Warning: Permanently added '10.128.0.116' (ED25519) to the list of known hosts. 2025/10/03 05:12:46 parsed 1 programs [ 50.883875][ T36] audit: type=1400 audit(1759468367.880:106): avc: denied { unlink } for pid=408 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.973726][ T408] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 52.316914][ T36] audit: type=1401 audit(1759468369.310:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 52.631990][ T452] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.639064][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.646543][ T452] bridge_slave_0: entered allmulticast mode [ 52.653164][ T452] bridge_slave_0: entered promiscuous mode [ 52.659627][ T452] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.666925][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.674156][ T452] bridge_slave_1: entered allmulticast mode [ 52.680413][ T452] bridge_slave_1: entered promiscuous mode [ 52.743991][ T452] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.751059][ T452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.758410][ T452] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.765518][ T452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.785906][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.793271][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.802861][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.810018][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.820304][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.827620][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.855016][ T452] veth0_vlan: entered promiscuous mode [ 52.866040][ T452] veth1_macvtap: entered promiscuous mode [ 52.923434][ T334] bridge_slave_1: left allmulticast mode [ 52.929210][ T334] bridge_slave_1: left promiscuous mode [ 52.935176][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.942866][ T334] bridge_slave_0: left allmulticast mode [ 52.948519][ T334] bridge_slave_0: left promiscuous mode [ 52.954602][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.138949][ T334] veth1_macvtap: left promiscuous mode [ 53.140858][ T36] audit: type=1400 audit(1759468370.130:108): avc: denied { create } for pid=473 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 53.144568][ T334] veth0_vlan: left promiscuous mode 2025/10/03 05:12:50 executed programs: 0 [ 53.426365][ T478] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.434153][ T478] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.441312][ T478] bridge_slave_0: entered allmulticast mode [ 53.447763][ T478] bridge_slave_0: entered promiscuous mode [ 53.454164][ T478] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.461198][ T478] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.468397][ T478] bridge_slave_1: entered allmulticast mode [ 53.474901][ T478] bridge_slave_1: entered promiscuous mode [ 53.544145][ T478] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.551236][ T478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.558580][ T478] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.565659][ T478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.589172][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.596589][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.606144][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.613241][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.622565][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.629644][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.658072][ T478] veth0_vlan: entered promiscuous mode [ 53.669335][ T478] veth1_macvtap: entered promiscuous mode [ 53.698487][ T36] audit: type=1400 audit(1759468370.690:109): avc: denied { read write } for pid=488 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.698996][ T489] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 53.721721][ T36] audit: type=1400 audit(1759468370.690:110): avc: denied { open } for pid=488 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.762728][ T36] audit: type=1400 audit(1759468370.690:111): avc: denied { ioctl } for pid=488 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 54.068739][ T493] ------------[ cut here ]------------ [ 54.074300][ T493] WARNING: CPU: 1 PID: 493 at arch/x86/kvm/x86.c:8135 emulator_pio_in_out+0x38a/0x490 [ 54.084042][ T493] Modules linked in: [ 54.087994][ T493] CPU: 1 UID: 0 PID: 493 Comm: syz.2.18 Not tainted syzkaller #0 59a49f97c47414cc408bce342be50f03c7220e39 [ 54.099528][ T493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 54.109666][ T493] RIP: 0010:emulator_pio_in_out+0x38a/0x490 [ 54.115658][ T493] Code: b6 04 38 84 c0 0f 85 ec 00 00 00 66 44 89 23 31 c0 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d e9 bc 9e 71 04 cc e8 56 33 68 00 <0f> 0b e9 e6 fc ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c ff fd ff [ 54.135520][ T493] RSP: 0018:ffffc9000081f290 EFLAGS: 00010293 [ 54.141684][ T493] RAX: ffffffff811dccaa RBX: ffffc9000081f360 RCX: ffff888113da5f00 [ 54.149695][ T493] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 54.157731][ T493] RBP: ffffc9000081f2f0 R08: 0000000000000001 R09: 0000000000000001 [ 54.165772][ T493] R10: 0000000000000000 R11: ffffffff812fa730 R12: 0000000000000006 [ 54.173805][ T493] R13: 0000000000000001 R14: 0000000000000001 R15: ffff88811da54af8 [ 54.181931][ T493] FS: 00007f0ca6ac66c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 54.191149][ T493] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 54.197800][ T493] CR2: 000000005200000c CR3: 00000001271f6000 CR4: 00000000003526b0 [ 54.205884][ T493] Call Trace: [ 54.209171][ T493] [ 54.212275][ T493] kvm_fast_pio+0x198/0x5f0 [ 54.216907][ T493] ? __cfi_kvm_fast_pio+0x10/0x10 [ 54.221978][ T493] ? __cfi_nested_vmx_reflect_vmexit+0x10/0x10 [ 54.228171][ T493] ? clear_bhb_loop+0x50/0xa0 [ 54.232940][ T493] ? clear_bhb_loop+0x50/0xa0 [ 54.237642][ T493] ? clear_bhb_loop+0x66/0xa0 [ 54.242370][ T493] handle_io+0xfe/0x150 [ 54.246579][ T493] ? __cfi_handle_io+0x10/0x10 [ 54.251366][ T493] vmx_handle_exit+0x12c2/0x1b40 [ 54.256407][ T493] ? kvm_deliver_exception_payload+0xd7/0x200 [ 54.262561][ T493] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 54.267616][ T493] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 54.273125][ T493] vcpu_run+0x4bd0/0x7830 [ 54.277512][ T493] ? signal_pending+0xc0/0xc0 [ 54.282270][ T493] ? x86_emulate_instruction+0x217/0x1870 [ 54.288025][ T493] ? __cfi_complete_emulated_pio+0x10/0x10 [ 54.293880][ T493] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 54.299564][ T493] ? __cfi___futex_queue+0x10/0x10 [ 54.304758][ T493] ? futex_wait_setup+0x1bc/0x260 [ 54.309831][ T493] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 54.316092][ T493] ? futex_unqueue+0x136/0x160 [ 54.320900][ T493] ? __futex_wait+0x218/0x2a0 [ 54.325676][ T493] ? ioctl_has_perm+0x1aa/0x4d0 [ 54.330583][ T493] ? __asan_memcpy+0x5a/0x80 [ 54.335235][ T493] ? ioctl_has_perm+0x3e0/0x4d0 [ 54.340143][ T493] ? has_cap_mac_admin+0xd0/0xd0 [ 54.345164][ T493] ? __kasan_check_write+0x18/0x20 [ 54.350316][ T493] ? mutex_lock_killable+0x92/0x1c0 [ 54.355589][ T493] ? __cfi_mutex_lock_killable+0x10/0x10 [ 54.361269][ T493] ? futex_wait+0x29a/0x7a0 [ 54.365923][ T493] ? __cfi_futex_wait+0x10/0x10 [ 54.370890][ T493] kvm_vcpu_ioctl+0x96f/0xee0 [ 54.375695][ T493] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 54.381115][ T493] ? do_futex+0x309/0x500 [ 54.385530][ T493] ? __cfi_do_futex+0x10/0x10 [ 54.390253][ T493] ? __fget_files+0x2c5/0x340 [ 54.395364][ T493] ? bpf_lsm_file_ioctl+0xd/0x20 [ 54.400340][ T493] ? security_file_ioctl+0x34/0xd0 [ 54.405691][ T493] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 54.411042][ T493] __se_sys_ioctl+0x132/0x1b0 [ 54.415887][ T493] __x64_sys_ioctl+0x7f/0xa0 [ 54.420552][ T493] x64_sys_call+0x1878/0x2ee0 [ 54.425293][ T493] do_syscall_64+0x58/0xf0 [ 54.429836][ T493] ? clear_bhb_loop+0x50/0xa0 [ 54.434661][ T493] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 54.440678][ T493] RIP: 0033:0x7f0ca5b8ebe9 [ 54.445163][ T493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.465115][ T493] RSP: 002b:00007f0ca6ac6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 54.473785][ T493] RAX: ffffffffffffffda RBX: 00007f0ca5dc5fa0 RCX: 00007f0ca5b8ebe9 [ 54.481916][ T493] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 54.490022][ T493] RBP: 00007f0ca5c11e19 R08: 0000000000000000 R09: 0000000000000000 [ 54.498165][ T493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 54.506282][ T493] R13: 00007f0ca5dc6038 R14: 00007f0ca5dc5fa0 R15: 00007ffe7e714d78 [ 54.514325][ T493] [ 54.517374][ T493] ---[ end trace 0000000000000000 ]--- 2025/10/03 05:12:55 executed programs: 35 2025/10/03 05:13:00 executed programs: 78