syzkaller login: [ 25.627435][ T29] kauditd_printk_skb: 28 callbacks suppressed
[ 25.627454][ T29] audit: type=1400 audit(1765735093.474:55): avc: denied { read open } for pid=2924 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=467 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 25.991100][ T29] audit: type=1400 audit(1765735093.834:56): avc: denied { search } for pid=2921 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 27.705058][ T29] audit: type=1400 audit(1765735095.544:57): avc: denied { transition } for pid=2943 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 27.728045][ T29] audit: type=1400 audit(1765735095.554:58): avc: denied { noatsecure } for pid=2943 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 27.747852][ T29] audit: type=1400 audit(1765735095.564:59): avc: denied { write } for pid=2943 comm="sh" path="pipe:[2091]" dev="pipefs" ino=2091 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 27.770694][ T29] audit: type=1400 audit(1765735095.564:60): avc: denied { rlimitinh } for pid=2943 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 27.789994][ T29] audit: type=1400 audit(1765735095.564:61): avc: denied { siginh } for pid=2943 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 31.677233][ T2947] sftp-server (2947) used greatest stack depth: 23608 bytes left
[ 31.690031][ T2946] sshd-session (2946) used greatest stack depth: 23400 bytes left
Warning: Permanently added '10.128.1.245' (ED25519) to the list of known hosts.
2025/12/14 17:58:29 parsed 1 programs
[ 41.919357][ T29] audit: type=1400 audit(1765735109.764:62): avc: denied { node_bind } for pid=2963 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 41.940299][ T29] audit: type=1400 audit(1765735109.764:63): avc: denied { module_request } for pid=2963 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 43.656474][ T29] audit: type=1400 audit(1765735111.504:64): avc: denied { mounton } for pid=2974 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 43.680088][ T29] audit: type=1400 audit(1765735111.524:65): avc: denied { mount } for pid=2974 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 43.683014][ T2974] cgroup: Unknown subsys name 'net'
[ 43.709939][ T29] audit: type=1400 audit(1765735111.554:66): avc: denied { unmount } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 43.808307][ T2974] cgroup: Unknown subsys name 'cpuset'
[ 43.816573][ T2974] cgroup: Unknown subsys name 'rlimit'
[ 43.968715][ T29] audit: type=1400 audit(1765735111.814:67): avc: denied { setattr } for pid=2974 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 43.992192][ T29] audit: type=1400 audit(1765735111.814:68): avc: denied { create } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 44.012730][ T29] audit: type=1400 audit(1765735111.814:69): avc: denied { write } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 44.033249][ T29] audit: type=1400 audit(1765735111.814:70): avc: denied { read } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 44.054334][ T29] audit: type=1400 audit(1765735111.854:71): avc: denied { sys_module } for pid=2974 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 44.107656][ T2979] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 44.150272][ T2974] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 45.674075][ T2981] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 57.461277][ T3032] syz-executor (3032) used greatest stack depth: 22728 bytes left
[ 57.684910][ T29] kauditd_printk_skb: 27 callbacks suppressed
[ 57.684936][ T29] audit: type=1400 audit(1765735125.524:99): avc: denied { create } for pid=3491 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[ 57.853862][ T29] audit: type=1400 audit(1765735125.694:100): avc: denied { create } for pid=3497 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1
[ 57.887908][ T29] audit: type=1400 audit(1765735125.704:101): avc: denied { sys_admin } for pid=3497 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 57.924055][ T29] audit: type=1400 audit(1765735125.764:102): avc: denied { sys_chroot } for pid=3498 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
2025/12/14 17:58:46 executed programs: 0
2025/12/14 17:58:56 executed programs: 2
[ 68.534931][ T29] audit: type=1400 audit(1765735136.374:103): avc: denied { read write } for pid=3958 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 68.575730][ T29] audit: type=1400 audit(1765735136.374:104): avc: denied { open } for pid=3958 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 68.598930][ T29] audit: type=1400 audit(1765735136.374:105): avc: denied { ioctl } for pid=3958 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 68.795356][ T38] usb 4-1: new high-speed USB device number 2 using dummy_hcd
[ 68.945234][ T38] usb 4-1: Using ep0 maxpacket: 16
[ 68.952549][ T38] usb 4-1: config 231 has an invalid interface number: 206 but max is 0
[ 68.961074][ T38] usb 4-1: config 231 has no interface number 0
[ 68.967558][ T38] usb 4-1: config 231 interface 206 altsetting 2 bulk endpoint 0x6 has invalid maxpacket 16
[ 68.977767][ T38] usb 4-1: config 231 interface 206 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 8
[ 68.987889][ T38] usb 4-1: config 231 interface 206 altsetting 2 has 2 endpoint descriptors, different from the interface descriptor's value: 3
[ 69.001190][ T38] usb 4-1: config 231 interface 206 has no altsetting 0
[ 69.009996][ T38] usb 4-1: New USB device found, idVendor=05a3, idProduct=8388, bcdDevice=b1.ad
[ 69.019302][ T38] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 69.027344][ T38] usb 4-1: Product: syz
[ 69.031579][ T38] usb 4-1: Manufacturer: syz
[ 69.036232][ T38] usb 4-1: SerialNumber: syz
[ 69.044642][ T3958] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22
[ 69.052058][ T3958] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22
[ 69.281386][ T38] usb 4-1: USB disconnect, device number 2
[ 69.298378][ T29] audit: type=1400 audit(1765735137.144:106): avc: denied { firmware_load } for pid=1121 comm="kworker/1:2" path="/lib/firmware/libertas/usb8388_olpc.bin" dev="sda1" ino=432 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1
[ 69.755248][ T38] usb 4-1: new full-speed USB device number 3 using dummy_hcd
[ 69.906185][ T38] usb 4-1: not running at top speed; connect to a high speed hub
[ 69.914811][ T38] usb 4-1: config 231 has an invalid interface number: 206 but max is 0
[ 69.923209][ T38] usb 4-1: config 231 has no interface number 0
[ 69.929606][ T38] usb 4-1: config 231 interface 206 altsetting 2 has 2 endpoint descriptors, different from the interface descriptor's value: 3
[ 69.942871][ T38] usb 4-1: config 231 interface 206 has no altsetting 0
[ 69.952441][ T38] usb 4-1: string descriptor 0 read error: -22
[ 69.958786][ T38] usb 4-1: New USB device found, idVendor=05a3, idProduct=8388, bcdDevice=b1.ad
[ 69.967857][ T38] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 71.075239][ T1121] ------------[ cut here ]------------
[ 71.080750][ T1121] URB ffff888115a0f100 submitted while active
[ 71.086890][ T1121] WARNING: drivers/usb/core/urb.c:380 at 0x0, CPU#1: kworker/1:2/1121
[ 71.095155][ T1121] Modules linked in:
[ 71.099191][ T1121] CPU: 1 UID: 0 PID: 1121 Comm: kworker/1:2 Not tainted syzkaller #0 PREEMPT(voluntary)
[ 71.109046][ T1121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 71.119168][ T1121] Workqueue: events request_firmware_work_func
[ 71.125395][ T1121] RIP: 0010:usb_submit_urb+0x15a3/0x1970
[ 71.131074][ T1121] Code: 4b 03 00 00 48 8b 04 24 48 8b 90 b0 00 00 00 eb 91 bb ed ff ff ff e9 07 f3 ff ff e8 97 f5 c5 fc 48 8d 3d 50 45 f0 05 48 89 de <67> 48 0f b9 3a bb f0 ff ff ff e9 e9 f2 ff ff e8 79 f5 c5 fc 0f 1f
[ 71.150774][ T1121] RSP: 0018:ffffc90001c7f8d0 EFLAGS: 00010293
[ 71.156921][ T1121] RAX: 0000000000000000 RBX: ffff888115a0f100 RCX: ffffffff8427b986
[ 71.164923][ T1121] RDX: ffff88810eb59d40 RSI: ffff888115a0f100 RDI: ffffffff8aaa3c30
[ 71.172948][ T1121] RBP: ffff888115a0f100 R08: 0000000000000001 R09: 0000000000000000
[ 71.181029][ T1121] R10: 0000000000000000 R11: ffff88810eb5a7e8 R12: 00000000c0030300
[ 71.189067][ T1121] R13: 0000000000000010 R14: ffff8881177a5000 R15: ffff8881177a3000
[ 71.197176][ T1121] FS: 0000000000000000(0000) GS:ffff888268cf5000(0000) knlGS:0000000000000000
[ 71.206178][ T1121] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 71.212786][ T1121] CR2: 0000562152e28f48 CR3: 0000000125df6000 CR4: 00000000003506f0
[ 71.220826][ T1121] Call Trace:
[ 71.224230][ T1121]
[ 71.227210][ T1121] ? __netdev_alloc_skb+0x11/0x920
[ 71.232409][ T1121] usb_tx_block+0x241/0x2e0
[ 71.236971][ T1121] if_usb_prog_firmware+0x570/0x10c0
[ 71.242304][ T1121] ? __pfx_if_usb_prog_firmware+0x10/0x10
[ 71.248095][ T1121] ? __pfx__request_firmware+0x10/0x10
[ 71.253610][ T1121] ? do_raw_spin_unlock+0x172/0x230
[ 71.258857][ T1121] ? _raw_spin_unlock_irqrestore+0x3b/0x80
[ 71.264724][ T1121] ? __pfx_helper_firmware_cb+0x10/0x10
[ 71.270392][ T1121] helper_firmware_cb+0x1f8/0x2e0
[ 71.275482][ T1121] request_firmware_work_func+0x13c/0x250
[ 71.281216][ T1121] ? __pfx_request_firmware_work_func+0x10/0x10
[ 71.287503][ T1121] ? rcu_is_watching+0x12/0xc0
[ 71.292305][ T1121] process_one_work+0x9ba/0x1b20
[ 71.297325][ T1121] ? __pfx_process_one_work+0x10/0x10
[ 71.302728][ T1121] ? assign_work+0x1a0/0x250
[ 71.307359][ T1121] worker_thread+0x6c8/0xf10
[ 71.312247][ T1121] ? __kthread_parkme+0x19e/0x250
[ 71.317325][ T1121] ? __pfx_worker_thread+0x10/0x10
[ 71.322463][ T1121] kthread+0x3c5/0x780
[ 71.326603][ T1121] ? __pfx_kthread+0x10/0x10
[ 71.331236][ T1121] ? rcu_is_watching+0x12/0xc0
[ 71.336066][ T1121] ? __pfx_kthread+0x10/0x10
[ 71.340702][ T1121] ret_from_fork+0x74f/0xa30
[ 71.345378][ T1121] ? __pfx_ret_from_fork+0x10/0x10
[ 71.350532][ T1121] ? __switch_to+0x7a5/0x10c0
[ 71.355283][ T1121] ? __pfx_kthread+0x10/0x10
[ 71.359913][ T1121] ret_from_fork_asm+0x1a/0x30
[ 71.364745][ T1121]
[ 71.367826][ T1121] Kernel panic - not syncing: kernel: panic_on_warn set ...
[ 71.375121][ T1121] CPU: 1 UID: 0 PID: 1121 Comm: kworker/1:2 Not tainted syzkaller #0 PREEMPT(voluntary)
[ 71.385035][ T1121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 71.395191][ T1121] Workqueue: events request_firmware_work_func
[ 71.401466][ T1121] Call Trace:
[ 71.404749][ T1121]
[ 71.407682][ T1121] dump_stack_lvl+0x3d/0x1f0
[ 71.412344][ T1121] vpanic+0x640/0x6f0
[ 71.416341][ T1121] panic+0xca/0xd0
[ 71.420070][ T1121] ? __pfx_panic+0x10/0x10
[ 71.424515][ T1121] ? check_panic_on_warn+0x1f/0xb0
[ 71.429652][ T1121] check_panic_on_warn+0xab/0xb0
[ 71.434637][ T1121] __warn+0x108/0x3c0
[ 71.438641][ T1121] __report_bug+0x2a0/0x520
[ 71.443166][ T1121] ? __pfx___report_bug+0x10/0x10
[ 71.448207][ T1121] ? usb_tx_block+0x56/0x2e0
[ 71.452836][ T1121] ? debug_object_free+0x295/0x550
[ 71.458062][ T1121] report_bug_entry+0xb2/0x220
[ 71.462845][ T1121] ? usb_submit_urb+0x15a3/0x1970
[ 71.467899][ T1121] handle_bug+0x18a/0x260
[ 71.472343][ T1121] exc_invalid_op+0x17/0x50
[ 71.476867][ T1121] asm_exc_invalid_op+0x1a/0x20
[ 71.481730][ T1121] RIP: 0010:usb_submit_urb+0x15a3/0x1970
[ 71.487385][ T1121] Code: 4b 03 00 00 48 8b 04 24 48 8b 90 b0 00 00 00 eb 91 bb ed ff ff ff e9 07 f3 ff ff e8 97 f5 c5 fc 48 8d 3d 50 45 f0 05 48 89 de <67> 48 0f b9 3a bb f0 ff ff ff e9 e9 f2 ff ff e8 79 f5 c5 fc 0f 1f
[ 71.507265][ T1121] RSP: 0018:ffffc90001c7f8d0 EFLAGS: 00010293
[ 71.513348][ T1121] RAX: 0000000000000000 RBX: ffff888115a0f100 RCX: ffffffff8427b986
[ 71.521327][ T1121] RDX: ffff88810eb59d40 RSI: ffff888115a0f100 RDI: ffffffff8aaa3c30
[ 71.529483][ T1121] RBP: ffff888115a0f100 R08: 0000000000000001 R09: 0000000000000000
[ 71.537462][ T1121] R10: 0000000000000000 R11: ffff88810eb5a7e8 R12: 00000000c0030300
[ 71.545445][ T1121] R13: 0000000000000010 R14: ffff8881177a5000 R15: ffff8881177a3000
[ 71.553438][ T1121] ? usb_tx_block+0x56/0x2e0
[ 71.558068][ T1121] ? __netdev_alloc_skb+0x11/0x920
[ 71.563207][ T1121] usb_tx_block+0x241/0x2e0
[ 71.567742][ T1121] if_usb_prog_firmware+0x570/0x10c0
[ 71.573069][ T1121] ? __pfx_if_usb_prog_firmware+0x10/0x10
[ 71.578825][ T1121] ? __pfx__request_firmware+0x10/0x10
[ 71.584295][ T1121] ? do_raw_spin_unlock+0x172/0x230
[ 71.589498][ T1121] ? _raw_spin_unlock_irqrestore+0x3b/0x80
[ 71.595322][ T1121] ? __pfx_helper_firmware_cb+0x10/0x10
[ 71.600874][ T1121] helper_firmware_cb+0x1f8/0x2e0
[ 71.605908][ T1121] request_firmware_work_func+0x13c/0x250
[ 71.611636][ T1121] ? __pfx_request_firmware_work_func+0x10/0x10
[ 71.617898][ T1121] ? rcu_is_watching+0x12/0xc0
[ 71.622675][ T1121] process_one_work+0x9ba/0x1b20
[ 71.627627][ T1121] ? __pfx_process_one_work+0x10/0x10
[ 71.633012][ T1121] ? assign_work+0x1a0/0x250
[ 71.637614][ T1121] worker_thread+0x6c8/0xf10
[ 71.642218][ T1121] ? __kthread_parkme+0x19e/0x250
[ 71.647269][ T1121] ? __pfx_worker_thread+0x10/0x10
[ 71.652381][ T1121] kthread+0x3c5/0x780
[ 71.656452][ T1121] ? __pfx_kthread+0x10/0x10
[ 71.661046][ T1121] ? rcu_is_watching+0x12/0xc0
[ 71.665847][ T1121] ? __pfx_kthread+0x10/0x10
[ 71.670440][ T1121] ret_from_fork+0x74f/0xa30
[ 71.675042][ T1121] ? __pfx_ret_from_fork+0x10/0x10
[ 71.680167][ T1121] ? __switch_to+0x7a5/0x10c0
[ 71.684860][ T1121] ? __pfx_kthread+0x10/0x10
[ 71.689453][ T1121] ret_from_fork_asm+0x1a/0x30
[ 71.694249][ T1121]
[ 71.698050][ T1121] Kernel Offset: disabled
[ 71.702383][ T1121] Rebooting in 86400 seconds..