Warning: Permanently added '10.128.1.177' (ED25519) to the list of known hosts.
2025/03/01 21:26:16 ignoring optional flag "sandboxArg"="0"
2025/03/01 21:26:16 ignoring optional flag "type"="gce"
2025/03/01 21:26:17 parsed 1 programs
2025/03/01 21:26:17 executed programs: 0
[ 45.775182][ T30] kauditd_printk_skb: 19 callbacks suppressed
[ 45.775197][ T30] audit: type=1400 audit(1740864377.059:95): avc: denied { unlink } for pid=346 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 45.816416][ T346] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 45.873904][ T352] bridge0: port 1(bridge_slave_0) entered blocking state
[ 45.880824][ T352] bridge0: port 1(bridge_slave_0) entered disabled state
[ 45.888067][ T352] device bridge_slave_0 entered promiscuous mode
[ 45.894787][ T352] bridge0: port 2(bridge_slave_1) entered blocking state
[ 45.901627][ T352] bridge0: port 2(bridge_slave_1) entered disabled state
[ 45.909066][ T352] device bridge_slave_1 entered promiscuous mode
[ 45.953353][ T352] bridge0: port 2(bridge_slave_1) entered blocking state
[ 45.960246][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 45.967351][ T352] bridge0: port 1(bridge_slave_0) entered blocking state
[ 45.974097][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 45.993278][ T10] bridge0: port 1(bridge_slave_0) entered disabled state
[ 46.000415][ T10] bridge0: port 2(bridge_slave_1) entered disabled state
[ 46.007717][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 46.015137][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 46.023933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 46.032007][ T10] bridge0: port 1(bridge_slave_0) entered blocking state
[ 46.038865][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 46.047428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 46.055474][ T10] bridge0: port 2(bridge_slave_1) entered blocking state
[ 46.062301][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 46.073980][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 46.083142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 46.096804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 46.108147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 46.116132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 46.123350][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 46.131517][ T352] device veth0_vlan entered promiscuous mode
[ 46.141932][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 46.150954][ T352] device veth1_macvtap entered promiscuous mode
[ 46.160072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 46.170260][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 46.183992][ T30] audit: type=1400 audit(1740864377.459:96): avc: denied { mounton } for pid=352 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 46.214671][ T30] audit: type=1400 audit(1740864377.489:97): avc: denied { prog_load } for pid=356 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 46.234217][ T30] audit: type=1400 audit(1740864377.489:98): avc: denied { bpf } for pid=356 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 46.255256][ T30] audit: type=1400 audit(1740864377.489:99): avc: denied { perfmon } for pid=356 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 46.462578][ T357] ================================================================================
[ 46.471914][ T357] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8028:63
[ 46.479201][ T357] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 46.487752][ T357] CPU: 0 PID: 357 Comm: syz-executor.0 Not tainted 5.15.178-syzkaller-1079147-g7d1f9b5c2ff5 #0
[ 46.497891][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 46.507793][ T357] Call Trace:
[ 46.510905][ T357]
[ 46.513809][ T357] dump_stack_lvl+0x151/0x1c0
[ 46.518323][ T357] ? io_uring_drop_tctx_refs+0x190/0x190
[ 46.523807][ T357] ? stack_trace_snprint+0xf0/0xf0
[ 46.528736][ T357] dump_stack+0x15/0x20
[ 46.532730][ T357] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 46.538984][ T357] scalar32_min_max_arsh+0x622/0x6c0
[ 46.544183][ T357] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 46.549738][ T357] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 46.555225][ T357] ? reg_bounds_sync+0xf90/0xf90
[ 46.559981][ T357] ? check_stack_access_within_bounds+0x5c0/0x5c0
[ 46.566230][ T357] ? check_reg_arg+0x42a/0x820
[ 46.570853][ T357] do_check+0x94db/0xf2c0
[ 46.575006][ T357] ? mark_reg_unknown+0x600/0x600
[ 46.579857][ T357] ? mark_reg_not_init+0x93/0x670
[ 46.584718][ T357] ? memcpy+0x56/0x70
[ 46.588537][ T357] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 46.594351][ T357] do_check_common+0x909/0x1290
[ 46.599063][ T357] bpf_check+0x3851/0x12c60
[ 46.603384][ T357] ? is_bpf_text_address+0x172/0x190
[ 46.608495][ T357] ? stack_trace_save+0x1c0/0x1c0
[ 46.613354][ T357] ? __kernel_text_address+0x9b/0x110
[ 46.618577][ T357] ? unwind_get_return_address+0x4d/0x90
[ 46.624045][ T357] ? bpf_get_btf_vmlinux+0x60/0x60
[ 46.628994][ T357] ? __kasan_check_write+0x14/0x20
[ 46.633932][ T357] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 46.639221][ T357] ? _raw_spin_lock+0x1b0/0x1b0
[ 46.643905][ T357] ? stack_trace_save+0x113/0x1c0
[ 46.648766][ T357] ? stack_trace_snprint+0xf0/0xf0
[ 46.653711][ T357] ? stack_trace_snprint+0xf0/0xf0
[ 46.658660][ T357] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 46.664308][ T357] ? __stack_depot_save+0x40d/0x470
[ 46.669335][ T357] ? ____kasan_kmalloc+0xed/0x110
[ 46.674195][ T357] ? ____kasan_kmalloc+0xdb/0x110
[ 46.679054][ T357] ? __kasan_kmalloc+0x9/0x10
[ 46.683569][ T357] ? kmem_cache_alloc_trace+0x11a/0x270
[ 46.688955][ T357] ? selinux_bpf_prog_alloc+0x51/0x140
[ 46.694263][ T357] ? security_bpf_prog_alloc+0x62/0x90
[ 46.699543][ T357] ? bpf_prog_load+0x9ee/0x1b50
[ 46.704224][ T357] ? __sys_bpf+0x4bc/0x760
[ 46.708479][ T357] ? __x64_sys_bpf+0x7c/0x90
[ 46.712903][ T357] ? x64_sys_call+0x87f/0x9a0
[ 46.717416][ T357] ? do_syscall_64+0x3b/0xb0
[ 46.721845][ T357] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 46.727767][ T357] ? __kasan_kmalloc+0x9/0x10
[ 46.732403][ T357] ? memset+0x35/0x40
[ 46.736224][ T357] ? bpf_obj_name_cpy+0x196/0x1e0
[ 46.741082][ T357] bpf_prog_load+0x12ac/0x1b50
[ 46.745680][ T357] ? map_freeze+0x370/0x370
[ 46.750022][ T357] ? selinux_bpf+0xcb/0x100
[ 46.754472][ T357] ? security_bpf+0x82/0xb0
[ 46.758804][ T357] __sys_bpf+0x4bc/0x760
[ 46.762892][ T357] ? _copy_from_user+0x96/0xd0
[ 46.767493][ T357] ? bpf_link_show_fdinfo+0x300/0x300
[ 46.772692][ T357] ? __se_sys_rt_sigprocmask+0x30a/0x380
[ 46.778161][ T357] ? debug_smp_processor_id+0x17/0x20
[ 46.783366][ T357] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 46.789266][ T357] __x64_sys_bpf+0x7c/0x90
[ 46.793524][ T357] x64_sys_call+0x87f/0x9a0
[ 46.797868][ T357] do_syscall_64+0x3b/0xb0
[ 46.802114][ T357] ? clear_bhb_loop+0x35/0x90
[ 46.806628][ T357] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 46.812451][ T357] RIP: 0033:0x7fea2ad39ba9
[ 46.816694][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 46.836160][ T357] RSP: 002b:00007fea2a8bc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 46.844377][ T357] RAX: ffffffffffffffda RBX: 00007fea2ae58f80 RCX: 00007fea2ad39ba9
[ 46.852192][ T357] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 46.859998][ T357] RBP: 00007fea2ad8547a R08: 0000000000000000 R09: 0000000000000000
[ 46.867812][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 46.875622][ T357] R13: 000000000000000b R14: 00007fea2ae58f80 R15: 00007ffc86a655c8
[ 46.883441][ T357]
[ 46.888219][ T30] audit: type=1400 audit(1740864378.169:100): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 46.891299][ T357] ================================================================================
[ 46.918954][ T357] ================================================================================
[ 46.928228][ T357] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8029:63
[ 46.935942][ T357] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 46.944356][ T357] CPU: 1 PID: 357 Comm: syz-executor.0 Not tainted 5.15.178-syzkaller-1079147-g7d1f9b5c2ff5 #0
[ 46.954499][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[ 46.964390][ T357] Call Trace:
[ 46.967521][ T357]
[ 46.970323][ T357] dump_stack_lvl+0x151/0x1c0
[ 46.974810][ T357] ? io_uring_drop_tctx_refs+0x190/0x190
[ 46.980273][ T357] ? stack_trace_snprint+0xf0/0xf0
[ 46.985780][ T357] dump_stack+0x15/0x20
[ 46.989772][ T357] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 46.996098][ T357] scalar32_min_max_arsh+0x676/0x6c0
[ 47.001225][ T357] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 47.006785][ T357] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 47.012247][ T357] ? reg_bounds_sync+0xf90/0xf90
[ 47.017028][ T357] ? check_stack_access_within_bounds+0x5c0/0x5c0
[ 47.023275][ T357] ? check_reg_arg+0x42a/0x820
[ 47.027877][ T357] do_check+0x94db/0xf2c0
[ 47.032032][ T357] ? mark_reg_unknown+0x600/0x600
[ 47.036897][ T357] ? mark_reg_not_init+0x93/0x670
[ 47.041747][ T357] ? memcpy+0x56/0x70
[ 47.045565][ T357] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 47.051474][ T357] do_check_common+0x909/0x1290
[ 47.056157][ T357] bpf_check+0x3851/0x12c60
[ 47.060586][ T357] ? is_bpf_text_address+0x172/0x190
[ 47.065703][ T357] ? stack_trace_save+0x1c0/0x1c0
[ 47.070567][ T357] ? __kernel_text_address+0x9b/0x110
[ 47.075769][ T357] ? unwind_get_return_address+0x4d/0x90
[ 47.081234][ T357] ? bpf_get_btf_vmlinux+0x60/0x60
[ 47.086182][ T357] ? __kasan_check_write+0x14/0x20
[ 47.091131][ T357] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 47.096427][ T357] ? _raw_spin_lock+0x1b0/0x1b0
[ 47.101110][ T357] ? stack_trace_save+0x113/0x1c0
[ 47.105972][ T357] ? stack_trace_snprint+0xf0/0xf0
[ 47.110920][ T357] ? stack_trace_snprint+0xf0/0xf0
[ 47.115954][ T357] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 47.121595][ T357] ? __stack_depot_save+0x40d/0x470
[ 47.126628][ T357] ? ____kasan_kmalloc+0xed/0x110
[ 47.131495][ T357] ? ____kasan_kmalloc+0xdb/0x110
[ 47.136347][ T357] ? __kasan_kmalloc+0x9/0x10
[ 47.140861][ T357] ? kmem_cache_alloc_trace+0x11a/0x270
[ 47.146240][ T357] ? selinux_bpf_prog_alloc+0x51/0x140
[ 47.151545][ T357] ? security_bpf_prog_alloc+0x62/0x90
[ 47.156829][ T357] ? bpf_prog_load+0x9ee/0x1b50
[ 47.161524][ T357] ? __sys_bpf+0x4bc/0x760
[ 47.165772][ T357] ? __x64_sys_bpf+0x7c/0x90
[ 47.170282][ T357] ? x64_sys_call+0x87f/0x9a0
[ 47.174968][ T357] ? do_syscall_64+0x3b/0xb0
[ 47.179396][ T357] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 47.185305][ T357] ? __kasan_kmalloc+0x9/0x10
[ 47.189811][ T357] ? memset+0x35/0x40
[ 47.193631][ T357] ? bpf_obj_name_cpy+0x196/0x1e0
[ 47.198490][ T357] bpf_prog_load+0x12ac/0x1b50
[ 47.203095][ T357] ? map_freeze+0x370/0x370
[ 47.207432][ T357] ? selinux_bpf+0xcb/0x100
[ 47.211771][ T357] ? security_bpf+0x82/0xb0
[ 47.216108][ T357] __sys_bpf+0x4bc/0x760
[ 47.220186][ T357] ? _copy_from_user+0x96/0xd0
[ 47.224788][ T357] ? bpf_link_show_fdinfo+0x300/0x300
[ 47.230002][ T357] ? __se_sys_rt_sigprocmask+0x30a/0x380
[ 47.235473][ T357] ? debug_smp_processor_id+0x17/0x20
[ 47.240759][ T357] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 47.246670][ T357] __x64_sys_bpf+0x7c/0x90
[ 47.250913][ T357] x64_sys_call+0x87f/0x9a0
[ 47.255338][ T357] do_syscall_64+0x3b/0xb0
[ 47.259587][ T357] ? clear_bhb_loop+0x35/0x90
[ 47.264114][ T357] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 47.269835][ T357] RIP: 0033:0x7fea2ad39ba9
[ 47.274085][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 47.293533][ T357] RSP: 002b:00007fea2a8bc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 47.301768][ T357] RAX: ffffffffffffffda RBX: 00007fea2ae58f80 RCX: 00007fea2ad39ba9
[ 47.309581][ T357] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 47.317391][ T357] RBP: 00007fea2ad8547a R08: 0000000000000000 R09: 0000000000000000
[ 47.325290][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 47.333099][ T357] R13: 000000000000000b R14: 00007fea2ae58f80 R15: 00007ffc86a655c8
[ 47.340918][ T357]
[ 47.344793][ T357] ================================================================================
[ 47.398202][ T30] audit: type=1400 audit(1740864378.679:101): avc: denied { prog_run } for pid=360 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
2025/03/01 21:26:22 executed programs: 81
2025/03/01 21:26:27 executed programs: 197