Warning: Permanently added '10.128.1.42' (ED25519) to the list of known hosts. 2025/08/18 04:52:22 ignoring optional flag "sandboxArg"="0" 2025/08/18 04:52:23 parsed 1 programs [ 38.282241][ T36] audit: type=1400 audit(1755492743.559:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 39.200547][ T36] audit: type=1400 audit(1755492744.479:65): avc: denied { mounton } for pid=299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 39.201681][ T299] cgroup: Unknown subsys name 'net' [ 39.223385][ T36] audit: type=1400 audit(1755492744.479:66): avc: denied { mount } for pid=299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.250682][ T36] audit: type=1400 audit(1755492744.509:67): avc: denied { unmount } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.250876][ T299] cgroup: Unknown subsys name 'devices' [ 39.435941][ T299] cgroup: Unknown subsys name 'hugetlb' [ 39.441645][ T299] cgroup: Unknown subsys name 'rlimit' [ 39.600004][ T36] audit: type=1400 audit(1755492744.879:68): avc: denied { setattr } for pid=299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.623293][ T36] audit: type=1400 audit(1755492744.879:69): avc: denied { create } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.643648][ T36] audit: type=1400 audit(1755492744.879:70): avc: denied { write } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.664010][ T36] audit: type=1400 audit(1755492744.879:71): avc: denied { read } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.672333][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 39.684251][ T36] audit: type=1400 audit(1755492744.879:72): avc: denied { sys_module } for pid=299 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 39.713756][ T36] audit: type=1400 audit(1755492744.879:73): avc: denied { mounton } for pid=299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.749848][ T299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.712878][ T307] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 41.192518][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.200637][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.208578][ T339] bridge_slave_0: entered allmulticast mode [ 41.215005][ T339] bridge_slave_0: entered promiscuous mode [ 41.221473][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.228664][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.235751][ T339] bridge_slave_1: entered allmulticast mode [ 41.241899][ T339] bridge_slave_1: entered promiscuous mode [ 41.292735][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.299812][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.307246][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.314331][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.332110][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.339453][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.349796][ T127] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.356863][ T127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.366088][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.373130][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.396318][ T339] veth0_vlan: entered promiscuous mode [ 41.406439][ T339] veth1_macvtap: entered promiscuous mode [ 41.445825][ T46] bridge_slave_1: left allmulticast mode [ 41.451516][ T46] bridge_slave_1: left promiscuous mode [ 41.457240][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.465114][ T46] bridge_slave_0: left allmulticast mode [ 41.470782][ T46] bridge_slave_0: left promiscuous mode [ 41.476584][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.607348][ T46] veth1_macvtap: left promiscuous mode [ 41.612902][ T46] veth0_vlan: left promiscuous mode 2025/08/18 04:52:27 executed programs: 0 [ 41.800562][ T368] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.807747][ T368] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.815098][ T368] bridge_slave_0: entered allmulticast mode [ 41.821289][ T368] bridge_slave_0: entered promiscuous mode [ 41.827636][ T368] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.834683][ T368] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.841717][ T368] bridge_slave_1: entered allmulticast mode [ 41.847975][ T368] bridge_slave_1: entered promiscuous mode [ 41.887148][ T368] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.894235][ T368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.901498][ T368] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.908550][ T368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.926595][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.933923][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.943202][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.950314][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.959130][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.966211][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.989146][ T368] veth0_vlan: entered promiscuous mode [ 41.999882][ T368] veth1_macvtap: entered promiscuous mode [ 43.284350][ T36] kauditd_printk_skb: 109 callbacks suppressed [ 43.284367][ T36] audit: type=1400 audit(1755492748.569:183): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.327411][ T36] audit: type=1400 audit(1755492748.609:184): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.351513][ T36] audit: type=1400 audit(1755492748.619:185): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.375744][ T36] audit: type=1400 audit(1755492748.629:186): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.399807][ T36] audit: type=1400 audit(1755492748.659:187): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.423822][ T36] audit: type=1400 audit(1755492748.669:188): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.447937][ T36] audit: type=1400 audit(1755492748.679:189): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.472154][ T36] audit: type=1400 audit(1755492748.709:190): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.496220][ T36] audit: type=1400 audit(1755492748.749:191): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.520414][ T36] audit: type=1400 audit(1755492748.749:192): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.308137][ T36] kauditd_printk_skb: 289 callbacks suppressed [ 48.308153][ T36] audit: type=1400 audit(1755492753.589:482): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.338314][ T36] audit: type=1400 audit(1755492753.599:483): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.362447][ T36] audit: type=1400 audit(1755492753.599:484): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.386387][ T36] audit: type=1400 audit(1755492753.649:485): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.410572][ T36] audit: type=1400 audit(1755492753.659:486): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.434474][ T36] audit: type=1400 audit(1755492753.679:487): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.458471][ T36] audit: type=1400 audit(1755492753.719:488): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.482497][ T36] audit: type=1400 audit(1755492753.739:489): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.506461][ T36] audit: type=1400 audit(1755492753.739:490): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.530394][ T36] audit: type=1400 audit(1755492753.789:491): avc: denied { read write } for pid=368 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.173946][ T13] bridge_slave_1: left allmulticast mode [ 52.179605][ T13] bridge_slave_1: left promiscuous mode [ 52.185265][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.192697][ T13] bridge_slave_0: left allmulticast mode [ 52.198426][ T13] bridge_slave_0: left promiscuous mode [ 52.204064][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.286000][ T13] veth1_macvtap: left promiscuous mode [ 52.291547][ T13] veth0_vlan: left promiscuous mode [ 53.649735][ T36] kauditd_printk_skb: 222 callbacks suppressed [ 53.649750][ T36] audit: type=1400 audit(1755492758.929:714): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.356854][ T36] audit: type=1400 audit(1755492759.639:715): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.163764][ T36] audit: type=1400 audit(1755492760.439:716): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.070748][ T36] audit: type=1400 audit(1755492761.349:717): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.077662][ T36] audit: type=1400 audit(1755492762.359:718): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.184697][ T36] audit: type=1400 audit(1755492763.469:719): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.391694][ T36] audit: type=1400 audit(1755492764.669:720): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.698866][ T36] audit: type=1400 audit(1755492765.979:721): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.105810][ T36] audit: type=1400 audit(1755492767.389:722): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.613123][ T36] audit: type=1400 audit(1755492768.889:723): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.220428][ T36] audit: type=1400 audit(1755492770.499:724): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.928316][ T36] audit: type=1400 audit(1755492772.209:725): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.735780][ T36] audit: type=1400 audit(1755492774.019:726): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.642733][ T36] audit: type=1400 audit(1755492775.919:727): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.649947][ T36] audit: type=1400 audit(1755492777.929:728): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.672439][ T36] audit: type=1400 audit(1755492777.949:729): avc: denied { write } for pid=290 comm="syz-execprog" path="pipe:[2464]" dev="pipefs" ino=2464 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0