[ 22.360514][ T22] audit: type=1400 audit(1682298335.600:77): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 22.386077][ T22] audit: type=1400 audit(1682298335.600:78): avc: denied { mount } for pid=307 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 22.408987][ T22] audit: type=1400 audit(1682298335.630:79): avc: denied { read write } for pid=307 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=9314 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 22.434480][ T22] audit: type=1400 audit(1682298335.630:80): avc: denied { open } for pid=307 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=9314 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 22.481273][ T22] audit: type=1400 audit(1682298335.630:81): avc: denied { ioctl } for pid=307 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=9314 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 23.095570][ T22] audit: type=1400 audit(1682298336.340:82): avc: denied { read } for pid=295 comm="syz-fuzzer" name="fuse" dev="devtmpfs" ino=9253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 Warning: Permanently added '10.128.1.171' (ECDSA) to the list of known hosts. 2023/04/24 01:05:57 parsed 1 programs 2023/04/24 01:05:57 executed programs: 0 [ 44.165223][ T22] kauditd_printk_skb: 54 callbacks suppressed [ 44.165229][ T22] audit: type=1400 audit(1682298357.410:137): avc: denied { mounton } for pid=328 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 44.198779][ T22] audit: type=1400 audit(1682298357.440:138): avc: denied { mount } for pid=328 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 44.208935][ T333] cgroup1: Unknown subsys name 'perf_event' [ 44.222652][ T22] audit: type=1400 audit(1682298357.440:139): avc: denied { mounton } for pid=333 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 44.228909][ T333] cgroup1: Unknown subsys name 'net_cls' [ 44.251301][ T22] audit: type=1400 audit(1682298357.440:140): avc: denied { mount } for pid=333 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 44.300808][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.307870][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.315481][ T333] device bridge_slave_0 entered promiscuous mode [ 44.322650][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.329670][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.337506][ T333] device bridge_slave_1 entered promiscuous mode [ 44.371584][ T22] audit: type=1400 audit(1682298357.610:141): avc: denied { write } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.378214][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.392635][ T22] audit: type=1400 audit(1682298357.610:142): avc: denied { read } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.399582][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.427774][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.434971][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.455548][ T118] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.463259][ T118] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.471007][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.479579][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.489016][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.497220][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.504261][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.522746][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.530915][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.537953][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.545471][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.553609][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.564503][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.583461][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.591382][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.602004][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.612487][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.655268][ T340] Zero length message leads to an empty skb 2023/04/24 01:06:02 executed programs: 33 2023/04/24 01:06:07 executed programs: 69 2023/04/24 01:06:12 executed programs: 103 2023/04/24 01:06:17 executed programs: 139 [ 66.572433][ T12] cfg80211: failed to load regulatory.db [ 66.582278][ T22] audit: type=1400 audit(1682298379.830:143): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/24 01:06:22 executed programs: 174 2023/04/24 01:06:27 executed programs: 208 2023/04/24 01:06:32 executed programs: 243 2023/04/24 01:06:38 executed programs: 280 2023/04/24 01:06:43 executed programs: 315 2023/04/24 01:06:48 executed programs: 351 2023/04/24 01:06:53 executed programs: 387 2023/04/24 01:06:58 executed programs: 425 2023/04/24 01:07:03 executed programs: 460 2023/04/24 01:07:08 executed programs: 495 2023/04/24 01:07:13 executed programs: 531 2023/04/24 01:07:18 executed programs: 566 2023/04/24 01:07:23 executed programs: 602 2023/04/24 01:07:28 executed programs: 638 2023/04/24 01:07:33 executed programs: 673 2023/04/24 01:07:39 executed programs: 709 2023/04/24 01:07:44 executed programs: 745 2023/04/24 01:07:49 executed programs: 780 2023/04/24 01:07:54 executed programs: 816 2023/04/24 01:07:59 executed programs: 852 2023/04/24 01:08:04 executed programs: 886 2023/04/24 01:08:09 executed programs: 921 2023/04/24 01:08:14 executed programs: 954 2023/04/24 01:08:19 executed programs: 989 2023/04/24 01:08:24 executed programs: 1021 2023/04/24 01:08:29 executed programs: 1054 2023/04/24 01:08:34 executed programs: 1087 2023/04/24 01:08:39 executed programs: 1119 2023/04/24 01:08:44 executed programs: 1152 2023/04/24 01:08:50 executed programs: 1187 2023/04/24 01:08:55 executed programs: 1221 2023/04/24 01:09:00 executed programs: 1252 2023/04/24 01:09:05 executed programs: 1288 2023/04/24 01:09:10 executed programs: 1321 2023/04/24 01:09:15 executed programs: 1354 2023/04/24 01:09:20 executed programs: 1388 2023/04/24 01:09:25 executed programs: 1422 2023/04/24 01:09:30 executed programs: 1456 2023/04/24 01:09:35 executed programs: 1492 2023/04/24 01:09:40 executed programs: 1526 2023/04/24 01:09:45 executed programs: 1558 2023/04/24 01:09:50 executed programs: 1592 2023/04/24 01:09:55 executed programs: 1627 2023/04/24 01:10:01 executed programs: 1660 2023/04/24 01:10:06 executed programs: 1692 2023/04/24 01:10:11 executed programs: 1724 2023/04/24 01:10:16 executed programs: 1757 2023/04/24 01:10:21 executed programs: 1792 2023/04/24 01:10:26 executed programs: 1824 2023/04/24 01:10:31 executed programs: 1857 [ 322.572218][ T7] kworker/dying (7) used greatest stack depth: 21496 bytes left 2023/04/24 01:10:36 executed programs: 1892 2023/04/24 01:10:41 executed programs: 1926 2023/04/24 01:10:46 executed programs: 1961 2023/04/24 01:10:51 executed programs: 1994 2023/04/24 01:10:56 executed programs: 2028 2023/04/24 01:11:01 executed programs: 2061 2023/04/24 01:11:06 executed programs: 2095 2023/04/24 01:11:12 executed programs: 2129 2023/04/24 01:11:17 executed programs: 2164 2023/04/24 01:11:22 executed programs: 2198 2023/04/24 01:11:27 executed programs: 2232 2023/04/24 01:11:32 executed programs: 2265 2023/04/24 01:11:37 executed programs: 2299 2023/04/24 01:11:42 executed programs: 2335 2023/04/24 01:11:47 executed programs: 2368 2023/04/24 01:11:52 executed programs: 2401