Warning: Permanently added '10.128.0.5' (ED25519) to the list of known hosts. 2025/07/31 18:14:27 ignoring optional flag "sandboxArg"="0" 2025/07/31 18:14:27 parsed 1 programs [ 23.588835][ T36] audit: type=1400 audit(1753985667.900:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.509690][ T36] audit: type=1400 audit(1753985668.820:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.510696][ T298] cgroup: Unknown subsys name 'net' [ 24.532400][ T36] audit: type=1400 audit(1753985668.820:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.559945][ T36] audit: type=1400 audit(1753985668.850:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.560106][ T298] cgroup: Unknown subsys name 'devices' [ 24.743016][ T298] cgroup: Unknown subsys name 'hugetlb' [ 24.748699][ T298] cgroup: Unknown subsys name 'rlimit' [ 24.905735][ T36] audit: type=1400 audit(1753985669.220:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.929005][ T36] audit: type=1400 audit(1753985669.220:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.949447][ T36] audit: type=1400 audit(1753985669.220:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.969803][ T36] audit: type=1400 audit(1753985669.220:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.977637][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.990017][ T36] audit: type=1400 audit(1753985669.220:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 25.019923][ T36] audit: type=1400 audit(1753985669.220:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.067975][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.930286][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.256572][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.263780][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.270839][ T329] bridge_slave_0: entered allmulticast mode [ 26.277263][ T329] bridge_slave_0: entered promiscuous mode [ 26.283805][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.290919][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.298027][ T329] bridge_slave_1: entered allmulticast mode [ 26.304194][ T329] bridge_slave_1: entered promiscuous mode [ 26.353480][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.360511][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.367826][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.374926][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.392180][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.399531][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.409516][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.416582][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.426018][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.433077][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.454809][ T329] veth0_vlan: entered promiscuous mode [ 26.464516][ T329] veth1_macvtap: entered promiscuous mode [ 26.757665][ T13] bridge_slave_1: left allmulticast mode [ 26.767358][ T13] bridge_slave_1: left promiscuous mode [ 26.776151][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.784248][ T13] bridge_slave_0: left allmulticast mode [ 26.790067][ T13] bridge_slave_0: left promiscuous mode [ 26.795845][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.983711][ T13] veth1_macvtap: left promiscuous mode [ 26.989334][ T13] veth0_vlan: left promiscuous mode 2025/07/31 18:14:31 executed programs: 0 [ 27.096684][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.103773][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.110820][ T372] bridge_slave_0: entered allmulticast mode [ 27.117312][ T372] bridge_slave_0: entered promiscuous mode [ 27.123541][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.130571][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.138496][ T372] bridge_slave_1: entered allmulticast mode [ 27.144979][ T372] bridge_slave_1: entered promiscuous mode [ 27.182992][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.190018][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.197308][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.204349][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.222045][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.229270][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.238061][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.245218][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.254217][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.261281][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.282585][ T372] veth0_vlan: entered promiscuous mode [ 27.292386][ T372] veth1_macvtap: entered promiscuous mode [ 28.614874][ T36] kauditd_printk_skb: 110 callbacks suppressed [ 28.614890][ T36] audit: type=1400 audit(1753985672.930:184): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.645403][ T36] audit: type=1400 audit(1753985672.950:185): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.669467][ T36] audit: type=1400 audit(1753985672.950:186): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.693381][ T36] audit: type=1400 audit(1753985672.990:187): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.717308][ T36] audit: type=1400 audit(1753985673.000:188): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.741361][ T36] audit: type=1400 audit(1753985673.020:189): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.765502][ T36] audit: type=1400 audit(1753985673.040:190): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.789546][ T36] audit: type=1400 audit(1753985673.060:191): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.813510][ T36] audit: type=1400 audit(1753985673.060:192): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.837534][ T36] audit: type=1400 audit(1753985673.110:193): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.634513][ T36] kauditd_printk_skb: 291 callbacks suppressed [ 33.634528][ T36] audit: type=1400 audit(1753985677.950:485): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.664604][ T36] audit: type=1400 audit(1753985677.970:486): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.688656][ T36] audit: type=1400 audit(1753985677.970:487): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.712609][ T36] audit: type=1400 audit(1753985678.010:488): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.736759][ T36] audit: type=1400 audit(1753985678.020:489): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.760682][ T36] audit: type=1400 audit(1753985678.030:490): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.784733][ T36] audit: type=1400 audit(1753985678.060:491): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.808738][ T36] audit: type=1400 audit(1753985678.070:492): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.832938][ T36] audit: type=1400 audit(1753985678.090:493): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.856865][ T36] audit: type=1400 audit(1753985678.100:494): avc: denied { read write } for pid=372 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.390596][ T13] bridge_slave_1: left allmulticast mode [ 37.396290][ T13] bridge_slave_1: left promiscuous mode [ 37.401972][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.409465][ T13] bridge_slave_0: left allmulticast mode [ 37.415204][ T13] bridge_slave_0: left promiscuous mode [ 37.420789][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.543449][ T13] veth1_macvtap: left promiscuous mode [ 37.549071][ T13] veth0_vlan: left promiscuous mode [ 38.875911][ T36] kauditd_printk_skb: 219 callbacks suppressed [ 38.875926][ T36] audit: type=1400 audit(1753985683.190:714): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 39.582508][ T36] audit: type=1400 audit(1753985683.900:715): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.389346][ T36] audit: type=1400 audit(1753985684.700:716): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.296062][ T36] audit: type=1400 audit(1753985685.610:717): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 42.302458][ T36] audit: type=1400 audit(1753985686.620:718): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.408750][ T36] audit: type=1400 audit(1753985687.720:719): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.615678][ T36] audit: type=1400 audit(1753985688.930:720): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.922984][ T36] audit: type=1400 audit(1753985690.240:721): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.329623][ T36] audit: type=1400 audit(1753985691.640:722): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.836111][ T36] audit: type=1400 audit(1753985693.150:723): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.442544][ T36] audit: type=1400 audit(1753985694.760:724): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.148872][ T36] audit: type=1400 audit(1753985696.460:725): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.955198][ T36] audit: type=1400 audit(1753985698.270:726): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.861615][ T36] audit: type=1400 audit(1753985700.180:727): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.868072][ T36] audit: type=1400 audit(1753985702.180:728): avc: denied { execmem } for pid=1004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.890075][ T36] audit: type=1400 audit(1753985702.200:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2879]" dev="pipefs" ino=2879 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0