[ 2.978165][ T30] audit: type=1400 audit(1667525824.429:9): avc: denied { append open } for pid=164 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2.981341][ T30] audit: type=1400 audit(1667525824.429:10): avc: denied { getattr } for pid=164 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.009431][ T166] acpid (166) used greatest stack depth: 24200 bytes left [ 3.220337][ T181] udevd[181]: starting version 3.2.10 [ 3.251791][ T182] udevd[182]: starting eudev-3.2.10 [ 3.253732][ T181] udevd (181) used greatest stack depth: 22976 bytes left [ 3.666568][ T198] scsi_id (198) used greatest stack depth: 22368 bytes left [ 10.891456][ T30] kauditd_printk_skb: 49 callbacks suppressed [ 10.891492][ T30] audit: type=1400 audit(1667525832.359:60): avc: denied { transition } for pid=316 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 10.896722][ T30] audit: type=1400 audit(1667525832.359:61): avc: denied { write } for pid=316 comm="sh" path="pipe:[12263]" dev="pipefs" ino=12263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. 2022/11/04 01:44:42 ignoring optional flag "sandboxArg"="0" 2022/11/04 01:44:42 parsed 1 programs [ 461.164536][ T30] audit: type=1400 audit(1667526282.629:62): avc: denied { integrity } for pid=843 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 461.170785][ T30] audit: type=1400 audit(1667526282.639:63): avc: denied { getattr } for pid=843 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 461.173985][ T30] audit: type=1400 audit(1667526282.639:64): avc: denied { read } for pid=843 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 461.176932][ T30] audit: type=1400 audit(1667526282.639:65): avc: denied { open } for pid=843 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 461.180371][ T30] audit: type=1400 audit(1667526282.649:66): avc: denied { read } for pid=843 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 461.183993][ T30] audit: type=1400 audit(1667526282.649:67): avc: denied { open } for pid=843 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 461.187515][ T850] cgroup: Unknown subsys name 'net' [ 461.203746][ T30] audit: type=1400 audit(1667526282.649:68): avc: denied { mounton } for pid=850 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 461.231005][ T30] audit: type=1400 audit(1667526282.649:69): avc: denied { mount } for pid=850 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 461.231214][ T850] cgroup: Unknown subsys name 'devices' [ 461.253090][ T30] audit: type=1400 audit(1667526282.679:70): avc: denied { unmount } for pid=850 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 461.400076][ T850] cgroup: Unknown subsys name 'hugetlb' [ 461.405704][ T850] cgroup: Unknown subsys name 'rlimit' 2022/11/04 01:44:43 executed programs: 0 [ 461.529385][ T30] audit: type=1400 audit(1667526282.999:71): avc: denied { mounton } for pid=850 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 461.590036][ T853] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.596872][ T853] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.604258][ T853] device bridge_slave_0 entered promiscuous mode [ 461.610943][ T853] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.617771][ T853] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.625079][ T853] device bridge_slave_1 entered promiscuous mode [ 461.659418][ T853] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.666256][ T853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.673395][ T853] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.680175][ T853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.696956][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.703999][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.711339][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 461.718581][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 461.727237][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 461.735237][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.742077][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.750317][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 461.758507][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.765329][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.781998][ T853] device veth0_vlan entered promiscuous mode [ 461.788829][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 461.796886][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.804935][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.812131][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.819415][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 461.827110][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 461.838840][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 461.847448][ T853] device veth1_macvtap entered promiscuous mode [ 461.856187][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 461.867734][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2022/11/04 01:45:04 SYZFATAL: executor failed 11 times: bad call 1 index 32551/7