Warning: Permanently added '10.128.1.33' (ED25519) to the list of known hosts. 2026/05/08 15:32:14 parsed 1 programs [ 46.751438][ T36] audit: type=1400 audit(1778254335.150:106): avc: denied { unlink } for pid=420 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 46.812906][ T420] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.655057][ T36] audit: type=1400 audit(1778254336.050:107): avc: denied { create } for pid=430 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.752357][ T36] audit: type=1401 audit(1778254336.150:108): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 47.794947][ T439] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.802154][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.809229][ T439] bridge_slave_0: entered allmulticast mode [ 47.815704][ T439] bridge_slave_0: entered promiscuous mode [ 47.822405][ T439] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.829611][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.836703][ T439] bridge_slave_1: entered allmulticast mode [ 47.843262][ T439] bridge_slave_1: entered promiscuous mode [ 47.894576][ T439] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.901665][ T439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.908995][ T439] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.916034][ T439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.936578][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.944018][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.953540][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.960596][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.969261][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.976321][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.000624][ T439] veth0_vlan: entered promiscuous mode [ 48.010256][ T439] veth1_macvtap: entered promiscuous mode [ 48.085814][ T46] bridge_slave_1: left allmulticast mode [ 48.091508][ T46] bridge_slave_1: left promiscuous mode [ 48.097089][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.104617][ T46] bridge_slave_0: left allmulticast mode [ 48.110579][ T46] bridge_slave_0: left promiscuous mode [ 48.116183][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.253714][ T46] veth1_macvtap: left promiscuous mode [ 48.259223][ T46] veth0_vlan: left promiscuous mode 2026/05/08 15:32:17 executed programs: 0 [ 48.946053][ T485] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.953143][ T485] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.960198][ T485] bridge_slave_0: entered allmulticast mode [ 48.966640][ T485] bridge_slave_0: entered promiscuous mode [ 48.973031][ T485] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.980050][ T485] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.987180][ T485] bridge_slave_1: entered allmulticast mode [ 48.993341][ T485] bridge_slave_1: entered promiscuous mode [ 49.030805][ T485] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.037855][ T485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.045241][ T485] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.052298][ T485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.071783][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.078942][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.087753][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.094810][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.104944][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.112094][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.133526][ T485] veth0_vlan: entered promiscuous mode [ 49.143950][ T485] veth1_macvtap: entered promiscuous mode [ 49.169417][ T36] audit: type=1400 audit(1778254337.560:109): avc: denied { read write } for pid=489 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 49.171186][ T490] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 49.192472][ T36] audit: type=1400 audit(1778254337.560:110): avc: denied { open } for pid=489 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 49.233604][ T36] audit: type=1400 audit(1778254337.570:111): avc: denied { ioctl } for pid=489 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 49.382054][ T493] ------------[ cut here ]------------ [ 49.387638][ T493] WARNING: CPU: 0 PID: 493 at arch/x86/kvm/lapic.c:3398 kvm_apic_accept_events+0x361/0x480 [ 49.397865][ T493] Modules linked in: [ 49.402004][ T493] CPU: 0 UID: 0 PID: 493 Comm: syz.2.18 Not tainted syzkaller #0 5fd01cd42c7983fc76f99c580f7d331b14ea7f20 [ 49.413518][ T493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 49.423631][ T493] RIP: 0010:kvm_apic_accept_events+0x361/0x480 [ 49.429820][ T493] Code: 85 dd 00 00 00 41 c7 07 00 00 00 00 e9 62 fe ff ff e8 73 cc 63 00 e9 58 fe ff ff e8 69 cc 63 00 e9 4e fe ff ff e8 5f cc 63 00 <0f> 0b e9 28 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 48 fd ff [ 49.449657][ T493] RSP: 0018:ffffc900011cf500 EFLAGS: 00010293 [ 49.455771][ T493] RAX: ffffffff8123f041 RBX: 0000000000000000 RCX: ffff88811de99300 [ 49.463896][ T493] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000002 [ 49.472032][ T493] RBP: ffffc900011cf530 R08: ffff88811de99307 R09: 1ffff11023bd3260 [ 49.480105][ T493] R10: dffffc0000000000 R11: ffffed1023bd3261 R12: dffffc0000000000 [ 49.488140][ T493] R13: ffff88811e210000 R14: 0000000000000002 R15: 1ffff11023add040 [ 49.496198][ T493] FS: 00007f1ea07a96c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 49.505283][ T493] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.511916][ T493] CR2: 0000200000fe7008 CR3: 000000011e4ec000 CR4: 00000000003526b0 [ 49.520172][ T493] Call Trace: [ 49.523657][ T493] [ 49.526598][ T493] ? vcpu_run+0xa05/0x78e0 [ 49.531187][ T493] vcpu_run+0xb17/0x78e0 [ 49.535536][ T493] ? signal_pending+0xc0/0xc0 [ 49.540204][ T493] ? __kasan_check_write+0x18/0x20 [ 49.545340][ T493] ? xfd_validate_state+0x68/0x140 [ 49.550518][ T493] ? fpu_swap_kvm_fpstate+0x92/0x5e0 [ 49.555912][ T493] ? __kasan_check_write+0x18/0x20 [ 49.561045][ T493] ? fpregs_mark_activate+0x68/0x160 [ 49.566337][ T493] ? fpu_swap_kvm_fpstate+0x44c/0x5e0 [ 49.571785][ T493] ? fpu_swap_kvm_fpstate+0x92/0x5e0 [ 49.577083][ T493] kvm_arch_vcpu_ioctl_run+0x1167/0x1bd0 [ 49.582759][ T493] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 49.588899][ T493] ? __futex_wait+0x33c/0x3e0 [ 49.593600][ T493] ? __cfi___futex_wait+0x10/0x10 [ 49.598660][ T493] ? ioctl_has_perm+0x1bc/0x500 [ 49.603555][ T493] ? __asan_memcpy+0x5a/0x80 [ 49.608143][ T493] ? ioctl_has_perm+0x408/0x500 [ 49.613045][ T493] ? has_cap_mac_admin+0xd0/0xd0 [ 49.618110][ T493] ? __kasan_check_write+0x18/0x20 [ 49.623348][ T493] ? mutex_lock_killable+0x97/0x1d0 [ 49.628558][ T493] ? __cfi_mutex_lock_killable+0x10/0x10 [ 49.634492][ T493] kvm_vcpu_ioctl+0xa48/0x1000 [ 49.639257][ T493] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 49.644592][ T493] ? do_futex+0x32a/0x510 [ 49.648935][ T493] ? __cfi_do_futex+0x10/0x10 [ 49.653647][ T493] ? __fget_files+0x2c5/0x340 [ 49.658327][ T493] ? bpf_lsm_file_ioctl+0xd/0x20 [ 49.663294][ T493] ? security_file_ioctl+0x3e/0x110 [ 49.668502][ T493] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 49.673718][ T493] __se_sys_ioctl+0x132/0x1b0 [ 49.678402][ T493] __x64_sys_ioctl+0x7f/0xa0 [ 49.683056][ T493] x64_sys_call+0x1878/0x2ee0 [ 49.687735][ T493] do_syscall_64+0x57/0xf0 [ 49.692198][ T493] ? clear_bhb_loop+0x50/0xa0 [ 49.696881][ T493] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 49.702828][ T493] RIP: 0033:0x7f1e9f99a379 [ 49.707249][ T493] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 49.726892][ T493] RSP: 002b:00007f1ea07a9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 49.735428][ T493] RAX: ffffffffffffffda RBX: 00007f1e9fbf5fa0 RCX: 00007f1e9f99a379 [ 49.743426][ T493] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 49.751449][ T493] RBP: 00007f1e9fa2dd68 R08: 0000000000000000 R09: 0000000000000000 [ 49.759425][ T493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 49.767447][ T493] R13: 00007f1e9fbf6038 R14: 00007f1e9fbf5fa0 R15: 00007ffed863b5a8 [ 49.775542][ T493] [ 49.778572][ T493] ---[ end trace 0000000000000000 ]--- 2026/05/08 15:32:23 executed programs: 9