Warning: Permanently added '10.128.0.202' (ECDSA) to the list of known hosts. 2022/10/02 00:13:58 ignoring optional flag "sandboxArg"="0" 2022/10/02 00:13:59 parsed 1 programs [ 48.734374][ T23] audit: type=1400 audit(1664669639.010:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.737829][ T23] audit: type=1400 audit(1664669639.010:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.740912][ T23] audit: type=1400 audit(1664669639.010:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.745351][ T23] audit: type=1400 audit(1664669639.010:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.747752][ T304] cgroup1: Unknown subsys name 'net' [ 48.748925][ T23] audit: type=1400 audit(1664669639.010:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.749704][ T304] cgroup1: Unknown subsys name 'net_prio' [ 48.752606][ T23] audit: type=1400 audit(1664669639.020:78): avc: denied { mounton } for pid=304 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 48.753643][ T304] cgroup1: Unknown subsys name 'devices' [ 48.766331][ T23] audit: type=1400 audit(1664669639.020:79): avc: denied { mount } for pid=304 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.771754][ T304] cgroup1: Unknown subsys name 'blkio' [ 48.799877][ T23] audit: type=1400 audit(1664669639.070:80): avc: denied { unmount } for pid=304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.905567][ T304] cgroup1: Unknown subsys name 'hugetlb' [ 48.911443][ T304] cgroup1: Unknown subsys name 'rlimit' 2022/10/02 00:13:59 executed programs: 0 [ 49.034692][ T23] audit: type=1400 audit(1664669639.310:81): avc: denied { mounton } for pid=304 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 49.059554][ T23] audit: type=1400 audit(1664669639.330:82): avc: denied { mount } for pid=304 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 49.111988][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.119193][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.126677][ T309] device bridge_slave_0 entered promiscuous mode [ 49.133503][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.140497][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.147904][ T309] device bridge_slave_1 entered promiscuous mode [ 49.186470][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.193501][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.200734][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.207745][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.227499][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.234653][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.241831][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.250030][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.259033][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.267169][ T68] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.274183][ T68] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.283776][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.291856][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.298878][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.310102][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.319476][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.343535][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.352105][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.360672][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.368845][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.386216][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.410638][ T315] EXT4-fs (sda1): re-mounted. Opts: (null) [ 49.533535][ T309] syz-executor.0 (309) used greatest stack depth: 25616 bytes left [ 50.223365][ T7] device bridge_slave_1 left promiscuous mode [ 50.229509][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.237127][ T7] device bridge_slave_0 left promiscuous mode [ 50.243427][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 2022/10/02 00:14:10 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir2079000825: read-only file system