./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1919939249 <...> Warning: Permanently added '10.128.1.142' (ED25519) to the list of known hosts. execve("./syz-executor1919939249", ["./syz-executor1919939249"], 0x7ffdfeb01180 /* 10 vars */) = 0 brk(NULL) = 0x55556d8c5000 brk(0x55556d8c5d00) = 0x55556d8c5d00 arch_prctl(ARCH_SET_FS, 0x55556d8c5380) = 0 set_tid_address(0x55556d8c5650) = 289 set_robust_list(0x55556d8c5660, 24) = 0 rseq(0x55556d8c5ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1919939249", 4096) = 28 getrandom("\x7c\x29\xfb\xbf\x74\xc0\x9c\xe9", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556d8c5d00 brk(0x55556d8e6d00) = 0x55556d8e6d00 brk(0x55556d8e7000) = 0x55556d8e7000 mprotect(0x7f88fdfd8000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 [ 281.776998][ T28] audit: type=1400 audit(1746955062.311:64): avc: denied { execmem } for pid=289 comm="syz-executor191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 281.855210][ T28] audit: type=1400 audit(1746955062.311:65): avc: denied { bpf } for pid=290 comm="syz-executor191" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 281.915866][ T28] audit: type=1400 audit(1746955062.311:66): avc: denied { map_create } for pid=290 comm="syz-executor191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 281.955162][ T28] audit: type=1400 audit(1746955062.311:67): avc: denied { map_read map_write } for pid=290 comm="syz-executor191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 282.005174][ T28] audit: type=1400 audit(1746955062.311:68): avc: denied { prog_load } for pid=290 comm="syz-executor191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 282.045155][ T28] audit: type=1400 audit(1746955062.311:69): avc: denied { perfmon } for pid=290 comm="syz-executor191" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 282.125128][ T28] audit: type=1400 audit(1746955062.311:70): avc: denied { prog_run } for pid=290 comm="syz-executor191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 282.185135][ T28] audit: type=1400 audit(1746955062.331:71): avc: denied { read write } for pid=290 comm="syz-executor191" name="fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 282.245123][ T28] audit: type=1400 audit(1746955062.331:72): avc: denied { open } for pid=290 comm="syz-executor191" path="/dev/fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 282.335140][ T28] audit: type=1400 audit(1746955062.331:73): avc: denied { mounton } for pid=290 comm="syz-executor191" path="/root/file0" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1