last executing test programs: 11.590591816s ago: executing program 0 (id=84): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x50, 0x10, 0x1, 0x70bd2c, 0x20, {0x0, 0x0, 0x0, 0x0, 0xdf15003157970113, 0x20c0}, [@IFLA_IFNAME={0x14, 0x3, 'netdevsim0\x00'}, @IFLA_VFINFO_LIST={0x1c, 0x16, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8, 0xbbf}}]}]}]}, 0x50}}, 0x20000010) 11.490334962s ago: executing program 0 (id=85): r0 = syz_open_dev$sndctrl(&(0x7f0000000300), 0x0, 0x880) read(r0, 0x0, 0x0) 11.390214649s ago: executing program 0 (id=86): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x6, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f00000000c0)='GPL\x00'}, 0x94) 11.310084525s ago: executing program 0 (id=87): rseq(&(0x7f0000001080)={0x0, 0x0, 0x0, 0x1}, 0x20, 0x0, 0x0) r0 = syz_clone(0x100000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r0, 0x0, 0x61000004, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) 9.670777254s ago: executing program 0 (id=88): r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x40007, @empty, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0x9, @mcast1, 0x8}, 0x1c) 9.57922669s ago: executing program 0 (id=89): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0xc040, 0x0) inotify_init1(0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0xec29, 0x800, 0x1, 0x40000337}, &(0x7f0000000dc0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0xfffffffffffffffe, &(0x7f0000000600)=[{0x0}], 0x1}) io_uring_enter(r2, 0x847ba, 0x0, 0xe, 0x0, 0x0) 2.69201896s ago: executing program 1 (id=105): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', 0x0) 2.617787915s ago: executing program 1 (id=106): bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newqdisc={0x4c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x100, 0x65, 0x3, 0xd913, 0x81, 0x1}}}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}}}, 0x24}}, 0x0) 2.119942198s ago: executing program 1 (id=107): connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24040014, &(0x7f0000000000)={0xa, 0x4e22, 0x7, @empty, 0xfffffffe}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000070058000b480400945f640094272d7061d328b92d0000000000008000f0fffeffe809000000fff5dd00000010000100040808004149004001040800", 0x58}], 0x1) 1.775256681s ago: executing program 1 (id=108): syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000740)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x8, 0x10c4, 0x8acf, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0x80, 0x40, [{{0x9, 0x4, 0x0, 0xfd, 0x2, 0x3, 0x1, 0x2, 0x9, {0x9, 0x21, 0xb6da, 0x40, 0x1, {0x22, 0x220}}, {{{0x9, 0x5, 0x81, 0x3, 0x210, 0x5, 0x6, 0x7}}}}}]}}]}}, &(0x7f0000000ac0)={0x0, 0x0, 0xf, &(0x7f00000007c0)=ANY=[@ANYBLOB="050f0f0001061003"], 0x1, [{0x0, 0x0}]}) 420.712032ms ago: executing program 1 (id=109): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r2 = syz_io_uring_setup(0x131, &(0x7f0000000340)={0x0, 0x5cb1, 0x2, 0x3, 0xfffffffd}, &(0x7f0000000140)=0x0, &(0x7f0000000280)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f00000000c0)=0x200, 0x0, 0x4) io_uring_enter(r2, 0x1e76, 0xf728, 0x5, 0x0, 0x0) 0s ago: executing program 1 (id=110): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xd}}, &(0x7f00000000c0)='syzkaller\x00'}, 0x94) syz_usb_connect(0x2, 0x2d, &(0x7f0000000240)=ANY=[@ANYBLOB="120100000c9768405e0483020b9901e4020109021b000100000000090400fb0160291d00090509a9143c"], 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x3, 0x1) write$P9_RVERSION(r0, &(0x7f0000000640)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x5ce) kernel console output (not intermixed with test programs): [ 53.246550][ T29] audit: type=1400 audit(53.140:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.272832][ T29] audit: type=1400 audit(53.170:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:56269' (ED25519) to the list of known hosts. [ 70.326500][ T29] audit: type=1400 audit(70.200:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 72.416156][ T29] audit: type=1400 audit(72.290:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.441807][ T29] audit: type=1400 audit(72.330:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 75.367488][ T29] audit: type=1400 audit(75.260:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 75.373220][ T29] audit: type=1400 audit(75.270:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.386552][ T3090] cgroup: Unknown subsys name 'net' [ 75.393639][ T29] audit: type=1400 audit(75.290:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.595382][ T3090] cgroup: Unknown subsys name 'cpuset' [ 75.602214][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 75.603173][ T3090] cgroup: Unknown subsys name 'rlimit' [ 75.858482][ T29] audit: type=1400 audit(75.750:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.865035][ T29] audit: type=1400 audit(75.760:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.868805][ T29] audit: type=1400 audit(75.760:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 76.054654][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 76.058001][ T29] audit: type=1400 audit(75.950:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.066420][ T29] audit: type=1400 audit(75.960:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 76.094988][ T29] audit: type=1400 audit(75.990:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.097559][ T29] audit: type=1400 audit(75.990:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 84.546474][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 86.446797][ T29] audit: type=1400 audit(86.340:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.526401][ T29] audit: type=1400 audit(86.420:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.531970][ T29] audit: type=1400 audit(86.420:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.537654][ T29] audit: type=1400 audit(86.430:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 86.575942][ T29] audit: type=1400 audit(86.470:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.577977][ T29] audit: type=1400 audit(86.470:76): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.677814][ T29] audit: type=1400 audit(86.570:77): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 87.462650][ T29] audit: type=1400 audit(87.360:78): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.449748][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.457450][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.546198][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.555843][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.336005][ T3096] hsr_slave_0: entered promiscuous mode [ 89.339551][ T3096] hsr_slave_1: entered promiscuous mode [ 89.420039][ T3095] hsr_slave_0: entered promiscuous mode [ 89.425740][ T3095] hsr_slave_1: entered promiscuous mode [ 89.427948][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 89.429171][ T3095] Cannot create hsr debugfs directory [ 89.886163][ T29] audit: type=1400 audit(89.780:79): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.889362][ T29] audit: type=1400 audit(89.780:80): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.903546][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.930379][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.954772][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.977307][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 90.035589][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 90.056834][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 90.068343][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 90.088261][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 90.838077][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.930562][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.350436][ T3095] veth0_vlan: entered promiscuous mode [ 93.363954][ T3095] veth1_vlan: entered promiscuous mode [ 93.407471][ T3095] veth0_macvtap: entered promiscuous mode [ 93.414651][ T3095] veth1_macvtap: entered promiscuous mode [ 93.505635][ T1307] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.506335][ T1307] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.518740][ T1307] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.519169][ T1307] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.680985][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 93.683241][ T29] audit: type=1400 audit(93.570:82): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 93.688821][ T29] audit: type=1400 audit(93.580:83): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.gpp5BZ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 93.698445][ T29] audit: type=1400 audit(93.590:84): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 93.715388][ T29] audit: type=1400 audit(93.600:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.gpp5BZ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 93.722309][ T29] audit: type=1400 audit(93.610:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.gpp5BZ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2464 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 93.749499][ T29] audit: type=1400 audit(93.640:87): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 93.764241][ T29] audit: type=1400 audit(93.660:88): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 93.768398][ T29] audit: type=1400 audit(93.660:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=2465 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 93.793026][ T29] audit: type=1400 audit(93.680:90): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 93.797206][ T3096] veth0_vlan: entered promiscuous mode [ 93.804210][ T29] audit: type=1400 audit(93.700:91): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 93.868092][ T3096] veth1_vlan: entered promiscuous mode [ 93.880349][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 93.990820][ T3096] veth0_macvtap: entered promiscuous mode [ 94.034159][ T3096] veth1_macvtap: entered promiscuous mode [ 94.146963][ T1307] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.152303][ T1307] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.153614][ T1307] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.154655][ T1307] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.801895][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 98.803658][ T29] audit: type=1400 audit(98.680:106): avc: denied { create } for pid=3717 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.804000][ T29] audit: type=1400 audit(98.680:107): avc: denied { setopt } for pid=3717 comm="syz.1.6" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.804243][ T29] audit: type=1400 audit(98.690:108): avc: denied { create } for pid=3717 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.804381][ T29] audit: type=1400 audit(98.690:109): avc: denied { write } for pid=3717 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.830310][ T3718] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6'. [ 98.993643][ T29] audit: type=1400 audit(98.890:110): avc: denied { create } for pid=3719 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.003192][ T29] audit: type=1400 audit(98.900:111): avc: denied { write } for pid=3719 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.331807][ T29] audit: type=1400 audit(99.150:112): avc: denied { create } for pid=3721 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 100.138534][ T29] audit: type=1400 audit(100.030:113): avc: denied { create } for pid=3727 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 100.157604][ T3728] netlink: 'syz.1.10': attribute type 11 has an invalid length. [ 102.964510][ T29] audit: type=1400 audit(102.860:114): avc: denied { prog_run } for pid=3703 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 104.071534][ C0] hrtimer: interrupt took 8234224 ns [ 137.189332][ T29] audit: type=1400 audit(137.080:115): avc: denied { allowed } for pid=3751 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 137.209113][ T29] audit: type=1400 audit(137.100:116): avc: denied { create } for pid=3751 comm="syz.1.18" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 137.233011][ T29] audit: type=1400 audit(137.120:117): avc: denied { map } for pid=3751 comm="syz.1.18" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=1988 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 137.233485][ T29] audit: type=1400 audit(137.120:118): avc: denied { read write } for pid=3751 comm="syz.1.18" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=1988 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 137.779159][ T29] audit: type=1400 audit(137.670:119): avc: denied { ioctl } for pid=3757 comm="syz.1.19" path="socket:[1995]" dev="sockfs" ino=1995 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 138.305802][ T29] audit: type=1400 audit(138.200:120): avc: denied { create } for pid=3761 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 138.316533][ T29] audit: type=1400 audit(138.210:121): avc: denied { connect } for pid=3761 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 138.364265][ T29] audit: type=1400 audit(138.260:122): avc: denied { setopt } for pid=3761 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 139.170578][ T29] audit: type=1400 audit(139.040:123): avc: denied { bind } for pid=3766 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.195144][ T29] audit: type=1400 audit(139.070:124): avc: denied { name_bind } for pid=3766 comm="syz.1.22" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 158.609101][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 158.610879][ T29] audit: type=1400 audit(158.500:129): avc: denied { connect } for pid=3792 comm="syz.0.32" lport=47 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 160.193619][ T29] audit: type=1400 audit(160.090:130): avc: denied { ioctl } for pid=3802 comm="syz.0.37" path="socket:[3099]" dev="sockfs" ino=3099 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.370381][ T29] audit: type=1400 audit(164.260:131): avc: denied { mount } for pid=3821 comm="syz.0.44" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 164.396505][ T29] audit: type=1400 audit(164.290:132): avc: denied { remount } for pid=3821 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 164.398698][ T3822] ======================================================= [ 164.398698][ T3822] WARNING: The mand mount option has been deprecated and [ 164.398698][ T3822] and is ignored by this kernel. Remove the mand [ 164.398698][ T3822] option from the mount to silence this warning. [ 164.398698][ T3822] ======================================================= [ 164.449183][ T29] audit: type=1400 audit(164.340:133): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 164.600808][ T3824] comedi comedi0: Minor 8448 is invalid! [ 169.189599][ T29] audit: type=1400 audit(169.080:134): avc: denied { create } for pid=3832 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 169.206939][ T29] audit: type=1400 audit(169.100:135): avc: denied { setopt } for pid=3832 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 170.192524][ T29] audit: type=1400 audit(170.090:136): avc: denied { read } for pid=3834 comm="syz.0.50" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 170.194780][ T29] audit: type=1400 audit(170.090:137): avc: denied { open } for pid=3834 comm="syz.0.50" path="/28/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 170.229574][ T3837] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 170.232391][ T3837] block device autoloading is deprecated and will be removed. [ 170.242497][ T29] audit: type=1400 audit(170.140:138): avc: denied { ioctl } for pid=3834 comm="syz.0.50" path="/28/file0/file0" dev="fuse" ino=64 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 170.363906][ T29] audit: type=1400 audit(170.260:139): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 173.425785][ T29] audit: type=1400 audit(173.320:140): avc: denied { write } for pid=3859 comm="syz.0.58" name="vlan0" dev="proc" ino=4026532915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 173.553179][ T29] audit: type=1326 audit(173.440:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.58" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 177.448211][ T3881] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 182.641510][ T3913] netlink: 'syz.0.77': attribute type 39 has an invalid length. [ 186.262315][ T29] audit: type=1400 audit(186.150:142): avc: denied { mounton } for pid=3927 comm="syz.0.80" path="/syzcgroup/unified/syz0" dev="cgroup2" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 186.268976][ T3928] tmpfs: Unsupported parameter 'mpol' [ 186.335433][ T29] audit: type=1400 audit(186.230:143): avc: denied { create } for pid=3927 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 186.356334][ T29] audit: type=1400 audit(186.250:144): avc: denied { write } for pid=3927 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 186.843323][ T29] audit: type=1400 audit(186.740:145): avc: denied { write } for pid=3933 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 186.845265][ T29] audit: type=1400 audit(186.740:146): avc: denied { nlmsg_write } for pid=3933 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 188.993048][ T29] audit: type=1400 audit(188.890:147): avc: denied { name_bind } for pid=3947 comm="syz.0.88" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 191.422889][ T29] audit: type=1400 audit(191.320:148): avc: denied { ioctl } for pid=3960 comm="syz.1.94" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3374 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 193.516091][ T29] audit: type=1400 audit(193.410:149): avc: denied { connect } for pid=3964 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 193.526725][ T29] audit: type=1400 audit(193.420:150): avc: denied { bind } for pid=3964 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 193.536380][ T29] audit: type=1400 audit(193.430:151): avc: denied { write } for pid=3964 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 194.779399][ T3975] Driver unsupported XDP return value 0 on prog (id 7) dev N/A, expect packet loss! [ 195.275335][ T29] audit: type=1400 audit(195.170:152): avc: denied { create } for pid=3977 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 195.284263][ T29] audit: type=1400 audit(195.180:153): avc: denied { connect } for pid=3977 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 196.326074][ T3988] netlink: 24 bytes leftover after parsing attributes in process `syz.1.106'. [ 197.312470][ T10] usb 2-1: new low-speed USB device number 2 using dummy_hcd [ 197.595695][ T10] usb 2-1: No LPM exit latency info found, disabling LPM. [ 197.729128][ T10] usb 2-1: config 1 interface 0 altsetting 253 endpoint 0x81 has invalid maxpacket 528, setting to 8 [ 197.732922][ T10] usb 2-1: config 1 interface 0 altsetting 253 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 197.733052][ T10] usb 2-1: config 1 interface 0 has no altsetting 0 [ 197.794578][ T10] usb 2-1: string descriptor 0 read error: -22 [ 197.795155][ T10] usb 2-1: New USB device found, idVendor=10c4, idProduct=8acf, bcdDevice= 0.40 [ 197.795275][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 197.839526][ T4004] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 198.064189][ T10] usbhid 2-1:1.0: can't add hid device: -71 [ 198.076623][ T10] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 198.082815][ T10] usb 2-1: USB disconnect, device number 2 [ 198.399330][ T29] audit: type=1400 audit(198.290:154): avc: denied { sqpoll } for pid=4017 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 199.021637][ T41] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 199.179549][ T41] usb 2-1: config 0 interface 0 altsetting 251 endpoint 0x9 has an invalid bInterval 0, changing to 4 [ 199.180364][ T41] usb 2-1: config 0 interface 0 altsetting 251 endpoint 0x9 has invalid maxpacket 15380, setting to 1023 [ 199.183966][ T41] usb 2-1: config 0 interface 0 has no altsetting 0 [ 199.194186][ T41] usb 2-1: New USB device found, idVendor=045e, idProduct=0283, bcdDevice=99.0b [ 199.194919][ T41] usb 2-1: New USB device strings: Mfr=1, Product=228, SerialNumber=2 [ 199.197891][ T41] usb 2-1: Product: syz [ 199.198921][ T41] usb 2-1: Manufacturer: syz [ 199.200158][ T41] usb 2-1: SerialNumber: syz [ 199.210863][ T41] usb 2-1: config 0 descriptor?? [ 199.229839][ T41] usb 2-1: selecting invalid altsetting 0 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 200.822229][ T3702] ------------[ cut here ]------------ [ 200.823054][ T3702] WARNING: drivers/gpu/drm/drm_vblank.c:1318 at drm_wait_one_vblank+0x198/0x258, CPU#1: kworker/1:4/3702 [ 200.828525][ T3702] faux_driver vkms: [drm] vblank wait timed out on crtc 0 [ 200.829651][ T3702] Modules linked in: [ 200.830882][ T3702] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 200.832703][ T3702] CPU: 1 UID: 0 PID: 3702 Comm: kworker/1:4 Not tainted syzkaller #0 PREEMPT [ 200.833855][ T3702] Hardware name: ARM-Versatile Express [ 200.834883][ T3702] Workqueue: events drm_fb_helper_damage_work [ 200.835940][ T3702] Call trace: [ 200.836722][ T3702] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 200.837968][ T3702] r7:82283b48 r6:8456a400 r5:00000000 r4:822958fc [ 200.838947][ T3702] [<80201b58>] (show_stack) from [<8021ee98>] (dump_stack_lvl+0x54/0x7c) [ 200.840351][ T3702] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 200.841514][ T3702] r5:00000000 r4:82a7bd14 [ 200.842252][ T3702] [<8021eec0>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 200.843406][ T3702] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 200.844513][ T3702] r7:80b12324 [ 200.844975][ T3702] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 200.845939][ T3702] r3:8280c704 r2:00000001 r1:8227c0b0 r0:82283b48 [ 200.846757][ T3702] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 200.847919][ T3702] [<80252194>] (__warn) from [<80252520>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 200.849614][ T3702] r8:00000009 r7:82311730 r6:dfc75dd4 r5:8456a400 r4:00000000 [ 200.850872][ T3702] [<8025233c>] (warn_slowpath_fmt) from [<80b12324>] (drm_wait_one_vblank+0x198/0x258) [ 200.852337][ T3702] r10:83016170 r9:83299644 r8:00000000 r7:00002dfb r6:00000000 r5:00000000 [ 200.853635][ T3702] r4:83253000 [ 200.854234][ T3702] [<80b1218c>] (drm_wait_one_vblank) from [<80b123fc>] (drm_crtc_wait_one_vblank+0x18/0x1c) [ 200.856061][ T3702] r9:83018605 r8:83253000 r7:8329a800 r6:83253000 r5:00000000 r4:83391040 [ 200.857096][ T3702] [<80b123e4>] (drm_crtc_wait_one_vblank) from [<80b15fac>] (drm_client_modeset_wait_for_vblank+0x60/0x74) [ 200.858326][ T3702] [<80b15f4c>] (drm_client_modeset_wait_for_vblank) from [<80b2f268>] (drm_fb_helper_damage_work+0x50/0x1c8) [ 200.860097][ T3702] r7:8329a800 r6:8329a8b8 r5:00000000 r4:8329a898 [ 200.860945][ T3702] [<80b2f218>] (drm_fb_helper_damage_work) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 200.862509][ T3702] r8:8456a400 r7:ddde3b40 r6:83018600 r5:8329a898 r4:85e92080 [ 200.863874][ T3702] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 200.865552][ T3702] r10:61c88647 r9:8456a400 r8:85e920ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 200.867092][ T3702] r4:85e92080 [ 200.867675][ T3702] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 200.868784][ T3702] r10:00000000 r9:85e92080 r8:802762fc r7:eb0e9e60 r6:85e92c80 r5:8456a400 [ 200.870261][ T3702] r4:00000001 [ 200.870799][ T3702] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 200.872310][ T3702] Exception stack(0xdfc75fb0 to 0xdfc75ff8) [ 200.873476][ T3702] 5fa0: 00000000 00000000 00000000 00000000 [ 200.874774][ T3702] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 200.876412][ T3702] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 200.877789][ T3702] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 200.879235][ T3702] r4:85e99740 [ 205.866555][ T3702] SMP: failed to stop secondary CPUs [ 205.869065][ T3702] Rebooting in 86400 seconds..