[ 20.037240][ T22] audit: type=1400 audit(1681645668.290:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.061603][ T22] audit: type=1400 audit(1681645668.290:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.083859][ T22] audit: type=1400 audit(1681645668.290:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 20.107697][ T22] audit: type=1400 audit(1681645668.300:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=9219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.131075][ T22] audit: type=1400 audit(1681645668.300:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=9219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.157633][ T22] audit: type=1400 audit(1681645668.300:78): avc: denied { setattr } for pid=304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.181680][ T22] audit: type=1400 audit(1681645668.310:79): avc: denied { execmem } for pid=305 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.202100][ T22] audit: type=1400 audit(1681645668.400:80): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 20.228946][ T22] audit: type=1400 audit(1681645668.400:81): avc: denied { mount } for pid=307 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 20.252021][ T22] audit: type=1400 audit(1681645668.400:82): avc: denied { mounton } for pid=307 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.178' (ECDSA) to the list of known hosts. 2023/04/16 11:48:05 parsed 1 programs 2023/04/16 11:48:05 executed programs: 0 [ 37.070946][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 37.070955][ T22] audit: type=1400 audit(1681645685.320:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.081162][ T334] cgroup1: Unknown subsys name 'perf_event' [ 37.102980][ T22] audit: type=1400 audit(1681645685.320:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.109249][ T334] cgroup1: Unknown subsys name 'net_cls' [ 37.132339][ T22] audit: type=1400 audit(1681645685.330:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 37.161634][ T22] audit: type=1400 audit(1681645685.330:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.190579][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.198163][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.206425][ T334] device bridge_slave_0 entered promiscuous mode [ 37.213606][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.220732][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.228463][ T334] device bridge_slave_1 entered promiscuous mode [ 37.261479][ T22] audit: type=1400 audit(1681645685.510:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.267668][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.282580][ T22] audit: type=1400 audit(1681645685.510:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.290091][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.318460][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.325497][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.345275][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.352766][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.360376][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.368640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.378269][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.386808][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.394224][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.412659][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.421028][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.428104][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.436198][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.444303][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.454853][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.473182][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.481480][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.492279][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.504265][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/16 11:48:10 executed programs: 536 2023/04/16 11:48:15 executed programs: 1126 2023/04/16 11:48:20 executed programs: 1726 2023/04/16 11:48:25 executed programs: 2320 2023/04/16 11:48:30 executed programs: 2915 [ 66.532265][ T71] cfg80211: failed to load regulatory.db [ 66.542897][ T22] audit: type=1400 audit(1681645714.800:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/16 11:48:35 executed programs: 3500 2023/04/16 11:48:40 executed programs: 4080 2023/04/16 11:48:45 executed programs: 4660 2023/04/16 11:48:50 executed programs: 5230 2023/04/16 11:48:55 executed programs: 5801 2023/04/16 11:49:00 executed programs: 6389 2023/04/16 11:49:05 executed programs: 6986 2023/04/16 11:49:10 executed programs: 7571 2023/04/16 11:49:15 executed programs: 8163 2023/04/16 11:49:20 executed programs: 8753 2023/04/16 11:49:25 executed programs: 9348 2023/04/16 11:49:30 executed programs: 9950 2023/04/16 11:49:35 executed programs: 10542 2023/04/16 11:49:40 executed programs: 11133 2023/04/16 11:49:45 executed programs: 11941 2023/04/16 11:49:50 executed programs: 12823 2023/04/16 11:49:55 executed programs: 13706 2023/04/16 11:50:00 executed programs: 14583 2023/04/16 11:50:05 executed programs: 15471 2023/04/16 11:50:10 executed programs: 16350 2023/04/16 11:50:15 executed programs: 17236 2023/04/16 11:50:20 executed programs: 18118 2023/04/16 11:50:25 executed programs: 19009 2023/04/16 11:50:30 executed programs: 19890 2023/04/16 11:50:35 executed programs: 20782 2023/04/16 11:50:40 executed programs: 21672 2023/04/16 11:50:45 executed programs: 22564 2023/04/16 11:50:50 executed programs: 23455 2023/04/16 11:50:55 executed programs: 24347 2023/04/16 11:51:00 executed programs: 25232 2023/04/16 11:51:05 executed programs: 26120 2023/04/16 11:51:10 executed programs: 27019 2023/04/16 11:51:15 executed programs: 27906 2023/04/16 11:51:20 executed programs: 28799 2023/04/16 11:51:25 executed programs: 29697 2023/04/16 11:51:30 executed programs: 30576 2023/04/16 11:51:35 executed programs: 31461 2023/04/16 11:51:40 executed programs: 32342 2023/04/16 11:51:45 executed programs: 33238 2023/04/16 11:51:50 executed programs: 34129 2023/04/16 11:51:55 executed programs: 35025 2023/04/16 11:52:00 executed programs: 35901 2023/04/16 11:52:05 executed programs: 36792 2023/04/16 11:52:10 executed programs: 37679 2023/04/16 11:52:15 executed programs: 38560 2023/04/16 11:52:20 executed programs: 39430 2023/04/16 11:52:25 executed programs: 40325 2023/04/16 11:52:30 executed programs: 41209 2023/04/16 11:52:35 executed programs: 42082 2023/04/16 11:52:40 executed programs: 42961 2023/04/16 11:52:45 executed programs: 43839 2023/04/16 11:52:50 executed programs: 44723 2023/04/16 11:52:55 executed programs: 45609 2023/04/16 11:53:00 executed programs: 46485 2023/04/16 11:53:05 executed programs: 47364 2023/04/16 11:53:10 executed programs: 48250 2023/04/16 11:53:15 executed programs: 49121 2023/04/16 11:53:20 executed programs: 50004 2023/04/16 11:53:25 executed programs: 50891 2023/04/16 11:53:30 executed programs: 51773 2023/04/16 11:53:35 executed programs: 52657 2023/04/16 11:53:40 executed programs: 53534 2023/04/16 11:53:45 executed programs: 54406 2023/04/16 11:53:50 executed programs: 55297 2023/04/16 11:53:55 executed programs: 56182 2023/04/16 11:54:00 executed programs: 57005