Warning: Permanently added '10.128.0.226' (ED25519) to the list of known hosts. 2026/03/05 04:14:10 parsed 1 programs [ 141.743566][ T29] audit: type=1400 audit(1772684050.833:62): avc: denied { node_bind } for pid=2963 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 141.764799][ T29] audit: type=1400 audit(1772684050.833:63): avc: denied { module_request } for pid=2963 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 143.961412][ T29] audit: type=1400 audit(1772684053.043:64): avc: denied { mounton } for pid=2972 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 143.986167][ T29] audit: type=1400 audit(1772684053.073:65): avc: denied { mount } for pid=2972 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 143.989708][ T2972] cgroup: Unknown subsys name 'net' [ 144.016177][ T29] audit: type=1400 audit(1772684053.103:66): avc: denied { unmount } for pid=2972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 144.155768][ T2972] cgroup: Unknown subsys name 'cpuset' [ 144.164883][ T2972] cgroup: Unknown subsys name 'rlimit' [ 144.324163][ T29] audit: type=1400 audit(1772684053.413:67): avc: denied { setattr } for pid=2972 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 144.348278][ T29] audit: type=1400 audit(1772684053.413:68): avc: denied { create } for pid=2972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.369136][ T29] audit: type=1400 audit(1772684053.413:69): avc: denied { write } for pid=2972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.390511][ T29] audit: type=1400 audit(1772684053.413:70): avc: denied { read } for pid=2972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.411435][ T29] audit: type=1400 audit(1772684053.453:71): avc: denied { sys_module } for pid=2972 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 144.492153][ T2977] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 144.519797][ T2972] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 146.249084][ T2979] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 146.930970][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 146.930994][ T29] audit: type=1400 audit(1772684056.013:98): avc: denied { create } for pid=3008 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 159.609314][ T3022] syz-executor (3022) used greatest stack depth: 22984 bytes left [ 160.447821][ T29] audit: type=1400 audit(1772684069.533:99): avc: denied { create } for pid=3491 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 160.472167][ T29] audit: type=1400 audit(1772684069.533:100): avc: denied { sys_admin } for pid=3491 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 160.509973][ T29] audit: type=1400 audit(1772684069.593:101): avc: denied { sys_chroot } for pid=3492 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 160.681383][ T29] audit: type=1400 audit(1772684069.763:102): avc: denied { create } for pid=3498 comm="syz-executor" name="tun" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 160.703921][ T29] audit: type=1400 audit(1772684069.763:103): avc: denied { setattr } for pid=3498 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 160.726681][ T29] audit: type=1400 audit(1772684069.763:104): avc: denied { read write } for pid=3498 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 160.749580][ T29] audit: type=1400 audit(1772684069.763:105): avc: denied { open } for pid=3498 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 160.847798][ T29] audit: type=1401 audit(1772684069.933:106): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2026/03/05 04:14:30 executed programs: 0 2026/03/05 04:14:42 executed programs: 2 [ 173.080416][ T29] audit: type=1400 audit(1772684082.163:107): avc: denied { read write } for pid=3958 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.113787][ T29] audit: type=1400 audit(1772684082.163:108): avc: denied { open } for pid=3958 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.154213][ T29] audit: type=1400 audit(1772684082.163:109): avc: denied { ioctl } for pid=3958 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.313561][ T23] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 173.463350][ T23] usb 4-1: Using ep0 maxpacket: 32 [ 173.470668][ T23] usb 4-1: config 0 has too many interfaces: 197, using maximum allowed: 32 [ 173.479716][ T23] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 197 [ 173.489025][ T23] usb 4-1: config 0 has no interface number 0 [ 173.495380][ T23] usb 4-1: New USB device found, idVendor=1286, idProduct=2001, bcdDevice= 6.2d [ 173.504916][ T23] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 173.517298][ T23] usb 4-1: config 0 descriptor?? [ 173.551554][ T29] audit: type=1400 audit(1772684082.633:110): avc: denied { firmware_load } for pid=3502 comm="kworker/1:3" path="/lib/firmware/libertas/usb8388_olpc.bin" dev="sda1" ino=432 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 173.763366][ C1] usb8xxx: URB in failure status: -2 [ 173.928901][ C1] usb8xxx: URB in failure status: -71 [ 173.935663][ T23] usb 4-1: USB disconnect, device number 2 2026/03/05 04:14:49 executed programs: 5 2026/03/05 04:14:55 executed programs: 7 2026/03/05 04:15:01 executed programs: 9 2026/03/05 04:15:07 executed programs: 11 2026/03/05 04:15:13 executed programs: 13 2026/03/05 04:15:19 executed programs: 15 2026/03/05 04:15:25 executed programs: 17 2026/03/05 04:15:31 executed programs: 19 2026/03/05 04:15:37 executed programs: 21 2026/03/05 04:15:44 executed programs: 23 2026/03/05 04:15:50 executed programs: 25 2026/03/05 04:15:56 executed programs: 27 2026/03/05 04:16:02 executed programs: 29 2026/03/05 04:16:08 executed programs: 31 2026/03/05 04:16:14 executed programs: 33 2026/03/05 04:16:20 executed programs: 35 2026/03/05 04:16:26 executed programs: 37 2026/03/05 04:16:32 executed programs: 39 2026/03/05 04:16:38 executed programs: 41 2026/03/05 04:16:44 executed programs: 43 2026/03/05 04:16:50 executed programs: 45 2026/03/05 04:16:56 executed programs: 47 2026/03/05 04:17:02 executed programs: 49 2026/03/05 04:17:08 executed programs: 51 2026/03/05 04:17:14 executed programs: 53 [ 327.643371][ T30] INFO: task kworker/1:0:23 blocked for more than 143 seconds. [ 327.651261][ T30] Not tainted syzkaller #0 [ 327.656443][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 327.665414][ T30] task:kworker/1:0 state:D stack:24008 pid:23 tgid:23 ppid:2 task_flags:0x4288060 flags:0x00080000 [ 327.678097][ T30] Workqueue: usb_hub_wq hub_event [ 327.683949][ T30] Call Trace: [ 327.687296][ T30] [ 327.690360][ T30] __schedule+0xeb1/0x41f0 [ 327.694946][ T30] ? __pfx___schedule+0x10/0x10 [ 327.699953][ T30] ? find_held_lock+0x2b/0x80 [ 327.705057][ T30] ? schedule+0x2bf/0x390 [ 327.709451][ T30] schedule+0xdd/0x390 [ 327.713847][ T30] lbs_wait_for_firmware_load+0x11e/0x1e0 [ 327.719993][ T30] ? __pfx_lbs_wait_for_firmware_load+0x10/0x10 [ 327.726832][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 327.732176][ T30] ? __pfx_autoremove_wake_function+0x10/0x10 [ 327.738496][ T30] ? usb_hcd_flush_endpoint+0x359/0x400 [ 327.744362][ T30] lbs_remove_card+0x84/0x390 [ 327.749567][ T30] if_usb_disconnect+0xaf/0x2e0 [ 327.754786][ T30] usb_unbind_interface+0x1dd/0x9e0 [ 327.760408][ T30] ? kernfs_remove_by_name_ns+0x9f/0xf0 [ 327.766278][ T30] ? __pfx_usb_unbind_interface+0x10/0x10 [ 327.772149][ T30] device_remove+0x12a/0x180 [ 327.777154][ T30] device_release_driver_internal+0x42e/0x600 [ 327.783684][ T30] bus_remove_device+0x22f/0x440 [ 327.788693][ T30] device_del+0x376/0x9b0 [ 327.793215][ T30] ? __pfx_device_del+0x10/0x10 [ 327.798123][ T30] ? kobject_put+0xb9/0x640 [ 327.803239][ T30] usb_disable_device+0x367/0x810 [ 327.808559][ T30] usb_disconnect+0x2e2/0x9a0 [ 327.813473][ T30] hub_event+0x1d0c/0x4af0 [ 327.818120][ T30] ? __lock_acquire+0x4a5/0x2630 [ 327.824245][ T30] ? do_raw_spin_unlock+0x145/0x1e0 [ 327.829745][ T30] ? __pfx_hub_event+0x10/0x10 [ 327.834938][ T30] ? debug_object_deactivate+0x2e4/0x3b0 [ 327.841214][ T30] ? rcu_is_watching+0x12/0xc0 [ 327.846282][ T30] process_one_work+0x9d7/0x1920 [ 327.851537][ T30] ? __pfx_process_one_work+0x10/0x10 [ 327.857089][ T30] ? __pfx_hub_event+0x10/0x10 [ 327.862069][ T30] worker_thread+0x5da/0xe40 [ 327.866899][ T30] ? kthread+0x13a/0x450 [ 327.871434][ T30] ? __pfx_worker_thread+0x10/0x10 [ 327.877093][ T30] kthread+0x370/0x450 [ 327.881237][ T30] ? __pfx_kthread+0x10/0x10 [ 327.886159][ T30] ret_from_fork+0x6c3/0xcb0 [ 327.891021][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 327.896276][ T30] ? __switch_to+0x7aa/0x1120 [ 327.901452][ T30] ? __pfx_kthread+0x10/0x10 [ 327.906121][ T30] ret_from_fork_asm+0x1a/0x30 [ 327.911054][ T30] [ 327.914358][ T30] [ 327.914358][ T30] Showing all locks held in the system: [ 327.922837][ T30] 5 locks held by kworker/1:0/23: [ 327.927932][ T30] #0: ffff888102abd948 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 [ 327.941235][ T30] #1: ffffc9000018fd18 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 [ 327.954059][ T30] #2: ffff88810b71c198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1bd/0x4af0 [ 327.963233][ T30] #3: ffff88811869f198 (&dev->mutex){....}-{4:4}, at: usb_disconnect+0x10a/0x9a0 [ 327.972689][ T30] #4: ffff88811d543160 (&dev->mutex){....}-{4:4}, at: device_release_driver_internal+0xaa/0x600 [ 327.983786][ T30] 1 lock held by khungtaskd/30: [ 327.988764][ T30] #0: ffffffff896e05a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 [ 327.999239][ T30] 2 locks held by getty/2916: [ 328.004550][ T30] #0: ffff888115af20a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 328.015046][ T30] #1: ffffc900000432f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x1500 [ 328.026131][ T30] 2 locks held by kworker/1:3/3502: [ 328.031530][ T30] #0: ffff88810006b548 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 [ 328.043942][ T30] #1: ffffc90002c1fd18 ((work_completion)(&fw_work->work)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 [ 328.057299][ T30] [ 328.059725][ T30] ============================================= [ 328.059725][ T30] [ 328.068624][ T30] NMI backtrace for cpu 1 [ 328.068644][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 328.068677][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 328.068693][ T30] Call Trace: [ 328.068701][ T30] [ 328.068712][ T30] dump_stack_lvl+0x100/0x190 [ 328.068750][ T30] nmi_cpu_backtrace.cold+0x12d/0x151 [ 328.068809][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 328.068853][ T30] nmi_trigger_cpumask_backtrace+0x1d7/0x230 [ 328.068887][ T30] sys_info+0x141/0x190 [ 328.068912][ T30] watchdog+0xd25/0x1050 [ 328.068954][ T30] ? __pfx_watchdog+0x10/0x10 [ 328.068986][ T30] ? __kthread_parkme+0x18c/0x230 [ 328.069033][ T30] ? kthread+0x13a/0x450 [ 328.069059][ T30] ? __pfx_watchdog+0x10/0x10 [ 328.069087][ T30] kthread+0x370/0x450 [ 328.069116][ T30] ? __pfx_kthread+0x10/0x10 [ 328.069146][ T30] ret_from_fork+0x6c3/0xcb0 [ 328.069187][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 328.069229][ T30] ? __switch_to+0x7aa/0x1120 [ 328.069256][ T30] ? __pfx_kthread+0x10/0x10 [ 328.069287][ T30] ret_from_fork_asm+0x1a/0x30 [ 328.069348][ T30] [ 328.069359][ T30] Sending NMI from CPU 1 to CPUs 0: [ 328.197046][ C0] NMI backtrace for cpu 0 [ 328.197068][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT(full) [ 328.197093][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 328.197105][ C0] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 328.197138][ C0] Code: ae b1 01 e9 13 e8 02 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d d3 e1 1d 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 328.197156][ C0] RSP: 0018:ffffffff89407e10 EFLAGS: 00000242 [ 328.197175][ C0] RAX: 00000000000b82cb RBX: ffffffff8942ea40 RCX: ffffffff876898d5 [ 328.197189][ C0] RDX: 0000000000000000 RSI: ffffffff8901db96 RDI: ffffffff87afa420 [ 328.197202][ C0] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed103eac6725 [ 328.197215][ C0] R10: ffff8881f563392b R11: 0000000000000000 R12: fffffbfff1285d48 [ 328.197229][ C0] R13: 0000000000000000 R14: ffffffff8aefe2d0 R15: 0000000000000000 [ 328.197242][ C0] FS: 0000000000000000(0000) GS:ffff8882686d3000(0000) knlGS:0000000000000000 [ 328.197265][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 328.197279][ C0] CR2: 00007f3b55205900 CR3: 000000011542a000 CR4: 00000000003506f0 [ 328.197292][ C0] Call Trace: [ 328.197302][ C0] [ 328.197309][ C0] default_idle+0x9/0x10 [ 328.197337][ C0] default_idle_call+0x6c/0xb0 [ 328.197374][ C0] do_idle+0x35b/0x4b0 [ 328.197407][ C0] ? __pfx_do_idle+0x10/0x10 [ 328.197442][ C0] cpu_startup_entry+0x4f/0x60 [ 328.197473][ C0] rest_init+0x251/0x260 [ 328.197503][ C0] ? __pfx_x86_late_time_init+0x10/0x10 [ 328.197535][ C0] start_kernel+0x47a/0x480 [ 328.197565][ C0] x86_64_start_reservations+0x24/0x30 [ 328.197594][ C0] x86_64_start_kernel+0x12b/0x130 [ 328.197623][ C0] common_startup_64+0x13e/0x148 [ 328.197661][ C0] [ 328.198014][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 328.198033][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 328.198063][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 328.198077][ T30] Call Trace: [ 328.198086][ T30] [ 328.198096][ T30] dump_stack_lvl+0x100/0x190 [ 328.198132][ T30] vpanic+0x552/0x970 [ 328.198163][ T30] ? __pfx_vpanic+0x10/0x10 [ 328.198193][ T30] ? nmi_trigger_cpumask_backtrace+0x182/0x230 [ 328.198223][ T30] ? rcu_is_watching+0x12/0xc0 [ 328.198258][ T30] panic+0xd1/0xe0 [ 328.198286][ T30] ? __pfx_panic+0x10/0x10 [ 328.198318][ T30] ? wq_watchdog_touch+0xec/0x1a0 [ 328.198361][ T30] ? nmi_trigger_cpumask_backtrace+0x1be/0x230 [ 328.198389][ T30] ? watchdog.cold+0x198/0x1ca [ 328.198420][ T30] ? watchdog+0xd35/0x1050 [ 328.198450][ T30] watchdog.cold+0x1a9/0x1ca [ 328.198492][ T30] ? __pfx_watchdog+0x10/0x10 [ 328.198521][ T30] ? __kthread_parkme+0x18c/0x230 [ 328.198563][ T30] ? kthread+0x13a/0x450 [ 328.198587][ T30] ? __pfx_watchdog+0x10/0x10 [ 328.198621][ T30] kthread+0x370/0x450 [ 328.198647][ T30] ? __pfx_kthread+0x10/0x10 [ 328.198675][ T30] ret_from_fork+0x6c3/0xcb0 [ 328.198712][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 328.198749][ T30] ? __switch_to+0x7aa/0x1120 [ 328.198775][ T30] ? __pfx_kthread+0x10/0x10 [ 328.198803][ T30] ret_from_fork_asm+0x1a/0x30 [ 328.198857][ T30] [ 328.534118][ T30] Kernel Offset: disabled [ 328.538785][ T30] Rebooting in 86400 seconds..