Starting sshd: OK syzkaller syzkaller login: [ 11.942564][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 11.942570][ T23] audit: type=1400 audit(1634874036.270:71): avc: denied { transition } for pid=290 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.948840][ T23] audit: type=1400 audit(1634874036.270:72): avc: denied { write } for pid=290 comm="sh" path="pipe:[11291]" dev="pipefs" ino=11291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 15.709579][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 918.629546][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! Warning: Permanently added '10.128.1.169' (ECDSA) to the list of known hosts. executing program [ 924.228409][ T23] audit: type=1400 audit(1634874948.550:73): avc: denied { execmem } for pid=365 comm="syz-executor717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 924.247991][ T23] audit: type=1400 audit(1634874948.560:74): avc: denied { mounton } for pid=366 comm="syz-executor717" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 924.295286][ T23] audit: type=1400 audit(1634874948.620:75): avc: denied { read } for pid=366 comm="syz-executor717" name="vsock" dev="devtmpfs" ino=178 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 924.295349][ T366] ====================================================== [ 924.295349][ T366] WARNING: the mand mount option is being deprecated and [ 924.295349][ T366] will be removed in v5.15! [ 924.295349][ T366] ====================================================== [ 924.318029][ T23] audit: type=1400 audit(1634874948.620:76): avc: denied { open } for pid=366 comm="syz-executor717" path="/dev/vsock" dev="devtmpfs" ino=178 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1