u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 31.481696][ T30] audit: type=1400 audit(1704041784.328:156): avc: denied { siginh } for pid=318 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
Warning: Permanently added '10.128.10.36' (ED25519) to the list of known hosts.
2023/12/31 16:56:31 ignoring optional flag "sandboxArg"="0"
2023/12/31 16:56:31 parsed 1 programs
[ 38.966759][ T30] audit: type=1400 audit(1704041791.848:157): avc: denied { mounton } for pid=340 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 38.991639][ T30] audit: type=1400 audit(1704041791.878:158): avc: denied { mount } for pid=340 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 39.018206][ T30] audit: type=1400 audit(1704041791.908:159): avc: denied { unlink } for pid=340 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
2023/12/31 16:56:31 executed programs: 0
[ 39.071652][ T340] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 39.124998][ T346] bridge0: port 1(bridge_slave_0) entered blocking state
[ 39.131960][ T346] bridge0: port 1(bridge_slave_0) entered disabled state
[ 39.139388][ T346] device bridge_slave_0 entered promiscuous mode
[ 39.146076][ T346] bridge0: port 2(bridge_slave_1) entered blocking state
[ 39.153023][ T346] bridge0: port 2(bridge_slave_1) entered disabled state
[ 39.160266][ T346] device bridge_slave_1 entered promiscuous mode
[ 39.202267][ T30] audit: type=1400 audit(1704041792.088:160): avc: denied { write } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 39.207661][ T346] bridge0: port 2(bridge_slave_1) entered blocking state
[ 39.222662][ T30] audit: type=1400 audit(1704041792.088:161): avc: denied { read } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 39.229448][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 39.229543][ T346] bridge0: port 1(bridge_slave_0) entered blocking state
[ 39.263568][ T346] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 39.283842][ T63] bridge0: port 1(bridge_slave_0) entered disabled state
[ 39.291013][ T63] bridge0: port 2(bridge_slave_1) entered disabled state
[ 39.299339][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 39.306585][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 39.315825][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 39.323849][ T292] bridge0: port 1(bridge_slave_0) entered blocking state
[ 39.330703][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 39.348258][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 39.356203][ T63] bridge0: port 2(bridge_slave_1) entered blocking state
[ 39.363063][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 39.370226][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 39.378719][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 39.390420][ T346] device veth0_vlan entered promiscuous mode
[ 39.397410][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 39.405434][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 39.412811][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 39.420207][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 39.431572][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 39.440466][ T346] device veth1_macvtap entered promiscuous mode
[ 39.449392][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 39.461548][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 39.473449][ T30] audit: type=1400 audit(1704041792.358:162): avc: denied { mounton } for pid=346 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 39.506584][ T30] audit: type=1400 audit(1704041792.388:163): avc: denied { prog_load } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 39.526417][ T30] audit: type=1400 audit(1704041792.388:164): avc: denied { bpf } for pid=352 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 39.528257][ T353] ================================================================================
[ 39.547609][ T30] audit: type=1400 audit(1704041792.388:165): avc: denied { perfmon } for pid=352 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 39.557223][ T353] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7984:63
[ 39.584673][ T353] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 39.593098][ T353] CPU: 0 PID: 353 Comm: syz-executor.0 Not tainted 5.15.141-syzkaller-1068904-g28e3f5851a99 #0
[ 39.603147][ T353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 39.613042][ T353] Call Trace:
[ 39.616163][ T353]
[ 39.618942][ T353] dump_stack_lvl+0x151/0x1b7
[ 39.623458][ T353] ? io_uring_drop_tctx_refs+0x190/0x190
[ 39.628923][ T353] ? stack_trace_snprint+0xf0/0xf0
[ 39.633879][ T353] dump_stack+0x15/0x17
[ 39.637865][ T353] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 39.644117][ T353] scalar32_min_max_arsh+0x622/0x6c0
[ 39.649264][ T353] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 39.654801][ T353] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 39.660260][ T353] ? reg_bounds_sync+0xf90/0xf90
[ 39.665031][ T353] ? check_stack_access_within_bounds+0x670/0x670
[ 39.671282][ T353] ? check_reg_arg+0x42a/0x820
[ 39.675881][ T353] do_check+0x94d9/0xf2c0
[ 39.680052][ T353] ? mark_reg_unknown+0x600/0x600
[ 39.684907][ T353] ? mark_reg_not_init+0x93/0x670
[ 39.689767][ T353] ? memcpy+0x56/0x70
[ 39.693582][ T353] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 39.699402][ T353] do_check_common+0x909/0x1290
[ 39.704087][ T353] bpf_check+0x37bf/0x12b20
[ 39.708434][ T353] ? is_bpf_text_address+0x172/0x190
[ 39.713545][ T353] ? stack_trace_save+0x1c0/0x1c0
[ 39.718408][ T353] ? __kernel_text_address+0x9b/0x110
[ 39.723615][ T353] ? unwind_get_return_address+0x4d/0x90
[ 39.729106][ T353] ? bpf_get_btf_vmlinux+0x20/0x20
[ 39.734028][ T353] ? __kasan_check_write+0x14/0x20
[ 39.738990][ T353] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 39.744274][ T353] ? _raw_spin_lock+0x1b0/0x1b0
[ 39.748961][ T353] ? stack_trace_save+0x113/0x1c0
[ 39.753829][ T353] ? stack_trace_snprint+0xf0/0xf0
[ 39.758773][ T353] ? stack_trace_snprint+0xf0/0xf0
[ 39.763718][ T353] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 39.769356][ T353] ? __stack_depot_save+0x40d/0x470
[ 39.774390][ T353] ? ____kasan_kmalloc+0xed/0x110
[ 39.779249][ T353] ? ____kasan_kmalloc+0xdb/0x110
[ 39.784116][ T353] ? __kasan_kmalloc+0x9/0x10
[ 39.788625][ T353] ? kmem_cache_alloc_trace+0x115/0x210
[ 39.794006][ T353] ? selinux_bpf_prog_alloc+0x51/0x140
[ 39.799403][ T353] ? security_bpf_prog_alloc+0x62/0x90
[ 39.804719][ T353] ? bpf_prog_load+0x9ee/0x1b50
[ 39.809377][ T353] ? __sys_bpf+0x4bc/0x760
[ 39.813619][ T353] ? __x64_sys_bpf+0x7c/0x90
[ 39.818047][ T353] ? do_syscall_64+0x3d/0xb0
[ 39.822569][ T353] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 39.828470][ T353] ? __kasan_kmalloc+0x9/0x10
[ 39.832982][ T353] ? memset+0x35/0x40
[ 39.836925][ T353] ? bpf_obj_name_cpy+0x196/0x1e0
[ 39.841775][ T353] bpf_prog_load+0x12ac/0x1b50
[ 39.846375][ T353] ? map_freeze+0x370/0x370
[ 39.850720][ T353] ? selinux_bpf+0xcb/0x100
[ 39.855051][ T353] ? security_bpf+0x82/0xb0
[ 39.859393][ T353] __sys_bpf+0x4bc/0x760
[ 39.863472][ T353] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 39.868681][ T353] ? debug_smp_processor_id+0x17/0x20
[ 39.873885][ T353] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 39.879789][ T353] __x64_sys_bpf+0x7c/0x90
[ 39.884041][ T353] do_syscall_64+0x3d/0xb0
[ 39.888292][ T353] ? sysvec_call_function_single+0x52/0xb0
[ 39.893933][ T353] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 39.899662][ T353] RIP: 0033:0x7fd3a084aba9
[ 39.903918][ T353] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 39.923357][ T353] RSP: 002b:00007fd3a03cd0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 39.931618][ T353] RAX: ffffffffffffffda RBX: 00007fd3a0969f80 RCX: 00007fd3a084aba9
[ 39.939608][ T353] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 39.947584][ T353] RBP: 00007fd3a089647a R08: 0000000000000000 R09: 0000000000000000
[ 39.955314][ T353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 39.963124][ T353] R13: 000000000000000b R14: 00007fd3a0969f80 R15: 00007ffe38369618
[ 39.970938][ T353]
[ 39.975302][ T353] ================================================================================
[ 39.984500][ T353] ================================================================================
[ 39.993751][ T353] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7985:63
[ 40.001211][ T353] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int')
[ 40.009786][ T353] CPU: 0 PID: 353 Comm: syz-executor.0 Not tainted 5.15.141-syzkaller-1068904-g28e3f5851a99 #0
[ 40.019916][ T353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
[ 40.029812][ T353] Call Trace:
[ 40.032936][ T353]
[ 40.035713][ T353] dump_stack_lvl+0x151/0x1b7
[ 40.040225][ T353] ? io_uring_drop_tctx_refs+0x190/0x190
[ 40.045779][ T353] ? stack_trace_snprint+0xf0/0xf0
[ 40.050725][ T353] dump_stack+0x15/0x17
[ 40.054718][ T353] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420
[ 40.060971][ T353] scalar32_min_max_arsh+0x676/0x6c0
[ 40.066089][ T353] ? adjust_reg_min_max_vals+0x7b6/0x6360
[ 40.071645][ T353] adjust_reg_min_max_vals+0x3d1d/0x6360
[ 40.077113][ T353] ? reg_bounds_sync+0xf90/0xf90
[ 40.081893][ T353] ? check_stack_access_within_bounds+0x670/0x670
[ 40.088136][ T353] ? check_reg_arg+0x42a/0x820
[ 40.092733][ T353] do_check+0x94d9/0xf2c0
[ 40.096908][ T353] ? mark_reg_unknown+0x600/0x600
[ 40.101763][ T353] ? mark_reg_not_init+0x93/0x670
[ 40.106632][ T353] ? memcpy+0x56/0x70
[ 40.110474][ T353] ? btf_check_subprog_arg_match+0x181/0x2f0
[ 40.116262][ T353] do_check_common+0x909/0x1290
[ 40.121076][ T353] bpf_check+0x37bf/0x12b20
[ 40.125417][ T353] ? is_bpf_text_address+0x172/0x190
[ 40.130590][ T353] ? stack_trace_save+0x1c0/0x1c0
[ 40.136175][ T353] ? __kernel_text_address+0x9b/0x110
[ 40.141379][ T353] ? unwind_get_return_address+0x4d/0x90
[ 40.146849][ T353] ? bpf_get_btf_vmlinux+0x20/0x20
[ 40.151796][ T353] ? __kasan_check_write+0x14/0x20
[ 40.156740][ T353] ? _raw_spin_lock_irqsave+0xf9/0x210
[ 40.162035][ T353] ? _raw_spin_lock+0x1b0/0x1b0
[ 40.166720][ T353] ? stack_trace_save+0x113/0x1c0
[ 40.171582][ T353] ? stack_trace_snprint+0xf0/0xf0
[ 40.176551][ T353] ? stack_trace_snprint+0xf0/0xf0
[ 40.181501][ T353] ? _raw_spin_unlock_irqrestore+0x5c/0x80
[ 40.187297][ T353] ? __stack_depot_save+0x40d/0x470
[ 40.192326][ T353] ? ____kasan_kmalloc+0xed/0x110
[ 40.197182][ T353] ? ____kasan_kmalloc+0xdb/0x110
[ 40.202045][ T353] ? __kasan_kmalloc+0x9/0x10
[ 40.206574][ T353] ? kmem_cache_alloc_trace+0x115/0x210
[ 40.212105][ T353] ? selinux_bpf_prog_alloc+0x51/0x140
[ 40.217388][ T353] ? security_bpf_prog_alloc+0x62/0x90
[ 40.222693][ T353] ? bpf_prog_load+0x9ee/0x1b50
[ 40.227371][ T353] ? __sys_bpf+0x4bc/0x760
[ 40.231619][ T353] ? __x64_sys_bpf+0x7c/0x90
[ 40.236045][ T353] ? do_syscall_64+0x3d/0xb0
[ 40.240474][ T353] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 40.246396][ T353] ? __kasan_kmalloc+0x9/0x10
[ 40.250890][ T353] ? memset+0x35/0x40
[ 40.254709][ T353] ? bpf_obj_name_cpy+0x196/0x1e0
[ 40.259570][ T353] bpf_prog_load+0x12ac/0x1b50
[ 40.264172][ T353] ? map_freeze+0x370/0x370
[ 40.268534][ T353] ? selinux_bpf+0xcb/0x100
[ 40.272846][ T353] ? security_bpf+0x82/0xb0
[ 40.277185][ T353] __sys_bpf+0x4bc/0x760
[ 40.281267][ T353] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 40.286477][ T353] ? debug_smp_processor_id+0x17/0x20
[ 40.291686][ T353] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 40.297975][ T353] __x64_sys_bpf+0x7c/0x90
[ 40.302228][ T353] do_syscall_64+0x3d/0xb0
[ 40.306472][ T353] ? sysvec_call_function_single+0x52/0xb0
[ 40.312115][ T353] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 40.317850][ T353] RIP: 0033:0x7fd3a084aba9
[ 40.322100][ T353] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 40.341535][ T353] RSP: 002b:00007fd3a03cd0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 40.349782][ T353] RAX: ffffffffffffffda RBX: 00007fd3a0969f80 RCX: 00007fd3a084aba9
[ 40.357593][ T353] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005
[ 40.365580][ T353] RBP: 00007fd3a089647a R08: 0000000000000000 R09: 0000000000000000
[ 40.373388][ T353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 40.381202][ T353] R13: 000000000000000b R14: 00007fd3a0969f80 R15: 00007ffe38369618
[ 40.389015][ T353]
[ 40.394549][ T353] ================================================================================
[ 40.451405][ T30] audit: type=1400 audit(1704041793.338:166): avc: denied { prog_run } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
2023/12/31 16:56:36 executed programs: 85
2023/12/31 16:56:42 executed programs: 201