[ 382.132482][ T3166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 405.982833][ T3166] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:17993' (ED25519) to the list of known hosts. [ 985.423251][ T25] audit: type=1400 audit(984.630:60): avc: denied { execute } for pid=3334 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 985.452020][ T25] audit: type=1400 audit(984.650:61): avc: denied { execute_no_trans } for pid=3334 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:17:19 parsed 1 programs [ 1039.948614][ T25] audit: type=1400 audit(1039.150:62): avc: denied { node_bind } for pid=3334 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1060.766111][ T25] audit: type=1400 audit(1059.970:63): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1060.825924][ T25] audit: type=1400 audit(1060.030:64): avc: denied { mount } for pid=3343 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1060.921050][ T3343] cgroup: Unknown subsys name 'net' [ 1060.994912][ T25] audit: type=1400 audit(1060.200:65): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1061.473762][ T3343] cgroup: Unknown subsys name 'cpuset' [ 1061.613083][ T3343] cgroup: Unknown subsys name 'rlimit' [ 1062.972311][ T25] audit: type=1400 audit(1062.170:66): avc: denied { setattr } for pid=3343 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1062.999134][ T25] audit: type=1400 audit(1062.200:67): avc: denied { create } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1063.016294][ T25] audit: type=1400 audit(1062.220:68): avc: denied { write } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1063.044981][ T25] audit: type=1400 audit(1062.250:69): avc: denied { module_request } for pid=3343 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1063.495028][ T25] audit: type=1400 audit(1062.690:70): avc: denied { read } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1063.548598][ T25] audit: type=1400 audit(1062.750:71): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 1063.585543][ T25] audit: type=1400 audit(1062.770:72): avc: denied { mount } for pid=3343 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1065.715756][ T3348] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 1065.791046][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 1065.802116][ T25] audit: type=1400 audit(1064.980:74): avc: denied { write } for pid=3348 comm="mkswap" path="/swap-file" dev="vda" ino=1873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 1066.094908][ T25] audit: type=1400 audit(1065.290:75): avc: denied { read } for pid=3343 comm="syz-executor" name="swap-file" dev="vda" ino=1873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 1066.113026][ T25] audit: type=1400 audit(1065.310:76): avc: denied { open } for pid=3343 comm="syz-executor" path="/swap-file" dev="vda" ino=1873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 1066.174903][ T3343] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 1092.586012][ T25] audit: type=1400 audit(1091.790:77): avc: denied { execmem } for pid=3349 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1093.557772][ T25] audit: type=1400 audit(1092.760:78): avc: denied { read } for pid=3351 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1093.594793][ T25] audit: type=1400 audit(1092.790:79): avc: denied { open } for pid=3351 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1093.732411][ T25] audit: type=1400 audit(1092.900:80): avc: denied { mounton } for pid=3351 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1097.682169][ T25] audit: type=1400 audit(1096.850:81): avc: denied { mounton } for pid=3351 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1097.813545][ T25] audit: type=1400 audit(1097.020:82): avc: denied { mount } for pid=3351 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1097.902582][ T25] audit: type=1400 audit(1097.070:83): avc: denied { mounton } for pid=3351 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1097.915088][ T25] audit: type=1400 audit(1097.100:84): avc: denied { mount } for pid=3351 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1100.341079][ T25] audit: type=1400 audit(1099.540:85): avc: denied { mount } for pid=3352 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1100.426605][ T25] audit: type=1400 audit(1099.630:86): avc: denied { mounton } for pid=3352 comm="syz-executor" path="/syzkaller.WrDCyB/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1100.515384][ T25] audit: type=1400 audit(1099.720:87): avc: denied { mount } for pid=3352 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1100.647457][ T25] audit: type=1400 audit(1099.850:88): avc: denied { mounton } for pid=3352 comm="syz-executor" path="/syzkaller.WrDCyB/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1100.715105][ T25] audit: type=1400 audit(1099.920:89): avc: denied { mounton } for pid=3352 comm="syz-executor" path="/syzkaller.WrDCyB/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1100.949515][ T25] audit: type=1400 audit(1100.150:90): avc: denied { unmount } for pid=3352 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1101.684690][ T3352] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1119.475753][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 1119.483966][ T25] audit: type=1400 audit(1118.670:96): avc: denied { create } for pid=3367 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1156.412852][ T25] audit: type=1400 audit(1155.600:97): avc: denied { sys_module } for pid=3388 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1191.472644][ T3388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1191.814752][ T3388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1204.318916][ T25] audit: type=1400 audit(1203.520:98): avc: denied { create } for pid=3434 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1204.546965][ T25] audit: type=1400 audit(1203.740:99): avc: denied { sys_admin } for pid=3434 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1209.970835][ T25] audit: type=1400 audit(1209.130:100): avc: denied { sys_chroot } for pid=3436 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1213.933975][ T3388] hsr_slave_0: entered promiscuous mode [ 1214.009368][ T3388] hsr_slave_1: entered promiscuous mode [ 1219.867027][ T25] audit: type=1401 audit(1219.070:101): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1226.136749][ T3388] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1226.408704][ T3388] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1226.607593][ T3388] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1226.864785][ T3388] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1242.955081][ T3388] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1274.924426][ T3388] veth0_vlan: entered promiscuous mode [ 1275.171297][ T3388] veth1_vlan: entered promiscuous mode [ 1276.089135][ T3388] veth0_macvtap: entered promiscuous mode [ 1276.225101][ T3388] veth1_macvtap: entered promiscuous mode [ 1277.502968][ T3473] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1277.523516][ T3369] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1277.567281][ T3369] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1277.576292][ T3369] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:21:20 executed programs: 0 [ 1286.597973][ T3473] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1287.493125][ T3473] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1288.134846][ T3473] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1289.162860][ T3473] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1300.794311][ T3473] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1300.885267][ T3473] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1300.936180][ T3473] bond0 (unregistering): Released all slaves [ 1302.015161][ T3473] hsr_slave_0: left promiscuous mode [ 1302.137533][ T3473] hsr_slave_1: left promiscuous mode [ 1302.718852][ T3473] veth1_macvtap: left promiscuous mode [ 1302.729433][ T3473] veth0_macvtap: left promiscuous mode [ 1302.743240][ T3473] veth1_vlan: left promiscuous mode [ 1302.764442][ T3473] veth0_vlan: left promiscuous mode [ 1353.773468][ T3505] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1354.495579][ T3505] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1354.609102][ T3503] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1355.258536][ T3503] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1375.952731][ T3505] hsr_slave_0: entered promiscuous mode [ 1376.024909][ T3505] hsr_slave_1: entered promiscuous mode [ 1379.054637][ T3503] hsr_slave_0: entered promiscuous mode [ 1379.115108][ T3503] hsr_slave_1: entered promiscuous mode [ 1379.172674][ T3503] debugfs: 'hsr0' already exists in 'hsr' [ 1379.191938][ T3503] Cannot create hsr debugfs directory [ 1397.352727][ T3505] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1397.732933][ T3505] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1398.107127][ T3505] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1398.702196][ T3505] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1401.653329][ T3503] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1402.056523][ T3503] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1402.438654][ T3503] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1402.928466][ T3503] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1418.899217][ T3505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1422.958320][ T3503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1497.088034][ T3505] veth0_vlan: entered promiscuous mode [ 1498.033510][ T3505] veth1_vlan: entered promiscuous mode [ 1501.642783][ T3505] veth0_macvtap: entered promiscuous mode [ 1502.214952][ T3503] veth0_vlan: entered promiscuous mode [ 1502.483810][ T3505] veth1_macvtap: entered promiscuous mode [ 1503.286051][ T3503] veth1_vlan: entered promiscuous mode [ 1505.606668][ T52] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1505.617847][ T52] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1505.644689][ T52] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1505.654918][ T52] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1507.323686][ T3503] veth0_macvtap: entered promiscuous mode [ 1508.328750][ T3503] veth1_macvtap: entered promiscuous mode [ 1511.213677][ T3322] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1511.217754][ T3322] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1511.253335][ T3322] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1511.275695][ T3322] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:25:11 executed programs: 4 [ 1514.732933][ T25] audit: type=1400 audit(1513.870:102): avc: denied { read } for pid=3730 comm="syz.2.18" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1514.815759][ T25] audit: type=1400 audit(1514.010:103): avc: denied { open } for pid=3730 comm="syz.2.18" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1514.976381][ T25] audit: type=1400 audit(1514.150:104): avc: denied { ioctl } for pid=3730 comm="syz.2.18" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1517.304523][ T25] audit: type=1400 audit(1516.500:105): avc: denied { mounton } for pid=3503 comm="syz-executor" path="/syzkaller.ponfTq/syz-tmp" dev="vda" ino=1892 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1517.586714][ T25] audit: type=1400 audit(1516.790:106): avc: denied { mount } for pid=3503 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 1970/01/01 00:25:18 executed programs: 5 [ 1524.494846][ T3740] Unable to handle kernel paging request at virtual address ffef800000000001 [ 1524.525259][ T3740] KASAN: maybe wild-memory-access in range [0xff00000000000010-0xff0000000000001f] [ 1524.549304][ T25] audit: type=1400 audit(1523.750:107): avc: denied { read } for pid=3125 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1524.582056][ T3740] Mem abort info: [ 1524.613807][ T25] audit: type=1400 audit(1523.810:108): avc: denied { search } for pid=3125 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1524.622165][ T3740] ESR = 0x0000000096000004 [ 1524.660881][ T3740] EC = 0x25: DABT (current EL), IL = 32 bits [ 1524.684860][ T3740] SET = 0, FnV = 0 [ 1524.701465][ T3740] EA = 0, S1PTW = 0 [ 1524.706816][ T3740] FSC = 0x04: level 0 translation fault [ 1524.722174][ T25] audit: type=1400 audit(1523.860:109): avc: denied { search } for pid=3125 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1524.744549][ T25] audit: type=1400 audit(1523.940:110): avc: denied { add_name } for pid=3125 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1524.762133][ T3740] Data abort info: [ 1524.762841][ T3740] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1524.763266][ T3740] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1524.763628][ T3740] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1524.764097][ T3740] [ffef800000000001] address between user and kernel address ranges [ 1524.765826][ T3740] Internal error: Oops: 0000000096000004 [#1] SMP [ 1524.772842][ T3740] Modules linked in: [ 1524.776653][ T3740] CPU: 0 UID: 0 PID: 3740 Comm: syz.2.19 Not tainted syzkaller #0 PREEMPT [ 1524.778226][ T3740] Hardware name: linux,dummy-virt (DT) [ 1524.779493][ T3740] pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1524.780822][ T3740] pc : vgic_its_save_tables_v0+0x3b0/0xe38 [ 1524.783251][ T3740] lr : vgic_its_save_tables_v0+0x34c/0xe38 [ 1524.784320][ T3740] sp : ffff80008eba7bf0 [ 1524.785069][ T3740] x29: ffff80008eba7c70 x28: 9af0000024fd74f0 x27: 0000000000000000 [ 1524.786590][ T3740] x26: 00000000000000cc x25: 3bf0000022e20300 x24: 36f0000024f959c0 [ 1524.787967][ T3740] x23: 9af0000024fd7438 x22: b9070000c0000600 x21: 4df0000024f95990 [ 1524.789424][ T3740] x20: 4df0000024f95990 x19: efff800000000000 x18: 0000000000000000 [ 1524.790774][ T3740] x17: 000000000000005b x16: ffff800080011d9c x15: 0000000020000300 [ 1524.792043][ T3740] x14: 0000000000000000 x13: fff000001be5d948 x12: 0ff0000000000001 [ 1524.793450][ T3740] x11: 0000000000000010 x10: 0000000000002000 x9 : 0000000000000000 [ 1524.794926][ T3740] x8 : 0000000000000000 x7 : ffff80008024d408 x6 : 0000000000000000 [ 1524.796294][ T3740] x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080166870 [ 1524.797650][ T3740] x2 : ffff80008024d484 x1 : 0000000000000000 x0 : 0000000000000000 [ 1524.799206][ T3740] Call trace: [ 1524.800136][ T3740] vgic_its_save_tables_v0+0x3b0/0xe38 (P) [ 1524.801471][ T3740] vgic_its_set_attr+0x65c/0x860 [ 1524.802411][ T3740] kvm_device_ioctl+0x354/0x418 [ 1524.803310][ T3740] __arm64_sys_ioctl+0x18c/0x244 [ 1524.804207][ T3740] invoke_syscall+0x90/0x238 [ 1524.805138][ T3740] el0_svc_common+0x180/0x2f4 [ 1524.806042][ T3740] do_el0_svc+0x58/0x74 [ 1524.806937][ T3740] el0_svc+0x5c/0x234 [ 1524.807808][ T3740] el0t_64_sync_handler+0x84/0x12c [ 1524.808756][ T3740] el0t_64_sync+0x198/0x19c [ 1524.810186][ T3740] Code: 9100412b b2481d69 d344fd2c d378fd69 (386c6a6c) [ 1524.812105][ T3740] ---[ end trace 0000000000000000 ]--- [ 1524.813658][ T3740] Kernel panic - not syncing: Oops: Fatal exception [ 1524.815431][ T3740] Kernel Offset: disabled [ 1524.816072][ T3740] CPU features: 0x000000,00068c01,7ef8cfa1,057ffe1f [ 1524.817048][ T3740] Memory Limit: none [ 1524.818696][ T3740] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:35:38 Registers: info registers vcpu 0 CPU#0 PC=ffff8000806a206c X00=fff0000072d68af0 X01=ffff800082200ed0 X02=0000000000000000 X03=0000000000000000 X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800082200ea8 X08=ffff80008c6e7a88 X09=0000000000000000 X10=ffff800087a0ee90 X11=00000000ec51c272 X12=00000000f56bd705 X13=000000004e402aea X14=00000000000000ff X15=00000000000000ff X16=00000000000000ff X17=000000003efcf46d X18=ffff80008c6e7870 X19=0000000000000020 X20=ffff80008c6e7918 X21=41f0000020a19024 X22=0000000000000000 X23=efff800000000000 X24=fff0000072d68ac8 X25=00000000000000c0 X26=0000000000000026 X27=0000000000000004 X28=ffff800087831440 X29=ffff80008c6e7940 X30=ffff8000800e7a50 SP=ffff80008c6e77e0 PSTATE=804020c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=0000000000000075:25203a6b63617473 Z02=0000000000000009:0000000000000000 Z03=ffffffffffffff00:ff00000000000000 Z04=0000000000000000:fffffff0f0000000 Z05=0000000000000009:0000000000000002 Z06=0000000000000000:0000000000000000 Z07=0000000000000000:0000000000000000 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000 Z17=0000000000000000:0000000000000000 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=bb448243222c92da:e3914ed4e87380b0 Z23=43788d6f07084f17:4508b00c6052a10f Z24=b20fae707afde253:388e9c6c4fa85ca0 Z25=8e9f894b2581e79e:20c883c9819d5c97 Z26=57c93d417f4d0394:89cd11f6992873d1 Z27=6b69be1163cb6500:a4ac85c293540e63 Z28=6edc4d3a2914b135:d8e9c869e2695c88 Z29=0000000000000000:0009000700030001 Z30=0000000000274000:0000000000000000 Z31=0000000000000000:0000000000000006