Warning: Permanently added '10.128.1.212' (ED25519) to the list of known hosts. 2025/07/30 07:50:16 ignoring optional flag "sandboxArg"="0" 2025/07/30 07:50:16 parsed 1 programs [ 44.243278][ T36] audit: type=1400 audit(1753861816.970:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 45.638101][ T36] audit: type=1400 audit(1753861818.360:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 45.639399][ T298] cgroup: Unknown subsys name 'net' [ 45.660797][ T36] audit: type=1400 audit(1753861818.360:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.688101][ T36] audit: type=1400 audit(1753861818.400:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.688311][ T298] cgroup: Unknown subsys name 'devices' [ 45.895430][ T298] cgroup: Unknown subsys name 'hugetlb' [ 45.901038][ T298] cgroup: Unknown subsys name 'rlimit' [ 46.035321][ T36] audit: type=1400 audit(1753861818.760:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.058533][ T36] audit: type=1400 audit(1753861818.760:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.078976][ T36] audit: type=1400 audit(1753861818.760:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.091107][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 46.099455][ T36] audit: type=1400 audit(1753861818.760:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.128073][ T36] audit: type=1400 audit(1753861818.760:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 46.149085][ T36] audit: type=1400 audit(1753861818.760:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 46.204971][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.985623][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.992717][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.000004][ T303] bridge_slave_0: entered allmulticast mode [ 47.006657][ T303] bridge_slave_0: entered promiscuous mode [ 47.013407][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.020459][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.027709][ T303] bridge_slave_1: entered allmulticast mode [ 47.034252][ T303] bridge_slave_1: entered promiscuous mode [ 47.114506][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.121563][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.128867][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.135921][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.157250][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.164663][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.174601][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.181645][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.190656][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.197719][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.222745][ T303] veth0_vlan: entered promiscuous mode [ 47.233505][ T303] veth1_macvtap: entered promiscuous mode [ 47.257748][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 47.292426][ T13] bridge_slave_1: left allmulticast mode [ 47.298570][ T13] bridge_slave_1: left promiscuous mode [ 47.304272][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.311783][ T13] bridge_slave_0: left allmulticast mode [ 47.317670][ T13] bridge_slave_0: left promiscuous mode [ 47.323335][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.449422][ T13] veth1_macvtap: left promiscuous mode [ 47.455107][ T13] veth0_vlan: left promiscuous mode 2025/07/30 07:50:21 executed programs: 0 [ 48.354116][ T366] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.361175][ T366] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.368416][ T366] bridge_slave_0: entered allmulticast mode [ 48.374732][ T366] bridge_slave_0: entered promiscuous mode [ 48.381044][ T366] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.388135][ T366] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.395262][ T366] bridge_slave_1: entered allmulticast mode [ 48.401475][ T366] bridge_slave_1: entered promiscuous mode [ 48.450342][ T366] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.457502][ T366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.464795][ T366] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.471822][ T366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.491537][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.498800][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.513465][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.520519][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.529518][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.536583][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.561134][ T366] veth0_vlan: entered promiscuous mode [ 48.571376][ T366] veth1_macvtap: entered promiscuous mode [ 49.254494][ T36] kauditd_printk_skb: 73 callbacks suppressed [ 49.254513][ T36] audit: type=1400 audit(1753861821.980:147): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.297081][ T36] audit: type=1400 audit(1753861822.020:148): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.321097][ T36] audit: type=1400 audit(1753861822.040:149): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.346074][ T36] audit: type=1400 audit(1753861822.040:150): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.370098][ T36] audit: type=1400 audit(1753861822.080:151): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.394206][ T36] audit: type=1400 audit(1753861822.100:152): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.418473][ T36] audit: type=1400 audit(1753861822.100:153): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.443844][ T36] audit: type=1400 audit(1753861822.120:154): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.468011][ T36] audit: type=1400 audit(1753861822.170:155): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.492442][ T36] audit: type=1400 audit(1753861822.180:156): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.267173][ T36] kauditd_printk_skb: 287 callbacks suppressed [ 54.267191][ T36] audit: type=1400 audit(1753861826.990:444): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.297330][ T36] audit: type=1400 audit(1753861827.000:445): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.321333][ T36] audit: type=1400 audit(1753861827.000:446): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.349567][ T36] audit: type=1400 audit(1753861827.080:447): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.373671][ T36] audit: type=1400 audit(1753861827.080:448): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.397741][ T36] audit: type=1400 audit(1753861827.080:449): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.421843][ T36] audit: type=1400 audit(1753861827.140:450): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.445846][ T36] audit: type=1400 audit(1753861827.140:451): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.469964][ T36] audit: type=1400 audit(1753861827.150:452): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.493897][ T36] audit: type=1400 audit(1753861827.200:453): avc: denied { read write } for pid=366 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.783874][ T13] bridge_slave_1: left allmulticast mode [ 58.789583][ T13] bridge_slave_1: left promiscuous mode [ 58.795273][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.802777][ T13] bridge_slave_0: left allmulticast mode [ 58.808532][ T13] bridge_slave_0: left promiscuous mode [ 58.814182][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.954910][ T13] veth1_macvtap: left promiscuous mode [ 58.960429][ T13] veth0_vlan: left promiscuous mode [ 59.677502][ T36] kauditd_printk_skb: 259 callbacks suppressed [ 59.677520][ T36] audit: type=1400 audit(1753861832.400:713): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.286040][ T36] audit: type=1400 audit(1753861833.010:714): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.994374][ T36] audit: type=1400 audit(1753861833.720:715): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.802490][ T36] audit: type=1400 audit(1753861834.530:716): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.710919][ T36] audit: type=1400 audit(1753861835.440:717): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.719153][ T36] audit: type=1400 audit(1753861836.450:718): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.827628][ T36] audit: type=1400 audit(1753861837.550:719): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.035783][ T36] audit: type=1400 audit(1753861838.760:720): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.344128][ T36] audit: type=1400 audit(1753861840.070:721): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.752223][ T36] audit: type=1400 audit(1753861841.480:722): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.260104][ T36] audit: type=1400 audit(1753861842.990:723): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.868069][ T36] audit: type=1400 audit(1753861844.590:724): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.576017][ T36] audit: type=1400 audit(1753861846.300:725): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.384870][ T36] audit: type=1400 audit(1753861848.110:726): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.293311][ T36] audit: type=1400 audit(1753861850.020:727): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.302024][ T36] audit: type=1400 audit(1753861852.030:728): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.325395][ T36] audit: type=1400 audit(1753861852.050:729): avc: denied { write } for pid=290 comm="syz-execprog" path="pipe:[2977]" dev="pipefs" ino=2977 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 84.363220][ T46] sched: DL replenish lagged too much