Warning: Permanently added '10.128.1.255' (ED25519) to the list of known hosts. 2024/09/09 00:01:23 ignoring optional flag "sandboxArg"="0" 2024/09/09 00:01:23 parsed 1 programs [ 34.498227][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 34.498233][ T29] audit: type=1400 audit(1725840083.336:96): avc: denied { mounton } for pid=336 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.533087][ T29] audit: type=1400 audit(1725840083.356:97): avc: denied { read write } for pid=336 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 34.560241][ T29] audit: type=1400 audit(1725840083.356:98): avc: denied { open } for pid=336 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 34.594538][ T29] audit: type=1400 audit(1725840083.436:99): avc: denied { unlink } for pid=336 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 34.605543][ T336] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/09/09 00:01:23 executed programs: 0 [ 34.621089][ T29] audit: type=1400 audit(1725840083.436:100): avc: denied { relabelto } for pid=337 comm="mkswap" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 34.669837][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.677401][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.684610][ T342] device bridge_slave_0 entered promiscuous mode [ 34.691486][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.698586][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.705754][ T342] device bridge_slave_1 entered promiscuous mode [ 34.719384][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.726858][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.734061][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.740922][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.750383][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.757537][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.764711][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.771766][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.780295][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.788356][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.795747][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.805375][ T342] device veth0_vlan entered promiscuous mode [ 34.812162][ T342] device veth1_macvtap entered promiscuous mode [ 34.819115][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.827633][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.835601][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.842945][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.850804][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.858903][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.867299][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.874576][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.882710][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.890677][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.900124][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.908610][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.920578][ T29] audit: type=1400 audit(1725840083.766:101): avc: denied { prog_load } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 34.923666][ T347] ================================================================================ [ 34.945531][ T29] audit: type=1400 audit(1725840083.766:102): avc: denied { bpf } for pid=346 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 34.951664][ T347] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8019:63 [ 34.973198][ T29] audit: type=1400 audit(1725840083.766:103): avc: denied { perfmon } for pid=346 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 34.980912][ T347] shift exponent 1073741824 is too large for 32-bit type 'int' [ 35.009735][ T347] CPU: 1 PID: 347 Comm: syz-executor.0 Not tainted 5.15.157-syzkaller #0 [ 35.018395][ T347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 35.028385][ T347] Call Trace: [ 35.031709][ T347] [ 35.034560][ T347] dump_stack_lvl+0x38/0x49 [ 35.039156][ T347] dump_stack+0x10/0x12 [ 35.043153][ T347] ubsan_epilogue+0x9/0x32 [ 35.047412][ T347] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 35.054007][ T347] ? debug_smp_processor_id+0x17/0x20 [ 35.059575][ T347] ? reg_bounds_sync+0x157/0x240 [ 35.064455][ T347] adjust_reg_min_max_vals.cold+0x109/0x150 [ 35.070269][ T347] check_alu_op+0x246/0x780 [ 35.074702][ T347] do_check_common+0x1182/0x4410 [ 35.079467][ T347] ? kfree+0xec/0x2b0 [ 35.083676][ T347] bpf_check+0x2250/0x3520 [ 35.088030][ T347] ? kmem_cache_alloc_trace+0x2f0/0x460 [ 35.094285][ T347] bpf_prog_load+0x483/0x9e0 [ 35.098963][ T347] __sys_bpf+0x706/0x2550 [ 35.103358][ T347] __x64_sys_bpf+0x17/0x20 [ 35.107572][ T347] x64_sys_call+0x12b/0x990 [ 35.112484][ T347] do_syscall_64+0x33/0xb0 [ 35.116746][ T347] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 35.122592][ T347] RIP: 0033:0x7f1f681a5ba9 [ 35.126814][ T347] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 35.147341][ T347] RSP: 002b:00007f1f67d280c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 35.155869][ T347] RAX: ffffffffffffffda RBX: 00007f1f682c4f80 RCX: 00007f1f681a5ba9 [ 35.163681][ T347] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 35.171584][ T347] RBP: 00007f1f681f147a R08: 0000000000000000 R09: 0000000000000000 [ 35.179591][ T347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 35.187488][ T347] R13: 000000000000000b R14: 00007f1f682c4f80 R15: 00007ffc5e418068 [ 35.195650][ T347] [ 35.198761][ T347] ================================================================================ [ 35.208286][ T347] ================================================================================ [ 35.217975][ T347] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8020:63 [ 35.226164][ T347] shift exponent 1073741824 is too large for 32-bit type 'int' [ 35.233643][ T347] CPU: 1 PID: 347 Comm: syz-executor.0 Not tainted 5.15.157-syzkaller #0 [ 35.241908][ T347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 35.251889][ T347] Call Trace: [ 35.255278][ T347] [ 35.258150][ T347] dump_stack_lvl+0x38/0x49 [ 35.262912][ T347] dump_stack+0x10/0x12 [ 35.266887][ T347] ubsan_epilogue+0x9/0x32 [ 35.271310][ T347] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 35.278115][ T347] ? debug_smp_processor_id+0x17/0x20 [ 35.283513][ T347] ? reg_bounds_sync+0x157/0x240 [ 35.288457][ T347] adjust_reg_min_max_vals.cold+0x125/0x150 [ 35.294275][ T347] check_alu_op+0x246/0x780 [ 35.298606][ T347] do_check_common+0x1182/0x4410 [ 35.303471][ T347] ? kfree+0xec/0x2b0 [ 35.307287][ T347] bpf_check+0x2250/0x3520 [ 35.311538][ T347] ? kmem_cache_alloc_trace+0x2f0/0x460 [ 35.317098][ T347] bpf_prog_load+0x483/0x9e0 [ 35.321611][ T347] __sys_bpf+0x706/0x2550 [ 35.326077][ T347] __x64_sys_bpf+0x17/0x20 [ 35.330405][ T347] x64_sys_call+0x12b/0x990 [ 35.334833][ T347] do_syscall_64+0x33/0xb0 [ 35.339083][ T347] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 35.345243][ T347] RIP: 0033:0x7f1f681a5ba9 [ 35.349498][ T347] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 35.370443][ T347] RSP: 002b:00007f1f67d280c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 35.379439][ T347] RAX: ffffffffffffffda RBX: 00007f1f682c4f80 RCX: 00007f1f681a5ba9 [ 35.387934][ T347] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 35.396049][ T347] RBP: 00007f1f681f147a R08: 0000000000000000 R09: 0000000000000000 [ 35.404362][ T347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 35.412520][ T347] R13: 000000000000000b R14: 00007f1f682c4f80 R15: 00007ffc5e418068 [ 35.420523][ T347] [ 35.423775][ T347] ================================================================================ [ 35.435999][ T29] audit: type=1400 audit(1725840084.276:104): avc: denied { prog_run } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2024/09/09 00:01:28 executed programs: 704 2024/09/09 00:01:33 executed programs: 1541