Warning: Permanently added '10.128.1.159' (ED25519) to the list of known hosts.
2025/02/15 19:18:47 ignoring optional flag "sandboxArg"="0"
2025/02/15 19:18:47 ignoring optional flag "type"="gce"
2025/02/15 19:18:47 parsed 1 programs
[ 39.819759][ T29] kauditd_printk_skb: 20 callbacks suppressed
[ 39.819764][ T29] audit: type=1400 audit(1739647127.980:96): avc: denied { mounton } for pid=339 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 39.850256][ T29] audit: type=1400 audit(1739647127.980:97): avc: denied { read write } for pid=339 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 39.876039][ T29] audit: type=1400 audit(1739647127.980:98): avc: denied { open } for pid=339 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 39.930826][ T29] audit: type=1400 audit(1739647128.100:99): avc: denied { unlink } for pid=339 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
2025/02/15 19:18:48 executed programs: 0
[ 39.956574][ T29] audit: type=1400 audit(1739647128.100:100): avc: denied { relabelto } for pid=340 comm="mkswap" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 39.957169][ T339] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 40.000991][ T345] bridge0: port 1(bridge_slave_0) entered blocking state
[ 40.007848][ T345] bridge0: port 1(bridge_slave_0) entered disabled state
[ 40.014909][ T345] device bridge_slave_0 entered promiscuous mode
[ 40.021142][ T345] bridge0: port 2(bridge_slave_1) entered blocking state
[ 40.028037][ T345] bridge0: port 2(bridge_slave_1) entered disabled state
[ 40.035018][ T345] device bridge_slave_1 entered promiscuous mode
[ 40.048133][ T345] bridge0: port 2(bridge_slave_1) entered blocking state
[ 40.054977][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 40.062099][ T345] bridge0: port 1(bridge_slave_0) entered blocking state
[ 40.068942][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 40.077897][ T52] bridge0: port 1(bridge_slave_0) entered disabled state
[ 40.085009][ T52] bridge0: port 2(bridge_slave_1) entered disabled state
[ 40.092064][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 40.099141][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 40.106582][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 40.114431][ T52] bridge0: port 1(bridge_slave_0) entered blocking state
[ 40.121216][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 40.128700][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 40.136678][ T52] bridge0: port 2(bridge_slave_1) entered blocking state
[ 40.143426][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 40.151487][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 40.159826][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 40.168367][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 40.177174][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 40.184779][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 40.192362][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 40.199726][ T345] device veth0_vlan entered promiscuous mode
[ 40.206351][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 40.214468][ T345] device veth1_macvtap entered promiscuous mode
[ 40.221271][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 40.229730][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 40.241829][ T29] audit: type=1400 audit(1739647128.410:101): avc: denied { prog_load } for pid=349 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 40.243976][ T350] ================================================================================
[ 40.263059][ T29] audit: type=1400 audit(1739647128.410:102): avc: denied { bpf } for pid=349 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 40.270175][ T350] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8028:63
[ 40.290864][ T29] audit: type=1400 audit(1739647128.410:103): avc: denied { perfmon } for pid=349 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 40.298724][ T350] shift exponent 1073741824 is too large for 32-bit type 'int'
[ 40.326891][ T350] CPU: 0 PID: 350 Comm: syz-executor.0 Not tainted 5.15.178-syzkaller #0
[ 40.335076][ T350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
[ 40.345313][ T350] Call Trace:
[ 40.348406][ T350]
[ 40.351187][ T350] dump_stack_lvl+0x38/0x49
[ 40.355527][ T350] dump_stack+0x10/0x12
[ 40.359522][ T350] ubsan_epilogue+0x9/0x32
[ 40.363768][ T350] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108
[ 40.370480][ T350] ? debug_smp_processor_id+0x17/0x20
[ 40.375834][ T350] ? reg_bounds_sync+0x157/0x240
[ 40.380612][ T350] adjust_reg_min_max_vals.cold+0x109/0x150
[ 40.386339][ T350] check_alu_op+0x246/0x780
[ 40.390673][ T350] do_check_common+0x1182/0x4410
[ 40.395454][ T350] ? kfree+0xec/0x300
[ 40.399266][ T350] bpf_check+0x225c/0x3510
[ 40.403520][ T350] ? selinux_bpf_prog_alloc+0x1e/0x60
[ 40.408726][ T350] bpf_prog_load+0x483/0x9e0
[ 40.413153][ T350] __sys_bpf+0x706/0x2550
[ 40.417318][ T350] __x64_sys_bpf+0x17/0x20
[ 40.421574][ T350] x64_sys_call+0x12b/0x990
[ 40.425923][ T350] do_syscall_64+0x33/0xb0
[ 40.430260][ T350] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 40.435977][ T350] RIP: 0033:0x7f08c99a9ba9
[ 40.440317][ T350] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 40.459847][ T350] RSP: 002b:00007f08c952c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 40.468181][ T350] RAX: ffffffffffffffda RBX: 00007f08c9ac8f80 RCX: 00007f08c99a9ba9
[ 40.476382][ T350] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 40.484200][ T350] RBP: 00007f08c99f547a R08: 0000000000000000 R09: 0000000000000000
[ 40.492049][ T350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 40.499813][ T350] R13: 000000000000000b R14: 00007f08c9ac8f80 R15: 00007ffcf953c058
[ 40.507717][ T350]
[ 40.510726][ T350] ================================================================================
[ 40.519839][ T350] ================================================================================
[ 40.528986][ T350] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8029:63
[ 40.536322][ T350] shift exponent 1073741824 is too large for 32-bit type 'int'
[ 40.543616][ T350] CPU: 0 PID: 350 Comm: syz-executor.0 Not tainted 5.15.178-syzkaller #0
[ 40.551822][ T350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
[ 40.561853][ T350] Call Trace:
[ 40.565016][ T350]
[ 40.567758][ T350] dump_stack_lvl+0x38/0x49
[ 40.572088][ T350] dump_stack+0x10/0x12
[ 40.576086][ T350] ubsan_epilogue+0x9/0x32
[ 40.580506][ T350] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108
[ 40.587103][ T350] ? debug_smp_processor_id+0x17/0x20
[ 40.592671][ T350] ? reg_bounds_sync+0x157/0x240
[ 40.597440][ T350] adjust_reg_min_max_vals.cold+0x125/0x150
[ 40.603170][ T350] check_alu_op+0x246/0x780
[ 40.607508][ T350] do_check_common+0x1182/0x4410
[ 40.612410][ T350] ? kfree+0xec/0x300
[ 40.616188][ T350] bpf_check+0x225c/0x3510
[ 40.620444][ T350] ? selinux_bpf_prog_alloc+0x1e/0x60
[ 40.625654][ T350] bpf_prog_load+0x483/0x9e0
[ 40.630241][ T350] __sys_bpf+0x706/0x2550
[ 40.634403][ T350] __x64_sys_bpf+0x17/0x20
[ 40.638655][ T350] x64_sys_call+0x12b/0x990
[ 40.642998][ T350] do_syscall_64+0x33/0xb0
[ 40.647279][ T350] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 40.653116][ T350] RIP: 0033:0x7f08c99a9ba9
[ 40.657807][ T350] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 40.677675][ T350] RSP: 002b:00007f08c952c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 40.686348][ T350] RAX: ffffffffffffffda RBX: 00007f08c9ac8f80 RCX: 00007f08c99a9ba9
[ 40.694269][ T350] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 40.702072][ T350] RBP: 00007f08c99f547a R08: 0000000000000000 R09: 0000000000000000
[ 40.709885][ T350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 40.717708][ T350] R13: 000000000000000b R14: 00007f08c9ac8f80 R15: 00007ffcf953c058
[ 40.725640][ T350]
[ 40.729154][ T350] ================================================================================
[ 40.740450][ T29] audit: type=1400 audit(1739647128.910:104): avc: denied { prog_run } for pid=349 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
2025/02/15 19:18:53 executed programs: 757
2025/02/15 19:18:58 executed programs: 1640