./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3198716910
<...>
Warning: Permanently added '10.128.0.79' (ED25519) to the list of known hosts.
execve("./syz-executor3198716910", ["./syz-executor3198716910"], 0x7ffded20fbe0 /* 10 vars */) = 0
brk(NULL) = 0x55555676f000
brk(0x55555676fd00) = 0x55555676fd00
arch_prctl(ARCH_SET_FS, 0x55555676f380) = 0
set_tid_address(0x55555676f650) = 292
set_robust_list(0x55555676f660, 24) = 0
rseq(0x55555676fca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented)
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor3198716910", 4096) = 28
getrandom("\xe3\xda\xec\xb1\x99\x67\x6c\x72", 8, GRND_NONBLOCK) = 8
brk(NULL) = 0x55555676fd00
brk(0x555556790d00) = 0x555556790d00
brk(0x555556791000) = 0x555556791000
mprotect(0x7ff1d19bc000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
[ 19.746030][ T30] audit: type=1400 audit(1702829924.462:66): avc: denied { execmem } for pid=292 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 19.749801][ T30] audit: type=1400 audit(1702829924.472:67): avc: denied { prog_load } for pid=292 comm="syz-executor319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 19.754265][ T30] audit: type=1400 audit(1702829924.472:68): avc: denied { bpf } for pid=292 comm="syz-executor319" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 19.760092][ T30] audit: type=1400 audit(1702829924.472:69): avc: denied { perfmon } for pid=292 comm="syz-executor319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 19.877233][ T292] ================================================================================
[ 19.886330][ T292] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7979:63
[ 19.893740][ T292] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 19.902176][ T292] CPU: 0 PID: 292 Comm: syz-executor319 Not tainted 5.15.139-syzkaller-00529-g05ef4ccb5774 #0
[ 19.912186][ T292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[ 19.922081][ T292] Call Trace:
[ 19.925207][ T292]
[ 19.928073][ T292] dump_stack_lvl+0x151/0x1b7
[ 19.932583][ T292] ? io_uring_drop_tctx_refs+0x190/0x190
[ 19.938062][ T292] ? stack_trace_snprint+0xf0/0xf0
[ 19.943101][ T292] dump_stack+0x15/0x17
[ 19.947101][ T292] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 19.953525][ T292] scalar32_min_max_arsh+0x622/0x6c0
[ 19.958660][ T292] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 19.964724][ T292] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 19.970204][ T292] ? reg_bounds_sync+0xf90/0xf90
[ 19.974970][ T292] ? check_stack_access_within_bounds+0x670/0x670
[ 19.981229][ T292] ? check_reg_arg+0x42a/0x820
[ 19.985824][ T292] do_check+0x94d9/0xf2c0
[ 19.989987][ T292] ? mark_reg_unknown+0x600/0x600
[ 19.994844][ T292] ? mark_reg_not_init+0x93/0x670
[ 19.999702][ T292] ? memcpy+0x56/0x70
[ 20.003787][ T292] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 20.009596][ T292] do_check_common+0x909/0x1290
[ 20.014287][ T292] bpf_check+0x3835/0x12bf0
[ 20.018637][ T292] ? is_bpf_text_address+0x172/0x190
[ 20.023831][ T292] ? stack_trace_save+0x1c0/0x1c0
[ 20.028692][ T292] ? __kernel_text_address+0x9b/0x110
[ 20.033984][ T292] ? unwind_get_return_address+0x4d/0x90
[ 20.039463][ T292] ? bpf_get_btf_vmlinux+0x60/0x60
[ 20.044401][ T292] ? __kasan_check_write+0x14/0x20
[ 20.049346][ T292] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 20.054736][ T292] ? _raw_spin_lock+0x1b0/0x1b0
[ 20.059415][ T292] ? stack_trace_save+0x113/0x1c0
[ 20.064398][ T292] ? stack_trace_snprint+0xf0/0xf0
[ 20.069312][ T292] ? stack_trace_snprint+0xf0/0xf0
[ 20.074259][ T292] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 20.079897][ T292] ? __stack_depot_save+0x40d/0x470
[ 20.084935][ T292] ? ____kasan_kmalloc+0xed/0x110
[ 20.089808][ T292] ? ____kasan_kmalloc+0xdb/0x110
[ 20.094652][ T292] ? __kasan_kmalloc+0x9/0x10
[ 20.099175][ T292] ? kmem_cache_alloc_trace+0x115/0x210
[ 20.104635][ T292] ? selinux_bpf_prog_alloc+0x51/0x140
[ 20.109949][ T292] ? security_bpf_prog_alloc+0x62/0x90
[ 20.115224][ T292] ? bpf_prog_load+0x9ee/0x1b50
[ 20.120003][ T292] ? __sys_bpf+0x4bc/0x760
[ 20.124250][ T292] ? __x64_sys_bpf+0x7c/0x90
[ 20.128676][ T292] ? do_syscall_64+0x3d/0xb0
[ 20.133108][ T292] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 20.139008][ T292] ? __kasan_kmalloc+0x9/0x10
[ 20.143517][ T292] ? memset+0x35/0x40
[ 20.147336][ T292] ? bpf_obj_name_cpy+0x196/0x1e0
[ 20.152197][ T292] bpf_prog_load+0x12ac/0x1b50
[ 20.156797][ T292] ? map_freeze+0x370/0x370
[ 20.161138][ T292] ? selinux_bpf+0xcb/0x100
[ 20.165476][ T292] ? security_bpf+0x82/0xb0
[ 20.169814][ T292] __sys_bpf+0x4bc/0x760
[ 20.173897][ T292] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 20.179101][ T292] ? ptrace_notify+0x24c/0x350
[ 20.183703][ T292] __x64_sys_bpf+0x7c/0x90
[ 20.188214][ T292] do_syscall_64+0x3d/0xb0
[ 20.192477][ T292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 20.198202][ T292] RIP: 0033:0x7ff1d19493e9
[ 20.202452][ T292] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 20.222022][ T292] RSP: 002b:00007ffe67a82798 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 20.230255][ T292] RAX: ffffffffffffffda RBX: 00007ffe67a82978 RCX: 00007ff1d19493e9
[ 20.238067][ T292] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 20.245878][ T292] RBP: 00007ff1d19bc610 R08: 0000000000000000 R09: 0000000000000000
[ 20.253691][ T292] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001
[ 20.261501][ T292] R13: 00007ffe67a82968 R14: 0000000000000001 R15: 0000000000000001
[ 20.269317][ T292]
[ 20.272348][ T292] ================================================================================
[ 20.281459][ T292] ================================================================================
[ 20.290640][ T292] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7980:63
[ 20.297932][ T292] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 20.306498][ T292] CPU: 0 PID: 292 Comm: syz-executor319 Not tainted 5.15.139-syzkaller-00529-g05ef4ccb5774 #0
[ 20.316537][ T292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
[ 20.326432][ T292] Call Trace:
[ 20.329549][ T292]
[ 20.332331][ T292] dump_stack_lvl+0x151/0x1b7
[ 20.336845][ T292] ? io_uring_drop_tctx_refs+0x190/0x190
[ 20.342310][ T292] ? stack_trace_snprint+0xf0/0xf0
[ 20.347258][ T292] dump_stack+0x15/0x17
[ 20.351248][ T292] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 20.357498][ T292] scalar32_min_max_arsh+0x676/0x6c0
[ 20.362623][ T292] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 20.368173][ T292] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 20.373642][ T292] ? reg_bounds_sync+0xf90/0xf90
[ 20.378428][ T292] ? check_stack_access_within_bounds+0x670/0x670
[ 20.384671][ T292] ? check_reg_arg+0x42a/0x820
[ 20.389264][ T292] do_check+0x94d9/0xf2c0
[ 20.393438][ T292] ? mark_reg_unknown+0x600/0x600
[ 20.398291][ T292] ? mark_reg_not_init+0x93/0x670
[ 20.403153][ T292] ? memcpy+0x56/0x70
[ 20.406969][ T292] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 20.412784][ T292] do_check_common+0x909/0x1290
[ 20.417481][ T292] bpf_check+0x3835/0x12bf0
[ 20.421813][ T292] ? is_bpf_text_address+0x172/0x190
[ 20.426930][ T292] ? stack_trace_save+0x1c0/0x1c0
[ 20.431801][ T292] ? __kernel_text_address+0x9b/0x110
[ 20.437007][ T292] ? unwind_get_return_address+0x4d/0x90
[ 20.442470][ T292] ? bpf_get_btf_vmlinux+0x60/0x60
[ 20.447418][ T292] ? __kasan_check_write+0x14/0x20
[ 20.452362][ T292] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 20.457684][ T292] ? _raw_spin_lock+0x1b0/0x1b0
[ 20.462343][ T292] ? stack_trace_save+0x113/0x1c0
[ 20.470069][ T292] ? stack_trace_snprint+0xf0/0xf0
[ 20.475020][ T292] ? stack_trace_snprint+0xf0/0xf0
[ 20.479961][ T292] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 20.485785][ T292] ? __stack_depot_save+0x40d/0x470
[ 20.490812][ T292] ? ____kasan_kmalloc+0xed/0x110
[ 20.495671][ T292] ? ____kasan_kmalloc+0xdb/0x110
[ 20.500540][ T292] ? __kasan_kmalloc+0x9/0x10
[ 20.505043][ T292] ? kmem_cache_alloc_trace+0x115/0x210
[ 20.510426][ T292] ? selinux_bpf_prog_alloc+0x51/0x140
[ 20.515720][ T292] ? security_bpf_prog_alloc+0x62/0x90
[ 20.521014][ T292] ? bpf_prog_load+0x9ee/0x1b50
[ 20.525702][ T292] ? __sys_bpf+0x4bc/0x760
[ 20.529955][ T292] ? __x64_sys_bpf+0x7c/0x90
[ 20.534382][ T292] ? do_syscall_64+0x3d/0xb0
[ 20.538808][ T292] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 20.544714][ T292] ? __kasan_kmalloc+0x9/0x10
[ 20.549224][ T292] ? memset+0x35/0x40
[ 20.553042][ T292] ? bpf_obj_name_cpy+0x196/0x1e0
[ 20.557900][ T292] bpf_prog_load+0x12ac/0x1b50
[ 20.562502][ T292] ? map_freeze+0x370/0x370
[ 20.566843][ T292] ? selinux_bpf+0xcb/0x100
[ 20.571180][ T292] ? security_bpf+0x82/0xb0
[ 20.575520][ T292] __sys_bpf+0x4bc/0x760
[ 20.579602][ T292] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 20.584807][ T292] ? ptrace_notify+0x24c/0x350
[ 20.589421][ T292] __x64_sys_bpf+0x7c/0x90
[ 20.593662][ T292] do_syscall_64+0x3d/0xb0
[ 20.597912][ T292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 20.603642][ T292] RIP: 0033:0x7ff1d19493e9
[ 20.607897][ T292] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 20.627335][ T292] RSP: 002b:00007ffe67a82798 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 20.635581][ T292] RAX: ffffffffffffffda RBX: 00007ffe67a82978 RCX: 00007ff1d19493e9
[ 20.643393][ T292] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 20.651203][ T292] RBP: 00007ff1d19bc610 R08: 0000000000000000 R09: 0000000000000000
[ 20.659015][ T292] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001
[ 20.666825][ T292] R13: 00007ffe67a82968 R14: 0000000000000001 R15: 0000000000000001
[ 20.674639][ T292]
bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=22, insns=0x20000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 3
exit_group(0) = ?
+++ exited with 0 +++
[ 20.677591][ T292] =================