Warning: Permanently added '10.128.0.226' (ECDSA) to the list of known hosts. 2023/04/24 17:40:35 parsed 1 programs 2023/04/24 17:40:35 executed programs: 0 [ 45.186356][ T22] audit: type=1400 audit(1682358035.790:157): avc: denied { mounton } for pid=318 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 45.203068][ T324] cgroup1: Unknown subsys name 'perf_event' [ 45.211905][ T22] audit: type=1400 audit(1682358035.790:158): avc: denied { mount } for pid=318 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 45.218067][ T324] cgroup1: Unknown subsys name 'net_cls' [ 45.241729][ T22] audit: type=1400 audit(1682358035.800:159): avc: denied { mounton } for pid=324 comm="syz-executor.0" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 45.270657][ T22] audit: type=1400 audit(1682358035.850:160): avc: denied { read } for pid=324 comm="syz-executor.0" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.293850][ T22] audit: type=1400 audit(1682358035.850:161): avc: denied { open } for pid=324 comm="syz-executor.0" path="net:[4026531999]" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.305047][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.324549][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.332169][ T324] device bridge_slave_0 entered promiscuous mode [ 45.339104][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.346159][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.353946][ T324] device bridge_slave_1 entered promiscuous mode [ 45.386685][ T22] audit: type=1400 audit(1682358035.990:162): avc: denied { write } for pid=324 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.393566][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.408102][ T22] audit: type=1400 audit(1682358035.990:163): avc: denied { read } for pid=324 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.415159][ T324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.442913][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.449971][ T324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.469923][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.478022][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.485690][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.493197][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.503098][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.511292][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.518321][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.535863][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.544067][ T101] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.551137][ T101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.559143][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.567321][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.578040][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.595924][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.604236][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.617724][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.627041][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.650701][ T22] audit: type=1400 audit(1682358036.250:164): avc: denied { prog_load } for pid=329 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 45.670837][ T22] audit: type=1400 audit(1682358036.270:165): avc: denied { prog_run } for pid=329 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2023/04/24 17:40:40 executed programs: 458 [ 50.195892][ T22] audit: type=1400 audit(1682358040.800:166): avc: denied { write } for pid=313 comm="syz-execprog" path="pipe:[10973]" dev="pipefs" ino=10973 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 2023/04/24 17:40:45 executed programs: 985 2023/04/24 17:40:50 executed programs: 1512 2023/04/24 17:40:55 executed programs: 2037 [ 66.485420][ T12] cfg80211: failed to load regulatory.db 2023/04/24 17:41:00 executed programs: 2576 2023/04/24 17:41:05 executed programs: 3119 2023/04/24 17:41:10 executed programs: 3649 2023/04/24 17:41:15 executed programs: 4184 2023/04/24 17:41:20 executed programs: 4725 2023/04/24 17:41:25 executed programs: 5275 2023/04/24 17:41:30 executed programs: 5819 2023/04/24 17:41:35 executed programs: 6363 2023/04/24 17:41:40 executed programs: 6895 2023/04/24 17:41:45 executed programs: 7438 2023/04/24 17:41:50 executed programs: 7976 2023/04/24 17:41:55 executed programs: 8518 2023/04/24 17:42:00 executed programs: 9063 2023/04/24 17:42:05 executed programs: 9598 2023/04/24 17:42:10 executed programs: 10138 2023/04/24 17:42:15 executed programs: 10676 2023/04/24 17:42:20 executed programs: 11208 2023/04/24 17:42:25 executed programs: 11749 2023/04/24 17:42:30 executed programs: 12297 2023/04/24 17:42:35 executed programs: 12841 2023/04/24 17:42:40 executed programs: 13378 2023/04/24 17:42:45 executed programs: 13924 2023/04/24 17:42:50 executed programs: 14465 2023/04/24 17:42:55 executed programs: 15003 2023/04/24 17:43:00 executed programs: 15547 2023/04/24 17:43:05 executed programs: 16090 2023/04/24 17:43:10 executed programs: 16633 2023/04/24 17:43:15 executed programs: 17174 2023/04/24 17:43:20 executed programs: 17721 2023/04/24 17:43:25 executed programs: 18263 2023/04/24 17:43:30 executed programs: 18811 2023/04/24 17:43:35 executed programs: 19339 2023/04/24 17:43:40 executed programs: 19874 2023/04/24 17:43:45 executed programs: 20408 2023/04/24 17:43:51 executed programs: 20934 2023/04/24 17:43:56 executed programs: 21466 2023/04/24 17:44:01 executed programs: 22006 2023/04/24 17:44:06 executed programs: 22537 2023/04/24 17:44:11 executed programs: 23071 2023/04/24 17:44:16 executed programs: 23613 2023/04/24 17:44:21 executed programs: 24147 2023/04/24 17:44:26 executed programs: 24679 2023/04/24 17:44:31 executed programs: 25207 2023/04/24 17:44:36 executed programs: 25722 2023/04/24 17:44:41 executed programs: 26252 2023/04/24 17:44:46 executed programs: 26781 2023/04/24 17:44:51 executed programs: 27326 2023/04/24 17:44:56 executed programs: 27874 2023/04/24 17:45:01 executed programs: 28417 2023/04/24 17:45:06 executed programs: 28967 2023/04/24 17:45:11 executed programs: 29518 2023/04/24 17:45:16 executed programs: 30068 2023/04/24 17:45:21 executed programs: 30608 2023/04/24 17:45:26 executed programs: 31145 2023/04/24 17:45:31 executed programs: 31687 2023/04/24 17:45:36 executed programs: 32230 2023/04/24 17:45:41 executed programs: 32775 2023/04/24 17:45:46 executed programs: 33324 2023/04/24 17:45:51 executed programs: 33871 2023/04/24 17:45:56 executed programs: 34421 2023/04/24 17:46:01 executed programs: 34971 2023/04/24 17:46:06 executed programs: 35515 2023/04/24 17:46:11 executed programs: 36072 2023/04/24 17:46:16 executed programs: 36617 2023/04/24 17:46:21 executed programs: 37164 2023/04/24 17:46:26 executed programs: 37713 2023/04/24 17:46:31 executed programs: 38259