[    5.366605][  T161] udevd (161) used greatest stack depth: 23096 bytes left
[    7.052638][   T23] kauditd_printk_skb: 48 callbacks suppressed
[    7.052649][   T23] audit: type=1400 audit(1709980000.720:59): avc:  denied  { search } for  pid=243 comm="ssh-keygen" name="/" dev="tmpfs" ino=10125 scontext=system_u:system_r:ssh_keygen_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[    7.075959][   T23] audit: type=1400 audit(1709980000.750:60): avc:  denied  { use } for  pid=248 comm="sshd" path="/dev/null" dev="devtmpfs" ino=9132 scontext=system_u:system_r:sshd_t tcontext=system_u:system_r:kernel_t tclass=fd permissive=1
[   17.955516][   T23] audit: type=1400 audit(1709980011.620:61): avc:  denied  { transition } for  pid=304 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   17.962659][   T23] audit: type=1400 audit(1709980011.620:62): avc:  denied  { noatsecure } for  pid=304 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   17.968613][   T23] audit: type=1400 audit(1709980011.630:63): avc:  denied  { write } for  pid=304 comm="sh" path="pipe:[584]" dev="pipefs" ino=584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[   17.975007][   T23] audit: type=1400 audit(1709980011.630:64): avc:  denied  { rlimitinh } for  pid=304 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   17.991974][   T23] audit: type=1400 audit(1709980011.630:65): avc:  denied  { siginh } for  pid=304 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   66.268000][  T106] cfg80211: failed to load regulatory.db
Warning: Permanently added '10.128.0.44' (ED25519) to the list of known hosts.
2024/03/09 10:31:26 ignoring optional flag "sandboxArg"="0"
2024/03/09 10:31:26 parsed 1 programs
[  292.484055][   T23] audit: type=1400 audit(1709980286.150:66): avc:  denied  { getattr } for  pid=619 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  292.511603][   T23] audit: type=1400 audit(1709980286.150:67): avc:  denied  { read } for  pid=619 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  292.532498][   T23] audit: type=1400 audit(1709980286.150:68): avc:  denied  { open } for  pid=619 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  292.555652][   T23] audit: type=1400 audit(1709980286.160:69): avc:  denied  { read } for  pid=619 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  292.558535][  T624] cgroup1: Unknown subsys name 'net'
[  292.578350][   T23] audit: type=1400 audit(1709980286.160:70): avc:  denied  { open } for  pid=619 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  292.585668][  T624] cgroup1: Unknown subsys name 'net_prio'
[  292.606528][   T23] audit: type=1400 audit(1709980286.200:71): avc:  denied  { read } for  pid=144 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[  292.612690][  T624] cgroup1: Unknown subsys name 'devices'
[  292.633617][   T23] audit: type=1400 audit(1709980286.220:72): avc:  denied  { mounton } for  pid=624 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[  292.661466][   T23] audit: type=1400 audit(1709980286.220:73): avc:  denied  { mount } for  pid=624 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  292.683347][   T23] audit: type=1400 audit(1709980286.330:74): avc:  denied  { unmount } for  pid=624 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  292.790476][  T624] cgroup1: Unknown subsys name 'hugetlb'
[  292.796240][  T624] cgroup1: Unknown subsys name 'rlimit'
[  292.891402][   T23] audit: type=1400 audit(1709980286.560:75): avc:  denied  { mounton } for  pid=624 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[  292.921078][  T627] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
2024/03/09 10:31:26 executed programs: 0
[  292.962447][  T624] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[  293.035556][  T632] bridge0: port 1(bridge_slave_0) entered blocking state
[  293.042736][  T632] bridge0: port 1(bridge_slave_0) entered disabled state
[  293.050227][  T632] device bridge_slave_0 entered promiscuous mode
[  293.056898][  T632] bridge0: port 2(bridge_slave_1) entered blocking state
[  293.063956][  T632] bridge0: port 2(bridge_slave_1) entered disabled state
[  293.071379][  T632] device bridge_slave_1 entered promiscuous mode
[  293.122432][  T632] bridge0: port 2(bridge_slave_1) entered blocking state
[  293.129266][  T632] bridge0: port 2(bridge_slave_1) entered forwarding state
[  293.136357][  T632] bridge0: port 1(bridge_slave_0) entered blocking state
[  293.143169][  T632] bridge0: port 1(bridge_slave_0) entered forwarding state
[  293.167610][  T626] bridge0: port 1(bridge_slave_0) entered disabled state
[  293.174771][  T626] bridge0: port 2(bridge_slave_1) entered disabled state
[  293.182487][  T626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  293.189958][  T626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  293.208362][  T626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  293.216417][  T626] bridge0: port 1(bridge_slave_0) entered blocking state
[  293.223254][  T626] bridge0: port 1(bridge_slave_0) entered forwarding state
[  293.231348][  T626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  293.239467][  T626] bridge0: port 2(bridge_slave_1) entered blocking state
[  293.246280][  T626] bridge0: port 2(bridge_slave_1) entered forwarding state
[  293.253499][  T626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  293.261284][  T626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  293.277302][   T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  293.299221][  T106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  293.306964][  T106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  293.323569][   T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  293.332603][   T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
2024/03/09 10:31:48 SYZFATAL: executor 0 failed 11 times: bad call 1 index 32528/7