last executing test programs: 51.080265765s ago: executing program 0 (id=1): r0 = socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', r1, 0x0, 0x1034}, 0x18) write$cgroup_pressure(r0, &(0x7f0000000140)={'full'}, 0xfffffdef) 50.319508815s ago: executing program 0 (id=4): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0ffb}]}) waitid(0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0) 4.810158101s ago: executing program 32 (id=4): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0ffb}]}) waitid(0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0) 3.852719755s ago: executing program 1 (id=54): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getsig(0x4202, r0, 0x6, 0x0) 3.680356116s ago: executing program 1 (id=55): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r2) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010300000000000000000100000008000300", @ANYRES32=0x0, @ANYBLOB="4d009900d53caacc04000000"], 0x28}}, 0x40044) 2.900441938s ago: executing program 1 (id=56): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x2}}}]}, 0x38}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket(0x400000000010, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) 2.529180553s ago: executing program 1 (id=57): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) 436.898081ms ago: executing program 1 (id=58): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socket$packet(0x11, 0x3, 0x300) socket(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000002000000ff"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42041, 0x0) r2 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f0000000000)=0xffffffc3, 0x4) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x7080000, @dev={0xfe, 0x80, '\x00', 0xa}, 0x200, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="120000000000000029000000", @ANYRES64=r2], 0x108}}], 0x1, 0xc040) 0s ago: executing program 1 (id=59): socket$key(0xf, 0x3, 0x2) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)={'#! ', './file0'}, 0xb) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xfffffffffffffccc, 0x0) kernel console output (not intermixed with test programs): [ 53.428782][ T29] audit: type=1400 audit(53.340:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.432730][ T29] audit: type=1400 audit(53.360:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:43909' (ED25519) to the list of known hosts. [ 68.551206][ T29] audit: type=1400 audit(68.470:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 69.920656][ T29] audit: type=1400 audit(69.840:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.936143][ T29] audit: type=1400 audit(69.860:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 74.488009][ T29] audit: type=1400 audit(74.410:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 74.499375][ T29] audit: type=1400 audit(74.420:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.518435][ T3093] cgroup: Unknown subsys name 'net' [ 74.527762][ T29] audit: type=1400 audit(74.450:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.700102][ T3093] cgroup: Unknown subsys name 'cpuset' [ 74.708043][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 74.711080][ T3093] cgroup: Unknown subsys name 'rlimit' [ 74.991722][ T29] audit: type=1400 audit(74.920:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.998488][ T29] audit: type=1400 audit(74.920:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.005812][ T29] audit: type=1400 audit(74.920:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 75.125373][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 75.126265][ T29] audit: type=1400 audit(75.050:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.129860][ T29] audit: type=1400 audit(75.050:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 75.163401][ T29] audit: type=1400 audit(75.090:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.165432][ T29] audit: type=1400 audit(75.090:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 83.061644][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 85.192065][ T29] audit: type=1400 audit(85.120:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 85.232888][ T29] audit: type=1400 audit(85.160:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.234841][ T29] audit: type=1400 audit(85.160:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.241474][ T29] audit: type=1400 audit(85.160:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 85.271139][ T29] audit: type=1400 audit(85.190:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 85.356962][ T29] audit: type=1400 audit(85.280:76): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 85.888244][ T29] audit: type=1400 audit(85.810:77): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.007290][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.033444][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.080068][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.106640][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.882180][ T3099] hsr_slave_0: entered promiscuous mode [ 87.884631][ T3099] hsr_slave_1: entered promiscuous mode [ 87.969112][ T3098] hsr_slave_0: entered promiscuous mode [ 87.973986][ T3098] hsr_slave_1: entered promiscuous mode [ 87.978608][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 87.982315][ T3098] Cannot create hsr debugfs directory [ 88.331867][ T29] audit: type=1400 audit(88.260:78): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.334338][ T29] audit: type=1400 audit(88.260:79): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.337664][ T29] audit: type=1400 audit(88.260:80): avc: denied { read } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.347945][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 88.363847][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 88.377477][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 88.383238][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 88.436012][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 88.447970][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 88.459245][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 88.468040][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.075676][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.167811][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.767430][ T3099] veth0_vlan: entered promiscuous mode [ 91.793874][ T3099] veth1_vlan: entered promiscuous mode [ 91.874666][ T3099] veth0_macvtap: entered promiscuous mode [ 91.888978][ T3099] veth1_macvtap: entered promiscuous mode [ 91.978267][ T504] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.983700][ T504] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.987273][ T504] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.988556][ T504] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.136982][ T29] audit: type=1400 audit(92.050:81): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 92.137302][ T29] audit: type=1400 audit(92.060:82): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.muUAUQ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 92.152018][ T29] audit: type=1400 audit(92.070:83): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 92.159139][ T29] audit: type=1400 audit(92.080:84): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.muUAUQ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 92.168708][ T29] audit: type=1400 audit(92.090:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.muUAUQ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 92.193715][ T29] audit: type=1400 audit(92.120:86): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 92.202430][ T29] audit: type=1400 audit(92.130:87): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 92.206739][ T29] audit: type=1400 audit(92.130:88): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2424 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 92.216927][ T29] audit: type=1400 audit(92.140:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 92.226301][ T29] audit: type=1400 audit(92.150:90): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 92.296042][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 92.357286][ T3098] veth0_vlan: entered promiscuous mode [ 92.393870][ T3098] veth1_vlan: entered promiscuous mode [ 92.481740][ T3098] veth0_macvtap: entered promiscuous mode [ 92.495531][ T3098] veth1_macvtap: entered promiscuous mode [ 92.594562][ T504] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.595048][ T504] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.595168][ T504] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.595245][ T504] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.401879][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 98.404443][ T29] audit: type=1400 audit(98.330:111): avc: denied { allowed } for pid=3731 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 98.423172][ T29] audit: type=1400 audit(98.350:112): avc: denied { create } for pid=3731 comm="syz.1.11" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 98.425486][ T29] audit: type=1400 audit(98.350:113): avc: denied { map } for pid=3731 comm="syz.1.11" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2002 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 98.425852][ T29] audit: type=1400 audit(98.350:114): avc: denied { read write } for pid=3731 comm="syz.1.11" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2002 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 98.712024][ T29] audit: type=1400 audit(98.630:115): avc: denied { create } for pid=3731 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 98.729692][ T29] audit: type=1400 audit(98.640:116): avc: denied { write } for pid=3731 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 98.764200][ T29] audit: type=1400 audit(98.680:117): avc: denied { create } for pid=3731 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.799560][ T29] audit: type=1400 audit(98.720:118): avc: denied { setopt } for pid=3731 comm="syz.1.11" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.259005][ T3734] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 99.283713][ T29] audit: type=1326 audit(99.200:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3711 comm="syz.0.4" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 99.289967][ T29] audit: type=1326 audit(99.210:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3711 comm="syz.0.4" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 101.207850][ T3745] netdevsim netdevsim1: Direct firmware load for ./file1 failed with error -2 [ 101.211839][ T3745] netdevsim netdevsim1: Falling back to sysfs fallback for: ./file1 [ 102.300440][ C0] hrtimer: interrupt took 9742896 ns [ 104.701995][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 104.703014][ T29] audit: type=1400 audit(104.620:125): avc: denied { create } for pid=3752 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 104.722878][ T29] audit: type=1400 audit(104.650:126): avc: denied { write } for pid=3752 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 104.741606][ T3753] netlink: 8 bytes leftover after parsing attributes in process `syz.1.17'. [ 105.585125][ T29] audit: type=1400 audit(105.510:127): avc: denied { write } for pid=3755 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 108.181378][ T29] audit: type=1326 audit(108.100:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3765 comm="syz.1.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 108.192482][ T29] audit: type=1326 audit(108.120:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3765 comm="syz.1.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 108.204123][ T29] audit: type=1326 audit(108.130:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3765 comm="syz.1.21" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 108.205322][ T29] audit: type=1326 audit(108.130:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3765 comm="syz.1.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 108.303463][ T29] audit: type=1326 audit(108.230:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3765 comm="syz.1.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 108.307218][ T29] audit: type=1326 audit(108.230:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3765 comm="syz.1.21" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 108.380715][ T29] audit: type=1326 audit(108.300:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3765 comm="syz.1.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 110.939453][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 110.966225][ T29] audit: type=1326 audit(110.850:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 110.971899][ T29] audit: type=1326 audit(110.870:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 110.987105][ T29] audit: type=1326 audit(110.910:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 110.994774][ T29] audit: type=1326 audit(110.920:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 111.004117][ T29] audit: type=1326 audit(110.920:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 111.012236][ T29] audit: type=1326 audit(110.930:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 111.016573][ T29] audit: type=1326 audit(110.940:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=96 compat=0 ip=0x132320 code=0x7ffc0000 [ 111.025961][ T29] audit: type=1326 audit(110.940:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 111.029425][ T29] audit: type=1326 audit(110.940:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 114.062309][ T29] audit: type=1400 audit(113.990:148): avc: denied { load_policy } for pid=3788 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 114.062334][ T3789] SELinux: policydb version 0 does not match my version range 15-35 [ 114.063710][ T3789] SELinux: failed to load policy [ 114.924053][ T3792] process 'syz.1.29' launched '/dev/fd/6' with NULL argv: empty string added [ 117.237888][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 117.248579][ T29] audit: type=1400 audit(117.160:151): avc: denied { connect } for pid=3799 comm="syz.1.32" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 117.256552][ T29] audit: type=1400 audit(117.170:152): avc: denied { write } for pid=3799 comm="syz.1.32" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 121.123258][ T3803] netlink: 24 bytes leftover after parsing attributes in process `syz.1.33'. [ 126.212616][ T29] audit: type=1326 audit(126.140:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3821 comm="syz.1.39" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 128.792516][ T29] audit: type=1400 audit(128.720:154): avc: denied { watch watch_reads } for pid=3825 comm="syz.1.40" path="/37/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 128.802216][ T3826] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 128.803604][ T29] audit: type=1400 audit(128.730:155): avc: denied { relabelto } for pid=3825 comm="syz.1.40" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 128.810894][ T29] audit: type=1400 audit(128.730:156): avc: denied { associate } for pid=3825 comm="syz.1.40" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 130.390171][ T3830] netlink: 4 bytes leftover after parsing attributes in process `syz.1.42'. [ 130.438687][ T3830] netlink: 4 bytes leftover after parsing attributes in process `syz.1.42'. [ 130.998801][ T3832] syz.1.43 uses obsolete (PF_INET,SOCK_PACKET) [ 131.082616][ T29] audit: type=1400 audit(131.010:157): avc: denied { ioctl } for pid=3831 comm="syz.1.43" path="socket:[3148]" dev="sockfs" ino=3148 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 133.702500][ T29] audit: type=1400 audit(133.630:158): avc: denied { mount } for pid=3844 comm="syz.1.46" name="/" dev="ramfs" ino=2624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 133.823583][ T29] audit: type=1400 audit(133.750:159): avc: denied { create } for pid=3844 comm="syz.1.46" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 138.593014][ T29] audit: type=1400 audit(138.520:160): avc: denied { bind } for pid=3858 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.688806][ T29] audit: type=1400 audit(138.610:161): avc: denied { setopt } for pid=3858 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.743624][ T3859] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 138.976770][ T3859] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.128300][ T3859] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.279292][ T3859] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.478793][ T2618] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 139.492507][ T504] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 139.516634][ T12] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 139.541200][ T32] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 139.824838][ T3882] Driver unsupported XDP return value 0 on prog (id 37) dev N/A, expect packet loss! [ 141.196457][ T29] audit: type=1400 audit(141.120:162): avc: denied { relabelfrom } for pid=3903 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 141.202124][ T29] audit: type=1400 audit(141.130:163): avc: denied { relabelto } for pid=3903 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 141.556433][ T29] audit: type=1326 audit(141.480:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 141.556952][ T29] audit: type=1326 audit(141.480:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 141.557308][ T29] audit: type=1326 audit(141.480:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 141.558747][ T29] audit: type=1326 audit(141.480:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 141.591181][ T29] audit: type=1326 audit(141.510:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 141.643857][ T29] audit: type=1326 audit(141.570:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 141.646030][ T29] audit: type=1326 audit(141.570:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 141.668402][ T29] audit: type=1326 audit(141.590:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132320 code=0x7ffc0000 [ 144.113750][ T4019] ------------[ cut here ]------------ [ 144.114419][ T4019] WARNING: kernel/sched/core.c:10569 at sched_mm_cid_fork+0x34c/0x45c, CPU#0: kworker/u8:14/4019 [ 144.127954][ T4019] Modules linked in: [ 144.132333][ T4019] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 144.133672][ T4019] CPU: 0 UID: 0 PID: 4019 Comm: kworker/u8:14 Not tainted syzkaller #0 PREEMPT [ 144.134100][ T4019] Hardware name: ARM-Versatile Express [ 144.134584][ T4019] Call trace: [ 144.135090][ T4019] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 144.135781][ T4019] r7:82283bb8 r6:85289800 r5:00000000 r4:8229596c [ 144.136110][ T4019] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 144.136453][ T4019] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 144.136796][ T4019] r5:00000000 r4:82a7bd14 [ 144.136981][ T4019] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 144.137436][ T4019] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 144.137855][ T4019] r7:80295b38 [ 144.138028][ T4019] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 144.138599][ T4019] r3:8280c704 r2:00000001 r1:8227c120 r0:82283bb8 [ 144.138930][ T4019] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 144.139387][ T4019] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 144.139767][ T4019] r8:00000009 r7:822867ac r6:dfd25e8c r5:85289800 r4:00000000 [ 144.140022][ T4019] [<8025233c>] (warn_slowpath_fmt) from [<80295b38>] (sched_mm_cid_fork+0x34c/0x45c) [ 144.140666][ T4019] r10:851dfc58 r9:8291bbf4 r8:82ad3ad0 r7:00000006 r6:85289800 r5:851dfc00 [ 144.141055][ T4019] r4:00000000 [ 144.141300][ T4019] [<802957ec>] (sched_mm_cid_fork) from [<80295c58>] (sched_mm_cid_after_execve+0x10/0x14) [ 144.141754][ T4019] r10:851dfc58 r9:8291bbf4 r8:82ad3ad0 r7:00000006 r6:fffffffc r5:851dfc00 [ 144.142223][ T4019] r4:85289800 [ 144.142384][ T4019] [<80295c48>] (sched_mm_cid_after_execve) from [<8057399c>] (bprm_execve+0x14c/0x540) [ 144.142774][ T4019] [<80573850>] (bprm_execve) from [<805750e8>] (kernel_execve+0xf8/0x190) [ 144.143158][ T4019] r10:00000000 r9:00000000 r8:828f58f0 r7:85da6dc0 r6:83863000 r5:851dfc00 [ 144.143480][ T4019] r4:00000000 [ 144.143697][ T4019] [<80574ff0>] (kernel_execve) from [<80270e80>] (call_usermodehelper_exec_async+0xf0/0x160) [ 144.144109][ T4019] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:85da6d80 r4:85d64600 [ 144.144431][ T4019] [<80270d90>] (call_usermodehelper_exec_async) from [<80200114>] (ret_from_fork+0x14/0x20) [ 144.145086][ T4019] Exception stack(0xdfd25fb0 to 0xdfd25ff8) [ 144.145505][ T4019] 5fa0: 00000000 00000000 00000000 00000000 [ 144.146012][ T4019] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 144.146455][ T4019] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 144.146818][ T4019] r7:00000000 r6:00000000 r5:80270d90 r4:85da6d80 [ 144.149635][ T4019] Rebooting in 86400 seconds..