last executing test programs: 3.07871325s ago: executing program 1 (id=2): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x2}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r1, 0x1, &(0x7f0000000040), 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) 2.913915058s ago: executing program 0 (id=1): r0 = io_uring_setup(0x180d, &(0x7f0000000140)={0x0, 0x4178, 0x400, 0x8001002, 0x3d7}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x20, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x5) r2 = accept$inet6(r1, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004000, &(0x7f00000001c0)={0xa, 0x4e22, 0x40000000, @empty, 0x1}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) write$binfmt_script(r2, &(0x7f0000000580)={'#! ', './file1'}, 0xb) 1.603200983s ago: executing program 0 (id=3): socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/vlan/vlan0\x00') syz_open_procfs(0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 1.571519196s ago: executing program 1 (id=4): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4) io_uring_setup(0x56ae, &(0x7f0000000040)={0x0, 0x370, 0xc000, 0x1, 0xa0002f5}) syz_clone(0x1144280, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) 1.349769811s ago: executing program 0 (id=5): r0 = socket(0xa, 0x3, 0x3a) syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x1, 0x6, "fbddf0", 0x8, 0x3a, 0xff, @empty, @mcast2, {[], @echo_reply={0x81, 0x0, 0x0, 0x2, 0x9}}}}}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000000)=0x742f1da7, 0x4) recvmmsg(r0, &(0x7f00000091c0)=[{{0x0, 0x0, 0x0}, 0x10}], 0x2f, 0x2, 0x0) 1.188677199s ago: executing program 0 (id=6): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) shutdown(r0, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x5) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) bind$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4004045) r1 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0x0, 0x399}) io_uring_enter(r1, 0x8ae, 0x6933, 0x17, 0x0, 0xeffd) 1.022871977s ago: executing program 0 (id=7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-aes-aesni)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) io_setup(0xff, &(0x7f0000000380)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x1000000, 0x0, 0x700000000000000, 0x8, 0x0, r1, 0x0}]) 0s ago: executing program 0 (id=8): r0 = io_uring_setup(0x650b, &(0x7f0000000180)={0x0, 0x2c3f, 0x0, 0x21, 0xab}) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) r2 = socket(0x28, 0x5, 0x0) r3 = socket(0x28, 0x5, 0x0) listen(r3, 0x4) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) recvfrom$inet_nvme(r2, 0x0, 0x0, 0x40000002, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): [ 44.835911][ T28] audit: type=1400 audit(44.750:91): avc: denied { read write } for pid=3091 comm="scp" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.838700][ T28] audit: type=1400 audit(44.750:92): avc: denied { open } for pid=3091 comm="scp" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:59145' (ED25519) to the list of known hosts. [ 62.709540][ T28] audit: type=1400 audit(62.610:93): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.283301][ T28] audit: type=1400 audit(64.200:94): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.309765][ T28] audit: type=1400 audit(64.210:95): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.677770][ T28] audit: type=1400 audit(67.590:96): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.684093][ T28] audit: type=1400 audit(67.600:97): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.701642][ T3095] cgroup: Unknown subsys name 'net' [ 67.712006][ T28] audit: type=1400 audit(67.630:98): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.858456][ T3095] cgroup: Unknown subsys name 'cpuset' [ 67.865819][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 67.866763][ T3095] cgroup: Unknown subsys name 'rlimit' [ 68.108125][ T28] audit: type=1400 audit(68.020:99): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.113385][ T28] audit: type=1400 audit(68.030:100): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.118015][ T28] audit: type=1400 audit(68.030:101): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.313541][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.317278][ T28] audit: type=1400 audit(68.230:102): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.327030][ T28] audit: type=1400 audit(68.240:103): avc: denied { write } for pid=3097 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.369413][ T28] audit: type=1400 audit(68.280:104): avc: denied { read } for pid=3095 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.374669][ T28] audit: type=1400 audit(68.290:105): avc: denied { open } for pid=3095 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.339734][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.596313][ T28] audit: type=1400 audit(78.510:106): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.654508][ T28] audit: type=1400 audit(78.570:107): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.656080][ T28] audit: type=1400 audit(78.570:108): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.662510][ T28] audit: type=1400 audit(78.580:109): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.681993][ T28] audit: type=1400 audit(78.600:110): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.760460][ T28] audit: type=1400 audit(78.680:111): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.473922][ T28] audit: type=1400 audit(79.390:112): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.436715][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.450335][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.581620][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.588135][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.334011][ T3100] hsr_slave_0: entered promiscuous mode [ 81.343016][ T3100] hsr_slave_1: entered promiscuous mode [ 81.508092][ T3101] hsr_slave_0: entered promiscuous mode [ 81.512170][ T3101] hsr_slave_1: entered promiscuous mode [ 81.513632][ T3101] debugfs: 'hsr0' already exists in 'hsr' [ 81.514170][ T3101] Cannot create hsr debugfs directory [ 81.911438][ T28] audit: type=1400 audit(81.820:113): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.911825][ T28] audit: type=1400 audit(81.820:114): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.911892][ T28] audit: type=1400 audit(81.820:115): avc: denied { read } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.921853][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.932137][ T3100] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 81.935695][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.944224][ T3100] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 81.956255][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.962924][ T3100] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 81.976647][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.983023][ T3100] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 82.058202][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.064298][ T3101] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 82.067825][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.073516][ T3101] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 82.112947][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.121817][ T3101] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 82.146742][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.153707][ T3101] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 82.743390][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.883890][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.392849][ T3101] veth0_vlan: entered promiscuous mode [ 85.424907][ T3101] veth1_vlan: entered promiscuous mode [ 85.496161][ T3100] veth0_vlan: entered promiscuous mode [ 85.517108][ T3100] veth1_vlan: entered promiscuous mode [ 85.564647][ T3101] veth0_macvtap: entered promiscuous mode [ 85.576485][ T3101] veth1_macvtap: entered promiscuous mode [ 85.611724][ T3100] veth0_macvtap: entered promiscuous mode [ 85.625821][ T3100] veth1_macvtap: entered promiscuous mode [ 85.707390][ T30] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.724263][ T30] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.724607][ T30] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.725591][ T30] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.725990][ T30] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.726180][ T30] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.726344][ T30] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.726462][ T30] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.842754][ T28] audit: type=1400 audit(85.760:116): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.874866][ T28] audit: type=1400 audit(85.790:117): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.Lx0OT1/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.885261][ T28] audit: type=1400 audit(85.800:118): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.900282][ T28] audit: type=1400 audit(85.820:119): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.tLVcBa/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.904964][ T28] audit: type=1400 audit(85.820:120): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.tLVcBa/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.921627][ T28] audit: type=1400 audit(85.840:121): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.930319][ T28] audit: type=1400 audit(85.840:122): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.930636][ T28] audit: type=1400 audit(85.840:123): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="gadgetfs" ino=2274 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.941386][ T28] audit: type=1400 audit(85.860:124): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.943400][ T28] audit: type=1400 audit(85.860:125): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.020833][ T3100] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.735297][ T3716] ªªªªªª: renamed from vlan0 (while UP) [ 89.236756][ T3718] ------------[ cut here ]------------ [ 89.237160][ T3718] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#1: syz.1.4/3718 [ 89.240204][ T3718] Modules linked in: [ 89.241604][ T3718] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 89.242830][ T3718] CPU: 1 UID: 0 PID: 3718 Comm: syz.1.4 Not tainted syzkaller #0 PREEMPT [ 89.243416][ T3718] Hardware name: ARM-Versatile Express [ 89.243915][ T3718] Call trace: [ 89.244420][ T3718] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 89.245138][ T3718] r7:82a1eab8 r6:00000000 r5:8231e54c r4:00000001 [ 89.245537][ T3718] [<80201af0>] (show_stack) from [<8021e384>] (dump_stack_lvl+0x5c/0x70) [ 89.245917][ T3718] [<8021e328>] (dump_stack_lvl) from [<8021e3b0>] (dump_stack+0x18/0x1c) [ 89.246372][ T3718] r7:82a1eab8 r6:00000000 r5:85177080 r4:82c7cd3c [ 89.246748][ T3718] [<8021e398>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 89.247227][ T3718] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 89.247833][ T3718] r7:80266184 [ 89.248066][ T3718] [<80202818>] (panic) from [<80250854>] (get_taint+0x0/0x1c) [ 89.248457][ T3718] r3:82a0b544 r2:00000001 r1:82305014 r0:8230c910 [ 89.248854][ T3718] [<802507dc>] (check_panic_on_warn) from [<802509d0>] (__warn+0x98/0x1ac) [ 89.249254][ T3718] [<80250938>] (__warn) from [<80250c5c>] (warn_slowpath_fmt+0x178/0x1f4) [ 89.249646][ T3718] r8:00000009 r7:8230db0c r6:e015debc r5:85177080 r4:00000000 [ 89.249925][ T3718] [<80250ae8>] (warn_slowpath_fmt) from [<80266184>] (do_notify_parent+0x37c/0x384) [ 89.250466][ T3718] r10:85177774 r9:00000000 r8:e015df68 r7:85177950 r6:00000080 r5:83fba580 [ 89.250804][ T3718] r4:85177080 [ 89.250982][ T3718] [<80265e08>] (do_notify_parent) from [<80257c6c>] (do_exit+0x7b8/0xb04) [ 89.251364][ T3718] r8:e015df68 r7:85177950 r6:85cb2e00 r5:83fba580 r4:85177080 [ 89.251746][ T3718] [<802574b4>] (do_exit) from [<80258148>] (do_group_exit+0x0/0x8c) [ 89.252087][ T3718] r7:00000001 [ 89.252248][ T3718] [<80258130>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 89.252937][ T3718] Exception stack(0xe015dfa8 to 0xe015dff0) [ 89.253374][ T3718] dfa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.253742][ T3718] dfc0: 00000000 00000000 00000000 00000001 003462d8 00000000 00000001 76f700dc [ 89.254131][ T3718] dfe0: 76f6fe60 76f6fe50 00019418 00130810 [ 89.256488][ T3718] Rebooting in 86400 seconds..