Warning: Permanently added '10.128.1.164' (ED25519) to the list of known hosts. 2025/10/10 09:32:31 parsed 1 programs [ 46.203522][ T36] audit: type=1400 audit(1760088752.630:106): avc: denied { unlink } for pid=406 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 46.242424][ T406] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.221428][ T428] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.228584][ T428] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.235717][ T428] bridge_slave_0: entered allmulticast mode [ 47.242186][ T428] bridge_slave_0: entered promiscuous mode [ 47.255004][ T428] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.262238][ T428] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.269389][ T428] bridge_slave_1: entered allmulticast mode [ 47.275588][ T428] bridge_slave_1: entered promiscuous mode [ 47.309724][ T428] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.316916][ T428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.324347][ T428] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.331529][ T428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.353317][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.360752][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.369628][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.377058][ T318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.385840][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.393222][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.417831][ T428] veth0_vlan: entered promiscuous mode [ 47.427745][ T428] veth1_macvtap: entered promiscuous mode [ 47.580050][ T13] bridge_slave_1: left allmulticast mode [ 47.585753][ T13] bridge_slave_1: left promiscuous mode [ 47.593532][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.610618][ T13] bridge_slave_0: left allmulticast mode [ 47.616364][ T13] bridge_slave_0: left promiscuous mode [ 47.622755][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.741334][ T13] veth1_macvtap: left promiscuous mode [ 47.746940][ T13] veth0_vlan: left promiscuous mode [ 47.946267][ T36] audit: type=1401 audit(1760088754.370:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 48.097380][ T36] audit: type=1400 audit(1760088754.520:108): avc: denied { create } for pid=475 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2025/10/10 09:32:34 executed programs: 0 [ 48.311424][ T480] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.318664][ T480] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.325870][ T480] bridge_slave_0: entered allmulticast mode [ 48.332318][ T480] bridge_slave_0: entered promiscuous mode [ 48.345313][ T480] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.352506][ T480] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.359585][ T480] bridge_slave_1: entered allmulticast mode [ 48.365822][ T480] bridge_slave_1: entered promiscuous mode [ 48.403572][ T480] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.410860][ T480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.418231][ T480] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.425302][ T480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.442018][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.449249][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.459836][ T438] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.466959][ T438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.476147][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.483249][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.504048][ T480] veth0_vlan: entered promiscuous mode [ 48.513830][ T480] veth1_macvtap: entered promiscuous mode [ 48.540686][ T36] audit: type=1400 audit(1760088754.970:109): avc: denied { read write } for pid=490 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 48.558002][ T491] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 48.564343][ T36] audit: type=1400 audit(1760088754.970:110): avc: denied { open } for pid=490 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 48.606180][ T36] audit: type=1400 audit(1760088754.980:111): avc: denied { ioctl } for pid=490 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 48.682911][ T36] audit: type=1400 audit(1760088755.110:112): avc: denied { create } for pid=490 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.683741][ T491] ------------[ cut here ]------------ [ 48.702543][ T36] audit: type=1400 audit(1760088755.110:113): avc: denied { map } for pid=490 comm="syz.2.17" path="socket:[5363]" dev="sockfs" ino=5363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.708091][ T491] WARNING: CPU: 1 PID: 491 at arch/x86/kvm/x86.c:11594 kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 48.731806][ T36] audit: type=1400 audit(1760088755.110:114): avc: denied { read accept } for pid=490 comm="syz.2.17" path="socket:[5363]" dev="sockfs" ino=5363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.741328][ T491] Modules linked in: [ 48.741348][ T491] CPU: 1 UID: 0 PID: 491 Comm: syz.2.17 Not tainted syzkaller #0 99ac424b6ad3ef644dc27b428db21ed18fe101a9 [ 48.780534][ T491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 48.790935][ T491] RIP: 0010:kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 48.797623][ T491] Code: 7e 3b e8 34 28 6a 00 49 bd 00 00 00 00 00 fc ff df 4c 8b 7c 24 20 4c 8b 64 24 40 48 8b 5c 24 28 e9 26 fd ff ff e8 11 28 6a 00 <0f> 0b e9 e4 fc ff ff e8 05 28 6a 00 0f 0b e9 0e fd ff ff e8 f9 27 [ 48.817457][ T491] RSP: 0018:ffffc900007bf9c0 EFLAGS: 00010293 [ 48.823564][ T491] RAX: ffffffff811bd7ef RBX: ffff88811da02180 RCX: ffff88811da61300 [ 48.831667][ T491] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 48.839911][ T491] RBP: ffffc900007bfc70 R08: ffff88811da61307 R09: 1ffff11023b4c260 [ 48.847978][ T491] R10: dffffc0000000000 R11: ffffed1023b4c261 R12: ffff88811da35000 [ 48.856174][ T491] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff88811da021f8 [ 48.864187][ T491] FS: 00007f78493eb6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 48.873189][ T491] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.879774][ T491] CR2: 000000005200000c CR3: 000000011d79a000 CR4: 00000000003526b0 [ 48.887791][ T491] Call Trace: [ 48.891118][ T491] [ 48.894056][ T491] ? __cfi_preempt_schedule+0x10/0x10 [ 48.899533][ T491] ? activate_task+0x38b/0x3d0 [ 48.904549][ T491] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 48.910666][ T491] ? try_to_wake_up+0xe40/0x1b00 [ 48.915618][ T491] ? plist_del+0x3e3/0x400 [ 48.920168][ T491] ? ioctl_has_perm+0x1aa/0x4d0 [ 48.925123][ T491] ? __asan_memcpy+0x5a/0x80 [ 48.929710][ T491] ? ioctl_has_perm+0x3e0/0x4d0 [ 48.934803][ T491] ? has_cap_mac_admin+0xd0/0xd0 [ 48.940236][ T491] ? __kasan_check_write+0x18/0x20 [ 48.945358][ T491] ? mutex_lock_killable+0x92/0x1c0 [ 48.950649][ T491] ? __cfi_mutex_lock_killable+0x10/0x10 [ 48.956402][ T491] ? __cfi_futex_wake+0x10/0x10 [ 48.961454][ T491] ? userfaultfd_unmap_complete+0x279/0x2d0 [ 48.967558][ T491] kvm_vcpu_ioctl+0x96f/0xee0 [ 48.972428][ T491] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 48.977736][ T491] ? down_write_killable+0xe9/0x2d0 [ 48.983071][ T491] ? do_futex+0x356/0x500 [ 48.987423][ T491] ? __cfi_do_futex+0x10/0x10 [ 48.992127][ T491] ? __fget_files+0x2c5/0x340 [ 48.996839][ T491] ? bpf_lsm_file_ioctl+0xd/0x20 [ 49.001918][ T491] ? security_file_ioctl+0x34/0xd0 [ 49.007241][ T491] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 49.012479][ T491] __se_sys_ioctl+0x135/0x1b0 [ 49.017391][ T491] __x64_sys_ioctl+0x7f/0xa0 [ 49.022343][ T491] x64_sys_call+0x1878/0x2ee0 [ 49.027478][ T491] do_syscall_64+0x58/0xf0 [ 49.032058][ T491] ? clear_bhb_loop+0x50/0xa0 [ 49.036893][ T491] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 49.042913][ T491] RIP: 0033:0x7f784958eba9 [ 49.047334][ T491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.067202][ T491] RSP: 002b:00007f78493eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 49.075657][ T491] RAX: ffffffffffffffda RBX: 00007f78497d5fa0 RCX: 00007f784958eba9 [ 49.083746][ T491] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 49.091750][ T491] RBP: 00007f7849611e19 R08: 0000000000000000 R09: 0000000000000000 [ 49.099722][ T491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 49.107861][ T491] R13: 00007f78497d6038 R14: 00007f78497d5fa0 R15: 00007fff6d0065e8 [ 49.116126][ T491] [ 49.119260][ T491] ---[ end trace 0000000000000000 ]--- 2025/10/10 09:32:39 executed programs: 61 2025/10/10 09:32:44 executed programs: 143