" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.103727][ T23] audit: type=1400 audit(1683778130.420:62): avc: denied { noatsecure } for pid=287 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.108068][ T23] audit: type=1400 audit(1683778130.420:63): avc: denied { write } for pid=287 comm="sh" path="pipe:[10600]" dev="pipefs" ino=10600 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 15.118510][ T23] audit: type=1400 audit(1683778130.420:64): avc: denied { rlimitinh } for pid=287 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.142842][ T23] audit: type=1400 audit(1683778130.420:65): avc: denied { siginh } for pid=287 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.163' (ECDSA) to the list of known hosts. 2023/05/11 04:09:23 ignoring optional flag "sandboxArg"="0" 2023/05/11 04:09:23 parsed 1 programs [ 47.945936][ T23] audit: type=1400 audit(1683778163.270:66): avc: denied { getattr } for pid=374 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.969241][ T23] audit: type=1400 audit(1683778163.270:67): avc: denied { read } for pid=374 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.973568][ T379] cgroup1: Unknown subsys name 'net' [ 47.990062][ T23] audit: type=1400 audit(1683778163.270:68): avc: denied { open } for pid=374 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.995883][ T379] cgroup1: Unknown subsys name 'net_prio' [ 48.018366][ T23] audit: type=1400 audit(1683778163.270:69): avc: denied { read } for pid=374 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.024276][ T379] cgroup1: Unknown subsys name 'devices' [ 48.046584][ T23] audit: type=1400 audit(1683778163.270:70): avc: denied { open } for pid=374 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.075051][ T23] audit: type=1400 audit(1683778163.290:71): avc: denied { mounton } for pid=379 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 48.097517][ T23] audit: type=1400 audit(1683778163.290:72): avc: denied { mount } for pid=379 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.119466][ T23] audit: type=1400 audit(1683778163.420:73): avc: denied { unmount } for pid=379 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.286627][ T379] cgroup1: Unknown subsys name 'hugetlb' [ 48.292445][ T379] cgroup1: Unknown subsys name 'rlimit' 2023/05/11 04:09:23 executed programs: 0 [ 48.385918][ T23] audit: type=1400 audit(1683778163.710:74): avc: denied { mounton } for pid=379 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 48.410968][ T23] audit: type=1400 audit(1683778163.740:75): avc: denied { mount } for pid=379 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 48.486544][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.493384][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.501234][ T385] device bridge_slave_0 entered promiscuous mode [ 48.508203][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.515203][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.522516][ T385] device bridge_slave_1 entered promiscuous mode [ 48.575808][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.582742][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.590038][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.596762][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.621390][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.628495][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.636018][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.643260][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.653105][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.661190][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.668075][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.677507][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.685687][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.692508][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.714846][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.722751][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.743638][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.751849][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.759740][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.771413][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.785073][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.812796][ T392] ====================================================== [ 48.812796][ T392] WARNING: the mand mount option is being deprecated and [ 48.812796][ T392] will be removed in v5.15! [ 48.812796][ T392] ====================================================== [ 48.913702][ T392] EXT4-fs (sda1): re-mounted. Opts: (null) [ 48.986386][ T385] syz-executor.0 (385) used greatest stack depth: 20088 bytes left [ 49.753794][ T258] device bridge_slave_1 left promiscuous mode [ 49.759780][ T258] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.767536][ T258] device bridge_slave_0 left promiscuous mode [ 49.773704][ T258] bridge0: port 1(bridge_slave_0) entered disabled state 2023/05/11 04:09:35 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir3998090904: read-only file system