Warning: Permanently added '10.128.0.114' (ED25519) to the list of known hosts.
2025/05/22 10:29:31 ignoring optional flag "sandboxArg"="0"
2025/05/22 10:29:31 ignoring optional flag "type"="gce"
2025/05/22 10:29:31 parsed 1 programs
[ 45.498000][ T30] kauditd_printk_skb: 18 callbacks suppressed
[ 45.498017][ T30] audit: type=1400 audit(1747909771.778:92): avc: denied { unlink } for pid=321 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
2025/05/22 10:29:31 executed programs: 0
[ 45.545296][ T321] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 45.617948][ T327] bridge0: port 1(bridge_slave_0) entered blocking state
[ 45.625106][ T327] bridge0: port 1(bridge_slave_0) entered disabled state
[ 45.632712][ T327] device bridge_slave_0 entered promiscuous mode
[ 45.640559][ T327] bridge0: port 2(bridge_slave_1) entered blocking state
[ 45.647885][ T327] bridge0: port 2(bridge_slave_1) entered disabled state
[ 45.655860][ T327] device bridge_slave_1 entered promiscuous mode
[ 45.702662][ T327] bridge0: port 2(bridge_slave_1) entered blocking state
[ 45.709923][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 45.717552][ T327] bridge0: port 1(bridge_slave_0) entered blocking state
[ 45.725363][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 45.743866][ T300] bridge0: port 1(bridge_slave_0) entered disabled state
[ 45.751527][ T300] bridge0: port 2(bridge_slave_1) entered disabled state
[ 45.760378][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 45.768115][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 45.777150][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 45.785733][ T300] bridge0: port 1(bridge_slave_0) entered blocking state
[ 45.793075][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 45.802635][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 45.811005][ T300] bridge0: port 2(bridge_slave_1) entered blocking state
[ 45.818628][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 45.830766][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 45.840509][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 45.854803][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 45.866644][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 45.874900][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 45.882658][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 45.891177][ T327] device veth0_vlan entered promiscuous mode
[ 45.901375][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 45.910906][ T327] device veth1_macvtap entered promiscuous mode
[ 45.921172][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 45.931425][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 45.952241][ T30] audit: type=1400 audit(1747909772.228:93): avc: denied { prog_load } for pid=331 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 45.973964][ T30] audit: type=1400 audit(1747909772.228:94): avc: denied { bpf } for pid=331 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 45.996524][ T30] audit: type=1400 audit(1747909772.228:95): avc: denied { perfmon } for pid=331 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 46.192275][ T332] ================================================================================
[ 46.201902][ T332] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8028:63
[ 46.209617][ T332] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 46.218476][ T332] CPU: 1 PID: 332 Comm: syz-executor.0 Not tainted 5.15.183-syzkaller-1080537-g56993594bfa4 #0
[ 46.228999][ T332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 46.239116][ T332] Call Trace:
[ 46.242389][ T332]
[ 46.245311][ T332] __dump_stack+0x21/0x30
[ 46.249639][ T332] dump_stack_lvl+0xee/0x150
[ 46.254356][ T332] ? show_regs_print_info+0x20/0x20
[ 46.259810][ T332] ? stack_trace_save+0x98/0xe0
[ 46.264662][ T332] dump_stack+0x15/0x20
[ 46.268906][ T332] ubsan_epilogue+0xe/0x40
[ 46.273400][ T332] __ubsan_handle_shift_out_of_bounds+0x37c/0x400
[ 46.280424][ T332] ? reg_bounds_sync+0x829/0x1050
[ 46.285601][ T332] scalar32_min_max_arsh+0x38d/0x660
[ 46.290899][ T332] adjust_reg_min_max_vals+0x4112/0x6380
[ 46.296561][ T332] ? reg_bounds_sync+0x1050/0x1050
[ 46.301684][ T332] do_check+0x8af8/0xea60
[ 46.306023][ T332] ? mark_reg_unknown+0x5c0/0x5c0
[ 46.311316][ T332] ? btf_check_subprog_arg_match+0x15d/0x2c0
[ 46.317383][ T332] do_check_common+0xff5/0x19a0
[ 46.322319][ T332] bpf_check+0x32c6/0xf330
[ 46.326931][ T332] ? is_bpf_text_address+0x177/0x190
[ 46.332396][ T332] ? bpf_get_btf_vmlinux+0x60/0x60
[ 46.337503][ T332] ? unwind_get_return_address+0x4d/0x90
[ 46.343474][ T332] ? __kasan_check_write+0x14/0x20
[ 46.348910][ T332] ? _raw_spin_lock_irqsave+0xb0/0x110
[ 46.354390][ T332] ? _raw_spin_lock+0xe0/0xe0
[ 46.359169][ T332] ? stack_trace_save+0x98/0xe0
[ 46.364285][ T332] ? _raw_spin_unlock_irqrestore+0x5b/0x80
[ 46.370392][ T332] ? __stack_depot_save+0x442/0x480
[ 46.375886][ T332] ? __kasan_kmalloc+0xec/0x110
[ 46.380842][ T332] ? __kasan_kmalloc+0xda/0x110
[ 46.385885][ T332] ? kmem_cache_alloc_trace+0x119/0x270
[ 46.391517][ T332] ? selinux_bpf_prog_alloc+0x51/0x140
[ 46.397168][ T332] ? security_bpf_prog_alloc+0x62/0x90
[ 46.402826][ T332] ? bpf_prog_load+0x97c/0x1550
[ 46.407964][ T332] ? __sys_bpf+0x4c3/0x730
[ 46.412534][ T332] ? __x64_sys_bpf+0x7c/0x90
[ 46.417118][ T332] ? x64_sys_call+0x4b9/0x9a0
[ 46.421825][ T332] ? do_syscall_64+0x4c/0xa0
[ 46.426422][ T332] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 46.432530][ T332] ? check_stack_object+0x81/0x140
[ 46.437896][ T332] ? memset+0x35/0x40
[ 46.441895][ T332] ? bpf_obj_name_cpy+0x193/0x1e0
[ 46.447135][ T332] bpf_prog_load+0x1042/0x1550
[ 46.452177][ T332] ? map_freeze+0x360/0x360
[ 46.456803][ T332] ? __sys_bpf+0x4b1/0x730
[ 46.461492][ T332] __sys_bpf+0x4c3/0x730
[ 46.465957][ T332] ? bpf_link_show_fdinfo+0x310/0x310
[ 46.471815][ T332] ? __se_sys_rt_sigprocmask+0x225/0x290
[ 46.477638][ T332] ? debug_smp_processor_id+0x17/0x20
[ 46.483270][ T332] __x64_sys_bpf+0x7c/0x90
[ 46.487947][ T332] x64_sys_call+0x4b9/0x9a0
[ 46.492707][ T332] do_syscall_64+0x4c/0xa0
[ 46.497735][ T332] ? clear_bhb_loop+0x35/0x90
[ 46.502589][ T332] ? clear_bhb_loop+0x35/0x90
[ 46.507266][ T332] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 46.513247][ T332] RIP: 0033:0x7f87970a9ba9
[ 46.517846][ T332] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 46.538166][ T332] RSP: 002b:00007f8796c2c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 46.546593][ T332] RAX: ffffffffffffffda RBX: 00007f87971c8f80 RCX: 00007f87970a9ba9
[ 46.554898][ T332] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 46.563340][ T332] RBP: 00007f87970f547a R08: 0000000000000000 R09: 0000000000000000
[ 46.571621][ T332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 46.579676][ T332] R13: 000000000000000b R14: 00007f87971c8f80 R15: 00007ffc3f15e968
[ 46.587785][ T332]
[ 46.592284][ T332] ================================================================================
[ 46.601720][ T332] ================================================================================
[ 46.611390][ T332] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8029:63
[ 46.618993][ T332] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 46.627897][ T332] CPU: 0 PID: 332 Comm: syz-executor.0 Not tainted 5.15.183-syzkaller-1080537-g56993594bfa4 #0
[ 46.638316][ T332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 46.648578][ T332] Call Trace:
[ 46.651943][ T332]
[ 46.654953][ T332] __dump_stack+0x21/0x30
[ 46.659364][ T332] dump_stack_lvl+0xee/0x150
[ 46.664052][ T332] ? show_regs_print_info+0x20/0x20
[ 46.669274][ T332] ? stack_trace_save+0x98/0xe0
[ 46.674308][ T332] dump_stack+0x15/0x20
[ 46.678731][ T332] ubsan_epilogue+0xe/0x40
[ 46.683242][ T332] __ubsan_handle_shift_out_of_bounds+0x37c/0x400
[ 46.689835][ T332] scalar32_min_max_arsh+0x3e3/0x660
[ 46.695123][ T332] adjust_reg_min_max_vals+0x4112/0x6380
[ 46.700850][ T332] ? reg_bounds_sync+0x1050/0x1050
[ 46.705978][ T332] do_check+0x8af8/0xea60
[ 46.710488][ T332] ? mark_reg_unknown+0x5c0/0x5c0
[ 46.715687][ T332] ? btf_check_subprog_arg_match+0x15d/0x2c0
[ 46.721841][ T332] do_check_common+0xff5/0x19a0
[ 46.726690][ T332] bpf_check+0x32c6/0xf330
[ 46.731131][ T332] ? is_bpf_text_address+0x177/0x190
[ 46.736499][ T332] ? bpf_get_btf_vmlinux+0x60/0x60
[ 46.741711][ T332] ? unwind_get_return_address+0x4d/0x90
[ 46.747444][ T332] ? __kasan_check_write+0x14/0x20
[ 46.752692][ T332] ? _raw_spin_lock_irqsave+0xb0/0x110
[ 46.758270][ T332] ? _raw_spin_lock+0xe0/0xe0
[ 46.763040][ T332] ? stack_trace_save+0x98/0xe0
[ 46.767896][ T332] ? _raw_spin_unlock_irqrestore+0x5b/0x80
[ 46.773718][ T332] ? __stack_depot_save+0x442/0x480
[ 46.778928][ T332] ? __kasan_kmalloc+0xec/0x110
[ 46.783959][ T332] ? __kasan_kmalloc+0xda/0x110
[ 46.789164][ T332] ? kmem_cache_alloc_trace+0x119/0x270
[ 46.794919][ T332] ? selinux_bpf_prog_alloc+0x51/0x140
[ 46.800567][ T332] ? security_bpf_prog_alloc+0x62/0x90
[ 46.806216][ T332] ? bpf_prog_load+0x97c/0x1550
[ 46.811240][ T332] ? __sys_bpf+0x4c3/0x730
[ 46.815746][ T332] ? __x64_sys_bpf+0x7c/0x90
[ 46.820540][ T332] ? x64_sys_call+0x4b9/0x9a0
[ 46.825669][ T332] ? do_syscall_64+0x4c/0xa0
[ 46.830533][ T332] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 46.836718][ T332] ? check_stack_object+0x81/0x140
[ 46.841955][ T332] ? memset+0x35/0x40
[ 46.846119][ T332] ? bpf_obj_name_cpy+0x193/0x1e0
[ 46.851803][ T332] bpf_prog_load+0x1042/0x1550
[ 46.856855][ T332] ? map_freeze+0x360/0x360
[ 46.861452][ T332] ? __sys_bpf+0x4b1/0x730
[ 46.865888][ T332] __sys_bpf+0x4c3/0x730
[ 46.870130][ T332] ? bpf_link_show_fdinfo+0x310/0x310
[ 46.875584][ T332] ? __se_sys_rt_sigprocmask+0x225/0x290
[ 46.881609][ T332] ? debug_smp_processor_id+0x17/0x20
[ 46.887390][ T332] __x64_sys_bpf+0x7c/0x90
[ 46.891919][ T332] x64_sys_call+0x4b9/0x9a0
[ 46.896512][ T332] do_syscall_64+0x4c/0xa0
[ 46.901189][ T332] ? clear_bhb_loop+0x35/0x90
[ 46.906059][ T332] ? clear_bhb_loop+0x35/0x90
[ 46.911219][ T332] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 46.917302][ T332] RIP: 0033:0x7f87970a9ba9
[ 46.922009][ T332] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 46.941983][ T332] RSP: 002b:00007f8796c2c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 46.950636][ T332] RAX: ffffffffffffffda RBX: 00007f87971c8f80 RCX: 00007f87970a9ba9
[ 46.959046][ T332] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 46.967475][ T332] RBP: 00007f87970f547a R08: 0000000000000000 R09: 0000000000000000
[ 46.975727][ T332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 46.984196][ T332] R13: 000000000000000b R14: 00007f87971c8f80 R15: 00007ffc3f15e968
[ 46.992364][ T332]
[ 46.996764][ T332] ================================================================================
[ 47.051162][ T30] audit: type=1400 audit(1747909773.328:96): avc: denied { prog_run } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
2025/05/22 10:29:36 executed programs: 83
2025/05/22 10:29:41 executed programs: 201