Warning: Permanently added '10.128.1.163' (ED25519) to the list of known hosts. 2026/02/01 03:28:06 parsed 1 programs [ 35.927684][ T36] audit: type=1400 audit(1769916486.930:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 37.468413][ T36] audit: type=1400 audit(1769916488.470:65): avc: denied { mounton } for pid=296 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 37.472113][ T296] cgroup: Unknown subsys name 'net' [ 37.491081][ T36] audit: type=1400 audit(1769916488.470:66): avc: denied { mount } for pid=296 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.518459][ T36] audit: type=1400 audit(1769916488.500:67): avc: denied { unmount } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.518945][ T296] cgroup: Unknown subsys name 'devices' [ 37.678912][ T296] cgroup: Unknown subsys name 'hugetlb' [ 37.684545][ T296] cgroup: Unknown subsys name 'rlimit' [ 37.807819][ T36] audit: type=1400 audit(1769916488.810:68): avc: denied { setattr } for pid=296 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 37.831092][ T36] audit: type=1400 audit(1769916488.810:69): avc: denied { create } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.851816][ T36] audit: type=1400 audit(1769916488.810:70): avc: denied { write } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.872331][ T36] audit: type=1400 audit(1769916488.810:71): avc: denied { read } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.878943][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 37.893217][ T36] audit: type=1400 audit(1769916488.810:72): avc: denied { sys_module } for pid=296 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 37.922223][ T36] audit: type=1400 audit(1769916488.810:73): avc: denied { mounton } for pid=296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.964630][ T296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 38.851218][ T302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.956401][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.963500][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.970651][ T307] bridge_slave_0: entered allmulticast mode [ 38.977151][ T307] bridge_slave_0: entered promiscuous mode [ 38.983912][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.991118][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.998663][ T307] bridge_slave_1: entered allmulticast mode [ 39.004903][ T307] bridge_slave_1: entered promiscuous mode [ 39.057022][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.064074][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.071488][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.078658][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.099450][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.106987][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.117076][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.124234][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.133345][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.140466][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.166496][ T307] veth0_vlan: entered promiscuous mode [ 39.178209][ T307] veth1_macvtap: entered promiscuous mode [ 39.237850][ T308] bridge_slave_1: left allmulticast mode [ 39.243635][ T308] bridge_slave_1: left promiscuous mode [ 39.249731][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.257661][ T308] bridge_slave_0: left allmulticast mode [ 39.263337][ T308] bridge_slave_0: left promiscuous mode [ 39.269313][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.427807][ T308] veth1_macvtap: left promiscuous mode [ 39.433395][ T308] veth0_vlan: left promiscuous mode 2026/02/01 03:28:11 executed programs: 0 [ 40.309599][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.316867][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.323984][ T369] bridge_slave_0: entered allmulticast mode [ 40.330395][ T369] bridge_slave_0: entered promiscuous mode [ 40.336859][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.343895][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.351057][ T369] bridge_slave_1: entered allmulticast mode [ 40.357416][ T369] bridge_slave_1: entered promiscuous mode [ 40.408682][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.415759][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.423141][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.430238][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.458304][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.465566][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.475528][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.482616][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.491643][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.498722][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.525568][ T369] veth0_vlan: entered promiscuous mode [ 40.535761][ T369] veth1_macvtap: entered promiscuous mode 2026/02/01 03:28:16 executed programs: 282 2026/02/01 03:28:21 executed programs: 582 [ 50.647108][ T981] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.654185][ T981] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.661377][ T981] bridge_slave_0: entered allmulticast mode [ 50.667779][ T981] bridge_slave_0: entered promiscuous mode [ 50.674764][ T981] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.681971][ T981] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.689142][ T981] bridge_slave_1: entered allmulticast mode [ 50.695516][ T981] bridge_slave_1: entered promiscuous mode [ 50.713128][ T44] bridge_slave_1: left allmulticast mode [ 50.718829][ T44] bridge_slave_1: left promiscuous mode [ 50.724452][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.732024][ T44] bridge_slave_0: left allmulticast mode [ 50.737833][ T44] bridge_slave_0: left promiscuous mode [ 50.743546][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.809358][ T44] veth1_macvtap: left promiscuous mode [ 50.814923][ T44] veth0_vlan: left promiscuous mode [ 50.873267][ T981] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.880470][ T981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.887821][ T981] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.894990][ T981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.920566][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.928234][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.938517][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.945556][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.954512][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.961588][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.986387][ T981] veth0_vlan: entered promiscuous mode [ 50.998023][ T981] veth1_macvtap: entered promiscuous mode [ 51.097205][ T44] ------------[ cut here ]------------ [ 51.102829][ T44] WARNING: CPU: 0 PID: 44 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0xc4/0x140 [ 51.112828][ T44] Modules linked in: [ 51.116838][ T44] CPU: 0 UID: 0 PID: 44 Comm: kworker/u8:2 Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 51.128447][ T44] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 51.138573][ T44] Workqueue: netns cleanup_net [ 51.143392][ T44] RIP: 0010:xfrm6_tunnel_net_exit+0xc4/0x140 [ 51.149473][ T44] Code: e8 11 3e db fc 4b 83 3c 3e 00 75 19 e8 45 77 83 fc 49 81 ff f8 07 00 00 74 1b e8 37 77 83 fc 49 83 c7 08 eb c9 e8 2c 77 83 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 49 8d 9e 00 08 00 00 45 31 ff 4a [ 51.169189][ T44] RSP: 0018:ffffc900002dfb90 EFLAGS: 00010293 [ 51.175308][ T44] RAX: ffffffff850425e4 RBX: ffff88812fc66a80 RCX: ffff88810ca51300 [ 51.183394][ T44] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff8881146687e8 [ 51.191480][ T44] RBP: ffffc900002dfbb0 R08: ffffffff87d350c7 R09: 1ffffffff0fa6a18 [ 51.199535][ T44] R10: dffffc0000000000 R11: fffffbfff0fa6a19 R12: dffffc0000000000 [ 51.207561][ T44] R13: dffffc0000000000 R14: ffff888114668000 R15: 00000000000007e8 [ 51.215573][ T44] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 51.224594][ T44] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.231278][ T44] CR2: 00007ffca6880c80 CR3: 00000000074a8000 CR4: 00000000003526b0 [ 51.239354][ T44] Call Trace: [ 51.242667][ T44] [ 51.245629][ T44] cleanup_net+0x6bd/0xc90 [ 51.250147][ T44] ? __cfi_cleanup_net+0x10/0x10 [ 51.255178][ T44] ? __schedule+0x1357/0x1ea0 [ 51.259922][ T44] ? kick_pool+0xb9/0x550 [ 51.264291][ T44] process_scheduled_works+0x7d4/0x1020 [ 51.269940][ T44] worker_thread+0xc70/0x10b0 [ 51.274674][ T44] ? __cfi_try_to_wake_up+0x10/0x10 [ 51.279953][ T44] kthread+0x2c9/0x370 [ 51.284056][ T44] ? __cfi_worker_thread+0x10/0x10 [ 51.289293][ T44] ? __cfi_kthread+0x10/0x10 [ 51.293937][ T44] ret_from_fork+0x67/0xa0 [ 51.298453][ T44] ? __cfi_kthread+0x10/0x10 [ 51.303104][ T44] ret_from_fork_asm+0x1a/0x30 [ 51.307952][ T44] [ 51.311005][ T44] ---[ end trace 0000000000000000 ]--- [ 51.317603][ T44] ------------[ cut here ]------------ [ 51.323096][ T44] WARNING: CPU: 0 PID: 44 at net/ipv6/xfrm6_tunnel.c:344 xfrm6_tunnel_net_exit+0x119/0x140 [ 51.333168][ T44] Modules linked in: [ 51.337171][ T44] CPU: 0 UID: 0 PID: 44 Comm: kworker/u8:2 Tainted: G W syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 51.350336][ T44] Tainted: [W]=WARN [ 51.354157][ T44] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 51.364584][ T44] Workqueue: netns cleanup_net [ 51.369411][ T44] RIP: 0010:xfrm6_tunnel_net_exit+0x119/0x140 [ 51.375520][ T44] Code: fc 4b 83 bc 3e 00 08 00 00 00 75 19 e8 f0 76 83 fc 49 81 ff f8 07 00 00 74 1b e8 e2 76 83 fc 49 83 c7 08 eb c5 e8 d7 76 83 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 e8 c7 76 83 fc 5b 41 5c 41 5e 41 [ 51.395211][ T44] RSP: 0018:ffffc900002dfb90 EFLAGS: 00010293 [ 51.401351][ T44] RAX: ffffffff85042639 RBX: ffff888114668800 RCX: ffff88810ca51300 [ 51.409417][ T44] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff888114668808 [ 51.417477][ T44] RBP: ffffc900002dfbb0 R08: ffffffff87d350c7 R09: 1ffffffff0fa6a18 [ 51.425479][ T44] R10: dffffc0000000000 R11: fffffbfff0fa6a19 R12: dffffc0000000000 [ 51.433513][ T44] R13: dffffc0000000000 R14: ffff888114668000 R15: 0000000000000008 [ 51.441575][ T44] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 51.450677][ T44] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.457401][ T44] CR2: 00007ffca6880c80 CR3: 00000000074a8000 CR4: 00000000003526b0 [ 51.465420][ T44] Call Trace: [ 51.468784][ T44] [ 51.471761][ T44] cleanup_net+0x6bd/0xc90 [ 51.476242][ T44] ? __cfi_cleanup_net+0x10/0x10 [ 51.481345][ T44] ? __schedule+0x1357/0x1ea0 [ 51.486126][ T44] ? kick_pool+0xb9/0x550 [ 51.490518][ T44] process_scheduled_works+0x7d4/0x1020 [ 51.496149][ T44] worker_thread+0xc70/0x10b0 [ 51.500877][ T44] ? __cfi_try_to_wake_up+0x10/0x10 [ 51.506189][ T44] kthread+0x2c9/0x370 [ 51.510384][ T44] ? __cfi_worker_thread+0x10/0x10 [ 51.515544][ T44] ? __cfi_kthread+0x10/0x10 [ 51.520255][ T44] ret_from_fork+0x67/0xa0 [ 51.524803][ T44] ? __cfi_kthread+0x10/0x10 [ 51.529501][ T44] ret_from_fork_asm+0x1a/0x30 [ 51.534316][ T44] [ 51.537510][ T44] ---[ end trace 0000000000000000 ]--- [ 51.547550][ T44] ------------[ cut here ]------------ [ 51.553051][ T44] WARNING: CPU: 0 PID: 44 at net/xfrm/xfrm_state.c:3215 xfrm_state_fini+0x2be/0x310 [ 51.562525][ T44] Modules linked in: [ 51.566489][ T44] CPU: 0 UID: 0 PID: 44 Comm: kworker/u8:2 Tainted: G W syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 51.579578][ T44] Tainted: [W]=WARN [ 51.583408][ T44] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 51.593650][ T44] Workqueue: netns cleanup_net [ 51.598505][ T44] RIP: 0010:xfrm_state_fini+0x2be/0x310 [ 51.604097][ T44] Code: 3c 20 00 74 08 48 89 df e8 4f 07 f6 fc 48 8b 3b e8 e7 45 e1 fc 5b 41 5c 41 5d 41 5e 41 5f 5d e9 88 b3 b7 00 cc e8 72 40 9e fc <0f> 0b e9 b0 fd ff ff e8 66 40 9e fc 0f 0b e9 18 fe ff ff e8 5a 40 [ 51.623873][ T44] RSP: 0018:ffffc900002dfb70 EFLAGS: 00010293 [ 51.630138][ T44] RAX: ffffffff84e95c9e RBX: ffff88812fc66a80 RCX: ffff88810ca51300 [ 51.638193][ T44] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff88810ca51300 [ 51.646229][ T44] RBP: ffffc900002dfb98 R08: ffffffff87d350c7 R09: 1ffffffff0fa6a18 [ 51.654229][ T44] R10: dffffc0000000000 R11: fffffbfff0fa6a19 R12: 1ffffffff0fa6768 [ 51.662259][ T44] R13: dffffc0000000000 R14: ffff88812fc67680 R15: dffffc0000000000 [ 51.670327][ T44] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 51.679346][ T44] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.685987][ T44] CR2: 00007ffca6880c80 CR3: 00000000074a8000 CR4: 00000000003526b0 [ 51.694000][ T44] Call Trace: [ 51.697342][ T44] [ 51.700315][ T44] xfrm_net_exit+0x31/0x80 [ 51.704771][ T44] cleanup_net+0x6bd/0xc90 [ 51.709251][ T44] ? __cfi_cleanup_net+0x10/0x10 [ 51.714213][ T44] ? __schedule+0x1357/0x1ea0 [ 51.718949][ T44] ? kick_pool+0xb9/0x550 [ 51.723317][ T44] process_scheduled_works+0x7d4/0x1020 [ 51.728959][ T44] worker_thread+0xc70/0x10b0 [ 51.733688][ T44] ? __cfi_try_to_wake_up+0x10/0x10 [ 51.738979][ T44] kthread+0x2c9/0x370 [ 51.743088][ T44] ? __cfi_worker_thread+0x10/0x10 [ 51.748312][ T44] ? __cfi_kthread+0x10/0x10 [ 51.752942][ T44] ret_from_fork+0x67/0xa0 [ 51.757478][ T44] ? __cfi_kthread+0x10/0x10 [ 51.762103][ T44] ret_from_fork_asm+0x1a/0x30 [ 51.766952][ T44] [ 51.770006][ T44] ---[ end trace 0000000000000000 ]--- 2026/02/01 03:28:26 executed programs: 846 2026/02/01 03:28:31 executed programs: 1147