Warning: Permanently added '10.128.0.94' (ED25519) to the list of known hosts. 2026/02/08 06:36:29 parsed 1 programs [ 161.215054][ T29] audit: type=1400 audit(1770532589.738:62): avc: denied { node_bind } for pid=2970 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 161.236066][ T29] audit: type=1400 audit(1770532589.748:63): avc: denied { module_request } for pid=2970 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 164.048280][ T29] audit: type=1400 audit(1770532592.568:64): avc: denied { mounton } for pid=2981 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 164.072386][ T29] audit: type=1400 audit(1770532592.598:65): avc: denied { mount } for pid=2981 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 164.082147][ T2981] cgroup: Unknown subsys name 'net' [ 164.102200][ T29] audit: type=1400 audit(1770532592.628:66): avc: denied { unmount } for pid=2981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 164.231346][ T2981] cgroup: Unknown subsys name 'cpuset' [ 164.240429][ T2981] cgroup: Unknown subsys name 'rlimit' [ 164.486888][ T29] audit: type=1400 audit(1770532593.008:67): avc: denied { setattr } for pid=2981 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 164.510279][ T29] audit: type=1400 audit(1770532593.018:68): avc: denied { create } for pid=2981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.530855][ T29] audit: type=1400 audit(1770532593.018:69): avc: denied { write } for pid=2981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.551327][ T29] audit: type=1400 audit(1770532593.018:70): avc: denied { read } for pid=2981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.577703][ T29] audit: type=1400 audit(1770532593.098:71): avc: denied { sys_module } for pid=2981 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 164.705856][ T2985] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 164.750500][ T2981] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 166.362271][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 166.362293][ T29] audit: type=1400 audit(1770532594.888:78): avc: denied { execmem } for pid=2986 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 166.407201][ T29] audit: type=1400 audit(1770532594.888:79): avc: denied { read } for pid=2987 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 166.428583][ T29] audit: type=1400 audit(1770532594.888:80): avc: denied { open } for pid=2987 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 166.452036][ T29] audit: type=1400 audit(1770532594.918:81): avc: denied { mounton } for pid=2987 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 166.489919][ T29] audit: type=1400 audit(1770532594.978:82): avc: denied { mounton } for pid=2987 comm="syz-executor" path="/root/syzkaller.uM4Juf/syz-tmp" dev="sda1" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 166.514407][ T29] audit: type=1400 audit(1770532594.978:83): avc: denied { mount } for pid=2987 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 166.536602][ T29] audit: type=1400 audit(1770532594.978:84): avc: denied { mounton } for pid=2987 comm="syz-executor" path="/root/syzkaller.uM4Juf/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 166.561855][ T29] audit: type=1400 audit(1770532594.998:85): avc: denied { mount } for pid=2987 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 166.583745][ T29] audit: type=1400 audit(1770532594.998:86): avc: denied { mounton } for pid=2987 comm="syz-executor" path="/root/syzkaller.uM4Juf/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 166.610979][ T29] audit: type=1400 audit(1770532594.998:87): avc: denied { mounton } for pid=2987 comm="syz-executor" path="/root/syzkaller.uM4Juf/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 166.665702][ T2987] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 183.052889][ T3057] syz-executor (3057) used greatest stack depth: 22696 bytes left 2026/02/08 06:36:52 executed programs: 0 2026/02/08 06:37:05 executed programs: 2 [ 196.807923][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 196.807945][ T29] audit: type=1400 audit(1770532625.328:103): avc: denied { read write } for pid=3964 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 196.839801][ T29] audit: type=1400 audit(1770532625.328:104): avc: denied { open } for pid=3964 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 196.863490][ T29] audit: type=1400 audit(1770532625.328:105): avc: denied { ioctl } for pid=3964 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 197.078914][ T2954] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 197.233039][ T2954] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 197.242301][ T2954] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 197.250368][ T2954] usb 4-1: Product: syz [ 197.254574][ T2954] usb 4-1: Manufacturer: syz [ 197.259269][ T2954] usb 4-1: SerialNumber: syz [ 197.272101][ T2954] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 197.323587][ T29] audit: type=1400 audit(1770532625.848:106): avc: denied { firmware_load } for pid=9 comm="kworker/0:0" path="/lib/firmware/ath9k_htc/htc_9271-1.4.0.fw" dev="sda1" ino=313 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 197.358223][ T9] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 197.585241][ T2954] usb 4-1: USB disconnect, device number 2 [ 198.398810][ T9] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 198.406411][ T9] ath9k_htc: Failed to initialize the device [ 198.413486][ T2954] usb 4-1: ath9k_htc: USB layer deinitialized [ 198.709187][ T2954] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 198.858733][ T2954] usb 4-1: Using ep0 maxpacket: 8 [ 198.865394][ T2954] usb 4-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 1536, setting to 1024 [ 198.876552][ T2954] usb 4-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 198.886800][ T2954] usb 4-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 198.896847][ T2954] usb 4-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 198.909921][ T2954] usb 4-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 198.919045][ T2954] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 199.131010][ T2954] usb 4-1: GET_CAPABILITIES returned 0 [ 199.136545][ T2954] usbtmc 4-1:16.0: can't read capabilities [ 199.331606][ T29] audit: type=1400 audit(1770532627.858:107): avc: denied { write } for pid=3964 comm="syz.3.17" name="usbtmc0" dev="devtmpfs" ino=537 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 2026/02/08 06:37:38 executed programs: 3 [ 229.928841][ T2954] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 230.082779][ T2954] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 230.092044][ T2954] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 230.100136][ T2954] usb 5-1: Product: syz [ 230.104354][ T2954] usb 5-1: Manufacturer: syz [ 230.109042][ T2954] usb 5-1: SerialNumber: syz [ 230.119674][ T2954] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 230.137067][ T9] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 230.339307][ T38] usb 5-1: USB disconnect, device number 2 [ 231.198727][ T9] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 231.206430][ T9] ath9k_htc: Failed to initialize the device [ 231.213350][ T38] usb 5-1: ath9k_htc: USB layer deinitialized [ 231.508774][ T38] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 231.658736][ T38] usb 5-1: Using ep0 maxpacket: 8 [ 231.665450][ T38] usb 5-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 1536, setting to 1024 [ 231.676630][ T38] usb 5-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 231.686718][ T38] usb 5-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 231.696731][ T38] usb 5-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 231.709798][ T38] usb 5-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 231.718984][ T38] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 231.931770][ T38] usb 5-1: GET_CAPABILITIES returned 0 [ 231.937337][ T38] usbtmc 5-1:16.0: can't read capabilities 2026/02/08 06:38:11 executed programs: 4 [ 262.868766][ T9] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 263.022676][ T9] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 263.031943][ T9] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 263.040134][ T9] usb 6-1: Product: syz [ 263.044354][ T9] usb 6-1: Manufacturer: syz [ 263.049052][ T9] usb 6-1: SerialNumber: syz [ 263.059433][ T9] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 263.082577][ T2954] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 263.313159][ T9] usb 6-1: USB disconnect, device number 2 [ 264.158777][ T2954] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 264.165928][ T2954] ath9k_htc: Failed to initialize the device [ 264.172867][ T9] usb 6-1: ath9k_htc: USB layer deinitialized [ 264.468750][ T9] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 264.618693][ T9] usb 6-1: Using ep0 maxpacket: 8 [ 264.625477][ T9] usb 6-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 1536, setting to 1024 [ 264.636657][ T9] usb 6-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 264.646786][ T9] usb 6-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 264.656789][ T9] usb 6-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 264.669867][ T9] usb 6-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 264.679019][ T9] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 264.891648][ T9] usb 6-1: GET_CAPABILITIES returned 0 [ 264.897444][ T9] usbtmc 6-1:16.0: can't read capabilities 2026/02/08 06:38:44 executed programs: 5 [ 296.258665][ T38] usb 7-1: new high-speed USB device number 2 using dummy_hcd [ 296.412749][ T38] usb 7-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 296.421955][ T38] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 296.430056][ T38] usb 7-1: Product: syz [ 296.434280][ T38] usb 7-1: Manufacturer: syz [ 296.438993][ T38] usb 7-1: SerialNumber: syz [ 296.450128][ T38] usb 7-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 296.471451][ T23] usb 7-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 296.672885][ T3969] usb 7-1: USB disconnect, device number 2 [ 297.518658][ T23] ath9k_htc 7-1:1.0: ath9k_htc: Target is unresponsive [ 297.525829][ T23] ath9k_htc: Failed to initialize the device [ 297.532785][ T3969] usb 7-1: ath9k_htc: USB layer deinitialized [ 297.828727][ T3969] usb 7-1: new high-speed USB device number 3 using dummy_hcd [ 297.978702][ T3969] usb 7-1: Using ep0 maxpacket: 8 [ 297.985492][ T3969] usb 7-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 1536, setting to 1024 [ 297.996689][ T3969] usb 7-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 298.006799][ T3969] usb 7-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 298.017074][ T3969] usb 7-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 298.030178][ T3969] usb 7-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 298.039355][ T3969] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 298.252145][ T3969] usb 7-1: GET_CAPABILITIES returned 0 [ 298.257882][ T3969] usbtmc 7-1:16.0: can't read capabilities 2026/02/08 06:39:16 executed programs: 6 [ 328.718683][ T38] usb 8-1: new high-speed USB device number 2 using dummy_hcd [ 328.872202][ T38] usb 8-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 328.881390][ T38] usb 8-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 328.889500][ T38] usb 8-1: Product: syz [ 328.893767][ T38] usb 8-1: Manufacturer: syz [ 328.898385][ T38] usb 8-1: SerialNumber: syz [ 328.909784][ T38] usb 8-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 328.925927][ T5628] usb 8-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 329.127281][ T5335] usb 8-1: USB disconnect, device number 2 [ 329.998721][ T5628] ath9k_htc 8-1:1.0: ath9k_htc: Target is unresponsive [ 330.006317][ T5628] ath9k_htc: Failed to initialize the device [ 330.013157][ T5335] usb 8-1: ath9k_htc: USB layer deinitialized [ 330.308737][ T5335] usb 8-1: new high-speed USB device number 3 using dummy_hcd [ 330.458699][ T5335] usb 8-1: Using ep0 maxpacket: 8 [ 330.465503][ T5335] usb 8-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 1536, setting to 1024 [ 330.476735][ T5335] usb 8-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 330.486846][ T5335] usb 8-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 330.497039][ T5335] usb 8-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 330.510111][ T5335] usb 8-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 330.519257][ T5335] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 330.739719][ T5335] usb 8-1: GET_CAPABILITIES returned 0 [ 330.745310][ T5335] usbtmc 8-1:16.0: can't read capabilities [ 347.928674][ T30] INFO: task syz.3.17:3964 blocked for more than 143 seconds. [ 347.936236][ T30] Not tainted syzkaller #0 [ 347.941332][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 347.950095][ T30] task:syz.3.17 state:D stack:27672 pid:3964 tgid:3964 ppid:3515 task_flags:0x400040 flags:0x00080002 [ 347.962262][ T30] Call Trace: [ 347.965625][ T30] [ 347.968657][ T30] __schedule+0xeb0/0x3e50 [ 347.973459][ T30] ? __pfx___schedule+0x10/0x10 [ 347.978489][ T30] ? find_held_lock+0x2b/0x80 [ 347.983322][ T30] ? schedule+0x2bf/0x390 [ 347.987759][ T30] schedule+0xdd/0x390 [ 347.991961][ T30] schedule_timeout+0x127/0x280 [ 347.996895][ T30] ? __pfx_schedule_timeout+0x10/0x10 [ 348.002368][ T30] ? __pfx_process_timeout+0x10/0x10 [ 348.007763][ T30] ? mark_held_locks+0x40/0x70 [ 348.012646][ T30] __wait_for_common+0x2e7/0x4c0 [ 348.017749][ T30] ? __pfx_schedule_timeout+0x10/0x10 [ 348.023335][ T30] ? __pfx___wait_for_common+0x10/0x10 [ 348.029021][ T30] usb_start_wait_urb+0x147/0x4c0 [ 348.034147][ T30] ? __pfx_usb_start_wait_urb+0x10/0x10 [ 348.039838][ T30] ? __asan_memset+0x23/0x50 [ 348.044580][ T30] usb_bulk_msg+0x22b/0x580 [ 348.049241][ T30] usbtmc_read+0x5f4/0x10b0 [ 348.053877][ T30] ? futex_hash_put+0x43/0x50 [ 348.058745][ T30] ? __pfx_usbtmc_read+0x10/0x10 [ 348.063794][ T30] ? security_file_permission+0x21/0x80 [ 348.069496][ T30] ? __pfx_usbtmc_read+0x10/0x10 [ 348.074552][ T30] vfs_read+0x1e4/0xb30 [ 348.078939][ T30] ? __pfx_vfs_read+0x10/0x10 [ 348.083721][ T30] ? do_futex+0x192/0x350 [ 348.088237][ T30] ? __pfx_do_futex+0x10/0x10 [ 348.093045][ T30] ? __pfx_do_sys_openat2+0x10/0x10 [ 348.098355][ T30] ? __x64_sys_futex+0x34f/0x4d0 [ 348.103415][ T30] ? __x64_sys_futex+0x358/0x4d0 [ 348.108447][ T30] ksys_read+0x12a/0x250 [ 348.112826][ T30] ? __pfx_ksys_read+0x10/0x10 [ 348.117791][ T30] do_syscall_64+0xc9/0x570 [ 348.122424][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 348.128417][ T30] RIP: 0033:0x7f1600bbaeb9 [ 348.132951][ T30] RSP: 002b:00007ffdc6c8cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 348.141472][ T30] RAX: ffffffffffffffda RBX: 00007f1600e35fa0 RCX: 00007f1600bbaeb9 [ 348.149551][ T30] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 348.157592][ T30] RBP: 00007f1600c28c1f R08: 0000000000000000 R09: 0000000000000000 [ 348.165689][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 348.174070][ T30] R13: 00007f1600e35fac R14: 00007f1600e35fa0 R15: 00007f1600e35fa0 [ 348.182170][ T30] [ 348.185443][ T30] [ 348.185443][ T30] Showing all locks held in the system: [ 348.193301][ T30] 6 locks held by kworker/0:0/9: [ 348.198752][ T30] #0: ffff888100ed2548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 348.209758][ T30] #1: ffffc9000009fca8 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 348.221178][ T30] #2: ffff88810ab0a198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1bd/0x4af0 [ 348.230319][ T30] #3: ffff88811f5b2198 (&dev->mutex){....}-{4:4}, at: __device_attach+0x7e/0x4d0 [ 348.239862][ T30] #4: ffff88811f5b4160 (&dev->mutex){....}-{4:4}, at: __device_attach+0x7e/0x4d0 [ 348.249303][ T30] #5: ffffffff8a0d7bb0 (minor_rwsem){++++}-{4:4}, at: usb_register_dev+0x11d/0x570 [ 348.258881][ T30] 3 locks held by kworker/1:0/23: [ 348.264073][ T30] #0: ffff888100071948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 348.274767][ T30] #1: ffffc9000018fca8 ((work_completion)(&fw_work->work)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 348.286371][ T30] #2: ffff88810abd2198 (&dev->mutex){....}-{4:4}, at: ath9k_hif_usb_firmware_cb+0x3b2/0x530 [ 348.296768][ T30] 1 lock held by khungtaskd/30: [ 348.301703][ T30] #0: ffffffff894da3a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 [ 348.311824][ T30] 2 locks held by kworker/u8:1/32: [ 348.317006][ T30] #0: ffff888100089148 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 348.328605][ T30] #1: ffffc90000227ca8 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 348.340293][ T30] 2 locks held by getty/2922: [ 348.345043][ T30] #0: ffff888112c110a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 348.354999][ T30] #1: ffffc900000452f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x1500 [ 348.365268][ T30] 3 locks held by kworker/0:2/2954: [ 348.370572][ T30] #0: ffff888100071948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 348.381204][ T30] #1: ffffc900018afca8 ((work_completion)(&fw_work->work)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 348.393105][ T30] #2: ffff88810ab0a198 (&dev->mutex){....}-{4:4}, at: ath9k_hif_usb_firmware_cb+0x3b2/0x530 [ 348.403517][ T30] 1 lock held by syz.3.17/3964: [ 348.408445][ T30] #0: ffff88811bdfd4d8 (&data->io_mutex){+.+.}-{4:4}, at: usbtmc_read+0x154/0x10b0 [ 348.418175][ T30] 6 locks held by kworker/0:3/3969: [ 348.423486][ T30] #0: ffff888100ed2548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 348.434512][ T30] #1: ffffc90003d07ca8 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 348.445952][ T30] #2: ffff88810abd2198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1bd/0x4af0 [ 348.455030][ T30] #3: ffff8881171f9198 (&dev->mutex){....}-{4:4}, at: __device_attach+0x7e/0x4d0 [ 348.464465][ T30] #4: ffff8881056b3160 (&dev->mutex){....}-{4:4}, at: __device_attach+0x7e/0x4d0 [ 348.473898][ T30] #5: ffffffff8a0d7bb0 (minor_rwsem){++++}-{4:4}, at: usb_register_dev+0x11d/0x570 [ 348.483548][ T30] 2 locks held by syz.4.18/4421: [ 348.488576][ T30] #0: ffffffff8a0d7bb0 (minor_rwsem){++++}-{4:4}, at: usb_open+0x23/0x220 [ 348.497343][ T30] #1: ffff88811bdfd4d8 (&data->io_mutex){+.+.}-{4:4}, at: usbtmc_open+0x4c8/0x950 [ 348.506872][ T30] 1 lock held by syz.5.19/4876: [ 348.511889][ T30] #0: ffffffff8a0d7bb0 (minor_rwsem){++++}-{4:4}, at: usb_open+0x23/0x220 [ 348.520714][ T30] 1 lock held by syz.6.20/5331: [ 348.525656][ T30] #0: ffffffff8a0d7bb0 (minor_rwsem){++++}-{4:4}, at: usb_open+0x23/0x220 [ 348.534462][ T30] 6 locks held by kworker/0:4/5335: [ 348.539773][ T30] #0: ffff888100ed2548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 348.550747][ T30] #1: ffffc90007037ca8 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 348.562189][ T30] #2: ffff88810abea198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1bd/0x4af0 [ 348.571269][ T30] #3: ffff8881202d2198 (&dev->mutex){....}-{4:4}, at: __device_attach+0x7e/0x4d0 [ 348.580709][ T30] #4: ffff8881202d5160 (&dev->mutex){....}-{4:4}, at: __device_attach+0x7e/0x4d0 [ 348.590117][ T30] #5: ffffffff8a0d7bb0 (minor_rwsem){++++}-{4:4}, at: usb_register_dev+0x11d/0x570 [ 348.600102][ T30] 3 locks held by kworker/1:3/5628: [ 348.605343][ T30] #0: ffff888100071948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 348.616073][ T30] #1: ffffc900061bfca8 ((work_completion)(&fw_work->work)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 348.627661][ T30] #2: ffff88810abea198 (&dev->mutex){....}-{4:4}, at: ath9k_hif_usb_firmware_cb+0x3b2/0x530 [ 348.638079][ T30] 1 lock held by syz.7.21/5788: [ 348.643030][ T30] #0: ffffffff8a0d7bb0 (minor_rwsem){++++}-{4:4}, at: usb_open+0x23/0x220 [ 348.651890][ T30] 2 locks held by modprobe/5915: [ 348.656910][ T30] [ 348.659325][ T30] ============================================= [ 348.659325][ T30] [ 348.667824][ T30] NMI backtrace for cpu 1 [ 348.667858][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(voluntary) [ 348.667895][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 348.667920][ T30] Call Trace: [ 348.667931][ T30] [ 348.667943][ T30] dump_stack_lvl+0x100/0x190 [ 348.668004][ T30] nmi_cpu_backtrace.cold+0x12d/0x151 [ 348.668073][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 348.668113][ T30] nmi_trigger_cpumask_backtrace+0x1d7/0x230 [ 348.668159][ T30] sys_info+0x141/0x190 [ 348.668192][ T30] watchdog+0xcc3/0xfe0 [ 348.668245][ T30] ? __pfx_watchdog+0x10/0x10 [ 348.668286][ T30] ? __kthread_parkme+0x18c/0x230 [ 348.668317][ T30] ? __pfx_watchdog+0x10/0x10 [ 348.668360][ T30] ? __pfx_watchdog+0x10/0x10 [ 348.668399][ T30] kthread+0x3b3/0x730 [ 348.668443][ T30] ? __pfx_kthread+0x10/0x10 [ 348.668481][ T30] ? ret_from_fork+0x79/0xa20 [ 348.668512][ T30] ? ret_from_fork+0x79/0xa20 [ 348.668541][ T30] ? rcu_is_watching+0x12/0xc0 [ 348.668583][ T30] ? __pfx_kthread+0x10/0x10 [ 348.668623][ T30] ret_from_fork+0x6c3/0xa20 [ 348.668657][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 348.668691][ T30] ? __switch_to+0x7af/0x10b0 [ 348.668732][ T30] ? __pfx_kthread+0x10/0x10 [ 348.668774][ T30] ret_from_fork_asm+0x1a/0x30 [ 348.668832][ T30] [ 348.803676][ T30] Sending NMI from CPU 1 to CPUs 0: [ 348.808994][ C0] NMI backtrace for cpu 0 [ 348.809013][ C0] CPU: 0 UID: 0 PID: 2841 Comm: syslogd Not tainted syzkaller #0 PREEMPT(voluntary) [ 348.809042][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 348.809058][ C0] RIP: 0010:lock_acquire+0x5e/0x330 [ 348.809091][ C0] Code: 05 7b 34 3d 0b 83 f8 07 0f 87 a4 02 00 00 48 0f a3 05 06 aa 3e 09 0f 82 6f 02 00 00 8b 35 9e b6 3e 09 85 f6 0f 85 8a 00 00 00 <48> 8b 44 24 30 65 48 2b 05 1d 34 3d 0b 0f 85 b8 02 00 00 48 83 c4 [ 348.809118][ C0] RSP: 0018:ffffc900018bf458 EFLAGS: 00000206 [ 348.809149][ C0] RAX: 0000000000000046 RBX: 0000000000000000 RCX: 0000000000000001 [ 348.809164][ C0] RDX: 0000000000000000 RSI: ffffffff88dcbbf7 RDI: ffffffff878e97a0 [ 348.809180][ C0] RBP: ffffffff894da3a0 R08: 0000000090c8a11d R09: 0000000000000007 [ 348.809195][ C0] R10: 0000000000000200 R11: 0000000000000000 R12: 0000000000000002 [ 348.809210][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 348.809224][ C0] FS: 00007f83ee12fc80(0000) GS:ffff88826896a000(0000) knlGS:0000000000000000 [ 348.809259][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 348.809275][ C0] CR2: 00007f67cb66a6b0 CR3: 0000000115ffc000 CR4: 00000000003506f0 [ 348.809291][ C0] Call Trace: [ 348.809298][ C0] [ 348.809308][ C0] ? trace_pelt_se_tp+0xed/0x130 [ 348.809346][ C0] unwind_next_frame+0xd1/0x1ea0 [ 348.809384][ C0] ? unwind_next_frame+0xbd/0x1ea0 [ 348.809422][ C0] ? __unwind_start+0x2fb/0x7f0 [ 348.809457][ C0] ? get_stack_info_noinstr+0x18/0x130 [ 348.809489][ C0] __unwind_start+0x3d1/0x7f0 [ 348.809528][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 348.809569][ C0] arch_stack_walk+0x73/0xf0 [ 348.809599][ C0] ? __unwind_start+0x2fb/0x7f0 [ 348.809637][ C0] stack_trace_save+0x8e/0xc0 [ 348.809675][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 348.809713][ C0] ? __lock_acquire+0x4a5/0x2630 [ 348.809740][ C0] kasan_save_stack+0x30/0x50 [ 348.809796][ C0] kasan_save_track+0x14/0x30 [ 348.809845][ C0] kasan_save_free_info+0x3b/0x70 [ 348.809868][ C0] __kasan_slab_free+0x43/0x70 [ 348.809900][ C0] kfree+0x1ad/0x630 [ 348.809935][ C0] ? skb_free_head+0x119/0x220 [ 348.809969][ C0] ? skb_free_head+0x119/0x220 [ 348.809998][ C0] skb_free_head+0x119/0x220 [ 348.810026][ C0] skb_release_data+0x540/0x700 [ 348.810060][ C0] ? __pfx_unix_destruct_scm+0x10/0x10 [ 348.810091][ C0] consume_skb+0xc4/0x110 [ 348.810130][ C0] __unix_dgram_recvmsg+0x754/0xc30 [ 348.810166][ C0] ? __pfx___unix_dgram_recvmsg+0x10/0x10 [ 348.810201][ C0] ? __pfx_avc_has_perm+0x10/0x10 [ 348.810257][ C0] unix_dgram_recvmsg+0xd0/0x110 [ 348.810291][ C0] sock_recvmsg+0x1f9/0x250 [ 348.810332][ C0] sock_read_iter+0x2c6/0x3c0 [ 348.810372][ C0] ? __pfx_sock_read_iter+0x10/0x10 [ 348.810414][ C0] ? __lock_acquire+0x4a5/0x2630 [ 348.810447][ C0] ? security_file_permission+0x21/0x80 [ 348.810482][ C0] ? __pfx_sock_read_iter+0x10/0x10 [ 348.810525][ C0] vfs_read+0x957/0xb30 [ 348.810564][ C0] ? __pfx_vfs_read+0x10/0x10 [ 348.810601][ C0] ? trace_sched_exit_tp+0xcd/0x100 [ 348.810643][ C0] ? __schedule+0xec2/0x3e50 [ 348.810682][ C0] ? __pfx___schedule+0x10/0x10 [ 348.810715][ C0] ksys_read+0x1f8/0x250 [ 348.810750][ C0] ? __pfx_ksys_read+0x10/0x10 [ 348.810792][ C0] do_syscall_64+0xc9/0x570 [ 348.810820][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 348.810846][ C0] RIP: 0033:0x7f83ee27f407 [ 348.810864][ C0] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 348.810888][ C0] RSP: 002b:00007fff2bb34ab0 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 [ 348.810910][ C0] RAX: ffffffffffffffda RBX: 00007f83ee12fc80 RCX: 00007f83ee27f407 [ 348.810927][ C0] RDX: 00000000000000ff RSI: 0000556425738300 RDI: 0000000000000000 [ 348.810944][ C0] RBP: 00005564257382c0 R08: 0000000000000000 R09: 0000000000000000 [ 348.810962][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000556425738351 [ 348.810977][ C0] R13: 0000000000000000 R14: 0000556425738300 R15: 00005563ea114d98 [ 348.811003][ C0] [ 349.222010][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 349.228992][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(voluntary) [ 349.239037][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 349.249141][ T30] Call Trace: [ 349.252467][ T30] [ 349.255437][ T30] dump_stack_lvl+0x100/0x190 [ 349.260197][ T30] vpanic+0x20d/0x630 [ 349.264324][ T30] panic+0xd1/0xd1 [ 349.268097][ T30] ? __pfx_panic+0x10/0x10 [ 349.272571][ T30] ? delay_tsc+0x32/0xc0 [ 349.276873][ T30] ? wq_watchdog_touch+0xec/0x1a0 [ 349.281958][ T30] ? nmi_trigger_cpumask_backtrace+0x200/0x230 [ 349.288696][ T30] ? watchdog.cold+0x198/0x1ca [ 349.293519][ T30] ? watchdog+0xcd3/0xfe0 [ 349.297911][ T30] watchdog.cold+0x1a9/0x1ca [ 349.302580][ T30] ? __pfx_watchdog+0x10/0x10 [ 349.307324][ T30] ? __kthread_parkme+0x18c/0x230 [ 349.312580][ T30] ? __pfx_watchdog+0x10/0x10 [ 349.317325][ T30] ? __pfx_watchdog+0x10/0x10 [ 349.322068][ T30] kthread+0x3b3/0x730 [ 349.326291][ T30] ? __pfx_kthread+0x10/0x10 [ 349.330934][ T30] ? ret_from_fork+0x79/0xa20 [ 349.335654][ T30] ? ret_from_fork+0x79/0xa20 [ 349.340383][ T30] ? rcu_is_watching+0x12/0xc0 [ 349.345300][ T30] ? __pfx_kthread+0x10/0x10 [ 349.349955][ T30] ret_from_fork+0x6c3/0xa20 [ 349.354611][ T30] ? __pfx_ret_from_fork+0x10/0x10 [ 349.359797][ T30] ? __switch_to+0x7af/0x10b0 [ 349.364531][ T30] ? __pfx_kthread+0x10/0x10 [ 349.369189][ T30] ret_from_fork_asm+0x1a/0x30 [ 349.374042][ T30] [ 349.377270][ T30] Kernel Offset: disabled [ 349.381620][ T30] Rebooting in 86400 seconds..