[ 264.445344][ T28] audit: type=1400 audit(264.340:56): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.449671][ T28] audit: type=1400 audit(264.340:57): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:10792' (ED25519) to the list of known hosts. [ 324.442294][ T28] audit: type=1400 audit(324.340:58): avc: denied { execute } for pid=3097 comm="sh" name="syz-execprog" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 324.446515][ T28] audit: type=1400 audit(324.340:59): avc: denied { execute_no_trans } for pid=3097 comm="sh" path="/syz-execprog" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:06:10 parsed 1 programs [ 370.926010][ T28] audit: type=1400 audit(370.820:60): avc: denied { node_bind } for pid=3097 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 374.140751][ T28] audit: type=1400 audit(374.040:61): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=808 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 374.145892][ T28] audit: type=1400 audit(374.040:62): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 374.166217][ T3112] cgroup: Unknown subsys name 'net' [ 374.178409][ T28] audit: type=1400 audit(374.070:63): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 374.349096][ T3112] cgroup: Unknown subsys name 'cpuset' [ 374.354804][ T3112] cgroup: Unknown subsys name 'hugetlb' [ 374.358260][ T3112] cgroup: Unknown subsys name 'rlimit' [ 374.599479][ T28] audit: type=1400 audit(374.500:64): avc: denied { setattr } for pid=3112 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 374.601708][ T28] audit: type=1400 audit(374.500:65): avc: denied { create } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 374.606323][ T28] audit: type=1400 audit(374.500:66): avc: denied { write } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 374.613018][ T28] audit: type=1400 audit(374.500:67): avc: denied { module_request } for pid=3112 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 374.704171][ T28] audit: type=1400 audit(374.600:68): avc: denied { read } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 374.710479][ T28] audit: type=1400 audit(374.610:69): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 374.932448][ T3115] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 381.936514][ T3112] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 391.909742][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 391.910122][ T28] audit: type=1400 audit(391.800:75): avc: denied { execmem } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 391.956441][ T28] audit: type=1400 audit(391.850:76): avc: denied { read } for pid=3118 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 391.969040][ T28] audit: type=1400 audit(391.860:77): avc: denied { open } for pid=3118 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 391.969318][ T28] audit: type=1400 audit(391.860:78): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 392.162443][ T28] audit: type=1400 audit(392.060:79): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 392.175119][ T28] audit: type=1400 audit(392.070:80): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/syzkaller.LnF07h/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 392.185572][ T28] audit: type=1400 audit(392.080:81): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 392.200190][ T28] audit: type=1400 audit(392.100:82): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/syzkaller.LnF07h/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 392.206285][ T28] audit: type=1400 audit(392.100:83): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/syzkaller.LnF07h/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1909 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 392.229093][ T28] audit: type=1400 audit(392.130:84): avc: denied { unmount } for pid=3118 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 392.335007][ T3118] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 395.208292][ T3142] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 395.214235][ T3142] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 395.875552][ T3142] hsr_slave_0: entered promiscuous mode [ 395.882424][ T3142] hsr_slave_1: entered promiscuous mode [ 396.288565][ T3142] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 396.300851][ T3142] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 396.312538][ T3142] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 396.322252][ T3142] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 397.119618][ T3142] 8021q: adding VLAN 0 to HW filter on device bond0 [ 399.361028][ T3142] veth0_vlan: entered promiscuous mode [ 399.380663][ T3142] veth1_vlan: entered promiscuous mode [ 399.446214][ T3142] veth0_macvtap: entered promiscuous mode [ 399.460236][ T3142] veth1_macvtap: entered promiscuous mode [ 399.523251][ T3116] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 399.525491][ T3116] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 399.530545][ T3116] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 399.531049][ T3116] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 399.876719][ T31] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 400.301907][ T31] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 400.364171][ T31] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 400.413657][ T31] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 400.645712][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 400.655278][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 400.659649][ T31] bond0 (unregistering): Released all slaves [ 400.760607][ T31] hsr_slave_0: left promiscuous mode [ 400.763357][ T31] hsr_slave_1: left promiscuous mode [ 400.782800][ T31] veth1_macvtap: left promiscuous mode [ 400.784131][ T31] veth0_macvtap: left promiscuous mode [ 400.789009][ T31] veth1_vlan: left promiscuous mode [ 400.790467][ T31] veth0_vlan: left promiscuous mode [ 401.706007][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 401.706392][ T28] audit: type=1400 audit(401.600:94): avc: denied { create } for pid=3538 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 401.716392][ T28] audit: type=1400 audit(401.610:95): avc: denied { sys_admin } for pid=3538 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 401.970333][ T28] audit: type=1400 audit(401.870:96): avc: denied { sys_chroot } for pid=3539 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 402.472735][ T28] audit: type=1400 audit(402.370:97): avc: denied { ioctl } for pid=3567 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 402.825319][ T28] audit: type=1400 audit(402.720:98): avc: denied { create } for pid=3599 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 403.246500][ T28] audit: type=1401 audit(403.140:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 1970/01/01 00:06:51 executed programs: 0 [ 413.779778][ T3721] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 413.785737][ T3721] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 414.370675][ T3721] hsr_slave_0: entered promiscuous mode [ 414.371664][ T3721] hsr_slave_1: entered promiscuous mode [ 414.725583][ T3721] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 414.734346][ T3721] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 414.743372][ T3721] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 414.751807][ T3721] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 415.424675][ T3721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 418.072119][ T3721] veth0_vlan: entered promiscuous mode [ 418.091543][ T3721] veth1_vlan: entered promiscuous mode [ 418.152079][ T3721] veth0_macvtap: entered promiscuous mode [ 418.165078][ T3721] veth1_macvtap: entered promiscuous mode [ 418.238730][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.239162][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.239547][ T31] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.239624][ T31] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:06:58 executed programs: 2 [ 418.507196][ T28] audit: type=1404 audit(418.400:100): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 420.273957][ T28] audit: type=1400 audit(420.170:101): avc: denied { write } for pid=4052 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.309306][ T28] audit: type=1400 audit(420.210:102): avc: denied { search } for pid=4052 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.350396][ T28] audit: type=1400 audit(420.250:103): avc: denied { search } for pid=4057 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.353767][ T28] audit: type=1400 audit(420.250:104): avc: denied { search } for pid=4057 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.356870][ T28] audit: type=1400 audit(420.250:105): avc: denied { search } for pid=4057 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.364036][ T28] audit: type=1400 audit(420.260:106): avc: denied { search } for pid=4057 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.369558][ T28] audit: type=1400 audit(420.270:107): avc: denied { search } for pid=4057 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.374214][ T28] audit: type=1400 audit(420.270:108): avc: denied { search } for pid=4057 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.376877][ T28] audit: type=1400 audit(420.270:109): avc: denied { search } for pid=4057 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.513394][ T28] kauditd_printk_skb: 144 callbacks suppressed [ 423.513780][ T28] audit: type=1400 audit(423.410:254): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 423.560741][ T28] audit: type=1400 audit(423.460:255): avc: denied { getattr } for pid=4119 comm="mkdir" path="/run" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.566903][ T28] audit: type=1400 audit(423.460:256): avc: denied { search } for pid=4115 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.570242][ T28] audit: type=1400 audit(423.470:257): avc: denied { search } for pid=4115 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.574063][ T28] audit: type=1400 audit(423.470:258): avc: denied { search } for pid=4115 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.584207][ T28] audit: type=1400 audit(423.470:259): avc: denied { search } for pid=4115 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.584496][ T28] audit: type=1400 audit(423.470:260): avc: denied { search } for pid=4115 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.584610][ T28] audit: type=1400 audit(423.470:261): avc: denied { search } for pid=4115 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.661262][ T28] audit: type=1400 audit(423.560:262): avc: denied { search } for pid=4121 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 423.777200][ T28] audit: type=1400 audit(423.670:263): avc: denied { search } for pid=4123 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 428.572665][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 428.575362][ T28] audit: type=1400 audit(428.470:266): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 433.603657][ T28] audit: type=1400 audit(433.500:267): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 438.673567][ T28] audit: type=1400 audit(438.570:268): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 443.753015][ T28] audit: type=1400 audit(443.650:269): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 448.822373][ T28] audit: type=1400 audit(448.720:270): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 453.873724][ T28] audit: type=1400 audit(453.770:271): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 458.907795][ T28] audit: type=1400 audit(458.800:272): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 459.555177][ T28] audit: type=1400 audit(459.450:273): avc: denied { execute } for pid=4657 comm="syz-executor" name="syz-executor" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=0 [ 459.560790][ T28] audit: type=1400 audit(459.450:274): avc: denied { write } for pid=3112 comm="syz-executor" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 459.566692][ T28] audit: type=1400 audit(459.450:275): avc: denied { write } for pid=3112 comm="syz-executor" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 459.692244][ T28] audit: type=1400 audit(459.590:276): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[571]" dev="pipefs" ino=571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 459.755985][ T67] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 459.905973][ T67] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 459.961152][ T67] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 460.073421][ T67] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 460.353124][ T67] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 460.366138][ T67] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 460.370569][ T67] bond0 (unregistering): Released all slaves [ 460.460436][ T67] hsr_slave_0: left promiscuous mode [ 460.462932][ T67] hsr_slave_1: left promiscuous mode [ 460.473549][ T67] veth1_macvtap: left promiscuous mode [ 460.473896][ T67] veth0_macvtap: left promiscuous mode [ 460.474318][ T67] veth1_vlan: left promiscuous mode [ 460.474436][ T67] veth0_vlan: left promiscuous mode [ 460.988849][ T28] audit: type=1400 audit(460.890:277): avc: denied { write } for pid=4673 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 461.082200][ T28] audit: type=1400 audit(460.980:278): avc: denied { write } for pid=4674 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 461.089573][ T28] audit: type=1400 audit(460.990:279): avc: denied { search } for pid=4674 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 461.115480][ T28] audit: type=1400 audit(461.010:280): avc: denied { search } for pid=4675 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 461.120768][ T28] audit: type=1400 audit(461.020:281): avc: denied { search } for pid=4675 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 463.971048][ T28] kauditd_printk_skb: 133 callbacks suppressed [ 463.971574][ T28] audit: type=1400 audit(463.870:415): avc: denied { write } for pid=4697 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 464.059960][ T28] audit: type=1400 audit(463.960:416): avc: denied { write } for pid=4698 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 464.070324][ T28] audit: type=1400 audit(463.970:417): avc: denied { search } for pid=4698 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 464.086570][ T28] audit: type=1400 audit(463.980:418): avc: denied { search } for pid=4699 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 464.093850][ T28] audit: type=1400 audit(463.990:419): avc: denied { search } for pid=4699 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 464.095535][ T28] audit: type=1400 audit(463.990:420): avc: denied { search } for pid=4699 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 464.100700][ T28] audit: type=1400 audit(463.990:421): avc: denied { search } for pid=4699 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 464.103131][ T28] audit: type=1400 audit(463.990:422): avc: denied { search } for pid=4699 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 464.104274][ T28] audit: type=1400 audit(464.000:423): avc: denied { search } for pid=4699 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 464.105721][ T28] audit: type=1400 audit(464.000:424): avc: denied { search } for pid=4699 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.884791][ T28] kauditd_printk_skb: 44 callbacks suppressed [ 475.886118][ T28] audit: type=1400 audit(475.780:469): avc: denied { write } for pid=4716 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 475.903907][ T28] audit: type=1400 audit(475.800:470): avc: denied { search } for pid=4716 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.931637][ T28] audit: type=1400 audit(475.820:471): avc: denied { search } for pid=4717 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.937086][ T28] audit: type=1400 audit(475.830:472): avc: denied { search } for pid=4717 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.942273][ T28] audit: type=1400 audit(475.840:473): avc: denied { search } for pid=4717 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.946092][ T28] audit: type=1400 audit(475.840:474): avc: denied { search } for pid=4717 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.951372][ T28] audit: type=1400 audit(475.840:475): avc: denied { search } for pid=4717 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.954375][ T28] audit: type=1400 audit(475.840:476): avc: denied { search } for pid=4717 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.959280][ T28] audit: type=1400 audit(475.840:477): avc: denied { search } for pid=4717 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 475.962577][ T28] audit: type=1400 audit(475.840:478): avc: denied { search } for pid=4717 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0