Warning: Permanently added '10.128.10.22' (ED25519) to the list of known hosts. 2025/06/24 20:20:42 ignoring optional flag "sandboxArg"="0" 2025/06/24 20:20:43 parsed 1 programs [ 21.731558][ T36] audit: type=1400 audit(1750796443.040:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 22.607361][ T36] audit: type=1400 audit(1750796443.920:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.608351][ T298] cgroup: Unknown subsys name 'net' [ 22.630109][ T36] audit: type=1400 audit(1750796443.920:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.657404][ T36] audit: type=1400 audit(1750796443.960:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.657557][ T298] cgroup: Unknown subsys name 'devices' [ 22.843246][ T298] cgroup: Unknown subsys name 'hugetlb' [ 22.848843][ T298] cgroup: Unknown subsys name 'rlimit' [ 23.000574][ T36] audit: type=1400 audit(1750796444.310:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.024700][ T36] audit: type=1400 audit(1750796444.310:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.045592][ T36] audit: type=1400 audit(1750796444.310:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.054850][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.065990][ T36] audit: type=1400 audit(1750796444.310:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.095051][ T36] audit: type=1400 audit(1750796444.310:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 23.116103][ T36] audit: type=1400 audit(1750796444.320:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.144429][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.929801][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 24.385964][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.393034][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.400067][ T333] bridge_slave_0: entered allmulticast mode [ 24.406601][ T333] bridge_slave_0: entered promiscuous mode [ 24.414284][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.421350][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.428462][ T333] bridge_slave_1: entered allmulticast mode [ 24.434730][ T333] bridge_slave_1: entered promiscuous mode [ 24.489427][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.496496][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.503786][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.510798][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.527490][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.534824][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.543994][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.551051][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.561860][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.568930][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.593683][ T333] veth0_vlan: entered promiscuous mode [ 24.603086][ T333] veth1_macvtap: entered promiscuous mode [ 24.718373][ T60] bridge_slave_1: left allmulticast mode [ 24.724333][ T60] bridge_slave_1: left promiscuous mode [ 24.729983][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.743105][ T60] bridge_slave_0: left allmulticast mode [ 24.748791][ T60] bridge_slave_0: left promiscuous mode [ 24.758781][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.904510][ T60] veth1_macvtap: left promiscuous mode [ 24.910544][ T60] veth0_vlan: left promiscuous mode 2025/06/24 20:20:46 executed programs: 0 [ 25.203812][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.210883][ T360] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.218406][ T360] bridge_slave_0: entered allmulticast mode [ 25.224729][ T360] bridge_slave_0: entered promiscuous mode [ 25.251171][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.258253][ T360] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.265382][ T360] bridge_slave_1: entered allmulticast mode [ 25.271509][ T360] bridge_slave_1: entered promiscuous mode [ 25.316680][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.323739][ T360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.331062][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.338130][ T360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.358950][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.366310][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.380379][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.387666][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.395494][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.402557][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.422529][ T360] veth0_vlan: entered promiscuous mode [ 25.431864][ T360] veth1_macvtap: entered promiscuous mode [ 26.755002][ T36] kauditd_printk_skb: 110 callbacks suppressed [ 26.755017][ T36] audit: type=1400 audit(1750796448.070:184): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.785203][ T36] audit: type=1400 audit(1750796448.090:185): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.810137][ T36] audit: type=1400 audit(1750796448.090:186): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.834384][ T36] audit: type=1400 audit(1750796448.130:187): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.858700][ T36] audit: type=1400 audit(1750796448.150:188): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.882757][ T36] audit: type=1400 audit(1750796448.180:189): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.907032][ T36] audit: type=1400 audit(1750796448.180:190): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.931057][ T36] audit: type=1400 audit(1750796448.180:191): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.955530][ T36] audit: type=1400 audit(1750796448.180:192): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 26.979535][ T36] audit: type=1400 audit(1750796448.230:193): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.805074][ T36] kauditd_printk_skb: 293 callbacks suppressed [ 31.805093][ T36] audit: type=1400 audit(1750796453.120:487): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.835228][ T36] audit: type=1400 audit(1750796453.140:488): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.859441][ T36] audit: type=1400 audit(1750796453.140:489): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.883460][ T36] audit: type=1400 audit(1750796453.180:490): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.907497][ T36] audit: type=1400 audit(1750796453.180:491): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.931405][ T36] audit: type=1400 audit(1750796453.180:492): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.955463][ T36] audit: type=1400 audit(1750796453.230:493): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.979417][ T36] audit: type=1400 audit(1750796453.250:494): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.003574][ T36] audit: type=1400 audit(1750796453.260:495): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.027629][ T36] audit: type=1400 audit(1750796453.280:496): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.514743][ T12] bridge_slave_1: left allmulticast mode [ 35.520397][ T12] bridge_slave_1: left promiscuous mode [ 35.526011][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.533434][ T12] bridge_slave_0: left allmulticast mode [ 35.542825][ T12] bridge_slave_0: left promiscuous mode [ 35.551291][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.633330][ T12] veth1_macvtap: left promiscuous mode [ 35.638935][ T12] veth0_vlan: left promiscuous mode [ 37.006304][ T36] kauditd_printk_skb: 217 callbacks suppressed [ 37.006320][ T36] audit: type=1400 audit(1750796458.320:714): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 37.713086][ T36] audit: type=1400 audit(1750796459.030:715): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 38.519928][ T36] audit: type=1400 audit(1750796459.830:716): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 39.426680][ T36] audit: type=1400 audit(1750796460.750:717): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.433262][ T36] audit: type=1400 audit(1750796461.750:718): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.539767][ T36] audit: type=1400 audit(1750796462.860:719): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.746292][ T36] audit: type=1400 audit(1750796464.060:720): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.052809][ T36] audit: type=1400 audit(1750796465.370:721): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.459228][ T36] audit: type=1400 audit(1750796466.780:722): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.965868][ T36] audit: type=1400 audit(1750796468.280:723): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.573257][ T36] audit: type=1400 audit(1750796469.890:724): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.279892][ T36] audit: type=1400 audit(1750796471.600:725): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.086534][ T36] audit: type=1400 audit(1750796473.400:726): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.993116][ T36] audit: type=1400 audit(1750796475.310:727): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.999739][ T36] audit: type=1400 audit(1750796477.320:728): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.021851][ T36] audit: type=1400 audit(1750796477.340:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2941]" dev="pipefs" ino=2941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0