tclass=fifo_file permissive=1 [ 11.666404][ T30] audit: type=1400 audit(1699599544.939:64): avc: denied { rlimitinh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.670879][ T30] audit: type=1400 audit(1699599544.939:65): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.34' (ED25519) to the list of known hosts. 2023/11/10 06:59:18 ignoring optional flag "sandboxArg"="0" 2023/11/10 06:59:19 parsed 1 programs [ 25.811630][ T30] audit: type=1400 audit(1699599559.089:66): avc: denied { integrity } for pid=292 comm="syz-execprog" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 25.817684][ T30] audit: type=1400 audit(1699599559.099:67): avc: denied { getattr } for pid=292 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 25.821489][ T30] audit: type=1400 audit(1699599559.099:68): avc: denied { read } for pid=292 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 25.826197][ T30] audit: type=1400 audit(1699599559.099:69): avc: denied { open } for pid=292 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 25.831252][ T30] audit: type=1400 audit(1699599559.099:70): avc: denied { read } for pid=292 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.843017][ T298] cgroup: Unknown subsys name 'net' [ 25.851694][ T30] audit: type=1400 audit(1699599559.099:71): avc: denied { open } for pid=292 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.879818][ T30] audit: type=1400 audit(1699599559.119:72): avc: denied { mounton } for pid=298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.902938][ T298] cgroup: Unknown subsys name 'devices' [ 25.906593][ T30] audit: type=1400 audit(1699599559.119:73): avc: denied { mount } for pid=298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.930682][ T30] audit: type=1400 audit(1699599559.179:74): avc: denied { unmount } for pid=298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.068563][ T298] cgroup: Unknown subsys name 'hugetlb' [ 26.074194][ T298] cgroup: Unknown subsys name 'rlimit' [ 26.258910][ T30] audit: type=1400 audit(1699599559.539:75): avc: denied { mounton } for pid=298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.319529][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). 2023/11/10 06:59:19 executed programs: 0 [ 26.364827][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.410681][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.417719][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.424742][ T304] device bridge_slave_0 entered promiscuous mode [ 26.431501][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.438402][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.445421][ T304] device bridge_slave_1 entered promiscuous mode [ 26.482090][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.488953][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.496033][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.502844][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.518817][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.525911][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.533291][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.540653][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.557509][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.565527][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.573648][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.580499][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.587774][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.595654][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.602431][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.609996][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.617784][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.628281][ T304] device veth0_vlan entered promiscuous mode [ 26.634707][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.642486][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.649676][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.660255][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.668924][ T304] device veth1_macvtap entered promiscuous mode [ 26.677925][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.689982][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.708807][ T312] ======================================================= [ 26.708807][ T312] WARNING: The mand mount option has been deprecated and [ 26.708807][ T312] and is ignored by this kernel. Remove the mand [ 26.708807][ T312] option from the mount to silence this warning. [ 26.708807][ T312] ======================================================= [ 26.797799][ T304] syz-executor.0 (304) used greatest stack depth: 20880 bytes left [ 27.397082][ T231] device bridge_slave_1 left promiscuous mode [ 27.403176][ T231] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.410528][ T231] device bridge_slave_0 left promiscuous mode [ 27.416617][ T231] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.424031][ T231] device veth1_macvtap left promiscuous mode [ 27.430092][ T231] device veth0_vlan left promiscuous mode 2023/11/10 06:59:31 [FATAL] executor failed 11 times: executor 0: exit status 67 err exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67