[ 194.555732][ T29] audit: type=1400 audit(194.470:56): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 194.558377][ T29] audit: type=1400 audit(194.470:57): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:64972' (ED25519) to the list of known hosts. [ 248.422303][ T29] audit: type=1400 audit(248.330:58): avc: denied { execute } for pid=3097 comm="sh" name="syz-execprog" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 248.468544][ T29] audit: type=1400 audit(248.370:59): avc: denied { execute_no_trans } for pid=3097 comm="sh" path="/syz-execprog" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:05:03 parsed 1 programs [ 303.615085][ T29] audit: type=1400 audit(303.530:60): avc: denied { node_bind } for pid=3097 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 306.978738][ T29] audit: type=1400 audit(306.890:61): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=808 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 306.987632][ T29] audit: type=1400 audit(306.900:62): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 307.007076][ T3105] cgroup: Unknown subsys name 'net' [ 307.019635][ T29] audit: type=1400 audit(306.930:63): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 307.244201][ T3105] cgroup: Unknown subsys name 'cpuset' [ 307.250275][ T3105] cgroup: Unknown subsys name 'hugetlb' [ 307.252053][ T3105] cgroup: Unknown subsys name 'rlimit' [ 307.490877][ T29] audit: type=1400 audit(307.400:64): avc: denied { setattr } for pid=3105 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 307.496213][ T29] audit: type=1400 audit(307.410:65): avc: denied { create } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 307.500224][ T29] audit: type=1400 audit(307.410:66): avc: denied { write } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 307.505647][ T29] audit: type=1400 audit(307.420:67): avc: denied { module_request } for pid=3105 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 307.592282][ T29] audit: type=1400 audit(307.500:68): avc: denied { read } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 307.600680][ T29] audit: type=1400 audit(307.510:69): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 307.833070][ T3108] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 315.839987][ T3105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 325.703370][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 325.704978][ T29] audit: type=1400 audit(325.610:75): avc: denied { execmem } for pid=3109 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 326.567463][ T29] audit: type=1400 audit(326.480:76): avc: denied { read } for pid=3111 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 326.583949][ T29] audit: type=1400 audit(326.490:77): avc: denied { open } for pid=3111 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 326.584356][ T29] audit: type=1400 audit(326.490:78): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 326.808927][ T29] audit: type=1400 audit(326.720:79): avc: denied { ioctl } for pid=3111 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 326.930448][ T29] audit: type=1400 audit(326.840:80): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 326.948417][ T29] audit: type=1400 audit(326.860:81): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzkaller.a9bhR6/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 326.953427][ T29] audit: type=1400 audit(326.860:82): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 326.991333][ T29] audit: type=1400 audit(326.900:83): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzkaller.a9bhR6/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 326.999932][ T29] audit: type=1400 audit(326.910:84): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzkaller.a9bhR6/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 327.210591][ T3111] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 335.093732][ T3188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 335.097917][ T3188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 335.865386][ T3188] hsr_slave_0: entered promiscuous mode [ 335.868403][ T3188] hsr_slave_1: entered promiscuous mode [ 336.149210][ T3188] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 336.159678][ T3188] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 336.166731][ T3188] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 336.173579][ T3188] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 336.883762][ T3188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.586155][ T3188] veth0_vlan: entered promiscuous mode [ 339.612058][ T3188] veth1_vlan: entered promiscuous mode [ 339.672250][ T3188] veth0_macvtap: entered promiscuous mode [ 339.679201][ T3188] veth1_macvtap: entered promiscuous mode [ 339.733022][ T3140] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.736233][ T3140] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.737652][ T3140] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.737959][ T3140] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.045572][ T1293] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 340.106119][ T1293] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 340.186484][ T1293] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 340.256679][ T1293] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 340.588129][ T1293] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 340.596689][ T1293] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 340.601662][ T1293] bond0 (unregistering): Released all slaves [ 340.669547][ T1293] hsr_slave_0: left promiscuous mode [ 340.673280][ T1293] hsr_slave_1: left promiscuous mode [ 340.683275][ T1293] veth1_macvtap: left promiscuous mode [ 340.685697][ T1293] veth0_macvtap: left promiscuous mode [ 340.687573][ T1293] veth1_vlan: left promiscuous mode [ 340.689868][ T1293] veth0_vlan: left promiscuous mode [ 341.347361][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 341.347905][ T29] audit: type=1400 audit(341.260:96): avc: denied { create } for pid=3556 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 343.172229][ T29] audit: type=1400 audit(343.080:97): avc: denied { create } for pid=3642 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 343.180717][ T29] audit: type=1400 audit(343.090:98): avc: denied { sys_admin } for pid=3642 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 343.306570][ T29] audit: type=1400 audit(343.220:99): avc: denied { sys_chroot } for pid=3644 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 1970/01/01 00:05:48 executed programs: 0 [ 349.684917][ T3714] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 349.690793][ T3714] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 350.485229][ T3714] hsr_slave_0: entered promiscuous mode [ 350.488733][ T3714] hsr_slave_1: entered promiscuous mode [ 350.747643][ T3714] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 350.757305][ T3714] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 350.762323][ T3714] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 350.769127][ T3714] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 351.316436][ T3714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.729186][ T3714] veth0_vlan: entered promiscuous mode [ 353.745719][ T3714] veth1_vlan: entered promiscuous mode [ 353.805718][ T3714] veth0_macvtap: entered promiscuous mode [ 353.814697][ T3714] veth1_macvtap: entered promiscuous mode [ 353.871996][ T1293] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.875672][ T1293] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.876014][ T1293] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.876233][ T1293] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:05:53 executed programs: 2 [ 354.116693][ T29] audit: type=1404 audit(354.030:100): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 357.034071][ T29] audit: type=1400 audit(356.950:101): avc: denied { write } for pid=4064 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 357.058198][ T29] audit: type=1400 audit(356.970:102): avc: denied { search } for pid=4064 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 357.090837][ T29] audit: type=1400 audit(357.000:103): avc: denied { search } for pid=4068 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 357.105984][ T29] audit: type=1400 audit(357.020:104): avc: denied { search } for pid=4068 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 357.107723][ T29] audit: type=1400 audit(357.020:105): avc: denied { search } for pid=4068 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 357.114038][ T29] audit: type=1400 audit(357.020:106): avc: denied { search } for pid=4068 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 357.116636][ T29] audit: type=1400 audit(357.030:107): avc: denied { search } for pid=4068 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 357.124300][ T29] audit: type=1400 audit(357.030:108): avc: denied { search } for pid=4068 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 357.124893][ T29] audit: type=1400 audit(357.030:109): avc: denied { search } for pid=4068 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.135589][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 359.136192][ T29] audit: type=1400 audit(359.050:186): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.140309][ T29] audit: type=1400 audit(359.050:187): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.147496][ T29] audit: type=1400 audit(359.060:188): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.149989][ T29] audit: type=1400 audit(359.060:189): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.164202][ T29] audit: type=1400 audit(359.070:190): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.165434][ T29] audit: type=1400 audit(359.070:191): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.165567][ T29] audit: type=1400 audit(359.070:192): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.165626][ T29] audit: type=1400 audit(359.070:193): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.165675][ T29] audit: type=1400 audit(359.070:194): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 359.165740][ T29] audit: type=1400 audit(359.070:195): avc: denied { search } for pid=4111 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 364.167689][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 364.169236][ T29] audit: type=1400 audit(364.080:266): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 369.219041][ T29] audit: type=1400 audit(369.130:267): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 374.235184][ T29] audit: type=1400 audit(374.140:268): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 379.273051][ T29] audit: type=1400 audit(379.180:269): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 384.288065][ T29] audit: type=1400 audit(384.200:270): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 389.307146][ T29] audit: type=1400 audit(389.220:271): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 393.421342][ T29] audit: type=1400 audit(393.330:272): avc: denied { execute } for pid=4651 comm="syz-executor" name="syz-executor" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=0 [ 393.425750][ T29] audit: type=1400 audit(393.340:273): avc: denied { write } for pid=3105 comm="syz-executor" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 393.431942][ T29] audit: type=1400 audit(393.340:274): avc: denied { write } for pid=3105 comm="syz-executor" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 393.580482][ T29] audit: type=1400 audit(393.490:275): avc: denied { write } for pid=3097 comm="syz-execprog" path="pipe:[1397]" dev="pipefs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 393.646058][ T12] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.710183][ T12] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.796807][ T12] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.886912][ T12] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.230677][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 394.239651][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 394.247884][ T12] bond0 (unregistering): Released all slaves [ 394.313485][ T12] hsr_slave_0: left promiscuous mode [ 394.316379][ T12] hsr_slave_1: left promiscuous mode [ 394.327241][ T12] veth1_macvtap: left promiscuous mode [ 394.328370][ T12] veth0_macvtap: left promiscuous mode [ 394.329745][ T12] veth1_vlan: left promiscuous mode [ 394.331754][ T12] veth0_vlan: left promiscuous mode [ 394.803172][ T29] audit: type=1400 audit(394.710:276): avc: denied { write } for pid=4667 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 394.948488][ T29] audit: type=1400 audit(394.860:277): avc: denied { write } for pid=4668 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 394.961334][ T29] audit: type=1400 audit(394.870:278): avc: denied { search } for pid=4668 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 394.986706][ T29] audit: type=1400 audit(394.900:279): avc: denied { search } for pid=4669 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 395.003234][ T29] audit: type=1400 audit(394.910:280): avc: denied { search } for pid=4669 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 395.003696][ T29] audit: type=1400 audit(394.910:281): avc: denied { search } for pid=4669 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 395.003779][ T29] audit: type=1400 audit(394.910:282): avc: denied { search } for pid=4669 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 395.003830][ T29] audit: type=1400 audit(394.910:283): avc: denied { search } for pid=4669 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 395.004063][ T29] audit: type=1400 audit(394.910:284): avc: denied { search } for pid=4669 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 395.004149][ T29] audit: type=1400 audit(394.910:285): avc: denied { search } for pid=4669 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.391644][ T29] kauditd_printk_skb: 182 callbacks suppressed [ 409.392152][ T29] audit: type=1400 audit(409.300:468): avc: denied { write } for pid=4710 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 409.408252][ T29] audit: type=1400 audit(409.320:469): avc: denied { search } for pid=4710 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.424984][ T29] audit: type=1400 audit(409.340:470): avc: denied { search } for pid=4711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.429211][ T29] audit: type=1400 audit(409.340:471): avc: denied { search } for pid=4711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.430822][ T29] audit: type=1400 audit(409.340:472): avc: denied { search } for pid=4711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.432276][ T29] audit: type=1400 audit(409.340:473): avc: denied { search } for pid=4711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.434866][ T29] audit: type=1400 audit(409.350:474): avc: denied { search } for pid=4711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.443373][ T29] audit: type=1400 audit(409.350:475): avc: denied { search } for pid=4711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.443732][ T29] audit: type=1400 audit(409.350:476): avc: denied { search } for pid=4711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 409.444062][ T29] audit: type=1400 audit(409.350:477): avc: denied { search } for pid=4711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.613314][ T29] kauditd_printk_skb: 186 callbacks suppressed [ 439.616174][ T29] audit: type=1400 audit(439.520:664): avc: denied { write } for pid=4738 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 439.627937][ T29] audit: type=1400 audit(439.540:665): avc: denied { search } for pid=4738 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.647481][ T29] audit: type=1400 audit(439.560:666): avc: denied { search } for pid=4739 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.650493][ T29] audit: type=1400 audit(439.560:667): avc: denied { search } for pid=4739 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.654322][ T29] audit: type=1400 audit(439.560:668): avc: denied { search } for pid=4739 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.657405][ T29] audit: type=1400 audit(439.570:669): avc: denied { search } for pid=4739 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.660951][ T29] audit: type=1400 audit(439.570:670): avc: denied { search } for pid=4739 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.665666][ T29] audit: type=1400 audit(439.580:671): avc: denied { search } for pid=4739 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.668949][ T29] audit: type=1400 audit(439.580:672): avc: denied { search } for pid=4739 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 439.672162][ T29] audit: type=1400 audit(439.580:673): avc: denied { search } for pid=4739 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0