Warning: Permanently added '10.128.0.162' (ED25519) to the list of known hosts. 2026/01/28 16:13:47 parsed 1 programs [ 25.291351][ T36] audit: type=1400 audit(1769616827.480:64): avc: denied { node_bind } for pid=293 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 26.814542][ T36] audit: type=1400 audit(1769616829.010:65): avc: denied { mounton } for pid=300 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.818111][ T300] cgroup: Unknown subsys name 'net' [ 26.837325][ T36] audit: type=1400 audit(1769616829.010:66): avc: denied { mount } for pid=300 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.864745][ T36] audit: type=1400 audit(1769616829.040:67): avc: denied { unmount } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.865210][ T300] cgroup: Unknown subsys name 'devices' [ 27.046339][ T300] cgroup: Unknown subsys name 'hugetlb' [ 27.051980][ T300] cgroup: Unknown subsys name 'rlimit' [ 27.215720][ T36] audit: type=1400 audit(1769616829.410:68): avc: denied { setattr } for pid=300 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.238918][ T36] audit: type=1400 audit(1769616829.410:69): avc: denied { create } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.259347][ T36] audit: type=1400 audit(1769616829.410:70): avc: denied { write } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.279754][ T36] audit: type=1400 audit(1769616829.410:71): avc: denied { read } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.300095][ T36] audit: type=1400 audit(1769616829.410:72): avc: denied { sys_module } for pid=300 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 27.303951][ T303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.321585][ T36] audit: type=1400 audit(1769616829.410:73): avc: denied { mounton } for pid=300 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 27.400750][ T300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.356290][ T308] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 28.727569][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.734765][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.741868][ T336] bridge_slave_0: entered allmulticast mode [ 28.748833][ T336] bridge_slave_0: entered promiscuous mode [ 28.755356][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.762404][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.769586][ T336] bridge_slave_1: entered allmulticast mode [ 28.775877][ T336] bridge_slave_1: entered promiscuous mode [ 28.820500][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.827598][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.834933][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.841987][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.865273][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.872654][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.885097][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.892183][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.900914][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.908004][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.935522][ T336] veth0_vlan: entered promiscuous mode [ 28.946561][ T336] veth1_macvtap: entered promiscuous mode [ 29.146358][ T13] bridge_slave_1: left allmulticast mode [ 29.152112][ T13] bridge_slave_1: left promiscuous mode [ 29.166816][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.176114][ T13] bridge_slave_0: left allmulticast mode [ 29.181795][ T13] bridge_slave_0: left promiscuous mode [ 29.188591][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.343746][ T13] veth1_macvtap: left promiscuous mode [ 29.349506][ T13] veth0_vlan: left promiscuous mode 2026/01/28 16:13:51 executed programs: 0 [ 29.677950][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.685106][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.692270][ T371] bridge_slave_0: entered allmulticast mode [ 29.698498][ T371] bridge_slave_0: entered promiscuous mode [ 29.704968][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.712007][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.719123][ T371] bridge_slave_1: entered allmulticast mode [ 29.725571][ T371] bridge_slave_1: entered promiscuous mode [ 29.804715][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.811810][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.819767][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.826854][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.855371][ T371] veth0_vlan: entered promiscuous mode [ 29.866331][ T371] veth1_macvtap: entered promiscuous mode [ 29.898103][ T381] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 29.921204][ T381] ------------[ cut here ]------------ [ 29.926802][ T381] WARNING: CPU: 1 PID: 381 at mm/page_alloc.c:5234 __alloc_pages_noprof+0x109/0x7e0 [ 29.936296][ T381] Modules linked in: [ 29.940237][ T381] CPU: 1 UID: 0 PID: 381 Comm: syz.2.17 Not tainted syzkaller #0 2e88900194e885de5c8b36fd08cb790c546b675d [ 29.951580][ T381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 29.961724][ T381] RIP: 0010:__alloc_pages_noprof+0x109/0x7e0 [ 29.967821][ T381] Code: 00 0f 1f 44 00 00 83 fb 0b 72 28 b8 00 20 00 00 23 44 24 40 75 1d 80 3d ea a0 0b 06 00 0f 85 c2 00 00 00 c6 05 dd a0 0b 06 01 <0f> 0b 31 c0 e9 b4 00 00 00 83 fb 0a 0f 87 a9 00 00 00 44 8b 64 24 [ 29.987512][ T381] RSP: 0018:ffffc90000fef980 EFLAGS: 00010246 [ 29.993595][ T381] RAX: 0000000000000000 RBX: 0000000000000034 RCX: 0000000000000000 [ 30.001613][ T381] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc90000fefa38 [ 30.009652][ T381] RBP: ffffc90000fefaa8 R08: ffffc90000fefa37 R09: 0000000000000000 [ 30.017708][ T381] R10: ffffc90000fefa20 R11: fffff520001fdf47 R12: ffffc90000fef9c0 [ 30.025753][ T381] R13: dffffc0000000000 R14: 1ffff920001fdf34 R15: 0000000000000000 [ 30.033751][ T381] FS: 0000555591851500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 30.042795][ T381] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.049465][ T381] CR2: 00007fc5f94708c0 CR3: 000000012e73e000 CR4: 00000000003526b0 [ 30.057507][ T381] Call Trace: [ 30.060833][ T381] [ 30.063765][ T381] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 30.069572][ T381] ? do_pte_missing+0x1937/0x44f0 [ 30.074696][ T381] ? pending_reads_dispatch_ioctl+0xc86/0x2080 [ 30.080871][ T381] ___kmalloc_large_node+0x81/0x210 [ 30.086105][ T381] ? pending_reads_dispatch_ioctl+0xc86/0x2080 [ 30.092271][ T381] __kmalloc_large_node_noprof+0x1e/0xd0 [ 30.097956][ T381] ? pending_reads_dispatch_ioctl+0xc86/0x2080 [ 30.104174][ T381] __kmalloc_noprof+0x326/0x500 [ 30.109060][ T381] pending_reads_dispatch_ioctl+0xc86/0x2080 [ 30.115108][ T381] ? pte_offset_map_rw_nolock+0xba/0x110 [ 30.120757][ T381] ? handle_mm_fault+0x171c/0x1bf0 [ 30.125952][ T381] ? __cfi_pending_reads_dispatch_ioctl+0x10/0x10 [ 30.132387][ T381] ? selinux_file_ioctl+0x732/0x1480 [ 30.137729][ T381] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 30.143301][ T381] ? do_futex+0x37d/0x510 [ 30.147672][ T381] ? __cfi_do_futex+0x10/0x10 [ 30.152371][ T381] ? __se_sys_futex+0x13c/0x320 [ 30.157283][ T381] ? bpf_lsm_file_ioctl+0xd/0x20 [ 30.162237][ T381] ? security_file_ioctl+0x3e/0x110 [ 30.167499][ T381] ? __cfi_pending_reads_dispatch_ioctl+0x10/0x10 [ 30.173993][ T381] __se_sys_ioctl+0x135/0x1b0 [ 30.178688][ T381] __x64_sys_ioctl+0x7f/0xa0 [ 30.183289][ T381] x64_sys_call+0x1878/0x2ee0 [ 30.188039][ T381] do_syscall_64+0x57/0xf0 [ 30.192491][ T381] ? clear_bhb_loop+0x50/0xa0 [ 30.197221][ T381] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 30.203161][ T381] RIP: 0033:0x7fc5f959aeb9 [ 30.207646][ T381] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 30.227335][ T381] RSP: 002b:00007ffeced8fc38 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 30.235836][ T381] RAX: ffffffffffffffda RBX: 00007fc5f9815fa0 RCX: 00007fc5f959aeb9 [ 30.243904][ T381] RDX: 00002000000000c0 RSI: 0000000040106726 RDI: 0000000000000007 [ 30.251903][ T381] RBP: 00007fc5f9608c1f R08: 0000000000000000 R09: 0000000000000000 [ 30.259928][ T381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 30.267972][ T381] R13: 00007fc5f9815fac R14: 00007fc5f9815fa0 R15: 00007fc5f9815fa0 [ 30.276006][ T381] [ 30.279050][ T381] ---[ end trace 0000000000000000 ]--- [ 30.336267][ T36] kauditd_printk_skb: 38 callbacks suppressed [ 30.336285][ T36] audit: type=1400 audit(1769616832.530:112): avc: denied { unmount } for pid=371 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 30.429945][ T13] bridge_slave_1: left allmulticast mode [ 30.435685][ T13] bridge_slave_1: left promiscuous mode [ 30.441336][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.449349][ T13] bridge_slave_0: left allmulticast mode [ 30.455135][ T13] bridge_slave_0: left promiscuous mode [ 30.460779][ T13] bridge0: port 1(bridge_slave_0) entered disabled state