Warning: Permanently added '10.128.1.88' (ED25519) to the list of known hosts. 2025/09/19 03:22:20 parsed 1 programs [ 29.245018][ T36] audit: type=1400 audit(1758252140.320:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 30.850740][ T36] audit: type=1400 audit(1758252141.930:65): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.852378][ T297] cgroup: Unknown subsys name 'net' [ 30.873523][ T36] audit: type=1400 audit(1758252141.930:66): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.901206][ T36] audit: type=1400 audit(1758252141.970:67): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.901488][ T297] cgroup: Unknown subsys name 'devices' [ 31.070066][ T297] cgroup: Unknown subsys name 'hugetlb' [ 31.075766][ T297] cgroup: Unknown subsys name 'rlimit' [ 31.181880][ T36] audit: type=1400 audit(1758252142.260:68): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.205196][ T36] audit: type=1400 audit(1758252142.260:69): avc: denied { create } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.225664][ T36] audit: type=1400 audit(1758252142.260:70): avc: denied { write } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.246089][ T36] audit: type=1400 audit(1758252142.260:71): avc: denied { read } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.258479][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 31.266834][ T36] audit: type=1400 audit(1758252142.260:72): avc: denied { sys_module } for pid=297 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 31.296497][ T36] audit: type=1400 audit(1758252142.260:73): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 31.329729][ T297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 32.268630][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.888350][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.895644][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.902884][ T326] bridge_slave_0: entered allmulticast mode [ 32.909488][ T326] bridge_slave_0: entered promiscuous mode [ 32.915977][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.923097][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.930295][ T326] bridge_slave_1: entered allmulticast mode [ 32.936890][ T326] bridge_slave_1: entered promiscuous mode [ 32.995015][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.002160][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.009627][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.016779][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.038968][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.046288][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.056183][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.063290][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.073413][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.080521][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.106064][ T326] veth0_vlan: entered promiscuous mode [ 33.119360][ T326] veth1_macvtap: entered promiscuous mode [ 33.391519][ T13] bridge_slave_1: left allmulticast mode [ 33.397349][ T13] bridge_slave_1: left promiscuous mode [ 33.403038][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.411057][ T13] bridge_slave_0: left allmulticast mode [ 33.416746][ T13] bridge_slave_0: left promiscuous mode [ 33.424892][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.661854][ T13] veth1_macvtap: left promiscuous mode [ 33.667586][ T13] veth0_vlan: left promiscuous mode 2025/09/19 03:22:24 executed programs: 0 [ 34.053445][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.060709][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.067920][ T372] bridge_slave_0: entered allmulticast mode [ 34.074179][ T372] bridge_slave_0: entered promiscuous mode [ 34.080770][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.087873][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.095057][ T372] bridge_slave_1: entered allmulticast mode [ 34.102639][ T372] bridge_slave_1: entered promiscuous mode [ 34.192549][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.199661][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.206972][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.214099][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.241712][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.249414][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.260400][ T320] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.267700][ T320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.276999][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.284136][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.310743][ T372] veth0_vlan: entered promiscuous mode [ 34.322815][ T372] veth1_macvtap: entered promiscuous mode [ 34.353046][ T36] kauditd_printk_skb: 31 callbacks suppressed [ 34.353065][ T36] audit: type=1400 audit(1758252145.430:105): avc: denied { read write } for pid=382 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 34.356987][ T382] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 34.360184][ T36] audit: type=1400 audit(1758252145.430:106): avc: denied { open } for pid=382 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 34.423127][ T36] audit: type=1400 audit(1758252145.430:107): avc: denied { ioctl } for pid=382 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 34.502549][ T382] ------------[ cut here ]------------ [ 34.508134][ T382] WARNING: CPU: 1 PID: 382 at arch/x86/kvm/x86.c:8135 emulator_pio_in_out+0x38a/0x490 [ 34.517969][ T382] Modules linked in: [ 34.521926][ T382] CPU: 1 UID: 0 PID: 382 Comm: syz.2.17 Not tainted syzkaller #0 1113c6f757b896aae05d8aba828d71ec34ef4a9d [ 34.533304][ T382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 34.543515][ T382] RIP: 0010:emulator_pio_in_out+0x38a/0x490 [ 34.549642][ T382] Code: b6 04 38 84 c0 0f 85 ec 00 00 00 66 44 89 23 31 c0 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d e9 8c 04 71 04 cc e8 46 26 68 00 <0f> 0b e9 e6 fc ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c ff fd ff [ 34.569485][ T382] RSP: 0018:ffffc90001aef250 EFLAGS: 00010293 [ 34.575714][ T382] RAX: ffffffff811dc6da RBX: ffffc90001aef340 RCX: ffff8881157dcc00 [ 34.583784][ T382] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 34.592003][ T382] RBP: ffffc90001aef2b0 R08: 0000000000000001 R09: 0000000000000000 [ 34.600060][ T382] R10: 0000000000000000 R11: ffffffff812f9dd0 R12: 00000000000004d0 [ 34.608149][ T382] R13: 0000000000000001 R14: 0000000000000001 R15: ffff88811577caf8 [ 34.616156][ T382] FS: 0000555576a72500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 34.625211][ T382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.631876][ T382] CR2: 000000005200000c CR3: 0000000115b26000 CR4: 00000000003526b0 [ 34.639944][ T382] Call Trace: [ 34.643353][ T382] [ 34.646318][ T382] emulator_pio_out+0x41/0x150 [ 34.651206][ T382] kvm_fast_pio+0x141/0x5f0 [ 34.655856][ T382] ? __cfi_kvm_fast_pio+0x10/0x10 [ 34.661012][ T382] ? __cfi_nested_vmx_reflect_vmexit+0x10/0x10 [ 34.667407][ T382] ? clear_bhb_loop+0x50/0xa0 [ 34.672269][ T382] ? clear_bhb_loop+0x50/0xa0 [ 34.677053][ T382] ? clear_bhb_loop+0x50/0xa0 [ 34.681893][ T382] ? nmi_restore+0x13/0x33 [ 34.686346][ T382] handle_io+0xfe/0x150 [ 34.690612][ T382] ? __cfi_handle_io+0x10/0x10 [ 34.695402][ T382] vmx_handle_exit+0x12c5/0x1b40 [ 34.700465][ T382] ? kvm_deliver_exception_payload+0xd7/0x200 [ 34.706568][ T382] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 34.711966][ T382] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 34.717519][ T382] vcpu_run+0x481a/0x7260 [ 34.722026][ T382] ? signal_pending+0xc0/0xc0 [ 34.726834][ T382] ? x86_emulate_instruction+0x217/0x1870 [ 34.732677][ T382] ? __cfi_complete_emulated_pio+0x10/0x10 [ 34.738693][ T382] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 34.744388][ T382] ? kvm_vcpu_ioctl+0x7bb/0xee0 [ 34.749328][ T382] ? __se_sys_ioctl+0x135/0x1b0 [ 34.754251][ T382] ? __x64_sys_ioctl+0x7f/0xa0 [ 34.759086][ T382] ? x64_sys_call+0x1878/0x2ee0 [ 34.763990][ T382] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 34.770089][ T382] ? should_fail+0xf/0x20 [ 34.774463][ T382] ? get_futex_key+0x181/0x930 [ 34.779300][ T382] ? ioctl_has_perm+0x1aa/0x4d0 [ 34.784217][ T382] ? __asan_memcpy+0x5a/0x80 [ 34.788943][ T382] ? ioctl_has_perm+0x3e0/0x4d0 [ 34.793842][ T382] ? has_cap_mac_admin+0xd0/0xd0 [ 34.798919][ T382] ? __kasan_check_write+0x18/0x20 [ 34.804303][ T382] ? mutex_lock_killable+0x92/0x1c0 [ 34.809581][ T382] ? __cfi_mutex_lock_killable+0x10/0x10 [ 34.815280][ T382] ? __cfi_futex_wake+0x10/0x10 [ 34.820278][ T382] ? kvm_vcpu_ioctl+0x7bb/0xee0 [ 34.825154][ T382] kvm_vcpu_ioctl+0x96f/0xee0 [ 34.829910][ T382] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 34.835161][ T382] ? do_futex+0x356/0x500 [ 34.839688][ T382] ? __cfi_do_futex+0x10/0x10 [ 34.844583][ T382] ? __se_sys_futex+0x28f/0x300 [ 34.849506][ T382] ? bpf_lsm_file_ioctl+0xd/0x20 [ 34.854479][ T382] ? security_file_ioctl+0x34/0xd0 [ 34.859785][ T382] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 34.865048][ T382] __se_sys_ioctl+0x135/0x1b0 [ 34.869837][ T382] __x64_sys_ioctl+0x7f/0xa0 [ 34.874509][ T382] x64_sys_call+0x1878/0x2ee0 [ 34.879276][ T382] do_syscall_64+0x58/0xf0 [ 34.883747][ T382] ? clear_bhb_loop+0x50/0xa0 [ 34.888488][ T382] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 34.894483][ T382] RIP: 0033:0x7f145a58eba9 [ 34.899130][ T382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.918838][ T382] RSP: 002b:00007ffe9433ddf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 34.927316][ T382] RAX: ffffffffffffffda RBX: 00007f145a7d5fa0 RCX: 00007f145a58eba9 [ 34.935358][ T382] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 34.944099][ T382] RBP: 00007f145a611e19 R08: 0000000000000000 R09: 0000000000000000 [ 34.952271][ T382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 34.960502][ T382] R13: 00007f145a7d5fa0 R14: 00007f145a7d5fa0 R15: 0000000000000003 [ 34.968680][ T382] [ 34.971722][ T382] ---[ end trace 0000000000000000 ]---