Warning: Permanently added '10.128.1.96' (ECDSA) to the list of known hosts. 2023/02/26 02:38:02 ignoring optional flag "sandboxArg"="0" 2023/02/26 02:38:02 parsed 1 programs 2023/02/26 02:38:02 executed programs: 0 [ 43.766362][ T23] audit: type=1400 audit(1677379082.839:148): avc: denied { mounton } for pid=400 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 43.791471][ T23] audit: type=1400 audit(1677379082.839:149): avc: denied { mount } for pid=400 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 43.804202][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.815731][ T23] audit: type=1400 audit(1677379082.839:150): avc: denied { mounton } for pid=404 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 43.822385][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.846839][ T23] audit: type=1400 audit(1677379082.839:151): avc: denied { module_request } for pid=404 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 43.855423][ T404] device bridge_slave_0 entered promiscuous mode [ 43.883419][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.890781][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.898055][ T404] device bridge_slave_1 entered promiscuous mode [ 43.921431][ T404] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.928581][ T404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.935807][ T404] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.942937][ T404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.956354][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.963594][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.970975][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.978734][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.987747][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.995988][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.003141][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.017249][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.025702][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.034155][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.041192][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.049405][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.057548][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.072373][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.080903][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.089847][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.098548][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.110915][ T23] audit: type=1400 audit(1677379083.199:152): avc: denied { mount } for pid=404 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 44.139944][ T23] audit: type=1400 audit(1677379083.219:153): avc: denied { mounton } for pid=409 comm="syz-executor.0" path="/root/syzkaller-testdir2896010483/syzkaller.vS7NHy/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 44.168635][ T23] audit: type=1400 audit(1677379083.219:154): avc: denied { mount } for pid=409 comm="syz-executor.0" name="/" dev="ramfs" ino=11862 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 44.192698][ T23] audit: type=1400 audit(1677379083.219:155): avc: denied { mounton } for pid=409 comm="syz-executor.0" path="/root/syzkaller-testdir2896010483/syzkaller.vS7NHy/0/file0" dev="ramfs" ino=11862 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=dir permissive=1 [ 44.220411][ T23] audit: type=1400 audit(1677379083.219:156): avc: denied { unmount } for pid=409 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 44.241833][ T23] audit: type=1400 audit(1677379083.219:157): avc: denied { unmount } for pid=409 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 2023/02/26 02:38:07 executed programs: 686 2023/02/26 02:38:12 executed programs: 1467 2023/02/26 02:38:17 executed programs: 2249 2023/02/26 02:38:22 executed programs: 3056 [ 66.189101][T10769] VFS: Busy inodes after unmount of ramfs. Self-destruct in 5 seconds. Have a nice day... [ 66.207328][ T23] audit: type=1400 audit(1677379105.289:158): avc: denied { append } for pid=142 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.230925][ T23] audit: type=1400 audit(1677379105.289:159): avc: denied { open } for pid=142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.253771][ T23] audit: type=1400 audit(1677379105.289:160): avc: denied { getattr } for pid=142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2023/02/26 02:38:27 executed programs: 3873 2023/02/26 02:38:32 executed programs: 4719