[ 391.740862][ T3145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 425.855162][ T3145] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:48524' (ED25519) to the list of known hosts. [ 918.525380][ T25] audit: type=1400 audit(917.700:61): avc: denied { execute } for pid=3311 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 918.554082][ T25] audit: type=1400 audit(917.730:62): avc: denied { execute_no_trans } for pid=3311 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:16:10 parsed 1 programs [ 971.578319][ T25] audit: type=1400 audit(970.750:63): avc: denied { node_bind } for pid=3311 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 992.771358][ T25] audit: type=1400 audit(991.950:64): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 992.817666][ T25] audit: type=1400 audit(991.980:65): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 992.893192][ T3320] cgroup: Unknown subsys name 'net' [ 992.945464][ T25] audit: type=1400 audit(992.120:66): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 993.347284][ T3320] cgroup: Unknown subsys name 'cpuset' [ 993.454864][ T3320] cgroup: Unknown subsys name 'rlimit' [ 994.789833][ T25] audit: type=1400 audit(993.960:67): avc: denied { setattr } for pid=3320 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 994.815306][ T25] audit: type=1400 audit(993.990:68): avc: denied { create } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 994.840242][ T25] audit: type=1400 audit(994.020:69): avc: denied { write } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 994.854844][ T25] audit: type=1400 audit(994.030:70): avc: denied { module_request } for pid=3320 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 995.399873][ T25] audit: type=1400 audit(994.570:71): avc: denied { read } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 995.462609][ T25] audit: type=1400 audit(994.630:72): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 995.492587][ T25] audit: type=1400 audit(994.660:73): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 996.714372][ T3324] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 996.934432][ T3320] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 1025.362704][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 1025.372915][ T25] audit: type=1400 audit(1024.540:78): avc: denied { execmem } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1029.399012][ T25] audit: type=1400 audit(1028.570:79): avc: denied { read } for pid=3326 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1029.413843][ T25] audit: type=1400 audit(1028.590:80): avc: denied { open } for pid=3326 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1029.473208][ T25] audit: type=1400 audit(1028.640:81): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1030.539192][ T25] audit: type=1400 audit(1029.710:82): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1030.580049][ T25] audit: type=1400 audit(1029.760:83): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.pLOPui/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1030.628266][ T25] audit: type=1400 audit(1029.800:84): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1030.700291][ T25] audit: type=1400 audit(1029.880:85): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.pLOPui/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1030.735335][ T25] audit: type=1400 audit(1029.910:86): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.pLOPui/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1030.849940][ T25] audit: type=1400 audit(1030.030:87): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1030.912962][ T25] audit: type=1400 audit(1030.090:88): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1030.944301][ T25] audit: type=1400 audit(1030.110:89): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="gadgetfs" ino=2915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1031.010798][ T25] audit: type=1400 audit(1030.190:90): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1031.040385][ T25] audit: type=1400 audit(1030.210:91): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1031.360101][ T3326] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1051.475359][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 1051.487797][ T25] audit: type=1400 audit(1050.650:96): avc: denied { create } for pid=3340 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1051.604589][ T25] audit: type=1400 audit(1050.780:97): avc: denied { sys_admin } for pid=3340 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1053.304698][ T25] audit: type=1400 audit(1052.480:98): avc: denied { sys_chroot } for pid=3341 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1058.904600][ T25] audit: type=1401 audit(1058.080:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1090.043825][ T25] audit: type=1400 audit(1089.220:100): avc: denied { create } for pid=3368 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1115.494723][ T25] audit: type=1400 audit(1114.670:101): avc: denied { sys_module } for pid=3381 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1130.905092][ T3381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1131.027573][ T3381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1139.290975][ T3381] hsr_slave_0: entered promiscuous mode [ 1139.327205][ T3381] hsr_slave_1: entered promiscuous mode [ 1143.011468][ T3381] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1143.205088][ T3381] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1143.300748][ T3381] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1143.391300][ T3381] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1151.288617][ T3381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1175.214163][ T3381] veth0_vlan: entered promiscuous mode [ 1175.523898][ T3381] veth1_vlan: entered promiscuous mode [ 1176.351380][ T3381] veth0_macvtap: entered promiscuous mode [ 1176.578960][ T3381] veth1_macvtap: entered promiscuous mode [ 1177.734513][ T2116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.771048][ T2116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.778299][ T2116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.825402][ T2116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1183.862099][ T3354] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1184.965534][ T3354] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1186.122948][ T3354] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1186.975331][ T3354] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1206.573265][ T3354] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1206.731475][ T3354] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1206.818634][ T3354] bond0 (unregistering): Released all slaves [ 1208.219554][ T3354] hsr_slave_0: left promiscuous mode [ 1208.382219][ T3354] hsr_slave_1: left promiscuous mode [ 1208.697439][ T3354] veth1_macvtap: left promiscuous mode [ 1208.710371][ T3354] veth0_macvtap: left promiscuous mode [ 1208.719362][ T3354] veth1_vlan: left promiscuous mode [ 1208.728485][ T3354] veth0_vlan: left promiscuous mode 1970/01/01 00:20:52 executed programs: 0 [ 1291.911666][ T3502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1292.040602][ T3502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1306.520933][ T3502] hsr_slave_0: entered promiscuous mode [ 1306.561792][ T3502] hsr_slave_1: entered promiscuous mode [ 1315.668218][ T3502] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1316.029090][ T3502] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1316.238418][ T3502] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1316.414914][ T3502] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1333.744843][ T3502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1362.684435][ T3502] veth0_vlan: entered promiscuous mode [ 1362.932266][ T3502] veth1_vlan: entered promiscuous mode [ 1363.922686][ T3502] veth0_macvtap: entered promiscuous mode [ 1364.155308][ T3502] veth1_macvtap: entered promiscuous mode [ 1365.342615][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1365.349698][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1365.469627][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1365.473535][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:22:47 executed programs: 2 [ 1368.957061][ T25] audit: type=1400 audit(1368.110:102): avc: denied { read } for pid=3619 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1368.965188][ T25] audit: type=1400 audit(1368.140:103): avc: denied { open } for pid=3619 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1369.024884][ T25] audit: type=1400 audit(1368.200:104): avc: denied { ioctl } for pid=3619 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1370.311853][ T3619] ================================================================== [ 1370.312443][ T3619] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1370.314200][ T3619] Read of size 8 at addr e9f0000021c17000 by task syz.2.17/3619 [ 1370.314435][ T3619] Pointer tag: [e9], memory tag: [fe] [ 1370.314554][ T3619] [ 1370.315511][ T3619] CPU: 0 UID: 0 PID: 3619 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1370.316065][ T3619] Hardware name: linux,dummy-virt (DT) [ 1370.316537][ T3619] Call trace: [ 1370.316902][ T3619] show_stack+0x2c/0x3c (C) [ 1370.317517][ T3619] __dump_stack+0x30/0x40 [ 1370.317811][ T3619] dump_stack_lvl+0xd8/0x12c [ 1370.318025][ T3619] print_address_description+0xac/0x288 [ 1370.318326][ T3619] print_report+0x84/0xa0 [ 1370.318584][ T3619] kasan_report+0xb0/0x110 [ 1370.318802][ T3619] kasan_tag_mismatch+0x28/0x3c [ 1370.319046][ T3619] __hwasan_tag_mismatch+0x30/0x60 [ 1370.319358][ T3619] __kvm_pgtable_walk+0x8e4/0xa68 [ 1370.319649][ T3619] kvm_pgtable_walk+0x294/0x468 [ 1370.319920][ T3619] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1370.320239][ T3619] kvm_free_stage2_pgd+0x198/0x28c [ 1370.320523][ T3619] kvm_uninit_stage2_mmu+0x20/0x38 [ 1370.320796][ T3619] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1370.321097][ T3619] kvm_mmu_notifier_release+0x48/0xa8 [ 1370.321386][ T3619] mmu_notifier_unregister+0x128/0x42c [ 1370.321704][ T3619] kvm_put_kvm+0x6a0/0xfa8 [ 1370.321918][ T3619] kvm_vm_release+0x58/0x78 [ 1370.322196][ T3619] __fput+0x4ac/0x980 [ 1370.322397][ T3619] ____fput+0x20/0x58 [ 1370.322586][ T3619] task_work_run+0x1bc/0x254 [ 1370.322795][ T3619] do_notify_resume+0x1bc/0x270 [ 1370.323041][ T3619] el0_svc+0xb8/0x164 [ 1370.323307][ T3619] el0t_64_sync_handler+0x84/0x12c [ 1370.323564][ T3619] el0t_64_sync+0x198/0x19c [ 1370.324058][ T3619] [ 1370.324237][ T3619] The buggy address belongs to the physical page: [ 1370.325488][ T3619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61c17 [ 1370.325883][ T3619] flags: 0x1ffc58000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x16) [ 1370.327052][ T3619] raw: 01ffc58000000000 ffffc1ffc0870588 ffffc1ffc0865248 0000000000000000 [ 1370.327303][ T3619] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1370.327501][ T3619] page dumped because: kasan: bad access detected [ 1370.327628][ T3619] [ 1370.327715][ T3619] Memory state around the buggy address: [ 1370.328058][ T3619] fff0000021c16e00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1370.328267][ T3619] fff0000021c16f00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1370.328462][ T3619] >fff0000021c17000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1370.328602][ T3619] ^ [ 1370.328837][ T3619] fff0000021c17100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1370.329016][ T3619] fff0000021c17200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1370.329243][ T3619] ================================================================== [ 1370.567336][ T3619] Disabling lock debugging due to kernel taint [ 1370.568202][ T3619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61c17 [ 1370.568626][ T3619] flags: 0x1ffc58000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x16) [ 1370.569074][ T3619] raw: 01ffc58000000000 ffffc1ffc0870588 fff0000072d85420 0000000000000000 [ 1370.569419][ T3619] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1370.569687][ T3619] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 1370.570795][ T3619] ------------[ cut here ]------------ [ 1370.570944][ T3619] kernel BUG at ./include/linux/mm.h:1036! [ 1370.571831][ T3619] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 1370.581569][ T3619] Modules linked in: [ 1370.583387][ T3619] CPU: 0 UID: 0 PID: 3619 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1370.584892][ T3619] Tainted: [B]=BAD_PAGE [ 1370.585568][ T3619] Hardware name: linux,dummy-virt (DT) [ 1370.586616][ T3619] pstate: 60402009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1370.587887][ T3619] pc : kvm_s2_put_page+0x374/0x3a0 [ 1370.588893][ T3619] lr : kvm_s2_put_page+0x374/0x3a0 [ 1370.589886][ T3619] sp : ffff80008e7c7830 [ 1370.590613][ T3619] x29: ffff80008e7c7830 x28: e9f0000021c17000 x27: e9f0000021c17000 [ 1370.592209][ T3619] x26: 00000000000000ff x25: ffff80008734e000 x24: ffffc1ffc0000000 [ 1370.593525][ T3619] x23: ffffc1ffc08705c8 x22: 0000000000000000 x21: ffffc1ffc08705f4 [ 1370.594816][ T3619] x20: 0000000000000000 x19: ffffc1ffc08705c0 x18: 0000000000001b80 [ 1370.596149][ T3619] x17: 0000000004233ca6 x16: 000000007562f1ed x15: fff0000072d85404 [ 1370.597493][ T3619] x14: 0000000000000000 x13: fff0000015e0bb08 x12: 0000000000000001 [ 1370.598906][ T3619] x11: 0000000000000000 x10: 0000000000ff0100 x9 : 2d3b56ea360e5c00 [ 1370.600466][ T3619] x8 : 2d3b56ea360e5c00 x7 : 0000000000000000 x6 : ffff80008048b334 [ 1370.601844][ T3619] x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80008074b7f8 [ 1370.603223][ T3619] x2 : 0000000000000002 x1 : 0000000100000000 x0 : 000000000000003e [ 1370.604522][ T3619] Call trace: [ 1370.605208][ T3619] kvm_s2_put_page+0x374/0x3a0 (P) [ 1370.606224][ T3619] stage2_free_walker+0xdc/0x264 [ 1370.607215][ T3619] __kvm_pgtable_walk+0x7d8/0xa68 [ 1370.608131][ T3619] kvm_pgtable_walk+0x294/0x468 [ 1370.609045][ T3619] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1370.610127][ T3619] kvm_free_stage2_pgd+0x198/0x28c [ 1370.610980][ T3619] kvm_uninit_stage2_mmu+0x20/0x38 [ 1370.611940][ T3619] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1370.612955][ T3619] kvm_mmu_notifier_release+0x48/0xa8 [ 1370.613915][ T3619] mmu_notifier_unregister+0x128/0x42c [ 1370.614879][ T3619] kvm_put_kvm+0x6a0/0xfa8 [ 1370.615671][ T3619] kvm_vm_release+0x58/0x78 [ 1370.616528][ T3619] __fput+0x4ac/0x980 [ 1370.617279][ T3619] ____fput+0x20/0x58 [ 1370.618048][ T3619] task_work_run+0x1bc/0x254 [ 1370.618876][ T3619] do_notify_resume+0x1bc/0x270 [ 1370.619750][ T3619] el0_svc+0xb8/0x164 [ 1370.620606][ T3619] el0t_64_sync_handler+0x84/0x12c [ 1370.621515][ T3619] el0t_64_sync+0x198/0x19c [ 1370.624739][ T3619] Code: d0037581 9126fc21 aa1303e0 97f9c9f2 (d4210000) [ 1370.626535][ T3619] ---[ end trace 0000000000000000 ]--- [ 1370.628095][ T3619] Kernel panic - not syncing: Oops - BUG: Fatal exception [ 1370.630170][ T3619] Kernel Offset: disabled [ 1370.630912][ T3619] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1370.632089][ T3619] Memory Limit: none [ 1370.633783][ T3619] Rebooting in 86400 seconds.. VM DIAGNOSIS: 22:23:43 Registers: info registers vcpu 0 CPU#0 PC=ffff800080012904 X00=fff07fffeb6d5000 X01=ffff8000870c54bb X02=ffff80008c487cf0 X03=0000000000000010 X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081f26774 X08=00000000000000c0 X09=0000000000000035 X10=0000000000000035 X11=0000000000000035 X12=fffe800000dcb488 X13=0000000000000001 X14=0000000000000000 X15=000000000766b15a X16=0000000090df15ce X17=0000000000000000 X18=0000000090ec663e X19=efff800000000000 X20=0000000000000000 X21=c2f000000dcb4880 X22=0000000000000002 X23=0000000000000000 X24=ffff80008795f068 X25=0000000000000035 X26=35f000000d9b9d80 X27=35f000000d9bb370 X28=35f000000d9b9d98 X29=ffff80008c487cf0 X30=ffff80008658ed90 SP=ffff80008c487cf0 PSTATE=604023c9 -ZC- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0000007002000000:0000007002000000 Z01=0000000000000000:0000000000000070 Z02=0000000000000000:0000000000000000 Z03=0000000000000028:0000000000000070 Z04=0000000000000000:0000000000000000 Z05=0000000000000000:0000000000000000 Z06=6edc4d3a2914b135:d8e9c869e2695c88 Z07=b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000fffffaa3d530:0000fffffaa3d530 Z17=ffffff80ffffffd0:0000fffffaa3d500 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000