Warning: Permanently added '10.128.0.160' (ED25519) to the list of known hosts. 2025/08/26 03:18:44 parsed 1 programs [ 46.251535][ T24] audit: type=1400 audit(1756178324.920:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 46.272422][ T24] audit: type=1400 audit(1756178324.920:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 46.292588][ T24] audit: type=1400 audit(1756178324.920:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 49.404661][ T24] audit: type=1400 audit(1756178328.070:67): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 49.407325][ T283] cgroup: Unknown subsys name 'net' [ 49.427483][ T24] audit: type=1400 audit(1756178328.070:68): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.456629][ T24] audit: type=1400 audit(1756178328.120:69): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.456970][ T283] cgroup: Unknown subsys name 'devices' [ 49.663883][ T283] cgroup: Unknown subsys name 'hugetlb' [ 49.669566][ T283] cgroup: Unknown subsys name 'rlimit' [ 49.925352][ T24] audit: type=1400 audit(1756178328.590:70): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.948597][ T24] audit: type=1400 audit(1756178328.590:71): avc: denied { create } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 49.969121][ T24] audit: type=1400 audit(1756178328.590:72): avc: denied { write } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 49.984827][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 49.989733][ T24] audit: type=1400 audit(1756178328.590:73): avc: denied { read } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.072701][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 50.656520][ T287] request_module fs-gadgetfs succeeded, but still no fs? [ 50.672199][ T287] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 52.102068][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.109211][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.117321][ T337] device bridge_slave_0 entered promiscuous mode [ 52.132066][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.139577][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.147676][ T337] device bridge_slave_1 entered promiscuous mode [ 52.247686][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.254909][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.262408][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.269599][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.305769][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.317820][ T319] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.326351][ T319] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.351531][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.360450][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.367530][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.375496][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.383983][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.391096][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.411082][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.419386][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.439415][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.457673][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.467258][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.475494][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.484794][ T337] device veth0_vlan entered promiscuous mode [ 52.501707][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.512374][ T337] device veth1_macvtap entered promiscuous mode [ 52.525678][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.538374][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/08/26 03:18:51 executed programs: 0 [ 53.314999][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.322572][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.330871][ T369] device bridge_slave_0 entered promiscuous mode [ 53.338756][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.346289][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.354184][ T369] device bridge_slave_1 entered promiscuous mode [ 53.435837][ T24] kauditd_printk_skb: 28 callbacks suppressed [ 53.435868][ T24] audit: type=1400 audit(1756178332.100:102): avc: denied { create } for pid=369 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.447923][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.463077][ T24] audit: type=1400 audit(1756178332.100:103): avc: denied { write } for pid=369 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.469607][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.497395][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.500665][ T24] audit: type=1400 audit(1756178332.100:104): avc: denied { read } for pid=369 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.504637][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.561741][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.569776][ T319] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.578048][ T319] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.591122][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.599570][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.606689][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.617328][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.626895][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.635639][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.642978][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.661092][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.669544][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.691018][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.699415][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.730921][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 53.739738][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.765972][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 53.774419][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.783441][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.791228][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.799701][ T369] device veth0_vlan entered promiscuous mode [ 53.824467][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 53.833339][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.843992][ T369] device veth1_macvtap entered promiscuous mode [ 53.856982][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 53.865349][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 53.874829][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 53.890577][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 53.899208][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 53.937402][ T24] audit: type=1404 audit(1756178332.600:105): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 53.962600][ T24] audit: type=1400 audit(1756178332.630:106): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.995546][ T24] audit: type=1400 audit(1756178332.660:107): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.020366][ T24] audit: type=1400 audit(1756178332.680:108): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.045489][ T24] audit: type=1400 audit(1756178332.690:109): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.070372][ T24] audit: type=1400 audit(1756178332.690:110): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.109218][ T24] audit: type=1400 audit(1756178332.770:111): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.253362][ T112] device bridge_slave_1 left promiscuous mode [ 54.259766][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.268410][ T112] device bridge_slave_0 left promiscuous mode [ 54.274790][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.284107][ T112] device veth1_macvtap left promiscuous mode [ 54.290469][ T112] device veth0_vlan left promiscuous mode [ 58.459079][ T24] kauditd_printk_skb: 261 callbacks suppressed [ 58.459112][ T24] audit: type=1400 audit(1756178337.120:373): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.489453][ T24] audit: type=1400 audit(1756178337.140:374): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.513803][ T24] audit: type=1400 audit(1756178337.150:375): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.538168][ T24] audit: type=1400 audit(1756178337.180:376): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.562531][ T24] audit: type=1400 audit(1756178337.180:377): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.586756][ T24] audit: type=1400 audit(1756178337.210:378): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.611078][ T24] audit: type=1400 audit(1756178337.230:379): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.635427][ T24] audit: type=1400 audit(1756178337.250:380): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.659620][ T24] audit: type=1400 audit(1756178337.250:381): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.684058][ T24] audit: type=1400 audit(1756178337.280:382): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.464064][ T24] kauditd_printk_skb: 285 callbacks suppressed [ 63.464119][ T24] audit: type=1400 audit(1756178342.130:668): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.502295][ T24] audit: type=1400 audit(1756178342.170:669): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.526485][ T24] audit: type=1400 audit(1756178342.180:670): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.551206][ T24] audit: type=1400 audit(1756178342.190:671): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.577043][ T24] audit: type=1400 audit(1756178342.230:672): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.601291][ T24] audit: type=1400 audit(1756178342.240:673): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.625544][ T24] audit: type=1400 audit(1756178342.250:674): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.650511][ T24] audit: type=1400 audit(1756178342.290:675): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.677983][ T24] audit: type=1400 audit(1756178342.300:676): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.703020][ T24] audit: type=1400 audit(1756178342.310:677): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.120063][ T112] device bridge_slave_1 left promiscuous mode [ 65.126258][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.134299][ T112] device bridge_slave_0 left promiscuous mode [ 65.140618][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.149409][ T112] device veth1_macvtap left promiscuous mode [ 65.155602][ T112] device veth0_vlan left promiscuous mode [ 69.265593][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 69.265622][ T24] audit: type=1400 audit(1756178347.930:718): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.381531][ T24] audit: type=1400 audit(1756178349.050:719): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.597446][ T24] audit: type=1400 audit(1756178350.260:720): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.913829][ T24] audit: type=1400 audit(1756178351.580:721): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 74.329736][ T24] audit: type=1400 audit(1756178352.990:722): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.845735][ T24] audit: type=1400 audit(1756178354.510:723): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.461856][ T24] audit: type=1400 audit(1756178356.130:724): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.177634][ T24] audit: type=1400 audit(1756178357.840:725): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 80.993629][ T24] audit: type=1400 audit(1756178359.660:726): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 82.909725][ T24] audit: type=1400 audit(1756178361.570:727): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 84.925575][ T24] audit: type=1400 audit(1756178363.590:728): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 84.954613][ T24] audit: type=1400 audit(1756178363.620:729): avc: denied { write } for pid=275 comm="syz-execprog" path="pipe:[13044]" dev="pipefs" ino=13044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0