[ 28.108986][ T22] audit: type=1400 audit(1681467012.869:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 28.134513][ T22] audit: type=1400 audit(1681467012.869:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 28.156051][ T22] audit: type=1400 audit(1681467012.869:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 28.179735][ T22] audit: type=1400 audit(1681467012.879:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=907 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.203574][ T22] audit: type=1400 audit(1681467012.879:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=907 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.227803][ T22] audit: type=1400 audit(1681467012.879:78): avc: denied { setattr } for pid=305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=907 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.253747][ T22] audit: type=1400 audit(1681467012.889:79): avc: denied { execmem } for pid=306 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 28.273409][ T22] audit: type=1400 audit(1681467012.989:80): avc: denied { mounton } for pid=308 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 28.297615][ T22] audit: type=1400 audit(1681467012.989:81): avc: denied { mount } for pid=308 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 28.320755][ T22] audit: type=1400 audit(1681467012.989:82): avc: denied { mounton } for pid=308 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.10.30' (ECDSA) to the list of known hosts. 2023/04/14 10:10:30 parsed 1 programs 2023/04/14 10:10:30 executed programs: 0 [ 45.365776][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 45.365783][ T22] audit: type=1400 audit(1681467030.129:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 45.397556][ T22] audit: type=1400 audit(1681467030.159:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 45.409915][ T333] cgroup1: Unknown subsys name 'perf_event' [ 45.421745][ T22] audit: type=1400 audit(1681467030.159:142): avc: denied { mounton } for pid=333 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 45.428231][ T333] cgroup1: Unknown subsys name 'net_cls' [ 45.450458][ T22] audit: type=1400 audit(1681467030.159:143): avc: denied { mount } for pid=333 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 45.501228][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.508399][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.516015][ T333] device bridge_slave_0 entered promiscuous mode [ 45.522976][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.530311][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.538302][ T333] device bridge_slave_1 entered promiscuous mode [ 45.573748][ T22] audit: type=1400 audit(1681467030.329:144): avc: denied { write } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.580398][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.594440][ T22] audit: type=1400 audit(1681467030.329:145): avc: denied { read } for pid=333 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 45.601577][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.601705][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.637384][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.659142][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.667205][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.674679][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.682663][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.692485][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.700816][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.707977][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.726763][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.734965][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.742033][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.749444][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.757938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.768419][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.785892][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.794167][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.810089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.818923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2023/04/14 10:10:35 executed programs: 531 2023/04/14 10:10:40 executed programs: 1138 2023/04/14 10:10:45 executed programs: 1730 2023/04/14 10:10:50 executed programs: 2316 [ 66.895764][ T12] cfg80211: failed to load regulatory.db [ 66.902914][ T22] audit: type=1400 audit(1681467051.659:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/14 10:10:55 executed programs: 2907 2023/04/14 10:11:00 executed programs: 3506 2023/04/14 10:11:05 executed programs: 4100 2023/04/14 10:11:10 executed programs: 4682 2023/04/14 10:11:15 executed programs: 5267 2023/04/14 10:11:20 executed programs: 5841 2023/04/14 10:11:25 executed programs: 6422 2023/04/14 10:11:30 executed programs: 7013 2023/04/14 10:11:35 executed programs: 7590 2023/04/14 10:11:40 executed programs: 8168 2023/04/14 10:11:45 executed programs: 8765 2023/04/14 10:11:50 executed programs: 9364 2023/04/14 10:11:55 executed programs: 9956 2023/04/14 10:12:00 executed programs: 10563 2023/04/14 10:12:05 executed programs: 11166 2023/04/14 10:12:10 executed programs: 11759 2023/04/14 10:12:15 executed programs: 12352 2023/04/14 10:12:20 executed programs: 12940 2023/04/14 10:12:25 executed programs: 13518 2023/04/14 10:12:30 executed programs: 14103 2023/04/14 10:12:35 executed programs: 14685 2023/04/14 10:12:40 executed programs: 15279 2023/04/14 10:12:45 executed programs: 15857 2023/04/14 10:12:50 executed programs: 16447 2023/04/14 10:12:55 executed programs: 17022 2023/04/14 10:13:00 executed programs: 17594 2023/04/14 10:13:05 executed programs: 18163 2023/04/14 10:13:10 executed programs: 18739 2023/04/14 10:13:15 executed programs: 19313 2023/04/14 10:13:20 executed programs: 19890 2023/04/14 10:13:25 executed programs: 20467 2023/04/14 10:13:30 executed programs: 21047 2023/04/14 10:13:35 executed programs: 21622 2023/04/14 10:13:40 executed programs: 22198 2023/04/14 10:13:45 executed programs: 22768 2023/04/14 10:13:50 executed programs: 23334 2023/04/14 10:13:55 executed programs: 23911 2023/04/14 10:14:00 executed programs: 24478 2023/04/14 10:14:05 executed programs: 25060 2023/04/14 10:14:10 executed programs: 25639 2023/04/14 10:14:15 executed programs: 26227 2023/04/14 10:14:20 executed programs: 26823 2023/04/14 10:14:25 executed programs: 27487 2023/04/14 10:14:30 executed programs: 28333 2023/04/14 10:14:35 executed programs: 29182 2023/04/14 10:14:40 executed programs: 30020 2023/04/14 10:14:45 executed programs: 30844 2023/04/14 10:14:50 executed programs: 31682 2023/04/14 10:14:55 executed programs: 32524 2023/04/14 10:15:00 executed programs: 33350 2023/04/14 10:15:05 executed programs: 34182 2023/04/14 10:15:10 executed programs: 35013 2023/04/14 10:15:15 executed programs: 35834 2023/04/14 10:15:20 executed programs: 36668 2023/04/14 10:15:25 executed programs: 37522 2023/04/14 10:15:30 executed programs: 38360 2023/04/14 10:15:35 executed programs: 39193 [ 353.626102][ T172] kworker/dying (172) used greatest stack depth: 21496 bytes left 2023/04/14 10:15:40 executed programs: 40038 2023/04/14 10:15:45 executed programs: 40869 2023/04/14 10:15:50 executed programs: 41683 2023/04/14 10:15:55 executed programs: 42510 2023/04/14 10:16:00 executed programs: 43355 2023/04/14 10:16:05 executed programs: 44188 2023/04/14 10:16:10 executed programs: 45019 2023/04/14 10:16:15 executed programs: 45877 2023/04/14 10:16:20 executed programs: 46748 2023/04/14 10:16:25 executed programs: 47606