./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor564877574 <...> forked to background, child pid 192 no interfaces have a carrier Starting sshd: OK syzkaller syzkaller login: [ 12.594659][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 12.594667][ T22] audit: type=1400 audit(1655286093.039:71): avc: denied { transition } for pid=264 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.601704][ T22] audit: type=1400 audit(1655286093.039:72): avc: denied { write } for pid=264 comm="sh" path="pipe:[10513]" dev="pipefs" ino=10513 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. execve("./syz-executor564877574", ["./syz-executor564877574"], 0x7fffc84af740 /* 10 vars */) = 0 brk(NULL) = 0x555556f44000 brk(0x555556f44c40) = 0x555556f44c40 arch_prctl(ARCH_SET_FS, 0x555556f44300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor564877574", 4096) = 27 brk(0x555556f65c40) = 0x555556f65c40 brk(0x555556f66000) = 0x555556f66000 mprotect(0x7fa70a638000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555556f445d0) = 305 ./strace-static-x86_64: Process 305 attached [pid 305] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 305] setpgid(0, 0) = 0 [pid 305] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 305] write(3, "1000", 4) = 4 [pid 305] close(3) = 0 [pid 305] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=4, insns=0x200002c0, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_SOCK_CREATE, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0}, 120) = 3 [ 19.198528][ T22] audit: type=1400 audit(1655286099.639:73): avc: denied { execmem } for pid=304 comm="syz-executor564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.204135][ T22] audit: type=1400 audit(1655286099.649:74): avc: denied { prog_load } for pid=305 comm="syz-executor564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 19.208604][ T22] audit: type=1400 audit(1655286099.649:75): avc: denied { prog_run } for pid=305 comm="syz-executor564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 66.753634][ T12] cfg80211: failed to load regulatory.db