Warning: Permanently added '10.128.0.243' (ECDSA) to the list of known hosts. 2022/09/15 21:52:03 ignoring optional flag "sandboxArg"="0" 2022/09/15 21:52:03 parsed 1 programs 2022/09/15 21:52:03 executed programs: 0 [ 37.612784][ T24] audit: type=1400 audit(1663278723.870:148): avc: denied { mounton } for pid=401 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.637879][ T24] audit: type=1400 audit(1663278723.870:149): avc: denied { mount } for pid=401 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.661133][ T24] audit: type=1400 audit(1663278723.910:150): avc: denied { mounton } for pid=405 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 37.685196][ T24] audit: type=1400 audit(1663278723.910:151): avc: denied { module_request } for pid=405 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 37.689435][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.714216][ T405] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.721542][ T405] device bridge_slave_0 entered promiscuous mode [ 37.728264][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.735477][ T405] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.742846][ T405] device bridge_slave_1 entered promiscuous mode [ 37.767556][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.774809][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.782414][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.789455][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.804527][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.812016][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.819738][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.827529][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.835985][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.844314][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.851486][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.872172][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.880967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.889443][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.897446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.905845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.914059][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.921059][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.928945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.937154][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.949142][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.958444][ T24] audit: type=1400 audit(1663278724.220:152): avc: denied { mount } for pid=405 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 37.985882][ T410] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue [ 37.987104][ T24] audit: type=1400 audit(1663278724.240:153): avc: denied { mounton } for pid=409 comm="syz-executor.0" path="/root/syzkaller-testdir268135739/syzkaller.FtsluE/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.024407][ T24] audit: type=1400 audit(1663278724.240:154): avc: denied { remount } for pid=409 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 38.045171][ T24] audit: type=1400 audit(1663278724.250:155): avc: denied { unmount } for pid=405 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 38.712743][ T7] device bridge_slave_1 left promiscuous mode [ 38.718875][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.726379][ T7] device bridge_slave_0 left promiscuous mode [ 38.732640][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.741938][ T24] audit: type=1400 audit(1663278725.000:156): avc: denied { append } for pid=142 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.765206][ T24] audit: type=1400 audit(1663278725.000:157): avc: denied { open } for pid=142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2022/09/15 21:52:15 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir3081240551: structure needs cleaning