forked to background, child pid 192 Starting sshd: OK syzkaller syzkaller login: [ 13.594386][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 13.594392][ T23] audit: type=1400 audit(1666849634.070:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.600303][ T23] audit: type=1400 audit(1666849634.080:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[846]" dev="pipefs" ino=846 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 66.778487][ T68] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. 2022/10/27 05:54:40 ignoring optional flag "sandboxArg"="0" 2022/10/27 05:54:40 parsed 1 programs [ 460.096293][ T23] audit: type=1400 audit(1666850080.570:73): avc: denied { getattr } for pid=299 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 460.119829][ T23] audit: type=1400 audit(1666850080.570:74): avc: denied { read } for pid=299 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 460.125948][ T306] cgroup1: Unknown subsys name 'net' [ 460.141157][ T23] audit: type=1400 audit(1666850080.570:75): avc: denied { open } for pid=299 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 460.146518][ T306] cgroup1: Unknown subsys name 'net_prio' [ 460.169541][ T23] audit: type=1400 audit(1666850080.580:76): avc: denied { read } for pid=299 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 460.175515][ T306] cgroup1: Unknown subsys name 'devices' [ 460.197896][ T23] audit: type=1400 audit(1666850080.580:77): avc: denied { open } for pid=299 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 460.204476][ T306] cgroup1: Unknown subsys name 'blkio' [ 460.227356][ T23] audit: type=1400 audit(1666850080.600:78): avc: denied { mounton } for pid=306 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 460.255370][ T23] audit: type=1400 audit(1666850080.600:79): avc: denied { mount } for pid=306 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 460.277595][ T23] audit: type=1400 audit(1666850080.710:80): avc: denied { unmount } for pid=306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 460.360520][ T306] cgroup1: Unknown subsys name 'hugetlb' [ 460.366371][ T306] cgroup1: Unknown subsys name 'rlimit' 2022/10/27 05:54:41 executed programs: 0 [ 460.519672][ T23] audit: type=1400 audit(1666850081.000:81): avc: denied { mounton } for pid=306 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 460.544498][ T23] audit: type=1400 audit(1666850081.000:82): avc: denied { mount } for pid=306 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 460.599843][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.606858][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.614623][ T311] device bridge_slave_0 entered promiscuous mode [ 460.621511][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.628586][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.635949][ T311] device bridge_slave_1 entered promiscuous mode [ 460.674569][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.681600][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.688874][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.695870][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.715931][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.723094][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.731069][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 460.739177][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 460.747960][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 460.756358][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.763375][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.788540][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 460.796814][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 460.805725][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 460.813953][ T68] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.820963][ T68] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.828431][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 460.836289][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 460.846167][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 460.857692][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 460.869801][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2022/10/27 05:55:02 SYZFATAL: executor failed 11 times: wrong call 2 num 0/2732