Warning: Permanently added '10.128.1.82' (ED25519) to the list of known hosts. 2024/03/11 04:27:57 ignoring optional flag "sandboxArg"="0" 2024/03/11 04:27:57 parsed 1 programs 2024/03/11 04:27:57 executed programs: 0 [ 46.985440][ T26] audit: type=1400 audit(1710131277.546:161): avc: denied { getattr } for pid=2104 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.009201][ T26] audit: type=1400 audit(1710131277.546:162): avc: denied { read } for pid=2104 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.030563][ T26] audit: type=1400 audit(1710131277.546:163): avc: denied { open } for pid=2104 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.053916][ T26] audit: type=1400 audit(1710131277.576:164): avc: denied { mounton } for pid=2109 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 47.078743][ T26] audit: type=1400 audit(1710131277.576:165): avc: denied { mount } for pid=2109 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 47.102017][ T26] audit: type=1400 audit(1710131277.576:166): avc: denied { write } for pid=2109 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 47.122520][ T26] audit: type=1400 audit(1710131277.576:167): avc: denied { read } for pid=2109 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 47.142836][ T26] audit: type=1400 audit(1710131277.626:168): avc: denied { read } for pid=1423 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 47.163853][ T26] audit: type=1400 audit(1710131277.626:169): avc: denied { read } for pid=1423 comm="dhcpcd" name="n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 47.185275][ T26] audit: type=1400 audit(1710131277.626:170): avc: denied { open } for pid=1423 comm="dhcpcd" path="/run/udev/data/n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 211.036642][ T28] INFO: task syz-executor.0:2112 blocked for more than 143 seconds. [ 211.044726][ T28] Not tainted 6.8.0-syzkaller #0 [ 211.050200][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 211.058863][ T28] task:syz-executor.0 state:D stack:12168 pid:2112 tgid:2112 ppid:1 flags:0x00000006 [ 211.069005][ T28] Call Trace: [ 211.072261][ T28] [ 211.075164][ T28] __schedule+0x3ba/0xa20 [ 211.079483][ T28] schedule+0x30/0xf0 [ 211.083436][ T28] schedule_preemptclient_loop: send disconnect: Broken pipe