Warning: Permanently added '10.128.1.124' (ED25519) to the list of known hosts.
2024/04/23 23:12:16 ignoring optional flag "sandboxArg"="0"
2024/04/23 23:12:16 parsed 1 programs
[ 41.413039][ T30] audit: type=1400 audit(1713913936.285:157): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 41.438251][ T30] audit: type=1400 audit(1713913936.285:158): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
2024/04/23 23:12:16 executed programs: 0
[ 41.542122][ T30] audit: type=1400 audit(1713913936.415:159): avc: denied { unlink } for pid=341 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 41.563698][ T341] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 41.633337][ T347] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.640198][ T347] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.647838][ T347] device bridge_slave_0 entered promiscuous mode
[ 41.654642][ T347] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.661663][ T347] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.668888][ T347] device bridge_slave_1 entered promiscuous mode
[ 41.711799][ T30] audit: type=1400 audit(1713913936.585:160): avc: denied { write } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 41.717685][ T347] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.732312][ T30] audit: type=1400 audit(1713913936.585:161): avc: denied { read } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 41.739058][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 41.766655][ T347] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.773570][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 41.792723][ T20] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.800082][ T20] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.808018][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 41.815519][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 41.833213][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 41.841743][ T20] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.849065][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 41.856376][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 41.864377][ T20] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.871234][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 41.878917][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 41.887761][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 41.899929][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 41.910901][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 41.919570][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 41.926989][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 41.935506][ T347] device veth0_vlan entered promiscuous mode
[ 41.947265][ T347] device veth1_macvtap entered promiscuous mode
[ 41.954337][ T58] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 41.965616][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 41.975457][ T58] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 41.990111][ T30] audit: type=1400 audit(1713913936.855:162): avc: denied { mounton } for pid=347 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 42.022558][ T30] audit: type=1400 audit(1713913936.885:163): avc: denied { prog_load } for pid=351 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 42.042344][ T30] audit: type=1400 audit(1713913936.885:164): avc: denied { bpf } for pid=351 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 42.063726][ T30] audit: type=1400 audit(1713913936.885:165): avc: denied { perfmon } for pid=351 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 42.064607][ T352] ================================================================================
[ 42.094470][ T352] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7989:63
[ 42.101999][ T352] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 42.110918][ T352] CPU: 0 PID: 352 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller-1069101-gad06eaf051cd #0
[ 42.121244][ T352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
[ 42.131254][ T352] Call Trace:
[ 42.134341][ T352]
[ 42.137132][ T352] dump_stack_lvl+0x151/0x1b7
[ 42.141631][ T352] ? io_uring_drop_tctx_refs+0x190/0x190
[ 42.147191][ T352] ? stack_trace_snprint+0xf0/0xf0
[ 42.152161][ T352] dump_stack+0x15/0x17
[ 42.156467][ T352] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 42.163114][ T352] scalar32_min_max_arsh+0x622/0x6c0
[ 42.168318][ T352] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 42.174077][ T352] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 42.179787][ T352] ? reg_bounds_sync+0xf90/0xf90
[ 42.185018][ T352] ? check_stack_access_within_bounds+0x5a0/0x5a0
[ 42.191257][ T352] ? check_reg_arg+0x42a/0x820
[ 42.195832][ T352] do_check+0x94d9/0xf2c0
[ 42.200125][ T352] ? mark_reg_unknown+0x600/0x600
[ 42.205245][ T352] ? mark_reg_not_init+0x93/0x670
[ 42.210296][ T352] ? memcpy+0x56/0x70
[ 42.214107][ T352] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 42.220075][ T352] do_check_common+0x909/0x1290
[ 42.224866][ T352] bpf_check+0x37bf/0x12b20
[ 42.229216][ T352] ? is_bpf_text_address+0x172/0x190
[ 42.234297][ T352] ? stack_trace_save+0x1c0/0x1c0
[ 42.239650][ T352] ? __kernel_text_address+0x9b/0x110
[ 42.245009][ T352] ? unwind_get_return_address+0x4d/0x90
[ 42.250997][ T352] ? bpf_get_btf_vmlinux+0x20/0x20
[ 42.256180][ T352] ? __kasan_check_write+0x14/0x20
[ 42.261083][ T352] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 42.267199][ T352] ? _raw_spin_lock+0x1b0/0x1b0
[ 42.272041][ T352] ? stack_trace_save+0x113/0x1c0
[ 42.276962][ T352] ? _raw_spin_unlock+0x4d/0x70
[ 42.281824][ T352] ? stack_trace_snprint+0xf0/0xf0
[ 42.286974][ T352] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 42.292974][ T352] ? __stack_depot_save+0x40d/0x470
[ 42.298000][ T352] ? ____kasan_kmalloc+0xed/0x110
[ 42.303187][ T352] ? ____kasan_kmalloc+0xdb/0x110
[ 42.308162][ T352] ? __kasan_kmalloc+0x9/0x10
[ 42.312814][ T352] ? kmem_cache_alloc_trace+0x115/0x210
[ 42.318131][ T352] ? selinux_bpf_prog_alloc+0x51/0x140
[ 42.323635][ T352] ? security_bpf_prog_alloc+0x62/0x90
[ 42.329131][ T352] ? bpf_prog_load+0x9ee/0x1b50
[ 42.334126][ T352] ? __sys_bpf+0x4bc/0x760
[ 42.339999][ T352] ? __x64_sys_bpf+0x7c/0x90
[ 42.345454][ T352] ? do_syscall_64+0x3d/0xb0
[ 42.350178][ T352] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 42.356694][ T352] ? __kasan_kmalloc+0x9/0x10
[ 42.361373][ T352] ? memset+0x35/0x40
[ 42.365432][ T352] ? bpf_obj_name_cpy+0x196/0x1e0
[ 42.370289][ T352] bpf_prog_load+0x12ac/0x1b50
[ 42.374981][ T352] ? map_freeze+0x370/0x370
[ 42.379427][ T352] ? selinux_bpf+0xcb/0x100
[ 42.383778][ T352] ? security_bpf+0x82/0xb0
[ 42.388335][ T352] __sys_bpf+0x4bc/0x760
[ 42.392673][ T352] ? _copy_from_user+0x96/0xd0
[ 42.397366][ T352] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 42.402701][ T352] ? __se_sys_rt_sigprocmask+0x30a/0x380
[ 42.408272][ T352] ? debug_smp_processor_id+0x17/0x20
[ 42.413649][ T352] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 42.419573][ T352] __x64_sys_bpf+0x7c/0x90
[ 42.423803][ T352] do_syscall_64+0x3d/0xb0
[ 42.428578][ T352] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 42.434294][ T352] RIP: 0033:0x7f6b56ce4ba9
[ 42.438554][ T352] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 42.458704][ T352] RSP: 002b:00007f6b568670c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 42.466953][ T352] RAX: ffffffffffffffda RBX: 00007f6b56e03f80 RCX: 00007f6b56ce4ba9
[ 42.474726][ T352] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 42.482903][ T352] RBP: 00007f6b56d3047a R08: 0000000000000000 R09: 0000000000000000
[ 42.490951][ T352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 42.499049][ T352] R13: 000000000000000b R14: 00007f6b56e03f80 R15: 00007ffd774f5078
[ 42.507293][ T352]
[ 42.512784][ T352] ================================================================================
[ 42.522044][ T352] ================================================================================
[ 42.531266][ T352] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7990:63
[ 42.539053][ T352] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 42.547830][ T352] CPU: 0 PID: 352 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller-1069101-gad06eaf051cd #0
[ 42.558343][ T352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
[ 42.568850][ T352] Call Trace:
[ 42.572206][ T352]
[ 42.575601][ T352] dump_stack_lvl+0x151/0x1b7
[ 42.580441][ T352] ? io_uring_drop_tctx_refs+0x190/0x190
[ 42.586477][ T352] ? stack_trace_snprint+0xf0/0xf0
[ 42.591524][ T352] dump_stack+0x15/0x17
[ 42.595935][ T352] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 42.602190][ T352] scalar32_min_max_arsh+0x676/0x6c0
[ 42.607391][ T352] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 42.613140][ T352] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 42.618857][ T352] ? reg_bounds_sync+0xf90/0xf90
[ 42.623618][ T352] ? check_stack_access_within_bounds+0x5a0/0x5a0
[ 42.629867][ T352] ? check_reg_arg+0x42a/0x820
[ 42.634493][ T352] do_check+0x94d9/0xf2c0
[ 42.638900][ T352] ? mark_reg_unknown+0x600/0x600
[ 42.643760][ T352] ? mark_reg_not_init+0x93/0x670
[ 42.648612][ T352] ? memcpy+0x56/0x70
[ 42.652613][ T352] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 42.658456][ T352] do_check_common+0x909/0x1290
[ 42.663106][ T352] bpf_check+0x37bf/0x12b20
[ 42.667451][ T352] ? is_bpf_text_address+0x172/0x190
[ 42.672574][ T352] ? stack_trace_save+0x1c0/0x1c0
[ 42.677796][ T352] ? __kernel_text_address+0x9b/0x110
[ 42.683613][ T352] ? unwind_get_return_address+0x4d/0x90
[ 42.689066][ T352] ? bpf_get_btf_vmlinux+0x20/0x20
[ 42.694532][ T352] ? __kasan_check_write+0x14/0x20
[ 42.700036][ T352] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 42.705548][ T352] ? _raw_spin_lock+0x1b0/0x1b0
[ 42.710365][ T352] ? stack_trace_save+0x113/0x1c0
[ 42.715363][ T352] ? _raw_spin_unlock+0x4d/0x70
[ 42.720163][ T352] ? stack_trace_snprint+0xf0/0xf0
[ 42.725222][ T352] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 42.730961][ T352] ? __stack_depot_save+0x40d/0x470
[ 42.737058][ T352] ? ____kasan_kmalloc+0xed/0x110
[ 42.741997][ T352] ? ____kasan_kmalloc+0xdb/0x110
[ 42.746852][ T352] ? __kasan_kmalloc+0x9/0x10
[ 42.751539][ T352] ? kmem_cache_alloc_trace+0x115/0x210
[ 42.757004][ T352] ? selinux_bpf_prog_alloc+0x51/0x140
[ 42.762397][ T352] ? security_bpf_prog_alloc+0x62/0x90
[ 42.767699][ T352] ? bpf_prog_load+0x9ee/0x1b50
[ 42.772465][ T352] ? __sys_bpf+0x4bc/0x760
[ 42.776806][ T352] ? __x64_sys_bpf+0x7c/0x90
[ 42.781334][ T352] ? do_syscall_64+0x3d/0xb0
[ 42.785744][ T352] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 42.791831][ T352] ? __kasan_kmalloc+0x9/0x10
[ 42.796342][ T352] ? memset+0x35/0x40
[ 42.800239][ T352] ? bpf_obj_name_cpy+0x196/0x1e0
[ 42.805098][ T352] bpf_prog_load+0x12ac/0x1b50
[ 42.809804][ T352] ? map_freeze+0x370/0x370
[ 42.814171][ T352] ? selinux_bpf+0xcb/0x100
[ 42.818476][ T352] ? security_bpf+0x82/0xb0
[ 42.823107][ T352] __sys_bpf+0x4bc/0x760
[ 42.827192][ T352] ? _copy_from_user+0x96/0xd0
[ 42.832057][ T352] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 42.837259][ T352] ? __se_sys_rt_sigprocmask+0x30a/0x380
[ 42.842895][ T352] ? debug_smp_processor_id+0x17/0x20
[ 42.848114][ T352] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 42.857335][ T352] __x64_sys_bpf+0x7c/0x90
[ 42.861645][ T352] do_syscall_64+0x3d/0xb0
[ 42.865907][ T352] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 42.871720][ T352] RIP: 0033:0x7f6b56ce4ba9
[ 42.876142][ T352] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 42.895780][ T352] RSP: 002b:00007f6b568670c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 42.904125][ T352] RAX: ffffffffffffffda RBX: 00007f6b56e03f80 RCX: 00007f6b56ce4ba9
[ 42.912211][ T352] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 42.920018][ T352] RBP: 00007f6b56d3047a R08: 0000000000000000 R09: 0000000000000000
[ 42.928004][ T352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 42.935818][ T352] R13: 000000000000000b R14: 00007f6b56e03f80 R15: 00007ffd774f5078
[ 42.943635][ T352]
[ 42.947656][ T352] ================================================================================
[ 43.007823][ T30] audit: type=1400 audit(1713913937.875:166): avc: denied { prog_run } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
2024/04/23 23:12:21 executed programs: 83
2024/04/23 23:12:26 executed programs: 198