last executing test programs: 650.191308ms ago: executing program 1 (id=531): r0 = epoll_create(0xff) close_range(r0, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) write$P9_RSYMLINK(r0, 0x0, 0x0) 539.224582ms ago: executing program 0 (id=533): r0 = socket(0x1, 0x2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) dup2(r1, r0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 539.113442ms ago: executing program 1 (id=534): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4008801}, 0xc0043) 449.650343ms ago: executing program 1 (id=535): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0x5452, &(0x7f0000000000)={0x1, 0x8000000, 0x0, 'queue1\x00', 0xfffffff8}) 448.206863ms ago: executing program 0 (id=536): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, r0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5452, &(0x7f0000001300)={{}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 339.935017ms ago: executing program 1 (id=537): r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "98862b15e48a9d15c6280f196c55f28e077105a5f478a93388e117094ef07a3938ece9c5085e9397441a5906c039bdf207bc95994587ece36574d8888e00b432"}, 0x48, 0xfffffffffffffffe) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) r2 = getgid() keyctl$chown(0x4, r0, r1, r2) 338.405657ms ago: executing program 0 (id=538): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x28040, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000000)={0x7, r0, 0x1}) write$P9_RWALK(r2, 0x0, 0x0) 240.82542ms ago: executing program 1 (id=539): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x3a1100, 0x0) close(r0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 179.810957ms ago: executing program 0 (id=540): r0 = getpgrp(0x0) r1 = syz_pidfd_open(r0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000), 0xb5, 0x801) pidfd_getfd(r1, r2, 0x0) 158.46451ms ago: executing program 1 (id=541): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4808) 79.896889ms ago: executing program 0 (id=542): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) 0s ago: executing program 0 (id=543): r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x20000050) kernel console output (not intermixed with test programs): [ 48.171732][ T29] audit: type=1400 audit(48.080:56): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.173376][ T29] audit: type=1400 audit(48.080:57): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:44567' (ED25519) to the list of known hosts. [ 63.315830][ T29] audit: type=1400 audit(63.220:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.837336][ T29] audit: type=1400 audit(64.740:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.863013][ T29] audit: type=1400 audit(64.770:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.587590][ T29] audit: type=1400 audit(68.500:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.592958][ T29] audit: type=1400 audit(68.500:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.610186][ T3094] cgroup: Unknown subsys name 'net' [ 68.619122][ T29] audit: type=1400 audit(68.530:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.851556][ T3094] cgroup: Unknown subsys name 'cpuset' [ 68.860369][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 68.861304][ T3094] cgroup: Unknown subsys name 'rlimit' [ 69.050683][ T29] audit: type=1400 audit(68.960:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.054773][ T29] audit: type=1400 audit(68.970:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.056926][ T29] audit: type=1400 audit(68.970:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.240477][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.244573][ T29] audit: type=1400 audit(69.160:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.248154][ T29] audit: type=1400 audit(69.160:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.280951][ T29] audit: type=1400 audit(69.190:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.283410][ T29] audit: type=1400 audit(69.190:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.918434][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.693947][ T29] audit: type=1400 audit(78.610:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.762887][ T29] audit: type=1400 audit(78.670:72): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.773390][ T29] audit: type=1400 audit(78.680:73): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.781499][ T29] audit: type=1400 audit(78.690:74): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.809021][ T29] audit: type=1400 audit(78.720:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.811156][ T29] audit: type=1400 audit(78.720:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.896625][ T29] audit: type=1400 audit(78.810:77): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.375289][ T29] audit: type=1400 audit(79.290:78): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.211942][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.216065][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.363234][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.366756][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.991981][ T3099] hsr_slave_0: entered promiscuous mode [ 80.998993][ T3099] hsr_slave_1: entered promiscuous mode [ 81.129989][ T3100] hsr_slave_0: entered promiscuous mode [ 81.131461][ T3100] hsr_slave_1: entered promiscuous mode [ 81.133599][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 81.134143][ T3100] Cannot create hsr debugfs directory [ 81.420259][ T29] audit: type=1400 audit(81.330:79): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.430326][ T29] audit: type=1400 audit(81.340:80): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.459283][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.477830][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.497059][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.517450][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.611539][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.628821][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.638571][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.655673][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.301956][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.358293][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.276059][ T3099] veth0_vlan: entered promiscuous mode [ 84.290788][ T3099] veth1_vlan: entered promiscuous mode [ 84.347781][ T3099] veth0_macvtap: entered promiscuous mode [ 84.357156][ T3099] veth1_macvtap: entered promiscuous mode [ 84.477426][ T1969] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.478663][ T1969] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.479244][ T1969] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.479333][ T1969] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.579766][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.580157][ T29] audit: type=1400 audit(84.490:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.596277][ T29] audit: type=1400 audit(84.510:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.ayftBt/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.598866][ T29] audit: type=1400 audit(84.510:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.617252][ T29] audit: type=1400 audit(84.530:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.ayftBt/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.623352][ T29] audit: type=1400 audit(84.530:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.ayftBt/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.632044][ T29] audit: type=1400 audit(84.540:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.636465][ T29] audit: type=1400 audit(84.550:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.638108][ T29] audit: type=1400 audit(84.550:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2363 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.642146][ T29] audit: type=1400 audit(84.550:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.649690][ T29] audit: type=1400 audit(84.560:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.716527][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.066638][ T3100] veth0_vlan: entered promiscuous mode [ 85.105238][ T3100] veth1_vlan: entered promiscuous mode [ 85.188281][ T3100] veth0_macvtap: entered promiscuous mode [ 85.226667][ T3100] veth1_macvtap: entered promiscuous mode [ 85.323092][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.324411][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.325560][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.326660][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.774475][ T3769] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=269 sclass=netlink_audit_socket pid=3769 comm=syz.1.30 [ 93.165667][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 93.173406][ T29] audit: type=1400 audit(93.080:107): avc: denied { append } for pid=3797 comm="syz.1.45" name="nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 93.180617][ T29] audit: type=1400 audit(93.090:108): avc: denied { append } for pid=3797 comm="syz.1.45" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.591968][ T3805] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3805 comm=syz.0.48 [ 94.004749][ T29] audit: type=1400 audit(93.910:109): avc: denied { create } for pid=3811 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 94.008758][ T29] audit: type=1400 audit(93.920:110): avc: denied { write } for pid=3811 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 94.547225][ T29] audit: type=1400 audit(94.460:111): avc: denied { create } for pid=3829 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.557278][ T29] audit: type=1400 audit(94.470:112): avc: denied { write } for pid=3829 comm="syz.0.61" path="socket:[2588]" dev="sockfs" ino=2588 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.965644][ T29] audit: type=1400 audit(94.880:113): avc: denied { ioctl } for pid=3844 comm="syz.1.68" path="socket:[3342]" dev="sockfs" ino=3342 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.970745][ T29] audit: type=1400 audit(94.880:114): avc: denied { bind } for pid=3844 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.249302][ T29] audit: type=1400 audit(95.160:115): avc: denied { ioctl } for pid=3852 comm="syz.0.72" path="socket:[2629]" dev="sockfs" ino=2629 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 95.256085][ T29] audit: type=1400 audit(95.170:116): avc: denied { write } for pid=3852 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 95.516771][ T3859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3859 comm=syz.0.75 [ 97.526309][ T3927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3927 comm=syz.1.109 [ 98.724912][ T29] audit: type=1400 audit(98.630:117): avc: denied { allowed } for pid=3964 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 98.741559][ T29] audit: type=1400 audit(98.650:118): avc: denied { create } for pid=3964 comm="syz.1.128" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 98.755648][ T29] audit: type=1400 audit(98.670:119): avc: denied { ioctl } for pid=3964 comm="syz.1.128" path="socket:[3544]" dev="sockfs" ino=3544 ioctlcmd=0x5511 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.949768][ T29] audit: type=1400 audit(98.860:120): avc: denied { setopt } for pid=3970 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 99.617491][ T3997] Zero length message leads to an empty skb [ 99.862826][ T29] audit: type=1400 audit(99.770:121): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 100.671439][ T4038] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4038 comm=syz.0.164 [ 100.760894][ T4042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4042 comm=syz.0.165 [ 100.828934][ T29] audit: type=1400 audit(100.740:122): avc: denied { create } for pid=4044 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 100.834720][ T29] audit: type=1400 audit(100.740:123): avc: denied { setopt } for pid=4044 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 102.654345][ T29] audit: type=1400 audit(102.560:124): avc: denied { write } for pid=4104 comm="syz.0.197" name="ip_mr_cache" dev="proc" ino=4026532767 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 102.824447][ T4113] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4113 comm=syz.1.201 [ 102.895378][ T29] audit: type=1400 audit(102.810:125): avc: denied { create } for pid=4114 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.493937][ T29] audit: type=1400 audit(103.410:126): avc: denied { create } for pid=4135 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 103.567773][ T4139] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4139 comm=syz.1.213 [ 105.197423][ T4178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=4178 comm=syz.1.232 [ 105.326108][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 105.327119][ T29] audit: type=1400 audit(105.240:128): avc: denied { create } for pid=4181 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 105.330640][ T29] audit: type=1400 audit(105.240:129): avc: denied { write } for pid=4181 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 108.508315][ T4201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4201 comm=syz.0.242 [ 109.013766][ T29] audit: type=1400 audit(108.930:130): avc: denied { getopt } for pid=4217 comm="syz.0.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 109.310442][ T4226] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4226 comm=syz.0.254 [ 109.810611][ T29] audit: type=1400 audit(109.720:131): avc: denied { ioctl } for pid=4239 comm="syz.0.261" path="socket:[5121]" dev="sockfs" ino=5121 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 110.801527][ T4267] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4267 comm=syz.1.275 [ 112.049261][ T4314] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1537 sclass=netlink_audit_socket pid=4314 comm=syz.0.298 [ 112.136472][ T29] audit: type=1400 audit(112.050:132): avc: denied { sqpoll } for pid=4315 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 114.116598][ T4342] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4342 comm=syz.0.311 [ 114.557294][ T4352] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4352 comm=syz.1.316 [ 115.092044][ T29] audit: type=1400 audit(115.000:133): avc: denied { read } for pid=4377 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.127242][ T29] audit: type=1400 audit(116.040:134): avc: denied { map } for pid=4403 comm="syz.0.342" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5460 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 116.133543][ T29] audit: type=1400 audit(116.040:135): avc: denied { read write } for pid=4403 comm="syz.0.342" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5460 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 116.168164][ T29] audit: type=1400 audit(116.080:136): avc: denied { create } for pid=4403 comm="syz.0.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 116.515348][ T4418] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4418 comm=syz.1.349 [ 116.876644][ T29] audit: type=1400 audit(116.790:137): avc: denied { create } for pid=4425 comm="syz.1.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 116.881366][ T4426] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1545 sclass=netlink_xfrm_socket pid=4426 comm=syz.1.353 [ 116.881403][ T29] audit: type=1400 audit(116.790:138): avc: denied { write } for pid=4425 comm="syz.1.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 117.112963][ T4431] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=4 sclass=netlink_xfrm_socket pid=4431 comm=syz.1.355 [ 117.430831][ T29] audit: type=1400 audit(117.340:139): avc: denied { create } for pid=4438 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.343386][ T29] audit: type=1400 audit(119.250:140): avc: denied { ioctl } for pid=4470 comm="syz.0.375" path="socket:[5570]" dev="sockfs" ino=5570 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.619651][ T4482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4482 comm=syz.1.380 [ 125.557794][ T29] audit: type=1400 audit(125.470:141): avc: denied { read } for pid=4580 comm="syz.1.424" path="socket:[5771]" dev="sockfs" ino=5771 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 125.747224][ T4587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=4587 comm=syz.1.427 [ 125.936999][ T4593] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4593 comm=syz.1.430 [ 126.191409][ T29] audit: type=1400 audit(126.100:142): avc: denied { getopt } for pid=4598 comm="syz.1.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 126.953954][ T29] audit: type=1400 audit(126.870:143): avc: denied { remount } for pid=4616 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 127.441707][ T29] audit: type=1400 audit(127.350:144): avc: denied { setopt } for pid=4630 comm="syz.0.447" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.447446][ T29] audit: type=1400 audit(127.360:145): avc: denied { write } for pid=4630 comm="syz.0.447" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.457955][ T29] audit: type=1400 audit(127.370:146): avc: denied { read } for pid=4630 comm="syz.0.447" path="socket:[4923]" dev="sockfs" ino=4923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.980087][ T4657] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4657 comm=syz.1.460 [ 129.814043][ T29] audit: type=1400 audit(129.730:147): avc: denied { create } for pid=4694 comm="syz.0.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 129.825990][ T29] audit: type=1400 audit(129.740:148): avc: denied { ioctl } for pid=4694 comm="syz.0.482" path="socket:[5990]" dev="sockfs" ino=5990 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 130.440551][ T29] audit: type=1400 audit(130.350:149): avc: denied { read } for pid=4720 comm="syz.0.492" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 130.443759][ T29] audit: type=1400 audit(130.350:150): avc: denied { open } for pid=4720 comm="syz.0.492" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 130.677544][ T4731] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1542 sclass=netlink_audit_socket pid=4731 comm=syz.1.496 [ 130.728509][ T4733] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4733 comm=syz.0.499 [ 133.196855][ T4783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4783 comm=syz.0.522 [ 133.574194][ T29] audit: type=1400 audit(133.480:151): avc: denied { create } for pid=4797 comm="syz.0.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 133.579781][ T29] audit: type=1400 audit(133.490:152): avc: denied { setopt } for pid=4797 comm="syz.0.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 594.332730][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 430s! [swapper/1:0] [ 594.333056][ C1] Modules linked in: [ 594.334005][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 594.334295][ C1] Hardware name: ARM-Versatile Express [ 594.334550][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 594.335356][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.335425][ C1] pc : [<81abb6f4>] lr : [<81abb6cc>] psr: 80000113 [ 594.335475][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.335516][ C1] r10: 81c05450 r9 : 83f73440 r8 : 83f0da88 [ 594.335562][ C1] r7 : 83f73568 r6 : 00000000 r5 : 00000001 r4 : 83f73568 [ 594.335607][ C1] r3 : 00006cc6 r2 : 00006cc8 r1 : 00000000 r0 : 00000001 [ 594.335758][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.335845][ C1] Control: 30c5387d Table: 84e31880 DAC: 00000000 [ 594.335981][ C1] Call trace: frame pointer underflow [ 594.336345][ C1] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 594.336751][ C1] r5:00000001 r4:83f73440 [ 594.336854][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 594.336953][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8409a780 [ 594.336974][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.337043][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.337157][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffbf8d r6:0000000a r5:00000000 [ 594.337199][ C1] r4:8409a780 [ 594.337218][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 594.337279][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 594.337341][ C1] r5:832f7844 r4:832f7844 [ 594.337358][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 594.337420][ C1] r5:832f7844 r4:84b77dcc [ 594.337436][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 594.337496][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 594.337573][ C1] r7:ffffbf8d r6:809cce40 r5:84b77dcc r4:83216000 [ 594.337593][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 594.337668][ C1] r9:df805ebc r8:ffffbf8d r7:00000000 r6:809cce40 r5:dddd9f00 r4:84b77dcc [ 594.337685][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 594.337761][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.337783][ C1] r4:dddd9f00 [ 594.337801][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 594.337863][ C1] r4:82804084 [ 594.337882][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.337950][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.338032][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443e68 r5:8247ef9c [ 594.338053][ C1] r4:83216000 [ 594.338070][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.338135][ C1] r5:8247ef9c r4:826c3a9c [ 594.338152][ C1] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 594.338232][ C1] [<81aad0e8>] (generic_handle_arch_irq) from [<81a7d0fc>] (call_with_stack+0x1c/0x20) [ 594.338315][ C1] r9:83216000 r8:83f0da88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7cb8 [ 594.338335][ C1] [<81a7d0e0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.338482][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.338672][ C1] 5e00: e01db008 0000000d 00006cc6 00000000 e01db008 0000000d [ 594.338729][ C1] 5e20: 00000001 83f73568 83f0da88 83f73440 00000000 df865e6c df865e58 df865e58 [ 594.338758][ C1] 5e40: 809c7cb4 809c7cb8 60000013 ffffffff [ 594.338816][ C1] [<809c7c98>] (gpio_mmio_write32) from [<809c74d8>] (gpio_mmio_set+0x64/0x80) [ 594.338892][ C1] r5:00000008 r4:83f73440 [ 594.338909][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 594.338985][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8409a7bc [ 594.339002][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.339064][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.339142][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838323d8 r5:00000001 [ 594.339165][ C1] r4:8409a7bc [ 594.339182][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 594.339253][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 594.339320][ C1] r5:000000ff r4:832f7b14 [ 594.339341][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 594.339415][ C1] r5:000000ff r4:832f7b14 [ 594.339437][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 594.339506][ C1] r5:000000ff r4:832f7b14 [ 594.339526][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 594.339601][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.339620][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.339736][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.339757][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.339833][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.339920][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.339946][ C1] r4:00000092 [ 594.339965][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.340039][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.340123][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.340501][ C1] Sending NMI from CPU 1 to CPUs 0: [ 604.362061][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 604.383907][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 604.384375][ C1] Tainted: [L]=SOFTLOCKUP [ 604.384564][ C1] Hardware name: ARM-Versatile Express [ 604.384795][ C1] Call trace: frame pointer underflow [ 604.385183][ C1] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 604.385587][ C1] r7:822964bc r6:83216000 r5:00000000 r4:8229566c [ 604.385809][ C1] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 604.386136][ C1] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 604.386457][ C1] r5:00000000 r4:82a7bd14 [ 604.386619][ C1] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 604.386940][ C1] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 604.387308][ C1] r7:82ac27f8 [ 604.387483][ C1] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 604.387892][ C1] r3:00000001 r2:00004000 r1:82a7bd1c r0:822964bc [ 604.388161][ C1] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 604.388567][ C1] r10:83216000 r9:00000000 r8:ddddb130 r7:80383c38 r6:ddddb000 r5:ddddb040 [ 604.388877][ C1] r4:ddddb5d8 [ 604.389033][ C1] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 604.389441][ C1] r10:5c11ce00 r9:ddddb180 r8:ddddb130 r7:0000008a r6:00000003 r5:20000193 [ 604.389749][ C1] r4:ddddb000 [ 604.389899][ C1] [<8032b020>] (hrtimer_interrupt) from [<813400d8>] (arch_timer_handler_virt+0x30/0x38) [ 604.390338][ C1] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000001 r6:00000001 r5:82498528 [ 604.390648][ C1] r4:8309de40 [ 604.390818][ C1] [<813400a8>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 604.391279][ C1] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 604.391726][ C1] r10:81c05450 r9:83216000 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 604.392046][ C1] r4:8280cc44 [ 604.392223][ C1] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 604.392623][ C1] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 604.393019][ C1] [<80201260>] (gic_handle_irq) from [<81aad148>] (generic_handle_arch_irq+0x60/0x80) [ 604.393430][ C1] r7:df805d18 r6:82443e68 r5:8247ef9c r4:826c3a9c [ 604.393686][ C1] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 604.394077][ C1] Exception stack(0xdf805d18 to 0xdf805d60) [ 604.394350][ C1] 5d00: 00000001 00000000 [ 604.394682][ C1] 5d20: 00006cc8 00006cc6 83f73568 00000001 00000000 83f73568 83f0da88 83f73440 [ 604.395019][ C1] 5d40: 81c05450 df805d7c df805d68 df805d68 81abb6cc 81abb6f4 80000113 ffffffff [ 604.395358][ C1] r9:83216000 r8:83f0da88 r7:df805d4c r6:ffffffff r5:80000113 r4:81abb6f4 [ 604.395636][ C1] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 604.396016][ C1] r5:00000001 r4:83f73440 [ 604.396225][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 604.396574][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8409a780 [ 604.396867][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 604.397277][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 604.397705][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffbf8d r6:0000000a r5:00000000 [ 604.398020][ C1] r4:8409a780 [ 604.398201][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 604.398581][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 604.398937][ C1] r5:832f7844 r4:832f7844 [ 604.399130][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 604.399515][ C1] r5:832f7844 r4:84b77dcc [ 604.399764][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 604.400181][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 604.400580][ C1] r7:ffffbf8d r6:809cce40 r5:84b77dcc r4:83216000 [ 604.400841][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 604.401240][ C1] r9:df805ebc r8:ffffbf8d r7:00000000 r6:809cce40 r5:dddd9f00 r4:84b77dcc [ 604.401551][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 604.401952][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 604.402357][ C1] r4:dddd9f00 [ 604.402594][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 604.402982][ C1] r4:82804084 [ 604.403164][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 604.403551][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 604.403976][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443e68 r5:8247ef9c [ 604.404309][ C1] r4:83216000 [ 604.404474][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 604.404827][ C1] r5:8247ef9c r4:826c3a9c [ 604.405020][ C1] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 604.405401][ C1] [<81aad0e8>] (generic_handle_arch_irq) from [<81a7d0fc>] (call_with_stack+0x1c/0x20) [ 604.405790][ C1] r9:83216000 r8:83f0da88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7cb8 [ 604.406089][ C1] [<81a7d0e0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 604.406455][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 604.406715][ C1] 5e00: e01db008 0000000d 00006cc6 00000000 e01db008 0000000d [ 604.407054][ C1] 5e20: 00000001 83f73568 83f0da88 83f73440 00000000 df865e6c df865e58 df865e58 [ 604.407359][ C1] 5e40: 809c7cb4 809c7cb8 60000013 ffffffff [ 604.407560][ C1] [<809c7c98>] (gpio_mmio_write32) from [<809c74d8>] (gpio_mmio_set+0x64/0x80) [ 604.407958][ C1] r5:00000008 r4:83f73440 [ 604.408158][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 604.408516][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8409a7bc [ 604.408754][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 604.409125][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 604.409568][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838323d8 r5:00000001 [ 604.409875][ C1] r4:8409a7bc [ 604.410047][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 604.410441][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 604.410800][ C1] r5:000000ff r4:832f7b14 [ 604.410990][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 604.411367][ C1] r5:000000ff r4:832f7b14 [ 604.411550][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 604.411971][ C1] r5:000000ff r4:832f7b14 [ 604.412165][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 604.412534][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 604.412783][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 604.413179][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 604.413490][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 604.413841][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 604.414223][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 604.414543][ C1] r4:00000092 [ 604.414695][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 604.415104][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 604.415472][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 606.062423][ C1] SMP: failed to stop secondary CPUs [ 606.064043][ C1] Rebooting in 86400 seconds..