Warning: Permanently added '10.128.1.173' (ED25519) to the list of known hosts. 2025/07/08 07:48:08 ignoring optional flag "sandboxArg"="0" 2025/07/08 07:48:09 parsed 1 programs [ 30.623925][ T36] audit: type=1400 audit(1751960889.150:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 31.590201][ T36] audit: type=1400 audit(1751960890.120:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 31.591529][ T297] cgroup: Unknown subsys name 'net' [ 31.612867][ T36] audit: type=1400 audit(1751960890.120:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.640168][ T36] audit: type=1400 audit(1751960890.140:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.640374][ T297] cgroup: Unknown subsys name 'devices' [ 31.861249][ T297] cgroup: Unknown subsys name 'hugetlb' [ 31.866895][ T297] cgroup: Unknown subsys name 'rlimit' [ 32.020574][ T36] audit: type=1400 audit(1751960890.550:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 32.043770][ T36] audit: type=1400 audit(1751960890.550:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.052553][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 32.064495][ T36] audit: type=1400 audit(1751960890.550:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.093101][ T36] audit: type=1400 audit(1751960890.550:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.113307][ T36] audit: type=1400 audit(1751960890.550:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 32.121417][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 32.134265][ T36] audit: type=1400 audit(1751960890.550:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.064703][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.553990][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.561091][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.568138][ T342] bridge_slave_0: entered allmulticast mode [ 33.574425][ T342] bridge_slave_0: entered promiscuous mode [ 33.581609][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.588622][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.595685][ T342] bridge_slave_1: entered allmulticast mode [ 33.602002][ T342] bridge_slave_1: entered promiscuous mode [ 33.664647][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.671733][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.679001][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.686016][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.708879][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.716238][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.725137][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.732188][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.741790][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.748815][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.774255][ T342] veth0_vlan: entered promiscuous mode [ 33.785037][ T342] veth1_macvtap: entered promiscuous mode [ 33.840851][ T46] bridge_slave_1: left allmulticast mode [ 33.846534][ T46] bridge_slave_1: left promiscuous mode [ 33.852373][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.860285][ T46] bridge_slave_0: left allmulticast mode [ 33.865927][ T46] bridge_slave_0: left promiscuous mode [ 33.872100][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.976989][ T46] veth1_macvtap: left promiscuous mode [ 33.984890][ T46] veth0_vlan: left promiscuous mode 2025/07/08 07:48:12 executed programs: 0 [ 34.208363][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.215600][ T360] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.222797][ T360] bridge_slave_0: entered allmulticast mode [ 34.228937][ T360] bridge_slave_0: entered promiscuous mode [ 34.235321][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.242433][ T360] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.249851][ T360] bridge_slave_1: entered allmulticast mode [ 34.256110][ T360] bridge_slave_1: entered promiscuous mode [ 34.298175][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.305230][ T360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.312484][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.319513][ T360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.337776][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.344927][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.354439][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.361477][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.377562][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.384605][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.406081][ T360] veth0_vlan: entered promiscuous mode [ 34.419148][ T360] veth1_macvtap: entered promiscuous mode [ 35.642625][ T36] kauditd_printk_skb: 104 callbacks suppressed [ 35.642641][ T36] audit: type=1400 audit(1751960894.170:178): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.672787][ T36] audit: type=1400 audit(1751960894.190:179): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.697488][ T36] audit: type=1400 audit(1751960894.190:180): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.721844][ T36] audit: type=1400 audit(1751960894.230:181): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.745946][ T36] audit: type=1400 audit(1751960894.230:182): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.770008][ T36] audit: type=1400 audit(1751960894.250:183): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.797474][ T36] audit: type=1400 audit(1751960894.320:184): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.821427][ T36] audit: type=1400 audit(1751960894.340:185): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.845546][ T36] audit: type=1400 audit(1751960894.340:186): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.869582][ T36] audit: type=1400 audit(1751960894.380:187): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.652632][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 40.652647][ T36] audit: type=1400 audit(1751960899.180:476): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.682915][ T36] audit: type=1400 audit(1751960899.200:477): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.707121][ T36] audit: type=1400 audit(1751960899.210:478): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.731103][ T36] audit: type=1400 audit(1751960899.240:479): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.755169][ T36] audit: type=1400 audit(1751960899.240:480): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.779116][ T36] audit: type=1400 audit(1751960899.260:481): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.803159][ T36] audit: type=1400 audit(1751960899.290:482): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.827172][ T36] audit: type=1400 audit(1751960899.300:483): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.851652][ T36] audit: type=1400 audit(1751960899.310:484): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.875773][ T36] audit: type=1400 audit(1751960899.330:485): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.582608][ T46] bridge_slave_1: left allmulticast mode [ 44.588272][ T46] bridge_slave_1: left promiscuous mode [ 44.593915][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.601379][ T46] bridge_slave_0: left allmulticast mode [ 44.607000][ T46] bridge_slave_0: left promiscuous mode [ 44.612744][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.761816][ T46] veth1_macvtap: left promiscuous mode [ 44.767327][ T46] veth0_vlan: left promiscuous mode [ 46.044934][ T36] kauditd_printk_skb: 228 callbacks suppressed [ 46.044950][ T36] audit: type=1400 audit(1751960904.570:714): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.753661][ T36] audit: type=1400 audit(1751960905.280:715): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.560457][ T36] audit: type=1400 audit(1751960906.090:716): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.468529][ T36] audit: type=1400 audit(1751960906.990:717): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.475302][ T36] audit: type=1400 audit(1751960908.000:718): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.582122][ T36] audit: type=1400 audit(1751960909.110:719): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.788828][ T36] audit: type=1400 audit(1751960910.310:720): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.098070][ T36] audit: type=1400 audit(1751960911.620:721): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.523171][ T36] audit: type=1400 audit(1751960913.050:722): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.031956][ T36] audit: type=1400 audit(1751960914.560:723): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.638842][ T36] audit: type=1400 audit(1751960916.160:724): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.345678][ T36] audit: type=1400 audit(1751960917.870:725): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.152537][ T36] audit: type=1400 audit(1751960919.680:726): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.060050][ T36] audit: type=1400 audit(1751960921.590:727): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.066955][ T36] audit: type=1400 audit(1751960923.590:728): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.089786][ T36] audit: type=1400 audit(1751960923.620:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2707]" dev="pipefs" ino=2707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0