[ 81.435805][ T43] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.1.246' (ED25519) to the list of known hosts. 2025/10/06 15:45:53 ignoring optional flag "sandbox_arg"="0" 2025/10/06 15:45:53 ignoring optional flag "type"="gce" 2025/10/06 15:45:54 parsed 1 programs [ 85.432776][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 85.432791][ T30] audit: type=1400 audit(1759765554.084:93): avc: denied { getattr } for pid=6007 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 2025/10/06 15:45:54 executed programs: 0 [ 85.657811][ T30] audit: type=1400 audit(1759765554.304:94): avc: denied { mounton } for pid=6018 comm="syz-executor.0" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 85.683171][ T30] audit: type=1400 audit(1759765554.334:95): avc: denied { mounton } for pid=6018 comm="syz-executor.0" path="/syzcgroup/cpu" dev="sda1" ino=2028 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 85.683182][ T6018] cgroup: Unknown subsys name 'cpuset' [ 85.713086][ T30] audit: type=1400 audit(1759765554.364:96): avc: denied { create } for pid=6018 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 86.798532][ T30] audit: type=1400 audit(1759765555.444:97): avc: denied { ioctl } for pid=6018 comm="syz-executor.0" path="socket:[5743]" dev="sockfs" ino=5743 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 86.799213][ T5148] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 86.832193][ T5148] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 86.840007][ T5148] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 86.847846][ T5148] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 86.855833][ T5148] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 86.945918][ T6018] chnl_net:caif_netlink_parms(): no params data found [ 86.998792][ T6018] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.006101][ T6018] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.013444][ T6018] bridge_slave_0: entered allmulticast mode [ 87.020196][ T6018] bridge_slave_0: entered promiscuous mode [ 87.027931][ T6018] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.035081][ T6018] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.042312][ T6018] bridge_slave_1: entered allmulticast mode [ 87.049089][ T6018] bridge_slave_1: entered promiscuous mode [ 87.072769][ T6018] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.083893][ T6018] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.109604][ T6018] team0: Port device team_slave_0 added [ 87.116849][ T6018] team0: Port device team_slave_1 added [ 87.137928][ T6018] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 87.145678][ T6018] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 87.171730][ T6018] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 87.183361][ T6018] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 87.190301][ T6018] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 87.217036][ T6018] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 87.247460][ T6018] hsr_slave_0: entered promiscuous mode [ 87.253647][ T6018] hsr_slave_1: entered promiscuous mode [ 87.334315][ T6018] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.341384][ T6018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.348810][ T6018] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.355921][ T6018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.395574][ T6018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.411298][ T2925] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.419343][ T2925] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.433456][ T6018] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.445863][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.453128][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.465013][ T2925] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.472151][ T2925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.524298][ T6018] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 87.790251][ T6018] veth0_vlan: entered promiscuous mode [ 87.800052][ T6018] veth1_vlan: entered promiscuous mode [ 87.820725][ T6018] veth0_macvtap: entered promiscuous mode [ 87.829116][ T6018] veth1_macvtap: entered promiscuous mode [ 87.848228][ T6018] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 87.861958][ T6018] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 87.906094][ T30] audit: type=1400 audit(1759765556.554:98): avc: denied { create } for pid=6043 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 87.931972][ T30] audit: type=1400 audit(1759765556.564:99): avc: denied { bind } for pid=6043 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 87.958341][ T30] audit: type=1400 audit(1759765556.604:100): avc: denied { name_bind } for pid=6043 comm="syz-executor.0" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 87.983493][ T30] audit: type=1400 audit(1759765556.604:101): avc: denied { node_bind } for pid=6043 comm="syz-executor.0" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 88.018204][ T1141] [ 88.020548][ T1141] ============================================ [ 88.026675][ T1141] WARNING: possible recursive locking detected [ 88.032799][ T1141] syzkaller #0 Not tainted [ 88.037185][ T1141] -------------------------------------------- [ 88.043310][ T1141] kworker/u8:6/1141 is trying to acquire lock: [ 88.049505][ T1141] ffffe8ffffd3a0b8 (&pd_list->lock){+...}-{3:3}, at: padata_do_serial+0x7d7/0xda0 [ 88.058721][ T1141] [ 88.058721][ T1141] but task is already holding lock: [ 88.066057][ T1141] ffffe8ffffc3a108 (&pd_list->lock){+...}-{3:3}, at: padata_do_serial+0x6b0/0xda0 [ 88.075262][ T1141] [ 88.075262][ T1141] other info that might help us debug this: [ 88.083295][ T1141] Possible unsafe locking scenario: [ 88.083295][ T1141] [ 88.090718][ T1141] CPU0 [ 88.093974][ T1141] ---- [ 88.097223][ T1141] lock(&pd_list->lock); [ 88.101523][ T1141] lock(&pd_list->lock); [ 88.105833][ T1141] [ 88.105833][ T1141] *** DEADLOCK *** [ 88.105833][ T1141] [ 88.113945][ T1141] May be due to missing lock nesting notation [ 88.113945][ T1141] [ 88.122269][ T1141] 3 locks held by kworker/u8:6/1141: [ 88.127534][ T1141] #0: ffff8880213b3148 ((wq_completion)pencrypt_parallel){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 88.138897][ T1141] #1: ffffc9000401fd10 ((work_completion)(&pw->pw_work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 88.150089][ T1141] #2: ffffe8ffffc3a108 (&pd_list->lock){+...}-{3:3}, at: padata_do_serial+0x6b0/0xda0 [ 88.159736][ T1141] [ 88.159736][ T1141] stack backtrace: [ 88.165618][ T1141] CPU: 1 UID: 0 PID: 1141 Comm: kworker/u8:6 Not tainted syzkaller #0 PREEMPT(full) [ 88.165633][ T1141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 88.165641][ T1141] Workqueue: pencrypt_parallel padata_parallel_worker [ 88.165661][ T1141] Call Trace: [ 88.165667][ T1141] [ 88.165673][ T1141] dump_stack_lvl+0x116/0x1f0 [ 88.165689][ T1141] print_deadlock_bug+0x1e9/0x240 [ 88.165701][ T1141] __lock_acquire+0x1133/0x1ce0 [ 88.165713][ T1141] ? __queue_work+0x431/0x1160 [ 88.165727][ T1141] lock_acquire+0x179/0x350 [ 88.165737][ T1141] ? padata_do_serial+0x7d7/0xda0 [ 88.165750][ T1141] ? mark_held_locks+0x49/0x80 [ 88.165760][ T1141] ? queue_work_on+0x12a/0x1f0 [ 88.165773][ T1141] _raw_spin_lock+0x2e/0x40 [ 88.165787][ T1141] ? padata_do_serial+0x7d7/0xda0 [ 88.165799][ T1141] padata_do_serial+0x7d7/0xda0 [ 88.165813][ T1141] pcrypt_aead_enc+0x5b/0x70 [ 88.165830][ T1141] padata_parallel_worker+0x65/0xb0 [ 88.165842][ T1141] process_one_work+0x9cc/0x1b70 [ 88.165858][ T1141] ? __pfx_process_one_work+0x10/0x10 [ 88.165872][ T1141] ? assign_work+0x1a0/0x250 [ 88.165884][ T1141] worker_thread+0x6c8/0xf10 [ 88.165899][ T1141] ? __pfx_worker_thread+0x10/0x10 [ 88.165912][ T1141] kthread+0x3c5/0x780 [ 88.165924][ T1141] ? __pfx_kthread+0x10/0x10 [ 88.165936][ T1141] ? rcu_is_watching+0x12/0xc0 [ 88.165951][ T1141] ? __pfx_kthread+0x10/0x10 [ 88.165963][ T1141] ret_from_fork+0x56d/0x730 [ 88.165974][ T1141] ? __pfx_kthread+0x10/0x10 [ 88.165986][ T1141] ret_from_fork_asm+0x1a/0x30 [ 88.166004][ T1141] [ 88.872381][ T52] Bluetooth: hci0: command tx timeout 2025/10/06 15:45:59 executed programs: 1 [ 90.952705][ T52] Bluetooth: hci0: command tx timeout [ 93.031745][ T52] Bluetooth: hci0: command tx timeout [ 95.111765][ T52] Bluetooth: hci0: command tx timeout 2025/10/06 15:46:05 executed programs: 3