cess permissive=1 [ 17.100730][ T36] audit: type=1400 audit(1775764104.330:63): avc: denied { siginh } for pid=233 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.85' (ED25519) to the list of known hosts. 2026/04/09 19:48:34 parsed 1 programs [ 26.944285][ T36] audit: type=1400 audit(1775764114.270:64): avc: denied { node_bind } for pid=291 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 28.078571][ T299] cgroup: Unknown subsys name 'net' [ 28.080671][ T36] audit: type=1400 audit(1775764115.400:65): avc: denied { mounton } for pid=299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.107950][ T36] audit: type=1400 audit(1775764115.400:66): avc: denied { mount } for pid=299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.108140][ T299] cgroup: Unknown subsys name 'devices' [ 28.132933][ T36] audit: type=1400 audit(1775764115.410:67): avc: denied { unmount } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.283503][ T299] cgroup: Unknown subsys name 'hugetlb' [ 28.289206][ T299] cgroup: Unknown subsys name 'rlimit' [ 28.467432][ T36] audit: type=1400 audit(1775764115.790:68): avc: denied { setattr } for pid=299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.492104][ T36] audit: type=1400 audit(1775764115.790:69): avc: denied { create } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.513096][ T36] audit: type=1400 audit(1775764115.790:70): avc: denied { write } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.523136][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.534375][ T36] audit: type=1400 audit(1775764115.790:71): avc: denied { read } for pid=299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.564079][ T36] audit: type=1400 audit(1775764115.790:72): avc: denied { sys_module } for pid=299 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 28.587793][ T36] audit: type=1400 audit(1775764115.790:73): avc: denied { mounton } for pid=299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.647239][ T299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.623167][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.041342][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.049256][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.057130][ T329] bridge_slave_0: entered allmulticast mode [ 30.064064][ T329] bridge_slave_0: entered promiscuous mode [ 30.071529][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.078901][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.086264][ T329] bridge_slave_1: entered allmulticast mode [ 30.093282][ T329] bridge_slave_1: entered promiscuous mode [ 30.137083][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.145251][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.154524][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.162095][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.182261][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.190426][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.209483][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.217074][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.227845][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.235033][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.259886][ T329] veth0_vlan: entered promiscuous mode [ 30.271383][ T329] veth1_macvtap: entered promiscuous mode [ 30.433389][ T46] bridge_slave_1: left allmulticast mode [ 30.439191][ T46] bridge_slave_1: left promiscuous mode [ 30.445089][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.454810][ T46] bridge_slave_0: left allmulticast mode [ 30.461360][ T46] bridge_slave_0: left promiscuous mode [ 30.467143][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.649844][ T46] veth1_macvtap: left promiscuous mode [ 30.656056][ T46] veth0_vlan: left promiscuous mode 2026/04/09 19:48:38 executed programs: 0 [ 31.097119][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.105231][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.114995][ T367] bridge_slave_0: entered allmulticast mode [ 31.123218][ T367] bridge_slave_0: entered promiscuous mode [ 31.131038][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.140281][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.148083][ T367] bridge_slave_1: entered allmulticast mode [ 31.156228][ T367] bridge_slave_1: entered promiscuous mode [ 31.203821][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.211191][ T367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.235792][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.245566][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.252862][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.263092][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.270706][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.298347][ T367] veth0_vlan: entered promiscuous mode [ 31.310104][ T367] veth1_macvtap: entered promiscuous mode [ 31.343289][ T372] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 32.177775][ T376] ------------[ cut here ]------------ [ 32.183680][ T376] WARNING: CPU: 1 PID: 376 at arch/x86/kvm/x86.c:11288 vcpu_run+0x759d/0x7840 [ 32.193013][ T376] Modules linked in: [ 32.196935][ T376] CPU: 1 UID: 0 PID: 376 Comm: syz.2.17 Not tainted syzkaller #0 50c55e29475f753e2c0e421a4e3d27eb6c382eee [ 32.208459][ T376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 32.219231][ T376] RIP: 0010:vcpu_run+0x759d/0x7840 [ 32.224420][ T376] Code: 1f 48 83 c3 20 48 89 d8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 5c 02 00 00 44 88 33 eb 78 e8 2a f7 6a 00 eb 71 e8 23 f7 6a 00 <0f> 0b 4d 89 f5 eb 65 e8 17 f7 6a 00 48 8b 84 24 b8 00 00 00 42 80 [ 32.244278][ T376] RSP: 0018:ffffc90000f9f540 EFLAGS: 00010293 [ 32.250913][ T376] RAX: ffffffff811cb39d RBX: 00000000fffffff0 RCX: ffff888114d90000 [ 32.259278][ T376] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000fffffff0 [ 32.267844][ T376] RBP: ffffc90000f9f9d0 R08: ffff8881152856e7 R09: 1ffff11022a50adc [ 32.276342][ T376] R10: dffffc0000000000 R11: ffffed1022a50add R12: dffffc0000000000 [ 32.284631][ T376] R13: ffff8881258b23dc R14: dffffc0000000000 R15: ffff8881258b2180 [ 32.293611][ T376] FS: 00007fb94a4916c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 32.302827][ T376] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.309444][ T376] CR2: 00007fb94a490ff8 CR3: 00000001161d4000 CR4: 00000000003526b0 [ 32.317649][ T376] Call Trace: [ 32.321168][ T376] [ 32.324171][ T376] ? _raw_spin_lock+0x92/0x120 [ 32.329134][ T376] ? generic_exec_single+0x1fd/0x500 [ 32.335439][ T376] ? signal_pending+0xc0/0xc0 [ 32.340358][ T376] ? __kasan_check_write+0x18/0x20 [ 32.345897][ T376] ? xfd_validate_state+0x68/0x140 [ 32.351507][ T376] ? fpu_swap_kvm_fpstate+0x92/0x5e0 [ 32.357868][ T376] ? __kasan_check_write+0x18/0x20 [ 32.363440][ T376] ? fpregs_mark_activate+0x68/0x160 [ 32.369238][ T376] ? fpu_swap_kvm_fpstate+0x44c/0x5e0 [ 32.375242][ T376] ? __kasan_check_read+0x15/0x20 [ 32.381242][ T376] kvm_arch_vcpu_ioctl_run+0x1167/0x1bd0 [ 32.387684][ T376] ? synchronize_rcu_expedited+0x728/0x970 [ 32.394482][ T376] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 32.401240][ T376] ? cgroup_rstat_updated+0x141/0x810 [ 32.407353][ T376] ? __cfi_wait_rcu_exp_gp+0x10/0x10 [ 32.413673][ T376] ? ioctl_has_perm+0x1bc/0x500 [ 32.419089][ T376] ? __cfi_autoremove_wake_function+0x10/0x10 [ 32.425458][ T376] ? ioctl_has_perm+0x408/0x500 [ 32.430579][ T376] ? has_cap_mac_admin+0xd0/0xd0 [ 32.436181][ T376] ? synchronize_rcu+0x77/0x2f0 [ 32.441400][ T376] ? __cfi_synchronize_rcu+0x10/0x10 [ 32.446998][ T376] ? handle_mm_fault+0x171c/0x1bf0 [ 32.453045][ T376] ? __kasan_check_write+0x18/0x20 [ 32.458938][ T376] kvm_vcpu_ioctl+0xa48/0x1000 [ 32.464129][ T376] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 32.469755][ T376] ? _raw_spin_lock_irq+0x93/0x120 [ 32.475146][ T376] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 32.481694][ T376] ? __kasan_check_write+0x18/0x20 [ 32.487279][ T376] ? recalc_sigpending+0x16c/0x1d0 [ 32.492817][ T376] ? _raw_spin_unlock_irq+0x45/0x70 [ 32.498230][ T376] ? __set_current_blocked+0x278/0x2c0 [ 32.504219][ T376] ? __fget_files+0x2c5/0x340 [ 32.509329][ T376] ? bpf_lsm_file_ioctl+0xd/0x20 [ 32.514580][ T376] ? security_file_ioctl+0x3e/0x110 [ 32.520364][ T376] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 32.526052][ T376] __se_sys_ioctl+0x132/0x1b0 [ 32.531266][ T376] __x64_sys_ioctl+0x7f/0xa0 [ 32.536840][ T376] x64_sys_call+0x1878/0x2ee0 [ 32.541770][ T376] do_syscall_64+0x57/0xf0 [ 32.546449][ T376] ? clear_bhb_loop+0x50/0xa0 [ 32.551376][ T376] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 32.557606][ T376] RIP: 0033:0x7fb94959c819 [ 32.562352][ T376] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 32.583673][ T376] RSP: 002b:00007fb94a491028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 32.592871][ T376] RAX: ffffffffffffffda RBX: 00007fb949816270 RCX: 00007fb94959c819 [ 32.601339][ T376] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 32.610372][ T376] RBP: 00007fb949632c91 R08: 0000000000000000 R09: 0000000000000000 [ 32.619164][ T376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 32.627668][ T376] R13: 00007fb949816308 R14: 00007fb949816270 R15: 00007fffee6e9fd8 [ 32.636009][ T376] [ 32.639226][ T376] ---[ end trace 0000000000000000 ]--- [ 32.834279][ T379] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 33.924173][ T389] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 2026/04/09 19:48:44 executed programs: 9 [ 41.154188][ T442] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 2026/04/09 19:48:49 executed programs: 16