Warning: Permanently added '10.128.0.125' (ED25519) to the list of known hosts. 2025/07/21 06:13:21 ignoring optional flag "sandboxArg"="0" 2025/07/21 06:13:22 parsed 1 programs [ 29.712985][ T28] audit: type=1400 audit(1753078402.701:64): avc: denied { node_bind } for pid=282 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 29.734552][ T28] audit: type=1400 audit(1753078402.701:65): avc: denied { module_request } for pid=282 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 30.854220][ T28] audit: type=1400 audit(1753078403.841:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.855741][ T290] cgroup: Unknown subsys name 'net' [ 30.876943][ T28] audit: type=1400 audit(1753078403.841:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.904333][ T28] audit: type=1400 audit(1753078403.871:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.904564][ T290] cgroup: Unknown subsys name 'devices' [ 31.047998][ T290] cgroup: Unknown subsys name 'hugetlb' [ 31.053763][ T290] cgroup: Unknown subsys name 'rlimit' [ 31.189158][ T28] audit: type=1400 audit(1753078404.181:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.212490][ T28] audit: type=1400 audit(1753078404.181:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.233109][ T28] audit: type=1400 audit(1753078404.181:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.235720][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 31.253654][ T28] audit: type=1400 audit(1753078404.181:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.282781][ T28] audit: type=1400 audit(1753078404.181:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 31.317017][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.991676][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 32.084649][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.091878][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.099446][ T300] device bridge_slave_0 entered promiscuous mode [ 32.107190][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.114339][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.121882][ T300] device bridge_slave_1 entered promiscuous mode [ 32.172703][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.179819][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.187152][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.194189][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.214716][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.222130][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.229676][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.238684][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.248537][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.256939][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.263966][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.273114][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.281573][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.288835][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.302974][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.312643][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.327176][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.339311][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.347852][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.355414][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.364633][ T300] device veth0_vlan entered promiscuous mode [ 32.375649][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.384948][ T300] device veth1_macvtap entered promiscuous mode [ 32.394995][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.406656][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.447863][ T300] syz-executor (300) used greatest stack depth: 20800 bytes left [ 33.159420][ T41] device bridge_slave_1 left promiscuous mode [ 33.165730][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.173378][ T41] device bridge_slave_0 left promiscuous mode [ 33.179985][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.189062][ T41] device veth1_macvtap left promiscuous mode [ 33.195551][ T41] device veth0_vlan left promiscuous mode 2025/07/21 06:13:26 executed programs: 0 [ 33.542359][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.550210][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.557858][ T356] device bridge_slave_0 entered promiscuous mode [ 33.565108][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.572513][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.580283][ T356] device bridge_slave_1 entered promiscuous mode [ 33.634678][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.641794][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.649358][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.656525][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.678655][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.686860][ T325] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.694157][ T325] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.703291][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.711549][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.718615][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.727565][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.735840][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.742868][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.755668][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.764854][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.779793][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.791937][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.800415][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.808104][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.816712][ T356] device veth0_vlan entered promiscuous mode [ 33.828424][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.837644][ T356] device veth1_macvtap entered promiscuous mode [ 33.847527][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.857526][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.719405][ T28] kauditd_printk_skb: 80 callbacks suppressed [ 34.719420][ T28] audit: type=1400 audit(1753078407.711:154): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.749995][ T28] audit: type=1400 audit(1753078407.721:155): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.774532][ T28] audit: type=1400 audit(1753078407.721:156): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.798926][ T28] audit: type=1400 audit(1753078407.761:157): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.823701][ T28] audit: type=1400 audit(1753078407.761:158): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.848490][ T28] audit: type=1400 audit(1753078407.761:159): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.874626][ T28] audit: type=1400 audit(1753078407.811:160): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.899030][ T28] audit: type=1400 audit(1753078407.811:161): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.925600][ T28] audit: type=1400 audit(1753078407.811:162): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.950590][ T28] audit: type=1400 audit(1753078407.871:163): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.729446][ T28] kauditd_printk_skb: 288 callbacks suppressed [ 39.729471][ T28] audit: type=1400 audit(1753078412.721:452): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.760172][ T28] audit: type=1400 audit(1753078412.721:453): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.784867][ T28] audit: type=1400 audit(1753078412.731:454): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.808986][ T28] audit: type=1400 audit(1753078412.771:455): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.833388][ T28] audit: type=1400 audit(1753078412.771:456): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.857536][ T28] audit: type=1400 audit(1753078412.771:457): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.882043][ T28] audit: type=1400 audit(1753078412.831:458): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.906118][ T28] audit: type=1400 audit(1753078412.831:459): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.930373][ T28] audit: type=1400 audit(1753078412.831:460): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.954578][ T28] audit: type=1400 audit(1753078412.881:461): avc: denied { read write } for pid=356 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.536181][ T41] device bridge_slave_1 left promiscuous mode [ 44.542462][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.550274][ T41] device bridge_slave_0 left promiscuous mode [ 44.556535][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.565108][ T41] device veth1_macvtap left promiscuous mode [ 44.571397][ T41] device veth0_vlan left promiscuous mode [ 44.948994][ T28] kauditd_printk_skb: 251 callbacks suppressed [ 44.949009][ T28] audit: type=1400 audit(1753078417.941:713): avc: denied { execmem } for pid=966 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.557482][ T28] audit: type=1400 audit(1753078418.551:714): avc: denied { execmem } for pid=967 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.265688][ T28] audit: type=1400 audit(1753078419.261:715): avc: denied { execmem } for pid=968 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.073783][ T28] audit: type=1400 audit(1753078420.071:716): avc: denied { execmem } for pid=969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.981752][ T28] audit: type=1400 audit(1753078420.971:717): avc: denied { execmem } for pid=970 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.990219][ T28] audit: type=1400 audit(1753078421.981:718): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.098160][ T28] audit: type=1400 audit(1753078423.091:719): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.306096][ T28] audit: type=1400 audit(1753078424.301:720): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.614374][ T28] audit: type=1400 audit(1753078425.611:721): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.022456][ T28] audit: type=1400 audit(1753078427.011:722): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.530686][ T28] audit: type=1400 audit(1753078428.521:723): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.139154][ T28] audit: type=1400 audit(1753078430.131:724): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.848365][ T28] audit: type=1400 audit(1753078431.841:725): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.656534][ T28] audit: type=1400 audit(1753078433.651:726): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.564786][ T28] audit: type=1400 audit(1753078435.561:727): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.573455][ T28] audit: type=1400 audit(1753078437.571:728): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.596517][ T28] audit: type=1400 audit(1753078437.591:729): avc: denied { write } for pid=282 comm="syz-execprog" path="pipe:[14467]" dev="pipefs" ino=14467 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0