syzkaller syzkaller login: [ 14.690738][ T36] audit: type=1400 audit(1751677229.079:59): avc: denied { transition } for pid=231 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.693891][ T36] audit: type=1400 audit(1751677229.079:60): avc: denied { noatsecure } for pid=231 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.696557][ T36] audit: type=1400 audit(1751677229.079:61): avc: denied { write } for pid=231 comm="sh" path="pipe:[1592]" dev="pipefs" ino=1592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.699481][ T36] audit: type=1400 audit(1751677229.079:62): avc: denied { rlimitinh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.702304][ T36] audit: type=1400 audit(1751677229.079:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.140497][ T59] sched: DL replenish lagged too much Warning: Permanently added '10.128.0.114' (ED25519) to the list of known hosts. 2025/07/05 01:00:56 ignoring optional flag "sandboxArg"="0" 2025/07/05 01:00:57 parsed 1 programs [ 42.809546][ T36] audit: type=1400 audit(1751677257.189:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 43.729251][ T36] audit: type=1400 audit(1751677258.109:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 43.730349][ T297] cgroup: Unknown subsys name 'net' [ 43.751916][ T36] audit: type=1400 audit(1751677258.109:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.779422][ T36] audit: type=1400 audit(1751677258.139:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.779586][ T297] cgroup: Unknown subsys name 'devices' [ 43.962281][ T297] cgroup: Unknown subsys name 'hugetlb' [ 43.967983][ T297] cgroup: Unknown subsys name 'rlimit' [ 44.119780][ T36] audit: type=1400 audit(1751677258.499:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.143041][ T36] audit: type=1400 audit(1751677258.499:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.155458][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 44.163596][ T36] audit: type=1400 audit(1751677258.499:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.192255][ T36] audit: type=1400 audit(1751677258.509:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.212426][ T36] audit: type=1400 audit(1751677258.509:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 44.216349][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.233366][ T36] audit: type=1400 audit(1751677258.509:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 45.139091][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 45.294935][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.302214][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.309302][ T313] bridge_slave_0: entered allmulticast mode [ 45.315802][ T313] bridge_slave_0: entered promiscuous mode [ 45.322313][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.329357][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.336544][ T313] bridge_slave_1: entered allmulticast mode [ 45.342867][ T313] bridge_slave_1: entered promiscuous mode [ 45.388875][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.396050][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.403596][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.410640][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.428034][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.435322][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.447180][ T59] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.454253][ T59] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.463148][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.470428][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.493656][ T313] veth0_vlan: entered promiscuous mode [ 45.503975][ T313] veth1_macvtap: entered promiscuous mode [ 45.567530][ T13] bridge_slave_1: left allmulticast mode [ 45.573243][ T13] bridge_slave_1: left promiscuous mode [ 45.578918][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.587478][ T13] bridge_slave_0: left allmulticast mode [ 45.593556][ T13] bridge_slave_0: left promiscuous mode [ 45.599168][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.722762][ T13] veth1_macvtap: left promiscuous mode [ 45.728263][ T13] veth0_vlan: left promiscuous mode 2025/07/05 01:01:00 executed programs: 0 [ 46.216948][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.224036][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.231745][ T359] bridge_slave_0: entered allmulticast mode [ 46.238412][ T359] bridge_slave_0: entered promiscuous mode [ 46.244993][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.252077][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.259110][ T359] bridge_slave_1: entered allmulticast mode [ 46.265344][ T359] bridge_slave_1: entered promiscuous mode [ 46.314475][ T359] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.321542][ T359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.328787][ T359] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.336008][ T359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.350465][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.358871][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.376853][ T59] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.383902][ T59] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.392635][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.399662][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.420221][ T359] veth0_vlan: entered promiscuous mode [ 46.430573][ T359] veth1_macvtap: entered promiscuous mode [ 47.853697][ T36] kauditd_printk_skb: 116 callbacks suppressed [ 47.853713][ T36] audit: type=1400 audit(1751677262.239:190): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.884182][ T36] audit: type=1400 audit(1751677262.249:191): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.908312][ T36] audit: type=1400 audit(1751677262.249:192): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.932223][ T36] audit: type=1400 audit(1751677262.299:193): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.956301][ T36] audit: type=1400 audit(1751677262.299:194): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.980213][ T36] audit: type=1400 audit(1751677262.299:195): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.004236][ T36] audit: type=1400 audit(1751677262.339:196): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.028144][ T36] audit: type=1400 audit(1751677262.359:197): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.052075][ T36] audit: type=1400 audit(1751677262.359:198): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.075976][ T36] audit: type=1400 audit(1751677262.409:199): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.893657][ T36] kauditd_printk_skb: 291 callbacks suppressed [ 52.893671][ T36] audit: type=1400 audit(1751677267.279:491): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.924030][ T36] audit: type=1400 audit(1751677267.289:492): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.948107][ T36] audit: type=1400 audit(1751677267.299:493): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.972134][ T36] audit: type=1400 audit(1751677267.329:494): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.996230][ T36] audit: type=1400 audit(1751677267.349:495): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.020172][ T36] audit: type=1400 audit(1751677267.349:496): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.044117][ T36] audit: type=1400 audit(1751677267.379:497): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.068101][ T36] audit: type=1400 audit(1751677267.399:498): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.092182][ T36] audit: type=1400 audit(1751677267.429:499): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.116410][ T36] audit: type=1400 audit(1751677267.449:500): avc: denied { read write } for pid=359 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 56.568960][ T12] bridge_slave_1: left allmulticast mode [ 56.574695][ T12] bridge_slave_1: left promiscuous mode [ 56.580288][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.587865][ T12] bridge_slave_0: left allmulticast mode [ 56.593593][ T12] bridge_slave_0: left promiscuous mode [ 56.599156][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.703022][ T12] veth1_macvtap: left promiscuous mode [ 56.708516][ T12] veth0_vlan: left promiscuous mode [ 58.056949][ T36] kauditd_printk_skb: 213 callbacks suppressed [ 58.056964][ T36] audit: type=1400 audit(1751677272.439:714): avc: denied { execmem } for pid=971 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.763709][ T36] audit: type=1400 audit(1751677273.149:715): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.570248][ T36] audit: type=1400 audit(1751677273.949:716): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.476910][ T36] audit: type=1400 audit(1751677274.859:717): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.483798][ T36] audit: type=1400 audit(1751677275.869:718): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.590500][ T36] audit: type=1400 audit(1751677276.979:719): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.797159][ T36] audit: type=1400 audit(1751677278.179:720): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.103796][ T36] audit: type=1400 audit(1751677279.489:721): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.511072][ T36] audit: type=1400 audit(1751677280.899:722): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.017677][ T36] audit: type=1400 audit(1751677282.399:723): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 69.624724][ T36] audit: type=1400 audit(1751677284.009:724): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 71.331470][ T36] audit: type=1400 audit(1751677285.719:725): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 73.137949][ T36] audit: type=1400 audit(1751677287.519:726): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.044542][ T36] audit: type=1400 audit(1751677289.429:727): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.051129][ T36] audit: type=1400 audit(1751677291.439:728): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.073293][ T36] audit: type=1400 audit(1751677291.459:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1672]" dev="pipefs" ino=1672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0