cess permissive=1 [ 12.669533][ T36] audit: type=1400 audit(1755283241.780:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.8' (ED25519) to the list of known hosts. 2025/08/15 18:40:51 ignoring optional flag "sandboxArg"="0" 2025/08/15 18:40:52 parsed 1 programs [ 23.489079][ T36] audit: type=1400 audit(1755283252.610:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.370389][ T36] audit: type=1400 audit(1755283253.500:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.371478][ T298] cgroup: Unknown subsys name 'net' [ 24.393212][ T36] audit: type=1400 audit(1755283253.500:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.420978][ T36] audit: type=1400 audit(1755283253.520:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.421278][ T298] cgroup: Unknown subsys name 'devices' [ 24.601809][ T298] cgroup: Unknown subsys name 'hugetlb' [ 24.607467][ T298] cgroup: Unknown subsys name 'rlimit' [ 24.705856][ T36] audit: type=1400 audit(1755283253.830:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.729046][ T36] audit: type=1400 audit(1755283253.830:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.749573][ T36] audit: type=1400 audit(1755283253.830:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.757710][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.770096][ T36] audit: type=1400 audit(1755283253.830:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.798802][ T36] audit: type=1400 audit(1755283253.830:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 24.819985][ T36] audit: type=1400 audit(1755283253.830:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.834015][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.632597][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.381577][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.388626][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.395935][ T352] bridge_slave_0: entered allmulticast mode [ 26.402364][ T352] bridge_slave_0: entered promiscuous mode [ 26.408710][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.415809][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.422880][ T352] bridge_slave_1: entered allmulticast mode [ 26.429020][ T352] bridge_slave_1: entered promiscuous mode [ 26.481631][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.488682][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.496006][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.503055][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.522174][ T127] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.529546][ T127] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.540377][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.547446][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.559515][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.566608][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.589030][ T352] veth0_vlan: entered promiscuous mode [ 26.599261][ T352] veth1_macvtap: entered promiscuous mode [ 26.653189][ T59] bridge_slave_1: left allmulticast mode [ 26.658845][ T59] bridge_slave_1: left promiscuous mode [ 26.664790][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.672617][ T59] bridge_slave_0: left allmulticast mode [ 26.678389][ T59] bridge_slave_0: left promiscuous mode [ 26.684168][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.792298][ T59] veth1_macvtap: left promiscuous mode [ 26.797925][ T59] veth0_vlan: left promiscuous mode 2025/08/15 18:40:56 executed programs: 0 [ 26.912327][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.919458][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.927107][ T372] bridge_slave_0: entered allmulticast mode [ 26.933356][ T372] bridge_slave_0: entered promiscuous mode [ 26.939771][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.946827][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.953976][ T372] bridge_slave_1: entered allmulticast mode [ 26.960226][ T372] bridge_slave_1: entered promiscuous mode [ 27.012457][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.019567][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.028990][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.036065][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.058417][ T372] veth0_vlan: entered promiscuous mode [ 27.068536][ T372] veth1_macvtap: entered promiscuous mode [ 28.513844][ T36] kauditd_printk_skb: 116 callbacks suppressed [ 28.513861][ T36] audit: type=1400 audit(1755283257.640:190): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.544150][ T36] audit: type=1400 audit(1755283257.650:191): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.568285][ T36] audit: type=1400 audit(1755283257.650:192): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.592325][ T36] audit: type=1400 audit(1755283257.700:193): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.616400][ T36] audit: type=1400 audit(1755283257.710:194): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.640374][ T36] audit: type=1400 audit(1755283257.720:195): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.664465][ T36] audit: type=1400 audit(1755283257.740:196): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.688533][ T36] audit: type=1400 audit(1755283257.770:197): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.712966][ T36] audit: type=1400 audit(1755283257.780:198): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.737048][ T36] audit: type=1400 audit(1755283257.790:199): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.533844][ T36] kauditd_printk_skb: 290 callbacks suppressed [ 33.533862][ T36] audit: type=1400 audit(1755283262.660:490): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.564630][ T36] audit: type=1400 audit(1755283262.670:491): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.588868][ T36] audit: type=1400 audit(1755283262.670:492): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.613154][ T36] audit: type=1400 audit(1755283262.720:493): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.637190][ T36] audit: type=1400 audit(1755283262.720:494): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.661154][ T36] audit: type=1400 audit(1755283262.740:495): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.685098][ T36] audit: type=1400 audit(1755283262.780:496): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.709195][ T36] audit: type=1400 audit(1755283262.780:497): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.733134][ T36] audit: type=1400 audit(1755283262.800:498): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.757306][ T36] audit: type=1400 audit(1755283262.830:499): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.221851][ T59] bridge_slave_1: left allmulticast mode [ 37.227623][ T59] bridge_slave_1: left promiscuous mode [ 37.233357][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.240928][ T59] bridge_slave_0: left allmulticast mode [ 37.246550][ T59] bridge_slave_0: left promiscuous mode [ 37.252250][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.362230][ T59] veth1_macvtap: left promiscuous mode [ 37.367746][ T59] veth0_vlan: left promiscuous mode [ 38.705091][ T36] kauditd_printk_skb: 214 callbacks suppressed [ 38.705108][ T36] audit: type=1400 audit(1755283267.830:714): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 39.412266][ T36] audit: type=1400 audit(1755283268.540:715): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.219256][ T36] audit: type=1400 audit(1755283269.340:716): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.126263][ T36] audit: type=1400 audit(1755283270.250:717): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.133320][ T36] audit: type=1400 audit(1755283271.260:718): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.240463][ T36] audit: type=1400 audit(1755283272.370:719): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.447541][ T36] audit: type=1400 audit(1755283273.570:720): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.754597][ T36] audit: type=1400 audit(1755283274.880:721): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.161506][ T36] audit: type=1400 audit(1755283276.290:722): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.668479][ T36] audit: type=1400 audit(1755283277.790:723): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.317063][ T36] audit: type=1400 audit(1755283279.440:724): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.024170][ T36] audit: type=1400 audit(1755283281.150:725): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.830926][ T36] audit: type=1400 audit(1755283282.960:726): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.737453][ T36] audit: type=1400 audit(1755283284.860:727): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.744105][ T36] audit: type=1400 audit(1755283286.870:728): avc: denied { execmem } for pid=1004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.765997][ T36] audit: type=1400 audit(1755283286.890:729): avc: denied { write } for pid=290 comm="syz-execprog" path="pipe:[1423]" dev="pipefs" ino=1423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0