Warning: Permanently added '10.128.1.168' (ED25519) to the list of known hosts. 2023/12/26 04:27:01 ignoring optional flag "sandboxArg"="0" 2023/12/26 04:27:01 parsed 1 programs [ 39.778317][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 39.778321][ T29] audit: type=1400 audit(1703564821.185:154): avc: denied { mounton } for pid=337 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.809355][ T29] audit: type=1400 audit(1703564821.185:155): avc: denied { mount } for pid=337 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.832425][ T29] audit: type=1400 audit(1703564821.185:156): avc: denied { setattr } for pid=337 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.857169][ T29] audit: type=1400 audit(1703564821.185:157): avc: denied { read write } for pid=337 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.885242][ T29] audit: type=1400 audit(1703564821.185:158): avc: denied { open } for pid=337 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2023/12/26 04:27:01 executed programs: 0 [ 39.911852][ T29] audit: type=1400 audit(1703564821.325:159): avc: denied { unlink } for pid=337 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.938059][ T29] audit: type=1400 audit(1703564821.325:160): avc: denied { relabelto } for pid=339 comm="mkswap" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 39.965998][ T337] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 39.984825][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.991650][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.998626][ T344] device bridge_slave_0 entered promiscuous mode [ 40.004977][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.011820][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.018797][ T344] device bridge_slave_1 entered promiscuous mode [ 40.030652][ T344] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.037520][ T344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.044611][ T344] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.051453][ T344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.061732][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.070640][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.078041][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.085465][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.092974][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.101357][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.109260][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.117971][ T344] device veth0_vlan entered promiscuous mode [ 40.124581][ T344] device veth1_macvtap entered promiscuous mode [ 40.131223][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.139681][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.147209][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.154175][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.161319][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.169405][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.177596][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.184343][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.191548][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.199201][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.208195][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.216202][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.227927][ T351] ======================================================= [ 40.227927][ T351] WARNING: The mand mount option has been deprecated and [ 40.227927][ T351] and is ignored by this kernel. Remove the mand [ 40.227927][ T351] option from the mount to silence this warning. [ 40.227927][ T351] ======================================================= [ 40.228838][ T29] audit: type=1400 audit(1703564821.635:161): avc: denied { mounton } for pid=349 comm="syz-executor.0" path="/root/syzkaller-testdir452111873/syzkaller.m73b2W/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 40.334769][ T344] syz-executor.0 (344) used greatest stack depth: 10864 bytes left [ 40.874860][ T10] device bridge_slave_1 left promiscuous mode [ 40.880829][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.887878][ T10] device bridge_slave_0 left promiscuous mode [ 40.893740][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.900872][ T10] device veth1_macvtap left promiscuous mode [ 40.907132][ T10] device veth0_vlan left promiscuous mode 2023/12/26 04:27:12 [FATAL] executor failed 11 times: executor 0: failed to write control pipe: write |1: broken pipe SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67