Warning: Permanently added '10.128.0.161' (ED25519) to the list of known hosts. 2025/07/11 03:28:30 ignoring optional flag "sandboxArg"="0" 2025/07/11 03:28:31 parsed 1 programs [ 43.979194][ T36] audit: type=1400 audit(1752204511.220:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 45.485877][ T36] audit: type=1400 audit(1752204512.730:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 45.487389][ T297] cgroup: Unknown subsys name 'net' [ 45.508563][ T36] audit: type=1400 audit(1752204512.730:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.535896][ T36] audit: type=1400 audit(1752204512.760:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.536079][ T297] cgroup: Unknown subsys name 'devices' [ 45.744079][ T297] cgroup: Unknown subsys name 'hugetlb' [ 45.749962][ T297] cgroup: Unknown subsys name 'rlimit' [ 45.844896][ T36] audit: type=1400 audit(1752204513.090:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 45.868121][ T36] audit: type=1400 audit(1752204513.090:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.888502][ T36] audit: type=1400 audit(1752204513.090:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.900627][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 45.908987][ T36] audit: type=1400 audit(1752204513.090:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.937738][ T36] audit: type=1400 audit(1752204513.090:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 45.958886][ T36] audit: type=1400 audit(1752204513.090:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 45.967693][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.853496][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 47.078079][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.085180][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.092299][ T311] bridge_slave_0: entered allmulticast mode [ 47.098616][ T311] bridge_slave_0: entered promiscuous mode [ 47.105109][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.112175][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.119308][ T311] bridge_slave_1: entered allmulticast mode [ 47.125569][ T311] bridge_slave_1: entered promiscuous mode [ 47.175321][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.182404][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.189668][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.196718][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.216742][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.224076][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.234624][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.241785][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.251200][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.258286][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.282858][ T311] veth0_vlan: entered promiscuous mode [ 47.294332][ T311] veth1_macvtap: entered promiscuous mode [ 47.354639][ T316] bridge_slave_1: left allmulticast mode [ 47.360426][ T316] bridge_slave_1: left promiscuous mode [ 47.366310][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.374078][ T316] bridge_slave_0: left allmulticast mode [ 47.379747][ T316] bridge_slave_0: left promiscuous mode [ 47.386253][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.493069][ T316] veth1_macvtap: left promiscuous mode [ 47.498638][ T316] veth0_vlan: left promiscuous mode 2025/07/11 03:28:35 executed programs: 0 [ 48.282480][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.289562][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.296707][ T361] bridge_slave_0: entered allmulticast mode [ 48.303141][ T361] bridge_slave_0: entered promiscuous mode [ 48.309633][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.316769][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.323897][ T361] bridge_slave_1: entered allmulticast mode [ 48.333216][ T361] bridge_slave_1: entered promiscuous mode [ 48.388283][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.395364][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.402684][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.409725][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.433153][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.440435][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.450102][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.457190][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.468444][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.475554][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.502118][ T361] veth0_vlan: entered promiscuous mode [ 48.514458][ T361] veth1_macvtap: entered promiscuous mode [ 48.995879][ T36] kauditd_printk_skb: 59 callbacks suppressed [ 48.995896][ T36] audit: type=1400 audit(1752204516.240:133): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.026301][ T36] audit: type=1400 audit(1752204516.250:134): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.050371][ T36] audit: type=1400 audit(1752204516.250:135): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.077435][ T36] audit: type=1400 audit(1752204516.320:136): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.101524][ T36] audit: type=1400 audit(1752204516.330:137): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.126045][ T36] audit: type=1400 audit(1752204516.330:138): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.153618][ T36] audit: type=1400 audit(1752204516.400:139): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.177566][ T36] audit: type=1400 audit(1752204516.410:140): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.201590][ T36] audit: type=1400 audit(1752204516.420:141): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.228786][ T36] audit: type=1400 audit(1752204516.470:142): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.025922][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 54.025939][ T36] audit: type=1400 audit(1752204521.270:431): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.056087][ T36] audit: type=1400 audit(1752204521.290:432): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.080333][ T36] audit: type=1400 audit(1752204521.290:433): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.104297][ T36] audit: type=1400 audit(1752204521.330:434): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.128239][ T36] audit: type=1400 audit(1752204521.340:435): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.152379][ T36] audit: type=1400 audit(1752204521.350:436): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.180405][ T36] audit: type=1400 audit(1752204521.420:437): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.204424][ T36] audit: type=1400 audit(1752204521.430:438): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.228467][ T36] audit: type=1400 audit(1752204521.440:439): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.255560][ T36] audit: type=1400 audit(1752204521.500:440): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.773664][ T316] bridge_slave_1: left allmulticast mode [ 58.779350][ T316] bridge_slave_1: left promiscuous mode [ 58.785216][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.792820][ T316] bridge_slave_0: left allmulticast mode [ 58.798460][ T316] bridge_slave_0: left promiscuous mode [ 58.804118][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.893965][ T316] veth1_macvtap: left promiscuous mode [ 58.899569][ T316] veth0_vlan: left promiscuous mode [ 59.145080][ T36] kauditd_printk_skb: 271 callbacks suppressed [ 59.145097][ T36] audit: type=1400 audit(1752204526.390:712): avc: denied { execmem } for pid=970 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.653896][ T36] audit: type=1400 audit(1752204526.900:713): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.262724][ T36] audit: type=1400 audit(1752204527.510:714): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.971053][ T36] audit: type=1400 audit(1752204528.210:715): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.779679][ T36] audit: type=1400 audit(1752204529.020:716): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.688325][ T36] audit: type=1400 audit(1752204529.930:717): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.696837][ T36] audit: type=1400 audit(1752204530.940:718): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.805424][ T36] audit: type=1400 audit(1752204532.050:719): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.014027][ T36] audit: type=1400 audit(1752204533.260:720): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.322743][ T36] audit: type=1400 audit(1752204534.570:721): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.731414][ T36] audit: type=1400 audit(1752204535.980:722): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.240020][ T36] audit: type=1400 audit(1752204537.480:723): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.848557][ T36] audit: type=1400 audit(1752204539.090:724): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.557061][ T36] audit: type=1400 audit(1752204540.800:725): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.365612][ T36] audit: type=1400 audit(1752204542.610:726): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.274525][ T36] audit: type=1400 audit(1752204544.520:727): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.283052][ T36] audit: type=1400 audit(1752204546.530:728): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.305791][ T36] audit: type=1400 audit(1752204546.550:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1891]" dev="pipefs" ino=1891 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0