Warning: Permanently added '10.128.10.18' (ED25519) to the list of known hosts. 2025/08/27 10:29:52 parsed 1 programs [ 257.477340][ T24] audit: type=1400 audit(1756290592.070:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 257.498350][ T24] audit: type=1400 audit(1756290592.070:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 257.519387][ T24] audit: type=1400 audit(1756290592.070:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 260.635403][ T24] audit: type=1400 audit(1756290595.230:67): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 260.639294][ T283] cgroup: Unknown subsys name 'net' [ 260.658258][ T24] audit: type=1400 audit(1756290595.230:68): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 260.687436][ T24] audit: type=1400 audit(1756290595.280:69): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 260.687814][ T283] cgroup: Unknown subsys name 'devices' [ 260.959111][ T283] cgroup: Unknown subsys name 'hugetlb' [ 260.965046][ T283] cgroup: Unknown subsys name 'rlimit' [ 261.220051][ T24] audit: type=1400 audit(1756290595.810:70): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 261.243399][ T24] audit: type=1400 audit(1756290595.810:71): avc: denied { create } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 261.264235][ T24] audit: type=1400 audit(1756290595.810:72): avc: denied { write } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 261.276377][ T286] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 261.284962][ T24] audit: type=1400 audit(1756290595.810:73): avc: denied { read } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 261.342590][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 262.030908][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 262.047410][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 262.661852][ T24] kauditd_printk_skb: 24 callbacks suppressed [ 262.661882][ T24] audit: type=1400 audit(1756290597.250:98): avc: denied { sys_admin } for pid=313 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 262.706324][ T24] audit: type=1400 audit(1756290597.300:99): avc: denied { sys_chroot } for pid=314 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 263.229421][ T24] audit: type=1401 audit(1756290597.820:100): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 263.359390][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.366746][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.374639][ T329] device bridge_slave_0 entered promiscuous mode [ 263.382407][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.389620][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.398099][ T329] device bridge_slave_1 entered promiscuous mode [ 263.523253][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.530369][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.537800][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.544906][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.579242][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.587496][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.595449][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.620417][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.629138][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.636296][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.662041][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.670981][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.678174][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.694152][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.715662][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.748857][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 263.766121][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.775905][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.783721][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.793972][ T329] device veth0_vlan entered promiscuous mode [ 263.827127][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.839330][ T329] device veth1_macvtap entered promiscuous mode [ 263.852187][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 263.861233][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.877908][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.886824][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.952814][ T24] audit: type=1400 audit(1756290598.540:101): avc: denied { create } for pid=349 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2025/08/27 10:29:59 executed programs: 0 [ 265.054035][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.061266][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.069204][ T372] device bridge_slave_0 entered promiscuous mode [ 265.076595][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.083648][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.091837][ T372] device bridge_slave_1 entered promiscuous mode [ 265.187013][ T24] audit: type=1400 audit(1756290599.780:102): avc: denied { create } for pid=372 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 265.199288][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.208771][ T24] audit: type=1400 audit(1756290599.780:103): avc: denied { write } for pid=372 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 265.214603][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.235646][ T24] audit: type=1400 audit(1756290599.780:104): avc: denied { read } for pid=372 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 265.242368][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.269713][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.309222][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.317746][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.325377][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.347788][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.356712][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.363870][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.382935][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.391632][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.398728][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.416820][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.438653][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.460383][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.483381][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.493229][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.501106][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.519070][ T372] device veth0_vlan entered promiscuous mode [ 265.536317][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.546544][ T49] device bridge_slave_1 left promiscuous mode [ 265.552765][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.561120][ T49] device bridge_slave_0 left promiscuous mode [ 265.567464][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.576960][ T49] device veth1_macvtap left promiscuous mode [ 265.583003][ T49] device veth0_vlan left promiscuous mode [ 265.712325][ T372] device veth1_macvtap entered promiscuous mode [ 265.727175][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.739983][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.785502][ T24] audit: type=1400 audit(1756290600.370:105): avc: denied { map_create } for pid=376 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 265.804770][ T24] audit: type=1400 audit(1756290600.370:106): avc: denied { map_read map_write } for pid=376 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 265.825375][ T24] audit: type=1400 audit(1756290600.370:107): avc: denied { prog_load } for pid=376 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 428.854764][ C0] BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 163s! [ 428.863803][ C0] Showing busy workqueues and worker pools: [ 428.869786][ C0] workqueue events: flags=0x0 [ 428.873322][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 428.873358][ T24] audit: type=1400 audit(1756290763.460:111): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 428.874566][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=2/256 refcnt=3 [ 428.910397][ C0] pending: kfree_rcu_monitor, vmstat_shepherd [ 428.914836][ T24] audit: type=1400 audit(1756290763.460:112): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 428.916997][ C0] workqueue events_power_efficient: flags=0x80 [ 428.944446][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 428.952178][ C0] pending: wg_ratelimiter_gc_entries, neigh_periodic_work, gc_worker [ 428.960787][ C0] workqueue mm_percpu_wq: flags=0x8 [ 428.966070][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 428.973789][ C0] pending: vmstat_update [ 428.978523][ C0] workqueue ipv6_addrconf: flags=0x40008 [ 428.984216][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/1 refcnt=30 [ 428.991845][ C0] pending: addrconf_dad_work [ 428.996861][ C0] delayed: addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work [ 429.047225][ C0] workqueue wg-kex-wg0: flags=0x24 [ 429.052372][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 429.060097][ C0] pending: wg_packet_handshake_receive_worker [ 429.066643][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 429.071991][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 429.079716][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker, wg_packet_decrypt_worker [ 429.089540][ C0] workqueue wg-kex-wg1: flags=0x24 [ 429.094724][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 429.102446][ C0] pending: wg_packet_handshake_receive_worker [ 429.108993][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 429.114341][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 429.122061][ C0] pending: wg_packet_decrypt_worker, wg_packet_encrypt_worker, wg_packet_tx_worker [ 429.131878][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 429.137251][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=2/256 refcnt=3 [ 429.144977][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker [ 429.574827][ T24] audit: type=1400 audit(1756290763.460:113): avc: denied { write } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.204861][ T24] audit: type=1400 audit(1756290763.460:114): avc: denied { add_name } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.774824][ T24] audit: type=1400 audit(1756290763.460:115): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 431.364815][ T24] audit: type=1400 audit(1756290763.460:116): avc: denied { append open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 431.994814][ T24] audit: type=1400 audit(1756290763.460:117): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1