Warning: Permanently added '10.128.0.155' (ECDSA) to the list of known hosts. 2022/09/15 20:56:38 ignoring optional flag "sandboxArg"="0" 2022/09/15 20:56:38 parsed 1 programs 2022/09/15 20:56:38 executed programs: 0 [ 40.389728][ T24] audit: type=1400 audit(1663275398.250:148): avc: denied { mounton } for pid=402 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.415334][ T24] audit: type=1400 audit(1663275398.270:149): avc: denied { mount } for pid=402 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 40.454860][ T24] audit: type=1400 audit(1663275398.310:150): avc: denied { mounton } for pid=407 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 40.479016][ T24] audit: type=1400 audit(1663275398.320:151): avc: denied { module_request } for pid=407 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 40.492158][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.510093][ T407] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.517351][ T407] device bridge_slave_0 entered promiscuous mode [ 40.525066][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.532443][ T407] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.539994][ T407] device bridge_slave_1 entered promiscuous mode [ 40.566473][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.573656][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.581036][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.588143][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.604874][ T75] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.612701][ T75] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.620721][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.628147][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.650000][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.658449][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.667019][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.675329][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.685333][ T122] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.692404][ T122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.700269][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.708500][ T122] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.715551][ T122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.723003][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.731053][ T122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.746599][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.746623][ T24] audit: type=1400 audit(1663275398.600:152): avc: denied { mount } for pid=407 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 40.758509][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.789078][ T24] audit: type=1400 audit(1663275398.650:153): avc: denied { mounton } for pid=412 comm="syz-executor.0" path="/root/syzkaller-testdir3397323365/syzkaller.BKfU1I/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 40.795539][ T413] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue [ 40.817403][ T24] audit: type=1400 audit(1663275398.650:154): avc: denied { remount } for pid=412 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 40.847323][ T24] audit: type=1400 audit(1663275398.690:155): avc: denied { unmount } for pid=407 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 41.389421][ T10] device bridge_slave_1 left promiscuous mode [ 41.396079][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.403899][ T24] audit: type=1400 audit(1663275399.260:156): avc: denied { append } for pid=142 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 41.426485][ T24] audit: type=1400 audit(1663275399.260:157): avc: denied { open } for pid=142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 41.426722][ T10] device bridge_slave_0 left promiscuous mode [ 41.455036][ T10] bridge0: port 1(bridge_slave_0) entered disabled state 2022/09/15 20:56:49 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir4163212148: structure needs cleaning