Warning: Permanently added '10.128.0.179' (ECDSA) to the list of known hosts. 2022/10/04 16:58:53 ignoring optional flag "sandboxArg"="0" 2022/10/04 16:58:53 parsed 1 programs [ 46.792254][ T26] audit: type=1400 audit(1664902733.179:73): avc: denied { integrity } for pid=368 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 46.799747][ T26] audit: type=1400 audit(1664902733.189:74): avc: denied { getattr } for pid=368 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.804942][ T26] audit: type=1400 audit(1664902733.189:75): avc: denied { read } for pid=368 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.809540][ T26] audit: type=1400 audit(1664902733.189:76): avc: denied { open } for pid=368 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.813147][ T374] cgroup: Unknown subsys name 'net' [ 46.823239][ T26] audit: type=1400 audit(1664902733.189:77): avc: denied { read } for pid=368 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.851250][ T26] audit: type=1400 audit(1664902733.189:78): avc: denied { open } for pid=368 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.851427][ T374] cgroup: Unknown subsys name 'devices' [ 46.874925][ T26] audit: type=1400 audit(1664902733.209:79): avc: denied { mounton } for pid=374 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 46.903071][ T26] audit: type=1400 audit(1664902733.209:80): avc: denied { mount } for pid=374 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 46.925160][ T26] audit: type=1400 audit(1664902733.219:81): avc: denied { unmount } for pid=374 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 47.028993][ T374] cgroup: Unknown subsys name 'hugetlb' [ 47.034739][ T374] cgroup: Unknown subsys name 'rlimit' 2022/10/04 16:58:53 executed programs: 0 [ 47.128448][ T26] audit: type=1400 audit(1664902733.519:82): avc: denied { mounton } for pid=374 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 47.173011][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.180347][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.188043][ T378] device bridge_slave_0 entered promiscuous mode [ 47.194784][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.201838][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.209103][ T378] device bridge_slave_1 entered promiscuous mode [ 47.241054][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.248111][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.255335][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.262365][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.278037][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.285310][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.292655][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.300258][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.318734][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.326969][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.335442][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.343628][ T67] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.350749][ T67] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.358153][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.366235][ T67] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.373290][ T67] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.380591][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.388545][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.403586][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.411992][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.420538][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.450566][ T385] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 48.277736][ T12] device bridge_slave_1 left promiscuous mode [ 48.283867][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.291422][ T12] device bridge_slave_0 left promiscuous mode [ 48.297789][ T12] bridge0: port 1(bridge_slave_0) entered disabled state 2022/10/04 16:59:04 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir1952013324: read-only file system