[ 45.647525][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.656330][ T352] device veth1_macvtap entered promiscuous mode [ 45.668294][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.676751][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.696276][ T30] audit: type=1400 audit(1725086445.790:96): avc: denied { prog_load } for pid=357 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 45.715836][ T30] audit: type=1400 audit(1725086445.790:97): avc: denied { bpf } for pid=357 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 45.737102][ T30] audit: type=1400 audit(1725086445.790:98): avc: denied { perfmon } for pid=357 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 45.758120][ T30] audit: type=1400 audit(1725086445.790:99): avc: denied { confidentiality } for pid=357 comm="syz-executor.0" lockdown_reason="use of bpf to read kernel RAM" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 45.783882][ T30] audit: type=1400 audit(1725086445.810:100): avc: denied { prog_run } for pid=357 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 46.239454][ T30] audit: type=1400 audit(1725086446.330:101): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 407.070707][ T45] device bridge_slave_1 left promiscuous mode [ 407.076867][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.084341][ T45] device bridge_slave_0 left promiscuous mode [ 407.090414][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.098395][ T45] device veth1_macvtap left promiscuous mode [ 407.104279][ T45] device veth0_vlan left promiscuous mode Warning: Permanently added '10.128.0.96' (ED25519) to the list of known hosts. [ 483.884461][ T30] audit: type=1400 audit(1725086883.980:102): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 483.907040][ T30] audit: type=1400 audit(1725086883.980:103): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1