|
BUG: sleeping function called from invalid context in __bpf_stream_push_str
net
virt
|
5 |
C |
done |
|
86 |
1d13h |
40d
|
2/29 |
never |
slab: fix kmalloc_nolock() context check for PREEMPT_RT
slab: fix kmalloc_nolock() context check for PREEMPT_RT
|
|
possible deadlock in vsock_linger
virt
net
|
4 |
C |
|
|
7 |
89d |
88d
|
29/29 |
60d |
f7c877e75352
vsock: fix lock inversion in vsock_assign_transport()
|
|
BUG: sleeping function called from invalid context in __set_page_owner
net
virt
|
5 |
C |
done |
|
79 |
86d |
100d
|
29/29 |
60d |
c83aab85e181
mm: don't spin in add_stack_record when gfp flags don't allow
|
|
possible deadlock in vsock_connectible_setsockopt
net
virt
|
4 |
|
|
|
1 |
123d |
123d
|
29/29 |
79d |
9f7c02e03157
nbd: restrict sockets to TCP and UDP
|
|
WARNING in virtio_transport_send_pkt_info
kvm
net
virt
|
-1 |
C |
|
|
145 |
140d |
158d
|
29/29 |
100d |
7fb1291257ea
vsock/virtio: Fix message iterator handling on transmit path
|
|
general protection fault in add_wait_queue
net
virt
kvm
|
10 |
C |
done |
|
676 |
334d |
348d
|
28/29 |
221d |
78dafe1cf3af
vsock: Orphan socket after transport release
|
|
KCSAN: data-race in virtqueue_disable_cb / virtqueue_enable_cb_delayed (9)
virt
|
6 |
|
|
|
1 |
319d |
318d
|
28/29 |
221d |
2e2f925fe737
virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN
|
|
general protection fault in vsock_stream_has_data
net
virt
|
2 |
C |
done |
done |
6 |
371d |
368d
|
28/29 |
255d |
df137da9d6d1
vsock/virtio: cancel close work in the destructor
|
|
general protection fault in vsock_connectible_has_data
net
virt
|
2 |
C |
done |
|
7 |
375d |
373d
|
28/29 |
256d |
f6abafcd32f9
vsock/bpf: return early if transport is not assigned
|
|
KCSAN: data-race in virtqueue_disable_cb / vring_interrupt (4)
virt
|
6 |
|
|
|
1 |
492d |
492d
|
28/29 |
430d |
83c334ed5216
virtio_ring: tag event_triggered as racy for KCSAN
|
|
linux-next test error: WARNING in rcu_core
net
virt
|
-1 |
|
|
|
16 |
525d |
533d
|
28/29 |
452d |
b8c8ba73c68b
slub: Introduce CONFIG_SLUB_RCU_DEBUG
|
|
BUG: stack guard page was hit in vsock_bpf_recvmsg
virt
net
|
-1 |
C |
done |
|
6 |
525d |
526d
|
28/29 |
471d |
69139d2919dd
vsock: fix recursive ->recvmsg calls
|
|
upstream test error: KMSAN: uninit-value in receive_buf
virt
net
|
-1 |
|
|
|
351 |
546d |
602d
|
27/29 |
520d |
840b2d39a2dc
virtio_ring: fix KMSAN error for premapped mode
|
|
KMSAN: uninit-value in vsock_assign_transport (2)
net
virt
|
7 |
C |
|
|
14 |
583d |
638d
|
27/29 |
521d |
1e1fdcbdde3b
vhost/vsock: always initialize seqpacket_allow
|
|
KASAN: slab-use-after-free Read in vhost_task_fn
kvm
net
virt
|
19 |
C |
done |
|
2661 |
625d |
627d
|
25/29 |
591d |
db5247d9bf5c
vhost_task: Handle SIGKILL by flushing work and exiting
|
|
net-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
-1 |
|
|
|
799 |
631d |
666d
|
25/29 |
604d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
|
linux-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
-1 |
|
|
|
177 |
661d |
698d
|
25/29 |
604d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
|
net boot error: WARNING: refcount bug in __free_pages_ok
virt
|
-1 |
|
|
|
297 |
632d |
661d
|
25/29 |
604d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
|
upstream boot error: WARNING: refcount bug in __free_pages_ok
virt
|
-1 |
|
|
|
1463 |
638d |
669d
|
25/29 |
604d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
|
bpf-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
-1 |
|
|
|
210 |
628d |
657d
|
25/29 |
604d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
|
bpf boot error: WARNING: refcount bug in __free_pages_ok
virt
|
-1 |
|
|
|
132 |
630d |
658d
|
25/29 |
604d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
|
KCSAN: data-race in virtnet_poll / virtnet_stats (2)
net
virt
|
6 |
|
|
|
1 |
847d |
845d
|
25/29 |
733d |
61217d8f6360
virtio_net: use u64_stats_t infra to avoid data-races
|
|
KMSAN: uninit-value in virtio_transport_recv_pkt
virt
kvm
net
|
7 |
C |
|
|
20713 |
799d |
813d
|
25/29 |
758d |
34c4effacfc3
virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
|
|
general protection fault in vhost_work_queue
kvm
net
virt
|
2 |
|
|
|
1 |
968d |
963d
|
23/29 |
928d |
a284f09effea
vhost: Fix crash during early vhost_transport_send_pkt calls
|
|
riscv/fixes test error: BUG: soft lockup in corrupted (2)
net
virt
|
-1 |
|
|
|
4 |
1193d |
1270d
|
22/29 |
954d |
61fc1ee8be26
riscv: Bump COMMAND_LINE_SIZE value to 1024
|
|
memory leak in __vsock_create
net
virt
io-uring
|
3 |
C |
|
|
1 |
1382d |
1378d
|
22/29 |
1058d |
7e97cfed9929
vsock: Fix memory leak in vsock_connect()
|
|
kernel BUG in vhost_get_vq_desc
kvm
net
virt
|
-1 |
C |
inconclusive |
|
19 |
1422d |
1434d
|
22/29 |
1058d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
|
INFO: task hung in vhost_work_dev_flush
kvm
net
virt
|
1 |
C |
error |
|
2 |
1438d |
1428d
|
22/29 |
1058d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
|
WARNING in vhost_dev_cleanup (2)
kvm
net
virt
|
-1 |
|
|
|
79 |
1422d |
1430d
|
22/29 |
1058d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
|
general protection fault in virtio_gpu_array_put_free
dri
virt
|
2 |
|
|
|
4 |
1468d |
1505d
|
22/29 |
1058d |
6b79f96f4a23
drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
|
|
usb-testing boot error: WARNING in __netif_set_xps_queue
net
virt
|
-1 |
|
|
|
57 |
1176d |
1188d
|
22/29 |
1058d |
fc8695eb11f0
Revert "net: fix cpu_max_bits_warn() usage in netif_attrmask_next{,_and}"
|
|
KASAN: out-of-bounds Write in virtio_gpu_cmd_set_scanout
virt
dri
|
23 |
|
|
|
1 |
1536d |
1536d
|
20/29 |
1411d |
5bd4f20de8ac
virtio-gpu: fix possible memory allocation failure
|
|
linux-next boot error: KASAN: use-after-free Read in page_to_skb
virt
net
|
-1 |
|
|
|
7 |
1732d |
1734d
|
20/29 |
1529d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
|
memory leak in virtio_transport_send_pkt_info
virt
kvm
net
|
3 |
C |
|
|
2 |
1741d |
1804d
|
20/29 |
1529d |
8432b8114957
vsock/virtio: free queued packets when closing socket
|
|
linux-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb
net
virt
|
-1 |
|
|
|
5 |
1732d |
1733d
|
20/29 |
1529d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
|
net-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb
virt
net
|
-1 |
|
|
|
15 |
1732d |
1736d
|
20/29 |
1529d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
|
net-next boot error: KASAN: use-after-free Read in page_to_skb
net
virt
|
-1 |
|
|
|
11 |
1732d |
1735d
|
20/29 |
1529d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
|
general protection fault in vsock_poll
virt
net
|
2 |
syz |
done |
|
15 |
1993d |
2005d
|
15/29 |
1948d |
1980c0584483
vsock: fix potential null pointer dereference in vsock_poll()
|
|
upstream boot error: KASAN: slab-out-of-bounds Write in virtio_gpu_object_create
dri
virt
|
-1 |
|
|
|
6 |
2103d |
2112d
|
15/29 |
2029d |
b513b0d4563a
drm/virtio: fix OOB in virtio_gpu_object_create
|
|
kernel panic: stack is corrupted in vhost_net_ioctl
kvm
net
virt
|
2 |
C |
done |
|
2 |
2163d |
2249d
|
15/29 |
2103d |
42d84c8490f9
vhost: Check docket sk_family instead of call getname
|
|
INFO: task hung in lock_sock_nested (2)
virt
kvm
net
|
1 |
C |
done |
|
418 |
2143d |
2155d
|
15/29 |
2103d |
3f74957fcbea
vsock: fix potential deadlock in transport->release()
|
|
general protection fault in virtio_transport_release
net
virt
kvm
|
2 |
C |
done |
|
7 |
2249d |
2251d
|
15/29 |
2227d |
039fcccaed33
vsock: avoid to assign transport if its initialization fails
|
|
INFO: task hung in vhost_net_stop_vq
virt
kvm
net
|
1 |
C |
done |
|
136 |
2467d |
2604d
|
12/29 |
2427d |
813dbeb656d6
vhost: reject zero size iova range
|
|
KASAN: use-after-free Read in vhost_transport_send_pkt
kvm
net
virt
|
19 |
syz |
|
|
36 |
2601d |
2727d
|
11/29 |
2587d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KASAN: use-after-free Read in vhost_work_queue
kvm
net
virt
|
19 |
syz |
|
|
30 |
2599d |
2699d
|
11/29 |
2587d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KASAN: use-after-free Read in vhost_transport_cancel_pkt
net
virt
kvm
|
19 |
syz |
|
|
17 |
2626d |
2670d
|
11/29 |
2587d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KASAN: use-after-free Read in iotlb_access_ok
virt
kvm
net
|
19 |
|
|
|
1 |
2724d |
2720d
|
8/29 |
2699d |
b13f9c636437
vhost: reset metadata cache when initializing new IOTLB
|
|
WARNING: ODEBUG bug in vsock_stream_connect
net
virt
|
-1 |
C |
|
|
42 |
2719d |
2728d
|
8/29 |
2699d |
455f05ecd2b2
vsock: split dwork to avoid reinitializations
|
|
KMSAN: uninit-value in _copy_to_iter (2)
net
virt
kvm
|
7 |
C |
|
|
226 |
2780d |
2826d
|
8/29 |
2749d |
670ae9caaca4
vhost: fix info leak due to uninitialized memory
|
|
kernel BUG at drivers/vhost/vhost.c:LINE! (2)
virt
kvm
net
|
-1 |
C |
|
|
139 |
2812d |
2842d
|
5/29 |
2810d |
d14d2b78090c
vhost: fix vhost_vq_access_ok() log check
|
|
KASAN: use-after-free Read in perf_trace_lock_acquire (2)
kvm
net
virt
|
19 |
C |
|
|
188 |
2906d |
2978d
|
5/29 |
2824d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
BUG: corrupted list in remove_wait_queue
kvm
net
virt
|
8 |
C |
|
|
5 |
2856d |
2859d
|
5/29 |
2843d |
dc6455a71c7f
vhost: correctly remove wait queue during poll failure
|
|
possible deadlock in handle_rx
virt
kvm
net
|
4 |
C |
|
|
4 |
2854d |
2854d
|
5/29 |
2843d |
aaa3149bbee9
vhost_net: add missing lock nesting notation
|
|
kernel BUG at drivers/vhost/vhost.c:LINE!
virt
kvm
net
|
-1 |
C |
|
|
152 |
2843d |
2861d
|
5/29 |
2843d |
d65026c6c62e
vhost: validate log when IOTLB is enabled
|
|
KASAN: use-after-free Read in __list_add_valid (3)
virt
kvm
net
|
19 |
|
|
|
16 |
2907d |
2914d
|
4/29 |
2904d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
KASAN: double-free or invalid-free in skb_free_head
net
virt
|
22 |
C |
|
|
13 |
2946d |
2952d
|
4/29 |
2907d |
d76c68109f37
crypto: pcrypt - fix freeing pcrypt instances
|
|
WARNING in vhost_dev_cleanup
net
virt
kvm
|
-1 |
C |
|
|
4 |
2908d |
2914d
|
4/29 |
2907d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
possible deadlock in vhost_chr_write_iter
kvm
net
virt
|
4 |
C |
|
|
25952 |
2914d |
2916d
|
4/29 |
2910d |
e9cb4239134c
vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
|
|
BUG: unable to handle kernel paging request in vsock_diag_dump
virt
net
|
8 |
C |
|
|
6 |
3004d |
3007d
|
3/29 |
2972d |
c1eef220c176
vsock: always call vsock_init_tables()
|