Warning: Permanently added '10.128.0.84' (ED25519) to the list of known hosts. 2026/02/26 01:49:15 parsed 1 programs [ 47.881959][ T30] audit: type=1400 audit(1772070556.308:105): avc: denied { unlink } for pid=397 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.972600][ T397] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 48.456252][ T30] audit: type=1401 audit(1772070556.878:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 48.519277][ T408] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.526598][ T408] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.534180][ T408] device bridge_slave_0 entered promiscuous mode [ 48.541238][ T408] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.548286][ T408] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.556188][ T408] device bridge_slave_1 entered promiscuous mode [ 48.603179][ T408] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.610364][ T408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.617733][ T408] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.624806][ T408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.643945][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.651742][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.659194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.666823][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.676709][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.685041][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.692092][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.700880][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.709424][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.716529][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.730127][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.739712][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.753743][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.766008][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.774294][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.782118][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.790876][ T408] device veth0_vlan entered promiscuous mode [ 48.801120][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.810358][ T408] device veth1_macvtap entered promiscuous mode [ 48.820431][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.830477][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.406871][ T322] device bridge_slave_1 left promiscuous mode [ 49.413116][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.420935][ T322] device bridge_slave_0 left promiscuous mode [ 49.427976][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.437969][ T322] device veth1_macvtap left promiscuous mode [ 49.444158][ T322] device veth0_vlan left promiscuous mode [ 49.618274][ T30] audit: type=1400 audit(1772070558.038:107): avc: denied { create } for pid=464 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2026/02/26 01:49:18 executed programs: 0 [ 49.889744][ T469] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.897029][ T469] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.904957][ T469] device bridge_slave_0 entered promiscuous mode [ 49.918670][ T469] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.925847][ T469] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.933737][ T469] device bridge_slave_1 entered promiscuous mode [ 49.994617][ T469] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.001837][ T469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.009107][ T469] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.016214][ T469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.039308][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.047100][ T432] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.055087][ T432] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.071783][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.079999][ T432] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.087065][ T432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.099594][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.108003][ T432] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.115099][ T432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.123916][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.139961][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.153257][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.171676][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.179857][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.187614][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.196176][ T469] device veth0_vlan entered promiscuous mode [ 50.206181][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.220645][ T469] device veth1_macvtap entered promiscuous mode [ 50.229916][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.240108][ T432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.269429][ T30] audit: type=1400 audit(1772070558.688:108): avc: denied { read } for pid=479 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 50.283464][ T480] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 50.293275][ T30] audit: type=1400 audit(1772070558.708:109): avc: denied { open } for pid=479 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 50.363475][ T30] audit: type=1400 audit(1772070558.708:110): avc: denied { ioctl } for pid=479 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=82 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 50.453576][ T485] general protection fault, probably for non-canonical address 0xe06ff51e000e0200: 0000 [#1] PREEMPT SMP KASAN [ 50.465348][ T485] KASAN: maybe wild-memory-access in range [0x037fc8f000701000-0x037fc8f000701007] [ 50.474778][ T485] CPU: 0 PID: 485 Comm: syz.2.18 Not tainted syzkaller #0 [ 50.482012][ T485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 50.492098][ T485] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 50.498060][ T485] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 1a 5c 50 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 74 8a 8f 00 4c 8b 33 31 ff 4c 89 [ 50.517874][ T485] RSP: 0018:ffffc90002477898 EFLAGS: 00010206 [ 50.523983][ T485] RAX: 006ff91e000e0200 RBX: 037fc8f000701000 RCX: ffff8881191d4f00 [ 50.532115][ T485] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f000701000 [ 50.540220][ T485] RBP: ffffc900024778d8 R08: 0000000000000003 R09: 0000000000000004 [ 50.548230][ T485] R10: dffffc0000000000 R11: fffff5200048ef28 R12: 0000000000000001 [ 50.556604][ T485] R13: 037fc8f000701000 R14: dffffc0000000000 R15: ffff88812cb10818 [ 50.564620][ T485] FS: 00007f7dd364e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 50.573589][ T485] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.580204][ T485] CR2: 0000200000fe9008 CR3: 0000000128d6a000 CR4: 00000000003526b0 [ 50.588211][ T485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.596218][ T485] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.604224][ T485] Call Trace: [ 50.607528][ T485] [ 50.610492][ T485] kvm_mmu_slot_gfn_write_protect+0x14a/0x270 [ 50.616857][ T485] kvm_arch_mmu_enable_log_dirty_pt_masked+0x10c/0x3d0 [ 50.623726][ T485] ? ____kasan_slab_free+0x125/0x160 [ 50.629028][ T485] ? __kasan_slab_free+0x11/0x20 [ 50.633973][ T485] kvm_reset_dirty_gfn+0x19d/0x210 [ 50.639101][ T485] kvm_dirty_ring_reset+0x72d/0x8b0 [ 50.644496][ T485] ? do_vfs_ioctl+0x1c19/0x1d80 [ 50.649367][ T485] kvm_vm_ioctl_reset_dirty_pages+0x1a3/0x3b0 [ 50.655548][ T485] kvm_vm_ioctl+0x3bd/0xb30 [ 50.660093][ T485] ? kvm_device_release+0x220/0x220 [ 50.665586][ T485] ? ioctl_has_perm+0x1b8/0x4f0 [ 50.670475][ T485] ? memcpy+0x56/0x70 [ 50.674536][ T485] ? ioctl_has_perm+0x414/0x4f0 [ 50.679453][ T485] ? __kasan_check_write+0x14/0x20 [ 50.684580][ T485] ? has_cap_mac_admin+0x370/0x370 [ 50.689707][ T485] ? kvm_vcpu_ioctl+0x739/0xc00 [ 50.694660][ T485] ? kvm_vcpu_ioctl+0xabb/0xc00 [ 50.699552][ T485] ? selinux_file_ioctl+0x3a0/0x4d0 [ 50.704852][ T485] ? selinux_file_alloc_security+0x120/0x120 [ 50.710855][ T485] ? __fget_files+0x2c4/0x320 [ 50.715632][ T485] ? security_file_ioctl+0x84/0xa0 [ 50.720771][ T485] ? kvm_device_release+0x220/0x220 [ 50.726071][ T485] __se_sys_ioctl+0x121/0x1a0 [ 50.730942][ T485] __x64_sys_ioctl+0x7b/0x90 [ 50.735551][ T485] x64_sys_call+0x2f/0x9a0 [ 50.739990][ T485] do_syscall_64+0x4c/0xa0 [ 50.744520][ T485] ? clear_bhb_loop+0x50/0xa0 [ 50.749209][ T485] ? clear_bhb_loop+0x50/0xa0 [ 50.753896][ T485] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 50.759807][ T485] RIP: 0033:0x7f7dd37e9539 [ 50.764242][ T485] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 50.783866][ T485] RSP: 002b:00007f7dd364e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 50.792292][ T485] RAX: ffffffffffffffda RBX: 00007f7dd3a54fa0 RCX: 00007f7dd37e9539 [ 50.800473][ T485] RDX: 0000000000000000 RSI: 000000000000aec7 RDI: 0000000000000004 [ 50.808454][ T485] RBP: 00007f7dd387cee0 R08: 0000000000000000 R09: 0000000000000000 [ 50.816649][ T485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 50.824635][ T485] R13: 00007f7dd3a55038 R14: 00007f7dd3a54fa0 R15: 00007ffdf024ada8 [ 50.832881][ T485] [ 50.835918][ T485] Modules linked in: [ 50.840062][ T485] ---[ end trace 915d081a7769152f ]--- [ 50.842507][ T30] audit: type=1400 audit(1772070558.878:111): avc: denied { write } for pid=484 comm="syz.2.18" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 50.845789][ T485] RIP: 0010:__rmap_write_protect+0x2d/0x3a0 [ 50.873957][ T485] Code: e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 41 89 f4 48 89 fb 49 be 00 00 00 00 00 fc ff df e8 1a 5c 50 00 48 89 d8 48 c1 e8 03 <42> 80 3c 30 00 74 08 48 89 df e8 74 8a 8f 00 4c 8b 33 31 ff 4c 89 [ 50.893667][ T485] RSP: 0018:ffffc90002477898 EFLAGS: 00010206 [ 50.899774][ T485] RAX: 006ff91e000e0200 RBX: 037fc8f000701000 RCX: ffff8881191d4f00 [ 50.907825][ T485] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 037fc8f000701000 [ 50.912454][ T30] audit: type=1400 audit(1772070559.328:112): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 50.915911][ T485] RBP: ffffc900024778d8 R08: 0000000000000003 R09: 0000000000000004 [ 50.945167][ T30] audit: type=1400 audit(1772070559.328:113): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 50.946458][ T485] R10: dffffc0000000000 R11: fffff5200048ef28 R12: 0000000000000001 [ 50.968145][ T30] audit: type=1400 audit(1772070559.328:114): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 50.976220][ T485] R13: 037fc8f000701000 R14: dffffc0000000000 R15: ffff88812cb10818 [ 51.005973][ T485] FS: 00007f7dd364e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 51.015287][ T485] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.021945][ T485] CR2: 0000200000fe9008 CR3: 0000000128d6a000 CR4: 00000000003526b0 [ 51.030202][ T485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 51.038222][ T485] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 51.046270][ T485] Kernel panic - not syncing: Fatal exception [ 51.052748][ T485] Kernel Offset: disabled [ 51.057175][ T485] Rebooting in 86400 seconds..