syzbot


Applied filters: Label=subsystems:virt (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
general protection fault in add_wait_queue net virt kvm 10 C done 676 184d 197d 28/29 70d 78dafe1cf3af vsock: Orphan socket after transport release
KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed (9) virt 6 1 168d 168d 28/29 70d 2e2f925fe737 virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
general protection fault in vsock_stream_has_data net virt 2 C done done 6 221d 217d 28/29 104d df137da9d6d1 vsock/virtio: cancel close work in the destructor
general protection fault in vsock_connectible_has_data net virt 2 C done 7 224d 222d 28/29 105d f6abafcd32f9 vsock/bpf: return early if transport is not assigned
KCSAN: data-race in virtqueue_disable_cb / vring_interrupt (4) virt 6 1 341d 341d 28/29 279d 83c334ed5216 virtio_ring: tag event_triggered as racy for KCSAN
linux-next test error: WARNING in rcu_core net virt -1 16 374d 382d 28/29 301d b8c8ba73c68b slub: Introduce CONFIG_SLUB_RCU_DEBUG
BUG: stack guard page was hit in vsock_bpf_recvmsg virt net -1 C done 6 374d 375d 28/29 320d 69139d2919dd vsock: fix recursive ->recvmsg calls
upstream test error: KMSAN: uninit-value in receive_buf virt net -1 351 396d 451d 27/29 370d 840b2d39a2dc virtio_ring: fix KMSAN error for premapped mode
KMSAN: uninit-value in vsock_assign_transport (2) net virt 7 C 14 432d 487d 27/29 370d 1e1fdcbdde3b vhost/vsock: always initialize seqpacket_allow
KASAN: slab-use-after-free Read in vhost_task_fn kvm net virt 19 C done 2661 474d 476d 25/29 440d db5247d9bf5c vhost_task: Handle SIGKILL by flushing work and exiting
net-next boot error: WARNING: refcount bug in __free_pages_ok virt -1 799 481d 515d 25/29 453d f5c12105c15f mm,page_owner: fix refcount imbalance
linux-next boot error: WARNING: refcount bug in __free_pages_ok virt -1 177 510d 547d 25/29 453d f5c12105c15f mm,page_owner: fix refcount imbalance
net boot error: WARNING: refcount bug in __free_pages_ok virt -1 297 481d 510d 25/29 453d f5c12105c15f mm,page_owner: fix refcount imbalance
upstream boot error: WARNING: refcount bug in __free_pages_ok virt -1 1463 487d 518d 25/29 453d f5c12105c15f mm,page_owner: fix refcount imbalance
bpf-next boot error: WARNING: refcount bug in __free_pages_ok virt -1 210 477d 506d 25/29 453d f5c12105c15f mm,page_owner: fix refcount imbalance
bpf boot error: WARNING: refcount bug in __free_pages_ok virt -1 132 479d 507d 25/29 453d f5c12105c15f mm,page_owner: fix refcount imbalance
KCSAN: data-race in virtnet_poll / virtnet_stats (2) net virt 6 1 696d 694d 25/29 582d 61217d8f6360 virtio_net: use u64_stats_t infra to avoid data-races
KMSAN: uninit-value in virtio_transport_recv_pkt virt kvm net 7 C 20713 648d 662d 25/29 607d 34c4effacfc3 virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
general protection fault in vhost_work_queue kvm net virt 2 1 817d 812d 23/29 777d a284f09effea vhost: Fix crash during early vhost_transport_send_pkt calls
riscv/fixes test error: BUG: soft lockup in corrupted (2) net virt -1 4 1042d 1119d 22/29 803d 61fc1ee8be26 riscv: Bump COMMAND_LINE_SIZE value to 1024
memory leak in __vsock_create net virt io-uring 3 C 1 1231d 1227d 22/29 907d 7e97cfed9929 vsock: Fix memory leak in vsock_connect()
kernel BUG in vhost_get_vq_desc kvm net virt -1 C inconclusive 19 1271d 1283d 22/29 907d a58da53ffd70 vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
INFO: task hung in vhost_work_dev_flush kvm net virt 1 C error 2 1287d 1277d 22/29 907d e2ae38cf3d91 vhost: fix hung thread due to erroneous iotlb entries
WARNING in vhost_dev_cleanup (2) kvm net virt -1 79 1271d 1279d 22/29 907d a58da53ffd70 vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
general protection fault in virtio_gpu_array_put_free dri virt 2 4 1317d 1354d 22/29 907d 6b79f96f4a23 drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
usb-testing boot error: WARNING in __netif_set_xps_queue net virt -1 57 1025d 1037d 22/29 907d fc8695eb11f0 Revert "net: fix cpu_max_bits_warn() usage in netif_attrmask_next{,_and}"
KASAN: out-of-bounds Write in virtio_gpu_cmd_set_scanout virt dri 23 1 1385d 1385d 20/29 1260d 5bd4f20de8ac virtio-gpu: fix possible memory allocation failure
linux-next boot error: KASAN: use-after-free Read in page_to_skb virt net -1 7 1581d 1583d 20/29 1378d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
memory leak in virtio_transport_send_pkt_info virt kvm net 3 C 2 1590d 1653d 20/29 1378d 8432b8114957 vsock/virtio: free queued packets when closing socket
linux-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb net virt -1 5 1581d 1582d 20/29 1378d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
net-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb virt net -1 15 1581d 1585d 20/29 1378d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
net-next boot error: KASAN: use-after-free Read in page_to_skb net virt -1 11 1581d 1585d 20/29 1378d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
general protection fault in vsock_poll virt net 2 syz done 15 1842d 1854d 15/29 1797d 1980c0584483 vsock: fix potential null pointer dereference in vsock_poll()
upstream boot error: KASAN: slab-out-of-bounds Write in virtio_gpu_object_create dri virt -1 6 1952d 1961d 15/29 1878d b513b0d4563a drm/virtio: fix OOB in virtio_gpu_object_create
kernel panic: stack is corrupted in vhost_net_ioctl kvm net virt 2 C done 2 2012d 2098d 15/29 1952d 42d84c8490f9 vhost: Check docket sk_family instead of call getname
INFO: task hung in lock_sock_nested (2) virt kvm net 1 C done 418 1992d 2005d 15/29 1952d 3f74957fcbea vsock: fix potential deadlock in transport->release()
general protection fault in virtio_transport_release net virt kvm 2 C done 7 2099d 2100d 15/29 2076d 039fcccaed33 vsock: avoid to assign transport if its initialization fails
INFO: task hung in vhost_net_stop_vq virt kvm net 1 C done 136 2316d 2454d 12/29 2276d 813dbeb656d6 vhost: reject zero size iova range
KASAN: use-after-free Read in vhost_transport_send_pkt kvm net virt 19 syz 36 2450d 2577d 11/29 2436d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_work_queue kvm net virt 19 syz 30 2448d 2548d 11/29 2436d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_transport_cancel_pkt net virt kvm 19 syz 17 2475d 2519d 11/29 2436d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in iotlb_access_ok virt kvm net 19 1 2573d 2569d 8/29 2548d b13f9c636437 vhost: reset metadata cache when initializing new IOTLB
WARNING: ODEBUG bug in vsock_stream_connect net virt -1 C 42 2568d 2577d 8/29 2548d 455f05ecd2b2 vsock: split dwork to avoid reinitializations
KMSAN: uninit-value in _copy_to_iter (2) net virt kvm 7 C 226 2629d 2675d 8/29 2598d 670ae9caaca4 vhost: fix info leak due to uninitialized memory
kernel BUG at drivers/vhost/vhost.c:LINE! (2) virt kvm net -1 C 139 2661d 2692d 5/29 2660d d14d2b78090c vhost: fix vhost_vq_access_ok() log check
KASAN: use-after-free Read in perf_trace_lock_acquire (2) kvm net virt 19 C 188 2755d 2827d 5/29 2674d 4cd879515d68 vhost_net: stop device during reset owner
BUG: corrupted list in remove_wait_queue kvm net virt 8 C 5 2705d 2708d 5/29 2692d dc6455a71c7f vhost: correctly remove wait queue during poll failure
kernel BUG at drivers/vhost/vhost.c:LINE! virt kvm net -1 C 152 2692d 2710d 5/29 2692d d65026c6c62e vhost: validate log when IOTLB is enabled
possible deadlock in handle_rx virt kvm net 4 C 4 2704d 2703d 5/29 2692d aaa3149bbee9 vhost_net: add missing lock nesting notation
KASAN: use-after-free Read in __list_add_valid (3) virt kvm net 19 16 2756d 2763d 4/29 2753d 4cd879515d68 vhost_net: stop device during reset owner
KASAN: double-free or invalid-free in skb_free_head net virt 22 C 13 2795d 2801d 4/29 2756d d76c68109f37 crypto: pcrypt - fix freeing pcrypt instances
WARNING in vhost_dev_cleanup net virt kvm -1 C 4 2757d 2763d 4/29 2756d 4cd879515d68 vhost_net: stop device during reset owner
possible deadlock in vhost_chr_write_iter kvm net virt 4 C 25952 2763d 2766d 4/29 2759d e9cb4239134c vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
BUG: unable to handle kernel paging request in vsock_diag_dump virt net 8 C 6 2853d 2856d 3/29 2821d c1eef220c176 vsock: always call vsock_init_tables()