Patch Series

Subject io_uring: make overflowing cqe subject to OOM
Author alexandre@negrel.dev
Date 2025-12-29 20:19:00 +0000 UTC
Version 1
Cc alexandre@negrel.dev axboe@kernel.dk io-uring@vger.kernel.org linux-kernel@vger.kernel.org

Patches (1)

Name Content [All]
[PATCH] io_uring: make overflowing cqe subject to OOM [Body]

Session 2025-12-29

ID (for dev) 68bdddf1-3347-4f00-a8b6-c20b75c3add0
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base f8f9c1f4d0c7a64600e2ca312dec824a0bc2f1da [Config] passed [Log]
[KASAN] Boot test: Base f8f9c1f4d0c7a64600e2ca312dec824a0bc2f1da [Config] passed [Log]
[KASAN] Build Patched f8f9c1f4d0c7a64600e2ca312dec824a0bc2f1da [Config] [patched] passed [Log]
[KASAN] Boot test: Patched f8f9c1f4d0c7a64600e2ca312dec824a0bc2f1da [Config] [patched] passed [Log]
[KASAN] Fuzzing f8f9c1f4d0c7a64600e2ca312dec824a0bc2f1da [Config] f8f9c1f4d0c7a64600e2ca312dec824a0bc2f1da [Config] [patched] passed [Log] [Artifacts]
WARNING in io_get_cqe_overflow [Log] [Syz Repro] [C Repro]