DUID 00:04:46:66:f6:f6:0a:f3:dd:7e:20:1b:6f:6e:7c:9e:dd:66 forked to background, child pid 210 Starting sshd: OK syzkaller syzkaller login: [ 12.884739][ T26] kauditd_printk_skb: 60 callbacks suppressed [ 12.884753][ T26] audit: type=1400 audit(1665511291.329:71): avc: denied { transition } for pid=303 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.889911][ T26] audit: type=1400 audit(1665511291.329:72): avc: denied { write } for pid=303 comm="sh" path="pipe:[11500]" dev="pipefs" ino=11500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.64' (ECDSA) to the list of known hosts. 2022/10/11 18:02:07 ignoring optional flag "sandboxArg"="0" 2022/10/11 18:02:07 parsed 1 programs [ 48.799262][ T26] audit: type=1400 audit(1665511327.239:73): avc: denied { integrity } for pid=378 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 48.806565][ T26] audit: type=1400 audit(1665511327.249:74): avc: denied { getattr } for pid=378 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.810399][ T26] audit: type=1400 audit(1665511327.249:75): avc: denied { read } for pid=378 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.814418][ T26] audit: type=1400 audit(1665511327.249:76): avc: denied { open } for pid=378 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.818515][ T26] audit: type=1400 audit(1665511327.259:77): avc: denied { read } for pid=378 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.819642][ T384] cgroup: Unknown subsys name 'net' [ 48.834098][ T26] audit: type=1400 audit(1665511327.259:78): avc: denied { open } for pid=378 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.862487][ T26] audit: type=1400 audit(1665511327.259:79): avc: denied { mounton } for pid=384 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 48.862634][ T384] cgroup: Unknown subsys name 'devices' [ 48.885104][ T26] audit: type=1400 audit(1665511327.259:80): avc: denied { mount } for pid=384 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.885125][ T26] audit: type=1400 audit(1665511327.279:81): avc: denied { unmount } for pid=384 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.052996][ T384] cgroup: Unknown subsys name 'hugetlb' [ 49.058678][ T384] cgroup: Unknown subsys name 'rlimit' 2022/10/11 18:02:07 executed programs: 0 [ 49.183143][ T26] audit: type=1400 audit(1665511327.629:82): avc: denied { mounton } for pid=384 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 49.227837][ T388] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.235079][ T388] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.242588][ T388] device bridge_slave_0 entered promiscuous mode [ 49.249280][ T388] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.256317][ T388] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.263574][ T388] device bridge_slave_1 entered promiscuous mode [ 49.294848][ T388] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.302013][ T388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.309248][ T388] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.316383][ T388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.332690][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.339918][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.347569][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.355048][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.372656][ T79] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.380911][ T79] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.389074][ T79] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.396114][ T79] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.403477][ T79] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.411787][ T79] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.418797][ T79] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.426744][ T79] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.434634][ T79] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.443837][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.458913][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.467275][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.475820][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.506175][ T394] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 50.181824][ T84] device bridge_slave_1 left promiscuous mode [ 50.188024][ T84] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.196435][ T84] device bridge_slave_0 left promiscuous mode [ 50.202596][ T84] bridge0: port 1(bridge_slave_0) entered disabled state 2022/10/11 18:02:19 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir4109615241: read-only file system