Warning: Permanently added '10.128.0.193' (ED25519) to the list of known hosts. 2025/08/31 17:55:41 parsed 1 programs [ 34.111046][ T30] audit: type=1400 audit(1756662941.076:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 34.131892][ T30] audit: type=1400 audit(1756662941.076:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 34.655092][ T30] audit: type=1400 audit(1756662941.626:66): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 34.656034][ T289] cgroup: Unknown subsys name 'net' [ 34.677794][ T30] audit: type=1400 audit(1756662941.626:67): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.705376][ T30] audit: type=1400 audit(1756662941.656:68): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.705520][ T289] cgroup: Unknown subsys name 'devices' [ 34.815153][ T289] cgroup: Unknown subsys name 'hugetlb' [ 34.820774][ T289] cgroup: Unknown subsys name 'rlimit' [ 35.018977][ T30] audit: type=1400 audit(1756662941.986:69): avc: denied { setattr } for pid=289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 35.042158][ T30] audit: type=1400 audit(1756662941.986:70): avc: denied { create } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.047988][ T291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 35.062759][ T30] audit: type=1400 audit(1756662941.986:71): avc: denied { write } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.091548][ T30] audit: type=1400 audit(1756662941.986:72): avc: denied { read } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.111890][ T30] audit: type=1400 audit(1756662941.986:73): avc: denied { mounton } for pid=289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 35.139127][ T289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.519006][ T293] request_module fs-gadgetfs succeeded, but still no fs? [ 35.600895][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.607953][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.615317][ T298] device bridge_slave_0 entered promiscuous mode [ 35.622039][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.629110][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.636511][ T298] device bridge_slave_1 entered promiscuous mode [ 35.671211][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.678261][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.685525][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.692705][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.708317][ T299] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.716165][ T299] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.723751][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.731422][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.741074][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.749252][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.756435][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.765710][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.773953][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.780985][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.791697][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.800643][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.812396][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.822741][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.830813][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.838649][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.847931][ T298] device veth0_vlan entered promiscuous mode [ 35.856952][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.865724][ T298] device veth1_macvtap entered promiscuous mode [ 35.874315][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.884132][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.911437][ T298] syz-executor (298) used greatest stack depth: 21312 bytes left 2025/08/31 17:55:43 executed programs: 0 [ 36.615712][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.622739][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.630161][ T361] device bridge_slave_0 entered promiscuous mode [ 36.637415][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.644620][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.651998][ T361] device bridge_slave_1 entered promiscuous mode [ 36.690491][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.697643][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.704914][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.711924][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.730559][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.738140][ T299] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.745343][ T299] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.754154][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.762267][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.769297][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.777600][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.785960][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.793068][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.807375][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.816522][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.828963][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.842026][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.850342][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.858745][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.867415][ T361] device veth0_vlan entered promiscuous mode [ 36.876545][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.885495][ T361] device veth1_macvtap entered promiscuous mode [ 36.894817][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.904987][ T8] device bridge_slave_1 left promiscuous mode [ 36.911392][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.919380][ T8] device bridge_slave_0 left promiscuous mode [ 36.925696][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.933789][ T8] device veth1_macvtap left promiscuous mode [ 36.939779][ T8] device veth0_vlan left promiscuous mode [ 36.998370][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.116260][ T30] kauditd_printk_skb: 157 callbacks suppressed [ 39.116275][ T30] audit: type=1400 audit(1756662946.086:231): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.146560][ T30] audit: type=1400 audit(1756662946.086:232): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.171035][ T30] audit: type=1400 audit(1756662946.096:233): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.195055][ T30] audit: type=1400 audit(1756662946.136:234): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.219110][ T30] audit: type=1400 audit(1756662946.136:235): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.243405][ T30] audit: type=1400 audit(1756662946.136:236): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.267702][ T30] audit: type=1400 audit(1756662946.186:237): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.291978][ T30] audit: type=1400 audit(1756662946.186:238): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.316280][ T30] audit: type=1400 audit(1756662946.186:239): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.340484][ T30] audit: type=1400 audit(1756662946.236:240): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.136259][ T30] kauditd_printk_skb: 291 callbacks suppressed [ 44.136271][ T30] audit: type=1400 audit(1756662951.106:532): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.166486][ T30] audit: type=1400 audit(1756662951.106:533): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.190915][ T30] audit: type=1400 audit(1756662951.106:534): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.215186][ T30] audit: type=1400 audit(1756662951.156:535): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.239301][ T30] audit: type=1400 audit(1756662951.156:536): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.263664][ T30] audit: type=1400 audit(1756662951.156:537): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.288025][ T30] audit: type=1400 audit(1756662951.226:538): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.312356][ T30] audit: type=1400 audit(1756662951.226:539): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.336974][ T30] audit: type=1400 audit(1756662951.236:540): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.361309][ T30] audit: type=1400 audit(1756662951.286:541): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.124676][ T299] device bridge_slave_1 left promiscuous mode [ 48.130819][ T299] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.138475][ T299] device bridge_slave_0 left promiscuous mode [ 48.144668][ T299] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.152253][ T299] device veth1_macvtap left promiscuous mode [ 48.158296][ T299] device veth0_vlan left promiscuous mode [ 49.286044][ T30] kauditd_printk_skb: 172 callbacks suppressed [ 49.286056][ T30] audit: type=1400 audit(1756662956.256:714): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.091657][ T30] audit: type=1400 audit(1756662957.056:715): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.997200][ T30] audit: type=1400 audit(1756662957.966:716): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.002699][ T30] audit: type=1400 audit(1756662958.966:717): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.108483][ T30] audit: type=1400 audit(1756662960.076:718): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.314192][ T30] audit: type=1400 audit(1756662961.286:719): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.620006][ T30] audit: type=1400 audit(1756662962.586:720): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.025555][ T30] audit: type=1400 audit(1756662963.996:721): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.530974][ T30] audit: type=1400 audit(1756662965.496:722): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.136641][ T30] audit: type=1400 audit(1756662967.106:723): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.842043][ T30] audit: type=1400 audit(1756662968.806:724): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.647625][ T30] audit: type=1400 audit(1756662970.616:725): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.553206][ T30] audit: type=1400 audit(1756662972.516:726): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.558922][ T30] audit: type=1400 audit(1756662974.526:727): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.580552][ T30] audit: type=1400 audit(1756662974.546:728): avc: denied { write } for pid=281 comm="syz-execprog" path="pipe:[14860]" dev="pipefs" ino=14860 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0