Warning: Permanently added '10.128.10.42' (ECDSA) to the list of known hosts. 2023/04/16 07:47:34 parsed 1 programs 2023/04/16 07:47:34 executed programs: 0 [ 38.375674][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 38.375681][ T22] audit: type=1400 audit(1681631254.660:140): avc: denied { mounton } for pid=329 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.392694][ T333] cgroup1: Unknown subsys name 'perf_event' [ 38.407633][ T22] audit: type=1400 audit(1681631254.660:141): avc: denied { mount } for pid=329 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.414415][ T333] cgroup1: Unknown subsys name 'net_cls' [ 38.436670][ T22] audit: type=1400 audit(1681631254.670:142): avc: denied { mounton } for pid=333 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.465578][ T22] audit: type=1400 audit(1681631254.670:143): avc: denied { mount } for pid=333 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.495269][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.502292][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.510051][ T333] device bridge_slave_0 entered promiscuous mode [ 38.517125][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.524295][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.533862][ T333] device bridge_slave_1 entered promiscuous mode [ 38.567721][ T22] audit: type=1400 audit(1681631254.850:144): avc: denied { write } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.574248][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.588473][ T22] audit: type=1400 audit(1681631254.850:145): avc: denied { read } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.595476][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.595596][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.631012][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.651725][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.659382][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.667326][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.675032][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.684571][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.692941][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.700019][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.708483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.716905][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.724525][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.744724][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.753593][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.761803][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.782793][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.791366][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.800031][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.808394][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 2023/04/16 07:47:39 executed programs: 545 2023/04/16 07:47:44 executed programs: 1145 2023/04/16 07:47:49 executed programs: 1739 2023/04/16 07:47:54 executed programs: 2332 2023/04/16 07:47:59 executed programs: 2927 [ 66.704294][ T12] cfg80211: failed to load regulatory.db [ 66.712834][ T22] audit: type=1400 audit(1681631282.990:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/16 07:48:04 executed programs: 3517 2023/04/16 07:48:09 executed programs: 4100 2023/04/16 07:48:14 executed programs: 4686 2023/04/16 07:48:19 executed programs: 5262 2023/04/16 07:48:24 executed programs: 5833 2023/04/16 07:48:29 executed programs: 6411 2023/04/16 07:48:34 executed programs: 7247 2023/04/16 07:48:39 executed programs: 8122 2023/04/16 07:48:44 executed programs: 9004 2023/04/16 07:48:49 executed programs: 9879 2023/04/16 07:48:54 executed programs: 10758 2023/04/16 07:48:59 executed programs: 11653 2023/04/16 07:49:04 executed programs: 12537 2023/04/16 07:49:09 executed programs: 13436 2023/04/16 07:49:14 executed programs: 14329 2023/04/16 07:49:19 executed programs: 15228 2023/04/16 07:49:24 executed programs: 16105 2023/04/16 07:49:29 executed programs: 16991 2023/04/16 07:49:34 executed programs: 17860 2023/04/16 07:49:39 executed programs: 18738 2023/04/16 07:49:44 executed programs: 19636 2023/04/16 07:49:49 executed programs: 20521 2023/04/16 07:49:54 executed programs: 21415 2023/04/16 07:49:59 executed programs: 22317 2023/04/16 07:50:04 executed programs: 23201 2023/04/16 07:50:09 executed programs: 24090 2023/04/16 07:50:14 executed programs: 24970 2023/04/16 07:50:19 executed programs: 25809 2023/04/16 07:50:24 executed programs: 26666 2023/04/16 07:50:29 executed programs: 27561 2023/04/16 07:50:34 executed programs: 28458 2023/04/16 07:50:39 executed programs: 29318 2023/04/16 07:50:44 executed programs: 30198 2023/04/16 07:50:49 executed programs: 31072 2023/04/16 07:50:54 executed programs: 31966 2023/04/16 07:50:59 executed programs: 32823 2023/04/16 07:51:04 executed programs: 33681 2023/04/16 07:51:09 executed programs: 34538 2023/04/16 07:51:14 executed programs: 35368 2023/04/16 07:51:19 executed programs: 36220 2023/04/16 07:51:24 executed programs: 37043 2023/04/16 07:51:29 executed programs: 37864 2023/04/16 07:51:34 executed programs: 38697 2023/04/16 07:51:39 executed programs: 39540 2023/04/16 07:51:44 executed programs: 40401 2023/04/16 07:51:49 executed programs: 41243 2023/04/16 07:51:54 executed programs: 42117 2023/04/16 07:51:59 executed programs: 42980 2023/04/16 07:52:04 executed programs: 43840 2023/04/16 07:52:09 executed programs: 44716 2023/04/16 07:52:14 executed programs: 45586 2023/04/16 07:52:19 executed programs: 46454 2023/04/16 07:52:24 executed programs: 47323 2023/04/16 07:52:29 executed programs: 48209 2023/04/16 07:52:34 executed programs: 49080 2023/04/16 07:52:39 executed programs: 49951 2023/04/16 07:52:44 executed programs: 50823 2023/04/16 07:52:49 executed programs: 51701 2023/04/16 07:52:54 executed programs: 52579 2023/04/16 07:52:59 executed programs: 53403 2023/04/16 07:53:04 executed programs: 54201 2023/04/16 07:53:09 executed programs: 55008 2023/04/16 07:53:14 executed programs: 55829 2023/04/16 07:53:19 executed programs: 56702 2023/04/16 07:53:24 executed programs: 57581 2023/04/16 07:53:29 executed programs: 58473