syzkaller syzkaller login: [ 14.397906][ T36] kauditd_printk_skb: 48 callbacks suppressed [ 14.397921][ T36] audit: type=1400 audit(1754634999.469:59): avc: denied { transition } for pid=231 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.402761][ T36] audit: type=1400 audit(1754634999.469:60): avc: denied { noatsecure } for pid=231 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.406311][ T36] audit: type=1400 audit(1754634999.469:61): avc: denied { write } for pid=231 comm="sh" path="pipe:[368]" dev="pipefs" ino=368 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.410397][ T36] audit: type=1400 audit(1754634999.469:62): avc: denied { rlimitinh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.413310][ T36] audit: type=1400 audit(1754634999.469:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.144' (ED25519) to the list of known hosts. 2025/08/08 06:37:03 ignoring optional flag "sandboxArg"="0" 2025/08/08 06:37:04 parsed 1 programs [ 38.988569][ T36] audit: type=1400 audit(1754635024.059:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 39.977858][ T36] audit: type=1400 audit(1754635025.049:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 39.978987][ T297] cgroup: Unknown subsys name 'net' [ 40.001329][ T36] audit: type=1400 audit(1754635025.049:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 40.031480][ T36] audit: type=1400 audit(1754635025.079:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 40.031653][ T297] cgroup: Unknown subsys name 'devices' [ 40.186928][ T297] cgroup: Unknown subsys name 'hugetlb' [ 40.192776][ T297] cgroup: Unknown subsys name 'rlimit' [ 40.289806][ T36] audit: type=1400 audit(1754635025.359:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.313114][ T36] audit: type=1400 audit(1754635025.359:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.321971][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 40.334817][ T36] audit: type=1400 audit(1754635025.359:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.363680][ T36] audit: type=1400 audit(1754635025.359:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.373335][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.384074][ T36] audit: type=1400 audit(1754635025.359:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 40.414719][ T36] audit: type=1400 audit(1754635025.359:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.262407][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 41.691239][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.699636][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.707619][ T331] bridge_slave_0: entered allmulticast mode [ 41.715133][ T331] bridge_slave_0: entered promiscuous mode [ 41.724709][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.732529][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.741144][ T331] bridge_slave_1: entered allmulticast mode [ 41.747862][ T331] bridge_slave_1: entered promiscuous mode [ 41.793114][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.800214][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.808966][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.817143][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.835517][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.843631][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.854003][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.861192][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.870452][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.877544][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.899643][ T331] veth0_vlan: entered promiscuous mode [ 41.909764][ T331] veth1_macvtap: entered promiscuous mode [ 41.966098][ T13] bridge_slave_1: left allmulticast mode [ 41.972015][ T13] bridge_slave_1: left promiscuous mode [ 41.979170][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.988142][ T13] bridge_slave_0: left allmulticast mode [ 41.994001][ T13] bridge_slave_0: left promiscuous mode [ 42.000049][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.139008][ T13] veth1_macvtap: left promiscuous mode [ 42.144857][ T13] veth0_vlan: left promiscuous mode 2025/08/08 06:37:07 executed programs: 0 [ 42.497533][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.504730][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.512772][ T370] bridge_slave_0: entered allmulticast mode [ 42.519455][ T370] bridge_slave_0: entered promiscuous mode [ 42.525782][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.533172][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.540680][ T370] bridge_slave_1: entered allmulticast mode [ 42.547141][ T370] bridge_slave_1: entered promiscuous mode [ 42.635091][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.642262][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.649599][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.656686][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.680048][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.687555][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.698336][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.705656][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.716935][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.724072][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.748223][ T370] veth0_vlan: entered promiscuous mode [ 42.758362][ T370] veth1_macvtap: entered promiscuous mode [ 43.997976][ T36] kauditd_printk_skb: 104 callbacks suppressed [ 43.997996][ T36] audit: type=1400 audit(1754635029.069:178): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.030384][ T36] audit: type=1400 audit(1754635029.079:179): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.054977][ T36] audit: type=1400 audit(1754635029.079:180): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.082682][ T36] audit: type=1400 audit(1754635029.149:181): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.107834][ T36] audit: type=1400 audit(1754635029.169:182): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.132236][ T36] audit: type=1400 audit(1754635029.169:183): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.158738][ T36] audit: type=1400 audit(1754635029.229:184): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.183225][ T36] audit: type=1400 audit(1754635029.239:185): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.207680][ T36] audit: type=1400 audit(1754635029.249:186): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.236952][ T36] audit: type=1400 audit(1754635029.309:187): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.047664][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 49.047679][ T36] audit: type=1400 audit(1754635034.119:476): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.078305][ T36] audit: type=1400 audit(1754635034.139:477): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.103217][ T36] audit: type=1400 audit(1754635034.139:478): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.130355][ T36] audit: type=1400 audit(1754635034.179:479): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.156144][ T36] audit: type=1400 audit(1754635034.179:480): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.180506][ T36] audit: type=1400 audit(1754635034.199:481): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.205643][ T36] audit: type=1400 audit(1754635034.229:482): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.233981][ T36] audit: type=1400 audit(1754635034.229:483): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.258656][ T36] audit: type=1400 audit(1754635034.249:484): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.283293][ T36] audit: type=1400 audit(1754635034.279:485): avc: denied { read write } for pid=370 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.967504][ T13] bridge_slave_1: left allmulticast mode [ 52.973509][ T13] bridge_slave_1: left promiscuous mode [ 52.979220][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.986711][ T13] bridge_slave_0: left allmulticast mode [ 52.992353][ T13] bridge_slave_0: left promiscuous mode [ 52.998112][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.106701][ T13] veth1_macvtap: left promiscuous mode [ 53.113135][ T13] veth0_vlan: left promiscuous mode [ 54.454033][ T36] kauditd_printk_skb: 228 callbacks suppressed [ 54.454049][ T36] audit: type=1400 audit(1754635039.519:714): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.160794][ T36] audit: type=1400 audit(1754635040.229:715): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.967525][ T36] audit: type=1400 audit(1754635041.039:716): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.874296][ T36] audit: type=1400 audit(1754635041.939:717): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.881172][ T36] audit: type=1400 audit(1754635042.949:718): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.988282][ T36] audit: type=1400 audit(1754635044.059:719): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.195494][ T36] audit: type=1400 audit(1754635045.269:720): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.502206][ T36] audit: type=1400 audit(1754635046.569:721): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.909050][ T36] audit: type=1400 audit(1754635047.979:722): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.415811][ T36] audit: type=1400 audit(1754635049.489:723): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.023027][ T36] audit: type=1400 audit(1754635051.089:724): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.729918][ T36] audit: type=1400 audit(1754635052.799:725): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.537089][ T36] audit: type=1400 audit(1754635054.609:726): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.444088][ T36] audit: type=1400 audit(1754635056.509:727): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.450918][ T36] audit: type=1400 audit(1754635058.519:728): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.472878][ T36] audit: type=1400 audit(1754635058.539:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[3033]" dev="pipefs" ino=3033 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 79.627553][ T50] sched: DL replenish lagged too much