Warning: Permanently added '10.128.0.153' (ED25519) to the list of known hosts. 2026/02/20 10:16:35 parsed 1 programs [ 194.535214][ T36] audit: type=1400 audit(1771582595.940:64): avc: denied { node_bind } for pid=290 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 195.455617][ T36] audit: type=1400 audit(1771582596.860:65): avc: denied { mounton } for pid=296 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 195.456882][ T296] cgroup: Unknown subsys name 'net' [ 195.478468][ T36] audit: type=1400 audit(1771582596.860:66): avc: denied { mount } for pid=296 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 195.505984][ T36] audit: type=1400 audit(1771582596.890:67): avc: denied { unmount } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 195.506149][ T296] cgroup: Unknown subsys name 'devices' [ 195.673334][ T296] cgroup: Unknown subsys name 'hugetlb' [ 195.679171][ T296] cgroup: Unknown subsys name 'rlimit' [ 195.797685][ T36] audit: type=1400 audit(1771582597.200:68): avc: denied { setattr } for pid=296 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 195.820906][ T36] audit: type=1400 audit(1771582597.200:69): avc: denied { create } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 195.831208][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 195.841529][ T36] audit: type=1400 audit(1771582597.200:70): avc: denied { write } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 195.870272][ T36] audit: type=1400 audit(1771582597.200:71): avc: denied { read } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 195.876604][ T296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 195.891273][ T36] audit: type=1400 audit(1771582597.200:72): avc: denied { sys_module } for pid=296 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 195.921349][ T36] audit: type=1400 audit(1771582597.200:73): avc: denied { mounton } for pid=296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 196.832671][ T305] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 197.446623][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.468057][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.476811][ T335] bridge_slave_0: entered allmulticast mode [ 197.484619][ T335] bridge_slave_0: entered promiscuous mode [ 197.491996][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.499322][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.506485][ T335] bridge_slave_1: entered allmulticast mode [ 197.512833][ T335] bridge_slave_1: entered promiscuous mode [ 197.685343][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.692619][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.700000][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.707128][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.732789][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.741760][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.752029][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.759103][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.770344][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.777541][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state 2026/02/20 10:16:39 executed programs: 0 [ 197.815936][ T335] veth0_vlan: entered promiscuous mode [ 197.826264][ T335] veth1_macvtap: entered promiscuous mode [ 198.015961][ T13] bridge_slave_1: left allmulticast mode [ 198.021651][ T13] bridge_slave_1: left promiscuous mode [ 198.027458][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.035226][ T13] bridge_slave_0: left allmulticast mode [ 198.040878][ T13] bridge_slave_0: left promiscuous mode [ 198.047150][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.139811][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.146928][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.154111][ T375] bridge_slave_0: entered allmulticast mode [ 198.160510][ T375] bridge_slave_0: entered promiscuous mode [ 198.168057][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.175249][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.182777][ T375] bridge_slave_1: entered allmulticast mode [ 198.189323][ T375] bridge_slave_1: entered promiscuous mode [ 198.216961][ T377] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.224173][ T377] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.231428][ T377] bridge_slave_0: entered allmulticast mode [ 198.237701][ T377] bridge_slave_0: entered promiscuous mode [ 198.244621][ T377] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.252277][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.259433][ T377] bridge_slave_1: entered allmulticast mode [ 198.266252][ T377] bridge_slave_1: entered promiscuous mode [ 198.281437][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.288680][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.296241][ T379] bridge_slave_0: entered allmulticast mode [ 198.302437][ T379] bridge_slave_0: entered promiscuous mode [ 198.308917][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.316181][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.323608][ T379] bridge_slave_1: entered allmulticast mode [ 198.329913][ T379] bridge_slave_1: entered promiscuous mode [ 198.336921][ T13] veth1_macvtap: left promiscuous mode [ 198.342853][ T13] veth0_vlan: left promiscuous mode [ 198.426925][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.434227][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.442263][ T378] bridge_slave_0: entered allmulticast mode [ 198.448738][ T378] bridge_slave_0: entered promiscuous mode [ 198.458421][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.465728][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.473377][ T378] bridge_slave_1: entered allmulticast mode [ 198.479881][ T378] bridge_slave_1: entered promiscuous mode [ 198.646363][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.653528][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.661098][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.668219][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.678660][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.686440][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.722096][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.729158][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.737068][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.744128][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.753050][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.760176][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.767909][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.774996][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.798483][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.805592][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.815148][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.822313][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.843103][ T377] veth0_vlan: entered promiscuous mode [ 198.853650][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.860703][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.872522][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.879674][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.896169][ T377] veth1_macvtap: entered promiscuous mode [ 198.915812][ T379] veth0_vlan: entered promiscuous mode [ 198.927772][ T375] veth0_vlan: entered promiscuous mode [ 198.955892][ T379] veth1_macvtap: entered promiscuous mode [ 198.972362][ T375] veth1_macvtap: entered promiscuous mode [ 198.995667][ T378] veth0_vlan: entered promiscuous mode [ 199.023874][ T378] veth1_macvtap: entered promiscuous mode 2026/02/20 10:16:46 executed programs: 16 2026/02/20 10:16:52 executed programs: 24 2026/02/20 10:16:58 executed programs: 32 2026/02/20 10:17:04 executed programs: 40 2026/02/20 10:17:10 executed programs: 48 2026/02/20 10:17:16 executed programs: 56 2026/02/20 10:17:22 executed programs: 64 2026/02/20 10:17:28 executed programs: 72 2026/02/20 10:17:34 executed programs: 80 2026/02/20 10:17:40 executed programs: 88 2026/02/20 10:17:46 executed programs: 96 2026/02/20 10:17:52 executed programs: 104 2026/02/20 10:17:58 executed programs: 112 [ 277.371970][ T36] kauditd_printk_skb: 32 callbacks suppressed [ 277.371987][ T36] audit: type=1400 audit(1771582678.780:106): avc: denied { execute } for pid=735 comm="syz.5.123" dev="tmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 277.371996][ T741] process 'syz.5.123' launched '/dev/fd/4' with NULL argv: empty string added [ 277.408234][ T36] audit: type=1400 audit(1771582678.810:107): avc: denied { execute_no_trans } for pid=735 comm="syz.5.123" path=2F6D656D66643A2D42D54E34A64579DBD1A7B153F13A29202864656C6574656429 dev="tmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 277.436604][ T735] process 'memfd:-BÕN4¦EyÛѧ±Sñ:)' started with executable stack [ 277.444572][ T735] ------------[ cut here ]------------ [ 277.450039][ T735] WARNING: CPU: 0 PID: 735 at kernel/signal.c:375 task_participate_group_stop+0x242/0x300 [ 277.459926][ T735] Modules linked in: [ 277.463828][ T735] CPU: 0 UID: 0 PID: 735 Comm: memfd:-BÕN4¦EyÛ Not tainted syzkaller #0 73dd41fee924560e78783f72ff837ca22365b77d [ 277.475706][ T735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 277.485864][ T735] RIP: 0010:task_participate_group_stop+0x242/0x300 [ 277.492641][ T735] Code: 74 08 4c 89 f7 e8 2e 0a 8c 00 4d 89 2e f0 83 44 24 fc 00 4c 89 f7 be 15 00 00 00 e8 58 91 10 00 e9 aa fe ff ff e8 ae 2f 34 00 <0f> 0b 42 0f b6 04 2b 84 c0 0f 85 8c 00 00 00 45 8b 3e e9 ee fe ff [ 277.512460][ T735] RSP: 0018:ffffc90001d6fc28 EFLAGS: 00010093 [ 277.518511][ T735] RAX: ffffffff81536da2 RBX: 1ffff11023bb228e RCX: ffff88811c674c00 [ 277.526464][ T735] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 277.534417][ T735] RBP: ffffc90001d6fc58 R08: 0000000000000003 R09: 0000000000000004 [ 277.542375][ T735] R10: dffffc0000000000 R11: fffff520003adf8c R12: ffff88811dd91400 [ 277.550366][ T735] R13: dffffc0000000000 R14: ffff88811dd91470 R15: 0000000000000000 [ 277.558325][ T735] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 277.567500][ T735] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 277.574157][ T735] CR2: 00000000ff84ae6b CR3: 000000011df0a000 CR4: 00000000003526b0 [ 277.582144][ T735] Call Trace: [ 277.585691][ T735] [ 277.588690][ T735] do_signal_stop+0x63b/0x840 [ 277.593352][ T735] ? uprobe_deny_signal+0x7a/0x230 [ 277.598445][ T735] get_signal+0xab9/0x14e0 [ 277.602861][ T735] arch_do_signal_or_restart+0xbc/0x760 [ 277.608441][ T735] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 277.614622][ T735] syscall_exit_to_user_mode+0x57/0xb0 [ 277.620167][ T735] do_syscall_64+0x63/0xf0 [ 277.624577][ T735] ? clear_bhb_loop+0x50/0xa0 [ 277.629256][ T735] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 277.635160][ T735] RIP: 0023:0x33e [ 277.638794][ T735] Code: Unable to access opcode bytes at 0x314. [ 277.645008][ T735] RSP: 002b:00000000ff84ad90 EFLAGS: 00000202 ORIG_RAX: 000000000000000b [ 277.653406][ T735] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 277.661377][ T735] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 277.669429][ T735] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 277.677399][ T735] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 277.685450][ T735] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 277.693450][ T735] [ 277.696549][ T735] ---[ end trace 0000000000000000 ]--- 2026/02/20 10:18:04 executed programs: 120