./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3686663559 <...> [ 8.019811][ T23] audit: type=1400 audit(1740813072.640:29): avc: denied { getattr } for pid=185 comm="dbus-daemon" path="/run/messagebus.pid" dev="tmpfs" ino=11339 scontext=system_u:system_r:system_dbusd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 8.146601][ T23] audit: type=1400 audit(1740813072.810:30): avc: denied { search } for pid=199 comm="dhcpcd" name="/" dev="tmpfs" ino=10948 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 10.863259][ T170] udevd (170) used greatest stack depth: 23320 bytes left [ 15.332486][ T23] kauditd_printk_skb: 30 callbacks suppressed [ 15.332497][ T23] audit: type=1400 audit(1740813080.000:61): avc: denied { transition } for pid=285 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.344860][ T23] audit: type=1400 audit(1740813080.000:62): avc: denied { noatsecure } for pid=285 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.361262][ T23] audit: type=1400 audit(1740813080.000:63): avc: denied { write } for pid=285 comm="sh" path="pipe:[832]" dev="pipefs" ino=832 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 15.391999][ T23] audit: type=1400 audit(1740813080.000:64): avc: denied { rlimitinh } for pid=285 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.413888][ T23] audit: type=1400 audit(1740813080.000:65): avc: denied { siginh } for pid=285 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.407647][ T288] sshd (288) used greatest stack depth: 20856 bytes left Warning: Permanently added '10.128.1.156' (ED25519) to the list of known hosts. execve("./syz-executor3686663559", ["./syz-executor3686663559"], 0x7fffc70fffd0 /* 10 vars */) = 0 brk(NULL) = 0x555568f09000 brk(0x555568f09d00) = 0x555568f09d00 arch_prctl(ARCH_SET_FS, 0x555568f09380) = 0 set_tid_address(0x555568f09650) = 357 set_robust_list(0x555568f09660, 24) = 0 rseq(0x555568f09ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3686663559", 4096) = 28 getrandom("\x66\x7a\x8e\x9e\xaf\x92\x4b\x6f", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555568f09d00 brk(0x555568f2ad00) = 0x555568f2ad00 brk(0x555568f2b000) = 0x555568f2b000 mprotect(0x7f0cd20ad000, 16384, PROT_READ) = 0 mmap(0x3ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x3ffffffff000 mmap(0x400000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x400000000000 mmap(0x400001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x400001000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555568f09650) = 359 ./strace-static-x86_64: Process 359 attached [pid 357] openat(AT_FDCWD, "/sys/kernel/debug/x86/nmi_longest_ns", O_WRONLY|O_CLOEXEC [pid 359] set_robust_list(0x555568f09660, 24 [pid 357] <... openat resumed>) = 3 [pid 357] write(3, "10000000000", 11 [pid 359] <... set_robust_list resumed>) = 0 [pid 357] <... write resumed>) = 11 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/kernel/hung_task_check_interval_secs", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 357] openat(AT_FDCWD, "/proc/sys/net/core/bpf_jit_kallsyms", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "1", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/net/core/bpf_jit_harden", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "0", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/kernel/kptr_restrict", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "0", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/kernel/softlockup_all_cpu_backtrace", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "1", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "100", 3) = 3 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/vm/oom_dump_tasks", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "0", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/debug/exception-trace", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "0", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/kernel/printk", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "7 4 1 3", 7) = 7 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/kernel/keys/gc_delay", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "1", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/vm/oom_kill_allocating_task", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "1", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/kernel/ctrl-alt-del", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "0", 1) = 1 [pid 357] close(3) = 0 [pid 357] openat(AT_FDCWD, "/proc/sys/kernel/cad_pid", O_WRONLY|O_CLOEXEC) = 3 [pid 357] write(3, "359", 3) = 3 [pid 357] close(3) = 0 [pid 357] kill(359, SIGKILL) = 0 [pid 359] +++ killed by SIGKILL +++ [ 25.710655][ T23] audit: type=1400 audit(1740813090.370:66): avc: denied { execmem } for pid=357 comm="syz-executor368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_KILLED, si_pid=359, si_uid=0, si_status=SIGKILL, si_utime=0, si_stime=0} --- mount(NULL, "/proc/sys/fs/binfmt_misc", "binfmt_misc", 0, NULL) = -1 EBUSY (Device or resource busy) openat(AT_FDCWD, "/proc/sys/fs/binfmt_misc/register", O_WRONLY|O_CLOEXEC) = 3 write(3, "\x3a\x73\x79\x7a\x30\x3a\x4d\x3a\x30\x3a\x01\x3a\x3a\x2e\x2f\x66\x69\x6c\x65\x30\x3a", 21) = 21 close(3) = 0 openat(AT_FDCWD, "/proc/sys/fs/binfmt_misc/register", O_WRONLY|O_CLOEXEC) = 3 write(3, "\x3a\x73\x79\x7a\x31\x3a\x4d\x3a\x31\x3a\x02\x3a\x3a\x2e\x2f\x66\x69\x6c\x65\x30\x3a\x50\x4f\x43", 24) = 24 close(3) = 0 chmod("/dev/raw-gadget", 0666) = 0 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555568f09650) = 361 ./strace-static-x86_64: Process 361 attached [pid 361] set_robust_list(0x555568f09660, 24) = 0 [pid 361] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 361] getppid() = 0 [pid 361] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 361] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 361] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 361] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 361] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 361] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 361] unshare(CLONE_NEWNS) = 0 [pid 361] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 361] unshare(CLONE_NEWIPC) = -1 EINVAL (Invalid argument) [pid 361] unshare(CLONE_NEWCGROUP) = 0 [pid 361] unshare(CLONE_NEWUTS) = 0 [pid 361] unshare(CLONE_SYSVSEM) = 0 [pid 361] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 361] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 361] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 361] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 361] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 361] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 361] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 361] getpid() = 1 [pid 361] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<