d { noatsecure } for pid=217 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.380921][ T24] audit: type=1400 audit(1713863297.410:63): avc: denied { write } for pid=217 comm="sh" path="pipe:[13031]" dev="pipefs" ino=13031 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.386358][ T24] audit: type=1400 audit(1713863297.410:64): avc: denied { rlimitinh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.390735][ T24] audit: type=1400 audit(1713863297.410:65): avc: denied { siginh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.103' (ED25519) to the list of known hosts. 2024/04/23 09:08:45 ignoring optional flag "sandboxArg"="0" 2024/04/23 09:08:45 parsed 1 programs [ 40.828094][ T24] audit: type=1400 audit(1713863325.870:66): avc: denied { getattr } for pid=300 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.835360][ T24] audit: type=1400 audit(1713863325.870:67): avc: denied { read } for pid=300 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.842888][ T24] audit: type=1400 audit(1713863325.870:68): avc: denied { open } for pid=300 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 40.845911][ T305] cgroup: Unknown subsys name 'net' [ 40.848334][ T24] audit: type=1400 audit(1713863325.870:69): avc: denied { read } for pid=300 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.876026][ T24] audit: type=1400 audit(1713863325.870:70): avc: denied { open } for pid=300 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.876290][ T305] cgroup: Unknown subsys name 'devices' [ 40.899236][ T24] audit: type=1400 audit(1713863325.880:71): avc: denied { mounton } for pid=305 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 40.927069][ T24] audit: type=1400 audit(1713863325.880:72): avc: denied { mount } for pid=305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 40.948975][ T24] audit: type=1400 audit(1713863325.890:73): avc: denied { unmount } for pid=305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.148726][ T305] cgroup: Unknown subsys name 'hugetlb' [ 41.154197][ T305] cgroup: Unknown subsys name 'rlimit' [ 41.339477][ T24] audit: type=1400 audit(1713863326.380:74): avc: denied { mounton } for pid=305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.363997][ T24] audit: type=1400 audit(1713863326.380:75): avc: denied { mount } for pid=305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 41.380732][ T306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). 2024/04/23 09:08:46 executed programs: 0 [ 41.435899][ T305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 41.488435][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.495277][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.502709][ T311] device bridge_slave_0 entered promiscuous mode [ 41.509607][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.516437][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.523971][ T311] device bridge_slave_1 entered promiscuous mode [ 41.560265][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.567123][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.574222][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.581029][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.599120][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.606235][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.613669][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.621588][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.637744][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.645700][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.652555][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.660201][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.668354][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.675175][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.682363][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.690087][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.701385][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.712123][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.720001][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.728526][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.736523][ T311] device veth0_vlan entered promiscuous mode [ 41.746032][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.755038][ T311] device veth1_macvtap entered promiscuous mode [ 41.767011][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.775248][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.790499][ T311] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 41.818946][ T318] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 41.841501][ T318] EXT4-fs error (device sda1): ext4_remount:5878: Abort forced by user [ 41.849925][ T318] Aborting journal on device sda1-8. [ 41.880088][ T318] EXT4-fs (sda1): Remounting filesystem read-only [ 41.971769][ T311] EXT4-fs error (device sda1): ext4_journal_check_start:83: Detected aborted journal [ 41.981055][ T311] EXT4-fs (sda1): Remounting filesystem read-only 2024/04/23 09:08:47 SYZFATAL: executor 0 failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir4291402396: read-only file system