[ 402.970512][ T3144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.185345][ T3144] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:10251' (ED25519) to the list of known hosts. [ 908.317663][ T25] audit: type=1400 audit(907.510:60): avc: denied { execute } for pid=3319 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 908.341334][ T25] audit: type=1400 audit(907.530:61): avc: denied { execute_no_trans } for pid=3319 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:15:59 parsed 1 programs [ 960.778791][ T25] audit: type=1400 audit(959.970:62): avc: denied { node_bind } for pid=3319 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 982.635568][ T25] audit: type=1400 audit(981.810:63): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 982.660693][ T25] audit: type=1400 audit(981.840:64): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 982.742359][ T3327] cgroup: Unknown subsys name 'net' [ 982.796498][ T25] audit: type=1400 audit(981.980:65): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 983.240548][ T3327] cgroup: Unknown subsys name 'cpuset' [ 983.351932][ T3327] cgroup: Unknown subsys name 'rlimit' [ 984.739820][ T25] audit: type=1400 audit(983.930:66): avc: denied { setattr } for pid=3327 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 984.769550][ T25] audit: type=1400 audit(983.960:67): avc: denied { create } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 984.786305][ T25] audit: type=1400 audit(983.970:68): avc: denied { write } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 984.812345][ T25] audit: type=1400 audit(984.000:69): avc: denied { module_request } for pid=3327 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 985.378580][ T25] audit: type=1400 audit(984.570:70): avc: denied { read } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 985.433279][ T25] audit: type=1400 audit(984.620:71): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 985.468744][ T25] audit: type=1400 audit(984.660:72): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 986.727188][ T3331] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 986.977491][ T3327] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 1017.879270][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 1017.890307][ T25] audit: type=1400 audit(1017.070:77): avc: denied { execmem } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1018.211472][ T25] audit: type=1400 audit(1017.400:78): avc: denied { read } for pid=3333 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1018.250259][ T25] audit: type=1400 audit(1017.440:79): avc: denied { open } for pid=3333 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1018.338416][ T25] audit: type=1400 audit(1017.510:80): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1019.568553][ T25] audit: type=1400 audit(1018.760:81): avc: denied { mount } for pid=3333 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1019.624656][ T25] audit: type=1400 audit(1018.810:82): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/syzkaller.EpzevP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1019.695541][ T25] audit: type=1400 audit(1018.880:83): avc: denied { mount } for pid=3333 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1019.769659][ T25] audit: type=1400 audit(1018.960:84): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/syzkaller.EpzevP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1019.809128][ T25] audit: type=1400 audit(1019.000:85): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/syzkaller.EpzevP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1019.936152][ T25] audit: type=1400 audit(1019.120:86): avc: denied { unmount } for pid=3333 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1020.377970][ T3333] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1031.899953][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1031.916114][ T25] audit: type=1400 audit(1031.090:95): avc: denied { create } for pid=3341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1032.092342][ T25] audit: type=1400 audit(1031.280:96): avc: denied { sys_admin } for pid=3341 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1033.857756][ T25] audit: type=1400 audit(1033.040:97): avc: denied { sys_chroot } for pid=3342 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1044.101450][ T25] audit: type=1401 audit(1043.280:98): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1051.476135][ T25] audit: type=1400 audit(1050.660:99): avc: denied { create } for pid=3356 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1088.963288][ T25] audit: type=1400 audit(1088.150:100): avc: denied { sys_module } for pid=3376 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1101.106444][ T3376] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1101.176462][ T3376] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1107.367959][ T3376] hsr_slave_0: entered promiscuous mode [ 1107.400626][ T3376] hsr_slave_1: entered promiscuous mode [ 1111.111905][ T3376] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1111.320369][ T3376] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1111.450740][ T3376] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1111.548608][ T3376] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1118.286825][ T3376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1149.489572][ T3376] veth0_vlan: entered promiscuous mode [ 1149.726425][ T3376] veth1_vlan: entered promiscuous mode [ 1150.542660][ T3376] veth0_macvtap: entered promiscuous mode [ 1150.839949][ T3376] veth1_macvtap: entered promiscuous mode [ 1151.997784][ T3301] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1152.112933][ T3301] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1152.118740][ T3301] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1152.131932][ T3301] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1158.092838][ T49] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1159.022913][ T49] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1159.792044][ T49] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1160.248596][ T49] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1169.441911][ T49] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1169.528781][ T49] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1169.585676][ T49] bond0 (unregistering): Released all slaves [ 1171.047672][ T49] hsr_slave_0: left promiscuous mode [ 1171.115922][ T49] hsr_slave_1: left promiscuous mode [ 1171.452619][ T49] veth1_macvtap: left promiscuous mode [ 1171.469686][ T49] veth0_macvtap: left promiscuous mode [ 1171.484462][ T49] veth1_vlan: left promiscuous mode [ 1171.509567][ T49] veth0_vlan: left promiscuous mode 1970/01/01 00:20:29 executed programs: 0 [ 1270.280243][ T3498] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1270.566689][ T3498] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1284.407563][ T3498] hsr_slave_0: entered promiscuous mode [ 1284.432099][ T3498] hsr_slave_1: entered promiscuous mode [ 1292.821985][ T3498] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1293.141998][ T3498] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1293.312711][ T3498] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1293.548955][ T3498] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1308.627349][ T3498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1346.372217][ T3498] veth0_vlan: entered promiscuous mode [ 1346.697094][ T3498] veth1_vlan: entered promiscuous mode [ 1347.724237][ T3498] veth0_macvtap: entered promiscuous mode [ 1347.910847][ T3498] veth1_macvtap: entered promiscuous mode [ 1349.181924][ T3302] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1349.225258][ T49] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1349.249081][ T3301] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1349.269904][ T3301] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:22:30 executed programs: 2 [ 1352.616194][ T25] audit: type=1400 audit(1351.800:101): avc: denied { read } for pid=3618 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1352.647088][ T25] audit: type=1400 audit(1351.830:102): avc: denied { open } for pid=3618 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1352.723378][ T25] audit: type=1400 audit(1351.870:103): avc: denied { ioctl } for pid=3618 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1354.111176][ T3618] ================================================================== [ 1354.111750][ T3618] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1354.113477][ T3618] Read of size 8 at addr 8af0000012dea000 by task syz.2.17/3618 [ 1354.113739][ T3618] Pointer tag: [8a], memory tag: [fe] [ 1354.113865][ T3618] [ 1354.114824][ T3618] CPU: 0 UID: 0 PID: 3618 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1354.115381][ T3618] Hardware name: linux,dummy-virt (DT) [ 1354.115829][ T3618] Call trace: [ 1354.116206][ T3618] show_stack+0x2c/0x3c (C) [ 1354.116827][ T3618] __dump_stack+0x30/0x40 [ 1354.117106][ T3618] dump_stack_lvl+0xd8/0x12c [ 1354.117331][ T3618] print_address_description+0xac/0x288 [ 1354.117643][ T3618] print_report+0x84/0xa0 [ 1354.117923][ T3618] kasan_report+0xb0/0x110 [ 1354.118164][ T3618] kasan_tag_mismatch+0x28/0x3c [ 1354.118430][ T3618] __hwasan_tag_mismatch+0x30/0x60 [ 1354.118744][ T3618] __kvm_pgtable_walk+0x8e4/0xa68 [ 1354.119054][ T3618] kvm_pgtable_walk+0x294/0x468 [ 1354.119355][ T3618] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1354.119675][ T3618] kvm_free_stage2_pgd+0x198/0x28c [ 1354.119971][ T3618] kvm_uninit_stage2_mmu+0x20/0x38 [ 1354.120281][ T3618] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1354.120595][ T3618] kvm_mmu_notifier_release+0x48/0xa8 [ 1354.120889][ T3618] mmu_notifier_unregister+0x128/0x42c [ 1354.121176][ T3618] kvm_put_kvm+0x6a0/0xfa8 [ 1354.121391][ T3618] kvm_vm_release+0x58/0x78 [ 1354.121674][ T3618] __fput+0x4ac/0x980 [ 1354.121887][ T3618] ____fput+0x20/0x58 [ 1354.122101][ T3618] task_work_run+0x1bc/0x254 [ 1354.122334][ T3618] do_notify_resume+0x1bc/0x270 [ 1354.122589][ T3618] el0_svc+0xb8/0x164 [ 1354.122848][ T3618] el0t_64_sync_handler+0x84/0x12c [ 1354.123127][ T3618] el0t_64_sync+0x198/0x19c [ 1354.123622][ T3618] [ 1354.123790][ T3618] The buggy address belongs to the physical page: [ 1354.124886][ T3618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xd0f0000012debb80 pfn:0x52dea [ 1354.125315][ T3618] flags: 0x1ffdd4000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x75) [ 1354.126520][ T3618] raw: 01ffdd4000000000 ffffc1ffc0888748 ffffc1ffc0887688 0000000000000000 [ 1354.126769][ T3618] raw: d0f0000012debb80 0000000000000000 00000000ffffffff 0000000000000000 [ 1354.126973][ T3618] page dumped because: kasan: bad access detected [ 1354.127119][ T3618] [ 1354.127214][ T3618] Memory state around the buggy address: [ 1354.127569][ T3618] fff0000012de9e00: a5 a5 a5 a5 a5 a5 a5 a5 fe fe fe fe fe fe fe fe [ 1354.127768][ T3618] fff0000012de9f00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1354.127960][ T3618] >fff0000012dea000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1354.128116][ T3618] ^ [ 1354.128421][ T3618] fff0000012dea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1354.128623][ T3618] fff0000012dea200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1354.128835][ T3618] ================================================================== [ 1354.318495][ T3618] Disabling lock debugging due to kernel taint [ 1354.336928][ T3618] Unable to handle kernel paging request at virtual address ffff672652b20300 [ 1354.358828][ T3618] KASAN: probably wild-memory-access in range [0xfffe72652b203000-0xfffe72652b20300f] [ 1354.362306][ T3618] Mem abort info: [ 1354.365960][ T3618] ESR = 0x0000000096000004 [ 1354.368145][ T3618] EC = 0x25: DABT (current EL), IL = 32 bits [ 1354.375605][ T3618] SET = 0, FnV = 0 [ 1354.379349][ T3618] EA = 0, S1PTW = 0 [ 1354.396190][ T3618] FSC = 0x04: level 0 translation fault [ 1354.423383][ T3618] Data abort info: [ 1354.453135][ T3618] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1354.474612][ T3618] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1354.475302][ T3618] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1354.475893][ T3618] swapper pgtable: 4k pages, 52-bit VAs, pgdp=000000004769a000 [ 1354.476345][ T3618] [ffff672652b20300] pgd=100000004c636003, p4d=0000000000000000 [ 1354.497445][ T3618] Internal error: Oops: 0000000096000004 [#1] SMP [ 1354.500579][ T3618] Modules linked in: [ 1354.502380][ T3618] CPU: 0 UID: 0 PID: 3618 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1354.503877][ T3618] Tainted: [B]=BAD_PAGE [ 1354.504585][ T3618] Hardware name: linux,dummy-virt (DT) [ 1354.505572][ T3618] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1354.506774][ T3618] pc : __kvm_pgtable_walk+0x268/0xa68 [ 1354.507799][ T3618] lr : __kvm_pgtable_walk+0x214/0xa68 [ 1354.508791][ T3618] sp : ffff80008e6d76d0 [ 1354.509504][ T3618] x29: ffff80008e6d7770 x28: 0000000000000005 x27: fffe72652b203000 [ 1354.511064][ T3618] x26: fffe72652b203000 x25: 0000000000000000 x24: 0000000000000002 [ 1354.512283][ T3618] x23: 00000000000000ff x22: efff800000000000 x21: ffff80008e6d79d8 [ 1354.513621][ T3618] x20: 00000000000000ff x19: 00000000000000ff x18: 0000000000001b80 [ 1354.514947][ T3618] x17: 000000000538c42c x16: 000000006caef601 x15: fff0000072d85404 [ 1354.516279][ T3618] x14: 00000000000000ff x13: ffff80008e6d79e0 x12: ffff80008e6d79e8 [ 1354.517562][ T3618] x11: ffff80008e6d79e8 x10: 0000000000ff0100 x9 : ffff80008e6d7728 [ 1354.519011][ T3618] x8 : 0fffe72652b20300 x7 : ffff800080bc7858 x6 : 0000000000000000 [ 1354.520315][ T3618] x5 : 0000000000000000 x4 : 00000000000000ff x3 : 0000000000000002 [ 1354.521568][ T3618] x2 : fffe72652b203000 x1 : 0000000000000000 x0 : 0000000000000000 [ 1354.522974][ T3618] Call trace: [ 1354.523653][ T3618] __kvm_pgtable_walk+0x268/0xa68 (P) [ 1354.524615][ T3618] __kvm_pgtable_walk+0x600/0xa68 [ 1354.525540][ T3618] __kvm_pgtable_walk+0x600/0xa68 [ 1354.526533][ T3618] kvm_pgtable_walk+0x294/0x468 [ 1354.527416][ T3618] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1354.528355][ T3618] kvm_free_stage2_pgd+0x198/0x28c [ 1354.529324][ T3618] kvm_uninit_stage2_mmu+0x20/0x38 [ 1354.530253][ T3618] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1354.531272][ T3618] kvm_mmu_notifier_release+0x48/0xa8 [ 1354.532221][ T3618] mmu_notifier_unregister+0x128/0x42c [ 1354.533182][ T3618] kvm_put_kvm+0x6a0/0xfa8 [ 1354.534014][ T3618] kvm_vm_release+0x58/0x78 [ 1354.534884][ T3618] __fput+0x4ac/0x980 [ 1354.535601][ T3618] ____fput+0x20/0x58 [ 1354.536295][ T3618] task_work_run+0x1bc/0x254 [ 1354.537152][ T3618] do_notify_resume+0x1bc/0x270 [ 1354.538086][ T3618] el0_svc+0xb8/0x164 [ 1354.538930][ T3618] el0t_64_sync_handler+0x84/0x12c [ 1354.539731][ T3618] el0t_64_sync+0x198/0x19c [ 1354.541082][ T3618] Code: f94023ec f9400fed a9017d3f f800813f (38686ac8) [ 1354.542786][ T3618] ---[ end trace 0000000000000000 ]--- [ 1354.544357][ T3618] Kernel panic - not syncing: Oops: Fatal exception [ 1354.546316][ T3618] Kernel Offset: disabled [ 1354.547041][ T3618] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1354.548019][ T3618] Memory Limit: none [ 1354.549739][ T3618] Rebooting in 86400 seconds.. VM DIAGNOSIS: 12:36:51 Registers: info registers vcpu 0 CPU#0 PC=ffff8000806951f4 X00=ffff800080007be8 X01=ffff800080007cf8 X02=32f000000d9b9d80 X03=0000000000000000 X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff80008198a274 X08=ffff80008658fff8 X09=0000000000000000 X10=0000000000ff0100 X11=0000000000000032 X12=0000000000000102 X13=0000000000000028 X14=0000000000002000 X15=54f0000018d1f628 X16=58f0000018d1f9e8 X17=00000000000000f0 X18=58f0000018d1f9e8 X19=32f000000d9b9d80 X20=ffff80008656e144 X21=ffff800081989338 X22=00000000000000ff X23=0000000000000000 X24=ffff800087696570 X25=00000000000000c0 X26=0000000000000001 X27=32f000000d9b9d88 X28=0000000000000032 X29=ffff800080007d10 X30=ffff8000800e2da0 SP=ffff800080007be0 PSTATE=404020c9 -Z-- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=6572207265767265:730073250a0d0a0d Z02=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z03=0000000000000000:00ff00ff00000000 Z04=0000000000000000:000000000f0f0000 Z05=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z06=203a29315f657661:6c735f646e6f6220 Z07=206e612073612067:6e6976616c736e45 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffefe2a380:0000ffffefe2a380 Z17=ffffff80ffffffd8:0000ffffefe2a350 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000