panic: nested locking: tmpfs.filesystemRWMutex: (3)
|
C |
|
|
88 |
5d01h |
1d00h
|
26/26 |
19h02m |
f66f0e235a0b
Fix memmap.MappingIdentity.Device/InodeID() lock ordering.
|
panic: runtime error: invalid memory address or nil pointer dereference (27)
|
C |
|
|
1117 |
3d00h |
4d10h
|
26/26 |
2d23h |
2b55090a5813
Do not crash when creating thread group with already-exceeded soft CPU limit.
|
panic: runtime error: invalid memory address or nil pointer dereference (26)
|
C |
|
|
7905 |
4d11h |
12d
|
26/26 |
4d11h |
ae1d4ccf0298
mm: validate vseg before using it
|
no output from test machine (13)
|
C |
|
|
86992 |
7d20h |
27d
|
26/26 |
7d11h |
336dc8504327
vfs: use ancestryMu in implementations of DentryImpl.InotifyWithParent
|
panic: nested locking: tmpfs.filesystemRWMutex: (2)
|
C |
|
|
33 |
8d04h |
11d
|
26/26 |
8d03h |
336dc8504327
vfs: use ancestryMu in implementations of DentryImpl.InotifyWithParent
|
DATA RACE in buffer.(*View).Write
|
|
|
|
1 |
132d |
132d
|
26/26 |
53d |
a446b45d4d05
Ensure views returned by PullUp are owned exclusively by their packet.
|
panic: runtime error: index out of range [ADDR] with length NUM (2)
|
C |
|
|
23 |
57d |
58d
|
26/26 |
56d |
9d41ac1ff0b2
Fix unsigned to signed integer conversion in syserr.getHostTranslation().
|
panic: unknown host errno "errno NUM" (NUM) (2)
|
C |
|
|
286 |
58d |
83d
|
26/26 |
57d |
3971ecbc6ccd
Remove linuxerr.IsValid and use syserr.IsValid instead.
|
panic: nested locking: stack.bridgeRWMutex:
|
|
|
|
2 |
71d |
64d
|
26/26 |
59d |
5e8dd6482cb7
Disallow setting a coordinator for a coordinator device.
|
lost connection to test machine (10)
|
syz |
|
|
11752 |
74d |
130d
|
26/26 |
74d |
2a413db73006
kvm: check CPL to find out if the Sentry is in VM
|
panic: unknown host errno "memory page has hardware error" (NUM)
|
|
|
|
10 |
81d |
87d
|
26/26 |
81d |
40bde6c617c7
Add EHWPOISON to host_linux.go
|
panic: unknown host errno "errno NUM" (NUM)
|
C |
|
|
397 |
91d |
127d
|
26/26 |
90d |
9ecb627726cf
Fix syzkaller panic for unknown error 58.
|
panic: No file type specified in 'mode' for InodeAttrs.Init(): mode=NUM (2)
|
C |
|
|
454 |
101d |
129d
|
26/26 |
101d |
834bef599679
fuse: Error out in case of unsupported file type instead of panicking.
|
panic: unknown host errno "operation not possible due to RF-kill" (NUM)
|
|
|
|
1 |
103d |
103d
|
26/26 |
102d |
e6cf09a18c7e
Add ERFKILL errno to host_linux file.
|
panic: running on goroutine NUM (task goroutine for kernel.Task ADDR is NUM)
|
|
|
|
1 |
113d |
113d
|
26/26 |
110d |
e30fa671774b
FUSE: Only block with a task if it is the task goroutine.
|
panic: unknown host errno "errno ADDR" (ADDR)
|
C |
|
|
88 |
111d |
129d
|
26/26 |
111d |
b1ade52f24be
fuse: handle bad response errors
|
panic: runtime error: invalid memory address or nil pointer dereference (25)
|
|
|
|
1 |
114d |
114d
|
26/26 |
112d |
2ef09d3bddc7
FUSE: Avoid panic when opening unknown file type.
|
panic: unknown host errno "no XENIX semaphores available" (NUM)
|
|
|
|
7 |
115d |
116d
|
26/26 |
115d |
0184ec4aacbc
Add ENAVAIL to host_linux.go.
|
DATA RACE in log.GoogleEmitter.Emit (4)
|
|
|
|
1 |
116d |
116d
|
26/26 |
115d |
742b914fcb82
Don't log mount.root because it leads to racy access.
|
panic: unknown host errno "is a named type file" (NUM)
|
|
|
|
7 |
116d |
116d
|
26/26 |
115d |
ef1ca17e5842
Add EISNAM to linuxHostTranslations and fix error message for ENOTNAM.
|
SYZFAIL: mount(proc) failed
|
|
|
|
54326 |
146d |
147d
|
26/26 |
129d |
e39ed91daaf9
sentry: support NULL mount source
|
gvisor test error: SYZFAIL: mount(proc) failed
|
|
|
|
58 |
146d |
147d
|
26/26 |
129d |
e39ed91daaf9
sentry: support NULL mount source
|
lost connection to test machine (9)
|
syz |
|
|
8441 |
130d |
469d
|
26/26 |
130d |
cd56935ddf77
runsc: pass the GLIBC_TUNABLES env to the sandbox process
|
DATA RACE in log.GoogleEmitter.Emit (3)
|
|
|
|
1 |
133d |
133d
|
26/26 |
132d |
ddfbb50ecc2d
Don't log the task in CgroupPrepareMigrate warning.
|
DATA RACE in binary.bigEndian.Uint16
|
|
|
|
1 |
147d |
147d
|
26/26 |
136d |
bd58900fba9e
Change veth WritePackets to deep clone its list of packets.
|
DATA RACE in binary.bigEndian.PutUint16 (2)
|
|
|
|
3 |
138d |
147d
|
26/26 |
136d |
bd58900fba9e
Change veth WritePackets to deep clone its list of packets.
|
no output from test machine (11)
|
C |
|
|
50911 |
140d |
261d
|
26/26 |
140d |
db9fab290c26
Fix a race condition in TCPDeferAcceptTimeout
|
panic: send on closed channel
|
|
|
|
1 |
149d |
142d
|
26/26 |
140d |
9d1849029e8e
tcpip/link/veth: don't send any packets if another end has been closed
|
SYZFAIL: tun: ioctl(TUNSETIFF) failed (2)
|
|
|
|
15 |
146d |
144d
|
26/26 |
144d |
c6d16988a984
Log endpoint type when SOL_IP options are not supported.
|
panic: WARNING: circular locking detected: stack.bridgeRWMutex -> stack.stackRWMutex:
|
C |
|
|
27 |
157d |
159d
|
26/26 |
152d |
c4dc0321aa40
Do not hold BridgeEndpoint.mu during dispatcher.DeliverNetworkPacket().
|
init process did not start
|
|
|
|
2 |
166d |
166d
|
26/26 |
161d |
80a501d8cc23
Avoid redundant work in `bpf.optimizeJumpsToSmallestSetOfReturns`.
|
DATA RACE in futex.(*waiterList).Front
|
C |
|
|
1 |
173d |
173d
|
26/26 |
165d |
b58e8a129d62
futex: add missing locking in lockBuckets()
|
DATA RACE in futex.(*waiterEntry).SetNext
|
C |
|
|
3 |
173d |
173d
|
26/26 |
165d |
b58e8a129d62
futex: add missing locking in lockBuckets()
|
DATA RACE in futex.(*waiterList).PushBack
|
C |
|
|
3 |
173d |
173d
|
26/26 |
165d |
b58e8a129d62
futex: add missing locking in lockBuckets()
|
gvisor test error: SYZFATAL: failed to connect to host: dial tcp: address stdin: missing port in address
|
|
|
|
1077 |
202d |
206d
|
26/26 |
200d |
a5b10b7dd04c
Fix some processes_test flakes.
|
panic: runtime error: invalid memory address or nil pointer dereference (23)
|
C |
|
|
4239 |
252d |
257d
|
26/26 |
252d |
5f5e01d186b2
Fix panic while setting TCP_CORK off.
|
no output from test machine (10)
|
C |
|
|
19806 |
277d |
1200d
|
26/26 |
274d |
16dba7fa7677
systrap: handle stub thread crashes
|
panic: stub thread ADDR failed: err 0x-ADDR line NUM: sysmsg.Msg{msg: ADDR state NUM err -ADDR line NUM debug NUM app st
|
C |
|
|
5 |
319d |
319d
|
26/26 |
293d |
fe66cae2edc7
Enumerate known systrap stub failures to exit process cleanly.
|
panic: Decrementing non-positive ref count ADDR, owned by tmpfs.inode (4)
|
C |
|
|
22 |
311d |
318d
|
26/26 |
308d |
7b151e25d076
Don't drop the mountpoint reference in already umounted dead mountpoints.
|
DATA RACE in safemem.Copy (7)
|
C |
|
|
4 |
336d |
336d
|
26/26 |
333d |
de71aae89aed
`seccomp`: Use dedicated input buffer for populating seccomp cache.
|
kvm: panic: Sentry detected stuck tasks (22)
|
C |
|
|
8 |
357d |
367d
|
26/26 |
350d |
eaee2b213b2d
Add check to pivot_root that ensures the new root is underneath the old root.
|
fatal error: stack overflow (5)
|
C |
|
|
23 |
353d |
370d
|
26/26 |
350d |
eaee2b213b2d
Add check to pivot_root that ensures the new root is underneath the old root.
|
panic: runtime error: invalid memory address or nil pointer dereference (22)
|
|
|
|
1 |
362d |
362d
|
26/26 |
361d |
4733e050ebec
Check that handshake.listenEP is non-nil.
|
panic: attempted to rewrite jump target to a different return instruction: from={pc=NUM: {NUM NUM NUM NUM}}, to={pc=NUM:
|
C |
|
|
8 |
368d |
368d
|
26/26 |
363d |
7cf14b7c8b5e
Add equality function for BPF instructions.
|
fatal error: stack overflow (4)
|
C |
|
|
12 |
370d |
374d
|
26/26 |
370d |
c16916e7d780
Move lockMountpoint to the beginning of pivot_root.
|
kvm: panic: Sentry detected stuck tasks (21)
|
C |
|
|
2 |
372d |
374d
|
26/26 |
370d |
c16916e7d780
Move lockMountpoint to the beginning of pivot_root.
|
fatal error: large allocation
|
C |
|
|
234 |
383d |
386d
|
26/26 |
371d |
917bee5b6d91
Add a size limit to `outputQueueTransformer.transform`.
|
panic: runtime error: slice bounds out of range [12:LINE]
|
C |
|
|
63 |
376d |
1155d
|
26/26 |
375d |
c96439ecd0b4
devpts: IterDirents has to check offset and return if it is out of range
|
kvm: panic: Sentry detected stuck tasks (20)
|
C |
|
|
2 |
376d |
376d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
fatal error: stack overflow (3)
|
|
|
|
2 |
376d |
376d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: Decrementing non-positive ref count ADDR, owned by tmpfs.inode (3)
|
C |
|
|
16 |
376d |
377d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: Decrementing non-positive ref count ADDR, owned by vfs.Filesystem
|
C |
|
|
152 |
375d |
377d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: runtime error: invalid memory address or nil pointer dereference (21)
|
|
|
|
1 |
377d |
377d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: Incrementing non-positive count ADDR on tmpfs.inode (4)
|
C |
|
|
24 |
375d |
377d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: Incrementing non-positive count ADDR on vfs.Filesystem (3)
|
|
|
|
1 |
376d |
376d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: tmpfs.inode.decLinksLocked() called with no existing links
|
|
|
|
1 |
376d |
376d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
panic: tmpfs.inode.incLinksLocked() called with no existing links
|
C |
|
|
1 |
376d |
376d
|
26/26 |
375d |
77b137ffd8ec
Fix umount not unmounting all the mounts it is supposed to.
|
kvm: panic: Sentry detected stuck tasks (19)
|
|
|
|
3 |
378d |
377d
|
26/26 |
376d |
3ab01aedb874
Refactor the umount algorithm.
|
kvm: panic: Sentry detected stuck tasks (18)
|
C |
|
|
3 |
390d |
395d
|
26/26 |
389d |
429f7c439616
Move rootfs check to inside mountMu.
|
panic: runtime error: invalid memory address or nil pointer dereference (20)
|
C |
|
|
8 |
390d |
397d
|
26/26 |
390d |
429f7c439616
Move rootfs check to inside mountMu.
|
panic: WARNING: circular locking detected: mm.activeRWMutex -> tmpfs.filesystemRWMutex:
|
|
|
|
1 |
403d |
403d
|
26/26 |
390d |
e1e7edcc1b67
Don't release unused RightsControlMessage in Recv.
|
panic: close of closed channel
|
C |
|
|
1192 |
1025d |
1033d
|
26/26 |
392d |
2e3e5b606789
Create a new test dimension that mounts a FUSE fs on /tmp.
|
DATA RACE in vfs.(*Mount).setMountOptions
|
C |
|
|
5 |
401d |
401d
|
26/26 |
397d |
ea4f0073d4a1
Fix data race between getting mount options and updating mount options.
|
gvisor boot error: init process did not start (5)
|
|
|
|
41 |
502d |
630d
|
26/26 |
399d |
2e8b96b4fd74
Automated rollback of changelist 514487900
|
panic: Sentry detected stuck tasks (24)
|
C |
|
|
13 |
404d |
410d
|
26/26 |
404d |
1407fdf120ab
Fix concurrent pivot_root bug.
|
panic: expected socket to exist at '!N
|
C |
|
|
23 |
407d |
407d
|
26/26 |
404d |
707ac55a05d7
inet: don't reuse names from the abstract socket namespace map
|
panic: expected socket to exist at '$N
|
C |
|
|
24 |
408d |
409d
|
26/26 |
404d |
707ac55a05d7
inet: don't reuse names from the abstract socket namespace map
|
panic: expected socket to exist at '#N
|
C |
|
|
23 |
406d |
406d
|
26/26 |
404d |
707ac55a05d7
inet: don't reuse names from the abstract socket namespace map
|
panic: expected socket to exist at ' N
|
C |
|
|
20 |
407d |
408d
|
26/26 |
404d |
707ac55a05d7
inet: don't reuse names from the abstract socket namespace map
|
panic: Sentry detected stuck tasks (23)
|
C |
|
|
23 |
411d |
416d
|
26/26 |
410d |
a8bc2e146626
Fix group id cleanup and tidy up some mount methods.
|
kvm: panic: Sentry detected stuck tasks (17)
|
|
|
|
14 |
415d |
445d
|
26/26 |
414d |
44e0d6d07246
Unlock putOldMp before retrying the mount checks in pivot_root.
|
panic: Sentry detected stuck tasks (22)
|
|
|
|
5 |
416d |
416d
|
26/26 |
416d |
44e0d6d07246
Unlock putOldMp before retrying the mount checks in pivot_root.
|
panic: runtime error: invalid memory address or nil pointer dereference (19)
|
C |
|
|
79 |
419d |
433d
|
26/26 |
417d |
f744f443dd7d
Check before attempting to mount an anon mountpoint.
|
panic: nested locking: tmpfs.filesystemRWMutex:
|
|
|
|
1 |
434d |
427d
|
26/26 |
417d |
c74f5866cb75
Fix circular lock that can happen during unlink.
|
DATA RACE in kernel.(*Task).MemoryManager (3)
|
C |
|
|
12 |
418d |
418d
|
26/26 |
417d |
c39ecc4eb47a
The local task in process_vm_read|writev is just the calling task.
|
DATA RACE in kernel.(*runExitMain).execute (2)
|
C |
|
|
143 |
727d |
737d
|
26/26 |
417d |
b66713079526
Clean up and re-enable process_vm_readv/writev
|
DATA RACE in binary.littleEndian.Uint64 (2)
|
C |
|
|
48 |
727d |
737d
|
26/26 |
417d |
b66713079526
Clean up and re-enable process_vm_readv/writev
|
panic: Sentry detected stuck tasks (21)
|
|
|
|
64 |
417d |
465d
|
26/26 |
417d |
677d11f22fbe
Chunkify tmpfs Allocate().
|
DATA RACE in vfs.(*VirtualFilesystem).connectLocked (2)
|
|
|
|
2 |
430d |
431d
|
26/26 |
417d |
de5271b36007
Fix small data race in mount.
|
DATA RACE in safemem.Copy (6)
|
C |
|
|
121 |
727d |
728d
|
26/26 |
417d |
b66713079526
Clean up and re-enable process_vm_readv/writev
|
panic: Unknown syscall NUM error: strconv.ParseInt: parsing "./file1": invalid syntax
|
C |
|
|
19 |
440d |
434d
|
26/26 |
426d |
1910a4577f01
cgroupfs: do not return errors from strconv.ParseInt() to write()
|
panic: runtime error: invalid memory address or nil pointer dereference (18)
|
|
|
|
4 |
444d |
445d
|
26/26 |
440d |
bb4410f44e32
Rollback 6ceceae9385c and 206e88db3653.
|
gvisor test error: panic: interface conversion: vfs.DentryImpl is *tmpfs.dentry, not *kernfs.Dentry
|
|
|
|
38 |
445d |
446d
|
26/26 |
445d |
206e88db3653
Fix cwd/root update method during namespace cloning.
|
panic: nested locking: kernfs.filesystemRWMutex: (7)
|
|
|
|
4 |
459d |
461d
|
26/26 |
454d |
c80ab228d85b
Make vfs.PopDelayedDecRefs() clear vfs.toDecRef.
|
panic: nested locking: kernfs.filesystemRWMutex: (6)
|
C |
|
|
8 |
461d |
477d
|
26/26 |
461d |
755c1f242cd4
nsfs: mark inodes as anonymous
|
panic: Sentry detected stuck tasks (20)
|
C |
|
|
895 |
466d |
468d
|
26/26 |
465d |
960b564a6840
Fix small mount propagation bug.
|
kvm: panic: Sentry detected stuck tasks (15)
|
C |
|
|
186 |
466d |
469d
|
26/26 |
465d |
960b564a6840
Fix small mount propagation bug.
|
kvm: panic: Sentry detected stuck tasks (14)
|
syz |
|
|
4 |
481d |
486d
|
26/26 |
476d |
118a17d92dcf
kernfs: set DenySpliceIn for DynamicBytesFD
|
panic: runtime error: invalid memory address or nil pointer dereference (17)
|
|
|
|
2 |
480d |
480d
|
26/26 |
480d |
6f978d71856e
kernel: GetMountNamespace has to check that mntns isn't nil
|
DATA RACE in udp.(*endpoint).Connect.func1
|
C |
|
|
3 |
495d |
488d
|
26/26 |
480d |
5babda534107
Lock around endpoint info access in UDP onICMPError.
|
SYZFATAL: executor NUM failed NUM times: executor NUM: exit status NUM
|
syz |
|
|
48074 |
482d |
900d
|
26/26 |
482d |
41bb04c14901
Implement mount namespaces
|
panic: runtime error: invalid memory address or nil pointer dereference (16)
|
C |
|
|
48 |
483d |
490d
|
26/26 |
482d |
ef95be6e1c10
kernel: check that a task has a network namespace
|
panic: kcov task work is registered, but no coverage data was found
|
|
|
|
6120 |
496d |
501d
|
26/26 |
494d |
f43a5fc63ac7
Remove panic in ConsumeCoverageData() when no coverage is observed.
|
panic: Sentry detected stuck tasks (18)
|
C |
|
|
625 |
498d |
556d
|
26/26 |
496d |
e54e3668b07c
Impose default tmpfs size limits correctly.
|
gvisor test error: FATAL ERROR: waiting on pid X: waiting on pid X in sandbox NAME failed: EOF (3)
|
|
|
|
124 |
501d |
502d
|
26/26 |
501d |
ffcbc70b9a4a
systrap: don't change an fpu state from the stub code
|
DATA RACE in pipefs.(*inode).UID
|
syz |
|
|
2 |
501d |
501d
|
26/26 |
501d |
02ed5839a762
Add a lock to pipefs's inode to protect a inode's attributes.
|
lost connection to test machine (8)
|
|
|
|
1964 |
501d |
833d
|
26/26 |
501d |
8b57c2e7402f
runsc/seccomp: allow sched_getaffinity if race is on
|
panic: runtime error: invalid memory address or nil pointer dereference (15)
|
|
|
|
1 |
530d |
529d
|
26/26 |
502d |
bb5ada8caffd
Defer dec refing mounts in InvalidateDentry.
|
panic: WARNING: circular locking detected: stack.packetEndpointListRWMutex -> fasync.fileMutex: (2)
|
|
|
|
2 |
525d |
526d
|
26/26 |
519d |
fedbf08401fe
kernel: unshare a network namespace without taking Task.mu
|
panic: WARNING: circular locking detected: fasync.fileMutex -> kernel.taskSetRWMutex: (2)
|
C |
|
|
1 |
525d |
525d
|
26/26 |
519d |
fedbf08401fe
kernel: unshare a network namespace without taking Task.mu
|
panic: WARNING: circular locking detected: stack.packetEndpointListRWMutex -> kernel.taskSetRWMutex: (2)
|
C |
|
|
3 |
525d |
525d
|
26/26 |
519d |
fedbf08401fe
kernel: unshare a network namespace without taking Task.mu
|
kvm: lost connection to test machine (3)
|
|
|
|
8 |
535d |
558d
|
26/26 |
529d |
52692c3647ea
fdtable: avoid large arrays
|
panic: nested locking: kernfs.filesystemRWMutex: (5)
|
|
|
|
5 |
530d |
531d
|
26/26 |
529d |
bb5ada8caffd
Defer dec refing mounts in InvalidateDentry.
|
panic: nested locking: kernfs.filesystemRWMutex: (4)
|
C |
|
|
31 |
532d |
626d
|
26/26 |
531d |
084a5022563f
Change InvalidateDentry to return a list of vds with an extra reference.
|
kvm: panic: Sentry detected stuck tasks (12)
|
|
|
|
193 |
535d |
698d
|
26/26 |
535d |
52692c3647ea
fdtable: avoid large arrays
|
panic: WARNING: circular locking detected: mm.activeRWMutex -> kernfs.filesystemRWMutex:
|
C |
|
|
4 |
568d |
568d
|
26/26 |
536d |
8c975e6e6e68
Mark some kernfs inode as Anonymous.
|
DATA RACE in fasync.(*FileAsync).SetOwnerTask
|
C |
|
|
11 |
537d |
538d
|
26/26 |
536d |
5fed8c81b89a
Fix data race by acquiring lock before accessing fields of FileAsync.
|
panic: WARNING: circular locking detected: fasync.fileMutex -> kernel.taskSetRWMutex:
|
C |
|
|
1 |
539d |
539d
|
26/26 |
536d |
f3d87d3be121
fasync: release the FileAsync mutex before sending the signal
|
panic: WARNING: circular locking detected: stack.packetEndpointListRWMutex -> fasync.fileMutex:
|
|
|
|
1 |
539d |
539d
|
26/26 |
536d |
f3d87d3be121
fasync: release the FileAsync mutex before sending the signal
|
panic: WARNING: circular locking detected: stack.packetEndpointListRWMutex -> kernel.taskSetRWMutex:
|
C |
|
|
3 |
539d |
539d
|
26/26 |
536d |
f3d87d3be121
fasync: release the FileAsync mutex before sending the signal
|
panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> kernfs.filesystemRWMutex: (2)
|
|
|
|
1 |
558d |
558d
|
26/26 |
536d |
ed528835f753
Small circular lock fix.
|
gvisor test error: SYZFATAL: BUG: got no fallback coverage:
|
|
|
|
132 |
557d |
634d
|
26/26 |
546d |
83f4f485b4ad
systrap: don't call Goyield() if the race detector is enabled
|
panic: Incrementing non-positive count ADDR on tmpfs.inode (3)
|
|
|
|
6 |
566d |
588d
|
26/26 |
550d |
283b80a456aa
Fix logic bug in attaching mounts.
|
DATA RACE in log.GoogleEmitter.Emit (2)
|
|
|
|
3 |
554d |
556d
|
26/26 |
551d |
158636229e87
Avoid serializing the sharedContext struct in formatting directives.
|
DATA RACE in kernel.(*TaskImage).Fork
|
C |
|
|
8 |
646d |
647d
|
26/26 |
553d |
028cf757bbef
Clarify comment about copying Task.image in Task.Clone().
|
panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> tmpfs.filesystemRWMutex: (2)
|
C |
|
|
17 |
558d |
559d
|
26/26 |
556d |
ed528835f753
Small circular lock fix.
|
panic: Sentry detected stuck tasks (17)
|
C |
|
|
822 |
557d |
822d
|
26/26 |
556d |
ed528835f753
Small circular lock fix.
|
gvisor build error (19)
|
|
|
|
110 |
559d |
559d
|
26/26 |
558d |
74e63e9e296a
Update packages
|
panic: Decrementing non-positive ref count ADDR, owned by tmpfs.inode (2)
|
C |
|
|
47 |
565d |
571d
|
26/26 |
559d |
283b80a456aa
Fix logic bug in attaching mounts.
|
gvisor test error: timed out (4)
|
|
|
|
548 |
560d |
924d
|
26/26 |
560d |
83f4f485b4ad
systrap: don't call Goyield() if the race detector is enabled
|
panic: WARNING: circular locking detected: stack.neighborEntryRWMutex -> stack.nicRWMutex:
|
|
|
|
1 |
592d |
592d
|
26/26 |
560d |
38823be81914
Don't lock before accessing nic.networkEndpoints
|
panic: WARNING: circular locking detected: transport.streamQueueReceiverMutex -> kernfs.filesystemRWMutex:
|
C |
|
|
1 |
568d |
568d
|
26/26 |
560d |
2044c3449153
Don't hold streamQueueReceiver.mu while calling RightsControlMessage.Release().
|
panic: WARNING: circular locking detected: transport.endpointMutex -> kernfs.filesystemRWMutex:
|
C |
|
|
1 |
568d |
568d
|
26/26 |
560d |
a7e1fe92f588
Don't hold baseEndpoint.mu when calling receiver.Recv.
|
panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> tmpfs.filesystemRWMutex:
|
C |
|
|
18 |
681d |
756d
|
26/26 |
560d |
e0b1585586c6
Remove stale `vdDentry` variable from VirtualFilesystem.connectMountAt().
|
panic: nested locking: transport.endpointMutex:
|
C |
|
|
1 |
568d |
568d
|
26/26 |
560d |
a7e1fe92f588
Don't hold baseEndpoint.mu when calling receiver.Recv.
|
fatal error: unexpected signal during runtime execution (3)
|
|
|
|
9 |
605d |
608d
|
26/26 |
605d |
96aa115516c8
systrap: simplify interrupt handling in syshandler
|
gvisor boot error: panic: prctl(PR_SET_NO_NEW_PRIVS) failed: invalid argument
|
|
|
|
12 |
608d |
609d
|
26/26 |
608d |
6890e539c700
systrap: set all arguments of prctl(PR_SET_NO_NEW_PRIVS)
|
panic: interface conversion: *kernel.Kernel is not unimpl.Events: missing method EmitUnimplementedEvent
|
C |
|
|
5857 |
613d |
614d
|
26/26 |
613d |
f8b98248139c
Update `unimpl.EmitUnimplementedEvent` interface to add the syscall number.
|
gvisor test error: SYZFATAL: BUG: program execution failed: executor NUM: not serving
|
|
|
|
137 |
614d |
621d
|
26/26 |
614d |
08920d098b30
Fix systrap TLS handling on ARM.
|
gvisor build error (18)
|
|
|
|
313 |
621d |
643d
|
26/26 |
614d |
fedadb093205
Fix syzkaller systrap builds.
|
DATA RACE in systrap.(*subprocessPool).fetchAvailable
|
|
|
|
25 |
624d |
635d
|
26/26 |
614d |
f01bf248c19f
Fix data race in subprocess pool.
|
panic: WARNING: circular locking detected: tmpfs.filesystemRWMutex -> kernel.taskSetRWMutex:
|
syz |
|
|
14 |
621d |
896d
|
26/26 |
614d |
758da469f7ed
kernel: release kernel.taskSetRWMutex before calling TaskImage.Release
|
panic: runtime error: index out of range [ADDR] with length NUM
|
C |
|
|
17 |
625d |
625d
|
26/26 |
614d |
fc94225c333d
Fix crash with large FD value
|
gvisor boot error: FATAL ERROR: overlay flag is incompatible with shared file access for rootfs
|
|
|
|
148 |
628d |
629d
|
26/26 |
619d |
1b7a4e2a055c
Prepare to make root overlay the default.
|
gvisor boot error: FATAL ERROR: overlay flag has been replaced with overlay2 flag
|
|
|
|
66 |
627d |
629d
|
26/26 |
619d |
1b7a4e2a055c
Prepare to make root overlay the default.
|
DATA RACE in vfs.(*VirtualFilesystem).PivotRoot
|
C |
|
|
1 |
638d |
638d
|
26/26 |
628d |
807fd0fd27d0
Lock around accessing the mount namespace in pivot_root.
|
panic: runtime error: invalid memory address or nil pointer dereference (14)
|
C |
|
|
753 |
637d |
638d
|
18/26 |
637d |
8a1845f8b850
Don't send a signal to a controlling thread group if one has not been set.
|
fatal error: stack overflow
|
|
|
|
1 |
713d |
713d
|
18/26 |
637d |
426deb60fd25
lockdep: fix the TOCTTOU issue
|
panic: runtime error: invalid memory address or nil pointer dereference (13)
|
C |
|
|
2752 |
638d |
641d
|
18/26 |
638d |
8184fa1db0fa
Clean up devpts code, and deduplicate the foreground process state.
|
panic: runtime error: slice bounds out of range [:NUM] with capacity NUM (2)
|
C |
|
|
7 |
643d |
645d
|
18/26 |
641d |
5817f4cc64e4
Fix FUSE how handles malformed INIT requests.
|
panic: nested locking: kernfs.filesystemRWMutex: (3)
|
syz |
|
|
19 |
649d |
674d
|
18/26 |
647d |
28472cc03fe1
don't take an unnecessary reference in proc.fdSymlink.Valid()
|
panic: interface conversion: vfs.DentryImpl is *vfs.anonDentry, not *kernfs.Dentry (2)
|
C |
|
|
13 |
655d |
655d
|
18/26 |
654d |
1beb3e2b251d
Check hard link target's mount compatibility before kernfs.Dentry cast. Again.
|
panic: interface conversion: vfs.DentryImpl is *tmpfs.dentry, not *kernfs.Dentry (2)
|
C |
|
|
65 |
654d |
655d
|
18/26 |
654d |
1beb3e2b251d
Check hard link target's mount compatibility before kernfs.Dentry cast. Again.
|
panic: interface conversion: vfs.DentryImpl is *vfs.anonDentry, not *kernfs.Dentry
|
C |
|
|
14 |
657d |
660d
|
18/26 |
655d |
8373fb5db8c8
Check hard link target's mount compatibility before kernfs.Dentry cast.
|
panic: interface conversion: vfs.DentryImpl is *tmpfs.dentry, not *kernfs.Dentry
|
C |
|
|
390 |
655d |
661d
|
18/26 |
655d |
8373fb5db8c8
Check hard link target's mount compatibility before kernfs.Dentry cast.
|
panic: interface conversion: vfs.DentryImpl is *gofer.dentry, not *kernfs.Dentry
|
C |
|
|
13 |
657d |
658d
|
18/26 |
657d |
8373fb5db8c8
Check hard link target's mount compatibility before kernfs.Dentry cast.
|
panic: runtime error: index out of range [NUM] with length NUM (3)
|
C |
|
|
372 |
673d |
676d
|
18/26 |
673d |
fe562179fea1
Handle absolute symlink target '/' correctly in VFS layer.
|
panic: runtime error: invalid memory address or nil pointer dereference (12)
|
C |
|
|
31 |
676d |
738d
|
18/26 |
673d |
e08f204299df
inet: each socket has to hold a reference to its network namespace
|
panic: WARNING: circular locking detected: vfs.virtualFilesystemMutex -> kernfs.filesystemRWMutex:
|
|
|
|
1 |
691d |
691d
|
18/26 |
675d |
492d7a98116b
Decref target VirtualDentry outside the vfs mount lock during mount ops.
|
gvisor test error: panic: ptrace set regs (&{PtraceRegs:{Regs:[ADDR NUM ADDR NUM NUM NUM NUM ADDR ADDR NUM NUM ADDR ADDR NUM ADDR ADDR NUM
|
|
|
|
10 |
679d |
679d
|
15/26 |
677d |
194029b95444
arm64: validate registers that come from user-space
|
panic: WARNING: circular locking detected: stack.nicRWMutex -> stack.packetsPendingLinkResolutionMutex: (2)
|
C |
|
|
53 |
711d |
713d
|
14/26 |
711d |
bc440b67fce0
Don't hold nic.mu when calling n.linkResQueue.cancel.
|
panic: WARNING: circular locking detected: stack.nicRWMutex -> stack.neighborCacheRWMutex:
|
C |
|
|
356 |
713d |
719d
|
14/26 |
712d |
70be2fc8a772
Remove unsetting route's cached neighbor entry in link res callback.
|
gvisor build error (16)
|
|
|
|
12 |
726d |
726d
|
14/26 |
713d |
20b2ec04d94d
Update bazel packages
|
panic: WARNING: circular locking detected: stack.packetsPendingLinkResolutionMutex -> stack.routeRWMutex:
|
C |
|
|
2602 |
713d |
719d
|
14/26 |
713d |
4f326de47636
Make nic.spoofing and nic.promiscuous atomic Bools to avoid lock contention.
|
panic: WARNING: circular locking detected: stack.nicRWMutex -> stack.packetsPendingLinkResolutionMutex:
|
C |
|
|
1246 |
713d |
719d
|
14/26 |
713d |
4f326de47636
Make nic.spoofing and nic.promiscuous atomic Bools to avoid lock contention.
|
gvisor boot error: FATAL ERROR: running container: creating container: failed to create an unnamed temporary file inside "/tmp"
|
|
|
|
24 |
717d |
718d
|
14/26 |
717d |
368e85414697
overlay2: Do not use O_TMPFILE to create unnamed temporary file.
|
panic: WARNING: circular locking detected: kernel.signalHandlersMutex -> kernfs.filesystemRWMutex:
|
C |
|
|
351 |
724d |
726d
|
14/26 |
724d |
d0ae59368d8a
cgroupfs: Fix lock ordering between kernfs.Filesystem.mu and TaskSet.mu.
|
panic: WARNING: circular locking detected: kernel.taskSetRWMutex -> kernfs.filesystemRWMutex:
|
C |
|
|
2320 |
724d |
726d
|
14/26 |
724d |
d0ae59368d8a
cgroupfs: Fix lock ordering between kernfs.Filesystem.mu and TaskSet.mu.
|
panic: cgroupfs: pids controller attempted to remove pending charge for Task ADDR, but task didn't have pending charges, (2)
|
|
|
|
1 |
757d |
757d
|
14/26 |
726d |
62ddad611979
cgroupfs: Fix several races with task migration.
|
panic: Decrementing non-positive ref count ADDR, owned by tmpfs.inode
|
C |
|
|
27 |
726d |
727d
|
14/26 |
726d |
1823b16fccf7
Clean up DecRefs in mount methods.
|
panic: Incrementing non-positive count ADDR on tmpfs.inode (2)
|
C |
|
|
56 |
726d |
727d
|
14/26 |
726d |
1823b16fccf7
Clean up DecRefs in mount methods.
|
panic: kernfs.Dentry.DecRef() called without holding a reference (2)
|
C |
|
|
61 |
726d |
727d
|
14/26 |
726d |
1823b16fccf7
Clean up DecRefs in mount methods.
|
kvm: panic: Sentry detected stuck tasks (10)
|
|
|
|
3 |
742d |
760d
|
14/26 |
727d |
ece02b45b5b4
Add a maximum to the total number of mounts allowed in a namespace.
|
panic: Lock not held: transport.endpointMutex[e]:
|
C |
|
|
1191 |
727d |
728d
|
14/26 |
727d |
1ceee8c31071
connectioned: Change nested lock name to only have a single nested lock.
|
DATA RACE in safemem.Copy (5)
|
C |
|
|
3153 |
728d |
738d
|
14/26 |
728d |
ae731e0394f5
Don't use other process's scratch buffer.
|
panic: unbalance unlock: mm.activeRWMutex:LINE:
|
|
|
|
2 |
730d |
741d
|
14/26 |
728d |
445fa6f40c89
Lockdep: Print more info in the "unbalanced unlock" case.
|
panic: WARNING: circular locking detected: kernel.taskMutex -> kernel.taskSetRWMutex:
|
C |
|
|
1470 |
738d |
739d
|
14/26 |
736d |
38a0512f13fa
Fix circular lock in process_vm_(read|write)v
|
DATA RACE in binary.littleEndian.Uint64
|
C |
|
|
29 |
837d |
840d
|
14/26 |
739d |
106f6ea96746
Re-enable process_vm_(read|write)v
|
panic: runtime error: slice bounds out of range [:ADDR] with capacity ADDR
|
C |
|
|
914 |
739d |
756d
|
14/26 |
739d |
3c0e0a3746a3
io_uring: Fix several issues with shared ring buffers.
|
DATA RACE in safemem.Copy (4)
|
C |
|
|
1019 |
837d |
840d
|
14/26 |
739d |
106f6ea96746
Re-enable process_vm_(read|write)v
|
panic: runtime error: slice bounds out of range [ADDR:NUM]
|
C |
|
|
13 |
743d |
743d
|
14/26 |
739d |
3c0e0a3746a3
io_uring: Fix several issues with shared ring buffers.
|
panic: runtime error: slice bounds out of range [:ADDR] with capacity NUM
|
C |
|
|
124 |
739d |
756d
|
14/26 |
739d |
3c0e0a3746a3
io_uring: Fix several issues with shared ring buffers.
|
panic: runtime error: integer divide by zero (3)
|
C |
|
|
443 |
739d |
756d
|
14/26 |
739d |
3c0e0a3746a3
io_uring: Fix several issues with shared ring buffers.
|
panic: Unknown syscall -NUM error: EOF
|
C |
|
|
14 |
743d |
745d
|
14/26 |
739d |
f3aaf4326636
io_ring: Handle EOF on IORING_OP_READV
|
DATA RACE in tmpfs.GetSeals
|
|
|
|
1 |
744d |
744d
|
14/26 |
741d |
374e716c7ce2
AddSeals has to take the write lock to modify seals
|
DATA RACE in tmpfs.AddSeals
|
C |
|
|
4 |
744d |
744d
|
14/26 |
741d |
374e716c7ce2
AddSeals has to take the write lock to modify seals
|
panic: runtime error: slice bounds out of range [:NUM] with capacity NUM
|
C |
|
|
196 |
1025d |
1033d
|
14/26 |
742d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
panic: addresses IP and fe80::aa do not have the same length (2)
|
|
|
|
1 |
748d |
748d
|
14/26 |
743d |
8756ebc3b406
Netstack: Check address matches the endpoint protocol for IP_DROP_MEMBERSHIP
|
panic: runtime error: invalid memory address or nil pointer dereference (11)
|
C |
|
|
2733 |
746d |
840d
|
14/26 |
745d |
ae136df84998
Add nil-check for parent mount in umount(2) while handling mount propagation.
|
DATA RACE in vfs.(*VirtualFilesystem).setPropagation
|
C |
|
|
3 |
759d |
759d
|
14/26 |
746d |
20ef2127a102
Lock around optional tag generation.
|
DATA RACE in bufferv2.newChunk
|
C |
|
|
68 |
753d |
768d
|
14/26 |
752d |
6b3b5493d0ea
Fix ipv6 header view ownership.
|
DATA RACE in vfs.(*VirtualFilesystem).GenerateProcMountInfo
|
C |
|
|
2 |
757d |
759d
|
14/26 |
756d |
20ef2127a102
Lock around optional tag generation.
|
panic: runtime error: integer divide by zero (2)
|
C |
|
|
56 |
756d |
756d
|
14/26 |
756d |
d4b159ae93b5
iouring: Disallow zero, or less CQ entries than SQ entries
|
panic: nested locking: kernel.taskSetRWMutex:
|
C |
|
|
2 |
815d |
815d
|
14/26 |
762d |
c1427a04dfba
Disable fasync for signalfd descriptors
|
gvisor test error: panic: WARNING: circular locking detected: mm.activeRWMutex -> kernel.taskSetRWMutex:
|
|
|
|
1 |
783d |
783d
|
14/26 |
776d |
2e844f74fcdd
Do not use ktime.Timer for CPU clock ticks.
|
panic: Decrementing non-positive ref count ADDR, owned by kernel.ProcessGroup (2)
|
C |
|
|
3 |
780d |
815d
|
14/26 |
780d |
36ddd3050cc2
Check if ThreadGroup exists before executing JoinProcessGroup.
|
kvm: panic: Sentry detected stuck tasks (9)
|
|
|
|
2 |
808d |
810d
|
14/26 |
798d |
48e2252b3bac
fix panic caused by too-large buffer allocations
|
gvisor build error (15)
|
|
|
|
232 |
805d |
804d
|
14/26 |
802d |
d2827e5a9242
Don't require gcc-multilib to be installed to build BPF
|
panic: cgroupfs: pids controller pending pool would be negative if charge was allowed: current pool: NUM, proposed charg
|
C |
|
|
97 |
818d |
937d
|
14/26 |
818d |
46e08207b58f
cgroupfs: Handle hierachy changes across charge/uncharge.
|
panic: addresses IP and fe80::aa do not have the same length
|
|
|
|
102 |
837d |
867d
|
14/26 |
832d |
b195ca54f311
Netstack: Check that the multicast address matches the endpoint protocol.
|
DATA RACE in fuse.newFUSEFilesystem
|
C |
|
|
384 |
1025d |
1033d
|
14/26 |
840d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
panic: WARNING: circular locking detected: cgroupfs.pidsControllerMutex -> mm.mappingRWMutex:
|
|
|
|
3 |
895d |
896d
|
14/26 |
893d |
d5a04e338eef
cgroupfs: Don't copy in with cgroups locks held.
|
panic: WARNING: circular locking detected: tmpfs.inodeMutex -> mm.activeRWMutex:
|
C |
|
|
8353 |
896d |
896d
|
14/26 |
893d |
82498d087ef8
Don't hold MM.activeMu when calling MM.vmaMapsEntryLocked().
|
panic: Sentry detected stuck tasks (16)
|
|
|
|
5 |
901d |
974d
|
14/26 |
900d |
8b41af93300c
sync/lockdep: use RangeRepeatable instead of Range
|
kvm: panic: Sentry detected stuck tasks (7)
|
|
|
|
1 |
919d |
912d
|
14/26 |
900d |
6fda48f50dcd
tcpip/transport/raw: check MTU before copying a buffer from user memory
|
panic: invalid allocation length: 0x0 (4)
|
C |
|
|
4338 |
901d |
903d
|
14/26 |
901d |
3290a054c5bd
getdents: Test that size parameter is not zero before allocating PMAs.
|
panic: WARNING: circular locking detected: kernel.taskSetRWMutex -> mm.activeRWMutex:
|
|
|
|
2 |
918d |
913d
|
14/26 |
907d |
e47be0cfc06d
Move Send/RecvNotify calls outside of CopyIn/Out, due to lock order.
|
panic: runtime error: index out of range [-NUM]
|
C |
|
|
13 |
932d |
932d
|
14/26 |
929d |
a7cad2b092de
Tmpfs with size option enabled bug fix.
|
DATA RACE in fuse.(*connection).callFutureLocked
|
C |
|
|
2 |
1030d |
1033d
|
14/26 |
938d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.(*DeviceFD).Read
|
C |
|
|
238 |
1027d |
1032d
|
14/26 |
938d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.newFUSEConnection
|
C |
|
|
52 |
1027d |
1033d
|
14/26 |
938d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.(*DeviceFD).PWrite
|
C |
|
|
11 |
1030d |
1033d
|
14/26 |
938d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.(*DeviceFD).PRead
|
C |
|
|
9 |
1028d |
1033d
|
14/26 |
938d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
DATA RACE in fuse.(*DeviceFD).Seek
|
C |
|
|
8 |
1032d |
1033d
|
14/26 |
938d |
32c474d82f65
Allow multiple FUSE filesystems to share a connection.
|
panic: unexpected tcp state in processor: BOUND
|
C |
|
|
36 |
949d |
952d
|
14/26 |
949d |
3b917921d7fe
Fix race in listen.
|
DATA RACE in cgroupfs.(*memsData).Write
|
C |
|
|
4 |
960d |
960d
|
14/26 |
952d |
5f9bd8a53b20
cgroupfs: Synchronize access to cpuset controller bitmaps.
|
panic: unknown network protocol number NUM
|
C |
|
|
56 |
1041d |
1053d
|
14/26 |
971d |
6a28dc7c5963
Correct fragmentation reference counting.
|
panic: runtime error: invalid memory address or nil pointer dereference (10)
|
C |
|
|
11 |
977d |
983d
|
14/26 |
977d |
5835bc8c3a4b
cgroupfs: Handle invalid PID/PGID on migration.
|
DATA RACE in kernfs.(*OrderedChildren).checkExistingLocked
|
C |
|
|
1 |
999d |
999d
|
14/26 |
978d |
9085d334deed
kernfs: Handle duplicate unlink on orphaned directories.
|
panic: Inode doesn't match what kernfs thinks! OrderedChild: &{dir:{InodeNoopRefCount:{InodeTemporary:{}} InodeAlwaysVal
|
C |
|
|
12 |
984d |
999d
|
14/26 |
978d |
9085d334deed
kernfs: Handle duplicate unlink on orphaned directories.
|
DATA RACE in bitmap.(*Bitmap).Maximum
|
C |
|
|
8 |
991d |
1000d
|
14/26 |
991d |
4503ba3f5efd
Fix data race when using UNSHARE in close_range.
|
kvm: lost connection to test machine
|
|
|
|
364 |
994d |
1348d
|
14/26 |
992d |
81d384cfe9d3
Fix race between epoll readiness check and re-readying.
|
lost connection to test machine (6)
|
|
|
|
4341 |
992d |
1231d
|
14/26 |
992d |
81d384cfe9d3
Fix race between epoll readiness check and re-readying.
|
DATA RACE in transport.(*connectionedEndpoint).Connect.func1 (2)
|
C |
|
|
4 |
1008d |
1001d
|
14/26 |
997d |
b1ceabc884c0
Hold baseEndpoint.mu when calling baseEndpoint.Connected()
|
kvm: panic: Sentry detected stuck tasks (6)
|
|
|
|
15 |
1001d |
1011d
|
14/26 |
1000d |
f51097051ac5
tun: reject packets larger MTU
|
panic: Sentry detected stuck tasks (15)
|
C |
|
|
2582 |
1010d |
1087d
|
14/26 |
1004d |
510cc2f7fca9
Fix pivot_root lock inversion.
|
Invalid request partialResult in sendto (3)
|
C |
|
|
9 |
1008d |
1008d
|
14/26 |
1006d |
395c38be75d1
Add ECONNABORTED to the partial result error list.
|
kvm: panic: Sentry detected stuck tasks (5)
|
C |
|
|
65 |
1013d |
1074d
|
14/26 |
1012d |
b413d78c27db
sendfile: limit a buffer size
|
panic: runtime error: invalid memory address or nil pointer dereference (9)
|
C |
|
|
262 |
1025d |
1021d
|
14/26 |
1020d |
b7ccfa5084e2
Fixes #7086,#6964,#3413,#7001.
|
DATA RACE in fuse.(*connection).callFuture (2)
|
|
|
|
3 |
1025d |
1026d
|
14/26 |
1025d |
e219f75d8b3c
Fuse: Cache `maxActiveRequests` in `connection` to avoid reading it from `fs`.
|
panic: Unknown syscall NUM error: payload too small. Minimum data lenth required: NUM, but got data length NUM
|
C |
|
|
79 |
1026d |
1032d
|
14/26 |
1026d |
55ef37166897
Return well-defined error on short payload in FUSE.
|
fatal error: sync: unlock of unlocked mutex
|
C |
|
|
26 |
1026d |
1027d
|
14/26 |
1026d |
10d1a49c5ba2
Fuse: `DeviceFD.Read`: Lock `DeviceFD` ahead of other locks.
|
DATA RACE in fuse.(*connection).callFuture
|
|
|
|
1 |
1030d |
1030d
|
14/26 |
1027d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in fuse.(*connection).initProcessReply
|
C |
|
|
14 |
1027d |
1032d
|
14/26 |
1027d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in fuse.(*DeviceFD).writeLocked
|
C |
|
|
33 |
1027d |
1032d
|
14/26 |
1027d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in fuse.(*connection).Call
|
C |
|
|
65 |
1027d |
1031d
|
14/26 |
1027d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in fuse.(*DeviceFD).Release
|
C |
|
|
404 |
1027d |
1032d
|
14/26 |
1027d |
a5ce865145c7
fuse: Attempt to fix five data races.
|
DATA RACE in stack.(*PacketBuffer).reset (2)
|
syz |
|
|
2 |
1053d |
1053d
|
14/26 |
1028d |
6d15b0ee64f1
Fix packet buffer reference counting in IP fragmentation/reassembly.
|
panic: runtime error: invalid memory address or nil pointer dereference (8)
|
C |
|
|
214 |
1028d |
1053d
|
14/26 |
1028d |
6d15b0ee64f1
Fix packet buffer reference counting in IP fragmentation/reassembly.
|
panic: Incrementing non-positive count ADDR on stack.PacketBuffer
|
C |
|
|
9 |
1039d |
1039d
|
14/26 |
1028d |
6d15b0ee64f1
Fix packet buffer reference counting in IP fragmentation/reassembly.
|
DATA RACE in mqfs.FilesystemType.GetFilesystem
|
|
|
|
1 |
1043d |
1043d
|
14/26 |
1029d |
d1dadc9c19a1
Remove dentry_cache_limit mount option from mqfs.
|
gvisor build error (13)
|
|
|
|
201 |
1034d |
1041d
|
14/26 |
1034d |
c18ec0b53cf2
Fix race build error.
|
panic: runtime error: index out of range [NUM] with length NUM (2)
|
C |
|
|
21 |
1034d |
1041d
|
14/26 |
1034d |
5fb527632358
Handle 0 sized writes to /dev/net/tun.
|
panic: PullUp failed (2)
|
syz |
|
|
4 |
1043d |
1051d
|
14/26 |
1040d |
6d15b0ee64f1
Fix packet buffer reference counting in IP fragmentation/reassembly.
|
DATA RACE in transport.(*connectionedEndpoint).Listen
|
|
|
|
1 |
1071d |
1071d
|
14/26 |
1056d |
52bee5297caf
unix: call Listening under the endpoint lock
|
DATA RACE in udp.(*endpoint).Connect (2)
|
C |
|
|
4 |
1461d |
1466d
|
14/26 |
1064d |
2485a4e2cb4a
Make stack.Route safe to access concurrently
|
kvm: panic: Sentry detected stuck tasks (4)
|
C |
|
|
627 |
1082d |
1109d
|
14/26 |
1082d |
4d29819e13a1
pipe: have separate notifiers for readers and writers
|
panic: Sentry detected stuck tasks (14)
|
|
|
|
20 |
1090d |
1136d
|
14/26 |
1090d |
b2f8b495ad73
cgroup/cpuset: handle the offset argument of write methods properly
|
DATA RACE in stack.(*PacketBuffer).reset
|
|
|
|
9 |
1111d |
1111d
|
14/26 |
1111d |
bb1ae811f4eb
Prevent PacketBuffers from being returned to the pool too early in nic.
|
panic: runtime error: makeslice: len out of range (4)
|
|
|
|
36 |
1112d |
1115d
|
14/26 |
1112d |
37792ee1e6e1
Validate ControlMessageHeader.Length
|
SYZFAIL: tun: can't open /dev/net/tun
|
syz |
|
|
339 |
1120d |
1373d
|
14/26 |
1120d |
58017e655399
Handle UMOUNT_NOFOLLOW in VFS2 umount(2).
|
kvm: no output from test machine (2)
|
C |
|
|
23 |
1121d |
1198d
|
14/26 |
1120d |
58017e655399
Handle UMOUNT_NOFOLLOW in VFS2 umount(2).
|
DATA RACE in cgroupfs.(*cpusData).Generate
|
|
|
|
2 |
1125d |
1130d
|
14/26 |
1125d |
6078d26588c0
Sychronize access to cpuset controller bitmaps.
|
DATA RACE in cgroupfs.(*cpusData).Write
|
C |
|
|
6 |
1125d |
1130d
|
14/26 |
1125d |
6078d26588c0
Sychronize access to cpuset controller bitmaps.
|
panic: runtime error: index out of range [NUM] with length NUM
|
C |
|
|
12 |
1127d |
1129d
|
14/26 |
1126d |
f54a25c1f03e
Validate an icmp header before accessing it
|
panic: interface conversion: kernfs.Inode is nil, not *mqfs.rootInode
|
|
|
|
2 |
1127d |
1130d
|
14/26 |
1126d |
763d7e6e396d
Obtain ref on root dentry in mqfs.GetFilesystem.
|
panic: runtime error: invalid memory address or nil pointer dereference (7)
|
C |
|
|
45305 |
1126d |
1155d
|
14/26 |
1126d |
763d7e6e396d
Obtain ref on root dentry in mqfs.GetFilesystem.
|
panic: kernfs.Dentry.DecRef() called without holding a reference
|
C |
|
|
87 |
1126d |
1130d
|
14/26 |
1126d |
763d7e6e396d
Obtain ref on root dentry in mqfs.GetFilesystem.
|
panic: Only permission mask must be set: ADDR
|
C |
|
|
756 |
1127d |
1130d
|
14/26 |
1127d |
4d07fc952d6b
Do not leak non-permission mode bits in mq_open(2).
|
gvisor build error (11)
|
|
|
|
386 |
1198d |
1202d
|
14/26 |
1154d |
c2353e4055ac
[op] Fix //debian:debian.
|
FATAL ERROR: waiting on pid X: waiting on pid X in sandbox NAME failed: EOF (3)
|
C |
|
|
2034 |
1155d |
1249d
|
14/26 |
1154d |
0bdd79ccd469
kvm: trap mmap syscalls to map new regions to the guest
|
DATA RACE in safemem.Copy (3)
|
C |
|
|
3 |
1160d |
1160d
|
14/26 |
1155d |
1fe0a6691ff5
Prevent PacketData from being modified.
|
panic: runtime error: slice bounds out of range [:LINE] with capacity 0
|
|
|
|
2 |
1205d |
1206d
|
14/26 |
1155d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
panic: Sentry detected stuck tasks (13)
|
|
|
|
1 |
1166d |
1166d
|
14/26 |
1155d |
4076153be684
Fix lock ordering violation
|
Invalid request partialResult in pwritev
|
C |
|
|
278 |
1348d |
1366d
|
14/26 |
1158d |
7fac7e32f3a8
Translate syserror when validating partial IO errors
|
kvm: panic: Watchdog goroutine is stuck (4)
|
|
|
|
18 |
1186d |
1243d
|
14/26 |
1158d |
14d6cb4436f1
platform/kvm: fix a race condition in vCPU.unlock()
|
panic: runtime error: slice bounds out of range [40:LINE]
|
|
|
|
3 |
1212d |
1215d
|
14/26 |
1158d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
Invalid request partialResult in sendto (2)
|
C |
|
|
10 |
1194d |
1268d
|
14/26 |
1158d |
e5fe488b2273
Wake up Writers when tcp socket is shutdown for writes.
|
kvm: panic: Sentry detected stuck tasks (2)
|
C |
|
|
66 |
1165d |
1328d
|
14/26 |
1158d |
1947c873423c
Fix deadlock in /proc/[pid]/fd/[num]
|
panic: Sentry detected stuck tasks (12)
|
|
|
|
2 |
1167d |
1167d
|
14/26 |
1166d |
51b96514cd93
Limit most file mmaps to the range of an int64.
|
DATA RACE in msgqueue.(*Queue).pop
|
C |
|
|
2 |
1192d |
1192d
|
14/26 |
1168d |
d6c99694bcb9
Fix race on msgrcv(MSG_COPY).
|
panic: Sentry detected stuck tasks (11)
|
C |
|
|
31 |
1182d |
1309d
|
14/26 |
1180d |
9149b2cefdb5
unix: avoid taking two endpoint locks
|
panic: runtime error: makeslice: len out of range (3)
|
C |
|
|
10 |
1182d |
1182d
|
14/26 |
1181d |
927ea16dd384
unix: handle a case when a buffer is overflowed
|
panic: unknown error: SIGBUS at ADDR
|
C |
|
|
17 |
1184d |
1198d
|
14/26 |
1183d |
dfbcb8903ae8
[syserr] Fix SIGBUS on syserr.FromError
|
DATA RACE in safemem.Copy (2)
|
C |
|
|
9 |
1208d |
1208d
|
14/26 |
1197d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
panic: runtime error: slice bounds out of range [2:LINE]
|
|
|
|
1 |
1224d |
1224d
|
14/26 |
1197d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
DATA RACE in buffer.(*buffer).Remove
|
C |
|
|
2 |
1208d |
1208d
|
14/26 |
1197d |
6d0b40b1d159
[op] Make PacketBuffer Clone() do a deeper copy.
|
kvm: no output from test machine
|
|
|
|
1107 |
1208d |
1358d
|
14/26 |
1208d |
569f605f438d
Correctly handle interruptions in blocking msgqueue syscalls.
|
no output from test machine (9)
|
C |
|
|
2298 |
1208d |
1363d
|
14/26 |
1208d |
569f605f438d
Correctly handle interruptions in blocking msgqueue syscalls.
|
panic: unable to find an index for ID: 0
|
C |
|
|
1497 |
1221d |
1222d
|
14/26 |
1221d |
3d0a9300050a
Don't panic on user-controlled state in semaphore syscalls.
|
DATA RACE in atomic.CompareAndSwapInt32 (4)
|
syz |
|
|
4 |
1234d |
1228d
|
14/26 |
1223d |
a89b2f005b71
Use atomics when checking for parent setgid in VFS2 tmpfs file creation.
|
panic: FIN segments must be the final segment in the write list.
|
|
|
|
2 |
1240d |
1241d
|
14/26 |
1236d |
1fc7a9eac2f2
Do not queue zero sized segments.
|
FATAL ERROR: waiting on pid X: waiting on pid X in sandbox NAME failed: EOF (2)
|
C |
|
|
2532 |
1249d |
1861d
|
14/26 |
1249d |
d703340bc04a
runsc: don't kill sandbox, let it stop properly
|
panic: Incrementing non-positive count ADDR on kernel.ProcessGroup (2)
|
|
|
|
1 |
1259d |
1259d
|
14/26 |
1250d |
2e6195ffe0ad
CreateProcessGroup has to check whether a target process stil exists or not
|
kvm: panic: Watchdog goroutine is stuck (3)
|
C |
|
|
48 |
1265d |
1315d
|
14/26 |
1263d |
3fcbad509300
Fix lock ordering issue when enumerating cgroup tasks.
|
panic: Watchdog goroutine is stuck (2)
|
|
|
|
1 |
1276d |
1269d
|
14/26 |
1263d |
3fcbad509300
Fix lock ordering issue when enumerating cgroup tasks.
|
panic: Incrementing non-positive count ADDR on vfs.Filesystem (2)
|
|
|
|
1 |
1287d |
1287d
|
14/26 |
1285d |
af229f46a149
Fix cgroupfs mount racing with unmount.
|
panic: PullUp failed
|
C |
|
|
615 |
1291d |
1292d
|
14/26 |
1291d |
436148d68a50
Fix panic on consume in a mixed push/consume case
|
panic: Incrementing non-positive count ADDR on vfs.Filesystem
|
C |
|
|
2 |
1309d |
1309d
|
14/26 |
1291d |
78ae3db1a39c
Fix cgroup hierarchy registration.
|
DATA RACE in cgroupfs.FilesystemType.GetFilesystem
|
C |
|
|
1 |
1309d |
1302d
|
14/26 |
1291d |
78ae3db1a39c
Fix cgroup hierarchy registration.
|
panic: Sentry detected stuck tasks (10)
|
C |
|
|
264 |
1316d |
1369d
|
14/26 |
1316d |
b0333d33a206
Optimize safemem.Zero
|
kvm: panic: Watchdog goroutine is stuck (2)
|
|
|
|
110 |
1323d |
1340d
|
14/26 |
1322d |
f4f6ce337aa8
Don't grab TaskSet mu recursively when reading task state.
|
panic: Watchdog goroutine is stuck
|
C |
|
|
1831 |
1323d |
1621d
|
14/26 |
1322d |
f4f6ce337aa8
Don't grab TaskSet mu recursively when reading task state.
|
panic: makechan: size out of range
|
C |
|
|
183 |
1326d |
1330d
|
14/26 |
1326d |
dc8f6c691474
Move maxListenBacklog check to sentry
|
fatal error: unexpected signal during runtime execution
|
syz |
|
|
272 |
1394d |
2082d
|
14/26 |
1326d |
eb9b8e53a3ef
platform/kvm/x86: restore mxcsr when switching from guest to sentry
|
kvm: panic: Watchdog goroutine is stuck
|
|
|
|
240 |
1341d |
1351d
|
14/26 |
1341d |
2f3dac78ca9a
kvm: prefault a floating point state before restoring it
|
Invalid request partialResult in write (2)
|
C |
|
|
11628 |
1343d |
1408d
|
14/26 |
1343d |
7fac7e32f3a8
Translate syserror when validating partial IO errors
|
kvm: panic: Sentry detected stuck tasks
|
C |
|
|
152 |
1343d |
1358d
|
14/26 |
1343d |
2f3dac78ca9a
kvm: prefault a floating point state before restoring it
|
panic: Sentry detected stuck tasks (9)
|
|
|
|
9 |
1369d |
1369d
|
14/26 |
1369d |
38c42bbf4ad2
Remove deadlock in raw.endpoint caused by recursive read locking
|
panic: Sentry detected stuck tasks (8)
|
C |
|
|
64 |
1370d |
1371d
|
14/26 |
1370d |
f5692f7dcc48
Kernfs should not try to rename a file to itself.
|
no output from test machine (8)
|
C |
|
|
15268 |
1370d |
1474d
|
14/26 |
1370d |
acd516cfe292
Add YAMA security module restrictions on ptrace(2).
|
panic: running on goroutine 582 (task goroutine for kernel.Task ADDR is 400)
|
C |
|
|
1 |
1375d |
1375d
|
14/26 |
1371d |
6e000d3424c0
Use async task context for async IO.
|
panic: unknown error *tcpip.ErrMalformedHeader
|
C |
|
|
5 |
1387d |
1380d
|
14/26 |
1371d |
c39284f45738
Let sentry understand tcpip.ErrMalformedHeader
|
panic: Sentry detected stuck tasks (7)
|
syz |
|
|
2567 |
1372d |
1403d
|
14/26 |
1372d |
c5a4e100085c
unix: sendmmsg and recvmsg have to cap a number of message to UIO_MAXIOV
|
panic: wd changed: "/tmp" -> "(unreachable)/"
|
syz |
|
|
2534 |
1383d |
1465d
|
14/26 |
1383d |
97a36d169698
Don't allow to umount the namespace root mount
|
Invalid request partialResult in sendto
|
C |
|
|
236 |
1392d |
1396d
|
14/26 |
1384d |
d6d169320cd4
Add ETIMEDOUT to partial result list
|
FATAL ERROR: executing processes for container: executing command "/syz-fuzzer -executor=/syz-executor -name=vm-1 -arch=
|
|
|
|
4 |
1391d |
1393d
|
14/26 |
1384d |
120c8e346871
Replace TaskFromContext(ctx).Kernel() with KernelFromContext(ctx)
|
panic: Incrementing non-positive count ADDR on kernel.ProcessGroup
|
C |
|
|
12 |
1401d |
1401d
|
14/26 |
1384d |
fe4f4789601d
kernel: reparentLocked has to update children maps of old and new parents
|
panic: Child "." for parent Dentry &{vfsd:{mu:{m:{Mutex:{state:LINE sema:LINE}}} dead:false mounts:LINE impl:ADDR} refs:
|
C |
|
|
13 |
1385d |
1395d
|
14/26 |
1384d |
09afd6832689
[vfs] Handle `.` and `..` as last path component names in kernfs Rename.
|
panic: Start ADDR + offset ADDR overflows?
|
C |
|
|
19 |
1410d |
1716d
|
14/26 |
1384d |
bf4968e17d7d
exec: don't panic if an elf file is malformed
|
panic: Decrementing non-positive ref count ADDR, owned by vfs.FileDescription
|
C |
|
|
12 |
1415d |
1410d
|
14/26 |
1399d |
abdff887483f
Do not send SCM Rights more than once when message is truncated.
|
DATA RACE in safemem.Copy
|
C |
|
|
4 |
1403d |
1403d
|
14/26 |
1400d |
76da673a0dda
Do not modify IGMP packets when verifying checksum
|
panic: Sentry detected stuck tasks (6)
|
syz |
|
|
714 |
1403d |
1455d
|
14/26 |
1403d |
e57ebcd37a7b
Simplify the pipe implementation.
|
panic: IPv6 payload too large: NUM, must be <= NUM
|
C |
|
|
46 |
1411d |
1444d
|
14/26 |
1409d |
ec9e263f213c
Correctly return EMSGSIZE when packet is too big in raw socket.
|
panic: buffer too long by 8 bytes
|
C |
|
|
12 |
1424d |
1441d
|
14/26 |
1420d |
ce7a4440cae8
Fix panic when parsing SO_TIMESTAMP cmsg
|
panic: runtime error: invalid memory address or nil pointer dereference (5)
|
syz |
|
|
62 |
1421d |
1465d
|
14/26 |
1420d |
2a200811d4c9
fs/fuse: check that a task has a specified file descriptor
|
panic: invalid pipe flags: must be readable, writable, or both
|
|
|
|
1 |
1429d |
1429d
|
14/26 |
1420d |
807a080d9574
Add missing error checks for FileDescription.Init.
|
DATA RACE in stack.(*NIC).DeliverNetworkPacket
|
|
|
|
4 |
1444d |
1452d
|
14/26 |
1427d |
25ebddbddfbc
Fix a data race in packetEPs
|
panic: runtime error: integer divide by zero
|
C |
|
|
116 |
1543d |
1570d
|
14/26 |
1427d |
b3ff31d041c9
fix panic when calling SO_ORIGINAL_DST without initializing iptables
|
panic: error when reading RouterAlert option's data bytes: EOF
|
C |
|
|
35 |
1442d |
1444d
|
14/26 |
1427d |
c55e5bda4d45
Validate router alert's data length
|
DATA RACE in raw.(*endpoint).HandlePacket
|
C |
|
|
5 |
1440d |
1440d
|
14/26 |
1427d |
981faa2c1229
RLock Endpoint in raw.Endpoint.HandlePacket
|
panic: header.ScopeForIPv6Address(172.20.20.170): bad address
|
C |
|
|
48 |
1448d |
1454d
|
14/26 |
1427d |
b15acae9a6e2
Fix error code for connect in raw sockets.
|
panic: close of nil channel (2)
|
|
|
|
1 |
1451d |
1450d
|
14/26 |
1427d |
f6407de6bafb
[syzkaller] Avoid AIOContext from resurrecting after being marked dead.
|
panic: Unknown syscall 165 error: strconv.ParseInt: parsing "ADDR": invalid syntax
|
C |
|
|
51 |
1449d |
1455d
|
14/26 |
1427d |
9c198e5df421
Fix error handling on fusefs mount.
|
DATA RACE in header.ICMPv6Checksum
|
C |
|
|
1 |
1441d |
1441d
|
14/26 |
1427d |
946cb909e62e
Don't modify a packet header when it can be used by other endpoints
|
panic: Unknown syscall 8 error: EOF
|
syz |
|
|
22 |
1438d |
1445d
|
14/26 |
1427d |
1ea241e4cc95
Fix seek on /proc/pid/cmdline when task is zombie.
|
panic: Stack for running G's are skipped while panicking.
|
C |
|
|
2426 |
1726d |
1980d
|
14/26 |
1429d |
ab7ecdd66d2a
watchdog: print panic error message before other messages
|
panic: Sentry detected stuck tasks (5)
|
syz |
|
|
83 |
1456d |
1469d
|
0/26 |
1456d |
79e2364933bb
Fix deadlock in UDP handleControlPacket path.
|
DATA RACE in log.GoogleEmitter.Emit
|
C |
|
|
34 |
1467d |
1473d
|
0/26 |
1466d |
9c553f2d4e4b
Remove racy stringification of socket fds from /proc/net/*.
|
panic: runtime error: slice bounds out of range [255:LINE]
|
C |
|
|
5 |
1470d |
1471d
|
0/26 |
1466d |
49adf36ed7d3
Fix possible panic due to bad data.
|
panic: cacheLocked called on a dentry which has already been destroyed: &{{{{0 0}} true 0 ADDR} -1 ADDR 1 ADDR NUM false
|
|
|
|
1 |
1471d |
1471d
|
0/26 |
1466d |
74bc6e56ccd9
[vfs] kernfs: Do not panic if destroyed dentry is cached.
|
gvisor boot error: FATAL ERROR: running container: creating container: open /sys/fs/cgroup/devices/ci-gvisor-kvm-proxy-overlay-sandbox-test
|
|
|
|
1 |
1468d |
1468d
|
0/26 |
1468d |
764504c38fb5
runsc: check whether cgroup exists or not for each controller
|
panic: Sentry detected stuck tasks (4)
|
C |
|
|
5 |
1469d |
1469d
|
0/26 |
1469d |
05d2a26f7a86
Fix possible deadlock in UDP.Write().
|
panic: Incrementing non-positive count ADDR on tmpfs.inode
|
syz |
|
|
2 |
1472d |
1472d
|
0/26 |
1469d |
10ba578c0182
tmpfs: make sure that a dentry will not be destroyed before the open() call
|
panic: Sentry detected stuck tasks (3)
|
C |
|
|
180 |
1470d |
1474d
|
0/26 |
1470d |
267560d159b2
Reset watchdog timer between sendfile() iterations.
|
panic: runtime error: invalid memory address or nil pointer dereference (4)
|
C |
|
|
4 |
1481d |
1499d
|
0/26 |
1474d |
4e389c785779
Check for nil in kernel.FSContext functions.
|
panic: Decrementing non-positive ref count ADDR, owned by *mm.SpecialMappable
|
|
|
|
56 |
1474d |
1504d
|
0/26 |
1474d |
dcc1b71f1ba4
Fix reference counting on kcov mappings.
|
panic: Sentry detected stuck tasks (2)
|
C |
|
|
951 |
1474d |
1514d
|
0/26 |
1474d |
db36d948fa63
TCP Receive window advertisement fixes.
|
no output from test machine (7)
|
C |
|
|
184 |
1474d |
1501d
|
0/26 |
1474d |
34a6e9576a96
loader/elf: validate file offset
|
panic: runtime error: makeslice: len out of range (2)
|
C |
|
|
5 |
1474d |
1501d
|
0/26 |
1474d |
cd108432a50e
splice: return EINVAL is len is negative
|
panic: Incrementing non-positive ref count ADDR owned by *mm.SpecialMappable
|
|
|
|
45 |
1476d |
1504d
|
0/26 |
1474d |
dcc1b71f1ba4
Fix reference counting on kcov mappings.
|
panic: Child "" for parent Dentry &{vfsd:{mu:{Mutex:{state:LINE sema:LINE}} dead:false mounts:LINE impl:ADDR} DentryRefs
|
C |
|
|
3 |
1479d |
1487d
|
0/26 |
1474d |
1321f837bd9f
[vfs2] Refactor kernfs checkCreateLocked.
|
panic: unknown error: EOF
|
C |
|
|
68 |
1502d |
1505d
|
0/26 |
1501d |
c002fc36f9bb
sockets: ignore io.EOF from view.ReadAt
|
no output from test machine (6)
|
syz |
|
|
1873 |
1508d |
1514d
|
0/26 |
1508d |
76a09f0cf599
syscalls: Don't leak a file on the error path
|
no output from test machine (5)
|
C |
|
|
86414 |
1515d |
1630d
|
0/26 |
1515d |
de85b045d42f
kvm/x86: handle a case when interrupts are enabled in the kernel space
|
panic: Sentry detected stuck tasks
|
C |
|
|
506 |
1515d |
1535d
|
0/26 |
1515d |
de85b045d42f
kvm/x86: handle a case when interrupts are enabled in the kernel space
|
DATA RACE in tcp.(*endpoint).bindLocked
|
syz |
|
|
2 |
1545d |
1545d
|
0/26 |
1538d |
38cdb0579b69
Fix data race in tcp.GetSockOpt.
|
panic: runtime error: invalid memory address or nil pointer dereference (3)
|
C |
|
|
20051 |
1547d |
2082d
|
0/26 |
1539d |
b3ff31d041c9
fix panic when calling SO_ORIGINAL_DST without initializing iptables
|
DATA RACE in transport.(*connectionedEndpoint).Connect.func1
|
syz |
|
|
21 |
1622d |
1628d
|
0/26 |
1621d |
70c45e09cfd1
socket/unix: (*connectionedEndpoint).State() has to take the endpoint lock
|
panic: Sentry detected 1 stuck task(s):
|
C |
|
|
6204 |
1632d |
1718d
|
0/26 |
1629d |
4950ccde75b3
Fix write hang bug found by syzkaller.
|
DATA RACE in atomic.LoadInt64
|
|
|
|
1 |
1637d |
1636d
|
0/26 |
1634d |
7da69fe9719b
Fix data race on f.offset.
|
DATA RACE in fs.(*File).offsetForAppend
|
syz |
|
|
2 |
1636d |
1636d
|
0/26 |
1634d |
7da69fe9719b
Fix data race on f.offset.
|
DATA RACE in kernel.(*Task).accountTaskGoroutineEnter
|
syz |
|
|
2 |
1660d |
1660d
|
0/26 |
1657d |
8dd1d5b75a95
Don't call kernel.Task.Block() from netstack.SocketOperations.Write().
|
panic: D0415 01:LINE.ADDR 8857 transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 95}
|
|
|
|
1 |
1686d |
1686d
|
0/26 |
1670d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: close of nil channel
|
syz |
|
|
6 |
1679d |
1683d
|
0/26 |
1676d |
37f863f62813
tcp: handle listen after shutdown properly
|
panic: D0414 08:LINE.ADDR NUM transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 2}
|
|
|
|
1 |
1687d |
1687d
|
0/26 |
1685d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: D0414 11:LINE.ADDR NUM transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 95}
|
|
|
|
1 |
1687d |
1687d
|
0/26 |
1685d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: D0414 14:LINE.ADDR NUM task_exit.go:LINE] [ 98] Transitioning from exit state TaskExitNone to TaskExitInitiate
|
|
|
|
1 |
1686d |
1686d
|
0/26 |
1685d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: D0414 16:LINE.ADDR 5236 transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 2}
|
|
|
|
1 |
1686d |
1686d
|
0/26 |
1685d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: D0414 13:LINE.ADDR NUM transport_flipcall.go:LINE] recv [channel @ADDR] Rlerror{Error: 2}
|
|
|
|
1 |
1687d |
1686d
|
0/26 |
1685d |
2dd6384de89a
Fix cleanup around socketpair() failure to copy out FDs.
|
panic: interface conversion: context.Context is kernel.taskAsyncContext, not *kernel.Task
|
syz |
|
|
16 |
1689d |
1704d
|
0/26 |
1689d |
c9195349c9ac
Replace type assertion with TaskFromContext.
|
panic: runtime error: makeslice: len out of range
|
syz |
|
|
49 |
1690d |
1713d
|
0/26 |
1690d |
a10389e783aa
splice: cap splice calls to MAX_RW_COUNT
|
DATA RACE in tcp.(*endpoint).Readiness
|
syz |
|
|
2 |
1711d |
1711d
|
0/26 |
1705d |
d04adebaab86
Fix data-race in endpoint.Readiness
|
DATA RACE in netstack.(*SocketOperations).SetSockOpt
|
syz |
|
|
2 |
1710d |
1710d
|
0/26 |
1708d |
369cf38bd718
Fix data race in SetSockOpt.
|
DATA RACE in tcp.(*endpoint).SetSockOpt
|
syz |
|
|
26 |
1713d |
1733d
|
0/26 |
1708d |
e9e399c25d4f
Remove workMu from tcpip.Endpoint.
|
DATA RACE in udp.(*endpoint).SetSockOptBool
|
syz |
|
|
2 |
1727d |
1719d
|
0/26 |
1711d |
c15b8515eb4a
Fix datarace on TransportEndpointInfo.ID and clean up semantics.
|
no output from test machine (3)
|
C |
|
|
11663 |
1714d |
1802d
|
0/26 |
1714d |
b55f0e5d40c1
fdtable: don't try to zap fdtable entry if close is called for non-existing fd
|
panic: Watchdog goroutine is stuck:
|
|
|
|
12 |
1715d |
1720d
|
0/26 |
1714d |
1c0535297067
Fix oom_score_adj.
|
panic: Sentry detected 4 stuck task(s):
|
|
|
|
7 |
1714d |
1725d
|
0/26 |
1714d |
b0f2c3e7646d
Fix infinite loop in semaphore.sem.wakeWaiters().
|
fatal error: out of memory (3)
|
syz |
|
|
3 |
1720d |
1720d
|
0/26 |
1719d |
81675b850e27
Fix memory leak in danglingEndpoints.
|
fatal error: too many address space collisions for -race mode
|
syz |
|
|
3 |
1720d |
1720d
|
0/26 |
1719d |
81675b850e27
Fix memory leak in danglingEndpoints.
|
fatal error: concurrent map iteration and map write (2)
|
syz |
|
|
1 |
1731d |
1731d
|
0/26 |
1721d |
62bd3ca8a375
Take write lock when removing xattr
|
DATA RACE in fsutil.(*InodeSimpleExtendedAttributes).ListXattr
|
|
|
|
1 |
1731d |
1731d
|
0/26 |
1721d |
62bd3ca8a375
Take write lock when removing xattr
|
lost connection to test machine (4)
|
|
|
|
1025286 |
1721d |
1894d
|
0/26 |
1721d |
6b4d36e32532
Hide /dev/net/tun when using hostinet.
|
DATA RACE in udp.(*endpoint).Connect
|
syz |
|
|
10 |
1727d |
1733d
|
0/26 |
1721d |
c15b8515eb4a
Fix datarace on TransportEndpointInfo.ID and clean up semantics.
|
DATA RACE in fsutil.(*InodeSimpleExtendedAttributes).RemoveXattr
|
syz |
|
|
2 |
1731d |
1731d
|
0/26 |
1721d |
62bd3ca8a375
Take write lock when removing xattr
|
DATA RACE in tcp.(*endpoint).windowCrossedACKThreshold
|
syz |
|
|
10 |
1733d |
1734d
|
0/26 |
1721d |
33101752501f
Fix data-race when reading/writing e.amss.
|
DATA RACE in stack.(*TransportEndpointInfo).AddrNetProto
|
syz |
|
|
148 |
1726d |
1734d
|
0/26 |
1721d |
c15b8515eb4a
Fix datarace on TransportEndpointInfo.ID and clean up semantics.
|
fatal error: concurrent map read and map write (2)
|
syz |
|
|
2 |
1731d |
1731d
|
0/26 |
1721d |
62bd3ca8a375
Take write lock when removing xattr
|
panic: runtime error: index out of range [1] with length 0
|
C |
|
|
1518 |
1726d |
1733d
|
0/26 |
1721d |
43abb24657e7
Fix panic caused by invalid address for Bind in packet sockets.
|
DATA RACE in netstack.(*SocketOperations).fetchReadView
|
syz |
|
|
12 |
1727d |
1733d
|
0/26 |
1721d |
42fb7d349137
socket: take readMu to access readView
|
DATA RACE in fsutil.(*InodeSimpleExtendedAttributes).GetXattr
|
syz |
|
|
3 |
1731d |
1731d
|
0/26 |
1721d |
62bd3ca8a375
Take write lock when removing xattr
|
DATA RACE in fs.(*UnstableAttr).SetOwner (2)
|
syz |
|
|
3 |
1767d |
1760d
|
0/26 |
1733d |
115898e368e4
Prevent DATA RACE in UnstableAttr.
|
DATA RACE in fs.mayDelete
|
|
|
|
1 |
1762d |
1755d
|
0/26 |
1733d |
fba479b3c786
Fix DATA RACE in fs.MayDelete.
|
DATA RACE in fs.(*Dirent).IncRef
|
syz |
|
|
1 |
1759d |
1752d
|
0/26 |
1733d |
53504e29ca27
Fix mount refcount issue.
|
panic: Incrementing non-positive ref count (4)
|
C |
|
|
5 |
1751d |
1753d
|
0/26 |
1733d |
53504e29ca27
Fix mount refcount issue.
|
panic: munmap(ADDR, NUM)) failed: function not implemented (3)
|
|
|
|
1 |
1804d |
1797d
|
0/26 |
1734d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: munmap(0, ADDR)) failed: function not implemented (3)
|
|
|
|
1 |
1789d |
1782d
|
0/26 |
1734d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: wait failed: the process NUM:NUM exited: 1f (err <nil>) (2)
|
|
|
|
17 |
1786d |
1809d
|
0/26 |
1734d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: wait failed: the process 9793:LINE exited: 1f (err <nil>)
|
C |
|
|
1 |
1804d |
1797d
|
0/26 |
1734d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: wait failed: the process 4877:LINE exited: 1f (err <nil>)
|
|
|
|
1 |
1804d |
1797d
|
0/26 |
1734d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
panic: runtime error: slice bounds out of range [:LINE] with capacity 16
|
syz |
|
|
42 |
1785d |
1796d
|
0/26 |
1734d |
b3ae8a62cfdf
Fix slice bounds out of range panic in parsing socket control message.
|
panic: wait failed: the process NUM:LINE exited: 1f (err <nil>) (4)
|
|
|
|
2 |
1797d |
1791d
|
0/26 |
1734d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
DATA RACE in refs.(*WeakRef).init (2)
|
|
|
|
1 |
1827d |
1820d
|
0/26 |
1754d |
3db317390b5c
Remove epoll entry from map when dropping it.
|
DATA RACE in refs.(*AtomicRefCount).DecRefWithDestructor
|
|
|
|
1 |
1774d |
1767d
|
0/26 |
1754d |
3db317390b5c
Remove epoll entry from map when dropping it.
|
panic: interface conversion: refs.RefCounter is *fs.File, not *fs.Dirent
|
|
|
|
3 |
1768d |
1778d
|
0/26 |
1754d |
3db317390b5c
Remove epoll entry from map when dropping it.
|
Invalid request partialResult in splice (2)
|
syz |
|
|
134 |
1763d |
1799d
|
0/26 |
1760d |
f263801a74d4
fs/splice: don't report partial errors for special files
|
fatal error: out of memory (2)
|
|
|
|
1 |
1776d |
1769d
|
0/26 |
1760d |
4cb55a7a3b09
Prevent arbitrary size allocation when sending UDS messages.
|
panic: invalid allocation length: 0x0 (3)
|
syz |
|
|
12 |
1764d |
1764d
|
0/26 |
1760d |
ede8dfab3760
Enforce splice offset limits
|
DATA RACE in fs.Rename (3)
|
|
|
|
1 |
1775d |
1775d
|
0/26 |
1773d |
f1a5178c589d
Fix data race in MountNamespace.resolve.
|
DATA RACE in tty.(*queue).readableSize
|
syz |
|
|
2 |
1775d |
1775d
|
0/26 |
1773d |
80d0f9304484
Fix data race in tty.queue.readableSize.
|
panic: Incrementing non-positive ref count (3)
|
|
|
|
2 |
1795d |
1805d
|
0/26 |
1784d |
6410387ff9b4
Cleanup Shm reference handling
|
panic: munmap(ADDR, 1000)) failed: function not implemented (3)
|
|
|
|
2 |
1821d |
1822d
|
0/26 |
1784d |
17c18241cdeb
platform/syscall: use syscall + int3 to execute a system call in a stub process
|
DATA RACE in fs.(*UnstableAttr).SetOwner
|
|
|
|
1 |
1804d |
1804d
|
0/26 |
1803d |
bb00438f36eb
Make masterInodeOperations.Truncate take a pointer receiver.
|
DATA RACE in fsutil.(*InodeSimpleAttributes).SetPermissions
|
syz |
|
|
3 |
1803d |
1803d
|
0/26 |
1803d |
bb00438f36eb
Make masterInodeOperations.Truncate take a pointer receiver.
|
no output from test machine (2)
|
C |
|
|
6325 |
1809d |
1926d
|
0/26 |
1809d |
378d6c1f3697
unix: allow to bind unix sockets only to AF_UNIX addresses
|
DATA RACE in fs.Rename (2)
|
C |
|
|
433 |
2060d |
2082d
|
0/26 |
1816d |
89cc8eef9ba6
DATA RACE in fs.(*Dirent).fullName
|
Invalid request partialResult in sendfile (2)
|
C |
|
|
1341 |
1882d |
2082d
|
0/26 |
1880d |
db218fdfcf16
Don't report partialResult errors from sendfile
|
Invalid request partialResult in splice
|
C |
|
|
206 |
1883d |
1932d
|
0/26 |
1883d |
7a234f736fe0
splice: try another fallback option only if the previous one isn't supported
|
lost connection to test machine (3)
|
C |
|
|
30758 |
1933d |
2082d
|
0/26 |
1930d |
af90e68623c7
netlink: return an error in nlmsgerr
|
panic: node.Readdir returned offset -ADDR less than input offset ADDR
|
C |
|
|
26 |
1999d |
2082d
|
0/26 |
1930d |
ab6774cebf5c
gvisor/fs: getdents returns 0 if offset is equal to FileMaxOffset
|
DATA RACE in ramfs.(*dirFileOperations).Readdir
|
syz |
|
|
1 |
2131d |
2082d
|
0/26 |
1931d |
09cf3b40a899
Fix data race in InodeSimpleAttributes.Unstable.
|
no output from test machine
|
C |
|
|
27191 |
1933d |
2082d
|
0/26 |
1933d |
af90e68623c7
netlink: return an error in nlmsgerr
|
DATA RACE in kernel.(*Kernel).EmitUnimplementedEvent
|
syz |
|
|
3 |
1944d |
1945d
|
0/26 |
1944d |
cf2b2d97d512
Initialize kernel.unimplementedSyscallEmitter with a sync.Once.
|
DATA RACE in atomic.AddInt32
|
|
|
|
1 |
1959d |
1959d
|
0/26 |
1957d |
542fbd01a7ed
Fix race in FDTable.GetFDs().
|
panic: Unknown syscall 85 error: link should be resolved via Readlink()
|
syz |
|
|
64 |
1967d |
1965d
|
0/26 |
1964d |
6db3f8d54c02
Don't mask errors in createAt loop.
|
panic: Unknown syscall 2 error: link should be resolved via Readlink()
|
syz |
|
|
16 |
1968d |
1964d
|
0/26 |
1964d |
6db3f8d54c02
Don't mask errors in createAt loop.
|
panic: Unknown syscall 257 error: link should be resolved via Readlink()
|
syz |
|
|
14 |
1967d |
1972d
|
0/26 |
1965d |
6db3f8d54c02
Don't mask errors in createAt loop.
|
panic: Incrementing non-positive ref count (2)
|
C |
|
|
183 |
1972d |
1979d
|
0/26 |
1971d |
4f2f44320f9b
Simplify (and fix) refcounts in createAt.
|
DATA RACE in atomic.AddInt64
|
|
|
|
1 |
2001d |
1994d
|
0/26 |
1977d |
8ab0848c70fc
gvisor/fs: don't update file.offset for sockets, pipes, etc
|
DATA RACE in fs.(*lockedReader).Read
|
|
|
|
1 |
1998d |
1991d
|
0/26 |
1979d |
8ab0848c70fc
gvisor/fs: don't update file.offset for sockets, pipes, etc
|
DATA RACE in atomic.StoreInt64
|
syz |
|
|
2 |
1987d |
1991d
|
0/26 |
1979d |
8ab0848c70fc
gvisor/fs: don't update file.offset for sockets, pipes, etc
|
DATA RACE in mm.(*MemoryManager).Brk
|
syz |
|
|
14 |
2020d |
2036d
|
0/26 |
2019d |
14f0e7618e28
Ensure all uses of MM.brk occur under MM.mappingMu in MM.Brk().
|
panic: hashed child "stat\t\xe9\xdc\xdf\x02\x02\x98\xcc\xf3<\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q\nI\xf81U\ro}\xe
|
C |
|
|
7 |
2062d |
2055d
|
0/26 |
2037d |
2df64cd6d2c8
createAt should return all errors from FindInode except ENOENT.
|
DATA RACE in fs.(*Dirent).fullName
|
|
|
|
3 |
2066d |
2082d
|
0/26 |
2055d |
89cc8eef9ba6
DATA RACE in fs.(*Dirent).fullName
|
panic: hashed over a positive child "file0"
|
|
|
|
1 |
2064d |
2064d
|
0/26 |
2062d |
61d8c361c663
Don't release d.mu in checks for child-existence.
|
DATA RACE in tty.(*lineDiscipline).masterReadiness
|
|
|
|
1 |
2064d |
2064d
|
0/26 |
2063d |
c79e81bd27cd
Addresses data race in tty implementation.
|
DATA RACE in tty.(*queue).WriteFromBlocks
|
syz |
|
|
7 |
2063d |
2067d
|
0/26 |
2063d |
c79e81bd27cd
Addresses data race in tty implementation.
|
panic: runtime error: index out of range (2)
|
C |
|
|
7191 |
2063d |
2068d
|
0/26 |
2063d |
82529becaee6
Fix index out of bounds in tty implementation.
|
DATA RACE in atomic.CompareAndSwapInt32 (2)
|
syz |
|
|
2 |
2065d |
2065d
|
0/26 |
2063d |
d14a7de65865
Fix more data races in shm debug messages.
|
DATA RACE in atomic.CompareAndSwapInt32
|
C |
|
|
9 |
2070d |
2082d
|
0/26 |
2066d |
cea1dd7d21b9
Remove racy access to shm fields.
|
DATA RACE in netlink.(*Socket).SetSockOpt
|
syz |
|
|
2 |
2082d |
2082d
|
0/26 |
2066d |
7b33df68450b
Fix data race in netlink send buffer size
|
DATA RACE in dev.(*randomDevice).GetFile
|
|
|
|
1 |
2071d |
2071d
|
0/26 |
2066d |
645af7cdd8a1
Dev device methods should take pointer receiver.
|
DATA RACE in fsutil.(*InodeSimpleAttributes).UnstableAttr
|
syz |
|
|
8 |
2131d |
2134d
|
0/26 |
2127d |
09cf3b40a899
Fix data race in InodeSimpleAttributes.Unstable.
|
panic: invalid allocation length: 0x0 (2)
|
C |
|
|
4 |
2169d |
2171d
|
0/26 |
2169d |
3b3f02627870
Truncate ar before calling mm.breakCopyOnWriteLocked().
|
gvisor boot error (3)
|
|
|
|
4 |
2174d |
2175d
|
0/26 |
2174d |
1775a0e11e56
container.Destroy should clean up container metadata even if other cleanups fail
|
DATA RACE in shm.(*Registry).findByKey
|
C |
|
|
47 |
2281d |
2347d
|
0/26 |
2175d |
f93c288dd708
Fix a data race on Shm.key.
|
gvisor test error (2)
|
|
|
|
2778 |
2191d |
2327d
|
0/26 |
2175d |
24c1158b9c21
Add "trace signal" option
|
panic: invalid type: int
|
C |
|
|
559 |
2195d |
2296d
|
0/26 |
2176d |
5560615c531b
Return an int32 for netlink SO_RCVBUF
|
panic: ptrace set regs failed: input/output error
|
C |
|
|
712 |
2181d |
2279d
|
0/26 |
2176d |
99d595869332
Validate FS_BASE in Task.Clone
|
Invalid request partialResult in sendfile
|
C |
|
|
7399 |
2181d |
2334d
|
0/26 |
2176d |
ffcbda0c8bd7
Partial writes should loop in rpcinet.
|
panic: Decrementing non-positive ref count
|
C |
|
|
4804 |
2271d |
2348d
|
0/26 |
2176d |
0e277a39c8b6
Prevent premature destruction of shm segments.
|
panic: ptrace status unexpected: got 9, wanted stopped (2)
|
syz |
|
|
78 |
2181d |
2334d
|
0/26 |
2176d |
e7191f058f55
Use TRAP to simplify vsyscall emulation.
|
panic: invalid allocation length: 0x0
|
C |
|
|
223 |
2181d |
2348d
|
0/26 |
2176d |
46603b569c3a
Fix panic on creation of zero-len shm segments.
|
DATA RACE in fs.(*Dirent).getDotAttrs
|
|
|
|
1 |
2289d |
2289d
|
0/26 |
2176d |
54dd0d0dc5ee
Fix data race caused by unlocked call of Dirent.descendantOf.
|
panic: runtime error: invalid memory address or nil pointer dereference (2)
|
C |
|
|
4493 |
2271d |
2291d
|
0/26 |
2233d |
beac59b37a8b
Fix panic if FIOASYNC callback is registered and triggered without target
|
gvisor boot error
|
|
|
|
1911 |
2252d |
2329d
|
0/26 |
2233d |
43e6aff50e23
Don't fail if Root is readonly and is not a mount point
|
DATA RACE in kernel.(*Task).setKUIDsUncheckedLocked
|
C |
|
|
15 |
2283d |
2341d
|
0/26 |
2233d |
f8ccfbbed487
Document more task-goroutine-owned fields in kernel.Task.
|
DATA RACE in fs.(*Dirent).hashChildParentSet
|
syz |
|
|
8 |
2286d |
2289d
|
0/26 |
2233d |
8d318aac5532
fs: Hold Dirent.mu when calling Dirent.flush().
|
DATA RACE in waiter.(*Entry).Prev
|
C |
|
|
3992 |
2295d |
2348d
|
0/26 |
2291d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
DATA RACE in waiter.(*Entry).Next
|
C |
|
|
2418 |
2295d |
2348d
|
0/26 |
2291d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
fatal error: concurrent map read and map write
|
|
|
|
66 |
2300d |
2303d
|
0/26 |
2291d |
dbbe9ec91541
Protect PCIDs with a mutex.
|
DATA RACE in waiter.(*Entry).SetNext
|
C |
|
|
739 |
2295d |
2348d
|
0/26 |
2291d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
fatal error: concurrent map writes
|
|
|
|
3 |
2301d |
2302d
|
0/26 |
2291d |
dbbe9ec91541
Protect PCIDs with a mutex.
|
panic: runtime error: index out of range
|
C |
|
|
35 |
2307d |
2344d
|
0/26 |
2291d |
e97717e29a1b
Enforce Unix socket address length limit
|
DATA RACE in waiter.(*Entry).SetPrev
|
|
|
|
70 |
2295d |
2348d
|
0/26 |
2291d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
DATA RACE in waiter.(*Queue).Notify
|
C |
|
|
72 |
2295d |
2348d
|
0/26 |
2291d |
d4939f6dc22e
TTY: Fix data race where calls into tty.queue's waiter were not synchronized.
|
DATA RACE in unix.(*connectionlessEndpoint).UnidirectionalConnect
|
C |
|
|
965 |
2301d |
2332d
|
0/26 |
2291d |
2a44362c0b99
Fix data race in unix.BoundEndpoint.UnidirectionalConnect.
|
panic: runtime error: invalid memory address or nil pointer dereference
|
C |
|
|
20682 |
2295d |
2348d
|
0/26 |
2291d |
f93bd2cbe668
Hold t.mu while calling t.FSContext().
|
DATA RACE in kernel.(*Task).exitNotifyLocked
|
C |
|
|
2 |
2320d |
2320d
|
0/26 |
2302d |
c036da5dffdf
Hold TaskSet.mu in Task.Parent.
|
panic: invalid segment range [ADDR, ADDR)
|
C |
|
|
255 |
2337d |
2348d
|
0/26 |
2323d |
06920b3d1bb6
Exit tmpfs.fileInodeOperations.Translate early if required.Start >= EOF.
|
DATA RACE in kernel.(*Task).Clone
|
|
|
|
3 |
2325d |
2338d
|
0/26 |
2323d |
41aeb680b188
Inherit parent in clone(CLONE_THREAD) under TaskSet.mu.
|
DATA RACE in fs.(*Watch).Notify
|
syz |
|
|
2 |
2338d |
2338d
|
0/26 |
2337d |
34af9a61741f
Fix data race on inotify.Watch.mask.
|
lost connection to test machine (2)
|
C |
|
|
1814 |
2337d |
2348d
|
0/26 |
2337d |
52ddb8571c46
Skip overlay on root when its readonly
|
DATA RACE in fs.Rename
|
C |
|
|
16 |
2337d |
2347d
|
0/26 |
2337d |
2821dfe6ce95
Hold d.parent.mu when reading d.name
|
panic: MountNamespace.FindInode: path is empty
|
C |
|
|
3443 |
2337d |
2348d
|
0/26 |
2337d |
062a6f6ec5f4
Handle NUL-only paths in exec
|
panic: runtime error: slice bounds out of range
|
C |
|
|
39 |
2341d |
2348d
|
0/26 |
2341d |
1ceed49ba94c
Check for invalid offset when submitting an AIO read/write request.
|
DATA RACE in proc.forEachMountSource
|
C |
|
|
24 |
2342d |
2348d
|
0/26 |
2341d |
f93bd2cbe668
Hold t.mu while calling t.FSContext().
|
DATA RACE in kernel.(*Task).Value
|
|
|
|
1 |
2345d |
2345d
|
0/26 |
2341d |
f93bd2cbe668
Hold t.mu while calling t.FSContext().
|
DATA RACE in semaphore.(*Set).checkPerms
|
C |
|
|
21 |
2343d |
2347d
|
0/26 |
2343d |
6b6852bceb12
Fix semaphore data races
|
DATA RACE in semaphore.(*Registry).RemoveID
|
C |
|
|
15 |
2343d |
2347d
|
0/26 |
2343d |
6b6852bceb12
Fix semaphore data races
|
DATA RACE in queue.(*Queue).Enqueue
|
C |
|
|
7 |
2345d |
2347d
|
0/26 |
2344d |
5f7f78c1d7ee
Fix data races in Unix sockets
|
DATA RACE in unix.(*queueReceiver).RecvQueuedSize
|
C |
|
|
5 |
2344d |
2347d
|
0/26 |
2344d |
5f7f78c1d7ee
Fix data races in Unix sockets
|
panic: munmap(ADDR, c6000)) failed: function not implemented
|
|
|
|
1 |
2347d |
2347d
|
0/26 |
2344d |
dc33d71f8cf1
Change SIGCHLD to SIGKILL in ptrace stubs.
|
DATA RACE in unix.(*streamQueueReceiver).RecvQueuedSize
|
C |
|
|
3 |
2345d |
2346d
|
0/26 |
2344d |
5f7f78c1d7ee
Fix data races in Unix sockets
|
DATA RACE in kernel.(*FSContext).SetWorkingDirectory
|
|
|
|
1 |
2348d |
2348d
|
0/26 |
2344d |
4ac79312b093
Don't read cwd or root without holding mu
|
DATA RACE in proc.(*mountInfoFile).ReadSeqFileData.func1
|
|
|
|
1 |
2347d |
2347d
|
0/26 |
2344d |
1a9917d14d66
MountSource.Root() should return a refernce on the dirent.
|
DATA RACE in kernel.(*FSContext).SetRootDirectory
|
C |
|
|
165 |
2345d |
2348d
|
0/26 |
2344d |
478f0ac0038a
Don't read FSContext.root without holding FSContext.mu
|
panic: munmap(ADDR, 0)) failed: invalid argument
|
C |
|
|
5 |
2348d |
2348d
|
0/26 |
2348d |
fe3fc44da3ca
Handle mremap(old_size=0).
|