Warning: Permanently added '10.128.0.170' (ED25519) to the list of known hosts. 2026/04/14 03:25:25 parsed 1 programs [ 46.475754][ T30] audit: type=1400 audit(1776137126.838:105): avc: denied { unlink } for pid=388 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 46.559463][ T388] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.172031][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.179495][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.187079][ T403] device bridge_slave_0 entered promiscuous mode [ 47.194569][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.202356][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.209817][ T403] device bridge_slave_1 entered promiscuous mode [ 47.256463][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.263528][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.270927][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.278021][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.298252][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.306046][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.313760][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.321452][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.332565][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.341053][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.348355][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.357898][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.366565][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.374117][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.387587][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.396797][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.410999][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.424049][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.432466][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.440423][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.448923][ T403] device veth0_vlan entered promiscuous mode [ 47.460957][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.470980][ T403] device veth1_macvtap entered promiscuous mode [ 47.480735][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.492580][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.077374][ T8] device bridge_slave_1 left promiscuous mode [ 48.083916][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.091727][ T8] device bridge_slave_0 left promiscuous mode [ 48.098267][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.106773][ T8] device veth1_macvtap left promiscuous mode [ 48.112959][ T8] device veth0_vlan left promiscuous mode [ 48.206638][ T30] audit: type=1401 audit(1776137128.568:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2026/04/14 03:25:28 executed programs: 0 [ 48.422846][ T453] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.430686][ T453] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.439189][ T453] device bridge_slave_0 entered promiscuous mode [ 48.446268][ T453] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.453335][ T453] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.460988][ T453] device bridge_slave_1 entered promiscuous mode [ 48.508571][ T453] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.515686][ T453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.523060][ T453] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.530181][ T453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.550870][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.559198][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.567385][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.577959][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.587645][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.594697][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.603903][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.612595][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.619821][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.632077][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.641489][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.655358][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.667976][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.676728][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.684278][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.693286][ T453] device veth0_vlan entered promiscuous mode [ 48.704099][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.713565][ T453] device veth1_macvtap entered promiscuous mode [ 48.723146][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.733408][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.759039][ T30] audit: type=1400 audit(1776137129.118:107): avc: denied { read } for pid=457 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 48.760601][ T458] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 48.782698][ T30] audit: type=1400 audit(1776137129.118:108): avc: denied { open } for pid=457 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 48.821070][ T30] audit: type=1400 audit(1776137129.118:109): avc: denied { ioctl } for pid=457 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=82 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 48.879749][ T30] audit: type=1400 audit(1776137129.238:110): avc: denied { write } for pid=461 comm="syz.2.18" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 48.903556][ T462] general protection fault, probably for non-canonical address 0xe06ff51e00029a00: 0000 [#1] PREEMPT SMP KASAN [ 48.915530][ T462] KASAN: maybe wild-memory-access in range [0x037fc8f00014d000-0x037fc8f00014d007] [ 48.924976][ T462] CPU: 0 PID: 462 Comm: syz.2.18 Not tainted syzkaller #0 [ 48.932197][ T462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 48.942256][ T462] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 48.948168][ T462] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 fa 55 50 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 94 84 8f 00 4c 8b 33 31 ff 4c 89 [ 48.968515][ T462] RSP: 0018:ffffc90000a57898 EFLAGS: 00010206 [ 48.974801][ T462] RAX: 006ff91e00029a00 RBX: 037fc8f00014d000 RCX: ffff8881181a3b40 [ 48.982872][ T462] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f00014d000 [ 48.991525][ T462] RBP: ffffc90000a578d8 R08: 0000000000000003 R09: 0000000000000004 [ 48.999680][ T462] R10: dffffc0000000000 R11: fffff5200014af28 R12: 0000000000000001 [ 49.007661][ T462] R13: 037fc8f00014d000 R14: dffffc0000000000 R15: ffff888117c50818 [ 49.016101][ T462] FS: 00007fc2941126c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 49.025592][ T462] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.032328][ T462] CR2: 0000200000fe9008 CR3: 000000011efd2000 CR4: 00000000003526b0 [ 49.040327][ T462] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.048447][ T462] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.056686][ T462] Call Trace: [ 49.060328][ T462] [ 49.063445][ T462] ? __schedule+0xb76/0x14c0 [ 49.068673][ T462] kvm_mmu_slot_gfn_write_protect+0x14a/0x270 [ 49.074866][ T462] kvm_arch_mmu_enable_log_dirty_pt_masked+0x10c/0x3d0 [ 49.082748][ T462] kvm_reset_dirty_gfn+0x19d/0x210 [ 49.088222][ T462] kvm_dirty_ring_reset+0x72d/0x8b0 [ 49.093765][ T462] kvm_vm_ioctl_reset_dirty_pages+0x1a3/0x3b0 [ 49.100162][ T462] kvm_vm_ioctl+0x3bd/0xb30 [ 49.105115][ T462] ? kvm_device_release+0x220/0x220 [ 49.110872][ T462] ? ioctl_has_perm+0x1b8/0x4f0 [ 49.115965][ T462] ? memcpy+0x56/0x70 [ 49.119972][ T462] ? ioctl_has_perm+0x414/0x4f0 [ 49.124843][ T462] ? __kasan_check_write+0x14/0x20 [ 49.130622][ T462] ? has_cap_mac_admin+0x370/0x370 [ 49.136125][ T462] ? kvm_vcpu_ioctl+0x739/0xc00 [ 49.140997][ T462] ? kvm_vcpu_ioctl+0xabb/0xc00 [ 49.146056][ T462] ? selinux_file_ioctl+0x3a0/0x4d0 [ 49.151276][ T462] ? selinux_file_alloc_security+0x120/0x120 [ 49.157458][ T462] ? __fget_files+0x2c4/0x320 [ 49.162242][ T462] ? security_file_ioctl+0x84/0xa0 [ 49.167405][ T462] ? kvm_device_release+0x220/0x220 [ 49.172635][ T462] __se_sys_ioctl+0x121/0x1a0 [ 49.177328][ T462] __x64_sys_ioctl+0x7b/0x90 [ 49.182107][ T462] x64_sys_call+0x2f/0x9a0 [ 49.186540][ T462] do_syscall_64+0x4c/0xa0 [ 49.191001][ T462] ? clear_bhb_loop+0x50/0xa0 [ 49.195685][ T462] ? clear_bhb_loop+0x50/0xa0 [ 49.200579][ T462] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 49.206830][ T462] RIP: 0033:0x7fc2942ad539 [ 49.211257][ T462] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 49.230869][ T462] RSP: 002b:00007fc294112028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 49.239460][ T462] RAX: ffffffffffffffda RBX: 00007fc294518fa0 RCX: 00007fc2942ad539 [ 49.247712][ T462] RDX: 0000000000000000 RSI: 000000000000aec7 RDI: 0000000000000004 [ 49.256138][ T462] RBP: 00007fc294340ee0 R08: 0000000000000000 R09: 0000000000000000 [ 49.264310][ T462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 49.272749][ T462] R13: 00007fc294519038 R14: 00007fc294518fa0 R15: 00007fff903e1f38 [ 49.281307][ T462] [ 49.284541][ T462] Modules linked in: [ 49.288966][ T462] ---[ end trace 281d0e2d0998fb0d ]--- [ 49.294739][ T462] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 49.301682][ T462] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 fa 55 50 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 94 84 8f 00 4c 8b 33 31 ff 4c 89 [ 49.322024][ T462] RSP: 0018:ffffc90000a57898 EFLAGS: 00010206 [ 49.328273][ T462] RAX: 006ff91e00029a00 RBX: 037fc8f00014d000 RCX: ffff8881181a3b40 [ 49.328774][ T30] audit: type=1400 audit(1776137129.658:111): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 49.336544][ T462] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f00014d000 [ 49.362952][ T30] audit: type=1400 audit(1776137129.658:112): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.366981][ T462] RBP: ffffc90000a578d8 R08: 0000000000000003 R09: 0000000000000004 [ 49.388874][ T30] audit: type=1400 audit(1776137129.658:113): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.397460][ T462] R10: dffffc0000000000 R11: fffff5200014af28 R12: 0000000000000001 [ 49.421103][ T30] audit: type=1400 audit(1776137129.658:114): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 49.426652][ T462] R13: 037fc8f00014d000 R14: dffffc0000000000 R15: ffff888117c50818 [ 49.456765][ T462] FS: 00007fc2941126c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 49.466455][ T462] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.473224][ T462] CR2: 0000200000fe9008 CR3: 000000011efd2000 CR4: 00000000003526b0 [ 49.481389][ T462] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 49.489653][ T462] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 49.498041][ T462] Kernel panic - not syncing: Fatal exception [ 49.504824][ T462] Kernel Offset: disabled [ 49.509613][ T462] Rebooting in 86400 seconds..