[ 23.466233][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.475791][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.495924][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.504739][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.513403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.685201][ T356] syz-executor.0 (356) used greatest stack depth: 19960 bytes left [ 24.086199][ T9] device bridge_slave_1 left promiscuous mode [ 24.092194][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.100041][ T9] device bridge_slave_0 left promiscuous mode [ 24.106203][ T9] bridge0: port 1(bridge_slave_0) entered disabled state Warning: Permanently added '10.128.1.122' (ED25519) to the list of known hosts. 2023/08/30 20:59:36 ignoring optional flag "sandboxArg"="0" 2023/08/30 20:59:36 parsed 1 programs 2023/08/30 20:59:36 executed programs: 0 [ 44.030165][ T23] kauditd_printk_skb: 67 callbacks suppressed [ 44.030178][ T23] audit: type=1400 audit(1693429176.900:143): avc: denied { mounton } for pid=404 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 44.059906][ T408] cgroup1: Unknown subsys name 'perf_event' [ 44.061228][ T23] audit: type=1400 audit(1693429176.900:144): avc: denied { mount } for pid=404 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 44.067343][ T408] cgroup1: Unknown subsys name 'net_cls' [ 44.091061][ T23] audit: type=1400 audit(1693429176.910:145): avc: denied { mounton } for pid=408 comm="syz-executor.0" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 44.121041][ T23] audit: type=1400 audit(1693429176.910:146): avc: denied { mounton } for pid=408 comm="syz-executor.0" path="/syzcgroup/cpu" dev="sda1" ino=1930 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 44.163442][ T408] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.170639][ T408] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.178117][ T408] device bridge_slave_0 entered promiscuous mode [ 44.185016][ T408] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.192018][ T408] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.200082][ T408] device bridge_slave_1 entered promiscuous mode [ 44.251159][ T408] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.258318][ T408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.265663][ T408] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.272545][ T408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.298061][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.307532][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.314988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.322692][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.332687][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.341518][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.348384][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.367251][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.375276][ T108] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.382149][ T108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.389678][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.398148][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.412717][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.426303][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.446097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.454377][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.463295][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.490232][ T23] audit: type=1400 audit(1693429177.360:147): avc: denied { ioctl } for pid=414 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=9213 ioctlcmd=0xae9d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 2023/08/30 20:59:41 executed programs: 565 2023/08/30 20:59:46 executed programs: 1228 2023/08/30 20:59:51 executed programs: 2036 2023/08/30 20:59:56 executed programs: 2852 [ 66.607685][ T13] cfg80211: failed to load regulatory.db 2023/08/30 21:00:01 executed programs: 3708 2023/08/30 21:00:06 executed programs: 4517 2023/08/30 21:00:11 executed programs: 5311 2023/08/30 21:00:16 executed programs: 6103 2023/08/30 21:00:21 executed programs: 6910 2023/08/30 21:00:26 executed programs: 7690 2023/08/30 21:00:31 executed programs: 8489 2023/08/30 21:00:36 executed programs: 9311 2023/08/30 21:00:41 executed programs: 10108 2023/08/30 21:00:46 executed programs: 10886 2023/08/30 21:00:51 executed programs: 11677 2023/08/30 21:00:56 executed programs: 12508 2023/08/30 21:01:01 executed programs: 13341 2023/08/30 21:01:06 executed programs: 14132 2023/08/30 21:01:11 executed programs: 14950 2023/08/30 21:01:16 executed programs: 15717 2023/08/30 21:01:21 executed programs: 16557 2023/08/30 21:01:26 executed programs: 17365 2023/08/30 21:01:31 executed programs: 18208 2023/08/30 21:01:36 executed programs: 18994 2023/08/30 21:01:42 executed programs: 19788 2023/08/30 21:01:47 executed programs: 20568 2023/08/30 21:01:52 executed programs: 21357 2023/08/30 21:01:57 executed programs: 22135 2023/08/30 21:02:02 executed programs: 22951 2023/08/30 21:02:07 executed programs: 23729 2023/08/30 21:02:12 executed programs: 24523 2023/08/30 21:02:17 executed programs: 25293 2023/08/30 21:02:22 executed programs: 26088 2023/08/30 21:02:27 executed programs: 26871 2023/08/30 21:02:32 executed programs: 27674 2023/08/30 21:02:37 executed programs: 28493 2023/08/30 21:02:42 executed programs: 29291 2023/08/30 21:02:47 executed programs: 30176 2023/08/30 21:02:52 executed programs: 30967 2023/08/30 21:02:57 executed programs: 31731 2023/08/30 21:03:02 executed programs: 32531 2023/08/30 21:03:07 executed programs: 33318 2023/08/30 21:03:12 executed programs: 34109 2023/08/30 21:03:17 executed programs: 34901 2023/08/30 21:03:22 executed programs: 35698 2023/08/30 21:03:27 executed programs: 36503 2023/08/30 21:03:32 executed programs: 37269 2023/08/30 21:03:37 executed programs: 38066 2023/08/30 21:03:42 executed programs: 38834 2023/08/30 21:03:47 executed programs: 39656 2023/08/30 21:03:52 executed programs: 40509 2023/08/30 21:03:57 executed programs: 41295 2023/08/30 21:04:02 executed programs: 42087 2023/08/30 21:04:07 executed programs: 42886 2023/08/30 21:04:12 executed programs: 43690 2023/08/30 21:04:17 executed programs: 44442 2023/08/30 21:04:22 executed programs: 45235 2023/08/30 21:04:27 executed programs: 46054 2023/08/30 21:04:32 executed programs: 46823 2023/08/30 21:04:37 executed programs: 47600 [ 346.285796][ T9] kworker/dying (9) used greatest stack depth: 18808 bytes left 2023/08/30 21:04:42 executed programs: 48374 2023/08/30 21:04:47 executed programs: 49141 2023/08/30 21:04:52 executed programs: 49931 2023/08/30 21:04:57 executed programs: 50721 2023/08/30 21:05:02 executed programs: 51504 2023/08/30 21:05:07 executed programs: 52236 2023/08/30 21:05:12 executed programs: 53028 2023/08/30 21:05:17 executed programs: 53817 2023/08/30 21:05:22 executed programs: 54644 2023/08/30 21:05:27 executed programs: 55449 2023/08/30 21:05:32 executed programs: 56251