trans } for pid=5922 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/26 16:12:35 parsed 1 programs [ 61.250845][ T40] audit: type=1400 audit(1772122355.089:64): avc: denied { node_bind } for pid=5922 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.565429][ T40] audit: type=1400 audit(1772122357.399:65): avc: denied { mounton } for pid=5932 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.574197][ T40] audit: type=1400 audit(1772122357.409:66): avc: denied { mount } for pid=5932 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.576374][ T5932] cgroup: Unknown subsys name 'net' [ 63.585690][ T40] audit: type=1400 audit(1772122357.429:67): avc: denied { unmount } for pid=5932 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.742404][ T5932] cgroup: Unknown subsys name 'cpuset' [ 63.746974][ T5932] cgroup: Unknown subsys name 'rlimit' [ 63.915831][ T40] audit: type=1400 audit(1772122357.749:68): avc: denied { setattr } for pid=5932 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.925032][ T40] audit: type=1400 audit(1772122357.769:69): avc: denied { create } for pid=5932 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.933697][ T40] audit: type=1400 audit(1772122357.769:70): avc: denied { write } for pid=5932 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.942458][ T40] audit: type=1400 audit(1772122357.769:71): avc: denied { read } for pid=5932 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.980498][ T5935] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 64.763498][ T5932] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.456156][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 66.456205][ T40] audit: type=1400 audit(1772122360.289:82): avc: denied { execmem } for pid=5945 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.465894][ T40] audit: type=1400 audit(1772122360.299:83): avc: denied { read } for pid=5946 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.475044][ T40] audit: type=1400 audit(1772122360.299:84): avc: denied { open } for pid=5946 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.482880][ T40] audit: type=1400 audit(1772122360.299:85): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.515829][ T40] audit: type=1400 audit(1772122360.349:86): avc: denied { mount } for pid=5946 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.525842][ T40] audit: type=1400 audit(1772122360.349:87): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/syzkaller.hDgMf2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 66.537246][ T40] audit: type=1400 audit(1772122360.359:88): avc: denied { mount } for pid=5946 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 66.544857][ T40] audit: type=1400 audit(1772122360.359:89): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/syzkaller.hDgMf2/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 66.553298][ T40] audit: type=1400 audit(1772122360.359:90): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/syzkaller.hDgMf2/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=5638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 66.562187][ T40] audit: type=1400 audit(1772122360.359:91): avc: denied { unmount } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 66.565932][ T5946] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 67.170112][ T5967] chnl_net:caif_netlink_parms(): no params data found [ 67.233298][ T5967] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.236943][ T5967] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.239608][ T5967] bridge_slave_0: entered allmulticast mode [ 67.242666][ T5967] bridge_slave_0: entered promiscuous mode [ 67.247810][ T5967] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.251026][ T5967] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.253603][ T5967] bridge_slave_1: entered allmulticast mode [ 67.256271][ T5967] bridge_slave_1: entered promiscuous mode [ 67.280109][ T5967] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.290388][ T5967] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.315585][ T5967] team0: Port device team_slave_0 added [ 67.320060][ T5967] team0: Port device team_slave_1 added [ 67.343815][ T5967] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.346676][ T5967] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.355042][ T5967] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.360516][ T5967] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.362789][ T5967] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.371915][ T5967] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.399207][ T5967] hsr_slave_0: entered promiscuous mode [ 67.402697][ T5967] hsr_slave_1: entered promiscuous mode [ 67.550577][ T5967] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 67.558055][ T5967] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 67.563049][ T5967] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 67.577545][ T5967] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 67.598329][ T5967] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.601128][ T5967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.604130][ T5967] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.606816][ T5967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.658531][ T5967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.669875][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.673301][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.683929][ T5967] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.692550][ T158] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.694872][ T158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.702015][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.704423][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.842918][ T5967] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.873666][ T5967] veth0_vlan: entered promiscuous mode [ 67.881220][ T5967] veth1_vlan: entered promiscuous mode [ 67.903839][ T5967] veth0_macvtap: entered promiscuous mode [ 67.908770][ T5967] veth1_macvtap: entered promiscuous mode [ 67.919844][ T5967] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.926787][ T5967] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.935584][ T158] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.939295][ T158] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.943406][ T158] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.946170][ T158] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.037500][ T222] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.112414][ T222] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.190901][ T222] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.272204][ T158] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.278506][ T158] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.289659][ T222] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.317136][ T46] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.319800][ T46] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.726960][ T63] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 68.733726][ T63] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 68.736813][ T63] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 68.740800][ T63] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 68.743713][ T63] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/02/26 16:12:43 executed programs: 0 [ 69.609539][ T5287] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.613178][ T5287] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.616375][ T5287] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.620277][ T5287] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.623062][ T5287] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.772220][ T6043] chnl_net:caif_netlink_parms(): no params data found [ 69.836583][ T6043] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.839577][ T6043] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.842896][ T6043] bridge_slave_0: entered allmulticast mode [ 69.845886][ T6043] bridge_slave_0: entered promiscuous mode [ 69.849382][ T6043] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.851795][ T6043] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.854228][ T6043] bridge_slave_1: entered allmulticast mode [ 69.857046][ T6043] bridge_slave_1: entered promiscuous mode [ 69.874749][ T6043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.879605][ T6043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.895547][ T6043] team0: Port device team_slave_0 added [ 69.899912][ T6043] team0: Port device team_slave_1 added [ 69.913834][ T6043] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.915998][ T6043] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.924298][ T6043] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.928760][ T6043] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.931121][ T6043] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.939400][ T6043] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.965289][ T6043] hsr_slave_0: entered promiscuous mode [ 69.967605][ T6043] hsr_slave_1: entered promiscuous mode [ 69.970022][ T6043] debugfs: 'hsr0' already exists in 'hsr' [ 69.971989][ T6043] Cannot create hsr debugfs directory [ 71.488158][ T222] bridge_slave_1: left allmulticast mode [ 71.490699][ T222] bridge_slave_1: left promiscuous mode [ 71.493833][ T222] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.501711][ T222] bridge_slave_0: left allmulticast mode [ 71.503822][ T222] bridge_slave_0: left promiscuous mode [ 71.506378][ T222] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.680896][ T5287] Bluetooth: hci0: command tx timeout [ 71.687567][ T222] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 71.693643][ T222] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 71.699361][ T222] bond0 (unregistering): Released all slaves [ 71.788370][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 71.788417][ T40] audit: type=1400 audit(1772122365.629:112): avc: denied { create } for pid=6052 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.801739][ T40] audit: type=1400 audit(1772122365.629:113): avc: denied { write } for pid=6052 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2079 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.812209][ T40] audit: type=1400 audit(1772122365.629:114): avc: denied { append } for pid=6052 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2079 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.843478][ T40] audit: type=1400 audit(1772122365.679:115): avc: denied { unlink } for pid=6055 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2079 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.896848][ T222] hsr_slave_0: left promiscuous mode [ 71.900893][ T222] hsr_slave_1: left promiscuous mode [ 71.904010][ T222] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 71.907075][ T222] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 71.912173][ T222] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 71.915224][ T222] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 71.926742][ T222] veth1_macvtap: left promiscuous mode [ 71.929538][ T222] veth0_macvtap: left promiscuous mode [ 71.931947][ T222] veth1_vlan: left promiscuous mode [ 71.934372][ T222] veth0_vlan: left promiscuous mode [ 72.080440][ T222] team0 (unregistering): Port device team_slave_1 removed [ 72.090999][ T222] team0 (unregistering): Port device team_slave_0 removed [ 72.467248][ T6043] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.475276][ T6043] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.482628][ T6043] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.494148][ T6043] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.551791][ T6043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.562263][ T6043] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.568238][ T158] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.571326][ T158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.578510][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.580850][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.878532][ T6043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.907395][ T6043] veth0_vlan: entered promiscuous mode [ 72.913634][ T6043] veth1_vlan: entered promiscuous mode [ 72.928969][ T6043] veth0_macvtap: entered promiscuous mode [ 72.933304][ T6043] veth1_macvtap: entered promiscuous mode [ 72.942964][ T6043] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.951039][ T6043] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.960681][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.963477][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.966859][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.970473][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.040042][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.042716][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.065991][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.069147][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.121087][ T40] audit: type=1404 audit(1772122366.959:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 73.155842][ T40] audit: type=1400 audit(1772122366.989:117): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.171480][ T40] audit: type=1400 audit(1772122367.009:118): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.185771][ T40] audit: type=1400 audit(1772122367.019:119): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.211993][ T40] audit: type=1400 audit(1772122367.049:120): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.225222][ T40] audit: type=1400 audit(1772122367.059:121): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.758209][ T5287] Bluetooth: hci0: command tx timeout [ 75.838109][ T5287] Bluetooth: hci0: command tx timeout [ 76.561274][ T1417] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.563408][ T1417] ieee802154 phy1 wpan1: encryption failed: -22 [ 76.811152][ T40] kauditd_printk_skb: 196 callbacks suppressed [ 76.811174][ T40] audit: type=1400 audit(1772122370.649:318): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.851705][ T40] audit: type=1400 audit(1772122370.689:319): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.863652][ T40] audit: type=1400 audit(1772122370.699:320): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.881312][ T40] audit: type=1400 audit(1772122370.719:321): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.906787][ T40] audit: type=1400 audit(1772122370.739:322): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.918448][ T40] audit: type=1400 audit(1772122370.759:323): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.928854][ T40] audit: type=1400 audit(1772122370.769:324): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.956031][ T40] audit: type=1400 audit(1772122370.789:325): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.966236][ T40] audit: type=1400 audit(1772122370.799:326): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.978952][ T40] audit: type=1400 audit(1772122370.819:327): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.918370][ T5287] Bluetooth: hci0: command tx timeout [ 81.820684][ T40] kauditd_printk_skb: 253 callbacks suppressed [ 81.820696][ T40] audit: type=1400 audit(1772122375.659:581): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.832241][ T40] audit: type=1400 audit(1772122375.669:582): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.843044][ T40] audit: type=1400 audit(1772122375.679:583): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.879241][ T40] audit: type=1400 audit(1772122375.719:584): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.889108][ T40] audit: type=1400 audit(1772122375.729:585): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.899528][ T40] audit: type=1400 audit(1772122375.739:586): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.949518][ T40] audit: type=1400 audit(1772122375.789:587): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.959273][ T40] audit: type=1400 audit(1772122375.799:588): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.969313][ T40] audit: type=1400 audit(1772122375.809:589): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 81.999154][ T40] audit: type=1400 audit(1772122375.839:590): avc: denied { read write } for pid=6043 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.674733][ T222] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.804108][ T222] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.892970][ T222] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.004543][ T222] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.124822][ T222] bridge_slave_1: left allmulticast mode [ 85.126854][ T222] bridge_slave_1: left promiscuous mode [ 85.129062][ T222] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.133721][ T222] bridge_slave_0: left allmulticast mode [ 85.136172][ T222] bridge_slave_0: left promiscuous mode [ 85.139328][ T222] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.385545][ T222] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 85.390819][ T222] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 85.395185][ T222] bond0 (unregistering): Released all slaves [ 85.773105][ T222] hsr_slave_0: left promiscuous mode [ 85.775798][ T222] hsr_slave_1: left promiscuous mode [ 85.778462][ T222] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 85.780896][ T222] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 85.783813][ T222] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 85.786410][ T222] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 85.794132][ T222] veth1_macvtap: left promiscuous mode [ 85.796310][ T222] veth0_macvtap: left promiscuous mode [ 85.798354][ T222] veth1_vlan: left promiscuous mode [ 85.800198][ T222] veth0_vlan: left promiscuous mode [ 85.950313][ T222] team0 (unregistering): Port device team_slave_1 removed [ 85.962883][ T222] team0 (unregistering): Port device team_slave_0 removed [ 86.800723][ T50] cfg80211: failed to load regulatory.db [ 86.828043][ T40] kauditd_printk_skb: 12699 callbacks suppressed [ 86.828064][ T40] audit: type=1400 audit(1772122380.659:13290): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.838760][ T40] audit: type=1400 audit(1772122380.669:13291): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.843423][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 86.846451][ T40] audit: type=1400 audit(1772122380.669:13292): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.848692][ T5638] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 86.848713][ T5638] audit: backlog limit exceeded [ 86.848889][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 86.856066][ T40] audit: type=1400 audit(1772122380.669:13293): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.858659][ T5638] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 86.860991][ T40] audit: type=1400 audit(1772122380.669:13294): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.838123][ T40] kauditd_printk_skb: 38197 callbacks suppressed [ 91.838137][ T40] audit: type=1400 audit(1772122385.669:51269): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.847111][ T40] audit: type=1400 audit(1772122385.679:51270): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.854261][ T40] audit: type=1400 audit(1772122385.679:51271): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.860748][ T40] audit: type=1400 audit(1772122385.679:51272): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.861792][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 91.867589][ T40] audit: type=1400 audit(1772122385.679:51273): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.869996][ T5638] audit: audit_lost=77 audit_rate_limit=0 audit_backlog_limit=64 [ 91.876821][ T40] audit: type=1400 audit(1772122385.679:51274): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.880291][ T5638] audit: backlog limit exceeded [ 91.887016][ T40] audit: type=1400 audit(1772122385.679:51275): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.848051][ T40] kauditd_printk_skb: 44100 callbacks suppressed [ 96.848066][ T40] audit: type=1400 audit(1772122390.679:94338): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.857124][ T40] audit: type=1400 audit(1772122390.689:94339): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.864028][ T40] audit: type=1400 audit(1772122390.689:94340): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.864541][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 96.870974][ T40] audit: type=1400 audit(1772122390.689:94341): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.871015][ T40] audit: type=1400 audit(1772122390.689:94342): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.873955][ T5638] audit: audit_lost=424 audit_rate_limit=0 audit_backlog_limit=64 [ 96.880856][ T40] audit: type=1400 audit(1772122390.689:94343): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 96.889856][ T5638] audit: backlog limit exceeded [ 96.892416][ T40] audit: type=1400 audit(1772122390.689:94344): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.857970][ T40] kauditd_printk_skb: 44907 callbacks suppressed [ 101.857985][ T40] audit: type=1400 audit(1772122395.689:138844): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.867792][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 101.869492][ T40] audit: type=1400 audit(1772122395.699:138845): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.871755][ T5638] audit: audit_lost=561 audit_rate_limit=0 audit_backlog_limit=64 [ 101.880328][ T40] audit: type=1400 audit(1772122395.699:138846): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.882863][ T5638] audit: backlog limit exceeded [ 101.883168][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 101.891232][ T40] audit: type=1400 audit(1772122395.699:138847): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.892817][ T5638] audit: audit_lost=562 audit_rate_limit=0 audit_backlog_limit=64 [ 101.895061][ T40] audit: type=1400 audit(1772122395.699:138848): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0