[ 40.958208][ T26] audit: type=1800 audit(1556691734.661:25): pid=7704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 40.985623][ T26] audit: type=1800 audit(1556691734.671:26): pid=7704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 41.011318][ T26] audit: type=1800 audit(1556691734.671:27): pid=7704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: rsyslog ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.52' (ECDSA) to the list of known hosts. 2019/05/01 06:22:24 fuzzer started 2019/05/01 06:22:27 dialing manager at 10.128.0.26:34869 2019/05/01 06:22:27 syscalls: 2440 2019/05/01 06:22:27 code coverage: enabled 2019/05/01 06:22:27 comparison tracing: enabled 2019/05/01 06:22:27 extra coverage: extra coverage is not supported by the kernel 2019/05/01 06:22:27 setuid sandbox: enabled 2019/05/01 06:22:27 namespace sandbox: enabled 2019/05/01 06:22:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 06:22:27 fault injection: enabled 2019/05/01 06:22:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 06:22:27 net packet injection: enabled 2019/05/01 06:22:27 net device setup: enabled 06:24:05 executing program 0: r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f00000000c0)='\a', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)="3894e0aa755678642797c675ec97969c56f2bf12f6039bb83db491604e9211ccc8408e7618ea37393e03de7717926ee49759d8a25fe0ee491d33465a996e601cab82e84deffd4f43b4b8de7c4fc0f12375966fce546ed08ab352a291b7f16898f20eb89ab513fe62e97796f94ae97e59c92f1eb86a95087d0372707700c803790f74e808663977e98054589d308059a63b0534d429abbad8c75335c1bcd5f596b4ef809be3492bf40907de6a8cedbb24290c9e878204418bbe903f3ced734530", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000001580)={r0, r1, r1}, &(0x7f00000015c0)=""/24, 0x18, &(0x7f0000001640)={&(0x7f0000001600)={'wp384-generic\x00'}}) syzkaller login: [ 152.164123][ T7889] IPVS: ftp: loaded support on port[0] = 21 06:24:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000000), 0x4) [ 152.323816][ T7889] chnl_net:caif_netlink_parms(): no params data found [ 152.430629][ T7889] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.438101][ T7889] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.447334][ T7889] device bridge_slave_0 entered promiscuous mode [ 152.456323][ T7889] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.463479][ T7889] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.471754][ T7889] device bridge_slave_1 entered promiscuous mode [ 152.499252][ T7889] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 152.501868][ T7892] IPVS: ftp: loaded support on port[0] = 21 [ 152.513718][ T7889] bond0: Enslaving bond_slave_1 as an active interface with an up link 06:24:06 executing program 2: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xc, 0x4, 0x4, 0x40, 0x0, r0}, 0x2c) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000000c0)={0x0, 0x20, 0x5, 0x1ee, "718ff970c680c785e56d0ae242a5a40b5e1cebe2a8cce00781d68b02952cde46"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f00000000c0)}, 0x10) [ 152.541706][ T7889] team0: Port device team_slave_0 added [ 152.563458][ T7889] team0: Port device team_slave_1 added [ 152.633916][ T7889] device hsr_slave_0 entered promiscuous mode [ 152.700867][ T7889] device hsr_slave_1 entered promiscuous mode 06:24:06 executing program 3: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xc, 0x4, 0x4, 0x40, 0x0, r0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f00000000c0)}, 0x10) [ 152.772278][ T7889] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.779530][ T7889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.787359][ T7889] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.794554][ T7889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.806345][ T7894] IPVS: ftp: loaded support on port[0] = 21 [ 153.049838][ T7889] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.064363][ T7897] IPVS: ftp: loaded support on port[0] = 21 [ 153.071141][ T7892] chnl_net:caif_netlink_parms(): no params data found [ 153.131153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.160715][ T17] bridge0: port 1(bridge_slave_0) entered disabled state 06:24:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xc, 0x0, 0x0, 0x0, 0x0, r0}, 0x2c) [ 153.179687][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.199859][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 153.277838][ T7889] 8021q: adding VLAN 0 to HW filter on device team0 [ 153.327300][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.337167][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.348228][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.355406][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.404462][ T7892] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.411680][ T7892] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.422050][ T7892] device bridge_slave_0 entered promiscuous mode [ 153.430414][ T7894] chnl_net:caif_netlink_parms(): no params data found [ 153.447506][ T3324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.458013][ T3324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.470288][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.477543][ T3324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.488251][ T3324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 153.497389][ T3324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 153.508568][ T3324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 153.517782][ T3324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 153.529918][ T7898] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 153.545834][ T7902] IPVS: ftp: loaded support on port[0] = 21 [ 153.552032][ T7892] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.559703][ T7892] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.568018][ T7892] device bridge_slave_1 entered promiscuous mode [ 153.597699][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 153.607680][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 06:24:07 executing program 5: r0 = socket$inet(0x2, 0x200000000003, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(0xffffffffffffffff) ioctl$PPPIOCGDEBUG(r2, 0x80047441, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x0, @local}, {0x0, @remote}, 0x2, {0x2, 0x4e21}, 'nr0\x00'}) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x54) creat(&(0x7f0000000200)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0801c201020000001500006700000000000000000300000000000000000000002c754042d522fb9c29363cb4194f038b31d0e2478c13dcc7f201c947621662e5614d45ab40ea575f068a01eedfe3fee7666f7e015c9300c0f42484ad20f9d5951971f624c5947fa17890b3021d6ed225d38beafb9fef5401b74e72079236d7ea765bbf244da7f9a1b987d72dd9d92a9fc283f724c46174f1a82e3b0a897b8372971e44482b4b9b6c65c7483542b69a2b2be14edc2ccab0f7ed1a91490ac963c1a78470a91b451705b2b18dbfbee13d99fab63222091272fd4bd1de03a10eaa623fc5d1d2494a160edbb2949e05cce40a51ed4e63d77dffbbb5c2a0760a3bc247fa90c3c17ee1f939aaca04390000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050a4e4df90398f0b76eb1e4c9b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000"/1548], 0x60c) [ 153.643603][ T7892] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 153.662362][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.672873][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.705495][ T7892] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 153.728191][ T7889] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 153.744590][ T7889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.788090][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.797628][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.842768][ T7906] IPVS: ftp: loaded support on port[0] = 21 [ 153.875433][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.883152][ T7894] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.891501][ T7894] device bridge_slave_0 entered promiscuous mode [ 153.913912][ T7892] team0: Port device team_slave_0 added [ 153.923951][ T7892] team0: Port device team_slave_1 added [ 153.930358][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.937431][ T7894] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.945473][ T7894] device bridge_slave_1 entered promiscuous mode [ 153.970053][ T7897] chnl_net:caif_netlink_parms(): no params data found [ 154.062182][ T7892] device hsr_slave_0 entered promiscuous mode [ 154.099225][ T7892] device hsr_slave_1 entered promiscuous mode [ 154.152067][ T7894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 154.166130][ T7889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 154.197198][ T7894] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 154.226894][ T7892] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.234118][ T7892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.268390][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.277071][ T7897] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.285742][ T7897] device bridge_slave_0 entered promiscuous mode [ 154.303644][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.334104][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.341525][ T7897] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.359773][ T7897] device bridge_slave_1 entered promiscuous mode [ 154.384402][ T7894] team0: Port device team_slave_0 added [ 154.404383][ T7897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 154.415469][ T7897] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 154.446508][ T7894] team0: Port device team_slave_1 added 06:24:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x7fffffff}, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 154.542226][ T7897] team0: Port device team_slave_0 added [ 154.550167][ T7919] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 154.587061][ T7897] team0: Port device team_slave_1 added [ 154.662538][ T7894] device hsr_slave_0 entered promiscuous mode [ 154.668645][ C0] hrtimer: interrupt took 62052 ns [ 154.675506][ T7919] kasan: CONFIG_KASAN_INLINE enabled [ 154.680897][ T7919] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 154.688996][ T7919] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 154.695921][ T7919] CPU: 0 PID: 7919 Comm: syz-executor.0 Not tainted 5.1.0-rc7-next-20190430 #33 [ 154.704949][ T7919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.715072][ T7919] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 154.720777][ T7919] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 154.740365][ T7919] RSP: 0018:ffff888065d2fa00 EFLAGS: 00010006 [ 154.746528][ T7919] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005df1000 [ 154.754502][ T7919] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 154.762458][ T7919] RBP: ffff888065d2fb10 R08: ffff888065d24100 R09: ffffed1015d06be0 [ 154.770429][ T7919] R10: ffffed1015d06bdf R11: ffff8880ae835efb R12: ffff888065e8006c [ 154.778387][ T7919] R13: 0000000000000001 R14: ffff888065e80070 R15: ffff888065e80040 [ 154.786347][ T7919] FS: 00007f6b5fe99700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 154.795259][ T7919] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 154.801836][ T7919] CR2: 00007f5978d14000 CR3: 0000000090a7b000 CR4: 00000000001426f0 [ 154.809829][ T7919] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 154.817789][ T7919] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 154.825932][ T7919] Call Trace: [ 154.829252][ T7919] ? emulator_read_emulated+0x50/0x50 [ 154.834639][ T7919] ? lock_acquire+0x16f/0x3f0 [ 154.839310][ T7919] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 154.845458][ T7919] kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 154.851016][ T7919] ? kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 154.862323][ T7919] kvm_vcpu_ioctl+0x4dc/0xf90 [ 154.867021][ T7919] ? kvm_set_memory_region+0x50/0x50 [ 154.872342][ T7919] ? tomoyo_path_number_perm+0x263/0x520 [ 154.877981][ T7919] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 154.883782][ T7919] ? lockdep_hardirqs_on+0x418/0x5d0 [ 154.889082][ T7919] ? retint_kernel+0x2b/0x2b [ 154.893680][ T7919] ? __fget+0x35a/0x550 [ 154.897843][ T7919] ? kvm_set_memory_region+0x50/0x50 [ 154.903134][ T7919] do_vfs_ioctl+0xd6e/0x1390 [ 154.907726][ T7919] ? ioctl_preallocate+0x210/0x210 [ 154.912943][ T7919] ? retint_kernel+0x2b/0x2b [ 154.917535][ T7919] ? tomoyo_file_ioctl+0x23/0x30 [ 154.922483][ T7919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.928720][ T7919] ? security_file_ioctl+0x93/0xc0 [ 154.933833][ T7919] ksys_ioctl+0xab/0xd0 [ 154.937982][ T7919] __x64_sys_ioctl+0x73/0xb0 [ 154.942566][ T7919] do_syscall_64+0x103/0x670 [ 154.947153][ T7919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.953030][ T7919] RIP: 0033:0x458da9 [ 154.956912][ T7919] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 154.983306][ T7919] RSP: 002b:00007f6b5fe98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.993839][ T7919] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 155.001804][ T7919] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 155.009770][ T7919] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 155.017742][ T7919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b5fe996d4 [ 155.025702][ T7919] R13: 00000000004c1d42 R14: 00000000004d4550 R15: 00000000ffffffff [ 155.033667][ T7919] Modules linked in: [ 155.037580][ T7919] ---[ end trace 157c31243782c201 ]--- [ 155.043056][ T7919] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 155.048758][ T7919] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 155.068347][ T7919] RSP: 0018:ffff888065d2fa00 EFLAGS: 00010006 [ 155.074405][ T7919] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005df1000 [ 155.082383][ T7919] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 155.090343][ T7919] RBP: ffff888065d2fb10 R08: ffff888065d24100 R09: ffffed1015d06be0 [ 155.098405][ T7919] R10: ffffed1015d06bdf R11: ffff8880ae835efb R12: ffff888065e8006c [ 155.106371][ T7919] R13: 0000000000000001 R14: ffff888065e80070 R15: ffff888065e80040 [ 155.114338][ T7919] FS: 00007f6b5fe99700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 155.123280][ T7919] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 155.129849][ T7919] CR2: 00007f5978d14000 CR3: 0000000090a7b000 CR4: 00000000001426f0 [ 155.137851][ T7919] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 155.145840][ T7919] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 155.153815][ T7919] Kernel panic - not syncing: Fatal exception [ 155.161135][ T7919] Kernel Offset: disabled [ 155.165461][ T7919] Rebooting in 86400 seconds..