[ 32.432602][ T115] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.440377][ T115] device bridge_slave_0 left promiscuous mode [ 32.446363][ T115] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.453801][ T115] device veth1_macvtap left promiscuous mode [ 32.459891][ T115] device veth0_vlan left promiscuous mode [ 42.462689][ T30] kauditd_printk_skb: 71 callbacks suppressed [ 42.462697][ T30] audit: type=1400 audit(1682560744.499:147): avc: denied { transition } for pid=328 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 42.490497][ T30] audit: type=1400 audit(1682560744.499:148): avc: denied { noatsecure } for pid=328 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 42.509605][ T30] audit: type=1400 audit(1682560744.499:149): avc: denied { rlimitinh } for pid=328 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 42.529007][ T30] audit: type=1400 audit(1682560744.499:150): avc: denied { siginh } for pid=328 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.34' (ECDSA) to the list of known hosts. 2023/04/27 01:59:11 ignoring optional flag "sandboxArg"="0" 2023/04/27 01:59:11 parsed 1 programs 2023/04/27 01:59:11 executed programs: 0 [ 49.654007][ T30] audit: type=1400 audit(1682560751.689:151): avc: denied { mounton } for pid=349 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 49.679285][ T30] audit: type=1400 audit(1682560751.689:152): avc: denied { mount } for pid=349 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 49.709063][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.715989][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.723480][ T352] device bridge_slave_0 entered promiscuous mode [ 49.730252][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.737108][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.744120][ T352] device bridge_slave_1 entered promiscuous mode [ 49.770667][ T30] audit: type=1400 audit(1682560751.809:153): avc: denied { write } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 49.779938][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.791068][ T30] audit: type=1400 audit(1682560751.819:154): avc: denied { read } for pid=352 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 49.797842][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.797912][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.832131][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.847002][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.854135][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.861502][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 49.869295][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.884452][ T352] device veth0_vlan entered promiscuous mode [ 49.891673][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.899868][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.907975][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.915089][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.922414][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.930722][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.937655][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.944788][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.952688][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.959659][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.967795][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.975528][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.986607][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.995937][ T352] device veth1_macvtap entered promiscuous mode [ 50.004218][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.015400][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.025761][ T30] audit: type=1400 audit(1682560752.059:155): avc: denied { mounton } for pid=352 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 50.053738][ T30] audit: type=1400 audit(1682560752.089:156): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir2898016537/syzkaller.07i2EF/0/file0" dev="sda1" ino=1937 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 50.081637][ T30] audit: type=1400 audit(1682560752.089:157): avc: denied { mount } for pid=359 comm="syz-executor.0" name="/" dev="ramfs" ino=12924 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 50.104751][ T30] audit: type=1400 audit(1682560752.089:158): avc: denied { mounton } for pid=359 comm="syz-executor.0" path="/root/syzkaller-testdir2898016537/syzkaller.07i2EF/0/file0" dev="ramfs" ino=12924 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 50.131805][ T30] audit: type=1400 audit(1682560752.089:159): avc: denied { unmount } for pid=359 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 50.152384][ T30] audit: type=1400 audit(1682560752.089:160): avc: denied { unmount } for pid=359 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 2023/04/27 01:59:16 executed programs: 872 2023/04/27 01:59:21 executed programs: 2124 2023/04/27 01:59:26 executed programs: 3375 2023/04/27 01:59:31 executed programs: 4631 [ 74.016557][T17555] VFS: Busy inodes after unmount of ramfs. Self-destruct in 5 seconds. Have a nice day... 2023/04/27 01:59:36 executed programs: 5879 [ 78.406193][T20860] VFS: Busy inodes after unmount of ramfs. Self-destruct in 5 seconds. Have a nice day... 2023/04/27 01:59:41 executed programs: 7134