last executing test programs: 3.201459451s ago: executing program 0 (id=1757): r0 = openat$selinux_status(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x5451, 0x0) 3.118336912s ago: executing program 0 (id=1759): bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@map, 0x37, 0x1, 0x2, &(0x7f00000005c0)=[0x0], 0x1, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0x0, 0x0]}, 0x40) r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) 2.959673792s ago: executing program 0 (id=1761): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0086401, &(0x7f0000000080)={0x0, 0x0}) 2.959536502s ago: executing program 1 (id=1762): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) write$input_event(r1, 0x0, 0x0) 2.870233083s ago: executing program 0 (id=1763): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23, 0xa4e4, @remote, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000050) 2.864246344s ago: executing program 1 (id=1767): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000680)={0x2, 0x0, @remote}, 0x10) write$cgroup_devices(r0, 0x0, 0x0) 328.428148ms ago: executing program 0 (id=1764): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = dup(r0) ioctl$KDSKBMETA(r1, 0x4b63, 0x0) 327.121418ms ago: executing program 1 (id=1765): syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x400) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000140)={0x4000000, 0x100, 0x2}) 188.946246ms ago: executing program 1 (id=1766): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$FIONCLEX(r1, 0x5450) 188.782056ms ago: executing program 0 (id=1768): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) exit(0x1) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f40)={0x14, 0x0, 0x100, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20044081}, 0x0) 77.9347ms ago: executing program 1 (id=1769): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_GET_COALESCE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x20008819}, 0x0) 0s ago: executing program 1 (id=1770): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') exit(0xffff) fsetxattr(r0, &(0x7f0000000000)=@random={'user.', 'fdinfo\x00'}, 0x0, 0x0, 0x2) kernel console output (not intermixed with test programs): [ 52.459913][ T29] audit: type=1400 audit(52.390:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.464397][ T29] audit: type=1400 audit(52.400:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:41630' (ED25519) to the list of known hosts. [ 66.619653][ T29] audit: type=1400 audit(66.550:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 67.981253][ T29] audit: type=1400 audit(67.910:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.045028][ T29] audit: type=1400 audit(67.980:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.547752][ T29] audit: type=1400 audit(71.480:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 71.549985][ T29] audit: type=1400 audit(71.480:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.568350][ T3093] cgroup: Unknown subsys name 'net' [ 71.576212][ T29] audit: type=1400 audit(71.510:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.720717][ T3093] cgroup: Unknown subsys name 'cpuset' [ 71.727983][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 71.728977][ T3093] cgroup: Unknown subsys name 'rlimit' [ 71.946498][ T29] audit: type=1400 audit(71.880:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 71.948638][ T29] audit: type=1400 audit(71.880:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 71.950634][ T29] audit: type=1400 audit(71.880:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 72.156469][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 72.158034][ T29] audit: type=1400 audit(72.090:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.164406][ T29] audit: type=1400 audit(72.100:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 72.200653][ T29] audit: type=1400 audit(72.130:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.205195][ T29] audit: type=1400 audit(72.130:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 80.390702][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 82.096481][ T29] audit: type=1400 audit(82.030:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 82.150501][ T29] audit: type=1400 audit(82.080:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.163439][ T29] audit: type=1400 audit(82.090:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.163837][ T29] audit: type=1400 audit(82.090:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 82.182358][ T29] audit: type=1400 audit(82.110:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.184088][ T29] audit: type=1400 audit(82.110:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.227569][ T29] audit: type=1400 audit(82.160:77): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 82.836397][ T29] audit: type=1400 audit(82.760:78): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 83.977891][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.989537][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.996803][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.021939][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.871976][ T3098] hsr_slave_0: entered promiscuous mode [ 84.878997][ T3098] hsr_slave_1: entered promiscuous mode [ 84.940551][ T3099] hsr_slave_0: entered promiscuous mode [ 84.947289][ T3099] hsr_slave_1: entered promiscuous mode [ 84.951641][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 84.954308][ T3099] Cannot create hsr debugfs directory [ 85.378611][ T29] audit: type=1400 audit(85.310:79): avc: denied { create } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.380291][ T29] audit: type=1400 audit(85.310:80): avc: denied { write } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.400223][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.410163][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.427724][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 85.447128][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.457935][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 85.495700][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 85.514747][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 85.535128][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.161336][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.305181][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.955090][ T3098] veth0_vlan: entered promiscuous mode [ 88.974559][ T3098] veth1_vlan: entered promiscuous mode [ 89.030930][ T3098] veth0_macvtap: entered promiscuous mode [ 89.037390][ T3098] veth1_macvtap: entered promiscuous mode [ 89.086410][ T51] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.088350][ T51] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.088745][ T51] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.089010][ T51] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.148644][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 89.167927][ T29] audit: type=1400 audit(89.080:82): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 89.169008][ T29] audit: type=1400 audit(89.080:83): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.a8t9Zs/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 89.188653][ T29] audit: type=1400 audit(89.120:84): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 89.200391][ T29] audit: type=1400 audit(89.130:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.a8t9Zs/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 89.205174][ T29] audit: type=1400 audit(89.140:86): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.a8t9Zs/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 89.205969][ T3099] veth0_vlan: entered promiscuous mode [ 89.222401][ T29] audit: type=1400 audit(89.150:87): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 89.227763][ T29] audit: type=1400 audit(89.160:88): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 89.228078][ T3099] veth1_vlan: entered promiscuous mode [ 89.232209][ T29] audit: type=1400 audit(89.160:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 89.239692][ T29] audit: type=1400 audit(89.170:90): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 89.245193][ T29] audit: type=1400 audit(89.180:91): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 89.294392][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 89.327482][ T3099] veth0_macvtap: entered promiscuous mode [ 89.348632][ T3099] veth1_macvtap: entered promiscuous mode [ 89.446605][ T2483] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.447130][ T51] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.447429][ T51] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.447741][ T51] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.738708][ T3762] Zero length message leads to an empty skb [ 92.462413][ T3780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3780 comm=syz.1.36 [ 92.955603][ T3792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=3792 comm=syz.1.42 [ 94.916864][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 94.924524][ T29] audit: type=1400 audit(94.850:104): avc: denied { prog_load } for pid=3841 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 94.926267][ T29] audit: type=1400 audit(94.850:105): avc: denied { bpf } for pid=3841 comm="syz.0.67" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 95.200830][ T3854] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=3854 comm=syz.1.73 [ 96.757319][ T29] audit: type=1400 audit(96.690:106): avc: denied { ioctl } for pid=3874 comm="syz.0.83" path="socket:[3367]" dev="sockfs" ino=3367 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 97.528429][ T29] audit: type=1400 audit(97.460:107): avc: denied { create } for pid=3891 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.490024][ T29] audit: type=1400 audit(98.420:108): avc: denied { write } for pid=3919 comm="syz.1.105" name="arp" dev="proc" ino=4026532748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 98.838556][ T3936] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3936 comm=syz.0.113 [ 100.297109][ T29] audit: type=1400 audit(100.230:109): avc: denied { create } for pid=3970 comm="syz.0.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 100.309807][ T29] audit: type=1400 audit(100.240:110): avc: denied { write } for pid=3970 comm="syz.0.130" path="socket:[3528]" dev="sockfs" ino=3528 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 101.147372][ T29] audit: type=1400 audit(101.080:111): avc: denied { allowed } for pid=3989 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 101.163048][ T29] audit: type=1400 audit(101.090:112): avc: denied { create } for pid=3989 comm="syz.0.139" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 101.167430][ T29] audit: type=1400 audit(101.100:113): avc: denied { map } for pid=3989 comm="syz.0.139" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3554 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 101.172188][ T29] audit: type=1400 audit(101.100:114): avc: denied { read write } for pid=3989 comm="syz.0.139" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3554 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 101.255641][ T29] audit: type=1400 audit(101.190:115): avc: denied { create } for pid=3991 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 101.261761][ T29] audit: type=1400 audit(101.190:116): avc: denied { getopt } for pid=3991 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 102.931677][ T29] audit: type=1400 audit(102.860:117): avc: denied { write } for pid=4053 comm="syz.1.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 103.849365][ T4096] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 106.052152][ T29] audit: type=1400 audit(105.980:118): avc: denied { append } for pid=4178 comm="syz.1.227" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 109.121315][ T29] audit: type=1400 audit(109.050:119): avc: denied { append } for pid=4220 comm="syz.0.248" name="i2c-1" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 110.257545][ T4227] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4227 comm=syz.1.251 [ 110.549070][ T4233] capability: warning: `syz.1.254' uses deprecated v2 capabilities in a way that may be insecure [ 111.598304][ T29] audit: type=1400 audit(111.530:120): avc: denied { mount } for pid=4256 comm="syz.1.266" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 111.605921][ T29] audit: type=1400 audit(111.530:121): avc: denied { remount } for pid=4256 comm="syz.1.266" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 111.624310][ T29] audit: type=1400 audit(111.550:122): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 111.936281][ T4265] netlink: 4 bytes leftover after parsing attributes in process `syz.1.270'. [ 113.887033][ T4303] netlink: 68 bytes leftover after parsing attributes in process `syz.1.288'. [ 114.808210][ T29] audit: type=1400 audit(114.730:123): avc: denied { create } for pid=4321 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 114.808596][ T29] audit: type=1400 audit(114.740:124): avc: denied { setopt } for pid=4321 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 118.033808][ T4403] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=4403 comm=syz.0.337 [ 120.705213][ T4459] capability: warning: `syz.0.364' uses 32-bit capabilities (legacy support in use) [ 120.721477][ T29] audit: type=1400 audit(120.650:125): avc: denied { map } for pid=4458 comm="syz.1.363" path="socket:[4496]" dev="sockfs" ino=4496 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 121.001312][ T29] audit: type=1400 audit(120.930:126): avc: denied { map_create } for pid=4469 comm="syz.0.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 121.011174][ T29] audit: type=1400 audit(120.940:127): avc: denied { map_read map_write } for pid=4469 comm="syz.0.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 121.948434][ T4495] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4495 comm=syz.0.381 [ 122.117250][ T29] audit: type=1400 audit(122.050:128): avc: denied { accept } for pid=4498 comm="syz.0.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 125.535623][ T4540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=4540 comm=syz.0.402 [ 126.257833][ T29] audit: type=1400 audit(126.190:129): avc: denied { setopt } for pid=4567 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.184546][ T29] audit: type=1400 audit(127.110:130): avc: denied { ioctl } for pid=4575 comm="syz.1.420" path="socket:[4670]" dev="sockfs" ino=4670 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 128.533607][ T29] audit: type=1400 audit(128.450:131): avc: denied { create } for pid=4596 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 128.538806][ T29] audit: type=1400 audit(128.470:132): avc: denied { write } for pid=4596 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 128.793520][ T29] audit: type=1400 audit(128.720:133): avc: denied { ioctl } for pid=4608 comm="syz.0.436" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4738 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 131.444066][ T29] audit: type=1400 audit(131.370:134): avc: denied { ioctl } for pid=4698 comm="syz.1.477" path="socket:[4887]" dev="sockfs" ino=4887 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 131.448292][ T29] audit: type=1400 audit(131.380:135): avc: denied { write } for pid=4698 comm="syz.1.477" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 131.789748][ T29] audit: type=1400 audit(131.720:136): avc: denied { write } for pid=4712 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 131.796855][ T29] audit: type=1400 audit(131.730:137): avc: denied { read } for pid=4712 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 132.043860][ T29] audit: type=1400 audit(131.970:138): avc: denied { read } for pid=4722 comm="syz.1.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 133.768239][ T29] audit: type=1400 audit(133.700:139): avc: denied { connect } for pid=4758 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 134.574886][ T29] audit: type=1400 audit(134.510:140): avc: denied { connect } for pid=4794 comm="syz.1.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 135.325269][ T4825] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 135.329995][ T29] audit: type=1400 audit(135.260:141): avc: denied { ioctl } for pid=4824 comm="syz.0.540" path="socket:[6156]" dev="sockfs" ino=6156 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.174594][ T29] audit: type=1400 audit(136.110:142): avc: denied { create } for pid=4855 comm="syz.1.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 136.189999][ T29] audit: type=1400 audit(136.120:143): avc: denied { write } for pid=4855 comm="syz.1.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 136.190901][ T4857] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4857 comm=syz.1.556 [ 136.478654][ T4869] netlink: 220 bytes leftover after parsing attributes in process `syz.0.560'. [ 137.149423][ T29] audit: type=1400 audit(137.080:144): avc: denied { read } for pid=4895 comm="syz.1.578" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 137.149830][ T29] audit: type=1400 audit(137.080:145): avc: denied { open } for pid=4895 comm="syz.1.578" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 137.899211][ T4925] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4925 comm=syz.0.589 [ 138.114644][ T29] audit: type=1400 audit(138.050:146): avc: denied { connect } for pid=4931 comm="syz.0.593" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 138.119130][ T29] audit: type=1400 audit(138.050:147): avc: denied { write } for pid=4931 comm="syz.0.593" path="socket:[6350]" dev="sockfs" ino=6350 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 138.537530][ T29] audit: type=1400 audit(138.470:148): avc: denied { ioctl } for pid=4947 comm="syz.1.600" path="socket:[7347]" dev="sockfs" ino=7347 ioctlcmd=0x1269 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 138.942631][ T29] audit: type=1400 audit(138.870:149): avc: denied { create } for pid=4964 comm="syz.1.609" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 138.949443][ T29] audit: type=1400 audit(138.880:150): avc: denied { read write } for pid=4964 comm="syz.1.609" name="file0" dev="tmpfs" ino=1658 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 138.952519][ T29] audit: type=1400 audit(138.880:151): avc: denied { open } for pid=4964 comm="syz.1.609" path="/319/file0" dev="tmpfs" ino=1658 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 138.976478][ T29] audit: type=1400 audit(138.900:152): avc: denied { unlink } for pid=3099 comm="syz-executor" name="file0" dev="tmpfs" ino=1658 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 139.576575][ T29] audit: type=1400 audit(139.510:153): avc: denied { mount } for pid=4988 comm="syz.1.622" name="/" dev="ramfs" ino=7411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 139.580988][ T4990] ======================================================= [ 139.580988][ T4990] WARNING: The mand mount option has been deprecated and [ 139.580988][ T4990] and is ignored by this kernel. Remove the mand [ 139.580988][ T4990] option from the mount to silence this warning. [ 139.580988][ T4990] ======================================================= [ 148.861774][ T5114] netlink: 220 bytes leftover after parsing attributes in process `syz.1.685'. [ 152.202555][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 152.205923][ T29] audit: type=1400 audit(152.130:161): avc: denied { ioctl } for pid=5209 comm="syz.0.732" path="/351/file0" dev="tmpfs" ino=1821 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 152.776164][ T29] audit: type=1400 audit(152.710:162): avc: denied { ioctl } for pid=5230 comm="syz.0.739" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x4560 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 152.778584][ T5231] binder: 5230:5231 ioctl 80184560 0 returned -22 [ 155.618176][ T5264] binder: 5263:5264 ioctl 80184560 0 returned -22 [ 156.917791][ T5280] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1014 sclass=netlink_route_socket pid=5280 comm=syz.0.762 [ 158.687788][ T29] audit: type=1400 audit(158.620:163): avc: denied { setopt } for pid=5289 comm="syz.0.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 163.658029][ T29] audit: type=1400 audit(163.590:164): avc: denied { create } for pid=5384 comm="syz.1.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 163.668151][ T29] audit: type=1400 audit(163.600:165): avc: denied { setopt } for pid=5384 comm="syz.1.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 166.247967][ T5402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5402 comm=syz.1.819 [ 168.915724][ T5409] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1538 sclass=netlink_tcpdiag_socket pid=5409 comm=syz.1.822 [ 170.194266][ T29] audit: type=1400 audit(170.130:166): avc: denied { ioctl } for pid=5442 comm="syz.1.842" path="net:[4026532737]" dev="nsfs" ino=4026532737 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 173.147931][ T5470] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5470 comm=syz.0.852 [ 176.327617][ T29] audit: type=1400 audit(176.260:167): avc: denied { getopt } for pid=5499 comm="syz.0.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 184.914982][ T11] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 185.075980][ T11] usb 1-1: unable to get BOS descriptor or descriptor too short [ 185.081872][ T11] usb 1-1: config 1 has an invalid interface number: 6 but max is 0 [ 185.084505][ T11] usb 1-1: config 1 has no interface number 0 [ 185.084927][ T11] usb 1-1: config 1 interface 6 has no altsetting 0 [ 185.097522][ T11] usb 1-1: New USB device found, idVendor=05d1, idProduct=2002, bcdDevice=53.35 [ 185.097743][ T11] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 185.097909][ T11] usb 1-1: Product: syz [ 185.098077][ T11] usb 1-1: Manufacturer: syz [ 185.098124][ T11] usb 1-1: SerialNumber: syz [ 190.161857][ T11] ftdi_sio 1-1:1.6: FTDI USB Serial Device converter detected [ 190.173946][ T11] ftdi_sio ttyUSB0: unknown device type: 0x5335 [ 190.178408][ T11] usb 1-1: USB disconnect, device number 2 [ 190.194156][ T11] ftdi_sio 1-1:1.6: device disconnected [ 194.704430][ T29] audit: type=1400 audit(194.640:168): avc: denied { nlmsg_read } for pid=5770 comm="syz.0.994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 194.805935][ T29] audit: type=1400 audit(194.740:169): avc: denied { getopt } for pid=5772 comm="syz.0.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 202.764875][ T3705] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 202.897251][ T29] audit: type=1400 audit(202.830:170): avc: denied { create } for pid=5818 comm="syz.0.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 202.907151][ T29] audit: type=1400 audit(202.840:171): avc: denied { setopt } for pid=5818 comm="syz.0.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 203.595225][ T29] audit: type=1400 audit(203.530:172): avc: denied { create } for pid=5840 comm="syz.1.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 207.792356][ T29] audit: type=1400 audit(207.720:173): avc: denied { setopt } for pid=5914 comm="syz.1.1058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 218.837872][ T29] audit: type=1400 audit(218.770:174): avc: denied { setopt } for pid=6122 comm="syz.0.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 219.895089][ T29] audit: type=1400 audit(219.830:175): avc: denied { ioctl } for pid=6168 comm="syz.1.1183" path="socket:[10541]" dev="sockfs" ino=10541 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 220.038366][ T29] audit: type=1400 audit(219.970:176): avc: denied { create } for pid=6178 comm="syz.1.1187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 220.049497][ T29] audit: type=1400 audit(219.980:177): avc: denied { connect } for pid=6178 comm="syz.1.1187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 220.557735][ T29] audit: type=1400 audit(220.490:178): avc: denied { setopt } for pid=6178 comm="syz.1.1187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 232.624747][ T6346] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6346 comm=syz.1.1268 [ 236.932547][ T29] audit: type=1400 audit(236.830:179): avc: denied { mount } for pid=6450 comm="syz.0.1321" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 246.214774][ T6532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=272 sclass=netlink_route_socket pid=6532 comm=syz.1.1357 [ 247.396036][ T6557] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=272 sclass=netlink_route_socket pid=6557 comm=syz.0.1369 [ 247.819643][ T6576] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6576 comm=syz.1.1378 [ 249.095435][ T29] audit: type=1400 audit(249.030:180): avc: denied { ioctl } for pid=6607 comm="syz.1.1395" path="socket:[12308]" dev="sockfs" ino=12308 ioctlcmd=0x9363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 251.140527][ T6655] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 251.141360][ T6655] syz.1.1418: vmalloc error: size 536870904, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 251.146594][ T29] audit: type=1400 audit(251.080:181): avc: denied { getopt } for pid=6654 comm="syz.1.1418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 251.147706][ T6655] ,cpuset=/,mems_allowed=0 [ 251.149371][ T6655] CPU: 0 UID: 0 PID: 6655 Comm: syz.1.1418 Tainted: G L syzkaller #0 PREEMPT [ 251.149643][ T6655] Tainted: [L]=SOFTLOCKUP [ 251.149687][ T6655] Hardware name: ARM-Versatile Express [ 251.149993][ T6655] Call trace: [ 251.150240][ T6655] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 251.151214][ T6655] r7:ffffffff r6:822b1608 r5:60000013 r4:822956f0 [ 251.151307][ T6655] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 251.151421][ T6655] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 251.151492][ T6655] r5:8397ec00 r4:00000000 [ 251.151510][ T6655] [<8021ee30>] (dump_stack) from [<80509890>] (warn_alloc+0xd8/0x180) [ 251.151647][ T6655] [<805097b8>] (warn_alloc) from [<804f7d94>] (__vmalloc_node_range_noprof+0xc0/0x654) [ 251.151709][ T6655] r3:1ffffff8 r2:822b1608 [ 251.151733][ T6655] r6:00000dc0 r5:822b1640 r4:ff800000 [ 251.151752][ T6655] [<804f7cd4>] (__vmalloc_node_range_noprof) from [<8051b014>] (__kvmalloc_node_noprof+0x294/0x700) [ 251.151942][ T6655] r10:e0165d00 r9:85349000 r8:8397ec00 r7:00000000 r6:000002d0 r5:00000400 [ 251.152044][ T6655] r4:1ffffff8 [ 251.152087][ T6655] [<8051ad80>] (__kvmalloc_node_noprof) from [<8176c4b4>] (xt_alloc_entry_offsets+0x28/0x34) [ 251.152176][ T6655] r10:e0165d00 r9:85349000 r8:00000000 r7:00000000 r6:000002d0 r5:85349040 [ 251.152207][ T6655] r4:07fffffe [ 251.152226][ T6655] [<8176c48c>] (xt_alloc_entry_offsets) from [<818fae1c>] (translate_table+0x70/0x78c) [ 251.152308][ T6655] [<818fadac>] (translate_table) from [<818fbff8>] (do_replace+0xe8/0x5d0) [ 251.152381][ T6655] r10:b5403587 r9:85349040 r8:00000000 r7:20000060 r6:000002d0 r5:85349000 [ 251.152402][ T6655] r4:859e8f80 [ 251.152418][ T6655] [<818fbf10>] (do_replace) from [<818fc614>] (do_ip6t_set_ctl+0x134/0x2a0) [ 251.152506][ T6655] r10:00000126 r9:81599cc4 r8:00000330 r7:84ad4a64 r6:e0165da8 r5:846ea940 [ 251.152528][ T6655] r4:00000040 [ 251.152545][ T6655] [<818fc4e0>] (do_ip6t_set_ctl) from [<816f4b58>] (nf_setsockopt+0x60/0x7c) [ 251.152616][ T6655] r10:00000126 r9:81599cc4 r8:00000330 r7:84ad4a64 r6:846ea940 r5:818fc4e0 [ 251.152638][ T6655] r4:829f4ef8 [ 251.152654][ T6655] [<816f4afc>] (nf_setsockopt) from [<818b24b4>] (ipv6_setsockopt+0x9c/0xbc) [ 251.152833][ T6655] r6:00000330 r5:846ea940 r4:00000040 [ 251.152859][ T6655] [<818b241c>] (ipv6_setsockopt) from [<817a3770>] (tcp_setsockopt+0x3c/0x58) [ 251.152993][ T6655] r6:00000029 r5:84ad4540 r4:818b2418 [ 251.153017][ T6655] [<817a3738>] (tcp_setsockopt) from [<81599cfc>] (sock_common_setsockopt+0x38/0x40) [ 251.153109][ T6655] r4:817a3734 [ 251.153126][ T6655] [<81599cc8>] (sock_common_setsockopt) from [<819a640c>] (smc_setsockopt+0xac/0x3cc) [ 251.153212][ T6655] r4:00000040 [ 251.153232][ T6655] [<819a6364>] (smc_setsockopt) from [<81595538>] (do_sock_setsockopt+0x70/0xc8) [ 251.153314][ T6655] r9:8397ec00 r8:00000330 r7:837fd900 r6:00000040 r5:00000029 r4:819a6360 [ 251.153339][ T6655] [<815954c8>] (do_sock_setsockopt) from [<81598994>] (__sys_setsockopt+0x7c/0xc4) [ 251.153414][ T6655] r8:00000000 r7:853ec240 r6:853ec241 r5:00000040 r4:00000029 [ 251.153433][ T6655] [<81598918>] (__sys_setsockopt) from [<815989f8>] (sys_setsockopt+0x1c/0x24) [ 251.153538][ T6655] r8:8020029c r7:00000126 r6:00316318 r5:00000000 r4:00000330 [ 251.153555][ T6655] [<815989dc>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 251.153681][ T6655] Exception stack(0xe0165fa8 to 0xe0165ff0) [ 251.153884][ T6655] 5fa0: 00000330 00000000 00000003 00000029 00000040 20000000 [ 251.153941][ T6655] 5fc0: 00000330 00000000 00316318 00000126 00300000 00000000 00006364 76fc80bc [ 251.153969][ T6655] 5fe0: 76fc7ec0 76fc7eb0 0001929c 00132320 [ 251.163960][ T6655] Mem-Info: [ 251.164555][ T6655] active_anon:1296 inactive_anon:0 isolated_anon:0 [ 251.164555][ T6655] active_file:3584 inactive_file:37907 isolated_file:0 [ 251.164555][ T6655] unevictable:768 dirty:14 writeback:0 [ 251.164555][ T6655] slab_reclaimable:1086 slab_unreclaimable:5389 [ 251.164555][ T6655] mapped:2307 shmem:777 pagetables:360 [ 251.164555][ T6655] sec_pagetables:0 bounce:0 [ 251.164555][ T6655] kernel_misc_reclaimable:0 [ 251.164555][ T6655] free:437315 free_pcp:654 free_cma:4032 [ 251.164920][ T6655] Node 0 active_anon:5184kB inactive_anon:0kB active_file:14336kB inactive_file:151628kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9228kB dirty:56kB writeback:0kB shmem:3108kB kernel_stack:1584kB pagetables:1440kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 251.165420][ T6655] Normal free:1386240kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:1104kB unevictable:0kB writepending:24kB zspages:0kB present:1556480kB managed:1426900kB mlocked:0kB bounce:0kB free_pcp:2616kB local_pcp:836kB free_cma:0kB [ 251.165522][ T6655] lowmem_reserve[]: 0 4224 4224 [ 251.165813][ T6655] Normal: 0*4kB 2*8kB (ME) 3*16kB (UME) 2*32kB (ME) 4*64kB (UME) 9*128kB (UE) 7*256kB (UM) 9*512kB (UM) 8*1024kB (UME) 3*2048kB (ME) 333*4096kB (UM) = 1386240kB [ 251.166950][ T6655] 42268 total pagecache pages [ 251.167010][ T6655] 0 pages in swap cache [ 251.167045][ T6655] Free swap = 124996kB [ 251.167077][ T6655] Total swap = 124996kB [ 251.167183][ T6655] 524288 pages RAM [ 251.167223][ T6655] 135168 pages HighMem/MovableOnly [ 251.167268][ T6655] 32395 pages reserved [ 251.167352][ T6655] 4096 pages cma reserved [ 254.231492][ T6681] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6681 comm=syz.0.1428 [ 254.677232][ T6701] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6701 comm=syz.0.1442 [ 255.032262][ T29] audit: type=1400 audit(254.960:182): avc: denied { create } for pid=6716 comm="syz.0.1447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 255.041188][ T29] audit: type=1400 audit(254.970:183): avc: denied { ioctl } for pid=6716 comm="syz.0.1447" path="socket:[12230]" dev="sockfs" ino=12230 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 255.390796][ T29] audit: type=1400 audit(255.320:184): avc: denied { create } for pid=6731 comm="syz.0.1454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 255.400339][ T29] audit: type=1400 audit(255.330:185): avc: denied { write } for pid=6731 comm="syz.0.1454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 256.124436][ T6747] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 257.178002][ T29] audit: type=1400 audit(257.110:186): avc: denied { write } for pid=6795 comm="syz.1.1486" path="socket:[13393]" dev="sockfs" ino=13393 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 265.582067][ T6819] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6819 comm=syz.1.1497 [ 280.750219][ T7028] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7028 comm=syz.1.1604 [ 284.987094][ T7088] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7088 comm=syz.0.1629 [ 297.891962][ T7329] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7329 comm=syz.1.1751 [ 298.349922][ T29] audit: type=1400 audit(298.280:187): avc: denied { getopt } for pid=7343 comm="syz.0.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 726.213301][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 726.213869][ C0] Modules linked in: [ 726.214201][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.214275][ C0] Tainted: [L]=SOFTLOCKUP [ 726.214294][ C0] Hardware name: ARM-Versatile Express [ 726.214343][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 726.214464][ C0] LR is at tmigr_handle_remote_up+0x180/0x4b0 [ 726.214524][ C0] pc : [<81abba7c>] lr : [<80346d0c>] psr: 60000113 [ 726.214560][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 726.214593][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 726.214631][ C0] r7 : ddddb4a0 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 726.214669][ C0] r3 : 00002112 r2 : ffffffff r1 : 00000000 r0 : 830bf380 [ 726.214791][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 726.214854][ C0] Control: 30c5387d Table: 85201280 DAC: fffffffd [ 726.214910][ C0] Call trace: [ 726.214954][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346d0c>] (tmigr_handle_remote_up+0x180/0x4b0) [ 726.215047][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 726.215123][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 726.215159][ C0] r4:830bf380 [ 726.215174][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 726.215249][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 726.215281][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 726.215353][ C0] r4:82804084 [ 726.215370][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.215446][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.215516][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 726.215535][ C0] r4:8281b500 [ 726.215550][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.215610][ C0] r5:8247f12c r4:826c3a9c [ 726.215626][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 726.215689][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.215750][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.215787][ C0] 1dc0: 00000001 00000000 [ 726.215829][ C0] 1de0: 00009485 00009483 840a3168 00000004 00000001 840a3168 8403de88 840a3040 [ 726.215861][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 726.215896][ C0] r9:8281b500 r8:8403de88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 726.215912][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 726.215996][ C0] r5:00000004 r4:840a3040 [ 726.216012][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 726.216092][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84091568 [ 726.216113][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.216167][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.216232][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8391b3d8 r5:00000001 [ 726.216250][ C0] r4:84091568 [ 726.216265][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 726.216313][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 726.216367][ C0] r5:000000ff r4:83335a24 [ 726.216382][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 726.216440][ C0] r5:000000ff r4:83335a24 [ 726.216455][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 726.216511][ C0] r5:000000ff r4:83335a24 [ 726.216526][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 726.216585][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.216601][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.216671][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.216688][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.216764][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.216845][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 726.216866][ C0] r4:000000ed [ 726.216880][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 726.216949][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.217017][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.217818][ C0] Sending NMI from CPU 0 to CPUs 1: [ 726.218628][ C1] NMI backtrace for cpu 1 [ 726.218825][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 726.218887][ C1] Tainted: [L]=SOFTLOCKUP [ 726.218903][ C1] Hardware name: ARM-Versatile Express [ 726.218936][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 726.219010][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 726.219038][ C1] pc : [<81abbc34>] lr : [<81abbc0c>] psr: 80000113 [ 726.219060][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 726.219078][ C1] r10: 81c05450 r9 : 840a3040 r8 : 8403de88 [ 726.219097][ C1] r7 : 840a3168 r6 : 00000000 r5 : 00000001 r4 : 840a3168 [ 726.219119][ C1] r3 : 00009483 r2 : 00009484 r1 : 00000000 r0 : 00000001 [ 726.219142][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 726.219173][ C1] Control: 30c5387d Table: 85c6d740 DAC: 00000000 [ 726.219191][ C1] Call trace: frame pointer underflow [ 726.219270][ C1] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 726.219346][ C1] r5:00000001 r4:840a3040 [ 726.219361][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 726.219427][ C1] r7:00000000 r6:00000000 r5:00000000 r4:84091540 [ 726.219442][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.219497][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.219563][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:0000013d r6:0000000a r5:00000000 [ 726.219582][ C1] r4:84091540 [ 726.219596][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 726.219643][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 726.219692][ C1] r5:83335844 r4:83335844 [ 726.219706][ C1] [<809cc860>] (gpio_led_set) from [<809ca154>] (led_set_brightness_nosleep+0x38/0x44) [ 726.219759][ C1] r5:83335844 r4:8391b30c [ 726.219772][ C1] [<809ca11c>] (led_set_brightness_nosleep) from [<809cd1b8>] (led_heartbeat_function+0x84/0x144) [ 726.219821][ C1] [<809cd134>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 726.219883][ C1] r7:0000013d r6:809cd134 r5:8391b30c r4:83216000 [ 726.219898][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 726.219959][ C1] r9:df805ebc r8:0000013d r7:00000000 r6:809cd134 r5:dddd9f00 r4:8391b30c [ 726.219974][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 726.220036][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.220058][ C1] r4:dddd9f00 [ 726.220073][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 726.220126][ C1] r4:82804084 [ 726.220139][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.220194][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.220268][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 726.220286][ C1] r4:83216000 [ 726.220301][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.220355][ C1] r5:8247f12c r4:826c3a9c [ 726.220368][ C1] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 726.220433][ C1] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 726.220502][ C1] r9:83216000 r8:8403de88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7fac [ 726.220518][ C1] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.220570][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 726.220608][ C1] 5e00: e0203008 00000009 00009483 00000000 e0203008 00000009 [ 726.220640][ C1] 5e20: 00000001 840a3168 8403de88 840a3040 00000000 df865e6c df865e58 df865e58 [ 726.220664][ C1] 5e40: 809c7fa8 809c7fac 60000013 ffffffff [ 726.220682][ C1] [<809c7f8c>] (gpio_mmio_write32) from [<809c77cc>] (gpio_mmio_set+0x64/0x80) [ 726.220743][ C1] r5:00000008 r4:840a3040 [ 726.220758][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 726.220822][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8409157c [ 726.220836][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.220894][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.220958][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8391b418 r5:00000001 [ 726.220976][ C1] r4:8409157c [ 726.220989][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 726.221034][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 726.221136][ C1] r5:000000ff r4:83335b14 [ 726.221152][ C1] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 726.221202][ C1] r5:000000ff r4:83335b14 [ 726.221216][ C1] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 726.221273][ C1] r5:000000ff r4:83335b14 [ 726.221287][ C1] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 726.221345][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.221359][ C1] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.221425][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.221443][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.221500][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.221570][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.221589][ C1] r4:00000092 [ 726.221602][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.221662][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.221731][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.222928][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 726.256185][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.256564][ C0] Tainted: [L]=SOFTLOCKUP [ 726.256722][ C0] Hardware name: ARM-Versatile Express [ 726.256926][ C0] Call trace: [ 726.257213][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.257568][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 726.257779][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 726.258079][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 726.258385][ C0] r5:00000000 r4:82a7bd14 [ 726.258557][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 726.258877][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 726.259208][ C0] r7:82ac27f8 [ 726.259349][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 726.259677][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 726.259890][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 726.260284][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 726.260555][ C0] r4:dddc75d8 [ 726.260689][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 726.261084][ C0] r10:11ec7fd0 r9:dddc7180 r8:dddc7130 r7:000000a9 r6:00000003 r5:20000193 [ 726.261366][ C0] r4:dddc7000 [ 726.261499][ C0] [<8032b020>] (hrtimer_interrupt) from [<81340630>] (arch_timer_handler_virt+0x30/0x38) [ 726.261932][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 726.262216][ C0] r4:8309de40 [ 726.262376][ C0] [<81340600>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 726.262785][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 726.263175][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 726.263471][ C0] r4:8280cc44 [ 726.263636][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 726.264022][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 726.264407][ C0] [<80201260>] (gic_handle_irq) from [<81aad688>] (generic_handle_arch_irq+0x60/0x80) [ 726.264770][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 726.265013][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.265417][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 726.265669][ C0] 1b80: 830bf380 00000000 ffffffff 00002112 [ 726.265992][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb4a0 00000001 8280c9a4 00000001 82801bec [ 726.266302][ C0] 1bc0: 82801bf0 82801be0 80346d0c 81abba7c 60000113 ffffffff [ 726.266596][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba7c [ 726.266893][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346d0c>] (tmigr_handle_remote_up+0x180/0x4b0) [ 726.267275][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 726.267692][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 726.268167][ C0] r4:830bf380 [ 726.268318][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 726.268692][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 726.269002][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 726.269377][ C0] r4:82804084 [ 726.269531][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.269851][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.270200][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 726.270503][ C0] r4:8281b500 [ 726.270643][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.270969][ C0] r5:8247f12c r4:826c3a9c [ 726.271141][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 726.271460][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.271780][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.271963][ C0] 1dc0: 00000001 00000000 [ 726.272202][ C0] 1de0: 00009485 00009483 840a3168 00000004 00000001 840a3168 8403de88 840a3040 [ 726.272539][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 726.272811][ C0] r9:8281b500 r8:8403de88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 726.273095][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 726.273403][ C0] r5:00000004 r4:840a3040 [ 726.273568][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 726.273876][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84091568 [ 726.274127][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.274455][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.274817][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8391b3d8 r5:00000001 [ 726.275073][ C0] r4:84091568 [ 726.275193][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 726.275471][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 726.275734][ C0] r5:000000ff r4:83335a24 [ 726.275863][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 726.276125][ C0] r5:000000ff r4:83335a24 [ 726.276256][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 726.276542][ C0] r5:000000ff r4:83335a24 [ 726.276675][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 726.276938][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.277145][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.277466][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.277723][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.278020][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.278318][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 726.278573][ C0] r4:000000ed [ 726.278731][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 726.279052][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.279349][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.281752][ C0] Rebooting in 86400 seconds..