L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready ================================================================== BUG: KMSAN: uninit-value in vmcs_clear arch/x86/kvm/vmx.c:2119 [inline] BUG: KMSAN: uninit-value in loaded_vmcs_init+0x343/0x590 arch/x86/kvm/vmx.c:2126 CPU: 0 PID: 6824 Comm: syz-executor4 Not tainted 4.19.0-rc4+ #63 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x306/0x460 lib/dump_stack.c:113 kmsan_report+0x1a3/0x2d0 mm/kmsan/kmsan.c:917 __msan_warning+0x7c/0xe0 mm/kmsan/kmsan_instr.c:500 vmcs_clear arch/x86/kvm/vmx.c:2119 [inline] loaded_vmcs_init+0x343/0x590 arch/x86/kvm/vmx.c:2126 __loaded_vmcs_clear+0x2fb/0x3c0 arch/x86/kvm/vmx.c:2209 flush_smp_call_function_queue+0x404/0x770 kernel/smp.c:243 generic_smp_call_function_single_interrupt+0x1f/0x30 kernel/smp.c:192 smp_call_function_single_interrupt+0x2f7/0x530 arch/x86/kernel/smp.c:296 call_function_single_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:891 RIP: 0010:msan_get_shadow_origin_ptr+0xa/0x300 mm/kmsan/kmsan_instr.c:100 Code: eb fe e8 89 b8 50 ff 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 31 d2 e8 05 00 00 00 5d c3 0f 1f 00 55 48 89 e5 41 57 41 56 41 55 <41> 54 53 48 83 ec 30 65 48 8b 04 25 28 00 00 00 48 89 45 d0 48 c7 RSP: 0018:ffff88014d57f7e8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff04 RAX: 000000ffffffffff RBX: 000000000021ffff RCX: 000000ffffffffff RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8bd782a8 RBP: ffff88014d57f800 R08: 0000000000000000 R09: ffffffff8c2d9000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 80000001516ef007 R14: 80000001516ef007 R15: 00000000001516ef __msan_metadata_ptr_for_load_8+0x10/0x20 mm/kmsan/kmsan_instr.c:205 _vm_normal_page mm/memory.c:885 [inline] copy_one_pte mm/memory.c:1039 [inline] copy_pte_range mm/memory.c:1103 [inline] copy_pmd_range mm/memory.c:1154 [inline] copy_pud_range mm/memory.c:1188 [inline] copy_p4d_range mm/memory.c:1210 [inline] copy_page_range+0x1d94/0x3d00 mm/memory.c:1272 dup_mmap kernel/fork.c:544 [inline] dup_mm kernel/fork.c:1275 [inline] copy_mm kernel/fork.c:1330 [inline] copy_process+0x702f/0xbc70 kernel/fork.c:1870 _do_fork+0x3d4/0x1330 kernel/fork.c:2167 __do_sys_clone kernel/fork.c:2274 [inline] __se_sys_clone+0xf6/0x110 kernel/fork.c:2268 __x64_sys_clone+0x62/0x80 kernel/fork.c:2268 do_syscall_64+0xbe/0x100 arch/x86/entry/common.c:291 entry_SYSCALL_64_after_hwframe+0x63/0xe7 RIP: 0033:0x421299 Code: 01 00 00 48 8d 54 24 0c 48 8d 7c 24 10 be 60 10 42 00 e8 7a ed bd ff 48 8d 54 24 0c 31 f6 bf 11 00 10 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 6b 01 00 00 85 c0 89 c7 89 44 24 0c 0f 84 RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000421299 RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 RBP: 0000000000a3fc80 R08: 0000000000a44a80 R09: 0000000000000028 R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fee8 R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 Local variable description: ----error.i@loaded_vmcs_init Variable was created at: loaded_vmcs_init+0x8a/0x590 arch/x86/kvm/vmx.c:2125 __loaded_vmcs_clear+0x2fb/0x3c0 arch/x86/kvm/vmx.c:2209 ==================================================================