[ 35.659501][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.666856][ T8] device bridge_slave_0 left promiscuous mode [ 35.673113][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.680563][ T8] device veth1_macvtap left promiscuous mode [ 35.686461][ T8] device veth0_vlan left promiscuous mode [ 45.656851][ T30] kauditd_printk_skb: 71 callbacks suppressed [ 45.656859][ T30] audit: type=1400 audit(1683599808.940:147): avc: denied { transition } for pid=331 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 45.684482][ T30] audit: type=1400 audit(1683599808.940:148): avc: denied { noatsecure } for pid=331 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 45.703258][ T30] audit: type=1400 audit(1683599808.940:149): avc: denied { rlimitinh } for pid=331 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 45.722336][ T30] audit: type=1400 audit(1683599808.940:150): avc: denied { siginh } for pid=331 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.45' (ECDSA) to the list of known hosts. 2023/05/09 02:36:55 ignoring optional flag "sandboxArg"="0" 2023/05/09 02:36:55 parsed 1 programs 2023/05/09 02:36:55 executed programs: 0 [ 52.615263][ T30] audit: type=1400 audit(1683599815.900:151): avc: denied { mounton } for pid=352 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 52.640062][ T30] audit: type=1400 audit(1683599815.900:152): avc: denied { mount } for pid=352 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 52.670096][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.677178][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.684666][ T356] device bridge_slave_0 entered promiscuous mode [ 52.691184][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.699045][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.706045][ T356] device bridge_slave_1 entered promiscuous mode [ 52.734407][ T30] audit: type=1400 audit(1683599816.020:153): avc: denied { write } for pid=356 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 52.756122][ T30] audit: type=1400 audit(1683599816.050:154): avc: denied { read } for pid=356 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 52.780159][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.786999][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.794107][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.800905][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.815937][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.823012][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.830236][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.837519][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.845939][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.854095][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.860993][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.875466][ T356] device veth0_vlan entered promiscuous mode [ 52.883499][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.891533][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.899333][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.906967][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.914308][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.922276][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.929161][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.936367][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.944029][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.954203][ T356] device veth1_macvtap entered promiscuous mode [ 52.963421][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.971703][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.981025][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.994068][ T30] audit: type=1400 audit(1683599816.280:155): avc: denied { mounton } for pid=356 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 53.021596][ T30] audit: type=1400 audit(1683599816.300:156): avc: denied { write } for pid=361 comm="syz-executor.0" name="vga_arbiter" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 2023/05/09 02:37:51 executed programs: 68