Warning: Permanently added '10.128.0.69' (ED25519) to the list of known hosts. 2025/08/09 06:44:37 ignoring optional flag "sandboxArg"="0" 2025/08/09 06:44:38 parsed 1 programs [ 43.446822][ T36] audit: type=1400 audit(1754721878.060:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 44.360927][ T36] audit: type=1400 audit(1754721878.980:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 44.361982][ T297] cgroup: Unknown subsys name 'net' [ 44.383556][ T36] audit: type=1400 audit(1754721878.980:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 44.410764][ T36] audit: type=1400 audit(1754721879.010:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 44.410994][ T297] cgroup: Unknown subsys name 'devices' [ 44.570975][ T297] cgroup: Unknown subsys name 'hugetlb' [ 44.576552][ T297] cgroup: Unknown subsys name 'rlimit' [ 44.714580][ T36] audit: type=1400 audit(1754721879.330:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.737710][ T36] audit: type=1400 audit(1754721879.330:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.743183][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 44.758052][ T36] audit: type=1400 audit(1754721879.330:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.786801][ T36] audit: type=1400 audit(1754721879.330:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.806978][ T36] audit: type=1400 audit(1754721879.330:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 44.813202][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.827907][ T36] audit: type=1400 audit(1754721879.330:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 45.668278][ T301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 46.347590][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.354758][ T349] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.361813][ T349] bridge_slave_0: entered allmulticast mode [ 46.367982][ T349] bridge_slave_0: entered promiscuous mode [ 46.374472][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.381511][ T349] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.388535][ T349] bridge_slave_1: entered allmulticast mode [ 46.394739][ T349] bridge_slave_1: entered promiscuous mode [ 46.443060][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.450094][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.457318][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.464336][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.481650][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.488806][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.499853][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.506883][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.515641][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.522675][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.544399][ T349] veth0_vlan: entered promiscuous mode [ 46.553726][ T349] veth1_macvtap: entered promiscuous mode 2025/08/09 06:44:41 executed programs: 0 [ 46.790683][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.797727][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.804888][ T369] bridge_slave_0: entered allmulticast mode [ 46.811003][ T369] bridge_slave_0: entered promiscuous mode [ 46.817209][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.824278][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.831332][ T369] bridge_slave_1: entered allmulticast mode [ 46.837421][ T369] bridge_slave_1: entered promiscuous mode [ 46.850317][ T12] bridge_slave_1: left allmulticast mode [ 46.855956][ T12] bridge_slave_1: left promiscuous mode [ 46.861747][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.869105][ T12] bridge_slave_0: left allmulticast mode [ 46.874907][ T12] bridge_slave_0: left promiscuous mode [ 46.880640][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.003454][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.010502][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.019141][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.026186][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.043317][ T12] veth1_macvtap: left promiscuous mode [ 47.048788][ T12] veth0_vlan: left promiscuous mode [ 47.082504][ T369] veth0_vlan: entered promiscuous mode [ 47.092063][ T369] veth1_macvtap: entered promiscuous mode [ 48.482252][ T36] kauditd_printk_skb: 114 callbacks suppressed [ 48.482267][ T36] audit: type=1400 audit(1754721883.100:188): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.512382][ T36] audit: type=1400 audit(1754721883.110:189): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.536382][ T36] audit: type=1400 audit(1754721883.120:190): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.560274][ T36] audit: type=1400 audit(1754721883.160:191): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.584331][ T36] audit: type=1400 audit(1754721883.170:192): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.608228][ T36] audit: type=1400 audit(1754721883.180:193): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.632192][ T36] audit: type=1400 audit(1754721883.210:194): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.656257][ T36] audit: type=1400 audit(1754721883.220:195): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.680261][ T36] audit: type=1400 audit(1754721883.230:196): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.704245][ T36] audit: type=1400 audit(1754721883.250:197): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.532176][ T36] kauditd_printk_skb: 294 callbacks suppressed [ 53.532191][ T36] audit: type=1400 audit(1754721888.150:492): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.562280][ T36] audit: type=1400 audit(1754721888.170:493): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.586464][ T36] audit: type=1400 audit(1754721888.170:494): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.610506][ T36] audit: type=1400 audit(1754721888.210:495): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.634518][ T36] audit: type=1400 audit(1754721888.210:496): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.658522][ T36] audit: type=1400 audit(1754721888.220:497): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.682441][ T36] audit: type=1400 audit(1754721888.280:498): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.706321][ T36] audit: type=1400 audit(1754721888.300:499): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.730314][ T36] audit: type=1400 audit(1754721888.300:500): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.754222][ T36] audit: type=1400 audit(1754721888.330:501): avc: denied { read write } for pid=369 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.177860][ T46] bridge_slave_1: left allmulticast mode [ 57.183557][ T46] bridge_slave_1: left promiscuous mode [ 57.189120][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.196516][ T46] bridge_slave_0: left allmulticast mode [ 57.202189][ T46] bridge_slave_0: left promiscuous mode [ 57.207735][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.331501][ T46] veth1_macvtap: left promiscuous mode [ 57.336990][ T46] veth0_vlan: left promiscuous mode [ 58.663374][ T36] kauditd_printk_skb: 212 callbacks suppressed [ 58.663390][ T36] audit: type=1400 audit(1754721893.280:714): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.370488][ T36] audit: type=1400 audit(1754721893.990:715): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.177077][ T36] audit: type=1400 audit(1754721894.790:716): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.083724][ T36] audit: type=1400 audit(1754721895.700:717): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.090350][ T36] audit: type=1400 audit(1754721896.710:718): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.196830][ T36] audit: type=1400 audit(1754721897.810:719): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.403507][ T36] audit: type=1400 audit(1754721899.020:720): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.710051][ T36] audit: type=1400 audit(1754721900.330:721): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.116575][ T36] audit: type=1400 audit(1754721901.730:722): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.623185][ T36] audit: type=1400 audit(1754721903.240:723): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.230073][ T36] audit: type=1400 audit(1754721904.850:724): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.936640][ T36] audit: type=1400 audit(1754721906.550:725): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.743233][ T36] audit: type=1400 audit(1754721908.360:726): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.649939][ T36] audit: type=1400 audit(1754721910.270:727): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.656450][ T36] audit: type=1400 audit(1754721912.270:728): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.678220][ T36] audit: type=1400 audit(1754721912.290:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2915]" dev="pipefs" ino=2915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0