./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1471783786 <...> Warning: Permanently added '10.128.0.41' (ED25519) to the list of known hosts. execve("./syz-executor1471783786", ["./syz-executor1471783786"], 0x7ffee95d0180 /* 10 vars */) = 0 brk(NULL) = 0x55557008d000 brk(0x55557008dd00) = 0x55557008dd00 arch_prctl(ARCH_SET_FS, 0x55557008d380) = 0 set_tid_address(0x55557008d650) = 296 set_robust_list(0x55557008d660, 24) = 0 rseq(0x55557008dca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1471783786", 4096) = 28 getrandom("\xbc\xb6\x05\xbe\x14\xc4\x1a\xf5", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55557008dd00 brk(0x5555700aed00) = 0x5555700aed00 brk(0x5555700af000) = 0x5555700af000 mprotect(0x7fccbdcfc000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 write(1, "executing program\n", 18executing program ) = 18 socket(AF_VSOCK, SOCK_SEQPACKET, 0) = 3 bind(3, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_ANY, svm_port=0, svm_flags=0}, 16) = 0 listen(3, 0) = 0 socket(AF_VSOCK, SOCK_SEQPACKET, 0) = 4 connect(4, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_ANY, svm_port=0, svm_flags=0}, 16) = 0 mmap(0x200000000000, 16506880, PROT_WRITE, MAP_SHARED|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 openat(AT_FDCWD, 0x200000000000, O_WRONLY|O_CREAT|O_TRUNC|O_LARGEFILE|O_NOATIME, 000) = 5 ioctl(5, TUNSETIFF, 0x2000000000c0) = 0 write(5, 0x200000000440, 65007) = -1 EIO (Input/output error) setsockopt(4, SOL_SOCKET, SO_ZEROCOPY, 0x200000000180, 8) = 0 [ 23.633521][ T36] audit: type=1400 audit(1754731313.110:64): avc: denied { execmem } for pid=296 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.638634][ T296] ------------[ cut here ]------------ [ 23.658431][ T296] 'send_pkt()' returns 0, but 28244 expected [ 23.662882][ T36] audit: type=1400 audit(1754731313.110:65): avc: denied { create } for pid=296 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 23.666892][ T296] WARNING: CPU: 0 PID: 296 at net/vmw_vsock/virtio_transport_common.c:446 virtio_transport_send_pkt_info+0xe81/0x10c0 [ 23.684535][ T36] audit: type=1400 audit(1754731313.110:66): avc: denied { bind } for pid=296 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 23.696455][ T296] Modules linked in: [ 23.716068][ T36] audit: type=1400 audit(1754731313.110:67): avc: denied { listen } for pid=296 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 23.719855][ T296] CPU: 0 UID: 0 PID: 296 Comm: syz-executor147 Not tainted 6.12.38-syzkaller-gd0c633175c04 #0 79f03ae2e0a264f34f505a942aaa3597bcba712e [ 23.739638][ T36] audit: type=1400 audit(1754731313.110:68): avc: denied { connect } for pid=296 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 23.753332][ T296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 23.753353][ T296] RIP: 0010:virtio_transport_send_pkt_info+0xe81/0x10c0 [ 23.783270][ T36] audit: type=1400 audit(1754731313.110:69): avc: denied { setopt } for pid=296 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 23.790122][ T296] Code: 0f 09 fc 0f 0b bb f2 ff ff ff eb b5 e8 58 0f 09 fc c6 05 79 d4 46 02 01 48 c7 c7 20 87 79 86 44 89 f6 4c 89 e2 e8 5f 72 87 fb <0f> 0b e9 de fe ff ff e8 33 0f 09 fc 0f 0b e9 c6 f6 ff ff 89 d9 80 [ 23.809819][ T36] audit: type=1400 audit(1754731313.110:70): avc: denied { write } for pid=296 comm="syz-executor147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 23.829415][ T296] RSP: 0018:ffffc9000128f550 EFLAGS: 00010246 [ 23.829435][ T296] RAX: c76cfab030095300 RBX: ffffffff87c119b0 RCX: ffff888102fc5f00 [ 23.849036][ T36] audit: type=1400 audit(1754731313.140:71): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 23.855076][ T296] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 23.855088][ T296] RBP: ffffc9000128f630 R08: 0000000000000003 R09: 0000000000000004 [ 23.855100][ T296] R10: dffffc0000000000 R11: fffff52000251e0c R12: 0000000000006e54 [ 23.907706][ T296] R13: 0000000000008d60 R14: 0000000000000000 R15: ffffc9000128f680 [ 23.915775][ T296] FS: 000055557008d380(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 23.924735][ T296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.931335][ T296] CR2: 000055f8fd70da60 CR3: 0000000103318000 CR4: 00000000003526b0 [ 23.939306][ T296] Call Trace: [ 23.942595][ T296] [ 23.945524][ T296] virtio_transport_seqpacket_enqueue+0x141/0x1c0 [ 23.951966][ T296] ? __cfi_virtio_transport_seqpacket_enqueue+0x10/0x10 [ 23.958894][ T296] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 23.964709][ T296] ? remove_wait_queue+0x132/0x150 [ 23.969815][ T296] vsock_connectible_sendmsg+0xb1a/0x10c0 [ 23.975563][ T296] ? __cfi_vsock_connectible_sendmsg+0x10/0x10 [ 23.981727][ T296] ? __cfi_woken_wake_function+0x10/0x10 [ 23.987350][ T296] ? __kasan_kmalloc+0x96/0xb0 [ 23.992116][ T296] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 23.997418][ T296] ? security_socket_sendmsg+0x33/0xd0 [ 24.002884][ T296] ? __cfi_vsock_connectible_sendmsg+0x10/0x10 [ 24.009034][ T296] ____sys_sendmsg+0xa18/0xa70 [ 24.013814][ T296] ? __sys_sendmsg_sock+0x50/0x50 [ 24.018833][ T296] ? import_iovec+0x81/0xb0 [ 24.023337][ T296] ___sys_sendmsg+0x220/0x2a0 [ 24.028011][ T296] ? __sys_sendmsg+0x280/0x280 [ 24.032780][ T296] ? __kasan_check_read+0x15/0x20 [ 24.037802][ T296] __sys_sendmmsg+0x271/0x470 [ 24.042491][ T296] ? __cfi___sys_sendmmsg+0x10/0x10 [ 24.047686][ T296] ? __kasan_check_write+0x18/0x20 [ 24.052821][ T296] __x64_sys_sendmmsg+0xa4/0xc0 [ 24.057668][ T296] x64_sys_call+0xfec/0x2ee0 [ 24.062266][ T296] do_syscall_64+0x58/0xf0 [ 24.066683][ T296] ? clear_bhb_loop+0x50/0xa0 [ 24.071375][ T296] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 24.077268][ T296] RIP: 0033:0x7fccbdc896e9 [ 24.081692][ T296] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 24.101337][ T296] RSP: 002b:00007ffe361805b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 24.109755][ T296] RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007fccbdc896e9 [ 24.117730][ T296] RDX: 0000000000000001 RSI: 0000200000000100 RDI: 0000000000000004 [ 24.125719][ T296] RBP: 00007fccbdcfc610 R08: 18001100000ac5f8 R09: 18001100000ac5f8 [ 24.133736][ T296] R10: 0000000024008094 R11: 0000000000000246 R12: 0000000000000001 [ 24.141758][ T296] R13: 00007ffe36180788 R14: 0000000000000001 R15: 0000000000000001 [ 24.149722][ T296] [ 24.152748][ T296] ---[ end trace 0000000000000000 ]---