Warning: Permanently added '10.128.1.14' (ED25519) to the list of known hosts. 2026/02/11 09:04:29 parsed 1 programs [ 27.518540][ T24] audit: type=1400 audit(1770800669.590:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.539663][ T24] audit: type=1400 audit(1770800669.590:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.559240][ T24] audit: type=1400 audit(1770800669.590:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 28.119021][ T24] audit: type=1400 audit(1770800670.190:67): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.120065][ T281] cgroup: Unknown subsys name 'net' [ 28.141651][ T24] audit: type=1400 audit(1770800670.190:68): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.168836][ T24] audit: type=1400 audit(1770800670.220:69): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.169075][ T281] cgroup: Unknown subsys name 'devices' [ 28.371035][ T281] cgroup: Unknown subsys name 'hugetlb' [ 28.376611][ T281] cgroup: Unknown subsys name 'rlimit' [ 28.608320][ T24] audit: type=1400 audit(1770800670.680:70): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.631481][ T24] audit: type=1400 audit(1770800670.680:71): avc: denied { create } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.651941][ T24] audit: type=1400 audit(1770800670.680:72): avc: denied { write } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.672175][ T24] audit: type=1400 audit(1770800670.680:73): avc: denied { read } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.677425][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.719598][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.096913][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 29.107276][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 29.577749][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.584819][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.592220][ T329] device bridge_slave_0 entered promiscuous mode [ 29.598891][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.605917][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.613266][ T329] device bridge_slave_1 entered promiscuous mode [ 29.643367][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.650390][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.657629][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.664657][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.680848][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.688291][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.695501][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.704131][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.712355][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.719359][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.728320][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.736460][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.743479][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.753959][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.762596][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.774517][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.784665][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.792770][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.800207][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.808064][ T329] device veth0_vlan entered promiscuous mode [ 29.817112][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.825820][ T329] device veth1_macvtap entered promiscuous mode [ 29.834144][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.843556][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2026/02/11 09:04:32 executed programs: 0 [ 30.118680][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.125752][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.133333][ T353] device bridge_slave_0 entered promiscuous mode [ 30.140484][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.147498][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.154875][ T353] device bridge_slave_1 entered promiscuous mode [ 30.192276][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.199283][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.206532][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.213561][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.235396][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.243157][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.250356][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.258612][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.267179][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.274211][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.282786][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.290941][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.297945][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.314242][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.323262][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.335289][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.351219][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.359098][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.366656][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.374823][ T353] device veth0_vlan entered promiscuous mode [ 30.390550][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.399197][ T353] device veth1_macvtap entered promiscuous mode [ 30.407511][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.416953][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.481896][ T385] erofs: (device loop2): mounted with root inode @ nid 36. [ 30.490040][ T385] BUG: scheduling while atomic: syz.2.17/385/0x00000002 [ 30.496963][ T385] Modules linked in: [ 30.500871][ T385] Preemption disabled at: [ 30.500907][ T385] [] z_erofs_reload_indexes+0x318/0x450 [ 30.512392][ T385] CPU: 1 PID: 385 Comm: syz.2.17 Not tainted syzkaller #0 [ 30.519472][ T385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 30.529506][ T385] Call Trace: [ 30.532783][ T385] __dump_stack+0x21/0x24 [ 30.537082][ T385] dump_stack_lvl+0x1a7/0x208 [ 30.541728][ T385] ? z_erofs_reload_indexes+0x318/0x450 [ 30.547242][ T385] ? show_regs_print_info+0x18/0x18 [ 30.552410][ T385] ? z_erofs_reload_indexes+0x318/0x450 [ 30.557923][ T385] dump_stack+0x15/0x1c [ 30.562051][ T385] __schedule_bug+0x183/0x240 [ 30.566696][ T385] ? __migrate_task+0x190/0x190 [ 30.571531][ T385] ? selinux_file_ioctl+0x3a0/0x4d0 [ 30.576703][ T385] ? putname+0xfe/0x150 [ 30.580829][ T385] __schedule+0xc45/0x1320 [ 30.585214][ T385] ? __se_sys_futex+0x2ba/0x370 [ 30.590033][ T385] ? __sched_text_start+0x8/0x8 [ 30.594850][ T385] ? __x64_sys_futex+0x100/0x100 [ 30.599762][ T385] ? fput_many+0x15a/0x1a0 [ 30.604146][ T385] schedule+0x13c/0x1d0 [ 30.608275][ T385] exit_to_user_mode_loop+0x4b/0xe0 [ 30.613443][ T385] exit_to_user_mode_prepare+0x76/0xa0 [ 30.618869][ T385] syscall_exit_to_user_mode+0x1d/0x40 [ 30.624293][ T385] do_syscall_64+0x3d/0x40 [ 30.628674][ T385] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 30.634538][ T385] RIP: 0033:0x7fbf43045f79 [ 30.638920][ T385] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 30.658496][ T385] RSP: 002b:00007fbf42ea90e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 30.666881][ T385] RAX: 0000000000000001 RBX: 00007fbf432bffa8 RCX: 00007fbf43045f79 [ 30.674822][ T385] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fbf432bffac [ 30.682773][ T385] RBP: 00007fbf432bffa0 R08: 001b93827b6e7c3c R09: 0000000000000000 [ 30.690717][ T385] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 30.698676][ T385] R13: 00007fbf432c0038 R14: 00007ffd62a9f150 R15: 00007ffd62a9f238