Warning: Permanently added '10.128.1.125' (ED25519) to the list of known hosts. 2026/02/08 03:46:05 parsed 1 programs [ 27.053188][ T28] audit: type=1400 audit(1770522365.798:64): avc: denied { node_bind } for pid=283 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.074003][ T28] audit: type=1400 audit(1770522365.798:65): avc: denied { module_request } for pid=283 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 28.200142][ T28] audit: type=1400 audit(1770522366.948:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.203428][ T290] cgroup: Unknown subsys name 'net' [ 28.223336][ T28] audit: type=1400 audit(1770522366.948:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.250634][ T28] audit: type=1400 audit(1770522366.978:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.251156][ T290] cgroup: Unknown subsys name 'devices' [ 28.392062][ T290] cgroup: Unknown subsys name 'hugetlb' [ 28.397981][ T290] cgroup: Unknown subsys name 'rlimit' [ 28.511642][ T28] audit: type=1400 audit(1770522367.258:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.534990][ T28] audit: type=1400 audit(1770522367.258:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.555688][ T28] audit: type=1400 audit(1770522367.258:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.576266][ T28] audit: type=1400 audit(1770522367.258:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.583433][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.597447][ T28] audit: type=1400 audit(1770522367.258:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.676001][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.423389][ T296] request_module fs-gadgetfs succeeded, but still no fs? [ 29.674287][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.681389][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.688977][ T309] device bridge_slave_0 entered promiscuous mode [ 29.696213][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.703462][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.711070][ T309] device bridge_slave_1 entered promiscuous mode [ 29.760616][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.767677][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.775087][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.782268][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.804729][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.812634][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.820483][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.828210][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.838641][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.847032][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.854096][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.863329][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.871622][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.878660][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.892845][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.902448][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.917415][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.930269][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.938646][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.946414][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.954973][ T309] device veth0_vlan entered promiscuous mode [ 29.966157][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.975501][ T309] device veth1_macvtap entered promiscuous mode [ 29.986248][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.996468][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.651228][ T8] device bridge_slave_1 left promiscuous mode [ 30.657439][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.665400][ T8] device bridge_slave_0 left promiscuous mode [ 30.671713][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.680413][ T8] device veth1_macvtap left promiscuous mode [ 30.686505][ T8] device veth0_vlan left promiscuous mode 2026/02/08 03:46:09 executed programs: 0 [ 30.864222][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.871319][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.878739][ T364] device bridge_slave_0 entered promiscuous mode [ 30.885842][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.892907][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.900628][ T364] device bridge_slave_1 entered promiscuous mode [ 30.948436][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.955507][ T364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.962903][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.970046][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.990821][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.998712][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.006254][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.017600][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.026101][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.033848][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.041523][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.050179][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.057226][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.074391][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.083991][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.099187][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.112760][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.121347][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.129177][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.138070][ T364] device veth0_vlan entered promiscuous mode [ 31.149877][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.159060][ T364] device veth1_macvtap entered promiscuous mode [ 31.168565][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.178921][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.207715][ C1] ================================================================== [ 31.215979][ C1] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6fa/0x960 [ 31.223838][ C1] Write of size 56 at addr ffff888110372690 by task syz.2.17/375 [ 31.231647][ C1] [ 31.234076][ C1] CPU: 1 PID: 375 Comm: syz.2.17 Not tainted syzkaller #0 [ 31.241369][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 31.251626][ C1] Call Trace: [ 31.254911][ C1] [ 31.257759][ C1] __dump_stack+0x21/0x24 [ 31.262123][ C1] dump_stack_lvl+0x110/0x170 [ 31.266835][ C1] ? __cfi_dump_stack_lvl+0x8/0x8 [ 31.271921][ C1] ? __bpf_get_stackid+0x6fa/0x960 [ 31.277057][ C1] print_address_description+0x71/0x200 [ 31.282796][ C1] print_report+0x4a/0x60 [ 31.287146][ C1] kasan_report+0x122/0x150 [ 31.291754][ C1] ? __bpf_get_stackid+0x6fa/0x960 [ 31.296888][ C1] kasan_check_range+0x249/0x2a0 [ 31.301867][ C1] ? __bpf_get_stackid+0x6fa/0x960 [ 31.307253][ C1] memcpy+0x44/0x70 [ 31.311108][ C1] __bpf_get_stackid+0x6fa/0x960 [ 31.316078][ C1] bpf_get_stackid_pe+0x2ee/0x400 [ 31.321285][ C1] bpf_prog_fa73c8c086b491e8+0x21/0x31 [ 31.326914][ C1] bpf_overflow_handler+0x3d0/0x5e0 [ 31.332153][ C1] ? __cfi_bpf_overflow_handler+0x10/0x10 [ 31.337897][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 31.343128][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 31.349364][ C1] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 31.355654][ C1] __perf_event_overflow+0x437/0x620 [ 31.360970][ C1] perf_swevent_hrtimer+0x400/0x5b0 [ 31.366199][ C1] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 31.371947][ C1] ? timerqueue_add+0x20e/0x230 [ 31.376831][ C1] ? timerqueue_del+0xd3/0x120 [ 31.381624][ C1] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 31.387363][ C1] __hrtimer_run_queues+0x3d5/0xa00 [ 31.392591][ C1] ? hrtimer_interrupt+0x8c0/0x8c0 [ 31.397729][ C1] ? ktime_get_update_offsets_now+0x30c/0x320 [ 31.403820][ C1] hrtimer_interrupt+0x3c7/0x8c0 [ 31.408789][ C1] __sysvec_apic_timer_interrupt+0x11e/0x440 [ 31.414808][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 31.420634][ C1] [ 31.423588][ C1] [ 31.426630][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 31.432626][ C1] RIP: 0010:perf_ioctl+0x147a/0x1e70 [ 31.437933][ C1] Code: 00 65 48 8b 04 25 28 00 00 00 48 3b 84 24 40 02 00 00 0f 85 3e 09 00 00 4c 89 f8 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 41 6a d7 ff 45 31 ff e9 6e ff ff ff e8 34 6a d7 ff 41 bf ea ff [ 31.457913][ C1] RSP: 0018:ffffc90000a67be0 EFLAGS: 00010246 [ 31.464094][ C1] RAX: ffffffff8199f62d RBX: 0000000000000000 RCX: 0000000000000000 [ 31.472170][ C1] RDX: ffff88811362bcc0 RSI: 0000000000000000 RDI: 0000000000000000 [ 31.480199][ C1] RBP: ffffc90000a67e80 R08: ffff888114a0c007 R09: 1ffff11022941800 [ 31.488377][ C1] R10: dffffc0000000000 R11: ffffed1022941801 R12: 0000000040042408 [ 31.496483][ C1] R13: dffffc0000000000 R14: fffff5200014cf8c R15: ffffc900007e5000 [ 31.504616][ C1] ? perf_ioctl+0x8dd/0x1e70 [ 31.509242][ C1] ? ioctl_has_perm+0x40f/0x4f0 [ 31.514121][ C1] ? has_cap_mac_admin+0x370/0x370 [ 31.519255][ C1] ? __cfi_perf_ioctl+0x10/0x10 [ 31.524133][ C1] ? __hrtimer_run_queues+0x9a5/0xa00 [ 31.529720][ C1] ? do_futex+0x2bf/0x430 [ 31.534165][ C1] ? selinux_file_ioctl+0x3a0/0x4d0 [ 31.539483][ C1] ? __cfi_do_futex+0x10/0x10 [ 31.544177][ C1] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 31.549751][ C1] ? __se_sys_futex+0x136/0x310 [ 31.554637][ C1] ? security_file_ioctl+0x95/0xc0 [ 31.559798][ C1] ? __cfi_perf_ioctl+0x10/0x10 [ 31.564685][ C1] __se_sys_ioctl+0x12f/0x1b0 [ 31.569499][ C1] __x64_sys_ioctl+0x7b/0x90 [ 31.574202][ C1] x64_sys_call+0x58b/0x9a0 [ 31.578816][ C1] do_syscall_64+0x4c/0xa0 [ 31.583350][ C1] ? clear_bhb_loop+0x30/0x80 [ 31.588168][ C1] ? clear_bhb_loop+0x30/0x80 [ 31.592860][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 31.598774][ C1] RIP: 0033:0x7faf49f9aeb9 [ 31.603224][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 31.622935][ C1] RSP: 002b:00007ffff5c41af8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 31.631469][ C1] RAX: ffffffffffffffda RBX: 00007faf4a215fa0 RCX: 00007faf49f9aeb9 [ 31.639478][ C1] RDX: 0000000000000004 RSI: 0000000040042408 RDI: 0000000000000005 [ 31.647564][ C1] RBP: 00007faf4a008c1f R08: 0000000000000000 R09: 0000000000000000 [ 31.655643][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 31.663636][ C1] R13: 00007faf4a215fac R14: 00007faf4a215fa0 R15: 00007faf4a215fa0 [ 31.671639][ C1] [ 31.674763][ C1] [ 31.677188][ C1] Allocated by task 375: [ 31.681448][ C1] kasan_set_track+0x4b/0x70 [ 31.686154][ C1] kasan_save_alloc_info+0x25/0x30 [ 31.691307][ C1] __kasan_kmalloc+0x95/0xb0 [ 31.695920][ C1] __kmalloc_node+0xb2/0x1e0 [ 31.700630][ C1] bpf_map_area_alloc+0x4b/0xe0 [ 31.705500][ C1] prealloc_elems_and_freelist+0x8a/0x1e0 [ 31.711235][ C1] stack_map_alloc+0x3a7/0x530 [ 31.716021][ C1] map_create+0x49c/0xd80 [ 31.720543][ C1] __sys_bpf+0x34e/0x850 [ 31.724886][ C1] __x64_sys_bpf+0x7c/0x90 [ 31.729321][ C1] x64_sys_call+0x488/0x9a0 [ 31.734021][ C1] do_syscall_64+0x4c/0xa0 [ 31.738544][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 31.744643][ C1] [ 31.746986][ C1] The buggy address belongs to the object at ffff888110372680 [ 31.746986][ C1] which belongs to the cache kmalloc-64 of size 64 [ 31.760957][ C1] The buggy address is located 16 bytes inside of [ 31.760957][ C1] 64-byte region [ffff888110372680, ffff8881103726c0) [ 31.774067][ C1] [ 31.776403][ C1] The buggy address belongs to the physical page: [ 31.782833][ C1] page:ffffea000440dc80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x110372 [ 31.793188][ C1] flags: 0x4000000000000200(slab|zone=1) [ 31.798871][ C1] raw: 4000000000000200 0000000000000000 dead000000000122 ffff888100042780 [ 31.807480][ C1] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 [ 31.816086][ C1] page dumped because: kasan: bad access detected [ 31.822529][ C1] page_owner tracks the page as allocated [ 31.828383][ C1] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 364, tgid 364 (syz-executor), ts 31188271111, free_ts 31092581716 [ 31.846681][ C1] post_alloc_hook+0x1f5/0x210 [ 31.851496][ C1] prep_new_page+0x1c/0x110 [ 31.856046][ C1] get_page_from_freelist+0x2d12/0x2d80 [ 31.861656][ C1] __alloc_pages+0x1d9/0x480 [ 31.866627][ C1] alloc_slab_page+0x6e/0xf0 [ 31.871246][ C1] new_slab+0x98/0x3d0 [ 31.875335][ C1] ___slab_alloc+0x6bd/0xb20 [ 31.880200][ C1] __slab_alloc+0x5e/0xa0 [ 31.884552][ C1] __kmem_cache_alloc_node+0x203/0x2c0 [ 31.890046][ C1] kmalloc_trace+0x29/0xb0 [ 31.894485][ C1] __request_module+0x2a7/0x910 [ 31.899350][ C1] dev_load+0x5b/0xb0 [ 31.903600][ C1] dev_ioctl+0x3c6/0xd10 [ 31.907938][ C1] sock_do_ioctl+0x252/0x330 [ 31.912540][ C1] sock_ioctl+0x4ca/0x720 [ 31.916877][ C1] __se_sys_ioctl+0x12f/0x1b0 [ 31.921835][ C1] page last free stack trace: [ 31.926524][ C1] free_unref_page_prepare+0x742/0x750 [ 31.931997][ C1] free_unref_page+0x95/0x540 [ 31.936694][ C1] __free_pages+0x67/0x100 [ 31.941327][ C1] __free_slab+0xca/0x1a0 [ 31.945671][ C1] __unfreeze_partials+0x160/0x190 [ 31.950812][ C1] put_cpu_partial+0xa9/0x100 [ 31.955505][ C1] __slab_free+0x1c4/0x280 [ 31.960030][ C1] ___cache_free+0xbf/0xd0 [ 31.964461][ C1] qlist_free_all+0xc6/0x140 [ 31.969147][ C1] kasan_quarantine_reduce+0x14a/0x170 [ 31.974613][ C1] __kasan_slab_alloc+0x24/0x80 [ 31.979473][ C1] slab_post_alloc_hook+0x4f/0x2d0 [ 31.984613][ C1] __kmem_cache_alloc_node+0x192/0x2c0 [ 31.990086][ C1] __kmalloc_node+0xa1/0x1e0 [ 31.994692][ C1] kvmalloc_node+0x28a/0x460 [ 31.999310][ C1] rht_deferred_worker+0x2e8/0x14e0 [ 32.004539][ C1] [ 32.006956][ C1] Memory state around the buggy address: [ 32.012693][ C1] ffff888110372580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.020849][ C1] ffff888110372600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.028921][ C1] >ffff888110372680: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 32.036996][ C1] ^ [ 32.042373][ C1] ffff888110372700: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.050442][ C1] ffff888110372780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.058518][ C1] ================================================================== [ 32.066676][ C1] Disabling lock debugging due to kernel taint [ 32.086412][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 32.086428][ T28] audit: type=1400 audit(1770522370.828:114): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 32.116393][ T28] audit: type=1400 audit(1770522370.828:115): avc: denied { search } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 32.137981][ T28] audit: type=1400 audit(1770522370.828:116): avc: denied { write } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 32.159691][ T28] audit: type=1400 audit(1770522370.828:117): avc: denied { add_name } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 32.183646][ T28] audit: type=1400 audit(1770522370.828:118): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.205376][ T28] audit: type=1400 audit(1770522370.828:119): avc: denied { append open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 32.228626][ T28] audit: type=1400 audit(1770522370.828:120): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1