[ 15.024398][ T36] audit: type=1400 audit(1755451898.499:62): avc: denied { rlimitinh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.027193][ T36] audit: type=1400 audit(1755451898.499:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.142' (ED25519) to the list of known hosts. 2025/08/17 17:31:55 ignoring optional flag "sandboxArg"="0" 2025/08/17 17:31:56 parsed 1 programs [ 33.320265][ T36] audit: type=1400 audit(1755451916.809:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 34.240053][ T36] audit: type=1400 audit(1755451917.729:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 34.241188][ T297] cgroup: Unknown subsys name 'net' [ 34.262753][ T36] audit: type=1400 audit(1755451917.729:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.290067][ T36] audit: type=1400 audit(1755451917.759:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.290230][ T297] cgroup: Unknown subsys name 'devices' [ 34.451466][ T297] cgroup: Unknown subsys name 'hugetlb' [ 34.457073][ T297] cgroup: Unknown subsys name 'rlimit' [ 34.616450][ T36] audit: type=1400 audit(1755451918.099:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.639717][ T36] audit: type=1400 audit(1755451918.099:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.648280][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.660291][ T36] audit: type=1400 audit(1755451918.099:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.689000][ T36] audit: type=1400 audit(1755451918.099:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.709203][ T36] audit: type=1400 audit(1755451918.099:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 34.730379][ T36] audit: type=1400 audit(1755451918.099:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.766019][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.582278][ T301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 35.779145][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.786272][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.793443][ T311] bridge_slave_0: entered allmulticast mode [ 35.799896][ T311] bridge_slave_0: entered promiscuous mode [ 35.807565][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.814667][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.821758][ T311] bridge_slave_1: entered allmulticast mode [ 35.827943][ T311] bridge_slave_1: entered promiscuous mode [ 35.872168][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.879203][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.886496][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.893562][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.911582][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.918855][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.928307][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.935364][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.944684][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.951762][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.974873][ T311] veth0_vlan: entered promiscuous mode [ 35.984738][ T311] veth1_macvtap: entered promiscuous mode [ 36.041104][ T12] bridge_slave_1: left allmulticast mode [ 36.046786][ T12] bridge_slave_1: left promiscuous mode [ 36.052581][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.061003][ T12] bridge_slave_0: left allmulticast mode [ 36.066663][ T12] bridge_slave_0: left promiscuous mode [ 36.072389][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.164363][ T12] veth1_macvtap: left promiscuous mode [ 36.169990][ T12] veth0_vlan: left promiscuous mode 2025/08/17 17:32:00 executed programs: 0 [ 36.825128][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.832201][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.839241][ T370] bridge_slave_0: entered allmulticast mode [ 36.845576][ T370] bridge_slave_0: entered promiscuous mode [ 36.851940][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.858964][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.866195][ T370] bridge_slave_1: entered allmulticast mode [ 36.872577][ T370] bridge_slave_1: entered promiscuous mode [ 36.930546][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.937597][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.946779][ T368] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.953843][ T368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.975205][ T370] veth0_vlan: entered promiscuous mode [ 36.986792][ T370] veth1_macvtap: entered promiscuous mode [ 38.372957][ T36] kauditd_printk_skb: 113 callbacks suppressed [ 38.372973][ T36] audit: type=1400 audit(1755451921.859:187): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.403503][ T36] audit: type=1400 audit(1755451921.879:188): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.427799][ T36] audit: type=1400 audit(1755451921.879:189): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.454527][ T36] audit: type=1400 audit(1755451921.939:190): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.479101][ T36] audit: type=1400 audit(1755451921.949:191): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.503124][ T36] audit: type=1400 audit(1755451921.959:192): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.531071][ T36] audit: type=1400 audit(1755451922.019:193): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.555063][ T36] audit: type=1400 audit(1755451922.029:194): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.578992][ T36] audit: type=1400 audit(1755451922.039:195): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.606930][ T36] audit: type=1400 audit(1755451922.099:196): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.412801][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 43.412816][ T36] audit: type=1400 audit(1755451926.899:485): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.443009][ T36] audit: type=1400 audit(1755451926.919:486): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.466987][ T36] audit: type=1400 audit(1755451926.919:487): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.494041][ T36] audit: type=1400 audit(1755451926.979:488): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.518013][ T36] audit: type=1400 audit(1755451926.999:489): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.542048][ T36] audit: type=1400 audit(1755451926.999:490): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.565998][ T36] audit: type=1400 audit(1755451927.029:491): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.590047][ T36] audit: type=1400 audit(1755451927.029:492): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.613967][ T36] audit: type=1400 audit(1755451927.059:493): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.637880][ T36] audit: type=1400 audit(1755451927.079:494): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.218823][ T60] bridge_slave_1: left allmulticast mode [ 47.224511][ T60] bridge_slave_1: left promiscuous mode [ 47.230162][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.237591][ T60] bridge_slave_0: left allmulticast mode [ 47.243334][ T60] bridge_slave_0: left promiscuous mode [ 47.248916][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.331212][ T60] veth1_macvtap: left promiscuous mode [ 47.336721][ T60] veth0_vlan: left promiscuous mode [ 48.707611][ T36] kauditd_printk_skb: 219 callbacks suppressed [ 48.707626][ T36] audit: type=1400 audit(1755451932.199:714): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.414421][ T36] audit: type=1400 audit(1755451932.899:715): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.221304][ T36] audit: type=1400 audit(1755451933.709:716): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.128388][ T36] audit: type=1400 audit(1755451934.619:717): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.135352][ T36] audit: type=1400 audit(1755451935.619:718): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.242148][ T36] audit: type=1400 audit(1755451936.729:719): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.448917][ T36] audit: type=1400 audit(1755451937.939:720): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.755789][ T36] audit: type=1400 audit(1755451939.239:721): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.162561][ T36] audit: type=1400 audit(1755451940.649:722): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.669621][ T36] audit: type=1400 audit(1755451942.159:723): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.276513][ T36] audit: type=1400 audit(1755451943.759:724): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.983536][ T36] audit: type=1400 audit(1755451945.469:725): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.790564][ T36] audit: type=1400 audit(1755451947.279:726): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.697362][ T36] audit: type=1400 audit(1755451949.189:727): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.705059][ T36] audit: type=1400 audit(1755451951.189:728): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.726998][ T36] audit: type=1400 audit(1755451951.209:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1558]" dev="pipefs" ino=1558 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0