[ 20.899487][ T22] audit: type=1400 audit(1681469234.900:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.923919][ T22] audit: type=1400 audit(1681469234.900:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.945498][ T22] audit: type=1400 audit(1681469234.900:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.969827][ T22] audit: type=1400 audit(1681469234.910:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=9492 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.993742][ T22] audit: type=1400 audit(1681469234.910:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=9492 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.019906][ T22] audit: type=1400 audit(1681469234.920:78): avc: denied { setattr } for pid=304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9492 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.046579][ T22] audit: type=1400 audit(1681469234.920:79): avc: denied { execmem } for pid=305 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.069609][ T22] audit: type=1400 audit(1681469235.010:80): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 21.094754][ T22] audit: type=1400 audit(1681469235.010:81): avc: denied { mount } for pid=307 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 21.117476][ T22] audit: type=1400 audit(1681469235.010:82): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.108' (ECDSA) to the list of known hosts. 2023/04/14 10:47:32 parsed 1 programs 2023/04/14 10:47:32 executed programs: 0 [ 38.107506][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 38.107515][ T22] audit: type=1400 audit(1681469252.110:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.121186][ T334] cgroup1: Unknown subsys name 'perf_event' [ 38.139478][ T22] audit: type=1400 audit(1681469252.110:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.146761][ T334] cgroup1: Unknown subsys name 'net_cls' [ 38.169758][ T22] audit: type=1400 audit(1681469252.120:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.199701][ T22] audit: type=1400 audit(1681469252.130:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.232252][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.239846][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.247641][ T334] device bridge_slave_0 entered promiscuous mode [ 38.254909][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.262493][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.270526][ T334] device bridge_slave_1 entered promiscuous mode [ 38.306238][ T22] audit: type=1400 audit(1681469252.310:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.312992][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.327796][ T22] audit: type=1400 audit(1681469252.310:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.335057][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.335173][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.370616][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.392732][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.400637][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.408765][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.417016][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.426757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.435738][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.443537][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.460724][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.470268][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.477747][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.486002][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.494437][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.513610][ T120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.523346][ T120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.535156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.550553][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.560808][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/14 10:47:37 executed programs: 549 2023/04/14 10:47:42 executed programs: 1163 2023/04/14 10:47:47 executed programs: 1781 2023/04/14 10:47:52 executed programs: 2405 2023/04/14 10:47:57 executed programs: 3017 [ 66.641164][ T67] cfg80211: failed to load regulatory.db [ 66.650373][ T22] audit: type=1400 audit(1681469280.660:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/14 10:48:02 executed programs: 3616 2023/04/14 10:48:07 executed programs: 4216 2023/04/14 10:48:12 executed programs: 4828 2023/04/14 10:48:17 executed programs: 5451 2023/04/14 10:48:22 executed programs: 6053 2023/04/14 10:48:27 executed programs: 6662 2023/04/14 10:48:32 executed programs: 7274 2023/04/14 10:48:37 executed programs: 7890 2023/04/14 10:48:42 executed programs: 8491 2023/04/14 10:48:47 executed programs: 9108 2023/04/14 10:48:52 executed programs: 9698 2023/04/14 10:48:57 executed programs: 10295 2023/04/14 10:49:02 executed programs: 10909 2023/04/14 10:49:07 executed programs: 11507 2023/04/14 10:49:12 executed programs: 12111 2023/04/14 10:49:17 executed programs: 12729 2023/04/14 10:49:22 executed programs: 13348 2023/04/14 10:49:27 executed programs: 13960 2023/04/14 10:49:32 executed programs: 14583 2023/04/14 10:49:37 executed programs: 15187 2023/04/14 10:49:42 executed programs: 15805 2023/04/14 10:49:47 executed programs: 16421 2023/04/14 10:49:52 executed programs: 17047 2023/04/14 10:49:57 executed programs: 17663 2023/04/14 10:50:02 executed programs: 18254 2023/04/14 10:50:07 executed programs: 18873 2023/04/14 10:50:12 executed programs: 19493 2023/04/14 10:50:17 executed programs: 20124 2023/04/14 10:50:22 executed programs: 20753 2023/04/14 10:50:27 executed programs: 21377 2023/04/14 10:50:32 executed programs: 21993 2023/04/14 10:50:37 executed programs: 22615 2023/04/14 10:50:42 executed programs: 23235 2023/04/14 10:50:47 executed programs: 23874 2023/04/14 10:50:52 executed programs: 24504 2023/04/14 10:50:57 executed programs: 25126 2023/04/14 10:51:02 executed programs: 25749 2023/04/14 10:51:07 executed programs: 26360 2023/04/14 10:51:12 executed programs: 26974 2023/04/14 10:51:17 executed programs: 27592 2023/04/14 10:51:22 executed programs: 28201 2023/04/14 10:51:27 executed programs: 28829 2023/04/14 10:51:32 executed programs: 29461 2023/04/14 10:51:37 executed programs: 30086 2023/04/14 10:51:42 executed programs: 30714 2023/04/14 10:51:47 executed programs: 31334 2023/04/14 10:51:52 executed programs: 31951 2023/04/14 10:51:57 executed programs: 32586 2023/04/14 10:52:02 executed programs: 33221 2023/04/14 10:52:07 executed programs: 33845 2023/04/14 10:52:12 executed programs: 34469 2023/04/14 10:52:17 executed programs: 35098 2023/04/14 10:52:22 executed programs: 35728 2023/04/14 10:52:27 executed programs: 36361 2023/04/14 10:52:32 executed programs: 36989 2023/04/14 10:52:37 executed programs: 37609 2023/04/14 10:52:42 executed programs: 38229 2023/04/14 10:52:47 executed programs: 38854 2023/04/14 10:52:52 executed programs: 39468 2023/04/14 10:52:57 executed programs: 40077 2023/04/14 10:53:02 executed programs: 40705 2023/04/14 10:53:07 executed programs: 41325 2023/04/14 10:53:12 executed programs: 41934 2023/04/14 10:53:17 executed programs: 42560 2023/04/14 10:53:22 executed programs: 43181 2023/04/14 10:53:27 executed programs: 43804