Warning: Permanently added '10.128.1.79' (ED25519) to the list of known hosts. 2026/02/26 03:55:23 ignoring optional flag "type"="gce" 2026/02/26 03:55:23 parsed 1 programs [ 38.119156][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 38.119172][ T30] audit: type=1400 audit(1772078123.576:92): avc: denied { unlink } for pid=327 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2026/02/26 03:55:23 executed programs: 0 [ 38.174935][ T327] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 38.224349][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.231440][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.239098][ T335] device bridge_slave_0 entered promiscuous mode [ 38.245784][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.252842][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.260166][ T335] device bridge_slave_1 entered promiscuous mode [ 38.294444][ T30] audit: type=1400 audit(1772078123.746:93): avc: denied { create } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.299744][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.315135][ T30] audit: type=1400 audit(1772078123.746:94): avc: denied { write } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.322119][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.322202][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.343038][ T30] audit: type=1400 audit(1772078123.746:95): avc: denied { read } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.349853][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.394352][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.401920][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.409663][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.417084][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.426051][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.434230][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.441282][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.449983][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.458141][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.465196][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.476431][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.485899][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.499676][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.510468][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.518871][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.526259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.534578][ T335] device veth0_vlan entered promiscuous mode [ 38.543882][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.552737][ T335] device veth1_macvtap entered promiscuous mode [ 38.561656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.571473][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.592471][ T30] audit: type=1400 audit(1772078124.046:96): avc: denied { prog_load } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.618421][ T30] audit: type=1400 audit(1772078124.046:97): avc: denied { bpf } for pid=345 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 38.639283][ T30] audit: type=1400 audit(1772078124.046:98): avc: denied { perfmon } for pid=345 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 38.728243][ T30] audit: type=1400 audit(1772078124.176:99): avc: denied { prog_run } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.747447][ T30] audit: type=1400 audit(1772078124.186:100): avc: denied { create } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.748588][ C1] hrtimer: interrupt took 14985 ns [ 38.773036][ T30] audit: type=1400 audit(1772078124.186:101): avc: denied { open } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 SIGQUIT: quit PC=0x40dd0e m=8 sigcode=128 goroutine 0 gp=0xc0002b61c0 m=8 mp=0xc0002b2808 [idle]: internal/runtime/syscall.Syscall6() /usr/local/go/src/internal/runtime/syscall/asm_linux_amd64.s:36 +0xe fp=0xc0002fd6d8 sp=0xc0002fd6d0 pc=0x40dd0e internal/runtime/syscall.EpollWait(0x5?, {0xc0002fd764?, 0x8?, 0x8?}, 0x0?, 0x0?) /usr/local/go/src/internal/runtime/syscall/syscall_linux.go:32 +0x45 fp=0xc0002fd728 sp=0xc0002fd6d8 pc=0x40dca5 runtime.netpoll(0xc00003c010?) /usr/local/go/src/runtime/netpoll_epoll.go:119 +0xd2 fp=0xc0002fddb0 sp=0xc0002fd728 pc=0x43b9f2 runtime.findRunnable() /usr/local/go/src/runtime/proc.go:3605 +0x8c5 fp=0xc0002fdf28 sp=0xc0002fddb0 pc=0x448905 runtime.schedule() /usr/local/go/src/runtime/proc.go:4020 +0xb1 fp=0xc0002fdf60 sp=0xc0002fdf28 pc=0x449ed1 runtime.park_m(0xc000df2a80) /usr/local/go/src/runtime/proc.go:4144 +0x285 fp=0xc0002fdfc0 sp=0xc0002fdf60 pc=0x44a385 runtime.mcall() /usr/local/go/src/runtime/asm_amd64.s:459 +0x4e fp=0xc0002fdfd8 sp=0xc0002fdfc0 pc=0x47b30e goroutine 1 gp=0xc000002380 m=nil [sync.WaitGroup.Wait]: runtime.gopark(0xc0012a5da0?, 0x4190f4?, 0xc0?, 0x18?, 0x7fe2b2bd0ef8?) /usr/local/go/src/runtime/proc.go:435 +0xce fp=0xc0012a5d40 sp=0xc0012a5d20 pc=0x4755ce runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:441 runtime.semacquire1(0xc000201378, 0x0, 0x1, 0x0, 0x18) /usr/local/go/src/runtime/sema.go:188 +0x21d fp=0xc0012a5da8 sp=0xc0012a5d40 pc=0x455bfd sync.runtime_SemacquireWaitGroup(0x5510cf?) /usr/local/go/src/runtime/sema.go:110 +0x25 fp=0xc0012a5de0 sp=0xc0012a5da8 pc=0x476b85 sync.(*WaitGroup).Wait(0xc00007c9a0?) /usr/local/go/src/sync/waitgroup.go:118 +0x48 fp=0xc0012a5e08 sp=0xc0012a5de0 pc=0x4884e8 main.main() /syzkaller/jobs/linux/gopath/src/github.com/google/syzkaller/tools/syz-execprog/execprog.go:131 +0x645 fp=0xc0012a5f50 sp=0xc0012a5e08 pc=0x8f27a5 runtime.main() /usr/local/go/src/runtime/proc.go:283 +0x28b fp=0xc0012a5fe0 sp=0xc0012a5f50 pc=0x44250b runtime.goexit({}) /usr/local/go/src/runtime/asm_amd64.s:1700 +0x1 fp=0xc0012a5fe8 sp=0xc0012a5fe0 pc=0x47d1c1 goroutine 2 gp=0xc0000028c0 m=nil [force gc (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:435 +0xce fp=0xc00005afa8 sp=0xc00005af88 pc=0x4755ce runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:441 runtime.forcegchelper() /usr/local/go/src/runtime/proc.go:348 +0xb3 fp=0xc00005afe0 sp=0xc00005afa8 pc=0x442853 runtime.goexit({}) /usr/local/go/src/runtime/asm_amd64.s:1700 +0x1 fp=0xc00005afe8 sp=0xc00005afe0 pc=0x47d1c1 created by runtime.init.7 in goroutine 1 /usr/local/go/src/runtime/proc.go:336 +0x1a goroutine 17 gp=0xc00008c000 m=nil [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:435 +0xce fp=0xc000056780 sp=0xc000056760 pc=0x4755ce runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:441 runtime.bgsweep(0xc000088000) /usr/local/go/src/runtime/mgcsweep.go:316 +0xdf fp=0xc0000567c8 sp=0xc000056780 pc=0x42c19f runtime.gcenable.gowrap1() /usr/local/go/src/runtime/mgc.go:204Connection to 10.128.1.79 closed by remote host. [ 39.919400][ T45] device bridge_slave_1 left promiscuous mode [ 39.925624][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.933175][ T45] device bridge_slave_0 left promiscuous mode [ 39.939365][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.947810][ T45] device veth1_macvtap left promiscuous mode [ 39.954153][ T45] device veth0_vlan left promiscuous mode