Warning: Permanently added '10.128.1.16' (ECDSA) to the list of known hosts. 2022/10/02 02:23:19 ignoring optional flag "sandboxArg"="0" 2022/10/02 02:23:19 parsed 1 programs [ 52.894001][ T23] audit: type=1400 audit(1664677399.279:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.898056][ T23] audit: type=1400 audit(1664677399.279:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.906031][ T23] audit: type=1400 audit(1664677399.289:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.911831][ T23] audit: type=1400 audit(1664677399.289:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.914918][ T303] cgroup1: Unknown subsys name 'net' [ 52.925737][ T23] audit: type=1400 audit(1664677399.289:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.931139][ T303] cgroup1: Unknown subsys name 'net_prio' [ 52.954258][ T23] audit: type=1400 audit(1664677399.299:78): avc: denied { mounton } for pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 52.960157][ T303] cgroup1: Unknown subsys name 'devices' [ 52.982534][ T23] audit: type=1400 audit(1664677399.299:79): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.988545][ T303] cgroup1: Unknown subsys name 'blkio' [ 53.016175][ T23] audit: type=1400 audit(1664677399.399:80): avc: denied { unmount } for pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 53.120897][ T303] cgroup1: Unknown subsys name 'hugetlb' [ 53.126764][ T303] cgroup1: Unknown subsys name 'rlimit' 2022/10/02 02:23:19 executed programs: 0 [ 53.220342][ T23] audit: type=1400 audit(1664677399.609:81): avc: denied { mounton } for pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 53.247246][ T23] audit: type=1400 audit(1664677399.609:82): avc: denied { mount } for pid=303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 53.285668][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.292835][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.300370][ T307] device bridge_slave_0 entered promiscuous mode [ 53.307418][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.314460][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.321857][ T307] device bridge_slave_1 entered promiscuous mode [ 53.360711][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.367729][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.375145][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.382160][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.402088][ T68] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.409292][ T68] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.416486][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.424708][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.433749][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.442066][ T119] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.449095][ T119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.457505][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.465844][ T68] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.472886][ T68] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.489460][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.497400][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.509493][ T119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.520569][ T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.539740][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 53.548047][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 53.556747][ T102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.580818][ T315] ====================================================== [ 53.580818][ T315] WARNING: the mand mount option is being deprecated and [ 53.580818][ T315] will be removed in v5.15! [ 53.580818][ T315] ====================================================== [ 53.623699][ T315] EXT4-fs (sda1): re-mounted. Opts: (null) [ 53.740564][ T307] syz-executor.0 (307) used greatest stack depth: 25216 bytes left [ 54.528738][ T172] device bridge_slave_1 left promiscuous mode [ 54.534846][ T172] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.542322][ T172] device bridge_slave_0 left promiscuous mode [ 54.548417][ T172] bridge0: port 1(bridge_slave_0) entered disabled state 2022/10/02 02:23:31 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir827893252: read-only file system