Warning: Permanently added '10.128.0.221' (ED25519) to the list of known hosts. 2025/07/09 18:33:10 ignoring optional flag "sandboxArg"="0" 2025/07/09 18:33:11 parsed 1 programs [ 34.668281][ T36] audit: type=1400 audit(1752085991.820:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 36.114406][ T36] audit: type=1400 audit(1752085993.260:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 36.115838][ T297] cgroup: Unknown subsys name 'net' [ 36.137090][ T36] audit: type=1400 audit(1752085993.260:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.164530][ T36] audit: type=1400 audit(1752085993.290:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.164561][ T297] cgroup: Unknown subsys name 'devices' [ 36.369544][ T297] cgroup: Unknown subsys name 'hugetlb' [ 36.375169][ T297] cgroup: Unknown subsys name 'rlimit' [ 36.470047][ T36] audit: type=1400 audit(1752085993.620:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 36.493378][ T36] audit: type=1400 audit(1752085993.620:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.513921][ T36] audit: type=1400 audit(1752085993.620:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.522618][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 36.534682][ T36] audit: type=1400 audit(1752085993.620:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.563008][ T36] audit: type=1400 audit(1752085993.620:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 36.583993][ T36] audit: type=1400 audit(1752085993.620:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.598743][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 37.474809][ T301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.119631][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.127172][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.134446][ T332] bridge_slave_0: entered allmulticast mode [ 38.140784][ T332] bridge_slave_0: entered promiscuous mode [ 38.147293][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.154340][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.161472][ T332] bridge_slave_1: entered allmulticast mode [ 38.168461][ T332] bridge_slave_1: entered promiscuous mode [ 38.218994][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.226062][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.233382][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.240437][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.261781][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.269099][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.278720][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.285773][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.301443][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.308535][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.332989][ T332] veth0_vlan: entered promiscuous mode [ 38.347566][ T332] veth1_macvtap: entered promiscuous mode [ 38.418824][ T306] bridge_slave_1: left allmulticast mode [ 38.424631][ T306] bridge_slave_1: left promiscuous mode [ 38.431338][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.439750][ T306] bridge_slave_0: left allmulticast mode [ 38.445436][ T306] bridge_slave_0: left promiscuous mode [ 38.451422][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.575893][ T306] veth1_macvtap: left promiscuous mode [ 38.581542][ T306] veth0_vlan: left promiscuous mode 2025/07/09 18:33:15 executed programs: 0 [ 38.871487][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.878805][ T360] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.886139][ T360] bridge_slave_0: entered allmulticast mode [ 38.892435][ T360] bridge_slave_0: entered promiscuous mode [ 38.898845][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.905965][ T360] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.913064][ T360] bridge_slave_1: entered allmulticast mode [ 38.919553][ T360] bridge_slave_1: entered promiscuous mode [ 38.993854][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.000948][ T360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.008242][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.015274][ T360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.043874][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.051682][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.060869][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.067944][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.088769][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.095841][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.108832][ T360] veth0_vlan: entered promiscuous mode [ 39.122185][ T360] veth1_macvtap: entered promiscuous mode [ 39.700781][ T36] kauditd_printk_skb: 65 callbacks suppressed [ 39.700798][ T36] audit: type=1400 audit(1752085996.850:139): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.730941][ T36] audit: type=1400 audit(1752085996.870:140): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.755064][ T36] audit: type=1400 audit(1752085996.870:141): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.779065][ T36] audit: type=1400 audit(1752085996.910:142): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.803380][ T36] audit: type=1400 audit(1752085996.910:143): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.827386][ T36] audit: type=1400 audit(1752085996.930:144): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.851650][ T36] audit: type=1400 audit(1752085996.960:145): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.875667][ T36] audit: type=1400 audit(1752085996.980:146): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.899771][ T36] audit: type=1400 audit(1752085996.980:147): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.923929][ T36] audit: type=1400 audit(1752085997.010:148): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.708173][ T36] kauditd_printk_skb: 293 callbacks suppressed [ 44.708191][ T36] audit: type=1400 audit(1752086001.860:442): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.751588][ T36] audit: type=1400 audit(1752086001.900:443): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.775643][ T36] audit: type=1400 audit(1752086001.910:444): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.800034][ T36] audit: type=1400 audit(1752086001.910:445): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.824069][ T36] audit: type=1400 audit(1752086001.950:446): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.848236][ T36] audit: type=1400 audit(1752086001.980:447): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.872281][ T36] audit: type=1400 audit(1752086001.980:448): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.896287][ T36] audit: type=1400 audit(1752086002.020:449): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.920249][ T36] audit: type=1400 audit(1752086002.030:450): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.944193][ T36] audit: type=1400 audit(1752086002.030:451): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.245424][ T13] bridge_slave_1: left allmulticast mode [ 49.251148][ T13] bridge_slave_1: left promiscuous mode [ 49.256817][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.264282][ T13] bridge_slave_0: left allmulticast mode [ 49.270035][ T13] bridge_slave_0: left promiscuous mode [ 49.275650][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.388840][ T13] veth1_macvtap: left promiscuous mode [ 49.394361][ T13] veth0_vlan: left promiscuous mode [ 50.128850][ T36] kauditd_printk_skb: 261 callbacks suppressed [ 50.128867][ T36] audit: type=1400 audit(1752086007.280:713): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.737463][ T36] audit: type=1400 audit(1752086007.890:714): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.445855][ T36] audit: type=1400 audit(1752086008.590:715): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.254522][ T36] audit: type=1400 audit(1752086009.400:716): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.163311][ T36] audit: type=1400 audit(1752086010.310:717): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.172119][ T36] audit: type=1400 audit(1752086011.320:718): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.280761][ T36] audit: type=1400 audit(1752086012.430:719): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.489270][ T36] audit: type=1400 audit(1752086013.640:720): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.797955][ T36] audit: type=1400 audit(1752086014.950:721): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.206223][ T36] audit: type=1400 audit(1752086016.350:722): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.714847][ T36] audit: type=1400 audit(1752086017.860:723): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.324067][ T36] audit: type=1400 audit(1752086019.470:724): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.032657][ T36] audit: type=1400 audit(1752086021.180:725): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.840982][ T36] audit: type=1400 audit(1752086022.990:726): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.749555][ T36] audit: type=1400 audit(1752086024.900:727): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.758037][ T36] audit: type=1400 audit(1752086026.910:728): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.780737][ T36] audit: type=1400 audit(1752086026.930:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1605]" dev="pipefs" ino=1605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0