[ 372.864079][ T3151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 406.277494][ T3151] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:13290' (ED25519) to the list of known hosts. [ 860.142705][ T25] audit: type=1400 audit(859.370:61): avc: denied { execute } for pid=3317 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 860.167169][ T25] audit: type=1400 audit(859.390:62): avc: denied { execute_no_trans } for pid=3317 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:15:10 parsed 1 programs [ 911.805488][ T25] audit: type=1400 audit(911.040:63): avc: denied { node_bind } for pid=3317 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 935.098137][ T25] audit: type=1400 audit(934.330:64): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 935.134187][ T25] audit: type=1400 audit(934.360:65): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 935.218758][ T3325] cgroup: Unknown subsys name 'net' [ 935.272394][ T25] audit: type=1400 audit(934.500:66): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 935.660797][ T3325] cgroup: Unknown subsys name 'cpuset' [ 935.769137][ T3325] cgroup: Unknown subsys name 'rlimit' [ 937.081013][ T25] audit: type=1400 audit(936.310:67): avc: denied { setattr } for pid=3325 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 937.107102][ T25] audit: type=1400 audit(936.340:68): avc: denied { create } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 937.128917][ T25] audit: type=1400 audit(936.360:69): avc: denied { write } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 937.145060][ T25] audit: type=1400 audit(936.380:70): avc: denied { module_request } for pid=3325 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 937.640893][ T25] audit: type=1400 audit(936.870:71): avc: denied { read } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 937.696501][ T25] audit: type=1400 audit(936.930:72): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 937.722572][ T25] audit: type=1400 audit(936.950:73): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 938.874050][ T3334] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 939.087437][ T3325] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 965.456667][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 965.466388][ T25] audit: type=1400 audit(964.670:78): avc: denied { execmem } for pid=3335 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 965.751159][ T25] audit: type=1400 audit(964.980:79): avc: denied { read } for pid=3336 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 965.798425][ T25] audit: type=1400 audit(965.010:80): avc: denied { open } for pid=3336 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 965.865437][ T25] audit: type=1400 audit(965.100:81): avc: denied { mounton } for pid=3336 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 968.484978][ T25] audit: type=1400 audit(967.700:82): avc: denied { mount } for pid=3336 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 968.581714][ T25] audit: type=1400 audit(967.810:83): avc: denied { mounton } for pid=3336 comm="syz-executor" path="/syzkaller.EEwOOE/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 968.661771][ T25] audit: type=1400 audit(967.890:84): avc: denied { mount } for pid=3336 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 968.833083][ T25] audit: type=1400 audit(968.050:85): avc: denied { mounton } for pid=3336 comm="syz-executor" path="/syzkaller.EEwOOE/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 968.906124][ T25] audit: type=1400 audit(968.140:86): avc: denied { mounton } for pid=3336 comm="syz-executor" path="/syzkaller.EEwOOE/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2917 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 969.169163][ T25] audit: type=1400 audit(968.400:87): avc: denied { unmount } for pid=3336 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 969.657078][ T3336] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1038.130842][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1038.142974][ T25] audit: type=1400 audit(1037.360:96): avc: denied { create } for pid=3378 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1038.235248][ T25] audit: type=1400 audit(1037.460:97): avc: denied { sys_admin } for pid=3378 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1039.786366][ T25] audit: type=1400 audit(1039.020:98): avc: denied { sys_chroot } for pid=3379 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1044.771042][ T25] audit: type=1401 audit(1044.000:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1047.634931][ T25] audit: type=1400 audit(1046.870:100): avc: denied { sys_module } for pid=3386 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1058.548580][ T3386] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1058.618057][ T3386] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1065.369317][ T3386] hsr_slave_0: entered promiscuous mode [ 1065.419435][ T3386] hsr_slave_1: entered promiscuous mode [ 1072.074770][ T3386] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1072.348860][ T3386] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1072.528661][ T3386] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1072.668998][ T3386] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1079.202528][ T3386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1102.884360][ T3386] veth0_vlan: entered promiscuous mode [ 1103.067428][ T3386] veth1_vlan: entered promiscuous mode [ 1103.873019][ T3386] veth0_macvtap: entered promiscuous mode [ 1104.158088][ T3386] veth1_macvtap: entered promiscuous mode [ 1105.038930][ T49] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1105.105814][ T49] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1105.203589][ T49] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1105.207481][ T49] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1110.017242][ T3384] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1110.964949][ T3384] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1111.723353][ T3384] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1112.344327][ T3384] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1122.703960][ T3384] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1122.785075][ T3384] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1122.837504][ T3384] bond0 (unregistering): Released all slaves [ 1123.843480][ T3384] hsr_slave_0: left promiscuous mode [ 1123.893166][ T3384] hsr_slave_1: left promiscuous mode [ 1124.050760][ T3384] veth1_macvtap: left promiscuous mode [ 1124.054637][ T3384] veth0_macvtap: left promiscuous mode [ 1124.066537][ T3384] veth1_vlan: left promiscuous mode [ 1124.081305][ T3384] veth0_vlan: left promiscuous mode [ 1147.659369][ T25] audit: type=1400 audit(1146.890:101): avc: denied { create } for pid=3482 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 1970/01/01 00:19:24 executed programs: 0 [ 1201.608574][ T3502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1201.888885][ T3502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1216.895915][ T3502] hsr_slave_0: entered promiscuous mode [ 1216.917903][ T3502] hsr_slave_1: entered promiscuous mode [ 1224.685395][ T3502] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1224.917531][ T3502] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1225.127447][ T3502] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1225.367355][ T3502] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1236.433939][ T3502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1274.315136][ T3502] veth0_vlan: entered promiscuous mode [ 1274.676009][ T3502] veth1_vlan: entered promiscuous mode [ 1275.657007][ T3502] veth0_macvtap: entered promiscuous mode [ 1275.855828][ T3502] veth1_macvtap: entered promiscuous mode [ 1276.977899][ T3384] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1276.984883][ T3384] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1276.999539][ T3384] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1277.047975][ T3384] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1278.356163][ T25] audit: type=1400 audit(1277.570:102): avc: denied { mounton } for pid=3502 comm="syz-executor" path="/syzkaller.aBhnFL/syz-tmp" dev="vda" ino=1890 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1278.468561][ T25] audit: type=1400 audit(1277.700:103): avc: denied { mount } for pid=3502 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 1970/01/01 00:21:18 executed programs: 2 [ 1280.028028][ T25] audit: type=1400 audit(1279.260:104): avc: denied { read } for pid=3623 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1280.048193][ T25] audit: type=1400 audit(1279.280:105): avc: denied { open } for pid=3623 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1280.111679][ T25] audit: type=1400 audit(1279.330:106): avc: denied { ioctl } for pid=3623 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1281.268461][ T3623] ================================================================== [ 1281.269041][ T3623] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1281.270811][ T3623] Read of size 8 at addr dcf00000130c4000 by task syz.2.17/3623 [ 1281.271051][ T3623] Pointer tag: [dc], memory tag: [fe] [ 1281.271171][ T3623] [ 1281.272130][ T3623] CPU: 0 UID: 0 PID: 3623 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1281.272644][ T3623] Hardware name: linux,dummy-virt (DT) [ 1281.273117][ T3623] Call trace: [ 1281.273511][ T3623] show_stack+0x2c/0x3c (C) [ 1281.274162][ T3623] __dump_stack+0x30/0x40 [ 1281.274439][ T3623] dump_stack_lvl+0xd8/0x12c [ 1281.274642][ T3623] print_address_description+0xac/0x288 [ 1281.274938][ T3623] print_report+0x84/0xa0 [ 1281.275186][ T3623] kasan_report+0xb0/0x110 [ 1281.275427][ T3623] kasan_tag_mismatch+0x28/0x3c [ 1281.275690][ T3623] __hwasan_tag_mismatch+0x30/0x60 [ 1281.275926][ T3623] __kvm_pgtable_walk+0x8e4/0xa68 [ 1281.276205][ T3623] kvm_pgtable_walk+0x294/0x468 [ 1281.276459][ T3623] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1281.276748][ T3623] kvm_free_stage2_pgd+0x198/0x28c [ 1281.277027][ T3623] kvm_uninit_stage2_mmu+0x20/0x38 [ 1281.277304][ T3623] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1281.277590][ T3623] kvm_mmu_notifier_release+0x48/0xa8 [ 1281.277861][ T3623] mmu_notifier_unregister+0x128/0x42c [ 1281.278154][ T3623] kvm_put_kvm+0x6a0/0xfa8 [ 1281.278340][ T3623] kvm_vm_release+0x58/0x78 [ 1281.278575][ T3623] __fput+0x4ac/0x980 [ 1281.278800][ T3623] ____fput+0x20/0x58 [ 1281.279028][ T3623] task_work_run+0x1bc/0x254 [ 1281.279234][ T3623] do_notify_resume+0x1bc/0x270 [ 1281.279464][ T3623] el0_svc+0xb8/0x164 [ 1281.279676][ T3623] el0t_64_sync_handler+0x84/0x12c [ 1281.279916][ T3623] el0t_64_sync+0x198/0x19c [ 1281.280401][ T3623] [ 1281.280578][ T3623] The buggy address belongs to the physical page: [ 1281.281678][ T3623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x51f00000130c5b80 pfn:0x530c4 [ 1281.282062][ T3623] flags: 0x1ffc8c000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x23) [ 1281.283192][ T3623] raw: 01ffc8c000000000 ffffc1ffc08f7cc8 ffffc1ffc08f6c08 0000000000000000 [ 1281.283427][ T3623] raw: 51f00000130c5b80 0000000000000000 00000000ffffffff 0000000000000000 [ 1281.283618][ T3623] page dumped because: kasan: bad access detected [ 1281.283757][ T3623] [ 1281.283854][ T3623] Memory state around the buggy address: [ 1281.284207][ T3623] fff00000130c3e00: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 fe fe [ 1281.284397][ T3623] fff00000130c3f00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1281.284579][ T3623] >fff00000130c4000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1281.284710][ T3623] ^ [ 1281.284970][ T3623] fff00000130c4100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1281.285147][ T3623] fff00000130c4200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1281.285365][ T3623] ================================================================== [ 1281.509356][ T3623] Disabling lock debugging due to kernel taint [ 1282.295058][ T3623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x51f0000000000000 pfn:0x530c4 [ 1282.309371][ T3623] flags: 0x1ffdbc000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x6f) [ 1282.325426][ T3623] raw: 01ffdbc000000000 ffffc1ffc08f6908 ffffc1ffc08f7cc8 0000000000000000 [ 1282.331025][ T3623] raw: 51f0000000000000 87f0000013141680 00000000ffffffff 0000000000000000 [ 1282.338711][ T3623] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 1282.344001][ T3623] ------------[ cut here ]------------ [ 1282.344194][ T3623] kernel BUG at ./include/linux/mm.h:1036! [ 1282.345054][ T3623] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 1282.351381][ T3623] Modules linked in: [ 1282.353212][ T3623] CPU: 0 UID: 0 PID: 3623 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1282.354793][ T3623] Tainted: [B]=BAD_PAGE [ 1282.355474][ T3623] Hardware name: linux,dummy-virt (DT) [ 1282.356486][ T3623] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1282.357810][ T3623] pc : kvm_s2_put_page+0x374/0x3a0 [ 1282.358830][ T3623] lr : kvm_s2_put_page+0x374/0x3a0 [ 1282.359782][ T3623] sp : ffff80008e7c7830 [ 1282.360464][ T3623] x29: ffff80008e7c7830 x28: dcf00000130c42d0 x27: dcf00000130c42d0 [ 1282.362082][ T3623] x26: 00000000000000ff x25: ffff80008734e000 x24: ffffc1ffc0000000 [ 1282.363369][ T3623] x23: ffffc1ffc04c3108 x22: 0000000000000000 x21: ffffc1ffc04c3134 [ 1282.364644][ T3623] x20: 0000000000000000 x19: ffffc1ffc04c3100 x18: 00000000809b5ae0 [ 1282.365984][ T3623] x17: 0000000003deb215 x16: 00000000809b48c0 x15: 00000000307084a6 [ 1282.367260][ T3623] x14: 000000000000006d x13: fff000001f3c5888 x12: 0000000000000001 [ 1282.368525][ T3623] x11: 0000000000000000 x10: 0000000000ff0100 x9 : a470581b1f35f100 [ 1282.369936][ T3623] x8 : a470581b1f35f100 x7 : 0000000000015ab9 x6 : ffff8000803a03c8 [ 1282.371228][ T3623] x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000803915d0 [ 1282.372432][ T3623] x2 : 0000000000000002 x1 : 0000000100000000 x0 : 000000000000003e [ 1282.373826][ T3623] Call trace: [ 1282.374489][ T3623] kvm_s2_put_page+0x374/0x3a0 (P) [ 1282.375444][ T3623] stage2_free_walker+0xdc/0x264 [ 1282.376362][ T3623] __kvm_pgtable_walk+0x7d8/0xa68 [ 1282.377280][ T3623] kvm_pgtable_walk+0x294/0x468 [ 1282.378223][ T3623] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1282.379252][ T3623] kvm_free_stage2_pgd+0x198/0x28c [ 1282.380145][ T3623] kvm_uninit_stage2_mmu+0x20/0x38 [ 1282.381037][ T3623] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1282.382011][ T3623] kvm_mmu_notifier_release+0x48/0xa8 [ 1282.382939][ T3623] mmu_notifier_unregister+0x128/0x42c [ 1282.383846][ T3623] kvm_put_kvm+0x6a0/0xfa8 [ 1282.384530][ T3623] kvm_vm_release+0x58/0x78 [ 1282.385374][ T3623] __fput+0x4ac/0x980 [ 1282.386154][ T3623] ____fput+0x20/0x58 [ 1282.386917][ T3623] task_work_run+0x1bc/0x254 [ 1282.387741][ T3623] do_notify_resume+0x1bc/0x270 [ 1282.388605][ T3623] el0_svc+0xb8/0x164 [ 1282.389388][ T3623] el0t_64_sync_handler+0x84/0x12c [ 1282.390267][ T3623] el0t_64_sync+0x198/0x19c [ 1282.391582][ T3623] Code: f00375a1 912ec421 aa1303e0 97f9c9f2 (d4210000) [ 1282.393331][ T3623] ---[ end trace 0000000000000000 ]--- [ 1282.394929][ T3623] Kernel panic - not syncing: Oops - BUG: Fatal exception [ 1282.397014][ T3623] Kernel Offset: disabled [ 1282.397762][ T3623] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1282.398859][ T3623] Memory Limit: none [ 1282.400509][ T3623] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:42:44 Registers: info registers vcpu 0 CPU#0 PC=ffff8000821291c0 X00=0000000000000003 X01=0000000000000002 X02=0000000000000001 X03=ffff800082128fb4 X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081f100b4 X08=26ff80008c43b000 X09=0000000000000061 X10=0000000000000061 X11=00000000000000fe X12=0000000000000002 X13=0000000000000002 X14=0000000000000000 X15=00000000000001da X16=0000000000000036 X17=0000000000000000 X18=0000000001787c00 X19=efff800000000000 X20=7bf000000dcb0880 X21=26ff80008c43b018 X22=0000000000000002 X23=7bf000000dcb097c X24=000000000000007b X25=0000000000000000 X26=26ff80008c43b000 X27=000000000000007b X28=000000000000007b X29=ffff80008c477b40 X30=ffff8000821291b4 SP=ffff80008c477b30 PSTATE=814020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=6572207265767265:730073250a0d0a0d Z02=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z03=0000000000000000:00ff00ff00000000 Z04=0000000000000000:000000000f0f0000 Z05=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z06=203a29315f657661:6c735f646e6f6220 Z07=206e612073612067:6e6976616c736e45 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffd0f8d4f0:0000ffffd0f8d4f0 Z17=ffffff80ffffffd8:0000ffffd0f8d4c0 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000