Warning: Permanently added '10.128.0.114' (ED25519) to the list of known hosts. 2025/05/18 04:39:28 ignoring optional flag "sandboxArg"="0" 2025/05/18 04:39:28 ignoring optional flag "type"="gce" 2025/05/18 04:39:28 parsed 1 programs [ 47.739133][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 47.739147][ T30] audit: type=1400 audit(1747543168.340:92): avc: denied { unlink } for pid=321 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/05/18 04:39:28 executed programs: 0 [ 47.783840][ T321] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 47.839590][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.846628][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.854047][ T327] device bridge_slave_0 entered promiscuous mode [ 47.860871][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.868057][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.875650][ T327] device bridge_slave_1 entered promiscuous mode [ 47.921530][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.928612][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.935906][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.943576][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.963214][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.970609][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.978057][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.985850][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.995225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.003611][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.010669][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.019230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.027408][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.034454][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.046172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.055286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.068566][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.080668][ T327] device veth0_vlan entered promiscuous mode [ 48.087349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.095629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.103113][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.114092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.123512][ T327] device veth1_macvtap entered promiscuous mode [ 48.132875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.142842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.163262][ T30] audit: type=1400 audit(1747543168.760:93): avc: denied { prog_load } for pid=331 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 48.182733][ T30] audit: type=1400 audit(1747543168.780:94): avc: denied { bpf } for pid=331 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 48.204085][ T30] audit: type=1400 audit(1747543168.780:95): avc: denied { perfmon } for pid=331 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 48.390216][ T30] audit: type=1400 audit(1747543168.990:96): avc: denied { prog_run } for pid=331 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 48.409465][ T30] audit: type=1400 audit(1747543168.990:97): avc: denied { create } for pid=331 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 SIGQUIT: quit PC=0x40708e m=7 sigcode=128 goroutine 0 gp=0xc000e19340 m=7 mp=0xc0004cb808 [idle]: runtime/internal/syscall.Syscall6() /usr/local/go/src/runtime/internal/syscall/asm_linux_amd64.s:36 +0xe fp=0xc0015336d8 sp=0xc0015336d0 pc=0x40708e runtime/internal/syscall.EpollWait(0x5?, {0xc001533774?, 0x10?, 0x1?}, 0x0?, 0x0?) /usr/local/go/src/runtime/internal/syscall/syscall_linux.go:55 +0x45 fp=0xc001533728 sp=0xc0015336d8 pc=0x407005 runtime.netpoll(0xc000040010?) /usr/local/go/src/runtime/netpoll_epoll.go:118 +0xd2 fp=0xc001533db8 sp=0xc001533728 pc=0x439012 runtime.findRunnable() /usr/local/go/src/runtime/proc.go:3470 +0x8c5 fp=0xc001533f30 sp=0xc001533db8 pc=0x445545 runtime.schedule() /usr/local/go/src/runtime/proc.go:3868 +0xb1 fp=0xc001533f68 sp=0xc001533f30 pc=0x446ab1 runtime.park_m(0xc000241c00) /usr/local/go/src/runtime/proc.go:4036 +0x1ec fp=0xc001533fc0 sp=0xc001533f68 pc=0x44708c runtime.mcall() /usr/local/go/src/runtime/asm_amd64.s:458 +0x4e fp=0xc001533fd8 sp=0xc001533fc0 pc=0x470f4e goroutine 1 gp=0xc0000061c0 m=nil [semacquire]: runtime.gopark(0x8?, 0xc00159fdd8?, 0x0?, 0x0?, 0xc000403b00?) /usr/local/go/src/runtime/proc.go:402 +0xce fp=0xc00159fd48 sp=0xc00159fd28 pc=0x43f86e runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:408 runtime.semacquire1(0xc0004f4b68, 0x0, 0x1, 0x0, 0x12) /usr/local/go/src/runtime/sema.go:160 +0x225 fp=0xc00159fdb0 sp=0xc00159fd48 pc=0x4524e5 sync.runtime_Semacquire(0x53a02f?) /usr/local/go/src/runtime/sema.go:62 +0x25 fp=0xc00159fde8 sp=0xc00159fdb0 pc=0x46ef65 sync.(*WaitGroup).Wait(0xc0000946c0?) /usr/local/go/src/sync/waitgroup.go:116 +0x48 fp=0xc00159fe10 sp=0xc00159fde8 pc=0x47f968 main.main() /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/tools/syz-execprog/execprog.go:131 +0x645 fp=0xc00159ff50 sp=0xc00159fe10 pc=0x8e1465 runtime.main() /usr/local/go/src/runtime/proc.go:271 +0x29d fp=0xc00159ffe0 sp=0xc00159ff50 pc=0x43f43d runtime.goexit({}) /usr/local/go/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00159ffe8 sp=0xc00159ffe0 pc=0x472e01 goroutine 2 gp=0xc000006700 m=nil [force gc (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:402 +0xce fp=0xc00005cfa8 sp=0xc00005cf88 pc=0x43f86e runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:408 runtime.forcegchelper() /usr/local/go/src/runtime/proc.go:326 +0xb3 fp=0xc00005cfe0 sp=0xc00005cfa8 pc=0x43f6f3 runtime.goexit({}) /usr/local/go/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00005cfe8 sp=0xc00005cfe0 pc=0x472e01 created by runtime.init.6 in goroutine 1 /usr/local/go/src/runtime/proc.go:314 +0x1a goroutine 17 gp=0xc00008c000 m=nil [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:402 +0xce fp=0xc000058780 sp=0xc000058760 pc=0x43f86e runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:408 runtime.bgsweep(0xc000088000) /usr/local/go/src/runtime/mgcsweep.go:318 +0xdf fp=0xc0000587c8 sp=0xc000058780 pc=0x429f1f runtime.gcenable.gowrap1() /usr/local/go/src/runtime/mgc.go:203 +0x25 fp=0xc0000587e0 sp=0xc0000587c8 pc=0x41e825 runtime.goexit({}) /usr/local/go/src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0000587e8 sp=0xc0000587e0 pc=0x472e01 created by runtime.gcenable in goroutine 1 /usr/local/go/src/runtime/mgc.go:203 +0x66 goroutine 18 gp=0xc00008c1c0 m=nil [GC scavenge wait]: runtime.gopark(0x10000?, 0xc6f868?, 0x0?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:402 +0xce fp=0xc000058f78 sp=0xc000058f58 pc=0x43f86e runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:408 runtime.(*scavengerState).park(0x1f3f8e0) /usr/local/go/src/runtime/mgcscavenge.go:425 +0x49 fp=0xc000058fa8 sp=0xc000058f78 pc=0x4278c9 runtime.bgscavenge(0xc000088000) /usr/local/go/src/runtime/mgcscavenge.go:658 +0x59 fp=0xc000058fc8 sp=0xc000058fa8 pc=0x427e79 runtime.gcenable.gowrap2() [ 48.429364][ T30] audit: type=1400 audit(1747543168.990:98): avc: denied { open } for pid=331 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.449397][ T30] audit: type=1400 audit(1747543168.990:99): avc: denied { kernel } for pid=331 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 Connection to 10.128.0.114 closed by remote host. [ 49.609777][ T45] device bridge_slave_1 left promiscuous mode [ 49.615902][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.623561][ T45] device bridge_slave_0 left promiscuous mode [ 49.629743][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.637660][ T45] device veth1_macvtap left promiscuous mode [ 49.643706][ T45] device veth0_vlan left promiscuous mode