Warning: Permanently added '10.128.1.171' (ED25519) to the list of known hosts.
2026/02/05 14:37:50 parsed 1 programs
[ 38.687448][ T36] audit: type=1400 audit(1770302270.090:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 39.607901][ T36] audit: type=1400 audit(1770302271.010:65): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 39.608999][ T298] cgroup: Unknown subsys name 'net'
[ 39.630556][ T36] audit: type=1400 audit(1770302271.010:66): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 39.657819][ T36] audit: type=1400 audit(1770302271.040:67): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 39.658096][ T298] cgroup: Unknown subsys name 'devices'
[ 39.841473][ T298] cgroup: Unknown subsys name 'hugetlb'
[ 39.847091][ T298] cgroup: Unknown subsys name 'rlimit'
[ 40.004735][ T36] audit: type=1400 audit(1770302271.410:68): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 40.027925][ T36] audit: type=1400 audit(1770302271.410:69): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 40.044273][ T301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 40.048456][ T36] audit: type=1400 audit(1770302271.410:70): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 40.072767][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 40.077053][ T36] audit: type=1400 audit(1770302271.410:71): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 40.105975][ T36] audit: type=1400 audit(1770302271.410:72): avc: denied { sys_module } for pid=298 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 40.127093][ T36] audit: type=1400 audit(1770302271.410:73): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 40.964893][ T303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 41.285124][ T323] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.292324][ T323] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.299478][ T323] bridge_slave_0: entered allmulticast mode
[ 41.305679][ T323] bridge_slave_0: entered promiscuous mode
[ 41.312134][ T323] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.319167][ T323] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.326285][ T323] bridge_slave_1: entered allmulticast mode
[ 41.332475][ T323] bridge_slave_1: entered promiscuous mode
[ 41.383155][ T323] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.390246][ T323] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 41.397532][ T323] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.404611][ T323] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 41.422667][ T311] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.430200][ T311] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.441228][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.448277][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 41.457779][ T311] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.464840][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 41.489367][ T323] veth0_vlan: entered promiscuous mode
[ 41.499168][ T323] veth1_macvtap: entered promiscuous mode
[ 41.551330][ T311] bridge_slave_1: left allmulticast mode
[ 41.557160][ T311] bridge_slave_1: left promiscuous mode
[ 41.562930][ T311] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.571134][ T311] bridge_slave_0: left allmulticast mode
[ 41.576788][ T311] bridge_slave_0: left promiscuous mode
[ 41.582547][ T311] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.694621][ T311] veth1_macvtap: left promiscuous mode
[ 41.700389][ T311] veth0_vlan: left promiscuous mode
2026/02/05 14:37:53 executed programs: 0
[ 42.127957][ T371] bridge0: port 1(bridge_slave_0) entered blocking state
[ 42.135112][ T371] bridge0: port 1(bridge_slave_0) entered disabled state
[ 42.142282][ T371] bridge_slave_0: entered allmulticast mode
[ 42.148463][ T371] bridge_slave_0: entered promiscuous mode
[ 42.155000][ T371] bridge0: port 2(bridge_slave_1) entered blocking state
[ 42.162095][ T371] bridge0: port 2(bridge_slave_1) entered disabled state
[ 42.169192][ T371] bridge_slave_1: entered allmulticast mode
[ 42.175711][ T371] bridge_slave_1: entered promiscuous mode
[ 42.246574][ T371] bridge0: port 2(bridge_slave_1) entered blocking state
[ 42.253656][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 42.261533][ T371] bridge0: port 1(bridge_slave_0) entered blocking state
[ 42.268558][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 42.279404][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 42.286722][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 42.305845][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 42.313000][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 42.322224][ T45] bridge0: port 2(bridge_slave_1) entered blocking state
[ 42.329370][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 42.358430][ T371] veth0_vlan: entered promiscuous mode
[ 42.368662][ T371] veth1_macvtap: entered promiscuous mode
2026/02/05 14:37:58 executed programs: 282
2026/02/05 14:38:03 executed programs: 583
[ 52.443598][ T983] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.450876][ T983] bridge0: port 1(bridge_slave_0) entered disabled state
[ 52.457942][ T983] bridge_slave_0: entered allmulticast mode
[ 52.465383][ T983] bridge_slave_0: entered promiscuous mode
[ 52.477146][ T983] bridge0: port 2(bridge_slave_1) entered blocking state
[ 52.484899][ T983] bridge0: port 2(bridge_slave_1) entered disabled state
[ 52.492047][ T983] bridge_slave_1: entered allmulticast mode
[ 52.498230][ T983] bridge_slave_1: entered promiscuous mode
[ 52.507934][ T311] bridge_slave_1: left allmulticast mode
[ 52.513617][ T311] bridge_slave_1: left promiscuous mode
[ 52.519210][ T311] bridge0: port 2(bridge_slave_1) entered disabled state
[ 52.526790][ T311] bridge_slave_0: left allmulticast mode
[ 52.532635][ T311] bridge_slave_0: left promiscuous mode
[ 52.538229][ T311] bridge0: port 1(bridge_slave_0) entered disabled state
[ 52.630722][ T983] bridge0: port 2(bridge_slave_1) entered blocking state
[ 52.637762][ T983] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 52.645052][ T983] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.652103][ T983] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 52.670691][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 52.678096][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 52.686240][ T311] veth1_macvtap: left promiscuous mode
[ 52.691883][ T311] veth0_vlan: left promiscuous mode
[ 52.724890][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 52.732099][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 52.742757][ T45] bridge0: port 2(bridge_slave_1) entered blocking state
[ 52.749836][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 52.776050][ T983] veth0_vlan: entered promiscuous mode
[ 52.786673][ T983] veth1_macvtap: entered promiscuous mode
[ 52.950317][ T311] ------------[ cut here ]------------
[ 52.955810][ T311] WARNING: CPU: 0 PID: 311 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0xc4/0x140
[ 52.965981][ T311] Modules linked in:
[ 52.970025][ T311] CPU: 0 UID: 0 PID: 311 Comm: kworker/u8:3 Not tainted syzkaller #0 651adc2629b0b4f371d8cab24d98ca400350956b
[ 52.982042][ T311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 52.992764][ T311] Workqueue: netns cleanup_net
[ 52.998123][ T311] RIP: 0010:xfrm6_tunnel_net_exit+0xc4/0x140
[ 53.004190][ T311] Code: e8 21 3e db fc 4b 83 3c 3e 00 75 19 e8 c5 72 83 fc 49 81 ff f8 07 00 00 74 1b e8 b7 72 83 fc 49 83 c7 08 eb c9 e8 ac 72 83 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 49 8d 9e 00 08 00 00 45 31 ff 4a
[ 53.024033][ T311] RSP: 0018:ffffc90003b3fb90 EFLAGS: 00010293
[ 53.030157][ T311] RAX: ffffffff85042a64 RBX: ffff888113b4c700 RCX: ffff8881228b5f00
[ 53.038166][ T311] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff88811426c3f0
[ 53.046224][ T311] RBP: ffffc90003b3fbb0 R08: ffffffff87d35187 R09: 1ffffffff0fa6a30
[ 53.054597][ T311] R10: dffffc0000000000 R11: fffffbfff0fa6a31 R12: dffffc0000000000
[ 53.062994][ T311] R13: dffffc0000000000 R14: ffff88811426c000 R15: 00000000000003f0
[ 53.071136][ T311] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 53.080216][ T311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.086891][ T311] CR2: 000055558ea54908 CR3: 00000000074a8000 CR4: 00000000003526b0
[ 53.095023][ T311] Call Trace:
[ 53.098300][ T311]
[ 53.101274][ T311] cleanup_net+0x6bd/0xc90
[ 53.105709][ T311] ? __cfi_cleanup_net+0x10/0x10
[ 53.110712][ T311] ? __schedule+0x1357/0x1ea0
[ 53.115412][ T311] ? kick_pool+0xb9/0x550
[ 53.119843][ T311] process_scheduled_works+0x7d4/0x1020
[ 53.125413][ T311] worker_thread+0xc70/0x10b0
[ 53.130228][ T311] ? __cfi_try_to_wake_up+0x10/0x10
[ 53.135439][ T311] kthread+0x2c9/0x370
[ 53.139553][ T311] ? __cfi_worker_thread+0x10/0x10
[ 53.144673][ T311] ? __cfi_kthread+0x10/0x10
[ 53.149323][ T311] ret_from_fork+0x67/0xa0
[ 53.153747][ T311] ? __cfi_kthread+0x10/0x10
[ 53.158350][ T311] ret_from_fork_asm+0x1a/0x30
[ 53.163210][ T311]
[ 53.166319][ T311] ---[ end trace 0000000000000000 ]---
[ 53.172519][ T311] ------------[ cut here ]------------
[ 53.177983][ T311] WARNING: CPU: 0 PID: 311 at net/ipv6/xfrm6_tunnel.c:344 xfrm6_tunnel_net_exit+0x119/0x140
[ 53.188115][ T311] Modules linked in:
[ 53.192071][ T311] CPU: 0 UID: 0 PID: 311 Comm: kworker/u8:3 Tainted: G W syzkaller #0 651adc2629b0b4f371d8cab24d98ca400350956b
[ 53.205762][ T311] Tainted: [W]=WARN
[ 53.209610][ T311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 53.219881][ T311] Workqueue: netns cleanup_net
[ 53.224666][ T311] RIP: 0010:xfrm6_tunnel_net_exit+0x119/0x140
[ 53.230896][ T311] Code: fc 4b 83 bc 3e 00 08 00 00 00 75 19 e8 70 72 83 fc 49 81 ff f8 07 00 00 74 1b e8 62 72 83 fc 49 83 c7 08 eb c5 e8 57 72 83 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 e8 47 72 83 fc 5b 41 5c 41 5e 41
[ 53.250742][ T311] RSP: 0018:ffffc90003b3fb90 EFLAGS: 00010293
[ 53.257788][ T311] RAX: ffffffff85042ab9 RBX: ffff88811426c800 RCX: ffff8881228b5f00
[ 53.265801][ T311] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff88811426c808
[ 53.273812][ T311] RBP: ffffc90003b3fbb0 R08: ffffffff87d35187 R09: 1ffffffff0fa6a30
[ 53.281847][ T311] R10: dffffc0000000000 R11: fffffbfff0fa6a31 R12: dffffc0000000000
[ 53.289914][ T311] R13: dffffc0000000000 R14: ffff88811426c000 R15: 0000000000000008
[ 53.297987][ T311] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 53.307490][ T311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.314149][ T311] CR2: 000055558ea54908 CR3: 00000000074a8000 CR4: 00000000003526b0
[ 53.322211][ T311] Call Trace:
[ 53.325583][ T311]
[ 53.328520][ T311] cleanup_net+0x6bd/0xc90
[ 53.332963][ T311] ? __cfi_cleanup_net+0x10/0x10
[ 53.337903][ T311] ? __schedule+0x1357/0x1ea0
[ 53.342605][ T311] ? kick_pool+0xb9/0x550
[ 53.346982][ T311] process_scheduled_works+0x7d4/0x1020
[ 53.352576][ T311] worker_thread+0xc70/0x10b0
[ 53.357348][ T311] ? __cfi_try_to_wake_up+0x10/0x10
[ 53.362590][ T311] kthread+0x2c9/0x370
[ 53.366666][ T311] ? __cfi_worker_thread+0x10/0x10
[ 53.371925][ T311] ? __cfi_kthread+0x10/0x10
[ 53.376525][ T311] ret_from_fork+0x67/0xa0
[ 53.380996][ T311] ? __cfi_kthread+0x10/0x10
[ 53.385707][ T311] ret_from_fork_asm+0x1a/0x30
[ 53.390759][ T311]
[ 53.393800][ T311] ---[ end trace 0000000000000000 ]---
[ 53.402330][ T311] ------------[ cut here ]------------
[ 53.407817][ T311] WARNING: CPU: 1 PID: 311 at net/xfrm/xfrm_state.c:3215 xfrm_state_fini+0x2be/0x310
[ 53.417551][ T311] Modules linked in:
[ 53.421536][ T311] CPU: 1 UID: 0 PID: 311 Comm: kworker/u8:3 Tainted: G W syzkaller #0 651adc2629b0b4f371d8cab24d98ca400350956b
[ 53.434732][ T311] Tainted: [W]=WARN
[ 53.438542][ T311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 53.448642][ T311] Workqueue: netns cleanup_net
[ 53.453457][ T311] RIP: 0010:xfrm_state_fini+0x2be/0x310
[ 53.459136][ T311] Code: 3c 20 00 74 08 48 89 df e8 5f 07 f6 fc 48 8b 3b e8 f7 45 e1 fc 5b 41 5c 41 5d 41 5e 41 5f 5d e9 08 af b7 00 cc e8 f2 3b 9e fc <0f> 0b e9 b0 fd ff ff e8 e6 3b 9e fc 0f 0b e9 18 fe ff ff e8 da 3b
[ 53.478801][ T311] RSP: 0018:ffffc90003b3fb70 EFLAGS: 00010293
[ 53.484973][ T311] RAX: ffffffff84e9611e RBX: ffff888113b4c700 RCX: ffff8881228b5f00
[ 53.493040][ T311] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff8881228b5f00
[ 53.501417][ T311] RBP: ffffc90003b3fb98 R08: ffffffff87d35187 R09: 1ffffffff0fa6a30
[ 53.509437][ T311] R10: dffffc0000000000 R11: fffffbfff0fa6a31 R12: 1ffffffff0fa6780
[ 53.517419][ T311] R13: dffffc0000000000 R14: ffff888113b4d300 R15: dffffc0000000000
[ 53.525423][ T311] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[ 53.534396][ T311] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.541015][ T311] CR2: 00007fb50f9e0d58 CR3: 000000010c706000 CR4: 00000000003526b0
[ 53.548996][ T311] Call Trace:
[ 53.552319][ T311]
[ 53.555252][ T311] xfrm_net_exit+0x31/0x80
[ 53.559999][ T311] cleanup_net+0x6bd/0xc90
[ 53.564516][ T311] ? __cfi_cleanup_net+0x10/0x10
[ 53.569505][ T311] ? __schedule+0x1357/0x1ea0
[ 53.574217][ T311] ? kick_pool+0xb9/0x550
[ 53.578595][ T311] process_scheduled_works+0x7d4/0x1020
[ 53.584276][ T311] worker_thread+0xc70/0x10b0
[ 53.589068][ T311] ? __cfi_try_to_wake_up+0x10/0x10
[ 53.594296][ T311] kthread+0x2c9/0x370
[ 53.598369][ T311] ? __cfi_worker_thread+0x10/0x10
[ 53.603522][ T311] ? __cfi_kthread+0x10/0x10
[ 53.608118][ T311] ret_from_fork+0x67/0xa0
[ 53.612659][ T311] ? __cfi_kthread+0x10/0x10
[ 53.617349][ T311] ret_from_fork_asm+0x1a/0x30
[ 53.622162][ T311]
[ 53.625280][ T311] ---[ end trace 0000000000000000 ]---
2026/02/05 14:38:08 executed programs: 853
2026/02/05 14:38:13 executed programs: 1152