Warning: Permanently added '[localhost]:23402' (ED25519) to the list of known hosts. [ 74.973771][ T41] audit: type=1400 audit(1772316887.438:62): avc: denied { execute } for pid=5928 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 74.982407][ T41] audit: type=1400 audit(1772316887.438:63): avc: denied { execute_no_trans } for pid=5928 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/28 22:14:48 parsed 1 programs [ 76.369188][ T41] audit: type=1400 audit(1772316888.838:64): avc: denied { node_bind } for pid=5928 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 78.609902][ T41] audit: type=1400 audit(1772316891.078:65): avc: denied { mounton } for pid=5939 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 78.621768][ T5939] cgroup: Unknown subsys name 'net' [ 78.625376][ T41] audit: type=1400 audit(1772316891.088:66): avc: denied { mount } for pid=5939 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 78.634455][ T41] audit: type=1400 audit(1772316891.088:67): avc: denied { unmount } for pid=5939 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 78.770383][ T5939] cgroup: Unknown subsys name 'cpuset' [ 78.774629][ T5939] cgroup: Unknown subsys name 'rlimit' [ 78.953821][ T41] audit: type=1400 audit(1772316891.418:68): avc: denied { setattr } for pid=5939 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.965873][ T41] audit: type=1400 audit(1772316891.428:69): avc: denied { create } for pid=5939 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.974300][ T41] audit: type=1400 audit(1772316891.428:70): avc: denied { write } for pid=5939 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.982751][ T41] audit: type=1400 audit(1772316891.428:71): avc: denied { read } for pid=5939 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.019985][ T5942] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 79.764076][ T5939] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 81.486834][ T41] kauditd_printk_skb: 10 callbacks suppressed [ 81.486846][ T41] audit: type=1400 audit(1772316893.958:82): avc: denied { execmem } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 81.496641][ T41] audit: type=1400 audit(1772316893.958:83): avc: denied { read } for pid=5947 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.503392][ T41] audit: type=1400 audit(1772316893.958:84): avc: denied { open } for pid=5947 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.510932][ T41] audit: type=1400 audit(1772316893.958:85): avc: denied { mounton } for pid=5947 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 81.557422][ T41] audit: type=1400 audit(1772316894.028:86): avc: denied { mount } for pid=5947 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 81.564926][ T41] audit: type=1400 audit(1772316894.028:87): avc: denied { mounton } for pid=5947 comm="syz-executor" path="/syzkaller.j2C1Q3/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.574088][ T41] audit: type=1400 audit(1772316894.028:88): avc: denied { mount } for pid=5947 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.583657][ T41] audit: type=1400 audit(1772316894.028:89): avc: denied { mounton } for pid=5947 comm="syz-executor" path="/syzkaller.j2C1Q3/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 81.592025][ T41] audit: type=1400 audit(1772316894.028:90): avc: denied { mounton } for pid=5947 comm="syz-executor" path="/syzkaller.j2C1Q3/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6442 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 81.601973][ T41] audit: type=1400 audit(1772316894.038:91): avc: denied { unmount } for pid=5947 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 81.613954][ T5947] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.373228][ T131] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.376695][ T131] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.432341][ T47] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.435016][ T47] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.503391][ T5978] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 82.506780][ T5978] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 82.509608][ T5978] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 82.512858][ T5978] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 82.515579][ T5978] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 83.362935][ T6004] chnl_net:caif_netlink_parms(): no params data found [ 83.410179][ T6004] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.413280][ T6004] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.416570][ T6004] bridge_slave_0: entered allmulticast mode [ 83.419302][ T6004] bridge_slave_0: entered promiscuous mode [ 83.423557][ T6004] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.426094][ T6004] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.428426][ T6004] bridge_slave_1: entered allmulticast mode [ 83.431142][ T6004] bridge_slave_1: entered promiscuous mode [ 83.458415][ T6004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.464464][ T6004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.488165][ T6004] team0: Port device team_slave_0 added [ 83.492983][ T6004] team0: Port device team_slave_1 added [ 83.512349][ T6004] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 83.514669][ T6004] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 83.523291][ T6004] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 83.528226][ T6004] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 83.530504][ T6004] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 83.538910][ T6004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 83.561886][ T6004] hsr_slave_0: entered promiscuous mode [ 83.564215][ T6004] hsr_slave_1: entered promiscuous mode [ 83.748675][ T6004] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.755933][ T6004] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.761595][ T6004] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.768594][ T6004] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.803686][ T6004] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.806495][ T6004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.809636][ T6004] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.812372][ T6004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.841124][ T6004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.855574][ T47] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.860260][ T47] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.868585][ T6004] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.875494][ T131] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.878483][ T131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.886305][ T131] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.888689][ T131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.008430][ T6004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.039790][ T6004] veth0_vlan: entered promiscuous mode [ 84.047547][ T6004] veth1_vlan: entered promiscuous mode [ 84.068984][ T6004] veth0_macvtap: entered promiscuous mode [ 84.073303][ T6004] veth1_macvtap: entered promiscuous mode [ 84.082659][ T6004] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 84.089568][ T6004] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 84.097594][ T131] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.101497][ T131] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.105609][ T131] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.109890][ T131] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.193696][ T1170] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.269938][ T1170] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.359410][ T1170] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.416958][ T1170] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/28 22:14:57 executed programs: 0 [ 84.805506][ T5978] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 84.809544][ T5978] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 84.813146][ T5978] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 84.818062][ T5978] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 84.820921][ T5978] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 84.911524][ T6042] chnl_net:caif_netlink_parms(): no params data found [ 84.962031][ T6042] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.964479][ T6042] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.967105][ T6042] bridge_slave_0: entered allmulticast mode [ 84.969958][ T6042] bridge_slave_0: entered promiscuous mode [ 84.973246][ T6042] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.975598][ T6042] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.978130][ T6042] bridge_slave_1: entered allmulticast mode [ 84.980880][ T6042] bridge_slave_1: entered promiscuous mode [ 84.998828][ T6042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.003747][ T6042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.021594][ T6042] team0: Port device team_slave_0 added [ 85.025229][ T6042] team0: Port device team_slave_1 added [ 85.039067][ T6042] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.041367][ T6042] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 85.049666][ T6042] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.054234][ T6042] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.056599][ T6042] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 85.064961][ T6042] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.090427][ T6042] hsr_slave_0: entered promiscuous mode [ 85.092846][ T6042] hsr_slave_1: entered promiscuous mode [ 85.095049][ T6042] debugfs: 'hsr0' already exists in 'hsr' [ 85.097204][ T6042] Cannot create hsr debugfs directory [ 86.527156][ T24] cfg80211: failed to load regulatory.db [ 86.836726][ T5978] Bluetooth: hci0: command tx timeout [ 87.350748][ T1170] bridge_slave_1: left allmulticast mode [ 87.353288][ T1170] bridge_slave_1: left promiscuous mode [ 87.357251][ T1170] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.364969][ T1170] bridge_slave_0: left allmulticast mode [ 87.367547][ T1170] bridge_slave_0: left promiscuous mode [ 87.369945][ T1170] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.377409][ T41] kauditd_printk_skb: 20 callbacks suppressed [ 87.377421][ T41] audit: type=1400 audit(1772316899.848:112): avc: denied { create } for pid=6051 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.387059][ T41] audit: type=1400 audit(1772316899.848:113): avc: denied { write } for pid=6051 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2059 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.395030][ T41] audit: type=1400 audit(1772316899.848:114): avc: denied { append } for pid=6051 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2059 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.429713][ T41] audit: type=1400 audit(1772316899.898:115): avc: denied { unlink } for pid=6055 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2059 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.571244][ T1170] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 87.576872][ T1170] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 87.580473][ T1170] bond0 (unregistering): Released all slaves [ 87.714158][ T1170] hsr_slave_0: left promiscuous mode [ 87.717738][ T1170] hsr_slave_1: left promiscuous mode [ 87.720458][ T1170] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 87.723867][ T1170] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 87.733887][ T1170] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 87.736613][ T1170] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 87.743257][ T1170] veth1_macvtap: left promiscuous mode [ 87.745231][ T1170] veth0_macvtap: left promiscuous mode [ 87.747450][ T1170] veth1_vlan: left promiscuous mode [ 87.749645][ T1170] veth0_vlan: left promiscuous mode [ 87.883000][ T1170] team0 (unregistering): Port device team_slave_1 removed [ 87.893719][ T1170] team0 (unregistering): Port device team_slave_0 removed [ 88.370407][ T6042] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 88.377928][ T6042] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 88.383230][ T6042] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 88.390543][ T6042] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.454840][ T6042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.465492][ T6042] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.471205][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.474270][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.490385][ T47] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.493278][ T47] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.703205][ T6042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.742786][ T6042] veth0_vlan: entered promiscuous mode [ 88.751818][ T6042] veth1_vlan: entered promiscuous mode [ 88.775282][ T6042] veth0_macvtap: entered promiscuous mode [ 88.780583][ T6042] veth1_macvtap: entered promiscuous mode [ 88.790365][ T6042] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 88.800319][ T6042] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 88.820297][ T60] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.823251][ T60] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.833729][ T60] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.839118][ T60] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.874133][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 88.877870][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 88.898214][ T47] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 88.901792][ T47] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 88.926537][ T5978] Bluetooth: hci0: command tx timeout [ 88.930568][ T41] audit: type=1404 audit(1772316901.398:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 88.948219][ T41] audit: type=1400 audit(1772316901.418:117): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.961076][ T41] audit: type=1400 audit(1772316901.428:118): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.970642][ T41] audit: type=1400 audit(1772316901.438:119): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.021224][ T41] audit: type=1400 audit(1772316901.488:120): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.037709][ T41] audit: type=1400 audit(1772316901.508:121): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 90.995918][ T5978] Bluetooth: hci0: command tx timeout [ 92.387675][ T41] kauditd_printk_skb: 176 callbacks suppressed [ 92.387693][ T41] audit: type=1400 audit(1772316904.858:298): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.408233][ T41] audit: type=1400 audit(1772316904.878:299): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.418035][ T41] audit: type=1400 audit(1772316904.888:300): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.449252][ T41] audit: type=1400 audit(1772316904.918:301): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.461800][ T41] audit: type=1400 audit(1772316904.928:302): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.478680][ T41] audit: type=1400 audit(1772316904.948:303): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.504749][ T41] audit: type=1400 audit(1772316904.968:304): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.516472][ T41] audit: type=1400 audit(1772316904.988:305): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.530050][ T41] audit: type=1400 audit(1772316904.998:306): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.576994][ T41] audit: type=1400 audit(1772316905.048:307): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.085816][ T5978] Bluetooth: hci0: command tx timeout [ 97.404334][ T41] kauditd_printk_skb: 263 callbacks suppressed [ 97.404352][ T41] audit: type=1400 audit(1772316909.868:571): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.446553][ T41] audit: type=1400 audit(1772316909.918:572): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.457306][ T41] audit: type=1400 audit(1772316909.928:573): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.468034][ T41] audit: type=1400 audit(1772316909.938:574): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.494880][ T41] audit: type=1400 audit(1772316909.958:575): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.505735][ T41] audit: type=1400 audit(1772316909.968:576): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.516867][ T41] audit: type=1400 audit(1772316909.988:577): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.556162][ T41] audit: type=1400 audit(1772316910.028:578): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.566895][ T41] audit: type=1400 audit(1772316910.038:579): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.582705][ T41] audit: type=1400 audit(1772316910.048:580): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 100.493415][ T131] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.559296][ T131] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.657946][ T131] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.799000][ T131] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.927242][ T131] bridge_slave_1: left allmulticast mode [ 100.929640][ T131] bridge_slave_1: left promiscuous mode [ 100.932226][ T131] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.939605][ T131] bridge_slave_0: left allmulticast mode [ 100.941815][ T131] bridge_slave_0: left promiscuous mode [ 100.943824][ T131] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.133930][ T131] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 101.139275][ T131] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 101.144285][ T131] bond0 (unregistering): Released all slaves [ 101.746908][ T131] hsr_slave_0: left promiscuous mode [ 101.749051][ T131] hsr_slave_1: left promiscuous mode [ 101.751628][ T131] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 101.754088][ T131] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 101.757614][ T131] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 101.760097][ T131] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 101.765993][ T131] veth1_macvtap: left promiscuous mode [ 101.767976][ T131] veth0_macvtap: left promiscuous mode [ 101.769801][ T131] veth1_vlan: left promiscuous mode [ 101.771548][ T131] veth0_vlan: left promiscuous mode [ 101.879439][ T131] team0 (unregistering): Port device team_slave_1 removed [ 101.887183][ T131] team0 (unregistering): Port device team_slave_0 removed [ 102.405804][ T41] kauditd_printk_skb: 9855 callbacks suppressed [ 102.405816][ T41] audit: type=1400 audit(1772316914.868:10199): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.413576][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.416158][ T41] audit: type=1400 audit(1772316914.878:10200): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.418643][ T5636] audit: audit_lost=80 audit_rate_limit=0 audit_backlog_limit=64 [ 102.427950][ T41] audit: type=1400 audit(1772316914.878:10201): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.430480][ T5636] audit: backlog limit exceeded [ 102.430809][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.439664][ T41] audit: type=1400 audit(1772316914.878:10202): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.441081][ T5636] audit: audit_lost=81 audit_rate_limit=0 audit_backlog_limit=64 [ 102.444021][ T41] audit: type=1400 audit(1772316914.878:10203): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.415709][ T41] kauditd_printk_skb: 40978 callbacks suppressed [ 107.415721][ T41] audit: type=1400 audit(1772316919.878:49678): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.424926][ T41] audit: type=1400 audit(1772316919.888:49679): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.425087][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.431660][ T41] audit: type=1400 audit(1772316919.888:49680): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.434342][ T5636] audit: audit_lost=583 audit_rate_limit=0 audit_backlog_limit=64 [ 107.441059][ T41] audit: type=1400 audit(1772316919.888:49681): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.444114][ T5636] audit: backlog limit exceeded [ 107.451381][ T41] audit: type=1400 audit(1772316919.888:49682): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.453860][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.462231][ T41] audit: type=1400 audit(1772316919.888:49683): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.425709][ T41] kauditd_printk_skb: 41268 callbacks suppressed [ 112.425722][ T41] audit: type=1400 audit(1772316924.888:90131): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.434470][ T41] audit: type=1400 audit(1772316924.898:90132): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.435443][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.441369][ T41] audit: type=1400 audit(1772316924.898:90133): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.443425][ T5636] audit: audit_lost=858 audit_rate_limit=0 audit_backlog_limit=64 [ 112.450386][ T41] audit: type=1400 audit(1772316924.898:90134): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.453046][ T5636] audit: backlog limit exceeded [ 112.459921][ T41] audit: type=1400 audit(1772316924.898:90135): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.461927][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.470222][ T41] audit: type=1400 audit(1772316924.898:90136): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.435711][ T41] kauditd_printk_skb: 42890 callbacks suppressed [ 117.435725][ T41] audit: type=1400 audit(1772316929.898:132236): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.442519][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.446728][ T41] audit: type=1400 audit(1772316929.908:132237): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.448853][ T5636] audit: audit_lost=1123 audit_rate_limit=0 audit_backlog_limit=64 [ 117.455593][ T41] audit: type=1400 audit(1772316929.908:132238): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.458204][ T5636] audit: backlog limit exceeded [ 117.464977][ T41] audit: type=1400 audit(1772316929.908:132239): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.466932][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.473409][ T41] audit: type=1400 audit(1772316929.908:132240): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.475500][ T5636] audit: audit_lost=1124 audit_rate_limit=0 audit_backlog_limit=64