Warning: Permanently added '10.128.1.132' (ED25519) to the list of known hosts. 2025/10/10 09:41:49 parsed 1 programs [ 48.209408][ T36] audit: type=1400 audit(1760089310.200:106): avc: denied { unlink } for pid=405 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 48.242873][ T405] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 49.530199][ T426] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.537524][ T426] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.544934][ T426] bridge_slave_0: entered allmulticast mode [ 49.551287][ T426] bridge_slave_0: entered promiscuous mode [ 49.557534][ T426] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.564622][ T426] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.571753][ T426] bridge_slave_1: entered allmulticast mode [ 49.578432][ T426] bridge_slave_1: entered promiscuous mode [ 49.633852][ T426] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.640922][ T426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.648216][ T426] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.655416][ T426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.678190][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.685462][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.698622][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.705785][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.713500][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.720549][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.742829][ T426] veth0_vlan: entered promiscuous mode [ 49.752740][ T426] veth1_macvtap: entered promiscuous mode [ 49.814864][ T308] bridge_slave_1: left allmulticast mode [ 49.821888][ T308] bridge_slave_1: left promiscuous mode [ 49.828960][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.836888][ T308] bridge_slave_0: left allmulticast mode [ 49.842650][ T308] bridge_slave_0: left promiscuous mode [ 49.848415][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.941575][ T308] veth1_macvtap: left promiscuous mode [ 49.948780][ T308] veth0_vlan: left promiscuous mode [ 49.996956][ T36] audit: type=1401 audit(1760089311.980:107): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 50.188550][ T36] audit: type=1400 audit(1760089312.180:108): avc: denied { create } for pid=465 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2025/10/10 09:41:52 executed programs: 0 [ 50.508266][ T476] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.515363][ T476] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.522662][ T476] bridge_slave_0: entered allmulticast mode [ 50.529172][ T476] bridge_slave_0: entered promiscuous mode [ 50.542090][ T476] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.549344][ T476] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.556412][ T476] bridge_slave_1: entered allmulticast mode [ 50.562997][ T476] bridge_slave_1: entered promiscuous mode [ 50.629480][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.636557][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.645533][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.652606][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.679715][ T476] veth0_vlan: entered promiscuous mode [ 50.690328][ T476] veth1_macvtap: entered promiscuous mode [ 50.717088][ T36] audit: type=1400 audit(1760089312.700:109): avc: denied { read write } for pid=486 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 50.717513][ T487] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 50.740641][ T36] audit: type=1400 audit(1760089312.700:110): avc: denied { open } for pid=486 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 50.780223][ T36] audit: type=1400 audit(1760089312.700:111): avc: denied { ioctl } for pid=486 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 50.806288][ T36] audit: type=1400 audit(1760089312.800:112): avc: denied { create } for pid=486 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 50.826183][ T36] audit: type=1400 audit(1760089312.800:113): avc: denied { map } for pid=486 comm="syz.2.17" path="socket:[4496]" dev="sockfs" ino=4496 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 50.849265][ T36] audit: type=1400 audit(1760089312.800:114): avc: denied { read accept } for pid=486 comm="syz.2.17" path="socket:[4496]" dev="sockfs" ino=4496 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 50.991441][ T490] ------------[ cut here ]------------ [ 50.996961][ T490] WARNING: CPU: 1 PID: 490 at arch/x86/kvm/x86.c:11594 kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 51.007216][ T490] Modules linked in: [ 51.011267][ T490] CPU: 1 UID: 0 PID: 490 Comm: syz.2.18 Not tainted syzkaller #0 1eb082dec01f1a708618a99553d1fa56dfdd3bde [ 51.022816][ T490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 51.033139][ T490] RIP: 0010:kvm_arch_vcpu_ioctl_run+0x12af/0x1aa0 [ 51.039649][ T490] Code: 7e 3b e8 34 28 6a 00 49 bd 00 00 00 00 00 fc ff df 4c 8b 7c 24 20 4c 8b 64 24 40 48 8b 5c 24 28 e9 26 fd ff ff e8 11 28 6a 00 <0f> 0b e9 e4 fc ff ff e8 05 28 6a 00 0f 0b e9 0e fd ff ff e8 f9 27 [ 51.059443][ T490] RSP: 0018:ffffc9000081f9c0 EFLAGS: 00010293 [ 51.065530][ T490] RAX: ffffffff811bd7ef RBX: ffff888126790000 RCX: ffff88811d253900 [ 51.073580][ T490] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 51.081828][ T490] RBP: ffffc9000081fc70 R08: ffff88811d253907 R09: 1ffff11023a4a720 [ 51.089869][ T490] R10: dffffc0000000000 R11: ffffed1023a4a721 R12: ffff88811cd45000 [ 51.097891][ T490] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff888126790078 [ 51.105878][ T490] FS: 00007f64dd9da6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 51.114893][ T490] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.121531][ T490] CR2: 000000005200000c CR3: 000000011d02e000 CR4: 00000000003526b0 [ 51.129593][ T490] Call Trace: [ 51.132884][ T490] [ 51.135897][ T490] ? __cfi___futex_queue+0x10/0x10 [ 51.141126][ T490] ? futex_wait_setup+0x1bc/0x260 [ 51.146170][ T490] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 51.152371][ T490] ? futex_unqueue+0x136/0x160 [ 51.157165][ T490] ? __futex_wait+0x218/0x2a0 [ 51.161871][ T490] ? ioctl_has_perm+0x1aa/0x4d0 [ 51.166739][ T490] ? __asan_memcpy+0x5a/0x80 [ 51.171378][ T490] ? ioctl_has_perm+0x3e0/0x4d0 [ 51.176250][ T490] ? has_cap_mac_admin+0xd0/0xd0 [ 51.181327][ T490] ? __kasan_check_write+0x18/0x20 [ 51.186464][ T490] ? mutex_lock_killable+0x92/0x1c0 [ 51.191710][ T490] ? __cfi_mutex_lock_killable+0x10/0x10 [ 51.197387][ T490] ? futex_wait+0x29a/0x7a0 [ 51.201958][ T490] ? __cfi_futex_wait+0x10/0x10 [ 51.206881][ T490] ? userfaultfd_unmap_complete+0x279/0x2d0 [ 51.212839][ T490] kvm_vcpu_ioctl+0x96f/0xee0 [ 51.217632][ T490] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 51.222897][ T490] ? down_write_killable+0xe9/0x2d0 [ 51.228151][ T490] ? do_futex+0x309/0x500 [ 51.232483][ T490] ? __cfi_do_futex+0x10/0x10 [ 51.237682][ T490] ? __fget_files+0x2c5/0x340 [ 51.242424][ T490] ? bpf_lsm_file_ioctl+0xd/0x20 [ 51.247622][ T490] ? security_file_ioctl+0x34/0xd0 [ 51.252783][ T490] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 51.258101][ T490] __se_sys_ioctl+0x135/0x1b0 [ 51.262781][ T490] __x64_sys_ioctl+0x7f/0xa0 [ 51.267385][ T490] x64_sys_call+0x1878/0x2ee0 [ 51.272241][ T490] do_syscall_64+0x58/0xf0 [ 51.276679][ T490] ? clear_bhb_loop+0x50/0xa0 [ 51.281400][ T490] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 51.287318][ T490] RIP: 0033:0x7f64dcb8ebe9 [ 51.291784][ T490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.311470][ T490] RSP: 002b:00007f64dd9da038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 51.320009][ T490] RAX: ffffffffffffffda RBX: 00007f64dcdc5fa0 RCX: 00007f64dcb8ebe9 [ 51.328153][ T490] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 51.336194][ T490] RBP: 00007f64dcc11e19 R08: 0000000000000000 R09: 0000000000000000 [ 51.344363][ T490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 51.352410][ T490] R13: 00007f64dcdc6038 R14: 00007f64dcdc5fa0 R15: 00007ffc7d993898 [ 51.360434][ T490] [ 51.363460][ T490] ---[ end trace 0000000000000000 ]--- 2025/10/10 09:41:57 executed programs: 63 2025/10/10 09:42:02 executed programs: 139