Warning: Permanently added '10.128.1.113' (ED25519) to the list of known hosts. 2025/01/09 21:38:10 ignoring optional flag "sandboxArg"="0" 2025/01/09 21:38:11 parsed 1 programs [ 100.823405][ T24] audit: type=1400 audit(1736458691.350:66): avc: denied { node_bind } for pid=355 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 103.998294][ T24] audit: type=1400 audit(1736458694.520:67): avc: denied { mounton } for pid=361 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 104.000877][ T361] cgroup: Unknown subsys name 'net' [ 104.020844][ T24] audit: type=1400 audit(1736458694.520:68): avc: denied { mount } for pid=361 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 104.047776][ T24] audit: type=1400 audit(1736458694.550:69): avc: denied { unmount } for pid=361 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 104.048049][ T361] cgroup: Unknown subsys name 'devices' [ 104.313660][ T361] cgroup: Unknown subsys name 'hugetlb' [ 104.319145][ T361] cgroup: Unknown subsys name 'rlimit' [ 104.550723][ T24] audit: type=1400 audit(1736458695.080:70): avc: denied { setattr } for pid=361 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 104.573749][ T24] audit: type=1400 audit(1736458695.080:71): avc: denied { create } for pid=361 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.593876][ T24] audit: type=1400 audit(1736458695.080:72): avc: denied { write } for pid=361 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.614075][ T24] audit: type=1400 audit(1736458695.080:73): avc: denied { read } for pid=361 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.621169][ T369] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 104.634439][ T24] audit: type=1400 audit(1736458695.080:74): avc: denied { module_request } for pid=361 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 104.664050][ T24] audit: type=1400 audit(1736458695.080:75): avc: denied { mounton } for pid=361 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 104.703761][ T361] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 105.331917][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.338831][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.347182][ T372] device bridge_slave_0 entered promiscuous mode [ 105.355132][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.362313][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.370405][ T372] device bridge_slave_1 entered promiscuous mode [ 105.482542][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.489430][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.496676][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.503580][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.540704][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.547893][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.556212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.563748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.575219][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.583469][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.590516][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.601218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.609950][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.617187][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.636712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.647784][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.671158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.687367][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.696365][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.705487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.714395][ T372] device veth0_vlan entered promiscuous mode [ 105.730983][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.741435][ T372] device veth1_macvtap entered promiscuous mode [ 105.756413][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.768759][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.795924][ T372] request_module fs-gadgetfs succeeded, but still no fs? [ 105.810404][ T372] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 105.962356][ T24] kauditd_printk_skb: 23 callbacks suppressed [ 105.962378][ T24] audit: type=1401 audit(1736458696.490:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 106.033125][ T24] audit: type=1400 audit(1736458696.560:100): avc: denied { mounton } for pid=387 comm="syz-executor" path="/root/syzkaller.fYLWvB/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 106.058225][ T24] audit: type=1400 audit(1736458696.560:101): avc: denied { mount } for pid=387 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 106.335016][ T7] device bridge_slave_1 left promiscuous mode [ 106.341111][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.348984][ T7] device bridge_slave_0 left promiscuous mode [ 106.355281][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.364191][ T7] device veth1_macvtap left promiscuous mode [ 106.370224][ T7] device veth0_vlan left promiscuous mode [ 106.855172][ T24] audit: type=1400 audit(1736458697.380:102): avc: denied { create } for pid=414 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 107.136002][ T24] audit: type=1400 audit(1736458697.660:103): avc: denied { sys_admin } for pid=419 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 107.181219][ T24] audit: type=1400 audit(1736458697.710:104): avc: denied { sys_chroot } for pid=420 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 2025/01/09 21:38:18 executed programs: 0 [ 108.099685][ T453] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.106612][ T453] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.114451][ T453] device bridge_slave_0 entered promiscuous mode [ 108.121665][ T453] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.128527][ T453] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.136380][ T453] device bridge_slave_1 entered promiscuous mode [ 108.232976][ T453] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.239876][ T453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.246999][ T453] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.253899][ T453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.297568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.305741][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.313065][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.333405][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.341584][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.348428][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.359161][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.367412][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.374290][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.399602][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.407785][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.418079][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.426859][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.455238][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.463955][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.472601][ T24] audit: type=1400 audit(1736458699.000:105): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 108.484179][ T453] device veth0_vlan entered promiscuous mode [ 108.501108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.509228][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.517937][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.525676][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.551295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 108.559525][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.570931][ T453] device veth1_macvtap entered promiscuous mode [ 108.583984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.592751][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 108.601479][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.613281][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.621964][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.649226][ T24] audit: type=1400 audit(1736458699.170:106): avc: denied { mounton } for pid=453 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 108.684898][ T24] audit: type=1400 audit(1736458699.210:107): avc: denied { map_create } for pid=458 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 108.729134][ T24] audit: type=1400 audit(1736458699.210:108): avc: denied { map_read map_write } for pid=458 comm="syz.2.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2025/01/09 21:38:23 executed programs: 188 panic: runtime error: floating point error [signal SIGFPE: floating-point exception code=0x80 addr=0x0 pc=0x9dadd0] goroutine 26 [running]: github.com/google/syzkaller/prog.foreachArgImpl({0x1c9c7c0, 0xc000cdbe30}, 0xc002e47548?, 0xc004ab0000, 0xc002e47818) /syzkaller/gopath/src/github.com/google/syzkaller/prog/analysis.go:165 +0x2b0 github.com/google/syzkaller/prog.ForeachArg(0xc00024a280, 0xc002e47818) /syzkaller/gopath/src/github.com/google/syzkaller/prog/analysis.go:146 +0x51 github.com/google/syzkaller/prog.calcChecksumsCall(0xc00024a280) /syzkaller/gopath/src/github.com/google/syzkaller/prog/checksum.go:33 +0xa5 github.com/google/syzkaller/prog.(*Prog).SerializeForExec(0xc0013d0780) /syzkaller/gopath/src/github.com/google/syzkaller/prog/encodingexec.go:77 +0x18c github.com/google/syzkaller/pkg/rpcserver.(*Runner).sendRequest(0xc000000000, 0xc0049f3450) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/rpcserver/runner.go:295 +0x226 github.com/google/syzkaller/pkg/rpcserver.(*Runner).ConnectionLoop(0xc000000000) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/rpcserver/runner.go:180 +0x565 github.com/google/syzkaller/pkg/rpcserver.(*server).connectionLoop(0xc001184700, 0xc000000000) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/rpcserver/rpcserver.go:356 +0x105 github.com/google/syzkaller/pkg/rpcserver.(*server).handleRunnerConn(0xc001184700, 0xc000000000, 0xc00024a460) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/rpcserver/rpcserver.go:294 +0x411 github.com/google/syzkaller/pkg/rpcserver.(*server).handleConn(0xc001184700, 0xc00024a460) /syzkaller/gopath/src/github.com/google/syzkaller/pkg/rpcserver/rpcserver.go:261 +0x2b6 github.com/google/syzkaller/pkg/flatrpc.ListenAndServe.func1.1() /syzkaller/gopath/src/github.com/google/syzkaller/pkg/flatrpc/conn.go:55 +0x122 created by github.com/google/syzkaller/pkg/flatrpc.ListenAndServe.func1 in goroutine 21 /syzkaller/gopath/src/github.com/google/syzkaller/pkg/flatrpc/conn.go:52 +0xb1 [ 114.720877][ T7] device bridge_slave_1 left promiscuous mode [ 114.727295][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.735793][ T7] device bridge_slave_0 left promiscuous mode [ 114.741972][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.751053][ T7] device veth1_macvtap left promiscuous mode [ 114.756918][ T7] device veth0_vlan left promiscuous mode