u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.481696][ T30] audit: type=1400 audit(1704041784.328:156): avc: denied { siginh } for pid=318 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.36' (ED25519) to the list of known hosts. 2023/12/31 16:56:31 ignoring optional flag "sandboxArg"="0" 2023/12/31 16:56:31 parsed 1 programs [ 38.966759][ T30] audit: type=1400 audit(1704041791.848:157): avc: denied { mounton } for pid=340 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.991639][ T30] audit: type=1400 audit(1704041791.878:158): avc: denied { mount } for pid=340 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.018206][ T30] audit: type=1400 audit(1704041791.908:159): avc: denied { unlink } for pid=340 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2023/12/31 16:56:31 executed programs: 0 [ 39.071652][ T340] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 39.124998][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.131960][ T346] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.139388][ T346] device bridge_slave_0 entered promiscuous mode [ 39.146076][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.153023][ T346] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.160266][ T346] device bridge_slave_1 entered promiscuous mode [ 39.202267][ T30] audit: type=1400 audit(1704041792.088:160): avc: denied { write } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.207661][ T346] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.222662][ T30] audit: type=1400 audit(1704041792.088:161): avc: denied { read } for pid=346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.229448][ T346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.229543][ T346] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.263568][ T346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.283842][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.291013][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.299339][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.306585][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.315825][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.323849][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.330703][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.348258][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.356203][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.363063][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.370226][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.378719][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.390420][ T346] device veth0_vlan entered promiscuous mode [ 39.397410][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.405434][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.412811][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.420207][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.431572][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.440466][ T346] device veth1_macvtap entered promiscuous mode [ 39.449392][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.461548][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.473449][ T30] audit: type=1400 audit(1704041792.358:162): avc: denied { mounton } for pid=346 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.506584][ T30] audit: type=1400 audit(1704041792.388:163): avc: denied { prog_load } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.526417][ T30] audit: type=1400 audit(1704041792.388:164): avc: denied { bpf } for pid=352 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.528257][ T353] ================================================================================ [ 39.547609][ T30] audit: type=1400 audit(1704041792.388:165): avc: denied { perfmon } for pid=352 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.557223][ T353] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7984:63 [ 39.584673][ T353] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 39.593098][ T353] CPU: 0 PID: 353 Comm: syz-executor.0 Not tainted 5.15.141-syzkaller-1068904-g28e3f5851a99 #0 [ 39.603147][ T353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 39.613042][ T353] Call Trace: [ 39.616163][ T353] [ 39.618942][ T353] dump_stack_lvl+0x151/0x1b7 [ 39.623458][ T353] ? io_uring_drop_tctx_refs+0x190/0x190 [ 39.628923][ T353] ? stack_trace_snprint+0xf0/0xf0 [ 39.633879][ T353] dump_stack+0x15/0x17 [ 39.637865][ T353] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 39.644117][ T353] scalar32_min_max_arsh+0x622/0x6c0 [ 39.649264][ T353] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 39.654801][ T353] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 39.660260][ T353] ? reg_bounds_sync+0xf90/0xf90 [ 39.665031][ T353] ? check_stack_access_within_bounds+0x670/0x670 [ 39.671282][ T353] ? check_reg_arg+0x42a/0x820 [ 39.675881][ T353] do_check+0x94d9/0xf2c0 [ 39.680052][ T353] ? mark_reg_unknown+0x600/0x600 [ 39.684907][ T353] ? mark_reg_not_init+0x93/0x670 [ 39.689767][ T353] ? memcpy+0x56/0x70 [ 39.693582][ T353] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 39.699402][ T353] do_check_common+0x909/0x1290 [ 39.704087][ T353] bpf_check+0x37bf/0x12b20 [ 39.708434][ T353] ? is_bpf_text_address+0x172/0x190 [ 39.713545][ T353] ? stack_trace_save+0x1c0/0x1c0 [ 39.718408][ T353] ? __kernel_text_address+0x9b/0x110 [ 39.723615][ T353] ? unwind_get_return_address+0x4d/0x90 [ 39.729106][ T353] ? bpf_get_btf_vmlinux+0x20/0x20 [ 39.734028][ T353] ? __kasan_check_write+0x14/0x20 [ 39.738990][ T353] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 39.744274][ T353] ? _raw_spin_lock+0x1b0/0x1b0 [ 39.748961][ T353] ? stack_trace_save+0x113/0x1c0 [ 39.753829][ T353] ? stack_trace_snprint+0xf0/0xf0 [ 39.758773][ T353] ? stack_trace_snprint+0xf0/0xf0 [ 39.763718][ T353] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 39.769356][ T353] ? __stack_depot_save+0x40d/0x470 [ 39.774390][ T353] ? ____kasan_kmalloc+0xed/0x110 [ 39.779249][ T353] ? ____kasan_kmalloc+0xdb/0x110 [ 39.784116][ T353] ? __kasan_kmalloc+0x9/0x10 [ 39.788625][ T353] ? kmem_cache_alloc_trace+0x115/0x210 [ 39.794006][ T353] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.799403][ T353] ? security_bpf_prog_alloc+0x62/0x90 [ 39.804719][ T353] ? bpf_prog_load+0x9ee/0x1b50 [ 39.809377][ T353] ? __sys_bpf+0x4bc/0x760 [ 39.813619][ T353] ? __x64_sys_bpf+0x7c/0x90 [ 39.818047][ T353] ? do_syscall_64+0x3d/0xb0 [ 39.822569][ T353] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.828470][ T353] ? __kasan_kmalloc+0x9/0x10 [ 39.832982][ T353] ? memset+0x35/0x40 [ 39.836925][ T353] ? bpf_obj_name_cpy+0x196/0x1e0 [ 39.841775][ T353] bpf_prog_load+0x12ac/0x1b50 [ 39.846375][ T353] ? map_freeze+0x370/0x370 [ 39.850720][ T353] ? selinux_bpf+0xcb/0x100 [ 39.855051][ T353] ? security_bpf+0x82/0xb0 [ 39.859393][ T353] __sys_bpf+0x4bc/0x760 [ 39.863472][ T353] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 39.868681][ T353] ? debug_smp_processor_id+0x17/0x20 [ 39.873885][ T353] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 39.879789][ T353] __x64_sys_bpf+0x7c/0x90 [ 39.884041][ T353] do_syscall_64+0x3d/0xb0 [ 39.888292][ T353] ? sysvec_call_function_single+0x52/0xb0 [ 39.893933][ T353] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.899662][ T353] RIP: 0033:0x7fd3a084aba9 [ 39.903918][ T353] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 39.923357][ T353] RSP: 002b:00007fd3a03cd0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.931618][ T353] RAX: ffffffffffffffda RBX: 00007fd3a0969f80 RCX: 00007fd3a084aba9 [ 39.939608][ T353] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 39.947584][ T353] RBP: 00007fd3a089647a R08: 0000000000000000 R09: 0000000000000000 [ 39.955314][ T353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 39.963124][ T353] R13: 000000000000000b R14: 00007fd3a0969f80 R15: 00007ffe38369618 [ 39.970938][ T353] [ 39.975302][ T353] ================================================================================ [ 39.984500][ T353] ================================================================================ [ 39.993751][ T353] UBSAN: shift-out-of-bounds in kernel/bpf/verifier.c:7985:63 [ 40.001211][ T353] shift exponent 1073741824 is too large for 32-bit type 's32' (aka 'int') [ 40.009786][ T353] CPU: 0 PID: 353 Comm: syz-executor.0 Not tainted 5.15.141-syzkaller-1068904-g28e3f5851a99 #0 [ 40.019916][ T353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 40.029812][ T353] Call Trace: [ 40.032936][ T353] [ 40.035713][ T353] dump_stack_lvl+0x151/0x1b7 [ 40.040225][ T353] ? io_uring_drop_tctx_refs+0x190/0x190 [ 40.045779][ T353] ? stack_trace_snprint+0xf0/0xf0 [ 40.050725][ T353] dump_stack+0x15/0x17 [ 40.054718][ T353] __ubsan_handle_shift_out_of_bounds+0x3bf/0x420 [ 40.060971][ T353] scalar32_min_max_arsh+0x676/0x6c0 [ 40.066089][ T353] ? adjust_reg_min_max_vals+0x7b6/0x6360 [ 40.071645][ T353] adjust_reg_min_max_vals+0x3d1d/0x6360 [ 40.077113][ T353] ? reg_bounds_sync+0xf90/0xf90 [ 40.081893][ T353] ? check_stack_access_within_bounds+0x670/0x670 [ 40.088136][ T353] ? check_reg_arg+0x42a/0x820 [ 40.092733][ T353] do_check+0x94d9/0xf2c0 [ 40.096908][ T353] ? mark_reg_unknown+0x600/0x600 [ 40.101763][ T353] ? mark_reg_not_init+0x93/0x670 [ 40.106632][ T353] ? memcpy+0x56/0x70 [ 40.110474][ T353] ? btf_check_subprog_arg_match+0x181/0x2f0 [ 40.116262][ T353] do_check_common+0x909/0x1290 [ 40.121076][ T353] bpf_check+0x37bf/0x12b20 [ 40.125417][ T353] ? is_bpf_text_address+0x172/0x190 [ 40.130590][ T353] ? stack_trace_save+0x1c0/0x1c0 [ 40.136175][ T353] ? __kernel_text_address+0x9b/0x110 [ 40.141379][ T353] ? unwind_get_return_address+0x4d/0x90 [ 40.146849][ T353] ? bpf_get_btf_vmlinux+0x20/0x20 [ 40.151796][ T353] ? __kasan_check_write+0x14/0x20 [ 40.156740][ T353] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 40.162035][ T353] ? _raw_spin_lock+0x1b0/0x1b0 [ 40.166720][ T353] ? stack_trace_save+0x113/0x1c0 [ 40.171582][ T353] ? stack_trace_snprint+0xf0/0xf0 [ 40.176551][ T353] ? stack_trace_snprint+0xf0/0xf0 [ 40.181501][ T353] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 40.187297][ T353] ? __stack_depot_save+0x40d/0x470 [ 40.192326][ T353] ? ____kasan_kmalloc+0xed/0x110 [ 40.197182][ T353] ? ____kasan_kmalloc+0xdb/0x110 [ 40.202045][ T353] ? __kasan_kmalloc+0x9/0x10 [ 40.206574][ T353] ? kmem_cache_alloc_trace+0x115/0x210 [ 40.212105][ T353] ? selinux_bpf_prog_alloc+0x51/0x140 [ 40.217388][ T353] ? security_bpf_prog_alloc+0x62/0x90 [ 40.222693][ T353] ? bpf_prog_load+0x9ee/0x1b50 [ 40.227371][ T353] ? __sys_bpf+0x4bc/0x760 [ 40.231619][ T353] ? __x64_sys_bpf+0x7c/0x90 [ 40.236045][ T353] ? do_syscall_64+0x3d/0xb0 [ 40.240474][ T353] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.246396][ T353] ? __kasan_kmalloc+0x9/0x10 [ 40.250890][ T353] ? memset+0x35/0x40 [ 40.254709][ T353] ? bpf_obj_name_cpy+0x196/0x1e0 [ 40.259570][ T353] bpf_prog_load+0x12ac/0x1b50 [ 40.264172][ T353] ? map_freeze+0x370/0x370 [ 40.268534][ T353] ? selinux_bpf+0xcb/0x100 [ 40.272846][ T353] ? security_bpf+0x82/0xb0 [ 40.277185][ T353] __sys_bpf+0x4bc/0x760 [ 40.281267][ T353] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 40.286477][ T353] ? debug_smp_processor_id+0x17/0x20 [ 40.291686][ T353] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 40.297975][ T353] __x64_sys_bpf+0x7c/0x90 [ 40.302228][ T353] do_syscall_64+0x3d/0xb0 [ 40.306472][ T353] ? sysvec_call_function_single+0x52/0xb0 [ 40.312115][ T353] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.317850][ T353] RIP: 0033:0x7fd3a084aba9 [ 40.322100][ T353] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 40.341535][ T353] RSP: 002b:00007fd3a03cd0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.349782][ T353] RAX: ffffffffffffffda RBX: 00007fd3a0969f80 RCX: 00007fd3a084aba9 [ 40.357593][ T353] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 40.365580][ T353] RBP: 00007fd3a089647a R08: 0000000000000000 R09: 0000000000000000 [ 40.373388][ T353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.381202][ T353] R13: 000000000000000b R14: 00007fd3a0969f80 R15: 00007ffe38369618 [ 40.389015][ T353] [ 40.394549][ T353] ================================================================================ [ 40.451405][ T30] audit: type=1400 audit(1704041793.338:166): avc: denied { prog_run } for pid=355 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2023/12/31 16:56:36 executed programs: 85 2023/12/31 16:56:42 executed programs: 201