Warning: Permanently added '10.128.0.121' (ED25519) to the list of known hosts. 2025/10/03 04:50:59 parsed 1 programs [ 50.440176][ T36] audit: type=1400 audit(1759467061.440:106): avc: denied { unlink } for pid=407 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 50.516683][ T407] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 51.403935][ T412] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.411161][ T412] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.418285][ T412] bridge_slave_0: entered allmulticast mode [ 51.424732][ T412] bridge_slave_0: entered promiscuous mode [ 51.431304][ T412] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.438416][ T412] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.445499][ T412] bridge_slave_1: entered allmulticast mode [ 51.451929][ T412] bridge_slave_1: entered promiscuous mode [ 51.505715][ T412] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.512847][ T412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.520230][ T412] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.527283][ T412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.547050][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.554449][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.564349][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.571460][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.580810][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.587921][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.612268][ T412] veth0_vlan: entered promiscuous mode [ 51.623001][ T412] veth1_macvtap: entered promiscuous mode [ 51.663686][ T308] bridge_slave_1: left allmulticast mode [ 51.669994][ T308] bridge_slave_1: left promiscuous mode [ 51.675669][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.683939][ T308] bridge_slave_0: left allmulticast mode [ 51.689731][ T308] bridge_slave_0: left promiscuous mode [ 51.695383][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.836265][ T308] veth1_macvtap: left promiscuous mode [ 51.843009][ T308] veth0_vlan: left promiscuous mode [ 52.334609][ T36] audit: type=1400 audit(1759467063.330:107): avc: denied { create } for pid=466 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 52.536889][ T36] audit: type=1401 audit(1759467063.530:108): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2025/10/03 04:51:03 executed programs: 0 [ 52.820565][ T478] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.827884][ T478] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.834939][ T478] bridge_slave_0: entered allmulticast mode [ 52.841394][ T478] bridge_slave_0: entered promiscuous mode [ 52.847777][ T478] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.854820][ T478] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.861972][ T478] bridge_slave_1: entered allmulticast mode [ 52.868269][ T478] bridge_slave_1: entered promiscuous mode [ 52.925585][ T478] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.932699][ T478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.940080][ T478] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.947125][ T478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.967891][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.975177][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.985285][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.992373][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.001642][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.008793][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.034702][ T478] veth0_vlan: entered promiscuous mode [ 53.045427][ T478] veth1_macvtap: entered promiscuous mode [ 53.074509][ T36] audit: type=1400 audit(1759467064.070:109): avc: denied { read write } for pid=489 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.075389][ T490] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 53.098106][ T36] audit: type=1400 audit(1759467064.070:110): avc: denied { open } for pid=489 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.138072][ T36] audit: type=1400 audit(1759467064.070:111): avc: denied { ioctl } for pid=489 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 53.208590][ T490] ------------[ cut here ]------------ [ 53.214156][ T490] WARNING: CPU: 1 PID: 490 at arch/x86/kvm/x86.c:8135 emulator_pio_in_out+0x38a/0x490 [ 53.223800][ T490] Modules linked in: [ 53.227787][ T490] CPU: 1 UID: 0 PID: 490 Comm: syz.2.17 Not tainted syzkaller #0 1be2ae8b7c4cd65d660bdd43155531199450654b [ 53.239130][ T490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 53.249349][ T490] RIP: 0010:emulator_pio_in_out+0x38a/0x490 [ 53.255277][ T490] Code: b6 04 38 84 c0 0f 85 ec 00 00 00 66 44 89 23 31 c0 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d e9 bc 9e 71 04 cc e8 56 33 68 00 <0f> 0b e9 e6 fc ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c ff fd ff [ 53.274969][ T490] RSP: 0018:ffffc900011af290 EFLAGS: 00010293 [ 53.281129][ T490] RAX: ffffffff811dccaa RBX: ffffc900011af360 RCX: ffff88811d728000 [ 53.289194][ T490] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 53.297225][ T490] RBP: ffffc900011af2f0 R08: 0000000000000001 R09: 0000000000000001 [ 53.305303][ T490] R10: 0000000000000000 R11: ffffffff812fa730 R12: 0000000000000006 [ 53.313371][ T490] R13: 0000000000000001 R14: 0000000000000001 R15: ffff88811e714af8 [ 53.321407][ T490] FS: 00007f22f5b356c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 53.330398][ T490] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.336998][ T490] CR2: 000000005200000c CR3: 000000011cdac000 CR4: 00000000003526b0 [ 53.345054][ T490] Call Trace: [ 53.348403][ T490] [ 53.351354][ T490] kvm_fast_pio+0x198/0x5f0 [ 53.355866][ T490] ? __cfi_kvm_fast_pio+0x10/0x10 [ 53.360957][ T490] ? __cfi_nested_vmx_reflect_vmexit+0x10/0x10 [ 53.367143][ T490] ? clear_bhb_loop+0x50/0xa0 [ 53.372284][ T490] ? clear_bhb_loop+0x50/0xa0 [ 53.377024][ T490] ? clear_bhb_loop+0x66/0xa0 [ 53.381765][ T490] handle_io+0xfe/0x150 [ 53.385948][ T490] ? __cfi_handle_io+0x10/0x10 [ 53.390764][ T490] vmx_handle_exit+0x12c2/0x1b40 [ 53.395740][ T490] ? kvm_deliver_exception_payload+0xd7/0x200 [ 53.401854][ T490] ? __cfi_vmx_vcpu_run+0x10/0x10 [ 53.406917][ T490] ? vmx_handle_exit_irqoff+0xe9/0x7a0 [ 53.412546][ T490] vcpu_run+0x4bd0/0x7830 [ 53.416923][ T490] ? signal_pending+0xc0/0xc0 [ 53.421671][ T490] ? x86_emulate_instruction+0x217/0x1870 [ 53.427445][ T490] ? __cfi_complete_emulated_pio+0x10/0x10 [ 53.433356][ T490] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 53.439271][ T490] ? __cfi___futex_queue+0x10/0x10 [ 53.444399][ T490] ? futex_wait_setup+0x1bc/0x260 [ 53.449648][ T490] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 53.455679][ T490] ? futex_unqueue+0x136/0x160 [ 53.460515][ T490] ? __futex_wait+0x218/0x2a0 [ 53.465232][ T490] ? ioctl_has_perm+0x1aa/0x4d0 [ 53.470139][ T490] ? __asan_memcpy+0x5a/0x80 [ 53.474753][ T490] ? ioctl_has_perm+0x3e0/0x4d0 [ 53.479651][ T490] ? has_cap_mac_admin+0xd0/0xd0 [ 53.484619][ T490] ? __kasan_check_write+0x18/0x20 [ 53.489899][ T490] ? mutex_lock_killable+0x92/0x1c0 [ 53.495147][ T490] ? __cfi_mutex_lock_killable+0x10/0x10 [ 53.500894][ T490] ? futex_wait+0x29a/0x7a0 [ 53.505691][ T490] ? __cfi_futex_wait+0x10/0x10 [ 53.510631][ T490] kvm_vcpu_ioctl+0x96f/0xee0 [ 53.515337][ T490] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 53.520837][ T490] ? do_futex+0x309/0x500 [ 53.525221][ T490] ? __cfi_do_futex+0x10/0x10 [ 53.529971][ T490] ? __fget_files+0x2c5/0x340 [ 53.534676][ T490] ? bpf_lsm_file_ioctl+0xd/0x20 [ 53.539715][ T490] ? security_file_ioctl+0x34/0xd0 [ 53.544855][ T490] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 53.550157][ T490] __se_sys_ioctl+0x132/0x1b0 [ 53.554870][ T490] __x64_sys_ioctl+0x7f/0xa0 [ 53.559644][ T490] x64_sys_call+0x1878/0x2ee0 [ 53.564364][ T490] do_syscall_64+0x58/0xf0 [ 53.568875][ T490] ? clear_bhb_loop+0x50/0xa0 [ 53.573583][ T490] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 53.579566][ T490] RIP: 0033:0x7f22f4d8ebe9 [ 53.584017][ T490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.603812][ T490] RSP: 002b:00007f22f5b35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 53.612334][ T490] RAX: ffffffffffffffda RBX: 00007f22f4fc5fa0 RCX: 00007f22f4d8ebe9 [ 53.620366][ T490] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 53.628414][ T490] RBP: 00007f22f4e11e19 R08: 0000000000000000 R09: 0000000000000000 [ 53.636490][ T490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 53.644565][ T490] R13: 00007f22f4fc6038 R14: 00007f22f4fc5fa0 R15: 00007ffcd8319728 [ 53.652592][ T490] [ 53.655633][ T490] ---[ end trace 0000000000000000 ]--- 2025/10/03 04:51:08 executed programs: 34 2025/10/03 04:51:13 executed programs: 78