Warning: Permanently added '10.128.1.88' (ED25519) to the list of known hosts. 2025/08/16 22:11:04 ignoring optional flag "sandboxArg"="0" 2025/08/16 22:11:05 parsed 1 programs [ 22.196796][ T36] audit: type=1400 audit(1755382265.730:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.117812][ T36] audit: type=1400 audit(1755382266.650:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.118835][ T298] cgroup: Unknown subsys name 'net' [ 23.140503][ T36] audit: type=1400 audit(1755382266.650:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.167724][ T36] audit: type=1400 audit(1755382266.680:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.168011][ T298] cgroup: Unknown subsys name 'devices' [ 23.312267][ T298] cgroup: Unknown subsys name 'hugetlb' [ 23.317882][ T298] cgroup: Unknown subsys name 'rlimit' [ 23.415460][ T36] audit: type=1400 audit(1755382266.950:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.438641][ T36] audit: type=1400 audit(1755382266.950:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.459117][ T36] audit: type=1400 audit(1755382266.950:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.466773][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.479611][ T36] audit: type=1400 audit(1755382266.950:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.508110][ T36] audit: type=1400 audit(1755382266.950:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 23.512532][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.529060][ T36] audit: type=1400 audit(1755382266.950:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.367086][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 24.657853][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.664973][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.672317][ T321] bridge_slave_0: entered allmulticast mode [ 24.678542][ T321] bridge_slave_0: entered promiscuous mode [ 24.684946][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.691996][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.699033][ T321] bridge_slave_1: entered allmulticast mode [ 24.705339][ T321] bridge_slave_1: entered promiscuous mode [ 24.759492][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.766590][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.773922][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.781063][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.803451][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.810689][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.820711][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.827770][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.840753][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.847809][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.867476][ T321] veth0_vlan: entered promiscuous mode [ 24.877267][ T321] veth1_macvtap: entered promiscuous mode [ 24.931933][ T13] bridge_slave_1: left allmulticast mode [ 24.937700][ T13] bridge_slave_1: left promiscuous mode [ 24.943395][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.951140][ T13] bridge_slave_0: left allmulticast mode [ 24.956768][ T13] bridge_slave_0: left promiscuous mode [ 24.962834][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.093792][ T13] veth1_macvtap: left promiscuous mode [ 25.099417][ T13] veth0_vlan: left promiscuous mode 2025/08/16 22:11:09 executed programs: 0 [ 25.640682][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.647749][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.655049][ T371] bridge_slave_0: entered allmulticast mode [ 25.662543][ T371] bridge_slave_0: entered promiscuous mode [ 25.678416][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.685509][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.692681][ T371] bridge_slave_1: entered allmulticast mode [ 25.698835][ T371] bridge_slave_1: entered promiscuous mode [ 25.755717][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.762798][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.772299][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.779343][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.803533][ T371] veth0_vlan: entered promiscuous mode [ 25.813642][ T371] veth1_macvtap: entered promiscuous mode [ 27.244925][ T36] kauditd_printk_skb: 116 callbacks suppressed [ 27.244941][ T36] audit: type=1400 audit(1755382270.780:190): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.275148][ T36] audit: type=1400 audit(1755382270.790:191): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.299688][ T36] audit: type=1400 audit(1755382270.790:192): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.323659][ T36] audit: type=1400 audit(1755382270.840:193): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.347675][ T36] audit: type=1400 audit(1755382270.840:194): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.371728][ T36] audit: type=1400 audit(1755382270.860:195): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.395692][ T36] audit: type=1400 audit(1755382270.860:196): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.419646][ T36] audit: type=1400 audit(1755382270.910:197): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.443740][ T36] audit: type=1400 audit(1755382270.910:198): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 27.467659][ T36] audit: type=1400 audit(1755382270.930:199): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.293485][ T36] kauditd_printk_skb: 292 callbacks suppressed [ 32.293500][ T36] audit: type=1400 audit(1755382275.830:492): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.323590][ T36] audit: type=1400 audit(1755382275.850:493): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.347647][ T36] audit: type=1400 audit(1755382275.850:494): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.371612][ T36] audit: type=1400 audit(1755382275.890:495): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.395559][ T36] audit: type=1400 audit(1755382275.890:496): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.419476][ T36] audit: type=1400 audit(1755382275.900:497): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.443424][ T36] audit: type=1400 audit(1755382275.940:498): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.467410][ T36] audit: type=1400 audit(1755382275.940:499): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.491332][ T36] audit: type=1400 audit(1755382275.940:500): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.515418][ T36] audit: type=1400 audit(1755382276.010:501): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.924383][ T13] bridge_slave_1: left allmulticast mode [ 35.930074][ T13] bridge_slave_1: left promiscuous mode [ 35.935683][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.943246][ T13] bridge_slave_0: left allmulticast mode [ 35.948875][ T13] bridge_slave_0: left promiscuous mode [ 35.954564][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.062269][ T13] veth1_macvtap: left promiscuous mode [ 36.067773][ T13] veth0_vlan: left promiscuous mode [ 37.417593][ T36] kauditd_printk_skb: 212 callbacks suppressed [ 37.417608][ T36] audit: type=1400 audit(1755382280.950:714): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 38.124509][ T36] audit: type=1400 audit(1755382281.660:715): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 38.931390][ T36] audit: type=1400 audit(1755382282.470:716): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 39.838190][ T36] audit: type=1400 audit(1755382283.370:717): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.844904][ T36] audit: type=1400 audit(1755382284.380:718): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.951675][ T36] audit: type=1400 audit(1755382285.490:719): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.158472][ T36] audit: type=1400 audit(1755382286.690:720): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.465256][ T36] audit: type=1400 audit(1755382288.000:721): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.872164][ T36] audit: type=1400 audit(1755382289.410:722): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.379088][ T36] audit: type=1400 audit(1755382290.910:723): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.985896][ T36] audit: type=1400 audit(1755382292.520:724): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.692799][ T36] audit: type=1400 audit(1755382294.230:725): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.499674][ T36] audit: type=1400 audit(1755382296.030:726): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.406536][ T36] audit: type=1400 audit(1755382297.940:727): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.413406][ T36] audit: type=1400 audit(1755382299.950:728): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.435776][ T36] audit: type=1400 audit(1755382299.970:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[3171]" dev="pipefs" ino=3171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0