Warning: Permanently added '10.128.1.73' (ED25519) to the list of known hosts. 2025/07/29 12:59:55 ignoring optional flag "sandboxArg"="0" 2025/07/29 12:59:55 ignoring optional flag "type"="gce" 2025/07/29 12:59:56 parsed 1 programs [ 43.822618][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 43.822634][ T30] audit: type=1400 audit(1753793996.152:92): avc: denied { unlink } for pid=327 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/07/29 12:59:56 executed programs: 0 [ 43.877922][ T327] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.934863][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.942251][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.949592][ T334] device bridge_slave_0 entered promiscuous mode [ 43.956486][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.963538][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.970867][ T334] device bridge_slave_1 entered promiscuous mode [ 44.011507][ T30] audit: type=1400 audit(1753793996.332:93): avc: denied { create } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.032120][ T30] audit: type=1400 audit(1753793996.332:94): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.038727][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.053127][ T30] audit: type=1400 audit(1753793996.332:95): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.059866][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.087495][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.094575][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.113149][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.120589][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.128127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.135758][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.144833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.153168][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.160217][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.168834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.177027][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.184074][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.196266][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.205562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.219202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.230381][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.238584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.246286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.254658][ T334] device veth0_vlan entered promiscuous mode [ 44.264522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.273579][ T334] device veth1_macvtap entered promiscuous mode [ 44.283021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.293340][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.315546][ T30] audit: type=1400 audit(1753793996.642:96): avc: denied { prog_load } for pid=344 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 44.339860][ T30] audit: type=1400 audit(1753793996.642:97): avc: denied { bpf } for pid=344 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 44.360772][ T30] audit: type=1400 audit(1753793996.642:98): avc: denied { perfmon } for pid=344 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 44.553048][ T30] audit: type=1400 audit(1753793996.882:99): avc: denied { prog_run } for pid=344 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 SIGTRAP: trace trap PC=0x40dd0e m=7 sigcode=128 goroutine 0 gp=0xc00008dc00 m=7 mp=0xc0011dd808 [idle]: internal/runtime/syscall.Syscall6() /usr/local/go/src/internal/runtime/syscall/asm_linux_amd64.s:36 +0xe fp=0xc0000a56d8 sp=0xc0000a56d0 pc=0x40dd0e internal/runtime/syscall.EpollWait(0x5?, {0xc0000a5764?, 0x8?, 0x8?}, 0x1?, 0x0?) /usr/local/go/src/internal/runtime/syscall/syscall_linux.go:32 +0x45 fp=0xc0000a5728 sp=0xc0000a56d8 pc=0x40dca5 runtime.netpoll(0xc00003c010?) /usr/local/go/src/runtime/netpoll_epoll.go:119 +0xd2 fp=0xc0000a5db0 sp=0xc0000a5728 pc=0x43b9f2 runtime.findRunnable() /usr/local/go/src/runtime/proc.go:3605 +0x8c5 fp=0xc0000a5f28 sp=0xc0000a5db0 pc=0x448905 runtime.schedule() /usr/local/go/src/runtime/proc.go:4020 +0xb1 fp=0xc0000a5f60 sp=0xc0000a5f28 pc=0x449ed1 runtime.park_m(0xc0003bf6c0) /usr/local/go/src/runtime/proc.go:4144 +0x285 fp=0xc0000a5fc0 sp=0xc0000a5f60 pc=0x44a385 runtime.mcall() /usr/local/go/src/runtime/asm_amd64.s:459 +0x4e fp=0xc0000a5fd8 sp=0xc0000a5fc0 pc=0x47b30e goroutine 1 gp=0xc000002380 m=nil [sync.WaitGroup.Wait]: runtime.gopark(0xc0011d5da0?, 0x4190f4?, 0x80?, 0x61?, 0x7f2d858eaf50?) /usr/local/go/src/runtime/proc.go:435 +0xce fp=0xc0011d5d40 sp=0xc0011d5d20 pc=0x4755ce runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:441 runtime.semacquire1(0xc00041e1e8, 0x0, 0x1, 0x0, 0x18) /usr/local/go/src/runtime/sema.go:188 +0x21d fp=0xc0011d5da8 sp=0xc0011d5d40 pc=0x455bfd sync.runtime_SemacquireWaitGroup(0x5510cf?) /usr/local/go/src/runtime/sema.go:110 +0x25 fp=0xc0011d5de0 sp=0xc0011d5da8 pc=0x476b85 sync.(*WaitGroup).Wait(0xc00007d1f0?) /usr/local/go/src/sync/waitgroup.go:118 +0x48 fp=0xc0011d5e08 sp=0xc0011d5de0 pc=0x4884e8 main.main() /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/tools/syz-execprog/execprog.go:131 +0x645 fp=0xc0011d5f50 sp=0xc0011d5e08 pc=0x8f27a5 runtime.main() /usr/local/go/src/runtime/proc.go:283 +0x28b fp=0xc0011d5fe0 sp=0xc0011d5f50 pc=0x44250b runtime.goexit({}) /usr/local/go/src/runtime/asm_amd64.s:1700 +0x1 fp=0xc0011d5fe8 sp=0xc0011d5fe0 pc=0x47d1c1 goroutine 2Connection to 10.128.1.73 closed by remote host. [ 46.103179][ T306] device bridge_slave_1 left promiscuous mode [ 46.109303][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.116712][ T306] device bridge_slave_0 left promiscuous mode [ 46.122919][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.130828][ T306] device veth1_macvtap left promiscuous mode [ 46.136869][ T306] device veth0_vlan left promiscuous mode