./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor817256401 <...> Warning: Permanently added '10.128.1.15' (ECDSA) to the list of known hosts. execve("./syz-executor817256401", ["./syz-executor817256401"], 0x7fff45415670 /* 10 vars */) = 0 brk(NULL) = 0x55555669e000 brk(0x55555669ec40) = 0x55555669ec40 arch_prctl(ARCH_SET_FS, 0x55555669e300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor817256401", 4096) = 27 brk(0x5555566bfc40) = 0x5555566bfc40 brk(0x5555566c0000) = 0x5555566c0000 mprotect(0x7f046638e000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 [ 59.570957][ T26] audit: type=1400 audit(1684459070.328:83): avc: denied { write } for pid=4987 comm="strace-static-x" path="pipe:[29484]" dev="pipefs" ino=29484 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 [ 59.610991][ T26] audit: type=1400 audit(1684459070.368:84): avc: denied { execmem } for pid=4990 comm="syz-executor817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 59.614292][ T4990] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 59.630991][ T26] audit: type=1400 audit(1684459070.368:85): avc: denied { read } for pid=4990 comm="syz-executor817" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 ioctl(3, KVM_CREATE_VM, 0) = 4 openat(AT_FDCWD, "memory.current", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 5 [ 59.671585][ T26] audit: type=1400 audit(1684459070.368:86): avc: denied { open } for pid=4990 comm="syz-executor817" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 59.695305][ T26] audit: type=1400 audit(1684459070.368:87): avc: denied { ioctl } for pid=4990 comm="syz-executor817" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 write(5, "\x9e\x25\x9c\x3a\x69\x88\x42\x00\x00\x00\x00\xdb\xc3\xb6\x29\x25\xd0\x32\xe0\x65\xd9\xba\xe4\xf6\x0f\xaa\xee\x4d\x4b\x41\x86\x47\x52\x97\xc1\xe0\xf6\x0f\x78\xa6\xe2\x23\x9d\x81\xde\x90\x64\xcf\x72\x39\xca\x98\x24\x80\xc2\xc5\x33\xc7\x19\xe2\xd3\xfe\x66\xa2\x9a\x82\x65\x20\x22\x59\x43\xb0\x02\xcf\x18\xa5\x2b\xb8\x90\x7c\x71\x97\xc1\xf3\xc2\x31\x61\x99\x37\x46\xbf\xf2\xcd\x66\x6d\x8e\x20\x45\x63\x7c"..., 34136651) = 16776128 mmap(0x20000000, 11755520, PROT_WRITE, MAP_SHARED|MAP_FIXED|MAP_POPULATE|MAP_STACK, 5, 0) = 0x20000000 preadv(5, 0x200015c0, 1, 0) = 16776128 ioctl(4, KVM_SET_USER_MEMORY_REGION, 0x20000400) = 0 ioctl(4, KVM_CREATE_VCPU, 0) = 6 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20000000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20001000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20002000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20003000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20004000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20005000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20006000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20007000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20008000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20009000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x2000a000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x2000b000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x2000c000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x2000d000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x2000e000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x2000f000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20010000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20011000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20012000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20013000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20014000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20015000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20016000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20017000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20000000}) = -1 EBADF (Bad file descriptor) ioctl(6, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 7 ioctl(7, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 ioctl(6, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 close(7) = 0 ioctl(6, KVM_SET_MSRS, 0x7ffff4f993d0) = 5 ioctl(6, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(6, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fe9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20fea000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20feb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fec000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fed000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fee000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20fef000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff0000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff1000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff2000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff3000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff4000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff5000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff6000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ff9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffa000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffc000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffd000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20ffe000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_GET_SREGS, 0x7ffff4f999d0) = -1 EBADF (Bad file descriptor) [ 60.077531][ T26] audit: type=1400 audit(1684459070.828:88): avc: denied { write } for pid=4990 comm="syz-executor817" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 60.091279][ T4990] ------------[ cut here ]------------ [ 60.106210][ T4990] WARNING: CPU: 1 PID: 4990 at arch/x86/kvm/vmx/vmx.c:5219 handle_exception_nmi+0xe5b/0xfb0 [ 60.116396][ T4990] Modules linked in: [ 60.120354][ T4990] CPU: 1 PID: 4990 Comm: syz-executor817 Not tainted 6.4.0-rc2-syzkaller-00018-g4d6d4c7f541d #0 [ 60.130818][ T4990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 60.140916][ T4990] RIP: 0010:handle_exception_nmi+0xe5b/0xfb0 [ 60.146935][ T4990] Code: e8 2a d6 5f 00 48 89 ef e8 e2 f2 fd ff 31 ff 89 c3 89 c6 e8 37 d2 5f 00 85 db 75 98 e8 0e d6 5f 00 0f 0b eb 8f e8 05 d6 5f 00 <0f> 0b e9 2e f7 ff ff 48 8b 7c 24 10 e8 74 a6 b1 00 e9 d0 f1 ff ff [ 60.166636][ T4990] RSP: 0018:ffffc900032f7ab8 EFLAGS: 00010293 [ 60.172740][ T4990] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 60.180741][ T4990] RDX: ffff88807a43e100 RSI: ffffffff81238deb RDI: 0000000000000001 [ 60.188720][ T4990] RBP: ffff888073774040 R08: 0000000000000001 R09: 0000000000000000 [ 60.197261][ T4990] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000034a5e000 [ 60.205291][ T4990] R13: 000000000000000f R14: 0000000080000300 R15: 0000000000000000 [ 60.213306][ T4990] FS: 000055555669e300(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 60.222309][ T4990] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 60.228903][ T4990] CR2: 000000003972cf64 CR3: 000000001e939000 CR4: 00000000003526e0 [ 60.236921][ T4990] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 60.244949][ T4990] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 60.253006][ T4990] Call Trace: [ 60.254074][ T26] audit: type=1400 audit(1684459071.018:89): avc: denied { append } for pid=4427 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 60.256278][ T4990] [ 60.281378][ T4990] ? vmx_guest_inject_ac+0x170/0x170 [ 60.281616][ T26] audit: type=1400 audit(1684459071.018:90): avc: denied { open } for pid=4427 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 60.286679][ T4990] vmx_handle_exit+0x49e/0x19b0 [ 60.314035][ T4990] vcpu_enter_guest+0x3728/0x5ff0 [ 60.314226][ T26] audit: type=1400 audit(1684459071.018:91): avc: denied { getattr } for pid=4427 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 60.319070][ T4990] ? lock_sync+0x190/0x190 [ 60.346091][ T4990] ? kvm_check_nested_events+0xf0/0xf0 [ 60.351613][ T4990] ? mark_held_locks+0x9f/0xe0 [ 60.356388][ T4990] ? __local_bh_enable_ip+0xa4/0x130 [ 60.361968][ T4990] ? lockdep_hardirqs_on+0x7d/0x100 [ 60.367189][ T4990] ? fpu_swap_kvm_fpstate+0x1aa/0x400 [ 60.372597][ T4990] ? __local_bh_enable_ip+0xa4/0x130 [ 60.377899][ T4990] ? kvm_arch_vcpu_ioctl_run+0xa35/0x2820 [ 60.383654][ T4990] kvm_arch_vcpu_ioctl_run+0xa35/0x2820 [ 60.389213][ T4990] kvm_vcpu_ioctl+0x574/0xea0 [ 60.393931][ T4990] ? kvm_vcpu_kick+0x4c0/0x4c0 [ 60.398705][ T4990] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 60.405256][ T4990] ? selinux_bprm_creds_for_exec+0xb20/0xb20 [ 60.411283][ T4990] ? find_held_lock+0x2d/0x110 [ 60.416040][ T4990] ? ptrace_notify+0xfe/0x140 [ 60.420753][ T4990] ? lock_downgrade+0x690/0x690 [ 60.425625][ T4990] ? selinux_file_ioctl+0xba/0x280 [ 60.430794][ T4990] ? kvm_vcpu_kick+0x4c0/0x4c0 [ 60.435586][ T4990] __x64_sys_ioctl+0x197/0x210 [ 60.440408][ T4990] do_syscall_64+0x39/0xb0 [ 60.444846][ T4990] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.450782][ T4990] RIP: 0033:0x7f0466322429 [ 60.455205][ T4990] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 60.474861][ T4990] RSP: 002b:00007ffff4f9af58 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 60.483357][ T4990] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0466322429 [ 60.491362][ T4990] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 60.499340][ T4990] RBP: 00007f04662e5e80 R08: 0000000000000000 R09: 0000000000000000 [ 60.507392][ T4990] R10: 0000000000009120 R11: 0000000000000246 R12: 00007f04662e5f10 [ 60.515403][ T4990] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 60.523408][ T4990] [ 60.526434][ T4990] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 60.533695][ T4990] CPU: 1 PID: 4990 Comm: syz-executor817 Not tainted 6.4.0-rc2-syzkaller-00018-g4d6d4c7f541d #0 [ 60.544103][ T4990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 60.554143][ T4990] Call Trace: [ 60.557411][ T4990] [ 60.560330][ T4990] dump_stack_lvl+0xd9/0x150 [ 60.564910][ T4990] panic+0x686/0x730 [ 60.568799][ T4990] ? panic_smp_self_stop+0xa0/0xa0 [ 60.573901][ T4990] ? show_trace_log_lvl+0x285/0x390 [ 60.579114][ T4990] ? handle_exception_nmi+0xe5b/0xfb0 [ 60.584508][ T4990] check_panic_on_warn+0xb1/0xc0 [ 60.589459][ T4990] __warn+0xf2/0x390 [ 60.593381][ T4990] ? handle_exception_nmi+0xe5b/0xfb0 [ 60.598766][ T4990] report_bug+0x2da/0x500 [ 60.603113][ T4990] handle_bug+0x3c/0x70 [ 60.607270][ T4990] exc_invalid_op+0x18/0x50 [ 60.611790][ T4990] asm_exc_invalid_op+0x1a/0x20 [ 60.616654][ T4990] RIP: 0010:handle_exception_nmi+0xe5b/0xfb0 [ 60.622737][ T4990] Code: e8 2a d6 5f 00 48 89 ef e8 e2 f2 fd ff 31 ff 89 c3 89 c6 e8 37 d2 5f 00 85 db 75 98 e8 0e d6 5f 00 0f 0b eb 8f e8 05 d6 5f 00 <0f> 0b e9 2e f7 ff ff 48 8b 7c 24 10 e8 74 a6 b1 00 e9 d0 f1 ff ff [ 60.642347][ T4990] RSP: 0018:ffffc900032f7ab8 EFLAGS: 00010293 [ 60.648417][ T4990] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 60.656388][ T4990] RDX: ffff88807a43e100 RSI: ffffffff81238deb RDI: 0000000000000001 [ 60.664359][ T4990] RBP: ffff888073774040 R08: 0000000000000001 R09: 0000000000000000 [ 60.672330][ T4990] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000034a5e000 [ 60.680301][ T4990] R13: 000000000000000f R14: 0000000080000300 R15: 0000000000000000 [ 60.688277][ T4990] ? handle_exception_nmi+0xe5b/0xfb0 [ 60.693665][ T4990] ? handle_exception_nmi+0xe5b/0xfb0 [ 60.699052][ T4990] ? vmx_guest_inject_ac+0x170/0x170 [ 60.704349][ T4990] vmx_handle_exit+0x49e/0x19b0 [ 60.709226][ T4990] vcpu_enter_guest+0x3728/0x5ff0 [ 60.714257][ T4990] ? lock_sync+0x190/0x190 [ 60.718682][ T4990] ? kvm_check_nested_events+0xf0/0xf0 [ 60.724152][ T4990] ? mark_held_locks+0x9f/0xe0 [ 60.728927][ T4990] ? __local_bh_enable_ip+0xa4/0x130 [ 60.734221][ T4990] ? lockdep_hardirqs_on+0x7d/0x100 [ 60.739515][ T4990] ? fpu_swap_kvm_fpstate+0x1aa/0x400 [ 60.744895][ T4990] ? __local_bh_enable_ip+0xa4/0x130 [ 60.750187][ T4990] ? kvm_arch_vcpu_ioctl_run+0xa35/0x2820 [ 60.755917][ T4990] kvm_arch_vcpu_ioctl_run+0xa35/0x2820 [ 60.761472][ T4990] kvm_vcpu_ioctl+0x574/0xea0 [ 60.766163][ T4990] ? kvm_vcpu_kick+0x4c0/0x4c0 [ 60.770936][ T4990] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 60.777444][ T4990] ? selinux_bprm_creds_for_exec+0xb20/0xb20 [ 60.783431][ T4990] ? find_held_lock+0x2d/0x110 [ 60.788205][ T4990] ? ptrace_notify+0xfe/0x140 [ 60.793064][ T4990] ? lock_downgrade+0x690/0x690 [ 60.797928][ T4990] ? selinux_file_ioctl+0xba/0x280 [ 60.803051][ T4990] ? kvm_vcpu_kick+0x4c0/0x4c0 [ 60.807822][ T4990] __x64_sys_ioctl+0x197/0x210 [ 60.812595][ T4990] do_syscall_64+0x39/0xb0 [ 60.817032][ T4990] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.822939][ T4990] RIP: 0033:0x7f0466322429 [ 60.827358][ T4990] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 60.846971][ T4990] RSP: 002b:00007ffff4f9af58 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 60.855388][ T4990] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0466322429 [ 60.863369][ T4990] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 60.871447][ T4990] RBP: 00007f04662e5e80 R08: 0000000000000000 R09: 0000000000000000 [ 60.879423][ T4990] R10: 0000000000009120 R11: 0000000000000246 R12: 00007f04662e5f10 [ 60.887399][ T4990] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 60.895374][ T4990] [ 60.898555][ T4990] Kernel Offset: disabled [ 60.902956][ T4990] Rebooting in 86400 seconds..