[....] Starting enhanced syslogd: rsyslogd[ 10.915804] audit: type=1400 audit(1515052850.406:5): avc: denied { syslog } for pid=3312 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.820781] audit: type=1400 audit(1515052856.311:6): avc: denied { map } for pid=3453 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.15.232' (ECDSA) to the list of known hosts. 2018/01/04 08:01:02 fuzzer started [ 22.948702] audit: type=1400 audit(1515052862.439:7): avc: denied { map } for pid=3464 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/01/04 08:01:02 dialing manager at 10.128.0.26:46443 2018/01/04 08:01:06 kcov=true, comps=true [ 26.656648] audit: type=1400 audit(1515052866.147:8): avc: denied { map } for pid=3464 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=8831 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/01/04 08:01:08 executing program 3: mmap(&(0x7f0000000000/0xffc000)=nil, 0xffc000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000dbb000-0x28)={@common="6c6f0000210000000600000008ff00", &(0x7f0000f0f000-0x2c)=@ethtool_cmd={0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 2018/01/04 08:01:08 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = open(&(0x7f0000eb2000-0x8)='./file0\x00', 0x28042, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00009ac000-0x4)=0x3, 0x4) connect$inet(r0, &(0x7f0000bdb000)={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) fallocate(r1, 0x0, 0xfdff, 0x7e70) connect$inet(r0, &(0x7f0000667000)={0x2, 0x0, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) sendfile(r0, r1, &(0x7f000056b000-0x8)=0x0, 0xfffe) 2018/01/04 08:01:08 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000c4a000)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f000002c000-0x10)={0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000bcb000)=0x10) getsockopt$inet6_buf(r0, 0x29, 0x50, &(0x7f0000001000-0xb9)=""/185, &(0x7f000048d000)=0xb9) 2018/01/04 08:01:08 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00003c5000-0x9)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000098b000/0x18000)=nil, &(0x7f00000c1000-0x18)=[@text64={0x40, &(0x7f0000ba8000-0x3a)="2e410f763f66460f388185000000000f320faee86436490f01cf490fe903440f20c0350a000000440f22c067660fe3222e670fe967a20f73d56f", 0x3a}], 0xa63, 0x0, &(0x7f00006ab000)=[], 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f00001b1000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000cfb000/0x18000)=nil, &(0x7f0000a1e000-0x18)=[@text64={0x40, &(0x7f0000702000-0x5b)="0f350f060f20d835080000000f22d836653e2e0f01cab9800000c00f3235004000000f3066ba430066b854b066efc74424000001c0fec74424020c000000c7442406000000000f011c24c483dd5f4f650f654e0f87151f00000f08", 0x5b}], 0x1, 0x0, &(0x7f000072b000)=[], 0x0) syz_open_dev$sg(&(0x7f0000562000-0x9)='/dev/sg#\x00', 0x7, 0x8000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000a7e000-0x8)={0x0, 0x0}) getuid() fstat(r1, &(0x7f0000121000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00006be000)={0x0, 0x0}) getuid() getgid() setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000008000-0x98)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0xff, 0xff], @loopback=0x7f000001}, 0x8}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x7ff, 0x5}, 0x98) 2018/01/04 08:01:08 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000907000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000533000)={@generic="02000000040000000004008000e9bc22", @ifru_settings={0x10001, 0x0, @fr=&(0x7f0000013000-0x18)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}) 2018/01/04 08:01:08 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x0, 0x0}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000-0x20)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x0}) timer_create(0x0, &(0x7f0000013000-0x60)={0x0, 0x0, 0x0, @thr={&(0x7f0000001000)="", &(0x7f0000012000)=""}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000000)=0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000011000/0x3000)=nil, 0x3000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00005e0000)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/01/04 08:01:08 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$tun(&(0x7f0000108000-0xd)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000928000-0x28)={@common='gre0\x00', @ifru_mtu=0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000625000-0x20)={@common='gre0\x00', @ifru_flags=0x2ff}) r2 = socket$inet6(0xa, 0x2, 0x0) accept4$packet(r0, &(0x7f0000910000-0x14)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random=""/6, [0x0, 0x0]}, &(0x7f00009c9000)=0x14, 0x80800) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000a9c000-0x18)={@loopback={0x0, 0x1}, 0x8000, r3}) socket$inet_udp(0x2, 0x2, 0x0) 2018/01/04 08:01:08 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000b0f000-0x4)={0x0, 0x3, 0x0}, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000187000)="", 0x0, 0x0, &(0x7f0000999000)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0}, 0x1c) [ 28.611232] audit: type=1400 audit(1515052868.101:9): avc: denied { map } for pid=3464 comm="syz-fuzzer" path="/root/syzkaller-shm137121763" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 29.539057] audit: type=1400 audit(1515052869.029:10): avc: denied { sys_admin } for pid=3506 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.645773] audit: type=1400 audit(1515052869.136:11): avc: denied { sys_chroot } for pid=3690 comm="syz-executor0" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/01/04 08:01:09 executing program 0: [ 29.693941] audit: type=1400 audit(1515052869.184:12): avc: denied { dac_override } for pid=3708 comm="syz-executor0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.732250] audit: type=1400 audit(1515052869.221:13): avc: denied { net_admin } for pid=3715 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.784366] kvm: KVM_SET_TSS_ADDR need to be called before entering vcpu [ 29.811499] audit: type=1400 audit(1515052869.302:14): avc: denied { net_raw } for pid=3723 comm="syz-executor6" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.881715] kasan: CONFIG_KASAN_INLINE enabled [ 29.886357] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 29.893708] general protection fault: 0000 [#1] SMP KASAN [ 29.899228] Dumping ftrace buffer: [ 29.900403] FAULT_FLAG_ALLOW_RETRY missing 30 [ 29.900413] CPU: 1 PID: 3728 Comm: syz-executor5 Not tainted 4.15.0-rc6-mm1+ #50 [ 29.900418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.900421] Call Trace: [ 29.900440] dump_stack+0x137/0x198 [ 29.900454] handle_userfault+0x744/0x1750 [ 29.900470] ? userfaultfd_ioctl+0x2ff0/0x2ff0 [ 29.900480] ? mark_wake_futex+0x110/0x110 [ 29.900496] ? find_held_lock+0x35/0x1e0 [ 29.900510] ? __handle_mm_fault+0x31b4/0x3210 [ 29.900517] ? lock_downgrade+0x860/0x860 [ 29.900524] ? __handle_mm_fault+0x1e8c/0x3210 [ 29.900538] __handle_mm_fault+0x2fc5/0x3210 [ 29.900548] ? __pmd_alloc+0x4e0/0x4e0 [ 29.900556] ? find_held_lock+0x35/0x1e0 [ 29.900572] ? lock_acquire+0x16b/0x420 [ 29.900581] ? __do_page_fault+0x81f/0xca0 [ 29.900591] handle_mm_fault+0x305/0x840 [ 29.900602] __do_page_fault+0x59e/0xca0 [ 29.900615] ? mm_fault_error+0x2c0/0x2c0 [ 29.900621] ? lock_downgrade+0x860/0x860 [ 29.900628] ? lock_acquire+0x16b/0x420 [ 29.900640] do_page_fault+0x78/0x490 [ 29.900651] page_fault+0x2c/0x60 [ 29.900660] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 29.900664] RSP: 0018:ffff8801d5677e68 EFLAGS: 00010246 [ 29.900671] RAX: ffffed003aacefe1 RBX: 0000000020012fa0 RCX: 0000000000000040 [ 29.900675] RDX: 0000000000000040 RSI: 0000000020012fa0 RDI: ffff8801d5677ec8 [ 29.900680] RBP: ffff8801d5677e98 R08: ffffed003aacefe1 R09: ffffed003aacefe1 [ 29.900684] R10: 0000000000000008 R11: ffffed003aacefe0 R12: 0000000000000040 [ 29.900688] R13: ffff8801d5677ec8 R14: 00007ffffffff000 R15: 0000000020012fe0 [ 29.900707] ? _copy_from_user+0xc5/0x110 [ 29.900718] SyS_timer_create+0x85/0xf0 [ 29.900725] ? posix_timer_fn+0x2f0/0x2f0 [ 29.900733] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.900743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.900755] entry_SYSCALL_64_fastpath+0x23/0x9a [ 29.900760] RIP: 0033:0x452ac9 [ 29.900763] RSP: 002b:00007f2c9cbc2c58 EFLAGS: 00000212 ORIG_RAX: 00000000000000de [ 29.900770] RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 [ 29.900774] RDX: 0000000020000000 RSI: 0000000020012fa0 RDI: 0000000000000000 [ 29.900778] RBP: 00000000000005ea R08: 0000000000000000 R09: 0000000000000000 [ 29.900782] R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6e90 [ 29.900786] R13: 00000000ffffffff R14: 00007f2c9cbc36d4 R15: 0000000000000000 [ 29.916940] FAULT_FLAG_ALLOW_RETRY missing 30 [ 29.916949] CPU: 1 PID: 3728 Comm: syz-executor5 Not tainted 4.15.0-rc6-mm1+ #50 [ 29.916954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.916956] Call Trace: [ 29.916972] dump_stack+0x137/0x198 [ 29.916986] handle_userfault+0x744/0x1750 [ 29.917000] ? userfaultfd_ioctl+0x2ff0/0x2ff0 [ 29.917013] ? mark_wake_futex+0x110/0x110 [ 29.917021] ? vm_mmap_pgoff+0x19c/0x1f0 [ 29.917035] ? should_fail+0x13a/0x580 [ 29.917044] ? entry_SYSCALL_64_fastpath+0x23/0x9a [ 29.917052] ? mmdrop+0x18/0x30 [ 29.917059] ? drop_futex_key_refs.isra.12+0x63/0xa0 [ 29.917067] ? futex_wait+0x46e/0x5c0 [ 29.917079] ? __handle_mm_fault+0x31b4/0x3210 [ 29.917089] ? lock_downgrade+0x860/0x860 [ 29.917095] ? __handle_mm_fault+0x1e8c/0x3210 [ 29.917110] __handle_mm_fault+0x2fc5/0x3210 [ 29.917121] ? __pmd_alloc+0x4e0/0x4e0 [ 29.917138] ? lock_acquire+0x16b/0x420 [ 29.917148] ? __do_page_fault+0x81f/0xca0 [ 29.917159] handle_mm_fault+0x305/0x840 [ 29.917170] __do_page_fault+0x59e/0xca0 [ 29.917193] ? mm_fault_error+0x2c0/0x2c0 [ 29.917208] do_page_fault+0x78/0x490 [ 29.917220] page_fault+0x2c/0x60 [ 29.917233] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 29.917238] RSP: 0018:ffff8801d5677e68 EFLAGS: 00010246 [ 29.917246] RAX: ffffed003aacefe1 RBX: 0000000020012fa0 RCX: 0000000000000040 [ 29.917251] RDX: 0000000000000040 RSI: 0000000020012fa0 RDI: ffff8801d5677ec8 [ 29.917256] RBP: ffff8801d5677e98 R08: ffffed003aacefe1 R09: ffffed003aacefe1 [ 29.917261] R10: 0000000000000008 R11: ffffed003aacefe0 R12: 0000000000000040 [ 29.917266] R13: ffff8801d5677ec8 R14: 00007ffffffff000 R15: 0000000020012fe0 [ 29.917284] ? _copy_from_user+0xc5/0x110 [ 29.917294] SyS_timer_create+0x85/0xf0 [ 29.917301] ? posix_timer_fn+0x2f0/0x2f0 [ 29.917310] ? security_file_ioctl+0x89/0xb0 [ 29.917320] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.917332] entry_SYSCALL_64_fastpath+0x23/0x9a [ 29.917337] RIP: 0033:0x452ac9 [ 29.917341] RSP: 002b:00007f2c9cbc2c58 EFLAGS: 00000212 ORIG_RAX: 00000000000000de [ 29.917347] RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 [ 29.917352] RDX: 0000000020000000 RSI: 0000000020012fa0 RDI: 0000000000000000 [ 29.917355] RBP: 00000000000005ea R08: 0000000000000000 R09: 0000000000000000 [ 29.917359] R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6e90 [ 29.917363] R13: 00000000ffffffff R14: 00007f2c9cbc36d4 R15: 0000000000000000 [ 30.363344] (ftrace buffer empty) [ 30.367027] Modules linked in: [ 30.370197] CPU: 0 PID: 3721 Comm: syz-executor2 Not tainted 4.15.0-rc6-mm1+ #50 [ 30.377694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.387026] RIP: 0010:native_write_cr4+0x4/0x10 [ 30.391659] RSP: 0018:ffff8801a7bf7b18 EFLAGS: 00010093 [ 30.396989] RAX: ffff8801d5a960c0 RBX: 00000000001606f0 RCX: ffffffff8115d7c2 [ 30.404226] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000001606f0 [ 30.411473] RBP: ffff8801a7bf7b18 R08: ffffffff8105f787 R09: 0000000000000004 [ 30.418711] R10: ffff8801a7bf7b30 R11: 0000000000000001 R12: 0000000000000093 [ 30.425950] R13: ffff8801d5a960c0 R14: ffff8801db41a130 R15: ffff8801db41a130 [ 30.433189] FS: 0000000001783940(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 [ 30.441382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.447239] CR2: 00007fd6fd9bb000 CR3: 0000000005e22004 CR4: 00000000001626f0 [ 30.454482] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.461728] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.468968] Call Trace: [ 30.471527] hardware_disable+0x34a/0x4b0 [ 30.475644] ? smp_call_function_many+0x76/0x6e0 [ 30.480368] ? lock_acquire+0x16b/0x420 [ 30.484308] ? kvm_io_bus_get_dev+0x1b0/0x1b0 [ 30.488770] kvm_arch_hardware_disable+0x35/0xd0 [ 30.493492] ? kvm_io_bus_get_dev+0x1b0/0x1b0 [ 30.497952] hardware_disable_nolock+0x30/0x40 [ 30.502510] on_each_cpu+0xca/0x1b0 [ 30.506114] hardware_disable_all_nolock+0x3e/0x50 [ 30.511012] kvm_put_kvm+0x69c/0xa70 [ 30.514698] ? kvm_irqfd_release+0xdd/0x120 [ 30.518986] ? kvm_put_kvm+0xa70/0xa70 [ 30.522840] kvm_vm_release+0x42/0x50 [ 30.526617] __fput+0x291/0x6e0 [ 30.529867] ____fput+0x15/0x20 [ 30.533112] task_work_run+0x122/0x1a0 [ 30.536971] do_exit+0x7f4/0x2da0 [ 30.540392] ? _raw_spin_unlock_irqrestore+0xa6/0xba [ 30.545465] ? mm_update_next_owner+0x690/0x690 [ 30.550112] ? do_group_exit+0x2a2/0x320 [ 30.554141] ? lock_downgrade+0x860/0x860 [ 30.558256] ? _raw_spin_unlock_irq+0x27/0x70 [ 30.562718] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.567713] do_group_exit+0x108/0x320 [ 30.571569] SyS_exit_group+0x1d/0x20 [ 30.575337] entry_SYSCALL_64_fastpath+0x23/0x9a [ 30.580065] RIP: 0033:0x452ac9 [ 30.583223] RSP: 002b:0000000000a2fa08 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [ 30.590896] RAX: ffffffffffffffda RBX: 000000000071bec8 RCX: 0000000000452ac9 [ 30.598162] RDX: 0000000000452ac9 RSI: 0000000000721070 RDI: 0000000000000000 [ 30.605399] RBP: 0000000000000000 R08: 000000000000001d R09: 000000000040e9c0 [ 30.612637] R10: 0000000000721068 R11: 0000000000000202 R12: 0000000000a2f9b0 [ 30.619873] R13: 000000000071bea0 R14: 00000000000004f0 R15: 0000000000000011 [ 30.627115] Code: 0f 1f 80 00 00 00 00 55 48 89 e5 0f 20 d8 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 0f 22 df 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 <0f> 22 e7 5d c3 0f 1f 80 00 00 00 00 55 48 89 e5 44 0f 20 c0 5d [ 30.646181] RIP: native_write_cr4+0x4/0x10 RSP: ffff8801a7bf7b18 [ 30.652296] ---[ end trace d5a0e588eddd1a9f ]--- [ 30.657018] Kernel panic - not syncing: Fatal exception [ 30.662383] Dumping ftrace buffer: [ 30.665887] (ftrace buffer empty) [ 30.669564] Kernel Offset: disabled [ 30.673156] Rebooting in 86400 seconds..