[ 376.390575][ T3152] 8021q: adding VLAN 0 to HW filter on device bond0 [ 410.265447][ T3152] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:52656' (ED25519) to the list of known hosts. [ 871.694091][ T25] audit: type=1400 audit(870.910:60): avc: denied { execute } for pid=3323 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 871.723206][ T25] audit: type=1400 audit(870.930:61): avc: denied { execute_no_trans } for pid=3323 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:15:20 parsed 1 programs [ 921.835631][ T25] audit: type=1400 audit(921.040:62): avc: denied { node_bind } for pid=3323 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 944.264278][ T25] audit: type=1400 audit(943.480:63): avc: denied { mounton } for pid=3331 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 944.329242][ T25] audit: type=1400 audit(943.520:64): avc: denied { mount } for pid=3331 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 944.469373][ T3331] cgroup: Unknown subsys name 'net' [ 944.572225][ T25] audit: type=1400 audit(943.790:65): avc: denied { unmount } for pid=3331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 945.194305][ T3331] cgroup: Unknown subsys name 'cpuset' [ 945.395054][ T3331] cgroup: Unknown subsys name 'rlimit' [ 947.943678][ T25] audit: type=1400 audit(947.160:66): avc: denied { setattr } for pid=3331 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 947.988748][ T25] audit: type=1400 audit(947.200:67): avc: denied { create } for pid=3331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 948.020636][ T25] audit: type=1400 audit(947.220:68): avc: denied { write } for pid=3331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 948.049312][ T25] audit: type=1400 audit(947.260:69): avc: denied { module_request } for pid=3331 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 949.029989][ T25] audit: type=1400 audit(948.240:70): avc: denied { read } for pid=3331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 949.081939][ T25] audit: type=1400 audit(948.290:71): avc: denied { mounton } for pid=3331 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 949.105515][ T25] audit: type=1400 audit(948.310:72): avc: denied { mount } for pid=3331 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 950.331971][ T3335] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 950.353387][ T25] audit: type=1400 audit(949.560:73): avc: denied { relabelto } for pid=3335 comm="mkswap" name="swap-file" dev="vda" ino=1873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 950.375025][ T25] audit: type=1400 audit(949.590:74): avc: denied { write } for pid=3335 comm="mkswap" path="/swap-file" dev="vda" ino=1873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 950.526151][ T25] audit: type=1400 audit(949.740:75): avc: denied { read } for pid=3331 comm="syz-executor" name="swap-file" dev="vda" ino=1873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 950.546319][ T25] audit: type=1400 audit(949.760:76): avc: denied { open } for pid=3331 comm="syz-executor" path="/swap-file" dev="vda" ino=1873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 950.594061][ T3331] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 975.573744][ T25] audit: type=1400 audit(974.790:77): avc: denied { execmem } for pid=3336 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 975.882062][ T25] audit: type=1400 audit(975.090:78): avc: denied { read } for pid=3337 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 975.914716][ T25] audit: type=1400 audit(975.120:79): avc: denied { open } for pid=3337 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 976.000836][ T25] audit: type=1400 audit(975.200:80): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 977.139042][ T25] audit: type=1400 audit(976.340:81): avc: denied { mount } for pid=3337 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 977.181477][ T25] audit: type=1400 audit(976.390:82): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/syzkaller.q6What/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 977.229310][ T25] audit: type=1400 audit(976.440:83): avc: denied { mount } for pid=3337 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 977.301766][ T25] audit: type=1400 audit(976.520:84): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/syzkaller.q6What/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 977.336833][ T25] audit: type=1400 audit(976.550:85): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/syzkaller.q6What/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2917 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 977.449312][ T25] audit: type=1400 audit(976.660:86): avc: denied { unmount } for pid=3337 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 977.885016][ T3337] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 983.320949][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 983.348066][ T25] audit: type=1400 audit(982.530:95): avc: denied { create } for pid=3341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 983.453591][ T25] audit: type=1400 audit(982.670:96): avc: denied { sys_admin } for pid=3341 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 985.342682][ T25] audit: type=1400 audit(984.560:97): avc: denied { sys_chroot } for pid=3342 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1001.434695][ T25] audit: type=1400 audit(1000.610:98): avc: denied { create } for pid=3356 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1060.122355][ T25] audit: type=1401 audit(1059.330:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1062.886394][ T25] audit: type=1400 audit(1062.100:100): avc: denied { sys_module } for pid=3394 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1078.023588][ T3394] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1078.091477][ T3394] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1083.860055][ T3394] hsr_slave_0: entered promiscuous mode [ 1083.888547][ T3394] hsr_slave_1: entered promiscuous mode [ 1087.773356][ T3394] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1088.015608][ T3394] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1088.246313][ T3394] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1088.470513][ T3394] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1099.693806][ T3394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1122.331957][ T3394] veth0_vlan: entered promiscuous mode [ 1122.535775][ T3394] veth1_vlan: entered promiscuous mode [ 1123.300471][ T3394] veth0_macvtap: entered promiscuous mode [ 1123.534336][ T3394] veth1_macvtap: entered promiscuous mode [ 1124.654595][ T3311] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1124.669263][ T3311] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1124.726824][ T3311] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1124.750294][ T3449] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1131.251433][ T49] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1132.281046][ T49] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1133.036209][ T49] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1133.713524][ T49] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1146.596701][ T49] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1146.686056][ T49] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1146.742580][ T49] bond0 (unregistering): Released all slaves [ 1147.756565][ T49] hsr_slave_0: left promiscuous mode [ 1147.791653][ T49] hsr_slave_1: left promiscuous mode [ 1147.922416][ T49] veth1_macvtap: left promiscuous mode [ 1147.926357][ T49] veth0_macvtap: left promiscuous mode [ 1147.941199][ T49] veth1_vlan: left promiscuous mode [ 1147.945517][ T49] veth0_vlan: left promiscuous mode 1970/01/01 00:19:34 executed programs: 0 [ 1210.740769][ T3504] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1210.870842][ T3504] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1226.570978][ T3504] hsr_slave_0: entered promiscuous mode [ 1226.632715][ T3504] hsr_slave_1: entered promiscuous mode [ 1234.374192][ T3504] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1234.546467][ T3504] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1234.635593][ T3504] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1234.703263][ T3504] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1246.774238][ T3504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1288.636181][ T3504] veth0_vlan: entered promiscuous mode [ 1288.910133][ T3504] veth1_vlan: entered promiscuous mode [ 1289.944812][ T3504] veth0_macvtap: entered promiscuous mode [ 1290.087827][ T3504] veth1_macvtap: entered promiscuous mode [ 1291.251377][ T3449] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1291.259686][ T3449] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1291.314733][ T3449] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1291.321044][ T3449] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1292.639369][ T25] audit: type=1400 audit(1291.820:101): avc: denied { mounton } for pid=3504 comm="syz-executor" path="/syzkaller.1uUt3S/syz-tmp" dev="vda" ino=1889 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1292.854138][ T25] audit: type=1400 audit(1292.060:102): avc: denied { mount } for pid=3504 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 1970/01/01 00:21:32 executed programs: 2 [ 1294.375765][ T25] audit: type=1400 audit(1293.560:103): avc: denied { read } for pid=3630 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1294.431567][ T25] audit: type=1400 audit(1293.630:104): avc: denied { open } for pid=3630 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1294.451396][ T25] audit: type=1400 audit(1293.640:105): avc: denied { ioctl } for pid=3630 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1295.420887][ T3630] ================================================================== [ 1295.421478][ T3630] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1295.423205][ T3630] Read of size 8 at addr 90f00000130fe000 by task syz.2.17/3630 [ 1295.423426][ T3630] Pointer tag: [90], memory tag: [fe] [ 1295.423561][ T3630] [ 1295.424539][ T3630] CPU: 0 UID: 0 PID: 3630 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1295.425089][ T3630] Hardware name: linux,dummy-virt (DT) [ 1295.425571][ T3630] Call trace: [ 1295.425958][ T3630] show_stack+0x2c/0x3c (C) [ 1295.426569][ T3630] __dump_stack+0x30/0x40 [ 1295.426857][ T3630] dump_stack_lvl+0xd8/0x12c [ 1295.427077][ T3630] print_address_description+0xac/0x288 [ 1295.427349][ T3630] print_report+0x84/0xa0 [ 1295.427603][ T3630] kasan_report+0xb0/0x110 [ 1295.427869][ T3630] kasan_tag_mismatch+0x28/0x3c [ 1295.428131][ T3630] __hwasan_tag_mismatch+0x30/0x60 [ 1295.428341][ T3630] __kvm_pgtable_walk+0x8e4/0xa68 [ 1295.428644][ T3630] kvm_pgtable_walk+0x294/0x468 [ 1295.428916][ T3630] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1295.429225][ T3630] kvm_free_stage2_pgd+0x198/0x28c [ 1295.429505][ T3630] kvm_uninit_stage2_mmu+0x20/0x38 [ 1295.429781][ T3630] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1295.430057][ T3630] kvm_mmu_notifier_release+0x48/0xa8 [ 1295.430314][ T3630] mmu_notifier_unregister+0x128/0x42c [ 1295.430606][ T3630] kvm_put_kvm+0x6a0/0xfa8 [ 1295.430805][ T3630] kvm_vm_release+0x58/0x78 [ 1295.431044][ T3630] __fput+0x4ac/0x980 [ 1295.431259][ T3630] ____fput+0x20/0x58 [ 1295.431476][ T3630] task_work_run+0x1bc/0x254 [ 1295.431704][ T3630] do_notify_resume+0x1bc/0x270 [ 1295.431935][ T3630] el0_svc+0xb8/0x164 [ 1295.432143][ T3630] el0t_64_sync_handler+0x84/0x12c [ 1295.432353][ T3630] el0t_64_sync+0x198/0x19c [ 1295.432848][ T3630] [ 1295.433022][ T3630] The buggy address belongs to the physical page: [ 1295.434167][ T3630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x50f00000130ffb80 pfn:0x530fe [ 1295.434543][ T3630] flags: 0x1ffdbc000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x6f) [ 1295.435686][ T3630] raw: 01ffdbc000000000 ffffc1ffc08692c8 ffffc1ffc0869488 0000000000000000 [ 1295.435924][ T3630] raw: 50f00000130ffb80 0000000000000000 00000000ffffffff 0000000000000000 [ 1295.436120][ T3630] page dumped because: kasan: bad access detected [ 1295.436246][ T3630] [ 1295.436339][ T3630] Memory state around the buggy address: [ 1295.436697][ T3630] fff00000130fde00: 4b 4b 4b 4b 4b 4b 4b 4b 4b 4b 4b 4b fe fe fe fe [ 1295.436892][ T3630] fff00000130fdf00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1295.437099][ T3630] >fff00000130fe000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1295.437250][ T3630] ^ [ 1295.437505][ T3630] fff00000130fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1295.437693][ T3630] fff00000130fe200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1295.437899][ T3630] ================================================================== [ 1295.612608][ T3630] Disabling lock debugging due to kernel taint [ 1295.764828][ T3630] Unable to handle kernel paging request at virtual address ffffffffc0000000 [ 1295.800860][ T3630] KASAN: probably user-memory-access in range [0x0007fffc00000000-0x0007fffc0000000f] [ 1295.808312][ T3630] Mem abort info: [ 1295.808778][ T3630] ESR = 0x0000000096000006 [ 1295.809159][ T3630] EC = 0x25: DABT (current EL), IL = 32 bits [ 1295.809474][ T3630] SET = 0, FnV = 0 [ 1295.809757][ T3630] EA = 0, S1PTW = 0 [ 1295.830151][ T3630] FSC = 0x06: level 2 translation fault [ 1295.838749][ T3630] Data abort info: [ 1295.839328][ T3630] ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000 [ 1295.839708][ T3630] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1295.848655][ T3630] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1295.860230][ T25] audit: type=1400 audit(1295.080:106): avc: denied { read } for pid=3111 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1295.868895][ T3630] swapper pgtable: 4k pages, 52-bit VAs, pgdp=000000004769a000 [ 1295.894167][ T3630] [ffffffffc0000000] pgd=100000004c61a003 [ 1295.895234][ T25] audit: type=1400 audit(1295.110:107): avc: denied { search } for pid=3111 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1295.929008][ T3630] , p4d=0000000047ec3403, pud=0000000047ec4403, pmd=0000000000000000 [ 1295.949532][ T3630] Internal error: Oops: 0000000096000006 [#1] SMP [ 1295.952795][ T3630] Modules linked in: [ 1295.954451][ T3630] CPU: 0 UID: 0 PID: 3630 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1295.955995][ T3630] Tainted: [B]=BAD_PAGE [ 1295.956703][ T3630] Hardware name: linux,dummy-virt (DT) [ 1295.957785][ T3630] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1295.959070][ T3630] pc : __kvm_pgtable_walk+0x27c/0xa68 [ 1295.960075][ T3630] lr : __kvm_pgtable_walk+0x214/0xa68 [ 1295.961020][ T3630] sp : ffff80008e8277d0 [ 1295.961760][ T3630] x29: ffff80008e827870 x28: 0000000000000005 x27: ffffffffc0000000 [ 1295.963267][ T3630] x26: ffffffffc0000000 x25: 0000000000000000 x24: 0000000000000001 [ 1295.964608][ T3630] x23: 00000000000000ff x22: efff800000000000 x21: ffff80008e8279d8 [ 1295.965932][ T3630] x20: 00000000000000ff x19: 00000000000000ff x18: 0000000000001b80 [ 1295.967152][ T3630] x17: 0000000000000090 x16: 000000000000000c x15: fff0000072d86404 [ 1295.968550][ T3630] x14: 0000000000000000 x13: ffff80008e8279e0 x12: ffff80008e8279e8 [ 1295.969836][ T3630] x11: ffff80008e8279e8 x10: 0000000000ff0100 x9 : ffff80008e827828 [ 1295.971248][ T3630] x8 : 00000000000000fe x7 : ffff800080bd4afc x6 : 0000000000000000 [ 1295.972538][ T3630] x5 : 0000000000000000 x4 : 00000000000000ff x3 : 0000000000000001 [ 1295.973813][ T3630] x2 : ffffffffc0000000 x1 : 0000000000000000 x0 : 0000000000000000 [ 1295.975188][ T3630] Call trace: [ 1295.975854][ T3630] __kvm_pgtable_walk+0x27c/0xa68 (P) [ 1295.976776][ T3630] __kvm_pgtable_walk+0x600/0xa68 [ 1295.977737][ T3630] kvm_pgtable_walk+0x294/0x468 [ 1295.978631][ T3630] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1295.979649][ T3630] kvm_free_stage2_pgd+0x198/0x28c [ 1295.980589][ T3630] kvm_uninit_stage2_mmu+0x20/0x38 [ 1295.981516][ T3630] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1295.982532][ T3630] kvm_mmu_notifier_release+0x48/0xa8 [ 1295.983356][ T3630] mmu_notifier_unregister+0x128/0x42c [ 1295.984359][ T3630] kvm_put_kvm+0x6a0/0xfa8 [ 1295.985193][ T3630] kvm_vm_release+0x58/0x78 [ 1295.986035][ T3630] __fput+0x4ac/0x980 [ 1295.986802][ T3630] ____fput+0x20/0x58 [ 1295.987587][ T3630] task_work_run+0x1bc/0x254 [ 1295.988400][ T3630] do_notify_resume+0x1bc/0x270 [ 1295.989285][ T3630] el0_svc+0xb8/0x164 [ 1295.990087][ T3630] el0t_64_sync_handler+0x84/0x12c [ 1295.990953][ T3630] el0t_64_sync+0x198/0x19c [ 1295.992302][ T3630] Code: 6b08027f 54000060 7103fe7f 54003321 (f9400348) [ 1295.994041][ T3630] ---[ end trace 0000000000000000 ]--- [ 1295.995607][ T3630] Kernel panic - not syncing: Oops: Fatal exception [ 1295.997504][ T3630] Kernel Offset: disabled [ 1295.998221][ T3630] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1295.999276][ T3630] Memory Limit: none [ 1296.000879][ T3630] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:26:08 Registers: info registers vcpu 0 CPU#0 PC=ffff8000821290b8 X00=0000000000000003 X01=0000000000000002 X02=0000000000000001 X03=ffff800082128fb4 X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081f100b4 X08=87f000000d9b9d80 X09=0000000000000000 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000002 X13=0000000000000002 X14=0000000000000000 X15=000000000000028c X16=0000000000000087 X17=0000000000000000 X18=0000000000671400 X19=efff800000000000 X20=a6f000000dcb0880 X21=d9ff80008c43b018 X22=0000000000000002 X23=a6f000000dcb097c X24=00000000000000a6 X25=a6f000000dcb0ac8 X26=a6f000000dcb08c8 X27=00000000000000a6 X28=00000000000000a6 X29=ffff80008c477b40 X30=ffff8000821290b8 SP=ffff80008c477b30 PSTATE=804020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=6572207265767265:730073250a0d0a0d Z02=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z03=0000000000000000:00ff00ff00000000 Z04=0000000000000000:000000000f0f0000 Z05=3d3d3d3d3d3d3d3d:3d3d3d3d3d3d3d3d Z06=203a29315f657661:6c735f646e6f6220 Z07=206e612073612067:6e6976616c736e45 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffcf3ad190:0000ffffcf3ad190 Z17=ffffff80ffffffd8:0000ffffcf3ad160 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000