Warning: Permanently added '10.128.10.27' (ECDSA) to the list of known hosts. 2023/04/15 13:47:33 parsed 1 programs 2023/04/15 13:47:33 executed programs: 0 [ 37.054672][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 37.054679][ T22] audit: type=1400 audit(1681566453.129:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.070750][ T334] cgroup1: Unknown subsys name 'perf_event' [ 37.086396][ T22] audit: type=1400 audit(1681566453.139:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.093044][ T334] cgroup1: Unknown subsys name 'net_cls' [ 37.116143][ T22] audit: type=1400 audit(1681566453.149:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 37.144573][ T22] audit: type=1400 audit(1681566453.149:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.173761][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.181389][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.188948][ T334] device bridge_slave_0 entered promiscuous mode [ 37.195996][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.203463][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.211070][ T334] device bridge_slave_1 entered promiscuous mode [ 37.243128][ T22] audit: type=1400 audit(1681566453.319:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.249732][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.264063][ T22] audit: type=1400 audit(1681566453.319:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.271194][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.271291][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.306552][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.327778][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.335672][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.343900][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.351587][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.368122][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.377617][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.384709][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.392340][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.400743][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.407766][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.415249][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.423288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.448471][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.457787][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.466264][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.475580][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.485024][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 2023/04/15 13:47:38 executed programs: 558 2023/04/15 13:47:43 executed programs: 1172 2023/04/15 13:47:48 executed programs: 1781 2023/04/15 13:47:53 executed programs: 2399 2023/04/15 13:47:58 executed programs: 3006 [ 66.607429][ T90] cfg80211: failed to load regulatory.db [ 66.619339][ T22] audit: type=1400 audit(1681566482.699:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/15 13:48:03 executed programs: 3614 2023/04/15 13:48:08 executed programs: 4225 2023/04/15 13:48:13 executed programs: 4839 2023/04/15 13:48:18 executed programs: 5447 2023/04/15 13:48:23 executed programs: 6056 2023/04/15 13:48:28 executed programs: 6671 2023/04/15 13:48:33 executed programs: 7298 2023/04/15 13:48:38 executed programs: 7911 2023/04/15 13:48:43 executed programs: 8527 2023/04/15 13:48:48 executed programs: 9146 2023/04/15 13:48:53 executed programs: 9763 2023/04/15 13:48:58 executed programs: 10370 2023/04/15 13:49:03 executed programs: 10986 2023/04/15 13:49:08 executed programs: 11606 2023/04/15 13:49:13 executed programs: 12218 2023/04/15 13:49:18 executed programs: 12840 2023/04/15 13:49:23 executed programs: 13461 2023/04/15 13:49:28 executed programs: 14069 2023/04/15 13:49:33 executed programs: 14698 2023/04/15 13:49:38 executed programs: 15320 2023/04/15 13:49:43 executed programs: 15933 2023/04/15 13:49:48 executed programs: 16552 2023/04/15 13:49:53 executed programs: 17174 2023/04/15 13:49:58 executed programs: 17787 2023/04/15 13:50:03 executed programs: 18402 2023/04/15 13:50:08 executed programs: 19031 2023/04/15 13:50:13 executed programs: 19657 2023/04/15 13:50:18 executed programs: 20275 2023/04/15 13:50:23 executed programs: 20890 2023/04/15 13:50:28 executed programs: 21518 2023/04/15 13:50:33 executed programs: 22147 2023/04/15 13:50:38 executed programs: 22764 2023/04/15 13:50:43 executed programs: 23396 2023/04/15 13:50:48 executed programs: 24023 2023/04/15 13:50:53 executed programs: 24647 2023/04/15 13:50:58 executed programs: 25258 2023/04/15 13:51:03 executed programs: 26001 2023/04/15 13:51:08 executed programs: 26905 2023/04/15 13:51:13 executed programs: 27824 2023/04/15 13:51:18 executed programs: 28738 2023/04/15 13:51:23 executed programs: 29658 2023/04/15 13:51:28 executed programs: 30573 2023/04/15 13:51:33 executed programs: 31499 2023/04/15 13:51:38 executed programs: 32422 2023/04/15 13:51:43 executed programs: 33341 2023/04/15 13:51:48 executed programs: 34264 2023/04/15 13:51:53 executed programs: 35191 2023/04/15 13:51:58 executed programs: 36115 2023/04/15 13:52:03 executed programs: 37037 2023/04/15 13:52:08 executed programs: 37961 2023/04/15 13:52:13 executed programs: 38869 2023/04/15 13:52:18 executed programs: 39772 2023/04/15 13:52:23 executed programs: 40672 2023/04/15 13:52:28 executed programs: 41569 2023/04/15 13:52:33 executed programs: 42488 [ 337.967363][ T7] kworker/dying (7) used greatest stack depth: 21144 bytes left 2023/04/15 13:52:38 executed programs: 43409 2023/04/15 13:52:43 executed programs: 44337 2023/04/15 13:52:48 executed programs: 45251 2023/04/15 13:52:53 executed programs: 46180 2023/04/15 13:52:58 executed programs: 47095 2023/04/15 13:53:03 executed programs: 47999 2023/04/15 13:53:08 executed programs: 48917 2023/04/15 13:53:13 executed programs: 49838 2023/04/15 13:53:18 executed programs: 50755 2023/04/15 13:53:23 executed programs: 51675 2023/04/15 13:53:28 executed programs: 52602