[ 53.148556][ T27] audit: type=1400 audit(1663046288.963:84): avc: denied { read } for pid=3597 comm="syz-fuzzer" name="fuse" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 53.303694][ T3602] can: request_module (can-proto-0) failed. [ 53.325829][ T3602] can: request_module (can-proto-0) failed. [ 53.346350][ T3602] can: request_module (can-proto-0) failed. [ 59.860927][ T27] kauditd_printk_skb: 80 callbacks suppressed [ 59.860940][ T27] audit: type=1400 audit(1663046295.673:165): avc: denied { read } for pid=2955 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 59.889745][ T27] audit: type=1400 audit(1663046295.673:166): avc: denied { append } for pid=2955 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 59.912179][ T27] audit: type=1400 audit(1663046295.673:167): avc: denied { open } for pid=2955 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 59.935369][ T27] audit: type=1400 audit(1663046295.673:168): avc: denied { getattr } for pid=2955 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 64.281239][ T27] audit: type=1400 audit(1663046300.103:169): avc: denied { transition } for pid=3660 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.42' (ECDSA) to the list of known hosts. 2022/09/13 05:18:28 parsed 1 programs [ 72.617126][ T27] audit: type=1400 audit(1663046308.433:170): avc: denied { mounton } for pid=3674 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 72.643934][ T27] audit: type=1400 audit(1663046308.443:171): avc: denied { mount } for pid=3674 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2022/09/13 05:18:28 executed programs: 0 [ 72.865331][ T27] audit: type=1400 audit(1663046308.683:172): avc: denied { mount } for pid=3678 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 72.888875][ T27] audit: type=1400 audit(1663046308.693:173): avc: denied { mounton } for pid=3678 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 72.913047][ T27] audit: type=1400 audit(1663046308.693:174): avc: denied { mount } for pid=3678 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.016289][ T3678] chnl_net:caif_netlink_parms(): no params data found [ 73.064766][ T3678] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.072595][ T3678] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.080747][ T3678] device bridge_slave_0 entered promiscuous mode [ 73.090458][ T3678] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.098653][ T3678] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.107193][ T3678] device bridge_slave_1 entered promiscuous mode [ 73.129240][ T3678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.140743][ T3678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.166428][ T3678] team0: Port device team_slave_0 added [ 73.174013][ T3678] team0: Port device team_slave_1 added [ 73.194374][ T3678] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.201522][ T3678] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.228135][ T3678] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.240879][ T3678] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.248068][ T3678] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.274597][ T3678] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.301665][ T3678] device hsr_slave_0 entered promiscuous mode [ 73.308437][ T3678] device hsr_slave_1 entered promiscuous mode [ 73.405753][ T27] audit: type=1400 audit(1663046309.223:175): avc: denied { create } for pid=3678 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.407657][ T3678] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.430318][ T27] audit: type=1400 audit(1663046309.223:176): avc: denied { write } for pid=3678 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.456137][ T27] audit: type=1400 audit(1663046309.223:177): avc: denied { read } for pid=3678 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.459144][ T3678] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.487096][ T3678] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.497882][ T3678] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.521447][ T3678] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.528637][ T3678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.536802][ T3678] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.543936][ T3678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.591728][ T3678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.604716][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.614988][ T3612] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.624415][ T3612] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.633921][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 73.647382][ T3678] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.659376][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.669109][ T143] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.676420][ T143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.705496][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.714052][ T143] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.721194][ T143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.729731][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.738851][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.748262][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.756895][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.772113][ T3678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 73.780240][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.798021][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 73.806915][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 73.821392][ T3678] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.845896][ T27] audit: type=1400 audit(1663046309.663:178): avc: denied { sys_module } for pid=3678 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 73.951737][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.964496][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.974342][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.982784][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.994185][ T3678] device veth0_vlan entered promiscuous mode [ 74.005578][ T3678] device veth1_vlan entered promiscuous mode [ 74.013976][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 74.037286][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 74.045944][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 74.056846][ T3678] device veth0_macvtap entered promiscuous mode [ 74.067498][ T3678] device veth1_macvtap entered promiscuous mode [ 74.088576][ T3678] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.097563][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 74.105907][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.115427][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.124614][ T3612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.137971][ T3678] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.147037][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.156769][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.168809][ T3678] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.179135][ T3678] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.188237][ T3678] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.199389][ T3678] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.274625][ T27] audit: type=1400 audit(1663046310.093:179): avc: denied { write } for pid=3694 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 76.383798][ T6] cfg80211: failed to load regulatory.db 2022/09/13 05:18:33 executed programs: 91 2022/09/13 05:18:38 executed programs: 231 2022/09/13 05:18:43 executed programs: 375 2022/09/13 05:18:48 executed programs: 515 2022/09/13 05:18:53 executed programs: 657 2022/09/13 05:18:58 executed programs: 797 2022/09/13 05:19:03 executed programs: 937 2022/09/13 05:19:08 executed programs: 1079 2022/09/13 05:19:13 executed programs: 1225 2022/09/13 05:19:18 executed programs: 1366 2022/09/13 05:19:23 executed programs: 1507 2022/09/13 05:19:28 executed programs: 1648 2022/09/13 05:19:33 executed programs: 1783 2022/09/13 05:19:38 executed programs: 1917 2022/09/13 05:19:44 executed programs: 2062 2022/09/13 05:19:49 executed programs: 2246 2022/09/13 05:19:54 executed programs: 2426 2022/09/13 05:19:59 executed programs: 2605 2022/09/13 05:20:04 executed programs: 2793 2022/09/13 05:20:09 executed programs: 2981 2022/09/13 05:20:14 executed programs: 3162 2022/09/13 05:20:19 executed programs: 3342 2022/09/13 05:20:24 executed programs: 3526 2022/09/13 05:20:29 executed programs: 3697 2022/09/13 05:20:34 executed programs: 3886 2022/09/13 05:20:39 executed programs: 4070 2022/09/13 05:20:44 executed programs: 4250 2022/09/13 05:20:49 executed programs: 4435 2022/09/13 05:20:54 executed programs: 4620 2022/09/13 05:20:59 executed programs: 4807 2022/09/13 05:21:04 executed programs: 4994 2022/09/13 05:21:09 executed programs: 5184 2022/09/13 05:21:14 executed programs: 5374 2022/09/13 05:21:19 executed programs: 5559 2022/09/13 05:21:24 executed programs: 5733 2022/09/13 05:21:29 executed programs: 5915 2022/09/13 05:21:34 executed programs: 6098 2022/09/13 05:21:39 executed programs: 6272 2022/09/13 05:21:44 executed programs: 6461 2022/09/13 05:21:49 executed programs: 6647 2022/09/13 05:21:54 executed programs: 6833 2022/09/13 05:21:59 executed programs: 7015 2022/09/13 05:22:04 executed programs: 7204 2022/09/13 05:22:09 executed programs: 7392 2022/09/13 05:22:14 executed programs: 7582 2022/09/13 05:22:19 executed programs: 7761 2022/09/13 05:22:24 executed programs: 7944 2022/09/13 05:22:29 executed programs: 8131 2022/09/13 05:22:34 executed programs: 8315 2022/09/13 05:22:39 executed programs: 8496 2022/09/13 05:22:44 executed programs: 8679 2022/09/13 05:22:49 executed programs: 8857 2022/09/13 05:22:54 executed programs: 9034 2022/09/13 05:22:59 executed programs: 9216 2022/09/13 05:23:04 executed programs: 9392 2022/09/13 05:23:09 executed programs: 9580 2022/09/13 05:23:14 executed programs: 9762 2022/09/13 05:23:19 executed programs: 9945 2022/09/13 05:23:24 executed programs: 10133 2022/09/13 05:23:29 executed programs: 10306 2022/09/13 05:23:34 executed programs: 10491 2022/09/13 05:23:39 executed programs: 10680 2022/09/13 05:23:44 executed programs: 10861 2022/09/13 05:23:49 executed programs: 11044 2022/09/13 05:23:54 executed programs: 11235 2022/09/13 05:23:59 executed programs: 11422 2022/09/13 05:24:04 executed programs: 11599 2022/09/13 05:24:09 executed programs: 11783 2022/09/13 05:24:14 executed programs: 11964 2022/09/13 05:24:19 executed programs: 12148 2022/09/13 05:24:24 executed programs: 12331