syzkaller syzkaller login: [ 19.167052][ T36] kauditd_printk_skb: 47 callbacks suppressed [ 19.167074][ T36] audit: type=1400 audit(1755880299.150:59): avc: denied { transition } for pid=232 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.172616][ T36] audit: type=1400 audit(1755880299.150:60): avc: denied { noatsecure } for pid=232 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.177843][ T36] audit: type=1400 audit(1755880299.150:61): avc: denied { write } for pid=232 comm="sh" path="pipe:[784]" dev="pipefs" ino=784 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 19.185246][ T36] audit: type=1400 audit(1755880299.150:62): avc: denied { rlimitinh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.205028][ T36] audit: type=1400 audit(1755880299.150:63): avc: denied { siginh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.211' (ED25519) to the list of known hosts. 2025/08/22 16:31:49 parsed 1 programs [ 29.269884][ T36] audit: type=1400 audit(1755880309.240:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 30.433958][ T36] audit: type=1400 audit(1755880310.410:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.435062][ T298] cgroup: Unknown subsys name 'net' [ 30.461516][ T36] audit: type=1400 audit(1755880310.410:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.498869][ T36] audit: type=1400 audit(1755880310.450:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.499080][ T298] cgroup: Unknown subsys name 'devices' [ 30.674361][ T298] cgroup: Unknown subsys name 'hugetlb' [ 30.680131][ T298] cgroup: Unknown subsys name 'rlimit' [ 30.840589][ T36] audit: type=1400 audit(1755880310.810:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.867965][ T36] audit: type=1400 audit(1755880310.810:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.893556][ T36] audit: type=1400 audit(1755880310.810:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.895125][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 30.927823][ T36] audit: type=1400 audit(1755880310.810:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.965497][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.967155][ T36] audit: type=1400 audit(1755880310.810:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 31.004265][ T36] audit: type=1400 audit(1755880310.810:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 32.099269][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.107525][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.116864][ T303] bridge_slave_0: entered allmulticast mode [ 32.124688][ T303] bridge_slave_0: entered promiscuous mode [ 32.135076][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.145114][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.191109][ T303] bridge_slave_1: entered allmulticast mode [ 32.204835][ T303] bridge_slave_1: entered promiscuous mode [ 32.266146][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.275918][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.285780][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.294671][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.319179][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.328628][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.345275][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.354682][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.363815][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.372603][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.401285][ T303] veth0_vlan: entered promiscuous mode [ 32.414540][ T303] veth1_macvtap: entered promiscuous mode [ 32.441462][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.503037][ T13] bridge_slave_1: left allmulticast mode [ 32.510242][ T13] bridge_slave_1: left promiscuous mode [ 32.519088][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.528736][ T13] bridge_slave_0: left allmulticast mode [ 32.535600][ T13] bridge_slave_0: left promiscuous mode [ 32.543268][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.707821][ T13] veth1_macvtap: left promiscuous mode [ 32.714656][ T13] veth0_vlan: left promiscuous mode 2025/08/22 16:31:53 executed programs: 0 [ 33.683356][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.691930][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.704985][ T370] bridge_slave_0: entered allmulticast mode [ 33.711911][ T370] bridge_slave_0: entered promiscuous mode [ 33.719236][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.727050][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.737825][ T370] bridge_slave_1: entered allmulticast mode [ 33.745176][ T370] bridge_slave_1: entered promiscuous mode [ 33.803216][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.811497][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.820185][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.829893][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.852652][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.860766][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.871930][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.880120][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.891408][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.899772][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.926634][ T370] veth0_vlan: entered promiscuous mode [ 33.940682][ T370] veth1_macvtap: entered promiscuous mode [ 34.033737][ T382] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000008: 0000 [#1] PREEMPT SMP KASAN PTI [ 34.048621][ T382] KASAN: null-ptr-deref in range [0x0000000000000040-0x0000000000000047] [ 34.059690][ T382] CPU: 0 UID: 0 PID: 382 Comm: syz.2.17 Not tainted syzkaller #0 00ad55236d4531c7fb9f608a968d4071287717d4 [ 34.072724][ T382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 34.084779][ T382] RIP: 0010:fuse_atomic_open+0x1b6/0x440 [ 34.090935][ T382] Code: 8b 6d bc 44 89 ee 83 e6 40 31 ff e8 94 83 4b ff 44 89 e8 83 e0 40 75 07 e8 47 7f 4b ff eb 25 4d 8d 6e 30 4c 89 e8 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 ef e8 bc a6 a1 ff 49 83 7d 00 00 74 26 e8 [ 34.116055][ T382] RSP: 0018:ffffc900010ff990 EFLAGS: 00010203 [ 34.125138][ T382] RAX: 0000000000000008 RBX: dffffc0000000000 RCX: 0000000000000000 [ 34.136037][ T382] RDX: ffff888113fb2600 RSI: 0000000000000040 RDI: 0000000000000000 [ 34.147899][ T382] RBP: ffffc900010ff9f0 R08: ffff888113fb2600 R09: 0000000000000002 [ 34.157842][ T382] R10: 00000000fffffffe R11: 0000000000000000 R12: ffff888115931800 [ 34.168516][ T382] R13: 0000000000000047 R14: 0000000000000017 R15: ffff88811d3c4d80 [ 34.178765][ T382] FS: 00007f84e81ca6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 34.189075][ T382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.197484][ T382] CR2: 00007f84e81c9f98 CR3: 000000011573c000 CR4: 00000000003526b0 [ 34.211870][ T382] Call Trace: [ 34.216929][ T382] [ 34.221884][ T382] ? security_inode_create+0x74/0x140 [ 34.230548][ T382] ? __cfi_fuse_atomic_open+0x10/0x10 [ 34.238509][ T382] path_openat+0x1158/0x34b0 [ 34.246828][ T382] ? do_filp_open+0x3e0/0x3e0 [ 34.254884][ T382] do_filp_open+0x1c6/0x3e0 [ 34.261001][ T382] ? __cfi_do_filp_open+0x10/0x10 [ 34.267731][ T382] ? alloc_fd+0x4e7/0x5a0 [ 34.273192][ T382] do_sys_openat2+0x12c/0x1c0 [ 34.281084][ T382] ? do_sys_open+0x100/0x100 [ 34.289297][ T382] ? __kasan_check_write+0x18/0x20 [ 34.296879][ T382] __x64_sys_creat+0x92/0xc0 [ 34.304064][ T382] x64_sys_call+0x2710/0x2ee0 [ 34.323709][ T382] do_syscall_64+0x58/0xf0 [ 34.333491][ T382] ? clear_bhb_loop+0x50/0xa0 [ 34.341160][ T382] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 34.348784][ T382] RIP: 0033:0x7f84e838ebe9 [ 34.354273][ T382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.381755][ T382] RSP: 002b:00007f84e81ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 34.393009][ T382] RAX: ffffffffffffffda RBX: 00007f84e85b6090 RCX: 00007f84e838ebe9 [ 34.407583][ T382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 34.416701][ T382] RBP: 00007f84e8411e19 R08: 0000000000000000 R09: 0000000000000000 [ 34.426502][ T382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 34.436140][ T382] R13: 00007f84e85b6128 R14: 00007f84e85b6090 R15: 00007ffce2ad9f28 [ 34.445960][ T382] [ 34.449182][ T382] Modules linked in: [ 34.453929][ T382] ---[ end trace 0000000000000000 ]--- [ 34.458696][ T36] kauditd_printk_skb: 33 callbacks suppressed [ 34.458711][ T36] audit: type=1400 audit(1755880314.430:107): avc: denied { read } for pid=92 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 34.468137][ T382] RIP: 0010:fuse_atomic_open+0x1b6/0x440 [ 34.493649][ T36] audit: type=1400 audit(1755880314.430:108): avc: denied { search } for pid=92 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.498963][ T382] Code: 8b 6d bc 44 89 ee 83 e6 40 31 ff e8 94 83 4b ff 44 89 e8 83 e0 40 75 07 e8 47 7f 4b ff eb 25 4d 8d 6e 30 4c 89 e8 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 ef e8 bc a6 a1 ff 49 83 7d 00 00 74 26 e8 [ 34.524757][ T36] audit: type=1400 audit(1755880314.430:109): avc: denied { write } for pid=92 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.548607][ T382] RSP: 0018:ffffc900010ff990 EFLAGS: 00010203 [ 34.572377][ T36] audit: type=1400 audit(1755880314.430:110): avc: denied { add_name } for pid=92 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.572749][ T382] [ 34.579000][ T36] audit: type=1400 audit(1755880314.430:111): avc: denied { create } for pid=92 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.602293][ T382] RAX: 0000000000000008 RBX: dffffc0000000000 RCX: 0000000000000000 [ 34.604944][ T36] audit: type=1400 audit(1755880314.430:112): avc: denied { append open } for pid=92 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.630002][ T382] RDX: ffff888113fb2600 RSI: 0000000000000040 RDI: 0000000000000000 [ 34.639381][ T36] audit: type=1400 audit(1755880314.430:113): avc: denied { getattr } for pid=92 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.663621][ T382] RBP: ffffc900010ff9f0 R08: ffff888113fb2600 R09: 0000000000000002 [ 34.705328][ T382] R10: 00000000fffffffe R11: 0000000000000000 R12: ffff888115931800 [ 34.714202][ T382] R13: 0000000000000047 R14: 0000000000000017 R15: ffff88811d3c4d80 [ 34.724200][ T382] FS: 00007f84e81ca6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 34.734871][ T382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.742605][ T382] CR2: 00007f84e81c9f98 CR3: 000000011573c000 CR4: 00000000003526b0 [ 34.752818][ T382] Kernel panic - not syncing: Fatal exception [ 34.800786][ T382] Kernel Offset: disabled [ 34.805781][ T382] Rebooting in 86400 seconds..