syzbot



Linux

fixed (1173):
Title Repro Bisected Count Last Reported Closed Patch
general protection fault in delayed_uprobe_remove C yes 2 139d 142d 21h53m 1aed58e6 Uprobes: Fix kernel oops with delayed_uprobe_remove()
WARNING: locking bug in lock_downgrade 30 60d 116d 1d12h 513e1073 locking/lockdep: Add debug_locks check in __lock_downgrade() locking/lockdep: Add debug_locks check in __lock_downgrade()
general protection fault in __x86_indirect_thunk_rbx C yes 16 135d 136d 2d00h d6367d62 fs/locks: use properly initialized file_lock when unlocking.
KASAN: use-after-free Read in update_blocked_averages C yes 3 117d 131d 2d00h bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
kernel BUG at mm/slab.c:LINE! (3) C yes 14 2d05h 129d 2d00h bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING in update_load_avg C yes 1 124d 123d 2d20h bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING: bad usercopy in corrupted (2) C yes 12 71d 118d 2d20h bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
KASAN: slab-out-of-bounds Read in tick_sched_handle C yes 7 68d 96d 6d06h bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING: lock held when returning to user space in set_property_atomic C 145 69d 83d 15d 4089e272 gpu/drm: Fix lock held when returning to user space.
general protection fault in ax25cmp C 2294 52d 84d 17d b0cf0292 net/rose: fix NULL ax25_cb kernel panic
KMSAN: uninit-value in batadv_interface_tx C 98 17d 40d 17d 4ffcbfac batman-adv: fix uninit-value in batadv_interface_tx()
kernel panic: stack is corrupted in perf_output_begin_forward 2 68d 74d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
kernel BUG at security/keys/keyring.c:LINE! C 12 69d 169d 17d ede0fa98 KEYS: always initialize keyring_index_key::desc_len
KASAN: slab-out-of-bounds Read in xfrm_policy_insert_list 1 69d 68d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in tipc_subscrb_rcv_cb C 13 327d 349d 17d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KASAN: use-after-free Write in __xfrm_policy_unlink C 254 20d 248d 17d 1548bc4e xfrm: policy: delete inexact policies from inexact list on hash rebuild
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page C 25 108d 136d 17d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KASAN: use-after-free Read in task_is_descendant C 27 66d 153d 17d 9474f4e7 Yama: Check for pid death before checking ancestry
KASAN: use-after-free Read in xfrm_migrate 5 52d 75d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: rcu detected stall in netlink_sendmsg syz 83 33d 89d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in xfrm_policy_insert_list 2 67d 78d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in __flush_work C 402 46d 53d 17d 2e3c18d0 block: pass no-op callback to INIT_WORK().
KASAN: use-after-free Read in __smc_diag_dump syz 34 67d 80d 17d 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: slab-out-of-bounds Read in xfrm_policy_lookup_bytype 6 71d 93d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
general protection fault in crypto_remove_spawns (2) 2 62d 68d 17d 6db43410 crypto: adiantum - initialize crypto_spawn::inst
KMSAN: uninit-value in tipc_nl_compat_doit C 153 32d 183d 17d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
general protection fault in watchdog C 1 100d 99d 17d e2c8d550 netfilter: ebtables: account ebt_table_info to kmemcg
KASAN: stack-out-of-bounds Read in select_task_rq_fair 2 67d 76d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in kernel_accept C 19 100d 250d 17d 78abe3d0 net/smc: fix TCP fallback socket release 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: use-after-free Read in xfrm_policy_insert_list 30 52d 93d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING: refcount bug in rds_sock_addref 1 51d 51d 17d 6fa19f56 rds: fix refcount bug in rds_sock_addref
WARNING in __skb_flow_dissect (3) syz 224 67d 156d 17d 0b7959b6 tun: publish tfile after it's fully initialized
general protection fault in fuse_dev_do_write C 134 45d 172d 17d 97e1532e fuse: handle zero sized retrieve correctly
KMSAN: uninit-value in tipc_nl_compat_name_table_dump C 51 103d 144d 17d 974cb0e3 tipc: fix uninit-value in tipc_nl_compat_name_table_dump
INFO: rcu detected stall in snd_pcm_oss_read C 2 89d 89d 17d e190161f ALSA: pcm: Fix tight loop of OSS capture stream
KASAN: use-after-free Read in sctp_outq_tail 1 39d 38d 17d af98c5a7 sctp: set stream ext to NULL after freeing it in sctp_stream_outq_migrate
net-next boot error: can't ssh into the instance 33 52d 54d 17d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
BUG: unable to handle kernel paging request in dput (2) C 4 51d 52d 17d 36991ca6 blk-mq: protect debugfs_create_files() from failures 37ea7b63 debugfs: debugfs_lookup() should return NULL if not found
KASAN: slab-out-of-bounds Read in batadv_interface_tx C 41 43d 82d 17d 9114daa8 batman-adv: Force mac header to start of data on xmit
INFO: rcu detected stall in pfkey_sendmsg 7 69d 93d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: task hung in generic_file_write_iter 7 110d 248d 17d 04906b2f blockdev: Fix livelocks on loop device
general protection fault in kernel_accept C 280 93d 254d 17d 78abe3d0 net/smc: fix TCP fallback socket release 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: stack-out-of-bounds in do_raw_spin_lock C 1 77d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in refcount_inc_not_zero_checked syz 24 20d 80d 17d 63346650 netrom: switch to sock timer API
KMSAN: uninit-value in tipc_nl_compat_link_set (2) C 13 54d 95d 17d edf5ff04 tipc: fix uninit-value in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable C 144 18d 144d 17d 0762216c tipc: fix uninit-value in tipc_nl_compat_bearer_enable
KMSAN: kernel-infoleak in move_addr_to_user 5 24d 74d 17d 7d033c9f ipv6: fix kernel-infoleak in ipv6_local_error()
KASAN: use-after-free Read in kmemdup 1 63d 63d 17d 63530aba ax25: fix possible use-after-free
KMSAN: uninit-value in tipc_nl_compat_link_reset_stats syz 16 21d 75d 17d 8b66fee7 tipc: fix uninit-value in tipc_nl_compat_link_reset_stats
BUG: unable to handle kernel paging request in depot_save_stack C 1 77d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: global-out-of-bounds Read in validate_nla C 14 53d 57d 17d a8b5c6d6 nl80211: fix NLA_POLICY_NESTED() arguments
KASAN: invalid-free in sctp_stream_free C 5 39d 47d 17d af98c5a7 sctp: set stream ext to NULL after freeing it in sctp_stream_outq_migrate
WARNING: refcount bug in nr_release 1 76d 75d 17d 63346650 netrom: switch to sock timer API
general protection fault in dccp_parse_options 1 52d 52d 17d 9b1f19d8 dccp: fool proof ccid_hc_[rt]x_parse_options()
KASAN: slab-out-of-bounds Read in __xfrm_policy_bysel_ctx 1 79d 79d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in kvm_clear_dirty_log_protect 6 17d 62d 17d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
BUG: unable to handle kernel NULL pointer dereference in corrupted (3) C 1 74d 74d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: slab-out-of-bounds Read in kvm_clear_dirty_log_protect C 54 68d 80d 17d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
net boot error: can't ssh into the instance 42 52d 54d 17d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
general protection fault in __dentry_path C 2082 19d 52d 17d 8ed0579c kvm: properly check debugfs dentry before using it
WARNING in tcp_send_loss_probe C 9 27d 79d 17d bf50b606 tcp: repaired skbs must init their tso_segs
BUG: unable to handle kernel paging request in do_csum C 11 110d 111d 17d d5be7f63 net-backports: net: validate untrusted gso packets without csum offload
KASAN: stack-out-of-bounds Read in pick_next_task_fair C 1 77d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in icmp6_send syz 2 78d 78d 17d 8d933670 ipv6: make icmp6_send() robust against null skb->dev
WARNING in batadv_is_on_batman_iface syz 10 58d 83d 17d 955d3411 batman-adv: Avoid WARN on net_device without parent in netns
kernel panic: stack is corrupted in rcu_irq_enter 1 66d 66d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
WARNING in clear_standby C 3522 58d 183d 17d 4aac9228 libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive()
general protection fault in __xfrm_policy_bysel_ctx 1 54d 53d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_insert 3 69d 93d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in apparmor_cred_free C 109 64d 71d 17d a5795fd3 LSM: Check for NULL cred-security on free
KASAN: out-of-bounds Read in update_curr syz 1 77d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in team_nl_cmd_options_set C 7 87d 44d 17d 2fdeee25 team: avoid complex list operations in team_nl_cmd_options_set()
KASAN: slab-out-of-bounds Write in __xfrm_policy_unlink 34 52d 132d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: rcu detected stall in xfrm_hash_rebuild 77 52d 103d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: task hung in lo_ioctl 47 351d 468d 17d 04906b2f blockdev: Fix livelocks on loop device
WARNING in wiphy_register (3) syz 31 52d 83d 17d 9c5d3afa mac80211_hwsim: check that n_limits makes sense
general protection fault in sctp_sched_dequeue_common 6 32d 122d 17d cfe4bd7a sctp: check and update stream->out_curr when allocating stream_out
kernel panic: stack is corrupted in printk C 1 77d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KMSAN: kernel-infoleak in vmx_get_nested_state C 6 18d 129d 17d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
general protection fault in xfrm_policy_insert_list 4 74d 89d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
BUG: unable to handle kernel NULL pointer dereference in setup_kmem_cache_node 3 79d 80d 17d 09c2e76e slab: alien caches must not be initialized if the allocation of the alien cache failed
general protection fault in xfrm_policy_lookup_bytype 5 53d 82d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: slab-out-of-bounds Read in __pskb_copy_fclone 22 99d 165d 17d e7c87bd6 bpf: in __bpf_redirect_no_mac pull mac only if present
INFO: rcu detected stall in sys_bind 1 43d 43d 17d cf657d22 net/x25: do not hold the cpu too long in x25_new_lci()
kernel panic: stack is corrupted in udp4_lib_lookup2 11 82d 79d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in rb_erase_cached C 1 77d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: stack-out-of-bounds Read in gue_err_proto_handler C 1 74d 74d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in oom_kill_process 1 65d 61d 17d cefc7ef3 mm, oom: fix use-after-free in oom_kill_process
kernel panic: stack is corrupted in select_idle_sibling 1 77d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in __xfrm_policy_bysel_ctx 11 52d 89d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: out-of-bounds Read in __switch_to C 1 77d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in xfrm_policy_inexact_insert 42 52d 82d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: use-after-free Read in __wake_up_common_lock 1 52d 51d 17d bdcc5bc2 mISDN: fix a race in dev_expire_timer()
KMSAN: uninit-value in tipc_nl_compat_dumpit C 209 32d 183d 17d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
general protection fault in corrupted (2) C 2 74d 77d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
WARNING: locking bug in corrupted C 1 66d 66d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
possible deadlock in __wake_up_common_lock 7 71d 80d 17d 73444bc4 mm, page_alloc: do not wake kswapd with zone lock held
WARNING: refcount bug in kvm_vm_ioctl syz 13 51d 164d 17d cfa39381 kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
INFO: rcu detected stall in ipv6_rcv 7 55d 92d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt 1 52d 51d 17d 63346650 netrom: switch to sock timer API
KMSAN: uninit-value in gue_err C 4686 17d 71d 17d 26fc181e fou, fou6: do not assume linear skbs
KASAN: use-after-free Read in seccomp_notify_release C 27 22d 71d 17d a811dc61 seccomp: fix UAF in user-trap code
KASAN: use-after-free Read in batadv_interface_tx C 54 44d 82d 17d 9114daa8 batman-adv: Force mac header to start of data on xmit
general protection fault in ip6erspan_set_version C 39 26d 31d 17d efcc9bca net: ip6_gre: fix possible NULL pointer dereference in ip6erspan_set_version
WARNING in __might_sleep (2) C 36 57d 84d 17d fc01d8c6 tty/n_hdlc: fix __might_sleep warning
upstream boot error: can't ssh into the instance (2) 45 54d 55d 17d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
KASAN: use-after-free Read in xfrm_policy_lookup_bytype 33 52d 93d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
BUG: soft lockup in x25_connect 1 29d 29d 17d 797a22bd net/x25: fix a race in x25_bind()
WARNING in xfrm6_tunnel_net_exit (2) C 48816 26d 308d 17d f75a2804 xfrm: destroy xfrm_state synchronously on net exit path
WARNING in xfrm_policy_inexact_gc_tree 645 52d 103d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in tipc_conn_rcv_sub C 557 19d 314d 17d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
WARNING: refcount bug in xfrm_policy_bysel_ctx 1 71d 71d 17d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING: bad unlock balance in rxrpc_recvmsg C 9 43d 47d 17d 6dce3c20 rxrpc: bad unlock balance in rxrpc_recvmsg
KASAN: stack-out-of-bounds Write in page_counter_try_charge 1 67d 67d 17d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KMSAN: kernel-infoleak in sctp_getsockopt (2) C 16 17d 68d 17d 400b8b9a sctp: allocate sctp_sockaddr_entry with kzalloc
general protection fault in relay_open_buf C 287 50d 51d 17d 2c1cf00e relay: check return of create_buf_file() properly
KASAN: use-after-free Write in __wake_up_common_lock 1 45d 45d 17d bdcc5bc2 mISDN: fix a race in dev_expire_timer()
KMSAN: uninit-value in gue6_err C 8359 17d 71d 17d 26fc181e fou, fou6: do not assume linear skbs
general protection fault in ebitmap_destroy syz 1 73d 73d 17d 5b0e7310 selinux: fix GPF on invalid policy
general protection fault in debugfs_create_files C 111 50d 51d 17d 36991ca6 blk-mq: protect debugfs_create_files() from failures
general protection fault in kvm_ioapic_scan_entry C 148 111d 221d 24d dcbd3e49 KVM: X86: Fix NULL deref in vcpu_scan_ioapic
general protection fault in finish_wait C 22 41d 257d 24d 78abe3d0 net/smc: fix TCP fallback socket release
KASAN: slab-out-of-bounds Write in fpstate_init C 15088 89d 90d 24d ed8e4812 KVM: x86: fix size of x86_fpu_cache objects
KASAN: out-of-bounds Write in tls_push_record C 10 157d 258d 24d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Read in tls_tx_records 1 176d 176d 24d d829e9c4 tls: convert to generic sk_msg interface
general protection fault in tls_push_sg 12 167d 276d 24d d829e9c4 tls: convert to generic sk_msg interface
general protection fault in gcmaes_crypt_by_sg 3 159d 168d 24d d829e9c4 tls: convert to generic sk_msg interface
kernel BUG at include/linux/mm.h:LINE! (2) C 1009 24d 288d 24d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Write in tls_push_record (2) C 64 152d 254d 24d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Read in rdma_resolve_addr 1 178d 178d 30d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in cma_acquire_dev 1 260d 259d 30d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in wait_for_completion 1 154d 153d 30d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in __list_add_valid (5) C 16 356d 362d 30d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in bpf_cgroup_storage_release C 2 232d 232d 34d 82c018d7 Merge branch 'bpf-cgroup-local-storage'
KASAN: stack-out-of-bounds Read in rb_erase (4) 1 68d 68d 34d 11789039 fou: Prevent unbounded recursion in GUE error handler
general protection fault in list_lru_count_one C 12 250d 249d 56d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
WARNING in __debug_object_init (3) C 1557 145d 146d 61d 2cb494a3 bpf: add tests for direct packet access from CGROUP_SKB
general protection fault in keyctl_pkey_params_get C 85 80d 140d 66d 57b0e314 KEYS: fix parsing invalid pkey info string 94c13f66 security: don't use a negative Opt_err token index
KASAN: stack-out-of-bounds Read in keyctl_pkey_params_get 2 81d 79d 66d 57b0e314 KEYS: fix parsing invalid pkey info string
general protection fault in encode_rpcb_string C 6 244d 340d 66d 81c88b18 sunrpc: handle ENOMEM in rpcb_getport_async
KMSAN: uninit-value in vti6_tnl_xmit syz 60 71d 95d 66d cb9f1b78 ip: validate header length on virtual device xmit
general protection fault in lo_ioctl (2) syz 2 325d 325d 66d 310ca162 block/loop: Use global lock for ioctl() operation.
inconsistent lock state in nr_find_socket C 19 68d 84d 66d 7314f548 netrom: fix locking in nr_find_socket()
KASAN: invalid-free in x25_asy_free C 67 78d 84d 66d d5c7c745 net/wan: fix a double free in x25_asy_open_tty()
WARNING in kmem_cache_create_usercopy C 10 82d 141d 66d 574d356b 9p/net: put a lower bound on msize
possible deadlock in blkdev_reread_part C 5736 85d 506d 66d 0da03cab loop: Fix deadlock when calling blkdev_reread_part() 85b0a54a loop: Move loop_reread_partitions() out of loop_ctl_mutex
KMSAN: uninit-value in check_6rd C 81 72d 95d 66d cb9f1b78 ip: validate header length on virtual device xmit
WARNING: locking bug in loop_control_ioctl C 4018 106d 133d 66d 628bd859 loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl()
WARNING: ODEBUG bug in tipc_enable_bearer C 3 87d 90d 66d dc4501ff tipc: fix a double free in tipc_enable_bearer()
kernel BUG at kernel/time/timer.c:LINE! (2) C 5 79d 81d 66d 202700e3 net/hamradio/6pack: use mod_timer() to rearm timers
KASAN: slab-out-of-bounds Read in tun_net_xmit (2) C 10 82d 250d 66d aff6db45 ptr_ring: wrap back ->producer in __ptr_ring_swap_queue()
KASAN: use-after-free Read in nr_rx_frame syz 2 73d 80d 66d 7314f548 netrom: fix locking in nr_find_socket()
possible deadlock in nr_destroy_socket syz 20 70d 80d 66d 7314f548 netrom: fix locking in nr_find_socket()
INFO: task hung in loop_control_ioctl 4 163d 356d 66d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: use-after-free Read in posix_lock_inode syz 5 80d 80d 66d bf77ae4c locks: fix error in locks_move_blocks()
general protection fault in transparent_hugepage_enabled C 626 80d 89d 66d 7635d9cb mm, thp, proc: report THP eligibility for each vma
KMSAN: kernel-infoleak in capi_unlocked_ioctl C 109 71d 82d 66d d63967e4 isdn: fix kernel-infoleak in capi_unlocked_ioctl
INFO: task hung in lo_open (2) 10 128d 356d 66d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: user-memory-access Write in n_tty_set_termios C 85 85d 356d 66d 83d817f4 tty: Hold tty_ldisc_lock() during tty_reopen()
KASAN: use-after-free Read in ax25_fillin_cb syz 4 87d 84d 66d c4335704 ax25: fix a use-after-free in ax25_fillin_cb()
INFO: task hung in lo_release 1 248d 248d 66d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: use-after-free Read in locks_delete_block syz 4 107d 130d 66d 16306a61 fs/locks: always delete_block after waiting.
general protection fault in fdb_find_rcu C 3 87d 83d 66d f989d03e net: rtnetlink: address is mandatory for rtnl_fdb_get
general protection fault in kvm_arch_vcpu_ioctl_run C 12 93d 109d 71d dcbd3e49 KVM: X86: Fix NULL deref in vcpu_scan_ioapic
general protection fault in __vb2_queue_free C 38 87d 143d 71d 62dcb4f4 media: vb2: check memory model for VIDIOC_CREATE_BUFS
WARNING in static_key_enable_cpuslocked 1 118d 118d 71d 9c480601 udp: fix jump label misuse
WARNING in static_key_disable_cpuslocked syz 5 107d 126d 71d 9c480601 udp: fix jump label misuse
BUG: corrupted list in ___neigh_create C 706 100d 103d 71d 8cc196d6 neighbor: gc_list changes should be protected by table lock
WARNING in __rcu_read_unlock C 2 90d 98d 71d 11789039 fou: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in __ipv6_addr_type 1 92d 92d 71d cbb49697 ipv6: tunnels: fix two use-after-free
BUG: corrupted list in neigh_mark_dead C 4117 100d 103d 71d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KMSAN: kernel-infoleak in sctp_getsockopt syz 147 72d 107d 71d 4a2eb0c3 sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event
KASAN: use-after-free Read in tipc_group_bc_cong C 280 92d 103d 71d 143ece65 tipc: check tsk->group in tipc_wait_for_cond()
KASAN: use-after-free Read in tipc_mcast_xmit syz 7 89d 96d 71d 3c6306d4 tipc: check group dests after tipc_wait_for_cond()
KMSAN: uninit-value in __inet6_bind C 56 72d 102d 71d fb242745 ipv6: explicitly initialize udp6_addr in udp_sock_create6()
INFO: task hung in flush_workqueue C 293 90d 142d 71d 52117be6 media: vim2m: use cancel_delayed_work_sync instead of flush_schedule_work
KASAN: slab-out-of-bounds Read in neigh_mark_dead 12 100d 103d 71d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KASAN: slab-out-of-bounds Read in ___neigh_create 1 103d 103d 71d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KASAN: null-ptr-deref Write in kthread_stop C 2527 87d 145d 71d 701f49bc media: vivid: fix error handling of kthread_run
KASAN: use-after-free Read in kfree_skb (2) C 66 93d 102d 71d acb4a33e tipc: fix a double kfree_skb()
KASAN: use-after-free Read in skcipher_recvmsg 6 117d 142d 71d f7d76e05 crypto: user - fix use_after_free of struct xxx_request
BUG: sleeping function called from invalid context at mm/slab.h:LINE (4) C 36 96d 257d 71d f9c9bdb5 crypto: x86/chacha - avoid sleeping under kernel_fpu_begin()
general protection fault in inet_lhash2_lookup C 1137 95d 98d 71d eedbbb0d net: dccp: initialize (addr,port) listening hashtable
divide error in alarm_forward 1 97d 96d 71d 0e334db6 posix-timers: Fix division by zero bug
KASAN: use-after-free Read in kvm_put_kvm C 143 94d 154d 71d 987d1149 KVM: fix unregistering coalesced mmio zone from wrong bus
general protection fault in inet6_lhash2_lookup C 718 95d 98d 71d eedbbb0d net: dccp: initialize (addr,port) listening hashtable
KASAN: use-after-free Read in neigh_mark_dead C 858 100d 103d 71d 8cc196d6 neighbor: gc_list changes should be protected by table lock
WARNING in rds_message_alloc_sgs C 6 110d 143d 71d ea010070 net/rds: fix warn in rds_message_alloc_sgs
WARNING in vkms_plane_duplicate_state C 108 88d 121d 71d 7cdf33ab drm/vkms: Fix plane duplicate_state
divide error in vivid_vid_cap_s_dv_timings C 108 87d 145d 71d 9729d6d2 media: vivid: set min width/height to a value > 0
KMSAN: uninit-value in packet_sendmsg 5 120d 95d 71d 99137b78 packet: validate address length
KASAN: use-after-free Read in vb2_mmap C 276 87d 144d 71d cd26d1c4 media: vb2: vb2_mmap: move lock up
general protection fault in __ipv6_sock_mc_join C 9 98d 102d 71d fb83ed49 tipc: compare remote and local protocols in tipc_udp_enable()
BUG: pagefault on kernel address ADDR in non-whitelisted uaccess C 17 96d 142d 71d 560ccb75 media: vivid: free bitmap_cap when updating std/timings/etc.
KASAN: global-out-of-bounds Read in tpg_print_str_4 C 52 110d 135d 71d e5f71a27 media: v4l2-tpg: array index could become negative
KASAN: use-after-free Read in ___neigh_create C 164 100d 103d 71d 8cc196d6 neighbor: gc_list changes should be protected by table lock
net build error 2 180d 181d 81d 16fdf8ba rds: Fix build regression.
WARNING in fuse_destroy_inode C 7 126d 126d 85d 4fc4bb79 fuse: Add bad inode check in fuse_destroy_inode()
WARNING in userfaultfd_ioctl C 11 100d 109d 85d 01e881f5 userfaultfd: check VM_MAYWRITE was set after verifying the uffd is registered
KASAN: use-after-free Read in sctp_hash_transport 1 126d 124d 95d fb6df5a6 sctp: kfree_rcu asoc
KASAN: use-after-free Read in vhost_transport_send_pkt syz 36 109d 235d 95d 834e772c vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in delayed_uprobe_remove C 2 138d 142d 95d 1aed58e6 Uprobes: Fix kernel oops with delayed_uprobe_remove()
KMSAN: kernel-infoleak in _copy_to_iter (4) C 56 109d 114d 95d 68883893 rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
KASAN: invalid-free in hub_event 1 117d 117d 95d d81bb019 USB: Fix invalid-free bug in port_over_current_notify()
KASAN: use-after-free Read in sctp_epaddr_lookup_transport syz 5 126d 126d 95d fb6df5a6 sctp: kfree_rcu asoc
KASAN: use-after-free Read in vhost_work_queue syz 30 107d 207d 95d 834e772c vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_transport_cancel_pkt syz 17 134d 178d 95d 834e772c vhost/vsock: fix use-after-free in network stack callers
WARNING in alloc_pages_vma C 98 103d 107d 95d 356ff8a9 Revert "mm, thp: consolidate THP gfp handling into alloc_hugepage_direct_gfpmask"
KASAN: use-after-free Read in snd_ctl_elem_add 1 129d 127d 97d e1a7bfe3 ALSA: control: Fix race between adding and removing a user element
WARNING in cttimeout_default_get C 44 107d 126d 106d 89259088 netfilter: nfnetlink_cttimeout: fetch timeouts for udplite and gre, too
WARNING in format_decode (2) C 16 125d 208d 106d 1efb6ee3 bpf: fix check of allowed specifiers in bpf_trace_printk
KMSAN: uninit-value in linear_transfer (2) C 7 111d 134d 106d 65766ee0 ALSA: oss: Use kvzalloc() for local buffer allocations
KASAN: use-after-free Read in nbp_vlan_rcu_free 1 131d 131d 106d 9d332e69 net: bridge: fix vlan stats use-after-free on destruction
KMSAN: kernel-infoleak in kvm_write_guest_page C 36 108d 135d 106d bcbfbd8e KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
BUG: GPF in non-whitelisted uaccess (non-canonical address?) C 10 125d 131d 106d 8c01db76 HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges
KASAN: slab-out-of-bounds Write in queue_stack_map_push_elem C 30 115d 118d 106d 813961de bpf: fix integer overflow in queue_stack_map
WARNING in bpf_check (2) C 9 128d 128d 106d afd59424 bpf: fix off-by-one error in adjust_subprog_starts
INFO: task hung in fuse_sb_destroy C 2 142d 142d 106d 7fabaf30 fuse: fix leaked notify reply
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl C 31 111d 126d 106d 7f9ad1df KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
general protection fault in icmp_timeout_obj_to_nlattr C 13 139d 143d 130d 8866df92 netfilter: nfnetlink_cttimeout: pass default timeout policy to obj_to_nlattr
general protection fault in addr_resolve C 32 166d 183d 130d fe33507e RDMA/core: Check error status of rdma_find_ndev_for_src_ip_rcu
KMSAN: uninit-value in synaptics_detect C 137 131d 183d 130d f39f8688 Input: synaptics - avoid using uninitialized variable when probing
BUG: unable to handle kernel NULL pointer dereference in sha256_mb_mgr_get_comp_job_avx2 1 164d 164d 130d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
KMSAN: uninit-value in dev_mc_add_excl C 13 135d 147d 130d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KASAN: stack-out-of-bounds Read in __aa_lookupn_ns C 52 146d 178d 130d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
KASAN: slab-out-of-bounds Read in sctp_getsockopt C 9 148d 148d 130d 71335836 sctp: check policy more carefully when getting pr status
WARNING in __put_task_struct (2) C 17 157d 166d 130d fe9bc164 RDMA/restrack: Protect from reentry to resource return path
KASAN: invalid-free in p9stat_free C 3 209d 209d 130d 62e39417 9p: clear dangling pointers in p9stat_free 81c99089 v9fs_dir_readdir: fix double-free on p9stat_read error
possible deadlock in ovl_copy_up_start 2 148d 156d 130d 6cd07870 ovl: fix recursive oi->lock in ovl_link()
KASAN: use-after-free Read in sha_complete_job 1 170d 168d 130d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
BUG: corrupted list in cpu_stop_queue_work C 24 249d 259d 130d 552446a4 shmem: Convert shmem_add_to_page_cache to XArray
KMSAN: uninit-value in dev_uc_add_excl C 20 142d 183d 130d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
general protection fault in rb_erase C 79836 138d 178d 130d 18aded17 ext4: fix EXT4_IOC_SWAP_BOOT
KASAN: use-after-free Read in tcf_block_find C 27 172d 178d 130d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KASAN: use-after-free Read in seq_escape 1 173d 173d 130d 33458eab ext4: fix use-after-free race in ext4_remount()'s error path
KASAN: use-after-free Read in _copy_from_iter C 12 234d 246d 130d 728356de 9p: Add refcount to p9_req_t
KASAN: use-after-free Read in gfs2_log_flush syz 14 152d 192d 130d 4c62bd9c gfs2: Don't leave s_fs_info pointing to freed memory in init_sbd
general protection fault in getname_kernel C 10 158d 166d 130d 3df629d8 gfs2_meta: ->mount() can get NULL dev_name
kernel BUG at arch/x86/mm/physaddr.c:LINE! C 10 131d 164d 130d babf4770 ovl: fix error handling in ovl_verify_set_fh()
general protection fault in __skb_flow_dissect (2) C 11 178d 186d 130d d0e13a14 flow_dissector: lookup netns by skb->sk if skb->dev is NULL
general protection fault in ctnetlink_alloc_filter C 80 180d 183d 130d 9306425b netfilter: ctnetlink: must check mark attributes vs NULL
WARNING: kmalloc bug in krealloc C 2 250d 250d 130d 61448479 mm: don't warn about large allocations for slab
KASAN: slab-out-of-bounds Read in refcount_inc_not_zero_checked 2 156d 157d 130d 5032d079 bpf: skmsg, fix psock create on existing kcm/tls port
WARNING: kmalloc bug in __v9fs_get_acl C 212 148d 256d 130d 61448479 mm: don't warn about large allocations for slab
BUG: unable to handle kernel NULL pointer dereference in blk_mq_map_swqueue C 8 157d 177d 130d e01ad46d blk-mq: fallback to previous nr_hw_queues when updating fails
KASAN: use-after-free Write in jbd2_log_do_checkpoint 1 192d 187d 130d ccd3c437 jbd2: fix use after free in jbd2_log_do_checkpoint()
WARNING: kmalloc bug in str_read C 11 152d 197d 130d 4458bba0 selinux: Add __GFP_NOWARN to allocation at str_read()
KASAN: use-after-free Read in __dev_queue_xmit (3) 11 173d 176d 130d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KMSAN: uninit-value in ip_tunnel_lookup (2) C 2 148d 149d 130d b0350d51 ip_gre: fix parsing gre header in ipgre_err
KASAN: use-after-free Read in sha512_ctx_mgr_resubmit C 4 170d 220d 130d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
kernel BUG at mm/shmem.c:LINE! C 30 257d 259d 130d 552446a4 shmem: Convert shmem_add_to_page_cache to XArray
KASAN: null-ptr-deref Read in refcount_sub_and_test_checked C 31 138d 169d 130d fda21d46 ipv6: do not leave garbage in rt->fib6_metrics
WARNING in tcp_cleanup_ulp syz 16 157d 158d 130d aadd4355 tcp, ulp: remove socket lock assertion on ULP cleanup
KASAN: use-after-free Read in sctp_outq_select_transport 1 151d 151d 130d df132eff sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer
WARNING: kmalloc bug in input_mt_init_slots C 54 149d 183d 130d 61448479 mm: don't warn about large allocations for slab
general protection fault in dev_gro_receive (2) syz 4 155d 162d 130d ece23711 net: Properly unlink GRO packets on overflow.
upstream boot error (2) 1 144d 144d 130d 153fcd5f block: brd: associate with queue until adding disk
WARNING: kmalloc bug in get_valid_checkpoint syz 2 316d 316d 130d 61448479 mm: don't warn about large allocations for slab
WARNING in tcp_close syz 284 152d 251d 130d 8873c064 tcp: do not release socket ownership in tcp_close()
BUG: corrupted list in p9_read_work syz 23 138d 250d 130d e4ca13f7 9p/trans_fd: abort p9_read_work if req status changed
general protection fault in netdev_master_upper_dev_get 1 148d 148d 130d aab456df net/neigh: fix NULL deref in pneigh_dump_table()
KASAN: use-after-free Read in kfree_skb 1 152d 152d 130d 604d415e llc: do not use sk_eat_skb()
KASAN: use-after-free Read in fuse_dev_do_read syz 19 143d 191d 130d bc78abbd fuse: Fix use-after-free in fuse_dev_do_read()
WARNING: kmalloc bug in vfs_getxattr_alloc C 9 206d 248d 130d 61448479 mm: don't warn about large allocations for slab
BUG: unable to handle kernel NULL pointer dereference in sha1_mb_mgr_get_comp_job_avx2 1 178d 178d 130d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
WARNING: kmalloc bug in bfs_fill_super C 147 313d 357d 130d 9f2df09a bfs: add sanity check at bfs_fill_super()
INFO: task hung in ext4_fallocate C 1 174d 172d 130d f18b2b83 ext4: fix argument checking in EXT4_IOC_MOVE_EXT
WARNING: refcount bug in qdisc_put 5 174d 174d 130d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KMSAN: uninit-value in vcs_read C 2343 288d 312d 134d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
kernel BUG at include/linux/skbuff.h:LINE! 3 243d 251d 143d bab2c80e nsh: set mac len based on inner packet
KASAN: use-after-free Read in sctp_id2assoc 1 170d 170d 144d b336deca sctp: fix race on sctp_id2asoc
WARNING in usb_submit_urb (3) C 58 146d 161d 144d 665c365a USB: fix the usbfs flag sanitization for control transfers
KMSAN: kernel-infoleak in _copy_to_iter (3) C 36 145d 156d 144d b06f9d9f tipc: fix info leak from kernel tipc_event
KASAN: use-after-free Read in inet6_mc_check 1 161d 161d 144d dc012f36 ipv6: mcast: fix a use-after-free in inet6_mc_check
KASAN: slab-out-of-bounds Read in fscache_alloc_cookie C 1936 156d 257d 144d 1ff22883 fscache: Fix incomplete initialisation of inline key space fa520c47 fscache: Fix out of bound read in long cookie keys
KASAN: use-after-free Read in __llc_lookup_established 1 164d 163d 144d 5a8e7aea llc: set SOCK_RCU_FREE in llc_sap_add_socket()
KASAN: slab-out-of-bounds Read in vhci_hub_control C 43 155d 199d 144d 81f7567c usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control()
BUG: sleeping function called from invalid context at net/core/dev.c:LINE syz 8 157d 166d 144d cee27167 xsk: do not call synchronize_net() under RCU read lock
KASAN: slab-out-of-bounds Read in _decode_session6 C 35 144d 202d 144d 9f7e43da net/xfrm: fix out-of-bounds packet access
INFO: rcu detected stall in mousedev_write 18 197d 212d 156d f74c371f Input: mousedev - add a schedule point in mousedev_write()
kernel BUG at net/core/dev.c:LINE! (2) syz 2 164d 164d 156d 52b5d6f5 net: make skb_partial_csum_set() more robust against overflows
KASAN: use-after-free Read in finish_task_switch C 3047 180d 225d 158d 26b471c7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
WARNING in __skb_flow_dissect syz 3 163d 164d 162d af3fb24e tun: napi flags belong to tfile
general protection fault in dev_gro_receive syz 8 164d 176d 163d af3fb24e tun: napi flags belong to tfile
possible deadlock in flush_workqueue C 73762 170d 212d 163d d4859d74 net-backports: bonding: avoid possible dead-lock
KASAN: use-after-free Read in rawv6_sendmsg C 84 164d 196d 163d a688caa3 net-backports: ipv6: take rcu lock in rawv6_send_hdrinc()
possible deadlock in rtnetlink_rcv_msg 1 186d 186d 163d d4859d74 net-backports: bonding: avoid possible dead-lock
KASAN: slab-out-of-bounds Read in string (2) 14 169d 176d 163d 601350ff ovl: fix access beyond unterminated strings
WARNING in pcpu_alloc C 4 164d 172d 163d b0584ea6 bpf: don't accept cgroup local storage with zero value size
KASAN: use-after-free Write in ucma_put_ctx syz 11 178d 197d 163d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
general protection fault in usb_find_alt_setting (2) C 53 179d 200d 163d c9a4cb20 USB: handle NULL config in usb_find_alt_setting()
INFO: trying to register non-static key in tun_chr_write_iter 14 164d 176d 163d c7256f57 tun: initialize napi_mutex unconditionally
WARNING in rollback_registered_many 1 174d 174d 163d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
KASAN: use-after-free Read in ip_cmsg_recv_offset C 9 172d 175d 163d 64199fc0 net-backports: ipv4: fix use-after-free in ip_cmsg_recv_dstaddr()
possible deadlock in team_vlan_rx_add_vid syz 5 192d 226d 163d 471b83bd team: Forbid enslaving team device to itself
general protection fault in ubifs_mount C 216 183d 200d 163d 37f31b6c ubifs: Check for name being NULL while mounting
KMSAN: uninit-value in ip6_tnl_start_xmit C 69 176d 187d 163d 76c0ddd8 ip6_tunnel: be careful when accessing the inner header
KASAN: use-after-free Read in destroy_async_on_interface C 134 179d 200d 163d bd729f9d USB: fix error handling in usb_driver_claim_interface()
WARNING in usb_submit_urb (2) C 259 163d 200d 163d 7a68d9fb USB: usbdevfs: sanitize flags more
INFO: task hung in unregister_netdevice_notifier (2) 1 172d 172d 163d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
KASAN: use-after-free Read in cma_bind_port syz 2 192d 197d 163d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KMSAN: uninit-value in pppoe_rcv C 2 322d 192d 163d 8540827e pppoe: fix reception of frames with no mac header
INFO: task hung in rollback_registered_many 4 166d 174d 163d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
WARNING: suspicious RCU usage in inet_csk_route_req C 43 170d 405d 163d 1ad98e9d tcp/dccp: fix lockdep issue when SYN is backlogged
KMSAN: kernel-infoleak in _copy_to_iter (2) C 7 171d 199d 166d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
general protection fault in rhashtable_walk_start_check C 112 191d 202d 177d 8f5c5fcf tipc: call start and done ops directly in __tipc_nl_compat_dumpit()
WARNING in try_charge syz 649 177d 231d 177d 3100dab2 mm: memcontrol: print proper OOM header when no eligible victim left
divide error in nbd_ioctl C 50 192d 200d 177d bc811f05 nbd: don't allow invalid blocksize settings
WARNING in apparmor_secid_to_secctx C 3344 190d 205d 177d edf4e7b7 apparmor: fix bad debug check in apparmor_secid_to_secctx()
KASAN: use-after-free Read in ceph_destroy_options 1 213d 212d 177d 8aaff151 ceph: avoid a use-after-free in ceph_destroy_options()
general protection fault in ovl_free_fs C 4 195d 197d 177d 8c25741a ovl: fix oopses in ovl_fill_super() failure paths
KMSAN: uninit-value in snd_midi_event_encode_byte C 3 201d 201d 177d 5a7b44a8 ALSA: rawmidi: Initialize allocated buffers
KASAN: use-after-free Read in __rhashtable_lookup (2) C 22 192d 212d 177d cc4dfb7f rds: fix two RCU related problems
general protection fault in rhashtable_walk_exit C 8 191d 194d 177d 12a78b02 tipc: check return value of __tipc_dump_start()
KASAN: use-after-free Read in sock_i_ino syz 127 190d 200d 177d 0a3b8b2b tipc: orphan sock in tipc_release()
BUG: unable to handle kernel paging request in kfree (2) C 297 205d 257d 180d 7913690d net/9p/client.c: version pointer uninitialized
KMSAN: uninit-value in memcmp (2) C 131 191d 182d 180d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
KASAN: use-after-free Write in ip6_dst_destroy 1 258d 258d 191d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KASAN: stack-out-of-bounds Read in fib_table_lookup 1 250d 250d 193d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in wiphy_register (2) C 8 218d 220d 193d 48400433 mac80211_hwsim: require at least one channel
KASAN: use-after-free Read in tipc_group_fill_sock_diag syz 35 199d 216d 193d 9a07efa9 tipc: switch to rhashtable iterator
KASAN: global-out-of-bounds Read in ip6_xmit 2 373d 374d 193d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
WARNING in __fsnotify_recalc_mask syz 9 215d 217d 193d d3bc0fa8 fsnotify: fix false positive warning on inode delete
KASAN: use-after-free Read in sctp_transport_get_next C 6 208d 211d 193d bab1be79 sctp: hold transport before accessing its asoc in sctp_transport_get_next
KASAN: stack-out-of-bounds Read in __schedule syz 4 204d 207d 193d b845c898 bpf, sockmap: fix sock_hash_alloc and reject zero-sized keys
BUG: soft lockup in shrink_dcache_parent (2) 7 285d 292d 194d 4fb48871 restore cond_resched() in shrink_dcache_parent()
INFO: task hung in fsnotify_mark_destroy_workfn syz 13 225d 339d 196d 128f3804 android: binder: Rate-limit debug and userspace triggered err msgs
KASAN: use-after-free Read in ip6_tnl_start_xmit 1 326d 326d 198d b84bbaf7 packet: in packet_snd start writing at link layer allocation
INFO: rcu detected stall in snd_pcm_oss_prepare 4 347d 349d 199d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
WARNING in up_write C 725 306d 354d 199d d7d760ef locking/rwsem: Add a new RWSEM_ANONYMOUSLY_OWNED flag
BUG: soft lockup in d_walk C 163 285d 330d 199d 4fb48871 restore cond_resched() in shrink_dcache_parent()
general protection fault in vsscanf C 7 225d 255d 201d 10aa1452 9p: fix multiple NULL-pointer-dereferences
net-next boot error 66 235d 240d 206d ca9e83b4 virtio-net: correctly update XDP_TX counters
WARNING in input_alloc_absinfo C 318 209d 282d 206d 100294ce Input: do not use WARN() in input_alloc_absinfo()
KASAN: use-after-free Read in ip6_hold_safe C 1 233d 233d 206d 6d37fa49 l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
KASAN: use-after-free Read in iotlb_access_ok 1 232d 228d 206d b13f9c63 vhost: reset metadata cache when initializing new IOTLB
general protection fault in process_init_reply C 24 213d 248d 206d e8f3bd77 fuse: Fix oops at process_init_reply()
WARNING: suspicious RCU usage in bpf_prog_array_copy_core C 22873 207d 221d 206d 965931e3 bpf: fix a rcu usage warning in bpf_prog_array_copy_core()
WARNING: lock held when returning to user space in fuse_lock_inode C 1439 213d 254d 206d 63576c13 fuse: fix initial parallel dirops
WARNING: refcount bug in llc_sap_find C 18 226d 228d 206d 0dcb8225 llc: use refcount_inc_not_zero() for llc_sap_find()
possible deadlock in rhashtable_lookup_insert_fast C 28 218d 221d 206d ff93bca7 ila: make lockdep happy again
KASAN: slab-out-of-bounds Write in crypto_dh_encode_key C 1401 229d 257d 206d 35f7d522 crypto: dh - fix calculating encoded key size
KASAN: slab-out-of-bounds Read in _autofs_dev_ioctl C 5 219d 220d 206d 0633da48 autofs: fix autofs_sbi() does not check super block type
KASAN: use-after-free Write in ip6_hold_safe C 25 230d 241d 206d 6d37fa49 l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
general protection fault in validate_checkpoint 186 233d 234d 206d d3f07c04 f2fs: fix invalid memory access
BUG: soft lockup in snd_virmidi_output_trigger 3 246d 348d 206d 50e9ffb1 ALSA: virmidi: Fix too long output trigger loop
general protection fault in send_sigurg_to_task C 6 219d 222d 206d 84fe4cc0 signal: Don't send signals to tasks that don't exist
KASAN: slab-out-of-bounds Write in eth_header_parse C 7 225d 238d 206d 4576cd46 packet: refine ring v3 block size test to hold one frame
WARNING in __snd_rawmidi_transmit_ack (2) C 6 213d 221d 206d 82fd4b05 ALSA: seq: virmidi: Fix discarding the unsubscribed output
general protection fault in send_sigio_to_task C 176 218d 222d 206d 84fe4cc0 signal: Don't send signals to tasks that don't exist
KASAN: use-after-free Read in do_shrink_slab 9 213d 216d 206d 8df4a44c mm: check shrinker is memcg-aware in register_shrinker_prepared()
KMSAN: uninit-value in do_msgrcv C 8 207d 283d 206d 39cfffd7 ipc/util.c: use ipc_rcu_putref() for failues in ipc_addid() 615c999c ipc: compute kern_ipc_perm.id under the ipc lock e2652ae6 ipc: reorganize initialization of kern_ipc_perm.seq
WARNING: ODEBUG bug in vsock_stream_connect C 42 226d 236d 206d 455f05ec vsock: split dwork to avoid reinitializations
KASAN: slab-out-of-bounds Read in pdu_read C 267 222d 257d 206d f984579a 9p: validate PDU length 7913690d net/9p/client.c: version pointer uninitialized
WARNING in close_fs_devices C 137 248d 291d 206d 81ffd56b btrfs: fix mount and ioctl device scan ioctl race
general protection fault in string (2) 1 232d 232d 206d a6bcfc89 net: check extack._msg before print
general protection fault in p9_fd_create_unix C 4 253d 256d 206d 10aa1452 9p: fix multiple NULL-pointer-dereferences
general protection fault in mount_fs C 1 352d 352d 206d 7464726c hfsplus: don't return 0 when fill_super() failed
general protection fault in open_fs_devices C 8 258d 290d 206d 81ffd56b btrfs: fix mount and ioctl device scan ioctl race
general protection fault in smc_ioctl (3) C 15 226d 227d 206d 7311d665 net/smc: move sock lock in smc_ioctl()
KASAN: slab-out-of-bounds Write in vmac_final C 2 284d 280d 206d bb296481 crypto: vmac - separate tfm and request context
BUG: corrupted list in p9_fd_cancel C 34 243d 257d 206d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
general protection fault in smc_tx_prepared_sends C 7 231d 233d 206d 7311d665 net/smc: move sock lock in smc_ioctl()
KASAN: use-after-free Read in p9_poll_workfn C 148 218d 257d 206d 430ac66e net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
WARNING: bad usercopy in __kvm_write_guest_page C 4 307d 300d 210d 0a06d425 KVM: vmx: use local variable for current_vmptr when emulating VMPTRST
WARNING in refcount_inc (3) C 7 355d 356d 210d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Write in irq_bypass_register_consumer C 1632 247d 508d 210d b5020a8e KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel.
KASAN: slab-out-of-bounds Write in process_preds C 6020 270d 346d 210d 70303420 tracing: Check for no filter when processing event filters
kernel BUG at net/ipv6/route.c:LINE! C 197 229d 251d 226d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
possible deadlock in bond_get_stats C 11 233d 237d 226d 7e2556e4 bonding: avoid lockdep confusion in bond_get_stats()
kernel BUG at mm/memory.c:LINE! 1 258d 257d 226d bfd40eaf mm: fix vma_is_anonymous() false-positives
WARNING in __ip6_make_skb C 1 251d 251d 226d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
general protection fault in tcp_gso_segment 1 252d 252d 226d ff907a11 net: skb_segment() should not return NULL
KASAN: use-after-free Read in refcount_sub_and_test_checked 3 232d 233d 226d e6aed040 Revert "net/ipv6: fix metrics leak"
WARNING in ip6_sk_dst_lookup_flow C 2 232d 249d 226d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in __nf_conntrack_find_get C 67 242d 249d 226d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
KASAN: invalid-free in fat_fill_super 1 255d 254d 226d 35033ab9 fat: fix memory allocation failure handling of match_strdup()
WARNING in ip6_setup_cork C 4 231d 251d 226d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: kernel-infoleak in put_cmsg C 3 259d 249d 226d 2efd4fca ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
BUG: unable to handle kernel paging request in neigh_update 1 246d 246d 226d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in gc_worker 10 243d 254d 226d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
kernel BUG at fs/userfaultfd.c:LINE! (2) C 8 232d 250d 226d 31e810aa userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KASAN: use-after-free Write in dst_release (2) C 3 232d 233d 226d e6aed040 Revert "net/ipv6: fix metrics leak"
KMSAN: kernel-infoleak in _copy_to_iter C 285 242d 278d 226d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
general protection fault in __delayacct_blkio_end C 50 242d 338d 226d b512719f delayacct: fix crash in delayacct_blkio_end() after delayacct init failure
unregister_netdevice: waiting for DEV to become free C 170521 226d 338d 226d 8cc88773 xfrm: fix missing dst_release() after policy blocking lbcast and multicast
general protection fault in rds_ib_get_mr C 9 268d 367d 226d 9e630bcb RDS: RDMA: Fix the NULL-ptr deref in rds_ib_get_mr
KASAN: out-of-bounds Read in bpf_test_finish 9 250d 257d 228d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: slab-out-of-bounds Read in ipv6_gso_pull_exthdrs C 4 266d 282d 228d bab2c80e nsh: set mac len based on inner packet
KASAN: stack-out-of-bounds Read in __d_lookup_rcu 1 247d 247d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING: refcount bug in smap_release_sock C 55 244d 282d 228d 7ebc14d5 bpf: sockmap, consume_skb in close path 547b3aa4 bpf: sockmap, error path can not release psock in multi-map case
KASAN: stack-out-of-bounds Read in __handle_mm_fault (2) C 3 245d 247d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in vma_interval_tree_insert (2) 1 242d 242d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in kernfs_find_ns 1 247d 247d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in __snd_rawmidi_transmit_ack syz 2 250d 250d 228d 39675f7a ALSA: rawmidi: Change resized buffers atomically
KASAN: stack-out-of-bounds Read in rb_next (2) 1 247d 247d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in scheduler_tick C 1 257d 257d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in neigh_flush_dev 1 253d 251d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in copy_page_range 1 247d 247d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __cgroup_account_cputime_field 1 247d 247d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in debug_check_no_obj_freed (5) 4 243d 250d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in unmap_page_range (3) 1 243d 243d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in cpuacct_account_field (2) 1 245d 244d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in lock_sock_nested 1 250d 250d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in netlink_has_listeners 1 250d 250d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel NULL pointer dereference in corrupted (2) C 1 248d 248d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: slab-out-of-bounds Read in corrupted C 1 248d 248d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in cpuacct_charge 1 242d 242d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in bpf_tcp_close C 1 247d 247d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in update_blocked_averages 1 253d 253d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KMSAN: uninit-value in af_alg_free_areq_sgls C 640 242d 349d 228d 2546da99 crypto: af_alg - Initialize sg_num_bytes in error code path
WARNING in bpf_check 3 248d 254d 228d c7a89784 bpf: don't leave partial mangled prog in jit_subprogs error path
KASAN: stack-out-of-bounds Read in __enqueue_entity 1 252d 252d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in account_system_index_time C 2 250d 257d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in sctp_assoc_update_frag_point 5 248d 270d 228d a6592547 sctp: fix the issue that pathmtu may be set lower than MINSEGMENT
kernel BUG at mm/slab.c:LINE! (2) C 701 242d 257d 228d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: stack-out-of-bounds Read in __task_pid_nr_ns 1 256d 256d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in locks_remove_posix C 1 245d 244d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in get_mem_cgroup_from_mm 1 255d 255d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in change_protection 1 250d 250d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in do_debug (2) 1 248d 248d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __delayacct_add_tsk 1 255d 255d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in __sock_release 1 247d 246d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in add_wait_queue C 1 257d 257d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in ext4_symlink 1 251d 250d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
INFO: rcu detected stall in vprintk_emit syz 2 264d 270d 228d 3bc53be9 net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL.
WARNING: refcount bug in smc_tcp_listen_work 1 290d 290d 228d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
WARNING in set_precision C 140 247d 288d 228d c604cb76 KEYS: DNS: fix parsing multiple options
BUG: unable to handle kernel paging request in cpuacct_charge syz 2 249d 249d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __acct_update_integrals 2 245d 253d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: use-after-free Read in ipv6_gso_pull_exthdrs C 5 246d 278d 228d bab2c80e nsh: set mac len based on inner packet
general protection fault in rb_next 1 249d 248d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Write in __tlb_remove_page_size 1 244d 243d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in timerqueue_add C 4 245d 262d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in rb_insert_color (2) 1 252d 252d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __tlb_remove_page_size 1 245d 244d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in enqueue_task_fair 1 248d 248d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel paging request in account_system_index_time 1 246d 244d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in find_inode_nowait 1 257d 257d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in iov_iter_revert C 74 247d 314d 228d 32da1221 tls: Stricter error checking in zerocopy sendmsg path
general protection fault in smc_ioctl (2) C 43 228d 251d 228d 1992d998 net/smc: take sock lock in smc_ioctl()
KASAN: stack-out-of-bounds Read in tlb_flush_mmu_free 2 254d 256d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in do_tcp_getsockopt C 9 246d 258d 228d 6508b678 tcp: cleanup copied_seq and urg_data in tcp_disconnect
KASAN: use-after-free Read in bpf_test_finish C 1211 242d 257d 228d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: use-after-free Write in skb_release_data C 1903 302d 354d 228d 993675a3 packet: reset network header if packet shorter than ll reserved space
KASAN: stack-out-of-bounds Read in rcu_process_callbacks C 1 251d 251d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel paging request in ttwu_do_activate 1 261d 261d 228d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in smc_unhash_sk C 155731 230d 393d 228d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
kernel BUG at net/packet/af_packet.c:LINE! (3) syz 5 378d 425d 236d a6361f0c packet: fix bitfield update race
KASAN: slab-out-of-bounds Read in getname_kernel C 8 252d 352d 242d 02f51d45 autofs: fix slab out of bounds read in getname_kernel()
kernel BUG at mm/gup.c:LINE! syz 4 264d 262d 242d 24962af7 fs, elf: make sure to page align bss in load_elf_library bb177a73 mm: do not bug_on on incorrect length in __mm_populate()
KASAN: global-out-of-bounds Write in string C 7 297d 354d 242d fe10e398 reiserfs: fix buffer overflow with long warning messages
KASAN: use-after-free Read in l2tp_session_create 119 364d 430d 245d 6b9f3423 l2tp: fix races in tunnel creation
KMSAN: uninit-value in ip_tunnel_xmit C 2594 249d 335d 249d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in br_nf_forward_arp 1 295d 292d 249d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: kernel-infoleak in vcs_read C 531 278d 288d 253d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
WARNING: suspicious RCU usage in fib6_info_alloc syz 2 339d 338d 256d 27b10608 net/ipv6: Fix gfp_flags arg to addrconf_prefix_route
WARNING in kernfs_add_one C 174 257d 322d 256d 84d0c27d driver core: Don't ignore class_dir_create_and_add() failure.
INFO: rcu detected stall in unwind_next_frame 2 306d 309d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
BUG: unable to handle kernel paging request in dput C 26 288d 291d 256d d85b399b fix proc_fill_cache() in case of d_alloc_parallel() failure
general protection fault in fuse_ctl_remove_conn C 16 291d 330d 256d 6becdb60 fuse: fix control dir setup and teardown
WARNING in bpf_int_jit_compile syz 11 264d 301d 256d 9facc336 bpf: reject any prog that failed read-only lock
possible deadlock in sock_hash_free C 45 298d 298d 256d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
possible deadlock in __might_fault (2) C 20 326d 330d 256d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
KMSAN: uninit-value in _copy_to_iter (2) C 226 288d 334d 256d 670ae9ca vhost: fix info leak due to uninitialized memory
BUG: unable to handle kernel NULL pointer dereference in do_select 45 267d 267d 256d e88958e6 net: handle NULL ->poll gracefully
kernel BUG at fs/f2fs/inode.c:LINE! C 1 336d 336d 256d 5d64600d f2fs: avoid bug_on on corrupted inode
WARNING: ODEBUG bug in sock_hash_free 1 271d 270d 256d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
KASAN: slab-out-of-bounds Write in sha512_final C 21 269d 287d 256d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in rmd320_final C 44 269d 288d 256d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in kmem_cache_alloc_node_trace 1 344d 326d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Read in bpf_csum_update C 2 294d 292d 256d 58990d1f bpf: reject passing modified ctx to helper functions
KMSAN: uninit-value in ip_vs_lblcr_check_expire 2050 257d 334d 256d 3aa1409a ipvs: initialize tbl->entries after allocation
general protection fault in wb_workfn (2) 38 276d 301d 256d 3ee7e869 bdi: Fix another oops in wb_workfn()
INFO: rcu detected stall in is_bpf_text_address C 1 308d 308d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in __vfs_write syz 14 285d 288d 256d 66e58e0e bpfilter: fix race in pipe access
general protection fault in pipe_write syz 1 288d 288d 256d 66e58e0e bpfilter: fix race in pipe access
possible deadlock in tcp_mmap C 1908 326d 330d 256d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
KASAN: use-after-free Read in bpf_skb_change_proto 1 287d 286d 256d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: use-after-free Write in prb_fill_curr_block C 2 295d 295d 256d eb73190f net/packet: refine check for priv area size
kernel BUG at fs/f2fs/node.c:LINE! C 1 336d 336d 256d a4f843bd f2fs: give message and set need_fsck given broken node id
WARNING in skb_warn_bad_offload (2) C 6 329d 329d 256d a8c744a8 udp: disable gso with no_check_tx
BUG: unable to handle kernel NULL pointer dereference in ep_item_poll C 15 267d 267d 256d e88958e6 net: handle NULL ->poll gracefully
WARNING in bpf_prog_select_runtime syz 45 281d 282d 256d 9facc336 bpf: reject any prog that failed read-only lock
KASAN: slab-out-of-bounds Read in bpf_skb_vlan_push syz 2 283d 283d 256d 58990d1f bpf: reject passing modified ctx to helper functions
WARNING: kernel stack regs has bad 'bp' value (3) C 7971 258d 414d 256d b7b73cd5 crypto: x86/salsa20 - remove x86 salsa20 implementations
general protection fault in __vfs_write syz 25 285d 289d 256d 66e58e0e bpfilter: fix race in pipe access
INFO: task hung in n_tty_flush_buffer 6 265d 339d 256d ebec3f8f n_tty: Access echo_* variables carefully.
KASAN: use-after-free Read in skb_ensure_writable C 4 286d 292d 256d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: use-after-free Read in build_segment_manager C 5 336d 337d 256d 8a29c126 f2fs: sanity check for total valid node blocks
KASAN: use-after-free Read in bpf_tcp_close C 1748 262d 301d 256d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
KMSAN: uninit-value in nfqnl_recv_config (2) C 10 270d 285d 256d ba062ebb netfilter: nf_queue: augment nfqa_cfg_policy
KASAN: use-after-free Read in pipe_read C 3 287d 288d 256d 66e58e0e bpfilter: fix race in pipe access
KASAN: slab-out-of-bounds Read in crypto_morus640_decrypt_chunk C 8 276d 283d 256d a81ae809 crypto: morus640 - Fix out-of-bounds access
WARNING in perf_trace_buf_alloc (2) C 22 397d 502d 256d 4d220ed0 bpf: remove tracepoints from bpf core
KASAN: use-after-free Read in finish_wait 8 286d 288d 256d 66e58e0e bpfilter: fix race in pipe access
BUG: unable to handle kernel paging request in bpf_prog_select_runtime 1 272d 272d 256d 85782e03 bpf: undo prog rejection on read-only lock failure
WARNING: kmalloc bug in xdp_umem_create C 7 280d 286d 256d a343993c xsk: silence warning on memory allocation failure
KASAN: use-after-free Write in tls_push_record C 24 257d 302d 256d a447da7d tls: fix use-after-free in tls_push_record
KASAN: use-after-free Read in fib6_table_lookup 1 279d 278d 256d 9b0a8da8 net/ipv6: respect rcu grace period before freeing fib6_info
INFO: rcu detected stall in skb_free_head 4 295d 328d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in __kernel_write syz 7 285d 288d 256d 66e58e0e bpfilter: fix race in pipe access
WARNING in ion_dma_buf_begin_cpu_access C 62 264d 286d 256d 0a2bc003 staging: android: ion: Return an ERR_PTR in ion_map_kernel
WARNING: lock held when returning to user space! (2) C 9 317d 318d 256d 9e575010 net/ipv6: fix lock imbalance in ip6_route_del()
INFO: rcu detected stall in corrupted syz 1 306d 305d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: rcu detected stall in ip_route_output_key_hash 2 307d 311d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KMSAN: uninit-value in ebt_stp_mt_check (2) C 222 256d 288d 256d c568503e netfilter: x_tables: initialise match/target check parameter struct
kernel BUG at fs/f2fs/segment.c:LINE! syz 1 336d 336d 256d 8a29c126 f2fs: sanity check for total valid node blocks
BUG: unable to handle kernel NULL pointer dereference in corrupted C 5 288d 288d 256d c0129a06 smc: convert to ->poll_mask
KMSAN: uninit-value in eth_mac_addr 2 259d 292d 256d 644c7eeb rtnetlink: validate attributes in do_setlink()
KASAN: slab-out-of-bounds Write in tgr192_final C 30 269d 287d 256d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in wp384_final C 27 269d 288d 256d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in dev_queue_xmit_nit 1 302d 302d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Write in crypto_sha3_final C 68 269d 288d 256d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto C 2 286d 286d 256d 58990d1f bpf: reject passing modified ctx to helper functions
BUG: unable to handle kernel paging request in build_segment_manager C 1 337d 336d 256d b2ca374f f2fs: sanity check on sit entry
KASAN: null-ptr-deref Write in simple_write_to_buffer C 5 297d 322d 256d fc14eebf PM / hibernate: Fix oops at snapshot_write()
INFO: rcu detected stall in sctp_packet_transmit 1 311d 311d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
general protection fault in touch_atime syz 6 285d 288d 256d 66e58e0e bpfilter: fix race in pipe access
WARNING: possible circular locking dependency detected (4) C 27 330d 337d 256d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
BUG: delta (-6195) <= 0 at net/dccp/ccids/ccid3.c:LINE/ccid3_hc_rx_send_feedback() 1 274d 274d 256d 74174fe5 net: dccp: avoid crash in ccid3_hc_rx_send_feedback()
INFO: rcu detected stall in sctp_chunk_put 1 295d 295d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Read in ip6_xmit (3) C 69 262d 304d 256d 9901c5d7 bpf: sockmap, fix crash when ipv6 sock is added
KASAN: slab-out-of-bounds Read in skb_ensure_writable C 9 283d 292d 256d 58990d1f bpf: reject passing modified ctx to helper functions
INFO: rcu detected stall in sctp_generate_heartbeat_event 2 309d 319d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in bpf_csum_update C 1 294d 292d 256d 58990d1f bpf: reject passing modified ctx to helper functions
BUG: soft lockup in do_raw_spin_unlock (2) 1 285d 285d 256d 4fb48871 restore cond_resched() in shrink_dcache_parent()
BUG: unable to handle kernel paging request in bpf_int_jit_compile syz 2 269d 272d 256d 85782e03 bpf: undo prog rejection on read-only lock failure
general protection fault in __mnt_want_write 1 286d 286d 256d 66e58e0e bpfilter: fix race in pipe access
KASAN: use-after-free Write in bpf_tcp_close C 67 264d 299d 256d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
general protection fault in bpf_tcp_close C 421 257d 301d 256d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close 54fedb42 bpf: sockmap, fix smap_list_map_remove when psock is in many maps
general protection fault in smc_ioctl C 5214 279d 308d 256d 2351abe6 net/smc: return 0 for ioctl calls in states INIT and CLOSED
INFO: rcu detected stall in kfree_skbmem 4 296d 326d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: task hung in tty_set_termios 1 358d 356d 256d ebec3f8f n_tty: Access echo_* variables carefully.
bpf-next boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 3 289d 291d 256d bf956be5 umh: fix race condition
WARNING in do_dentry_open C 26 280d 288d 256d b1655857 bpf: implement dummy fops for bpf objects
KASAN: slab-out-of-bounds Write in prb_fill_curr_block C 2 295d 295d 256d eb73190f net/packet: refine check for priv area size
KASAN: slab-out-of-bounds Read in build_segment_manager C 1 337d 337d 256d 8a29c126 f2fs: sanity check for total valid node blocks
KASAN: use-after-free Read in xfs_inobt_init_key_from_rec C 1 354d 354d 256d 2e050e64 xfs: fix inobt magic number check
WARNING: refcount bug in __udp_gso_segment 2 316d 316d 256d 575b65bc udp: avoid refcount_t saturation in __udp_gso_segment()
INFO: task hung in namespace_unlock 15 261d 270d 256d ebec3f8f n_tty: Access echo_* variables carefully.
KMSAN: uninit-value in rtnetlink_put_metrics syz 3 290d 292d 256d 5b5e7a0d net: metrics: add proper netlink validation
KASAN: slab-out-of-bounds Read in bpf_skb_change_head C 2 282d 282d 256d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Write in sha1_finup C 119 269d 289d 256d 3619dec5 dh key: fix rounding up KDF output length
WARNING: kmalloc bug in map_get_next_key C 5 310d 311d 256d 683d2ac3 bpf: fix sock hashmap kmalloc warning
unexpected kernel reboot (2) C 2073 257d 347d 256d 0447378a kvm: vmx: Nested VM-entry prereqs for event inj.
BUG: workqueue lockup (3) C 1215 261d 313d 256d 4fb48871 restore cond_resched() in shrink_dcache_parent()
INFO: rcu detected stall in ipv6_addr_label 1 391d 390d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
WARNING: kernel stack frame pointer has bad value C 1108 259d 338d 256d f044a84e crypto: don't optimize keccakf()
KASAN: use-after-free Read in fuse_kill_sb_blk 4 307d 327d 256d 543b8f86 fuse: don't keep dead fuse_conn at fuse_fill_super().
general protection fault in vfs_read syz 2 287d 288d 256d 66e58e0e bpfilter: fix race in pipe access
KASAN: use-after-free Read in ip6_route_mpath_notify C 25 290d 294d 256d f7225172 net/ipv6: prevent use after free in ip6_route_mpath_notify
BUG: unable to handle kernel NULL pointer dereference in do_sys_poll C 297 267d 267d 256d e88958e6 net: handle NULL ->poll gracefully
WARNING in ebt_do_table C 13 265d 290d 256d 11ff7288 netfilter: ebtables: reject non-bridge targets
WARNING in sysfs_remove_group C 11125 258d 512d 256d d3349b6b loop: remember whether sysfs_create_group() was done
KASAN: null-ptr-deref Write in xdp_umem_unaccount_pages C 25 285d 288d 256d c09290c5 bpf, xdp: fix crash in xdp_umem_unaccount_pages
WARNING: kernel stack regs at (ptrval) in syzkaller has bad 'bp' value (ptrval) C 3 333d 334d 256d f044a84e crypto: don't optimize keccakf()
KASAN: slab-out-of-bounds Write in tls_push_record 2 272d 286d 256d a447da7d tls: fix use-after-free in tls_push_record
WARNING: suspicious RCU usage in rt6_remove_exception_rt syz 1761 332d 333d 256d 091311de net/ipv6: fix LOCKDEP issue in rt6_remove_exception_rt()
INFO: task hung in blk_queue_enter C 1595 257d 329d 256d cd4a4ae4 block: don't use blocking queue entered for recursive bio submits
KASAN: use-after-free Read in skb_dequeue C 4 275d 275d 256d 945d015e net/packet: fix use-after-free
KASAN: slab-out-of-bounds Write in sha1_final C 201 269d 288d 256d 3619dec5 dh key: fix rounding up KDF output length
KASAN: use-after-free Read in corrupted C 2 311d 314d 256d 543b8f86 fuse: don't keep dead fuse_conn at fuse_fill_super().
WARNING in ion_buffer_destroy C 7901 286d 437d 256d 45ad559a staging: android: ion: Switch to pr_warn_once in ion_buffer_destroy
KASAN: slab-out-of-bounds Write in tgr160_final C 55 269d 288d 256d 3619dec5 dh key: fix rounding up KDF output length
KASAN: use-after-free Read in crypto_morus640_decrypt_chunk C 3 283d 283d 256d a81ae809 crypto: morus640 - Fix out-of-bounds access
WARNING: ODEBUG bug in del_timer (2) C 6 309d 310d 256d be7f3e59 net/smc: init conn.tx_work & conn.send_lock sooner
INFO: task hung in jbd2_journal_stop 1 352d 352d 256d ebec3f8f n_tty: Access echo_* variables carefully.
INFO: rcu detected stall in n_tty_receive_char_special C 3 328d 351d 256d 3d63b7e4 n_tty: Fix stall at n_tty_receive_char_special().
net-next boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 8 288d 300d 256d bf956be5 umh: fix race condition
KMSAN: uninit-value in ip_vs_lblc_check_expire C 1431 257d 334d 256d 8b2ebb6c ipvs: initialize tbl->entries in ip_vs_lblc_init_svc()
KASAN: null-ptr-deref Read in refcount_sub_and_test C 4 337d 338d 256d 263243d6 net/ipv6: Fix ip6_convert_metrics() bug
INFO: rcu detected stall in __ipv6_dev_get_saddr 1 297d 297d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
WARNING: suspicious RCU usage in rt6_check_expired 4 333d 334d 256d c3c14da0 net/ipv6: add rcu locking to ip6_negative_advice
INFO: rcu detected stall in blkdev_ioctl C 249 287d 462d 256d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
INFO: rcu detected stall in __save_stack_trace 3 257d 390d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: task hung in commit_echoes 1 265d 261d 256d ebec3f8f n_tty: Access echo_* variables carefully.
WARNING: kmalloc bug in memdup_user (3) C 137 310d 311d 256d 683d2ac3 bpf: fix sock hashmap kmalloc warning
KASAN: slab-out-of-bounds Write in sha512_finup C 25 269d 286d 256d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in d_walk C 25680 282d 344d 256d 4fb48871 restore cond_resched() in shrink_dcache_parent()
KASAN: use-after-free Read in pipe_wait 2 285d 286d 256d 66e58e0e bpfilter: fix race in pipe access
INFO: rcu detected stall in save_stack_trace C 1 307d 306d 256d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: rcu detected stall in __process_echoes C 326 264d 360d 256d ebec3f8f n_tty: Access echo_* variables carefully.
INFO: task hung in blk_freeze_queue C 188 258d 409d 256d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
upstream boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 5 286d 287d 256d bf956be5 umh: fix race condition
possible deadlock in bpf_tcp_close C 152 298d 299d 256d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
WARNING in arch_uprobe_analyze_insn C 2 313d 313d 256d 90718e32 uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn()
KASAN: use-after-free Read in rds_cong_queue_updates C 18168 262d 394d 256d f1693c63 rds: avoid unenecessary cong_update in loop transport c809195f rds: clean up loopback rds_connections on netns deletion
KASAN: use-after-free Read in iput C 2 339d 339d 258d 0c92c7a3 tracing: Fix bad use of igrab in trace_uprobe.c
INFO: task hung in ucma_destroy_id C 46 338d 375d 261d ef95a90a RDMA/ucma: ucma_context reference leak in error path
BUG: corrupted list in tipc_nametbl_unsubscribe C 40 319d 378d 261d c3317f4d tipc: fix unbalanced reference counter
general protection fault in kernel_sock_shutdown C 3329 335d 393d 261d 1255fcb2 net/smc: fix shutdown in state SMC_LISTEN
INFO: trying to register non-static key in tun_do_read C 28 313d 319d 277d 7063efd3 tuntap: fix use after free during release
KASAN: use-after-free Read in iptunnel_handle_offloads C 133 303d 348d 277d 9aad13b0 packet: fix reserve calculation
WARNING: suspicious RCU usage in rds_loop_conn_alloc C 34303 396d 404d 284d d4014d8c rds: do not call ->conn_alloc with GFP_KERNEL
WARNING in kcm_exit_net (3) syz 5 296d 296d 289d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
BUG: unable to handle kernel paging request in nla_strlcpy 1 297d 297d 289d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
KASAN: use-after-free Read in nla_strlcpy C 59 293d 305d 289d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
KASAN: slab-out-of-bounds Read in nla_strlcpy C 34 293d 305d 289d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
KASAN: use-after-free Read in __dev_queue_xmit (2) C 2 306d 306d 289d b84bbaf7 packet: in packet_snd start writing at link layer allocation
general protection fault in mr_mfc_find_parent 2 301d 307d 289d 66fb3325 ipmr: properly check rhltable_init() return value
KASAN: use-after-free Read in __sk_free 1 310d 309d 289d 9709020c sock_diag: fix use-after-free read in __sk_free
KASAN: use-after-free Read in timer_is_static_object 1 310d 309d 289d 2677d206 dccp: don't free ccid2_hc_tx_sock struct in dccp_disconnect()
kernel BUG at lib/string.c:LINE! (4) C 2 311d 311d 289d 52f96757 ipvs: fix buffer overflow with sync daemon and service
KASAN: use-after-free Read in sock_recv_errqueue 1 312d 312d 289d b84bbaf7 packet: in packet_snd start writing at link layer allocation
general protection fault in shmem_unused_huge_count 8 310d 313d 289d 79f546a6 fs: don't scan the inode cache before SB_BORN is set
general protection fault in kernfs_kill_sb (2) C 22 303d 315d 289d 82382ace kernfs: deal with kernfs_fill_super() failures
BUG: soft lockup in _decode_session6 C 1 315d 315d 289d d9f92772 xfrm6: avoid potential infinite loop in _decode_session6()
BUG: spinlock bad magic in tun_do_read syz 1 319d 319d 289d b196d88a tun: fix use after free for ptr_ring
kernel BUG at include/linux/mm.h:LINE! syz 68 289d 326d 289d a466ef76 x86/kexec: Avoid double free_page() upon do_kexec_load() failure
WARNING in __mutex_unlock_slowpath C 2 325d 328d 289d 7a4deea1 idr: fix invalid ptr dereference on item delete
general protection fault in __radix_tree_delete C 38 301d 328d 289d 7a4deea1 idr: fix invalid ptr dereference on item delete
KASAN: stack-out-of-bounds Write in compat_copy_entries syz 10 294d 332d 289d 94c752f9 netfilter: ebtables: handle string from userspace with care
KMSAN: uninit-value in ebt_stp_mt_check C 211 289d 334d 289d a4995684 netfilter: bridge: stp fix reference to uninitialized data
WARNING: ODEBUG bug in hfsplus_fill_super C 1 357d 356d 289d 66072c29 hfsplus: stop workqueue when fill_super() failed
KASAN: use-after-free Read in radix_tree_next_chunk C 2749 305d 356d 289d 79f546a6 fs: don't scan the inode cache before SB_BORN is set
KASAN: use-after-free Read in skb_copy_datagram_iter C 7 324d 362d 289d b84bbaf7 packet: in packet_snd start writing at link layer allocation
BUG: unable to handle kernel paging request in smc_ib_remember_port_attr C 112 306d 362d 289d d49baa7e net/smc: check for missing nlattrs in SMC_PNETID messages
KASAN: use-after-free Read in copyout C 11 306d 363d 289d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KASAN: use-after-free Read in remove_wait_queue (2) C 4 377d 388d 289d af8d3c7c ppp: remove the PPPIOCDETACH ioctl
kernel BUG at net/ipv4/tcp_output.c:LINE! (2) syz 23 320d 426d 289d 7f582b24 tcp: purge write queue in tcp_connect_init()
WARNING in dev_vprintk_emit C 77 303d 430d 289d 81459649 cfg80211: further limit wiphy names to 64 bytes
KASAN: slab-out-of-bounds Read in __ext4_check_dir_entry C 18 356d 356d 298d e40ff213 ext4: force revalidation of directory pointer after seekdir(2)
general protection fault in gfn_to_rmap syz 7 398d 508d 309d b7e31be3 KVM: x86: fix vcpu initialization with userspace lapic
KMSAN: uninit-value in move_addr_to_user (2) C 44 311d 318d 310d 09c8b971 tipc: fix one byte leak in tipc_sk_set_orig_addr()
KASAN: use-after-free Read in sctp_do_sm 2 318d 319d 310d 6910e25d sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg
BUG: bad usercopy in __check_object_size 1 320d 320d 310d 2c5d5b13 llc: better deal with too small mtu
KASAN: use-after-free Read in tls_sk_proto_close (2) C 297 315d 322d 310d 98f0a395 tls: fix use after free in tls_sk_proto_close
KMSAN: uninit-value in strcmp C 3 322d 323d 310d 94f6a80c tipc: eliminate KMSAN uninit-value in strcmp complaint
WARNING in __snd_pcm_lib_xfer syz 6 323d 325d 310d f13876e2 ALSA: pcm: Check PCM state at xfern compat ioctl
BUG: MAX_LOCK_DEPTH too low! 1 326d 326d 310d af50e4ba nsh: fix infinite loop
KASAN: use-after-free Read in perf_trace_rpc_stats_latency 1 327d 327d 310d 98eb6cf2 sunrpc: Fix latency trace point crashes
KASAN: use-after-free Read in debugfs_remove (2) 1 336d 334d 310d f53823c1 bdi: Fix use after free bug in debugfs_remove()
general protection fault in wb_workfn 63 311d 338d 310d b8b78495 bdi: Fix oops in wb_workfn()
INFO: task hung in __do_page_fault 1 342d 341d 310d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
INFO: task hung in do_vfs_ioctl 2 325d 343d 310d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
INFO: task hung in get_timespec64 1 345d 345d 310d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
INFO: task hung in handle_userfault 3 324d 347d 310d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
INFO: task hung in sock_sendmsg 1 347d 347d 310d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
INFO: task hung in do_set_master 1 350d 350d 310d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
WARNING in add_uevent_var C 5 355d 355d 310d a7cfebcb cfg80211: limit wiphy names to 128 bytes
INFO: task hung in wb_shutdown (2) 5064 322d 356d 310d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
WARNING in xfrm6_tunnel_net_exit syz 14002 313d 443d 310d b48c05ab xfrm: Fix warning in xfrm6_tunnel_net_exit.
KASAN: slab-out-of-bounds Read in pfkey_add C 835 315d 462d 310d 4b66af2d af_key: Always verify length of provided sadb_key
KMSAN: uninit-value in __sctp_v6_cmp_addr C 1109 311d 312d 310d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt C 9 311d 316d 311d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
kernel BUG at kernel/softirq.c:LINE! 1 324d 324d 311d a8d7aa17 dccp: fix tasklet usage
KMSAN: uninit-value in put_cmsg C 2 325d 324d 311d eb80ca47 rds: do not leak kernel memory to user land
WARNING: ODEBUG bug in del_timer C 200 311d 328d 311d 784813ae net/smc: restrict non-blocking connect finish
KMSAN: uninit-value in rt6_multipath_hash C 3 311d 329d 311d cea67a2d ipv6: fix uninit-value in ip6_multipath_l3_keys()
general protection fault in smc_set_keepalive C 6 327d 332d 311d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
KASAN: slab-out-of-bounds Read in __sctp_v6_cmp_addr C 3202 322d 334d 311d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
WARNING: kobject bug in br_add_if 41 319d 346d 311d e8238fc2 bridge: check iface upper dev when setting master via ioctl 3e14c6ab kobject: don't use WARN for registration failures
WARNING in tracepoint_probe_unregister (2) 120 320d 375d 311d d66a270b tracepoint: Do not warn on ENOMEM
WARNING in tracepoint_probe_register_prio (2) C 849 311d 375d 311d d66a270b tracepoint: Do not warn on ENOMEM
general protection fault in smc_getsockopt C 577 323d 383d 311d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
general protection fault in smc_setsockopt C 504 323d 387d 311d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
general protection fault in smc_getname C 44 323d 387d 311d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
WARNING in tcp_sacktag_write_queue C 8 327d 399d 311d bf2acc94 tcp: fix TCP_REPAIR_QUEUE bound checking
WARNING in tcp_mark_head_lost C 18 320d 402d 311d 16ae6aa1 net-backports: tcp: ignore Fast Open on repair mode
WARNING: kmalloc bug in memdup_user (2) 1 362d 361d 313d 5f3e3b85 RDMA/ucma: Correct option size check using optlen
WARNING: suspicious RCU usage in tipc_bearer_find C 21 406d 406d 313d ed4ffdfe tipc: Fix missing RTNL lock protection during setting link properties
KASAN: slab-out-of-bounds Read in clusterip_tg_check C 22 412d 418d 313d 1a38956c netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check()
general protection fault in account_system_index_time C 2 360d 360d 313d ae474573 net: Fix untag for vlan packets without ethernet header
general protection fault in rdma_addr_size C 2 371d 364d 313d e8980d67 RDMA/ucma: Ensure that CM_ID exists prior to access it
INFO: trying to register non-static key in del_timer_sync C 89 392d 418d 313d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
BUG: unable to handle kernel paging request in memset_erms (2) C 11 412d 427d 313d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
BUG: unable to handle kernel paging request in cgroup_mt_destroy_v1 C 3 415d 415d 314d ba7cd5d9 netfilter: xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
KASAN: null-ptr-deref Write in linear_transfer C 116 359d 442d 314d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KASAN: use-after-free Write in xt_rateest_put C 7 416d 418d 314d 7dc68e98 netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert
BUG: workqueue lockup (2) C 406 317d 475d 314d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
WARNING: bad unlock balance in xfs_iunlock C 1 354d 354d 318d 8241f7f9 xfs: don't iunlock the quota ip when quota block
KASAN: out-of-bounds Read in ip6_xmit 2 377d 418d 318d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
KASAN: use-after-free Read in work_is_static_object 3 423d 439d 318d 2cc683e8 kcm: lock lower socket in kcm_attach
KASAN: use-after-free Read in ip6_xmit C 5174 365d 443d 318d c113187d tls: Use correct sk->sk_prot for IPV6
KASAN: use-after-free Read in __dev_queue_xmit C 10 325d 443d 318d d0c081b4 flow_dissector: properly cap thoff field
KMSAN: uninit-value in strlcpy C 2 321d 321d 318d 537b361f vti6: better validate user provided tunnel names
inconsistent lock state in fs_reclaim_acquire C 36235 319d 330d 318d 6c1e851c random: fix possible sleeping allocation from irq context
KMSAN: uninit-value in pppoe_connect 47 319d 334d 318d a49e2f5d pppoe: check sockaddr length in pppoe_connect()
KMSAN: uninit-value in pppol2tp_connect C 13 319d 334d 318d eb1c28c0 l2tp: check sockaddr length in pppol2tp_connect()
WARNING in __might_sleep 6 331d 334d 318d 6c1e851c random: fix possible sleeping allocation from irq context
WARNING: suspicious RCU usage in crng_reseed 39 320d 334d 318d 6c1e851c random: fix possible sleeping allocation from irq context
WARNING: inconsistent lock state C 22 330d 334d 318d 6c1e851c random: fix possible sleeping allocation from irq context
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected C 2126 319d 334d 318d 6c1e851c random: fix possible sleeping allocation from irq context
KASAN: null-ptr-deref Read in refcount_inc_not_zero C 2352 332d 334d 318d 3a04ce71 llc: fix NULL pointer deref for SOCK_ZAPPED
KMSAN: uninit-value in fib6_new_table C 3 335d 335d 318d aa8f8778 ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
general protection fault in snd_rawmidi_ioctl_compat 1 346d 338d 318d 8a56ef4f ALSA: rawmidi: Fix missing input substream checks in compat ioctls
KASAN: use-after-free Read in llc_conn_tmr_common_cb 1 340d 338d 318d b905ef9a llc: delete timers synchronously in llc_sk_free()
KASAN: use-after-free Read in llc_conn_ac_send_sabme_cmd_p_set_x 1 342d 341d 318d f7e43672 llc: hold llc_sap before release_sock()
KASAN: use-after-free Read in tipc_nametbl_stop C 12 337d 341d 318d be47e41d tipc: fix use-after-free in tipc_nametbl_stop
general protection fault in __tipc_nl_net_set syz 4 340d 341d 318d c6404122 tipc: fix possible crash in __tipc_nl_net_set()
KMSAN: uninit-value in packet_set_ring C 6 325d 342d 318d 5171b37d net: af_packet: fix race in PACKET_{R|T}X_RING
KASAN: slab-out-of-bounds Write in perf_callchain_user syz 2 345d 345d 318d 5af44ca5 perf: Fix sample_max_stack maximum check
KMSAN: uninit-value in netif_skb_features C 119 319d 345d 318d 7ce23672 vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
BUG: corrupted list in team_nl_cmd_options_set C 2 342d 345d 318d 4fb0534f team: avoid adding twice the same option to the event list
BUG: unable to handle kernel paging request in snd_pcm_format_set_silence syz 11 319d 345d 318d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KMSAN: uninit-value in neigh_dump_info C 6 331d 346d 318d 7dd07c14 net: validate attribute sizes in neigh_dump_table()
KASAN: use-after-free Read in tipc_sub_unsubscribe (2) C 5 338d 346d 318d c3317f4d tipc: fix unbalanced reference counter
KASAN: stack-out-of-bounds Read in __free_filter C 41 336d 346d 318d 0b3dec05 tracing: Enforce passing in filter=NULL to create_filter()
KMSAN: uninit-value in tcp_parse_options C 38 320d 346d 318d 72123032 tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
KASAN: stack-out-of-bounds Write in ip6_tnl_locate 4 345d 346d 318d db7a65e3 ip6_tunnel: better validate user provided tunnel names
KASAN: null-ptr-deref Read in xattr_getsecurity 68 335d 347d 318d 1f578172 commoncap: Handle memory allocation failure.
KMSAN: uninit-value in inet_getpeer C 54 319d 348d 318d b6a37e5e inetpeer: fix uninit-value in inet_getpeer
KMSAN: uninit-value in sctp_sendmsg syz 27 319d 349d 318d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
KMSAN: uninit-value in sctp_do_bind C 31 319d 349d 318d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
KMSAN: uninit-value in tipc_node_get_mtu C 139 319d 349d 318d 335b929b tipc: fix missing initializer in tipc_sendmsg()
KMSAN: uninit-value in __skb_try_recv_from_queue C 108 319d 350d 318d b13dda9f net: initialize skb->peeked when cloning
KMSAN: uninit-value in inet6_rtm_delroute C 9 338d 350d 318d b1993a2d net: fix rtnh_ok()
KMSAN: uninit-value in memcmp C 30 320d 350d 318d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
KMSAN: uninit-value in inet_csk_bind_conflict C 446 319d 350d 318d 3099a529 soreuseport: initialise timewait reuseport field
KMSAN: uninit-value in move_addr_to_user C 74 319d 350d 318d 6780db24 sctp: do not leak kernel memory to user space
KMSAN: uninit-value in ip_route_output_key_hash_rcu 179 318d 350d 318d d0ea2b12 ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
KMSAN: uninit-value in fib_create_info C 19 344d 350d 318d b1993a2d net: fix rtnh_ok()
KMSAN: uninit-value in alg_bind C 1950 318d 350d 318d a466856e crypto: af_alg - fix possible uninit-value in alg_bind()
KMSAN: uninit-value in netlink_sendmsg C 2493 318d 350d 318d 6091f09c netlink: fix uninit-value in netlink_sendmsg
KMSAN: uninit-value in iptable_mangle_hook C 1134 318d 350d 318d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in ip6table_mangle_hook C 601 319d 350d 318d b855ff82 dccp: initialize ireq->ir_mark
kernel BUG at drivers/vhost/vhost.c:LINE! (2) C 139 320d 350d 318d d14d2b78 vhost: fix vhost_vq_access_ok() log check
WARNING in kmem_cache_free 1 351d 351d 318d eea0d3ea crypto: drbg - set freed buffers to NULL
WARNING: lock held when returning to user space! C 40 336d 351d 318d bdac616d loop: fix LOOP_GET_STATUS lock imbalance
INFO: rcu detected stall in io_playback_transfer 9 346d 351d 318d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
INFO: rcu detected stall in __snd_pcm_lib_xfer (2) C 1064 346d 351d 318d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
WARNING in snd_pcm_hw_params C 56 346d 351d 318d e1a3a981 ALSA: pcm: Remove WARN_ON() at snd_pcm_hw_params() error
KASAN: stack-out-of-bounds Write in ipip6_tunnel_locate C 33 344d 352d 318d b95211e0 ipv6: sit: better validate user provided tunnel names
KASAN: stack-out-of-bounds Write in __ip_tunnel_create C 29 345d 352d 318d 9cb726a2 ip_tunnel: better validate user provided tunnel names
KASAN: stack-out-of-bounds Write in ip6gre_tunnel_locate C 923 344d 352d 318d 5f42df01 ip6_gre: better validate user provided tunnel names
KASAN: use-after-free Read in binder_release_work C 6 332d 353d 318d 7aa135fc ANDROID: binder: prevent transactions into own process.
general protection fault in ucma_set_ib_path (2) C 6 346d 354d 318d 8435168d RDMA/ucma: Don't allow setting RDMA_OPTION_IB_PATH without an RDMA device
KASAN: use-after-free Write in dst_release C 832 344d 354d 318d bfacfb45 pptp: remove a buggy dst release in pptp_connect()
WARNING in ext4_superblock_csum_set C 1 355d 355d 318d a45403b5 ext4: always initialize the crc32c checksum driver
INFO: rcu detected stall in bitmap_parselist 8 327d 356d 318d 8351760f lib: fix stall in __bitmap_parselist()
kernel BUG at fs/ext4/extents.c:LINE! C 1 356d 356d 318d 349fa7d6 ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS
general protection fault in kernfs_kill_sb C 29 319d 356d 318d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Read in alloc_pid C 7 347d 356d 318d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
kernel BUG at drivers/tty/tty_ldisc.c:LINE! 6 340d 356d 318d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore(). bcdd0ca8 tty: Use __GFP_NOFAIL for tty_ldisc_get()
BUG: corrupted list in __dentry_kill C 35 336d 356d 318d 4a3877c4 rpc_pipefs: fix double-dput()
general protection fault in __list_del_entry_valid (3) C 40 357d 356d 318d b714295a tipc: Fix missing list initializations in struct tipc_subscription
WARNING: refcount bug in nfs_alloc_client 2 356d 356d 318d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
WARNING: kobject bug in gfs2_sys_fs_add C 49 330d 356d 318d 3e14c6ab kobject: don't use WARN for registration failures
WARNING: refcount bug in put_pid_ns syz 6 357d 356d 318d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
WARNING in format_decode C 1 356d 356d 318d 9ad553ab fs/reiserfs/journal.c: add missing resierfs_warning() arg
general protection fault in __mem_cgroup_free C 22 345d 356d 318d 4eaf431f memcg: fix per_node_info cleanup
WARNING in kill_block_super C 51 340d 358d 318d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Read in snd_pcm_timer_resolution C 3 358d 358d 318d a820ccbe ALSA: pcm: Fix UAF at PCM release via PCM timer access
possible deadlock in perf_event_detach_bpf_prog 1 359d 358d 318d 3a38bb98 bpf/tracing: fix a deadlock in perf_event_detach_bpf_prog
WARNING: kobject bug in device_add C 563 319d 359d 318d 3e14c6ab kobject: don't use WARN for registration failures
INFO: task hung in stop_sync_thread (2) C 9 342d 359d 318d 5c64576a ipvs: fix rtnl_lock lockups caused by start_sync_thread
possible deadlock in rtnl_lock (5) C 1009 332d 361d 318d 5c64576a ipvs: fix rtnl_lock lockups caused by start_sync_thread
general protection fault in tipc_sk_fill_sock_diag C 180 344d 362d 318d 4b2e6877 tipc: Fix namespace violation in tipc_sk_fill_sock_diag e41f0548 tipc: use the right skb in tipc_sk_fill_sock_diag()
WARNING in __debug_object_init C 192 352d 362d 318d bd031430 alarmtimer: Init nanosleep alarm timer on stack
KASAN: use-after-free Read in pppol2tp_connect (3) C 22 345d 363d 318d 6b9f3423 l2tp: fix races in tunnel creation
WARNING in __local_bh_enable_ip (2) 23 363d 373d 318d 53d0e83f rds: tcp: must use spin_lock_irq* and not spin_lock_bh with rds_tcp_conn_lock
BUG: corrupted list in sctp_association_free 1 379d 375d 318d d98985dd sctp: fix error return code in sctp_sendmsg_new_asoc()
KASAN: use-after-free Read in sctp_association_free (2) C 2 379d 378d 318d 0aee4c25 sctp: Fix double free in sctp_sendmsg_to_asoc
WARNING: kobject bug in netdev_queue_update_kobjects C 27 321d 382d 318d 3e14c6ab kobject: don't use WARN for registration failures
WARNING: refcount bug in free_nsproxy 4 358d 383d 318d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Read in mac80211_hwsim_del_radio 11 358d 387d 318d 8cfd36a0 mac80211_hwsim: fix use-after-free bug in hwsim_exit_net
WARNING: refcount bug in should_fail C 3 357d 388d 318d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
general protection fault in rds_sendmsg C 2 393d 393d 318d 79a5b972 rds: rds_msg_zcopy should return error of null rm->data.op_mmp_znotifier
general protection fault in tipc_conn_close C 3 396d 397d 318d 96c252bf tipc: fix bug on error path in tipc_topsrv_kern_subscr()
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (3) C 234 396d 399d 318d 26736a08 tipc: don't call sock_release() in atomic context
WARNING in strp_done C 2336 353d 402d 318d dff8baa2 kcm: Call strp_stop before strp_done in kcm_attach
general protection fault in loopback_pos_update C 4 427d 424d 318d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
INFO: task hung in __blkdev_get C 662 343d 469d 318d 1e047eaa block/loop: fix deadlock after loop_set_status
kernel panic: n_tty: init_tty C 141 319d 503d 318d 903f9db1 tty: Don't call panic() at tty_ldisc_init()
WARNING in tty_set_ldisc syz 177 327d 503d 318d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore().
KASAN: use-after-free Read in shm_get_unmapped_area 19 415d 505d 318d 3f05317d ipc/shm: fix use-after-free of shm file via remap_file_pages()
possible deadlock in smc_close_non_accepted C 4 386d 386d 322d 3d502067 net/smc: simplify wait when closing listen socket
BUG: unable to handle kernel paging request in compat_copy_entries syz 5 384d 383d 332d b7181216 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
KASAN: slab-out-of-bounds Write in tcp_v6_syn_recv_sock C 1063 427d 444d 332d d91c3e17 net/tls: Only attach to sockets in ESTABLISHED state
possible deadlock in ftrace_profile_set_filter (2) C 1007 415d 475d 332d 43fa87f7 perf/core: Fix another perf,trace,cpuhp lock inversion
KASAN: use-after-free Read in perf_trace_lock_acquire (2) C 188 414d 486d 332d 4cd87951 vhost_net: stop device during reset owner
possible deadlock in perf_trace_destroy (2) C 2006 415d 501d 332d 82d94856 perf/core: Fix lock inversion between perf,trace,cpuhp
possible deadlock in __neigh_create 1 356d 356d 346d 1bfa26ff ipv6: fix possible deadlock in rt6_age_examine_exception()
WARNING in binder_send_failed_reply C 206 393d 477d 348d e46a3b3b ANDROID: binder: remove WARN() for redundant txn error
WARNING in skb_warn_bad_offload C 6527 383d 506d 348d 8d74e9f8 net: avoid skb_warn_bad_offload on IS_ERR
KASAN: use-after-free Read in disk_unblock_events C 65 402d 508d 348d 89736653 genhd: Fix use after free in __blkdev_get()
general protection fault in try_to_wake_up syz 1 363d 359d 351d c769accd vlan: Fix vlan insertion for packets without ethernet header
kernel BUG at lib/string.c:LINE! (3) C 5 359d 360d 351d 84652aef RDMA/ucma: Introduce safer rdma_addr_size() variants
BUG: unable to handle kernel (2) syz 1 360d 360d 351d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in timerqueue_add C 2 361d 361d 351d c769accd vlan: Fix vlan insertion for packets without ethernet header
BUG: unable to handle kernel paging request in __memmove 1 361d 361d 351d c769accd vlan: Fix vlan insertion for packets without ethernet header
BUG: unable to handle kernel paging request in netdev_queue_update_kobjects syz 1 361d 361d 351d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in qlist_move_cache 1 361d 361d 351d c769accd vlan: Fix vlan insertion for packets without ethernet header
possible deadlock in handle_rx C 4 362d 362d 351d aaa3149b vhost_net: add missing lock nesting notation
general protection fault in rdma_notify C 3 367d 364d 351d c8d3bcbf RDMA/ucma: Check that device exists prior to accessing it
general protection fault in rdma_init_qp_attr (2) C 753 358d 364d 351d 4b658d1b RDMA/ucma: Check that device is connected prior to access it
kernel BUG at ./include/linux/skbuff.h:LINE! (2) C 5 388d 365d 351d 10b8a3de ipv6: the entire IPv6 header chain must fit the first fragment
possible deadlock in __ipv6_dev_mc_dec 1 365d 365d 351d 1bfa26ff ipv6: fix possible deadlock in rt6_age_examine_exception()
BUG: corrupted list in remove_wait_queue C 5 364d 367d 351d dc6455a7 vhost: correctly remove wait queue during poll failure
kernel BUG at drivers/vhost/vhost.c:LINE! C 152 351d 369d 351d d65026c6 vhost: validate log when IOTLB is enabled
WARNING in xt_cluster_mt C 4 388d 388d 351d aebfa52a netfilter: drop template ct when conntrack is skipped.
general protection fault in native_write_cr4 C 132300 354d 458d 351d 8eb3f87d KVM: nVMX: fix guest CR4 loading when emulating L2 to L1 exit
KASAN: use-after-free Read in worker_thread (2) syz 6 491d 500d 351d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
general protection fault in ucma_connect C 2 372d 371d 364d e8980d67 RDMA/ucma: Ensure that CM_ID exists prior to access it
WARNING in kmalloc_slab (4) 1 376d 375d 364d d97ca5d7 xfrm_user: uncoditionally validate esn replay attribute struct
kernel BUG at lib/string.c:LINE! (2) syz 2 375d 375d 364d 0c81ffc6 RDMA/ucma: Don't allow join attempts for unsupported AF family
KASAN: null-ptr-deref Write in rdma_resolve_addr C 66 367d 378d 364d 2975d5de RDMA/ucma: Check AF family prior resolving address
WARNING in __proc_create C 12 385d 378d 364d b1d0a5d0 netfilter: x_tables: add and use xt_check_proc_name
KASAN: use-after-free Read in snd_pcm_oss_get_formats C 3 379d 378d 364d 01c0b426 ALSA: pcm: Fix UAF in snd_pcm_oss_get_formats()
KASAN: use-after-free Read in pppol2tp_connect (2) C 10 365d 380d 364d 17cfe79a l2tp: do not accept arbitrary sockets
BUG: unable to handle kernel paging request in ebt_among_mt_check (2) C 946 364d 380d 364d c8d70a70 netfilter: bridge: ebt_among: add more missing match size checks
general protection fault in rdma_init_qp_attr C 2096 364d 381d 364d a5880b84 RDMA/ucma: Check that user doesn't overflow QP state
general protection fault in rdma_join_multicast C 258 367d 381d 364d 7688f2c3 RDMA/ucma: Fix access to non-initialized CM_ID object
KASAN: use-after-free Read in ucma_close C 176 367d 381d 364d ed65a4dc RDMA/ucma: Fix use-after-free access in ucma_close
KASAN: slab-out-of-bounds Read in ip6_xmit (2) C 259 367d 381d 364d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
WARNING: kmalloc bug in memdup_user C 441 365d 381d 364d 6a21dfc0 RDMA/ucma: Limit possible option size
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock C 4 382d 382d 364d 17cfe79a l2tp: do not accept arbitrary sockets
general protection fault in lowpan_device_event C 79 365d 383d 364d ca0edb13 ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event()
possible deadlock in __might_fault C 8978 373d 389d 364d 740a5759 staging: android: ashmem: Fix possible deadlock in ashmem_ioctl
INFO: rcu detected stall in xfrm_confirm_neigh 7 380d 404d 364d 013cb81e xfrm: Fix infinite loop in xfrm_get_dst_nexthop with transport mode.
WARNING: kmalloc bug in xfrm_add_sa C 109 365d 404d 364d d97ca5d7 xfrm_user: uncoditionally validate esn replay attribute struct
possible deadlock in get_user_pages_unlocked C 5 391d 414d 364d 96312e61 mm/gup.c: teach get_user_pages_unlocked to handle FOLL_NOWAIT
KASAN: stack-out-of-bounds Read in xfrm_state_find (4) C 102 365d 416d 364d 19d7df69 xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems
general protection fault in dccp_write_xmit C 5 382d 418d 364d 67f93df7 dccp: check sk for closed state in dccp_sendmsg()
kernel panic: Out of memory and no killable processes... (2) C 1 419d 418d 364d 0537250f netfilter: x_tables: make allocation less aggressive
WARNING in __xlate_proc_name C 11 383d 419d 364d b1d0a5d0 netfilter: x_tables: add and use xt_check_proc_name
KASAN: use-after-free Read in pfifo_fast_enqueue C 20 366d 430d 364d cce6294c net: sched: fix uses after free
possible deadlock in shmem_file_llseek C 4432 374d 437d 364d cb57469c staging: android: ashmem: Fix lockdep issue during llseek
WARNING in ata_bmdma_qc_issue C 1 588d 508d 364d 2c1ec6fd libata: don't try to pass through NCQ commands to non-NCQ devices
BUG: unable to handle kernel paging request in ata_bmdma_qc_prep C 13 500d 508d 364d 058f58e2 libata: fix length validation of ATAPI-relayed SCSI commands
WARNING in ata_qc_issue C 35 493d 512d 364d 9173e5e8 libata: remove WARN() for DMA or PIO command without data
KASAN: use-after-free Read in get_work_pool syz 8 490d 513d 364d 2cc683e8 kcm: lock lower socket in kcm_attach
WARNING in kvm_arch_vcpu_ioctl_run (2) C 61018 418d 506d 375d c37c2873 KVM: VMX: Fix rflags cache during vCPU reset
WARNING in tracepoint_probe_unregister C 115 376d 503d 376d a6da0024 blktrace: fix unlocked registration of tracepoints
kernel BUG at arch/x86/kvm/x86.c:LINE! syz 20 479d 512d 376d 61cb57c9 KVM: x86: Exit to user-mode on #UD intercept when emulator requires
WARNING in tracepoint_probe_register_prio C 830 376d 512d 376d a6da0024 blktrace: fix unlocked registration of tracepoints
KASAN: use-after-free Read in strp_data_ready C 204 422d 515d 376d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
WARNING in refcount_sub_and_test C 75150 414d 515d 376d d04adf1b sctp: reset owner sk for data chunks on out queues when migrating a sock
general protection fault in hrtimer_active (2) C 10612 384d 389d 382d b7e31be3 KVM: x86: fix vcpu initialization with userspace lapic
general protection fault in smc_create C 2 390d 390d 382d a5dcb73b net/smc: fix NULL pointer dereference on sock_create_kern() error path
KASAN: slab-out-of-bounds Read in ip6_route_me_harder C 66 383d 391d 382d 7d98386d netfilter: use skb_to_full_sk in ip6_route_me_harder
KASAN: use-after-free Read in ip6_route_me_harder C 44 383d 391d 382d 7d98386d netfilter: use skb_to_full_sk in ip6_route_me_harder
KASAN: use-after-free Write in nf_nat_ipv6_manip_pkt C 2 398d 397d 382d b078556a netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt
BUG: unable to handle kernel paging request in ebt_among_mt_check C 823 382d 397d 382d c4585a28 netfilter: bridge: ebt_among: add missing match size checks
WARNING in compat_copy_entries C 434 382d 397d 382d b7181216 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
WARNING in debug_print_object C 2 415d 415d 382d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
KASAN: use-after-free Read in inet_shutdown C 22 384d 430d 382d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
general protection fault in pppol2tp_connect C 1025 382d 431d 382d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
KASAN: use-after-free Read in pppol2tp_connect C 25 382d 431d 382d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
KASAN: slab-out-of-bounds Read in ip6_xmit C 156 383d 433d 382d c113187d tls: Use correct sk->sk_prot for IPV6
kernel BUG at arch/x86/kvm/mmu.c:LINE! C 695 389d 506d 382d b28676bb KVM: mmu: Fix overlap between public and private memslots
WARNING in __x86_set_memory_region C 716 389d 508d 382d 103c763c KVM/x86: remove WARN_ON() for when vm_munmap() fails
WARNING in handle_ept_misconfig C 238 390d 513d 382d 95e057e2 KVM: X86: Fix SMRAM accessing even if VM is shutdown
general protection fault in arpt_do_table C 3 394d 394d 389d 57ebd808 netfilter: add back stackpointer size checks
WARNING: ODEBUG bug in __queue_work C 2 399d 395d 389d cfc2c740 netfilter: IDLETIMER: be syzkaller friendly
WARNING in __queue_work C 1 399d 399d 389d cfc2c740 netfilter: IDLETIMER: be syzkaller friendly
WARNING: kmalloc bug in cpu_map_update_elem C 2677 389d 401d 389d 7fc17e90 bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
WARNING in kvmalloc_node C 513 396d 402d 389d 7fc17e90 bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
WARNING: kmalloc bug in bpf_prog_array_copy_info C 4424 389d 402d 389d 9c481b90 bpf: fix bpf_prog_array_copy_to_user warning from perf event prog query
WARNING: ODEBUG bug in led_tg_destroy C 4 395d 403d 389d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
general protection fault in SyS_bpf (2) C 1065 389d 403d 389d 952fad8e bpf: fix sock_map_alloc() error path
divide error in nf_nat_l4proto_unique_tuple C 2 404d 404d 389d db57ccf0 netfilter: nat: cope with negative port range
lost connection to test machine (4) C 1189 389d 404d 389d 9c2d63b8 bpf: fix mlock precharge on arraymaps
KASAN: use-after-free Read in remove_wait_queue C 7 394d 404d 389d 5eeb2ca0 ANDROID: binder: synchronize_rcu() when using POLLFREE.
kernel BUG at kernel/time/timer.c:LINE! C 18 392d 404d 389d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
WARNING: bad unlock balance in hashlimit_mt_common C 2059 392d 405d 389d de526f40 netfilter: xt_hashlimit: fix lock imbalance
possible deadlock in xt_find_table_lock (2) 4 407d 406d 389d 01ea306f netfilter: drop outermost socket lock in getsockopt()
possible deadlock in do_ip_getsockopt (2) 206 392d 407d 389d 01ea306f netfilter: drop outermost socket lock in getsockopt()
possible deadlock in do_ipv6_setsockopt (2) 3642 392d 407d 389d 01ea306f netfilter: drop outermost socket lock in getsockopt()
possible deadlock in do_ip_setsockopt (3) 3731 392d 408d 389d 01ea306f netfilter: drop outermost socket lock in getsockopt()
possible deadlock in rtnl_lock (4) C 73333 392d 408d 389d 01ea306f netfilter: drop outermost socket lock in getsockopt()
WARNING: kmalloc bug in relay_open_buf C 10 394d 409d 389d 88913bd8 kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
WARNING: proc registration bug in clusterip_tg_check C 779 392d 410d 389d b3e456fc netfilter: ipt_CLUSTERIP: fix a race condition of proc file creation
general protection fault in ip6t_do_table C 8077 393d 419d 389d 57ebd808 netfilter: add back stackpointer size checks
WARNING in check_flush_dependency C 2205 392d 424d 389d ce162bfb mac80211_hwsim: don't use WQ_MEM_RECLAIM
WARNING in kmalloc_slab (3) C 1901 390d 475d 389d 88913bd8 kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
BUG: unable to handle kernel NULL pointer dereference in sha512_mb_mgr_get_comp_job_avx2 syz 32 421d 475d 389d eff84b37 crypto: sha512-mb - initialize pending lengths correctly
general protection fault in binder_poll C 159 393d 477d 389d f8898267 binder: check for binder_thread allocation failure in binder_poll()
KASAN: use-after-free Read in rds_find_bound 1 452d 448d 401d ebeeb1ad rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
KASAN: slab-out-of-bounds Read in string C 129 412d 422d 401d da17c73b netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target}
KASAN: use-after-free Read in rds_tcp_tune 12 425d 435d 401d ebeeb1ad rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
INFO: rcu detected stall in memcpy 12 439d 443d 401d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
INFO: rcu detected stall in tty_ioctl C 12 445d 458d 401d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
INFO: rcu detected stall in n_tty_ioctl 24 444d 458d 401d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
KASAN: use-after-free Read in __do_page_fault syz 679 498d 508d 401d cb0631fd x86/mm: fix use-after-free of vma during userfaultfd fault
possible deadlock in lru_add_drain_all 1300 462d 512d 401d 9852a721 mm: drop hotplug lock from lru_add_drain_all()
KASAN: use-after-free Read in __schedule C 145 456d 458d 401d 8dbfb2bf KVM: x86: don't forget vcpu_put() in kvm_arch_vcpu_ioctl_set_sregs()
KASAN: stack-out-of-bounds Read in csum_and_copy_from_iter_full 1 481d 477d 401d 8f659a03 net: ipv4: fix for a race condition in raw_sendmsg
KASAN: use-after-free Read in sock_release 1 483d 479d 401d a5739435 fix kcm_clone()
KASAN: use-after-free Read in rds_tcp_dev_event 1 507d 500d 401d 681648e6 rds: tcp: correctly sequence cleanup on netns deletion.
possible deadlock in flush_work (2) 3 500d 503d 401d 528fd354 SUNRPC: Destroy transport from the system workqueue
KASAN: stack-out-of-bounds Read in memcmp 1 444d 441d 403d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
KASAN: stack-out-of-bounds Read in xfrm_selector_match 368 436d 442d 403d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
KASAN: use-after-free Read in __fput 23 472d 506d 403d a5739435 fix kcm_clone()
WARNING in drm_modeset_lock_all 35 505d 512d 403d d18d1a5a drm: Require __GFP_NOFAIL for the legacy drm_modeset_lock_all
WARNING: kmalloc bug in tun_device_event C 15 407d 409d 403d 6e6e41c3 ptr_ring: fail early if queue occupies more than KMALLOC_MAX_SIZE 0bf7800f ptr_ring: try vmalloc() when kmalloc() fails
WARNING: suspicious RCU usage in bpf_prog_array_copy_info C 17842 404d 410d 403d 0911287c bpf: fix bpf_prog_array_copy_to_user() issues
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (4) C 7264 410d 414d 403d 0911287c bpf: fix bpf_prog_array_copy_to_user() issues
general protection fault in ___bpf_prog_run C 8 409d 416d 403d 65073a67 bpf: fix null pointer deref in bpf_prog_test_run_xdp
KASAN: use-after-free Write in xt_rateest_tg_checkentry C 2 416d 418d 403d 7dc68e98 netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert
general protection fault in cgroup_mt_destroy_v1 C 91 406d 418d 403d ba7cd5d9 netfilter: xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
WARNING in usercopy_warn C 171 410d 428d 403d 79a8a642 net: Whitelist the skbuff_head_cache "cb" field
KASAN: double-free or invalid-free in relay_open C 106 410d 508d 403d a1be1f39 kernel/relay.c: revert "kernel/relay.c: fix potential memory leak"
WARNING in do_debug C 905 408d 508d 403d efdab992 KVM: x86: fix escape of guest dr6 to the host
possible deadlock in rtnl_lock (3) C 3633 409d 409d 409d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
possible deadlock in do_ip_setsockopt (2) 59 409d 411d 409d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
WARNING: bad unlock balance in ipmr_mfc_seq_stop C 286 416d 462d 410d 4adfa79f ip6mr: fix stale iterator
possible deadlock in rtnl_lock (2) C 10369 411d 414d 411d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
suspicious RCU usage at ./include/linux/inetdevice.h:LINE (2) C 4 415d 415d 411d e7aadb27 net: igmp: add a missing rcu locking section
possible deadlock in do_ip_getsockopt 22 414d 418d 411d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
possible deadlock in xt_find_target 34 412d 419d 411d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
WARNING in reuseport_add_sock C 7 424d 434d 411d 4db428a7 soreuseport: fix mem leak in reuseport_add_sock()
WARNING in ion_ioctl C 8888 414d 443d 411d e4e179a8 staging: android: ion: Switch from WARN to pr_warn
WARNING in __alloc_pages_slowpath C 9435 414d 443d 411d 0c75f103 staging: android: ion: Add __GFP_NOWARN for system contig heap
lost connection to test machine (3) C 4251 411d 450d 411d 889c604f netfilter: x_tables: fix int overflow in xt_alloc_table_info()
WARNING in register_lock_class C 2 458d 455d 411d f5cb779b ANDROID: binder: remove waitqueue when thread exits.
WARNING in sysfs_warn_dup 11 416d 460d 411d 5d54f948 sysfs: turn WARN() into pr_warn()
KASAN: use-after-free Read in __lock_acquire (2) C 589 414d 490d 411d f5cb779b ANDROID: binder: remove waitqueue when thread exits.
WARNING in __check_heap_object C 5173 429d 500d 411d ab9ee8e3 sctp: Define usercopy region in SCTP proto slab cache
KASAN: use-after-free Read in __list_add_valid (3) 16 415d 422d 412d 4cd87951 vhost_net: stop device during reset owner
KASAN: use-after-free Read in fib6_lookup_1 11 432d 434d 412d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in fib6_remove_prefsrc 4 432d 434d 412d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in fib6_age 3 432d 434d 412d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in mon_bin_vma_fault 7 438d 449d 412d 46eb14a6 USB: fix usbmon BUG trigger
INFO: task hung in bpf_exit_net 1 472d 459d 412d b6c5734d sctp: fix the handling of ICMP Frag Needed for too small MTUs
INFO: trying to register non-static key in pfifo_fast_reset C 4 458d 461d 412d 1df94c3c net_sched: properly check for empty skb array on error path
general protection fault in trie_get_next_key C 3 421d 421d 414d 6dd1ec6c bpf: fix kernel page fault in lpm map trie_get_next_key
KASAN: use-after-free Read in tipc_group_size C 8 431d 439d 414d 60c25306 tipc: fix race between poll() and setsockopt()
suspicious RCU usage at net/ipv6/ip6_fib.c:LINE C 56 422d 444d 414d 4512c43e ipv6: remove null_entry before adding default route
BUG: Bad page state (3) C 3 439d 446d 414d 46eb14a6 USB: fix usbmon BUG trigger
WARNING in usb_submit_urb C 2 509d 501d 414d 446f666d USB: usbfs: Filter flags passed in from user space
WARNING in task_participate_group_stop C 29 494d 508d 414d 42691579 kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal()
general protection fault in __netlink_ns_capable C 74 438d 444d 415d f428fe4a rtnetlink: give a user socket to get_target_net()
KASAN: double-free or invalid-free in skb_free_head C 13 454d 460d 415d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: unable to handle kernel NULL pointer dereference in page_mapping C 4 458d 461d 415d 7d11f77f RDS: null pointer dereference in rds_atomic_free_op
general protection fault in page_mapping C 46 438d 466d 415d 7d11f77f RDS: null pointer dereference in rds_atomic_free_op
inconsistent lock state in est_fetch_counters C 5829 415d 420d 415d 40ca54e3 net_sched: gen_estimator: fix lockdep splat
WARNING in vhost_dev_cleanup C 4 416d 422d 415d 4cd87951 vhost_net: stop device during reset owner
general protection fault in tun_queue_purge C 4 421d 422d 415d 9fb582b6 Revert "net: ptr_ring: otherwise safe empty checks can overrun array bounds"
KASAN: use-after-free Read in __wake_up_common C 888 415d 424d 415d 4cd87951 vhost_net: stop device during reset owner
general protection fault in nfs_idmap_legacy_upcall C 4 428d 427d 415d 49686cbb NFS: reject request for id_legacy key without auxdata
KASAN: use-after-free Read in map_lookup_elem C 6 430d 434d 415d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
BUG: unable to handle kernel paging request in check_memory_region C 10 431d 434d 415d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: use-after-free Read in __bpf_prog_put 1 436d 436d 415d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in fib6_add (2) C 3143 438d 444d 415d 7bbfe00e ipv6: fix general protection fault in fib6_add()
kernel BUG at fs/userfaultfd.c:LINE! C 3 458d 455d 415d 0cbb4b4f userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
KASAN: slab-out-of-bounds Write in sha3_update (2) C 49 416d 456d 415d 9fa68f62 crypto: hash - prevent using keyed hashes without setting key
KASAN: stack-out-of-bounds Read in rds_sendmsg C 120 445d 469d 415d 14e138a8 RDS: Check cmsg_len before dereferencing CMSG_DATA
KASAN: slab-out-of-bounds Read in sctp_send_reset_streams C 73 457d 469d 415d 2342b8d9 sctp: make sure stream nums can match optlen in sctp_setsockopt_reset_streams
kernel BUG at drivers/android/binder_alloc.c:LINE! C 856 472d 477d 415d fb2c4452 ANDROID: binder: fix transaction leak.
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (2) 185 479d 477d 415d 7d2c3f54 crypto: af_alg - remove locking in async callback
general protection fault in sidtab_search_core syz 1306 471d 477d 415d 4b14752e selinux: skip bounded transition processing if the policy isn't loaded
general protection fault in show_timer C 10 459d 478d 415d cef31d9a posix-timer: Properly check sigevent->sigev_notify
WARNING: kernel stack regs has bad 'bp' value (2) C 16238 415d 479d 415d d8c7fe9f crypto: x86/twofish-3way - Fix %rbp usage
KASAN: slab-out-of-bounds Read in strcmp C 150 471d 480d 415d ef28df55 selinux: ensure the context is NUL terminated in security_context_to_sid_core()
KASAN: slab-out-of-bounds Read in xfrm_hash_rebuild C 18 433d 500d 415d 862591bf xfrm: skip policies marked as dead while rehashing
BUG: looking up invalid subclass: 8 C 5 502d 501d 415d 3510c7aa ALSA: seq: Avoid invalid lockdep class warning
BUG: unable to handle kernel paging request in devpts_mntget C 21 428d 505d 415d c9cc8d01 devpts: fix error handling in devpts_mntget()
suspicious RCU usage at ./include/linux/inetdevice.h:LINE 28 498d 506d 415d 25dd169a fib: fib_dump_info can no longer use __in_dev_get_rtnl
KASAN: use-after-free Read in __xfrm_state_lookup C 7 507d 506d 415d cb79a180 xfrm: defer daddr pointer assignment after spi parsing
KASAN: use-after-free Read in sctp_association_free C 20 491d 506d 415d ca3af4dd sctp: do not free asoc when it is already dead in sctp_sendmsg
BUG: sleeping function called from invalid context at mm/slab.h:LINE (2) 2 424d 424d 415d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
KASAN: slab-out-of-bounds Read in erspan_build_header C 30 415d 424d 415d b423d13c net: erspan: fix use-after-free
suspicious RCU usage at mm/slab.h:LINE 1 424d 424d 415d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
KASAN: slab-out-of-bounds Read in erspan_xmit C 51 422d 424d 415d b423d13c net: erspan: fix use-after-free
KASAN: use-after-free Read in erspan_xmit C 68 422d 424d 415d b423d13c net: erspan: fix use-after-free
KASAN: use-after-free Read in erspan_build_header C 60 415d 424d 415d b423d13c net: erspan: fix use-after-free
WARNING in xdp_rxq_info_unreg C 198 424d 424d 415d c13da21c tun: avoid calling xdp_rxq_info_unreg() twice
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (3) C 5087 416d 425d 415d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
KASAN: use-after-free Read in tipc_group_is_open C 1 431d 431d 415d 60c25306 tipc: fix race between poll() and setsockopt()
general protection fault in get_info C 760 431d 434d 415d e3eeacba netfilter: x_tables: don't return garbage pointer on modprobe failure
KASAN: use-after-free Read in rb_first_postorder C 17267 428d 437d 415d febafc84 tipc: fix a potental access after delete in tipc_sk_join()
general protection fault in free_verifier_state (2) C 2 439d 439d 415d 5896351e bpf: fix verifier GPF in kmalloc failure path
suspicious RCU usage at net/netfilter/ipset/ip_set_core.c:LINE C 38048 436d 442d 415d f998b6b1 netfilter: ipset: Missing nfnl_lock()/nfnl_unlock() is added to ip_set_net_exit()
general protection fault in copy_verifier_state C 2 448d 444d 415d 5896351e bpf: fix verifier GPF in kmalloc failure path
possible deadlock in rtnl_lock C 15711 415d 472d 415d 124da8f6 tuntap: fix possible deadlock when fail to register netdev
BUG: unable to handle kernel NULL pointer dereference in sctp_stream_free 2 460d 457d 416d 79d08951 sctp: fix error path in sctp_stream_init
WARNING in fpu__copy 8 458d 458d 416d 5663d8f9 kvm: x86: fix WARN due to uninitialized guest FPU state
general protection fault in __rds_rdma_map C 12 468d 480d 416d f3069c6d rds: Fix NULL pointer dereference in __rds_rdma_map
WARNING in xfrm_state_fini C 2231 431d 487d 416d 6a53b759 xfrm: check id proto in validate_tmpl()
general protection fault in __list_del_entry_valid (2) C 21 430d 487d 416d 9ee332d9 sget(): handle failures of register_shrinker()
KASAN: stack-out-of-bounds Read in xfrm_state_find (3) C 10353 420d 488d 416d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
general protection fault in sctp_stream_free 17 462d 503d 416d 79d08951 sctp: fix error path in sctp_stream_init
possible deadlock in vhost_chr_write_iter C 25952 422d 424d 418d e9cb4239 vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
KASAN: slab-out-of-bounds Read in __dev_queue_xmit C 6 440d 428d 418d 7c68d1a6 net: qdisc_pkt_len_init() should be more robust
KASAN: use-after-free Read in psock_write_space C 6 427d 438d 418d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
kernel BUG at net/l2tp/l2tp_ppp.c:LINE! C 22 422d 444d 418d e5571240 kcm: Check if sk_user_data already set in kcm_attach
general protection fault in skb_segment C 7 439d 448d 418d 121d57af gso: validate gso_type in GSO handlers
kernel BUG at net/core/skbuff.c:LINE! (2) C 562 420d 509d 418d 02612bb0 pppoe: take ->needed_headroom of lower device into account on xmit
BUG: unable to handle kernel NULL pointer dereference in proc_flush_task syz 1 462d 458d 420d c0ee5549 pid: Handle failure to allocate the first pid in a pid namespace
KASAN: stack-out-of-bounds Read in write_mmio C 3 466d 477d 420d e39d200f KVM: Fix stack-out-of-bounds read in write_mmio
general protection fault in proc_flush_task syz 2 461d 478d 420d c0ee5549 pid: Handle failure to allocate the first pid in a pid namespace
general protection fault in lockdep_invariant_state (2) C 114 471d 500d 420d 5e351ad1 locking/lockdep: Fix possible NULL deref
general protection fault in __lock_acquire (2) C 15 420d 506d 420d 672ecbe1 tipc: fix a null pointer deref on error path
BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:LINE C 19609 482d 508d 420d 4d772cb8 KVM: x86: fix em_fxstor() sleeping while in atomic
KASAN: use-after-free Read in fib6_add_1 C 4 432d 434d 422d 591ff9ea net-backports: ipv6: don't let tb6_root node share routes with other node
WARNING in free_loaded_vmcs C 170 479d 487d 422d b7455825 KVM: VMX: Fix vmx->nested freeing when no SMI handler
KASAN: slab-out-of-bounds Read in map_lookup_elem C 6 431d 434d 424d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
possible deadlock in snd_seq_deliver_event C 6 502d 512d 424d 1f20f9ff ALSA: seq: Fix nested rwsem annotation for lockdep splat
general protection fault in ip6_xmit 16 426d 427d 425d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in fib6_ifup (2) C 18 431d 428d 425d 591ff9ea ipv6: don't let tb6_root node share routes with other node
general protection fault in strlen C 53 427d 429d 425d cd443f1e netlink: reset extack earlier in netlink_rcv_skb
KASAN: stack-out-of-bounds Read in __nla_put C 57 427d 430d 425d cd443f1e netlink: reset extack earlier in netlink_rcv_skb
WARNING in canfd_rcv C 4 432d 430d 425d d4689846 can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once
WARNING in can_rcv C 5 432d 430d 425d 8cb68751 can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once
KASAN: slab-out-of-bounds Write in array_map_update_elem C 6 432d 432d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: use-after-free Write in array_map_update_elem C 11 430d 432d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
BUG: unable to handle kernel paging request in __bpf_map_put 1 434d 433d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in rfkill_alloc C 6 432d 433d 425d 59b179b4 cfg80211: check dev_set_name() return value
WARNING in wiphy_register C 15 432d 433d 425d 51a1aaa6 mac80211_hwsim: validate number of different channels
divide error in ___bpf_prog_run C 28 427d 434d 425d 68fda450 bpf: fix 32-bit divide by zero
BUG: unable to handle kernel paging request in bpf_fd_array_map_lookup_elem 5 430d 434d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
BUG: unable to handle kernel paging request in dst_release 113 430d 435d 425d 95ef498d ipv6: ip6_make_skb() needs to clear cork.base.dst
KASAN: slab-out-of-bounds Read in bpf_fd_array_map_lookup_elem 7 431d 436d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: use-after-free Read in bpf_fd_array_map_lookup_elem 21 430d 436d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in snd_interval_mulkdiv C 21 430d 436d 425d 23b19b7b ALSA: pcm: Remove yet superfluous WARN_ON()
general protection fault in sctp_v6_get_dst C 6 436d 436d 425d c5006b8a sctp: do not allow the v4 socket to bind a v4mapped v6 address
WARNING in ___bpf_prog_run C 28 430d 436d 425d 7891a87e bpf: arsh is not supported in 32 bit alu thus reject it
WARNING in netlink_ack (2) C 6 437d 436d 425d cbbdf843 netlink: extack needs to be reset each time through loop
BUG: unable to handle kernel paging request in fd_array_map_delete_elem 11 430d 437d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in __bpf_prog_put C 212 430d 437d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in cgroup_fd_array_put_ptr C 219 430d 437d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: slab-out-of-bounds Read in perf_event_fd_array_release C 96 430d 437d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in __bpf_map_put C 331 430d 437d 425d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: use-after-free Read in tls_sk_proto_close C 9 430d 438d 425d d91c3e17 net/tls: Only attach to sockets in ESTABLISHED state
WARNING: held lock freed! C 497 428d 439d 425d a0ff6600 sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf
BUG: sleeping function called from invalid context at ./include/linux/percpu-rwsem.h:LINE 20 433d 441d 425d b1bdcb59 xfrm: don't call xfrm_policy_cache_flush while holding spinlock
kernel BUG at ./include/linux/skbuff.h:LINE! C 4502 430d 443d 425d 374d1b5a esp: Fix GRO when the headers not fully in the linear part of the skb.
possible deadlock in ppp_dev_uninit C 6 430d 443d 425d 0171c418 ppp: unlock all_ppp_mutex before registering device
WARNING in adjust_ptr_min_max_vals C 252 427d 444d 425d 6f16101e bpf: mark dst unknown on inconsistent {s, u}bounds adjustments
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (2) C 174 426d 505d 425d 2f10a61c xfrm: fix rcu usage in xfrm_get_type_offload
KASAN: use-after-free Read in fib6_ifdown C 26 431d 435d 428d 4512c43e ipv6: remove null_entry before adding default route
KASAN: use-after-free Read in rt6_mtu_change_route 5 432d 435d 428d 4512c43e ipv6: remove null_entry before adding default route
INFO: task hung in snd_pcm_oss_write syz 2 436d 436d 428d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
INFO: rcu detected stall in snd_pcm_plug_write_transfer 1 437d 437d 428d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
INFO: rcu detected stall in mulaw_transfer 37 439d 442d 428d 898dfe46 ALSA: aloop: Fix racy hw constraints adjustment
general protection fault in nf_tables_dump_obj_done C 976 437d 443d 428d 8bea728d netfilter: nf_tables: fix potential NULL-ptr deref in nf_tables_dump_obj_done()
suspicious RCU usage at sound/core/pcm_lib.c:LINE 1 444d 443d 428d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
BUG: unable to handle kernel paging request in memset_erms C 35 428d 443d 428d b088b53e ALSA: aloop: Fix inconsistent format due to incomplete rule
WARNING in rds_cmsg_rdma_args C 6 444d 444d 428d c0955087 RDS: Heap OOB write in rds_message_alloc_sgs()
WARNING in snd_pcm_hw_param_first C 2905 436d 446d 428d fe08f34d ALSA: pcm: Remove incorrect snd_BUG_ON() usages
kernel BUG at ./include/linux/mm.h:LINE! (3) C 621 433d 450d 428d 46eb14a6 USB: fix usbmon BUG trigger
BUG: soft lockup (2) C 29 439d 468d 428d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
general protection fault in crypto_remove_spawns C 85 442d 480d 428d 9a006742 crypto: algapi - fix NULL dereference in crypto_remove_spawns()
WARNING in strp_data_ready C 59034 444d 515d 429d d66fa9ec strparser: Call sock_owned_by_user_nocheck
KASAN: double-free or invalid-free in kvm_arch_vcpu_uninit 1 438d 434d 433d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: bad usercopy in alg_setsockopt 5 444d 442d 436d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: bad usercopy in do_syslog 1 445d 442d 436d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
KASAN: slab-out-of-bounds Read in cap_inode_getsecurity C 11 442d 443d 436d dc32b5c3 capabilities: fix buffer overread on very short xattr
KASAN: slab-out-of-bounds Read in cap_convert_nscap C 4148 441d 445d 436d dc32b5c3 capabilities: fix buffer overread on very short xattr
BUG: bad usercopy in strncpy_from_user 1 451d 447d 436d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: unable to handle kernel paging request in ipcget 2 458d 455d 436d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: bad usercopy in rw_copy_check_uvector 7 440d 455d 436d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
general protection fault in skcipher_walk_done C 8 438d 458d 436d e57121d0 crypto: chacha20poly1305 - validate the digest size
KASAN: use-after-free Read in __list_del_entry_valid (2) C 11 458d 460d 436d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: unable to handle kernel NULL pointer dereference in blkcipher_walk_done C 2 464d 464d 436d e57121d0 crypto: chacha20poly1305 - validate the digest size
BUG: unable to handle kernel NULL pointer dereference in scatterwalk_copychunks C 3 463d 464d 436d e57121d0 crypto: chacha20poly1305 - validate the digest size
KASAN: wild-memory-access Write in scatterwalk_copychunks C 15 442d 468d 436d e57121d0 crypto: chacha20poly1305 - validate the digest size
general protection fault in scatterwalk_copychunks (2) C 141 442d 469d 436d e57121d0 crypto: chacha20poly1305 - validate the digest size
KASAN: use-after-free Read in handle_userfault C 151 449d 512d 437d 0cbb4b4f userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
INFO: task hung in cleanup_net 1 471d 459d 444d 21b59443 net: Fix double free and memory corruption in get_net_ns_by_id()
KASAN: global-out-of-bounds Read in crypto_chacha20_crypt C 74 458d 461d 444d 2b4f27c3 crypto: skcipher - set walk.iv for zero-length inputs
general protection fault in blkcipher_walk_first C 7 456d 466d 444d 11edb555 crypto: af_alg - wait for data at beginning of recvmsg
possible deadlock (2) 2 465d 467d 444d 2b4f27c3 crypto: skcipher - set walk.iv for zero-length inputs
BUG: unable to handle kernel paging request in kvm_arch_vcpu_ioctl_run 1 471d 467d 444d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
BUG: unable to handle kernel paging request in copy_siginfo_to_user 1 472d 468d 444d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
BUG: unable to handle kernel paging request in match_subs_info 1 474d 469d 444d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
BUG: unable to handle kernel paging request in __put_user_8 1 475d 469d 444d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
BUG: unable to handle kernel paging request in __schedule 2 474d 469d 444d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
KASAN: use-after-free Write in aead_recvmsg C 21 456d 474d 444d d53c5135 crypto: af_alg - fix race accessing cipher request
BUG: unable to handle kernel paging request in __switch_to 1 479d 474d 444d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
general protection fault in crypto_chacha20_crypt C 2374 448d 480d 444d 2b4f27c3 crypto: skcipher - set walk.iv for zero-length inputs
general protection fault in blkcipher_walk_done C 47 445d 480d 444d 11edb555 crypto: af_alg - wait for data at beginning of recvmsg
WARNING in netlink_ack C 6 454d 455d 451d 48044eb4 netlink: fix netlink_ack() extack race
general protection fault in free_verifier_state C 2 457d 457d 451d 8c01c4f8 bpf: fix verifier NULL pointer dereference
KASAN: use-after-free in aead_recvmsg 2 469d 469d 451d b32a7dc8 crypto: algif_aead - fix reference counting of null skcipher
kernel BUG at net/packet/af_packet.c:LINE! (2) 2 475d 477d 451d 8e1611e2 make sock_alloc_file() do sock_release() on failures
WARNING in refcount_dec (2) 1 485d 485d 451d 15fe076e net/packet: fix a race in packet_bind() and packet_notifier()
WARNING in lock_release C 72 459d 492d 455d ca0168e8 alloc_super(): do ->s_umount initialization earlier
general protection fault in ___cache_free 1 467d 463d 457d ecaaab56 crypto: salsa20 - fix blkcipher_walk API usage
general protection fault in kfree 13 468d 477d 457d ecaaab56 crypto: salsa20 - fix blkcipher_walk API usage
general protection fault in strcmp 1 478d 477d 457d 18026d86 KEYS: reject NULL restriction string when type is specified
WARNING in initialize_timer 2 477d 478d 457d 43a35428 ALSA: seq: Remove spurious WARN_ON() at timer check
WARNING: suspicious RCU usage (3) 16 479d 479d 457d ecaaab56 crypto: salsa20 - fix blkcipher_walk API usage
KASAN: stack-out-of-bounds Write in sha3_update C 5 484d 480d 457d af3ff804 crypto: hmac - require that the underlying hash algorithm is unkeyed
general protection fault in af_alg_free_areq_sgls C 2916 461d 480d 457d 887207ed crypto: af_alg - fix NULL pointer dereference in
KASAN: use-after-free Read in aead_recvmsg C 4338 461d 480d 457d b32a7dc8 crypto: algif_aead - fix reference counting of null skcipher
general protection fault in scatterwalk_copychunks C 414 470d 480d 470d 8e1fa89a crypto: algif_aead - skip SGL entries with NULL page
kernel BUG at net/core/dev.c:LINE! C 5 481d 486d 470d 15fe076e net-backports: net/packet: fix a race in packet_bind() and packet_notifier()
possible deadlock in blk_trace_remove 5 482d 489d 470d 2967acbb blktrace: fix trace mutex deadlock
general protection fault in fanout_demux_rollover 3 483d 503d 470d 57f015f5 packet: fix crash in fanout_demux_rollover()
kernel panic: softlockup: hung tasks 2 550d 520d 470d 4ba161a7 SUNRPC: Allow connect to return EHOSTUNREACH
general protection fault in dax_alloc_inode 1 501d 494d 474d 9f586fff dax: fix general protection fault in dax_alloc_inode
kernel BUG at net/key/af_key.c:LINE! C 63 522d 515d 474d 0e74aa1d xfrm: Copy policy family in clone_policy
WARNING in snd_timer_user_info_compat C 174 484d 487d 480d 3d4e8303 ALSA: timer: Remove kernel warning at compat ioctl error paths
KASAN: use-after-free Read in tcp_ack 68 493d 495d 480d 50895b9d net-backports: tcp: highest_sack fix
KASAN: use-after-free Read in mpi_free C 27 490d 498d 480d 12d41a02 crypto: dh - Fix double free of ctx->p
WARNING in free_kthread_struct C 136405 497d 501d 480d e10237cc kthread: zero the kthread data structure
INFO: trying to register non-static key. (2) C 8624 499d 501d 480d 9eba9353 tcp: fix a lockdep issue in tcp_fastopen_reset_cipher()
possible deadlock in generic_file_write_iter C 61506 480d 503d 480d e319e1fb block, locking/lockdep: Assign a lock_class per gendisk used for wait_for_completion()
KASAN: use-after-free Read in fsnotify 1 541d 505d 480d b3a00660 dnotify: Handle errors from fsnotify_add_mark_locked() in fcntl_dirnotify()
KASAN: use-after-free Read in tipc_send_group_bcast 4 515d 506d 480d e233df01 tipc: fix a dangling pointer
general protection fault in bpf_check 3 501d 506d 480d 8c01c4f8 bpf: fix verifier NULL pointer dereference
general protection fault in iov_iter_fault_in_readable 5 498d 506d 480d ee74d996 tun: do not arm flow_gc_timer in tun_flow_init()
kernel BUG at fs/notify/dnotify/dnotify.c:LINE! 19 496d 508d 480d b3a00660 dnotify: Handle errors from fsnotify_add_mark_locked() in fcntl_dirnotify()
KASAN: use-after-free Write in detach_if_pending C 4169 517d 512d 480d ee74d996 tun: do not arm flow_gc_timer in tun_flow_init()
KASAN: slab-out-of-bounds Read in tipc_nametbl_lookup_dst_nodes C 22388 492d 515d 480d f65163fe tipc: eliminate KASAN warning
BUG: unable to handle kernel paging request in vsock_diag_dump C 6 512d 515d 480d c1eef220 vsock: always call vsock_init_tables()
KASAN: use-after-free Read in tipc_group_self C 2942 497d 515d 480d e233df01 tipc: fix a dangling pointer
general protection fault in do_raw_spin_lock 8 512d 517d 480d 87b1af8d net-backports: ipv6: add ip6_null_entry check in rt6_select()
general protection fault in tun_flow_cleanup 1 552d 520d 480d ee74d996 tun: do not arm flow_gc_timer in tun_flow_init()
KASAN: use-after-free Read in free_netdev C 42 497d 521d 480d aec72f33 net-tun: fix panics at dismantle time
general protection fault in hrtimer_active C 669 497d 521d 480d aec72f33 net-tun: fix panics at dismantle time
WARNING in fib6_add C 8225 497d 521d 480d 2ea2352e ipv6: prevent user from adding cached routes
WARNING in tun_get_user C 17398 497d 522d 480d 010f245b net-backports: tun: relax check on eth_get_headlen() return value
BUG: sleeping function called from invalid context at net/core/sock.c:LINE C 407 481d 520d 481d 829385f0 strparser: Use delayed work instead of timer for msg timeout
KASAN: use-after-free Read in snd_timer_user_info_compat syz 2 522d 512d 486d 79fb0518 ALSA: timer: Add missing mutex lock for compat ioctls
WARNING in tcp_update_reordering 748 490d 487d 487d 0eb96bf7 tcp: fix tcp_fastretrans_alert warning
general protection fault in asn1_ber_decoder C 5009 497d 501d 490d 624f5ab8 KEYS: fix NULL pointer dereference during ASN.1 parsing [ver #2]
BUG: soft lockup C 466 493d 506d 490d 9b7d869e ALSA: timer: Limit max instances per timer
BUG: unable to handle kernel paging request in snd_seq_oss_readq_puts C 389 500d 506d 490d 132d358b ALSA: seq: Fix OSS sysex delivery in OSS emulation
KASAN: stack-out-of-bounds Read in xfrm_state_find (2) C 93 498d 506d 490d c9f3f813 xfrm: Fix stack-out-of-bounds read in xfrm_state_find.
WARNING in refcount_add_not_zero 70 490d 507d 490d 7ec318fe tcp: gso: avoid refcount_t warning from tcp_gso_segment()
KASAN: slab-out-of-bounds Read in asn1_ber_decoder C 17 498d 503d 497d 2eb9eabf KEYS: fix out-of-bounds read during ASN.1 parsing
KASAN: use-after-free Read in __lock_acquire syz 894 497d 506d 497d 153fbd12 futex: Fix more put_pi_state() vs. exit_pi_state_list() races
KASAN: use-after-free Read in do_raw_spin_unlock syz 3 506d 508d 497d 153fbd12 futex: Fix more put_pi_state() vs. exit_pi_state_list() races
BUG: workqueue lockup C 172 497d 508d 497d 93161922 tun/tap: sanitize TUNSETSNDBUF input
WARNING in get_pi_state C 42 506d 508d 497d 153fbd12 futex: Fix more put_pi_state() vs. exit_pi_state_list() races
INFO: rcu detected stall (2) C 56 497d 509d 497d 93161922 net-backports: tun/tap: sanitize TUNSETSNDBUF input
general protection fault in __list_del_entry_valid C 72 500d 515d 497d 1137b5e2 ipsec: Fix aborted xfrm policy dump crash
WARNING in kmalloc_slab (2) C 2478 497d 515d 497d 864e2a1f ipv6: flowlabel: do not leave opt->tot_len with garbage
KASAN: use-after-free Read in packet_getsockopt (2) syz 12 511d 519d 497d 509c7a1e packet: avoid panic in packet_getsockopt()
WARNING in refcount_dec 9 497d 521d 497d e669b869 ipv6: addrconf: increment ifp refcount before ipv6_del_addr()
general protection fault in ip6_setup_cork 56 512d 521d 497d 864e2a1f net-backports: ipv6: flowlabel: do not leave opt->tot_len with garbage
WARNING in reuseport_alloc C 408 497d 521d 497d 1b5f962e soreuseport: fix initialization race
KASAN: use-after-free Read in ip_queue_xmit 1 522d 522d 497d c92e8c02 net-backports: tcp/dccp: fix ireq->opt races
KASAN: use-after-free Write in __run_timers 6144 517d 577d 497d 0ad646c8 net-backports: tun: call dev_get_valid_name() before register_netdevice()
kernel BUG at net/ipv4/tcp_output.c:LINE! 37 557d 570d 500d b1ed4c4f tcp: add an ability to dump and restore window parameters
WARNING in sk_stream_kill_queues syz 96 584d 587d 500d 7749d4ff net-backports: dccp: purge write queue in dccp_destroy_sock()
general protection fault in refcount_sub_and_test 1 601d 585d 501d 12d94a80 ipv6: fix NULL dereference in ip6_route_dev_notify()
KASAN: use-after-free Read in dev_queue_xmit_nit C 13 544d 556d 502d 008ba2a1 packet: hold bind lock when rebinding to fanout hook
WARNING in fib6_del 24 563d 576d 502d 7483cea7 ipv6: fib: Unlink replaced routes from their nodes
KASAN: use-after-free Read in ccid2_hc_tx_rto_expire 5 580d 584d 502d 120e9dab dccp: defer ccid_hc_tx_delete() at dismantle time
BUG: unable to handle kernel NULL pointer dereference in free_fib_info_rcu 3 585d 585d 502d 187e5b3a ipv4: fix NULL dereference in free_fib_info_rcu()
KASAN: double-free or invalid-free in selinux_tun_dev_free_security C 12033 578d 589d 502d ff244c6b tun: handle register_netdevice() failures properly
kernel BUG at net/core/skbuff.c:LINE! 5 515d 585d 512d c780a049 ipv4: better IP_MAX_MTU enforcement
general protection fault in kvm_cpuid C 20 544d 563d 514d d1cd3ce9 KVM: MMU: check guest CR3 reserved bits based on its physical address width.
KASAN: use-after-free Read in __list_add_valid syz 26 518d 566d 514d 008ba2a1 packet: hold bind lock when rebinding to fanout hook
general protection fault in skb_clone syz 3 584d 583d 514d 0bbd7dad tun: make tun_build_skb() thread safe
BUG: unable to handle kernel paging request in skb_release_data syz 15 583d 584d 514d 0bbd7dad tun: make tun_build_skb() thread safe
kernel BUG at lib/string.c:LINE! C 73 529d 545d 515d e466af75 netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user
WARNING in __local_bh_enable_ip 22 545d 553d 515d 930651a7 bpf: do not disable/enable BH in bpf_map_free_id()
WARNING in __switch_to C 535 542d 589d 515d 814fb7bb x86/fpu: Don't let userspace set bogus xcomp_bv
WARNING: kernel stack regs has bad 'bp' value C 66131 543d 589d 515d d3dfbfe2 crypto: x86/sha256-avx2 - Fix RBP usage
general protection fault in __ip_options_echo (2) C 2 564d 564d 515d ca2c1418 udp: drop head states only when all skb references are gone
general protection fault in perf_trace_block_get_rq C 180 555d 564d 515d f8e9ec16 block: tolerate tracing of NULL bio
kernel BUG at mm/slab.c:LINE! C 860 562d 566d 515d 96e5ae4e bpf: fix numa_node validation
possible deadlock in kcm_sendpage syz 14 567d 570d 515d 351050ec kcm: do not attach PF_KCM sockets to avoid deadlock
general protection fault in SyS_bpf C 10 574d 575d 515d ae2b27b8 bpf: fix a return in sockmap_get_from_fd()
WARNING in refcount_inc 7 568d 576d 515d 551143d8 net_sched: fix a refcount_t issue with noop_qdisc
general protection fault in __lock_acquire 5 525d 577d 515d 383143f3 ipv6: reset fn->rr_ptr when replacing route
KASAN: slab-out-of-bounds Read in skb_release_data 1 583d 583d 515d 0bbd7dad tun: make tun_build_skb() thread safe
KASAN: use-after-free Read in get_mm_exe_file C 2 578d 583d 515d 2b7e8665 fork: fix incorrect fput of ->exe_file causing use-after-free
KASAN: wild-memory-access Read in skb_copy_ubufs C 23 583d 584d 515d 0bbd7dad tun: make tun_build_skb() thread safe
KASAN: use-after-free Read in skb_release_data syz 7 584d 584d 515d 0bbd7dad tun: make tun_build_skb() thread safe
general protection fault in skb_release_data syz 198 583d 584d 515d 0bbd7dad tun: make tun_build_skb() thread safe
KASAN: use-after-free Read in skb_push 4 579d 585d 515d 5bfd37b4 tipc: fix use-after-free
general protection fault in fib6_add 18 579d 585d 515d 348a4002 ipv6: repair fib6 tree in failure case
BUG: Bad page state C 2 584d 585d 515d 263630e8 mm/madvise.c: fix freeing of locked page with MADV_FREE
KASAN: use-after-free Read in ip6_pol_route 249 578d 586d 515d 383143f3 ipv6: reset fn->rr_ptr when replacing route
KASAN: use-after-free Read in free_ldt_struct C 109 572d 586d 515d ccd5b323 x86/mm: Fix use-after-free of ldt_struct
BUG: unable to handle kernel NULL pointer dereference at ADDR C 63 572d 586d 515d 3fd87127 strparser: initialize all callbacks
WARNING in kmalloc_slab C 22353 515d 587d 515d 81fbfe8a ptr_ring: use kmalloc_array()
WARNING in idr_replace C 1209 555d 587d 515d a47f68d6 idr: remove WARN_ON_ONCE() when trying to replace negative ID
general protection fault in __skb_flow_dissect C 37 585d 587d 515d 7324157b dsa: fix flow disector null pointer
general protection fault in fib_dump_info C 428 578d 589d 515d bc3aae2b net: check and errout if res->fi is NULL when RTM_F_FIB_MATCH is set
suspicious RCU usage at ./include/linux/kvm_host.h:LINE C 103402 543d 589d 515d 021086e3 KVM: fix rcu warning on VM_CREATE errors
INFO: task hung C 13878 543d 608d 543d bd9dfc54 tcp: fix hang in tcp_sendpage_locked()
WARNING in kvm_arch_vcpu_ioctl_run C 20284 543d 608d 543d bbeac283 KVM: X86: Fix residual mmio emulation request to userspace
inconsistent lock state in sk_clone_lock C 16 585d 588d 563d d624d276 tcp: fix possible deadlock in TCP stack vs BPF filter
BUG: sleeping function called from invalid context at mm/slab.h:LINE C 8 585d 589d 563d 36f41f8f af_key: do not use GFP_KERNEL in atomic contexts
kernel BUG at mm/usercopy.c:LINE! C 23 584d 589d 563d fd851ba9 udp: harden copy_linear_skb()