Warning: Permanently added '10.128.0.155' (ECDSA) to the list of known hosts. 2022/10/27 06:06:42 ignoring optional flag "sandboxArg"="0" 2022/10/27 06:06:42 parsed 1 programs [ 468.711617][ T30] audit: type=1400 audit(1666850802.960:62): avc: denied { integrity } for pid=849 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 468.730960][ T855] cgroup: Unknown subsys name 'net' [ 468.733733][ T30] audit: type=1400 audit(1666850802.960:63): avc: denied { getattr } for pid=849 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 468.762590][ T30] audit: type=1400 audit(1666850802.960:64): avc: denied { read } for pid=849 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 468.762753][ T855] cgroup: Unknown subsys name 'devices' [ 468.783581][ T30] audit: type=1400 audit(1666850802.960:65): avc: denied { open } for pid=849 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 468.811920][ T30] audit: type=1400 audit(1666850802.960:66): avc: denied { read } for pid=849 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 468.834660][ T30] audit: type=1400 audit(1666850802.960:67): avc: denied { open } for pid=849 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 468.857696][ T30] audit: type=1400 audit(1666850802.960:68): avc: denied { mounton } for pid=855 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 468.880270][ T30] audit: type=1400 audit(1666850802.960:69): avc: denied { mount } for pid=855 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 468.902292][ T30] audit: type=1400 audit(1666850802.990:70): avc: denied { unmount } for pid=855 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 469.069928][ T855] cgroup: Unknown subsys name 'hugetlb' [ 469.075485][ T855] cgroup: Unknown subsys name 'rlimit' 2022/10/27 06:06:43 executed programs: 0 [ 469.169383][ T30] audit: type=1400 audit(1666850803.420:71): avc: denied { mounton } for pid=855 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 469.229312][ T859] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.236157][ T859] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.243442][ T859] device bridge_slave_0 entered promiscuous mode [ 469.250212][ T859] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.257143][ T859] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.265067][ T859] device bridge_slave_1 entered promiscuous mode [ 469.301180][ T859] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.308035][ T859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.315115][ T859] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.321919][ T859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.339268][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.346265][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.353459][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 469.360852][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 469.369715][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 469.377850][ T88] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.384715][ T88] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.400442][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 469.408458][ T856] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.415292][ T856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.422583][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 469.430681][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 469.439777][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 469.450585][ T859] device veth0_vlan entered promiscuous mode [ 469.458985][ T865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 469.466710][ T865] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 469.474034][ T865] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 469.482983][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 469.491675][ T859] device veth1_macvtap entered promiscuous mode [ 469.500241][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 469.511452][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2022/10/27 06:07:04 SYZFATAL: executor failed 11 times: wrong call 2 num 0/2732