Warning: Permanently added '10.128.1.84' (ECDSA) to the list of known hosts. 2022/08/03 11:41:01 parsed 1 programs [ 41.612613][ T22] audit: type=1400 audit(1659526861.809:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.633553][ T304] cgroup1: Unknown subsys name 'net' [ 41.636257][ T22] audit: type=1400 audit(1659526861.819:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.641924][ T304] cgroup1: Unknown subsys name 'net_prio' [ 41.662932][ T22] audit: type=1400 audit(1659526861.819:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.668789][ T304] cgroup1: Unknown subsys name 'devices' [ 41.691779][ T22] audit: type=1400 audit(1659526861.819:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=893 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.698043][ T304] cgroup1: Unknown subsys name 'blkio' [ 41.720843][ T22] audit: type=1400 audit(1659526861.819:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=893 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.750068][ T22] audit: type=1400 audit(1659526861.819:78): avc: denied { mounton } for pid=304 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 41.772815][ T22] audit: type=1400 audit(1659526861.819:79): avc: denied { mount } for pid=304 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.794899][ T22] audit: type=1400 audit(1659526861.929:80): avc: denied { unmount } for pid=304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.909225][ T304] cgroup1: Unknown subsys name 'hugetlb' [ 41.915218][ T304] cgroup1: Unknown subsys name 'rlimit' 2022/08/03 11:41:02 executed programs: 0 [ 42.008457][ T22] audit: type=1400 audit(1659526862.209:81): avc: denied { mounton } for pid=304 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 42.034878][ T22] audit: type=1400 audit(1659526862.209:82): avc: denied { mount } for pid=304 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 42.074549][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.081943][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.089640][ T309] device bridge_slave_0 entered promiscuous mode [ 42.096734][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.103751][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.111337][ T309] device bridge_slave_1 entered promiscuous mode [ 42.150769][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.157823][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.165104][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.172160][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.194164][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.201391][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.209795][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.218038][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.227494][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.236356][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.243418][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.261804][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.270619][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.277856][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.285910][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.294079][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.317389][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.327084][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.335492][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.344354][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.352812][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.378329][ T314] ====================================================== [ 42.378329][ T314] WARNING: the mand mount option is being deprecated and [ 42.378329][ T314] will be removed in v5.15! [ 42.378329][ T314] ====================================================== [ 42.454262][ T314] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 42.508869][ T309] syz-executor.0 (309) used greatest stack depth: 25200 bytes left [ 43.246890][ T7] device bridge_slave_1 left promiscuous mode [ 43.253291][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.261687][ T7] device bridge_slave_0 left promiscuous mode [ 43.267945][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 2022/08/03 11:41:13 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir773816109: read-only file system