Warning: Permanently added '10.128.1.147' (ED25519) to the list of known hosts. 2025/08/17 12:32:56 ignoring optional flag "sandboxArg"="0" 2025/08/17 12:32:57 parsed 1 programs [ 37.700915][ T36] audit: type=1400 audit(1755433977.610:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 38.696021][ T36] audit: type=1400 audit(1755433978.610:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.697458][ T298] cgroup: Unknown subsys name 'net' [ 38.722035][ T36] audit: type=1400 audit(1755433978.610:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.754280][ T36] audit: type=1400 audit(1755433978.650:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.754465][ T298] cgroup: Unknown subsys name 'devices' [ 38.926080][ T298] cgroup: Unknown subsys name 'hugetlb' [ 38.932224][ T298] cgroup: Unknown subsys name 'rlimit' [ 39.030041][ T36] audit: type=1400 audit(1755433978.940:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.055128][ T36] audit: type=1400 audit(1755433978.940:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.077996][ T36] audit: type=1400 audit(1755433978.940:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.088719][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 39.099728][ T36] audit: type=1400 audit(1755433978.940:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.132148][ T36] audit: type=1400 audit(1755433978.940:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 39.147053][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 39.156316][ T36] audit: type=1400 audit(1755433978.940:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.049656][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 40.404890][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.412429][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.420537][ T328] bridge_slave_0: entered allmulticast mode [ 40.427852][ T328] bridge_slave_0: entered promiscuous mode [ 40.436436][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.444057][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.451480][ T328] bridge_slave_1: entered allmulticast mode [ 40.458032][ T328] bridge_slave_1: entered promiscuous mode [ 40.503877][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.511062][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.518595][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.526010][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.545012][ T207] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.552454][ T207] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.561938][ T207] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.569169][ T207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.581879][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.589154][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.611064][ T328] veth0_vlan: entered promiscuous mode [ 40.621793][ T328] veth1_macvtap: entered promiscuous mode [ 40.705672][ T46] bridge_slave_1: left allmulticast mode [ 40.711351][ T46] bridge_slave_1: left promiscuous mode [ 40.717241][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.724908][ T46] bridge_slave_0: left allmulticast mode [ 40.730661][ T46] bridge_slave_0: left promiscuous mode [ 40.736641][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.886464][ T46] veth1_macvtap: left promiscuous mode [ 40.892685][ T46] veth0_vlan: left promiscuous mode 2025/08/17 12:33:01 executed programs: 0 [ 41.395070][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.402900][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.410393][ T371] bridge_slave_0: entered allmulticast mode [ 41.416879][ T371] bridge_slave_0: entered promiscuous mode [ 41.423256][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.430692][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.438903][ T371] bridge_slave_1: entered allmulticast mode [ 41.445468][ T371] bridge_slave_1: entered promiscuous mode [ 41.509359][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.517798][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.527820][ T207] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.535072][ T207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.565196][ T371] veth0_vlan: entered promiscuous mode [ 41.575873][ T371] veth1_macvtap: entered promiscuous mode [ 42.707860][ T36] kauditd_printk_skb: 98 callbacks suppressed [ 42.707876][ T36] audit: type=1400 audit(1755433982.620:172): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.740739][ T36] audit: type=1400 audit(1755433982.630:173): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.767826][ T36] audit: type=1400 audit(1755433982.630:174): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.798966][ T36] audit: type=1400 audit(1755433982.710:175): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.824658][ T36] audit: type=1400 audit(1755433982.730:176): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.850831][ T36] audit: type=1400 audit(1755433982.730:177): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.879384][ T36] audit: type=1400 audit(1755433982.770:178): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.906812][ T36] audit: type=1400 audit(1755433982.780:179): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.933900][ T36] audit: type=1400 audit(1755433982.820:180): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.961805][ T36] audit: type=1400 audit(1755433982.840:181): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.727931][ T36] kauditd_printk_skb: 287 callbacks suppressed [ 47.727949][ T36] audit: type=1400 audit(1755433987.640:469): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.761633][ T36] audit: type=1400 audit(1755433987.650:470): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.789265][ T36] audit: type=1400 audit(1755433987.650:471): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.815254][ T36] audit: type=1400 audit(1755433987.710:472): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.842411][ T36] audit: type=1400 audit(1755433987.710:473): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.868593][ T36] audit: type=1400 audit(1755433987.730:474): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.895618][ T36] audit: type=1400 audit(1755433987.760:475): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.921415][ T36] audit: type=1400 audit(1755433987.780:476): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.948508][ T36] audit: type=1400 audit(1755433987.800:477): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.978295][ T36] audit: type=1400 audit(1755433987.810:478): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.774550][ T46] bridge_slave_1: left allmulticast mode [ 51.781523][ T46] bridge_slave_1: left promiscuous mode [ 51.787928][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.796312][ T46] bridge_slave_0: left allmulticast mode [ 51.803432][ T46] bridge_slave_0: left promiscuous mode [ 51.810456][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.896194][ T46] veth1_macvtap: left promiscuous mode [ 51.902378][ T46] veth0_vlan: left promiscuous mode [ 53.255243][ T36] kauditd_printk_skb: 234 callbacks suppressed [ 53.255259][ T36] audit: type=1400 audit(1755433993.170:713): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.962302][ T36] audit: type=1400 audit(1755433993.880:714): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.769792][ T36] audit: type=1400 audit(1755433994.680:715): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.677161][ T36] audit: type=1400 audit(1755433995.590:716): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.684412][ T36] audit: type=1400 audit(1755433996.600:717): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.791824][ T36] audit: type=1400 audit(1755433997.710:718): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.999118][ T36] audit: type=1400 audit(1755433998.910:719): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.306242][ T36] audit: type=1400 audit(1755434000.220:720): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.713291][ T36] audit: type=1400 audit(1755434001.630:721): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.220832][ T36] audit: type=1400 audit(1755434003.130:722): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.827864][ T36] audit: type=1400 audit(1755434004.740:723): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.535578][ T36] audit: type=1400 audit(1755434006.450:724): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.342778][ T36] audit: type=1400 audit(1755434008.260:725): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.249985][ T36] audit: type=1400 audit(1755434010.160:726): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.256973][ T36] audit: type=1400 audit(1755434012.170:727): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.280146][ T36] audit: type=1400 audit(1755434012.190:728): avc: denied { write } for pid=290 comm="syz-execprog" path="pipe:[1478]" dev="pipefs" ino=1478 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0