unregister_netdevice: waiting for ip6gre0 to become free. Usage count = -1 syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. hub 1-0:1.0: USB hub found hub 1-0:1.0: 1 port detected usb usb1: usbfs: process 10897 (syz-executor.2) did not claim interface 2 before use audit: type=1326 audit(1678111626.086:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11012 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f604880c0f9 code=0x0 usb usb1: usbfs: process 11055 (syz-executor.3) did not claim interface 1 before use usb usb1: usbfs: process 11093 (syz-executor.4) did not claim interface 0 before use usb usb1: usbfs: process 11167 (syz-executor.3) did not claim interface 0 before use usb usb1: selecting invalid altsetting 2 hrtimer: interrupt took 33257 ns audit: type=1326 audit(1678111630.840:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11483 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f915ff310f9 code=0x0 L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. hid-generic 0000:0000:0000.0001: unknown main item tag 0x6 hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 netlink: 140 bytes leftover after parsing attributes in process `syz-executor.3'. F2FS-fs (loop4): Mismatch start address, segment0(512) cp_blkaddr(605) F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop4): invalid crc value F2FS-fs (loop4): Found nat_bits in checkpoint F2FS-fs (loop4): Mounted with checkpoint version = 753bd00b audit: type=1804 audit(1678111632.203:5): pid=11568 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2626115471/syzkaller.4rBqDp/129/bus/bus" dev="loop4" ino=4 res=1