Warning: Permanently added '10.128.1.180' (ED25519) to the list of known hosts.
2024/03/09 02:48:41 ignoring optional flag "sandboxArg"="0"
2024/03/09 02:48:41 parsed 1 programs
[ 47.003609][ T29] kauditd_printk_skb: 78 callbacks suppressed
[ 47.003623][ T29] audit: type=1400 audit(1709952521.155:154): avc: denied { mounton } for pid=344 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 47.034418][ T29] audit: type=1400 audit(1709952521.155:155): avc: denied { mount } for pid=344 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 47.057633][ T29] audit: type=1400 audit(1709952521.155:156): avc: denied { setattr } for pid=344 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 47.081032][ T29] audit: type=1400 audit(1709952521.155:157): avc: denied { read write } for pid=344 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 47.107994][ T29] audit: type=1400 audit(1709952521.155:158): avc: denied { open } for pid=344 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
2024/03/09 02:48:41 executed programs: 0
[ 47.134944][ T29] audit: type=1400 audit(1709952521.285:159): avc: denied { unlink } for pid=344 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 47.160979][ T29] audit: type=1400 audit(1709952521.285:160): avc: denied { relabelto } for pid=345 comm="mkswap" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 47.186707][ T344] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 47.206938][ T350] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.213890][ T350] bridge0: port 1(bridge_slave_0) entered disabled state
[ 47.221016][ T350] device bridge_slave_0 entered promiscuous mode
[ 47.227615][ T350] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.234530][ T350] bridge0: port 2(bridge_slave_1) entered disabled state
[ 47.241502][ T350] device bridge_slave_1 entered promiscuous mode
[ 47.253811][ T350] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.261001][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 47.268144][ T350] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.275090][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 47.284364][ T37] bridge0: port 1(bridge_slave_0) entered disabled state
[ 47.291398][ T37] bridge0: port 2(bridge_slave_1) entered disabled state
[ 47.298374][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 47.305520][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 47.313274][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 47.321212][ T57] bridge0: port 1(bridge_slave_0) entered blocking state
[ 47.328121][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 47.337225][ T350] device veth0_vlan entered promiscuous mode
[ 47.343520][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 47.351765][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 47.359383][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 47.366414][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 47.373447][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 47.381454][ T37] bridge0: port 2(bridge_slave_1) entered blocking state
[ 47.388210][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 47.395604][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 47.403157][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 47.411587][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 47.419510][ T350] device veth1_macvtap entered promiscuous mode
[ 47.426197][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 47.435136][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 47.448179][ T29] audit: type=1400 audit(1709952521.595:161): avc: denied { prog_load } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 47.448674][ T357] ================================================================================
[ 47.467207][ T29] audit: type=1400 audit(1709952521.595:162): avc: denied { bpf } for pid=355 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 47.467213][ T29] audit: type=1400 audit(1709952521.595:163): avc: denied { perfmon } for pid=355 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 47.517933][ T357] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7989:63
[ 47.525353][ T357] shift exponent 1073741824 is too large for 32-bit type 'int'
[ 47.533203][ T357] CPU: 0 PID: 357 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller #0
[ 47.541408][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 47.551591][ T357] Call Trace:
[ 47.554722][ T357]
[ 47.557584][ T357] dump_stack_lvl+0x38/0x49
[ 47.561920][ T357] dump_stack+0x10/0x12
[ 47.565922][ T357] ubsan_epilogue+0x9/0x32
[ 47.570166][ T357] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108
[ 47.576780][ T357] ? reg_bounds_sync+0x157/0x240
[ 47.581542][ T357] adjust_reg_min_max_vals.cold+0x109/0x150
[ 47.587771][ T357] check_alu_op+0x246/0x780
[ 47.592367][ T357] do_check_common+0x1182/0x4410
[ 47.597438][ T357] ? kfree+0xec/0x2b0
[ 47.601470][ T357] bpf_check+0x2250/0x3520
[ 47.605810][ T357] ? kmem_cache_alloc_trace+0x2f0/0x460
[ 47.611287][ T357] bpf_prog_load+0x483/0x9e0
[ 47.615784][ T357] __sys_bpf+0x706/0x2550
[ 47.619953][ T357] __x64_sys_bpf+0x17/0x20
[ 47.624501][ T357] do_syscall_64+0x35/0xb0
[ 47.628834][ T357] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 47.634871][ T357] RIP: 0033:0x7fd4d0f8fba9
[ 47.639131][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 47.659012][ T357] RSP: 002b:00007fd4d0b120c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 47.667262][ T357] RAX: ffffffffffffffda RBX: 00007fd4d10aef80 RCX: 00007fd4d0f8fba9
[ 47.675169][ T357] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 47.683241][ T357] RBP: 00007fd4d0fdb47a R08: 0000000000000000 R09: 0000000000000000
[ 47.691930][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 47.699860][ T357] R13: 000000000000000b R14: 00007fd4d10aef80 R15: 00007ffd7be29e78
[ 47.707949][ T357]
[ 47.711094][ T357] ================================================================================
[ 47.720346][ T357] ================================================================================
[ 47.729539][ T357] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7990:63
[ 47.736860][ T357] shift exponent 1073741824 is too large for 32-bit type 'int'
[ 47.744221][ T357] CPU: 0 PID: 357 Comm: syz-executor.0 Not tainted 5.15.148-syzkaller #0
[ 47.752426][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 47.762329][ T357] Call Trace:
[ 47.765444][ T357]
[ 47.768216][ T357] dump_stack_lvl+0x38/0x49
[ 47.772557][ T357] dump_stack+0x10/0x12
[ 47.776645][ T357] ubsan_epilogue+0x9/0x32
[ 47.781184][ T357] __ubsan_handle_shift_out_of_bounds.cold+0x6a/0x108
[ 47.787746][ T357] ? reg_bounds_sync+0x157/0x240
[ 47.792517][ T357] adjust_reg_min_max_vals.cold+0x125/0x150
[ 47.798294][ T357] check_alu_op+0x246/0x780
[ 47.802591][ T357] do_check_common+0x1182/0x4410
[ 47.807631][ T357] ? kfree+0xec/0x2b0
[ 47.811443][ T357] bpf_check+0x2250/0x3520
[ 47.815696][ T357] ? kmem_cache_alloc_trace+0x2f0/0x460
[ 47.821075][ T357] bpf_prog_load+0x483/0x9e0
[ 47.825506][ T357] __sys_bpf+0x706/0x2550
[ 47.829757][ T357] __x64_sys_bpf+0x17/0x20
[ 47.834018][ T357] do_syscall_64+0x35/0xb0
[ 47.838262][ T357] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 47.844075][ T357] RIP: 0033:0x7fd4d0f8fba9
[ 47.849560][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 47.869081][ T357] RSP: 002b:00007fd4d0b120c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 47.877595][ T357] RAX: ffffffffffffffda RBX: 00007fd4d10aef80 RCX: 00007fd4d0f8fba9
[ 47.885591][ T357] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 47.893488][ T357] RBP: 00007fd4d0fdb47a R08: 0000000000000000 R09: 0000000000000000
[ 47.901296][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 47.909102][ T357] R13: 000000000000000b R14: 00007fd4d10aef80 R15: 00007ffd7be29e78
[ 47.917007][ T357]
[ 47.920664][ T357] ================================================================================
2024/03/09 02:48:46 executed programs: 781
2024/03/09 02:48:51 executed programs: 1705