Warning: Permanently added '10.128.1.137' (ED25519) to the list of known hosts. 2025/08/02 12:20:25 ignoring optional flag "sandboxArg"="0" 2025/08/02 12:20:26 parsed 1 programs [ 42.317214][ T36] audit: type=1400 audit(1754137226.320:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 43.858926][ T36] audit: type=1400 audit(1754137227.860:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 43.860624][ T297] cgroup: Unknown subsys name 'net' [ 43.881697][ T36] audit: type=1400 audit(1754137227.860:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.909112][ T36] audit: type=1400 audit(1754137227.890:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.909323][ T297] cgroup: Unknown subsys name 'devices' [ 44.096164][ T297] cgroup: Unknown subsys name 'hugetlb' [ 44.101820][ T297] cgroup: Unknown subsys name 'rlimit' [ 44.283211][ T36] audit: type=1400 audit(1754137228.280:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.306437][ T36] audit: type=1400 audit(1754137228.290:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.319974][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 44.326889][ T36] audit: type=1400 audit(1754137228.290:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.355800][ T36] audit: type=1400 audit(1754137228.290:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.365366][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.376024][ T36] audit: type=1400 audit(1754137228.290:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 44.405763][ T36] audit: type=1400 audit(1754137228.290:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 45.302116][ T301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 45.640835][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.647998][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.655116][ T322] bridge_slave_0: entered allmulticast mode [ 45.661444][ T322] bridge_slave_0: entered promiscuous mode [ 45.668618][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.675796][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.682957][ T322] bridge_slave_1: entered allmulticast mode [ 45.689311][ T322] bridge_slave_1: entered promiscuous mode [ 45.747298][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.754400][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.761706][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.768789][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.789630][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.797146][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.807275][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.814365][ T323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.824195][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.831294][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.857539][ T322] veth0_vlan: entered promiscuous mode [ 45.868701][ T322] veth1_macvtap: entered promiscuous mode [ 45.927119][ T46] bridge_slave_1: left allmulticast mode [ 45.932887][ T46] bridge_slave_1: left promiscuous mode [ 45.938841][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.947306][ T46] bridge_slave_0: left allmulticast mode [ 45.952972][ T46] bridge_slave_0: left promiscuous mode [ 45.958836][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.095824][ T46] veth1_macvtap: left promiscuous mode [ 46.101412][ T46] veth0_vlan: left promiscuous mode 2025/08/02 12:20:30 executed programs: 0 [ 46.848652][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.856231][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.863483][ T369] bridge_slave_0: entered allmulticast mode [ 46.869767][ T369] bridge_slave_0: entered promiscuous mode [ 46.876433][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.883530][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.890625][ T369] bridge_slave_1: entered allmulticast mode [ 46.897081][ T369] bridge_slave_1: entered promiscuous mode [ 46.957492][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.964622][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.971895][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.978973][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.999881][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.007371][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.016609][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.023696][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.032864][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.039967][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.064881][ T369] veth0_vlan: entered promiscuous mode [ 47.076407][ T369] veth1_macvtap: entered promiscuous mode [ 47.357711][ T36] kauditd_printk_skb: 47 callbacks suppressed [ 47.357730][ T36] audit: type=1400 audit(1754137231.360:121): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.387934][ T36] audit: type=1400 audit(1754137231.380:122): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.412274][ T36] audit: type=1400 audit(1754137231.380:123): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.436341][ T36] audit: type=1400 audit(1754137231.420:124): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.460560][ T36] audit: type=1400 audit(1754137231.440:125): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.484842][ T36] audit: type=1400 audit(1754137231.470:126): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.510899][ T36] audit: type=1400 audit(1754137231.510:127): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.534961][ T36] audit: type=1400 audit(1754137231.510:128): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.559180][ T36] audit: type=1400 audit(1754137231.510:129): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.583264][ T36] audit: type=1400 audit(1754137231.570:130): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.398474][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 52.398493][ T36] audit: type=1400 audit(1754137236.400:419): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.428803][ T36] audit: type=1400 audit(1754137236.420:420): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.453011][ T36] audit: type=1400 audit(1754137236.430:421): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.477228][ T36] audit: type=1400 audit(1754137236.470:422): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.501579][ T36] audit: type=1400 audit(1754137236.480:423): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.526186][ T36] audit: type=1400 audit(1754137236.480:424): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.550330][ T36] audit: type=1400 audit(1754137236.520:425): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.574853][ T36] audit: type=1400 audit(1754137236.530:426): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.598888][ T36] audit: type=1400 audit(1754137236.550:427): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.623036][ T36] audit: type=1400 audit(1754137236.580:428): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.297784][ T337] bridge_slave_1: left allmulticast mode [ 57.303539][ T337] bridge_slave_1: left promiscuous mode [ 57.309160][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.316835][ T337] bridge_slave_0: left allmulticast mode [ 57.322520][ T337] bridge_slave_0: left promiscuous mode [ 57.328295][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.476840][ T337] veth1_macvtap: left promiscuous mode [ 57.482389][ T337] veth0_vlan: left promiscuous mode [ 57.691015][ T36] kauditd_printk_skb: 283 callbacks suppressed [ 57.691033][ T36] audit: type=1400 audit(1754137241.690:712): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.199665][ T36] audit: type=1400 audit(1754137242.200:713): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.808395][ T36] audit: type=1400 audit(1754137242.810:714): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.516884][ T36] audit: type=1400 audit(1754137243.520:715): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.325676][ T36] audit: type=1400 audit(1754137244.330:716): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.234251][ T36] audit: type=1400 audit(1754137245.240:717): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.242832][ T36] audit: type=1400 audit(1754137246.240:718): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.351364][ T36] audit: type=1400 audit(1754137247.350:719): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.559935][ T36] audit: type=1400 audit(1754137248.560:720): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.868400][ T36] audit: type=1400 audit(1754137249.870:721): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.277008][ T36] audit: type=1400 audit(1754137251.280:722): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.785617][ T36] audit: type=1400 audit(1754137252.790:723): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.394418][ T36] audit: type=1400 audit(1754137254.400:724): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.103292][ T36] audit: type=1400 audit(1754137256.100:725): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.911933][ T36] audit: type=1400 audit(1754137257.910:726): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.820768][ T36] audit: type=1400 audit(1754137259.820:727): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.830240][ T36] audit: type=1400 audit(1754137261.830:728): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.853581][ T36] audit: type=1400 audit(1754137261.850:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1649]" dev="pipefs" ino=1649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0