Warning: Permanently added '10.128.1.183' (ED25519) to the list of known hosts. 2026/03/05 10:55:46 parsed 1 programs [ 161.169530][ T29] audit: type=1400 audit(1772708146.187:62): avc: denied { node_bind } for pid=2967 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 161.190605][ T29] audit: type=1400 audit(1772708146.197:63): avc: denied { module_request } for pid=2967 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 164.063268][ T29] audit: type=1400 audit(1772708149.087:64): avc: denied { mounton } for pid=2977 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 164.087096][ T29] audit: type=1400 audit(1772708149.107:65): avc: denied { mount } for pid=2977 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 164.097570][ T2977] cgroup: Unknown subsys name 'net' [ 164.116784][ T29] audit: type=1400 audit(1772708149.137:66): avc: denied { unmount } for pid=2977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 164.283190][ T2977] cgroup: Unknown subsys name 'cpuset' [ 164.292334][ T2977] cgroup: Unknown subsys name 'rlimit' [ 164.480042][ T29] audit: type=1400 audit(1772708149.507:67): avc: denied { setattr } for pid=2977 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 164.503445][ T29] audit: type=1400 audit(1772708149.507:68): avc: denied { create } for pid=2977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.524444][ T29] audit: type=1400 audit(1772708149.507:69): avc: denied { write } for pid=2977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.545214][ T29] audit: type=1400 audit(1772708149.507:70): avc: denied { read } for pid=2977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.574483][ T29] audit: type=1400 audit(1772708149.597:71): avc: denied { sys_module } for pid=2977 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 164.698628][ T2981] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 164.754364][ T2977] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 166.280175][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 166.280198][ T29] audit: type=1400 audit(1772708151.307:80): avc: denied { execmem } for pid=2983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 166.320641][ T29] audit: type=1400 audit(1772708151.347:81): avc: denied { read } for pid=2984 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 166.342518][ T29] audit: type=1400 audit(1772708151.347:82): avc: denied { open } for pid=2984 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 166.366120][ T29] audit: type=1400 audit(1772708151.347:83): avc: denied { mounton } for pid=2984 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 166.400816][ T29] audit: type=1400 audit(1772708151.427:84): avc: denied { create } for pid=2984 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 166.517167][ T29] audit: type=1400 audit(1772708151.537:85): avc: denied { mounton } for pid=2988 comm="syz-executor" path="/root/syzkaller.i8s8or/syz-tmp" dev="sda1" ino=2031 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 166.542043][ T29] audit: type=1400 audit(1772708151.537:86): avc: denied { mount } for pid=2988 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 166.564119][ T29] audit: type=1400 audit(1772708151.547:87): avc: denied { mounton } for pid=2988 comm="syz-executor" path="/root/syzkaller.i8s8or/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 166.589616][ T29] audit: type=1400 audit(1772708151.547:88): avc: denied { mount } for pid=2988 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 166.612328][ T29] audit: type=1400 audit(1772708151.557:89): avc: denied { mounton } for pid=2988 comm="syz-executor" path="/root/syzkaller.i8s8or/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 166.697315][ T2988] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 181.755857][ T3458] modprobe (3458) used greatest stack depth: 22696 bytes left 2026/03/05 10:56:08 executed programs: 0 2026/03/05 10:56:22 executed programs: 2 [ 197.207789][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 197.207813][ T29] audit: type=1400 audit(1772708182.227:107): avc: denied { read write } for pid=3959 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 197.240491][ T29] audit: type=1400 audit(1772708182.227:108): avc: denied { open } for pid=3959 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 197.264595][ T29] audit: type=1400 audit(1772708182.227:109): avc: denied { ioctl } for pid=3959 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 197.489803][ T23] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 197.639667][ T23] usb 4-1: Using ep0 maxpacket: 32 [ 197.647174][ T23] usb 4-1: config 0 has too many interfaces: 197, using maximum allowed: 32 [ 197.656123][ T23] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 197 [ 197.665299][ T23] usb 4-1: config 0 has no interface number 0 [ 197.671543][ T23] usb 4-1: New USB device found, idVendor=1286, idProduct=2001, bcdDevice= 6.2d [ 197.680646][ T23] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 197.692471][ T23] usb 4-1: config 0 descriptor?? [ 197.737606][ T29] audit: type=1400 audit(1772708182.757:110): avc: denied { firmware_load } for pid=2815 comm="kworker/1:3" path="/lib/firmware/libertas/usb8388_olpc.bin" dev="sda1" ino=432 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 197.979699][ C1] usb8xxx: URB in failure status: -2 [ 198.100959][ C1] usb8xxx: URB in failure status: -71 [ 198.107786][ T10] usb 4-1: USB disconnect, device number 2 2026/03/05 10:56:29 executed programs: 5 2026/03/05 10:56:35 executed programs: 7 2026/03/05 10:56:41 executed programs: 9 2026/03/05 10:56:47 executed programs: 11 2026/03/05 10:56:53 executed programs: 13 2026/03/05 10:56:59 executed programs: 15 2026/03/05 10:57:06 executed programs: 17 2026/03/05 10:57:12 executed programs: 19 2026/03/05 10:57:18 executed programs: 21 2026/03/05 10:57:24 executed programs: 23 2026/03/05 10:57:30 executed programs: 25 2026/03/05 10:57:36 executed programs: 27 2026/03/05 10:57:42 executed programs: 29 2026/03/05 10:57:48 executed programs: 31 2026/03/05 10:57:54 executed programs: 33 2026/03/05 10:58:00 executed programs: 35 2026/03/05 10:58:06 executed programs: 37 2026/03/05 10:58:12 executed programs: 39 2026/03/05 10:58:18 executed programs: 41 2026/03/05 10:58:24 executed programs: 43 2026/03/05 10:58:30 executed programs: 45 2026/03/05 10:58:36 executed programs: 47 2026/03/05 10:58:42 executed programs: 49 2026/03/05 10:58:48 executed programs: 51 [ 348.039669][ T30] INFO: task kworker/0:1:10 blocked for more than 143 seconds. [ 348.047294][ T30] Not tainted syzkaller #0 [ 348.052434][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 348.061272][ T30] task:kworker/0:1 state:D stack:27896 pid:10 tgid:10 ppid:2 task_flags:0x4288060 flags:0x00080000 [ 348.073922][ T30] Workqueue: usb_hub_wq hub_event [ 348.079031][ T30] Call Trace: [ 348.082606][ T30] [ 348.085576][ T30] __schedule+0xeb1/0x41f0 [ 348.090125][ T30] ? __pfx___schedule+0x10/0x10 [ 348.095027][ T30] ? find_held_lock+0x2b/0x80 [ 348.099805][ T30] ? schedule+0x2bf/0x390 [ 348.104182][ T30] schedule+0xdd/0x390 [ 348.108275][ T30] lbs_wait_for_firmware_load+0x11e/0x1e0 [ 348.114118][ T30] ? __pfx_lbs_wait_for_firmware_load+0x10/0x10 [ 348.120434][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 348.125677][ T30] ? __pfx_autoremove_wake_function+0x10/0x10 [ 348.131833][ T30] ? usb_hcd_flush_endpoint+0x359/0x400 [ 348.137458][ T30] lbs_remove_card+0x84/0x390 [ 348.142235][ T30] if_usb_disconnect+0xaf/0x2e0 [ 348.147143][ T30] usb_unbind_interface+0x1dd/0x9e0 [ 348.152473][ T30] ? kernfs_remove_by_name_ns+0x9f/0xf0 [ 348.158076][ T30] ? __pfx_usb_unbind_interface+0x10/0x10 [ 348.163894][ T30] device_remove+0x12a/0x180 [ 348.168560][ T30] device_release_driver_internal+0x42e/0x600 [ 348.174780][ T30] bus_remove_device+0x22f/0x440 [ 348.179815][ T30] device_del+0x376/0x9b0 [ 348.184197][ T30] ? __pfx_device_del+0x10/0x10 [ 348.189066][ T30] ? kobject_put+0xb9/0x640 [ 348.193715][ T30] usb_disable_device+0x367/0x810 [ 348.198810][ T30] usb_disconnect+0x2e2/0x9a0 [ 348.203589][ T30] hub_event+0x1d0c/0x4af0 [ 348.208081][ T30] ? __lock_acquire+0x4a5/0x2630 [ 348.213142][ T30] ? do_raw_spin_unlock+0x145/0x1e0 [ 348.218402][ T30] ? __pfx_hub_event+0x10/0x10 [ 348.223271][ T30] ? debug_object_deactivate+0x2e4/0x3b0 [ 348.228977][ T30] ? rcu_is_watching+0x12/0xc0 [ 348.233848][ T30] process_one_work+0x9d7/0x1920 [ 348.238858][ T30] ? __pfx_process_one_work+0x10/0x10 [ 348.244337][ T30] ? __pfx_hub_event+0x10/0x10 [ 348.249162][ T30] worker_thread+0x5da/0xe40 [ 348.253857][ T30] ? __pfx_worker_thread+0x10/0x10 [ 348.259025][ T30] ? kthread+0x13a/0x450 [ 348.263375][ T30] ? __pfx_worker_thread+0x10/0x10 [ 348.268542][ T30] kthread+0x370/0x450 [ 348.272795][ T30] ? __pfx_kthread+0x10/0x10 [ 348.277435][ T30] ret_from_fork+0x6c3/0xcb0 [ 348.282126][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 348.287302][ T30] ? __switch_to+0x7aa/0x1120 [ 348.292075][ T30] ? __pfx_kthread+0x10/0x10 [ 348.296805][ T30] ret_from_fork_asm+0x1a/0x30 [ 348.301682][ T30] [ 348.304775][ T30] [ 348.304775][ T30] Showing all locks held in the system: [ 348.312568][ T30] 5 locks held by kworker/0:1/10: [ 348.317708][ T30] #0: ffff888102abed48 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 [ 348.328610][ T30] #1: ffffc900000afd18 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 [ 348.339999][ T30] #2: ffff88810b30b198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1bd/0x4af0 [ 348.348946][ T30] #3: ffff88811cab7198 (&dev->mutex){....}-{4:4}, at: usb_disconnect+0x10a/0x9a0 [ 348.358282][ T30] #4: ffff88811cab5160 (&dev->mutex){....}-{4:4}, at: device_release_driver_internal+0xaa/0x600 [ 348.368940][ T30] 1 lock held by khungtaskd/30: [ 348.373856][ T30] #0: ffffffff896e05a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 [ 348.384016][ T30] 2 locks held by kworker/1:3/2815: [ 348.389236][ T30] #0: ffff88810006b548 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920 [ 348.399885][ T30] #1: ffffc90006c9fd18 ((work_completion)(&fw_work->work)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920 [ 348.411415][ T30] 2 locks held by getty/2919: [ 348.416133][ T30] #0: ffff88811643b0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 348.425985][ T30] #1: ffffc900000432f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x1500 [ 348.436205][ T30] [ 348.438542][ T30] ============================================= [ 348.438542][ T30] [ 348.447022][ T30] NMI backtrace for cpu 0 [ 348.447058][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 348.447091][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 348.447108][ T30] Call Trace: [ 348.447118][ T30] [ 348.447128][ T30] dump_stack_lvl+0x100/0x190 [ 348.447172][ T30] nmi_cpu_backtrace.cold+0x12d/0x151 [ 348.447215][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 348.447266][ T30] nmi_trigger_cpumask_backtrace+0x1d7/0x230 [ 348.447306][ T30] sys_info+0x141/0x190 [ 348.447334][ T30] watchdog+0xd25/0x1050 [ 348.447381][ T30] ? __pfx_watchdog+0x10/0x10 [ 348.447418][ T30] ? __kthread_parkme+0x18c/0x230 [ 348.447481][ T30] ? kthread+0x13a/0x450 [ 348.447511][ T30] ? __pfx_watchdog+0x10/0x10 [ 348.447544][ T30] kthread+0x370/0x450 [ 348.447575][ T30] ? __pfx_kthread+0x10/0x10 [ 348.447612][ T30] ret_from_fork+0x6c3/0xcb0 [ 348.447660][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 348.447709][ T30] ? __switch_to+0x7aa/0x1120 [ 348.447742][ T30] ? __pfx_kthread+0x10/0x10 [ 348.447778][ T30] ret_from_fork_asm+0x1a/0x30 [ 348.447847][ T30] [ 348.447858][ T30] Sending NMI from CPU 0 to CPUs 1: [ 348.568647][ C1] NMI backtrace for cpu 1 [ 348.568678][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) [ 348.568707][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 348.568722][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 348.568759][ C1] Code: ae b1 01 e9 13 e8 02 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d d3 e1 1d 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 348.568784][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000242 [ 348.568810][ C1] RAX: 000000000007bc07 RBX: ffff8881022a1d00 RCX: ffffffff876898d5 [ 348.568827][ C1] RDX: 0000000000000000 RSI: ffffffff8901db96 RDI: ffffffff87afa420 [ 348.568843][ C1] RBP: 0000000000000001 R08: 0000000000000001 R09: ffffed103eae6725 [ 348.568858][ C1] R10: ffff8881f573392b R11: 0000000000000000 R12: ffffed10204543a0 [ 348.568874][ C1] R13: 0000000000000001 R14: ffffffff8aefe2d0 R15: 0000000000000000 [ 348.568893][ C1] FS: 0000000000000000(0000) GS:ffff8882687d3000(0000) knlGS:0000000000000000 [ 348.568916][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 348.568933][ C1] CR2: 00007f4f07205900 CR3: 000000011787e000 CR4: 00000000003506f0 [ 348.568949][ C1] Call Trace: [ 348.568959][ C1] [ 348.568967][ C1] default_idle+0x9/0x10 [ 348.569003][ C1] default_idle_call+0x6c/0xb0 [ 348.569039][ C1] do_idle+0x35b/0x4b0 [ 348.569080][ C1] ? __pfx_do_idle+0x10/0x10 [ 348.569123][ C1] cpu_startup_entry+0x4f/0x60 [ 348.569162][ C1] start_secondary+0x21d/0x2d0 [ 348.569201][ C1] ? __pfx_start_secondary+0x10/0x10 [ 348.569242][ C1] common_startup_64+0x13e/0x148 [ 348.569291][ C1] [ 348.569658][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 348.569705][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 348.569798][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 348.569842][ T30] Call Trace: [ 348.569873][ T30] [ 348.569904][ T30] dump_stack_lvl+0x100/0x190 [ 348.570027][ T30] vpanic+0x552/0x970 [ 348.570122][ T30] ? __pfx_vpanic+0x10/0x10 [ 348.570218][ T30] ? nmi_trigger_cpumask_backtrace+0x182/0x230 [ 348.570320][ T30] ? rcu_is_watching+0x12/0xc0 [ 348.570444][ T30] panic+0xd1/0xe0 [ 348.570568][ T30] ? __pfx_panic+0x10/0x10 [ 348.570670][ T30] ? delay_tsc+0x49/0xc0 [ 348.570750][ T30] ? wq_watchdog_touch+0xec/0x1a0 [ 348.570891][ T30] ? nmi_trigger_cpumask_backtrace+0x1be/0x230 [ 348.571009][ T30] ? watchdog.cold+0x198/0x1ca [ 348.571128][ T30] ? watchdog+0xd35/0x1050 [ 348.571224][ T30] watchdog.cold+0x1a9/0x1ca [ 348.571360][ T30] ? __pfx_watchdog+0x10/0x10 [ 348.571465][ T30] ? __kthread_parkme+0x18c/0x230 [ 348.571607][ T30] ? kthread+0x13a/0x450 [ 348.571686][ T30] ? __pfx_watchdog+0x10/0x10 [ 348.571771][ T30] kthread+0x370/0x450 [ 348.571854][ T30] ? __pfx_kthread+0x10/0x10 [ 348.571948][ T30] ret_from_fork+0x6c3/0xcb0 [ 348.572072][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 348.572204][ T30] ? __switch_to+0x7aa/0x1120 [ 348.572295][ T30] ? __pfx_kthread+0x10/0x10 [ 348.572415][ T30] ret_from_fork_asm+0x1a/0x30 [ 348.572602][ T30] [ 348.883210][ T30] Kernel Offset: disabled [ 348.887559][ T30] Rebooting in 86400 seconds..