Warning: Permanently added '10.128.1.48' (ECDSA) to the list of known hosts. 2023/04/15 17:41:09 parsed 1 programs 2023/04/15 17:41:09 executed programs: 0 [ 37.834658][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 37.834668][ T22] audit: type=1400 audit(1681580469.609:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.866404][ T22] audit: type=1400 audit(1681580469.639:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.875300][ T334] cgroup1: Unknown subsys name 'perf_event' [ 37.890282][ T22] audit: type=1400 audit(1681580469.649:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 37.896449][ T334] cgroup1: Unknown subsys name 'net_cls' [ 37.919203][ T22] audit: type=1400 audit(1681580469.649:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.967282][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.974508][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.982479][ T334] device bridge_slave_0 entered promiscuous mode [ 37.989374][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.996627][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.004329][ T334] device bridge_slave_1 entered promiscuous mode [ 38.037462][ T22] audit: type=1400 audit(1681580469.819:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.043645][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.058370][ T22] audit: type=1400 audit(1681580469.819:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.065294][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.093582][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.101097][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.121886][ T101] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.129256][ T101] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.137710][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.146206][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.165256][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.173460][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.180777][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.188374][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.196727][ T101] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.203744][ T101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.211257][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.219355][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.231179][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.245525][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.263701][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.272782][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.281701][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 2023/04/15 17:41:14 executed programs: 521 2023/04/15 17:41:19 executed programs: 1093 2023/04/15 17:41:24 executed programs: 1678 2023/04/15 17:41:29 executed programs: 2269 2023/04/15 17:41:34 executed programs: 2851 [ 66.854814][ T12] cfg80211: failed to load regulatory.db [ 66.861916][ T22] audit: type=1400 audit(1681580498.639:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/15 17:41:39 executed programs: 3433 2023/04/15 17:41:44 executed programs: 4009 2023/04/15 17:41:49 executed programs: 4584 2023/04/15 17:41:54 executed programs: 5159 2023/04/15 17:41:59 executed programs: 5745 2023/04/15 17:42:04 executed programs: 6318 2023/04/15 17:42:09 executed programs: 6893 2023/04/15 17:42:14 executed programs: 7477 2023/04/15 17:42:19 executed programs: 8058 2023/04/15 17:42:24 executed programs: 8641 2023/04/15 17:42:29 executed programs: 9221 2023/04/15 17:42:34 executed programs: 9817 2023/04/15 17:42:39 executed programs: 10401 2023/04/15 17:42:44 executed programs: 10995 2023/04/15 17:42:49 executed programs: 11586 2023/04/15 17:42:54 executed programs: 12180 2023/04/15 17:42:59 executed programs: 12756 2023/04/15 17:43:04 executed programs: 13331 2023/04/15 17:43:09 executed programs: 13925 2023/04/15 17:43:14 executed programs: 14525 2023/04/15 17:43:19 executed programs: 15103 2023/04/15 17:43:24 executed programs: 15729 2023/04/15 17:43:29 executed programs: 16601 2023/04/15 17:43:34 executed programs: 17489 2023/04/15 17:43:39 executed programs: 18374 2023/04/15 17:43:44 executed programs: 19258 2023/04/15 17:43:49 executed programs: 20142 2023/04/15 17:43:54 executed programs: 21008 2023/04/15 17:43:59 executed programs: 21884 2023/04/15 17:44:04 executed programs: 22769 2023/04/15 17:44:09 executed programs: 23639 2023/04/15 17:44:14 executed programs: 24491 2023/04/15 17:44:19 executed programs: 25350 2023/04/15 17:44:24 executed programs: 26210 2023/04/15 17:44:29 executed programs: 27079 2023/04/15 17:44:34 executed programs: 27936 2023/04/15 17:44:39 executed programs: 28802 2023/04/15 17:44:44 executed programs: 29667 2023/04/15 17:44:49 executed programs: 30527 2023/04/15 17:44:54 executed programs: 31380 2023/04/15 17:44:59 executed programs: 32245 2023/04/15 17:45:04 executed programs: 33120 2023/04/15 17:45:09 executed programs: 33996 2023/04/15 17:45:14 executed programs: 34864 2023/04/15 17:45:19 executed programs: 35727 2023/04/15 17:45:24 executed programs: 36600 2023/04/15 17:45:29 executed programs: 37462 2023/04/15 17:45:34 executed programs: 38321 2023/04/15 17:45:39 executed programs: 39187 2023/04/15 17:45:44 executed programs: 40051 2023/04/15 17:45:49 executed programs: 40921 2023/04/15 17:45:54 executed programs: 41779 2023/04/15 17:45:59 executed programs: 42649 2023/04/15 17:46:04 executed programs: 43519 2023/04/15 17:46:09 executed programs: 44394 2023/04/15 17:46:14 executed programs: 45271 2023/04/15 17:46:19 executed programs: 46142 2023/04/15 17:46:24 executed programs: 47013 2023/04/15 17:46:29 executed programs: 47868 [ 358.694618][ T7] kworker/dying (7) used greatest stack depth: 21144 bytes left 2023/04/15 17:46:34 executed programs: 48739 2023/04/15 17:46:39 executed programs: 49613 2023/04/15 17:46:44 executed programs: 50483 2023/04/15 17:46:49 executed programs: 51361 2023/04/15 17:46:54 executed programs: 52233 2023/04/15 17:46:59 executed programs: 53094 2023/04/15 17:47:04 executed programs: 53967