no interfaces have a carrier
Starting sshd: OK

syzkaller
syzkaller login: [   14.842065][   T23] kauditd_printk_skb: 60 callbacks suppressed
[   14.842073][   T23] audit: type=1400 audit(1664489319.350:71): avc:  denied  { transition } for  pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   14.846658][   T23] audit: type=1400 audit(1664489319.350:72): avc:  denied  { write } for  pid=265 comm="sh" path="pipe:[10638]" dev="pipefs" ino=10638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1
[   14.853991][  T263] sshd (263) used greatest stack depth: 26176 bytes left
Warning: Permanently added '10.128.0.72' (ECDSA) to the list of known hosts.
2022/09/29 22:09:06 ignoring optional flag "sandboxArg"="0"
2022/09/29 22:09:06 parsed 1 programs
[   41.769686][   T23] audit: type=1400 audit(1664489346.270:73): avc:  denied  { getattr } for  pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   41.787105][  T303] cgroup1: Unknown subsys name 'net'
[   41.793193][   T23] audit: type=1400 audit(1664489346.280:74): avc:  denied  { read } for  pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   41.798805][  T303] cgroup1: Unknown subsys name 'net_prio'
[   41.819784][   T23] audit: type=1400 audit(1664489346.280:75): avc:  denied  { open } for  pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   41.825510][  T303] cgroup1: Unknown subsys name 'devices'
[   41.848343][   T23] audit: type=1400 audit(1664489346.280:76): avc:  denied  { read } for  pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   41.854708][  T303] cgroup1: Unknown subsys name 'blkio'
[   41.876978][   T23] audit: type=1400 audit(1664489346.280:77): avc:  denied  { open } for  pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   41.905526][   T23] audit: type=1400 audit(1664489346.290:78): avc:  denied  { mounton } for  pid=303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   41.928128][   T23] audit: type=1400 audit(1664489346.290:79): avc:  denied  { mount } for  pid=303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   41.950177][   T23] audit: type=1400 audit(1664489346.390:80): avc:  denied  { unmount } for  pid=303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   42.032833][  T303] cgroup1: Unknown subsys name 'hugetlb'
[   42.038790][  T303] cgroup1: Unknown subsys name 'rlimit'
2022/09/29 22:09:06 executed programs: 0
[   42.131878][   T23] audit: type=1400 audit(1664489346.640:81): avc:  denied  { mounton } for  pid=303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   42.158441][   T23] audit: type=1400 audit(1664489346.640:82): avc:  denied  { mount } for  pid=303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[   42.198101][  T308] bridge0: port 1(bridge_slave_0) entered blocking state
[   42.205151][  T308] bridge0: port 1(bridge_slave_0) entered disabled state
[   42.212878][  T308] device bridge_slave_0 entered promiscuous mode
[   42.219662][  T308] bridge0: port 2(bridge_slave_1) entered blocking state
[   42.226852][  T308] bridge0: port 2(bridge_slave_1) entered disabled state
[   42.234227][  T308] device bridge_slave_1 entered promiscuous mode
[   42.272959][  T308] bridge0: port 2(bridge_slave_1) entered blocking state
[   42.279976][  T308] bridge0: port 2(bridge_slave_1) entered forwarding state
[   42.287391][  T308] bridge0: port 1(bridge_slave_0) entered blocking state
[   42.294437][  T308] bridge0: port 1(bridge_slave_0) entered forwarding state
[   42.314595][   T68] bridge0: port 1(bridge_slave_0) entered disabled state
[   42.321764][   T68] bridge0: port 2(bridge_slave_1) entered disabled state
[   42.328953][   T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   42.337217][   T68] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   42.346282][  T119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   42.354492][  T119] bridge0: port 1(bridge_slave_0) entered blocking state
[   42.361513][  T119] bridge0: port 1(bridge_slave_0) entered forwarding state
[   42.369911][   T68] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   42.378287][   T68] bridge0: port 2(bridge_slave_1) entered blocking state
[   42.385314][   T68] bridge0: port 2(bridge_slave_1) entered forwarding state
[   42.401229][  T119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   42.409108][  T119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   42.431352][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   42.439921][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   42.448566][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   42.456490][  T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   42.474748][  T119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   42.491262][  T315] ======================================================
[   42.491262][  T315] WARNING: the mand mount option is being deprecated and
[   42.491262][  T315]          will be removed in v5.15!
[   42.491262][  T315] ======================================================
[   42.602210][  T315] EXT4-fs (sda1): re-mounted. Opts: (null)
[   42.690866][  T308] syz-executor.0 (308) used greatest stack depth: 25344 bytes left
[   43.610525][    T7] device bridge_slave_1 left promiscuous mode
[   43.616637][    T7] bridge0: port 2(bridge_slave_1) entered disabled state
[   43.624105][    T7] device bridge_slave_0 left promiscuous mode
[   43.630191][    T7] bridge0: port 1(bridge_slave_0) entered disabled state
2022/09/29 22:09:18 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir634220307: read-only file system