[ 21.903247][ T22] audit: type=1400 audit(1681585472.449:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.926629][ T22] audit: type=1400 audit(1681585472.449:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.947872][ T22] audit: type=1400 audit(1681585472.449:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.971291][ T22] audit: type=1400 audit(1681585472.449:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=9565 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.994227][ T22] audit: type=1400 audit(1681585472.449:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=9565 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.020004][ T22] audit: type=1400 audit(1681585472.449:78): avc: denied { setattr } for pid=303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9565 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.043368][ T22] audit: type=1400 audit(1681585472.479:79): avc: denied { execmem } for pid=304 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.062833][ T22] audit: type=1400 audit(1681585472.549:80): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 22.087603][ T22] audit: type=1400 audit(1681585472.549:81): avc: denied { mount } for pid=306 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 22.110090][ T22] audit: type=1400 audit(1681585472.549:82): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.10.15' (ECDSA) to the list of known hosts. 2023/04/15 19:04:49 parsed 1 programs 2023/04/15 19:04:49 executed programs: 0 [ 39.268553][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 39.268561][ T22] audit: type=1400 audit(1681585489.819:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.280345][ T334] cgroup1: Unknown subsys name 'perf_event' [ 39.301135][ T22] audit: type=1400 audit(1681585489.819:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.307660][ T334] cgroup1: Unknown subsys name 'net_cls' [ 39.331667][ T22] audit: type=1400 audit(1681585489.829:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 39.361340][ T22] audit: type=1400 audit(1681585489.829:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.393455][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.400830][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.408335][ T334] device bridge_slave_0 entered promiscuous mode [ 39.415422][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.422631][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.430328][ T334] device bridge_slave_1 entered promiscuous mode [ 39.465592][ T22] audit: type=1400 audit(1681585490.009:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.473088][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.486589][ T22] audit: type=1400 audit(1681585490.009:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.493960][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.494069][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.529219][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.550628][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.558936][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.566959][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.574950][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.599747][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.609248][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.617451][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.624661][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.632683][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.641061][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.648249][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.655791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.663825][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.679010][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.687430][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.699660][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.714437][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/15 19:04:54 executed programs: 540 2023/04/15 19:04:59 executed programs: 1172 2023/04/15 19:05:04 executed programs: 1786 2023/04/15 19:05:09 executed programs: 2398 2023/04/15 19:05:14 executed programs: 2982 [ 66.468595][ T115] cfg80211: failed to load regulatory.db [ 66.475840][ T22] audit: type=1400 audit(1681585517.019:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/15 19:05:19 executed programs: 3574 2023/04/15 19:05:24 executed programs: 4182 2023/04/15 19:05:29 executed programs: 4785 2023/04/15 19:05:34 executed programs: 5393 2023/04/15 19:05:39 executed programs: 6009 2023/04/15 19:05:44 executed programs: 6670 2023/04/15 19:05:49 executed programs: 7298 2023/04/15 19:05:54 executed programs: 7918 2023/04/15 19:05:59 executed programs: 8509 2023/04/15 19:06:04 executed programs: 9107 2023/04/15 19:06:09 executed programs: 9739 2023/04/15 19:06:14 executed programs: 10378 2023/04/15 19:06:19 executed programs: 11003 2023/04/15 19:06:24 executed programs: 11647 2023/04/15 19:06:29 executed programs: 12279 2023/04/15 19:06:34 executed programs: 12925 2023/04/15 19:06:39 executed programs: 13568 2023/04/15 19:06:44 executed programs: 14231 2023/04/15 19:06:49 executed programs: 14867 2023/04/15 19:06:54 executed programs: 15509 2023/04/15 19:06:59 executed programs: 16155 2023/04/15 19:07:04 executed programs: 16795 2023/04/15 19:07:09 executed programs: 17430 2023/04/15 19:07:14 executed programs: 18064 2023/04/15 19:07:19 executed programs: 18694 2023/04/15 19:07:24 executed programs: 19334 2023/04/15 19:07:29 executed programs: 19981 2023/04/15 19:07:34 executed programs: 20630 2023/04/15 19:07:39 executed programs: 21289 2023/04/15 19:07:44 executed programs: 21945 2023/04/15 19:07:49 executed programs: 22594 2023/04/15 19:07:54 executed programs: 23258 2023/04/15 19:07:59 executed programs: 23920 2023/04/15 19:08:04 executed programs: 24559 2023/04/15 19:08:09 executed programs: 25207 2023/04/15 19:08:14 executed programs: 25868 2023/04/15 19:08:19 executed programs: 26524 2023/04/15 19:08:24 executed programs: 27187 2023/04/15 19:08:30 executed programs: 27849 2023/04/15 19:08:35 executed programs: 28506 2023/04/15 19:08:40 executed programs: 29165 2023/04/15 19:08:45 executed programs: 29844 2023/04/15 19:08:50 executed programs: 30503 2023/04/15 19:08:55 executed programs: 31145 2023/04/15 19:09:00 executed programs: 31787 2023/04/15 19:09:05 executed programs: 32450 2023/04/15 19:09:10 executed programs: 33108 2023/04/15 19:09:15 executed programs: 33752 2023/04/15 19:09:20 executed programs: 34400 2023/04/15 19:09:25 executed programs: 35065 2023/04/15 19:09:30 executed programs: 35736 2023/04/15 19:09:35 executed programs: 36394 2023/04/15 19:09:40 executed programs: 37062 2023/04/15 19:09:45 executed programs: 37725 2023/04/15 19:09:50 executed programs: 38385 2023/04/15 19:09:55 executed programs: 39134 2023/04/15 19:10:00 executed programs: 40069 2023/04/15 19:10:05 executed programs: 40987 2023/04/15 19:10:10 executed programs: 41931 2023/04/15 19:10:15 executed programs: 42881 2023/04/15 19:10:20 executed programs: 43811 2023/04/15 19:10:25 executed programs: 44735 2023/04/15 19:10:30 executed programs: 45665 [ 383.908508][ T7] kworker/dying (7) used greatest stack depth: 21144 bytes left 2023/04/15 19:10:35 executed programs: 46589 2023/04/15 19:10:40 executed programs: 47496 2023/04/15 19:10:45 executed programs: 48406