last executing test programs: 3.199914792s ago: executing program 1 (id=2): r0 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r1 = syz_kvm_setup_syzos_vm$arm64(0xffffffffffffffff, &(0x7f0000c00000/0x400000)=nil) r2 = syz_kvm_add_vcpu$arm64(r1, &(0x7f0000000100)={0x0, &(0x7f0000000d00)=[@its_send_cmd={0xaa, 0x28, {0xa, 0x1, 0x1, 0x4, 0x2, 0xb, 0x1}}, @smc={0x1e, 0x40, {0xc4000005, [0x5, 0x1, 0x8000000000000000, 0xa, 0x10]}}, @uexit={0x0, 0x18, 0x80000001}, @mrs={0xbe, 0x18, {0x603000000013deee}}, @eret={0xe6, 0x18, 0x1}, @smc={0x1e, 0x40, {0xc4000005, [0x4, 0x0, 0x4, 0xe00000000, 0x6]}}, @memwrite={0x6e, 0x30, @vgic_gits={0x8080000, 0x80, 0xc, 0x4}}, @msr={0x14, 0x20, {0x603000000013deec, 0x7fffffffffffffff}}, @smc={0x1e, 0x40, {0x84000013, [0x0, 0x9, 0x9, 0x2, 0x8]}}, @its_send_cmd={0xaa, 0x28, {0xb, 0x0, 0x2, 0x8, 0xf, 0xfffffffc, 0x3}}, @msr={0x14, 0x20, {0x603000000013e099, 0x80000001}}, @irq_setup={0x46, 0x18, {0x3, 0x28e}}, @eret={0xe6, 0x18, 0x2}, @smc={0x1e, 0x40, {0xc4000003, [0x1271, 0x6, 0xffffffffffffffd3, 0xfffffffffffffff8, 0x8]}}, @its_setup={0x82, 0x28, {0x1, 0x0, 0x277}}, @its_send_cmd={0xaa, 0x28, {0xb, 0x1, 0x4, 0x6, 0x7fff, 0xfffffca9, 0x2}}, @code={0xa, 0xb4, {"20729cd200c0b8f2a10180d2a20180d2230080d2a40180d2020000d4000008d500d0205ec0829ed20040b0f2810180d2620080d240c492d200c0b8f2210180d2020180d2a30180d2640180d2020000d4040180d2007008d5e00300cb205781d200c0b0f2010180d2620180d2230080d2640180d2020000d4007008d5000040b300f8b02e40fa9ad200e0b0f2e10180d2c20180d2e30080d2c40080d2020000d4"}}, @mrs={0xbe, 0x18, {0x603000000013e729}}, @its_setup={0x82, 0x28, {0x3, 0x1, 0x1c6}}, @mrs={0xbe, 0x18, {0x603000000013c011}}, @msr={0x14, 0x20, {0x6030000000138007, 0x1}}, @eret={0xe6, 0x18, 0x3}, @svc={0x122, 0x40, {0x6000008, [0x5, 0x5, 0x8, 0x4, 0x3]}}, @mrs={0xbe, 0x18, {0x603000000013e6dd}}], 0x424}, &(0x7f0000000180)=[@featur1={0x1, 0x1d}], 0x1) ioctl$KVM_SET_GUEST_DEBUG_arm64(r2, 0x4208ae9b, &(0x7f0000000680)={0x20003, 0x0, {[0x0, 0x5, 0xfffffffeffffffff, 0x7fffffffffffffff, 0x16e4, 0x1, 0x3, 0xf6, 0x10, 0xecbf, 0xff, 0x4, 0x7ff, 0x28c0000000000, 0x4, 0x4cb], [0x3, 0x6, 0x9, 0x1, 0x5, 0x9, 0x0, 0xc2, 0x1, 0xffffffff, 0x2, 0x8000000000000000, 0x7000000000000000, 0x58, 0x8, 0x661], [0x80, 0x2, 0x4, 0x8, 0x401, 0x1000, 0x4, 0x0, 0x8000000000000081, 0x9, 0x2, 0x1, 0xb, 0x7fdf, 0xffffffffffffffff, 0x5], [0xfffffffffffffc01, 0x7, 0x4, 0x9, 0xa3, 0x1, 0x6, 0x8, 0xcdb4, 0xfff, 0x0, 0x10001, 0x6, 0xa00000, 0x4, 0x8001]}}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_syzos_vm$arm64(r3, &(0x7f0000c00000/0x400000)=nil) r4 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = syz_kvm_setup_syzos_vm$arm64(r5, &(0x7f0000c00000/0x400000)=nil) r7 = syz_kvm_add_vcpu$arm64(r6, &(0x7f0000000080)={0x0, 0x0}, 0x0, 0x0) ioctl$KVM_GET_REG_LIST(r7, 0xc008aeb0, &(0x7f0000000380)={0x20000135}) r8 = openat$kvm(0x0, &(0x7f0000000040), 0x80, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x2e) r10 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$arm64(r9, r10, &(0x7f0000e8a000/0x18000)=nil, &(0x7f0000000080)=[{0x0, 0x0, 0x30}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r10, 0x4010aeac, &(0x7f0000000140)=@arm64_core={0x6030000000100042, &(0x7f0000000000)=0x12}) ioctl$KVM_INTERRUPT(r10, 0x4004ae86, &(0x7f00000000c0)=0x40) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000200)={0x1fd, 0x2, 0x8000000, 0x2000, &(0x7f0000ecf000/0x2000)=nil}) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 0s ago: executing program 0 (id=1): r0 = openat$kvm(0x0, &(0x7f0000000040), 0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x2e) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x7e) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = syz_kvm_setup_syzos_vm$arm64(r5, &(0x7f0000c00000/0x400000)=nil) r7 = syz_kvm_add_vcpu$arm64(r6, &(0x7f0000000000)={0x0, 0x0}, 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR_vcpu(r7, 0x4018aee2, &(0x7f0000000140)=@attr_irq_timer={0x0, 0x1, 0x1, 0x0}) syz_kvm_setup_syzos_vm$arm64(r1, &(0x7f0000b02000/0x400000)=nil) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r8, 0xae03, 0x4d) syz_kvm_setup_cpu$arm64(r1, r3, &(0x7f0000e8a000/0x18000)=nil, &(0x7f0000000080)=[{0x0, 0x0, 0x30}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) kernel console output (not intermixed with test programs): [ 407.592298][ T3144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 448.754328][ T3144] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:41916' (ED25519) to the list of known hosts. [ 627.711464][ T25] audit: type=1400 audit(626.870:60): avc: denied { name_bind } for pid=3302 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 628.673794][ T25] audit: type=1400 audit(627.850:61): avc: denied { execute } for pid=3303 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 628.702406][ T25] audit: type=1400 audit(627.870:62): avc: denied { execute_no_trans } for pid=3303 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 661.300541][ T25] audit: type=1400 audit(660.470:63): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1869 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 661.334392][ T25] audit: type=1400 audit(660.500:64): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 661.422253][ T3303] cgroup: Unknown subsys name 'net' [ 661.473596][ T25] audit: type=1400 audit(660.650:65): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 661.882493][ T3303] cgroup: Unknown subsys name 'cpuset' [ 661.986122][ T3303] cgroup: Unknown subsys name 'rlimit' [ 662.941592][ T25] audit: type=1400 audit(662.110:66): avc: denied { setattr } for pid=3303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 662.961744][ T25] audit: type=1400 audit(662.130:67): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 662.987958][ T25] audit: type=1400 audit(662.160:68): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 664.218573][ T3311] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 664.241200][ T25] audit: type=1400 audit(663.410:69): avc: denied { relabelto } for pid=3311 comm="mkswap" name="swap-file" dev="vda" ino=1872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 664.267415][ T25] audit: type=1400 audit(663.440:70): avc: denied { write } for pid=3311 comm="mkswap" path="/swap-file" dev="vda" ino=1872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 664.461955][ T25] audit: type=1400 audit(663.630:71): avc: denied { read } for pid=3303 comm="syz-executor" name="swap-file" dev="vda" ino=1872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 664.477671][ T25] audit: type=1400 audit(663.650:72): avc: denied { open } for pid=3303 comm="syz-executor" path="/swap-file" dev="vda" ino=1872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 664.527195][ T3303] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 717.316012][ T25] audit: type=1400 audit(716.490:73): avc: denied { execmem } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 722.277800][ T25] audit: type=1400 audit(721.450:74): avc: denied { read } for pid=3315 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 722.296987][ T25] audit: type=1400 audit(721.460:75): avc: denied { read } for pid=3314 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 722.331973][ T25] audit: type=1400 audit(721.490:76): avc: denied { open } for pid=3314 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 722.403865][ T25] audit: type=1400 audit(721.560:77): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 722.663161][ T25] audit: type=1400 audit(721.840:78): avc: denied { module_request } for pid=3314 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 723.832953][ T25] audit: type=1400 audit(722.990:79): avc: denied { sys_module } for pid=3314 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 748.880023][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 749.267484][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 749.503964][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 749.822380][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 763.487052][ T3314] hsr_slave_0: entered promiscuous mode [ 763.535818][ T3314] hsr_slave_1: entered promiscuous mode [ 765.332820][ T3315] hsr_slave_0: entered promiscuous mode [ 765.376222][ T3315] hsr_slave_1: entered promiscuous mode [ 765.423341][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 765.430580][ T3315] Cannot create hsr debugfs directory [ 774.460702][ T25] audit: type=1400 audit(773.630:80): avc: denied { create } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 774.516442][ T25] audit: type=1400 audit(773.690:81): avc: denied { write } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 774.547731][ T25] audit: type=1400 audit(773.710:82): avc: denied { read } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 774.711326][ T3314] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 775.015683][ T3314] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 775.248068][ T3314] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 775.765411][ T3314] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 777.250884][ T3315] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 777.456113][ T3315] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 777.656303][ T3315] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 777.834113][ T3315] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 791.117753][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 793.654141][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 852.658050][ T3314] veth0_vlan: entered promiscuous mode [ 853.144638][ T3314] veth1_vlan: entered promiscuous mode [ 855.031564][ T3314] veth0_macvtap: entered promiscuous mode [ 855.540889][ T3314] veth1_macvtap: entered promiscuous mode [ 855.641530][ T3315] veth0_vlan: entered promiscuous mode [ 856.502471][ T3315] veth1_vlan: entered promiscuous mode [ 858.042300][ T3362] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.053215][ T3362] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.141426][ T3362] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.230664][ T3362] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.820659][ T3315] veth0_macvtap: entered promiscuous mode [ 860.544187][ T3315] veth1_macvtap: entered promiscuous mode [ 860.581559][ T25] audit: type=1400 audit(859.740:83): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 860.718109][ T25] audit: type=1400 audit(859.890:84): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.YXj573/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 860.936665][ T25] audit: type=1400 audit(860.110:85): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 861.175338][ T25] audit: type=1400 audit(860.350:86): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.YXj573/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 861.285390][ T25] audit: type=1400 audit(860.440:87): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.YXj573/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3770 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 862.077907][ T25] audit: type=1400 audit(861.250:88): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 862.281819][ T25] audit: type=1400 audit(861.450:89): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 862.382296][ T25] audit: type=1400 audit(861.520:90): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="gadgetfs" ino=3778 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 862.582840][ T25] audit: type=1400 audit(861.750:91): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 862.646956][ T49] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.665643][ T49] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.702031][ T25] audit: type=1400 audit(861.870:92): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 862.711051][ T49] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.716131][ T49] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 864.583743][ T3314] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 865.821534][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 865.822427][ T25] audit: type=1400 audit(864.930:94): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 865.823415][ T25] audit: type=1400 audit(864.980:95): avc: denied { open } for pid=3314 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 865.900015][ T25] audit: type=1400 audit(864.980:96): avc: denied { ioctl } for pid=3314 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 875.230835][ T25] audit: type=1400 audit(874.400:97): avc: denied { read } for pid=3467 comm="syz.1.2" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 875.244498][ T25] audit: type=1400 audit(874.400:98): avc: denied { open } for pid=3467 comm="syz.1.2" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 875.881775][ T25] audit: type=1400 audit(875.050:99): avc: denied { ioctl } for pid=3467 comm="syz.1.2" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 884.886399][ T3472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5e482 [ 884.905860][ T3472] flags: 0x1ffc40000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x10) [ 884.964819][ T3472] raw: 01ffc40000000000 ffffc1ffc0792048 ffffc1ffc078f908 0000000000000000 [ 885.012876][ T3472] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 885.041417][ T3472] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) [ 885.066859][ T3472] ------------[ cut here ]------------ [ 885.067159][ T3472] kernel BUG at ./include/linux/mm.h:1036! [ 885.068913][ T3472] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP [ 885.073871][ T3472] Modules linked in: [ 885.075988][ T3472] CPU: 0 UID: 0 PID: 3472 Comm: syz.0.1 Not tainted syzkaller #0 PREEMPT [ 885.077541][ T3472] Hardware name: linux,dummy-virt (DT) [ 885.078833][ T3472] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 885.080177][ T3472] pc : kvm_s2_put_page+0x374/0x3a0 [ 885.082521][ T3472] lr : kvm_s2_put_page+0x374/0x3a0 [ 885.083534][ T3472] sp : ffff8000a3cb7570 [ 885.084291][ T3472] x29: ffff8000a3cb7570 x28: aef000001e3e4000 x27: aef000001e3e4000 [ 885.085937][ T3472] x26: 00000000000000ff x25: ffff80008734e000 x24: ffffc1ffc0000000 [ 885.087393][ T3472] x23: ffffc1ffc0792088 x22: 0000000000000000 x21: ffffc1ffc07920b4 [ 885.088794][ T3472] x20: 0000000000000000 x19: ffffc1ffc0792080 x18: 00000000bddbcefc [ 885.090245][ T3472] x17: 0000000003e0e215 x16: 00000000bddb9c34 x15: 00000000caa8bdb9 [ 885.091585][ T3472] x14: ffffffffffffffff x13: fff000001e380008 x12: 0000000000000001 [ 885.092976][ T3472] x11: 0000000000080000 x10: 0000000000050739 x9 : b09d19cd6be2e900 [ 885.094566][ T3472] x8 : b09d19cd6be2e900 x7 : ffff8000803a03c8 x6 : 0000000000000000 [ 885.095959][ T3472] x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff80008074b7f8 [ 885.097369][ T3472] x2 : 0000000000000001 x1 : 0000000100000000 x0 : 000000000000003e [ 885.098967][ T3472] Call trace: [ 885.099883][ T3472] kvm_s2_put_page+0x374/0x3a0 (P) [ 885.101235][ T3472] stage2_free_walker+0x1b0/0x264 [ 885.102358][ T3472] __kvm_pgtable_walk+0x7d8/0xa68 [ 885.103385][ T3472] kvm_pgtable_walk+0x294/0x468 [ 885.104376][ T3472] kvm_pgtable_stage2_destroy_range+0x60/0xb4 [ 885.105491][ T3472] kvm_free_stage2_pgd+0x198/0x28c [ 885.106546][ T3472] kvm_uninit_stage2_mmu+0x20/0x38 [ 885.107506][ T3472] kvm_arch_flush_shadow_all+0x1a8/0x1e0 [ 885.108589][ T3472] kvm_mmu_notifier_release+0x48/0xa8 [ 885.109621][ T3472] mmu_notifier_unregister+0x128/0x42c [ 885.110661][ T3472] kvm_put_kvm+0x6a0/0xfa8 [ 885.111502][ T3472] kvm_vcpu_release+0x70/0x9c [ 885.112472][ T3472] __fput+0x4ac/0x980 [ 885.113260][ T3472] ____fput+0x20/0x58 [ 885.114072][ T3472] task_work_run+0x1bc/0x254 [ 885.114952][ T3472] get_signal+0x13ec/0x1554 [ 885.115907][ T3472] do_signal+0x23c/0x4dd0 [ 885.116869][ T3472] do_notify_resume+0xb0/0x270 [ 885.117805][ T3472] el0_svc+0xb8/0x164 [ 885.118681][ T3472] el0t_64_sync_handler+0x84/0x12c [ 885.119586][ T3472] el0t_64_sync+0x198/0x19c [ 885.121172][ T3472] Code: d0037581 9126fc21 aa1303e0 97f9c9f2 (d4210000) [ 885.123068][ T3472] ---[ end trace 0000000000000000 ]--- [ 885.124695][ T3472] Kernel panic - not syncing: Oops - BUG: Fatal exception [ 885.126754][ T3472] Kernel Offset: disabled [ 885.127499][ T3472] CPU features: 0x000000,0001a300,5f7c67c1,057ffe1f [ 885.128597][ T3472] Memory Limit: none [ 885.130299][ T3472] Rebooting in 86400 seconds.. VM DIAGNOSIS: 00:53:28 Registers: info registers vcpu 0 CPU#0 PC=ffff80008002022c X00=0000000000000000 X01=ffff8000870dd70e X02=0000000000000000 X03=0000000000000002 X04=0000000000000000 X05=0000000000000000 X06=ffff800080537664 X07=ffff800080015834 X08=0000000000000000 X09=b09d19cd6be2e900 X10=0fff000001e38000 X11=0000000000080000 X12=0fff000001e38040 X13=fff000001e380008 X14=0000000000000002 X15=ffff800087f83a20 X16=0000000000000000 X17=0000000003e0e215 X18=00000000bddbcefc X19=efff800000000000 X20=ffff8000801b05a0 X21=ffff8000a3cb7420 X22=0000000000000000 X23=0000000000008001 X24=00000000000000ff X25=ffff80008734e000 X26=00000000000000ff X27=aef000001e3e4000 X28=3ef000001e380000 X29=ffff8000a3cb72a0 X30=ffff80008002022c SP=ffff8000a3cb7270 PSTATE=604023c9 -ZC- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0400000000000000:0400000000000000 Z01=0000000400000000:0000000000000000 Z02=0000000000000004:0000000000000000 Z03=00d000a800000000:0000000000000000 Z04=0000000000000000:0000000000000002 Z05=0000000000000004:0000000000000002 Z06=6edc4d3a2914b135:d8e9c869e2695c88 Z07=b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000fffff9c1eaa0:0000fffff9c1eaa0 Z17=ffffff80ffffffd0:0000fffff9c1ea70 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000