[ 3.196260][ T30] audit: type=1400 audit(1680172980.300:8): avc: denied { create } for pid=80 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.197044][ T82] acpid (82) used greatest stack depth: 23344 bytes left [ 3.202465][ T30] audit: type=1400 audit(1680172980.300:9): avc: denied { append open } for pid=80 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.209499][ T30] audit: type=1400 audit(1680172980.300:10): avc: denied { getattr } for pid=80 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.496348][ T97] udevd[97]: starting version 3.2.10 [ 3.552174][ T98] udevd[98]: starting eudev-3.2.10 [ 11.011224][ T30] kauditd_printk_skb: 49 callbacks suppressed [ 11.011235][ T30] audit: type=1400 audit(1680172988.130:60): avc: denied { transition } for pid=230 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.018463][ T30] audit: type=1400 audit(1680172988.130:61): avc: denied { write } for pid=230 comm="sh" path="pipe:[13347]" dev="pipefs" ino=13347 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 12.104379][ T231] sshd (231) used greatest stack depth: 22480 bytes left Warning: Permanently added '10.128.1.80' (ECDSA) to the list of known hosts. 2023/03/30 10:43:46 ignoring optional flag "sandboxArg"="0" 2023/03/30 10:43:46 parsed 1 programs [ 49.827803][ T30] audit: type=1400 audit(1680173026.940:62): avc: denied { integrity } for pid=346 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 49.835255][ T30] audit: type=1400 audit(1680173026.940:63): avc: denied { getattr } for pid=346 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 49.843008][ T30] audit: type=1400 audit(1680173026.940:64): avc: denied { read } for pid=346 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 49.851253][ T351] cgroup: Unknown subsys name 'net' [ 49.853077][ T30] audit: type=1400 audit(1680173026.940:65): avc: denied { open } for pid=346 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 49.880865][ T30] audit: type=1400 audit(1680173026.950:66): avc: denied { read } for pid=346 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.881027][ T351] cgroup: Unknown subsys name 'devices' [ 49.903722][ T30] audit: type=1400 audit(1680173026.950:67): avc: denied { open } for pid=346 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.932093][ T30] audit: type=1400 audit(1680173026.960:68): avc: denied { mounton } for pid=351 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 49.954554][ T30] audit: type=1400 audit(1680173026.960:69): avc: denied { mount } for pid=351 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.976593][ T30] audit: type=1400 audit(1680173026.970:70): avc: denied { unmount } for pid=351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 50.112897][ T351] cgroup: Unknown subsys name 'hugetlb' [ 50.118379][ T351] cgroup: Unknown subsys name 'rlimit' 2023/03/30 10:43:47 executed programs: 0 [ 50.213043][ T30] audit: type=1400 audit(1680173027.330:71): avc: denied { mounton } for pid=351 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 50.273030][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.279878][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.287251][ T357] device bridge_slave_0 entered promiscuous mode [ 50.293922][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.300894][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.308084][ T357] device bridge_slave_1 entered promiscuous mode [ 50.354201][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.361089][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.368145][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.374964][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.395448][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.402566][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.409792][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.417290][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.426056][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.434050][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.440909][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.461735][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.470348][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.478577][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.485653][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.493764][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.501923][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.511721][ T357] device veth0_vlan entered promiscuous mode [ 50.518422][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.526569][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.533973][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.545725][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.554524][ T357] device veth1_macvtap entered promiscuous mode [ 50.566899][ T62] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.575323][ T62] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.612486][ T365] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 50.692695][ T357] syz-executor.0 (357) used greatest stack depth: 20768 bytes left [ 51.313201][ T10] device bridge_slave_1 left promiscuous mode [ 51.319146][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.326688][ T10] device bridge_slave_0 left promiscuous mode [ 51.332862][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.340622][ T10] device veth1_macvtap left promiscuous mode [ 51.346634][ T10] device veth0_vlan left promiscuous mode 2023/03/30 10:43:58 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir1532538556: read-only file system