syzkaller syzkaller login: [ 14.414962][ T36] kauditd_printk_skb: 27 callbacks suppressed [ 14.414981][ T36] audit: type=1400 audit(1754970128.690:59): avc: denied { transition } for pid=231 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.419458][ T36] audit: type=1400 audit(1754970128.690:60): avc: denied { noatsecure } for pid=231 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.422582][ T36] audit: type=1400 audit(1754970128.690:61): avc: denied { write } for pid=231 comm="sh" path="pipe:[3142]" dev="pipefs" ino=3142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.426016][ T36] audit: type=1400 audit(1754970128.690:62): avc: denied { rlimitinh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.428834][ T36] audit: type=1400 audit(1754970128.690:63): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.150' (ED25519) to the list of known hosts. 2025/08/12 03:42:30 ignoring optional flag "sandboxArg"="0" 2025/08/12 03:42:31 parsed 1 programs [ 36.921997][ T36] audit: type=1400 audit(1754970151.190:64): avc: denied { node_bind } for pid=289 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 38.393937][ T36] audit: type=1400 audit(1754970152.660:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.395385][ T297] cgroup: Unknown subsys name 'net' [ 38.416848][ T36] audit: type=1400 audit(1754970152.670:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.444129][ T36] audit: type=1400 audit(1754970152.690:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.444363][ T297] cgroup: Unknown subsys name 'devices' [ 38.646615][ T297] cgroup: Unknown subsys name 'hugetlb' [ 38.652258][ T297] cgroup: Unknown subsys name 'rlimit' [ 38.836709][ T36] audit: type=1400 audit(1754970153.110:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.860081][ T36] audit: type=1400 audit(1754970153.110:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.880554][ T36] audit: type=1400 audit(1754970153.110:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.891896][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 38.900945][ T36] audit: type=1400 audit(1754970153.110:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.929806][ T36] audit: type=1400 audit(1754970153.110:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 38.951172][ T36] audit: type=1400 audit(1754970153.110:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.980024][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 39.856717][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 40.537346][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.544456][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.551519][ T340] bridge_slave_0: entered allmulticast mode [ 40.557899][ T340] bridge_slave_0: entered promiscuous mode [ 40.564632][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.571689][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.578903][ T340] bridge_slave_1: entered allmulticast mode [ 40.585345][ T340] bridge_slave_1: entered promiscuous mode [ 40.643561][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.650774][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.658169][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.665248][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.694595][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.701880][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.711215][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.718299][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.728322][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.735419][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.761741][ T340] veth0_vlan: entered promiscuous mode [ 40.772178][ T340] veth1_macvtap: entered promiscuous mode [ 40.826950][ T46] bridge_slave_1: left allmulticast mode [ 40.832651][ T46] bridge_slave_1: left promiscuous mode [ 40.838686][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.846978][ T46] bridge_slave_0: left allmulticast mode [ 40.852654][ T46] bridge_slave_0: left promiscuous mode [ 40.858597][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.996573][ T46] veth1_macvtap: left promiscuous mode [ 41.002172][ T46] veth0_vlan: left promiscuous mode 2025/08/12 03:42:35 executed programs: 0 [ 41.358594][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.365750][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.372818][ T371] bridge_slave_0: entered allmulticast mode [ 41.379254][ T371] bridge_slave_0: entered promiscuous mode [ 41.385725][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.392992][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.400153][ T371] bridge_slave_1: entered allmulticast mode [ 41.406704][ T371] bridge_slave_1: entered promiscuous mode [ 41.490341][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.497436][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.504847][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.511891][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.532643][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.539940][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.550545][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.557627][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.567021][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.574084][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.600568][ T371] veth0_vlan: entered promiscuous mode [ 41.611618][ T371] veth1_macvtap: entered promiscuous mode [ 41.948715][ T36] kauditd_printk_skb: 50 callbacks suppressed [ 41.948733][ T36] audit: type=1400 audit(1754970156.220:124): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.979062][ T36] audit: type=1400 audit(1754970156.230:125): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.003256][ T36] audit: type=1400 audit(1754970156.230:126): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.027280][ T36] audit: type=1400 audit(1754970156.280:127): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.051775][ T36] audit: type=1400 audit(1754970156.290:128): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.076019][ T36] audit: type=1400 audit(1754970156.300:129): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.100202][ T36] audit: type=1400 audit(1754970156.350:130): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.124677][ T36] audit: type=1400 audit(1754970156.370:131): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.148717][ T36] audit: type=1400 audit(1754970156.370:132): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.172779][ T36] audit: type=1400 audit(1754970156.400:133): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.959440][ T36] kauditd_printk_skb: 288 callbacks suppressed [ 46.959457][ T36] audit: type=1400 audit(1754970161.230:422): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.989877][ T36] audit: type=1400 audit(1754970161.240:423): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.013888][ T36] audit: type=1400 audit(1754970161.280:424): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.037846][ T36] audit: type=1400 audit(1754970161.310:425): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.062110][ T36] audit: type=1400 audit(1754970161.310:426): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.086438][ T36] audit: type=1400 audit(1754970161.310:427): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.115337][ T36] audit: type=1400 audit(1754970161.390:428): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.139634][ T36] audit: type=1400 audit(1754970161.390:429): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.166090][ T36] audit: type=1400 audit(1754970161.440:430): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.193639][ T36] audit: type=1400 audit(1754970161.470:431): avc: denied { read write } for pid=371 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.851430][ T46] bridge_slave_1: left allmulticast mode [ 51.857175][ T46] bridge_slave_1: left promiscuous mode [ 51.862803][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.870394][ T46] bridge_slave_0: left allmulticast mode [ 51.876117][ T46] bridge_slave_0: left promiscuous mode [ 51.881740][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.007292][ T46] veth1_macvtap: left promiscuous mode [ 52.012832][ T46] veth0_vlan: left promiscuous mode [ 52.229736][ T36] kauditd_printk_skb: 280 callbacks suppressed [ 52.229754][ T36] audit: type=1400 audit(1754970166.500:712): avc: denied { execmem } for pid=987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.738592][ T36] audit: type=1400 audit(1754970167.010:713): avc: denied { execmem } for pid=988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 53.347330][ T36] audit: type=1400 audit(1754970167.620:714): avc: denied { execmem } for pid=989 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.056061][ T36] audit: type=1400 audit(1754970168.330:715): avc: denied { execmem } for pid=990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 54.865135][ T36] audit: type=1400 audit(1754970169.140:716): avc: denied { execmem } for pid=991 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 55.773984][ T36] audit: type=1400 audit(1754970170.040:717): avc: denied { execmem } for pid=992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 56.782651][ T36] audit: type=1400 audit(1754970171.050:718): avc: denied { execmem } for pid=993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 57.891347][ T36] audit: type=1400 audit(1754970172.160:719): avc: denied { execmem } for pid=994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 59.100142][ T36] audit: type=1400 audit(1754970173.370:720): avc: denied { execmem } for pid=995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.409020][ T36] audit: type=1400 audit(1754970174.680:721): avc: denied { execmem } for pid=996 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 61.817687][ T36] audit: type=1400 audit(1754970176.090:722): avc: denied { execmem } for pid=997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.326298][ T36] audit: type=1400 audit(1754970177.600:723): avc: denied { execmem } for pid=998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.935159][ T36] audit: type=1400 audit(1754970179.210:724): avc: denied { execmem } for pid=999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 66.643781][ T36] audit: type=1400 audit(1754970180.910:725): avc: denied { execmem } for pid=1000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.452642][ T36] audit: type=1400 audit(1754970182.720:726): avc: denied { execmem } for pid=1001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.361356][ T36] audit: type=1400 audit(1754970184.630:727): avc: denied { execmem } for pid=1002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.370093][ T36] audit: type=1400 audit(1754970186.640:728): avc: denied { execmem } for pid=1003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 72.393366][ T36] audit: type=1400 audit(1754970186.660:729): avc: denied { write } for pid=289 comm="syz-execprog" path="pipe:[2306]" dev="pipefs" ino=2306 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0