[ 375.111433][ T3150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 408.521465][ T3150] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:54487' (ED25519) to the list of known hosts. [ 843.357869][ T25] audit: type=1400 audit(842.570:61): avc: denied { execute } for pid=3315 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 843.414852][ T25] audit: type=1400 audit(842.620:62): avc: denied { execute_no_trans } for pid=3315 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:14:57 parsed 1 programs [ 898.565266][ T25] audit: type=1400 audit(897.790:63): avc: denied { node_bind } for pid=3315 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 918.829678][ T25] audit: type=1400 audit(918.060:64): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 918.867621][ T25] audit: type=1400 audit(918.090:65): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 918.948110][ T3328] cgroup: Unknown subsys name 'net' [ 918.998337][ T25] audit: type=1400 audit(918.230:66): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 919.389282][ T3328] cgroup: Unknown subsys name 'cpuset' [ 919.487663][ T3328] cgroup: Unknown subsys name 'rlimit' [ 920.792225][ T25] audit: type=1400 audit(920.020:67): avc: denied { setattr } for pid=3328 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 920.820704][ T25] audit: type=1400 audit(920.050:68): avc: denied { create } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 920.837591][ T25] audit: type=1400 audit(920.060:69): avc: denied { write } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 920.866555][ T25] audit: type=1400 audit(920.090:70): avc: denied { module_request } for pid=3328 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 921.378401][ T25] audit: type=1400 audit(920.600:71): avc: denied { read } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 921.435497][ T25] audit: type=1400 audit(920.660:72): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 921.461966][ T25] audit: type=1400 audit(920.690:73): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 922.641083][ T3332] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 922.866065][ T3328] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 950.555413][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 950.560607][ T25] audit: type=1400 audit(949.780:78): avc: denied { execmem } for pid=3333 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 952.902395][ T25] audit: type=1400 audit(952.130:79): avc: denied { read } for pid=3334 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 952.919769][ T25] audit: type=1400 audit(952.150:80): avc: denied { open } for pid=3334 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 952.967481][ T25] audit: type=1400 audit(952.200:81): avc: denied { mounton } for pid=3334 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 953.981792][ T25] audit: type=1400 audit(953.210:82): avc: denied { mount } for pid=3334 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 954.026593][ T25] audit: type=1400 audit(953.250:83): avc: denied { mounton } for pid=3334 comm="syz-executor" path="/syzkaller.ss0cPv/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 954.074319][ T25] audit: type=1400 audit(953.300:84): avc: denied { mount } for pid=3334 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 954.146917][ T25] audit: type=1400 audit(953.380:85): avc: denied { mounton } for pid=3334 comm="syz-executor" path="/syzkaller.ss0cPv/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 954.186040][ T25] audit: type=1400 audit(953.410:86): avc: denied { mounton } for pid=3334 comm="syz-executor" path="/syzkaller.ss0cPv/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2917 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 954.290044][ T25] audit: type=1400 audit(953.520:87): avc: denied { unmount } for pid=3334 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 954.716960][ T3334] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 999.280660][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 999.291861][ T25] audit: type=1400 audit(998.510:96): avc: denied { sys_module } for pid=3366 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1014.425985][ T3366] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1014.492740][ T3366] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1020.169083][ T3366] hsr_slave_0: entered promiscuous mode [ 1020.200653][ T3366] hsr_slave_1: entered promiscuous mode [ 1023.751774][ T3366] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1023.896820][ T3366] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1023.967636][ T3366] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1024.055552][ T3366] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1030.212444][ T3366] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1057.348977][ T3366] veth0_vlan: entered promiscuous mode [ 1057.547890][ T3366] veth1_vlan: entered promiscuous mode [ 1058.305672][ T3366] veth0_macvtap: entered promiscuous mode [ 1058.516952][ T3366] veth1_macvtap: entered promiscuous mode [ 1059.595972][ T49] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1059.649334][ T49] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1059.675102][ T49] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1059.688785][ T49] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1064.807180][ T3367] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1066.115560][ T25] audit: type=1400 audit(1065.330:97): avc: denied { create } for pid=3453 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1066.269339][ T3367] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1067.416006][ T3367] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1068.428815][ T3367] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1080.637509][ T3367] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1080.777971][ T3367] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1080.856765][ T3367] bond0 (unregistering): Released all slaves [ 1082.726285][ T3367] hsr_slave_0: left promiscuous mode [ 1082.876037][ T3367] hsr_slave_1: left promiscuous mode [ 1083.345915][ T3367] veth1_macvtap: left promiscuous mode [ 1083.349697][ T3367] veth0_macvtap: left promiscuous mode [ 1083.379034][ T3367] veth1_vlan: left promiscuous mode [ 1083.395853][ T3367] veth0_vlan: left promiscuous mode [ 1124.087036][ T25] audit: type=1400 audit(1123.310:98): avc: denied { create } for pid=3488 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1124.234206][ T25] audit: type=1400 audit(1123.450:99): avc: denied { sys_admin } for pid=3488 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1128.536743][ T25] audit: type=1400 audit(1127.750:100): avc: denied { sys_chroot } for pid=3490 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1139.292986][ T25] audit: type=1401 audit(1138.520:101): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 1970/01/01 00:19:34 executed programs: 0 [ 1212.158032][ T3533] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1212.299217][ T3533] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1219.604886][ T3533] hsr_slave_0: entered promiscuous mode [ 1219.626400][ T3533] hsr_slave_1: entered promiscuous mode [ 1223.489557][ T3533] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1223.618991][ T3533] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1223.706360][ T3533] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1223.798786][ T3533] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1230.962835][ T3533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1261.596229][ T3533] veth0_vlan: entered promiscuous mode [ 1261.909838][ T3533] veth1_vlan: entered promiscuous mode [ 1262.740597][ T3533] veth0_macvtap: entered promiscuous mode [ 1262.899898][ T3533] veth1_macvtap: entered promiscuous mode [ 1264.079949][ T3445] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1264.099551][ T3445] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1264.107961][ T3445] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1264.118211][ T3445] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1265.447339][ T25] audit: type=1400 audit(1264.670:102): avc: denied { mounton } for pid=3533 comm="syz-executor" path="/syzkaller.pMrTAB/syz-tmp" dev="vda" ino=1890 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1265.547655][ T25] audit: type=1400 audit(1264.780:103): avc: denied { mount } for pid=3533 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 1970/01/01 00:21:05 executed programs: 2 [ 1266.870286][ T25] audit: type=1400 audit(1266.100:104): avc: denied { read } for pid=3625 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1266.897227][ T25] audit: type=1400 audit(1266.120:105): avc: denied { open } for pid=3625 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1266.955032][ T25] audit: type=1400 audit(1266.150:106): avc: denied { ioctl } for pid=3625 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1266.988651][ C0] Unhandled 64-bit el1h sync exception on CPU0, ESR 0x000000005a000000 -- HVC (AArch64) [ 1266.989930][ C0] CPU: 0 UID: 0 PID: 3625 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1266.990454][ C0] Hardware name: linux,dummy-virt (DT) [ 1266.990955][ C0] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1266.991324][ C0] pc : pkvm_init_host_vm+0xb8/0x160 [ 1266.992947][ C0] lr : pkvm_init_host_vm+0xa0/0x160 [ 1266.993143][ C0] sp : ffff80008e6c7c60 [ 1266.993259][ C0] x29: ffff80008e6c7c60 x28: d2f0000020052298 x27: ffff800087354000 [ 1266.993848][ C0] x26: d6f000000d2a5820 x25: 0000000000000058 x24: 00000000000014f8 [ 1266.994154][ C0] x23: 0000000000000058 x22: 58ff80008c4ca260 x21: 58ff80008c4c9ff0 [ 1266.994439][ C0] x20: 0000000000000000 x19: efff800000000000 x18: ffffc1ffc0802438 [ 1266.994733][ C0] x17: 00000000000000fe x16: 00000000000000ff x15: 00000000000000fe [ 1266.995034][ C0] x14: ffffffffffffffff x13: 00000000000000de x12: ffff7c1ffbf7f1ac [ 1266.995329][ C0] x11: 0000000000000100 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1266.995688][ C0] x8 : d2f0000020051d80 x7 : ffff800080aba4c0 x6 : 0000000000000000 [ 1266.995997][ C0] x5 : 0000000000000001 x4 : ffff80008e6c7ac0 x3 : 0000000000000004 [ 1266.996291][ C0] x2 : 0000000000014ac0 x1 : 0000000000000000 x0 : 00000000c600001b [ 1266.997077][ C0] Kernel panic - not syncing: Unhandled exception [ 1267.010891][ C0] CPU: 0 UID: 0 PID: 3625 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1267.012182][ C0] Hardware name: linux,dummy-virt (DT) [ 1267.013072][ C0] Call trace: [ 1267.013900][ C0] show_stack+0x2c/0x3c (C) [ 1267.015026][ C0] __dump_stack+0x30/0x40 [ 1267.015808][ C0] dump_stack_lvl+0x30/0x12c [ 1267.016524][ C0] dump_stack+0x1c/0x28 [ 1267.017211][ C0] vpanic+0x22c/0x59c [ 1267.017895][ C0] vpanic+0x0/0x59c [ 1267.018547][ C0] el1t_64_irq_handler+0x0/0x1c [ 1267.019307][ C0] el1_abort+0x0/0x5c [ 1267.019970][ C0] el1h_64_sync+0x6c/0x70 [ 1267.020844][ C0] pkvm_init_host_vm+0xb8/0x160 (P) [ 1267.021635][ C0] kvm_arch_init_vm+0x150/0x288 [ 1267.022406][ C0] kvm_dev_ioctl+0x838/0x105c [ 1267.023202][ C0] __arm64_sys_ioctl+0x18c/0x244 [ 1267.023993][ C0] invoke_syscall+0x90/0x2b4 [ 1267.024824][ C0] el0_svc_common+0x180/0x2f4 [ 1267.025606][ C0] do_el0_svc+0x58/0x74 [ 1267.026366][ C0] el0_svc+0x58/0x164 [ 1267.027043][ C0] el0t_64_sync_handler+0x84/0x12c [ 1267.027814][ C0] el0t_64_sync+0x198/0x19c [ 1267.029641][ C0] Kernel Offset: disabled [ 1267.030279][ C0] CPU features: 0x00000,000068c0,17de33e1,057ffe1f [ 1267.031188][ C0] Memory Limit: none [ 1267.032102][ C0] [ 1267.032610][ C0] ================================ [ 1267.033250][ C0] WARNING: inconsistent lock state [ 1267.033944][ C0] syzkaller #0 Not tainted [ 1267.034644][ C0] -------------------------------- [ 1267.035297][ C0] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 1267.036039][ C0] syz.2.17/3625 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 1267.036915][ C0] 40f000000d3ed6e8 (&k->list_lock){+.+.}-{3:3}, at: bus_for_each_dev+0x60/0x2a4 [ 1267.038876][ C0] {INITIAL USE} state was registered at: [ 1267.039660][ C0] lock_acquire+0x14c/0x2e0 [ 1267.040584][ C0] _raw_spin_lock+0x48/0x60 [ 1267.041304][ C0] kobject_add_internal+0x46c/0xee4 [ 1267.042050][ C0] kobject_add+0x10c/0x1d0 [ 1267.042714][ C0] device_add+0x494/0xd78 [ 1267.043439][ C0] device_register+0x28/0x38 [ 1267.044153][ C0] faux_bus_init+0x1c/0x88 [ 1267.044887][ C0] driver_init+0x30/0x58 [ 1267.045551][ C0] do_basic_setup+0x1c/0xa8 [ 1267.046261][ C0] kernel_init_freeable+0x244/0x330 [ 1267.046983][ C0] kernel_init+0x24/0x1d0 [ 1267.047676][ C0] ret_from_fork+0x10/0x20 [ 1267.048467][ C0] irq event stamp: 1636 [ 1267.049062][ C0] hardirqs last enabled at (1635): [] _raw_spin_unlock_irqrestore+0x44/0xbc [ 1267.050216][ C0] hardirqs last disabled at (1636): [] __panic_unhandled+0x24/0x68 [ 1267.051309][ C0] softirqs last enabled at (1616): [] handle_softirqs+0xb8c/0xd08 [ 1267.052454][ C0] softirqs last disabled at (1611): [] __do_softirq+0x14/0x20 [ 1267.053738][ C0] [ 1267.053738][ C0] other info that might help us debug this: [ 1267.054656][ C0] Possible unsafe locking scenario: [ 1267.054656][ C0] [ 1267.055458][ C0] CPU0 [ 1267.055932][ C0] ---- [ 1267.056421][ C0] lock(&k->list_lock); [ 1267.057219][ C0] [ 1267.057731][ C0] lock(&k->list_lock); [ 1267.058512][ C0] [ 1267.058512][ C0] *** DEADLOCK *** [ 1267.058512][ C0] [ 1267.059375][ C0] no locks held by syz.2.17/3625. [ 1267.060045][ C0] [ 1267.060045][ C0] stack backtrace: [ 1267.060803][ C0] CPU: 0 UID: 0 PID: 3625 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1267.061813][ C0] Hardware name: linux,dummy-virt (DT) [ 1267.062425][ C0] Call trace: [ 1267.062912][ C0] show_stack+0x2c/0x3c (C) [ 1267.063729][ C0] __dump_stack+0x30/0x40 [ 1267.064438][ C0] dump_stack_lvl+0x30/0x12c [ 1267.065148][ C0] dump_stack+0x1c/0x28 [ 1267.065835][ C0] print_usage_bug+0x2f4/0x32c [ 1267.066561][ C0] verify_lock_unused+0x78/0x88 [ 1267.067384][ C0] lock_acquire+0x22c/0x2e0 [ 1267.068139][ C0] _raw_spin_lock+0x48/0x60 [ 1267.068870][ C0] bus_for_each_dev+0x60/0x2a4 [ 1267.069657][ C0] coresight_panic_cb+0x2c/0x3c [ 1267.070435][ C0] notifier_call_chain+0x1e8/0x65c [ 1267.071249][ C0] atomic_notifier_call_chain+0xd0/0x180 [ 1267.072102][ C0] vpanic+0x2c4/0x59c [ 1267.072819][ C0] vpanic+0x0/0x59c [ 1267.073477][ C0] el1t_64_irq_handler+0x0/0x1c [ 1267.074206][ C0] el1_abort+0x0/0x5c [ 1267.074871][ C0] el1h_64_sync+0x6c/0x70 [ 1267.075561][ C0] pkvm_init_host_vm+0xb8/0x160 (P) [ 1267.076373][ C0] kvm_arch_init_vm+0x150/0x288 [ 1267.077141][ C0] kvm_dev_ioctl+0x838/0x105c [ 1267.077903][ C0] __arm64_sys_ioctl+0x18c/0x244 [ 1267.078706][ C0] invoke_syscall+0x90/0x2b4 [ 1267.079522][ C0] el0_svc_common+0x180/0x2f4 [ 1267.080349][ C0] do_el0_svc+0x58/0x74 [ 1267.081121][ C0] el0_svc+0x58/0x164 [ 1267.081731][ C0] el0t_64_sync_handler+0x84/0x12c [ 1267.082467][ C0] el0t_64_sync+0x198/0x19c [ 1267.084497][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:24:03 Registers: info registers vcpu 0 CPU#0 PC=ffff800082127694 X00=0000000000000003 X01=0000000000000002 X02=0000000000000060 X03=ffff800082127590 X04=0000000000000001 X05=0000000000000000 X06=ffff800081f0e734 X07=ffff800087cd0c24 X08=d2f0000020051d80 X09=0000000000110001 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000074 X13=0000000000000007 X14=0000000000110001 X15=0000000000000000 X16=00000000000000fe X17=00000000000000fe X18=ffffc1ffc0802438 X19=efff800000000000 X20=74f000000dcb0880 X21=77ff80008c43b018 X22=0000000000000002 X23=74f000000dcb097c X24=0000000000000074 X25=74f000000dcb0ac8 X26=74f000000dcb08c8 X27=0000000000000074 X28=0000000000000074 X29=ffff80008e6c73f0 X30=ffff800082127694 SP=ffff80008e6c73e0 PSTATE=004023c9 ---- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=000000756c6c2570:6f6f6c2f7665642f Z02=0000000000000000:ffffffff00000000 Z03=ffffff000000ff00:0000000000000000 Z04=0000000000000000:fff000f000000000 Z05=bb448243222c92da:e3914ed4e87380b0 Z06=6edc4d3a2914b135:d8e9c869e2695c88 Z07=b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffdebfe930:0000ffffdebfe930 Z17=ffffff80ffffffd0:0000ffffdebfe900 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000