[ 411.210075][ T3151] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:64779' (ED25519) to the list of known hosts. [ 851.134592][ T25] audit: type=1400 audit(850.370:60): avc: denied { execute } for pid=3318 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 851.162473][ T25] audit: type=1400 audit(850.400:61): avc: denied { execute_no_trans } for pid=3318 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:15:01 parsed 1 programs [ 902.022826][ T25] audit: type=1400 audit(901.250:62): avc: denied { node_bind } for pid=3318 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 921.962266][ T25] audit: type=1400 audit(921.190:63): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 922.007237][ T25] audit: type=1400 audit(921.230:64): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 922.080887][ T3326] cgroup: Unknown subsys name 'net' [ 922.128624][ T25] audit: type=1400 audit(921.370:65): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 922.554153][ T3326] cgroup: Unknown subsys name 'cpuset' [ 922.653518][ T3326] cgroup: Unknown subsys name 'rlimit' [ 923.949222][ T25] audit: type=1400 audit(923.180:66): avc: denied { setattr } for pid=3326 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 923.974255][ T25] audit: type=1400 audit(923.200:67): avc: denied { create } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 923.998492][ T25] audit: type=1400 audit(923.230:68): avc: denied { write } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 924.019584][ T25] audit: type=1400 audit(923.260:69): avc: denied { module_request } for pid=3326 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 924.549874][ T25] audit: type=1400 audit(923.780:70): avc: denied { read } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 924.604782][ T25] audit: type=1400 audit(923.840:71): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 924.640397][ T25] audit: type=1400 audit(923.860:72): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 925.880063][ T3330] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 926.098464][ T3326] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 953.740649][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 953.759107][ T25] audit: type=1400 audit(952.980:77): avc: denied { execmem } for pid=3331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 956.323382][ T25] audit: type=1400 audit(955.560:78): avc: denied { read } for pid=3332 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 956.344896][ T25] audit: type=1400 audit(955.570:79): avc: denied { open } for pid=3332 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 956.389581][ T25] audit: type=1400 audit(955.630:80): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 957.376936][ T25] audit: type=1400 audit(956.610:81): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 957.420733][ T25] audit: type=1400 audit(956.660:82): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.3EJ7Bz/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 957.470796][ T25] audit: type=1400 audit(956.700:83): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 957.539905][ T25] audit: type=1400 audit(956.780:84): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.3EJ7Bz/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 957.577034][ T25] audit: type=1400 audit(956.810:85): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.3EJ7Bz/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2931 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 957.683384][ T25] audit: type=1400 audit(956.920:86): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 958.149572][ T3332] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 989.164869][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 989.187958][ T25] audit: type=1400 audit(988.400:95): avc: denied { sys_module } for pid=3353 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1000.654216][ T3353] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1000.728943][ T3353] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1010.476958][ T3353] hsr_slave_0: entered promiscuous mode [ 1010.512910][ T3353] hsr_slave_1: entered promiscuous mode [ 1014.724345][ T3353] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1014.850056][ T3353] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1014.933035][ T3353] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1015.013961][ T3353] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1021.564234][ T3353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1044.249997][ T3353] veth0_vlan: entered promiscuous mode [ 1044.490445][ T3353] veth1_vlan: entered promiscuous mode [ 1045.309719][ T3353] veth0_macvtap: entered promiscuous mode [ 1045.549839][ T3353] veth1_macvtap: entered promiscuous mode [ 1046.594687][ T3399] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1046.597195][ T3399] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1046.598187][ T3399] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1046.598873][ T3399] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.190357][ T3399] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1052.068960][ T3399] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1053.052048][ T3399] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1053.653799][ T3399] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1066.083696][ T3399] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1066.493279][ T3399] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1066.703162][ T3399] bond0 (unregistering): Released all slaves [ 1068.308052][ T3399] hsr_slave_0: left promiscuous mode [ 1068.376884][ T3399] hsr_slave_1: left promiscuous mode [ 1068.617625][ T3399] veth1_macvtap: left promiscuous mode [ 1068.621503][ T3399] veth0_macvtap: left promiscuous mode [ 1068.640269][ T3399] veth1_vlan: left promiscuous mode [ 1068.644716][ T3399] veth0_vlan: left promiscuous mode [ 1133.683801][ T25] audit: type=1400 audit(1132.920:96): avc: denied { mounton } for pid=3482 comm="syz-executor" path="/syzkaller.OFYXRy/syz-tmp" dev="vda" ino=1885 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1140.199101][ T25] audit: type=1400 audit(1139.350:97): avc: denied { create } for pid=3489 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1140.440000][ T25] audit: type=1400 audit(1139.670:98): avc: denied { sys_admin } for pid=3489 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1145.572249][ T25] audit: type=1400 audit(1144.810:99): avc: denied { sys_chroot } for pid=3491 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1152.997662][ T25] audit: type=1401 audit(1152.230:100): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1156.189702][ T25] audit: type=1400 audit(1155.410:101): avc: denied { create } for pid=3502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 1970/01/01 00:19:57 executed programs: 0 [ 1221.161713][ T3546] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1221.238788][ T3546] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1227.839498][ T3546] hsr_slave_0: entered promiscuous mode [ 1227.874747][ T3546] hsr_slave_1: entered promiscuous mode [ 1231.798612][ T3546] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1231.923099][ T3546] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1232.012785][ T3546] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1232.094463][ T3546] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1239.091529][ T3546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1269.688788][ T3546] veth0_vlan: entered promiscuous mode [ 1269.947192][ T3546] veth1_vlan: entered promiscuous mode [ 1271.034378][ T3546] veth0_macvtap: entered promiscuous mode [ 1271.161181][ T3546] veth1_macvtap: entered promiscuous mode [ 1272.392048][ T3399] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1272.424474][ T3399] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1272.473972][ T3399] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1272.503500][ T3399] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:21:13 executed programs: 2 [ 1275.103103][ T25] audit: type=1400 audit(1274.280:102): avc: denied { read } for pid=3626 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1275.147052][ T25] audit: type=1400 audit(1274.370:103): avc: denied { open } for pid=3626 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1275.198338][ T25] audit: type=1400 audit(1274.430:104): avc: denied { ioctl } for pid=3626 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1276.364206][ T3626] ================================================================== [ 1276.364811][ T3626] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1276.366537][ T3626] Read of size 8 at addr 00f0000012cbe000 by task syz.2.17/3626 [ 1276.366758][ T3626] Pointer tag: [00], memory tag: [fe] [ 1276.366868][ T3626] [ 1276.367828][ T3626] CPU: 0 UID: 0 PID: 3626 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1276.368361][ T3626] Hardware name: linux,dummy-virt (DT) [ 1276.368835][ T3626] Call trace: [ 1276.369222][ T3626] show_stack+0x2c/0x3c (C) [ 1276.369821][ T3626] __dump_stack+0x30/0x40 [ 1276.370077][ T3626] dump_stack_lvl+0xd8/0x12c [ 1276.370294][ T3626] print_address_description+0xac/0x288 [ 1276.370588][ T3626] print_report+0x84/0xa0 [ 1276.370840][ T3626] kasan_report+0xb0/0x110 [ 1276.371082][ T3626] kasan_tag_mismatch+0x28/0x3c [ 1276.371357][ T3626] __hwasan_tag_mismatch+0x30/0x60 [ 1276.371572][ T3626] __kvm_pgtable_walk+0x8e4/0xa68 [ 1276.371829][ T3626] kvm_pgtable_walk+0x294/0x468 [ 1276.372074][ T3626] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1276.372368][ T3626] kvm_free_stage2_pgd+0x198/0x28c [ 1276.372634][ T3626] kvm_uninit_stage2_mmu+0x20/0x38 [ 1276.372924][ T3626] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1276.373213][ T3626] kvm_mmu_notifier_release+0x48/0xa8 [ 1276.373484][ T3626] mmu_notifier_unregister+0x128/0x42c [ 1276.373764][ T3626] kvm_put_kvm+0x6a0/0xfa8 [ 1276.373949][ T3626] kvm_vm_release+0x58/0x78 [ 1276.374191][ T3626] __fput+0x4ac/0x980 [ 1276.374410][ T3626] ____fput+0x20/0x58 [ 1276.374619][ T3626] task_work_run+0x1bc/0x254 [ 1276.374816][ T3626] do_notify_resume+0x1bc/0x270 [ 1276.375039][ T3626] el0_svc+0xb8/0x164 [ 1276.375259][ T3626] el0t_64_sync_handler+0x84/0x12c [ 1276.375487][ T3626] el0t_64_sync+0x198/0x19c [ 1276.375965][ T3626] [ 1276.376141][ T3626] The buggy address belongs to the physical page: [ 1276.377316][ T3626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xcaf0000012cbf900 pfn:0x52cbe [ 1276.377688][ T3626] flags: 0x1ffffc000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0xff) [ 1276.378804][ T3626] raw: 01ffffc000000000 ffffc1ffc0823fc8 ffffc1ffc08acc88 0000000000000000 [ 1276.379033][ T3626] raw: caf0000012cbf900 0000000000000000 00000000ffffffff 0000000000000000 [ 1276.379236][ T3626] page dumped because: kasan: bad access detected [ 1276.379385][ T3626] [ 1276.379481][ T3626] Memory state around the buggy address: [ 1276.379813][ T3626] fff0000012cbde00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1276.379992][ T3626] fff0000012cbdf00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1276.380180][ T3626] >fff0000012cbe000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1276.380313][ T3626] ^ [ 1276.380568][ T3626] fff0000012cbe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1276.380772][ T3626] fff0000012cbe200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1276.380976][ T3626] ================================================================== [ 1276.576852][ T3626] Disabling lock debugging due to kernel taint [ 1277.935155][ T3626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xcaf0000000000000 pfn:0x52cbe [ 1277.963342][ T3626] flags: 0x1fff88000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0xe2) [ 1277.969794][ T3626] raw: 01fff88000000000 ffffc1ffc08e8148 ffffc1ffc0823fc8 0000000000000000 [ 1277.977519][ T3626] raw: caf0000000000000 32f00000127dec00 00000000ffffffff 0000000000000000 [ 1277.982258][ T3626] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 1277.994165][ T3626] ------------[ cut here ]------------ [ 1277.994396][ T3626] kernel BUG at ./include/linux/mm.h:1036! [ 1277.995259][ T3626] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 1277.999595][ T3626] Modules linked in: [ 1278.001284][ T3626] CPU: 0 UID: 0 PID: 3626 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1278.002652][ T3626] Tainted: [B]=BAD_PAGE [ 1278.003282][ T3626] Hardware name: linux,dummy-virt (DT) [ 1278.004244][ T3626] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1278.005437][ T3626] pc : kvm_s2_put_page+0x374/0x3a0 [ 1278.006299][ T3626] lr : kvm_s2_put_page+0x374/0x3a0 [ 1278.007167][ T3626] sp : ffff80008e787830 [ 1278.007803][ T3626] x29: ffff80008e787830 x28: 00f0000012cbe4d8 x27: 00f0000012cbe4d8 [ 1278.009323][ T3626] x26: 00000000000000ff x25: ffff80008734e000 x24: ffffc1ffc0000000 [ 1278.010533][ T3626] x23: ffffc1ffc04b2f88 x22: 0000000000000000 x21: ffffc1ffc04b2fb4 [ 1278.011740][ T3626] x20: 0000000000000000 x19: ffffc1ffc04b2f80 x18: 00000000e82c1e32 [ 1278.013014][ T3626] x17: 0000000004ca68a0 x16: 00000000e82c0212 x15: 00000000cf60477e [ 1278.014263][ T3626] x14: 0000000040000000 x13: fff000001efa1d88 x12: 0000000000000001 [ 1278.015453][ T3626] x11: 0000000000000000 x10: 0000000000ff0100 x9 : 0f60c1a214339d00 [ 1278.016766][ T3626] x8 : 0f60c1a214339d00 x7 : 0000000000000400 x6 : ffff80008039f3c8 [ 1278.017996][ T3626] x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080757a9c [ 1278.019255][ T3626] x2 : 0000000000000001 x1 : 0000000100000000 x0 : 000000000000003e [ 1278.020531][ T3626] Call trace: [ 1278.021202][ T3626] kvm_s2_put_page+0x374/0x3a0 (P) [ 1278.022117][ T3626] stage2_free_walker+0xdc/0x264 [ 1278.022996][ T3626] __kvm_pgtable_walk+0x7d8/0xa68 [ 1278.023868][ T3626] kvm_pgtable_walk+0x294/0x468 [ 1278.024731][ T3626] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1278.025627][ T3626] kvm_free_stage2_pgd+0x198/0x28c [ 1278.026502][ T3626] kvm_uninit_stage2_mmu+0x20/0x38 [ 1278.027372][ T3626] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1278.028311][ T3626] kvm_mmu_notifier_release+0x48/0xa8 [ 1278.029198][ T3626] mmu_notifier_unregister+0x128/0x42c [ 1278.030094][ T3626] kvm_put_kvm+0x6a0/0xfa8 [ 1278.030834][ T3626] kvm_vm_release+0x58/0x78 [ 1278.031623][ T3626] __fput+0x4ac/0x980 [ 1278.032337][ T3626] ____fput+0x20/0x58 [ 1278.033059][ T3626] task_work_run+0x1bc/0x254 [ 1278.033850][ T3626] do_notify_resume+0x1bc/0x270 [ 1278.034683][ T3626] el0_svc+0xb8/0x164 [ 1278.035410][ T3626] el0t_64_sync_handler+0x84/0x12c [ 1278.036224][ T3626] el0t_64_sync+0x198/0x19c [ 1278.037503][ T3626] Code: f00375a1 9113c821 aa1303e0 97f9c9f2 (d4210000) [ 1278.039094][ T3626] ---[ end trace 0000000000000000 ]--- [ 1278.040573][ T3626] Kernel panic - not syncing: Oops - BUG: Fatal exception [ 1278.042411][ T3626] Kernel Offset: disabled [ 1278.043052][ T3626] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1278.044026][ T3626] Memory Limit: none [ 1278.045596][ T3626] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:49:18 Registers: info registers vcpu 0 CPU#0 PC=ffff8000821280b8 X00=0000000000000003 X01=0000000000000002 X02=0000000000000001 X03=ffff800082127fb4 X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081f0f0b4 X08=2af000000d9b9d80 X09=0000000000000000 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000002 X13=0000000000000002 X14=0000000000000000 X15=0000000070c34dd3 X16=000000008ce1e39a X17=0000000000000000 X18=000000008d1ee51a X19=efff800000000000 X20=5df000000dcb0880 X21=44ff80008c43b018 X22=0000000000000002 X23=5df000000dcb097c X24=000000000000005d X25=5df000000dcb0ac8 X26=5df000000dcb08c8 X27=000000000000005d X28=000000000000005d X29=ffff80008c477b40 X30=ffff8000821280b8 SP=ffff80008c477b30 PSTATE=814020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=65642f000a732520:7325207334362e25 Z02=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z03=000000ff0000ff00:00ff0000000000ff Z04=0000000000000000:000f00f00f00000f Z05=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z06=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z07=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffc53f7f90:0000ffffc53f7f90 Z17=ffffff80ffffffd0:0000ffffc53f7f60 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000