Warning: Permanently added '10.128.1.177' (ED25519) to the list of known hosts. 2025/03/01 21:26:16 ignoring optional flag "sandboxArg"="0" 2025/03/01 21:26:16 ignoring optional flag "type"="gce" 2025/03/01 21:26:17 parsed 1 programs 2025/03/01 21:26:17 executed programs: 0 [ 45.775182][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 45.775197][ T30] audit: type=1400 audit(1740864377.059:95): avc: denied { unlink } for pid=346 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 45.816416][ T346] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.873904][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.880824][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.888067][ T352] device bridge_slave_0 entered promiscuous mode [ 45.894787][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.901627][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.909066][ T352] device bridge_slave_1 entered promiscuous mode [ 45.953353][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.960246][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.967351][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.974097][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.993278][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.000415][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.007717][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.015137][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.023933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.032007][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.038865][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.047428][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.055474][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.062301][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.073980][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.083142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.096804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.108147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.116132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.123350][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.131517][ T352] device veth0_vlan entered promiscuous mode [ 46.141932][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.150954][ T352] device veth1_macvtap entered promiscuous mode [ 46.160072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.170260][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.183992][ T30] audit: type=1400 audit(1740864377.459:96): avc: denied { mounton } for pid=352 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 46.214671][ T30] audit: type=1400 audit(1740864377.489:97): avc: denied { prog_load } for pid=356 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 46.234217][ T30] audit: type=1400 audit(1740864377.489:98): avc: denied { bpf } for pid=356 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 46.255256][ T30] audit: type=1400 audit(1740864377.489:99): avc: denied { perfmon } for pid=356 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 46.462578][ T357] ================================================================================ [ 46.471914][ T357] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8028:63 [ 46.479201][ T357] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 46.487752][ T357] CPU: 0 PID: 357 Comm: syz-executor.0 Not tainted 5.15.178-syzkaller-1079147-g7d1f9b5c2ff5 #0 [ 46.497891][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 46.507793][ T357] Call Trace: [ 46.510905][ T357] [ 46.513809][ T357] dump_stack_lvl+0x151/0x1c0 [ 46.518323][ T357] ? io_uring_drop_tctx_refs+0x190/0x190 [ 46.523807][ T357] ? stack_trace_snprint+0xf0/0xf0 [ 46.528736][ T357] dump_stack+0x15/0x20 [ 46.532730][ T357] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 46.538984][ T357] scalar32_min_max_arsh+0x622/0x6c0 [ 46.544183][ T357] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 46.549738][ T357] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 46.555225][ T357] ? reg_bounds_sync+0xf90/0xf90 [ 46.559981][ T357] ? check_stack_access_within_bounds+0x5c0/0x5c0 [ 46.566230][ T357] ? check_reg_arg+0x42a/0x820 [ 46.570853][ T357] do_check+0x94db/0xf2c0 [ 46.575006][ T357] ? mark_reg_unknown+0x600/0x600 [ 46.579857][ T357] ? mark_reg_not_init+0x93/0x670 [ 46.584718][ T357] ? memcpy+0x56/0x70 [ 46.588537][ T357] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 46.594351][ T357] do_check_common+0x909/0x1290 [ 46.599063][ T357] bpf_check+0x3851/0x12c60 [ 46.603384][ T357] ? is_bpf_text_address+0x172/0x190 [ 46.608495][ T357] ? stack_trace_save+0x1c0/0x1c0 [ 46.613354][ T357] ? __kernel_text_address+0x9b/0x110 [ 46.618577][ T357] ? unwind_get_return_address+0x4d/0x90 [ 46.624045][ T357] ? bpf_get_btf_vmlinux+0x60/0x60 [ 46.628994][ T357] ? __kasan_check_write+0x14/0x20 [ 46.633932][ T357] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 46.639221][ T357] ? _raw_spin_lock+0x1b0/0x1b0 [ 46.643905][ T357] ? stack_trace_save+0x113/0x1c0 [ 46.648766][ T357] ? stack_trace_snprint+0xf0/0xf0 [ 46.653711][ T357] ? stack_trace_snprint+0xf0/0xf0 [ 46.658660][ T357] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 46.664308][ T357] ? __stack_depot_save+0x40d/0x470 [ 46.669335][ T357] ? ____kasan_kmalloc+0xed/0x110 [ 46.674195][ T357] ? ____kasan_kmalloc+0xdb/0x110 [ 46.679054][ T357] ? __kasan_kmalloc+0x9/0x10 [ 46.683569][ T357] ? kmem_cache_alloc_trace+0x11a/0x270 [ 46.688955][ T357] ? selinux_bpf_prog_alloc+0x51/0x140 [ 46.694263][ T357] ? security_bpf_prog_alloc+0x62/0x90 [ 46.699543][ T357] ? bpf_prog_load+0x9ee/0x1b50 [ 46.704224][ T357] ? __sys_bpf+0x4bc/0x760 [ 46.708479][ T357] ? __x64_sys_bpf+0x7c/0x90 [ 46.712903][ T357] ? x64_sys_call+0x87f/0x9a0 [ 46.717416][ T357] ? do_syscall_64+0x3b/0xb0 [ 46.721845][ T357] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.727767][ T357] ? __kasan_kmalloc+0x9/0x10 [ 46.732403][ T357] ? memset+0x35/0x40 [ 46.736224][ T357] ? bpf_obj_name_cpy+0x196/0x1e0 [ 46.741082][ T357] bpf_prog_load+0x12ac/0x1b50 [ 46.745680][ T357] ? map_freeze+0x370/0x370 [ 46.750022][ T357] ? selinux_bpf+0xcb/0x100 [ 46.754472][ T357] ? security_bpf+0x82/0xb0 [ 46.758804][ T357] __sys_bpf+0x4bc/0x760 [ 46.762892][ T357] ? _copy_from_user+0x96/0xd0 [ 46.767493][ T357] ? bpf_link_show_fdinfo+0x300/0x300 [ 46.772692][ T357] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 46.778161][ T357] ? debug_smp_processor_id+0x17/0x20 [ 46.783366][ T357] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 46.789266][ T357] __x64_sys_bpf+0x7c/0x90 [ 46.793524][ T357] x64_sys_call+0x87f/0x9a0 [ 46.797868][ T357] do_syscall_64+0x3b/0xb0 [ 46.802114][ T357] ? clear_bhb_loop+0x35/0x90 [ 46.806628][ T357] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.812451][ T357] RIP: 0033:0x7fea2ad39ba9 [ 46.816694][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 46.836160][ T357] RSP: 002b:00007fea2a8bc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.844377][ T357] RAX: ffffffffffffffda RBX: 00007fea2ae58f80 RCX: 00007fea2ad39ba9 [ 46.852192][ T357] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 46.859998][ T357] RBP: 00007fea2ad8547a R08: 0000000000000000 R09: 0000000000000000 [ 46.867812][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 46.875622][ T357] R13: 000000000000000b R14: 00007fea2ae58f80 R15: 00007ffc86a655c8 [ 46.883441][ T357] [ 46.888219][ T30] audit: type=1400 audit(1740864378.169:100): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 46.891299][ T357] ================================================================================ [ 46.918954][ T357] ================================================================================ [ 46.928228][ T357] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:8029:63 [ 46.935942][ T357] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 46.944356][ T357] CPU: 1 PID: 357 Comm: syz-executor.0 Not tainted 5.15.178-syzkaller-1079147-g7d1f9b5c2ff5 #0 [ 46.954499][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 46.964390][ T357] Call Trace: [ 46.967521][ T357] [ 46.970323][ T357] dump_stack_lvl+0x151/0x1c0 [ 46.974810][ T357] ? io_uring_drop_tctx_refs+0x190/0x190 [ 46.980273][ T357] ? stack_trace_snprint+0xf0/0xf0 [ 46.985780][ T357] dump_stack+0x15/0x20 [ 46.989772][ T357] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 46.996098][ T357] scalar32_min_max_arsh+0x676/0x6c0 [ 47.001225][ T357] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 47.006785][ T357] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 47.012247][ T357] ? reg_bounds_sync+0xf90/0xf90 [ 47.017028][ T357] ? check_stack_access_within_bounds+0x5c0/0x5c0 [ 47.023275][ T357] ? check_reg_arg+0x42a/0x820 [ 47.027877][ T357] do_check+0x94db/0xf2c0 [ 47.032032][ T357] ? mark_reg_unknown+0x600/0x600 [ 47.036897][ T357] ? mark_reg_not_init+0x93/0x670 [ 47.041747][ T357] ? memcpy+0x56/0x70 [ 47.045565][ T357] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 47.051474][ T357] do_check_common+0x909/0x1290 [ 47.056157][ T357] bpf_check+0x3851/0x12c60 [ 47.060586][ T357] ? is_bpf_text_address+0x172/0x190 [ 47.065703][ T357] ? stack_trace_save+0x1c0/0x1c0 [ 47.070567][ T357] ? __kernel_text_address+0x9b/0x110 [ 47.075769][ T357] ? unwind_get_return_address+0x4d/0x90 [ 47.081234][ T357] ? bpf_get_btf_vmlinux+0x60/0x60 [ 47.086182][ T357] ? __kasan_check_write+0x14/0x20 [ 47.091131][ T357] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 47.096427][ T357] ? _raw_spin_lock+0x1b0/0x1b0 [ 47.101110][ T357] ? stack_trace_save+0x113/0x1c0 [ 47.105972][ T357] ? stack_trace_snprint+0xf0/0xf0 [ 47.110920][ T357] ? stack_trace_snprint+0xf0/0xf0 [ 47.115954][ T357] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 47.121595][ T357] ? __stack_depot_save+0x40d/0x470 [ 47.126628][ T357] ? ____kasan_kmalloc+0xed/0x110 [ 47.131495][ T357] ? ____kasan_kmalloc+0xdb/0x110 [ 47.136347][ T357] ? __kasan_kmalloc+0x9/0x10 [ 47.140861][ T357] ? kmem_cache_alloc_trace+0x11a/0x270 [ 47.146240][ T357] ? selinux_bpf_prog_alloc+0x51/0x140 [ 47.151545][ T357] ? security_bpf_prog_alloc+0x62/0x90 [ 47.156829][ T357] ? bpf_prog_load+0x9ee/0x1b50 [ 47.161524][ T357] ? __sys_bpf+0x4bc/0x760 [ 47.165772][ T357] ? __x64_sys_bpf+0x7c/0x90 [ 47.170282][ T357] ? x64_sys_call+0x87f/0x9a0 [ 47.174968][ T357] ? do_syscall_64+0x3b/0xb0 [ 47.179396][ T357] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.185305][ T357] ? __kasan_kmalloc+0x9/0x10 [ 47.189811][ T357] ? memset+0x35/0x40 [ 47.193631][ T357] ? bpf_obj_name_cpy+0x196/0x1e0 [ 47.198490][ T357] bpf_prog_load+0x12ac/0x1b50 [ 47.203095][ T357] ? map_freeze+0x370/0x370 [ 47.207432][ T357] ? selinux_bpf+0xcb/0x100 [ 47.211771][ T357] ? security_bpf+0x82/0xb0 [ 47.216108][ T357] __sys_bpf+0x4bc/0x760 [ 47.220186][ T357] ? _copy_from_user+0x96/0xd0 [ 47.224788][ T357] ? bpf_link_show_fdinfo+0x300/0x300 [ 47.230002][ T357] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 47.235473][ T357] ? debug_smp_processor_id+0x17/0x20 [ 47.240759][ T357] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 47.246670][ T357] __x64_sys_bpf+0x7c/0x90 [ 47.250913][ T357] x64_sys_call+0x87f/0x9a0 [ 47.255338][ T357] do_syscall_64+0x3b/0xb0 [ 47.259587][ T357] ? clear_bhb_loop+0x35/0x90 [ 47.264114][ T357] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.269835][ T357] RIP: 0033:0x7fea2ad39ba9 [ 47.274085][ T357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 47.293533][ T357] RSP: 002b:00007fea2a8bc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.301768][ T357] RAX: ffffffffffffffda RBX: 00007fea2ae58f80 RCX: 00007fea2ad39ba9 [ 47.309581][ T357] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 47.317391][ T357] RBP: 00007fea2ad8547a R08: 0000000000000000 R09: 0000000000000000 [ 47.325290][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 47.333099][ T357] R13: 000000000000000b R14: 00007fea2ae58f80 R15: 00007ffc86a655c8 [ 47.340918][ T357] [ 47.344793][ T357] ================================================================================ [ 47.398202][ T30] audit: type=1400 audit(1740864378.679:101): avc: denied { prog_run } for pid=360 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2025/03/01 21:26:22 executed programs: 81 2025/03/01 21:26:27 executed programs: 197