syzkaller syzkaller login: [ 14.609228][ T36] kauditd_printk_skb: 31 callbacks suppressed [ 14.609246][ T36] audit: type=1400 audit(1761151904.920:59): avc: denied { transition } for pid=230 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.617569][ T36] audit: type=1400 audit(1761151904.920:60): avc: denied { noatsecure } for pid=230 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.622045][ T36] audit: type=1400 audit(1761151904.930:61): avc: denied { write } for pid=230 comm="sh" path="pipe:[2931]" dev="pipefs" ino=2931 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.627129][ T36] audit: type=1400 audit(1761151904.930:62): avc: denied { rlimitinh } for pid=230 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.634956][ T36] audit: type=1400 audit(1761151904.930:63): avc: denied { siginh } for pid=230 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.143' (ED25519) to the list of known hosts. 2025/10/22 16:51:55 parsed 1 programs [ 24.701486][ T36] audit: type=1400 audit(1761151915.010:64): avc: denied { node_bind } for pid=291 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 26.239918][ T36] audit: type=1400 audit(1761151916.550:65): avc: denied { mounton } for pid=299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.241446][ T299] cgroup: Unknown subsys name 'net' [ 26.263292][ T36] audit: type=1400 audit(1761151916.550:66): avc: denied { mount } for pid=299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.294999][ T36] audit: type=1400 audit(1761151916.580:67): avc: denied { unmount } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.295337][ T299] cgroup: Unknown subsys name 'devices' [ 26.446535][ T299] cgroup: Unknown subsys name 'hugetlb' [ 26.452808][ T299] cgroup: Unknown subsys name 'rlimit' [ 26.639629][ T36] audit: type=1400 audit(1761151916.950:68): avc: denied { setattr } for pid=299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.668301][ T36] audit: type=1400 audit(1761151916.950:69): avc: denied { create } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.690481][ T36] audit: type=1400 audit(1761151916.950:70): avc: denied { write } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.704011][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.713379][ T36] audit: type=1400 audit(1761151916.950:71): avc: denied { read } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.745941][ T36] audit: type=1400 audit(1761151916.950:72): avc: denied { sys_module } for pid=299 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 26.772287][ T36] audit: type=1400 audit(1761151916.950:73): avc: denied { mounton } for pid=299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.811117][ T299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.833309][ T304] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 28.720500][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.727709][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.734970][ T353] bridge_slave_0: entered allmulticast mode [ 28.741508][ T353] bridge_slave_0: entered promiscuous mode [ 28.748162][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.755282][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.762393][ T353] bridge_slave_1: entered allmulticast mode [ 28.768888][ T353] bridge_slave_1: entered promiscuous mode [ 28.838987][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.846125][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.853688][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.860981][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.884965][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.893065][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.903854][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.911343][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.921504][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.928796][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.957112][ T353] veth0_vlan: entered promiscuous mode [ 28.969760][ T353] veth1_macvtap: entered promiscuous mode [ 29.025352][ T12] bridge_slave_1: left allmulticast mode [ 29.031087][ T12] bridge_slave_1: left promiscuous mode [ 29.036995][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.045048][ T12] bridge_slave_0: left allmulticast mode [ 29.051006][ T12] bridge_slave_0: left promiscuous mode [ 29.056845][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.238135][ T12] veth1_macvtap: left promiscuous mode [ 29.243890][ T12] veth0_vlan: left promiscuous mode 2025/10/22 16:51:59 executed programs: 0 [ 29.371361][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.378998][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.386169][ T373] bridge_slave_0: entered allmulticast mode [ 29.392470][ T373] bridge_slave_0: entered promiscuous mode [ 29.398973][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.406109][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.413365][ T373] bridge_slave_1: entered allmulticast mode [ 29.419885][ T373] bridge_slave_1: entered promiscuous mode [ 29.475856][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.482968][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.490347][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.497536][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.521314][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.528939][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.538658][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.545872][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.555437][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.563073][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.593876][ T373] veth0_vlan: entered promiscuous mode [ 29.605904][ T373] veth1_macvtap: entered promiscuous mode [ 29.640522][ T383] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 29.680816][ T383] ------------[ cut here ]------------ [ 29.686390][ T383] WARNING: CPU: 0 PID: 383 at arch/x86/kvm/vmx/nested.c:4932 nested_vmx_vmexit+0x188d/0x27d0 [ 29.696862][ T383] Modules linked in: [ 29.700839][ T383] CPU: 0 UID: 0 PID: 383 Comm: syz.2.17 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 29.712740][ T383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.723009][ T383] RIP: 0010:nested_vmx_vmexit+0x188d/0x27d0 [ 29.729334][ T383] Code: 00 0f 85 4c 03 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d e9 43 17 5e 04 cc e8 8d 5a 54 00 e9 4d f6 ff ff e8 83 5a 54 00 <0f> 0b e9 76 e8 ff ff b8 00 44 00 00 0f 78 c0 0f 86 bd 0e 00 00 89 [ 29.749639][ T383] RSP: 0018:ffffc900043073a0 EFLAGS: 00010293 [ 29.756558][ T383] RAX: ffffffff8131a42d RBX: 1ffff92000860e88 RCX: ffff888115b90000 [ 29.765394][ T383] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff888115d69c9c [ 29.773605][ T383] RBP: ffffc900043074f8 R08: ffff888115d6803f R09: 1ffff11022bad007 [ 29.782517][ T383] R10: dffffc0000000000 R11: ffffed1022bad008 R12: ffff888115d68000 [ 29.791069][ T383] R13: dffffc0000000000 R14: ffff888115d69c9b R15: ffff888115d6825c [ 29.799330][ T383] FS: 000055556fc5f500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 29.808707][ T383] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.815380][ T383] CR2: 0000000000000000 CR3: 00000001093be000 CR4: 00000000003526b0 [ 29.823642][ T383] Call Trace: [ 29.826957][ T383] [ 29.829989][ T383] ? nested_vmx_run+0x817/0x1160 [ 29.835311][ T383] ? __cfi_handle_vmlaunch+0x10/0x10 [ 29.840776][ T383] ? handle_vmlaunch+0x1e/0x30 [ 29.846194][ T383] ? vmx_handle_exit+0x1182/0x1b40 [ 29.851359][ T383] ? __cfi_nested_vmx_vmexit+0x10/0x10 [ 29.857100][ T383] ? kvm_service_local_tlb_flush_requests+0x81/0x150 [ 29.864102][ T383] nested_vmx_triple_fault+0x35/0x40 [ 29.869641][ T383] vcpu_run+0x21ce/0x7830 [ 29.874041][ T383] ? __kasan_check_write+0x18/0x20 [ 29.879299][ T383] ? signal_pending+0xc0/0xc0 [ 29.884273][ T383] ? __kasan_check_write+0x18/0x20 [ 29.889970][ T383] ? xfd_validate_state+0x68/0x150 [ 29.895457][ T383] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 29.900800][ T383] ? __kasan_check_write+0x18/0x20 [ 29.906118][ T383] ? fpregs_mark_activate+0x69/0x160 [ 29.911596][ T383] ? fpu_swap_kvm_fpstate+0x44d/0x5f0 [ 29.917145][ T383] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 29.922535][ T383] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 29.928389][ T383] ? __se_sys_ioctl+0x135/0x1b0 [ 29.933447][ T383] ? __x64_sys_ioctl+0x7f/0xa0 [ 29.938373][ T383] ? x64_sys_call+0x1878/0x2ee0 [ 29.943766][ T383] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 29.950095][ T383] ? should_fail+0xf/0x20 [ 29.954658][ T383] ? get_futex_key+0x181/0x930 [ 29.959470][ T383] ? ioctl_has_perm+0x1aa/0x4d0 [ 29.964565][ T383] ? __asan_memcpy+0x5a/0x80 [ 29.969278][ T383] ? ioctl_has_perm+0x3e0/0x4d0 [ 29.974313][ T383] ? has_cap_mac_admin+0xd0/0xd0 [ 29.979323][ T383] ? __kasan_check_write+0x18/0x20 [ 29.984786][ T383] ? mutex_lock_killable+0x92/0x1c0 [ 29.990065][ T383] ? __cfi_mutex_lock_killable+0x10/0x10 [ 29.995869][ T383] ? __cfi_futex_wake+0x10/0x10 [ 30.000782][ T383] ? __kasan_check_write+0x18/0x20 [ 30.006188][ T383] kvm_vcpu_ioctl+0x96f/0xee0 [ 30.010987][ T383] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 30.016273][ T383] ? do_futex+0x356/0x500 [ 30.020751][ T383] ? __cfi_do_futex+0x10/0x10 [ 30.025580][ T383] ? __se_sys_futex+0x28f/0x300 [ 30.030599][ T383] ? bpf_lsm_file_ioctl+0xd/0x20 [ 30.035629][ T383] ? security_file_ioctl+0x34/0xd0 [ 30.041003][ T383] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 30.046372][ T383] __se_sys_ioctl+0x135/0x1b0 [ 30.051208][ T383] __x64_sys_ioctl+0x7f/0xa0 [ 30.056179][ T383] x64_sys_call+0x1878/0x2ee0 [ 30.061280][ T383] do_syscall_64+0x58/0xf0 [ 30.066025][ T383] ? clear_bhb_loop+0x50/0xa0 [ 30.070934][ T383] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 30.076910][ T383] RIP: 0033:0x7fec82d8efc9 [ 30.081510][ T383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.101678][ T383] RSP: 002b:00007fffb6ed8218 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 30.110585][ T383] RAX: ffffffffffffffda RBX: 00007fec82fe5fa0 RCX: 00007fec82d8efc9 [ 30.118753][ T383] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 30.126792][ T383] RBP: 00007fec82e11f91 R08: 0000000000000000 R09: 0000000000000000 [ 30.134974][ T383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 30.143599][ T383] R13: 00007fec82fe5fa0 R14: 00007fec82fe5fa0 R15: 0000000000000003 [ 30.151667][ T383] [ 30.154793][ T383] ---[ end trace 0000000000000000 ]--- [ 30.268902][ T370] bridge_slave_1: left allmulticast mode [ 30.274735][ T370] bridge_slave_1: left promiscuous mode [ 30.281106][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.289238][ T370] bridge_slave_0: left allmulticast mode [ 30.295095][ T370] bridge_slave_0: left promiscuous mode [ 30.300833][ T370] bridge0: port 1(bridge_slave_0) entered disabled state