[ 21.066241][ T22] audit: type=1400 audit(1681574571.299:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.090167][ T22] audit: type=1400 audit(1681574571.299:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.111410][ T22] audit: type=1400 audit(1681574571.299:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.135131][ T22] audit: type=1400 audit(1681574571.299:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.158671][ T22] audit: type=1400 audit(1681574571.299:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.182329][ T22] audit: type=1400 audit(1681574571.299:78): avc: denied { setattr } for pid=304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.205905][ T22] audit: type=1400 audit(1681574571.309:79): avc: denied { execmem } for pid=305 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.225679][ T22] audit: type=1400 audit(1681574571.399:80): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 21.250597][ T22] audit: type=1400 audit(1681574571.399:81): avc: denied { mount } for pid=306 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 21.273172][ T22] audit: type=1400 audit(1681574571.399:82): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.10.29' (ECDSA) to the list of known hosts. 2023/04/15 16:03:08 parsed 1 programs 2023/04/15 16:03:08 executed programs: 0 [ 38.413446][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 38.413455][ T22] audit: type=1400 audit(1681574588.639:140): avc: denied { mounton } for pid=331 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.424676][ T335] cgroup1: Unknown subsys name 'perf_event' [ 38.445150][ T22] audit: type=1400 audit(1681574588.639:141): avc: denied { mount } for pid=331 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.451577][ T335] cgroup1: Unknown subsys name 'net_cls' [ 38.476167][ T22] audit: type=1400 audit(1681574588.649:142): avc: denied { mounton } for pid=335 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.505354][ T22] audit: type=1400 audit(1681574588.649:143): avc: denied { mount } for pid=335 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.534305][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.541774][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.549248][ T335] device bridge_slave_0 entered promiscuous mode [ 38.556194][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.563596][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.571055][ T335] device bridge_slave_1 entered promiscuous mode [ 38.604899][ T22] audit: type=1400 audit(1681574588.829:144): avc: denied { write } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.611932][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.626583][ T22] audit: type=1400 audit(1681574588.829:145): avc: denied { read } for pid=335 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.633575][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.661529][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.668551][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.688177][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.695959][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.703298][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.711726][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.726799][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.735043][ T118] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.742094][ T118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.749567][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.758345][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.765534][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.773967][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.796256][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.804588][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.813060][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.821236][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.832958][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.845541][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/15 16:03:13 executed programs: 579 2023/04/15 16:03:18 executed programs: 1234 2023/04/15 16:03:23 executed programs: 1890 2023/04/15 16:03:28 executed programs: 2538 2023/04/15 16:03:33 executed programs: 3179 [ 66.516297][ T67] cfg80211: failed to load regulatory.db [ 66.526674][ T22] audit: type=1400 audit(1681574616.759:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/15 16:03:38 executed programs: 3824 2023/04/15 16:03:43 executed programs: 4477 2023/04/15 16:03:48 executed programs: 5146 2023/04/15 16:03:53 executed programs: 5812 2023/04/15 16:03:58 executed programs: 6455 2023/04/15 16:04:03 executed programs: 7109 2023/04/15 16:04:08 executed programs: 7753 2023/04/15 16:04:13 executed programs: 8394 2023/04/15 16:04:18 executed programs: 9035 2023/04/15 16:04:23 executed programs: 9690 2023/04/15 16:04:28 executed programs: 10336 2023/04/15 16:04:33 executed programs: 10985 2023/04/15 16:04:38 executed programs: 11646 2023/04/15 16:04:43 executed programs: 12308 2023/04/15 16:04:48 executed programs: 12962 2023/04/15 16:04:53 executed programs: 13621 2023/04/15 16:04:58 executed programs: 14273 2023/04/15 16:05:03 executed programs: 14930 2023/04/15 16:05:08 executed programs: 15580 2023/04/15 16:05:13 executed programs: 16232 2023/04/15 16:05:18 executed programs: 16898 2023/04/15 16:05:23 executed programs: 17559 2023/04/15 16:05:28 executed programs: 18215 2023/04/15 16:05:33 executed programs: 18870 2023/04/15 16:05:38 executed programs: 19536 2023/04/15 16:05:43 executed programs: 20180 2023/04/15 16:05:48 executed programs: 20838 2023/04/15 16:05:53 executed programs: 21511 2023/04/15 16:05:58 executed programs: 22171 2023/04/15 16:06:03 executed programs: 22827 2023/04/15 16:06:08 executed programs: 23491 2023/04/15 16:06:13 executed programs: 24155 2023/04/15 16:06:18 executed programs: 24803 2023/04/15 16:06:23 executed programs: 25451 2023/04/15 16:06:28 executed programs: 26096 2023/04/15 16:06:33 executed programs: 26743 2023/04/15 16:06:38 executed programs: 27388 2023/04/15 16:06:43 executed programs: 28302 2023/04/15 16:06:48 executed programs: 29252 2023/04/15 16:06:53 executed programs: 30193 2023/04/15 16:06:58 executed programs: 31137 2023/04/15 16:07:03 executed programs: 32081 2023/04/15 16:07:08 executed programs: 33013 2023/04/15 16:07:13 executed programs: 33955 2023/04/15 16:07:18 executed programs: 34892 2023/04/15 16:07:23 executed programs: 35840 2023/04/15 16:07:28 executed programs: 36787 2023/04/15 16:07:33 executed programs: 37730 2023/04/15 16:07:38 executed programs: 38675 2023/04/15 16:07:43 executed programs: 39608 2023/04/15 16:07:48 executed programs: 40525 2023/04/15 16:07:53 executed programs: 41444 2023/04/15 16:07:58 executed programs: 42370 2023/04/15 16:08:03 executed programs: 43315 2023/04/15 16:08:08 executed programs: 44250 2023/04/15 16:08:13 executed programs: 45198 2023/04/15 16:08:18 executed programs: 46134 2023/04/15 16:08:23 executed programs: 47076 2023/04/15 16:08:28 executed programs: 48012 2023/04/15 16:08:33 executed programs: 48939 2023/04/15 16:08:38 executed programs: 49871 2023/04/15 16:08:43 executed programs: 50814 2023/04/15 16:08:48 executed programs: 51759 2023/04/15 16:08:53 executed programs: 52702 2023/04/15 16:08:58 executed programs: 53639 2023/04/15 16:09:03 executed programs: 54585