[....] Starting enhanced syslogd: rsyslogd[ 14.896076] audit: type=1400 audit(1519721694.914:5): avc: denied { syslog } for pid=4004 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 17.997564] audit: type=1400 audit(1519721698.016:6): avc: denied { map } for pid=4143 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.29' (ECDSA) to the list of known hosts. 2018/02/27 08:55:04 fuzzer started [ 24.330963] audit: type=1400 audit(1519721704.349:7): avc: denied { map } for pid=4154 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/02/27 08:55:04 dialing manager at 10.128.0.26:35219 [ 26.801671] can: request_module (can-proto-0) failed. [ 26.810717] can: request_module (can-proto-0) failed. 2018/02/27 08:55:07 kcov=true, comps=true [ 27.304067] audit: type=1400 audit(1519721707.322:8): avc: denied { map } for pid=4154 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1082 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/02/27 08:55:07 executing program 7: r0 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r0, 0xffffffffffffffff) 2018/02/27 08:55:07 executing program 3: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000200)=0xc) setresuid(r1, 0x0, r1) 2018/02/27 08:55:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0x7, &(0x7f0000d41000), &(0x7f0000eebff0)) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 2018/02/27 08:55:07 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c40)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000b00, 0x0, 0x0, 0x20000bd8, 0x20000c08], 0x0, &(0x7f0000000ac0), &(0x7f0000000b00)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'yam0\x00', 'bridge0\x00', 'ifb0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x70, 0xa8, []}, []}, @common=@dnat={'dnat\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x0, []}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x0, []}]}, 0x1b0) 2018/02/27 08:55:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000ff4000)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}}, 0xa0) 2018/02/27 08:55:07 executing program 4: get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180), &(0x7f0000000200)=0x18) 2018/02/27 08:55:07 executing program 6: r0 = socket(0x2000000010, 0x3, 0x0) write(r0, &(0x7f0000e05000)="240000001a0025f00017fb1000f7fc0e020b00009604bf0202ffffeb0800040048186be0", 0x24) 2018/02/27 08:55:07 executing program 5: sendmsg$alg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[], 0x0, &(0x7f0000001480)=[]}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000040)) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)) [ 27.437195] audit: type=1400 audit(1519721707.455:9): avc: denied { map } for pid=4154 comm="syz-fuzzer" path="/root/syzkaller-shm416461445" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 27.507760] audit: type=1400 audit(1519721707.526:10): avc: denied { sys_admin } for pid=4199 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 27.543382] IPVS: ftp: loaded support on port[0] = 21 [ 27.591778] audit: type=1400 audit(1519721707.608:11): avc: denied { net_admin } for pid=4203 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 27.595619] IPVS: ftp: loaded support on port[0] = 21 [ 27.655715] IPVS: ftp: loaded support on port[0] = 21 [ 27.704225] IPVS: ftp: loaded support on port[0] = 21 [ 27.777564] IPVS: ftp: loaded support on port[0] = 21 [ 27.852324] IPVS: ftp: loaded support on port[0] = 21 [ 27.976920] IPVS: ftp: loaded support on port[0] = 21 [ 28.101380] IPVS: ftp: loaded support on port[0] = 21 [ 29.108823] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 29.321636] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 29.338649] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 29.493083] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 29.634977] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 29.802531] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 30.003491] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 30.056872] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 31.958969] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 31.965150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.208826] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 32.215000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.236786] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 32.243104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.284380] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 32.346720] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 32.353126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.453155] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 32.460403] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 32.466638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.568662] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 32.580978] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 32.587283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.601063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.632810] audit: type=1400 audit(1519721712.651:12): avc: denied { sys_chroot } for pid=4203 comm="syz-executor4" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 32.660952] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 2018/02/27 08:55:12 executing program 4: get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180), &(0x7f0000000200)=0x18) 2018/02/27 08:55:12 executing program 4: get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180), &(0x7f0000000200)=0x18) [ 32.709199] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 32.715298] 8021q: adding VLAN 0 to HW filter on device bond0 2018/02/27 08:55:12 executing program 4: get_robust_list(0x0, &(0x7f00000001c0)=&(0x7f0000000180), &(0x7f0000000200)=0x18) 2018/02/27 08:55:12 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', @ifru_map={0x9}}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x0, []}) [ 32.758758] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 32.833519] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 32.839691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.848868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/02/27 08:55:12 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', @ifru_map={0x9}}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x0, []}) [ 32.924132] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) 2018/02/27 08:55:13 executing program 3: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000200)=0xc) setresuid(r1, 0x0, r1) 2018/02/27 08:55:13 executing program 3: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000200)=0xc) setresuid(r1, 0x0, r1) [ 32.952560] audit: type=1400 audit(1519721712.971:13): avc: denied { setuid } for pid=5425 comm="syz-executor3" capability=7 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 32.956200] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 32.982730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.990336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.025322] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 33.034319] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 33.043070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 33.052703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/02/27 08:55:13 executing program 4: r0 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', @ifru_map={0x9}}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x0, []}) [ 33.076934] kasan: CONFIG_KASAN_INLINE enabled [ 33.081632] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 33.089156] general protection fault: 0000 [#1] SMP KASAN [ 33.094682] Dumping ftrace buffer: [ 33.098206] (ftrace buffer empty) [ 33.101913] Modules linked in: [ 33.105096] CPU: 0 PID: 5449 Comm: syz-executor0 Not tainted 4.16.0-rc3+ #331 [ 33.112359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.120137] kasan: CONFIG_KASAN_INLINE enabled [ 33.121714] RIP: 0010:hrtimer_active+0x1da/0x3c0 [ 33.121718] RSP: 0018:ffff8801b0b6f3c0 EFLAGS: 00010202 [ 33.126299] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 33.131011] RAX: 0000000000000008 RBX: 1ffff1003616dea5 RCX: ffffffff81610225 [ 33.131016] RDX: 000000000000fd45 RSI: ffffc90002db7000 RDI: 0000000000000010 [ 33.131021] RBP: ffff8801b0b6f500 R08: 0000000000002c02 R09: 0000000000000000 [ 33.131025] R10: 0000000000000011 R11: ffffed00380fd080 R12: 0000000000000010 [ 33.131029] R13: 0000000000000000 R14: ffffed003616de83 R15: dffffc0000000000 [ 33.131035] FS: 00007f9e7c762700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 [ 33.131040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.131044] CR2: 00007f9e7c741000 CR3: 00000001be4dc003 CR4: 00000000001626f0 [ 33.131051] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.131055] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.131057] Call Trace: [ 33.131074] ? hrtimer_forward+0x2d0/0x2d0 [ 33.131086] ? vmx_update_msr_bitmap+0x13a/0x430 [ 33.131106] ? setup_msrs+0x926/0x1d80 [ 33.131114] ? vmx_set_cr4+0x353/0x610 [ 33.131129] hrtimer_try_to_cancel+0x91/0x5b0 [ 33.131139] ? update_exception_bitmap+0x19a/0x200 [ 33.131147] ? __hrtimer_get_remaining+0x1c0/0x1c0 [ 33.131153] ? vmx_vcpu_reset+0x55f/0xc70 [ 33.131163] ? load_vmcs12_host_state+0x1fa0/0x1fa0 [ 33.258296] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 33.263114] ? trace_hardirqs_off+0x10/0x10 [ 33.267416] ? kvm_arch_vcpu_load+0x1c1/0x8d0 [ 33.271887] ? futex_wake+0x680/0x680 [ 33.275666] hrtimer_cancel+0x22/0x40 [ 33.279444] kvm_lapic_reset+0x93/0xf40 [ 33.283392] ? kvm_lapic_set_base+0x750/0x750 [ 33.287861] ? kvm_arch_vcpu_free+0x80/0x80 [ 33.292160] kvm_arch_vcpu_setup+0x31/0x50 [ 33.296370] kvm_vm_ioctl+0x52d/0x1cf0 [ 33.300238] ? kvm_set_memory_region+0x50/0x50 [ 33.304795] ? find_held_lock+0x35/0x1d0 [ 33.308843] ? lock_release+0xa40/0xa40 [ 33.312794] ? trace_hardirqs_off+0x10/0x10 [ 33.317092] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 33.322084] ? trace_hardirqs_on+0xd/0x10 [ 33.326216] ? find_held_lock+0x35/0x1d0 [ 33.330259] ? __fget+0x342/0x5b0 [ 33.333688] ? lock_downgrade+0x980/0x980 [ 33.337813] ? lock_release+0xa40/0xa40 [ 33.341763] ? __lock_is_held+0xb6/0x140 [ 33.345806] ? __fget+0x36b/0x5b0 [ 33.349233] ? handle_mm_fault+0x35b/0xb10 [ 33.353445] ? iterate_fd+0x3f0/0x3f0 [ 33.357226] ? __do_page_fault+0x5f7/0xc90 [ 33.361433] ? lock_downgrade+0x980/0x980 [ 33.365556] ? kvm_set_memory_region+0x50/0x50 [ 33.370114] do_vfs_ioctl+0x1b1/0x1520 [ 33.373981] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 33.378884] ? ioctl_preallocate+0x2b0/0x2b0 [ 33.383269] ? selinux_capable+0x40/0x40 [ 33.387308] ? SyS_futex+0x1fb/0x390 [ 33.391002] ? security_file_ioctl+0x7d/0xb0 [ 33.395382] ? security_file_ioctl+0x89/0xb0 [ 33.399766] SyS_ioctl+0x8f/0xc0 [ 33.403108] ? do_vfs_ioctl+0x1520/0x1520 [ 33.407234] do_syscall_64+0x281/0x940 [ 33.411096] ? __do_page_fault+0xc90/0xc90 [ 33.415302] ? _raw_spin_unlock_irq+0x27/0x70 [ 33.419772] ? finish_task_switch+0x1c1/0x7e0 [ 33.424242] ? syscall_return_slowpath+0x550/0x550 [ 33.429144] ? syscall_return_slowpath+0x2ac/0x550 [ 33.434049] ? prepare_exit_to_usermode+0x350/0x350 [ 33.439038] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 33.444380] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 33.449201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 33.454361] RIP: 0033:0x453d69 [ 33.457525] RSP: 002b:00007f9e7c761c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 33.465204] RAX: ffffffffffffffda RBX: 00007f9e7c7626d4 RCX: 0000000000453d69 [ 33.472447] RDX: 0000000000000002 RSI: 000000000000ae41 RDI: 0000000000000014 [ 33.479690] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 33.486932] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 33.494175] R13: 000000000000020e R14: 00000000006f31f0 R15: 0000000000000001 [ 33.501426] Code: ff ff 48 8d 85 18 ff ff ff 48 c1 e8 03 4e 8d 34 38 e8 1b f2 0f 00 48 8b 85 f0 fe ff ff c6 00 00 48 8b 85 d8 fe ff ff 48 c1 e8 03 <42> 80 3c 38 00 0f 85 c2 01 00 00 48 8b 85 e8 fe ff ff 48 8b 58 [ 33.520547] RIP: hrtimer_active+0x1da/0x3c0 RSP: ffff8801b0b6f3c0 [ 33.526767] general protection fault: 0000 [#2] SMP KASAN [ 33.526816] ---[ end trace 7322d861ab2558d6 ]--- [ 33.532287] Dumping ftrace buffer: [ 33.532292] (ftrace buffer empty) [ 33.537026] Kernel panic - not syncing: Fatal exception [ 33.540526] Modules linked in: [ 33.552707] CPU: 1 PID: 5445 Comm: syz-executor0 Tainted: G D 4.16.0-rc3+ #331 [ 33.561252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.570586] RIP: 0010:hrtimer_active+0x1da/0x3c0 [ 33.575312] RSP: 0018:ffff8801bf8673c0 EFLAGS: 00010202 [ 33.580649] RAX: 0000000000000008 RBX: 1ffff10037f0cea5 RCX: ffffffff81610225 [ 33.587895] RDX: 0000000000010000 RSI: ffffc90002cb5000 RDI: 0000000000000010 [ 33.595138] RBP: ffff8801bf867500 R08: 0000000000002c02 R09: 0000000000000000 [ 33.602382] R10: 0000000000000011 R11: ffffed003842a078 R12: 0000000000000010 [ 33.609627] R13: 0000000000000000 R14: ffffed0037f0ce83 R15: dffffc0000000000 [ 33.616874] FS: 00007f9e7c783700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 [ 33.625092] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.630947] CR2: 0000000000a3fb4c CR3: 00000001be4dc001 CR4: 00000000001626e0 [ 33.638192] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.645434] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.652676] Call Trace: [ 33.655247] ? hrtimer_forward+0x2d0/0x2d0 [ 33.659463] ? vmx_update_msr_bitmap+0x13a/0x430 [ 33.664198] ? setup_msrs+0x926/0x1d80 [ 33.668059] ? vmx_set_cr4+0x353/0x610 [ 33.671928] hrtimer_try_to_cancel+0x91/0x5b0 [ 33.676401] ? update_exception_bitmap+0x19a/0x200 [ 33.681304] ? __hrtimer_get_remaining+0x1c0/0x1c0 [ 33.686205] ? vmx_vcpu_reset+0x55f/0xc70 [ 33.690329] ? load_vmcs12_host_state+0x1fa0/0x1fa0 [ 33.695326] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 33.700143] ? trace_hardirqs_off+0x10/0x10 [ 33.704440] ? __lock_is_held+0xb6/0x140 [ 33.708479] ? kvm_arch_vcpu_load+0x1c1/0x8d0 [ 33.712952] hrtimer_cancel+0x22/0x40 [ 33.716726] kvm_lapic_reset+0x93/0xf40 [ 33.720675] ? kvm_lapic_set_base+0x750/0x750 [ 33.725145] ? kvm_arch_vcpu_free+0x80/0x80 [ 33.729457] kvm_arch_vcpu_setup+0x31/0x50 [ 33.733670] kvm_vm_ioctl+0x52d/0x1cf0 [ 33.737536] ? kvm_set_memory_region+0x50/0x50 [ 33.742096] ? find_held_lock+0x35/0x1d0 [ 33.746136] ? finish_task_switch+0x1c1/0x7e0 [ 33.750606] ? lock_downgrade+0x980/0x980 [ 33.754733] ? lock_release+0xa40/0xa40 [ 33.758681] ? do_raw_spin_trylock+0x190/0x190 [ 33.763238] ? compat_start_thread+0x80/0x80 [ 33.767622] ? trace_hardirqs_off+0x10/0x10 [ 33.771918] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 33.776908] ? trace_hardirqs_on+0xd/0x10 [ 33.781029] ? _raw_spin_unlock_irq+0x27/0x70 [ 33.785496] ? finish_task_switch+0x1c1/0x7e0 [ 33.789967] ? finish_task_switch+0x182/0x7e0 [ 33.794439] ? find_held_lock+0x35/0x1d0 [ 33.798480] ? __fget+0x342/0x5b0 [ 33.801907] ? lock_downgrade+0x980/0x980 [ 33.806034] ? lock_release+0xa40/0xa40 [ 33.809988] ? __lock_is_held+0xb6/0x140 [ 33.814031] ? __fget+0x36b/0x5b0 [ 33.817463] ? iterate_fd+0x3f0/0x3f0 [ 33.821240] ? check_same_owner+0x320/0x320 [ 33.825538] ? get_unused_fd_flags+0x190/0x190 [ 33.830104] ? kvm_set_memory_region+0x50/0x50 [ 33.834661] do_vfs_ioctl+0x1b1/0x1520 [ 33.838528] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 33.843432] ? ioctl_preallocate+0x2b0/0x2b0 [ 33.847818] ? selinux_capable+0x40/0x40 [ 33.851857] ? exit_to_usermode_loop+0x8b/0x2f0 [ 33.856507] ? security_file_ioctl+0x7d/0xb0 [ 33.860891] ? security_file_ioctl+0x89/0xb0 [ 33.865275] SyS_ioctl+0x8f/0xc0 [ 33.868618] ? do_vfs_ioctl+0x1520/0x1520 [ 33.872743] do_syscall_64+0x281/0x940 [ 33.876607] ? __do_page_fault+0xc90/0xc90 [ 33.880814] ? _raw_spin_unlock_irq+0x27/0x70 [ 33.885283] ? finish_task_switch+0x1c1/0x7e0 [ 33.889755] ? syscall_return_slowpath+0x550/0x550 [ 33.894659] ? syscall_return_slowpath+0x2ac/0x550 [ 33.899566] ? prepare_exit_to_usermode+0x350/0x350 [ 33.904559] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 33.909901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 33.914722] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 33.919885] RIP: 0033:0x453d69 [ 33.923053] RSP: 002b:00007f9e7c782c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 33.930738] RAX: ffffffffffffffda RBX: 00007f9e7c7836d4 RCX: 0000000000453d69 [ 33.937983] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000014 [ 33.945231] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 33.952478] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 33.959724] R13: 000000000000020e R14: 00000000006f31f0 R15: 0000000000000000 [ 33.966976] Code: ff ff 48 8d 85 18 ff ff ff 48 c1 e8 03 4e 8d 34 38 e8 1b f2 0f 00 48 8b 85 f0 fe ff ff c6 00 00 48 8b 85 d8 fe ff ff 48 c1 e8 03 <42> 80 3c 38 00 0f 85 c2 01 00 00 48 8b 85 e8 fe ff ff 48 8b 58 [ 33.986112] RIP: hrtimer_active+0x1da/0x3c0 RSP: ffff8801bf8673c0 [ 33.992778] Dumping ftrace buffer: [ 33.996301] (ftrace buffer empty) [ 33.999983] Kernel Offset: disabled [ 34.003582] Rebooting in 86400 seconds..