[ 22.768050][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.904389][ T290] syz-executor.0 (290) used greatest stack depth: 20056 bytes left [ 23.352518][ T173] device bridge_slave_1 left promiscuous mode [ 23.358703][ T173] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.366795][ T173] device bridge_slave_0 left promiscuous mode [ 23.373116][ T173] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.627101][ T22] kauditd_printk_skb: 63 callbacks suppressed [ 33.627110][ T22] audit: type=1400 audit(1682357151.959:154): avc: denied { append } for pid=138 comm="syslogd" name="messages" dev="tmpfs" ino=415 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.655947][ T22] audit: type=1400 audit(1682357151.959:155): avc: denied { open } for pid=138 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=415 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.678670][ T22] audit: type=1400 audit(1682357151.959:156): avc: denied { getattr } for pid=138 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=415 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts. 2023/04/24 17:25:59 parsed 1 programs 2023/04/24 17:25:59 executed programs: 0 [ 41.004293][ T22] audit: type=1400 audit(1682357159.339:157): avc: denied { mounton } for pid=318 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 41.029730][ T22] audit: type=1400 audit(1682357159.349:158): avc: denied { mount } for pid=318 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 41.043844][ T322] cgroup1: Unknown subsys name 'perf_event' [ 41.053561][ T22] audit: type=1400 audit(1682357159.379:159): avc: denied { mounton } for pid=322 comm="syz-executor.0" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 41.059789][ T322] cgroup1: Unknown subsys name 'net_cls' [ 41.089005][ T22] audit: type=1400 audit(1682357159.419:160): avc: denied { read } for pid=322 comm="syz-executor.0" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.111218][ T22] audit: type=1400 audit(1682357159.419:161): avc: denied { open } for pid=322 comm="syz-executor.0" path="net:[4026531999]" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 41.140252][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.147459][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.154876][ T322] device bridge_slave_0 entered promiscuous mode [ 41.161793][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.169144][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.179235][ T322] device bridge_slave_1 entered promiscuous mode [ 41.214006][ T22] audit: type=1400 audit(1682357159.549:162): avc: denied { write } for pid=322 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.219832][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.235144][ T22] audit: type=1400 audit(1682357159.549:163): avc: denied { read } for pid=322 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.242366][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.242466][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.277301][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.296757][ T101] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.304142][ T101] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.311382][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.319445][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.328734][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.336984][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.344216][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.364012][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.372410][ T101] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.379431][ T101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.387244][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.395691][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.404817][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.423023][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.431963][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.449592][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.461176][ T22] audit: type=1400 audit(1682357159.799:164): avc: denied { prog_load } for pid=327 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 41.461278][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.493074][ T22] audit: type=1400 audit(1682357159.829:165): avc: denied { prog_run } for pid=327 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2023/04/24 17:26:04 executed programs: 486 [ 46.040997][ T22] audit: type=1400 audit(1682357164.369:166): avc: denied { write } for pid=313 comm="syz-execprog" path="pipe:[10601]" dev="pipefs" ino=10601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 2023/04/24 17:26:09 executed programs: 1017 2023/04/24 17:26:14 executed programs: 1547 2023/04/24 17:26:19 executed programs: 2078 2023/04/24 17:26:24 executed programs: 2609 [ 66.503636][ T67] cfg80211: failed to load regulatory.db 2023/04/24 17:26:29 executed programs: 3147 2023/04/24 17:26:34 executed programs: 3682 2023/04/24 17:26:39 executed programs: 4218 2023/04/24 17:26:44 executed programs: 4757 2023/04/24 17:26:49 executed programs: 5290 2023/04/24 17:26:54 executed programs: 5835 2023/04/24 17:26:59 executed programs: 6380 2023/04/24 17:27:04 executed programs: 6912 2023/04/24 17:27:09 executed programs: 7459 2023/04/24 17:27:14 executed programs: 8006 2023/04/24 17:27:19 executed programs: 8545 2023/04/24 17:27:24 executed programs: 9089 2023/04/24 17:27:29 executed programs: 9631 2023/04/24 17:27:34 executed programs: 10174 2023/04/24 17:27:39 executed programs: 10716 2023/04/24 17:27:44 executed programs: 11262 2023/04/24 17:27:49 executed programs: 11810 2023/04/24 17:27:54 executed programs: 12356 2023/04/24 17:27:59 executed programs: 12902 2023/04/24 17:28:04 executed programs: 13451 2023/04/24 17:28:09 executed programs: 13990 2023/04/24 17:28:14 executed programs: 14535 2023/04/24 17:28:19 executed programs: 15088 2023/04/24 17:28:24 executed programs: 15634 2023/04/24 17:28:29 executed programs: 16174 2023/04/24 17:28:34 executed programs: 16723 2023/04/24 17:28:39 executed programs: 17264 2023/04/24 17:28:44 executed programs: 17801 2023/04/24 17:28:49 executed programs: 18344 2023/04/24 17:28:54 executed programs: 18894 2023/04/24 17:28:59 executed programs: 19448 2023/04/24 17:29:04 executed programs: 20006 2023/04/24 17:29:09 executed programs: 20550 2023/04/24 17:29:14 executed programs: 21094 2023/04/24 17:29:19 executed programs: 21646 2023/04/24 17:29:24 executed programs: 22198 2023/04/24 17:29:29 executed programs: 22752 2023/04/24 17:29:34 executed programs: 23301 2023/04/24 17:29:39 executed programs: 23855 2023/04/24 17:29:44 executed programs: 24400 2023/04/24 17:29:49 executed programs: 24946 2023/04/24 17:29:54 executed programs: 25492 2023/04/24 17:29:59 executed programs: 26045 2023/04/24 17:30:04 executed programs: 26588 2023/04/24 17:30:09 executed programs: 27138 2023/04/24 17:30:14 executed programs: 27693 2023/04/24 17:30:19 executed programs: 28247 2023/04/24 17:30:24 executed programs: 28805 2023/04/24 17:30:29 executed programs: 29364 2023/04/24 17:30:34 executed programs: 29916 2023/04/24 17:30:39 executed programs: 30469 2023/04/24 17:30:44 executed programs: 31024 2023/04/24 17:30:49 executed programs: 31565 2023/04/24 17:30:54 executed programs: 32119 2023/04/24 17:30:59 executed programs: 32667 2023/04/24 17:31:04 executed programs: 33221 2023/04/24 17:31:09 executed programs: 33770 2023/04/24 17:31:14 executed programs: 34315 2023/04/24 17:31:19 executed programs: 34875 2023/04/24 17:31:24 executed programs: 35418 2023/04/24 17:31:29 executed programs: 35974 2023/04/24 17:31:34 executed programs: 36534 2023/04/24 17:31:39 executed programs: 37088 2023/04/24 17:31:44 executed programs: 37639 2023/04/24 17:31:49 executed programs: 38191 2023/04/24 17:31:54 executed programs: 38749