syzkaller syzkaller login: [ 14.348721][ T36] kauditd_printk_skb: 48 callbacks suppressed [ 14.348737][ T36] audit: type=1400 audit(1754870527.859:59): avc: denied { transition } for pid=231 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.352925][ T36] audit: type=1400 audit(1754870527.859:60): avc: denied { noatsecure } for pid=231 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.355782][ T36] audit: type=1400 audit(1754870527.869:61): avc: denied { write } for pid=231 comm="sh" path="pipe:[1940]" dev="pipefs" ino=1940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.358779][ T36] audit: type=1400 audit(1754870527.869:62): avc: denied { rlimitinh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.361649][ T36] audit: type=1400 audit(1754870527.869:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.22' (ED25519) to the list of known hosts. 2025/08/11 00:02:15 ignoring optional flag "sandboxArg"="0" 2025/08/11 00:02:16 parsed 1 programs [ 23.255741][ T36] audit: type=1400 audit(1754870536.769:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.174441][ T36] audit: type=1400 audit(1754870537.689:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.175443][ T297] cgroup: Unknown subsys name 'net' [ 24.197097][ T36] audit: type=1400 audit(1754870537.689:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.224455][ T36] audit: type=1400 audit(1754870537.729:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.224694][ T297] cgroup: Unknown subsys name 'devices' [ 24.391417][ T297] cgroup: Unknown subsys name 'hugetlb' [ 24.397045][ T297] cgroup: Unknown subsys name 'rlimit' [ 24.555613][ T36] audit: type=1400 audit(1754870538.069:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.578508][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.578773][ T36] audit: type=1400 audit(1754870538.069:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.607662][ T36] audit: type=1400 audit(1754870538.069:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.628002][ T36] audit: type=1400 audit(1754870538.069:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.637039][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.648178][ T36] audit: type=1400 audit(1754870538.069:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 24.677847][ T36] audit: type=1400 audit(1754870538.069:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.560009][ T304] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.099450][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.106504][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.113622][ T345] bridge_slave_0: entered allmulticast mode [ 26.120746][ T345] bridge_slave_0: entered promiscuous mode [ 26.127007][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.134112][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.141227][ T345] bridge_slave_1: entered allmulticast mode [ 26.147490][ T345] bridge_slave_1: entered promiscuous mode [ 26.209066][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.216152][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.223476][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.230517][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.248102][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.255320][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.264651][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.271711][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.280644][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.287681][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.310404][ T345] veth0_vlan: entered promiscuous mode [ 26.320140][ T345] veth1_macvtap: entered promiscuous mode [ 26.401804][ T13] bridge_slave_1: left allmulticast mode [ 26.407482][ T13] bridge_slave_1: left promiscuous mode [ 26.413212][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.422529][ T13] bridge_slave_0: left allmulticast mode [ 26.428188][ T13] bridge_slave_0: left promiscuous mode [ 26.433899][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.585389][ T13] veth1_macvtap: left promiscuous mode [ 26.591320][ T13] veth0_vlan: left promiscuous mode 2025/08/11 00:02:20 executed programs: 0 [ 26.760899][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.767980][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.775293][ T371] bridge_slave_0: entered allmulticast mode [ 26.781559][ T371] bridge_slave_0: entered promiscuous mode [ 26.787740][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.794825][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.801906][ T371] bridge_slave_1: entered allmulticast mode [ 26.808027][ T371] bridge_slave_1: entered promiscuous mode [ 26.845149][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.852208][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.859471][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.866523][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.884108][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.891433][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.900754][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.907789][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.917539][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.924586][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.946924][ T371] veth0_vlan: entered promiscuous mode [ 26.956998][ T371] veth1_macvtap: entered promiscuous mode [ 28.282880][ T36] kauditd_printk_skb: 110 callbacks suppressed [ 28.282900][ T36] audit: type=1400 audit(1754870541.799:184): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.313167][ T36] audit: type=1400 audit(1754870541.819:185): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.337733][ T36] audit: type=1400 audit(1754870541.819:186): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.365063][ T36] audit: type=1400 audit(1754870541.889:187): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.389047][ T36] audit: type=1400 audit(1754870541.899:188): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.413674][ T36] audit: type=1400 audit(1754870541.899:189): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.438967][ T36] audit: type=1400 audit(1754870541.939:190): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.462893][ T36] audit: type=1400 audit(1754870541.949:191): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.486815][ T36] audit: type=1400 audit(1754870541.969:192): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 28.510778][ T36] audit: type=1400 audit(1754870541.989:193): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.312570][ T36] kauditd_printk_skb: 291 callbacks suppressed [ 33.312585][ T36] audit: type=1400 audit(1754870546.829:485): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.342664][ T36] audit: type=1400 audit(1754870546.849:486): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.366760][ T36] audit: type=1400 audit(1754870546.849:487): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.390686][ T36] audit: type=1400 audit(1754870546.889:488): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.414730][ T36] audit: type=1400 audit(1754870546.899:489): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.438642][ T36] audit: type=1400 audit(1754870546.919:490): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.462676][ T36] audit: type=1400 audit(1754870546.939:491): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.486644][ T36] audit: type=1400 audit(1754870546.959:492): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.510786][ T36] audit: type=1400 audit(1754870546.969:493): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.534720][ T36] audit: type=1400 audit(1754870546.989:494): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.087183][ T13] bridge_slave_1: left allmulticast mode [ 37.092901][ T13] bridge_slave_1: left promiscuous mode [ 37.098478][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.105941][ T13] bridge_slave_0: left allmulticast mode [ 37.111608][ T13] bridge_slave_0: left promiscuous mode [ 37.117167][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.200967][ T13] veth1_macvtap: left promiscuous mode [ 37.206463][ T13] veth0_vlan: left promiscuous mode [ 38.552646][ T36] kauditd_printk_skb: 219 callbacks suppressed [ 38.552661][ T36] audit: type=1400 audit(1754870552.069:714): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 39.259505][ T36] audit: type=1400 audit(1754870552.779:715): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.066340][ T36] audit: type=1400 audit(1754870553.589:716): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 40.973019][ T36] audit: type=1400 audit(1754870554.489:717): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.979783][ T36] audit: type=1400 audit(1754870555.499:718): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.086438][ T36] audit: type=1400 audit(1754870556.609:719): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 44.293078][ T36] audit: type=1400 audit(1754870557.809:720): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 45.599815][ T36] audit: type=1400 audit(1754870559.119:721): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 47.006497][ T36] audit: type=1400 audit(1754870560.529:722): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.513223][ T36] audit: type=1400 audit(1754870562.029:723): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 50.119944][ T36] audit: type=1400 audit(1754870563.639:724): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.826593][ T36] audit: type=1400 audit(1754870565.349:725): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.633417][ T36] audit: type=1400 audit(1754870567.149:726): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.540078][ T36] audit: type=1400 audit(1754870569.059:727): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.546741][ T36] audit: type=1400 audit(1754870571.069:728): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.568686][ T36] audit: type=1400 audit(1754870571.079:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2011]" dev="pipefs" ino=2011 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0