scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.744254][ T30] audit: type=1400 audit(1767513869.192:63): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.156' (ED25519) to the list of known hosts. 2026/01/04 08:04:38 parsed 1 programs [ 21.663793][ T30] audit: type=1400 audit(1767513878.122:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.667303][ T30] audit: type=1400 audit(1767513878.122:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 22.280645][ T30] audit: type=1400 audit(1767513878.732:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.281741][ T290] cgroup: Unknown subsys name 'net' [ 22.303291][ T30] audit: type=1400 audit(1767513878.742:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.330556][ T30] audit: type=1400 audit(1767513878.762:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.330754][ T290] cgroup: Unknown subsys name 'devices' [ 22.502454][ T290] cgroup: Unknown subsys name 'hugetlb' [ 22.508046][ T290] cgroup: Unknown subsys name 'rlimit' [ 22.709787][ T30] audit: type=1400 audit(1767513879.162:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.732978][ T30] audit: type=1400 audit(1767513879.162:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.738608][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.753579][ T30] audit: type=1400 audit(1767513879.162:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.782335][ T30] audit: type=1400 audit(1767513879.162:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.803327][ T30] audit: type=1400 audit(1767513879.172:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.831637][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.226347][ T294] request_module fs-gadgetfs succeeded, but still no fs? [ 23.667394][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.674682][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.682083][ T326] device bridge_slave_0 entered promiscuous mode [ 23.688857][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.696034][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.703313][ T326] device bridge_slave_1 entered promiscuous mode [ 23.740306][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.747361][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.754634][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.761677][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.777506][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.784798][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.792245][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.799840][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.815061][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.823314][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.830323][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.837783][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.846031][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.853067][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.861345][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.872286][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.885561][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.896002][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.904248][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.911901][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.919936][ T326] device veth0_vlan entered promiscuous mode [ 23.930256][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.939172][ T326] device veth1_macvtap entered promiscuous mode [ 23.948431][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.957909][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.987297][ T326] syz-executor (326) used greatest stack depth: 21312 bytes left 2026/01/04 08:04:40 executed programs: 0 [ 24.311796][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.318819][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.326340][ T363] device bridge_slave_0 entered promiscuous mode [ 24.333314][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.340378][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.347753][ T363] device bridge_slave_1 entered promiscuous mode [ 24.387503][ T363] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.394559][ T363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.401827][ T363] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.408842][ T363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.429888][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.437483][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.444842][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.458139][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.466477][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.473501][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.482026][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.490261][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.497300][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.508142][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.517445][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.532734][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.543281][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.551499][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.558850][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.569618][ T363] device veth0_vlan entered promiscuous mode [ 24.578785][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.587751][ T363] device veth1_macvtap entered promiscuous mode [ 24.596692][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.611508][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.633461][ T373] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 24.662326][ T373] general protection fault, probably for non-canonical address 0xe06ff51e0005ac00: 0000 [#1] PREEMPT SMP KASAN [ 24.674064][ T373] KASAN: maybe wild-memory-access in range [0x037fc8f0002d6000-0x037fc8f0002d6007] [ 24.683344][ T373] CPU: 1 PID: 373 Comm: syz.2.17 Not tainted syzkaller #0 [ 24.690453][ T373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 24.700492][ T373] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 24.706380][ T373] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 5a 91 4f 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 f4 13 8e 00 4c 8b 33 31 ff 4c 89 [ 24.725966][ T373] RSP: 0018:ffffc90000c27898 EFLAGS: 00010206 [ 24.732014][ T373] RAX: 006ff91e0005ac00 RBX: 037fc8f0002d6000 RCX: ffff88810de8a780 [ 24.739958][ T373] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f0002d6000 [ 24.747902][ T373] RBP: ffffc90000c278d8 R08: 0000000000000004 R09: 0000000000000003 [ 24.755851][ T373] R10: fffff52000184f28 R11: 1ffff92000184f28 R12: 0000000000000001 [ 24.763809][ T373] R13: 037fc8f0002d6000 R14: dffffc0000000000 R15: ffff88811e1f0348 [ 24.771759][ T373] FS: 0000555567297500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 24.780671][ T373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.787239][ T373] CR2: 0000200000c42000 CR3: 000000011e675000 CR4: 00000000003526a0 [ 24.795198][ T373] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.803153][ T373] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.811109][ T373] Call Trace: [ 24.814424][ T373] [ 24.817333][ T373] ? futex_wake+0x600/0x8e0 [ 24.821823][ T373] ? id_to_memslot+0xb7/0x130 [ 24.826478][ T373] kvm_mmu_slot_gfn_write_protect+0x14a/0x270 [ 24.832954][ T373] kvm_arch_mmu_enable_log_dirty_pt_masked+0x10c/0x3d0 [ 24.839783][ T373] kvm_reset_dirty_gfn+0x19d/0x210 [ 24.844871][ T373] kvm_dirty_ring_reset+0x4a9/0x620 [ 24.850078][ T373] ? __mutex_lock_slowpath+0x10/0x10 [ 24.855348][ T373] kvm_vm_ioctl_reset_dirty_pages+0x1a3/0x3b0 [ 24.861436][ T373] kvm_vm_ioctl+0x385/0xa80 [ 24.865919][ T373] ? kvm_device_release+0x220/0x220 [ 24.871093][ T373] ? memcpy+0x56/0x70 [ 24.875063][ T373] ? ioctl_has_perm+0x3eb/0x4d0 [ 24.879897][ T373] ? has_cap_mac_admin+0x330/0x330 [ 24.884985][ T373] ? slab_free_freelist_hook+0xc2/0x190 [ 24.890510][ T373] ? up_read+0x56/0x1d0 [ 24.894637][ T373] ? do_user_addr_fault+0xa64/0x1180 [ 24.899893][ T373] ? selinux_file_ioctl+0x377/0x480 [ 24.905064][ T373] ? selinux_file_alloc_security+0x120/0x120 [ 24.911022][ T373] ? __se_sys_futex+0x139/0x310 [ 24.915851][ T373] ? __x64_sys_futex+0x100/0x100 [ 24.920766][ T373] ? security_file_ioctl+0x84/0xa0 [ 24.925863][ T373] ? kvm_device_release+0x220/0x220 [ 24.931034][ T373] __se_sys_ioctl+0x121/0x1a0 [ 24.935691][ T373] __x64_sys_ioctl+0x7b/0x90 [ 24.940257][ T373] x64_sys_call+0x2f/0x9a0 [ 24.944688][ T373] do_syscall_64+0x4c/0xa0 [ 24.949082][ T373] ? clear_bhb_loop+0x50/0xa0 [ 24.953863][ T373] ? clear_bhb_loop+0x50/0xa0 [ 24.958544][ T373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 24.964416][ T373] RIP: 0033:0x7f68bdfef749 [ 24.968820][ T373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 24.988414][ T373] RSP: 002b:00007ffe8a5b73c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 24.996810][ T373] RAX: ffffffffffffffda RBX: 00007f68be245fa0 RCX: 00007f68bdfef749 [ 25.004766][ T373] RDX: 0000000000000000 RSI: 000000000000aec7 RDI: 0000000000000004 [ 25.012724][ T373] RBP: 00007f68be073f91 R08: 0000000000000000 R09: 0000000000000000 [ 25.020678][ T373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 25.028626][ T373] R13: 00007f68be245fa0 R14: 00007f68be245fa0 R15: 0000000000000002 [ 25.036704][ T373] [ 25.039714][ T373] Modules linked in: [ 25.043974][ T373] ---[ end trace b96d497267059025 ]--- [ 25.049522][ T373] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 25.055532][ T373] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 5a 91 4f 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 f4 13 8e 00 4c 8b 33 31 ff 4c 89 [ 25.075367][ T373] RSP: 0018:ffffc90000c27898 EFLAGS: 00010206 [ 25.081561][ T373] RAX: 006ff91e0005ac00 RBX: 037fc8f0002d6000 RCX: ffff88810de8a780 [ 25.089521][ T373] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f0002d6000 [ 25.097575][ T373] RBP: ffffc90000c278d8 R08: 0000000000000004 R09: 0000000000000003 [ 25.105615][ T373] R10: fffff52000184f28 R11: 1ffff92000184f28 R12: 0000000000000001 [ 25.113671][ T373] R13: 037fc8f0002d6000 R14: dffffc0000000000 R15: ffff88811e1f0348 [ 25.121721][ T373] FS: 0000555567297500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 25.130634][ T373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.137274][ T373] CR2: 0000200000c42000 CR3: 000000011e675000 CR4: 00000000003526a0 [ 25.145306][ T373] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 25.153339][ T373] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 25.161379][ T373] Kernel panic - not syncing: Fatal exception [ 25.167738][ T373] Kernel Offset: disabled [ 25.172046][ T373] Rebooting in 86400 seconds..