Warning: Permanently added '10.128.10.28' (ED25519) to the list of known hosts.
2024/03/09 14:50:29 ignoring optional flag "sandboxArg"="0"
2024/03/09 14:50:30 parsed 1 programs
[ 41.465338][ T27] audit: type=1400 audit(1709995830.039:156): avc: denied { mounton } for pid=343 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 41.490038][ T27] audit: type=1400 audit(1709995830.069:157): avc: denied { mount } for pid=343 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 41.568527][ T27] audit: type=1400 audit(1709995830.149:158): avc: denied { unlink } for pid=343 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
2024/03/09 14:50:30 executed programs: 0
[ 41.614425][ T343] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 41.634391][ T350] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.641331][ T350] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.648621][ T350] device bridge_slave_0 entered promiscuous mode
[ 41.654984][ T350] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.661823][ T350] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.668902][ T350] device bridge_slave_1 entered promiscuous mode
[ 41.680464][ T27] audit: type=1400 audit(1709995830.259:159): avc: denied { write } for pid=350 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 41.700171][ T350] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.700861][ T27] audit: type=1400 audit(1709995830.279:160): avc: denied { read } for pid=350 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 41.707893][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 41.735504][ T350] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.742622][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 41.751873][ T56] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.758891][ T56] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.766357][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 41.773470][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 41.782743][ T350] device veth0_vlan entered promiscuous mode
[ 41.789170][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 41.797212][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 41.805122][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 41.812384][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 41.819629][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 41.827594][ T35] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.834457][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 41.841531][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 41.849362][ T35] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.856148][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 41.863215][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 41.870905][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 41.879412][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 41.887318][ T350] device veth1_macvtap entered promiscuous mode
[ 41.893968][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 41.902978][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 41.911988][ T27] audit: type=1400 audit(1709995830.489:161): avc: denied { mounton } for pid=350 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 41.938369][ T27] audit: type=1400 audit(1709995830.509:162): avc: denied { bpf } for pid=354 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 41.938827][ T355] ================================================================================
[ 41.961235][ T27] audit: type=1400 audit(1709995830.509:163): avc: denied { prog_load } for pid=354 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 41.970333][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:9211:63
[ 41.989298][ T27] audit: type=1400 audit(1709995830.509:164): avc: denied { perfmon } for pid=354 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 41.996678][ T355] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 42.025922][ T355] CPU: 0 PID: 355 Comm: syz-executor.0 Not tainted 6.1.68-syzkaller #0
[ 42.033895][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 42.043876][ T355] Call Trace:
[ 42.047002][ T355]
[ 42.049780][ T355] dump_stack_lvl+0x68/0x91
[ 42.054121][ T355] dump_stack+0x10/0x15
[ 42.058378][ T355] __ubsan_handle_shift_out_of_bounds+0x261/0x290
[ 42.064806][ T355] ? slab_post_alloc_hook+0x6a/0x320
[ 42.069934][ T355] scalar32_min_max_arsh+0xfb/0x120
[ 42.074960][ T355] adjust_reg_min_max_vals+0x1317/0x15d0
[ 42.080616][ T355] do_check_common+0x1c3f/0x2a00
[ 42.085374][ T355] ? check_cfg+0x3ce/0x410
[ 42.089626][ T355] bpf_check+0x1257/0x49e0
[ 42.093973][ T355] ? pcpu_block_update_hint_alloc+0x114/0x2d0
[ 42.099956][ T355] ? slab_post_alloc_hook+0x6a/0x320
[ 42.105163][ T355] ? selinux_bpf_prog_alloc+0x1e/0x60
[ 42.110370][ T355] ? __kmem_cache_alloc_node+0x191/0x240
[ 42.115923][ T355] ? selinux_bpf_prog_alloc+0x1e/0x60
[ 42.121236][ T355] ? preempt_count_add+0x68/0x90
[ 42.126061][ T355] ? should_fail+0xb/0x10
[ 42.130157][ T355] ? should_fail_usercopy+0x15/0x20
[ 42.135390][ T355] ? _copy_from_user+0x4b/0x80
[ 42.140053][ T355] ? ktime_get_with_offset+0x4d/0xf0
[ 42.145293][ T355] bpf_prog_load+0x5fa/0x6f0
[ 42.149715][ T355] ? selinux_bpf+0x51/0x60
[ 42.154151][ T355] __sys_bpf+0x366/0x4f0
[ 42.158315][ T355] __x64_sys_bpf+0x17/0x20
[ 42.162732][ T355] do_syscall_64+0x3d/0xb0
[ 42.167162][ T355] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 42.173112][ T355] RIP: 0033:0x7fc35287cce9
[ 42.177434][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 42.197323][ T355] RSP: 002b:00007fc3535a80c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 42.206007][ T355] RAX: ffffffffffffffda RBX: 00007fc35299bf80 RCX: 00007fc35287cce9
[ 42.214162][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 42.222319][ T355] RBP: 00007fc3528c947a R08: 0000000000000000 R09: 0000000000000000
[ 42.230129][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 42.238297][ T355] R13: 000000000000000b R14: 00007fc35299bf80 R15: 00007fff71990788
[ 42.246201][ T355]
[ 42.249289][ T355] ================================================================================
[ 42.258497][ T355] ================================================================================
[ 42.267561][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:9212:63
[ 42.275021][ T355] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 42.283776][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 6.1.68-syzkaller #0
[ 42.291778][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 42.301845][ T355] Call Trace:
[ 42.304974][ T355]
[ 42.307926][ T355] dump_stack_lvl+0x68/0x91
[ 42.312261][ T355] dump_stack+0x10/0x15
[ 42.316255][ T355] __ubsan_handle_shift_out_of_bounds+0x261/0x290
[ 42.322735][ T355] ? slab_post_alloc_hook+0x6a/0x320
[ 42.328461][ T355] scalar32_min_max_arsh+0x11b/0x120
[ 42.334011][ T355] adjust_reg_min_max_vals+0x1317/0x15d0
[ 42.339791][ T355] do_check_common+0x1c3f/0x2a00
[ 42.344516][ T355] ? check_cfg+0x3ce/0x410
[ 42.348773][ T355] bpf_check+0x1257/0x49e0
[ 42.353027][ T355] ? pcpu_block_update_hint_alloc+0x114/0x2d0
[ 42.359068][ T355] ? slab_post_alloc_hook+0x6a/0x320
[ 42.364312][ T355] ? selinux_bpf_prog_alloc+0x1e/0x60
[ 42.369513][ T355] ? __kmem_cache_alloc_node+0x191/0x240
[ 42.375332][ T355] ? selinux_bpf_prog_alloc+0x1e/0x60
[ 42.380642][ T355] ? preempt_count_add+0x68/0x90
[ 42.385497][ T355] ? should_fail+0xb/0x10
[ 42.389653][ T355] ? should_fail_usercopy+0x15/0x20
[ 42.394772][ T355] ? _copy_from_user+0x4b/0x80
[ 42.399466][ T355] ? ktime_get_with_offset+0x4d/0xf0
[ 42.404840][ T355] bpf_prog_load+0x5fa/0x6f0
[ 42.409271][ T355] ? selinux_bpf+0x51/0x60
[ 42.413522][ T355] __sys_bpf+0x366/0x4f0
[ 42.417602][ T355] __x64_sys_bpf+0x17/0x20
[ 42.421864][ T355] do_syscall_64+0x3d/0xb0
[ 42.426306][ T355] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 42.432205][ T355] RIP: 0033:0x7fc35287cce9
[ 42.436541][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 42.456418][ T355] RSP: 002b:00007fc3535a80c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 42.464660][ T355] RAX: ffffffffffffffda RBX: 00007fc35299bf80 RCX: 00007fc35287cce9
[ 42.472648][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 42.480456][ T355] RBP: 00007fc3528c947a R08: 0000000000000000 R09: 0000000000000000
[ 42.488272][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 42.496257][ T355] R13: 000000000000000b R14: 00007fc35299bf80 R15: 00007fff71990788
[ 42.504068][ T355]
[ 42.507178][ T355] ================================================================================
[ 42.518605][ T27] audit: type=1400 audit(1709995831.099:165): avc: denied { prog_run } for pid=354 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
2024/03/09 14:50:35 executed programs: 693
2024/03/09 14:50:40 executed programs: 1530