[ 52.958956][ T27] audit: type=1400 audit(1663361848.981:82): avc: denied { open } for pid=3608 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 52.984587][ T27] audit: type=1400 audit(1663361848.981:83): avc: denied { ioctl } for pid=3608 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=644 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 55.628269][ T27] audit: type=1400 audit(1663361851.671:84): avc: denied { read } for pid=3598 comm="syz-fuzzer" name="fuse" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 55.748508][ T3598] can: request_module (can-proto-0) failed. [ 55.772852][ T3598] can: request_module (can-proto-0) failed. [ 62.742601][ T27] kauditd_printk_skb: 73 callbacks suppressed [ 62.742617][ T27] audit: type=1400 audit(1663361858.791:158): avc: denied { append } for pid=2954 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 62.771625][ T27] audit: type=1400 audit(1663361858.791:159): avc: denied { open } for pid=2954 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 62.794764][ T27] audit: type=1400 audit(1663361858.791:160): avc: denied { getattr } for pid=2954 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.600827][ T27] audit: type=1400 audit(1663361862.651:161): avc: denied { transition } for pid=3652 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.43' (ECDSA) to the list of known hosts. 2022/09/16 20:57:50 parsed 1 programs [ 74.187376][ T27] audit: type=1400 audit(1663361870.231:162): avc: denied { mounton } for pid=3667 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 74.213062][ T27] audit: type=1400 audit(1663361870.241:163): avc: denied { mount } for pid=3667 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2022/09/16 20:57:50 executed programs: 0 [ 74.409103][ T27] audit: type=1400 audit(1663361870.451:164): avc: denied { mount } for pid=3670 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 74.431887][ T27] audit: type=1400 audit(1663361870.461:165): avc: denied { mounton } for pid=3670 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 74.455417][ T27] audit: type=1400 audit(1663361870.461:166): avc: denied { mount } for pid=3670 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.561473][ T3670] chnl_net:caif_netlink_parms(): no params data found [ 74.598486][ T3670] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.607376][ T3670] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.615982][ T3670] device bridge_slave_0 entered promiscuous mode [ 74.625603][ T3670] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.633275][ T3670] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.641836][ T3670] device bridge_slave_1 entered promiscuous mode [ 74.665648][ T3670] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.676821][ T3670] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.701844][ T3670] team0: Port device team_slave_0 added [ 74.710161][ T3670] team0: Port device team_slave_1 added [ 74.732515][ T3670] device hsr_slave_0 entered promiscuous mode [ 74.739738][ T3670] device hsr_slave_1 entered promiscuous mode [ 74.758402][ T3670] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.765809][ T3670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.774267][ T3670] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.781492][ T3670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.827424][ T3670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.844394][ T3322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.855659][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.865399][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.873509][ T3322] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 74.889506][ T3670] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.901391][ T3322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.909856][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.917111][ T3322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.929545][ T921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.938431][ T921] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.945730][ T921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.964330][ T921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.973722][ T921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.985356][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.003545][ T921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.011921][ T921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.023439][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 75.046908][ T3670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.072038][ T27] audit: type=1400 audit(1663361871.121:167): avc: denied { sys_module } for pid=3670 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.185883][ T27] audit: type=1400 audit(1663361871.231:168): avc: denied { write } for pid=3677 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 75.227072][ T27] audit: type=1400 audit(1663361871.231:169): avc: denied { nlmsg_write } for pid=3677 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 76.541928][ T22] cfg80211: failed to load regulatory.db 2022/09/16 20:57:55 executed programs: 157 2022/09/16 20:58:00 executed programs: 352 2022/09/16 20:58:05 executed programs: 553 2022/09/16 20:58:10 executed programs: 757 2022/09/16 20:58:15 executed programs: 955 2022/09/16 20:58:20 executed programs: 1175 2022/09/16 20:58:25 executed programs: 1509 2022/09/16 20:58:30 executed programs: 1845 2022/09/16 20:58:35 executed programs: 2185 2022/09/16 20:58:40 executed programs: 2534 2022/09/16 20:58:45 executed programs: 2880 2022/09/16 20:58:50 executed programs: 3216 2022/09/16 20:58:55 executed programs: 3541 2022/09/16 20:59:00 executed programs: 3886 2022/09/16 20:59:05 executed programs: 4232 2022/09/16 20:59:10 executed programs: 4567 2022/09/16 20:59:15 executed programs: 4911 2022/09/16 20:59:20 executed programs: 5249 2022/09/16 20:59:25 executed programs: 5587 2022/09/16 20:59:30 executed programs: 5930 2022/09/16 20:59:35 executed programs: 6265 2022/09/16 20:59:40 executed programs: 6594 2022/09/16 20:59:45 executed programs: 6935 2022/09/16 20:59:50 executed programs: 7266 2022/09/16 20:59:55 executed programs: 7600 2022/09/16 21:00:00 executed programs: 7941 2022/09/16 21:00:05 executed programs: 8287 2022/09/16 21:00:10 executed programs: 8639 2022/09/16 21:00:15 executed programs: 8983 2022/09/16 21:00:20 executed programs: 9331 2022/09/16 21:00:25 executed programs: 9677 2022/09/16 21:00:30 executed programs: 10020 2022/09/16 21:00:35 executed programs: 10356 2022/09/16 21:00:40 executed programs: 10706 2022/09/16 21:00:45 executed programs: 11064 2022/09/16 21:00:50 executed programs: 11419 2022/09/16 21:00:55 executed programs: 11754 2022/09/16 21:01:00 executed programs: 12095 2022/09/16 21:01:05 executed programs: 12444 2022/09/16 21:01:10 executed programs: 12796 2022/09/16 21:01:15 executed programs: 13144 2022/09/16 21:01:20 executed programs: 13485 2022/09/16 21:01:25 executed programs: 13840 2022/09/16 21:01:30 executed programs: 14189 2022/09/16 21:01:35 executed programs: 14524 2022/09/16 21:01:40 executed programs: 14872 2022/09/16 21:01:45 executed programs: 15213 2022/09/16 21:01:50 executed programs: 15554 2022/09/16 21:01:55 executed programs: 15886 2022/09/16 21:02:00 executed programs: 16234 2022/09/16 21:02:05 executed programs: 16582 2022/09/16 21:02:10 executed programs: 16938 2022/09/16 21:02:15 executed programs: 17288 2022/09/16 21:02:20 executed programs: 17637 2022/09/16 21:02:25 executed programs: 17991 2022/09/16 21:02:30 executed programs: 18345 2022/09/16 21:02:35 executed programs: 18699 2022/09/16 21:02:40 executed programs: 19044 2022/09/16 21:02:45 executed programs: 19392 2022/09/16 21:02:50 executed programs: 19746 2022/09/16 21:02:55 executed programs: 20077 2022/09/16 21:03:00 executed programs: 20426 2022/09/16 21:03:05 executed programs: 20770 2022/09/16 21:03:10 executed programs: 21132 2022/09/16 21:03:15 executed programs: 21484 2022/09/16 21:03:21 executed programs: 21828 2022/09/16 21:03:26 executed programs: 22184 2022/09/16 21:03:31 executed programs: 22530 2022/09/16 21:03:36 executed programs: 22879 2022/09/16 21:03:41 executed programs: 23230 2022/09/16 21:03:46 executed programs: 23585