Warning: Permanently added '10.128.0.99' (ED25519) to the list of known hosts. 2025/07/08 21:09:41 ignoring optional flag "sandboxArg"="0" 2025/07/08 21:09:42 parsed 1 programs [ 41.161673][ T36] audit: type=1400 audit(1752008982.370:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 42.605103][ T36] audit: type=1400 audit(1752008983.820:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 42.606569][ T298] cgroup: Unknown subsys name 'net' [ 42.627767][ T36] audit: type=1400 audit(1752008983.820:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 42.655196][ T36] audit: type=1400 audit(1752008983.860:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 42.655396][ T298] cgroup: Unknown subsys name 'devices' [ 42.764698][ T298] cgroup: Unknown subsys name 'hugetlb' [ 42.770348][ T298] cgroup: Unknown subsys name 'rlimit' [ 42.865589][ T36] audit: type=1400 audit(1752008984.080:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 42.888989][ T36] audit: type=1400 audit(1752008984.080:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.909441][ T36] audit: type=1400 audit(1752008984.080:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.920588][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 42.929884][ T36] audit: type=1400 audit(1752008984.080:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.958618][ T36] audit: type=1400 audit(1752008984.080:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 42.979910][ T36] audit: type=1400 audit(1752008984.080:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 43.009242][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.870888][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 44.767156][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.774251][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.781318][ T350] bridge_slave_0: entered allmulticast mode [ 44.787782][ T350] bridge_slave_0: entered promiscuous mode [ 44.794207][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.801246][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.808386][ T350] bridge_slave_1: entered allmulticast mode [ 44.814720][ T350] bridge_slave_1: entered promiscuous mode [ 44.882870][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.889965][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.897300][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.904375][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.928865][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.936241][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.945499][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.952669][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.963337][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.970405][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.997925][ T350] veth0_vlan: entered promiscuous mode [ 45.008851][ T350] veth1_macvtap: entered promiscuous mode [ 45.054226][ T13] bridge_slave_1: left allmulticast mode [ 45.060112][ T13] bridge_slave_1: left promiscuous mode [ 45.066003][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.074287][ T13] bridge_slave_0: left allmulticast mode [ 45.079941][ T13] bridge_slave_0: left promiscuous mode [ 45.085713][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.195058][ T13] veth1_macvtap: left promiscuous mode [ 45.200725][ T13] veth0_vlan: left promiscuous mode 2025/07/08 21:09:46 executed programs: 0 [ 45.334314][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.341580][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.348701][ T362] bridge_slave_0: entered allmulticast mode [ 45.355037][ T362] bridge_slave_0: entered promiscuous mode [ 45.361386][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.368493][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.375638][ T362] bridge_slave_1: entered allmulticast mode [ 45.382023][ T362] bridge_slave_1: entered promiscuous mode [ 45.432821][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.439909][ T362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.447224][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.454286][ T362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.477378][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.484664][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.500511][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.507615][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.517134][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.524220][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.548059][ T362] veth0_vlan: entered promiscuous mode [ 45.561215][ T362] veth1_macvtap: entered promiscuous mode [ 46.196103][ T36] kauditd_printk_skb: 68 callbacks suppressed [ 46.196120][ T36] audit: type=1400 audit(1752008987.410:142): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.226468][ T36] audit: type=1400 audit(1752008987.430:143): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.250716][ T36] audit: type=1400 audit(1752008987.430:144): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.278252][ T36] audit: type=1400 audit(1752008987.500:145): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.302233][ T36] audit: type=1400 audit(1752008987.500:146): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.326760][ T36] audit: type=1400 audit(1752008987.500:147): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.350756][ T36] audit: type=1400 audit(1752008987.540:148): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.374756][ T36] audit: type=1400 audit(1752008987.550:149): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.399318][ T36] audit: type=1400 audit(1752008987.570:150): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.424079][ T36] audit: type=1400 audit(1752008987.590:151): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.236320][ T36] kauditd_printk_skb: 290 callbacks suppressed [ 51.236339][ T36] audit: type=1400 audit(1752008992.450:442): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.266524][ T36] audit: type=1400 audit(1752008992.460:443): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.290694][ T36] audit: type=1400 audit(1752008992.460:444): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.314694][ T36] audit: type=1400 audit(1752008992.510:445): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.338827][ T36] audit: type=1400 audit(1752008992.510:446): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.362784][ T36] audit: type=1400 audit(1752008992.540:447): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.386910][ T36] audit: type=1400 audit(1752008992.560:448): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.410911][ T36] audit: type=1400 audit(1752008992.580:449): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.435298][ T36] audit: type=1400 audit(1752008992.600:450): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.459791][ T36] audit: type=1400 audit(1752008992.610:451): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.704228][ T354] bridge_slave_1: left allmulticast mode [ 55.709896][ T354] bridge_slave_1: left promiscuous mode [ 55.715558][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.723063][ T354] bridge_slave_0: left allmulticast mode [ 55.728699][ T354] bridge_slave_0: left promiscuous mode [ 55.734409][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.855112][ T354] veth1_macvtap: left promiscuous mode [ 55.860636][ T354] veth0_vlan: left promiscuous mode [ 56.592016][ T36] kauditd_printk_skb: 261 callbacks suppressed [ 56.592033][ T36] audit: type=1400 audit(1752008997.810:713): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.200490][ T36] audit: type=1400 audit(1752008998.410:714): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.909111][ T36] audit: type=1400 audit(1752008999.130:715): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.718177][ T36] audit: type=1400 audit(1752008999.930:716): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.627188][ T36] audit: type=1400 audit(1752009000.840:717): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.635702][ T36] audit: type=1400 audit(1752009001.850:718): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.744292][ T36] audit: type=1400 audit(1752009002.960:719): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.952789][ T36] audit: type=1400 audit(1752009004.170:720): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.261242][ T36] audit: type=1400 audit(1752009005.470:721): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.669883][ T36] audit: type=1400 audit(1752009006.890:722): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.178563][ T36] audit: type=1400 audit(1752009008.400:723): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.787034][ T36] audit: type=1400 audit(1752009010.000:724): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.495485][ T36] audit: type=1400 audit(1752009011.710:725): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.303852][ T36] audit: type=1400 audit(1752009013.520:726): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 74.212289][ T36] audit: type=1400 audit(1752009015.430:727): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 76.220769][ T36] audit: type=1400 audit(1752009017.440:728): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 76.243866][ T36] audit: type=1400 audit(1752009017.460:729): avc: denied { write } for pid=290 comm="syz-execprog" path="pipe:[2255]" dev="pipefs" ino=2255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0