[ 372.753762][ T3156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 406.288508][ T3156] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:10337' (ED25519) to the list of known hosts. [ 858.767122][ T25] audit: type=1400 audit(857.960:61): avc: denied { execute } for pid=3320 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 858.794105][ T25] audit: type=1400 audit(857.990:62): avc: denied { execute_no_trans } for pid=3320 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:15:08 parsed 1 programs [ 909.474958][ T25] audit: type=1400 audit(908.670:63): avc: denied { node_bind } for pid=3320 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 929.913114][ T25] audit: type=1400 audit(929.100:64): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 929.946171][ T25] audit: type=1400 audit(929.140:65): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 930.030924][ T3329] cgroup: Unknown subsys name 'net' [ 930.078267][ T25] audit: type=1400 audit(929.270:66): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 930.456387][ T3329] cgroup: Unknown subsys name 'cpuset' [ 930.557105][ T3329] cgroup: Unknown subsys name 'rlimit' [ 931.865446][ T25] audit: type=1400 audit(931.060:67): avc: denied { setattr } for pid=3329 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 931.892831][ T25] audit: type=1400 audit(931.090:68): avc: denied { create } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 931.907639][ T25] audit: type=1400 audit(931.100:69): avc: denied { write } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 931.935164][ T25] audit: type=1400 audit(931.130:70): avc: denied { module_request } for pid=3329 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 932.447309][ T25] audit: type=1400 audit(931.640:71): avc: denied { read } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 932.506845][ T25] audit: type=1400 audit(931.700:72): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 932.543951][ T25] audit: type=1400 audit(931.740:73): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 933.735545][ T3333] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 933.955195][ T3329] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 960.867347][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 960.884051][ T25] audit: type=1400 audit(960.060:78): avc: denied { execmem } for pid=3334 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 963.183546][ T25] audit: type=1400 audit(962.380:79): avc: denied { read } for pid=3335 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 963.201120][ T25] audit: type=1400 audit(962.390:80): avc: denied { open } for pid=3335 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 963.243172][ T25] audit: type=1400 audit(962.440:81): avc: denied { mounton } for pid=3335 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 964.214685][ T25] audit: type=1400 audit(963.410:82): avc: denied { mount } for pid=3335 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 964.258045][ T25] audit: type=1400 audit(963.450:83): avc: denied { mounton } for pid=3335 comm="syz-executor" path="/syzkaller.NQkecj/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 964.307571][ T25] audit: type=1400 audit(963.500:84): avc: denied { mount } for pid=3335 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 964.381304][ T25] audit: type=1400 audit(963.570:85): avc: denied { mounton } for pid=3335 comm="syz-executor" path="/syzkaller.NQkecj/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 964.416964][ T25] audit: type=1400 audit(963.610:86): avc: denied { mounton } for pid=3335 comm="syz-executor" path="/syzkaller.NQkecj/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2899 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 964.525973][ T25] audit: type=1400 audit(963.720:87): avc: denied { unmount } for pid=3335 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 964.982393][ T3335] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 971.726698][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 971.780663][ T25] audit: type=1400 audit(970.920:96): avc: denied { create } for pid=3339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 971.952939][ T25] audit: type=1400 audit(971.110:97): avc: denied { sys_admin } for pid=3339 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 976.095831][ T25] audit: type=1400 audit(975.290:98): avc: denied { sys_chroot } for pid=3340 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 986.450516][ T25] audit: type=1400 audit(985.640:99): avc: denied { sys_module } for pid=3349 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 997.661670][ T3349] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 997.735057][ T3349] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1004.833409][ T3349] hsr_slave_0: entered promiscuous mode [ 1004.876015][ T3349] hsr_slave_1: entered promiscuous mode [ 1011.571197][ T3349] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1011.882373][ T3349] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1012.028037][ T3349] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1012.114469][ T3349] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1018.483699][ T3349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1041.327140][ T3349] veth0_vlan: entered promiscuous mode [ 1041.553924][ T3349] veth1_vlan: entered promiscuous mode [ 1042.517538][ T3349] veth0_macvtap: entered promiscuous mode [ 1042.635762][ T3349] veth1_macvtap: entered promiscuous mode [ 1043.783057][ T3396] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1043.787727][ T3396] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1043.794413][ T3396] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1043.825731][ T3396] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1049.085245][ T42] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1049.948002][ T42] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1050.853155][ T42] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1051.333431][ T42] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1062.243161][ T42] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1062.473602][ T42] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1062.682649][ T42] bond0 (unregistering): Released all slaves [ 1064.441343][ T42] hsr_slave_0: left promiscuous mode [ 1064.571004][ T42] hsr_slave_1: left promiscuous mode [ 1065.183610][ T42] veth1_macvtap: left promiscuous mode [ 1065.201493][ T42] veth0_macvtap: left promiscuous mode [ 1065.222816][ T42] veth1_vlan: left promiscuous mode [ 1065.250778][ T42] veth0_vlan: left promiscuous mode [ 1136.856097][ T25] audit: type=1400 audit(1135.980:100): avc: denied { create } for pid=3491 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1182.152662][ T25] audit: type=1401 audit(1181.340:101): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 1970/01/01 00:20:13 executed programs: 0 [ 1230.544324][ T3555] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1230.624055][ T3555] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1237.336089][ T3555] hsr_slave_0: entered promiscuous mode [ 1237.355150][ T3555] hsr_slave_1: entered promiscuous mode [ 1241.324484][ T3555] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1241.454380][ T3555] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1241.533549][ T3555] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1241.616901][ T3555] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1248.797502][ T3555] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1279.245133][ T3555] veth0_vlan: entered promiscuous mode [ 1279.497462][ T3555] veth1_vlan: entered promiscuous mode [ 1280.484393][ T3555] veth0_macvtap: entered promiscuous mode [ 1280.711464][ T3555] veth1_macvtap: entered promiscuous mode [ 1281.737119][ T3605] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1281.741726][ T3605] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1281.753021][ T3605] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1281.883042][ T3605] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:21:23 executed programs: 2 [ 1284.900464][ T25] audit: type=1400 audit(1284.090:102): avc: denied { read } for pid=3628 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1284.908143][ T25] audit: type=1400 audit(1284.090:103): avc: denied { open } for pid=3628 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1284.975745][ T25] audit: type=1400 audit(1284.150:104): avc: denied { ioctl } for pid=3628 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1286.205691][ T3628] ================================================================== [ 1286.206293][ T3628] BUG: KASAN: invalid-access in __kvm_pgtable_walk+0x8e4/0xa68 [ 1286.208100][ T3628] Read of size 8 at addr 52f0000021fdc000 by task syz.2.17/3628 [ 1286.208350][ T3628] Pointer tag: [52], memory tag: [fe] [ 1286.208474][ T3628] [ 1286.209436][ T3628] CPU: 0 UID: 0 PID: 3628 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1286.209941][ T3628] Hardware name: linux,dummy-virt (DT) [ 1286.210394][ T3628] Call trace: [ 1286.210762][ T3628] show_stack+0x2c/0x3c (C) [ 1286.213191][ T3628] __dump_stack+0x30/0x40 [ 1286.213494][ T3628] dump_stack_lvl+0xd8/0x12c [ 1286.213693][ T3628] print_address_description+0xac/0x288 [ 1286.213945][ T3628] print_report+0x84/0xa0 [ 1286.214182][ T3628] kasan_report+0xb0/0x110 [ 1286.214411][ T3628] kasan_tag_mismatch+0x28/0x3c [ 1286.214640][ T3628] __hwasan_tag_mismatch+0x30/0x60 [ 1286.214914][ T3628] __kvm_pgtable_walk+0x8e4/0xa68 [ 1286.215177][ T3628] kvm_pgtable_walk+0x294/0x468 [ 1286.215445][ T3628] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1286.215721][ T3628] kvm_free_stage2_pgd+0x198/0x28c [ 1286.216000][ T3628] kvm_uninit_stage2_mmu+0x20/0x38 [ 1286.216265][ T3628] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1286.216568][ T3628] kvm_mmu_notifier_release+0x48/0xa8 [ 1286.216825][ T3628] mmu_notifier_unregister+0x128/0x42c [ 1286.217069][ T3628] kvm_put_kvm+0x6a0/0xfa8 [ 1286.217265][ T3628] kvm_vm_release+0x58/0x78 [ 1286.217512][ T3628] __fput+0x4ac/0x980 [ 1286.217701][ T3628] ____fput+0x20/0x58 [ 1286.217883][ T3628] task_work_run+0x1bc/0x254 [ 1286.218084][ T3628] do_notify_resume+0x1bc/0x270 [ 1286.218325][ T3628] el0_svc+0xb8/0x164 [ 1286.218556][ T3628] el0t_64_sync_handler+0x84/0x12c [ 1286.218781][ T3628] el0t_64_sync+0x198/0x19c [ 1286.219275][ T3628] [ 1286.219452][ T3628] The buggy address belongs to the physical page: [ 1286.220589][ T3628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61fdc [ 1286.220948][ T3628] flags: 0x1ffeb4000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0xad) [ 1286.222073][ T3628] raw: 01ffeb4000000000 ffffc1ffc087e548 ffffc1ffc087e788 0000000000000000 [ 1286.222314][ T3628] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1286.222521][ T3628] page dumped because: kasan: bad access detected [ 1286.222644][ T3628] [ 1286.222736][ T3628] Memory state around the buggy address: [ 1286.223068][ T3628] fff0000021fdbe00: 89 89 89 89 89 89 89 89 89 89 89 89 89 89 89 89 [ 1286.223256][ T3628] fff0000021fdbf00: 89 89 89 89 89 89 89 89 89 89 89 89 89 89 89 89 [ 1286.223448][ T3628] >fff0000021fdc000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1286.223579][ T3628] ^ [ 1286.223824][ T3628] fff0000021fdc100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1286.224002][ T3628] fff0000021fdc200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1286.224195][ T3628] ================================================================== [ 1286.408211][ T3628] Disabling lock debugging due to kernel taint [ 1286.415941][ T3628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61fdc [ 1286.430596][ T3628] flags: 0x1ffeb4000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0xad) [ 1286.435199][ T3628] raw: 01ffeb4000000000 ffffc1ffc087e548 fff0000072d7e420 0000000000000000 [ 1286.450822][ T3628] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1286.453862][ T3628] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 1286.462443][ T3628] ------------[ cut here ]------------ [ 1286.462678][ T3628] kernel BUG at ./include/linux/mm.h:1036! [ 1286.463551][ T3628] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 1286.468401][ T3628] Modules linked in: [ 1286.470130][ T3628] CPU: 0 UID: 0 PID: 3628 Comm: syz.2.17 Tainted: G B syzkaller #0 PREEMPT [ 1286.471744][ T3628] Tainted: [B]=BAD_PAGE [ 1286.472462][ T3628] Hardware name: linux,dummy-virt (DT) [ 1286.473537][ T3628] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1286.474831][ T3628] pc : kvm_s2_put_page+0x374/0x3a0 [ 1286.475829][ T3628] lr : kvm_s2_put_page+0x374/0x3a0 [ 1286.476771][ T3628] sp : ffff80008e747830 [ 1286.477458][ T3628] x29: ffff80008e747830 x28: 52f0000021fdc000 x27: 52f0000021fdc000 [ 1286.479030][ T3628] x26: 00000000000000ff x25: ffff800087396000 x24: ffffc1ffc0000000 [ 1286.480396][ T3628] x23: ffffc1ffc087f708 x22: 0000000000000000 x21: ffffc1ffc087f734 [ 1286.481780][ T3628] x20: 0000000000000000 x19: ffffc1ffc087f700 x18: 0000000053055a47 [ 1286.483133][ T3628] x17: 00000000041fd6de x16: 00000000530546bf x15: 000000008a0134c4 [ 1286.484537][ T3628] x14: 0000000000000052 x13: fff0000016c4bb08 x12: 0000000000000001 [ 1286.485820][ T3628] x11: 0000000000000000 x10: 0000000000ff0100 x9 : c138d144aaa35300 [ 1286.487263][ T3628] x8 : c138d144aaa35300 x7 : 0000000000000400 x6 : ffff80008039fbc8 [ 1286.488534][ T3628] x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080390dd0 [ 1286.489737][ T3628] x2 : 0000000000000002 x1 : 0000000100000000 x0 : 000000000000003e [ 1286.491149][ T3628] Call trace: [ 1286.491864][ T3628] kvm_s2_put_page+0x374/0x3a0 (P) [ 1286.492844][ T3628] stage2_free_walker+0xdc/0x264 [ 1286.493812][ T3628] __kvm_pgtable_walk+0x7d8/0xa68 [ 1286.494645][ T3628] kvm_pgtable_walk+0x294/0x468 [ 1286.495555][ T3628] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 1286.496611][ T3628] kvm_free_stage2_pgd+0x198/0x28c [ 1286.497534][ T3628] kvm_uninit_stage2_mmu+0x20/0x38 [ 1286.498469][ T3628] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 1286.499483][ T3628] kvm_mmu_notifier_release+0x48/0xa8 [ 1286.500448][ T3628] mmu_notifier_unregister+0x128/0x42c [ 1286.501395][ T3628] kvm_put_kvm+0x6a0/0xfa8 [ 1286.502219][ T3628] kvm_vm_release+0x58/0x78 [ 1286.502995][ T3628] __fput+0x4ac/0x980 [ 1286.503786][ T3628] ____fput+0x20/0x58 [ 1286.504572][ T3628] task_work_run+0x1bc/0x254 [ 1286.505408][ T3628] do_notify_resume+0x1bc/0x270 [ 1286.506289][ T3628] el0_svc+0xb8/0x164 [ 1286.507082][ T3628] el0t_64_sync_handler+0x84/0x12c [ 1286.508016][ T3628] el0t_64_sync+0x198/0x19c [ 1286.509397][ T3628] Code: 900377c1 910e9421 aa1303e0 97f9c9f2 (d4210000) [ 1286.511125][ T3628] ---[ end trace 0000000000000000 ]--- [ 1286.512762][ T3628] Kernel panic - not syncing: Oops - BUG: Fatal exception [ 1286.514780][ T3628] Kernel Offset: disabled [ 1286.515490][ T3628] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 1286.516572][ T3628] Memory Limit: none [ 1286.518188][ T3628] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:20:56 Registers: info registers vcpu 0 CPU#0 PC=ffff800082159154 X00=0000000000000003 X01=0000000000000002 X02=0000000000000001 X03=ffff800082159050 X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081f1ef70 X08=4ef000000d9b9d80 X09=0000000000000000 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000002 X13=0000000000000002 X14=0000000000000000 X15=00000000000002f9 X16=000000000000004e X17=0000000000000000 X18=0000000000de9000 X19=efff800000000000 X20=89f000000dcb4880 X21=6aff80008c4bb018 X22=0000000000000002 X23=89f000000dcb497c X24=0000000000000089 X25=89f000000dcb4ac8 X26=89f000000dcb48c8 X27=0000000000000089 X28=0000000000000089 X29=ffff80008c4f7b40 X30=ffff800082159154 SP=ffff80008c4f7b30 PSTATE=804020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0000000000000000:0098968001312d00 Z01=0000000000000000:0098968001312d00 Z02=0000003300000033:cccccccccccccccc Z03=000000ff000000ff:0000000000000000 Z04=3333333333333333:3333333333333333 Z05=0000000000000000:00030003cccccccc Z06=0000000000000073:0000aaaacb2ea3c0 Z07=0000000000000074:0000aaaacb2e7600 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000fffffa129be0:0000fffffa129be0 Z17=ffffff80ffffffd8:0000fffffa129bb0 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000