Warning: Permanently added '10.128.1.123' (ED25519) to the list of known hosts. 2025/10/10 09:37:08 parsed 1 programs [ 50.590825][ T36] audit: type=1400 audit(1760089029.730:106): avc: denied { unlink } for pid=410 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.639937][ T410] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 51.498704][ T414] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.505827][ T414] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.513158][ T414] bridge_slave_0: entered allmulticast mode [ 51.519802][ T414] bridge_slave_0: entered promiscuous mode [ 51.526445][ T414] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.533731][ T414] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.541161][ T414] bridge_slave_1: entered allmulticast mode [ 51.547571][ T414] bridge_slave_1: entered promiscuous mode [ 51.628926][ T414] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.636109][ T414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.643417][ T414] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.650477][ T414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.670576][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.677786][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.687602][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.694670][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.703510][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.710585][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.735784][ T414] veth0_vlan: entered promiscuous mode [ 51.746417][ T414] veth1_macvtap: entered promiscuous mode [ 51.822415][ T46] bridge_slave_1: left allmulticast mode [ 51.828138][ T46] bridge_slave_1: left promiscuous mode [ 51.834011][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.841921][ T46] bridge_slave_0: left allmulticast mode [ 51.847587][ T46] bridge_slave_0: left promiscuous mode [ 51.853364][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.015100][ T36] audit: type=1401 audit(1760089031.150:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 52.033212][ T46] veth1_macvtap: left promiscuous mode [ 52.038795][ T46] veth0_vlan: left promiscuous mode 2025/10/10 09:37:12 executed programs: 0 [ 52.983283][ T480] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.990481][ T480] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.997626][ T480] bridge_slave_0: entered allmulticast mode [ 53.004131][ T480] bridge_slave_0: entered promiscuous mode [ 53.010603][ T480] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.017653][ T480] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.025246][ T480] bridge_slave_1: entered allmulticast mode [ 53.031612][ T480] bridge_slave_1: entered promiscuous mode [ 53.088149][ T480] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.095349][ T480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.102778][ T480] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.109942][ T480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.133306][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.140975][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.150183][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.157236][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.167211][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.174296][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.199719][ T480] veth0_vlan: entered promiscuous mode [ 53.210807][ T480] veth1_macvtap: entered promiscuous mode [ 53.237995][ T36] audit: type=1400 audit(1760089032.370:108): avc: denied { read write } for pid=490 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.243310][ T491] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 53.261251][ T36] audit: type=1400 audit(1760089032.380:109): avc: denied { open } for pid=490 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.301033][ T36] audit: type=1400 audit(1760089032.380:110): avc: denied { ioctl } for pid=490 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.375114][ T36] audit: type=1400 audit(1760089032.510:111): avc: denied { create } for pid=490 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 53.376225][ T491] ------------[ cut here ]------------ [ 53.394724][ T36] audit: type=1400 audit(1760089032.510:112): avc: denied { map } for pid=490 comm="syz.2.17" path="socket:[4079]" dev="sockfs" ino=4079 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 53.400020][ T491] WARNING: CPU: 0 PID: 491 at arch/x86/kvm/x86.c:11594 kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 53.423439][ T36] audit: type=1400 audit(1760089032.510:113): avc: denied { read accept } for pid=490 comm="syz.2.17" path="socket:[4079]" dev="sockfs" ino=4079 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 53.432970][ T491] Modules linked in: [ 53.460362][ T491] CPU: 0 UID: 0 PID: 491 Comm: syz.2.17 Not tainted syzkaller #0 94c2bc47b0f974f8402b7894717478b63212456f [ 53.471702][ T491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 53.481813][ T491] RIP: 0010:kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 53.488263][ T491] Code: 7e 3b e8 34 28 6a 00 49 bd 00 00 00 00 00 fc ff df 4c 8b 7c 24 20 4c 8b 64 24 40 48 8b 5c 24 28 e9 26 fd ff ff e8 11 28 6a 00 <0f> 0b e9 e4 fc ff ff e8 05 28 6a 00 0f 0b e9 0e fd ff ff e8 f9 27 [ 53.507951][ T491] RSP: 0018:ffffc9000079f9c0 EFLAGS: 00010293 [ 53.514110][ T491] RAX: ffffffff811bd7ef RBX: ffff88811e008000 RCX: ffff88811c812600 [ 53.522155][ T491] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 53.530238][ T491] RBP: ffffc9000079fc70 R08: ffff88811c812607 R09: 1ffff110239024c0 [ 53.538225][ T491] R10: dffffc0000000000 R11: ffffed10239024c1 R12: ffff88811d6d2000 [ 53.546243][ T491] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff88811e008078 [ 53.554309][ T491] FS: 00007fd40d3eb6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 53.563331][ T491] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.569962][ T491] CR2: 000000005200000c CR3: 000000011ded8000 CR4: 00000000003526b0 [ 53.577956][ T491] Call Trace: [ 53.581290][ T491] [ 53.584234][ T491] ? __cfi_preempt_schedule+0x10/0x10 [ 53.589668][ T491] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 53.595698][ T491] ? try_to_wake_up+0xe40/0x1b00 [ 53.600697][ T491] ? plist_del+0x3e3/0x400 [ 53.605135][ T491] ? ioctl_has_perm+0x1aa/0x4d0 [ 53.610031][ T491] ? __asan_memcpy+0x5a/0x80 [ 53.614633][ T491] ? ioctl_has_perm+0x3e0/0x4d0 [ 53.619541][ T491] ? has_cap_mac_admin+0xd0/0xd0 [ 53.624501][ T491] ? __kasan_check_write+0x18/0x20 [ 53.629686][ T491] ? mutex_lock_killable+0x92/0x1c0 [ 53.634922][ T491] ? __cfi_mutex_lock_killable+0x10/0x10 [ 53.640630][ T491] ? __cfi_futex_wake+0x10/0x10 [ 53.645509][ T491] ? userfaultfd_unmap_complete+0x279/0x2d0 [ 53.651465][ T491] kvm_vcpu_ioctl+0x96f/0xee0 [ 53.656161][ T491] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 53.661396][ T491] ? down_write_killable+0xe9/0x2d0 [ 53.666614][ T491] ? do_futex+0x356/0x500 [ 53.670986][ T491] ? __cfi_do_futex+0x10/0x10 [ 53.675687][ T491] ? __kasan_check_write+0x18/0x20 [ 53.680935][ T491] ? user_return_notifier_unregister+0x14d/0x170 [ 53.687296][ T491] ? __fget_files+0x2c5/0x340 [ 53.692021][ T491] ? bpf_lsm_file_ioctl+0xd/0x20 [ 53.696994][ T491] ? security_file_ioctl+0x34/0xd0 [ 53.702207][ T491] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 53.707431][ T491] __se_sys_ioctl+0x135/0x1b0 [ 53.712156][ T491] __x64_sys_ioctl+0x7f/0xa0 [ 53.716794][ T491] x64_sys_call+0x1878/0x2ee0 [ 53.721550][ T491] do_syscall_64+0x58/0xf0 [ 53.725991][ T491] ? clear_bhb_loop+0x50/0xa0 [ 53.730896][ T491] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 53.736837][ T491] RIP: 0033:0x7fd40d58eba9 [ 53.741298][ T491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.761093][ T491] RSP: 002b:00007fd40d3eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 53.769608][ T491] RAX: ffffffffffffffda RBX: 00007fd40d7d5fa0 RCX: 00007fd40d58eba9 [ 53.777603][ T491] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 53.785626][ T491] RBP: 00007fd40d611e19 R08: 0000000000000000 R09: 0000000000000000 [ 53.793672][ T491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 53.801694][ T491] R13: 00007fd40d7d6038 R14: 00007fd40d7d5fa0 R15: 00007ffca3cdd048 [ 53.809743][ T491] [ 53.812765][ T491] ---[ end trace 0000000000000000 ]--- 2025/10/10 09:37:17 executed programs: 59 2025/10/10 09:37:22 executed programs: 130