[ 3.616122][ T99] udevd[99]: starting version 3.2.11 [ 3.640646][ T100] udevd[100]: starting eudev-3.2.11 [ 4.606083][ T147] chmod (147) used greatest stack depth: 23120 bytes left [ 4.893869][ T185] sshd (185) used greatest stack depth: 22096 bytes left [ 11.539760][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 11.539773][ T30] audit: type=1400 audit(1716335726.905:61): avc: denied { transition } for pid=223 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.544137][ T30] audit: type=1400 audit(1716335726.905:62): avc: denied { noatsecure } for pid=223 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.547463][ T30] audit: type=1400 audit(1716335726.905:63): avc: denied { write } for pid=223 comm="sh" path="pipe:[13321]" dev="pipefs" ino=13321 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 11.551460][ T30] audit: type=1400 audit(1716335726.905:64): avc: denied { rlimitinh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.554699][ T30] audit: type=1400 audit(1716335726.905:65): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.33' (ED25519) to the list of known hosts. 2024/05/21 23:55:34 ignoring optional flag "sandboxArg"="0" 2024/05/21 23:55:34 parsed 1 programs [ 19.131958][ T30] audit: type=1400 audit(1716335734.495:66): avc: denied { integrity } for pid=290 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 19.139759][ T30] audit: type=1400 audit(1716335734.505:67): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.140862][ T290] cgroup: Unknown subsys name 'net' [ 19.143461][ T30] audit: type=1400 audit(1716335734.505:68): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.147875][ T30] audit: type=1400 audit(1716335734.505:69): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.153441][ T290] cgroup: Unknown subsys name 'devices' [ 19.165862][ T30] audit: type=1400 audit(1716335734.525:70): avc: denied { create } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 19.206506][ T30] audit: type=1400 audit(1716335734.545:71): avc: denied { write } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 19.225864][ T303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.227166][ T30] audit: type=1400 audit(1716335734.545:72): avc: denied { read } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 19.243239][ T300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.255295][ T30] audit: type=1400 audit(1716335734.555:73): avc: denied { module_request } for pid=298 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 19.285868][ T30] audit: type=1400 audit(1716335734.555:74): avc: denied { setattr } for pid=308 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.308832][ T30] audit: type=1400 audit(1716335734.575:75): avc: denied { mounton } for pid=313 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.334862][ T290] cgroup: Unknown subsys name 'hugetlb' [ 19.340442][ T290] cgroup: Unknown subsys name 'rlimit' [ 19.665751][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.672821][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.680212][ T327] device bridge_slave_0 entered promiscuous mode [ 19.687531][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.694355][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.701625][ T327] device bridge_slave_1 entered promiscuous mode [ 19.738028][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.744861][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.751996][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.758763][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.775297][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.782391][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.789677][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 19.797004][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.808848][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.816785][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.823601][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.830925][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.839026][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.845856][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.858123][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.865797][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.878929][ T327] device veth0_vlan entered promiscuous mode [ 19.887476][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.895535][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.903402][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.910754][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.921150][ T327] device veth1_macvtap entered promiscuous mode [ 19.927669][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.940901][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.949214][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.971090][ T327] syz-executor.0 (327) used greatest stack depth: 19792 bytes left 2024/05/21 23:55:35 executed programs: 0 [ 20.827575][ T45] device bridge_slave_1 left promiscuous mode [ 20.833503][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.840899][ T45] device bridge_slave_0 left promiscuous mode [ 20.846894][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.854432][ T45] device veth1_macvtap left promiscuous mode [ 20.860314][ T45] device veth0_vlan left promiscuous mode 2024/05/21 23:55:36 SYZFATAL: executor 0 failed 11 times: too many calls (41)