syzkaller login: [ 25.627435][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 25.627454][ T29] audit: type=1400 audit(1765735093.474:55): avc: denied { read open } for pid=2924 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=467 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.991100][ T29] audit: type=1400 audit(1765735093.834:56): avc: denied { search } for pid=2921 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 27.705058][ T29] audit: type=1400 audit(1765735095.544:57): avc: denied { transition } for pid=2943 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.728045][ T29] audit: type=1400 audit(1765735095.554:58): avc: denied { noatsecure } for pid=2943 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.747852][ T29] audit: type=1400 audit(1765735095.564:59): avc: denied { write } for pid=2943 comm="sh" path="pipe:[2091]" dev="pipefs" ino=2091 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 27.770694][ T29] audit: type=1400 audit(1765735095.564:60): avc: denied { rlimitinh } for pid=2943 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.789994][ T29] audit: type=1400 audit(1765735095.564:61): avc: denied { siginh } for pid=2943 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.677233][ T2947] sftp-server (2947) used greatest stack depth: 23608 bytes left [ 31.690031][ T2946] sshd-session (2946) used greatest stack depth: 23400 bytes left Warning: Permanently added '10.128.1.245' (ED25519) to the list of known hosts. 2025/12/14 17:58:29 parsed 1 programs [ 41.919357][ T29] audit: type=1400 audit(1765735109.764:62): avc: denied { node_bind } for pid=2963 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 41.940299][ T29] audit: type=1400 audit(1765735109.764:63): avc: denied { module_request } for pid=2963 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 43.656474][ T29] audit: type=1400 audit(1765735111.504:64): avc: denied { mounton } for pid=2974 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 43.680088][ T29] audit: type=1400 audit(1765735111.524:65): avc: denied { mount } for pid=2974 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.683014][ T2974] cgroup: Unknown subsys name 'net' [ 43.709939][ T29] audit: type=1400 audit(1765735111.554:66): avc: denied { unmount } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.808307][ T2974] cgroup: Unknown subsys name 'cpuset' [ 43.816573][ T2974] cgroup: Unknown subsys name 'rlimit' [ 43.968715][ T29] audit: type=1400 audit(1765735111.814:67): avc: denied { setattr } for pid=2974 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.992192][ T29] audit: type=1400 audit(1765735111.814:68): avc: denied { create } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.012730][ T29] audit: type=1400 audit(1765735111.814:69): avc: denied { write } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.033249][ T29] audit: type=1400 audit(1765735111.814:70): avc: denied { read } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 44.054334][ T29] audit: type=1400 audit(1765735111.854:71): avc: denied { sys_module } for pid=2974 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 44.107656][ T2979] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 44.150272][ T2974] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 45.674075][ T2981] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 57.461277][ T3032] syz-executor (3032) used greatest stack depth: 22728 bytes left [ 57.684910][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 57.684936][ T29] audit: type=1400 audit(1765735125.524:99): avc: denied { create } for pid=3491 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 57.853862][ T29] audit: type=1400 audit(1765735125.694:100): avc: denied { create } for pid=3497 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 57.887908][ T29] audit: type=1400 audit(1765735125.704:101): avc: denied { sys_admin } for pid=3497 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 57.924055][ T29] audit: type=1400 audit(1765735125.764:102): avc: denied { sys_chroot } for pid=3498 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 2025/12/14 17:58:46 executed programs: 0 2025/12/14 17:58:56 executed programs: 2 [ 68.534931][ T29] audit: type=1400 audit(1765735136.374:103): avc: denied { read write } for pid=3958 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.575730][ T29] audit: type=1400 audit(1765735136.374:104): avc: denied { open } for pid=3958 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.598930][ T29] audit: type=1400 audit(1765735136.374:105): avc: denied { ioctl } for pid=3958 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.795356][ T38] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 68.945234][ T38] usb 4-1: Using ep0 maxpacket: 16 [ 68.952549][ T38] usb 4-1: config 231 has an invalid interface number: 206 but max is 0 [ 68.961074][ T38] usb 4-1: config 231 has no interface number 0 [ 68.967558][ T38] usb 4-1: config 231 interface 206 altsetting 2 bulk endpoint 0x6 has invalid maxpacket 16 [ 68.977767][ T38] usb 4-1: config 231 interface 206 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 8 [ 68.987889][ T38] usb 4-1: config 231 interface 206 altsetting 2 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 69.001190][ T38] usb 4-1: config 231 interface 206 has no altsetting 0 [ 69.009996][ T38] usb 4-1: New USB device found, idVendor=05a3, idProduct=8388, bcdDevice=b1.ad [ 69.019302][ T38] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 69.027344][ T38] usb 4-1: Product: syz [ 69.031579][ T38] usb 4-1: Manufacturer: syz [ 69.036232][ T38] usb 4-1: SerialNumber: syz [ 69.044642][ T3958] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 69.052058][ T3958] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 69.281386][ T38] usb 4-1: USB disconnect, device number 2 [ 69.298378][ T29] audit: type=1400 audit(1765735137.144:106): avc: denied { firmware_load } for pid=1121 comm="kworker/1:2" path="/lib/firmware/libertas/usb8388_olpc.bin" dev="sda1" ino=432 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 69.755248][ T38] usb 4-1: new full-speed USB device number 3 using dummy_hcd [ 69.906185][ T38] usb 4-1: not running at top speed; connect to a high speed hub [ 69.914811][ T38] usb 4-1: config 231 has an invalid interface number: 206 but max is 0 [ 69.923209][ T38] usb 4-1: config 231 has no interface number 0 [ 69.929606][ T38] usb 4-1: config 231 interface 206 altsetting 2 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 69.942871][ T38] usb 4-1: config 231 interface 206 has no altsetting 0 [ 69.952441][ T38] usb 4-1: string descriptor 0 read error: -22 [ 69.958786][ T38] usb 4-1: New USB device found, idVendor=05a3, idProduct=8388, bcdDevice=b1.ad [ 69.967857][ T38] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 71.075239][ T1121] ------------[ cut here ]------------ [ 71.080750][ T1121] URB ffff888115a0f100 submitted while active [ 71.086890][ T1121] WARNING: drivers/usb/core/urb.c:380 at 0x0, CPU#1: kworker/1:2/1121 [ 71.095155][ T1121] Modules linked in: [ 71.099191][ T1121] CPU: 1 UID: 0 PID: 1121 Comm: kworker/1:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 71.109046][ T1121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 71.119168][ T1121] Workqueue: events request_firmware_work_func [ 71.125395][ T1121] RIP: 0010:usb_submit_urb+0x15a3/0x1970 [ 71.131074][ T1121] Code: 4b 03 00 00 48 8b 04 24 48 8b 90 b0 00 00 00 eb 91 bb ed ff ff ff e9 07 f3 ff ff e8 97 f5 c5 fc 48 8d 3d 50 45 f0 05 48 89 de <67> 48 0f b9 3a bb f0 ff ff ff e9 e9 f2 ff ff e8 79 f5 c5 fc 0f 1f [ 71.150774][ T1121] RSP: 0018:ffffc90001c7f8d0 EFLAGS: 00010293 [ 71.156921][ T1121] RAX: 0000000000000000 RBX: ffff888115a0f100 RCX: ffffffff8427b986 [ 71.164923][ T1121] RDX: ffff88810eb59d40 RSI: ffff888115a0f100 RDI: ffffffff8aaa3c30 [ 71.172948][ T1121] RBP: ffff888115a0f100 R08: 0000000000000001 R09: 0000000000000000 [ 71.181029][ T1121] R10: 0000000000000000 R11: ffff88810eb5a7e8 R12: 00000000c0030300 [ 71.189067][ T1121] R13: 0000000000000010 R14: ffff8881177a5000 R15: ffff8881177a3000 [ 71.197176][ T1121] FS: 0000000000000000(0000) GS:ffff888268cf5000(0000) knlGS:0000000000000000 [ 71.206178][ T1121] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 71.212786][ T1121] CR2: 0000562152e28f48 CR3: 0000000125df6000 CR4: 00000000003506f0 [ 71.220826][ T1121] Call Trace: [ 71.224230][ T1121] [ 71.227210][ T1121] ? __netdev_alloc_skb+0x11/0x920 [ 71.232409][ T1121] usb_tx_block+0x241/0x2e0 [ 71.236971][ T1121] if_usb_prog_firmware+0x570/0x10c0 [ 71.242304][ T1121] ? __pfx_if_usb_prog_firmware+0x10/0x10 [ 71.248095][ T1121] ? __pfx__request_firmware+0x10/0x10 [ 71.253610][ T1121] ? do_raw_spin_unlock+0x172/0x230 [ 71.258857][ T1121] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 71.264724][ T1121] ? __pfx_helper_firmware_cb+0x10/0x10 [ 71.270392][ T1121] helper_firmware_cb+0x1f8/0x2e0 [ 71.275482][ T1121] request_firmware_work_func+0x13c/0x250 [ 71.281216][ T1121] ? __pfx_request_firmware_work_func+0x10/0x10 [ 71.287503][ T1121] ? rcu_is_watching+0x12/0xc0 [ 71.292305][ T1121] process_one_work+0x9ba/0x1b20 [ 71.297325][ T1121] ? __pfx_process_one_work+0x10/0x10 [ 71.302728][ T1121] ? assign_work+0x1a0/0x250 [ 71.307359][ T1121] worker_thread+0x6c8/0xf10 [ 71.312247][ T1121] ? __kthread_parkme+0x19e/0x250 [ 71.317325][ T1121] ? __pfx_worker_thread+0x10/0x10 [ 71.322463][ T1121] kthread+0x3c5/0x780 [ 71.326603][ T1121] ? __pfx_kthread+0x10/0x10 [ 71.331236][ T1121] ? rcu_is_watching+0x12/0xc0 [ 71.336066][ T1121] ? __pfx_kthread+0x10/0x10 [ 71.340702][ T1121] ret_from_fork+0x74f/0xa30 [ 71.345378][ T1121] ? __pfx_ret_from_fork+0x10/0x10 [ 71.350532][ T1121] ? __switch_to+0x7a5/0x10c0 [ 71.355283][ T1121] ? __pfx_kthread+0x10/0x10 [ 71.359913][ T1121] ret_from_fork_asm+0x1a/0x30 [ 71.364745][ T1121] [ 71.367826][ T1121] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 71.375121][ T1121] CPU: 1 UID: 0 PID: 1121 Comm: kworker/1:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 71.385035][ T1121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 71.395191][ T1121] Workqueue: events request_firmware_work_func [ 71.401466][ T1121] Call Trace: [ 71.404749][ T1121] [ 71.407682][ T1121] dump_stack_lvl+0x3d/0x1f0 [ 71.412344][ T1121] vpanic+0x640/0x6f0 [ 71.416341][ T1121] panic+0xca/0xd0 [ 71.420070][ T1121] ? __pfx_panic+0x10/0x10 [ 71.424515][ T1121] ? check_panic_on_warn+0x1f/0xb0 [ 71.429652][ T1121] check_panic_on_warn+0xab/0xb0 [ 71.434637][ T1121] __warn+0x108/0x3c0 [ 71.438641][ T1121] __report_bug+0x2a0/0x520 [ 71.443166][ T1121] ? __pfx___report_bug+0x10/0x10 [ 71.448207][ T1121] ? usb_tx_block+0x56/0x2e0 [ 71.452836][ T1121] ? debug_object_free+0x295/0x550 [ 71.458062][ T1121] report_bug_entry+0xb2/0x220 [ 71.462845][ T1121] ? usb_submit_urb+0x15a3/0x1970 [ 71.467899][ T1121] handle_bug+0x18a/0x260 [ 71.472343][ T1121] exc_invalid_op+0x17/0x50 [ 71.476867][ T1121] asm_exc_invalid_op+0x1a/0x20 [ 71.481730][ T1121] RIP: 0010:usb_submit_urb+0x15a3/0x1970 [ 71.487385][ T1121] Code: 4b 03 00 00 48 8b 04 24 48 8b 90 b0 00 00 00 eb 91 bb ed ff ff ff e9 07 f3 ff ff e8 97 f5 c5 fc 48 8d 3d 50 45 f0 05 48 89 de <67> 48 0f b9 3a bb f0 ff ff ff e9 e9 f2 ff ff e8 79 f5 c5 fc 0f 1f [ 71.507265][ T1121] RSP: 0018:ffffc90001c7f8d0 EFLAGS: 00010293 [ 71.513348][ T1121] RAX: 0000000000000000 RBX: ffff888115a0f100 RCX: ffffffff8427b986 [ 71.521327][ T1121] RDX: ffff88810eb59d40 RSI: ffff888115a0f100 RDI: ffffffff8aaa3c30 [ 71.529483][ T1121] RBP: ffff888115a0f100 R08: 0000000000000001 R09: 0000000000000000 [ 71.537462][ T1121] R10: 0000000000000000 R11: ffff88810eb5a7e8 R12: 00000000c0030300 [ 71.545445][ T1121] R13: 0000000000000010 R14: ffff8881177a5000 R15: ffff8881177a3000 [ 71.553438][ T1121] ? usb_tx_block+0x56/0x2e0 [ 71.558068][ T1121] ? __netdev_alloc_skb+0x11/0x920 [ 71.563207][ T1121] usb_tx_block+0x241/0x2e0 [ 71.567742][ T1121] if_usb_prog_firmware+0x570/0x10c0 [ 71.573069][ T1121] ? __pfx_if_usb_prog_firmware+0x10/0x10 [ 71.578825][ T1121] ? __pfx__request_firmware+0x10/0x10 [ 71.584295][ T1121] ? do_raw_spin_unlock+0x172/0x230 [ 71.589498][ T1121] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 71.595322][ T1121] ? __pfx_helper_firmware_cb+0x10/0x10 [ 71.600874][ T1121] helper_firmware_cb+0x1f8/0x2e0 [ 71.605908][ T1121] request_firmware_work_func+0x13c/0x250 [ 71.611636][ T1121] ? __pfx_request_firmware_work_func+0x10/0x10 [ 71.617898][ T1121] ? rcu_is_watching+0x12/0xc0 [ 71.622675][ T1121] process_one_work+0x9ba/0x1b20 [ 71.627627][ T1121] ? __pfx_process_one_work+0x10/0x10 [ 71.633012][ T1121] ? assign_work+0x1a0/0x250 [ 71.637614][ T1121] worker_thread+0x6c8/0xf10 [ 71.642218][ T1121] ? __kthread_parkme+0x19e/0x250 [ 71.647269][ T1121] ? __pfx_worker_thread+0x10/0x10 [ 71.652381][ T1121] kthread+0x3c5/0x780 [ 71.656452][ T1121] ? __pfx_kthread+0x10/0x10 [ 71.661046][ T1121] ? rcu_is_watching+0x12/0xc0 [ 71.665847][ T1121] ? __pfx_kthread+0x10/0x10 [ 71.670440][ T1121] ret_from_fork+0x74f/0xa30 [ 71.675042][ T1121] ? __pfx_ret_from_fork+0x10/0x10 [ 71.680167][ T1121] ? __switch_to+0x7a5/0x10c0 [ 71.684860][ T1121] ? __pfx_kthread+0x10/0x10 [ 71.689453][ T1121] ret_from_fork_asm+0x1a/0x30 [ 71.694249][ T1121] [ 71.698050][ T1121] Kernel Offset: disabled [ 71.702383][ T1121] Rebooting in 86400 seconds..