Warning: Permanently added '10.128.1.162' (ED25519) to the list of known hosts. 2025/05/25 00:30:09 ignoring optional flag "sandboxArg"="0" 2025/05/25 00:30:10 parsed 1 programs [ 21.826799][ T23] audit: type=1400 audit(1748133010.900:81): avc: denied { node_bind } for pid=335 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 22.622774][ T23] audit: type=1400 audit(1748133011.700:82): avc: denied { mounton } for pid=343 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.624513][ T343] cgroup1: Unknown subsys name 'net' [ 22.645603][ T23] audit: type=1400 audit(1748133011.700:83): avc: denied { mount } for pid=343 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.651164][ T343] cgroup1: Unknown subsys name 'net_prio' [ 22.679280][ T343] cgroup1: Unknown subsys name 'devices' [ 22.685919][ T23] audit: type=1400 audit(1748133011.760:84): avc: denied { unmount } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.882397][ T343] cgroup1: Unknown subsys name 'hugetlb' [ 22.888193][ T343] cgroup1: Unknown subsys name 'rlimit' [ 23.088402][ T23] audit: type=1400 audit(1748133012.160:85): avc: denied { setattr } for pid=343 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=10048 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.111790][ T23] audit: type=1400 audit(1748133012.160:86): avc: denied { create } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.132511][ T23] audit: type=1400 audit(1748133012.160:87): avc: denied { write } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.139881][ T346] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.153222][ T23] audit: type=1400 audit(1748133012.160:88): avc: denied { read } for pid=343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.182072][ T23] audit: type=1400 audit(1748133012.170:89): avc: denied { module_request } for pid=343 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 23.204243][ T23] audit: type=1400 audit(1748133012.170:90): avc: denied { mounton } for pid=343 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.258884][ T343] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.605617][ T348] request_module fs-gadgetfs succeeded, but still no fs? [ 23.981167][ T372] syz-executor (372) used greatest stack depth: 22848 bytes left [ 24.248600][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.255715][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.263525][ T396] device bridge_slave_0 entered promiscuous mode [ 24.270516][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.277535][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.285070][ T396] device bridge_slave_1 entered promiscuous mode [ 24.324091][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.331152][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.338414][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.345916][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.366986][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.374717][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.382190][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.391993][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.400415][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.407531][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.416775][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.425156][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.432242][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.446028][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.456006][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.471301][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.482870][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.496141][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.508851][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.523164][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.554952][ T396] syz-executor (396) used greatest stack depth: 21088 bytes left 2025/05/25 00:30:13 executed programs: 0 [ 24.776771][ T412] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.784226][ T412] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.791701][ T412] device bridge_slave_0 entered promiscuous mode [ 24.802468][ T412] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.809608][ T412] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.817144][ T412] device bridge_slave_1 entered promiscuous mode [ 24.862443][ T412] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.869496][ T412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.876807][ T412] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.884450][ T412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.908590][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.916223][ T102] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.923472][ T102] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.933057][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.942266][ T102] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.949424][ T102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.962500][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.971180][ T102] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.978209][ T102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.996522][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.004732][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.013445][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.021821][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.042214][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.060329][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.068736][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.078100][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.092304][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.110351][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.126271][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.134721][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.155314][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.164176][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.870625][ T9] device bridge_slave_1 left promiscuous mode [ 25.876824][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.884763][ T9] device bridge_slave_0 left promiscuous mode [ 25.890991][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.833394][ T23] kauditd_printk_skb: 233 callbacks suppressed [ 26.833407][ T23] audit: type=1400 audit(1748133015.910:324): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 25 00:30:15 [ 26.864582][ T23] audit: type=1400 audit(1748133015.940:325): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 26.887573][ T23] audit: type=1400 audit(1748133015.940:326): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ [ 26.910779][ T23] audit: type=1400 audit(1748133015.940:327): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 26.833394][ T2[ 26.910801][ T23] audit: type=1400 audit(1748133015.950:328): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 3] kauditd_print[ 26.910820][ T23] audit: type=1400 audit(1748133015.950:329): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 k_skb: 233 callb[ 26.910838][ T23] audit: type=1400 audit(1748133015.960:330): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 26.941387][ T23] audit: type=1400 audit(1748133016.010:331): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 25 00:30:15 syzkaller kern.[ 27.039467][ T23] audit: type=1400 audit(1748133016.110:332): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [[ 27.061946][ T23] audit: type=1400 audit(1748133016.110:333): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 26.833407][ T23] audit: type=1400 audit(1748133015.910:324): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixe May 25 00:30:15 syzkaller kern.notice kernel: [ 26.864582][ T23] audit: type=1400 audit(1748133015.940:325): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:15 syzkaller kern.notice kernel: [ 26.887573][ T23] audit: type=1400 audit(1748133015.940:326): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:16 syzkaller kern.notice kernel: [ 26.910779][ T23] audit: type=1400 audit(1748133015.940:327): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixe May 25 00:30:16 syzkaller kern.notice kernel: [ 26.910801][ T23] audit: type=1400 audit(1748133015.950:328): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixe May 25 00:30:16 syzkaller kern.notice kernel: [ 26.910820][ T23] audit: type=1400 audit(1748133015.950:329): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixe May 25 00:30:16 syzkaller kern.notice kernel: [ 26.910838][ T23] audit: type=1400 audit(1748133015.960:330): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:16 syzkaller kern.notice kernel: [ 26.941387][ T23] audit: type=1400 audit(1748133016.010:331): avc: denied { read write } for pid=412 comm="syz-executor" name="loop2" dev="devtmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixe May 25 00:30:16 syzkaller kern.notice kernel: [ 27.039467][ T23] audit: type=1400 audit(1748133016.110:332): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:16 syzkaller kern.notice kernel: [ 27.061946][ T23] audit: type=1400 audit(1748133016.110:333): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln [ 31.130275][ T9] device bridge_slave_1 left promiscuous mode [ 31.136438][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.143971][ T9] device bridge_slave_0 left promiscuous mode May 25 00:30:20 [ 31.150339][ T9] bridge0: port 1(bridge_slave_0) entered disabled state syzkaller kern.info kernel: [ 31.130275][ T9] device bridge_slave_1 left promiscuous mode May 25 00:30:20 syzkaller kern.info kernel: [ 31.136438][ T9] bridge0: port 2(bridge_slave_1) entered disabled state May 25 00:30:20 syzkaller kern.info kernel: [ 31.143971][ T9] device bridge_slave_0 left promiscuous mode May 25 00:30:20 syzkaller kern.info kernel: [ 31.150339][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.411271][ T23] kauditd_printk_skb: 411 callbacks suppressed [ 32.411282][ T23] audit: type=1400 audit(1748133021.490:745): avc: denied { execmem } for pid=1042 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 32.437084][ T23] audit: type=1400 audit(1748133021.510:746): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 25 00:30:21 [ 32.459799][ T23] audit: type=1400 audit(1748133021.540:747): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 32.483160][ T23] audit: type=1400 audit(1748133021.560:748): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ [ 32.506807][ T23] audit: type=1400 audit(1748133021.580:749): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 32.411271][ T2[ 32.530123][ T23] audit: type=1400 audit(1748133021.610:750): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3] kauditd_print[ 32.553314][ T23] audit: type=1400 audit(1748133021.630:751): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 411 callb[ 32.576588][ T23] audit: type=1400 audit(1748133021.650:752): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 32.599707][ T23] audit: type=1400 audit(1748133021.670:753): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 25 00:30:21[ 32.622974][ T23] audit: type=1400 audit(1748133021.700:754): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 32.411282][ T23] audit: type=1400 audit(1748133021.490:745): avc: denied { execmem } for pid=1042 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 25 00:30:21 syzkaller kern.notice kernel: [ 32.437084][ T23] audit: type=1400 audit(1748133021.510:746): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:21 syzkaller kern.notice kernel: [ 32.459799][ T23] audit: type=1400 audit(1748133021.540:747): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:21 syzkaller kern.notice kernel: [ 32.483160][ T23] audit: type=1400 audit(1748133021.560:748): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:21 syzkaller kern.notice kernel: [ 32.506807][ T23] audit: type=1400 audit(1748133021.580:749): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:21 syzkaller kern.notice kernel: [ 32.530123][ T23] audit: type=1400 audit(1748133021.610:750): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:21 syzkaller kern.notice kernel: [ 32.553314][ T23] audit: type=1400 audit(1748133021.630:751): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:21 syzkaller kern.notice kernel: [ 32.576588][ T23] audit: type=1400 audit(1748133021.650:752): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:21 syzkaller kern.notice kernel: [ 32.599707][ T23] audit: type=1400 audit(1748133021.670:753): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:21 syzkaller kern.notice kernel: [ 32.622974][ T23] audit: type=1400 audit(1748133021.700:754): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln [ 37.444447][ T23] kauditd_printk_skb: 6 callbacks suppressed [ 37.444459][ T23] audit: type=1400 audit(1748133026.520:761): avc: denied { execmem } for pid=1047 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 37.469818][ T23] audit: type=1400 audit(1748133026.530:762): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 25 00:30:26 [ 37.492494][ T23] audit: type=1400 audit(1748133026.570:763): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 37.515793][ T23] audit: type=1400 audit(1748133026.590:764): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ [ 37.539017][ T23] audit: type=1400 audit(1748133026.620:765): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 37.444447][ T2[ 37.562208][ T23] audit: type=1400 audit(1748133026.640:766): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3] kauditd_print[ 37.585454][ T23] audit: type=1400 audit(1748133026.660:767): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 6 callbac[ 37.608641][ T23] audit: type=1400 audit(1748133026.680:768): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed M[ 37.631875][ T23] audit: type=1400 audit(1748133026.710:769): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ay 25 00:30:26 s[ 37.655036][ T23] audit: type=1400 audit(1748133026.730:770): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 37.444459][ T23] audit: type=1400 audit(1748133026.520:761): avc: denied { execmem } for pid=1047 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 25 00:30:26 syzkaller kern.notice kernel: [ 37.469818][ T23] audit: type=1400 audit(1748133026.530:762): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:26 syzkaller kern.notice kernel: [ 37.492494][ T23] audit: type=1400 audit(1748133026.570:763): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:26 syzkaller kern.notice kernel: [ 37.515793][ T23] audit: type=1400 audit(1748133026.590:764): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:26 syzkaller kern.notice kernel: [ 37.539017][ T23] audit: type=1400 audit(1748133026.620:765): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:26 syzkaller kern.notice kernel: [ 37.562208][ T23] audit: type=1400 audit(1748133026.640:766): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:26 syzkaller kern.notice kernel: [ 37.585454][ T23] audit: type=1400 audit(1748133026.660:767): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:26 syzkaller kern.notice kernel: [ 37.608641][ T23] audit: type=1400 audit(1748133026.680:768): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:26 syzkaller kern.notice kernel: [ 37.631875][ T23] audit: type=1400 audit(1748133026.710:769): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:26 syzkaller kern.notice kernel: [ 37.655036][ T23] audit: type=1400 audit(1748133026.730:770): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln [ 43.271253][ T23] kauditd_printk_skb: 5 callbacks suppressed [ 43.271265][ T23] audit: type=1400 audit(1748133032.350:776): avc: denied { execmem } for pid=1051 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 43.296986][ T23] audit: type=1400 audit(1748133032.370:777): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 25 00:30:32 [ 43.319242][ T23] audit: type=1400 audit(1748133032.400:778): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 43.342770][ T23] audit: type=1400 audit(1748133032.420:779): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ [ 43.366097][ T23] audit: type=1400 audit(1748133032.440:780): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 43.271253][ T2[ 43.389267][ T23] audit: type=1400 audit(1748133032.470:781): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3] kauditd_print[ 43.412537][ T23] audit: type=1400 audit(1748133032.490:782): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 5 callbac[ 43.435675][ T23] audit: type=1400 audit(1748133032.510:783): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed M[ 43.458864][ T23] audit: type=1400 audit(1748133032.540:784): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ay 25 00:30:32 s[ 43.482248][ T23] audit: type=1400 audit(1748133032.560:785): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 43.271265][ T23] audit: type=1400 audit(1748133032.350:776): avc: denied { execmem } for pid=1051 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 25 00:30:32 syzkaller kern.notice kernel: [ 43.296986][ T23] audit: type=1400 audit(1748133032.370:777): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:32 syzkaller kern.notice kernel: [ 43.319242][ T23] audit: type=1400 audit(1748133032.400:778): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:32 syzkaller kern.notice kernel: [ 43.342770][ T23] audit: type=1400 audit(1748133032.420:779): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:32 syzkaller kern.notice kernel: [ 43.366097][ T23] audit: type=1400 audit(1748133032.440:780): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:32 syzkaller kern.notice kernel: [ 43.389267][ T23] audit: type=1400 audit(1748133032.470:781): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:32 syzkaller kern.notice kernel: [ 43.412537][ T23] audit: type=1400 audit(1748133032.490:782): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:32 syzkaller kern.notice kernel: [ 43.435675][ T23] audit: type=1400 audit(1748133032.510:783): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:32 syzkaller kern.notice kernel: [ 43.458864][ T23] audit: type=1400 audit(1748133032.540:784): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:32 syzkaller kern.notice kernel: [ 43.482248][ T23] audit: type=1400 audit(1748133032.560:785): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln [ 48.691620][ T23] kauditd_printk_skb: 4 callbacks suppressed [ 48.691631][ T23] audit: type=1400 audit(1748133037.770:790): avc: denied { execmem } for pid=1054 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.717616][ T23] audit: type=1400 audit(1748133037.790:791): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 25 00:30:37 [ 48.739927][ T23] audit: type=1400 audit(1748133037.820:792): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 48.763530][ T23] audit: type=1400 audit(1748133037.840:793): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ [ 48.786671][ T23] audit: type=1400 audit(1748133037.860:794): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 48.691620][ T2[ 48.810057][ T23] audit: type=1400 audit(1748133037.890:795): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3] kauditd_print[ 48.833174][ T23] audit: type=1400 audit(1748133037.910:796): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 4 callbac[ 48.856717][ T23] audit: type=1400 audit(1748133037.930:797): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed M[ 48.879878][ T23] audit: type=1400 audit(1748133037.950:798): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ay 25 00:30:37 s[ 48.902931][ T23] audit: type=1400 audit(1748133037.980:799): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 48.691631][ T23] audit: type=1400 audit(1748133037.770:790): avc: denied { execmem } for pid=1054 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 25 00:30:37 syzkaller kern.notice kernel: [ 48.717616][ T23] audit: type=1400 audit(1748133037.790:791): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:37 syzkaller kern.notice kernel: [ 48.739927][ T23] audit: type=1400 audit(1748133037.820:792): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:37 syzkaller kern.notice kernel: [ 48.763530][ T23] audit: type=1400 audit(1748133037.840:793): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:37 syzkaller kern.notice kernel: [ 48.786671][ T23] audit: type=1400 audit(1748133037.860:794): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:37 syzkaller kern.notice kernel: [ 48.810057][ T23] audit: type=1400 audit(1748133037.890:795): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:37 syzkaller kern.notice kernel: [ 48.833174][ T23] audit: type=1400 audit(1748133037.910:796): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:37 syzkaller kern.notice kernel: [ 48.856717][ T23] audit: type=1400 audit(1748133037.930:797): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:37 syzkaller kern.notice kernel: [ 48.879878][ T23] audit: type=1400 audit(1748133037.950:798): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:38 syzkaller kern.notice kernel: [ 48.902931][ T23] audit: type=1400 audit(1748133037.980:799): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=ln May 25 00:30:39 syzkaller auth.info sshd[333]: Received disconnect from 10.128.0.163 port 39058:11: disconnected by user May 25 00:30:39 syzkaller auth.info sshd[333]: Disconnected from user root 10.128.0.163 port 39058