./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1357235618
<...>
forked to background, child pid 3185[ 25.551048][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0
no interfaces have a carrier
[ 25.571351][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK
syzkaller
Warning: Permanently added '10.128.1.23' (ECDSA) to the list of known hosts.
execve("./syz-executor1357235618", ["./syz-executor1357235618"], 0x7ffd9158be30 /* 10 vars */) = 0
brk(NULL) = 0x555556299000
brk(0x555556299c40) = 0x555556299c40
arch_prctl(ARCH_SET_FS, 0x555556299300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor1357235618", 4096) = 28
brk(0x5555562bac40) = 0x5555562bac40
brk(0x5555562bb000) = 0x5555562bb000
mprotect(0x7f9f735f2000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3
ioctl(3, KVM_CREATE_VM, 0) = 4
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe8000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe9000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fea000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20feb000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20fec000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fed000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fee000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fef000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20ff0000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff1000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff2000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff3000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff4000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff5000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff6000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff7000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff8000}) = 0
syzkaller login: [ 43.163013][ T3613] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff9000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ffa000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffb000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffc000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffd000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffe000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20fff000}) = 0
ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe8000}) = 0
ioctl(-1, KVM_GET_SREGS, 0x7ffde805d3f0) = -1 EBADF (Bad file descriptor)
ioctl(4, KVM_CREATE_VCPU, 0) = 5
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe9000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fea000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20feb000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20fec000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fed000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fee000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fef000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20ff0000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff1000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff2000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff3000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff4000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff5000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff6000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff7000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff8000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff9000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ffa000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffb000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffc000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffd000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffe000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20fff000}) = -1 EBADF (Bad file descriptor)
ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor)
ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0
openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6
ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=33, entries=[...]}) = 0
ioctl(5, KVM_SET_CPUID2, {nent=33, entries=[...]}) = 0
close(6) = 0
ioctl(5, KVM_SET_MSRS, 0x7ffde805cdd0) = 5
ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0
ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0
ioctl(5, KVM_RUN, 0) = 0
ioctl(5, KVM_SET_NESTED_STATE, 0x20000280) = -1 EINVAL (Invalid argument)
[ 43.268688][ T3613] ------------[ cut here ]------------
[ 43.274284][ T3613] WARNING: CPU: 0 PID: 3613 at arch/x86/kvm/vmx/vmx.c:5136 handle_exception_nmi+0x8e6/0xe00
[ 43.284442][ T3613] Modules linked in:
[ 43.288346][ T3613] CPU: 0 PID: 3613 Comm: syz-executor135 Not tainted 6.0.0-rc5-syzkaller-00089-g6879c2d3b960 #0
[ 43.299169][ T3613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
[ 43.309501][ T3613] RIP: 0010:handle_exception_nmi+0x8e6/0xe00
[ 43.315580][ T3613] Code: 60 9f 64 00 0f 0b e9 4a f9 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 87 f7 ff ff e8 84 4b b8 00 e9 7d f7 ff ff e8 3a 9f 64 00 <0f> 0b e9 53 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a4 f8 ff
[ 43.335367][ T3613] RSP: 0018:ffffc9000397f488 EFLAGS: 00010293
[ 43.341428][ T3613] RAX: ffffffff8124f8c6 RBX: ffff88807c30c000 RCX: ffff888074219d80
[ 43.349566][ T3613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 43.357821][ T3613] RBP: 0000000000000000 R08: ffffffff8124f513 R09: ffffed100f86184a
[ 43.365836][ T3613] R10: ffffed100f86184a R11: 1ffff1100f861849 R12: 1ffff1100f86181b
[ 43.373865][ T3613] R13: 0000000000000000 R14: 00000000a0000975 R15: dffffc0000000000
[ 43.381933][ T3613] FS: 0000555556299300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
[ 43.390893][ T3613] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 43.397512][ T3613] CR2: 000055c40e76d6f8 CR3: 0000000025f28000 CR4: 00000000003526e0
[ 43.405525][ T3613] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 43.413521][ T3613] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 43.421490][ T3613] Call Trace:
[ 43.424820][ T3613]
[ 43.427757][ T3613] vmx_handle_exit+0x26/0x160
[ 43.432428][ T3613] vcpu_enter_guest+0x6bbe/0x95a0
[ 43.437555][ T3613] ? rcu_lock_release+0x5/0x20
[ 43.442340][ T3613] ? validate_chain+0x126/0x6600
[ 43.447422][ T3613] ? trace_kvm_fpu+0x260/0x260
[ 43.452195][ T3613] ? preempt_count_add+0x8d/0x180
[ 43.457268][ T3613] ? is_bpf_text_address+0x253/0x270
[ 43.462571][ T3613] ? reacquire_held_locks+0x680/0x680
[ 43.467993][ T3613] ? unwind_get_return_address+0x48/0x80
[ 43.473661][ T3613] ? arch_stack_walk+0xf8/0x140
[ 43.478514][ T3613] ? stack_trace_save+0x12d/0x1f0
[ 43.483776][ T3613] ? reacquire_held_locks+0x680/0x680
[ 43.489163][ T3613] ? rcu_read_lock_sched_held+0x89/0x130
[ 43.494859][ T3613] ? __bpf_trace_rcu_stall_warning+0x10/0x10
[ 43.500857][ T3613] ? kfree+0xda/0x210
[ 43.504919][ T3613] ? emulator_get_cr+0x260/0x360
[ 43.509867][ T3613] ? trace_kvm_mmio+0xeb/0x280
[ 43.514678][ T3613] ? read_prepare+0x97/0x100
[ 43.519269][ T3613] ? emulator_read_write+0x99/0x590
[ 43.524602][ T3613] ? vmx_complete_nested_posted_interrupt+0x690/0x690
[ 43.531374][ T3613] ? segmented_read+0x2dc/0x3c0
[ 43.536274][ T3613] ? memcpy+0x3c/0x60
[ 43.540258][ T3613] ? writeback+0x63a/0xa40
[ 43.544791][ T3613] ? em_xchg+0xe0/0xe0
[ 43.548868][ T3613] ? string_registers_quirk+0x810/0x810
[ 43.554471][ T3613] ? emulator_write_gpr+0xa3/0xc0
[ 43.559498][ T3613] ? x86_emulate_insn+0x45b/0x3780
[ 43.564671][ T3613] ? xorw_ax_dx+0x10/0x10
[ 43.569001][ T3613] ? kvm_pmu_trigger_event+0x58a/0x5c0
[ 43.574494][ T3613] ? kvm_cpu_has_pending_timer+0x80/0x1f0
[ 43.580245][ T3613] vcpu_run+0x50d/0x10e0
[ 43.584536][ T3613] ? complete_emulated_pio+0x70/0x70
[ 43.589821][ T3613] kvm_arch_vcpu_ioctl_run+0x541/0xd10
[ 43.595325][ T3613] kvm_vcpu_ioctl+0x7ef/0xcf0
[ 43.600022][ T3613] ? print_irqtrace_events+0x220/0x220
[ 43.605515][ T3613] ? kvm_create_vcpu_debugfs+0x1a0/0x1a0
[ 43.611148][ T3613] ? memset+0x1f/0x40
[ 43.615166][ T3613] ? smack_file_ioctl+0x34c/0x3a0
[ 43.620195][ T3613] ? smack_file_alloc_security+0xd0/0xd0
[ 43.625913][ T3613] ? print_irqtrace_events+0x220/0x220
[ 43.631380][ T3613] ? vtime_user_exit+0x2b2/0x3e0
[ 43.636375][ T3613] ? __ct_user_exit+0x81/0xe0
[ 43.641076][ T3613] ? bpf_lsm_file_ioctl+0x5/0x10
[ 43.646074][ T3613] ? security_file_ioctl+0x9d/0xb0
[ 43.651187][ T3613] ? kvm_create_vcpu_debugfs+0x1a0/0x1a0
[ 43.656870][ T3613] __se_sys_ioctl+0xfb/0x170
[ 43.661464][ T3613] do_syscall_64+0x2b/0x70
[ 43.665933][ T3613] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 43.671925][ T3613] RIP: 0033:0x7f9f73584199
[ 43.676379][ T3613] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 43.696015][ T3613] RSP: 002b:00007ffde805e978 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 43.704463][ T3613] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9f73584199
[ 43.712437][ T3613] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005
[ 43.720444][ T3613] RBP: 00007f9f73547bf0 R08: 0000000000000000 R09: 0000000000000000
[ 43.728449][ T3613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f73547c80
[ 43.736466][ T3613] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 43.744478][ T3613]
[ 43.747488][ T3613] Kernel panic - not syncing: panic_on_warn set ...
[ 43.754077][ T3613] CPU: 1 PID: 3613 Comm: syz-executor135 Not tainted 6.0.0-rc5-syzkaller-00089-g6879c2d3b960 #0
[ 43.764486][ T3613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
[ 43.774533][ T3613] Call Trace:
[ 43.777803][ T3613]
[ 43.780728][ T3613] dump_stack_lvl+0x1e3/0x2cb
[ 43.785403][ T3613] ? io_alloc_page_table+0x110/0x110
[ 43.790677][ T3613] ? panic+0x76b/0x76b
[ 43.795615][ T3613] ? vscnprintf+0x59/0x80
[ 43.799935][ T3613] ? handle_exception_nmi+0x820/0xe00
[ 43.805305][ T3613] panic+0x316/0x76b
[ 43.809194][ T3613] ? __warn+0x131/0x220
[ 43.813342][ T3613] ? fb_is_primary_device+0xcc/0xcc
[ 43.818547][ T3613] ? handle_exception_nmi+0x8e6/0xe00
[ 43.823910][ T3613] __warn+0x1fa/0x220
[ 43.827890][ T3613] ? handle_exception_nmi+0x8e6/0xe00
[ 43.833255][ T3613] report_bug+0x1b3/0x2d0
[ 43.837580][ T3613] handle_bug+0x3d/0x70
[ 43.841738][ T3613] exc_invalid_op+0x16/0x40
[ 43.846231][ T3613] asm_exc_invalid_op+0x16/0x20
[ 43.851090][ T3613] RIP: 0010:handle_exception_nmi+0x8e6/0xe00
[ 43.857059][ T3613] Code: 60 9f 64 00 0f 0b e9 4a f9 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 87 f7 ff ff e8 84 4b b8 00 e9 7d f7 ff ff e8 3a 9f 64 00 <0f> 0b e9 53 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a4 f8 ff
[ 43.876651][ T3613] RSP: 0018:ffffc9000397f488 EFLAGS: 00010293
[ 43.882711][ T3613] RAX: ffffffff8124f8c6 RBX: ffff88807c30c000 RCX: ffff888074219d80
[ 43.890675][ T3613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 43.898637][ T3613] RBP: 0000000000000000 R08: ffffffff8124f513 R09: ffffed100f86184a
[ 43.906598][ T3613] R10: ffffed100f86184a R11: 1ffff1100f861849 R12: 1ffff1100f86181b
[ 43.914558][ T3613] R13: 0000000000000000 R14: 00000000a0000975 R15: dffffc0000000000
[ 43.922526][ T3613] ? handle_exception_nmi+0x533/0xe00
[ 43.927891][ T3613] ? handle_exception_nmi+0x8e6/0xe00
[ 43.933259][ T3613] ? handle_exception_nmi+0x8e6/0xe00
[ 43.938627][ T3613] vmx_handle_exit+0x26/0x160
[ 43.943296][ T3613] vcpu_enter_guest+0x6bbe/0x95a0
[ 43.948327][ T3613] ? rcu_lock_release+0x5/0x20
[ 43.953086][ T3613] ? validate_chain+0x126/0x6600
[ 43.958018][ T3613] ? trace_kvm_fpu+0x260/0x260
[ 43.962775][ T3613] ? preempt_count_add+0x8d/0x180
[ 43.967797][ T3613] ? is_bpf_text_address+0x253/0x270
[ 43.973170][ T3613] ? reacquire_held_locks+0x680/0x680
[ 43.978535][ T3613] ? unwind_get_return_address+0x48/0x80
[ 43.984162][ T3613] ? arch_stack_walk+0xf8/0x140
[ 43.989015][ T3613] ? stack_trace_save+0x12d/0x1f0
[ 43.994034][ T3613] ? reacquire_held_locks+0x680/0x680
[ 43.999407][ T3613] ? rcu_read_lock_sched_held+0x89/0x130
[ 44.005031][ T3613] ? __bpf_trace_rcu_stall_warning+0x10/0x10
[ 44.011001][ T3613] ? kfree+0xda/0x210
[ 44.014979][ T3613] ? emulator_get_cr+0x260/0x360
[ 44.019909][ T3613] ? trace_kvm_mmio+0xeb/0x280
[ 44.024664][ T3613] ? read_prepare+0x97/0x100
[ 44.029264][ T3613] ? emulator_read_write+0x99/0x590
[ 44.034452][ T3613] ? vmx_complete_nested_posted_interrupt+0x690/0x690
[ 44.041301][ T3613] ? segmented_read+0x2dc/0x3c0
[ 44.046144][ T3613] ? memcpy+0x3c/0x60
[ 44.050117][ T3613] ? writeback+0x63a/0xa40
[ 44.054547][ T3613] ? em_xchg+0xe0/0xe0
[ 44.058611][ T3613] ? string_registers_quirk+0x810/0x810
[ 44.064150][ T3613] ? emulator_write_gpr+0xa3/0xc0
[ 44.069163][ T3613] ? x86_emulate_insn+0x45b/0x3780
[ 44.074268][ T3613] ? xorw_ax_dx+0x10/0x10
[ 44.078590][ T3613] ? kvm_pmu_trigger_event+0x58a/0x5c0
[ 44.084046][ T3613] ? kvm_cpu_has_pending_timer+0x80/0x1f0
[ 44.089756][ T3613] vcpu_run+0x50d/0x10e0
[ 44.094024][ T3613] ? complete_emulated_pio+0x70/0x70
[ 44.099312][ T3613] kvm_arch_vcpu_ioctl_run+0x541/0xd10
[ 44.104779][ T3613] kvm_vcpu_ioctl+0x7ef/0xcf0
[ 44.109465][ T3613] ? print_irqtrace_events+0x220/0x220
[ 44.114929][ T3613] ? kvm_create_vcpu_debugfs+0x1a0/0x1a0
[ 44.120553][ T3613] ? memset+0x1f/0x40
[ 44.124530][ T3613] ? smack_file_ioctl+0x34c/0x3a0
[ 44.129555][ T3613] ? smack_file_alloc_security+0xd0/0xd0
[ 44.135188][ T3613] ? print_irqtrace_events+0x220/0x220
[ 44.140636][ T3613] ? vtime_user_exit+0x2b2/0x3e0
[ 44.145567][ T3613] ? __ct_user_exit+0x81/0xe0
[ 44.150325][ T3613] ? bpf_lsm_file_ioctl+0x5/0x10
[ 44.155375][ T3613] ? security_file_ioctl+0x9d/0xb0
[ 44.160479][ T3613] ? kvm_create_vcpu_debugfs+0x1a0/0x1a0
[ 44.166102][ T3613] __se_sys_ioctl+0xfb/0x170
[ 44.170687][ T3613] do_syscall_64+0x2b/0x70
[ 44.175096][ T3613] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 44.180994][ T3613] RIP: 0033:0x7f9f73584199
[ 44.185406][ T3613] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 44.205433][ T3613] RSP: 002b:00007ffde805e978 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 44.213839][ T3613] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9f73584199
[ 44.221817][ T3613] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005
[ 44.229800][ T3613] RBP: 00007f9f73547bf0 R08: 0000000000000000 R09: 0000000000000000
[ 44.237785][ T3613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f73547c80
[ 44.245751][ T3613] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 44.253725][ T3613]
[ 44.257023][ T3613] Kernel Offset: disabled
[ 44.261410][ T3613] Rebooting in 86400 seconds..