[ 410.918181][ T3143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.679132][ T3143] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:52688' (ED25519) to the list of known hosts. [ 909.307156][ T25] audit: type=1400 audit(908.460:60): avc: denied { execute } for pid=3317 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 909.335468][ T25] audit: type=1400 audit(908.480:61): avc: denied { execute_no_trans } for pid=3317 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:16:01 parsed 1 programs [ 961.962496][ T25] audit: type=1400 audit(961.110:62): avc: denied { node_bind } for pid=3317 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 983.767528][ T25] audit: type=1400 audit(982.920:63): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 983.803850][ T25] audit: type=1400 audit(982.940:64): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 983.887607][ T3326] cgroup: Unknown subsys name 'net' [ 983.936626][ T25] audit: type=1400 audit(983.090:65): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 984.368005][ T3326] cgroup: Unknown subsys name 'cpuset' [ 984.471698][ T3326] cgroup: Unknown subsys name 'rlimit' [ 985.868925][ T25] audit: type=1400 audit(985.020:66): avc: denied { setattr } for pid=3326 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 985.889685][ T25] audit: type=1400 audit(985.040:67): avc: denied { create } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 985.916711][ T25] audit: type=1400 audit(985.070:68): avc: denied { write } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 985.939445][ T25] audit: type=1400 audit(985.090:69): avc: denied { module_request } for pid=3326 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 986.486378][ T25] audit: type=1400 audit(985.630:70): avc: denied { read } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 986.541925][ T25] audit: type=1400 audit(985.690:71): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 986.561920][ T25] audit: type=1400 audit(985.710:72): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 987.858925][ T3330] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 988.095953][ T3326] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 1017.065054][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 1017.076768][ T25] audit: type=1400 audit(1016.210:77): avc: denied { execmem } for pid=3331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1019.097635][ T25] audit: type=1400 audit(1018.250:78): avc: denied { read } for pid=3332 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1019.116574][ T25] audit: type=1400 audit(1018.260:79): avc: denied { open } for pid=3332 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1019.157438][ T25] audit: type=1400 audit(1018.310:80): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1020.249689][ T25] audit: type=1400 audit(1019.390:81): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1020.299472][ T25] audit: type=1400 audit(1019.450:82): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.lkbolC/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1020.347385][ T25] audit: type=1400 audit(1019.500:83): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1020.425685][ T25] audit: type=1400 audit(1019.570:84): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.lkbolC/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1020.466071][ T25] audit: type=1400 audit(1019.610:85): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.lkbolC/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1020.579081][ T25] audit: type=1400 audit(1019.730:86): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1021.037854][ T3332] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1042.532081][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1042.559222][ T25] audit: type=1400 audit(1041.680:95): avc: denied { sys_module } for pid=3346 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1054.604637][ T3346] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1054.675010][ T3346] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1065.247050][ T3346] hsr_slave_0: entered promiscuous mode [ 1065.277537][ T3346] hsr_slave_1: entered promiscuous mode [ 1069.319450][ T3346] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1069.510852][ T3346] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1069.699338][ T3346] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1069.919814][ T3346] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1081.786009][ T3346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1106.360643][ T3346] veth0_vlan: entered promiscuous mode [ 1106.580550][ T3346] veth1_vlan: entered promiscuous mode [ 1107.635504][ T3346] veth0_macvtap: entered promiscuous mode [ 1107.783301][ T3346] veth1_macvtap: entered promiscuous mode [ 1108.995916][ T35] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1109.017349][ T35] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1109.035088][ T35] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1109.036225][ T35] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1115.001710][ T3383] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1115.827670][ T25] audit: type=1400 audit(1114.970:96): avc: denied { create } for pid=3434 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1116.159352][ T3383] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1116.766475][ T3383] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1117.832106][ T3383] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1127.890853][ T3383] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1127.986218][ T3383] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1128.040401][ T3383] bond0 (unregistering): Released all slaves [ 1129.208641][ T3383] hsr_slave_0: left promiscuous mode [ 1129.414914][ T3383] hsr_slave_1: left promiscuous mode [ 1129.890708][ T3383] veth1_macvtap: left promiscuous mode [ 1129.906866][ T3383] veth0_macvtap: left promiscuous mode [ 1129.927440][ T3383] veth1_vlan: left promiscuous mode [ 1129.936663][ T3383] veth0_vlan: left promiscuous mode [ 1187.070459][ T25] audit: type=1401 audit(1186.220:97): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1242.784473][ T25] audit: type=1400 audit(1241.930:98): avc: denied { create } for pid=3521 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1243.466617][ T25] audit: type=1400 audit(1242.610:99): avc: denied { sys_admin } for pid=3521 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1251.784789][ T25] audit: type=1400 audit(1250.910:100): avc: denied { sys_chroot } for pid=3523 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 1970/01/01 00:21:18 executed programs: 0 [ 1299.142344][ T3550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1299.226203][ T3550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1306.337886][ T3550] hsr_slave_0: entered promiscuous mode [ 1306.362212][ T3550] hsr_slave_1: entered promiscuous mode [ 1310.560949][ T3550] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1310.718443][ T3550] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1310.835629][ T3550] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1310.932147][ T3550] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1321.577749][ T3550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1351.941748][ T3550] veth0_vlan: entered promiscuous mode [ 1352.196186][ T3550] veth1_vlan: entered promiscuous mode [ 1353.311847][ T3550] veth0_macvtap: entered promiscuous mode [ 1353.472155][ T3550] veth1_macvtap: entered promiscuous mode [ 1354.864265][ T3391] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1354.868383][ T3391] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1354.933772][ T3383] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1354.945279][ T3383] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:22:36 executed programs: 2 [ 1358.204253][ T25] audit: type=1400 audit(1357.340:101): avc: denied { read } for pid=3622 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1358.244235][ T25] audit: type=1400 audit(1357.390:102): avc: denied { open } for pid=3622 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1358.282450][ T25] audit: type=1400 audit(1357.430:103): avc: denied { ioctl } for pid=3622 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1359.729758][ T3622] ================================================================== [ 1359.730336][ T3622] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1359.732063][ T3622] Read of size 8 at addr def000001eccf000 by task syz.2.17/3622 [ 1359.732312][ T3622] Pointer tag: [de], memory tag: [fe] [ 1359.732431][ T3622] [ 1359.733431][ T3622] CPU: 0 UID: 0 PID: 3622 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1359.733960][ T3622] Hardware name: linux,dummy-virt (DT) [ 1359.734439][ T3622] Call trace: [ 1359.734806][ T3622] show_stack+0x2c/0x3c (C) [ 1359.735434][ T3622] __dump_stack+0x30/0x40 [ 1359.735697][ T3622] dump_stack_lvl+0xd8/0x12c [ 1359.735903][ T3622] print_address_description+0xac/0x288 [ 1359.736214][ T3622] print_report+0x84/0xa0 [ 1359.736479][ T3622] kasan_report+0xb0/0x110 [ 1359.736727][ T3622] kasan_tag_mismatch+0x28/0x3c [ 1359.736972][ T3622] __hwasan_tag_mismatch+0x30/0x60 [ 1359.737301][ T3622] __kvm_pgtable_walk+0x8e4/0xa68 [ 1359.737591][ T3622] kvm_pgtable_walk+0x294/0x468 [ 1359.737866][ T3622] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1359.738188][ T3622] kvm_free_stage2_pgd+0x198/0x28c [ 1359.738475][ T3622] kvm_uninit_stage2_mmu+0x20/0x38 [ 1359.738752][ T3622] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1359.739060][ T3622] kvm_mmu_notifier_release+0x48/0xa8 [ 1359.739352][ T3622] mmu_notifier_unregister+0x128/0x42c [ 1359.739620][ T3622] kvm_put_kvm+0x6a0/0xfa8 [ 1359.739820][ T3622] kvm_vm_release+0x58/0x78 [ 1359.740087][ T3622] __fput+0x4ac/0x980 [ 1359.740293][ T3622] ____fput+0x20/0x58 [ 1359.740487][ T3622] task_work_run+0x1bc/0x254 [ 1359.740734][ T3622] do_notify_resume+0x1bc/0x270 [ 1359.740991][ T3622] el0_svc+0xb8/0x164 [ 1359.741286][ T3622] el0t_64_sync_handler+0x84/0x12c [ 1359.741551][ T3622] el0t_64_sync+0x198/0x19c [ 1359.742052][ T3622] [ 1359.742230][ T3622] The buggy address belongs to the physical page: [ 1359.743407][ T3622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5eccf [ 1359.743764][ T3622] flags: 0x1ffc84000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x21) [ 1359.744936][ T3622] raw: 01ffc84000000000 ffffc1ffc07b3308 ffffc1ffc07b2088 0000000000000000 [ 1359.745203][ T3622] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1359.745410][ T3622] page dumped because: kasan: bad access detected [ 1359.745537][ T3622] [ 1359.745626][ T3622] Memory state around the buggy address: [ 1359.745963][ T3622] fff000001eccee00: 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 [ 1359.746180][ T3622] fff000001eccef00: 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 [ 1359.746370][ T3622] >fff000001eccf000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1359.746508][ T3622] ^ [ 1359.746741][ T3622] fff000001eccf100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1359.746915][ T3622] fff000001eccf200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1359.747126][ T3622] ================================================================== [ 1360.008448][ T3622] Disabling lock debugging due to kernel taint [ 1360.021842][ T3622] Unable to handle kernel paging request at virtual address fffee72652b20300 [ 1360.064912][ T3622] KASAN: probably wild-memory-access in range [0xfff672652b203000-0xfff672652b20300f] [ 1360.065676][ T3622] Mem abort info: [ 1360.065967][ T3622] ESR = 0x0000000096000004 [ 1360.066320][ T3622] EC = 0x25: DABT (current EL), IL = 32 bits [ 1360.066639][ T3622] SET = 0, FnV = 0 [ 1360.066901][ T3622] EA = 0, S1PTW = 0 [ 1360.067194][ T3622] FSC = 0x04: level 0 translation fault [ 1360.067518][ T3622] Data abort info: [ 1360.067762][ T3622] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1360.068094][ T3622] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1360.068423][ T3622] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1360.068932][ T3622] swapper pgtable: 4k pages, 52-bit VAs, pgdp=000000004769a000 [ 1360.069354][ T3622] [fffee72652b20300] pgd=0000000047ee1003, p4d=0000000000000000 [ 1360.070901][ T3622] Internal error: Oops: 0000000096000004 [#1] SMP [ 1360.086199][ T3622] Modules linked in: [ 1360.088066][ T3622] CPU: 0 UID: 0 PID: 3622 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1360.089768][ T3622] Tainted: [B]=BAD_PAGE [ 1360.090535][ T3622] Hardware name: linux,dummy-virt (DT) [ 1360.091690][ T3622] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1360.092994][ T3622] pc : __kvm_pgtable_walk+0x268/0xa68 [ 1360.094090][ T3622] lr : __kvm_pgtable_walk+0x214/0xa68 [ 1360.095177][ T3622] sp : ffff80008e5776d0 [ 1360.095955][ T3622] x29: ffff80008e577770 x28: 0000000000000005 x27: fff672652b203000 [ 1360.097751][ T3622] x26: fff672652b203000 x25: 0000000000000000 x24: 0000000000000002 [ 1360.099234][ T3622] x23: 00000000000000ff x22: efff800000000000 x21: ffff80008e5779d8 [ 1360.100763][ T3622] x20: 00000000000000ff x19: 00000000000000ff x18: 0000000000001b80 [ 1360.102358][ T3622] x17: 00000000050334fc x16: 00000000cecddeb9 x15: fff0000072d85404 [ 1360.103779][ T3622] x14: 00000000000000ff x13: ffff80008e5779e0 x12: ffff80008e5779e8 [ 1360.105357][ T3622] x11: ffff80008e5779e8 x10: 0000000000ff0100 x9 : ffff80008e577728 [ 1360.106959][ T3622] x8 : 0fff672652b20300 x7 : ffff800080bc7858 x6 : 0000000000000000 [ 1360.108457][ T3622] x5 : 0000000000000000 x4 : 00000000000000ff x3 : 0000000000000002 [ 1360.109960][ T3622] x2 : fff672652b203000 x1 : 0000000000000000 x0 : 0000000000000000 [ 1360.111437][ T3622] Call trace: [ 1360.112192][ T3622] __kvm_pgtable_walk+0x268/0xa68 (P) [ 1360.113330][ T3622] __kvm_pgtable_walk+0x600/0xa68 [ 1360.114371][ T3622] __kvm_pgtable_walk+0x600/0xa68 [ 1360.115392][ T3622] kvm_pgtable_walk+0x294/0x468 [ 1360.116392][ T3622] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1360.117573][ T3622] kvm_free_stage2_pgd+0x198/0x28c [ 1360.118567][ T3622] kvm_uninit_stage2_mmu+0x20/0x38 [ 1360.119629][ T3622] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1360.120744][ T3622] kvm_mmu_notifier_release+0x48/0xa8 [ 1360.121813][ T3622] mmu_notifier_unregister+0x128/0x42c [ 1360.122902][ T3622] kvm_put_kvm+0x6a0/0xfa8 [ 1360.123803][ T3622] kvm_vm_release+0x58/0x78 [ 1360.124814][ T3622] __fput+0x4ac/0x980 [ 1360.125681][ T3622] ____fput+0x20/0x58 [ 1360.126512][ T3622] task_work_run+0x1bc/0x254 [ 1360.127414][ T3622] do_notify_resume+0x1bc/0x270 [ 1360.128400][ T3622] el0_svc+0xb8/0x164 [ 1360.129360][ T3622] el0t_64_sync_handler+0x84/0x12c [ 1360.130414][ T3622] el0t_64_sync+0x198/0x19c [ 1360.131744][ T3622] Code: f94023ec f9400fed a9017d3f f800813f (38686ac8) [ 1360.133633][ T3622] ---[ end trace 0000000000000000 ]--- [ 1360.135333][ T3622] Kernel panic - not syncing: Oops: Fatal exception [ 1360.137419][ T3622] Kernel Offset: disabled [ 1360.138220][ T3622] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1360.139423][ T3622] Memory Limit: none [ 1360.141153][ T3622] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:09:42 Registers: info registers vcpu 0 CPU#0 PC=ffff80008069546c X00=ffff80008c487c78 X01=ffff80008c488000 X02=0000000000000010 X03=0000000000000010 X04=0000000000000000 X05=0000000000000000 X06=0000000000000000 X07=ffff80008048b334 X08=b7f000000d9b9d80 X09=0000000000000000 X10=0000000000ff0100 X11=ffff800087f83a20 X12=fff000000d9b9d88 X13=0000000000000000 X14=1ef000000d3d1c00 X15=0000000000000000 X16=00000000000000ff X17=00000000000000fe X18=0000008a846ae2b2 X19=ffff80008c487c78 X20=efff800000000000 X21=00000000000000b7 X22=00000000000000b7 X23=0000000000000000 X24=ffff8000800e8e40 X25=ffff80008c487bb8 X26=b7f000000d9b9d80 X27=b7f000000d9bb370 X28=b7f000000d9b9d98 X29=ffff80008c487b20 X30=ffff8000800e2fac SP=ffff80008c487b20 PSTATE=814020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000010 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0000000000000000:0000000000000004 Z01=f28b57aed62e75a3:e0e44c3d2f7255eb Z02=ff96fc5f12f0092d:6c1409f7598f70a3 Z03=22983781377f58a1:6acdb56ec63f43a3 Z04=b2c890d2a9039073:a15333e18bbee6e5 Z05=e972e5ffac6b96b4:46e317d4bd1573c9 Z06=b20155023eb73b99:2f2e7b214ffb2daf Z07=370add816446f3a4:79c5467bb5d950fe Z08=01940e78ccba6fd7:0c20d4f6d823fd35 Z09=d6b4ace9812602c2:bab2e9923e6116e5 Z10=de6615cbd3ed87f4:99487676fcbb351a Z11=13e8a5cdd619c080:38999881bfa7e955 Z12=cbd3d3558a3821ce:c53c334cc2749ea6 Z13=02fa4f5d79b21bb9:378399d245a0650e Z14=3ae241937045c4b0:bf3d263328cd68d0 Z15=67140ad2df44086d:7a2bf506debfedb6 Z16=0000000000000000:0000000000000000 Z17=0000000000000000:0000000000000000 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=1838e77b1838e77b:1838e77b1838e77b Z21=a5cbe648a5cbe648:a5cbe648a5cbe648 Z22=02a73da802a73da8:02a73da802a73da8 Z23=1aeea6fe1aeea6fe:1aeea6fe1aeea6fe Z24=4f67bf784f67bf78:4f67bf784f67bf78 Z25=7a26d2bb7a26d2bb:7a26d2bb7a26d2bb Z26=ca4a5aa8ca4a5aa8:ca4a5aa8ca4a5aa8 Z27=8aa4de808aa4de80:8aa4de808aa4de80 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=af351f52f1219551:cd123498d4e70bfe Z31=0e0d0c0f0a09080b:0605040702010003