Warning: Permanently added '10.128.1.159' (ECDSA) to the list of known hosts. 2023/04/15 20:08:56 parsed 1 programs 2023/04/15 20:08:56 executed programs: 0 [ 39.399798][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 39.399805][ T22] audit: type=1400 audit(1681589336.790:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.431739][ T22] audit: type=1400 audit(1681589336.790:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.440825][ T334] cgroup1: Unknown subsys name 'perf_event' [ 39.455767][ T22] audit: type=1400 audit(1681589336.820:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 39.462591][ T334] cgroup1: Unknown subsys name 'net_cls' [ 39.485523][ T22] audit: type=1400 audit(1681589336.820:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.535373][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.542860][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.550627][ T334] device bridge_slave_0 entered promiscuous mode [ 39.557440][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.564697][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.572123][ T334] device bridge_slave_1 entered promiscuous mode [ 39.607649][ T22] audit: type=1400 audit(1681589336.990:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.614191][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.631684][ T22] audit: type=1400 audit(1681589336.990:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.638899][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.667096][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.674516][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.694983][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.702641][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.710771][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.718418][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.728127][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.736492][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.743754][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.760044][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.768202][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.775275][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.782791][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.791463][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.809299][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.817847][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.828530][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.844151][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.852759][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/15 20:09:01 executed programs: 547 2023/04/15 20:09:06 executed programs: 1158 2023/04/15 20:09:11 executed programs: 1757 2023/04/15 20:09:16 executed programs: 2379 2023/04/15 20:09:21 executed programs: 2993 [ 67.369547][ T12] cfg80211: failed to load regulatory.db [ 67.376879][ T22] audit: type=1400 audit(1681589364.760:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/15 20:09:26 executed programs: 3596 2023/04/15 20:09:31 executed programs: 4194 2023/04/15 20:09:36 executed programs: 4800 2023/04/15 20:09:41 executed programs: 5399 2023/04/15 20:09:46 executed programs: 6002 2023/04/15 20:09:51 executed programs: 6608 2023/04/15 20:09:56 executed programs: 7210 2023/04/15 20:10:01 executed programs: 7816 2023/04/15 20:10:06 executed programs: 8425 2023/04/15 20:10:11 executed programs: 9041 2023/04/15 20:10:16 executed programs: 9668 2023/04/15 20:10:21 executed programs: 10270 2023/04/15 20:10:26 executed programs: 10864 2023/04/15 20:10:31 executed programs: 11461 2023/04/15 20:10:36 executed programs: 12072 2023/04/15 20:10:41 executed programs: 12676 2023/04/15 20:10:46 executed programs: 13285 2023/04/15 20:10:51 executed programs: 13895 2023/04/15 20:10:56 executed programs: 14497 2023/04/15 20:11:01 executed programs: 15112 2023/04/15 20:11:06 executed programs: 15724 2023/04/15 20:11:11 executed programs: 16336 2023/04/15 20:11:16 executed programs: 16957 2023/04/15 20:11:21 executed programs: 17570 2023/04/15 20:11:26 executed programs: 18183 2023/04/15 20:11:31 executed programs: 18811 2023/04/15 20:11:36 executed programs: 19428 2023/04/15 20:11:41 executed programs: 20047 2023/04/15 20:11:46 executed programs: 20669 2023/04/15 20:11:51 executed programs: 21294 2023/04/15 20:11:56 executed programs: 21912 2023/04/15 20:12:01 executed programs: 22535 2023/04/15 20:12:06 executed programs: 23149 2023/04/15 20:12:11 executed programs: 23772 2023/04/15 20:12:16 executed programs: 24379 2023/04/15 20:12:21 executed programs: 24995 2023/04/15 20:12:26 executed programs: 25611 2023/04/15 20:12:31 executed programs: 26231 2023/04/15 20:12:36 executed programs: 26862 2023/04/15 20:12:42 executed programs: 27480 2023/04/15 20:12:47 executed programs: 28117 2023/04/15 20:12:52 executed programs: 28747 2023/04/15 20:12:57 executed programs: 29372 2023/04/15 20:13:02 executed programs: 29991 2023/04/15 20:13:07 executed programs: 30617 2023/04/15 20:13:12 executed programs: 31237 2023/04/15 20:13:17 executed programs: 31855 2023/04/15 20:13:22 executed programs: 32470 2023/04/15 20:13:27 executed programs: 33080 2023/04/15 20:13:32 executed programs: 33693 2023/04/15 20:13:37 executed programs: 34300 2023/04/15 20:13:42 executed programs: 34911 2023/04/15 20:13:47 executed programs: 35521 2023/04/15 20:13:52 executed programs: 36136 2023/04/15 20:13:57 executed programs: 36744 2023/04/15 20:14:02 executed programs: 37355 2023/04/15 20:14:07 executed programs: 37977 2023/04/15 20:14:12 executed programs: 38582 2023/04/15 20:14:17 executed programs: 39196 2023/04/15 20:14:22 executed programs: 39808 [ 369.441065][ T92] kworker/dying (92) used greatest stack depth: 21144 bytes left 2023/04/15 20:14:27 executed programs: 40416 2023/04/15 20:14:32 executed programs: 41020 2023/04/15 20:14:37 executed programs: 41621 2023/04/15 20:14:42 executed programs: 42214 2023/04/15 20:14:47 executed programs: 42824 2023/04/15 20:14:52 executed programs: 43438