./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1681110984 <...> Warning: Permanently added '10.128.1.123' (ED25519) to the list of known hosts. execve("./syz-executor1681110984", ["./syz-executor1681110984"], 0x7ffc9f0aded0 /* 10 vars */) = 0 brk(NULL) = 0x55558abad000 brk(0x55558abadd00) = 0x55558abadd00 arch_prctl(ARCH_SET_FS, 0x55558abad380) = 0 set_tid_address(0x55558abad650) = 297 set_robust_list(0x55558abad660, 24) = 0 rseq(0x55558abadca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1681110984", 4096) = 28 getrandom("\xa0\x5e\x56\x52\x1e\x9d\x11\xa7", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558abadd00 brk(0x55558abced00) = 0x55558abced00 brk(0x55558abcf000) = 0x55558abcf000 mprotect(0x7f872d692000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0executing program ) = 0x200001000000 write(1, "executing program\n", 18) = 18 socket(AF_VSOCK, SOCK_SEQPACKET, 0) = 3 bind(3, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_ANY, svm_port=0, svm_flags=0}, 16) = 0 listen(3, 0) = 0 socket(AF_VSOCK, SOCK_SEQPACKET, 0) = 4 connect(4, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_ANY, svm_port=0, svm_flags=0}, 16) = 0 mmap(0x200000000000, 16506880, PROT_WRITE, MAP_SHARED|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 openat(AT_FDCWD, 0x200000000000, O_WRONLY|O_CREAT|O_TRUNC|O_LARGEFILE|O_NOATIME, 000) = 5 ioctl(5, TUNSETIFF, 0x2000000000c0) = 0 write(5, 0x200000000440, 65007) = -1 EIO (Input/output error) setsockopt(4, SOL_SOCKET, SO_ZEROCOPY, 0x200000000180, 8) = 0 [ 27.980523][ T36] audit: type=1400 audit(1754733729.340:64): avc: denied { execmem } for pid=297 comm="syz-executor168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.991234][ T297] ------------[ cut here ]------------ [ 28.005512][ T297] 'send_pkt()' returns 0, but 28244 expected [ 28.012111][ T36] audit: type=1400 audit(1754733729.340:65): avc: denied { create } for pid=297 comm="syz-executor168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.033206][ T297] WARNING: CPU: 0 PID: 297 at net/vmw_vsock/virtio_transport_common.c:446 virtio_transport_send_pkt_info+0xe81/0x10c0 [ 28.045643][ T297] Modules linked in: [ 28.045686][ T36] audit: type=1400 audit(1754733729.340:66): avc: denied { bind } for pid=297 comm="syz-executor168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.049602][ T297] CPU: 0 UID: 0 PID: 297 Comm: syz-executor168 Not tainted 6.12.38-syzkaller-gd0c633175c04 #0 79f03ae2e0a264f34f505a942aaa3597bcba712e [ 28.069529][ T36] audit: type=1400 audit(1754733729.340:67): avc: denied { listen } for pid=297 comm="syz-executor168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.082953][ T297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 28.102888][ T36] audit: type=1400 audit(1754733729.340:68): avc: denied { connect } for pid=297 comm="syz-executor168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.112766][ T297] RIP: 0010:virtio_transport_send_pkt_info+0xe81/0x10c0 [ 28.132581][ T36] audit: type=1400 audit(1754733729.350:69): avc: denied { setopt } for pid=297 comm="syz-executor168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.139525][ T297] Code: 0f 09 fc 0f 0b bb f2 ff ff ff eb b5 e8 58 0f 09 fc c6 05 79 d4 46 02 01 48 c7 c7 20 87 79 86 44 89 f6 4c 89 e2 e8 5f 72 87 fb <0f> 0b e9 de fe ff ff e8 33 0f 09 fc 0f 0b e9 c6 f6 ff ff 89 d9 80 [ 28.159267][ T36] audit: type=1400 audit(1754733729.350:70): avc: denied { write } for pid=297 comm="syz-executor168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.178865][ T297] RSP: 0018:ffffc900011ef550 EFLAGS: 00010246 [ 28.198995][ T36] audit: type=1400 audit(1754733729.370:71): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 28.204568][ T297] RAX: 07d8a206f34f8500 RBX: ffffffff87c119b0 RCX: ffff888103bccc00 [ 28.233343][ T297] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 28.241339][ T297] RBP: ffffc900011ef630 R08: 0000000000000003 R09: 0000000000000004 [ 28.249356][ T297] R10: dffffc0000000000 R11: fffffbfff0e5ef10 R12: 0000000000006e54 [ 28.257380][ T297] R13: 0000000000008d60 R14: 0000000000000000 R15: ffffc900011ef680 [ 28.265386][ T297] FS: 000055558abad380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 28.274361][ T297] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.280983][ T297] CR2: 000055a274c061b8 CR3: 0000000103398000 CR4: 00000000003526b0 [ 28.288997][ T297] Call Trace: [ 28.292277][ T297] [ 28.295204][ T297] virtio_transport_seqpacket_enqueue+0x141/0x1c0 [ 28.301657][ T297] ? __cfi_virtio_transport_seqpacket_enqueue+0x10/0x10 [ 28.308639][ T297] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 28.314461][ T297] ? remove_wait_queue+0x132/0x150 [ 28.319597][ T297] vsock_connectible_sendmsg+0xb1a/0x10c0 [ 28.325349][ T297] ? __cfi_vsock_connectible_sendmsg+0x10/0x10 [ 28.331604][ T297] ? __cfi_woken_wake_function+0x10/0x10 [ 28.337263][ T297] ? __kasan_kmalloc+0x96/0xb0 [ 28.342094][ T297] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 28.347488][ T297] ? security_socket_sendmsg+0x33/0xd0 [ 28.353032][ T297] ? __cfi_vsock_connectible_sendmsg+0x10/0x10 [ 28.359246][ T297] ____sys_sendmsg+0xa18/0xa70 [ 28.364042][ T297] ? __sys_sendmsg_sock+0x50/0x50 [ 28.369096][ T297] ? import_iovec+0x81/0xb0 [ 28.373619][ T297] ___sys_sendmsg+0x220/0x2a0 [ 28.378340][ T297] ? __sys_sendmsg+0x280/0x280 [ 28.383133][ T297] ? __kasan_check_read+0x15/0x20 [ 28.388202][ T297] __sys_sendmmsg+0x271/0x470 [ 28.392904][ T297] ? __cfi___sys_sendmmsg+0x10/0x10 [ 28.398148][ T297] ? __kasan_check_write+0x18/0x20 [ 28.403293][ T297] __x64_sys_sendmmsg+0xa4/0xc0 [ 28.408180][ T297] x64_sys_call+0xfec/0x2ee0 [ 28.412798][ T297] do_syscall_64+0x58/0xf0 [ 28.417210][ T297] ? clear_bhb_loop+0x50/0xa0 [ 28.421922][ T297] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 28.427838][ T297] RIP: 0033:0x7f872d61f6e9 [ 28.432309][ T297] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 28.451961][ T297] RSP: 002b:00007ffe70070bc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 28.460462][ T297] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f872d61f6e9 [ 28.468494][ T297] RDX: 0000000000000001 RSI: 0000200000000100 RDI: 0000000000000004 [ 28.476501][ T297] RBP: 00007f872d692610 R08: 18001100000ac5f8 R09: 18001100000ac5f8 [ 28.484534][ T297] R10: 0000000024008094 R11: 0000000000000246 R12: 0000000000000001 [ 28.492573][ T297] R13: 00007ffe70070d98 R14: 0000000000000001 R15: 0000000000000001 [ 28.500607][ T297] [ 28.503642][ T297] ---[ end trace 0000000000000000 ]---