Warning: Permanently added '10.128.0.2' (ED25519) to the list of known hosts. 2025/10/01 01:39:17 parsed 1 programs [ 56.226883][ T36] audit: type=1400 audit(1759282759.100:106): avc: denied { unlink } for pid=407 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 56.356952][ T407] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 57.509311][ T424] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.516862][ T424] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.524152][ T424] bridge_slave_0: entered allmulticast mode [ 57.530550][ T424] bridge_slave_0: entered promiscuous mode [ 57.537191][ T424] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.544643][ T424] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.552616][ T424] bridge_slave_1: entered allmulticast mode [ 57.559057][ T424] bridge_slave_1: entered promiscuous mode [ 57.615475][ T424] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.622567][ T424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.630110][ T424] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.637225][ T424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.657897][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.665575][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.675894][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.683269][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.693237][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.700562][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.725346][ T424] veth0_vlan: entered promiscuous mode [ 57.736901][ T424] veth1_macvtap: entered promiscuous mode [ 57.803713][ T330] bridge_slave_1: left allmulticast mode [ 57.809502][ T330] bridge_slave_1: left promiscuous mode [ 57.816441][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.825002][ T330] bridge_slave_0: left allmulticast mode [ 57.830872][ T330] bridge_slave_0: left promiscuous mode [ 57.836808][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.990744][ T330] veth1_macvtap: left promiscuous mode [ 57.999765][ T330] veth0_vlan: left promiscuous mode [ 58.131307][ T36] audit: type=1401 audit(1759282761.000:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 58.448182][ T36] audit: type=1400 audit(1759282761.320:108): avc: denied { create } for pid=468 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2025/10/01 01:39:21 executed programs: 0 [ 58.825033][ T477] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.832575][ T477] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.839639][ T477] bridge_slave_0: entered allmulticast mode [ 58.846346][ T477] bridge_slave_0: entered promiscuous mode [ 58.853044][ T477] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.860085][ T477] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.867389][ T477] bridge_slave_1: entered allmulticast mode [ 58.873748][ T477] bridge_slave_1: entered promiscuous mode [ 58.930892][ T477] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.938112][ T477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.945454][ T477] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.952998][ T477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.976321][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.983810][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.994366][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.001578][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.011276][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.018368][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.043669][ T477] veth0_vlan: entered promiscuous mode [ 59.054906][ T477] veth1_macvtap: entered promiscuous mode [ 59.084459][ T36] audit: type=1400 audit(1759282761.960:109): avc: denied { read write } for pid=487 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 59.085609][ T488] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 59.107869][ T36] audit: type=1400 audit(1759282761.960:110): avc: denied { open } for pid=487 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 59.148776][ T36] audit: type=1400 audit(1759282761.960:111): avc: denied { ioctl } for pid=487 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 59.234515][ T489] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 59.302122][ T492] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 59.389243][ T495] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 59.517643][ T498] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 59.577583][ T501] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 59.677486][ T504] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 59.772090][ T507] ------------[ cut here ]------------ [ 59.777663][ T507] WARNING: CPU: 1 PID: 507 at arch/x86/kvm/vmx/vmx.c:6476 vmx_handle_exit+0x1309/0x1b40 [ 59.787707][ T507] Modules linked in: [ 59.791695][ T507] CPU: 1 UID: 0 PID: 507 Comm: syz.2.23 Not tainted syzkaller #0 5842c8f69aadb60d1a52d5f893b74e963ab2b809 [ 59.803156][ T507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 59.813469][ T507] RIP: 0010:vmx_handle_exit+0x1309/0x1b40 [ 59.819248][ T507] Code: 00 e9 64 fe ff ff e8 a6 82 57 00 48 89 df e8 0e e7 00 00 41 89 c6 e9 4f fe ff ff e8 91 82 57 00 e9 1a f5 ff ff e8 87 82 57 00 <0f> 0b 43 80 3c 2f 00 74 08 48 89 df e8 36 d6 ad 00 48 8b 3b 48 8d [ 59.838900][ T507] RSP: 0018:ffffc9000120f428 EFLAGS: 00010293 [ 59.845055][ T507] RAX: ffffffff812e7d79 RBX: ffff88811e96c300 RCX: ffff888114150000 [ 59.853087][ T507] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88811e96c300 [ 59.861172][ T507] RBP: ffffc9000120f510 R08: ffff88811e96c4b7 R09: 1ffff11023d2d896 [ 59.869461][ T507] R10: dffffc0000000000 R11: ffffed1023d2d897 R12: 0000000080000021 [ 59.877564][ T507] R13: dffffc0000000000 R14: ffffc900011aa921 R15: 1ffff11023d2d860 [ 59.885865][ T507] FS: 00007f1578aea6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 59.894859][ T507] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 59.901529][ T507] CR2: 0000000000000000 CR3: 000000011e174000 CR4: 00000000003526b0 [ 59.909704][ T507] Call Trace: [ 59.913069][ T507] [ 59.916030][ T507] ? vmx_prepare_switch_to_guest+0x5a7/0x7c0 [ 59.922236][ T507] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 59.927481][ T507] ? kvm_inject_page_fault+0x320/0x380 [ 59.933062][ T507] ? vmx_handle_exit_irqoff+0x4d/0x7a0 [ 59.938693][ T507] vcpu_run+0x4bd0/0x7830 [ 59.943156][ T507] ? signal_pending+0xc0/0xc0 [ 59.947868][ T507] ? __kasan_check_write+0x18/0x20 [ 59.953140][ T507] ? xfd_validate_state+0x68/0x150 [ 59.958310][ T507] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 59.964122][ T507] ? __kasan_check_write+0x18/0x20 [ 59.969289][ T507] ? fpregs_mark_activate+0x69/0x160 [ 59.974804][ T507] ? fpu_swap_kvm_fpstate+0x44d/0x5f0 [ 59.980298][ T507] ? __kasan_check_read+0x15/0x20 [ 59.985493][ T507] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 59.991198][ T507] ? __cfi___futex_queue+0x10/0x10 [ 59.996384][ T507] ? futex_wait_setup+0x1bc/0x260 [ 60.001563][ T507] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 60.007743][ T507] ? futex_unqueue+0x136/0x160 [ 60.012553][ T507] ? __futex_wait+0x218/0x2a0 [ 60.017264][ T507] ? ioctl_has_perm+0x1aa/0x4d0 [ 60.022245][ T507] ? __asan_memcpy+0x5a/0x80 [ 60.026860][ T507] ? ioctl_has_perm+0x3e0/0x4d0 [ 60.031870][ T507] ? has_cap_mac_admin+0xd0/0xd0 [ 60.036931][ T507] ? __kasan_check_write+0x18/0x20 [ 60.042364][ T507] ? mutex_lock_killable+0x92/0x1c0 [ 60.047704][ T507] ? __cfi_mutex_lock_killable+0x10/0x10 [ 60.053400][ T507] ? futex_wait+0x29a/0x7a0 [ 60.058119][ T507] ? __cfi_futex_wait+0x10/0x10 [ 60.063575][ T507] kvm_vcpu_ioctl+0x96f/0xee0 [ 60.068301][ T507] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 60.073590][ T507] ? __ia32_sys_rt_sigreturn+0x687/0x7a0 [ 60.079410][ T507] ? do_futex+0x309/0x500 [ 60.083811][ T507] ? __cfi_do_futex+0x10/0x10 [ 60.088536][ T507] ? __fget_files+0x2c5/0x340 [ 60.093377][ T507] ? bpf_lsm_file_ioctl+0xd/0x20 [ 60.098361][ T507] ? security_file_ioctl+0x34/0xd0 [ 60.103873][ T507] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 60.109214][ T507] __se_sys_ioctl+0x132/0x1b0 [ 60.114212][ T507] __x64_sys_ioctl+0x7f/0xa0 [ 60.118949][ T507] x64_sys_call+0x1878/0x2ee0 [ 60.124172][ T507] do_syscall_64+0x58/0xf0 [ 60.128627][ T507] ? clear_bhb_loop+0x50/0xa0 [ 60.133372][ T507] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 60.139338][ T507] RIP: 0033:0x7f1577b8eba9 [ 60.143988][ T507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.164008][ T507] RSP: 002b:00007f1578aea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 60.172499][ T507] RAX: ffffffffffffffda RBX: 00007f1577dd5fa0 RCX: 00007f1577b8eba9 [ 60.180522][ T507] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 60.188732][ T507] RBP: 00007f1577c11e19 R08: 0000000000000000 R09: 0000000000000000 [ 60.196875][ T507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 60.205044][ T507] R13: 00007f1577dd6038 R14: 00007f1577dd5fa0 R15: 00007ffced483ab8 [ 60.213209][ T507] [ 60.216310][ T507] ---[ end trace 0000000000000000 ]--- [ 60.342304][ T510] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 60.469692][ T514] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 60.572159][ T517] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 60.642160][ T520] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 2025/10/01 01:39:26 executed programs: 58 [ 64.258179][ T682] dump_vmcs: 52 callbacks suppressed [ 64.258198][ T682] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 64.355694][ T685] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 64.438386][ T688] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 64.491993][ T691] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 64.581283][ T694] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 64.679644][ T697] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 64.757422][ T700] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 64.842309][ T703] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 64.931584][ T706] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 65.027716][ T712] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 2025/10/01 01:39:31 executed programs: 133 [ 69.348984][ T905] dump_vmcs: 62 callbacks suppressed [ 69.349000][ T905] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 69.405892][ T908] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 69.485123][ T911] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 69.596999][ T914] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 69.641049][ T917] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 69.691353][ T920] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 69.747905][ T923] kvm_intel: set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state.