[ 39.595929][ T431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.603601][ T431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.614133][ T58] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.622608][ T473] device veth1_macvtap entered promiscuous mode [ 39.631123][ T58] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.641983][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.652821][ T28] audit: type=1400 audit(1679990997.070:138): avc: denied { mount } for pid=473 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 39.681702][ T479] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 39.681959][ T28] audit: type=1400 audit(1679990997.100:139): avc: denied { ioctl } for pid=478 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=82 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 39.725184][ T28] audit: type=1400 audit(1679990997.140:140): avc: denied { write } for pid=478 comm="syz-executor.0" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 403.909884][ T43] device bridge_slave_1 left promiscuous mode [ 403.915807][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.923637][ T43] device bridge_slave_0 left promiscuous mode [ 403.929617][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.937123][ T43] device veth1_macvtap left promiscuous mode [ 403.942978][ T43] device veth0_vlan left promiscuous mode Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. [ 497.333904][ T28] audit: type=1400 audit(1679991454.750:141): avc: denied { remove_name } for pid=165 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 497.357033][ T28] audit: type=1400 audit(1679991454.750:142): avc: denied { rename } for pid=165 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1