Warning: Permanently added '10.128.1.33' (ED25519) to the list of known hosts. 2025/08/18 13:55:41 ignoring optional flag "sandboxArg"="0" 2025/08/18 13:55:42 parsed 1 programs [ 24.091297][ T36] audit: type=1400 audit(1755525342.060:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.987699][ T36] audit: type=1400 audit(1755525342.960:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.988742][ T297] cgroup: Unknown subsys name 'net' [ 25.010632][ T36] audit: type=1400 audit(1755525342.960:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.038237][ T36] audit: type=1400 audit(1755525342.990:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.038320][ T297] cgroup: Unknown subsys name 'devices' [ 25.218720][ T297] cgroup: Unknown subsys name 'hugetlb' [ 25.224361][ T297] cgroup: Unknown subsys name 'rlimit' [ 25.382058][ T36] audit: type=1400 audit(1755525343.350:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.405418][ T36] audit: type=1400 audit(1755525343.350:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.425867][ T36] audit: type=1400 audit(1755525343.350:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.435272][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.446521][ T36] audit: type=1400 audit(1755525343.350:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.475357][ T36] audit: type=1400 audit(1755525343.350:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 25.496364][ T36] audit: type=1400 audit(1755525343.350:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.563662][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.368872][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.732136][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.739271][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.746343][ T321] bridge_slave_0: entered allmulticast mode [ 26.752768][ T321] bridge_slave_0: entered promiscuous mode [ 26.759245][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.766287][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.773487][ T321] bridge_slave_1: entered allmulticast mode [ 26.779729][ T321] bridge_slave_1: entered promiscuous mode [ 26.833187][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.840414][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.847826][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.854859][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.872715][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.881975][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.892665][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.899757][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.909511][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.916594][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.940676][ T321] veth0_vlan: entered promiscuous mode [ 26.951418][ T321] veth1_macvtap: entered promiscuous mode [ 27.133242][ T46] bridge_slave_1: left allmulticast mode [ 27.139114][ T46] bridge_slave_1: left promiscuous mode [ 27.146120][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.155002][ T46] bridge_slave_0: left allmulticast mode [ 27.160873][ T46] bridge_slave_0: left promiscuous mode [ 27.166502][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.320656][ T46] veth1_macvtap: left promiscuous mode [ 27.326213][ T46] veth0_vlan: left promiscuous mode 2025/08/18 13:55:45 executed programs: 0 [ 27.759418][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.766559][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.773708][ T371] bridge_slave_0: entered allmulticast mode [ 27.779937][ T371] bridge_slave_0: entered promiscuous mode [ 27.786277][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.793395][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.800517][ T371] bridge_slave_1: entered allmulticast mode [ 27.806785][ T371] bridge_slave_1: entered promiscuous mode [ 27.888558][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.895616][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.904711][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.911871][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.933440][ T371] veth0_vlan: entered promiscuous mode [ 27.945372][ T371] veth1_macvtap: entered promiscuous mode [ 29.130291][ T36] kauditd_printk_skb: 101 callbacks suppressed [ 29.130306][ T36] audit: type=1400 audit(1755525347.100:175): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.160704][ T36] audit: type=1400 audit(1755525347.120:176): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.184898][ T36] audit: type=1400 audit(1755525347.120:177): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.209281][ T36] audit: type=1400 audit(1755525347.160:178): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.233741][ T36] audit: type=1400 audit(1755525347.180:179): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.258048][ T36] audit: type=1400 audit(1755525347.190:180): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.282447][ T36] audit: type=1400 audit(1755525347.210:181): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.307821][ T36] audit: type=1400 audit(1755525347.230:182): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.332078][ T36] audit: type=1400 audit(1755525347.240:183): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 29.357153][ T36] audit: type=1400 audit(1755525347.260:184): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.140011][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 34.140027][ T36] audit: type=1400 audit(1755525352.110:473): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.170498][ T36] audit: type=1400 audit(1755525352.130:474): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.194738][ T36] audit: type=1400 audit(1755525352.130:475): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.222223][ T36] audit: type=1400 audit(1755525352.200:476): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.246216][ T36] audit: type=1400 audit(1755525352.210:477): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.270387][ T36] audit: type=1400 audit(1755525352.210:478): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.297180][ T36] audit: type=1400 audit(1755525352.270:479): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.321336][ T36] audit: type=1400 audit(1755525352.290:480): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.345559][ T36] audit: type=1400 audit(1755525352.290:481): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.372740][ T36] audit: type=1400 audit(1755525352.350:482): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.177685][ T46] bridge_slave_1: left allmulticast mode [ 38.183373][ T46] bridge_slave_1: left promiscuous mode [ 38.189211][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.197002][ T46] bridge_slave_0: left allmulticast mode [ 38.202739][ T46] bridge_slave_0: left promiscuous mode [ 38.208518][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.308831][ T46] veth1_macvtap: left promiscuous mode [ 38.314456][ T46] veth0_vlan: left promiscuous mode [ 39.668609][ T36] kauditd_printk_skb: 231 callbacks suppressed [ 39.668625][ T36] audit: type=1400 audit(1755525357.640:714): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.375987][ T36] audit: type=1400 audit(1755525358.350:715): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.183446][ T36] audit: type=1400 audit(1755525359.160:716): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.091363][ T36] audit: type=1400 audit(1755525360.060:717): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.099289][ T36] audit: type=1400 audit(1755525361.070:718): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.206689][ T36] audit: type=1400 audit(1755525362.180:719): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.414090][ T36] audit: type=1400 audit(1755525363.390:720): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.720990][ T36] audit: type=1400 audit(1755525364.690:721): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.128195][ T36] audit: type=1400 audit(1755525366.100:722): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.635417][ T36] audit: type=1400 audit(1755525367.610:723): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.242885][ T36] audit: type=1400 audit(1755525369.210:724): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.950231][ T36] audit: type=1400 audit(1755525370.920:725): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.757603][ T36] audit: type=1400 audit(1755525372.730:726): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.664840][ T36] audit: type=1400 audit(1755525374.640:727): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.672332][ T36] audit: type=1400 audit(1755525376.640:728): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.694987][ T36] audit: type=1400 audit(1755525376.660:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1743]" dev="pipefs" ino=1743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0