./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor460282598 <...> Warning: Permanently added '10.128.0.117' (ED25519) to the list of known hosts. execve("./syz-executor460282598", ["./syz-executor460282598"], 0x7ffd10eb7090 /* 10 vars */) = 0 brk(NULL) = 0x5555558e4000 brk(0x5555558e4d00) = 0x5555558e4d00 arch_prctl(ARCH_SET_FS, 0x5555558e4380) = 0 set_tid_address(0x5555558e4650) = 5027 set_robust_list(0x5555558e4660, 24) = 0 rseq(0x5555558e4ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor460282598", 4096) = 27 getrandom("\x99\x1d\xef\xc9\xae\xd9\x09\x6e", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x5555558e4d00 brk(0x555555905d00) = 0x555555905d00 brk(0x555555906000) = 0x555555906000 mprotect(0x7fd765472000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 ioctl(3, KVM_CREATE_VM, 0) = 4 openat(AT_FDCWD, "memory.current", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 5 [ 67.874900][ T5027] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. write(5, "\x9e\x25\x9c\x3a\x69\x88\x42\x00\x00\x00\x00\xdb\xc3\xb6\x29\x25\xd0\x32\xe0\x65\xd9\xba\xe4\xf6\x0f\xaa\xee\x4d\x4b\x41\x86\x47\x52\x97\xc1\xe0\xf6\x0f\x78\xa6\xe2\x23\x9d\x81\xde\x90\x64\xcf\x72\x39\xca\x98\x24\x80\xc2\xc5\x33\xc7\x19\xe2\xd3\xfe\x66\xa2\x9a\x82\x65\x20\x22\x59\x43\xb0\x02\xcf\x18\xa5\x2b\xb8\x90\x7c\x71\x97\xc1\xf3\xc2\x31\x61\x99\x37\x46\xbf\xf2\xcd\x66\x6d\x8e\x20\x45\x63\x7c"..., 34136651) = 16776128 mmap(0x20000000, 11755520, PROT_WRITE, MAP_SHARED|MAP_FIXED|MAP_POPULATE|MAP_STACK, 5, 0) = 0x20000000 preadv(5, 0x200015c0, 1, 0) = 16776128 ioctl(4, KVM_SET_USER_MEMORY_REGION, 0x20000400) = 0 ioctl(4, KVM_CREATE_VCPU, 0) = 6 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20000000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20001000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20002000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20003000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20004000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20005000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20006000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20007000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20008000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20009000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x2000a000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x2000b000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x2000c000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x2000d000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x2000e000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x2000f000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20010000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20011000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20012000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20013000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20014000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20015000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20016000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20017000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20000000}) = -1 EBADF (Bad file descriptor) ioctl(6, KVM_GET_SREGS, {cs={base=0xffff0000, limit=65535, selector=61440, type=11, present=1, dpl=0, db=0, s=1, l=0, g=0, avl=0}, ...}) = 0 openat(AT_FDCWD, "/dev/kvm", O_RDWR) = 7 ioctl(7, KVM_GET_SUPPORTED_CPUID, {nent=31, entries=[...]}) = 0 ioctl(6, KVM_SET_CPUID2, {nent=31, entries=[...]}) = 0 close(7) = 0 ioctl(6, KVM_SET_MSRS, 0x7fff7c430150) = 5 ioctl(6, KVM_SET_SREGS, {cs={base=0, limit=1048575, selector=48, type=11, present=1, dpl=0, db=1, s=1, l=0, g=0, avl=0}, ...}) = 0 ioctl(6, KVM_SET_REGS, {rax=0, ..., rsp=0xf80, rbp=0, ..., rip=0, rflags=0x2}) = 0 ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20fe7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20fe8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20fe9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20fea000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20feb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20fec000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20fed000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20fee000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20fef000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20ff0000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x20ff1000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x20ff2000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x20ff3000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x20ff4000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x20ff5000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x20ff6000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20ff7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20ff8000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20ff9000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20ffa000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20ffb000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20ffc000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20ffd000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20ffe000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20fe7000}) = -1 EBADF (Bad file descriptor) ioctl(-1, KVM_GET_SREGS, 0x7fff7c430740) = -1 EBADF (Bad file descriptor) [ 68.268638][ T5027] ------------[ cut here ]------------ [ 68.274216][ T5027] WARNING: CPU: 0 PID: 5027 at arch/x86/kvm/vmx/vmx.c:5233 handle_exception_nmi+0xfc3/0x11c0 [ 68.284455][ T5027] Modules linked in: [ 68.288386][ T5027] CPU: 0 PID: 5027 Comm: syz-executor460 Not tainted 6.5.0-rc4-next-20230803-syzkaller #0 [ 68.298336][ T5027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 68.308468][ T5027] RIP: 0010:handle_exception_nmi+0xfc3/0x11c0 [ 68.314563][ T5027] Code: b3 e9 fd ff 31 ff 41 89 c4 89 c6 e8 e7 a0 62 00 45 85 e4 0f 85 35 ff ff ff e8 69 a5 62 00 0f 0b e9 29 ff ff ff e8 5d a5 62 00 <0f> 0b e9 95 f6 ff ff e8 51 a5 62 00 31 f6 48 89 df e8 07 73 ee ff [ 68.334259][ T5027] RSP: 0018:ffffc90003a0fb00 EFLAGS: 00010293 [ 68.340390][ T5027] RAX: 0000000000000000 RBX: ffff888024f38000 RCX: 0000000000000000 [ 68.348533][ T5027] RDX: ffff8880258d3b80 RSI: ffffffff8123ee63 RDI: 0000000000000001 [ 68.356581][ T5027] RBP: 0000000034a5e000 R08: 0000000000000001 R09: 0000000000000000 [ 68.364613][ T5027] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 68.372726][ T5027] R13: 0000000000000000 R14: ffff888024f380d8 R15: ffff888072b74000 [ 68.380779][ T5027] FS: 00005555558e4380(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 68.389762][ T5027] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 68.396394][ T5027] CR2: 000000003972cf64 CR3: 0000000072b42000 CR4: 00000000003526f0 [ 68.404398][ T5027] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 68.412421][ T5027] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 68.420434][ T5027] Call Trace: [ 68.423724][ T5027] [ 68.426719][ T5027] ? __warn+0xe6/0x380 [ 68.430849][ T5027] ? handle_exception_nmi+0xfc3/0x11c0 [ 68.436356][ T5027] ? report_bug+0x3bc/0x580 [ 68.440903][ T5027] ? handle_bug+0x3c/0x70 [ 68.445284][ T5027] ? exc_invalid_op+0x17/0x40 [ 68.450008][ T5027] ? asm_exc_invalid_op+0x1a/0x20 [ 68.455099][ T5027] ? handle_exception_nmi+0xfc3/0x11c0 [ 68.460684][ T5027] ? handle_exception_nmi+0xfc3/0x11c0 [ 68.466205][ T5027] ? vmx_guest_inject_ac+0x170/0x170 [ 68.471530][ T5027] vmx_handle_exit+0x63f/0x1ac0 [ 68.476447][ T5027] kvm_arch_vcpu_ioctl_run+0x3daf/0x63b0 [ 68.482144][ T5027] ? trace_contention_end+0xd6/0x100 [ 68.487524][ T5027] ? kvm_arch_vcpu_runnable+0x6d0/0x6d0 [ 68.493130][ T5027] ? reacquire_held_locks+0x4b0/0x4b0 [ 68.498593][ T5027] ? kvm_vcpu_ioctl+0x59f/0x1040 [ 68.504920][ T5027] kvm_vcpu_ioctl+0x59f/0x1040 [ 68.509703][ T5027] ? kvm_vcpu_kick+0x4d0/0x4d0 [ 68.514490][ T5027] ? rcu_is_watching+0x12/0xb0 [ 68.519305][ T5027] ? lock_release+0x4bf/0x680 [ 68.524037][ T5027] ? bpf_lsm_file_ioctl+0x9/0x10 [ 68.529062][ T5027] ? kvm_vcpu_kick+0x4d0/0x4d0 [ 68.533877][ T5027] __x64_sys_ioctl+0x18f/0x210 [ 68.538722][ T5027] do_syscall_64+0x38/0xb0 [ 68.543188][ T5027] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.549141][ T5027] RIP: 0033:0x7fd7653ff6f9 [ 68.553612][ T5027] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 68.573305][ T5027] RSP: 002b:00007fff7c431cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 68.581770][ T5027] RAX: ffffffffffffffda RBX: 00007fff7c431e98 RCX: 00007fd7653ff6f9 [ 68.589802][ T5027] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 68.597851][ T5027] RBP: 00007fd765472610 R08: 0000000000000000 R09: 00007fff7c431e98 [ 68.605982][ T5027] R10: 0000000000009120 R11: 0000000000000246 R12: 0000000000000001 [ 68.613993][ T5027] R13: 00007fff7c431e88 R14: 0000000000000001 R15: 0000000000000001 [ 68.622034][ T5027] [ 68.625123][ T5027] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 68.632409][ T5027] CPU: 0 PID: 5027 Comm: syz-executor460 Not tainted 6.5.0-rc4-next-20230803-syzkaller #0 [ 68.642308][ T5027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 68.652382][ T5027] Call Trace: [ 68.655669][ T5027] [ 68.658606][ T5027] dump_stack_lvl+0xd9/0x1b0 [ 68.663230][ T5027] panic+0x6a4/0x750 [ 68.667150][ T5027] ? panic_smp_self_stop+0xa0/0xa0 [ 68.672279][ T5027] ? show_trace_log_lvl+0x29d/0x3c0 [ 68.677502][ T5027] ? handle_exception_nmi+0xfc3/0x11c0 [ 68.682980][ T5027] check_panic_on_warn+0xab/0xb0 [ 68.687947][ T5027] __warn+0xf2/0x380 [ 68.691860][ T5027] ? handle_exception_nmi+0xfc3/0x11c0 [ 68.697336][ T5027] report_bug+0x3bc/0x580 [ 68.701687][ T5027] handle_bug+0x3c/0x70 [ 68.705869][ T5027] exc_invalid_op+0x17/0x40 [ 68.710395][ T5027] asm_exc_invalid_op+0x1a/0x20 [ 68.715356][ T5027] RIP: 0010:handle_exception_nmi+0xfc3/0x11c0 [ 68.721439][ T5027] Code: b3 e9 fd ff 31 ff 41 89 c4 89 c6 e8 e7 a0 62 00 45 85 e4 0f 85 35 ff ff ff e8 69 a5 62 00 0f 0b e9 29 ff ff ff e8 5d a5 62 00 <0f> 0b e9 95 f6 ff ff e8 51 a5 62 00 31 f6 48 89 df e8 07 73 ee ff [ 68.741065][ T5027] RSP: 0018:ffffc90003a0fb00 EFLAGS: 00010293 [ 68.747170][ T5027] RAX: 0000000000000000 RBX: ffff888024f38000 RCX: 0000000000000000 [ 68.755163][ T5027] RDX: ffff8880258d3b80 RSI: ffffffff8123ee63 RDI: 0000000000000001 [ 68.763147][ T5027] RBP: 0000000034a5e000 R08: 0000000000000001 R09: 0000000000000000 [ 68.771137][ T5027] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 68.779124][ T5027] R13: 0000000000000000 R14: ffff888024f380d8 R15: ffff888072b74000 [ 68.787118][ T5027] ? handle_exception_nmi+0xfc3/0x11c0 [ 68.792610][ T5027] ? vmx_guest_inject_ac+0x170/0x170 [ 68.797931][ T5027] vmx_handle_exit+0x63f/0x1ac0 [ 68.802806][ T5027] kvm_arch_vcpu_ioctl_run+0x3daf/0x63b0 [ 68.808468][ T5027] ? trace_contention_end+0xd6/0x100 [ 68.813784][ T5027] ? kvm_arch_vcpu_runnable+0x6d0/0x6d0 [ 68.819361][ T5027] ? reacquire_held_locks+0x4b0/0x4b0 [ 68.824769][ T5027] ? kvm_vcpu_ioctl+0x59f/0x1040 [ 68.829727][ T5027] kvm_vcpu_ioctl+0x59f/0x1040 [ 68.834511][ T5027] ? kvm_vcpu_kick+0x4d0/0x4d0 [ 68.839299][ T5027] ? rcu_is_watching+0x12/0xb0 [ 68.844083][ T5027] ? lock_release+0x4bf/0x680 [ 68.848796][ T5027] ? bpf_lsm_file_ioctl+0x9/0x10 [ 68.853761][ T5027] ? kvm_vcpu_kick+0x4d0/0x4d0 [ 68.858552][ T5027] __x64_sys_ioctl+0x18f/0x210 [ 68.863353][ T5027] do_syscall_64+0x38/0xb0 [ 68.867805][ T5027] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.873733][ T5027] RIP: 0033:0x7fd7653ff6f9 [ 68.878175][ T5027] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 68.897803][ T5027] RSP: 002b:00007fff7c431cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 68.906233][ T5027] RAX: ffffffffffffffda RBX: 00007fff7c431e98 RCX: 00007fd7653ff6f9 [ 68.914220][ T5027] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 68.922202][ T5027] RBP: 00007fd765472610 R08: 0000000000000000 R09: 00007fff7c431e98 [ 68.930189][ T5027] R10: 0000000000009120 R11: 0000000000000246 R12: 0000000000000001 [ 68.938178][ T5027] R13: 00007fff7c431e88 R14: 0000000000000001 R15: 0000000000000001 [ 68.946174][ T5027] [ 68.949313][ T5027] Kernel Offset: disabled [ 68.953650][ T5027] Rebooting in 86400 seconds..