[ 21.769411][ T22] audit: type=1400 audit(1681570473.179:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.792747][ T22] audit: type=1400 audit(1681570473.199:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.813914][ T22] audit: type=1400 audit(1681570473.199:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.837175][ T22] audit: type=1400 audit(1681570473.199:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=10064 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.860525][ T22] audit: type=1400 audit(1681570473.199:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=10064 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.886117][ T22] audit: type=1400 audit(1681570473.199:78): avc: denied { setattr } for pid=305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=10064 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.909695][ T22] audit: type=1400 audit(1681570473.209:79): avc: denied { execmem } for pid=306 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.929162][ T22] audit: type=1400 audit(1681570473.269:80): avc: denied { mounton } for pid=308 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 21.953548][ T22] audit: type=1400 audit(1681570473.269:81): avc: denied { mount } for pid=308 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 21.976304][ T22] audit: type=1400 audit(1681570473.269:82): avc: denied { mounton } for pid=308 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.232' (ECDSA) to the list of known hosts. 2023/04/15 14:54:50 parsed 1 programs 2023/04/15 14:54:50 executed programs: 0 [ 39.005835][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 39.005842][ T22] audit: type=1400 audit(1681570490.419:140): avc: denied { mounton } for pid=332 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.038209][ T22] audit: type=1400 audit(1681570490.449:141): avc: denied { mount } for pid=332 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.046960][ T337] cgroup1: Unknown subsys name 'perf_event' [ 39.061767][ T22] audit: type=1400 audit(1681570490.449:142): avc: denied { mounton } for pid=337 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 39.068203][ T337] cgroup1: Unknown subsys name 'net_cls' [ 39.090514][ T22] audit: type=1400 audit(1681570490.449:143): avc: denied { mount } for pid=337 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.137750][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.144786][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.152411][ T337] device bridge_slave_0 entered promiscuous mode [ 39.159372][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.166401][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.173890][ T337] device bridge_slave_1 entered promiscuous mode [ 39.206523][ T22] audit: type=1400 audit(1681570490.619:144): avc: denied { write } for pid=337 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.213137][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.227580][ T22] audit: type=1400 audit(1681570490.619:145): avc: denied { read } for pid=337 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.234641][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.262424][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.269534][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.289577][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.296918][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.304113][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.311995][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.321483][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.329682][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.336719][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.356142][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.364437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.372746][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.379763][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.387688][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.395662][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.416876][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.425414][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.433955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.441845][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.463169][ T22] audit: type=1400 audit(1681570490.869:146): avc: denied { open } for pid=343 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 39.486395][ T22] audit: type=1400 audit(1681570490.869:147): avc: denied { setopt } for pid=343 comm="syz-executor.0" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 39.507387][ T22] audit: type=1400 audit(1681570490.869:148): avc: denied { getopt } for pid=343 comm="syz-executor.0" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 2023/04/15 14:54:55 executed programs: 492 2023/04/15 14:55:00 executed programs: 1018 2023/04/15 14:55:05 executed programs: 1548 2023/04/15 14:55:10 executed programs: 2069 2023/04/15 14:55:15 executed programs: 2599 [ 66.528091][ T67] cfg80211: failed to load regulatory.db [ 66.540388][ T22] audit: type=1400 audit(1681570517.949:149): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/15 14:55:20 executed programs: 3127 2023/04/15 14:55:25 executed programs: 3645 2023/04/15 14:55:30 executed programs: 4159 2023/04/15 14:55:35 executed programs: 4663 2023/04/15 14:55:40 executed programs: 5178 2023/04/15 14:55:45 executed programs: 5705 2023/04/15 14:55:50 executed programs: 6244 2023/04/15 14:55:55 executed programs: 6775 2023/04/15 14:56:00 executed programs: 7310 2023/04/15 14:56:05 executed programs: 7859 2023/04/15 14:56:10 executed programs: 8387 2023/04/15 14:56:15 executed programs: 8919 2023/04/15 14:56:20 executed programs: 9456 2023/04/15 14:56:25 executed programs: 9996 2023/04/15 14:56:30 executed programs: 10532 2023/04/15 14:56:35 executed programs: 11076 2023/04/15 14:56:40 executed programs: 11623 2023/04/15 14:56:45 executed programs: 12178 2023/04/15 14:56:50 executed programs: 12717 2023/04/15 14:56:55 executed programs: 13264 2023/04/15 14:57:00 executed programs: 13804 2023/04/15 14:57:05 executed programs: 14356 2023/04/15 14:57:10 executed programs: 14906 2023/04/15 14:57:15 executed programs: 15457 2023/04/15 14:57:20 executed programs: 15999 2023/04/15 14:57:25 executed programs: 16558 2023/04/15 14:57:30 executed programs: 17096 2023/04/15 14:57:35 executed programs: 17631 2023/04/15 14:57:40 executed programs: 18151 2023/04/15 14:57:45 executed programs: 18680 2023/04/15 14:57:50 executed programs: 19214 2023/04/15 14:57:55 executed programs: 19736 2023/04/15 14:58:00 executed programs: 20258 2023/04/15 14:58:05 executed programs: 20804 2023/04/15 14:58:10 executed programs: 21355 2023/04/15 14:58:15 executed programs: 21892 2023/04/15 14:58:20 executed programs: 22430 2023/04/15 14:58:25 executed programs: 22969 2023/04/15 14:58:30 executed programs: 23509 2023/04/15 14:58:35 executed programs: 24053 2023/04/15 14:58:40 executed programs: 24590 2023/04/15 14:58:45 executed programs: 25133 2023/04/15 14:58:50 executed programs: 25678 2023/04/15 14:58:55 executed programs: 26217 2023/04/15 14:59:00 executed programs: 26755 2023/04/15 14:59:05 executed programs: 27298 2023/04/15 14:59:10 executed programs: 27852 2023/04/15 14:59:15 executed programs: 28398 2023/04/15 14:59:20 executed programs: 28946 2023/04/15 14:59:25 executed programs: 29492 2023/04/15 14:59:30 executed programs: 30037 [ 322.517767][ T172] kworker/dying (172) used greatest stack depth: 22744 bytes left 2023/04/15 14:59:35 executed programs: 30573 2023/04/15 14:59:40 executed programs: 31106 2023/04/15 14:59:45 executed programs: 31643 2023/04/15 14:59:50 executed programs: 32193 2023/04/15 14:59:55 executed programs: 32741 2023/04/15 15:00:00 executed programs: 33275 2023/04/15 15:00:05 executed programs: 33820 2023/04/15 15:00:10 executed programs: 34359 2023/04/15 15:00:15 executed programs: 34891 2023/04/15 15:00:20 executed programs: 35438 2023/04/15 15:00:25 executed programs: 35971 2023/04/15 15:00:30 executed programs: 36507 2023/04/15 15:00:35 executed programs: 37050 2023/04/15 15:00:40 executed programs: 37568 2023/04/15 15:00:45 executed programs: 38107