Warning: Permanently added '10.128.0.94' (ED25519) to the list of known hosts. 2025/08/08 08:28:36 ignoring optional flag "sandboxArg"="0" 2025/08/08 08:28:37 parsed 1 programs [ 23.568492][ T36] audit: type=1400 audit(1754641717.409:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.548223][ T36] audit: type=1400 audit(1754641718.389:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.549307][ T297] cgroup: Unknown subsys name 'net' [ 24.571203][ T36] audit: type=1400 audit(1754641718.389:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.599079][ T36] audit: type=1400 audit(1754641718.419:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.599414][ T297] cgroup: Unknown subsys name 'devices' [ 24.722876][ T297] cgroup: Unknown subsys name 'hugetlb' [ 24.728520][ T297] cgroup: Unknown subsys name 'rlimit' [ 24.885871][ T36] audit: type=1400 audit(1754641718.729:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.909608][ T36] audit: type=1400 audit(1754641718.729:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.930367][ T36] audit: type=1400 audit(1754641718.729:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.951347][ T36] audit: type=1400 audit(1754641718.729:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.963244][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.972981][ T36] audit: type=1400 audit(1754641718.729:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 25.003136][ T36] audit: type=1400 audit(1754641718.729:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.037748][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.875130][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.475208][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.482927][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.490015][ T347] bridge_slave_0: entered allmulticast mode [ 26.496785][ T347] bridge_slave_0: entered promiscuous mode [ 26.503225][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.510267][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.517364][ T347] bridge_slave_1: entered allmulticast mode [ 26.523835][ T347] bridge_slave_1: entered promiscuous mode [ 26.575176][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.582251][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.589602][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.596703][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.614765][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.622189][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.632092][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.639307][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.651956][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.659108][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.685057][ T347] veth0_vlan: entered promiscuous mode [ 26.694976][ T347] veth1_macvtap: entered promiscuous mode [ 26.795153][ T46] bridge_slave_1: left allmulticast mode [ 26.800872][ T46] bridge_slave_1: left promiscuous mode [ 26.806514][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.814372][ T46] bridge_slave_0: left allmulticast mode [ 26.820011][ T46] bridge_slave_0: left promiscuous mode [ 26.825895][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.008179][ T46] veth1_macvtap: left promiscuous mode [ 27.014026][ T46] veth0_vlan: left promiscuous mode 2025/08/08 08:28:41 executed programs: 0 [ 27.215880][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.222966][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.230572][ T371] bridge_slave_0: entered allmulticast mode [ 27.236873][ T371] bridge_slave_0: entered promiscuous mode [ 27.243525][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.250686][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.257895][ T371] bridge_slave_1: entered allmulticast mode [ 27.264323][ T371] bridge_slave_1: entered promiscuous mode [ 27.304060][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.311140][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.318409][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.325451][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.343814][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.351391][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.360682][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.367759][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.376659][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.383723][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.407963][ T371] veth0_vlan: entered promiscuous mode [ 27.417817][ T371] veth1_macvtap: entered promiscuous mode [ 28.604172][ T36] kauditd_printk_skb: 101 callbacks suppressed [ 28.604190][ T36] audit: type=1400 audit(1754641722.449:175): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.634422][ T36] audit: type=1400 audit(1754641722.459:176): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.658791][ T36] audit: type=1400 audit(1754641722.459:177): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.687717][ T36] audit: type=1400 audit(1754641722.539:178): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.711949][ T36] audit: type=1400 audit(1754641722.539:179): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.736434][ T36] audit: type=1400 audit(1754641722.539:180): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.763627][ T36] audit: type=1400 audit(1754641722.609:181): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.788030][ T36] audit: type=1400 audit(1754641722.609:182): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.812334][ T36] audit: type=1400 audit(1754641722.639:183): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.840359][ T36] audit: type=1400 audit(1754641722.689:184): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.610498][ T36] kauditd_printk_skb: 287 callbacks suppressed [ 33.610517][ T36] audit: type=1400 audit(1754641727.459:472): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.654221][ T36] audit: type=1400 audit(1754641727.499:473): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.678738][ T36] audit: type=1400 audit(1754641727.519:474): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.704356][ T36] audit: type=1400 audit(1754641727.519:475): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.732673][ T36] audit: type=1400 audit(1754641727.579:476): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.757780][ T36] audit: type=1400 audit(1754641727.579:477): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.782373][ T36] audit: type=1400 audit(1754641727.589:478): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.807236][ T36] audit: type=1400 audit(1754641727.629:479): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.831920][ T36] audit: type=1400 audit(1754641727.649:480): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.856062][ T36] audit: type=1400 audit(1754641727.669:481): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.671416][ T357] bridge_slave_1: left allmulticast mode [ 37.677100][ T357] bridge_slave_1: left promiscuous mode [ 37.682856][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.690926][ T357] bridge_slave_0: left allmulticast mode [ 37.696874][ T357] bridge_slave_0: left promiscuous mode [ 37.702711][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.812986][ T357] veth1_macvtap: left promiscuous mode [ 37.818812][ T357] veth0_vlan: left promiscuous mode [ 39.138089][ T36] kauditd_printk_skb: 232 callbacks suppressed [ 39.138105][ T36] audit: type=1400 audit(1754641732.979:714): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 39.845154][ T36] audit: type=1400 audit(1754641733.689:715): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.652059][ T36] audit: type=1400 audit(1754641734.499:716): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.558976][ T36] audit: type=1400 audit(1754641735.409:717): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.565883][ T36] audit: type=1400 audit(1754641736.409:718): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.673692][ T36] audit: type=1400 audit(1754641737.519:719): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.881369][ T36] audit: type=1400 audit(1754641738.729:720): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.188628][ T36] audit: type=1400 audit(1754641740.039:721): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.595604][ T36] audit: type=1400 audit(1754641741.439:722): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.103112][ T36] audit: type=1400 audit(1754641742.949:723): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.710627][ T36] audit: type=1400 audit(1754641744.559:724): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.417767][ T36] audit: type=1400 audit(1754641746.259:725): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.224734][ T36] audit: type=1400 audit(1754641748.069:726): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.131697][ T36] audit: type=1400 audit(1754641749.979:727): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.138521][ T36] audit: type=1400 audit(1754641751.989:728): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.161139][ T36] audit: type=1400 audit(1754641752.009:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[3127]" dev="pipefs" ino=3127 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0