Warning: Permanently added '10.128.0.65' (ED25519) to the list of known hosts. 2025/07/13 04:52:54 ignoring optional flag "sandboxArg"="0" 2025/07/13 04:52:55 parsed 1 programs [ 41.064397][ T36] audit: type=1400 audit(1752382375.010:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 42.617493][ T36] audit: type=1400 audit(1752382376.570:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 42.619214][ T298] cgroup: Unknown subsys name 'net' [ 42.640264][ T36] audit: type=1400 audit(1752382376.570:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 42.668014][ T36] audit: type=1400 audit(1752382376.590:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 42.668278][ T298] cgroup: Unknown subsys name 'devices' [ 42.850054][ T298] cgroup: Unknown subsys name 'hugetlb' [ 42.855826][ T298] cgroup: Unknown subsys name 'rlimit' [ 43.011023][ T36] audit: type=1400 audit(1752382376.960:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.035916][ T36] audit: type=1400 audit(1752382376.960:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.058427][ T36] audit: type=1400 audit(1752382376.960:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.073672][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 43.082052][ T36] audit: type=1400 audit(1752382376.960:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.112420][ T36] audit: type=1400 audit(1752382376.960:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 43.135398][ T36] audit: type=1400 audit(1752382376.960:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 43.139105][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.167178][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.174417][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.181700][ T308] bridge_slave_0: entered allmulticast mode [ 44.188369][ T308] bridge_slave_0: entered promiscuous mode [ 44.195255][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.202469][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.209692][ T308] bridge_slave_1: entered allmulticast mode [ 44.216154][ T308] bridge_slave_1: entered promiscuous mode [ 44.268362][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.275462][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.282968][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.290311][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.313073][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.320467][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.331084][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.338200][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.347905][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.354973][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.381280][ T308] veth0_vlan: entered promiscuous mode [ 44.395218][ T308] veth1_macvtap: entered promiscuous mode [ 44.420778][ T308] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 44.459026][ T12] bridge_slave_1: left allmulticast mode [ 44.468597][ T12] bridge_slave_1: left promiscuous mode [ 44.476238][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.484425][ T12] bridge_slave_0: left allmulticast mode [ 44.490676][ T12] bridge_slave_0: left promiscuous mode [ 44.497712][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.608338][ T12] veth1_macvtap: left promiscuous mode [ 44.614116][ T12] veth0_vlan: left promiscuous mode 2025/07/13 04:52:59 executed programs: 0 [ 45.544199][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.551807][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.559797][ T361] bridge_slave_0: entered allmulticast mode [ 45.566857][ T361] bridge_slave_0: entered promiscuous mode [ 45.574694][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.582820][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.591444][ T361] bridge_slave_1: entered allmulticast mode [ 45.599969][ T361] bridge_slave_1: entered promiscuous mode [ 45.657337][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.664855][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.673843][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.681568][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.710380][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.717981][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.728383][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.735792][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.745044][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.752590][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.780594][ T361] veth0_vlan: entered promiscuous mode [ 45.792043][ T361] veth1_macvtap: entered promiscuous mode [ 46.072705][ T36] kauditd_printk_skb: 47 callbacks suppressed [ 46.072724][ T36] audit: type=1400 audit(1752382380.020:121): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.104013][ T36] audit: type=1400 audit(1752382380.030:122): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.128470][ T36] audit: type=1400 audit(1752382380.030:123): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.156671][ T36] audit: type=1400 audit(1752382380.110:124): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.182379][ T36] audit: type=1400 audit(1752382380.110:125): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.207252][ T36] audit: type=1400 audit(1752382380.110:126): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.232169][ T36] audit: type=1400 audit(1752382380.160:127): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.257435][ T36] audit: type=1400 audit(1752382380.160:128): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.284376][ T36] audit: type=1400 audit(1752382380.190:129): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.309036][ T36] audit: type=1400 audit(1752382380.210:130): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.082276][ T36] kauditd_printk_skb: 286 callbacks suppressed [ 51.082294][ T36] audit: type=1400 audit(1752382385.030:417): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.113480][ T36] audit: type=1400 audit(1752382385.040:418): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.141313][ T36] audit: type=1400 audit(1752382385.090:419): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.166299][ T36] audit: type=1400 audit(1752382385.110:420): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.191210][ T36] audit: type=1400 audit(1752382385.110:421): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.217091][ T36] audit: type=1400 audit(1752382385.150:422): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.246711][ T36] audit: type=1400 audit(1752382385.150:423): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.275895][ T36] audit: type=1400 audit(1752382385.170:424): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.300627][ T36] audit: type=1400 audit(1752382385.230:425): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.325030][ T36] audit: type=1400 audit(1752382385.260:426): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 56.041302][ T319] bridge_slave_1: left allmulticast mode [ 56.048372][ T319] bridge_slave_1: left promiscuous mode [ 56.054109][ T319] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.062296][ T319] bridge_slave_0: left allmulticast mode [ 56.068044][ T319] bridge_slave_0: left promiscuous mode [ 56.073829][ T319] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.199752][ T319] veth1_macvtap: left promiscuous mode [ 56.205294][ T319] veth0_vlan: left promiscuous mode [ 56.421140][ T36] kauditd_printk_skb: 285 callbacks suppressed [ 56.421160][ T36] audit: type=1400 audit(1752382390.370:712): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.936533][ T36] audit: type=1400 audit(1752382390.880:713): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.546090][ T36] audit: type=1400 audit(1752382391.490:714): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.254829][ T36] audit: type=1400 audit(1752382392.200:715): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.064004][ T36] audit: type=1400 audit(1752382393.010:716): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.972779][ T36] audit: type=1400 audit(1752382393.920:717): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.983539][ T36] audit: type=1400 audit(1752382394.930:718): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.092331][ T36] audit: type=1400 audit(1752382396.040:719): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.301613][ T36] audit: type=1400 audit(1752382397.250:720): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.610393][ T36] audit: type=1400 audit(1752382398.560:721): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.019680][ T36] audit: type=1400 audit(1752382399.970:722): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.529322][ T36] audit: type=1400 audit(1752382401.480:723): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.138499][ T36] audit: type=1400 audit(1752382403.090:724): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.847232][ T36] audit: type=1400 audit(1752382404.800:725): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.656137][ T36] audit: type=1400 audit(1752382406.600:726): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 74.564879][ T36] audit: type=1400 audit(1752382408.510:727): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 76.574422][ T36] audit: type=1400 audit(1752382410.520:728): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 76.598071][ T36] audit: type=1400 audit(1752382410.550:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1752]" dev="pipefs" ino=1752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0