Warning: Permanently added '10.128.0.75' (ED25519) to the list of known hosts. 2025/07/01 14:36:39 ignoring optional flag "sandboxArg"="0" 2025/07/01 14:36:40 parsed 1 programs [ 23.640031][ T36] audit: type=1400 audit(1751380600.660:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 25.243806][ T36] audit: type=1400 audit(1751380602.260:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.245475][ T297] cgroup: Unknown subsys name 'net' [ 25.266759][ T36] audit: type=1400 audit(1751380602.260:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.294125][ T36] audit: type=1400 audit(1751380602.290:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.294391][ T297] cgroup: Unknown subsys name 'devices' [ 25.501158][ T297] cgroup: Unknown subsys name 'hugetlb' [ 25.506808][ T297] cgroup: Unknown subsys name 'rlimit' [ 25.663304][ T36] audit: type=1400 audit(1751380602.680:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.686849][ T36] audit: type=1400 audit(1751380602.680:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.699035][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.707604][ T36] audit: type=1400 audit(1751380602.680:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.738150][ T36] audit: type=1400 audit(1751380602.680:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.755364][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.758392][ T36] audit: type=1400 audit(1751380602.680:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 25.788124][ T36] audit: type=1400 audit(1751380602.680:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.734462][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.987402][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.994593][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.007584][ T311] bridge_slave_0: entered allmulticast mode [ 27.014173][ T311] bridge_slave_0: entered promiscuous mode [ 27.021724][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.029047][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.036337][ T311] bridge_slave_1: entered allmulticast mode [ 27.042897][ T311] bridge_slave_1: entered promiscuous mode [ 27.100746][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.107909][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.115266][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.122345][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.142812][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.150217][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.160294][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.167800][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.176836][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.183926][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.209872][ T311] veth0_vlan: entered promiscuous mode [ 27.221023][ T311] veth1_macvtap: entered promiscuous mode [ 27.272600][ T13] bridge_slave_1: left allmulticast mode [ 27.278315][ T13] bridge_slave_1: left promiscuous mode [ 27.284328][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.292748][ T13] bridge_slave_0: left allmulticast mode [ 27.298412][ T13] bridge_slave_0: left promiscuous mode [ 27.304370][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.431900][ T13] veth1_macvtap: left promiscuous mode [ 27.437505][ T13] veth0_vlan: left promiscuous mode 2025/07/01 14:36:45 executed programs: 0 [ 28.189408][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.196472][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.203594][ T359] bridge_slave_0: entered allmulticast mode [ 28.210078][ T359] bridge_slave_0: entered promiscuous mode [ 28.216514][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.223634][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.230860][ T359] bridge_slave_1: entered allmulticast mode [ 28.237198][ T359] bridge_slave_1: entered promiscuous mode [ 28.290875][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.297943][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.305506][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.312590][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.334643][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.342013][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.351968][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.359072][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.367961][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.375074][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.400823][ T359] veth0_vlan: entered promiscuous mode [ 28.412046][ T359] veth1_macvtap: entered promiscuous mode [ 28.651670][ T36] kauditd_printk_skb: 46 callbacks suppressed [ 28.651689][ T36] audit: type=1400 audit(1751380605.670:120): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.692987][ T36] audit: type=1400 audit(1751380605.710:121): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.717495][ T36] audit: type=1400 audit(1751380605.710:122): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.741900][ T36] audit: type=1400 audit(1751380605.710:123): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.766149][ T36] audit: type=1400 audit(1751380605.780:124): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.791278][ T36] audit: type=1400 audit(1751380605.810:125): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.815446][ T36] audit: type=1400 audit(1751380605.820:126): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.839846][ T36] audit: type=1400 audit(1751380605.830:127): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.864481][ T36] audit: type=1400 audit(1751380605.840:128): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.889150][ T36] audit: type=1400 audit(1751380605.890:129): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.673439][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 33.673457][ T36] audit: type=1400 audit(1751380610.690:418): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.703866][ T36] audit: type=1400 audit(1751380610.710:419): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.728213][ T36] audit: type=1400 audit(1751380610.710:420): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.752195][ T36] audit: type=1400 audit(1751380610.760:421): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.776162][ T36] audit: type=1400 audit(1751380610.760:422): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.800697][ T36] audit: type=1400 audit(1751380610.770:423): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.824881][ T36] audit: type=1400 audit(1751380610.820:424): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.849831][ T36] audit: type=1400 audit(1751380610.840:425): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.874432][ T36] audit: type=1400 audit(1751380610.860:426): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.899134][ T36] audit: type=1400 audit(1751380610.870:427): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.586607][ T312] bridge_slave_1: left allmulticast mode [ 38.592337][ T312] bridge_slave_1: left promiscuous mode [ 38.598031][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.605732][ T312] bridge_slave_0: left allmulticast mode [ 38.611550][ T312] bridge_slave_0: left promiscuous mode [ 38.617355][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.721729][ T312] veth1_macvtap: left promiscuous mode [ 38.727336][ T312] veth0_vlan: left promiscuous mode [ 38.979247][ T36] kauditd_printk_skb: 284 callbacks suppressed [ 38.979265][ T36] audit: type=1400 audit(1751380616.000:712): avc: denied { execmem } for pid=969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 39.488970][ T36] audit: type=1400 audit(1751380616.510:713): avc: denied { execmem } for pid=970 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.098122][ T36] audit: type=1400 audit(1751380617.110:714): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.808398][ T36] audit: type=1400 audit(1751380617.820:715): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.617442][ T36] audit: type=1400 audit(1751380618.630:716): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.526205][ T36] audit: type=1400 audit(1751380619.540:717): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.536021][ T36] audit: type=1400 audit(1751380620.550:718): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.645981][ T36] audit: type=1400 audit(1751380621.660:719): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.855928][ T36] audit: type=1400 audit(1751380622.870:720): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.165574][ T36] audit: type=1400 audit(1751380624.180:721): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.575648][ T36] audit: type=1400 audit(1751380625.590:722): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.086022][ T36] audit: type=1400 audit(1751380627.100:723): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.696906][ T36] audit: type=1400 audit(1751380628.710:724): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.407097][ T36] audit: type=1400 audit(1751380630.420:725): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.216565][ T36] audit: type=1400 audit(1751380632.230:726): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.126533][ T36] audit: type=1400 audit(1751380634.140:727): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.136509][ T36] audit: type=1400 audit(1751380636.150:728): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.160640][ T36] audit: type=1400 audit(1751380636.180:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2565]" dev="pipefs" ino=2565 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0