[ 23.645012][ T22] audit: type=1400 audit(1681643112.050:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 23.674139][ T22] audit: type=1400 audit(1681643112.090:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 23.695328][ T22] audit: type=1400 audit(1681643112.090:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 23.718628][ T22] audit: type=1400 audit(1681643112.090:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=10175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.741676][ T22] audit: type=1400 audit(1681643112.090:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=10175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.765043][ T22] audit: type=1400 audit(1681643112.090:78): avc: denied { setattr } for pid=304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=10175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.790753][ T22] audit: type=1400 audit(1681643112.110:79): avc: denied { execmem } for pid=305 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.810450][ T22] audit: type=1400 audit(1681643112.180:80): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 23.834612][ T22] audit: type=1400 audit(1681643112.180:81): avc: denied { mount } for pid=307 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 23.857177][ T22] audit: type=1400 audit(1681643112.180:82): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.190' (ECDSA) to the list of known hosts. 2023/04/16 11:05:29 parsed 1 programs 2023/04/16 11:05:29 executed programs: 0 [ 40.888541][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 40.888548][ T22] audit: type=1400 audit(1681643129.300:140): avc: denied { mounton } for pid=331 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 40.920591][ T22] audit: type=1400 audit(1681643129.320:141): avc: denied { mount } for pid=331 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 40.930881][ T335] cgroup1: Unknown subsys name 'perf_event' [ 40.944135][ T22] audit: type=1400 audit(1681643129.340:142): avc: denied { mounton } for pid=335 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 40.951072][ T335] cgroup1: Unknown subsys name 'net_cls' [ 40.973056][ T22] audit: type=1400 audit(1681643129.340:143): avc: denied { mount } for pid=335 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.022336][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.029512][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.036921][ T335] device bridge_slave_0 entered promiscuous mode [ 41.043805][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.050834][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.058263][ T335] device bridge_slave_1 entered promiscuous mode [ 41.091031][ T22] audit: type=1400 audit(1681643129.500:144): avc: denied { write } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.097198][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.111920][ T22] audit: type=1400 audit(1681643129.500:145): avc: denied { read } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.118906][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.119000][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.153875][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.173837][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.181389][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.189397][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.196904][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.206355][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.214587][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.221628][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.238602][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.246925][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.253969][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.261900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.269997][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.281194][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.298063][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.306048][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.320538][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.329441][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2023/04/16 11:05:34 executed programs: 567 2023/04/16 11:05:39 executed programs: 1191 2023/04/16 11:05:44 executed programs: 1819 2023/04/16 11:05:49 executed programs: 2437 2023/04/16 11:05:54 executed programs: 3069 [ 66.521037][ T100] cfg80211: failed to load regulatory.db [ 66.528351][ T22] audit: type=1400 audit(1681643154.940:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/16 11:05:59 executed programs: 3699 2023/04/16 11:06:04 executed programs: 4328 2023/04/16 11:06:09 executed programs: 4951 2023/04/16 11:06:14 executed programs: 5576 2023/04/16 11:06:19 executed programs: 6203 2023/04/16 11:06:24 executed programs: 6832 2023/04/16 11:06:29 executed programs: 7461 2023/04/16 11:06:34 executed programs: 8084 2023/04/16 11:06:39 executed programs: 8715 2023/04/16 11:06:44 executed programs: 9355 2023/04/16 11:06:49 executed programs: 9984 2023/04/16 11:06:54 executed programs: 10602 2023/04/16 11:06:59 executed programs: 11224 2023/04/16 11:07:04 executed programs: 11849 2023/04/16 11:07:09 executed programs: 12472 2023/04/16 11:07:14 executed programs: 13108 2023/04/16 11:07:19 executed programs: 13735 2023/04/16 11:07:24 executed programs: 14373 2023/04/16 11:07:29 executed programs: 15010 2023/04/16 11:07:34 executed programs: 15646 2023/04/16 11:07:39 executed programs: 16278 2023/04/16 11:07:44 executed programs: 16912 2023/04/16 11:07:49 executed programs: 17539 2023/04/16 11:07:54 executed programs: 18174 2023/04/16 11:07:59 executed programs: 18809 2023/04/16 11:08:04 executed programs: 19449 2023/04/16 11:08:09 executed programs: 20080 2023/04/16 11:08:14 executed programs: 20714 2023/04/16 11:08:19 executed programs: 21357 2023/04/16 11:08:24 executed programs: 21985 2023/04/16 11:08:29 executed programs: 22620 2023/04/16 11:08:34 executed programs: 23263 2023/04/16 11:08:39 executed programs: 23897 2023/04/16 11:08:44 executed programs: 24535 2023/04/16 11:08:49 executed programs: 25171 2023/04/16 11:08:54 executed programs: 25810 2023/04/16 11:08:59 executed programs: 26450 2023/04/16 11:09:04 executed programs: 27080 2023/04/16 11:09:09 executed programs: 27710 2023/04/16 11:09:14 executed programs: 28345 2023/04/16 11:09:19 executed programs: 28977 2023/04/16 11:09:24 executed programs: 29622 2023/04/16 11:09:29 executed programs: 30261 2023/04/16 11:09:34 executed programs: 30886 2023/04/16 11:09:39 executed programs: 31521 2023/04/16 11:09:44 executed programs: 32168 2023/04/16 11:09:49 executed programs: 32798 2023/04/16 11:09:54 executed programs: 33446 2023/04/16 11:09:59 executed programs: 34085 2023/04/16 11:10:04 executed programs: 34718 2023/04/16 11:10:09 executed programs: 35352 2023/04/16 11:10:14 executed programs: 35988 2023/04/16 11:10:19 executed programs: 36624 2023/04/16 11:10:24 executed programs: 37263 2023/04/16 11:10:29 executed programs: 37902 2023/04/16 11:10:34 executed programs: 38536 2023/04/16 11:10:39 executed programs: 39176 2023/04/16 11:10:44 executed programs: 39820 2023/04/16 11:10:49 executed programs: 40460 2023/04/16 11:10:54 executed programs: 41102 2023/04/16 11:10:59 executed programs: 41745 2023/04/16 11:11:04 executed programs: 42377 2023/04/16 11:11:09 executed programs: 43016 2023/04/16 11:11:14 executed programs: 43659 2023/04/16 11:11:19 executed programs: 44294 2023/04/16 11:11:24 executed programs: 44929