[Kernel-packages] [Bug 1859958] Re: kvm clients receive lots auf segfaults
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859958 Title: kvm clients receive lots auf segfaults Status in linux package in Ubuntu: Expired Bug description: Kubuntu 19.10 on a Z420 Workstation with 32GB ECC RAM / CPU E5-2690 (v0) looks like the same problem as the redhat bug https://bugzilla.redhat.com/show_bug.cgi?id=1738386 symptoms are two different kernel WARNINGS; but kvm guests receive lots of segfaults; this is for windows oder linux guests even bluescreens happens: looks like it always happens on CPU 11; no syslog messages about bad ram (ecc errors) and memtest shows no bad ram: there a two types of warnings: journalctl | grep WARNING:.CPU Dec 17 20:53:22 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] Dec 23 23:10:40 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Jan 04 09:35:35 XYZXYZ kernel: WARNING: CPU: 11 PID: 7357 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] Jan 06 20:21:16 XYZXYZ kernel: WARNING: CPU: 11 PID: 7357 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Jan 16 09:26:22 XYZXYZ kernel: WARNING: CPU: 11 PID: 16621 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] # first type: vmlinuz-5.3.0-24-generic Dec 23 23:10:40 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Dec 23 23:10:40 XYZXYZ kernel: Modules linked in: nls_utf8 isofs xt_policy chacha_x86_64 chacha_generic poly1305_x86_64 poly1305_generic chacha20poly1305 vhost Dec 23 23:10:40 XYZXYZ kernel: snd_seq_midi_emul snd_cmipci sb_edac snd_hda_codec snd_mpu401_uart snd_hda_core snd_opl3_lib x86_pkg_temp_thermal intel_powercl Dec 23 23:10:40 XYZXYZ kernel: firewire_ohci isci vfio_pci ahci drm firewire_core vfio_virqfd e1000e libsas i2c_i801 libahci lpc_ich vfio_iommu_type1 crc_itu_ Dec 23 23:10:40 XYZXYZ kernel: CPU: 11 PID: 4391 Comm: CPU 0/KVM Tainted: G W 5.3.0-24-generic #26-Ubuntu Dec 23 23:10:40 XYZXYZ kernel: Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.95 06/13/2019 Dec 23 23:10:40 XYZXYZ kernel: RIP: 0010:fpregs_assert_state_consistent+0x36/0x50 Dec 23 23:10:40 XYZXYZ kernel: Code: 6b 01 00 48 8b 10 48 89 e5 80 e6 40 75 1e 48 8d 90 80 13 00 00 65 8b 35 d8 25 bd 7a 65 48 8b 0c 25 40 6b 01 00 48 39 d1 74 Dec 23 23:10:40 XYZXYZ kernel: RSP: 0018:a4ad021fbd40 EFLAGS: 00010203 Dec 23 23:10:40 XYZXYZ kernel: RAX: 8e92e33adc00 RBX: 8e92c7af8000 RCX: Dec 23 23:10:40 XYZXYZ kernel: RDX: 8e92e33aef80 RSI: 000b RDI: 01d9 Dec 23 23:10:40 XYZXYZ kernel: RBP: a4ad021fbd40 R08: 8e92c7b2d200 R09: 0014 Dec 23 23:10:40 XYZXYZ kernel: R10: 8e928863fbc0 R11: R12: 000b Dec 23 23:10:40 XYZXYZ kernel: R13: 000b R14: 8e92c7af8058 R15: 8e92c7af8000 Dec 23 23:10:40 XYZXYZ kernel: FS: 7f2b854bd700() GS:8e932fac() knlGS: Dec 23 23:10:40 XYZXYZ kernel: CS: 0010 DS: ES: CR0: 80050033 Dec 23 23:10:40 XYZXYZ kernel: CR2: 0448 CR3: 0007e6a44003 CR4: 000626e0 Dec 23 23:10:40 XYZXYZ kernel: Call Trace: Dec 23 23:10:40 XYZXYZ kernel: kvm_arch_vcpu_load+0x6f/0x290 [kvm] Dec 23 23:10:40 XYZXYZ kernel: vcpu_load+0x2c/0x40 [kvm] Dec 23 23:10:40 XYZXYZ kernel: kvm_arch_vcpu_ioctl_run+0x1b/0x590 [kvm] Dec 23 23:10:40 XYZXYZ kernel: kvm_vcpu_ioctl+0x24b/0x610 [kvm] Dec 23 23:10:40 XYZXYZ kernel: ? __seccomp_filter+0x7e/0x680 Dec 23 23:10:40 XYZXYZ kernel: ? futex_wake+0x8b/0x190 Dec 23 23:10:40 XYZXYZ kernel: do_vfs_ioctl+0x407/0x670 Dec 23 23:10:40 XYZXYZ kernel: ? __secure_computing+0x42/0xe0 Dec 23 23:10:40 XYZXYZ kernel: ksys_ioctl+0x67/0x90 Dec 23 23:10:40 XYZXYZ kernel: __x64_sys_ioctl+0x1a/0x20 Dec 23 23:10:40 XYZXYZ kernel: do_syscall_64+0x5a/0x130 Dec 23 23:10:40 XYZXYZ kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 Dec 23 23:10:40 XYZXYZ kernel: RIP: 0033:0x7f2b87ae667b Dec 23 23:10:40 XYZXYZ kernel: Code: 0f 1e fa 48 8b 05 15 28 0d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f Dec 23 23:10:40 XYZXYZ kernel: RSP: 002b:7f2b854bc5f8 EFLAGS: 0246 ORIG_RAX: 0010 Dec 23 23:10:40 XYZXYZ kernel: RAX: ffda RBX: ae80 RCX: 7f2b87ae667b Dec 23 23:10:40 XYZXYZ kernel: RDX: RSI: ae80 RDI: 0014 Dec 23 23:10:40 XYZXYZ kernel:
[Kernel-packages] [Bug 1859958] Re: kvm clients receive lots auf segfaults
@ ben980: can you post the required logs? i can't from this system sorry @ all -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859958 Title: kvm clients receive lots auf segfaults Status in linux package in Ubuntu: Incomplete Bug description: Kubuntu 19.10 on a Z420 Workstation with 32GB ECC RAM / CPU E5-2690 (v0) looks like the same problem as the redhat bug https://bugzilla.redhat.com/show_bug.cgi?id=1738386 symptoms are two different kernel WARNINGS; but kvm guests receive lots of segfaults; this is for windows oder linux guests even bluescreens happens: looks like it always happens on CPU 11; no syslog messages about bad ram (ecc errors) and memtest shows no bad ram: there a two types of warnings: journalctl | grep WARNING:.CPU Dec 17 20:53:22 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] Dec 23 23:10:40 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Jan 04 09:35:35 XYZXYZ kernel: WARNING: CPU: 11 PID: 7357 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] Jan 06 20:21:16 XYZXYZ kernel: WARNING: CPU: 11 PID: 7357 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Jan 16 09:26:22 XYZXYZ kernel: WARNING: CPU: 11 PID: 16621 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] # first type: vmlinuz-5.3.0-24-generic Dec 23 23:10:40 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Dec 23 23:10:40 XYZXYZ kernel: Modules linked in: nls_utf8 isofs xt_policy chacha_x86_64 chacha_generic poly1305_x86_64 poly1305_generic chacha20poly1305 vhost Dec 23 23:10:40 XYZXYZ kernel: snd_seq_midi_emul snd_cmipci sb_edac snd_hda_codec snd_mpu401_uart snd_hda_core snd_opl3_lib x86_pkg_temp_thermal intel_powercl Dec 23 23:10:40 XYZXYZ kernel: firewire_ohci isci vfio_pci ahci drm firewire_core vfio_virqfd e1000e libsas i2c_i801 libahci lpc_ich vfio_iommu_type1 crc_itu_ Dec 23 23:10:40 XYZXYZ kernel: CPU: 11 PID: 4391 Comm: CPU 0/KVM Tainted: G W 5.3.0-24-generic #26-Ubuntu Dec 23 23:10:40 XYZXYZ kernel: Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.95 06/13/2019 Dec 23 23:10:40 XYZXYZ kernel: RIP: 0010:fpregs_assert_state_consistent+0x36/0x50 Dec 23 23:10:40 XYZXYZ kernel: Code: 6b 01 00 48 8b 10 48 89 e5 80 e6 40 75 1e 48 8d 90 80 13 00 00 65 8b 35 d8 25 bd 7a 65 48 8b 0c 25 40 6b 01 00 48 39 d1 74 Dec 23 23:10:40 XYZXYZ kernel: RSP: 0018:a4ad021fbd40 EFLAGS: 00010203 Dec 23 23:10:40 XYZXYZ kernel: RAX: 8e92e33adc00 RBX: 8e92c7af8000 RCX: Dec 23 23:10:40 XYZXYZ kernel: RDX: 8e92e33aef80 RSI: 000b RDI: 01d9 Dec 23 23:10:40 XYZXYZ kernel: RBP: a4ad021fbd40 R08: 8e92c7b2d200 R09: 0014 Dec 23 23:10:40 XYZXYZ kernel: R10: 8e928863fbc0 R11: R12: 000b Dec 23 23:10:40 XYZXYZ kernel: R13: 000b R14: 8e92c7af8058 R15: 8e92c7af8000 Dec 23 23:10:40 XYZXYZ kernel: FS: 7f2b854bd700() GS:8e932fac() knlGS: Dec 23 23:10:40 XYZXYZ kernel: CS: 0010 DS: ES: CR0: 80050033 Dec 23 23:10:40 XYZXYZ kernel: CR2: 0448 CR3: 0007e6a44003 CR4: 000626e0 Dec 23 23:10:40 XYZXYZ kernel: Call Trace: Dec 23 23:10:40 XYZXYZ kernel: kvm_arch_vcpu_load+0x6f/0x290 [kvm] Dec 23 23:10:40 XYZXYZ kernel: vcpu_load+0x2c/0x40 [kvm] Dec 23 23:10:40 XYZXYZ kernel: kvm_arch_vcpu_ioctl_run+0x1b/0x590 [kvm] Dec 23 23:10:40 XYZXYZ kernel: kvm_vcpu_ioctl+0x24b/0x610 [kvm] Dec 23 23:10:40 XYZXYZ kernel: ? __seccomp_filter+0x7e/0x680 Dec 23 23:10:40 XYZXYZ kernel: ? futex_wake+0x8b/0x190 Dec 23 23:10:40 XYZXYZ kernel: do_vfs_ioctl+0x407/0x670 Dec 23 23:10:40 XYZXYZ kernel: ? __secure_computing+0x42/0xe0 Dec 23 23:10:40 XYZXYZ kernel: ksys_ioctl+0x67/0x90 Dec 23 23:10:40 XYZXYZ kernel: __x64_sys_ioctl+0x1a/0x20 Dec 23 23:10:40 XYZXYZ kernel: do_syscall_64+0x5a/0x130 Dec 23 23:10:40 XYZXYZ kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 Dec 23 23:10:40 XYZXYZ kernel: RIP: 0033:0x7f2b87ae667b Dec 23 23:10:40 XYZXYZ kernel: Code: 0f 1e fa 48 8b 05 15 28 0d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f Dec 23 23:10:40 XYZXYZ kernel: RSP: 002b:7f2b854bc5f8 EFLAGS: 0246 ORIG_RAX: 0010 Dec 23 23:10:40 XYZXYZ kernel: RAX: ffda RBX: ae80 RCX: 7f2b87ae667b Dec 23 23:10:40 XYZXYZ kernel: RDX: RSI: ae80 RDI: 0014 Dec 23 23:10:40 XYZXYZ kernel: RBP: 55712b5fde30 R08: 55712add7e70 R09: 7f2b854
[Kernel-packages] [Bug 1859958] Re: kvm clients receive lots auf segfaults
@ ben980: are you using vfio gpu pass-through? first i thought it was bad hardware (cpu11) but it changes between boots; i got in on cpu9 on another boot and nothing on cpu11 this time; segfaults in the vm are not visible on the host, no entry in dmesg is there a debug option for kvm to show more about this? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859958 Title: kvm clients receive lots auf segfaults Status in linux package in Ubuntu: Incomplete Bug description: Kubuntu 19.10 on a Z420 Workstation with 32GB ECC RAM / CPU E5-2690 (v0) looks like the same problem as the redhat bug https://bugzilla.redhat.com/show_bug.cgi?id=1738386 symptoms are two different kernel WARNINGS; but kvm guests receive lots of segfaults; this is for windows oder linux guests even bluescreens happens: looks like it always happens on CPU 11; no syslog messages about bad ram (ecc errors) and memtest shows no bad ram: there a two types of warnings: journalctl | grep WARNING:.CPU Dec 17 20:53:22 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] Dec 23 23:10:40 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Jan 04 09:35:35 XYZXYZ kernel: WARNING: CPU: 11 PID: 7357 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] Jan 06 20:21:16 XYZXYZ kernel: WARNING: CPU: 11 PID: 7357 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Jan 16 09:26:22 XYZXYZ kernel: WARNING: CPU: 11 PID: 16621 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] # first type: vmlinuz-5.3.0-24-generic Dec 23 23:10:40 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Dec 23 23:10:40 XYZXYZ kernel: Modules linked in: nls_utf8 isofs xt_policy chacha_x86_64 chacha_generic poly1305_x86_64 poly1305_generic chacha20poly1305 vhost Dec 23 23:10:40 XYZXYZ kernel: snd_seq_midi_emul snd_cmipci sb_edac snd_hda_codec snd_mpu401_uart snd_hda_core snd_opl3_lib x86_pkg_temp_thermal intel_powercl Dec 23 23:10:40 XYZXYZ kernel: firewire_ohci isci vfio_pci ahci drm firewire_core vfio_virqfd e1000e libsas i2c_i801 libahci lpc_ich vfio_iommu_type1 crc_itu_ Dec 23 23:10:40 XYZXYZ kernel: CPU: 11 PID: 4391 Comm: CPU 0/KVM Tainted: G W 5.3.0-24-generic #26-Ubuntu Dec 23 23:10:40 XYZXYZ kernel: Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.95 06/13/2019 Dec 23 23:10:40 XYZXYZ kernel: RIP: 0010:fpregs_assert_state_consistent+0x36/0x50 Dec 23 23:10:40 XYZXYZ kernel: Code: 6b 01 00 48 8b 10 48 89 e5 80 e6 40 75 1e 48 8d 90 80 13 00 00 65 8b 35 d8 25 bd 7a 65 48 8b 0c 25 40 6b 01 00 48 39 d1 74 Dec 23 23:10:40 XYZXYZ kernel: RSP: 0018:a4ad021fbd40 EFLAGS: 00010203 Dec 23 23:10:40 XYZXYZ kernel: RAX: 8e92e33adc00 RBX: 8e92c7af8000 RCX: Dec 23 23:10:40 XYZXYZ kernel: RDX: 8e92e33aef80 RSI: 000b RDI: 01d9 Dec 23 23:10:40 XYZXYZ kernel: RBP: a4ad021fbd40 R08: 8e92c7b2d200 R09: 0014 Dec 23 23:10:40 XYZXYZ kernel: R10: 8e928863fbc0 R11: R12: 000b Dec 23 23:10:40 XYZXYZ kernel: R13: 000b R14: 8e92c7af8058 R15: 8e92c7af8000 Dec 23 23:10:40 XYZXYZ kernel: FS: 7f2b854bd700() GS:8e932fac() knlGS: Dec 23 23:10:40 XYZXYZ kernel: CS: 0010 DS: ES: CR0: 80050033 Dec 23 23:10:40 XYZXYZ kernel: CR2: 0448 CR3: 0007e6a44003 CR4: 000626e0 Dec 23 23:10:40 XYZXYZ kernel: Call Trace: Dec 23 23:10:40 XYZXYZ kernel: kvm_arch_vcpu_load+0x6f/0x290 [kvm] Dec 23 23:10:40 XYZXYZ kernel: vcpu_load+0x2c/0x40 [kvm] Dec 23 23:10:40 XYZXYZ kernel: kvm_arch_vcpu_ioctl_run+0x1b/0x590 [kvm] Dec 23 23:10:40 XYZXYZ kernel: kvm_vcpu_ioctl+0x24b/0x610 [kvm] Dec 23 23:10:40 XYZXYZ kernel: ? __seccomp_filter+0x7e/0x680 Dec 23 23:10:40 XYZXYZ kernel: ? futex_wake+0x8b/0x190 Dec 23 23:10:40 XYZXYZ kernel: do_vfs_ioctl+0x407/0x670 Dec 23 23:10:40 XYZXYZ kernel: ? __secure_computing+0x42/0xe0 Dec 23 23:10:40 XYZXYZ kernel: ksys_ioctl+0x67/0x90 Dec 23 23:10:40 XYZXYZ kernel: __x64_sys_ioctl+0x1a/0x20 Dec 23 23:10:40 XYZXYZ kernel: do_syscall_64+0x5a/0x130 Dec 23 23:10:40 XYZXYZ kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 Dec 23 23:10:40 XYZXYZ kernel: RIP: 0033:0x7f2b87ae667b Dec 23 23:10:40 XYZXYZ kernel: Code: 0f 1e fa 48 8b 05 15 28 0d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f Dec 23 23:10:40 XYZXYZ kernel: RSP: 002b:7f2b854bc5f8 EFLAGS: 0246 ORIG_RAX: 0010 Dec 23 23:10:40 XYZXYZ kernel: RAX: ffda RBX: 0
[Kernel-packages] [Bug 1859958] Re: kvm clients receive lots auf segfaults
Hello, Same problem on linux-image-5.3.0-29-generic and linux-image-5.3.0-26-generic with Intel(R) Core(TM) i7-8700 CPU @ 3.20GHz and 32GB RAM -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1859958 Title: kvm clients receive lots auf segfaults Status in linux package in Ubuntu: Incomplete Bug description: Kubuntu 19.10 on a Z420 Workstation with 32GB ECC RAM / CPU E5-2690 (v0) looks like the same problem as the redhat bug https://bugzilla.redhat.com/show_bug.cgi?id=1738386 symptoms are two different kernel WARNINGS; but kvm guests receive lots of segfaults; this is for windows oder linux guests even bluescreens happens: looks like it always happens on CPU 11; no syslog messages about bad ram (ecc errors) and memtest shows no bad ram: there a two types of warnings: journalctl | grep WARNING:.CPU Dec 17 20:53:22 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] Dec 23 23:10:40 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Jan 04 09:35:35 XYZXYZ kernel: WARNING: CPU: 11 PID: 7357 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] Jan 06 20:21:16 XYZXYZ kernel: WARNING: CPU: 11 PID: 7357 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Jan 16 09:26:22 XYZXYZ kernel: WARNING: CPU: 11 PID: 16621 at arch/x86/kvm/x86.c:8056 vcpu_enter_guest+0xd2b/0xf00 [kvm] # first type: vmlinuz-5.3.0-24-generic Dec 23 23:10:40 XYZXYZ kernel: WARNING: CPU: 11 PID: 4391 at arch/x86/kernel/fpu/core.c:360 fpregs_assert_state_consistent+0x36/0x50 Dec 23 23:10:40 XYZXYZ kernel: Modules linked in: nls_utf8 isofs xt_policy chacha_x86_64 chacha_generic poly1305_x86_64 poly1305_generic chacha20poly1305 vhost Dec 23 23:10:40 XYZXYZ kernel: snd_seq_midi_emul snd_cmipci sb_edac snd_hda_codec snd_mpu401_uart snd_hda_core snd_opl3_lib x86_pkg_temp_thermal intel_powercl Dec 23 23:10:40 XYZXYZ kernel: firewire_ohci isci vfio_pci ahci drm firewire_core vfio_virqfd e1000e libsas i2c_i801 libahci lpc_ich vfio_iommu_type1 crc_itu_ Dec 23 23:10:40 XYZXYZ kernel: CPU: 11 PID: 4391 Comm: CPU 0/KVM Tainted: G W 5.3.0-24-generic #26-Ubuntu Dec 23 23:10:40 XYZXYZ kernel: Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.95 06/13/2019 Dec 23 23:10:40 XYZXYZ kernel: RIP: 0010:fpregs_assert_state_consistent+0x36/0x50 Dec 23 23:10:40 XYZXYZ kernel: Code: 6b 01 00 48 8b 10 48 89 e5 80 e6 40 75 1e 48 8d 90 80 13 00 00 65 8b 35 d8 25 bd 7a 65 48 8b 0c 25 40 6b 01 00 48 39 d1 74 Dec 23 23:10:40 XYZXYZ kernel: RSP: 0018:a4ad021fbd40 EFLAGS: 00010203 Dec 23 23:10:40 XYZXYZ kernel: RAX: 8e92e33adc00 RBX: 8e92c7af8000 RCX: Dec 23 23:10:40 XYZXYZ kernel: RDX: 8e92e33aef80 RSI: 000b RDI: 01d9 Dec 23 23:10:40 XYZXYZ kernel: RBP: a4ad021fbd40 R08: 8e92c7b2d200 R09: 0014 Dec 23 23:10:40 XYZXYZ kernel: R10: 8e928863fbc0 R11: R12: 000b Dec 23 23:10:40 XYZXYZ kernel: R13: 000b R14: 8e92c7af8058 R15: 8e92c7af8000 Dec 23 23:10:40 XYZXYZ kernel: FS: 7f2b854bd700() GS:8e932fac() knlGS: Dec 23 23:10:40 XYZXYZ kernel: CS: 0010 DS: ES: CR0: 80050033 Dec 23 23:10:40 XYZXYZ kernel: CR2: 0448 CR3: 0007e6a44003 CR4: 000626e0 Dec 23 23:10:40 XYZXYZ kernel: Call Trace: Dec 23 23:10:40 XYZXYZ kernel: kvm_arch_vcpu_load+0x6f/0x290 [kvm] Dec 23 23:10:40 XYZXYZ kernel: vcpu_load+0x2c/0x40 [kvm] Dec 23 23:10:40 XYZXYZ kernel: kvm_arch_vcpu_ioctl_run+0x1b/0x590 [kvm] Dec 23 23:10:40 XYZXYZ kernel: kvm_vcpu_ioctl+0x24b/0x610 [kvm] Dec 23 23:10:40 XYZXYZ kernel: ? __seccomp_filter+0x7e/0x680 Dec 23 23:10:40 XYZXYZ kernel: ? futex_wake+0x8b/0x190 Dec 23 23:10:40 XYZXYZ kernel: do_vfs_ioctl+0x407/0x670 Dec 23 23:10:40 XYZXYZ kernel: ? __secure_computing+0x42/0xe0 Dec 23 23:10:40 XYZXYZ kernel: ksys_ioctl+0x67/0x90 Dec 23 23:10:40 XYZXYZ kernel: __x64_sys_ioctl+0x1a/0x20 Dec 23 23:10:40 XYZXYZ kernel: do_syscall_64+0x5a/0x130 Dec 23 23:10:40 XYZXYZ kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 Dec 23 23:10:40 XYZXYZ kernel: RIP: 0033:0x7f2b87ae667b Dec 23 23:10:40 XYZXYZ kernel: Code: 0f 1e fa 48 8b 05 15 28 0d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f Dec 23 23:10:40 XYZXYZ kernel: RSP: 002b:7f2b854bc5f8 EFLAGS: 0246 ORIG_RAX: 0010 Dec 23 23:10:40 XYZXYZ kernel: RAX: ffda RBX: ae80 RCX: 7f2b87ae667b Dec 23 23:10:40 XYZXYZ kernel: RDX: RSI: ae80 RDI: 0014 Dec 23 23:10:40 XYZXYZ kerne