cess permissive=1 [ 15.893680][ T36] audit: type=1400 audit(1777027233.129:63): avc: denied { siginh } for pid=232 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.143' (ED25519) to the list of known hosts. 2026/04/24 10:40:41 parsed 1 programs [ 24.607242][ T36] audit: type=1400 audit(1777027241.859:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 25.577224][ T36] audit: type=1400 audit(1777027242.829:65): avc: denied { mounton } for pid=296 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.578269][ T296] cgroup: Unknown subsys name 'net' [ 25.600565][ T36] audit: type=1400 audit(1777027242.829:66): avc: denied { mount } for pid=296 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.628306][ T36] audit: type=1400 audit(1777027242.859:67): avc: denied { unmount } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.628489][ T296] cgroup: Unknown subsys name 'devices' [ 25.787954][ T296] cgroup: Unknown subsys name 'hugetlb' [ 25.793615][ T296] cgroup: Unknown subsys name 'rlimit' [ 25.951785][ T36] audit: type=1400 audit(1777027243.199:68): avc: denied { setattr } for pid=296 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.975139][ T36] audit: type=1400 audit(1777027243.199:69): avc: denied { create } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.995790][ T36] audit: type=1400 audit(1777027243.199:70): avc: denied { write } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.004115][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.016510][ T36] audit: type=1400 audit(1777027243.199:71): avc: denied { read } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.045548][ T36] audit: type=1400 audit(1777027243.199:72): avc: denied { sys_module } for pid=296 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 26.066839][ T36] audit: type=1400 audit(1777027243.199:73): avc: denied { mounton } for pid=296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.103957][ T296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.977097][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 27.406109][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.413163][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.420278][ T335] bridge_slave_0: entered allmulticast mode [ 27.426540][ T335] bridge_slave_0: entered promiscuous mode [ 27.432908][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.440129][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.447454][ T335] bridge_slave_1: entered allmulticast mode [ 27.453640][ T335] bridge_slave_1: entered promiscuous mode [ 27.495460][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.502563][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.510014][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.517070][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.535391][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.542608][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.559737][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.566812][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.576406][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.583813][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.608571][ T335] veth0_vlan: entered promiscuous mode [ 27.618625][ T335] veth1_macvtap: entered promiscuous mode [ 27.718890][ T13] bridge_slave_1: left allmulticast mode [ 27.724586][ T13] bridge_slave_1: left promiscuous mode [ 27.730308][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.739003][ T13] bridge_slave_0: left allmulticast mode [ 27.744660][ T13] bridge_slave_0: left promiscuous mode [ 27.750476][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.888082][ T13] veth1_macvtap: left promiscuous mode [ 27.893645][ T13] veth0_vlan: left promiscuous mode 2026/04/24 10:40:45 executed programs: 0 [ 28.188909][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.195978][ T365] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.203067][ T365] bridge_slave_0: entered allmulticast mode [ 28.209302][ T365] bridge_slave_0: entered promiscuous mode [ 28.215612][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.222907][ T365] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.230144][ T365] bridge_slave_1: entered allmulticast mode [ 28.236447][ T365] bridge_slave_1: entered promiscuous mode [ 28.289024][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.296121][ T365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.303462][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.310514][ T365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.329499][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.336966][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.348967][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.356048][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.364878][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.371948][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.396899][ T365] veth0_vlan: entered promiscuous mode [ 28.407244][ T365] veth1_macvtap: entered promiscuous mode 2026/04/24 10:40:50 executed programs: 282 [ 33.177090][ T36] kauditd_printk_skb: 39 callbacks suppressed [ 33.177131][ T36] audit: type=1400 audit(1777027250.429:113): avc: denied { write } for pid=290 comm="syz-execprog" path="pipe:[647]" dev="pipefs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 33.553323][ T377] ------------[ cut here ]------------ [ 33.558878][ T377] WARNING: CPU: 1 PID: 377 at drivers/block/ublk_drv.c:1579 ublk_uring_cmd_cancel_fn+0x34f/0x410 [ 33.569447][ T377] Modules linked in: [ 33.573379][ T377] CPU: 1 UID: 0 PID: 377 Comm: kworker/u8:5 Not tainted syzkaller #0 8cfc209e52ea19d19d7bf60324c052393309520c [ 33.586197][ T377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 33.596439][ T377] Workqueue: iou_exit io_ring_exit_work [ 33.602011][ T377] RIP: 0010:ublk_uring_cmd_cancel_fn+0x34f/0x410 [ 33.608521][ T377] Code: 5d e9 95 c1 4e 02 cc e8 2f 8e 32 fe 0f 0b eb e3 e8 26 8e 32 fe 0f 0b eb da e8 1d 8e 32 fe 0f 0b e9 4d fe ff ff e8 11 8e 32 fe <0f> 0b eb c5 44 89 e1 80 e1 07 fe c1 38 c1 0f 8c 0c fd ff ff 4c 89 [ 33.628186][ T377] RSP: 0018:ffffc9000108f990 EFLAGS: 00010293 [ 33.634283][ T377] RAX: ffffffff8355212f RBX: 1ffff11022a2ebbd RCX: ffff888116123900 [ 33.642307][ T377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 33.650389][ T377] RBP: ffffc9000108f9e0 R08: 0000000000000003 R09: 0000000000000004 [ 33.658537][ T377] R10: 0000000000000000 R11: ffffffff83551110 R12: ffff88811b9edf00 [ 33.666540][ T377] R13: ffff888115175dc0 R14: ffff888116137300 R15: ffff888116137310 [ 33.674895][ T377] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 33.683878][ T377] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.690590][ T377] CR2: 00007f7c54f48060 CR3: 0000000116128000 CR4: 00000000003526b0 [ 33.698615][ T377] Call Trace: [ 33.702073][ T377] [ 33.705010][ T377] ? _raw_spin_unlock+0x45/0x60 [ 33.710014][ T377] ublk_ch_uring_cmd+0x6f/0xa0 [ 33.714796][ T377] io_uring_try_cancel_uring_cmd+0x1a1/0x280 [ 33.720815][ T377] io_uring_try_cancel_requests+0x4ce/0x5a5 [ 33.726748][ T377] ? __kasan_check_write+0x18/0x20 [ 33.731890][ T377] ? io_uring_cancel_generic+0x6eb/0x6eb [ 33.737584][ T377] io_ring_exit_work+0x23c/0x83b [ 33.742542][ T377] ? __cfi_io_ring_exit_work+0x10/0x10 [ 33.748178][ T377] ? __schedule+0x13a1/0x1fa0 [ 33.752918][ T377] ? kick_pool+0xb9/0x550 [ 33.757280][ T377] process_scheduled_works+0x7d1/0x1020 [ 33.762858][ T377] worker_thread+0xc70/0x10b0 [ 33.768470][ T377] kthread+0x2c6/0x370 [ 33.772553][ T377] ? __cfi_worker_thread+0x10/0x10 [ 33.777712][ T377] ? __cfi_kthread+0x10/0x10 [ 33.782298][ T377] ret_from_fork+0x67/0xa0 [ 33.786735][ T377] ? __cfi_kthread+0x10/0x10 [ 33.791336][ T377] ret_from_fork_asm+0x1a/0x30 [ 33.796135][ T377] [ 33.799158][ T377] ---[ end trace 0000000000000000 ]--- 2026/04/24 10:40:55 executed programs: 564 [ 38.841930][ T1601] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.849144][ T1601] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.856545][ T1601] bridge_slave_0: entered allmulticast mode [ 38.862895][ T1601] bridge_slave_0: entered promiscuous mode [ 38.872308][ T1601] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.879398][ T1601] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.886711][ T1601] bridge_slave_1: entered allmulticast mode [ 38.893067][ T1601] bridge_slave_1: entered promiscuous mode [ 38.899382][ T380] bridge_slave_1: left allmulticast mode [ 38.905022][ T380] bridge_slave_1: left promiscuous mode [ 38.910903][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.918666][ T380] bridge_slave_0: left allmulticast mode [ 38.924327][ T380] bridge_slave_0: left promiscuous mode [ 38.930230][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.079435][ T380] veth1_macvtap: left promiscuous mode [ 39.085049][ T380] veth0_vlan: left promiscuous mode [ 39.159477][ T1601] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.166555][ T1601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.173815][ T1601] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.180864][ T1601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.212255][ T1019] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.219925][ T1019] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.229856][ T1017] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.236917][ T1017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.258031][ T1017] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.265177][ T1017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.283338][ T1601] veth0_vlan: entered promiscuous mode [ 39.295920][ T1601] veth1_macvtap: entered promiscuous mode 2026/04/24 10:41:00 executed programs: 825