syzkaller syzkaller login: [ 14.676168][ T24] kauditd_printk_skb: 48 callbacks suppressed [ 14.676180][ T24] audit: type=1400 audit(1756198113.970:59): avc: denied { transition } for pid=217 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.687690][ T24] audit: type=1400 audit(1756198113.970:60): avc: denied { noatsecure } for pid=217 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.694868][ T24] audit: type=1400 audit(1756198113.980:61): avc: denied { write } for pid=217 comm="sh" path="pipe:[1476]" dev="pipefs" ino=1476 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.715348][ T24] audit: type=1400 audit(1756198113.980:62): avc: denied { rlimitinh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.734147][ T24] audit: type=1400 audit(1756198113.980:63): avc: denied { siginh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.251' (ED25519) to the list of known hosts. 2025/08/26 08:48:50 parsed 1 programs [ 31.504639][ T24] audit: type=1400 audit(1756198130.800:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 31.525974][ T24] audit: type=1400 audit(1756198130.800:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.546093][ T24] audit: type=1400 audit(1756198130.800:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 32.205920][ T24] audit: type=1400 audit(1756198131.500:67): avc: denied { mounton } for pid=284 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 32.206910][ T284] cgroup: Unknown subsys name 'net' [ 32.228915][ T24] audit: type=1400 audit(1756198131.500:68): avc: denied { mount } for pid=284 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.256489][ T24] audit: type=1400 audit(1756198131.530:69): avc: denied { unmount } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.257097][ T284] cgroup: Unknown subsys name 'devices' [ 32.488550][ T284] cgroup: Unknown subsys name 'hugetlb' [ 32.494315][ T284] cgroup: Unknown subsys name 'rlimit' [ 32.725611][ T24] audit: type=1400 audit(1756198132.020:70): avc: denied { setattr } for pid=284 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 32.748823][ T24] audit: type=1400 audit(1756198132.020:71): avc: denied { create } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.769457][ T24] audit: type=1400 audit(1756198132.020:72): avc: denied { write } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.778262][ T286] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 32.789826][ T24] audit: type=1400 audit(1756198132.020:73): avc: denied { read } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.894738][ T284] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.383811][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 33.393688][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 33.862535][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.870166][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.877595][ T331] device bridge_slave_0 entered promiscuous mode [ 33.885274][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.892347][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.899849][ T331] device bridge_slave_1 entered promiscuous mode [ 33.933465][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.940714][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.948023][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.955126][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.971699][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.980530][ T325] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.987768][ T325] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.997924][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.006373][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.013560][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.022110][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.030512][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.037576][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.048730][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.057875][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.070984][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.081475][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.090079][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.097633][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.105832][ T331] device veth0_vlan entered promiscuous mode [ 34.114963][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.123918][ T331] device veth1_macvtap entered promiscuous mode [ 34.132573][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.142585][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/08/26 08:48:53 executed programs: 0 [ 34.462559][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.470524][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.478138][ T353] device bridge_slave_0 entered promiscuous mode [ 34.485201][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.492432][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.499906][ T353] device bridge_slave_1 entered promiscuous mode [ 34.534687][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.541759][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.549036][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.556318][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.577784][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.585458][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.593020][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.606392][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.614938][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.621971][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.630728][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.638981][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.647230][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.654343][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.670670][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.678843][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.691615][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.699624][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.711824][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 34.720262][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.738207][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 34.746199][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.754668][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.762341][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.770602][ T353] device veth0_vlan entered promiscuous mode [ 34.781990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 34.790475][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.800507][ T353] device veth1_macvtap entered promiscuous mode [ 34.818684][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.826655][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.835431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.844435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.852997][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.567543][ T9] device bridge_slave_1 left promiscuous mode [ 35.574129][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.581672][ T9] device bridge_slave_0 left promiscuous mode [ 35.588305][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.596196][ T9] device veth1_macvtap left promiscuous mode [ 35.602301][ T9] device veth0_vlan left promiscuous mode [ 36.550298][ T24] kauditd_printk_skb: 131 callbacks suppressed [ 36.550310][ T24] audit: type=1400 audit(1756198135.850:205): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.580684][ T24] audit: type=1400 audit(1756198135.850:206): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.605439][ T24] audit: type=1400 audit(1756198135.860:207): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.632812][ T24] audit: type=1400 audit(1756198135.930:208): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.657156][ T24] audit: type=1400 audit(1756198135.930:209): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.681627][ T24] audit: type=1400 audit(1756198135.940:210): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.705631][ T24] audit: type=1400 audit(1756198135.990:211): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.729637][ T24] audit: type=1400 audit(1756198135.990:212): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.753712][ T24] audit: type=1400 audit(1756198135.990:213): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.777955][ T24] audit: type=1400 audit(1756198136.030:214): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.600463][ T24] kauditd_printk_skb: 291 callbacks suppressed [ 41.600475][ T24] audit: type=1400 audit(1756198140.900:506): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.631269][ T24] audit: type=1400 audit(1756198140.900:507): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.655629][ T24] audit: type=1400 audit(1756198140.910:508): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.679827][ T24] audit: type=1400 audit(1756198140.950:509): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.704337][ T24] audit: type=1400 audit(1756198140.950:510): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.728712][ T24] audit: type=1400 audit(1756198140.950:511): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.755293][ T24] audit: type=1400 audit(1756198141.060:512): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.779666][ T24] audit: type=1400 audit(1756198141.060:513): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.804230][ T24] audit: type=1400 audit(1756198141.060:514): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.828938][ T24] audit: type=1400 audit(1756198141.110:515): avc: denied { read write } for pid=353 comm="syz-executor" name="loop2" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.947455][ T9] device bridge_slave_1 left promiscuous mode [ 45.953587][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.961158][ T9] device bridge_slave_0 left promiscuous mode [ 45.967391][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.975051][ T9] device veth1_macvtap left promiscuous mode [ 45.981165][ T9] device veth0_vlan left promiscuous mode [ 47.250190][ T24] kauditd_printk_skb: 199 callbacks suppressed [ 47.250200][ T24] audit: type=1400 audit(1756198146.550:715): avc: denied { execmem } for pid=1006 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.056187][ T24] audit: type=1400 audit(1756198147.360:716): avc: denied { execmem } for pid=1007 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 48.962231][ T24] audit: type=1400 audit(1756198148.260:717): avc: denied { execmem } for pid=1008 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 49.968271][ T24] audit: type=1400 audit(1756198149.270:718): avc: denied { execmem } for pid=1009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 51.074197][ T24] audit: type=1400 audit(1756198150.370:719): avc: denied { execmem } for pid=1010 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.280267][ T24] audit: type=1400 audit(1756198151.580:720): avc: denied { execmem } for pid=1011 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.586362][ T24] audit: type=1400 audit(1756198152.890:721): avc: denied { execmem } for pid=1012 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.993326][ T24] audit: type=1400 audit(1756198154.290:722): avc: denied { execmem } for pid=1013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.519043][ T24] audit: type=1400 audit(1756198155.820:723): avc: denied { execmem } for pid=1014 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 58.125128][ T24] audit: type=1400 audit(1756198157.420:724): avc: denied { execmem } for pid=1015 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.831225][ T24] audit: type=1400 audit(1756198159.130:725): avc: denied { execmem } for pid=1016 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.637250][ T24] audit: type=1400 audit(1756198160.940:726): avc: denied { execmem } for pid=1017 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.543233][ T24] audit: type=1400 audit(1756198162.840:727): avc: denied { execmem } for pid=1018 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.549330][ T24] audit: type=1400 audit(1756198164.850:728): avc: denied { execmem } for pid=1019 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 65.572117][ T24] audit: type=1400 audit(1756198164.870:729): avc: denied { write } for pid=275 comm="syz-execprog" path="pipe:[1555]" dev="pipefs" ino=1555 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0