[ 21.185579][ T22] audit: type=1400 audit(1681624042.640:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.209177][ T22] audit: type=1400 audit(1681624042.640:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.230374][ T22] audit: type=1400 audit(1681624042.640:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.253784][ T22] audit: type=1400 audit(1681624042.640:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=9264 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.276862][ T22] audit: type=1400 audit(1681624042.640:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=9264 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.301945][ T22] audit: type=1400 audit(1681624042.640:78): avc: denied { setattr } for pid=303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9264 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.325439][ T22] audit: type=1400 audit(1681624042.650:79): avc: denied { execmem } for pid=304 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.345114][ T22] audit: type=1400 audit(1681624042.730:80): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 21.369277][ T22] audit: type=1400 audit(1681624042.730:81): avc: denied { mount } for pid=306 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 21.391767][ T22] audit: type=1400 audit(1681624042.730:82): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.10.3' (ECDSA) to the list of known hosts. 2023/04/16 05:47:39 parsed 1 programs 2023/04/16 05:47:39 executed programs: 0 [ 38.165912][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 38.165920][ T22] audit: type=1400 audit(1681624059.620:140): avc: denied { mounton } for pid=331 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.176214][ T335] cgroup1: Unknown subsys name 'perf_event' [ 38.197462][ T22] audit: type=1400 audit(1681624059.620:141): avc: denied { mount } for pid=331 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.203913][ T335] cgroup1: Unknown subsys name 'net_cls' [ 38.226259][ T22] audit: type=1400 audit(1681624059.620:142): avc: denied { mounton } for pid=335 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.254787][ T22] audit: type=1400 audit(1681624059.620:143): avc: denied { mount } for pid=335 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.287793][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.294932][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.302399][ T335] device bridge_slave_0 entered promiscuous mode [ 38.309873][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.316999][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.325008][ T335] device bridge_slave_1 entered promiscuous mode [ 38.360075][ T22] audit: type=1400 audit(1681624059.810:144): avc: denied { write } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.380760][ T22] audit: type=1400 audit(1681624059.830:145): avc: denied { read } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.381950][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.408724][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.416098][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.423109][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.443240][ T71] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.450759][ T71] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.459013][ T71] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.466563][ T71] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.486638][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.494886][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.501932][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.509324][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.518171][ T101] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.525200][ T101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.532656][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.541073][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.550560][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.566350][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.574293][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.590616][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.600172][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/16 05:47:44 executed programs: 537 2023/04/16 05:47:49 executed programs: 1152 2023/04/16 05:47:54 executed programs: 1754 2023/04/16 05:47:59 executed programs: 2371 2023/04/16 05:48:04 executed programs: 2969 [ 66.525469][ T12] cfg80211: failed to load regulatory.db [ 66.535729][ T22] audit: type=1400 audit(1681624087.990:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/16 05:48:09 executed programs: 3587 2023/04/16 05:48:14 executed programs: 4185 2023/04/16 05:48:19 executed programs: 4780 2023/04/16 05:48:24 executed programs: 5361 2023/04/16 05:48:29 executed programs: 5965 2023/04/16 05:48:34 executed programs: 6578 2023/04/16 05:48:39 executed programs: 7188 2023/04/16 05:48:44 executed programs: 7795 2023/04/16 05:48:49 executed programs: 8409 2023/04/16 05:48:54 executed programs: 9023 2023/04/16 05:48:59 executed programs: 9629 2023/04/16 05:49:04 executed programs: 10228 2023/04/16 05:49:09 executed programs: 10850 2023/04/16 05:49:14 executed programs: 11458 2023/04/16 05:49:19 executed programs: 12072 2023/04/16 05:49:24 executed programs: 12673 2023/04/16 05:49:29 executed programs: 13282 2023/04/16 05:49:34 executed programs: 13888 2023/04/16 05:49:39 executed programs: 14516 2023/04/16 05:49:44 executed programs: 15133 2023/04/16 05:49:49 executed programs: 15745 2023/04/16 05:49:54 executed programs: 16354 2023/04/16 05:49:59 executed programs: 16979 2023/04/16 05:50:04 executed programs: 17588 2023/04/16 05:50:09 executed programs: 18199 2023/04/16 05:50:14 executed programs: 18805 2023/04/16 05:50:19 executed programs: 19403 2023/04/16 05:50:24 executed programs: 19997 2023/04/16 05:50:29 executed programs: 20611 2023/04/16 05:50:34 executed programs: 21216 2023/04/16 05:50:39 executed programs: 21843 2023/04/16 05:50:44 executed programs: 22495 2023/04/16 05:50:49 executed programs: 23403 2023/04/16 05:50:54 executed programs: 24314 2023/04/16 05:50:59 executed programs: 25223 2023/04/16 05:51:04 executed programs: 26128 2023/04/16 05:51:09 executed programs: 27038 2023/04/16 05:51:14 executed programs: 27945 2023/04/16 05:51:19 executed programs: 28853 2023/04/16 05:51:24 executed programs: 29772 2023/04/16 05:51:29 executed programs: 30686 2023/04/16 05:51:34 executed programs: 31583 2023/04/16 05:51:39 executed programs: 32492 2023/04/16 05:51:44 executed programs: 33385 2023/04/16 05:51:49 executed programs: 34293 2023/04/16 05:51:54 executed programs: 35194 2023/04/16 05:51:59 executed programs: 36104 2023/04/16 05:52:04 executed programs: 37005 2023/04/16 05:52:09 executed programs: 37906 2023/04/16 05:52:14 executed programs: 38805 2023/04/16 05:52:19 executed programs: 39696 2023/04/16 05:52:24 executed programs: 40600 2023/04/16 05:52:29 executed programs: 41490 2023/04/16 05:52:34 executed programs: 42386 2023/04/16 05:52:39 executed programs: 43276 2023/04/16 05:52:44 executed programs: 44186 2023/04/16 05:52:49 executed programs: 45086 2023/04/16 05:52:54 executed programs: 45997 2023/04/16 05:52:59 executed programs: 46905 2023/04/16 05:53:04 executed programs: 47797 2023/04/16 05:53:09 executed programs: 48688 2023/04/16 05:53:14 executed programs: 49570 2023/04/16 05:53:19 executed programs: 50460 2023/04/16 05:53:24 executed programs: 51360 2023/04/16 05:53:29 executed programs: 52251 2023/04/16 05:53:34 executed programs: 53141