[ 19.249405][ T22] audit: type=1400 audit(1681649293.640:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.272771][ T22] audit: type=1400 audit(1681649293.640:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.293970][ T22] audit: type=1400 audit(1681649293.640:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.317408][ T22] audit: type=1400 audit(1681649293.650:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.342207][ T22] audit: type=1400 audit(1681649293.650:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.365944][ T22] audit: type=1400 audit(1681649293.650:78): avc: denied { setattr } for pid=304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.389256][ T22] audit: type=1400 audit(1681649293.660:79): avc: denied { execmem } for pid=305 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.409056][ T22] audit: type=1400 audit(1681649293.730:80): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 19.433061][ T22] audit: type=1400 audit(1681649293.730:81): avc: denied { mount } for pid=307 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 19.455579][ T22] audit: type=1400 audit(1681649293.740:82): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.168' (ECDSA) to the list of known hosts. 2023/04/16 12:48:30 parsed 1 programs 2023/04/16 12:48:30 executed programs: 0 [ 36.390813][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 36.390821][ T22] audit: type=1400 audit(1681649310.780:140): avc: denied { mounton } for pid=329 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.407401][ T333] cgroup1: Unknown subsys name 'perf_event' [ 36.421833][ T22] audit: type=1400 audit(1681649310.780:141): avc: denied { mount } for pid=329 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.428314][ T333] cgroup1: Unknown subsys name 'net_cls' [ 36.450765][ T22] audit: type=1400 audit(1681649310.790:142): avc: denied { mounton } for pid=333 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 36.479471][ T22] audit: type=1400 audit(1681649310.790:143): avc: denied { mount } for pid=333 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.507734][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.514876][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.522577][ T333] device bridge_slave_0 entered promiscuous mode [ 36.529879][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.537074][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.544611][ T333] device bridge_slave_1 entered promiscuous mode [ 36.576811][ T22] audit: type=1400 audit(1681649310.970:144): avc: denied { write } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.583046][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.597787][ T22] audit: type=1400 audit(1681649310.970:145): avc: denied { read } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.604753][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.604859][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.639697][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.659294][ T118] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.666614][ T118] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.674412][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.681984][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.691140][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.699491][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.706617][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.722133][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.730557][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.737826][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.745154][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.753187][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.766005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.781917][ T98] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.789850][ T98] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.801080][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.813648][ T98] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/16 12:48:35 executed programs: 561 2023/04/16 12:48:40 executed programs: 1171 2023/04/16 12:48:45 executed programs: 1780 2023/04/16 12:48:50 executed programs: 2390 2023/04/16 12:48:55 executed programs: 3008 2023/04/16 12:49:00 executed programs: 3622 [ 66.492193][ T67] cfg80211: failed to load regulatory.db [ 66.503160][ T22] audit: type=1400 audit(1681649340.900:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/16 12:49:05 executed programs: 4232 2023/04/16 12:49:10 executed programs: 4842 2023/04/16 12:49:15 executed programs: 5453 2023/04/16 12:49:20 executed programs: 6066 2023/04/16 12:49:25 executed programs: 6681 2023/04/16 12:49:30 executed programs: 7295 2023/04/16 12:49:35 executed programs: 7914 2023/04/16 12:49:40 executed programs: 8510 2023/04/16 12:49:45 executed programs: 9114 2023/04/16 12:49:50 executed programs: 9735 2023/04/16 12:49:55 executed programs: 10349 2023/04/16 12:50:00 executed programs: 10959 2023/04/16 12:50:05 executed programs: 11562 2023/04/16 12:50:10 executed programs: 12176 2023/04/16 12:50:15 executed programs: 12776 2023/04/16 12:50:20 executed programs: 13383 2023/04/16 12:50:25 executed programs: 13986 2023/04/16 12:50:30 executed programs: 14589 2023/04/16 12:50:35 executed programs: 15211 2023/04/16 12:50:40 executed programs: 15827 2023/04/16 12:50:45 executed programs: 16438 2023/04/16 12:50:50 executed programs: 17044 2023/04/16 12:50:55 executed programs: 17659 2023/04/16 12:51:00 executed programs: 18251 2023/04/16 12:51:05 executed programs: 18862 2023/04/16 12:51:10 executed programs: 19471 2023/04/16 12:51:15 executed programs: 20079 2023/04/16 12:51:20 executed programs: 20681 2023/04/16 12:51:25 executed programs: 21278 2023/04/16 12:51:30 executed programs: 21867 2023/04/16 12:51:35 executed programs: 22479 2023/04/16 12:51:40 executed programs: 23091 2023/04/16 12:51:45 executed programs: 23704 2023/04/16 12:51:50 executed programs: 24315 2023/04/16 12:51:55 executed programs: 24927 2023/04/16 12:52:00 executed programs: 25542 2023/04/16 12:52:06 executed programs: 26151 2023/04/16 12:52:11 executed programs: 26765 2023/04/16 12:52:16 executed programs: 27365 2023/04/16 12:52:21 executed programs: 27970 2023/04/16 12:52:26 executed programs: 28581 2023/04/16 12:52:31 executed programs: 29180 2023/04/16 12:52:36 executed programs: 29795 2023/04/16 12:52:41 executed programs: 30407 2023/04/16 12:52:46 executed programs: 31015 2023/04/16 12:52:51 executed programs: 31629 2023/04/16 12:52:56 executed programs: 32241 2023/04/16 12:53:01 executed programs: 32855 2023/04/16 12:53:06 executed programs: 33459 2023/04/16 12:53:11 executed programs: 34074 2023/04/16 12:53:16 executed programs: 34810 2023/04/16 12:53:21 executed programs: 35719 2023/04/16 12:53:26 executed programs: 36615 2023/04/16 12:53:31 executed programs: 37517 2023/04/16 12:53:36 executed programs: 38436 2023/04/16 12:53:41 executed programs: 39349 2023/04/16 12:53:46 executed programs: 40254 2023/04/16 12:53:51 executed programs: 41175 2023/04/16 12:53:56 executed programs: 42090 2023/04/16 12:54:01 executed programs: 42998 2023/04/16 12:54:06 executed programs: 43916 2023/04/16 12:54:11 executed programs: 44839 2023/04/16 12:54:16 executed programs: 45745 2023/04/16 12:54:21 executed programs: 46652 2023/04/16 12:54:26 executed programs: 47572