|
KASAN: slab-use-after-free Write in kvm_gmem_release
kvm
|
24 |
C |
done |
|
12 |
16d |
66d
|
28/29 |
never |
ae431059e75d
KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying
|
|
WARNING in virtio_transport_send_pkt_info
kvm
net
virt
|
-1 |
C |
|
|
145 |
121d |
139d
|
29/29 |
81d |
7fb1291257ea
vsock/virtio: Fix message iterator handling on transmit path
|
|
WARNING: suspicious RCU usage in kvm_vcpu_gfn_to_memslot
kvm
|
4 |
C |
|
|
67 |
281d |
339d
|
28/29 |
201d |
3617c0ee7dec
KVM: x86/xen: Only write Xen hypercall page for guest writes to MSR
|
|
general protection fault in add_wait_queue
net
virt
kvm
|
10 |
C |
done |
|
676 |
315d |
329d
|
28/29 |
201d |
78dafe1cf3af
vsock: Orphan socket after transport release
|
|
KASAN: slab-use-after-free Read in kvm_put_kvm
kvm
|
19 |
|
|
|
1 |
433d |
433d
|
28/29 |
411d |
ae8f8b376102
KVM: arm64: Unregister redistributor for failed vCPU creation
|
|
WARNING in __kvm_gpc_refresh (2)
kvm
|
-1 |
C |
error |
|
2 |
565d |
579d
|
27/29 |
502d |
ebbdf37ce9ab
KVM: Validate hva in kvm_gpc_activate_hva() to fix __kvm_gpc_refresh() WARN
|
|
UBSAN: array-index-out-of-bounds in lock_timer_base
bcachefs
kvm
|
15 |
|
|
|
4 |
560d |
574d
|
26/29 |
537d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
|
WARNING: locking bug in srcu_gp_start_if_needed
kvm
bcachefs
|
4 |
|
|
|
2 |
564d |
566d
|
26/29 |
537d |
f770a6e9a3d7
bcachefs: Fix initialization order for srcu barrier
|
|
WARNING: locking bug in __timer_delete_sync
bcachefs
kvm
|
4 |
|
|
|
6 |
551d |
575d
|
26/29 |
537d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
|
KASAN: slab-use-after-free Read in vhost_task_fn
kvm
net
virt
|
19 |
C |
done |
|
2661 |
606d |
608d
|
25/29 |
572d |
db5247d9bf5c
vhost_task: Handle SIGKILL by flushing work and exiting
|
|
WARNING in __kvm_gpc_refresh
kvm
|
-1 |
C |
|
|
178 |
586d |
650d
|
25/29 |
585d |
5c9ca4ed8908
KVM: Check validity of offset+length of gfn_to_pfn_cache prior to activation
|
|
WARNING in kvm_mmu_notifier_invalidate_range_start (3)
kvm
|
-1 |
C |
inconclusive |
done |
44 |
712d |
773d
|
25/29 |
662d |
4cccb6221cae
fs/proc/task_mmu: move mmu notification mechanism inside mm lock
|
|
WARNING in kvm_mmu_notifier_change_pte
kvm
|
-1 |
C |
inconclusive |
|
2 |
736d |
746d
|
25/29 |
698d |
4cccb6221cae
fs/proc/task_mmu: move mmu notification mechanism inside mm lock
|
|
KMSAN: uninit-value in virtio_transport_recv_pkt
virt
kvm
net
|
7 |
C |
|
|
20713 |
780d |
794d
|
25/29 |
739d |
34c4effacfc3
virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
|
|
general protection fault in vhost_work_queue
kvm
net
virt
|
2 |
|
|
|
1 |
949d |
944d
|
23/29 |
909d |
a284f09effea
vhost: Fix crash during early vhost_transport_send_pkt calls
|
|
kernel BUG in vhost_get_vq_desc
kvm
net
virt
|
-1 |
C |
inconclusive |
|
19 |
1403d |
1415d
|
22/29 |
1039d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
|
WARNING: ODEBUG bug in kvm_xen_vcpu_set_attr
kvm
kvm-x86
io-uring
|
-1 |
C |
done |
|
4 |
1246d |
1299d
|
22/29 |
1039d |
af735db31285
KVM: x86/xen: Initialize Xen timer only once
c03689913635
KVM: x86/xen: Stop Xen timer before changing IRQ
|
|
INFO: task hung in vhost_work_dev_flush
kvm
net
virt
|
1 |
C |
error |
|
2 |
1418d |
1409d
|
22/29 |
1039d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
|
WARNING in kvm_mmu_notifier_invalidate_range_start (2)
kvm
|
-1 |
C |
done |
|
14 |
1365d |
1379d
|
22/29 |
1039d |
01e67e04c281
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
|
|
WARNING in vhost_dev_cleanup (2)
kvm
net
virt
|
-1 |
|
|
|
79 |
1403d |
1411d
|
22/29 |
1039d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
|
memory leak in kvm_set_memslot
kvm
|
3 |
C |
|
|
1 |
1322d |
1322d
|
22/29 |
1039d |
c87661f855c3
KVM: Free new dirty bitmap if creating a new memslot fails
|
|
kernel BUG in kvm_read_guest_offset_cached
kvm
|
-1 |
|
|
|
11 |
1491d |
1497d
|
20/29 |
1391d |
8503fea6761d
KVM: VMX: do not use uninitialized gfn_to_hva_cache
|
|
WARNING in kvm_mmu_notifier_invalidate_range_start
kvm
|
-1 |
C |
done |
|
19 |
1400d |
1461d
|
20/29 |
1391d |
d6aba4c8e20d
hugetlbfs: fix off-by-one error in hugetlb_vmdelete_list()
|
|
upstream boot error: WARNING in kvm_wait
kvm
|
-1 |
|
|
|
233 |
1745d |
1759d
|
20/29 |
1510d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
|
memory leak in kvm_dev_ioctl
kvm
|
3 |
C |
|
|
37 |
1628d |
1640d
|
20/29 |
1510d |
004d62eb4e57
kvm: debugfs: fix memory leak in kvm_create_vm_debugfs
|
|
usb-testing boot error: WARNING in kvm_wait
kvm
|
-1 |
|
|
|
3 |
1753d |
1756d
|
20/29 |
1510d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
|
WARNING in kvm_wait
kvm
|
-1 |
C |
error |
|
119882 |
1739d |
1756d
|
20/29 |
1510d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
|
bpf-next test error: WARNING in kvm_wait
kvm
|
-1 |
|
|
|
1 |
1749d |
1749d
|
20/29 |
1510d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
|
memory leak in virtio_transport_send_pkt_info
virt
kvm
net
|
3 |
C |
|
|
2 |
1721d |
1784d
|
20/29 |
1510d |
8432b8114957
vsock/virtio: free queued packets when closing socket
|
|
net test error: WARNING in kvm_wait
kvm
|
-1 |
|
|
|
1 |
1752d |
1752d
|
20/29 |
1510d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
|
linux-next boot error: WARNING in kvm_wait
kvm
|
-1 |
|
|
|
9 |
1745d |
1755d
|
20/29 |
1510d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
|
upstream test error: WARNING in kvm_wait
kvm
|
-1 |
|
|
|
2 |
1751d |
1753d
|
20/29 |
1510d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
|
general protection fault in kvm_hv_irq_routing_update
kvm
kvm-x86
|
2 |
C |
done |
|
33 |
1760d |
1767d
|
20/29 |
1724d |
919f4ebc5987
KVM: x86: hyper-v: Fix Hyper-V context null-ptr-deref
|
|
BUG: unable to handle kernel NULL pointer dereference in kvm_vm_ioctl
kvm
|
10 |
|
|
|
1 |
2020d |
2020d
|
15/29 |
1990d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
|
BUG: unable to handle kernel NULL pointer dereference in kvm_vcpu_gfn_to_memslot
kvm
|
10 |
|
|
|
1 |
2020d |
2020d
|
15/29 |
1990d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
|
BUG: soft lockup in wg_packet_tx_worker
kvm
|
1 |
|
|
|
1 |
2062d |
2062d
|
15/29 |
1990d |
df4953e4e997
sch_sfq: validate silly quantum values
|
|
KASAN: slab-out-of-bounds Read in __kvm_gfn_to_hva_cache_init
kvm
|
17 |
C |
done |
|
1537 |
2047d |
2091d
|
15/29 |
2020d |
b6467ab142b7
KVM: Check validity of resolved slot when searching memslots
|
|
kernel panic: stack is corrupted in vhost_net_ioctl
kvm
net
virt
|
2 |
C |
done |
|
2 |
2143d |
2230d
|
15/29 |
2083d |
42d84c8490f9
vhost: Check docket sk_family instead of call getname
|
|
INFO: task hung in lock_sock_nested (2)
virt
kvm
net
|
1 |
C |
done |
|
418 |
2123d |
2136d
|
15/29 |
2083d |
3f74957fcbea
vsock: fix potential deadlock in transport->release()
|
|
general protection fault in virtio_transport_release
net
virt
kvm
|
2 |
C |
done |
|
7 |
2230d |
2232d
|
15/29 |
2208d |
039fcccaed33
vsock: avoid to assign transport if its initialization fails
|
|
general protection fault in kvm_coalesced_mmio_init
kvm
|
2 |
syz |
done |
|
48 |
2238d |
2247d
|
14/29 |
2221d |
8a44119a98be
KVM: Fix NULL-ptr deref after kvm_create_vm fails
|
|
BUG: unable to handle kernel paging request in coalesced_mmio_write
kvm
|
8 |
C |
done |
|
10 |
2374d |
2378d
|
13/29 |
2266d |
b60fe990c6b0
KVM: coalesced_mmio: add bounds checking
|
|
INFO: task hung in vhost_net_stop_vq
virt
kvm
net
|
1 |
C |
done |
|
136 |
2448d |
2585d
|
12/29 |
2408d |
813dbeb656d6
vhost: reject zero size iova range
|
|
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page
kvm
|
9 |
C |
|
|
25 |
2581d |
2609d
|
11/29 |
2490d |
3a33d030daaa
kvm: x86/vmx: Use kzalloc for cached_vmcs12
|
|
KMSAN: uninit-value in kvm_clear_dirty_log_protect
kvm
|
7 |
|
|
|
6 |
2490d |
2535d
|
11/29 |
2490d |
98938aa8edd6
KVM: validate userspace input in kvm_clear_dirty_log_protect()
|
|
KASAN: slab-out-of-bounds Read in kvm_clear_dirty_log_protect
kvm
|
17 |
C |
|
|
54 |
2541d |
2553d
|
11/29 |
2490d |
98938aa8edd6
KVM: validate userspace input in kvm_clear_dirty_log_protect()
|
|
WARNING: refcount bug in kvm_vm_ioctl
kvm
|
13 |
syz |
|
|
13 |
2524d |
2637d
|
11/29 |
2490d |
cfa39381173d
kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
|
|
KASAN: use-after-free Read in kvm_put_kvm
kvm
|
19 |
C |
|
|
143 |
2566d |
2626d
|
11/29 |
2544d |
987d1149be7d
KVM: fix unregistering coalesced mmio zone from wrong bus
|
|
KASAN: use-after-free Read in vhost_transport_send_pkt
kvm
net
virt
|
19 |
syz |
|
|
36 |
2582d |
2708d
|
11/29 |
2568d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KASAN: use-after-free Read in vhost_work_queue
kvm
net
virt
|
19 |
syz |
|
|
30 |
2580d |
2679d
|
11/29 |
2568d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KASAN: use-after-free Read in vhost_transport_cancel_pkt
net
virt
kvm
|
19 |
syz |
|
|
17 |
2606d |
2651d
|
11/29 |
2568d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KMSAN: kernel-infoleak in kvm_write_guest_page
kvm
|
9 |
C |
|
|
36 |
2581d |
2608d
|
11/29 |
2579d |
bcbfbd8ec210
KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
|
|
KASAN: use-after-free Read in iotlb_access_ok
virt
kvm
net
|
19 |
|
|
|
1 |
2705d |
2701d
|
8/29 |
2679d |
b13f9c636437
vhost: reset metadata cache when initializing new IOTLB
|
|
KASAN: use-after-free Write in irq_bypass_register_consumer
kvm
|
24 |
C |
|
|
1632 |
2720d |
2981d
|
8/29 |
2683d |
b5020a8e6b54
KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel.
|
|
KMSAN: uninit-value in _copy_to_iter (2)
net
virt
kvm
|
7 |
C |
|
|
226 |
2761d |
2806d
|
8/29 |
2729d |
670ae9caaca4
vhost: fix info leak due to uninitialized memory
|
|
WARNING in __mutex_unlock_slowpath
kvm
kvm-x86
|
-1 |
C |
|
|
2 |
2798d |
2800d
|
5/29 |
2762d |
7a4deea1aa8b
idr: fix invalid ptr dereference on item delete
|
|
general protection fault in __radix_tree_delete
kvm
kvm-x86
|
2 |
C |
|
|
38 |
2774d |
2800d
|
5/29 |
2762d |
7a4deea1aa8b
idr: fix invalid ptr dereference on item delete
|
|
kernel BUG at drivers/vhost/vhost.c:LINE! (2)
virt
kvm
net
|
-1 |
C |
|
|
139 |
2793d |
2823d
|
5/29 |
2791d |
d14d2b78090c
vhost: fix vhost_vq_access_ok() log check
|
|
KASAN: use-after-free Read in perf_trace_lock_acquire (2)
kvm
net
virt
|
19 |
C |
|
|
188 |
2887d |
2959d
|
5/29 |
2805d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
BUG: corrupted list in remove_wait_queue
kvm
net
virt
|
8 |
C |
|
|
5 |
2837d |
2839d
|
5/29 |
2823d |
dc6455a71c7f
vhost: correctly remove wait queue during poll failure
|
|
kernel BUG at drivers/vhost/vhost.c:LINE!
virt
kvm
net
|
-1 |
C |
|
|
152 |
2823d |
2842d
|
5/29 |
2823d |
d65026c6c62e
vhost: validate log when IOTLB is enabled
|
|
possible deadlock in handle_rx
virt
kvm
net
|
4 |
C |
|
|
4 |
2835d |
2835d
|
5/29 |
2823d |
aaa3149bbee9
vhost_net: add missing lock nesting notation
|
|
KASAN: use-after-free Read in __list_add_valid (3)
virt
kvm
net
|
19 |
|
|
|
16 |
2888d |
2895d
|
4/29 |
2885d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
WARNING in vhost_dev_cleanup
net
virt
kvm
|
-1 |
C |
|
|
4 |
2889d |
2895d
|
4/29 |
2888d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
possible deadlock in vhost_chr_write_iter
kvm
net
virt
|
4 |
C |
|
|
25952 |
2895d |
2897d
|
4/29 |
2891d |
e9cb4239134c
vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
|