Warning: Permanently added '10.128.1.102' (ED25519) to the list of known hosts. 2025/01/24 15:20:17 ignoring optional flag "sandboxArg"="0" 2025/01/24 15:20:17 ignoring optional flag "type"="gce" 2025/01/24 15:20:17 parsed 1 programs [ 55.649687][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 55.649701][ T24] audit: type=1400 audit(1737732017.870:94): avc: denied { mount } for pid=353 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 55.679394][ T24] audit: type=1400 audit(1737732017.900:95): avc: denied { unlink } for pid=353 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/01/24 15:20:17 executed programs: 0 [ 55.753930][ T353] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.806993][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.814063][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.821284][ T359] device bridge_slave_0 entered promiscuous mode [ 55.828094][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.835823][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.843216][ T359] device bridge_slave_1 entered promiscuous mode [ 55.880527][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.887415][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.894689][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.901537][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.918996][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.926272][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.933544][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.940781][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.949532][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.957772][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.964630][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.973471][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.981515][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.988455][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.999892][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.009103][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.022220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.033648][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.041612][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.048925][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.057128][ T359] device veth0_vlan entered promiscuous mode [ 56.067472][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.076457][ T359] device veth1_macvtap entered promiscuous mode [ 56.085592][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.095289][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.108657][ T24] audit: type=1400 audit(1737732018.330:96): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 56.136801][ T24] audit: type=1400 audit(1737732018.360:97): avc: denied { map_create } for pid=364 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.156380][ T24] audit: type=1400 audit(1737732018.360:98): avc: denied { bpf } for pid=364 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 56.178324][ T24] audit: type=1400 audit(1737732018.360:99): avc: denied { map_read map_write } for pid=364 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.198828][ T24] audit: type=1400 audit(1737732018.360:100): avc: denied { prog_load } for pid=364 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.218374][ T24] audit: type=1400 audit(1737732018.360:101): avc: denied { perfmon } for pid=364 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 56.325673][ T24] audit: type=1400 audit(1737732018.550:102): avc: denied { prog_run } for pid=364 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 57.530340][ T24] audit: type=1400 audit(1737732019.750:103): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1