Warning: Permanently added '10.128.0.101' (ED25519) to the list of known hosts. 2025/07/11 04:38:34 ignoring optional flag "sandboxArg"="0" 2025/07/11 04:38:35 parsed 1 programs [ 43.342087][ T36] audit: type=1400 audit(1752208715.839:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 44.255406][ T36] audit: type=1400 audit(1752208716.749:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 44.256550][ T297] cgroup: Unknown subsys name 'net' [ 44.278092][ T36] audit: type=1400 audit(1752208716.749:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 44.305514][ T36] audit: type=1400 audit(1752208716.779:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 44.305949][ T297] cgroup: Unknown subsys name 'devices' [ 44.451854][ T297] cgroup: Unknown subsys name 'hugetlb' [ 44.457443][ T297] cgroup: Unknown subsys name 'rlimit' [ 44.630433][ T36] audit: type=1400 audit(1752208717.129:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.653589][ T36] audit: type=1400 audit(1752208717.129:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.672225][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 44.674116][ T36] audit: type=1400 audit(1752208717.129:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.702725][ T36] audit: type=1400 audit(1752208717.129:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.722896][ T36] audit: type=1400 audit(1752208717.129:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 44.743843][ T36] audit: type=1400 audit(1752208717.129:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 44.753939][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.609389][ T304] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 45.784865][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.791954][ T319] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.799621][ T319] bridge_slave_0: entered allmulticast mode [ 45.805947][ T319] bridge_slave_0: entered promiscuous mode [ 45.813030][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.820102][ T319] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.827139][ T319] bridge_slave_1: entered allmulticast mode [ 45.833742][ T319] bridge_slave_1: entered promiscuous mode [ 45.888769][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.895815][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.903109][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.910150][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.935577][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.943070][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.952004][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.959033][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.967998][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.975042][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.001154][ T319] veth0_vlan: entered promiscuous mode [ 46.010563][ T319] veth1_macvtap: entered promiscuous mode [ 46.081320][ T13] bridge_slave_1: left allmulticast mode [ 46.086992][ T13] bridge_slave_1: left promiscuous mode [ 46.092846][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.100751][ T13] bridge_slave_0: left allmulticast mode [ 46.106399][ T13] bridge_slave_0: left promiscuous mode [ 46.112213][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.254975][ T13] veth1_macvtap: left promiscuous mode [ 46.260551][ T13] veth0_vlan: left promiscuous mode 2025/07/11 04:38:39 executed programs: 0 [ 46.749447][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.756561][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.764493][ T361] bridge_slave_0: entered allmulticast mode [ 46.771015][ T361] bridge_slave_0: entered promiscuous mode [ 46.777580][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.784665][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.791746][ T361] bridge_slave_1: entered allmulticast mode [ 46.797914][ T361] bridge_slave_1: entered promiscuous mode [ 46.841548][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.848591][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.855901][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.862945][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.880976][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.888195][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.897054][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.904102][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.914017][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.921069][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.946097][ T361] veth0_vlan: entered promiscuous mode [ 46.955578][ T361] veth1_macvtap: entered promiscuous mode [ 48.383305][ T36] kauditd_printk_skb: 116 callbacks suppressed [ 48.383321][ T36] audit: type=1400 audit(1752208720.879:190): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.414232][ T36] audit: type=1400 audit(1752208720.899:191): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.438418][ T36] audit: type=1400 audit(1752208720.909:192): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.462379][ T36] audit: type=1400 audit(1752208720.939:193): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.486335][ T36] audit: type=1400 audit(1752208720.949:194): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.510297][ T36] audit: type=1400 audit(1752208720.959:195): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.534348][ T36] audit: type=1400 audit(1752208720.989:196): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.558305][ T36] audit: type=1400 audit(1752208720.989:197): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.582302][ T36] audit: type=1400 audit(1752208721.029:198): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.606257][ T36] audit: type=1400 audit(1752208721.029:199): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.393616][ T36] kauditd_printk_skb: 291 callbacks suppressed [ 53.393632][ T36] audit: type=1400 audit(1752208725.889:491): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.423723][ T36] audit: type=1400 audit(1752208725.909:492): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.447796][ T36] audit: type=1400 audit(1752208725.909:493): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.471767][ T36] audit: type=1400 audit(1752208725.949:494): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.495821][ T36] audit: type=1400 audit(1752208725.959:495): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.519743][ T36] audit: type=1400 audit(1752208725.969:496): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.543809][ T36] audit: type=1400 audit(1752208725.999:497): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.567798][ T36] audit: type=1400 audit(1752208726.009:498): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.591803][ T36] audit: type=1400 audit(1752208726.029:499): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.615728][ T36] audit: type=1400 audit(1752208726.039:500): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.068064][ T13] bridge_slave_1: left allmulticast mode [ 57.073743][ T13] bridge_slave_1: left promiscuous mode [ 57.079327][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.086853][ T13] bridge_slave_0: left allmulticast mode [ 57.092557][ T13] bridge_slave_0: left promiscuous mode [ 57.098140][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.202174][ T13] veth1_macvtap: left promiscuous mode [ 57.207679][ T13] veth0_vlan: left promiscuous mode [ 58.532735][ T36] kauditd_printk_skb: 213 callbacks suppressed [ 58.532751][ T36] audit: type=1400 audit(1752208731.029:714): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.239390][ T36] audit: type=1400 audit(1752208731.729:715): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.046286][ T36] audit: type=1400 audit(1752208732.539:716): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.952979][ T36] audit: type=1400 audit(1752208733.449:717): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.959658][ T36] audit: type=1400 audit(1752208734.449:718): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.066525][ T36] audit: type=1400 audit(1752208735.559:719): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.273224][ T36] audit: type=1400 audit(1752208736.769:720): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.579842][ T36] audit: type=1400 audit(1752208738.079:721): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.986461][ T36] audit: type=1400 audit(1752208739.479:722): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.493117][ T36] audit: type=1400 audit(1752208740.989:723): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.099822][ T36] audit: type=1400 audit(1752208742.589:724): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.806510][ T36] audit: type=1400 audit(1752208744.299:725): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.613836][ T36] audit: type=1400 audit(1752208746.109:726): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.520534][ T36] audit: type=1400 audit(1752208748.019:727): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.527238][ T36] audit: type=1400 audit(1752208750.019:728): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.549124][ T36] audit: type=1400 audit(1752208750.039:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2442]" dev="pipefs" ino=2442 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0