syzkaller login: [ 25.469484][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 25.469503][ T29] audit: type=1400 audit(1772190991.571:55): avc: denied { read open } for pid=2924 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=473 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.832872][ T29] audit: type=1400 audit(1772190991.931:56): avc: denied { search } for pid=2921 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 26.611608][ T29] audit: type=1400 audit(1772190992.711:57): avc: denied { transition } for pid=2942 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 26.634308][ T29] audit: type=1400 audit(1772190992.711:58): avc: denied { noatsecure } for pid=2942 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 26.654634][ T29] audit: type=1400 audit(1772190992.721:59): avc: denied { write } for pid=2942 comm="sh" path="pipe:[2374]" dev="pipefs" ino=2374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 26.677599][ T29] audit: type=1400 audit(1772190992.721:60): avc: denied { rlimitinh } for pid=2942 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 26.696759][ T29] audit: type=1400 audit(1772190992.721:61): avc: denied { siginh } for pid=2942 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 155.982860][ T2953] sshd-session (2953) used greatest stack depth: 24328 bytes left Warning: Permanently added '10.128.1.4' (ED25519) to the list of known hosts. 2026/02/27 11:18:49 parsed 1 programs [ 163.250744][ T29] audit: type=1400 audit(1772191129.351:62): avc: denied { node_bind } for pid=2964 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 163.271615][ T29] audit: type=1400 audit(1772191129.351:63): avc: denied { module_request } for pid=2964 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 165.013412][ T29] audit: type=1400 audit(1772191131.111:64): avc: denied { mounton } for pid=2974 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 165.037087][ T29] audit: type=1400 audit(1772191131.141:65): avc: denied { mount } for pid=2974 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 165.040167][ T2974] cgroup: Unknown subsys name 'net' [ 165.066276][ T29] audit: type=1400 audit(1772191131.171:66): avc: denied { unmount } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 165.186523][ T2974] cgroup: Unknown subsys name 'cpuset' [ 165.194516][ T2974] cgroup: Unknown subsys name 'rlimit' [ 165.377494][ T29] audit: type=1400 audit(1772191131.481:67): avc: denied { setattr } for pid=2974 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 165.401238][ T29] audit: type=1400 audit(1772191131.481:68): avc: denied { create } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.422108][ T29] audit: type=1400 audit(1772191131.481:69): avc: denied { write } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.442841][ T29] audit: type=1400 audit(1772191131.481:70): avc: denied { read } for pid=2974 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.470052][ T29] audit: type=1400 audit(1772191131.521:71): avc: denied { sys_module } for pid=2974 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 165.519281][ T2978] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 165.574000][ T2974] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 166.987061][ T2980] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 177.502087][ T3009] syz-executor (3009) used greatest stack depth: 22648 bytes left [ 178.127287][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 178.127316][ T29] audit: type=1400 audit(1772191144.231:100): avc: denied { create } for pid=3474 comm="syz-executor" name="tun" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 178.158619][ T29] audit: type=1400 audit(1772191144.231:101): avc: denied { setattr } for pid=3474 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 178.185407][ T29] audit: type=1400 audit(1772191144.231:102): avc: denied { read write } for pid=3474 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 178.208424][ T29] audit: type=1400 audit(1772191144.231:103): avc: denied { open } for pid=3474 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 178.837342][ T29] audit: type=1400 audit(1772191144.941:104): avc: denied { create } for pid=3497 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 178.867368][ T29] audit: type=1400 audit(1772191144.941:105): avc: denied { sys_admin } for pid=3497 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 178.905529][ T29] audit: type=1400 audit(1772191144.991:106): avc: denied { sys_chroot } for pid=3498 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 2026/02/27 11:19:05 executed programs: 0 2026/02/27 11:19:15 executed programs: 2 [ 189.151522][ T29] audit: type=1400 audit(1772191155.251:107): avc: denied { read write } for pid=3958 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 189.179693][ T29] audit: type=1400 audit(1772191155.281:108): avc: denied { open } for pid=3958 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 189.209278][ T29] audit: type=1400 audit(1772191155.281:109): avc: denied { ioctl } for pid=3958 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 189.414473][ T778] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 189.564224][ T778] usb 4-1: Using ep0 maxpacket: 32 [ 189.571092][ T778] usb 4-1: config 0 has too many interfaces: 197, using maximum allowed: 32 [ 189.579903][ T778] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 197 [ 189.588982][ T778] usb 4-1: config 0 has no interface number 0 [ 189.595181][ T778] usb 4-1: New USB device found, idVendor=1286, idProduct=2001, bcdDevice= 6.2d [ 189.604257][ T778] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 189.615946][ T778] usb 4-1: config 0 descriptor?? [ 189.643174][ T29] audit: type=1400 audit(1772191155.741:110): avc: denied { firmware_load } for pid=23 comm="kworker/1:0" path="/lib/firmware/libertas/usb8388_olpc.bin" dev="sda1" ino=432 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 189.884331][ C1] usb8xxx: URB in failure status: -2 [ 190.024943][ C1] usb8xxx: URB in failure status: -71 [ 190.026575][ T10] usb 4-1: USB disconnect, device number 2 2026/02/27 11:19:22 executed programs: 5 2026/02/27 11:19:28 executed programs: 7 2026/02/27 11:19:34 executed programs: 9 2026/02/27 11:19:40 executed programs: 11 2026/02/27 11:19:46 executed programs: 13 2026/02/27 11:19:52 executed programs: 15 2026/02/27 11:19:58 executed programs: 17 2026/02/27 11:20:05 executed programs: 19 2026/02/27 11:20:11 executed programs: 21 2026/02/27 11:20:17 executed programs: 23 2026/02/27 11:20:23 executed programs: 25 2026/02/27 11:20:29 executed programs: 27 2026/02/27 11:20:35 executed programs: 29 2026/02/27 11:20:41 executed programs: 31 2026/02/27 11:20:47 executed programs: 33 2026/02/27 11:20:53 executed programs: 35 2026/02/27 11:20:59 executed programs: 37 2026/02/27 11:21:05 executed programs: 39 2026/02/27 11:21:11 executed programs: 41 2026/02/27 11:21:17 executed programs: 43 2026/02/27 11:21:23 executed programs: 45 2026/02/27 11:21:29 executed programs: 47 2026/02/27 11:21:35 executed programs: 49 2026/02/27 11:21:41 executed programs: 51 2026/02/27 11:21:47 executed programs: 53 2026/02/27 11:21:53 executed programs: 55 [ 349.144262][ T30] INFO: task kworker/0:1:10 blocked for more than 143 seconds. [ 349.151833][ T30] Not tainted syzkaller #0 [ 349.156959][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 349.165663][ T30] task:kworker/0:1 state:D stack:26840 pid:10 tgid:10 ppid:2 task_flags:0x4288060 flags:0x00080000 [ 349.177720][ T30] Workqueue: usb_hub_wq hub_event [ 349.182789][ T30] Call Trace: [ 349.186090][ T30] [ 349.189025][ T30] __schedule+0xeb1/0x41f0 [ 349.193430][ T30] ? do_raw_spin_lock+0x128/0x260 [ 349.198480][ T30] ? __pfx___schedule+0x10/0x10 [ 349.203339][ T30] ? find_held_lock+0x2b/0x80 [ 349.208051][ T30] ? schedule+0x2bf/0x390 [ 349.212394][ T30] schedule+0xdd/0x390 [ 349.216487][ T30] lbs_wait_for_firmware_load+0x11e/0x1e0 [ 349.222221][ T30] ? __pfx_lbs_wait_for_firmware_load+0x10/0x10 [ 349.228486][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 349.233697][ T30] ? __pfx_autoremove_wake_function+0x10/0x10 [ 349.239796][ T30] ? usb_hcd_flush_endpoint+0x359/0x400 [ 349.245387][ T30] lbs_remove_card+0x84/0x390 [ 349.250062][ T30] if_usb_disconnect+0xaf/0x2e0 [ 349.254985][ T30] usb_unbind_interface+0x1dd/0x9e0 [ 349.260219][ T30] ? kernfs_remove_by_name_ns+0x9f/0xf0 [ 349.265824][ T30] ? __pfx_usb_unbind_interface+0x10/0x10 [ 349.271568][ T30] device_remove+0x12a/0x180 [ 349.276189][ T30] device_release_driver_internal+0x42e/0x600 [ 349.282275][ T30] bus_remove_device+0x22f/0x440 [ 349.287271][ T30] device_del+0x376/0x9b0 [ 349.291613][ T30] ? __pfx_device_del+0x10/0x10 [ 349.296495][ T30] ? kobject_put+0xb9/0x640 [ 349.301023][ T30] usb_disable_device+0x367/0x810 [ 349.306164][ T30] usb_disconnect+0x2e2/0x9a0 [ 349.310866][ T30] hub_event+0x1d0c/0x4af0 [ 349.315328][ T30] ? __lock_acquire+0x4a5/0x2630 [ 349.320286][ T30] ? do_raw_spin_unlock+0x145/0x1e0 [ 349.325522][ T30] ? __pfx_hub_event+0x10/0x10 [ 349.330303][ T30] ? debug_object_deactivate+0x2e4/0x3b0 [ 349.335975][ T30] ? rcu_is_watching+0x12/0xc0 [ 349.340760][ T30] process_one_work+0x9d7/0x1920 [ 349.345738][ T30] ? __pfx_process_one_work+0x10/0x10 [ 349.351127][ T30] ? __pfx_hub_event+0x10/0x10 [ 349.355929][ T30] worker_thread+0x5da/0xe40 [ 349.360536][ T30] ? __pfx_worker_thread+0x10/0x10 [ 349.365685][ T30] ? kthread+0x13a/0x450 [ 349.369936][ T30] ? __pfx_worker_thread+0x10/0x10 [ 349.375066][ T30] kthread+0x370/0x450 [ 349.379146][ T30] ? __pfx_kthread+0x10/0x10 [ 349.383727][ T30] ret_from_fork+0x6c3/0xcb0 [ 349.388355][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 349.393495][ T30] ? __switch_to+0x7aa/0x1120 [ 349.398206][ T30] ? __pfx_kthread+0x10/0x10 [ 349.402807][ T30] ret_from_fork_asm+0x1a/0x30 [ 349.407621][ T30] [ 349.410677][ T30] [ 349.410677][ T30] Showing all locks held in the system: [ 349.418422][ T30] 5 locks held by kworker/0:1/10: [ 349.423444][ T30] #0: ffff8881056afd48 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 [ 349.434257][ T30] #1: ffffc900000afd18 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 [ 349.445562][ T30] #2: ffff88810b795198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1bd/0x4af0 [ 349.454474][ T30] #3: ffff88811c2c3198 (&dev->mutex){....}-{4:4}, at: usb_disconnect+0x10a/0x9a0 [ 349.463749][ T30] #4: ffff88811bcbf160 (&dev->mutex){....}-{4:4}, at: device_release_driver_internal+0xaa/0x600 [ 349.474344][ T30] 2 locks held by kworker/1:0/23: [ 349.479366][ T30] #0: ffff88810006b548 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 [ 349.489841][ T30] #1: ffffc9000018fd18 ((work_completion)(&fw_work->work)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 [ 349.501294][ T30] 1 lock held by khungtaskd/30: [ 349.506164][ T30] #0: ffffffff896e05a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 [ 349.516183][ T30] 2 locks held by getty/2917: [ 349.520844][ T30] #0: ffff888115dd90a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 349.530616][ T30] #1: ffffc900000432f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x1500 [ 349.540774][ T30] [ 349.543085][ T30] ============================================= [ 349.543085][ T30] [ 349.551510][ T30] NMI backtrace for cpu 0 [ 349.551540][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 349.551570][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 349.551582][ T30] Call Trace: [ 349.551590][ T30] [ 349.551598][ T30] dump_stack_lvl+0x100/0x190 [ 349.551632][ T30] nmi_cpu_backtrace.cold+0x12d/0x151 [ 349.551666][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 349.551704][ T30] nmi_trigger_cpumask_backtrace+0x1d7/0x230 [ 349.551735][ T30] sys_info+0x141/0x190 [ 349.551759][ T30] watchdog+0xd25/0x1050 [ 349.551797][ T30] ? __pfx_watchdog+0x10/0x10 [ 349.551827][ T30] ? __kthread_parkme+0x18c/0x230 [ 349.551868][ T30] ? kthread+0x13a/0x450 [ 349.551894][ T30] ? __pfx_watchdog+0x10/0x10 [ 349.551921][ T30] kthread+0x370/0x450 [ 349.551948][ T30] ? __pfx_kthread+0x10/0x10 [ 349.551978][ T30] ret_from_fork+0x6c3/0xcb0 [ 349.552016][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 349.552055][ T30] ? __switch_to+0x7aa/0x1120 [ 349.552081][ T30] ? __pfx_kthread+0x10/0x10 [ 349.552110][ T30] ret_from_fork_asm+0x1a/0x30 [ 349.552164][ T30] [ 349.552173][ T30] Sending NMI from CPU 0 to CPUs 1: [ 349.671122][ C1] NMI backtrace for cpu 1 [ 349.671144][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) [ 349.671171][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 349.671185][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 349.671220][ C1] Code: ae b1 01 e9 13 e8 02 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d d3 e1 1d 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 349.671242][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000242 [ 349.671264][ C1] RAX: 000000000007f00b RBX: ffff8881022a1d00 RCX: ffffffff876898d5 [ 349.671280][ C1] RDX: 0000000000000000 RSI: ffffffff8901db96 RDI: ffffffff87afa420 [ 349.671295][ C1] RBP: 0000000000000001 R08: 0000000000000001 R09: ffffed103eae6725 [ 349.671310][ C1] R10: ffff8881f573392b R11: 0000000000000000 R12: ffffed10204543a0 [ 349.671325][ C1] R13: 0000000000000001 R14: ffffffff8aefe2d0 R15: 0000000000000000 [ 349.671342][ C1] FS: 0000000000000000(0000) GS:ffff8882687d3000(0000) knlGS:0000000000000000 [ 349.671364][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 349.671379][ C1] CR2: 00007f983bef5900 CR3: 0000000116d22000 CR4: 00000000003506f0 [ 349.671394][ C1] Call Trace: [ 349.671403][ C1] [ 349.671411][ C1] default_idle+0x9/0x10 [ 349.671444][ C1] default_idle_call+0x6c/0xb0 [ 349.671476][ C1] do_idle+0x35b/0x4b0 [ 349.671513][ C1] ? __pfx_do_idle+0x10/0x10 [ 349.671552][ C1] cpu_startup_entry+0x4f/0x60 [ 349.671588][ C1] start_secondary+0x21d/0x2d0 [ 349.671622][ C1] ? __pfx_start_secondary+0x10/0x10 [ 349.671670][ C1] common_startup_64+0x13e/0x148 [ 349.671714][ C1] [ 349.672106][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 349.672124][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 349.672154][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 349.672169][ T30] Call Trace: [ 349.672178][ T30] [ 349.672189][ T30] dump_stack_lvl+0x100/0x190 [ 349.672225][ T30] vpanic+0x552/0x970 [ 349.672256][ T30] ? __pfx_vpanic+0x10/0x10 [ 349.672286][ T30] ? nmi_trigger_cpumask_backtrace+0x182/0x230 [ 349.672316][ T30] ? rcu_is_watching+0x12/0xc0 [ 349.672351][ T30] panic+0xd1/0xe0 [ 349.672380][ T30] ? __pfx_panic+0x10/0x10 [ 349.672417][ T30] ? wq_watchdog_touch+0xec/0x1a0 [ 349.672462][ T30] ? nmi_trigger_cpumask_backtrace+0x1be/0x230 [ 349.672491][ T30] ? watchdog.cold+0x198/0x1ca [ 349.672523][ T30] ? watchdog+0xd35/0x1050 [ 349.672553][ T30] watchdog.cold+0x1a9/0x1ca [ 349.672595][ T30] ? __pfx_watchdog+0x10/0x10 [ 349.672625][ T30] ? __kthread_parkme+0x18c/0x230 [ 349.672667][ T30] ? kthread+0x13a/0x450 [ 349.672692][ T30] ? __pfx_watchdog+0x10/0x10 [ 349.672719][ T30] kthread+0x370/0x450 [ 349.672745][ T30] ? __pfx_kthread+0x10/0x10 [ 349.672774][ T30] ret_from_fork+0x6c3/0xcb0 [ 349.672812][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 349.672850][ T30] ? __switch_to+0x7aa/0x1120 [ 349.672876][ T30] ? __pfx_kthread+0x10/0x10 [ 349.672905][ T30] ret_from_fork_asm+0x1a/0x30 [ 349.672959][ T30] [ 349.978160][ T30] Kernel Offset: disabled [ 349.982474][ T30] Rebooting in 86400 seconds..