last executing test programs: 972.513557ms ago: executing program 0 (id=441): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x5452, &(0x7f00000020c0)={0x0, 0x0, 0x400, 0x0, 0xffffffffffffffff}) write$tcp_congestion(r1, 0x0, 0x0) 892.065367ms ago: executing program 1 (id=442): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, 0x0, 0x20000000) 819.462236ms ago: executing program 0 (id=443): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}, 0x1, 0x0, 0x0, 0xc8c1}, 0x4000080) 671.683584ms ago: executing program 1 (id=444): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 661.744686ms ago: executing program 0 (id=448): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, 0x0, 0x20000000) 493.417057ms ago: executing program 1 (id=445): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = dup(r0) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 493.251947ms ago: executing program 0 (id=446): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) getpgid(r1) 311.93805ms ago: executing program 1 (id=447): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x5452, &(0x7f00000020c0)={0x0, 0x0, 0x400, 0x0, 0xffffffffffffffff}) write$tcp_congestion(r1, 0x0, 0x0) 153.274381ms ago: executing program 1 (id=449): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}, 0x1, 0x0, 0x0, 0xc8c1}, 0x4000080) 143.836792ms ago: executing program 0 (id=453): r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x40805) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) 158.93µs ago: executing program 0 (id=450): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 0s ago: executing program 1 (id=451): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='cmdline\x00') exit(0x0) pread64(r0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 47.384791][ T29] audit: type=1400 audit(47.300:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.386848][ T29] audit: type=1400 audit(47.310:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:13186' (ED25519) to the list of known hosts. [ 62.088918][ T29] audit: type=1400 audit(62.010:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.337881][ T29] audit: type=1400 audit(64.260:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.365639][ T29] audit: type=1400 audit(64.290:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.073528][ T29] audit: type=1400 audit(67.990:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.081064][ T29] audit: type=1400 audit(68.000:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.099496][ T3090] cgroup: Unknown subsys name 'net' [ 68.107911][ T29] audit: type=1400 audit(68.030:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.261841][ T3090] cgroup: Unknown subsys name 'cpuset' [ 68.269416][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 68.270328][ T3090] cgroup: Unknown subsys name 'rlimit' [ 68.455517][ T29] audit: type=1400 audit(68.380:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.457132][ T29] audit: type=1400 audit(68.380:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.459879][ T29] audit: type=1400 audit(68.380:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.582190][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.583898][ T29] audit: type=1400 audit(68.500:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.589178][ T29] audit: type=1400 audit(68.510:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.620422][ T29] audit: type=1400 audit(68.540:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.620886][ T29] audit: type=1400 audit(68.540:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.959783][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.779513][ T29] audit: type=1400 audit(77.700:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.851986][ T29] audit: type=1400 audit(77.770:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.852455][ T29] audit: type=1400 audit(77.770:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.867981][ T29] audit: type=1400 audit(77.790:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.900710][ T29] audit: type=1400 audit(77.820:75): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.902727][ T29] audit: type=1400 audit(77.820:76): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.971672][ T29] audit: type=1400 audit(77.890:77): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.669046][ T29] audit: type=1400 audit(78.590:78): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.606613][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.612096][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.713873][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.723524][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.370300][ T3095] hsr_slave_0: entered promiscuous mode [ 80.373774][ T3095] hsr_slave_1: entered promiscuous mode [ 80.572571][ T29] audit: type=1400 audit(80.490:79): avc: denied { create } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.576826][ T29] audit: type=1400 audit(80.500:80): avc: denied { write } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.580873][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.602720][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.610480][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.623158][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.641539][ T3096] hsr_slave_0: entered promiscuous mode [ 80.643187][ T3096] hsr_slave_1: entered promiscuous mode [ 80.647460][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 80.648346][ T3096] Cannot create hsr debugfs directory [ 81.020368][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.031051][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.040305][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.050264][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.430364][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.746500][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.219773][ T3095] veth0_vlan: entered promiscuous mode [ 84.250344][ T3095] veth1_vlan: entered promiscuous mode [ 84.316034][ T3095] veth0_macvtap: entered promiscuous mode [ 84.327296][ T3095] veth1_macvtap: entered promiscuous mode [ 84.411481][ T38] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.412308][ T38] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.412401][ T38] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.412462][ T38] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.549181][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.553125][ T29] audit: type=1400 audit(84.470:82): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.569160][ T29] audit: type=1400 audit(84.490:83): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.WenChy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.572167][ T3096] veth0_vlan: entered promiscuous mode [ 84.577475][ T29] audit: type=1400 audit(84.500:84): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.597643][ T29] audit: type=1400 audit(84.520:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.WenChy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.602340][ T29] audit: type=1400 audit(84.520:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.WenChy/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2202 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.613128][ T3096] veth1_vlan: entered promiscuous mode [ 84.623203][ T29] audit: type=1400 audit(84.540:87): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.640596][ T29] audit: type=1400 audit(84.550:88): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.641015][ T29] audit: type=1400 audit(84.550:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=2203 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.642594][ T29] audit: type=1400 audit(84.560:90): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.648426][ T29] audit: type=1400 audit(84.570:91): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.712464][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.731071][ T3096] veth0_macvtap: entered promiscuous mode [ 84.755597][ T3096] veth1_macvtap: entered promiscuous mode [ 84.867583][ T38] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.869747][ T38] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.871499][ T38] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.871798][ T38] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.582221][ T3727] capability: warning: `syz.1.11' uses deprecated v2 capabilities in a way that may be insecure [ 88.701524][ T3730] SELinux: Context system_u:object_r:ksm_device_t:s0 is not valid (left unmapped). [ 91.806431][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 91.806793][ T29] audit: type=1400 audit(91.720:104): avc: denied { mount } for pid=3784 comm="syz.0.39" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 91.807035][ T29] audit: type=1400 audit(91.730:105): avc: denied { remount } for pid=3784 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 91.824103][ T29] audit: type=1400 audit(91.740:106): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 92.139778][ T29] audit: type=1400 audit(92.060:107): avc: denied { write } for pid=3792 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 92.649251][ T29] audit: type=1400 audit(92.570:108): avc: denied { create } for pid=3814 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 92.662513][ T29] audit: type=1400 audit(92.580:109): avc: denied { write } for pid=3814 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 92.939847][ T29] audit: type=1400 audit(92.860:110): avc: denied { create } for pid=3824 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 92.953437][ T29] audit: type=1400 audit(92.870:111): avc: denied { ioctl } for pid=3824 comm="syz.1.59" path="socket:[2424]" dev="sockfs" ino=2424 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.327211][ T29] audit: type=1400 audit(93.250:112): avc: denied { read append } for pid=3842 comm="syz.1.68" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ksm_device_t:s0" [ 93.327600][ T29] audit: type=1400 audit(93.250:113): avc: denied { open } for pid=3842 comm="syz.1.68" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ksm_device_t:s0" [ 93.438034][ T3849] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 94.413850][ T3891] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3891 comm=syz.1.91 [ 96.435575][ T3951] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3951 comm=syz.0.120 [ 96.732340][ T3964] capability: warning: `syz.1.126' uses 32-bit capabilities (legacy support in use) [ 97.570057][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 97.572548][ T29] audit: type=1400 audit(97.490:128): avc: denied { read write } for pid=3997 comm="syz.0.145" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 97.580615][ T29] audit: type=1400 audit(97.490:129): avc: denied { open } for pid=3997 comm="syz.0.145" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 97.596764][ T29] audit: type=1400 audit(97.520:130): avc: denied { ioctl } for pid=3997 comm="syz.0.145" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x4c08 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 97.803400][ T29] audit: type=1400 audit(97.720:131): avc: denied { write } for pid=4006 comm="syz.1.149" path="socket:[3717]" dev="sockfs" ino=3717 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 97.943547][ T29] audit: type=1400 audit(97.860:132): avc: denied { create } for pid=4011 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.950984][ T29] audit: type=1400 audit(97.870:133): avc: denied { getopt } for pid=4011 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.026130][ T29] audit: type=1400 audit(97.950:134): avc: denied { create } for pid=4013 comm="syz.0.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 98.035416][ T29] audit: type=1400 audit(97.950:135): avc: denied { write } for pid=4013 comm="syz.0.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 98.213740][ T29] audit: type=1400 audit(98.130:136): avc: denied { create } for pid=4022 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 98.880405][ T4054] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pid=4054 comm=syz.1.172 [ 99.042544][ T29] audit: type=1400 audit(98.960:137): avc: denied { ioctl } for pid=4059 comm="syz.1.175" path="socket:[2864]" dev="sockfs" ino=2864 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 99.934916][ T4101] mmap: syz.0.194 (4101) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 99.937187][ T4101] binder_alloc: binder_alloc_mmap_handler: 4099 20e21000-20e24000 already mapped failed -16 [ 103.130482][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 103.131606][ T29] audit: type=1400 audit(103.050:146): avc: denied { setopt } for pid=4154 comm="syz.0.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 103.140638][ T29] audit: type=1400 audit(103.060:147): avc: denied { getopt } for pid=4154 comm="syz.0.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 106.402584][ T29] audit: type=1400 audit(106.320:148): avc: denied { write } for pid=4205 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.576260][ T29] audit: type=1400 audit(106.500:149): avc: denied { ioctl } for pid=4209 comm="syz.0.246" path="socket:[4074]" dev="sockfs" ino=4074 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 106.977361][ T29] audit: type=1400 audit(106.900:150): avc: denied { ioctl } for pid=4219 comm="syz.0.251" path="socket:[5122]" dev="sockfs" ino=5122 ioctlcmd=0x89fa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 107.059313][ T29] audit: type=1400 audit(106.980:151): avc: denied { create } for pid=4221 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 107.066164][ T29] audit: type=1400 audit(106.980:152): avc: denied { write } for pid=4221 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 108.069719][ T29] audit: type=1400 audit(107.990:153): avc: denied { create } for pid=4259 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 108.200539][ T29] audit: type=1400 audit(108.120:154): avc: denied { write } for pid=4264 comm="syz.1.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 108.599355][ T29] audit: type=1400 audit(108.520:155): avc: denied { perfmon } for pid=4275 comm="syz.0.279" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 108.602519][ T29] audit: type=1400 audit(108.520:156): avc: denied { map_read map_write } for pid=4275 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 110.847966][ T29] audit: type=1400 audit(110.770:157): avc: denied { prog_load } for pid=4306 comm="syz.1.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 110.849560][ T29] audit: type=1400 audit(110.770:158): avc: denied { bpf } for pid=4306 comm="syz.1.294" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 110.879989][ T29] audit: type=1400 audit(110.800:159): avc: denied { prog_run } for pid=4306 comm="syz.1.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 114.922620][ T4333] Zero length message leads to an empty skb [ 115.971876][ T4347] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4347 comm=syz.1.314 [ 125.183213][ T4499] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=4499 comm=syz.0.388 [ 125.629460][ T4515] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=4515 comm=syz.1.394 [ 129.394892][ T29] audit: type=1400 audit(129.310:160): avc: denied { create } for pid=4561 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 594.264805][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 594.265064][ C0] Modules linked in: [ 594.266128][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 594.266403][ C0] Tainted: [L]=SOFTLOCKUP [ 594.266448][ C0] Hardware name: ARM-Versatile Express [ 594.266667][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 594.267400][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 594.267466][ C0] pc : [<81abbd3c>] lr : [<80346ef4>] psr: 60000113 [ 594.267522][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 594.267564][ C0] r10: 00000001 r9 : 0000001f r8 : 5fb9d380 [ 594.267602][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 594.267645][ C0] r3 : 0000395c r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 594.267756][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 594.267834][ C0] Control: 30c5387d Table: 84cb5ec0 DAC: fffffffd [ 594.267930][ C0] Call trace: [ 594.268192][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 594.268538][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 594.268664][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.268712][ C0] r4:830bf380 [ 594.268740][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 594.268822][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 594.268847][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 594.268918][ C0] r4:82804084 [ 594.268938][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.269005][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.269085][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 594.269109][ C0] r4:8281b500 [ 594.269126][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.269194][ C0] r5:8247f0cc r4:826c3a9c [ 594.269213][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 594.269283][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.269631][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.269805][ C0] 1dc0: 00000001 00000000 [ 594.269864][ C0] 1de0: 00007e2a 00007e28 83fd9168 00000004 00000001 83fd9168 84033288 83fd9040 [ 594.269917][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 594.270015][ C0] r9:8281b500 r8:84033288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 594.270043][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 594.270169][ C0] r5:00000004 r4:83fd9040 [ 594.270191][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 594.270291][ C0] r7:00000001 r6:00000000 r5:00000002 r4:838bf6e8 [ 594.270316][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.270380][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.270466][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833da3d8 r5:00000001 [ 594.270502][ C0] r4:838bf6e8 [ 594.270524][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 594.270580][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 594.270643][ C0] r5:000000ff r4:832ff224 [ 594.270675][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 594.270743][ C0] r5:000000ff r4:832ff224 [ 594.270762][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 594.270823][ C0] r5:000000ff r4:832ff224 [ 594.270843][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 594.270911][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.270930][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.271006][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.271028][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.271127][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.271212][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 594.271239][ C0] r4:000000ed [ 594.271258][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 594.271331][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.271440][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.272151][ C0] Sending NMI from CPU 0 to CPUs 1: [ 594.272908][ C1] NMI backtrace for cpu 1 [ 594.273143][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 594.273227][ C1] Tainted: [L]=SOFTLOCKUP [ 594.273249][ C1] Hardware name: ARM-Versatile Express [ 594.273277][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 594.273358][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.273395][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 594.273422][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.273447][ C1] r10: 81c05450 r9 : 83fd9040 r8 : 84033288 [ 594.273473][ C1] r7 : 83fd9168 r6 : 00000001 r5 : 00000001 r4 : 83fd9168 [ 594.273500][ C1] r3 : 00007e28 r2 : 00007e29 r1 : 00000000 r0 : 00000001 [ 594.273528][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.273571][ C1] Control: 30c5387d Table: 8531b280 DAC: 00000000 [ 594.273593][ C1] Call trace: frame pointer underflow [ 594.273695][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 594.273786][ C1] r5:00000001 r4:83fd9040 [ 594.273809][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 594.273887][ C1] r7:00000001 r6:00000000 r5:00000000 r4:838bf6c0 [ 594.273908][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.273968][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.274041][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffbf72 r6:00000007 r5:00000001 [ 594.274063][ C1] r4:838bf6c0 [ 594.274081][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 594.274134][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 594.274203][ C1] r5:832ff044 r4:832ff044 [ 594.274222][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 594.274286][ C1] r5:832ff044 r4:838db38c [ 594.274305][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 594.274362][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 594.274432][ C1] r7:ffffbf72 r6:809cd3b4 r5:838db38c r4:83216000 [ 594.274451][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 594.274523][ C1] r9:df805ebc r8:ffffbf72 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:838db38c [ 594.274556][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 594.274639][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.274663][ C1] r4:dddd9f00 [ 594.274680][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 594.274739][ C1] r4:82804084 [ 594.274768][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.274832][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.274909][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 594.274932][ C1] r4:83216000 [ 594.274951][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.275018][ C1] r5:8247f0cc r4:826c3a9c [ 594.275035][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 594.275124][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 594.275213][ C1] r9:83216000 r8:84033288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 594.275237][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.275296][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.275344][ C1] 5e00: e00b6008 00000008 00007e28 00000000 e00b6008 00000008 [ 594.275386][ C1] 5e20: 00000001 83fd9168 84033288 83fd9040 00000000 df865e6c df865e58 df865e58 [ 594.275429][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 594.275453][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 594.275528][ C1] r5:00000008 r4:83fd9040 [ 594.275550][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 594.275624][ C1] r7:00000001 r6:00000000 r5:00000003 r4:838bf6fc [ 594.275643][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.275700][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.275774][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833da858 r5:00000001 [ 594.275811][ C1] r4:838bf6fc [ 594.275828][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 594.275885][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 594.275944][ C1] r5:000000ff r4:832ff314 [ 594.275963][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 594.276023][ C1] r5:000000ff r4:832ff314 [ 594.276045][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 594.276108][ C1] r5:000000ff r4:832ff314 [ 594.276130][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 594.276223][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 594.276247][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.276328][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.276354][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.276420][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.276503][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.276532][ C1] r4:00000092 [ 594.276550][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.276620][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.276700][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.278317][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 594.316999][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 594.317396][ C0] Tainted: [L]=SOFTLOCKUP [ 594.317581][ C0] Hardware name: ARM-Versatile Express [ 594.317826][ C0] Call trace: [ 594.318102][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 594.318475][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 594.318722][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 594.319038][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 594.319407][ C0] r5:00000000 r4:82a7bd14 [ 594.319578][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 594.319886][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 594.320224][ C0] r7:82ac27f8 [ 594.320386][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 594.320728][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 594.320955][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 594.321320][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 594.321618][ C0] r4:dddc75d8 [ 594.321772][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 594.322137][ C0] r10:587ed590 r9:dddc7180 r8:dddc7130 r7:0000008a r6:00000003 r5:20000193 [ 594.322433][ C0] r4:dddc7000 [ 594.322591][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 594.322955][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 594.323276][ C0] r4:8309de40 [ 594.323757][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 594.324176][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 594.324575][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 594.324853][ C0] r4:8280cc44 [ 594.325006][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 594.325361][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 594.325732][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 594.326094][ C0] r7:82801b90 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 594.326318][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.326833][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 594.327218][ C0] 1b80: ddddb488 830bf3b0 00000103 0000395c [ 594.327551][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 5fb9d380 0000001f 00000001 82801bec [ 594.327863][ C0] 1bc0: 82801bf0 82801be0 80346ef4 81abbd3c 60000113 ffffffff [ 594.328130][ C0] r9:8281b500 r8:5fb9d380 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abbd3c [ 594.328421][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 594.328808][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 594.329164][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.329416][ C0] r4:830bf380 [ 594.329564][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 594.329937][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 594.330211][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 594.330581][ C0] r4:82804084 [ 594.330726][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.331056][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.331445][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 594.331749][ C0] r4:8281b500 [ 594.331901][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.332237][ C0] r5:8247f0cc r4:826c3a9c [ 594.332417][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 594.332773][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.333123][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.333366][ C0] 1dc0: 00000001 00000000 [ 594.333694][ C0] 1de0: 00007e2a 00007e28 83fd9168 00000004 00000001 83fd9168 84033288 83fd9040 [ 594.334018][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 594.334337][ C0] r9:8281b500 r8:84033288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 594.334649][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 594.335006][ C0] r5:00000004 r4:83fd9040 [ 594.335222][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 594.335579][ C0] r7:00000001 r6:00000000 r5:00000002 r4:838bf6e8 [ 594.335799][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.336155][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.336570][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833da3d8 r5:00000001 [ 594.336886][ C0] r4:838bf6e8 [ 594.337025][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 594.337325][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 594.337686][ C0] r5:000000ff r4:832ff224 [ 594.337868][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 594.338214][ C0] r5:000000ff r4:832ff224 [ 594.338399][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 594.338760][ C0] r5:000000ff r4:832ff224 [ 594.338936][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 594.339314][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.339559][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.339916][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.340199][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.340562][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.340919][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 594.341210][ C0] r4:000000ed [ 594.341369][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 594.341735][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.342066][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.344873][ C0] Rebooting in 86400 seconds..