Warning: Permanently added '10.128.0.71' (ED25519) to the list of known hosts. 2025/07/30 15:51:09 ignoring optional flag "sandboxArg"="0" 2025/07/30 15:51:09 ignoring optional flag "type"="gce" 2025/07/30 15:51:09 parsed 1 programs [ 47.217791][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 47.217803][ T24] audit: type=1400 audit(1753890669.820:92): avc: denied { unlink } for pid=318 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/07/30 15:51:09 executed programs: 0 [ 47.276378][ T318] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.321049][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.328226][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.335474][ T324] device bridge_slave_0 entered promiscuous mode [ 47.342470][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.349521][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.356891][ T324] device bridge_slave_1 entered promiscuous mode [ 47.386651][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.393703][ T324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.401053][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.408085][ T324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.423366][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.430557][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.437746][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.445263][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.454316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.462673][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.469713][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.477959][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.486394][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.493425][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.504277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.513396][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.525806][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.536434][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.544711][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.552195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.560399][ T324] device veth0_vlan entered promiscuous mode [ 47.569727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.579103][ T324] device veth1_macvtap entered promiscuous mode [ 47.587966][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.597756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.617160][ T24] audit: type=1400 audit(1753890670.220:93): avc: denied { map_create } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.642796][ T24] audit: type=1400 audit(1753890670.220:94): avc: denied { bpf } for pid=328 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.663787][ T24] audit: type=1400 audit(1753890670.220:95): avc: denied { map_read map_write } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.684284][ T24] audit: type=1400 audit(1753890670.220:96): avc: denied { prog_load } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.703804][ T24] audit: type=1400 audit(1753890670.220:97): avc: denied { perfmon } for pid=328 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.751510][ T24] audit: type=1400 audit(1753890670.360:98): avc: denied { prog_run } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1