Warning: Permanently added '10.128.1.34' (ED25519) to the list of known hosts. 2024/03/19 23:29:08 ignoring optional flag "sandboxArg"="0" 2024/03/19 23:29:08 parsed 1 programs [ 39.552873][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 39.552877][ T29] audit: type=1400 audit(1710890948.911:154): avc: denied { mounton } for pid=338 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.584173][ T29] audit: type=1400 audit(1710890948.911:155): avc: denied { mount } for pid=338 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.607485][ T29] audit: type=1400 audit(1710890948.911:156): avc: denied { setattr } for pid=338 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.631525][ T29] audit: type=1400 audit(1710890948.911:157): avc: denied { read write } for pid=338 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.658236][ T29] audit: type=1400 audit(1710890948.911:158): avc: denied { open } for pid=338 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/03/19 23:29:09 executed programs: 0 [ 39.684474][ T29] audit: type=1400 audit(1710890948.971:159): avc: denied { unlink } for pid=338 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.710143][ T29] audit: type=1400 audit(1710890948.971:160): avc: denied { relabelto } for pid=339 comm="mkswap" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.736121][ T338] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 39.764630][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.771626][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.778843][ T344] device bridge_slave_0 entered promiscuous mode [ 39.785317][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.792549][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.799551][ T344] device bridge_slave_1 entered promiscuous mode [ 39.811557][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.818719][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.825990][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.833606][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.843034][ T38] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.850374][ T38] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.857439][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.864640][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.872666][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.880577][ T56] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.887505][ T56] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.896244][ T344] device veth0_vlan entered promiscuous mode [ 39.902304][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.910561][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.918816][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.927365][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.935241][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.943302][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.950129][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.957239][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.965043][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.973759][ T344] device veth1_macvtap entered promiscuous mode [ 39.980265][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.988479][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.998727][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.008611][ T352] ======================================================= [ 40.008611][ T352] WARNING: The mand mount option has been deprecated and [ 40.008611][ T352] and is ignored by this kernel. Remove the mand [ 40.008611][ T352] option from the mount to silence this warning. [ 40.008611][ T352] ======================================================= [ 40.008630][ T29] audit: type=1400 audit(1710890949.371:161): avc: denied { mounton } for pid=351 comm="syz-executor.0" path="/root/syzkaller-testdir1510498708/syzkaller.kTj3zo/0/file0" dev="sda1" ino=1938 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 40.867420][ T8] device bridge_slave_1 left promiscuous mode [ 40.873579][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.880554][ T8] device bridge_slave_0 left promiscuous mode [ 40.886338][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.893543][ T8] device veth1_macvtap left promiscuous mode [ 40.899353][ T8] device veth0_vlan left promiscuous mode 2024/03/19 23:29:20 [FATAL] executor failed 11 times: executor 0: exit status 67 err exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67