82): avc: denied { mounton } for pid=2962 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=531 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 59.066095][ T29] audit: type=1400 audit(1746928585.198:83): avc: denied { read write } for pid=2962 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 59.104170][ T29] audit: type=1400 audit(1746928585.198:84): avc: denied { open } for pid=2962 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 59.130996][ T29] audit: type=1400 audit(1746928585.198:85): avc: denied { ioctl } for pid=2962 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 Warning: Permanently added '10.128.0.101' (ED25519) to the list of known hosts. 2025/05/11 01:56:47 ignoring optional flag "sandboxArg"="0" 2025/05/11 01:56:47 ignoring optional flag "type"="gce" 2025/05/11 01:56:47 parsed 1 programs 2025/05/11 01:56:47 executed programs: 0 [ 82.860412][ T3513] modprobe (3513) used greatest stack depth: 23400 bytes left [ 97.192677][ T29] audit: type=1400 audit(1746928623.318:86): avc: denied { create } for pid=3450 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 97.214514][ T29] audit: type=1400 audit(1746928623.318:87): avc: denied { write } for pid=3450 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 97.372447][ T29] audit: type=1400 audit(1746928623.478:88): avc: denied { read } for pid=3450 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1