last executing test programs: 1.846921115s ago: executing program 0 (id=1209): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x28040, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000000)={0x7, r0, 0x1}) sendmmsg$alg(r2, 0x0, 0x0, 0x2000000) 1.748389778s ago: executing program 0 (id=1210): pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r1, &(0x7f0000020040), 0x1001d) write$FUSE_GETXATTR(r1, 0x0, 0x58) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) 1.377261255s ago: executing program 1 (id=1215): r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) close(r0) openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 1.269895968s ago: executing program 1 (id=1216): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) close(r0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha1)\x00'}, 0x58) 1.201070897s ago: executing program 1 (id=1217): r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_NOTIFY(r0, 0x0, 0x0) 1.129523206s ago: executing program 1 (id=1218): r0 = openat$procfs(0xffffff9c, &(0x7f0000000600)='/proc/asound/seq/timer\x00', 0x0, 0x0) close(r0) openat$nullb(0xffffff9c, &(0x7f0000000640), 0x80000, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000009c0)) 1.049825416s ago: executing program 1 (id=1219): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000200)={0x1d, r1, 0x1}, 0x18) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x20000001) 649.909597ms ago: executing program 0 (id=1220): ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x0) 570.683028ms ago: executing program 0 (id=1221): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$FUSE_LK(r1, 0x0, 0x0) 479.719329ms ago: executing program 0 (id=1222): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close_range(r0, r0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, r1, 0x300, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xfffffffd, 0x5f}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x5}, 0x200088a4) 419.806807ms ago: executing program 0 (id=1223): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000000)=@in6={0xa, 0x0, 0x10000, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x854}, 0x20) 0s ago: executing program 1 (id=1224): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x33fe0}}, 0x48051) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), r0) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) kernel console output (not intermixed with test programs): [ 48.655836][ T29] audit: type=1400 audit(48.560:56): avc: denied { read write } for pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.658409][ T29] audit: type=1400 audit(48.560:57): avc: denied { open } for pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:27529' (ED25519) to the list of known hosts. [ 63.182149][ T29] audit: type=1400 audit(63.080:58): avc: denied { name_bind } for pid=3087 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.451548][ T29] audit: type=1400 audit(64.350:59): avc: denied { execute } for pid=3088 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.501870][ T29] audit: type=1400 audit(64.390:60): avc: denied { execute_no_trans } for pid=3088 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.121713][ T29] audit: type=1400 audit(69.020:61): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.129013][ T29] audit: type=1400 audit(69.030:62): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.148298][ T3088] cgroup: Unknown subsys name 'net' [ 69.159715][ T29] audit: type=1400 audit(69.060:63): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.320346][ T3088] cgroup: Unknown subsys name 'cpuset' [ 69.329729][ T3088] cgroup: Unknown subsys name 'hugetlb' [ 69.334446][ T3088] cgroup: Unknown subsys name 'rlimit' [ 69.593161][ T29] audit: type=1400 audit(69.500:64): avc: denied { setattr } for pid=3088 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.595260][ T29] audit: type=1400 audit(69.500:65): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.598135][ T29] audit: type=1400 audit(69.500:66): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.795968][ T3090] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.797513][ T29] audit: type=1400 audit(69.700:67): avc: denied { relabelto } for pid=3090 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.803468][ T29] audit: type=1400 audit(69.710:68): avc: denied { write } for pid=3090 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.845462][ T29] audit: type=1400 audit(69.750:69): avc: denied { read } for pid=3088 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.847805][ T29] audit: type=1400 audit(69.750:70): avc: denied { open } for pid=3088 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.326898][ T3088] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.478481][ T29] audit: type=1400 audit(79.380:71): avc: denied { execmem } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.529311][ T29] audit: type=1400 audit(79.430:72): avc: denied { read } for pid=3093 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.534329][ T29] audit: type=1400 audit(79.430:73): avc: denied { open } for pid=3093 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.543850][ T29] audit: type=1400 audit(79.450:74): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.564047][ T29] audit: type=1400 audit(79.470:75): avc: denied { module_request } for pid=3093 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.631452][ T29] audit: type=1400 audit(79.530:76): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.156315][ T29] audit: type=1400 audit(80.060:77): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.078374][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.095339][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.131946][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.137563][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.935779][ T3093] hsr_slave_0: entered promiscuous mode [ 81.938767][ T3093] hsr_slave_1: entered promiscuous mode [ 81.949486][ T3094] hsr_slave_0: entered promiscuous mode [ 81.953978][ T3094] hsr_slave_1: entered promiscuous mode [ 81.955600][ T3094] debugfs: 'hsr0' already exists in 'hsr' [ 81.956143][ T3094] Cannot create hsr debugfs directory [ 82.458565][ T29] audit: type=1400 audit(82.360:78): avc: denied { create } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.463367][ T29] audit: type=1400 audit(82.370:79): avc: denied { write } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.465973][ T29] audit: type=1400 audit(82.370:80): avc: denied { read } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.483764][ T3093] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.496505][ T3093] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.515764][ T3093] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.525572][ T3093] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.615683][ T3094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.625132][ T3094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.640021][ T3094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.649149][ T3094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.403495][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.428985][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.137379][ T3093] veth0_vlan: entered promiscuous mode [ 86.166493][ T3093] veth1_vlan: entered promiscuous mode [ 86.232473][ T3093] veth0_macvtap: entered promiscuous mode [ 86.254691][ T3093] veth1_macvtap: entered promiscuous mode [ 86.337821][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.338715][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.338835][ T52] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.338911][ T52] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.438839][ T29] audit: type=1400 audit(86.340:81): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.457135][ T29] audit: type=1400 audit(86.360:82): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.klaF6M/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.466487][ T29] audit: type=1400 audit(86.370:83): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.483651][ T29] audit: type=1400 audit(86.390:84): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.klaF6M/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.497429][ T29] audit: type=1400 audit(86.400:85): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.klaF6M/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.516128][ T29] audit: type=1400 audit(86.420:86): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.524650][ T29] audit: type=1400 audit(86.430:87): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.529700][ T29] audit: type=1400 audit(86.430:88): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="gadgetfs" ino=3161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.538420][ T29] audit: type=1400 audit(86.440:89): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.545790][ T29] audit: type=1400 audit(86.450:90): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.567707][ T3094] veth0_vlan: entered promiscuous mode [ 86.616241][ T3094] veth1_vlan: entered promiscuous mode [ 86.665390][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.689968][ T3094] veth0_macvtap: entered promiscuous mode [ 86.708386][ T3094] veth1_macvtap: entered promiscuous mode [ 86.825437][ T82] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.826490][ T82] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.826606][ T82] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.826677][ T82] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.537257][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 91.539200][ T29] audit: type=1400 audit(91.440:107): avc: denied { create } for pid=3766 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.546766][ T29] audit: type=1400 audit(91.450:108): avc: denied { bind } for pid=3766 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.552533][ T29] audit: type=1400 audit(91.460:109): avc: denied { accept } for pid=3766 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.558203][ T29] audit: type=1400 audit(91.460:110): avc: denied { setopt } for pid=3766 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.643046][ T3769] Zero length message leads to an empty skb [ 91.876768][ T29] audit: type=1400 audit(91.780:111): avc: denied { setopt } for pid=3776 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.956979][ T29] audit: type=1400 audit(91.830:112): avc: denied { prog_load } for pid=3778 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.958222][ T29] audit: type=1400 audit(91.860:113): avc: denied { bpf } for pid=3778 comm="syz.1.37" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 91.966379][ T29] audit: type=1400 audit(91.870:114): avc: denied { perfmon } for pid=3778 comm="syz.1.37" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 92.013633][ T29] audit: type=1400 audit(91.920:115): avc: denied { prog_run } for pid=3778 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 92.018456][ T29] audit: type=1400 audit(91.920:116): avc: denied { map_create } for pid=3778 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 95.983231][ T3825] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3825 comm=syz.0.60 [ 97.622854][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 97.624505][ T29] audit: type=1400 audit(97.530:127): avc: denied { read } for pid=3846 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.978392][ T3851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3851 comm=syz.1.73 [ 99.198444][ T29] audit: type=1400 audit(99.100:128): avc: denied { create } for pid=3856 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.208480][ T29] audit: type=1400 audit(99.110:129): avc: denied { read write } for pid=3856 comm="syz.1.76" path="socket:[3566]" dev="sockfs" ino=3566 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.600515][ T29] audit: type=1400 audit(100.500:130): avc: denied { create } for pid=3887 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 100.606704][ T29] audit: type=1400 audit(100.510:131): avc: denied { write } for pid=3887 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 100.612103][ T29] audit: type=1400 audit(100.520:132): avc: denied { read } for pid=3887 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 102.487628][ T29] audit: type=1400 audit(102.390:133): avc: denied { bind } for pid=3912 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 102.492741][ T29] audit: type=1400 audit(102.400:134): avc: denied { node_bind } for pid=3912 comm="syz.1.103" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 102.498869][ T29] audit: type=1400 audit(102.400:135): avc: denied { connect } for pid=3912 comm="syz.1.103" laddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 102.752343][ T29] audit: type=1400 audit(102.650:136): avc: denied { write } for pid=3920 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 103.090681][ T29] audit: type=1400 audit(102.990:137): avc: denied { create } for pid=3932 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 103.098673][ T29] audit: type=1400 audit(103.000:138): avc: denied { setopt } for pid=3932 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 103.526061][ T3948] capability: warning: `syz.1.120' uses 32-bit capabilities (legacy support in use) [ 103.823130][ T3960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65381 sclass=netlink_route_socket pid=3960 comm=syz.0.126 [ 103.830074][ T3961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3961 comm=syz.1.127 [ 104.442074][ T29] audit: type=1400 audit(104.350:139): avc: denied { write } for pid=3987 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 109.125609][ T29] audit: type=1400 audit(109.030:140): avc: denied { compute_member } for pid=4058 comm="syz.0.174" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 109.393101][ T4065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=257 sclass=netlink_route_socket pid=4065 comm=syz.0.177 [ 110.075976][ T29] audit: type=1400 audit(109.980:141): avc: denied { create } for pid=4081 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 110.088525][ T29] audit: type=1400 audit(109.990:142): avc: denied { write } for pid=4081 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 113.567815][ T4211] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5134 sclass=netlink_audit_socket pid=4211 comm=syz.1.248 [ 114.342375][ T29] audit: type=1400 audit(114.250:143): avc: denied { block_suspend } for pid=4237 comm="syz.1.262" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 114.613952][ T29] audit: type=1400 audit(114.520:144): avc: denied { write } for pid=4248 comm="syz.1.265" name="raw6" dev="proc" ino=4026532794 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 114.722781][ T4251] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4251 comm=syz.1.266 [ 115.280436][ T29] audit: type=1400 audit(115.180:145): avc: denied { getopt } for pid=4268 comm="syz.1.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.857506][ T29] audit: type=1400 audit(115.760:146): avc: denied { audit_write } for pid=4292 comm="syz.0.287" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 117.417137][ T29] audit: type=1400 audit(117.320:147): avc: denied { getopt } for pid=4361 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 117.621834][ T29] audit: type=1400 audit(117.530:148): avc: denied { ioctl } for pid=4367 comm="syz.0.324" path="socket:[5288]" dev="sockfs" ino=5288 ioctlcmd=0x6619 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 117.833926][ T4374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4374 comm=syz.0.327 [ 117.964373][ T4378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4378 comm=syz.0.329 [ 118.768292][ T4404] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4404 comm=syz.1.342 [ 118.932010][ T4410] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=4410 comm=syz.0.345 [ 119.654746][ T4444] block nbd0: NBD_DISCONNECT [ 119.976143][ T4452] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1795 sclass=netlink_audit_socket pid=4452 comm=syz.0.366 [ 123.362085][ T4488] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65525 sclass=netlink_audit_socket pid=4488 comm=syz.0.383 [ 123.728560][ T4496] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4496 comm=syz.0.387 [ 125.983126][ T29] audit: type=1400 audit(125.890:149): avc: denied { create } for pid=4545 comm="syz.0.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 125.987944][ T29] audit: type=1400 audit(125.890:150): avc: denied { setopt } for pid=4545 comm="syz.0.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 126.195509][ T4555] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4555 comm=syz.1.415 [ 127.374809][ T29] audit: type=1400 audit(127.280:151): avc: denied { create } for pid=4598 comm="syz.0.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 128.479717][ T4638] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=45 sclass=netlink_audit_socket pid=4638 comm=syz.1.457 [ 130.355700][ T29] audit: type=1400 audit(130.260:152): avc: denied { connect } for pid=4669 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 134.303637][ T29] audit: type=1400 audit(134.210:153): avc: denied { read } for pid=4746 comm="syz.0.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 135.082086][ T29] audit: type=1400 audit(134.990:154): avc: denied { setcheckreqprot } for pid=4777 comm="syz.1.527" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 136.760101][ T4820] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4820 comm=syz.0.547 [ 136.976966][ T29] audit: type=1400 audit(136.880:155): avc: denied { create } for pid=4825 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 136.981837][ T29] audit: type=1400 audit(136.880:156): avc: denied { write } for pid=4825 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 140.762560][ T29] audit: type=1400 audit(140.660:157): avc: denied { ioctl } for pid=4881 comm="syz.1.577" path="socket:[7206]" dev="sockfs" ino=7206 ioctlcmd=0x9426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 143.519697][ T29] audit: type=1400 audit(143.420:158): avc: denied { setopt } for pid=4925 comm="syz.0.598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 143.689542][ T29] audit: type=1400 audit(143.590:159): avc: denied { setopt } for pid=4931 comm="syz.1.601" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 143.715374][ T4932] dvmrp1: entered allmulticast mode [ 144.199385][ T29] audit: type=1400 audit(144.100:160): avc: denied { write } for pid=4951 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 144.557920][ T29] audit: type=1400 audit(144.460:161): avc: denied { write } for pid=4967 comm="syz.1.618" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 144.966535][ T4986] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4986 comm=syz.0.626 [ 145.057272][ T29] audit: type=1400 audit(144.960:162): avc: denied { setopt } for pid=4988 comm="syz.0.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 145.418309][ T5006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2573 sclass=netlink_route_socket pid=5006 comm=syz.1.636 [ 149.641753][ T5072] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5072 comm=syz.0.667 [ 150.671973][ T29] audit: type=1400 audit(150.580:163): avc: denied { ioctl } for pid=5104 comm="syz.0.683" path="socket:[6978]" dev="sockfs" ino=6978 ioctlcmd=0x4b4e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 151.626749][ T5139] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5139 comm=syz.0.700 [ 152.672729][ T5156] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=512 sclass=netlink_audit_socket pid=5156 comm=syz.1.708 [ 153.321160][ T29] audit: type=1400 audit(153.220:164): avc: denied { read } for pid=5176 comm="syz.0.719" path="socket:[7715]" dev="sockfs" ino=7715 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 154.260273][ T5208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5208 comm=syz.1.734 [ 154.777613][ T5223] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5223 comm=syz.1.741 [ 155.769723][ T29] audit: type=1400 audit(155.670:165): avc: denied { associate } for pid=5257 comm="syz.0.757" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 155.785198][ T29] audit: type=1400 audit(155.690:166): avc: denied { write } for pid=5257 comm="syz.0.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 158.639369][ T29] audit: type=1400 audit(158.540:167): avc: denied { create } for pid=5273 comm="syz.1.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 158.729266][ T5277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5277 comm=syz.0.767 [ 158.845762][ T29] audit: type=1400 audit(158.750:168): avc: denied { ioctl } for pid=5280 comm="syz.0.769" path="socket:[8329]" dev="sockfs" ino=8329 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 159.427630][ T5303] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1539 sclass=netlink_audit_socket pid=5303 comm=syz.0.780 [ 161.613704][ T29] audit: type=1400 audit(161.510:169): avc: denied { remount } for pid=5386 comm="syz.0.822" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 162.044307][ T5407] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 169.635616][ T29] audit: type=1400 audit(169.540:170): avc: denied { setopt } for pid=5506 comm="syz.1.879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 171.789242][ T29] audit: type=1400 audit(171.690:171): avc: denied { name_bind } for pid=5567 comm="syz.1.909" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 171.789703][ T29] audit: type=1400 audit(171.690:172): avc: denied { node_bind } for pid=5567 comm="syz.1.909" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 173.399119][ T5605] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5605 comm=syz.1.927 [ 173.719839][ T5611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5611 comm=syz.1.930 [ 174.454996][ T5625] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5625 comm=syz.1.937 [ 175.702674][ T29] audit: type=1400 audit(175.610:173): avc: denied { ioctl } for pid=5662 comm="syz.0.955" path="socket:[9551]" dev="sockfs" ino=9551 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 180.322827][ T5753] capability: warning: `syz.0.998' uses deprecated v2 capabilities in a way that may be insecure [ 180.732337][ T5770] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5770 comm=syz.0.1006 [ 180.988542][ T5781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=5781 comm=syz.0.1012 [ 181.506461][ T29] audit: type=1400 audit(693.404:174): avc: denied { getopt } for pid=5802 comm="syz.0.1023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 181.509412][ T5803] syz.0.1023 uses obsolete (PF_INET,SOCK_PACKET) [ 183.332527][ T5859] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5859 comm=syz.1.1051 [ 187.154556][ T5916] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5123 sclass=netlink_audit_socket pid=5916 comm=syz.0.1079 [ 190.254913][ T29] audit: type=1400 audit(702.154:175): avc: denied { remount } for pid=5984 comm="syz.1.1112" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 190.839620][ T5998] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5998 comm=syz.1.1118 [ 191.267101][ T6014] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6014 comm=syz.1.1126 [ 191.388339][ T6017] pim6reg: entered allmulticast mode [ 193.061972][ T6040] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6040 comm=syz.1.1138 [ 194.107741][ T29] audit: type=1400 audit(706.004:176): avc: denied { create } for pid=6047 comm="syz.0.1141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 194.123720][ T29] audit: type=1400 audit(706.024:177): avc: denied { connect } for pid=6047 comm="syz.0.1141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 196.540611][ T29] audit: type=1400 audit(708.434:178): avc: denied { nlmsg_write } for pid=6063 comm="syz.0.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 200.811560][ T29] audit: type=1400 audit(712.704:179): avc: denied { read } for pid=6085 comm="syz.1.1158" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 200.813490][ T29] audit: type=1400 audit(712.714:180): avc: denied { open } for pid=6085 comm="syz.1.1158" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 200.865531][ T29] audit: type=1400 audit(712.764:181): avc: denied { ioctl } for pid=6085 comm="syz.1.1158" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 200.867103][ T6086] binder: 6085:6086 ioctl 400c620e 20000040 returned -22 [ 200.896128][ T29] audit: type=1400 audit(712.794:182): avc: denied { set_context_mgr } for pid=6085 comm="syz.1.1158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 201.414746][ T6088] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6088 comm=syz.1.1159 [ 203.373481][ T29] audit: type=1400 audit(715.274:183): avc: denied { ioctl } for pid=6104 comm="syz.0.1167" path="socket:[10240]" dev="sockfs" ino=10240 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 203.981259][ T6120] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 204.322263][ T6133] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6133 comm=syz.1.1181 [ 204.500326][ T6137] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6137 comm=syz.1.1183 [ 204.588410][ T6139] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6139 comm=syz.1.1184 [ 205.020470][ T6149] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6149 comm=syz.1.1189 [ 207.303048][ T29] audit: type=1400 audit(719.204:184): avc: denied { create } for pid=6212 comm="syz.0.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 207.307547][ T29] audit: type=1400 audit(719.204:185): avc: denied { write } for pid=6212 comm="syz.0.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 660.301263][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.301569][ C0] Modules linked in: [ 660.302662][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.302964][ C0] Tainted: [L]=SOFTLOCKUP [ 660.303017][ C0] Hardware name: ARM-Versatile Express [ 660.303267][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.304023][ C0] LR is at timer_expire_remote+0x60/0x6c [ 660.304099][ C0] pc : [<81abbe3c>] lr : [<80328a30>] psr: 60000113 [ 660.304143][ C0] sp : 82801bc0 ip : 82801bd0 fp : 82801bcc [ 660.304180][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 660.304225][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : dddd9f00 [ 660.304267][ C0] r3 : 00008ad0 r2 : 00000000 r1 : 00000000 r0 : dddd9f00 [ 660.304393][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.304472][ C0] Control: 30c5387d Table: 84efd800 DAC: fffffffd [ 660.304575][ C0] Call trace: [ 660.304857][ C0] [<81abbe14>] (_raw_spin_unlock_irq) from [<80328a30>] (timer_expire_remote+0x60/0x6c) [ 660.305215][ C0] [<803289d0>] (timer_expire_remote) from [<8034706c>] (tmigr_handle_remote_up+0x3e0/0x4b0) [ 660.305288][ C0] r4:830bf380 [ 660.305303][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 660.305353][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.305370][ C0] r4:830bf380 [ 660.305378][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 660.305414][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.305423][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 660.305452][ C0] r4:82804084 [ 660.305459][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.305488][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.305521][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 660.305530][ C0] r4:8281b500 [ 660.305544][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.305608][ C0] r5:8247f0cc r4:826c3a9c [ 660.305624][ C0] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 660.305655][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.305738][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.305848][ C0] 1dc0: 00000001 00000000 [ 660.305876][ C0] 1de0: 0000c12d 0000c12b 840b9768 00000004 00000001 840b9768 84046a88 840b9640 [ 660.305892][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbfcc 81abbff4 80000013 ffffffff [ 660.305934][ C0] r9:8281b500 r8:84046a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbff4 [ 660.305956][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 660.306016][ C0] r5:00000004 r4:840b9640 [ 660.306026][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 660.306070][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84242628 [ 660.306080][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.306106][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.306137][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833e8398 r5:00000001 [ 660.306147][ C0] r4:84242628 [ 660.306154][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 660.306176][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 660.306203][ C0] r5:000000ff r4:830fe224 [ 660.306211][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 660.306237][ C0] r5:000000ff r4:830fe224 [ 660.306244][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 660.306268][ C0] r5:000000ff r4:830fe224 [ 660.306276][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 660.306308][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.306316][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.306350][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.306360][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.306390][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.306424][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.306435][ C0] r4:000000ed [ 660.306442][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 660.306477][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.306533][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.307156][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.307759][ C1] NMI backtrace for cpu 1 [ 660.307968][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 660.308048][ C1] Tainted: [L]=SOFTLOCKUP [ 660.308079][ C1] Hardware name: ARM-Versatile Express [ 660.308113][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 660.308179][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.308213][ C1] pc : [<81abc000>] lr : [<81abbfcc>] psr: 80000113 [ 660.308237][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.308257][ C1] r10: 81c05450 r9 : 840b9640 r8 : 84046a88 [ 660.308277][ C1] r7 : 840b9768 r6 : 00000000 r5 : 00000001 r4 : 840b9768 [ 660.308314][ C1] r3 : 0000c12b r2 : 0000c12c r1 : 00000000 r0 : 00000001 [ 660.308341][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.308380][ C1] Control: 30c5387d Table: 85e48ac0 DAC: 00000000 [ 660.308402][ C1] Call trace: frame pointer underflow [ 660.308504][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 660.308590][ C1] r5:00000001 r4:840b9640 [ 660.308627][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 660.308706][ C1] r7:00000000 r6:00000000 r5:00000000 r4:84242600 [ 660.308729][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.308795][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.308901][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffdc3d r6:00000028 r5:00000000 [ 660.308936][ C1] r4:84242600 [ 660.308955][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 660.309015][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 660.309084][ C1] r5:830fe044 r4:830fe044 [ 660.309114][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 660.309185][ C1] r5:830fe044 r4:846d98cc [ 660.309218][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 660.309289][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 660.309375][ C1] r7:ffffdc3d r6:809cd4b4 r5:846d98cc r4:83216000 [ 660.309407][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 660.309482][ C1] r9:df805ebc r8:ffffdc3d r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:846d98cc [ 660.309506][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 660.309588][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.309629][ C1] r4:dddd9f00 [ 660.309657][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 660.309731][ C1] r4:82804084 [ 660.309764][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.309845][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.309936][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e20 r6:82443f98 r5:8247f0cc [ 660.309973][ C1] r4:83216000 [ 660.309993][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.310062][ C1] r5:8247f0cc r4:826c3a9c [ 660.310096][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 660.310172][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 660.310263][ C1] r9:83216000 r8:84046a88 r7:df865e54 r6:ffffffff r5:20000013 r4:809c830c [ 660.310295][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.310367][ C1] Exception stack(0xdf865e20 to 0xdf865e68) [ 660.310418][ C1] 5e20: e0155008 00000009 0000c12b 809c830c 840b9640 00000008 00000001 840b9768 [ 660.310470][ C1] 5e40: 84046a88 840b9640 00000000 df865e8c df865e58 df865e70 809c7b4c 809c830c [ 660.310505][ C1] 5e60: 20000013 ffffffff [ 660.310538][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 660.310630][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8424263c [ 660.310662][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.310728][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.310806][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833e8818 r5:00000001 [ 660.310840][ C1] r4:8424263c [ 660.310859][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 660.310932][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 660.311007][ C1] r5:000000ff r4:830fe314 [ 660.311027][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 660.311093][ C1] r5:000000ff r4:830fe314 [ 660.311113][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 660.311181][ C1] r5:000000ff r4:830fe314 [ 660.311211][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 660.311290][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.311313][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.311390][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.311419][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.311494][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.311589][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.311630][ C1] r4:00000092 [ 660.311658][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.311730][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.311812][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.313272][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.341522][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.341936][ C0] Tainted: [L]=SOFTLOCKUP [ 660.342141][ C0] Hardware name: ARM-Versatile Express [ 660.342398][ C0] Call trace: [ 660.342612][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.342839][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 660.342974][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.343221][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.343411][ C0] r5:00000000 r4:82a7bd14 [ 660.343547][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.343734][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.343917][ C0] r7:82ac27f8 [ 660.344004][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 660.344261][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 660.344483][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.344921][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 660.345257][ C0] r4:dddc75d8 [ 660.345433][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 660.345843][ C0] r10:b797f0d0 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.346191][ C0] r4:dddc7000 [ 660.346356][ C0] [<8032b120>] (hrtimer_interrupt) from [<813409e8>] (arch_timer_handler_virt+0x30/0x38) [ 660.346802][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.347155][ C0] r4:8309de40 [ 660.347330][ C0] [<813409b8>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.347753][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 660.348094][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.348272][ C0] r4:8280cc44 [ 660.348354][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.348581][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.348795][ C0] [<80201260>] (gic_handle_irq) from [<81aada48>] (generic_handle_arch_irq+0x60/0x80) [ 660.349085][ C0] r7:82801b70 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 660.349253][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.349442][ C0] Exception stack(0x82801b70 to 0x82801bb8) [ 660.349571][ C0] 1b60: dddd9f00 00000000 00000000 00008ad0 [ 660.349746][ C0] 1b80: dddd9f00 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bcc [ 660.349925][ C0] 1ba0: 82801bd0 82801bc0 80328a30 81abbe3c 60000113 ffffffff [ 660.350092][ C0] r9:8281b500 r8:00000001 r7:82801ba4 r6:ffffffff r5:60000113 r4:81abbe3c [ 660.350260][ C0] [<81abbe14>] (_raw_spin_unlock_irq) from [<80328a30>] (timer_expire_remote+0x60/0x6c) [ 660.350469][ C0] [<803289d0>] (timer_expire_remote) from [<8034706c>] (tmigr_handle_remote_up+0x3e0/0x4b0) [ 660.350695][ C0] r4:830bf380 [ 660.350772][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 660.350995][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.351169][ C0] r4:830bf380 [ 660.351266][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 660.351747][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.352049][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 660.352319][ C0] r4:82804084 [ 660.352409][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.352613][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.352822][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 660.353049][ C0] r4:8281b500 [ 660.353137][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.353326][ C0] r5:8247f0cc r4:826c3a9c [ 660.353426][ C0] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 660.353624][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.353864][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.354006][ C0] 1dc0: 00000001 00000000 [ 660.354195][ C0] 1de0: 0000c12d 0000c12b 840b9768 00000004 00000001 840b9768 84046a88 840b9640 [ 660.354392][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbfcc 81abbff4 80000013 ffffffff [ 660.354591][ C0] r9:8281b500 r8:84046a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbff4 [ 660.354771][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 660.355028][ C0] r5:00000004 r4:840b9640 [ 660.355144][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 660.355355][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84242628 [ 660.355521][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.355791][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.356087][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833e8398 r5:00000001 [ 660.356379][ C0] r4:84242628 [ 660.356545][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 660.356955][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 660.357336][ C0] r5:000000ff r4:830fe224 [ 660.357532][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 660.357900][ C0] r5:000000ff r4:830fe224 [ 660.358118][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 660.358501][ C0] r5:000000ff r4:830fe224 [ 660.358717][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 660.359022][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.359180][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.359384][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.359555][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.359745][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.359989][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.360188][ C0] r4:000000ed [ 660.360273][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 660.360471][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.360665][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.362922][ C0] Rebooting in 86400 seconds..