[ 21.591837][ T22] audit: type=1400 audit(1681594803.129:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.613191][ T22] audit: type=1400 audit(1681594803.129:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.636447][ T22] audit: type=1400 audit(1681594803.139:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.659319][ T22] audit: type=1400 audit(1681594803.139:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.684466][ T22] audit: type=1400 audit(1681594803.139:78): avc: denied { setattr } for pid=303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.707889][ T22] audit: type=1400 audit(1681594803.159:79): avc: denied { execmem } for pid=304 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.727371][ T22] audit: type=1400 audit(1681594803.229:80): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 21.751332][ T22] audit: type=1400 audit(1681594803.229:81): avc: denied { mount } for pid=307 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 21.774047][ T22] audit: type=1400 audit(1681594803.229:82): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 33.048004][ T314] sshd (314) used greatest stack depth: 20824 bytes left Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. 2023/04/15 21:40:20 parsed 1 programs 2023/04/15 21:40:20 executed programs: 0 [ 38.884171][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 38.884177][ T22] audit: type=1400 audit(1681594820.449:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.915059][ T22] audit: type=1400 audit(1681594820.459:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.924325][ T334] cgroup1: Unknown subsys name 'perf_event' [ 38.938478][ T22] audit: type=1400 audit(1681594820.489:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.945014][ T334] cgroup1: Unknown subsys name 'net_cls' [ 38.967448][ T22] audit: type=1400 audit(1681594820.489:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.014615][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.021664][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.029444][ T334] device bridge_slave_0 entered promiscuous mode [ 39.036393][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.043457][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.050785][ T334] device bridge_slave_1 entered promiscuous mode [ 39.083011][ T22] audit: type=1400 audit(1681594820.649:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.089517][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.103645][ T22] audit: type=1400 audit(1681594820.649:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.110680][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.138450][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.145465][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.164897][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.172144][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.179353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.187422][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.196455][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.204623][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.211742][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.232665][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.241106][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.249368][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.256392][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.263879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.271918][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.292195][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.300513][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.309044][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.317767][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.339963][ T22] audit: type=1400 audit(1681594820.899:146): avc: denied { open } for pid=340 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 2023/04/15 21:40:25 executed programs: 597 2023/04/15 21:40:30 executed programs: 1260 2023/04/15 21:40:35 executed programs: 1930 2023/04/15 21:40:40 executed programs: 2612 2023/04/15 21:40:45 executed programs: 3277 [ 66.502063][ T71] cfg80211: failed to load regulatory.db [ 66.514151][ T22] audit: type=1400 audit(1681594848.079:147): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/15 21:40:50 executed programs: 3941 2023/04/15 21:40:55 executed programs: 4607 2023/04/15 21:41:00 executed programs: 5292 2023/04/15 21:41:05 executed programs: 5956 2023/04/15 21:41:10 executed programs: 6624 2023/04/15 21:41:15 executed programs: 7280 2023/04/15 21:41:20 executed programs: 7961 2023/04/15 21:41:25 executed programs: 8625 2023/04/15 21:41:30 executed programs: 9311 2023/04/15 21:41:35 executed programs: 9992 2023/04/15 21:41:40 executed programs: 10660 2023/04/15 21:41:45 executed programs: 11335 2023/04/15 21:41:50 executed programs: 12020 2023/04/15 21:41:55 executed programs: 12705 2023/04/15 21:42:00 executed programs: 13374 2023/04/15 21:42:05 executed programs: 14051 2023/04/15 21:42:10 executed programs: 14729 2023/04/15 21:42:15 executed programs: 15411 2023/04/15 21:42:20 executed programs: 16109 2023/04/15 21:42:25 executed programs: 16794 2023/04/15 21:42:30 executed programs: 17473 2023/04/15 21:42:35 executed programs: 18156 2023/04/15 21:42:40 executed programs: 18839 2023/04/15 21:42:45 executed programs: 19515 2023/04/15 21:42:50 executed programs: 20193 2023/04/15 21:42:55 executed programs: 20870 2023/04/15 21:43:00 executed programs: 21552 2023/04/15 21:43:05 executed programs: 22238 2023/04/15 21:43:10 executed programs: 22908 2023/04/15 21:43:15 executed programs: 23594 2023/04/15 21:43:20 executed programs: 24280 2023/04/15 21:43:25 executed programs: 24975 2023/04/15 21:43:30 executed programs: 25647 2023/04/15 21:43:35 executed programs: 26329 2023/04/15 21:43:40 executed programs: 27018 2023/04/15 21:43:45 executed programs: 27693 2023/04/15 21:43:50 executed programs: 28361 2023/04/15 21:43:55 executed programs: 29039 2023/04/15 21:44:00 executed programs: 29714 2023/04/15 21:44:05 executed programs: 30391 2023/04/15 21:44:10 executed programs: 31055 2023/04/15 21:44:15 executed programs: 31735 2023/04/15 21:44:20 executed programs: 32420 2023/04/15 21:44:25 executed programs: 33089 2023/04/15 21:44:30 executed programs: 33772 2023/04/15 21:44:35 executed programs: 34470 2023/04/15 21:44:40 executed programs: 35152 2023/04/15 21:44:45 executed programs: 35825 2023/04/15 21:44:50 executed programs: 36502 2023/04/15 21:44:55 executed programs: 37178 2023/04/15 21:45:00 executed programs: 37850 2023/04/15 21:45:05 executed programs: 38526 2023/04/15 21:45:10 executed programs: 39205 2023/04/15 21:45:15 executed programs: 39885 2023/04/15 21:45:20 executed programs: 40552 2023/04/15 21:45:25 executed programs: 41224 2023/04/15 21:45:30 executed programs: 41893 2023/04/15 21:45:35 executed programs: 42559 2023/04/15 21:45:40 executed programs: 43233 2023/04/15 21:45:45 executed programs: 43901 2023/04/15 21:45:50 executed programs: 44561 2023/04/15 21:45:55 executed programs: 45213 2023/04/15 21:46:00 executed programs: 45879 2023/04/15 21:46:05 executed programs: 46553 2023/04/15 21:46:10 executed programs: 47239 2023/04/15 21:46:15 executed programs: 47916