no interfaces have a carrier Starting sshd: OK syzkaller syzkaller login: [ 14.842065][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 14.842073][ T23] audit: type=1400 audit(1664489319.350:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.846658][ T23] audit: type=1400 audit(1664489319.350:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[10638]" dev="pipefs" ino=10638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 14.853991][ T263] sshd (263) used greatest stack depth: 26176 bytes left Warning: Permanently added '10.128.0.72' (ECDSA) to the list of known hosts. 2022/09/29 22:09:06 ignoring optional flag "sandboxArg"="0" 2022/09/29 22:09:06 parsed 1 programs [ 41.769686][ T23] audit: type=1400 audit(1664489346.270:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.787105][ T303] cgroup1: Unknown subsys name 'net' [ 41.793193][ T23] audit: type=1400 audit(1664489346.280:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.798805][ T303] cgroup1: Unknown subsys name 'net_prio' [ 41.819784][ T23] audit: type=1400 audit(1664489346.280:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.825510][ T303] cgroup1: Unknown subsys name 'devices' [ 41.848343][ T23] audit: type=1400 audit(1664489346.280:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.854708][ T303] cgroup1: Unknown subsys name 'blkio' [ 41.876978][ T23] audit: type=1400 audit(1664489346.280:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.905526][ T23] audit: type=1400 audit(1664489346.290:78): avc: denied { mounton } for pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 41.928128][ T23] audit: type=1400 audit(1664489346.290:79): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.950177][ T23] audit: type=1400 audit(1664489346.390:80): avc: denied { unmount } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 42.032833][ T303] cgroup1: Unknown subsys name 'hugetlb' [ 42.038790][ T303] cgroup1: Unknown subsys name 'rlimit' 2022/09/29 22:09:06 executed programs: 0 [ 42.131878][ T23] audit: type=1400 audit(1664489346.640:81): avc: denied { mounton } for pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 42.158441][ T23] audit: type=1400 audit(1664489346.640:82): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 42.198101][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.205151][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.212878][ T308] device bridge_slave_0 entered promiscuous mode [ 42.219662][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.226852][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.234227][ T308] device bridge_slave_1 entered promiscuous mode [ 42.272959][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.279976][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.287391][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.294437][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.314595][ T68] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.321764][ T68] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.328953][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.337217][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.346282][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.354492][ T119] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.361513][ T119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.369911][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.378287][ T68] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.385314][ T68] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.401229][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.409108][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.431352][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.439921][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.448566][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.456490][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.474748][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.491262][ T315] ====================================================== [ 42.491262][ T315] WARNING: the mand mount option is being deprecated and [ 42.491262][ T315] will be removed in v5.15! [ 42.491262][ T315] ====================================================== [ 42.602210][ T315] EXT4-fs (sda1): re-mounted. Opts: (null) [ 42.690866][ T308] syz-executor.0 (308) used greatest stack depth: 25344 bytes left [ 43.610525][ T7] device bridge_slave_1 left promiscuous mode [ 43.616637][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.624105][ T7] device bridge_slave_0 left promiscuous mode [ 43.630191][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 2022/09/29 22:09:18 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir634220307: read-only file system