Warning: Permanently added '10.128.10.5' (ECDSA) to the list of known hosts. 2023/04/24 17:11:56 parsed 1 programs 2023/04/24 17:11:56 executed programs: 0 [ 38.438191][ T22] audit: type=1400 audit(1682356316.889:157): avc: denied { mounton } for pid=319 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.463900][ T22] audit: type=1400 audit(1682356316.909:158): avc: denied { mount } for pid=319 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.478113][ T323] cgroup1: Unknown subsys name 'perf_event' [ 38.487866][ T22] audit: type=1400 audit(1682356316.909:159): avc: denied { mounton } for pid=323 comm="syz-executor.0" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 38.493610][ T323] cgroup1: Unknown subsys name 'net_cls' [ 38.523147][ T22] audit: type=1400 audit(1682356316.969:160): avc: denied { read } for pid=323 comm="syz-executor.0" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.545040][ T22] audit: type=1400 audit(1682356316.969:161): avc: denied { open } for pid=323 comm="syz-executor.0" path="net:[4026531999]" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.573133][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.580311][ T323] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.587982][ T323] device bridge_slave_0 entered promiscuous mode [ 38.594848][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.601967][ T323] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.609588][ T323] device bridge_slave_1 entered promiscuous mode [ 38.641648][ T22] audit: type=1400 audit(1682356317.089:162): avc: denied { write } for pid=323 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.647925][ T323] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.662553][ T22] audit: type=1400 audit(1682356317.089:163): avc: denied { read } for pid=323 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.669519][ T323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.669611][ T323] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.704661][ T323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.723430][ T118] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.730759][ T118] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.738714][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.746492][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.755968][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.764198][ T100] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.771281][ T100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.787417][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.795863][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.803009][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.810512][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.819008][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.831280][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.846856][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.854773][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.867841][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.876172][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.898660][ T22] audit: type=1400 audit(1682356317.349:164): avc: denied { prog_load } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.918643][ T22] audit: type=1400 audit(1682356317.369:165): avc: denied { prog_run } for pid=328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2023/04/24 17:12:01 executed programs: 517 [ 43.471948][ T22] audit: type=1400 audit(1682356321.919:166): avc: denied { write } for pid=314 comm="syz-execprog" path="pipe:[10961]" dev="pipefs" ino=10961 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 2023/04/24 17:12:06 executed programs: 1086 2023/04/24 17:12:11 executed programs: 1650 2023/04/24 17:12:16 executed programs: 2210 2023/04/24 17:12:21 executed programs: 2782 [ 66.507806][ T67] cfg80211: failed to load regulatory.db 2023/04/24 17:12:26 executed programs: 3356 2023/04/24 17:12:31 executed programs: 3938 2023/04/24 17:12:36 executed programs: 4512 2023/04/24 17:12:41 executed programs: 5087 2023/04/24 17:12:46 executed programs: 5655 2023/04/24 17:12:51 executed programs: 6223 2023/04/24 17:12:56 executed programs: 6793 2023/04/24 17:13:01 executed programs: 7363 2023/04/24 17:13:06 executed programs: 7928 2023/04/24 17:13:11 executed programs: 8498 2023/04/24 17:13:16 executed programs: 9069 2023/04/24 17:13:21 executed programs: 9642 2023/04/24 17:13:26 executed programs: 10216 2023/04/24 17:13:32 executed programs: 10788 2023/04/24 17:13:37 executed programs: 11364 2023/04/24 17:13:42 executed programs: 11937 2023/04/24 17:13:47 executed programs: 12521 2023/04/24 17:13:52 executed programs: 13091 2023/04/24 17:13:57 executed programs: 13662 2023/04/24 17:14:02 executed programs: 14226 2023/04/24 17:14:07 executed programs: 14794 2023/04/24 17:14:12 executed programs: 15368 2023/04/24 17:14:17 executed programs: 15938 2023/04/24 17:14:22 executed programs: 16508 2023/04/24 17:14:27 executed programs: 17078 2023/04/24 17:14:32 executed programs: 17650 2023/04/24 17:14:37 executed programs: 18220 2023/04/24 17:14:42 executed programs: 18791 2023/04/24 17:14:47 executed programs: 19351 2023/04/24 17:14:52 executed programs: 19922 2023/04/24 17:14:57 executed programs: 20489 2023/04/24 17:15:02 executed programs: 21061 2023/04/24 17:15:07 executed programs: 21631 2023/04/24 17:15:12 executed programs: 22208 2023/04/24 17:15:17 executed programs: 22790 2023/04/24 17:15:22 executed programs: 23360 2023/04/24 17:15:27 executed programs: 23935 2023/04/24 17:15:32 executed programs: 24513 2023/04/24 17:15:37 executed programs: 25080 2023/04/24 17:15:42 executed programs: 25656 2023/04/24 17:15:47 executed programs: 26222 2023/04/24 17:15:52 executed programs: 26796 2023/04/24 17:15:57 executed programs: 27375 2023/04/24 17:16:02 executed programs: 27946 2023/04/24 17:16:07 executed programs: 28516 2023/04/24 17:16:12 executed programs: 29094 2023/04/24 17:16:17 executed programs: 29669 2023/04/24 17:16:22 executed programs: 30230 2023/04/24 17:16:27 executed programs: 30810 2023/04/24 17:16:32 executed programs: 31392 2023/04/24 17:16:37 executed programs: 31965 2023/04/24 17:16:42 executed programs: 32543 2023/04/24 17:16:47 executed programs: 33125 2023/04/24 17:16:52 executed programs: 33705 2023/04/24 17:16:57 executed programs: 34284 2023/04/24 17:17:02 executed programs: 34856 2023/04/24 17:17:07 executed programs: 35429 2023/04/24 17:17:12 executed programs: 36004 2023/04/24 17:17:17 executed programs: 36578 2023/04/24 17:17:22 executed programs: 37143 2023/04/24 17:17:27 executed programs: 37719 2023/04/24 17:17:32 executed programs: 38293 2023/04/24 17:17:37 executed programs: 38874 2023/04/24 17:17:42 executed programs: 39451 2023/04/24 17:17:47 executed programs: 40026 2023/04/24 17:17:52 executed programs: 40606