Warning: Permanently added '10.128.10.7' (ED25519) to the list of known hosts. 2025/05/18 04:32:44 ignoring optional flag "sandboxArg"="0" 2025/05/18 04:32:44 ignoring optional flag "type"="gce" 2025/05/18 04:32:44 parsed 1 programs [ 46.041814][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 46.041828][ T30] audit: type=1400 audit(1747542764.278:92): avc: denied { unlink } for pid=320 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/05/18 04:32:44 executed programs: 0 [ 46.116271][ T320] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 46.183136][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.190184][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.199122][ T326] device bridge_slave_0 entered promiscuous mode [ 46.207388][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.215273][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.222992][ T326] device bridge_slave_1 entered promiscuous mode [ 46.276970][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.286432][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.295508][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.304362][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.324033][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.331618][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.339470][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.347777][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.357862][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.366365][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.373949][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.383494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.392546][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.399671][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.413079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.423736][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.438366][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.450298][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.459067][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.468272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.477153][ T326] device veth0_vlan entered promiscuous mode [ 46.488032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.497494][ T326] device veth1_macvtap entered promiscuous mode [ 46.507431][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.518466][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.575119][ T30] audit: type=1400 audit(1747542764.808:93): avc: denied { prog_load } for pid=330 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 46.596732][ T30] audit: type=1400 audit(1747542764.808:94): avc: denied { bpf } for pid=330 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 46.618791][ T30] audit: type=1400 audit(1747542764.808:95): avc: denied { perfmon } for pid=330 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 SIGILL: illegal instruction PC=0x474637 m=1 sigcode=128 instruction bytes: 0x48 0x83 0xc4 0x10 0x5d 0xc3 0xcc 0xcc 0xcc 0xb8 0xba 0x0 0x0 0x0 0xf 0x5 goroutine 0 gp=0xc000006540 m=1 mp=0xc000060008 [idle]: runtime.usleep(0x14) /usr/local/go/src/runtime/sys_linux_amd64.s:135 +0x37 fp=0xc000043f38 sp=0xc000043f18 pc=0x474637 runtime.sysmon() /usr/local/go/src/runtime/proc.go:5965 +0xa5 fp=0xc000043fa0 sp=0xc000043f38 pc=0x44bd65 runtime.mstart1() /usr/local/go/src/runtime/proc.go:1729 +0x93 fp=0xc000043fc8 sp=0xc000043fa0 pc=0x442613 runtime.mstart0() /usr/local/go/src/runtime/proc.go:1686 +0x76 fp=0xc000043ff8 sp=0xc000043fc8 pc=0x442556 runtime.mstart() /usr/local/go/src/runtime/asm_amd64.s:394 +0x5 fp=0xc000044000 sp=0xc000043ff8 pc=0x470ec5 goroutine 1 gp=0xc0000061c0 m=nil [semacquire]: runtime.gopark(0x1fa2b00?, 0xc000fbfdd8?, 0x80?, 0xd3?, 0x7f804e8be5b8?) /usr/local/go/src/runtime/proc.go:402 +0xce fp=0xc00154fd48 sp=0xc00154fd28 pc=0x43f86e runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:408 runtime.semacquire1(0xc000f64048, 0x0, 0x1, 0x0, 0x12) /usr/local/go/src/runtime/sema.go:160 +0x225 fp=0xc00154fdb0 sp=0xc00154fd48 pc=0x4524e5 sync.runtime_Semacquire(0x53a02f?) /usr/local/go/src/runtime/sema.go:62 +0x25 fp=0xc00154fde8 sp=0xc00154fdb0 pc=0x46ef65 sync.(*WaitGroup).Wait(0xc001484000?) /usr/local/go/src/sync/waitgroup.go:116 +0x48 fp=0xc00154fe10 sp=0xc00154fde8 pc=0x47f968 main.main() /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/tools/syz-execprog/execprog.go:131 +0x645 fp=0xc00154ff50 sp=0xc00154fe10 pc=0x8e1465 runtime.main() [ 46.797454][ T30] audit: type=1400 audit(1747542765.028:96): avc: denied { prog_run } for pid=330 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 /usr/local/go/src/runtime/proc.go:271Connection to 10.128.10.7 closed by remote host. [ 47.841927][ T45] device bridge_slave_1 left promiscuous mode [ 47.848245][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.855921][ T45] device bridge_slave_0 left promiscuous mode [ 47.862491][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.870774][ T45] device veth1_macvtap left promiscuous mode [ 47.877130][ T45] device veth0_vlan left promiscuous mode