[ 7.547814][ T23] audit: type=1400 audit(1739511912.200:56): avc: denied { read } for pid=215 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=9989 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7.556169][ T23] audit: type=1400 audit(1739511912.200:57): avc: denied { open } for pid=215 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=9989 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7.742335][ T23] audit: type=1400 audit(1739511912.400:58): avc: denied { use } for pid=244 comm="ssh-keygen" path="/dev/null" dev="devtmpfs" ino=23 scontext=system_u:system_r:ssh_keygen_t tcontext=system_u:system_r:kernel_t tclass=fd permissive=1 [ 7.779094][ T23] audit: type=1400 audit(1739511912.430:59): avc: denied { search } for pid=244 comm="ssh-keygen" name="/" dev="tmpfs" ino=9583 scontext=system_u:system_r:ssh_keygen_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7.803618][ T23] audit: type=1400 audit(1739511912.460:60): avc: denied { use } for pid=249 comm="sshd" path="/dev/null" dev="devtmpfs" ino=23 scontext=system_u:system_r:sshd_t tcontext=system_u:system_r:kernel_t tclass=fd permissive=1 [ 17.796898][ T23] audit: type=1400 audit(1739511922.450:61): avc: denied { transition } for pid=290 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.804763][ T23] audit: type=1400 audit(1739511922.450:62): avc: denied { noatsecure } for pid=290 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.809295][ T23] audit: type=1400 audit(1739511922.450:63): avc: denied { write } for pid=290 comm="sh" path="pipe:[11482]" dev="pipefs" ino=11482 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 17.815883][ T23] audit: type=1400 audit(1739511922.450:64): avc: denied { rlimitinh } for pid=290 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.832738][ T23] audit: type=1400 audit(1739511922.450:65): avc: denied { siginh } for pid=290 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.9' (ED25519) to the list of known hosts. 2025/02/14 05:45:30 ignoring optional flag "sandboxArg"="0" 2025/02/14 05:45:31 parsed 1 programs [ 27.157579][ T23] audit: type=1400 audit(1739511931.810:66): avc: denied { node_bind } for pid=353 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.687887][ T23] audit: type=1400 audit(1739511932.340:67): avc: denied { mounton } for pid=362 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.689527][ T362] cgroup1: Unknown subsys name 'net' [ 27.710669][ T23] audit: type=1400 audit(1739511932.340:68): avc: denied { mount } for pid=362 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.716103][ T362] cgroup1: Unknown subsys name 'net_prio' [ 27.744483][ T23] audit: type=1400 audit(1739511932.410:69): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 27.744981][ T362] cgroup1: Unknown subsys name 'devices' [ 27.773182][ T23] audit: type=1400 audit(1739511932.430:70): avc: denied { unmount } for pid=362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.943458][ T362] cgroup1: Unknown subsys name 'hugetlb' [ 27.949196][ T362] cgroup1: Unknown subsys name 'rlimit' [ 28.149596][ T23] audit: type=1400 audit(1739511932.800:71): avc: denied { setattr } for pid=362 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=10801 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.167004][ T366] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.173909][ T23] audit: type=1400 audit(1739511932.800:72): avc: denied { create } for pid=362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.203222][ T23] audit: type=1400 audit(1739511932.800:73): avc: denied { write } for pid=362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.223723][ T23] audit: type=1400 audit(1739511932.810:74): avc: denied { read } for pid=362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.243974][ T23] audit: type=1400 audit(1739511932.810:75): avc: denied { module_request } for pid=362 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 28.243985][ T362] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.725339][ T370] request_module fs-gadgetfs succeeded, but still no fs? [ 28.947915][ T395] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.955309][ T395] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.962830][ T395] device bridge_slave_0 entered promiscuous mode [ 28.970086][ T395] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.976974][ T395] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.984486][ T395] device bridge_slave_1 entered promiscuous mode [ 29.028610][ T395] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.035482][ T395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.042698][ T395] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.049611][ T395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.072832][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.080203][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.088628][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.096462][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.105705][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.113783][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.120716][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.129749][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.137963][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.144812][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.167073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.183059][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.196433][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.207910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.221272][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.234306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.244555][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.284997][ T395] syz-executor (395) used greatest stack depth: 20024 bytes left 2025/02/14 05:45:34 executed programs: 0 [ 30.077861][ T441] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.085754][ T441] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.093143][ T441] device bridge_slave_0 entered promiscuous mode [ 30.100906][ T441] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.107758][ T441] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.115474][ T441] device bridge_slave_1 entered promiscuous mode [ 30.157215][ T441] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.164086][ T441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.171327][ T441] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.178304][ T441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.200213][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.208177][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.215338][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.224611][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.233214][ T383] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.240659][ T383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.251366][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.259616][ T383] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.266804][ T383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.279408][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.289216][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.305329][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.316656][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.331030][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.343895][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.354701][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.961300][ T103] device bridge_slave_1 left promiscuous mode [ 30.967269][ T103] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.974891][ T103] device bridge_slave_0 left promiscuous mode [ 30.981028][ T103] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.441645][ T471] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.448494][ T471] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.456038][ T471] device bridge_slave_0 entered promiscuous mode [ 45.462871][ T471] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.469908][ T471] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.477630][ T471] device bridge_slave_1 entered promiscuous mode [ 45.521948][ T471] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.528971][ T471] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.536212][ T471] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.543167][ T471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.564360][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.571693][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.578953][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.587119][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.597083][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.605452][ T383] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.612316][ T383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.621558][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.629654][ T383] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.636516][ T383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.649888][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.659498][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.675233][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.686658][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.699573][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.713325][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2025/02/14 05:45:50 executed programs: 3 [ 45.723446][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.746305][ T471] ================================================================== [ 45.754637][ T471] BUG: KASAN: use-after-free in __mutex_lock+0xcd7/0x1060 [ 45.761656][ T471] Read of size 4 at addr ffff8881ecf4cef8 by task syz-executor/471 [ 45.769383][ T471] [ 45.771551][ T471] CPU: 1 PID: 471 Comm: syz-executor Not tainted 5.4.289-syzkaller-00011-g39762b7a60e9 #0 [ 45.781279][ T471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.791336][ T471] Call Trace: [ 45.794477][ T471] dump_stack+0x1d8/0x241 [ 45.798632][ T471] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 45.804382][ T471] ? printk+0xd1/0x111 [ 45.808295][ T471] ? __mutex_lock+0xcd7/0x1060 [ 45.812908][ T471] print_address_description+0x8c/0x600 [ 45.818275][ T471] ? check_preemption_disabled+0x9f/0x320 [ 45.823849][ T471] ? __unwind_start+0x708/0x890 [ 45.828605][ T471] ? __mutex_lock+0xcd7/0x1060 [ 45.833202][ T471] __kasan_report+0xf3/0x120 [ 45.837645][ T471] ? __mutex_lock+0xcd7/0x1060 [ 45.842240][ T471] kasan_report+0x30/0x60 [ 45.846398][ T471] __mutex_lock+0xcd7/0x1060 [ 45.850828][ T471] ? kobject_get_unless_zero+0x229/0x320 [ 45.856376][ T471] ? __ww_mutex_lock_interruptible_slowpath+0x10/0x10 [ 45.863050][ T471] ? __module_put_and_exit+0x20/0x20 [ 45.868189][ T471] ? up_read+0x6f/0x1b0 [ 45.872176][ T471] mutex_lock_killable+0xd8/0x110 [ 45.877060][ T471] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 45.883484][ T471] ? mutex_lock+0xa5/0x110 [ 45.887717][ T471] ? mutex_trylock+0xa0/0xa0 [ 45.892421][ T471] lo_open+0x18/0xc0 [ 45.896349][ T471] __blkdev_get+0x3c8/0x1160 [ 45.900777][ T471] ? blkdev_get+0x3a0/0x3a0 [ 45.905209][ T471] ? _raw_spin_unlock+0x49/0x60 [ 45.910059][ T471] blkdev_get+0x2de/0x3a0 [ 45.914227][ T471] ? blkdev_open+0x173/0x290 [ 45.918742][ T471] ? block_ioctl+0xe0/0xe0 [ 45.923012][ T471] do_dentry_open+0x964/0x1130 [ 45.927599][ T471] ? finish_open+0xd0/0xd0 [ 45.931849][ T471] ? security_inode_permission+0xad/0xf0 [ 45.937328][ T471] ? memcpy+0x38/0x50 [ 45.941224][ T471] path_openat+0x29bf/0x34b0 [ 45.945658][ T471] ? stack_trace_save+0x118/0x1c0 [ 45.950611][ T471] ? do_filp_open+0x450/0x450 [ 45.955105][ T471] ? do_sys_open+0x357/0x810 [ 45.959619][ T471] ? do_syscall_64+0xca/0x1c0 [ 45.964308][ T471] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 45.970917][ T471] do_filp_open+0x20b/0x450 [ 45.975602][ T471] ? vfs_tmpfile+0x2c0/0x2c0 [ 45.980118][ T471] ? _raw_spin_unlock+0x49/0x60 [ 45.984818][ T471] ? __alloc_fd+0x4c5/0x570 [ 45.989146][ T471] do_sys_open+0x39c/0x810 [ 45.993403][ T471] ? check_preemption_disabled+0x153/0x320 [ 45.999562][ T471] ? file_open_root+0x490/0x490 [ 46.004258][ T471] do_syscall_64+0xca/0x1c0 [ 46.008586][ T471] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 46.014314][ T471] RIP: 0033:0x7fd938eb56d1 [ 46.018568][ T471] Code: 75 57 89 f0 25 00 00 41 00 3d 00 00 41 00 74 49 80 3d 7a 1e 1f 00 00 74 6d 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 93 00 00 00 48 8b 54 24 28 64 48 2b 14 25 [ 46.038538][ T471] RSP: 002b:00007fff55253e10 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 46.046863][ T471] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fd938eb56d1 [ 46.054974][ T471] RDX: 0000000000000002 RSI: 00007fff55253f20 RDI: 00000000ffffff9c [ 46.062940][ T471] RBP: 00007fff55253f20 R08: 000000000000000a R09: 00007fff55253bd7 [ 46.070837][ T471] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 46.078731][ T471] R13: 00007fd9390a0260 R14: 0000000000000003 R15: 00007fff55253f20 [ 46.086904][ T471] [ 46.089064][ T471] Allocated by task 445: [ 46.093156][ T471] __kasan_kmalloc+0x171/0x210 [ 46.097755][ T471] kmem_cache_alloc+0xd9/0x250 [ 46.102523][ T471] dup_task_struct+0x4f/0x600 [ 46.107040][ T471] copy_process+0x56d/0x3230 [ 46.111450][ T471] _do_fork+0x197/0x900 [ 46.115442][ T471] __x64_sys_clone3+0x2da/0x300 [ 46.120130][ T471] do_syscall_64+0xca/0x1c0 [ 46.124480][ T471] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 46.130211][ T471] [ 46.132393][ T471] Freed by task 17: [ 46.136114][ T471] __kasan_slab_free+0x1b5/0x270 [ 46.141058][ T471] kmem_cache_free+0x10b/0x2c0 [ 46.145741][ T471] rcu_do_batch+0x492/0xa00 [ 46.150101][ T471] rcu_core+0x4c8/0xcb0 [ 46.154285][ T471] __do_softirq+0x23b/0x6b7 [ 46.158602][ T471] [ 46.160781][ T471] The buggy address belongs to the object at ffff8881ecf4cec0 [ 46.160781][ T471] which belongs to the cache task_struct of size 3904 [ 46.174842][ T471] The buggy address is located 56 bytes inside of [ 46.174842][ T471] 3904-byte region [ffff8881ecf4cec0, ffff8881ecf4de00) [ 46.188131][ T471] The buggy address belongs to the page: [ 46.193615][ T471] page:ffffea0007b3d200 refcount:1 mapcount:0 mapping:ffff8881f5cf1680 index:0x0 compound_mapcount: 0 [ 46.204463][ T471] flags: 0x8000000000010200(slab|head) [ 46.209905][ T471] raw: 8000000000010200 0000000000000000 0000000100000001 ffff8881f5cf1680 [ 46.218744][ T471] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 46.227148][ T471] page dumped because: kasan: bad access detected [ 46.233396][ T471] page_owner tracks the page as allocated [ 46.239057][ T471] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 46.254090][ T471] prep_new_page+0x18f/0x370 [ 46.258517][ T471] get_page_from_freelist+0x2d13/0x2d90 [ 46.263978][ T471] __alloc_pages_nodemask+0x393/0x840 [ 46.269275][ T471] alloc_slab_page+0x39/0x3c0 [ 46.273785][ T471] new_slab+0x97/0x440 [ 46.277783][ T471] ___slab_alloc+0x2fe/0x490 [ 46.282216][ T471] __slab_alloc+0x62/0xa0 [ 46.286380][ T471] kmem_cache_alloc+0x109/0x250 [ 46.291068][ T471] dup_task_struct+0x4f/0x600 [ 46.295582][ T471] copy_process+0x56d/0x3230 [ 46.300057][ T471] _do_fork+0x197/0x900 [ 46.304092][ T471] __x64_sys_clone+0x26b/0x2c0 [ 46.308871][ T471] do_syscall_64+0xca/0x1c0 [ 46.313577][ T471] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 46.319296][ T471] page_owner free stack trace missing [ 46.324676][ T471] [ 46.326848][ T471] Memory state around the buggy address: [ 46.333217][ T471] ffff8881ecf4cd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.341085][ T471] ffff8881ecf4ce00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.349018][ T471] >ffff8881ecf4ce80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 46.356886][ T471] ^ [ 46.364883][ T471] ffff8881ecf4cf00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.372772][ T471] ffff8881ecf4cf80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.380757][ T471] ================================================================== [ 46.388659][ T471] Disabling lock debugging due to kernel taint