Warning: Permanently added '10.128.1.125' (ED25519) to the list of known hosts.
2024/08/04 12:27:07 ignoring optional flag "sandboxArg"="0"
2024/08/04 12:27:07 parsed 1 programs
[ 41.772111][ T30] kauditd_printk_skb: 19 callbacks suppressed
[ 41.772126][ T30] audit: type=1400 audit(1722774427.410:95): avc: denied { unlink } for pid=343 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
2024/08/04 12:27:07 executed programs: 0
[ 41.819945][ T343] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 41.874635][ T349] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.881674][ T349] bridge0: port 1(bridge_slave_0) entered disabled state
[ 41.888753][ T349] device bridge_slave_0 entered promiscuous mode
[ 41.895615][ T349] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.902547][ T349] bridge0: port 2(bridge_slave_1) entered disabled state
[ 41.910156][ T349] device bridge_slave_1 entered promiscuous mode
[ 41.958086][ T349] bridge0: port 2(bridge_slave_1) entered blocking state
[ 41.964972][ T349] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 41.972297][ T349] bridge0: port 1(bridge_slave_0) entered blocking state
[ 41.979138][ T349] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 41.998102][ T6] bridge0: port 1(bridge_slave_0) entered disabled state
[ 42.005238][ T6] bridge0: port 2(bridge_slave_1) entered disabled state
[ 42.012603][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 42.019840][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 42.029250][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 42.037353][ T294] bridge0: port 1(bridge_slave_0) entered blocking state
[ 42.044349][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 42.062706][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 42.070902][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 42.079546][ T294] bridge0: port 2(bridge_slave_1) entered blocking state
[ 42.086546][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 42.094229][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 42.102613][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 42.114270][ T349] device veth0_vlan entered promiscuous mode
[ 42.121758][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 42.129829][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 42.137619][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 42.148226][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 42.157411][ T349] device veth1_macvtap entered promiscuous mode
[ 42.166870][ T294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 42.176985][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 42.198360][ T30] audit: type=1400 audit(1722774427.830:96): avc: denied { prog_load } for pid=353 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 42.222090][ T30] audit: type=1400 audit(1722774427.830:97): avc: denied { bpf } for pid=353 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 42.223945][ T355] ================================================================================
[ 42.243560][ T30] audit: type=1400 audit(1722774427.830:98): avc: denied { perfmon } for pid=353 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 42.252221][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7990:63
[ 42.280493][ T355] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 42.289517][ T355] CPU: 1 PID: 355 Comm: syz-executor.0 Not tainted 5.15.152-syzkaller-1069667-g70e1a731d986 #0
[ 42.299956][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
[ 42.309945][ T355] Call Trace:
[ 42.313082][ T355]
[ 42.315843][ T355] dump_stack_lvl+0x151/0x1b7
[ 42.320356][ T355] ? io_uring_drop_tctx_refs+0x190/0x190
[ 42.325819][ T355] ? stack_trace_snprint+0xf0/0xf0
[ 42.330863][ T355] dump_stack+0x15/0x17
[ 42.334947][ T355] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 42.341383][ T355] scalar32_min_max_arsh+0x622/0x6c0
[ 42.346485][ T355] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 42.352159][ T355] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 42.357788][ T355] ? reg_bounds_sync+0xf90/0xf90
[ 42.362645][ T355] ? check_stack_access_within_bounds+0x5a0/0x5a0
[ 42.368956][ T355] ? check_reg_arg+0x42a/0x820
[ 42.373496][ T355] do_check+0x94d9/0xf2c0
[ 42.377668][ T355] ? mark_reg_unknown+0x600/0x600
[ 42.382527][ T355] ? mark_reg_not_init+0x93/0x670
[ 42.387494][ T355] ? memcpy+0x56/0x70
[ 42.391487][ T355] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 42.397294][ T355] do_check_common+0x909/0x1290
[ 42.401984][ T355] bpf_check+0x37bf/0x12b20
[ 42.406335][ T355] ? is_bpf_text_address+0x172/0x190
[ 42.411626][ T355] ? stack_trace_save+0x1c0/0x1c0
[ 42.416841][ T355] ? __kernel_text_address+0x9b/0x110
[ 42.422388][ T355] ? unwind_get_return_address+0x4d/0x90
[ 42.428063][ T355] ? bpf_get_btf_vmlinux+0x20/0x20
[ 42.433072][ T355] ? __kasan_check_write+0x14/0x20
[ 42.438185][ T355] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 42.444387][ T355] ? _raw_spin_lock+0x1b0/0x1b0
[ 42.449302][ T355] ? stack_trace_save+0x113/0x1c0
[ 42.454261][ T355] ? stack_trace_snprint+0xf0/0xf0
[ 42.459208][ T355] ? stack_trace_snprint+0xf0/0xf0
[ 42.464160][ T355] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 42.469796][ T355] ? __stack_depot_save+0x40d/0x470
[ 42.474832][ T355] ? ____kasan_kmalloc+0xed/0x110
[ 42.479689][ T355] ? ____kasan_kmalloc+0xdb/0x110
[ 42.484552][ T355] ? __kasan_kmalloc+0x9/0x10
[ 42.489066][ T355] ? kmem_cache_alloc_trace+0x115/0x210
[ 42.494447][ T355] ? selinux_bpf_prog_alloc+0x51/0x140
[ 42.499748][ T355] ? security_bpf_prog_alloc+0x62/0x90
[ 42.505035][ T355] ? bpf_prog_load+0x9ee/0x1b50
[ 42.509727][ T355] ? __sys_bpf+0x4bc/0x760
[ 42.513991][ T355] ? __x64_sys_bpf+0x7c/0x90
[ 42.518412][ T355] ? do_syscall_64+0x3d/0xb0
[ 42.522915][ T355] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 42.528914][ T355] ? __kasan_kmalloc+0x9/0x10
[ 42.533546][ T355] ? memset+0x35/0x40
[ 42.537361][ T355] ? bpf_obj_name_cpy+0x196/0x1e0
[ 42.542235][ T355] bpf_prog_load+0x12ac/0x1b50
[ 42.547489][ T355] ? map_freeze+0x370/0x370
[ 42.552024][ T355] ? selinux_bpf+0xcb/0x100
[ 42.556358][ T355] ? security_bpf+0x82/0xb0
[ 42.560784][ T355] __sys_bpf+0x4bc/0x760
[ 42.564950][ T355] ? _copy_from_user+0x96/0xd0
[ 42.569551][ T355] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 42.574855][ T355] ? __se_sys_rt_sigprocmask+0x30a/0x380
[ 42.580328][ T355] ? debug_smp_processor_id+0x17/0x20
[ 42.585618][ T355] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 42.591528][ T355] __x64_sys_bpf+0x7c/0x90
[ 42.595781][ T355] do_syscall_64+0x3d/0xb0
[ 42.600119][ T355] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 42.606037][ T355] RIP: 0033:0x7fdf44483ba9
[ 42.610357][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 42.630026][ T355] RSP: 002b:00007fdf440060c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 42.638219][ T355] RAX: ffffffffffffffda RBX: 00007fdf445a2f80 RCX: 00007fdf44483ba9
[ 42.646122][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 42.653927][ T355] RBP: 00007fdf444cf47a R08: 0000000000000000 R09: 0000000000000000
[ 42.661736][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 42.669549][ T355] R13: 000000000000000b R14: 00007fdf445a2f80 R15: 00007ffc815ada08
[ 42.677462][ T355]
[ 42.680832][ T355] ================================================================================
[ 42.690005][ T30] audit: type=1400 audit(1722774428.320:99): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 42.690015][ T355] ================================================================================
[ 42.690027][ T355] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7991:63
[ 42.728110][ T355] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 42.736667][ T355] CPU: 0 PID: 355 Comm: syz-executor.0 Not tainted 5.15.152-syzkaller-1069667-g70e1a731d986 #0
[ 42.746904][ T355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
[ 42.756900][ T355] Call Trace:
[ 42.760009][ T355]
[ 42.762788][ T355] dump_stack_lvl+0x151/0x1b7
[ 42.767302][ T355] ? io_uring_drop_tctx_refs+0x190/0x190
[ 42.773142][ T355] ? stack_trace_snprint+0xf0/0xf0
[ 42.778085][ T355] dump_stack+0x15/0x17
[ 42.782054][ T355] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 42.788315][ T355] scalar32_min_max_arsh+0x676/0x6c0
[ 42.793439][ T355] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 42.798980][ T355] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 42.804634][ T355] ? reg_bounds_sync+0xf90/0xf90
[ 42.809573][ T355] ? check_stack_access_within_bounds+0x5a0/0x5a0
[ 42.816087][ T355] ? check_reg_arg+0x42a/0x820
[ 42.820679][ T355] do_check+0x94d9/0xf2c0
[ 42.824952][ T355] ? mark_reg_unknown+0x600/0x600
[ 42.829882][ T355] ? mark_reg_not_init+0x93/0x670
[ 42.834740][ T355] ? memcpy+0x56/0x70
[ 42.838642][ T355] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 42.844648][ T355] do_check_common+0x909/0x1290
[ 42.849415][ T355] bpf_check+0x37bf/0x12b20
[ 42.853757][ T355] ? is_bpf_text_address+0x172/0x190
[ 42.858869][ T355] ? stack_trace_save+0x1c0/0x1c0
[ 42.863823][ T355] ? __kernel_text_address+0x9b/0x110
[ 42.869125][ T355] ? unwind_get_return_address+0x4d/0x90
[ 42.874702][ T355] ? bpf_get_btf_vmlinux+0x20/0x20
[ 42.879644][ T355] ? __kasan_check_write+0x14/0x20
[ 42.884591][ T355] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 42.889885][ T355] ? _raw_spin_lock+0x1b0/0x1b0
[ 42.894591][ T355] ? stack_trace_save+0x113/0x1c0
[ 42.899816][ T355] ? stack_trace_snprint+0xf0/0xf0
[ 42.905382][ T355] ? stack_trace_snprint+0xf0/0xf0
[ 42.910732][ T355] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 42.916362][ T355] ? __stack_depot_save+0x40d/0x470
[ 42.921500][ T355] ? ____kasan_kmalloc+0xed/0x110
[ 42.926460][ T355] ? ____kasan_kmalloc+0xdb/0x110
[ 42.931587][ T355] ? __kasan_kmalloc+0x9/0x10
[ 42.936157][ T355] ? kmem_cache_alloc_trace+0x115/0x210
[ 42.941633][ T355] ? selinux_bpf_prog_alloc+0x51/0x140
[ 42.946915][ T355] ? security_bpf_prog_alloc+0x62/0x90
[ 42.952214][ T355] ? bpf_prog_load+0x9ee/0x1b50
[ 42.957511][ T355] ? __sys_bpf+0x4bc/0x760
[ 42.961771][ T355] ? __x64_sys_bpf+0x7c/0x90
[ 42.966307][ T355] ? do_syscall_64+0x3d/0xb0
[ 42.970885][ T355] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 42.976915][ T355] ? __kasan_kmalloc+0x9/0x10
[ 42.981420][ T355] ? memset+0x35/0x40
[ 42.985322][ T355] ? bpf_obj_name_cpy+0x196/0x1e0
[ 42.990181][ T355] bpf_prog_load+0x12ac/0x1b50
[ 42.994786][ T355] ? map_freeze+0x370/0x370
[ 42.999128][ T355] ? selinux_bpf+0xcb/0x100
[ 43.003472][ T355] ? security_bpf+0x82/0xb0
[ 43.007803][ T355] __sys_bpf+0x4bc/0x760
[ 43.011880][ T355] ? _copy_from_user+0x96/0xd0
[ 43.016490][ T355] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 43.021690][ T355] ? __se_sys_rt_sigprocmask+0x30a/0x380
[ 43.027158][ T355] ? debug_smp_processor_id+0x17/0x20
[ 43.032363][ T355] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 43.038274][ T355] __x64_sys_bpf+0x7c/0x90
[ 43.042519][ T355] do_syscall_64+0x3d/0xb0
[ 43.046897][ T355] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 43.052814][ T355] RIP: 0033:0x7fdf44483ba9
[ 43.057221][ T355] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 43.076715][ T355] RSP: 002b:00007fdf440060c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 43.085210][ T355] RAX: ffffffffffffffda RBX: 00007fdf445a2f80 RCX: 00007fdf44483ba9
[ 43.093019][ T355] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 43.100838][ T355] RBP: 00007fdf444cf47a R08: 0000000000000000 R09: 0000000000000000
[ 43.108815][ T355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 43.116633][ T355] R13: 000000000000000b R14: 00007fdf445a2f80 R15: 00007ffc815ada08
[ 43.124528][ T355]
[ 43.128998][ T355] ================================================================================
[ 43.183823][ T30] audit: type=1400 audit(1722774428.820:100): avc: denied { prog_run } for pid=357 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
2024/08/04 12:27:12 executed programs: 86
2024/08/04 12:27:17 executed programs: 202