Warning: Permanently added '10.128.10.26' (ED25519) to the list of known hosts. 2023/12/22 09:08:57 ignoring optional flag "sandboxArg"="0" 2023/12/22 09:08:57 parsed 1 programs [ 40.648409][ T27] audit: type=1400 audit(1703236137.412:156): avc: denied { mounton } for pid=425 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.674177][ T27] audit: type=1400 audit(1703236137.412:157): avc: denied { mount } for pid=425 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2023/12/22 09:08:57 executed programs: 0 [ 40.709737][ T27] audit: type=1400 audit(1703236137.482:158): avc: denied { unlink } for pid=425 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.721834][ T425] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.757368][ T431] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.764390][ T431] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.771593][ T431] device bridge_slave_0 entered promiscuous mode [ 40.777960][ T431] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.785178][ T431] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.792403][ T431] device bridge_slave_1 entered promiscuous mode [ 40.804783][ T27] audit: type=1400 audit(1703236137.572:159): avc: denied { write } for pid=431 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.806356][ T431] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.825118][ T27] audit: type=1400 audit(1703236137.572:160): avc: denied { read } for pid=431 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.832162][ T431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.832179][ T431] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.867094][ T431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.876490][ T388] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.883694][ T388] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.890750][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.897940][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.905671][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.913547][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.920504][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.930194][ T431] device veth0_vlan entered promiscuous mode [ 40.936816][ T431] device veth1_macvtap entered promiscuous mode [ 40.943450][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.951672][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.959985][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.967122][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.974486][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.982333][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.990196][ T388] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.997041][ T388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.004279][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.011992][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.021056][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.029306][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.038535][ T27] audit: type=1400 audit(1703236137.812:161): avc: denied { mounton } for pid=431 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=205 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.064339][ T27] audit: type=1400 audit(1703236137.832:162): avc: denied { bpf } for pid=436 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 41.067090][ T437] ================================================================================ [ 41.085771][ T27] audit: type=1400 audit(1703236137.832:163): avc: denied { prog_load } for pid=436 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 41.085779][ T27] audit: type=1400 audit(1703236137.832:164): avc: denied { perfmon } for pid=436 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 41.135183][ T437] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:9172:63 [ 41.142548][ T437] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 41.151213][ T437] CPU: 0 PID: 437 Comm: syz-executor.0 Not tainted 6.1.41-syzkaller #0 [ 41.159416][ T437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 41.169571][ T437] Call Trace: [ 41.172691][ T437] [ 41.175471][ T437] dump_stack_lvl+0x68/0x91 [ 41.179893][ T437] dump_stack+0x10/0x19 [ 41.184071][ T437] __ubsan_handle_shift_out_of_bounds+0x261/0x290 [ 41.191097][ T437] ? copy_verifier_state+0x67/0x310 [ 41.196318][ T437] scalar32_min_max_arsh+0xfb/0x120 [ 41.201403][ T437] adjust_reg_min_max_vals+0x1317/0x15d0 [ 41.206882][ T437] do_check_common+0x1a89/0x2860 [ 41.211824][ T437] ? check_cfg+0x3ce/0x410 [ 41.216434][ T437] bpf_check+0x11e0/0x49d0 [ 41.220864][ T437] ? pcpu_block_update_hint_alloc+0x114/0x2d0 [ 41.226942][ T437] ? slab_post_alloc_hook+0x6a/0x320 [ 41.232060][ T437] ? selinux_bpf_prog_alloc+0x1e/0x60 [ 41.237364][ T437] ? __kmem_cache_alloc_node+0x191/0x240 [ 41.242909][ T437] ? selinux_bpf_prog_alloc+0x1e/0x60 [ 41.248115][ T437] ? preempt_count_add+0x68/0x90 [ 41.252893][ T437] ? should_fail+0xb/0x10 [ 41.257143][ T437] ? should_fail_usercopy+0x15/0x20 [ 41.262191][ T437] ? _copy_from_user+0x4b/0x80 [ 41.266777][ T437] ? ktime_get_with_offset+0x4d/0xf0 [ 41.271897][ T437] bpf_prog_load+0x5f7/0x6f0 [ 41.276623][ T437] ? selinux_bpf+0x51/0x60 [ 41.280869][ T437] __sys_bpf+0x24f/0x490 [ 41.284952][ T437] __x64_sys_bpf+0x17/0x20 [ 41.289214][ T437] do_syscall_64+0x3d/0xb0 [ 41.293453][ T437] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 41.299362][ T437] RIP: 0033:0x7f7a5c47cce9 [ 41.303624][ T437] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 41.323082][ T437] RSP: 002b:00007f7a5d28f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.331439][ T437] RAX: ffffffffffffffda RBX: 00007f7a5c59bf80 RCX: 00007f7a5c47cce9 [ 41.339351][ T437] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 41.347166][ T437] RBP: 00007f7a5c4c947a R08: 0000000000000000 R09: 0000000000000000 [ 41.354983][ T437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 41.362781][ T437] R13: 000000000000000b R14: 00007f7a5c59bf80 R15: 00007ffd01cbaae8 [ 41.370690][ T437] [ 41.373731][ T437] ================================================================================ [ 41.382869][ T437] ================================================================================ [ 41.392029][ T437] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:9173:63 [ 41.399205][ T437] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 41.407800][ T437] CPU: 1 PID: 437 Comm: syz-executor.0 Not tainted 6.1.41-syzkaller #0 [ 41.415932][ T437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 41.425838][ T437] Call Trace: [ 41.428956][ T437] [ 41.431733][ T437] dump_stack_lvl+0x68/0x91 [ 41.436172][ T437] dump_stack+0x10/0x19 [ 41.440306][ T437] __ubsan_handle_shift_out_of_bounds+0x261/0x290 [ 41.446479][ T437] ? copy_verifier_state+0x67/0x310 [ 41.451689][ T437] scalar32_min_max_arsh+0x11b/0x120 [ 41.456908][ T437] adjust_reg_min_max_vals+0x1317/0x15d0 [ 41.462551][ T437] do_check_common+0x1a89/0x2860 [ 41.467311][ T437] ? check_cfg+0x3ce/0x410 [ 41.471655][ T437] bpf_check+0x11e0/0x49d0 [ 41.475903][ T437] ? pcpu_block_update_hint_alloc+0x114/0x2d0 [ 41.482279][ T437] ? slab_post_alloc_hook+0x6a/0x320 [ 41.487409][ T437] ? selinux_bpf_prog_alloc+0x1e/0x60 [ 41.492617][ T437] ? __kmem_cache_alloc_node+0x191/0x240 [ 41.498072][ T437] ? selinux_bpf_prog_alloc+0x1e/0x60 [ 41.503570][ T437] ? preempt_count_add+0x68/0x90 [ 41.508856][ T437] ? should_fail+0xb/0x10 [ 41.513204][ T437] ? should_fail_usercopy+0x15/0x20 [ 41.519009][ T437] ? _copy_from_user+0x4b/0x80 [ 41.524615][ T437] ? ktime_get_with_offset+0x4d/0xf0 [ 41.530005][ T437] bpf_prog_load+0x5f7/0x6f0 [ 41.534801][ T437] ? selinux_bpf+0x51/0x60 [ 41.539140][ T437] __sys_bpf+0x24f/0x490 [ 41.543234][ T437] __x64_sys_bpf+0x17/0x20 [ 41.547490][ T437] do_syscall_64+0x3d/0xb0 [ 41.551993][ T437] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 41.558504][ T437] RIP: 0033:0x7f7a5c47cce9 [ 41.562926][ T437] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 41.582624][ T437] RSP: 002b:00007f7a5d28f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.590957][ T437] RAX: ffffffffffffffda RBX: 00007f7a5c59bf80 RCX: 00007f7a5c47cce9 [ 41.598860][ T437] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 41.606671][ T437] RBP: 00007f7a5c4c947a R08: 0000000000000000 R09: 0000000000000000 [ 41.614476][ T437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 41.622381][ T437] R13: 000000000000000b R14: 00007f7a5c59bf80 R15: 00007ffd01cbaae8 [ 41.630973][ T437] [ 41.634089][ T437] ================================================================================ [ 41.646008][ T27] audit: type=1400 audit(1703236138.412:165): avc: denied { prog_run } for pid=436 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2023/12/22 09:09:02 executed programs: 655 2023/12/22 09:09:07 executed programs: 1454