syzbot


Title Repro Cause bisect Fix bisect Count Last Reported Closed Patch
general protection fault in drm_atomic_set_crtc_for_connector C unreliable 586 333d 331d 1d23h 0003b687ee6d drm: fix oops in drm_atomic_set_crtc_for_connector
UBSAN: shift-out-of-bounds in qdisc_get_rtab C unreliable done 521 269d 313d 123d e4bedf48aaa5 net_sched: reject silly cell_log in qdisc_get_rtab()
KASAN: out-of-bounds Read in kfence_guarded_free C error 20 286d 297d 127d 2b8305260fb3 kfence, kasan: make KFENCE compatible with KASAN
INFO: task can't die in d_alloc_parallel 2 285d 301d 138d 0ce20dd84089 mm: add Kernel Electric-Fence infrastructure
KASAN: global-out-of-bounds Read in netlink_policy_dump_add_policy (2) C done 2 250d 250d 143d 33b347503f01 vdpa: Define vdpa mgmt device, ops and a netlink interface
KASAN: use-after-free Read in __cpuhp_state_remove_instance C unreliable done 2726 211d 232d 180d 470ec4ed8c91 io-wq: fix double put of 'wq' in error path
KASAN: use-after-free Read in idr_for_each (2) C error done 86 214d 376d 180d 61cf93700fe6 io_uring: Convert personality_idr to XArray
KASAN: vmalloc-out-of-bounds Read in bpf_trace_run2 C done done 5 232d 390d 186d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
general protection fault in drm_client_buffer_vunmap C unreliable done 247 219d 320d 186d 874a52f9b693 drm/fb-helper: only unmap if buffer not null
BUG: unable to handle kernel paging request in bpf_trace_run2 C done done 10 230d 390d 186d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
INFO: rcu detected stall in smp_call_function C 107 189d 445d 187d c583bcb8f5ed rcu: Don't invoke try_invoke_on_locked_down_task() with irqs disabled 1b7af295541d sched/core: Allow try_invoke_on_locked_down_task() with irqs disabled
INFO: task hung in io_uring_cancel_task_requests C 305 214d 249d 190d 34343786ecc5 io_uring: unpark SQPOLL thread for cancelation
general protection fault in usb_audio_probe C done 360 220d 222d 190d 30dea07180de ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe
UBSAN: shift-out-of-bounds in erofs_fc_fill_super C unreliable 11 240d 270d 190d bde545295b71 erofs: fix shift-out-of-bounds of blkszbits
net-next build error (3) 7 254d 251d 190d 9c97921a51a0 net: fix building errors on powerpc when CONFIG_RETPOLINE is not set
KASAN: use-after-free Read in tctx_task_work 2 233d 230d 190d 2c32395d8111 io_uring: fix __tctx_task_work() ctx race
INFO: task hung in addrconf_verify_work (4) C done 132 239d 326d 190d d349f9976868 net_sched: fix RTNL deadlock again caused by request_module()
possible deadlock in cfg80211_netdev_notifier_call syz done 13 191d 257d 190d 40c575d1ec71 cfg80211: fix netdev registration deadlock
memory leak in qrtr_tun_open C 4 281d 326d 190d fc0494ead639 net: qrtr: Fix memory leak in qrtr_tun_open
UBSAN: shift-out-of-bounds in mceusb_dev_printdata C error 331 237d 304d 190d 9dec0f48a75e media: mceusb: sanity check for prescaler value
KMSAN: uninit-value in bpf_iter_prog_supported 4479 190d 251d 190d 17d8beda277a bpf: Fix an unitialized value in bpf_iter
KASAN: invalid-free in io_req_caches_free 5 234d 236d 190d 8e5c66c485a8 io_uring: clear request count when freeing caches
memory leak in v2_read_file_info C 71 239d 298d 190d a4db1072e1a3 quota: Fix memory leak when handling corrupted quota file
KASAN: null-ptr-deref Read in tcf_idrinfo_destroy C 115 193d 384d 190d 396d7f23adf9 net: sched: fix police ext initialization
general protection fault in j1939_netdev_notify (2) C done 19 242d 301d 190d 4e096a18867a net: introduce CAN specific pointer in the struct net_device
INFO: task hung in tcf_action_init_1 C done 30 249d 384d 190d d349f9976868 net_sched: fix RTNL deadlock again caused by request_module()
general protection fault in kobject_cleanup C unreliable 72 220d 233d 190d a6112998ee45 gpio: fix NULL-deref-on-deregistration regression
KASAN: slab-out-of-bounds Read in skb_segment C error 311 269d 272d 190d 00b229f762b0 net: fix GSO for SG-enabled devices
upstream test error: INFO: trying to register non-static key in nsim_get_stats64 381 221d 263d 190d 863a42b289c2 netdevsim: init u64 stats for 32bit hardware
UBSAN: shift-out-of-bounds in snto32 C error 58 234d 307d 190d a0312af1f94d HID: core: detect and skip invalid inputs to snto32()
UBSAN: shift-out-of-bounds in exfat_fill_super C error 3 247d 264d 190d 78c276f5495a exfat: fix shift-out-of-bounds in exfat_fill_super()
INFO: task hung in io_sq_thread_park C unreliable 263 225d 230d 190d 3ebba796fa25 io_uring: ensure that SQPOLL thread is started for exit
KCSAN: data-race in tomoyo_domain_quota_is_ok / tomoyo_merge_path_acl (4) 12 247d 313d 190d 5797e861e402 tomoyo: ignore data race while checking quota
INFO: task hung in walk_component (2) 31 218d 218d 190d 775c5033a0d1 fuse: fix live lock in fuse_iget()
KCSAN: data-race in bpf_lru_pop_free / bpf_lru_push_free 237 238d 425d 190d 6df8fb83301d bpf_lru_list: Read double-checked variable once without lock
KASAN: use-after-free Read in ntfs_iget C error error 1 327d 323d 190d 4dfe6bd94959 ntfs: check for valid standard information attribute
general protection fault in kvm_hv_irq_routing_update C done 33 226d 233d 190d 919f4ebc5987 KVM: x86: hyper-v: Fix Hyper-V context null-ptr-deref
WARNING in memdup_user_nul C inconclusive 2 275d 275d 190d 7ef4c19d245f smackfs: restrict bytes count in smackfs write functions
memory leak in io_submit_sqes (2) C 1 228d 227d 190d f01272541d2c io-wq: ensure all pending work is canceled on exit
INFO: task can't die in connmark_exit_net syz error 1 312d 308d 190d d349f9976868 net_sched: fix RTNL deadlock again caused by request_module()
memory leak in dlfb_usb_probe C 3 304d 306d 190d 5c0e4110f751 udlfb: Fix memory leak in dlfb_usb_probe
INFO: task can't die in iget5_locked 7 234d 258d 190d 775c5033a0d1 fuse: fix live lock in fuse_iget()
UBSAN: shift-out-of-bounds in std_validate C unreliable 2 270d 270d 190d 048c96e28674 media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate
memory leak in zr364xx_probe C 6 245d 297d 190d ea354b6ddd6f media: zr364xx: fix memory leaks in probe()
linux-next test error: possible deadlock in cfg80211_netdev_notifier_call 6 262d 262d 190d 38ec7c6b6bd6 virt_wifi: fix deadlock on RTNL
KASAN: use-after-free Read in usb_audio_disconnect C done 15 220d 221d 190d c5aa956eaeb0 ALSA: usb-audio: fix use after free in usb_audio_disconnect
WARNING in pstore_kill_sb 1 249d 245d 190d 9c7d83ae6ba6 pstore: Fix warning in pstore_kill_sb()
UBSAN: shift-out-of-bounds in chkSuper C unreliable 28 238d 304d 190d 3bef198f1b17 JFS: more checks for invalid superblock
KCSAN: data-race in __bpf_lru_list_rotate / bpf_lru_push_free (2) 32 244d 313d 190d 6df8fb83301d bpf_lru_list: Read double-checked variable once without lock
KASAN: vmalloc-out-of-bounds Read in bpf_trace_run3 C done 6 246d 348d 190d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
UBSAN: shift-out-of-bounds in mceusb_dev_recv C 13 237d 301d 190d 1b43bad31fb0 media: mceusb: Fix potential out-of-bounds shift
memory leak in video_usercopy C 19 238d 301d 190d fb18802a338b media: v4l: ioctl: Fix memory leak in video_usercopy
BUG: sleeping function called from invalid context in rxe_alloc_nl C done 475 256d 270d 190d c4369575b2bc RDMA/rxe: Fix bug in rxe_alloc()
WARNING in __alloc_skb C error 24 221d 233d 190d 093b036aa94e net/qrtr: fix __netdev_alloc_skb call
WARNING in iov_iter_revert (2) C done 9 241d 242d 190d 3342ff2698e9 tty: protect tty_write from odd low-level tty disciplines
WARNING in cfg80211_change_iface C inconclusive 4 256d 261d 190d bae173563cbf wext: call cfg80211_change_iface() with wiphy lock held
general protection fault in tomoyo_socket_sendmsg_permission 17 247d 338d 190d 9380afd6df70 usbip: fix stub_dev usbip_sockfd_store() races leading to gpf 718ad9693e36 usbip: fix vhci_hcd attach_store() races leading to gpf 46613c9dfa96 usbip: fix vudc usbip_sockfd_store races leading to gpf
memory leak in edge_startup C 1 233d 229d 190d cfdc67acc785 USB: serial: io_edgeport: fix memory leak in edge_startup
unexpected kernel reboot (3) C error error 21132 190d 1191d 190d c8e2fe13d1d1 x86/perf: Use RET0 as default for guest_get_msrs to handle "no PMU" case
WARNING in qp_broker_alloc C inconclusive 24 235d 271d 190d 2fd10bcf0310 drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue
WARNING in sk_stream_kill_queues (5) C done 4684 190d 321d 190d 097b9146c0e2 net: fix up truesize of cloned skb in skb_prepare_for_shift()
BUG: unable to handle kernel paging request in bpf_trace_run3 C done 40 237d 360d 190d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
KASAN: null-ptr-deref Write in event_handler C done 2869 229d 376d 190d 9380afd6df70 usbip: fix stub_dev usbip_sockfd_store() races leading to gpf 718ad9693e36 usbip: fix vhci_hcd attach_store() races leading to gpf 46613c9dfa96 usbip: fix vudc usbip_sockfd_store races leading to gpf
KASAN: use-after-free Read in nbd_genl_connect C inconclusive 16 221d 237d 190d c9a2f90f4d6b nbd: handle device refs for DESTROY_ON_DISCONNECT properly
WARNING in cfg80211_dev_rename C inconclusive 22 256d 261d 190d 0391a45c8007 nl80211: call cfg80211_dev_rename() under RTNL
general protection fault in gfs2_withdraw C done 81 238d 386d 190d d5bf630f355d gfs2: bypass signal_our_withdraw if no journal
KASAN: null-ptr-deref Write in amp_read_loc_assoc_final_data C done 185 241d 442d 190d e8bd76ede155 Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
possible deadlock in io_poll_double_wake (2) C error error 431 190d 383d 190d 1c3b3e6527e5 io_uring: ignore double poll add on the same waitqueue head
WARNING in _cfg80211_unregister_wdev C inconclusive 48 255d 261d 190d 776a39b8196d cfg80211: call cfg80211_destroy_ifaces() with wiphy lock held
INFO: task can't die in io_sq_thread_finish syz 137 201d 233d 190d eb85890b29e4 io_uring: ensure SQPOLL startup is triggered before error shutdown
WARNING in dst_release syz done 2 242d 241d 190d e0be4931f3fe mptcp: reset last_snd on subflow close
BUG: sleeping function called from invalid context in mm_access C done 684 274d 278d 190d 38e891849003 kbuild: lto: fix module versioning
KASAN: use-after-free Read in skb_segment C error 55 269d 272d 190d 00b229f762b0 net: fix GSO for SG-enabled devices
inconsistent lock state in io_dismantle_req C 2 258d 257d 190d 9ae1f8dd372e io_uring: fix inconsistent lock state
BUG: unable to handle kernel paging request in __kvm_mmu_prepare_zap_page syz error 2 954d 964d 211d 47c42e6b4192 KVM: x86: fix handling of role.cr4_pae and rename it to 'gpte_size'
kernel BUG in memory_bm_free 72 255d 256d 215d 91cb2c8b072e arm64: Do not pass tagged addresses to __is_lm_address()
KASAN: slab-out-of-bounds Read in squashfs_get_id C error done 77 250d 386d 219d e812cbbbbbb1 squashfs: avoid out of bounds writes in decompressors
UBSAN: shift-out-of-bounds in tcf_police_init C unreliable 8 270d 307d 220d e4bedf48aaa5 net_sched: reject silly cell_log in qdisc_get_rtab()
UBSAN: shift-out-of-bounds in est_timer C unreliable 73 229d 304d 220d dd5e073381f2 net_sched: gen_estimator: support large ewma log
memory leak in xskq_create C 7 287d 307d 221d 8bee68338408 xsk: Fix memory leak for failed bind
BUG: sleeping function called from invalid context in corrupted syz done 18 317d 341d 221d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
WARNING in md_ioctl C done error 684 305d 1266d 221d c731b84b51bf md: fix a warning caused by a race between concurrent md_ioctl()s
BUG: unable to handle kernel paging request in htab_map_alloc (2) C unreliable 8 308d 316d 221d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
general protection fault in io_sqe_files_unregister 2 282d 281d 221d 3e2224c5867f io_uring: Fix return value from alloc_fixed_file_ref_node
UBSAN: shift-out-of-bounds in __detect_linklayer C unreliable done 31 269d 275d 221d e4bedf48aaa5 net_sched: reject silly cell_log in qdisc_get_rtab()
BUG: receive list entry not found for dev vxcan1, id 003, mask C00007FF C unreliable 2 325d 325d 221d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
UBSAN: shift-out-of-bounds in tcindex_set_parms C unreliable done 45 269d 304d 221d bcd0cf19ef82 net_sched: avoid shift-out-of-bounds in tcindex_set_parms()
kernel BUG at mm/page-writeback.c:LINE! 1 290d 286d 221d c2407cf7d22d mm: make wait_on_page_writeback() wait for multiple pending writebacks
WARNING in io_uring_flush C unreliable 10 265d 274d 221d 4325cb498cb7 io_uring: fix uring_flush in exit_files() warning
general protection fault in rose_send_frame C done done 664 331d 1010d 221d 3b3fd068c56e rose: Fix Null pointer dereference in rose_send_frame()
general protection fault in taprio_dequeue_soft C done 2 306d 305d 221d 44d4775ca518 net/sched: sch_taprio: reset child qdiscs before freeing them
BUG: unable to handle kernel paging request in bpf_lru_populate C done 12 307d 313d 221d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
bpf test error: BUG: sleeping function called from invalid context in sta_info_move_state 6 331d 337d 221d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
KASAN: slab-out-of-bounds Read in hci_le_meta_evt C error error 45 318d 439d 221d f7e0e8b2f1b0 Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
KASAN: null-ptr-deref Write in rhashtable_free_and_destroy 11 240d 317d 221d 905b2032fa42 mac80211: mesh: fix mesh_pathtbl_init() error path
KASAN: use-after-free Read in disk_part_iter_next C unreliable 243 221d 309d 221d aebf5db91705 block: fix use-after-free in disk_part_iter_next
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected (2) C done 640 285d 403d 221d 8d1ddb5e7937 fcntl: Fix potential deadlock in send_sig{io, urg}()
kernel BUG at net/core/dev.c:NUM! C done 35 275d 276d 221d 47e4bb147a96 net: sit: unregister_netdevice on newlink's error path
KASAN: use-after-free Read in search_by_entry_key C done 3 370d 373d 221d d24396c5290b reiserfs: add check for an invalid ih_entry_count
KCSAN: data-race in snd_rawmidi_transmit / snd_rawmidi_write 232 254d 430d 221d 88a06d6fd6b3 ALSA: rawmidi: Access runtime->avail always in spinlock
UBSAN: shift-out-of-bounds in f2fs_fill_super C 4 313d 312d 221d e584bbe82122 f2fs: fix shift-out-of-bounds in sanity_check_raw_super()
KASAN: global-out-of-bounds Read in smc_nl_get_sys_info C error 27 273d 300d 221d 25fe2c9c4cd2 smc: fix out of bound access in smc_nl_get_sys_info()
KASAN: use-after-free Read in btrfs_scan_one_device C error 70 325d 391d 221d 0697d9a61099 btrfs: don't access possibly stale fs_info data for printing duplicate device
memory leak in prepare_creds C 10 241d 415d 221d f26c08b444df io_uring: fix file leak on error path of io ctx creation
WARNING in percpu_ref_kill_and_confirm (2) C done 71 296d 304d 221d 9faadcc8abe4 io_uring: fix double io_uring free
WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anywa C unreliable 1 317d 313d 221d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
general protection fault in ieee80211_subif_start_xmit C unreliable 29 261d 327d 221d 054c9939b480 mac80211: pause TX while changing interface type
WARNING in rds_rdma_extra_size C done 165 256d 280d 221d a11148e6fcce net/rds: restrict iovecs length for RDS_CMSG_RDMA_ARGS
KASAN: use-after-free Read in decode_session6 C done 152 267d 475d 221d 0356010d825e sctp: bring inet(6)_skb_parm back to sctp_input_cb
WARNING: filesystem loop2 was created with 512 inodes, the real maximum is 511, mounting anyway 2 334d 330d 221d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
divide error in __tcp_select_window C done 1119 324d 330d 221d fd8976790a6c mptcp: be careful on MPTCP-level ack.
WARNING: suspicious RCU usage in kernfs_iop_permission C done 1 258d 257d 221d b854cc659dcb ovl: avoid deadlock on directory ioctl
KMSAN: uninit-value in INET_ECN_decapsulate 3 288d 320d 221d 4179b00c04d1 geneve: pull IP header before ECN decapsulation
WARNING in io_ring_ctx_wait_and_kill C done 9 275d 276d 221d 06585c497b55 io_uring: do sqo disable on install_fd error
WARNING in mc1NUM_get_time 13 252d 253d 221d ebb22a059436 rtc: mc146818: Dont test for bit 0-5 in Register D
INFO: task hung in lock_sock_nested (4) C done 6 272d 319d 221d 05e3ecea4a63 mptcp: avoid potential infinite loop in mptcp_recvmsg()
UBSAN: shift-out-of-bounds in choke_enqueue C inconclusive 3853 221d 313d 221d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
WARNING: suspicious RCU usage in get_wiphy_regdom C done 5031 272d 304d 221d 51d62f2f2c50 cfg80211: Save the regulatory domain with a lock
WARNING: suspicious RCU usage in tcp_disconnect C done 25 275d 277d 221d 13a9499e8333 mptcp: fix locking in mptcp_disconnect()
WARNING in spi_register_controller C 1848 305d 918d 221d 9c60cc797cf7 media: msi2500: assign SPI bus number dynamically
KMSAN: uninit-value in __nla_validate_parse (2) C 2 282d 278d 221d c96adff95619 cls_flower: call nla_ok() before nla_next()
INFO: task hung in __io_uring_files_cancel C done 30 262d 329d 221d bee749b187ac io_uring: fix files cancellation
general protection fault in xsk_recvmsg C done unreliable 1800 306d 275d 221d 3546b9b8eced xsk: Validate socket state in xsk_recvmsg, prior touching socket members
KASAN: use-after-free Write in rtl_fw_do_work (2) 4 306d 311d 221d 4dfde294b979 rtlwifi: rise completion at the last step of firmware callback
UBSAN: shift-out-of-bounds in sfq_init C unreliable 8 284d 298d 221d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
memory leak in h5_rx_pkt_start C 5 418d 761d 221d 70f259a3f427 Bluetooth: hci_h5: close serdev device and free hu in h5_close 855af2d74c87 Bluetooth: hci_h5: fix memory leak in h5_close
kernel BUG at lib/string.c:LINE! (6) C done 2 302d 298d 221d 6cb56218ad9e netfilter: xt_RATEEST: reject non-null terminated string from userspace
kernel BUG at include/linux/highmem.h:LINE! C error 32 325d 329d 221d 0060ef3b4e6d mm: support THPs in zero_user_segments
UBSAN: shift-out-of-bounds in dummy_hub_control C done 5 297d 295d 221d c318840fb2a4 USB: Gadget: dummy-hcd: Fix shift-out-of-bounds bug
KASAN: use-after-free Read in reiserfs_fill_super C error done 2 315d 313d 221d d24396c5290b reiserfs: add check for an invalid ih_entry_count
KASAN: vmalloc-out-of-bounds Write in pcpu_freelist_populate 6 309d 313d 221d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
BUG: unable to handle kernel NULL pointer dereference in kcsan_setup_watchpoint 128 351d 360d 221d 55a2346c7ac4 kcsan: Never set up watchpoints on NULL pointers
BUG: unable to handle kernel paging request in percpu_ref_exit C done 3 282d 280d 221d 3e2224c5867f io_uring: Fix return value from alloc_fixed_file_ref_node
KMSAN: uninit-value in gre_parse_header C 9283 249d 846d 221d 085c7c4e1c0e erspan: fix version 1 check in gre_parse_header()
UBSAN: shift-out-of-bounds in red_adaptative_timer C unreliable 260 221d 313d 221d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
KASAN: slab-out-of-bounds Write in xfrm_attr_cpy32 C done 106 310d 359d 221d d1949d045fd6 xfrm/compat: memset(0) 64-bit padding at right place
WARNING in squashfs_read_table C inconclusive 50 251d 280d 221d 506220d2ba21 squashfs: add more sanity checks in xattr id lookup
BUG: receive list entry not found for dev vcan0, id 002, mask C00007FF C unreliable 5 325d 325d 221d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
UBSAN: shift-out-of-bounds in parse_audio_format_i C error 19 306d 312d 221d 175b8d89fe29 ALSA: pcm: oss: Fix potential out-of-bounds shift 43d5ca88dfcd ALSA: usb-audio: Fix potential out-of-bounds shift
INFO: task can't die in io_sq_thread_stop 1 340d 336d 221d 65b2b213484a io_uring: check kthread stopped flag when sq thread is unparked
UBSAN: array-index-out-of-bounds in dquot_resume C done 1 315d 313d 221d e51d68e76d60 fs: quota: fix array-index-out-of-bounds bug by passing correct argument to vfs_cleanup_quota_inode()
WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anyway C done 11 316d 384d 221d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
KASAN: use-after-free Read in htab_map_alloc C done 38 348d 351d 221d 8aaeed81fcb9 bpf: Fix error path in htab_map_alloc()
general protection fault in io_disable_sqo_submit C done 124 272d 276d 221d b4411616c26f io_uring: fix null-deref in io_disable_sqo_submit
BUG: unable to handle kernel paging request in htab_free_elems 1 315d 315d 221d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
KASAN: null-ptr-deref Write in bdi_put C done done 601 278d 311d 221d 2d2f6f1b4799 block: pre-initialize struct block_device in bdev_alloc_inode
general protection fault in rose_transmit_clear_request C done 5 350d 815d 221d 3b3fd068c56e rose: Fix Null pointer dereference in rose_send_frame()
kernel BUG at net/core/skbuff.c:LINE! (3) C done 4399 236d 1353d 221d afbc293add64 af_key: relax availability checks for skb size calculation
UBSAN: shift-out-of-bounds in __red_change C unreliable 24 224d 312d 221d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
KASAN: vmalloc-out-of-bounds Write in htab_map_alloc 6 308d 317d 221d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
KASAN: use-after-free Read in rxrpc_get_skb 1 269d 264d 221d 7b5eab57cac4 rxrpc: Fix clearance of Tx/Rx ring when releasing a call
WARNING in io_uring_cancel_task_requests syz done 69 257d 261d 221d 70b2c60d3797 io_uring: fix sqo ownership false positive warning
upstream test error: BUG: sleeping function called from invalid context in sta_info_move_state 53 331d 340d 221d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
kernel BUG at fs/notify/dnotify/dnotify.c:LINE! (2) C inconclusive 2 322d 327d 221d 5d069dbe8aaf fuse: fix bad inode
BUG: receive list entry not found for dev vcan0, id 001, mask C00007FF C unreliable 5 328d 327d 221d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
inconsistent lock state in io_file_data_ref_zero C done 7152 304d 327d 221d ac0648a56c1f io_uring: use bottom half safe lock for fixed file data
unregister_netdevice: waiting for DEV to become free (4) C done 50394 221d 423d 221d 5399d52233c4 rxrpc: Fix deadlock around release of dst cached on udp tunnel
WARNING in bpf_prog_test_run_raw_tp C done 36 269d 280d 221d 7ac6ad051150 bpf: Reject too big ctx_size_in for raw_tp test run
UBSAN: shift-out-of-bounds in gred_change C unreliable 5 234d 289d 221d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
BUG: corrupted list in io_file_get C done 3 261d 261d 221d f609cbb8911e io_uring: fix list corruption for splice file_get
linux-next test error: BUG: sleeping function called from invalid context in sta_info_move_state 3 341d 345d 221d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
WARNING in io_wq_submit_work 4 268d 273d 221d ca70f00bed6c io_uring: fix cancellation taking mutex while TASK_UNINTERRUPTIBLE
UBSAN: shift-out-of-bounds in option_probe C error 22 311d 312d 221d a251963f76fa USB: serial: option: add interface-number sanity check to flag handling
KMSAN: kernel-infoleak in vmci_host_unlocked_ioctl C 22 249d 333d 221d 31dcb6c30a26 misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells()
general protection fault in jffs2_parse_param C error done 1632 302d 390d 221d a61df3c413e4 jffs2: Fix NULL pointer dereference in rp_size fs option parsing
KMSAN: uninit-value in number (2) C 168 221d 601d 221d c8c958a58fc6 can: af_can: prevent potential access of uninitialized member in can_rcv() 9aa9379d8f86 can: af_can: prevent potential access of uninitialized member in canfd_rcv()
net test error: BUG: sleeping function called from invalid context in sta_info_move_state 4 338d 345d 221d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
possible deadlock in send_sigio (2) C done done 40 290d 402d 221d 8d1ddb5e7937 fcntl: Fix potential deadlock in send_sig{io, urg}()
kernel BUG at fs/reiserfs/prints.c:LINE! C done done 5 312d 390d 221d d24396c5290b reiserfs: add check for an invalid ih_entry_count
KASAN: vmalloc-out-of-bounds Write in lzo_uncompress C done 8 252d 276d 221d e812cbbbbbb1 squashfs: avoid out of bounds writes in decompressors
KASAN: slab-out-of-bounds Read in smc_nl_handle_smcr_dev 1 304d 300d 221d 995433b795ce net/smc: fix access to parent of an ib device
BUG: unable to handle kernel paging request in pcpu_freelist_populate C unreliable 42 306d 317d 221d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
UBSAN: array-index-out-of-bounds in alg_bind C error 700 306d 366d 221d 92eb6c3060eb crypto: af_alg - avoid undefined behavior accessing salg_name
net-next test error: BUG: sleeping function called from invalid context in sta_info_move_state 12 331d 340d 221d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
general protection fault in gfs2_ri_update 1 335d 331d 221d 778721510e84 gfs2: check for empty rgrp tree in gfs2_ri_update
memory leak in rxrpc_lookup_local C 1415 261d 725d 221d b8323f7288ab rxrpc: Fix memory leak in rxrpc_lookup_local
WARNING: suspicious RCU usage in wiphy_apply_custom_regulatory C done 28 304d 301d 221d 51d62f2f2c50 cfg80211: Save the regulatory domain with a lock
memory leak in generic_parse_monolithic C 11 311d 337d 221d 4cb682964706 afs: Fix memory leak when mounting with multiple source parameters
WARNING in mptcp_reset_timer C unreliable 1307 238d 332d 221d b680a214ec28 mptcp: update rtx timeout only if required.
KASAN: slab-out-of-bounds Write in record_print_text C done unreliable 17 262d 264d 221d 08d60e599954 printk: fix string termination for record_print_text()
WARNING in xfrm_alloc_compat C done 130 233d 355d 221d dbd7ae5154d5 xfrm/compat: Translate by copying XFRMA_UNSPEC attribute
UBSAN: shift-out-of-bounds in red_enqueue C unreliable 4906 221d 313d 221d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
KMSAN: kernel-infoleak in move_addr_to_user (4) C 59 227d 279d 221d b42b3a2744b3 can: isotp: isotp_getname(): fix kernel information leak
general protection fault in ext4_commit_super C done 4 300d 298d 221d c92dc856848f ext4: defer saving error info from atomic context
UBSAN: array-index-out-of-bounds in arch_uprobe_analyze_insn C done 604 314d 391d 221d 12cb908a11b2 x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes 84da009f06e6 x86/sev-es: Use new for_each_insn_prefix() macro to loop over prefixes bytes 4e9a5ae8df5b x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
BUG: unable to handle kernel NULL pointer dereference in call_rcu C done 85 291d 294d 221d 13384f6125ad kasan: fix null pointer dereference in kasan_record_aux_stack
KASAN: vmalloc-out-of-bounds Read in htab_free_elems C unreliable 7 314d 315d 221d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
BUG: receive list entry not found for dev vxcan1, id 002, mask C00007FF C unreliable 3 325d 327d 221d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
WARNING in rhashtable_free_and_destroy C error 3 317d 410d 221d 905b2032fa42 mac80211: mesh: fix mesh_pathtbl_init() error path
BUG: unable to handle kernel NULL pointer dereference in __lookup_slow C inconclusive done 3 243d 384d 221d d24396c5290b reiserfs: add check for an invalid ih_entry_count
BUG: sleeping function called from invalid context in sta_info_move_state C done 39248 315d 347d 221d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
UBSAN: shift-out-of-bounds in strset_parse_request C done 16 284d 307d 221d efb796f5571f ethtool: fix string set id check
KASAN: slab-out-of-bounds Read in btrfs_scan_one_device C done done 1 344d 340d 221d 0697d9a61099 btrfs: don't access possibly stale fs_info data for printing duplicate device
WARNING in qrtr_tun_write_iter C error 57 248d 280d 221d 2a80c1581237 net/qrtr: restrict user-controlled length in qrtr_tun_write_iter()
memory leak in hub_event C 7 241d 330d 221d e469d0b09a19 media: gspca: Fix memory leak in probe
KASAN: invalid-access Read in kmem_cache_destroy 2 258d 262d 221d 757fed1d0898 Revert "mm/slub: fix a memory leak in sysfs_slab_add()"
possible deadlock in send_sigurg (2) C done 25 308d 358d 221d 8d1ddb5e7937 fcntl: Fix potential deadlock in send_sig{io, urg}()
possible deadlock in ovl_dir_real_file 1 258d 257d 221d b854cc659dcb ovl: avoid deadlock on directory ioctl
WARNING in yurex_write/usb_submit_urb C error 78 280d 308d 221d 372c93131998 USB: yurex: fix control-URB timeout handling
kernel BUG at fs/ext4/inode.c:LINE! C done 9 291d 416d 221d 073861ed77b6 mm: fix VM_BUG_ON(PageTail) and BUG_ON(PageWriteback)
KCSAN: data-race in snd_rawmidi_poll / snd_rawmidi_proceed 378 305d 431d 221d 88a06d6fd6b3 ALSA: rawmidi: Access runtime->avail always in spinlock
UBSAN: shift-out-of-bounds in cbq_dequeue C unreliable 27 269d 313d 221d e4bedf48aaa5 net_sched: reject silly cell_log in qdisc_get_rtab()
bpf-next test error: BUG: sleeping function called from invalid context in sta_info_move_state 13 316d 336d 221d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
KASAN: use-after-free Write in __sco_sock_close C done done 10 342d 440d 221d 6dfccd13db2f Bluetooth: Fix null pointer dereference in hci_event_packet()
BUG: unable to handle kernel paging request in dqput C done 7 316d 385d 221d 11c514a99bb9 quota: Sanity-check quota file headers on load
KMSAN: uninit-value in snd_seq_oss_synth_make_info (2) 1 279d 275d 221d 217bfbb8b0bf ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info()
UBSAN: shift-out-of-bounds in intel_pmu_refresh C unreliable 1237 262d 312d 221d e61ab2a320c3 KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh()
UBSAN: shift-out-of-bounds in snd_usbmidi_get_ms_info C error 9 279d 298d 221d c06ccf3ebb75 ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks
UBSAN: shift-out-of-bounds in snd_pcm_oss_change_params_locked C unreliable 225 297d 312d 221d 11cb881bf075 ALSA: pcm: oss: Fix a few more UBSAN fixes
UBSAN: shift-out-of-bounds in ext4_fill_super C unreliable 88 296d 312d 221d c9200760da8a ext4: check for invalid block size early when mounting a file system
INFO: rcu detected stall in tipc_release C done done 4 332d 467d 221d cc00bcaa5899 netfilter: x_tables: Switch synchronization to RCU
UBSAN: shift-out-of-bounds in vhci_hub_control C unreliable 4 261d 298d 221d 718bf42b119d usb: usbip: vhci_hcd: protect shift size
WARNING: filesystem loop5 was created with 512 inodes, the real maximum is 511, mounting anyway 2 327d 323d 221d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
general protection fault in tower_disconnect C 53 304d 312d 221d b175d273d4e4 USB: legotower: fix logical error in recent commit
kernel BUG at drivers/dma-buf/dma-buf.c:LINE! syz error done 11 338d 588d 221d e722a295cf49 staging: ion: remove from the tree
WARNING: filesystem loop1 was created with 512 inodes, the real maximum is 511, mounting anyway 4 334d 383d 221d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
KCSAN: data-race in snd_seq_check_queue / snd_seq_control_queue (3) 111 306d 451d 221d 4ebd47037027 ALSA: seq: Use bool for snd_seq_queue internal flags
KMSAN: uninit-value in x25_bind 2 283d 305d 221d 6ee50c8e262a net/x25: prevent a couple of overflows
memory leak in wacom_probe C 26 284d 338d 221d 37309f47e2f5 HID: wacom: Fix memory leakage caused by kfifo_alloc
KASAN: use-after-free Read in service_outstanding_interrupt C 28 280d 435d 221d 5e5ff0b4b6bc USB: cdc-wdm: Fix use after free in service_outstanding_interrupt().
general protection fault in call_commit_handler C done 428 277d 358d 221d 5122565188ba wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
BUG: unable to handle kernel paging request in smc_nl_handle_smcr_dev C 16 290d 312d 221d 995433b795ce net/smc: fix access to parent of an ib device
KASAN: vmalloc-out-of-bounds Write in bpf_lru_populate C unreliable 19 307d 317d 221d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
memory leak in copy_process C 23 238d 335d 221d 450677dcb0cc mm/madvise: fix memory leak from process_madvise
UBSAN: shift-out-of-bounds in kvm_vcpu_after_set_cpuid 2 304d 299d 221d 2f80d502d627 KVM: x86: fix shift out of bounds reported by UBSAN
KASAN: stack-out-of-bounds Write in bitmap_from_arr32 C done 2 324d 320d 221d a770bf515613 ethtool: fix stack overflow in ethnl_parse_bitset()
WARNING: filesystem loop3 was created with 512 inodes, the real maximum is 511, mounting anyway 3 320d 387d 221d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
possible deadlock in hugetlb_cow C unreliable 341 291d 314d 221d e7dd91c456a8 mm/hugetlb: fix deadlock in hugetlb_cow error path
KASAN: null-ptr-deref Write in start_transaction C done done 1 313d 340d 221d ecfdc08b8cc6 btrfs: remove dio iomap DSYNC workaround
possible deadlock in proc_pid_syscall (2) 2 405d 415d 221d f7cfd871ae0c exec: Transform exec_update_mutex into a rw_semaphore 78af4dc949da perf: Break deadlock involving exec_update_mutex
KASAN: slab-out-of-bounds Read in squashfs_export_iget C done error 3 292d 310d 221d eabac19e40c0 squashfs: add more sanity checks in inode lookup
WARNING in io_disable_sqo_submit C done 9 266d 274d 221d 6b393a1ff174 io_uring: fix false positive sqo warning on flush
KASAN: null-ptr-deref Read in filp_close C done 9 301d 303d 221d fec8a6a69103 close_range: unshare all fds for CLOSE_RANGE_UNSHARE | CLOSE_RANGE_CLOEXEC 6abc20f8f879 selftests/core: add regression test for CLOSE_RANGE_UNSHARE | CLOSE_RANGE_CLOEXEC
possible deadlock in _destroy_id C unreliable 28 324d 332d 221d dd37d2f59eb8 RDMA/cma: Fix deadlock on &lock in rdma_cma_listen_on_all() error unwind
UBSAN: array-index-out-of-bounds in ieee80211_del_key (2) C error 3 312d 320d 221d 2d9463083ce9 nl80211: validate key indexes for cfg80211_registered_device
KASAN: use-after-free Read in rxrpc_send_data_packet 1 263d 258d 221d 7b5eab57cac4 rxrpc: Fix clearance of Tx/Rx ring when releasing a call
general protection fault in hci_event_packet C done 25 387d 440d 221d 6dfccd13db2f Bluetooth: Fix null pointer dereference in hci_event_packet()
KASAN: use-after-free Read in dump_schedule C done done 7 297d 408d 221d cc00bcaa5899 netfilter: x_tables: Switch synchronization to RCU
KASAN: invalid-free in p9_client_create (2) C done 3 262d 262d 221d 757fed1d0898 Revert "mm/slub: fix a memory leak in sysfs_slab_add()"
possible deadlock in io_timeout_fn (2) 4 282d 289d 221d 4aa84f2ffa81 io_uring: dont kill fasync under completion_lock
WARNING: filesystem loop4 was created with 512 inodes, the real maximum is 511, mounting anyway 3 334d 330d 221d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
general protection fault in wext_handle_ioctl C inconclusive 9 264d 353d 221d 5122565188ba wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
INFO: rcu detected stall in sys_exit_group (6) C 4 381d 387d 221d c583bcb8f5ed rcu: Don't invoke try_invoke_on_locked_down_task() with irqs disabled
WARNING in cm109_input_ev/usb_submit_urb C unreliable 8 309d 330d 221d 82e060904732 Input: cm109 - do not stomp on control URB
UBSAN: shift-out-of-bounds in hash_mac_create C unreliable 29 287d 307d 221d 5c8193f568ae netfilter: ipset: fix shift-out-of-bounds in htable_bits()
upstream build error (11) 25 277d 354d 277d f78f63da916e mm/process_vm_access: Add missing #include <linux/compat.h>
possible deadlock in process_measurement (2) C done done 56 317d 684d 284d 15a8d68e9dc2 mm/hugetlb: a page from buddy is not on any list
INFO: rcu detected stall in sys_open (2) C done done 42 340d 691d 297d 1d0e850a49a5 afs: Fix cell removal
BUG: unable to handle kernel paging request in cfb_imageblit C done done 30 332d 376d 297d a49145acfb97 fbmem: add margin check to fb_check_caps()
KASAN: use-after-free Read in eth_type_trans C done error 3 521d 663d 297d 96aa1b22bd6b tun: correct header offsets in napi frags mode
BUG: MAX_LOCKDEP_KEYS too low! C done error 3496 477d 721d 311d 1a33e10e4a95 net: partially revert dynamic lockdep key changes
BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! C done error 25236 515d 955d 311d 1a33e10e4a95 net: partially revert dynamic lockdep key changes
INFO: rcu detected stall in __se_sys_mount C done done 2 343d 467d 312d 1d0e850a49a5 afs: Fix cell removal
BUG: sleeping function called from invalid context in ext4_superblock_csum_set 2 343d 349d 315d d196e229a80c Revert "ext4: fix superblock checksum calculation race"
KASAN: null-ptr-deref Write in kthread_use_mm C done 2 349d 348d 330d 4b70cf9dea4c io_uring: ensure consistent view of original task ->mm from SQPOLL
WARNING in close_fs_devices (2) C 23 332d 393d 330d cf89af146b7e btrfs: dev-replace: fail mount if we don't have replace item with target device
memory leak in gadget_setup C 49 342d 358d 330d 129aa9734559 usb: raw-gadget: fix memory leak in gadget_setup
memory leak in gadget_bind C 62 342d 358d 330d 129aa9734559 usb: raw-gadget: fix memory leak in gadget_setup
general protection fault in io_uring_show_cred C done 4 346d 345d 330d 6b47ab81c9a9 io_uring: use correct pointer for io_uring_show_cred()
KASAN: use-after-free Write in io_submit_sqes C error 2 348d 347d 330d cb8a8ae31074 io_uring: drop req/tctx io_identity separately
KASAN: use-after-free Read in __proc_create 1 385d 384d 334d 1d0e850a49a5 afs: Fix cell removal
INFO: rcu detected stall in process_one_work (3) C done done 1 375d 416d 334d 1d0e850a49a5 afs: Fix cell removal
INFO: task can't die in corrupted C done 4 348d 374d 334d 86f33603f8c5 f2fs: handle errors of f2fs_get_meta_page_nofail
BUG: corrupted list in kobject_add_internal C done done 9 372d 435d 334d a46b7ed4d52d Bluetooth: Fix auto-creation of hci_conn at Conn Complete event
WARNING in dma_map_page_attrs C unreliable 304 343d 360d 334d 683a9c7ed817 RDMA: Fix software RDMA drivers for dma mapping error
WARNING in unlock_new_inode C done 76 371d 1276d 334d 8859bf2b1278 reiserfs: only call unlock_new_inode() if I_NEW
memory leak in ieee80211_check_fast_xmit C 983 344d 387d 334d dcd479e10a05 mac80211: always wind down STA state
WARNING: suspicious RCU usage in ovs_flow_tbl_masks_cache_resize C error 1 354d 353d 334d fea07a487c6d net: openvswitch: silence suspicious RCU usage warning
general protection fault in xsk_release C done 2 387d 386d 334d 1fd17c8cd0aa xsk: Fix possible crash in socket_release when out-of-memory
memory leak in reiserfs_parse_options C 4 399d 594d 334d e9d4709fcc26 reiserfs: Fix memory leak in reiserfs_parse_options()
KMSAN: kernel-infoleak in scsi_cmd_ioctl 131 338d 411d 334d 6d53a9fe5a19 block/scsi-ioctl: Fix kernel-infoleak in scsi_put_cdrom_generic_arg()
WARNING in binder_transaction_buffer_release (2) C done done 442 467d 507d 334d e8b8ae7ce32e binder: Remove bogus warning on failed same-process transaction
BUG: using __this_cpu_read() in preemptible code in trace_hardirqs_on C done 502745 337d 368d 334d f8e48a3dca06 lockdep: Fix preemption WARN for spurious IRQ-enable
INFO: task hung in wdm_flush C 38294 412d 796d 334d 37d2a36394d9 USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync().
INFO: trying to register non-static key in uhid_char_release C done done 26 411d 589d 334d bce1305c0ece HID: core: Correctly handle ReportSize being zero
WARNING in ieee80211_s1g_channel_width C done 3 377d 377d 334d c1cd35c60601 cfg80211: only allow S1G channels on S1G band
KMSAN: uninit-value in ieee80211_skb_resize C 5 363d 387d 334d 14f46c1e5108 mac80211: fix use of skb payload instead of header
KASAN: global-out-of-bounds Read in precalculate_color C done done 170 395d 688d 334d e3158a5e7e66 media: vivid: Fix global-out-of-bounds read in precalculate_color()
general protection fault in percpu_ref_exit C done 3 369d 373d 334d 7ea6bf2e6c40 percpu_ref: don't refer to ref->data if it isn't allocated
KASAN: use-after-free Write in tcindex_change C done done 4 577d 578d 334d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
general protection fault in gfs2_rgrp_dump 1 376d 375d 334d 0e539ca1bbbe gfs2: Fix NULL pointer dereference in gfs2_rgrp_dump
WARNING: refcount bug in do_enable_set C inconclusive done 8 437d 547d 334d b83764f9220a Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
possible deadlock in cleanup_net C done 281 403d 411d 334d d966ddcc3821 tipc: fix a deadlock when flushing scheduled work
general protection fault in utf8_casefold C done 1 373d 373d 334d f6322f3f1212 f2fs: reject CASEFOLD inode flag without casefold feature
KASAN: use-after-free Read in sctp_auth_free C done 4 373d 374d 334d d42ee76ecb6c net-backports: sctp: fix sctp_auth_init_hmacs() error path
kernel panic: Fatal exception (3) C done 2 369d 367d 334d eadd1befdd77 netem: fix zero division in tabledist
KASAN: use-after-free Read in ath9k_hif_usb_rx_cb C 2849 334d 569d 334d 03fb92a432ea ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs()
memory leak in udf_process_sequence C 4 387d 390d 334d a7be300de800 udf: Fix memory leak when mounting
general protection fault in unlink_file_vma C done 1 407d 403d 334d bc4fe4cdd602 mm: mmap: Fix general protection fault in unlink_file_vma()
KASAN: use-after-free Read in fscache_alloc_cookie syz done 1 387d 386d 334d 1d0e850a49a5 afs: Fix cell removal
KASAN: unknown-crash Read in do_exit C inconclusive done 2 392d 397d 334d a49145acfb97 fbmem: add margin check to fb_check_caps()
WARNING in handle_exception_nmi C error done 2653 375d 380d 334d f8e48a3dca06 lockdep: Fix preemption WARN for spurious IRQ-enable
KASAN: use-after-free Read in tipc_named_reinit 6 439d 494d 334d fdeba99b1e58 tipc: fix use-after-free in tipc_bcast_get_mode
kernel BUG at fs/f2fs/segment.h:LINE! 9 380d 391d 334d 6a257471fa42 f2fs: fix to check segment boundary during SIT page readahead
KMSAN: uninit-value in ip_tunnel_xmit (2) C 11778 338d 1163d 334d fdafed459998 ip_gre: set dev->hard_header_len and dev->needed_headroom properly
WARNING: refcount bug in p9_req_put syz inconclusive done 6 513d 1066d 334d a39c46067c84 net/9p: validate fds in p9_fd_open
INFO: rcu detected stall in ip_list_rcv C error done 3 382d 408d 334d 1d0e850a49a5 afs: Fix cell removal
UBSAN: array-index-out-of-bounds in precalculate_color C 153 369d 394d 334d e3158a5e7e66 media: vivid: Fix global-out-of-bounds read in precalculate_color()
KMSAN: uninit-value in can_receive (2) C 2060 339d 433d 334d e009f95b1543 can: j1935: j1939_tp_tx_dat_new(): fix missing initialization of skbcnt
WARNING in syscall_exit_to_user_mode C done done 1 372d 400d 334d a49145acfb97 fbmem: add margin check to fb_check_caps()
general protection fault in tcf_generic_walker syz 9 381d 384d 334d 580e4273d7a8 net_sched: check error pointer in tcf_dump_walker()
WARNING in print_bfs_bug C done 14759 366d 719d 334d 6d1823ccc480 lockdep: Optimize the memory usage of circular queue
KASAN: use-after-free Read in io_wqe_worker C error 2 384d 385d 334d c4068bf898dd io-wq: fix use-after-free in io_wq_worker_running
INFO: task hung in io_uring_setup C done 51 403d 409d 334d 7e84e1c7566a io_uring: allow disabling rings during the creation
KMSAN: uninit-value in unix_find_other C 57 379d 1196d 334d 7ca1db21ef8e net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
KASAN: use-after-free Read in delete_partition C done done 3 410d 407d 334d 08fc1ab6d748 block: fix locking in bdev_del_partition
WARNING in get_signal C done 2 377d 379d 334d 7b3c36fc4c23 ptrace: fix task_join_group_stop() for the case when current is traced
KASAN: use-after-free Write in refcount_warn_saturate C inconclusive done 2 438d 597d 334d b83764f9220a Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
INFO: task hung in addrconf_verify_work (3) C done 75 347d 382d 334d 0fedc63fadf0 net_sched: commit action insertions together
kernel panic: stack is corrupted in get_kernel_gp_address syz done done 1 368d 400d 334d a49145acfb97 fbmem: add margin check to fb_check_caps()
WARNING: ODEBUG bug in exit_to_user_mode_prepare C done done 27 408d 414d 334d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
KMSAN: uninit-value in batadv_hard_if_event (2) C 162 350d 433d 334d f45a4248ea4c net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails
INFO: task hung in ctrl_getfamily syz done done 22 428d 1040d 334d 47733f9daf4f tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
WARNING: suspicious RCU usage in io_init_identity 1536 361d 366d 334d 1e6fa5216a0e io_uring: COW io_identity on mismatch
KASAN: out-of-bounds Read in __switch_to (2) syz done done 1 382d 378d 334d a49145acfb97 fbmem: add margin check to fb_check_caps()
WARNING: suspicious RCU usage in qrtr_ns_worker C done 1 416d 479d 334d a7809ff90ce6 net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
inconsistent lock state in xa_destroy C 755 372d 373d 334d ca6484cd308a io_uring: no need to call xa_destroy() on empty xarray
KASAN: use-after-free Write in afs_manage_cell C done done 20 366d 436d 334d 1d0e850a49a5 afs: Fix cell removal
possible deadlock in _snd_pcm_stream_lock_irqsave C done 997 366d 402d 334d 6564d0ad67ef ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock
INFO: task hung in io_uring_flush C done done 11 425d 432d 334d b7ddce3cbf01 io_uring: fix cancel of deferred reqs with ->files
memory leak in kobject_set_name_vargs (3) C 19 335d 390d 334d cb8d53d2c973 ext4: fix leaking sysfs kobject after failed mount
WARNING in percpu_ref_exit (2) C done done 272 370d 666d 334d c1e2148f8ecb io_uring: free fixed_file_data after RCU grace period
KASAN: slab-out-of-bounds Write in gfs2_fill_super C done 1 382d 381d 334d 0ddc5154b24c gfs2: add validation checks for size of superblock
WARNING in rxrpc_recvmsg C error done 5 469d 470d 334d 65550098c1c4 rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
general protection fault in open_xa_dir C done 3 370d 381d 334d c2bb80b8bdd0 reiserfs: Fix oops during mount
KASAN: use-after-free Read in tcf_action_init C done 1 386d 384d 334d 0fedc63fadf0 net_sched: commit action insertions together
KMSAN: uninit-value in search_by_key 1549 339d 390d 334d 4443390e08d3 reiserfs: Initialize inode keys properly
INFO: task hung in ubi_detach_mtd_dev syz error error 4 514d 601d 334d d005f8c6588e ubi: check kthread_should_stop() after the setting of task state
bpf-next test error: BUG: program execution failed: executor 0: exit status 67 12 366d 366d 334d d25e2e9388ed netfilter: restore NF_INET_NUMHOOKS
KMSAN: uninit-value in f2fs_lookup 17 346d 387d 334d 6d7ab88a98c1 f2fs: fix uninit-value in f2fs_lookup
INFO: rcu detected stall in exit_group C done done 1 372d 401d 334d 1d0e850a49a5 afs: Fix cell removal
KASAN: slab-out-of-bounds Read in ntfs_attr_find C done 9 368d 1293d 334d 4f8c94022f0b ntfs: add check for mft record size in superblock
KASAN: slab-out-of-bounds Read in strset_parse_request C error 141 373d 373d 334d db972e532518 ethtool: strset: allow ETHTOOL_A_STRSET_COUNTS_ONLY attr
WARNING in arch_install_hw_breakpoint C inconclusive done 8 821d 938d 334d e898e69d6b94 x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error
KASAN: stack-out-of-bounds Read in xfrm_selector_match (2) 1 392d 390d 334d e94ee171349d xfrm: Use correct address family in xfrm_state_find
KASAN: use-after-free Read in tipc_mcast_xmit (2) C done 37 366d 379d 334d ed42989eab57 tipc: fix the skb_unshare() in tipc_buf_append()
KASAN: use-after-free Read in tipc_bcast_get_mode 1 440d 439d 334d fdeba99b1e58 tipc: fix use-after-free in tipc_bcast_get_mode
INFO: task hung in flush_to_ldisc C inconclusive done 15 611d 680d 334d e8c75a30a23c vt: selection, push sel_lock up
KASAN: use-after-free Write in io_wq_worker_running C error 14 377d 404d 334d c4068bf898dd io-wq: fix use-after-free in io_wq_worker_running
KASAN: slab-out-of-bounds Read in soft_cursor C done 218 373d 682d 334d 988d0763361b vt_ioctl: make VT_RESIZEX behave like VT_RESIZE
BUG: unable to handle kernel paging request in tcf_action_dump_terse C done 15 378d 384d 334d 580e4273d7a8 net_sched: check error pointer in tcf_dump_walker()
INFO: rcu detected stall in sys_mount (5) C done done 10 381d 402d 334d 1d0e850a49a5 afs: Fix cell removal
general protection fault in qp_release_pages C done 2 370d 370d 334d 90ca6333fd65 VMCI: check return value of get_user_pages_fast() for errors
INFO: task hung in lock_sock_nested (3) C done 5 378d 379d 334d d9fb8c507d42 mptcp: fix infinite loop on recvmsg()/worker() race.
KMSAN: uninit-value in __fget_light (2) C 18 351d 361d 334d d5e4d0a5e692 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
WARNING in ati_remote_sendpacket/usb_submit_urb C 22 505d 816d 334d a8be80053ea7 media: ati_remote: sanity check for both endpoints
KASAN: stack-out-of-bounds Read in csd_lock_record C 226 465d 470d 334d 35feb60474bf kernel/smp: Provide CSD lock timeout diagnostics
KASAN: use-after-free Read in afs_deactivate_cell (2) C done 11 372d 390d 334d 1d0e850a49a5 afs: Fix cell removal
possible deadlock in mnt_want_write C done done 662 374d 1181d 334d 146d62e5a586 ovl: detect overlapping layers
general protection fault in ieee80211_key_free C done 3 370d 374d 334d 3dc289f8f139 net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key()
general protection fault in __do_sys_io_uring_register 80 361d 367d 334d 55cbc2564ab2 io_uring: fix error path cleanup in io_sqe_files_register()
KASAN: use-after-free Write in vcs_read C done 11 417d 422d 334d 52c3c3a59234 Revert "vc_screen: extract vcs_read_buf_header"
WARNING in irqentry_exit C error done 2080 369d 436d 334d 4d004099a668 lockdep: Fix lockdep recursion
INFO: rcu detected stall in sys_newlstat C error done 1 389d 387d 334d 1d0e850a49a5 afs: Fix cell removal
kernel BUG at net/rxrpc/conn_object.c:LINE! C done 855 337d 402d 334d 546a42410bf7 rxrpc: Fix conn bundle leak in net-namespace exit
possible deadlock in dev_uc_sync C done 3 370d 467d 334d 0e8b8d6a2d85 net: core: use list_del_init() instead of list_del() in netdev_run_todo()
WARNING in wp_page_copy syz done done 9 607d 684d 334d c3e5ea6ee574 mm: avoid data corruption on CoW fault into PFN-mapped VMA
general protection fault in vmk80xx_write_packet C 82 374d 830d 334d e1f13c879a7c staging: comedi: check validity of wMaxPacketSize of usb endpoints found
general protection fault in rt6_fill_node C done done 3 419d 416d 334d eeaac3634ee0 net: nexthop: don't allow empty NHA_GROUP
KASAN: use-after-free Read in afs_manage_cell 5 376d 390d 334d 1d0e850a49a5 afs: Fix cell removal
KMSAN: uninit-value in do_ip_vs_set_ctl C 365 339d 1128d 334d c5a8a8498eed ipvs: Fix uninit-value in do_ip_vs_set_ctl()
memory leak in __team_options_register C 1 404d 404d 334d 9a9e77495958 net: team: fix memory leak in __team_options_register
general protection fault in nexthop_is_blackhole C done done 1 419d 416d 334d eeaac3634ee0 net: nexthop: don't allow empty NHA_GROUP
KASAN: use-after-free Read in ucma_close (2) syz done 1 401d 401d 334d f5449e74802c RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
UBSAN: array-index-out-of-bounds in ieee80211_del_key C done 685 344d 387d 334d 3dc289f8f139 net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key()
INFO: task hung in htable_put C done done 29 607d 660d 334d 99b79c3900d4 netfilter: xt_hashlimit: unregister proc file before releasing mutex
KASAN: use-after-free Write in xp_put_pool C done 50 387d 410d 334d 83cf5c68d663 xsk: Fix use-after-free in failed shared_umem bind
KASAN: use-after-free Read in __cfg8NUM_wpan_dev_from_attrs (2) C error done 5 468d 468d 334d bf64ff4c2aac genetlink: get rid of family->attrbuf
kernel panic: System is deadlocked on memory C done 43 461d 459d 334d 9066e5cfb73c mm, oom: make the calculation of oom badness more accurate
general protection fault in strncasecmp C done 1 389d 387d 334d 92e3cc91d8f5 afs: Fix rapid cell addition/removal by not using RCU on cells tree
KASAN: slab-out-of-bounds Read in f2fs_build_segment_manager C error 2 387d 386d 334d 3a22e9ac7158 f2fs: fix to do sanity check on segment/section count
KMSAN: uninit-value in udf_get_pblock_spar15 1 390d 387d 334d 44ac6b829c4e udf: Limit sparing table size
WARNING: refcount bug in l2cap_chan_put C inconclusive done 13 437d 601d 334d b83764f9220a Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
KASAN: use-after-free Write in afs_deactivate_cell 4 368d 387d 334d 1d0e850a49a5 afs: Fix cell removal
WARNING: proc registration bug in afs_manage_cell C done 1 388d 384d 334d 1d0e850a49a5 afs: Fix cell removal
INFO: trying to register non-static key in exfat_cache_inval_inode C done 4 377d 384d 334d 8ff006e57ad3 exfat: fix use of uninitialized spinlock on error path
WARNING in nla_get_range_unsigned C done 63 409d 411d 334d c30a3c957c88 netlink: policy: correct validation type check
KASAN: use-after-free Read in bit_putcs C 12 381d 601d 334d 988d0763361b vt_ioctl: make VT_RESIZEX behave like VT_RESIZE
BUG: using smp_processor_id() in preemptible code in tipc_crypto_xmit C done done 468 407d 477d 334d bb8872a1e6bc tipc: fix using smp_processor_id() in preemptible
general protection fault in xsk_is_setup_for_bpf_map C error 294 387d 410d 334d 968be23ceaca xsk: Fix possible segfault at xskmap entry insertion
KMSAN: uninit-value in udf_evict_inode 159 339d 387d 334d 044e2e26f214 udf: Avoid accessing uninitialized data on failed inode read
inconsistent lock state in io_uring_add_task_file 1 373d 373d 334d ce765372bc44 io_uring: Fix use of XArray in __io_uring_files_cancel
memory leak in read_adv_mon_features C 2 404d 427d 334d cafd472a10ff Bluetooth: Fix memory leak in read_adv_mon_features()
INFO: trying to register non-static key in del_timer_sync (2) C 1206 866d 918d 334d 621a3a8b1c0e mwifiex: don't call del_timer_sync() on uninitialized timer
inconsistent lock state in icmp_send syz done done 1 542d 1039d 334d 1378817486d6 tipc: block BH before using dst_cache
INFO: task can't die in rtnetlink_rcv_msg 5 374d 383d 334d 0fedc63fadf0 net_sched: commit action insertions together
BUG: unable to handle kernel paging request in pvclock_gtod_notify C done done 8 380d 399d 334d a49145acfb97 fbmem: add margin check to fb_check_caps()
INFO: trying to register non-static key in uhid_dev_destroy C unreliable done 40 417d 589d 334d bce1305c0ece HID: core: Correctly handle ReportSize being zero
WARNING in bpf_raw_tp_link_fill_link_info C error 56 387d 401d 334d b474959d5afd bpf: Fix a buffer out-of-bound access when filling raw_tp link_info
KMSAN: uninit-value in qtree_entry_unused 396 339d 390d 334d 3d3dc274ce73 quota: clear padding in v2r1_mem2diskdqb()
KASAN: use-after-free Write in rxrpc_put_bundle C done 229 372d 395d 334d f3af4ad1e08a rxrpc: Fix bundle counting for exclusive connections
KASAN: use-after-free Read in tcf_action_destroy C done 8 376d 391d 334d 0fedc63fadf0 net_sched: commit action insertions together
memory leak in xdp_umem_create C 17 338d 358d 334d e5e1a4bc916d xsk: Fix possible memory leak at socket close
general protection fault in xsk_diag_dump (2) C 354 391d 410d 334d 53ea2076d851 xsk: Fix possible segfault in xsk umem diagnostics
INFO: rcu detected stall in security_file_open (3) C done done 2 382d 381d 334d 1d0e850a49a5 afs: Fix cell removal
general protection fault in tcf_action_destroy (2) C done done 29 372d 585d 334d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
KASAN: global-out-of-bounds Read in fbcon_get_font C inconclusive inconclusive 41 380d 677d 334d 5af08640795b fbcon: Fix global-out-of-bounds read in fbcon_get_font()
WARNING: suspicious RCU usage in ctrl_cmd_new_lookup C done done 10 389d 479d 334d a7809ff90ce6 net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
general protection fault in io_poll_double_wake (2) C error 2 384d 384d 360d 8706e04ed7d6 io_uring: always delete double poll wait entry on match
possible deadlock in io_write 2 381d 384d 360d fad8e0de4426 io_uring: fix potential ABBA deadlock in ->show_fdinfo()
kernel BUG at lib/string.c:LINE! (5) C done 558 388d 396d 367d 35be8851d172 btrfs: fix overflow when copying corrupt csums for a message
general protection fault in madvise_cold_or_pageout_pte_range C done 3 387d 397d 369d ce2684254bd4 mm: validate pmd after splitting
KASAN: global-out-of-bounds Read in fbcon_resize C error 673 391d 423d 372d ec0972adecb3 fbcon: Fix user font detection test at fbcon_resize().
WARNING: suspicious RCU usage in fib6_del (2) 1 404d 404d 372d 843d926b003e ipv6: avoid lockdep issue in fib6_del()
KASAN: use-after-free Read in ieee8NUM_tx 1 405d 405d 372d 0ff4628f4c6c mac802154: tx: fix use-after-free
general protection fault in wg_index_hashtable_replace 2 393d 404d 372d 9179ba31367b wireguard: noise: take lock when removing handshake entry from table
memory leak in do_seccomp C 6 404d 431d 372d a566a9012acd seccomp: don't leak memory when filter install races
inconsistent lock state in padata_do_parallel 9 390d 410d 372d 1b0df11fde0f padata: fix possible padata_works_lock deadlock
KASAN: use-after-free Write in skb_queue_tail 1 403d 403d 372d 3ca1a42a52ca net: qrtr: check skb_put_padto() return value
possible deadlock in peernet2id_alloc 12 403d 574d 372d e1f469cd5866 Revert "netns: don't disable BHs when locking "nsid_lock""
KMSAN: uninit-value in __inet_diag_dump C 37 373d 391d 372d d5e4d0a5e692 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
memory leak in do_eventfd C 2 418d 514d 372d f65886606c2d KVM: fix memory leak in kvm_io_bus_unregister_dev()
KASAN: slab-out-of-bounds Read in read_descriptors (2) 1 422d 418d 372d a18cd6c9b6bc usb: core: fix slab-out-of-bounds Read in read_descriptors
INFO: rcu detected stall in cleanup_net (4) C done 5 407d 403d 372d b5b73b26b3ca taprio: Fix allowing too small intervals
KASAN: slab-out-of-bounds Read in fbcon_scrolldelta 1 398d 397d 372d 50145474f6ef fbcon: remove soft scrollback code
INFO: task hung in tcf_ife_init C done 4 404d 409d 372d cc8e58f8325c act_ife: load meta modules before tcf_idr_check_alloc()
KASAN: slab-out-of-bounds Read in prism2sta_probe_usb C 8 412d 443d 372d fea22e159d51 staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb()
KMSAN: uninit-value in inet_diag_cmd_exact C 31 373d 385d 372d d5e4d0a5e692 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
KASAN: global-out-of-bounds Read in vga16fb_imageblit C done 1071 399d 683d 372d bd018a6a75ce video: fbdev: fix OOB read in vga_8planes_imageblit()
memory leak in tipc_group_create_member C 32 399d 807d 372d bb3a420d47ab tipc: Fix memory leak in tipc_group_create_member()
general protection fault in free_netdev C error done 3605 448d 482d 380d 46ef5b89ec0e ip6_gre: fix null-ptr-deref in ip6gre_init_net()
KASAN: use-after-free Write in page_counter_uncharge 2 419d 424d 380d f1796544a0ca memcg: fix use-after-free in uncharge_batch
KASAN: use-after-free Write in page_counter_cancel 1 428d 424d 380d f1796544a0ca memcg: fix use-after-free in uncharge_batch
KASAN: use-after-free Read in do_madvise syz error 4 420d 421d 380d 7867fd7cc44e mm: madvise: fix vma user-after-free
KMSAN: kernel-infoleak in move_addr_to_user (3) C 79 395d 429d 383d 38ba8b9241f5 can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
KASAN: slab-out-of-bounds Write in hiddev_ioctl_usage C 279 414d 757d 387d 25a097f52046 HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage()
WARNING: refcount bug in red_destroy C done 1 418d 416d 387d 5438dd45831e net_sched: fix error path in red_init()
WARNING in slab_pre_alloc_hook C 210 412d 432d 387d f176ede3a3bd USB: yurex: Fix bad gfp argument
WARNING: refcount bug in smc_release (3) 1 415d 404d 387d 5fb8642a17aa net/smc: fix sock refcounting in case of termination
INFO: rcu detected stall in ext4_file_write_iter C inconclusive done 93 431d 964d 387d 7e24969022cb block: allow for_each_bvec to support zero len bvec
WARNING: refcount bug in qdisc_put (2) C done 7 417d 416d 387d 5438dd45831e net_sched: fix error path in red_init()
BUG: corrupted list in mousedev_release syz done 5 410d 412d 387d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in snd_pcm_oss_release 1 416d 415d 387d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
possible deadlock in __lock_task_sighand C done 12 411d 413d 387d fd7d6de22414 io_uring: don't recurse on tsk->sighand->siglock with signalfd
WARNING in snd_pcm_plugin_build_mulaw C done 4 413d 410d 387d 949a1ebe8cea ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
general protection fault in snd_ctl_release syz done 4 409d 410d 387d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
KMSAN: uninit-value in batadv_tt_hash_find 11 402d 459d 387d 303216e76dca batman-adv: Avoid uninitialized chaddr when handling DHCP
KASAN: global-out-of-bounds Read in bit_putcs C done 262 388d 681d 387d 39b3cffb8cf3 fbcon: prevent user font height or width change from causing potential out-of-bounds access bc5269ca7650 vt_ioctl: change VT_RESIZEX ioctl to check for error return from vc_resize()
KASAN: use-after-free Read in fbcon_cursor syz done error 10 427d 671d 387d f8d1653daec0 vt: defer kfree() of vc_screenbuf in vc_do_resize()
KASAN: use-after-free Read in rc_dev_uevent 1 436d 436d 387d 4f0835d6677d media: rc: uevent sysfs file races with rc_unregister_device()
upstream boot error: KASAN: global-out-of-bounds Read in internal_create_group 273 418d 431d 387d 62c789270c0b libnvdimm: KASAN: global-out-of-bounds Read in internal_create_group
KMSAN: uninit-value in video_usercopy C 28 452d 452d 387d 4ffb879ea648 media: media/v4l2-core: Fix kernel-infoleak in video_put_user()
INFO: task hung in nbd_ioctl (2) 37 414d 467d 387d 2a63866c8b51 tipc: fix shutdown() of connectionless socket
WARNING in restore_regulatory_settings C done 10414 405d 649d 387d 47caf685a685 cfg80211: regulatory: reject invalid hints
INFO: task hung in pipe_release (2) syz done 3 409d 440d 387d 7e24969022cb block: allow for_each_bvec to support zero len bvec
KMSAN: kernel-infoleak in raw_ioctl C 22 409d 433d 387d a092b7233f0e net: usb: Fix uninit-was-stored issue in asix_read_phy_addr()
KASAN: use-after-free Read in bdev_del_partition C done 1 411d 411d 387d 08fc1ab6d748 block: fix locking in bdev_del_partition
KASAN: vmalloc-out-of-bounds Write in bitfill_aligned C 475 447d 682d 390d 033724d68642 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
BUG: unable to handle kernel paging request in vmx_vcpu_run C error error 194 1170d 1284d 391d kvm: vmx: Nested VM-entry prereqs for event inj.
possible deadlock in __io_queue_deferred C error 1 434d 432d 395d 7271ef3a93a8 io_uring: fix recursive completion locking on oveflow flush
kernel BUG at mm/hugetlb.c:LINE! C done error 10 446d 559d 395d 15568299b7d9 hugetlbfs: prevent filesystem stacking of hugetlbfs
WARNING in r871xu_dev_remove C 47375 434d 786d 395d b4383c971bc5 staging: rtl8712: handle firmware load failure
WARNING in ptrace_stop C done 1413 446d 450d 395d d136122f5845 sched: Fix race against ptrace_freeze_trace()
general protection fault in do_con_write C done 10703 447d 683d 395d ce684552a266 vt: Reject zero-sized screen buffer size.
general protection fault in __btf_resolve_helper_id C 17 460d 468d 395d 5b801dfb7feb bpf: Fix NULL pointer dereference in __btf_resolve_helper_id()
KASAN: use-after-free Read in line6_submit_audio_in_all_urbs 2 463d 477d 395d 68359a1ad844 ALSA: line6: Sync the pending work cancel at disconnection
INFO: task hung in ovs_exit_net 65 448d 451d 395d a65878d6f00b net: openvswitch: fixes potential deadlock in dp cleanup code
memory leak in erase_aeb (2) syz 25 454d 523d 395d 3b185255bb2f ubi: fastmap: Don't produce the initial next anchor PEB when fastmap is disabled
KASAN: use-after-free Write in __linkwatch_run_queue C error 24 450d 451d 395d c75d1d5248c0 bonding: check return value of register_netdevice() in bond_newlink()
WARNING in fat12_ent_blocknr 2 439d 463d 395d a090a5a7d73f fat: fix fat_ra_init() for data clusters == 0
general protection fault in x86_fsgsbase_read_task C done 2 429d 429d 395d 8ab49526b53d x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task
WARNING in __kernel_read C done 60 402d 461d 395d a39c46067c84 net/9p: validate fds in p9_fd_open
WARNING in inc_nlink C done 26 461d 564d 395d facb03dddec0 fs/minix: don't allow getting deleted inodes
KASAN: use-after-free Read in delete_and_unsubscribe_port (2) syz done 4 439d 464d 395d 80982c7e834e ALSA: seq: oss: Serialize ioctls
KASAN: use-after-free Write in addr_resolve 1 496d 493d 395d f6a9d47ae685 RDMA/cma: Execute rdma_cm destruction from a handler properly
general protection fault in cdev_del C 315 405d 872d 395d e911e99a0770 usb: hso: check for return value in hso_serial_common_create()
general protection fault in afs_dynroot_depopulate 1 423d 422d 395d 5e0b17b026eb afs: Fix NULL deref in afs_dynroot_depopulate()
KASAN: use-after-free Read in sock_def_write_space (2) C error 29 395d 453d 395d af9f691f0f5b qrtr: orphan socket in qrtr_release()
kernel BUG at mm/khugepaged.c:LINE! C done 30 422d 433d 395d f3f99d63a815 khugepaged: adjust VM_BUG_ON_MM() in __khugepaged_enter()
possible deadlock in shmem_fallocate (4) C done 81 445d 660d 395d 3e338d3c95c7 staging: android: ashmem: Fix lockdep warning for write operation
BUG: unable to handle kernel NULL pointer dereference in loop_rw_iter C done 24 421d 432d 395d 2dd2111d0d38 io_uring: Fix NULL pointer dereference in loop_rw_iter()
kernel BUG at net/rxrpc/recvmsg.c:LINE! C error 10 441d 470d 395d 65550098c1c4 rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
KASAN: use-after-free Read in addr_handler (2) 2 450d 493d 395d f6a9d47ae685 RDMA/cma: Execute rdma_cm destruction from a handler properly
KASAN: use-after-free Read in io_async_task_func syz error 1 432d 432d 395d 6d816e088c35 io_uring: hold 'ctx' reference around task_work queue + execute
WARNING in idr_alloc C done 65 404d 479d 395d 8dfddfb79653 net: qrtr: fix usage of idr in port assignment to socket
WARNING in drop_nlink C done error 1 542d 538d 395d facb03dddec0 fs/minix: don't allow getting deleted inodes
KASAN: slab-out-of-bounds Read in vc_do_resize C done 55 432d 668d 395d d88ca7e1a27e fbmem: pull fbcon_update_vcs() out of fb_set_var()
general protection fault in fib_dump_info (2) C done 16 419d 421d 395d eeaac3634ee0 net: nexthop: don't allow empty NHA_GROUP
KASAN: slab-out-of-bounds Read in vsscanf (2) C error 5 438d 451d 395d a6bd4f6d9b07 Smack: fix another vsscanf out of bounds
KMSAN: uninit-value in netlink_policy_dump_start C 31 400d 404d 395d d1fb55592909 netlink: fix state reallocation in policy export
possible deadlock in uprobe_clear_state (2) 1 462d 458d 395d f867c771f988 binder: Don't use mmput() from shrinker function.
KASAN: null-ptr-deref Write in media_request_close C done 17 438d 486d 395d e30cc79cc80f media: media-request: Fix crash if memory allocation fails
KASAN: use-after-free Read in devlink_health_reporter_destroy C error 1188 459d 460d 395d 5d037b4d3df7 devlink: Fix use-after-free when destroying health reporters
kernel BUG at net/core/dev.c:LINE! (3) C done 979 409d 554d 395d 832707021666 bonding: fix a potential double-unregister
KASAN: use-after-free Read in ceph_mdsc_destroy 4 435d 451d 395d a7caa88f8b72 ceph: fix use-after-free for fsc->mdsc
KASAN: use-after-free Read in path_init (2) C done 29 429d 431d 395d 24fb33d40d60 fix breakage in do_rmdir()
WARNING in __kernel_write C done 522 444d 464d 395d a39c46067c84 net/9p: validate fds in p9_fd_open
KMSAN: uninit-value in get_block C 13 511d 514d 395d 270ef41094e9 fs/minix: reject too-large maximum file size
WARNING: suspicious RCU usage in ovs_flow_tbl_masks_cache_size C done 4093 436d 438d 395d fea07a487c6d net: openvswitch: silence suspicious RCU usage warning
WARNING in submit_rx_urb/usb_submit_urb C 397 447d 871d 395d faaff9765664 staging: wlan-ng: properly check endpoint types
WARNING in ib_unregister_device_queued 2 527d 538d 395d 0cb42c026583 RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued()
KASAN: use-after-free Read in get_block C done 23 461d 538d 395d 270ef41094e9 fs/minix: reject too-large maximum file size
WARNING in idtentry_exit_cond_rcu syz 6 469d 465d 395d bce9b042ec73 x86/traps: Disable interrupts in exc_aligment_check()
INFO: task hung in ovs_dp_masks_rebalance 771 408d 451d 395d a65878d6f00b net: openvswitch: fixes potential deadlock in dp cleanup code
memory leak in nf_tables_addchain C 1 434d 431d 395d 59136aa3b264 netfilter: nf_tables: free chain context when BINDING flag is missing
KASAN: null-ptr-deref Write in get_block C done 101 461d 574d 395d da27e0a0e5f6 fs/minix: check return value of sb_getblk()
WARNING: suspicious RCU usage in tipc_l2_send_msg syz done 60 419d 477d 395d f6db90964162 tipc: call rcu_read_lock() in tipc_aead_encrypt_done()
WARNING in compat_do_ebt_get_ctl C done 15 425d 436d 395d 5c04da55c754 netfilter: ebtables: reject bogus getopt len value
memory leak in io_submit_sqes C 2 412d 431d 395d a36da65c4656 io_uring: fail poll arm on queue proc failure
WARNING in __nf_unregister_net_hook (2) C done 9 461d 460d 395d 1e9451cbda45 netfilter: nf_tables: fix nat hook table deletion
KCSAN: data-race in page_counter_try_charge / page_counter_try_charge (2) 148 430d 674d 395d 6e4bd50f3888 mm/page_counter: fix various data races at memsw
KASAN: use-after-free Read in j1939_tp_txtimer C done error 5 462d 660d 395d cd3b3636c99f can: j1939: transport: j1939_session_tx_dat(): fix use-after-free read in j1939_tp_txtimer()
KASAN: use-after-free Write in get_block C inconclusive inconclusive 12 477d 527d 395d 270ef41094e9 fs/minix: reject too-large maximum file size
KASAN: use-after-free Read in l2cap_chan_close C done 37 437d 617d 395d f9c70bdc279b Bluetooth: add a mutex lock to avoid UAF in do_enale_set
KASAN: use-after-free Read in ax88172a_unbind C done 2723 447d 687d 395d c28d9a285668 ax88172a: fix ax88172a_unbind() failures
linux-next boot error: WARNING in mem_cgroup_css_alloc 6 429d 429d 395d 9f457179244a mm: memcontrol: fix warning when allocating the root cgroup
KCSAN: data-race in vm_area_dup / vma_interval_tree_remove (2) 70 489d 603d 395d cda099b37d71 fork: Annotate a data race in vm_area_dup()
general protection fault in vsock_poll syz done 15 440d 452d 395d 1980c0584483 vsock: fix potential null pointer dereference in vsock_poll()
BUG: corrupted list in p9_read_work (2) syz done error 38 697d 1059d 395d 74d6a5d56629 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work
general protection fault in io_poll_double_wake C done 8 399d 427d 395d d4e7cd36a90e io_uring: sanitize double poll handling
KMSAN: uninit-value in geneve_xmit C 163 399d 452d 395d 32818c075c54 geneve: fix an uninitialized value in geneve_changelink()
general protection fault in syscall_return_slowpath syz inconclusive done 1 501d 588d 395d 033724d68642 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
KMSAN: uninit-value in ax25_connect C 15 403d 536d 395d 2f2a7ffad5c6 AX.25: Fix out-of-bounds read in ax25_connect()
general protection fault in j1939_netdev_start C done 8 448d 599d 395d af804b782635 can: j1939: socket: j1939_sk_bind(): make sure ml_priv is allocated
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt C 16 438d 466d 395d 51c19bf3d5cf Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
KASAN: wild-memory-access Read in rawv6_setsockopt 2 436d 436d 395d 519a8a6cf91d net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
KASAN: out-of-bounds Read in pebs_update_state syz inconclusive done 1 472d 520d 395d 033724d68642 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
WARNING in submit_audio_out_urb/usb_submit_urb syz 2 465d 464d 395d 6e8a914ad619 ALSA: line6: Perform sanity check for each URB creation
KASAN: use-after-free Read in lockref_get 7 499d 599d 395d bad8e64fb19d blktrace: fix debugfs use after free
KASAN: use-after-free Read in io_uring_setup (2) 1 443d 443d 395d d1719f70d0a5 io_uring: don't touch 'ctx' after installing file descriptor
KASAN: use-after-free Read in __xfrm6_tunnel_spi_lookup C error 12 453d 458d 395d 8b404f46dd6a xfrm: interface: not xfrmi_ipv6/ipip_handler twice
general protection fault in khugepaged C done 3 452d 465d 395d 594cced14ad3 khugepaged: fix null-pointer dereference due to race
KASAN: invalid-free in snd_seq_port_disconnect syz done 9 439d 444d 395d 80982c7e834e ALSA: seq: oss: Serialize ioctls
KASAN: slab-out-of-bounds Write in sctp_setsockopt C error 590 446d 451d 395d dfd3d5266dc1 sctp: fix slab-out-of-bounds in SCTP_DELAYED_SACK processing
possible deadlock in io_timeout_fn C done 4 430d 432d 395d 51a4cc112c7a io_uring: defer file table grabbing request cleanup for locked requests
KMSAN: uninit-value in ucma_connect C 138 400d 452d 395d 31142a4ba617 RDMA/cm: Add min length checks to user structure copies
WARNING in snd_usbmidi_submit_urb/usb_submit_urb C done 42 478d 503d 395d 9b7e5208a941 ALSA: usb-audio: Fix race against the error recovery URB submission
WARNING in snd_info_get_line C done 36 451d 457d 395d 60379ba08532 ALSA: info: Drop WARN_ON() from buffer NULL sanity check
WARNING: suspicious RCU usage in ovs_flow_tbl_destroy C done 658 436d 438d 395d fea07a487c6d net: openvswitch: silence suspicious RCU usage warning
INFO: task hung in __do_sys_reboot 1554 412d 467d 395d b292b50b0efc driver core: Fix probe_count imbalance in really_probe()
INFO: trying to register non-static key in red_destroy C error 318 446d 468d 395d 608b4adab178 net_sched: initialize timer earlier in red_init()
general protection fault in go7007_usb_probe C 2103 435d 543d 395d 137641287eb4 go7007: add sanity checking for endpoints
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt C error 9 440d 460d 395d 629b49c848ee Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
KMSAN: uninit-value in __tipc_nl_compat_dumpit (3) C 6181 396d 460d 395d 47733f9daf4f tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
KASAN: wild-memory-access Read in ip_setsockopt C 2 429d 429d 395d 519a8a6cf91d net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
WARNING: suspicious RCU usage in bond_ipsec_add_sa 214 396d 467d 395d f548a476268d bonding: don't need RTNL for ipsec helpers
KASAN: wild-memory-access Read in sctp_setsockopt C 2 429d 429d 395d 519a8a6cf91d net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
KMSAN: uninit-value in xa_load C 208 396d 452d 395d 31142a4ba617 RDMA/cm: Add min length checks to user structure copies
WARNING in vkms_vblank_simulate C done 12903 401d 978d 395d 51f644b40b4b drm/atomic-helper: reset vblank on crtc reset
WARNING in snd_usbmidi_input_start/usb_submit_urb C done 231 455d 498d 395d 9b7e5208a941 ALSA: usb-audio: Fix race against the error recovery URB submission
KASAN: use-after-free Read in smk_write_relabel_self C done 2 499d 495d 395d beb4ee6770a8 Smack: fix use-after-free in smk_write_relabel_self()
possible deadlock in pipe_lock (3) C inconclusive done 4 623d 660d 424d 1a980b8cbf00 ovl: add splice file read write helper
possible deadlock in dev_mc_unsync C error done 78 462d 477d 424d be74294ffa24 net: get rid of lockdep_set_class_and_subclass()
possible deadlock in lock_trace (3) syz inconclusive done 69 563d 697d 424d 2db9dbf71bf9 proc: Use new infrastructure to fix deadlocks in execve
possible deadlock in do_io_accounting (3) C inconclusive done 39 570d 660d 424d 76518d379885 proc: io_accounting: Use new infrastructure to fix deadlocks in execve
possible deadlock in proc_pid_personality syz inconclusive done 3 579d 589d 424d 2db9dbf71bf9 proc: Use new infrastructure to fix deadlocks in execve
WARNING: bad unlock balance in rcu_lock_release C inconclusive done 1433 565d 846d 424d 10476e630422 locking/lockdep: Fix bad recursion pattern
WARNING in hsr_addr_subst_dest C done done 8639 561d 1018d 424d 4b793acdca00 hsr: use netdev_err() instead of WARN_ONCE()
WARNING: locking bug in try_to_grab_pending syz error done 1 514d 976d 424d 1378817486d6 tipc: block BH before using dst_cache
KASAN: stack-out-of-bounds Read in update_stack_state C unreliable done 388 639d 1333d 424d init, tracing: Add initcall trace events
WARNING: bad unlock balance in rcu_core C inconclusive done 3578 561d 917d 424d 10476e630422 locking/lockdep: Fix bad recursion pattern
general protection fault in qrtr_endpoint_post C done done 54 462d 480d 431d 8ff41cc21714 net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
invalid opcode in __phys_addr (2) 1 475d 475d 438d c4e8fa9074ad netfilter: ipset: call ip_set_free() instead of kfree()
PANIC: double fault in fixup_bad_iret C error 11753 465d 505d 442d 5144f8a8dfd7 compiler_types.h: Add __no_sanitize_{address,undefined} to noinstr
general protection fault in __apic_accept_irq (2) C done 9 478d 474d 442d 9d3c447c72fb KVM: X86: Fix async pf caused null-ptr-deref
KCSAN: data-race in copy_process / release_task 154 471d 600d 442d c17d1a3a8ee4 fork: annotate data race in copy_process()
KASAN: use-after-free Read in dmabuffs_dname 1 593d 589d 442d 4ab59c3c638c dma-buf: Move dma_buf_release() from fops to dentry_ops
WARNING in enqueue_task_dl C done 13 486d 1063d 442d 740797ce3a12 sched/core: Fix PI boosting between RT and DEADLINE tasks
KCSAN: data-race in copy_process / copy_process (2) 294 472d 649d 442d c17d1a3a8ee4 fork: annotate data race in copy_process()
PANIC: double fault in check_preemption_disabled C 2181 473d 478d 442d c7aadc09321d x86/entry: Increase entry_stack size to a full page
memory leak in nbd_add_socket C 1 564d 564d 442d 579dd91ab3a5 nbd: Fix memory leak in nbd_add_socket
WARNING in xfrm_policy_insert C inconclusive done 6 488d 1341d 445d ed17b8d377ea xfrm: fix a warning in xfrm_policy_insert_list
BUG: unable to handle kernel paging request in netif_receive_generic_xdp C done done 160 500d 636d 446d 96aa1b22bd6b tun: correct header offsets in napi frags mode
WARNING in iomap_apply C done 25 514d 554d 453d 175efa81feb8 ext4: fix EXT4_MAX_LOGICAL_BLOCK macro ext4: fix EXT4_MAX_LOGICAL_BLOCK macro
KASAN: use-after-free Read in sock_def_write_space C done 67 454d 819d 454d a9b111016235 llc: make sure applications use ARPHRD_ETHER
KASAN: slab-out-of-bounds Read in qrtr_endpoint_post C 8 476d 476d 454d 8ff41cc21714 net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
memory leak in qdisc_create_dflt C 1 472d 468d 454d 306381aec7c2 net_sched: fix a memory leak in atm_tc_init()
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu 1 474d 474d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
WARNING in hsr_dev_finalize C error 1546 462d 477d 454d ccfc9df1352b hsr: fix interface leak in error path of hsr_dev_finalize()
kernel BUG at net/l2tp/l2tp_core.c:LINE! C 10 478d 474d 454d c9a368f1c0fb bpf: net: Avoid incorrect bpf_sk_reuseport_detach call
KASAN: vmalloc-out-of-bounds Read in tipc_nl_publ_dump C 22 459d 477d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu C error 17 463d 474d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in nl8NUM_dump_wpan_phy (2) C 18 464d 477d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
possible deadlock in dev_uc_sync_multiple (2) 26 464d 475d 454d be74294ffa24 net: get rid of lockdep_set_class_and_subclass()
KASAN: vmalloc-out-of-bounds Read in __nla_validate_parse 7 460d 477d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_publ_dump (2) C 14 463d 474d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_node_dump_monitor_peer (2) C 54 462d 477d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_udp_nl_dump_remoteip (2) C 9 462d 481d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in devlink_get_from_attrs C 25 462d 474d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
WARNING in warn_bad_map 1 485d 481d 454d 9c29e3615274 mptcp: fix DSS map generation on fin retransmission
KASAN: vmalloc-out-of-bounds Read in nl8NUM_dump_wpan_phy C 145 459d 480d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: vmalloc-out-of-bounds Read in __cfg8NUM_wpan_dev_from_attrs 4 462d 477d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_node_dump_link C error 10 468d 477d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name C 4 469d 474d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: vmalloc-out-of-bounds Read in tipc_nl_node_dump_monitor_peer C error 9 462d 480d 454d bf64ff4c2aac genetlink: get rid of family->attrbuf
BUG: unable to handle kernel NULL pointer dereference in tomoyo_domain_quota_is_ok (2) 7 478d 492d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in unpin_user_pages C done 13 514d 514d 456d f78cdbd75a57 rds: fix crash in rds_info_getsockopt()
KASAN: use-after-free Write in bpf_link_put 2 533d 534d 456d 138c67677ff5 bpf: Fix use-after-free of bpf_link when priming half-fails
KASAN: use-after-free Write in fsnotify_detach_connector_from_object C done 4 487d 491d 456d ef1548adada5 proc: Use new_inode not new_inode_pseudo
KASAN: use-after-free Read in ip_icmp_error C done 14 508d 508d 456d 239174945dac tcp: tcp_v4_err() icmp skb is named icmp_skb
BUG: unable to handle kernel NULL pointer dereference in schedule_timeout 1 477d 477d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Write in ath9k_htc_rx_msg C 93 492d 569d 456d e4ff08a4d727 ath9k: Fix use-after-free Write in ath9k_htc_rx_msg
BUG: using smp_processor_id() in preemptible [ADDR] code: syz-executor C done 22297 502d 840d 456d 1378817486d6 tipc: block BH before using dst_cache
KASAN: slab-out-of-bounds Read in vsscanf C done 61 466d 569d 456d 84e99e58e8d1 Smack: slab-out-of-bounds in vsscanf
KASAN: slab-out-of-bounds Read in ip_icmp_error C done 13 508d 508d 456d 239174945dac tcp: tcp_v4_err() icmp skb is named icmp_skb
WARNING: proc registration bug in snmp6_register_dev C done 14 484d 549d 456d de0083c7ed7d hsr: avoid to create proc file after unregister
KASAN: null-ptr-deref Write in choke_reset C done 1441 512d 546d 456d 8738c85c72b3 sch_choke: avoid potential panic in choke_reset()
KASAN: slab-out-of-bounds Write in snd_usb_mixer_notify_id C done 39 475d 480d 456d 220345e98f1c ALSA: usb-audio: Fix OOB access of mixer element list
BUG: unable to handle kernel NULL pointer dereference in number 1 486d 482d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Write in snd_usb_mixer_interrupt C done 5 478d 480d 456d 220345e98f1c ALSA: usb-audio: Fix OOB access of mixer element list
KASAN: use-after-free Read in vkms_dumb_create syz done 2 542d 538d 456d 0ea2ea42b31a drm/vkms: Hold gem object while still in-use
BUG: unable to handle kernel NULL pointer dereference in check_preemption_disabled (3) 3 486d 486d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Read in inet_diag_bc_sk C done 30 531d 533d 456d ee1bd483cc06 inet_diag: bc: read cgroup id only for full sockets
memory leak in ctnetlink_del_conntrack C 1 497d 494d 456d 6c2d2176a85e netfilter: ctnetlink: memleak in filter initialization error path
INFO: rcu detected stall in inet_sendmsg (2) 13 458d 542d 456d df4953e4e997 sch_sfq: validate silly quantum values
linux-next boot error: WARNING: suspicious RCU usage in ipmr_get_table 60 528d 537d 456d 7013908c2db2 ipmr: Add lockdep expression to ipmr_for_each_table macro
BUG: unable to handle kernel NULL pointer dereference in dev_ifconf 1 487d 487d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
BUG: using smp_processor_id() in preemptible [ADDR] code: /NUM 1 513d 513d 456d 1378817486d6 tipc: block BH before using dst_cache
BUG: MAX_LOCKDEP_CHAINS too low! C done 17240 456d 1115d 456d e7511f560f54 bonding: remove useless stats_lock_key 1a33e10e4a95 net: partially revert dynamic lockdep key changes
INFO: task hung in locks_remove_posix syz 2231 491d 514d 456d 187b96db5ca7 x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks
WARNING: refcount bug in crypto_mod_get C done 2 522d 533d 456d 6603523bf5e4 crypto: api - Fix use-after-free and race in crypto_spawn_alg
BUG: unable to handle kernel NULL pointer dereference in mpihelp_addmul_1 1 486d 486d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (3) 1 506d 506d 456d d9a81a225277 l2tp: add sk_family checks to l2tp_validate_socket
linux-next test error: BUG: using smp_processor_id() in preemptible [ADDR] code: syz-fuzzer/6792 1 501d 501d 456d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KCSAN: data-race in __fat_write_inode / fat12_ent_get 2 568d 561d 456d b1b65750b8db fat: don't allow to mount if the FAT length == 0
KASAN: stack-out-of-bounds Write in ath9k_hif_usb_rx_cb C 57 492d 565d 456d 19d6c375d671 ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb
KASAN: slab-out-of-bounds Read in ovl_check_fb_len syz done 3 513d 512d 456d 522f6e6cba68 ovl: fix out of bounds access warning in ovl_check_fb_len()
KASAN: use-after-free Read in usblp_bulk_read 7 466d 543d 456d 296a193b0612 usblp: poison URBs upon disconnect
BUG: unable to handle kernel NULL pointer dereference in alloc_pages_vma 1 486d 482d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
linux-next boot error: general protection fault in tomoyo_get_local_path 18 513d 519d 456d 9d78edeaec75 proc: proc_pid_ns takes super_block as an argument
KASAN: use-after-free Read in htc_connect_service C 41041 491d 569d 456d ced21a4c726b ath9k: Fix use-after-free Read in htc_connect_service
KMSAN: uninit-value in tbf_enqueue 21 456d 543d 456d 9274124f023b net: stricter validation of untrusted gso packets
general protection fault in ima_free_template_entry C done 3 479d 499d 456d 42413b49804b ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
WARNING in kvm_inject_emulated_page_fault C done 20 480d 499d 456d 7a35e515a705 KVM: VMX: Properly handle kvm_read/write_guest_virt*() result
general protection fault in kobject_get (2) 2 486d 515d 456d 11a0ae4c4bff RDMA: Allow ib_client's to fail when add() is called
general protection fault in fq_codel_enqueue C done 25 461d 545d 456d 9274124f023b net: stricter validation of untrusted gso packets
BUG: unable to handle kernel NULL pointer dereference in create_empty_buffers 1 498d 494d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
memory leak in crypto_create_tfm C 14 484d 501d 456d 819966c06b75 crypto: drbg - always try to free Jitter RNG instance
WARNING in memtype_reserve C done 600 517d 526d 456d a0e710a7def4 USB: usbfs: fix mmap dma mismatch
general protection fault in put_cmsg C done 3 522d 522d 456d 1b2f08df0a88 ipv6: set msg_control_is_user in do_ipv6_getsockopt
WARNING in usbhid_raw_request/usb_submit_urb (3) syz 18 535d 641d 456d ac854131d984 USB: core: Fix misleading driver bug report
memory leak in nf_tables_parse_netdev_hooks (3) C 1 497d 494d 456d 3003055f5066 netfilter: nf_tables: hook list memleak in flowtable deletion
general protection fault in proc_kill_sb 8 482d 493d 456d 058f2e4da79b proc: s_fs_info may be NULL when proc_kill_sb is called
INFO: trying to register non-static key in io_cqring_ev_posted (3) C done 3 515d 518d 456d 583863ed9181 io_uring: initialize ctx->sqo_wait earlier
BUG: unable to handle kernel paging request in do_xdp_generic C done done 7444 530d 637d 456d 96aa1b22bd6b tun: correct header offsets in napi frags mode
KASAN: slab-out-of-bounds Read in inet_diag_bc_sk C done 45 531d 533d 456d ee1bd483cc06 inet_diag: bc: read cgroup id only for full sockets
BUG: stack guard page was hit in deref_stack_reg 2 521d 581d 456d dd912306ff00 net: fix a potential recursive NETDEV_FEAT_CHANGE
INFO: task syz-executor can't die for more than 143 seconds. (2) C done 2512 457d 725d 456d 566d136289dc pipe: Fix pipe_full() test in opipe_prep().
BUG: unable to handle kernel NULL pointer dereference in debug_smp_processor_id (2) 3 478d 486d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
net-next test error: KASAN: use-after-free Write in afs_wake_up_async_call 60 478d 486d 456d 0041cd5a5044 rxrpc: Fix notification call on completion of discarded calls
BUG: unable to handle kernel NULL pointer dereference in net_rx_queue_update_kobjects 1 486d 486d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in erspan_validate C done 520 522d 529d 456d 51fa960d3b51 erspan: Check IFLA_GRE_ERSPAN_VER is set.
bpf test error: BUG: using smp_processor_id() in preemptible code in ext4_mb_new_blocks 48 486d 488d 456d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
kernel BUG at arch/x86/mm/physaddr.c:LINE! (5) C done 241 461d 534d 456d 57d38f26d81e vt: fix unicode console freeing with a common interface
WARNING: refcount bug in crypto_destroy_tfm C done 4 536d 558d 456d 6603523bf5e4 crypto: api - Fix use-after-free and race in crypto_spawn_alg
general protection fault in inet_unhash C done 40 478d 506d 456d 02c71b144c81 l2tp: do not use inet_hash()/inet_unhash()
BUG: unable to handle kernel NULL pointer dereference in direct_page_fault 1 486d 482d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
linux-next boot error: WARNING: suspicious RCU usage in bpq_device_event 6 519d 520d 456d 95f59bf88bb7 drivers: net: hamradio: Fix suspicious RCU usage warning in bpqether.c
BUG: unable to handle kernel NULL pointer dereference in try_async_pf 1 486d 482d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
BUG: unable to handle kernel NULL pointer dereference in unlock_page 1 488d 488d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Read in rpc_net_ns syz done 10 521d 527d 456d 31e9a7f35352 SUNRPC: fix use-after-free in rpc_free_client_work()
WARNING in tipc_msg_append C done 107 483d 497d 456d c9aa81faf191 tipc: fix kernel WARNING in tipc_msg_append()
BUG: unable to handle kernel NULL pointer dereference in __es_insert_extent 1 489d 489d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
bpf-next test error: BUG: using smp_processor_id() in preemptible code in ext4_mb_new_blocks 90 487d 493d 456d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
general protection fault in cfg80211_dev_rename 1 526d 522d 456d 0bbab5f03015 cfg80211: fix debugfs rename crash
KASAN: slab-out-of-bounds Read in garmin_read_process C 1 574d 574d 456d e9b3c610a05c USB: serial: garmin_gps: add sanity checking for data length
net-next test error: BUG: using smp_processor_id() in preemptible code in corrupted 4 489d 491d 456d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KASAN: use-after-free Read in usbhid_close (3) C 6 530d 557d 456d 0ed08faded1d HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
BUG: unable to handle kernel NULL pointer dereference in kvm_vm_ioctl 1 486d 486d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in skb_clone (3) 44 507d 509d 456d 239174945dac tcp: tcp_v4_err() icmp skb is named icmp_skb
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE! (2) C done 46328 477d 508d 456d 7d2e8748af62 KVM: x86: Initialize tdp_level during vCPU creation
KMSAN: uninit-value in do_tcp_getsockopt 5 469d 521d 456d e776af608f69 net-backports: tcp: fix error recovery in tcp_zerocopy_receive()
linux-next test error: WARNING: suspicious RCU usage in ipmr_device_event 24 538d 543d 456d a14fbcd4f157 ipmr: Fix RCU list debugging warning
net test error: KASAN: null-ptr-deref Write in x25_disconnect 12 536d 537d 456d 8999dc89497a net/x25: Fix null-ptr-deref in x25_disconnect
BUG: unable to handle kernel NULL pointer dereference in kvm_vcpu_gfn_to_memslot 1 486d 486d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
memory leak in genl_rcv_msg C 116 492d 681d 456d c36f05559104 genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()
KMSAN: uninit-value in __dev_get_by_name C 2 518d 518d 456d 687775cec056 ax25: fix setsockopt(SO_BINDTODEVICE)
general protection fault in start_creating C done 106 478d 508d 456d d56f5136b010 KVM: let kvm_destroy_vm_debugfs clean up vCPU debugfs directories
BUG: unable to handle kernel NULL pointer dereference in udc_bind_to_driver 1 484d 484d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_node_cpus (2) 9 524d 691d 456d 314eeb43e5f2 rcu: Add *_ONCE() and data_race() to rcu_node ->exp_tasks plus locking
bpf test error: KASAN: null-ptr-deref Write in x25_disconnect 78 524d 537d 456d 8999dc89497a net/x25: Fix null-ptr-deref in x25_disconnect
KASAN: slab-out-of-bounds Read in fl6_update_dst C done 43 478d 523d 456d bb986a50421a seg6: fix seg6_validate_srh() to avoid slab-out-of-bounds
general protection fault in __tipc_sendstream C done 444 477d 507d 456d 4c21daae3dbc tipc: Fix NULL pointer dereference in __tipc_sendstream() 5e9eeccc58f3 tipc: fix NULL pointer dereference in streaming
net test error: BUG: using smp_processor_id() in preemptible code in corrupted 3 487d 489d 456d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KASAN: use-after-free Read in ath9k_wmi_ctrl_rx C 1 569d 568d 456d abeaa85054ff ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx
upstream test error: BUG: using smp_processor_id() in preemptible code in ext4_map_blocks 1 490d 490d 456d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
general protection fault in sock_hash_free 1 501d 501d 456d 75e68e5bf2c7 bpf, sockhash: Synchronize delete from bucket list on map free
KASAN: slab-out-of-bounds Read in skb_gso_transport_seglen C done 4 526d 545d 456d 9274124f023b net: stricter validation of untrusted gso packets
BUG: unable to handle kernel NULL pointer dereference in local_bh_disable 1 487d 487d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
BUG: unable to handle kernel NULL pointer dereference in generic_perform_write (2) C done 3 553d 551d 456d 829b37b8cddb ext4: avoid race conditions when remounting with options that change dax
BUG: stack guard page was hit in update_stack_state 5 607d 621d 456d dd912306ff00 net: fix a potential recursive NETDEV_FEAT_CHANGE
WARNING: locking bug in dev_mc_seq_show C done 3 497d 508d 456d 845e0ebb4408 net: change addr_list_lock back to static key
general protection fault in inet_diag_bc_sk 12 531d 534d 456d ee1bd483cc06 inet_diag: bc: read cgroup id only for full sockets
general protection fault in selinux_socket_recvmsg C done 4 512d 512d 456d 0a82e230c688 mptcp: avoid NULL-ptr derefence on fallback
KMSAN: uninit-value in skbprio_enqueue syz 11 471d 534d 456d 2761121af87d net_sched: sch_skbprio: add message validation to skbprio_change()
general protection fault in ath9k_hif_usb_rx_cb C 913 456d 569d 456d 2bbcaaee1fcb ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb
BUG: soft lockup in wg_packet_tx_worker 1 528d 528d 456d df4953e4e997 sch_sfq: validate silly quantum values
INFO: rcu detected stall in wg_packet_tx_worker C done 24 485d 538d 456d df4953e4e997 sch_sfq: validate silly quantum values
linux-next test error: KASAN: use-after-free Write in afs_wake_up_async_call 111 482d 491d 456d 0041cd5a5044 rxrpc: Fix notification call on completion of discarded calls
BUG: unable to handle kernel NULL pointer dereference in smp_call_function_many_cond (2) 1 480d 480d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Read in br_mrp_parse C done 5 513d 514d 456d 617504c67e01 bridge: mrp: Fix out-of-bounds read in br_mrp_parse
BUG: unable to handle kernel NULL pointer dereference in __ext4_journal_start_sb 1 486d 486d 456d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
INFO: task hung in blkdev_issue_flush (2) C done error 3 679d 837d 473d 2b5c8f0063e4 nbd: replace kill_bdev() with __invalidate_device() again
KASAN: use-after-free Read in blkdev_direct_IO C done error 8 801d 806d 473d 0eb6ddfb865c block: Fix __blkdev_direct_IO() for bio fragments
KASAN: use-after-free Read in blkdev_bio_end_io C done error 13 791d 803d 473d 7b6620d7db56 block: remove REQ_NOWAIT_INLINE
KCSAN: data-race in tcp_add_backlog / tcp_try_rmem_schedule 3 735d 740d 473d ebb3b78db7bf tcp: annotate sk->sk_rcvbuf lockless reads
memory leak in bio_clone_fast C 1 795d 795d 473d 7b6620d7db56 block: remove REQ_NOWAIT_INLINE
WARNING: refcount bug in blk_mq_free_request (2) C done error 5 803d 803d 473d de6346ecbc8f nbd: protect cmd->status with cmd->lock
memory leak in bio_copy_user_iov C done 34 666d 851d 473d 3b7995a98ad7 block: fix memleak when __blk_rq_map_user_iov() is failed
WARNING in sk_stream_kill_queues (4) C done done 6 596d 600d 473d b6f6118901d1 ipv6: restrict IPV6_ADDRFORM operation
WARNING: bad unlock balance in get_user_pages_unlocked 1 561d 556d 475d c7b6a566b985 mm/gup: Mark lock taken only after a successful retake
WARNING in __mmdrop syz done 14 811d 821d 475d 3d2c7d370475 Revert "vhost: access vq metadata through kernel virtual address"
WARNING in wa_nep_create/usb_submit_urb C 114 545d 829d 475d caa6772db4c1 Staging: remove wusbcore and UWB from the kernel tree.
upstream boot error: KASAN: slab-out-of-bounds Write in virtio_gpu_object_create 6 550d 559d 475d b513b0d4563a drm/virtio: fix OOB in virtio_gpu_object_create
WARNING in kfree (2) syz done done 1 586d 585d 475d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
WARNING in hwarc_neep_init/usb_submit_urb C 1 579d 579d 475d caa6772db4c1 Staging: remove wusbcore and UWB from the kernel tree.
BUG: corrupted list in __uwb_rc_neh_rm C 9 551d 586d 475d caa6772db4c1 Staging: remove wusbcore and UWB from the kernel tree.
KASAN: null-ptr-deref Write in blk_mq_map_swqueue C done 3 569d 569d 478d d0930bb8f46b blk-mq: Fix a recently introduced regression in blk_mq_realloc_hw_ctxs()
KASAN: use-after-free Read in chaoskey_disconnect C 44 689d 717d 485d 93ddb1f56ae1 USB: chaoskey: fix use-after-free on release
KMSAN: uninit-value in etf_enqueue_timesortedlist 3 527d 534d 485d a1211bf9a777 sched: etf: do not assume all sockets are full blown
KMSAN: uninit-value in audit_log_vformat (2) C 104 525d 545d 485d 763dafc520ad audit: check the length of userspace generated audit records
general protection fault in macvlan_device_event 86 534d 548d 485d 4dee15b4fd0d macvlan: fix null dereference in macvlan_device_event()
WARNING in __vm_enough_memory (2) syz done 6 546d 550d 485d dadbd85f2afc mm: Fix MREMAP_DONTUNMAP accounting on VMA merge
WARNING in hwsim_new_radio_nl C done 3 552d 554d 485d 7ea862048317 mac80211_hwsim: Use kstrndup() in place of kasprintf()
KASAN: invalid-free in nf_tables_newset C done 21 548d 564d 485d 7fb6f78df700 netfilter: nf_tables: do not leave dangling pointer in nf_tables_set_alloc_name
WARNING: bad unlock balance in mptcp_poll C done 10 550d 553d 485d e154659ba39a mptcp: fix double-unlock in mptcp_poll
KASAN: use-after-free Read in dput (2) syz done 4 549d 549d 485d 4fa3b1c41737 proc: Handle umounts cleanly
possible deadlock in user_shm_lock 12 513d 551d 485d ea0dfeb4209b shmem: fix possible deadlocks on shmlock_user_lock
possible deadlock in shmem_mfill_atomic_pte C done 82 513d 564d 485d 94b7cc01da5a mm: shmem: disable interrupt when acquiring info->lock in userfaultfd_copy path
KASAN: slab-out-of-bounds Read in __kvm_gfn_to_hva_cache_init C done 1537 512d 557d 485d b6467ab142b7 KVM: Check validity of resolved slot when searching memslots
WARNING in set_precision (2) C done 117 547d 645d 485d 7ea862048317 mac80211_hwsim: Use kstrndup() in place of kasprintf()
INFO: rcu detected stall in io_uring_release syz 15 505d 546d 485d 3fd44c86711f io_uring: use cond_resched() in io_ring_ctx_wait_and_kill()
KASAN: use-after-free Read in report_sock_error 2 539d 543d 485d a1211bf9a777 sched: etf: do not assume all sockets are full blown
linux-next test error: WARNING: suspicious RCU usage in ovs_ct_exit 132 544d 582d 485d 27de77cec985 net: openvswitch: ovs_ct_exit to be done under ovs_lock
WARNING in nf_nat_unregister_fn 1 548d 548d 485d b4faef1739dd netfilter: nat: fix error handling upon registering inet hook
possible deadlock in shmem_uncharge C done 101 514d 552d 485d ea0dfeb4209b shmem: fix possible deadlocks on shmlock_user_lock
possible deadlock in ext4_evict_inode syz error error 38 1098d 1136d 512d e5bfad3d7acc smack: use GFP_NOFS while holding inode_smack::smk_lock
general protection fault in kobject_get 4 528d 594d 524d 5bdfa854013c RDMA/mad: Do not crash if the rdma device does not have a umad interface
KASAN: use-after-free Write in tcindex_set_parms C done 13 565d 585d 524d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
WARNING: kobject bug in add_one_compat_dev 2 596d 598d 524d f2f2b3bbf0d9 RDMA/core: Fix missing error check on dev_set_name()
possible deadlock in io_submit_one (3) syz done 45 554d 562d 524d 63f818f46af9 proc: Use a dedicated lock in struct pid
INFO: task hung in io_queue_file_removal C done 16 567d 575d 524d 4afdb733b160 io-uring: drop completion when removing file
KASAN: slab-out-of-bounds Write in tcindex_set_parms C done 10 566d 587d 524d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in tcindex_dump syz 1 587d 585d 524d b1be2e8cd290 net_sched: hold rtnl lock in tcindex_partial_destroy_work()
KMSAN: uninit-value in simple_attr_read C 6 527d 597d 524d a65cab7d7f05 libfs: fix infoleak in simple_attr_read()
general protection fault in macsec_upd_offload C done 5 563d 562d 524d aa81700cf232 macsec: fix NULL dereference in macsec_upd_offload()
general protection fault in hfsc_unbind_tcf 1 576d 572d 524d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
memory leak in erase_aeb C 109 525d 678d 524d c16f39d14a7e ubi: fastmap: Free unused fastmap anchor peb during detach
BUG: unable to handle kernel NULL pointer dereference in handle_external_interrupt_irqoff C done 6404 569d 574d 524d 428b8f1d9f92 KVM: VMX: don't allow memory operands for inline asm that modifies SP
possible deadlock in send_sigurg C done 65 548d 562d 524d 63f818f46af9 proc: Use a dedicated lock in struct pid
WARNING: bad unlock balance in ucma_event_handler C done 143 557d 1221d 524d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING in geneve_exit_batch_net (2) C done 9 572d 595d 524d 0fda7600c2e1 geneve: move debug check after netdev unregister
general protection fault in fbcon_switch 1 569d 568d 524d b139f8b00db4 fbcon: fix null-ptr-deref in fbcon_switch
KASAN: invalid-free in tcf_exts_destroy C done 1 587d 587d 524d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in __hrtimer_run_queues C done 299 557d 564d 524d 73d20564e0dc hrtimer: Don't dereference the hrtimer pointer after the callback
WARNING: bad unlock balance in ucma_destroy_id syz done 44 591d 1145d 524d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING: bad unlock balance in __get_user_pages_remote C done 15 557d 557d 524d c7b6a566b985 mm/gup: Mark lock taken only after a successful retake
INFO: trying to register non-static key in __io_uring_register C done 39 556d 558d 524d f7fe9346869a io_uring: initialize fixed_file_data lock
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user C done 1 566d 565d 524d a1a7e3a36e01 xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
KASAN: stack-out-of-bounds Write in mpol_to_str C done 23 566d 570d 524d aa9f7d5172fa mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
general protection fault in do_tcp_getsockopt (2) C done 1 577d 577d 524d 6cd6cbf593bf net-backports: tcp: repair: fix TCP_QUEUE_SEQ implementation
KASAN: use-after-free Read in addr_handler syz done 12 556d 1038d 524d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
INFO: trying to register non-static key in io_cqring_ev_posted (2) C done 42 527d 565d 524d 10bea96dcc13 io_uring: add missing finish_wait() in io_sq_thread()
KASAN: use-after-free Read in cma_cancel_operation C done 617 612d 1293d 524d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
BUG: unable to handle kernel paging request in kernel_get_mempolicy C done 1 561d 558d 524d ba841078cd05 mm/mempolicy: Allow lookup_node() to handle fatal signal
WARNING: ODEBUG bug in rfcomm_dev_ioctl 1 589d 589d 524d 71811cac8532 Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
KASAN: slab-out-of-bounds Read in cgroup_file_notify C done 1 589d 585d 524d 726b7bbeafd4 hugetlb_cgroup: fix illegal access to memory
WARNING: refcount bug in __tcf_action_put syz 1 586d 585d 524d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in rdma_listen (2) C done 354 563d 932d 524d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING: kobject bug in ib_register_device C done 14 562d 601d 524d 7aefa6237cfe RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET
general protection fault in ethnl_parse_header C done 9 571d 576d 524d 55b474c41e58 netlink: check for null extack in cookie helpers
WARNING in vcpu_enter_guest syz done 19 574d 688d 524d d33294541889 KVM: x86: remove bogus user-triggerable WARN_ON
general protection fault in hsr_addr_is_self (2) 1 576d 576d 524d 3a303cfdd28d hsr: fix general protection fault in hsr_addr_is_self()
linux-next test error: KASAN: use-after-free Read in l2cap_sock_release 12 619d 621d 524d 2a154903cec2 Bluetooth: prefetch channel before killing sock
possible deadlock in send_sigio C done 7 552d 561d 524d 63f818f46af9 proc: Use a dedicated lock in struct pid
WARNING: ODEBUG bug in __init_work syz done 1 573d 572d 524d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
WARNING in call_rcu C done 8 578d 585d 524d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
WARNING: ODEBUG bug in prism2sta_disconnect_usb 1 574d 572d 524d a1f165a6b738 staging: wlan-ng: fix ODEBUG bug in prism2sta_disconnect_usb
WARNING: ODEBUG bug in tcf_queue_work C done 30 590d 590d 524d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
WARNING in __blk_mq_delay_run_hw_queue C done error 6 638d 743d 524d 6e66b4939241 blk-mq: Keep set->nr_hw_queues and set->map[].nr_queues in sync
general protection fault in qdisc_hash_add C done 47 583d 584d 524d 7c4046b1c53b Revert "net: sched: make newly activated qdiscs visible"
WARNING: refcount bug in tcindex_data_put C done 27 561d 562d 524d a8eab6d35e22 net_sched: fix a missing refcnt in tcindex_init()
KASAN: use-after-free Read in route4_get C 8 553d 583d 524d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
KASAN: use-after-free Read in __list_del_entry_valid (4) C done 16 613d 1301d 524d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
general protection fault in erspan_netlink_parms C done 5 580d 580d 524d 32ca98feab8c net: ip_gre: Accept IFLA_INFO_DATA-less configuration
WARNING in kernfs_create_dir_ns C done done 3 579d 840d 524d 810507fe6fd5 locking/lockdep: Reuse freed chain_hlocks entries
WARNING in af_alg_make_sg C done 13 556d 557d 524d ae46d2aa6a7f mm/gup: Let __get_user_pages_locked() return -EINTR for fatal signal
general protection fault in rdma_listen (2) syz done 104 563d 1074d 524d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING in kernfs_new_node C done done 2 579d 803d 524d 810507fe6fd5 locking/lockdep: Reuse freed chain_hlocks entries
possible deadlock in cma_netdev_callback C done 1399 557d 599d 524d 33fb27fd5446 RDMA/siw: Fix passive connection establishment
WARNING: refcount bug in sctp_wfree C done 20 565d 586d 524d 5c3e82fe1596 sctp: fix refcount bug in sctp_wfree
WARNING in ext4_write_inode 13 592d 599d 524d 10a98cb16d80 xfs: clear PF_MEMALLOC before exiting xfsaild thread
BUG: corrupted list in rdma_listen C 202 697d 1276d 524d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
possible deadlock in free_ioctx_users (2) C done 44 554d 562d 524d 63f818f46af9 proc: Use a dedicated lock in struct pid
WARNING: ODEBUG bug in route4_change C done 68 561d 585d 524d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
KASAN: use-after-free Read in tty_open C done done 8 571d 683d 524d ca4463bf8438 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: slab-out-of-bounds Read in edge_interrupt_callback C 1 573d 572d 524d 57aa9f294b09 USB: serial: io_edgeport: fix slab-out-of-bounds read in edge_interrupt_callback
KMSAN: uninit-value in tcf_exts_change C 5 576d 585d 524d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
BUG: sleeping function called from invalid context in kmem_cache_alloc_node_trace C done 364 586d 588d 524d 138470a9b2cc net/sched: act_ct: fix lockdep splat in tcf_ct_flow_table_get
KASAN: use-after-free Write in release_tty C done 591 561d 683d 524d ca4463bf8438 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
WARNING: ODEBUG bug in tcindex_destroy_work (3) syz done 13 564d 600d 524d 304e024216a8 net_sched: add a temporary refcnt for struct tcindex_data
KASAN: slab-out-of-bounds Read in hfa384x_usbin_callback C 1 575d 575d 524d 1165dd73e811 staging: wlan-ng: fix use-after-free Read in hfa384x_usbin_callback
KMSAN: uninit-value in macsec_handle_frame 1 574d 574d 524d b06d072ccc4b macsec: restrict to ethernet devices
WARNING: refcount bug in igmp_start_timer syz done done 19 790d 1155d 547d 323ebb61e32b net: use listified RX for handling GRO_NORMAL skbs
possible deadlock in sch_direct_xmit C done done 1548 690d 1369d 547d 323ebb61e32b net: use listified RX for handling GRO_NORMAL skbs
KASAN: use-after-free Read in alloc_netdev_mqs 1 611d 611d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in __iptunnel_pull_header C 12 580d 589d 549d 17c25cafd4d3 gre: fix uninit-value in __iptunnel_pull_header
KASAN: use-after-free Read in inet_gifconf 24 603d 609d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
INFO: task hung in hashlimit_mt_check_common C done 20 606d 645d 549d 8d0015a7ab76 netfilter: xt_hashlimit: limit the max size of hashtable c4a3922d2d20 netfilter: xt_hashlimit: reduce hashlimit_mutex scope for htable_put()
divide error in wg_packet_encrypt_worker C done 12 603d 611d 549d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
WARNING in idr_destroy C done 5 577d 593d 549d b216a8e7908c drm/lease: fix WARNING in idr_destroy
BUG: soft lockup in sys_exit_group C 6 574d 597d 549d d683469b3c93 ALSA: line6: Fix endless MIDI read loop
KASAN: use-after-free Read in ipv6_get_ifaddr 1 607d 607d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in inet_lookup_ifaddr_rcu 2 603d 605d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Write in hiddev_disconnect 20 577d 641d 549d 5c02c447eaed HID: hiddev: Fix race in in hiddev_disconnect()
KMSAN: use-after-free in netdev_state_change 2 593d 593d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in audit_receive C 4 600d 601d 549d 756125289285 audit: always check the netlink payload length in audit_receive_msg()
WARNING: lock held when returning to user space in ovl_write_iter C done 6 579d 594d 549d c853680453ac ovl: fix lockdep warning for async write
general protection fault in vt_ioctl 1 615d 615d 549d 6cd1ed50efd8 net-backports: vt: vt_ioctl: fix race in VT_RESIZEX
KASAN: use-after-free Read in percpu_ref_switch_to_atomic_rcu 5 595d 618d 549d c1e2148f8ecb io_uring: free fixed_file_data after RCU grace period
KASAN: use-after-free Read in rtnl_fill_ifinfo (2) 2 608d 609d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
INFO: task hung in hashlimit_net_exit syz done 53 603d 612d 549d 8d0015a7ab76 netfilter: xt_hashlimit: limit the max size of hashtable
kernel BUG at arch/x86/mm/physaddr.c:LINE! (4) C 18 568d 603d 549d 2ad3e17ebf94 audit: fix error handling in audit_data_to_entry()
KMSAN: uninit-value in slhc_compress C 3 592d 592d 549d 110a40dfb708 slip: make slhc_compress() more robust against malicious packets
WARNING: proc registration bug in hashlimit_mt_check_common C done 320 589d 614d 549d 99b79c3900d4 netfilter: xt_hashlimit: unregister proc file before releasing mutex
linux-next test error: WARNING in snd_pcm_plug_alloc 3 583d 583d 549d 5461e0530c22 ALSA: pcm: oss: Remove WARNING from snd_pcm_plug_alloc() checks
WARNING: ODEBUG bug in smc_ib_remove_dev 52 580d 594d 549d ece0d7bd7461 net/smc: cancel event worker during device removal
memory leak in dma_buf_ioctl C done 129 600d 815d 549d d1f37226431f dma-buf: free dmabuf->name in dma_buf_release()
KASAN: use-after-free Read in netdev_state_change 2 608d 609d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KCSAN: data-race in snd_seq_check_queue / snd_seq_control_queue 97 550d 648d 549d bb51e669fa49 ALSA: seq: Avoid concurrent access to queue flags
INFO: trying to register non-static key in xa_destroy C done 46 572d 600d 549d 12e5eef0f4d8 RDMA/siw: Fix failure handling during device creation
BUG: unable to handle kernel NULL pointer dereference in inet_release syz 3 599d 600d 549d b6f6118901d1 ipv6: restrict IPV6_ADDRFORM operation
INFO: rcu detected stall in ip_set_uadd C done 11 594d 631d 549d f66ee0410b1c netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
general protection fault in batadv_iv_ogm_schedule 2 603d 616d 549d 8e8ce08198de batman-adv: Don't schedule OGM for disabled interface
INFO: task hung in paste_selection C inconclusive done 8 616d 680d 549d e8c75a30a23c vt: selection, push sel_lock up
BUG: unable to handle kernel paging request in ethnl_update_bitset32 C 168 589d 601d 549d e34f1753eebc ethtool: limit bitset size
KASAN: use-after-free Read in ipv6_chk_addr_and_flags 1 608d 608d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in find_match C 52 579d 609d 549d e08ad80551b4 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in vgem_gem_dumb_create C done 15 612d 624d 549d 4b848f20eda5 drm/vgem: Close use-after-free race in vgem_gem_create
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache 2 619d 617d 549d 457fed775c97 net/smc: fix leak of kernel memory to user space
memory leak in nf_tables_parse_netdev_hooks (2) C 2 589d 593d 549d 2d285f26ecd0 netfilter: nf_tables: free flowtable hooks on hook register error
KMSAN: uninit-value in bond_alb_xmit syz 3 590d 592d 549d b7469e83d2ad bonding/alb: make sure arp header is pulled before accessing it
divide error in encrypt_packet C done 89 602d 611d 549d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
general protection fault in smc_ib_remove_dev C done 98 589d 601d 549d a2f2ef4a54c0 net/smc: check for valid ib_client_data
possible deadlock in htab_lru_map_delete_node C done 264 602d 608d 549d b9aff38de2cb bpf: Fix a potential deadlock with bpf_map_do_batch
KMSAN: use-after-free in inet_gifconf 10 580d 603d 549d e08ad80551b4 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in ip6_dst_destroy C 2 582d 594d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KASAN: use-after-free Read in raw_notifier 3 608d 609d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
memory leak in fasync_helper C 14 618d 679d 549d 67f562e3e147 net/smc: transfer fasync_list in case of fallback
possible deadlock in tty_unthrottle 3 573d 598d 549d e8c75a30a23c vt: selection, push sel_lock up
possible deadlock in inet_csk_accept C done 992 584d 585d 549d 06669ea346e4 net: memcg: fix lockdep splat in inet_csk_accept()
KASAN: slab-out-of-bounds Read in ethnl_update_bitset32 syz 2 595d 601d 549d e34f1753eebc ethtool: limit bitset size
KMSAN: uninit-value in audit_log_vformat C 220 549d 601d 549d 756125289285 audit: always check the netlink payload length in audit_receive_msg()
KASAN: use-after-free Read in dev_get_by_index_rcu 1 604d 604d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
INFO: rcu detected stall in hash_ip4_gc C done 1 631d 629d 549d f66ee0410b1c netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
KCSAN: data-race in queue_access_lock / snd_seq_check_queue 58 589d 631d 549d bb51e669fa49 ALSA: seq: Avoid concurrent access to queue flags
KMSAN: kernel-infoleak in tty_compat_ioctl C 162 571d 601d 549d 17329563a97d tty: fix compat TIOCGSERIAL leaking uninitialized memory
BUG: sleeping function called from invalid context in __kmalloc C done 5 611d 617d 549d b27a939e8376 ceph: canonicalize server path in place
INFO: rcu detected stall in ip_set_udel C done 12 608d 631d 549d f66ee0410b1c netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
general protection fault in ip_set_comment_free C done 19 592d 629d 549d 8af1c6fbd923 netfilter: ipset: Fix forceadd evaluation path
possible deadlock in bond_get_stats (3) syz done 2 604d 604d 549d b3e80d44f5b1 bonding: fix lockdep warning in bond_get_stats()
general protection fault in batadv_iv_ogm_schedule_buff 24 586d 608d 549d 8e8ce08198de batman-adv: Don't schedule OGM for disabled interface
KMSAN: use-after-free in veth_xmit 8 580d 595d 549d e08ad80551b4 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in kstrdup C 8 585d 612d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
possible deadlock in sidtab_sid2str_put C done 1382 611d 628d 549d 39a706fbcf26 selinux: fix sidtab string cache locking
KCSAN: data-race in __snd_rawmidi_transmit_ack / snd_rawmidi_write 168 550d 676d 549d dfa9a5efe8b9 ALSA: rawmidi: Avoid bit fields for state flags
KASAN: use-after-free Read in vsscanf 2 606d 608d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in n_tty_receive_buf_common C done 68 604d 680d 549d 07e6124a1a46 vt: selection, close sel_buffer race
KASAN: use-after-free Read in ethnl_update_bitset32 C done 6 593d 601d 549d e34f1753eebc ethtool: limit bitset size
KASAN: use-after-free Read in fib_nexthop_info 1 608d 608d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
general protection fault in nf_flow_table_offload_setup C done done 835 603d 636d 549d a7da92c2c8a1 netfilter: flowtable: skip offload setup if disabled
memory leak in nfs_fs_context_parse_monolithic C 18 584d 610d 549d 75a9b9176157 NFS: Fix leak of ctx->nfs_server.hostname
KASAN: slab-out-of-bounds Read in inet_gifconf 2 609d 609d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KASAN: use-after-free Read in find_match C done 142 602d 609d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in fat_evict_inode C 256 579d 603d 549d bc87302a093f fat: fix uninit-memory access for partial initialized inode
KASAN: use-after-free Read in br_dev_xmit 1 599d 599d 549d 823d81b0fa2c net: bridge: fix stale eth hdr pointer in br_dev_xmit
KASAN: use-after-free Read in ip6_dst_destroy C done 1 609d 609d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
WARNING: bad unlock balance in ovl_llseek C done 4 581d 594d 549d 531d3040bc5c ovl: fix lock in ovl_llseek()
KASAN: use-after-free Read in l3mdev_master_ifindex_rcu C done done 13 605d 611d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: slab-out-of-bounds Read in resample_shrink C done 5 571d 589d 549d f2ecf903ef06 ALSA: pcm: oss: Avoid plugin buffer overflow
general protection fault in nldev_stat_set_doit C done 8 583d 600d 549d 78f34a16c286 RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing
kernel panic: stack is corrupted in vhost_net_ioctl C done 2 609d 696d 549d 42d84c8490f9 vhost: Check docket sk_family instead of call getname
KASAN: use-after-free Read in __neigh_notify 2 608d 608d 549d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr C done 8 590d 600d 549d dc24f8b4ecd3 mptcp: add dummy icsk_sync_mss()
INFO: task hung in lock_sock_nested (2) C done 418 589d 602d 549d 3f74957fcbea vsock: fix potential deadlock in transport->release()
KMSAN: use-after-free in l3mdev_master_ifindex_rcu C 5 579d 603d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
unregister_netdevice: waiting for DEV to become free (3) C 1864 549d 611d 549d e34f1753eebc ethtool: limit bitset size
KMSAN: use-after-free in dev_alloc_name_ns 3 580d 593d 549d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KCSAN: data-race in snd_seq_prioq_cell_out / snd_seq_timer_interrupt 118 550d 644d 549d dc7497795e01 ALSA: seq: Fix concurrent access to queue current tick/time
KASAN: use-after-free Read in mld_in_v1_mode C done 3 608d 611d 549d e08ad80551b4 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
possible deadlock in bpf_lru_push_free C done 609 602d 608d 549d b9aff38de2cb bpf: Fix a potential deadlock with bpf_map_do_batch
WARNING in switch_fpu_return syz done done 11 621d 654d 570d 2620fe268e80 KVM: x86: Revert "KVM: X86: Fix fpu state crash in kvm guest"
KMSAN: use-after-free in rdma_listen C 26 590d 736d 570d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen C 28 747d 1112d 570d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
KASAN: slab-out-of-bounds Read in bitmap_ip_add syz done done 7 625d 637d 570d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
general protection fault in __nf_tables_chain_type_lookup 1 635d 635d 576d 826035498ec1 netfilter: nf_tables: add __nft_chain_type_get()
KASAN: slab-out-of-bounds Read in bitmap_ip_ext_cleanup C done done 8 620d 636d 578d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_port_ext_cleanup C done done 10 628d 637d 578d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
BUG: corrupted list in __nf_tables_abort C done done 29 630d 638d 578d eb014de4fd41 netfilter: nf_tables: autoload modules from the abort path
KASAN: slab-out-of-bounds Read in bitmap_ipmac_destroy C done done 2 631d 631d 578d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_ipmac_gc C done done 70 619d 635d 578d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
BUG: unable to handle kernel paging request in ion_heap_sglist_zero 1 684d 684d 578d d98c9e83b5e7 kasan: fix crashes on access to memory mapped by vm_map_ram()
KASAN: slab-out-of-bounds Read in bitmap_ipmac_ext_cleanup C unreliable done 15 620d 636d 578d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_port_destroy C done done 2 632d 632d 578d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
general protection fault in gcmaes_crypt_by_sg (2) C error done 28 636d 683d 584d db885e66d268 net/tls: fix async operation
possible deadlock in wg_noise_handshake_create_initiation C done 11 618d 621d 584d ec31c2676a10 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in slcan_open C done 2 685d 684d 584d 9ebd796e2400 can: slcan: Fix use-after-free Read in slcan_open
kernel BUG at fs/btrfs/volumes.c:LINE! 130 690d 1228d 584d 321f69f86a0f btrfs: reset device back to allocation state when removing
BUG: unable to handle kernel paging request in slhc_free C done done 177 905d 1023d 584d baf76f0c58ae slip: make slhc_free() silently accept an error pointer
WARNING in _chaoskey_fill/usb_submit_urb C 15 701d 754d 584d 92aa5986f4f7 USB: chaoskey: fix error case of a timeout
KASAN: slab-out-of-bounds Read in iov_iter_alignment C error error 79 684d 681d 584d e0ff126ee7ad pipe: Fix bogus dereference in iov_iter_alignment()
possible deadlock in wg_set_device C done 33 616d 621d 584d ec31c2676a10 wireguard: noise: reject peers with low order public keys
WARNING: ODEBUG bug in io_sqe_files_unregister C done 964 619d 666d 584d 2faf852d1be8 io_uring: cleanup fixed file data table references
WARNING in flexcop_usb_probe/usb_submit_urb C 4 750d 787d 584d 1b976fc6d684 media: b2c2-flexcop-usb: add sanity checking
linux-next build error (7) 7 629d 633d 584d ac6119e7f25b efi/x86: Disable instrumentation in the EFI runtime handling code
BUG: unable to handle kernel paging request in xfs_sb_read_verify 69 667d 687d 589d d98c9e83b5e7 kasan: fix crashes on access to memory mapped by vm_map_ram()
BUG: unable to handle kernel paging request in ion_heap_clear_pages C 4378 667d 687d 589d d98c9e83b5e7 kasan: fix crashes on access to memory mapped by vm_map_ram()
KASAN: use-after-free Read in bitmap_ip_ext_cleanup C done done 2 636d 636d 602d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: use-after-free Read in bitmap_ipmac_ext_cleanup C done done 2 636d 636d 602d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Write in bitmap_ip_del C done done 7 634d 636d 602d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: use-after-free Read in bitmap_ip_destroy C done done 1 636d 636d 605d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
upstream boot error: KASAN: slab-out-of-bounds Write in hpet_alloc 33 624d 625d 606d 98c49f1746ac char: hpet: Fix out-of-bounds read bug
KMSAN: uninit-value in setup_udp_tunnel_sock C 1 634d 634d 606d 940ba1498665 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
WARNING in nft_request_module C done 7 640d 640d 606d 9332d27d7918 netfilter: nf_tables: remove WARN and add NLA_STRING upper limits
memory leak in reiserfs_fill_super C 20 625d 675d 606d 5474ca7da6f3 reiserfs: Fix memory leak of journal device string
WARNING: lock held when returning to user space in tun_get_user (2) 7 622d 633d 606d 1efba987c486 net-backports: tun: add mutex_unlock() call and napi.skb clearing in tun_get_user()
memory leak in kobject_set_name_vargs (2) C done 47 632d 816d 606d cb626bf566eb net-sysfs: Fix reference count leak
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_cpus 7 618d 712d 606d c51f83c315c3 rcu: Use READ_ONCE() for ->expmask in rcu_read_unlock_special()
KASAN: slab-out-of-bounds Read in bitmap_port_gc C done 197 620d 637d 606d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KMSAN: uninit-value in can_receive C 14 609d 698d 606d e7153bf70c34 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
memory leak in _sctp_make_chunk C 1 670d 670d 606d be7a77292077 sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY
WARNING in devlink_port_type_warn 2340 637d 708d 606d 4c582234ab39 devlink: Wait longer before warning about unset port type
BUG: unable to handle kernel NULL pointer dereference in x25_connect 1 680d 680d 606d e21dba7a4df4 net/x25: fix nonblocking connect
KASAN: user-memory-access Write in video_usercopy 3 647d 647d 606d 1dc8b65c944e media: v4l2-core: only zero-out ioctl-read buffers
BUG: unable to handle kernel NULL pointer dereference in cfg80211_wext_siwrts 3 636d 645d 606d 24953de0a5e3 cfg80211: check for set_wiphy_params
KASAN: null-ptr-deref Write in x25_connect 1 685d 680d 606d e21dba7a4df4 net/x25: fix nonblocking connect
KASAN: slab-out-of-bounds Read in bitmap_ip_list C 85 621d 638d 606d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
kernel BUG at fs/namei.c:LINE! 3593 642d 642d 606d c64cd6e34ea3 reimplement path_mountpoint() with less magic
KASAN: use-after-free Read in bitmap_port_ext_cleanup C done 11 636d 645d 606d c120959387ef netfilter: fix a use-after-free in mtype_destroy()
KMSAN: uninit-value in sd_init (2) C 94 712d 708d 606d de89d0864f66 media: gspca: zero usb_buf
KMSAN: uninit-value in __request_module (3) C 58 607d 635d 606d 36d79af7fb59 net-backports: net_sched: use validated TCA_KIND attribute in tc_new_tfilter()
KMSAN: uninit-value in rsvp_change C 4 627d 627d 606d cb3c0e6bdf64 cls_rsvp: fix rsvp_policy
BUG: unable to handle kernel paging request in rhashtable_replace_fast 2 632d 640d 606d 41cdc741048b netdevsim: fix nsim_fib6_rt_create() error path
KASAN: use-after-free Read in __nf_tables_abort C done 3 633d 635d 606d eb014de4fd41 netfilter: nf_tables: autoload modules from the abort path
KASAN: use-after-free Read in rsi_rx_done_handler 8 645d 774d 606d e93cd35101b6 rsi: fix use-after-free on failed probe and unbind
general protection fault in hsr_addr_is_self 3 608d 623d 606d 2b5b8251bc9f net: hsr: fix possible NULL deref in hsr_handle_frame()
WARNING: suspicious RCU usage in find_set_and_id syz done 6 631d 634d 606d 5038517119d5 netfilter: ipset: fix suspicious RCU usage in find_set_and_id
BUG: corrupted list in nft_obj_del C done 7 638d 640d 606d 335178d5429c netfilter: nf_tables: fix flowtable list del corruption
BUG: corrupted list in nf_tables_commit C done 8 640d 640d 606d 335178d5429c netfilter: nf_tables: fix flowtable list del corruption
kernel panic: stack is corrupted in __lock_acquire (4) syz error error 75 702d 859d 606d 4da6a196f93b bpf: Sockmap/tls, during free we may call tcp_bpf_unhash() in loop
INFO: rcu detected stall in addrconf_rs_timer (3) C inconclusive done 81 667d 663d 606d d9e15a273306 pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
KASAN: slab-out-of-bounds Read in bitmap_ipmac_list C done 108 622d 638d 606d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
BUG: corrupted list in __dentry_kill (2) C done 4945 675d 675d 606d a3d1e7eb5abe simple_recursive_removal(): kernel-side rm -rf for ramfs-style filesystems
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (2) C done 8 633d 635d 606d 940ba1498665 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
BUG: sleeping function called from invalid context in lock_sock_nested C 1232 606d 682d 606d 37f96694cf73 crypto: af_alg - Use bh_lock_sock in sk_destruct
general protection fault in dccp_timeout_nlattr_to_obj C done 7 646d 649d 606d 1d9a7acd3d1e netfilter: conntrack: dccp, sctp: handle null timeout argument
memory leak in vlan_dev_set_egress_priority C 1 649d 649d 606d 9bbd917e0bec vlan: fix memory leak in vlan_dev_set_egress_priority
general protection fault in nft_parse_register 1 638d 638d 606d 7eaecf7963c1 netfilter: nft_osf: add missing check for DREG attribute
WARNING in sk_psock_drop 157 629d 638d 606d 58c8db929db1 net, sk_msg: Don't check if sock is locked when tearing down psock
KCSAN: data-race in __rcu_read_unlock / rcu_report_exp_cpu_mult 21 622d 682d 606d c51f83c315c3 rcu: Use READ_ONCE() for ->expmask in rcu_read_unlock_special()
KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor (3) 142 611d 663d 606d a8772fad0172 tomoyo: Use atomic_t for statistics counter
KMSAN: uninit-value in macvlan_broadcast C 2 649d 649d 606d 96cc4b69581d macvlan: do not assume mac_header is set in macvlan_broadcast()
general protection fault in xt_rateest_tg_checkentry C done 12 650d 660d 606d 1b789577f655 netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
general protection fault in hash_netiface6_uadt 1 646d 646d 606d 22dad713b8a5 netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
WARNING in tcp_ack C done 3 647d 648d 606d 90d72256addf gtp: fix bad unlock balance in gtp_encap_enable_socket
memory leak in em_nbyte_change C 1 631d 631d 606d 55cd9f67f1e4 net_sched: ematch: reject invalid TCF_EM_SIMPLE
KCSAN: data-race in __skb_try_recv_from_queue / unix_dgram_sendmsg 61 622d 640d 606d 86b18aaa2b5b skbuff: fix a data race in skb_queue_len()
KMSAN: uninit-value in digitv_rc_query C 4 725d 708d 606d eecc70d22ae5 media: digitv: don't continue if remote control state can't be read 569bc8d6a6a5 media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0
general protection fault in xt_rateest_put C done 97 637d 644d 606d 212e7f56605e netfilter: arp_tables: init netns pointer in xt_tgdtor_param struct
KCSAN: data-race in rcu_gp_fqs_check_wake / rcu_preempt_deferred_qs_irqrestore 99 618d 739d 606d 6935c3983b24 rcu: Avoid data-race in rcu_gp_fqs_check_wake()
BUG: sleeping function called from invalid context in tpk_write C done 12 638d 679d 606d 9a655c77ff8f ttyprintk: fix a potential deadlock in interrupt context issue
KCSAN: data-race in rcu_gp_fqs_check_wake / rcu_note_context_switch 51 618d 731d 606d 6935c3983b24 rcu: Avoid data-race in rcu_gp_fqs_check_wake()
memory leak in snd_pcm_hw_params C 25 619d 626d 606d 66f2d19f8116 ALSA: pcm: Fix memory leak at closing a stream without hw_free
KASAN: slab-out-of-bounds Read in macvlan_broadcast C done 10 647d 649d 606d 96cc4b69581d macvlan: do not assume mac_header is set in macvlan_broadcast()
KMSAN: uninit-value in number C 190 611d 708d 606d 51d0c99b391f media: af9005: uninitialized variable printked
KCSAN: data-race in find_next_bit / rcu_report_exp_cpu_mult 203 618d 740d 606d 15c7c972cd26 rcu: Use *_ONCE() to protect lockless ->expmask accesses
KMSAN: uninit-value in __tipc_nl_compat_dumpit C 4428 606d 675d 606d a7869e5f9174 tipc: eliminate KMSAN: uninit-value in __tipc_nl_compat_dumpit error
KASAN: slab-out-of-bounds Read in nla_put_nohdr C done 1 634d 634d 606d 61678d28d4a4 net_sched: fix datalen for ematch
general protection fault in path_openat C done 7 624d 624d 606d 6404674acd59 vfs: fix do_last() regression
general protection fault in free_verifier_state (3) C 5 634d 641d 606d f59bbfc2f609 bpf: Fix error path under memory pressure
WARNING: bad unlock balance in release_sock 1 648d 648d 606d 90d72256addf gtp: fix bad unlock balance in gtp_encap_enable_socket
KASAN: use-after-free Read in tcp_fastretrans_alert C done 1 637d 637d 606d 2bec445f9bf3 net-backports: tcp: do not leave dangling pointers in tp->highest_sack
KASAN: use-after-free Read in root_remove_peer_lists C done 2 623d 623d 606d 9981159fc3b6 wireguard: allowedips: fix use-after-free in root_remove_peer_lists
KASAN: use-after-free Read in snd_timer_resolution C 5 622d 640d 606d 60adcfde92fa ALSA: seq: Fix racy access for queue timer in proc read
KMSAN: uninit-value in i2c_w (2) C 3 720d 708d 606d de89d0864f66 media: gspca: zero usb_buf
KCSAN: data-race in tick_do_update_jiffies64 / tick_do_update_jiffies64 (4) 394 611d 682d 606d de95a991bb72 net-backports: tick/sched: Annotate lockless access to last_jiffies_update
general protection fault in hash_netnet6_uadt 1 647d 647d 606d 22dad713b8a5 netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
BUG: unable to handle kernel paging request in rhashtable_jhash2 C done 6 639d 640d 606d 41cdc741048b netdevsim: fix nsim_fib6_rt_create() error path
memory leak in tcf_ctinfo_init C 2 636d 637d 606d 09d4f10a5e78 net: sched: act_ctinfo: fix memory leak
WARNING in do_dentry_open (2) C done 17 626d 623d 606d a37f4958f7b6 debugfs: Return -EPERM when locked down
KASAN: slab-out-of-bounds Read in __nla_put_nohdr C done 4 634d 634d 606d 61678d28d4a4 net_sched: fix datalen for ematch
INFO: rcu detected stall in br_handle_frame (2) C done 2 666d 662d 606d d9e15a273306 pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
memory leak in nf_tables_parse_netdev_hooks C 6 610d 640d 606d cd77e75b5e46 netfilter: nf_tables: fix memory leak in nf_tables_parse_netdev_hooks()
KCSAN: data-race in process_srcu / synchronize_srcu 112 618d 712d 606d 844a378de337 srcu: Apply *_ONCE() to ->srcu_last_gp_end
WARNING in __proc_create (2) C done 4 633d 634d 606d a45ea48e2bcd afs: Fix characters allowed into cell names
INFO: rcu detected stall in netlink_sendmsg (3) C done 6 613d 667d 606d d9e15a273306 pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
general protection fault in timer_is_static_object C 2 690d 687d 606d cb222aed03d7 Input: add safety guards to input_set_keycode()
KASAN: null-ptr-deref Write in queue_work_on C done error 5 791d 787d 606d 0ace17d56824 can, slip: Protect tty->disc_data in write_wakeup and close with RCU
WARNING in cbq_destroy_class C done 7 611d 634d 606d 2e24cd755552 net_sched: fix ops->bind_class() implementations
WARNING in tracepoint_probe_register_prio (3) syz done 979 610d 1247d 606d 64ae572bc7d0 tracing: Fix sched switch start/stop refcount racy updates
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE! C done 6 663d 670d 606d 005ba37cb89b mm: thp: KVM: Explicitly check for THP when populating secondary MMU
BUG: spinlock already unlocked in input_set_keycode C 2 700d 698d 606d cb222aed03d7 Input: add safety guards to input_set_keycode()
WARNING: refcount bug in cdev_get C done 105 648d 788d 606d 68faa679b8be chardev: Avoid potential use-after-free in 'chrdev_open()'
KMSAN: uninit-value in read_sensor_register (2) C 44 714d 731d 606d de89d0864f66 media: gspca: zero usb_buf
inconsistent lock state in rxrpc_put_client_conn C done 18198 615d 621d 606d 963485d436cc rxrpc: Fix call RCU cleanup using non-bh-safe locks
general protection fault in hash_ipmark6_uadt 2 646d 646d 606d 22dad713b8a5 netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
WARNING in cbq_destroy C done 1 634d 634d 606d 2e24cd755552 net_sched: fix ops->bind_class() implementations
WARNING in dln2_start_rx_urbs/usb_submit_urb C 44 622d 710d 606d 2b8bd606b1e6 mfd: dln2: More sanity checking for endpoints
KASAN: use-after-free Read in tcp_check_sack_reordering C done 2 629d 637d 606d 2bec445f9bf3 net-backports: tcp: do not leave dangling pointers in tp->highest_sack
BUG: unable to handle kernel NULL pointer dereference in cfg80211_wext_siwfrag C done 8 636d 649d 606d 24953de0a5e3 cfg80211: check for set_wiphy_params
WARNING in cgroup_apply_control_enable C done 178 643d 1195d 606d 3bc0bb36fa30 cgroup: Prevent double killing of css when enabling threaded cgroup
KASAN: slab-out-of-bounds Read in hid_field_extract C 6 647d 680d 606d 8ec321e96e05 HID: Fix slab-out-of-bounds read in hid_field_extract
general protection fault in nft_chain_parse_hook C done 48 625d 640d 606d 826035498ec1 netfilter: nf_tables: add __nft_chain_type_get()
WARNING in nf_tables_table_destroy C done done 1 638d 638d 606d eb014de4fd41 netfilter: nf_tables: autoload modules from the abort path
KASAN: slab-out-of-bounds Write in mpol_parse_str C done 3 645d 641d 606d c7a91bc7c2e1 mm/mempolicy.c: fix out of bounds write in mpol_parse_str()
KASAN: slab-out-of-bounds Read in bitmap_ip_gc C done 15 619d 637d 606d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
WARNING: ODEBUG bug in rsi_probe C 10487 620d 916d 606d 92aafe77123a rsi: fix use-after-free on probe errors
KASAN: use-after-free Read in macvlan_broadcast C done 12 647d 649d 606d 96cc4b69581d macvlan: do not assume mac_header is set in macvlan_broadcast()
general protection fault in nft_tunnel_get_init C done 7 640d 640d 606d 1c702bf902bd netfilter: nft_tunnel: fix null-attribute check
KASAN: slab-out-of-bounds Read in bitmap_port_add syz done 9 631d 638d 606d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
WARNING: bad unlock balance in gtp_encap_enable_socket C done 8 646d 650d 606d 90d72256addf net-backports: gtp: fix bad unlock balance in gtp_encap_enable_socket
WARNING: bad unlock balance in sch_direct_xmit C done 35 636d 683d 606d 53d374979ef1 net: avoid updating qdisc_xmit_lock_key in netdev_update_lockdep_key()
general protection fault in inet6_set_link_af C done 8 616d 619d 606d db3fa271022d ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
general protection fault in tcf_ife_cleanup C done 111 621d 645d 606d 44c23d71599f net/sched: act_ife: initalize ife->metalist earlier
BUG: unable to handle kernel paging request in do_csum (2) C done 6 630d 631d 606d 6cd021a58c18 udp: segment looped gso packets correctly
KASAN: use-after-free Write in hci_sock_bind 4 608d 641d 606d 11eb85ec42dc Bluetooth: Fix race condition in hci_release_sock()
KASAN: use-after-free Write in __alloc_skb (2) C done 7 657d 674d 606d d836f5c69d87 net-backports: net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
KASAN: slab-out-of-bounds Read in bitmap_ip_test syz 10 627d 637d 606d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
WARNING in geneve_exit_batch_net 15 606d 632d 606d 760d228e322e net_sched: walk through all child classes in tc_bind_tclass()
KASAN: slab-out-of-bounds Read in tcf_exts_destroy C done error 8 729d 632d 606d 599be01ee567 net_sched: fix an OOB access in cls_tcindex
general protection fault in hash_ipportnet4_uadt C done 13 646d 648d 606d 22dad713b8a5 netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
KASAN: use-after-free Write in percpu_ref_switch_to_percpu 1 621d 620d 606d 2faf852d1be8 io_uring: cleanup fixed file data table references
KASAN: slab-out-of-bounds Read in bitmap_port_list C 152 629d 638d 606d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
WARNING in uvc_scan_chain_forward C 6 646d 670d 606d 68035c80e129 media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
WARNING: ODEBUG bug in tcindex_destroy_work (2) 5 611d 622d 606d 599be01ee567 net_sched: fix an OOB access in cls_tcindex
inconsistent lock state in rxrpc_put_client_connection_id C done 473 615d 621d 606d 963485d436cc rxrpc: Fix call RCU cleanup using non-bh-safe locks
INFO: task hung in aead_recvmsg C done 11991 633d 1406d 606d bbefa1dd6a6d crypto: pcrypt - Avoid deadlock by using per-instance padata queues
KASAN: use-after-free Read in bitmap_port_destroy C 1 637d 637d 606d c120959387ef netfilter: fix a use-after-free in mtype_destroy()
KASAN: null-ptr-deref Read in tcf_generic_walker C done 6 610d 629d 606d 760d228e322e net_sched: walk through all child classes in tc_bind_tclass()
WARNING: refcount bug in chrdev_open C inconclusive done 15 686d 788d 606d 68faa679b8be chardev: Avoid potential use-after-free in 'chrdev_open()'
KMSAN: uninit-value in dvb_usb_adapter_dvb_init 1 716d 708d 606d 26cff637121d media: vp7045: do not read uninitialized values if usb transfer fails
INFO: task hung in __generic_file_fsync (2) C done done 28 653d 654d 606d 85a8ce62c2ea block: add bio_truncate to fix guard_bio_eod
WARNING in tcp_enter_loss (2) C done unreliable 4 1264d 1314d 606d 16ae6aa17052 tcp: ignore Fast Open on repair mode
KASAN: null-ptr-deref Read in refcount_sub_and_test_checked (2) C inconclusive done 916 866d 1068d 606d 62dcb4f41836 media: vb2: check memory model for VIDIOC_CREATE_BUFS
BUG: unable to handle kernel paging request in xfs_sb_quiet_read_verify C done 6 667d 667d 611d d98c9e83b5e7 kasan: fix crashes on access to memory mapped by vm_map_ram()
KASAN: vmalloc-out-of-bounds Write in pcpu_alloc C done 31 659d 683d 611d 253a496d8e57 kasan: don't assume percpu shadow allocations will succeed
KASAN: use-after-free Read in iov_iter_alignment C error 3 685d 684d 611d e0ff126ee7ad pipe: Fix bogus dereference in iov_iter_alignment()
memory leak in sctp_stream_init C 1 672d 671d 611d 951c6db954a1 sctp: fix memleak on err handling of stream initialization
general protection fault in gigaset_probe C 6 695d 814d 611d 53f35a39c386 staging: gigaset: fix general protection fault on probe
KASAN: use-after-free Read in ext4_xattr_set_entry (2) C done 19 670d 1079d 611d 9803387c55f7 ext4: validate the debug_want_extra_isize mount option at parse time
KMSAN: uninit-value in __crc32c_le_base syz 567 647d 693d 611d b6f3320b1d52 sctp: fully initialize v4 addr in some functions
unregister_netdevice: waiting for DEV to become free (2) C done 385621 611d 1158d 611d ddd9b5e3e765 net-sysfs: Call dev_hold always in rx_queue_add_kobject
KMSAN: uninit-value in br_nf_forward_arp (3) 2 687d 679d 611d 5604285839aa net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
KCSAN: data-race in taskstats_exit / taskstats_exit 157 611d 743d 611d 0b8d616fb5a8 taskstats: fix data-race
WARNING in azx_rirb_get_response 4 669d 671d 611d 475feec0c41a ALSA: hda - Downgrade error message for single-cmd fallback
INFO: task hung in sync_inodes_sb (3) C done 6 652d 660d 611d 85a8ce62c2ea block: add bio_truncate to fix guard_bio_eod
linux-next boot error: general protection fault in do_mount_root 9 670d 670d 611d 7de7de7ca0ae Fix root mounting with no mount options
upstream boot error: general protection fault in do_mount_root 12 670d 671d 611d 7de7de7ca0ae Fix root mounting with no mount options
KMSAN: uninit-value in bond_neigh_setup 64 655d 679d 611d f394722fb0d0 net-backports: neighbour: remove neigh_cleanup() method
KASAN: use-after-free Read in tomoyo_realpath_from_path syz error error 7 671d 864d 611d 6f7c41374b62 tomoyo: Don't use nifty names on sockets.
KASAN: slab-out-of-bounds Read in hsr_debugfs_rename C done 18 649d 659d 611d 04b69426d846 hsr: fix slab-out-of-bounds Read in hsr_debugfs_rename()
general protection fault in j1939_sk_bind syz done done 22 686d 712d 611d 00d4e14d2e4c can: j1939: j1939_sk_bind(): take priv after lock is held
BUG: unable to handle kernel paging request in pcpu_alloc C done 24 664d 683d 611d 253a496d8e57 kasan: don't assume percpu shadow allocations will succeed
general protection fault in sctp_stream_free (2) C done 25 656d 667d 611d 61d5d4062876 sctp: fix err handling of stream initialization
inconsistent lock state in sp_get C done 2 674d 674d 611d 5c9934b6767b 6pack,mkiss: fix possible deadlock
general protection fault in j1939_jsk_del (2) syz 21 670d 687d 611d 00d4e14d2e4c can: j1939: j1939_sk_bind(): take priv after lock is held
KASAN: vmalloc-out-of-bounds Read in compat_copy_entries C done 3 672d 672d 611d e608f631f0ba netfilter: ebtables: compat: reject all padding in matches/watchers
WARNING in ovl_rename C done done 5 903d 899d 611d 6889ee5a53b8 ovl: relax WARN_ON() on rename to self
possible deadlock in mon_bin_vma_fault C done 11427 672d 1139d 611d 19e6317d24c2 usb: mon: Fix a deadlock in usbmon between mmap and read
WARNING: refcount bug in smc_release (2) C done 9 668d 691d 611d 86434744fedf net/smc: add fallback check to connect()
BUG: corrupted list in hsr_add_node 1 713d 712d 611d 92a35678ec07 hsr: fix a race condition in node list insertion and deletion
BUG: Bad rss-counter state (3) C unreliable done 438 811d 1277d 624d 173d9d9fd3dd mm/huge_memory: splitting set mapping+index before unfreeze
possible deadlock in flush_workqueue (2) C done done 256 659d 1092d 624d e7c58097793e hugetlbfs: revert "Use i_mmap_rwsem to fix page fault/truncate race"
KASAN: slab-out-of-bounds Read in build_audio_procunit (2) C 1 710d 709d 632d 976a68f06b2e ALSA: usb-audio: Fix incorrect size check for processing/extension units
KASAN: use-after-free Read in j1939_xtp_rx_abort_one C done done 11 704d 712d 637d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
memory leak in fdb_create (2) C 1 684d 684d 648d c4b4c421857d net: bridge: deny dev_set_mac_address() when unregistering
KMSAN: uninit-value in __request_module (2) 3 667d 679d 648d 2dd5616ecdce net-backports: net_sched: validate TCA_KIND attribute in tc_chain_tmplt_add()
KASAN: vmalloc-out-of-bounds Write in kvm_dev_ioctl_get_cpuid C 41 682d 683d 648d 433f4ba19041 KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
kernel BUG at include/linux/mm.h:LINE! (5) C done done 129 887d 957d 648d 9354544cbccf net/tls: fix page double free on TX cleanup
KASAN: use-after-free Read in __queue_work (2) C done done 577 842d 1196d 648d 430ac66eb4c5 net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
KASAN: slab-out-of-bounds Read in bpf_prog_create C done 447 678d 760d 648d 0033b34a03ec ppp: fix out-of-bounds access in bpf_prog_create()
memory leak in register_netdevice C 19 679d 684d 648d 42c17fa69f98 net: fix a leak in register_netdevice()
KASAN: slab-out-of-bounds Read in vcs_scr_readw C done done 16 683d 683d 648d 0c9acb1af77a vcs: prevent write access to vcsu devices
kernel BUG at fs/pipe.c:LINE! C done 693 678d 685d 648d 8c7b8c34ae95 pipe: Remove assertion from pipe_poll()
KMSAN: uninit-value in usbnet_probe C 1 864d 864d 648d 78226f6eaac8 net: usb: asix: init MAC address buffers
KMSAN: uninit-value in nf_conntrack_tcp_packet syz 3 682d 684d 648d 9424e2e7ad93 net-backports: tcp: md5: fix potential overestimation of TCP option space
KASAN: slab-out-of-bounds Read in linear_transfer (3) C done 5 681d 683d 648d 4cc8d6505ab8 ALSA: pcm: oss: Avoid potential buffer overflows
KCSAN: data-race in mod_timer / run_timer_softirq 4 664d 730d 648d 56144737e673 net-backports: hrtimer: Annotate lockless access to timer->state
KASAN: slab-out-of-bounds Write in pipe_write C done 40 679d 685d 648d 8f868d68d335 pipe: Fix missing mask update after pipe_wait()
WARNING in tty_set_termios C done done 1997 808d 1008d 648d b36a1552d731 Bluetooth: hci_uart: check for missing tty operations
general protection fault in override_creds C done 6 681d 685d 648d 0b8c0ec7eedc io_uring: use current task creds instead of allocating a new one
WARNING in drm_mode_createblob_ioctl C done 7 710d 734d 648d 5bf8bec3f4ce drm: limit to INT_MAX in create_blob ioctl
WARNING: refcount bug in skb_set_owner_w C done 2 684d 685d 648d 501a90c94510 net-backports: inet: protect against too small mtu values.
KASAN: use-after-free Read in xlog_alloc_log (2) 55 679d 687d 648d 798a9cada469 xfs: fix mount failure crash on invalid iclog memory access
KMSAN: use-after-free in netlink_recvmsg C 1 704d 704d 674d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in kfree_skb syz 34 691d 739d 674d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in io_commit_cqring C done 3 703d 703d 674d 15dff286d0e0 io_uring: check for validity of ->rings in teardown
general protection fault in ext4_writepages C done 18 697d 706d 674d 4d06bfb97ecb ext4: Add error handling for io_end_vec struct allocation
KMSAN: use-after-free in __skb_try_recv_from_queue C 4 703d 726d 674d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in ip_sublist_rcv C done 287 717d 726d 674d 51210ad5a558 inet: do not call sublist_rcv on empty list
kernel BUG at include/linux/scatterlist.h:LINE! C done 307 684d 878d 674d d10523d0b3d7 net/tls: free the record on encryption error
KASAN: use-after-free Read in snd_timer_open C done 87 705d 705d 674d 0c4f09ceec3d ALSA: timer: Fix the breakage of slave link open
linux-next boot error: general protection fault in __x64_sys_settimeofday 6 702d 702d 674d 5e0fb1b57bea y2038: time: avoid timespec usage in settimeofday()
INFO: task hung in io_wq_destroy C done 20 688d 719d 674d b60fda6000a9 io-wq: wait for io_wq_create() to setup necessary workers
INFO: trying to register non-static key in io_cqring_ev_posted C done 6 689d 701d 674d eb065d301e8c io_uring: io_allocate_scq_urings() should return a sane state
KASAN: global-out-of-bounds Write in kbd_event C 6 688d 710d 674d b2b2dd71e085 tty: vt: keyboard: reject invalid keycodes
KCSAN: data-race in __ip4_datagram_connect / raw_bind 1 722d 722d 674d 25c7a6d1f90e net: avoid potential false sharing in neighbor related code
KASAN: slab-out-of-bounds Write in __ext4_expand_extra_isize 16 797d 1139d 674d 4ea99936a163 ext4: add more paranoia checking in ext4_expand_extra_isize handling
KASAN: use-after-free Read in tipc_nl_node_dump_monitor_peer C done 3 739d 739d 674d ab5b526da048 net: genetlink: always allocate separate attrs for dumpit ops
KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit 40 674d 724d 674d 90b2be27bb0e net/sched: annotate lockless accesses to qdisc->empty
general protection fault in tss_update_io_bitmap C done 65 690d 696d 674d e3cb0c7102f0 x86/ioperm: Fix use of deprecated config option
general protection fault in ip6_sublist_rcv C done 327 717d 719d 674d 51210ad5a558 inet: do not call sublist_rcv on empty list
KCSAN: data-race in inet_putpeer / inet_putpeer 20 707d 724d 674d 71685eb4ce80 inetpeer: fix data-race in inet_putpeer / inet_putpeer
KASAN: use-after-free Write in __ext4_expand_extra_isize (2) 14 709d 727d 674d 4ea99936a163 ext4: add more paranoia checking in ext4_expand_extra_isize handling
general protection fault in flexcop_usb_probe C 403 688d 918d 674d 1b976fc6d684 media: b2c2-flexcop-usb: add sanity checking
KCSAN: data-race in __remove_hrtimer / __tcp_ack_snd_check 4 689d 710d 674d 56144737e673 hrtimer: Annotate lockless access to timer->state
KCSAN: data-race in eth_header_cache / neigh_resolve_output 1 711d 711d 674d c305c6ae79e2 net-backports: net: add annotations on hh->hh_len lockless accesses
KMSAN: use-after-free in sk_forced_mem_schedule 2 697d 705d 674d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
WARNING in iov_iter_pipe C done 1117 692d 709d 674d 419e9c38aa07 iomap: Fix pipe page leakage during splicing
kernel BUG at kernel/time/timer.c:LINE! (4) syz 1 744d 740d 674d f3f5ba42c58d media: imon: invalid dereference in imon_touch_event
general protection fault in devlink_get_from_attrs C 7 741d 740d 674d 82a843de41d4 net: devlink: fix reporter dump dumpit
KASAN: use-after-free Read in appledisplay_bl_get_brightness C 1 757d 754d 674d 91feb01596e5 appledisplay: fix error handling in the scheduled work
general protection fault in vti6_ioctl 1 732d 732d 674d 9077f052abd5 net: propagate errors correctly in register_netdevice()
INFO: trying to register non-static key in ida_destroy C 4272 687d 810d 674d 8c279e9394ca media: uvcvideo: Fix error path in control parsing failure
KCSAN: data-race in tun_get_user / tun_net_get_stats64 1 719d 719d 674d de7d5084d827 net-backports: net: provide dev_lstats_read() helper
KCSAN: data-race in sk_wait_data / tcp_queue_rcv 4 713d 710d 674d f8cc62ca3e66 net: add a READ_ONCE() in skb_peek_tail()
KCSAN: data-race in __remove_hrtimer / tcp_pacing_check 1 713d 710d 674d 56144737e673 hrtimer: Annotate lockless access to timer->state
KMSAN: use-after-free in __netif_receive_skb_core 1 704d 704d 674d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg (2) 47 674d 710d 674d 9ed498c6280a net-backports: net: silence data-races on sk_backlog.tail
KCSAN: data-race in sk_wait_data / skb_queue_tail 3 721d 722d 674d f8cc62ca3e66 net-backports: net: add a READ_ONCE() in skb_peek_tail()
KMSAN: use-after-free in skb_dequeue C 1 734d 734d 674d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
KASAN: use-after-free Read in tipc_nl_publ_dump C 2 741d 740d 674d ab5b526da048 net: genetlink: always allocate separate attrs for dumpit ops
KCSAN: data-race in ip_finish_output2 / ip_finish_output2 26 678d 723d 674d 25c7a6d1f90e net: avoid potential false sharing in neighbor related code
general protection fault in snd_usb_create_mixer C 1 697d 695d 674d 9435f2bb6687 ALSA: usb-audio: Fix NULL dereference at parsing BADD
general protection fault in tipc_nl_publ_dump C 135 738d 740d 674d 6ea67769ff33 net: tipc: prepare attrs in __tipc_nl_compat_dumpit()
KASAN: use-after-free Read in nf_ct_deliver_cached_events C done 169 719d 725d 674d ad88b7a6aa3e netfilter: ecache: don't look for ecache extension on dying/unconfirmed conntracks
general protection fault in veth_get_stats64 C done 2 745d 745d 674d 9077f052abd5 net: propagate errors correctly in register_netdevice()
KCSAN: data-race in icmp_global_allow / icmp_global_allow 29 674d 725d 674d bbab7ef23503 net-backports: net: icmp: fix data-race in cmp_global_allow()
general protection fault in usb_set_interface C 3 758d 761d 674d c7a191464078 media: usbvision: Fix invalid accesses after device disconnect
KCSAN: data-race in __dev_queue_xmit / pfifo_fast_dequeue 6 687d 725d 674d 90b2be27bb0e net/sched: annotate lockless accesses to qdisc->empty
KCSAN: data-race in tcp_chrono_stop / tcp_recvmsg 3 709d 710d 674d a5a7daa52edb net-backports: tcp: fix data-race in tcp_recvmsg()
KCSAN: data-race in gro_normal_list.part.0 / napi_busy_loop 1 707d 707d 674d c39e342a050a net-backports: tun: fix data-race in gro_normal_list()
KASAN: use-after-free Read in slip_open C done 3 692d 694d 674d e58c19124189 slip: Fix use-after-free Read in slip_open
KCSAN: data-race in fanout_demux_rollover / fanout_demux_rollover 1 708d 708d 674d b756ad928d98 net-backports: packet: fix data-race in fanout_flow_is_huge()
WARNING in __rtnl_newlink C done 2 744d 744d 674d 9077f052abd5 net: propagate errors correctly in register_netdevice()
BUG: unable to handle kernel paging request in __ext4_expand_extra_isize 6 746d 727d 674d 4ea99936a163 ext4: add more paranoia checking in ext4_expand_extra_isize handling
KASAN: use-after-free Read in shmem_fault (2) 5 718d 778d 674d 8897c1b1a179 shmem: pin the file in shmem_fault() if mmap_sem is dropped
BUG: unable to handle kernel paging request in io_wq_cancel_all C done 2 718d 718d 674d 975c99a57096 io_uring: io_wq_create() returns an error pointer, not NULL
KASAN: invalid-free in io_sqe_files_unregister C done 3 706d 706d 674d 46568e9be70f io_uring: fix error clear of ->file_table in io_sqe_files_register()
KASAN: invalid-free in skb_free_head C done 1 715d 715d 674d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in ovs_vport_add C done 5 736d 744d 674d 9077f052abd5 net: propagate errors correctly in register_netdevice()
KASAN: use-after-free Read in nl8NUM_dump_wpan_phy C done 6 738d 740d 674d ab5b526da048 net: genetlink: always allocate separate attrs for dumpit ops
KASAN: use-after-free Read in tipc_udp_nl_dump_remoteip C done 3 739d 740d 674d ab5b526da048 net: genetlink: always allocate separate attrs for dumpit ops
KASAN: use-after-free Read in __cfg8NUM_wpan_dev_from_attrs C done 3 741d 740d 674d ab5b526da048 net: genetlink: always allocate separate attrs for dumpit ops
WARNING: ODEBUG bug in free_netdev C done 2 743d 743d 674d 11fc7d5a0a2d tun: fix memory leak in error path
KCSAN: data-race in sctp_assoc_migrate / sctp_hash_obj 12 682d 709d 674d 312434617cb1 sctp: cache netns in sctp_ep_common
general protection fault in ip6_tnl_ioctl C done 7 733d 744d 674d 9077f052abd5 net: propagate errors correctly in register_netdevice()
KCSAN: data-race in __dev_queue_xmit / net_tx_action 1 708d 708d 674d 90b2be27bb0e net/sched: annotate lockless accesses to qdisc->empty
KMSAN: use-after-free in copyout C 1 739d 739d 674d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in virtio_transport_release C done 7 696d 697d 674d 039fcccaed33 vsock: avoid to assign transport if its initialization fails
BUG: workqueue lockup (4) C 47 699d 1105d 674d 7e7c005b4b1f rtc: disable uie before setting time and enable after
WARNING in port100_send_cmd_async/usb_submit_urb C 83 689d 829d 676d 5f9f0b11f081 nfc: port100: handle command failure cleanly
general protection fault in kvm_coalesced_mmio_init syz done 48 704d 713d 687d 8a44119a98be KVM: Fix NULL-ptr deref after kvm_create_vm fails
general protection fault in j1939_netdev_notify syz done 11 700d 712d 687d c48c8c1e2e81 can: j1939: main: j1939_ndev_to_priv(): avoid crash if can_ml_priv is NULL
KASAN: use-after-free Read in j1939_sk_recv C done 2 706d 706d 687d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
KASAN: use-after-free Read in j1939_session_deactivate syz done 1 708d 708d 687d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
WARNING in smc_unhash_sk (3) C done 362 691d 781d 687d 8204df72bea1 net/smc: fix fastopen for non-blocking connect()
KASAN: use-after-free Read in do_mount syz done 6 732d 740d 687d 0ecee6699064 fs/namespace.c: fix use-after-free of mount in mnt_warn_timestamp_expiry()
general protection fault in j1939_jsk_del syz done 132 688d 712d 687d fd81ebfe7975 can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
memory leak in smc_create C 19 700d 713d 687d 6d6dd528d5af net/smc: fix refcount non-blocking connect() -part 2
KASAN: use-after-free Read in j1939_session_get_by_addr_locked C done 1 706d 706d 687d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
INFO: task hung in synchronize_rcu syz done 1206 687d 713d 687d 8a44119a98be KVM: Fix NULL-ptr deref after kvm_create_vm fails
KMSAN: uninit-value in ax88172a_bind C 5 719d 733d 687d a9a51bd727d1 ax88172a: fix information leak on short answers
KMSAN: uninit-value in gf128mul_4k_lle (3) C 2958 693d 1058d 687d 683916f6a840 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: uninit-value in aesti_encrypt C 54 741d 842d 687d 683916f6a840 net/tls: fix sk_msg trim on fallback to copy mode
WARNING: suspicious RCU usage in kvm_dev_ioctl C done 333 704d 714d 687d e2d3fcaf939d KVM: fix placement of refcount initialization
KMSAN: use-after-free in build_audio_procunit C 2 725d 725d 687d 976a68f06b2e ALSA: usb-audio: Fix incorrect size check for processing/extension units
WARNING: refcount bug in j1939_netdev_start syz done 6 689d 711d 687d fd81ebfe7975 can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
KMSAN: uninit-value in get_min_max_with_quirks C 11 720d 708d 687d 167beb175679 ALSA: usb-audio: Fix missing error check at mixer resolution test
WARNING: ODEBUG bug in input_ff_destroy C 6 696d 703d 687d fa3a5a1880c9 Input: ff-memless - kill timer in destroy()
general protection fault in memcg_flush_percpu_vmstats C error 19 717d 780d 687d 7961eee39784 mm: memcontrol: fix NULL-ptr deref in percpu stats flush
KCSAN: data-race in neigh_resolve_output / neigh_resolve_output 4 709d 723d 687d 1b53d64435d5 net-backports: net: fix data-race in neigh_event_send()
KCSAN: data-race in find_match / find_match 2 710d 713d 687d 1bef4c223b85 net-backports: ipv6: fixes rt6_probe() and fib6_nh->last_probe init
INFO: task hung in mpage_prepare_extent_to_map syz done 18606 711d 719d 687d 4655e5e5f387 mm,thp: recheck each page before collapsing file THP
KMSAN: uninit-value in cdc_ncm_set_dgram_size C 4 718d 717d 687d 332f989a3b00 CDC-NCM: handle incomplete transfer of MTU
KASAN: use-after-free Read in mcba_usb_disconnect C 2 714d 747d 687d 4d6636498c41 can: mcba_usb: fix use-after-free on disconnect
KMSAN: kernel-usb-infoleak in pcan_usb_wait_rsp C 2 731d 731d 687d f7a1337f0d29 can: peak_usb: fix slab info leak
KASAN: invalid-free in rsi_91x_deinit C 109 760d 907d 688d 8b51dc729147 rsi: fix a double free bug in rsi_91x_deinit()
WARNING in generic_make_request_checks C done 7760 688d 1165d 688d 8b2ded1c94c0 block: don't warn when doing fsync on read-only devices
BUG: spinlock recursion in release_sock C done 116 814d 815d 689d 5d92e631b8be net/tls: partially revert fix transition through disconnect with close
KMSAN: use-after-free in adu_disconnect C 16 733d 739d 690d 44efc269db79 USB: adutux: fix use-after-free on disconnect
KMSAN: use-after-free in mutex_spin_on_owner C 1 739d 738d 690d edc4746f253d USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in iowarrior_disconnect C 21 733d 739d 690d edc4746f253d USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in usb_autopm_put_interface C 63 719d 733d 690d 7a7591979748 USB: usblp: fix use-after-free on disconnect
KMSAN: use-after-free in __pm_runtime_resume 1 739d 739d 690d 5f9242775bb6 HID: logitech: Fix general protection fault caused by Logitech driver
KMSAN: use-after-free in hidraw_ioctl 1 739d 739d 690d 416dacb819f5 HID: hidraw: Fix invalid read in hidraw_ioctl
KMSAN: use-after-free in rxrpc_put_peer 1 730d 730d 690d 91fcfbe8852e rxrpc: Fix call crypto state cleanup
KMSAN: uninit-value in lg4ff_set_autocenter_default C 1 720d 719d 690d d9d4b1e46d95 HID: Fix assumption that devices have inputs
WARNING in sk_stream_kill_queues (3) C done 622 861d 1220d 690d 9354544cbccf net/tls: fix page double free on TX cleanup
KCSAN: data-race in udp_set_dev_scratch / udpv6_recvmsg 5 713d 724d 694d a793183caa9a udp: fix data-race in udp_set_dev_scratch()
KCSAN: data-race in __skb_wait_for_more_packets / skb_queue_tail 1 717d 717d 694d 7c422d0ce975 net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
KASAN: use-after-free Read in batadv_iv_ogm_queue_add 3 716d 747d 694d 40e220b4218b batman-adv: Avoid free/alloc race when handling OGM buffer
WARNING: refcount bug in smc_release C done 8 700d 724d 694d 301428ea3708 net/smc: fix refcounting for non-blocking connect()
INFO: trying to register non-static key in bond_3ad_update_lacp_rate C done 26 717d 719d 694d ad9bd8daf2f9 bonding: fix using uninitialized mode_lock
KCSAN: data-race in datagram_poll / skb_queue_tail 5 713d 722d 694d 3ef7cf57c72f net-backports: net: use skb_queue_empty_lockless() in poll() handlers
general protection fault in process_one_work 2 719d 719d 694d 6d6f0383b697 netdevsim: Fix use-after-free during device dismantle
KASAN: use-after-free Read in fuse_request_end syz done 6 724d 729d 694d 2b319d1f6f92 fuse: don't dereference req->args on finished request
KCSAN: data-race in udp6_lib_lookup2 / udpv6_queue_rcv_one_skb 1 723d 723d 694d 7170a977743b net: annotate accesses to sk->sk_incoming_cpu
KCSAN: data-race in tcp_v4_rcv / tcp_v4_rcv 4 713d 717d 694d 7170a977743b net-backports: net: annotate accesses to sk->sk_incoming_cpu
memory leak in internal_dev_create C 88 716d 802d 694d 9464cc37f367 net: openvswitch: free vport unless register_netdevice() succeeds
divide error in dummy_timer C 3 718d 723d 694d 54f83b8c8ea9 USB: gadget: Reject endpoints with 0 maxpacket value
KCSAN: data-race in __skb_recv_udp / __udp_enqueue_schedule_skb 7 712d 725d 694d 137a0dbe3426 net-backports: udp: use skb_queue_empty_lockless()
KCSAN: data-race in first_packet_length / udp_poll 2 716d 722d 694d 137a0dbe3426 net-backports: udp: use skb_queue_empty_lockless()
memory leak in copy_net_ns C done 422 715d 753d 694d 82ecff655e79 keys: Fix memory leak in copy_net_ns
KCSAN: data-race in update_defense_level / update_defense_level (2) 20 712d 725d 694d c24b75e0f923 ipvs: move old_secure_tcp into struct netns_ipvs
INFO: trying to register non-static key in bond_3ad_update_ad_actor_settings C done 69 717d 719d 694d ad9bd8daf2f9 bonding: fix using uninitialized mode_lock
KASAN: use-after-free Read in bpf_prog_kallsyms_find (2) C done 9 723d 734d 694d cd7455f1013e bpf: Fix use after free in subprog's jited symbol removal
KASAN: use-after-free Read in is_bpf_text_address C done 3 724d 725d 694d cd7455f1013e bpf: Fix use after free in subprog's jited symbol removal
KCSAN: data-race in __skb_wait_for_more_packets / __sock_queue_rcv_skb 10 713d 723d 694d 7c422d0ce975 net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
KASAN: use-after-free Read in io_uring_setup syz error 1 720d 720d 694d 044c1ab399af io_uring: don't touch ctx in setup after ring fd install
KCSAN: data-race in udpv6_queue_rcv_one_skb / udpv6_queue_rcv_one_skb 1 720d 719d 694d ee8d153d46a3 net-backports: net: annotate lockless accesses to sk->sk_napi_id
BUG: unable to handle kernel paging request in is_bpf_text_address C done 2 730d 730d 694d cd7455f1013e bpf: Fix use after free in subprog's jited symbol removal
INFO: task hung in ld_usb_write C 831 712d 725d 694d 52403cfbc635 USB: ldusb: fix control-message timeout
KCSAN: data-race in __skb_recv_udp / datagram_poll 1 713d 713d 694d 3f926af3f4d6 net: use skb_queue_empty_lockless() in busy poll contexts
KCSAN: data-race in __skb_wait_for_more_packets / __udp_enqueue_schedule_skb 2 717d 724d 694d 7c422d0ce975 net-backports: net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
general protection fault in kernfs_add_one C done 98 803d 1126d 694d ac43432cb1f5 driver core: Fix use-after-free and double free on glue directory
KASAN: use-after-free Read in ep_scan_ready_list C done 39 1158d 1193d 696d 430ac66eb4c5 net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
KASAN: use-after-free Read in iowarrior_disconnect C 3056 733d 789d 696d edc4746f253d USB: iowarrior: fix use-after-free on disconnect
WARNING in kernfs_get C done 316 804d 1133d 696d ac43432cb1f5 driver core: Fix use-after-free and double free on glue directory
KASAN: use-after-free Read in __schedule (2) C done 961 953d 1171d 696d 26b471c7e2f7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
divide error in usbtmc_generic_read C 2 795d 794d 696d de7b9aa633b6 usbtmc: more sanity checking for packet size
KASAN: use-after-free Read in p9_fd_poll C done 8 1161d 1193d 696d 430ac66eb4c5 net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
KASAN: use-after-free Read in vhci_hub_control C done 41 1094d 1139d 696d 81f7567c51ad usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control()
INFO: task hung in vivid_stop_generating_vid_cap C done done 81 1080d 1083d 705d d65842f7126a media: vb2: add waiting_in_dqbuf flag
WARNING in event_function_local C unreliable 15451 1102d 1358d 705d 214ff83d4473 KVM: x86: hyperv: implement PV IPI send hypercalls
BUG: MAX_LOCK_DEPTH too low! (2) C done 5 1192d 1222d 705d bab2c80e5a6c nsh: set mac len based on inner packet
inconsistent lock state in ila_xlat_nl_cmd_del_mapping C unreliable 2496 1154d 1160d 705d 7494de0454af mfd: da9063: Replace regmap_add_irq_chip with devm counterpart
INFO: task hung in fuse_reverse_inval_entry C done 23 1169d 1182d 705d c59fd85e4fd0 fuse: change interrupt requests allocation algorithm
BUG: corrupted list in p9_conn_cancel C done 18 1095d 1195d 705d 9f476d7c540c net/9p/trans_fd.c: fix race by holding the lock
general protection fault in p9_conn_cancel C done 2 1175d 1193d 705d 9f476d7c540c net/9p/trans_fd.c: fix race by holding the lock
WARNING: ODEBUG bug in p9_fd_close C done 82 1156d 1196d 705d 430ac66eb4c5 net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
general protection fault in vb2_mmap C inconclusive done 21 1026d 1071d 705d cd26d1c4d1bc media: vb2: vb2_mmap: move lock up
KASAN: stack-out-of-bounds Read in xfrm_state_find (5) C done 654 991d 1294d 705d 32bf94fb5c2e xfrm: validate template mode
KASAN: slab-out-of-bounds Write in end_requests C done 2 1170d 1174d 705d 45ff350bbd9d fuse: fix unlocked access to processing queue
KASAN: use-after-free Read in uprobe_perf_close C done 54 974d 1293d 705d 621b6d2ea297 perf/core: Fix use-after-free in uprobe_perf_close()
KASAN: use-after-free Read in _decode_session4 C done 3 1296d 1296d 705d c6741fbed6dc vti6: Properly adjust vti6 MTU from MTU of lower device
general protection fault in tcp_cleanup_ulp syz done done 6 1121d 1136d 705d 5607fff30363 bpf: sockmap only allow ESTABLISHED sock state
WARNING in request_end C done done 14 1082d 1118d 705d 4c316f2f3ff3 fuse: set FR_SENT while locked
WARNING in dma_buf_vunmap C done done 17 1031d 1069d 705d 62dcb4f41836 media: vb2: check memory model for VIDIOC_CREATE_BUFS
BUG: corrupted list in p9_write_work C done 5 1118d 1164d 705d 728356dedeff 9p: Add refcount to p9_req_t
KASAN: use-after-free Read in tick_sched_handle (3) C done 12 1007d 1062d 707d bc6e019b6ee6 fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
general protection fault in qca_setup C done done 6 978d 978d 707d b36a1552d731 Bluetooth: hci_uart: check for missing tty operations
general protection fault in tcp_splice_read C done done 23 922d 1031d 707d 07603b230895 net/smc: propagate file from SMC to TCP socket
KASAN: use-after-free Read in crypto_gcm_init_common C done done 14 1010d 1075d 709d 9354544cbccf net/tls: fix page double free on TX cleanup
KASAN: slab-out-of-bounds Read in find_first_zero_bit C done 1 1295d 1295d 709d d18771558910 bfs: extra sanity checking and static inode bitmap
kernel BUG at net/ipv4/ip_output.c:LINE! C done 28225 1001d 1192d 709d e7c87bd6cc4e bpf: in __bpf_redirect_no_mac pull mac only if present
general protection fault in put_pid syz done done 3 1030d 1040d 709d a8e911d13540 x86_64: increase stack size for KASAN_EXTRA
suspicious RCU usage at ./include/net/inet_sock.h:LINE C done 171 1351d 1442d 709d 3f32d0be6c16 tipc: lock wakeup & inputq at tipc_link_reset()
KASAN: use-after-free Read in _decode_session6 C done 4 1068d 1136d 709d e7c87bd6cc4e bpf: in __bpf_redirect_no_mac pull mac only if present
general protection fault in propagate_entity_cfs_rq C done 1 1192d 1192d 709d bab2c80e5a6c nsh: set mac len based on inner packet
KASAN: use-after-free Write in __vb2_cleanup_fileio C done inconclusive 2 1080d 1083d 709d d65842f7126a media: vb2: add waiting_in_dqbuf flag
KCSAN: data-race in sk_stream_wait_memory / tcp_shifted_skb 1 722d 710d 710d ab4e846a82d0 tcp: annotate sk->sk_wmem_queued lockless reads
KCSAN: data-race in sk_stream_wait_memory / tcp_fragment 1 713d 710d 710d ab4e846a82d0 tcp: annotate sk->sk_wmem_queued lockless reads
KCSAN: data-race in tcp_sendmsg_locked / tcp_stream_memory_free 2 721d 710d 710d 0f31746452e6 tcp: annotate tp->write_seq lockless reads
KCSAN: data-race in tcp_event_new_data_sent / tcp_stream_memory_free 3 714d 710d 710d e0d694d638db tcp: annotate tp->snd_nxt lockless reads
KCSAN: data-race in tcp_ack / tcp_poll (2) 5 717d 710d 710d ab4e846a82d0 tcp: annotate sk->sk_wmem_queued lockless reads
KCSAN: data-race in sk_stream_wait_memory / tcp_ack 2 714d 710d 710d ab4e846a82d0 tcp: annotate sk->sk_wmem_queued lockless reads
KASAN: slab-out-of-bounds Read in ld_usb_read (3) C 74 720d 731d 710d 7a6f22d7479b USB: ldusb: fix read info leaks
KASAN: slab-out-of-bounds Read in build_audio_procunit C 6 716d 725d 710d ba8bf0967a15 ALSA: usb-audio: Fix copy&paste error in the validator
KASAN: slab-out-of-bounds Write in ga_probe C 5 739d 761d 710d d9d4b1e46d95 HID: Fix assumption that devices have inputs
INFO: task hung in nbd_ioctl C done 71 712d 747d 710d cf1b2326b734 nbd: verify socket is supported during setup
KASAN: use-after-free Read in usb_autopm_put_interface C 2373 719d 732d 710d 7a7591979748 USB: usblp: fix use-after-free on disconnect
memory leak in gfs2_init_fs_context C 13 723d 745d 710d 30aecae86e91 gfs2: Fix memory leak when gfs2meta's fs_context is freed
KMSAN: uninit-value in sr9800_bind C 27 722d 745d 712d 77b6d09f4ae6 net: usb: sr9800: fix uninitialized local variable
WARNING in filldir64 76 730d 740d 712d b9959c7a347d filldir[64]: remove WARN_ON_ONCE() for bad directory entries
memory leak in llc_ui_create (2) C done 19 728d 848d 712d c6ee11c39fcc llc: fix sk_buff leak in llc_sap_state_process()
KCSAN: data-race in tcp_add_backlog / tcp_rcv_space_adjust (2) 18 725d 731d 712d ebb3b78db7bf tcp: annotate sk->sk_rcvbuf lockless reads
KCSAN: data-race in __nf_ct_refresh_acct / __nf_ct_refresh_acct 2460 712d 743d 712d e37542ba111f net-backports: netfilter: conntrack: avoid possible false sharing
BUG: unable to handle kernel NULL pointer dereference in xsk_poll C done 10 730d 748d 712d df551058f7a3 xsk: Fix crash in poll when device does not support ndo_xsk_wakeup
KASAN: use-after-free Read in rxrpc_release_call syz done 13 730d 785d 712d 91fcfbe8852e rxrpc: Fix call crypto state cleanup
KASAN: use-after-free Read in rxrpc_send_keepalive C error 694 727d 799d 712d c48fc11b69e9 rxrpc: Fix call ref leak
KCSAN: data-race in __tcp_select_window / tcp_add_backlog 23502 712d 743d 712d 70c2655849a2 net: silence KCSAN warnings about sk->sk_backlog.len reads
memory leak in sctp_get_port_local (3) C 4 728d 734d 712d 63dfb7938b13 sctp: change sctp_prot .no_autobind with true
memory leak in llc_ui_sendmsg C 125 728d 879d 712d c6ee11c39fcc llc: fix sk_buff leak in llc_sap_state_process()
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg 17719 713d 743d 712d 8265792bf887 net-backports: net: silence KCSAN warnings around sk_add_backlog() calls
INFO: task hung in addrconf_verify_work (2) C 22 734d 734d 712d 39f13ea2f61b net: avoid potential infinite loop in tc_ctl_action()
KASAN: use-after-free Read in pn533_send_complete C 4 720d 740d 712d 6af3aa57a098 NFC: pn533: fix use-after-free and memleaks
KCSAN: data-race in tcp_poll / tcp_recvmsg (2) 22 725d 731d 712d 7db48e983930 tcp: annotate tp->copied_seq lockless reads
KASAN: use-after-free Read in rxrpc_put_peer C error 38 728d 780d 712d 55f6c98e3674 rxrpc: Fix trace-after-put looking at the put peer record 9ebeddef58c4 rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record
KCSAN: data-race in tcp_poll / tcp_queue_rcv 1897 712d 743d 712d dba7d9b8c739 net-backports: tcp: annotate tp->rcv_nxt lockless reads
memory leak in llc_conn_ac_send_sabme_cmd_p_set_x C 225 728d 879d 712d b74555de21ac llc: fix sk_buff leak in llc_conn_service()
general protection fault in rxrpc_error_report C done 6 728d 740d 712d f0308fb07080 rxrpc: Fix possible NULL pointer access in ICMP handling
KCSAN: data-race in tcp_add_backlog / tcp_grow_window.isra.0 21713 712d 743d 712d 70c2655849a2 net-backports: net: silence KCSAN warnings about sk->sk_backlog.len reads
WARNING: suspicious RCU usage in xfrm_alloc_userspi C done error 86 941d 942d 713d f10e0010fae8 net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
general protection fault in get_work_pool C done 24 921d 1324d 713d 07bf7908950a xfrm: Validate address prefix lengths in the xfrm selector.
general protection fault in xfrm_init_replay syz inconclusive done 2 1311d 1310d 713d d97ca5d714a5 xfrm_user: uncoditionally validate esn replay attribute struct
WARNING: suspicious RCU usage in xfrm_get_spdinfo C done error 46 941d 942d 713d f10e0010fae8 net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
WARNING: suspicious RCU usage in xfrm_get_sadinfo C done error 28 941d 942d 713d f10e0010fae8 net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
WARNING: suspicious RCU usage in xfrm_get_policy syz done error 8 942d 942d 713d f10e0010fae8 net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
memory leak in sctp_stream_init_ext C 34 734d 869d 719d 3c52b0af059e lib/generic-radix-tree.c: add kmemleak annotations
possible deadlock in usb_deregister_dev (2) C 956 733d 761d 720d 33a7813219f2 USB: legousbtower: fix deadlock on disconnect
KMSAN: uninit-value in mts_usb_probe C 29 739d 745d 720d 177238c3d47d USB: microtek: fix info-leak at probe
WARNING in mark_lock (2) 14 726d 754d 720d 8e00c4e9dd85 writeback: fix use-after-free in finish_writeback_work()
BUG: bad usercopy in read_rio 2 735d 738d 720d 015664d15270 USB: rio500: Remove Rio 500 kernel driver
KMSAN: uninit-value in iowarrior_disconnect C 18 738d 744d 720d edc4746f253d USB: iowarrior: fix use-after-free on disconnect
general protection fault in open_rio 2 752d 753d 720d 015664d15270 USB: rio500: Remove Rio 500 kernel driver
KASAN: use-after-free Read in adu_disconnect C 5304 733d 803d 720d 44efc269db79 USB: adutux: fix use-after-free on disconnect
INFO: rcu detected stall in dummy_timer C 16 734d 799d 720d 32a0721c6620 USB: yurex: Don't retry on unexpected errors
KASAN: invalid-free in disconnect_rio (2) C 51 737d 758d 720d 015664d15270 USB: rio500: Remove Rio 500 kernel driver
general protection fault in finish_writeback_work 10 729d 754d 720d 8e00c4e9dd85 writeback: fix use-after-free in finish_writeback_work()
INFO: trying to register non-static key in finish_writeback_work syz error 1 755d 753d 720d 8e00c4e9dd85 writeback: fix use-after-free in finish_writeback_work()
INFO: rcu detected stall in rt6_probe_deferred 336 762d 767d 726d d4d6ec6dac07 sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in addrconf_rs_timer (2) 362 745d 767d 726d d4d6ec6dac07 sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
general protection fault in bpf_tcp_close (2) C done 26 1149d 1193d 726d e06fa9c16ce4 bpf, sockmap: fix potential use after free in bpf_tcp_close
BUG: unable to handle kernel NULL pointer dereference in rds_bind C done 51 750d 761d 732d 05733434ee9a net/rds: Check laddr_check before calling it
divide error in tabledist 3 749d 758d 732d b41d936b5ecf sch_netem: fix a divide by zero in tabledist()
WARNING: lock held when returning to user space in rcu_lock_acquire C done 3 745d 745d 732d 73956fc07dd7 membarrier: Fix RCU locking bug caused by faulty merge
memory leak in v9fs_cache_session_get_cookie C 242 732d 879d 732d 962a991c5de1 9p/cache.c: Fix memory leak in v9fs_cache_session_get_cookie
WARNING in em28xx_usb_disconnect C 8 767d 799d 732d 46e4a26615cc media: em28xx: modules workqueue not inited for 2nd device
KASAN: use-after-free Read in si470x_int_in_callback C 25 741d 830d 732d 0d616f2a3fdb media: radio/si470x: kill urb on error
kernel BUG at include/linux/skbuff.h:LINE! (2) C done 58 782d 792d 732d c7a42eb49212 net: ipv6: fix listify ip6_rcv_finish in case of forwarding
general protection fault in make_kuid C done 4 792d 817d 732d 1dd9bc08cf14 vfs: set fs_context::user_ns for reconfigure
general protection fault in ath6kl_usb_alloc_urb_from_pipe C 1160 758d 918d 732d 39d170b3cb62 ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()
KMSAN: uninit-value in read_sensor_register C 25 732d 862d 732d 4843a543fad3 media: gspca: zero usb_buf on error
WARNING in rcu_note_context_switch C done 1 747d 747d 732d 73956fc07dd7 membarrier: Fix RCU locking bug caused by faulty merge
KMSAN: kernel-usb-infoleak in ttusb_dec_send_command C 2 800d 809d 732d a10feaf8c464 media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
KASAN: use-after-free Read in atusb_disconnect C 112 733d 774d 732d 7fd25e6fc035 ieee802154: atusb: fix use-after-free at disconnect
possible deadlock in io_submit_one (2) 353 752d 790d 732d 76e43c8ccaa3 fuse: fix deadlock with aio poll and fuse_iqueue::waitq.lock
BUG: using smp_processor_id() in preemptible [ADDR] code: mime_typevmnet0/NUM 1 776d 774d 732d 00d9e47f8ec2 posix-cpu-timers: Always clear head pointer on dequeue
KMSAN: uninit-value in inet_ehash_insert C 7 741d 747d 732d 6af1799aaf3f net-backports: ipv6: drop incoming packets having a v4mapped source address
KASAN: slab-out-of-bounds Read in hdpvr_probe C 10 769d 844d 732d 8b8900b729e4 media: hdpvr: add terminating 0 at end of string
BUG: assuming atomic context at net/kcm/kcmsock.c:LINE C done 178 748d 754d 732d 0355d6c1d591 net-backports: kcm: disable preemption in kcm_parse_func_strparser()
WARNING: suspicious RCU usage in netem_enqueue C done 16 750d 764d 732d 159d2c7d8106 net-backports: sch_netem: fix rcu splat in netem_enqueue()
general protection fault in xsk_poll C done 430 762d 789d 732d 42fddcc7c64b xsk: use state member for socket synchronization
INFO: task syz-executor can't die for more than 143 seconds. C done 61 749d 857d 732d 8619e5bdeee8 /dev/mem: Bail out upon SIGKILL. 7c3a6aedcd6a kexec: bail out upon SIGKILL when allocating memory. 8f9e86ee7959 staging: android: ion: Bail out upon SIGKILL when allocating memory.
BUG: sleeping function called from invalid context in tcf_chain0_head_change_cb_del C done 187 748d 761d 732d e3ae1f96accd net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
KASAN: global-out-of-bounds Read in load_next_firmware_from_table C 5 780d 830d 732d 764f3f1ecffc libertas: Add missing sentinel at end of if_usb.c fw_table
WARNING in handle_desc C done 6 758d 766d 732d 3ca94192278c KVM: X86: Fix userspace set invalid CR4
KASAN: use-after-free Read in ext4_data_block_valid 108 816d 1263d 732d 7727ae52975d ext4: fix potential use after free after remounting with noblock_validity
general protection fault in kstrtouint (2) C done 40 778d 821d 732d 74983ac20aea vfs: Make fs_parse() handle fs_param_is_fd-type params better
BUG: corrupted list in __netif_receive_skb_list_core 3 739d 793d 732d c7a42eb49212 net: ipv6: fix listify ip6_rcv_finish in case of forwarding
divide error in usbnet_update_max_qlen C 17 749d 761d 732d 280ceaed79f1 usbnet: sanity checking of packet sizes and device mtu
KASAN: slab-out-of-bounds Read in technisat_usb2_rc_query C 2236 778d 916d 732d 0c4df39e504b media: technisat-usb2: break out of loop at end of buffer
KASAN: slab-out-of-bounds Read in do_tcp_getsockopt 3 755d 775d 732d