syzkaller syzkaller login: [ 40.311660][ T13] sched: DL replenish lagged too much [ 50.378537][ T36] audit: type=1400 audit(1752507117.859:59): avc: denied { transition } for pid=273 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 50.401082][ T36] audit: type=1400 audit(1752507117.859:60): avc: denied { noatsecure } for pid=273 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 50.420702][ T36] audit: type=1400 audit(1752507117.869:61): avc: denied { write } for pid=273 comm="sh" path="pipe:[698]" dev="pipefs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 50.442806][ T36] audit: type=1400 audit(1752507117.869:62): avc: denied { rlimitinh } for pid=273 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 50.461805][ T36] audit: type=1400 audit(1752507117.869:63): avc: denied { siginh } for pid=273 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.18' (ED25519) to the list of known hosts. 2025/07/14 15:32:06 ignoring optional flag "sandboxArg"="0" 2025/07/14 15:32:07 parsed 1 programs [ 59.658398][ T36] audit: type=1400 audit(1752507127.139:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 60.611391][ T36] audit: type=1400 audit(1752507128.089:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 60.612529][ T297] cgroup: Unknown subsys name 'net' [ 60.634039][ T36] audit: type=1400 audit(1752507128.099:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 60.661339][ T36] audit: type=1400 audit(1752507128.119:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 60.661550][ T297] cgroup: Unknown subsys name 'devices' [ 60.803503][ T297] cgroup: Unknown subsys name 'hugetlb' [ 60.809108][ T297] cgroup: Unknown subsys name 'rlimit' [ 60.903228][ T36] audit: type=1400 audit(1752507128.389:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 60.927346][ T36] audit: type=1400 audit(1752507128.389:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 60.948054][ T36] audit: type=1400 audit(1752507128.389:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 60.957437][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 60.968774][ T36] audit: type=1400 audit(1752507128.389:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 60.997475][ T36] audit: type=1400 audit(1752507128.389:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 61.018488][ T36] audit: type=1400 audit(1752507128.389:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 61.047621][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 61.866558][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 62.196588][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.203653][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.210755][ T327] bridge_slave_0: entered allmulticast mode [ 62.216982][ T327] bridge_slave_0: entered promiscuous mode [ 62.223299][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.230321][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.237427][ T327] bridge_slave_1: entered allmulticast mode [ 62.243848][ T327] bridge_slave_1: entered promiscuous mode [ 62.294257][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.301296][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.308580][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.315615][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.333856][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.341074][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.350681][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.357736][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.370480][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.377586][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.397536][ T327] veth0_vlan: entered promiscuous mode [ 62.407519][ T327] veth1_macvtap: entered promiscuous mode [ 62.463979][ T45] bridge_slave_1: left allmulticast mode [ 62.469647][ T45] bridge_slave_1: left promiscuous mode [ 62.475446][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.483996][ T45] bridge_slave_0: left allmulticast mode [ 62.489655][ T45] bridge_slave_0: left promiscuous mode [ 62.495527][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.617586][ T45] veth1_macvtap: left promiscuous mode [ 62.626439][ T45] veth0_vlan: left promiscuous mode 2025/07/14 15:32:10 executed programs: 0 [ 63.093357][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.100386][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.107688][ T362] bridge_slave_0: entered allmulticast mode [ 63.113912][ T362] bridge_slave_0: entered promiscuous mode [ 63.120149][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.127182][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.134246][ T362] bridge_slave_1: entered allmulticast mode [ 63.140374][ T362] bridge_slave_1: entered promiscuous mode [ 63.183603][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.190633][ T362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.197913][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.204949][ T362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.222509][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.229630][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.238528][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.245581][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.254488][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.261532][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.284449][ T362] veth0_vlan: entered promiscuous mode [ 63.294237][ T362] veth1_macvtap: entered promiscuous mode [ 64.665188][ T36] kauditd_printk_skb: 113 callbacks suppressed [ 64.665210][ T36] audit: type=1400 audit(1752507132.149:187): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.695310][ T36] audit: type=1400 audit(1752507132.159:188): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.719247][ T36] audit: type=1400 audit(1752507132.169:189): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.744043][ T36] audit: type=1400 audit(1752507132.199:190): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.768054][ T36] audit: type=1400 audit(1752507132.209:191): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.792119][ T36] audit: type=1400 audit(1752507132.229:192): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.816035][ T36] audit: type=1400 audit(1752507132.279:193): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.840013][ T36] audit: type=1400 audit(1752507132.299:194): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.864276][ T36] audit: type=1400 audit(1752507132.299:195): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.888326][ T36] audit: type=1400 audit(1752507132.349:196): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.684740][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 69.684755][ T36] audit: type=1400 audit(1752507137.169:485): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.714834][ T36] audit: type=1400 audit(1752507137.179:486): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.738870][ T36] audit: type=1400 audit(1752507137.189:487): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.762834][ T36] audit: type=1400 audit(1752507137.219:488): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.786969][ T36] audit: type=1400 audit(1752507137.229:489): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.810880][ T36] audit: type=1400 audit(1752507137.249:490): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.834881][ T36] audit: type=1400 audit(1752507137.269:491): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.858970][ T36] audit: type=1400 audit(1752507137.289:492): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.883085][ T36] audit: type=1400 audit(1752507137.299:493): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.907120][ T36] audit: type=1400 audit(1752507137.319:494): avc: denied { read write } for pid=362 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.469342][ T45] bridge_slave_1: left allmulticast mode [ 73.475028][ T45] bridge_slave_1: left promiscuous mode [ 73.480612][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.488090][ T45] bridge_slave_0: left allmulticast mode [ 73.493799][ T45] bridge_slave_0: left promiscuous mode [ 73.499396][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.613698][ T45] veth1_macvtap: left promiscuous mode [ 73.619188][ T45] veth0_vlan: left promiscuous mode [ 74.935340][ T36] kauditd_printk_skb: 219 callbacks suppressed [ 74.935356][ T36] audit: type=1400 audit(1752507142.419:714): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 75.642057][ T36] audit: type=1400 audit(1752507143.129:715): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 76.448715][ T36] audit: type=1400 audit(1752507143.929:716): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.356033][ T36] audit: type=1400 audit(1752507144.839:717): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 78.363391][ T36] audit: type=1400 audit(1752507145.849:718): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 79.470737][ T36] audit: type=1400 audit(1752507146.949:719): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 80.678078][ T36] audit: type=1400 audit(1752507148.159:720): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 81.985081][ T36] audit: type=1400 audit(1752507149.469:721): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 83.391895][ T36] audit: type=1400 audit(1752507150.879:722): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 84.898568][ T36] audit: type=1400 audit(1752507152.379:723): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 86.505867][ T36] audit: type=1400 audit(1752507153.989:724): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 88.213675][ T36] audit: type=1400 audit(1752507155.699:725): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 90.020753][ T36] audit: type=1400 audit(1752507157.499:726): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 91.927619][ T36] audit: type=1400 audit(1752507159.409:727): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 93.934367][ T36] audit: type=1400 audit(1752507161.419:728): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 93.956240][ T36] audit: type=1400 audit(1752507161.439:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[766]" dev="pipefs" ino=766 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0