./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2759712761 <...> Warning: Permanently added '10.128.0.103' (ED25519) to the list of known hosts. execve("./syz-executor2759712761", ["./syz-executor2759712761"], 0x7fffb732ad30 /* 10 vars */) = 0 brk(NULL) = 0x555581d0c000 brk(0x555581d0cd00) = 0x555581d0cd00 arch_prctl(ARCH_SET_FS, 0x555581d0c380) = 0 set_tid_address(0x555581d0c650) = 5830 set_robust_list(0x555581d0c660, 24) = 0 rseq(0x555581d0cca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2759712761", 4096) = 28 getrandom("\x9e\x62\xab\x17\xf3\x9d\x7a\xc1", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555581d0cd00 brk(0x555581d2dd00) = 0x555581d2dd00 brk(0x555581d2e000) = 0x555581d2e000 mprotect(0x7fba0556a000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 [ 62.978291][ T30] audit: type=1400 audit(1752647444.954:62): avc: denied { write } for pid=5827 comm="strace-static-x" path="pipe:[3656]" dev="pipefs" ino=3656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 [ 63.020626][ T30] audit: type=1400 audit(1752647444.994:63): avc: denied { execmem } for pid=5830 comm="syz-executor275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=864, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=5830}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1d\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x30\x00\x00\x00\xe8\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 864 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5830}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5830}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 [ 63.055936][ T30] audit: type=1400 audit(1752647445.034:64): avc: denied { create } for pid=5830 comm="syz-executor275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.079655][ T30] audit: type=1400 audit(1752647445.054:65): avc: denied { write } for pid=5830 comm="syz-executor275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.100544][ T30] audit: type=1400 audit(1752647445.064:66): avc: denied { read } for pid=5830 comm="syz-executor275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5830}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5830}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5830}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5830}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(3) = 0 close(4) = 0 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5833 attached , child_tidptr=0x555581d0c650) = 5833 [pid 5833] set_robust_list(0x555581d0c660, 24) = 0 [pid 5833] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [ 63.170367][ T30] audit: type=1400 audit(1752647445.144:67): avc: denied { read } for pid=5497 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [pid 5833] getppid() = 0 [pid 5833] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 5833] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 5833] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 5833] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 5833] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 5833] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 5833] unshare(CLONE_NEWNS) = 0 [pid 5833] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 5833] unshare(CLONE_NEWIPC) = 0 [pid 5833] unshare(CLONE_NEWCGROUP) = 0 [pid 5833] unshare(CLONE_NEWUTS) = 0 [pid 5833] unshare(CLONE_SYSVSEM) = 0 [ 63.303901][ T30] audit: type=1400 audit(1752647445.284:68): avc: denied { mounton } for pid=5833 comm="syz-executor275" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [pid 5833] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5833] write(3, "16777216", 8) = 8 [pid 5833] close(3) = 0 [pid 5833] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3 [pid 5833] write(3, "536870912", 9) = 9 [pid 5833] close(3) = 0 [pid 5833] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5833] write(3, "1024", 4) = 4 [pid 5833] close(3) = 0 [pid 5833] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3 [pid 5833] write(3, "8192", 4) = 4 [pid 5833] close(3) = 0 [pid 5833] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3 [pid 5833] write(3, "1024", 4) = 4 [pid 5833] close(3) = 0 [pid 5833] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3 [pid 5833] write(3, "1024", 4) = 4 [pid 5833] close(3) = 0 [pid 5833] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3 [pid 5833] write(3, "1024 1048576 500 1024", 21) = 21 [pid 5833] close(3) = 0 [pid 5833] getpid() = 1 [pid 5833] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1< [ 63.915734][ T5833] dump_stack_lvl+0x16c/0x1f0 [ 63.915754][ T5833] lockdep_rcu_suspicious+0x166/0x260 [ 63.915775][ T5833] get_callchain_entry+0x278/0x3f0 [ 63.915791][ T5833] get_perf_callchain+0xdb/0x760 [ 63.915805][ T5833] ? __pfx_get_perf_callchain+0x10/0x10 [ 63.915821][ T5833] ? __lock_acquire+0xb8a/0x1c90 [ 63.915834][ T5833] __bpf_get_stack+0x4f5/0xa10 [ 63.915855][ T5833] ? __pfx___bpf_get_stack+0x10/0x10 [ 63.915873][ T5833] ? __lock_acquire+0xb8a/0x1c90 [ 63.915884][ T5833] bpf_get_stack+0x32/0x40 [ 63.915902][ T5833] bpf_get_stack_raw_tp+0x1dd/0x280 [ 63.915916][ T5833] bpf_prog_b8a90dd1efcc4ad9+0x46/0x4e [ 63.915927][ T5833] bpf_prog_test_run_syscall+0x3ad/0x780 [ 63.915948][ T5833] ? __pfx_bpf_prog_test_run_syscall+0x10/0x10 [ 63.915966][ T5833] ? fdget+0x176/0x210 [ 63.915989][ T5833] ? __bpf_prog_get+0x97/0x2a0 [ 63.916002][ T5833] ? __pfx_bpf_prog_test_run_syscall+0x10/0x10 [ 63.916020][ T5833] __sys_bpf+0x1488/0x4d80 [ 63.916037][ T5833] ? __pfx___sys_bpf+0x10/0x10 [ 63.916051][ T5833] ? do_raw_spin_lock+0x12c/0x2b0 [ 63.916063][ T5833] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 63.916079][ T5833] ? ptrace_stop.part.0+0x732/0x950 [ 63.916101][ T5833] ? rcu_is_watching+0x12/0xc0 [ 63.916116][ T5833] ? _raw_spin_unlock_irq+0x23/0x50 [ 63.916130][ T5833] ? lockdep_hardirqs_on+0x7c/0x110 [ 63.916146][ T5833] __x64_sys_bpf+0x78/0xc0 [ 63.916162][ T5833] do_syscall_64+0xcd/0x4c0 [ 63.916179][ T5833] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.916190][ T5833] RIP: 0033:0x7fba054f8be9 [ 63.916199][ T5833] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 63.916210][ T5833] RSP: 002b:00007ffc455eac48 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 63.916220][ T5833] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fba054f8be9 [ 63.916226][ T5833] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [pid 5833] +++ exited with 1 +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=5833, si_uid=0, si_status=1, si_utime=0, si_stime=16 /* 0.16 s */} --- exit_group(0) = ? +++ exited with 0 +++ [ 63.916232][ T5833]