Warning: Permanently added '10.128.0.70' (ED25519) to the list of known hosts. 2024/10/30 13:25:03 ignoring optional flag "sandboxArg"="0" 2024/10/30 13:25:03 ignoring optional flag "type"="gce" 2024/10/30 13:25:03 parsed 1 programs [ 45.845778][ T24] kauditd_printk_skb: 18 callbacks suppressed [ 45.845792][ T24] audit: type=1400 audit(1730294703.670:94): avc: denied { unlink } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/10/30 13:25:03 executed programs: 0 [ 45.889718][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.947942][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.955245][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.963517][ T348] device bridge_slave_0 entered promiscuous mode [ 45.970779][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.978508][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.986445][ T348] device bridge_slave_1 entered promiscuous mode [ 46.026098][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.032971][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.040472][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.048599][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.067684][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.075517][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.083395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.091387][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.101114][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.109463][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.116756][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.126009][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.134163][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.141163][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.154208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.163812][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.179263][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.191745][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.200716][ T24] audit: type=1400 audit(1730294704.020:95): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 46.200876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.231376][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.239684][ T348] device veth0_vlan entered promiscuous mode [ 46.251686][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.261233][ T348] device veth1_macvtap entered promiscuous mode [ 46.271635][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.282147][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.297630][ T24] audit: type=1400 audit(1730294704.120:96): avc: denied { mounton } for pid=348 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 46.326251][ T24] audit: type=1400 audit(1730294704.150:97): avc: denied { mounton } for pid=354 comm="syz-executor.0" path="/root/syzkaller-testdir1311388068/syzkaller.mwcfg3/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 46.353314][ T24] audit: type=1400 audit(1730294704.150:98): avc: denied { remount } for pid=354 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 46.369766][ T355] EXT4-fs error (device sda1): ext4_remount:5878: Abort forced by user [ 46.381397][ T355] Aborting journal on device sda1-8. [ 46.428322][ T355] EXT4-fs (sda1): Remounting filesystem read-only [ 46.501268][ T348] EXT4-fs error (device sda1): ext4_journal_check_start:83: Detected aborted journal [ 46.511942][ T348] EXT4-fs (sda1): Remounting filesystem read-only [ 46.518837][ T24] audit: type=1400 audit(1730294704.340:99): avc: denied { unmount } for pid=348 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 2024/10/30 13:25:05 SYZFATAL: executor 0 failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir2150226990: read-only file system [ 47.355974][ T49] device bridge_slave_1 left promiscuous mode [ 47.362173][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.370056][ T49] device bridge_slave_0 left promiscuous mode [ 47.376369][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.384185][ T49] device veth1_macvtap left promiscuous mode [ 47.390572][ T49] device veth0_vlan left promiscuous mode