syzbot


Applied filters: Label=subsystems:virt (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
general protection fault in add_wait_queue kvm net virt C done 676 120d 133d 28/28 6d04h 78dafe1cf3af vsock: Orphan socket after transport release
KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed (9) virt 1 104d 103d 28/28 6d04h 2e2f925fe737 virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
general protection fault in vsock_stream_has_data net virt C done done 6 156d 153d 28/28 40d df137da9d6d1 vsock/virtio: cancel close work in the destructor
general protection fault in vsock_connectible_has_data net virt C done 7 160d 158d 28/28 41d f6abafcd32f9 vsock/bpf: return early if transport is not assigned
KCSAN: data-race in virtqueue_disable_cb / vring_interrupt (4) virt 1 277d 277d 28/28 215d 83c334ed5216 virtio_ring: tag event_triggered as racy for KCSAN
linux-next test error: WARNING in rcu_core net virt 16 310d 318d 28/28 237d b8c8ba73c68b slub: Introduce CONFIG_SLUB_RCU_DEBUG
BUG: stack guard page was hit in vsock_bpf_recvmsg net virt C done 6 310d 311d 28/28 256d 69139d2919dd vsock: fix recursive ->recvmsg calls
upstream test error: KMSAN: uninit-value in receive_buf net virt 351 332d 387d 27/28 306d 840b2d39a2dc virtio_ring: fix KMSAN error for premapped mode
KMSAN: uninit-value in vsock_assign_transport (2) net virt C 14 368d 423d 27/28 306d 1e1fdcbdde3b vhost/vsock: always initialize seqpacket_allow
KASAN: slab-use-after-free Read in vhost_task_fn kvm net virt C done 2661 410d 412d 25/28 376d db5247d9bf5c vhost_task: Handle SIGKILL by flushing work and exiting
net-next boot error: WARNING: refcount bug in __free_pages_ok virt 799 416d 451d 25/28 389d f5c12105c15f mm,page_owner: fix refcount imbalance
linux-next boot error: WARNING: refcount bug in __free_pages_ok virt 177 446d 483d 25/28 389d f5c12105c15f mm,page_owner: fix refcount imbalance
net boot error: WARNING: refcount bug in __free_pages_ok virt 297 417d 446d 25/28 389d f5c12105c15f mm,page_owner: fix refcount imbalance
upstream boot error: WARNING: refcount bug in __free_pages_ok virt 1463 423d 454d 25/28 389d f5c12105c15f mm,page_owner: fix refcount imbalance
bpf-next boot error: WARNING: refcount bug in __free_pages_ok virt 210 413d 442d 25/28 389d f5c12105c15f mm,page_owner: fix refcount imbalance
bpf boot error: WARNING: refcount bug in __free_pages_ok virt 132 415d 443d 25/28 389d f5c12105c15f mm,page_owner: fix refcount imbalance
KCSAN: data-race in virtnet_poll / virtnet_stats (2) net virt 1 632d 630d 25/28 518d 61217d8f6360 virtio_net: use u64_stats_t infra to avoid data-races
general protection fault in vhost_work_queue kvm net virt 1 753d 748d 23/28 713d a284f09effea vhost: Fix crash during early vhost_transport_send_pkt calls
riscv/fixes test error: BUG: soft lockup in corrupted (2) net virt 4 978d 1055d 22/28 739d 61fc1ee8be26 riscv: Bump COMMAND_LINE_SIZE value to 1024
kernel BUG in vhost_get_vq_desc kvm net virt C inconclusive 19 1207d 1219d 22/28 843d a58da53ffd70 vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
INFO: task hung in vhost_work_dev_flush kvm net virt C error 2 1223d 1213d 22/28 843d e2ae38cf3d91 vhost: fix hung thread due to erroneous iotlb entries
WARNING in vhost_dev_cleanup (2) kvm net virt 79 1207d 1215d 22/28 843d a58da53ffd70 vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
general protection fault in virtio_gpu_array_put_free dri virt 4 1253d 1290d 22/28 843d 6b79f96f4a23 drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
usb-testing boot error: WARNING in __netif_set_xps_queue net virt 57 961d 973d 22/28 843d fc8695eb11f0 Revert "net: fix cpu_max_bits_warn() usage in netif_attrmask_next{,_and}"
KASAN: out-of-bounds Write in virtio_gpu_cmd_set_scanout dri virt 1 1321d 1321d 20/28 1196d 5bd4f20de8ac virtio-gpu: fix possible memory allocation failure
linux-next boot error: KASAN: use-after-free Read in page_to_skb net virt 7 1517d 1519d 20/28 1314d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
linux-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb net virt 5 1517d 1518d 20/28 1314d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
net-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb net virt 15 1517d 1521d 20/28 1314d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
net-next boot error: KASAN: use-after-free Read in page_to_skb net virt 11 1517d 1521d 20/28 1314d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
general protection fault in vsock_poll net virt syz done 15 1778d 1790d 15/28 1733d 1980c0584483 vsock: fix potential null pointer dereference in vsock_poll()
upstream boot error: KASAN: slab-out-of-bounds Write in virtio_gpu_object_create dri virt 6 1888d 1897d 15/28 1814d b513b0d4563a drm/virtio: fix OOB in virtio_gpu_object_create
kernel panic: stack is corrupted in vhost_net_ioctl virt kvm net C done 2 1948d 2034d 15/28 1888d 42d84c8490f9 vhost: Check docket sk_family instead of call getname
INFO: task hung in vhost_net_stop_vq kvm net virt C done 136 2252d 2389d 12/28 2212d 813dbeb656d6 vhost: reject zero size iova range
KASAN: use-after-free Read in vhost_transport_send_pkt net virt kvm syz 36 2386d 2513d 11/28 2372d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_work_queue kvm net virt syz 30 2384d 2484d 11/28 2372d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_transport_cancel_pkt kvm net virt syz 17 2411d 2455d 11/28 2372d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in iotlb_access_ok kvm net virt 1 2509d 2505d 8/28 2484d b13f9c636437 vhost: reset metadata cache when initializing new IOTLB
WARNING: ODEBUG bug in vsock_stream_connect net virt C 42 2504d 2513d 8/28 2484d 455f05ecd2b2 vsock: split dwork to avoid reinitializations
KMSAN: uninit-value in _copy_to_iter (2) kvm net virt C 226 2565d 2611d 8/28 2534d 670ae9caaca4 vhost: fix info leak due to uninitialized memory
kernel BUG at drivers/vhost/vhost.c:LINE! (2) kvm net virt C 139 2597d 2628d 5/28 2596d d14d2b78090c vhost: fix vhost_vq_access_ok() log check
KASAN: use-after-free Read in perf_trace_lock_acquire (2) kvm net virt C 188 2691d 2763d 5/28 2609d 4cd879515d68 vhost_net: stop device during reset owner
BUG: corrupted list in remove_wait_queue kvm net virt C 5 2641d 2644d 5/28 2628d dc6455a71c7f vhost: correctly remove wait queue during poll failure
possible deadlock in handle_rx kvm net virt C 4 2639d 2639d 5/28 2628d aaa3149bbee9 vhost_net: add missing lock nesting notation
kernel BUG at drivers/vhost/vhost.c:LINE! kvm net virt C 152 2628d 2646d 5/28 2628d d65026c6c62e vhost: validate log when IOTLB is enabled
KASAN: use-after-free Read in __list_add_valid (3) kvm net virt 16 2692d 2699d 4/28 2689d 4cd879515d68 vhost_net: stop device during reset owner
KASAN: double-free or invalid-free in skb_free_head net virt C 13 2731d 2737d 4/28 2692d d76c68109f37 crypto: pcrypt - fix freeing pcrypt instances
WARNING in vhost_dev_cleanup net virt kvm C 4 2693d 2699d 4/28 2692d 4cd879515d68 vhost_net: stop device during reset owner
possible deadlock in vhost_chr_write_iter kvm net virt C 25952 2699d 2702d 4/28 2695d e9cb4239134c vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
BUG: unable to handle kernel paging request in vsock_diag_dump net virt C 6 2789d 2792d 3/28 2757d c1eef220c176 vsock: always call vsock_init_tables()