|
WARNING: kmalloc bug in memslot_rmap_alloc
kvm-x86
|
-1 |
C |
unreliable |
|
3 |
1614d |
1643d
|
1/29 |
never |
KVM: replace large kvmalloc allocation with vmalloc
|
|
WARNING in kvm_apic_accept_events (2)
kvm-x86
|
-1 |
C |
|
|
72 |
27d |
101d
|
26/29 |
never |
c4a365cd4a4e
KVM: x86: Drop WARN on INIT/SIPI being blocked when vCPU is in Wait-For-SIPI
|
|
WARNING in vcpu_run
kvm-x86
|
-1 |
C |
done |
|
43 |
52d |
497d
|
26/29 |
never |
ead63640d4e7
KVM: x86: Ignore -EBUSY when checking nested events from vcpu_block()
|
|
WARNING in kvm_arch_vcpu_ioctl_run (6)
kvm-x86
|
-1 |
C |
|
|
117 |
151d |
232d
|
29/29 |
128d |
e750f8539128
KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
|
|
WARNING in kvm_apic_accept_events
kvm-x86
|
-1 |
C |
error |
done |
27 |
176d |
274d
|
29/29 |
142d |
0fe3e8d804fd
KVM: x86: Move INIT_RECEIVED vs. INIT/SIPI blocked check to KVM_RUN
|
|
possible deadlock in kvm_arch_pm_notifier
kvm-x86
|
4 |
|
|
|
2 |
397d |
424d
|
28/29 |
269d |
d9c5ed0a9b52
KVM: x86: Don't take kvm->lock when iterating over vCPUs in suspend notifier
|
|
WARNING in vmx_handle_exit (2)
kvm-x86
|
-1 |
C |
|
|
3 |
370d |
450d
|
28/29 |
269d |
64c947a1cf35
KVM: VMX: Reject KVM_RUN if userspace forces emulation during nested VM-Enter
|
|
general protection fault in is_page_fault_stale
kvm-x86
|
2 |
|
|
|
3 |
568d |
592d
|
28/29 |
500d |
28cec7f08b8b
KVM: x86/mmu: Check that root is valid/loaded when pre-faulting SPTEs
|
|
WARNING in vmx_handle_exit
kvm-x86
|
-1 |
C |
error |
|
5 |
530d |
703d
|
28/29 |
500d |
3f6821aa147b
KVM: x86: Forcibly leave nested if RSM to L2 hits shutdown
|
|
WARNING in kvm_recalculate_apic_map
kvm-x86
|
-1 |
C |
done |
|
23 |
570d |
606d
|
28/29 |
519d |
4b7c3f6d04bd
KVM: x86: Make x2APIC ID 100% readonly
|
|
WARNING in mmu_free_root_page
kvm-x86
|
-1 |
C |
|
|
104 |
685d |
708d
|
25/29 |
653d |
1bc26cb90902
KVM: x86/mmu: Precisely invalidate MMU root_role during CPUID update
|
|
WARNING in clear_dirty_gfn_range
kvm-x86
|
-1 |
C |
|
|
3 |
702d |
724d
|
25/29 |
653d |
2673dfb591a3
KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
|
|
KMSAN: uninit-value in em_ret_far
kvm-x86
|
7 |
C |
|
|
37 |
721d |
787d
|
25/29 |
694d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
|
KMSAN: uninit-value in em_ret_near_imm
kvm-x86
|
7 |
|
|
|
2 |
732d |
745d
|
25/29 |
694d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
|
KMSAN: uninit-value in em_ret
kvm-x86
|
7 |
|
|
|
3 |
723d |
744d
|
25/29 |
694d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
|
WARNING in kvm_arch_vcpu_ioctl_run (5)
kvm-x86
|
-1 |
C |
error |
|
343 |
910d |
998d
|
23/29 |
876d |
26a0652cb453
KVM: x86: Disallow KVM_SET_SREGS{2} if incoming CR0 is invalid
|
|
KASAN: slab-use-after-free Read in kvm_tdp_mmu_invalidate_all_roots
kvm-x86
|
19 |
|
|
|
3 |
1049d |
1048d
|
22/29 |
1002d |
edbdb43fc96b
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
|
|
WARNING in kvm_tdp_mmu_invalidate_all_roots
kvm-x86
|
-1 |
|
|
|
1658 |
1047d |
1050d
|
22/29 |
1002d |
edbdb43fc96b
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
|
|
WARNING in kvm_arch_vcpu_ioctl_run (4)
kvm-x86
|
-1 |
C |
error |
|
288 |
1003d |
1086d
|
22/29 |
1002d |
0dc902267cb3
KVM: x86: Suppress pending MMIO write exits if emulator detects exception
|
|
KMSAN: uninit-value in kvm_irq_delivery_to_apic_fast
kvm-x86
|
7 |
C |
|
|
20 |
1314d |
1347d
|
22/29 |
1106d |
8a414f943f8b
KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
|
|
WARNING in vcpu_enter_guest (2)
kvm-x86
|
-1 |
C |
|
|
42 |
1219d |
1228d
|
22/29 |
1106d |
dea0d5a2fde6
KVM: x86: Exempt pending triple fault from event injection sanity check
|
|
BUG: unable to handle kernel paging request in vmx_handle_exit_irqoff
kvm-x86
|
8 |
C |
error |
|
7736 |
1198d |
1220d
|
22/29 |
1106d |
1cfaac2400c7
x86/kasan: Populate shadow for shared chunk of the CPU entry area
|
|
WARNING in vmx_queue_exception (2)
kvm-x86
|
-1 |
C |
|
|
5 |
1406d |
1404d
|
22/29 |
1106d |
053d2290c030
KVM: VMX: Exit to userspace if vCPU has injected exception and invalid state
|
|
BUG: unable to handle kernel paging request in kvm_arch_hardware_enable
kvm-x86
|
8 |
C |
error |
|
28 |
1295d |
1299d
|
22/29 |
1106d |
4ba4f4194274
KVM: Properly unwind VM creation if creating debugfs fails
|
|
WARNING: ODEBUG bug in kvm_xen_vcpu_set_attr
kvm
kvm-x86
io-uring
|
-1 |
C |
done |
|
4 |
1314d |
1367d
|
22/29 |
1106d |
af735db31285
KVM: x86/xen: Initialize Xen timer only once
c03689913635
KVM: x86/xen: Stop Xen timer before changing IRQ
|
|
WARNING in free_loaded_vmcs (3)
kvm-x86
|
-1 |
C |
inconclusive |
|
2 |
1503d |
1502d
|
22/29 |
1106d |
f7e570780efc
KVM: x86: Forcibly leave nested virt when SMM state is toggled
|
|
WARNING in kvm_arch_vcpu_ioctl_run (3)
kvm-x86
|
-1 |
C |
done |
error |
16157 |
1107d |
2901d
|
22/29 |
1106d |
ec6e4d863258
KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks
|
|
memory leak in kvm_vcpu_ioctl_set_cpuid2
kvm-x86
|
3 |
C |
|
|
1 |
1504d |
1500d
|
22/29 |
1106d |
811f95ff9527
KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
|
|
general protection fault in kvm_arch_vcpu_ioctl
kvm-x86
|
2 |
C |
inconclusive |
|
365 |
1307d |
1344d
|
22/29 |
1106d |
f83894b24c2a
KVM: x86: Fix handling of APIC LVT updates when userspace changes MCG_CAP
|
|
possible deadlock in scheduler_tick
kvm-x86
|
4 |
C |
error |
|
99 |
1797d |
1809d
|
20/29 |
1451d |
a83829f56c7c
KVM: x86: disable interrupts while pvclock_gtod_sync_lock is taken
8228c77d8b56
KVM: x86: switch pvclock_gtod_sync_lock to a raw spinlock
|
|
general protection fault in rcu_segcblist_enqueue
kvm-x86
|
2 |
C |
done |
done |
368 |
1642d |
1706d
|
20/29 |
1459d |
eb7511bf9182
KVM: x86: Handle SRCU initialization failure during page track init
|
|
WARNING in nested_vmx_vmexit
kvm-x86
|
-1 |
C |
done |
|
101 |
1535d |
1552d
|
20/29 |
1459d |
a80dfc025924
KVM: VMX: Always clear vmx->fail on emulation_required
|
|
WARNING in vmx_queue_exception
kvm-x86
|
-1 |
|
|
|
8 |
1470d |
1532d
|
20/29 |
1459d |
fc4fad79fc3d
KVM: VMX: Reject KVM_RUN if emulation is required with pending exception
|
|
WARNING in kvm_mmu_uninit_tdp_mmu
kvm-x86
|
-1 |
|
|
|
3 |
1495d |
1578d
|
20/29 |
1459d |
3a0f64de479c
KVM: x86/mmu: Don't advance iterator after restart due to yielding
|
|
BUG: spinlock bad magic in synchronize_srcu
kvm-x86
|
4 |
C |
done |
done |
3254 |
1621d |
1991d
|
20/29 |
1459d |
eb7511bf9182
KVM: x86: Handle SRCU initialization failure during page track init
|
|
KMSAN: uninit-value in kvm_cpuid
kvm-x86
|
7 |
C |
|
|
22 |
1593d |
1618d
|
20/29 |
1459d |
e8a747d0884e
KVM: x86: Swap order of CPUID entry "index" vs. "significant flag" checks
|
|
WARNING in exception_type
kvm-x86
|
-1 |
C |
error |
|
1 |
1650d |
1649d
|
20/29 |
1578d |
e7177339d7b5
Revert "KVM: x86: mmu: Add guest physical address check in translate_gpa()"
|
|
WARNING in x86_emulate_instruction
kvm-x86
|
-1 |
C |
done |
|
4 |
1754d |
1750d
|
20/29 |
1578d |
da6393cdd8aa
KVM: X86: Fix warning caused by stale emulation context
|
|
general protection fault in gfn_to_rmap (2)
kvm-x86
|
2 |
C |
done |
|
1 |
1733d |
1732d
|
20/29 |
1578d |
78fcb2c91adf
KVM: x86: Immediately reset the MMU context when the SMM flag is cleared
|
|
general protection fault in kvm_hv_irq_routing_update
kvm
kvm-x86
|
2 |
C |
done |
|
33 |
1828d |
1835d
|
20/29 |
1792d |
919f4ebc5987
KVM: x86: hyper-v: Fix Hyper-V context null-ptr-deref
|
|
BUG: unable to handle kernel paging request in __kvm_mmu_prepare_zap_page
kvm-x86
|
8 |
syz |
error |
|
2 |
2556d |
2566d
|
20/29 |
1813d |
47c42e6b4192
KVM: x86: fix handling of role.cr4_pae and rename it to 'gpte_size'
|
|
UBSAN: shift-out-of-bounds in intel_pmu_refresh
kvm-x86
|
-1 |
C |
unreliable |
|
1237 |
1864d |
1914d
|
19/29 |
1823d |
e61ab2a320c3
KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh()
|
|
UBSAN: shift-out-of-bounds in kvm_vcpu_after_set_cpuid
kvm-x86
|
-1 |
|
|
|
2 |
1906d |
1901d
|
19/29 |
1823d |
2f80d502d627
KVM: x86: fix shift out of bounds reported by UBSAN
|
|
WARNING in handle_exception_nmi
kvm-x86
|
-1 |
C |
error |
done |
2653 |
1977d |
1982d
|
15/29 |
1936d |
f8e48a3dca06
lockdep: Fix preemption WARN for spurious IRQ-enable
|
|
BUG: unable to handle kernel paging request in pvclock_gtod_notify
kvm-x86
|
8 |
C |
done |
done |
8 |
1982d |
2001d
|
15/29 |
1936d |
a49145acfb97
fbmem: add margin check to fb_check_caps()
|
|
BUG: unable to handle kernel paging request in vmx_vcpu_run
kvm-x86
|
8 |
C |
error |
error |
194 |
2772d |
2886d
|
15/29 |
1993d |
0447378a4a79
kvm: vmx: Nested VM-entry prereqs for event inj.
|
|
general protection fault in __apic_accept_irq (2)
kvm-x86
|
2 |
C |
done |
|
9 |
2080d |
2077d
|
15/29 |
2044d |
9d3c447c72fb
KVM: X86: Fix async pf caused null-ptr-deref
|
|
WARNING in kvm_inject_emulated_page_fault
kvm-x86
|
-1 |
C |
done |
|
20 |
2082d |
2102d
|
15/29 |
2058d |
7a35e515a705
KVM: VMX: Properly handle kvm_read/write_guest_virt*() result
|
|
BUG: unable to handle kernel NULL pointer dereference in direct_page_fault
kvm-x86
|
10 |
|
|
|
1 |
2088d |
2084d
|
15/29 |
2058d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
|
BUG: unable to handle kernel NULL pointer dereference in try_async_pf
kvm-x86
|
10 |
|
|
|
1 |
2088d |
2084d
|
15/29 |
2058d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
|
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE! (2)
kvm-x86
|
-1 |
C |
done |
|
46328 |
2079d |
2110d
|
15/29 |
2058d |
7d2e8748af62
KVM: x86: Initialize tdp_level during vCPU creation
|
|
BUG: unable to handle kernel NULL pointer dereference in handle_external_interrupt_irqoff
kvm-x86
|
10 |
C |
done |
|
6404 |
2171d |
2176d
|
15/29 |
2126d |
428b8f1d9f92
KVM: VMX: don't allow memory operands for inline asm that modifies SP
|
|
WARNING in vcpu_enter_guest
kvm-x86
|
-1 |
syz |
done |
|
19 |
2176d |
2290d
|
15/29 |
2126d |
d33294541889
KVM: x86: remove bogus user-triggerable WARN_ON
|
|
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE!
kvm-x86
|
-1 |
C |
done |
|
6 |
2265d |
2272d
|
15/29 |
2208d |
005ba37cb89b
mm: thp: KVM: Explicitly check for THP when populating secondary MMU
|
|
KASAN: vmalloc-out-of-bounds Write in kvm_dev_ioctl_get_cpuid
kvm-x86
|
21 |
C |
|
|
41 |
2284d |
2285d
|
15/29 |
2250d |
433f4ba19041
KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
|
|
KASAN: use-after-free Read in __schedule (2)
kvm-x86
|
19 |
C |
|
done |
961 |
2555d |
2773d
|
13/29 |
2298d |
26b471c7e2f7
KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
|
|
WARNING in handle_desc
kvm-x86
|
-1 |
C |
done |
|
6 |
2360d |
2368d
|
13/29 |
2334d |
3ca94192278c
KVM: X86: Fix userspace set invalid CR4
|
|
WARNING in kvm_set_tsc_khz
kvm-x86
|
-1 |
C |
|
|
5 |
2768d |
2764d
|
12/29 |
2412d |
3f16a5c31839
KVM: x86: degrade WARN to pr_warn_ratelimited
|
|
general protection fault in vcpu_enter_guest (2)
kvm-x86
|
2 |
C |
done |
|
11286 |
2501d |
2507d
|
12/29 |
2475d |
b904cb8dff82
KVM: lapic: Check for in-kernel LAPIC before deferencing apic pointer
|
|
WARNING in free_loaded_vmcs (2)
kvm-x86
|
-1 |
syz |
done |
|
5 |
2740d |
2761d
|
11/29 |
2530d |
5bea5123cbf0
KVM: VMX: check nested state and CR4.VMXE against SMM
|
|
general protection fault in kvm_lapic_hv_timer_in_use
kvm-x86
|
2 |
syz |
done |
|
205 |
2722d |
2765d
|
11/29 |
2530d |
26b471c7e2f7
KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
|
|
WARNING in enter_vmx_operation
kvm-x86
|
-1 |
syz |
done |
|
8 |
2733d |
2745d
|
11/29 |
2530d |
5bea5123cbf0
KVM: VMX: check nested state and CR4.VMXE against SMM
|
|
KMSAN: kernel-infoleak in vmx_get_nested_state
kvm-x86
|
9 |
C |
|
|
6 |
2558d |
2669d
|
11/29 |
2558d |
3a33d030daaa
kvm: x86/vmx: Use kzalloc for cached_vmcs12
|
|
general protection fault in kvm_ioapic_scan_entry
kvm-x86
|
2 |
C |
|
|
148 |
2652d |
2762d
|
11/29 |
2564d |
dcbd3e49c2f0
KVM: X86: Fix NULL deref in vcpu_scan_ioapic
|
|
general protection fault in kvm_arch_vcpu_ioctl_run
kvm-x86
|
2 |
C |
|
|
12 |
2634d |
2650d
|
11/29 |
2612d |
dcbd3e49c2f0
KVM: X86: Fix NULL deref in vcpu_scan_ioapic
|
|
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl
kvm-x86
|
9 |
C |
|
|
31 |
2652d |
2667d
|
11/29 |
2647d |
7f9ad1dfa3c7
KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
|
|
general protection fault in __radix_tree_delete
kvm
kvm-x86
|
2 |
C |
|
|
38 |
2842d |
2868d
|
5/29 |
2829d |
7a4deea1aa8b
idr: fix invalid ptr dereference on item delete
|
|
WARNING in __mutex_unlock_slowpath
kvm
kvm-x86
|
-1 |
C |
|
|
2 |
2866d |
2868d
|
5/29 |
2829d |
7a4deea1aa8b
idr: fix invalid ptr dereference on item delete
|
|
INFO: task hung in do_vfs_ioctl
kvm-x86
|
1 |
|
|
|
2 |
2866d |
2883d
|
5/29 |
2850d |
8236b0ae31c8
bdi: wake up concurrent wb_shutdown() callers.
|
|
general protection fault in native_write_cr4
kvm-x86
|
2 |
C |
|
|
132300 |
2894d |
2999d
|
5/29 |
2891d |
8eb3f87d9031
KVM: nVMX: fix guest CR4 loading when emulating L2 to L1 exit
|
|
WARNING in kvm_arch_vcpu_ioctl_run (2)
kvm-x86
|
-1 |
C |
|
|
61018 |
2958d |
3047d
|
4/29 |
2915d |
c37c28730bb0
KVM: VMX: Fix rflags cache during vCPU reset
|
|
kernel BUG at arch/x86/kvm/mmu.c:LINE!
kvm-x86
|
-1 |
C |
|
|
695 |
2930d |
3047d
|
4/29 |
2922d |
b28676bb8ae4
KVM: mmu: Fix overlap between public and private memslots
|
|
WARNING in __x86_set_memory_region
kvm-x86
|
-1 |
C |
|
|
716 |
2930d |
3048d
|
4/29 |
2922d |
103c763c72dd
KVM/x86: remove WARN_ON() for when vm_munmap() fails
|
|
WARNING in handle_ept_misconfig
kvm-x86
|
-1 |
C |
|
|
238 |
2930d |
3053d
|
4/29 |
2922d |
95e057e25892
KVM: X86: Fix SMRAM accessing even if VM is shutdown
|
|
KASAN: use-after-free Read in __schedule
kvm-x86
|
19 |
C |
|
|
145 |
2997d |
2998d
|
4/29 |
2942d |
8dbfb2bf1bb3
KVM: x86: don't forget vcpu_put() in kvm_arch_vcpu_ioctl_set_sregs()
|
|
KASAN: stack-out-of-bounds Read in write_mmio
kvm-x86
|
17 |
C |
|
|
3 |
3007d |
3017d
|
4/29 |
2960d |
e39d200fa5bf
KVM: Fix stack-out-of-bounds read in write_mmio
|
|
WARNING in free_loaded_vmcs
kvm-x86
|
-1 |
C |
|
|
170 |
3020d |
3027d
|
4/29 |
2963d |
b74558259c51
KVM: VMX: Fix vmx->nested freeing when no SMI handler
|
|
KASAN: double-free or invalid-free in kvm_arch_vcpu_uninit
kvm-x86
|
24 |
|
|
|
1 |
2978d |
2974d
|
3/29 |
2973d |
d76c68109f37
crypto: pcrypt - fix freeing pcrypt instances
|
|
BUG: unable to handle kernel paging request in kvm_arch_vcpu_ioctl_run
kvm-x86
|
8 |
|
|
|
1 |
3012d |
3008d
|
3/29 |
2985d |
7fb983b4dd56
x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
|