[ 19.288610][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.301731][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.310318][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.325322][ T376] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 19.847519][ T7] device bridge_slave_1 left promiscuous mode [ 19.853803][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.861755][ T7] device bridge_slave_0 left promiscuous mode [ 19.867973][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.214061][ T24] kauditd_printk_skb: 65 callbacks suppressed [ 30.214076][ T24] audit: type=1400 audit(1664044333.030:148): avc: denied { read } for pid=147 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.119' (ECDSA) to the list of known hosts. 2022/09/24 18:32:19 ignoring optional flag "sandboxArg"="0" 2022/09/24 18:32:19 parsed 1 programs 2022/09/24 18:32:19 executed programs: 0 [ 36.766277][ T24] audit: type=1400 audit(1664044339.580:149): avc: denied { mounton } for pid=402 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.791818][ T24] audit: type=1400 audit(1664044339.610:150): avc: denied { mount } for pid=402 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.815308][ T24] audit: type=1400 audit(1664044339.610:151): avc: denied { mounton } for pid=406 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 36.839561][ T24] audit: type=1400 audit(1664044339.610:152): avc: denied { module_request } for pid=406 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 36.843905][ T406] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.869273][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.876953][ T406] device bridge_slave_0 entered promiscuous mode [ 36.884099][ T406] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.891846][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.899295][ T406] device bridge_slave_1 entered promiscuous mode [ 36.924964][ T406] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.932074][ T406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.939389][ T406] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.946515][ T406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.961909][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.969299][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.976929][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.984801][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.994278][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.002821][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.010102][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.027901][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.036477][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.044812][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.053384][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.060435][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.068343][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.076422][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.091203][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.099789][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.108280][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.120447][ T24] audit: type=1400 audit(1664044339.940:153): avc: denied { mount } for pid=406 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 37.151753][ T24] audit: type=1400 audit(1664044339.970:154): avc: denied { mounton } for pid=411 comm="syz-executor.0" path="/root/syzkaller-testdir3964439353/syzkaller.j1QEsL/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 37.154500][ T412] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue. Quota mode: none. [ 37.191016][ T24] audit: type=1400 audit(1664044339.970:155): avc: denied { remount } for pid=411 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.212078][ T24] audit: type=1400 audit(1664044340.030:156): avc: denied { append } for pid=147 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.235478][ T24] audit: type=1400 audit(1664044340.030:157): avc: denied { open } for pid=147 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.235937][ T406] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1143: comm syz-executor.0: corrupted xattr entries [ 37.258850][ T24] audit: type=1400 audit(1664044340.030:158): avc: denied { getattr } for pid=147 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.977789][ T82] device bridge_slave_1 left promiscuous mode [ 37.983963][ T82] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.991486][ T82] device bridge_slave_0 left promiscuous mode [ 37.998000][ T82] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.340102][ T397] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 39.353216][ T399] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 40.366359][ T397] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 41.379814][ T399] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 42.392511][ T397] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 43.405917][ T399] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 44.418964][ T397] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 45.432197][ T399] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 46.445682][ T397] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 47.458979][ T399] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries 2022/09/24 18:32:31 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir2528817477: structure needs cleaning