Warning: Permanently added '10.128.0.32' (ED25519) to the list of known hosts. 2025/07/18 06:52:04 ignoring optional flag "sandboxArg"="0" 2025/07/18 06:52:05 parsed 1 programs [ 43.541360][ T36] audit: type=1400 audit(1752821525.430:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 45.071799][ T36] audit: type=1400 audit(1752821526.960:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 45.073292][ T297] cgroup: Unknown subsys name 'net' [ 45.094990][ T36] audit: type=1400 audit(1752821526.960:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.122436][ T36] audit: type=1400 audit(1752821526.990:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.122641][ T297] cgroup: Unknown subsys name 'devices' [ 45.287155][ T297] cgroup: Unknown subsys name 'hugetlb' [ 45.292820][ T297] cgroup: Unknown subsys name 'rlimit' [ 45.448057][ T36] audit: type=1400 audit(1752821527.340:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 45.471299][ T36] audit: type=1400 audit(1752821527.340:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.484549][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 45.491894][ T36] audit: type=1400 audit(1752821527.340:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.520532][ T36] audit: type=1400 audit(1752821527.340:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.540771][ T36] audit: type=1400 audit(1752821527.340:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 45.561785][ T36] audit: type=1400 audit(1752821527.340:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 45.595324][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.478350][ T301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 46.614074][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.621200][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.628365][ T306] bridge_slave_0: entered allmulticast mode [ 46.634764][ T306] bridge_slave_0: entered promiscuous mode [ 46.641212][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.648332][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.655467][ T306] bridge_slave_1: entered allmulticast mode [ 46.661718][ T306] bridge_slave_1: entered promiscuous mode [ 46.712893][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.719981][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.727333][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.734419][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.755698][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.763120][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.772939][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.780031][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.795904][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.802972][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.821249][ T306] veth0_vlan: entered promiscuous mode [ 46.832979][ T306] veth1_macvtap: entered promiscuous mode [ 46.896838][ T13] bridge_slave_1: left allmulticast mode [ 46.902604][ T13] bridge_slave_1: left promiscuous mode [ 46.908688][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.916646][ T13] bridge_slave_0: left allmulticast mode [ 46.922326][ T13] bridge_slave_0: left promiscuous mode [ 46.928446][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.084867][ T13] veth1_macvtap: left promiscuous mode [ 47.090497][ T13] veth0_vlan: left promiscuous mode 2025/07/18 06:52:09 executed programs: 0 [ 47.947659][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.954986][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.962049][ T359] bridge_slave_0: entered allmulticast mode [ 47.968448][ T359] bridge_slave_0: entered promiscuous mode [ 47.974894][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.981942][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.989485][ T359] bridge_slave_1: entered allmulticast mode [ 47.996050][ T359] bridge_slave_1: entered promiscuous mode [ 48.052165][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.059317][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.066653][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.073708][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.095720][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.103051][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.112259][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.119344][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.136124][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.143191][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.160199][ T359] veth0_vlan: entered promiscuous mode [ 48.171932][ T359] veth1_macvtap: entered promiscuous mode [ 48.548691][ T36] kauditd_printk_skb: 53 callbacks suppressed [ 48.548710][ T36] audit: type=1400 audit(1752821530.440:127): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.578950][ T36] audit: type=1400 audit(1752821530.450:128): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.603087][ T36] audit: type=1400 audit(1752821530.450:129): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.627053][ T36] audit: type=1400 audit(1752821530.500:130): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.651179][ T36] audit: type=1400 audit(1752821530.500:131): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.675279][ T36] audit: type=1400 audit(1752821530.520:132): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.700639][ T36] audit: type=1400 audit(1752821530.540:133): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.724776][ T36] audit: type=1400 audit(1752821530.540:134): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.748931][ T36] audit: type=1400 audit(1752821530.590:135): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.773154][ T36] audit: type=1400 audit(1752821530.590:136): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.588815][ T36] kauditd_printk_skb: 291 callbacks suppressed [ 53.588833][ T36] audit: type=1400 audit(1752821535.480:428): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.619067][ T36] audit: type=1400 audit(1752821535.490:429): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.643123][ T36] audit: type=1400 audit(1752821535.490:430): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.671321][ T36] audit: type=1400 audit(1752821535.560:431): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.695406][ T36] audit: type=1400 audit(1752821535.570:432): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.719488][ T36] audit: type=1400 audit(1752821535.580:433): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.743557][ T36] audit: type=1400 audit(1752821535.610:434): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.767851][ T36] audit: type=1400 audit(1752821535.610:435): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.791958][ T36] audit: type=1400 audit(1752821535.650:436): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.815940][ T36] audit: type=1400 audit(1752821535.660:437): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.342665][ T307] bridge_slave_1: left allmulticast mode [ 58.348406][ T307] bridge_slave_1: left promiscuous mode [ 58.354021][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.361702][ T307] bridge_slave_0: left allmulticast mode [ 58.367460][ T307] bridge_slave_0: left promiscuous mode [ 58.373072][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.497015][ T307] veth1_macvtap: left promiscuous mode [ 58.502553][ T307] veth0_vlan: left promiscuous mode [ 58.707364][ T36] kauditd_printk_skb: 274 callbacks suppressed [ 58.707385][ T36] audit: type=1400 audit(1752821540.600:712): avc: denied { execmem } for pid=969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.215829][ T36] audit: type=1400 audit(1752821541.110:713): avc: denied { execmem } for pid=970 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.825313][ T36] audit: type=1400 audit(1752821541.720:714): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.534394][ T36] audit: type=1400 audit(1752821542.420:715): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.343055][ T36] audit: type=1400 audit(1752821543.230:716): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.251756][ T36] audit: type=1400 audit(1752821544.140:717): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.260485][ T36] audit: type=1400 audit(1752821545.150:718): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.369408][ T36] audit: type=1400 audit(1752821546.260:719): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.578323][ T36] audit: type=1400 audit(1752821547.470:720): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.887200][ T36] audit: type=1400 audit(1752821548.780:721): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.296028][ T36] audit: type=1400 audit(1752821550.190:722): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.804707][ T36] audit: type=1400 audit(1752821551.700:723): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.413243][ T36] audit: type=1400 audit(1752821553.300:724): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.122336][ T36] audit: type=1400 audit(1752821555.010:725): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 74.931041][ T36] audit: type=1400 audit(1752821556.820:726): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 76.839657][ T36] audit: type=1400 audit(1752821558.730:727): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 78.848360][ T36] audit: type=1400 audit(1752821560.740:728): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 78.872129][ T36] audit: type=1400 audit(1752821560.760:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[563]" dev="pipefs" ino=563 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0