Warning: Permanently added '10.128.1.2' (ED25519) to the list of known hosts. 2024/06/22 06:56:12 ignoring optional flag "sandboxArg"="0" 2024/06/22 06:56:13 parsed 1 programs [ 41.051119][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 41.051138][ T30] audit: type=1400 audit(1719039373.180:95): avc: denied { unlink } for pid=345 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/06/22 06:56:13 executed programs: 0 [ 41.106949][ T345] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 41.161964][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.169016][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.176569][ T351] device bridge_slave_0 entered promiscuous mode [ 41.183357][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.190189][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.197573][ T351] device bridge_slave_1 entered promiscuous mode [ 41.244063][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.250937][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.257993][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.264828][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.285507][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.293199][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.300683][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.307914][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.317623][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.325664][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.332530][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.351402][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.359633][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.367720][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.374571][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.382783][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.391729][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.402952][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.410998][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.418295][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.426575][ T351] device veth0_vlan entered promiscuous mode [ 41.436467][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.445327][ T351] device veth1_macvtap entered promiscuous mode [ 41.454480][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.466316][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.486028][ T30] audit: type=1400 audit(1719039373.610:96): avc: denied { map_create } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 41.505693][ T30] audit: type=1400 audit(1719039373.620:97): avc: denied { map_read map_write } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 41.526701][ T30] audit: type=1400 audit(1719039373.620:98): avc: denied { prog_load } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 41.546137][ T30] audit: type=1400 audit(1719039373.620:99): avc: denied { bpf } for pid=355 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 41.566956][ T30] audit: type=1400 audit(1719039373.620:100): avc: denied { perfmon } for pid=355 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 41.588421][ T30] audit: type=1400 audit(1719039373.650:101): avc: denied { prog_run } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 42.759786][ T30] audit: type=1400 audit(1719039374.880:102): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2024/06/22 06:56:18 executed programs: 212