general protection fault in add_wait_queue
kvm
net
virt
|
C |
done |
|
676 |
47d |
61d
|
25/28 |
never |
78dafe1cf3af
vsock: Orphan socket after transport release
|
WARNING in vmx_handle_exit (2)
kvm
|
C |
|
|
3 |
35d |
115d
|
24/28 |
never |
64c947a1cf35
KVM: VMX: Reject KVM_RUN if userspace forces emulation during nested VM-Enter
|
WARNING: kmalloc bug in memslot_rmap_alloc
kvm
|
C |
unreliable |
|
3 |
1278d |
1307d
|
1/28 |
never |
KVM: replace large kvmalloc allocation with vmalloc
|
WARNING: suspicious RCU usage in kvm_vcpu_gfn_to_memslot
kvm
|
C |
|
|
67 |
13d |
72d
|
24/28 |
never |
3617c0ee7dec
KVM: x86/xen: Only write Xen hypercall page for guest writes to MSR
|
possible deadlock in kvm_arch_pm_notifier
kvm
|
|
|
|
2 |
61d |
88d
|
24/28 |
never |
d9c5ed0a9b52
KVM: x86: Don't take kvm->lock when iterating over vCPUs in suspend notifier
|
KASAN: slab-use-after-free Read in kvm_put_kvm
kvm
|
|
|
|
1 |
165d |
165d
|
28/28 |
143d |
ae8f8b376102
KVM: arm64: Unregister redistributor for failed vCPU creation
|
general protection fault in is_page_fault_stale
kvm
|
|
|
|
3 |
232d |
257d
|
28/28 |
165d |
28cec7f08b8b
KVM: x86/mmu: Check that root is valid/loaded when pre-faulting SPTEs
|
WARNING in vmx_handle_exit
kvm
|
C |
error |
|
5 |
195d |
368d
|
28/28 |
165d |
3f6821aa147b
KVM: x86: Forcibly leave nested if RSM to L2 hits shutdown
|
WARNING in kvm_recalculate_apic_map
kvm
|
C |
done |
|
23 |
235d |
271d
|
28/28 |
183d |
4b7c3f6d04bd
KVM: x86: Make x2APIC ID 100% readonly
|
WARNING in __kvm_gpc_refresh (2)
kvm
|
C |
error |
|
2 |
298d |
312d
|
27/28 |
234d |
ebbdf37ce9ab
KVM: Validate hva in kvm_gpc_activate_hva() to fix __kvm_gpc_refresh() WARN
|
UBSAN: array-index-out-of-bounds in lock_timer_base
bcachefs
kvm
|
|
|
|
4 |
292d |
306d
|
26/28 |
269d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
WARNING: locking bug in srcu_gp_start_if_needed
kvm
bcachefs
|
|
|
|
2 |
296d |
298d
|
26/28 |
269d |
f770a6e9a3d7
bcachefs: Fix initialization order for srcu barrier
|
WARNING: locking bug in __timer_delete_sync
kvm
bcachefs
|
|
|
|
6 |
283d |
307d
|
26/28 |
269d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
KASAN: slab-use-after-free Read in vhost_task_fn
kvm
net
virt
|
C |
done |
|
2661 |
338d |
340d
|
25/28 |
304d |
db5247d9bf5c
vhost_task: Handle SIGKILL by flushing work and exiting
|
WARNING in mmu_free_root_page
kvm
|
C |
|
|
104 |
349d |
372d
|
25/28 |
317d |
1bc26cb90902
KVM: x86/mmu: Precisely invalidate MMU root_role during CPUID update
|
WARNING in clear_dirty_gfn_range
kvm
|
C |
|
|
3 |
367d |
388d
|
25/28 |
317d |
2673dfb591a3
KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
|
WARNING in __kvm_gpc_refresh
kvm
|
C |
|
|
178 |
318d |
382d
|
25/28 |
317d |
5c9ca4ed8908
KVM: Check validity of offset+length of gfn_to_pfn_cache prior to activation
|
KMSAN: uninit-value in em_ret_far
kvm
|
C |
|
|
37 |
386d |
451d
|
25/28 |
359d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
KMSAN: uninit-value in em_ret_near_imm
kvm
|
|
|
|
2 |
396d |
409d
|
25/28 |
359d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
KMSAN: uninit-value in em_ret
kvm
|
|
|
|
3 |
387d |
409d
|
25/28 |
359d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
WARNING in kvm_mmu_notifier_invalidate_range_start (3)
kvm
|
C |
inconclusive |
done |
44 |
444d |
505d
|
25/28 |
394d |
4cccb6221cae
fs/proc/task_mmu: move mmu notification mechanism inside mm lock
|
WARNING in kvm_mmu_notifier_change_pte
kvm
|
C |
inconclusive |
|
2 |
468d |
478d
|
25/28 |
430d |
4cccb6221cae
fs/proc/task_mmu: move mmu notification mechanism inside mm lock
|
WARNING in kvm_arch_vcpu_ioctl_run (5)
kvm
|
C |
error |
|
343 |
575d |
662d
|
23/28 |
541d |
26a0652cb453
KVM: x86: Disallow KVM_SET_SREGS{2} if incoming CR0 is invalid
|
general protection fault in vhost_work_queue
kvm
net
virt
|
|
|
|
1 |
681d |
676d
|
23/28 |
641d |
a284f09effea
vhost: Fix crash during early vhost_transport_send_pkt calls
|
KASAN: slab-use-after-free Read in kvm_tdp_mmu_invalidate_all_roots
kvm
|
|
|
|
3 |
713d |
712d
|
22/28 |
667d |
edbdb43fc96b
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
|
WARNING in kvm_tdp_mmu_invalidate_all_roots
kvm
|
|
|
|
1658 |
711d |
714d
|
22/28 |
667d |
edbdb43fc96b
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
|
WARNING in kvm_arch_vcpu_ioctl_run (4)
kvm
|
C |
error |
|
288 |
667d |
750d
|
22/28 |
667d |
0dc902267cb3
KVM: x86: Suppress pending MMIO write exits if emulator detects exception
|
KMSAN: uninit-value in kvm_irq_delivery_to_apic_fast
kvm
|
C |
|
|
20 |
978d |
1012d
|
22/28 |
771d |
8a414f943f8b
KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
|
WARNING in vcpu_enter_guest (2)
kvm
|
C |
|
|
42 |
883d |
892d
|
22/28 |
771d |
dea0d5a2fde6
KVM: x86: Exempt pending triple fault from event injection sanity check
|
BUG: unable to handle kernel paging request in vmx_handle_exit_irqoff
kvm
|
C |
error |
|
7736 |
863d |
884d
|
22/28 |
771d |
1cfaac2400c7
x86/kasan: Populate shadow for shared chunk of the CPU entry area
|
WARNING in vmx_queue_exception (2)
kvm
|
C |
|
|
5 |
1070d |
1069d
|
22/28 |
771d |
053d2290c030
KVM: VMX: Exit to userspace if vCPU has injected exception and invalid state
|
kernel BUG in vhost_get_vq_desc
kvm
net
virt
|
C |
inconclusive |
|
19 |
1135d |
1147d
|
22/28 |
771d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
BUG: unable to handle kernel paging request in kvm_arch_hardware_enable
kvm
|
C |
error |
|
28 |
959d |
963d
|
22/28 |
771d |
4ba4f4194274
KVM: Properly unwind VM creation if creating debugfs fails
|
WARNING: ODEBUG bug in kvm_xen_vcpu_set_attr
kvm
io-uring
|
C |
done |
|
4 |
978d |
1031d
|
22/28 |
771d |
af735db31285
KVM: x86/xen: Initialize Xen timer only once
c03689913635
KVM: x86/xen: Stop Xen timer before changing IRQ
|
INFO: task hung in vhost_work_dev_flush
kvm
net
virt
|
C |
error |
|
2 |
1150d |
1141d
|
22/28 |
771d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
WARNING in free_loaded_vmcs (3)
kvm
|
C |
inconclusive |
|
2 |
1167d |
1166d
|
22/28 |
771d |
f7e570780efc
KVM: x86: Forcibly leave nested virt when SMM state is toggled
|
WARNING in kvm_arch_vcpu_ioctl_run (3)
kvm
|
C |
done |
error |
16157 |
771d |
2565d
|
22/28 |
771d |
ec6e4d863258
KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks
|
WARNING in kvm_mmu_notifier_invalidate_range_start (2)
kvm
|
C |
done |
|
14 |
1097d |
1111d
|
22/28 |
771d |
01e67e04c281
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
|
memory leak in kvm_vcpu_ioctl_set_cpuid2
kvm
|
C |
|
|
1 |
1168d |
1164d
|
22/28 |
771d |
811f95ff9527
KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
|
WARNING in vhost_dev_cleanup (2)
kvm
net
virt
|
|
|
|
79 |
1135d |
1143d
|
22/28 |
771d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
memory leak in kvm_set_memslot
kvm
|
C |
|
|
1 |
1054d |
1054d
|
22/28 |
771d |
c87661f855c3
KVM: Free new dirty bitmap if creating a new memslot fails
|
general protection fault in kvm_arch_vcpu_ioctl
kvm
|
C |
inconclusive |
|
365 |
971d |
1009d
|
22/28 |
771d |
f83894b24c2a
KVM: x86: Fix handling of APIC LVT updates when userspace changes MCG_CAP
|
possible deadlock in scheduler_tick
kvm
|
C |
error |
|
99 |
1461d |
1473d
|
20/28 |
1115d |
a83829f56c7c
KVM: x86: disable interrupts while pvclock_gtod_sync_lock is taken
8228c77d8b56
KVM: x86: switch pvclock_gtod_sync_lock to a raw spinlock
|
general protection fault in rcu_segcblist_enqueue
kvm
|
C |
done |
done |
368 |
1306d |
1371d
|
20/28 |
1123d |
eb7511bf9182
KVM: x86: Handle SRCU initialization failure during page track init
|
WARNING in nested_vmx_vmexit
kvm
|
C |
done |
|
101 |
1200d |
1217d
|
20/28 |
1123d |
a80dfc025924
KVM: VMX: Always clear vmx->fail on emulation_required
|
kernel BUG in kvm_read_guest_offset_cached
kvm
|
|
|
|
11 |
1223d |
1229d
|
20/28 |
1123d |
8503fea6761d
KVM: VMX: do not use uninitialized gfn_to_hva_cache
|
WARNING in vmx_queue_exception
kvm
|
|
|
|
8 |
1134d |
1196d
|
20/28 |
1123d |
fc4fad79fc3d
KVM: VMX: Reject KVM_RUN if emulation is required with pending exception
|
WARNING in kvm_mmu_notifier_invalidate_range_start
kvm
|
C |
done |
|
19 |
1132d |
1193d
|
20/28 |
1123d |
d6aba4c8e20d
hugetlbfs: fix off-by-one error in hugetlb_vmdelete_list()
|
WARNING in kvm_mmu_uninit_tdp_mmu
kvm
|
|
|
|
3 |
1159d |
1242d
|
20/28 |
1123d |
3a0f64de479c
KVM: x86/mmu: Don't advance iterator after restart due to yielding
|
BUG: spinlock bad magic in synchronize_srcu
kvm
|
C |
done |
done |
3254 |
1285d |
1655d
|
20/28 |
1123d |
eb7511bf9182
KVM: x86: Handle SRCU initialization failure during page track init
|
KMSAN: uninit-value in kvm_cpuid
kvm
|
C |
|
|
22 |
1257d |
1282d
|
20/28 |
1123d |
e8a747d0884e
KVM: x86: Swap order of CPUID entry "index" vs. "significant flag" checks
|
upstream boot error: WARNING in kvm_wait
kvm
|
|
|
|
233 |
1477d |
1491d
|
20/28 |
1242d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
memory leak in kvm_dev_ioctl
kvm
|
C |
|
|
37 |
1360d |
1372d
|
20/28 |
1242d |
004d62eb4e57
kvm: debugfs: fix memory leak in kvm_create_vm_debugfs
|
WARNING in exception_type
kvm
|
C |
error |
|
1 |
1314d |
1314d
|
20/28 |
1242d |
e7177339d7b5
Revert "KVM: x86: mmu: Add guest physical address check in translate_gpa()"
|
usb-testing boot error: WARNING in kvm_wait
kvm
|
|
|
|
3 |
1485d |
1488d
|
20/28 |
1242d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
WARNING in kvm_wait
kvm
|
C |
error |
|
119882 |
1471d |
1488d
|
20/28 |
1242d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
bpf-next test error: WARNING in kvm_wait
kvm
|
|
|
|
1 |
1481d |
1481d
|
20/28 |
1242d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
WARNING in x86_emulate_instruction
kvm
|
C |
done |
|
4 |
1418d |
1414d
|
20/28 |
1242d |
da6393cdd8aa
KVM: X86: Fix warning caused by stale emulation context
|
net test error: WARNING in kvm_wait
kvm
|
|
|
|
1 |
1484d |
1484d
|
20/28 |
1242d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
linux-next boot error: WARNING in kvm_wait
kvm
|
|
|
|
9 |
1477d |
1487d
|
20/28 |
1242d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
upstream test error: WARNING in kvm_wait
kvm
|
|
|
|
2 |
1483d |
1485d
|
20/28 |
1242d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
general protection fault in gfn_to_rmap (2)
kvm
|
C |
done |
|
1 |
1397d |
1396d
|
20/28 |
1242d |
78fcb2c91adf
KVM: x86: Immediately reset the MMU context when the SMM flag is cleared
|
general protection fault in kvm_hv_irq_routing_update
kvm
|
C |
done |
|
33 |
1492d |
1499d
|
20/28 |
1456d |
919f4ebc5987
KVM: x86: hyper-v: Fix Hyper-V context null-ptr-deref
|
BUG: unable to handle kernel paging request in __kvm_mmu_prepare_zap_page
kvm
|
syz |
error |
|
2 |
2220d |
2231d
|
20/28 |
1477d |
47c42e6b4192
KVM: x86: fix handling of role.cr4_pae and rename it to 'gpte_size'
|
UBSAN: shift-out-of-bounds in intel_pmu_refresh
kvm
|
C |
unreliable |
|
1237 |
1528d |
1578d
|
19/28 |
1487d |
e61ab2a320c3
KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh()
|
UBSAN: shift-out-of-bounds in kvm_vcpu_after_set_cpuid
kvm
|
|
|
|
2 |
1570d |
1565d
|
19/28 |
1487d |
2f80d502d627
KVM: x86: fix shift out of bounds reported by UBSAN
|
WARNING in handle_exception_nmi
kvm
|
C |
error |
done |
2653 |
1642d |
1646d
|
15/28 |
1601d |
f8e48a3dca06
lockdep: Fix preemption WARN for spurious IRQ-enable
|
BUG: unable to handle kernel paging request in pvclock_gtod_notify
kvm
|
C |
done |
done |
8 |
1647d |
1666d
|
15/28 |
1601d |
a49145acfb97
fbmem: add margin check to fb_check_caps()
|
BUG: unable to handle kernel paging request in vmx_vcpu_run
kvm
|
C |
error |
error |
194 |
2436d |
2551d
|
15/28 |
1658d |
0447378a4a79
kvm: vmx: Nested VM-entry prereqs for event inj.
|
general protection fault in __apic_accept_irq (2)
kvm
|
C |
done |
|
9 |
1745d |
1741d
|
15/28 |
1708d |
9d3c447c72fb
KVM: X86: Fix async pf caused null-ptr-deref
|
WARNING in kvm_inject_emulated_page_fault
kvm
|
C |
done |
|
20 |
1746d |
1766d
|
15/28 |
1722d |
7a35e515a705
KVM: VMX: Properly handle kvm_read/write_guest_virt*() result
|
BUG: unable to handle kernel NULL pointer dereference in direct_page_fault
kvm
|
|
|
|
1 |
1752d |
1748d
|
15/28 |
1722d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: unable to handle kernel NULL pointer dereference in try_async_pf
kvm
|
|
|
|
1 |
1752d |
1748d
|
15/28 |
1722d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: unable to handle kernel NULL pointer dereference in kvm_vm_ioctl
kvm
|
|
|
|
1 |
1752d |
1752d
|
15/28 |
1722d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE! (2)
kvm
|
C |
done |
|
46328 |
1743d |
1774d
|
15/28 |
1722d |
7d2e8748af62
KVM: x86: Initialize tdp_level during vCPU creation
|
BUG: unable to handle kernel NULL pointer dereference in kvm_vcpu_gfn_to_memslot
kvm
|
|
|
|
1 |
1752d |
1752d
|
15/28 |
1722d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: soft lockup in wg_packet_tx_worker
kvm
|
|
|
|
1 |
1794d |
1794d
|
15/28 |
1722d |
df4953e4e997
sch_sfq: validate silly quantum values
|
KASAN: slab-out-of-bounds Read in __kvm_gfn_to_hva_cache_init
kvm
|
C |
done |
|
1537 |
1779d |
1823d
|
15/28 |
1752d |
b6467ab142b7
KVM: Check validity of resolved slot when searching memslots
|
BUG: unable to handle kernel NULL pointer dereference in handle_external_interrupt_irqoff
kvm
|
C |
done |
|
6404 |
1835d |
1840d
|
15/28 |
1791d |
428b8f1d9f92
KVM: VMX: don't allow memory operands for inline asm that modifies SP
|
WARNING in vcpu_enter_guest
kvm
|
syz |
done |
|
19 |
1840d |
1954d
|
15/28 |
1791d |
d33294541889
KVM: x86: remove bogus user-triggerable WARN_ON
|
kernel panic: stack is corrupted in vhost_net_ioctl
virt
kvm
net
|
C |
done |
|
2 |
1875d |
1962d
|
15/28 |
1815d |
42d84c8490f9
vhost: Check docket sk_family instead of call getname
|
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE!
kvm
|
C |
done |
|
6 |
1929d |
1936d
|
15/28 |
1873d |
005ba37cb89b
mm: thp: KVM: Explicitly check for THP when populating secondary MMU
|
KASAN: vmalloc-out-of-bounds Write in kvm_dev_ioctl_get_cpuid
kvm
|
C |
|
|
41 |
1948d |
1949d
|
15/28 |
1914d |
433f4ba19041
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
|
general protection fault in kvm_coalesced_mmio_init
kvm
|
syz |
done |
|
48 |
1970d |
1979d
|
14/28 |
1953d |
8a44119a98be
KVM: Fix NULL-ptr deref after kvm_create_vm fails
|
KASAN: use-after-free Read in __schedule (2)
kvm
|
C |
|
done |
961 |
2219d |
2438d
|
13/28 |
1962d |
26b471c7e2f7
KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
|
WARNING in handle_desc
kvm
|
C |
done |
|
6 |
2024d |
2032d
|
13/28 |
1998d |
3ca94192278c
KVM: X86: Fix userspace set invalid CR4
|
BUG: unable to handle kernel paging request in coalesced_mmio_write
kvm
|
C |
done |
|
10 |
2106d |
2110d
|
13/28 |
1998d |
b60fe990c6b0
KVM: coalesced_mmio: add bounds checking
|
WARNING in kvm_set_tsc_khz
kvm
|
C |
|
|
5 |
2432d |
2428d
|
12/28 |
2077d |
3f16a5c31839
KVM: x86: degrade WARN to pr_warn_ratelimited
|
general protection fault in vcpu_enter_guest (2)
kvm
|
C |
done |
|
11286 |
2166d |
2171d
|
12/28 |
2140d |
b904cb8dff82
KVM: lapic: Check for in-kernel LAPIC before deferencing apic pointer
|
INFO: task hung in vhost_net_stop_vq
kvm
net
virt
|
C |
done |
|
136 |
2180d |
2317d
|
12/28 |
2140d |
813dbeb656d6
vhost: reject zero size iova range
|
WARNING in free_loaded_vmcs (2)
kvm
|
syz |
done |
|
5 |
2404d |
2426d
|
11/28 |
2195d |
5bea5123cbf0
KVM: VMX: check nested state and CR4.VMXE against SMM
|
general protection fault in kvm_lapic_hv_timer_in_use
kvm
|
syz |
done |
|
205 |
2387d |
2429d
|
11/28 |
2195d |
26b471c7e2f7
KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
|
WARNING in enter_vmx_operation
kvm
|
syz |
done |
|
8 |
2398d |
2409d
|
11/28 |
2195d |
5bea5123cbf0
KVM: VMX: check nested state and CR4.VMXE against SMM
|
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page
kvm
|
C |
|
|
25 |
2313d |
2341d
|
11/28 |
2222d |
3a33d030daaa
kvm: x86/vmx: Use kzalloc for cached_vmcs12
|
KMSAN: uninit-value in kvm_clear_dirty_log_protect
kvm
|
|
|
|
6 |
2222d |
2267d
|
11/28 |
2222d |
98938aa8edd6
KVM: validate userspace input in kvm_clear_dirty_log_protect()
|
KASAN: slab-out-of-bounds Read in kvm_clear_dirty_log_protect
kvm
|
C |
|
|
54 |
2273d |
2285d
|
11/28 |
2222d |
98938aa8edd6
KVM: validate userspace input in kvm_clear_dirty_log_protect()
|
KMSAN: kernel-infoleak in vmx_get_nested_state
kvm
|
C |
|
|
6 |
2222d |
2334d
|
11/28 |
2222d |
3a33d030daaa
kvm: x86/vmx: Use kzalloc for cached_vmcs12
|
WARNING: refcount bug in kvm_vm_ioctl
kvm
|
syz |
|
|
13 |
2256d |
2369d
|
11/28 |
2222d |
cfa39381173d
kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
|
general protection fault in kvm_ioapic_scan_entry
kvm
|
C |
|
|
148 |
2316d |
2426d
|
11/28 |
2229d |
dcbd3e49c2f0
KVM: X86: Fix NULL deref in vcpu_scan_ioapic
|
general protection fault in kvm_arch_vcpu_ioctl_run
kvm
|
C |
|
|
12 |
2298d |
2314d
|
11/28 |
2276d |
dcbd3e49c2f0
KVM: X86: Fix NULL deref in vcpu_scan_ioapic
|
KASAN: use-after-free Read in kvm_put_kvm
kvm
|
C |
|
|
143 |
2298d |
2358d
|
11/28 |
2276d |
987d1149be7d
KVM: fix unregistering coalesced mmio zone from wrong bus
|
KASAN: use-after-free Read in vhost_transport_send_pkt
net
virt
kvm
|
syz |
|
|
36 |
2314d |
2440d
|
11/28 |
2300d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
KASAN: use-after-free Read in vhost_work_queue
kvm
net
virt
|
syz |
|
|
30 |
2312d |
2412d
|
11/28 |
2300d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
KASAN: use-after-free Read in vhost_transport_cancel_pkt
kvm
net
virt
|
syz |
|
|
17 |
2338d |
2383d
|
11/28 |
2300d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
KMSAN: kernel-infoleak in kvm_write_guest_page
kvm
|
C |
|
|
36 |
2313d |
2340d
|
11/28 |
2311d |
bcbfbd8ec210
KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
|
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl
kvm
|
C |
|
|
31 |
2316d |
2331d
|
11/28 |
2311d |
7f9ad1dfa3c7
KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
|
KASAN: use-after-free Read in iotlb_access_ok
kvm
net
virt
|
|
|
|
1 |
2437d |
2433d
|
8/28 |
2411d |
b13f9c636437
vhost: reset metadata cache when initializing new IOTLB
|
KASAN: use-after-free Write in irq_bypass_register_consumer
kvm
|
C |
|
|
1632 |
2452d |
2713d
|
8/28 |
2415d |
b5020a8e6b54
KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel.
|
KMSAN: uninit-value in _copy_to_iter (2)
kvm
net
virt
|
C |
|
|
226 |
2493d |
2538d
|
8/28 |
2461d |
670ae9caaca4
vhost: fix info leak due to uninitialized memory
|
general protection fault in __radix_tree_delete
kvm
|
C |
|
|
38 |
2506d |
2532d
|
5/28 |
2494d |
7a4deea1aa8b
idr: fix invalid ptr dereference on item delete
|
WARNING in __mutex_unlock_slowpath
kvm
|
C |
|
|
2 |
2530d |
2532d
|
5/28 |
2494d |
7a4deea1aa8b
idr: fix invalid ptr dereference on item delete
|
INFO: task hung in do_vfs_ioctl
kvm
|
|
|
|
2 |
2530d |
2547d
|
5/28 |
2515d |
8236b0ae31c8
bdi: wake up concurrent wb_shutdown() callers.
|
kernel BUG at drivers/vhost/vhost.c:LINE! (2)
kvm
net
virt
|
C |
|
|
139 |
2525d |
2555d
|
5/28 |
2523d |
d14d2b78090c
vhost: fix vhost_vq_access_ok() log check
|
KASAN: use-after-free Read in perf_trace_lock_acquire (2)
kvm
net
virt
|
C |
|
|
188 |
2619d |
2691d
|
5/28 |
2537d |
4cd879515d68
vhost_net: stop device during reset owner
|
possible deadlock in handle_rx
kvm
net
virt
|
C |
|
|
4 |
2567d |
2567d
|
5/28 |
2555d |
aaa3149bbee9
vhost_net: add missing lock nesting notation
|
kernel BUG at drivers/vhost/vhost.c:LINE!
kvm
net
virt
|
C |
|
|
152 |
2555d |
2574d
|
5/28 |
2555d |
d65026c6c62e
vhost: validate log when IOTLB is enabled
|
general protection fault in native_write_cr4
kvm
|
C |
|
|
132300 |
2558d |
2663d
|
5/28 |
2555d |
8eb3f87d9031
KVM: nVMX: fix guest CR4 loading when emulating L2 to L1 exit
|
BUG: corrupted list in remove_wait_queue
kvm
net
virt
|
C |
|
|
5 |
2569d |
2571d
|
5/28 |
2555d |
dc6455a71c7f
vhost: correctly remove wait queue during poll failure
|
WARNING in kvm_arch_vcpu_ioctl_run (2)
kvm
|
C |
|
|
61018 |
2623d |
2711d
|
4/28 |
2580d |
c37c28730bb0
KVM: VMX: Fix rflags cache during vCPU reset
|
WARNING in handle_ept_misconfig
kvm
|
C |
|
|
238 |
2595d |
2717d
|
4/28 |
2587d |
95e057e25892
KVM: X86: Fix SMRAM accessing even if VM is shutdown
|
kernel BUG at arch/x86/kvm/mmu.c:LINE!
kvm
|
C |
|
|
695 |
2594d |
2711d
|
4/28 |
2587d |
b28676bb8ae4
KVM: mmu: Fix overlap between public and private memslots
|
WARNING in __x86_set_memory_region
kvm
|
C |
|
|
716 |
2594d |
2713d
|
4/28 |
2587d |
103c763c72dd
KVM/x86: remove WARN_ON() for when vm_munmap() fails
|
KASAN: use-after-free Read in __schedule
kvm
|
C |
|
|
145 |
2661d |
2662d
|
4/28 |
2606d |
8dbfb2bf1bb3
KVM: x86: don't forget vcpu_put() in kvm_arch_vcpu_ioctl_set_sregs()
|
KASAN: use-after-free Read in __list_add_valid (3)
kvm
net
virt
|
|
|
|
16 |
2620d |
2627d
|
4/28 |
2617d |
4cd879515d68
vhost_net: stop device during reset owner
|
WARNING in vhost_dev_cleanup
net
virt
kvm
|
C |
|
|
4 |
2621d |
2627d
|
4/28 |
2620d |
4cd879515d68
vhost_net: stop device during reset owner
|
possible deadlock in vhost_chr_write_iter
kvm
net
virt
|
C |
|
|
25952 |
2627d |
2629d
|
4/28 |
2623d |
e9cb4239134c
vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
|
KASAN: stack-out-of-bounds Read in write_mmio
kvm
|
C |
|
|
3 |
2671d |
2682d
|
4/28 |
2625d |
e39d200fa5bf
KVM: Fix stack-out-of-bounds read in write_mmio
|
WARNING in free_loaded_vmcs
kvm
|
C |
|
|
170 |
2684d |
2692d
|
4/28 |
2627d |
b74558259c51
KVM: VMX: Fix vmx->nested freeing when no SMI handler
|
KASAN: double-free or invalid-free in kvm_arch_vcpu_uninit
kvm
|
|
|
|
1 |
2643d |
2639d
|
3/28 |
2637d |
d76c68109f37
crypto: pcrypt - fix freeing pcrypt instances
|
BUG: unable to handle kernel paging request in kvm_arch_vcpu_ioctl_run
kvm
|
|
|
|
1 |
2676d |
2672d
|
3/28 |
2649d |
7fb983b4dd56
x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
|