[ 16.731692][ T36] audit: type=1400 audit(1758019302.910:62): avc: denied { rlimitinh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 16.734665][ T36] audit: type=1400 audit(1758019302.910:63): avc: denied { siginh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.35' (ED25519) to the list of known hosts. 2025/09/16 10:41:52 parsed 1 programs [ 26.514542][ T36] audit: type=1400 audit(1758019312.700:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.974744][ T36] audit: type=1400 audit(1758019314.160:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.976120][ T298] cgroup: Unknown subsys name 'net' [ 27.997582][ T36] audit: type=1400 audit(1758019314.160:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.024790][ T36] audit: type=1400 audit(1758019314.190:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.025124][ T298] cgroup: Unknown subsys name 'devices' [ 28.169953][ T298] cgroup: Unknown subsys name 'hugetlb' [ 28.175602][ T298] cgroup: Unknown subsys name 'rlimit' [ 28.338492][ T36] audit: type=1400 audit(1758019314.530:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.361775][ T36] audit: type=1400 audit(1758019314.530:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.382217][ T36] audit: type=1400 audit(1758019314.530:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.394203][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.402667][ T36] audit: type=1400 audit(1758019314.530:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.431465][ T36] audit: type=1400 audit(1758019314.530:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 28.453003][ T36] audit: type=1400 audit(1758019314.530:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.481763][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.432687][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.238501][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.245563][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.252815][ T353] bridge_slave_0: entered allmulticast mode [ 30.259183][ T353] bridge_slave_0: entered promiscuous mode [ 30.265551][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.272612][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.279722][ T353] bridge_slave_1: entered allmulticast mode [ 30.285973][ T353] bridge_slave_1: entered promiscuous mode [ 30.343896][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.350993][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.358402][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.365448][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.385865][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.393307][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.402973][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.410040][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.420282][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.427374][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.452183][ T353] veth0_vlan: entered promiscuous mode [ 30.462696][ T353] veth1_macvtap: entered promiscuous mode [ 30.529170][ T46] bridge_slave_1: left allmulticast mode [ 30.534883][ T46] bridge_slave_1: left promiscuous mode [ 30.540640][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.548493][ T46] bridge_slave_0: left allmulticast mode [ 30.554179][ T46] bridge_slave_0: left promiscuous mode [ 30.559925][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.750023][ T46] veth1_macvtap: left promiscuous mode [ 30.755666][ T46] veth0_vlan: left promiscuous mode 2025/09/16 10:41:57 executed programs: 0 [ 30.876731][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.883830][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.891016][ T372] bridge_slave_0: entered allmulticast mode [ 30.897552][ T372] bridge_slave_0: entered promiscuous mode [ 30.903973][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.911080][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.918191][ T372] bridge_slave_1: entered allmulticast mode [ 30.924439][ T372] bridge_slave_1: entered promiscuous mode [ 30.974695][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.981789][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.989122][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.996166][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.017063][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.024443][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.033627][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.040705][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.056140][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.063235][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.082290][ T372] veth0_vlan: entered promiscuous mode [ 31.103485][ T372] veth1_macvtap: entered promiscuous mode [ 31.134815][ T383] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 31.184401][ T383] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.323065][ T386] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.417887][ T389] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.503378][ T392] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.574927][ T395] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.649919][ T398] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.707191][ T401] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.792587][ T404] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.839753][ T407] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 31.934799][ T410] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 33.370119][ T473] ------------[ cut here ]------------ [ 33.375717][ T473] WARNING: CPU: 1 PID: 473 at arch/x86/kvm/vmx/vmx.c:6472 vmx_handle_exit+0x1309/0x1b40 [ 33.385569][ T473] Modules linked in: [ 33.389563][ T473] CPU: 1 UID: 0 PID: 473 Comm: syz.2.47 Not tainted syzkaller #0 f1fd036d8541680e36a649bca009aa7e7bf746ea [ 33.400909][ T473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 33.411037][ T473] RIP: 0010:vmx_handle_exit+0x1309/0x1b40 [ 33.416816][ T473] Code: 00 e9 64 fe ff ff e8 56 6e 57 00 48 89 df e8 4e e5 00 00 41 89 c6 e9 4f fe ff ff e8 41 6e 57 00 e9 1a f5 ff ff e8 37 6e 57 00 <0f> 0b 43 80 3c 2f 00 74 08 48 89 df e8 e6 a2 ad 00 48 8b 3b 48 8d [ 33.436499][ T473] RSP: 0018:ffffc90001eef428 EFLAGS: 00010293 [ 33.442759][ T473] RAX: ffffffff812e75d9 RBX: ffff888119682180 RCX: ffff888119698000 [ 33.450881][ T473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888119682180 [ 33.459446][ T473] RBP: ffffc90001eef510 R08: ffff888119682337 R09: 1ffff110232d0466 [ 33.467514][ T473] R10: dffffc0000000000 R11: ffffed10232d0467 R12: 0000000080000021 [ 33.475512][ T473] R13: dffffc0000000000 R14: ffffc90001f9a921 R15: 1ffff110232d0430 [ 33.483548][ T473] FS: 00007fcfca6d46c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 33.492553][ T473] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.499204][ T473] CR2: 0000000000000000 CR3: 0000000115e40000 CR4: 00000000003526b0 [ 33.507198][ T473] Call Trace: [ 33.510522][ T473] [ 33.513471][ T473] ? vmx_prepare_switch_to_guest+0x5a7/0x7c0 [ 33.519500][ T473] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 33.524561][ T473] ? kvm_inject_page_fault+0x310/0x380 [ 33.530074][ T473] ? vmx_handle_exit_irqoff+0x4d/0x7a0 [ 33.535569][ T473] vcpu_run+0x481a/0x7260 [ 33.539966][ T473] ? sched_clock+0x44/0x60 [ 33.544429][ T473] ? signal_pending+0xc0/0xc0 [ 33.549147][ T473] ? __kasan_check_write+0x18/0x20 [ 33.554326][ T473] ? xfd_validate_state+0x68/0x150 [ 33.559482][ T473] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 33.564970][ T473] ? __kasan_check_write+0x18/0x20 [ 33.570134][ T473] ? fpregs_mark_activate+0x69/0x160 [ 33.575442][ T473] ? fpu_swap_kvm_fpstate+0x44d/0x5f0 [ 33.580861][ T473] ? __kasan_check_read+0x15/0x20 [ 33.585940][ T473] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 33.591655][ T473] ? __cfi___futex_queue+0x10/0x10 [ 33.596901][ T473] ? futex_wait_setup+0x1bc/0x260 [ 33.601972][ T473] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 33.608104][ T473] ? futex_unqueue+0x136/0x160 [ 33.612893][ T473] ? __futex_wait+0x218/0x2a0 [ 33.617654][ T473] ? ioctl_has_perm+0x1aa/0x4d0 [ 33.622534][ T473] ? __asan_memcpy+0x5a/0x80 [ 33.627153][ T473] ? ioctl_has_perm+0x3e0/0x4d0 [ 33.632091][ T473] ? has_cap_mac_admin+0xd0/0xd0 [ 33.637061][ T473] ? __kasan_check_write+0x18/0x20 [ 33.642245][ T473] ? mutex_lock_killable+0x92/0x1c0 [ 33.647535][ T473] ? __cfi_mutex_lock_killable+0x10/0x10 [ 33.653237][ T473] ? futex_wait+0x29a/0x7a0 [ 33.657794][ T473] ? __cfi_futex_wait+0x10/0x10 [ 33.662676][ T473] kvm_vcpu_ioctl+0x96f/0xee0 [ 33.667466][ T473] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 33.672786][ T473] ? __ia32_sys_rt_sigreturn+0x687/0x7a0 [ 33.678735][ T473] ? do_futex+0x309/0x500 [ 33.683099][ T473] ? __cfi_do_futex+0x10/0x10 [ 33.687846][ T473] ? __fget_files+0x2c5/0x340 [ 33.692643][ T473] ? bpf_lsm_file_ioctl+0xd/0x20 [ 33.697633][ T473] ? security_file_ioctl+0x34/0xd0 [ 33.702781][ T473] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 33.708055][ T473] __se_sys_ioctl+0x132/0x1b0 [ 33.712852][ T473] __x64_sys_ioctl+0x7f/0xa0 [ 33.717522][ T473] x64_sys_call+0x1878/0x2ee0 [ 33.722259][ T473] do_syscall_64+0x58/0xf0 [ 33.726768][ T473] ? clear_bhb_loop+0x50/0xa0 [ 33.731517][ T473] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 33.737487][ T473] RIP: 0033:0x7fcfc978eba9 [ 33.741952][ T473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.761641][ T473] RSP: 002b:00007fcfca6d4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 33.770122][ T473] RAX: ffffffffffffffda RBX: 00007fcfc99d5fa0 RCX: 00007fcfc978eba9 [ 33.778159][ T473] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 33.786153][ T473] RBP: 00007fcfc9811e19 R08: 0000000000000000 R09: 0000000000000000 [ 33.794163][ T473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 33.802182][ T473] R13: 00007fcfc99d6038 R14: 00007fcfc99d5fa0 R15: 00007ffcec276f58 [ 33.810246][ T473] [ 33.813288][ T473] ---[ end trace 0000000000000000 ]--- 2025/09/16 10:42:02 executed programs: 64 [ 36.203347][ T586] dump_vmcs: 56 callbacks suppressed [ 36.203363][ T586] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.261607][ T589] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.332263][ T592] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.396076][ T596] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.514331][ T599] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.591500][ T602] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.653370][ T605] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.700237][ T608] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.773316][ T611] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 36.858391][ T614] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 2025/09/16 10:42:07 executed programs: 142 [ 41.237111][ T818] dump_vmcs: 66 callbacks suppressed [ 41.237126][ T818] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.321360][ T821] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.383241][ T824] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.465562][ T827] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.523534][ T830] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.613418][ T833] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.666674][ T836] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.776047][ T839] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.865699][ T842] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 41.936594][ T845] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state.