syzkaller syzkaller login: [ 16.830599][ T36] kauditd_printk_skb: 7 callbacks suppressed [ 16.830617][ T36] audit: type=1400 audit(1757756598.590:59): avc: denied { transition } for pid=232 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.835213][ T36] audit: type=1400 audit(1757756598.590:60): avc: denied { noatsecure } for pid=232 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.838579][ T36] audit: type=1400 audit(1757756598.590:61): avc: denied { write } for pid=232 comm="sh" path="pipe:[2726]" dev="pipefs" ino=2726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 16.842618][ T36] audit: type=1400 audit(1757756598.590:62): avc: denied { rlimitinh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.845897][ T36] audit: type=1400 audit(1757756598.590:63): avc: denied { siginh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.107' (ED25519) to the list of known hosts. 2025/09/13 09:43:28 parsed 1 programs [ 26.322545][ T36] audit: type=1400 audit(1757756608.080:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.366733][ T36] audit: type=1400 audit(1757756609.130:65): avc: denied { mounton } for pid=299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.367698][ T299] cgroup: Unknown subsys name 'net' [ 27.389604][ T36] audit: type=1400 audit(1757756609.130:66): avc: denied { mount } for pid=299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.416920][ T36] audit: type=1400 audit(1757756609.150:67): avc: denied { unmount } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.418121][ T299] cgroup: Unknown subsys name 'devices' [ 27.596989][ T299] cgroup: Unknown subsys name 'hugetlb' [ 27.602724][ T299] cgroup: Unknown subsys name 'rlimit' [ 27.782336][ T36] audit: type=1400 audit(1757756609.540:68): avc: denied { setattr } for pid=299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.805660][ T36] audit: type=1400 audit(1757756609.540:69): avc: denied { create } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.826139][ T36] audit: type=1400 audit(1757756609.540:70): avc: denied { write } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.846823][ T36] audit: type=1400 audit(1757756609.540:71): avc: denied { read } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.855482][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.867075][ T36] audit: type=1400 audit(1757756609.540:72): avc: denied { sys_module } for pid=299 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 27.896699][ T36] audit: type=1400 audit(1757756609.540:73): avc: denied { mounton } for pid=299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.949961][ T299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.996818][ T305] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.270253][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.277440][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.284480][ T328] bridge_slave_0: entered allmulticast mode [ 29.290992][ T328] bridge_slave_0: entered promiscuous mode [ 29.297406][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.304632][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.312118][ T328] bridge_slave_1: entered allmulticast mode [ 29.318966][ T328] bridge_slave_1: entered promiscuous mode [ 29.377233][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.384372][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.391747][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.398852][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.417570][ T319] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.424826][ T319] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.434176][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.441402][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.451554][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.458723][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.486645][ T328] veth0_vlan: entered promiscuous mode [ 29.496686][ T328] veth1_macvtap: entered promiscuous mode [ 29.555230][ T46] bridge_slave_1: left allmulticast mode [ 29.560941][ T46] bridge_slave_1: left promiscuous mode [ 29.568291][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.576411][ T46] bridge_slave_0: left allmulticast mode [ 29.582077][ T46] bridge_slave_0: left promiscuous mode [ 29.588316][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.755914][ T46] veth1_macvtap: left promiscuous mode [ 29.761601][ T46] veth0_vlan: left promiscuous mode 2025/09/13 09:43:31 executed programs: 0 [ 30.270279][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.277387][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.289393][ T372] bridge_slave_0: entered allmulticast mode [ 30.300858][ T372] bridge_slave_0: entered promiscuous mode [ 30.310883][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.317970][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.325103][ T372] bridge_slave_1: entered allmulticast mode [ 30.331353][ T372] bridge_slave_1: entered promiscuous mode [ 30.401615][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.408709][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.417890][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.425043][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.450525][ T372] veth0_vlan: entered promiscuous mode [ 30.461833][ T372] veth1_macvtap: entered promiscuous mode [ 30.491008][ T382] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 30.567784][ T382] ------------[ cut here ]------------ [ 30.573263][ T382] WARNING: CPU: 1 PID: 382 at arch/x86/kvm/x86.c:11569 kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 30.583490][ T382] Modules linked in: [ 30.587422][ T382] CPU: 1 UID: 0 PID: 382 Comm: syz.2.17 Not tainted syzkaller #0 368e5ea6f09f38000db57a3375c4613503dfaac0 [ 30.598812][ T382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 30.608954][ T382] RIP: 0010:kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 30.615425][ T382] Code: 7e 3b e8 04 0c 6a 00 49 bd 00 00 00 00 00 fc ff df 4c 8b 7c 24 20 4c 8b 64 24 40 48 8b 5c 24 28 e9 26 fd ff ff e8 e1 0b 6a 00 <0f> 0b e9 e4 fc ff ff e8 d5 0b 6a 00 0f 0b e9 0e fd ff ff e8 c9 0b [ 30.635221][ T382] RSP: 0018:ffffc90000f3f9c0 EFLAGS: 00010293 [ 30.641341][ T382] RAX: ffffffff811bd82f RBX: ffff888116520000 RCX: ffff888115763900 [ 30.649464][ T382] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 30.657671][ T382] RBP: ffffc90000f3fc70 R08: ffff888115763907 R09: 1ffff11022aec720 [ 30.665761][ T382] R10: dffffc0000000000 R11: ffffed1022aec721 R12: ffff888123f0a000 [ 30.673753][ T382] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff888116520078 [ 30.681760][ T382] FS: 000055556cd83500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 30.690753][ T382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.697371][ T382] CR2: 000000005200000c CR3: 0000000109b1a000 CR4: 00000000003526b0 [ 30.705485][ T382] Call Trace: [ 30.708788][ T382] [ 30.711727][ T382] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 30.717841][ T382] ? should_fail+0xf/0x20 [ 30.722181][ T382] ? get_futex_key+0x181/0x930 [ 30.726971][ T382] ? ioctl_has_perm+0x1aa/0x4d0 [ 30.731836][ T382] ? __asan_memcpy+0x5a/0x80 [ 30.736561][ T382] ? ioctl_has_perm+0x3e0/0x4d0 [ 30.741427][ T382] ? has_cap_mac_admin+0xd0/0xd0 [ 30.746395][ T382] ? __kasan_check_write+0x18/0x20 [ 30.751545][ T382] ? mutex_lock_killable+0x92/0x1c0 [ 30.756818][ T382] ? __cfi_mutex_lock_killable+0x10/0x10 [ 30.762474][ T382] ? file_mmap_ok+0x147/0x1a0 [ 30.767336][ T382] ? __cfi_futex_wake+0x10/0x10 [ 30.772214][ T382] ? userfaultfd_unmap_complete+0x279/0x2d0 [ 30.778210][ T382] kvm_vcpu_ioctl+0x96f/0xee0 [ 30.782912][ T382] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 30.788162][ T382] ? down_write_killable+0xe9/0x2d0 [ 30.793381][ T382] ? do_futex+0x356/0x500 [ 30.798328][ T382] ? __cfi_do_futex+0x10/0x10 [ 30.803055][ T382] ? __se_sys_futex+0x28f/0x300 [ 30.807951][ T382] ? bpf_lsm_file_ioctl+0xd/0x20 [ 30.812911][ T382] ? security_file_ioctl+0x34/0xd0 [ 30.818046][ T382] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 30.823525][ T382] __se_sys_ioctl+0x132/0x1b0 [ 30.828233][ T382] __x64_sys_ioctl+0x7f/0xa0 [ 30.833012][ T382] x64_sys_call+0x1878/0x2ee0 [ 30.837718][ T382] do_syscall_64+0x58/0xf0 [ 30.842154][ T382] ? clear_bhb_loop+0x50/0xa0 [ 30.846897][ T382] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 30.852804][ T382] RIP: 0033:0x7fbb98d8eba9 [ 30.857248][ T382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.877459][ T382] RSP: 002b:00007fffa9b330d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 30.885921][ T382] RAX: ffffffffffffffda RBX: 00007fbb98fd5fa0 RCX: 00007fbb98d8eba9 [ 30.893908][ T382] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 30.901913][ T382] RBP: 00007fbb98e11e19 R08: 0000000000000000 R09: 0000000000000000 [ 30.909991][ T382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 30.918012][ T382] R13: 00007fbb98fd5fa0 R14: 00007fbb98fd5fa0 R15: 0000000000000003 [ 30.926021][ T382] [ 30.929067][ T382] ---[ end trace 0000000000000000 ]---