last executing test programs: 13.055495142s ago: executing program 0 (id=1): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r5) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) r7 = landlock_create_ruleset(&(0x7f00000000c0)={0x3}, 0x10, 0x0) landlock_restrict_self(r7, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000140)={0x0, 0x0}) r9 = syz_open_procfs(r8, &(0x7f0000000040)='io\x00') pread64(r9, &(0x7f00000004c0)=""/251, 0xfb, 0x4) 12.554055557s ago: executing program 1 (id=2): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r3) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) r5 = landlock_create_ruleset(&(0x7f00000000c0)={0x3}, 0x10, 0x0) landlock_restrict_self(r5, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000140)={0x0, 0x0}) syz_open_procfs(r6, &(0x7f0000000040)='io\x00') 99.143781ms ago: executing program 0 (id=3): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a140000000200010300"], 0x3c}}, 0x0) 0s ago: executing program 0 (id=4): bpf$MAP_CREATE(0x0, &(0x7f00000009c0), 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) write$uinput_user_dev(r0, &(0x7f0000000800)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_CREATE(r0, 0x5501) kernel console output (not intermixed with test programs): [ 53.073222][ T31] audit: type=1400 audit(53.000:68): avc: denied { read write } for pid=2997 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.108592][ T31] audit: type=1400 audit(53.040:69): avc: denied { open } for pid=2997 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:12156' (ED25519) to the list of known hosts. [ 62.510822][ T31] audit: type=1400 audit(62.430:70): avc: denied { name_bind } for pid=2998 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.536928][ T31] audit: type=1400 audit(64.450:71): avc: denied { execute } for pid=3000 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.552660][ T31] audit: type=1400 audit(64.480:72): avc: denied { execute_no_trans } for pid=3000 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.721890][ T31] audit: type=1400 audit(68.650:73): avc: denied { mounton } for pid=3000 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.725899][ T31] audit: type=1400 audit(68.650:74): avc: denied { mount } for pid=3000 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.742699][ T3000] cgroup: Unknown subsys name 'net' [ 68.751212][ T31] audit: type=1400 audit(68.680:75): avc: denied { unmount } for pid=3000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.005081][ T3000] cgroup: Unknown subsys name 'hugetlb' [ 69.006261][ T3000] cgroup: Unknown subsys name 'rlimit' [ 69.313138][ T31] audit: type=1400 audit(69.240:76): avc: denied { setattr } for pid=3000 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.314351][ T31] audit: type=1400 audit(69.240:77): avc: denied { mounton } for pid=3000 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.315256][ T31] audit: type=1400 audit(69.240:78): avc: denied { mount } for pid=3000 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.579945][ T3002] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.581460][ T31] audit: type=1400 audit(69.510:79): avc: denied { relabelto } for pid=3002 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.586827][ T31] audit: type=1400 audit(69.510:80): avc: denied { write } for pid=3002 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.615860][ T31] audit: type=1400 audit(69.540:81): avc: denied { read } for pid=3000 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.618628][ T31] audit: type=1400 audit(69.540:82): avc: denied { open } for pid=3000 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.355291][ T3000] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.412852][ T31] audit: type=1400 audit(79.340:83): avc: denied { execmem } for pid=3003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.477200][ T31] audit: type=1400 audit(79.400:84): avc: denied { mounton } for pid=3005 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 79.478212][ T31] audit: type=1400 audit(79.400:85): avc: denied { mount } for pid=3005 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 79.487341][ T31] audit: type=1400 audit(79.410:86): avc: denied { read } for pid=3005 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.488203][ T31] audit: type=1400 audit(79.410:87): avc: denied { open } for pid=3005 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.490954][ T31] audit: type=1400 audit(79.420:88): avc: denied { mounton } for pid=3005 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.524508][ T31] audit: type=1400 audit(79.450:89): avc: denied { module_request } for pid=3005 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.525687][ T31] audit: type=1400 audit(79.450:90): avc: denied { module_request } for pid=3006 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.616755][ T31] audit: type=1400 audit(79.540:91): avc: denied { sys_module } for pid=3005 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.501689][ T31] audit: type=1400 audit(80.430:92): avc: denied { ioctl } for pid=3006 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.877932][ T3005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.885162][ T3006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.895635][ T3005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.922945][ T3006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.034581][ T3006] hsr_slave_0: entered promiscuous mode [ 83.040278][ T3006] hsr_slave_1: entered promiscuous mode [ 83.053678][ T3005] hsr_slave_0: entered promiscuous mode [ 83.058055][ T3005] hsr_slave_1: entered promiscuous mode [ 83.060068][ T3005] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 83.060569][ T3005] Cannot create hsr debugfs directory [ 83.558447][ T3006] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.571348][ T3006] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.579820][ T3006] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.594780][ T3006] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.677533][ T3005] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.689894][ T3005] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.700501][ T3005] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.710419][ T3005] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 84.355527][ T3005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.484752][ T3006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.943470][ T3005] veth0_vlan: entered promiscuous mode [ 86.982306][ T3005] veth1_vlan: entered promiscuous mode [ 87.018175][ T3005] veth0_macvtap: entered promiscuous mode [ 87.033637][ T3005] veth1_macvtap: entered promiscuous mode [ 87.083333][ T3005] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.084288][ T3005] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.084663][ T3005] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.085042][ T3005] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.224980][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 87.225037][ T31] audit: type=1400 audit(87.150:96): avc: denied { mount } for pid=3005 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 87.231268][ T31] audit: type=1400 audit(87.160:97): avc: denied { mounton } for pid=3005 comm="syz-executor" path="/syzkaller.eJDPc5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 87.236781][ T31] audit: type=1400 audit(87.160:98): avc: denied { mount } for pid=3005 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 87.247080][ T31] audit: type=1400 audit(87.170:99): avc: denied { unmount } for pid=3005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.250386][ T31] audit: type=1400 audit(87.180:100): avc: denied { mounton } for pid=3005 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.253144][ T31] audit: type=1400 audit(87.180:101): avc: denied { mount } for pid=3005 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.348128][ T31] audit: type=1400 audit(87.280:102): avc: denied { read write } for pid=3005 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.349142][ T31] audit: type=1400 audit(87.280:103): avc: denied { open } for pid=3005 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.356595][ T31] audit: type=1400 audit(87.280:104): avc: denied { ioctl } for pid=3005 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.623871][ T3006] veth0_vlan: entered promiscuous mode [ 87.635383][ T3006] veth1_vlan: entered promiscuous mode [ 87.671127][ T3006] veth0_macvtap: entered promiscuous mode [ 87.679782][ T3006] veth1_macvtap: entered promiscuous mode [ 87.721127][ T3006] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.721497][ T3006] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.721793][ T3006] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.722363][ T3006] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.350554][ T31] audit: type=1400 audit(89.280:105): avc: denied { map_create } for pid=3684 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 100.337683][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 100.337791][ T31] audit: type=1400 audit(100.270:112): avc: denied { create } for pid=3693 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 100.342337][ T31] audit: type=1400 audit(100.270:113): avc: denied { write } for pid=3693 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 100.446969][ T3696] ------------[ cut here ]------------ [ 100.447792][ T3696] WARNING: CPU: 0 PID: 3696 at mm/page_alloc.c:4659 __alloc_pages_noprof+0xfbc/0x1170 [ 100.449756][ T3696] Modules linked in: [ 100.453291][ T3696] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 100.454811][ T3696] CPU: 0 PID: 3696 Comm: syz.0.4 Not tainted 6.10.0-syzkaller #0 [ 100.455343][ T3696] Hardware name: ARM-Versatile Express [ 100.455906][ T3696] Call trace: [ 100.456958][ T3696] [<818ea4a0>] (dump_backtrace) from [<818ea59c>] (show_stack+0x18/0x1c) [ 100.457785][ T3696] r7:00000000 r6:82622804 r5:00000000 r4:81fe7c44 [ 100.458155][ T3696] [<818ea584>] (show_stack) from [<81907be4>] (dump_stack_lvl+0x54/0x7c) [ 100.458554][ T3696] [<81907b90>] (dump_stack_lvl) from [<81907c24>] (dump_stack+0x18/0x1c) [ 100.458959][ T3696] r5:00000000 r4:82861d0c [ 100.459199][ T3696] [<81907c0c>] (dump_stack) from [<818eb044>] (panic+0x120/0x358) [ 100.459587][ T3696] [<818eaf24>] (panic) from [<80241f54>] (print_tainted+0x0/0xa0) [ 100.459996][ T3696] r3:8260c5c4 r2:00000001 r1:81fd0d30 r0:81fd83b8 [ 100.460312][ T3696] r7:804b2f1c [ 100.461230][ T3696] [<80241ee0>] (check_panic_on_warn) from [<80242148>] (__warn+0x7c/0x180) [ 100.463089][ T3696] [<802420cc>] (__warn) from [<802423c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 100.465549][ T3696] r8:00000009 r7:82000bec r6:e0159c24 r5:84a59800 r4:00000000 [ 100.466917][ T3696] [<80242250>] (warn_slowpath_fmt) from [<804b2f1c>] (__alloc_pages_noprof+0xfbc/0x1170) [ 100.467664][ T3696] r10:00000014 r9:843bd204 r8:ffffffff r7:84a59800 r6:00000dc0 r5:00000000 [ 100.468688][ T3696] r4:00000000 [ 100.469483][ T3696] [<804b1f60>] (__alloc_pages_noprof) from [<804b7f98>] (___kmalloc_large_node+0x50/0xac) [ 100.470029][ T3696] r10:84a59800 r9:843bd204 r8:ffffffff r7:804bfa14 r6:00000dc0 r5:00000000 [ 100.472740][ T3696] r4:00000014 [ 100.473532][ T3696] [<804b7f48>] (___kmalloc_large_node) from [<804b8c80>] (__kmalloc_large_node_noprof+0x24/0x114) [ 100.474087][ T3696] r7:804bfa14 r6:00000dc0 r5:ffffffff r4:80000002 [ 100.474418][ T3696] [<804b8c5c>] (__kmalloc_large_node_noprof) from [<804bfa14>] (__kmalloc_noprof+0x324/0x458) [ 100.474971][ T3696] r10:84a59800 r9:843bd204 r8:84a59800 r7:00000dc0 r6:84e94400 r5:ffffffff [ 100.475403][ T3696] r4:80000002 [ 100.475652][ T3696] [<804bf6f0>] (__kmalloc_noprof) from [<80f64324>] (input_mt_init_slots+0x60/0x1f0) [ 100.476215][ T3696] r10:84a59800 r9:843bd204 r8:00000000 r7:00000000 r6:84e94400 r5:00000000 [ 100.476696][ T3696] r4:80000002 [ 100.477681][ T3696] [<80f642c4>] (input_mt_init_slots) from [<80f93b60>] (uinput_ioctl_handler+0x9c0/0xc54) [ 100.479558][ T3696] r8:00000000 r7:00000000 r6:843bd200 r5:00000000 r4:84e94400 [ 100.480109][ T3696] [<80f931a0>] (uinput_ioctl_handler) from [<80f93e08>] (uinput_ioctl+0x14/0x18) [ 100.480736][ T3696] r9:00000003 r8:843af000 r7:00000000 r6:843af001 r5:00000000 r4:00005501 [ 100.481133][ T3696] [<80f93df4>] (uinput_ioctl) from [<8051b0a0>] (sys_ioctl+0x134/0xda4) [ 100.481654][ T3696] [<8051af6c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 100.482258][ T3696] Exception stack(0xe0159fa8 to 0xe0159ff0) [ 100.482836][ T3696] 9fa0: 00000000 00000000 00000003 00005501 00000000 00000000 [ 100.483253][ T3696] 9fc0: 00000000 00000000 002662dc 00000036 7e8b8766 7e8b8767 003d0f00 76bd30bc [ 100.484069][ T3696] 9fe0: 76bd2ec8 76bd2eb8 00018444 001306b0 [ 100.484507][ T3696] r10:00000036 r9:84a59800 r8:8020029c r7:00000036 r6:002662dc r5:00000000 [ 100.485183][ T3696] r4:00000000 [ 100.488186][ T3696] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:14:19 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=82622858 R02=00000001 R03=82864fa4 R04=82861d0c R05=00000000 R06=82622804 R07=00000000 R08=81fd83b8 R09=e0159b44 R10=82862134 R11=e0159b7c R12=e0159b30 R13=e0159b00 R14=818e5290 R15=818e5290 PSR=a0000093 N-C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=7e9b600c R01=00d25b81 R02=7695f018 R03=01f4d1ef R04=00000004 R05=7e9b600c R06=126c54a3 R07=032681ad R08=018afb9e R09=018b22db R10=7695f018 R11=7e9b601c R12=00000000 R13=7e9b5f78 R14=004bcc3c R15=004bc860 PSR=80000010 N--- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=016f6510 s17=00000000 d08=00000000016f6510 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=032a0800 s33=08001588 d16=08001588032a0800 s34=15900300 s35=03001000 d17=0300100015900300 s36=f50815a0 s37=ffffffff d18=fffffffff50815a0 s38=ffffffff s39=73756601 d19=73756601ffffffff s40=c8030065 s41=ffff0231 d20=ffff0231c8030065 s42=0303ffff s43=ff0231d0 d21=ff0231d00303ffff s44=03ffffff s45=0231d803 d22=0231d80303ffffff s46=ffffffff s47=31e00303 d23=31e00303ffffffff s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=a7e2baaa s53=0d17c70d d26=0d17c70da7e2baaa s54=d2538997 s55=511d4c0b d27=511d4c0bd2538997 s56=bdc8b304 s57=81821516 d28=81821516bdc8b304 s58=fddf8a67 s59=09bf440f d29=09bf440ffddf8a67 s60=beb1611a s61=fc259e00 d30=fc259e00beb1611a s62=84582163 s63=2c680c41 d31=2c680c4184582163 FPSCR: 00000000