Warning: Permanently added '10.128.1.43' (ED25519) to the list of known hosts. 2023/11/22 16:50:20 ignoring optional flag "sandboxArg"="0" 2023/11/22 16:50:20 parsed 1 programs [ 40.885632][ T24] audit: type=1400 audit(1700671820.890:154): avc: denied { mounton } for pid=338 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.910811][ T24] audit: type=1400 audit(1700671820.920:155): avc: denied { mount } for pid=338 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 40.934439][ T24] audit: type=1400 audit(1700671820.950:156): avc: denied { unlink } for pid=338 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2023/11/22 16:50:21 executed programs: 0 [ 40.985575][ T338] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 41.035312][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.042218][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.049567][ T345] device bridge_slave_0 entered promiscuous mode [ 41.056703][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.063622][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.071002][ T345] device bridge_slave_1 entered promiscuous mode [ 41.102212][ T24] audit: type=1400 audit(1700671821.110:157): avc: denied { write } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.114268][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.122673][ T24] audit: type=1400 audit(1700671821.110:158): avc: denied { read } for pid=345 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.129547][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.129625][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.163754][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.180597][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.187744][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.195039][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.203219][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.220311][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.228311][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.235216][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.243191][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.251581][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.258425][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.265624][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.273342][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.282971][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.293623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.301564][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.308757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.316834][ T345] device veth0_vlan entered promiscuous mode [ 41.326234][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.335007][ T345] device veth1_macvtap entered promiscuous mode [ 41.346761][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.355198][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.367201][ T24] audit: type=1400 audit(1700671821.380:159): avc: denied { mounton } for pid=345 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.393111][ T350] ====================================================== [ 41.393111][ T350] WARNING: the mand mount option is being deprecated and [ 41.393111][ T350] will be removed in v5.15! [ 41.393111][ T350] ====================================================== [ 41.401169][ T24] audit: type=1400 audit(1700671821.400:160): avc: denied { mounton } for pid=349 comm="syz-executor.0" path="/root/syzkaller-testdir1731389035/syzkaller.RE7smA/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 42.449769][ T9] device bridge_slave_1 left promiscuous mode [ 42.455810][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.463341][ T9] device bridge_slave_0 left promiscuous mode [ 42.469345][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.476774][ T9] device veth1_macvtap left promiscuous mode [ 42.482730][ T9] device veth0_vlan left promiscuous mode 2023/11/22 16:50:32 [FATAL] executor failed 11 times: executor 0: exit status 67 err exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67