last executing test programs: 9m51.41423903s ago: executing program 0 (id=3382): r0 = socket$netlink(0x10, 0x3, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'r\x00'}, 0x8) 9m44.304258246s ago: executing program 0 (id=3385): r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1, 0x20001) pwrite64(r0, 0x0, 0x0, 0x0) 9m36.685142537s ago: executing program 0 (id=3387): r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KDGKBLED(r0, 0x5450, 0x0) 9m29.002918753s ago: executing program 0 (id=3390): r0 = creat(&(0x7f0000001100)='./file0\x00', 0x0) ioctl$RNDGETENTCNT(r0, 0x5452, &(0x7f0000000680)) 9m27.945797306s ago: executing program 1 (id=3391): r0 = openat$sw_sync_info(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 9m23.054300037s ago: executing program 1 (id=3392): r0 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) write$sysctl(r0, &(0x7f0000002680)='3\x00', 0x2) 9m21.282298673s ago: executing program 0 (id=3393): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000580), 0x800, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) 9m16.793971528s ago: executing program 1 (id=3394): pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x80000) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, 0x0) 8m52.425455123s ago: executing program 1 (id=3395): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x44801) 8m49.924936233s ago: executing program 0 (id=3396): r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000bc0), 0x2, 0x0) writev(r0, 0x0, 0x0) 8m20.493485454s ago: executing program 1 (id=3397): r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x2401) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x80, 0x8, 0x1d, 0x8, 0x0, 0x9, 0x0}) 8m2.994456854s ago: executing program 32 (id=3396): r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000bc0), 0x2, 0x0) writev(r0, 0x0, 0x0) 7m37.903134834s ago: executing program 1 (id=3399): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000004380), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 6m52.073772698s ago: executing program 33 (id=3399): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000004380), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 52.528584455s ago: executing program 2 (id=3403): r0 = syz_open_dev$midi(&(0x7f0000000040), 0x2, 0xb83) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000001c0)) 44.397181881s ago: executing program 2 (id=3404): r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x5452, &(0x7f0000000140)) 35.806911727s ago: executing program 2 (id=3405): r0 = syz_open_dev$admmidi(&(0x7f0000000080), 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, 0x0) 26.865245974s ago: executing program 2 (id=3406): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) vmsplice(r0, 0x0, 0x46, 0x0) 17.959886898s ago: executing program 2 (id=3407): r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$tcp_mem(r0, &(0x7f00000002c0)={0x5, 0x20, 0x80, 0x20, 0x7}, 0x48) 7.367638301s ago: executing program 2 (id=3408): r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5451, 0x0) 0s ago: executing program 3 (id=3400): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x1ff) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:46540' (ED25519) to the list of known hosts. [ 274.917275][ T29] audit: type=1400 audit(274.240:84): avc: denied { name_bind } for pid=3336 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 275.602285][ T29] audit: type=1400 audit(274.920:85): avc: denied { execute } for pid=3337 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 275.610927][ T29] audit: type=1400 audit(274.930:86): avc: denied { execute_no_trans } for pid=3337 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 284.718905][ T29] audit: type=1400 audit(284.040:87): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 284.775663][ T29] audit: type=1400 audit(284.090:88): avc: denied { mount } for pid=3337 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 284.829677][ T3337] cgroup: Unknown subsys name 'net' [ 284.892077][ T29] audit: type=1400 audit(284.210:89): avc: denied { unmount } for pid=3337 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 285.306642][ T3337] cgroup: Unknown subsys name 'cpuset' [ 285.380514][ T3337] cgroup: Unknown subsys name 'rlimit' [ 285.840532][ T29] audit: type=1400 audit(285.160:90): avc: denied { setattr } for pid=3337 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 285.847674][ T29] audit: type=1400 audit(285.170:91): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 285.853230][ T29] audit: type=1400 audit(285.170:92): avc: denied { mount } for pid=3337 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 286.357399][ T3340] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 286.365575][ T29] audit: type=1400 audit(285.680:93): avc: denied { relabelto } for pid=3340 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 286.378433][ T29] audit: type=1400 audit(285.690:94): avc: denied { write } for pid=3340 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 286.475082][ T29] audit: type=1400 audit(285.790:95): avc: denied { read } for pid=3337 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 286.477881][ T29] audit: type=1400 audit(285.800:96): avc: denied { open } for pid=3337 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 286.507706][ T3337] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 301.665925][ T29] audit: type=1400 audit(300.990:97): avc: denied { execmem } for pid=3341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 301.775078][ T29] audit: type=1400 audit(301.090:98): avc: denied { read } for pid=3343 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 301.776245][ T29] audit: type=1400 audit(301.100:99): avc: denied { open } for pid=3343 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 301.789784][ T29] audit: type=1400 audit(301.110:100): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 301.870895][ T29] audit: type=1400 audit(301.190:101): avc: denied { module_request } for pid=3343 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 302.170595][ T29] audit: type=1400 audit(301.490:102): avc: denied { sys_module } for pid=3343 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 309.849177][ T3343] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.031368][ T3343] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.366020][ T3344] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.391498][ T3344] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.735978][ T3343] hsr_slave_0: entered promiscuous mode [ 313.757829][ T3343] hsr_slave_1: entered promiscuous mode [ 314.448562][ T3344] hsr_slave_0: entered promiscuous mode [ 314.457855][ T3344] hsr_slave_1: entered promiscuous mode [ 314.466073][ T3344] debugfs: 'hsr0' already exists in 'hsr' [ 314.468164][ T3344] Cannot create hsr debugfs directory [ 317.536652][ T29] audit: type=1400 audit(316.860:103): avc: denied { create } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 317.555783][ T29] audit: type=1400 audit(316.870:104): avc: denied { write } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 317.556955][ T29] audit: type=1400 audit(316.870:105): avc: denied { read } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 317.589026][ T3343] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 317.725639][ T3343] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 317.768639][ T3343] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 317.846423][ T3343] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 317.881991][ T3343] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 317.949617][ T3343] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 318.064678][ T3343] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 318.088963][ T3343] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 318.581084][ T3344] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 318.654403][ T3344] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 318.706403][ T3344] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 318.741038][ T3344] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 318.760124][ T3344] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 318.811058][ T3344] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 318.868791][ T3344] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 318.926048][ T3344] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 323.065256][ T3343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.436307][ T3344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.338438][ T3344] veth0_vlan: entered promiscuous mode [ 337.463663][ T3344] veth1_vlan: entered promiscuous mode [ 337.955407][ T3343] veth0_vlan: entered promiscuous mode [ 338.166193][ T3344] veth0_macvtap: entered promiscuous mode [ 338.271650][ T3343] veth1_vlan: entered promiscuous mode [ 338.328650][ T3344] veth1_macvtap: entered promiscuous mode [ 339.250075][ T26] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.274367][ T26] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.310597][ T3343] veth0_macvtap: entered promiscuous mode [ 339.359053][ T26] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.450011][ T26] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.498646][ T3343] veth1_macvtap: entered promiscuous mode [ 340.289987][ T29] audit: type=1400 audit(339.610:106): avc: denied { mounton } for pid=3344 comm="syz-executor" path="/syzkaller.Iw2tMt/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 340.307939][ T29] audit: type=1400 audit(339.630:107): avc: denied { mount } for pid=3344 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 340.341787][ T29] audit: type=1400 audit(339.660:108): avc: denied { mounton } for pid=3344 comm="syz-executor" path="/syzkaller.Iw2tMt/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 340.383492][ T29] audit: type=1400 audit(339.700:109): avc: denied { mount } for pid=3344 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 340.467627][ T29] audit: type=1400 audit(339.790:110): avc: denied { mounton } for pid=3344 comm="syz-executor" path="/syzkaller.Iw2tMt/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 340.489861][ T29] audit: type=1400 audit(339.810:111): avc: denied { mounton } for pid=3344 comm="syz-executor" path="/syzkaller.Iw2tMt/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 340.565434][ T29] audit: type=1400 audit(339.880:112): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 340.644862][ T29] audit: type=1400 audit(339.960:113): avc: denied { mounton } for pid=3344 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 340.717912][ T29] audit: type=1400 audit(340.030:114): avc: denied { mount } for pid=3344 comm="syz-executor" name="/" dev="gadgetfs" ino=3723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 340.736231][ T1122] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.737526][ T1122] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.737883][ T1122] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.738213][ T1122] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.794959][ T29] audit: type=1400 audit(340.110:115): avc: denied { mount } for pid=3344 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 341.435517][ T3344] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 348.803144][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 348.803917][ T29] audit: type=1400 audit(348.110:121): avc: denied { create } for pid=3515 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 356.700875][ T29] audit: type=1400 audit(356.020:122): avc: denied { read } for pid=3550 comm="syz.1.30" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 356.748181][ T29] audit: type=1400 audit(356.070:123): avc: denied { open } for pid=3550 comm="syz.1.30" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 368.944968][ T29] audit: type=1400 audit(368.260:124): avc: denied { create } for pid=3595 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 384.794776][ T29] audit: type=1400 audit(384.110:125): avc: denied { read write } for pid=3652 comm="syz.1.81" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 384.795845][ T29] audit: type=1400 audit(384.110:126): avc: denied { open } for pid=3652 comm="syz.1.81" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 384.826988][ T29] audit: type=1400 audit(384.140:127): avc: denied { ioctl } for pid=3652 comm="syz.1.81" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 385.918395][ T29] audit: type=1400 audit(385.240:128): avc: denied { read write } for pid=3656 comm="syz.1.82" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 385.948043][ T29] audit: type=1400 audit(385.270:129): avc: denied { open } for pid=3656 comm="syz.1.82" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 396.749963][ T29] audit: type=1400 audit(396.070:130): avc: denied { audit_write } for pid=3692 comm="syz.0.100" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 406.670051][ T29] audit: type=1400 audit(405.990:131): avc: denied { bpf } for pid=3719 comm="syz.0.113" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 409.819676][ T29] audit: type=1400 audit(409.140:132): avc: denied { read write } for pid=3730 comm="syz.1.117" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 409.869078][ T29] audit: type=1400 audit(409.180:133): avc: denied { open } for pid=3730 comm="syz.1.117" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 417.202097][ T29] audit: type=1400 audit(416.520:134): avc: denied { remount } for pid=3759 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 435.237176][ T29] audit: type=1400 audit(434.560:135): avc: denied { map_create } for pid=3851 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 435.274179][ T29] audit: type=1400 audit(434.570:136): avc: denied { perfmon } for pid=3851 comm="syz.1.178" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 442.738653][ T29] audit: type=1400 audit(442.050:137): avc: denied { mounton } for pid=3887 comm="syz.1.196" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 451.088785][ T29] audit: type=1400 audit(450.410:138): avc: denied { allowed } for pid=3921 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 451.199635][ T29] audit: type=1400 audit(450.520:139): avc: denied { sqpoll } for pid=3921 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 474.341578][ T29] audit: type=1400 audit(473.660:140): avc: denied { write } for pid=3998 comm="syz.0.249" name="card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 478.314493][ T29] audit: type=1400 audit(477.620:141): avc: denied { write } for pid=4005 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 481.584691][ T29] audit: type=1400 audit(480.890:142): avc: denied { write } for pid=4013 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 487.051654][ T29] audit: type=1400 audit(486.370:143): avc: denied { prog_load } for pid=4026 comm="syz.1.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 487.530704][ T29] audit: type=1400 audit(486.850:144): avc: denied { prog_run } for pid=4026 comm="syz.1.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 487.648235][ T29] audit: type=1400 audit(486.970:145): avc: denied { read write } for pid=3344 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 487.649230][ T29] audit: type=1400 audit(486.970:146): avc: denied { open } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 487.663898][ T29] audit: type=1400 audit(486.980:147): avc: denied { ioctl } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 499.208774][ T29] audit: type=1400 audit(498.530:148): avc: denied { mount } for pid=4058 comm="syz.1.277" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 499.459350][ T29] audit: type=1400 audit(498.780:149): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 506.758225][ T29] audit: type=1400 audit(506.080:150): avc: denied { read } for pid=4078 comm="syz.0.286" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 506.783608][ T29] audit: type=1400 audit(506.100:151): avc: denied { open } for pid=4078 comm="syz.0.286" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 512.676329][ T4093] syz.0.293 uses obsolete (PF_INET,SOCK_PACKET) [ 512.684891][ T29] audit: type=1400 audit(512.000:152): avc: denied { create } for pid=4092 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 543.728460][ T29] audit: type=1400 audit(543.050:153): avc: denied { create } for pid=4162 comm="syz.0.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 563.540113][ T29] audit: type=1400 audit(562.860:154): avc: denied { create } for pid=4211 comm="syz.0.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 573.508921][ T29] audit: type=1400 audit(572.830:155): avc: denied { read append } for pid=4234 comm="syz.1.361" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 573.524398][ T29] audit: type=1400 audit(572.840:156): avc: denied { open } for pid=4234 comm="syz.1.361" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 583.159370][ T29] audit: type=1400 audit(582.470:157): avc: denied { kexec_image_load } for pid=4261 comm="syz.1.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 597.601093][ T29] audit: type=1400 audit(596.920:158): avc: denied { mount } for pid=4304 comm="syz.1.396" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 598.145468][ T29] audit: type=1400 audit(597.440:159): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 645.595118][ T29] audit: type=1400 audit(644.880:160): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 651.991822][ T4428] random: crng reseeded on system resumption [ 651.992124][ T29] audit: type=1400 audit(651.310:161): avc: denied { write } for pid=4426 comm="syz.1.456" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 652.004366][ T29] audit: type=1400 audit(651.310:162): avc: denied { open } for pid=4426 comm="syz.1.456" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 727.284868][ T29] audit: type=1400 audit(726.600:163): avc: denied { write } for pid=4596 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 727.327152][ T29] audit: type=1400 audit(726.630:164): avc: denied { create } for pid=4596 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 727.328088][ T29] audit: type=1400 audit(726.630:165): avc: denied { write open } for pid=4596 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2582 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 727.354081][ T29] audit: type=1400 audit(726.660:166): avc: denied { append } for pid=4596 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2582 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 727.372244][ T29] audit: type=1400 audit(726.690:167): avc: denied { getattr } for pid=4596 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 728.412346][ T29] audit: type=1400 audit(727.730:168): avc: denied { read } for pid=4599 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 729.273769][ T29] audit: type=1400 audit(728.590:169): avc: denied { write } for pid=4602 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 729.303425][ T29] audit: type=1400 audit(728.620:170): avc: denied { unlink } for pid=4602 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2582 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 741.753492][ T29] audit: type=1400 audit(741.070:171): avc: denied { write } for pid=4628 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 752.224811][ T29] audit: type=1400 audit(751.540:172): avc: denied { create } for pid=4649 comm="syz.1.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 770.141011][ T29] audit: type=1400 audit(769.460:173): avc: denied { mount } for pid=4679 comm="syz.0.574" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 770.618397][ T29] audit: type=1400 audit(769.940:174): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 791.888117][ T29] audit: type=1400 audit(791.210:175): avc: denied { append } for pid=4717 comm="syz.0.593" name="renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 801.383901][ T29] audit: type=1400 audit(800.700:176): avc: denied { mounton } for pid=4735 comm="syz.1.602" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 838.578870][ T29] audit: type=1400 audit(837.900:177): avc: denied { create } for pid=4805 comm="syz.0.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 865.322292][ T4851] ======================================================= [ 865.322292][ T4851] WARNING: The mand mount option has been deprecated and [ 865.322292][ T4851] and is ignored by this kernel. Remove the mand [ 865.322292][ T4851] option from the mount to silence this warning. [ 865.322292][ T4851] ======================================================= [ 890.421676][ T4897] Injecting memory failure for pfn 0x49519 at process virtual address 0x20001000 [ 891.211209][ T4897] Memory failure: 0x49519: unhandlable page. [ 891.304763][ T4897] Memory failure: 0x49519: recovery action for get hwpoison page: Ignored [ 903.604385][ T29] audit: type=1400 audit(902.930:178): avc: denied { read write } for pid=4919 comm="syz.0.691" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 903.630048][ T29] audit: type=1400 audit(902.930:179): avc: denied { open } for pid=4919 comm="syz.0.691" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 925.363934][ T29] audit: type=1400 audit(924.680:180): avc: denied { write } for pid=4958 comm="syz.0.711" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 964.993930][ T29] audit: type=1400 audit(964.310:181): avc: denied { create } for pid=5044 comm="syz.0.753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 979.829136][ T29] audit: type=1400 audit(979.150:182): avc: denied { append } for pid=5077 comm="syz.0.769" name="ubi_ctrl" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 988.610169][ T29] audit: type=1326 audit(987.930:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5098 comm="syz.0.779" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x1283d8 code=0x0 [ 1028.445164][ T29] audit: type=1400 audit(1027.750:184): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1035.289963][ T29] audit: type=1400 audit(1034.600:185): avc: denied { mounton } for pid=5191 comm="syz.1.825" path="/syzcgroup/unified/syz1/cgroup.procs" dev="cgroup2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 1064.845625][ T5263] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1064.917408][ T5263] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1087.936811][ T5325] SELinux: Context system_u:object_r:etc_aliases_t:s0 is not valid (left unmapped). [ 1087.973729][ T29] audit: type=1400 audit(1087.290:186): avc: denied { relabelto } for pid=5323 comm="syz.1.891" name="cgroup.procs" dev="cgroup" ino=80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:etc_aliases_t:s0" [ 1088.008247][ T29] audit: type=1400 audit(1087.300:187): avc: denied { associate } for pid=5323 comm="syz.1.891" name="cgroup.procs" dev="cgroup" ino=80 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:etc_aliases_t:s0" [ 1100.424621][ T29] audit: type=1400 audit(1099.600:188): avc: denied { write } for pid=5353 comm="syz.1.903" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1123.256590][ T29] audit: type=1400 audit(1122.580:189): avc: denied { open } for pid=5398 comm="syz.1.924" path="/dev/ttyq7" dev="devtmpfs" ino=375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1254.467927][ T5607] Soft offlining pfn 0x49519 at process virtual address 0x20ffd000 [ 1254.468691][ T5607] Soft offline: 0x49519: page already poisoned [ 1285.404829][ T5643] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1285.536655][ T5643] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1292.207871][ T29] audit: type=1400 audit(1291.530:190): avc: denied { write } for pid=5650 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1294.239578][ T29] audit: type=1400 audit(1293.560:191): avc: denied { write } for pid=5654 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1456.256429][ T29] audit: type=1400 audit(1455.580:192): avc: denied { write } for pid=5845 comm="syz.1.1130" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1501.853641][ T5904] syz.1.1158(5904): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 1514.190082][ T29] audit: type=1400 audit(1513.510:193): avc: denied { append } for pid=5918 comm="syz.0.1165" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1527.710620][ T29] audit: type=1400 audit(1527.030:194): avc: denied { write } for pid=5935 comm="syz.1.1173" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1559.009159][ T29] audit: type=1400 audit(1558.240:195): avc: denied { associate } for pid=5971 comm="syz.0.1188" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1566.875258][ T29] audit: type=1400 audit(1566.190:196): avc: denied { write } for pid=5979 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1569.025673][ T29] audit: type=1400 audit(1568.340:197): avc: denied { write } for pid=5984 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1618.373579][ T29] audit: type=1400 audit(1617.680:198): avc: denied { write } for pid=6038 comm="syz.0.1216" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1663.455238][ T29] audit: type=1400 audit(1662.770:199): avc: denied { mounton } for pid=6081 comm="syz.1.1237" path="/syzcgroup/unified/syz1" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 [ 1774.147976][ T6193] capability: warning: `syz.1.1288' uses 32-bit capabilities (legacy support in use) [ 1776.138655][ T29] audit: type=1400 audit(1775.460:200): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1927.430041][ T29] audit: type=1400 audit(1926.740:201): avc: denied { create } for pid=6332 comm="syz.0.1346" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1927.927736][ T29] audit: type=1400 audit(1927.010:202): avc: denied { map } for pid=6332 comm="syz.0.1346" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11929 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1928.076716][ T29] audit: type=1400 audit(1927.400:203): avc: denied { read write } for pid=6332 comm="syz.0.1346" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11929 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2085.437386][ T29] audit: type=1400 audit(2084.760:204): avc: denied { write } for pid=6476 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2085.928051][ T6480] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6480 comm=syz.1.1408 [ 2087.208021][ T29] audit: type=1400 audit(2086.530:205): avc: denied { write } for pid=6481 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2089.815540][ T6485] Zero length message leads to an empty skb [ 2130.761581][ T29] audit: type=1400 audit(2130.010:206): avc: denied { ioctl } for pid=6520 comm="syz.1.1424" path="/dev/dri/renderD128" dev="devtmpfs" ino=617 ioctlcmd=0x64bf scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2134.673222][ T29] audit: type=1400 audit(2133.990:207): avc: denied { create } for pid=6523 comm="syz.1.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2135.135940][ T29] audit: type=1400 audit(2134.450:208): avc: denied { read } for pid=6523 comm="syz.1.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2219.467320][ T29] audit: type=1400 audit(2218.790:209): avc: denied { read write } for pid=6590 comm="syz.1.1455" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2219.487492][ T29] audit: type=1400 audit(2218.810:210): avc: denied { open } for pid=6590 comm="syz.1.1455" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2270.357429][ T29] audit: type=1400 audit(2269.680:211): avc: denied { setopt } for pid=6637 comm="syz.1.1473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2293.938964][ T29] audit: type=1400 audit(2293.260:212): avc: denied { create } for pid=6658 comm="syz.0.1482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2294.477078][ T29] audit: type=1400 audit(2293.800:213): avc: denied { getopt } for pid=6658 comm="syz.0.1482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2331.427981][ T6692] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=6692 comm=syz.0.1495 [ 2353.446327][ T29] audit: type=1400 audit(2352.770:214): avc: denied { lock } for pid=6710 comm="syz.0.1503" path="socket:[13244]" dev="sockfs" ino=13244 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 2360.781522][ T29] audit: type=1400 audit(2360.100:215): avc: denied { ioctl } for pid=6716 comm="syz.0.1506" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2367.928415][ T29] audit: type=1400 audit(2367.250:216): avc: denied { nlmsg_read } for pid=6722 comm="syz.0.1508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2374.217099][ T6728] SELinux: syz.1.1512 (6728) wrote to checkreqprot. This is no longer supported. [ 2384.017037][ T6735] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6735 comm=syz.0.1514 [ 2479.966572][ T6827] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=6827 comm=syz.1.1556 [ 2481.025440][ T29] audit: type=1400 audit(2480.350:217): avc: denied { setopt } for pid=6825 comm="syz.0.1555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2556.015748][ T29] audit: type=1400 audit(2555.340:218): avc: denied { create } for pid=6897 comm="syz.0.1588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2556.100416][ T29] audit: type=1400 audit(2555.420:219): avc: denied { write } for pid=6897 comm="syz.0.1588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2585.408657][ T29] audit: type=1400 audit(2584.730:220): avc: denied { create } for pid=6922 comm="syz.0.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2585.706650][ T29] audit: type=1400 audit(2585.030:221): avc: denied { write } for pid=6922 comm="syz.0.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2603.870462][ T29] audit: type=1400 audit(2603.190:222): avc: denied { write } for pid=6941 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2605.569837][ T29] audit: type=1400 audit(2604.890:223): avc: denied { write } for pid=6945 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2626.124272][ T29] audit: type=1400 audit(2625.440:224): avc: denied { write } for pid=6965 comm="syz.0.1615" name="xfrm_stat" dev="proc" ino=4026532685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2745.217769][ T29] audit: type=1400 audit(2744.540:225): avc: denied { setopt } for pid=7070 comm="syz.0.1660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2769.606434][ T29] audit: type=1400 audit(2768.930:226): avc: denied { write } for pid=7092 comm="syz.1.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2806.614507][ T29] audit: type=1400 audit(2805.930:227): avc: denied { setopt } for pid=7121 comm="syz.0.1682" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2867.346370][ T29] audit: type=1400 audit(2866.530:228): avc: denied { setopt } for pid=7174 comm="syz.0.1705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2966.229038][ T29] audit: type=1400 audit(2965.550:229): avc: denied { write } for pid=7260 comm="syz.1.1739" lport=248 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2980.660367][ T29] audit: type=1400 audit(2979.980:230): avc: granted { setsecparam } for pid=7273 comm="syz.0.1744" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3006.649872][ T29] audit: type=1400 audit(3005.970:231): avc: denied { create } for pid=7299 comm="syz.1.1755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3006.894126][ T29] audit: type=1400 audit(3006.210:232): avc: denied { read } for pid=7299 comm="syz.1.1755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3181.204804][ T29] audit: type=1400 audit(3180.520:233): avc: denied { write } for pid=7458 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3183.393893][ T29] audit: type=1400 audit(3182.700:234): avc: denied { write } for pid=7464 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3196.825638][ T29] audit: type=1400 audit(3196.150:235): avc: granted { setsecparam } for pid=7475 comm="syz.1.1828" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3362.294728][ T29] audit: type=1400 audit(3361.590:236): avc: denied { read write } for pid=7619 comm="syz.0.1893" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3362.327993][ T29] audit: type=1400 audit(3361.650:237): avc: denied { open } for pid=7619 comm="syz.0.1893" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3362.600879][ T29] audit: type=1400 audit(3361.920:238): avc: denied { ioctl } for pid=7619 comm="syz.0.1893" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4521 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3571.436953][ T7798] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7798 comm=syz.0.1965 [ 3580.597682][ T7805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7805 comm=syz.0.1968 [ 3583.874842][ T7808] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pid=7808 comm=syz.1.1970 [ 3709.474707][ T29] audit: type=1400 audit(3708.790:239): avc: denied { write } for pid=7907 comm="syz.1.2011" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3709.475882][ T29] audit: type=1400 audit(3708.790:240): avc: denied { open } for pid=7907 comm="syz.1.2011" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3718.584907][ T29] audit: type=1400 audit(3717.890:241): avc: denied { create } for pid=7915 comm="syz.1.2015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3746.939197][ T29] audit: type=1400 audit(3746.260:242): avc: denied { read write } for pid=7937 comm="syz.0.2022" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3747.146903][ T29] audit: type=1400 audit(3746.470:243): avc: denied { open } for pid=7937 comm="syz.0.2022" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3747.644475][ T29] audit: type=1400 audit(3746.960:244): avc: denied { ioctl } for pid=7937 comm="syz.0.2022" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3775.450908][ T29] audit: type=1400 audit(3774.770:245): avc: denied { write } for pid=7966 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.334384][ T29] audit: type=1400 audit(3776.640:246): avc: denied { write } for pid=7971 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3912.274130][ T8090] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8090 comm=syz.1.2084 [ 3984.206227][ T29] audit: type=1400 audit(3983.510:247): avc: denied { write } for pid=8149 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3986.210234][ T29] audit: type=1400 audit(3985.530:248): avc: denied { write } for pid=8154 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4194.896383][ T29] audit: type=1400 audit(4194.220:249): avc: denied { write } for pid=8334 comm="syz.0.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4292.845502][ T8436] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=8436 comm=syz.0.2232 [ 4312.257822][ T29] audit: type=1400 audit(4311.580:250): avc: denied { create } for pid=8452 comm="syz.1.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4312.565134][ T29] audit: type=1400 audit(4311.880:251): avc: denied { getopt } for pid=8452 comm="syz.1.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4369.866965][ T29] audit: type=1400 audit(4369.190:252): avc: denied { execute } for pid=8498 comm="syz.0.2261" path="/proc/locks" dev="proc" ino=4026531996 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=file permissive=1 [ 4411.587600][ T29] audit: type=1400 audit(4410.910:253): avc: denied { accept } for pid=8534 comm="syz.1.2278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 4453.614560][ T8575] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8575 comm=syz.1.2295 [ 4482.634096][ T29] audit: type=1400 audit(4481.950:254): avc: granted { setsecparam } for pid=8599 comm="syz.1.2306" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 4532.584364][ T8643] capability: warning: `syz.0.2323' uses deprecated v2 capabilities in a way that may be insecure [ 4559.758391][ T29] audit: type=1400 audit(4559.080:255): avc: denied { setattr } for pid=8667 comm="syz.1.2335" path="/dev/sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 4581.523866][ T29] audit: type=1400 audit(4580.840:256): avc: denied { write } for pid=8688 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4583.297988][ T29] audit: type=1400 audit(4582.620:257): avc: denied { write } for pid=8691 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4635.757977][ T8742] could not allocate digest TFM handle sha1-ssse3 [ 4681.760513][ T29] audit: type=1400 audit(4681.080:258): avc: denied { read write } for pid=8785 comm="syz.1.2384" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4681.884259][ T29] audit: type=1400 audit(4681.100:259): avc: denied { open } for pid=8785 comm="syz.1.2384" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4682.047434][ T29] audit: type=1400 audit(4681.370:260): avc: denied { ioctl } for pid=8785 comm="syz.1.2384" path="/dev/nullb0" dev="devtmpfs" ino=672 ioctlcmd=0x127c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4783.272039][ T29] audit: type=1400 audit(4782.590:261): avc: denied { write } for pid=8873 comm="syz.1.2422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4807.036349][ T8894] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8894 comm=syz.1.2431 [ 4879.876124][ T8962] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8962 comm=syz.0.2460 [ 4888.974317][ T29] audit: type=1400 audit(4888.180:262): avc: denied { ioctl } for pid=8969 comm="syz.1.2465" path="socket:[21082]" dev="sockfs" ino=21082 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4889.115068][ T8970] veth1_macvtap: left promiscuous mode [ 4889.135601][ T8970] macsec0: entered promiscuous mode [ 4898.338317][ T29] audit: type=1400 audit(4897.660:263): avc: denied { nlmsg_write } for pid=8977 comm="syz.1.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4909.571164][ T29] audit: type=1400 audit(4908.890:264): avc: denied { write } for pid=8989 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4911.894949][ T29] audit: type=1400 audit(4911.210:265): avc: denied { write } for pid=8994 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5059.779633][ T29] audit: type=1400 audit(5059.100:266): avc: denied { create } for pid=9128 comm="syz.1.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 5130.318060][ T29] audit: type=1400 audit(5129.640:267): avc: denied { ioctl } for pid=9189 comm="syz.0.2557" path="socket:[21405]" dev="sockfs" ino=21405 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5283.307833][ T29] audit: type=1400 audit(5282.630:268): avc: denied { create } for pid=9324 comm="syz.1.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5283.517696][ T29] audit: type=1400 audit(5282.840:269): avc: denied { write } for pid=9324 comm="syz.1.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5283.538057][ T29] audit: type=1400 audit(5282.860:270): avc: denied { nlmsg_write } for pid=9324 comm="syz.1.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5365.069819][ T29] audit: type=1400 audit(5364.390:271): avc: denied { write } for pid=9398 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5366.395097][ T29] audit: type=1400 audit(5365.700:272): avc: denied { write } for pid=9404 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5370.024217][ T29] audit: type=1400 audit(5369.340:273): avc: denied { ioctl } for pid=9406 comm="syz.1.2649" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x582a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5386.166720][ T9421] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5386.259135][ T9421] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5689.020223][ T9695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9695 comm=syz.1.2773 [ 5794.720857][ T9776] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 5845.296432][ T29] audit: type=1400 audit(5844.610:274): avc: denied { checkpoint_restore } for pid=9810 comm="syz.1.2821" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5936.175788][ T29] audit: type=1400 audit(5935.500:275): avc: denied { write } for pid=9869 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5938.150168][ T29] audit: type=1400 audit(5937.470:276): avc: denied { write } for pid=9873 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5974.568445][ T29] audit: type=1400 audit(5973.890:277): avc: denied { read } for pid=9896 comm="syz.0.2853" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5974.633563][ T29] audit: type=1400 audit(5973.950:278): avc: denied { open } for pid=9896 comm="syz.0.2853" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5975.187759][ T29] audit: type=1400 audit(5974.510:279): avc: denied { ioctl } for pid=9896 comm="syz.0.2853" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x6210 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6001.651250][ T29] audit: type=1400 audit(6000.970:280): avc: denied { create } for pid=9915 comm="syz.1.2861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6002.073960][ T29] audit: type=1400 audit(6001.390:281): avc: denied { write } for pid=9915 comm="syz.1.2861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6137.797900][ T29] audit: type=1400 audit(6137.120:282): avc: denied { audit_read } for pid=10007 comm="syz.0.2896" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6298.166085][ T29] audit: type=1400 audit(6297.480:283): avc: denied { write } for pid=10143 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6300.353710][ T29] audit: type=1400 audit(6299.660:284): avc: denied { write } for pid=10148 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6317.176578][T10163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10163 comm=syz.1.2957 [ 6321.068465][T10167] random: crng reseeded on system resumption [ 6335.108026][ T29] audit: type=1400 audit(6334.430:285): avc: denied { write } for pid=10178 comm="syz.0.2963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6349.072130][ T29] audit: type=1400 audit(6348.390:286): avc: denied { execute } for pid=10191 comm="syz.0.2969" name="file0" dev="tmpfs" ino=6185 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6394.746970][ T29] audit: type=1400 audit(6393.970:287): avc: denied { map_read map_write } for pid=10228 comm="syz.0.2986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6410.309460][ T29] audit: type=1400 audit(6409.630:288): avc: denied { accept } for pid=10244 comm="syz.1.2993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6414.994239][ T29] audit: type=1400 audit(6414.310:289): avc: denied { create } for pid=10249 comm="syz.1.2995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6530.638331][T10337] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=513 sclass=netlink_audit_socket pid=10337 comm=syz.1.3031 [ 6543.865930][T10346] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10346 comm=syz.0.3035 [ 6549.529926][T10352] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3038'. [ 6600.097421][ T29] audit: type=1400 audit(6599.420:290): avc: denied { create } for pid=10390 comm="syz.1.3053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 6616.255390][ T29] audit: type=1400 audit(6615.560:291): avc: denied { write } for pid=10404 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6618.438117][ T29] audit: type=1400 audit(6617.760:292): avc: denied { write } for pid=10409 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6631.565133][T10420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5138 sclass=netlink_route_socket pid=10420 comm=syz.0.3062 [ 6697.875002][T10473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10473 comm=syz.1.3085 [ 6770.049317][T10529] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10529 comm=syz.0.3106 [ 6833.273817][ T29] audit: type=1400 audit(6832.590:293): avc: denied { write } for pid=10576 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6835.494822][ T29] audit: type=1400 audit(6834.790:294): avc: denied { write } for pid=10580 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6884.116657][T10610] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10610 comm=syz.0.3136 [ 7238.029597][ T29] audit: type=1400 audit(7237.350:295): avc: denied { write } for pid=10864 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7240.110714][ T29] audit: type=1400 audit(7239.430:296): avc: denied { write } for pid=10870 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7309.605596][T10931] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=105 sclass=netlink_audit_socket pid=10931 comm=syz.1.3263 [ 7506.554435][ T29] audit: type=1400 audit(7505.870:297): avc: denied { write } for pid=11096 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7508.485123][ T29] audit: type=1400 audit(7507.780:298): avc: denied { write } for pid=11101 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7579.756771][ T29] audit: type=1400 audit(7579.080:299): avc: denied { setopt } for pid=11163 comm="syz.1.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7612.405941][ T29] audit: type=1400 audit(7611.730:300): avc: granted { setsecparam } for pid=11190 comm="syz.1.3373" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 7670.146676][ T29] audit: type=1400 audit(7669.470:301): avc: denied { read write } for pid=3344 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7670.657694][ T29] audit: type=1400 audit(7669.980:302): avc: denied { read write open } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7670.864277][ T29] audit: type=1400 audit(7670.180:303): avc: denied { ioctl } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7689.227427][ T29] audit: type=1400 audit(7688.550:304): avc: denied { read } for pid=11236 comm="syz.0.3393" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 7690.247666][ T29] audit: type=1400 audit(7689.570:305): avc: denied { read open } for pid=11236 comm="syz.0.3393" path="/dev/uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 7694.523998][ T29] audit: type=1400 audit(7693.830:306): avc: denied { read write } for pid=3344 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7695.073464][ T29] audit: type=1400 audit(7694.380:307): avc: denied { read write open } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7695.677913][ T29] audit: type=1400 audit(7695.000:308): avc: denied { ioctl } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7702.727530][ T29] audit: type=1400 audit(7702.050:309): avc: denied { read write } for pid=3343 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7703.550024][ T29] audit: type=1400 audit(7702.860:310): avc: denied { read write open } for pid=3343 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7704.907493][ T29] audit: type=1400 audit(7704.230:311): avc: denied { ioctl } for pid=3343 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7728.073362][ T29] audit: type=1400 audit(7727.390:312): avc: denied { read write } for pid=3344 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7728.470010][ T29] audit: type=1400 audit(7727.790:313): avc: denied { read write open } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7729.236546][ T29] audit: type=1400 audit(7728.550:314): avc: denied { ioctl } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7739.304059][ T29] audit: type=1400 audit(7738.620:315): avc: denied { execute } for pid=11248 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 7739.550350][ T29] audit: type=1400 audit(7738.870:316): avc: denied { execute_no_trans } for pid=11248 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 7739.920193][ T29] audit: type=1400 audit(7739.240:317): avc: denied { execute } for pid=11248 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 7740.554835][ T29] audit: type=1400 audit(7739.880:318): avc: denied { execmem } for pid=11248 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 7741.624771][ T29] audit: type=1400 audit(7740.930:319): avc: denied { read } for pid=11249 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7741.887762][ T29] audit: type=1400 audit(7741.210:320): avc: denied { read open } for pid=11249 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7741.957699][ T5928] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7742.448184][ T29] audit: type=1400 audit(7741.770:321): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 7742.559654][ T5928] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7742.980504][ T5928] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7743.311942][ T29] audit: type=1400 audit(7742.630:322): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7743.666630][ T5928] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7748.935679][ T29] audit: type=1400 audit(7748.260:323): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7749.163667][ T29] audit: type=1400 audit(7748.440:324): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7750.254136][ T29] audit: type=1400 audit(7749.560:325): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 7751.685541][ T5928] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 7751.911654][ T5928] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 7752.218839][ T5928] bond0 (unregistering): Released all slaves [ 7753.341857][ T5928] hsr_slave_0: left promiscuous mode [ 7753.420308][ T5928] hsr_slave_1: left promiscuous mode [ 7753.791609][ T5928] veth1_macvtap: left promiscuous mode [ 7753.794110][ T5928] veth0_macvtap: left promiscuous mode [ 7753.805119][ T5928] veth1_vlan: left promiscuous mode [ 7753.806760][ T5928] veth0_vlan: left promiscuous mode [ 7762.569810][ T29] audit: type=1400 audit(7761.890:326): avc: denied { append } for pid=11257 comm="syz.1.3397" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 7763.046679][ T29] audit: type=1400 audit(7762.310:327): avc: denied { append } for pid=11257 comm="syz.1.3397" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 7765.126352][ T29] audit: type=1400 audit(7764.420:328): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 7765.127406][ T29] audit: type=1400 audit(7764.450:329): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7766.059504][ T29] audit: type=1400 audit(7765.380:330): avc: denied { search } for pid=3187 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7766.073737][ T29] audit: type=1400 audit(7765.390:331): avc: denied { search } for pid=3187 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7766.153969][ T29] audit: type=1400 audit(7765.450:332): avc: denied { search } for pid=3187 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7766.304031][ T29] audit: type=1400 audit(7765.620:333): avc: denied { read } for pid=3187 comm="dhcpcd" name="n18" dev="tmpfs" ino=13669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7766.472187][ T29] audit: type=1400 audit(7765.790:334): avc: denied { read open } for pid=3187 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=13669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7766.778732][ T29] audit: type=1400 audit(7766.050:335): avc: denied { getattr } for pid=3187 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=13669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7767.598605][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 7767.599620][ T29] audit: type=1400 audit(7766.920:337): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 7771.075646][ T29] audit: type=1400 audit(7770.390:338): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7771.192422][ T29] audit: type=1400 audit(7770.510:339): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7772.310571][ T29] audit: type=1400 audit(7771.630:340): avc: denied { read write } for pid=3344 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7773.006104][ T29] audit: type=1400 audit(7772.330:341): avc: denied { read write open } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7773.613702][ T29] audit: type=1400 audit(7772.930:342): avc: denied { ioctl } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 7776.749843][ T29] audit: type=1400 audit(7776.070:343): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7781.367397][ T29] audit: type=1400 audit(7780.680:344): avc: denied { search } for pid=11265 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7781.881588][ T29] audit: type=1400 audit(7781.200:345): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7781.939457][ T29] audit: type=1400 audit(7781.260:346): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7786.233985][ T29] audit: type=1400 audit(7785.540:347): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7786.237941][ T29] audit: type=1400 audit(7785.540:348): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7786.255014][ T29] audit: type=1400 audit(7785.540:349): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7786.263834][ T29] audit: type=1400 audit(7785.540:350): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7787.319769][ T29] audit: type=1400 audit(7786.640:351): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7789.583705][ T29] audit: type=1400 audit(7788.900:352): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7789.590871][ T29] audit: type=1400 audit(7788.900:353): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7789.600040][ T29] audit: type=1400 audit(7788.900:354): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7789.608575][ T29] audit: type=1400 audit(7788.900:355): avc: denied { read } for pid=11271 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7789.786916][ T29] audit: type=1400 audit(7789.110:356): avc: denied { read open } for pid=11271 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7789.989521][ T29] audit: type=1400 audit(7789.310:357): avc: denied { getattr } for pid=11271 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7790.383967][ T29] audit: type=1400 audit(7789.700:358): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7790.390118][ T29] audit: type=1400 audit(7789.700:359): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7790.413831][ T29] audit: type=1400 audit(7789.700:360): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.377787][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 7792.380203][ T29] audit: type=1400 audit(7791.700:388): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.387660][ T29] audit: type=1400 audit(7791.700:389): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.393376][ T29] audit: type=1400 audit(7791.710:390): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.397240][ T29] audit: type=1400 audit(7791.710:391): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.728588][ T29] audit: type=1400 audit(7792.030:392): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.729331][ T29] audit: type=1400 audit(7792.030:393): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.729695][ T29] audit: type=1400 audit(7792.030:394): avc: denied { search } for pid=11271 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.730030][ T29] audit: type=1400 audit(7792.040:395): avc: denied { read } for pid=11271 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7792.807503][ T29] audit: type=1400 audit(7792.130:396): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7792.847795][ T29] audit: type=1400 audit(7792.170:397): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7797.397750][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 7797.398939][ T29] audit: type=1400 audit(7796.700:472): avc: denied { append open } for pid=11268 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=13677 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7797.688741][ T29] audit: type=1400 audit(7797.010:473): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7797.691822][ T29] audit: type=1400 audit(7797.010:474): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7797.695620][ T29] audit: type=1400 audit(7797.010:475): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7797.808953][ T29] audit: type=1400 audit(7797.130:476): avc: denied { append } for pid=11268 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=13677 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7798.006886][ T29] audit: type=1400 audit(7797.280:477): avc: denied { append open } for pid=11268 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=13677 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7798.323817][ T29] audit: type=1400 audit(7797.640:478): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7798.336619][ T29] audit: type=1400 audit(7797.660:479): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7798.343176][ T29] audit: type=1400 audit(7797.660:480): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7798.512235][ T29] audit: type=1400 audit(7797.830:481): avc: denied { append } for pid=11268 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=13677 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7805.195845][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 7805.196615][ T29] audit: type=1400 audit(7804.520:492): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7806.059699][ T29] audit: type=1400 audit(7805.380:493): avc: denied { search } for pid=11275 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7806.224211][ T29] audit: type=1400 audit(7805.520:494): avc: denied { read } for pid=11275 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7806.321179][ T29] audit: type=1400 audit(7805.640:495): avc: denied { read open } for pid=11275 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7806.617196][ T29] audit: type=1400 audit(7805.940:496): avc: denied { search } for pid=11275 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7806.626311][ T29] audit: type=1400 audit(7805.950:497): avc: denied { search } for pid=11275 comm="cmp" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7806.629316][ T29] audit: type=1400 audit(7805.950:498): avc: denied { search } for pid=11275 comm="cmp" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7806.826960][ T29] audit: type=1400 audit(7806.130:499): avc: denied { read } for pid=11275 comm="cmp" name="resolv.conf.eth1.link" dev="tmpfs" ino=13677 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7806.947020][ T29] audit: type=1400 audit(7806.270:500): avc: denied { read open } for pid=11275 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=13677 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7807.095070][ T29] audit: type=1400 audit(7806.410:501): avc: denied { getattr } for pid=11275 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7810.205012][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 7810.208151][ T29] audit: type=1400 audit(7809.520:503): avc: denied { execute } for pid=11280 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 7810.626585][ T29] audit: type=1400 audit(7809.930:504): avc: denied { execute_no_trans } for pid=11280 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 7811.041455][ T29] audit: type=1400 audit(7810.340:505): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7811.176186][ T29] audit: type=1400 audit(7810.490:506): avc: denied { execute } for pid=11280 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 7811.906793][ T29] audit: type=1400 audit(7811.220:507): avc: denied { execmem } for pid=11280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 7812.436046][ T5928] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7813.172280][ T5928] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7813.304504][ T29] audit: type=1400 audit(7812.590:508): avc: denied { read } for pid=11282 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7813.526488][ T29] audit: type=1400 audit(7812.780:509): avc: denied { read open } for pid=11282 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7814.071133][ T5928] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7814.333782][ T29] audit: type=1400 audit(7813.650:510): avc: denied { mounton } for pid=11282 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 7814.700480][ T5928] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7815.378297][ T29] audit: type=1400 audit(7814.700:511): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7815.438234][ T29] audit: type=1400 audit(7814.760:512): avc: denied { search } for pid=11279 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7815.488937][ T29] audit: type=1400 audit(7814.800:513): avc: denied { search } for pid=11279 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7815.490033][ T29] audit: type=1400 audit(7814.800:514): avc: denied { search } for pid=11279 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7815.669136][ T29] audit: type=1400 audit(7814.990:515): avc: denied { getattr } for pid=11279 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=13677 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7816.064148][ T29] audit: type=1400 audit(7815.370:516): avc: denied { search } for pid=11279 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7816.065130][ T29] audit: type=1400 audit(7815.380:517): avc: denied { search } for pid=11279 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7816.065491][ T29] audit: type=1400 audit(7815.380:518): avc: denied { search } for pid=11279 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7816.065832][ T29] audit: type=1400 audit(7815.380:519): avc: denied { write search } for pid=11279 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7816.305956][ T29] audit: type=1400 audit(7815.620:520): avc: denied { remove_name search } for pid=11279 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=13677 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7821.422180][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 7821.423836][ T29] audit: type=1400 audit(7820.740:522): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7821.564756][ T29] audit: type=1400 audit(7820.870:523): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7821.750117][ T5928] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 7821.938137][ T5928] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 7822.074921][ T5928] bond0 (unregistering): Released all slaves [ 7822.853703][ T5928] hsr_slave_0: left promiscuous mode [ 7822.964337][ T5928] hsr_slave_1: left promiscuous mode [ 7823.182178][ T5928] veth0_macvtap: left promiscuous mode [ 7823.194409][ T5928] veth1_vlan: left promiscuous mode [ 7823.195557][ T5928] veth0_vlan: left promiscuous mode [ 7825.488196][ T29] audit: type=1400 audit(7824.810:524): avc: denied { search } for pid=11286 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7825.498920][ T29] audit: type=1400 audit(7824.820:525): avc: denied { search } for pid=11286 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7825.544712][ T29] audit: type=1400 audit(7824.860:526): avc: denied { search } for pid=11286 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7826.151137][ T29] audit: type=1400 audit(7825.470:527): avc: denied { search } for pid=11268 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7826.644257][ T29] audit: type=1400 audit(7825.960:528): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 7827.035809][ T29] audit: type=1400 audit(7826.360:529): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 7832.909376][ T3187] 8021q: adding VLAN 0 to HW filter on device eth1 [ 7833.088125][ T29] audit: type=1400 audit(7832.410:530): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7833.200507][ T29] audit: type=1400 audit(7832.510:531): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7833.271583][ T29] audit: type=1400 audit(7832.590:532): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 7833.835492][ T29] audit: type=1400 audit(7833.140:533): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 7838.415677][ T29] audit: type=1400 audit(7837.730:534): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7838.468984][ T29] audit: type=1400 audit(7837.790:535): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7838.644640][ T29] audit: type=1400 audit(7837.930:536): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7839.987236][ T29] audit: type=1400 audit(7839.310:537): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7839.992204][ T29] audit: type=1400 audit(7839.310:538): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7840.024245][ T29] audit: type=1400 audit(7839.320:539): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7840.025181][ T29] audit: type=1400 audit(7839.320:540): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7842.164689][ T29] audit: type=1400 audit(7841.490:541): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7842.168330][ T29] audit: type=1400 audit(7841.490:542): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7842.171058][ T29] audit: type=1400 audit(7841.490:543): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.465958][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 7843.466733][ T29] audit: type=1400 audit(7842.790:576): avc: denied { read open } for pid=11295 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.574526][ T29] audit: type=1400 audit(7842.880:577): avc: denied { getattr } for pid=11295 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.660296][ T29] audit: type=1400 audit(7842.980:578): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.664914][ T29] audit: type=1400 audit(7842.980:579): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.666932][ T29] audit: type=1400 audit(7842.990:580): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.669325][ T29] audit: type=1400 audit(7842.990:581): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.990160][ T29] audit: type=1400 audit(7843.300:582): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.991106][ T29] audit: type=1400 audit(7843.300:583): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.991517][ T29] audit: type=1400 audit(7843.300:584): avc: denied { search } for pid=11295 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7843.991816][ T29] audit: type=1400 audit(7843.300:585): avc: denied { read } for pid=11295 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7848.705593][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 7848.706327][ T29] audit: type=1400 audit(7848.020:669): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7848.765772][ T29] audit: type=1400 audit(7848.060:670): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7848.766598][ T29] audit: type=1400 audit(7848.060:671): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7848.913420][ T29] audit: type=1400 audit(7848.230:672): avc: denied { append } for pid=11292 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=13683 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7849.087656][ T29] audit: type=1400 audit(7848.410:673): avc: denied { append open } for pid=11292 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=13683 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7849.387372][ T29] audit: type=1400 audit(7848.710:674): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7849.510702][ T29] audit: type=1400 audit(7848.830:675): avc: denied { getattr } for pid=11292 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7849.649570][ T29] audit: type=1400 audit(7848.970:676): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7849.840614][ T29] audit: type=1400 audit(7849.160:677): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7849.901778][ T29] audit: type=1400 audit(7849.220:678): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7855.224021][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 7855.224899][ T29] audit: type=1400 audit(7854.530:685): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7857.501374][ T29] audit: type=1400 audit(7856.820:686): avc: denied { search } for pid=11304 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7857.562211][ T29] audit: type=1400 audit(7856.870:687): avc: denied { read } for pid=11304 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7857.615863][ T29] audit: type=1400 audit(7856.920:688): avc: denied { read open } for pid=11304 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7857.689403][ T29] audit: type=1400 audit(7857.010:689): avc: denied { search } for pid=11304 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7857.690581][ T29] audit: type=1400 audit(7857.010:690): avc: denied { search } for pid=11304 comm="cmp" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7857.704994][ T29] audit: type=1400 audit(7857.010:691): avc: denied { search } for pid=11304 comm="cmp" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7857.757870][ T29] audit: type=1400 audit(7857.060:692): avc: denied { read } for pid=11304 comm="cmp" name="resolv.conf.eth0.ra" dev="tmpfs" ino=13683 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7857.785536][ T29] audit: type=1400 audit(7857.100:693): avc: denied { read open } for pid=11304 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=13683 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7857.833714][ T29] audit: type=1400 audit(7857.150:694): avc: denied { getattr } for pid=11304 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7863.893417][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 7863.894737][ T29] audit: type=1400 audit(7863.210:700): avc: denied { search } for pid=11308 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7863.923673][ T29] audit: type=1400 audit(7863.230:701): avc: denied { search } for pid=11308 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7863.924466][ T29] audit: type=1400 audit(7863.240:702): avc: denied { search } for pid=11308 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.083813][ T29] audit: type=1400 audit(7863.400:703): avc: denied { getattr } for pid=11308 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=13683 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7864.303016][ T29] audit: type=1400 audit(7863.620:704): avc: denied { search } for pid=11308 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.309874][ T29] audit: type=1400 audit(7863.630:705): avc: denied { search } for pid=11308 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.324659][ T29] audit: type=1400 audit(7863.650:706): avc: denied { search } for pid=11308 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.334835][ T29] audit: type=1400 audit(7863.650:707): avc: denied { write search } for pid=11308 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.437492][ T29] audit: type=1400 audit(7863.730:708): avc: denied { remove_name search } for pid=11308 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=13683 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.461698][ T29] audit: type=1400 audit(7863.780:709): avc: denied { unlink } for pid=11308 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=13683 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7865.399465][T11249] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 7865.652232][T11249] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 7869.169459][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 7869.170320][ T29] audit: type=1400 audit(7868.490:715): avc: denied { search } for pid=11292 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7870.335567][ T29] audit: type=1400 audit(7869.640:716): avc: denied { search } for pid=3187 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7870.336484][ T29] audit: type=1400 audit(7869.650:717): avc: denied { search } for pid=3187 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7870.337298][ T29] audit: type=1400 audit(7869.650:718): avc: denied { search } for pid=3187 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7870.474955][ T29] audit: type=1400 audit(7869.740:719): avc: denied { read } for pid=3187 comm="dhcpcd" name="n19" dev="tmpfs" ino=13670 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7870.644927][ T29] audit: type=1400 audit(7869.960:720): avc: denied { read open } for pid=3187 comm="dhcpcd" path="/run/udev/data/n19" dev="tmpfs" ino=13670 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7870.823125][ T29] audit: type=1400 audit(7870.140:721): avc: denied { getattr } for pid=3187 comm="dhcpcd" path="/run/udev/data/n19" dev="tmpfs" ino=13670 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7871.034932][ T29] audit: type=1400 audit(7870.340:722): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7871.218320][ T29] audit: type=1400 audit(7870.540:723): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7873.034180][ T29] audit: type=1400 audit(7872.340:724): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7875.513636][ T29] audit: type=1400 audit(7874.830:725): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7877.233659][ T29] audit: type=1400 audit(7876.540:726): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7879.468885][ T29] audit: type=1400 audit(7878.790:727): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7879.599517][ T29] audit: type=1400 audit(7878.920:728): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7881.497473][ T29] audit: type=1400 audit(7880.820:729): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7883.074174][ T29] audit: type=1400 audit(7882.390:730): avc: denied { search } for pid=11318 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7884.381267][ T29] audit: type=1400 audit(7883.700:731): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7885.959429][ T29] audit: type=1400 audit(7885.280:732): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7887.386741][ T29] audit: type=1400 audit(7886.710:733): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7887.414899][ T29] audit: type=1400 audit(7886.710:734): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7887.415801][ T29] audit: type=1400 audit(7886.720:735): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7887.416139][ T29] audit: type=1400 audit(7886.720:736): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7888.787925][ T29] audit: type=1400 audit(7888.110:737): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7888.917432][ T29] audit: type=1400 audit(7888.240:738): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7889.740704][ T29] audit: type=1400 audit(7889.060:739): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7889.774069][ T29] audit: type=1400 audit(7889.070:740): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7889.775039][ T29] audit: type=1400 audit(7889.070:741): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7889.775495][ T29] audit: type=1400 audit(7889.070:742): avc: denied { read } for pid=11325 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7892.551614][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 7892.556056][ T29] audit: type=1400 audit(7891.870:799): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7892.567665][ T29] audit: type=1400 audit(7891.890:800): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7892.594966][ T29] audit: type=1400 audit(7891.890:801): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7892.614307][ T29] audit: type=1400 audit(7891.920:802): avc: denied { read } for pid=11325 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7892.779666][ T29] audit: type=1400 audit(7892.100:803): avc: denied { read open } for pid=11325 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7892.913891][ T29] audit: type=1400 audit(7892.230:805): avc: denied { getattr } for pid=11325 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7892.943952][ T29] audit: type=1400 audit(7892.210:804): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7893.225654][ T29] audit: type=1400 audit(7892.540:806): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7893.226664][ T29] audit: type=1400 audit(7892.540:807): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7893.226951][ T29] audit: type=1400 audit(7892.540:808): avc: denied { search } for pid=11325 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7897.571530][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 7897.584168][ T29] audit: type=1400 audit(7896.890:882): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7897.655601][ T29] audit: type=1400 audit(7896.980:883): avc: denied { getattr } for pid=11321 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7897.762089][ T29] audit: type=1400 audit(7897.080:884): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7897.813852][ T29] audit: type=1400 audit(7897.130:885): avc: denied { getattr } for pid=11321 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7897.896481][ T29] audit: type=1400 audit(7897.220:886): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7897.909978][ T29] audit: type=1400 audit(7897.230:887): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7897.924040][ T29] audit: type=1400 audit(7897.240:888): avc: denied { search } for pid=11321 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7897.970183][ T29] audit: type=1400 audit(7897.290:889): avc: denied { getattr } for pid=11321 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=13684 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7898.369662][ T29] audit: type=1400 audit(7897.690:890): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7898.501809][ T29] audit: type=1400 audit(7897.820:891): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7903.767327][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 7903.783243][ T29] audit: type=1400 audit(7903.090:893): avc: denied { search } for pid=11333 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7903.915580][ T29] audit: type=1400 audit(7903.240:894): avc: denied { read } for pid=11333 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7904.038774][ T29] audit: type=1400 audit(7903.360:895): avc: denied { read open } for pid=11333 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7904.278845][ T29] audit: type=1400 audit(7903.600:896): avc: denied { search } for pid=11333 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7904.283510][ T29] audit: type=1400 audit(7903.600:897): avc: denied { search } for pid=11333 comm="cmp" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7904.294103][ T29] audit: type=1400 audit(7903.600:898): avc: denied { search } for pid=11333 comm="cmp" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7904.335164][ T29] audit: type=1400 audit(7903.660:899): avc: denied { read } for pid=11333 comm="cmp" name="resolv.conf.eth2.link" dev="tmpfs" ino=13684 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7904.370759][ T29] audit: type=1400 audit(7903.690:900): avc: denied { read open } for pid=11333 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=13684 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7904.410707][ T29] audit: type=1400 audit(7903.730:901): avc: denied { getattr } for pid=11333 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7904.538352][T11249] hsr_slave_0: entered promiscuous mode [ 7904.550661][T11249] hsr_slave_1: entered promiscuous mode [ 7904.573591][ T29] audit: type=1400 audit(7903.890:902): avc: denied { getattr } for pid=11333 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=13684 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7911.267885][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 7911.268610][ T29] audit: type=1400 audit(7910.590:906): avc: denied { search } for pid=11337 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7911.270867][ T29] audit: type=1400 audit(7910.590:907): avc: denied { search } for pid=11337 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7911.294999][ T29] audit: type=1400 audit(7910.610:908): avc: denied { search } for pid=11337 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7911.417543][ T29] audit: type=1400 audit(7910.740:909): avc: denied { getattr } for pid=11337 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=13684 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7911.629967][ T29] audit: type=1400 audit(7910.950:910): avc: denied { search } for pid=11337 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7911.638585][ T29] audit: type=1400 audit(7910.960:911): avc: denied { search } for pid=11337 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7911.646503][ T29] audit: type=1400 audit(7910.970:912): avc: denied { search } for pid=11337 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7911.654622][ T29] audit: type=1400 audit(7910.970:913): avc: denied { write search } for pid=11337 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7911.825218][ T29] audit: type=1400 audit(7911.140:914): avc: denied { remove_name search } for pid=11337 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=13684 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7911.976342][ T29] audit: type=1400 audit(7911.300:915): avc: denied { unlink } for pid=11337 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=13684 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7912.918408][T11282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 7913.505930][T11282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 7917.224341][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 7917.225194][ T29] audit: type=1400 audit(7916.490:917): avc: denied { create } for pid=11249 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7917.467522][ T29] audit: type=1400 audit(7916.790:918): avc: denied { write } for pid=11249 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7917.630859][ T29] audit: type=1400 audit(7916.950:919): avc: denied { read } for pid=11249 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7917.813871][ T29] audit: type=1400 audit(7917.130:920): avc: denied { read } for pid=11249 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7918.010053][ T29] audit: type=1400 audit(7917.330:921): avc: denied { write } for pid=11249 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7918.160910][ T29] audit: type=1400 audit(7917.480:922): avc: denied { read } for pid=11249 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7918.428588][T11249] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 7918.614857][T11249] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 7918.809648][T11249] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 7918.902228][T11249] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 7919.247511][T11249] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 7919.399820][T11249] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 7919.624340][ T29] audit: type=1400 audit(7918.940:923): avc: denied { search } for pid=11338 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7919.625234][ T29] audit: type=1400 audit(7918.940:924): avc: denied { search } for pid=11338 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7919.625570][ T29] audit: type=1400 audit(7918.940:925): avc: denied { search } for pid=11338 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7919.725471][T11249] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 7919.858724][T11249] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 7920.019039][ T29] audit: type=1400 audit(7919.340:926): avc: denied { create } for pid=11249 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7920.770780][ T3187] 8021q: adding VLAN 0 to HW filter on device eth2 [ 7922.807921][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 7922.808791][ T29] audit: type=1400 audit(7922.130:939): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7923.189669][ T29] audit: type=1400 audit(7922.510:940): avc: denied { search } for pid=3187 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7923.243961][ T29] audit: type=1400 audit(7922.510:941): avc: denied { search } for pid=3187 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7923.244858][ T29] audit: type=1400 audit(7922.550:942): avc: denied { search } for pid=3187 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7923.484385][ T29] audit: type=1400 audit(7922.800:943): avc: denied { read } for pid=3187 comm="dhcpcd" name="n20" dev="tmpfs" ino=13671 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7923.652022][ T29] audit: type=1400 audit(7922.970:944): avc: denied { read open } for pid=3187 comm="dhcpcd" path="/run/udev/data/n20" dev="tmpfs" ino=13671 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7923.825646][ T29] audit: type=1400 audit(7923.140:945): avc: denied { getattr } for pid=3187 comm="dhcpcd" path="/run/udev/data/n20" dev="tmpfs" ino=13671 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7927.355389][ T29] audit: type=1400 audit(7926.680:946): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7927.715168][ T29] audit: type=1400 audit(7927.030:947): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7927.845258][ T29] audit: type=1400 audit(7927.160:948): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7931.350265][ T29] audit: type=1400 audit(7930.670:949): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7931.408561][ T29] audit: type=1400 audit(7930.720:950): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7932.581921][ T29] audit: type=1400 audit(7931.900:951): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7936.141342][ T29] audit: type=1400 audit(7935.460:952): avc: denied { search } for pid=11353 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7936.599479][ T29] audit: type=1400 audit(7935.920:953): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7936.781394][ T29] audit: type=1400 audit(7936.100:954): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7937.359629][ T29] audit: type=1400 audit(7936.680:955): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7941.038120][ T29] audit: type=1400 audit(7940.360:956): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7941.055320][ T29] audit: type=1400 audit(7940.360:957): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7941.056352][ T29] audit: type=1400 audit(7940.370:958): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7941.056785][ T29] audit: type=1400 audit(7940.370:959): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7942.098063][ T29] audit: type=1400 audit(7941.420:960): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7942.322030][ T29] audit: type=1400 audit(7941.610:961): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7942.460209][ T29] audit: type=1400 audit(7941.780:962): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7944.060781][ T29] audit: type=1400 audit(7943.380:963): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7944.061696][ T29] audit: type=1400 audit(7943.380:964): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7944.086469][ T29] audit: type=1400 audit(7943.400:965): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7944.087332][ T29] audit: type=1400 audit(7943.400:966): avc: denied { read } for pid=11360 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7944.227322][ T29] audit: type=1400 audit(7943.550:967): avc: denied { read open } for pid=11360 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7944.394240][ T29] audit: type=1400 audit(7943.670:968): avc: denied { getattr } for pid=11360 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7944.618546][ T29] audit: type=1400 audit(7943.940:969): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.226397][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 7947.235954][ T29] audit: type=1400 audit(7946.550:1019): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.254484][ T29] audit: type=1400 audit(7946.570:1020): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.261612][ T29] audit: type=1400 audit(7946.570:1021): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.273627][ T29] audit: type=1400 audit(7946.570:1022): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.449382][ T29] audit: type=1400 audit(7946.770:1023): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7947.620633][ T29] audit: type=1400 audit(7946.940:1024): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.627657][ T29] audit: type=1400 audit(7946.940:1025): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.634474][ T29] audit: type=1400 audit(7946.940:1026): avc: denied { search } for pid=11360 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.664791][ T29] audit: type=1400 audit(7946.980:1027): avc: denied { read } for pid=11360 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7947.734785][ T29] audit: type=1400 audit(7947.040:1028): avc: denied { read open } for pid=11360 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7952.248424][ T29] kauditd_printk_skb: 81 callbacks suppressed [ 7952.249369][ T29] audit: type=1400 audit(7951.560:1110): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7952.249896][ T29] audit: type=1400 audit(7951.560:1111): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7952.250401][ T29] audit: type=1400 audit(7951.560:1112): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7952.323116][ T29] audit: type=1400 audit(7951.640:1113): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7952.378619][ T29] audit: type=1400 audit(7951.700:1114): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7952.398854][ T29] audit: type=1400 audit(7951.710:1115): avc: denied { append } for pid=11355 comm="dhcpcd-run-hook" name="resolv.conf.eth3.link" dev="tmpfs" ino=13686 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7952.546307][ T29] audit: type=1400 audit(7951.870:1116): avc: denied { append open } for pid=11355 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=13686 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7952.767985][ T29] audit: type=1400 audit(7952.090:1117): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7952.854193][ T29] audit: type=1400 audit(7952.170:1118): avc: denied { getattr } for pid=11355 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7953.111744][ T29] audit: type=1400 audit(7952.430:1119): avc: denied { search } for pid=11355 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7958.911476][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 7958.923332][ T29] audit: type=1400 audit(7958.230:1125): avc: denied { search } for pid=11364 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7958.994288][ T29] audit: type=1400 audit(7958.290:1126): avc: denied { read } for pid=11364 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7959.061892][T11249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 7959.078955][ T29] audit: type=1400 audit(7958.400:1127): avc: denied { read open } for pid=11364 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7959.243549][ T29] audit: type=1400 audit(7958.560:1128): avc: denied { search } for pid=11364 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7959.247459][ T29] audit: type=1400 audit(7958.570:1129): avc: denied { search } for pid=11364 comm="cmp" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7959.249240][ T29] audit: type=1400 audit(7958.570:1130): avc: denied { search } for pid=11364 comm="cmp" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7959.309242][T11282] hsr_slave_0: entered promiscuous mode [ 7959.323725][ T29] audit: type=1400 audit(7958.620:1131): avc: denied { read } for pid=11364 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=13686 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7959.340898][T11282] hsr_slave_1: entered promiscuous mode [ 7959.360148][T11282] debugfs: 'hsr0' already exists in 'hsr' [ 7959.360799][T11282] Cannot create hsr debugfs directory [ 7959.397330][ T29] audit: type=1400 audit(7958.710:1132): avc: denied { read open } for pid=11364 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=13686 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7959.434207][ T29] audit: type=1400 audit(7958.750:1133): avc: denied { getattr } for pid=11364 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7959.472167][ T29] audit: type=1400 audit(7958.790:1134): avc: denied { getattr } for pid=11364 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=13686 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7965.796367][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 7965.797217][ T29] audit: type=1400 audit(7965.110:1137): avc: denied { search } for pid=11367 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7965.834412][ T29] audit: type=1400 audit(7965.130:1138): avc: denied { search } for pid=11367 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7965.835384][ T29] audit: type=1400 audit(7965.130:1139): avc: denied { search } for pid=11367 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7965.946275][ T29] audit: type=1400 audit(7965.260:1140): avc: denied { getattr } for pid=11367 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=13686 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7966.051911][ T29] audit: type=1400 audit(7965.370:1141): avc: denied { search } for pid=11367 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7966.066303][ T29] audit: type=1400 audit(7965.380:1142): avc: denied { search } for pid=11367 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7966.076945][ T29] audit: type=1400 audit(7965.400:1143): avc: denied { search } for pid=11367 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7966.090231][ T29] audit: type=1400 audit(7965.410:1144): avc: denied { write search } for pid=11367 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7966.271163][ T29] audit: type=1400 audit(7965.590:1145): avc: denied { remove_name search } for pid=11367 comm="rm" name="resolv.conf.eth3.link" dev="tmpfs" ino=13686 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7966.463795][ T29] audit: type=1400 audit(7965.770:1146): avc: denied { unlink } for pid=11367 comm="rm" name="resolv.conf.eth3.link" dev="tmpfs" ino=13686 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7970.823544][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 7970.824294][ T29] audit: type=1400 audit(7970.140:1151): avc: denied { read } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7971.004786][ T29] audit: type=1400 audit(7970.320:1152): avc: denied { read } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7971.197473][ T29] audit: type=1400 audit(7970.520:1153): avc: denied { write } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7971.378491][ T29] audit: type=1400 audit(7970.700:1154): avc: denied { read } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7971.642097][T11282] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 7971.810156][T11282] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 7972.079695][T11282] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 7972.164566][T11282] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 7972.817482][T11282] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 7973.039801][T11282] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 7973.219707][ T29] audit: type=1400 audit(7972.540:1155): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7973.614170][T11282] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 7973.679430][T11282] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 7973.984371][ T29] audit: type=1400 audit(7973.280:1156): avc: denied { create } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7974.193752][ T29] audit: type=1400 audit(7973.510:1157): avc: denied { write } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7974.361706][ T29] audit: type=1400 audit(7973.680:1158): avc: denied { read } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7974.548619][ T29] audit: type=1400 audit(7973.870:1159): avc: denied { read } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7974.746851][ T29] audit: type=1400 audit(7974.070:1160): avc: denied { write } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7975.868769][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 7975.870257][ T29] audit: type=1400 audit(7975.190:1168): avc: denied { write } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7976.338593][ T29] audit: type=1400 audit(7975.660:1169): avc: denied { read } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7976.421105][ T3187] 8021q: adding VLAN 0 to HW filter on device eth3 [ 7978.263944][ T29] audit: type=1400 audit(7977.580:1170): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7978.314551][ T29] audit: type=1400 audit(7977.630:1171): avc: denied { search } for pid=3187 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7978.344763][ T29] audit: type=1400 audit(7977.660:1172): avc: denied { search } for pid=3187 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7978.345602][ T29] audit: type=1400 audit(7977.660:1173): avc: denied { search } for pid=3187 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7978.550219][ T29] audit: type=1400 audit(7977.870:1174): avc: denied { read } for pid=3187 comm="dhcpcd" name="n21" dev="tmpfs" ino=13672 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7978.653912][ T29] audit: type=1400 audit(7977.970:1175): avc: denied { read open } for pid=3187 comm="dhcpcd" path="/run/udev/data/n21" dev="tmpfs" ino=13672 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7978.804802][ T29] audit: type=1400 audit(7978.070:1176): avc: denied { getattr } for pid=3187 comm="dhcpcd" path="/run/udev/data/n21" dev="tmpfs" ino=13672 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7979.928870][ T29] audit: type=1400 audit(7979.250:1177): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7983.017441][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 7983.018373][ T29] audit: type=1400 audit(7982.340:1179): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7983.139876][ T29] audit: type=1400 audit(7982.450:1180): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7985.188940][ T29] audit: type=1400 audit(7984.510:1181): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7988.160009][ T29] audit: type=1400 audit(7987.480:1182): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7989.164207][ T29] audit: type=1400 audit(7988.480:1183): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7989.276659][ T29] audit: type=1400 audit(7988.600:1184): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7992.509582][ T29] audit: type=1400 audit(7991.830:1185): avc: denied { search } for pid=11385 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7993.045998][ T29] audit: type=1400 audit(7992.350:1186): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7993.113527][ T29] audit: type=1400 audit(7992.420:1187): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7997.841381][ T29] audit: type=1400 audit(7997.160:1188): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7997.893407][ T29] audit: type=1400 audit(7997.160:1189): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7997.894153][ T29] audit: type=1400 audit(7997.210:1190): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7997.894697][ T29] audit: type=1400 audit(7997.210:1191): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7998.925161][ T29] audit: type=1400 audit(7998.240:1192): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8000.307942][ T29] audit: type=1400 audit(7999.630:1193): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8000.886953][ T29] audit: type=1400 audit(8000.210:1194): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8000.889638][ T29] audit: type=1400 audit(8000.210:1195): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8000.892275][ T29] audit: type=1400 audit(8000.210:1196): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8000.898023][ T29] audit: type=1400 audit(8000.210:1197): avc: denied { read } for pid=11392 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8002.885704][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 8002.886571][ T29] audit: type=1400 audit(8002.210:1230): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8002.891104][ T29] audit: type=1400 audit(8002.210:1231): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8002.906327][ T29] audit: type=1400 audit(8002.230:1232): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8002.954227][ T29] audit: type=1400 audit(8002.240:1233): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8003.266170][ T29] audit: type=1400 audit(8002.570:1234): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8003.269638][ T29] audit: type=1400 audit(8002.590:1235): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8003.277764][ T29] audit: type=1400 audit(8002.600:1236): avc: denied { search } for pid=11392 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8003.304427][ T29] audit: type=1400 audit(8002.620:1237): avc: denied { read } for pid=11392 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8003.441311][ T29] audit: type=1400 audit(8002.760:1238): avc: denied { read open } for pid=11392 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8003.559136][ T29] audit: type=1400 audit(8002.880:1239): avc: denied { getattr } for pid=11392 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.103713][ T29] kauditd_printk_skb: 88 callbacks suppressed [ 8008.104638][ T29] audit: type=1400 audit(8007.420:1328): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.105193][ T29] audit: type=1400 audit(8007.420:1329): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.105634][ T29] audit: type=1400 audit(8007.420:1330): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.243781][ T29] audit: type=1400 audit(8007.560:1331): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.244673][ T29] audit: type=1400 audit(8007.560:1332): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.245079][ T29] audit: type=1400 audit(8007.560:1333): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.436743][ T29] audit: type=1400 audit(8007.740:1334): avc: denied { getattr } for pid=11388 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.731892][ T29] audit: type=1400 audit(8008.050:1335): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.757875][ T29] audit: type=1400 audit(8008.080:1336): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8008.804189][ T29] audit: type=1400 audit(8008.090:1337): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8015.448940][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 8015.452302][ T29] audit: type=1400 audit(8014.770:1366): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8015.491766][ T29] audit: type=1400 audit(8014.810:1367): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8016.029461][T11282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 8017.651416][ T29] audit: type=1400 audit(8016.960:1368): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8018.003699][ T29] audit: type=1400 audit(8017.320:1369): avc: denied { search } for pid=11396 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8018.134334][ T29] audit: type=1400 audit(8017.430:1370): avc: denied { read } for pid=11396 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8018.239187][ T29] audit: type=1400 audit(8017.560:1371): avc: denied { read open } for pid=11396 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8018.495744][ T29] audit: type=1400 audit(8017.820:1372): avc: denied { search } for pid=11396 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8018.498633][ T29] audit: type=1400 audit(8017.820:1373): avc: denied { search } for pid=11396 comm="cmp" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8018.500823][ T29] audit: type=1400 audit(8017.820:1374): avc: denied { search } for pid=11396 comm="cmp" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8018.656745][ T29] audit: type=1400 audit(8017.970:1375): avc: denied { read } for pid=11396 comm="cmp" name="resolv.conf.eth4.link" dev="tmpfs" ino=13688 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8023.129955][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 8023.131120][ T29] audit: type=1400 audit(8022.450:1379): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8023.376816][ T29] audit: type=1400 audit(8022.650:1380): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8023.404153][ T29] audit: type=1400 audit(8022.700:1381): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8025.110932][ T29] audit: type=1400 audit(8024.430:1382): avc: denied { search } for pid=11399 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8025.112060][ T29] audit: type=1400 audit(8024.430:1383): avc: denied { search } for pid=11399 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8025.164406][ T29] audit: type=1400 audit(8024.480:1384): avc: denied { search } for pid=11399 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8025.309739][ T29] audit: type=1400 audit(8024.630:1385): avc: denied { getattr } for pid=11399 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth4.link" dev="tmpfs" ino=13688 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8025.619301][ T29] audit: type=1400 audit(8024.940:1386): avc: denied { search } for pid=11399 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8025.626624][ T29] audit: type=1400 audit(8024.950:1387): avc: denied { search } for pid=11399 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8025.629862][ T29] audit: type=1400 audit(8024.950:1388): avc: denied { search } for pid=11399 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8028.199452][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 8028.200476][ T29] audit: type=1400 audit(8027.520:1392): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8028.338842][ T29] audit: type=1400 audit(8027.660:1393): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8029.837554][ T29] audit: type=1400 audit(8029.150:1394): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8033.697827][ T29] audit: type=1400 audit(8033.020:1395): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8034.532312][ T29] audit: type=1400 audit(8033.850:1396): avc: denied { search } for pid=11403 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8034.554211][ T29] audit: type=1400 audit(8033.850:1397): avc: denied { search } for pid=11403 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8034.555417][ T29] audit: type=1400 audit(8033.870:1398): avc: denied { search } for pid=11403 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8035.245531][ T29] audit: type=1400 audit(8034.540:1399): avc: denied { search } for pid=11388 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8036.001390][ T3187] 8021q: adding VLAN 0 to HW filter on device eth4 [ 8036.053340][ T29] audit: type=1400 audit(8035.370:1400): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8036.259215][ T29] audit: type=1400 audit(8035.580:1401): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8038.642248][ T29] audit: type=1400 audit(8037.960:1402): avc: denied { search } for pid=3187 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8038.648027][ T29] audit: type=1400 audit(8037.970:1403): avc: denied { search } for pid=3187 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8038.653663][ T29] audit: type=1400 audit(8037.970:1404): avc: denied { search } for pid=3187 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8038.795351][ T29] audit: type=1400 audit(8038.080:1405): avc: denied { read } for pid=3187 comm="dhcpcd" name="n22" dev="tmpfs" ino=13679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8038.971995][ T29] audit: type=1400 audit(8038.290:1406): avc: denied { read open } for pid=3187 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=13679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8039.158328][ T29] audit: type=1400 audit(8038.480:1407): avc: denied { getattr } for pid=3187 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=13679 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8040.571496][ T29] audit: type=1400 audit(8039.890:1408): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8040.715040][ T29] audit: type=1400 audit(8040.030:1409): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8041.966639][ T29] audit: type=1400 audit(8041.270:1410): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8045.481575][ T29] audit: type=1400 audit(8044.800:1411): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8047.233457][ T29] audit: type=1400 audit(8046.550:1412): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8047.316749][ T29] audit: type=1400 audit(8046.600:1413): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8050.155519][ T29] audit: type=1400 audit(8049.480:1414): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8050.270239][ T29] audit: type=1400 audit(8049.590:1415): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8052.441836][ T29] audit: type=1400 audit(8051.760:1416): avc: denied { search } for pid=11412 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8055.849255][ T29] audit: type=1400 audit(8055.170:1417): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8057.741054][ T29] audit: type=1400 audit(8057.060:1418): avc: denied { search } for pid=11414 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8057.757017][ T29] audit: type=1400 audit(8057.060:1419): avc: denied { search } for pid=11414 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8057.760853][ T29] audit: type=1400 audit(8057.060:1420): avc: denied { search } for pid=11414 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8057.808067][ T29] audit: type=1400 audit(8057.060:1421): avc: denied { search } for pid=11414 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8058.354034][ T29] audit: type=1400 audit(8057.670:1422): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8060.946652][ T29] audit: type=1400 audit(8060.270:1423): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8061.067430][ T29] audit: type=1400 audit(8060.390:1424): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8061.075407][ T29] audit: type=1400 audit(8060.390:1425): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8061.086344][ T29] audit: type=1400 audit(8060.410:1426): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8061.097571][ T29] audit: type=1400 audit(8060.420:1427): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8062.908476][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 8062.909401][ T29] audit: type=1400 audit(8062.230:1455): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8062.945384][ T29] audit: type=1400 audit(8062.230:1456): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8062.946299][ T29] audit: type=1400 audit(8062.250:1457): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8062.946858][ T29] audit: type=1400 audit(8062.250:1458): avc: denied { read } for pid=11417 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8063.115665][ T29] audit: type=1400 audit(8062.430:1459): avc: denied { read open } for pid=11417 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8063.344940][ T29] audit: type=1400 audit(8062.660:1460): avc: denied { getattr } for pid=11417 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8063.694782][ T29] audit: type=1400 audit(8063.010:1461): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8063.698590][ T29] audit: type=1400 audit(8063.020:1462): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8063.706722][ T29] audit: type=1400 audit(8063.030:1463): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8063.749844][ T29] audit: type=1400 audit(8063.040:1464): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8067.937466][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 8067.938235][ T29] audit: type=1400 audit(8067.260:1543): avc: denied { getattr } for pid=11417 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.224745][ T29] audit: type=1400 audit(8067.540:1544): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.227809][ T29] audit: type=1400 audit(8067.550:1545): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.237278][ T29] audit: type=1400 audit(8067.560:1546): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.245700][ T29] audit: type=1400 audit(8067.560:1547): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.496613][ T29] audit: type=1400 audit(8067.820:1548): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.516842][ T29] audit: type=1400 audit(8067.830:1549): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.517657][ T29] audit: type=1400 audit(8067.830:1550): avc: denied { search } for pid=11417 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.517955][ T29] audit: type=1400 audit(8067.830:1551): avc: denied { read } for pid=11417 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8068.677756][ T29] audit: type=1400 audit(8068.000:1552): avc: denied { read open } for pid=11417 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8074.090121][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 8074.091019][ T29] audit: type=1400 audit(8073.410:1608): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8074.274622][ T29] audit: type=1400 audit(8073.570:1609): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8076.516878][ T29] audit: type=1400 audit(8075.830:1610): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8080.342077][ T29] audit: type=1400 audit(8079.660:1611): avc: denied { search } for pid=11424 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8080.473851][ T29] audit: type=1400 audit(8079.780:1612): avc: denied { read } for pid=11424 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8080.520888][ T29] audit: type=1400 audit(8079.840:1613): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8080.706419][ T29] audit: type=1400 audit(8079.980:1614): avc: denied { read open } for pid=11424 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8080.941932][ T29] audit: type=1400 audit(8080.260:1615): avc: denied { search } for pid=11424 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8080.974971][ T29] audit: type=1400 audit(8080.290:1616): avc: denied { search } for pid=11424 comm="cmp" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8080.975931][ T29] audit: type=1400 audit(8080.290:1617): avc: denied { search } for pid=11424 comm="cmp" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8081.145894][ T29] audit: type=1400 audit(8080.470:1618): avc: denied { read } for pid=11424 comm="cmp" name="resolv.conf.eth5.link" dev="tmpfs" ino=13689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8081.325298][ T29] audit: type=1400 audit(8080.630:1619): avc: denied { read open } for pid=11424 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=13689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8081.464391][ T29] audit: type=1400 audit(8080.780:1620): avc: denied { getattr } for pid=11424 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8088.420996][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 8088.454652][ T29] audit: type=1400 audit(8087.740:1626): avc: denied { search } for pid=11429 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8088.465331][ T29] audit: type=1400 audit(8087.790:1627): avc: denied { search } for pid=11429 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8088.487429][ T29] audit: type=1400 audit(8087.810:1628): avc: denied { search } for pid=11429 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8088.630067][ T29] audit: type=1400 audit(8087.950:1629): avc: denied { getattr } for pid=11429 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=13689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8088.974681][ T29] audit: type=1400 audit(8088.280:1630): avc: denied { search } for pid=11429 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8088.986389][ T29] audit: type=1400 audit(8088.310:1631): avc: denied { search } for pid=11429 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8089.011078][ T29] audit: type=1400 audit(8088.330:1632): avc: denied { search } for pid=11429 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8089.055834][ T29] audit: type=1400 audit(8088.330:1633): avc: denied { write search } for pid=11429 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8089.274473][ T29] audit: type=1400 audit(8088.580:1634): avc: denied { remove_name search } for pid=11429 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=13689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8089.515075][ T29] audit: type=1400 audit(8088.830:1635): avc: denied { unlink } for pid=11429 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=13689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8095.741573][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 8095.753986][ T29] audit: type=1400 audit(8095.060:1638): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8095.914760][ T29] audit: type=1400 audit(8095.230:1639): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8096.204388][ T29] audit: type=1400 audit(8095.520:1640): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8096.254647][ T29] audit: type=1400 audit(8095.570:1641): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8098.095822][ T29] audit: type=1400 audit(8097.410:1642): avc: denied { search } for pid=11433 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8098.133523][ T29] audit: type=1400 audit(8097.450:1643): avc: denied { search } for pid=11433 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8098.134726][ T29] audit: type=1400 audit(8097.450:1644): avc: denied { search } for pid=11433 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8098.826809][ T29] audit: type=1400 audit(8098.150:1645): avc: denied { search } for pid=11414 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8099.239104][ T3187] 8021q: adding VLAN 0 to HW filter on device eth5 [ 8100.629605][ T29] audit: type=1400 audit(8099.950:1646): avc: denied { search } for pid=3187 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8100.630675][ T29] audit: type=1400 audit(8099.950:1647): avc: denied { search } for pid=3187 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8100.861404][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 8100.885085][ T29] audit: type=1400 audit(8100.180:1649): avc: denied { read } for pid=3187 comm="dhcpcd" name="n23" dev="tmpfs" ino=13680 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8100.923539][ T29] audit: type=1400 audit(8100.240:1650): avc: denied { read open } for pid=3187 comm="dhcpcd" path="/run/udev/data/n23" dev="tmpfs" ino=13680 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8100.984039][ T29] audit: type=1400 audit(8100.300:1651): avc: denied { getattr } for pid=3187 comm="dhcpcd" path="/run/udev/data/n23" dev="tmpfs" ino=13680 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8102.610794][ T29] audit: type=1400 audit(8101.930:1652): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8103.019615][ T29] audit: type=1400 audit(8102.340:1653): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8106.972224][ T29] audit: type=1400 audit(8106.290:1654): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8107.159396][ T29] audit: type=1400 audit(8106.480:1655): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8108.497732][ T29] audit: type=1400 audit(8107.770:1656): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8108.634996][ T29] audit: type=1400 audit(8107.950:1657): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8112.201803][ T29] audit: type=1400 audit(8111.520:1658): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8114.487421][ T29] audit: type=1400 audit(8113.810:1659): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8114.799739][ T29] audit: type=1400 audit(8114.120:1660): avc: denied { search } for pid=11441 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8116.734423][ T29] audit: type=1400 audit(8116.050:1661): avc: denied { sys_module } for pid=11249 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8116.904179][ T29] audit: type=1400 audit(8116.220:1662): avc: denied { module_request } for pid=11249 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8119.547443][ T29] audit: type=1400 audit(8118.860:1663): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8119.634581][ T29] audit: type=1400 audit(8118.960:1664): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8120.441398][ T29] audit: type=1400 audit(8119.760:1665): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8120.463639][ T29] audit: type=1400 audit(8119.780:1666): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8120.464608][ T29] audit: type=1400 audit(8119.780:1667): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8120.464910][ T29] audit: type=1400 audit(8119.780:1668): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8123.623078][ T29] audit: type=1400 audit(8122.940:1669): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8123.674722][ T29] audit: type=1400 audit(8122.990:1670): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8123.679313][ T29] audit: type=1400 audit(8123.000:1671): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8123.686211][ T29] audit: type=1400 audit(8123.010:1672): avc: denied { read } for pid=11447 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8123.716150][T11249] veth0_vlan: entered promiscuous mode [ 8124.669890][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 8124.670919][ T29] audit: type=1400 audit(8123.970:1679): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.671478][ T29] audit: type=1400 audit(8123.980:1680): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.671786][ T29] audit: type=1400 audit(8123.980:1681): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.672235][ T29] audit: type=1400 audit(8123.990:1682): avc: denied { read } for pid=11447 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.804419][ T29] audit: type=1400 audit(8124.090:1683): avc: denied { read open } for pid=11447 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.833809][ T29] audit: type=1400 audit(8124.150:1684): avc: denied { getattr } for pid=11447 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.924623][ T29] audit: type=1400 audit(8124.230:1685): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.930193][ T29] audit: type=1400 audit(8124.230:1686): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.935178][ T29] audit: type=1400 audit(8124.230:1687): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8124.938126][ T29] audit: type=1400 audit(8124.230:1688): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8125.810456][T11249] veth1_vlan: entered promiscuous mode [ 8129.739805][T11249] veth0_macvtap: entered promiscuous mode [ 8129.874705][ T29] kauditd_printk_skb: 81 callbacks suppressed [ 8129.875382][ T29] audit: type=1400 audit(8129.180:1770): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8129.879491][ T29] audit: type=1400 audit(8129.200:1771): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8129.886507][ T29] audit: type=1400 audit(8129.210:1772): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8129.889544][ T29] audit: type=1400 audit(8129.210:1773): avc: denied { read } for pid=11447 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8130.065433][ T29] audit: type=1400 audit(8129.380:1774): avc: denied { read open } for pid=11447 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8130.137320][ T29] audit: type=1400 audit(8129.460:1775): avc: denied { getattr } for pid=11447 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8130.198684][ T29] audit: type=1400 audit(8129.520:1776): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8130.232198][ T29] audit: type=1400 audit(8129.550:1777): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8130.241305][ T29] audit: type=1400 audit(8129.550:1778): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8130.255149][ T29] audit: type=1400 audit(8129.550:1779): avc: denied { search } for pid=11447 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8130.736346][T11249] veth1_macvtap: entered promiscuous mode [ 8134.429159][T10781] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 8134.430004][T10781] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 8134.430292][T10781] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 8134.430555][T10781] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 8134.950254][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 8134.956440][ T29] audit: type=1400 audit(8134.270:1851): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8135.152146][ T29] audit: type=1400 audit(8134.470:1852): avc: denied { getattr } for pid=11444 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8135.474541][ T29] audit: type=1400 audit(8134.790:1853): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8135.574490][ T29] audit: type=1400 audit(8134.890:1854): avc: denied { getattr } for pid=11444 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8135.729531][ T29] audit: type=1400 audit(8135.040:1855): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8135.747198][ T29] audit: type=1400 audit(8135.070:1856): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8135.756637][ T29] audit: type=1400 audit(8135.080:1857): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8135.813996][ T29] audit: type=1400 audit(8135.130:1858): avc: denied { getattr } for pid=11444 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth6.link" dev="tmpfs" ino=13690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8138.571952][ T29] audit: type=1400 audit(8137.890:1859): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/syzkaller.txByc5/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 8138.624514][ T29] audit: type=1400 audit(8137.930:1860): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8139.980155][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 8139.981134][ T29] audit: type=1400 audit(8139.300:1867): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/syzkaller.txByc5/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 8140.450737][ T29] audit: type=1400 audit(8139.770:1868): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/syzkaller.txByc5/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=28596 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 8141.179714][ T29] audit: type=1400 audit(8140.500:1869): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/syzkaller.txByc5/syz-tmp/newroot/syzcgroup/unified" dev="tmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 8141.358318][ T29] audit: type=1400 audit(8140.680:1870): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/syzkaller.txByc5/syz-tmp/newroot/syzcgroup/cpu" dev="tmpfs" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 8141.573640][ T29] audit: type=1400 audit(8140.880:1871): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/syzkaller.txByc5/syz-tmp/newroot/syzcgroup/net" dev="tmpfs" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 8141.901958][ T29] audit: type=1400 audit(8141.220:1872): avc: denied { unmount } for pid=11249 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 8142.104515][ T29] audit: type=1400 audit(8141.400:1873): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 8142.309707][ T29] audit: type=1400 audit(8141.630:1874): avc: denied { mount } for pid=11249 comm="syz-executor" name="/" dev="gadgetfs" ino=28597 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 8142.444798][ T29] audit: type=1400 audit(8141.760:1875): avc: denied { mounton } for pid=11249 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1547 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 8142.713750][ T29] audit: type=1400 audit(8142.030:1876): avc: denied { mount } for pid=11249 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 8146.658358][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 8146.659342][ T29] audit: type=1400 audit(8145.980:1891): avc: denied { read write } for pid=11249 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8146.800089][ T29] audit: type=1400 audit(8146.110:1892): avc: denied { read write open } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8146.856443][ T29] audit: type=1400 audit(8146.180:1893): avc: denied { ioctl } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8153.567933][ T29] audit: type=1400 audit(8152.890:1894): avc: denied { search } for pid=11454 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8153.569181][ T29] audit: type=1400 audit(8152.890:1895): avc: denied { search } for pid=11454 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8153.615116][ T29] audit: type=1400 audit(8152.930:1896): avc: denied { search } for pid=11454 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8153.814854][ T29] audit: type=1400 audit(8153.130:1897): avc: denied { getattr } for pid=11454 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth6.link" dev="tmpfs" ino=13690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8154.175661][ T29] audit: type=1400 audit(8153.490:1898): avc: denied { search } for pid=11454 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8154.226966][ T29] audit: type=1400 audit(8153.540:1899): avc: denied { search } for pid=11454 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8154.228054][ T29] audit: type=1400 audit(8153.540:1900): avc: denied { search } for pid=11454 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8154.228607][ T29] audit: type=1400 audit(8153.540:1901): avc: denied { write search } for pid=11454 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8154.495733][ T29] audit: type=1400 audit(8153.810:1902): avc: denied { remove_name search } for pid=11454 comm="rm" name="resolv.conf.eth6.link" dev="tmpfs" ino=13690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8154.693628][ T29] audit: type=1400 audit(8153.990:1903): avc: denied { unlink } for pid=11454 comm="rm" name="resolv.conf.eth6.link" dev="tmpfs" ino=13690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8162.073977][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 8162.077059][ T29] audit: type=1400 audit(8161.390:1908): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8162.314836][ T29] audit: type=1400 audit(8161.630:1909): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8163.269627][ T29] audit: type=1400 audit(8162.590:1910): avc: denied { read write } for pid=11249 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8163.360039][ T29] audit: type=1400 audit(8162.680:1911): avc: denied { read write open } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8163.409276][ T29] audit: type=1400 audit(8162.730:1912): avc: denied { ioctl } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8164.483952][ T29] audit: type=1400 audit(8163.770:1913): avc: denied { search } for pid=11459 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8164.484958][ T29] audit: type=1400 audit(8163.800:1914): avc: denied { search } for pid=11459 comm="rm" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8164.485661][ T29] audit: type=1400 audit(8163.800:1915): avc: denied { search } for pid=11459 comm="rm" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8165.207200][ T29] audit: type=1400 audit(8164.530:1916): avc: denied { search } for pid=11444 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8166.000794][ T3187] 8021q: adding VLAN 0 to HW filter on device eth6 [ 8168.196990][ T29] audit: type=1400 audit(8167.480:1917): avc: denied { search } for pid=3187 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8168.197739][ T29] audit: type=1400 audit(8167.510:1918): avc: denied { search } for pid=3187 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8168.198363][ T29] audit: type=1400 audit(8167.510:1919): avc: denied { search } for pid=3187 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8168.405225][ T29] audit: type=1400 audit(8167.710:1920): avc: denied { read } for pid=3187 comm="dhcpcd" name="n24" dev="tmpfs" ino=13681 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8168.598302][ T29] audit: type=1400 audit(8167.910:1921): avc: denied { read open } for pid=3187 comm="dhcpcd" path="/run/udev/data/n24" dev="tmpfs" ino=13681 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8168.855497][ T29] audit: type=1400 audit(8168.150:1922): avc: denied { getattr } for pid=3187 comm="dhcpcd" path="/run/udev/data/n24" dev="tmpfs" ino=13681 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8170.454722][ T29] audit: type=1400 audit(8169.760:1923): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8170.693398][ T29] audit: type=1400 audit(8170.000:1924): avc: denied { read write } for pid=11249 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8170.887663][ T29] audit: type=1400 audit(8170.180:1925): avc: denied { read write open } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8171.096979][ T29] audit: type=1400 audit(8170.390:1926): avc: denied { ioctl } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8177.069362][ T29] audit: type=1400 audit(8176.390:1927): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8177.118633][ T29] audit: type=1400 audit(8176.440:1928): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8178.674175][ T29] audit: type=1400 audit(8177.990:1929): avc: denied { read write } for pid=11249 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8178.845618][ T29] audit: type=1400 audit(8178.160:1930): avc: denied { read write open } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8179.008140][ T29] audit: type=1400 audit(8178.330:1931): avc: denied { ioctl } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8185.488130][ T29] audit: type=1400 audit(8184.800:1932): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8186.113893][ T29] audit: type=1400 audit(8185.410:1933): avc: denied { search } for pid=11471 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8187.531343][ T29] audit: type=1400 audit(8186.850:1934): avc: denied { read write } for pid=11249 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8187.707677][ T29] audit: type=1400 audit(8187.030:1935): avc: denied { read write open } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8187.934475][ T29] audit: type=1400 audit(8187.250:1936): avc: denied { ioctl } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8192.846385][ T29] audit: type=1400 audit(8192.160:1937): avc: denied { sys_module } for pid=11282 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 8193.044286][ T29] audit: type=1400 audit(8192.350:1938): avc: denied { module_request } for pid=11282 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 8194.817160][ T29] audit: type=1400 audit(8194.140:1939): avc: denied { search } for pid=11476 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8194.820438][ T29] audit: type=1400 audit(8194.140:1940): avc: denied { search } for pid=11476 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8194.864994][ T29] audit: type=1400 audit(8194.140:1941): avc: denied { search } for pid=11476 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8194.865995][ T29] audit: type=1400 audit(8194.170:1942): avc: denied { search } for pid=11476 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8196.406834][ T29] audit: type=1400 audit(8195.730:1943): avc: denied { read write } for pid=11249 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8196.524234][ T29] audit: type=1400 audit(8195.840:1944): avc: denied { read write open } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8196.566585][ T29] audit: type=1400 audit(8195.890:1945): avc: denied { ioctl } for pid=11249 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 8198.819872][ T29] audit: type=1400 audit(8198.120:1946): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8198.820732][ T29] audit: type=1400 audit(8198.130:1947): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8198.829951][ T29] audit: type=1400 audit(8198.130:1948): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8198.830359][ T29] audit: type=1400 audit(8198.130:1949): avc: denied { read } for pid=11480 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8198.958364][ T29] audit: type=1400 audit(8198.280:1950): avc: denied { read open } for pid=11480 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8199.125924][ T29] audit: type=1400 audit(8198.440:1951): avc: denied { getattr } for pid=11480 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8199.513850][ T29] audit: type=1400 audit(8198.830:1952): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8199.514783][ T29] audit: type=1400 audit(8198.830:1953): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8199.515069][ T29] audit: type=1400 audit(8198.830:1954): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8199.557181][ T29] audit: type=1400 audit(8198.870:1955): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8203.144780][T11282] veth0_vlan: entered promiscuous mode [ 8203.828183][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 8203.834653][ T29] audit: type=1400 audit(8203.150:2015): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8204.309171][ T29] audit: type=1400 audit(8203.630:2016): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8204.318937][ T29] audit: type=1400 audit(8203.630:2017): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8204.334000][ T29] audit: type=1400 audit(8203.630:2018): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8204.341884][ T29] audit: type=1400 audit(8203.630:2019): avc: denied { read } for pid=11480 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8204.573908][ T29] audit: type=1400 audit(8203.870:2020): avc: denied { read open } for pid=11480 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8204.744059][ T29] audit: type=1400 audit(8204.060:2021): avc: denied { getattr } for pid=11480 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8204.993833][ T29] audit: type=1400 audit(8204.280:2022): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8205.001032][ T29] audit: type=1400 audit(8204.310:2023): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8205.011227][ T29] audit: type=1400 audit(8204.310:2024): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8205.278062][T11282] veth1_vlan: entered promiscuous mode [ 8208.965607][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 8208.968791][ T29] audit: type=1400 audit(8208.260:2079): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8208.977760][ T29] audit: type=1400 audit(8208.280:2080): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8209.026490][ T29] audit: type=1400 audit(8208.280:2081): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8209.027412][ T29] audit: type=1400 audit(8208.280:2082): avc: denied { read } for pid=11480 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8209.125409][ T29] audit: type=1400 audit(8208.420:2083): avc: denied { read open } for pid=11480 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8209.147648][ T29] audit: type=1400 audit(8208.470:2084): avc: denied { getattr } for pid=11480 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8209.258126][ T29] audit: type=1400 audit(8208.580:2085): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8209.285549][ T29] audit: type=1400 audit(8208.580:2086): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=396 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8209.286521][ T29] audit: type=1400 audit(8208.600:2087): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8209.286863][ T29] audit: type=1400 audit(8208.600:2088): avc: denied { search } for pid=11480 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8211.569949][T11282] veth0_macvtap: entered promiscuous mode [ 8212.506753][T11282] veth1_macvtap: entered promiscuous mode [ 8214.074452][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 8214.077589][ T29] audit: type=1400 audit(8213.380:2132): avc: denied { search } for pid=11476 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8214.210226][ T29] audit: type=1400 audit(8213.530:2133): avc: denied { search } for pid=11476 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8215.553421][ T29] audit: type=1400 audit(8214.870:2134): avc: denied { read write } for pid=11249 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 8216.817140][ T5928] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 8216.821951][ T5928] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 8216.850863][ T5928] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 8216.924457][ T8799] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 8219.138874][ T29] audit: type=1400 audit(8218.450:2135): avc: denied { search } for pid=11486 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8220.994994][ T29] audit: type=1400 audit(8220.310:2136): avc: denied { mounton } for pid=11282 comm="syz-executor" path="/syzkaller.iIjsxF/syz-tmp" dev="vda" ino=1879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=0 [ 8222.312305][ T5928] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8222.627149][ T29] audit: type=1400 audit(8221.950:2137): avc: denied { execute } for pid=11490 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=0 [ 8222.837901][ T29] audit: type=1400 audit(8222.130:2138): avc: denied { write } for pid=3337 comm="syz-executor" path="pipe:[3159]" dev="pipefs" ino=3159 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 8222.963495][ T29] audit: type=1400 audit(8222.280:2139): avc: denied { write } for pid=3337 comm="syz-executor" path="pipe:[3159]" dev="pipefs" ino=3159 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 8223.098826][ T5928] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8223.147867][ T29] audit: type=1400 audit(8222.470:2140): avc: denied { read write } for pid=11249 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 8223.454216][ T29] audit: type=1400 audit(8222.770:2141): avc: denied { search } for pid=11487 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8223.499872][ T5928] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8223.972847][ T5928] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8226.567710][ T29] audit: type=1400 audit(8225.890:2142): avc: denied { search } for pid=11491 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8226.759164][ T29] audit: type=1400 audit(8226.080:2143): avc: denied { search } for pid=11476 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8228.808714][ T5928] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 8228.880625][ T5928] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 8228.935949][ T5928] bond0 (unregistering): Released all slaves [ 8229.180190][ T3187] 8021q: adding VLAN 0 to HW filter on device eth7 [ 8229.398664][ T29] audit: type=1400 audit(8228.720:2144): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8229.566009][ T29] audit: type=1400 audit(8228.890:2145): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8229.663521][ T5928] hsr_slave_0: left promiscuous mode [ 8229.707037][ T5928] hsr_slave_1: left promiscuous mode [ 8229.759791][ T5928] veth1_macvtap: left promiscuous mode [ 8229.766778][ T5928] veth0_macvtap: left promiscuous mode [ 8229.768115][ T5928] veth1_vlan: left promiscuous mode [ 8229.769068][ T5928] veth0_vlan: left promiscuous mode [ 8234.808829][ T29] audit: type=1400 audit(8234.130:2146): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8235.177757][ T29] audit: type=1400 audit(8234.500:2147): avc: denied { search } for pid=3187 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8235.235573][ T29] audit: type=1400 audit(8234.560:2148): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8235.290750][ T29] audit: type=1400 audit(8234.610:2149): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8235.389938][ T29] audit: type=1400 audit(8234.690:2150): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8235.677367][ T29] audit: type=1400 audit(8234.900:2151): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8235.728956][ T29] audit: type=1400 audit(8235.050:2152): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8235.774189][ T29] audit: type=1400 audit(8235.090:2153): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8235.825047][ T29] audit: type=1400 audit(8235.150:2154): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8235.884222][ T29] audit: type=1400 audit(8235.210:2155): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8236.244440][ T5928] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8236.525835][ T5928] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8236.902320][ T5928] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8237.219597][ T5928] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8240.276242][ T5928] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 8240.416703][ T5928] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 8240.489253][ T5928] bond0 (unregistering): Released all slaves [ 8240.926473][ T5928] hsr_slave_0: left promiscuous mode [ 8240.986780][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 8240.988446][ T29] audit: type=1400 audit(8240.310:2179): avc: denied { search } for pid=11497 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8241.015666][ T5928] hsr_slave_1: left promiscuous mode [ 8241.180636][ T5928] veth1_macvtap: left promiscuous mode [ 8241.181528][ T5928] veth0_macvtap: left promiscuous mode [ 8241.195358][ T5928] veth1_vlan: left promiscuous mode [ 8241.197898][ T5928] veth0_vlan: left promiscuous mode [ 8241.393398][ T29] audit: type=1400 audit(8240.700:2180): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8241.567707][ T29] audit: type=1400 audit(8240.880:2181): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8245.916918][ T29] audit: type=1400 audit(8245.240:2182): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8246.042157][ T29] audit: type=1400 audit(8245.360:2183): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8246.195414][ T29] audit: type=1400 audit(8245.510:2184): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8246.334767][ T29] audit: type=1400 audit(8245.650:2185): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8246.506952][ T29] audit: type=1400 audit(8245.830:2186): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8246.664817][ T29] audit: type=1400 audit(8245.990:2187): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8246.823052][ T29] audit: type=1400 audit(8246.140:2188): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8247.015540][ T29] audit: type=1400 audit(8246.340:2189): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8247.204871][ T29] audit: type=1400 audit(8246.510:2190): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8247.313065][ T29] audit: type=1400 audit(8246.630:2191): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8247.446446][ T29] audit: type=1400 audit(8246.770:2192): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8251.107045][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 8251.129347][ T29] audit: type=1400 audit(8250.430:2211): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8251.174472][ T29] audit: type=1400 audit(8250.480:2212): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8251.381558][ T29] audit: type=1400 audit(8250.700:2213): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8251.480355][ T29] audit: type=1400 audit(8250.800:2214): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8251.624363][ T29] audit: type=1400 audit(8250.940:2215): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8252.635990][ T29] audit: type=1400 audit(8251.960:2216): avc: denied { search } for pid=11504 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8252.761259][ T29] audit: type=1400 audit(8252.080:2217): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8252.878865][ T29] audit: type=1400 audit(8252.190:2218): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8253.010632][ T29] audit: type=1400 audit(8252.330:2219): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8253.070675][ T29] audit: type=1400 audit(8252.370:2220): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8256.321243][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 8256.323830][ T29] audit: type=1400 audit(8255.640:2244): avc: denied { search } for pid=11508 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8256.418056][ T29] audit: type=1400 audit(8255.740:2245): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8256.487948][ T29] audit: type=1400 audit(8255.800:2246): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8256.604743][ T29] audit: type=1400 audit(8255.920:2247): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8256.665006][ T29] audit: type=1400 audit(8255.990:2248): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8256.706449][ T29] audit: type=1400 audit(8256.030:2249): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8256.776163][ T29] audit: type=1400 audit(8256.100:2250): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8257.024942][ T29] audit: type=1400 audit(8256.350:2251): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8257.164281][ T29] audit: type=1400 audit(8256.480:2252): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8257.234501][ T29] audit: type=1400 audit(8256.550:2253): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8261.437665][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 8261.453821][ T29] audit: type=1400 audit(8260.760:2280): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8261.584213][ T29] audit: type=1400 audit(8260.900:2281): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8261.716444][ T29] audit: type=1400 audit(8261.040:2282): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8261.817634][ T29] audit: type=1400 audit(8261.140:2283): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8261.957776][ T29] audit: type=1400 audit(8261.280:2284): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8262.024862][ T29] audit: type=1400 audit(8261.330:2285): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8262.173965][ T29] audit: type=1400 audit(8261.490:2286): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8262.234363][ T29] audit: type=1400 audit(8261.550:2287): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8262.384297][ T29] audit: type=1400 audit(8261.700:2288): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8262.446175][ T29] audit: type=1400 audit(8261.770:2289): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8266.493892][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 8266.503585][ T29] audit: type=1400 audit(8265.810:2325): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8266.639608][ T29] audit: type=1400 audit(8265.960:2326): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8266.788677][ T29] audit: type=1400 audit(8266.110:2327): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8266.961908][ T29] audit: type=1400 audit(8266.280:2328): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8267.097181][ T29] audit: type=1400 audit(8266.420:2329): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8267.304492][ T29] audit: type=1400 audit(8266.620:2330): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8267.371373][ T29] audit: type=1400 audit(8266.690:2331): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8268.641882][ T29] audit: type=1400 audit(8267.960:2332): avc: denied { search } for pid=11519 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8268.747918][ T29] audit: type=1400 audit(8268.070:2333): avc: denied { search } for pid=11520 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8268.829053][ T29] audit: type=1400 audit(8268.150:2334): avc: denied { search } for pid=11520 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8272.753885][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 8272.756540][ T29] audit: type=1400 audit(8272.070:2374): avc: denied { search } for pid=11522 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8274.108738][ T29] audit: type=1400 audit(8273.430:2375): avc: denied { search } for pid=11523 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8275.311340][ T29] audit: type=1400 audit(8274.630:2376): avc: denied { search } for pid=11524 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8275.684673][ T29] audit: type=1400 audit(8275.010:2377): avc: denied { search } for pid=11519 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8275.838927][ T29] audit: type=1400 audit(8275.150:2378): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8275.937105][ T29] audit: type=1400 audit(8275.260:2379): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8276.068809][ T29] audit: type=1400 audit(8275.390:2380): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8276.178323][ T29] audit: type=1400 audit(8275.500:2381): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8276.236826][ T29] audit: type=1400 audit(8275.560:2382): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8276.330161][ T29] audit: type=1400 audit(8275.650:2383): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 8277.869049][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 8277.869633][ T29] audit: type=1400 audit(8277.190:2388): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8277.980253][ T29] audit: type=1400 audit(8277.300:2389): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8278.056941][ T29] audit: type=1400 audit(8277.380:2390): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8278.127370][ T29] audit: type=1400 audit(8277.450:2391): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8278.201133][ T29] audit: type=1400 audit(8277.520:2392): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8278.274050][ T29] audit: type=1400 audit(8277.580:2393): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8278.369627][ T29] audit: type=1400 audit(8277.690:2394): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8278.462265][ T29] audit: type=1400 audit(8277.780:2395): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8278.533180][ T29] audit: type=1400 audit(8277.850:2396): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8278.599642][ T29] audit: type=1400 audit(8277.920:2397): avc: denied { search } for pid=11527 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 8283.886705][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 8283.887572][ T29] audit: type=1400 audit(8283.200:2430): avc: denied { search } for pid=11530 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0