Warning: Permanently added '10.128.0.77' (ED25519) to the list of known hosts. 2025/07/30 02:50:10 ignoring optional flag "sandboxArg"="0" 2025/07/30 02:50:11 parsed 1 programs [ 38.573108][ T36] audit: type=1400 audit(1753843811.920:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 40.224901][ T36] audit: type=1400 audit(1753843813.570:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 40.227140][ T297] cgroup: Unknown subsys name 'net' [ 40.248120][ T36] audit: type=1400 audit(1753843813.570:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 40.275507][ T36] audit: type=1400 audit(1753843813.600:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 40.275846][ T297] cgroup: Unknown subsys name 'devices' [ 40.455850][ T297] cgroup: Unknown subsys name 'hugetlb' [ 40.461683][ T297] cgroup: Unknown subsys name 'rlimit' [ 40.617790][ T36] audit: type=1400 audit(1753843813.960:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.641288][ T36] audit: type=1400 audit(1753843813.960:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.644936][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 40.662532][ T36] audit: type=1400 audit(1753843813.960:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.691339][ T36] audit: type=1400 audit(1753843813.960:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.694386][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.711777][ T36] audit: type=1400 audit(1753843813.960:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 40.741935][ T36] audit: type=1400 audit(1753843813.960:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.713968][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.721082][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.728839][ T302] bridge_slave_0: entered allmulticast mode [ 41.735607][ T302] bridge_slave_0: entered promiscuous mode [ 41.743049][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.750607][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.758079][ T302] bridge_slave_1: entered allmulticast mode [ 41.764767][ T302] bridge_slave_1: entered promiscuous mode [ 41.828196][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.835658][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.843501][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.850872][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.875344][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.883358][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.894005][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.901184][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.910774][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.917969][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.945871][ T302] veth0_vlan: entered promiscuous mode [ 41.957903][ T302] veth1_macvtap: entered promiscuous mode [ 41.984288][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 42.023716][ T44] bridge_slave_1: left allmulticast mode [ 42.029439][ T44] bridge_slave_1: left promiscuous mode [ 42.035258][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.043221][ T44] bridge_slave_0: left allmulticast mode [ 42.048913][ T44] bridge_slave_0: left promiscuous mode [ 42.055174][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.206600][ T44] veth1_macvtap: left promiscuous mode [ 42.212486][ T44] veth0_vlan: left promiscuous mode 2025/07/30 02:50:16 executed programs: 0 [ 43.254708][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.261889][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.269061][ T367] bridge_slave_0: entered allmulticast mode [ 43.275521][ T367] bridge_slave_0: entered promiscuous mode [ 43.281946][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.289075][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.296234][ T367] bridge_slave_1: entered allmulticast mode [ 43.302769][ T367] bridge_slave_1: entered promiscuous mode [ 43.360409][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.367681][ T367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.375160][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.382225][ T367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.407106][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.415921][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.427332][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.434617][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.444203][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.451545][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.479436][ T367] veth0_vlan: entered promiscuous mode [ 43.491328][ T367] veth1_macvtap: entered promiscuous mode [ 43.587217][ T36] kauditd_printk_skb: 37 callbacks suppressed [ 43.587239][ T36] audit: type=1400 audit(1753843816.930:111): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.637936][ T36] audit: type=1400 audit(1753843816.980:112): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.661994][ T36] audit: type=1400 audit(1753843816.980:113): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.687301][ T36] audit: type=1400 audit(1753843816.980:114): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.711476][ T36] audit: type=1400 audit(1753843817.040:115): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.736060][ T36] audit: type=1400 audit(1753843817.040:116): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.760444][ T36] audit: type=1400 audit(1753843817.050:117): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.784494][ T36] audit: type=1400 audit(1753843817.100:118): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.808701][ T36] audit: type=1400 audit(1753843817.110:119): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.833667][ T36] audit: type=1400 audit(1753843817.120:120): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.593504][ T36] kauditd_printk_skb: 287 callbacks suppressed [ 48.593525][ T36] audit: type=1400 audit(1753843821.940:408): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.626636][ T36] audit: type=1400 audit(1753843821.940:409): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.666943][ T36] audit: type=1400 audit(1753843822.010:410): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.691934][ T36] audit: type=1400 audit(1753843822.030:411): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.717670][ T36] audit: type=1400 audit(1753843822.030:412): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.744049][ T36] audit: type=1400 audit(1753843822.070:413): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.768052][ T36] audit: type=1400 audit(1753843822.090:414): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.792295][ T36] audit: type=1400 audit(1753843822.100:415): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.816440][ T36] audit: type=1400 audit(1753843822.120:416): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.840874][ T36] audit: type=1400 audit(1753843822.130:417): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.605477][ T36] kauditd_printk_skb: 289 callbacks suppressed [ 53.605524][ T36] audit: type=1400 audit(1753843826.950:707): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.652369][ T36] audit: type=1400 audit(1753843826.990:708): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.673100][ T36] audit: type=1400 audit(1753843827.010:709): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.693994][ T36] audit: type=1400 audit(1753843827.030:710): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.736703][ T36] audit: type=1400 audit(1753843827.070:711): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.777713][ T12] bridge_slave_1: left allmulticast mode [ 53.783675][ T12] bridge_slave_1: left promiscuous mode [ 53.789344][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.797026][ T12] bridge_slave_0: left allmulticast mode [ 53.802855][ T12] bridge_slave_0: left promiscuous mode [ 53.808611][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.935968][ T12] veth1_macvtap: left promiscuous mode [ 53.941516][ T12] veth0_vlan: left promiscuous mode [ 54.145242][ T36] audit: type=1400 audit(1753843827.490:712): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.654533][ T36] audit: type=1400 audit(1753843828.000:713): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.264285][ T36] audit: type=1400 audit(1753843828.610:714): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.973362][ T36] audit: type=1400 audit(1753843829.320:715): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.782944][ T36] audit: type=1400 audit(1753843830.130:716): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.700915][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 58.700935][ T36] audit: type=1400 audit(1753843832.040:718): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.810225][ T36] audit: type=1400 audit(1753843833.150:719): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.020437][ T36] audit: type=1400 audit(1753843834.360:720): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.330129][ T36] audit: type=1400 audit(1753843835.670:721): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.740053][ T36] audit: type=1400 audit(1753843837.080:722): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.249887][ T36] audit: type=1400 audit(1753843838.590:723): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.859682][ T36] audit: type=1400 audit(1753843840.200:724): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.569583][ T36] audit: type=1400 audit(1753843841.910:725): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.379263][ T36] audit: type=1400 audit(1753843843.720:726): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.289232][ T36] audit: type=1400 audit(1753843845.630:727): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 74.299068][ T36] audit: type=1400 audit(1753843847.640:728): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 74.323836][ T36] audit: type=1400 audit(1753843847.670:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[3129]" dev="pipefs" ino=3129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0