Warning: Permanently added '10.128.0.201' (ED25519) to the list of known hosts. 2025/08/13 10:20:25 ignoring optional flag "sandboxArg"="0" 2025/08/13 10:20:26 parsed 1 programs [ 32.872123][ T36] audit: type=1400 audit(1755080426.429:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 33.798736][ T36] audit: type=1400 audit(1755080427.349:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.800147][ T297] cgroup: Unknown subsys name 'net' [ 33.821492][ T36] audit: type=1400 audit(1755080427.349:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.848719][ T36] audit: type=1400 audit(1755080427.379:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.848876][ T297] cgroup: Unknown subsys name 'devices' [ 34.011654][ T297] cgroup: Unknown subsys name 'hugetlb' [ 34.017285][ T297] cgroup: Unknown subsys name 'rlimit' [ 34.156130][ T36] audit: type=1400 audit(1755080427.709:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.179394][ T36] audit: type=1400 audit(1755080427.709:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.199853][ T36] audit: type=1400 audit(1755080427.709:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.208133][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.220218][ T36] audit: type=1400 audit(1755080427.709:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.248841][ T36] audit: type=1400 audit(1755080427.709:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 34.259828][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.269944][ T36] audit: type=1400 audit(1755080427.709:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 35.102283][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 35.397491][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.404604][ T323] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.411709][ T323] bridge_slave_0: entered allmulticast mode [ 35.417889][ T323] bridge_slave_0: entered promiscuous mode [ 35.424377][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.431427][ T323] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.438470][ T323] bridge_slave_1: entered allmulticast mode [ 35.444773][ T323] bridge_slave_1: entered promiscuous mode [ 35.485692][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.492797][ T323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.500098][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.507129][ T323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.524209][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.531489][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.552083][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.559132][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.567855][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.574903][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.595626][ T323] veth0_vlan: entered promiscuous mode [ 35.607526][ T323] veth1_macvtap: entered promiscuous mode [ 35.715734][ T13] bridge_slave_1: left allmulticast mode [ 35.722479][ T13] bridge_slave_1: left promiscuous mode [ 35.728119][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.736338][ T13] bridge_slave_0: left allmulticast mode [ 35.742047][ T13] bridge_slave_0: left promiscuous mode [ 35.747607][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.862576][ T13] veth1_macvtap: left promiscuous mode [ 35.868121][ T13] veth0_vlan: left promiscuous mode 2025/08/13 10:20:29 executed programs: 0 [ 36.277310][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.284397][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.291622][ T370] bridge_slave_0: entered allmulticast mode [ 36.297762][ T370] bridge_slave_0: entered promiscuous mode [ 36.304059][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.311156][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.318200][ T370] bridge_slave_1: entered allmulticast mode [ 36.324736][ T370] bridge_slave_1: entered promiscuous mode [ 36.365338][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.372409][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.379714][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.386731][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.409484][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.416767][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.425946][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.433006][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.450453][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.457506][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.475410][ T370] veth0_vlan: entered promiscuous mode [ 36.485238][ T370] veth1_macvtap: entered promiscuous mode [ 37.912598][ T36] kauditd_printk_skb: 116 callbacks suppressed [ 37.912613][ T36] audit: type=1400 audit(1755080431.469:190): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.942774][ T36] audit: type=1400 audit(1755080431.489:191): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.966728][ T36] audit: type=1400 audit(1755080431.489:192): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.990765][ T36] audit: type=1400 audit(1755080431.529:193): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.014745][ T36] audit: type=1400 audit(1755080431.539:194): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.038663][ T36] audit: type=1400 audit(1755080431.559:195): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.062704][ T36] audit: type=1400 audit(1755080431.579:196): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.086788][ T36] audit: type=1400 audit(1755080431.599:197): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.111919][ T36] audit: type=1400 audit(1755080431.609:198): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.135909][ T36] audit: type=1400 audit(1755080431.619:199): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.932957][ T36] kauditd_printk_skb: 290 callbacks suppressed [ 42.932981][ T36] audit: type=1400 audit(1755080436.489:490): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.963076][ T36] audit: type=1400 audit(1755080436.509:491): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.987120][ T36] audit: type=1400 audit(1755080436.509:492): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.011048][ T36] audit: type=1400 audit(1755080436.549:493): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.035097][ T36] audit: type=1400 audit(1755080436.549:494): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.059062][ T36] audit: type=1400 audit(1755080436.559:495): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.083095][ T36] audit: type=1400 audit(1755080436.599:496): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.107009][ T36] audit: type=1400 audit(1755080436.619:497): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.131055][ T36] audit: type=1400 audit(1755080436.629:498): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.154974][ T36] audit: type=1400 audit(1755080436.649:499): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.599235][ T13] bridge_slave_1: left allmulticast mode [ 46.604952][ T13] bridge_slave_1: left promiscuous mode [ 46.610580][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.618021][ T13] bridge_slave_0: left allmulticast mode [ 46.623736][ T13] bridge_slave_0: left promiscuous mode [ 46.629310][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.731740][ T13] veth1_macvtap: left promiscuous mode [ 46.737235][ T13] veth0_vlan: left promiscuous mode [ 48.075770][ T36] kauditd_printk_skb: 214 callbacks suppressed [ 48.075786][ T36] audit: type=1400 audit(1755080441.629:714): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.782512][ T36] audit: type=1400 audit(1755080442.339:715): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.589166][ T36] audit: type=1400 audit(1755080443.149:716): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.495821][ T36] audit: type=1400 audit(1755080444.049:717): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.503388][ T36] audit: type=1400 audit(1755080445.059:718): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.610280][ T36] audit: type=1400 audit(1755080446.169:719): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.816883][ T36] audit: type=1400 audit(1755080447.369:720): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.123516][ T36] audit: type=1400 audit(1755080448.679:721): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.530283][ T36] audit: type=1400 audit(1755080450.089:722): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.037125][ T36] audit: type=1400 audit(1755080451.589:723): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.644508][ T36] audit: type=1400 audit(1755080453.199:724): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.351467][ T36] audit: type=1400 audit(1755080454.909:725): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.158152][ T36] audit: type=1400 audit(1755080456.719:726): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.064946][ T36] audit: type=1400 audit(1755080458.619:727): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.071715][ T36] audit: type=1400 audit(1755080460.629:728): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.093290][ T36] audit: type=1400 audit(1755080460.649:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[3157]" dev="pipefs" ino=3157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0