audit: type=1400 audit(1657868166.972:273): avc: denied { relabelto } for pid=7598 comm="syz-executor.7" name="NETLINK" dev="sockfs" ino=24379 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=netlink_route_socket permissive=1 trawcon=EA49C5EE5B2C7F1584605920CEC9CA2127307F9556F5A111110F9209CF857B81C20ACFC688144F83440640747C4CBA0C87446475A2311AA0D7436255FE8B0CB99092E7B56D39A7D0356187F02D18F6E65D85B67E9F45572F3ACA1720CBC3EE6253259B4DBBCEA7 INFO: task syz-executor.3:7562 blocked for more than 143 seconds. Not tainted 5.10.123 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.3 state:D stack:26512 pid: 7562 ppid: 289 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:3792 [inline] __schedule+0x848/0x1e80 kernel/sched/core.c:4541 schedule+0xcb/0x270 kernel/sched/core.c:4619 __io_uring_task_cancel+0x1ae/0x250 fs/io_uring.c:8891 io_uring_task_cancel include/linux/io_uring.h:46 [inline] bprm_execve+0x114/0x1b00 fs/exec.c:1791 do_execveat_common+0x765/0x8c0 fs/exec.c:1937 do_execveat fs/exec.c:2018 [inline] __do_sys_execveat fs/exec.c:2094 [inline] __se_sys_execveat fs/exec.c:2086 [inline] __x64_sys_execveat+0xed/0x130 fs/exec.c:2086 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7fcbea9e4b19 RSP: 002b:00007fcbe7f5a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 RAX: ffffffffffffffda RBX: 00007fcbeaaf7f60 RCX: 00007fcbea9e4b19 RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffffff RBP: 00007fcbeaa3ef6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc9edb93ef R14: 00007fcbe7f5a300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/23: #0: ffffffff84df7460 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x269 kernel/locking/lockdep.c:6389 2 locks held by in:imklog/177: =============================================