syzkaller syzkaller login: [ 18.488422][ T36] kauditd_printk_skb: 31 callbacks suppressed [ 18.488440][ T36] audit: type=1400 audit(1769438005.490:59): avc: denied { transition } for pid=234 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.493146][ T36] audit: type=1400 audit(1769438005.490:60): avc: denied { noatsecure } for pid=234 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.497556][ T36] audit: type=1400 audit(1769438005.500:61): avc: denied { write } for pid=234 comm="sh" path="pipe:[2324]" dev="pipefs" ino=2324 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 18.500882][ T36] audit: type=1400 audit(1769438005.500:62): avc: denied { rlimitinh } for pid=234 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.503961][ T36] audit: type=1400 audit(1769438005.500:63): avc: denied { siginh } for pid=234 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.17' (ED25519) to the list of known hosts. 2026/01/26 14:33:35 parsed 1 programs [ 28.169154][ T36] audit: type=1400 audit(1769438015.170:64): avc: denied { node_bind } for pid=292 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 29.708640][ T36] audit: type=1400 audit(1769438016.710:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.712069][ T298] cgroup: Unknown subsys name 'net' [ 29.731397][ T36] audit: type=1400 audit(1769438016.710:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.758874][ T36] audit: type=1400 audit(1769438016.740:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.759458][ T298] cgroup: Unknown subsys name 'devices' [ 29.918621][ T298] cgroup: Unknown subsys name 'hugetlb' [ 29.924482][ T298] cgroup: Unknown subsys name 'rlimit' [ 30.109147][ T36] audit: type=1400 audit(1769438017.110:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.132415][ T36] audit: type=1400 audit(1769438017.110:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.153215][ T36] audit: type=1400 audit(1769438017.110:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.173616][ T36] audit: type=1400 audit(1769438017.110:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.185528][ T302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 30.194448][ T36] audit: type=1400 audit(1769438017.110:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 30.223804][ T36] audit: type=1400 audit(1769438017.110:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 30.320370][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.233551][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.240682][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.247978][ T305] bridge_slave_0: entered allmulticast mode [ 31.254599][ T305] bridge_slave_0: entered promiscuous mode [ 31.261529][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.268657][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.275828][ T305] bridge_slave_1: entered allmulticast mode [ 31.282314][ T305] bridge_slave_1: entered promiscuous mode [ 31.346452][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.353533][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.360944][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.368049][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.391046][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.398657][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.409257][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.416351][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.425678][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.432772][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.460041][ T305] veth0_vlan: entered promiscuous mode [ 31.471964][ T305] veth1_macvtap: entered promiscuous mode [ 31.498938][ T305] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.535500][ T12] bridge_slave_1: left allmulticast mode [ 31.541533][ T12] bridge_slave_1: left promiscuous mode [ 31.547565][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.555484][ T12] bridge_slave_0: left allmulticast mode [ 31.561299][ T12] bridge_slave_0: left promiscuous mode [ 31.568487][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.670408][ T12] veth1_macvtap: left promiscuous mode [ 31.676021][ T12] veth0_vlan: left promiscuous mode 2026/01/26 14:33:39 executed programs: 0 [ 32.730984][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.738558][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.745658][ T372] bridge_slave_0: entered allmulticast mode [ 32.752119][ T372] bridge_slave_0: entered promiscuous mode [ 32.764617][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.771829][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.779016][ T372] bridge_slave_1: entered allmulticast mode [ 32.785284][ T372] bridge_slave_1: entered promiscuous mode [ 32.834678][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.841770][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.849124][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.856176][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.877343][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.884651][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.894268][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.901401][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.910743][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.918020][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.943836][ T372] veth0_vlan: entered promiscuous mode [ 32.954088][ T372] veth1_macvtap: entered promiscuous mode [ 32.982563][ T382] ------------[ cut here ]------------ [ 32.988146][ T382] WARNING: CPU: 1 PID: 382 at security/landlock/fs.c:1025 collect_domain_accesses+0x327/0x390 [ 32.998501][ T382] Modules linked in: [ 33.002463][ T382] CPU: 1 UID: 0 PID: 382 Comm: syz.2.17 Not tainted syzkaller #0 5d18be0d7d8d5053dc4a903978481071267b1302 [ 33.013867][ T382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 33.023995][ T382] RIP: 0010:collect_domain_accesses+0x327/0x390 [ 33.030349][ T382] Code: 7f 76 73 ff eb 08 e8 a8 cc 0a ff 41 b4 01 44 89 e0 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc e8 89 cc 0a ff <0f> 0b 45 31 e4 eb cb e8 7d cc 0a ff 0f 0b eb d1 89 d9 80 e1 07 80 [ 33.050065][ T382] RSP: 0018:ffffc9000110faf0 EFLAGS: 00010293 [ 33.056164][ T382] RAX: ffffffff827cbb77 RBX: ffff8881107aa000 RCX: ffff8881163ccc00 [ 33.064255][ T382] RDX: 0000000000000000 RSI: 0000000000002004 RDI: ffff8881107aa018 [ 33.072345][ T382] RBP: ffffc9000110fb30 R08: ffff8881163ccc00 R09: 0000000000000002 [ 33.080512][ T382] R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000 [ 33.088567][ T382] R13: 0000000000002004 R14: 1ffffffff0e3f896 R15: dffffc0000000000 [ 33.096621][ T382] FS: 0000555557748500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 33.105584][ T382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.112262][ T382] CR2: 0000001b33f63fff CR3: 0000000113706000 CR4: 00000000003526b0 [ 33.120356][ T382] Call Trace: [ 33.123753][ T382] [ 33.126730][ T382] current_check_refer_path+0x8ee/0xd40 [ 33.132323][ T382] ? hook_file_free_security+0xc0/0xc0 [ 33.137978][ T382] hook_path_rename+0x44/0x60 [ 33.142703][ T382] security_path_rename+0x1d8/0x2a0 [ 33.148171][ T382] do_renameat2+0x634/0xc40 [ 33.152711][ T382] ? __cfi_do_renameat2+0x10/0x10 [ 33.157799][ T382] ? strncpy_from_user+0x14d/0x270 [ 33.162965][ T382] ? __kasan_check_write+0x18/0x20 [ 33.168198][ T382] __x64_sys_renameat2+0xdc/0x100 [ 33.173265][ T382] x64_sys_call+0x2e18/0x2ee0 [ 33.178033][ T382] do_syscall_64+0x57/0xf0 [ 33.182488][ T382] ? clear_bhb_loop+0x50/0xa0 [ 33.187277][ T382] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 33.193207][ T382] RIP: 0033:0x7f5873f9aeb9 [ 33.197720][ T382] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 33.217440][ T382] RSP: 002b:00007ffe7ea6b168 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 33.225918][ T382] RAX: ffffffffffffffda RBX: 00007f5874215fa0 RCX: 00007f5873f9aeb9 [ 33.233964][ T382] RDX: 0000000000000003 RSI: 0000200000000540 RDI: 0000000000000003 [ 33.242011][ T382] RBP: 00007f5874008c1f R08: 0000000000000000 R09: 0000000000000000 [ 33.250163][ T382] R10: 0000200000000580 R11: 0000000000000246 R12: 0000000000000000 [ 33.258251][ T382] R13: 00007f5874215fac R14: 00007f5874215fa0 R15: 00007f5874215fa0 [ 33.266330][ T382] [ 33.269404][ T382] ---[ end trace 0000000000000000 ]--- [ 33.277980][ T36] kauditd_printk_skb: 31 callbacks suppressed [ 33.277998][ T36] audit: type=1400 audit(1769438020.280:105): avc: denied { unmount } for pid=372 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 33.361358][ T12] bridge_slave_1: left allmulticast mode [ 33.367137][ T12] bridge_slave_1: left promiscuous mode [ 33.372790][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.380830][ T12] bridge_slave_0: left allmulticast mode [ 33.386613][ T12] bridge_slave_0: left promiscuous mode [ 33.392263][ T12] bridge0: port 1(bridge_slave_0) entered disabled state