last executing test programs: 6.36803058s ago: executing program 1 (id=62): socket$kcm(0x1e, 0x4, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x18}}], 0x1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)=@deltaction={0x18, 0x31, 0x101, 0x0, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x44000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRDELBR(r1, 0x89a2, &(0x7f0000000200)='bridge0\x00') 4.862657979s ago: executing program 1 (id=65): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b7"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000580)={0x500, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020200090f000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002000100000004d20000020300000020050005002f8000000a00000000000000ff0100000000000000000000000000010000000000000000010018"], 0x78}}, 0x0) 4.490061554s ago: executing program 1 (id=67): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x1022002, 0x0) r1 = dup(r0) r2 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) socket$inet6(0xa, 0x1, 0x0) 4.219298302s ago: executing program 1 (id=69): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}, 0x20000000}, {{&(0x7f00000002c0)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 3.79647592s ago: executing program 0 (id=70): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000980)=@newqdisc={0x58, 0x24, 0xd0f, 0x70bd30, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0xd}, {0xffff, 0xffff}, {0xfff3, 0xf}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x3, 0x1, 0x8, 0x1, 0xff, 0x7}, {0x4, 0x0, 0x3, 0xa159, 0x1000, 0xbebc20}, 0x3, 0x4000000, 0x421}}]}}]}, 0x58}}, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x4000000000001f2, 0xa00) 3.438314553s ago: executing program 0 (id=71): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) 3.231136567s ago: executing program 0 (id=72): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030003100000002cbd7000fcdbdf2502000900080000001c0000000000000005000600000000000a0000000000000000000000000000000000000000000001090000000000000002000100000000000000000c0000000005000500000000000a"], 0x80}, 0x1, 0x7}, 0x0) 1.303661154s ago: executing program 0 (id=73): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x0, 0x80) getdents64(r1, &(0x7f0000000f80)=""/4096, 0x1000) 1.169364903s ago: executing program 1 (id=74): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) syz_open_dev$loop(&(0x7f0000000780), 0x2, 0x400a00) 784.516838ms ago: executing program 0 (id=75): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000007}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x97}, 0x18) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth0_macvtap\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x6, 0x6, @remote}, 0x14) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) 447.667391ms ago: executing program 0 (id=76): socket(0x2, 0x80805, 0x0) socket(0x2, 0x805, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2c, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) socket$netlink(0x10, 0x3, 0x0) 0s ago: executing program 1 (id=77): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) rt_sigprocmask(0x2, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 55.874644][ T29] audit: type=1400 audit(55.770:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 55.879750][ T29] audit: type=1400 audit(55.780:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:14019' (ED25519) to the list of known hosts. [ 74.472011][ T29] audit: type=1400 audit(74.360:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 77.196546][ T29] audit: type=1400 audit(77.090:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 77.201326][ T29] audit: type=1400 audit(77.100:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 79.982634][ T29] audit: type=1400 audit(79.880:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 79.989821][ T29] audit: type=1400 audit(79.890:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 80.010594][ T3093] cgroup: Unknown subsys name 'net' [ 80.021026][ T29] audit: type=1400 audit(79.920:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 80.182711][ T3093] cgroup: Unknown subsys name 'cpuset' [ 80.188105][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 80.188797][ T3093] cgroup: Unknown subsys name 'rlimit' [ 80.423954][ T29] audit: type=1400 audit(80.320:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.429501][ T29] audit: type=1400 audit(80.330:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 80.432763][ T29] audit: type=1400 audit(80.330:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 80.685111][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 80.689630][ T29] audit: type=1400 audit(80.590:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 80.700061][ T29] audit: type=1400 audit(80.600:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 80.741686][ T29] audit: type=1400 audit(80.640:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 80.744026][ T29] audit: type=1400 audit(80.640:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 88.522775][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 91.044117][ T29] audit: type=1400 audit(90.940:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 91.123381][ T29] audit: type=1400 audit(91.020:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 91.125179][ T29] audit: type=1400 audit(91.020:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 91.134427][ T29] audit: type=1400 audit(91.030:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 91.188792][ T29] audit: type=1400 audit(91.090:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 91.293083][ T29] audit: type=1400 audit(91.190:76): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 92.155598][ T29] audit: type=1400 audit(92.050:77): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.482505][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.494317][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.502594][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.533114][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.481537][ T3099] hsr_slave_0: entered promiscuous mode [ 94.485645][ T3099] hsr_slave_1: entered promiscuous mode [ 94.602714][ T3098] hsr_slave_0: entered promiscuous mode [ 94.608889][ T3098] hsr_slave_1: entered promiscuous mode [ 94.613584][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 94.615158][ T3098] Cannot create hsr debugfs directory [ 95.061754][ T29] audit: type=1400 audit(94.960:78): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 95.068248][ T29] audit: type=1400 audit(94.960:79): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 95.071033][ T29] audit: type=1400 audit(94.970:80): avc: denied { read } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 95.077165][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 95.090291][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 95.106911][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 95.121845][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 95.202754][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 95.219873][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 95.237318][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 95.254682][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 96.027240][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.174556][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.398161][ T3098] veth0_vlan: entered promiscuous mode [ 99.410709][ T3099] veth0_vlan: entered promiscuous mode [ 99.421743][ T3098] veth1_vlan: entered promiscuous mode [ 99.435347][ T3099] veth1_vlan: entered promiscuous mode [ 99.521700][ T3098] veth0_macvtap: entered promiscuous mode [ 99.552503][ T3098] veth1_macvtap: entered promiscuous mode [ 99.565655][ T3099] veth0_macvtap: entered promiscuous mode [ 99.583357][ T3099] veth1_macvtap: entered promiscuous mode [ 99.671310][ T1358] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.672061][ T1358] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.672178][ T1358] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.672378][ T1358] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.787597][ T29] audit: type=1400 audit(99.680:81): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 99.796804][ T29] audit: type=1400 audit(99.690:82): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MfgFT8/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 99.802722][ T29] audit: type=1400 audit(99.700:83): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 99.812119][ T29] audit: type=1400 audit(99.710:84): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MfgFT8/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 99.819108][ T29] audit: type=1400 audit(99.710:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MfgFT8/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2215 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 99.828110][ T29] audit: type=1400 audit(99.730:86): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 99.832647][ T29] audit: type=1400 audit(99.730:87): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 99.834768][ T29] audit: type=1400 audit(99.730:88): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=2216 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 99.841474][ T29] audit: type=1400 audit(99.740:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 99.844728][ T29] audit: type=1400 audit(99.740:90): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 99.853513][ T174] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.861843][ T174] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.862357][ T174] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.863951][ T174] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.930559][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 101.290488][ T3720] pim6reg1: entered promiscuous mode [ 101.291425][ T3720] pim6reg1: entered allmulticast mode [ 105.115003][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 105.116465][ T29] audit: type=1400 audit(105.010:107): avc: denied { create } for pid=3771 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 105.359793][ T29] audit: type=1400 audit(105.260:108): avc: denied { create } for pid=3775 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.364378][ T29] audit: type=1400 audit(105.260:109): avc: denied { write } for pid=3775 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.567468][ T29] audit: type=1326 audit(105.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 105.611057][ T29] audit: type=1326 audit(105.510:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 105.613359][ T29] audit: type=1326 audit(105.510:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 105.630699][ T29] audit: type=1326 audit(105.530:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 105.633271][ T29] audit: type=1326 audit(105.530:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 105.634977][ T29] audit: type=1326 audit(105.530:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 105.676858][ T29] audit: type=1326 audit(105.560:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3777 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 107.618847][ T3792] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.815137][ T3792] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.939508][ T3792] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 108.081763][ T3792] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 108.246533][ C0] hrtimer: interrupt took 7326800 ns [ 108.344922][ T174] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.420769][ T174] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.507658][ T57] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.586858][ T1318] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.058519][ T3822] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3822 comm=syz.1.35 [ 109.059050][ T3822] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3822 comm=syz.1.35 [ 113.164747][ T3858] netlink: 28 bytes leftover after parsing attributes in process `syz.1.47'. [ 113.178240][ T3858] netlink: 28 bytes leftover after parsing attributes in process `syz.1.47'. [ 115.679339][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 115.681967][ T29] audit: type=1326 audit(115.580:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.683289][ T29] audit: type=1326 audit(115.580:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.688587][ T29] audit: type=1326 audit(115.580:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.690217][ T29] audit: type=1326 audit(115.580:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.692864][ T29] audit: type=1326 audit(115.590:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.695604][ T29] audit: type=1326 audit(115.590:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.706640][ T29] audit: type=1326 audit(115.600:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.711351][ T29] audit: type=1326 audit(115.610:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.720697][ T29] audit: type=1326 audit(115.620:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 115.731462][ T29] audit: type=1326 audit(115.630:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3865 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.390411][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 121.408673][ T29] audit: type=1400 audit(121.280:192): avc: denied { create } for pid=3889 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 121.468233][ T29] audit: type=1400 audit(121.370:193): avc: denied { ioctl } for pid=3889 comm="syz.1.57" path="socket:[2548]" dev="sockfs" ino=2548 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 137.596717][ T29] audit: type=1400 audit(137.490:194): avc: denied { create } for pid=3907 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 138.054278][ T29] audit: type=1400 audit(137.950:195): avc: denied { ioctl } for pid=3907 comm="syz.1.62" path="socket:[2568]" dev="sockfs" ino=2568 ioctlcmd=0x89a2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.354083][ T29] audit: type=1400 audit(138.250:196): avc: denied { create } for pid=3913 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 138.382318][ T29] audit: type=1400 audit(138.280:197): avc: denied { bind } for pid=3913 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 138.386737][ T29] audit: type=1400 audit(138.280:198): avc: denied { write } for pid=3913 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 138.666806][ T29] audit: type=1400 audit(138.560:199): avc: denied { create } for pid=3915 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 138.700354][ T29] audit: type=1400 audit(138.590:200): avc: denied { write } for pid=3915 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 138.799335][ T29] audit: type=1400 audit(138.700:201): avc: denied { name_bind } for pid=3916 comm="syz.0.66" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 138.801701][ T29] audit: type=1400 audit(138.700:202): avc: denied { node_bind } for pid=3916 comm="syz.0.66" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 139.691054][ T3926] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 139.742721][ T3926] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 139.748574][ T3926] Zero length message leads to an empty skb [ 142.341394][ T29] audit: type=1326 audit(142.240:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 142.769924][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 142.772952][ T29] audit: type=1400 audit(142.670:212): avc: denied { bind } for pid=3943 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 143.654886][ T29] audit: type=1326 audit(143.550:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.77" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 143.668233][ T29] audit: type=1326 audit(143.550:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.77" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef3f8 code=0x7ffc0000 [ 143.678371][ T3953] ------------[ cut here ]------------ [ 143.679328][ T3953] WARNING: kernel/sched/core.c:10569 at sched_mm_cid_fork+0x34c/0x45c, CPU#1: kworker/u8:9/3953 [ 143.688988][ T3953] Modules linked in: [ 143.689981][ T3953] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 143.691328][ T3953] CPU: 1 UID: 0 PID: 3953 Comm: kworker/u8:9 Not tainted syzkaller #0 PREEMPT [ 143.692479][ T3953] Hardware name: ARM-Versatile Express [ 143.693125][ T3953] Call trace: [ 143.693647][ T3953] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 143.694494][ T3953] r7:82283ab8 r6:83f05400 r5:00000000 r4:8229586c [ 143.694885][ T3953] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 143.695256][ T3953] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 143.695608][ T3953] r5:00000000 r4:82a7bd14 [ 143.696068][ T3953] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 143.696627][ T3953] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 143.697007][ T3953] r7:80295b38 [ 143.697182][ T3953] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 143.697539][ T3953] r3:8280c704 r2:00000001 r1:8227c020 r0:82283ab8 [ 143.697793][ T3953] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 143.698130][ T3953] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 143.698496][ T3953] r8:00000009 r7:822866ac r6:dfc49e8c r5:83f05400 r4:00000000 [ 143.698805][ T3953] [<8025233c>] (warn_slowpath_fmt) from [<80295b38>] (sched_mm_cid_fork+0x34c/0x45c) [ 143.699328][ T3953] r10:85257a58 r9:8291bbf4 r8:82ad3ad0 r7:00000006 r6:83f05400 r5:85257a00 [ 143.699906][ T3953] r4:00000000 [ 143.700149][ T3953] [<802957ec>] (sched_mm_cid_fork) from [<80295c58>] (sched_mm_cid_after_execve+0x10/0x14) [ 143.700552][ T3953] r10:85257a58 r9:8291bbf4 r8:82ad3ad0 r7:00000006 r6:fffffffc r5:85257a00 [ 143.700856][ T3953] r4:83f05400 [ 143.701049][ T3953] [<80295c48>] (sched_mm_cid_after_execve) from [<805739d4>] (bprm_execve+0x14c/0x540) [ 143.701475][ T3953] [<80573888>] (bprm_execve) from [<80575120>] (kernel_execve+0xf8/0x190) [ 143.701933][ T3953] r10:00000000 r9:00000000 r8:828f58f0 r7:85c95c40 r6:83306000 r5:85257a00 [ 143.704361][ T3953] r4:00000000 [ 143.704675][ T3953] [<80575028>] (kernel_execve) from [<80270e80>] (call_usermodehelper_exec_async+0xf0/0x160) [ 143.706106][ T3953] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:85d09a40 r4:8448be80 [ 143.706831][ T3953] [<80270d90>] (call_usermodehelper_exec_async) from [<80200114>] (ret_from_fork+0x14/0x20) [ 143.707442][ T3953] Exception stack(0xdfc49fb0 to 0xdfc49ff8) [ 143.707917][ T3953] 9fa0: 00000000 00000000 00000000 00000000 [ 143.708264][ T3953] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 143.708618][ T3953] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 143.709013][ T3953] r7:00000000 r6:00000000 r5:80270d90 r4:85d09a40 [ 143.711524][ T3953] Rebooting in 86400 seconds..