[ 20.247782][ T22] audit: type=1400 audit(1681621890.459:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.271500][ T22] audit: type=1400 audit(1681621890.479:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.293160][ T22] audit: type=1400 audit(1681621890.479:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.316607][ T22] audit: type=1400 audit(1681621890.479:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=903 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.339865][ T22] audit: type=1400 audit(1681621890.479:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=903 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.369351][ T22] audit: type=1400 audit(1681621890.479:78): avc: denied { setattr } for pid=304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=903 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.396149][ T22] audit: type=1400 audit(1681621890.479:79): avc: denied { execmem } for pid=305 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.417066][ T22] audit: type=1400 audit(1681621890.579:80): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 20.444092][ T22] audit: type=1400 audit(1681621890.579:81): avc: denied { mount } for pid=306 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 20.494983][ T22] audit: type=1400 audit(1681621890.579:82): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.190' (ECDSA) to the list of known hosts. 2023/04/16 05:11:47 parsed 1 programs 2023/04/16 05:11:47 executed programs: 0 [ 37.450737][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 37.450744][ T22] audit: type=1400 audit(1681621907.659:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.483423][ T22] audit: type=1400 audit(1681621907.679:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.493095][ T333] cgroup1: Unknown subsys name 'perf_event' [ 37.507801][ T22] audit: type=1400 audit(1681621907.689:142): avc: denied { mounton } for pid=333 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 37.514192][ T333] cgroup1: Unknown subsys name 'net_cls' [ 37.536911][ T22] audit: type=1400 audit(1681621907.689:143): avc: denied { mount } for pid=333 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.587353][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.594474][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.602226][ T333] device bridge_slave_0 entered promiscuous mode [ 37.609645][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.616974][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.625076][ T333] device bridge_slave_1 entered promiscuous mode [ 37.659104][ T22] audit: type=1400 audit(1681621907.869:144): avc: denied { write } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.666246][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.680469][ T22] audit: type=1400 audit(1681621907.869:145): avc: denied { read } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.687601][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.687721][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.725415][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.746571][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.754286][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.762583][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.770427][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.797196][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.806053][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.813942][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.822551][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.830804][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.839216][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.847682][ T101] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.854793][ T101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.862389][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.872446][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.885842][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.901771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.910632][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/16 05:11:52 executed programs: 533 2023/04/16 05:11:57 executed programs: 1127 2023/04/16 05:12:02 executed programs: 1718 2023/04/16 05:12:07 executed programs: 2323 2023/04/16 05:12:12 executed programs: 2909 [ 66.554993][ T12] cfg80211: failed to load regulatory.db [ 66.566819][ T22] audit: type=1400 audit(1681621936.779:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/16 05:12:17 executed programs: 3497 2023/04/16 05:12:22 executed programs: 4095 2023/04/16 05:12:27 executed programs: 4697 2023/04/16 05:12:32 executed programs: 5294 2023/04/16 05:12:37 executed programs: 5886 2023/04/16 05:12:42 executed programs: 6490 2023/04/16 05:12:47 executed programs: 7077 2023/04/16 05:12:52 executed programs: 7662 2023/04/16 05:12:57 executed programs: 8248 2023/04/16 05:13:02 executed programs: 8831 2023/04/16 05:13:07 executed programs: 9419 2023/04/16 05:13:12 executed programs: 10012 2023/04/16 05:13:17 executed programs: 10603 2023/04/16 05:13:22 executed programs: 11187 2023/04/16 05:13:27 executed programs: 11776 2023/04/16 05:13:32 executed programs: 12357 2023/04/16 05:13:37 executed programs: 12952 2023/04/16 05:13:42 executed programs: 13542 2023/04/16 05:13:47 executed programs: 14135 2023/04/16 05:13:52 executed programs: 14726 2023/04/16 05:13:57 executed programs: 15325 2023/04/16 05:14:02 executed programs: 15916 2023/04/16 05:14:07 executed programs: 16514 2023/04/16 05:14:12 executed programs: 17113 2023/04/16 05:14:17 executed programs: 17719 2023/04/16 05:14:22 executed programs: 18307 2023/04/16 05:14:27 executed programs: 18915 2023/04/16 05:14:32 executed programs: 19509 2023/04/16 05:14:37 executed programs: 20105 2023/04/16 05:14:42 executed programs: 20686 2023/04/16 05:14:47 executed programs: 21279 2023/04/16 05:14:52 executed programs: 21882 2023/04/16 05:14:57 executed programs: 22484 2023/04/16 05:15:02 executed programs: 23062 2023/04/16 05:15:07 executed programs: 23657 2023/04/16 05:15:12 executed programs: 24257 2023/04/16 05:15:17 executed programs: 24849 2023/04/16 05:15:22 executed programs: 25449 2023/04/16 05:15:27 executed programs: 26047 2023/04/16 05:15:32 executed programs: 26643 2023/04/16 05:15:37 executed programs: 27239 2023/04/16 05:15:42 executed programs: 27838 2023/04/16 05:15:47 executed programs: 28423 2023/04/16 05:15:52 executed programs: 29015 2023/04/16 05:15:57 executed programs: 29587 2023/04/16 05:16:02 executed programs: 30159 2023/04/16 05:16:07 executed programs: 30749 2023/04/16 05:16:12 executed programs: 31348 2023/04/16 05:16:17 executed programs: 31943 2023/04/16 05:16:22 executed programs: 32539 2023/04/16 05:16:27 executed programs: 33145 2023/04/16 05:16:32 executed programs: 33736 2023/04/16 05:16:37 executed programs: 34335 2023/04/16 05:16:42 executed programs: 34924 2023/04/16 05:16:47 executed programs: 35521 2023/04/16 05:16:52 executed programs: 36124 2023/04/16 05:16:57 executed programs: 36713 2023/04/16 05:17:02 executed programs: 37309 2023/04/16 05:17:07 executed programs: 37915 2023/04/16 05:17:12 executed programs: 38516 2023/04/16 05:17:17 executed programs: 39122 2023/04/16 05:17:22 executed programs: 39719 2023/04/16 05:17:27 executed programs: 40314 2023/04/16 05:17:32 executed programs: 40914 2023/04/16 05:17:37 executed programs: 41506 2023/04/16 05:17:42 executed programs: 42097