Warning: Permanently added '10.128.1.18' (ED25519) to the list of known hosts. 2026/02/06 07:32:17 ignoring optional flag "sandbox_arg"="0" 2026/02/06 07:32:17 ignoring optional flag "type"="gce" 2026/02/06 07:32:17 parsed 1 programs [ 39.648064][ T24] kauditd_printk_skb: 14 callbacks suppressed [ 39.648074][ T24] audit: type=1400 audit(1770363137.950:88): avc: denied { mounton } for pid=315 comm="syz-executor" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 39.648393][ T315] cgroup: Unknown subsys name 'net' [ 39.685078][ T315] cgroup: Unknown subsys name 'devices' [ 39.692057][ T315] cgroup: Unknown subsys name 'hugetlb' 2026/02/06 07:32:18 executed programs: 0 [ 39.698077][ T315] cgroup: Unknown subsys name 'rlimit' [ 39.740938][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.748487][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.756740][ T321] device bridge_slave_0 entered promiscuous mode [ 39.764498][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.773198][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.782103][ T321] device bridge_slave_1 entered promiscuous mode [ 39.813639][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.821658][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.829505][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.837202][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.853533][ T192] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.861502][ T192] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.870727][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.879783][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.891523][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.900259][ T192] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.908086][ T192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.917692][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.926366][ T192] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.933878][ T192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.945796][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.955721][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.969814][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.981584][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.990397][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.998703][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.007349][ T321] device veth0_vlan entered promiscuous mode [ 40.017428][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.027562][ T321] device veth1_macvtap entered promiscuous mode [ 40.037368][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.048811][ T192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.070744][ T24] audit: type=1400 audit(1770363138.370:89): avc: denied { read } for pid=325 comm="syz-executor.0" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 40.071259][ T326] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 40.096793][ T24] audit: type=1400 audit(1770363138.370:90): avc: denied { open } for pid=325 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 40.137711][ T24] audit: type=1400 audit(1770363138.370:91): avc: denied { ioctl } for pid=325 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=82 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 2026/02/06 07:32:23 executed programs: 187 2026/02/06 07:32:28 executed programs: 372 2026/02/06 07:32:33 executed programs: 585 2026/02/06 07:32:38 executed programs: 792 2026/02/06 07:32:43 executed programs: 1021 2026/02/06 07:32:48 executed programs: 1247 2026/02/06 07:32:53 executed programs: 1487 2026/02/06 07:32:58 executed programs: 1739 2026/02/06 07:33:03 executed programs: 1945 2026/02/06 07:33:08 executed programs: 2173 2026/02/06 07:33:13 executed programs: 2379 2026/02/06 07:33:18 executed programs: 2595 2026/02/06 07:33:23 executed programs: 2820 2026/02/06 07:33:28 executed programs: 3035 2026/02/06 07:33:33 executed programs: 3258 2026/02/06 07:33:38 executed programs: 3477 2026/02/06 07:33:43 executed programs: 3715 2026/02/06 07:33:48 executed programs: 3953 2026/02/06 07:33:53 executed programs: 4192 2026/02/06 07:33:58 executed programs: 4440 2026/02/06 07:34:03 executed programs: 4669 2026/02/06 07:34:08 executed programs: 4900 2026/02/06 07:34:13 executed programs: 5114 2026/02/06 07:34:18 executed programs: 5336 2026/02/06 07:34:23 executed programs: 5544 2026/02/06 07:34:28 executed programs: 5767 2026/02/06 07:34:33 executed programs: 6013 2026/02/06 07:34:38 executed programs: 6231 2026/02/06 07:34:43 executed programs: 6456 2026/02/06 07:34:49 executed programs: 6676 2026/02/06 07:34:54 executed programs: 6901 2026/02/06 07:34:59 executed programs: 7117 2026/02/06 07:35:04 executed programs: 7342 2026/02/06 07:35:09 executed programs: 7581 2026/02/06 07:35:14 executed programs: 7825 2026/02/06 07:35:19 executed programs: 8059 2026/02/06 07:35:24 executed programs: 8277 2026/02/06 07:35:29 executed programs: 8498 2026/02/06 07:35:34 executed programs: 8685 2026/02/06 07:35:39 executed programs: 8927 2026/02/06 07:35:44 executed programs: 9149 2026/02/06 07:35:49 executed programs: 9367 2026/02/06 07:35:54 executed programs: 9585 2026/02/06 07:35:59 executed programs: 9812 2026/02/06 07:36:04 executed programs: 10039 2026/02/06 07:36:09 executed programs: 10278 2026/02/06 07:36:14 executed programs: 10512 2026/02/06 07:36:19 executed programs: 10737 2026/02/06 07:36:24 executed programs: 10943 2026/02/06 07:36:29 executed programs: 11214 2026/02/06 07:36:34 executed programs: 11446 2026/02/06 07:36:39 executed programs: 11648 2026/02/06 07:36:44 executed programs: 11879 2026/02/06 07:36:49 executed programs: 12083 2026/02/06 07:36:54 executed programs: 12317 2026/02/06 07:36:59 executed programs: 12533 2026/02/06 07:37:04 executed programs: 12749 2026/02/06 07:37:09 executed programs: 12965 2026/02/06 07:37:14 executed programs: 13211 2026/02/06 07:37:19 executed programs: 13459 2026/02/06 07:37:24 executed programs: 13670 2026/02/06 07:37:30 executed programs: 13878 2026/02/06 07:37:35 executed programs: 14105 2026/02/06 07:37:40 executed programs: 14328 2026/02/06 07:37:45 executed programs: 14559 2026/02/06 07:37:50 executed programs: 14809 2026/02/06 07:37:55 executed programs: 15063 2026/02/06 07:38:00 executed programs: 15290 2026/02/06 07:38:05 executed programs: 15512 2026/02/06 07:38:10 executed programs: 15728