Warning: Permanently added '10.128.0.55' (ED25519) to the list of known hosts. 2024/01/25 21:20:32 ignoring optional flag "sandboxArg"="0" 2024/01/25 21:20:32 parsed 1 programs [ 40.789594][ T27] audit: type=1400 audit(1706217632.643:156): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.815846][ T27] audit: type=1400 audit(1706217632.643:157): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/01/25 21:20:32 executed programs: 0 [ 40.848288][ T27] audit: type=1400 audit(1706217632.703:158): avc: denied { unlink } for pid=341 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 40.878262][ T341] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 40.907035][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.914259][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.921264][ T347] device bridge_slave_0 entered promiscuous mode [ 40.927388][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.934187][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.941352][ T347] device bridge_slave_1 entered promiscuous mode [ 40.953010][ T27] audit: type=1400 audit(1706217632.803:159): avc: denied { write } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.959598][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.974598][ T27] audit: type=1400 audit(1706217632.813:160): avc: denied { read } for pid=347 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 40.981356][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.981378][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.016373][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.025297][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.032363][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.039310][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.046928][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.054649][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.062576][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.069563][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.078341][ T347] device veth0_vlan entered promiscuous mode [ 41.085168][ T347] device veth1_macvtap entered promiscuous mode [ 41.091999][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.100137][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.107626][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.115010][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.122984][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.131192][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.139105][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.145947][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.153331][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.161547][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.171013][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.178986][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.188320][ T27] audit: type=1400 audit(1706217633.033:161): avc: denied { mounton } for pid=347 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.213370][ T352] ======================================================= [ 41.213370][ T352] WARNING: The mand mount option has been deprecated and [ 41.213370][ T352] and is ignored by this kernel. Remove the mand [ 41.213370][ T352] option from the mount to silence this warning. [ 41.213370][ T352] ======================================================= [ 41.213691][ T27] audit: type=1400 audit(1706217633.063:162): avc: denied { mounton } for pid=351 comm="syz-executor.0" path="/root/syzkaller-testdir2516915177/syzkaller.Sq0Ebg/0/file0" dev="sda1" ino=1938 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.838286][ T41] device bridge_slave_1 left promiscuous mode [ 41.844589][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.851756][ T41] device bridge_slave_0 left promiscuous mode [ 41.857619][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.864859][ T41] device veth1_macvtap left promiscuous mode [ 41.870657][ T41] device veth0_vlan left promiscuous mode 2024/01/25 21:20:44 [FATAL] executor failed 11 times: executor 0: exit status 67 err exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67