Warning: Permanently added '10.128.0.96' (ED25519) to the list of known hosts. 2025/06/21 19:22:38 ignoring optional flag "sandboxArg"="0" 2025/06/21 19:22:39 parsed 1 programs [ 315.176127][ T36] audit: type=1400 audit(1750533759.540:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 316.582157][ T36] audit: type=1400 audit(1750533760.940:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 316.583733][ T298] cgroup: Unknown subsys name 'net' [ 316.604859][ T36] audit: type=1400 audit(1750533760.940:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 316.632284][ T36] audit: type=1400 audit(1750533760.970:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 316.632539][ T298] cgroup: Unknown subsys name 'devices' [ 316.758332][ T298] cgroup: Unknown subsys name 'hugetlb' [ 316.763963][ T298] cgroup: Unknown subsys name 'rlimit' [ 316.879242][ T36] audit: type=1400 audit(1750533761.240:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 316.902453][ T36] audit: type=1400 audit(1750533761.240:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 316.914807][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 316.923064][ T36] audit: type=1400 audit(1750533761.240:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 316.951666][ T36] audit: type=1400 audit(1750533761.240:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 316.971881][ T36] audit: type=1400 audit(1750533761.240:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 316.984960][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 316.992890][ T36] audit: type=1400 audit(1750533761.240:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 317.883970][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 317.999687][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.006822][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.013918][ T307] bridge_slave_0: entered allmulticast mode [ 318.020327][ T307] bridge_slave_0: entered promiscuous mode [ 318.026883][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.033944][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.041061][ T307] bridge_slave_1: entered allmulticast mode [ 318.047362][ T307] bridge_slave_1: entered promiscuous mode [ 318.099121][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.106205][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.113454][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.120506][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.142288][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.149601][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.159698][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.166780][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.175654][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.182755][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.208278][ T307] veth0_vlan: entered promiscuous mode [ 318.219197][ T307] veth1_macvtap: entered promiscuous mode [ 318.280012][ T46] bridge_slave_1: left allmulticast mode [ 318.285702][ T46] bridge_slave_1: left promiscuous mode [ 318.291408][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.299777][ T46] bridge_slave_0: left allmulticast mode [ 318.305432][ T46] bridge_slave_0: left promiscuous mode [ 318.311112][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.498903][ T46] veth1_macvtap: left promiscuous mode [ 318.504486][ T46] veth0_vlan: left promiscuous mode 2025/06/21 19:22:43 executed programs: 0 [ 319.492972][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.500159][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.507317][ T362] bridge_slave_0: entered allmulticast mode [ 319.513571][ T362] bridge_slave_0: entered promiscuous mode [ 319.523296][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.530438][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.537613][ T362] bridge_slave_1: entered allmulticast mode [ 319.544027][ T362] bridge_slave_1: entered promiscuous mode [ 319.610059][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.617153][ T362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.624411][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.631502][ T362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.654073][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.661491][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.670994][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.678072][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.688681][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.695919][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.724572][ T362] veth0_vlan: entered promiscuous mode [ 319.736407][ T362] veth1_macvtap: entered promiscuous mode [ 320.188909][ T36] kauditd_printk_skb: 58 callbacks suppressed [ 320.188926][ T36] audit: type=1400 audit(1750533764.550:132): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.230345][ T36] audit: type=1400 audit(1750533764.590:133): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.254344][ T36] audit: type=1400 audit(1750533764.600:134): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.278358][ T36] audit: type=1400 audit(1750533764.600:135): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.303158][ T36] audit: type=1400 audit(1750533764.660:136): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.327375][ T36] audit: type=1400 audit(1750533764.670:137): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.351687][ T36] audit: type=1400 audit(1750533764.680:138): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.375912][ T36] audit: type=1400 audit(1750533764.720:139): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.400249][ T36] audit: type=1400 audit(1750533764.720:140): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.424402][ T36] audit: type=1400 audit(1750533764.730:141): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.230329][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 325.230346][ T36] audit: type=1400 audit(1750533769.590:430): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.260551][ T36] audit: type=1400 audit(1750533769.600:431): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.284824][ T36] audit: type=1400 audit(1750533769.600:432): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.308842][ T36] audit: type=1400 audit(1750533769.640:433): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.332891][ T36] audit: type=1400 audit(1750533769.640:434): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.357088][ T36] audit: type=1400 audit(1750533769.660:435): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.381056][ T36] audit: type=1400 audit(1750533769.720:436): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.405063][ T36] audit: type=1400 audit(1750533769.720:437): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.429523][ T36] audit: type=1400 audit(1750533769.740:438): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.453732][ T36] audit: type=1400 audit(1750533769.790:439): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 329.966499][ T13] bridge_slave_1: left allmulticast mode [ 329.972179][ T13] bridge_slave_1: left promiscuous mode [ 329.977844][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.985324][ T13] bridge_slave_0: left allmulticast mode [ 329.991075][ T13] bridge_slave_0: left promiscuous mode [ 329.996742][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.118597][ T13] veth1_macvtap: left promiscuous mode [ 330.124225][ T13] veth0_vlan: left promiscuous mode [ 330.339001][ T36] kauditd_printk_skb: 272 callbacks suppressed [ 330.339018][ T36] audit: type=1400 audit(1750533774.700:712): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 330.847635][ T36] audit: type=1400 audit(1750533775.210:713): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 331.456291][ T36] audit: type=1400 audit(1750533775.820:714): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 332.164749][ T36] audit: type=1400 audit(1750533776.520:715): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 332.973455][ T36] audit: type=1400 audit(1750533777.330:716): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 333.881945][ T36] audit: type=1400 audit(1750533778.240:717): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 334.890517][ T36] audit: type=1400 audit(1750533779.250:718): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 335.999033][ T36] audit: type=1400 audit(1750533780.360:719): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 337.207468][ T36] audit: type=1400 audit(1750533781.570:720): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 338.515930][ T36] audit: type=1400 audit(1750533782.880:721): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 339.924420][ T36] audit: type=1400 audit(1750533784.280:722): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 341.432777][ T36] audit: type=1400 audit(1750533785.790:723): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 343.042845][ T36] audit: type=1400 audit(1750533787.400:724): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 344.751417][ T36] audit: type=1400 audit(1750533789.110:725): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 346.559837][ T36] audit: type=1400 audit(1750533790.920:726): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 348.468299][ T36] audit: type=1400 audit(1750533792.830:727): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 350.477095][ T36] audit: type=1400 audit(1750533794.840:728): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 350.499340][ T36] audit: type=1400 audit(1750533794.860:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1888]" dev="pipefs" ino=1888 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0