[ 4.364763][ T100] udevd[100]: starting version 3.2.11 [ 4.401374][ T101] udevd[101]: starting eudev-3.2.11 [ 4.404085][ T100] udevd (100) used greatest stack depth: 22096 bytes left [ 12.807857][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 12.807874][ T30] audit: type=1400 audit(1730688282.524:61): avc: denied { transition } for pid=224 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.818131][ T30] audit: type=1400 audit(1730688282.524:62): avc: denied { noatsecure } for pid=224 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.824721][ T30] audit: type=1400 audit(1730688282.524:63): avc: denied { write } for pid=224 comm="sh" path="pipe:[14464]" dev="pipefs" ino=14464 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.829320][ T30] audit: type=1400 audit(1730688282.524:64): avc: denied { rlimitinh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.833056][ T30] audit: type=1400 audit(1730688282.524:65): avc: denied { siginh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 248.089701][ T503] sftp-server (503) used greatest stack depth: 19936 bytes left Warning: Permanently added '10.128.1.229' (ED25519) to the list of known hosts. executing program [ 254.626967][ T30] audit: type=1400 audit(1730688524.334:66): avc: denied { execmem } for pid=520 comm="syz-executor648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 254.646496][ T30] audit: type=1400 audit(1730688524.344:67): avc: denied { prog_load } for pid=521 comm="syz-executor648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 254.665880][ T30] audit: type=1400 audit(1730688524.344:68): avc: denied { create } for pid=521 comm="syz-executor648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 254.685556][ T30] audit: type=1400 audit(1730688524.344:69): avc: denied { map_create } for pid=521 comm="syz-executor648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 254.704930][ T30] audit: type=1400 audit(1730688524.344:70): avc: denied { bpf } for pid=521 comm="syz-executor648" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 254.725572][ T30] audit: type=1400 audit(1730688524.344:71): avc: denied { map_read map_write } for pid=521 comm="syz-executor648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 254.745503][ T30] audit: type=1400 audit(1730688524.344:72): avc: denied { perfmon } for pid=521 comm="syz-executor648" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 executing program executing program [ 254.879477][ T30] audit: type=1400 audit(1730688524.594:73): avc: denied { prog_run } for pid=521 comm="syz-executor648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1