Warning: Permanently added '10.128.1.142' (ECDSA) to the list of known hosts. 2023/04/16 01:47:22 parsed 1 programs 2023/04/16 01:47:22 executed programs: 0 [ 36.306824][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 36.306833][ T22] audit: type=1400 audit(1681609642.890:140): avc: denied { mounton } for pid=331 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.316967][ T335] cgroup1: Unknown subsys name 'perf_event' [ 36.338290][ T22] audit: type=1400 audit(1681609642.890:141): avc: denied { mount } for pid=331 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.344793][ T335] cgroup1: Unknown subsys name 'net_cls' [ 36.367942][ T22] audit: type=1400 audit(1681609642.890:142): avc: denied { mounton } for pid=335 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 36.396648][ T22] audit: type=1400 audit(1681609642.900:143): avc: denied { mount } for pid=335 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.426340][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.433587][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.441563][ T335] device bridge_slave_0 entered promiscuous mode [ 36.448446][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.455450][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.462908][ T335] device bridge_slave_1 entered promiscuous mode [ 36.495046][ T22] audit: type=1400 audit(1681609643.070:144): avc: denied { write } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.501292][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.516560][ T22] audit: type=1400 audit(1681609643.070:145): avc: denied { read } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.523497][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.551819][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.558983][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.578933][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.587498][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.594832][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.603759][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.613562][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.621980][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.629724][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.646631][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.655336][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.662757][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.670349][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.678497][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.690717][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.705942][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.713867][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.726087][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.743542][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/16 01:47:27 executed programs: 584 2023/04/16 01:47:32 executed programs: 1219 2023/04/16 01:47:37 executed programs: 1845 2023/04/16 01:47:42 executed programs: 2671 2023/04/16 01:47:47 executed programs: 3598 2023/04/16 01:47:52 executed programs: 4531 [ 66.476075][ T12] cfg80211: failed to load regulatory.db [ 66.486716][ T22] audit: type=1400 audit(1681609673.070:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/16 01:47:57 executed programs: 5467 2023/04/16 01:48:02 executed programs: 6412 2023/04/16 01:48:07 executed programs: 7343 2023/04/16 01:48:12 executed programs: 8277 2023/04/16 01:48:17 executed programs: 9211 2023/04/16 01:48:22 executed programs: 10141 2023/04/16 01:48:27 executed programs: 11078 2023/04/16 01:48:32 executed programs: 12021 2023/04/16 01:48:37 executed programs: 12963 2023/04/16 01:48:42 executed programs: 13915 2023/04/16 01:48:47 executed programs: 14879 2023/04/16 01:48:52 executed programs: 15832 2023/04/16 01:48:57 executed programs: 16789 2023/04/16 01:49:02 executed programs: 17756 2023/04/16 01:49:07 executed programs: 18703 2023/04/16 01:49:12 executed programs: 19647 2023/04/16 01:49:17 executed programs: 20589 2023/04/16 01:49:22 executed programs: 21536 2023/04/16 01:49:27 executed programs: 22487 2023/04/16 01:49:32 executed programs: 23434 2023/04/16 01:49:37 executed programs: 24385 2023/04/16 01:49:42 executed programs: 25335 2023/04/16 01:49:47 executed programs: 26287 2023/04/16 01:49:53 executed programs: 27257 2023/04/16 01:49:58 executed programs: 28225 2023/04/16 01:50:03 executed programs: 29191 2023/04/16 01:50:08 executed programs: 30111 2023/04/16 01:50:13 executed programs: 31032 2023/04/16 01:50:18 executed programs: 31958 2023/04/16 01:50:23 executed programs: 32891 2023/04/16 01:50:28 executed programs: 33830 2023/04/16 01:50:33 executed programs: 34764 2023/04/16 01:50:38 executed programs: 35693 2023/04/16 01:50:43 executed programs: 36621 2023/04/16 01:50:48 executed programs: 37553 2023/04/16 01:50:53 executed programs: 38491 2023/04/16 01:50:58 executed programs: 39430 2023/04/16 01:51:03 executed programs: 40377 2023/04/16 01:51:08 executed programs: 41309 2023/04/16 01:51:13 executed programs: 42238 2023/04/16 01:51:18 executed programs: 43176 2023/04/16 01:51:23 executed programs: 44111 2023/04/16 01:51:28 executed programs: 45052 2023/04/16 01:51:33 executed programs: 45990 2023/04/16 01:51:38 executed programs: 46930 2023/04/16 01:51:43 executed programs: 47876 2023/04/16 01:51:48 executed programs: 48828 2023/04/16 01:51:53 executed programs: 49789 2023/04/16 01:51:58 executed programs: 50749 2023/04/16 01:52:03 executed programs: 51695 2023/04/16 01:52:08 executed programs: 52622 2023/04/16 01:52:13 executed programs: 53552 2023/04/16 01:52:18 executed programs: 54490 2023/04/16 01:52:23 executed programs: 55422 2023/04/16 01:52:28 executed programs: 56351 2023/04/16 01:52:33 executed programs: 57261 2023/04/16 01:52:38 executed programs: 58179 2023/04/16 01:52:43 executed programs: 59098 2023/04/16 01:52:48 executed programs: 60032 2023/04/16 01:52:53 executed programs: 60974 2023/04/16 01:52:58 executed programs: 61918 2023/04/16 01:53:03 executed programs: 62863 2023/04/16 01:53:08 executed programs: 63790 2023/04/16 01:53:13 executed programs: 64716 2023/04/16 01:53:18 executed programs: 65654