Warning: Permanently added '10.128.1.213' (ED25519) to the list of known hosts. 2026/01/06 01:10:26 parsed 1 programs [ 26.774777][ T28] audit: type=1400 audit(1767661826.144:64): avc: denied { node_bind } for pid=283 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 26.795641][ T28] audit: type=1400 audit(1767661826.144:65): avc: denied { module_request } for pid=283 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 27.927872][ T28] audit: type=1400 audit(1767661827.304:66): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.931168][ T291] cgroup: Unknown subsys name 'net' [ 27.950663][ T28] audit: type=1400 audit(1767661827.304:67): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.978109][ T28] audit: type=1400 audit(1767661827.334:68): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.978494][ T291] cgroup: Unknown subsys name 'devices' [ 28.148358][ T291] cgroup: Unknown subsys name 'hugetlb' [ 28.153979][ T291] cgroup: Unknown subsys name 'rlimit' [ 28.267736][ T28] audit: type=1400 audit(1767661827.644:69): avc: denied { setattr } for pid=291 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.290977][ T28] audit: type=1400 audit(1767661827.644:70): avc: denied { create } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.311400][ T28] audit: type=1400 audit(1767661827.644:71): avc: denied { write } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.331735][ T28] audit: type=1400 audit(1767661827.644:72): avc: denied { read } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.352098][ T28] audit: type=1400 audit(1767661827.644:73): avc: denied { mounton } for pid=291 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.359254][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.417801][ T291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.138602][ T296] request_module fs-gadgetfs succeeded, but still no fs? [ 29.865441][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.872558][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.880165][ T345] device bridge_slave_0 entered promiscuous mode [ 29.887105][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.894138][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.901626][ T345] device bridge_slave_1 entered promiscuous mode [ 29.952678][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.959759][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.967221][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.974260][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.995688][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.003438][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.010729][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.019956][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.028204][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.035227][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.044052][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.052422][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.059499][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.073003][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.082511][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.097842][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.116471][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.124571][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.132148][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.140760][ T345] device veth0_vlan entered promiscuous mode [ 30.151598][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.160849][ T345] device veth1_macvtap entered promiscuous mode [ 30.178136][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.188303][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.230596][ T345] syz-executor (345) used greatest stack depth: 21248 bytes left 2026/01/06 01:10:29 executed programs: 0 [ 30.509949][ T365] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.517089][ T365] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.524453][ T365] device bridge_slave_0 entered promiscuous mode [ 30.531457][ T365] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.538643][ T365] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.545998][ T365] device bridge_slave_1 entered promiscuous mode [ 30.621387][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.628876][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.640915][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.649379][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.657609][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.664655][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.672515][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.681057][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.689458][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.697688][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.704710][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.717841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.727168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.742020][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.758275][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.766653][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.774118][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.782553][ T365] device veth0_vlan entered promiscuous mode [ 30.796855][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.806138][ T365] device veth1_macvtap entered promiscuous mode [ 30.815996][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.826043][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.167717][ T8] device bridge_slave_1 left promiscuous mode [ 31.173914][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.182036][ T8] device bridge_slave_0 left promiscuous mode [ 31.188370][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.196923][ T8] device veth1_macvtap left promiscuous mode [ 31.202960][ T8] device veth0_vlan left promiscuous mode 2026/01/06 01:10:34 executed programs: 276 2026/01/06 01:10:39 executed programs: 576 SYZFAIL: posix_spawnp failed (errno 2: No such file or directory) connection error: failed to recv *flatrpc.ExecutorMessageRawT: read tcp 127.0.0.1:37719->127.0.0.1:43366: read: connection reset by peer [ 41.517002][ T43] device bridge_slave_1 left promiscuous mode [ 41.523166][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.530793][ T43] device bridge_slave_0 left promiscuous mode [ 41.537090][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.544905][ T43] device veth1_macvtap left promiscuous mode [ 41.551103][ T43] device veth0_vlan left promiscuous mode