Warning: Permanently added '10.128.1.114' (ED25519) to the list of known hosts. 2023/11/02 20:33:59 fuzzer started 2023/11/02 20:33:59 dialing manager at 10.128.0.163:30003 [ 20.873644][ T24] audit: type=1400 audit(1698957239.249:66): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.896464][ T24] audit: type=1400 audit(1698957239.279:67): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.897841][ T283] cgroup: Unknown subsys name 'net' [ 20.923909][ T24] audit: type=1400 audit(1698957239.299:68): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.924028][ T283] cgroup: Unknown subsys name 'devices' [ 21.068248][ T283] cgroup: Unknown subsys name 'hugetlb' [ 21.073827][ T283] cgroup: Unknown subsys name 'rlimit' [ 21.168719][ T24] audit: type=1400 audit(1698957239.549:69): avc: denied { mounton } for pid=283 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.195801][ T24] audit: type=1400 audit(1698957239.549:70): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.218921][ T24] audit: type=1400 audit(1698957239.549:71): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.224006][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.250448][ T24] audit: type=1400 audit(1698957239.639:72): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.276299][ T24] audit: type=1400 audit(1698957239.659:73): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.310564][ T24] audit: type=1400 audit(1698957239.689:74): avc: denied { read } for pid=283 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.310631][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2023/11/02 20:33:59 syscalls: 129 2023/11/02 20:33:59 code coverage: enabled 2023/11/02 20:33:59 comparison tracing: enabled 2023/11/02 20:33:59 extra coverage: enabled 2023/11/02 20:33:59 delay kcov mmap: mmap returned an invalid pointer 2023/11/02 20:33:59 setuid sandbox: enabled 2023/11/02 20:33:59 namespace sandbox: enabled 2023/11/02 20:33:59 Android sandbox: enabled 2023/11/02 20:33:59 fault injection: enabled 2023/11/02 20:33:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/11/02 20:33:59 net packet injection: enabled 2023/11/02 20:33:59 net device setup: enabled 2023/11/02 20:33:59 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2023/11/02 20:33:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/11/02 20:33:59 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/11/02 20:33:59 USB emulation: enabled 2023/11/02 20:33:59 hci packet injection: /dev/vhci does not exist 2023/11/02 20:33:59 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/11/02 20:33:59 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2023/11/02 20:33:59 swap file: enabled [ 21.344608][ T24] audit: type=1400 audit(1698957239.689:75): avc: denied { open } for pid=283 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2023/11/02 20:33:59 fetching corpus: 50, signal 21240/23031 (executing program) 2023/11/02 20:33:59 fetching corpus: 100, signal 27600/31053 (executing program) 2023/11/02 20:34:00 fetching corpus: 150, signal 32529/37549 (executing program) 2023/11/02 20:34:00 fetching corpus: 200, signal 35379/41902 (executing program) 2023/11/02 20:34:00 fetching corpus: 250, signal 38835/46808 (executing program) 2023/11/02 20:34:00 fetching corpus: 300, signal 41768/51144 (executing program) 2023/11/02 20:34:00 fetching corpus: 350, signal 43914/54708 (executing program) 2023/11/02 20:34:00 fetching corpus: 400, signal 46435/58587 (executing program) 2023/11/02 20:34:00 fetching corpus: 450, signal 48716/62146 (executing program) 2023/11/02 20:34:00 fetching corpus: 500, signal 50554/65290 (executing program) 2023/11/02 20:34:00 fetching corpus: 550, signal 52949/68901 (executing program) 2023/11/02 20:34:00 fetching corpus: 600, signal 54650/71862 (executing program) 2023/11/02 20:34:00 fetching corpus: 650, signal 56100/74523 (executing program) 2023/11/02 20:34:01 fetching corpus: 700, signal 57725/77322 (executing program) 2023/11/02 20:34:01 fetching corpus: 750, signal 59079/79902 (executing program) 2023/11/02 20:34:01 fetching corpus: 800, signal 60044/82095 (executing program) 2023/11/02 20:37:01 SYZFATAL: Manager.Poll call failed: read tcp 10.128.1.114:52080->10.128.0.163:30003: i/o timeout