Warning: Permanently added '10.128.1.177' (ED25519) to the list of known hosts. 2024/04/08 23:17:56 ignoring optional flag "sandboxArg"="0" 2024/04/08 23:17:57 parsed 1 programs [ 44.201045][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 44.201049][ T29] audit: type=1400 audit(1712618277.090:154): avc: denied { mounton } for pid=342 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 44.232083][ T29] audit: type=1400 audit(1712618277.120:155): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 44.255208][ T29] audit: type=1400 audit(1712618277.120:156): avc: denied { setattr } for pid=342 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.278326][ T29] audit: type=1400 audit(1712618277.120:157): avc: denied { read write } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 44.304326][ T29] audit: type=1400 audit(1712618277.120:158): avc: denied { open } for pid=342 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/04/08 23:17:57 executed programs: 0 [ 44.330505][ T29] audit: type=1400 audit(1712618277.200:159): avc: denied { unlink } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 44.356055][ T29] audit: type=1400 audit(1712618277.200:160): avc: denied { relabelto } for pid=344 comm="mkswap" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 44.383631][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.401643][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.408928][ T349] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.416144][ T349] device bridge_slave_0 entered promiscuous mode [ 44.422797][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.430002][ T349] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.436989][ T349] device bridge_slave_1 entered promiscuous mode [ 44.448150][ T349] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.455590][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.462812][ T349] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.469815][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.478658][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.485684][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.493187][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.500400][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.507849][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.515956][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.522751][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.531192][ T349] device veth0_vlan entered promiscuous mode [ 44.537474][ T349] device veth1_macvtap entered promiscuous mode [ 44.543908][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.551880][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.559271][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.566666][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.573739][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.581478][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.589239][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.596228][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.603284][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.611209][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.620521][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.629257][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.642732][ T355] ================================================================================ [ 44.642761][ T29] audit: type=1400 audit(1712618277.530:161): avc: denied { prog_load } for pid=354 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 44.652330][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7989:63 [ 44.671858][ T29] audit: type=1400 audit(1712618277.530:162): avc: denied { bpf } for pid=354 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 44.678965][ T355] shift exponent 1073741824 is too large for 32-bit type 'int' [ 44.699688][ T29] audit: type=1400 audit(1712618277.530:163): avc: denied { perfmon } for pid=354 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 44.707038][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller #0 [ 44.736872][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 44.746769][ T355] Call Trace: [ 44.749890][ T355] [ 44.752669][ T355] dump_stack_lvl+0x38/0x49 [ 44.757008][ T355] dump_stack+0x10/0x12 [ 44.761008][ T355] ubsan_epilogue+0x9/0x32 [ 44.765496][ T355] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 44.772091][ T355] ? debug_smp_processor_id+0x17/0x20 [ 44.777299][ T355] ? reg_bounds_sync+0x157/0x240 [ 44.782110][ T355] adjust_reg_min_max_vals.cold+0x109/0x150 [ 44.787801][ T355] check_alu_op+0x246/0x780 [ 44.792146][ T355] do_check_common+0x1182/0x4410 [ 44.796913][ T355] ? kfree+0xec/0x2b0 [ 44.800733][ T355] bpf_check+0x2250/0x3520 [ 44.804984][ T355] ? kmem_cache_alloc_trace+0x2f0/0x460 [ 44.810375][ T355] bpf_prog_load+0x483/0x9e0 [ 44.814794][ T355] __sys_bpf+0x706/0x2550 [ 44.818959][ T355] __x64_sys_bpf+0x17/0x20 [ 44.823215][ T355] do_syscall_64+0x35/0xb0 [ 44.827464][ T355] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.833200][ T355] RIP: 0033:0x7f90c1ef5ba9 [ 44.837444][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 44.856974][ T355] RSP: 002b:00007f90c1a780c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 44.865307][ T355] RAX: ffffffffffffffda RBX: 00007f90c2014f80 RCX: 00007f90c1ef5ba9 [ 44.873309][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 44.881276][ T355] RBP: 00007f90c1f4147a R08: 0000000000000000 R09: 0000000000000000 [ 44.889178][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.897008][ T355] R13: 000000000000000b R14: 00007f90c2014f80 R15: 00007ffea1711228 [ 44.905229][ T355] [ 44.908444][ T355] ================================================================================ [ 44.917584][ T355] ================================================================================ [ 44.926639][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7990:63 [ 44.934009][ T355] shift exponent 1073741824 is too large for 32-bit type 'int' [ 44.941790][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller #0 [ 44.950057][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 44.959949][ T355] Call Trace: [ 44.963113][ T355] [ 44.965875][ T355] dump_stack_lvl+0x38/0x49 [ 44.970207][ T355] dump_stack+0x10/0x12 [ 44.975050][ T355] ubsan_epilogue+0x9/0x32 [ 44.979301][ T355] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 44.986003][ T355] ? debug_smp_processor_id+0x17/0x20 [ 44.991228][ T355] ? reg_bounds_sync+0x157/0x240 [ 44.996066][ T355] adjust_reg_min_max_vals.cold+0x125/0x150 [ 45.001795][ T355] check_alu_op+0x246/0x780 [ 45.006220][ T355] do_check_common+0x1182/0x4410 [ 45.011168][ T355] ? kfree+0xec/0x2b0 [ 45.014987][ T355] bpf_check+0x2250/0x3520 [ 45.019326][ T355] ? kmem_cache_alloc_trace+0x2f0/0x460 [ 45.024945][ T355] bpf_prog_load+0x483/0x9e0 [ 45.029396][ T355] __sys_bpf+0x706/0x2550 [ 45.033666][ T355] __x64_sys_bpf+0x17/0x20 [ 45.037909][ T355] do_syscall_64+0x35/0xb0 [ 45.042166][ T355] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.047895][ T355] RIP: 0033:0x7f90c1ef5ba9 [ 45.052145][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 45.072156][ T355] RSP: 002b:00007f90c1a780c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.080406][ T355] RAX: ffffffffffffffda RBX: 00007f90c2014f80 RCX: 00007f90c1ef5ba9 [ 45.088464][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 45.096358][ T355] RBP: 00007f90c1f4147a R08: 0000000000000000 R09: 0000000000000000 [ 45.104399][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.112273][ T355] R13: 000000000000000b R14: 00007f90c2014f80 R15: 00007ffea1711228 [ 45.120165][ T355] [ 45.123273][ T355] ================================================================================ 2024/04/08 23:18:02 executed programs: 873 2024/04/08 23:18:07 executed programs: 1861