Warning: Permanently added '10.128.0.6' (ED25519) to the list of known hosts. 2024/01/05 05:40:48 ignoring optional flag "sandboxArg"="0" 2024/01/05 05:40:48 parsed 1 programs [ 39.987534][ T28] audit: type=1400 audit(1704433248.663:156): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.013145][ T28] audit: type=1400 audit(1704433248.673:157): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/01/05 05:40:48 executed programs: 0 [ 40.061712][ T28] audit: type=1400 audit(1704433248.743:158): avc: denied { unlink } for pid=341 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.088540][ T341] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.150086][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.157751][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.165502][ T347] device bridge_slave_0 entered promiscuous mode [ 40.172716][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.179656][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.187162][ T347] device bridge_slave_1 entered promiscuous mode [ 40.233597][ T28] audit: type=1400 audit(1704433248.913:159): avc: denied { write } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.239649][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.255108][ T28] audit: type=1400 audit(1704433248.913:160): avc: denied { read } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.261959][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.289976][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.296989][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.318182][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.325530][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.333283][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.340518][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.349586][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.358068][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.365490][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.382057][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.390234][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.397401][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.404729][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.413010][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.425248][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.437295][ T347] device veth0_vlan entered promiscuous mode [ 40.444369][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.452710][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.460177][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.472687][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.482729][ T347] device veth1_macvtap entered promiscuous mode [ 40.497608][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.506414][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.520022][ T28] audit: type=1400 audit(1704433249.203:161): avc: denied { mounton } for pid=347 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 40.555391][ T28] audit: type=1400 audit(1704433249.233:162): avc: denied { bpf } for pid=354 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 40.577048][ T28] audit: type=1400 audit(1704433249.233:163): avc: denied { prog_load } for pid=354 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 40.580227][ T355] ================================================================================ [ 40.596883][ T28] audit: type=1400 audit(1704433249.233:164): avc: denied { perfmon } for pid=354 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 40.627722][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:9205:63 [ 40.636172][ T355] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 40.645431][ T355] CPU: 0 PID: 355 Comm: syz-executor.0 Not tainted 6.1.57-syzkaller-1150592-ged9b660cd1ad #0 [ 40.655979][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 40.666610][ T355] Call Trace: [ 40.670096][ T355] [ 40.673005][ T355] dump_stack_lvl+0x151/0x1b7 [ 40.677919][ T355] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 40.683860][ T355] ? stack_trace_snprint+0xf0/0xf0 [ 40.689412][ T355] dump_stack+0x15/0x17 [ 40.693415][ T355] __ubsan_handle_shift_out_of_bounds+0x3e1/0x440 [ 40.699782][ T355] scalar32_min_max_arsh+0x622/0x6c0 [ 40.705022][ T355] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 40.710662][ T355] adjust_reg_min_max_vals+0x3d20/0x6360 [ 40.716147][ T355] ? zext_32_to_64+0x290/0x290 [ 40.720991][ T355] ? find_equal_scalars+0x1a0/0x7c0 [ 40.726585][ T355] ? check_reg_arg+0x436/0x840 [ 40.731429][ T355] do_check+0x8e35/0xdd60 [ 40.735606][ T355] ? init_func_state+0x3c0/0x3c0 [ 40.740363][ T355] ? memset+0x35/0x40 [ 40.744285][ T355] ? btf_check_subprog_arg_match+0x182/0x300 [ 40.750898][ T355] do_check_common+0x6ce/0xed0 [ 40.755550][ T355] bpf_check+0x66e6/0x16500 [ 40.759921][ T355] ? stack_depot_save+0x13/0x20 [ 40.764920][ T355] ? strscpy+0x9c/0x260 [ 40.769202][ T355] ? __kasan_check_write+0x14/0x20 [ 40.774536][ T355] ? __set_page_owner_handle+0x38a/0x3d0 [ 40.780254][ T355] ? page_ext_put+0x1c/0x30 [ 40.784697][ T355] ? __set_page_owner+0x53/0x70 [ 40.789609][ T355] ? prep_new_page+0x1b/0x110 [ 40.794267][ T355] ? get_page_from_freelist+0x27ea/0x2870 [ 40.800044][ T355] ? unwind_get_return_address+0x4d/0x90 [ 40.806490][ T355] ? __kasan_check_write+0x14/0x20 [ 40.811696][ T355] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 40.817136][ T355] ? bpf_get_btf_vmlinux+0x20/0x20 [ 40.822822][ T355] ? is_bpf_text_address+0x172/0x190 [ 40.828123][ T355] ? is_module_text_address+0x1e0/0x360 [ 40.833957][ T355] ? stack_trace_save+0x1c0/0x1c0 [ 40.839281][ T355] ? kernel_text_address+0xa9/0xe0 [ 40.845173][ T355] ? __kernel_text_address+0xd/0x40 [ 40.850229][ T355] ? unwind_get_return_address+0x4d/0x90 [ 40.855840][ T355] ? __kasan_check_write+0x14/0x20 [ 40.860888][ T355] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 40.866560][ T355] ? _raw_spin_lock+0x1b0/0x1b0 [ 40.871424][ T355] ? stack_trace_save+0x113/0x1c0 [ 40.876802][ T355] ? stack_trace_snprint+0xf0/0xf0 [ 40.881844][ T355] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 40.887724][ T355] ? __stack_depot_save+0x419/0x480 [ 40.892769][ T355] ? selinux_bpf_prog_alloc+0x51/0x140 [ 40.898131][ T355] ? kasan_set_track+0x60/0x70 [ 40.903111][ T355] ? kasan_set_track+0x4b/0x70 [ 40.907708][ T355] ? kasan_save_alloc_info+0x1f/0x30 [ 40.912926][ T355] ? __kasan_kmalloc+0x9c/0xb0 [ 40.917513][ T355] ? kmalloc_trace+0x44/0xa0 [ 40.922038][ T355] ? selinux_bpf_prog_alloc+0x51/0x140 [ 40.927623][ T355] ? security_bpf_prog_alloc+0x62/0x90 [ 40.933277][ T355] ? bpf_prog_load+0xa6a/0x1bf0 [ 40.938124][ T355] ? __sys_bpf+0x52c/0x7f0 [ 40.942468][ T355] ? __x64_sys_bpf+0x7c/0x90 [ 40.947326][ T355] ? do_syscall_64+0x3d/0xb0 [ 40.952095][ T355] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 40.958228][ T355] ? __kasan_check_write+0x14/0x20 [ 40.963158][ T355] ? _raw_spin_lock+0xa4/0x1b0 [ 40.968024][ T355] ? _raw_spin_trylock_bh+0x190/0x190 [ 40.973675][ T355] ? _raw_spin_unlock+0x4c/0x70 [ 40.978439][ T355] ? memset+0x35/0x40 [ 40.982279][ T355] ? bpf_obj_name_cpy+0x196/0x1e0 [ 40.987115][ T355] bpf_prog_load+0x1304/0x1bf0 [ 40.991887][ T355] ? map_freeze+0x3a0/0x3a0 [ 40.996311][ T355] ? selinux_bpf+0xcb/0x100 [ 41.000650][ T355] ? security_bpf+0x82/0xb0 [ 41.004988][ T355] __sys_bpf+0x52c/0x7f0 [ 41.009214][ T355] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 41.014741][ T355] ? __kasan_check_write+0x14/0x20 [ 41.019691][ T355] ? fpregs_restore_userregs+0x130/0x290 [ 41.025124][ T355] __x64_sys_bpf+0x7c/0x90 [ 41.029373][ T355] do_syscall_64+0x3d/0xb0 [ 41.033630][ T355] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 41.039354][ T355] RIP: 0033:0x7fabf527cba9 [ 41.043612][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 41.064188][ T355] RSP: 002b:00007fabf604a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.072867][ T355] RAX: ffffffffffffffda RBX: 00007fabf539bf80 RCX: 00007fabf527cba9 [ 41.080861][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 41.088825][ T355] RBP: 00007fabf52c847a R08: 0000000000000000 R09: 0000000000000000 [ 41.096646][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 41.104721][ T355] R13: 000000000000000b R14: 00007fabf539bf80 R15: 00007ffdb8ccd548 [ 41.112528][ T355] [ 41.115670][ T355] ================================================================================ [ 41.125116][ T355] ================================================================================ [ 41.134930][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:9206:63 [ 41.142458][ T355] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 41.151136][ T355] CPU: 0 PID: 355 Comm: syz-executor.0 Not tainted 6.1.57-syzkaller-1150592-ged9b660cd1ad #0 [ 41.161233][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 41.171384][ T355] Call Trace: [ 41.174505][ T355] [ 41.177437][ T355] dump_stack_lvl+0x151/0x1b7 [ 41.181911][ T355] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 41.187399][ T355] ? stack_trace_snprint+0xf0/0xf0 [ 41.192348][ T355] dump_stack+0x15/0x17 [ 41.196332][ T355] __ubsan_handle_shift_out_of_bounds+0x3e1/0x440 [ 41.202682][ T355] scalar32_min_max_arsh+0x676/0x6c0 [ 41.207930][ T355] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 41.214149][ T355] adjust_reg_min_max_vals+0x3d20/0x6360 [ 41.219943][ T355] ? zext_32_to_64+0x290/0x290 [ 41.224693][ T355] ? find_equal_scalars+0x1a0/0x7c0 [ 41.230291][ T355] ? check_reg_arg+0x436/0x840 [ 41.235232][ T355] do_check+0x8e35/0xdd60 [ 41.239473][ T355] ? init_func_state+0x3c0/0x3c0 [ 41.244598][ T355] ? memset+0x35/0x40 [ 41.248591][ T355] ? btf_check_subprog_arg_match+0x182/0x300 [ 41.254401][ T355] do_check_common+0x6ce/0xed0 [ 41.259121][ T355] bpf_check+0x66e6/0x16500 [ 41.263872][ T355] ? stack_depot_save+0x13/0x20 [ 41.268557][ T355] ? strscpy+0x9c/0x260 [ 41.273041][ T355] ? __kasan_check_write+0x14/0x20 [ 41.278085][ T355] ? __set_page_owner_handle+0x38a/0x3d0 [ 41.283589][ T355] ? page_ext_put+0x1c/0x30 [ 41.288091][ T355] ? __set_page_owner+0x53/0x70 [ 41.292869][ T355] ? prep_new_page+0x1b/0x110 [ 41.297478][ T355] ? get_page_from_freelist+0x27ea/0x2870 [ 41.303272][ T355] ? unwind_get_return_address+0x4d/0x90 [ 41.308707][ T355] ? __kasan_check_write+0x14/0x20 [ 41.313638][ T355] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 41.319191][ T355] ? bpf_get_btf_vmlinux+0x20/0x20 [ 41.324168][ T355] ? is_bpf_text_address+0x172/0x190 [ 41.329352][ T355] ? is_module_text_address+0x1e0/0x360 [ 41.334941][ T355] ? stack_trace_save+0x1c0/0x1c0 [ 41.340216][ T355] ? kernel_text_address+0xa9/0xe0 [ 41.345431][ T355] ? __kernel_text_address+0xd/0x40 [ 41.350699][ T355] ? unwind_get_return_address+0x4d/0x90 [ 41.356265][ T355] ? __kasan_check_write+0x14/0x20 [ 41.361482][ T355] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 41.366942][ T355] ? _raw_spin_lock+0x1b0/0x1b0 [ 41.371880][ T355] ? stack_trace_save+0x113/0x1c0 [ 41.376949][ T355] ? stack_trace_snprint+0xf0/0xf0 [ 41.382041][ T355] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 41.387678][ T355] ? __stack_depot_save+0x419/0x480 [ 41.393047][ T355] ? selinux_bpf_prog_alloc+0x51/0x140 [ 41.398333][ T355] ? kasan_set_track+0x60/0x70 [ 41.403100][ T355] ? kasan_set_track+0x4b/0x70 [ 41.407750][ T355] ? kasan_save_alloc_info+0x1f/0x30 [ 41.412907][ T355] ? __kasan_kmalloc+0x9c/0xb0 [ 41.417503][ T355] ? kmalloc_trace+0x44/0xa0 [ 41.421947][ T355] ? selinux_bpf_prog_alloc+0x51/0x140 [ 41.427666][ T355] ? security_bpf_prog_alloc+0x62/0x90 [ 41.432963][ T355] ? bpf_prog_load+0xa6a/0x1bf0 [ 41.437640][ T355] ? __sys_bpf+0x52c/0x7f0 [ 41.441995][ T355] ? __x64_sys_bpf+0x7c/0x90 [ 41.447026][ T355] ? do_syscall_64+0x3d/0xb0 [ 41.451443][ T355] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 41.457436][ T355] ? __kasan_check_write+0x14/0x20 [ 41.462552][ T355] ? _raw_spin_lock+0xa4/0x1b0 [ 41.467375][ T355] ? _raw_spin_trylock_bh+0x190/0x190 [ 41.472573][ T355] ? _raw_spin_unlock+0x4c/0x70 [ 41.477436][ T355] ? memset+0x35/0x40 [ 41.481426][ T355] ? bpf_obj_name_cpy+0x196/0x1e0 [ 41.486292][ T355] bpf_prog_load+0x1304/0x1bf0 [ 41.491076][ T355] ? map_freeze+0x3a0/0x3a0 [ 41.495502][ T355] ? selinux_bpf+0xcb/0x100 [ 41.500013][ T355] ? security_bpf+0x82/0xb0 [ 41.504548][ T355] __sys_bpf+0x52c/0x7f0 [ 41.508596][ T355] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 41.514174][ T355] ? __kasan_check_write+0x14/0x20 [ 41.519200][ T355] ? fpregs_restore_userregs+0x130/0x290 [ 41.524820][ T355] __x64_sys_bpf+0x7c/0x90 [ 41.529265][ T355] do_syscall_64+0x3d/0xb0 [ 41.533820][ T355] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 41.539563][ T355] RIP: 0033:0x7fabf527cba9 [ 41.543999][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 41.563617][ T355] RSP: 002b:00007fabf604a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.571944][ T355] RAX: ffffffffffffffda RBX: 00007fabf539bf80 RCX: 00007fabf527cba9 [ 41.579833][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 41.588108][ T355] RBP: 00007fabf52c847a R08: 0000000000000000 R09: 0000000000000000 [ 41.596678][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 41.604672][ T355] R13: 000000000000000b R14: 00007fabf539bf80 R15: 00007ffdb8ccd548 [ 41.613238][ T355] [ 41.616341][ T355] ================================================================================ [ 41.675427][ T28] audit: type=1400 audit(1704433250.353:165): avc: denied { prog_run } for pid=357 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2024/01/05 05:40:53 executed programs: 73 2024/01/05 05:40:58 executed programs: 180