[ 6.697400][ T28] audit: type=1400 audit(1743781623.409:28): avc: denied { write open } for pid=123 comm="dbus-daemon" path="/run/messagebus.pid" dev="tmpfs" ino=414 scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6.703972][ T28] audit: type=1400 audit(1743781623.409:29): avc: denied { getattr } for pid=123 comm="dbus-daemon" path="/run/messagebus.pid" dev="tmpfs" ino=414 scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6.928074][ T28] audit: type=1400 audit(1743781623.669:30): avc: denied { search } for pid=137 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7.569751][ T187] sshd (187) used greatest stack depth: 22224 bytes left [ 12.925025][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 12.925042][ T28] audit: type=1400 audit(1743781629.669:61): avc: denied { transition } for pid=221 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.935179][ T28] audit: type=1400 audit(1743781629.669:62): avc: denied { noatsecure } for pid=221 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.941448][ T28] audit: type=1400 audit(1743781629.669:63): avc: denied { write } for pid=221 comm="sh" path="pipe:[14507]" dev="pipefs" ino=14507 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.957266][ T28] audit: type=1400 audit(1743781629.669:64): avc: denied { rlimitinh } for pid=221 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.975878][ T28] audit: type=1400 audit(1743781629.669:65): avc: denied { siginh } for pid=221 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.135' (ED25519) to the list of known hosts. 2025/04/04 15:47:18 ignoring optional flag "sandboxArg"="0" 2025/04/04 15:47:19 parsed 1 programs [ 22.460697][ T28] audit: type=1400 audit(1743781639.209:66): avc: denied { node_bind } for pid=286 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.343895][ T28] audit: type=1400 audit(1743781640.089:67): avc: denied { mounton } for pid=295 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.345263][ T295] cgroup: Unknown subsys name 'net' [ 23.366591][ T28] audit: type=1400 audit(1743781640.089:68): avc: denied { mount } for pid=295 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.394032][ T28] audit: type=1400 audit(1743781640.119:69): avc: denied { unmount } for pid=295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.394246][ T295] cgroup: Unknown subsys name 'devices' [ 23.512563][ T295] cgroup: Unknown subsys name 'hugetlb' [ 23.518003][ T295] cgroup: Unknown subsys name 'rlimit' [ 23.623901][ T28] audit: type=1400 audit(1743781640.369:70): avc: denied { setattr } for pid=295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.647042][ T28] audit: type=1400 audit(1743781640.369:71): avc: denied { create } for pid=295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.664631][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.667651][ T28] audit: type=1400 audit(1743781640.369:72): avc: denied { write } for pid=295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.696341][ T28] audit: type=1400 audit(1743781640.369:73): avc: denied { read } for pid=295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.701971][ T295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.716576][ T28] audit: type=1400 audit(1743781640.369:74): avc: denied { module_request } for pid=295 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 23.746431][ T28] audit: type=1400 audit(1743781640.369:75): avc: denied { mounton } for pid=295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.256010][ T302] request_module fs-gadgetfs succeeded, but still no fs? [ 24.582149][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.589010][ T323] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.596774][ T323] device bridge_slave_0 entered promiscuous mode [ 24.604778][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.611676][ T323] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.619106][ T323] device bridge_slave_1 entered promiscuous mode [ 24.640946][ T319] syz-executor (319) used greatest stack depth: 21000 bytes left [ 24.676326][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.683314][ T323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.690468][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.697331][ T323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.720125][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.728005][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.737298][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.747316][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.755511][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.762638][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.771954][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.780751][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.788122][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.802926][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.812663][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.828037][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.841159][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.849590][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.857933][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.867429][ T323] device veth0_vlan entered promiscuous mode [ 24.878311][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.889128][ T323] device veth1_macvtap entered promiscuous mode [ 24.899545][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.909702][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.951054][ T323] syz-executor (323) used greatest stack depth: 20904 bytes left 2025/04/04 15:47:22 executed programs: 0 [ 25.555917][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.562890][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.570092][ T363] device bridge_slave_0 entered promiscuous mode [ 25.577172][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.584315][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.591935][ T363] device bridge_slave_1 entered promiscuous mode [ 25.659952][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.667872][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.676924][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.685263][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.693492][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.700375][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.707865][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.716995][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.725186][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.733313][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.740253][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.752315][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.761754][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.776551][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.787942][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.796223][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.803911][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.813125][ T363] device veth0_vlan entered promiscuous mode [ 25.831414][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.840836][ T363] device veth1_macvtap entered promiscuous mode [ 25.850748][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.859293][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.876351][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.884652][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.332034][ T8] device bridge_slave_1 left promiscuous mode [ 26.338017][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.345584][ T8] device bridge_slave_0 left promiscuous mode [ 26.352654][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.361401][ T8] device veth1_macvtap left promiscuous mode [ 26.367602][ T8] device veth0_vlan left promiscuous mode connection error: failed to recv *flatrpc.ExecutorMessageRawT: read tcp 127.0.0.1:42409->127.0.0.1:59266: read: connection reset by peer [ 27.911080][ T311] device bridge_slave_1 left promiscuous mode [ 27.917017][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.924593][ T311] device bridge_slave_0 left promiscuous mode [ 27.930855][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.938774][ T311] device veth1_macvtap left promiscuous mode [ 27.944902][ T311] device veth0_vlan left promiscuous mode