Thanks for the excellent bug report! On 05/08/2018 02:37 AM, Thadeu Lima de Souza Cascardo wrote: > 2) The bad address is next to do_syscall_64 on the host.
So a host address leaked into a guest oops? We should bring the KVM folks into this and probably also need to widen the cc list quite a bit. Can you boot the guest at all?

