Warning: Permanently added '10.128.1.120' (ED25519) to the list of known hosts. 2025/06/21 00:10:19 ignoring optional flag "sandboxArg"="0" 2025/06/21 00:10:20 parsed 1 programs [ 311.053677][ T36] audit: type=1400 audit(1750464620.790:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 312.456934][ T36] audit: type=1400 audit(1750464622.190:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 312.458438][ T297] cgroup: Unknown subsys name 'net' [ 312.479633][ T36] audit: type=1400 audit(1750464622.190:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 312.506969][ T36] audit: type=1400 audit(1750464622.220:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 312.507221][ T297] cgroup: Unknown subsys name 'devices' [ 312.615858][ T297] cgroup: Unknown subsys name 'hugetlb' [ 312.621487][ T297] cgroup: Unknown subsys name 'rlimit' [ 312.757489][ T36] audit: type=1400 audit(1750464622.490:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 312.780903][ T36] audit: type=1400 audit(1750464622.490:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 312.801470][ T36] audit: type=1400 audit(1750464622.490:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 312.812789][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 312.821944][ T36] audit: type=1400 audit(1750464622.490:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 312.850621][ T36] audit: type=1400 audit(1750464622.490:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 312.871836][ T36] audit: type=1400 audit(1750464622.490:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 312.902035][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 313.785159][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 314.587030][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.594119][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.601625][ T344] bridge_slave_0: entered allmulticast mode [ 314.608101][ T344] bridge_slave_0: entered promiscuous mode [ 314.617001][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.624123][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.631188][ T344] bridge_slave_1: entered allmulticast mode [ 314.637687][ T344] bridge_slave_1: entered promiscuous mode [ 314.691707][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.698804][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.706134][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.713174][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.734794][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.742072][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.751443][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.758542][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.768239][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.775362][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.799992][ T344] veth0_vlan: entered promiscuous mode [ 314.811105][ T344] veth1_macvtap: entered promiscuous mode [ 314.877069][ T46] bridge_slave_1: left allmulticast mode [ 314.882778][ T46] bridge_slave_1: left promiscuous mode [ 314.888673][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.896396][ T46] bridge_slave_0: left allmulticast mode [ 314.902060][ T46] bridge_slave_0: left promiscuous mode [ 314.907733][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.112447][ T46] veth1_macvtap: left promiscuous mode [ 315.118152][ T46] veth0_vlan: left promiscuous mode 2025/06/21 00:10:24 executed programs: 0 [ 315.306032][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.313096][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.320255][ T361] bridge_slave_0: entered allmulticast mode [ 315.326549][ T361] bridge_slave_0: entered promiscuous mode [ 315.333028][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.340221][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.347347][ T361] bridge_slave_1: entered allmulticast mode [ 315.353829][ T361] bridge_slave_1: entered promiscuous mode [ 315.441155][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.448280][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.457898][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.464979][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.513692][ T361] veth0_vlan: entered promiscuous mode [ 315.525495][ T361] veth1_macvtap: entered promiscuous mode [ 316.078140][ T36] kauditd_printk_skb: 62 callbacks suppressed [ 316.078157][ T36] audit: type=1400 audit(1750464625.810:136): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.108443][ T36] audit: type=1400 audit(1750464625.830:137): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.132585][ T36] audit: type=1400 audit(1750464625.830:138): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.156783][ T36] audit: type=1400 audit(1750464625.870:139): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.181569][ T36] audit: type=1400 audit(1750464625.870:140): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.205644][ T36] audit: type=1400 audit(1750464625.920:141): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.231203][ T36] audit: type=1400 audit(1750464625.920:142): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.255344][ T36] audit: type=1400 audit(1750464625.960:143): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.279337][ T36] audit: type=1400 audit(1750464625.990:144): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.303383][ T36] audit: type=1400 audit(1750464625.990:145): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.117804][ T36] kauditd_printk_skb: 290 callbacks suppressed [ 321.117821][ T36] audit: type=1400 audit(1750464630.850:436): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.148023][ T36] audit: type=1400 audit(1750464630.860:437): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.172246][ T36] audit: type=1400 audit(1750464630.860:438): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.196261][ T36] audit: type=1400 audit(1750464630.910:439): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.220218][ T36] audit: type=1400 audit(1750464630.920:440): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.244163][ T36] audit: type=1400 audit(1750464630.940:441): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.268225][ T36] audit: type=1400 audit(1750464630.980:442): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.292358][ T36] audit: type=1400 audit(1750464630.980:443): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.316299][ T36] audit: type=1400 audit(1750464631.010:444): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.340412][ T36] audit: type=1400 audit(1750464631.060:445): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.752811][ T336] bridge_slave_1: left allmulticast mode [ 325.758527][ T336] bridge_slave_1: left promiscuous mode [ 325.764189][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.771826][ T336] bridge_slave_0: left allmulticast mode [ 325.777634][ T336] bridge_slave_0: left promiscuous mode [ 325.783262][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.906318][ T336] veth1_macvtap: left promiscuous mode [ 325.911846][ T336] veth0_vlan: left promiscuous mode [ 326.126724][ T36] kauditd_printk_skb: 266 callbacks suppressed [ 326.126742][ T36] audit: type=1400 audit(1750464635.860:712): avc: denied { execmem } for pid=970 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 326.635452][ T36] audit: type=1400 audit(1750464636.370:713): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 327.244796][ T36] audit: type=1400 audit(1750464636.980:714): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 327.953491][ T36] audit: type=1400 audit(1750464637.690:715): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 328.762101][ T36] audit: type=1400 audit(1750464638.500:716): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 329.671064][ T36] audit: type=1400 audit(1750464639.400:717): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 330.679744][ T36] audit: type=1400 audit(1750464640.410:718): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 331.788209][ T36] audit: type=1400 audit(1750464641.520:719): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 332.996679][ T36] audit: type=1400 audit(1750464642.730:720): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 334.305266][ T36] audit: type=1400 audit(1750464644.040:721): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 335.713879][ T36] audit: type=1400 audit(1750464645.450:722): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 337.222668][ T36] audit: type=1400 audit(1750464646.960:723): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 338.831257][ T36] audit: type=1400 audit(1750464648.570:724): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 340.539769][ T36] audit: type=1400 audit(1750464650.270:725): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 342.348271][ T36] audit: type=1400 audit(1750464652.080:726): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 344.256642][ T36] audit: type=1400 audit(1750464653.990:727): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 346.265245][ T36] audit: type=1400 audit(1750464656.000:728): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 346.288194][ T36] audit: type=1400 audit(1750464656.020:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2546]" dev="pipefs" ino=2546 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0