Warning: Permanently added '10.128.1.10' (ED25519) to the list of known hosts. 2026/03/27 01:07:57 parsed 1 programs [ 45.512136][ T36] audit: type=1400 audit(1774573678.959:106): avc: denied { unlink } for pid=397 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 45.605452][ T397] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.413700][ T36] audit: type=1400 audit(1774573679.859:107): avc: denied { create } for pid=401 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 46.800119][ T428] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.807226][ T428] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.814447][ T428] bridge_slave_0: entered allmulticast mode [ 46.820595][ T428] bridge_slave_0: entered promiscuous mode [ 46.827199][ T428] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.834310][ T428] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.841399][ T428] bridge_slave_1: entered allmulticast mode [ 46.847521][ T428] bridge_slave_1: entered promiscuous mode [ 46.899384][ T428] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.906448][ T428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.913742][ T428] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.920776][ T428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.944463][ T340] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.952387][ T340] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.961326][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.968354][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.977165][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.984219][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.008533][ T428] veth0_vlan: entered promiscuous mode [ 47.018340][ T428] veth1_macvtap: entered promiscuous mode [ 47.072865][ T312] bridge_slave_1: left allmulticast mode [ 47.078546][ T312] bridge_slave_1: left promiscuous mode [ 47.084271][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.092386][ T312] bridge_slave_0: left allmulticast mode [ 47.098035][ T312] bridge_slave_0: left promiscuous mode [ 47.104176][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.243994][ T312] veth1_macvtap: left promiscuous mode [ 47.249551][ T312] veth0_vlan: left promiscuous mode [ 47.359387][ T36] audit: type=1401 audit(1774573680.799:108): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2026/03/27 01:08:01 executed programs: 0 [ 47.732584][ T461] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.739756][ T461] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.747090][ T461] bridge_slave_0: entered allmulticast mode [ 47.753495][ T461] bridge_slave_0: entered promiscuous mode [ 47.759765][ T461] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.766943][ T461] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.774075][ T461] bridge_slave_1: entered allmulticast mode [ 47.780268][ T461] bridge_slave_1: entered promiscuous mode [ 47.835794][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.842872][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.851818][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.858852][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.881234][ T461] veth0_vlan: entered promiscuous mode [ 47.890972][ T461] veth1_macvtap: entered promiscuous mode [ 47.916346][ T36] audit: type=1400 audit(1774573681.359:109): avc: denied { read write } for pid=465 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 47.918641][ T466] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 47.939670][ T36] audit: type=1400 audit(1774573681.359:110): avc: denied { open } for pid=465 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 47.979840][ T36] audit: type=1400 audit(1774573681.359:111): avc: denied { ioctl } for pid=465 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 48.083709][ T469] ------------[ cut here ]------------ [ 48.089189][ T469] WARNING: CPU: 1 PID: 469 at arch/x86/kvm/vmx/nested.c:4933 nested_vmx_vmexit+0x18d1/0x27c0 [ 48.099387][ T469] Modules linked in: [ 48.103361][ T469] CPU: 1 UID: 0 PID: 469 Comm: syz.2.18 Not tainted syzkaller #0 f22c2e89525c3fdbe641e21865ffd0f913464956 [ 48.114716][ T469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 48.124966][ T469] RIP: 0010:nested_vmx_vmexit+0x18d1/0x27c0 [ 48.130950][ T469] Code: 00 0f 85 47 03 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d e9 0f 3d 71 04 cc e8 19 85 55 00 e9 43 f6 ff ff e8 0f 85 55 00 <0f> 0b e9 38 e8 ff ff b8 00 44 00 00 0f 78 c0 0f 86 74 0e 00 00 89 [ 48.150588][ T469] RSP: 0018:ffffc90001aff3c0 EFLAGS: 00010293 [ 48.156813][ T469] RAX: ffffffff813225a1 RBX: ffff88811cf1a180 RCX: ffff88811aadb900 [ 48.164829][ T469] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff88811cf1be1c [ 48.172861][ T469] RBP: ffffc90001aff518 R08: ffff88811cf1a1bf R09: 1ffff110239e3437 [ 48.180880][ T469] R10: dffffc0000000000 R11: ffffed10239e3438 R12: ffff88811cf1a180 [ 48.188848][ T469] R13: dffffc0000000000 R14: ffff88811cf1be1b R15: ffff88811cf1a180 [ 48.196845][ T469] FS: 00007f8f0431a6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 48.205824][ T469] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.212470][ T469] CR2: 0000000000000000 CR3: 000000011e432000 CR4: 00000000003526b0 [ 48.220528][ T469] Call Trace: [ 48.223838][ T469] [ 48.226774][ T469] ? __calc_delta+0x280/0x280 [ 48.231489][ T469] ? update_entity_lag+0x28f/0x2c0 [ 48.236606][ T469] ? __cfi_nested_vmx_vmexit+0x10/0x10 [ 48.242106][ T469] ? kvm_service_local_tlb_flush_requests+0x51/0x150 [ 48.248788][ T469] nested_vmx_triple_fault+0x35/0x40 [ 48.254122][ T469] vcpu_run+0x2221/0x7840 [ 48.258452][ T469] ? __kasan_check_write+0x18/0x20 [ 48.263604][ T469] ? __cfi_update_misfit_status+0x10/0x10 [ 48.269341][ T469] ? signal_pending+0xc0/0xc0 [ 48.274094][ T469] ? __kasan_check_write+0x18/0x20 [ 48.279213][ T469] ? xfd_validate_state+0x68/0x140 [ 48.284372][ T469] ? fpu_swap_kvm_fpstate+0x92/0x5e0 [ 48.289657][ T469] ? __kasan_check_write+0x18/0x20 [ 48.294793][ T469] ? fpregs_mark_activate+0x68/0x160 [ 48.300079][ T469] ? fpu_swap_kvm_fpstate+0x44c/0x5e0 [ 48.305467][ T469] ? fpu_swap_kvm_fpstate+0x92/0x5e0 [ 48.310911][ T469] kvm_arch_vcpu_ioctl_run+0x1167/0x1bd0 [ 48.316557][ T469] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 48.322566][ T469] ? __futex_wait+0x33c/0x3e0 [ 48.327248][ T469] ? __cfi___futex_wait+0x10/0x10 [ 48.332323][ T469] ? ioctl_has_perm+0x1bc/0x500 [ 48.337173][ T469] ? __asan_memcpy+0x5a/0x80 [ 48.341781][ T469] ? ioctl_has_perm+0x408/0x500 [ 48.346628][ T469] ? has_cap_mac_admin+0xd0/0xd0 [ 48.351600][ T469] ? __kasan_check_write+0x18/0x20 [ 48.356710][ T469] ? mutex_lock_killable+0x97/0x1d0 [ 48.361934][ T469] ? __cfi_mutex_lock_killable+0x10/0x10 [ 48.367562][ T469] ? __cfi_futex_wait+0x10/0x10 [ 48.372424][ T469] kvm_vcpu_ioctl+0xa48/0x1000 [ 48.377200][ T469] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 48.382418][ T469] ? do_futex+0x32a/0x510 [ 48.386748][ T469] ? __cfi_do_futex+0x10/0x10 [ 48.391456][ T469] ? __fget_files+0x2c5/0x340 [ 48.396128][ T469] ? bpf_lsm_file_ioctl+0xd/0x20 [ 48.401089][ T469] ? security_file_ioctl+0x3e/0x110 [ 48.406286][ T469] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 48.411526][ T469] __se_sys_ioctl+0x132/0x1b0 [ 48.416205][ T469] __x64_sys_ioctl+0x7f/0xa0 [ 48.420812][ T469] x64_sys_call+0x1878/0x2ee0 [ 48.425499][ T469] do_syscall_64+0x57/0xf0 [ 48.429902][ T469] ? clear_bhb_loop+0x50/0xa0 [ 48.434614][ T469] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 48.440506][ T469] RIP: 0033:0x7f8f0339a679 [ 48.444956][ T469] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 48.464625][ T469] RSP: 002b:00007f8f0431a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 48.473077][ T469] RAX: ffffffffffffffda RBX: 00007f8f03605fa0 RCX: 00007f8f0339a679 [ 48.481219][ T469] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 48.489188][ T469] RBP: 00007f8f0342dee0 R08: 0000000000000000 R09: 0000000000000000 [ 48.497337][ T469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 48.505344][ T469] R13: 00007f8f03606038 R14: 00007f8f03605fa0 R15: 00007fffde893588 [ 48.513378][ T469] [ 48.516394][ T469] ---[ end trace 0000000000000000 ]--- 2026/03/27 01:08:06 executed programs: 66 2026/03/27 01:08:11 executed programs: 146