MSan: Uninitialized Memory in ip6_hopopts_input
|
C |
|
|
6 |
216d |
218d
|
3/3 |
215d |
f09779b4fc4e
ip6_output: Initialize plen for ip6_hopopts_input.
|
UBSan: Undefined Behavior in dounmount
|
C |
|
|
130 |
216d |
218d
|
3/3 |
215d |
b7772f668d24
dounmount: Avoid &((struct vnode_impl *)NULL)->vi_vnode.
|
assert failed: sc->sc_parent->dk_rawopens > NUM
|
C |
|
|
59 |
785d |
816d
|
3/3 |
480d |
804127267a30
dk(4): Use disk_begindetach and rely on vdevgone to close instances.
|
panic: kernel di.NUM=S2dagnostic assertion "uio->uio_iovcnt > NUM" failed: file "/syzkaller/managers/ci2-netbs
|
|
|
|
1 |
592d |
592d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
assert failed: uAiio->uio_iovcnt > NUM
|
|
|
|
1 |
580d |
580d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
assert failed: uio->uio_iovcnt > NUM
|
C |
|
|
34 |
555d |
1017d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
assert failed: %uio->uio_iovcnt > NUM
|
C |
|
|
1 |
590d |
590d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
panic: keexecrnel diagnostic assertion "uio->uio_iovcnt > NUM" failed: file "/syzkaller/managers/ci2-netbsd-kubsan/kerne
|
syz |
|
|
1 |
795d |
795d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
panic: F8kernel diagnostic assertion "uio->uio_iovcnt > NUM" failed: file "/syzkaller/managers/ci2-netbsd-
|
C |
|
|
1 |
1017d |
1017d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
ASan: Unauthorized Access in uiomove
|
C |
|
|
16 |
590d |
1044d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
panic: kernel dAiagnos@t ic assertion "uio->uio_iovcnt > NUM" failed: f
|
|
|
|
1 |
592d |
592d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
assert failed: uio->uio_iohsyz-vcnt > NUM
|
C |
|
|
1 |
590d |
590d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
panic: kernel diagnostic assertion "uio->uio_iovcnt > NUM" failed: file "/syzkaller/managers/ci2-netbsd-kmsa
|
|
|
|
1 |
582d |
582d
|
3/3 |
548d |
a7a3e2ad8d57
tty(9): Make ttwrite update uio with only how much it has consumed.
|
assert failed: !netq->netq_stopping
|
|
|
|
1 |
571d |
571d
|
3/3 |
559d |
2b696ab4fdff
Fix missing check for netq->netq_stopping in vioif_rx_intr()
|
assert failed: sc->sc_dk.dk_openmask == NUM
|
C |
|
|
22 |
561d |
578d
|
3/3 |
561d |
17fe932c5f6c
dk(4): dkclose must handle a dying wedge too to close the parent.
76abd28dc391
ioctl(DIOCRMWEDGES): Delete only idle wedges.
|
assert failed: mutex_owned(&sc->sc_dk.dk_openlock)
|
|
|
|
4 |
573d |
578d
|
3/3 |
571d |
76e8386e9976
dk(4): Fix lock assertion in size increase: parent's, not wedge's.
|
UBSan: Undefined Behavior in tmpfs_reg_resize
|
|
|
|
1 |
574d |
574d
|
3/3 |
571d |
08655e8aab1e
tmpfs: Refuse sizes that overflow round_page.
|
panic: LOCKDEBUG: Mutex error: mi_userret,NUM: sleep lock held
|
|
|
|
6 |
578d |
579d
|
3/3 |
578d |
569b1a993381
disk(9): Fix missing unlock in error branch in previous change.
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/ci2-netbsd-kubsan/kernel/sys/kern/subr_pserialize.c:LINE, member
|
|
|
|
39 |
587d |
589d
|
3/3 |
584d |
245f5e21b00b
pserialize(9): Fix bug in recent micro-optimization.
|
panic: kernel debugging assertion "notin" failed: file "/syzkaller/managers/ci2-netbsd/kernel/sys/kern/subr_pserialize.c
|
|
|
|
1 |
585d |
585d
|
3/3 |
584d |
8727589ebb95
pserialize(9): Fix buggy assertion inside assertion.
|
UBSan: Undefined Behavior in playtone
|
C |
|
|
1 |
601d |
601d
|
3/3 |
600d |
5d38fb5bcae7
spkr(4): Avoid some overflow issues.
|
ASan: Unauthorized Access in playtone
|
C |
|
|
2 |
601d |
601d
|
3/3 |
600d |
5d38fb5bcae7
spkr(4): Avoid some overflow issues.
|
panic: sockaddr_copy: source too long, NUM < NUM bytes
|
C |
|
|
9 |
603d |
611d
|
3/3 |
601d |
4813aab66c53
atalk(4): Don't let userland control sa_len when adding addresses.
|
ASan: Unauthorized Access in ifreq_setaddr (2)
|
|
|
|
7 |
601d |
627d
|
3/3 |
601d |
4813aab66c53
atalk(4): Don't let userland control sa_len when adding addresses.
|
MSan: Uninitialized Memory in ifreq_setaddr
|
C |
|
|
8 |
601d |
611d
|
3/3 |
601d |
4813aab66c53
atalk(4): Don't let userland control sa_len when adding addresses.
|
ASan: Unauthorized Access in sockaddr_dup
|
C |
|
|
3 |
607d |
610d
|
3/3 |
601d |
4813aab66c53
atalk(4): Don't let userland control sa_len when adding addresses.
|
MSan: Uninitialized Memory in sin_print
|
C |
|
|
4 |
627d |
643d
|
3/3 |
601d |
d425b16c66a5
sockaddr_alloc(9): Avoid uninitialized buffer in sockaddr_checklen.
|
assert failed: sa->sa_len <= sizeof(ifr.ifr_ifru)
|
C |
|
|
10 |
602d |
607d
|
3/3 |
601d |
4813aab66c53
atalk(4): Don't let userland control sa_len when adding addresses.
|
ASan: Unauthorized Access in sat_print
|
C |
|
|
10 |
602d |
623d
|
3/3 |
601d |
4813aab66c53
atalk(4): Don't let userland control sa_len when adding addresses.
|
netbsd boot error: ASan: Unauthorized Access in evcnt_attach_dynamic
|
|
|
|
33 |
607d |
609d
|
3/3 |
602d |
317ef74dd360
vioif(4): fix wrong memory allocation size
|
netbsd boot error: assert failed: len <= map->dm_mapsize - offset (2)
|
|
|
|
135 |
603d |
605d
|
3/3 |
602d |
31edf7b5b57e
virtio(4): Fix sizing of virtqueue allocation.
|
netbsd boot error: page fault in virtio_free_vq
|
|
|
|
27 |
607d |
608d
|
3/3 |
602d |
a66d32465828
Added check of pointer for allocated memory before release of resource
|
panic: kernel debugging assertion "off + len <= m_length(m0)" failed: file "/syzkaller/managers/ci2-netbsd-kubsan/kernel
|
syz |
|
|
5 |
612d |
630d
|
3/3 |
609d |
4ae0945c2b68
in6: make sure a user-specified checksum field is within a packet
|
panic: kernel debugging assertion "off + len <= m_length(m0)" failed: file "/syzkaller/managers/ci2-netbsd/kernel/sys/ke
|
syz |
|
|
1 |
612d |
612d
|
3/3 |
609d |
4ae0945c2b68
in6: make sure a user-specified checksum field is within a packet
|
panic: kernel debugging assertion "off + len <= m_length(m0)" failed: file "/syzkaller/managers/ci2-netbsd-kmsan/kernel/
|
syz |
|
|
3 |
612d |
630d
|
3/3 |
609d |
4ae0945c2b68
in6: make sure a user-specified checksum field is within a packet
|
assert failed: fmi->fmi_mount->mnt_lower == NULL
|
C |
|
|
5 |
652d |
661d
|
3/3 |
646d |
af759f02178d
When mounting a union file system set its lower mount only on success.
|
assert failed: size > NUM
|
C |
|
|
4 |
679d |
679d
|
3/3 |
677d |
9e1aa1e4ed1b
It is not sufficient to have a comment /* Sanity check the size. */, also check the size is greater than zero and a multiple of DEV_BSIZE.
|
protection fault in __asan_load4
|
C |
|
|
3 |
765d |
917d
|
3/3 |
700d |
238664abb5cc
ppp: remove ioctls that never worked and crash the kernel
|
page fault in __asan_load4 (3)
|
C |
|
|
64 |
715d |
870d
|
3/3 |
700d |
238664abb5cc
ppp: remove ioctls that never worked and crash the kernel
|
page fault in ppptioctl
|
C |
|
|
6 |
754d |
858d
|
3/3 |
700d |
238664abb5cc
ppp: remove ioctls that never worked and crash the kernel
|
protection fault in ppptioctl
|
C |
|
|
3 |
726d |
917d
|
3/3 |
700d |
238664abb5cc
ppp: remove ioctls that never worked and crash the kernel
|
UBSan: Undefined Behavior in ppptioctl
|
C |
|
|
9 |
711d |
858d
|
3/3 |
700d |
238664abb5cc
ppp: remove ioctls that never worked and crash the kernel
|
assert failed: bp->b_vp == vp
|
C |
|
|
125 |
702d |
1422d
|
3/3 |
701d |
1f3bc2830b81
swap: disallow user opens of swap block device
|
panic: dead fs operation used (2)
|
C |
|
|
8 |
711d |
721d
|
3/3 |
709d |
85cb97f0d716
Harden layered file systems usage of field "mnt_lower" against forced unmounts of the lower layer.
|
page fault in VFS_STATVFS
|
syz |
|
|
1 |
718d |
718d
|
3/3 |
709d |
85cb97f0d716
Harden layered file systems usage of field "mnt_lower" against forced unmounts of the lower layer.
|
UBSan: Undefined Behavior in ip_ctloutput
|
C |
|
|
22 |
751d |
755d
|
3/3 |
724d |
74557efd80ae
tcp: restore NULL check for inp in tcp_ctloutput
|
page fault in ip_ctloutput
|
C |
|
|
18 |
751d |
754d
|
3/3 |
724d |
74557efd80ae
tcp: restore NULL check for inp in tcp_ctloutput
|
UBSan: Undefined Behavior in tcp_bind_wrapper
|
C |
|
|
8 |
752d |
755d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
UBSan: Undefined Behavior in tcp_shutdown_wrapper
|
C |
|
|
45 |
751d |
755d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
page fault in tcp_bind_wrapper
|
C |
|
|
9 |
753d |
755d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
page fault in tcp_recvoob_wrapper
|
C |
|
|
23 |
751d |
755d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
page fault in tcp_sockaddr_wrapper
|
C |
|
|
32 |
751d |
754d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
UBSan: Undefined Behavior in ip6_ctloutput
|
C |
|
|
5 |
752d |
754d
|
3/3 |
724d |
74557efd80ae
tcp: restore NULL check for inp in tcp_ctloutput
|
page fault in ip_setmoptions
|
C |
|
|
2 |
754d |
754d
|
3/3 |
724d |
74557efd80ae
tcp: restore NULL check for inp in tcp_ctloutput
|
page fault in ip6_ctloutput
|
C |
|
|
4 |
752d |
754d
|
3/3 |
724d |
74557efd80ae
tcp: restore NULL check for inp in tcp_ctloutput
|
UBSan: Undefined Behavior in tcp_listen_wrapper
|
C |
|
|
15 |
751d |
755d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
UBSan: Undefined Behavior in tcp_connect_wrapper
|
C |
|
|
23 |
752d |
755d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
UBSan: Undefined Behavior in tcp_recvoob_wrapper
|
C |
|
|
26 |
751d |
755d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
UBSan: Undefined Behavior in tcp_sockaddr_wrapper
|
C |
|
|
25 |
751d |
755d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
page fault in tcp_connect_wrapper
|
C |
|
|
18 |
751d |
754d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
page fault in tcp_listen_wrapper
|
C |
|
|
17 |
751d |
754d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
page fault in tcp_shutdown_wrapper
|
C |
|
|
36 |
751d |
754d
|
3/3 |
724d |
443b5cdb2251
tcp: restore NULL checks for inp
|
UBSan: Undefined Behavior in lf_advlock (3)
|
C |
|
|
2 |
748d |
748d
|
3/3 |
724d |
1a4aa843e5ad
kern/vfs_lockf.c: Parenthesize to make arithmetic match check.
|
assert failed: !topdown || hint <= orig_hint
|
C |
|
|
474 |
727d |
899d
|
3/3 |
727d |
4d78161c33fb
mmap(2): Avoid arithmetic overflow in search for free space.
|
page fault in umap_bypass
|
C |
|
|
9 |
729d |
735d
|
3/3 |
728d |
db9cd5dd3e78
When testing whiteout support on the underlying file system union_mount() should not use a NULL componentname as not all file systems can handle it.
|
UBSan: Undefined behavior (7)
|
|
|
|
1 |
734d |
734d
|
3/3 |
728d |
db9cd5dd3e78
When testing whiteout support on the underlying file system union_mount() should not use a NULL componentname as not all file systems can handle it.
|
UBSan: Undefined Behavior in umap_bypass
|
C |
|
|
30 |
729d |
735d
|
3/3 |
728d |
db9cd5dd3e78
When testing whiteout support on the underlying file system union_mount() should not use a NULL componentname as not all file systems can handle it.
|
assert failed: fstrans_is_owner(mp) (2)
|
C |
|
|
3 |
759d |
759d
|
3/3 |
741d |
aac0938bfe9c
Tmpfs_mount() uses tmpfs_unmount() for cleanup if set_statvfs_info() fails. This will not work as tmpfs_unmount() needs a suspended file system.
|
UBSan: Undefined Behavior in quota1_handle_cmd_get
|
C |
|
|
2 |
792d |
792d
|
3/3 |
791d |
d111e83da20a
compat_50_quota: reject invalid quota id types.
|
UBSan: Undefined Behavior in bpf_ioctl (2)
|
C |
|
|
2 |
810d |
810d
|
3/3 |
809d |
5e84044ef5a3
bpf(4): Reject bogus timeout values before arithmetic overflows.
|
page fault in raidioctl
|
|
|
|
1 |
817d |
817d
|
3/3 |
816d |
8c026762c3a1
RAIDframe must be initialized for the RAIDFRAME_SET_LAST_UNIT and RAIDFRAME_SHUTDOWN ioctls.
|
assert failed: (l = dev->dv_detaching) == curlwp
|
C |
|
|
2 |
820d |
820d
|
3/3 |
817d |
e7c9fe41a3a1
audio(4): Fix bug in detaching audio16 and beyond.
|
UBSan: Undefined Behavior in config_detach_commit
|
C |
|
|
13 |
819d |
830d
|
3/3 |
817d |
e7c9fe41a3a1
audio(4): Fix bug in detaching audio16 and beyond.
|
panic: netbsd:vpanic+0x282
|
|
|
|
1 |
838d |
838d
|
3/3 |
817d |
e7c9fe41a3a1
audio(4): Fix bug in detaching audio16 and beyond.
|
page fault in __asan_load8 (6)
|
C |
|
|
23 |
819d |
858d
|
3/3 |
817d |
e7c9fe41a3a1
audio(4): Fix bug in detaching audio16 and beyond.
|
page fault in config_detach_commit
|
C |
|
|
8 |
820d |
830d
|
3/3 |
817d |
e7c9fe41a3a1
audio(4): Fix bug in detaching audio16 and beyond.
|
assert failed: dev->dv_detaching == curlwp
|
C |
|
|
236 |
831d |
946d
|
3/3 |
817d |
e7c9fe41a3a1
audio(4): Fix bug in detaching audio16 and beyond.
|
assert failed: kpreempt_disabled() (2)
|
syz |
|
|
4 |
827d |
827d
|
3/3 |
821d |
1e8b246aa870
KERNEL_LOCK(9): Need kpreempt_disable to ipi_send, oops.
|
assert failed: curcpu() != ci
|
C |
|
|
1 |
827d |
827d
|
3/3 |
826d |
e94ab9ad30fc
KERNEL_LOCK(9): Record kernel lock holder in fast path too.
|
assert failed: lktype != LK_NONE
|
C |
|
|
8 |
949d |
949d
|
3/3 |
828d |
Fix mistake in error branch locking caused by previous changes. vput(vp) also unlocks vp, thus unlocking happens twice in error flow causing kernel to panic with failed assertion lktype != LK_NONE in vfs_vnode.c#778. Thanks riastradh with finding the issue.
|
assert failed: sn->sn_opencnt
|
|
|
|
18 |
836d |
934d
|
3/3 |
831d |
2ab99543441b
specfs: Refuse to open a closing-in-progress block device.
|
MSan: Uninitialized Memory in rum_attach
|
syz |
|
|
2 |
831d |
831d
|
3/3 |
831d |
3259e3c92306
rum(4): Avoid uninitialized garbage in failed register read.
|
assert failed: sd->sd_closing
|
C |
|
|
20 |
863d |
950d
|
3/3 |
831d |
2ab99543441b
specfs: Refuse to open a closing-in-progress block device.
|
assert failed: !fmi->fmi_gone
|
C |
|
|
3 |
854d |
854d
|
3/3 |
832d |
3221343e60bf
Finish previous, evaluate the lowest mount on first access to "struct mount_info" and store it here so we no longer derefence the "struct mount" from fstrans_alloc_lwp_info().
|
page fault in vrefcnt
|
syz |
|
|
2 |
837d |
837d
|
3/3 |
832d |
440d02956565
raidframe: reject invalid values for numCol and numSpares
|
MSan: Uninitialized Memory in rf_UnconfigureVnodes
|
syz |
|
|
5 |
837d |
838d
|
3/3 |
832d |
440d02956565
raidframe: reject invalid values for numCol and numSpares
|
ASan: Unauthorized Access in rf_UnconfigureVnodes
|
syz |
|
|
8 |
837d |
838d
|
3/3 |
832d |
440d02956565
raidframe: reject invalid values for numCol and numSpares
|
panic: kmem_free(ADDR, NUM) != allocated size NUM; overwrote?
|
C |
|
|
3 |
842d |
842d
|
3/3 |
832d |
bd3b97511997
ptyfs: Don't copy out cookies past end of buffer.
|
UBSan: Undefined Behavior in vrefcnt
|
syz |
|
|
5 |
837d |
838d
|
3/3 |
833d |
440d02956565
raidframe: reject invalid values for numCol and numSpares
|
UBSan: Undefined Behavior in sys_rasctl (2)
|
C |
|
|
4 |
835d |
836d
|
3/3 |
835d |
9bb32e73c033
rasctl(2): Avoid arithmetic overflow.
|
panic: mutex_destroy,NUM: uninitialized lock (lock=ADDR, from=ADDR) (4)
|
C |
|
|
4 |
837d |
837d
|
3/3 |
836d |
388438075058
uirda(4): Unconditionally initializes mutexes and selq on attach.
|
netbsd boot error: panic: pmap_get_physpage: out of memory
|
|
|
|
51 |
838d |
841d
|
3/3 |
838d |
1369379d4106
allow KMSAN to work again by restoring the limiting of kva even with NKMEMPAGES_MAX_UNLIMITED. we used to limit kva to 1/8 of physmem but limiting to 1/4 should be enough, and 1/4 still gives the kernel enough kva to map all of the RAM that KMSAN has not stolen.
|
UBSan: Undefined Behavior in sys_rasctl
|
C |
|
|
10 |
838d |
841d
|
3/3 |
838d |
ab293a4a7778
rasctl(2): Avoid overflow in address range arithmetic.
|
ASan: Unauthorized Access in _prop_object_internalize_context_alloc
|
C |
|
|
6 |
840d |
840d
|
3/3 |
838d |
efe5c7855eb5
proplib: Don't run off end of buffer with memcmp.
|
panic: ASan: Unauthorized Access In ADDR: Addr ADDR [NUM bytes, write, MallocRedZone]
|
C |
|
|
1 |
842d |
842d
|
3/3 |
838d |
bd3b97511997
ptyfs: Don't copy out cookies past end of buffer.
|
UBSan: Undefined Behavior in lf_advlock (2)
|
C |
|
|
2 |
841d |
841d
|
3/3 |
838d |
c176bd8b3461
kern/vfs_lockf.c: Fix overflow in overflow detection.
|
UBSan: Undefined Behavior in physio.cold
|
C |
|
|
2 |
1356d |
1356d
|
3/3 |
864d |
c02dc4be552e
physio(9): Avoid left shift of negative in alignment check.
|
assert failed: l->l_lid == pls->pl_lwpid
|
C |
|
|
133 |
864d |
1644d
|
3/3 |
864d |
3f5ac2f440aa
ptrace(PT_LWPSTATUS): Fix lid=0 case.
|
UBSan: Undefined Behavior in compat_43_ttioctl.cold (2)
|
C |
|
|
119 |
866d |
1455d
|
3/3 |
864d |
1ee0fc7f9c22
tty_43: Do unsigned arithmetic to avoid shift into sign bits.
|
UBSan: Undefined Behavior in cpuctl_ioctl.cold
|
C |
|
|
44 |
867d |
1337d
|
3/3 |
864d |
72a9875cfdda
cpuio.h: Use uint8_t, not bool.
|
UBSan: Undefined Behavior in tty_get_qsize.cold.5
|
C |
|
|
63 |
1532d |
1546d
|
3/3 |
864d |
ad11505eeb84
tty: Avoid undefined behaviour (left shift of 1 by 31 places overflows int)
|
UBSan: Undefined Behavior in compat_43_ttioctl.cold.0
|
C |
|
|
122 |
1531d |
1593d
|
3/3 |
864d |
c32467e14928
tty_43: Check a bitset from userspace is valid before shifting it
|
assert failed: fli != NULL && !fli->fli_mountinfo->fmi_gone
|
C |
|
|
4 |
1351d |
1351d
|
3/3 |
866d |
42ef1506f14b
While one thread runs vgone() it is possible for another thread to grab a "v_mount" that will be freed before it uses this mount for fstrans_start().
|
panic: dead fs operation used
|
C |
|
|
109 |
868d |
1459d
|
3/3 |
866d |
4c6398a93d72
Make dead vfs ops "vfs_statvfs" and "vfs_vptofh" return EOPNOTSUPP. Both operations may originate from (possible dead) vnodes.
|
page fault in __asan_load8 (5)
|
C |
|
|
2 |
868d |
868d
|
3/3 |
867d |
98368ce402c5
ifioctl(9): Don't touch ifconf or ifreq until command is validated.
|
page fault in compat_ifconf
|
C |
|
|
1 |
868d |
868d
|
3/3 |
867d |
98368ce402c5
ifioctl(9): Don't touch ifconf or ifreq until command is validated.
|
UBSan: Undefined Behavior in compat_ifconf
|
C |
|
|
37 |
868d |
1073d
|
3/3 |
867d |
98368ce402c5
ifioctl(9): Don't touch ifconf or ifreq until command is validated.
|
UBSan: Undefined Behavior in udv_attach
|
C |
|
|
2 |
869d |
869d
|
3/3 |
868d |
583a8e6e3a6f
mmap(2): Prohibit overflowing offsets for non-D_NEGOFFSAFE devices.
|
MSan: Uninitialized Memory in pppioctl
|
C |
|
|
3 |
909d |
931d
|
3/3 |
868d |
59e62decad23
net/if_ppp.c: Avoid user-controlled overrun in PPPIOCSCOMPRESS.
|
MSan: Uninitialized Memory in ifq_enqueue (2)
|
C |
|
|
6 |
900d |
1071d
|
3/3 |
872d |
311083ee523b
sendto(2), recvfrom(2): Scrub internal struct msghdr on stack.
|
UBSan: Undefined Behavior in settime1.constprop.5
|
C |
|
|
6 |
1531d |
1631d
|
3/3 |
873d |
d5c20c2f7d03
kern_time: prevent the system clock from being set too low or high
|
page fault in __asan_store1
|
C |
|
|
23 |
1239d |
1240d
|
3/3 |
873d |
6cfadad833d3
Improve Christos's vn_open fix.
|
UBSan: Undefined Behavior in route_filter
|
C |
|
|
3 |
874d |
874d
|
3/3 |
873d |
54579f919bf1
route(4): Use m_copydata, not misaligned mtod struct access.
|
UBSan: Undefined Behavior in lf_advlock
|
C |
|
|
138 |
876d |
1636d
|
3/3 |
874d |
3ca83894cccd
vfs(9): Avoid arithmetic overflow in lf_advlock.
|
assert failed: p != NULL (2)
|
C |
|
|
5 |
894d |
894d
|
3/3 |
874d |
ee077f1ff323
uvideo(4): Make alloc logic match free logic.
|
MSan: Uninitialized Memory in comintr (2)
|
syz |
|
|
3 |
913d |
916d
|
3/3 |
874d |
501a519f2746
ktrace(9): Zero-initialize padding for ktr_psig records.
|
panic: mutex_destroy,NUM: uninitialized lock (lock=ADDR, from=ADDR) (3)
|
C |
|
|
4 |
875d |
875d
|
3/3 |
874d |
1595c1ec759c
upgt(4): Make upgt_free_cmd match upgt_alloc_cmd.
|
panic: LOCKDEBUG: Mutex error: mi_userret,116: sleep lock held
|
C |
|
|
704 |
874d |
1513d
|
3/3 |
874d |
5d4501959988
sequencer(4): Fix lock leak in ioctl(FIOASYNC).
|
assert failed: (!cpu_intr_p() && !cpu_softintr_p()) || (pc->pc_pool.pr_ipl != IPL_NONE || cold || panicstr != NULL)
|
C |
|
|
5398 |
875d |
1123d
|
3/3 |
875d |
9b17a1de3d64
ktrace(9): Fix mutex detection in ktrcsw.
7baa9e8e9079
sleepq(9): Pass syncobj through to sleepq_block.
|
panic: vfs load failed for `compat_12', error NUM (2)
|
|
|
|
1 |
949d |
949d
|
3/3 |
875d |
9b17a1de3d64
ktrace(9): Fix mutex detection in ktrcsw.
|
UBSan: Undefined Behavior in compat_50_route_output (2)
|
C |
|
|
3 |
875d |
875d
|
3/3 |
875d |
0ac8a4883e80
route(4): Avoid unaligned access to struct rt_msghdr, take two.
|
assert failed: usp->tv_nsec >= NUM
|
C |
|
|
31 |
875d |
875d
|
3/3 |
875d |
85232e61d86a
recvmmsg(2): More timespec validation.
|
assert failed: usp->tv_nsec < ADDRL
|
C |
|
|
79 |
875d |
876d
|
3/3 |
875d |
85232e61d86a
recvmmsg(2): More timespec validation.
|
panic: ernel diagnostic assertion "(!cpu_intr_p() && !cpu_softintr_p()) || (pc->pc_pool.pr_ipl != IPL_NONE || cold || pa
|
|
|
|
1 |
949d |
949d
|
3/3 |
875d |
9b17a1de3d64
ktrace(9): Fix mutex detection in ktrcsw.
|
page fault in rf_fail_disk
|
C |
|
|
1 |
878d |
878d
|
3/3 |
876d |
cb9f2873bc80
RAIDframe must be initialized for the RAIDFRAME_FAIL_DISK80 ioctl.
|
page fault in uaudio_attach
|
C |
|
|
3 |
1064d |
1065d
|
3/3 |
876d |
fccfc6a75979
Fix a null-deref
|
assert failed: pipe != NULL
|
C |
|
|
5 |
1069d |
1429d
|
3/3 |
876d |
04d39af408ac
umidi(4): Fix fencepost in error branch.
|
panic: tcp_output: no template
|
C |
|
|
5612 |
878d |
2094d
|
3/3 |
876d |
9515e062613e
tcp(4): Bail early on sendoob if not connected.
|
assert failed: tp->t_oproc != NULL
|
C |
|
|
3 |
891d |
891d
|
3/3 |
876d |
332204ac46c2
remove KASSERT() checking for t_oproc at open since assigning this line discipline to a pty may not have that set. Instead do a runtime check to ensure that the function exists before calling it, as ttstart() handles it.
|
UBSan: Undefined Behavior in rf_fail_disk
|
C |
|
|
2 |
878d |
878d
|
3/3 |
876d |
cb9f2873bc80
RAIDframe must be initialized for the RAIDFRAME_FAIL_DISK80 ioctl.
|
UBSan: Undefined Behavior in gettimeleft
|
C |
|
|
20 |
883d |
1346d
|
3/3 |
876d |
eaf33ef422b2
kern: Avoid arithmetic overflow in gettimeleft.
|
UBSan: Undefined Behavior in sys_recvmmsg
|
C |
|
|
491 |
877d |
1565d
|
3/3 |
876d |
f068c6af2cca
recvmmsg(2): Avoid arithmetic overflow in timeout calculations.
|
ASan: Unauthorized Access in ktr_kuser
|
C |
|
|
23 |
885d |
1121d
|
3/3 |
877d |
c3bf6f9596ea
sendmsg(2): Avoid buffer overrun in ktrace of invalid cmsghdr.
|
UBSan: Undefined Behavior in ts2timo (3)
|
C |
|
|
16 |
878d |
979d
|
3/3 |
878d |
54baa6cf231f
kern: Use timespecsubok in ts2timo.
|
assert failed: requested_size > NUM
|
C |
|
|
7 |
880d |
903d
|
3/3 |
878d |
2b1f9e508ead
umcs(4): Reject invalid interrupt endpoints.
|
UBSan: Undefined Behavior in dosetitimer.part.NUM
|
C |
|
|
147 |
879d |
1000d
|
3/3 |
878d |
36bb851c524a
setitimer(2): Guard against overflow in arithmetic.
|
UBSan: Undefined behavior (5)
|
|
|
|
1 |
895d |
895d
|
3/3 |
878d |
8ebaf25c4728
route(4): Avoid unaligned access to struct rt_msghdr.
|
assert failed: ci != NULL
|
C |
|
|
4 |
908d |
908d
|
3/3 |
878d |
ff733a254dd9
opencrypto(9): Fix missing initialization in error branch.
|
panic: mutex_destroy,NUM: uninitialized lock (lock=ADDR, from=ADDR) (2)
|
C |
|
|
8 |
878d |
914d
|
3/3 |
878d |
9bef90fe6e34
emdtv(4): More attach/detach bugs.
|
UBSan: Undefined Behavior in itimer_callout
|
C |
|
|
6 |
886d |
941d
|
3/3 |
878d |
2699443359f1
setitimer(2): Avoid arithmetic overflow in periodic bookkeeping.
|
UBSan: Undefined Behavior in uao_detach
|
|
|
|
2 |
947d |
947d
|
3/3 |
946d |
3e14ad04ec73
Revert "mmap(2): If we fail with a hint, try again without it."
|
ASan: Unauthorized Access in uvm_unmap_detach
|
C |
|
|
7 |
946d |
947d
|
3/3 |
946d |
3e14ad04ec73
Revert "mmap(2): If we fail with a hint, try again without it."
|
page fault in udv_detach
|
|
|
|
1 |
946d |
946d
|
3/3 |
946d |
3e14ad04ec73
Revert "mmap(2): If we fail with a hint, try again without it."
|
panic: vrelel: bad ref count
|
C |
|
|
2 |
946d |
947d
|
3/3 |
946d |
3e14ad04ec73
Revert "mmap(2): If we fail with a hint, try again without it."
|
ASan: Unauthorized Access in uao_reference
|
|
|
|
1 |
947d |
947d
|
3/3 |
946d |
3e14ad04ec73
Revert "mmap(2): If we fail with a hint, try again without it."
|
assert failed: (use & VUSECOUNT_MASK) > NUM
|
C |
|
|
22 |
946d |
947d
|
3/3 |
946d |
3e14ad04ec73
Revert "mmap(2): If we fail with a hint, try again without it."
|
page fault in uvm_mmap
|
|
|
|
1 |
946d |
946d
|
3/3 |
946d |
3e14ad04ec73
Revert "mmap(2): If we fail with a hint, try again without it."
|
panic: [ NUM.ADDR] vpanic() at netbsd:vpanic+0x2f2
|
|
|
|
1 |
947d |
947d
|
3/3 |
946d |
3e14ad04ec73
Revert "mmap(2): If we fail with a hint, try again without it."
|
ASan: Unauthorized Access in audio_track_set_format
|
|
|
|
1 |
950d |
950d
|
3/3 |
946d |
2348e3fa2200
audio(4): Wait for opens to drain in detach.
|
assert failed: VOP_ISLOCKED(vp) == LK_EXCLUSIVE
|
C |
|
|
73 |
949d |
950d
|
3/3 |
946d |
7f28edca2400
sequencer(4): VOP_CLOSE requires vnode lock.
|
UBSan: Undefined Behavior in rnd_detach_source
|
C |
|
|
9 |
1047d |
1047d
|
3/3 |
946d |
89f519024a36
ucom(4): Make sure rndsource is attached before use and detach.
|
panic: spkr1 at audio1kernel diagnostic assertion "(target->prt_class == class)" failed: file "/syzkaller/managers/ci2-n
|
|
|
|
1 |
966d |
966d
|
3/3 |
946d |
65a628cc3991
audio(4): Use d_cfdriver/devtounit to avoid open/detach races.
|
ASan: Unauthorized Access in uvideo_attach
|
|
|
|
1 |
1027d |
1027d
|
3/3 |
946d |
0207ad5e9c01
uvideo(4): Parse descriptors more robustly.
|
netbsd boot error: fault in supervisor mode
|
|
|
|
9 |
964d |
964d
|
3/3 |
946d |
e86caeaead15
cgd(4): Omit technically-correct-but-broken adiantum dependency again.
|
netbsd boot error: assert failed: locks == curcpu()->ci_biglock_count
|
|
|
|
2 |
966d |
966d
|
3/3 |
946d |
a2bbd8e60824
Revert "kern: Sprinkle biglock-slippage assertions."
|
netbsd boot error: UBSan: Undefined Behavior in node_insert
|
|
|
|
1 |
966d |
966d
|
3/3 |
946d |
0916fe48b6c1
thmap(9): Handle memory allocation failure in root_try_put.
|
netbsd boot error: assert failed: ci->ci_ilevel <= IPL_VM
|
|
|
|
18 |
965d |
965d
|
3/3 |
946d |
22a2be59f9a4
cgd(4): Remove recently added dependency on adiantum.
|
MSan: Uninitialized Memory in umcs7840_attach
|
C |
|
|
5 |
947d |
949d
|
3/3 |
946d |
d67e9a1cf03e
umcs(4): Avoid using uninitialized data if register read fails.
|
netbsd boot error: assert failed: curlwp->l_pflag & LP_BOUND
|
|
|
|
36 |
972d |
973d
|
3/3 |
946d |
517fa18875c3
entropy(9): Call entropy_softintr while bound to CPU.
|
netbsd boot error: MSan: Uninitialized Memory in bus_dmamap_sync
|
|
|
|
177 |
1019d |
1028d
|
3/3 |
964d |
9fdc83c65c2c
Initialize "replun" -- found with KMSAN.
|
ASan: Unauthorized Access in umidi_attach
|
C |
|
|
69 |
979d |
1606d
|
3/3 |
976d |
4d8f12e265c1
umidi(4): Parse descriptors a little more robustly.
|
ASan: Unauthorized Access in usbd_get_no_alts
|
C |
|
|
4 |
1064d |
1340d
|
3/3 |
977d |
4fc17b686835
usbdi(9): Fix usbd_get_no_alts.
|
assert failed: filter->bf_insn != NULL
|
C |
|
|
114 |
983d |
1560d
|
3/3 |
981d |
b90f3afc19bc
bpf(4): Handle null bf_insn on free.
|
UBSan: Undefined Behavior in do_posix_fadvise
|
|
|
|
1 |
982d |
982d
|
3/3 |
981d |
841c8d016803
posix_fadvise(2): Detect arithmetic overflow without UB.
|
assert failed: fvp != tvp
|
C |
|
|
11 |
1128d |
1128d
|
3/3 |
981d |
Don't use genfs_rename_knote() in the "rename foo over hard-link to itself" case, which simply results in removing the "from" name; there are assertions in genfs_rename_knote() that are too strong for that case.
|
assert failed: !(timo == NUM && intr == false)
|
C |
|
|
4 |
1131d |
1131d
|
3/3 |
981d |
- microtime -> microuptime - avoid kpause with timeo=0
|
assert failed: kpreempt_disabled()
|
C |
|
|
12 |
982d |
982d
|
3/3 |
982d |
9529bac45e11
tun(4): Fix bug introduced in previous locking change.
|
assert failed: requested_size > 0 (2)
|
C |
|
|
20 |
1063d |
1427d
|
3/3 |
982d |
8d83d79bc57a
umidi(4): Bail early if no endpoints.
|
panic: ugen0 at uhub3kernel diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd-kmsan/kernel/
|
|
|
|
1 |
989d |
989d
|
3/3 |
982d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
assert failed: pb->pb_pathcopyuses == NUM
|
C |
|
|
3 |
1052d |
1052d
|
3/3 |
982d |
5a9cf8fcf6e0
ccd(4): Only pathbuf_destroy if pathbuf_copyin succeeded.
|
assert failed: maxblksize > NUM
|
C |
|
|
4 |
1033d |
1049d
|
3/3 |
982d |
5bdcc4fe2017
pad(4): Do harmless, not harmful, integer truncation.
|
panic: pad3: outputs: 44100Hz, NUM-bit, stereo
|
C |
|
|
1 |
1049d |
1049d
|
3/3 |
982d |
5bdcc4fe2017
pad(4): Do harmless, not harmful, integer truncation.
|
panic: audio0: detached
|
|
|
|
1 |
1033d |
1033d
|
3/3 |
982d |
5bdcc4fe2017
pad(4): Do harmless, not harmful, integer truncation.
|
UBSan: Undefined Behavior in vn_open
|
C |
|
|
34 |
1239d |
1240d
|
3/3 |
982d |
PR/56286: Martin Husemann: Fix NULL deref on kmod load. - No need to set ret_domove and ret_fd in the regular case, they are meaningless - KASSERT instead of setting errno and then doing the NULL deref.
|
UBSan: Undefined Behavior in sys_lseek
|
C |
|
|
2 |
1521d |
1521d
|
3/3 |
982d |
c7cd46af4347
vfs(9): Avoid arithmetic overflow in vn_seek.
|
assert failed: pb->pb_pathcopy == NULL
|
C |
|
|
2 |
1052d |
1052d
|
3/3 |
982d |
5a9cf8fcf6e0
ccd(4): Only pathbuf_destroy if pathbuf_copyin succeeded.
|
panic: cdce0: could not find data bulk in
|
syz |
|
|
2 |
1067d |
1067d
|
3/3 |
982d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
assert failed: KERNEL_LOCKED_P()
|
C |
|
|
32 |
1257d |
1257d
|
3/3 |
982d |
ea2ec439285b
autoconf(9): Take kernel lock in a few entry points.
|
panic: uhidev0: no report descriptor
|
syz |
|
|
18 |
993d |
1592d
|
3/3 |
982d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
assert failed: ret == 0
|
C |
|
|
6950 |
984d |
1602d
|
3/3 |
982d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: _bpfattach: out of memory (2)
|
|
|
|
3 |
1044d |
1047d
|
3/3 |
982d |
6583daf00fe7
bpf(4): Nix KM_NOSLEEP and prune dead branch.
|
panic: vfs load failed for `compat_12', error NUM
|
|
|
|
1 |
1015d |
1015d
|
3/3 |
982d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
assert failed: un->un_ops->uno_init
|
C |
|
|
72 |
991d |
994d
|
3/3 |
982d |
ee8fc1216476
usbnet(9): uno_init is now optional.
|
panic: port NUM (addr NUM) disconnected
|
|
|
|
2 |
1021d |
1049d
|
3/3 |
982d |
5ee164d90cec
tun(4): Reduce lock from IPL_NET to IPL_SOFTNET.
|
panic: LOCKDEBUG: Mutex error: mutex_vector_enter,517: spin lock held
|
C |
|
|
3 |
1227d |
1227d
|
3/3 |
982d |
5ee164d90cec
tun(4): Reduce lock from IPL_NET to IPL_SOFTNET.
|
panic: LOCKDEBUG: Mutex error: mutex_vector_enter,516: spin lock held (2)
|
C |
|
|
1221 |
983d |
1610d
|
3/3 |
982d |
5ee164d90cec
tun(4): Reduce lock from IPL_NET to IPL_SOFTNET.
|
UBSan: Undefined Behavior in ntp_adjtime1.cold
|
syz |
|
|
17 |
999d |
1033d
|
3/3 |
983d |
2daa45d976fc
ntp(9): Avoid left shift of negative.
|
panic: mutex_destroy,NUM: uninitialized lock (lock=ADDR, from=ADDR)
|
C |
|
|
16 |
1019d |
1070d
|
3/3 |
983d |
6b71feb71da5
auvitek(4): Fix i2c detach if attach failed.
|
ASan: Unauthorized Access in usbd_fill_iface_data (2)
|
C |
|
|
44 |
985d |
1439d
|
3/3 |
983d |
8c8ba8c43de4
usb: Parse descriptors a little more robustly.
|
UBSan: Undefined Behavior in nanosleep1
|
C |
|
|
2 |
985d |
985d
|
3/3 |
983d |
7b0b7a803fb0
kern: Handle clock winding back in nanosleep1 without overflow.
|
UBSan: Undefined Behavior in ts2timo (2)
|
C |
|
|
9 |
987d |
1079d
|
3/3 |
983d |
98755d357962
kern: Fix fencepost error in ts2timo overflow checks.
|
panic: kernel debugging assertion "pserialize_not_in_read_section()" failed: file "/syzkaller/managers/ci2-netbsd-kmsan/ (2)
|
|
|
|
1 |
999d |
999d
|
3/3 |
983d |
9ab52bf87195
kern: Fix ordering of loads for pid_table and pid_tbl_mask.
|
panic: todo(ADDR) > MAXPHYS; minphys broken
|
C |
|
|
98 |
987d |
1598d
|
3/3 |
983d |
de8552b00ba2
kern: Use harmless, not harmful, integer truncation in physio.
|
MSan: Uninitialized Memory in proc_find_lwp_unlocked (3)
|
|
|
|
2 |
1071d |
1151d
|
3/3 |
983d |
9ab52bf87195
kern: Fix ordering of loads for pid_table and pid_tbl_mask.
|
UBSan: Undefined Behavior in ntp_adjtime1 (2)
|
syz |
|
|
4 |
992d |
1002d
|
3/3 |
983d |
9accb05adf48
ntp(9): Clamp ntv->offset to avoid arithmetic overflow on adjtime.
|
UBSan: Undefined Behavior in vn_seek
|
C |
|
|
3 |
985d |
1043d
|
3/3 |
983d |
c7cd46af4347
vfs(9): Avoid arithmetic overflow in vn_seek.
|
panic: kernel debugging assertion "pserialize_not_in_read_section()" failed: file "/syzkaller/managers/ci2-netbsd-kubsan
|
|
|
|
1 |
998d |
998d
|
3/3 |
983d |
9ab52bf87195
kern: Fix ordering of loads for pid_table and pid_tbl_mask.
|
UBSan: Undefined Behavior in ktrace_thread
|
C |
|
|
74 |
984d |
1122d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
netbsd boot error: panic: kmem_intr_free: zero size with pointer ADDR
|
|
|
|
12 |
1027d |
1027d
|
3/3 |
983d |
e68bc10fdb5f
scsi(9): Handle bogus number of LUNs in SCSI_REPORT_LUNS.
|
UBSan: Undefined Behavior in config_devalloc
|
C |
|
|
149 |
1458d |
1576d
|
3/3 |
983d |
625d175f6f6b
autoconf(9): Refuse to consider negative unit numbers in cfdata.
|
panic: TAILQ_* forw ADDR /syzkaller/managers/ci2-netbsd-kubsan/kernel/sys/kern/kern_ktrace.c:LINE
|
C |
|
|
5 |
1040d |
1075d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
ASan: Unauthorized Access in cryptodev_mop
|
|
|
|
1 |
1040d |
1040d
|
3/3 |
983d |
b943dbddef07
crypto(4): Refuse count>1 for old CIOCNCRYPTM.
|
panic: TAILQ_* forw ADDR /syzkaller/managers/ci2-netbsd/kernel/sys/kern/kern_ktrace.c:LINE
|
C |
|
|
22 |
986d |
1072d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
ASan: Unauthorized Access in ktrace_thread
|
|
|
|
1 |
1058d |
1058d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
MSan: Uninitialized Memory in pathbuf_destroy
|
C |
|
|
3 |
1052d |
1052d
|
3/3 |
983d |
5a9cf8fcf6e0
ccd(4): Only pathbuf_destroy if pathbuf_copyin succeeded.
|
panic: genfs: bad op (2)
|
C |
|
|
6 |
984d |
1057d
|
3/3 |
983d |
0dbc06c160e9
kernfs: Just fail with EOPNOTSUPP, don't panic, on VOP_BMAP.
|
page fault in ktrace_thread
|
syz |
|
|
82 |
984d |
1079d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
panic: : playback
|
C |
|
|
1 |
1033d |
1033d
|
3/3 |
983d |
5bdcc4fe2017
pad(4): Do harmless, not harmful, integer truncation.
|
panic: TAILQ_PREREMOVE head ADDR elm ADDR /syzkaller/managers/ci2-netbsd/kernel/sys/kern/kern_ktrace.c:LINE
|
C |
|
|
56 |
984d |
1122d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
panic: TAILQ_PREREMOVE head ADDR elm ADDR /syzkaller/managers/ci2-netbsd-kubsan/kernel/sys/kern/kern_ktrace.c:LINE
|
syz |
|
|
16 |
984d |
1116d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
UBSan: Undefined Behavior in adjtime1
|
C |
|
|
16 |
985d |
1028d
|
3/3 |
983d |
9ce97ae81c62
kern: Clamp time_adjtime to avoid overflow.
|
panic: TAILQ_PREREMOVE head ADDR elm ADDR /syzkaller/managers/ci2-netbsd/kernel/sys/kern/kern_ktrace.c:LINEuhub5: device
|
|
|
|
1 |
1055d |
1055d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
MSan: Uninitialized Memory in emdtv_i2c_exec
|
C |
|
|
5 |
1434d |
1435d
|
3/3 |
983d |
6dc364f9e2c2
emdtv(4): If register read fails, read as all zero.
|
MSan: Uninitialized Memory in ktrace_thread
|
C |
|
|
450 |
984d |
1122d
|
3/3 |
983d |
46605d0471d3
ktrace(9): Avoid stomping over colliding KTROP_SET.
|
panic: uhidev0: (0x0000) syz (0x0000), rev NUM.NUM/NUM.NUM, addr NUM, iclass NUM/NUM
|
|
|
|
1 |
1028d |
1028d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: l diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd-kubsan/kernel/sys/dev/usb/vhci.c
|
|
|
|
1 |
1059d |
1059d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: ugen0: setting configuration index NUM failed
|
|
|
|
2 |
1033d |
1075d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: urtwn0: failed to set configuration, err=IOERROR
|
|
|
|
1 |
1031d |
1031d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: uhidev0: detached
|
|
|
|
3 |
995d |
1058d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: uhub5: device problem, disabling port NUM
|
|
|
|
6 |
986d |
1070d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: cdce0: faking address
|
|
|
|
1 |
1004d |
1004d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
UBSan: Undefined Behavior in compat_30_sys_getdents
|
C |
|
|
3 |
988d |
988d
|
3/3 |
984d |
8d388c5e20ee
compat_30: Avoid what might be technically undefined behaviour.
|
panic: port NUM configuration NUM interface 0kernel diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers
|
syz |
|
|
1 |
1047d |
1047d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: device problem, disabling port NUM
|
|
|
|
1 |
1051d |
1051d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: cdce0: detached
|
|
|
|
1 |
995d |
995d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: uhidev0: no input interrupt endpoint
|
C |
|
|
6 |
1040d |
1073d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: uhub4: device problem, disabling port NUM
|
|
|
|
7 |
1003d |
1072d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: "/syzkaller/managers/ci2-netbsd/kernel/sys/dev/usb/vhci.c", line NUM
|
|
|
|
1 |
1056d |
1056d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: uhub3: device problem, disabling port NUM
|
|
|
|
6 |
994d |
1061d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: (addr NUM) disconnected
|
|
|
|
1 |
997d |
997d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: uhub0: device problem, disabling port NUM
|
|
|
|
8 |
985d |
1057d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: urtwn0: failed to set configuration, err=TIMEOUT
|
|
|
|
1 |
1065d |
1065d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: [ NUM.ADDR] vpanic() at netbsd:vpanic+0x2d0
|
|
|
|
6 |
989d |
1144d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: ernel diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd-kubsan/kernel/sys/dev/usb/vh
|
|
|
|
4 |
996d |
1107d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: uhub1: device problem, disabling port NUM
|
|
|
|
1 |
1015d |
1015d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
UBSan: Undefined Behavior in bpf_ioctl
|
C |
|
|
2 |
1017d |
1017d
|
3/3 |
984d |
05192700cd5d
bpf(4): Clamp read timeout to INT_MAX ticks to avoid overflow.
|
panic: ernel diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd/kernel/sys/dev/usb/vhci.c",
|
|
|
|
1 |
1047d |
1047d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: [ NUM.ADDR] kernel diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd-kmsan/kernel/sy
|
|
|
|
1 |
1006d |
1006d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: [ NUM.ADDR] vpanic() at netbsd:vpanic+0x9ec
|
|
|
|
2 |
994d |
1054d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
UBSan: Undefined Behavior in ffs_init_vnode.cold
|
C |
|
|
2 |
988d |
988d
|
3/3 |
984d |
d8cd23d6aa6c
ffs: Fix 64-bit inode integer truncation.
|
UBSan: Undefined Behavior in soreceive (2)
|
|
|
|
1 |
993d |
993d
|
3/3 |
984d |
1c4297a22980
kern: m_copym(M_DONTWAIT) can fail; handle that case gracefully.
|
panic: ugen0 at uhub4 port 1kernel diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd/kernel
|
|
|
|
1 |
1045d |
1045d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: [ NUM.ADDR] kernel diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd/kernel/sys/dev
|
|
|
|
2 |
1059d |
1072d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: uhub2: device problem, disabling port NUM
|
|
|
|
2 |
987d |
1038d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: nostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd-kubsan/kernel/sys/dev/usb/vhci.c", lin
|
|
|
|
1 |
999d |
999d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
panic: [ NUM.ADDR] kernel diagnostic assertion "ret == NUM" failed: file "/syzkaller/managers/ci2-netbsd-kubsan/kernel/
|
|
|
|
1 |
1040d |
1040d
|
3/3 |
984d |
8934564b15e9
vhci(4): Don't fail with ENOBUFS if no intrxfer is set up.
|
ASan: Unauthorized Access in psignal (2)
|
C |
|
|
7 |
1027d |
1388d
|
3/3 |
990d |
e30c3d8025bf
usb(4): Use atomics for usb_async_proc.
|
panic: kernel diagnostic assertion "searchdir != foundobj" failed: file "/syzkaller/managers/ci2-netbsd-
|
|
|
|
1 |
1042d |
1042d
|
3/3 |
1014d |
d832c645c7cf
Remove the assertion "searchdir != foundobj" from lookup_crossmount().
|
assert failed: searchdir != foundobj
|
C |
|
|
2326 |
1014d |
1571d
|
3/3 |
1014d |
d832c645c7cf
Remove the assertion "searchdir != foundobj" from lookup_crossmount().
|
panic: [ NUM.ADDR] kernel diagnostic assertion "searchdir != foundobj" failed: file "/syzkaller/managers/ci2-netbsd-kms
|
|
|
|
1 |
1041d |
1041d
|
3/3 |
1014d |
d832c645c7cf
Remove the assertion "searchdir != foundobj" from lookup_crossmount().
|
panic: spkr1 at audio1kernel diagnostic assertion "searchdir != foundobj" failed: file "/syzkaller/managers/ci2-netbsd/k
|
|
|
|
1 |
1037d |
1037d
|
3/3 |
1014d |
d832c645c7cf
Remove the assertion "searchdir != foundobj" from lookup_crossmount().
|
panic: vfs load failed for `udf', error 2kernel diagnostic assertion "searchdir != foundobj" failed: file "/syzkaller/ma
|
|
|
|
1 |
1035d |
1035d
|
3/3 |
1014d |
d832c645c7cf
Remove the assertion "searchdir != foundobj" from lookup_crossmount().
|
UBSan: Undefined Behavior in ntp_adjtime1
|
|
|
|
1 |
1021d |
1021d
|
3/3 |
1019d |
13b44dbbb69d
kernel: Avoid arithmetic overflow in ntp_adjtime.
|
UBSan: Undefined behavior (3)
|
|
|
|
1 |
1075d |
1075d
|
3/3 |
1074d |
ee532b2421c3
Use unsigned to avoid undefined behavior. Found by kUBSan.
|
UBSan: Undefined Behavior in usb_free_device
|
syz |
|
|
1 |
1136d |
1136d
|
3/3 |
1132d |
02983654f25e
Revert "usb: uhub: remove unnecessary delays when powering on ports"
|
page fault in __asan_load1
|
|
|
|
1 |
1136d |
1136d
|
3/3 |
1132d |
02983654f25e
Revert "usb: uhub: remove unnecessary delays when powering on ports"
|
UBSan: Undefined Behavior in pppasyncstart.cold
|
|
|
|
18 |
1159d |
1181d
|
3/3 |
1150d |
44b1f8a1c3ff
Use unsigned to avoid undefined behavior in pppasyncstart().
|
panic: _uvm_mapent_check: bad entry ADDR, line 2299
|
C |
|
|
2 |
1244d |
1244d
|
3/3 |
1238d |
388be8fd3b90
in uvm_mapent_forkzero(), if the old entry was an object mapping, appease a debug check by setting the new entry offset to zero along with setting the new entry object pointer to NULL.
|
panic: _uvm_mapent_check: bad entry ADDR, line 1704
|
C |
|
|
2 |
1244d |
1244d
|
3/3 |
1238d |
388be8fd3b90
in uvm_mapent_forkzero(), if the old entry was an object mapping, appease a debug check by setting the new entry offset to zero along with setting the new entry object pointer to NULL.
|
panic: _uvm_mapent_check: bad entry ADDR, line 2306
|
C |
|
|
37 |
1311d |
1585d
|
3/3 |
1238d |
388be8fd3b90
in uvm_mapent_forkzero(), if the old entry was an object mapping, appease a debug check by setting the new entry offset to zero along with setting the new entry object pointer to NULL.
|
panic: genfs: bad op
|
C |
|
|
31 |
1316d |
1532d
|
3/3 |
1241d |
e3beb3764561
VOP_BMAP() may be called via ioctl(FIOGETBMAP) on any vnode that applications can open. change various pseudo-fs *_bmap methods return an error instead of panic.
|
netbsd boot error: UBSan: Undefined Behavior in AcpiNsRootInitialize
|
|
|
|
120 |
1270d |
1275d
|
3/3 |
1270d |
d5b984e0de7e
avoid dereferencing a constant string address as a UINT32 pointer, KUBSAN complains about bad alignment.
|
UBSan: Undefined Behavior in ts2timo
|
C |
|
|
40 |
1280d |
1637d
|
3/3 |
1270d |
6f5e84c07140
ts2timo(9): refactor TIMER_ABSTIME handling
|
assert failed: (cnp->cn_flags & LOCKPARENT) == 0 || searchdir == NULL || VOP_ISLOCKED(searchdir) == LK_EXCLUSIVE (2)
|
C |
|
|
1614 |
1282d |
1610d
|
3/3 |
1270d |
4af96c872b34
Honor LOCKPARENT for ".." of the root directory.
|
UBSan: Undefined Behavior in free_pipe
|
C |
|
|
6 |
1359d |
1428d
|
3/3 |
1270d |
8c601f6c5ae7
fix free_all_endpoints() to not try calling free_pipe() when no endpoints are allocated; this can happen during config_detach() after attach fails
|
page fault in free_all_endpoints
|
C |
|
|
2 |
1428d |
1428d
|
3/3 |
1270d |
8c601f6c5ae7
fix free_all_endpoints() to not try calling free_pipe() when no endpoints are allocated; this can happen during config_detach() after attach fails
|
UBSan: Undefined Behavior in fss_close
|
C |
|
|
3 |
1478d |
1489d
|
3/3 |
1425d |
e5ad6630f80f
Check the return value of device_lookup_private against NULL.
|
UBSan: Undefined Behavior in quota1_handle_cmd_quotaoff
|
C |
|
|
22 |
1436d |
1568d
|
3/3 |
1426d |
479d6bd7aed1
Avoid potentially accessing an array with an index out of range.
|
UBSan: Undefined Behavior in quota1_handle_cmd_quotaon
|
C |
|
|
310 |
1428d |
1573d
|
3/3 |
1426d |
479d6bd7aed1
Avoid potentially accessing an array with an index out of range.
|
UBSan: Undefined Behavior in fsetown
|
C |
|
|
643 |
1427d |
1611d
|
3/3 |
1427d |
fe22bed11b62
Avoid negating the minimum size of pid_t (this overflows).
|
assert failed: semcnt >= 0
|
C |
|
|
1460 |
1437d |
1579d
|
3/3 |
1437d |
d1d48122addb
when updating the per-uid "semcnt", decrement the counter for the uid that created the ksem, not the uid of the process freeing the ksem. fixes PR 55509.
|
UBSan: Undefined Behavior in dosetitimer
|
C |
|
|
62 |
1445d |
1446d
|
3/3 |
1445d |
46944f1c4d5d
Fix an uninitialized pointer deref introduced in rev 1.207.
|
assert failed: ! (2)
|
C |
|
|
4 |
1470d |
1470d
|
3/3 |
1461d |
98e71a6eeb52
When validating the mount device string make sure its length is below *data_len and below PATH_MAX.
|
panic: Suspending fresh file system failed
|
syz |
|
|
44 |
1462d |
1497d
|
3/3 |
1462d |
0b5a6352dcf7
We have to ignore interrupts when suspending here the same way we have to do with revoke.
|
assert failed: fstrans_is_owner(mp)
|
C |
|
|
789 |
1464d |
1571d
|
3/3 |
1463d |
d8a571076ba6
Suspend file system before unmounting in mount_domount() error path to prevent diagnostic assertions from unmount/flush.
|
panic: kernel diagnostic assertion "fstrans_is_owner(mp)" failed: file "/syzkaller/managers/netbsd-kmsan/kernel/s
|
|
|
|
1 |
1516d |
1516d
|
3/3 |
1463d |
d8a571076ba6
Suspend file system before unmounting in mount_domount() error path to prevent diagnostic assertions from unmount/flush.
|
panic: [ 222.ADDR] kernel diagnostic assertion "fstrans_is_owner(mp)" failed: file "/syzkaller/managers/netbsd-kmsan/ker
|
|
|
|
1 |
1528d |
1528d
|
3/3 |
1463d |
d8a571076ba6
Suspend file system before unmounting in mount_domount() error path to prevent diagnostic assertions from unmount/flush.
|
UBSan: Undefined Behavior in ttioctl
|
|
|
|
1 |
1587d |
1587d
|
3/3 |
1463d |
bf7b939a1a2d
tty: Negating INT_MIN will overflow int, bail out with EINVAL
|
assert failed: (length != 0 || extblocks || LIST_EMPTY(&ovp->v_cleanblkhd))
|
C |
|
|
6 |
1491d |
1587d
|
3/3 |
1463d |
9235b59ee381
Lock the vnode while calling VOP_BMAP() for FIOGETBMAP.
|
UBSan: Undefined behavior
|
|
|
|
8 |
1497d |
1572d
|
3/3 |
1463d |
ad11505eeb84
tty: Avoid undefined behaviour (left shift of 1 by 31 places overflows int)
|
panic: kernel diagnostic assertion "fstrans_is_owner(mp)" failed: file "/syzkaller/managers/netbsd-kmsan/kernel
|
|
|
|
1 |
1518d |
1518d
|
3/3 |
1463d |
d8a571076ba6
Suspend file system before unmounting in mount_domount() error path to prevent diagnostic assertions from unmount/flush.
|
panic: kernel diagnostic assertion "fstrans_is_owner(mp)" failed: file "/syzkaller/managers/netbsd-kubsan/kernel/sys/ke
|
|
|
|
1 |
1517d |
1517d
|
3/3 |
1463d |
d8a571076ba6
Suspend file system before unmounting in mount_domount() error path to prevent diagnostic assertions from unmount/flush.
|
UBSan: Undefined Behavior in compat_43_ttioctl.cold
|
C |
|
|
116 |
1466d |
1521d
|
3/3 |
1463d |
c32467e14928
tty_43: Check a bitset from userspace is valid before shifting it
|
UBSan: Undefined Behavior in tty_get_qsize
|
C |
|
|
19 |
1547d |
1593d
|
3/3 |
1545d |
699b2c0a0a86
Add a check to prevent shift by -1. Not really important in this case, but to appease KUBSAN.
|
assert failed: rb_tree_find_node(&ugenif.tree, &sc->sc_unit) == sc
|
C |
|
|
8 |
1556d |
1556d
|
3/3 |
1555d |
257aaf9afb72
Fix ugen detach after partial attach.
|
ASan: Unauthorized Access in nvlist_copyin
|
C |
|
|
2 |
1581d |
1581d
|
3/3 |
1555d |
17ffbcbdab9a
Add missing cases, to prevent memory corruption.
|
assert failed: 0 <= space && space <= ifc->ifc_len
|
C |
|
|
4 |
1590d |
1590d
|
3/3 |
1588d |
0be10c48cf6f
Don't accept negative value.
|
page fault in statvfs_to_statfs12_copy
|
C |
|
|
5 |
1608d |
1608d
|
3/3 |
1607d |
f2af77cb3adc
Yet another idiotic compat syscall that was developed with literally zero test made. Simply invoking this syscall with _valid parameters_ triggers a fatal fault, because the kernel tries to write to userland addresses.
|
page fault in usbd_add_drv_event
|
C |
|
|
2 |
1608d |
1608d
|
3/3 |
1607d |
6cac1dde29fb
Fix NULL deref on attach failure. Found via vHCI fuzzing.
|
UBSan: Undefined Behavior in pipe_ioctl
|
C |
|
|
1 |
1610d |
1610d
|
3/3 |
1607d |
60b6b2cd7463
Fix NULL deref. The original code before Jaromir's cleanup had an #ifndef block that wrongly contained the 'else' statement, causing the NULL check to have no effect.
|
ASan: Unauthorized Access in m_copydata
|
C |
|
|
1 |
1611d |
1611d
|
3/3 |
1610d |
305ae8585db2
Ensure sockaddrs have valid lengths for RO_MISSFILTER.
|
assert failed: (cnp->cn_flags & LOCKPARENT) == 0 || searchdir == NULL || VOP_ISLOCKED(searchdir) == LK_EXCLUSIVE
|
C |
|
|
2815 |
1610d |
1659d
|
3/3 |
1610d |
3e5fbb6583a3
remove special handling for symbolic links for COMPAT_43 lstat, it's not necessary; this removes the only places in kernel which did namei LOOKUP with LOCKPARENT
|
UBSan: Undefined Behavior in tunwrite
|
C |
|
|
5 |
1611d |
1611d
|
3/3 |
1611d |
521e747162a6
Hum. Fix NULL deref triggerable with just write(0).
|
assert failed: p != NULL
|
|
|
|
1 |
1710d |
1710d
|
3/3 |
1627d |
3c214a3d995e
Fix bohr bug triggered only once by syzkaller 2,5 months ago.
|
UBSan: Undefined Behavior in db_read_bytes
|
|
|
|
1 |
1630d |
1630d
|
3/3 |
1629d |
0f48bfb53e25
If the frame is not aligned, leave right away. This place probably needs to be revisited, because %rbp could easily contain garbage.
|
netbsd boot error: MSan: Uninitialized Memory in pmap_ctor
|
|
|
|
60 |
1634d |
1638d
|
3/3 |
1633d |
248fe10b7a27
Reported-by: syzbot+6dd5a230d19f0cbc7814@syzkaller.appspotmail.com
|
panic: LOCKDEBUG: Mutex error: mutex_vector_enter,516: spin lock held
|
C |
|
|
95 |
1633d |
1653d
|
3/3 |
1633d |
134b16ca64ab
Reported-by: syzbot+c1770938bb3fa7c085f2@syzkaller.appspotmail.com Reported-by: syzbot+ae26209c7d7f06e0b29f@syzkaller.appspotmail.com
|
ASan: Unauthorized Access in usbd_fill_iface_data
|
C |
|
|
5 |
1634d |
1635d
|
3/3 |
1633d |
3774168381e9
If we failed because we didn't encounter an endpoint, do not attempt to read 'ed', because its value is past the end of the buffer, and we thus perform out-of-bounds accesses.
|
panic: kmem_intr_free: zero size with pointer ADDR
|
C |
|
|
1 |
1634d |
1634d
|
3/3 |
1633d |
39045d90bd43
also set ifc->ui_endpoints to NULL in usbd_free_iface_data() when the value is freed, to make it impossible to re-enter this by mistake
|
UBSan: Undefined Behavior in process_read_fpregs
|
C |
|
|
2 |
1641d |
1641d
|
3/3 |
1633d |
4660020b03f4
Introduce PTRACE_REGS_ALIGN, and on x86, enforce a 16-byte alignment, due to fpregs having fxsave which requires 16-byte alignment.
|
ASan: Unauthorized Access in usb_free_device
|
C |
|
|
3 |
1634d |
1634d
|
3/3 |
1633d |
869e8f7b28b0
Reset ud_ifaces and ud_cdesc to NULL, to prevent use-after-free in usb_free_device().
|
assert failed: pmap->pm_ncsw == lwp_pctr() (2)
|
|
|
|
4 |
1636d |
1638d
|
3/3 |
1633d |
2ac4ea76ffcd
Reported-by: syzbot+fd9be59aa613bbf4eba8@syzkaller.appspotmail.com Reported-by: syzbot+15dd4dbac6ed159faa4a@syzkaller.appspotmail.com Reported-by: syzbot+38fa02d3b0e46e57c156@syzkaller.appspotmail.com
|
assert failed: !pmap_extract(pmap, va, NULL)
|
syz |
|
|
1 |
1710d |
1710d
|
3/3 |
1647d |
4cd60295b346
Reported-by: syzbot+3e3c7cfa8093f8de047e@syzkaller.appspotmail.com
|
panic: LOCKDEBUG: Mutex error: mutex_vector_enter,512: locking against myself
|
C |
|
|
52 |
1647d |
1653d
|
3/3 |
1647d |
fbbe5c9112a1
Reported-by: syzbot+0f38e4aed17c14cf0af8@syzkaller.appspotmail.com Reported-by: syzbot+c1770938bb3fa7c085f2@syzkaller.appspotmail.com Reported-by: syzbot+92ca248f1137c4b345d7@syzkaller.appspotmail.com Reported-by: syzbot+acfd688740461f7edf2f@syzkaller.appspotmail.com
|
MSan: Uninitialized Memory in ifq_enqueue
|
|
|
|
1 |
1651d |
1651d
|
3/3 |
1651d |
145523e8345f
igmp_sendpkt() expects ip_output() to set 'imo.imo_multicast_ttl' into 'ip->ip_ttl'; but ip_output() won't if the target is not a multicast address, meaning that the uninitialized 'ip->ip_ttl' byte gets sent to the network. This leaks one byte of kernel heap.
|
MSan: Uninitialized Memory in nanosleep1
|
C |
|
|
8 |
1666d |
1700d
|
3/3 |
1651d |
d9377f809390
Fix uninitialized memory access. Found by KMSAN.
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/x86/x86/intr.c:LINE, member access
|
|
|
|
15 |
1663d |
1665d
|
3/3 |
1661d |
37beba86ee63
Explicitly align to 8 bytes, found by kUBSan.
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/vfs_cache.c:LINE, left shift of AD
|
|
|
|
36 |
1703d |
1704d
|
3/3 |
1696d |
395a577cab63
Pacify a syzbot complaint about bit shifting.
|
assert failed: pmap->pm_stats.resident_count == PDP_SIZE
|
syz |
|
|
22 |
1707d |
1708d
|
3/3 |
1707d |
398f36d55ce0
PR port-amd64/55083 (assertion "pmap->pm_stats.resident_count == PDP_SIZE" failed)
|
assert failed: ptp->wire_count == 1
|
C |
|
|
16 |
1708d |
1709d
|
3/3 |
1708d |
4538c4a0a4c9
Pacify assertion in a failure path.
|
assert failed: (opte & (PTE_A | PTE_P)) != PTE_A
|
C |
|
|
15 |
1709d |
1711d
|
3/3 |
1709d |
4f0135d6fae3
- pmap_enter(): under low memory conditions, if PTP allocation succeeded and then PV entry allocation failed, PTP pages were being freed without their struct pmap_page being reset back to the non-PTP setup, which then caused havoc with pmap_page_removed(). Fix it.
|
panic: pmap_check_pv: ADDR/ADDR missing on pp ADDR
|
syz |
|
|
60 |
1709d |
1709d
|
3/3 |
1709d |
4f0135d6fae3
- pmap_enter(): under low memory conditions, if PTP allocation succeeded and then PV entry allocation failed, PTP pages were being freed without their struct pmap_page being reset back to the non-PTP setup, which then caused havoc with pmap_page_removed(). Fix it.
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/vfs_mount.c:LINE, member access wi
|
|
|
|
1446 |
1719d |
1795d
|
3/3 |
1718d |
431ed6f61bc2
- Pad kmem cache names with zeros so vmstat -m and -C are readable. - Exclude caches with size not a factor or multiple of the coherency unit.
4c7232d4a136
KMEM_SIZE: append the size_t to the allocated buffer, rather than prepending, so it doesn't screw up the alignment of the buffer.
|
ASan: Unauthorized Access in ifreq_setaddr
|
C |
|
|
6 |
1784d |
1784d
|
3/3 |
1719d |
36f08dfcb97c
Don't forget to initialize 'sin6_len'. With kASan, from time to time the value will be bigger than the size of the source, and we get a read overflow. With kMSan the uninitialized access is detected immediately.
|
MSan: Uninitialized Memory in getsockopt
|
C |
|
|
37 |
1733d |
1734d
|
3/3 |
1719d |
559c53d028d6
Zero out 'tv', to prevent uninitialized bytes in its padding from leaking to userland. Found by kMSan.
|
assert failed: l->l_stat == LSONPROC
|
C |
|
|
645 |
1730d |
1744d
|
3/3 |
1719d |
f61617cee78c
exit1(): remove from the radix tree before setting zombie status, as radix_tree_remove_node() can block on locks when freeing.
|
ASan: Unauthorized Access in mutex_oncpu
|
C |
|
|
24521 |
1719d |
1780d
|
3/3 |
1719d |
e78f9b4fde02
A final set of scheduler tweaks:
|
MSan: Uninitialized Memory in bus_dmamap_sync
|
C |
|
|
16 |
1729d |
1734d
|
3/3 |
1719d |
b1f6fd939ed8
Zero out the padding in 'd_namlen', to prevent info leaks. Same logic as ufs_makedirentry().
|
assert failed: ci->ci_tlbstate != TLBSTATE_VALID
|
C |
|
|
123 |
1802d |
1803d
|
3/3 |
1735d |
ea92f12b1800
uvm_pagerealloc() can now block because of radixtree manipulation, so defer freeing PTPs until pmap_unmap_ptes(), where we still have the pmap locked but can finally tolerate context switches again.
|
assert failed: pmap->pm_ncsw == curlwp->l_ncsw
|
C |
|
|
30 |
1802d |
1803d
|
3/3 |
1735d |
ea92f12b1800
uvm_pagerealloc() can now block because of radixtree manipulation, so defer freeing PTPs until pmap_unmap_ptes(), where we still have the pmap locked but can finally tolerate context switches again.
|
assert failed: pmap->pm_ncsw == lwp_pctr()
|
|
|
|
2 |
1795d |
1799d
|
3/3 |
1735d |
680f3a8667de
pmap_get_ptp(): the uvm_pagefree() call in the failure case can block too. Pacify the assertion in pmap_unmap_ptes().
|
assert failed: pg->offset >= nextoff
|
C |
|
|
10 |
1800d |
1801d
|
3/3 |
1735d |
3f49a1ff579b
genfs_do_putpages(): add a missing call to uvm_page_array_advance().
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/init_main.c:LINE, left shift of AD
|
|
|
|
9 |
1795d |
1796d
|
3/3 |
1735d |
1e5952fd4837
Fix integer overflow when printing available memory size (resulting from a cast lost during merges).
|
netbsd boot error: panic: LOCKDEBUG: Mutex error: _mutex_init,363: already initialized
|
|
|
|
51 |
1800d |
1801d
|
3/3 |
1735d |
dc1bd2c9382b
Fix LOCKDEBUG panic on mutex_init().
|
assert failed: lwp_locked(l, l->l_cpu->ci_schedstate.spc_lwplock)
|
C |
|
|
2676 |
1823d |
1824d
|
2/3 |
1820d |
lwp_start(): don't try to change the target CPU. Fixes potential panic in setrunnable(). Oops, experimental change that escaped.
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/netinet/tcp_congctl.c:LINE, unsigned in
|
syz |
|
|
28 |
1829d |
1841d
|
2/3 |
1829d |
1f03898791a3
Don't allow zero sized segments that will panic the stack. Reported-by: syzbot+5542516fa4afe7a101e6@syzkaller.appspotmail.com
|
ASan: Unauthorized Access in __asan_load8
|
syz |
|
|
39 |
1833d |
1952d
|
2/3 |
1831d |
9ea67c54e50f
in uvm_fault_lower_io(), fetch all the map entry values that we need before we unlock everything.
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/dev/raidframe/rf_netbsdkintf.c:LINE, me
|
|
|
|
114 |
1849d |
1853d
|
2/3 |
1831d |
41eeee0166bf
Get &rsc->sc_dksc only when we know 'rsc' is not NULL. This was actually harmless because we didn't use the pointer then.
|
panic: m_copydata(ADDR,2,48,ADDR): m=NULL, off=0 (48), len=2 (0)
|
C |
|
|
3 |
1836d |
1836d
|
2/3 |
1831d |
624f3f7406ee
Add more checks in ip6_pullexthdr, to prevent a panic in m_copydata. The Rip6 entry point could see a garbage Hop6 option.
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/x86/x86/pmap.c:LINE, member access
|
|
|
|
6 |
1831d |
1832d
|
2/3 |
1831d |
4acdfa6ced5b
Add a NULL check on the structure pointer, not to retrieve its first field if it is NULL. The previous code was not buggy strictly speaking. This change probably doesn't change anything, except removing assumptions in the compiler optimization passes, which too probably doesn't change anything in this case.
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/subr_disk_mbr.c:LINE, member acces
|
|
|
|
135 |
1841d |
1846d
|
2/3 |
1831d |
4e5cb50b58af
Avoid unaligned pointer arithmetic in check_label_magic()
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/vfs_subr.c:LINE, member access wit
|
|
|
|
99 |
1832d |
1841d
|
2/3 |
1831d |
473e202ba108
NULL-check the structure pointer, not the address of its first field. This is clearer and also appeases syzbot.
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/uipc_socket.c:LINE, null pointer p
|
C |
|
|
3 |
1869d |
1877d
|
2/3 |
1864d |
7b43da9e77aa
Add a check before the memcpy. memcpy is defined to never take NULL as second argument, and the compiler is free to perform optimizations knowing that this argument is never NULL.
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/net/rtsock_shared.c:LINE, shift exponen
|
C |
|
|
91 |
1864d |
1869d
|
2/3 |
1864d |
a1bd50f5a7d5
Error out if the type is beyond the storage size. No functional change, since the shift would otherwise 'and' against zero, returning EEXIST.
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/sys_ptrace_common.c:LINE, negation
|
C |
|
|
2 |
1868d |
1868d
|
2/3 |
1866d |
c18c9a670f07
Avoid signed integer overflow for -lwp where lwp is INT_MIN
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/kern_time.c:LINE, signed integer o
|
C |
|
|
3 |
1873d |
1874d
|
2/3 |
1873d |
8e3fd5b6989c
Check for valid timespec in clock_settime1()
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/subr_time.c:LINE, signed integer o
|
C |
|
|
2 |
1875d |
1875d
|
2/3 |
1874d |
ffd5d3e30b5f
Avoid signed integer overflow in ts2timo() for ts->tv_nsec
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/uvm/uvm_mmap.c:LINE, left shift of 1 by
|
C |
|
|
2 |
1874d |
1874d
|
2/3 |
1874d |
6c69d9fad1ca
Avoid left shift changing the signedness flag
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/sysv_msg.c:LINE, negation of -ADDR
|
C |
|
|
2 |
1874d |
1874d
|
2/3 |
1874d |
fa6363e63652
Avoid -LONG_MIN msgtyp in msgrcv(2) and treat it as LONG_MAX
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/crypto/nist_hash_drbg/nist_hash_drbg.c:
|
|
|
|
39 |
1889d |
1890d
|
2/3 |
1876d |
338a6d8211a1
Use an explicit run-time assertion where compile-time doesn't work.
|
panic: ifmedia_add: can't malloc entry
|
|
|
|
28 |
1877d |
1954d
|
2/3 |
1877d |
0ab44a811f8a
in ifmedia_add(), use a wait-style memory allocation rather than not waiting and panic'ing if the allocation fails.
|
page fault in __asan_load8
|
C |
|
|
4 |
1879d |
1910d
|
2/3 |
1877d |
db38f3713d52
in shmdt(), wait until shmat() completes before detaching.
|
page fault in shm_delete_mapping
|
syz |
|
|
17 |
2012d |
2024d
|
2/3 |
1877d |
db38f3713d52
in shmdt(), wait until shmat() completes before detaching.
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/kern_rndq.c:LINE, negation of -ADD
|
|
|
|
9 |
1880d |
1887d
|
2/3 |
1879d |
1c7f0224e7e0
Do all delta calculations strictly using uint32_t. Avoid integer overflows in calculating absolute deltas by subtracting the right way around.
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/net/rtsock_shared.c:LINE, member access
|
|
|
|
1 |
1886d |
1886d
|
2/3 |
1885d |
00ccc35339cc
Disable __NO_STRICT_ALIGNMENT on amd64/i386 for UBSan builds
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/netinet6/scope6.c:LINE, member access w (2)
|
syz |
|
|
91 |
1885d |
1888d
|
2/3 |
1885d |
00ccc35339cc
Disable __NO_STRICT_ALIGNMENT on amd64/i386 for UBSan builds
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/sys_select.c:LINE, signed integer
|
C |
|
|
2 |
1888d |
1888d
|
2/3 |
1888d |
7049e5e68831
Validate usec ranges in sys___select50()
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/netinet6/scope6.c:LINE, member access w
|
syz |
|
|
73 |
1888d |
1889d
|
2/3 |
1888d |
a5df2084c7a4
Decorate in6_clearscope() with __noubsan
|
panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/vfs_syscalls.c:LINE, signed intege
|
C |
|
|
11 |
1888d |
1889d
|
2/3 |
1888d |
43bc9355ea3c
Validate usec ranges in do_sys_utimes()
|
netbsd boot error: panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/kern/subr_percpu.c:LINE, null pointer p
|
|
|
|
12 |
1890d |
1891d
|
2/3 |
1889d |
360cafb4be56
Decorate percpu_cpu_swap() with __noubsan
|
assert failed: buflen != 0
|
syz |
|
|
18 |
1896d |
1896d
|
1/3 |
1896d |
75eea5b7359a
As I suspected, the KASSERT I added yesterday can fire if we try to process zero-sized packets. Skip them to prevent a type confusion that can trigger random page faults later.
|
assert failed: (c->c_flags & CALLOUT_PENDING) == 0
|
C |
|
|
2918 |
1959d |
2097d
|
1/3 |
1897d |
80a06cecc711
Fix race in timer destruction.
|
assert failed: c->c_cpu->cc_lwp == curlwp || c->c_cpu->cc_active != c
|
C |
|
|
247 |
1957d |
2097d
|
1/3 |
1915d |
80a06cecc711
Fix race in timer destruction.
|
assert failed: to_ticks >= 0 (2)
|
C |
|
|
70 |
1970d |
2029d
|
1/3 |
1915d |
4952945bc9cb
Clamp tcp timer quantities to reasonable ranges.
|
assert failed: pg->wire_count != 0 (2)
|
C |
|
|
174 |
1959d |
1981d
|
1/3 |
1915d |
95ce9a69b407
fix two bugs reported in https://syzkaller.appspot.com/bug?id=8840dce484094a926e1ec388ffb83acb2fa291c9
|
assert failed: pg->wire_count > 0
|
C |
|
|
6 |
2082d |
2095d
|
1/3 |
1915d |
6eb7fd2b53ce
Acquire shmseg uobj reference while we hold shm_lock.
|
assert failed: uvm_page_locked_p(pg)
|
C |
|
|
44 |
1959d |
1969d
|
1/3 |
1958d |
b5e559801c7e
Add missing lock around pmap_protect. ok, chs@
|
panic: LOCKDEBUG: Reader / writer lock error: rw_vector_exit,449: not held by current LWP
|
C |
|
|
3 |
1973d |
1974d
|
1/3 |
1971d |
e4c2eafeb5ab
Fix bug, don't release the reflock if we didn't take it in the first place. Looks like there are other locking issues in here.
|
ASan: Unauthorized Access in exec_makepathbuf
|
syz |
|
|
2 |
1980d |
1980d
|
1/3 |
1975d |
abb1684df1f5
Fix buffer overflow. It seems that some people need to go back to the basics of C programming.
|
page fault in uvm_fault
|
C |
|
|
2 |
1981d |
1981d
|
1/3 |
1981d |
00dad9ea5158
Correct wrong type of uio_seg passed to do_sys_mknodat()
|
assert failed: !
|
|
|
|
2 |
1981d |
1981d
|
1/3 |
1981d |
00dad9ea5158
Correct wrong type of uio_seg passed to do_sys_mknodat()
|
assert failed: pmap->pm_obj[i].uo_npages == 0
|
C |
|
|
58 |
2011d |
2091d
|
1/3 |
1982d |
in uvm_map_protect(), do a pmap_update() before possibly switching from removing pmap entries to creating them. this fixes the problem reported in https://syzkaller.appspot.com/bug?id=cc89e47f05e4eea2fd69bcccb5e837f8d1ab4d60
|
assert failed: pg->wire_count != 0
|
C |
|
|
45 |
2013d |
2078d
|
1/3 |
1982d |
shmctl(SHM_LOCK) does not need to mess with mappings of the shm segment, uvm_obj_wirepages() is sufficient. this fixes the problem reported in https://syzkaller.appspot.com/bug?id=71f9271d761f5b6ed517a18030dc04f0135e6179
|
assert failed: mutex_owned(pipe->pipe_lock)
|
|
|
|
39 |
2035d |
2095d
|
1/3 |
2027d |
7abfdd368b0d
Clean up pipe structure before recycling it.
|
assert failed: to_ticks >= 0
|
C |
|
|
2547 |
2047d |
2096d
|
1/3 |
2047d |
797b68a5c224
Add more checks, if the values are negative we hit a KASSERT later in the timeout.
|
ASan: Unauthorized Access in vioscsi_scsipi_request
|
syz |
|
|
1841 |
2048d |
2085d
|
1/3 |
2048d |
b60093a0824f
Fix use-after-free. If we're not polling, virtio_enqueue_commit() will send the transaction, and it means 'xs' can be immediately freed. So, save the value of xs_control beforehand.
|
panic: receive 3
|
C |
|
|
5 |
2089d |
2097d
|
1/3 |
2061d |
c78c83f0efb3
Also check for MT_CONTROL, and end the receive operation if we see one. It is possible to get an MT_CONTROL if we sleep in MSG_WAITALL. The other BSDs do the same.
|
assert failed: vp->v_usecount != 0
|
C |
|
|
108 |
2080d |
2096d
|
1/3 |
2080d |
713042b84b5e
Take a reference on ndp->ni_rootdir and ndp->ni_erootdir.
|
assert failed: vp->v_type == VREG
|
C |
|
|
139 |
2085d |
2096d
|
1/3 |
2085d |
21e56f354bb4
Change vn_openchk() to fail VNON and VBAD with error ENXIO.
|
assert failed: vp->v_type == VREG || vp->v_type == VDIR
|
C |
|
|
1085 |
2085d |
2097d
|
1/3 |
2085d |
21e56f354bb4
Change vn_openchk() to fail VNON and VBAD with error ENXIO.
|
assert failed: c->c_magic == CALLOUT_MAGIC
|
C |
|
|
1645 |
2096d |
2097d
|
1/3 |
2089d |
The callout is used by any nonvirtual timer including CLOCK_MONOTONIC and needs to be initialized.
|
assert failed: so->so_lock == NULL
|
C |
|
|
5 |
2094d |
2096d
|
1/3 |
2094d |
516d295318eb
Fix locking: it is fine if the lock is already key_so_mtx, this can happen in socketpair. In that case don't take it.
|
assert failed: so->so_pcb == NULL
|
C |
|
|
6 |
2095d |
2096d
|
1/3 |
2095d |
fa4f0f367829
Fix the order in udp6_attach: soreserve should be called before in6_pcballoc, otherwise if it fails there is still a PCB attached, and we hit a KASSERT in socreate. In !DIAGNOSTIC this would have caused a memory leak.
|
assert failed: requested_size > 0
|
C |
|
|
19 |
2096d |
2097d
|
1/3 |
2096d |
09915c34c237
Reading a directory may trigger a panic when the buffer is too small. Adjust necessary checks.
|
ASan bug (2)
|
C |
|
|
347 |
2096d |
2096d
|
1/3 |
2096d |
d020c71c0cee
RIP6, CAN, SCTP and SCTP6 lack a length check in their _send() functions. Fix RIP6 and CAN, add a big XXX in the SCTP ones.
|
ASan bug
|
C |
|
|
302 |
2096d |
2097d
|
1/3 |
2096d |
d26f60da72b3
RIP, RIP6, DDP, SCTP and SCTP6 lack a length check in their _connect() functions. Fix the first three, and add a big XXX in the SCTP ones.
|