Warning: Permanently added '10.128.0.123' (ED25519) to the list of known hosts. 2026/02/12 22:14:59 parsed 1 programs [ 23.351281][ T24] audit: type=1400 audit(1770934499.369:64): avc: denied { node_bind } for pid=275 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.372173][ T24] audit: type=1400 audit(1770934499.369:65): avc: denied { create } for pid=275 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 23.391997][ T24] audit: type=1400 audit(1770934499.369:66): avc: denied { module_request } for pid=275 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 23.956389][ T24] audit: type=1400 audit(1770934499.969:67): avc: denied { mounton } for pid=281 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.957387][ T281] cgroup: Unknown subsys name 'net' [ 23.979049][ T24] audit: type=1400 audit(1770934499.969:68): avc: denied { mount } for pid=281 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.006465][ T24] audit: type=1400 audit(1770934499.999:69): avc: denied { unmount } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.006650][ T281] cgroup: Unknown subsys name 'devices' [ 24.241740][ T281] cgroup: Unknown subsys name 'hugetlb' [ 24.247324][ T281] cgroup: Unknown subsys name 'rlimit' [ 24.390211][ T24] audit: type=1400 audit(1770934500.409:70): avc: denied { setattr } for pid=281 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.413752][ T24] audit: type=1400 audit(1770934500.409:71): avc: denied { create } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.422806][ T286] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.434124][ T24] audit: type=1400 audit(1770934500.409:72): avc: denied { write } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.462942][ T24] audit: type=1400 audit(1770934500.409:73): avc: denied { read } for pid=281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.483225][ T281] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.882070][ T290] request_module fs-gadgetfs succeeded, but still no fs? [ 24.893567][ T290] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 25.407772][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.414867][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.422884][ T341] device bridge_slave_0 entered promiscuous mode [ 25.429659][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.436732][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.444058][ T341] device bridge_slave_1 entered promiscuous mode [ 25.474705][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.481766][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.489030][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.496092][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.510957][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.518584][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.525841][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.535400][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.543557][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.550589][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.558839][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.567219][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.574260][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.585047][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.593822][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.605697][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.616024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.624125][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.631917][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.639895][ T341] device veth0_vlan entered promiscuous mode [ 25.648711][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.657724][ T341] device veth1_macvtap entered promiscuous mode [ 25.666448][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.676148][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2026/02/12 22:15:01 executed programs: 0 [ 25.909340][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.916998][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.924456][ T353] device bridge_slave_0 entered promiscuous mode [ 25.931595][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.938619][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.946100][ T353] device bridge_slave_1 entered promiscuous mode [ 25.984156][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.991200][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.998452][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.005486][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.021122][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.028630][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.036026][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.045211][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.053595][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.061742][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.068736][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.082215][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.090466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.098506][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.105535][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.115772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.123900][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.141345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.149311][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.160608][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.169041][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.183795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.191860][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.199719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.207265][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.215699][ T353] device veth0_vlan entered promiscuous mode [ 26.230974][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.239061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.248072][ T353] device veth1_macvtap entered promiscuous mode [ 26.256291][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.264188][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.272514][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.282216][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.290518][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.316025][ T357] netlink: 12 bytes leftover after parsing attributes in process `syz.2.17'. [ 26.325112][ T357] netlink: 12 bytes leftover after parsing attributes in process `syz.2.17'. [ 26.334117][ T357] ================================================================== [ 26.342186][ T357] BUG: KASAN: slab-out-of-bounds in tc_setup_flow_action+0x842/0x3280 [ 26.350306][ T357] Read of size 8 at addr ffff88810fb964c0 by task syz.2.17/357 [ 26.357815][ T357] [ 26.360133][ T357] CPU: 0 PID: 357 Comm: syz.2.17 Not tainted syzkaller #0 [ 26.367218][ T357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 26.377367][ T357] Call Trace: [ 26.380644][ T357] __dump_stack+0x21/0x24 [ 26.384956][ T357] dump_stack_lvl+0x1a7/0x208 [ 26.389608][ T357] ? show_regs_print_info+0x18/0x18 [ 26.394781][ T357] ? thaw_kernel_threads+0x220/0x220 [ 26.400037][ T357] print_address_description+0x7f/0x2c0 [ 26.405551][ T357] ? tc_setup_flow_action+0x842/0x3280 [ 26.410978][ T357] kasan_report+0xe2/0x130 [ 26.415362][ T357] ? flow_action_cookie_create+0x28/0x90 [ 26.420961][ T357] ? tc_setup_flow_action+0x842/0x3280 [ 26.426389][ T357] __asan_report_load8_noabort+0x14/0x20 [ 26.431991][ T357] tc_setup_flow_action+0x842/0x3280 [ 26.437266][ T357] ? __kmalloc+0x1a4/0x330 [ 26.441657][ T357] ? flow_rule_alloc+0x32/0x2c0 [ 26.446582][ T357] mall_replace_hw_filter+0x2cc/0x8a0 [ 26.451928][ T357] ? pcpu_block_update_hint_alloc+0x8bf/0xc50 [ 26.457990][ T357] ? mall_set_parms+0x410/0x410 [ 26.462811][ T357] ? tcf_exts_destroy+0xb0/0xb0 [ 26.467628][ T357] ? pcpu_alloc+0xf9b/0x16b0 [ 26.472189][ T357] ? mall_set_parms+0x19d/0x410 [ 26.477008][ T357] mall_change+0x546/0x760 [ 26.481396][ T357] ? __kasan_check_write+0x14/0x20 [ 26.486474][ T357] ? mall_get+0xa0/0xa0 [ 26.490604][ T357] ? tcf_chain_tp_insert_unique+0xac1/0xc10 [ 26.496468][ T357] ? nla_strcmp+0xf4/0x140 [ 26.500851][ T357] tc_new_tfilter+0x1452/0x1a90 [ 26.505671][ T357] ? mall_get+0xa0/0xa0 [ 26.509802][ T357] ? tcf_gate_entry_destructor+0x20/0x20 [ 26.515412][ T357] ? security_capable+0x87/0xb0 [ 26.520232][ T357] ? ns_capable+0x8c/0xf0 [ 26.524531][ T357] ? netlink_net_capable+0x125/0x160 [ 26.529786][ T357] ? tcf_gate_entry_destructor+0x20/0x20 [ 26.535395][ T357] rtnetlink_rcv_msg+0x845/0xcc0 [ 26.540305][ T357] ? rtnetlink_bind+0x80/0x80 [ 26.544955][ T357] ? arch_stack_walk+0xee/0x140 [ 26.549779][ T357] ? stack_trace_save+0xa6/0xf0 [ 26.554603][ T357] ? stack_trace_snprint+0xf0/0xf0 [ 26.559687][ T357] ? do_syscall_64+0x31/0x40 [ 26.564249][ T357] ? avc_has_perm+0x168/0x3d0 [ 26.568894][ T357] ? memcpy+0x56/0x70 [ 26.572843][ T357] ? avc_has_perm+0x27f/0x3d0 [ 26.577488][ T357] ? __kasan_slab_alloc+0xbd/0xf0 [ 26.582481][ T357] ? slab_post_alloc_hook+0x5d/0x2f0 [ 26.587732][ T357] ? avc_has_perm_noaudit+0x260/0x260 [ 26.593074][ T357] ? selinux_nlmsg_lookup+0x3fb/0x4a0 [ 26.598416][ T357] netlink_rcv_skb+0x1f5/0x440 [ 26.603150][ T357] ? rtnetlink_bind+0x80/0x80 [ 26.607883][ T357] ? netlink_ack+0xb70/0xb70 [ 26.612527][ T357] ? __netlink_lookup+0x387/0x3b0 [ 26.617517][ T357] rtnetlink_rcv+0x1c/0x20 [ 26.621902][ T357] netlink_unicast+0x876/0xa40 [ 26.626635][ T357] netlink_sendmsg+0x89c/0xb50 [ 26.631393][ T357] ? netlink_getsockopt+0x530/0x530 [ 26.636559][ T357] ? get_futex_key+0x718/0xc70 [ 26.641290][ T357] ? security_socket_sendmsg+0x82/0xa0 [ 26.646720][ T357] ? netlink_getsockopt+0x530/0x530 [ 26.651885][ T357] ____sys_sendmsg+0x5b7/0x8f0 [ 26.656616][ T357] ? __sys_sendmsg_sock+0x40/0x40 [ 26.661611][ T357] ? import_iovec+0x7c/0xb0 [ 26.666080][ T357] ___sys_sendmsg+0x236/0x2e0 [ 26.670722][ T357] ? __sys_sendmsg+0x280/0x280 [ 26.675468][ T357] ? alloc_file+0x82/0x540 [ 26.679862][ T357] ? __kasan_check_read+0x11/0x20 [ 26.684867][ T357] ? __fdget+0x15b/0x230 [ 26.689080][ T357] __x64_sys_sendmsg+0x1f9/0x2c0 [ 26.693984][ T357] ? ___sys_sendmsg+0x2e0/0x2e0 [ 26.698803][ T357] ? debug_smp_processor_id+0x17/0x20 [ 26.704145][ T357] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 26.710178][ T357] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 26.715776][ T357] do_syscall_64+0x31/0x40 [ 26.720160][ T357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 26.726036][ T357] RIP: 0033:0x7f2b24b94f79 [ 26.730441][ T357] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 26.750018][ T357] RSP: 002b:00007fff26bf8868 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 26.758400][ T357] RAX: ffffffffffffffda RBX: 00007f2b24e0efa0 RCX: 00007f2b24b94f79 [ 26.766356][ T357] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000004 [ 26.774304][ T357] RBP: 00007f2b24c2b7e0 R08: 0000000000000000 R09: 0000000000000000 [ 26.782250][ T357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 26.790192][ T357] R13: 00007f2b24e0efac R14: 00007f2b24e0efa0 R15: 00007f2b24e0efa0 [ 26.798135][ T357] [ 26.800434][ T357] Allocated by task 357: [ 26.804648][ T357] __kasan_kmalloc+0xda/0x110 [ 26.809314][ T357] __kmalloc+0x1a4/0x330 [ 26.813540][ T357] tcf_idr_create+0x5f/0x790 [ 26.818110][ T357] tcf_idr_create_from_flags+0x61/0x70 [ 26.823550][ T357] tcf_gact_init+0x2e6/0x560 [ 26.828119][ T357] tcf_action_init_1+0x443/0x6e0 [ 26.833113][ T357] tcf_action_init+0x227/0x780 [ 26.837847][ T357] tcf_exts_validate+0x248/0x570 [ 26.842757][ T357] mall_set_parms+0x4b/0x410 [ 26.847334][ T357] mall_change+0x47a/0x760 [ 26.851720][ T357] tc_new_tfilter+0x1452/0x1a90 [ 26.856551][ T357] rtnetlink_rcv_msg+0x845/0xcc0 [ 26.861491][ T357] netlink_rcv_skb+0x1f5/0x440 [ 26.866224][ T357] rtnetlink_rcv+0x1c/0x20 [ 26.870608][ T357] netlink_unicast+0x876/0xa40 [ 26.875339][ T357] netlink_sendmsg+0x89c/0xb50 [ 26.880079][ T357] ____sys_sendmsg+0x5b7/0x8f0 [ 26.884914][ T357] ___sys_sendmsg+0x236/0x2e0 [ 26.889560][ T357] __x64_sys_sendmsg+0x1f9/0x2c0 [ 26.894564][ T357] do_syscall_64+0x31/0x40 [ 26.898949][ T357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 26.904816][ T357] [ 26.907143][ T357] The buggy address belongs to the object at ffff88810fb96400 [ 26.907143][ T357] which belongs to the cache kmalloc-192 of size 192 [ 26.921167][ T357] The buggy address is located 0 bytes to the right of [ 26.921167][ T357] 192-byte region [ffff88810fb96400, ffff88810fb964c0) [ 26.934774][ T357] The buggy address belongs to the page: [ 26.940398][ T357] page:ffffea00043ee580 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10fb96 [ 26.951035][ T357] flags: 0x4000000000000200(slab) [ 26.956030][ T357] raw: 4000000000000200 ffffea00043ee400 0000000200000002 ffff888100043380 [ 26.964591][ T357] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 26.973173][ T357] page dumped because: kasan: bad access detected [ 26.979580][ T357] page_owner tracks the page as allocated [ 26.985278][ T357] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 96, ts 3859648143, free_ts 3859630294 [ 27.001133][ T357] prep_new_page+0x179/0x180 [ 27.005692][ T357] get_page_from_freelist+0x223b/0x23d0 [ 27.011210][ T357] __alloc_pages_nodemask+0x290/0x620 [ 27.016552][ T357] new_slab+0x84/0x3f0 [ 27.020605][ T357] ___slab_alloc+0x2a6/0x450 [ 27.025167][ T357] __slab_alloc+0x63/0xa0 [ 27.029466][ T357] kmem_cache_alloc_trace+0x1b0/0x2e0 [ 27.034809][ T357] kernfs_fop_open+0x343/0xb30 [ 27.039638][ T357] do_dentry_open+0x793/0x1090 [ 27.044370][ T357] vfs_open+0x73/0x80 [ 27.048324][ T357] path_openat+0x280f/0x31c0 [ 27.052887][ T357] do_filp_open+0x1e2/0x410 [ 27.057360][ T357] do_sys_openat2+0x19f/0x750 [ 27.062012][ T357] __x64_sys_openat+0x136/0x160 [ 27.066834][ T357] do_syscall_64+0x31/0x40 [ 27.071234][ T357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.077092][ T357] page last free stack trace: [ 27.081742][ T357] free_unref_page_prepare+0x2b7/0x2d0 [ 27.087178][ T357] __free_pages+0x146/0x3b0 [ 27.091675][ T357] free_pages+0x82/0x90 [ 27.095802][ T357] selinux_genfs_get_sid+0x20b/0x250 [ 27.101061][ T357] inode_doinit_with_dentry+0x879/0xd70 [ 27.106593][ T357] selinux_d_instantiate+0x27/0x40 [ 27.111686][ T357] security_d_instantiate+0x9e/0xf0 [ 27.116857][ T357] d_splice_alias+0x6d/0x390 [ 27.121422][ T357] kernfs_iop_lookup+0x2c5/0x310 [ 27.126332][ T357] path_openat+0x1140/0x31c0 [ 27.130892][ T357] do_filp_open+0x1e2/0x410 [ 27.135363][ T357] do_sys_openat2+0x19f/0x750 [ 27.140006][ T357] __x64_sys_openat+0x136/0x160 [ 27.144822][ T357] do_syscall_64+0x31/0x40 [ 27.149207][ T357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.155067][ T357] [ 27.157371][ T357] Memory state around the buggy address: [ 27.162978][ T357] ffff88810fb96380: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.171010][ T357] ffff88810fb96400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.179040][ T357] >ffff88810fb96480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 27.187080][ T357] ^ [ 27.193215][ T357] ffff88810fb96500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.201249][ T357] ffff88810fb96580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.209377][ T357] ================================================================== [ 27.217493][ T357] Disabling lock debugging due to kernel taint