./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2628761134 <...> Warning: Permanently added '10.128.0.110' (ED25519) to the list of known hosts. execve("./syz-executor2628761134", ["./syz-executor2628761134"], 0x7ffc76157270 /* 10 vars */) = 0 brk(NULL) = 0x55555617b000 brk(0x55555617bd00) = 0x55555617bd00 arch_prctl(ARCH_SET_FS, 0x55555617b380) = 0 set_tid_address(0x55555617b650) = 295 set_robust_list(0x55555617b660, 24) = 0 rseq(0x55555617bca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2628761134", 4096) = 28 getrandom("\xdb\xb3\x8c\x90\xb3\xb7\xa7\xb7", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55555617bd00 brk(0x55555619cd00) = 0x55555619cd00 brk(0x55555619d000) = 0x55555619d000 mprotect(0x7f7ba6086000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 [ 21.893461][ T28] audit: type=1400 audit(1703222801.957:66): avc: denied { execmem } for pid=295 comm="syz-executor262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.912465][ T295] ================================================================================ [ 21.912826][ T28] audit: type=1400 audit(1703222801.957:67): avc: denied { bpf } for pid=295 comm="syz-executor262" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 21.921857][ T295] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:9205:63 [ 21.944096][ T28] audit: type=1400 audit(1703222801.957:68): avc: denied { prog_load } for pid=295 comm="syz-executor262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 21.951027][ T295] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 21.970634][ T28] audit: type=1400 audit(1703222801.957:69): avc: denied { perfmon } for pid=295 comm="syz-executor262" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 21.999198][ T295] CPU: 1 PID: 295 Comm: syz-executor262 Not tainted 6.1.57-syzkaller-00064-g30bca9e2785b #0 [ 22.009072][ T295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 22.018975][ T295] Call Trace: [ 22.022097][ T295] [ 22.024875][ T295] dump_stack_lvl+0x151/0x1b7 [ 22.029470][ T295] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 22.034775][ T295] ? stack_trace_snprint+0xf0/0xf0 [ 22.039720][ T295] dump_stack+0x15/0x17 [ 22.043884][ T295] __ubsan_handle_shift_out_of_bounds+0x3e1/0x440 [ 22.050121][ T295] scalar32_min_max_arsh+0x622/0x6c0 [ 22.055240][ T295] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 22.060882][ T295] adjust_reg_min_max_vals+0x3d20/0x6360 [ 22.066352][ T295] ? zext_32_to_64+0x290/0x290 [ 22.071046][ T295] ? find_equal_scalars+0x1a0/0x7c0 [ 22.076076][ T295] ? check_reg_arg+0x436/0x840 [ 22.080679][ T295] do_check+0x8e35/0xdd60 [ 22.084851][ T295] ? init_func_state+0x3c0/0x3c0 [ 22.089711][ T295] ? memset+0x35/0x40 [ 22.093533][ T295] ? btf_check_subprog_arg_match+0x182/0x300 [ 22.099339][ T295] do_check_common+0x6ce/0xed0 [ 22.103971][ T295] bpf_check+0x673b/0x16560 [ 22.108860][ T295] ? stack_depot_save+0x13/0x20 [ 22.113587][ T295] ? __kasan_check_write+0x14/0x20 [ 22.118521][ T295] ? __set_page_owner_handle+0x38a/0x3d0 [ 22.123995][ T295] ? page_ext_put+0x1c/0x30 [ 22.128327][ T295] ? __set_page_owner+0x53/0x70 [ 22.133015][ T295] ? post_alloc_hook+0x213/0x220 [ 22.137786][ T295] ? prep_new_page+0x1b/0x110 [ 22.142298][ T295] ? get_page_from_freelist+0x27ea/0x2870 [ 22.147854][ T295] ? unwind_get_return_address+0x4d/0x90 [ 22.153321][ T295] ? __kasan_check_write+0x14/0x20 [ 22.158269][ T295] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 22.163568][ T295] ? bpf_get_btf_vmlinux+0x60/0x60 [ 22.168513][ T295] ? is_bpf_text_address+0x172/0x190 [ 22.173628][ T295] ? is_module_text_address+0x200/0x360 [ 22.179010][ T295] ? stack_trace_save+0x1c0/0x1c0 [ 22.183874][ T295] ? kernel_text_address+0xa9/0xe0 [ 22.188819][ T295] ? __kernel_text_address+0xd/0x40 [ 22.193888][ T295] ? unwind_get_return_address+0x4d/0x90 [ 22.199342][ T295] ? __kasan_check_write+0x14/0x20 [ 22.204268][ T295] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 22.209679][ T295] ? _raw_spin_lock+0x1b0/0x1b0 [ 22.214362][ T295] ? stack_trace_save+0x113/0x1c0 [ 22.219226][ T295] ? stack_trace_snprint+0xf0/0xf0 [ 22.224160][ T295] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 22.229802][ T295] ? __stack_depot_save+0x419/0x480 [ 22.234844][ T295] ? selinux_bpf_prog_alloc+0x51/0x140 [ 22.242127][ T295] ? kasan_set_track+0x60/0x70 [ 22.246736][ T295] ? kasan_set_track+0x4b/0x70 [ 22.251412][ T295] ? kasan_save_alloc_info+0x1f/0x30 [ 22.256535][ T295] ? __kasan_kmalloc+0x9c/0xb0 [ 22.261135][ T295] ? kmalloc_trace+0x44/0xa0 [ 22.265560][ T295] ? selinux_bpf_prog_alloc+0x51/0x140 [ 22.270854][ T295] ? security_bpf_prog_alloc+0x62/0x90 [ 22.276148][ T295] ? bpf_prog_load+0xa6a/0x1bf0 [ 22.280834][ T295] ? __sys_bpf+0x52c/0x7f0 [ 22.285087][ T295] ? __x64_sys_bpf+0x7c/0x90 [ 22.289514][ T295] ? do_syscall_64+0x3d/0xb0 [ 22.294453][ T295] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 22.300443][ T295] ? __kasan_check_write+0x14/0x20 [ 22.305391][ T295] ? _raw_spin_lock+0xa4/0x1b0 [ 22.310255][ T295] ? _raw_spin_trylock_bh+0x190/0x190 [ 22.315553][ T295] ? _raw_spin_unlock+0x4c/0x70 [ 22.320240][ T295] ? memset+0x35/0x40 [ 22.324054][ T295] ? bpf_obj_name_cpy+0x196/0x1e0 [ 22.328918][ T295] bpf_prog_load+0x1304/0x1bf0 [ 22.333519][ T295] ? map_freeze+0x3a0/0x3a0 [ 22.337861][ T295] ? selinux_bpf+0xcb/0x100 [ 22.342199][ T295] ? security_bpf+0x82/0xb0 [ 22.346537][ T295] __sys_bpf+0x52c/0x7f0 [ 22.350615][ T295] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 22.355823][ T295] ? debug_smp_processor_id+0x17/0x20 [ 22.361028][ T295] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 22.366938][ T295] ? exit_to_user_mode_prepare+0x39/0xa0 [ 22.372401][ T295] __x64_sys_bpf+0x7c/0x90 [ 22.376657][ T295] do_syscall_64+0x3d/0xb0 [ 22.380907][ T295] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 22.386633][ T295] RIP: 0033:0x7f7ba60133e9 [ 22.390888][ T295] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 22.410332][ T295] RSP: 002b:00007ffd999dc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 22.418570][ T295] RAX: ffffffffffffffda RBX: 00007ffd999dc368 RCX: 00007f7ba60133e9 [ 22.426385][ T295] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 22.434195][ T295] RBP: 00007f7ba6086610 R08: 0000000000000000 R09: 0000000000000000 [ 22.442090][ T295] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 22.449905][ T295] R13: 00007ffd999dc358 R14: 0000000000000001 R15: 0000000000000001 [ 22.457724][ T295] [ 22.460838][ T295] ================================================================================ [ 22.469983][ T295] ================================================================================ [ 22.479232][ T295] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:9206:63 [ 22.486560][ T295] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 22.494918][ T295] CPU: 1 PID: 295 Comm: syz-executor262 Not tainted 6.1.57-syzkaller-00064-g30bca9e2785b #0 [ 22.504807][ T295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 22.514701][ T295] Call Trace: [ 22.517825][ T295] [ 22.520692][ T295] dump_stack_lvl+0x151/0x1b7 [ 22.525202][ T295] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 22.530497][ T295] ? stack_trace_snprint+0xf0/0xf0 [ 22.535447][ T295] dump_stack+0x15/0x17 [ 22.539438][ T295] __ubsan_handle_shift_out_of_bounds+0x3e1/0x440 [ 22.545686][ T295] scalar32_min_max_arsh+0x676/0x6c0 [ 22.550813][ T295] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 22.556363][ T295] adjust_reg_min_max_vals+0x3d20/0x6360 [ 22.561849][ T295] ? zext_32_to_64+0x290/0x290 [ 22.566888][ T295] ? find_equal_scalars+0x1a0/0x7c0 [ 22.571921][ T295] ? check_reg_arg+0x436/0x840 [ 22.576520][ T295] do_check+0x8e35/0xdd60 [ 22.580691][ T295] ? init_func_state+0x3c0/0x3c0 [ 22.585461][ T295] ? memset+0x35/0x40 [ 22.589280][ T295] ? btf_check_subprog_arg_match+0x182/0x300 [ 22.595219][ T295] do_check_common+0x6ce/0xed0 [ 22.599816][ T295] bpf_check+0x673b/0x16560 [ 22.604170][ T295] ? stack_depot_save+0x13/0x20 [ 22.608834][ T295] ? __kasan_check_write+0x14/0x20 [ 22.613778][ T295] ? __set_page_owner_handle+0x38a/0x3d0 [ 22.619248][ T295] ? page_ext_put+0x1c/0x30 [ 22.623589][ T295] ? __set_page_owner+0x53/0x70 [ 22.628273][ T295] ? post_alloc_hook+0x213/0x220 [ 22.633048][ T295] ? prep_new_page+0x1b/0x110 [ 22.637656][ T295] ? get_page_from_freelist+0x27ea/0x2870 [ 22.643204][ T295] ? unwind_get_return_address+0x4d/0x90 [ 22.648680][ T295] ? __kasan_check_write+0x14/0x20 [ 22.653616][ T295] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 22.659009][ T295] ? bpf_get_btf_vmlinux+0x60/0x60 [ 22.663948][ T295] ? is_bpf_text_address+0x172/0x190 [ 22.669066][ T295] ? is_module_text_address+0x200/0x360 [ 22.674446][ T295] ? stack_trace_save+0x1c0/0x1c0 [ 22.679306][ T295] ? kernel_text_address+0xa9/0xe0 [ 22.684264][ T295] ? __kernel_text_address+0xd/0x40 [ 22.689289][ T295] ? unwind_get_return_address+0x4d/0x90 [ 22.694758][ T295] ? __kasan_check_write+0x14/0x20 [ 22.699709][ T295] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 22.704998][ T295] ? _raw_spin_lock+0x1b0/0x1b0 [ 22.709695][ T295] ? stack_trace_save+0x113/0x1c0 [ 22.714548][ T295] ? stack_trace_snprint+0xf0/0xf0 [ 22.719609][ T295] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 22.725244][ T295] ? __stack_depot_save+0x419/0x480 [ 22.730318][ T295] ? selinux_bpf_prog_alloc+0x51/0x140 [ 22.735653][ T295] ? kasan_set_track+0x60/0x70 [ 22.740251][ T295] ? kasan_set_track+0x4b/0x70 [ 22.744880][ T295] ? kasan_save_alloc_info+0x1f/0x30 [ 22.749974][ T295] ? __kasan_kmalloc+0x9c/0xb0 [ 22.754573][ T295] ? kmalloc_trace+0x44/0xa0 [ 22.758996][ T295] ? selinux_bpf_prog_alloc+0x51/0x140 [ 22.764417][ T295] ? security_bpf_prog_alloc+0x62/0x90 [ 22.769820][ T295] ? bpf_prog_load+0xa6a/0x1bf0 [ 22.774507][ T295] ? __sys_bpf+0x52c/0x7f0 [ 22.778749][ T295] ? __x64_sys_bpf+0x7c/0x90 [ 22.783176][ T295] ? do_syscall_64+0x3d/0xb0 [ 22.787603][ T295] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 22.793597][ T295] ? __kasan_check_write+0x14/0x20 [ 22.798541][ T295] ? _raw_spin_lock+0xa4/0x1b0 [ 22.803141][ T295] ? _raw_spin_trylock_bh+0x190/0x190 [ 22.808405][ T295] ? _raw_spin_unlock+0x4c/0x70 [ 22.813049][ T295] ? memset+0x35/0x40 [ 22.816851][ T295] ? bpf_obj_name_cpy+0x196/0x1e0 [ 22.821719][ T295] bpf_prog_load+0x1304/0x1bf0 [ 22.826314][ T295] ? map_freeze+0x3a0/0x3a0 [ 22.830655][ T295] ? selinux_bpf+0xcb/0x100 [ 22.834990][ T295] ? security_bpf+0x82/0xb0 [ 22.839331][ T295] __sys_bpf+0x52c/0x7f0 [ 22.843409][ T295] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 22.848618][ T295] ? debug_smp_processor_id+0x17/0x20 [ 22.853834][ T295] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 22.859727][ T295] ? exit_to_user_mode_prepare+0x39/0xa0 [ 22.865194][ T295] __x64_sys_bpf+0x7c/0x90 [ 22.869447][ T295] do_syscall_64+0x3d/0xb0 [ 22.873785][ T295] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 22.879513][ T295] RIP: 0033:0x7f7ba60133e9 [ 22.883767][ T295] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 22.903222][ T295] RSP: 002b:00007ffd999dc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 22.911454][ T295] RAX: ffffffffffffffda RBX: 00007ffd999dc368 RCX: 00007f7ba60133e9 [ 22.919352][ T295] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 22.927274][ T295] RBP: 00007f7ba6086610 R08: 0000000000000000 R09: 0000000000000000 [ 22.935082][ T295] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=22, insns=0x20000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 3 exit_group(0) = ? +++ exited with 0 +++ [ 22.942922][ T295] R13: 00007ffd999dc358 R14: 00000000000