8021q: adding VLAN 0 to HW filter on device batadv0 8021q: adding VLAN 0 to HW filter on device batadv0 L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env CPU: 1 PID: 8093 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #79 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__dentry_path+0x49e/0x7c0 fs/d_path.c:344 kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env Code: 89 fc 41 83 e4 01 44 89 e6 e8 fe e4 b2 ff 45 84 e4 0f 85 04 02 00 00 e8 b0 e3 b2 ff 48 8b 85 18 ff ff ff 44 89 bd 40 ff ff ff <80> 38 00 0f 85 f9 02 00 00 48 8b 85 38 ff ff ff 41 83 e7 01 44 89 RSP: 0018:ffff88808544fad0 EFLAGS: 00010293 RAX: dffffc0000000005 RBX: 0000000000000000 RCX: ffffffff81bcfdc2 RDX: 0000000000000000 RSI: ffffffff81bcfdd0 RDI: 0000000000000001 RBP: ffff88808544fbc0 R08: ffff88809e698340 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88808544fb98 R14: ffff888089ad15fe R15: 0000000000000cc4 FS: 00007f7dec7bd700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd5c784e000 CR3: 0000000085ba5000 CR4: 00000000001426e0 Call Trace: dentry_path_raw+0x26/0x30 fs/d_path.c:371 kvm_uevent_notify_change.part.0+0x213/0x440 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4051 kvm_uevent_notify_change arch/x86/kvm/../../../virt/kvm/kvm_main.c:4018 [inline] kvm_dev_ioctl_create_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:3356 [inline] kvm_dev_ioctl+0x1132/0x1750 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3378 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:509 [inline] do_vfs_ioctl+0xd6e/0x1390 fs/ioctl.c:696 ksys_ioctl+0xab/0xd0 fs/ioctl.c:713 __do_sys_ioctl fs/ioctl.c:720 [inline] __se_sys_ioctl fs/ioctl.c:718 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:718 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457e29 Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f7dec7bcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000007 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7dec7bd6d4 R13: 00000000004c093a R14: 00000000004d26b0 R15: 00000000ffffffff Modules linked in: kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'loop3' (00000000f2c020d3): kobject_uevent_env kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'loop3' (00000000f2c020d3): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' ---[ end trace aff3be983b32b1db ]--- RIP: 0010:__dentry_path+0x49e/0x7c0 fs/d_path.c:344 kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (000000009365f4c0): kobject_uevent_env Code: 89 fc 41 83 e4 01 44 89 e6 e8 fe e4 b2 ff 45 84 e4 0f 85 04 02 00 00 e8 b0 e3 b2 ff 48 8b 85 18 ff ff ff 44 89 bd 40 ff ff ff <80> 38 00 0f 85 f9 02 00 00 48 8b 85 38 ff ff ff 41 83 e7 01 44 89 kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'loop2' (000000009365f4c0): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env RSP: 0018:ffff88808544fad0 EFLAGS: 00010293 kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'loop1' (000000002eb2015c): kobject_uevent_env kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' RAX: dffffc0000000005 RBX: 0000000000000000 RCX: ffffffff81bcfdc2 kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop1' (000000002eb2015c): fill_kobj_path: path = '/devices/virtual/block/loop1' RDX: 0000000000000000 RSI: ffffffff81bcfdd0 RDI: 0000000000000001 kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env RBP: ffff88808544fbc0 R08: ffff88809e698340 R09: 0000000000000000 kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'loop5' (00000000f110e6c7): kobject_uevent_env kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: 'loop5' (00000000f110e6c7): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (0000000035a4a28f): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000035a4a28f): kobject_uevent_env kobject: