./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3929251792 <...> forked to background, child pid 192 Starting sshd: OK syzkaller syzkaller login: [ 13.281610][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 13.281625][ T22] audit: type=1400 audit(1655583109.660:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.287811][ T22] audit: type=1400 audit(1655583109.670:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[10526]" dev="pipefs" ino=10526 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 14.181630][ T266] sshd (266) used greatest stack depth: 26000 bytes left Warning: Permanently added '10.128.0.239' (ECDSA) to the list of known hosts. execve("./syz-executor3929251792", ["./syz-executor3929251792"], 0x7fff9329e9f0 /* 10 vars */) = 0 brk(NULL) = 0x555556d79000 brk(0x555556d79c40) = 0x555556d79c40 arch_prctl(ARCH_SET_FS, 0x555556d79300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3929251792", 4096) = 28 brk(0x555556d9ac40) = 0x555556d9ac40 brk(0x555556d9b000) = 0x555556d9b000 mprotect(0x7f3752be1000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555556d795d0) = 305 ./strace-static-x86_64: Process 305 attached [pid 305] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 305] setpgid(0, 0) = 0 [pid 305] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 305] write(3, "1000", 4) = 4 [pid 305] close(3) = 0 [pid 305] mkdir("./file0", 000) = 0 [pid 305] pipe2([3, 4], 0) = 0 [pid 305] socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 5 [ 20.344709][ T22] audit: type=1400 audit(1655583116.730:73): avc: denied { execmem } for pid=304 comm="syz-executor392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.369936][ T22] audit: type=1400 audit(1655583116.750:74): avc: denied { create } for pid=305 comm="syz-executor392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.391463][ T22] audit: type=1400 audit(1655583116.780:75): avc: denied { mounton } for pid=305 comm="syz-executor392" path="/root/file0" dev="sda1" ino=1138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [pid 305] mount(NULL, "./file0", "9p", 0, "trans=fd,rfdno=0x0000000000000003,wfdno=0x0000000000000005,k" [pid 304] kill(-305, SIGKILL) = 0 [pid 304] kill(305, SIGKILL) = 0 [pid 304] openat(AT_FDCWD, "/sys/fs/fuse/connections", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 304] fstat(3, {st_mode=S_IFDIR|0755, st_size=0, ...}) = 0 [pid 304] getdents64(3, 0x555556d7a620 /* 2 entries */, 32768) = 48 [pid 304] getdents64(3, 0x555556d7a620 /* 0 entries */, 32768) = 0 [pid 304] close(3) = 0 [ 66.802229][ T101] cfg80211: failed to load regulatory.db