syzbot


Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KASAN: use-after-free Read in bcm_can_tx C 2 177d 633d 1/1 158d 632881680ba0 can: bcm: fix UAF of bcm op
general protection fault in ieee802154_llsec_parse_key_id C done 101 446d 502d 1/1 415d 37580e6837c0 net: ieee802154: nl-mac: fix check on panid
general protection fault in nl802154_del_llsec_devkey C done 171 446d 508d 1/1 415d 266e3f2ef0d1 net: ieee802154: fix nl802154 del llsec devkey
general protection fault in nl802154_del_llsec_key C done 135 446d 502d 1/1 415d 1804bf103e73 net: ieee802154: fix nl802154 del llsec key
general protection fault in try_to_wake_up C done 707 446d 475d 1/1 415d f6420532cfd7 net: tun: set tun->dev->addr_len during TUNSETLINK processing
general protection fault in nl802154_add_llsec_key C done 168 446d 506d 1/1 415d 3a94a5b2e0ba net: ieee802154: fix nl802154 add llsec key
general protection fault in nl802154_del_llsec_dev C done 136 446d 508d 1/1 416d 3ee9f1bafd06 net: ieee802154: fix nl802154 del llsec dev
INFO: trying to register non-static key in ieee802154_get_llsec_params C done 8 449d 473d 1/1 419d df9aa96b613d net: ieee802154: stop dump llsec params for monitors
WARNING in cfg80211_connect C done 101 464d 643d 1/1 429d bd7b29fb365e cfg80211: remove WARN_ON() in cfg80211_sme_connect
BUG: unable to handle kernel NULL pointer dereference in __lookup_hash C done 31 459d 652d 1/1 429d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
general protection fault in selinux_socket_sendmsg C done 3 468d 640d 1/1 437d 534d2cf487b9 usbip: synchronize event handler with sysfs code paths
KASAN: use-after-free Read in ieee80211_ibss_build_presp C done 2 469d 616d 1/1 439d d2ddd5417f6d mac80211: fix double free in ibss_leave
possible deadlock in red_adaptative_timer C done 2 472d 563d 1/1 441d 43c9bffda3a2 net: sched: validate stab values
BUG: unable to handle kernel NULL pointer dereference in vhci_shutdown_connection syz done 1335 476d 566d 1/1 443d 534d2cf487b9 usbip: synchronize event handler with sysfs code paths
WARNING in ext4_xattr_set_entry C done 19 487d 643d 1/1 455d 470f69cb3742 ext4: do not try to set xattr into ea_inode if value is empty
BUG: unable to handle kernel NULL pointer dereference in amp_read_loc_assoc_final_data C done 207 488d 705d 1/1 455d 2f642a2b3365 Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
KASAN: use-after-free Read in ntfs_iget C done 2 500d 576d 1/1 470d 49ee014a2070 ntfs: check for valid standard information attribute
KASAN: use-after-free Read in ntfs_read_locked_inode C done 2 502d 653d 1/1 471d 49ee014a2070 ntfs: check for valid standard information attribute
KASAN: slab-out-of-bounds Read in squashfs_export_iget C done 4 529d 633d 1/1 496d 69396cfd7908 squashfs: add more sanity checks in inode lookup
general protection fault in ieee80211_subif_start_xmit syz done 1 526d 586d 1/1 496d d882652c1c6f mac80211: pause TX while changing interface type
general protection fault in ioctl_standard_call C done 24 527d 623d 1/1 496d 173b67cf1e72 wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
KASAN: slab-out-of-bounds Read in squashfs_get_id C 11 499d 652d 1/1 498d 8d9ca7e328ef squashfs: add more sanity checks in id lookup
KASAN: use-after-free Read in squashfs_get_id C 1 498d 594d 1/1 498d 8d9ca7e328ef squashfs: add more sanity checks in id lookup
KASAN: use-after-free Read in reiserfs_fill_super C done 2 547d 547d 1/1 500d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
divide error in do_journal_end C done 1 544d 604d 1/1 500d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
KASAN: use-after-free Read in search_by_entry_key C done 3 546d 652d 1/1 500d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
KASAN: use-after-free Read in reiserfs_read_locked_inode C done 5 548d 653d 1/1 501d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
general protection fault in dqput C done 1 555d 555d 1/1 525d a9c625fcddc0 quota: Sanity-check quota file headers on load
KASAN: use-after-free Read in leaf_paste_entries C done 6 557d 601d 1/1 526d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
general protection fault in hci_phy_link_complete_evt C done 40 557d 703d 1/1 526d 4113f6f73f6e Bluetooth: Fix null pointer dereference in hci_event_packet()
BUG: unable to handle kernel paging request in dquot_add_inodes C done 2 559d 581d 1/1 529d a9c625fcddc0 quota: Sanity-check quota file headers on load
BUG: unable to handle kernel paging request in dqput C done 9 561d 651d 1/1 529d a9c625fcddc0 quota: Sanity-check quota file headers on load
kernel BUG at net/core/dev.c:LINE! C inconclusive 3 554d 823d 1/1 535d 8f9a69a92fc6 net: drop bogus skb with CHECKSUM_PARTIAL and offset beyond end of trimmed packet
kernel BUG at fs/reiserfs/prints.c:LINE! C done 3 570d 650d 1/1 540d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
general protection fault in get_work_pool C done 1 573d 603d 1/1 542d 42a387dc80c3 mac80211: mesh: fix mesh_pathtbl_init() error path
BUG: corrupted list in dquot_disable C done 1 574d 574d 1/1 543d a9c625fcddc0 quota: Sanity-check quota file headers on load
KASAN: use-after-free Read in sco_chan_del C done 10 576d 702d 1/1 546d 4113f6f73f6e Bluetooth: Fix null pointer dereference in hci_event_packet()
INFO: trying to register non-static key in rhashtable_free_and_destroy C done 4 580d 594d 1/1 547d 42a387dc80c3 mac80211: mesh: fix mesh_pathtbl_init() error path
KASAN: slab-out-of-bounds Read in hci_le_meta_evt C done 15 583d 703d 1/1 553d 7ee2cd49f722 Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
BUG: unable to handle kernel paging request in dquot_add_space C done 1 584d 644d 1/1 553d a9c625fcddc0 quota: Sanity-check quota file headers on load
BUG: sleeping function called from invalid context in sta_info_move_state C done 1101 589d 591d 1/1 558d 89ab6b90b7d9 mac80211: free sta in sta_info_insert_finish() on errors
general protection fault in qp_release_pages C done 2 591d 621d 1/1 560d 2b8c7395d275 VMCI: check return value of get_user_pages_fast() for errors
WARNING in unlock_new_inode C done 55 617d 655d 1/1 587d a8ca9f684674 reiserfs: only call unlock_new_inode() if I_NEW
KASAN: slab-out-of-bounds Write in init_sb C done 3 619d 652d 1/1 588d 78734edd11cc gfs2: add validation checks for size of superblock
KASAN: global-out-of-bounds Read in fbcon_resize C done 529 623d 671d 1/1 592d d31eccab7abd fbcon: Fix user font detection test at fbcon_resize().
INFO: task hung in ucma_close C done 421 623d 1036d 1/1 593d ef13017d65b0 RDMA/ucma: ucma_context reference leak in error path
KASAN: global-out-of-bounds Read in vga16fb_imageblit C done 723 623d 946d 1/1 593d 0472aa0c36c7 video: fbdev: fix OOB read in vga_8planes_imageblit()
KASAN: slab-out-of-bounds Read in ntfs_attr_find C done 10 623d 651d 1/1 593d d2918cca649f ntfs: add check for mft record size in superblock
KASAN: global-out-of-bounds Read in fbcon_get_font C done 42 630d 946d 1/1 599d 30386c13a1bf fbcon: Fix global-out-of-bounds read in fbcon_get_font()
KASAN: use-after-free Read in ntfs_attr_find C done 4 632d 651d 1/1 601d d2918cca649f ntfs: add check for mft record size in superblock
KASAN: global-out-of-bounds Read in get_unique_tuple C done 5 644d 817d 1/1 614d 60634d81cb43 netfilter: ctnetlink: add a range check for l3/l4 protonum
general protection fault in open_xa_dir C done 1 652d 652d 1/1 621d e2b6b34324c4 reiserfs: Fix oops during mount
KASAN: use-after-free Read in rxrpc_see_skb syz done 1 673d 673d 1/1 623d 38eefb196438 MIPS: SNI: Fix MIPS_L1_CACHE_SHIFT
INFO: task hung in nbd_ioctl (2) C done 16 669d 915d 1/1 623d 7241d653bcc1 tipc: fix shutdown() of connection oriented socket
WARNING in restore_regulatory_settings C done 2264 665d 911d 1/1 634d 02015d244d9c cfg80211: regulatory: reject invalid hints
general protection fault in __sock_release syz done 12 665d 677d 1/1 634d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
general protection fault in locks_remove_file syz done 6 665d 676d 1/1 635d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
general protection fault in tty_release C done 10 666d 676d 1/1 636d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in seq_release_private syz done 1 667d 667d 1/1 636d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
WARNING: ODEBUG bug in corrupted syz done 1 668d 668d 1/1 636d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
WARNING: ODEBUG bug in exit_to_usermode_loop syz done 2 670d 672d 1/1 639d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in __sock_release syz done 3 670d 678d 1/1 639d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
WARNING in snd_pcm_drop syz done 1 669d 669d 1/1 639d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
BUG: corrupted list in fuse_dev_free syz done 1 672d 672d 1/1 641d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
general protection fault in kmem_cache_free syz done 3 672d 672d 1/1 641d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in snd_pcm_oss_release syz done 1 672d 672d 1/1 641d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Write in ex_handler_refcount C done 16 672d 881d 1/1 641d af7122cfbaee Bluetooth: add a mutex lock to avoid UAF in do_enale_set
KASAN: double-free or invalid-free in (null) syz done 1 673d 673d 1/1 642d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
BUG: corrupted list in mousedev_release syz done 1 675d 675d 1/1 644d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
INFO: trying to register non-static key in uhid_char_release C done 2 676d 695d 1/1 645d 9e5894b7e222 HID: core: Correctly handle ReportSize being zero
KASAN: slab-out-of-bounds Read in hci_event_packet C done 17 687d 1161d 1/1 657d 68bb9eddbf5d Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt C done 6 688d 705d 1/1 658d 68bb9eddbf5d Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
KASAN: use-after-free Read in get_block C done 8 693d 818d 1/1 662d 0900097ef667 fs/minix: reject too-large maximum file size
WARNING in inc_nlink C done 21 694d 836d 1/1 663d 12490f06ef08 fs/minix: don't allow getting deleted inodes
KASAN: slab-out-of-bounds Read in get_block C done 2 693d 724d 1/1 663d 0900097ef667 fs/minix: reject too-large maximum file size
BUG: unable to handle kernel NULL pointer dereference in get_block C done 45 694d 841d 1/1 664d 3c775629a5ff fs/minix: check return value of sb_getblk()
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt C done 5 698d 703d 1/1 665d d91299b8382b Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
KASAN: use-after-free Read in delete_and_unsubscribe_port syz done 2 706d 706d 1/1 673d ccafbed8b2f6 ALSA: seq: oss: Serialize ioctls
KASAN: double-free or invalid-free in 0x2 syz done 1 706d 706d 1/1 673d ccafbed8b2f6 ALSA: seq: oss: Serialize ioctls
INFO: task hung in fb_release C done 48 708d 939d 1/1 677d c388072f90cc fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
unregister_netdevice: waiting for DEV to become free C done 120 734d 1173d 1/1 703d 0f7f0b057417 ipvs: fix tinfo memory leak in start_sync_thread
general protection fault in batadv_iv_ogm_schedule_buff 1 810d 810d 1/1 728d e181bb93c904 batman-adv: Don't schedule OGM for disabled interface
KASAN: null-ptr-deref Write in choke_reset C done 283 777d 807d 1/1 747d 4836eb6b5965 sch_choke: avoid potential panic in choke_reset()
KASAN: use-after-free Read in do_blk_trace_setup C done 342 778d 1182d 1/1 747d b390c22c0bc7 blktrace: fix unlocked access to init/start-stop/teardown
WARNING in xfrm_policy_insert syz done 8 781d 1040d 1/1 751d 1cd914b02b5a xfrm: fix a warning in xfrm_policy_insert_list
KASAN: slab-out-of-bounds Write in snd_rawmidi_kernel_write1 C done 1 783d 813d 1/1 752d 8645ac3684a7 ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
WARNING: ODEBUG bug in route4_change C done 23 825d 853d 1/1 795d f0c92f59cf52 net_sched: cls_route: remove the right filter from hashtable
KASAN: use-after-free Write in release_tty C done 124 826d 945d 1/1 795d b9eb60a0ef39 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
WARNING: ODEBUG bug in rfcomm_dev_ioctl C done 2 834d 835d 1/1 804d 0da9c032adbb Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user C done 1 835d 835d 1/1 805d 25106012e91a xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
WARNING: refcount bug in sock_wfree C done done 3 836d 957d 1/1 806d 968f831d9056 sctp: fix refcount bug in sctp_wfree
KASAN: use-after-free Write in tcindex_set_parms C done 3 839d 840d 1/1 809d 9f8b6c44be17 net_sched: keep alloc_hash updated after hash allocation
KASAN: slab-out-of-bounds Write in tcindex_set_parms C done 2 840d 840d 1/1 809d 9f8b6c44be17 net_sched: keep alloc_hash updated after hash allocation
WARNING: ODEBUG bug in rfcomm_dlc_free C done 16 842d 1075d 1/1 811d 0da9c032adbb Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
KASAN: use-after-free Read in tty_open C done 5 844d 946d 1/1 814d b9eb60a0ef39 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: use-after-free Read in tty_buffer_cancel_work C done 2 853d 941d 1/1 823d b9eb60a0ef39 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: use-after-free Read in get_work_pool C done 1 854d 944d 1/1 824d b9eb60a0ef39 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: use-after-free Read in n_tty_receive_buf_common C done 25 856d 945d 1/1 825d a4719f6d07b2 vt: selection, push sel_lock up
WARNING: kernel stack frame pointer has bad value C done 65 861d 1165d 1/1 827d 377d7378a605 fjes: fix missed check in fjes_acpi_add
INFO: task hung in paste_selection C done 8 862d 937d 1/1 831d 7c315855c6f4 ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()
INFO: task hung in drain_all_pages C done 1 862d 862d 1/1 832d a86265edeb33 netfilter: xt_hashlimit: limit the max size of hashtable
INFO: task hung in tty_ldisc_hangup C done 17 869d 941d 1/1 839d a4719f6d07b2 vt: selection, push sel_lock up
INFO: task hung in hashlimit_mt_check_common C done 6 872d 924d 1/1 840d a86265edeb33 netfilter: xt_hashlimit: limit the max size of hashtable
KASAN: stack-out-of-bounds Write in ax25_getname C done 4 872d 1167d 1/1 840d ff8e12b0cfe2 vhost: Check docket sk_family instead of call getname
KASAN: slab-out-of-bounds Read in tcf_exts_destroy C done 1 876d 989d 1/1 846d 6cb448ee493c net_sched: fix an OOB access in cls_tcindex
general protection fault in path_openat C done 40 882d 888d 1/1 851d 40642747dd9f vfs: fix do_last() regression
BUG: sleeping function called from invalid context in tpk_write C done 10 882d 943d 1/1 851d ab84fd0d3dc8 ttyprintk: fix a potential deadlock in interrupt context issue
BUG: sleeping function called from invalid context in lock_sock_nested (2) syz done 1 884d 944d 1/1 854d 713ff7e4d605 crypto: af_alg - Use bh_lock_sock in sk_destruct
KASAN: use-after-free Read in ext4_xattr_set_entry C done 9 887d 979d 1/1 856d 08e4a312439c ext4: validate the debug_want_extra_isize mount option at parse time
KASAN: slab-out-of-bounds Read in __nla_put_nohdr C done 2 890d 890d 1/1 860d c5fd8a37e971 net-sysfs: Fix reference count leak
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock C done 1 894d 894d 1/1 863d c57b0f88fce8 Documentation: Document arm64 kpti control
KASAN: use-after-free Read in snd_timer_resolution C done 1 896d 896d 1/1 866d 43bb0a16b25d ALSA: seq: Fix racy access for queue timer in proc read
INFO: task hung in genl_rcv_msg syz done 2 900d 901d 1/1 870d 24070b40926b tcp: clear tp->total_retrans in tcp_disconnect()
WARNING in reconnect_path C done done 1 902d 962d 1/1 871d b6e209a13a61 exportfs: fix 'passing zero to ERR_PTR()' warning
KASAN: use-after-free Write in __alloc_skb C done 1 906d 936d 1/1 872d e841252840c4 net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
KASAN: use-after-free Read in cdev_put C done 6 906d 949d 1/1 875d 0ce254bc68ed xen-blkback: prevent premature module unload
KASAN: slab-out-of-bounds Read in macvlan_broadcast C done 6 907d 912d 1/1 877d 4a953272f2d2 macvlan: do not assume mac_header is set in macvlan_broadcast()
KASAN: use-after-free Read in macvlan_broadcast C done 8 909d 912d 1/1 878d 4a953272f2d2 macvlan: do not assume mac_header is set in macvlan_broadcast()
WARNING: bad unlock balance in gtp_encap_enable_socket C done 2 909d 912d 1/1 878d 887b0296a905 gtp: fix bad unlock balance in gtp_encap_enable_socket
KASAN: slab-out-of-bounds Read in bpf_skb_change_tail C done 2 915d 1061d 1/1 882d 7fed98f4a1e6 bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto C done 2 914d 1061d 1/1 882d 7fed98f4a1e6 bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Read in bpf_clone_redirect C done 11 920d 1083d 1/1 890d 7fed98f4a1e6 bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Read in bpf_skb_change_head C done 2 924d 993d 1/1 892d 7fed98f4a1e6 bpf: reject passing modified ctx to helper functions
possible deadlock in refcount_dec_and_mutex_lock C done 10 923d 995d 1/1 892d 4df728651b8a nbd: verify socket is supported during setup
WARNING: refcount bug in cdev_get C done 21 924d 1054d 1/1 894d 03a709593040 net: usb: lan78xx: Connect PHY before registering MAC
INFO: rcu detected stall in br_handle_frame (2) C done 1 929d 929d 1/1 899d 73a6f18d8390 pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
WARNING in ovl_rename syz done 2 933d 1165d 1/1 899d 6890751cfea7 ovl: relax WARN_ON() on rename to self
inconsistent lock state in sp_get C done 2 937d 937d 1/1 906d 8b58905f212b 6pack,mkiss: fix possible deadlock
KASAN: slab-out-of-bounds Read in linear_transfer C done 4 938d 945d 1/1 908d 2a76606d8a83 ALSA: pcm: oss: Avoid potential buffer overflows
possible deadlock in __might_fault C done 295 940d 1180d 1/1 909d d41971493d28 usb: mon: Fix a deadlock in usbmon between mmap and read
possible deadlock in mon_bin_vma_fault C done 282 941d 1176d 1/1 910d d41971493d28 usb: mon: Fix a deadlock in usbmon between mmap and read
WARNING: refcount bug in kobject_get C done 20 945d 1179d 1/1 915d 227db8e4c346 tipc: fix unlimited bundling of small messages
WARNING in refcount_error_report syz done 1 947d 947d 1/1 915d 7272e8e3bfa3 inet: protect against too small mtu values.
BUG: corrupted list in p9_fd_cancelled syz done 2 946d 992d 1/1 915d 8a82aee7bdfd arm64: Add MIDR encoding for Arm Cortex-A55 and Cortex-A35
BUG: unable to handle kernel paging request in slhc_free C done 4 950d 1177d 1/1 919d da0bbf51bdcb slip: make slhc_free() silently accept an error pointer
WARNING in dio_complete C done 27 950d 1179d 1/1 919d 365874a0eab5 blk-mq: avoid sysfs buffer overflow with too many CPU cores
KASAN: use-after-free Read in slip_open C done done 2 953d 953d 1/1 921d f5bcc687e3d6 slip: Fix use-after-free Read in slip_open
KASAN: use-after-free Read in kfree_skb C done 98 951d 1079d 1/1 921d 79d404a2aa86 Bluetooth: Fix invalid-free in bcsp_close()
INFO: task hung in nbd_ioctl C done 18 922d 996d 1/1 921d 4df728651b8a nbd: verify socket is supported during setup
WARNING: suspicious RCU usage in shmem_add_seals C done done 1435 958d 981d 1/1 928d 988f701a805b memfd: Use radix_tree_deref_slot_protected to avoid the warning.
possible deadlock in flush_workqueue C done 15 961d 1054d 1/1 931d 4df728651b8a nbd: verify socket is supported during setup
WARNING in bpf_jit_free syz done 60 1003d 1176d 1/1 932d 47569360be87 bpf: fix use after free in prog symbol exposure
INFO: task hung in lo_release syz done 128 1069d 1182d 1/1 932d 22f36db48781 Revert "block/loop: Use global lock for ioctl() operation."
BUG: unable to handle kernel NULL pointer dereference in inet_autobind C inconclusive done 3133 973d 981d 1/1 933d 7c3c0d51129a sctp: not bind the socket in sctp_connect
BUG: unable to handle kernel NULL pointer dereference in blk_mq_map_swqueue C done 20 934d 1172d 1/1 933d 0b584bf573ae nbd: fix max number of supported devs
BUG: unable to handle kernel paging request in dummy_set_vf_vlan C done 5 967d 1060d 1/1 933d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
BUG: unable to handle kernel paging request in dummy_set_vf_spoofchk C done 6 970d 1081d 1/1 933d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
BUG: unable to handle kernel paging request in dummy_get_vf_config C done 4 986d 1083d 1/1 936d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
WARNING: suspicious RCU usage in netem_enqueue C done 3 990d 1013d 1/1 936d 6f492e801033 net_sched: add max len check for TCA_KIND
BUG: unable to handle kernel paging request in dummy_set_vf_rss_query_en C done 5 990d 1081d 1/1 936d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
BUG: unable to handle kernel paging request in dummy_set_vf_mac C done 5 999d 1071d 1/1 937d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass C done 14 993d 1033d 1/1 937d 54b9f5791846 net_sched: check cops->tcf_block in tc_bind_tclass()
KASAN: null-ptr-deref Write in kvm_write_guest_virt_system C done 53 999d 1017d 1/1 937d 2890b718f4a8 watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout
WARNING in tcp_send_loss_probe C done 22 1020d 1030d 1/1 940d ba2ddb43f270 tcp: Don't dequeue SYN/FIN-segments from write-queue
general protection fault in tcp_push C done 55 1019d 1030d 1/1 940d f1dcc5ed4bea tcp: Reset send_head when removing skb from write-queue
BUG: unable to handle kernel paging request in dummy_set_vf_rate C done 3 1020d 1034d 1/1 940d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
WARNING in tcp_retransmit_timer C done 215 1019d 1030d 1/1 940d ba2ddb43f270 tcp: Don't dequeue SYN/FIN-segments from write-queue
general protection fault in qdisc_destroy C done 4 1019d 1024d 1/1 940d e0f600b69df3 net_sched: let qdisc_put() accept NULL pointer
INFO: rcu detected stall in mld_dad_timer_expire C done 1 1025d 1025d 1/1 940d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in br_handle_frame C done 15 1022d 1033d 1/1 941d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
WARNING in kernfs_get C done 17 1052d 1172d 1/1 941d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
INFO: rcu detected stall in mld_ifc_timer_expire C done 9 1024d 1033d 1/1 943d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
WARNING in xfrm_state_fini C done 193 1026d 1181d 1/1 943d cd393b38514d xfrm: clean up xfrm protocol checks
INFO: rcu detected stall in addrconf_dad_work C done 18 1026d 1033d 1/1 943d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in corrupted C done 3 1027d 1049d 1/1 943d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
BUG: unable to handle kernel paging request in dummy_set_vf_trust C done 2 1035d 1068d 1/1 944d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
WARNING in map_lookup_elem C done 2 1042d 1042d 1/1 944d 95867919494d KVM: x86: add tracepoints around __direct_map and FNAME(fetch)
WARNING: refcount bug in hci_register_dev C done 3 1039d 1054d 1/1 944d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
kernel BUG at ./include/linux/skbuff.h:LINE! C done 16 1035d 1061d 1/1 944d e5df4baea324 tcp: fix tcp_rtx_queue_tail in case of empty retransmit queue
general protection fault in packet_lookup_frame C done 1 1057d 1057d 1/1 945d 5ac73816dda7 net/packet: fix race in tpacket_snd()
WARNING: refcount bug in kobject_put C done 3 1061d 1168d 1/1 945d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
general protection fault in tcf_ife_init C done 12 1073d 1082d 1/1 946d 7fcc60e5f837 ife: error out when nla attributes are empty
general protection fault in kernfs_add_one C done 5 1069d 1138d 1/1 946d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
WARNING in sysfs_remove_group C done 1 1085d 1085d 1/1 947d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
BUG: unable to handle kernel paging request in coalesced_mmio_write C done 4 1103d 1109d 1/1 947d bf81752d808c KVM: coalesced_mmio: add bounds checking
WARNING in kernfs_put C done 2 1101d 1168d 1/1 947d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
KASAN: use-after-free Read in erspan_build_header C done 18 1148d 1182d 1/1 948d 1d629bf9b576 net: erspan: fix use-after-free
KASAN: slab-out-of-bounds Read in erspan_build_header C done 8 1146d 1182d 1/1 948d d93fb604c079 tipc: fix modprobe tipc failed after switch order of device registration
WARNING in notify_change C done 14 1111d 1177d 1/1 948d 2c5462425563 Abort file_remove_privs() for non-reg. files
KASAN: use-after-free Read in tcp_init_tso_segs C 1424 1019d 1030d 1/1 1006d f1dcc5ed4bea tcp: Reset send_head when removing skb from write-queue