Warning: Permanently added '10.128.0.72' (ED25519) to the list of known hosts. 2025/07/13 06:32:05 ignoring optional flag "sandboxArg"="0" 2025/07/13 06:32:06 parsed 1 programs [ 44.002446][ T36] audit: type=1400 audit(1752388326.320:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 45.595403][ T36] audit: type=1400 audit(1752388327.910:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 45.597077][ T297] cgroup: Unknown subsys name 'net' [ 45.618426][ T36] audit: type=1400 audit(1752388327.910:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.646018][ T36] audit: type=1400 audit(1752388327.940:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.646265][ T297] cgroup: Unknown subsys name 'devices' [ 45.832210][ T297] cgroup: Unknown subsys name 'hugetlb' [ 45.837847][ T297] cgroup: Unknown subsys name 'rlimit' [ 45.933029][ T36] audit: type=1400 audit(1752388328.250:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 45.956411][ T36] audit: type=1400 audit(1752388328.250:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.977282][ T36] audit: type=1400 audit(1752388328.250:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.997679][ T36] audit: type=1400 audit(1752388328.250:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.013429][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 46.018119][ T36] audit: type=1400 audit(1752388328.250:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 46.047865][ T36] audit: type=1400 audit(1752388328.250:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 46.061995][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.051365][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 47.733558][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.740775][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.747945][ T337] bridge_slave_0: entered allmulticast mode [ 47.754391][ T337] bridge_slave_0: entered promiscuous mode [ 47.761160][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.768484][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.775820][ T337] bridge_slave_1: entered allmulticast mode [ 47.782402][ T337] bridge_slave_1: entered promiscuous mode [ 47.839402][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.846677][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.854035][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.861296][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.884156][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.891900][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.901672][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.909014][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.919459][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.926574][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.957999][ T337] veth0_vlan: entered promiscuous mode [ 47.968728][ T337] veth1_macvtap: entered promiscuous mode [ 48.061612][ T44] bridge_slave_1: left allmulticast mode [ 48.067459][ T44] bridge_slave_1: left promiscuous mode [ 48.073341][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.081461][ T44] bridge_slave_0: left allmulticast mode [ 48.087153][ T44] bridge_slave_0: left promiscuous mode [ 48.093004][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.204679][ T44] veth1_macvtap: left promiscuous mode [ 48.210513][ T44] veth0_vlan: left promiscuous mode 2025/07/13 06:32:10 executed programs: 0 [ 48.573458][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.580798][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.587964][ T361] bridge_slave_0: entered allmulticast mode [ 48.594482][ T361] bridge_slave_0: entered promiscuous mode [ 48.601312][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.608457][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.615873][ T361] bridge_slave_1: entered allmulticast mode [ 48.623226][ T361] bridge_slave_1: entered promiscuous mode [ 48.704957][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.712108][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.719689][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.726857][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.749471][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.756892][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.770388][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.777819][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.787897][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.794995][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.820555][ T361] veth0_vlan: entered promiscuous mode [ 48.832153][ T361] veth1_macvtap: entered promiscuous mode [ 49.025030][ T36] kauditd_printk_skb: 41 callbacks suppressed [ 49.025049][ T36] audit: type=1400 audit(1752388331.340:115): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.056535][ T36] audit: type=1400 audit(1752388331.350:116): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.081855][ T36] audit: type=1400 audit(1752388331.360:117): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.107794][ T36] audit: type=1400 audit(1752388331.390:118): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.132666][ T36] audit: type=1400 audit(1752388331.400:119): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.157015][ T36] audit: type=1400 audit(1752388331.410:120): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.181380][ T36] audit: type=1400 audit(1752388331.480:121): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.206909][ T36] audit: type=1400 audit(1752388331.480:122): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.231427][ T36] audit: type=1400 audit(1752388331.480:123): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.255609][ T36] audit: type=1400 audit(1752388331.540:124): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.044549][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 54.044568][ T36] audit: type=1400 audit(1752388336.360:413): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.076882][ T36] audit: type=1400 audit(1752388336.370:414): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.105517][ T36] audit: type=1400 audit(1752388336.380:415): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.130946][ T36] audit: type=1400 audit(1752388336.430:416): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.155605][ T36] audit: type=1400 audit(1752388336.440:417): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.181048][ T36] audit: type=1400 audit(1752388336.450:418): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.206533][ T36] audit: type=1400 audit(1752388336.510:419): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.231012][ T36] audit: type=1400 audit(1752388336.510:420): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.255091][ T36] audit: type=1400 audit(1752388336.530:421): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.279880][ T36] audit: type=1400 audit(1752388336.570:422): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 59.059195][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 59.059214][ T36] audit: type=1400 audit(1752388341.370:711): avc: denied { execmem } for pid=969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.109960][ T12] bridge_slave_1: left allmulticast mode [ 59.115631][ T12] bridge_slave_1: left promiscuous mode [ 59.121493][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.129502][ T12] bridge_slave_0: left allmulticast mode [ 59.135432][ T12] bridge_slave_0: left promiscuous mode [ 59.141145][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.272462][ T12] veth1_macvtap: left promiscuous mode [ 59.278139][ T12] veth0_vlan: left promiscuous mode [ 59.471574][ T36] audit: type=1400 audit(1752388341.790:712): avc: denied { execmem } for pid=970 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.981804][ T36] audit: type=1400 audit(1752388342.300:713): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.592070][ T36] audit: type=1400 audit(1752388342.910:714): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.301233][ T36] audit: type=1400 audit(1752388343.620:715): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.111015][ T36] audit: type=1400 audit(1752388344.430:716): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.020047][ T36] audit: type=1400 audit(1752388345.340:717): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.029777][ T36] audit: type=1400 audit(1752388346.350:718): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.139772][ T36] audit: type=1400 audit(1752388347.460:719): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.350084][ T36] audit: type=1400 audit(1752388348.670:720): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.659228][ T36] audit: type=1400 audit(1752388349.970:721): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.069080][ T36] audit: type=1400 audit(1752388351.380:722): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.578229][ T36] audit: type=1400 audit(1752388352.890:723): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.187432][ T36] audit: type=1400 audit(1752388354.500:724): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.896815][ T36] audit: type=1400 audit(1752388356.210:725): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.706714][ T36] audit: type=1400 audit(1752388358.020:726): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.616254][ T36] audit: type=1400 audit(1752388359.930:727): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.626121][ T36] audit: type=1400 audit(1752388361.940:728): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.649987][ T36] audit: type=1400 audit(1752388361.970:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2780]" dev="pipefs" ino=2780 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0