Warning: Permanently added '10.128.1.77' (ECDSA) to the list of known hosts. 2022/10/02 12:53:03 ignoring optional flag "sandboxArg"="0" 2022/10/02 12:53:03 parsed 1 programs [ 40.995545][ T23] audit: type=1400 audit(1664715183.359:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.999194][ T23] audit: type=1400 audit(1664715183.359:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.002229][ T23] audit: type=1400 audit(1664715183.359:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.005529][ T23] audit: type=1400 audit(1664715183.369:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.008893][ T23] audit: type=1400 audit(1664715183.369:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.014225][ T23] audit: type=1400 audit(1664715183.379:78): avc: denied { mounton } for pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 41.015624][ T303] cgroup1: Unknown subsys name 'net' [ 41.026477][ T23] audit: type=1400 audit(1664715183.379:79): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.031779][ T303] cgroup1: Unknown subsys name 'net_prio' [ 41.059655][ T303] cgroup1: Unknown subsys name 'devices' [ 41.065481][ T303] cgroup1: Unknown subsys name 'blkio' [ 41.071640][ T23] audit: type=1400 audit(1664715183.439:80): avc: denied { unmount } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.208354][ T303] cgroup1: Unknown subsys name 'hugetlb' [ 41.214218][ T303] cgroup1: Unknown subsys name 'rlimit' 2022/10/02 12:53:03 executed programs: 0 [ 41.307960][ T23] audit: type=1400 audit(1664715183.679:81): avc: denied { mounton } for pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.334764][ T23] audit: type=1400 audit(1664715183.679:82): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 41.372931][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.379981][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.387788][ T308] device bridge_slave_0 entered promiscuous mode [ 41.394542][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.401573][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.408974][ T308] device bridge_slave_1 entered promiscuous mode [ 41.448286][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.455335][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.462621][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.469639][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.489420][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.496599][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.503776][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.512085][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.521681][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.529787][ T68] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.536887][ T68] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.556783][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.565011][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.573267][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.580270][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.587659][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.595573][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.606797][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.625674][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.634022][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.642667][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.665604][ T316] ====================================================== [ 41.665604][ T316] WARNING: the mand mount option is being deprecated and [ 41.665604][ T316] will be removed in v5.15! [ 41.665604][ T316] ====================================================== [ 41.707148][ T316] EXT4-fs (sda1): re-mounted. Opts: (null) [ 41.836402][ T308] syz-executor.0 (308) used greatest stack depth: 25216 bytes left [ 42.626571][ T172] device bridge_slave_1 left promiscuous mode [ 42.632821][ T172] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.640251][ T172] device bridge_slave_0 left promiscuous mode [ 42.646423][ T172] bridge0: port 1(bridge_slave_0) entered disabled state 2022/10/02 12:53:15 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir550585189: read-only file system