[ 6.920918][ T36] audit: type=1400 audit(1752713950.249:58): avc: denied { read } for pid=201 comm="getty" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 syzkaller syzkaller login: [ 15.134474][ T36] audit: type=1400 audit(1752713958.489:59): avc: denied { transition } for pid=231 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.137688][ T36] audit: type=1400 audit(1752713958.489:60): avc: denied { noatsecure } for pid=231 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.140343][ T36] audit: type=1400 audit(1752713958.489:61): avc: denied { write } for pid=231 comm="sh" path="pipe:[1901]" dev="pipefs" ino=1901 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 15.143414][ T36] audit: type=1400 audit(1752713958.489:62): avc: denied { rlimitinh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.146455][ T36] audit: type=1400 audit(1752713958.489:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.41' (ED25519) to the list of known hosts. 2025/07/17 00:59:40 ignoring optional flag "sandboxArg"="0" 2025/07/17 00:59:41 parsed 1 programs [ 38.291433][ T36] audit: type=1400 audit(1752713981.629:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 39.244561][ T36] audit: type=1400 audit(1752713982.589:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 39.245750][ T297] cgroup: Unknown subsys name 'net' [ 39.267408][ T36] audit: type=1400 audit(1752713982.589:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.294669][ T36] audit: type=1400 audit(1752713982.629:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.294834][ T297] cgroup: Unknown subsys name 'devices' [ 39.474172][ T297] cgroup: Unknown subsys name 'hugetlb' [ 39.479829][ T297] cgroup: Unknown subsys name 'rlimit' [ 39.632680][ T36] audit: type=1400 audit(1752713982.979:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.655868][ T36] audit: type=1400 audit(1752713982.979:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.676352][ T36] audit: type=1400 audit(1752713982.979:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.685831][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 39.696752][ T36] audit: type=1400 audit(1752713982.979:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.725462][ T36] audit: type=1400 audit(1752713982.979:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 39.747172][ T36] audit: type=1400 audit(1752713982.979:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.782091][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.672432][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 40.958738][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.965854][ T323] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.972984][ T323] bridge_slave_0: entered allmulticast mode [ 40.979261][ T323] bridge_slave_0: entered promiscuous mode [ 40.985667][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.992776][ T323] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.999878][ T323] bridge_slave_1: entered allmulticast mode [ 41.006051][ T323] bridge_slave_1: entered promiscuous mode [ 41.044785][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.051856][ T323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.059080][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.066111][ T323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.084460][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.092283][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.103036][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.110253][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.117907][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.124954][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.147778][ T323] veth0_vlan: entered promiscuous mode [ 41.157663][ T323] veth1_macvtap: entered promiscuous mode [ 41.332741][ T13] bridge_slave_1: left allmulticast mode [ 41.338486][ T13] bridge_slave_1: left promiscuous mode [ 41.344399][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.351947][ T13] bridge_slave_0: left allmulticast mode [ 41.357576][ T13] bridge_slave_0: left promiscuous mode [ 41.363584][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.466706][ T13] veth1_macvtap: left promiscuous mode [ 41.472290][ T13] veth0_vlan: left promiscuous mode 2025/07/17 00:59:45 executed programs: 0 [ 41.814659][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.821731][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.828871][ T361] bridge_slave_0: entered allmulticast mode [ 41.835171][ T361] bridge_slave_0: entered promiscuous mode [ 41.841550][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.848633][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.855775][ T361] bridge_slave_1: entered allmulticast mode [ 41.862049][ T361] bridge_slave_1: entered promiscuous mode [ 41.920585][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.927730][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.935082][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.942137][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.960406][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.968267][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.978437][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.985533][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.994600][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.001649][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.026069][ T361] veth0_vlan: entered promiscuous mode [ 42.036151][ T361] veth1_macvtap: entered promiscuous mode [ 43.325604][ T36] kauditd_printk_skb: 107 callbacks suppressed [ 43.325620][ T36] audit: type=1400 audit(1752713986.669:181): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.355772][ T36] audit: type=1400 audit(1752713986.669:182): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.379773][ T36] audit: type=1400 audit(1752713986.679:183): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.406996][ T36] audit: type=1400 audit(1752713986.759:184): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.431527][ T36] audit: type=1400 audit(1752713986.769:185): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.455766][ T36] audit: type=1400 audit(1752713986.769:186): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.483675][ T36] audit: type=1400 audit(1752713986.829:187): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.507725][ T36] audit: type=1400 audit(1752713986.849:188): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.531698][ T36] audit: type=1400 audit(1752713986.849:189): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.558954][ T36] audit: type=1400 audit(1752713986.909:190): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.355467][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 48.355483][ T36] audit: type=1400 audit(1752713991.699:479): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.385767][ T36] audit: type=1400 audit(1752713991.709:480): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.409860][ T36] audit: type=1400 audit(1752713991.709:481): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.433844][ T36] audit: type=1400 audit(1752713991.769:482): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.457752][ T36] audit: type=1400 audit(1752713991.789:483): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.481829][ T36] audit: type=1400 audit(1752713991.809:484): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.505736][ T36] audit: type=1400 audit(1752713991.829:485): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.529731][ T36] audit: type=1400 audit(1752713991.849:486): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.553751][ T36] audit: type=1400 audit(1752713991.869:487): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.577674][ T36] audit: type=1400 audit(1752713991.909:488): avc: denied { read write } for pid=361 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.282365][ T328] bridge_slave_1: left allmulticast mode [ 52.288021][ T328] bridge_slave_1: left promiscuous mode [ 52.293675][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.301129][ T328] bridge_slave_0: left allmulticast mode [ 52.306871][ T328] bridge_slave_0: left promiscuous mode [ 52.312503][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.414144][ T328] veth1_macvtap: left promiscuous mode [ 52.419655][ T328] veth0_vlan: left promiscuous mode [ 53.746186][ T36] kauditd_printk_skb: 225 callbacks suppressed [ 53.746202][ T36] audit: type=1400 audit(1752713997.089:714): avc: denied { execmem } for pid=972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.453156][ T36] audit: type=1400 audit(1752713997.799:715): avc: denied { execmem } for pid=973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.260047][ T36] audit: type=1400 audit(1752713998.609:716): avc: denied { execmem } for pid=974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.166951][ T36] audit: type=1400 audit(1752713999.519:717): avc: denied { execmem } for pid=975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.173904][ T36] audit: type=1400 audit(1752714000.519:718): avc: denied { execmem } for pid=976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.280829][ T36] audit: type=1400 audit(1752714001.629:719): avc: denied { execmem } for pid=977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.487769][ T36] audit: type=1400 audit(1752714002.839:720): avc: denied { execmem } for pid=978 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.794776][ T36] audit: type=1400 audit(1752714004.139:721): avc: denied { execmem } for pid=979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 62.201857][ T36] audit: type=1400 audit(1752714005.549:722): avc: denied { execmem } for pid=980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.708756][ T36] audit: type=1400 audit(1752714007.059:723): avc: denied { execmem } for pid=981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.315829][ T36] audit: type=1400 audit(1752714008.659:724): avc: denied { execmem } for pid=982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 67.022707][ T36] audit: type=1400 audit(1752714010.369:725): avc: denied { execmem } for pid=983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.830118][ T36] audit: type=1400 audit(1752714012.179:726): avc: denied { execmem } for pid=984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.737340][ T36] audit: type=1400 audit(1752714014.089:727): avc: denied { execmem } for pid=985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.744320][ T36] audit: type=1400 audit(1752714016.089:728): avc: denied { execmem } for pid=986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.766355][ T36] audit: type=1400 audit(1752714016.109:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[1990]" dev="pipefs" ino=1990 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0