Warning: Permanently added '10.128.10.53' (ED25519) to the list of known hosts. 2023/12/26 12:07:32 ignoring optional flag "sandboxArg"="0" 2023/12/26 12:07:32 parsed 1 programs [ 40.699464][ T27] audit: type=1400 audit(1703592452.939:156): avc: denied { mounton } for pid=342 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.724577][ T27] audit: type=1400 audit(1703592452.939:157): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2023/12/26 12:07:33 executed programs: 0 [ 40.768033][ T27] audit: type=1400 audit(1703592453.009:158): avc: denied { unlink } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.802149][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.823525][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.830634][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.837845][ T348] device bridge_slave_0 entered promiscuous mode [ 40.844220][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.851341][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.858581][ T348] device bridge_slave_1 entered promiscuous mode [ 40.870540][ T27] audit: type=1400 audit(1703592453.109:159): avc: denied { write } for pid=348 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.872082][ T348] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.891045][ T27] audit: type=1400 audit(1703592453.109:160): avc: denied { read } for pid=348 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.898020][ T348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.898040][ T348] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.932611][ T348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.942234][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.949379][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.956524][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.964372][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.972977][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.981038][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.988103][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.997897][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.005957][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.014059][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.021001][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.028180][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.035734][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.044089][ T348] device veth0_vlan entered promiscuous mode [ 41.050354][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.057953][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.065006][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.073583][ T348] device veth1_macvtap entered promiscuous mode [ 41.079926][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.088914][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.097207][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.106045][ T27] audit: type=1400 audit(1703592453.339:161): avc: denied { mounton } for pid=348 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.131865][ T354] ======================================================= [ 41.131865][ T354] WARNING: The mand mount option has been deprecated and [ 41.131865][ T354] and is ignored by this kernel. Remove the mand [ 41.131865][ T354] option from the mount to silence this warning. [ 41.131865][ T354] ======================================================= [ 41.133945][ T27] audit: type=1400 audit(1703592453.369:162): avc: denied { mounton } for pid=353 comm="syz-executor.0" path="/root/syzkaller-testdir4008075261/syzkaller.c4Rith/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.227853][ T348] syz-executor.0 (348) used greatest stack depth: 10528 bytes left [ 41.757822][ T304] device bridge_slave_1 left promiscuous mode [ 41.764319][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.772198][ T304] device bridge_slave_0 left promiscuous mode [ 41.778125][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.785251][ T304] device veth1_macvtap left promiscuous mode [ 41.791424][ T304] device veth0_vlan left promiscuous mode 2023/12/26 12:07:44 [FATAL] executor failed 11 times: executor 0: exit status 67 err exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67