Warning: Permanently added '10.128.0.30' (ED25519) to the list of known hosts. 2025/07/16 23:19:21 ignoring optional flag "sandboxArg"="0" 2025/07/16 23:19:22 parsed 1 programs [ 44.659649][ T36] audit: type=1400 audit(1752707962.170:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 46.095558][ T36] audit: type=1400 audit(1752707963.610:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 46.096880][ T298] cgroup: Unknown subsys name 'net' [ 46.118221][ T36] audit: type=1400 audit(1752707963.610:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 46.145546][ T36] audit: type=1400 audit(1752707963.640:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 46.145749][ T298] cgroup: Unknown subsys name 'devices' [ 46.293045][ T298] cgroup: Unknown subsys name 'hugetlb' [ 46.298677][ T298] cgroup: Unknown subsys name 'rlimit' [ 46.473331][ T36] audit: type=1400 audit(1752707963.990:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.496504][ T36] audit: type=1400 audit(1752707963.990:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.516926][ T36] audit: type=1400 audit(1752707963.990:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.527120][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 46.537314][ T36] audit: type=1400 audit(1752707963.990:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.565921][ T36] audit: type=1400 audit(1752707963.990:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 46.586915][ T36] audit: type=1400 audit(1752707963.990:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 46.616746][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.482194][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.489262][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.496372][ T302] bridge_slave_0: entered allmulticast mode [ 47.502796][ T302] bridge_slave_0: entered promiscuous mode [ 47.509456][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.516656][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.523753][ T302] bridge_slave_1: entered allmulticast mode [ 47.530106][ T302] bridge_slave_1: entered promiscuous mode [ 47.591134][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.598193][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.605492][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.612548][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.633932][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.641253][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.651227][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.658247][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.667538][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.674575][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.699179][ T302] veth0_vlan: entered promiscuous mode [ 47.709747][ T302] veth1_macvtap: entered promiscuous mode [ 47.733709][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 47.773203][ T307] bridge_slave_1: left allmulticast mode [ 47.778978][ T307] bridge_slave_1: left promiscuous mode [ 47.784619][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.792272][ T307] bridge_slave_0: left allmulticast mode [ 47.797918][ T307] bridge_slave_0: left promiscuous mode [ 47.804044][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.940996][ T307] veth1_macvtap: left promiscuous mode [ 47.946551][ T307] veth0_vlan: left promiscuous mode 2025/07/16 23:19:26 executed programs: 0 [ 48.765138][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.772497][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.779570][ T361] bridge_slave_0: entered allmulticast mode [ 48.785897][ T361] bridge_slave_0: entered promiscuous mode [ 48.792836][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.799894][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.807006][ T361] bridge_slave_1: entered allmulticast mode [ 48.813322][ T361] bridge_slave_1: entered promiscuous mode [ 48.881042][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.888130][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.895423][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.902482][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.926595][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.933907][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.942811][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.949858][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.959299][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.966351][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.994972][ T361] veth0_vlan: entered promiscuous mode [ 49.005574][ T361] veth1_macvtap: entered promiscuous mode [ 49.684267][ T36] kauditd_printk_skb: 71 callbacks suppressed [ 49.684285][ T36] audit: type=1400 audit(1752707967.200:145): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.714383][ T36] audit: type=1400 audit(1752707967.210:146): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.738868][ T36] audit: type=1400 audit(1752707967.210:147): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.762867][ T36] audit: type=1400 audit(1752707967.260:148): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.786864][ T36] audit: type=1400 audit(1752707967.270:149): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.810786][ T36] audit: type=1400 audit(1752707967.280:150): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.834801][ T36] audit: type=1400 audit(1752707967.300:151): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.859246][ T36] audit: type=1400 audit(1752707967.330:152): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.883204][ T36] audit: type=1400 audit(1752707967.350:153): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.907141][ T36] audit: type=1400 audit(1752707967.350:154): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.694183][ T36] kauditd_printk_skb: 289 callbacks suppressed [ 54.694200][ T36] audit: type=1400 audit(1752707972.210:444): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.724439][ T36] audit: type=1400 audit(1752707972.220:445): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.748427][ T36] audit: type=1400 audit(1752707972.220:446): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.775673][ T36] audit: type=1400 audit(1752707972.290:447): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.799599][ T36] audit: type=1400 audit(1752707972.300:448): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.823609][ T36] audit: type=1400 audit(1752707972.300:449): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.847540][ T36] audit: type=1400 audit(1752707972.340:450): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.871598][ T36] audit: type=1400 audit(1752707972.340:451): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.895510][ T36] audit: type=1400 audit(1752707972.370:452): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.919440][ T36] audit: type=1400 audit(1752707972.390:453): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 59.184599][ T317] bridge_slave_1: left allmulticast mode [ 59.190269][ T317] bridge_slave_1: left promiscuous mode [ 59.195997][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.203458][ T317] bridge_slave_0: left allmulticast mode [ 59.209099][ T317] bridge_slave_0: left promiscuous mode [ 59.214710][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.322048][ T317] veth1_macvtap: left promiscuous mode [ 59.327561][ T317] veth0_vlan: left promiscuous mode [ 60.039838][ T36] kauditd_printk_skb: 259 callbacks suppressed [ 60.039855][ T36] audit: type=1400 audit(1752707977.550:713): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.647731][ T36] audit: type=1400 audit(1752707978.160:714): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.355791][ T36] audit: type=1400 audit(1752707978.870:715): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.164226][ T36] audit: type=1400 audit(1752707979.680:716): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.072109][ T36] audit: type=1400 audit(1752707980.590:717): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.080062][ T36] audit: type=1400 audit(1752707981.590:718): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.187956][ T36] audit: type=1400 audit(1752707982.700:719): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.396102][ T36] audit: type=1400 audit(1752707983.910:720): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.704171][ T36] audit: type=1400 audit(1752707985.220:721): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.112239][ T36] audit: type=1400 audit(1752707986.630:722): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.620328][ T36] audit: type=1400 audit(1752707988.130:723): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.228083][ T36] audit: type=1400 audit(1752707989.740:724): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.935988][ T36] audit: type=1400 audit(1752707991.450:725): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.744193][ T36] audit: type=1400 audit(1752707993.260:726): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.652326][ T36] audit: type=1400 audit(1752707995.170:727): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.660431][ T36] audit: type=1400 audit(1752707997.170:728): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.682731][ T36] audit: type=1400 audit(1752707997.200:729): avc: denied { write } for pid=290 comm="syz-execprog" path="pipe:[1580]" dev="pipefs" ino=1580 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0