Warning: Permanently added '10.128.0.64' (ED25519) to the list of known hosts. 2025/04/04 12:52:27 ignoring optional flag "sandboxArg"="0" 2025/04/04 12:52:28 parsed 1 programs [ 54.260638][ T24] kauditd_printk_skb: 31 callbacks suppressed [ 54.260652][ T24] audit: type=1400 audit(1743771149.190:107): avc: denied { unlink } for pid=437 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 54.349321][ T437] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.056981][ T24] audit: type=1400 audit(1743771149.990:108): avc: denied { create } for pid=473 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 55.162750][ T24] audit: type=1401 audit(1743771150.100:109): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 55.310125][ T488] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.317091][ T488] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.324958][ T488] device bridge_slave_0 entered promiscuous mode [ 55.331952][ T488] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.338902][ T488] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.346378][ T488] device bridge_slave_1 entered promiscuous mode [ 55.382023][ T488] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.389110][ T488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.396368][ T488] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.403435][ T488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.421444][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.429196][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.436372][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.445514][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.453551][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.460388][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.469050][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.477294][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.484303][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.496988][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.506780][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.520361][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 55.531231][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.539563][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.547626][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.561617][ T488] device veth0_vlan entered promiscuous mode [ 55.571561][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 55.580749][ T488] device veth1_macvtap entered promiscuous mode [ 55.590268][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 55.600333][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/04/04 12:52:30 executed programs: 0 [ 55.943121][ T502] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.950171][ T502] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.958243][ T502] device bridge_slave_0 entered promiscuous mode [ 55.965867][ T502] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.973743][ T502] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.980833][ T502] device bridge_slave_1 entered promiscuous mode [ 56.034233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.041627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.051001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.059554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.068633][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.075672][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.093046][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.100859][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.109235][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.117271][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.124161][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.133742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.143976][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.158688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.171368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.180114][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.188345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.198025][ T502] device veth0_vlan entered promiscuous mode [ 56.209561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.218933][ T502] device veth1_macvtap entered promiscuous mode [ 56.228603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.239316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 56.268590][ T24] audit: type=1400 audit(1743771151.200:110): avc: denied { map_create } for pid=515 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.287873][ T24] audit: type=1400 audit(1743771151.200:111): avc: denied { map_read map_write } for pid=515 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.312944][ T24] audit: type=1400 audit(1743771151.200:112): avc: denied { prog_load } for pid=515 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.332174][ T24] audit: type=1400 audit(1743771151.200:113): avc: denied { bpf } for pid=515 comm="syz.2.16" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 56.358181][ T24] audit: type=1400 audit(1743771151.200:114): avc: denied { perfmon } for pid=515 comm="syz.2.16" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 56.478724][ T24] audit: type=1400 audit(1743771151.410:115): avc: denied { prog_run } for pid=515 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 56.803121][ T9] device bridge_slave_1 left promiscuous mode [ 56.809092][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.816777][ T9] device bridge_slave_0 left promiscuous mode [ 56.823318][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.831539][ T9] device veth1_macvtap left promiscuous mode [ 56.840800][ T9] device veth0_vlan left promiscuous mode panic: runtime error: floating point error [signal SIGFPE: floating-point exception code=0x80 addr=0x0 pc=0x475058] goroutine 26 [running]: github.com/google/syzkaller/prog.(*execContext).serializeCall(0xc000f698b0, 0xc0005f2230) /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/prog/encodingexec.go:107 +0x2b4 github.com/google/syzkaller/prog.(*Prog).SerializeForExec(0xc0012889c0) /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/prog/encodingexec.go:78 +0x1ab github.com/google/syzkaller/pkg/rpcserver.(*Runner).sendRequest(0xc0000fc300, 0xc00184e1a0) /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/pkg/rpcserver/runner.go:295 +0x226 github.com/google/syzkaller/pkg/rpcserver.(*Runner).ConnectionLoop(0xc0000fc300) /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/pkg/rpcserver/runner.go:180 +0x565 github.com/google/syzkaller/pkg/rpcserver.(*server).connectionLoop(0xc0016d5100, 0xc0000fc300) /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/pkg/rpcserver/rpcserver.go:356 +0x105 github.com/google/syzkaller/pkg/rpcserver.(*server).handleRunnerConn(0xc0016d5100, 0xc0000fc300, 0xc0005f2460) /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/pkg/rpcserver/rpcserver.go:294 +0x411 github.com/google/syzkaller/pkg/rpcserver.(*server).handleConn(0xc0016d5100, 0xc0005f2460) /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/pkg/rpcserver/rpcserver.go:261 +0x2b6 github.com/google/syzkaller/pkg/flatrpc.ListenAndServe.func1.1() /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/pkg/flatrpc/conn.go:55 +0x122 created by github.com/google/syzkaller/pkg/flatrpc.ListenAndServe.func1 in goroutine 21 /syzkaller/jobs-2/linux/gopath/src/github.com/google/syzkaller/pkg/flatrpc/conn.go:52 +0xb1 [ 59.282416][ T9] device bridge_slave_1 left promiscuous mode [ 59.288490][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.295963][ T9] device bridge_slave_0 left promiscuous mode [ 59.301949][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.309933][ T9] device veth1_macvtap left promiscuous mode [ 59.315953][ T9] device veth0_vlan left promiscuous mode