[ 4.105393][ T24] audit: type=1400 audit(1683778264.750:9): avc: denied { append open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4.108809][ T24] audit: type=1400 audit(1683778264.750:10): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4.398260][ T92] udevd[92]: starting version 3.2.11 [ 4.457400][ T93] udevd[93]: starting eudev-3.2.11 [ 13.146313][ T24] kauditd_printk_skb: 50 callbacks suppressed [ 13.146322][ T24] audit: type=1400 audit(1683778273.820:61): avc: denied { transition } for pid=219 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.154528][ T24] audit: type=1400 audit(1683778273.820:62): avc: denied { noatsecure } for pid=219 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.160703][ T24] audit: type=1400 audit(1683778273.820:63): avc: denied { write } for pid=219 comm="sh" path="pipe:[13693]" dev="pipefs" ino=13693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.165986][ T24] audit: type=1400 audit(1683778273.820:64): avc: denied { rlimitinh } for pid=219 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.183475][ T24] audit: type=1400 audit(1683778273.820:65): avc: denied { siginh } for pid=219 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.110' (ECDSA) to the list of known hosts. 2023/05/11 04:11:40 ignoring optional flag "sandboxArg"="0" 2023/05/11 04:11:41 parsed 1 programs [ 40.437038][ T24] audit: type=1400 audit(1683778301.110:66): avc: denied { getattr } for pid=300 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.460358][ T24] audit: type=1400 audit(1683778301.120:67): avc: denied { read } for pid=300 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.466198][ T306] cgroup: Unknown subsys name 'net' [ 40.481393][ T24] audit: type=1400 audit(1683778301.120:68): avc: denied { open } for pid=300 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.509544][ T24] audit: type=1400 audit(1683778301.130:69): avc: denied { read } for pid=300 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.509797][ T306] cgroup: Unknown subsys name 'devices' [ 40.532153][ T24] audit: type=1400 audit(1683778301.130:70): avc: denied { open } for pid=300 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.560819][ T24] audit: type=1400 audit(1683778301.140:71): avc: denied { mounton } for pid=306 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 40.583186][ T24] audit: type=1400 audit(1683778301.140:72): avc: denied { mount } for pid=306 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 40.605042][ T24] audit: type=1400 audit(1683778301.170:73): avc: denied { unmount } for pid=306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 40.746538][ T306] cgroup: Unknown subsys name 'hugetlb' [ 40.752148][ T306] cgroup: Unknown subsys name 'rlimit' 2023/05/11 04:11:41 executed programs: 0 [ 40.845975][ T24] audit: type=1400 audit(1683778301.520:74): avc: denied { mounton } for pid=306 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.871899][ T24] audit: type=1400 audit(1683778301.520:75): avc: denied { mount } for pid=306 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 40.909304][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.916208][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.923437][ T309] device bridge_slave_0 entered promiscuous mode [ 40.930439][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.937437][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.944821][ T309] device bridge_slave_1 entered promiscuous mode [ 40.983425][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.990295][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.997409][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.004275][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.023131][ T108] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.030547][ T108] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.038406][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.046356][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.065539][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.073616][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.081902][ T108] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.088851][ T108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.096036][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.104106][ T108] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.110955][ T108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.118107][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.126039][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.137797][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.145621][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.152883][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.160940][ T309] device veth0_vlan entered promiscuous mode [ 41.171738][ T309] device veth1_macvtap entered promiscuous mode [ 41.178505][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.188849][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.200717][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.216238][ T309] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 41.232768][ T317] ====================================================== [ 41.232768][ T317] WARNING: the mand mount option is being deprecated and [ 41.232768][ T317] will be removed in v5.15! [ 41.232768][ T317] ====================================================== [ 41.473775][ T317] EXT4-fs (sda1): re-mounted. Opts: (null) [ 42.344922][ T112] device bridge_slave_1 left promiscuous mode [ 42.350951][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.358515][ T112] device bridge_slave_0 left promiscuous mode [ 42.364473][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.372397][ T112] device veth1_macvtap left promiscuous mode [ 42.378479][ T112] device veth0_vlan left promiscuous mode 2023/05/11 04:11:53 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir3273730213: read-only file system