[ 2.840776][ T30] audit: type=1400 audit(1672227845.370:8): avc: denied { create } for pid=164 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2.843568][ T30] audit: type=1400 audit(1672227845.370:9): avc: denied { append open } for pid=164 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2.846737][ T30] audit: type=1400 audit(1672227845.370:10): avc: denied { getattr } for pid=164 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3.146788][ T181] udevd[181]: starting version 3.2.10 [ 3.171091][ T182] udevd[182]: starting eudev-3.2.10 [ 3.172876][ T181] udevd (181) used greatest stack depth: 22976 bytes left [ 4.421125][ T268] ssh-keygen (268) used greatest stack depth: 22368 bytes left [ 11.275501][ T30] kauditd_printk_skb: 49 callbacks suppressed [ 11.275514][ T30] audit: type=1400 audit(1672227853.810:60): avc: denied { transition } for pid=316 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.279457][ T30] audit: type=1400 audit(1672227853.810:61): avc: denied { write } for pid=316 comm="sh" path="pipe:[13205]" dev="pipefs" ino=13205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.15.202' (ECDSA) to the list of known hosts. 2022/12/28 11:44:50 ignoring optional flag "sandboxArg"="0" 2022/12/28 11:44:51 parsed 1 programs [ 48.584236][ T30] audit: type=1400 audit(1672227891.120:62): avc: denied { integrity } for pid=429 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 48.590035][ T30] audit: type=1400 audit(1672227891.120:63): avc: denied { getattr } for pid=429 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.593547][ T30] audit: type=1400 audit(1672227891.130:64): avc: denied { read } for pid=429 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.596407][ T30] audit: type=1400 audit(1672227891.130:65): avc: denied { open } for pid=429 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.599546][ T30] audit: type=1400 audit(1672227891.130:66): avc: denied { read } for pid=429 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.602965][ T436] cgroup: Unknown subsys name 'net' [ 48.603059][ T30] audit: type=1400 audit(1672227891.130:67): avc: denied { open } for pid=429 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.622679][ T30] audit: type=1400 audit(1672227891.130:68): avc: denied { mounton } for pid=436 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 48.622738][ T436] cgroup: Unknown subsys name 'devices' [ 48.645147][ T30] audit: type=1400 audit(1672227891.130:69): avc: denied { mount } for pid=436 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.672355][ T30] audit: type=1400 audit(1672227891.150:70): avc: denied { unmount } for pid=436 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.782136][ T436] cgroup: Unknown subsys name 'hugetlb' [ 48.787619][ T436] cgroup: Unknown subsys name 'rlimit' 2022/12/28 11:44:51 executed programs: 0 [ 48.851218][ T30] audit: type=1400 audit(1672227891.390:71): avc: denied { mounton } for pid=436 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 48.911099][ T439] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.918049][ T439] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.925306][ T439] device bridge_slave_0 entered promiscuous mode [ 48.931877][ T439] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.938695][ T439] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.945956][ T439] device bridge_slave_1 entered promiscuous mode [ 48.978894][ T439] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.985741][ T439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.992859][ T439] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.999611][ T439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.015314][ T88] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.022398][ T88] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.029383][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.037002][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.054574][ T439] device veth0_vlan entered promiscuous mode [ 49.061387][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.069410][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.077119][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.084929][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.092160][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.100017][ T88] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.106810][ T88] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.113913][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.121808][ T88] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.128622][ T88] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.135790][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.143469][ T88] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.154582][ T439] device veth1_macvtap entered promiscuous mode [ 49.161238][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.172907][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.181110][ T445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.203428][ T447] ======================================================= [ 49.203428][ T447] WARNING: The mand mount option has been deprecated and [ 49.203428][ T447] and is ignored by this kernel. Remove the mand [ 49.203428][ T447] option from the mount to silence this warning. [ 49.203428][ T447] ======================================================= [ 49.247693][ T447] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 49.370506][ T439] syz-executor.0 (439) used greatest stack depth: 21824 bytes left [ 49.931279][ T94] device bridge_slave_1 left promiscuous mode [ 49.937207][ T94] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.944523][ T94] device bridge_slave_0 left promiscuous mode [ 49.950578][ T94] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.957982][ T94] device veth1_macvtap left promiscuous mode [ 49.963918][ T94] device veth0_vlan left promiscuous mode 2022/12/28 11:45:02 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir3927915764: read-only file system