L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. ------------[ cut here ]------------ WARNING: CPU: 1 PID: 4170 at arch/x86/kvm/lapic.c:336 kvm_apic_map_get_logical_dest arch/x86/kvm/lapic.c:201 [inline] WARNING: CPU: 1 PID: 4170 at arch/x86/kvm/lapic.c:336 kvm_recalculate_apic_map+0xb62/0x1180 arch/x86/kvm/lapic.c:340 Modules linked in: CPU: 1 PID: 4170 Comm: syz-executor.0 Not tainted 6.1.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 RIP: 0010:kvm_recalculate_apic_map+0xb62/0x1180 arch/x86/kvm/lapic.c:336 Code: e9 70 f5 ff ff bf 18 0a 00 00 41 bd ff 00 00 00 e9 6b f7 ff ff 0f 0b e9 82 fe ff ff 49 8d 74 24 18 45 0f b6 c0 e9 b2 fe ff ff <0f> 0b e9 85 fb ff ff 48 89 df e8 6f 46 a2 00 e9 11 f7 ff ff 48 89 RSP: 0018:ffffc90003227818 EFLAGS: 00010216 RAX: 0000000000000001 RBX: ffffc90003259ad0 RCX: 1ffff1100eb1905d RDX: ffff8880758c8040 RSI: 0000000000000000 RDI: 0000000000000d00 RBP: ffffc90003259000 R08: 0000000000082000 R09: ffff88801be31000 R10: 0000000000000400 R11: ffff88807d67e014 R12: ffff88807d67e000 R13: dffffc0000000000 R14: ffffc900032599d8 R15: ffffc900032278a8 FS: 00007ff814833700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb6199b5300 CR3: 000000006ff8a000 CR4: 00000000003526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kvm_apic_set_state+0x3fd/0xdb0 arch/x86/kvm/lapic.c:2875 kvm_vcpu_ioctl_set_lapic arch/x86/kvm/x86.c:4845 [inline] kvm_arch_vcpu_ioctl+0x19c1/0x3450 arch/x86/kvm/x86.c:5581 kvm_vcpu_ioctl+0x752/0xc40 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4234 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __x64_sys_ioctl+0x123/0x190 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7ff813a8c0f9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff814833168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ff813babf80 RCX: 00007ff813a8c0f9 RDX: 0000000020000880 RSI: 000000004400ae8f RDI: 0000000000000005 RBP: 00007ff813ae7ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd1fec932f R14: 00007ff814833300 R15: 0000000000022000