syzkaller syzkaller login: [ 9.904554][ T105] udevd (105) used greatest stack depth: 22912 bytes left [ 14.844884][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 14.844899][ T30] audit: type=1400 audit(1747126788.869:59): avc: denied { transition } for pid=224 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.854901][ T30] audit: type=1400 audit(1747126788.869:60): avc: denied { noatsecure } for pid=224 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.860273][ T30] audit: type=1400 audit(1747126788.869:61): avc: denied { write } for pid=224 comm="sh" path="pipe:[14844]" dev="pipefs" ino=14844 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.874849][ T30] audit: type=1400 audit(1747126788.869:62): avc: denied { rlimitinh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.894105][ T30] audit: type=1400 audit(1747126788.869:63): avc: denied { siginh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 242.568127][ T270] sftp-server (270) used greatest stack depth: 21056 bytes left Warning: Permanently added '10.128.0.55' (ED25519) to the list of known hosts. 2025/05/13 09:03:43 ignoring optional flag "sandboxArg"="0" 2025/05/13 09:03:44 parsed 1 programs [ 250.139920][ T30] audit: type=1400 audit(1747127024.159:64): avc: denied { node_bind } for pid=282 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 251.074289][ T30] audit: type=1400 audit(1747127025.099:65): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 251.076067][ T290] cgroup: Unknown subsys name 'net' [ 251.097155][ T30] audit: type=1400 audit(1747127025.099:66): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 251.124819][ T30] audit: type=1400 audit(1747127025.119:67): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 251.125020][ T290] cgroup: Unknown subsys name 'devices' [ 251.265524][ T290] cgroup: Unknown subsys name 'hugetlb' [ 251.271188][ T290] cgroup: Unknown subsys name 'rlimit' [ 251.500840][ T30] audit: type=1400 audit(1747127025.519:68): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 251.524538][ T30] audit: type=1400 audit(1747127025.519:69): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.545271][ T30] audit: type=1400 audit(1747127025.519:70): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.552909][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 251.566045][ T30] audit: type=1400 audit(1747127025.519:71): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.595248][ T30] audit: type=1400 audit(1747127025.519:72): avc: denied { module_request } for pid=290 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 251.617475][ T30] audit: type=1400 audit(1747127025.529:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 251.648760][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 252.171868][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 252.351990][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.359165][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.366730][ T308] device bridge_slave_0 entered promiscuous mode [ 252.373747][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.380952][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.388507][ T308] device bridge_slave_1 entered promiscuous mode [ 252.445670][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.452774][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.460058][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.467125][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.490212][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.497576][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.505445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.513353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.522466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.530943][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.537997][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.547553][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.555767][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.562955][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.577334][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.586786][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.601565][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.613042][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.621267][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.629120][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.637751][ T308] device veth0_vlan entered promiscuous mode [ 252.651677][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.660980][ T308] device veth1_macvtap entered promiscuous mode [ 252.670700][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.681308][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.714810][ T308] syz-executor (308) used greatest stack depth: 20640 bytes left 2025/05/13 09:03:47 executed programs: 0 [ 253.520856][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.528324][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.535871][ T352] device bridge_slave_0 entered promiscuous mode [ 253.543503][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.550996][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.558599][ T352] device bridge_slave_1 entered promiscuous mode [ 253.616129][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.623196][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.630469][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.637526][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.647655][ T8] device bridge_slave_1 left promiscuous mode [ 253.653858][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.661596][ T8] device bridge_slave_0 left promiscuous mode [ 253.667920][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.676471][ T8] device veth1_macvtap left promiscuous mode [ 253.682656][ T8] device veth0_vlan left promiscuous mode [ 253.796762][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.804659][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.811917][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.821121][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.829773][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.836850][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.845631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.853857][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.860869][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.873776][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.883197][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.897197][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.909287][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.917615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.925319][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.934086][ T352] device veth0_vlan entered promiscuous mode [ 253.944315][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.953543][ T352] device veth1_macvtap entered promiscuous mode [ 253.963145][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.973713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 428.822665][ C0] BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 174s! [ 428.831626][ C0] Showing busy workqueues and worker pools: [ 428.837577][ C0] workqueue events: flags=0x0 [ 428.842310][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 428.842360][ C0] pending: vmstat_shepherd, psi_avgs_work, kfree_rcu_monitor [ 428.842435][ C0] workqueue events_power_efficient: flags=0x80 [ 428.863990][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 428.864040][ C0] pending: neigh_periodic_work, gc_worker, check_lifetime [ 428.864097][ C0] workqueue mm_percpu_wq: flags=0x8 [ 428.884409][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 428.884453][ C0] pending: vmstat_update [ 428.884484][ C0] workqueue kblockd: flags=0x18 [ 428.884625][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 428.884638][ T30] audit: type=1400 audit(1747127202.899:110): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 428.892120][ C0] pwq 1: cpus=0 node=0 flags=0x0 nice=-20 active=1/256 refcnt=2 [ 428.892159][ C0] pending: blk_mq_timeout_work [ 428.892201][ C0] workqueue mld: flags=0x40008 [ 428.947167][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/1 refcnt=14 [ 428.947216][ C0] pending: mld_ifc_work [ 428.947244][ C0] inactive: mld_ifc_work, mld_ifc_work, mld_ifc_work, mld_ifc_work, mld_dad_work, mld_ifc_work, mld_dad_work, mld_ifc_work, mld_ifc_work, mld_ifc_work, mld_ifc_work, mld_dad_work [ 428.947385][ C0] workqueue ipv6_addrconf: flags=0x40008 [ 428.983883][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/1 refcnt=22 [ 428.983931][ C0] pending: addrconf_dad_work [ 428.983960][ C0] inactive: addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_dad_work, addrconf_verify_work [ 428.984293][ C0] workqueue wg-kex-wg0: flags=0x24 [ 429.038587][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 429.038643][ C0] pending: wg_packet_handshake_receive_worker [ 429.038677][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 429.058039][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 429.058087][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker, wg_packet_decrypt_worker [ 429.058147][ C0] workqueue wg-kex-wg1: flags=0x24 [ 429.062713][ T30] audit: type=1400 audit(1747127202.899:111): avc: denied { search } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 429.065814][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 429.065861][ C0] pending: wg_packet_handshake_receive_worker [ 429.065892][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 429.121147][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=3/256 refcnt=4 [ 429.121198][ C0] pending: wg_packet_decrypt_worker, wg_packet_encrypt_worker, wg_packet_tx_worker [ 429.121259][ C0] workqueue wg-kex-wg2: flags=0x24 [ 429.143705][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256 refcnt=2 [ 429.143754][ C0] pending: wg_packet_handshake_receive_worker [ 429.143786][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 429.163152][ C0] pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=2/256 refcnt=3 [ 429.163203][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker [ 429.163250][ C0] pool 4: cpus=0-1 flags=0x4 nice=0 hung=0s workers=3 idle: 55 10 [ 429.412777][ T30] audit: type=1400 audit(1747127202.899:112): avc: denied { write } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 429.952685][ T30] audit: type=1400 audit(1747127202.899:113): avc: denied { add_name } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.512706][ T30] audit: type=1400 audit(1747127202.899:114): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 431.042672][ T30] audit: type=1400 audit(1747127202.899:115): avc: denied { append open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 431.642716][ T30] audit: type=1400 audit(1747127202.899:116): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1