Warning: Permanently added '10.128.1.29' (ECDSA) to the list of known hosts. 2022/06/09 00:15:07 parsed 1 programs [ 38.617458][ T23] audit: type=1400 audit(1654733707.689:148): avc: denied { mounton } for pid=401 comm="syz-executor" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 38.618279][ T401] cgroup: Unknown subsys name 'net' [ 38.646328][ T401] cgroup: Unknown subsys name 'devices' [ 38.652803][ T401] cgroup: Unknown subsys name 'hugetlb' [ 38.658446][ T401] cgroup: Unknown subsys name 'rlimit' 2022/06/09 00:15:07 executed programs: 0 [ 38.664598][ T23] audit: type=1400 audit(1654733707.739:149): avc: denied { mounton } for pid=401 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.690358][ T23] audit: type=1400 audit(1654733707.739:150): avc: denied { mount } for pid=401 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.712522][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.714145][ T23] audit: type=1400 audit(1654733707.739:151): avc: denied { mounton } for pid=404 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 38.720713][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.744974][ T23] audit: type=1400 audit(1654733707.739:152): avc: denied { module_request } for pid=404 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 38.752742][ T404] device bridge_slave_0 entered promiscuous mode [ 38.780528][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.787633][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.795086][ T404] device bridge_slave_1 entered promiscuous mode [ 38.820804][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.827965][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.835187][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.842252][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.857283][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.864883][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.872800][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.881393][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.890157][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.898958][ T382] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.906179][ T382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.928315][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.937828][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.948973][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.957594][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.966006][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.974354][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.982763][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.990137][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.997643][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.006176][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.018974][ T23] audit: type=1400 audit(1654733708.099:153): avc: denied { mount } for pid=404 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 39.044971][ T23] audit: type=1400 audit(1654733708.129:154): avc: denied { mounton } for pid=409 comm="syz-executor.0" path="/root/syzkaller-testdir551770307/syzkaller.2WS4vE/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1