[ 19.353369][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.361443][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.371943][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.386019][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.984837][ T7] device bridge_slave_1 left promiscuous mode [ 19.991044][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.998992][ T7] device bridge_slave_0 left promiscuous mode [ 20.005345][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.286805][ T24] kauditd_printk_skb: 65 callbacks suppressed [ 30.286819][ T24] audit: type=1400 audit(1664011909.349:148): avc: denied { read } for pid=148 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.10.58' (ECDSA) to the list of known hosts. 2022/09/24 09:31:55 ignoring optional flag "sandboxArg"="0" 2022/09/24 09:31:55 parsed 1 programs 2022/09/24 09:31:55 executed programs: 0 [ 36.693287][ T24] audit: type=1400 audit(1664011915.749:149): avc: denied { mounton } for pid=406 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.718140][ T24] audit: type=1400 audit(1664011915.749:150): avc: denied { mount } for pid=406 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.741572][ T24] audit: type=1400 audit(1664011915.749:151): avc: denied { mounton } for pid=410 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 36.748912][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.766160][ T24] audit: type=1400 audit(1664011915.749:152): avc: denied { module_request } for pid=410 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 36.773869][ T410] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.804257][ T410] device bridge_slave_0 entered promiscuous mode [ 36.811377][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.818807][ T410] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.826215][ T410] device bridge_slave_1 entered promiscuous mode [ 36.854163][ T410] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.861362][ T410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.868686][ T410] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.875781][ T410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.891461][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.899565][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.907194][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.915261][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.923972][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.932572][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.940317][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.955354][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.963474][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.970717][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.978649][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.987016][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.005183][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.013487][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.022027][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.029951][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.038867][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.051598][ T24] audit: type=1400 audit(1664011916.109:153): avc: denied { mount } for pid=410 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 37.085999][ T24] audit: type=1400 audit(1664011916.149:154): avc: denied { mounton } for pid=416 comm="syz-executor.0" path="/root/syzkaller-testdir1682942944/syzkaller.pDfol6/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 37.087999][ T417] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue. Quota mode: none. [ 37.113408][ T24] audit: type=1400 audit(1664011916.149:155): avc: denied { remount } for pid=416 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.145622][ T24] audit: type=1400 audit(1664011916.189:156): avc: denied { unmount } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.147213][ T410] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1143: comm syz-executor.0: corrupted xattr entries [ 37.814814][ T7] device bridge_slave_1 left promiscuous mode [ 37.821058][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.828853][ T7] device bridge_slave_0 left promiscuous mode [ 37.836115][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.228041][ T404] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 38.245134][ T24] audit: type=1400 audit(1664011917.309:157): avc: denied { append } for pid=148 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.269508][ T24] audit: type=1400 audit(1664011917.309:158): avc: denied { open } for pid=148 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.242242][ T415] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 40.257745][ T404] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 41.270845][ T415] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 42.283926][ T404] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 43.297525][ T415] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 44.310252][ T404] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 45.323745][ T415] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 46.336843][ T404] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries [ 47.350305][ T415] EXT4-fs error (device sda1): ext4_xattr_set_entry:1592: inode #1141: comm syz-execprog: corrupted xattr entries 2022/09/24 09:32:07 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir1078511781: structure needs cleaning