[ 431.851460][ T3143] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:45819' (ED25519) to the list of known hosts. [ 911.849682][ T25] audit: type=1400 audit(911.010:61): avc: denied { execute } for pid=3314 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 911.877920][ T25] audit: type=1400 audit(911.040:62): avc: denied { execute_no_trans } for pid=3314 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:16:04 parsed 1 programs [ 965.206063][ T25] audit: type=1400 audit(964.360:63): avc: denied { node_bind } for pid=3314 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 987.154446][ T25] audit: type=1400 audit(986.310:64): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 987.190470][ T25] audit: type=1400 audit(986.350:65): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 987.287416][ T3322] cgroup: Unknown subsys name 'net' [ 987.337044][ T25] audit: type=1400 audit(986.500:66): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 987.738293][ T3322] cgroup: Unknown subsys name 'cpuset' [ 987.846729][ T3322] cgroup: Unknown subsys name 'rlimit' [ 989.219732][ T25] audit: type=1400 audit(988.380:67): avc: denied { setattr } for pid=3322 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 989.256883][ T25] audit: type=1400 audit(988.410:68): avc: denied { create } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 989.272124][ T25] audit: type=1400 audit(988.430:69): avc: denied { write } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 989.292088][ T25] audit: type=1400 audit(988.440:70): avc: denied { module_request } for pid=3322 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 989.856484][ T25] audit: type=1400 audit(989.010:71): avc: denied { read } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 989.910022][ T25] audit: type=1400 audit(989.060:72): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 989.944888][ T25] audit: type=1400 audit(989.100:73): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 991.190330][ T3326] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 991.431992][ T3322] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 1022.124830][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 1022.131311][ T25] audit: type=1400 audit(1021.280:78): avc: denied { execmem } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1024.586887][ T25] audit: type=1400 audit(1023.740:79): avc: denied { read } for pid=3328 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1024.604894][ T25] audit: type=1400 audit(1023.760:80): avc: denied { open } for pid=3328 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1024.646548][ T25] audit: type=1400 audit(1023.810:81): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1025.752294][ T25] audit: type=1400 audit(1024.900:82): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1025.797079][ T25] audit: type=1400 audit(1024.960:83): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.5vPdZW/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1025.848461][ T25] audit: type=1400 audit(1025.010:84): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1025.921511][ T25] audit: type=1400 audit(1025.080:85): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.5vPdZW/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1025.965926][ T25] audit: type=1400 audit(1025.120:86): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.5vPdZW/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2944 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1026.078617][ T25] audit: type=1400 audit(1025.240:87): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1026.526443][ T3328] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1078.903951][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1078.917218][ T25] audit: type=1400 audit(1078.060:96): avc: denied { create } for pid=3361 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1098.078824][ T25] audit: type=1400 audit(1097.240:97): avc: denied { create } for pid=3375 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1098.365154][ T25] audit: type=1400 audit(1097.510:98): avc: denied { sys_admin } for pid=3375 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1102.446512][ T25] audit: type=1400 audit(1101.600:99): avc: denied { mounton } for pid=3376 comm="syz-executor" path="/syzkaller.DN7J1A/syz-tmp" dev="vda" ino=1884 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1102.616591][ T25] audit: type=1400 audit(1101.770:100): avc: denied { sys_chroot } for pid=3376 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1107.647828][ T25] audit: type=1401 audit(1106.810:101): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1114.517483][ T25] audit: type=1400 audit(1113.670:102): avc: denied { sys_module } for pid=3386 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1126.448701][ T3386] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1126.527749][ T3386] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1135.321231][ T3386] hsr_slave_0: entered promiscuous mode [ 1135.376546][ T3386] hsr_slave_1: entered promiscuous mode [ 1143.067398][ T3386] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1143.211986][ T3386] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1143.315946][ T3386] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1143.409747][ T3386] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1150.445258][ T3386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1180.300657][ T3386] veth0_vlan: entered promiscuous mode [ 1180.637353][ T3386] veth1_vlan: entered promiscuous mode [ 1181.589826][ T3386] veth0_macvtap: entered promiscuous mode [ 1181.747133][ T3386] veth1_macvtap: entered promiscuous mode [ 1183.005642][ T42] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1183.019074][ T42] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1183.058095][ T42] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1183.137726][ T3363] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1188.650259][ T3363] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1189.441616][ T3363] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1190.020921][ T3363] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1190.552069][ T3363] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1207.925198][ T3363] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1208.314431][ T3363] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1208.640401][ T3363] bond0 (unregistering): Released all slaves [ 1211.062128][ T3363] hsr_slave_0: left promiscuous mode [ 1211.175858][ T3363] hsr_slave_1: left promiscuous mode [ 1211.964962][ T3363] veth1_macvtap: left promiscuous mode [ 1211.980734][ T3363] veth0_macvtap: left promiscuous mode [ 1211.999450][ T3363] veth1_vlan: left promiscuous mode [ 1212.028620][ T3363] veth0_vlan: left promiscuous mode 1970/01/01 00:20:20 executed programs: 0 [ 1262.116986][ T3481] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1262.331877][ T3481] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1280.841695][ T3481] hsr_slave_0: entered promiscuous mode [ 1280.889303][ T3481] hsr_slave_1: entered promiscuous mode [ 1293.339857][ T3481] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1293.501576][ T3481] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1293.649507][ T3481] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1293.799202][ T3481] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1307.129177][ T3481] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1359.626884][ T3481] veth0_vlan: entered promiscuous mode [ 1359.974689][ T3481] veth1_vlan: entered promiscuous mode [ 1360.887207][ T3481] veth0_macvtap: entered promiscuous mode [ 1361.032241][ T3481] veth1_macvtap: entered promiscuous mode [ 1362.235896][ T3363] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1362.239661][ T3363] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1362.282151][ T3363] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1362.366768][ T3363] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:22:43 executed programs: 2 [ 1365.298622][ T25] audit: type=1400 audit(1364.450:103): avc: denied { read } for pid=3617 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1365.319797][ T25] audit: type=1400 audit(1364.450:104): avc: denied { open } for pid=3617 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1365.382352][ T25] audit: type=1400 audit(1364.530:105): avc: denied { ioctl } for pid=3617 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1366.407799][ T3617] ================================================================== [ 1366.408389][ T3617] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1366.410131][ T3617] Read of size 8 at addr 75f0000014260000 by task syz.2.17/3617 [ 1366.410378][ T3617] Pointer tag: [75], memory tag: [fe] [ 1366.410514][ T3617] [ 1366.411495][ T3617] CPU: 0 UID: 0 PID: 3617 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1366.412032][ T3617] Hardware name: linux,dummy-virt (DT) [ 1366.412500][ T3617] Call trace: [ 1366.412883][ T3617] show_stack+0x2c/0x3c (C) [ 1366.413548][ T3617] __dump_stack+0x30/0x40 [ 1366.413829][ T3617] dump_stack_lvl+0xd8/0x12c [ 1366.414038][ T3617] print_address_description+0xac/0x288 [ 1366.414320][ T3617] print_report+0x84/0xa0 [ 1366.414617][ T3617] kasan_report+0xb0/0x110 [ 1366.414842][ T3617] kasan_tag_mismatch+0x28/0x3c [ 1366.415084][ T3617] __hwasan_tag_mismatch+0x30/0x60 [ 1366.415402][ T3617] __kvm_pgtable_walk+0x8e4/0xa68 [ 1366.415718][ T3617] kvm_pgtable_walk+0x294/0x468 [ 1366.416017][ T3617] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1366.416330][ T3617] kvm_free_stage2_pgd+0x198/0x28c [ 1366.416649][ T3617] kvm_uninit_stage2_mmu+0x20/0x38 [ 1366.416932][ T3617] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1366.417268][ T3617] kvm_mmu_notifier_release+0x48/0xa8 [ 1366.417585][ T3617] mmu_notifier_unregister+0x128/0x42c [ 1366.417861][ T3617] kvm_put_kvm+0x6a0/0xfa8 [ 1366.418063][ T3617] kvm_vm_release+0x58/0x78 [ 1366.418320][ T3617] __fput+0x4ac/0x980 [ 1366.418539][ T3617] ____fput+0x20/0x58 [ 1366.418739][ T3617] task_work_run+0x1bc/0x254 [ 1366.418967][ T3617] do_notify_resume+0x1bc/0x270 [ 1366.419220][ T3617] el0_svc+0xb8/0x164 [ 1366.419501][ T3617] el0t_64_sync_handler+0x84/0x12c [ 1366.419777][ T3617] el0t_64_sync+0x198/0x19c [ 1366.420311][ T3617] [ 1366.420507][ T3617] The buggy address belongs to the physical page: [ 1366.421633][ T3617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x41f0000014261c00 pfn:0x54260 [ 1366.422029][ T3617] flags: 0x1ffe28000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x8a) [ 1366.423195][ T3617] raw: 01ffe28000000000 ffffc1ffc081c888 ffffc1ffc0801e48 0000000000000000 [ 1366.423456][ T3617] raw: 41f0000014261c00 0000000000000000 00000000ffffffff 0000000000000000 [ 1366.423682][ T3617] page dumped because: kasan: bad access detected [ 1366.425704][ T3617] [ 1366.425824][ T3617] Memory state around the buggy address: [ 1366.426187][ T3617] fff000001425fe00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1366.426403][ T3617] fff000001425ff00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1366.426618][ T3617] >fff0000014260000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1366.426762][ T3617] ^ [ 1366.426999][ T3617] fff0000014260100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1366.427175][ T3617] fff0000014260200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1366.427410][ T3617] ================================================================== [ 1366.635760][ T3617] Disabling lock debugging due to kernel taint [ 1366.638842][ T3617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x41f0000014261c00 pfn:0x54260 [ 1366.642095][ T3617] flags: 0x1ffe28000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x8a) [ 1366.654562][ T3617] raw: 01ffe28000000000 ffffc1ffc081c888 fff0000072d85420 0000000000000000 [ 1366.685504][ T3617] raw: 41f0000014261c00 0000000000000000 00000000ffffffff 0000000000000000 [ 1366.693900][ T3617] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 1366.695219][ T3617] ------------[ cut here ]------------ [ 1366.695404][ T3617] kernel BUG at ./include/linux/mm.h:1036! [ 1366.696258][ T3617] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 1366.701614][ T3617] Modules linked in: [ 1366.703385][ T3617] CPU: 0 UID: 0 PID: 3617 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1366.704887][ T3617] Tainted: [B]=BAD_PAGE [ 1366.705605][ T3617] Hardware name: linux,dummy-virt (DT) [ 1366.706622][ T3617] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1366.707888][ T3617] pc : kvm_s2_put_page+0x374/0x3a0 [ 1366.708873][ T3617] lr : kvm_s2_put_page+0x374/0x3a0 [ 1366.709862][ T3617] sp : ffff80008e7c7830 [ 1366.710553][ T3617] x29: ffff80008e7c7830 x28: 75f0000014260000 x27: 75f0000014260000 [ 1366.712131][ T3617] x26: 00000000000000ff x25: ffff80008734e000 x24: ffffc1ffc0000000 [ 1366.713529][ T3617] x23: ffffc1ffc0509808 x22: 0000000000000000 x21: ffffc1ffc0509834 [ 1366.714683][ T3617] x20: 0000000000000000 x19: ffffc1ffc0509800 x18: 0000000039c95d02 [ 1366.715993][ T3617] x17: 0000000003fe579c x16: 0000000039c948da x15: 000000008aba676a [ 1366.717324][ T3617] x14: 0000000000000000 x13: fff0000016ec8008 x12: 0000000000000001 [ 1366.718631][ T3617] x11: 0000000000000000 x10: 0000000000ff0100 x9 : 92542be3624ac700 [ 1366.719983][ T3617] x8 : 92542be3624ac700 x7 : 0000000000000400 x6 : ffff80008048b334 [ 1366.721297][ T3617] x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80008074b7f8 [ 1366.722609][ T3617] x2 : 0000000000000002 x1 : 0000000100000000 x0 : 000000000000003e [ 1366.723982][ T3617] Call trace: [ 1366.724636][ T3617] kvm_s2_put_page+0x374/0x3a0 (P) [ 1366.725640][ T3617] stage2_free_walker+0xdc/0x264 [ 1366.726573][ T3617] __kvm_pgtable_walk+0x7d8/0xa68 [ 1366.727436][ T3617] kvm_pgtable_walk+0x294/0x468 [ 1366.728333][ T3617] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1366.729460][ T3617] kvm_free_stage2_pgd+0x198/0x28c [ 1366.730417][ T3617] kvm_uninit_stage2_mmu+0x20/0x38 [ 1366.731338][ T3617] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1366.732403][ T3617] kvm_mmu_notifier_release+0x48/0xa8 [ 1366.733294][ T3617] mmu_notifier_unregister+0x128/0x42c [ 1366.734265][ T3617] kvm_put_kvm+0x6a0/0xfa8 [ 1366.735064][ T3617] kvm_vm_release+0x58/0x78 [ 1366.735907][ T3617] __fput+0x4ac/0x980 [ 1366.736656][ T3617] ____fput+0x20/0x58 [ 1366.737459][ T3617] task_work_run+0x1bc/0x254 [ 1366.738288][ T3617] do_notify_resume+0x1bc/0x270 [ 1366.739188][ T3617] el0_svc+0xb8/0x164 [ 1366.740001][ T3617] el0t_64_sync_handler+0x84/0x12c [ 1366.740896][ T3617] el0t_64_sync+0x198/0x19c [ 1366.742255][ T3617] Code: d0037581 9126fc21 aa1303e0 97f9c9f2 (d4210000) [ 1366.743963][ T3617] ---[ end trace 0000000000000000 ]--- [ 1366.745569][ T3617] Kernel panic - not syncing: Oops - BUG: Fatal exception [ 1366.747472][ T3617] Kernel Offset: disabled [ 1366.748182][ T3617] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1366.749226][ T3617] Memory Limit: none [ 1366.750888][ T3617] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:26:25 Registers: info registers vcpu 0 CPU#0 PC=ffff800082136720 X00=0000000000000003 X01=0000000000000002 X02=0000000000000001 X03=ffff80008213661c X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081f26774 X08=d3f000000d9b9d80 X09=0000000000000000 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000002 X13=0000000000000002 X14=0000000000000000 X15=00000000000002e3 X16=00000000000000d3 X17=0000000000000000 X18=0000000000cf1000 X19=efff800000000000 X20=bef000000dcb4880 X21=e1ff80008c44b018 X22=0000000000000002 X23=bef000000dcb497c X24=00000000000000be X25=bef000000dcb4ac8 X26=bef000000dcb48c8 X27=00000000000000be X28=00000000000000be X29=ffff80008c487b40 X30=ffff800082136720 SP=ffff80008c487b30 PSTATE=814020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=6572207265767265:730073250a0d0a0d Z02=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z03=0000000000000000:00ff00ff00000000 Z04=0000000000000000:000000000f0f0000 Z05=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z06=203a29315f657661:6c735f646e6f6220 Z07=206e612073612067:6e6976616c736e45 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffd98f5eb0:0000ffffd98f5eb0 Z17=ffffff80ffffffd8:0000ffffd98f5e80 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000