Warning: Permanently added '10.128.0.226' (ED25519) to the list of known hosts. 2026/03/28 16:55:18 parsed 1 programs [ 25.304556][ T30] audit: type=1400 audit(1774716918.231:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 25.326570][ T30] audit: type=1400 audit(1774716918.231:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 26.287252][ T30] audit: type=1400 audit(1774716919.211:66): avc: denied { mounton } for pid=287 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.290720][ T287] cgroup: Unknown subsys name 'net' [ 26.310073][ T30] audit: type=1400 audit(1774716919.211:67): avc: denied { mount } for pid=287 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.337400][ T30] audit: type=1400 audit(1774716919.241:68): avc: denied { unmount } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.337819][ T287] cgroup: Unknown subsys name 'devices' [ 26.540905][ T287] cgroup: Unknown subsys name 'hugetlb' [ 26.546544][ T287] cgroup: Unknown subsys name 'rlimit' [ 26.785931][ T30] audit: type=1400 audit(1774716919.711:69): avc: denied { setattr } for pid=287 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.809256][ T30] audit: type=1400 audit(1774716919.711:70): avc: denied { create } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.829713][ T30] audit: type=1400 audit(1774716919.711:71): avc: denied { write } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.848289][ T291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.850107][ T30] audit: type=1400 audit(1774716919.711:72): avc: denied { read } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.879216][ T30] audit: type=1400 audit(1774716919.721:73): avc: denied { mounton } for pid=287 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.919129][ T287] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.383631][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 28.140285][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.147348][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.154865][ T347] device bridge_slave_0 entered promiscuous mode [ 28.161809][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.168953][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.176389][ T347] device bridge_slave_1 entered promiscuous mode [ 28.225900][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.233047][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.240396][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.247438][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.270936][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.279004][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.286738][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.299864][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.308088][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.315186][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.324028][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.332443][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.339510][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.355882][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.365128][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.383557][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.395327][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.403832][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.411726][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.422342][ T347] device veth0_vlan entered promiscuous mode [ 28.436774][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.445927][ T347] device veth1_macvtap entered promiscuous mode [ 28.455936][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.469961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.499661][ T347] syz-executor (347) used greatest stack depth: 21760 bytes left 2026/03/28 16:55:21 executed programs: 0 [ 28.754086][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.761187][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.768831][ T357] device bridge_slave_0 entered promiscuous mode [ 28.776439][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.783621][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.791201][ T357] device bridge_slave_1 entered promiscuous mode [ 28.845548][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.853317][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.867401][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.876259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.884725][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.891777][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.899415][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.912656][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.921096][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.929502][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.936539][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.953808][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.963161][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.977400][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.993119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.001409][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.009280][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.019250][ T357] device veth0_vlan entered promiscuous mode [ 29.029925][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.039568][ T357] device veth1_macvtap entered promiscuous mode [ 29.050172][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.058902][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.295874][ T8] device bridge_slave_1 left promiscuous mode [ 29.302649][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.310714][ T8] device bridge_slave_0 left promiscuous mode [ 29.316943][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.325130][ T8] device veth1_macvtap left promiscuous mode [ 29.331377][ T8] device veth0_vlan left promiscuous mode 2026/03/28 16:55:26 executed programs: 279 2026/03/28 16:55:31 executed programs: 580 SYZFAIL: posix_spawnp failed (errno 2: No such file or directory) connection error: failed to recv *flatrpc.ExecutorMessageRawT: read tcp 127.0.0.1:35107->127.0.0.1:44370: read: connection reset by peer [ 39.150962][ T357] syz-executor (357) used greatest stack depth: 21728 bytes left [ 40.069303][ T45] device bridge_slave_1 left promiscuous mode [ 40.075469][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.083125][ T45] device bridge_slave_0 left promiscuous mode [ 40.089347][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.097366][ T45] device veth1_macvtap left promiscuous mode [ 40.103455][ T45] device veth0_vlan left promiscuous mode