Warning: Permanently added '10.128.10.20' (ED25519) to the list of known hosts. 2025/08/13 13:42:05 ignoring optional flag "sandboxArg"="0" 2025/08/13 13:42:06 parsed 1 programs [ 28.031953][ T36] audit: type=1400 audit(1755092526.590:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 29.162676][ T36] audit: type=1400 audit(1755092527.720:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.163684][ T297] cgroup: Unknown subsys name 'net' [ 29.185400][ T36] audit: type=1400 audit(1755092527.720:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.212659][ T36] audit: type=1400 audit(1755092527.750:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.212795][ T297] cgroup: Unknown subsys name 'devices' [ 29.397242][ T297] cgroup: Unknown subsys name 'hugetlb' [ 29.402870][ T297] cgroup: Unknown subsys name 'rlimit' [ 29.582398][ T36] audit: type=1400 audit(1755092528.140:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.605780][ T36] audit: type=1400 audit(1755092528.140:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.626291][ T36] audit: type=1400 audit(1755092528.140:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.646733][ T36] audit: type=1400 audit(1755092528.140:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.655489][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.666965][ T36] audit: type=1400 audit(1755092528.140:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 29.696577][ T36] audit: type=1400 audit(1755092528.140:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.726509][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.665227][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.194647][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.201819][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.208907][ T337] bridge_slave_0: entered allmulticast mode [ 31.215105][ T337] bridge_slave_0: entered promiscuous mode [ 31.221461][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.228565][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.235707][ T337] bridge_slave_1: entered allmulticast mode [ 31.242041][ T337] bridge_slave_1: entered promiscuous mode [ 31.302295][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.309393][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.316753][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.323814][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.343011][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.350297][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.360462][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.367541][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.377482][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.384619][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.409171][ T337] veth0_vlan: entered promiscuous mode [ 31.419937][ T337] veth1_macvtap: entered promiscuous mode [ 31.522108][ T12] bridge_slave_1: left allmulticast mode [ 31.533973][ T12] bridge_slave_1: left promiscuous mode [ 31.545623][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.556176][ T12] bridge_slave_0: left allmulticast mode [ 31.561850][ T12] bridge_slave_0: left promiscuous mode [ 31.576554][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.747232][ T12] veth1_macvtap: left promiscuous mode [ 31.752793][ T12] veth0_vlan: left promiscuous mode 2025/08/13 13:42:10 executed programs: 0 [ 32.054373][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.061518][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.068760][ T370] bridge_slave_0: entered allmulticast mode [ 32.074974][ T370] bridge_slave_0: entered promiscuous mode [ 32.081436][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.088536][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.095989][ T370] bridge_slave_1: entered allmulticast mode [ 32.102148][ T370] bridge_slave_1: entered promiscuous mode [ 32.172558][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.179645][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.187091][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.194128][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.213208][ T319] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.220443][ T319] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.231491][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.238669][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.247964][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.255004][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.283774][ T370] veth0_vlan: entered promiscuous mode [ 32.293856][ T370] veth1_macvtap: entered promiscuous mode [ 33.035745][ T36] kauditd_printk_skb: 76 callbacks suppressed [ 33.035764][ T36] audit: type=1400 audit(1755092531.600:150): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.078781][ T36] audit: type=1400 audit(1755092531.640:151): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.102746][ T36] audit: type=1400 audit(1755092531.650:152): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.126951][ T36] audit: type=1400 audit(1755092531.660:153): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.151101][ T36] audit: type=1400 audit(1755092531.690:154): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.175075][ T36] audit: type=1400 audit(1755092531.700:155): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.200566][ T36] audit: type=1400 audit(1755092531.710:156): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.224642][ T36] audit: type=1400 audit(1755092531.740:157): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.248844][ T36] audit: type=1400 audit(1755092531.750:158): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.272901][ T36] audit: type=1400 audit(1755092531.770:159): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.069912][ T36] kauditd_printk_skb: 289 callbacks suppressed [ 38.069930][ T36] audit: type=1400 audit(1755092536.630:449): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.100103][ T36] audit: type=1400 audit(1755092536.640:450): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.124263][ T36] audit: type=1400 audit(1755092536.640:451): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.151703][ T36] audit: type=1400 audit(1755092536.710:452): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.175651][ T36] audit: type=1400 audit(1755092536.720:453): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.199746][ T36] audit: type=1400 audit(1755092536.720:454): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.223822][ T36] audit: type=1400 audit(1755092536.760:455): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.247967][ T36] audit: type=1400 audit(1755092536.770:456): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.272355][ T36] audit: type=1400 audit(1755092536.770:457): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.296522][ T36] audit: type=1400 audit(1755092536.810:458): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.464843][ T12] bridge_slave_1: left allmulticast mode [ 42.470605][ T12] bridge_slave_1: left promiscuous mode [ 42.476275][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.483668][ T12] bridge_slave_0: left allmulticast mode [ 42.489462][ T12] bridge_slave_0: left promiscuous mode [ 42.495069][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.577478][ T12] veth1_macvtap: left promiscuous mode [ 42.582995][ T12] veth0_vlan: left promiscuous mode [ 43.347259][ T36] kauditd_printk_skb: 254 callbacks suppressed [ 43.347277][ T36] audit: type=1400 audit(1755092541.910:713): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.955423][ T36] audit: type=1400 audit(1755092542.510:714): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.663023][ T36] audit: type=1400 audit(1755092543.220:715): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.470495][ T36] audit: type=1400 audit(1755092544.030:716): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.378260][ T36] audit: type=1400 audit(1755092544.940:717): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.385838][ T36] audit: type=1400 audit(1755092545.950:718): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.493296][ T36] audit: type=1400 audit(1755092547.050:719): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.701053][ T36] audit: type=1400 audit(1755092548.260:720): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.008674][ T36] audit: type=1400 audit(1755092549.570:721): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.416290][ T36] audit: type=1400 audit(1755092550.980:722): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.923847][ T36] audit: type=1400 audit(1755092552.480:723): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.531945][ T36] audit: type=1400 audit(1755092554.090:724): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.239491][ T36] audit: type=1400 audit(1755092555.800:725): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.047058][ T36] audit: type=1400 audit(1755092557.610:726): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.954958][ T36] audit: type=1400 audit(1755092559.510:727): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.962439][ T36] audit: type=1400 audit(1755092561.520:728): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.984903][ T36] audit: type=1400 audit(1755092561.540:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1763]" dev="pipefs" ino=1763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0