./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1357235618 <...> forked to background, child pid 3185[ 25.551048][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 no interfaces have a carrier [ 25.571351][ T3186] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.1.23' (ECDSA) to the list of known hosts. execve("./syz-executor1357235618", ["./syz-executor1357235618"], 0x7ffd9158be30 /* 10 vars */) = 0 brk(NULL) = 0x555556299000 brk(0x555556299c40) = 0x555556299c40 arch_prctl(ARCH_SET_FS, 0x555556299300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1357235618", 4096) = 28 brk(0x5555562bac40) = 0x5555562bac40 brk(0x5555562bb000) = 0x5555562bb000 mprotect(0x7f9f735f2000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 ioctl(3, KVM_CREATE_VM, 0) = 4 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe8000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fea000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20feb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20fec000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fed000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fee000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fef000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20ff0000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff1000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff2000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff3000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff4000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff5000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff6000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff7000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff8000}) = 0 syzkaller login: [ 43.163013][ T3613] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff9000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ffa000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffb000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffc000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffd000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffe000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20fff000}) = 0 ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe8000}) = 0 ioctl(-1, KVM_GET_SREGS, 0x7ffde805d3f0) = -1 EBADF (Bad file descriptor) ioctl(4, KVM_CREATE_VCPU, 0) = 5 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fea000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20feb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20fec000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fed000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fee000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fef000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20ff0000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff1000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff2000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff3000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff4000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff5000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff6000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ffa000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffc000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffd000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffe000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20fff000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor) ioctl(5, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 6 ioctl(6, KVM_GET_SUPPORTED_CPUID, {nent=33, entries=[...]}) = 0 ioctl(5, KVM_SET_CPUID2, {nent=33, entries=[...]}) = 0 close(6) = 0 ioctl(5, KVM_SET_MSRS, 0x7ffde805cdd0) = 5 ioctl(5, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(5, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 ioctl(5, KVM_RUN, 0) = 0 ioctl(5, KVM_SET_NESTED_STATE, 0x20000280) = -1 EINVAL (Invalid argument) [ 43.268688][ T3613] ------------[ cut here ]------------ [ 43.274284][ T3613] WARNING: CPU: 0 PID: 3613 at arch/x86/kvm/vmx/vmx.c:5136 handle_exception_nmi+0x8e6/0xe00 [ 43.284442][ T3613] Modules linked in: [ 43.288346][ T3613] CPU: 0 PID: 3613 Comm: syz-executor135 Not tainted 6.0.0-rc5-syzkaller-00089-g6879c2d3b960 #0 [ 43.299169][ T3613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 43.309501][ T3613] RIP: 0010:handle_exception_nmi+0x8e6/0xe00 [ 43.315580][ T3613] Code: 60 9f 64 00 0f 0b e9 4a f9 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 87 f7 ff ff e8 84 4b b8 00 e9 7d f7 ff ff e8 3a 9f 64 00 <0f> 0b e9 53 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a4 f8 ff [ 43.335367][ T3613] RSP: 0018:ffffc9000397f488 EFLAGS: 00010293 [ 43.341428][ T3613] RAX: ffffffff8124f8c6 RBX: ffff88807c30c000 RCX: ffff888074219d80 [ 43.349566][ T3613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 43.357821][ T3613] RBP: 0000000000000000 R08: ffffffff8124f513 R09: ffffed100f86184a [ 43.365836][ T3613] R10: ffffed100f86184a R11: 1ffff1100f861849 R12: 1ffff1100f86181b [ 43.373865][ T3613] R13: 0000000000000000 R14: 00000000a0000975 R15: dffffc0000000000 [ 43.381933][ T3613] FS: 0000555556299300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 43.390893][ T3613] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 43.397512][ T3613] CR2: 000055c40e76d6f8 CR3: 0000000025f28000 CR4: 00000000003526e0 [ 43.405525][ T3613] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 43.413521][ T3613] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 43.421490][ T3613] Call Trace: [ 43.424820][ T3613] [ 43.427757][ T3613] vmx_handle_exit+0x26/0x160 [ 43.432428][ T3613] vcpu_enter_guest+0x6bbe/0x95a0 [ 43.437555][ T3613] ? rcu_lock_release+0x5/0x20 [ 43.442340][ T3613] ? validate_chain+0x126/0x6600 [ 43.447422][ T3613] ? trace_kvm_fpu+0x260/0x260 [ 43.452195][ T3613] ? preempt_count_add+0x8d/0x180 [ 43.457268][ T3613] ? is_bpf_text_address+0x253/0x270 [ 43.462571][ T3613] ? reacquire_held_locks+0x680/0x680 [ 43.467993][ T3613] ? unwind_get_return_address+0x48/0x80 [ 43.473661][ T3613] ? arch_stack_walk+0xf8/0x140 [ 43.478514][ T3613] ? stack_trace_save+0x12d/0x1f0 [ 43.483776][ T3613] ? reacquire_held_locks+0x680/0x680 [ 43.489163][ T3613] ? rcu_read_lock_sched_held+0x89/0x130 [ 43.494859][ T3613] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 43.500857][ T3613] ? kfree+0xda/0x210 [ 43.504919][ T3613] ? emulator_get_cr+0x260/0x360 [ 43.509867][ T3613] ? trace_kvm_mmio+0xeb/0x280 [ 43.514678][ T3613] ? read_prepare+0x97/0x100 [ 43.519269][ T3613] ? emulator_read_write+0x99/0x590 [ 43.524602][ T3613] ? vmx_complete_nested_posted_interrupt+0x690/0x690 [ 43.531374][ T3613] ? segmented_read+0x2dc/0x3c0 [ 43.536274][ T3613] ? memcpy+0x3c/0x60 [ 43.540258][ T3613] ? writeback+0x63a/0xa40 [ 43.544791][ T3613] ? em_xchg+0xe0/0xe0 [ 43.548868][ T3613] ? string_registers_quirk+0x810/0x810 [ 43.554471][ T3613] ? emulator_write_gpr+0xa3/0xc0 [ 43.559498][ T3613] ? x86_emulate_insn+0x45b/0x3780 [ 43.564671][ T3613] ? xorw_ax_dx+0x10/0x10 [ 43.569001][ T3613] ? kvm_pmu_trigger_event+0x58a/0x5c0 [ 43.574494][ T3613] ? kvm_cpu_has_pending_timer+0x80/0x1f0 [ 43.580245][ T3613] vcpu_run+0x50d/0x10e0 [ 43.584536][ T3613] ? complete_emulated_pio+0x70/0x70 [ 43.589821][ T3613] kvm_arch_vcpu_ioctl_run+0x541/0xd10 [ 43.595325][ T3613] kvm_vcpu_ioctl+0x7ef/0xcf0 [ 43.600022][ T3613] ? print_irqtrace_events+0x220/0x220 [ 43.605515][ T3613] ? kvm_create_vcpu_debugfs+0x1a0/0x1a0 [ 43.611148][ T3613] ? memset+0x1f/0x40 [ 43.615166][ T3613] ? smack_file_ioctl+0x34c/0x3a0 [ 43.620195][ T3613] ? smack_file_alloc_security+0xd0/0xd0 [ 43.625913][ T3613] ? print_irqtrace_events+0x220/0x220 [ 43.631380][ T3613] ? vtime_user_exit+0x2b2/0x3e0 [ 43.636375][ T3613] ? __ct_user_exit+0x81/0xe0 [ 43.641076][ T3613] ? bpf_lsm_file_ioctl+0x5/0x10 [ 43.646074][ T3613] ? security_file_ioctl+0x9d/0xb0 [ 43.651187][ T3613] ? kvm_create_vcpu_debugfs+0x1a0/0x1a0 [ 43.656870][ T3613] __se_sys_ioctl+0xfb/0x170 [ 43.661464][ T3613] do_syscall_64+0x2b/0x70 [ 43.665933][ T3613] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.671925][ T3613] RIP: 0033:0x7f9f73584199 [ 43.676379][ T3613] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 43.696015][ T3613] RSP: 002b:00007ffde805e978 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 43.704463][ T3613] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9f73584199 [ 43.712437][ T3613] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 43.720444][ T3613] RBP: 00007f9f73547bf0 R08: 0000000000000000 R09: 0000000000000000 [ 43.728449][ T3613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f73547c80 [ 43.736466][ T3613] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 43.744478][ T3613] [ 43.747488][ T3613] Kernel panic - not syncing: panic_on_warn set ... [ 43.754077][ T3613] CPU: 1 PID: 3613 Comm: syz-executor135 Not tainted 6.0.0-rc5-syzkaller-00089-g6879c2d3b960 #0 [ 43.764486][ T3613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 43.774533][ T3613] Call Trace: [ 43.777803][ T3613] [ 43.780728][ T3613] dump_stack_lvl+0x1e3/0x2cb [ 43.785403][ T3613] ? io_alloc_page_table+0x110/0x110 [ 43.790677][ T3613] ? panic+0x76b/0x76b [ 43.795615][ T3613] ? vscnprintf+0x59/0x80 [ 43.799935][ T3613] ? handle_exception_nmi+0x820/0xe00 [ 43.805305][ T3613] panic+0x316/0x76b [ 43.809194][ T3613] ? __warn+0x131/0x220 [ 43.813342][ T3613] ? fb_is_primary_device+0xcc/0xcc [ 43.818547][ T3613] ? handle_exception_nmi+0x8e6/0xe00 [ 43.823910][ T3613] __warn+0x1fa/0x220 [ 43.827890][ T3613] ? handle_exception_nmi+0x8e6/0xe00 [ 43.833255][ T3613] report_bug+0x1b3/0x2d0 [ 43.837580][ T3613] handle_bug+0x3d/0x70 [ 43.841738][ T3613] exc_invalid_op+0x16/0x40 [ 43.846231][ T3613] asm_exc_invalid_op+0x16/0x20 [ 43.851090][ T3613] RIP: 0010:handle_exception_nmi+0x8e6/0xe00 [ 43.857059][ T3613] Code: 60 9f 64 00 0f 0b e9 4a f9 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 87 f7 ff ff e8 84 4b b8 00 e9 7d f7 ff ff e8 3a 9f 64 00 <0f> 0b e9 53 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a4 f8 ff [ 43.876651][ T3613] RSP: 0018:ffffc9000397f488 EFLAGS: 00010293 [ 43.882711][ T3613] RAX: ffffffff8124f8c6 RBX: ffff88807c30c000 RCX: ffff888074219d80 [ 43.890675][ T3613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 43.898637][ T3613] RBP: 0000000000000000 R08: ffffffff8124f513 R09: ffffed100f86184a [ 43.906598][ T3613] R10: ffffed100f86184a R11: 1ffff1100f861849 R12: 1ffff1100f86181b [ 43.914558][ T3613] R13: 0000000000000000 R14: 00000000a0000975 R15: dffffc0000000000 [ 43.922526][ T3613] ? handle_exception_nmi+0x533/0xe00 [ 43.927891][ T3613] ? handle_exception_nmi+0x8e6/0xe00 [ 43.933259][ T3613] ? handle_exception_nmi+0x8e6/0xe00 [ 43.938627][ T3613] vmx_handle_exit+0x26/0x160 [ 43.943296][ T3613] vcpu_enter_guest+0x6bbe/0x95a0 [ 43.948327][ T3613] ? rcu_lock_release+0x5/0x20 [ 43.953086][ T3613] ? validate_chain+0x126/0x6600 [ 43.958018][ T3613] ? trace_kvm_fpu+0x260/0x260 [ 43.962775][ T3613] ? preempt_count_add+0x8d/0x180 [ 43.967797][ T3613] ? is_bpf_text_address+0x253/0x270 [ 43.973170][ T3613] ? reacquire_held_locks+0x680/0x680 [ 43.978535][ T3613] ? unwind_get_return_address+0x48/0x80 [ 43.984162][ T3613] ? arch_stack_walk+0xf8/0x140 [ 43.989015][ T3613] ? stack_trace_save+0x12d/0x1f0 [ 43.994034][ T3613] ? reacquire_held_locks+0x680/0x680 [ 43.999407][ T3613] ? rcu_read_lock_sched_held+0x89/0x130 [ 44.005031][ T3613] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 44.011001][ T3613] ? kfree+0xda/0x210 [ 44.014979][ T3613] ? emulator_get_cr+0x260/0x360 [ 44.019909][ T3613] ? trace_kvm_mmio+0xeb/0x280 [ 44.024664][ T3613] ? read_prepare+0x97/0x100 [ 44.029264][ T3613] ? emulator_read_write+0x99/0x590 [ 44.034452][ T3613] ? vmx_complete_nested_posted_interrupt+0x690/0x690 [ 44.041301][ T3613] ? segmented_read+0x2dc/0x3c0 [ 44.046144][ T3613] ? memcpy+0x3c/0x60 [ 44.050117][ T3613] ? writeback+0x63a/0xa40 [ 44.054547][ T3613] ? em_xchg+0xe0/0xe0 [ 44.058611][ T3613] ? string_registers_quirk+0x810/0x810 [ 44.064150][ T3613] ? emulator_write_gpr+0xa3/0xc0 [ 44.069163][ T3613] ? x86_emulate_insn+0x45b/0x3780 [ 44.074268][ T3613] ? xorw_ax_dx+0x10/0x10 [ 44.078590][ T3613] ? kvm_pmu_trigger_event+0x58a/0x5c0 [ 44.084046][ T3613] ? kvm_cpu_has_pending_timer+0x80/0x1f0 [ 44.089756][ T3613] vcpu_run+0x50d/0x10e0 [ 44.094024][ T3613] ? complete_emulated_pio+0x70/0x70 [ 44.099312][ T3613] kvm_arch_vcpu_ioctl_run+0x541/0xd10 [ 44.104779][ T3613] kvm_vcpu_ioctl+0x7ef/0xcf0 [ 44.109465][ T3613] ? print_irqtrace_events+0x220/0x220 [ 44.114929][ T3613] ? kvm_create_vcpu_debugfs+0x1a0/0x1a0 [ 44.120553][ T3613] ? memset+0x1f/0x40 [ 44.124530][ T3613] ? smack_file_ioctl+0x34c/0x3a0 [ 44.129555][ T3613] ? smack_file_alloc_security+0xd0/0xd0 [ 44.135188][ T3613] ? print_irqtrace_events+0x220/0x220 [ 44.140636][ T3613] ? vtime_user_exit+0x2b2/0x3e0 [ 44.145567][ T3613] ? __ct_user_exit+0x81/0xe0 [ 44.150325][ T3613] ? bpf_lsm_file_ioctl+0x5/0x10 [ 44.155375][ T3613] ? security_file_ioctl+0x9d/0xb0 [ 44.160479][ T3613] ? kvm_create_vcpu_debugfs+0x1a0/0x1a0 [ 44.166102][ T3613] __se_sys_ioctl+0xfb/0x170 [ 44.170687][ T3613] do_syscall_64+0x2b/0x70 [ 44.175096][ T3613] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 44.180994][ T3613] RIP: 0033:0x7f9f73584199 [ 44.185406][ T3613] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 44.205433][ T3613] RSP: 002b:00007ffde805e978 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 44.213839][ T3613] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9f73584199 [ 44.221817][ T3613] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 44.229800][ T3613] RBP: 00007f9f73547bf0 R08: 0000000000000000 R09: 0000000000000000 [ 44.237785][ T3613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f73547c80 [ 44.245751][ T3613] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 44.253725][ T3613] [ 44.257023][ T3613] Kernel Offset: disabled [ 44.261410][ T3613] Rebooting in 86400 seconds..