Warning: Permanently added '10.128.1.103' (ECDSA) to the list of known hosts. 2022/09/09 01:41:16 ignoring optional flag "sandboxArg"="0" 2022/09/09 01:41:16 parsed 1 programs 2022/09/09 01:41:16 executed programs: 0 [ 36.947083][ T23] kauditd_printk_skb: 65 callbacks suppressed [ 36.947093][ T23] audit: type=1400 audit(1662687676.960:148): avc: denied { mounton } for pid=401 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.979216][ T23] audit: type=1400 audit(1662687676.960:149): avc: denied { mount } for pid=401 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.995244][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.002768][ T23] audit: type=1400 audit(1662687676.960:150): avc: denied { mounton } for pid=405 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 37.009782][ T405] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.033772][ T23] audit: type=1400 audit(1662687676.960:151): avc: denied { module_request } for pid=405 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 37.041885][ T405] device bridge_slave_0 entered promiscuous mode [ 37.069508][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.076836][ T405] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.084361][ T405] device bridge_slave_1 entered promiscuous mode [ 37.110176][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.117249][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.124528][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.131569][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.146192][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.154017][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.161818][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.169581][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.186352][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.195044][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.203293][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.212224][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.219260][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.226641][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.234724][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.242042][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.249625][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.258466][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.269206][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.281204][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.289657][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.302400][ T23] audit: type=1400 audit(1662687677.310:152): avc: denied { mount } for pid=405 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 37.327880][ T23] audit: type=1400 audit(1662687677.340:153): avc: denied { mounton } for pid=410 comm="syz-executor.0" path="/root/syzkaller-testdir347323013/syzkaller.gdqVwM/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 37.329394][ T411] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,,errors=continue [ 37.355142][ T23] audit: type=1400 audit(1662687677.340:154): avc: denied { remount } for pid=410 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.385454][ T23] audit: type=1400 audit(1662687677.380:155): avc: denied { unmount } for pid=405 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.386670][ T405] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1143: comm syz-executor.0: corrupted xattr entries [ 38.056112][ T9] device bridge_slave_1 left promiscuous mode [ 38.063092][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.070767][ T9] device bridge_slave_0 left promiscuous mode [ 38.070878][ T23] audit: type=1400 audit(1662687678.080:156): avc: denied { append } for pid=142 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.077076][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.100142][ T23] audit: type=1400 audit(1662687678.080:157): avc: denied { open } for pid=142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.469104][ T396] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 39.483268][ T403] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 40.498171][ T396] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 41.513268][ T403] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 42.527381][ T396] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 43.541585][ T403] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 44.555712][ T396] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 45.571023][ T403] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 46.585384][ T396] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries [ 47.599521][ T403] EXT4-fs error (device sda1): ext4_xattr_set_entry:1589: inode #1141: comm syz-execprog: corrupted xattr entries 2022/09/09 01:41:28 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir3333203930: structure needs cleaning