cess permissive=1 [ 17.032074][ T36] audit: type=1400 audit(1754649278.449:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.240' (ED25519) to the list of known hosts. 2025/08/08 10:34:46 ignoring optional flag "sandboxArg"="0" 2025/08/08 10:34:47 parsed 1 programs [ 26.093539][ T36] audit: type=1400 audit(1754649287.519:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.047166][ T36] audit: type=1400 audit(1754649288.469:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.048215][ T298] cgroup: Unknown subsys name 'net' [ 27.069854][ T36] audit: type=1400 audit(1754649288.469:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.097267][ T36] audit: type=1400 audit(1754649288.499:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.097440][ T298] cgroup: Unknown subsys name 'devices' [ 27.302051][ T298] cgroup: Unknown subsys name 'hugetlb' [ 27.307657][ T298] cgroup: Unknown subsys name 'rlimit' [ 27.466147][ T36] audit: type=1400 audit(1754649288.889:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.489318][ T36] audit: type=1400 audit(1754649288.889:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.497554][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.509995][ T36] audit: type=1400 audit(1754649288.889:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.538545][ T36] audit: type=1400 audit(1754649288.889:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.558870][ T36] audit: type=1400 audit(1754649288.889:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 27.562476][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.579960][ T36] audit: type=1400 audit(1754649288.889:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.419306][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 28.951057][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.958090][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.965206][ T342] bridge_slave_0: entered allmulticast mode [ 28.971447][ T342] bridge_slave_0: entered promiscuous mode [ 28.977650][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.984932][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.992261][ T342] bridge_slave_1: entered allmulticast mode [ 28.998376][ T342] bridge_slave_1: entered promiscuous mode [ 29.044628][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.051690][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.058970][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.066005][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.083910][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.091248][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.107326][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.114391][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.123794][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.130838][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.155492][ T342] veth0_vlan: entered promiscuous mode [ 29.165777][ T342] veth1_macvtap: entered promiscuous mode [ 29.223436][ T46] bridge_slave_1: left allmulticast mode [ 29.229328][ T46] bridge_slave_1: left promiscuous mode [ 29.235352][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.244315][ T46] bridge_slave_0: left allmulticast mode [ 29.250256][ T46] bridge_slave_0: left promiscuous mode [ 29.256645][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.361276][ T46] veth1_macvtap: left promiscuous mode [ 29.366826][ T46] veth0_vlan: left promiscuous mode 2025/08/08 10:34:51 executed programs: 0 [ 29.600358][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.607405][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.614632][ T371] bridge_slave_0: entered allmulticast mode [ 29.621059][ T371] bridge_slave_0: entered promiscuous mode [ 29.627404][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.634723][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.641888][ T371] bridge_slave_1: entered allmulticast mode [ 29.648029][ T371] bridge_slave_1: entered promiscuous mode [ 29.685636][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.692866][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.700179][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.707198][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.725780][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.732985][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.743190][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.750265][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.759697][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.766767][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.788530][ T371] veth0_vlan: entered promiscuous mode [ 29.798234][ T371] veth1_macvtap: entered promiscuous mode [ 31.104008][ T36] kauditd_printk_skb: 107 callbacks suppressed [ 31.104024][ T36] audit: type=1400 audit(1754649292.529:181): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.134360][ T36] audit: type=1400 audit(1754649292.539:182): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.158501][ T36] audit: type=1400 audit(1754649292.539:183): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.182715][ T36] audit: type=1400 audit(1754649292.589:184): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.206701][ T36] audit: type=1400 audit(1754649292.609:185): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.230899][ T36] audit: type=1400 audit(1754649292.609:186): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.255063][ T36] audit: type=1400 audit(1754649292.659:187): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.279014][ T36] audit: type=1400 audit(1754649292.669:188): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.303035][ T36] audit: type=1400 audit(1754649292.679:189): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.327059][ T36] audit: type=1400 audit(1754649292.709:190): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.113437][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 36.113453][ T36] audit: type=1400 audit(1754649297.539:479): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.143537][ T36] audit: type=1400 audit(1754649297.559:480): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.167577][ T36] audit: type=1400 audit(1754649297.559:481): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.191630][ T36] audit: type=1400 audit(1754649297.599:482): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.215650][ T36] audit: type=1400 audit(1754649297.609:483): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.239806][ T36] audit: type=1400 audit(1754649297.609:484): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.263755][ T36] audit: type=1400 audit(1754649297.669:485): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.287790][ T36] audit: type=1400 audit(1754649297.689:486): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.311708][ T36] audit: type=1400 audit(1754649297.699:487): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.335848][ T36] audit: type=1400 audit(1754649297.719:488): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.992855][ T46] bridge_slave_1: left allmulticast mode [ 39.998514][ T46] bridge_slave_1: left promiscuous mode [ 40.004184][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.011623][ T46] bridge_slave_0: left allmulticast mode [ 40.017244][ T46] bridge_slave_0: left promiscuous mode [ 40.022932][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.131919][ T46] veth1_macvtap: left promiscuous mode [ 40.137444][ T46] veth0_vlan: left promiscuous mode [ 41.477985][ T36] kauditd_printk_skb: 225 callbacks suppressed [ 41.478001][ T36] audit: type=1400 audit(1754649302.899:714): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.184860][ T36] audit: type=1400 audit(1754649303.609:715): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.991779][ T36] audit: type=1400 audit(1754649304.419:716): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.898531][ T36] audit: type=1400 audit(1754649305.319:717): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.905451][ T36] audit: type=1400 audit(1754649306.329:718): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.012138][ T36] audit: type=1400 audit(1754649307.439:719): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.218781][ T36] audit: type=1400 audit(1754649308.639:720): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.525427][ T36] audit: type=1400 audit(1754649309.949:721): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.932137][ T36] audit: type=1400 audit(1754649311.359:722): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.438801][ T36] audit: type=1400 audit(1754649312.859:723): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.045594][ T36] audit: type=1400 audit(1754649314.469:724): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.752285][ T36] audit: type=1400 audit(1754649316.179:725): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.559471][ T36] audit: type=1400 audit(1754649317.979:726): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.466225][ T36] audit: type=1400 audit(1754649319.889:727): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.473044][ T36] audit: type=1400 audit(1754649321.899:728): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.494742][ T36] audit: type=1400 audit(1754649321.919:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1755]" dev="pipefs" ino=1755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0