Warning: Permanently added '10.128.1.23' (ED25519) to the list of known hosts. 2025/06/19 08:46:46 ignoring optional flag "sandboxArg"="0" 2025/06/19 08:46:47 parsed 1 programs [ 24.504274][ T36] audit: type=1400 audit(1750322807.740:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 25.906930][ T36] audit: type=1400 audit(1750322809.140:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.908367][ T297] cgroup: Unknown subsys name 'net' [ 25.929618][ T36] audit: type=1400 audit(1750322809.140:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.957724][ T36] audit: type=1400 audit(1750322809.180:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.958054][ T297] cgroup: Unknown subsys name 'devices' [ 26.162492][ T297] cgroup: Unknown subsys name 'hugetlb' [ 26.168293][ T297] cgroup: Unknown subsys name 'rlimit' [ 26.344307][ T36] audit: type=1400 audit(1750322809.580:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.367515][ T36] audit: type=1400 audit(1750322809.580:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.388222][ T36] audit: type=1400 audit(1750322809.580:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.400232][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.408654][ T36] audit: type=1400 audit(1750322809.580:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.437520][ T36] audit: type=1400 audit(1750322809.580:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 26.458817][ T36] audit: type=1400 audit(1750322809.580:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.494608][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.386121][ T301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 27.917359][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.924529][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.932189][ T333] bridge_slave_0: entered allmulticast mode [ 27.938602][ T333] bridge_slave_0: entered promiscuous mode [ 27.945135][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.952242][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.959379][ T333] bridge_slave_1: entered allmulticast mode [ 27.965640][ T333] bridge_slave_1: entered promiscuous mode [ 28.027330][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.034451][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.041832][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.048903][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.070994][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.078353][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.089126][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.096204][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.105498][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.112656][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.139665][ T333] veth0_vlan: entered promiscuous mode [ 28.151010][ T333] veth1_macvtap: entered promiscuous mode [ 28.203754][ T13] bridge_slave_1: left allmulticast mode [ 28.209440][ T13] bridge_slave_1: left promiscuous mode [ 28.215106][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.223906][ T13] bridge_slave_0: left allmulticast mode [ 28.229552][ T13] bridge_slave_0: left promiscuous mode [ 28.235422][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.332466][ T13] veth1_macvtap: left promiscuous mode [ 28.338047][ T13] veth0_vlan: left promiscuous mode 2025/06/19 08:46:52 executed programs: 0 [ 28.874423][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.881552][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.888820][ T359] bridge_slave_0: entered allmulticast mode [ 28.895152][ T359] bridge_slave_0: entered promiscuous mode [ 28.901596][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.908629][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.915732][ T359] bridge_slave_1: entered allmulticast mode [ 28.922238][ T359] bridge_slave_1: entered promiscuous mode [ 28.993297][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.000402][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.010661][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.017734][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.049210][ T359] veth0_vlan: entered promiscuous mode [ 29.060668][ T359] veth1_macvtap: entered promiscuous mode [ 29.544419][ T36] kauditd_printk_skb: 59 callbacks suppressed [ 29.544436][ T36] audit: type=1400 audit(1750322812.780:133): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.575217][ T36] audit: type=1400 audit(1750322812.800:134): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.600012][ T36] audit: type=1400 audit(1750322812.810:135): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.624168][ T36] audit: type=1400 audit(1750322812.840:136): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.648149][ T36] audit: type=1400 audit(1750322812.850:137): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.672189][ T36] audit: type=1400 audit(1750322812.850:138): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.696300][ T36] audit: type=1400 audit(1750322812.920:139): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.720280][ T36] audit: type=1400 audit(1750322812.950:140): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.744627][ T36] audit: type=1400 audit(1750322812.960:141): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.768818][ T36] audit: type=1400 audit(1750322812.960:142): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.551576][ T36] kauditd_printk_skb: 290 callbacks suppressed [ 34.551594][ T36] audit: type=1400 audit(1750322817.790:433): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.594659][ T36] audit: type=1400 audit(1750322817.830:434): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.618756][ T36] audit: type=1400 audit(1750322817.850:435): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.642827][ T36] audit: type=1400 audit(1750322817.850:436): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.670758][ T36] audit: type=1400 audit(1750322817.910:437): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.694892][ T36] audit: type=1400 audit(1750322817.920:438): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.718816][ T36] audit: type=1400 audit(1750322817.930:439): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.747065][ T36] audit: type=1400 audit(1750322817.990:440): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.771063][ T36] audit: type=1400 audit(1750322817.990:441): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.795247][ T36] audit: type=1400 audit(1750322817.990:442): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.268462][ T13] bridge_slave_1: left allmulticast mode [ 39.274226][ T13] bridge_slave_1: left promiscuous mode [ 39.280005][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.287697][ T13] bridge_slave_0: left allmulticast mode [ 39.293405][ T13] bridge_slave_0: left promiscuous mode [ 39.299008][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.483007][ T13] veth1_macvtap: left promiscuous mode [ 39.488531][ T13] veth0_vlan: left promiscuous mode [ 39.636377][ T36] kauditd_printk_skb: 269 callbacks suppressed [ 39.636395][ T36] audit: type=1400 audit(1750322822.870:712): avc: denied { execmem } for pid=968 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.144967][ T36] audit: type=1400 audit(1750322823.380:713): avc: denied { execmem } for pid=969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.753387][ T36] audit: type=1400 audit(1750322823.990:714): avc: denied { execmem } for pid=970 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.462539][ T36] audit: type=1400 audit(1750322824.700:715): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.270964][ T36] audit: type=1400 audit(1750322825.510:716): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.179432][ T36] audit: type=1400 audit(1750322826.420:717): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.187945][ T36] audit: type=1400 audit(1750322827.430:718): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.296591][ T36] audit: type=1400 audit(1750322828.540:719): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.505187][ T36] audit: type=1400 audit(1750322829.740:720): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.813812][ T36] audit: type=1400 audit(1750322831.050:721): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.222244][ T36] audit: type=1400 audit(1750322832.460:722): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.730499][ T36] audit: type=1400 audit(1750322833.970:723): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.339087][ T36] audit: type=1400 audit(1750322835.580:724): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.048203][ T36] audit: type=1400 audit(1750322837.290:725): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.856779][ T36] audit: type=1400 audit(1750322839.100:726): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.765263][ T36] audit: type=1400 audit(1750322841.000:727): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.773733][ T36] audit: type=1400 audit(1750322843.010:728): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.796478][ T36] audit: type=1400 audit(1750322843.030:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2955]" dev="pipefs" ino=2955 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0