last executing test programs: 4.321230867s ago: executing program 1 (id=320): syz_usb_connect$rtl8150(0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_pressure(r0, &(0x7f00000001c0)={'some'}, 0x4cdad095) r1 = openat2$dir(0xffffff9c, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x20040}, 0x18) fsetxattr$security_capability(r1, &(0x7f0000004a40), 0x0, 0x0, 0x1) 1.140454054s ago: executing program 0 (id=342): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x20008041}, 0x4000082) 1.027454229s ago: executing program 0 (id=343): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x22a000, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, 0x0, 0x20040000) 900.787575ms ago: executing program 0 (id=344): openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) close(r0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) 811.022966ms ago: executing program 0 (id=345): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) 701.03834ms ago: executing program 0 (id=346): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x5452, &(0x7f0000000000)) 610.898752ms ago: executing program 0 (id=347): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADLINK(r0, &(0x7f0000030400), 0x10011) write$tun(r0, &(0x7f0000000440)={@val={0x0, 0x22eb}, @val={0x3, 0x4, 0x5a5, 0x200, 0x1000, 0x80}, @ipv6=@udp={0x2, 0x6, "8479e9", 0xc, 0x11, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, {[], {0x4e20, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0xfb, 0x0, @void}}}}}}, 0x42) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 488.403598ms ago: executing program 1 (id=348): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r0, 0x0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4006000}, 0x4000) 278.380394ms ago: executing program 1 (id=349): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20044840) 180.273327ms ago: executing program 1 (id=350): r0 = landlock_create_ruleset(&(0x7f0000000040)={0x200}, 0x10, 0x0) landlock_restrict_self(r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 91.558398ms ago: executing program 1 (id=351): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) r3 = dup(r2) ioctl$TIOCGDEV(r3, 0x5450, 0x0) 0s ago: executing program 1 (id=352): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x4, {0x2, 0x0, 0x2}, 0xfe}, 0x11) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)={0x14, 0x2, 0x2, 0x3, 0x0, 0x0, {0x7, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x845}, 0x24008000) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x11) kernel console output (not intermixed with test programs): [ 48.005388][ T29] audit: type=1400 audit(47.920:56): avc: denied { read write } for pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.007994][ T29] audit: type=1400 audit(47.920:57): avc: denied { open } for pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:13184' (ED25519) to the list of known hosts. [ 63.219931][ T29] audit: type=1400 audit(63.120:58): avc: denied { name_bind } for pid=3087 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.774671][ T29] audit: type=1400 audit(64.690:59): avc: denied { execute } for pid=3088 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.777791][ T29] audit: type=1400 audit(64.690:60): avc: denied { execute_no_trans } for pid=3088 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.825284][ T29] audit: type=1400 audit(67.740:61): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.830968][ T29] audit: type=1400 audit(67.750:62): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.846794][ T3088] cgroup: Unknown subsys name 'net' [ 67.856664][ T29] audit: type=1400 audit(67.770:63): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.998129][ T3088] cgroup: Unknown subsys name 'cpuset' [ 68.005222][ T3088] cgroup: Unknown subsys name 'hugetlb' [ 68.006048][ T3088] cgroup: Unknown subsys name 'rlimit' [ 68.195995][ T29] audit: type=1400 audit(68.110:64): avc: denied { setattr } for pid=3088 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.201206][ T29] audit: type=1400 audit(68.110:65): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.201551][ T29] audit: type=1400 audit(68.120:66): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.422540][ T3090] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.429752][ T29] audit: type=1400 audit(68.340:67): avc: denied { relabelto } for pid=3090 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.431257][ T29] audit: type=1400 audit(68.350:68): avc: denied { write } for pid=3090 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.474192][ T29] audit: type=1400 audit(68.390:69): avc: denied { read } for pid=3088 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.476213][ T29] audit: type=1400 audit(68.390:70): avc: denied { open } for pid=3088 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.655930][ T3088] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.496219][ T29] audit: type=1400 audit(77.410:71): avc: denied { execmem } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.564326][ T29] audit: type=1400 audit(77.480:72): avc: denied { read } for pid=3094 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.569446][ T29] audit: type=1400 audit(77.480:73): avc: denied { open } for pid=3093 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.571521][ T29] audit: type=1400 audit(77.490:74): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.597913][ T29] audit: type=1400 audit(77.510:76): avc: denied { module_request } for pid=3093 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.600050][ T29] audit: type=1400 audit(77.510:75): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.680859][ T29] audit: type=1400 audit(77.600:77): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.437214][ T29] audit: type=1400 audit(78.350:78): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.659879][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.684823][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.698176][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.722216][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.578753][ T3093] hsr_slave_0: entered promiscuous mode [ 80.582876][ T3093] hsr_slave_1: entered promiscuous mode [ 80.660529][ T3094] hsr_slave_0: entered promiscuous mode [ 80.663313][ T3094] hsr_slave_1: entered promiscuous mode [ 80.665550][ T3094] debugfs: 'hsr0' already exists in 'hsr' [ 80.666785][ T3094] Cannot create hsr debugfs directory [ 81.177903][ T29] audit: type=1400 audit(81.090:79): avc: denied { create } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.184423][ T29] audit: type=1400 audit(81.100:80): avc: denied { write } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.192193][ T3093] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.203523][ T3093] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.215324][ T3093] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.224217][ T3093] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.338358][ T3094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.351944][ T3094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.366222][ T3094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.375763][ T3094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.815050][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.027608][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.533619][ T3094] veth0_vlan: entered promiscuous mode [ 84.555292][ T3094] veth1_vlan: entered promiscuous mode [ 84.635739][ T3094] veth0_macvtap: entered promiscuous mode [ 84.655546][ T3094] veth1_macvtap: entered promiscuous mode [ 84.747973][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.756610][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.757089][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.761493][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.918538][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.919414][ T29] audit: type=1400 audit(84.830:82): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.925521][ T29] audit: type=1400 audit(84.840:83): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.QhwfpT/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.934267][ T29] audit: type=1400 audit(84.850:84): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.944714][ T29] audit: type=1400 audit(84.860:85): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.QhwfpT/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.948514][ T29] audit: type=1400 audit(84.860:86): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.QhwfpT/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2318 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.968581][ T29] audit: type=1400 audit(84.880:87): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.976382][ T29] audit: type=1400 audit(84.890:88): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.981745][ T29] audit: type=1400 audit(84.890:89): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="gadgetfs" ino=2319 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.988340][ T29] audit: type=1400 audit(84.900:90): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.995859][ T29] audit: type=1400 audit(84.910:91): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.070192][ T3094] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.118665][ T3093] veth0_vlan: entered promiscuous mode [ 85.160716][ T3093] veth1_vlan: entered promiscuous mode [ 85.253846][ T3093] veth0_macvtap: entered promiscuous mode [ 85.274197][ T3093] veth1_macvtap: entered promiscuous mode [ 85.358218][ T58] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.358701][ T58] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.361219][ T58] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.361560][ T58] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.281803][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 92.284669][ T29] audit: type=1400 audit(92.200:109): avc: denied { create } for pid=3772 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 92.338211][ T29] audit: type=1400 audit(92.250:110): avc: denied { write } for pid=3772 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 93.086523][ T29] audit: type=1400 audit(93.000:111): avc: denied { create } for pid=3782 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.094495][ T29] audit: type=1400 audit(93.010:112): avc: denied { write } for pid=3782 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.204529][ T29] audit: type=1400 audit(93.120:113): avc: denied { read } for pid=3782 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 95.270757][ T29] audit: type=1400 audit(95.190:114): avc: denied { create } for pid=3818 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 95.281367][ T29] audit: type=1400 audit(95.190:115): avc: denied { bind } for pid=3818 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 95.282956][ T29] audit: type=1400 audit(95.190:116): avc: denied { setopt } for pid=3818 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 95.284440][ T29] audit: type=1400 audit(95.200:117): avc: denied { accept } for pid=3818 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 95.287905][ T29] audit: type=1400 audit(95.200:118): avc: denied { write } for pid=3818 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.166229][ T29] audit: type=1400 audit(99.080:119): avc: denied { create } for pid=3868 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 99.168412][ T29] audit: type=1400 audit(99.080:120): avc: denied { write } for pid=3868 comm="syz.0.71" path="socket:[2613]" dev="sockfs" ino=2613 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 99.736893][ T29] audit: type=1400 audit(99.650:121): avc: denied { read } for pid=3884 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.742593][ T3914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pid=3914 comm=syz.0.90 [ 104.538664][ T29] audit: type=1400 audit(104.450:122): avc: denied { write } for pid=3934 comm="syz.0.101" name="anycast6" dev="proc" ino=4026532702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 108.044519][ T29] audit: type=1400 audit(107.960:123): avc: denied { create } for pid=3987 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 113.714077][ T29] audit: type=1400 audit(113.630:124): avc: denied { create } for pid=4061 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 113.724664][ T29] audit: type=1400 audit(113.640:125): avc: denied { write } for pid=4061 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 114.982772][ T29] audit: type=1400 audit(114.900:126): avc: denied { audit_write } for pid=4074 comm="syz.0.166" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 116.078317][ T4101] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5133 sclass=netlink_audit_socket pid=4101 comm=syz.1.179 [ 118.357092][ T29] audit: type=1400 audit(118.270:127): avc: denied { create } for pid=4146 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 118.443691][ T4149] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4149 comm=syz.0.202 [ 118.780863][ T29] audit: type=1400 audit(118.700:128): avc: denied { watch } for pid=4159 comm="syz.0.207" path="/113" dev="tmpfs" ino=598 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 118.826118][ T29] audit: type=1400 audit(118.740:129): avc: denied { unlink } for pid=3093 comm="syz-executor" name="file1" dev="tmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 122.007886][ T4215] Zero length message leads to an empty skb [ 122.087932][ T29] audit: type=1400 audit(122.000:130): avc: denied { watch watch_reads } for pid=4216 comm="syz.1.233" path="pipe:[837]" dev="pipefs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 123.056812][ T4232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4232 comm=syz.0.240 [ 123.417658][ T29] audit: type=1400 audit(123.330:131): avc: denied { read } for pid=4235 comm="syz.0.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 123.606396][ T4244] capability: warning: `syz.1.244' uses deprecated v2 capabilities in a way that may be insecure [ 124.257970][ T29] audit: type=1400 audit(124.170:132): avc: denied { allowed } for pid=4267 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 124.268663][ T29] audit: type=1400 audit(124.180:133): avc: denied { create } for pid=4267 comm="syz.1.256" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 131.879701][ T29] audit: type=1400 audit(131.790:134): avc: denied { read } for pid=4367 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 134.446859][ T29] audit: type=1400 audit(134.360:135): avc: denied { create } for pid=4391 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 134.452968][ T29] audit: type=1400 audit(134.370:136): avc: denied { write } for pid=4391 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 137.934945][ T29] audit: type=1400 audit(137.850:137): avc: denied { name_bind } for pid=4455 comm="syz.0.341" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 137.942573][ T29] audit: type=1400 audit(137.850:138): avc: denied { node_bind } for pid=4455 comm="syz.0.341" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 594.259369][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 594.259679][ C0] Modules linked in: [ 594.260532][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 594.260796][ C0] Hardware name: ARM-Versatile Express [ 594.261088][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 594.261843][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 594.261897][ C0] pc : [<81abbff4>] lr : [<81abbfcc>] psr: 80000113 [ 594.261956][ C0] sp : 82801b40 ip : 82801b40 fp : 82801b54 [ 594.261995][ C0] r10: 81c05450 r9 : 84112c40 r8 : 8421ba88 [ 594.262038][ C0] r7 : 84112d68 r6 : 00000001 r5 : 00000001 r4 : 84112d68 [ 594.262098][ C0] r3 : 00008856 r2 : 00008857 r1 : 00000000 r0 : 00000001 [ 594.262221][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 594.262304][ C0] Control: 30c5387d Table: 85390e80 DAC: fffffffd [ 594.262413][ C0] Call trace: [ 594.262668][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 594.263027][ C0] r5:00000001 r4:84112c40 [ 594.263137][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 594.263223][ C0] r7:00000001 r6:00000000 r5:00000000 r4:841f7600 [ 594.263245][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.263306][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.263397][ C0] r10:81c05450 r9:82801c94 r8:00000102 r7:ffffc148 r6:00000007 r5:00000001 [ 594.263438][ C0] r4:841f7600 [ 594.263459][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 594.263508][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 594.263566][ C0] r5:845d8844 r4:845d8844 [ 594.263582][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 594.263632][ C0] r5:845d8844 r4:84f15a8c [ 594.263650][ C0] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 594.263694][ C0] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 594.263757][ C0] r7:ffffc148 r6:809cd4b4 r5:84f15a8c r4:8281b500 [ 594.263772][ C0] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 594.263835][ C0] r9:82801c94 r8:ffffc148 r7:00000000 r6:809cd4b4 r5:dddc5f00 r4:84f15a8c [ 594.263853][ C0] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 594.263911][ C0] r10:8281b500 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.263947][ C0] r4:dddc5f00 [ 594.263962][ C0] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 594.264017][ C0] r4:82804084 [ 594.264031][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.264103][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.264175][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 594.264201][ C0] r4:8281b500 [ 594.264220][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.264283][ C0] r5:8247f0cc r4:826c3a9c [ 594.264305][ C0] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 594.264375][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.264524][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.264714][ C0] 1dc0: e02e7008 00000004 [ 594.264772][ C0] 1de0: 00008856 00000000 e02e7008 00000004 00000001 84112d68 8421ba88 84112c40 [ 594.264809][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 809c8328 809c832c 60000013 ffffffff [ 594.264885][ C0] r9:8281b500 r8:8421ba88 r7:82801e0c r6:ffffffff r5:60000013 r4:809c832c [ 594.264908][ C0] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 594.265022][ C0] r5:00000004 r4:84112c40 [ 594.265041][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 594.265118][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841f7628 [ 594.265135][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.265186][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.265252][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83eaa518 r5:00000001 [ 594.265274][ C0] r4:841f7628 [ 594.265291][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 594.265342][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 594.265390][ C0] r5:000000ff r4:845d8a24 [ 594.265409][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 594.265466][ C0] r5:000000ff r4:845d8a24 [ 594.265483][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 594.265538][ C0] r5:000000ff r4:845d8a24 [ 594.265556][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 594.265618][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 594.265637][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.265709][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.265731][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.265795][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.265871][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 594.265896][ C0] r4:000000ed [ 594.265914][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 594.265996][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.266117][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.266821][ C0] Sending NMI from CPU 0 to CPUs 1: [ 594.267573][ C1] NMI backtrace for cpu 1 [ 594.267713][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 594.267759][ C1] Hardware name: ARM-Versatile Express [ 594.267773][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 594.267816][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.267831][ C1] pc : [<81abc000>] lr : [<81abbfcc>] psr: 80000013 [ 594.267843][ C1] sp : df865e58 ip : df865e58 fp : df865e6c [ 594.267853][ C1] r10: 00000000 r9 : 84112c40 r8 : 8421ba88 [ 594.267864][ C1] r7 : 84112d68 r6 : 00000001 r5 : 00000008 r4 : 84112d68 [ 594.267874][ C1] r3 : 00008856 r2 : 00008858 r1 : 00000000 r0 : 00000001 [ 594.267886][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.267907][ C1] Control: 30c5387d Table: 84bf97c0 DAC: 00000000 [ 594.267918][ C1] Call trace: [ 594.267941][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 594.267979][ C1] r5:00000008 r4:84112c40 [ 594.267988][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 594.268021][ C1] r7:00000001 r6:00000000 r5:00000003 r4:841f763c [ 594.268030][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.268054][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.268095][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83eaa418 r5:00000001 [ 594.268105][ C1] r4:841f763c [ 594.268112][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 594.268133][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 594.268159][ C1] r5:000000ff r4:845d8b14 [ 594.268166][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 594.268208][ C1] r5:000000ff r4:845d8b14 [ 594.268228][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 594.268277][ C1] r5:000000ff r4:845d8b14 [ 594.268296][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 594.268329][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.268337][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.268369][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.268377][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.268405][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.268437][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.268447][ C1] r4:00000092 [ 594.268455][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.268483][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.268516][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.270022][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 594.302497][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 594.302974][ C0] Tainted: [L]=SOFTLOCKUP [ 594.303185][ C0] Hardware name: ARM-Versatile Express [ 594.303449][ C0] Call trace: [ 594.303644][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 594.303921][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 594.304151][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 594.304452][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 594.304753][ C0] r5:00000000 r4:82a7bd14 [ 594.304928][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 594.305245][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 594.305542][ C0] r7:82ac27f8 [ 594.305690][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 594.305954][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 594.306226][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 594.306531][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 594.306786][ C0] r4:dddc75d8 [ 594.306924][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 594.307257][ C0] r10:57e4f750 r9:dddc7180 r8:dddc7130 r7:0000008a r6:00000003 r5:20000193 [ 594.307523][ C0] r4:dddc7000 [ 594.307666][ C0] [<8032b120>] (hrtimer_interrupt) from [<813409e8>] (arch_timer_handler_virt+0x30/0x38) [ 594.308017][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 594.308282][ C0] r4:8309de40 [ 594.308437][ C0] [<813409b8>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 594.308783][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 594.309456][ C0] r10:81c05450 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 594.309720][ C0] r4:8280cc44 [ 594.310169][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 594.310634][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 594.310935][ C0] [<80201260>] (gic_handle_irq) from [<81aada48>] (generic_handle_arch_irq+0x60/0x80) [ 594.311257][ C0] r7:82801af0 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 594.311478][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.311800][ C0] Exception stack(0x82801af0 to 0x82801b38) [ 594.311983][ C0] 1ae0: 00000001 00000000 00008857 00008856 [ 594.312285][ C0] 1b00: 84112d68 00000001 00000001 84112d68 8421ba88 84112c40 81c05450 82801b54 [ 594.312573][ C0] 1b20: 82801b40 82801b40 81abbfcc 81abbff4 80000113 ffffffff [ 594.312831][ C0] r9:8281b500 r8:8421ba88 r7:82801b24 r6:ffffffff r5:80000113 r4:81abbff4 [ 594.313112][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 594.313413][ C0] r5:00000001 r4:84112c40 [ 594.313502][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 594.313685][ C0] r7:00000001 r6:00000000 r5:00000000 r4:841f7600 [ 594.313862][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.314172][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.314493][ C0] r10:81c05450 r9:82801c94 r8:00000102 r7:ffffc148 r6:00000007 r5:00000001 [ 594.314758][ C0] r4:841f7600 [ 594.314898][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 594.315219][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 594.315506][ C0] r5:845d8844 r4:845d8844 [ 594.315669][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 594.315972][ C0] r5:845d8844 r4:84f15a8c [ 594.316135][ C0] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 594.316472][ C0] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 594.316772][ C0] r7:ffffc148 r6:809cd4b4 r5:84f15a8c r4:8281b500 [ 594.317001][ C0] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 594.317326][ C0] r9:82801c94 r8:ffffc148 r7:00000000 r6:809cd4b4 r5:dddc5f00 r4:84f15a8c [ 594.317568][ C0] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 594.317880][ C0] r10:8281b500 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.318139][ C0] r4:dddc5f00 [ 594.318284][ C0] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 594.318592][ C0] r4:82804084 [ 594.318731][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.319294][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.319749][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 594.320015][ C0] r4:8281b500 [ 594.320156][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.320463][ C0] r5:8247f0cc r4:826c3a9c [ 594.320634][ C0] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 594.320935][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.321261][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.321480][ C0] 1dc0: e02e7008 00000004 [ 594.321775][ C0] 1de0: 00008856 00000000 e02e7008 00000004 00000001 84112d68 8421ba88 84112c40 [ 594.322036][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 809c8328 809c832c 60000013 ffffffff [ 594.322340][ C0] r9:8281b500 r8:8421ba88 r7:82801e0c r6:ffffffff r5:60000013 r4:809c832c [ 594.322608][ C0] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 594.323001][ C0] r5:00000004 r4:84112c40 [ 594.323177][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 594.323457][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841f7628 [ 594.323672][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.323995][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.324346][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83eaa518 r5:00000001 [ 594.324595][ C0] r4:841f7628 [ 594.324733][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 594.325053][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 594.325350][ C0] r5:000000ff r4:845d8a24 [ 594.325514][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 594.325808][ C0] r5:000000ff r4:845d8a24 [ 594.325974][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 594.326286][ C0] r5:000000ff r4:845d8a24 [ 594.326450][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 594.326750][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 594.326963][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.327303][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.327544][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.327858][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.328148][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 594.328425][ C0] r4:000000ed [ 594.328566][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 594.328876][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.329322][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.331393][ C0] Rebooting in 86400 seconds..