Warning: Permanently added '10.128.1.125' (ED25519) to the list of known hosts.
2026/02/08 03:46:05 parsed 1 programs
[ 27.053188][ T28] audit: type=1400 audit(1770522365.798:64): avc: denied { node_bind } for pid=283 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 27.074003][ T28] audit: type=1400 audit(1770522365.798:65): avc: denied { module_request } for pid=283 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 28.200142][ T28] audit: type=1400 audit(1770522366.948:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 28.203428][ T290] cgroup: Unknown subsys name 'net'
[ 28.223336][ T28] audit: type=1400 audit(1770522366.948:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 28.250634][ T28] audit: type=1400 audit(1770522366.978:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 28.251156][ T290] cgroup: Unknown subsys name 'devices'
[ 28.392062][ T290] cgroup: Unknown subsys name 'hugetlb'
[ 28.397981][ T290] cgroup: Unknown subsys name 'rlimit'
[ 28.511642][ T28] audit: type=1400 audit(1770522367.258:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 28.534990][ T28] audit: type=1400 audit(1770522367.258:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 28.555688][ T28] audit: type=1400 audit(1770522367.258:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 28.576266][ T28] audit: type=1400 audit(1770522367.258:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 28.583433][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 28.597447][ T28] audit: type=1400 audit(1770522367.258:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 28.676001][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 29.423389][ T296] request_module fs-gadgetfs succeeded, but still no fs?
[ 29.674287][ T309] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.681389][ T309] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.688977][ T309] device bridge_slave_0 entered promiscuous mode
[ 29.696213][ T309] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.703462][ T309] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.711070][ T309] device bridge_slave_1 entered promiscuous mode
[ 29.760616][ T309] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.767677][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.775087][ T309] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.782268][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.804729][ T43] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.812634][ T43] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.820483][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 29.828210][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 29.838641][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 29.847032][ T43] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.854096][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.863329][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 29.871622][ T43] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.878660][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.892845][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 29.902448][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 29.917415][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 29.930269][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 29.938646][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 29.946414][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 29.954973][ T309] device veth0_vlan entered promiscuous mode
[ 29.966157][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 29.975501][ T309] device veth1_macvtap entered promiscuous mode
[ 29.986248][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 29.996468][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 30.651228][ T8] device bridge_slave_1 left promiscuous mode
[ 30.657439][ T8] bridge0: port 2(bridge_slave_1) entered disabled state
[ 30.665400][ T8] device bridge_slave_0 left promiscuous mode
[ 30.671713][ T8] bridge0: port 1(bridge_slave_0) entered disabled state
[ 30.680413][ T8] device veth1_macvtap left promiscuous mode
[ 30.686505][ T8] device veth0_vlan left promiscuous mode
2026/02/08 03:46:09 executed programs: 0
[ 30.864222][ T364] bridge0: port 1(bridge_slave_0) entered blocking state
[ 30.871319][ T364] bridge0: port 1(bridge_slave_0) entered disabled state
[ 30.878739][ T364] device bridge_slave_0 entered promiscuous mode
[ 30.885842][ T364] bridge0: port 2(bridge_slave_1) entered blocking state
[ 30.892907][ T364] bridge0: port 2(bridge_slave_1) entered disabled state
[ 30.900628][ T364] device bridge_slave_1 entered promiscuous mode
[ 30.948436][ T364] bridge0: port 2(bridge_slave_1) entered blocking state
[ 30.955507][ T364] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 30.962903][ T364] bridge0: port 1(bridge_slave_0) entered blocking state
[ 30.970046][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 30.990821][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 30.998712][ T43] bridge0: port 1(bridge_slave_0) entered disabled state
[ 31.006254][ T43] bridge0: port 2(bridge_slave_1) entered disabled state
[ 31.017600][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 31.026101][ T43] bridge0: port 1(bridge_slave_0) entered blocking state
[ 31.033848][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 31.041523][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 31.050179][ T43] bridge0: port 2(bridge_slave_1) entered blocking state
[ 31.057226][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 31.074391][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 31.083991][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 31.099187][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 31.112760][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 31.121347][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 31.129177][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 31.138070][ T364] device veth0_vlan entered promiscuous mode
[ 31.149877][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 31.159060][ T364] device veth1_macvtap entered promiscuous mode
[ 31.168565][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 31.178921][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 31.207715][ C1] ==================================================================
[ 31.215979][ C1] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6fa/0x960
[ 31.223838][ C1] Write of size 56 at addr ffff888110372690 by task syz.2.17/375
[ 31.231647][ C1]
[ 31.234076][ C1] CPU: 1 PID: 375 Comm: syz.2.17 Not tainted syzkaller #0
[ 31.241369][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026
[ 31.251626][ C1] Call Trace:
[ 31.254911][ C1]
[ 31.257759][ C1] __dump_stack+0x21/0x24
[ 31.262123][ C1] dump_stack_lvl+0x110/0x170
[ 31.266835][ C1] ? __cfi_dump_stack_lvl+0x8/0x8
[ 31.271921][ C1] ? __bpf_get_stackid+0x6fa/0x960
[ 31.277057][ C1] print_address_description+0x71/0x200
[ 31.282796][ C1] print_report+0x4a/0x60
[ 31.287146][ C1] kasan_report+0x122/0x150
[ 31.291754][ C1] ? __bpf_get_stackid+0x6fa/0x960
[ 31.296888][ C1] kasan_check_range+0x249/0x2a0
[ 31.301867][ C1] ? __bpf_get_stackid+0x6fa/0x960
[ 31.307253][ C1] memcpy+0x44/0x70
[ 31.311108][ C1] __bpf_get_stackid+0x6fa/0x960
[ 31.316078][ C1] bpf_get_stackid_pe+0x2ee/0x400
[ 31.321285][ C1] bpf_prog_fa73c8c086b491e8+0x21/0x31
[ 31.326914][ C1] bpf_overflow_handler+0x3d0/0x5e0
[ 31.332153][ C1] ? __cfi_bpf_overflow_handler+0x10/0x10
[ 31.337897][ C1] ? kvm_sched_clock_read+0x18/0x40
[ 31.343128][ C1] ? __this_cpu_preempt_check+0x13/0x20
[ 31.349364][ C1] ? __perf_event_account_interrupt+0x1a4/0x2c0
[ 31.355654][ C1] __perf_event_overflow+0x437/0x620
[ 31.360970][ C1] perf_swevent_hrtimer+0x400/0x5b0
[ 31.366199][ C1] ? __cfi_perf_swevent_hrtimer+0x10/0x10
[ 31.371947][ C1] ? timerqueue_add+0x20e/0x230
[ 31.376831][ C1] ? timerqueue_del+0xd3/0x120
[ 31.381624][ C1] ? __cfi_perf_swevent_hrtimer+0x10/0x10
[ 31.387363][ C1] __hrtimer_run_queues+0x3d5/0xa00
[ 31.392591][ C1] ? hrtimer_interrupt+0x8c0/0x8c0
[ 31.397729][ C1] ? ktime_get_update_offsets_now+0x30c/0x320
[ 31.403820][ C1] hrtimer_interrupt+0x3c7/0x8c0
[ 31.408789][ C1] __sysvec_apic_timer_interrupt+0x11e/0x440
[ 31.414808][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0
[ 31.420634][ C1]
[ 31.423588][ C1]
[ 31.426630][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ 31.432626][ C1] RIP: 0010:perf_ioctl+0x147a/0x1e70
[ 31.437933][ C1] Code: 00 65 48 8b 04 25 28 00 00 00 48 3b 84 24 40 02 00 00 0f 85 3e 09 00 00 4c 89 f8 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 41 6a d7 ff 45 31 ff e9 6e ff ff ff e8 34 6a d7 ff 41 bf ea ff
[ 31.457913][ C1] RSP: 0018:ffffc90000a67be0 EFLAGS: 00010246
[ 31.464094][ C1] RAX: ffffffff8199f62d RBX: 0000000000000000 RCX: 0000000000000000
[ 31.472170][ C1] RDX: ffff88811362bcc0 RSI: 0000000000000000 RDI: 0000000000000000
[ 31.480199][ C1] RBP: ffffc90000a67e80 R08: ffff888114a0c007 R09: 1ffff11022941800
[ 31.488377][ C1] R10: dffffc0000000000 R11: ffffed1022941801 R12: 0000000040042408
[ 31.496483][ C1] R13: dffffc0000000000 R14: fffff5200014cf8c R15: ffffc900007e5000
[ 31.504616][ C1] ? perf_ioctl+0x8dd/0x1e70
[ 31.509242][ C1] ? ioctl_has_perm+0x40f/0x4f0
[ 31.514121][ C1] ? has_cap_mac_admin+0x370/0x370
[ 31.519255][ C1] ? __cfi_perf_ioctl+0x10/0x10
[ 31.524133][ C1] ? __hrtimer_run_queues+0x9a5/0xa00
[ 31.529720][ C1] ? do_futex+0x2bf/0x430
[ 31.534165][ C1] ? selinux_file_ioctl+0x3a0/0x4d0
[ 31.539483][ C1] ? __cfi_do_futex+0x10/0x10
[ 31.544177][ C1] ? __cfi_selinux_file_ioctl+0x10/0x10
[ 31.549751][ C1] ? __se_sys_futex+0x136/0x310
[ 31.554637][ C1] ? security_file_ioctl+0x95/0xc0
[ 31.559798][ C1] ? __cfi_perf_ioctl+0x10/0x10
[ 31.564685][ C1] __se_sys_ioctl+0x12f/0x1b0
[ 31.569499][ C1] __x64_sys_ioctl+0x7b/0x90
[ 31.574202][ C1] x64_sys_call+0x58b/0x9a0
[ 31.578816][ C1] do_syscall_64+0x4c/0xa0
[ 31.583350][ C1] ? clear_bhb_loop+0x30/0x80
[ 31.588168][ C1] ? clear_bhb_loop+0x30/0x80
[ 31.592860][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 31.598774][ C1] RIP: 0033:0x7faf49f9aeb9
[ 31.603224][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
[ 31.622935][ C1] RSP: 002b:00007ffff5c41af8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 31.631469][ C1] RAX: ffffffffffffffda RBX: 00007faf4a215fa0 RCX: 00007faf49f9aeb9
[ 31.639478][ C1] RDX: 0000000000000004 RSI: 0000000040042408 RDI: 0000000000000005
[ 31.647564][ C1] RBP: 00007faf4a008c1f R08: 0000000000000000 R09: 0000000000000000
[ 31.655643][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 31.663636][ C1] R13: 00007faf4a215fac R14: 00007faf4a215fa0 R15: 00007faf4a215fa0
[ 31.671639][ C1]
[ 31.674763][ C1]
[ 31.677188][ C1] Allocated by task 375:
[ 31.681448][ C1] kasan_set_track+0x4b/0x70
[ 31.686154][ C1] kasan_save_alloc_info+0x25/0x30
[ 31.691307][ C1] __kasan_kmalloc+0x95/0xb0
[ 31.695920][ C1] __kmalloc_node+0xb2/0x1e0
[ 31.700630][ C1] bpf_map_area_alloc+0x4b/0xe0
[ 31.705500][ C1] prealloc_elems_and_freelist+0x8a/0x1e0
[ 31.711235][ C1] stack_map_alloc+0x3a7/0x530
[ 31.716021][ C1] map_create+0x49c/0xd80
[ 31.720543][ C1] __sys_bpf+0x34e/0x850
[ 31.724886][ C1] __x64_sys_bpf+0x7c/0x90
[ 31.729321][ C1] x64_sys_call+0x488/0x9a0
[ 31.734021][ C1] do_syscall_64+0x4c/0xa0
[ 31.738544][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 31.744643][ C1]
[ 31.746986][ C1] The buggy address belongs to the object at ffff888110372680
[ 31.746986][ C1] which belongs to the cache kmalloc-64 of size 64
[ 31.760957][ C1] The buggy address is located 16 bytes inside of
[ 31.760957][ C1] 64-byte region [ffff888110372680, ffff8881103726c0)
[ 31.774067][ C1]
[ 31.776403][ C1] The buggy address belongs to the physical page:
[ 31.782833][ C1] page:ffffea000440dc80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x110372
[ 31.793188][ C1] flags: 0x4000000000000200(slab|zone=1)
[ 31.798871][ C1] raw: 4000000000000200 0000000000000000 dead000000000122 ffff888100042780
[ 31.807480][ C1] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000
[ 31.816086][ C1] page dumped because: kasan: bad access detected
[ 31.822529][ C1] page_owner tracks the page as allocated
[ 31.828383][ C1] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 364, tgid 364 (syz-executor), ts 31188271111, free_ts 31092581716
[ 31.846681][ C1] post_alloc_hook+0x1f5/0x210
[ 31.851496][ C1] prep_new_page+0x1c/0x110
[ 31.856046][ C1] get_page_from_freelist+0x2d12/0x2d80
[ 31.861656][ C1] __alloc_pages+0x1d9/0x480
[ 31.866627][ C1] alloc_slab_page+0x6e/0xf0
[ 31.871246][ C1] new_slab+0x98/0x3d0
[ 31.875335][ C1] ___slab_alloc+0x6bd/0xb20
[ 31.880200][ C1] __slab_alloc+0x5e/0xa0
[ 31.884552][ C1] __kmem_cache_alloc_node+0x203/0x2c0
[ 31.890046][ C1] kmalloc_trace+0x29/0xb0
[ 31.894485][ C1] __request_module+0x2a7/0x910
[ 31.899350][ C1] dev_load+0x5b/0xb0
[ 31.903600][ C1] dev_ioctl+0x3c6/0xd10
[ 31.907938][ C1] sock_do_ioctl+0x252/0x330
[ 31.912540][ C1] sock_ioctl+0x4ca/0x720
[ 31.916877][ C1] __se_sys_ioctl+0x12f/0x1b0
[ 31.921835][ C1] page last free stack trace:
[ 31.926524][ C1] free_unref_page_prepare+0x742/0x750
[ 31.931997][ C1] free_unref_page+0x95/0x540
[ 31.936694][ C1] __free_pages+0x67/0x100
[ 31.941327][ C1] __free_slab+0xca/0x1a0
[ 31.945671][ C1] __unfreeze_partials+0x160/0x190
[ 31.950812][ C1] put_cpu_partial+0xa9/0x100
[ 31.955505][ C1] __slab_free+0x1c4/0x280
[ 31.960030][ C1] ___cache_free+0xbf/0xd0
[ 31.964461][ C1] qlist_free_all+0xc6/0x140
[ 31.969147][ C1] kasan_quarantine_reduce+0x14a/0x170
[ 31.974613][ C1] __kasan_slab_alloc+0x24/0x80
[ 31.979473][ C1] slab_post_alloc_hook+0x4f/0x2d0
[ 31.984613][ C1] __kmem_cache_alloc_node+0x192/0x2c0
[ 31.990086][ C1] __kmalloc_node+0xa1/0x1e0
[ 31.994692][ C1] kvmalloc_node+0x28a/0x460
[ 31.999310][ C1] rht_deferred_worker+0x2e8/0x14e0
[ 32.004539][ C1]
[ 32.006956][ C1] Memory state around the buggy address:
[ 32.012693][ C1] ffff888110372580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 32.020849][ C1] ffff888110372600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 32.028921][ C1] >ffff888110372680: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[ 32.036996][ C1] ^
[ 32.042373][ C1] ffff888110372700: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[ 32.050442][ C1] ffff888110372780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 32.058518][ C1] ==================================================================
[ 32.066676][ C1] Disabling lock debugging due to kernel taint
[ 32.086412][ T28] kauditd_printk_skb: 40 callbacks suppressed
[ 32.086428][ T28] audit: type=1400 audit(1770522370.828:114): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 32.116393][ T28] audit: type=1400 audit(1770522370.828:115): avc: denied { search } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 32.137981][ T28] audit: type=1400 audit(1770522370.828:116): avc: denied { write } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 32.159691][ T28] audit: type=1400 audit(1770522370.828:117): avc: denied { add_name } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 32.183646][ T28] audit: type=1400 audit(1770522370.828:118): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 32.205376][ T28] audit: type=1400 audit(1770522370.828:119): avc: denied { append open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 32.228626][ T28] audit: type=1400 audit(1770522370.828:120): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1