Except your example clearly demonstrates that no audit records have been generated for this file access. For the reasons both mentioned in man auditctl or described here
It is not necessary, auditctl changes are applied immediately.
/sbin/auditctl -R/etc/audit/audit.rules
Using ausearch -i ... should print most information in user-readable form. Maybe it is due to binary NUL character embedded, not sure.
And now read man auditctl and scroll to the DISABLED BY DEFAULT section. You need to remove it from /etc/audit/rules.d/audit.rules or whatever file you use to generate the rules.
Unfortunately, the problem happens at boot. For clarity, we discovered that it’s eth0, not all, that is disabled, which is frustrating since eth0 should be playing a passive role in the bridge.
As another attempt, I added the manual rule to my network config script, before anything else fires up. But, alas, although the rule stayed this time, nothing was captured.
I suspect that it’s taking audit a cycle or to to “warm up” because even when my recycle script runs immediately after the rule add, the change is not captured.
So whatever happens is happening before that.
I’ve rechecked the tree in /etc/sysconfig/network, but found nothing obvious there.
The net effect of this is that with eth0/disable_ipv6 set to 1 - at or during boot - somehow - it’s only a matter of time until things die.
See what @arvidjaar wrote above, auditctl does not work for “files” in /proc/sys/net/.
I did initially think it did work but the message ausearch shows is a message indicating the rule was added, reading the file did not trigger a log message in ausearch.
When I added the rules to rules.d/glen.rules, the rules did seem to persist across a reboot, and they did get loaded, but even after I removed all the other stuff, my rules still got unloaded immediately after getting loaded.
When I added a manual rule to my startup script, that rule did get loaded, and it did not get unloaded (it did stay active) - and my subsequent cat of the proc/sys/net file did get logged - I did the cat twice and it did get logged both times, so the rule was active and producing output. The problem is that using this method didn’t produce any other output, which apparently indicates that whatever is happening is happening before my manual rule load runs.
So, neither method produced any results that could be informative here. I am absolutely happy to try anything else anyone wants me to try to shed further light on this - just tell me what you want and I’ll do it!