Warning: Permanently added '10.128.1.134' (ECDSA) to the list of known hosts. 2023/03/28 01:34:30 ignoring optional flag "sandboxArg"="0" 2023/03/28 01:34:30 parsed 1 programs 2023/03/28 01:34:30 executed programs: 0 [ 50.552494][ T30] kauditd_printk_skb: 65 callbacks suppressed [ 50.552501][ T30] audit: type=1400 audit(1679967270.609:137): avc: denied { mounton } for pid=381 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 50.584153][ T30] audit: type=1400 audit(1679967270.619:138): avc: denied { mount } for pid=381 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 50.614521][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.621698][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.629164][ T385] device bridge_slave_0 entered promiscuous mode [ 50.635907][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.644770][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.652509][ T385] device bridge_slave_1 entered promiscuous mode [ 50.682589][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.689558][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.696736][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.703786][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.718144][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.725927][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.733169][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.740895][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.749497][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.757542][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.764387][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.779089][ T385] device veth0_vlan entered promiscuous mode [ 50.785748][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 50.794225][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.801895][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.810294][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.818147][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.826476][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.833674][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.840885][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.848735][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.859320][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.867918][ T385] device veth1_macvtap entered promiscuous mode [ 50.876151][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.886955][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.898513][ T30] audit: type=1400 audit(1679967270.959:139): avc: denied { mount } for pid=385 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 50.929327][ T30] audit: type=1400 audit(1679967270.989:140): avc: denied { mounton } for pid=391 comm="syz-executor.0" path="/root/syzkaller-testdir2255498746/syzkaller.fJSYJ9/0/file0" dev="sda1" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 50.956698][ T30] audit: type=1400 audit(1679967270.989:141): avc: denied { mount } for pid=391 comm="syz-executor.0" name="/" dev="ramfs" ino=13843 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 50.979734][ T30] audit: type=1400 audit(1679967270.989:142): avc: denied { mounton } for pid=391 comm="syz-executor.0" path="/root/syzkaller-testdir2255498746/syzkaller.fJSYJ9/0/file0" dev="ramfs" ino=13843 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=dir permissive=1 [ 51.007224][ T30] audit: type=1400 audit(1679967270.989:143): avc: denied { unmount } for pid=391 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 51.027711][ T30] audit: type=1400 audit(1679967270.989:144): avc: denied { unmount } for pid=391 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 2023/03/28 01:34:35 executed programs: 975 [ 59.593539][ T6284] VFS: Busy inodes after unmount of ramfs. Self-destruct in 5 seconds. Have a nice day... 2023/03/28 01:34:40 executed programs: 2197 2023/03/28 01:34:45 executed programs: 3427