Warning: Permanently added '10.128.0.82' (ED25519) to the list of known hosts. 2025/05/06 23:32:22 ignoring optional flag "sandboxArg"="0" 2025/05/06 23:32:22 ignoring optional flag "type"="gce" 2025/05/06 23:32:22 parsed 1 programs [ 36.620386][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 36.620391][ T29] audit: type=1400 audit(1746574342.822:96): avc: denied { mounton } for pid=335 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.651337][ T29] audit: type=1400 audit(1746574342.822:97): avc: denied { read write } for pid=335 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 36.677337][ T29] audit: type=1400 audit(1746574342.822:98): avc: denied { open } for pid=335 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/05/06 23:32:22 executed programs: 0 [ 36.703580][ T29] audit: type=1400 audit(1746574342.882:99): avc: denied { unlink } for pid=335 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 36.729469][ T29] audit: type=1400 audit(1746574342.882:100): avc: denied { relabelto } for pid=336 comm="mkswap" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 36.730069][ T335] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 36.781878][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.789427][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.796535][ T341] device bridge_slave_0 entered promiscuous mode [ 36.803243][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.810427][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.818039][ T341] device bridge_slave_1 entered promiscuous mode [ 36.832185][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.839229][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.846514][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.853442][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.862840][ T52] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.870369][ T52] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.877660][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.884947][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.892947][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.901283][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.908108][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.915671][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.923773][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.930557][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.938555][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.946656][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.955279][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.963896][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.972426][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.979638][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.986865][ T341] device veth0_vlan entered promiscuous mode [ 36.993547][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.001836][ T341] device veth1_macvtap entered promiscuous mode [ 37.008307][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.016776][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.030864][ T347] ================================================================================ [ 37.031270][ T29] audit: type=1400 audit(1746574343.232:101): avc: denied { prog_load } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 37.050937][ T347] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8028:63 [ 37.059784][ T29] audit: type=1400 audit(1746574343.232:102): avc: denied { bpf } for pid=346 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 37.067338][ T347] shift exponent 1073741824 is too large for 32-bit type 'int' [ 37.088077][ T29] audit: type=1400 audit(1746574343.232:103): avc: denied { perfmon } for pid=346 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 37.095497][ T347] CPU: 0 PID: 347 Comm: syz-executor.0 Not tainted 5.15.180-syzkaller #0 [ 37.124881][ T347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 37.135189][ T347] Call Trace: [ 37.138398][ T347] [ 37.141157][ T347] dump_stack_lvl+0x38/0x49 [ 37.145687][ T347] dump_stack+0x10/0x12 [ 37.149932][ T347] ubsan_epilogue+0x9/0x32 [ 37.154354][ T347] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 37.161624][ T347] ? emulate_vsyscall+0x102/0x390 [ 37.166484][ T347] ? reg_bounds_sync+0x157/0x240 [ 37.171420][ T347] adjust_reg_min_max_vals.cold+0x109/0x150 [ 37.177237][ T347] check_alu_op+0x246/0x780 [ 37.181667][ T347] do_check_common+0x1182/0x4410 [ 37.186518][ T347] ? kfree+0xec/0x300 [ 37.190349][ T347] bpf_check+0x225c/0x3510 [ 37.194592][ T347] ? selinux_bpf_prog_alloc+0x1e/0x60 [ 37.200145][ T347] bpf_prog_load+0x483/0x9e0 [ 37.204786][ T347] __sys_bpf+0x706/0x2550 [ 37.209054][ T347] __x64_sys_bpf+0x17/0x20 [ 37.213301][ T347] x64_sys_call+0x12b/0x990 [ 37.217815][ T347] do_syscall_64+0x33/0xb0 [ 37.222164][ T347] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.227884][ T347] RIP: 0033:0x7f8116f19ba9 [ 37.232156][ T347] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 37.251740][ T347] RSP: 002b:00007f8116a9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.259987][ T347] RAX: ffffffffffffffda RBX: 00007f8117038f80 RCX: 00007f8116f19ba9 [ 37.267972][ T347] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 37.276197][ T347] RBP: 00007f8116f6547a R08: 0000000000000000 R09: 0000000000000000 [ 37.284215][ T347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 37.292129][ T347] R13: 000000000000000b R14: 00007f8117038f80 R15: 00007ffd7a7662d8 [ 37.300109][ T347] [ 37.303137][ T347] ================================================================================ [ 37.312559][ T347] ================================================================================ [ 37.321673][ T347] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8029:63 [ 37.329170][ T347] shift exponent 1073741824 is too large for 32-bit type 'int' [ 37.337120][ T347] CPU: 0 PID: 347 Comm: syz-executor.0 Not tainted 5.15.180-syzkaller #0 [ 37.345530][ T347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 37.355523][ T347] Call Trace: [ 37.358650][ T347] [ 37.361423][ T347] dump_stack_lvl+0x38/0x49 [ 37.365935][ T347] dump_stack+0x10/0x12 [ 37.369946][ T347] ubsan_epilogue+0x9/0x32 [ 37.374235][ T347] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108 [ 37.380883][ T347] ? emulate_vsyscall+0x102/0x390 [ 37.385910][ T347] ? reg_bounds_sync+0x157/0x240 [ 37.390766][ T347] adjust_reg_min_max_vals.cold+0x125/0x150 [ 37.396848][ T347] check_alu_op+0x246/0x780 [ 37.401692][ T347] do_check_common+0x1182/0x4410 [ 37.406459][ T347] ? kfree+0xec/0x300 [ 37.410275][ T347] bpf_check+0x225c/0x3510 [ 37.414624][ T347] ? selinux_bpf_prog_alloc+0x1e/0x60 [ 37.419826][ T347] bpf_prog_load+0x483/0x9e0 [ 37.424343][ T347] __sys_bpf+0x706/0x2550 [ 37.428503][ T347] __x64_sys_bpf+0x17/0x20 [ 37.432768][ T347] x64_sys_call+0x12b/0x990 [ 37.437255][ T347] do_syscall_64+0x33/0xb0 [ 37.441548][ T347] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.447264][ T347] RIP: 0033:0x7f8116f19ba9 [ 37.451525][ T347] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 37.470961][ T347] RSP: 002b:00007f8116a9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.479687][ T347] RAX: ffffffffffffffda RBX: 00007f8117038f80 RCX: 00007f8116f19ba9 [ 37.487709][ T347] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 37.495514][ T347] RBP: 00007f8116f6547a R08: 0000000000000000 R09: 0000000000000000 [ 37.503498][ T347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 37.511407][ T347] R13: 000000000000000b R14: 00007f8117038f80 R15: 00007ffd7a7662d8 [ 37.519413][ T347] [ 37.522623][ T347] ================================================================================ [ 37.534542][ T29] audit: type=1400 audit(1746574343.742:104): avc: denied { prog_run } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2025/05/06 23:32:28 executed programs: 733 2025/05/06 23:32:33 executed programs: 1610