=1400 audit(1693026171.342:63): avc: denied { write } for pid=231 comm="sh" path="pipe:[12637]" dev="pipefs" ino=12637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 11.960768][ T28] audit: type=1400 audit(1693026171.342:64): avc: denied { rlimitinh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.963818][ T28] audit: type=1400 audit(1693026171.342:65): avc: denied { siginh } for pid=231 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.60' (ED25519) to the list of known hosts. 2023/08/26 05:03:00 fuzzer started 2023/08/26 05:03:00 dialing manager at 10.128.0.163:30006 2023/08/26 05:03:00 checking machine... 2023/08/26 05:03:00 checking revisions... 2023/08/26 05:03:00 testing simple program... [ 21.281277][ T28] audit: type=1400 audit(1693026180.662:66): avc: denied { getattr } for pid=292 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.284790][ T28] audit: type=1400 audit(1693026180.672:67): avc: denied { read } for pid=292 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.292508][ T28] audit: type=1400 audit(1693026180.672:68): avc: denied { open } for pid=292 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.296570][ T28] audit: type=1400 audit(1693026180.672:69): avc: denied { read } for pid=292 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.300695][ T28] audit: type=1400 audit(1693026180.672:70): avc: denied { open } for pid=292 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.302436][ T301] cgroup: Unknown subsys name 'net' [ 21.319051][ T28] audit: type=1400 audit(1693026180.682:71): avc: denied { mounton } for pid=301 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.346329][ T28] audit: type=1400 audit(1693026180.682:72): avc: denied { mount } for pid=301 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.346453][ T301] cgroup: Unknown subsys name 'devices' [ 21.368409][ T28] audit: type=1400 audit(1693026180.712:73): avc: denied { unmount } for pid=301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.484936][ T301] cgroup: Unknown subsys name 'hugetlb' [ 21.490389][ T301] cgroup: Unknown subsys name 'rlimit' [ 21.614748][ T28] audit: type=1400 audit(1693026181.002:74): avc: denied { mounton } for pid=301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.639226][ T28] audit: type=1400 audit(1693026181.012:75): avc: denied { mount } for pid=301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.673875][ T302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.726387][ T301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.806702][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.813574][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.820656][ T304] device bridge_slave_0 entered promiscuous mode [ 21.827480][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.834323][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.841411][ T304] device bridge_slave_1 entered promiscuous mode [ 21.883572][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.890394][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.897501][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.904298][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.923959][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.930987][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.938361][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.945591][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.963920][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.971832][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.978666][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.985882][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.993826][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.000638][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.007794][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.015428][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.028168][ T304] device veth0_vlan entered promiscuous mode [ 22.034487][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.042560][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.050405][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.057636][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.068992][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.077694][ T304] device veth1_macvtap entered promiscuous mode 2023/08/26 05:03:01 building call list... [ 22.089238][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.097472][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.204648][ T304] syz-executor.0 (304) used greatest stack depth: 20776 bytes left [ 22.728843][ T8] device bridge_slave_1 left promiscuous mode [ 22.734822][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.742146][ T8] device bridge_slave_0 left promiscuous mode [ 22.748386][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.757601][ T8] device veth1_macvtap left promiscuous mode [ 22.763490][ T8] device veth0_vlan left promiscuous mode 2023/08/26 05:06:02 SYZFATAL: Manager.Check call failed: read tcp 10.128.1.60:52036->10.128.0.163:30006: i/o timeout