Warning: Permanently added '10.128.15.193' (ED25519) to the list of known hosts. 2025/04/15 02:32:29 ignoring optional flag "sandboxArg"="0" 2025/04/15 02:32:29 ignoring optional flag "type"="gce" 2025/04/15 02:32:29 parsed 1 programs [ 37.032203][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 37.032207][ T29] audit: type=1400 audit(1744684349.857:96): avc: denied { mounton } for pid=336 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.062605][ T29] audit: type=1400 audit(1744684349.857:97): avc: denied { read write } for pid=336 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 37.088555][ T29] audit: type=1400 audit(1744684349.857:98): avc: denied { open } for pid=336 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2025/04/15 02:32:30 executed programs: 0 [ 37.114332][ T29] audit: type=1400 audit(1744684349.917:99): avc: denied { unlink } for pid=336 comm="syz-executor" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 37.139849][ T29] audit: type=1400 audit(1744684349.917:100): avc: denied { relabelto } for pid=337 comm="mkswap" name="swap-file" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 37.168542][ T336] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 37.187219][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.194061][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.201055][ T341] device bridge_slave_0 entered promiscuous mode [ 37.207285][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.214069][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.221138][ T341] device bridge_slave_1 entered promiscuous mode [ 37.233586][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.240602][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.247634][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.254466][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.263621][ T52] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.270566][ T52] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.277434][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.284418][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.291961][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.299798][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.306673][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.314041][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.321874][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.328682][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.336599][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.344516][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.353268][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.361834][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.369468][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.376483][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.383768][ T341] device veth0_vlan entered promiscuous mode [ 37.390241][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.398622][ T341] device veth1_macvtap entered promiscuous mode [ 37.405271][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.413800][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.427547][ T346] ======================================================= [ 37.427547][ T346] WARNING: The mand mount option has been deprecated and [ 37.427547][ T346] and is ignored by this kernel. Remove the mand [ 37.427547][ T346] option from the mount to silence this warning. [ 37.427547][ T346] ======================================================= [ 37.437528][ T29] audit: type=1400 audit(1744684350.257:101): avc: denied { mounton } for pid=345 comm="syz-executor.0" path="/root/syzkaller-testdir2710367700/syzkaller.8SSIUc/0/file0" dev="sda1" ino=1939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.527837][ T52] device bridge_slave_1 left promiscuous mode [ 38.533869][ T52] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.540833][ T52] device bridge_slave_0 left promiscuous mode [ 38.546840][ T52] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.554227][ T52] device veth1_macvtap left promiscuous mode [ 38.560016][ T52] device veth0_vlan left promiscuous mode 2025/04/15 02:32:41 [FATAL] executor failed 11 times: executor 0: exit status 67 err exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 exit status 67