Warning: Permanently added '10.128.0.62' (ECDSA) to the list of known hosts. 2022/10/02 12:22:53 ignoring optional flag "sandboxArg"="0" 2022/10/02 12:22:53 parsed 1 programs [ 43.096388][ T23] audit: type=1400 audit(1664713373.480:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.124422][ T303] cgroup1: Unknown subsys name 'net' [ 43.130163][ T303] cgroup1: Unknown subsys name 'net_prio' [ 43.136111][ T303] cgroup1: Unknown subsys name 'devices' [ 43.141848][ T23] audit: type=1400 audit(1664713373.480:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.163003][ T23] audit: type=1400 audit(1664713373.480:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.163308][ T303] cgroup1: Unknown subsys name 'blkio' [ 43.186637][ T23] audit: type=1400 audit(1664713373.490:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=9367 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.186651][ T23] audit: type=1400 audit(1664713373.490:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=9367 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.186664][ T23] audit: type=1400 audit(1664713373.510:78): avc: denied { mounton } for pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 43.186677][ T23] audit: type=1400 audit(1664713373.510:79): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.283713][ T23] audit: type=1400 audit(1664713373.680:80): avc: denied { unmount } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.452227][ T303] cgroup1: Unknown subsys name 'hugetlb' [ 43.458112][ T303] cgroup1: Unknown subsys name 'rlimit' 2022/10/02 12:22:53 executed programs: 0 [ 43.551745][ T23] audit: type=1400 audit(1664713373.940:81): avc: denied { mounton } for pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 43.576864][ T23] audit: type=1400 audit(1664713373.940:82): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 43.616080][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.623257][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.630706][ T309] device bridge_slave_0 entered promiscuous mode [ 43.637450][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.645066][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.652524][ T309] device bridge_slave_1 entered promiscuous mode [ 43.690959][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.697977][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.705254][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.712273][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.731820][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.739110][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.746841][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.754615][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.771071][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.779153][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.786187][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.793869][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.802284][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.809278][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.817123][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.825099][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.840072][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.849666][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.868597][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.877206][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.886336][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.924874][ T315] EXT4-fs (sda1): re-mounted. Opts: (null) [ 44.010394][ T309] syz-executor.0 (309) used greatest stack depth: 25392 bytes left [ 44.850666][ T93] device bridge_slave_1 left promiscuous mode [ 44.856822][ T93] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.864426][ T93] device bridge_slave_0 left promiscuous mode [ 44.870577][ T93] bridge0: port 1(bridge_slave_0) entered disabled state 2022/10/02 12:23:05 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir3233455026: read-only file system