Warning: Permanently added '10.128.1.171' (ED25519) to the list of known hosts. 2026/02/05 14:37:50 parsed 1 programs [ 38.687448][ T36] audit: type=1400 audit(1770302270.090:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 39.607901][ T36] audit: type=1400 audit(1770302271.010:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 39.608999][ T298] cgroup: Unknown subsys name 'net' [ 39.630556][ T36] audit: type=1400 audit(1770302271.010:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.657819][ T36] audit: type=1400 audit(1770302271.040:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.658096][ T298] cgroup: Unknown subsys name 'devices' [ 39.841473][ T298] cgroup: Unknown subsys name 'hugetlb' [ 39.847091][ T298] cgroup: Unknown subsys name 'rlimit' [ 40.004735][ T36] audit: type=1400 audit(1770302271.410:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.027925][ T36] audit: type=1400 audit(1770302271.410:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 40.044273][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 40.048456][ T36] audit: type=1400 audit(1770302271.410:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.072767][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.077053][ T36] audit: type=1400 audit(1770302271.410:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.105975][ T36] audit: type=1400 audit(1770302271.410:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 40.127093][ T36] audit: type=1400 audit(1770302271.410:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.964893][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 41.285124][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.292324][ T323] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.299478][ T323] bridge_slave_0: entered allmulticast mode [ 41.305679][ T323] bridge_slave_0: entered promiscuous mode [ 41.312134][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.319167][ T323] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.326285][ T323] bridge_slave_1: entered allmulticast mode [ 41.332475][ T323] bridge_slave_1: entered promiscuous mode [ 41.383155][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.390246][ T323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.397532][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.404611][ T323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.422667][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.430200][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.441228][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.448277][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.457779][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.464840][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.489367][ T323] veth0_vlan: entered promiscuous mode [ 41.499168][ T323] veth1_macvtap: entered promiscuous mode [ 41.551330][ T311] bridge_slave_1: left allmulticast mode [ 41.557160][ T311] bridge_slave_1: left promiscuous mode [ 41.562930][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.571134][ T311] bridge_slave_0: left allmulticast mode [ 41.576788][ T311] bridge_slave_0: left promiscuous mode [ 41.582547][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.694621][ T311] veth1_macvtap: left promiscuous mode [ 41.700389][ T311] veth0_vlan: left promiscuous mode 2026/02/05 14:37:53 executed programs: 0 [ 42.127957][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.135112][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.142282][ T371] bridge_slave_0: entered allmulticast mode [ 42.148463][ T371] bridge_slave_0: entered promiscuous mode [ 42.155000][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.162095][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.169192][ T371] bridge_slave_1: entered allmulticast mode [ 42.175711][ T371] bridge_slave_1: entered promiscuous mode [ 42.246574][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.253656][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.261533][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.268558][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.279404][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.286722][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.305845][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.313000][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.322224][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.329370][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.358430][ T371] veth0_vlan: entered promiscuous mode [ 42.368662][ T371] veth1_macvtap: entered promiscuous mode 2026/02/05 14:37:58 executed programs: 282 2026/02/05 14:38:03 executed programs: 583 [ 52.443598][ T983] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.450876][ T983] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.457942][ T983] bridge_slave_0: entered allmulticast mode [ 52.465383][ T983] bridge_slave_0: entered promiscuous mode [ 52.477146][ T983] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.484899][ T983] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.492047][ T983] bridge_slave_1: entered allmulticast mode [ 52.498230][ T983] bridge_slave_1: entered promiscuous mode [ 52.507934][ T311] bridge_slave_1: left allmulticast mode [ 52.513617][ T311] bridge_slave_1: left promiscuous mode [ 52.519210][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.526790][ T311] bridge_slave_0: left allmulticast mode [ 52.532635][ T311] bridge_slave_0: left promiscuous mode [ 52.538229][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.630722][ T983] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.637762][ T983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.645052][ T983] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.652103][ T983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.670691][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.678096][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.686240][ T311] veth1_macvtap: left promiscuous mode [ 52.691883][ T311] veth0_vlan: left promiscuous mode [ 52.724890][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.732099][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.742757][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.749836][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.776050][ T983] veth0_vlan: entered promiscuous mode [ 52.786673][ T983] veth1_macvtap: entered promiscuous mode [ 52.950317][ T311] ------------[ cut here ]------------ [ 52.955810][ T311] WARNING: CPU: 0 PID: 311 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0xc4/0x140 [ 52.965981][ T311] Modules linked in: [ 52.970025][ T311] CPU: 0 UID: 0 PID: 311 Comm: kworker/u8:3 Not tainted syzkaller #0 651adc2629b0b4f371d8cab24d98ca400350956b [ 52.982042][ T311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 52.992764][ T311] Workqueue: netns cleanup_net [ 52.998123][ T311] RIP: 0010:xfrm6_tunnel_net_exit+0xc4/0x140 [ 53.004190][ T311] Code: e8 21 3e db fc 4b 83 3c 3e 00 75 19 e8 c5 72 83 fc 49 81 ff f8 07 00 00 74 1b e8 b7 72 83 fc 49 83 c7 08 eb c9 e8 ac 72 83 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 49 8d 9e 00 08 00 00 45 31 ff 4a [ 53.024033][ T311] RSP: 0018:ffffc90003b3fb90 EFLAGS: 00010293 [ 53.030157][ T311] RAX: ffffffff85042a64 RBX: ffff888113b4c700 RCX: ffff8881228b5f00 [ 53.038166][ T311] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff88811426c3f0 [ 53.046224][ T311] RBP: ffffc90003b3fbb0 R08: ffffffff87d35187 R09: 1ffffffff0fa6a30 [ 53.054597][ T311] R10: dffffc0000000000 R11: fffffbfff0fa6a31 R12: dffffc0000000000 [ 53.062994][ T311] R13: dffffc0000000000 R14: ffff88811426c000 R15: 00000000000003f0 [ 53.071136][ T311] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 53.080216][ T311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.086891][ T311] CR2: 000055558ea54908 CR3: 00000000074a8000 CR4: 00000000003526b0 [ 53.095023][ T311] Call Trace: [ 53.098300][ T311] [ 53.101274][ T311] cleanup_net+0x6bd/0xc90 [ 53.105709][ T311] ? __cfi_cleanup_net+0x10/0x10 [ 53.110712][ T311] ? __schedule+0x1357/0x1ea0 [ 53.115412][ T311] ? kick_pool+0xb9/0x550 [ 53.119843][ T311] process_scheduled_works+0x7d4/0x1020 [ 53.125413][ T311] worker_thread+0xc70/0x10b0 [ 53.130228][ T311] ? __cfi_try_to_wake_up+0x10/0x10 [ 53.135439][ T311] kthread+0x2c9/0x370 [ 53.139553][ T311] ? __cfi_worker_thread+0x10/0x10 [ 53.144673][ T311] ? __cfi_kthread+0x10/0x10 [ 53.149323][ T311] ret_from_fork+0x67/0xa0 [ 53.153747][ T311] ? __cfi_kthread+0x10/0x10 [ 53.158350][ T311] ret_from_fork_asm+0x1a/0x30 [ 53.163210][ T311] [ 53.166319][ T311] ---[ end trace 0000000000000000 ]--- [ 53.172519][ T311] ------------[ cut here ]------------ [ 53.177983][ T311] WARNING: CPU: 0 PID: 311 at net/ipv6/xfrm6_tunnel.c:344 xfrm6_tunnel_net_exit+0x119/0x140 [ 53.188115][ T311] Modules linked in: [ 53.192071][ T311] CPU: 0 UID: 0 PID: 311 Comm: kworker/u8:3 Tainted: G W syzkaller #0 651adc2629b0b4f371d8cab24d98ca400350956b [ 53.205762][ T311] Tainted: [W]=WARN [ 53.209610][ T311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 53.219881][ T311] Workqueue: netns cleanup_net [ 53.224666][ T311] RIP: 0010:xfrm6_tunnel_net_exit+0x119/0x140 [ 53.230896][ T311] Code: fc 4b 83 bc 3e 00 08 00 00 00 75 19 e8 70 72 83 fc 49 81 ff f8 07 00 00 74 1b e8 62 72 83 fc 49 83 c7 08 eb c5 e8 57 72 83 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 e8 47 72 83 fc 5b 41 5c 41 5e 41 [ 53.250742][ T311] RSP: 0018:ffffc90003b3fb90 EFLAGS: 00010293 [ 53.257788][ T311] RAX: ffffffff85042ab9 RBX: ffff88811426c800 RCX: ffff8881228b5f00 [ 53.265801][ T311] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff88811426c808 [ 53.273812][ T311] RBP: ffffc90003b3fbb0 R08: ffffffff87d35187 R09: 1ffffffff0fa6a30 [ 53.281847][ T311] R10: dffffc0000000000 R11: fffffbfff0fa6a31 R12: dffffc0000000000 [ 53.289914][ T311] R13: dffffc0000000000 R14: ffff88811426c000 R15: 0000000000000008 [ 53.297987][ T311] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 53.307490][ T311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.314149][ T311] CR2: 000055558ea54908 CR3: 00000000074a8000 CR4: 00000000003526b0 [ 53.322211][ T311] Call Trace: [ 53.325583][ T311] [ 53.328520][ T311] cleanup_net+0x6bd/0xc90 [ 53.332963][ T311] ? __cfi_cleanup_net+0x10/0x10 [ 53.337903][ T311] ? __schedule+0x1357/0x1ea0 [ 53.342605][ T311] ? kick_pool+0xb9/0x550 [ 53.346982][ T311] process_scheduled_works+0x7d4/0x1020 [ 53.352576][ T311] worker_thread+0xc70/0x10b0 [ 53.357348][ T311] ? __cfi_try_to_wake_up+0x10/0x10 [ 53.362590][ T311] kthread+0x2c9/0x370 [ 53.366666][ T311] ? __cfi_worker_thread+0x10/0x10 [ 53.371925][ T311] ? __cfi_kthread+0x10/0x10 [ 53.376525][ T311] ret_from_fork+0x67/0xa0 [ 53.380996][ T311] ? __cfi_kthread+0x10/0x10 [ 53.385707][ T311] ret_from_fork_asm+0x1a/0x30 [ 53.390759][ T311] [ 53.393800][ T311] ---[ end trace 0000000000000000 ]--- [ 53.402330][ T311] ------------[ cut here ]------------ [ 53.407817][ T311] WARNING: CPU: 1 PID: 311 at net/xfrm/xfrm_state.c:3215 xfrm_state_fini+0x2be/0x310 [ 53.417551][ T311] Modules linked in: [ 53.421536][ T311] CPU: 1 UID: 0 PID: 311 Comm: kworker/u8:3 Tainted: G W syzkaller #0 651adc2629b0b4f371d8cab24d98ca400350956b [ 53.434732][ T311] Tainted: [W]=WARN [ 53.438542][ T311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 53.448642][ T311] Workqueue: netns cleanup_net [ 53.453457][ T311] RIP: 0010:xfrm_state_fini+0x2be/0x310 [ 53.459136][ T311] Code: 3c 20 00 74 08 48 89 df e8 5f 07 f6 fc 48 8b 3b e8 f7 45 e1 fc 5b 41 5c 41 5d 41 5e 41 5f 5d e9 08 af b7 00 cc e8 f2 3b 9e fc <0f> 0b e9 b0 fd ff ff e8 e6 3b 9e fc 0f 0b e9 18 fe ff ff e8 da 3b [ 53.478801][ T311] RSP: 0018:ffffc90003b3fb70 EFLAGS: 00010293 [ 53.484973][ T311] RAX: ffffffff84e9611e RBX: ffff888113b4c700 RCX: ffff8881228b5f00 [ 53.493040][ T311] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff8881228b5f00 [ 53.501417][ T311] RBP: ffffc90003b3fb98 R08: ffffffff87d35187 R09: 1ffffffff0fa6a30 [ 53.509437][ T311] R10: dffffc0000000000 R11: fffffbfff0fa6a31 R12: 1ffffffff0fa6780 [ 53.517419][ T311] R13: dffffc0000000000 R14: ffff888113b4d300 R15: dffffc0000000000 [ 53.525423][ T311] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 53.534396][ T311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.541015][ T311] CR2: 00007fb50f9e0d58 CR3: 000000010c706000 CR4: 00000000003526b0 [ 53.548996][ T311] Call Trace: [ 53.552319][ T311] [ 53.555252][ T311] xfrm_net_exit+0x31/0x80 [ 53.559999][ T311] cleanup_net+0x6bd/0xc90 [ 53.564516][ T311] ? __cfi_cleanup_net+0x10/0x10 [ 53.569505][ T311] ? __schedule+0x1357/0x1ea0 [ 53.574217][ T311] ? kick_pool+0xb9/0x550 [ 53.578595][ T311] process_scheduled_works+0x7d4/0x1020 [ 53.584276][ T311] worker_thread+0xc70/0x10b0 [ 53.589068][ T311] ? __cfi_try_to_wake_up+0x10/0x10 [ 53.594296][ T311] kthread+0x2c9/0x370 [ 53.598369][ T311] ? __cfi_worker_thread+0x10/0x10 [ 53.603522][ T311] ? __cfi_kthread+0x10/0x10 [ 53.608118][ T311] ret_from_fork+0x67/0xa0 [ 53.612659][ T311] ? __cfi_kthread+0x10/0x10 [ 53.617349][ T311] ret_from_fork_asm+0x1a/0x30 [ 53.622162][ T311] [ 53.625280][ T311] ---[ end trace 0000000000000000 ]--- 2026/02/05 14:38:08 executed programs: 853 2026/02/05 14:38:13 executed programs: 1152