Warning: Permanently added '10.128.1.177' (ED25519) to the list of known hosts.
2024/04/08 23:17:56 ignoring optional flag "sandboxArg"="0"
2024/04/08 23:17:57 parsed 1 programs
[ 44.201045][ T29] kauditd_printk_skb: 78 callbacks suppressed
[ 44.201049][ T29] audit: type=1400 audit(1712618277.090:154): avc: denied { mounton } for pid=342 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 44.232083][ T29] audit: type=1400 audit(1712618277.120:155): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 44.255208][ T29] audit: type=1400 audit(1712618277.120:156): avc: denied { setattr } for pid=342 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 44.278326][ T29] audit: type=1400 audit(1712618277.120:157): avc: denied { read write } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 44.304326][ T29] audit: type=1400 audit(1712618277.120:158): avc: denied { open } for pid=342 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
2024/04/08 23:17:57 executed programs: 0
[ 44.330505][ T29] audit: type=1400 audit(1712618277.200:159): avc: denied { unlink } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 44.356055][ T29] audit: type=1400 audit(1712618277.200:160): avc: denied { relabelto } for pid=344 comm="mkswap" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 44.383631][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 44.401643][ T349] bridge0: port 1(bridge_slave_0) entered blocking state
[ 44.408928][ T349] bridge0: port 1(bridge_slave_0) entered disabled state
[ 44.416144][ T349] device bridge_slave_0 entered promiscuous mode
[ 44.422797][ T349] bridge0: port 2(bridge_slave_1) entered blocking state
[ 44.430002][ T349] bridge0: port 2(bridge_slave_1) entered disabled state
[ 44.436989][ T349] device bridge_slave_1 entered promiscuous mode
[ 44.448150][ T349] bridge0: port 2(bridge_slave_1) entered blocking state
[ 44.455590][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 44.462812][ T349] bridge0: port 1(bridge_slave_0) entered blocking state
[ 44.469815][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 44.478658][ T297] bridge0: port 1(bridge_slave_0) entered disabled state
[ 44.485684][ T297] bridge0: port 2(bridge_slave_1) entered disabled state
[ 44.493187][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 44.500400][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 44.507849][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 44.515956][ T304] bridge0: port 1(bridge_slave_0) entered blocking state
[ 44.522751][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 44.531192][ T349] device veth0_vlan entered promiscuous mode
[ 44.537474][ T349] device veth1_macvtap entered promiscuous mode
[ 44.543908][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 44.551880][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 44.559271][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 44.566666][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 44.573739][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 44.581478][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 44.589239][ T297] bridge0: port 2(bridge_slave_1) entered blocking state
[ 44.596228][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 44.603284][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 44.611209][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 44.620521][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 44.629257][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 44.642732][ T355] ================================================================================
[ 44.642761][ T29] audit: type=1400 audit(1712618277.530:161): avc: denied { prog_load } for pid=354 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 44.652330][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7989:63
[ 44.671858][ T29] audit: type=1400 audit(1712618277.530:162): avc: denied { bpf } for pid=354 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 44.678965][ T355] shift exponent 1073741824 is too large for 32-bit type 'int'
[ 44.699688][ T29] audit: type=1400 audit(1712618277.530:163): avc: denied { perfmon } for pid=354 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 44.707038][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller #0
[ 44.736872][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
[ 44.746769][ T355] Call Trace:
[ 44.749890][ T355]
[ 44.752669][ T355] dump_stack_lvl+0x38/0x49
[ 44.757008][ T355] dump_stack+0x10/0x12
[ 44.761008][ T355] ubsan_epilogue+0x9/0x32
[ 44.765496][ T355] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108
[ 44.772091][ T355] ? debug_smp_processor_id+0x17/0x20
[ 44.777299][ T355] ? reg_bounds_sync+0x157/0x240
[ 44.782110][ T355] adjust_reg_min_max_vals.cold+0x109/0x150
[ 44.787801][ T355] check_alu_op+0x246/0x780
[ 44.792146][ T355] do_check_common+0x1182/0x4410
[ 44.796913][ T355] ? kfree+0xec/0x2b0
[ 44.800733][ T355] bpf_check+0x2250/0x3520
[ 44.804984][ T355] ? kmem_cache_alloc_trace+0x2f0/0x460
[ 44.810375][ T355] bpf_prog_load+0x483/0x9e0
[ 44.814794][ T355] __sys_bpf+0x706/0x2550
[ 44.818959][ T355] __x64_sys_bpf+0x17/0x20
[ 44.823215][ T355] do_syscall_64+0x35/0xb0
[ 44.827464][ T355] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 44.833200][ T355] RIP: 0033:0x7f90c1ef5ba9
[ 44.837444][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 44.856974][ T355] RSP: 002b:00007f90c1a780c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 44.865307][ T355] RAX: ffffffffffffffda RBX: 00007f90c2014f80 RCX: 00007f90c1ef5ba9
[ 44.873309][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 44.881276][ T355] RBP: 00007f90c1f4147a R08: 0000000000000000 R09: 0000000000000000
[ 44.889178][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 44.897008][ T355] R13: 000000000000000b R14: 00007f90c2014f80 R15: 00007ffea1711228
[ 44.905229][ T355]
[ 44.908444][ T355] ================================================================================
[ 44.917584][ T355] ================================================================================
[ 44.926639][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7990:63
[ 44.934009][ T355] shift exponent 1073741824 is too large for 32-bit type 'int'
[ 44.941790][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller #0
[ 44.950057][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
[ 44.959949][ T355] Call Trace:
[ 44.963113][ T355]
[ 44.965875][ T355] dump_stack_lvl+0x38/0x49
[ 44.970207][ T355] dump_stack+0x10/0x12
[ 44.975050][ T355] ubsan_epilogue+0x9/0x32
[ 44.979301][ T355] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108
[ 44.986003][ T355] ? debug_smp_processor_id+0x17/0x20
[ 44.991228][ T355] ? reg_bounds_sync+0x157/0x240
[ 44.996066][ T355] adjust_reg_min_max_vals.cold+0x125/0x150
[ 45.001795][ T355] check_alu_op+0x246/0x780
[ 45.006220][ T355] do_check_common+0x1182/0x4410
[ 45.011168][ T355] ? kfree+0xec/0x2b0
[ 45.014987][ T355] bpf_check+0x2250/0x3520
[ 45.019326][ T355] ? kmem_cache_alloc_trace+0x2f0/0x460
[ 45.024945][ T355] bpf_prog_load+0x483/0x9e0
[ 45.029396][ T355] __sys_bpf+0x706/0x2550
[ 45.033666][ T355] __x64_sys_bpf+0x17/0x20
[ 45.037909][ T355] do_syscall_64+0x35/0xb0
[ 45.042166][ T355] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 45.047895][ T355] RIP: 0033:0x7f90c1ef5ba9
[ 45.052145][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 45.072156][ T355] RSP: 002b:00007f90c1a780c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 45.080406][ T355] RAX: ffffffffffffffda RBX: 00007f90c2014f80 RCX: 00007f90c1ef5ba9
[ 45.088464][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 45.096358][ T355] RBP: 00007f90c1f4147a R08: 0000000000000000 R09: 0000000000000000
[ 45.104399][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 45.112273][ T355] R13: 000000000000000b R14: 00007f90c2014f80 R15: 00007ffea1711228
[ 45.120165][ T355]
[ 45.123273][ T355] ================================================================================
2024/04/08 23:18:02 executed programs: 873
2024/04/08 23:18:07 executed programs: 1861