Warning: Permanently added '10.128.0.175' (ED25519) to the list of known hosts. 2025/06/23 09:31:35 ignoring optional flag "sandboxArg"="0" 2025/06/23 09:31:36 parsed 1 programs [ 25.582816][ T36] audit: type=1400 audit(1750671096.909:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 26.588221][ T36] audit: type=1400 audit(1750671097.909:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.589255][ T297] cgroup: Unknown subsys name 'net' [ 26.610927][ T36] audit: type=1400 audit(1750671097.909:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.638340][ T297] cgroup: Unknown subsys name 'devices' [ 26.638341][ T36] audit: type=1400 audit(1750671097.939:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.821922][ T297] cgroup: Unknown subsys name 'hugetlb' [ 26.827551][ T297] cgroup: Unknown subsys name 'rlimit' [ 26.979212][ T36] audit: type=1400 audit(1750671098.299:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.002393][ T36] audit: type=1400 audit(1750671098.299:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.022801][ T36] audit: type=1400 audit(1750671098.299:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.031236][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.043172][ T36] audit: type=1400 audit(1750671098.309:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.071920][ T36] audit: type=1400 audit(1750671098.309:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 27.093159][ T36] audit: type=1400 audit(1750671098.309:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.131823][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.974392][ T301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 28.324561][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.331628][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.338748][ T330] bridge_slave_0: entered allmulticast mode [ 28.345038][ T330] bridge_slave_0: entered promiscuous mode [ 28.351415][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.358425][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.365520][ T330] bridge_slave_1: entered allmulticast mode [ 28.371904][ T330] bridge_slave_1: entered promiscuous mode [ 28.412020][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.419047][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.426333][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.433369][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.451710][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.458926][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.467685][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.474741][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.484066][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.491124][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.513990][ T330] veth0_vlan: entered promiscuous mode [ 28.524056][ T330] veth1_macvtap: entered promiscuous mode [ 28.674933][ T13] bridge_slave_1: left allmulticast mode [ 28.680690][ T13] bridge_slave_1: left promiscuous mode [ 28.686338][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.694263][ T13] bridge_slave_0: left allmulticast mode [ 28.700044][ T13] bridge_slave_0: left promiscuous mode [ 28.705663][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.882623][ T13] veth1_macvtap: left promiscuous mode [ 28.888213][ T13] veth0_vlan: left promiscuous mode 2025/06/23 09:31:40 executed programs: 0 [ 29.272340][ T360] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.279397][ T360] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.286549][ T360] bridge_slave_0: entered allmulticast mode [ 29.292769][ T360] bridge_slave_0: entered promiscuous mode [ 29.299016][ T360] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.306141][ T360] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.313278][ T360] bridge_slave_1: entered allmulticast mode [ 29.319412][ T360] bridge_slave_1: entered promiscuous mode [ 29.397181][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.404256][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.413188][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.420264][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.447116][ T360] veth0_vlan: entered promiscuous mode [ 29.457402][ T360] veth1_macvtap: entered promiscuous mode [ 30.633783][ T36] kauditd_printk_skb: 101 callbacks suppressed [ 30.633799][ T36] audit: type=1400 audit(1750671101.959:175): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.664005][ T36] audit: type=1400 audit(1750671101.969:176): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.687979][ T36] audit: type=1400 audit(1750671101.969:177): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.711936][ T36] audit: type=1400 audit(1750671102.019:178): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.735939][ T36] audit: type=1400 audit(1750671102.039:179): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.760053][ T36] audit: type=1400 audit(1750671102.039:180): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.784012][ T36] audit: type=1400 audit(1750671102.089:181): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.807933][ T36] audit: type=1400 audit(1750671102.109:182): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.831989][ T36] audit: type=1400 audit(1750671102.119:183): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.855920][ T36] audit: type=1400 audit(1750671102.159:184): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.683090][ T36] kauditd_printk_skb: 291 callbacks suppressed [ 35.683105][ T36] audit: type=1400 audit(1750671107.009:476): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.713204][ T36] audit: type=1400 audit(1750671107.029:477): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.737135][ T36] audit: type=1400 audit(1750671107.029:478): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.761062][ T36] audit: type=1400 audit(1750671107.069:479): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.785140][ T36] audit: type=1400 audit(1750671107.069:480): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.809197][ T36] audit: type=1400 audit(1750671107.089:481): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.833200][ T36] audit: type=1400 audit(1750671107.109:482): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.857126][ T36] audit: type=1400 audit(1750671107.129:483): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.881180][ T36] audit: type=1400 audit(1750671107.129:484): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.905273][ T36] audit: type=1400 audit(1750671107.159:485): avc: denied { read write } for pid=360 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.611115][ T13] bridge_slave_1: left allmulticast mode [ 39.616769][ T13] bridge_slave_1: left promiscuous mode [ 39.622430][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.629845][ T13] bridge_slave_0: left allmulticast mode [ 39.635558][ T13] bridge_slave_0: left promiscuous mode [ 39.641198][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.721907][ T13] veth1_macvtap: left promiscuous mode [ 39.727407][ T13] veth0_vlan: left promiscuous mode [ 41.098787][ T36] kauditd_printk_skb: 228 callbacks suppressed [ 41.098803][ T36] audit: type=1400 audit(1750671112.419:714): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.805763][ T36] audit: type=1400 audit(1750671113.129:715): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.612745][ T36] audit: type=1400 audit(1750671113.939:716): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.520206][ T36] audit: type=1400 audit(1750671114.849:717): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.526958][ T36] audit: type=1400 audit(1750671115.849:718): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.634136][ T36] audit: type=1400 audit(1750671116.959:719): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.840899][ T36] audit: type=1400 audit(1750671118.169:720): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.147656][ T36] audit: type=1400 audit(1750671119.469:721): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.554384][ T36] audit: type=1400 audit(1750671120.879:722): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.061332][ T36] audit: type=1400 audit(1750671122.389:723): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.668598][ T36] audit: type=1400 audit(1750671123.989:724): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.375471][ T36] audit: type=1400 audit(1750671125.699:725): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.182439][ T36] audit: type=1400 audit(1750671127.509:726): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.089172][ T36] audit: type=1400 audit(1750671129.409:727): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.096015][ T36] audit: type=1400 audit(1750671131.419:728): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.118189][ T36] audit: type=1400 audit(1750671131.439:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[734]" dev="pipefs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0