Warning: Permanently added '10.128.1.215' (ED25519) to the list of known hosts. 2024/09/25 09:48:01 ignoring optional flag "sandboxArg"="0" 2024/09/25 09:48:01 ignoring optional flag "type"="gce" 2024/09/25 09:48:01 parsed 1 programs 2024/09/25 09:48:01 executed programs: 0 [ 37.981538][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 37.981554][ T28] audit: type=1400 audit(1727257681.636:94): avc: denied { unlink } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 38.020571][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 38.078616][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.085608][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.092904][ T348] device bridge_slave_0 entered promiscuous mode [ 38.099509][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.106720][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.113962][ T348] device bridge_slave_1 entered promiscuous mode [ 38.163066][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.169923][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.177134][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.184010][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.205323][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.212652][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.220124][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.227610][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.250737][ T348] device veth0_vlan entered promiscuous mode [ 38.258664][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.267081][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.275266][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.282632][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.289829][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.297883][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.304996][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.312152][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.320129][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.326992][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.334161][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.342019][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.354418][ T348] device veth1_macvtap entered promiscuous mode [ 38.361958][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.373068][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.385100][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.404078][ T28] audit: type=1400 audit(1727257682.056:95): avc: denied { bpf } for pid=352 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 38.427218][ T28] audit: type=1400 audit(1727257682.056:96): avc: denied { map_create } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.446611][ T28] audit: type=1400 audit(1727257682.056:97): avc: denied { map_read map_write } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.466791][ T28] audit: type=1400 audit(1727257682.056:98): avc: denied { prog_load } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.486270][ T28] audit: type=1400 audit(1727257682.056:99): avc: denied { perfmon } for pid=352 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 38.507437][ T28] audit: type=1400 audit(1727257682.056:100): avc: denied { prog_run } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1