[ 53.136998][ T40] audit: type=1400 audit(1770139774.109:59): avc: denied { write } for pid=5909 comm="sh" path="pipe:[3625]" dev="pipefs" ino=3625 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 53.146854][ T40] audit: type=1400 audit(1770139774.109:60): avc: denied { rlimitinh } for pid=5909 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.155229][ T40] audit: type=1400 audit(1770139774.109:61): avc: denied { siginh } for pid=5909 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.462706][ T53] cfg80211: failed to load regulatory.db Warning: Permanently added '[localhost]:43656' (ED25519) to the list of known hosts. [ 89.226933][ T40] audit: type=1400 audit(1770139810.209:62): avc: denied { execute } for pid=5935 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 89.234585][ T40] audit: type=1400 audit(1770139810.209:63): avc: denied { execute_no_trans } for pid=5935 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/03 17:30:11 parsed 1 programs [ 90.454134][ T40] audit: type=1400 audit(1770139811.439:64): avc: denied { node_bind } for pid=5935 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 90.460801][ T40] audit: type=1400 audit(1770139811.439:65): avc: denied { node_bind } for pid=5935 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 92.486969][ T40] audit: type=1400 audit(1770139813.469:66): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 92.495197][ T40] audit: type=1400 audit(1770139813.479:67): avc: denied { mount } for pid=5946 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 92.496923][ T5946] cgroup: Unknown subsys name 'net' [ 92.506230][ T40] audit: type=1400 audit(1770139813.489:68): avc: denied { unmount } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 92.645305][ T5946] cgroup: Unknown subsys name 'cpuset' [ 92.650019][ T5946] cgroup: Unknown subsys name 'rlimit' [ 92.848159][ T40] audit: type=1400 audit(1770139813.829:69): avc: denied { setattr } for pid=5946 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 92.855561][ T40] audit: type=1400 audit(1770139813.829:70): avc: denied { create } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 92.862252][ T40] audit: type=1400 audit(1770139813.829:71): avc: denied { write } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 92.904392][ T5949] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 93.606746][ T5946] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 95.387824][ T40] kauditd_printk_skb: 11 callbacks suppressed [ 95.387842][ T40] audit: type=1400 audit(1770139816.369:83): avc: denied { execmem } for pid=5954 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 95.399230][ T40] audit: type=1400 audit(1770139816.379:84): avc: denied { read } for pid=5955 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 95.408186][ T40] audit: type=1400 audit(1770139816.379:85): avc: denied { open } for pid=5955 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 95.417980][ T40] audit: type=1400 audit(1770139816.379:86): avc: denied { mounton } for pid=5955 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 95.440055][ T40] audit: type=1400 audit(1770139816.419:87): avc: denied { mount } for pid=5955 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 95.447172][ T40] audit: type=1400 audit(1770139816.429:88): avc: denied { mounton } for pid=5955 comm="syz-executor" path="/syzkaller.ezvz36/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 95.454886][ T40] audit: type=1400 audit(1770139816.429:89): avc: denied { mount } for pid=5955 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 95.461914][ T40] audit: type=1400 audit(1770139816.429:90): avc: denied { mounton } for pid=5955 comm="syz-executor" path="/syzkaller.ezvz36/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 95.470239][ T40] audit: type=1400 audit(1770139816.429:91): avc: denied { mounton } for pid=5955 comm="syz-executor" path="/syzkaller.ezvz36/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=898 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 95.479309][ T40] audit: type=1400 audit(1770139816.429:92): avc: denied { unmount } for pid=5955 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 95.488839][ T5955] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 96.588941][ T5991] chnl_net:caif_netlink_parms(): no params data found [ 96.663740][ T5991] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.666236][ T5991] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.669236][ T5991] bridge_slave_0: entered allmulticast mode [ 96.673450][ T5991] bridge_slave_0: entered promiscuous mode [ 96.677794][ T5991] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.680033][ T5991] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.682378][ T5991] bridge_slave_1: entered allmulticast mode [ 96.685120][ T5991] bridge_slave_1: entered promiscuous mode [ 96.714725][ T5991] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 96.721213][ T5991] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 96.742765][ T5991] team0: Port device team_slave_0 added [ 96.747161][ T5991] team0: Port device team_slave_1 added [ 96.762874][ T5991] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 96.765633][ T5991] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 96.775540][ T5991] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 96.781643][ T5991] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 96.784371][ T5991] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 96.794205][ T5991] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 96.820188][ T5991] hsr_slave_0: entered promiscuous mode [ 96.823146][ T5991] hsr_slave_1: entered promiscuous mode [ 96.944082][ T5991] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 96.952028][ T5991] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 96.957723][ T5991] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 96.963362][ T5991] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 97.021081][ T5991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.037693][ T5991] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.045860][ T1179] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.048871][ T1179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.057429][ T1146] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.060410][ T1146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.204795][ T5991] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.226343][ T5991] veth0_vlan: entered promiscuous mode [ 97.231066][ T5991] veth1_vlan: entered promiscuous mode [ 97.246679][ T5991] veth0_macvtap: entered promiscuous mode [ 97.250374][ T5991] veth1_macvtap: entered promiscuous mode [ 97.259278][ T5991] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.264829][ T5991] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.271792][ T100] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.274952][ T100] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.279060][ T100] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.282578][ T100] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.357888][ T46] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 97.453629][ T46] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 97.529514][ T46] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 97.603998][ T46] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 97.632735][ T1179] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.635835][ T1179] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.657654][ T1179] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.660894][ T1179] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.734209][ T6029] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 97.738407][ T6029] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 97.743202][ T6029] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 97.747504][ T6029] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 97.750965][ T6029] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/02/03 17:30:19 executed programs: 0 [ 98.605858][ T5291] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 98.608727][ T5291] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 98.612053][ T5291] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 98.614808][ T5291] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 98.617381][ T5291] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 98.706290][ T6055] chnl_net:caif_netlink_parms(): no params data found [ 98.757694][ T6055] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.760057][ T6055] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.762435][ T6055] bridge_slave_0: entered allmulticast mode [ 98.765164][ T6055] bridge_slave_0: entered promiscuous mode [ 98.768314][ T6055] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.770562][ T6055] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.773027][ T6055] bridge_slave_1: entered allmulticast mode [ 98.775661][ T6055] bridge_slave_1: entered promiscuous mode [ 98.790521][ T6055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.794922][ T6055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.808757][ T6055] team0: Port device team_slave_0 added [ 98.811900][ T6055] team0: Port device team_slave_1 added [ 98.824510][ T6055] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 98.826708][ T6055] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 98.835078][ T6055] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 98.839239][ T6055] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 98.841499][ T6055] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 98.849439][ T6055] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 98.873629][ T6055] hsr_slave_0: entered promiscuous mode [ 98.875922][ T6055] hsr_slave_1: entered promiscuous mode [ 98.877977][ T6055] debugfs: 'hsr0' already exists in 'hsr' [ 98.879851][ T6055] Cannot create hsr debugfs directory [ 100.618755][ T46] bridge_slave_1: left allmulticast mode [ 100.620641][ T46] bridge_slave_1: left promiscuous mode [ 100.622941][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.627850][ T46] bridge_slave_0: left allmulticast mode [ 100.629620][ T46] bridge_slave_0: left promiscuous mode [ 100.631613][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.702980][ T5291] Bluetooth: hci0: command tx timeout [ 100.809307][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 100.813806][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 100.817146][ T46] bond0 (unregistering): Released all slaves [ 100.894517][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 100.894533][ T40] audit: type=1400 audit(1770139821.879:113): avc: denied { create } for pid=6066 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.905276][ T40] audit: type=1400 audit(1770139821.879:114): avc: denied { write } for pid=6066 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2102 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.915694][ T40] audit: type=1400 audit(1770139821.879:115): avc: denied { append } for pid=6066 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2102 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.946194][ T40] audit: type=1400 audit(1770139821.929:116): avc: denied { unlink } for pid=6069 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2102 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.973015][ T46] hsr_slave_0: left promiscuous mode [ 100.977950][ T46] hsr_slave_1: left promiscuous mode [ 100.981310][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 100.985425][ T46] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 100.989614][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 100.992238][ T46] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 101.000368][ T46] veth1_macvtap: left promiscuous mode [ 101.002410][ T46] veth0_macvtap: left promiscuous mode [ 101.004256][ T46] veth1_vlan: left promiscuous mode [ 101.006338][ T46] veth0_vlan: left promiscuous mode [ 101.197981][ T46] team0 (unregistering): Port device team_slave_1 removed [ 101.215885][ T46] team0 (unregistering): Port device team_slave_0 removed [ 101.930498][ T6055] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 101.934748][ T6055] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 101.938932][ T6055] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 101.943509][ T6055] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 101.990579][ T6055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.998417][ T6055] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.004751][ T61] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.007817][ T61] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.014753][ T1179] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.017038][ T1179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.272784][ T6055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.308199][ T6055] veth0_vlan: entered promiscuous mode [ 102.317519][ T6055] veth1_vlan: entered promiscuous mode [ 102.331021][ T6055] veth0_macvtap: entered promiscuous mode [ 102.338103][ T6055] veth1_macvtap: entered promiscuous mode [ 102.353095][ T6055] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 102.360892][ T6055] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 102.370223][ T61] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.373920][ T61] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.388871][ T61] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.394026][ T61] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.449754][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 102.456044][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 102.470534][ T61] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 102.473923][ T61] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 102.512921][ T40] audit: type=1404 audit(1770139823.499:117): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 102.525397][ T40] audit: type=1400 audit(1770139823.509:118): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 104.479676][ T46] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.151763][ T46] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.222649][ T46] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.305971][ T46] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.398382][ T40] audit: type=1400 audit(1770139827.379:119): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 106.407310][ T40] audit: type=1400 audit(1770139827.379:120): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 106.416040][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 106.416168][ T40] audit: type=1400 audit(1770139827.379:121): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 106.418775][ T5641] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 106.431039][ T46] bridge_slave_1: left allmulticast mode [ 106.431141][ T40] audit: type=1400 audit(1770139827.379:122): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 106.431287][ T5641] audit: backlog limit exceeded [ 106.432114][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 106.432127][ T5641] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 106.432139][ T5641] audit: backlog limit exceeded [ 106.433605][ T46] bridge_slave_1: left promiscuous mode [ 106.454379][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.459685][ T46] bridge_slave_0: left allmulticast mode [ 106.463453][ T46] bridge_slave_0: left promiscuous mode [ 106.465957][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.672944][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 106.677893][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 106.681366][ T46] bond0 (unregistering): Released all slaves [ 107.052296][ T46] hsr_slave_0: left promiscuous mode [ 107.054413][ T46] hsr_slave_1: left promiscuous mode [ 107.056400][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 107.058712][ T46] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 107.061480][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 107.063796][ T46] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 107.071365][ T46] veth1_macvtap: left promiscuous mode [ 107.073279][ T46] veth0_macvtap: left promiscuous mode [ 107.075089][ T46] veth1_vlan: left promiscuous mode [ 107.077199][ T46] veth0_vlan: left promiscuous mode [ 107.336784][ T46] team0 (unregistering): Port device team_slave_1 removed [ 107.361459][ T46] team0 (unregistering): Port device team_slave_0 removed [ 111.401511][ T40] kauditd_printk_skb: 47294 callbacks suppressed [ 111.401522][ T40] audit: type=1400 audit(1770139832.389:46241): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.406861][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 111.409913][ T40] audit: type=1400 audit(1770139832.389:46242): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.411999][ T5641] audit: audit_lost=395 audit_rate_limit=0 audit_backlog_limit=64 [ 111.418295][ T40] audit: type=1400 audit(1770139832.389:46243): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.420668][ T5641] audit: backlog limit exceeded [ 111.427106][ T40] audit: type=1400 audit(1770139832.389:46244): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.429020][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 111.435092][ T40] audit: type=1400 audit(1770139832.389:46245): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.437073][ T5641] audit: audit_lost=396 audit_rate_limit=0 audit_backlog_limit=64 [ 116.411496][ T40] kauditd_printk_skb: 48950 callbacks suppressed [ 116.411513][ T40] audit: type=1400 audit(1770139837.389:95162): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.420177][ T40] audit: type=1400 audit(1770139837.399:95163): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.427351][ T40] audit: type=1400 audit(1770139837.399:95164): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.434055][ T40] audit: type=1400 audit(1770139837.399:95165): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.435458][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 116.440689][ T40] audit: type=1400 audit(1770139837.399:95166): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.442861][ T5641] audit: audit_lost=408 audit_rate_limit=0 audit_backlog_limit=64 [ 116.449465][ T40] audit: type=1400 audit(1770139837.399:95167): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.452005][ T5641] audit: backlog limit exceeded [ 116.458545][ T40] audit: type=1400 audit(1770139837.399:95168): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 121.421531][ T40] kauditd_printk_skb: 48768 callbacks suppressed [ 121.421543][ T40] audit: type=1400 audit(1770139842.399:143307): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 121.430306][ T40] audit: type=1400 audit(1770139842.409:143308): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 121.436375][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 121.439157][ T40] audit: type=1400 audit(1770139842.409:143309): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 121.440868][ T5641] audit: audit_lost=619 audit_rate_limit=0 audit_backlog_limit=64 [ 121.440879][ T5641] audit: backlog limit exceeded [ 121.449818][ T40] audit: type=1400 audit(1770139842.409:143310): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 121.453369][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 121.454991][ T40] audit: type=1400 audit(1770139842.409:143311): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 121.463612][ T5641] audit: audit_lost=620 audit_rate_limit=0 audit_backlog_limit=64