[ 24.928504][ T29] audit: type=1400 audit(1725162900.990:84): avc: denied { mounton } for pid=2944 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.928507][ T29] audit: type=1400 audit(1725162900.990:85): avc: denied { mount } for pid=2944 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.929131][ T29] audit: type=1400 audit(1725162901.010:86): avc: denied { read } for pid=2576 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 25.071125][ T29] audit: type=1400 audit(1725162901.010:87): avc: denied { append } for pid=2576 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 25.094386][ T29] audit: type=1400 audit(1725162901.010:88): avc: denied { open } for pid=2576 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 25.205270][ T2944] cgroup: Unknown subsys name 'rlimit' [ 25.383307][ T2945] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.233279][ T2944] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.696926][ T2952] veth0_vlan: entered promiscuous mode [ 26.916036][ T38] veth0_vlan: left promiscuous mode Warning: Permanently added '10.128.1.247' (ED25519) to the list of known hosts. 2024/09/01 03:55:20 ignoring optional flag "sandboxArg"="0" 2024/09/01 03:55:20 parsed 1 programs [ 44.223100][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 44.223105][ T29] audit: type=1400 audit(1725162920.300:112): avc: denied { create } for pid=3147 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.250051][ T29] audit: type=1400 audit(1725162920.300:113): avc: denied { write } for pid=3147 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.270789][ T29] audit: type=1400 audit(1725162920.300:114): avc: denied { read } for pid=3147 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.313669][ T29] audit: type=1400 audit(1725162920.390:115): avc: denied { unlink } for pid=3147 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/09/01 03:55:21 executed programs: 0 [ 45.261922][ T3147] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.285039][ T29] audit: type=1400 audit(1725162921.360:116): avc: denied { mounton } for pid=3155 comm="syz-executor.2" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 46.853460][ T3161] veth0_vlan: entered promiscuous mode [ 46.907722][ T3156] veth0_vlan: entered promiscuous mode [ 46.958502][ T3155] veth0_vlan: entered promiscuous mode [ 46.971705][ T3166] veth0_vlan: entered promiscuous mode [ 46.986555][ T3167] veth0_vlan: entered promiscuous mode [ 47.358993][ T29] audit: type=1400 audit(1725162923.430:117): avc: denied { prog_load } for pid=4017 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.378439][ T29] audit: type=1400 audit(1725162923.430:118): avc: denied { bpf } for pid=4017 comm="syz-executor.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.399402][ T29] audit: type=1400 audit(1725162923.430:119): avc: denied { perfmon } for pid=4017 comm="syz-executor.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.420548][ T29] audit: type=1400 audit(1725162923.430:120): avc: denied { prog_run } for pid=4017 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 147.363540][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 147.370510][ C1] rcu: (detected by 1, t=10002 jiffies, g=1701, q=1035 ncpus=2) [ 147.378379][ C1] rcu: All QSes seen, last rcu_preempt kthread activity 9994 (4294951961-4294941967), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 147.391795][ C1] rcu: rcu_preempt kthread starved for 9995 jiffies! g1701 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 147.402804][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 147.412903][ C1] rcu: RCU grace-period kthread stack dump: [ 147.418950][ C1] task:rcu_preempt state:R running task stack:14680 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 147.430743][ C1] Call Trace: [ 147.434167][ C1] [ 147.437089][ C1] __schedule+0x3d7/0xa10 [ 147.441424][ C1] schedule+0x25/0x110 [ 147.445652][ C1] schedule_timeout+0xc1/0x140 [ 147.450386][ C1] ? __pfx_process_timeout+0x10/0x10 [ 147.455684][ C1] rcu_gp_fqs_loop+0x13b/0x500 [ 147.460435][ C1] ? do_raw_spin_unlock+0x52/0xc0 [ 147.465428][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 147.470597][ C1] rcu_gp_kthread+0xc7/0x160 [ 147.475236][ C1] kthread+0xd6/0x100 [ 147.479190][ C1] ? __pfx_kthread+0x10/0x10 [ 147.483748][ C1] ret_from_fork+0x2c/0x50 [ 147.488310][ C1] ? __pfx_kthread+0x10/0x10 [ 147.492865][ C1] ret_from_fork_asm+0x1a/0x30 [ 147.497630][ C1] [ 147.500623][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 147.506932][ C1] Sending NMI from CPU 1 to CPUs 0: [ 147.512122][ C0] NMI backtrace for cpu 0 [ 147.512141][ C0] CPU: 0 UID: 0 PID: 4018 Comm: syz-executor.1 Not tainted 6.11.0-rc5-syzkaller #0 [ 147.512145][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 147.512147][ C0] RIP: 0010:skb_release_data+0x9/0x1c0 [ 147.512157][ C0] Code: e8 ec 87 52 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 57 41 56 41 55 41 89 f5 <41> 54 55 48 89 fd 53 0f b6 47 7e 44 8b b7 c0 00 00 00 4c 03 b7 c8 [ 147.512159][ C0] RSP: 0018:ffffc90000003d70 EFLAGS: 00000282 [ 147.512162][ C0] RAX: 0000000000000000 RBX: ffff888114edb200 RCX: 000000000000002e [ 147.512165][ C0] RDX: 0000000000000002 RSI: 0000000000000002 RDI: ffff888114edb200 [ 147.512167][ C0] RBP: 000000000003110c R08: 0000000000000000 R09: 0000000000000040 [ 147.512168][ C0] R10: 0000000000000001 R11: ffffc90000003ff8 R12: ffff88816fa84000 [ 147.512170][ C0] R13: 0000000000000002 R14: ffff88816fa84000 R15: 0000000000000004 [ 147.512171][ C0] FS: 00007f14932c46c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 147.512176][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 147.512178][ C0] CR2: 00007f14925a8000 CR3: 0000000177c9c000 CR4: 00000000003506f0 [ 147.512180][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 147.512181][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 147.512182][ C0] Call Trace: [ 147.512185][ C0] [ 147.512187][ C0] ? nmi_cpu_backtrace+0x8f/0x110 [ 147.512191][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 147.512196][ C0] ? nmi_handle+0xb8/0x1a0 [ 147.512200][ C0] ? skb_release_data+0x9/0x1c0 [ 147.512204][ C0] ? default_do_nmi+0x69/0x2f0 [ 147.512207][ C0] ? exc_nmi+0x152/0x190 [ 147.512210][ C0] ? end_repeat_nmi+0xf/0x53 [ 147.512215][ C0] ? skb_release_data+0x9/0x1c0 [ 147.512219][ C0] ? skb_release_data+0x9/0x1c0 [ 147.512222][ C0] ? skb_release_data+0x9/0x1c0 [ 147.512226][ C0] [ 147.512227][ C0] [ 147.512228][ C0] sk_skb_reason_drop+0x69/0x160 [ 147.512230][ C0] llc_rcv+0x221/0x340 [ 147.512236][ C0] ? process_backlog+0xbb/0x3f0 [ 147.512239][ C0] __netif_receive_skb_one_core+0x88/0xa0 [ 147.512242][ C0] process_backlog+0x157/0x3f0 [ 147.512245][ C0] ? process_backlog+0xbb/0x3f0 [ 147.512248][ C0] __napi_poll+0x25/0x1e0 [ 147.512251][ C0] net_rx_action+0x30c/0x3f0 [ 147.512254][ C0] ? find_held_lock+0x2b/0x80 [ 147.512260][ C0] handle_softirqs+0x14d/0x340 [ 147.512264][ C0] do_softirq+0x77/0xa0 [ 147.512267][ C0] [ 147.512268][ C0] [ 147.512269][ C0] __local_bh_enable_ip+0x5d/0x60 [ 147.512271][ C0] bpf_test_run+0x12b/0x2e0 [ 147.512277][ C0] bpf_prog_test_run_skb+0x36d/0x7f0 [ 147.512281][ C0] __sys_bpf+0x9c7/0x2520 [ 147.512287][ C0] ? futex_wait+0x20/0x120 [ 147.512292][ C0] __x64_sys_bpf+0x19/0x30 [ 147.512294][ C0] do_syscall_64+0x6d/0x1a0 [ 147.512299][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 147.512303][ C0] RIP: 0033:0x7f149247dca9 [ 147.512314][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 147.512316][ C0] RSP: 002b:00007f14932c40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 147.512318][ C0] RAX: ffffffffffffffda RBX: 00007f14925abf80 RCX: 00007f149247dca9 [ 147.512320][ C0] RDX: 0000000000000050 RSI: 0000000020000080 RDI: 000000000000000a [ 147.512322][ C0] RBP: 00007f14924c947e R08: 0000000000000000 R09: 0000000000000000 [ 147.512323][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 147.512325][ C0] R13: 000000000000000b R14: 00007f14925abf80 R15: 00007ffc0f9fb4a8 [ 147.512327][ C0]