[ 19.785985][ T22] audit: type=1400 audit(1681602731.119:73): avc: denied { getattr } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.809779][ T22] audit: type=1400 audit(1681602731.119:74): avc: denied { read } for pid=295 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.830883][ T22] audit: type=1400 audit(1681602731.119:75): avc: denied { open } for pid=295 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 19.854101][ T22] audit: type=1400 audit(1681602731.119:76): avc: denied { read } for pid=295 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=10038 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.877376][ T22] audit: type=1400 audit(1681602731.119:77): avc: denied { open } for pid=295 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=10038 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.903506][ T22] audit: type=1400 audit(1681602731.119:78): avc: denied { setattr } for pid=304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=10038 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.930056][ T22] audit: type=1400 audit(1681602731.139:79): avc: denied { execmem } for pid=305 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.949735][ T22] audit: type=1400 audit(1681602731.209:80): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 19.973944][ T22] audit: type=1400 audit(1681602731.209:81): avc: denied { mount } for pid=306 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 19.996510][ T22] audit: type=1400 audit(1681602731.209:82): avc: denied { mounton } for pid=306 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.179' (ECDSA) to the list of known hosts. 2023/04/15 23:52:28 parsed 1 programs 2023/04/15 23:52:28 executed programs: 0 [ 37.029519][ T22] kauditd_printk_skb: 57 callbacks suppressed [ 37.029526][ T22] audit: type=1400 audit(1681602748.359:140): avc: denied { mounton } for pid=330 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 37.061642][ T22] audit: type=1400 audit(1681602748.389:141): avc: denied { mount } for pid=330 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 37.073287][ T334] cgroup1: Unknown subsys name 'perf_event' [ 37.085578][ T22] audit: type=1400 audit(1681602748.389:142): avc: denied { mounton } for pid=334 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 37.092196][ T334] cgroup1: Unknown subsys name 'net_cls' [ 37.114799][ T22] audit: type=1400 audit(1681602748.389:143): avc: denied { mount } for pid=334 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.163083][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.170327][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.178495][ T334] device bridge_slave_0 entered promiscuous mode [ 37.185761][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.192883][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.200568][ T334] device bridge_slave_1 entered promiscuous mode [ 37.233557][ T22] audit: type=1400 audit(1681602748.559:144): avc: denied { write } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.239662][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.254115][ T22] audit: type=1400 audit(1681602748.559:145): avc: denied { read } for pid=334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.261294][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.289431][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.296682][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.316735][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.324884][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.332218][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.340354][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.349679][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.358217][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.365533][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.385010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.393925][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.401060][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.408450][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.416657][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.425954][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.444909][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.453222][ T70] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.470574][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.479618][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2023/04/15 23:52:33 executed programs: 587 2023/04/15 23:52:38 executed programs: 1229 2023/04/15 23:52:43 executed programs: 1859 2023/04/15 23:52:48 executed programs: 2502 2023/04/15 23:52:53 executed programs: 3142 [ 66.534542][ T101] cfg80211: failed to load regulatory.db [ 66.545053][ T22] audit: type=1400 audit(1681602777.879:146): avc: denied { read } for pid=137 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/04/15 23:52:58 executed programs: 3787 2023/04/15 23:53:03 executed programs: 4434 2023/04/15 23:53:08 executed programs: 5085 2023/04/15 23:53:13 executed programs: 5736 2023/04/15 23:53:18 executed programs: 6379 2023/04/15 23:53:23 executed programs: 7028 2023/04/15 23:53:28 executed programs: 7674 2023/04/15 23:53:33 executed programs: 8315 2023/04/15 23:53:38 executed programs: 8964 2023/04/15 23:53:43 executed programs: 9609 2023/04/15 23:53:48 executed programs: 10263 2023/04/15 23:53:53 executed programs: 10914 2023/04/15 23:53:58 executed programs: 11557 2023/04/15 23:54:03 executed programs: 12203 2023/04/15 23:54:08 executed programs: 12859 2023/04/15 23:54:13 executed programs: 13518 2023/04/15 23:54:18 executed programs: 14309 2023/04/15 23:54:23 executed programs: 15235 2023/04/15 23:54:28 executed programs: 16164 2023/04/15 23:54:33 executed programs: 17095 2023/04/15 23:54:38 executed programs: 18031 2023/04/15 23:54:43 executed programs: 18964 2023/04/15 23:54:48 executed programs: 19892 2023/04/15 23:54:53 executed programs: 20825 2023/04/15 23:54:58 executed programs: 21756 2023/04/15 23:55:03 executed programs: 22694 2023/04/15 23:55:08 executed programs: 23636 2023/04/15 23:55:13 executed programs: 24565 2023/04/15 23:55:18 executed programs: 25491 2023/04/15 23:55:23 executed programs: 26428 2023/04/15 23:55:28 executed programs: 27355 2023/04/15 23:55:33 executed programs: 28289 2023/04/15 23:55:38 executed programs: 29219 2023/04/15 23:55:43 executed programs: 30153 2023/04/15 23:55:48 executed programs: 31079 2023/04/15 23:55:53 executed programs: 31999 2023/04/15 23:55:58 executed programs: 32928 2023/04/15 23:56:03 executed programs: 33865 2023/04/15 23:56:08 executed programs: 34797 2023/04/15 23:56:13 executed programs: 35726 2023/04/15 23:56:18 executed programs: 36658 2023/04/15 23:56:23 executed programs: 37591 2023/04/15 23:56:28 executed programs: 38514 2023/04/15 23:56:33 executed programs: 39443 2023/04/15 23:56:38 executed programs: 40367 2023/04/15 23:56:43 executed programs: 41299 2023/04/15 23:56:48 executed programs: 42232 2023/04/15 23:56:53 executed programs: 43161 2023/04/15 23:56:58 executed programs: 44093 2023/04/15 23:57:03 executed programs: 45027 2023/04/15 23:57:08 executed programs: 45954 2023/04/15 23:57:13 executed programs: 46886 2023/04/15 23:57:18 executed programs: 47818 2023/04/15 23:57:23 executed programs: 48743 2023/04/15 23:57:28 executed programs: 49672 2023/04/15 23:57:33 executed programs: 50605 2023/04/15 23:57:38 executed programs: 51534 2023/04/15 23:57:43 executed programs: 52463 2023/04/15 23:57:48 executed programs: 53394 2023/04/15 23:57:53 executed programs: 54326 2023/04/15 23:57:58 executed programs: 55262 2023/04/15 23:58:03 executed programs: 56199 2023/04/15 23:58:08 executed programs: 57129 2023/04/15 23:58:13 executed programs: 58071 2023/04/15 23:58:18 executed programs: 59005 2023/04/15 23:58:23 executed programs: 59943