Hi folks, It seems that after commit 13c164b1a186 ("autofs: switch to kernel_write") there is now an extra LSM permission required (for the current task to write to the automount pipe) for processes accessing some yet-to-to-be mounted directory on which an autofs mount is set up. The call chain is: [...] autofs_wait() -> autofs_notify_daemon() -> autofs_write() -> kernel_write() -> rw_verify_area() -> security_file_permission() The bug report that led me to this commit is at [1]. Technically, this is a regression for LSM users, since this is a kernel-internal operation and an LSM permission for the current task shouldn't be required. Can this patch be reverted? Perhaps __kernel_{read|write}() could instead be renamed to kernel_*_nocheck() so that the name is more descriptive? Thanks, [1] https://bugzilla.redhat.com/show_bug.cgi?id=1874338 -- Ondrej Mosnacek Software Engineer, Platform Security - SELinux kernel Red Hat, Inc.