Warning: Permanently added '10.128.1.195' (ED25519) to the list of known hosts. 2025/08/14 18:14:00 ignoring optional flag "sandboxArg"="0" 2025/08/14 18:14:01 parsed 1 programs [ 27.740054][ T36] audit: type=1400 audit(1755195241.730:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 29.212411][ T36] audit: type=1400 audit(1755195243.200:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.213805][ T297] cgroup: Unknown subsys name 'net' [ 29.235173][ T36] audit: type=1400 audit(1755195243.200:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.262517][ T36] audit: type=1400 audit(1755195243.240:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.262738][ T297] cgroup: Unknown subsys name 'devices' [ 29.450157][ T297] cgroup: Unknown subsys name 'hugetlb' [ 29.455798][ T297] cgroup: Unknown subsys name 'rlimit' [ 29.659454][ T36] audit: type=1400 audit(1755195243.650:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.682638][ T36] audit: type=1400 audit(1755195243.650:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.694034][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.703248][ T36] audit: type=1400 audit(1755195243.650:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.731834][ T36] audit: type=1400 audit(1755195243.650:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.752034][ T36] audit: type=1400 audit(1755195243.650:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 29.773049][ T36] audit: type=1400 audit(1755195243.650:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.788529][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.706386][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.180208][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.187271][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.195227][ T328] bridge_slave_0: entered allmulticast mode [ 31.201547][ T328] bridge_slave_0: entered promiscuous mode [ 31.208674][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.215745][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.222888][ T328] bridge_slave_1: entered allmulticast mode [ 31.229161][ T328] bridge_slave_1: entered promiscuous mode [ 31.288978][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.296131][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.303498][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.310586][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.331520][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.338838][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.351163][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.358241][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.367021][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.374101][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.398794][ T328] veth0_vlan: entered promiscuous mode [ 31.409843][ T328] veth1_macvtap: entered promiscuous mode [ 31.479616][ T307] bridge_slave_1: left allmulticast mode [ 31.485316][ T307] bridge_slave_1: left promiscuous mode [ 31.492084][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.502261][ T307] bridge_slave_0: left allmulticast mode [ 31.508078][ T307] bridge_slave_0: left promiscuous mode [ 31.513750][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.613969][ T307] veth1_macvtap: left promiscuous mode [ 31.619566][ T307] veth0_vlan: left promiscuous mode 2025/08/14 18:14:06 executed programs: 0 [ 32.127705][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.134756][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.141965][ T371] bridge_slave_0: entered allmulticast mode [ 32.148249][ T371] bridge_slave_0: entered promiscuous mode [ 32.154563][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.161620][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.168711][ T371] bridge_slave_1: entered allmulticast mode [ 32.174946][ T371] bridge_slave_1: entered promiscuous mode [ 32.245728][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.252816][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.272497][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.279573][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.307469][ T371] veth0_vlan: entered promiscuous mode [ 32.318435][ T371] veth1_macvtap: entered promiscuous mode [ 32.751601][ T36] kauditd_printk_skb: 56 callbacks suppressed [ 32.751617][ T36] audit: type=1400 audit(1755195246.740:130): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.781920][ T36] audit: type=1400 audit(1755195246.760:131): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.805954][ T36] audit: type=1400 audit(1755195246.760:132): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.834623][ T36] audit: type=1400 audit(1755195246.820:133): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.858786][ T36] audit: type=1400 audit(1755195246.850:134): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.882929][ T36] audit: type=1400 audit(1755195246.850:135): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.906954][ T36] audit: type=1400 audit(1755195246.880:136): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.931067][ T36] audit: type=1400 audit(1755195246.900:137): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.955047][ T36] audit: type=1400 audit(1755195246.900:138): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.979031][ T36] audit: type=1400 audit(1755195246.950:139): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.762079][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 37.762096][ T36] audit: type=1400 audit(1755195251.750:428): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.792240][ T36] audit: type=1400 audit(1755195251.760:429): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.816327][ T36] audit: type=1400 audit(1755195251.760:430): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.840292][ T36] audit: type=1400 audit(1755195251.810:431): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.864437][ T36] audit: type=1400 audit(1755195251.810:432): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.888534][ T36] audit: type=1400 audit(1755195251.840:433): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.912657][ T36] audit: type=1400 audit(1755195251.860:434): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.936738][ T36] audit: type=1400 audit(1755195251.880:435): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.960862][ T36] audit: type=1400 audit(1755195251.900:436): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.984967][ T36] audit: type=1400 audit(1755195251.910:437): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.522618][ T307] bridge_slave_1: left allmulticast mode [ 42.528312][ T307] bridge_slave_1: left promiscuous mode [ 42.533923][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.541412][ T307] bridge_slave_0: left allmulticast mode [ 42.547045][ T307] bridge_slave_0: left promiscuous mode [ 42.552761][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.659880][ T307] veth1_macvtap: left promiscuous mode [ 42.665385][ T307] veth0_vlan: left promiscuous mode [ 42.875458][ T36] kauditd_printk_skb: 274 callbacks suppressed [ 42.875475][ T36] audit: type=1400 audit(1755195256.860:712): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.384136][ T36] audit: type=1400 audit(1755195257.370:713): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.992273][ T36] audit: type=1400 audit(1755195257.980:714): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.700785][ T36] audit: type=1400 audit(1755195258.690:715): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.509128][ T36] audit: type=1400 audit(1755195259.500:716): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 46.417581][ T36] audit: type=1400 audit(1755195260.410:717): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.426418][ T36] audit: type=1400 audit(1755195261.420:718): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.534915][ T36] audit: type=1400 audit(1755195262.520:719): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.743771][ T36] audit: type=1400 audit(1755195263.730:720): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.052366][ T36] audit: type=1400 audit(1755195265.040:721): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.460996][ T36] audit: type=1400 audit(1755195266.450:722): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.969621][ T36] audit: type=1400 audit(1755195267.960:723): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.578770][ T36] audit: type=1400 audit(1755195269.570:724): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.287110][ T36] audit: type=1400 audit(1755195271.280:725): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.095525][ T36] audit: type=1400 audit(1755195273.080:726): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.004291][ T36] audit: type=1400 audit(1755195274.990:727): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.012805][ T36] audit: type=1400 audit(1755195277.000:728): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.035652][ T36] audit: type=1400 audit(1755195277.020:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1773]" dev="pipefs" ino=1773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0