[ 40.504574][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.512301][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.522738][ T373] veth1_macvtap: entered promiscuous mode [ 40.528707][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.539173][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.547467][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.558956][ T28] audit: type=1400 audit(1679987361.240:138): avc: denied { mount } for pid=373 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 40.587065][ T28] audit: type=1400 audit(1679987361.270:139): avc: denied { ioctl } for pid=378 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=83 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 40.591393][ T379] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 40.635028][ T28] audit: type=1400 audit(1679987361.310:140): avc: denied { write } for pid=378 comm="syz-executor.0" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 404.515827][ T382] bridge_slave_1: left allmulticast mode [ 404.521273][ T382] bridge_slave_1: left promiscuous mode [ 404.526827][ T382] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.534038][ T382] bridge_slave_0: left allmulticast mode [ 404.539484][ T382] bridge_slave_0: left promiscuous mode [ 404.544877][ T382] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.552273][ T382] veth1_macvtap: left promiscuous mode [ 404.557565][ T382] veth0_vlan: left promiscuous mode Warning: Permanently added '10.128.1.28' (ECDSA) to the list of known hosts. [ 495.959972][ T28] audit: type=1400 audit(1679987816.640:141): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 495.982122][ T28] audit: type=1400 audit(1679987816.640:142): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1