Warning: Permanently added '10.128.0.243' (ED25519) to the list of known hosts. 2025/08/27 01:41:14 parsed 1 programs [ 33.487968][ T24] audit: type=1400 audit(1756258874.370:64): avc: denied { node_bind } for pid=274 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 33.510605][ T24] audit: type=1400 audit(1756258874.370:65): avc: denied { create } for pid=274 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 33.531794][ T24] audit: type=1400 audit(1756258874.370:66): avc: denied { module_request } for pid=274 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 34.480897][ T24] audit: type=1400 audit(1756258875.360:67): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 34.482347][ T282] cgroup: Unknown subsys name 'net' [ 34.508397][ T24] audit: type=1400 audit(1756258875.360:68): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.537505][ T24] audit: type=1400 audit(1756258875.400:69): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.537634][ T282] cgroup: Unknown subsys name 'devices' [ 34.658094][ T282] cgroup: Unknown subsys name 'hugetlb' [ 34.665673][ T282] cgroup: Unknown subsys name 'rlimit' [ 34.813695][ T24] audit: type=1400 audit(1756258875.690:70): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.847087][ T24] audit: type=1400 audit(1756258875.690:71): avc: denied { create } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.851976][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.876677][ T24] audit: type=1400 audit(1756258875.690:72): avc: denied { write } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.910163][ T24] audit: type=1400 audit(1756258875.690:73): avc: denied { read } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.943312][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.355147][ T286] request_module fs-gadgetfs succeeded, but still no fs? [ 35.366386][ T286] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 35.948437][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.957173][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.966663][ T335] device bridge_slave_0 entered promiscuous mode [ 35.974906][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.983667][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.991895][ T335] device bridge_slave_1 entered promiscuous mode [ 36.032210][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.039941][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.048084][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.056051][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.074553][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.083495][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.092821][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.104335][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.114385][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.122223][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.133279][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.143351][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.151966][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.166387][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.176748][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.194780][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.214738][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.224632][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.235718][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.247870][ T335] device veth0_vlan entered promiscuous mode [ 36.268687][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.278696][ T335] device veth1_macvtap entered promiscuous mode [ 36.297053][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.308059][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/08/27 01:41:17 executed programs: 0 [ 36.736260][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.743783][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.752537][ T354] device bridge_slave_0 entered promiscuous mode [ 36.760016][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.767523][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.775540][ T354] device bridge_slave_1 entered promiscuous mode [ 36.813899][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.821743][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.830194][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.838704][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.862591][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.872287][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.882073][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.893743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.903791][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.912420][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.923328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.932482][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.941575][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.949127][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.962367][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.971182][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.981537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.990445][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.004155][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.013702][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.025266][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.033604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.042433][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.050736][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.059210][ T354] device veth0_vlan entered promiscuous mode [ 37.074386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.083237][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.093852][ T354] device veth1_macvtap entered promiscuous mode [ 37.103563][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.111650][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.120814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.134651][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.143595][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.496622][ T7] device bridge_slave_1 left promiscuous mode [ 37.503374][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.512306][ T7] device bridge_slave_0 left promiscuous mode [ 37.519061][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.527740][ T7] device veth1_macvtap left promiscuous mode [ 37.534335][ T7] device veth0_vlan left promiscuous mode [ 38.495708][ T24] kauditd_printk_skb: 112 callbacks suppressed [ 38.495720][ T24] audit: type=1400 audit(1756258879.380:186): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.562563][ T24] audit: type=1400 audit(1756258879.420:187): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.591063][ T24] audit: type=1400 audit(1756258879.430:188): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.618065][ T24] audit: type=1400 audit(1756258879.430:189): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.646186][ T24] audit: type=1400 audit(1756258879.480:190): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.672005][ T24] audit: type=1400 audit(1756258879.480:191): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.698534][ T24] audit: type=1400 audit(1756258879.490:192): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.724230][ T24] audit: type=1400 audit(1756258879.530:193): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.754148][ T24] audit: type=1400 audit(1756258879.540:194): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.783130][ T24] audit: type=1400 audit(1756258879.540:195): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.529765][ T24] kauditd_printk_skb: 289 callbacks suppressed [ 43.529778][ T24] audit: type=1400 audit(1756258884.410:485): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.563109][ T24] audit: type=1400 audit(1756258884.410:486): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.588889][ T24] audit: type=1400 audit(1756258884.420:487): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.614547][ T24] audit: type=1400 audit(1756258884.480:488): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.641428][ T24] audit: type=1400 audit(1756258884.480:489): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.666477][ T24] audit: type=1400 audit(1756258884.490:490): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.692863][ T24] audit: type=1400 audit(1756258884.530:491): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.720773][ T24] audit: type=1400 audit(1756258884.530:492): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.747478][ T24] audit: type=1400 audit(1756258884.540:493): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.773139][ T24] audit: type=1400 audit(1756258884.610:494): avc: denied { read write } for pid=354 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.196003][ T7] device bridge_slave_1 left promiscuous mode [ 48.202441][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.211973][ T7] device bridge_slave_0 left promiscuous mode [ 48.218507][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.226875][ T7] device veth1_macvtap left promiscuous mode [ 48.233274][ T7] device veth0_vlan left promiscuous mode [ 48.828397][ T24] kauditd_printk_skb: 219 callbacks suppressed [ 48.828410][ T24] audit: type=1400 audit(1756258889.710:714): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.536556][ T24] audit: type=1400 audit(1756258890.420:715): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.344698][ T24] audit: type=1400 audit(1756258891.230:716): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.252723][ T24] audit: type=1400 audit(1756258892.130:717): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.260320][ T24] audit: type=1400 audit(1756258893.140:718): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.367716][ T24] audit: type=1400 audit(1756258894.250:719): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.574980][ T24] audit: type=1400 audit(1756258895.460:720): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.884933][ T24] audit: type=1400 audit(1756258896.760:721): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.293558][ T24] audit: type=1400 audit(1756258898.180:722): avc: denied { execmem } for pid=1004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.800969][ T24] audit: type=1400 audit(1756258899.680:723): avc: denied { execmem } for pid=1005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.408043][ T24] audit: type=1400 audit(1756258901.290:724): avc: denied { execmem } for pid=1006 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.115995][ T24] audit: type=1400 audit(1756258903.000:725): avc: denied { execmem } for pid=1007 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.923480][ T24] audit: type=1400 audit(1756258904.810:726): avc: denied { execmem } for pid=1008 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.831372][ T24] audit: type=1400 audit(1756258906.710:727): avc: denied { execmem } for pid=1009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.840839][ T24] audit: type=1400 audit(1756258908.720:728): avc: denied { execmem } for pid=1010 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.865773][ T24] audit: type=1400 audit(1756258908.750:729): avc: denied { write } for pid=274 comm="syz-execprog" path="pipe:[1384]" dev="pipefs" ino=1384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0