Warning: Permanently added '10.128.10.63' (ECDSA) to the list of known hosts. 2022/10/02 12:33:23 ignoring optional flag "sandboxArg"="0" 2022/10/02 12:33:23 parsed 1 programs [ 46.731628][ T23] audit: type=1400 audit(1664714003.160:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.748299][ T303] cgroup1: Unknown subsys name 'net' [ 46.755282][ T23] audit: type=1400 audit(1664714003.160:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.760891][ T303] cgroup1: Unknown subsys name 'net_prio' [ 46.781548][ T23] audit: type=1400 audit(1664714003.160:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.787772][ T303] cgroup1: Unknown subsys name 'devices' [ 46.810708][ T23] audit: type=1400 audit(1664714003.170:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=595 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.816643][ T303] cgroup1: Unknown subsys name 'blkio' [ 46.839100][ T23] audit: type=1400 audit(1664714003.170:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=595 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.868104][ T23] audit: type=1400 audit(1664714003.180:78): avc: denied { mounton } for pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 46.890956][ T23] audit: type=1400 audit(1664714003.180:79): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 46.913030][ T23] audit: type=1400 audit(1664714003.280:80): avc: denied { unmount } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 46.996330][ T303] cgroup1: Unknown subsys name 'hugetlb' [ 47.002388][ T303] cgroup1: Unknown subsys name 'rlimit' 2022/10/02 12:33:23 executed programs: 0 [ 47.095333][ T23] audit: type=1400 audit(1664714003.530:81): avc: denied { mounton } for pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 47.120262][ T23] audit: type=1400 audit(1664714003.530:82): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 47.160699][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.167752][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.175558][ T308] device bridge_slave_0 entered promiscuous mode [ 47.182406][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.189866][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.197290][ T308] device bridge_slave_1 entered promiscuous mode [ 47.236351][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.243372][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.250655][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.257676][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.277217][ T68] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.284754][ T68] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.291946][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.300331][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.309755][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.317994][ T119] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.325010][ T119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.333489][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.341847][ T68] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.349224][ T68] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.364801][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.372698][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.385729][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.403978][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.412513][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.421663][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.437672][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.463363][ T315] EXT4-fs (sda1): re-mounted. Opts: (null) [ 47.625394][ T308] syz-executor.0 (308) used greatest stack depth: 25104 bytes left [ 48.304697][ T7] device bridge_slave_1 left promiscuous mode [ 48.310812][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.318297][ T7] device bridge_slave_0 left promiscuous mode [ 48.324458][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 2022/10/02 12:33:35 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir402190001: read-only file system