Warning: Permanently added '10.128.0.237' (ECDSA) to the list of known hosts. 2022/04/25 18:45:08 parsed 1 programs [ 37.179753][ T22] audit: type=1400 audit(1650912308.710:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 37.197231][ T303] cgroup1: Unknown subsys name 'net' [ 37.203312][ T22] audit: type=1400 audit(1650912308.710:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 37.208766][ T303] cgroup1: Unknown subsys name 'net_prio' [ 37.229876][ T22] audit: type=1400 audit(1650912308.710:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 37.235597][ T303] cgroup1: Unknown subsys name 'devices' [ 37.258559][ T22] audit: type=1400 audit(1650912308.710:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 37.264499][ T303] cgroup1: Unknown subsys name 'blkio' [ 37.287034][ T22] audit: type=1400 audit(1650912308.710:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 37.315583][ T22] audit: type=1400 audit(1650912308.710:78): avc: denied { mounton } for pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 37.338181][ T22] audit: type=1400 audit(1650912308.710:79): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.360230][ T22] audit: type=1400 audit(1650912308.830:80): avc: denied { unmount } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.451418][ T303] cgroup1: Unknown subsys name 'hugetlb' [ 37.457261][ T303] cgroup1: Unknown subsys name 'rlimit' 2022/04/25 18:45:09 executed programs: 0 [ 37.520993][ T22] audit: type=1400 audit(1650912309.050:81): avc: denied { mounton } for pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.546477][ T22] audit: type=1400 audit(1650912309.080:82): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.599504][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.606516][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.614302][ T307] device bridge_slave_0 entered promiscuous mode [ 37.621079][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.628070][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.635436][ T307] device bridge_slave_1 entered promiscuous mode [ 37.671749][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.678765][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.686041][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.693059][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.712457][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.719600][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.726766][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.734937][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.744003][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.752141][ T67] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.759153][ T67] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.779804][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.788093][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.796299][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.803314][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.811302][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.819213][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.828340][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.840250][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.855220][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.863975][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.896775][ T314] EXT4-fs (sda1): re-mounted. Opts: (null) [ 37.979807][ T307] syz-executor.0 (307) used greatest stack depth: 25232 bytes left [ 38.689601][ T7] device bridge_slave_1 left promiscuous mode [ 38.695734][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.703192][ T7] device bridge_slave_0 left promiscuous mode [ 38.709372][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 2022/04/25 18:45:20 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir1591905407: read-only file system