DUID 00:04:a5:83:b3:44:32:6a:bc:1c:c0:1b:46:1c:69:7c:b7:16 forked to background, child pid 192 Starting sshd: OK syzkaller syzkaller login: [ 13.037083][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 13.037090][ T22] audit: type=1400 audit(1662648706.400:71): avc: denied { transition } for pid=264 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.045887][ T22] audit: type=1400 audit(1662648706.410:72): avc: denied { write } for pid=264 comm="sh" path="pipe:[647]" dev="pipefs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.152' (ECDSA) to the list of known hosts. 2022/09/08 14:52:16 ignoring optional flag "sandboxArg"="0" 2022/09/08 14:52:17 parsed 1 programs [ 43.752885][ T22] audit: type=1400 audit(1662648737.120:73): avc: denied { getattr } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.758394][ T22] audit: type=1400 audit(1662648737.120:74): avc: denied { read } for pid=298 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.764623][ T22] audit: type=1400 audit(1662648737.120:75): avc: denied { open } for pid=298 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.767688][ T304] cgroup1: Unknown subsys name 'net' [ 43.770540][ T22] audit: type=1400 audit(1662648737.120:76): avc: denied { read } for pid=298 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.772258][ T304] cgroup1: Unknown subsys name 'net_prio' [ 43.790662][ T22] audit: type=1400 audit(1662648737.120:77): avc: denied { open } for pid=298 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.796730][ T304] cgroup1: Unknown subsys name 'devices' [ 43.819691][ T22] audit: type=1400 audit(1662648737.130:78): avc: denied { mounton } for pid=304 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 43.825816][ T304] cgroup1: Unknown subsys name 'blkio' [ 43.847924][ T22] audit: type=1400 audit(1662648737.130:79): avc: denied { mount } for pid=304 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.875304][ T22] audit: type=1400 audit(1662648737.220:80): avc: denied { unmount } for pid=304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.971884][ T304] cgroup1: Unknown subsys name 'hugetlb' [ 43.977882][ T304] cgroup1: Unknown subsys name 'rlimit' 2022/09/08 14:52:17 executed programs: 0 [ 44.071459][ T22] audit: type=1400 audit(1662648737.440:81): avc: denied { mounton } for pid=304 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 44.098715][ T22] audit: type=1400 audit(1662648737.440:82): avc: denied { mount } for pid=304 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 44.137067][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.144125][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.151834][ T307] device bridge_slave_0 entered promiscuous mode [ 44.158605][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.165658][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.173066][ T307] device bridge_slave_1 entered promiscuous mode [ 44.210316][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.217447][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.224883][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.231906][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.251415][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.258719][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.266577][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.274889][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.290305][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.298477][ T67] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.305501][ T67] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.312983][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.321315][ T67] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.328316][ T67] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.336113][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.360664][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.368973][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.377555][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.386478][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.396336][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.404832][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.431898][ T313] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue [ 44.445481][ T307] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1142: comm syz-executor.0: corrupted xattr entries [ 44.571119][ T307] syz-executor.0 (307) used greatest stack depth: 25120 bytes left [ 45.200920][ T172] device bridge_slave_1 left promiscuous mode [ 45.207042][ T172] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.214484][ T172] device bridge_slave_0 left promiscuous mode [ 45.220648][ T172] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.572958][ T301] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 46.586963][ T302] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 47.600793][ T301] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 48.614676][ T302] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 49.628706][ T301] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 50.642701][ T302] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 51.656769][ T301] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 52.670732][ T302] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 53.684763][ T301] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries [ 54.698783][ T302] EXT4-fs error (device sda1): ext4_xattr_set_entry:1606: inode #1140: comm syz-execprog: corrupted xattr entries 2022/09/08 14:52:29 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir1456494370: structure needs cleaning