[ 395.946659][ T3145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 431.781690][ T3145] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:54203' (ED25519) to the list of known hosts. [ 913.947515][ T25] audit: type=1400 audit(913.150:60): avc: denied { execute } for pid=3310 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 913.971086][ T25] audit: type=1400 audit(913.170:61): avc: denied { execute_no_trans } for pid=3310 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:16:05 parsed 1 programs [ 966.311620][ T25] audit: type=1400 audit(965.510:62): avc: denied { node_bind } for pid=3310 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 987.811689][ T25] audit: type=1400 audit(987.010:63): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 987.848623][ T25] audit: type=1400 audit(987.050:64): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 987.941016][ T3317] cgroup: Unknown subsys name 'net' [ 987.994031][ T25] audit: type=1400 audit(987.190:65): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 988.422883][ T3317] cgroup: Unknown subsys name 'cpuset' [ 988.531529][ T3317] cgroup: Unknown subsys name 'rlimit' [ 989.909343][ T25] audit: type=1400 audit(989.110:66): avc: denied { setattr } for pid=3317 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 989.938373][ T25] audit: type=1400 audit(989.130:67): avc: denied { create } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 989.965796][ T25] audit: type=1400 audit(989.160:68): avc: denied { write } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 989.990393][ T25] audit: type=1400 audit(989.190:69): avc: denied { module_request } for pid=3317 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 990.541385][ T25] audit: type=1400 audit(989.740:70): avc: denied { read } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 990.607014][ T25] audit: type=1400 audit(989.800:71): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 990.647130][ T25] audit: type=1400 audit(989.850:72): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 991.902296][ T3321] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 992.129866][ T3317] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 1021.591490][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 1021.598339][ T25] audit: type=1400 audit(1020.790:77): avc: denied { execmem } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1021.919996][ T25] audit: type=1400 audit(1021.120:78): avc: denied { read } for pid=3324 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1021.957997][ T25] audit: type=1400 audit(1021.150:79): avc: denied { open } for pid=3324 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1022.041498][ T25] audit: type=1400 audit(1021.240:80): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1023.293723][ T25] audit: type=1400 audit(1022.480:81): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1023.329763][ T25] audit: type=1400 audit(1022.530:82): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.CqBnmD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1023.379630][ T25] audit: type=1400 audit(1022.580:83): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1023.456330][ T25] audit: type=1400 audit(1022.650:84): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.CqBnmD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1023.496386][ T25] audit: type=1400 audit(1022.690:85): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.CqBnmD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1023.608757][ T25] audit: type=1400 audit(1022.810:86): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1024.086486][ T3324] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1031.537324][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1031.549526][ T25] audit: type=1400 audit(1030.740:95): avc: denied { sys_module } for pid=3329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1043.615890][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1043.688152][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1050.026923][ T3329] hsr_slave_0: entered promiscuous mode [ 1050.056324][ T3329] hsr_slave_1: entered promiscuous mode [ 1054.037681][ T3329] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1054.165703][ T3329] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1054.247308][ T3329] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1054.339107][ T3329] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1061.271845][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1091.160018][ T3329] veth0_vlan: entered promiscuous mode [ 1091.457543][ T3329] veth1_vlan: entered promiscuous mode [ 1092.298285][ T3329] veth0_macvtap: entered promiscuous mode [ 1092.588647][ T3329] veth1_macvtap: entered promiscuous mode [ 1093.766203][ T2104] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1093.817260][ T2104] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1093.821329][ T2104] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1093.849063][ T2104] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1099.737965][ T2104] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1100.605646][ T2104] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1101.403770][ T2104] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1101.889612][ T2104] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1111.214179][ T25] audit: type=1400 audit(1110.380:96): avc: denied { create } for pid=3416 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1111.410556][ T25] audit: type=1400 audit(1110.610:97): avc: denied { sys_admin } for pid=3416 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1115.000271][ T2104] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1115.081288][ T2104] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1115.140275][ T2104] bond0 (unregistering): Released all slaves [ 1116.156848][ T2104] hsr_slave_0: left promiscuous mode [ 1116.197857][ T2104] hsr_slave_1: left promiscuous mode [ 1116.555938][ T2104] veth1_macvtap: left promiscuous mode [ 1116.559836][ T2104] veth0_macvtap: left promiscuous mode [ 1116.585550][ T2104] veth1_vlan: left promiscuous mode [ 1116.590011][ T2104] veth0_vlan: left promiscuous mode [ 1139.494311][ T25] audit: type=1400 audit(1138.690:98): avc: denied { sys_chroot } for pid=3419 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1212.345224][ T25] audit: type=1400 audit(1211.540:99): avc: denied { create } for pid=3485 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1286.008184][ T25] audit: type=1401 audit(1285.210:100): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 1970/01/01 00:21:37 executed programs: 0 [ 1319.509799][ T3544] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1319.720501][ T3544] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1327.676645][ T3544] hsr_slave_0: entered promiscuous mode [ 1327.700597][ T3544] hsr_slave_1: entered promiscuous mode [ 1331.865331][ T3544] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1332.008505][ T3544] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1332.098529][ T3544] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1332.198948][ T3544] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1339.511664][ T3544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1366.535422][ T3544] veth0_vlan: entered promiscuous mode [ 1366.915409][ T3544] veth1_vlan: entered promiscuous mode [ 1367.868499][ T3544] veth0_macvtap: entered promiscuous mode [ 1368.016356][ T3544] veth1_macvtap: entered promiscuous mode [ 1370.037416][ T49] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1370.041338][ T49] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1370.075891][ T58] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1370.081785][ T58] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:22:54 executed programs: 2 [ 1376.588133][ T25] audit: type=1400 audit(1375.790:101): avc: denied { read } for pid=3618 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1376.696864][ T25] audit: type=1400 audit(1375.820:102): avc: denied { open } for pid=3618 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1376.734219][ T25] audit: type=1400 audit(1375.930:103): avc: denied { ioctl } for pid=3618 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1378.688183][ T3618] ================================================================== [ 1378.688766][ T3618] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1378.690510][ T3618] Read of size 8 at addr 49f0000020df0000 by task syz.2.17/3618 [ 1378.690748][ T3618] Pointer tag: [49], memory tag: [fe] [ 1378.690865][ T3618] [ 1378.691815][ T3618] CPU: 0 UID: 0 PID: 3618 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1378.692361][ T3618] Hardware name: linux,dummy-virt (DT) [ 1378.692835][ T3618] Call trace: [ 1378.693231][ T3618] show_stack+0x2c/0x3c (C) [ 1378.693877][ T3618] __dump_stack+0x30/0x40 [ 1378.694144][ T3618] dump_stack_lvl+0xd8/0x12c [ 1378.694346][ T3618] print_address_description+0xac/0x288 [ 1378.694658][ T3618] print_report+0x84/0xa0 [ 1378.694916][ T3618] kasan_report+0xb0/0x110 [ 1378.695145][ T3618] kasan_tag_mismatch+0x28/0x3c [ 1378.695387][ T3618] __hwasan_tag_mismatch+0x30/0x60 [ 1378.695719][ T3618] __kvm_pgtable_walk+0x8e4/0xa68 [ 1378.696011][ T3618] kvm_pgtable_walk+0x294/0x468 [ 1378.696285][ T3618] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1378.696617][ T3618] kvm_free_stage2_pgd+0x198/0x28c [ 1378.696906][ T3618] kvm_uninit_stage2_mmu+0x20/0x38 [ 1378.697215][ T3618] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1378.697535][ T3618] kvm_mmu_notifier_release+0x48/0xa8 [ 1378.697820][ T3618] mmu_notifier_unregister+0x128/0x42c [ 1378.698086][ T3618] kvm_put_kvm+0x6a0/0xfa8 [ 1378.698284][ T3618] kvm_vm_release+0x58/0x78 [ 1378.698571][ T3618] __fput+0x4ac/0x980 [ 1378.698774][ T3618] ____fput+0x20/0x58 [ 1378.698966][ T3618] task_work_run+0x1bc/0x254 [ 1378.699182][ T3618] do_notify_resume+0x1bc/0x270 [ 1378.699441][ T3618] el0_svc+0xb8/0x164 [ 1378.699731][ T3618] el0t_64_sync_handler+0x84/0x12c [ 1378.699994][ T3618] el0t_64_sync+0x198/0x19c [ 1378.700514][ T3618] [ 1378.700687][ T3618] The buggy address belongs to the physical page: [ 1378.701947][ T3618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x60df0 [ 1378.702307][ T3618] flags: 0x1ffed8000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0xb6) [ 1378.703477][ T3618] raw: 01ffed8000000000 ffffc1ffc08e79c8 ffffc1ffc08e69c8 0000000000000000 [ 1378.703726][ T3618] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1378.703923][ T3618] page dumped because: kasan: bad access detected [ 1378.704063][ T3618] [ 1378.704154][ T3618] Memory state around the buggy address: [ 1378.704509][ T3618] fff0000020defe00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1378.704711][ T3618] fff0000020deff00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1378.704898][ T3618] >fff0000020df0000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1378.705057][ T3618] ^ [ 1378.705316][ T3618] fff0000020df0100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1378.705526][ T3618] fff0000020df0200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1378.705737][ T3618] ================================================================== [ 1378.934857][ T3618] Disabling lock debugging due to kernel taint [ 1378.943759][ T3618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x60df0 [ 1378.970062][ T3618] flags: 0x1ffed8000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0xb6) [ 1378.974015][ T3618] raw: 01ffed8000000000 ffffc1ffc08e79c8 fff0000072d85420 0000000000000000 [ 1379.003081][ T3618] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1379.003693][ T3618] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 1379.004852][ T3618] ------------[ cut here ]------------ [ 1379.005030][ T3618] kernel BUG at ./include/linux/mm.h:1036! [ 1379.005905][ T3618] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 1379.012851][ T3618] Modules linked in: [ 1379.014689][ T3618] CPU: 0 UID: 0 PID: 3618 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1379.016406][ T3618] Tainted: [B]=BAD_PAGE [ 1379.017155][ T3618] Hardware name: linux,dummy-virt (DT) [ 1379.018250][ T3618] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1379.019696][ T3618] pc : kvm_s2_put_page+0x374/0x3a0 [ 1379.020759][ T3618] lr : kvm_s2_put_page+0x374/0x3a0 [ 1379.021818][ T3618] sp : ffff80008e457830 [ 1379.022597][ T3618] x29: ffff80008e457830 x28: 49f0000020df0000 x27: 49f0000020df0000 [ 1379.024256][ T3618] x26: 00000000000000ff x25: ffff80008734e000 x24: ffffc1ffc0000000 [ 1379.025713][ T3618] x23: ffffc1ffc0837c08 x22: 0000000000000000 x21: ffffc1ffc0837c34 [ 1379.026982][ T3618] x20: 0000000000000000 x19: ffffc1ffc0837c00 x18: 0000000016f25cae [ 1379.028403][ T3618] x17: 0000000002f4141a x16: 0000000015f16c6f x15: 00000000f66f3278 [ 1379.029858][ T3618] x14: 0000000000000000 x13: fff000001f31bb08 x12: 0000000000000001 [ 1379.031210][ T3618] x11: 0000000000000000 x10: 0000000000ff0100 x9 : b1f423724f8a8000 [ 1379.032727][ T3618] x8 : b1f423724f8a8000 x7 : 0000000000000400 x6 : ffff80008048b334 [ 1379.034156][ T3618] x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80008074b7f8 [ 1379.035581][ T3618] x2 : 0000000000000002 x1 : 0000000100000000 x0 : 000000000000003e [ 1379.037069][ T3618] Call trace: [ 1379.037759][ T3618] kvm_s2_put_page+0x374/0x3a0 (P) [ 1379.038816][ T3618] stage2_free_walker+0xdc/0x264 [ 1379.039775][ T3618] __kvm_pgtable_walk+0x7d8/0xa68 [ 1379.040740][ T3618] kvm_pgtable_walk+0x294/0x468 [ 1379.041721][ T3618] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1379.042792][ T3618] kvm_free_stage2_pgd+0x198/0x28c [ 1379.043772][ T3618] kvm_uninit_stage2_mmu+0x20/0x38 [ 1379.044756][ T3618] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1379.045834][ T3618] kvm_mmu_notifier_release+0x48/0xa8 [ 1379.046764][ T3618] mmu_notifier_unregister+0x128/0x42c [ 1379.047794][ T3618] kvm_put_kvm+0x6a0/0xfa8 [ 1379.048646][ T3618] kvm_vm_release+0x58/0x78 [ 1379.049552][ T3618] __fput+0x4ac/0x980 [ 1379.050332][ T3618] ____fput+0x20/0x58 [ 1379.051175][ T3618] task_work_run+0x1bc/0x254 [ 1379.052039][ T3618] do_notify_resume+0x1bc/0x270 [ 1379.053022][ T3618] el0_svc+0xb8/0x164 [ 1379.053947][ T3618] el0t_64_sync_handler+0x84/0x12c [ 1379.054932][ T3618] el0t_64_sync+0x198/0x19c [ 1379.056293][ T3618] Code: d0037581 9126fc21 aa1303e0 97f9c9f2 (d4210000) [ 1379.058083][ T3618] ---[ end trace 0000000000000000 ]--- [ 1379.059731][ T3618] Kernel panic - not syncing: Oops - BUG: Fatal exception [ 1379.061778][ T3618] Kernel Offset: disabled [ 1379.062535][ T3618] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1379.063721][ T3618] Memory Limit: none [ 1379.065441][ T3618] Rebooting in 86400 seconds.. VM DIAGNOSIS: 18:16:00 Registers: info registers vcpu 0 CPU#0 PC=ffff800082136720 X00=0000000000000003 X01=0000000000000002 X02=0000000000000001 X03=ffff80008213661c X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081f26774 X08=cdf000000d9b9d80 X09=0000000000000000 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000002 X13=0000000000000002 X14=0000000000000000 X15=000000000000018f X16=00000000000000cd X17=0000000000000000 X18=00000000006d9000 X19=efff800000000000 X20=daf000000dcb4880 X21=cdff80008c44b018 X22=0000000000000002 X23=daf000000dcb497c X24=00000000000000da X25=daf000000dcb4ac8 X26=daf000000dcb48c8 X27=00000000000000da X28=00000000000000da X29=ffff80008c487b40 X30=ffff800082136720 SP=ffff80008c487b30 PSTATE=814020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=6572207265767265:730073250a0d0a0d Z02=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z03=0000000000000000:00ff00ff00000000 Z04=0000000000000000:000000000f0f0000 Z05=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z06=203a29315f657661:6c735f646e6f6220 Z07=206e612073612067:6e6976616c736e45 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000fffff76d3b70:0000fffff76d3b70 Z17=ffffff80ffffffd8:0000fffff76d3b40 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000