[ 3.993383][ T90] S02sysctl (90) used greatest stack depth: 23328 bytes left [ 4.196263][ T99] udevd[99]: starting version 3.2.11 [ 4.346514][ T100] udevd[100]: starting eudev-3.2.11 [ 8.151906][ T102] udevd (102) used greatest stack depth: 22608 bytes left [ 13.943373][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 13.943387][ T30] audit: type=1400 audit(1683778528.707:61): avc: denied { transition } for pid=224 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.951831][ T30] audit: type=1400 audit(1683778528.707:62): avc: denied { noatsecure } for pid=224 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.957159][ T30] audit: type=1400 audit(1683778528.707:63): avc: denied { write } for pid=224 comm="sh" path="pipe:[13143]" dev="pipefs" ino=13143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.962538][ T30] audit: type=1400 audit(1683778528.707:64): avc: denied { rlimitinh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.975463][ T30] audit: type=1400 audit(1683778528.707:65): avc: denied { siginh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.82' (ECDSA) to the list of known hosts. 2023/05/11 04:15:55 ignoring optional flag "sandboxArg"="0" 2023/05/11 04:15:56 parsed 1 programs [ 41.321802][ T30] audit: type=1400 audit(1683778556.077:66): avc: denied { integrity } for pid=306 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 41.343979][ T30] audit: type=1400 audit(1683778556.087:67): avc: denied { getattr } for pid=306 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.350260][ T311] cgroup: Unknown subsys name 'net' [ 41.367828][ T30] audit: type=1400 audit(1683778556.087:68): avc: denied { read } for pid=306 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.393322][ T30] audit: type=1400 audit(1683778556.087:69): avc: denied { open } for pid=306 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.393521][ T311] cgroup: Unknown subsys name 'devices' [ 41.416444][ T30] audit: type=1400 audit(1683778556.097:70): avc: denied { read } for pid=306 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.444473][ T30] audit: type=1400 audit(1683778556.097:71): avc: denied { open } for pid=306 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.467732][ T30] audit: type=1400 audit(1683778556.107:72): avc: denied { mounton } for pid=311 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 41.490267][ T30] audit: type=1400 audit(1683778556.107:73): avc: denied { mount } for pid=311 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.512298][ T30] audit: type=1400 audit(1683778556.137:74): avc: denied { unmount } for pid=311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.625575][ T311] cgroup: Unknown subsys name 'hugetlb' [ 41.631202][ T311] cgroup: Unknown subsys name 'rlimit' 2023/05/11 04:15:56 executed programs: 0 [ 41.844429][ T30] audit: type=1400 audit(1683778556.607:75): avc: denied { mounton } for pid=311 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.917774][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.924859][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.932196][ T316] device bridge_slave_0 entered promiscuous mode [ 41.939081][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.945950][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.953315][ T316] device bridge_slave_1 entered promiscuous mode [ 41.999501][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.006366][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.013480][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.020234][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.041147][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.048327][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.056003][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.063300][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.071802][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.079749][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.086601][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.104463][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.112448][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.119366][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.126844][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.135882][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.148074][ T316] device veth0_vlan entered promiscuous mode [ 42.154324][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.162293][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.169768][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.177164][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.190315][ T316] device veth1_macvtap entered promiscuous mode [ 42.197313][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.211171][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.219615][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.244912][ T325] ======================================================= [ 42.244912][ T325] WARNING: The mand mount option has been deprecated and [ 42.244912][ T325] and is ignored by this kernel. Remove the mand [ 42.244912][ T325] option from the mount to silence this warning. [ 42.244912][ T325] ======================================================= [ 42.408133][ T325] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 42.464335][ T316] syz-executor.0 (316) used greatest stack depth: 19296 bytes left [ 43.253911][ T8] device bridge_slave_1 left promiscuous mode [ 43.259863][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.267428][ T8] device bridge_slave_0 left promiscuous mode [ 43.273436][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.281121][ T8] device veth1_macvtap left promiscuous mode [ 43.286970][ T8] device veth0_vlan left promiscuous mode 2023/05/11 04:16:08 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir879278892: read-only file system