[ 30.362119][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.369894][ T10] device bridge_slave_0 left promiscuous mode [ 30.375974][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.383455][ T10] device veth1_macvtap left promiscuous mode [ 30.389277][ T10] device veth0_vlan left promiscuous mode [ 40.259543][ T30] kauditd_printk_skb: 71 callbacks suppressed [ 40.259552][ T30] audit: type=1400 audit(1686217946.489:147): avc: denied { transition } for pid=326 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 40.289873][ T30] audit: type=1400 audit(1686217946.499:148): avc: denied { noatsecure } for pid=326 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 40.310870][ T30] audit: type=1400 audit(1686217946.529:149): avc: denied { rlimitinh } for pid=326 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 40.331745][ T30] audit: type=1400 audit(1686217946.529:150): avc: denied { siginh } for pid=326 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.57' (ECDSA) to the list of known hosts. 2023/06/08 09:52:33 ignoring optional flag "sandboxArg"="0" 2023/06/08 09:52:33 parsed 1 programs [ 47.303318][ T30] audit: type=1400 audit(1686217953.529:151): avc: denied { mounton } for pid=347 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 2023/06/08 09:52:33 executed programs: 0 [ 47.331255][ T30] audit: type=1400 audit(1686217953.569:152): avc: denied { mount } for pid=347 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 47.383486][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.390488][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.398588][ T352] device bridge_slave_0 entered promiscuous mode [ 47.405684][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.413023][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.422258][ T352] device bridge_slave_1 entered promiscuous mode [ 47.452658][ T30] audit: type=1400 audit(1686217953.679:153): avc: denied { write } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 47.456379][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.473239][ T30] audit: type=1400 audit(1686217953.679:154): avc: denied { read } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 47.480339][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.480422][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.516048][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.531083][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.538511][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.546257][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.553835][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.562704][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.570960][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.578102][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.592782][ T352] device veth0_vlan entered promiscuous mode [ 47.599844][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.609013][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.617569][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.625007][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.633017][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.641746][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.649131][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.656960][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.665315][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.677796][ T352] device veth1_macvtap entered promiscuous mode [ 47.685395][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.696410][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.708772][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.720634][ T30] audit: type=1400 audit(1686217953.949:155): avc: denied { mounton } for pid=352 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 47.750650][ T30] audit: type=1400 audit(1686217953.979:156): avc: denied { write } for pid=356 comm="syz-executor.0" name="vga_arbiter" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 2023/06/08 09:53:29 executed programs: 97 [ 148.325038][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 148.331798][ C0] rcu: 1-...0: (1 GPs behind) idle=349/1/0x4000000000000000 softirq=3277/3309 fqs=5000 last_accelerate: 9d5e/c470 dyntick_enabled: 1 [ 148.345329][ C0] (detected by 0, t=10002 jiffies, g=1261, q=611) [ 148.351700][ C0] Sending NMI from CPU 0 to CPUs 1: [ 148.356718][ C1] NMI backtrace for cpu 1 [ 148.356728][ C1] CPU: 1 PID: 646 Comm: syz-executor.0 Not tainted 5.15.106-syzkaller #0 [ 148.356736][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 148.356739][ C1] RIP: 0010:kasan_check_range+0x12b/0x190 [ 148.356750][ C1] Code: 89 d8 4c 39 da 74 0f 80 3a 00 74 ef 4b 8d 44 25 00 48 85 d2 75 0b 48 89 da 48 29 c2 e9 51 ff ff ff 49 39 d2 75 19 49 0f be 02 <41> 83 e1 07 49 39 c1 7d 0c 5b b8 01 00 00 00 41 5c 41 5d 5d c3 44 [ 148.356755][ C1] RSP: 0018:ffffc90000757cc8 EFLAGS: 00000046 [ 148.356761][ C1] RAX: 0000000000000004 RBX: fffff520000eafa6 RCX: ffffffff84461cac [ 148.356764][ C1] RDX: fffff520000eafa5 RSI: 0000000000000004 RDI: ffffc90000757d28 [ 148.356767][ C1] RBP: ffffc90000757ce0 R08: 0000000000000001 R09: ffffc90000757d2b [ 148.356771][ C1] R10: fffff520000eafa5 R11: 0000000000000008 R12: fffff520000eafa5 [ 148.356773][ C1] R13: 0000000000000046 R14: dffffc0000000000 R15: ffff8881123f8c20 [ 148.356777][ C1] FS: 000055555576c400(0000) GS:ffff8881f7300000(0000) knlGS:0000000000000000 [ 148.356784][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 148.356787][ C1] CR2: 00007fdafe8c1718 CR3: 0000000122db6000 CR4: 00000000003506a0 [ 148.356790][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 148.356793][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 148.356795][ C1] Call Trace: [ 148.356798][ C1] [ 148.356802][ C1] __kasan_check_write+0x14/0x20 [ 148.356808][ C1] _raw_spin_lock_irqsave+0x8c/0x120 [ 148.356814][ C1] ? _raw_write_lock_irqsave+0xe0/0xe0 [ 148.356819][ C1] ? __kasan_check_write+0x14/0x20 [ 148.356822][ C1] ? _raw_spin_lock_irqsave+0x8c/0x120 [ 148.356827][ C1] ? _raw_write_lock_irqsave+0xe0/0xe0 [ 148.356831][ C1] ? fsnotify+0x1120/0x1120 [ 148.356838][ C1] vga_put+0x32/0xd0 [ 148.356844][ C1] vga_arb_release+0x1f1/0x370 [ 148.356849][ C1] __fput+0x1e3/0x960 [ 148.356855][ C1] ____fput+0x9/0x10 [ 148.356858][ C1] task_work_run+0xc2/0x150 [ 148.356865][ C1] exit_to_user_mode_prepare+0x140/0x150 [ 148.356871][ C1] syscall_exit_to_user_mode+0x21/0x40 [ 148.356876][ C1] do_syscall_64+0x42/0xb0 [ 148.356883][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 148.356887][ C1] RIP: 0033:0x7fdafed20fab [ 148.356894][ C1] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 148.356897][ C1] RSP: 002b:00007ffc0dca00c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 148.356902][ C1] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007fdafed20fab [ 148.356905][ C1] RDX: 00007fdafe8e3338 RSI: ffffffffffffffff RDI: 0000000000000003 [ 148.356908][ C1] RBP: 00007fdafee90980 R08: 0000000000000000 R09: 00007fdafe8e3000 [ 148.356910][ C1] R10: 00007fdafe8e3340 R11: 0000000000000293 R12: 000000000000bca3 [ 148.356913][ C1] R13: 00007ffc0dca01c0 R14: 00007fdafee8f050 R15: 0000000000000032 [ 148.356918][ C1]