Warning: Permanently added '10.128.1.159' (ED25519) to the list of known hosts. 2025/02/15 19:18:47 ignoring optional flag "sandboxArg"="0" 2025/02/15 19:18:47 ignoring optional flag "type"="gce" 2025/02/15 19:18:47 parsed 1 programs [ 39.819759][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 39.819764][ T29] audit: type=1400 audit(1739647127.980:96): avc: denied { mounton } for pid=339 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.850256][ T29] audit: type=1400 audit(1739647127.980:97): avc: denied { read write } for pid=339 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.876039][ T29] audit: type=1400 audit(1739647127.980:98): avc: denied { open } for pid=339 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.930826][ T29] audit: type=1400 audit(1739647128.100:99): avc: denied { unlink } for pid=339 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/02/15 19:18:48 executed programs: 0 [ 39.956574][ T29] audit: type=1400 audit(1739647128.100:100): avc: denied { relabelto } for pid=340 comm="mkswap" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.957169][ T339] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.000991][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.007848][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.014909][ T345] device bridge_slave_0 entered promiscuous mode [ 40.021142][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.028037][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.035018][ T345] device bridge_slave_1 entered promiscuous mode [ 40.048133][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.054977][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.062099][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.068942][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.077897][ T52] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.085009][ T52] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.092064][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.099141][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.106582][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.114431][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.121216][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.128700][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.136678][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.143426][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.151487][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.159826][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.168367][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.177174][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.184779][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.192362][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.199726][ T345] device veth0_vlan entered promiscuous mode [ 40.206351][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.214468][ T345] device veth1_macvtap entered promiscuous mode [ 40.221271][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.229730][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.241829][ T29] audit: type=1400 audit(1739647128.410:101): avc: denied { prog_load } for pid=349 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 40.243976][ T350] ================================================================================ [ 40.263059][ T29] audit: type=1400 audit(1739647128.410:102): avc: denied { bpf } for pid=349 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 40.270175][ T350] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8028:63 [ 40.290864][ T29] audit: type=1400 audit(1739647128.410:103): avc: denied { perfmon } for pid=349 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 40.298724][ T350] shift exponent 1073741824 is too large for 32-bit type 'int' [ 40.326891][ T350] CPU: 0 PID: 350 Comm: syz-executor.0 Not tainted 5.15.178-syzkaller #0 [ 40.335076][ T350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 40.345313][ T350] Call Trace: [ 40.348406][ T350] [ 40.351187][ T350] dump_stack_lvl+0x38/0x49 [ 40.355527][ T350] dump_stack+0x10/0x12 [ 40.359522][ T350] ubsan_epilogue+0x9/0x32 [ 40.363768][ T350] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 40.370480][ T350] ? debug_smp_processor_id+0x17/0x20 [ 40.375834][ T350] ? reg_bounds_sync+0x157/0x240 [ 40.380612][ T350] adjust_reg_min_max_vals.cold+0x109/0x150 [ 40.386339][ T350] check_alu_op+0x246/0x780 [ 40.390673][ T350] do_check_common+0x1182/0x4410 [ 40.395454][ T350] ? kfree+0xec/0x300 [ 40.399266][ T350] bpf_check+0x225c/0x3510 [ 40.403520][ T350] ? selinux_bpf_prog_alloc+0x1e/0x60 [ 40.408726][ T350] bpf_prog_load+0x483/0x9e0 [ 40.413153][ T350] __sys_bpf+0x706/0x2550 [ 40.417318][ T350] __x64_sys_bpf+0x17/0x20 [ 40.421574][ T350] x64_sys_call+0x12b/0x990 [ 40.425923][ T350] do_syscall_64+0x33/0xb0 [ 40.430260][ T350] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.435977][ T350] RIP: 0033:0x7f08c99a9ba9 [ 40.440317][ T350] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 40.459847][ T350] RSP: 002b:00007f08c952c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.468181][ T350] RAX: ffffffffffffffda RBX: 00007f08c9ac8f80 RCX: 00007f08c99a9ba9 [ 40.476382][ T350] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 40.484200][ T350] RBP: 00007f08c99f547a R08: 0000000000000000 R09: 0000000000000000 [ 40.492049][ T350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.499813][ T350] R13: 000000000000000b R14: 00007f08c9ac8f80 R15: 00007ffcf953c058 [ 40.507717][ T350] [ 40.510726][ T350] ================================================================================ [ 40.519839][ T350] ================================================================================ [ 40.528986][ T350] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8029:63 [ 40.536322][ T350] shift exponent 1073741824 is too large for 32-bit type 'int' [ 40.543616][ T350] CPU: 0 PID: 350 Comm: syz-executor.0 Not tainted 5.15.178-syzkaller #0 [ 40.551822][ T350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 40.561853][ T350] Call Trace: [ 40.565016][ T350] [ 40.567758][ T350] dump_stack_lvl+0x38/0x49 [ 40.572088][ T350] dump_stack+0x10/0x12 [ 40.576086][ T350] ubsan_epilogue+0x9/0x32 [ 40.580506][ T350] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 40.587103][ T350] ? debug_smp_processor_id+0x17/0x20 [ 40.592671][ T350] ? reg_bounds_sync+0x157/0x240 [ 40.597440][ T350] adjust_reg_min_max_vals.cold+0x125/0x150 [ 40.603170][ T350] check_alu_op+0x246/0x780 [ 40.607508][ T350] do_check_common+0x1182/0x4410 [ 40.612410][ T350] ? kfree+0xec/0x300 [ 40.616188][ T350] bpf_check+0x225c/0x3510 [ 40.620444][ T350] ? selinux_bpf_prog_alloc+0x1e/0x60 [ 40.625654][ T350] bpf_prog_load+0x483/0x9e0 [ 40.630241][ T350] __sys_bpf+0x706/0x2550 [ 40.634403][ T350] __x64_sys_bpf+0x17/0x20 [ 40.638655][ T350] x64_sys_call+0x12b/0x990 [ 40.642998][ T350] do_syscall_64+0x33/0xb0 [ 40.647279][ T350] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.653116][ T350] RIP: 0033:0x7f08c99a9ba9 [ 40.657807][ T350] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 40.677675][ T350] RSP: 002b:00007f08c952c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.686348][ T350] RAX: ffffffffffffffda RBX: 00007f08c9ac8f80 RCX: 00007f08c99a9ba9 [ 40.694269][ T350] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 40.702072][ T350] RBP: 00007f08c99f547a R08: 0000000000000000 R09: 0000000000000000 [ 40.709885][ T350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.717708][ T350] R13: 000000000000000b R14: 00007f08c9ac8f80 R15: 00007ffcf953c058 [ 40.725640][ T350] [ 40.729154][ T350] ================================================================================ [ 40.740450][ T29] audit: type=1400 audit(1739647128.910:104): avc: denied { prog_run } for pid=349 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2025/02/15 19:18:53 executed programs: 757 2025/02/15 19:18:58 executed programs: 1640