./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3198716910 <...> Warning: Permanently added '10.128.0.79' (ED25519) to the list of known hosts. execve("./syz-executor3198716910", ["./syz-executor3198716910"], 0x7ffded20fbe0 /* 10 vars */) = 0 brk(NULL) = 0x55555676f000 brk(0x55555676fd00) = 0x55555676fd00 arch_prctl(ARCH_SET_FS, 0x55555676f380) = 0 set_tid_address(0x55555676f650) = 292 set_robust_list(0x55555676f660, 24) = 0 rseq(0x55555676fca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3198716910", 4096) = 28 getrandom("\xe3\xda\xec\xb1\x99\x67\x6c\x72", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55555676fd00 brk(0x555556790d00) = 0x555556790d00 brk(0x555556791000) = 0x555556791000 mprotect(0x7ff1d19bc000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 [ 19.746030][ T30] audit: type=1400 audit(1702829924.462:66): avc: denied { execmem } for pid=292 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.749801][ T30] audit: type=1400 audit(1702829924.472:67): avc: denied { prog_load } for pid=292 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 19.754265][ T30] audit: type=1400 audit(1702829924.472:68): avc: denied { bpf } for pid=292 comm="syz-executor319" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 19.760092][ T30] audit: type=1400 audit(1702829924.472:69): avc: denied { perfmon } for pid=292 comm="syz-executor319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 19.877233][ T292] ================================================================================ [ 19.886330][ T292] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7979:63 [ 19.893740][ T292] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 19.902176][ T292] CPU: 0 PID: 292 Comm: syz-executor319 Not tainted 5.15.139-syzkaller-00529-g05ef4ccb5774 #0 [ 19.912186][ T292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 19.922081][ T292] Call Trace: [ 19.925207][ T292] [ 19.928073][ T292] dump_stack_lvl+0x151/0x1b7 [ 19.932583][ T292] ? io_uring_drop_tctx_refs+0x190/0x190 [ 19.938062][ T292] ? stack_trace_snprint+0xf0/0xf0 [ 19.943101][ T292] dump_stack+0x15/0x17 [ 19.947101][ T292] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 19.953525][ T292] scalar32_min_max_arsh+0x622/0x6c0 [ 19.958660][ T292] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 19.964724][ T292] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 19.970204][ T292] ? reg_bounds_sync+0xf90/0xf90 [ 19.974970][ T292] ? check_stack_access_within_bounds+0x670/0x670 [ 19.981229][ T292] ? check_reg_arg+0x42a/0x820 [ 19.985824][ T292] do_check+0x94d9/0xf2c0 [ 19.989987][ T292] ? mark_reg_unknown+0x600/0x600 [ 19.994844][ T292] ? mark_reg_not_init+0x93/0x670 [ 19.999702][ T292] ? memcpy+0x56/0x70 [ 20.003787][ T292] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 20.009596][ T292] do_check_common+0x909/0x1290 [ 20.014287][ T292] bpf_check+0x3835/0x12bf0 [ 20.018637][ T292] ? is_bpf_text_address+0x172/0x190 [ 20.023831][ T292] ? stack_trace_save+0x1c0/0x1c0 [ 20.028692][ T292] ? __kernel_text_address+0x9b/0x110 [ 20.033984][ T292] ? unwind_get_return_address+0x4d/0x90 [ 20.039463][ T292] ? bpf_get_btf_vmlinux+0x60/0x60 [ 20.044401][ T292] ? __kasan_check_write+0x14/0x20 [ 20.049346][ T292] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 20.054736][ T292] ? _raw_spin_lock+0x1b0/0x1b0 [ 20.059415][ T292] ? stack_trace_save+0x113/0x1c0 [ 20.064398][ T292] ? stack_trace_snprint+0xf0/0xf0 [ 20.069312][ T292] ? stack_trace_snprint+0xf0/0xf0 [ 20.074259][ T292] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 20.079897][ T292] ? __stack_depot_save+0x40d/0x470 [ 20.084935][ T292] ? ____kasan_kmalloc+0xed/0x110 [ 20.089808][ T292] ? ____kasan_kmalloc+0xdb/0x110 [ 20.094652][ T292] ? __kasan_kmalloc+0x9/0x10 [ 20.099175][ T292] ? kmem_cache_alloc_trace+0x115/0x210 [ 20.104635][ T292] ? selinux_bpf_prog_alloc+0x51/0x140 [ 20.109949][ T292] ? security_bpf_prog_alloc+0x62/0x90 [ 20.115224][ T292] ? bpf_prog_load+0x9ee/0x1b50 [ 20.120003][ T292] ? __sys_bpf+0x4bc/0x760 [ 20.124250][ T292] ? __x64_sys_bpf+0x7c/0x90 [ 20.128676][ T292] ? do_syscall_64+0x3d/0xb0 [ 20.133108][ T292] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 20.139008][ T292] ? __kasan_kmalloc+0x9/0x10 [ 20.143517][ T292] ? memset+0x35/0x40 [ 20.147336][ T292] ? bpf_obj_name_cpy+0x196/0x1e0 [ 20.152197][ T292] bpf_prog_load+0x12ac/0x1b50 [ 20.156797][ T292] ? map_freeze+0x370/0x370 [ 20.161138][ T292] ? selinux_bpf+0xcb/0x100 [ 20.165476][ T292] ? security_bpf+0x82/0xb0 [ 20.169814][ T292] __sys_bpf+0x4bc/0x760 [ 20.173897][ T292] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 20.179101][ T292] ? ptrace_notify+0x24c/0x350 [ 20.183703][ T292] __x64_sys_bpf+0x7c/0x90 [ 20.188214][ T292] do_syscall_64+0x3d/0xb0 [ 20.192477][ T292] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 20.198202][ T292] RIP: 0033:0x7ff1d19493e9 [ 20.202452][ T292] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 20.222022][ T292] RSP: 002b:00007ffe67a82798 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 20.230255][ T292] RAX: ffffffffffffffda RBX: 00007ffe67a82978 RCX: 00007ff1d19493e9 [ 20.238067][ T292] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 20.245878][ T292] RBP: 00007ff1d19bc610 R08: 0000000000000000 R09: 0000000000000000 [ 20.253691][ T292] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 20.261501][ T292] R13: 00007ffe67a82968 R14: 0000000000000001 R15: 0000000000000001 [ 20.269317][ T292] [ 20.272348][ T292] ================================================================================ [ 20.281459][ T292] ================================================================================ [ 20.290640][ T292] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7980:63 [ 20.297932][ T292] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 20.306498][ T292] CPU: 0 PID: 292 Comm: syz-executor319 Not tainted 5.15.139-syzkaller-00529-g05ef4ccb5774 #0 [ 20.316537][ T292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 20.326432][ T292] Call Trace: [ 20.329549][ T292] [ 20.332331][ T292] dump_stack_lvl+0x151/0x1b7 [ 20.336845][ T292] ? io_uring_drop_tctx_refs+0x190/0x190 [ 20.342310][ T292] ? stack_trace_snprint+0xf0/0xf0 [ 20.347258][ T292] dump_stack+0x15/0x17 [ 20.351248][ T292] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 20.357498][ T292] scalar32_min_max_arsh+0x676/0x6c0 [ 20.362623][ T292] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 20.368173][ T292] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 20.373642][ T292] ? reg_bounds_sync+0xf90/0xf90 [ 20.378428][ T292] ? check_stack_access_within_bounds+0x670/0x670 [ 20.384671][ T292] ? check_reg_arg+0x42a/0x820 [ 20.389264][ T292] do_check+0x94d9/0xf2c0 [ 20.393438][ T292] ? mark_reg_unknown+0x600/0x600 [ 20.398291][ T292] ? mark_reg_not_init+0x93/0x670 [ 20.403153][ T292] ? memcpy+0x56/0x70 [ 20.406969][ T292] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 20.412784][ T292] do_check_common+0x909/0x1290 [ 20.417481][ T292] bpf_check+0x3835/0x12bf0 [ 20.421813][ T292] ? is_bpf_text_address+0x172/0x190 [ 20.426930][ T292] ? stack_trace_save+0x1c0/0x1c0 [ 20.431801][ T292] ? __kernel_text_address+0x9b/0x110 [ 20.437007][ T292] ? unwind_get_return_address+0x4d/0x90 [ 20.442470][ T292] ? bpf_get_btf_vmlinux+0x60/0x60 [ 20.447418][ T292] ? __kasan_check_write+0x14/0x20 [ 20.452362][ T292] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 20.457684][ T292] ? _raw_spin_lock+0x1b0/0x1b0 [ 20.462343][ T292] ? stack_trace_save+0x113/0x1c0 [ 20.470069][ T292] ? stack_trace_snprint+0xf0/0xf0 [ 20.475020][ T292] ? stack_trace_snprint+0xf0/0xf0 [ 20.479961][ T292] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 20.485785][ T292] ? __stack_depot_save+0x40d/0x470 [ 20.490812][ T292] ? ____kasan_kmalloc+0xed/0x110 [ 20.495671][ T292] ? ____kasan_kmalloc+0xdb/0x110 [ 20.500540][ T292] ? __kasan_kmalloc+0x9/0x10 [ 20.505043][ T292] ? kmem_cache_alloc_trace+0x115/0x210 [ 20.510426][ T292] ? selinux_bpf_prog_alloc+0x51/0x140 [ 20.515720][ T292] ? security_bpf_prog_alloc+0x62/0x90 [ 20.521014][ T292] ? bpf_prog_load+0x9ee/0x1b50 [ 20.525702][ T292] ? __sys_bpf+0x4bc/0x760 [ 20.529955][ T292] ? __x64_sys_bpf+0x7c/0x90 [ 20.534382][ T292] ? do_syscall_64+0x3d/0xb0 [ 20.538808][ T292] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 20.544714][ T292] ? __kasan_kmalloc+0x9/0x10 [ 20.549224][ T292] ? memset+0x35/0x40 [ 20.553042][ T292] ? bpf_obj_name_cpy+0x196/0x1e0 [ 20.557900][ T292] bpf_prog_load+0x12ac/0x1b50 [ 20.562502][ T292] ? map_freeze+0x370/0x370 [ 20.566843][ T292] ? selinux_bpf+0xcb/0x100 [ 20.571180][ T292] ? security_bpf+0x82/0xb0 [ 20.575520][ T292] __sys_bpf+0x4bc/0x760 [ 20.579602][ T292] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 20.584807][ T292] ? ptrace_notify+0x24c/0x350 [ 20.589421][ T292] __x64_sys_bpf+0x7c/0x90 [ 20.593662][ T292] do_syscall_64+0x3d/0xb0 [ 20.597912][ T292] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 20.603642][ T292] RIP: 0033:0x7ff1d19493e9 [ 20.607897][ T292] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 20.627335][ T292] RSP: 002b:00007ffe67a82798 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 20.635581][ T292] RAX: ffffffffffffffda RBX: 00007ffe67a82978 RCX: 00007ff1d19493e9 [ 20.643393][ T292] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 20.651203][ T292] RBP: 00007ff1d19bc610 R08: 0000000000000000 R09: 0000000000000000 [ 20.659015][ T292] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 20.666825][ T292] R13: 00007ffe67a82968 R14: 0000000000000001 R15: 0000000000000001 [ 20.674639][ T292] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=22, insns=0x20000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 3 exit_group(0) = ? +++ exited with 0 +++ [ 20.677591][ T292] =================