Warning: Permanently added '10.128.10.28' (ECDSA) to the list of known hosts. 2023/04/23 21:21:29 parsed 1 programs 2023/04/23 21:21:29 executed programs: 0 [ 42.617422][ T22] kauditd_printk_skb: 54 callbacks suppressed [ 42.617429][ T22] audit: type=1400 audit(1682284889.609:137): avc: denied { mounton } for pid=328 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 42.649206][ T22] audit: type=1400 audit(1682284889.629:138): avc: denied { mount } for pid=328 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 42.659890][ T333] cgroup1: Unknown subsys name 'perf_event' [ 42.673221][ T22] audit: type=1400 audit(1682284889.649:139): avc: denied { mounton } for pid=333 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 42.679386][ T333] cgroup1: Unknown subsys name 'net_cls' [ 42.701602][ T22] audit: type=1400 audit(1682284889.649:140): avc: denied { mount } for pid=333 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 42.751730][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.758818][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.766712][ T333] device bridge_slave_0 entered promiscuous mode [ 42.773934][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.780962][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.788441][ T333] device bridge_slave_1 entered promiscuous mode [ 42.822564][ T22] audit: type=1400 audit(1682284889.809:141): avc: denied { write } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.829267][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.843319][ T22] audit: type=1400 audit(1682284889.809:142): avc: denied { read } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.850249][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.878242][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.885501][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.907774][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.915598][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.922943][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.931029][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.940530][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.948894][ T118] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.956168][ T118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.965325][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.974004][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.981030][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.994121][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.004626][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.023922][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.032563][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.043998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.060615][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.069372][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.107469][ T341] Zero length message leads to an empty skb 2023/04/23 21:21:34 executed programs: 34 [ 52.486173][ T22] audit: type=1400 audit(1682284899.479:143): avc: denied { ioctl } for pid=579 comm="syz-executor.0" path="socket:[12463]" dev="sockfs" ino=12463 ioctlcmd=0x54d9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 52.512329][ T22] audit: type=1400 audit(1682284899.499:144): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/23 21:21:39 executed programs: 71 2023/04/23 21:21:44 executed programs: 107 2023/04/23 21:21:49 executed programs: 140 [ 66.863733][ T67] cfg80211: failed to load regulatory.db 2023/04/23 21:21:55 executed programs: 174 2023/04/23 21:22:00 executed programs: 207 2023/04/23 21:22:05 executed programs: 243 2023/04/23 21:22:10 executed programs: 278 2023/04/23 21:22:15 executed programs: 314 2023/04/23 21:22:20 executed programs: 348 2023/04/23 21:22:25 executed programs: 384 2023/04/23 21:22:30 executed programs: 418 2023/04/23 21:22:35 executed programs: 454 2023/04/23 21:22:40 executed programs: 489 2023/04/23 21:22:46 executed programs: 525 2023/04/23 21:22:51 executed programs: 561 2023/04/23 21:22:56 executed programs: 596 2023/04/23 21:23:01 executed programs: 631 2023/04/23 21:23:06 executed programs: 665 2023/04/23 21:23:11 executed programs: 699 2023/04/23 21:23:16 executed programs: 734 2023/04/23 21:23:21 executed programs: 768 2023/04/23 21:23:26 executed programs: 804 2023/04/23 21:23:31 executed programs: 838 2023/04/23 21:23:36 executed programs: 871 2023/04/23 21:23:41 executed programs: 905 2023/04/23 21:23:46 executed programs: 937 2023/04/23 21:23:51 executed programs: 971 2023/04/23 21:23:57 executed programs: 1005 2023/04/23 21:24:02 executed programs: 1037 2023/04/23 21:24:07 executed programs: 1070 2023/04/23 21:24:12 executed programs: 1106 2023/04/23 21:24:17 executed programs: 1140 2023/04/23 21:24:22 executed programs: 1175 2023/04/23 21:24:27 executed programs: 1209 2023/04/23 21:24:32 executed programs: 1242 2023/04/23 21:24:37 executed programs: 1276 2023/04/23 21:24:42 executed programs: 1309 2023/04/23 21:24:47 executed programs: 1341 2023/04/23 21:24:52 executed programs: 1373 2023/04/23 21:24:57 executed programs: 1406 2023/04/23 21:25:02 executed programs: 1440 2023/04/23 21:25:07 executed programs: 1475 2023/04/23 21:25:12 executed programs: 1508 2023/04/23 21:25:17 executed programs: 1540 2023/04/23 21:25:23 executed programs: 1573 2023/04/23 21:25:28 executed programs: 1605 2023/04/23 21:25:33 executed programs: 1638 2023/04/23 21:25:38 executed programs: 1670 2023/04/23 21:25:43 executed programs: 1705 2023/04/23 21:25:48 executed programs: 1738 2023/04/23 21:25:53 executed programs: 1772 2023/04/23 21:25:58 executed programs: 1804 2023/04/23 21:26:03 executed programs: 1836 2023/04/23 21:26:08 executed programs: 1868 2023/04/23 21:26:13 executed programs: 1900 2023/04/23 21:26:18 executed programs: 1934 2023/04/23 21:26:23 executed programs: 1969 2023/04/23 21:26:29 executed programs: 2003 2023/04/23 21:26:34 executed programs: 2037 2023/04/23 21:26:39 executed programs: 2071 2023/04/23 21:26:44 executed programs: 2104 2023/04/23 21:26:49 executed programs: 2136 2023/04/23 21:26:54 executed programs: 2170 2023/04/23 21:26:59 executed programs: 2203 2023/04/23 21:27:04 executed programs: 2235 2023/04/23 21:27:09 executed programs: 2269 2023/04/23 21:27:14 executed programs: 2303 2023/04/23 21:27:19 executed programs: 2335 2023/04/23 21:27:24 executed programs: 2368