[ 387.909923][ T3151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.368757][ T3151] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:19705' (ED25519) to the list of known hosts. [ 872.141209][ T25] audit: type=1400 audit(871.330:60): avc: denied { execute } for pid=3318 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 872.167726][ T25] audit: type=1400 audit(871.360:61): avc: denied { execute_no_trans } for pid=3318 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:15:22 parsed 1 programs [ 923.738398][ T25] audit: type=1400 audit(922.920:62): avc: denied { node_bind } for pid=3318 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 946.910216][ T25] audit: type=1400 audit(946.100:63): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 946.966597][ T25] audit: type=1400 audit(946.140:64): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 947.120949][ T3326] cgroup: Unknown subsys name 'net' [ 947.221798][ T25] audit: type=1400 audit(946.410:65): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 947.846139][ T3326] cgroup: Unknown subsys name 'cpuset' [ 948.040167][ T3326] cgroup: Unknown subsys name 'rlimit' [ 949.819794][ T25] audit: type=1400 audit(949.010:66): avc: denied { setattr } for pid=3326 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 949.850230][ T25] audit: type=1400 audit(949.040:67): avc: denied { create } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 949.876202][ T25] audit: type=1400 audit(949.060:68): avc: denied { write } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 949.899409][ T25] audit: type=1400 audit(949.080:69): avc: denied { module_request } for pid=3326 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 950.420073][ T25] audit: type=1400 audit(949.600:70): avc: denied { read } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 950.486796][ T25] audit: type=1400 audit(949.660:71): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 950.499991][ T25] audit: type=1400 audit(949.670:72): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 951.716451][ T3330] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 951.939907][ T3326] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 975.458257][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 975.465590][ T25] audit: type=1400 audit(974.650:77): avc: denied { execmem } for pid=3331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 975.788569][ T25] audit: type=1400 audit(974.980:78): avc: denied { read } for pid=3332 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 975.818487][ T25] audit: type=1400 audit(975.010:79): avc: denied { open } for pid=3332 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 975.914722][ T25] audit: type=1400 audit(975.100:80): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 977.619715][ T25] audit: type=1400 audit(976.810:81): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 977.666804][ T25] audit: type=1400 audit(976.860:82): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.9wfA0l/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 977.716305][ T25] audit: type=1400 audit(976.900:83): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 977.788970][ T25] audit: type=1400 audit(976.980:84): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.9wfA0l/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 977.844142][ T25] audit: type=1400 audit(977.030:85): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.9wfA0l/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2931 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 977.955906][ T25] audit: type=1400 audit(977.140:86): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 978.377156][ T3332] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1019.916618][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1019.921895][ T25] audit: type=1401 audit(1019.100:95): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1036.281073][ T25] audit: type=1400 audit(1035.460:96): avc: denied { create } for pid=3366 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1036.464962][ T25] audit: type=1400 audit(1035.620:97): avc: denied { sys_admin } for pid=3366 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1038.609723][ T25] audit: type=1400 audit(1037.800:98): avc: denied { sys_chroot } for pid=3367 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1046.655230][ T25] audit: type=1400 audit(1045.810:99): avc: denied { create } for pid=3376 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1068.178981][ T25] audit: type=1400 audit(1067.370:100): avc: denied { sys_module } for pid=3394 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1084.728222][ T3394] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1084.795724][ T3394] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1090.697181][ T3394] hsr_slave_0: entered promiscuous mode [ 1090.725376][ T3394] hsr_slave_1: entered promiscuous mode [ 1094.480485][ T3394] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1094.627066][ T3394] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1094.714761][ T3394] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1094.799230][ T3394] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1101.478452][ T3394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1124.757241][ T3394] veth0_vlan: entered promiscuous mode [ 1124.965690][ T3394] veth1_vlan: entered promiscuous mode [ 1126.394003][ T3394] veth0_macvtap: entered promiscuous mode [ 1126.624360][ T3394] veth1_macvtap: entered promiscuous mode [ 1128.369014][ T3378] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1128.424600][ T3378] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1128.433931][ T3378] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1128.437718][ T3378] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1135.184400][ T3378] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1136.316856][ T3378] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1137.014947][ T3378] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1137.705425][ T3378] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1150.655422][ T3378] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1150.737978][ T3378] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1150.791175][ T3378] bond0 (unregistering): Released all slaves [ 1151.940473][ T3378] hsr_slave_0: left promiscuous mode [ 1151.967074][ T3378] hsr_slave_1: left promiscuous mode [ 1152.115304][ T3378] veth1_macvtap: left promiscuous mode [ 1152.119256][ T3378] veth0_macvtap: left promiscuous mode [ 1152.131683][ T3378] veth1_vlan: left promiscuous mode [ 1152.136958][ T3378] veth0_vlan: left promiscuous mode 1970/01/01 00:19:40 executed programs: 0 [ 1220.080742][ T3499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1220.218130][ T3499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1234.698321][ T3499] hsr_slave_0: entered promiscuous mode [ 1234.744974][ T3499] hsr_slave_1: entered promiscuous mode [ 1247.888857][ T3499] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1248.148428][ T3499] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1248.398922][ T3499] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1248.649025][ T3499] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1266.299881][ T3499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1313.869515][ T3499] veth0_vlan: entered promiscuous mode [ 1314.398714][ T3499] veth1_vlan: entered promiscuous mode [ 1316.469053][ T3499] veth0_macvtap: entered promiscuous mode [ 1316.797277][ T3499] veth1_macvtap: entered promiscuous mode [ 1319.188345][ T3401] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1319.205440][ T3401] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1319.253250][ T3401] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1319.257708][ T3401] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:22:02 executed programs: 2 [ 1324.123647][ T25] audit: type=1400 audit(1323.310:101): avc: denied { read } for pid=3645 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1324.207985][ T25] audit: type=1400 audit(1323.350:102): avc: denied { open } for pid=3645 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1324.285666][ T25] audit: type=1400 audit(1323.420:103): avc: denied { ioctl } for pid=3645 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1326.667973][ T3645] ================================================================== [ 1326.668571][ T3645] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1326.670282][ T3645] Read of size 8 at addr 8bf0000011b1a000 by task syz.2.17/3645 [ 1326.670540][ T3645] Pointer tag: [8b], memory tag: [fe] [ 1326.670660][ T3645] [ 1326.671639][ T3645] CPU: 0 UID: 0 PID: 3645 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1326.672242][ T3645] Hardware name: linux,dummy-virt (DT) [ 1326.672712][ T3645] Call trace: [ 1326.673107][ T3645] show_stack+0x2c/0x3c (C) [ 1326.673746][ T3645] __dump_stack+0x30/0x40 [ 1326.674019][ T3645] dump_stack_lvl+0xd8/0x12c [ 1326.674221][ T3645] print_address_description+0xac/0x288 [ 1326.674521][ T3645] print_report+0x84/0xa0 [ 1326.674770][ T3645] kasan_report+0xb0/0x110 [ 1326.675015][ T3645] kasan_tag_mismatch+0x28/0x3c [ 1326.675272][ T3645] __hwasan_tag_mismatch+0x30/0x60 [ 1326.675516][ T3645] __kvm_pgtable_walk+0x8e4/0xa68 [ 1326.675789][ T3645] kvm_pgtable_walk+0x294/0x468 [ 1326.676045][ T3645] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1326.676325][ T3645] kvm_free_stage2_pgd+0x198/0x28c [ 1326.676612][ T3645] kvm_uninit_stage2_mmu+0x20/0x38 [ 1326.676867][ T3645] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1326.677173][ T3645] kvm_mmu_notifier_release+0x48/0xa8 [ 1326.677461][ T3645] mmu_notifier_unregister+0x128/0x42c [ 1326.677746][ T3645] kvm_put_kvm+0x6a0/0xfa8 [ 1326.677933][ T3645] kvm_vm_release+0x58/0x78 [ 1326.678163][ T3645] __fput+0x4ac/0x980 [ 1326.678388][ T3645] ____fput+0x20/0x58 [ 1326.678625][ T3645] task_work_run+0x1bc/0x254 [ 1326.678831][ T3645] do_notify_resume+0x1bc/0x270 [ 1326.679058][ T3645] el0_svc+0xb8/0x164 [ 1326.679267][ T3645] el0t_64_sync_handler+0x84/0x12c [ 1326.679504][ T3645] el0t_64_sync+0x198/0x19c [ 1326.679980][ T3645] [ 1326.680144][ T3645] The buggy address belongs to the physical page: [ 1326.681269][ T3645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xedf0000011b1a800 pfn:0x51b1a [ 1326.681656][ T3645] flags: 0x1ffdd0000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x74) [ 1326.682828][ T3645] raw: 01ffdd0000000000 ffffc1ffc081d248 ffffc1ffc081cc48 0000000000000000 [ 1326.683061][ T3645] raw: edf0000011b1a800 0000000000000000 00000000ffffffff 0000000000000000 [ 1326.683253][ T3645] page dumped because: kasan: bad access detected [ 1326.683417][ T3645] [ 1326.683522][ T3645] Memory state around the buggy address: [ 1326.683864][ T3645] fff0000011b19e00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1326.684048][ T3645] fff0000011b19f00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1326.684228][ T3645] >fff0000011b1a000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1326.684377][ T3645] ^ [ 1326.684628][ T3645] fff0000011b1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1326.684800][ T3645] fff0000011b1a200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1326.685017][ T3645] ================================================================== [ 1327.037827][ T3645] Disabling lock debugging due to kernel taint [ 1331.929754][ T3645] Unable to handle kernel paging request at virtual address ffffffffc0000000 [ 1331.940587][ T3645] KASAN: probably user-memory-access in range [0x0007fffc00000000-0x0007fffc0000000f] [ 1331.961176][ T25] audit: type=1400 audit(1331.150:104): avc: denied { read } for pid=3110 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1331.978839][ T3645] Mem abort info: [ 1331.985220][ T3645] ESR = 0x0000000096000006 [ 1331.991278][ T25] audit: type=1400 audit(1331.180:105): avc: denied { search } for pid=3110 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1332.010280][ T3645] EC = 0x25: DABT (current EL), IL = 32 bits [ 1332.023042][ T3645] SET = 0, FnV = 0 [ 1332.023647][ T3645] EA = 0, S1PTW = 0 [ 1332.023964][ T3645] FSC = 0x06: level 2 translation fault [ 1332.024285][ T3645] Data abort info: [ 1332.024558][ T3645] ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000 [ 1332.024870][ T3645] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1332.034648][ T25] audit: type=1400 audit(1331.210:106): avc: denied { search } for pid=3110 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1332.043728][ T3645] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1332.046316][ T3645] swapper pgtable: 4k pages, 52-bit VAs, pgdp=000000004769a000 [ 1332.067455][ T3645] [ffffffffc0000000] pgd=100000004c61a003, p4d=0000000047ec3403 [ 1332.085547][ T25] audit: type=1400 audit(1331.260:107): avc: denied { add_name } for pid=3110 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1332.086526][ T25] audit: type=1400 audit(1331.270:108): avc: denied { create } for pid=3110 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1332.087657][ T3645] , pud=0000000047ec4403, pmd=0000000000000000 [ 1332.089436][ T3645] Internal error: Oops: 0000000096000006 [#1] SMP [ 1332.098652][ T3645] Modules linked in: [ 1332.100326][ T3645] CPU: 0 UID: 0 PID: 3645 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1332.101883][ T3645] Tainted: [B]=BAD_PAGE [ 1332.102574][ T3645] Hardware name: linux,dummy-virt (DT) [ 1332.103648][ T3645] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1332.104948][ T3645] pc : __kvm_pgtable_walk+0x27c/0xa68 [ 1332.106005][ T3645] lr : __kvm_pgtable_walk+0x214/0xa68 [ 1332.107024][ T3645] sp : ffff80008e8977d0 [ 1332.107789][ T3645] x29: ffff80008e897870 x28: 0000000000000005 x27: ffffffffc0000000 [ 1332.109458][ T3645] x26: ffffffffc0000000 x25: 0000000000000000 x24: 0000000000000001 [ 1332.110839][ T3645] x23: 00000000000000ff x22: efff800000000000 x21: ffff80008e8979d8 [ 1332.112178][ T3645] x20: 00000000000000ff x19: 00000000000000ff x18: 0000000000001b80 [ 1332.113615][ T3645] x17: 000000000000008b x16: 000000000000005f x15: fff0000072d86404 [ 1332.114864][ T3645] x14: 0000000000000000 x13: ffff80008e8979e0 x12: ffff80008e8979e8 [ 1332.116198][ T3645] x11: ffff80008e8979e8 x10: 0000000000ff0100 x9 : ffff80008e897828 [ 1332.117732][ T3645] x8 : 00000000000000fe x7 : ffff800080bd42fc x6 : 0000000000000000 [ 1332.119112][ T3645] x5 : 0000000000000000 x4 : 00000000000000ff x3 : 0000000000000001 [ 1332.120462][ T3645] x2 : ffffffffc0000000 x1 : 0000000000000000 x0 : 0000000000000000 [ 1332.121927][ T3645] Call trace: [ 1332.122638][ T3645] __kvm_pgtable_walk+0x27c/0xa68 (P) [ 1332.123655][ T3645] __kvm_pgtable_walk+0x600/0xa68 [ 1332.124628][ T3645] kvm_pgtable_walk+0x294/0x468 [ 1332.125602][ T3645] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1332.126651][ T3645] kvm_free_stage2_pgd+0x198/0x28c [ 1332.127618][ T3645] kvm_uninit_stage2_mmu+0x20/0x38 [ 1332.128575][ T3645] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1332.129611][ T3645] kvm_mmu_notifier_release+0x48/0xa8 [ 1332.130605][ T3645] mmu_notifier_unregister+0x128/0x42c [ 1332.131596][ T3645] kvm_put_kvm+0x6a0/0xfa8 [ 1332.132427][ T3645] kvm_vm_release+0x58/0x78 [ 1332.133356][ T3645] __fput+0x4ac/0x980 [ 1332.134167][ T3645] ____fput+0x20/0x58 [ 1332.134997][ T3645] task_work_run+0x1bc/0x254 [ 1332.135876][ T3645] do_notify_resume+0x1bc/0x270 [ 1332.136818][ T3645] el0_svc+0xb8/0x164 [ 1332.137673][ T3645] el0t_64_sync_handler+0x84/0x12c [ 1332.138619][ T3645] el0t_64_sync+0x198/0x19c [ 1332.140016][ T3645] Code: 6b08027f 54000060 7103fe7f 54003321 (f9400348) [ 1332.141846][ T3645] ---[ end trace 0000000000000000 ]--- [ 1332.143427][ T3645] Kernel panic - not syncing: Oops: Fatal exception [ 1332.145428][ T3645] Kernel Offset: disabled [ 1332.146158][ T3645] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1332.147285][ T3645] Memory Limit: none [ 1332.148989][ T3645] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:21:26 Registers: info registers vcpu 0 CPU#0 PC=ffff8000821288b8 X00=0000000000000003 X01=0000000000000002 X02=0000000000000001 X03=ffff8000821287b4 X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081f0f8b4 X08=ebf000000d9b9d80 X09=0000000000000000 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000002 X13=0000000000000002 X14=0000000000000000 X15=00000000000002d0 X16=00000000000000eb X17=0000000000000000 X18=0000000001b9e800 X19=efff800000000000 X20=48f000000dcb0880 X21=61ff80008c43b018 X22=0000000000000002 X23=48f000000dcb097c X24=0000000000000048 X25=48f000000dcb0ac8 X26=48f000000dcb08c8 X27=0000000000000048 X28=0000000000000048 X29=ffff80008c477b40 X30=ffff8000821288b8 SP=ffff80008c477b30 PSTATE=804020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000010 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0000000000000000:3fd0000000000000 Z01=0000000000000000:3fd5e25937181be6 Z02=0000000000000000:41c6e140f0000000 Z03=0000000000000000:40c3880000000000 Z04=0000000000000000:bff0000000000000 Z05=0000000000000000:bfd3333333333333 Z06=72a2e0ae86bd16f6:9e12071cb7dc6834 Z07=c2cbe5f57299fd8a:bd109a4e3f64f256 Z08=58e903c04620e4b6:72e0e5437d337ce8 Z09=2f7741f8ee516320:9f949ef9b9d36659 Z10=84fb4e3d6b4251e0:91c1daf8a42dc964 Z11=ed3208f2d2b08e07:6874c4fd699e1519 Z12=1daa1c84b6ebcb7f:1d14bfe5e2497eff Z13=8300bd54206c640e:e14bd2530240d68b Z14=2dc48797aebc6128:9f274f20f9878a88 Z15=33913f9122a41d78:184f99f112fe8f9c Z16=0000000000000000:dee441d6ca734a96 Z17=0000000000000000:8f1bbcdc8f1bbcdc Z18=0000000000000000:ca62c1d6ca62c1d6 Z19=0000000000000000:6ed9eba15a827999 Z20=947a1a91947a1a91:947a1a91947a1a91 Z21=223e2a7c223e2a7c:223e2a7c223e2a7c Z22=555b602d555b602d:555b602d555b602d Z23=65ec6e5365ec6e53:65ec6e5365ec6e53 Z24=c77af40ac77af40a:c77af40ac77af40a Z25=402fb878402fb878:402fb878402fb878 Z26=f332d67ef332d67e:f332d67ef332d67e Z27=12a59f8912a59f89:12a59f8912a59f89 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000014:0ce4a12d6d2315d8 Z31=0e0d0c0f0a09080b:0605040702010003