[ 3.364650][ T30] audit: type=1400 audit(1676910361.470:8): avc: denied { create } for pid=80 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.368358][ T30] audit: type=1400 audit(1676910361.470:9): avc: denied { append open } for pid=80 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.371420][ T30] audit: type=1400 audit(1676910361.470:10): avc: denied { getattr } for pid=80 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.686221][ T97] udevd[97]: starting version 3.2.10 [ 3.713376][ T98] udevd[98]: starting eudev-3.2.10 [ 3.716271][ T97] udevd (97) used greatest stack depth: 23568 bytes left [ 11.784856][ T30] kauditd_printk_skb: 49 callbacks suppressed [ 11.784874][ T30] audit: type=1400 audit(1676910369.910:60): avc: denied { transition } for pid=232 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.794452][ T30] audit: type=1400 audit(1676910369.910:61): avc: denied { write } for pid=232 comm="sh" path="pipe:[12391]" dev="pipefs" ino=12391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 13.321790][ T233] sshd (233) used greatest stack depth: 20896 bytes left Warning: Permanently added '10.128.0.77' (ECDSA) to the list of known hosts. 2023/02/20 16:26:46 ignoring optional flag "sandboxArg"="0" 2023/02/20 16:26:46 parsed 1 programs [ 48.602424][ T30] audit: type=1400 audit(1676910406.720:62): avc: denied { integrity } for pid=345 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 48.613884][ T351] cgroup: Unknown subsys name 'net' [ 48.624878][ T30] audit: type=1400 audit(1676910406.720:63): avc: denied { getattr } for pid=345 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.653234][ T30] audit: type=1400 audit(1676910406.720:64): avc: denied { read } for pid=345 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.653465][ T351] cgroup: Unknown subsys name 'devices' [ 48.679656][ T30] audit: type=1400 audit(1676910406.720:65): avc: denied { open } for pid=345 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.702763][ T30] audit: type=1400 audit(1676910406.720:66): avc: denied { read } for pid=345 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.725752][ T30] audit: type=1400 audit(1676910406.720:67): avc: denied { open } for pid=345 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.749056][ T30] audit: type=1400 audit(1676910406.720:68): avc: denied { mounton } for pid=351 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 48.771903][ T30] audit: type=1400 audit(1676910406.720:69): avc: denied { mount } for pid=351 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.794280][ T30] audit: type=1400 audit(1676910406.750:70): avc: denied { unmount } for pid=351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.905904][ T351] cgroup: Unknown subsys name 'hugetlb' [ 48.911586][ T351] cgroup: Unknown subsys name 'rlimit' 2023/02/20 16:26:47 executed programs: 0 [ 49.065280][ T30] audit: type=1400 audit(1676910407.190:71): avc: denied { mounton } for pid=351 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 49.123242][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.130261][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.137713][ T354] device bridge_slave_0 entered promiscuous mode [ 49.144417][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.151252][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.158705][ T354] device bridge_slave_1 entered promiscuous mode [ 49.206236][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.213201][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.220497][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.227357][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.247656][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.255269][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.262450][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.269844][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.279227][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.287409][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.294258][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.305001][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.312999][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.320115][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.334550][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.342277][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.354740][ T354] device veth0_vlan entered promiscuous mode [ 49.364614][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.372437][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.379776][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.387243][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.395249][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.404500][ T354] device veth1_macvtap entered promiscuous mode [ 49.414097][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.423462][ T59] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.506909][ T363] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 49.605677][ T354] syz-executor.0 (354) used greatest stack depth: 20416 bytes left [ 50.304539][ T8] device bridge_slave_1 left promiscuous mode [ 50.310483][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.318009][ T8] device bridge_slave_0 left promiscuous mode [ 50.324050][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.331754][ T8] device veth1_macvtap left promiscuous mode [ 50.337623][ T8] device veth0_vlan left promiscuous mode 2023/02/20 16:26:58 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir1072988110: read-only file system