Warning: Permanently added '10.128.1.126' (ED25519) to the list of known hosts. 2025/07/28 03:41:07 ignoring optional flag "sandboxArg"="0" 2025/07/28 03:41:08 parsed 1 programs [ 42.733312][ T36] audit: type=1400 audit(1753674068.670:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 44.220042][ T36] audit: type=1400 audit(1753674070.160:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 44.221566][ T297] cgroup: Unknown subsys name 'net' [ 44.242737][ T36] audit: type=1400 audit(1753674070.160:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 44.270250][ T36] audit: type=1400 audit(1753674070.190:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 44.270677][ T297] cgroup: Unknown subsys name 'devices' [ 44.451440][ T297] cgroup: Unknown subsys name 'hugetlb' [ 44.457099][ T297] cgroup: Unknown subsys name 'rlimit' [ 44.611537][ T36] audit: type=1400 audit(1753674070.550:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.634792][ T36] audit: type=1400 audit(1753674070.550:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.655286][ T36] audit: type=1400 audit(1753674070.550:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.666731][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 44.675704][ T36] audit: type=1400 audit(1753674070.550:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.704438][ T36] audit: type=1400 audit(1753674070.550:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 44.725606][ T36] audit: type=1400 audit(1753674070.550:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 44.765025][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.699365][ T301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 46.246303][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.253455][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.260661][ T331] bridge_slave_0: entered allmulticast mode [ 46.267116][ T331] bridge_slave_0: entered promiscuous mode [ 46.274484][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.281563][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.288742][ T331] bridge_slave_1: entered allmulticast mode [ 46.295023][ T331] bridge_slave_1: entered promiscuous mode [ 46.351194][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.358376][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.365655][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.372730][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.400166][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.407748][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.417210][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.424295][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.433899][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.440980][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.467002][ T331] veth0_vlan: entered promiscuous mode [ 46.477321][ T331] veth1_macvtap: entered promiscuous mode [ 46.572045][ T46] bridge_slave_1: left allmulticast mode [ 46.577837][ T46] bridge_slave_1: left promiscuous mode [ 46.583579][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.591300][ T46] bridge_slave_0: left allmulticast mode [ 46.596974][ T46] bridge_slave_0: left promiscuous mode [ 46.602760][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.751705][ T46] veth1_macvtap: left promiscuous mode [ 46.757317][ T46] veth0_vlan: left promiscuous mode 2025/07/28 03:41:13 executed programs: 0 [ 47.192450][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.199645][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.206744][ T367] bridge_slave_0: entered allmulticast mode [ 47.213413][ T367] bridge_slave_0: entered promiscuous mode [ 47.219897][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.227013][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.234176][ T367] bridge_slave_1: entered allmulticast mode [ 47.240500][ T367] bridge_slave_1: entered promiscuous mode [ 47.318982][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.326082][ T367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.333443][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.340559][ T367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.365409][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.372879][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.382161][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.389238][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.398929][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.405989][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.435605][ T367] veth0_vlan: entered promiscuous mode [ 47.446726][ T367] veth1_macvtap: entered promiscuous mode [ 47.773063][ T36] kauditd_printk_skb: 50 callbacks suppressed [ 47.773083][ T36] audit: type=1400 audit(1753674073.710:124): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.803434][ T36] audit: type=1400 audit(1753674073.720:125): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.827647][ T36] audit: type=1400 audit(1753674073.730:126): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.851688][ T36] audit: type=1400 audit(1753674073.770:127): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.875963][ T36] audit: type=1400 audit(1753674073.800:128): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.899968][ T36] audit: type=1400 audit(1753674073.800:129): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.924031][ T36] audit: type=1400 audit(1753674073.820:130): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.948277][ T36] audit: type=1400 audit(1753674073.840:131): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.972487][ T36] audit: type=1400 audit(1753674073.840:132): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.996674][ T36] audit: type=1400 audit(1753674073.870:133): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.780491][ T36] kauditd_printk_skb: 293 callbacks suppressed [ 52.780510][ T36] audit: type=1400 audit(1753674078.720:427): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.822574][ T36] audit: type=1400 audit(1753674078.760:428): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.846553][ T36] audit: type=1400 audit(1753674078.780:429): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.870757][ T36] audit: type=1400 audit(1753674078.790:430): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.898915][ T36] audit: type=1400 audit(1753674078.840:431): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.922958][ T36] audit: type=1400 audit(1753674078.850:432): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.947090][ T36] audit: type=1400 audit(1753674078.860:433): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.976211][ T36] audit: type=1400 audit(1753674078.920:434): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.000547][ T36] audit: type=1400 audit(1753674078.940:435): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.024668][ T36] audit: type=1400 audit(1753674078.940:436): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.600504][ T46] bridge_slave_1: left allmulticast mode [ 57.606205][ T46] bridge_slave_1: left promiscuous mode [ 57.611934][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.619495][ T46] bridge_slave_0: left allmulticast mode [ 57.625159][ T46] bridge_slave_0: left promiscuous mode [ 57.630995][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.741630][ T46] veth1_macvtap: left promiscuous mode [ 57.747278][ T46] veth0_vlan: left promiscuous mode [ 57.980219][ T36] kauditd_printk_skb: 275 callbacks suppressed [ 57.980238][ T36] audit: type=1400 audit(1753674083.920:712): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.489667][ T36] audit: type=1400 audit(1753674084.430:713): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.098434][ T36] audit: type=1400 audit(1753674085.040:714): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.807065][ T36] audit: type=1400 audit(1753674085.750:715): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.616055][ T36] audit: type=1400 audit(1753674086.550:716): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.525006][ T36] audit: type=1400 audit(1753674087.460:717): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.533744][ T36] audit: type=1400 audit(1753674088.470:718): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.643237][ T36] audit: type=1400 audit(1753674089.580:719): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.852689][ T36] audit: type=1400 audit(1753674090.790:720): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.162461][ T36] audit: type=1400 audit(1753674092.100:721): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.572660][ T36] audit: type=1400 audit(1753674093.510:722): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.081316][ T36] audit: type=1400 audit(1753674095.020:723): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.690195][ T36] audit: type=1400 audit(1753674096.630:724): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.399024][ T36] audit: type=1400 audit(1753674098.340:725): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 74.207675][ T36] audit: type=1400 audit(1753674100.150:726): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 76.116763][ T36] audit: type=1400 audit(1753674102.060:727): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 78.126339][ T36] audit: type=1400 audit(1753674104.060:728): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 78.149757][ T36] audit: type=1400 audit(1753674104.090:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1784]" dev="pipefs" ino=1784 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0