Warning: Permanently added '10.128.1.174' (ED25519) to the list of known hosts. 2025/08/01 19:25:57 ignoring optional flag "sandboxArg"="0" 2025/08/01 19:25:57 ignoring optional flag "type"="gce" 2025/08/01 19:25:58 parsed 1 programs 2025/08/01 19:25:58 executed programs: 0 [ 45.549040][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 45.549051][ T24] audit: type=1400 audit(1754076358.130:92): avc: denied { unlink } for pid=318 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 45.581369][ T318] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.626836][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.634038][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.641382][ T324] device bridge_slave_0 entered promiscuous mode [ 45.648078][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.655084][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.662775][ T324] device bridge_slave_1 entered promiscuous mode [ 45.692048][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.699109][ T324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.706332][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.713371][ T324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.729026][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.736363][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.743733][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.751544][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.760773][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.769102][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.776125][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.785019][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.793371][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.800439][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.811589][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.821774][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.834223][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.844564][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.852788][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.860332][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.868867][ T324] device veth0_vlan entered promiscuous mode [ 45.878393][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.887752][ T324] device veth1_macvtap entered promiscuous mode [ 45.896581][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.906359][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.926661][ T24] audit: type=1400 audit(1754076358.500:93): avc: denied { prog_load } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 45.946527][ T24] audit: type=1400 audit(1754076358.520:94): avc: denied { bpf } for pid=328 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 45.967679][ T24] audit: type=1400 audit(1754076358.520:95): avc: denied { perfmon } for pid=328 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 45.997694][ T24] audit: type=1400 audit(1754076358.570:96): avc: denied { create } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 46.017562][ T24] audit: type=1400 audit(1754076358.570:97): avc: denied { setopt } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 46.037565][ T24] audit: type=1400 audit(1754076358.570:98): avc: denied { read write } for pid=328 comm="syz-executor.0" name="uinput" dev="devtmpfs" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 46.061637][ T24] audit: type=1400 audit(1754076358.570:99): avc: denied { open } for pid=328 comm="syz-executor.0" path="/dev/uinput" dev="devtmpfs" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 46.085855][ T24] audit: type=1400 audit(1754076358.570:100): avc: denied { ioctl } for pid=328 comm="syz-executor.0" path="/dev/uinput" dev="devtmpfs" ino=257 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 46.112357][ T24] audit: type=1400 audit(1754076358.690:101): avc: denied { prog_run } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2025/08/01 19:26:03 executed programs: 35 2025/08/01 19:26:08 executed programs: 77 2025/08/01 19:26:13 executed programs: 120 2025/08/01 19:26:18 executed programs: 160 2025/08/01 19:26:23 executed programs: 199 2025/08/01 19:26:28 executed programs: 239 2025/08/01 19:26:33 executed programs: 278 2025/08/01 19:26:38 executed programs: 319 2025/08/01 19:26:43 executed programs: 357 2025/08/01 19:26:49 executed programs: 396 2025/08/01 19:26:54 executed programs: 432 2025/08/01 19:26:59 executed programs: 467 2025/08/01 19:27:04 executed programs: 501 2025/08/01 19:27:09 executed programs: 538 2025/08/01 19:27:14 executed programs: 576 2025/08/01 19:27:19 executed programs: 617 2025/08/01 19:27:24 executed programs: 659 2025/08/01 19:27:29 executed programs: 695 2025/08/01 19:27:34 executed programs: 732 2025/08/01 19:27:39 executed programs: 772 2025/08/01 19:27:44 executed programs: 811 2025/08/01 19:27:49 executed programs: 848 2025/08/01 19:27:54 executed programs: 885 2025/08/01 19:28:00 executed programs: 924 SIGFPE: floating-point exception PC=0x4598a0 m=6 sigcode=128 instruction bytes: 0x48 0x89 0x16 0x48 0x89 0x78 0x28 0x48 0x8b 0x50 0x68 0x48 0x1 0xd1 0x48 0x81 goroutine 0 gp=0xc00008d880 m=6 mp=0xc000093008 [idle]: runtime.stackpoolalloc(0x1) /usr/local/go/src/runtime/stack.go:213 +0x100 fp=0xc0014f5cd0 sp=0xc0014f5c90 pc=0x4598a0 runtime.stackcacherefill(0x7f33f2384108, 0x1) /usr/local/go/src/runtime/stack.go:282 +0x56 fp=0xc0014f5d10 sp=0xc0014f5cd0 pc=0x459b36 runtime.stackalloc(0x1000) /usr/local/go/src/runtime/stack.go:384 +0x2e8 fp=0xc0014f5d98 sp=0xc0014f5d10 pc=0x45a108 runtime.copystack(0xc0000028c0, 0x800000002?) /usr/local/go/src/runtime/stack.go:874 +0xe5 fp=0xc0014f5e90 sp=0xc0014f5d98 pc=0x45ac65 runtime.newstack() /usr/local/go/src/runtime/stack.go:1116 +0x485 fp=0xc0014f5fc8 sp=0xc0014f5e90 pc=0x45b445 runtime.morestack() /usr/local/go/src/runtime/asm_amd64.s:621 +0x7a fp=0xc0014f5fd0 sp=0xc0014f5fc8 pc=0x47b53a goroutine 2 gp=0xc0000028c0 m=6 mp=0xc000093008 [copystack]: runtime.rawstringtmp(0x0?, 0x23?) /usr/local/go/src/runtime/string.go:170 +0xa5 fp=0xc00005cba0 sp=0xc00005cb98 pc=0x45d4c5 runtime.concatstrings(Connection to 10.128.1.174 closed by remote host. [ 170.368100][ T7] device bridge_slave_1 left promiscuous mode [ 170.374225][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.381754][ T7] device bridge_slave_0 left promiscuous mode [ 170.387957][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.395652][ T7] device veth1_macvtap left promiscuous mode [ 170.401818][ T7] device veth0_vlan left promiscuous mode