Warning: Permanently added '10.128.0.31' (ED25519) to the list of known hosts. 2024/07/03 05:30:10 ignoring optional flag "sandboxArg"="0" 2024/07/03 05:30:10 parsed 1 programs [ 50.582800][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 50.582815][ T30] audit: type=1400 audit(1719984610.341:95): avc: denied { unlink } for pid=352 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/07/03 05:30:10 executed programs: 0 [ 50.654203][ T352] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 50.715457][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.722390][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.729570][ T358] device bridge_slave_0 entered promiscuous mode [ 50.736405][ T358] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.743295][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.750568][ T358] device bridge_slave_1 entered promiscuous mode [ 50.797901][ T358] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.804760][ T358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.811829][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.818662][ T358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.838139][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.845680][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.853223][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.860729][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.869755][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.877937][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.884885][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.903091][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.911260][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.919935][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.926804][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.934028][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.942451][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.953978][ T358] device veth0_vlan entered promiscuous mode [ 50.962451][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.970326][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.977878][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.987873][ T358] device veth1_macvtap entered promiscuous mode [ 50.994679][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.005604][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.015219][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.036014][ T30] audit: type=1400 audit(1719984610.791:96): avc: denied { prog_load } for pid=362 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 51.059659][ T363] ================================================================================ [ 51.061104][ T30] audit: type=1400 audit(1719984610.791:97): avc: denied { bpf } for pid=362 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 51.069893][ T363] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7990:63 [ 51.089629][ T30] audit: type=1400 audit(1719984610.791:98): avc: denied { perfmon } for pid=362 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 51.117796][ T363] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 51.126383][ T363] CPU: 1 PID: 363 Comm: syz-executor.0 Not tainted 5.15.150-syzkaller-1069439-g9044d25b8ff5 #0 [ 51.136617][ T363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 51.146516][ T363] Call Trace: [ 51.150062][ T363] [ 51.152845][ T363] dump_stack_lvl+0x151/0x1b7 [ 51.157496][ T363] ? io_uring_drop_tctx_refs+0x190/0x190 [ 51.162943][ T363] ? stack_trace_snprint+0xf0/0xf0 [ 51.167892][ T363] dump_stack+0x15/0x17 [ 51.171890][ T363] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 51.178138][ T363] scalar32_min_max_arsh+0x622/0x6c0 [ 51.183254][ T363] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 51.188816][ T363] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 51.194285][ T363] ? reg_bounds_sync+0xf90/0xf90 [ 51.199051][ T363] ? check_stack_access_within_bounds+0x5a0/0x5a0 [ 51.205599][ T363] ? check_reg_arg+0x42a/0x820 [ 51.210199][ T363] do_check+0x94d9/0xf2c0 [ 51.214371][ T363] ? mark_reg_unknown+0x600/0x600 [ 51.219218][ T363] ? mark_reg_not_init+0x93/0x670 [ 51.224077][ T363] ? memcpy+0x56/0x70 [ 51.227898][ T363] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 51.233706][ T363] do_check_common+0x909/0x1290 [ 51.238398][ T363] bpf_check+0x37bf/0x12b20 [ 51.242743][ T363] ? is_bpf_text_address+0x172/0x190 [ 51.247851][ T363] ? stack_trace_save+0x1c0/0x1c0 [ 51.252708][ T363] ? __kernel_text_address+0x9b/0x110 [ 51.257919][ T363] ? unwind_get_return_address+0x4d/0x90 [ 51.263559][ T363] ? bpf_get_btf_vmlinux+0x20/0x20 [ 51.268532][ T363] ? __kasan_check_write+0x14/0x20 [ 51.273546][ T363] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 51.278836][ T363] ? _raw_spin_lock+0x1b0/0x1b0 [ 51.283518][ T363] ? stack_trace_save+0x113/0x1c0 [ 51.288379][ T363] ? stack_trace_snprint+0xf0/0xf0 [ 51.293357][ T363] ? stack_trace_snprint+0xf0/0xf0 [ 51.298274][ T363] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 51.303956][ T363] ? __stack_depot_save+0x40d/0x470 [ 51.308951][ T363] ? ____kasan_kmalloc+0xed/0x110 [ 51.313810][ T363] ? ____kasan_kmalloc+0xdb/0x110 [ 51.318759][ T363] ? __kasan_kmalloc+0x9/0x10 [ 51.323285][ T363] ? kmem_cache_alloc_trace+0x115/0x210 [ 51.328750][ T363] ? selinux_bpf_prog_alloc+0x51/0x140 [ 51.334229][ T363] ? security_bpf_prog_alloc+0x62/0x90 [ 51.339533][ T363] ? bpf_prog_load+0x9ee/0x1b50 [ 51.344215][ T363] ? __sys_bpf+0x4bc/0x760 [ 51.348464][ T363] ? __x64_sys_bpf+0x7c/0x90 [ 51.352889][ T363] ? do_syscall_64+0x3d/0xb0 [ 51.357442][ T363] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.363311][ T363] ? __kasan_kmalloc+0x9/0x10 [ 51.367822][ T363] ? memset+0x35/0x40 [ 51.371636][ T363] ? bpf_obj_name_cpy+0x196/0x1e0 [ 51.376502][ T363] bpf_prog_load+0x12ac/0x1b50 [ 51.381101][ T363] ? map_freeze+0x370/0x370 [ 51.385527][ T363] ? selinux_bpf+0xcb/0x100 [ 51.389864][ T363] ? security_bpf+0x82/0xb0 [ 51.394203][ T363] __sys_bpf+0x4bc/0x760 [ 51.398379][ T363] ? _copy_from_user+0x96/0xd0 [ 51.402969][ T363] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 51.408186][ T363] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 51.413742][ T363] ? debug_smp_processor_id+0x17/0x20 [ 51.418939][ T363] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 51.424841][ T363] __x64_sys_bpf+0x7c/0x90 [ 51.429094][ T363] do_syscall_64+0x3d/0xb0 [ 51.433361][ T363] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.439086][ T363] RIP: 0033:0x7f39bfd0aba9 [ 51.443421][ T363] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 51.463114][ T363] RSP: 002b:00007f39bf88d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.471387][ T363] RAX: ffffffffffffffda RBX: 00007f39bfe29f80 RCX: 00007f39bfd0aba9 [ 51.479175][ T363] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 51.487079][ T363] RBP: 00007f39bfd5647a R08: 0000000000000000 R09: 0000000000000000 [ 51.494881][ T363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 51.502695][ T363] R13: 000000000000000b R14: 00007f39bfe29f80 R15: 00007ffffd2b33b8 [ 51.510706][ T363] [ 51.515265][ T30] audit: type=1400 audit(1719984611.271:99): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 51.518785][ T363] ================================================================================ [ 51.546429][ T363] ================================================================================ [ 51.555861][ T363] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7991:63 [ 51.563355][ T363] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 51.571756][ T363] CPU: 0 PID: 363 Comm: syz-executor.0 Not tainted 5.15.150-syzkaller-1069439-g9044d25b8ff5 #0 [ 51.581905][ T363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 51.591894][ T363] Call Trace: [ 51.595010][ T363] [ 51.597793][ T363] dump_stack_lvl+0x151/0x1b7 [ 51.602307][ T363] ? io_uring_drop_tctx_refs+0x190/0x190 [ 51.607786][ T363] ? stack_trace_snprint+0xf0/0xf0 [ 51.612714][ T363] dump_stack+0x15/0x17 [ 51.616794][ T363] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 51.623186][ T363] scalar32_min_max_arsh+0x676/0x6c0 [ 51.628298][ T363] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 51.633855][ T363] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 51.639323][ T363] ? reg_bounds_sync+0xf90/0xf90 [ 51.644181][ T363] ? check_stack_access_within_bounds+0x5a0/0x5a0 [ 51.650429][ T363] ? check_reg_arg+0x42a/0x820 [ 51.655031][ T363] do_check+0x94d9/0xf2c0 [ 51.659219][ T363] ? mark_reg_unknown+0x600/0x600 [ 51.664065][ T363] ? mark_reg_not_init+0x93/0x670 [ 51.668920][ T363] ? memcpy+0x56/0x70 [ 51.672737][ T363] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 51.678554][ T363] do_check_common+0x909/0x1290 [ 51.683239][ T363] bpf_check+0x37bf/0x12b20 [ 51.687582][ T363] ? is_bpf_text_address+0x172/0x190 [ 51.692695][ T363] ? stack_trace_save+0x1c0/0x1c0 [ 51.697557][ T363] ? __kernel_text_address+0x9b/0x110 [ 51.702779][ T363] ? unwind_get_return_address+0x4d/0x90 [ 51.708233][ T363] ? bpf_get_btf_vmlinux+0x20/0x20 [ 51.713182][ T363] ? __kasan_check_write+0x14/0x20 [ 51.718159][ T363] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 51.723431][ T363] ? _raw_spin_lock+0x1b0/0x1b0 [ 51.728109][ T363] ? stack_trace_save+0x113/0x1c0 [ 51.732968][ T363] ? stack_trace_snprint+0xf0/0xf0 [ 51.737917][ T363] ? stack_trace_snprint+0xf0/0xf0 [ 51.742868][ T363] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 51.748509][ T363] ? __stack_depot_save+0x40d/0x470 [ 51.753633][ T363] ? ____kasan_kmalloc+0xed/0x110 [ 51.758486][ T363] ? ____kasan_kmalloc+0xdb/0x110 [ 51.763346][ T363] ? __kasan_kmalloc+0x9/0x10 [ 51.767866][ T363] ? kmem_cache_alloc_trace+0x115/0x210 [ 51.773336][ T363] ? selinux_bpf_prog_alloc+0x51/0x140 [ 51.778792][ T363] ? security_bpf_prog_alloc+0x62/0x90 [ 51.784103][ T363] ? bpf_prog_load+0x9ee/0x1b50 [ 51.788779][ T363] ? __sys_bpf+0x4bc/0x760 [ 51.793039][ T363] ? __x64_sys_bpf+0x7c/0x90 [ 51.797453][ T363] ? do_syscall_64+0x3d/0xb0 [ 51.801882][ T363] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.807791][ T363] ? __kasan_kmalloc+0x9/0x10 [ 51.812295][ T363] ? memset+0x35/0x40 [ 51.816117][ T363] ? bpf_obj_name_cpy+0x196/0x1e0 [ 51.820973][ T363] bpf_prog_load+0x12ac/0x1b50 [ 51.825693][ T363] ? map_freeze+0x370/0x370 [ 51.830006][ T363] ? selinux_bpf+0xcb/0x100 [ 51.834338][ T363] ? security_bpf+0x82/0xb0 [ 51.838684][ T363] __sys_bpf+0x4bc/0x760 [ 51.842773][ T363] ? _copy_from_user+0x96/0xd0 [ 51.847370][ T363] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 51.852575][ T363] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 51.858125][ T363] ? debug_smp_processor_id+0x17/0x20 [ 51.863338][ T363] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 51.869401][ T363] __x64_sys_bpf+0x7c/0x90 [ 51.873656][ T363] do_syscall_64+0x3d/0xb0 [ 51.877910][ T363] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.883637][ T363] RIP: 0033:0x7f39bfd0aba9 [ 51.887898][ T363] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 51.907331][ T363] RSP: 002b:00007f39bf88d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 51.915579][ T363] RAX: ffffffffffffffda RBX: 00007f39bfe29f80 RCX: 00007f39bfd0aba9 [ 51.923599][ T363] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 51.931753][ T363] RBP: 00007f39bfd5647a R08: 0000000000000000 R09: 0000000000000000 [ 51.939759][ T363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 51.947849][ T363] R13: 000000000000000b R14: 00007f39bfe29f80 R15: 00007ffffd2b33b8 [ 51.955663][ T363] [ 51.960979][ T363] ================================================================================ [ 52.018496][ T30] audit: type=1400 audit(1719984611.771:100): avc: denied { prog_run } for pid=366 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2024/07/03 05:30:15 executed programs: 87 2024/07/03 05:30:20 executed programs: 205