Warning: Permanently added '10.128.0.209' (ECDSA) to the list of known hosts. 2022/09/25 02:46:37 ignoring optional flag "sandboxArg"="0" 2022/09/25 02:46:38 parsed 1 programs [ 38.694115][ T22] audit: type=1400 audit(1664073998.089:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.714120][ T303] cgroup1: Unknown subsys name 'net' [ 38.717819][ T22] audit: type=1400 audit(1664073998.099:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.723102][ T303] cgroup1: Unknown subsys name 'net_prio' [ 38.744706][ T22] audit: type=1400 audit(1664073998.099:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.751122][ T303] cgroup1: Unknown subsys name 'devices' [ 38.773907][ T22] audit: type=1400 audit(1664073998.099:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=10083 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.779809][ T303] cgroup1: Unknown subsys name 'blkio' [ 38.802582][ T22] audit: type=1400 audit(1664073998.099:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=10083 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.831205][ T22] audit: type=1400 audit(1664073998.099:78): avc: denied { mounton } for pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.853836][ T22] audit: type=1400 audit(1664073998.099:79): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.875894][ T22] audit: type=1400 audit(1664073998.199:80): avc: denied { unmount } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.991716][ T303] cgroup1: Unknown subsys name 'hugetlb' [ 38.997686][ T303] cgroup1: Unknown subsys name 'rlimit' 2022/09/25 02:46:38 executed programs: 0 [ 39.090816][ T22] audit: type=1400 audit(1664073998.489:81): avc: denied { mounton } for pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.115535][ T22] audit: type=1400 audit(1664073998.489:82): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.157782][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.164844][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.172842][ T308] device bridge_slave_0 entered promiscuous mode [ 39.179875][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.186890][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.194623][ T308] device bridge_slave_1 entered promiscuous mode [ 39.235383][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.242429][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.249731][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.256747][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.276963][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.284249][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.292325][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.299924][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.309275][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.317414][ T118] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.324599][ T118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.333829][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.342198][ T67] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.349233][ T67] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.369946][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.378473][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.386605][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.406765][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.416007][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.425269][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.434099][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.477666][ T314] EXT4-fs (sda1): re-mounted. Opts: (null) [ 39.531321][ T308] syz-executor.0 (308) used greatest stack depth: 25264 bytes left [ 40.539489][ T92] device bridge_slave_1 left promiscuous mode [ 40.545960][ T92] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.553729][ T92] device bridge_slave_0 left promiscuous mode [ 40.560335][ T92] bridge0: port 1(bridge_slave_0) entered disabled state 2022/09/25 02:46:49 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir970248144: read-only file system