./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4122703322 <...> forked to background, child pid 192 Starting sshd: [ 6.565585][ T231] sshd (231) used greatest stack depth: 26576 bytes left OK syzkaller syzkaller login: [ 12.541888][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 12.541896][ T22] audit: type=1400 audit(1654967440.109:71): avc: denied { transition } for pid=264 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.546455][ T22] audit: type=1400 audit(1654967440.119:72): avc: denied { write } for pid=264 comm="sh" path="pipe:[9853]" dev="pipefs" ino=9853 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.10.3' (ECDSA) to the list of known hosts. execve("./syz-executor4122703322", ["./syz-executor4122703322"], 0x7ffccdd8e620 /* 10 vars */) = 0 brk(NULL) = 0x5555561c4000 brk(0x5555561c4c40) = 0x5555561c4c40 arch_prctl(ARCH_SET_FS, 0x5555561c4300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor4122703322", 4096) = 28 brk(0x5555561e5c40) = 0x5555561e5c40 brk(0x5555561e6000) = 0x5555561e6000 mprotect(0x7f27c0746000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555561c45d0) = 305 ./strace-static-x86_64: Process 305 attached [pid 305] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 305] setpgid(0, 0) = 0 [pid 305] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 305] write(3, "1000", 4) = 4 [pid 305] close(3) = 0 [pid 305] mkdir("./bus", 000) = 0 [pid 305] pipe2([3, 4], 0) = 0 [pid 305] write(4, "\x15\x00\x00\x00\x65\xff\xff\x09\x7b\x00\x00\x08\x00\x39\x50\x32\x30\x30\x30\x2e\x4c", 21) = 21 [pid 305] dup(4) = 5 [pid 305] write(5, "\xa1\x07\x00\x00\x5e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 168) = 168 [ 19.372397][ T22] audit: type=1400 audit(1654967446.939:73): avc: denied { execmem } for pid=304 comm="syz-executor412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.381932][ T22] audit: type=1400 audit(1654967446.949:74): avc: denied { mounton } for pid=305 comm="syz-executor412" path="/root/bus" dev="sda1" ino=1138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [pid 305] mount(NULL, "./bus", "9p", 0, "trans=fd,rfdno=0x0000000000000003,wfdno=0x0000000000000005," [pid 304] kill(-305, SIGKILL) = 0 [pid 304] kill(305, SIGKILL) = 0 [pid 304] openat(AT_FDCWD, "/sys/fs/fuse/connections", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 304] fstat(3, {st_mode=S_IFDIR|0755, st_size=0, ...}) = 0 [pid 304] getdents64(3, 0x5555561c5620 /* 2 entries */, 32768) = 48 [pid 304] getdents64(3, 0x5555561c5620 /* 0 entries */, 32768) = 0 [pid 304] close(3) = 0 [ 66.764375][ T71] cfg80211: failed to load regulatory.db