./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3919835754 <...> Starting sshd: [ 6.373022][ T228] ssh-keygen (228) used greatest stack depth: 26576 bytes left OK syzkaller syzkaller login: [ 13.897926][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 13.897932][ T22] audit: type=1400 audit(1655698251.280:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.904222][ T22] audit: type=1400 audit(1655698251.290:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[597]" dev="pipefs" ino=597 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 14.670445][ T266] sshd (266) used greatest stack depth: 25488 bytes left Warning: Permanently added '10.128.1.17' (ECDSA) to the list of known hosts. execve("./syz-executor3919835754", ["./syz-executor3919835754"], 0x7fff212ed900 /* 10 vars */) = 0 brk(NULL) = 0x555555871000 brk(0x555555871c40) = 0x555555871c40 arch_prctl(ARCH_SET_FS, 0x555555871300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3919835754", 4096) = 28 brk(0x555555892c40) = 0x555555892c40 brk(0x555555893000) = 0x555555893000 mprotect(0x7f1e27e66000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555558715d0) = 305 ./strace-static-x86_64: Process 305 attached [pid 305] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 305] setpgid(0, 0) = 0 [pid 305] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 305] write(3, "1000", 4) = 4 [pid 305] close(3) = 0 [pid 305] creat("./file0", 000) = 3 [pid 305] close(3) = 0 [pid 305] socketpair(AF_UNIX, SOCK_RAW, 0, [3, 4]) = 0 [pid 305] close(-1) = -1 EBADF (Bad file descriptor) [ 20.781086][ T22] audit: type=1400 audit(1655698258.170:73): avc: denied { execmem } for pid=304 comm="syz-executor391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.806268][ T22] audit: type=1400 audit(1655698258.190:74): avc: denied { mounton } for pid=305 comm="syz-executor391" path="/root/file0" dev="sda1" ino=1138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [pid 305] mount(NULL, "./file0", "9p", 0, "trans=fd,rfdno=0x0000000000000003,wfdno=0x0000000000000004," [pid 304] kill(-305, SIGKILL) = 0 [pid 304] kill(305, SIGKILL) = 0 [pid 304] openat(AT_FDCWD, "/sys/fs/fuse/connections", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 304] fstat(3, {st_mode=S_IFDIR|0755, st_size=0, ...}) = 0 [pid 304] getdents64(3, 0x555555872620 /* 2 entries */, 32768) = 48 [pid 304] getdents64(3, 0x555555872620 /* 0 entries */, 32768) = 0 [pid 304] close(3) = 0 [ 66.790045][ T12] cfg80211: failed to load regulatory.db