syzbot


Applied filters: Label=subsystems:virtualization (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KCSAN: data-race in virtnet_poll / virtnet_stats (2) net virtualization 1 159d 157d 25/26 45d 61217d8f6360 virtio_net: use u64_stats_t infra to avoid data-races
general protection fault in vhost_work_queue kvm net virtualization 1 280d 275d 23/26 240d a284f09effea vhost: Fix crash during early vhost_transport_send_pkt calls
riscv/fixes test error: BUG: soft lockup in corrupted (2) net virtualization 4 506d 582d 22/26 266d 61fc1ee8be26 riscv: Bump COMMAND_LINE_SIZE value to 1024
kernel BUG in vhost_get_vq_desc kvm net virtualization C inconclusive 19 734d 747d 22/26 370d a58da53ffd70 vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
INFO: task hung in vhost_work_dev_flush kvm net virtualization C error 2 750d 741d 22/26 370d e2ae38cf3d91 vhost: fix hung thread due to erroneous iotlb entries
WARNING in vhost_dev_cleanup (2) kvm net virtualization 79 734d 743d 22/26 370d a58da53ffd70 vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
general protection fault in virtio_gpu_array_put_free dri virtualization 4 780d 817d 22/26 370d 6b79f96f4a23 drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
usb-testing boot error: WARNING in __netif_set_xps_queue virtualization net 57 488d 500d 22/26 370d fc8695eb11f0 Revert "net: fix cpu_max_bits_warn() usage in netif_attrmask_next{,_and}"
KASAN: out-of-bounds Write in virtio_gpu_cmd_set_scanout dri virtualization 1 848d 848d 20/26 723d 5bd4f20de8ac virtio-gpu: fix possible memory allocation failure
linux-next boot error: KASAN: use-after-free Read in page_to_skb virtualization net 7 1044d 1046d 20/26 842d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
linux-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb net virtualization 5 1044d 1046d 20/26 842d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
net-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb net virtualization 15 1045d 1048d 20/26 842d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
net-next boot error: KASAN: use-after-free Read in page_to_skb net virtualization 11 1045d 1048d 20/26 842d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
general protection fault in vsock_poll net virtualization syz done 15 1305d 1318d 15/26 1261d 1980c0584483 vsock: fix potential null pointer dereference in vsock_poll()
upstream boot error: KASAN: slab-out-of-bounds Write in virtio_gpu_object_create dri virtualization 6 1416d 1424d 15/26 1341d b513b0d4563a drm/virtio: fix OOB in virtio_gpu_object_create
kernel panic: stack is corrupted in vhost_net_ioctl kvm net virtualization C done 2 1475d 1562d 15/26 1415d 42d84c8490f9 vhost: Check docket sk_family instead of call getname
INFO: task hung in vhost_net_stop_vq kvm net virtualization C done 136 1779d 1917d 12/26 1739d 813dbeb656d6 vhost: reject zero size iova range
KASAN: use-after-free Read in vhost_transport_send_pkt kvm net virtualization syz 36 1913d 2040d 11/26 1899d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_work_queue virtualization kvm net syz 30 1911d 2011d 11/26 1899d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_transport_cancel_pkt kvm net virtualization syz 17 1938d 1982d 11/26 1899d 834e772c8db0 vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in iotlb_access_ok net virtualization kvm 1 2036d 2032d 8/26 2011d b13f9c636437 vhost: reset metadata cache when initializing new IOTLB
WARNING: ODEBUG bug in vsock_stream_connect virtualization net C 42 2031d 2040d 8/26 2011d 455f05ecd2b2 vsock: split dwork to avoid reinitializations
KMSAN: uninit-value in _copy_to_iter (2) kvm net virtualization C 226 2093d 2138d 8/26 2061d 670ae9caaca4 vhost: fix info leak due to uninitialized memory
kernel BUG at drivers/vhost/vhost.c:LINE! (2) kvm net virtualization C 139 2124d 2155d 5/26 2123d d14d2b78090c vhost: fix vhost_vq_access_ok() log check
KASAN: use-after-free Read in perf_trace_lock_acquire (2) kvm net virtualization C 188 2219d 2290d 5/26 2137d 4cd879515d68 vhost_net: stop device during reset owner
kernel BUG at drivers/vhost/vhost.c:LINE! kvm net virtualization C 152 2155d 2173d 5/26 2155d d65026c6c62e vhost: validate log when IOTLB is enabled
BUG: corrupted list in remove_wait_queue kvm net virtualization C 5 2168d 2171d 5/26 2155d dc6455a71c7f vhost: correctly remove wait queue during poll failure
possible deadlock in handle_rx kvm net virtualization C 4 2167d 2167d 5/26 2155d aaa3149bbee9 vhost_net: add missing lock nesting notation
KASAN: use-after-free Read in __list_add_valid (3) kvm net virtualization 16 2220d 2226d 4/26 2216d 4cd879515d68 vhost_net: stop device during reset owner
KASAN: double-free or invalid-free in skb_free_head net virtualization C 13 2258d 2264d 4/26 2219d d76c68109f37 crypto: pcrypt - fix freeing pcrypt instances
WARNING in vhost_dev_cleanup kvm net virtualization C 4 2221d 2227d 4/26 2219d 4cd879515d68 vhost_net: stop device during reset owner
possible deadlock in vhost_chr_write_iter net virtualization kvm C 25952 2226d 2229d 4/26 2222d e9cb4239134c vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
BUG: unable to handle kernel paging request in vsock_diag_dump net virtualization C 6 2316d 2319d 3/26 2284d c1eef220c176 vsock: always call vsock_init_tables()