[ 21.063652][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.227837][ T290] syz-executor.0 (290) used greatest stack depth: 19800 bytes left [ 21.622656][ T7] device bridge_slave_1 left promiscuous mode [ 21.628894][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.639535][ T7] device bridge_slave_0 left promiscuous mode [ 21.645756][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.910428][ T22] kauditd_printk_skb: 63 callbacks suppressed [ 31.910435][ T22] audit: type=1400 audit(1682362781.310:154): avc: denied { append } for pid=138 comm="syslogd" name="messages" dev="tmpfs" ino=137 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.940210][ T22] audit: type=1400 audit(1682362781.310:155): avc: denied { open } for pid=138 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=137 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.963195][ T22] audit: type=1400 audit(1682362781.310:156): avc: denied { getattr } for pid=138 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=137 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Warning: Permanently added '10.128.10.30' (ECDSA) to the list of known hosts. 2023/04/24 18:59:48 parsed 1 programs 2023/04/24 18:59:48 executed programs: 0 [ 39.294901][ T22] audit: type=1400 audit(1682362788.690:157): avc: denied { mounton } for pid=318 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.319941][ T22] audit: type=1400 audit(1682362788.700:158): avc: denied { mount } for pid=318 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.353050][ T22] audit: type=1400 audit(1682362788.750:159): avc: denied { mounton } for pid=322 comm="syz-executor.0" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 39.369881][ T322] cgroup1: Unknown subsys name 'perf_event' [ 39.382601][ T322] cgroup1: Unknown subsys name 'net_cls' [ 39.388997][ T22] audit: type=1400 audit(1682362788.780:160): avc: denied { read } for pid=322 comm="syz-executor.0" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.410749][ T22] audit: type=1400 audit(1682362788.780:161): avc: denied { open } for pid=322 comm="syz-executor.0" path="net:[4026531999]" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.439664][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.446983][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.454454][ T322] device bridge_slave_0 entered promiscuous mode [ 39.461294][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.468383][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.475872][ T322] device bridge_slave_1 entered promiscuous mode [ 39.507977][ T22] audit: type=1400 audit(1682362788.900:162): avc: denied { write } for pid=322 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.514120][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.528620][ T22] audit: type=1400 audit(1682362788.900:163): avc: denied { read } for pid=322 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.535588][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.535684][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.570529][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.589569][ T100] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.597343][ T100] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.605039][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.613218][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.629754][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.637910][ T100] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.644966][ T100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.653363][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.661797][ T100] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.668922][ T100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.676789][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.685737][ T100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.697784][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.718816][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.728365][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.737807][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.746223][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.769371][ T22] audit: type=1400 audit(1682362789.170:164): avc: denied { prog_load } for pid=327 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.788940][ T22] audit: type=1400 audit(1682362789.180:165): avc: denied { prog_run } for pid=327 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 2023/04/24 18:59:53 executed programs: 557 [ 44.354640][ T22] audit: type=1400 audit(1682362793.750:166): avc: denied { write } for pid=313 comm="syz-execprog" path="pipe:[11134]" dev="pipefs" ino=11134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 2023/04/24 18:59:58 executed programs: 1172 2023/04/24 19:00:03 executed programs: 1771 2023/04/24 19:00:08 executed programs: 2367 2023/04/24 19:00:13 executed programs: 2976 [ 66.530625][ T67] cfg80211: failed to load regulatory.db 2023/04/24 19:00:18 executed programs: 3585 2023/04/24 19:00:23 executed programs: 4201 2023/04/24 19:00:28 executed programs: 4827 2023/04/24 19:00:33 executed programs: 5439 2023/04/24 19:00:38 executed programs: 6058 2023/04/24 19:00:43 executed programs: 6660 2023/04/24 19:00:48 executed programs: 7275 2023/04/24 19:00:53 executed programs: 7885 2023/04/24 19:00:58 executed programs: 8502 2023/04/24 19:01:03 executed programs: 9115 2023/04/24 19:01:08 executed programs: 9722 2023/04/24 19:01:13 executed programs: 10326 2023/04/24 19:01:18 executed programs: 10919 2023/04/24 19:01:23 executed programs: 11536 2023/04/24 19:01:28 executed programs: 12146 2023/04/24 19:01:33 executed programs: 12756 2023/04/24 19:01:38 executed programs: 13371 2023/04/24 19:01:43 executed programs: 13990 2023/04/24 19:01:48 executed programs: 14600 2023/04/24 19:01:53 executed programs: 15209 2023/04/24 19:01:58 executed programs: 15849 2023/04/24 19:02:03 executed programs: 16475 2023/04/24 19:02:08 executed programs: 17096 2023/04/24 19:02:13 executed programs: 17713 2023/04/24 19:02:18 executed programs: 18332 2023/04/24 19:02:23 executed programs: 18949 2023/04/24 19:02:28 executed programs: 19572 2023/04/24 19:02:33 executed programs: 20181 2023/04/24 19:02:38 executed programs: 20784 2023/04/24 19:02:43 executed programs: 21394 2023/04/24 19:02:48 executed programs: 22002 2023/04/24 19:02:53 executed programs: 22613 2023/04/24 19:02:58 executed programs: 23229 2023/04/24 19:03:03 executed programs: 23837 2023/04/24 19:03:08 executed programs: 24440 2023/04/24 19:03:13 executed programs: 25050 2023/04/24 19:03:18 executed programs: 25659 2023/04/24 19:03:23 executed programs: 26270 2023/04/24 19:03:28 executed programs: 26879 2023/04/24 19:03:33 executed programs: 27480 2023/04/24 19:03:38 executed programs: 28094 2023/04/24 19:03:43 executed programs: 28705 2023/04/24 19:03:48 executed programs: 29330 2023/04/24 19:03:53 executed programs: 29934 2023/04/24 19:03:58 executed programs: 30553 2023/04/24 19:04:03 executed programs: 31165 2023/04/24 19:04:08 executed programs: 31782 2023/04/24 19:04:13 executed programs: 32406 2023/04/24 19:04:18 executed programs: 33034 2023/04/24 19:04:23 executed programs: 33665 2023/04/24 19:04:28 executed programs: 34287 2023/04/24 19:04:34 executed programs: 34916 2023/04/24 19:04:39 executed programs: 35545 2023/04/24 19:04:44 executed programs: 36157 2023/04/24 19:04:49 executed programs: 36767 2023/04/24 19:04:54 executed programs: 37400 2023/04/24 19:04:59 executed programs: 38025 2023/04/24 19:05:04 executed programs: 38652 2023/04/24 19:05:09 executed programs: 39268 2023/04/24 19:05:14 executed programs: 39877 2023/04/24 19:05:19 executed programs: 40489 2023/04/24 19:05:24 executed programs: 41115 2023/04/24 19:05:29 executed programs: 41723 2023/04/24 19:05:34 executed programs: 42336 2023/04/24 19:05:39 executed programs: 42962 2023/04/24 19:05:44 executed programs: 43582