[ 20.889021][ T22] audit: type=1400 audit(1681638443.180:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.912448][ T22] audit: type=1400 audit(1681638443.200:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.934270][ T22] audit: type=1400 audit(1681638443.200:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.958068][ T22] audit: type=1400 audit(1681638443.200:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.981450][ T22] audit: type=1400 audit(1681638443.200:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.005296][ T22] audit: type=1400 audit(1681638443.200:78): avc: denied { setattr } for pid=304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.029326][ T22] audit: type=1400 audit(1681638443.200:79): avc: denied { execmem } for pid=305 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.049218][ T22] audit: type=1400 audit(1681638443.300:80): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 21.073360][ T22] audit: type=1400 audit(1681638443.300:81): avc: denied { mount } for pid=306 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 21.096169][ T22] audit: type=1400 audit(1681638443.300:82): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.10.42' (ECDSA) to the list of known hosts. 2023/04/16 09:47:40 parsed 1 programs 2023/04/16 09:47:40 executed programs: 0 [ 38.034064][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 38.034071][ T22] audit: type=1400 audit(1681638460.320:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.065773][ T22] audit: type=1400 audit(1681638460.340:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.076372][ T334] cgroup1: Unknown subsys name 'perf_event' [ 38.089945][ T22] audit: type=1400 audit(1681638460.360:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.096580][ T334] cgroup1: Unknown subsys name 'net_cls' [ 38.119785][ T22] audit: type=1400 audit(1681638460.360:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.171303][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.178497][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.185895][ T334] device bridge_slave_0 entered promiscuous mode [ 38.192977][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.200098][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.207651][ T334] device bridge_slave_1 entered promiscuous mode [ 38.241842][ T22] audit: type=1400 audit(1681638460.530:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.248791][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.262919][ T22] audit: type=1400 audit(1681638460.530:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.270052][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.270194][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.305169][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.325553][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.333186][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.341764][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.349778][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.359723][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.368283][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.375747][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.397024][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.405676][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.414308][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.421369][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.428863][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.437042][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.448319][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.461044][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.477723][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.486736][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/16 09:47:45 executed programs: 554 2023/04/16 09:47:50 executed programs: 1167 2023/04/16 09:47:55 executed programs: 1768 2023/04/16 09:48:00 executed programs: 2377 2023/04/16 09:48:05 executed programs: 2981 [ 66.516552][ T67] cfg80211: failed to load regulatory.db [ 66.530709][ T22] audit: type=1400 audit(1681638488.820:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/16 09:48:10 executed programs: 3583 2023/04/16 09:48:15 executed programs: 4189 2023/04/16 09:48:20 executed programs: 4802 2023/04/16 09:48:25 executed programs: 5402 2023/04/16 09:48:30 executed programs: 6004 2023/04/16 09:48:35 executed programs: 6606 2023/04/16 09:48:40 executed programs: 7215 2023/04/16 09:48:45 executed programs: 7823 2023/04/16 09:48:50 executed programs: 8432 2023/04/16 09:48:55 executed programs: 9041 2023/04/16 09:49:00 executed programs: 9651 2023/04/16 09:49:05 executed programs: 10256 2023/04/16 09:49:10 executed programs: 10855 2023/04/16 09:49:15 executed programs: 11470 2023/04/16 09:49:20 executed programs: 12088 2023/04/16 09:49:25 executed programs: 12687 2023/04/16 09:49:30 executed programs: 13286 2023/04/16 09:49:35 executed programs: 13880 2023/04/16 09:49:40 executed programs: 14495 2023/04/16 09:49:45 executed programs: 15320 2023/04/16 09:49:50 executed programs: 16221 2023/04/16 09:49:55 executed programs: 17125 2023/04/16 09:50:00 executed programs: 18033 2023/04/16 09:50:05 executed programs: 18932 2023/04/16 09:50:10 executed programs: 19830 2023/04/16 09:50:15 executed programs: 20729 2023/04/16 09:50:20 executed programs: 21618 2023/04/16 09:50:25 executed programs: 22518 2023/04/16 09:50:30 executed programs: 23419 2023/04/16 09:50:35 executed programs: 24314 2023/04/16 09:50:40 executed programs: 25227 2023/04/16 09:50:45 executed programs: 26133 2023/04/16 09:50:50 executed programs: 27042 2023/04/16 09:50:55 executed programs: 27953 2023/04/16 09:51:00 executed programs: 28857 2023/04/16 09:51:05 executed programs: 29761 2023/04/16 09:51:10 executed programs: 30663 2023/04/16 09:51:15 executed programs: 31570 2023/04/16 09:51:20 executed programs: 32473 2023/04/16 09:51:25 executed programs: 33382 2023/04/16 09:51:30 executed programs: 34294 2023/04/16 09:51:35 executed programs: 35196 2023/04/16 09:51:40 executed programs: 36108 2023/04/16 09:51:45 executed programs: 37013 2023/04/16 09:51:50 executed programs: 37925 2023/04/16 09:51:55 executed programs: 38838 2023/04/16 09:52:00 executed programs: 39749 2023/04/16 09:52:05 executed programs: 40654 2023/04/16 09:52:10 executed programs: 41560 2023/04/16 09:52:15 executed programs: 42459 2023/04/16 09:52:20 executed programs: 43360 2023/04/16 09:52:25 executed programs: 44264 2023/04/16 09:52:30 executed programs: 45169 2023/04/16 09:52:35 executed programs: 46071 2023/04/16 09:52:40 executed programs: 46978 2023/04/16 09:52:45 executed programs: 47887 2023/04/16 09:52:50 executed programs: 48795 2023/04/16 09:52:55 executed programs: 49707 2023/04/16 09:53:00 executed programs: 50614 2023/04/16 09:53:05 executed programs: 51506 2023/04/16 09:53:10 executed programs: 52412 2023/04/16 09:53:15 executed programs: 53320 2023/04/16 09:53:20 executed programs: 54227 2023/04/16 09:53:25 executed programs: 55127 2023/04/16 09:53:30 executed programs: 56037 2023/04/16 09:53:35 executed programs: 56932