Warning: Permanently added '10.128.1.180' (ED25519) to the list of known hosts. 2026/02/17 06:47:01 parsed 1 programs [ 50.179664][ T36] audit: type=1400 audit(1771310823.150:106): avc: denied { unlink } for pid=403 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 50.267623][ T403] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 51.806337][ T442] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.813476][ T442] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.820702][ T442] bridge_slave_0: entered allmulticast mode [ 51.827004][ T442] bridge_slave_0: entered promiscuous mode [ 51.833711][ T442] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.840813][ T442] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.848076][ T442] bridge_slave_1: entered allmulticast mode [ 51.854526][ T442] bridge_slave_1: entered promiscuous mode [ 51.922224][ T442] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.929334][ T442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.936684][ T442] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.943787][ T442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.965051][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.972585][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.985452][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.992621][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.002065][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.009163][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.038320][ T442] veth0_vlan: entered promiscuous mode [ 52.049975][ T442] veth1_macvtap: entered promiscuous mode [ 52.100966][ T309] bridge_slave_1: left allmulticast mode [ 52.106660][ T309] bridge_slave_1: left promiscuous mode [ 52.112370][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.120732][ T309] bridge_slave_0: left allmulticast mode [ 52.126476][ T309] bridge_slave_0: left promiscuous mode [ 52.132387][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.217736][ T36] audit: type=1400 audit(1771310825.180:107): avc: denied { create } for pid=459 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 52.242465][ T309] veth1_macvtap: left promiscuous mode [ 52.249248][ T309] veth0_vlan: left promiscuous mode [ 52.451303][ T36] audit: type=1401 audit(1771310825.420:108): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2026/02/17 06:47:05 executed programs: 0 [ 52.751379][ T473] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.758497][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.765565][ T473] bridge_slave_0: entered allmulticast mode [ 52.772004][ T473] bridge_slave_0: entered promiscuous mode [ 52.778612][ T473] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.785648][ T473] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.792786][ T473] bridge_slave_1: entered allmulticast mode [ 52.799193][ T473] bridge_slave_1: entered promiscuous mode [ 52.894033][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.901134][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.910340][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.917414][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.948649][ T473] veth0_vlan: entered promiscuous mode [ 52.960219][ T473] veth1_macvtap: entered promiscuous mode [ 52.990051][ T36] audit: type=1400 audit(1771310825.960:109): avc: denied { read write } for pid=483 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 52.990222][ T484] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 53.014205][ T36] audit: type=1400 audit(1771310825.960:110): avc: denied { open } for pid=483 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.054336][ T36] audit: type=1400 audit(1771310825.960:111): avc: denied { ioctl } for pid=483 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 2026/02/17 06:47:10 executed programs: 58 [ 58.139445][ T682] ------------[ cut here ]------------ [ 58.144950][ T682] WARNING: CPU: 0 PID: 682 at arch/x86/kvm/vmx/nested.c:4933 nested_vmx_vmexit+0x18d1/0x27c0 [ 58.155191][ T682] Modules linked in: [ 58.159360][ T682] CPU: 0 UID: 0 PID: 682 Comm: syz.2.81 Not tainted syzkaller #0 12d0ae2734ecdd77b90b0fcefc223fd004811bea [ 58.170786][ T682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 58.181041][ T682] RIP: 0010:nested_vmx_vmexit+0x18d1/0x27c0 [ 58.186990][ T682] Code: 00 0f 85 47 03 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d e9 0f 1a 6f 04 cc e8 39 77 55 00 e9 43 f6 ff ff e8 2f 77 55 00 <0f> 0b e9 38 e8 ff ff b8 00 44 00 00 0f 78 c0 0f 86 74 0e 00 00 89 [ 58.206666][ T682] RSP: 0018:ffffc90000fef3c0 EFLAGS: 00010293 [ 58.212800][ T682] RAX: ffffffff81322621 RBX: ffff88812777a180 RCX: ffff888123091300 [ 58.220845][ T682] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff88812777be1c [ 58.228924][ T682] RBP: ffffc90000fef518 R08: ffff88812777a1bf R09: 1ffff11024eef437 [ 58.236924][ T682] R10: dffffc0000000000 R11: ffffed1024eef438 R12: ffff88812777a180 [ 58.245413][ T682] R13: dffffc0000000000 R14: ffff88812777be1b R15: ffff88812777a180 [ 58.253580][ T682] FS: 00007ff385d076c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 58.262679][ T682] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 58.269329][ T682] CR2: 0000000000000000 CR3: 00000001087ac000 CR4: 00000000003526b0 [ 58.277336][ T682] Call Trace: [ 58.280684][ T682] [ 58.283643][ T682] ? __calc_delta+0x280/0x280 [ 58.288445][ T682] ? __cfi_nested_vmx_vmexit+0x10/0x10 [ 58.293946][ T682] ? kvm_service_local_tlb_flush_requests+0x61/0x150 [ 58.300784][ T682] nested_vmx_triple_fault+0x35/0x40 [ 58.306142][ T682] vcpu_run+0x2221/0x7840 [ 58.310546][ T682] ? vmx_set_nmi_mask+0xb2/0x280 [ 58.315521][ T682] ? __cfi_update_misfit_status+0x10/0x10 [ 58.321439][ T682] ? signal_pending+0xc0/0xc0 [ 58.326154][ T682] ? __kasan_check_write+0x18/0x20 [ 58.331430][ T682] ? xfd_validate_state+0x68/0x140 [ 58.336586][ T682] ? fpu_swap_kvm_fpstate+0x92/0x5e0 [ 58.341934][ T682] ? __kasan_check_write+0x18/0x20 [ 58.347156][ T682] ? fpregs_mark_activate+0x68/0x160 [ 58.352712][ T682] ? fpu_swap_kvm_fpstate+0x44c/0x5e0 [ 58.358160][ T682] ? fpu_swap_kvm_fpstate+0x92/0x5e0 [ 58.363471][ T682] kvm_arch_vcpu_ioctl_run+0x1167/0x1bd0 [ 58.369166][ T682] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 58.375176][ T682] ? __futex_wait+0x33c/0x3e0 [ 58.380062][ T682] ? __cfi___futex_wait+0x10/0x10 [ 58.385145][ T682] ? ioctl_has_perm+0x1bc/0x500 [ 58.390054][ T682] ? __asan_memcpy+0x5a/0x80 [ 58.394758][ T682] ? ioctl_has_perm+0x408/0x500 [ 58.399775][ T682] ? has_cap_mac_admin+0xd0/0xd0 [ 58.404735][ T682] ? __kasan_check_write+0x18/0x20 [ 58.409952][ T682] ? mutex_lock_killable+0x97/0x1d0 [ 58.415282][ T682] ? __cfi_mutex_lock_killable+0x10/0x10 [ 58.420981][ T682] ? __cfi_futex_wait+0x10/0x10 [ 58.425865][ T682] kvm_vcpu_ioctl+0xa48/0x1000 [ 58.430743][ T682] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 58.435976][ T682] ? do_futex+0x32a/0x510 [ 58.440402][ T682] ? _raw_spin_unlock_irq+0x45/0x70 [ 58.445626][ T682] ? __cfi_do_futex+0x10/0x10 [ 58.450545][ T682] ? __fget_files+0x2c5/0x340 [ 58.455271][ T682] ? bpf_lsm_file_ioctl+0xd/0x20 [ 58.460254][ T682] ? security_file_ioctl+0x3e/0x110 [ 58.465563][ T682] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 58.470822][ T682] __se_sys_ioctl+0x135/0x1b0 [ 58.475537][ T682] __x64_sys_ioctl+0x7f/0xa0 [ 58.480371][ T682] x64_sys_call+0x1878/0x2ee0 [ 58.485108][ T682] do_syscall_64+0x57/0xf0 [ 58.489642][ T682] ? clear_bhb_loop+0x50/0xa0 [ 58.494350][ T682] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 58.500419][ T682] RIP: 0033:0x7ff384d9aeb9 [ 58.504955][ T682] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 58.524689][ T682] RSP: 002b:00007ff385d07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 58.533177][ T682] RAX: ffffffffffffffda RBX: 00007ff385015fa0 RCX: 00007ff384d9aeb9 [ 58.541297][ T682] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 58.549333][ T682] RBP: 00007ff384e08c1f R08: 0000000000000000 R09: 0000000000000000 [ 58.557507][ T682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 58.565690][ T682] R13: 00007ff385016038 R14: 00007ff385015fa0 R15: 00007ffee218d608 [ 58.573814][ T682] [ 58.576932][ T682] ---[ end trace 0000000000000000 ]--- 2026/02/17 06:47:15 executed programs: 126 2026/02/17 06:47:20 executed programs: 198