last executing test programs: 586.597075ms ago: executing program 0 (id=741): symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@filename='./file0\x00', 0x0, 0x0) 508.467236ms ago: executing program 1 (id=738): r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0xe, 0x0, &(0x7f0000000900)) 489.133188ms ago: executing program 0 (id=743): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fremovexattr(r0, &(0x7f0000000040)=@random={'user.', '\x00'}) 389.412461ms ago: executing program 1 (id=739): r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000180)) read$FUSE(r0, 0x0, 0x0) 378.656282ms ago: executing program 0 (id=745): openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x62941, 0x2, 0x10}, 0x18) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 276.432955ms ago: executing program 1 (id=740): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5450, 0x0) 266.039127ms ago: executing program 0 (id=747): r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x5421, &(0x7f0000000140)) 157.59967ms ago: executing program 1 (id=742): r0 = signalfd(0xffffffffffffffff, &(0x7f00000021c0), 0x8) ioctl$IOMMU_HWPT_ALLOC$NONE(r0, 0x2, &(0x7f0000000340)={0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 157.38282ms ago: executing program 0 (id=744): r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSIG(r0, 0x5450, 0x13) 88.675229ms ago: executing program 1 (id=746): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000d80), 0x0, 0x0) dup(r0) 9.025119ms ago: executing program 1 (id=748): r0 = mq_open(&(0x7f0000000180)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x92\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\x0f\x05\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1c6\xe7`83\xb7n#\xe0\xc1_\xec\xba\xde\a\x8b\xc5\x86woo\xbc\x1c\xa3r\x82\xf3enq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000000)={0x6, 0x1, 0x4, 0x40000000000000}) mq_timedreceive(r0, &(0x7f0000000340)=""/195, 0xc3, 0x0, 0x0) 0s ago: executing program 0 (id=752): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000400), 0x143080, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) kernel console output (not intermixed with test programs): [ 48.079065][ T29] audit: type=1400 audit(48.000:56): avc: denied { read write } for pid=3088 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.079822][ T29] audit: type=1400 audit(48.000:57): avc: denied { open } for pid=3088 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:59571' (ED25519) to the list of known hosts. [ 62.375498][ T29] audit: type=1400 audit(62.290:58): avc: denied { name_bind } for pid=3091 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.248318][ T29] audit: type=1400 audit(64.160:59): avc: denied { execute } for pid=3092 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.321408][ T29] audit: type=1400 audit(64.220:60): avc: denied { execute_no_trans } for pid=3092 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.176042][ T29] audit: type=1400 audit(68.090:61): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.181088][ T29] audit: type=1400 audit(68.100:62): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.196504][ T3092] cgroup: Unknown subsys name 'net' [ 68.203761][ T29] audit: type=1400 audit(68.120:63): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.381970][ T3092] cgroup: Unknown subsys name 'cpuset' [ 68.387813][ T3092] cgroup: Unknown subsys name 'hugetlb' [ 68.388967][ T3092] cgroup: Unknown subsys name 'rlimit' [ 68.593514][ T29] audit: type=1400 audit(68.510:64): avc: denied { setattr } for pid=3092 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.598336][ T29] audit: type=1400 audit(68.520:65): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.599208][ T29] audit: type=1400 audit(68.520:66): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.791585][ T3094] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.797891][ T29] audit: type=1400 audit(68.720:67): avc: denied { relabelto } for pid=3094 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.801392][ T29] audit: type=1400 audit(68.720:68): avc: denied { write } for pid=3094 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.830147][ T29] audit: type=1400 audit(68.750:69): avc: denied { read } for pid=3092 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.831836][ T29] audit: type=1400 audit(68.750:70): avc: denied { open } for pid=3092 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.441396][ T3092] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.324803][ T29] audit: type=1400 audit(78.240:71): avc: denied { execmem } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.416853][ T29] audit: type=1400 audit(78.340:72): avc: denied { read } for pid=3097 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.418622][ T29] audit: type=1400 audit(78.340:73): avc: denied { open } for pid=3097 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.424376][ T29] audit: type=1400 audit(78.340:74): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.450429][ T29] audit: type=1400 audit(78.370:75): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.452343][ T29] audit: type=1400 audit(78.370:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.545038][ T29] audit: type=1400 audit(78.460:77): avc: denied { sys_module } for pid=3097 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.220729][ T29] audit: type=1400 audit(79.140:78): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.001146][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.004697][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.202461][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.211057][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.834052][ T3097] hsr_slave_0: entered promiscuous mode [ 80.840248][ T3097] hsr_slave_1: entered promiscuous mode [ 81.150283][ T3098] hsr_slave_0: entered promiscuous mode [ 81.153978][ T3098] hsr_slave_1: entered promiscuous mode [ 81.157997][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 81.159195][ T3098] Cannot create hsr debugfs directory [ 81.302679][ T29] audit: type=1400 audit(81.220:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.303775][ T29] audit: type=1400 audit(81.220:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.323856][ T3097] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.350270][ T3097] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.369879][ T3097] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.388981][ T3097] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.589531][ T3098] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.600320][ T3098] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.613611][ T3098] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.626722][ T3098] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.068706][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.317987][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.330209][ T3098] veth0_vlan: entered promiscuous mode [ 84.350139][ T3098] veth1_vlan: entered promiscuous mode [ 84.398945][ T3098] veth0_macvtap: entered promiscuous mode [ 84.409040][ T3098] veth1_macvtap: entered promiscuous mode [ 84.461072][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.461724][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.461797][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.461856][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.555225][ T3097] veth0_vlan: entered promiscuous mode [ 84.571756][ T3097] veth1_vlan: entered promiscuous mode [ 84.642580][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.643636][ T29] audit: type=1400 audit(84.560:82): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.651746][ T29] audit: type=1400 audit(84.570:83): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MDiaPx/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.661571][ T29] audit: type=1400 audit(84.580:84): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.671828][ T29] audit: type=1400 audit(84.590:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MDiaPx/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.678061][ T29] audit: type=1400 audit(84.600:86): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MDiaPx/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2364 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.695744][ T29] audit: type=1400 audit(84.610:87): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.705830][ T29] audit: type=1400 audit(84.620:88): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.709585][ T29] audit: type=1400 audit(84.630:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=2365 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.718169][ T29] audit: type=1400 audit(84.640:90): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.721705][ T29] audit: type=1400 audit(84.640:91): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.727210][ T3097] veth0_macvtap: entered promiscuous mode [ 84.744619][ T3097] veth1_macvtap: entered promiscuous mode [ 84.789943][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.873698][ T66] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.874611][ T66] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.874707][ T66] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.874777][ T66] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.959580][ T3717] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 86.221860][ T3723] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3723 comm=syz.0.9 [ 88.033509][ T3770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3770 comm=syz.0.32 [ 89.826413][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 89.827670][ T29] audit: type=1400 audit(89.750:102): avc: denied { create } for pid=3841 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 89.834081][ T29] audit: type=1400 audit(89.750:103): avc: denied { getopt } for pid=3841 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 90.028691][ T29] audit: type=1400 audit(89.950:104): avc: denied { map } for pid=3849 comm="syz.0.71" path="/dev/input/mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 90.057234][ T29] audit: type=1400 audit(89.980:105): avc: denied { create } for pid=3851 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 90.066133][ T29] audit: type=1400 audit(89.980:106): avc: denied { ioctl } for pid=3851 comm="syz.1.73" path="socket:[2630]" dev="sockfs" ino=2630 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 90.432943][ T29] audit: type=1400 audit(90.350:107): avc: denied { create } for pid=3865 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 90.442255][ T29] audit: type=1400 audit(90.360:108): avc: denied { getopt } for pid=3865 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 91.376685][ T29] audit: type=1400 audit(91.290:109): avc: denied { create } for pid=3904 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 91.497116][ T29] audit: type=1400 audit(91.420:110): avc: denied { write } for pid=3909 comm="syz.1.100" name="if_inet6" dev="proc" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 91.658030][ T29] audit: type=1400 audit(91.580:111): avc: denied { create } for pid=3917 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 94.138543][ T4001] Zero length message leads to an empty skb [ 94.606752][ T4019] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=41 sclass=netlink_audit_socket pid=4019 comm=syz.0.156 [ 95.348131][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 95.349151][ T29] audit: type=1400 audit(95.270:121): avc: denied { setopt } for pid=4050 comm="syz.1.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 96.079301][ T29] audit: type=1400 audit(96.000:122): avc: denied { create } for pid=4083 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 96.084074][ T29] audit: type=1400 audit(96.000:123): avc: denied { getopt } for pid=4083 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 96.185802][ T4090] capability: warning: `syz.0.189' uses 32-bit capabilities (legacy support in use) [ 99.262181][ T29] audit: type=1400 audit(99.180:124): avc: denied { write } for pid=4125 comm="syz.0.208" path="socket:[3052]" dev="sockfs" ino=3052 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 99.389860][ T29] audit: type=1400 audit(99.310:125): avc: denied { ioctl } for pid=4129 comm="syz.0.210" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 99.847803][ T4145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4145 comm=syz.0.217 [ 99.850147][ T29] audit: type=1400 audit(99.770:126): avc: denied { write } for pid=4144 comm="syz.1.218" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 99.851314][ T29] audit: type=1400 audit(99.770:127): avc: denied { open } for pid=4144 comm="syz.1.218" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 99.860545][ T29] audit: type=1400 audit(99.780:128): avc: denied { ioctl } for pid=4144 comm="syz.1.218" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 100.174834][ T29] audit: type=1400 audit(100.090:129): avc: denied { bind } for pid=4162 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 101.072418][ T4201] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4201 comm=syz.1.245 [ 101.482615][ T29] audit: type=1400 audit(101.400:130): avc: denied { write } for pid=4216 comm="syz.1.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.444361][ T29] audit: type=1400 audit(103.360:131): avc: denied { getopt } for pid=4268 comm="syz.1.280" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.619314][ T29] audit: type=1400 audit(103.540:132): avc: denied { getopt } for pid=4275 comm="syz.0.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.583032][ T29] audit: type=1400 audit(104.500:133): avc: denied { name_bind } for pid=4314 comm="syz.1.303" src=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 104.583440][ T29] audit: type=1400 audit(104.500:134): avc: denied { node_bind } for pid=4314 comm="syz.1.303" src=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 105.433679][ T29] audit: type=1400 audit(105.350:135): avc: denied { perfmon } for pid=4350 comm="syz.1.321" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 105.441714][ T29] audit: type=1400 audit(105.360:136): avc: denied { map_read map_write } for pid=4350 comm="syz.1.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 106.029473][ T29] audit: type=1400 audit(105.950:137): avc: denied { setopt } for pid=4375 comm="syz.0.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.835847][ T29] audit: type=1400 audit(106.750:138): avc: denied { create } for pid=4409 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 106.841376][ T29] audit: type=1400 audit(106.760:139): avc: denied { getopt } for pid=4409 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 107.071216][ T29] audit: type=1400 audit(106.990:140): avc: denied { setopt } for pid=4413 comm="syz.1.352" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 110.512575][ T4466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4466 comm=syz.0.378 [ 110.948560][ T29] audit: type=1400 audit(110.870:141): avc: denied { watch } for pid=4473 comm="syz.1.382" path="/169" dev="tmpfs" ino=878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 112.889577][ T29] audit: type=1400 audit(112.810:142): avc: denied { getopt } for pid=4495 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 113.027472][ T4502] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4502 comm=syz.1.395 [ 115.463651][ T4609] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4609 comm=syz.1.443 [ 119.940472][ T29] audit: type=1400 audit(119.860:143): avc: denied { nlmsg_read } for pid=4758 comm="syz.1.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 119.943648][ T29] audit: type=1400 audit(119.860:144): avc: denied { audit_write } for pid=4758 comm="syz.1.520" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 119.949022][ T29] audit: type=1107 audit(119.860:145): pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 120.688100][ T29] audit: type=1400 audit(120.610:146): avc: denied { setattr } for pid=4792 comm="syz.1.537" name="PINGv6" dev="sockfs" ino=6013 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 120.918540][ T29] audit: type=1400 audit(120.840:147): avc: denied { create } for pid=4804 comm="syz.1.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 120.924124][ T29] audit: type=1400 audit(120.840:148): avc: denied { setopt } for pid=4804 comm="syz.1.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 123.454151][ T4909] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4909 comm=syz.0.598 [ 124.847345][ T29] audit: type=1400 audit(124.770:149): avc: denied { create } for pid=4966 comm="syz.1.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 124.859209][ T29] audit: type=1400 audit(124.780:150): avc: denied { ioctl } for pid=4966 comm="syz.1.623" path="socket:[6428]" dev="sockfs" ino=6428 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 124.941562][ T4969] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4969 comm=syz.1.624 [ 125.771161][ T29] audit: type=1400 audit(125.690:151): avc: denied { allowed } for pid=4992 comm="syz.0.636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 125.791308][ T29] audit: type=1400 audit(125.710:152): avc: denied { create } for pid=4992 comm="syz.0.636" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 127.023429][ T5047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=5047 comm=syz.0.664 [ 127.729746][ T5075] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5075 comm=syz.1.678 [ 128.117003][ T29] audit: type=1400 audit(128.040:153): avc: denied { ioctl } for pid=5090 comm="syz.1.686" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7576 ioctlcmd=0xaa08 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 128.129144][ T29] audit: type=1400 audit(128.050:154): avc: denied { lock } for pid=5091 comm="syz.0.687" path="socket:[6631]" dev="sockfs" ino=6631 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 128.780722][ T5118] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5118 comm=syz.1.703 [ 129.225650][ T29] audit: type=1400 audit(129.140:155): avc: denied { create } for pid=5135 comm="syz.1.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 129.232817][ T29] audit: type=1400 audit(129.150:156): avc: denied { getopt } for pid=5135 comm="syz.1.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 129.861138][ T5163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5163 comm=syz.1.721 [ 130.226014][ T5178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5178 comm=syz.1.729 [ 528.285578][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 431s! [swapper/1:0] [ 528.285948][ C1] Modules linked in: [ 528.286677][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 528.286802][ C1] Hardware name: ARM-Versatile Express [ 528.287023][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 528.287718][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 528.287764][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 528.287801][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 528.287830][ C1] r10: 81c05450 r9 : 840efe40 r8 : 83e65688 [ 528.287876][ C1] r7 : 840eff68 r6 : 00000000 r5 : 00000001 r4 : 840eff68 [ 528.287913][ C1] r3 : 00005484 r2 : 00005485 r1 : 00000000 r0 : 00000001 [ 528.288016][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 528.288077][ C1] Control: 30c5387d Table: 8616e980 DAC: 00000000 [ 528.288165][ C1] Call trace: frame pointer underflow [ 528.288466][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 528.288793][ C1] r5:00000001 r4:840efe40 [ 528.288889][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 528.288964][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8419ec00 [ 528.288982][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.289033][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.289115][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffbe4f r6:0000002a r5:00000000 [ 528.289144][ C1] r4:8419ec00 [ 528.289158][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 528.289207][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 528.289259][ C1] r5:83304844 r4:83304844 [ 528.289276][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 528.289326][ C1] r5:83304844 r4:85856ccc [ 528.289343][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 528.289391][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 528.289457][ C1] r7:ffffbe4f r6:809cd3b4 r5:85856ccc r4:83216000 [ 528.289473][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 528.289537][ C1] r9:df805ebc r8:ffffbe4f r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:85856ccc [ 528.289555][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 528.289618][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 528.289638][ C1] r4:dddd9f00 [ 528.289652][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 528.289702][ C1] r4:82804084 [ 528.289718][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 528.289772][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 528.289835][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 528.289865][ C1] r4:83216000 [ 528.289879][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 528.289933][ C1] r5:8247f0cc r4:826c3a9c [ 528.289950][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 528.290011][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 528.290082][ C1] r9:83216000 r8:83e65688 r7:df865e3c r6:ffffffff r5:20000013 r4:80235398 [ 528.290101][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 528.290213][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 528.290371][ C1] 5e00: e0223008 0000000d 00005484 809c820c e0223008 0000000d [ 528.290418][ C1] 5e20: 00000001 840eff68 83e65688 840efe40 00000000 df865e6c df865e70 df865e58 [ 528.290441][ C1] 5e40: 809c8228 80235398 20000013 ffffffff [ 528.290490][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 528.290551][ C1] r5:00000008 r4:840efe40 [ 528.290567][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 528.290627][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8419ec3c [ 528.290644][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.290691][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.290750][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83881d18 r5:00000001 [ 528.290770][ C1] r4:8419ec3c [ 528.290783][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 528.290828][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 528.290884][ C1] r5:000000ff r4:83304b14 [ 528.290900][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 528.290948][ C1] r5:000000ff r4:83304b14 [ 528.290964][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 528.291012][ C1] r5:000000ff r4:83304b14 [ 528.291028][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 528.291082][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 528.291100][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 528.291166][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 528.291184][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 528.291238][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 528.291303][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 528.291323][ C1] r4:00000092 [ 528.291336][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 528.291395][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 528.291463][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 528.291771][ C1] Sending NMI from CPU 1 to CPUs 0: [ 538.310171][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 538.327992][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 538.328338][ C1] Tainted: [L]=SOFTLOCKUP [ 538.328474][ C1] Hardware name: ARM-Versatile Express [ 538.328646][ C1] Call trace: frame pointer underflow [ 538.328969][ C1] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 538.329227][ C1] r7:822965a4 r6:83216000 r5:00000000 r4:82295754 [ 538.329437][ C1] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 538.329655][ C1] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 538.329884][ C1] r5:00000000 r4:82a7bd14 [ 538.330003][ C1] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 538.330257][ C1] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 538.330534][ C1] r7:82ac27f8 [ 538.330635][ C1] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 538.330869][ C1] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 538.331023][ C1] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 538.331291][ C1] r10:83216000 r9:00000000 r8:ddddb130 r7:80383cf0 r6:ddddb000 r5:ddddb040 [ 538.331500][ C1] r4:ddddb5d8 [ 538.331599][ C1] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 538.331860][ C1] r10:fbcb7f50 r9:ddddb180 r8:ddddb130 r7:0000007a r6:00000003 r5:20000193 [ 538.332041][ C1] r4:ddddb000 [ 538.332139][ C1] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 538.332388][ C1] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000001 r6:00000001 r5:82498528 [ 538.332589][ C1] r4:8309de40 [ 538.332753][ C1] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 538.333029][ C1] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 538.333252][ C1] r10:81c05450 r9:83216000 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 538.333412][ C1] r4:8280cc44 [ 538.333584][ C1] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 538.333969][ C1] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 538.334402][ C1] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 538.334845][ C1] r7:df805d18 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 538.335130][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 538.335443][ C1] Exception stack(0xdf805d18 to 0xdf805d60) [ 538.335688][ C1] 5d00: 00000001 00000000 [ 538.335918][ C1] 5d20: 00005485 00005484 840eff68 00000001 00000000 840eff68 83e65688 840efe40 [ 538.336183][ C1] 5d40: 81c05450 df805d7c df805d68 df805d68 81abbecc 81abbef4 80000113 ffffffff [ 538.336416][ C1] r9:83216000 r8:83e65688 r7:df805d4c r6:ffffffff r5:80000113 r4:81abbef4 [ 538.336738][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 538.336986][ C1] r5:00000001 r4:840efe40 [ 538.337119][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 538.337345][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8419ec00 [ 538.337510][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 538.337758][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 538.338030][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffbe4f r6:0000002a r5:00000000 [ 538.338245][ C1] r4:8419ec00 [ 538.338344][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 538.338588][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 538.338860][ C1] r5:83304844 r4:83304844 [ 538.338985][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 538.339289][ C1] r5:83304844 r4:85856ccc [ 538.339410][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 538.339691][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 538.339942][ C1] r7:ffffbe4f r6:809cd3b4 r5:85856ccc r4:83216000 [ 538.340159][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 538.340445][ C1] r9:df805ebc r8:ffffbe4f r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:85856ccc [ 538.340824][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 538.341259][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 538.341629][ C1] r4:dddd9f00 [ 538.341827][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 538.342291][ C1] r4:82804084 [ 538.342486][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 538.342925][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 538.343390][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 538.343759][ C1] r4:83216000 [ 538.344120][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 538.344538][ C1] r5:8247f0cc r4:826c3a9c [ 538.344805][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 538.345164][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 538.345432][ C1] r9:83216000 r8:83e65688 r7:df865e3c r6:ffffffff r5:20000013 r4:80235398 [ 538.345689][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 538.345887][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 538.346050][ C1] 5e00: e0223008 0000000d 00005484 809c820c e0223008 0000000d [ 538.346279][ C1] 5e20: 00000001 840eff68 83e65688 840efe40 00000000 df865e6c df865e70 df865e58 [ 538.346527][ C1] 5e40: 809c8228 80235398 20000013 ffffffff [ 538.346679][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 538.346908][ C1] r5:00000008 r4:840efe40 [ 538.347026][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 538.347271][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8419ec3c [ 538.347432][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 538.347703][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 538.347965][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83881d18 r5:00000001 [ 538.348217][ C1] r4:8419ec3c [ 538.348323][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 538.348610][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 538.348899][ C1] r5:000000ff r4:83304b14 [ 538.349076][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 538.349375][ C1] r5:000000ff r4:83304b14 [ 538.349489][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 538.349767][ C1] r5:000000ff r4:83304b14 [ 538.349903][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 538.350169][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 538.350364][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 538.350638][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 538.350843][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 538.351079][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 538.351328][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 538.351534][ C1] r4:00000092 [ 538.351632][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 538.351912][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 538.352298][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 539.750657][ C1] SMP: failed to stop secondary CPUs [ 539.751673][ C1] Rebooting in 86400 seconds..