Warning: Permanently added '10.128.0.122' (ED25519) to the list of known hosts. 2024/05/26 12:07:25 ignoring optional flag "sandboxArg"="0" 2024/05/26 12:07:25 parsed 1 programs [ 39.275974][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 39.275979][ T29] audit: type=1400 audit(1716725245.895:154): avc: denied { mounton } for pid=336 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.307540][ T29] audit: type=1400 audit(1716725245.895:155): avc: denied { mount } for pid=336 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.330962][ T29] audit: type=1400 audit(1716725245.895:156): avc: denied { setattr } for pid=336 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.354684][ T29] audit: type=1400 audit(1716725245.895:157): avc: denied { read write } for pid=336 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.381881][ T29] audit: type=1400 audit(1716725245.895:158): avc: denied { open } for pid=336 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/05/26 12:07:26 executed programs: 0 [ 39.408646][ T29] audit: type=1400 audit(1716725245.975:159): avc: denied { unlink } for pid=336 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.435292][ T29] audit: type=1400 audit(1716725245.975:160): avc: denied { relabelto } for pid=337 comm="mkswap" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.437826][ T336] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 39.492986][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.499904][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.507169][ T342] device bridge_slave_0 entered promiscuous mode [ 39.513729][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.520735][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.527863][ T342] device bridge_slave_1 entered promiscuous mode [ 39.542571][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.549582][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.556651][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.563558][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.573253][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.580701][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.587705][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.594775][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.603858][ T342] device veth0_vlan entered promiscuous mode [ 39.610557][ T342] device veth1_macvtap entered promiscuous mode [ 39.617235][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.626105][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.633842][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.641358][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.648417][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.656383][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.664252][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.671583][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.679045][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.687078][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.694260][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.701375][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.709602][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.718631][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.728064][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.740388][ T29] audit: type=1400 audit(1716725246.355:161): avc: denied { prog_load } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.742506][ T348] ================================================================================ [ 39.763231][ T29] audit: type=1400 audit(1716725246.355:162): avc: denied { bpf } for pid=346 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.769922][ T348] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7989:63 [ 39.791241][ T29] audit: type=1400 audit(1716725246.355:163): avc: denied { perfmon } for pid=346 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.799255][ T348] shift exponent 1073741824 is too large for 32-bit type 'int' [ 39.827678][ T348] CPU: 1 PID: 348 Comm: syz-executor.0 Not tainted 5.15.149-syzkaller #0 [ 39.835893][ T348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 39.846125][ T348] Call Trace: [ 39.849325][ T348] [ 39.852133][ T348] dump_stack_lvl+0x38/0x49 [ 39.856613][ T348] dump_stack+0x10/0x12 [ 39.860703][ T348] ubsan_epilogue+0x9/0x32 [ 39.865032][ T348] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 39.871628][ T348] ? debug_smp_processor_id+0x17/0x20 [ 39.877028][ T348] ? reg_bounds_sync+0x157/0x240 [ 39.881730][ T348] adjust_reg_min_max_vals.cold+0x109/0x150 [ 39.887573][ T348] check_alu_op+0x246/0x780 [ 39.892078][ T348] do_check_common+0x1182/0x4410 [ 39.896871][ T348] ? kfree+0xec/0x2b0 [ 39.900667][ T348] bpf_check+0x2250/0x3520 [ 39.905032][ T348] ? kmem_cache_alloc_trace+0x2f0/0x460 [ 39.910484][ T348] bpf_prog_load+0x483/0x9e0 [ 39.914993][ T348] __sys_bpf+0x706/0x2550 [ 39.919154][ T348] __x64_sys_bpf+0x17/0x20 [ 39.923405][ T348] do_syscall_64+0x35/0xb0 [ 39.927656][ T348] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.933473][ T348] RIP: 0033:0x7fe6d133fba9 [ 39.938018][ T348] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 39.957658][ T348] RSP: 002b:00007fe6d0ec20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.965912][ T348] RAX: ffffffffffffffda RBX: 00007fe6d145ef80 RCX: 00007fe6d133fba9 [ 39.973831][ T348] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 39.981642][ T348] RBP: 00007fe6d138b47a R08: 0000000000000000 R09: 0000000000000000 [ 39.989732][ T348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 39.997927][ T348] R13: 000000000000000b R14: 00007fe6d145ef80 R15: 00007ffde94c3e98 [ 40.006494][ T348] [ 40.009534][ T348] ================================================================================ [ 40.019171][ T348] ================================================================================ [ 40.028623][ T348] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7990:63 [ 40.035971][ T348] shift exponent 1073741824 is too large for 32-bit type 'int' [ 40.043382][ T348] CPU: 1 PID: 348 Comm: syz-executor.0 Not tainted 5.15.149-syzkaller #0 [ 40.051856][ T348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 40.061741][ T348] Call Trace: [ 40.065120][ T348] [ 40.067895][ T348] dump_stack_lvl+0x38/0x49 [ 40.072229][ T348] dump_stack+0x10/0x12 [ 40.076308][ T348] ubsan_epilogue+0x9/0x32 [ 40.080650][ T348] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 40.087350][ T348] ? debug_smp_processor_id+0x17/0x20 [ 40.092551][ T348] ? reg_bounds_sync+0x157/0x240 [ 40.097495][ T348] adjust_reg_min_max_vals.cold+0x125/0x150 [ 40.103235][ T348] check_alu_op+0x246/0x780 [ 40.107572][ T348] do_check_common+0x1182/0x4410 [ 40.112340][ T348] ? kfree+0xec/0x2b0 [ 40.116244][ T348] bpf_check+0x2250/0x3520 [ 40.120613][ T348] ? kmem_cache_alloc_trace+0x2f0/0x460 [ 40.125983][ T348] bpf_prog_load+0x483/0x9e0 [ 40.130488][ T348] __sys_bpf+0x706/0x2550 [ 40.134738][ T348] __x64_sys_bpf+0x17/0x20 [ 40.138985][ T348] do_syscall_64+0x35/0xb0 [ 40.143240][ T348] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.149133][ T348] RIP: 0033:0x7fe6d133fba9 [ 40.153376][ T348] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 40.172903][ T348] RSP: 002b:00007fe6d0ec20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.181827][ T348] RAX: ffffffffffffffda RBX: 00007fe6d145ef80 RCX: 00007fe6d133fba9 [ 40.189647][ T348] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 40.197453][ T348] RBP: 00007fe6d138b47a R08: 0000000000000000 R09: 0000000000000000 [ 40.205458][ T348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.213351][ T348] R13: 000000000000000b R14: 00007fe6d145ef80 R15: 00007ffde94c3e98 [ 40.221691][ T348] [ 40.225299][ T348] ================================================================================ 2024/05/26 12:07:31 executed programs: 700 2024/05/26 12:07:36 executed programs: 1534