Warning: Permanently added '10.128.1.124' (ED25519) to the list of known hosts. 2024/04/23 23:12:16 ignoring optional flag "sandboxArg"="0" 2024/04/23 23:12:16 parsed 1 programs [ 41.413039][ T30] audit: type=1400 audit(1713913936.285:157): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.438251][ T30] audit: type=1400 audit(1713913936.285:158): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/04/23 23:12:16 executed programs: 0 [ 41.542122][ T30] audit: type=1400 audit(1713913936.415:159): avc: denied { unlink } for pid=341 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 41.563698][ T341] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 41.633337][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.640198][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.647838][ T347] device bridge_slave_0 entered promiscuous mode [ 41.654642][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.661663][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.668888][ T347] device bridge_slave_1 entered promiscuous mode [ 41.711799][ T30] audit: type=1400 audit(1713913936.585:160): avc: denied { write } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.717685][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.732312][ T30] audit: type=1400 audit(1713913936.585:161): avc: denied { read } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.739058][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.766655][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.773570][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.792723][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.800082][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.808018][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.815519][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.833213][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.841743][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.849065][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.856376][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.864377][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.871234][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.878917][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.887761][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.899929][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.910901][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.919570][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.926989][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.935506][ T347] device veth0_vlan entered promiscuous mode [ 41.947265][ T347] device veth1_macvtap entered promiscuous mode [ 41.954337][ T58] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.965616][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.975457][ T58] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.990111][ T30] audit: type=1400 audit(1713913936.855:162): avc: denied { mounton } for pid=347 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 42.022558][ T30] audit: type=1400 audit(1713913936.885:163): avc: denied { prog_load } for pid=351 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 42.042344][ T30] audit: type=1400 audit(1713913936.885:164): avc: denied { bpf } for pid=351 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 42.063726][ T30] audit: type=1400 audit(1713913936.885:165): avc: denied { perfmon } for pid=351 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 42.064607][ T352] ================================================================================ [ 42.094470][ T352] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7989:63 [ 42.101999][ T352] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 42.110918][ T352] CPU: 0 PID: 352 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller-1069101-gad06eaf051cd #0 [ 42.121244][ T352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 42.131254][ T352] Call Trace: [ 42.134341][ T352] [ 42.137132][ T352] dump_stack_lvl+0x151/0x1b7 [ 42.141631][ T352] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.147191][ T352] ? stack_trace_snprint+0xf0/0xf0 [ 42.152161][ T352] dump_stack+0x15/0x17 [ 42.156467][ T352] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 42.163114][ T352] scalar32_min_max_arsh+0x622/0x6c0 [ 42.168318][ T352] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 42.174077][ T352] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 42.179787][ T352] ? reg_bounds_sync+0xf90/0xf90 [ 42.185018][ T352] ? check_stack_access_within_bounds+0x5a0/0x5a0 [ 42.191257][ T352] ? check_reg_arg+0x42a/0x820 [ 42.195832][ T352] do_check+0x94d9/0xf2c0 [ 42.200125][ T352] ? mark_reg_unknown+0x600/0x600 [ 42.205245][ T352] ? mark_reg_not_init+0x93/0x670 [ 42.210296][ T352] ? memcpy+0x56/0x70 [ 42.214107][ T352] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 42.220075][ T352] do_check_common+0x909/0x1290 [ 42.224866][ T352] bpf_check+0x37bf/0x12b20 [ 42.229216][ T352] ? is_bpf_text_address+0x172/0x190 [ 42.234297][ T352] ? stack_trace_save+0x1c0/0x1c0 [ 42.239650][ T352] ? __kernel_text_address+0x9b/0x110 [ 42.245009][ T352] ? unwind_get_return_address+0x4d/0x90 [ 42.250997][ T352] ? bpf_get_btf_vmlinux+0x20/0x20 [ 42.256180][ T352] ? __kasan_check_write+0x14/0x20 [ 42.261083][ T352] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 42.267199][ T352] ? _raw_spin_lock+0x1b0/0x1b0 [ 42.272041][ T352] ? stack_trace_save+0x113/0x1c0 [ 42.276962][ T352] ? _raw_spin_unlock+0x4d/0x70 [ 42.281824][ T352] ? stack_trace_snprint+0xf0/0xf0 [ 42.286974][ T352] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 42.292974][ T352] ? __stack_depot_save+0x40d/0x470 [ 42.298000][ T352] ? ____kasan_kmalloc+0xed/0x110 [ 42.303187][ T352] ? ____kasan_kmalloc+0xdb/0x110 [ 42.308162][ T352] ? __kasan_kmalloc+0x9/0x10 [ 42.312814][ T352] ? kmem_cache_alloc_trace+0x115/0x210 [ 42.318131][ T352] ? selinux_bpf_prog_alloc+0x51/0x140 [ 42.323635][ T352] ? security_bpf_prog_alloc+0x62/0x90 [ 42.329131][ T352] ? bpf_prog_load+0x9ee/0x1b50 [ 42.334126][ T352] ? __sys_bpf+0x4bc/0x760 [ 42.339999][ T352] ? __x64_sys_bpf+0x7c/0x90 [ 42.345454][ T352] ? do_syscall_64+0x3d/0xb0 [ 42.350178][ T352] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.356694][ T352] ? __kasan_kmalloc+0x9/0x10 [ 42.361373][ T352] ? memset+0x35/0x40 [ 42.365432][ T352] ? bpf_obj_name_cpy+0x196/0x1e0 [ 42.370289][ T352] bpf_prog_load+0x12ac/0x1b50 [ 42.374981][ T352] ? map_freeze+0x370/0x370 [ 42.379427][ T352] ? selinux_bpf+0xcb/0x100 [ 42.383778][ T352] ? security_bpf+0x82/0xb0 [ 42.388335][ T352] __sys_bpf+0x4bc/0x760 [ 42.392673][ T352] ? _copy_from_user+0x96/0xd0 [ 42.397366][ T352] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 42.402701][ T352] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 42.408272][ T352] ? debug_smp_processor_id+0x17/0x20 [ 42.413649][ T352] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 42.419573][ T352] __x64_sys_bpf+0x7c/0x90 [ 42.423803][ T352] do_syscall_64+0x3d/0xb0 [ 42.428578][ T352] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.434294][ T352] RIP: 0033:0x7f6b56ce4ba9 [ 42.438554][ T352] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 42.458704][ T352] RSP: 002b:00007f6b568670c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.466953][ T352] RAX: ffffffffffffffda RBX: 00007f6b56e03f80 RCX: 00007f6b56ce4ba9 [ 42.474726][ T352] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 42.482903][ T352] RBP: 00007f6b56d3047a R08: 0000000000000000 R09: 0000000000000000 [ 42.490951][ T352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 42.499049][ T352] R13: 000000000000000b R14: 00007f6b56e03f80 R15: 00007ffd774f5078 [ 42.507293][ T352] [ 42.512784][ T352] ================================================================================ [ 42.522044][ T352] ================================================================================ [ 42.531266][ T352] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7990:63 [ 42.539053][ T352] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 42.547830][ T352] CPU: 0 PID: 352 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller-1069101-gad06eaf051cd #0 [ 42.558343][ T352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 42.568850][ T352] Call Trace: [ 42.572206][ T352] [ 42.575601][ T352] dump_stack_lvl+0x151/0x1b7 [ 42.580441][ T352] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.586477][ T352] ? stack_trace_snprint+0xf0/0xf0 [ 42.591524][ T352] dump_stack+0x15/0x17 [ 42.595935][ T352] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 42.602190][ T352] scalar32_min_max_arsh+0x676/0x6c0 [ 42.607391][ T352] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 42.613140][ T352] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 42.618857][ T352] ? reg_bounds_sync+0xf90/0xf90 [ 42.623618][ T352] ? check_stack_access_within_bounds+0x5a0/0x5a0 [ 42.629867][ T352] ? check_reg_arg+0x42a/0x820 [ 42.634493][ T352] do_check+0x94d9/0xf2c0 [ 42.638900][ T352] ? mark_reg_unknown+0x600/0x600 [ 42.643760][ T352] ? mark_reg_not_init+0x93/0x670 [ 42.648612][ T352] ? memcpy+0x56/0x70 [ 42.652613][ T352] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 42.658456][ T352] do_check_common+0x909/0x1290 [ 42.663106][ T352] bpf_check+0x37bf/0x12b20 [ 42.667451][ T352] ? is_bpf_text_address+0x172/0x190 [ 42.672574][ T352] ? stack_trace_save+0x1c0/0x1c0 [ 42.677796][ T352] ? __kernel_text_address+0x9b/0x110 [ 42.683613][ T352] ? unwind_get_return_address+0x4d/0x90 [ 42.689066][ T352] ? bpf_get_btf_vmlinux+0x20/0x20 [ 42.694532][ T352] ? __kasan_check_write+0x14/0x20 [ 42.700036][ T352] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 42.705548][ T352] ? _raw_spin_lock+0x1b0/0x1b0 [ 42.710365][ T352] ? stack_trace_save+0x113/0x1c0 [ 42.715363][ T352] ? _raw_spin_unlock+0x4d/0x70 [ 42.720163][ T352] ? stack_trace_snprint+0xf0/0xf0 [ 42.725222][ T352] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 42.730961][ T352] ? __stack_depot_save+0x40d/0x470 [ 42.737058][ T352] ? ____kasan_kmalloc+0xed/0x110 [ 42.741997][ T352] ? ____kasan_kmalloc+0xdb/0x110 [ 42.746852][ T352] ? __kasan_kmalloc+0x9/0x10 [ 42.751539][ T352] ? kmem_cache_alloc_trace+0x115/0x210 [ 42.757004][ T352] ? selinux_bpf_prog_alloc+0x51/0x140 [ 42.762397][ T352] ? security_bpf_prog_alloc+0x62/0x90 [ 42.767699][ T352] ? bpf_prog_load+0x9ee/0x1b50 [ 42.772465][ T352] ? __sys_bpf+0x4bc/0x760 [ 42.776806][ T352] ? __x64_sys_bpf+0x7c/0x90 [ 42.781334][ T352] ? do_syscall_64+0x3d/0xb0 [ 42.785744][ T352] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.791831][ T352] ? __kasan_kmalloc+0x9/0x10 [ 42.796342][ T352] ? memset+0x35/0x40 [ 42.800239][ T352] ? bpf_obj_name_cpy+0x196/0x1e0 [ 42.805098][ T352] bpf_prog_load+0x12ac/0x1b50 [ 42.809804][ T352] ? map_freeze+0x370/0x370 [ 42.814171][ T352] ? selinux_bpf+0xcb/0x100 [ 42.818476][ T352] ? security_bpf+0x82/0xb0 [ 42.823107][ T352] __sys_bpf+0x4bc/0x760 [ 42.827192][ T352] ? _copy_from_user+0x96/0xd0 [ 42.832057][ T352] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 42.837259][ T352] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 42.842895][ T352] ? debug_smp_processor_id+0x17/0x20 [ 42.848114][ T352] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 42.857335][ T352] __x64_sys_bpf+0x7c/0x90 [ 42.861645][ T352] do_syscall_64+0x3d/0xb0 [ 42.865907][ T352] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.871720][ T352] RIP: 0033:0x7f6b56ce4ba9 [ 42.876142][ T352] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 42.895780][ T352] RSP: 002b:00007f6b568670c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.904125][ T352] RAX: ffffffffffffffda RBX: 00007f6b56e03f80 RCX: 00007f6b56ce4ba9 [ 42.912211][ T352] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 42.920018][ T352] RBP: 00007f6b56d3047a R08: 0000000000000000 R09: 0000000000000000 [ 42.928004][ T352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 42.935818][ T352] R13: 000000000000000b R14: 00007f6b56e03f80 R15: 00007ffd774f5078 [ 42.943635][ T352] [ 42.947656][ T352] ================================================================================ [ 43.007823][ T30] audit: type=1400 audit(1713913937.875:166): avc: denied { prog_run } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2024/04/23 23:12:21 executed programs: 83 2024/04/23 23:12:26 executed programs: 198