rocess permissive=1 [ 12.630377][ T24] audit: type=1400 audit(1755802223.960:63): avc: denied { siginh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.254' (ED25519) to the list of known hosts. 2025/08/21 18:50:39 parsed 1 programs [ 27.972057][ T24] audit: type=1400 audit(1755802239.340:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.980295][ T24] audit: type=1400 audit(1755802239.340:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.986339][ T24] audit: type=1400 audit(1755802239.340:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 28.674058][ T24] audit: type=1400 audit(1755802240.040:67): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.675237][ T283] cgroup: Unknown subsys name 'net' [ 28.697550][ T24] audit: type=1400 audit(1755802240.040:68): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.726133][ T24] audit: type=1400 audit(1755802240.070:69): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.726487][ T283] cgroup: Unknown subsys name 'devices' [ 28.868878][ T283] cgroup: Unknown subsys name 'hugetlb' [ 28.874652][ T283] cgroup: Unknown subsys name 'rlimit' [ 29.016853][ T24] audit: type=1400 audit(1755802240.380:70): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.040998][ T24] audit: type=1400 audit(1755802240.390:71): avc: denied { create } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.061554][ T24] audit: type=1400 audit(1755802240.390:72): avc: denied { write } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.082452][ T24] audit: type=1400 audit(1755802240.390:73): avc: denied { read } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.082895][ T286] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.176728][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.632063][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 29.643141][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 30.192877][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.200046][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.207919][ T338] device bridge_slave_0 entered promiscuous mode [ 30.215375][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.223340][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.231381][ T338] device bridge_slave_1 entered promiscuous mode [ 30.262613][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.270388][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.278504][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.286152][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.303346][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.311314][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.318838][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.328571][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.337004][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.344211][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.354010][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.362278][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.369663][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.381404][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.391189][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.404762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.415878][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.424581][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.433356][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.442096][ T338] device veth0_vlan entered promiscuous mode [ 30.452282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.461427][ T338] device veth1_macvtap entered promiscuous mode [ 30.470539][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.480604][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/08/21 18:50:42 executed programs: 0 [ 30.784851][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.792829][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.801680][ T353] device bridge_slave_0 entered promiscuous mode [ 30.809163][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.816637][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.824175][ T353] device bridge_slave_1 entered promiscuous mode [ 30.862842][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.871140][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.879245][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.886919][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.909954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.918714][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.927948][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.948289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.957776][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.965232][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.973176][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.983267][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.991160][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.999572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.008247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.018847][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.027874][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.045936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.053881][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.062374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.070379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.079289][ T353] device veth0_vlan entered promiscuous mode [ 31.091674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.101154][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.112723][ T353] device veth1_macvtap entered promiscuous mode [ 31.124705][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.133361][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.142774][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.154406][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.164295][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.938604][ T49] device bridge_slave_1 left promiscuous mode [ 31.944907][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.953464][ T49] device bridge_slave_0 left promiscuous mode [ 31.960119][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.968077][ T49] device veth1_macvtap left promiscuous mode [ 31.974310][ T49] device veth0_vlan left promiscuous mode [ 32.990935][ T24] kauditd_printk_skb: 140 callbacks suppressed [ 32.990946][ T24] audit: type=1400 audit(1755802244.360:214): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.022666][ T24] audit: type=1400 audit(1755802244.360:215): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.047966][ T24] audit: type=1400 audit(1755802244.370:216): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.073145][ T24] audit: type=1400 audit(1755802244.420:217): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.098479][ T24] audit: type=1400 audit(1755802244.420:218): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.123965][ T24] audit: type=1400 audit(1755802244.420:219): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.149736][ T24] audit: type=1400 audit(1755802244.470:220): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.174187][ T24] audit: type=1400 audit(1755802244.470:221): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.200059][ T24] audit: type=1400 audit(1755802244.470:222): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.224504][ T24] audit: type=1400 audit(1755802244.520:223): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.010479][ T24] kauditd_printk_skb: 292 callbacks suppressed [ 38.010491][ T24] audit: type=1400 audit(1755802249.380:516): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.041039][ T24] audit: type=1400 audit(1755802249.380:517): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.065960][ T24] audit: type=1400 audit(1755802249.390:518): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.090622][ T24] audit: type=1400 audit(1755802249.440:519): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.115350][ T24] audit: type=1400 audit(1755802249.440:520): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.139949][ T24] audit: type=1400 audit(1755802249.440:521): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.165248][ T24] audit: type=1400 audit(1755802249.490:522): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.191469][ T24] audit: type=1400 audit(1755802249.490:523): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.216404][ T24] audit: type=1400 audit(1755802249.490:524): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.241011][ T24] audit: type=1400 audit(1755802249.540:525): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.127617][ T49] device bridge_slave_1 left promiscuous mode [ 42.133952][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.141564][ T49] device bridge_slave_0 left promiscuous mode [ 42.148510][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.156152][ T49] device veth1_macvtap left promiscuous mode [ 42.162443][ T49] device veth0_vlan left promiscuous mode [ 43.429123][ T24] kauditd_printk_skb: 188 callbacks suppressed [ 43.429133][ T24] audit: type=1400 audit(1755802254.800:714): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.235328][ T24] audit: type=1400 audit(1755802255.610:715): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.141419][ T24] audit: type=1400 audit(1755802256.510:716): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.147885][ T24] audit: type=1400 audit(1755802257.520:717): avc: denied { execmem } for pid=1004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.253849][ T24] audit: type=1400 audit(1755802258.630:718): avc: denied { execmem } for pid=1005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.459856][ T24] audit: type=1400 audit(1755802259.830:719): avc: denied { execmem } for pid=1006 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.765823][ T24] audit: type=1400 audit(1755802261.140:720): avc: denied { execmem } for pid=1007 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.172255][ T24] audit: type=1400 audit(1755802262.540:721): avc: denied { execmem } for pid=1008 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.678664][ T24] audit: type=1400 audit(1755802264.050:722): avc: denied { execmem } for pid=1009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.284692][ T24] audit: type=1400 audit(1755802265.660:723): avc: denied { execmem } for pid=1010 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.991033][ T24] audit: type=1400 audit(1755802267.360:724): avc: denied { execmem } for pid=1011 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.797065][ T24] audit: type=1400 audit(1755802269.170:725): avc: denied { execmem } for pid=1012 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.703019][ T24] audit: type=1400 audit(1755802271.080:726): avc: denied { execmem } for pid=1013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.709103][ T24] audit: type=1400 audit(1755802273.080:727): avc: denied { execmem } for pid=1014 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.731370][ T24] audit: type=1400 audit(1755802273.100:728): avc: denied { write } for pid=275 comm="syz-execprog" path="pipe:[13086]" dev="pipefs" ino=13086 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0