[ 52.191463][ T29] audit: type=1400 audit(1777973633.069:116): avc: denied { write } for pid=5519 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1776 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 52.248876][ T29] audit: type=1400 audit(1777973633.119:117): avc: denied { write } for pid=5530 comm="rm" name="hook-state" dev="tmpfs" ino=1776 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 52.436447][ T29] audit: type=1400 audit(1777973633.309:118): avc: denied { write } for pid=5533 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1776 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 52.495557][ T29] audit: type=1400 audit(1777973633.369:119): avc: denied { write } for pid=5544 comm="rm" name="hook-state" dev="tmpfs" ino=1776 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 52.686465][ T29] audit: type=1400 audit(1777973633.559:120): avc: denied { write } for pid=5547 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1776 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 52.737943][ T29] audit: type=1400 audit(1777973633.609:121): avc: denied { write } for pid=5558 comm="rm" name="hook-state" dev="tmpfs" ino=1776 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 53.183825][ T29] audit: type=1400 audit(1777973634.059:122): avc: denied { transition } for pid=5566 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.206730][ T29] audit: type=1400 audit(1777973634.059:123): avc: denied { noatsecure } for pid=5566 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.226792][ T29] audit: type=1400 audit(1777973634.059:124): avc: denied { write } for pid=5566 comm="sh" path="pipe:[5298]" dev="pipefs" ino=5298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 53.251967][ T29] audit: type=1400 audit(1777973634.059:125): avc: denied { rlimitinh } for pid=5566 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.45' (ED25519) to the list of known hosts. [ 65.381670][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 65.381686][ T29] audit: type=1400 audit(1777973646.259:129): avc: denied { execmem } for pid=5612 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 65.407755][ T29] audit: type=1400 audit(1777973646.259:130): avc: denied { mounton } for pid=5613 comm="syz-executor116" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 65.429817][ T29] audit: type=1400 audit(1777973646.259:131): avc: denied { module_request } for pid=5613 comm="syz-executor116" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 65.452060][ T29] audit: type=1400 audit(1777973646.309:132): avc: denied { sys_module } for pid=5613 comm="syz-executor116" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 65.722017][ T5613] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.729488][ T5613] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.736684][ T5613] bridge_slave_0: entered allmulticast mode [ 65.743436][ T5613] bridge_slave_0: entered promiscuous mode [ 65.751793][ T5613] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.758885][ T5613] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.766195][ T5613] bridge_slave_1: entered allmulticast mode [ 65.772946][ T5613] bridge_slave_1: entered promiscuous mode [ 65.794613][ T5613] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.805629][ T5613] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.828621][ T5613] team0: Port device team_slave_0 added [ 65.835670][ T5613] team0: Port device team_slave_1 added [ 65.854376][ T5613] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.861328][ T5613] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.887460][ T5613] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.899237][ T5613] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.906228][ T5613] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.932176][ T5613] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.965861][ T5613] hsr_slave_0: entered promiscuous mode [ 65.972190][ T5613] hsr_slave_1: entered promiscuous mode [ 66.078306][ T29] audit: type=1400 audit(1777973646.949:133): avc: denied { create } for pid=5613 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.081608][ T5613] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 66.099119][ T29] audit: type=1400 audit(1777973646.949:134): avc: denied { write } for pid=5613 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.126508][ T29] audit: type=1400 audit(1777973646.949:135): avc: denied { read } for pid=5613 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.132835][ T5613] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 66.155608][ T5613] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 66.165416][ T5613] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 66.173194][ T5613] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 66.182398][ T5613] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 66.190288][ T5613] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 66.199492][ T5613] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 66.224091][ T5613] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.231357][ T5613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.238852][ T5613] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.245969][ T5613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.290078][ T5613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.306158][ T35] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.314269][ T35] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.327362][ T5613] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.338638][ T144] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.345710][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.358614][ T144] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.365698][ T144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.529045][ T5613] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.564213][ T5613] veth0_vlan: entered promiscuous mode [ 66.577755][ T5613] veth1_vlan: entered promiscuous mode [ 66.601520][ T5613] veth0_macvtap: entered promiscuous mode [ 66.611092][ T5613] veth1_macvtap: entered promiscuous mode [ 66.628211][ T5613] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.641072][ T5613] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.654326][ T48] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.663989][ T48] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.674135][ T48] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.683101][ T48] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.745821][ T48] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.754322][ T48] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.783189][ T1350] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.791077][ T1350] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.803148][ T29] audit: type=1400 audit(1777973647.679:136): avc: denied { mounton } for pid=5613 comm="syz-executor116" path="/root/syz-tmp" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 executing program executing program [ 66.826567][ T29] audit: type=1400 audit(1777973647.679:137): avc: denied { mount } for pid=5613 comm="syz-executor116" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.851902][ T29] audit: type=1400 audit(1777973647.679:138): avc: denied { mounton } for pid=5613 comm="syz-executor116" path="/root/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 executing program [ 73.099317][ C1] sched: DL replenish lagged too much executing program [ 84.198355][ T1216] cfg80211: failed to load regulatory.db executing program [ 286.387770][ T30] INFO: task kworker/0:0:9 blocked for more than 141 seconds. [ 286.424640][ T30] Not tainted syzkaller #0 [ 286.429592][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 294.103257][ T30] task:kworker/0:0 state:D stack:25944 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00080000