syzkaller syzkaller login: [ 13.670332][ T36] kauditd_printk_skb: 31 callbacks suppressed [ 13.670360][ T36] audit: type=1400 audit(1758214742.800:59): avc: denied { transition } for pid=230 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.674860][ T36] audit: type=1400 audit(1758214742.800:60): avc: denied { noatsecure } for pid=230 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.682409][ T36] audit: type=1400 audit(1758214742.800:61): avc: denied { write } for pid=230 comm="sh" path="pipe:[1619]" dev="pipefs" ino=1619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.686063][ T36] audit: type=1400 audit(1758214742.800:62): avc: denied { rlimitinh } for pid=230 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.688943][ T36] audit: type=1400 audit(1758214742.800:63): avc: denied { siginh } for pid=230 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.16' (ED25519) to the list of known hosts. 2025/09/18 16:59:12 parsed 1 programs [ 23.238008][ T36] audit: type=1400 audit(1758214752.370:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.761133][ T36] audit: type=1400 audit(1758214753.890:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.762890][ T298] cgroup: Unknown subsys name 'net' [ 24.783832][ T36] audit: type=1400 audit(1758214753.890:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.811186][ T36] audit: type=1400 audit(1758214753.920:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.811449][ T298] cgroup: Unknown subsys name 'devices' [ 24.997962][ T298] cgroup: Unknown subsys name 'hugetlb' [ 25.003587][ T298] cgroup: Unknown subsys name 'rlimit' [ 25.127288][ T36] audit: type=1400 audit(1758214754.260:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.150570][ T36] audit: type=1400 audit(1758214754.260:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.151655][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.171156][ T36] audit: type=1400 audit(1758214754.260:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.199814][ T36] audit: type=1400 audit(1758214754.260:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.220141][ T36] audit: type=1400 audit(1758214754.260:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 25.241147][ T36] audit: type=1400 audit(1758214754.260:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.252766][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.131704][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.380021][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.387116][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.394532][ T318] bridge_slave_0: entered allmulticast mode [ 26.401118][ T318] bridge_slave_0: entered promiscuous mode [ 26.408420][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.415463][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.422565][ T318] bridge_slave_1: entered allmulticast mode [ 26.428859][ T318] bridge_slave_1: entered promiscuous mode [ 26.483353][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.490449][ T318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.497825][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.504883][ T318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.535596][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.543464][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.552601][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.559673][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.573086][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.580186][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.603613][ T318] veth0_vlan: entered promiscuous mode [ 26.614315][ T318] veth1_macvtap: entered promiscuous mode [ 26.693273][ T313] bridge_slave_1: left allmulticast mode [ 26.700426][ T313] bridge_slave_1: left promiscuous mode [ 26.706388][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.714180][ T313] bridge_slave_0: left allmulticast mode [ 26.720913][ T313] bridge_slave_0: left promiscuous mode [ 26.726788][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.844595][ T313] veth1_macvtap: left promiscuous mode [ 26.855816][ T313] veth0_vlan: left promiscuous mode 2025/09/18 16:59:16 executed programs: 0 [ 27.450484][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.457618][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.464786][ T370] bridge_slave_0: entered allmulticast mode [ 27.471235][ T370] bridge_slave_0: entered promiscuous mode [ 27.483253][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.490367][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.497633][ T370] bridge_slave_1: entered allmulticast mode [ 27.503867][ T370] bridge_slave_1: entered promiscuous mode [ 27.553437][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.560528][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.567830][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.574861][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.595481][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.602809][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.612122][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.619196][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.628297][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.635350][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.661234][ T370] veth0_vlan: entered promiscuous mode [ 27.671267][ T370] veth1_macvtap: entered promiscuous mode [ 27.698476][ T380] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 27.758056][ T380] ------------[ cut here ]------------ [ 27.763555][ T380] WARNING: CPU: 0 PID: 380 at arch/x86/kvm/lapic.c:3378 kvm_apic_accept_events+0x361/0x480 [ 27.773613][ T380] Modules linked in: [ 27.777628][ T380] CPU: 0 UID: 0 PID: 380 Comm: syz.2.17 Not tainted syzkaller #0 f314b4a7c60d1499390e62a22e4d37ca5a327e54 [ 27.789000][ T380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 27.799140][ T380] RIP: 0010:kvm_apic_accept_events+0x361/0x480 [ 27.805312][ T380] Code: 85 dd 00 00 00 41 c7 07 00 00 00 00 e9 62 fe ff ff e8 d3 74 62 00 e9 58 fe ff ff e8 c9 74 62 00 e9 4e fe ff ff e8 bf 74 62 00 <0f> 0b e9 28 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 48 fd ff [ 27.825001][ T380] RSP: 0018:ffffc90000faf4e0 EFLAGS: 00010293 [ 27.831135][ T380] RAX: ffffffff81237861 RBX: 0000000000000000 RCX: ffff888115399300 [ 27.839168][ T380] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000002 [ 27.847190][ T380] RBP: ffffc90000faf510 R08: ffff888115399307 R09: 1ffff11022a73260 [ 27.855171][ T380] R10: dffffc0000000000 R11: ffffed1022a73261 R12: dffffc0000000000 [ 27.863205][ T380] R13: ffff888114de7e00 R14: 0000000000000002 R15: 1ffff11022a42470 [ 27.871230][ T380] FS: 0000555564a34500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 27.880215][ T380] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.886887][ T380] CR2: 0000200000002000 CR3: 00000001150fa000 CR4: 00000000003526b0 [ 27.894877][ T380] Call Trace: [ 27.898204][ T380] [ 27.901180][ T380] ? vcpu_run+0x989/0x7260 [ 27.905604][ T380] vcpu_run+0xa86/0x7260 [ 27.909916][ T380] ? signal_pending+0xc0/0xc0 [ 27.914617][ T380] ? __kasan_check_write+0x18/0x20 [ 27.919786][ T380] ? xfd_validate_state+0x68/0x150 [ 27.924924][ T380] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 27.930241][ T380] ? __kasan_check_write+0x18/0x20 [ 27.935391][ T380] ? fpregs_mark_activate+0x69/0x160 [ 27.940733][ T380] ? fpu_swap_kvm_fpstate+0x44d/0x5f0 [ 27.946181][ T380] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 27.951481][ T380] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 27.957174][ T380] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 27.963212][ T380] ? vmx_vcpu_load_vmcs+0x460/0x710 [ 27.968454][ T380] ? should_fail+0xf/0x20 [ 27.972804][ T380] ? get_futex_key+0x181/0x930 [ 27.977604][ T380] ? ioctl_has_perm+0x1aa/0x4d0 [ 27.982490][ T380] ? __asan_memcpy+0x5a/0x80 [ 27.987150][ T380] ? ioctl_has_perm+0x3e0/0x4d0 [ 27.992027][ T380] ? has_cap_mac_admin+0xd0/0xd0 [ 27.997013][ T380] ? __kasan_check_write+0x18/0x20 [ 28.002170][ T380] ? mutex_lock_killable+0x92/0x1c0 [ 28.007433][ T380] ? __cfi_mutex_lock_killable+0x10/0x10 [ 28.013138][ T380] ? handle_mm_fault+0x169b/0x1b90 [ 28.018384][ T380] kvm_vcpu_ioctl+0x96f/0xee0 [ 28.023127][ T380] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 28.028403][ T380] ? do_futex+0x356/0x500 [ 28.032756][ T380] ? __cfi_do_futex+0x10/0x10 [ 28.037477][ T380] ? __se_sys_futex+0x28f/0x300 [ 28.042353][ T380] ? bpf_lsm_file_ioctl+0xd/0x20 [ 28.047345][ T380] ? security_file_ioctl+0x34/0xd0 [ 28.052494][ T380] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 28.057789][ T380] __se_sys_ioctl+0x132/0x1b0 [ 28.062496][ T380] __x64_sys_ioctl+0x7f/0xa0 [ 28.067127][ T380] x64_sys_call+0x1878/0x2ee0 [ 28.071839][ T380] do_syscall_64+0x58/0xf0 [ 28.076311][ T380] ? clear_bhb_loop+0x50/0xa0 [ 28.081018][ T380] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 28.086989][ T380] RIP: 0033:0x7fe91c78eba9 [ 28.091437][ T380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.111108][ T380] RSP: 002b:00007ffc712fe648 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 28.119637][ T380] RAX: ffffffffffffffda RBX: 00007fe91c9d5fa0 RCX: 00007fe91c78eba9 [ 28.127682][ T380] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 28.135722][ T380] RBP: 00007fe91c811e19 R08: 0000000000000000 R09: 0000000000000000 [ 28.143721][ T380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 28.151731][ T380] R13: 00007fe91c9d5fa0 R14: 00007fe91c9d5fa0 R15: 0000000000000003 [ 28.159781][ T380] [ 28.162814][ T380] ---[ end trace 0000000000000000 ]---