last executing test programs: 11.646901386s ago: executing program 1 (id=2): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500), 0x200, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xbd) 7.559427224s ago: executing program 0 (id=1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING_ACQ_REL(r1, 0x4068aea3, &(0x7f00000039c0)={0xdf, 0x0, 0x4000}) ioctl$KVM_CREATE_DEVICE(r1, 0xc018aec0, &(0x7f00000000c0)={0x1}) 0s ago: executing program 1 (id=3): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x7f) kernel console output (not intermixed with test programs): [ 387.166810][ T3150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 447.112246][ T3150] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:11940' (ED25519) to the list of known hosts. [ 604.854380][ T25] audit: type=1400 audit(604.070:60): avc: denied { name_bind } for pid=3308 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 606.769448][ T25] audit: type=1400 audit(606.010:61): avc: denied { execute } for pid=3309 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 606.805456][ T25] audit: type=1400 audit(606.040:62): avc: denied { execute_no_trans } for pid=3309 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 628.642959][ T25] audit: type=1400 audit(627.880:63): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1869 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 628.678575][ T25] audit: type=1400 audit(627.910:64): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 628.763935][ T3309] cgroup: Unknown subsys name 'net' [ 628.815908][ T25] audit: type=1400 audit(628.050:65): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 629.205821][ T3309] cgroup: Unknown subsys name 'cpuset' [ 629.336759][ T3309] cgroup: Unknown subsys name 'rlimit' [ 630.257062][ T25] audit: type=1400 audit(629.490:66): avc: denied { setattr } for pid=3309 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 630.281765][ T25] audit: type=1400 audit(629.510:67): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 630.306945][ T25] audit: type=1400 audit(629.540:68): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 631.482117][ T3312] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 631.500969][ T25] audit: type=1400 audit(630.740:69): avc: denied { relabelto } for pid=3312 comm="mkswap" name="swap-file" dev="vda" ino=1872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 631.527439][ T25] audit: type=1400 audit(630.760:70): avc: denied { write } for pid=3312 comm="mkswap" path="/swap-file" dev="vda" ino=1872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 631.698043][ T25] audit: type=1400 audit(630.940:71): avc: denied { read } for pid=3309 comm="syz-executor" name="swap-file" dev="vda" ino=1872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 631.712572][ T25] audit: type=1400 audit(630.950:72): avc: denied { open } for pid=3309 comm="syz-executor" path="/swap-file" dev="vda" ino=1872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 631.758696][ T3309] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 683.187854][ T25] audit: type=1400 audit(682.430:73): avc: denied { execmem } for pid=3313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 687.480444][ T25] audit: type=1400 audit(686.720:74): avc: denied { read } for pid=3315 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 687.505278][ T25] audit: type=1400 audit(686.740:75): avc: denied { open } for pid=3315 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 687.600018][ T25] audit: type=1400 audit(686.820:76): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 687.841964][ T25] audit: type=1400 audit(687.080:77): avc: denied { module_request } for pid=3316 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 688.998529][ T25] audit: type=1400 audit(688.230:78): avc: denied { sys_module } for pid=3316 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 719.627853][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 720.250233][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 721.121410][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 721.777907][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 734.671763][ T3316] hsr_slave_0: entered promiscuous mode [ 734.699865][ T3316] hsr_slave_1: entered promiscuous mode [ 735.570228][ T3315] hsr_slave_0: entered promiscuous mode [ 735.598830][ T3315] hsr_slave_1: entered promiscuous mode [ 735.637567][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 735.641574][ T3315] Cannot create hsr debugfs directory [ 741.159742][ T25] audit: type=1400 audit(740.400:79): avc: denied { create } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 741.211545][ T25] audit: type=1400 audit(740.450:80): avc: denied { write } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 741.257996][ T25] audit: type=1400 audit(740.500:81): avc: denied { read } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 741.417666][ T3316] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 741.747875][ T3316] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 742.007982][ T3316] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 742.526198][ T3316] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 744.001388][ T3315] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 744.231036][ T3315] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 744.426947][ T3315] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 744.578718][ T3315] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 757.947209][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 761.387395][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 815.947542][ T3316] veth0_vlan: entered promiscuous mode [ 816.456901][ T3316] veth1_vlan: entered promiscuous mode [ 818.780714][ T3316] veth0_macvtap: entered promiscuous mode [ 819.250379][ T3316] veth1_macvtap: entered promiscuous mode [ 820.265457][ T3315] veth0_vlan: entered promiscuous mode [ 821.417119][ T3315] veth1_vlan: entered promiscuous mode [ 822.686816][ T3363] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 822.700022][ T3363] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 822.716029][ T3363] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 822.972436][ T3363] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 825.702944][ T3315] veth0_macvtap: entered promiscuous mode [ 825.905729][ T25] audit: type=1400 audit(825.140:82): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 826.190247][ T25] audit: type=1400 audit(825.390:83): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzkaller.5NsauB/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 826.200185][ T3315] veth1_macvtap: entered promiscuous mode [ 826.444471][ T25] audit: type=1400 audit(825.580:84): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 826.844471][ T25] audit: type=1400 audit(826.070:85): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzkaller.5NsauB/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 827.044378][ T25] audit: type=1400 audit(826.270:86): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzkaller.5NsauB/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3770 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 827.995941][ T25] audit: type=1400 audit(827.230:87): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 828.317406][ T25] audit: type=1400 audit(827.550:88): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 828.455866][ T25] audit: type=1400 audit(827.690:89): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="gadgetfs" ino=3779 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 829.059720][ T25] audit: type=1400 audit(828.300:90): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 829.206471][ T25] audit: type=1400 audit(828.440:91): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 829.319394][ T51] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 829.328874][ T51] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 829.339087][ T51] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 829.466546][ T51] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 831.278182][ T3316] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 832.125518][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 832.128712][ T25] audit: type=1400 audit(831.350:93): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 832.164163][ T25] audit: type=1400 audit(831.390:94): avc: denied { open } for pid=3316 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 832.191341][ T25] audit: type=1400 audit(831.430:95): avc: denied { ioctl } for pid=3316 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 841.656241][ T25] audit: type=1400 audit(840.860:96): avc: denied { read write } for pid=3472 comm="syz.1.2" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 841.718810][ T25] audit: type=1400 audit(840.960:97): avc: denied { open } for pid=3472 comm="syz.1.2" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 842.365612][ T25] audit: type=1400 audit(841.590:98): avc: denied { ioctl } for pid=3472 comm="syz.1.2" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 844.430809][ C0] Unhandled 64-bit el1h sync exception on CPU0, ESR 0x000000005a000000 -- HVC (AArch64) [ 844.432073][ C0] CPU: 0 UID: 0 PID: 3475 Comm: syz.0.1 Not tainted syzkaller #0 PREEMPT [ 844.432632][ C0] Hardware name: linux,dummy-virt (DT) [ 844.433179][ C0] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 844.433575][ C0] pc : pkvm_init_host_vm+0xb8/0x160 [ 844.437009][ C0] lr : pkvm_init_host_vm+0xa0/0x160 [ 844.437216][ C0] sp : ffff8000a3c77c60 [ 844.437336][ C0] x29: ffff8000a3c77c60 x28: 98f000001db8c018 x27: ffff800087354000 [ 844.437926][ C0] x26: 0cf000001d8172f0 x25: 000000000000004a x24: 00000000000014f8 [ 844.438246][ C0] x23: 000000000000004a x22: 4aff80008c96d260 x21: 4aff80008c96cff0 [ 844.438534][ C0] x20: 0000000000000000 x19: efff800000000000 x18: fff0000072d86400 [ 844.438834][ C0] x17: 0000000000000013 x16: ffff800080011d9c x15: 00000000000000fe [ 844.439133][ C0] x14: ffffffffffffffff x13: 000000000000008c x12: ffff7c1ffbf7c32c [ 844.439421][ C0] x11: 0000000000080000 x10: 0000000000ff0100 x9 : 0000000000000002 [ 844.439808][ C0] x8 : 98f000001db8bb00 x7 : ffff800080aba4c0 x6 : 0000000000000000 [ 844.440113][ C0] x5 : 0000000000000001 x4 : ffff8000a3c77ac0 x3 : 0000000000000004 [ 844.440421][ C0] x2 : 00000000000092c8 x1 : 0000000000000000 x0 : 00000000c600001b [ 844.441206][ C0] Kernel panic - not syncing: Unhandled exception [ 844.455957][ C0] CPU: 0 UID: 0 PID: 3475 Comm: syz.0.1 Not tainted syzkaller #0 PREEMPT [ 844.457351][ C0] Hardware name: linux,dummy-virt (DT) [ 844.458269][ C0] Call trace: [ 844.459153][ C0] show_stack+0x2c/0x3c (C) [ 844.460338][ C0] __dump_stack+0x30/0x40 [ 844.461152][ C0] dump_stack_lvl+0x30/0x12c [ 844.461903][ C0] dump_stack+0x1c/0x28 [ 844.462570][ C0] vpanic+0x22c/0x59c [ 844.463304][ C0] vpanic+0x0/0x59c [ 844.464006][ C0] el1t_64_irq_handler+0x0/0x1c [ 844.464825][ C0] el1_abort+0x0/0x5c [ 844.465516][ C0] el1h_64_sync+0x6c/0x70 [ 844.466378][ C0] pkvm_init_host_vm+0xb8/0x160 (P) [ 844.467208][ C0] kvm_arch_init_vm+0x150/0x288 [ 844.468025][ C0] kvm_dev_ioctl+0x838/0x105c [ 844.468860][ C0] __arm64_sys_ioctl+0x18c/0x244 [ 844.469727][ C0] invoke_syscall+0x90/0x2b4 [ 844.470592][ C0] el0_svc_common+0x180/0x2f4 [ 844.471440][ C0] do_el0_svc+0x58/0x74 [ 844.472243][ C0] el0_svc+0x58/0x164 [ 844.472981][ C0] el0t_64_sync_handler+0x84/0x12c [ 844.473774][ C0] el0t_64_sync+0x198/0x19c [ 844.475673][ C0] Kernel Offset: disabled [ 844.476346][ C0] CPU features: 0x00000,000068c0,17de33e1,057ffe1f [ 844.477292][ C0] Memory Limit: none [ 844.478278][ C0] [ 844.478776][ C0] ================================ [ 844.479432][ C0] WARNING: inconsistent lock state [ 844.480167][ C0] syzkaller #0 Not tainted [ 844.480959][ C0] -------------------------------- [ 844.481626][ C0] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 844.482461][ C0] syz.0.1/3475 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 844.483375][ C0] 3cf000000d3ed6e8 (&k->list_lock){+.+.}-{3:3}, at: bus_for_each_dev+0x60/0x2a4 [ 844.485503][ C0] {INITIAL USE} state was registered at: [ 844.486329][ C0] lock_acquire+0x14c/0x2e0 [ 844.487217][ C0] _raw_spin_lock+0x48/0x60 [ 844.487958][ C0] kobject_add_internal+0x46c/0xee4 [ 844.488780][ C0] kobject_add+0x10c/0x1d0 [ 844.489527][ C0] device_add+0x494/0xd78 [ 844.490289][ C0] device_register+0x28/0x38 [ 844.491050][ C0] faux_bus_init+0x1c/0x88 [ 844.491787][ C0] driver_init+0x30/0x58 [ 844.492540][ C0] do_basic_setup+0x1c/0xa8 [ 844.493304][ C0] kernel_init_freeable+0x244/0x330 [ 844.494120][ C0] kernel_init+0x24/0x1d0 [ 844.494930][ C0] ret_from_fork+0x10/0x20 [ 844.495740][ C0] irq event stamp: 258 [ 844.496423][ C0] hardirqs last enabled at (257): [] _raw_spin_unlock_irqrestore+0x44/0xbc [ 844.497645][ C0] hardirqs last disabled at (258): [] __panic_unhandled+0x24/0x68 [ 844.498834][ C0] softirqs last enabled at (200): [] handle_softirqs+0xb8c/0xd08 [ 844.500066][ C0] softirqs last disabled at (185): [] __do_softirq+0x14/0x20 [ 844.501389][ C0] [ 844.501389][ C0] other info that might help us debug this: [ 844.502378][ C0] Possible unsafe locking scenario: [ 844.502378][ C0] [ 844.503190][ C0] CPU0 [ 844.503668][ C0] ---- [ 844.504201][ C0] lock(&k->list_lock); [ 844.505042][ C0] [ 844.505560][ C0] lock(&k->list_lock); [ 844.506372][ C0] [ 844.506372][ C0] *** DEADLOCK *** [ 844.506372][ C0] [ 844.507311][ C0] no locks held by syz.0.1/3475. [ 844.508023][ C0] [ 844.508023][ C0] stack backtrace: [ 844.508772][ C0] CPU: 0 UID: 0 PID: 3475 Comm: syz.0.1 Not tainted syzkaller #0 PREEMPT [ 844.509776][ C0] Hardware name: linux,dummy-virt (DT) [ 844.510463][ C0] Call trace: [ 844.510999][ C0] show_stack+0x2c/0x3c (C) [ 844.511850][ C0] __dump_stack+0x30/0x40 [ 844.512575][ C0] dump_stack_lvl+0x30/0x12c [ 844.513335][ C0] dump_stack+0x1c/0x28 [ 844.514049][ C0] print_usage_bug+0x2f4/0x32c [ 844.514804][ C0] verify_lock_unused+0x78/0x88 [ 844.515661][ C0] lock_acquire+0x22c/0x2e0 [ 844.516516][ C0] _raw_spin_lock+0x48/0x60 [ 844.517273][ C0] bus_for_each_dev+0x60/0x2a4 [ 844.518127][ C0] coresight_panic_cb+0x2c/0x3c [ 844.518925][ C0] notifier_call_chain+0x1e8/0x65c [ 844.519781][ C0] atomic_notifier_call_chain+0xd0/0x180 [ 844.520696][ C0] vpanic+0x2c4/0x59c [ 844.521423][ C0] vpanic+0x0/0x59c [ 844.522132][ C0] el1t_64_irq_handler+0x0/0x1c [ 844.522891][ C0] el1_abort+0x0/0x5c [ 844.523595][ C0] el1h_64_sync+0x6c/0x70 [ 844.524355][ C0] pkvm_init_host_vm+0xb8/0x160 (P) [ 844.525174][ C0] kvm_arch_init_vm+0x150/0x288 [ 844.525974][ C0] kvm_dev_ioctl+0x838/0x105c [ 844.526793][ C0] __arm64_sys_ioctl+0x18c/0x244 [ 844.527643][ C0] invoke_syscall+0x90/0x2b4 [ 844.528480][ C0] el0_svc_common+0x180/0x2f4 [ 844.529319][ C0] do_el0_svc+0x58/0x74 [ 844.530121][ C0] el0_svc+0x58/0x164 [ 844.530835][ C0] el0t_64_sync_handler+0x84/0x12c [ 844.531612][ C0] el0t_64_sync+0x198/0x19c [ 844.533743][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 06:26:11 Registers: info registers vcpu 0 CPU#0 PC=ffff800082127694 X00=0000000000000003 X01=0000000000000002 X02=000000000000005f X03=ffff800082127590 X04=0000000000000001 X05=0000000000000000 X06=ffff800081f0e734 X07=ffff800087cd0c24 X08=98f000001db8bb00 X09=0000000000110001 X10=0000000000ff0100 X11=00000000000000fe X12=00000000000000fc X13=0000000000000007 X14=0000000000110001 X15=0000000000000000 X16=00000000000000fe X17=0000000000000013 X18=fff0000072d86400 X19=efff800000000000 X20=fcf000000dcb0880 X21=afff80008c43b018 X22=0000000000000002 X23=fcf000000dcb097c X24=00000000000000fc X25=fcf000000dcb0ac8 X26=fcf000000dcb08c8 X27=00000000000000fc X28=00000000000000fc X29=ffff8000a3c773f0 X30=ffff800082127694 SP=ffff8000a3c773e0 PSTATE=004023c9 ---- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0000000000000000:ff000000ff000f00 Z01=0000ffff864c37c8:0000ffffd6003075 Z02=0000ffffd659f420:0000ffffd659f440 Z03=0000000000000000:0000ff00ff0000ff Z04=3303330333033303:3303330333033303 Z05=bcbcbc0000303003:bcbcbc0000303003 Z06=0000000000000073:0000aaaafcbe43c0 Z07=0000000000000074:0000aaaafcbe1600 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffd659f630:0000ffffd659f630 Z17=ffffff80ffffffd0:0000ffffd659f600 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000