last executing test programs: 4m35.249378452s ago: executing program 0 (id=24): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x805) 4m35.159570423s ago: executing program 0 (id=26): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/cgroup', 0x0, 0x0) dup3(r0, r1, 0x0) getsockopt$inet_buf(r1, 0x0, 0x8, &(0x7f00000000c0)=""/233, &(0x7f0000000200)=0xe9) 4m35.063304855s ago: executing program 0 (id=28): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x10ba40, 0x0) r1 = dup2(r0, r0) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000200)={0x4, r0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0x40045304, &(0x7f0000000240)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0xf}) 4m34.952637718s ago: executing program 0 (id=30): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, 0x0, 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x276) 4m34.817428645s ago: executing program 0 (id=31): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3, {0x0, 0x1}}, 0x18) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x400c041}, 0x2014) 4m34.428162814s ago: executing program 0 (id=32): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000140), 0x140, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x8044}, 0x80) 4m34.427930174s ago: executing program 32 (id=32): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000140), 0x140, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x8044}, 0x80) 2.711314731s ago: executing program 1 (id=2224): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd(0xffffffffffffffff, &(0x7f00000002c0), 0x8) r2 = dup3(r0, r1, 0x0) write$FUSE_BMAP(r2, 0x0, 0x0) 2.607507164s ago: executing program 1 (id=2225): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000600)={0x0, 0x27, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x84080}, 0x80) 1.187682021s ago: executing program 1 (id=2239): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000005f40)=[{{0x0, 0x0, 0x0}, 0x80000000}], 0x1, 0x40000021, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0xd9, @empty, 0xff}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x80, 0x0, 0x0) 611.697463ms ago: executing program 1 (id=2241): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x200041, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x24008800}, 0x4008800) 476.7929ms ago: executing program 1 (id=2247): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, 0x0, 0x0) 390.540331ms ago: executing program 1 (id=2244): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x24040000) 297.648823ms ago: executing program 2 (id=2246): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/cgroups\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 209.104784ms ago: executing program 2 (id=2248): r0 = openat$dlm_control(0xffffff9c, &(0x7f0000000740), 0x200000, 0x0) close$binfmt(r0) socket(0x1d, 0x2, 0x7) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x5451, 0x0) 138.702842ms ago: executing program 2 (id=2249): r0 = openat$vcsu(0xffffff9c, &(0x7f0000000000), 0x28802, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x5, 0x4) 66.374042ms ago: executing program 2 (id=2250): r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) write$rfkill(r0, 0x0, 0x0) 321.18µs ago: executing program 2 (id=2251): r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000), 0x208003, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x0, 0x3, 0x7}, 0x3}}, 0x18) 0s ago: executing program 2 (id=2252): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x940}, 0x18) dup3(r0, r1, 0x0) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfb, 0x80000}, 0xc) kernel console output (not intermixed with test programs): [ 47.956847][ T29] audit: type=1400 audit(47.880:56): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.959951][ T29] audit: type=1400 audit(47.890:57): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:15919' (ED25519) to the list of known hosts. [ 61.242780][ T29] audit: type=1400 audit(61.160:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.260912][ T29] audit: type=1400 audit(63.190:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.267525][ T29] audit: type=1400 audit(63.190:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.293675][ T29] audit: type=1400 audit(66.220:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.301067][ T29] audit: type=1400 audit(66.230:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.319463][ T3094] cgroup: Unknown subsys name 'net' [ 66.329027][ T29] audit: type=1400 audit(66.260:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.576446][ T3094] cgroup: Unknown subsys name 'cpuset' [ 66.583990][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 66.584920][ T3094] cgroup: Unknown subsys name 'rlimit' [ 66.788705][ T29] audit: type=1400 audit(66.720:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.792392][ T29] audit: type=1400 audit(66.720:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.794864][ T29] audit: type=1400 audit(66.720:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.969382][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.972150][ T29] audit: type=1400 audit(66.900:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.977339][ T29] audit: type=1400 audit(66.900:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.014756][ T29] audit: type=1400 audit(66.940:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.015239][ T29] audit: type=1400 audit(66.940:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.482116][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.429724][ T29] audit: type=1400 audit(74.360:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.505977][ T29] audit: type=1400 audit(74.430:72): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.507358][ T29] audit: type=1400 audit(74.430:73): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.519245][ T29] audit: type=1400 audit(74.450:74): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.554360][ T29] audit: type=1400 audit(74.480:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.554723][ T29] audit: type=1400 audit(74.480:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.601375][ T29] audit: type=1400 audit(74.530:77): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.036440][ T29] audit: type=1400 audit(74.960:78): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.999492][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.005794][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.160836][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.166224][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.840204][ T3099] hsr_slave_0: entered promiscuous mode [ 76.843084][ T3099] hsr_slave_1: entered promiscuous mode [ 76.913180][ T3100] hsr_slave_0: entered promiscuous mode [ 76.920938][ T3100] hsr_slave_1: entered promiscuous mode [ 76.924434][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 76.927012][ T3100] Cannot create hsr debugfs directory [ 77.400317][ T29] audit: type=1400 audit(77.330:79): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.403869][ T29] audit: type=1400 audit(77.330:80): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.411553][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 77.423524][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 77.432001][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 77.444026][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 77.561050][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.568889][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.576338][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.586138][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.162775][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.215345][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.892828][ T3099] veth0_vlan: entered promiscuous mode [ 80.899779][ T3100] veth0_vlan: entered promiscuous mode [ 80.929491][ T3100] veth1_vlan: entered promiscuous mode [ 80.935143][ T3099] veth1_vlan: entered promiscuous mode [ 81.029831][ T3100] veth0_macvtap: entered promiscuous mode [ 81.043407][ T3099] veth0_macvtap: entered promiscuous mode [ 81.060225][ T3099] veth1_macvtap: entered promiscuous mode [ 81.064578][ T3100] veth1_macvtap: entered promiscuous mode [ 81.183368][ T1296] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.184266][ T1296] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.184369][ T1296] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.184443][ T1296] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.225749][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.227309][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.229266][ T1296] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.230212][ T1296] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.313155][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 81.314799][ T29] audit: type=1400 audit(81.240:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 81.334613][ T29] audit: type=1400 audit(81.260:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.zVaCyA/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.349407][ T29] audit: type=1400 audit(81.270:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.359352][ T29] audit: type=1400 audit(81.280:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.zVaCyA/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 81.359708][ T29] audit: type=1400 audit(81.290:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.zVaCyA/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 81.411294][ T29] audit: type=1400 audit(81.340:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 81.420812][ T29] audit: type=1400 audit(81.350:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 81.425868][ T29] audit: type=1400 audit(81.350:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 81.433538][ T29] audit: type=1400 audit(81.360:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 81.436164][ T29] audit: type=1400 audit(81.360:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 81.492841][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.281801][ T3718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3718 comm=syz.0.6 [ 83.934301][ T1296] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.004953][ T1296] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.072799][ T1296] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.160193][ T1296] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.521426][ T1296] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 84.532355][ T1296] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 84.537230][ T1296] bond0 (unregistering): Released all slaves [ 84.649465][ T1296] hsr_slave_0: left promiscuous mode [ 84.658466][ T1296] hsr_slave_1: left promiscuous mode [ 84.679727][ T1296] veth1_macvtap: left promiscuous mode [ 84.680416][ T1296] veth0_macvtap: left promiscuous mode [ 84.680703][ T1296] veth1_vlan: left promiscuous mode [ 84.680929][ T1296] veth0_vlan: left promiscuous mode [ 87.272077][ T3774] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.284202][ T3774] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.446257][ T3976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3976 comm=syz.1.52 [ 88.544705][ T3774] hsr_slave_0: entered promiscuous mode [ 88.546234][ T3774] hsr_slave_1: entered promiscuous mode [ 89.014236][ T3774] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 89.035959][ T3774] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 89.047249][ T3774] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 89.072250][ T3774] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 89.280028][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 89.281430][ T29] audit: type=1400 audit(89.210:105): avc: denied { prog_load } for pid=4139 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.283355][ T29] audit: type=1400 audit(89.210:106): avc: denied { bpf } for pid=4139 comm="syz.1.65" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.285306][ T29] audit: type=1400 audit(89.210:107): avc: denied { perfmon } for pid=4139 comm="syz.1.65" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.666805][ T3774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.823808][ T3774] veth0_vlan: entered promiscuous mode [ 91.842151][ T3774] veth1_vlan: entered promiscuous mode [ 91.890461][ T3774] veth0_macvtap: entered promiscuous mode [ 91.899005][ T3774] veth1_macvtap: entered promiscuous mode [ 91.954231][ T1296] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.955452][ T1296] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.961931][ T1296] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.962307][ T1296] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.469841][ T29] audit: type=1400 audit(92.400:108): avc: denied { create } for pid=4205 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 92.959594][ T29] audit: type=1400 audit(92.890:109): avc: denied { create } for pid=4225 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.971033][ T29] audit: type=1400 audit(92.900:110): avc: denied { ioctl } for pid=4225 comm="syz.1.82" path="socket:[3717]" dev="sockfs" ino=3717 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.973977][ T29] audit: type=1400 audit(92.900:111): avc: denied { bind } for pid=4225 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.985655][ T29] audit: type=1400 audit(92.910:112): avc: denied { write } for pid=4225 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.090479][ T4230] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4230 comm=syz.2.83 [ 93.844011][ T4253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4253 comm=syz.1.96 [ 94.501559][ T4280] veth0_to_team: entered promiscuous mode [ 94.503123][ T4280] veth0_to_team: entered allmulticast mode [ 94.872017][ T4298] SELinux: syz.1.117 (4298) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 96.267419][ T29] audit: type=1400 audit(96.190:113): avc: denied { create } for pid=4320 comm="syz.2.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 96.274321][ T29] audit: type=1400 audit(96.200:114): avc: denied { setopt } for pid=4320 comm="syz.2.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 96.280172][ T29] audit: type=1400 audit(96.210:115): avc: denied { read } for pid=4320 comm="syz.2.127" path="socket:[4215]" dev="sockfs" ino=4215 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 96.471298][ T29] audit: type=1400 audit(96.400:116): avc: denied { create } for pid=4327 comm="syz.2.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 96.473735][ T29] audit: type=1400 audit(96.400:117): avc: denied { write } for pid=4327 comm="syz.2.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 96.477299][ T4328] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4328 comm=syz.2.130 [ 100.410657][ T29] audit: type=1400 audit(100.340:118): avc: denied { create } for pid=4374 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.410812][ T4375] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 100.418642][ T29] audit: type=1400 audit(100.340:119): avc: denied { bind } for pid=4374 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.420454][ T29] audit: type=1400 audit(100.340:120): avc: denied { name_bind } for pid=4374 comm="syz.1.151" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 100.422040][ T29] audit: type=1400 audit(100.340:121): avc: denied { node_bind } for pid=4374 comm="syz.1.151" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 100.424184][ T29] audit: type=1400 audit(100.350:122): avc: denied { write } for pid=4374 comm="syz.1.151" lport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 101.071406][ T4397] veth0_to_team: entered promiscuous mode [ 101.073667][ T4397] veth0_to_team: entered allmulticast mode [ 101.371252][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 101.374329][ T29] audit: type=1400 audit(101.300:124): avc: denied { prog_run } for pid=4407 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.971119][ T29] audit: type=1400 audit(103.900:125): avc: denied { create } for pid=4451 comm="syz.2.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 103.980949][ T29] audit: type=1400 audit(103.910:126): avc: denied { write } for pid=4451 comm="syz.2.184" path="socket:[4095]" dev="sockfs" ino=4095 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 104.173360][ T4456] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=4456 comm=syz.1.185 [ 113.055304][ T4535] Zero length message leads to an empty skb [ 113.543191][ T29] audit: type=1400 audit(113.470:127): avc: denied { map_create } for pid=4553 comm="syz.2.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 113.546050][ T29] audit: type=1400 audit(113.470:128): avc: denied { map_read map_write } for pid=4553 comm="syz.2.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 118.165477][ T29] audit: type=1400 audit(118.090:129): avc: denied { create } for pid=4621 comm="syz.1.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 118.170404][ T29] audit: type=1400 audit(118.100:130): avc: denied { write } for pid=4621 comm="syz.1.261" path="socket:[5376]" dev="sockfs" ino=5376 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 123.494510][ T29] audit: type=1400 audit(123.420:131): avc: denied { create } for pid=4682 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 123.501752][ T29] audit: type=1400 audit(123.430:132): avc: denied { write } for pid=4682 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 123.623230][ T4688] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4688 comm=syz.2.294 [ 123.720288][ T29] audit: type=1400 audit(123.650:133): avc: denied { write } for pid=4691 comm="syz.2.296" path="socket:[5461]" dev="sockfs" ino=5461 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 124.339926][ T4717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4717 comm=syz.2.308 [ 124.772187][ T4735] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4735 comm=syz.2.316 [ 125.370440][ T4754] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4754 comm=syz.2.326 [ 125.803595][ T4765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4765 comm=syz.2.331 [ 126.990420][ T4780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=4780 comm=syz.2.338 [ 129.959168][ T29] audit: type=1400 audit(129.890:134): avc: denied { ioctl } for pid=4799 comm="syz.2.347" path="socket:[6148]" dev="sockfs" ino=6148 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 130.186716][ T29] audit: type=1400 audit(130.110:135): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 131.315781][ T29] audit: type=1400 audit(131.240:136): avc: denied { audit_write } for pid=4835 comm="syz.1.364" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 131.823046][ T4848] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4848 comm=syz.1.370 [ 133.793428][ T4879] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4879 comm=syz.2.385 [ 134.123241][ T29] audit: type=1400 audit(134.050:137): avc: denied { mount } for pid=4886 comm="syz.2.389" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 134.180381][ T4890] netlink: 44 bytes leftover after parsing attributes in process `syz.2.390'. [ 134.245785][ T29] audit: type=1400 audit(134.170:138): avc: denied { ioctl } for pid=4891 comm="syz.2.391" path="socket:[5769]" dev="sockfs" ino=5769 ioctlcmd=0x5413 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 134.527977][ T4900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4900 comm=syz.2.395 [ 135.144955][ T4926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=4926 comm=syz.1.408 [ 136.680758][ T29] audit: type=1400 audit(136.610:139): avc: denied { ioctl } for pid=4952 comm="syz.1.420" path="socket:[6429]" dev="sockfs" ino=6429 ioctlcmd=0x640b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 136.844043][ T4957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4957 comm=syz.1.422 [ 141.791699][ T29] audit: type=1400 audit(141.720:140): avc: denied { connect } for pid=5009 comm="syz.2.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 142.883076][ T29] audit: type=1400 audit(142.810:141): avc: denied { getopt } for pid=5058 comm="syz.2.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.037449][ T5083] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5083 comm=syz.1.485 [ 144.558746][ T29] audit: type=1400 audit(144.480:142): avc: denied { associate } for pid=5095 comm="syz.1.491" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 144.691767][ T29] audit: type=1400 audit(144.620:143): avc: denied { getopt } for pid=5101 comm="syz.2.494" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 145.098699][ T29] audit: type=1400 audit(145.030:144): avc: denied { create } for pid=5119 comm="syz.2.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 145.106750][ T29] audit: type=1400 audit(145.030:145): avc: denied { lock } for pid=5119 comm="syz.2.503" path="socket:[7207]" dev="sockfs" ino=7207 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 146.014395][ T5156] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5156 comm=syz.2.521 [ 147.138326][ T29] audit: type=1400 audit(147.060:146): avc: denied { block_suspend } for pid=5177 comm="syz.1.532" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 147.799511][ T29] audit: type=1400 audit(147.730:147): avc: denied { remount } for pid=5197 comm="syz.1.540" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 149.405289][ T29] audit: type=1400 audit(149.330:148): avc: denied { setopt } for pid=5221 comm="syz.1.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 149.558194][ T5228] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=125 sclass=netlink_audit_socket pid=5228 comm=syz.2.554 [ 151.700953][ T5282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=5282 comm=syz.2.581 [ 151.899250][ T29] audit: type=1400 audit(151.830:149): avc: denied { getopt } for pid=5292 comm="syz.2.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 152.109781][ T5304] capability: warning: `syz.2.592' uses 32-bit capabilities (legacy support in use) [ 155.255551][ T5347] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5127 sclass=netlink_audit_socket pid=5347 comm=syz.2.613 [ 155.655559][ T5353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5353 comm=syz.2.616 [ 159.198532][ T5383] raw_sendmsg: syz.1.631 forgot to set AF_INET. Fix it! [ 160.650678][ T29] audit: type=1400 audit(160.580:150): avc: denied { create } for pid=5407 comm="syz.1.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 160.654944][ T29] audit: type=1400 audit(160.580:151): avc: denied { ioctl } for pid=5407 comm="syz.1.643" path="socket:[7716]" dev="sockfs" ino=7716 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 161.156252][ T5420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=5420 comm=syz.1.649 [ 161.650635][ T29] audit: type=1400 audit(161.580:152): avc: denied { ioctl } for pid=5431 comm="syz.1.655" path="socket:[7763]" dev="sockfs" ino=7763 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 163.163553][ T5481] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5481 comm=syz.2.679 [ 163.688831][ T29] audit: type=1400 audit(163.610:153): avc: denied { write } for pid=5488 comm="syz.1.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 164.629433][ T29] audit: type=1400 audit(164.560:154): avc: denied { setopt } for pid=5511 comm="syz.1.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 166.143387][ T5552] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5121 sclass=netlink_audit_socket pid=5552 comm=syz.1.714 [ 166.851297][ T5570] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5570 comm=syz.1.723 [ 167.008082][ T29] audit: type=1400 audit(166.930:155): avc: denied { allowed } for pid=5573 comm="syz.1.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 167.023124][ T29] audit: type=1400 audit(166.950:156): avc: denied { create } for pid=5573 comm="syz.1.725" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 172.409810][ T5616] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5616 comm=syz.2.744 [ 176.392563][ T5635] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5635 comm=syz.1.757 [ 179.421919][ T5654] netlink: 44 bytes leftover after parsing attributes in process `syz.1.762'. [ 179.817016][ T5664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5664 comm=syz.1.766 [ 180.422330][ T5682] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=5682 comm=syz.2.779 [ 182.424582][ T5702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5702 comm=syz.2.783 [ 190.432674][ T5801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=5801 comm=syz.2.837 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 200.649811][ T5912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=5912 comm=syz.1.888 [ 200.765011][ T5915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5915 comm=syz.2.889 [ 201.219843][ T29] audit: type=1400 audit(201.150:157): avc: denied { create } for pid=5932 comm="syz.1.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 201.232081][ T29] audit: type=1400 audit(201.160:158): avc: denied { write } for pid=5932 comm="syz.1.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 201.340171][ T5939] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5939 comm=syz.1.901 [ 201.509577][ T29] audit: type=1400 audit(201.440:159): avc: denied { setopt } for pid=5942 comm="syz.1.903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 203.936283][ T29] audit: type=1400 audit(203.860:160): avc: denied { execute } for pid=5950 comm="syz.2.906" name="file0" dev="tmpfs" ino=2195 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 204.195101][ T5961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=5961 comm=syz.1.910 [ 209.477431][ T6002] input: syz0 as /devices/virtual/input/input4 [ 211.004330][ T6031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6031 comm=syz.2.944 [ 211.849166][ T6044] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6044 comm=syz.2.949 [ 213.957235][ T6073] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6073 comm=syz.1.963 [ 216.155332][ T6115] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6115 comm=syz.1.985 [ 216.654052][ T6129] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6129 comm=syz.2.988 [ 222.872669][ T29] audit: type=1400 audit(222.800:161): avc: denied { write } for pid=6212 comm="syz.2.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 227.366449][ T6254] capability: warning: `syz.2.1050' uses deprecated v2 capabilities in a way that may be insecure [ 231.691182][ T6281] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5121 sclass=netlink_audit_socket pid=6281 comm=syz.2.1063 [ 233.033082][ T6329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6329 comm=syz.1.1090 [ 237.349441][ T6344] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6344 comm=syz.2.1094 [ 239.829713][ T6450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6450 comm=syz.1.1146 [ 240.911370][ T29] audit: type=1400 audit(240.840:162): avc: denied { ioctl } for pid=6490 comm="syz.2.1166" path="net:[4026532655]" dev="nsfs" ino=4026532655 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 243.609215][ T29] audit: type=1400 audit(243.540:163): avc: denied { map } for pid=6527 comm="syz.2.1184" path="socket:[12425]" dev="sockfs" ino=12425 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 244.233350][ T6554] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1196'. [ 244.753828][ T6573] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1202'. [ 247.638114][ T29] audit: type=1400 audit(247.560:164): avc: denied { name_bind } for pid=6626 comm="syz.1.1230" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 247.639655][ T29] audit: type=1400 audit(247.570:165): avc: denied { node_bind } for pid=6626 comm="syz.1.1230" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 252.260003][ T29] audit: type=1400 audit(252.190:166): avc: denied { create } for pid=6673 comm="syz.1.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 252.266246][ T29] audit: type=1400 audit(252.190:167): avc: denied { write } for pid=6673 comm="syz.1.1253" path="socket:[12676]" dev="sockfs" ino=12676 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 257.618613][ T29] audit: type=1400 audit(257.540:168): avc: denied { remount } for pid=6797 comm="syz.2.1314" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 257.964895][ T1288] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.064772][ T1288] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.151066][ T1288] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.231410][ T1288] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.606968][ T1288] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 258.628593][ T1288] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 258.633217][ T1288] bond0 (unregistering): Released all slaves [ 258.723495][ T1288] hsr_slave_0: left promiscuous mode [ 258.725818][ T1288] hsr_slave_1: left promiscuous mode [ 258.751446][ T1288] veth1_macvtap: left promiscuous mode [ 258.751824][ T1288] veth0_macvtap: left promiscuous mode [ 258.754567][ T1288] veth1_vlan: left promiscuous mode [ 258.755010][ T1288] veth0_vlan: left promiscuous mode [ 260.920558][ T6802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 260.927578][ T6802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 261.769797][ T6802] hsr_slave_0: entered promiscuous mode [ 261.771251][ T6802] hsr_slave_1: entered promiscuous mode [ 262.394268][ T6802] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 262.416739][ T6802] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 262.433850][ T6802] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 262.455945][ T6802] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 262.472151][ T7114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=7114 comm=syz.1.1318 [ 262.943415][ T29] audit: type=1400 audit(262.870:169): avc: denied { name_bind } for pid=7130 comm="syz.1.1321" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 262.947131][ T29] audit: type=1400 audit(262.870:170): avc: denied { setopt } for pid=7130 comm="syz.1.1321" laddr=172.20.20.170 lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 263.391909][ T6802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.052394][ T6802] veth0_vlan: entered promiscuous mode [ 266.072809][ T6802] veth1_vlan: entered promiscuous mode [ 266.144753][ T6802] veth0_macvtap: entered promiscuous mode [ 266.156078][ T6802] veth1_macvtap: entered promiscuous mode [ 266.242219][ T1288] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.242652][ T1288] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.245526][ T1288] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.245933][ T1288] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.885925][ T1288] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 266.960824][ T1288] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 267.038478][ T1288] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 267.106137][ T1288] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 267.340730][ T29] audit: type=1400 audit(267.270:171): avc: denied { connect } for pid=7226 comm="syz.2.1328" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 267.416406][ T1288] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 267.426651][ T1288] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 267.431427][ T1288] bond0 (unregistering): Released all slaves [ 267.529415][ T1288] hsr_slave_0: left promiscuous mode [ 267.531433][ T1288] hsr_slave_1: left promiscuous mode [ 267.539405][ T1288] veth1_macvtap: left promiscuous mode [ 267.539634][ T1288] veth0_macvtap: left promiscuous mode [ 267.540008][ T1288] veth1_vlan: left promiscuous mode [ 267.540128][ T1288] veth0_vlan: left promiscuous mode [ 269.495883][ T7209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 269.512269][ T7209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 270.251983][ T7209] hsr_slave_0: entered promiscuous mode [ 270.253020][ T7209] hsr_slave_1: entered promiscuous mode [ 270.255817][ T7209] debugfs: 'hsr0' already exists in 'hsr' [ 270.257196][ T7209] Cannot create hsr debugfs directory [ 270.790506][ T7209] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 270.794979][ T7209] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 270.800074][ T7209] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 270.806498][ T7209] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 271.681319][ T7209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.162024][ T7209] veth0_vlan: entered promiscuous mode [ 274.191432][ T7209] veth1_vlan: entered promiscuous mode [ 274.272804][ T7209] veth0_macvtap: entered promiscuous mode [ 274.296953][ T7209] veth1_macvtap: entered promiscuous mode [ 274.374770][ T1296] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.375439][ T1296] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.376259][ T1296] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.377408][ T1296] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.194195][ T7651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7651 comm=syz.2.1353 [ 276.330757][ T29] audit: type=1400 audit(276.260:172): avc: denied { mounton } for pid=7654 comm="syz.2.1355" path="/19/file0" dev="tmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 276.874991][ T7682] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7682 comm=syz.1.1367 [ 278.601151][ T7745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=7745 comm=syz.2.1398 [ 278.965150][ T7759] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=7759 comm=syz.1.1401 [ 285.496580][ T7831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7831 comm=syz.1.1435 [ 287.974378][ T7910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7910 comm=syz.2.1471 [ 288.063025][ T7912] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7912 comm=syz.2.1472 [ 292.071805][ T8023] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8023 comm=syz.1.1527 [ 292.155087][ T8027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8027 comm=syz.2.1530 [ 292.886299][ T8059] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 293.090180][ T8069] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1542 sclass=netlink_audit_socket pid=8069 comm=syz.2.1550 [ 294.165070][ T8111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8111 comm=syz.1.1571 [ 294.210613][ T29] audit: type=1400 audit(294.140:173): avc: denied { ioctl } for pid=8112 comm="syz.2.1572" path="socket:[15318]" dev="sockfs" ino=15318 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 294.925398][ T8149] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8149 comm=syz.2.1590 [ 295.935060][ T8174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8174 comm=syz.1.1602 [ 296.631432][ T29] audit: type=1400 audit(296.560:174): avc: denied { read } for pid=8201 comm="syz.2.1617" path="socket:[16227]" dev="sockfs" ino=16227 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 297.109947][ T29] audit: type=1400 audit(297.040:175): avc: denied { ioctl } for pid=8218 comm="syz.1.1625" path="socket:[16255]" dev="sockfs" ino=16255 ioctlcmd=0x3b80 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 297.835023][ T29] audit: type=1400 audit(297.760:176): avc: denied { create } for pid=8239 comm="syz.1.1633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 297.841027][ T29] audit: type=1400 audit(297.770:177): avc: denied { write } for pid=8239 comm="syz.1.1633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 302.231839][ T29] audit: type=1400 audit(302.160:178): avc: denied { bind } for pid=8358 comm="syz.1.1691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 304.835961][ T8436] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=512 sclass=netlink_audit_socket pid=8436 comm=syz.2.1729 [ 309.132638][ T8490] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1547 sclass=netlink_audit_socket pid=8490 comm=syz.2.1754 [ 311.377237][ T8522] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8522 comm=syz.2.1769 [ 312.064155][ T29] audit: type=1400 audit(311.990:179): avc: denied { setcheckreqprot } for pid=8537 comm="syz.2.1777" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 312.715515][ T8555] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8555 comm=syz.1.1785 [ 312.803759][ T29] audit: type=1400 audit(312.730:180): avc: denied { ioctl } for pid=8556 comm="syz.1.1786" path="socket:[17716]" dev="sockfs" ino=17716 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 315.656475][ T29] audit: type=1400 audit(315.580:181): avc: denied { read } for pid=8627 comm="syz.2.1820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.782181][ T8634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=8634 comm=syz.1.1824 [ 316.549966][ T8652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8652 comm=syz.1.1833 [ 317.977498][ T8681] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8681 comm=syz.1.1847 [ 323.772172][ T8786] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8786 comm=syz.2.1895 [ 326.441101][ T8831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=8831 comm=syz.2.1917 [ 327.306351][ T8851] netlink: 192 bytes leftover after parsing attributes in process `syz.2.1927'. [ 328.174912][ T8867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8867 comm=syz.1.1935 [ 331.031164][ T8881] netlink: 192 bytes leftover after parsing attributes in process `syz.1.1940'. [ 341.474515][ T9047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9047 comm=syz.1.2021 [ 341.794623][ T9057] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9057 comm=syz.2.2030 [ 341.905233][ T9061] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9061 comm=syz.1.2028 [ 345.503723][ T9179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9179 comm=syz.1.2087 [ 345.563762][ T9181] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9181 comm=syz.2.2088 [ 345.630370][ T9184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9184 comm=syz.1.2094 [ 345.792861][ T9191] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9191 comm=syz.1.2095 [ 348.087201][ T9240] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1542 sclass=netlink_audit_socket pid=9240 comm=syz.1.2116 [ 348.284288][ T9248] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1542 sclass=netlink_audit_socket pid=9248 comm=syz.2.2125 [ 352.534655][ T9327] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9327 comm=syz.2.2160 [ 352.666469][ T9332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9332 comm=syz.2.2167 [ 792.278051][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 792.278298][ C0] Modules linked in: [ 792.278901][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 792.279075][ C0] Hardware name: ARM-Versatile Express [ 792.279268][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 792.279764][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 792.279802][ C0] pc : [<81abbd3c>] lr : [<80346ef4>] psr: 60000113 [ 792.279834][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 792.279858][ C0] r10: 00000001 r9 : 00000053 r8 : d07ae300 [ 792.279881][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 792.279905][ C0] r3 : 0000b765 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 792.279978][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 792.280030][ C0] Control: 30c5387d Table: 85d42900 DAC: fffffffd [ 792.280094][ C0] Call trace: [ 792.280280][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 792.280497][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 792.280643][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 792.280673][ C0] r4:830bf380 [ 792.280686][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 792.280748][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 792.280760][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 792.280797][ C0] r4:82804084 [ 792.280806][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 792.280839][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 792.280878][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 792.280890][ C0] r4:8281b500 [ 792.280898][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 792.280931][ C0] r5:8247f0cc r4:826c3a9c [ 792.280941][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 792.280973][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.281059][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 792.281176][ C0] 1dc0: 00000001 00000000 [ 792.281206][ C0] 1de0: 00006cda 00006cd8 840b3168 00000004 00000001 840b3168 83ee8288 840b3040 [ 792.281226][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 792.281271][ C0] r9:8281b500 r8:83ee8288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 792.281283][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 792.281334][ C0] r5:00000004 r4:840b3040 [ 792.281355][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 792.281431][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84104f28 [ 792.281443][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.281474][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.281508][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838cc0d8 r5:00000001 [ 792.281518][ C0] r4:84104f28 [ 792.281526][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 792.281552][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 792.281582][ C0] r5:000000ff r4:845d8224 [ 792.281590][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 792.281620][ C0] r5:000000ff r4:845d8224 [ 792.281629][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 792.281659][ C0] r5:000000ff r4:845d8224 [ 792.281667][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 792.281700][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 792.281708][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.281754][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 792.281763][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.281818][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.281878][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 792.281890][ C0] r4:000000ed [ 792.281899][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 792.281936][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 792.282007][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 792.282459][ C0] Sending NMI from CPU 0 to CPUs 1: [ 792.283363][ C1] NMI backtrace for cpu 1 [ 792.283615][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 792.283710][ C1] Hardware name: ARM-Versatile Express [ 792.283755][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 792.283847][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 792.283891][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 792.283934][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 792.283979][ C1] r10: 81c05450 r9 : 840b3040 r8 : 83ee8288 [ 792.284127][ C1] r7 : 840b3168 r6 : 00000001 r5 : 00000001 r4 : 840b3168 [ 792.284173][ C1] r3 : 00006cd8 r2 : 00006cd9 r1 : 00000000 r0 : 00000001 [ 792.284214][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 792.284274][ C1] Control: 30c5387d Table: 84d156c0 DAC: 00000000 [ 792.284302][ C1] Call trace: frame pointer underflow [ 792.284426][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 792.284565][ C1] r5:00000001 r4:840b3040 [ 792.284598][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 792.284685][ C1] r7:00000001 r6:00000000 r5:00000000 r4:84104f00 [ 792.284714][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.284780][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.284864][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:0000176d r6:00000007 r5:00000001 [ 792.284898][ C1] r4:84104f00 [ 792.284924][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 792.284998][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 792.285068][ C1] r5:845d8044 r4:845d8044 [ 792.285093][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 792.285160][ C1] r5:845d8044 r4:84fc408c [ 792.285186][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 792.285257][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 792.285344][ C1] r7:0000176d r6:809cd3b4 r5:84fc408c r4:83216000 [ 792.285370][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 792.285453][ C1] r9:df805ebc r8:0000176d r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:84fc408c [ 792.285480][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 792.285604][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 792.285638][ C1] r4:dddd9f00 [ 792.285659][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 792.285742][ C1] r4:82804084 [ 792.285768][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 792.285839][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 792.285921][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 792.285962][ C1] r4:83216000 [ 792.285983][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 792.286056][ C1] r5:8247f0cc r4:826c3a9c [ 792.286093][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 792.286174][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 792.286268][ C1] r9:83216000 r8:83ee8288 r7:df865e3c r6:ffffffff r5:20000013 r4:80235398 [ 792.286298][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 792.286370][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 792.286437][ C1] 5e00: e02a7008 00000008 00006cd8 809c820c e02a7008 00000008 [ 792.286495][ C1] 5e20: 00000001 840b3168 83ee8288 840b3040 00000000 df865e6c df865e70 df865e58 [ 792.286525][ C1] 5e40: 809c8228 80235398 20000013 ffffffff [ 792.286546][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 792.286626][ C1] r5:00000008 r4:840b3040 [ 792.286653][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 792.286739][ C1] r7:00000001 r6:00000000 r5:00000003 r4:84104f3c [ 792.286765][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.286829][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.286908][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838cc118 r5:00000001 [ 792.286971][ C1] r4:84104f3c [ 792.286991][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 792.287062][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 792.287153][ C1] r5:000000ff r4:845d8314 [ 792.287182][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 792.287249][ C1] r5:000000ff r4:845d8314 [ 792.287274][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 792.287350][ C1] r5:000000ff r4:845d8314 [ 792.287391][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 792.287478][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 792.287506][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.287592][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 792.287619][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.287697][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.287796][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 792.287838][ C1] r4:00000092 [ 792.287858][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 792.287959][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 792.288063][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 792.289500][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 792.313335][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 792.313696][ C0] Tainted: [L]=SOFTLOCKUP [ 792.313821][ C0] Hardware name: ARM-Versatile Express [ 792.313947][ C0] Call trace: [ 792.314118][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 792.314387][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 792.314555][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 792.314809][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 792.315004][ C0] r5:00000000 r4:82a7bd14 [ 792.315161][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 792.315375][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 792.315626][ C0] r7:82ac27f8 [ 792.315733][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 792.315930][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 792.316142][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 792.316455][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 792.316784][ C0] r4:dddc75d8 [ 792.316873][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 792.317165][ C0] r10:73689c10 r9:dddc7180 r8:dddc7130 r7:000000b8 r6:00000003 r5:20000193 [ 792.317416][ C0] r4:dddc7000 [ 792.317546][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 792.317776][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 792.317962][ C0] r4:8309de40 [ 792.318047][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 792.318306][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 792.318538][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 792.318747][ C0] r4:8280cc44 [ 792.318826][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 792.319026][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 792.319243][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 792.319477][ C0] r7:82801b90 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 792.319610][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.319829][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 792.319954][ C0] 1b80: ddddb488 830bf3b0 00000103 0000b765 [ 792.320151][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 d07ae300 00000053 00000001 82801bec [ 792.320320][ C0] 1bc0: 82801bf0 82801be0 80346ef4 81abbd3c 60000113 ffffffff [ 792.320482][ C0] r9:8281b500 r8:d07ae300 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abbd3c [ 792.320698][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 792.320926][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 792.321159][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 792.321388][ C0] r4:830bf380 [ 792.321481][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 792.321698][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 792.321911][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 792.322124][ C0] r4:82804084 [ 792.322200][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 792.322390][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 792.322597][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 792.322765][ C0] r4:8281b500 [ 792.322859][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 792.323099][ C0] r5:8247f0cc r4:826c3a9c [ 792.323249][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 792.323525][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.323782][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 792.323909][ C0] 1dc0: 00000001 00000000 [ 792.324099][ C0] 1de0: 00006cda 00006cd8 840b3168 00000004 00000001 840b3168 83ee8288 840b3040 [ 792.324368][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 792.324697][ C0] r9:8281b500 r8:83ee8288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 792.324873][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 792.325084][ C0] r5:00000004 r4:840b3040 [ 792.325176][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 792.325399][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84104f28 [ 792.325626][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.325851][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.326115][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838cc0d8 r5:00000001 [ 792.326347][ C0] r4:84104f28 [ 792.326481][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 792.326707][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 792.327020][ C0] r5:000000ff r4:845d8224 [ 792.327112][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 792.327332][ C0] r5:000000ff r4:845d8224 [ 792.327438][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 792.327737][ C0] r5:000000ff r4:845d8224 [ 792.327844][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 792.328061][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 792.328197][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.328433][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 792.328657][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.328869][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.329135][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 792.329372][ C0] r4:000000ed [ 792.329503][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 792.329737][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 792.329951][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 792.332337][ C0] Rebooting in 86400 seconds..