Warning: Permanently added '10.128.1.165' (ED25519) to the list of known hosts. 2025/08/25 22:18:00 parsed 1 programs [ 38.910162][ T24] audit: type=1400 audit(1756160280.550:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 38.930978][ T24] audit: type=1400 audit(1756160280.550:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 38.951579][ T24] audit: type=1400 audit(1756160280.550:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 42.076383][ T24] audit: type=1400 audit(1756160283.710:67): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 42.079219][ T283] cgroup: Unknown subsys name 'net' [ 42.099172][ T24] audit: type=1400 audit(1756160283.710:68): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 42.126725][ T24] audit: type=1400 audit(1756160283.740:69): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 42.127143][ T283] cgroup: Unknown subsys name 'devices' [ 42.272715][ T283] cgroup: Unknown subsys name 'hugetlb' [ 42.278450][ T283] cgroup: Unknown subsys name 'rlimit' [ 42.561997][ T24] audit: type=1400 audit(1756160284.200:70): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 42.585908][ T24] audit: type=1400 audit(1756160284.200:71): avc: denied { create } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.606716][ T24] audit: type=1400 audit(1756160284.200:72): avc: denied { write } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.627770][ T24] audit: type=1400 audit(1756160284.200:73): avc: denied { read } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.630222][ T286] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 42.677713][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.347475][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 43.364730][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 43.944996][ T24] kauditd_printk_skb: 24 callbacks suppressed [ 43.945018][ T24] audit: type=1401 audit(1756160285.580:98): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 44.261335][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.268538][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.276593][ T321] device bridge_slave_0 entered promiscuous mode [ 44.284209][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.291410][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.299509][ T321] device bridge_slave_1 entered promiscuous mode [ 44.396875][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.404014][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.411428][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.418500][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.460613][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.468219][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.475984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.484942][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.503722][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.512194][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.519311][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.537274][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.545958][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.553049][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.571472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.589655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.611272][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.626744][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.635571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.643397][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.658102][ T321] device veth0_vlan entered promiscuous mode [ 44.673660][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.684489][ T321] device veth1_macvtap entered promiscuous mode [ 44.697764][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.718460][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.794772][ T24] audit: type=1400 audit(1756160286.430:99): avc: denied { create } for pid=340 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 45.011244][ T24] audit: type=1400 audit(1756160286.650:100): avc: denied { sys_admin } for pid=347 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 45.083084][ T24] audit: type=1400 audit(1756160286.720:101): avc: denied { sys_chroot } for pid=348 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 45.660209][ T49] device bridge_slave_1 left promiscuous mode [ 45.666479][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.679486][ T49] device bridge_slave_0 left promiscuous mode [ 45.685783][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.695678][ T49] device veth1_macvtap left promiscuous mode [ 45.702977][ T49] device veth0_vlan left promiscuous mode 2025/08/25 22:18:07 executed programs: 0 [ 46.130250][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.137361][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.145391][ T367] device bridge_slave_0 entered promiscuous mode [ 46.153441][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.160607][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.168450][ T367] device bridge_slave_1 entered promiscuous mode [ 46.265104][ T24] audit: type=1400 audit(1756160287.900:102): avc: denied { create } for pid=367 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.277611][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.286564][ T24] audit: type=1400 audit(1756160287.900:103): avc: denied { write } for pid=367 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.292721][ T367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.292945][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.327578][ T367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.329040][ T24] audit: type=1400 audit(1756160287.900:104): avc: denied { read } for pid=367 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.357633][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.365063][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.385041][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.392863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.403638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.413494][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.421953][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.429062][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.441486][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.450137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.458629][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.465750][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.481313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.489818][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.500126][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.508500][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.530312][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.539605][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.563410][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.571787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.581128][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.589326][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.608998][ T367] device veth0_vlan entered promiscuous mode [ 46.623998][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.632841][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.653769][ T367] device veth1_macvtap entered promiscuous mode [ 46.666676][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.675058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.683719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.694695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.703353][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.748961][ T24] audit: type=1404 audit(1756160288.390:105): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 46.774103][ T24] audit: type=1400 audit(1756160288.410:106): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.805440][ T24] audit: type=1400 audit(1756160288.440:107): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.951691][ T24] kauditd_printk_skb: 129 callbacks suppressed [ 48.951725][ T24] audit: type=1400 audit(1756160290.590:237): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.989829][ T24] audit: type=1400 audit(1756160290.630:238): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.013977][ T24] audit: type=1400 audit(1756160290.640:239): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.038374][ T24] audit: type=1400 audit(1756160290.650:240): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.070413][ T24] audit: type=1400 audit(1756160290.710:241): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.094573][ T24] audit: type=1400 audit(1756160290.720:242): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.119072][ T24] audit: type=1400 audit(1756160290.730:243): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.149616][ T24] audit: type=1400 audit(1756160290.790:244): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.173791][ T24] audit: type=1400 audit(1756160290.800:245): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.198372][ T24] audit: type=1400 audit(1756160290.810:246): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.965316][ T24] kauditd_printk_skb: 287 callbacks suppressed [ 53.965350][ T24] audit: type=1400 audit(1756160295.600:534): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.996196][ T24] audit: type=1400 audit(1756160295.610:535): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.028097][ T24] audit: type=1400 audit(1756160295.660:536): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.052456][ T24] audit: type=1400 audit(1756160295.680:537): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.076803][ T24] audit: type=1400 audit(1756160295.690:538): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.101027][ T24] audit: type=1400 audit(1756160295.710:539): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.125437][ T24] audit: type=1400 audit(1756160295.710:540): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.149622][ T24] audit: type=1400 audit(1756160295.740:541): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.174094][ T24] audit: type=1400 audit(1756160295.760:542): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.198292][ T24] audit: type=1400 audit(1756160295.760:543): avc: denied { read write } for pid=367 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.909831][ T49] device bridge_slave_1 left promiscuous mode [ 57.916035][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.924685][ T49] device bridge_slave_0 left promiscuous mode [ 57.931114][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.940853][ T49] device veth1_macvtap left promiscuous mode [ 57.946922][ T49] device veth0_vlan left promiscuous mode [ 59.267767][ T24] kauditd_printk_skb: 170 callbacks suppressed [ 59.267796][ T24] audit: type=1400 audit(1756160300.900:714): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.083947][ T24] audit: type=1400 audit(1756160301.720:715): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.000248][ T24] audit: type=1400 audit(1756160302.640:716): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.016241][ T24] audit: type=1400 audit(1756160303.650:717): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.132586][ T24] audit: type=1400 audit(1756160304.770:718): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.348516][ T24] audit: type=1400 audit(1756160305.980:719): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.664373][ T24] audit: type=1400 audit(1756160307.300:720): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.080202][ T24] audit: type=1400 audit(1756160308.720:721): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.595905][ T24] audit: type=1400 audit(1756160310.230:722): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.211565][ T24] audit: type=1400 audit(1756160311.850:723): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.927834][ T24] audit: type=1400 audit(1756160313.560:724): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.743568][ T24] audit: type=1400 audit(1756160315.380:725): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.659688][ T24] audit: type=1400 audit(1756160317.300:726): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.675534][ T24] audit: type=1400 audit(1756160319.310:727): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.703988][ T24] audit: type=1400 audit(1756160319.340:728): avc: denied { write } for pid=275 comm="syz-execprog" path="pipe:[1453]" dev="pipefs" ino=1453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0