panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> kernfs.ancestryRWMutex:
|
2 |
|
|
|
1 |
2d04h |
2d03h
|
21/26 |
never |
2c49d9fd3897
kernel: fix circular locking in FSContext.destroy
|
DATA RACE in transport.(*connectionedEndpoint).SetPeerCreds
|
-1 |
C |
|
|
3958 |
13d |
21d
|
26/26 |
2h48m |
2f7f776a4464
Automated rollback of changelist 798788535
|
DATA RACE in transport.(*connectionedEndpoint).BidirectionalConnect
|
-1 |
C |
|
|
11531 |
13d |
21d
|
26/26 |
2h48m |
2f7f776a4464
Automated rollback of changelist 798788535
|
panic: Sentry detected stuck tasks (31)
|
2 |
|
|
|
3 |
1d14h |
43d
|
26/26 |
2h48m |
6448dbe1b799
procfs: release the file system mutex on the error path
|
gvisor test error: init process did not start
|
-1 |
|
|
|
1 |
20d |
20d
|
26/26 |
2h48m |
2c49d9fd3897
kernel: fix circular locking in FSContext.destroy
|
DATA RACE in transport.(*connectionedEndpoint).swapPeerCreds
|
-1 |
C |
|
|
2636 |
13d |
21d
|
26/26 |
2h48m |
2f7f776a4464
Automated rollback of changelist 798788535
|
panic: nested locking: kernfs.filesystemRWMutex: (10)
|
2 |
C |
|
|
16 |
4d08h |
72d
|
26/26 |
2h48m |
6448dbe1b799
procfs: release the file system mutex on the error path
|
panic: runtime error: invalid memory address or nil pointer dereference (29)
|
2 |
C |
|
|
7 |
14d |
18d
|
26/26 |
2h48m |
2f7f776a4464
Automated rollback of changelist 798788535
|
panic: WARNING: circular locking detected: kernel.fsContextMutex -> tmpfs.filesystemRWMutex:
|
2 |
|
|
|
4 |
3d20h |
7d05h
|
26/26 |
1d19h |
2c49d9fd3897
kernel: fix circular locking in FSContext.destroy
|
panic: WARNING: circular locking detected: mm.mappingRWMutex -> kernel.fsContextMutex:
|
2 |
|
|
|
5 |
1d21h |
5d15h
|
26/26 |
1d19h |
2c49d9fd3897
kernel: fix circular locking in FSContext.destroy
|
panic: WARNING: circular locking detected: vfs.inotifyEventMutex -> mm.mappingRWMutex: (2)
|
2 |
|
|
|
5 |
3d13h |
7d06h
|
26/26 |
1d19h |
2c49d9fd3897
kernel: fix circular locking in FSContext.destroy
|
panic: WARNING: circular locking detected: kernel.fsContextMutex -> kernfs.filesystemRWMutex:
|
2 |
C |
|
|
10461 |
1d20h |
7d09h
|
26/26 |
1d19h |
2c49d9fd3897
kernel: fix circular locking in FSContext.destroy
|
panic: WARNING: circular locking detected: kernel.fsContextMutex -> vfs.inotifyEventMutex:
|
2 |
|
|
|
16 |
2d13h |
7d08h
|
26/26 |
1d19h |
2c49d9fd3897
kernel: fix circular locking in FSContext.destroy
|
panic: Decrementing non-positive ref count ADDR, owned by tun.tunEndpoint
|
2 |
C |
|
|
19 |
2d20h |
3d11h
|
26/26 |
2d08h |
20452a237b48
net/tun: Do not DecRef a closed TUN endpoint when un-persisting it.
|
kvm: panic: Watchdog goroutine is stuck (7)
|
-1 |
syz |
|
|
4 |
8d19h |
25d
|
26/26 |
7d10h |
973cf7601abe
Fix incorrect lock order in execve(2) around TaskSet.mu
|
panic: Watchdog goroutine is stuck (4)
|
2 |
syz |
|
|
250 |
7d11h |
92d
|
26/26 |
7d10h |
973cf7601abe
Fix incorrect lock order in execve(2) around TaskSet.mu
|
gvisor build error (25)
|
-1 |
|
|
|
624 |
21d |
28d
|
26/26 |
21d |
49a6cc35fab1
kvm: pagetables: Enable 5-level paging
|
DATA RACE in kernel.(*FSContext).checkAndPreventSharingOutsideTG.func1
|
-1 |
syz |
|
|
3 |
24d |
27d
|
26/26 |
21d |
1941bc68e20d
Fix race between unshare(2) and execve(2).
|
DATA RACE in kernel.(*Task).Unshare
|
-1 |
C |
|
|
6 |
26d |
27d
|
26/26 |
21d |
1941bc68e20d
Fix race between unshare(2) and execve(2).
|
panic: WARNING: circular locking detected: stack.bridgeRWMutex -> stack.packetEPsRWMutex:
|
2 |
|
|
|
1 |
65d |
65d
|
26/26 |
55d |
d48212e236c1
No need to lock packetEPsMu in newNIC.
|
kvm: panic: Sentry detected stuck tasks (28)
|
-1 |
C |
|
|
11 |
94d |
99d
|
26/26 |
70d |
973b2f23e566
Check for fatal signals and reset watchdog during MM.mapASLocked().
|
panic: WARNING: circular locking detected: kernfs.ancestryRWMutex -> vfs.inotifyEventMutex:
|
2 |
|
|
|
1 |
95d |
88d
|
26/26 |
82d |
a2ad5774b434
Fix lock order inversion between taskMutex and kernfs.ancestryRWMutex.
|
DATA RACE in packetmmap.(*ringBuffer).internalMappingsForFrame (2)
|
-1 |
|
|
|
1 |
131d |
131d
|
26/26 |
125d |
a98032f6cc71
Add locking around ringbuffer fields and reserve in packetmmap endpoint.
|
DATA RACE in packetmmap.(*Endpoint).Init (5)
|
-1 |
syz |
|
|
2 |
128d |
129d
|
26/26 |
125d |
a98032f6cc71
Add locking around ringbuffer fields and reserve in packetmmap endpoint.
|
DATA RACE in packetmmap.(*ringBuffer).init (3)
|
-1 |
C |
|
|
9 |
128d |
133d
|
26/26 |
126d |
a98032f6cc71
Add locking around ringbuffer fields and reserve in packetmmap endpoint.
|
DATA RACE in packetmmap.(*Endpoint).HandlePacket (5)
|
-1 |
C |
|
|
19 |
128d |
133d
|
26/26 |
126d |
a98032f6cc71
Add locking around ringbuffer fields and reserve in packetmmap endpoint.
|
DATA RACE in packetmmap.(*Endpoint).HandlePacket (4)
|
-1 |
C |
|
|
4 |
136d |
138d
|
26/26 |
134d |
f56929a6872c
Lock around grabbing the version and hdrLen in packetmmap.
|
DATA RACE in packetmmap.(*Endpoint).marshalFrameHeader (2)
|
-1 |
C |
|
|
3 |
138d |
138d
|
26/26 |
134d |
f56929a6872c
Lock around grabbing the version and hdrLen in packetmmap.
|
DATA RACE in packetmmap.(*Endpoint).Init (4)
|
-1 |
C |
|
|
9 |
137d |
141d
|
26/26 |
134d |
5790f690667a
lock around getting the current time from the stack.
|
DATA RACE in packetmmap.(*Endpoint).marshalFrameHeader
|
-1 |
C |
|
|
6 |
141d |
141d
|
26/26 |
140d |
5790f690667a
lock around getting the current time from the stack.
|
kvm: panic: Sentry detected stuck tasks (27)
|
-1 |
C |
|
|
5 |
143d |
145d
|
26/26 |
140d |
1a3d4f6eb7cc
Create a separate mutex for packet mmap fields in packet endpoints.
|
panic: Sentry detected stuck tasks (29)
|
2 |
C |
|
|
51 |
142d |
147d
|
26/26 |
141d |
1a3d4f6eb7cc
Create a separate mutex for packet mmap fields in packet endpoints.
|
panic: runtime error: index out of range [NUM] with length NUM (6)
|
2 |
C |
|
|
227 |
155d |
155d
|
26/26 |
147d |
cd8fcab3446c
Fix range check on socket option counter metric.
|
kvm: panic: Sentry detected stuck tasks (25)
|
-1 |
C |
|
|
3409 |
155d |
251d
|
26/26 |
147d |
bc724d81d2f7
Avoid a deadlock in packet endpoint's Close method.
|
panic: runtime error: index out of range [-NUM] (2)
|
2 |
C |
|
|
19 |
149d |
150d
|
26/26 |
147d |
49b9d83fc867
Consolidate helper functions around unimplemented socket option metrics
|
panic: Sentry detected stuck tasks (28)
|
2 |
C |
|
|
11282 |
147d |
251d
|
26/26 |
147d |
45adb00f5086
fuse,vfs: don't FUSE_GETATTR for /proc/mountinfo
|
panic: invalid field value or did not reuse the same FieldValue pointer as passed in NewField
|
2 |
C |
|
|
56 |
155d |
155d
|
26/26 |
147d |
3f22efe2ac35
Return ENOPROTOOPT from setsockopt syscalls as default.
|
DATA RACE in packetmmap.(*Endpoint).HandlePacket (3)
|
-1 |
C |
|
|
4 |
161d |
161d
|
26/26 |
161d |
3b4f4acdf32c
Don't allow reinit of already mapped packet mmap endpoints.
|
DATA RACE in packetmmap.(*Endpoint).Init (3)
|
-1 |
syz |
|
|
3 |
161d |
161d
|
26/26 |
161d |
3b4f4acdf32c
Don't allow reinit of already mapped packet mmap endpoints.
|
panic: runtime error: slice bounds out of range [NUM:NUM] (3)
|
2 |
C |
|
|
20 |
164d |
165d
|
26/26 |
162d |
e3ca602624c1
Check for bad values of the packet mmap reserve option.
|
DATA RACE in kernel.(*ThreadGroup).endGroupStopLocked
|
-1 |
syz |
|
|
6 |
176d |
177d
|
26/26 |
171d |
8221e477b5c4
Protect Task.ptraceSeized with TaskSet mutex and Signal mutex.
|
panic: runtime error: invalid memory address or nil pointer dereference (28)
|
2 |
C |
|
|
21 |
219d |
220d
|
26/26 |
217d |
95ad423f8c05
Don't return empty translation in ring buffer during bus error.
|
panic: WARNING: circular locking detected: kernel.taskMutex -> mm.mappingRWMutex:
|
2 |
|
|
|
16 |
222d |
265d
|
26/26 |
219d |
d949e7177c2f
taskCopyContext should not require holding task.mu.
|
panic: runtime error: index out of range [NUM] with length NUM (5)
|
2 |
C |
|
|
165 |
220d |
223d
|
26/26 |
219d |
d6454b486f82
Lock around packetmmap cooked field and check for PACKET_RESERVE opt size.
|
DATA RACE in packetmmap.(*Endpoint).HandlePacket (2)
|
-1 |
C |
|
|
1 |
223d |
223d
|
26/26 |
219d |
d6454b486f82
Lock around packetmmap cooked field and check for PACKET_RESERVE opt size.
|
DATA RACE in packetmmap.(*ringBuffer).init (2)
|
-1 |
|
|
|
2 |
223d |
223d
|
26/26 |
223d |
25084ce9ed1e
Add locking around packetmmap initialization and mode.
|
DATA RACE in packetmmap.(*Endpoint).ConfigureMMap
|
-1 |
C |
|
|
2 |
223d |
223d
|
26/26 |
223d |
25084ce9ed1e
Add locking around packetmmap initialization and mode.
|
DATA RACE in packetmmap.(*ringBuffer).internalMappingsForFrame
|
-1 |
|
|
|
1 |
223d |
223d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packetmmap.(*Endpoint).Init (2)
|
-1 |
C |
|
|
9 |
223d |
223d
|
26/26 |
223d |
25084ce9ed1e
Add locking around packetmmap initialization and mode.
|
DATA RACE in packetmmap.(*ringBuffer).currFrameStatus (2)
|
-1 |
C |
|
|
19 |
223d |
223d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packet.(*endpoint).HandlePacket
|
-1 |
C |
|
|
3 |
223d |
224d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packet.(*endpoint).GetPacketMMapOpts
|
-1 |
C |
|
|
10 |
224d |
224d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packetmmap.(*Endpoint).Init
|
-1 |
C |
|
|
7 |
223d |
224d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packetmmap.(*Endpoint).HandlePacket
|
-1 |
syz |
|
|
3 |
224d |
225d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packet.(*endpoint).GetPacketMMapEndpoint
|
-1 |
|
|
|
14 |
223d |
225d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packetmmap.(*ringBuffer).currFrameStatus
|
-1 |
C |
|
|
3 |
223d |
225d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packet.(*endpoint).SetSockOptInt
|
-1 |
C |
|
|
10 |
224d |
224d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packet.(*endpoint).SetPacketMMapEndpoint
|
-1 |
C |
|
|
25 |
223d |
225d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
DATA RACE in packetmmap.(*ringBuffer).init
|
-1 |
|
|
|
2 |
224d |
224d
|
26/26 |
223d |
da7cd03064d7
Lock around packet mmap fields.
|
panic: runtime error: integer divide by zero (4)
|
2 |
|
|
|
702 |
223d |
225d
|
26/26 |
223d |
213917f3eaf8
Don't switch to using the packet mmap endpoint for zero length requests.
|
panic: invalid allocation length: 0x0 (5)
|
2 |
|
|
|
32 |
224d |
225d
|
26/26 |
223d |
213917f3eaf8
Don't switch to using the packet mmap endpoint for zero length requests.
|
panic: runtime error: slice bounds out of range [NUM:NUM] (2)
|
2 |
C |
|
|
606 |
224d |
225d
|
26/26 |
224d |
d8518f299131
Validate PACKET_RX_RING and PACKET_VERSION socket option value size.
|
panic: runtime error: index out of range [NUM] with length NUM (4)
|
2 |
C |
|
|
174 |
224d |
225d
|
26/26 |
224d |
d8518f299131
Validate PACKET_RX_RING and PACKET_VERSION socket option value size.
|
panic: Sentry detected stuck tasks (27)
|
2 |
C |
|
|
14 |
259d |
279d
|
26/26 |
254d |
679c77e4f05e
proc: Allow interrupting generation of /proc/pid/mount{s,info}
|
panic: running on goroutine NUM (task goroutine for kernel.Task ADDR is NUM) (2)
|
2 |
C |
|
|
9 |
279d |
279d
|
26/26 |
276d |
c27c9a02aef5
kernel: use the kernel context to run task destroy actions
|
DATA RACE in buffer.(*Buffer).PullUp
|
-1 |
C |
|
|
2 |
301d |
295d
|
26/26 |
279d |
afa323bd3070
Replace most instances of IncRef with Clone.
|
DATA RACE in buffer.(*ViewList).Remove
|
-1 |
C |
|
|
4 |
302d |
300d
|
26/26 |
279d |
afa323bd3070
Replace most instances of IncRef with Clone.
|
panic: PullUp failed (3)
|
2 |
C |
|
|
19 |
280d |
300d
|
26/26 |
279d |
afa323bd3070
Replace most instances of IncRef with Clone.
|
panic: Sentry detected stuck tasks (26)
|
2 |
C |
|
|
17 |
282d |
283d
|
26/26 |
281d |
c88ffa321eb9
Returns ENOBUFS when writing to a veth device whose buffer is full.
|
kvm: panic: Sentry detected stuck tasks (24)
|
-1 |
C |
|
|
9 |
282d |
325d
|
26/26 |
281d |
c88ffa321eb9
Returns ENOBUFS when writing to a veth device whose buffer is full.
|
panic: Sentry detected stuck tasks (25)
|
2 |
C |
|
|
78 |
283d |
312d
|
26/26 |
283d |
54eb79b6e80a
Acquire rlock when reading link address from the bridge.
|
panic: bytes only has space for NUM bytes but need space for NUM bytes (length = NUM) for extension header with id = NUM
|
2 |
C |
|
|
34 |
286d |
288d
|
26/26 |
284d |
ddaa99e5d4d2
Ignore the length field when processing the experiment extension header.
|
panic: nested locking: tmpfs.filesystemRWMutex: (3)
|
2 |
C |
|
|
88 |
301d |
297d
|
26/26 |
297d |
f66f0e235a0b
Fix memmap.MappingIdentity.Device/InodeID() lock ordering.
|
panic: runtime error: invalid memory address or nil pointer dereference (27)
|
2 |
C |
|
|
1117 |
299d |
301d
|
26/26 |
299d |
2b55090a5813
Do not crash when creating thread group with already-exceeded soft CPU limit.
|
panic: runtime error: invalid memory address or nil pointer dereference (26)
|
2 |
C |
|
|
7905 |
301d |
309d
|
26/26 |
301d |
ae1d4ccf0298
mm: validate vseg before using it
|
no output from test machine (13)
|
-1 |
C |
|
|
86992 |
304d |
323d
|
26/26 |
304d |
336dc8504327
vfs: use ancestryMu in implementations of DentryImpl.InotifyWithParent
|
panic: nested locking: tmpfs.filesystemRWMutex: (2)
|
2 |
C |
|
|
33 |
304d |
307d
|
26/26 |
304d |
336dc8504327
vfs: use ancestryMu in implementations of DentryImpl.InotifyWithParent
|
DATA RACE in buffer.(*View).Write
|
-1 |
|
|
|
1 |
429d |
429d
|
26/26 |
350d |
a446b45d4d05
Ensure views returned by PullUp are owned exclusively by their packet.
|
panic: runtime error: index out of range [ADDR] with length NUM (2)
|
2 |
C |
|
|
23 |
354d |
355d
|
26/26 |
353d |
9d41ac1ff0b2
Fix unsigned to signed integer conversion in syserr.getHostTranslation().
|
panic: unknown host errno "errno NUM" (NUM) (2)
|
2 |
C |
|
|
286 |
355d |
380d
|
26/26 |
353d |
3971ecbc6ccd
Remove linuxerr.IsValid and use syserr.IsValid instead.
|
panic: nested locking: stack.bridgeRWMutex:
|
2 |
|
|
|
2 |
368d |
361d
|
26/26 |
355d |
5e8dd6482cb7
Disallow setting a coordinator for a coordinator device.
|
lost connection to test machine (10)
|
-1 |
syz |
|
|
11752 |
371d |
427d
|
26/26 |
371d |
2a413db73006
kvm: check CPL to find out if the Sentry is in VM
|
panic: unknown host errno "memory page has hardware error" (NUM)
|
2 |
|
|
|
10 |
378d |
384d
|
26/26 |
377d |
40bde6c617c7
Add EHWPOISON to host_linux.go
|
panic: unknown host errno "errno NUM" (NUM)
|
2 |
C |
|
|
397 |
387d |
424d
|
26/26 |
387d |
9ecb627726cf
Fix syzkaller panic for unknown error 58.
|
panic: No file type specified in 'mode' for InodeAttrs.Init(): mode=NUM (2)
|
2 |
C |
|
|
454 |
398d |
426d
|
26/26 |
398d |
834bef599679
fuse: Error out in case of unsupported file type instead of panicking.
|
panic: unknown host errno "operation not possible due to RF-kill" (NUM)
|
2 |
|
|
|
1 |
400d |
400d
|
26/26 |
399d |
e6cf09a18c7e
Add ERFKILL errno to host_linux file.
|
panic: running on goroutine NUM (task goroutine for kernel.Task ADDR is NUM)
|
2 |
|
|
|
1 |
410d |
410d
|
26/26 |
407d |
e30fa671774b
FUSE: Only block with a task if it is the task goroutine.
|
panic: unknown host errno "errno ADDR" (ADDR)
|
2 |
C |
|
|
88 |
408d |
425d
|
26/26 |
407d |
b1ade52f24be
fuse: handle bad response errors
|
panic: runtime error: invalid memory address or nil pointer dereference (25)
|
2 |
|
|
|
1 |
411d |
411d
|
26/26 |
408d |
2ef09d3bddc7
FUSE: Avoid panic when opening unknown file type.
|
panic: unknown host errno "no XENIX semaphores available" (NUM)
|
2 |
|
|
|
7 |
412d |
412d
|
26/26 |
412d |
0184ec4aacbc
Add ENAVAIL to host_linux.go.
|
DATA RACE in log.GoogleEmitter.Emit (4)
|
-1 |
|
|
|
1 |
412d |
412d
|
26/26 |
412d |
742b914fcb82
Don't log mount.root because it leads to racy access.
|
panic: unknown host errno "is a named type file" (NUM)
|
2 |
|
|
|
7 |
413d |
413d
|
26/26 |
412d |
ef1ca17e5842
Add EISNAM to linuxHostTranslations and fix error message for ENOTNAM.
|
SYZFAIL: mount(proc) failed
|
-1 |
|
|
|
54326 |
442d |
443d
|
26/26 |
426d |
e39ed91daaf9
sentry: support NULL mount source
|
gvisor test error: SYZFAIL: mount(proc) failed
|
-1 |
|
|
|
58 |
443d |
443d
|
26/26 |
426d |
e39ed91daaf9
sentry: support NULL mount source
|
lost connection to test machine (9)
|
-1 |
syz |
|
|
8441 |
427d |
766d
|
26/26 |
427d |
cd56935ddf77
runsc: pass the GLIBC_TUNABLES env to the sandbox process
|
DATA RACE in log.GoogleEmitter.Emit (3)
|
-1 |
|
|
|
1 |
430d |
430d
|
26/26 |
428d |
ddfbb50ecc2d
Don't log the task in CgroupPrepareMigrate warning.
|
DATA RACE in binary.bigEndian.Uint16
|
-1 |
|
|
|
1 |
444d |
444d
|
26/26 |
433d |
bd58900fba9e
Change veth WritePackets to deep clone its list of packets.
|
DATA RACE in binary.bigEndian.PutUint16 (2)
|
-1 |
|
|
|
3 |
435d |
444d
|
26/26 |
433d |
bd58900fba9e
Change veth WritePackets to deep clone its list of packets.
|
no output from test machine (11)
|
-1 |
C |
|
|
50911 |
437d |
558d
|
26/26 |
437d |
db9fab290c26
Fix a race condition in TCPDeferAcceptTimeout
|
panic: send on closed channel
|
2 |
|
|
|
1 |
446d |
438d
|
26/26 |
437d |
9d1849029e8e
tcpip/link/veth: don't send any packets if another end has been closed
|
SYZFAIL: tun: ioctl(TUNSETIFF) failed (2)
|
-1 |
|
|
|
15 |
443d |
441d
|
26/26 |
440d |
c6d16988a984
Log endpoint type when SOL_IP options are not supported.
|
panic: WARNING: circular locking detected: stack.bridgeRWMutex -> stack.stackRWMutex:
|
2 |
C |
|
|
27 |
454d |
456d
|
26/26 |
449d |
c4dc0321aa40
Do not hold BridgeEndpoint.mu during dispatcher.DeliverNetworkPacket().
|
init process did not start
|
-1 |
|
|
|
2 |
463d |
463d
|
26/26 |
458d |
80a501d8cc23
Avoid redundant work in `bpf.optimizeJumpsToSmallestSetOfReturns`.
|
DATA RACE in futex.(*waiterList).Front
|
-1 |
C |
|
|
1 |
470d |
470d
|
26/26 |
462d |
b58e8a129d62
futex: add missing locking in lockBuckets()
|
DATA RACE in futex.(*waiterEntry).SetNext
|
-1 |
C |
|
|
3 |
470d |
470d
|
26/26 |
462d |
b58e8a129d62
futex: add missing locking in lockBuckets()
|
DATA RACE in futex.(*waiterList).PushBack
|
-1 |
C |
|
|
3 |
469d |
470d
|
26/26 |
462d |
b58e8a129d62
futex: add missing locking in lockBuckets()
|
gvisor test error: SYZFATAL: failed to connect to host: dial tcp: address stdin: missing port in address
|
-1 |
|
|
|
1077 |
499d |
503d
|
26/26 |
496d |
a5b10b7dd04c
Fix some processes_test flakes.
|
panic: runtime error: invalid memory address or nil pointer dereference (23)
|
2 |
C |
|
|
4239 |
549d |
554d
|
26/26 |
548d |
5f5e01d186b2
Fix panic while setting TCP_CORK off.
|
no output from test machine (10)
|
-1 |
C |
|
|
19806 |
574d |
1497d
|
26/26 |
570d |
16dba7fa7677
systrap: handle stub thread crashes
|
panic: stub thread ADDR failed: err 0x-ADDR line NUM: sysmsg.Msg{msg: ADDR state NUM err -ADDR line NUM debug NUM app st
|
2 |
C |
|
|
5 |
616d |
616d
|
26/26 |
590d |
fe66cae2edc7
Enumerate known systrap stub failures to exit process cleanly.
|
panic: Decrementing non-positive ref count ADDR, owned by tmpfs.inode (4)
|
2 |
C |
|
|
22 |
608d |
614d
|
26/26 |
605d |
7b151e25d076
Don't drop the mountpoint reference in already umounted dead mountpoints.
|
DATA RACE in safemem.Copy (7)
|
-1 |
C |
|
|
4 |
633d |
633d
|
26/26 |
629d |
de71aae89aed
`seccomp`: Use dedicated input buffer for populating seccomp cache.
|
kvm: panic: Sentry detected stuck tasks (22)
|
-1 |
C |
|
|
8 |
654d |
664d
|
26/26 |
646d |
eaee2b213b2d
Add check to pivot_root that ensures the new root is underneath the old root.
|
fatal error: stack overflow (5)
|
-1 |
C |
|
|
23 |
650d |
667d
|
26/26 |
646d |
eaee2b213b2d
Add check to pivot_root that ensures the new root is underneath the old root.
|
panic: runtime error: invalid memory address or nil pointer dereference (22)
|
2 |
|
|
|
1 |
659d |
659d
|
26/26 |
658d |
4733e050ebec
Check that handshake.listenEP is non-nil.
|
panic: attempted to rewrite jump target to a different return instruction: from={pc=NUM: {NUM NUM NUM NUM}}, to={pc=NUM:
|
2 |
C |
|
|
8 |
665d |
665d
|
26/26 |
660d |
7cf14b7c8b5e
Add equality function for BPF instructions.
|
fatal error: stack overflow (4)
|
-1 |
C |
|
|
12 |
667d |
671d
|
26/26 |
667d |
c16916e7d780
Move lockMountpoint to the beginning of pivot_root.
|
kvm: panic: Sentry detected stuck tasks (21)
|
-1 |
C |
|
|
2 |
669d |
670d
|
26/26 |
667d |
c16916e7d780
Move lockMountpoint to the beginning of pivot_root.
|
fatal error: large allocation
|
-1 |
C |
|
|
234 |
680d |
683d
|
26/26 |
668d |
917bee5b6d91
Add a size limit to `outputQueueTransformer.transform`.
|
panic: runtime error: slice bounds out of range [12:LINE]
|
2 |
C |
|
|
63 |
673d |
1452d
|
26/26 |
671d |
c96439ecd0b4
devpts: IterDirents has to check offset and return if it is out of range
|
kvm: panic: Sentry detected stuck tasks (20)
|
-1 |
C |
|
|
2 |
673d |
673d
|
26/26 |
671d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
fatal error: stack overflow (3)
|
-1 |
|
|
|
2 |
673d |
673d
|
26/26 |
672d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: Decrementing non-positive ref count ADDR, owned by tmpfs.inode (3)
|
2 |
C |
|
|
16 |
673d |
673d
|
26/26 |
672d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: Decrementing non-positive ref count ADDR, owned by vfs.Filesystem
|
2 |
C |
|
|
152 |
672d |
674d
|
26/26 |
672d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: runtime error: invalid memory address or nil pointer dereference (21)
|
2 |
|
|
|
1 |
673d |
673d
|
26/26 |
672d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: Incrementing non-positive count ADDR on tmpfs.inode (4)
|
2 |
C |
|
|
24 |
672d |
674d
|
26/26 |
672d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: Incrementing non-positive count ADDR on vfs.Filesystem (3)
|
2 |
|
|
|
1 |
673d |
673d
|
26/26 |
672d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: tmpfs.inode.decLinksLocked() called with no existing links
|
2 |
|
|
|
1 |
672d |
672d
|
26/26 |
672d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: tmpfs.inode.incLinksLocked() called with no existing links
|
2 |
C |
|
|
1 |
673d |
673d
|
26/26 |
672d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
kvm: panic: Sentry detected stuck tasks (19)
|
-1 |
|
|
|
3 |
675d |
674d
|
26/26 |
673d |
3ab01aedb874
Refactor the umount algorithm.
|
kvm: panic: Sentry detected stuck tasks (18)
|
-1 |
C |
|
|
3 |
687d |
692d
|
26/26 |
685d |
429f7c439616
Move rootfs check to inside mountMu.
|
panic: runtime error: invalid memory address or nil pointer dereference (20)
|
2 |
C |
|
|
8 |
687d |
694d
|
26/26 |
687d |
429f7c439616
Move rootfs check to inside mountMu.
|
panic: WARNING: circular locking detected: mm.activeRWMutex -> tmpfs.filesystemRWMutex:
|
2 |
|
|
|
1 |
700d |
700d
|
26/26 |
687d |
e1e7edcc1b67
Don't release unused RightsControlMessage in Recv.
|
panic: close of closed channel
|
2 |
C |
|
|
1192 |
1321d |
1330d
|
26/26 |
689d |
2e3e5b606789
Create a new test dimension that mounts a FUSE fs on /tmp.
|
DATA RACE in vfs.(*Mount).setMountOptions
|
-1 |
C |
|
|
5 |
698d |
698d
|
26/26 |
694d |
ea4f0073d4a1
Fix data race between getting mount options and updating mount options.
|
gvisor boot error: init process did not start (5)
|
-1 |
|
|
|
41 |
799d |
927d
|
26/26 |
696d |
2e8b96b4fd74
Automated rollback of changelist 514487900
|
panic: Sentry detected stuck tasks (24)
|
2 |
C |
|
|
13 |
701d |
707d
|
26/26 |
701d |
1407fdf120ab
Fix concurrent pivot_root bug.
|
panic: expected socket to exist at '!N
|
2 |
C |
|
|
23 |
703d |
703d
|
26/26 |
701d |
707ac55a05d7
inet: don't reuse names from the abstract socket namespace map
|
panic: expected socket to exist at '$N
|
2 |
C |
|
|
24 |
705d |
705d
|
26/26 |
701d |
707ac55a05d7
inet: don't reuse names from the abstract socket namespace map
|
panic: expected socket to exist at '#N
|
2 |
C |
|
|
23 |
703d |
703d
|
26/26 |
701d |
707ac55a05d7
inet: don't reuse names from the abstract socket namespace map
|
panic: expected socket to exist at ' N
|
2 |
C |
|
|
20 |
704d |
705d
|
26/26 |
701d |
707ac55a05d7
inet: don't reuse names from the abstract socket namespace map
|
panic: Sentry detected stuck tasks (23)
|
2 |
C |
|
|
23 |
707d |
713d
|
26/26 |
707d |
a8bc2e146626
Fix group id cleanup and tidy up some mount methods.
|
kvm: panic: Sentry detected stuck tasks (17)
|
-1 |
|
|
|
14 |
712d |
742d
|
26/26 |
710d |
44e0d6d07246
Unlock putOldMp before retrying the mount checks in pivot_root.
|
panic: Sentry detected stuck tasks (22)
|
2 |
|
|
|
5 |
713d |
713d
|
26/26 |
713d |
44e0d6d07246
Unlock putOldMp before retrying the mount checks in pivot_root.
|
panic: runtime error: invalid memory address or nil pointer dereference (19)
|
2 |
C |
|
|
79 |
715d |
729d
|
26/26 |
714d |
f744f443dd7d
Check before attempting to mount an anon mountpoint.
|
panic: nested locking: tmpfs.filesystemRWMutex:
|
2 |
|
|
|
1 |
731d |
724d
|
26/26 |
714d |
c74f5866cb75
Fix circular lock that can happen during unlink.
|
DATA RACE in kernel.(*Task).MemoryManager (3)
|
-1 |
C |
|
|
12 |
715d |
715d
|
26/26 |
714d |
c39ecc4eb47a
The local task in process_vm_read|writev is just the calling task.
|
DATA RACE in kernel.(*runExitMain).execute (2)
|
-1 |
C |
|
|
143 |
1024d |
1034d
|
26/26 |
714d |
b66713079526
Clean up and re-enable process_vm_readv/writev
|
DATA RACE in binary.littleEndian.Uint64 (2)
|
-1 |
C |
|
|
48 |
1024d |
1034d
|
26/26 |
714d |
b66713079526
Clean up and re-enable process_vm_readv/writev
|
panic: Sentry detected stuck tasks (21)
|
2 |
|
|
|
64 |
714d |
762d
|
26/26 |
714d |
677d11f22fbe
Chunkify tmpfs Allocate().
|
DATA RACE in vfs.(*VirtualFilesystem).connectLocked (2)
|
-1 |
|
|
|
2 |
727d |
727d
|
26/26 |
714d |
de5271b36007
Fix small data race in mount.
|
DATA RACE in safemem.Copy (6)
|
-1 |
C |
|
|
121 |
1024d |
1024d
|
26/26 |
714d |
b66713079526
Clean up and re-enable process_vm_readv/writev
|
panic: Unknown syscall NUM error: strconv.ParseInt: parsing "./file1": invalid syntax
|
2 |
C |
|
|
19 |
737d |
730d
|
26/26 |
722d |
1910a4577f01
cgroupfs: do not return errors from strconv.ParseInt() to write()
|
panic: runtime error: invalid memory address or nil pointer dereference (18)
|
2 |
|
|
|
4 |
740d |
741d
|
26/26 |
737d |
bb4410f44e32
Rollback 6ceceae9385c and 206e88db3653.
|
gvisor test error: panic: interface conversion: vfs.DentryImpl is *tmpfs.dentry, not *kernfs.Dentry
|
-1 |
|
|
|
38 |
742d |
743d
|
26/26 |
741d |
206e88db3653
Fix cwd/root update method during namespace cloning.
|
panic: nested locking: kernfs.filesystemRWMutex: (7)
|
2 |
|
|
|
4 |
756d |
758d
|
26/26 |
751d |
c80ab228d85b
Make vfs.PopDelayedDecRefs() clear vfs.toDecRef.
|
panic: nested locking: kernfs.filesystemRWMutex: (6)
|
2 |
C |
|
|
8 |
758d |
774d
|
26/26 |
758d |
755c1f242cd4
nsfs: mark inodes as anonymous
|
panic: Sentry detected stuck tasks (20)
|
2 |
C |
|
|
895 |
763d |
765d
|
26/26 |
762d |
960b564a6840
Fix small mount propagation bug.
|
kvm: panic: Sentry detected stuck tasks (15)
|
-1 |
C |
|
|
186 |
763d |
765d
|
26/26 |
762d |
960b564a6840
Fix small mount propagation bug.
|
kvm: panic: Sentry detected stuck tasks (14)
|
-1 |
syz |
|
|
4 |
778d |
783d
|
26/26 |
773d |
118a17d92dcf
kernfs: set DenySpliceIn for DynamicBytesFD
|
panic: runtime error: invalid memory address or nil pointer dereference (17)
|
2 |
|
|
|
2 |
777d |
777d
|
26/26 |
777d |
6f978d71856e
kernel: GetMountNamespace has to check that mntns isn't nil
|
DATA RACE in udp.(*endpoint).Connect.func1
|
-1 |
C |
|
|
3 |
792d |
785d
|
26/26 |
777d |
5babda534107
Lock around endpoint info access in UDP onICMPError.
|
SYZFATAL: executor NUM failed NUM times: executor NUM: exit status NUM
|
-1 |
syz |
|
|
48074 |
778d |
1197d
|
26/26 |
778d |
41bb04c14901
Implement mount namespaces
|
panic: runtime error: invalid memory address or nil pointer dereference (16)
|
2 |
C |
|
|
48 |
779d |
786d
|
26/26 |
778d |
ef95be6e1c10
kernel: check that a task has a network namespace
|
panic: kcov task work is registered, but no coverage data was found
|
2 |
|
|
|
6120 |
793d |
798d
|
26/26 |
790d |
f43a5fc63ac7
Remove panic in ConsumeCoverageData() when no coverage is observed.
|
panic: Sentry detected stuck tasks (18)
|
2 |
C |
|
|
625 |
794d |
853d
|
26/26 |
793d |
e54e3668b07c
Impose default tmpfs size limits correctly.
|
gvisor test error: FATAL ERROR: waiting on pid X: waiting on pid X in sandbox NAME failed: EOF (3)
|
-1 |
|
|
|
124 |
798d |
799d
|
26/26 |
797d |
ffcbc70b9a4a
systrap: don't change an fpu state from the stub code
|
DATA RACE in pipefs.(*inode).UID
|
-1 |
syz |
|
|
2 |
798d |
798d
|
26/26 |
797d |
02ed5839a762
Add a lock to pipefs's inode to protect a inode's attributes.
|
lost connection to test machine (8)
|
-1 |
|
|
|
1964 |
798d |
1130d
|
26/26 |
797d |
8b57c2e7402f
runsc/seccomp: allow sched_getaffinity if race is on
|
panic: runtime error: invalid memory address or nil pointer dereference (15)
|
2 |
|
|
|
1 |
826d |
826d
|
26/26 |
799d |
bb5ada8caffd
Defer dec refing mounts in InvalidateDentry.
|
panic: WARNING: circular locking detected: stack.packetEndpointListRWMutex -> fasync.fileMutex: (2)
|
2 |
|
|
|
2 |
822d |
822d
|
26/26 |
815d |
fedbf08401fe
kernel: unshare a network namespace without taking Task.mu
|
panic: WARNING: circular locking detected: fasync.fileMutex -> kernel.taskSetRWMutex: (2)
|
2 |
C |
|
|
1 |
822d |
822d
|
26/26 |
815d |
fedbf08401fe
kernel: unshare a network namespace without taking Task.mu
|
panic: WARNING: circular locking detected: stack.packetEndpointListRWMutex -> kernel.taskSetRWMutex: (2)
|
2 |
C |
|
|
3 |
822d |
822d
|
26/26 |
815d |
fedbf08401fe
kernel: unshare a network namespace without taking Task.mu
|
kvm: lost connection to test machine (3)
|
-1 |
|
|
|
8 |
832d |
855d
|
26/26 |
826d |
52692c3647ea
fdtable: avoid large arrays
|
panic: nested locking: kernfs.filesystemRWMutex: (5)
|
2 |
|
|
|
5 |
826d |
828d
|
26/26 |
826d |
bb5ada8caffd
Defer dec refing mounts in InvalidateDentry.
|
panic: nested locking: kernfs.filesystemRWMutex: (4)
|
2 |
C |
|
|
31 |
829d |
923d
|
26/26 |
828d |
084a5022563f
Change InvalidateDentry to return a list of vds with an extra reference.
|
kvm: panic: Sentry detected stuck tasks (12)
|
-1 |
|
|
|
193 |
832d |
994d
|
26/26 |
832d |
52692c3647ea
fdtable: avoid large arrays
|
panic: WARNING: circular locking detected: mm.activeRWMutex -> kernfs.filesystemRWMutex:
|
2 |
C |
|
|
4 |
864d |
864d
|
26/26 |
833d |
8c975e6e6e68
Mark some kernfs inode as Anonymous.
|
DATA RACE in fasync.(*FileAsync).SetOwnerTask
|
-1 |
C |
|
|
11 |
834d |
835d
|
26/26 |
833d |
5fed8c81b89a
Fix data race by acquiring lock before accessing fields of FileAsync.
|
panic: WARNING: circular locking detected: fasync.fileMutex -> kernel.taskSetRWMutex:
|
2 |
C |
|
|
1 |
836d |
836d
|
26/26 |
833d |
f3d87d3be121
fasync: release the FileAsync mutex before sending the signal
|
panic: WARNING: circular locking detected: stack.packetEndpointListRWMutex -> fasync.fileMutex:
|
2 |
|
|
|
1 |
836d |
836d
|
26/26 |
833d |
f3d87d3be121
fasync: release the FileAsync mutex before sending the signal
|
panic: WARNING: circular locking detected: stack.packetEndpointListRWMutex -> kernel.taskSetRWMutex:
|
2 |
C |
|
|
3 |
836d |
836d
|
26/26 |
833d |
f3d87d3be121
fasync: release the FileAsync mutex before sending the signal
|
panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> kernfs.filesystemRWMutex: (2)
|
2 |
|
|
|
1 |
855d |
855d
|
26/26 |
833d |
ed528835f753
Small circular lock fix.
|
gvisor test error: SYZFATAL: BUG: got no fallback coverage:
|
-1 |
|
|
|
132 |
854d |
931d
|
26/26 |
843d |
83f4f485b4ad
systrap: don't call Goyield() if the race detector is enabled
|
panic: Incrementing non-positive count ADDR on tmpfs.inode (3)
|
2 |
|
|
|
6 |
862d |
884d
|
26/26 |
847d |
283b80a456aa
Fix logic bug in attaching mounts.
|
DATA RACE in log.GoogleEmitter.Emit (2)
|
-1 |
|
|
|
3 |
851d |
853d
|
26/26 |
847d |
158636229e87
Avoid serializing the sharedContext struct in formatting directives.
|
DATA RACE in kernel.(*TaskImage).Fork
|
-1 |
C |
|
|
8 |
943d |
943d
|
26/26 |
850d |
028cf757bbef
Clarify comment about copying Task.image in Task.Clone().
|
panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> tmpfs.filesystemRWMutex: (2)
|
2 |
C |
|
|
17 |
855d |
855d
|
26/26 |
853d |
ed528835f753
Small circular lock fix.
|
panic: Sentry detected stuck tasks (17)
|
2 |
C |
|
|
822 |
853d |
1119d
|
26/26 |
853d |
ed528835f753
Small circular lock fix.
|
gvisor build error (19)
|
-1 |
|
|
|
110 |
856d |
856d
|
26/26 |
855d |
74e63e9e296a
Update packages
|
panic: Decrementing non-positive ref count ADDR, owned by tmpfs.inode (2)
|
2 |
C |
|
|
47 |
862d |
867d
|
26/26 |
855d |
283b80a456aa
Fix logic bug in attaching mounts.
|
gvisor test error: timed out (4)
|
-1 |
|
|
|
548 |
857d |
1221d
|
26/26 |
856d |
83f4f485b4ad
systrap: don't call Goyield() if the race detector is enabled
|
panic: WARNING: circular locking detected: stack.neighborEntryRWMutex -> stack.nicRWMutex:
|
2 |
|
|
|
1 |
889d |
889d
|
26/26 |
857d |
38823be81914
Don't lock before accessing nic.networkEndpoints
|
panic: WARNING: circular locking detected: transport.streamQueueReceiverMutex -> kernfs.filesystemRWMutex:
|
2 |
C |
|
|
1 |
864d |
864d
|
26/26 |
857d |
2044c3449153
Don't hold streamQueueReceiver.mu while calling RightsControlMessage.Release().
|
panic: WARNING: circular locking detected: transport.endpointMutex -> kernfs.filesystemRWMutex:
|
2 |
C |
|
|
1 |
864d |
864d
|
26/26 |
857d |
a7e1fe92f588
Don't hold baseEndpoint.mu when calling receiver.Recv.
|
panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> tmpfs.filesystemRWMutex:
|
2 |
C |
|
|
18 |
978d |
1053d
|
26/26 |
857d |
e0b1585586c6
Remove stale `vdDentry` variable from VirtualFilesystem.connectMountAt().
|
panic: nested locking: transport.endpointMutex:
|
2 |
C |
|
|
1 |
864d |
864d
|
26/26 |
857d |
a7e1fe92f588
Don't hold baseEndpoint.mu when calling receiver.Recv.
|
fatal error: unexpected signal during runtime execution (3)
|
-1 |
|
|
|
9 |
902d |
905d
|
26/26 |
902d |
96aa115516c8
systrap: simplify interrupt handling in syshandler
|
gvisor boot error: panic: prctl(PR_SET_NO_NEW_PRIVS) failed: invalid argument
|
-1 |
|
|
|
12 |
905d |
905d
|
26/26 |
905d |
6890e539c700
systrap: set all arguments of prctl(PR_SET_NO_NEW_PRIVS)
|
panic: interface conversion: *kernel.Kernel is not unimpl.Events: missing method EmitUnimplementedEvent
|
2 |
C |
|
|
5857 |
910d |
911d
|
26/26 |
909d |
f8b98248139c
Update `unimpl.EmitUnimplementedEvent` interface to add the syscall number.
|
gvisor test error: SYZFATAL: BUG: program execution failed: executor NUM: not serving
|
-1 |
|
|
|
137 |
911d |
918d
|
26/26 |
911d |
08920d098b30
Fix systrap TLS handling on ARM.
|
gvisor build error (18)
|
-1 |
|
|
|
313 |
918d |
940d
|
26/26 |
911d |
fedadb093205
Fix syzkaller systrap builds.
|
DATA RACE in systrap.(*subprocessPool).fetchAvailable
|
-1 |
|
|
|
25 |
921d |
932d
|
26/26 |
911d |
f01bf248c19f
Fix data race in subprocess pool.
|
panic: WARNING: circular locking detected: tmpfs.filesystemRWMutex -> kernel.taskSetRWMutex:
|
2 |
syz |
|
|
14 |
917d |
1192d
|
26/26 |
911d |
758da469f7ed
kernel: release kernel.taskSetRWMutex before calling TaskImage.Release
|
panic: runtime error: index out of range [ADDR] with length NUM
|
2 |
C |
|
|
17 |
922d |
922d
|
26/26 |
911d |
fc94225c333d
Fix crash with large FD value
|
gvisor boot error: FATAL ERROR: overlay flag is incompatible with shared file access for rootfs
|
-1 |
|
|
|
148 |
925d |
926d
|
26/26 |
916d |
1b7a4e2a055c
Prepare to make root overlay the default.
|
gvisor boot error: FATAL ERROR: overlay flag has been replaced with overlay2 flag
|
-1 |
|
|
|
66 |
924d |
925d
|
26/26 |
916d |
1b7a4e2a055c
Prepare to make root overlay the default.
|
DATA RACE in vfs.(*VirtualFilesystem).PivotRoot
|
-1 |
C |
|
|
1 |
934d |
934d
|
26/26 |
925d |
807fd0fd27d0
Lock around accessing the mount namespace in pivot_root.
|
panic: runtime error: invalid memory address or nil pointer dereference (14)
|
2 |
C |
|
|
753 |
933d |
935d
|
18/26 |
933d |
8a1845f8b850
Don't send a signal to a controlling thread group if one has not been set.
|
fatal error: stack overflow
|
-1 |
|
|
|
1 |
1009d |
1009d
|
18/26 |
934d |
426deb60fd25
lockdep: fix the TOCTTOU issue
|
panic: runtime error: invalid memory address or nil pointer dereference (13)
|
2 |
C |
|
|
2752 |
935d |
938d
|
18/26 |
935d |
8184fa1db0fa
Clean up devpts code, and deduplicate the foreground process state.
|
panic: runtime error: slice bounds out of range [:NUM] with capacity NUM (2)
|
2 |
C |
|
|
7 |
939d |
941d
|
18/26 |
938d |
5817f4cc64e4
Fix FUSE how handles malformed INIT requests.
|
panic: nested locking: kernfs.filesystemRWMutex: (3)
|
2 |
syz |
|
|
19 |
946d |
971d
|
18/26 |
944d |
28472cc03fe1
don't take an unnecessary reference in proc.fdSymlink.Valid()
|
panic: interface conversion: vfs.DentryImpl is *vfs.anonDentry, not *kernfs.Dentry (2)
|
2 |
C |
|
|
13 |
952d |
952d
|
18/26 |
950d |
1beb3e2b251d
Check hard link target's mount compatibility before kernfs.Dentry cast. Again.
|
panic: interface conversion: vfs.DentryImpl is *tmpfs.dentry, not *kernfs.Dentry (2)
|
2 |
C |
|
|
65 |
950d |
952d
|
18/26 |
950d |
1beb3e2b251d
Check hard link target's mount compatibility before kernfs.Dentry cast. Again.
|
panic: interface conversion: vfs.DentryImpl is *vfs.anonDentry, not *kernfs.Dentry
|
2 |
C |
|
|
14 |
954d |
957d
|
18/26 |
952d |
8373fb5db8c8
Check hard link target's mount compatibility before kernfs.Dentry cast.
|
panic: interface conversion: vfs.DentryImpl is *tmpfs.dentry, not *kernfs.Dentry
|
2 |
C |
|
|
390 |
952d |
957d
|
18/26 |
952d |
8373fb5db8c8
Check hard link target's mount compatibility before kernfs.Dentry cast.
|
panic: interface conversion: vfs.DentryImpl is *gofer.dentry, not *kernfs.Dentry
|
2 |
C |
|
|
13 |
954d |
954d
|
18/26 |
954d |
8373fb5db8c8
Check hard link target's mount compatibility before kernfs.Dentry cast.
|
panic: runtime error: index out of range [NUM] with length NUM (3)
|
2 |
C |
|
|
372 |
970d |
973d
|
18/26 |
970d |
fe562179fea1
Handle absolute symlink target '/' correctly in VFS layer.
|
panic: runtime error: invalid memory address or nil pointer dereference (12)
|
2 |
C |
|
|
31 |
973d |
1034d
|
18/26 |
970d |
e08f204299df
inet: each socket has to hold a reference to its network namespace
|
panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> kernfs.filesystemRWMutex:
|
2 |
|
|
|
1 |
988d |
988d
|
18/26 |
972d |
492d7a98116b
Decref target VirtualDentry outside the vfs mount lock during mount ops.
|
gvisor test error: panic: ptrace set regs (&{PtraceRegs:{Regs:[ADDR NUM ADDR NUM NUM NUM NUM ADDR ADDR NUM NUM ADDR ADDR NUM ADDR ADDR NUM
|
-1 |
|
|
|
10 |
976d |
976d
|
15/26 |
974d |
194029b95444
arm64: validate registers that come from user-space
|
panic: WARNING: circular locking detected: stack.nicRWMutex -> stack.packetsPendingLinkResolutionMutex: (2)
|
2 |
C |
|
|
53 |
1008d |
1009d
|
14/26 |
1007d |
bc440b67fce0
Don't hold nic.mu when calling n.linkResQueue.cancel.
|
panic: WARNING: circular locking detected: stack.nicRWMutex -> stack.neighborCacheRWMutex:
|
2 |
C |
|
|
356 |
1010d |
1015d
|
14/26 |
1009d |
70be2fc8a772
Remove unsetting route's cached neighbor entry in link res callback.
|
gvisor build error (16)
|
-1 |
|
|
|
12 |
1022d |
1022d
|
14/26 |
1010d |
20b2ec04d94d
Update bazel packages
|
panic: WARNING: circular locking detected: stack.packetsPendingLinkResolutionMutex -> stack.routeRWMutex:
|
2 |
C |
|
|
2602 |
1010d |
1015d
|
14/26 |
1010d |
4f326de47636
Make nic.spoofing and nic.promiscuous atomic Bools to avoid lock contention.
|
panic: WARNING: circular locking detected: stack.nicRWMutex -> stack.packetsPendingLinkResolutionMutex:
|
2 |
C |
|
|
1246 |
1010d |
1015d
|
14/26 |
1010d |
4f326de47636
Make nic.spoofing and nic.promiscuous atomic Bools to avoid lock contention.
|
gvisor boot error: FATAL ERROR: running container: creating container: failed to create an unnamed temporary file inside "/tmp"
|
-1 |
|
|
|
24 |
1014d |
1014d
|
14/26 |
1013d |
368e85414697
overlay2: Do not use O_TMPFILE to create unnamed temporary file.
|
panic: WARNING: circular locking detected: kernel.signalHandlersMutex -> kernfs.filesystemRWMutex:
|
2 |
C |
|
|
351 |
1021d |
1023d
|
14/26 |
1020d |
d0ae59368d8a
cgroupfs: Fix lock ordering between kernfs.Filesystem.mu and TaskSet.mu.
|
panic: WARNING: circular locking detected: kernel.taskSetRWMutex -> kernfs.filesystemRWMutex:
|
2 |
C |
|
|
2320 |
1020d |
1023d
|
14/26 |
1020d |
d0ae59368d8a
cgroupfs: Fix lock ordering between kernfs.Filesystem.mu and TaskSet.mu.
|
panic: cgroupfs: pids controller attempted to remove pending charge for Task ADDR, but task didn't have pending charges, (2)
|
2 |
|
|
|
1 |
1054d |
1054d
|
14/26 |
1022d |
62ddad611979
cgroupfs: Fix several races with task migration.
|
panic: Decrementing non-positive ref count ADDR, owned by tmpfs.inode
|
2 |
C |
|
|
27 |
1023d |
1023d
|
14/26 |
1022d |
1823b16fccf7
Clean up DecRefs in mount methods.
|
panic: Incrementing non-positive count ADDR on tmpfs.inode (2)
|
2 |
C |
|
|
56 |
1022d |
1023d
|
14/26 |
1022d |
1823b16fccf7
Clean up DecRefs in mount methods.
|
panic: kernfs.Dentry.DecRef() called without holding a reference (2)
|
2 |
C |
|
|
61 |
1023d |
1023d
|
14/26 |
1022d |
1823b16fccf7
Clean up DecRefs in mount methods.
|
kvm: panic: Sentry detected stuck tasks (10)
|
-1 |
|
|
|
3 |
1039d |
1057d
|
14/26 |
1023d |
ece02b45b5b4
Add a maximum to the total number of mounts allowed in a namespace.
|
panic: Lock not held: transport.endpointMutex[e]:
|
2 |
C |
|
|
1191 |
1024d |
1024d
|
14/26 |
1024d |
1ceee8c31071
connectioned: Change nested lock name to only have a single nested lock.
|
DATA RACE in safemem.Copy (5)
|
-1 |
C |
|
|
3153 |
1024d |
1034d
|
14/26 |
1024d |
ae731e0394f5
Don't use other process's scratch buffer.
|
panic: unbalance unlock: mm.activeRWMutex:LINE:
|
2 |
|
|
|
2 |
1026d |
1038d
|
14/26 |
1024d |
445fa6f40c89
Lockdep: Print more info in the "unbalanced unlock" case.
|
panic: WARNING: circular locking detected: kernel.taskMutex -> kernel.taskSetRWMutex:
|
2 |
C |
|
|
1470 |
1034d |
1036d
|
14/26 |
1032d |
38a0512f13fa
Fix circular lock in process_vm_(read|write)v
|
DATA RACE in binary.littleEndian.Uint64
|
-1 |
C |
|
|
29 |
1134d |
1137d
|
14/26 |
1036d |
106f6ea96746
Re-enable process_vm_(read|write)v
|
panic: runtime error: slice bounds out of range [:ADDR] with capacity ADDR
|
2 |
C |
|
|
914 |
1036d |
1053d
|
14/26 |
1036d |
3c0e0a3746a3
io_uring: Fix several issues with shared ring buffers.
|
DATA RACE in safemem.Copy (4)
|
-1 |
C |
|
|
1019 |
1134d |
1137d
|
14/26 |
1036d |
106f6ea96746
Re-enable process_vm_(read|write)v
|
panic: runtime error: slice bounds out of range [ADDR:NUM]
|
2 |
C |
|
|
13 |
1040d |
1040d
|
14/26 |
1036d |
3c0e0a3746a3
io_uring: Fix several issues with shared ring buffers.
|
panic: runtime error: slice bounds out of range [:ADDR] with capacity NUM
|
2 |
C |
|
|
124 |
1036d |
1052d
|
14/26 |
1036d |
3c0e0a3746a3
io_uring: Fix several issues with shared ring buffers.
|
panic: runtime error: integer divide by zero (3)
|
2 |
C |
|
|
443 |
1036d |
1052d
|
14/26 |
1036d |
3c0e0a3746a3
io_uring: Fix several issues with shared ring buffers.
|
panic: Unknown syscall -NUM error: EOF
|
2 |
C |
|
|
14 |
1040d |
1042d
|
14/26 |
1036d |
f3aaf4326636
io_ring: Handle EOF on IORING_OP_READV
|
DATA RACE in tmpfs.GetSeals
|
-1 |
|
|
|
1 |
1041d |
1041d
|
14/26 |
1038d |
374e716c7ce2
AddSeals has to take the write lock to modify seals
|
DATA RACE in tmpfs.AddSeals
|
-1 |
C |
|
|
4 |
1041d |
1041d
|
14/26 |
1038d |
374e716c7ce2
AddSeals has to take the write lock to modify seals
|
panic: runtime error: slice bounds out of range [:NUM] with capacity NUM
|
2 |
C |
|
|
196 |
1322d |
1330d
|
14/26 |
1039d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
panic: addresses IP and fe80::aa do not have the same length (2)
|
2 |
|
|
|
1 |
1045d |
1045d
|
14/26 |
1040d |
8756ebc3b406
Netstack: Check address matches the endpoint protocol for IP_DROP_MEMBERSHIP
|
panic: runtime error: invalid memory address or nil pointer dereference (11)
|
2 |
C |
|
|
2733 |
1043d |
1137d
|
14/26 |
1042d |
ae136df84998
Add nil-check for parent mount in umount(2) while handling mount propagation.
|
DATA RACE in vfs.(*VirtualFilesystem).setPropagation
|
-1 |
C |
|
|
3 |
1056d |
1056d
|
14/26 |
1043d |
20ef2127a102
Lock around optional tag generation.
|
DATA RACE in bufferv2.newChunk
|
-1 |
C |
|
|
68 |
1050d |
1065d
|
14/26 |
1049d |
6b3b5493d0ea
Fix ipv6 header view ownership.
|
DATA RACE in vfs.(*VirtualFilesystem).GenerateProcMountInfo
|
-1 |
C |
|
|
2 |
1054d |
1056d
|
14/26 |
1053d |
20ef2127a102
Lock around optional tag generation.
|
panic: runtime error: integer divide by zero (2)
|
2 |
C |
|
|
56 |
1053d |
1053d
|
14/26 |
1053d |
d4b159ae93b5
iouring: Disallow zero, or less CQ entries than SQ entries
|
panic: nested locking: kernel.taskSetRWMutex:
|
2 |
C |
|
|
2 |
1111d |
1111d
|
14/26 |
1058d |
c1427a04dfba
Disable fasync for signalfd descriptors
|
gvisor test error: panic: WARNING: circular locking detected: mm.activeRWMutex -> kernel.taskSetRWMutex:
|
-1 |
|
|
|
1 |
1079d |
1079d
|
14/26 |
1073d |
2e844f74fcdd
Do not use ktime.Timer for CPU clock ticks.
|
panic: Decrementing non-positive ref count ADDR, owned by kernel.ProcessGroup (2)
|
2 |
C |
|
|
3 |
1077d |
1111d
|
14/26 |
1077d |
36ddd3050cc2
Check if ThreadGroup exists before executing JoinProcessGroup.
|
kvm: panic: Sentry detected stuck tasks (9)
|
-1 |
|
|
|
2 |
1105d |
1107d
|
14/26 |
1095d |
48e2252b3bac
fix panic caused by too-large buffer allocations
|
gvisor build error (15)
|
-1 |
|
|
|
232 |
1102d |
1100d
|
14/26 |
1098d |
d2827e5a9242
Don't require gcc-multilib to be installed to build BPF
|
panic: cgroupfs: pids controller pending pool would be negative if charge was allowed: current pool: NUM, proposed charg
|
2 |
C |
|
|
97 |
1115d |
1234d
|
14/26 |
1115d |
46e08207b58f
cgroupfs: Handle hierachy changes across charge/uncharge.
|
panic: addresses IP and fe80::aa do not have the same length
|
2 |
|
|
|
102 |
1134d |
1164d
|
14/26 |
1129d |
b195ca54f311
Netstack: Check that the multicast address matches the endpoint protocol.
|
DATA RACE in fuse.newFUSEFilesystem
|
-1 |
C |
|
|
384 |
1321d |
1330d
|
14/26 |
1137d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
panic: WARNING: circular locking detected: cgroupfs.pidsControllerMutex -> mm.mappingRWMutex:
|
2 |
|
|
|
3 |
1191d |
1193d
|
14/26 |
1190d |
d5a04e338eef
cgroupfs: Don't copy in with cgroups locks held.
|
panic: WARNING: circular locking detected: tmpfs.inodeMutex -> mm.activeRWMutex:
|
2 |
C |
|
|
8353 |
1193d |
1193d
|
14/26 |
1190d |
82498d087ef8
Don't hold MM.activeMu when calling MM.vmaMapsEntryLocked().
|
panic: Sentry detected stuck tasks (16)
|
2 |
|
|
|
5 |
1198d |
1271d
|
14/26 |
1196d |
8b41af93300c
sync/lockdep: use RangeRepeatable instead of Range
|
kvm: panic: Sentry detected stuck tasks (7)
|
-1 |
|
|
|
1 |
1216d |
1209d
|
14/26 |
1197d |
6fda48f50dcd
tcpip/transport/raw: check MTU before copying a buffer from user memory
|
panic: invalid allocation length: 0x0 (4)
|
2 |
C |
|
|
4338 |
1198d |
1200d
|
14/26 |
1198d |
3290a054c5bd
getdents: Test that size parameter is not zero before allocating PMAs.
|
panic: WARNING: circular locking detected: kernel.taskSetRWMutex -> mm.activeRWMutex:
|
2 |
|
|
|
2 |
1215d |
1210d
|
14/26 |
1204d |
e47be0cfc06d
Move Send/RecvNotify calls outside of CopyIn/Out, due to lock order.
|
panic: runtime error: index out of range [-NUM]
|
2 |
C |
|
|
13 |
1229d |
1229d
|
14/26 |
1226d |
a7cad2b092de
Tmpfs with size option enabled bug fix.
|
DATA RACE in fuse.(*connection).callFutureLocked
|
-1 |
C |
|
|
2 |
1327d |
1329d
|
14/26 |
1235d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.(*DeviceFD).Read
|
-1 |
C |
|
|
238 |
1324d |
1329d
|
14/26 |
1235d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.newFUSEConnection
|
-1 |
C |
|
|
52 |
1324d |
1330d
|
14/26 |
1235d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.(*DeviceFD).PWrite
|
-1 |
C |
|
|
11 |
1326d |
1329d
|
14/26 |
1235d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.(*DeviceFD).PRead
|
-1 |
C |
|
|
9 |
1325d |
1329d
|
14/26 |
1235d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.(*DeviceFD).Seek
|
-1 |
C |
|
|
8 |
1329d |
1330d
|
14/26 |
1235d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
panic: unexpected tcp state in processor: BOUND
|
2 |
C |
|
|
36 |
1246d |
1248d
|
14/26 |
1246d |
3b917921d7fe
Fix race in listen.
|
DATA RACE in cgroupfs.(*memsData).Write
|
-1 |
C |
|
|
4 |
1257d |
1257d
|
14/26 |
1249d |
5f9bd8a53b20
cgroupfs: Synchronize access to cpuset controller bitmaps.
|
panic: unknown network protocol number NUM
|
2 |
C |
|
|
56 |
1338d |
1350d
|
14/26 |
1268d |
6a28dc7c5963
Correct fragmentation reference counting.
|
panic: runtime error: invalid memory address or nil pointer dereference (10)
|
2 |
C |
|
|
11 |
1274d |
1280d
|
14/26 |
1273d |
5835bc8c3a4b
cgroupfs: Handle invalid PID/PGID on migration.
|
DATA RACE in kernfs.(*OrderedChildren).checkExistingLocked
|
-1 |
C |
|
|
1 |
1296d |
1296d
|
14/26 |
1275d |
9085d334deed
kernfs: Handle duplicate unlink on orphaned directories.
|
panic: Inode doesn't match what kernfs thinks! OrderedChild: &{dir:{InodeNoopRefCount:{InodeTemporary:{}} InodeAlwaysVal
|
2 |
C |
|
|
12 |
1281d |
1296d
|
14/26 |
1275d |
9085d334deed
kernfs: Handle duplicate unlink on orphaned directories.
|
DATA RACE in bitmap.(*Bitmap).Maximum
|
-1 |
C |
|
|
8 |
1288d |
1297d
|
14/26 |
1288d |
4503ba3f5efd
Fix data race when using UNSHARE in close_range.
|
kvm: lost connection to test machine
|
-1 |
|
|
|
364 |
1291d |
1644d
|
14/26 |
1288d |
81d384cfe9d3
Fix race between epoll readiness check and re-readying.
|
lost connection to test machine (6)
|
-1 |
|
|
|
4341 |
1289d |
1528d
|
14/26 |
1289d |
81d384cfe9d3
Fix race between epoll readiness check and re-readying.
|
DATA RACE in transport.(*connectionedEndpoint).Connect.func1 (2)
|
-1 |
C |
|
|
4 |
1305d |
1298d
|
14/26 |
1294d |
b1ceabc884c0
Hold baseEndpoint.mu when calling baseEndpoint.Connected()
|
kvm: panic: Sentry detected stuck tasks (6)
|
-1 |
|
|
|
15 |
1298d |
1308d
|
14/26 |
1297d |
f51097051ac5
tun: reject packets larger MTU
|
panic: Sentry detected stuck tasks (15)
|
2 |
C |
|
|
2582 |
1307d |
1384d
|
14/26 |
1301d |
510cc2f7fca9
Fix pivot_root lock inversion.
|
Invalid request partialResult in sendto (3)
|
-1 |
C |
|
|
9 |
1304d |
1305d
|
14/26 |
1302d |
395c38be75d1
Add ECONNABORTED to the partial result error list.
|
kvm: panic: Sentry detected stuck tasks (5)
|
-1 |
C |
|
|
65 |
1309d |
1371d
|
14/26 |
1309d |
b413d78c27db
sendfile: limit a buffer size
|
panic: runtime error: invalid memory address or nil pointer dereference (9)
|
2 |
C |
|
|
262 |
1321d |
1318d
|
14/26 |
1317d |
b7ccfa5084e2
Fixes #7086,#6964,#3413,#7001.
|
DATA RACE in fuse.(*connection).callFuture (2)
|
-1 |
|
|
|
3 |
1322d |
1323d
|
14/26 |
1321d |
e219f75d8b3c
Fuse: Cache `maxActiveRequests` in `connection` to avoid reading it from `fs`.
|
panic: Unknown syscall NUM error: payload too small. Minimum data lenth required: NUM, but got data length NUM
|
2 |
C |
|
|
79 |
1323d |
1329d
|
14/26 |
1323d |
55ef37166897
Return well-defined error on short payload in FUSE.
|
fatal error: sync: unlock of unlocked mutex
|
-1 |
C |
|
|
26 |
1323d |
1324d
|
14/26 |
1323d |
10d1a49c5ba2
Fuse: `DeviceFD.Read`: Lock `DeviceFD` ahead of other locks.
|
DATA RACE in fuse.(*connection).callFuture
|
-1 |
|
|
|
1 |
1327d |
1327d
|
14/26 |
1324d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in fuse.(*connection).initProcessReply
|
-1 |
C |
|
|
14 |
1324d |
1328d
|
14/26 |
1324d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in fuse.(*DeviceFD).writeLocked
|
-1 |
C |
|
|
33 |
1324d |
1329d
|
14/26 |
1324d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in fuse.(*connection).Call
|
-1 |
C |
|
|
65 |
1324d |
1328d
|
14/26 |
1324d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in fuse.(*DeviceFD).Release
|
-1 |
C |
|
|
404 |
1324d |
1329d
|
14/26 |
1324d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in stack.(*PacketBuffer).reset (2)
|
-1 |
syz |
|
|
2 |
1350d |
1350d
|
14/26 |
1325d |
6d15b0ee64f1
Fix packet buffer reference counting in IP fragmentation/reassembly.
|
panic: runtime error: invalid memory address or nil pointer dereference (8)
|
2 |
C |
|
|
214 |
1325d |
1350d
|
14/26 |
1325d |
6d15b0ee64f1
Fix packet buffer reference counting in IP fragmentation/reassembly.
|
panic: Incrementing non-positive count ADDR on stack.PacketBuffer
|
2 |
C |
|
|
9 |
1336d |
1336d
|
14/26 |
1325d |
6d15b0ee64f1
Fix packet buffer reference counting in IP fragmentation/reassembly.
|
DATA RACE in mqfs.FilesystemType.GetFilesystem
|
-1 |
|
|
|
1 |
1340d |
1340d
|
14/26 |
1325d |
d1dadc9c19a1
Remove dentry_cache_limit mount option from mqfs.
|
gvisor build error (13)
|
-1 |
|
|
|
201 |
1331d |
1338d
|
14/26 |
1331d |
c18ec0b53cf2
Fix race build error.
|
panic: runtime error: index out of range [NUM] with length NUM (2)
|
2 |
C |
|
|
21 |
1331d |
1338d
|
14/26 |
1331d |
5fb527632358
Handle 0 sized writes to /dev/net/tun.
|
panic: PullUp failed (2)
|
2 |
syz |
|
|
4 |
1339d |
1348d
|
14/26 |
1336d |
6d15b0ee64f1
Fix packet buffer reference counting in IP fragmentation/reassembly.
|
DATA RACE in transport.(*connectionedEndpoint).Listen
|
-1 |
|
|
|
1 |
1368d |
1367d
|
14/26 |
1352d |
52bee5297caf
unix: call Listening under the endpoint lock
|
DATA RACE in udp.(*endpoint).Connect (2)
|
-1 |
C |
|
|
4 |
1758d |
1763d
|
14/26 |
1361d |
2485a4e2cb4a
Make stack.Route safe to access concurrently
|
kvm: panic: Sentry detected stuck tasks (4)
|
-1 |
C |
|
|
627 |
1378d |
1406d
|
14/26 |
1378d |
4d29819e13a1
pipe: have separate notifiers for readers and writers
|
panic: Sentry detected stuck tasks (14)
|
2 |
|
|
|
20 |
1387d |
1432d
|
14/26 |
1386d |
b2f8b495ad73
cgroup/cpuset: handle the offset argument of write methods properly
|
DATA RACE in stack.(*PacketBuffer).reset
|
-1 |
|
|
|
9 |
1408d |
1408d
|
14/26 |
1408d |
bb1ae811f4eb
Prevent PacketBuffers from being returned to the pool too early in nic.
|
panic: runtime error: makeslice: len out of range (4)
|
2 |
|
|
|
36 |
1408d |
1412d
|
14/26 |
1408d |
37792ee1e6e1
Validate ControlMessageHeader.Length
|
SYZFAIL: tun: can't open /dev/net/tun
|
-1 |
syz |
|
|
339 |
1416d |
1669d
|
14/26 |
1416d |
58017e655399
Handle UMOUNT_NOFOLLOW in VFS2 umount(2).
|
kvm: no output from test machine (2)
|
-1 |
C |
|
|
23 |
1418d |
1495d
|
14/26 |
1416d |
58017e655399
Handle UMOUNT_NOFOLLOW in VFS2 umount(2).
|
DATA RACE in cgroupfs.(*cpusData).Generate
|
-1 |
|
|
|
2 |
1422d |
1427d
|
14/26 |
1421d |
6078d26588c0
Sychronize access to cpuset controller bitmaps.
|
DATA RACE in cgroupfs.(*cpusData).Write
|
-1 |
C |
|
|
6 |
1422d |
1427d
|
14/26 |
1421d |
6078d26588c0
Sychronize access to cpuset controller bitmaps.
|
panic: runtime error: index out of range [NUM] with length NUM
|
2 |
C |
|
|
12 |
1424d |
1426d
|
14/26 |
1423d |
f54a25c1f03e
Validate an icmp header before accessing it
|
panic: interface conversion: kernfs.Inode is nil, not *mqfs.rootInode
|
2 |
|
|
|
2 |
1424d |
1427d
|
14/26 |
1423d |
763d7e6e396d
Obtain ref on root dentry in mqfs.GetFilesystem.
|
panic: runtime error: invalid memory address or nil pointer dereference (7)
|
2 |
C |
|
|
45305 |
1423d |
1452d
|
14/26 |
1423d |
763d7e6e396d
Obtain ref on root dentry in mqfs.GetFilesystem.
|
panic: kernfs.Dentry.DecRef() called without holding a reference
|
2 |
C |
|
|
87 |
1423d |
1427d
|
14/26 |
1423d |
763d7e6e396d
Obtain ref on root dentry in mqfs.GetFilesystem.
|
panic: Only permission mask must be set: ADDR
|
2 |
C |
|
|
756 |
1423d |
1427d
|
14/26 |
1423d |
4d07fc952d6b
Do not leak non-permission mode bits in mq_open(2).
|
gvisor build error (11)
|
-1 |
|
|
|
386 |
1494d |
1499d
|
14/26 |
1451d |
c2353e4055ac
[op] Fix //debian:debian.
|
FATAL ERROR: waiting on pid X: waiting on pid X in sandbox NAME failed: EOF (3)
|
-1 |
C |
|
|
2034 |
1452d |
1546d
|
14/26 |
1451d |
0bdd79ccd469
kvm: trap mmap syscalls to map new regions to the guest
|
DATA RACE in safemem.Copy (3)
|
-1 |
C |
|
|
3 |
1457d |
1457d
|
14/26 |
1451d |
1fe0a6691ff5
Prevent PacketData from being modified.
|
panic: runtime error: slice bounds out of range [:LINE] with capacity 0
|
2 |
|
|
|
2 |
1501d |
1503d
|
14/26 |
1452d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
panic: Sentry detected stuck tasks (13)
|
2 |
|
|
|
1 |
1462d |
1462d
|
14/26 |
1452d |
4076153be684
Fix lock ordering violation
|
Invalid request partialResult in pwritev
|
-1 |
C |
|
|
278 |
1645d |
1663d
|
14/26 |
1455d |
7fac7e32f3a8
Translate syserror when validating partial IO errors
|
kvm: panic: Watchdog goroutine is stuck (4)
|
-1 |
|
|
|
18 |
1483d |
1540d
|
14/26 |
1455d |
14d6cb4436f1
platform/kvm: fix a race condition in vCPU.unlock()
|
panic: runtime error: slice bounds out of range [40:LINE]
|
2 |
|
|
|
3 |
1509d |
1512d
|
14/26 |
1455d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
Invalid request partialResult in sendto (2)
|
-1 |
C |
|
|
10 |
1490d |
1565d
|
14/26 |
1455d |
e5fe488b2273
Wake up Writers when tcp socket is shutdown for writes.
|
kvm: panic: Sentry detected stuck tasks (2)
|
-1 |
C |
|
|
66 |
1462d |
1624d
|
14/26 |
1455d |
1947c873423c
Fix deadlock in /proc/[pid]/fd/[num]
|
panic: Sentry detected stuck tasks (12)
|
2 |
|
|
|
2 |
1464d |
1463d
|
14/26 |
1463d |
51b96514cd93
Limit most file mmaps to the range of an int64.
|
DATA RACE in msgqueue.(*Queue).pop
|
-1 |
C |
|
|
2 |
1488d |
1488d
|
14/26 |
1464d |
d6c99694bcb9
Fix race on msgrcv(MSG_COPY).
|
panic: Sentry detected stuck tasks (11)
|
2 |
C |
|
|
31 |
1479d |
1606d
|
14/26 |
1476d |
9149b2cefdb5
unix: avoid taking two endpoint locks
|
panic: runtime error: makeslice: len out of range (3)
|
2 |
C |
|
|
10 |
1479d |
1479d
|
14/26 |
1478d |
927ea16dd384
unix: handle a case when a buffer is overflowed
|
panic: unknown error: SIGBUS at ADDR
|
2 |
C |
|
|
17 |
1480d |
1494d
|
14/26 |
1480d |
dfbcb8903ae8
[syserr] Fix SIGBUS on syserr.FromError
|
DATA RACE in safemem.Copy (2)
|
-1 |
C |
|
|
9 |
1505d |
1505d
|
14/26 |
1494d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
panic: runtime error: slice bounds out of range [2:LINE]
|
2 |
|
|
|
1 |
1521d |
1521d
|
14/26 |
1494d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
DATA RACE in buffer.(*buffer).Remove
|
-1 |
C |
|
|
2 |
1505d |
1505d
|
14/26 |
1494d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
kvm: no output from test machine
|
-1 |
|
|
|
1107 |
1505d |
1655d
|
14/26 |
1505d |
569f605f438d
Correctly handle interruptions in blocking msgqueue syscalls.
|
no output from test machine (9)
|
-1 |
C |
|
|
2298 |
1505d |
1660d
|
14/26 |
1505d |
569f605f438d
Correctly handle interruptions in blocking msgqueue syscalls.
|
panic: unable to find an index for ID: 0
|
2 |
C |
|
|
1497 |
1518d |
1518d
|
14/26 |
1518d |
3d0a9300050a
Don't panic on user-controlled state in semaphore syscalls.
|
DATA RACE in atomic.CompareAndSwapInt32 (4)
|
-1 |
syz |
|
|
4 |
1531d |
1524d
|
14/26 |
1520d |
a89b2f005b71
Use atomics when checking for parent setgid in VFS2 tmpfs file creation.
|
panic: FIN segments must be the final segment in the write list.
|
2 |
|
|
|
2 |
1537d |
1537d
|
14/26 |
1533d |
1fc7a9eac2f2
Do not queue zero sized segments.
|
FATAL ERROR: waiting on pid X: waiting on pid X in sandbox NAME failed: EOF (2)
|
-1 |
C |
|
|
2532 |
1546d |
2158d
|
14/26 |
1546d |
d703340bc04a
runsc: don't kill sandbox, let it stop properly
|
panic: Incrementing non-positive count ADDR on kernel.ProcessGroup (2)
|
2 |
|
|
|
1 |
1555d |
1555d
|
14/26 |
1546d |
2e6195ffe0ad
CreateProcessGroup has to check whether a target process stil exists or not
|
kvm: panic: Watchdog goroutine is stuck (3)
|
-1 |
C |
|
|
48 |
1561d |
1612d
|
14/26 |
1560d |
3fcbad509300
Fix lock ordering issue when enumerating cgroup tasks.
|
panic: Watchdog goroutine is stuck (2)
|
2 |
|
|
|
1 |
1573d |
1566d
|
14/26 |
1560d |
3fcbad509300
Fix lock ordering issue when enumerating cgroup tasks.
|
panic: Incrementing non-positive count ADDR on vfs.Filesystem (2)
|
2 |
|
|
|
1 |
1584d |
1584d
|
14/26 |
1582d |
af229f46a149
Fix cgroupfs mount racing with unmount.
|
panic: PullUp failed
|
2 |
C |
|
|
615 |
1587d |
1589d
|
14/26 |
1587d |
436148d68a50
Fix panic on consume in a mixed push/consume case
|
panic: Incrementing non-positive count ADDR on vfs.Filesystem
|
2 |
C |
|
|
2 |
1606d |
1606d
|
14/26 |
1587d |
78ae3db1a39c
Fix cgroup hierarchy registration.
|
DATA RACE in cgroupfs.FilesystemType.GetFilesystem
|
-1 |
C |
|
|
1 |
1606d |
1599d
|
14/26 |
1587d |
78ae3db1a39c
Fix cgroup hierarchy registration.
|
panic: Sentry detected stuck tasks (10)
|
2 |
C |
|
|
264 |
1613d |
1666d
|
14/26 |
1613d |
b0333d33a206
Optimize safemem.Zero
|
kvm: panic: Watchdog goroutine is stuck (2)
|
-1 |
|
|
|
110 |
1620d |
1636d
|
14/26 |
1619d |
f4f6ce337aa8
Don't grab TaskSet mu recursively when reading task state.
|
panic: Watchdog goroutine is stuck
|
2 |
C |
|
|
1831 |
1620d |
1918d
|
14/26 |
1619d |
f4f6ce337aa8
Don't grab TaskSet mu recursively when reading task state.
|
panic: makechan: size out of range
|
2 |
C |
|
|
183 |
1623d |
1626d
|
14/26 |
1623d |
dc8f6c691474
Move maxListenBacklog check to sentry
|
fatal error: unexpected signal during runtime execution
|
-1 |
syz |
|
|
272 |
1690d |
2379d
|
14/26 |
1623d |
eb9b8e53a3ef
platform/kvm/x86: restore mxcsr when switching from guest to sentry
|
kvm: panic: Watchdog goroutine is stuck
|
-1 |
|
|
|
240 |
1638d |
1648d
|
14/26 |
1638d |
2f3dac78ca9a
kvm: prefault a floating point state before restoring it
|
Invalid request partialResult in write (2)
|
-1 |
C |
|
|
11628 |
1640d |
1705d
|
14/26 |
1639d |
7fac7e32f3a8
Translate syserror when validating partial IO errors
|
kvm: panic: Sentry detected stuck tasks
|
-1 |
C |
|
|
152 |
1639d |
1655d
|
14/26 |
1639d |
2f3dac78ca9a
kvm: prefault a floating point state before restoring it
|
panic: Sentry detected stuck tasks (9)
|
2 |
|
|
|
9 |
1666d |
1666d
|
14/26 |
1666d |
38c42bbf4ad2
Remove deadlock in raw.endpoint caused by recursive read locking
|
panic: Sentry detected stuck tasks (8)
|
2 |
C |
|
|
64 |
1666d |
1668d
|
14/26 |
1666d |
f5692f7dcc48
Kernfs should not try to rename a file to itself.
|
no output from test machine (8)
|
-1 |
C |
|
|
15268 |
1667d |
1770d
|
14/26 |
1667d |
acd516cfe292
Add YAMA security module restrictions on ptrace(2).
|
panic: running on goroutine 582 (task goroutine for kernel.Task ADDR is 400)
|
2 |
C |
|
|
1 |
1671d |
1671d
|
14/26 |
1667d |
6e000d3424c0
Use async task context for async IO.
|
panic: unknown error *tcpip.ErrMalformedHeader
|
2 |
C |
|
|
5 |
1684d |
1677d
|
14/26 |
1667d |
c39284f45738
Let sentry understand tcpip.ErrMalformedHeader
|
panic: Sentry detected stuck tasks (7)
|
2 |
syz |
|
|
2567 |
1668d |
1700d
|
14/26 |
1668d |
c5a4e100085c
unix: sendmmsg and recvmsg have to cap a number of message to UIO_MAXIOV
|
panic: wd changed: "/tmp" -> "(unreachable)/"
|
2 |
syz |
|
|
2534 |
1680d |
1762d
|
14/26 |
1680d |
97a36d169698
Don't allow to umount the namespace root mount
|
Invalid request partialResult in sendto
|
-1 |
C |
|
|
236 |
1689d |
1692d
|
14/26 |
1681d |
d6d169320cd4
Add ETIMEDOUT to partial result list
|
FATAL ERROR: executing processes for container: executing command "/syz-fuzzer -executor=/syz-executor -name=vm-1 -arch=
|
-1 |
|
|
|
4 |
1688d |
1690d
|
14/26 |
1681d |
120c8e346871
Replace TaskFromContext(ctx).Kernel() with KernelFromContext(ctx)
|
panic: Incrementing non-positive count ADDR on kernel.ProcessGroup
|
2 |
C |
|
|
12 |
1698d |
1698d
|
14/26 |
1681d |
fe4f4789601d
kernel: reparentLocked has to update children maps of old and new parents
|
panic: Child "." for parent Dentry &{vfsd:{mu:{m:{Mutex:{state:LINE sema:LINE}}} dead:false mounts:LINE impl:ADDR} refs:
|
2 |
C |
|
|
13 |
1682d |
1691d
|
14/26 |
1681d |
09afd6832689
[vfs] Handle `.` and `..` as last path component names in kernfs Rename.
|
panic: Start ADDR + offset ADDR overflows?
|
2 |
C |
|
|
19 |
1707d |
2013d
|
14/26 |
1681d |
bf4968e17d7d
exec: don't panic if an elf file is malformed
|
panic: Decrementing non-positive ref count ADDR, owned by vfs.FileDescription
|
2 |
C |
|
|
12 |
1712d |
1707d
|
14/26 |
1696d |
abdff887483f
Do not send SCM Rights more than once when message is truncated.
|
DATA RACE in safemem.Copy
|
-1 |
C |
|
|
4 |
1700d |
1700d
|
14/26 |
1696d |
76da673a0dda
Do not modify IGMP packets when verifying checksum
|
panic: Sentry detected stuck tasks (6)
|
2 |
syz |
|
|
714 |
1700d |
1752d
|
14/26 |
1700d |
e57ebcd37a7b
Simplify the pipe implementation.
|
panic: IPv6 payload too large: NUM, must be <= NUM
|
2 |
C |
|
|
46 |
1708d |
1741d
|
14/26 |
1705d |
ec9e263f213c
Correctly return EMSGSIZE when packet is too big in raw socket.
|
panic: buffer too long by 8 bytes
|
2 |
C |
|
|
12 |
1720d |
1738d
|
14/26 |
1716d |
ce7a4440cae8
Fix panic when parsing SO_TIMESTAMP cmsg
|
panic: runtime error: invalid memory address or nil pointer dereference (5)
|
2 |
syz |
|
|
62 |
1718d |
1762d
|
14/26 |
1716d |
2a200811d4c9
fs/fuse: check that a task has a specified file descriptor
|
panic: invalid pipe flags: must be readable, writable, or both
|
2 |
|
|
|
1 |
1726d |
1726d
|
14/26 |
1716d |
807a080d9574
Add missing error checks for FileDescription.Init.
|
DATA RACE in stack.(*NIC).DeliverNetworkPacket
|
-1 |
|
|
|
4 |
1741d |
1749d
|
14/26 |
1724d |
25ebddbddfbc
Fix a data race in packetEPs
|
panic: runtime error: integer divide by zero
|
2 |
C |
|
|
116 |
1840d |
1866d
|
14/26 |
1724d |
b3ff31d041c9
fix panic when calling SO_ORIGINAL_DST without initializing iptables
|
panic: error when reading RouterAlert option's data bytes: EOF
|
2 |
C |
|
|
35 |
1738d |
1741d
|
14/26 |
1724d |
c55e5bda4d45
Validate router alert's data length
|
DATA RACE in raw.(*endpoint).HandlePacket
|
-1 |
C |
|
|
5 |
1737d |
1737d
|
14/26 |
1724d |
981faa2c1229
RLock Endpoint in raw.Endpoint.HandlePacket
|
panic: header.ScopeForIPv6Address(172.20.20.170): bad address
|
2 |
C |
|
|
48 |
1745d |
1751d
|
14/26 |
1724d |
b15acae9a6e2
Fix error code for connect in raw sockets.
|
panic: close of nil channel (2)
|
2 |
|
|
|
1 |
1747d |
1746d
|
14/26 |
1724d |
f6407de6bafb
[syzkaller] Avoid AIOContext from resurrecting after being marked dead.
|
panic: Unknown syscall 165 error: strconv.ParseInt: parsing "ADDR": invalid syntax
|
2 |
C |
|
|
51 |
1746d |
1751d
|
14/26 |
1724d |
9c198e5df421
Fix error handling on fusefs mount.
|
DATA RACE in header.ICMPv6Checksum
|
-1 |
C |
|
|
1 |
1738d |
1738d
|
14/26 |
1724d |
946cb909e62e
Don't modify a packet header when it can be used by other endpoints
|
panic: Unknown syscall 8 error: EOF
|
2 |
syz |
|
|
22 |
1735d |
1741d
|
14/26 |
1724d |
1ea241e4cc95
Fix seek on /proc/pid/cmdline when task is zombie.
|
panic: Stack for running G's are skipped while panicking.
|
2 |
C |
|
|
2426 |
2023d |
2277d
|
14/26 |
1725d |
ab7ecdd66d2a
watchdog: print panic error message before other messages
|
panic: Sentry detected stuck tasks (5)
|
2 |
syz |
|
|
83 |
1753d |
1765d
|
0/26 |
1752d |
79e2364933bb
Fix deadlock in UDP handleControlPacket path.
|
DATA RACE in log.GoogleEmitter.Emit
|
-1 |
C |
|
|
34 |
1764d |
1769d
|
0/26 |
1763d |
9c553f2d4e4b
Remove racy stringification of socket fds from /proc/net/*.
|
panic: runtime error: slice bounds out of range [255:LINE]
|
2 |
C |
|
|
5 |
1767d |
1768d
|
0/26 |
1763d |
49adf36ed7d3
Fix possible panic due to bad data.
|
panic: cacheLocked called on a dentry which has already been destroyed: &{{{{0 0}} true 0 ADDR} -1 ADDR 1 ADDR NUM false
|
2 |
|
|
|
1 |
1768d |
1768d
|
0/26 |
1763d |
74bc6e56ccd9
[vfs] kernfs: Do not panic if destroyed dentry is cached.
|
gvisor boot error: FATAL ERROR: running container: creating container: open /sys/fs/cgroup/devices/ci-gvisor-kvm-proxy-overlay-sandbox-test
|
-1 |
|
|
|
1 |
1765d |
1765d
|
0/26 |
1765d |
764504c38fb5
runsc: check whether cgroup exists or not for each controller
|
panic: Sentry detected stuck tasks (4)
|
2 |
C |
|
|
5 |
1766d |
1766d
|
0/26 |
1766d |
05d2a26f7a86
Fix possible deadlock in UDP.Write().
|
panic: Incrementing non-positive count ADDR on tmpfs.inode
|
2 |
syz |
|
|
2 |
1769d |
1769d
|
0/26 |
1766d |
10ba578c0182
tmpfs: make sure that a dentry will not be destroyed before the open() call
|
panic: Sentry detected stuck tasks (3)
|
2 |
C |
|
|
180 |
1766d |
1770d
|
0/26 |
1766d |
267560d159b2
Reset watchdog timer between sendfile() iterations.
|
panic: runtime error: invalid memory address or nil pointer dereference (4)
|
2 |
C |
|
|
4 |
1778d |
1796d
|
0/26 |
1770d |
4e389c785779
Check for nil in kernel.FSContext functions.
|
panic: Decrementing non-positive ref count ADDR, owned by *mm.SpecialMappable
|
2 |
|
|
|
56 |
1771d |
1801d
|
0/26 |
1770d |
dcc1b71f1ba4
Fix reference counting on kcov mappings.
|
panic: Sentry detected stuck tasks (2)
|
2 |
C |
|
|
951 |
1770d |
1811d
|
0/26 |
1770d |
db36d948fa63
TCP Receive window advertisement fixes.
|
no output from test machine (7)
|
-1 |
C |
|
|
184 |
1771d |
1798d
|
0/26 |
1770d |
34a6e9576a96
loader/elf: validate file offset
|
panic: runtime error: makeslice: len out of range (2)
|
2 |
C |
|
|
5 |
1771d |
1798d
|
0/26 |
1770d |
cd108432a50e
splice: return EINVAL is len is negative
|
panic: Incrementing non-positive ref count ADDR owned by *mm.SpecialMappable
|
2 |
|
|
|
45 |
1772d |
1801d
|
0/26 |
1770d |
dcc1b71f1ba4
Fix reference counting on kcov mappings.
|
panic: Child "" for parent Dentry &{vfsd:{mu:{Mutex:{state:LINE sema:LINE}} dead:false mounts:LINE impl:ADDR} DentryRefs
|
2 |
C |
|
|
3 |
1776d |
1784d
|
0/26 |
1770d |
1321f837bd9f
[vfs2] Refactor kernfs checkCreateLocked.
|
panic: unknown error: EOF
|
2 |
C |
|
|
68 |
1798d |
1801d
|
0/26 |
1798d |
c002fc36f9bb
sockets: ignore io.EOF from view.ReadAt
|
no output from test machine (6)
|
-1 |
syz |
|
|
1873 |
1805d |
1811d
|
0/26 |
1805d |
76a09f0cf599
syscalls: Don't leak a file on the error path
|
no output from test machine (5)
|
-1 |
C |
|
|
86414 |
1811d |
1926d
|
0/26 |
1811d |
de85b045d42f
kvm/x86: handle a case when interrupts are enabled in the kernel space
|
panic: Sentry detected stuck tasks
|
2 |
C |
|
|
506 |
1811d |
1832d
|
0/26 |
1811d |
de85b045d42f
kvm/x86: handle a case when interrupts are enabled in the kernel space
|
DATA RACE in tcp.(*endpoint).bindLocked
|
-1 |
syz |
|
|
2 |
1842d |
1842d
|
0/26 |
1835d |
38cdb0579b69
Fix data race in tcp.GetSockOpt.
|
panic: runtime error: invalid memory address or nil pointer dereference (3)
|
2 |
C |
|
|
20051 |
1844d |
2379d
|
0/26 |
1836d |
b3ff31d041c9
fix panic when calling SO_ORIGINAL_DST without initializing iptables
|
DATA RACE in transport.(*connectionedEndpoint).Connect.func1
|
-1 |
syz |
|
|
21 |
1919d |
1925d
|
0/26 |
1917d |
70c45e09cfd1
socket/unix: (*connectionedEndpoint).State() has to take the endpoint lock
|
panic: Sentry detected 1 stuck task(s):
|
2 |
C |
|
|
6204 |
1928d |
2015d
|
0/26 |
1926d |
4950ccde75b3
Fix write hang bug found by syzkaller.
|
DATA RACE in atomic.LoadInt64
|
-1 |
|
|
|
1 |
1933d |
1933d
|
0/26 |
1931d |
7da69fe9719b
Fix data race on f.offset.
|
DATA RACE in fs.(*File).offsetForAppend
|
-1 |
syz |
|
|
2 |
1933d |
1933d
|
0/26 |
1931d |
7da69fe9719b
Fix data race on f.offset.
|
DATA RACE in kernel.(*Task).accountTaskGoroutineEnter
|
-1 |
syz |
|
|
2 |
1957d |
1957d
|
0/26 |
1954d |
8dd1d5b75a95
Don't call kernel.Task.Block() from netstack.SocketOperations.Write().
|
panic: D0415 01:LINE.ADDR 8857 transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 95}
|
2 |
|
|
|
1 |
1983d |
1983d
|
0/26 |
1967d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: close of nil channel
|
2 |
syz |
|
|
6 |
1976d |
1980d
|
0/26 |
1973d |
37f863f62813
tcp: handle listen after shutdown properly
|
panic: D0414 08:LINE.ADDR NUM transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 2}
|
2 |
|
|
|
1 |
1984d |
1983d
|
0/26 |
1982d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: D0414 11:LINE.ADDR NUM transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 95}
|
2 |
|
|
|
1 |
1983d |
1983d
|
0/26 |
1982d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: D0414 14:LINE.ADDR NUM task_exit.go:LINE] [ 98] Transitioning from exit state TaskExitNone to TaskExitInitiate
|
2 |
|
|
|
1 |
1983d |
1983d
|
0/26 |
1982d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: D0414 16:LINE.ADDR 5236 transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 2}
|
2 |
|
|
|
1 |
1983d |
1983d
|
0/26 |
1982d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: D0414 13:LINE.ADDR NUM transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 2}
|
2 |
|
|
|
1 |
1983d |
1983d
|
0/26 |
1982d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: interface conversion: context.Context is kernel.taskAsyncContext, not *kernel.Task
|
2 |
syz |
|
|
16 |
1986d |
2001d
|
0/26 |
1985d |
c9195349c9ac
Replace type assertion with TaskFromContext.
|
panic: runtime error: makeslice: len out of range
|
2 |
syz |
|
|
49 |
1987d |
2010d
|
0/26 |
1987d |
a10389e783aa
splice: cap splice calls to MAX_RW_COUNT
|
DATA RACE in tcp.(*endpoint).Readiness
|
-1 |
syz |
|
|
2 |
2008d |
2008d
|
0/26 |
2002d |
d04adebaab86
Fix data-race in endpoint.Readiness
|
DATA RACE in netstack.(*SocketOperations).SetSockOpt
|
-1 |
syz |
|
|
2 |
2006d |
2006d
|
0/26 |
2005d |
369cf38bd718
Fix data race in SetSockOpt.
|
DATA RACE in tcp.(*endpoint).SetSockOpt
|
-1 |
syz |
|
|
26 |
2009d |
2030d
|
0/26 |
2005d |
e9e399c25d4f
Remove workMu from tcpip.Endpoint.
|
DATA RACE in udp.(*endpoint).SetSockOptBool
|
-1 |
syz |
|
|
2 |
2023d |
2016d
|
0/26 |
2008d |
c15b8515eb4a
Fix datarace on TransportEndpointInfo.ID and clean up semantics.
|
no output from test machine (3)
|
-1 |
C |
|
|
11663 |
2011d |
2099d
|
0/26 |
2011d |
b55f0e5d40c1
fdtable: don't try to zap fdtable entry if close is called for non-existing fd
|
panic: Watchdog goroutine is stuck:
|
2 |
|
|
|
12 |
2011d |
2017d
|
0/26 |
2011d |
1c0535297067
Fix oom_score_adj.
|
panic: Sentry detected 4 stuck task(s):
|
2 |
|
|
|
7 |
2011d |
2022d
|
0/26 |
2011d |
b0f2c3e7646d
Fix infinite loop in semaphore.sem.wakeWaiters().
|
fatal error: out of memory (3)
|
-1 |
syz |
|
|
3 |
2017d |
2017d
|
0/26 |
2016d |
81675b850e27
Fix memory leak in danglingEndpoints.
|
fatal error: too many address space collisions for -race mode
|
-1 |
syz |
|
|
3 |
2017d |
2017d
|
0/26 |
2016d |
81675b850e27
Fix memory leak in danglingEndpoints.
|
fatal error: concurrent map iteration and map write (2)
|
-1 |
syz |
|
|
1 |
2028d |
2028d
|
0/26 |
2018d |
62bd3ca8a375
Take write lock when removing xattr
|
DATA RACE in fsutil.(*InodeSimpleExtendedAttributes).ListXattr
|
-1 |
|
|
|
1 |
2028d |
2028d
|
0/26 |
2018d |
62bd3ca8a375
Take write lock when removing xattr
|
lost connection to test machine (4)
|
-1 |
|
|
|
1025286 |
2018d |
2191d
|
0/26 |
2018d |
6b4d36e32532
Hide /dev/net/tun when using hostinet.
|
DATA RACE in udp.(*endpoint).Connect
|
-1 |
syz |
|
|
10 |
2024d |
2030d
|
0/26 |
2018d |
c15b8515eb4a
Fix datarace on TransportEndpointInfo.ID and clean up semantics.
|
DATA RACE in fsutil.(*InodeSimpleExtendedAttributes).RemoveXattr
|
-1 |
syz |
|
|
2 |
2027d |
2028d
|
0/26 |
2018d |
62bd3ca8a375
Take write lock when removing xattr
|
DATA RACE in tcp.(*endpoint).windowCrossedACKThreshold
|
-1 |
syz |
|
|
10 |
2030d |
2030d
|
0/26 |
2018d |
33101752501f
Fix data-race when reading/writing e.amss.
|
DATA RACE in stack.(*TransportEndpointInfo).AddrNetProto
|
-1 |
syz |
|
|
148 |
2023d |
2030d
|
0/26 |
2018d |
c15b8515eb4a
Fix datarace on TransportEndpointInfo.ID and clean up semantics.
|
fatal error: concurrent map read and map write (2)
|
-1 |
syz |
|
|
2 |
2028d |
2028d
|
0/26 |
2018d |
62bd3ca8a375
Take write lock when removing xattr
|
panic: runtime error: index out of range [1] with length 0
|
2 |
C |
|
|
1518 |
2023d |
2030d
|
0/26 |
2018d |
43abb24657e7
Fix panic caused by invalid address for Bind in packet sockets.
|
DATA RACE in netstack.(*SocketOperations).fetchReadView
|
-1 |
syz |
|
|
12 |
2024d |
2030d
|
0/26 |
2018d |
42fb7d349137
socket: take readMu to access readView
|
DATA RACE in fsutil.(*InodeSimpleExtendedAttributes).GetXattr
|
-1 |
syz |
|
|
3 |
2028d |
2028d
|
0/26 |
2018d |
62bd3ca8a375
Take write lock when removing xattr
|
DATA RACE in fs.(*UnstableAttr).SetOwner (2)
|
-1 |
syz |
|
|
3 |
2063d |
2056d
|
0/26 |
2030d |
115898e368e4
Prevent DATA RACE in UnstableAttr.
|
DATA RACE in fs.mayDelete
|
-1 |
|
|
|
1 |
2059d |
2052d
|
0/26 |
2030d |
fba479b3c786
Fix DATA RACE in fs.MayDelete.
|
DATA RACE in fs.(*Dirent).IncRef
|
-1 |
syz |
|
|
1 |
2056d |
2049d
|
0/26 |
2030d |
53504e29ca27
Fix mount refcount issue.
|
panic: Incrementing non-positive ref count (4)
|
2 |
C |
|
|
5 |
2048d |
2049d
|
0/26 |
2030d |
53504e29ca27
Fix mount refcount issue.
|
panic: munmap(ADDR, NUM)) failed: function not implemented (3)
|
2 |
|
|
|
1 |
2100d |
2093d
|
0/26 |
2030d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: munmap(0, ADDR)) failed: function not implemented (3)
|
2 |
|
|
|
1 |
2086d |
2079d
|
0/26 |
2030d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: wait failed: the process NUM:NUM exited: 1f (err <nil>) (2)
|
2 |
|
|
|
17 |
2083d |
2106d
|
0/26 |
2030d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: wait failed: the process 9793:LINE exited: 1f (err <nil>)
|
2 |
C |
|
|
1 |
2101d |
2094d
|
0/26 |
2030d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: wait failed: the process 4877:LINE exited: 1f (err <nil>)
|
2 |
|
|
|
1 |
2101d |
2094d
|
0/26 |
2030d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: runtime error: slice bounds out of range [:LINE] with capacity 16
|
2 |
syz |
|
|
42 |
2082d |
2093d
|
0/26 |
2030d |
b3ae8a62cfdf
Fix slice bounds out of range panic in parsing socket control message.
|
panic: wait failed: the process NUM:LINE exited: 1f (err <nil>) (4)
|
2 |
|
|
|
2 |
2093d |
2087d
|
0/26 |
2030d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
DATA RACE in refs.(*WeakRef).init (2)
|
-1 |
|
|
|
1 |
2124d |
2117d
|
0/26 |
2051d |
3db317390b5c
Remove epoll entry from map when dropping it.
|
DATA RACE in refs.(*AtomicRefCount).DecRefWithDestructor
|
-1 |
|
|
|
1 |
2070d |
2063d
|
0/26 |
2051d |
3db317390b5c
Remove epoll entry from map when dropping it.
|
panic: interface conversion: refs.RefCounter is *fs.File, not *fs.Dirent
|
2 |
|
|
|
3 |
2065d |
2075d
|
0/26 |
2051d |
3db317390b5c
Remove epoll entry from map when dropping it.
|
Invalid request partialResult in splice (2)
|
-1 |
syz |
|
|
134 |
2060d |
2096d
|
0/26 |
2057d |
f263801a74d4
fs/splice: don't report partial errors for special files
|
fatal error: out of memory (2)
|
-1 |
|
|
|
1 |
2073d |
2066d
|
0/26 |
2057d |
4cb55a7a3b09
Prevent arbitrary size allocation when sending UDS messages.
|
panic: invalid allocation length: 0x0 (3)
|
2 |
syz |
|
|
12 |
2061d |
2061d
|
0/26 |
2057d |
ede8dfab3760
Enforce splice offset limits
|
DATA RACE in fs.Rename (3)
|
-1 |
|
|
|
1 |
2071d |
2071d
|
0/26 |
2070d |
f1a5178c589d
Fix data race in MountNamespace.resolve.
|
DATA RACE in tty.(*queue).readableSize
|
-1 |
syz |
|
|
2 |
2072d |
2072d
|
0/26 |
2070d |
80d0f9304484
Fix data race in tty.queue.readableSize.
|
panic: Incrementing non-positive ref count (3)
|
2 |
|
|
|
2 |
2092d |
2101d
|
0/26 |
2081d |
6410387ff9b4
Cleanup Shm reference handling
|
panic: munmap(ADDR, 1000)) failed: function not implemented (3)
|
2 |
|
|
|
2 |
2118d |
2119d
|
0/26 |
2081d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
DATA RACE in fs.(*UnstableAttr).SetOwner
|
-1 |
|
|
|
1 |
2100d |
2100d
|
0/26 |
2099d |
bb00438f36eb
Make masterInodeOperations.Truncate take a pointer receiver.
|
DATA RACE in fsutil.(*InodeSimpleAttributes).SetPermissions
|
-1 |
syz |
|
|
3 |
2100d |
2100d
|
0/26 |
2099d |
bb00438f36eb
Make masterInodeOperations.Truncate take a pointer receiver.
|
no output from test machine (2)
|
-1 |
C |
|
|
6325 |
2106d |
2222d
|
0/26 |
2106d |
378d6c1f3697
unix: allow to bind unix sockets only to AF_UNIX addresses
|
DATA RACE in fs.Rename (2)
|
-1 |
C |
|
|
433 |
2357d |
2379d
|
0/26 |
2113d |
89cc8eef9ba6
DATA RACE in fs.(*Dirent).fullName
|
Invalid request partialResult in sendfile (2)
|
-1 |
C |
|
|
1341 |
2179d |
2379d
|
0/26 |
2177d |
db218fdfcf16
Don't report partialResult errors from sendfile
|
Invalid request partialResult in splice
|
-1 |
C |
|
|
206 |
2180d |
2228d
|
0/26 |
2179d |
7a234f736fe0
splice: try another fallback option only if the previous one isn't supported
|
lost connection to test machine (3)
|
-1 |
C |
|
|
30758 |
2229d |
2379d
|
0/26 |
2227d |
af90e68623c7
netlink: return an error in nlmsgerr
|
panic: node.Readdir returned offset -ADDR less than input offset ADDR
|
2 |
C |
|
|
26 |
2296d |
2379d
|
0/26 |
2227d |
ab6774cebf5c
gvisor/fs: getdents returns 0 if offset is equal to FileMaxOffset
|
DATA RACE in ramfs.(*dirFileOperations).Readdir
|
-1 |
syz |
|
|
1 |
2428d |
2379d
|
0/26 |
2228d |
09cf3b40a899
Fix data race in InodeSimpleAttributes.Unstable.
|
no output from test machine
|
-1 |
C |
|
|
27191 |
2229d |
2379d
|
0/26 |
2229d |
af90e68623c7
netlink: return an error in nlmsgerr
|
DATA RACE in kernel.(*Kernel).EmitUnimplementedEvent
|
-1 |
syz |
|
|
3 |
2241d |
2242d
|
0/26 |
2241d |
cf2b2d97d512
Initialize kernel.unimplementedSyscallEmitter with a sync.Once.
|
DATA RACE in atomic.AddInt32
|
-1 |
|
|
|
1 |
2256d |
2256d
|
0/26 |
2254d |
542fbd01a7ed
Fix race in FDTable.GetFDs().
|
panic: Unknown syscall 85 error: link should be resolved via Readlink()
|
2 |
syz |
|
|
64 |
2264d |
2261d
|
0/26 |
2261d |
6db3f8d54c02
Don't mask errors in createAt loop.
|
panic: Unknown syscall 2 error: link should be resolved via Readlink()
|
2 |
syz |
|
|
16 |
2265d |
2261d
|
0/26 |
2261d |
6db3f8d54c02
Don't mask errors in createAt loop.
|
panic: Unknown syscall 257 error: link should be resolved via Readlink()
|
2 |
syz |
|
|
14 |
2264d |
2269d
|
0/26 |
2262d |
6db3f8d54c02
Don't mask errors in createAt loop.
|
panic: Incrementing non-positive ref count (2)
|
2 |
C |
|
|
183 |
2269d |
2276d
|
0/26 |
2268d |
4f2f44320f9b
Simplify (and fix) refcounts in createAt.
|
DATA RACE in atomic.AddInt64
|
-1 |
|
|
|
1 |
2298d |
2291d
|
0/26 |
2274d |
8ab0848c70fc
gvisor/fs: don't update file.offset for sockets, pipes, etc
|
DATA RACE in fs.(*lockedReader).Read
|
-1 |
|
|
|
1 |
2295d |
2288d
|
0/26 |
2276d |
8ab0848c70fc
gvisor/fs: don't update file.offset for sockets, pipes, etc
|
DATA RACE in atomic.StoreInt64
|
-1 |
syz |
|
|
2 |
2283d |
2288d
|
0/26 |
2276d |
8ab0848c70fc
gvisor/fs: don't update file.offset for sockets, pipes, etc
|
DATA RACE in mm.(*MemoryManager).Brk
|
-1 |
syz |
|
|
14 |
2316d |
2332d
|
0/26 |
2316d |
14f0e7618e28
Ensure all uses of MM.brk occur under MM.mappingMu in MM.Brk().
|
panic: hashed child "stat\t\xe9\xdc\xdf\x02\x02\x98\xcc\xf3<\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q\nI\xf81U\ro}\xe
|
2 |
C |
|
|
7 |
2359d |
2352d
|
0/26 |
2334d |
2df64cd6d2c8
createAt should return all errors from FindInode except ENOENT.
|
DATA RACE in fs.(*Dirent).fullName
|
-1 |
|
|
|
3 |
2363d |
2379d
|
0/26 |
2352d |
89cc8eef9ba6
DATA RACE in fs.(*Dirent).fullName
|
panic: hashed over a positive child "file0"
|
2 |
|
|
|
1 |
2361d |
2361d
|
0/26 |
2359d |
61d8c361c663
Don't release d.mu in checks for child-existence.
|
DATA RACE in tty.(*lineDiscipline).masterReadiness
|
-1 |
|
|
|
1 |
2361d |
2361d
|
0/26 |
2359d |
c79e81bd27cd
Addresses data race in tty implementation.
|
DATA RACE in tty.(*queue).WriteFromBlocks
|
-1 |
syz |
|
|
7 |
2360d |
2364d
|
0/26 |
2359d |
c79e81bd27cd
Addresses data race in tty implementation.
|
panic: runtime error: index out of range (2)
|
2 |
C |
|
|
7191 |
2359d |
2365d
|
0/26 |
2359d |
82529becaee6
Fix index out of bounds in tty implementation.
|
DATA RACE in atomic.CompareAndSwapInt32 (2)
|
-1 |
syz |
|
|
2 |
2361d |
2361d
|
0/26 |
2359d |
d14a7de65865
Fix more data races in shm debug messages.
|
DATA RACE in atomic.CompareAndSwapInt32
|
-1 |
C |
|
|
9 |
2367d |
2379d
|
0/26 |
2362d |
cea1dd7d21b9
Remove racy access to shm fields.
|
DATA RACE in netlink.(*Socket).SetSockOpt
|
-1 |
syz |
|
|
2 |
2379d |
2379d
|
0/26 |
2362d |
7b33df68450b
Fix data race in netlink send buffer size
|
DATA RACE in dev.(*randomDevice).GetFile
|
-1 |
|
|
|
1 |
2368d |
2368d
|
0/26 |
2362d |
645af7cdd8a1
Dev device methods should take pointer receiver.
|
DATA RACE in fsutil.(*InodeSimpleAttributes).UnstableAttr
|
-1 |
syz |
|
|
8 |
2428d |
2431d
|
0/26 |
2424d |
09cf3b40a899
Fix data race in InodeSimpleAttributes.Unstable.
|
panic: invalid allocation length: 0x0 (2)
|
2 |
C |
|
|
4 |
2466d |
2467d
|
0/26 |
2465d |
3b3f02627870
Truncate ar before calling mm.breakCopyOnWriteLocked().
|
gvisor boot error (3)
|
-1 |
|
|
|
4 |
2471d |
2472d
|
0/26 |
2471d |
1775a0e11e56
container.Destroy should clean up container metadata even if other cleanups fail
|
DATA RACE in shm.(*Registry).findByKey
|
-1 |
C |
|
|
47 |
2577d |
2644d
|
0/26 |
2472d |
f93c288dd708
Fix a data race on Shm.key.
|
gvisor test error (2)
|
-1 |
|
|
|
2778 |
2488d |
2624d
|
0/26 |
2472d |
24c1158b9c21
Add "trace signal" option
|
panic: invalid type: int
|
2 |
C |
|
|
559 |
2491d |
2593d
|
0/26 |
2472d |
5560615c531b
Return an int32 for netlink SO_RCVBUF
|
panic: ptrace set regs failed: input/output error
|
2 |
C |
|
|
712 |
2478d |
2576d
|
0/26 |
2472d |
99d595869332
Validate FS_BASE in Task.Clone
|
Invalid request partialResult in sendfile
|
-1 |
C |
|
|
7399 |
2478d |
2631d
|
0/26 |
2472d |
ffcbda0c8bd7
Partial writes should loop in rpcinet.
|
panic: Decrementing non-positive ref count
|
2 |
C |
|
|
4804 |
2567d |
2645d
|
0/26 |
2472d |
0e277a39c8b6
Prevent premature destruction of shm segments.
|
panic: ptrace status unexpected: got 9, wanted stopped (2)
|
2 |
syz |
|
|
78 |
2478d |
2631d
|
0/26 |
2472d |
e7191f058f55
Use TRAP to simplify vsyscall emulation.
|
panic: invalid allocation length: 0x0
|
2 |
C |
|
|
223 |
2478d |
2645d
|
0/26 |
2472d |
46603b569c3a
Fix panic on creation of zero-len shm segments.
|
DATA RACE in fs.(*Dirent).getDotAttrs
|
-1 |
|
|
|
1 |
2586d |
2586d
|
0/26 |
2472d |
54dd0d0dc5ee
Fix data race caused by unlocked call of Dirent.descendantOf.
|
panic: runtime error: invalid memory address or nil pointer dereference (2)
|
2 |
C |
|
|
4493 |
2567d |
2588d
|
0/26 |
2530d |
beac59b37a8b
Fix panic if FIOASYNC callback is registered and triggered without target
|
gvisor boot error
|
-1 |
|
|
|
1911 |
2549d |
2626d
|
0/26 |
2530d |
43e6aff50e23
Don't fail if Root is readonly and is not a mount point
|
DATA RACE in kernel.(*Task).setKUIDsUncheckedLocked
|
-1 |
C |
|
|
15 |
2580d |
2638d
|
0/26 |
2530d |
f8ccfbbed487
Document more task-goroutine-owned fields in kernel.Task.
|
DATA RACE in fs.(*Dirent).hashChildParentSet
|
-1 |
syz |
|
|
8 |
2583d |
2585d
|
0/26 |
2530d |
8d318aac5532
fs: Hold Dirent.mu when calling Dirent.flush().
|
DATA RACE in waiter.(*Entry).Prev
|
-1 |
C |
|
|
3992 |
2592d |
2645d
|
0/26 |
2588d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
DATA RACE in waiter.(*Entry).Next
|
-1 |
C |
|
|
2418 |
2592d |
2645d
|
0/26 |
2588d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
fatal error: concurrent map read and map write
|
-1 |
|
|
|
66 |
2597d |
2600d
|
0/26 |
2588d |
dbbe9ec91541
Protect PCIDs with a mutex.
|
DATA RACE in waiter.(*Entry).SetNext
|
-1 |
C |
|
|
739 |
2592d |
2645d
|
0/26 |
2588d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
fatal error: concurrent map writes
|
-1 |
|
|
|
3 |
2598d |
2598d
|
0/26 |
2588d |
dbbe9ec91541
Protect PCIDs with a mutex.
|
panic: runtime error: index out of range
|
2 |
C |
|
|
35 |
2604d |
2640d
|
0/26 |
2588d |
e97717e29a1b
Enforce Unix socket address length limit
|
DATA RACE in waiter.(*Entry).SetPrev
|
-1 |
|
|
|
70 |
2592d |
2645d
|
0/26 |
2588d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
DATA RACE in waiter.(*Queue).Notify
|
-1 |
C |
|
|
72 |
2592d |
2645d
|
0/26 |
2588d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
DATA RACE in unix.(*connectionlessEndpoint).UnidirectionalConnect
|
-1 |
C |
|
|
965 |
2598d |
2629d
|
0/26 |
2588d |
2a44362c0b99
Fix data race in unix.BoundEndpoint.UnidirectionalConnect.
|
panic: runtime error: invalid memory address or nil pointer dereference
|
2 |
C |
|
|
20682 |
2592d |
2645d
|
0/26 |
2588d |
f93bd2cbe668
Hold t.mu while calling t.FSContext().
|
DATA RACE in kernel.(*Task).exitNotifyLocked
|
-1 |
C |
|
|
2 |
2617d |
2617d
|
0/26 |
2598d |
c036da5dffdf
Hold TaskSet.mu in Task.Parent.
|
panic: invalid segment range [ADDR, ADDR)
|
2 |
C |
|
|
255 |
2634d |
2645d
|
0/26 |
2619d |
06920b3d1bb6
Exit tmpfs.fileInodeOperations.Translate early if required.Start >= EOF.
|
DATA RACE in kernel.(*Task).Clone
|
-1 |
|
|
|
3 |
2622d |
2634d
|
0/26 |
2619d |
41aeb680b188
Inherit parent in clone(CLONE_THREAD) under TaskSet.mu.
|
DATA RACE in fs.(*Watch).Notify
|
-1 |
syz |
|
|
2 |
2635d |
2635d
|
0/26 |
2633d |
34af9a61741f
Fix data race on inotify.Watch.mask.
|
lost connection to test machine (2)
|
-1 |
C |
|
|
1814 |
2634d |
2645d
|
0/26 |
2634d |
52ddb8571c46
Skip overlay on root when its readonly
|
DATA RACE in fs.Rename
|
-1 |
C |
|
|
16 |
2634d |
2643d
|
0/26 |
2634d |
2821dfe6ce95
Hold d.parent.mu when reading d.name
|
panic: MountNamespace.FindInode: path is empty
|
2 |
C |
|
|
3443 |
2634d |
2645d
|
0/26 |
2634d |
062a6f6ec5f4
Handle NUL-only paths in exec
|
panic: runtime error: slice bounds out of range
|
2 |
C |
|
|
39 |
2638d |
2645d
|
0/26 |
2638d |
1ceed49ba94c
Check for invalid offset when submitting an AIO read/write request.
|
DATA RACE in proc.forEachMountSource
|
-1 |
C |
|
|
24 |
2639d |
2645d
|
0/26 |
2638d |
f93bd2cbe668
Hold t.mu while calling t.FSContext().
|
DATA RACE in kernel.(*Task).Value
|
-1 |
|
|
|
1 |
2642d |
2642d
|
0/26 |
2638d |
f93bd2cbe668
Hold t.mu while calling t.FSContext().
|
DATA RACE in semaphore.(*Set).checkPerms
|
-1 |
C |
|
|
21 |
2640d |
2644d
|
0/26 |
2639d |
6b6852bceb12
Fix semaphore data races
|
DATA RACE in semaphore.(*Registry).RemoveID
|
-1 |
C |
|
|
15 |
2640d |
2644d
|
0/26 |
2639d |
6b6852bceb12
Fix semaphore data races
|
DATA RACE in queue.(*Queue).Enqueue
|
-1 |
C |
|
|
7 |
2641d |
2644d
|
0/26 |
2641d |
5f7f78c1d7ee
Fix data races in Unix sockets
|
DATA RACE in unix.(*queueReceiver).RecvQueuedSize
|
-1 |
C |
|
|
5 |
2641d |
2644d
|
0/26 |
2641d |
5f7f78c1d7ee
Fix data races in Unix sockets
|
panic: munmap(ADDR, c6000)) failed: function not implemented
|
2 |
|
|
|
1 |
2644d |
2644d
|
0/26 |
2641d |
dc33d71f8cf1
Change SIGCHLD to SIGKILL in ptrace stubs.
|
DATA RACE in unix.(*streamQueueReceiver).RecvQueuedSize
|
-1 |
C |
|
|
3 |
2642d |
2643d
|
0/26 |
2641d |
5f7f78c1d7ee
Fix data races in Unix sockets
|
DATA RACE in kernel.(*FSContext).SetWorkingDirectory
|
-1 |
|
|
|
1 |
2644d |
2644d
|
0/26 |
2641d |
4ac79312b093
Don't read cwd or root without holding mu
|
DATA RACE in proc.(*mountInfoFile).ReadSeqFileData.func1
|
-1 |
|
|
|
1 |
2644d |
2644d
|
0/26 |
2641d |
1a9917d14d66
MountSource.Root() should return a refernce on the dirent.
|
DATA RACE in kernel.(*FSContext).SetRootDirectory
|
-1 |
C |
|
|
165 |
2641d |
2644d
|
0/26 |
2641d |
478f0ac0038a
Don't read FSContext.root without holding FSContext.mu
|
panic: munmap(ADDR, 0)) failed: invalid argument
|
2 |
C |
|
|
5 |
2645d |
2645d
|
0/26 |
2645d |
fe3fc44da3ca
Handle mremap(old_size=0).
|