./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2809419603 <...> forked to background, child pid 192 no interfaces have a carrier Starting sshd: OK syzkaller syzkaller login: [ 13.290456][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 13.290463][ T22] audit: type=1400 audit(1654489174.729:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.296031][ T22] audit: type=1400 audit(1654489174.739:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[10674]" dev="pipefs" ino=10674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.1.118' (ECDSA) to the list of known hosts. execve("./syz-executor2809419603", ["./syz-executor2809419603"], 0x7fff590cea30 /* 10 vars */) = 0 brk(NULL) = 0x5555566d3000 brk(0x5555566d3d00) = 0x5555566d3d00 arch_prctl(ARCH_SET_FS, 0x5555566d33c0) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor2809419603", 4096) = 28 brk(0x5555566f4d00) = 0x5555566f4d00 brk(0x5555566f5000) = 0x5555566f5000 mprotect(0x7fe8e6398000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGSEGV, {sa_handler=0x7fe8e62e9060, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7fe8e62e9cd0}, NULL, 8) = 0 rt_sigaction(SIGBUS, {sa_handler=0x7fe8e62e9060, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7fe8e62e9cd0}, NULL, 8) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 3 ioctl(3, LOOP_CLR_FD) = -1 ENXIO (No such device or address) close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555566d3690) = 306 ./strace-static-x86_64: Process 306 attached [pid 306] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 306] setpgid(0, 0) = 0 [pid 306] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 306] write(3, "1000", 4) = 4 [pid 306] close(3) = 0 [pid 306] mkdir("./file0", 0777) = 0 [pid 306] --- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=NULL} --- [pid 306] pipe2([3, 4], 0) = 0 [pid 306] write(4, "\x15\x00\x00\x00\x65\xff\xff\x01\x80\x00\x00\x08\x00\x39\x50\x32\x30\x30\x30\x2e\x4c", 21) = 21 [pid 306] dup(4) = 5 [pid 306] write(5, "\x33\x08\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 51) = 51 [ 20.123913][ T22] audit: type=1400 audit(1654489181.569:73): avc: denied { execmem } for pid=304 comm="syz-executor280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.127125][ T22] audit: type=1400 audit(1654489181.569:74): avc: denied { read write } for pid=304 comm="syz-executor280" name="loop0" dev="devtmpfs" ino=1188 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 20.131216][ T22] audit: type=1400 audit(1654489181.569:75): avc: denied { open } for pid=304 comm="syz-executor280" path="/dev/loop0" dev="devtmpfs" ino=1188 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 20.140792][ T22] audit: type=1400 audit(1654489181.569:76): avc: denied { ioctl } for pid=304 comm="syz-executor280" path="/dev/loop0" dev="devtmpfs" ino=1188 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 20.148001][ T22] audit: type=1400 audit(1654489181.579:77): avc: denied { mounton } for pid=306 comm="syz-executor280" path="/root/file0" dev="sda1" ino=1138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [pid 306] mount(NULL, "./file0", "9p", 0, "trans=fd,rfdno=0x0000000000000003,wfdno=0x0000000000000004,access=any," [pid 304] kill(-306, SIGKILL) = 0 [pid 304] kill(306, SIGKILL) = 0 [pid 304] openat(AT_FDCWD, "/sys/fs/fuse/connections", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 304] fstat(3, {st_mode=S_IFDIR|0755, st_size=0, ...}) = 0 [pid 304] getdents64(3, 0x5555566d46e0 /* 2 entries */, 32768) = 48 [pid 304] getdents64(3, 0x5555566d46e0 /* 0 entries */, 32768) = 0 [pid 304] close(3) = 0 [ 66.784097][ T12] cfg80211: failed to load regulatory.db