[ 44.067845][ T40] audit: type=1400 audit(1769313371.480:60): avc: denied { rlimitinh } for pid=5829 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 44.076243][ T40] audit: type=1400 audit(1769313371.490:61): avc: denied { siginh } for pid=5829 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:62341' (ED25519) to the list of known hosts. [ 58.580250][ T40] audit: type=1400 audit(1769313386.010:62): avc: denied { execute } for pid=5923 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 58.587640][ T40] audit: type=1400 audit(1769313386.020:63): avc: denied { execute_no_trans } for pid=5923 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/01/25 03:56:27 parsed 1 programs [ 59.774064][ T40] audit: type=1400 audit(1769313387.210:64): avc: denied { node_bind } for pid=5923 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 61.846799][ T40] audit: type=1400 audit(1769313389.280:65): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 61.854604][ T40] audit: type=1400 audit(1769313389.290:66): avc: denied { mount } for pid=5933 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.856604][ T5933] cgroup: Unknown subsys name 'net' [ 61.865226][ T40] audit: type=1400 audit(1769313389.300:67): avc: denied { unmount } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.977429][ T5933] cgroup: Unknown subsys name 'cpuset' [ 61.981877][ T5933] cgroup: Unknown subsys name 'rlimit' [ 62.169119][ T40] audit: type=1400 audit(1769313389.600:68): avc: denied { setattr } for pid=5933 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 62.178123][ T40] audit: type=1400 audit(1769313389.600:69): avc: denied { create } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.186284][ T40] audit: type=1400 audit(1769313389.600:70): avc: denied { write } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.194293][ T40] audit: type=1400 audit(1769313389.600:71): avc: denied { read } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.239733][ T5935] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 62.932993][ T5933] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 64.479816][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 64.479828][ T40] audit: type=1400 audit(1769313391.910:82): avc: denied { execmem } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 64.490250][ T40] audit: type=1400 audit(1769313391.920:83): avc: denied { read } for pid=5941 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 64.498589][ T40] audit: type=1400 audit(1769313391.920:84): avc: denied { open } for pid=5941 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 64.508365][ T40] audit: type=1400 audit(1769313391.920:85): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 64.525218][ T40] audit: type=1400 audit(1769313391.960:86): avc: denied { mount } for pid=5941 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 64.532883][ T40] audit: type=1400 audit(1769313391.960:87): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/syzkaller.KY4IHA/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 64.543078][ T40] audit: type=1400 audit(1769313391.960:88): avc: denied { mount } for pid=5941 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 64.550132][ T40] audit: type=1400 audit(1769313391.960:89): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/syzkaller.KY4IHA/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 64.558844][ T40] audit: type=1400 audit(1769313391.960:90): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/syzkaller.KY4IHA/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8310 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 64.569056][ T40] audit: type=1400 audit(1769313391.960:91): avc: denied { unmount } for pid=5941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 64.581651][ T5941] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 64.838452][ T62] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.841090][ T62] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.873692][ T1186] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.876832][ T1186] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.186718][ T5970] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 65.190906][ T5970] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 65.194460][ T5970] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 65.199173][ T5970] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 65.202181][ T5970] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 66.347480][ T6008] chnl_net:caif_netlink_parms(): no params data found [ 66.392003][ T6008] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.395058][ T6008] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.397301][ T6008] bridge_slave_0: entered allmulticast mode [ 66.400154][ T6008] bridge_slave_0: entered promiscuous mode [ 66.405165][ T6008] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.407872][ T6008] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.410187][ T6008] bridge_slave_1: entered allmulticast mode [ 66.412873][ T6008] bridge_slave_1: entered promiscuous mode [ 66.471651][ T6008] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.476508][ T6008] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.490482][ T6008] team0: Port device team_slave_0 added [ 66.493984][ T6008] team0: Port device team_slave_1 added [ 66.507164][ T6008] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 66.509362][ T6008] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 66.517703][ T6008] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 66.525209][ T6008] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 66.527416][ T6008] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 66.535992][ T6008] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 66.564112][ T6008] hsr_slave_0: entered promiscuous mode [ 66.566387][ T6008] hsr_slave_1: entered promiscuous mode [ 66.663105][ T6008] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 66.670366][ T6008] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 66.675993][ T6008] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 66.680828][ T6008] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 66.701417][ T6008] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.704393][ T6008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.707747][ T6008] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.710630][ T6008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.744319][ T6008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.754292][ T62] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.757632][ T62] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.764271][ T6008] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.770336][ T1153] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.772784][ T1153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.778988][ T62] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.781363][ T62] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.894067][ T6008] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.927162][ T6008] veth0_vlan: entered promiscuous mode [ 66.934788][ T6008] veth1_vlan: entered promiscuous mode [ 66.958375][ T6008] veth0_macvtap: entered promiscuous mode [ 66.965875][ T6008] veth1_macvtap: entered promiscuous mode [ 66.981995][ T6008] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.991053][ T6008] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.999620][ T1153] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.003499][ T1153] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.007555][ T1153] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.011736][ T1153] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.094851][ T1153] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.190531][ T1153] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.290535][ T1153] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.439034][ T1153] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/01/25 03:56:34 executed programs: 0 [ 67.470734][ T5970] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.474369][ T5970] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.477617][ T5970] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.480317][ T5970] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.483933][ T5970] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.574870][ T6042] chnl_net:caif_netlink_parms(): no params data found [ 67.624770][ T6042] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.627362][ T6042] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.629739][ T6042] bridge_slave_0: entered allmulticast mode [ 67.634162][ T6042] bridge_slave_0: entered promiscuous mode [ 67.638492][ T6042] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.641314][ T6042] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.644228][ T6042] bridge_slave_1: entered allmulticast mode [ 67.646779][ T6042] bridge_slave_1: entered promiscuous mode [ 67.662308][ T6042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.666765][ T6042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.680731][ T6042] team0: Port device team_slave_0 added [ 67.684047][ T6042] team0: Port device team_slave_1 added [ 67.697099][ T6042] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.699366][ T6042] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.708072][ T6042] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.712477][ T6042] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.714726][ T6042] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.723246][ T6042] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.744706][ T6042] hsr_slave_0: entered promiscuous mode [ 67.747468][ T6042] hsr_slave_1: entered promiscuous mode [ 67.749538][ T6042] debugfs: 'hsr0' already exists in 'hsr' [ 67.751458][ T6042] Cannot create hsr debugfs directory [ 69.513734][ T5970] Bluetooth: hci0: command tx timeout [ 70.298504][ T1153] bridge_slave_1: left allmulticast mode [ 70.300643][ T1153] bridge_slave_1: left promiscuous mode [ 70.302991][ T1153] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.307761][ T1153] bridge_slave_0: left allmulticast mode [ 70.309717][ T1153] bridge_slave_0: left promiscuous mode [ 70.311574][ T1153] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.481459][ T1153] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 70.487707][ T1153] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 70.492222][ T1153] bond0 (unregistering): Released all slaves [ 70.557077][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 70.557093][ T40] audit: type=1400 audit(1769313397.990:112): avc: denied { create } for pid=6052 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 70.566992][ T40] audit: type=1400 audit(1769313397.990:113): avc: denied { write } for pid=6052 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 70.575091][ T40] audit: type=1400 audit(1769313397.990:114): avc: denied { append } for pid=6052 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 70.599151][ T40] audit: type=1400 audit(1769313398.030:115): avc: denied { unlink } for pid=6055 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 70.640466][ T1153] hsr_slave_0: left promiscuous mode [ 70.642718][ T1153] hsr_slave_1: left promiscuous mode [ 70.644937][ T1153] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 70.647326][ T1153] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 70.650260][ T1153] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 70.653176][ T1153] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 70.661806][ T1153] veth1_macvtap: left promiscuous mode [ 70.663807][ T1153] veth0_macvtap: left promiscuous mode [ 70.665594][ T1153] veth1_vlan: left promiscuous mode [ 70.667480][ T1153] veth0_vlan: left promiscuous mode [ 70.881818][ T1153] team0 (unregistering): Port device team_slave_1 removed [ 70.898597][ T1153] team0 (unregistering): Port device team_slave_0 removed [ 71.590996][ T6042] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 71.594192][ T5970] Bluetooth: hci0: command tx timeout [ 71.601723][ T6042] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 71.605773][ T6042] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 71.610416][ T6042] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 71.677533][ T6042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.686232][ T6042] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.691091][ T82] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.693457][ T82] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.699533][ T1186] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.702021][ T1186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.854896][ T6042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.873705][ T6042] veth0_vlan: entered promiscuous mode [ 71.886053][ T6042] veth1_vlan: entered promiscuous mode [ 71.907026][ T6042] veth0_macvtap: entered promiscuous mode [ 71.914740][ T6042] veth1_macvtap: entered promiscuous mode [ 71.928713][ T6042] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.940455][ T6042] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.949824][ T62] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.959836][ T62] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.969845][ T62] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.973954][ T62] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.010111][ T62] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.013386][ T62] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.035024][ T62] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.038256][ T62] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.077658][ T40] audit: type=1404 audit(1769313399.510:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 72.098341][ T40] audit: type=1400 audit(1769313399.530:117): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.115697][ T40] audit: type=1400 audit(1769313399.550:118): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.130424][ T40] audit: type=1400 audit(1769313399.560:119): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.154795][ T40] audit: type=1400 audit(1769313399.590:120): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.170809][ T40] audit: type=1400 audit(1769313399.600:121): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.684452][ T5970] Bluetooth: hci0: command tx timeout [ 75.590250][ T40] kauditd_printk_skb: 185 callbacks suppressed [ 75.590263][ T40] audit: type=1400 audit(1769313403.020:307): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.600863][ T40] audit: type=1400 audit(1769313403.030:308): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.611283][ T40] audit: type=1400 audit(1769313403.040:309): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.643979][ T40] audit: type=1400 audit(1769313403.080:310): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.656504][ T40] audit: type=1400 audit(1769313403.090:311): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.667975][ T40] audit: type=1400 audit(1769313403.100:312): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.699503][ T40] audit: type=1400 audit(1769313403.130:313): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.710696][ T40] audit: type=1400 audit(1769313403.140:314): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.720553][ T40] audit: type=1400 audit(1769313403.150:315): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.750765][ T40] audit: type=1400 audit(1769313403.180:316): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.752651][ T5970] Bluetooth: hci0: command tx timeout [ 76.237566][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.240382][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 80.609964][ T40] kauditd_printk_skb: 270 callbacks suppressed [ 80.609975][ T40] audit: type=1400 audit(1769313408.040:587): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.622232][ T40] audit: type=1400 audit(1769313408.050:588): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.632220][ T40] audit: type=1400 audit(1769313408.060:589): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.660405][ T40] audit: type=1400 audit(1769313408.090:590): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.670125][ T40] audit: type=1400 audit(1769313408.100:591): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.680768][ T40] audit: type=1400 audit(1769313408.110:592): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.711645][ T40] audit: type=1400 audit(1769313408.140:593): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.719456][ T40] audit: type=1400 audit(1769313408.150:594): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.727352][ T40] audit: type=1400 audit(1769313408.160:595): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.764084][ T40] audit: type=1400 audit(1769313408.200:596): avc: denied { read write } for pid=6042 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.291618][ T1153] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.386941][ T1153] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.473893][ T1153] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.572217][ T1153] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.672953][ T1153] bridge_slave_1: left allmulticast mode [ 83.674881][ T1153] bridge_slave_1: left promiscuous mode [ 83.677144][ T1153] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.684101][ T1153] bridge_slave_0: left allmulticast mode [ 83.685957][ T1153] bridge_slave_0: left promiscuous mode [ 83.687950][ T1153] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.869970][ T1153] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 83.874208][ T1153] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 83.878020][ T1153] bond0 (unregistering): Released all slaves [ 84.207128][ T1153] hsr_slave_0: left promiscuous mode [ 84.209462][ T1153] hsr_slave_1: left promiscuous mode [ 84.211422][ T1153] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 84.213837][ T1153] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 84.216657][ T1153] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 84.219058][ T1153] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 84.226761][ T1153] veth1_macvtap: left promiscuous mode [ 84.228555][ T1153] veth0_macvtap: left promiscuous mode [ 84.230388][ T1153] veth1_vlan: left promiscuous mode [ 84.232107][ T1153] veth0_vlan: left promiscuous mode [ 84.466123][ T1153] team0 (unregistering): Port device team_slave_1 removed [ 84.495332][ T1153] team0 (unregistering): Port device team_slave_0 removed [ 85.612416][ T40] kauditd_printk_skb: 15426 callbacks suppressed [ 85.612429][ T40] audit: type=1400 audit(1769313413.040:15885): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.621541][ T40] audit: type=1400 audit(1769313413.050:15886): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.623452][ T5640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 85.628240][ T40] audit: type=1400 audit(1769313413.050:15887): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.630094][ T5640] audit: audit_lost=47 audit_rate_limit=0 audit_backlog_limit=64 [ 85.636705][ T40] audit: type=1400 audit(1769313413.050:15888): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.639838][ T5640] audit: backlog limit exceeded [ 85.646923][ T40] audit: type=1400 audit(1769313413.050:15889): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.649541][ T5640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 85.655948][ T40] audit: type=1400 audit(1769313413.050:15890): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.473568][ T9] cfg80211: failed to load regulatory.db [ 90.622695][ T40] kauditd_printk_skb: 47876 callbacks suppressed [ 90.622713][ T40] audit: type=1400 audit(1769313418.060:63354): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.628528][ T5640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.633397][ T40] audit: type=1400 audit(1769313418.060:63355): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.635388][ T5640] audit: audit_lost=186 audit_rate_limit=0 audit_backlog_limit=64 [ 90.642031][ T40] audit: type=1400 audit(1769313418.060:63356): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.644590][ T5640] audit: backlog limit exceeded [ 90.644861][ T5640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.651438][ T40] audit: type=1400 audit(1769313418.060:63357): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.652950][ T5640] audit: audit_lost=187 audit_rate_limit=0 audit_backlog_limit=64 [ 90.652960][ T5640] audit: backlog limit exceeded [ 95.632600][ T40] kauditd_printk_skb: 40155 callbacks suppressed [ 95.632618][ T40] audit: type=1400 audit(1769313423.070:102424): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.640815][ T5640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.643605][ T40] audit: type=1400 audit(1769313423.070:102425): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.645812][ T5640] audit: audit_lost=551 audit_rate_limit=0 audit_backlog_limit=64 [ 95.652908][ T40] audit: type=1400 audit(1769313423.070:102426): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.655546][ T5640] audit: backlog limit exceeded [ 95.664440][ T40] audit: type=1400 audit(1769313423.070:102427): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.666576][ T5640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.675066][ T40] audit: type=1400 audit(1769313423.070:102428): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.677409][ T5640] audit: audit_lost=552 audit_rate_limit=0 audit_backlog_limit=64 [ 100.642532][ T40] kauditd_printk_skb: 42369 callbacks suppressed [ 100.642543][ T40] audit: type=1400 audit(1769313428.080:143480): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.652579][ T40] audit: type=1400 audit(1769313428.080:143481): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.657866][ T5640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.659250][ T40] audit: type=1400 audit(1769313428.080:143482): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.661295][ T5640] audit: audit_lost=992 audit_rate_limit=0 audit_backlog_limit=64 [ 100.667902][ T40] audit: type=1400 audit(1769313428.080:143483): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.670313][ T5640] audit: backlog limit exceeded [ 100.677563][ T40] audit: type=1400 audit(1769313428.080:143484): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.679393][ T5640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.685723][ T40] audit: type=1400 audit(1769313428.080:143485): avc: denied { read } for pid=5640 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0