Warning: Permanently added '10.128.10.19' (ED25519) to the list of known hosts. 2023/11/05 00:40:51 ignoring optional flag "sandboxArg"="0" 2023/11/05 00:40:51 parsed 1 programs [ 68.076303][ T26] audit: type=1400 audit(1699144851.234:169): avc: denied { getattr } for pid=2571 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.100378][ T26] audit: type=1400 audit(1699144851.234:170): avc: denied { read } for pid=2571 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.121584][ T26] audit: type=1400 audit(1699144851.234:171): avc: denied { open } for pid=2571 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.145292][ T26] audit: type=1400 audit(1699144851.244:172): avc: denied { mounton } for pid=2576 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.170835][ T26] audit: type=1400 audit(1699144851.244:173): avc: denied { mount } for pid=2576 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2023/11/05 00:40:51 executed programs: 0 [ 68.227424][ T26] audit: type=1400 audit(1699144851.394:174): avc: denied { unlink } for pid=2576 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.263786][ T2576] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 68.652572][ T2769] modprobe (2769) used greatest stack depth: 12040 bytes left [ 68.675640][ T2780] modprobe (2780) used greatest stack depth: 11592 bytes left [ 68.885220][ T26] audit: type=1400 audit(1699144852.044:175): avc: denied { write } for pid=2586 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 68.906048][ T26] audit: type=1400 audit(1699144852.044:176): avc: denied { read } for pid=2586 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 70.282205][ T2586] veth0_vlan: entered promiscuous mode [ 70.322106][ T2596] veth0_vlan: entered promiscuous mode [ 70.334873][ T2597] veth0_vlan: entered promiscuous mode [ 70.343559][ T2599] veth0_vlan: entered promiscuous mode [ 70.427957][ T2582] veth0_vlan: entered promiscuous mode [ 70.508640][ T2607] veth0_vlan: entered promiscuous mode [ 70.960196][ T26] audit: type=1400 audit(1699144854.094:177): avc: denied { prog_load } for pid=3895 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 70.979774][ T26] audit: type=1400 audit(1699144854.094:178): avc: denied { bpf } for pid=3895 comm="syz-executor.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 2023/11/05 00:40:56 executed programs: 118 panic: runtime error: floating point error [signal SIGFPE: floating-point exception code=0x80 addr=0x0 pc=0x40dccf] goroutine 296 [running]: time.NewTimer(0xc0010647b0?) /usr/local/go/src/time/sleep.go:87 +0x2e github.com/google/syzkaller/pkg/ipc.(*command).exec.func1() /syzkaller/jobs/linux/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:770 +0x3c created by github.com/google/syzkaller/pkg/ipc.(*command).exec /syzkaller/jobs/linux/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:769 +0x25b Connection to 10.128.10.19 closed by remote host.