syzbot


fixed (1549):
Title Repro Bisected Count Last Reported Closed Patch
WARNING in cbs_dequeue_soft C cause 13 8d02h 15d 7d08h 1c6c09a0 net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate
KMSAN: uninit-value in batadv_iv_send_outstanding_bat_ogm_packet C 9 32d 32d 7d08h a15d56a6 batman-adv: Only read OGM tvlv_len after buffer len check
possible deadlock in open_rio 1107 16d 52d 16d 2ca359f4 Revert "USB: rio500: simplify locking"
possible deadlock in usb_deregister_dev C 82 42d 49d 16d c468a8aa usb: iowarrior: fix deadlock on disconnect
general protection fault in packet_lookup_frame C cause 7 40d 40d 16d 32d3182c net/packet: fix race in tpacket_snd()
WARNING in bpf_jit_free C cause 21697 16d 433d 16d c751798a bpf: fix use after free in prog symbol exposure
BUG: Dentry still in use [unmount of nfsd nfsd] 1 46d 42d 16d d6846bfb nfsd: fix dentry leak upon mkdir failure.
kernel BUG at mm/huge_memory.c:LINE! 27 92d 263d 16d a53190a4 mm: mempolicy: handle vma with unmovable pages mapped correctly in mbind
memory leak in ip6_mc_add_src C 1 27d 27d 16d a84d0164 mld: fix memory leak in mld_del_delrec()
WARNING in bpf_prog_kallsyms_add syz cause+fix 2 59d 261d 16d c751798a bpf: fix use after free in prog symbol exposure
WARNING in __iforce_usb_xmit/usb_submit_urb C 3 44d 49d 16d 849f5ae3 Input: iforce - add sanity checks
WARNING in kbtab_open/usb_submit_urb C 5 43d 61d 16d c88090df Input: kbtab - sanity check for endpoint type
BUG: unable to handle kernel paging request in bpf_prog_kallsyms_find syz cause+fix 3 234d 308d 16d c751798a bpf: fix use after free in prog symbol exposure
KASAN: use-after-free Read in rxrpc_queue_local C cause 1 42d 42d 16d 06d9532f rxrpc: Fix read-after-free in rxrpc_queue_local()
BUG: unable to handle kernel paging request in bpf_prog_kallsyms_add syz cause 234 17d 378d 16d c751798a bpf: fix use after free in prog symbol exposure
general protection fault in tls_write_space syz 33 34d 45d 16d 57c722e9 net/tls: swap sk_write_space on close
WARNING in usbtouch_open C 768 41d 55d 16d b55d996f Input: usbtouchscreen - initialize PM mutex before using it
KASAN: use-after-free Read in usb_free_coherent 310 42d 53d 16d fc05481b usb: yurex: Fix use-after-free in yurex_delete
KMSAN: uninit-value in rtm_new_nexthop C 8 33d 32d 16d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KASAN: slab-out-of-bounds Read in bpf_int_jit_compile C cause 1 64d 61d 16d 7c2e988f bpf: fix x64 JIT code generation for jmp to 1st insn
KASAN: use-after-free Read in snd_seq_ioctl_get_client_pool 1 34d 31d 16d 75545304 ALSA: seq: Fix potential concurrent access to the deleted pool
KASAN: use-after-free Read in bpf_prog_kallsyms_del syz cause+fix 3 264d 343d 16d c751798a bpf: fix use after free in prog symbol exposure
kernel BUG at net/rxrpc/local_object.c:LINE! C cause 11167 20d 87d 16d 730c5fd4 rxrpc: Fix local endpoint refcounting
KASAN: null-ptr-deref Write in rxrpc_unuse_local C cause 4422 41d 45d 16d 68553f1a rxrpc: Fix local refcounting
KASAN: use-after-free Read in bpf_get_prog_name 1 59d 59d 16d c751798a bpf: fix use after free in prog symbol exposure
KMSAN: uninit-value in batadv_netlink_dump_hardif C 58 27d 62d 16d 3ee1bb7a batman-adv: fix uninit-value in batadv_netlink_get_ifindex()
WARNING in bpf_prog_kallsyms_find C cause 5632 16d 138d 16d c751798a bpf: fix use after free in prog symbol exposure
KASAN: slab-out-of-bounds Read in do_jit C cause 16 16d 61d 16d 7c2e988f bpf: fix x64 JIT code generation for jmp to 1st insn
KASAN: use-after-free Read in ld_usb_release C 14 35d 44d 16d 303911cf USB: core: Fix races in character device registration and deregistraion
KMSAN: uninit-value in rtm_dump_nexthop C 6 27d 43d 16d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
WARNING in is_bpf_text_address C cause 104 27d 94d 16d c751798a bpf: fix use after free in prog symbol exposure
KASAN: slab-out-of-bounds Read in usbnet_generic_cdc_bind C 2 40d 42d 16d 54364278 USB: CDC: fix sanity checks in CDC union parser
WARNING in __blkdev_put (2) syz 3082 42d 49d 16d e91455ba bdev: Fixup error handling in blkdev_get()
KASAN: use-after-free Read in device_release_driver_internal C 5 38d 61d 16d c52873e5 usb: cdc-acm: make sure a refcount is taken early enough
KASAN: use-after-free Read in bpf_prog_kallsyms_add syz cause+fix 120 143d 378d 16d c751798a bpf: fix use after free in prog symbol exposure
WARNING in wdm_write/usb_submit_urb C 15 20d 34d 16d 1426bd2c USB: cdc-wdm: fix race between write and disconnect due to flag abuse
BUG: corrupted list in rxrpc_local_processor C cause 1679 37d 45d 16d b00df840 rxrpc: Fix local endpoint replacement
KASAN: use-after-free Write in __xfrm_policy_unlink (2) 7 84d 130d 21d b805d78d xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink
BUG: unable to handle kernel paging request in hrtimer_interrupt syz cause 2 59d 95d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING in smc_unhash_sk (2) C cause 1047 26d 162d 26d cd206360 net/smc: avoid fallback in case of non-blocking connect
WARNING: ODEBUG bug in tls_sw_free_resources_tx 23 61d 320d 26d f87e62d4 net/tls: remove close callback sock unlock/lock around TX work flush
general protection fault in rcu_core syz cause 1 75d 75d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in mm_update_next_owner syz cause+fix 1 106d 106d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
KMSAN: kernel-usb-infoleak in pcan_usb_pro_send_req C 16 29d 55d 26d 30a8beeb can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
KASAN: use-after-free Write in validate_chain syz cause 3 83d 94d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING: held lock freed! (2) C cause 1 80d 76d 26d 4638faac netrom: hold sock when setting skb->destructor
general protection fault in tls_trim_both_msgs C cause 36 48d 60d 26d 5d92e631 net/tls: partially revert fix transition through disconnect with close
KASAN: use-after-free Read in psi_task_change syz cause 1 60d 59d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: slab-out-of-bounds Read in class_equal syz cause 45 47d 120d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: slab-out-of-bounds Write in check_noncircular syz cause 1 66d 66d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING in mark_lock syz cause 2 35d 90d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in holtek_kbd_input_event C 67 47d 60d 26d 01ec0a5f HID: holtek: test for sanity of intfdata
KASAN: use-after-free Read in release_sock C cause 10 50d 59d 26d 4638faac netrom: hold sock when setting skb->destructor
KASAN: slab-out-of-bounds Write in validate_chain syz cause 6 78d 93d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in tcf_ife_init C cause 72 48d 62d 26d c8ec4632 ife: error out when nla attributes are empty
KASAN: invalid-free in tls_sk_proto_cleanup 5 51d 54d 26d 5d92e631 net/tls: partially revert fix transition through disconnect with close
BUG: unable to handle kernel paging request in __do_softirq syz cause+fix 1 96d 95d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
kernel panic: stack is corrupted in validate_chain syz cause 1 89d 89d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: slab-out-of-bounds Read in corrupted (2) syz cause 3 59d 108d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
BUG: unable to handle kernel paging request in tls_prots syz cause 1 89d 89d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
kernel panic: corrupted stack end in dput syz cause 1 84d 84d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in tls_sk_proto_close syz cause 260 26d 59d 26d 5d92e631 net/tls: partially revert fix transition through disconnect with close
WARNING in debug_check_no_obj_freed C cause 47 27d 94d 26d f9cedf1a net/smc: do not schedule tx_work in SMC_CLOSED state
BUG: unable to handle kernel paging request in cpuacct_account_field syz cause+fix 1 94d 94d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
memory leak in fdb_create C cause 4 51d 91d 26d d7bae09f net: bridge: delete local fdb on device init failure
KASAN: use-after-free Read in tls_wait_data 1 52d 45d 26d 5d92e631 net/tls: partially revert fix transition through disconnect with close
BUG: unable to handle kernel NULL pointer dereference in corrupted (4) syz cause+fix 1 90d 89d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
possible deadlock in rxrpc_put_peer 1 62d 59d 26d 60034d3d rxrpc: Fix potential deadlock
WARNING: held lock freed in nr_release C cause 344 47d 68d 26d 4638faac netrom: hold sock when setting skb->destructor
KASAN: use-after-free Read in corrupted (3) syz cause 1 89d 89d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING: ODEBUG bug in __sk_destruct C 2855 46d 511d 26d f9cedf1a net/smc: do not schedule tx_work in SMC_CLOSED state
WARNING in cgroup_rstat_updated syz cause 1 47d 47d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in rb_erase (2) syz cause 4 55d 263d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: slab-out-of-bounds Read in usage_accumulate syz cause 3 89d 108d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: use-after-free Read in nr_release C cause 25 28d 107d 26d 4638faac netrom: hold sock when setting skb->destructor
WARNING: refcount bug in nr_rx_frame C cause 15 50d 67d 26d 4638faac netrom: hold sock when setting skb->destructor
KASAN: use-after-free Read in hiddev_release C 11 37d 52d 26d 9c09b214 HID: hiddev: avoid opening a disconnected device 6d4472d7 HID: hiddev: do cleanup in failure of opening a device
KASAN: use-after-free Read in nr_insert_socket C cause 22 50d 67d 26d 4638faac netrom: hold sock when setting skb->destructor
general protection fault in tls_tx_records 1 53d 45d 26d 5d92e631 net/tls: partially revert fix transition through disconnect with close
BUG: unable to handle kernel paging request in bpf_prog_ADDR C cause 13 49d 65d 26d 06a22d89 bpf: fix access to skb_shared_info->gso_segs
KASAN: use-after-free Read in nr_rx_frame (2) C cause 3 54d 62d 26d 4638faac netrom: hold sock when setting skb->destructor
memory leak in create_ctx syz 1 106d 106d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING in xt_compat_add_offset C cause 18 49d 212d 26d 3b48300d netfilter: ebtables: also count base chain policies
KMSAN: kernel-usb-infoleak in pcan_usb_pro_init C 13 30d 55d 26d ead16e53 can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
kernel panic: corrupted stack end in corrupted syz cause 17 47d 94d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING in gpio_to_desc C 3 44d 75d 26d c3953a3c NFC: nfcmrvl: fix gpio-handling regression
KASAN: use-after-free Read in tls_sk_proto_cleanup 9 49d 60d 26d 5d92e631 net/tls: partially revert fix transition through disconnect with close
general protection fault in rb_next (3) syz cause+fix 1 99d 98d 26d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in tls_setsockopt syz cause 7 55d 68d 26d 5d92e631 net/tls: partially revert fix transition through disconnect with close
KMSAN: uninit-value in read_eprom_word C 31 28d 55d 26d 224c0497 net: usb: pegasus: fix improper read if get_registers() fail
general protection fault in finish_task_switch (2) C fix 1538 364d 408d 31d 26b471c7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
KASAN: use-after-free Read in tls_push_sg 2 55d 128d 34d 9354544c net/tls: fix page double free on TX cleanup
possible deadlock in xsk_notifier C cause 495 65d 77d 40d 5464c3a0 xdp: fix potential deadlock on socket mutex
KASAN: use-after-free Write in _free_event C 112 204d 441d 40d 1cf8dfe8 perf/core: Fix race between close() and fork()
WARNING in __mark_chain_precision C cause 105 40d 76d 40d b3b50f05 bpf: fix precision bit propagation for BPF_ST instructions
linux-next boot error: WARNING in corrupted 12 79d 80d 40d 18c49926 cpufreq: Add QoS requests for userspace constraints
INFO: task hung in snd_seq_write 6 186d 391d 40d ede34f39 ALSA: seq: Break too long mutex context in the write loop
memory leak in nfs_get_client C 12 77d 104d 40d 9f7761cf NFS: Cleanup if nfs_match_client is interrupted
usb-fuzzer boot error: general protection fault in dma_direct_max_mapping_size 21 58d 61d 40d 1b5d9a6e scsi: core: fix the dma_max_mapping_size call
memory leak in policydb_read C cause 1 64d 62d 40d 45385237 selinux: fix memory leak in policydb_init()
WARNING in binder_transaction_buffer_release syz cause 38 83d 125d 40d 49ed9694 binder: prevent transactions to context manager from its own process.
general protection fault in snd_usb_pipe_sanity_check C 72 42d 55d 40d 5d78e1c2 ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check
INFO: rcu detected stall in snd_seq_write syz cause 18 61d 391d 40d ede34f39 ALSA: seq: Break too long mutex context in the write loop
KASAN: stack-out-of-bounds Read in hfcsusb_probe C 634 55d 161d 40d f384e62a ISDN: hfcsusb: checking idx of ep configuration
BUG: unable to handle kernel NULL pointer dereference in hci_uart_set_flow_control C cause 7 185d 185d 40d b36a1552 Bluetooth: hci_uart: check for missing tty operations
kernel BUG at drivers/usb/wusbcore/wusbhc.c:LINE! C 1 62d 62d 40d f90bf1ec usb: wusbcore: fix unbalanced get/put cluster_id
memory leak in sctp_get_port_local C 28 50d 117d 48d 9b6c0887 sctp: not bind the socket in sctp_connect
WARNING: Support for this device (Terratec Grabster AV400) is experimental. C 371 56d 145d 48d 1753c7c4 media: pvrusb2: use a different format for warnings
general protection fault in send_hsr_supervision_frame C cause 1395 69d 77d 48d 311633b6 hsr: switch ->dellink() to ->ndo_uninit()
memory leak in ip_mc_add_src (2) C 7 59d 88d 48d e5b1c6c6 igmp: fix memory leak in igmpv3_del_delrec()
general protection fault in btf_array_resolve C cause 109 73d 96d 48d e4f07120 bpf: fix NULL deref in btf_type_is_resolve_source_only
general protection fault in sctp_sched_prio_sched C cause 3 85d 99d 48d 4d141581 sctp: fix error handling on stream scheduler initialization
general protection fault in ip6_datagram_dst_update C cause 12 72d 75d 48d 8975a3ab ipv6: fix potential crash in ip6_datagram_dst_update()
KMSAN: uninit-value in ax88772_bind C 80 51d 111d 48d 78226f6e net: usb: asix: init MAC address buffers
KASAN: use-after-free Read in ip_expire 1 97d 97d 48d d5dd8879 inet: fix various use-after-free in defrags units
kernel BUG at drivers/android/binder_alloc.c:LINE! (4) C cause 26 89d 97d 48d bb4a2e48 binder: return errors from buffer copy functions
KASAN: use-after-free Read in cpia2_usb_disconnect C 3 75d 160d 48d eff73de2 media: cpia2_usb: first wake up, then free in disconnect
general protection fault in ovs_ct_exit C cause 9888 90d 95d 48d b272a0ad netns: restore ops before calling ops_exit_list
memory leak in binder_transaction C 3 89d 101d 48d 1909a671 binder: fix memory leak in error path
KASAN: use-after-free Read in xlog_alloc_log 16 68d 88d 48d 89b171ac xfs: fix iclog allocation size
KMSAN: uninit-value in bond_start_xmit (2) C 2309 48d 373d 48d 9d1bc24b bonding: validate ip header before check IPPROTO_IGMP
WARNING in __flush_work (3) C 1251 51d 161d 48d 11a087f4 media: uvcvideo: Fix access to uninitialized fields on probe error
memory leak in pfkey_xfrm_policy2msg_prep C 4 89d 120d 48d 7c80eb1c af_key: fix leaks in key_pol_get_resp and dump_sp.
KASAN: use-after-free Read in dvb_usb_device_exit C 825 49d 164d 48d 6cf97230 media: dvb: usb: fix use after free in dvb_usb_device_exit
KASAN: slab-out-of-bounds Read in au0828_rc_unregister (2) 11 120d 130d 48d 6d0d1ff9 media: au0828: fix null dereference in error path
INFO: trying to register non-static key in rtl_c2hcmd_launcher C 48950 55d 164d 48d 6c0ed66f rtlwifi: rtl8192cu: fix error handle when usb probe failed
KASAN: use-after-free Read in kfree_skb_list C cause 383 95d 113d 48d b7034146 net: fix use-after-free in kfree_skb_list
KASAN: null-ptr-deref Read in zr364xx_vidioc_querycap C 76 56d 147d 48d 5d2e73a5 media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
memory leak in __ip6_append_data C 10 91d 117d 48d dc93f46b inet: frags: fix use-after-free read in inet_frag_destroy_rcu
WARNING: ath10k USB support is incomplete, don't expect anything to work! C 347 56d 137d 48d 265df32e ath10k: Change the warning message string
KASAN: use-after-free Write in xfrm_hash_rebuild syz cause 8 81d 130d 48d fd709721 xfrm: policy: fix bydst hlist corruption on hash rebuild
memory leak in bcsp_recv C 3 93d 120d 48d 4ce9146e Bluetooth: hci_bcsp: Fix memory leak in rx_skb
memory leak in start_sync_thread C 7 85d 117d 48d 5db7c8b9 ipvs: fix tinfo memory leak in start_sync_thread
KASAN: use-after-free Read in v4l2_release C 275 57d 160d 48d c666355e media: radio-raremono: change devm_k*alloc to k*alloc
net-next build error (2) 2 115d 114d 48d c9bb6165 netfilter: nf_conntrack_bridge: fix CONFIG_IPV6=y
KASAN: use-after-free Read in brnf_exit_net syz cause 3 92d 95d 48d 7e6daf50 netfilter: bridge: prevent UAF in brnf_exit_net()
WARNING in static_key_slow_try_dec C cause 58 71d 75d 48d d44e3fa5 ipv6: fix static key imbalance in fl_create()
WARNING: suspicious RCU usage in in_dev_dump_addr C cause 107 109d 111d 48d d3e6e285 net: ipv4: fix rcu lockdep splat due to wrong annotation
memory leak in nf_hook_entries_grow C 99 76d 111d 48d cf47a0b8 ipvs: defer hook registration to avoid leaks
general protection fault in tcp_v6_send_reset C cause 353 104d 108d 48d 39209673 ipv6: tcp: fix potential NULL deref in tcp_v6_send_reset()
KASAN: use-after-free Read in inet_frag_destroy_rcu C cause 61 116d 119d 48d dc93f46b inet: frags: fix use-after-free read in inet_frag_destroy_rcu
general protection fault in btf_struct_resolve C cause 49 73d 96d 48d e4f07120 bpf: fix NULL deref in btf_type_is_resolve_source_only
KASAN: use-after-free Read in rhashtable_last_table (2) 1 122d 122d 48d dc93f46b inet: frags: fix use-after-free read in inet_frag_destroy_rcu
KASAN: use-after-free Read in unregister_shrinker syz cause 3 104d 109d 48d 689d7ba4 nfsd: fix cleanup of nfsd_reply_cache_init on failure
general protection fault in oom_unkillable_task 1 105d 100d 48d ac311a14 oom: decouple mems_allowed from oom_unkillable_task
general protection fault in rxrpc_connect_call C cause 15 97d 243d 48d e835ada0 rxrpc: Fix send on a connected, but unbound socket
WARNING: Detected a wedged cx25840 chip; the device will not work. C 62 56d 145d 48d 1753c7c4 media: pvrusb2: use a different format for warnings
WARNING: suspicious RCU usage in fib_dump_info_fnhe C cause 7 88d 89d 48d 3b525691 ipv6: fix suspicious RCU usage in rt6_dump_route()
memory leak in hsr_create_self_node C 5 87d 118d 48d b9a1e627 hsr: implement dellink to clean up resources
general protection fault in call_fib6_multipath_entry_notifiers C cause 94 90d 95d 48d 9eee3b49 ipv6: Error when route does not have any valid nexthops
WARNING in snd_usb_motu_microbookii_communicate/usb_submit_urb C 3 65d 103d 48d 801ebf10 ALSA: usb-audio: Sanity checks for each pipe and EP types
memory leak in nr_rx_frame C 5 55d 118d 48d c8c8218e netrom: fix a memory leak in nr_rx_frame()
KASAN: use-after-free Read in p54u_load_firmware_cb syz 40 56d 140d 48d 6e41e225 p54usb: Fix race between disconnect and firmware loading
memory leak in batadv_tvlv_handler_register C 313 73d 124d 48d 17f78dd1 batman-adv: fix for leaked TVLV handler.
INFO: task hung in io_uring_release 24 73d 91d 48d a4c0b3de io_uring: fix io_sq_thread_stop running in front of io_sq_thread
general protection fault in get_task_pid C cause 24 81d 83d 55d 28dd29c0 fork: return proper negative error code
general protection fault in do_move_mount (2) syz cause 7 88d 97d 55d 570d7a98 vfs: move_mount: reject moving kernel internal mounts
memory leak in packet_set_ring C 2 88d 92d 55d 55655e3d net/packet: fix memory leak in packet_set_ring()
possible deadlock in io_submit_one C cause 1779 60d 230d 55d cbcfa130 fs/userfaultfd.c: disable irqs for fault_pending and event locks
KMSAN: uninit-value in tipc_nl_compat_bearer_disable C 19 82d 95d 55d 4f07b80c tipc: check msg->req data len in tipc_nl_compat_bearer_disable
memory leak in sctp_v6_create_accept_sk C 1 113d 112d 55d 25bff6d5 sctp: change to hold sk after auth shkey is created successfully
memory leak in sctp_v4_create_accept_sk C 1 93d 91d 55d 25bff6d5 sctp: change to hold sk after auth shkey is created successfully
possible deadlock in userfaultfd_release C cause 137 87d 330d 55d cbcfa130 fs/userfaultfd.c: disable irqs for fault_pending and event locks
possible deadlock in userfaultfd_read (2) 228 79d 178d 55d cbcfa130 fs/userfaultfd.c: disable irqs for fault_pending and event locks
memory leak in mpihelp_mul_karatsuba_case C 2 90d 91d 55d c8ea9fce lib/mpi: Fix karactx leak in mpi_powm
KASAN: global-out-of-bounds Read in qmi_wwan_probe C 2 79d 91d 55d 904d88d7 qmi_wwan: Fix out-of-bounds read
KASAN: null-ptr-deref Write in submit_audio_out_urb (2) C 3423 55d 87d 55d 34501219 ALSA: line6: Fix write on zero-sized buffer
WARNING in kvm_set_tsc_khz C 5 411d 407d 55d 3f16a5c3 KVM: x86: degrade WARN to pr_warn_ratelimited
WARNING in notify_change C 566 142d 532d 61d f69e749a Abort file_remove_privs() for non-reg. files
WARNING in cgroup_exit C cause 64 136d 138d 61d f2b31bb5 cgroup: never call do_group_exit() with task->frozen bit set
WARNING: syz-executor still has locks held! C cause 233 291d 302d 61d a72173ec Revert "exec: make de_thread() freezable"
general protection fault in inet_accept C 131 277d 438d 73d 07603b23 net/smc: propagate file from SMC to TCP socket
memory leak in sctp_process_init C 10 98d 118d 74d 0a8dd9f6 Fix memory leak in sctp_process_init ce950f10 sctp: Free cookie before we memdup a new one
BUG: unable to handle kernel paging request in ipv6_rcv (2) 18 96d 120d 74d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
memory leak in __memcg_init_list_lru_node C 3 105d 119d 74d 3510955b mm/list_lru.c: fix memory leak in __memcg_init_list_lru_node
KMSAN: uninit-value in tcp_create_openreq_child C 4000 75d 96d 74d 85f9aa75 inet: clear num_timeout reqsk_alloc()
KASAN: slab-out-of-bounds Read in dst_dev_put 3 208d 259d 74d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
WARNING in fanotify_handle_event C cause 5 97d 96d 74d c285a2f0 fanotify: update connector fsid cache on add mark
KASAN: use-after-free Read in pneigh_get_next syz cause 2 99d 99d 74d f3e92cb8 neigh: fix use-after-free read in pneigh_get_next
KASAN: use-after-free Read in css_task_iter_advance 48 104d 110d 74d c596687a cgroup: Fix css_task_iter_advance_css_set() cset skip condition
BUG: Dentry still in use [unmount of tmpfs tmpfs] 2 106d 106d 74d 1b0b9cc8 vfs: fsmount: add missing mntget()
KASAN: slab-out-of-bounds Read in __fib6_drop_pcpu_from 1 99d 99d 74d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
WARNING: refcount bug in css_task_iter_next 11 104d 109d 74d c596687a cgroup: Fix css_task_iter_advance_css_set() cset skip condition
memory leak in raw_sendmsg C 2 99d 111d 74d fd704bd5 can: purge socket error queue on sock destruct
KASAN: slab-out-of-bounds Read in css_task_iter_advance C cause 19 104d 110d 74d c596687a cgroup: Fix css_task_iter_advance_css_set() cset skip condition
memory leak in tipc_buf_acquire C 15 98d 121d 74d 5cf02612 tipc: purge deferredq list for each grp member in tipc_group_delete
general protection fault in __smc_diag_dump syz cause 309 250d 264d 74d b03faa1f net/smc: postpone release of clcsock
inconsistent lock state in ax25_destroy_timer 2 98d 99d 74d d4d5d8e8 ax25: fix inconsistent lock state in ax25_destroy_timer
memory leak in inet6_create C 2 106d 108d 74d 522924b5 net: correct udp zerocopy refcnt also when zerocopy only on append
memory leak in kobject_set_name_vargs C 12 83d 116d 74d 4f488fbc cfg80211: fix memory leak of wiphy device name
inconsistent lock state in ax25_rt_autobind 2 98d 98d 74d d4d5d8e8 ax25: fix inconsistent lock state in ax25_destroy_timer
general protection fault in rt_cache_valid 24 92d 219d 74d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
KASAN: use-after-free Read in sprintf syz cause 2 99d 99d 74d f3e92cb8 neigh: fix use-after-free read in pneigh_get_next
BUG: Dentry still in use [unmount of sysfs sysfs] C cause 6 99d 99d 74d 1b0b9cc8 vfs: fsmount: add missing mntget()
general protection fault in dst_dev_put (2) C cause 442 96d 285d 74d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
KASAN: null-ptr-deref Read in css_task_iter_advance 2 104d 105d 74d c596687a cgroup: Fix css_task_iter_advance_css_set() cset skip condition
BUG: Dentry still in use [unmount of hugetlbfs hugetlbfs] C cause 3 97d 97d 74d 1b0b9cc8 vfs: fsmount: add missing mntget()
KMSAN: kernel-infoleak in copy_siginfo_to_user (2) C 15 104d 134d 74d f6e2aa91 signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO
WARNING in blk_mq_sched_free_requests C 4 102d 104d 74d c326f846 blk-mq: remove WARN_ON(!q->elevator) from blk_mq_sched_free_requests
KASAN: slab-out-of-bounds Read in rt_cache_valid 3 112d 111d 74d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
BUG: unable to handle kernel paging request in dst_dev_put 3 116d 259d 74d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
KASAN: use-after-free Read in rt_cache_valid syz cause 5 107d 222d 74d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
memory leak in new_inode_pseudo C 136 75d 123d 74d 355e8d26 io_uring: fix memory leak of UNIX domain socket inode
memory leak in lapb_register C 16 98d 124d 74d 6be8e297 lapb: fixed leak of control-blocks.
KASAN: use-after-free Read in blk_mq_free_rqs C cause 3481 104d 108d 81d c3e22192 block: free sched's request pool in blk_cleanup_queue
possible deadlock in aio_poll C 5041 233d 378d 85d ae62c16e userfaultfd: disable irqs when taking the waitqueue lock
KASAN: slab-out-of-bounds Read in linear_transfer (2) 1 161d 152d 90d ca0214ee ALSA: pcm: Fix possible OOB access in PCM oss plugins
KASAN: slab-out-of-bounds Read in rhashtable_walk_enter C cause 48 124d 128d 90d 526f5b85 tipc: fix modprobe tipc failed after switch order of device registration
BUG: spinlock bad magic in rhashtable_walk_enter C cause 8 124d 128d 90d 526f5b85 tipc: fix modprobe tipc failed after switch order of device registration
KASAN: use-after-free Write in check_and_subscribe_port 1 145d 139d 90d 7c32ae35 ALSA: seq: Cover unsubscribe_port() in list_mutex
WARNING: proc registration bug in snd_info_card_register C 453 119d 164d 90d 0b074ab7 ALSA: line6: Assure canceling delayed work at disconnection
KASAN: slab-out-of-bounds Write in default_read_copy_kernel C cause 3 210d 287d 90d ca0214ee ALSA: pcm: Fix possible OOB access in PCM oss plugins
INFO: task hung in __ia32_sys_io_uring_enter 2 160d 162d 92d b19062a5 io_uring: fix possible deadlock between io_uring_{enter,register}
INFO: task hung in __x64_sys_io_uring_enter 12 155d 161d 92d b19062a5 io_uring: fix possible deadlock between io_uring_{enter,register}
general protection fault in sctp_sched_dequeue_common (2) C cause 3 192d 192d 92d 2e990dfd sctp: remove sched init from sctp_stream_init
WARNING in ovl_instantiate syz cause 75 148d 316d 92d 146d62e5 ovl: detect overlapping layers acf3062a ovl: relax WARN_ON() for overlapping layers use case
general protection fault in sisusb_probe C 3 134d 137d 95d 9a5729f6 USB: sisusbvga: fix oops in error path of sisusb_probe
INFO: task hung in __get_super C 80 95d 539d 95d 33ec3e53 loop: Don't change loop device under exclusive opener
KASAN: slab-out-of-bounds Write in usb_get_bos_descriptor syz 3 122d 135d 95d a03ff544 USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor
KASAN: invalid-free in disconnect_rio C 180 119d 164d 95d 3864d339 USB: rio500: refuse more than one device at a time
general protection fault in smsusb_init_device C 23 119d 158d 95d 31e0456d media: usb: siano: Fix general protection fault in smsusb
memory leak in packet_setsockopt C 10 108d 125d 95d afa0925c packet: unconditionally free po->rollover
KASAN: wild-memory-access Read in refcount_sub_and_test_checked 2 115d 131d 96d 61fb0d01 ipv6: prevent possible fib6 leaks
KASAN: use-after-free Read in ip6_fragment 1 127d 127d 96d 61fb0d01 ipv6: prevent possible fib6 leaks
BUG: unable to handle kernel NULL pointer dereference in ip6_rcv_finish 3 103d 131d 96d 61fb0d01 ipv6: prevent possible fib6 leaks
KASAN: use-after-free Write in fib6_purge_rt 2 122d 129d 96d 61fb0d01 ipv6: prevent possible fib6 leaks
KASAN: null-ptr-deref Write in fib6_purge_rt 18 110d 133d 96d 61fb0d01 ipv6: prevent possible fib6 leaks
KASAN: use-after-free Read in napi_gro_frags C cause 16 115d 116d 96d a4270d67 net-gro: fix use-after-free read in napi_gro_frags()
memory leak in ip_mc_add_src C 14 101d 125d 96d 3580d04a ipv4/igmp: fix another memory leak in igmpv3_del_delrec()
memory leak in process_preds C 1 119d 118d 96d dfb4a6f2 tracing: Avoid memory leak in predicate_parse()
memory leak in llc_ui_create C 4 106d 119d 96d 8fb44d60 llc: fix skb leak in llc_build_and_send_ui_pkt()
memory leak in inet_create C 2 110d 125d 96d 100f6d8e net: correct zerocopy refcnt with udp MSG_MORE
KASAN: slab-out-of-bounds Write in fib6_purge_rt 6 97d 133d 96d 61fb0d01 ipv6: prevent possible fib6 leaks
INFO: trying to register non-static key in rhashtable_walk_enter C 16 124d 128d 96d 526f5b85 tipc: fix modprobe tipc failed after switch order of device registration
KASAN: use-after-free Read in __dev_map_entry_free C 473 178d 459d 96d 2baae354 bpf: devmap: fix use-after-free Read in __dev_map_entry_free
KASAN: null-ptr-deref Write in submit_audio_out_urb C 185 103d 118d 96d 0b074ab7 ALSA: line6: Assure canceling delayed work at disconnection
INFO: task hung in usb_kill_urb C 1515 158d 164d 100d 50896c41 USB: dummy-hcd: Fix failure to give back unlinked URBs USB: dummy-hcd: Fix failure to give back unlinked URBs
KASAN: use-after-free Read in snd_seq_timer_interrupt 1 334d 333d 100d fe1b26c9 ALSA: timer: Make snd_timer_close() really kill pending actions
general protection fault in do_move_mount 3 137d 137d 100d 05883eee do_move_mount(): fix an unsafe use of is_anon_ns()
KASAN: use-after-free Read in tipc_sk_filter_rcv C cause 3439 179d 186d 100d 77d5ad40 tipc: fix use-after-free in tipc_sk_filter_rcv
BUG: assuming atomic context at net/core/flow_dissector.c:LINE syz 19 131d 135d 100d b1c17a9a flow_dissector: disable preemption around BPF calls
general protection fault in load_elf_binary C cause 15 173d 177d 100d cc338010 fs/binfmt_elf.c: free PT_INTERP filename ASAP
INFO: task hung in snd_seq_kernel_client_ctl C cause 554 164d 164d 100d f0654ba9 Revert "ALSA: seq: Protect in-kernel ioctl calls with mutex"
BUG: unable to handle kernel paging request in isolate_freepages_block 3 144d 139d 100d 60fce36a mm/compaction.c: correct zone boundary handling when isolating pages from a pageblock
KASAN: use-after-free Read in snd_timer_process_callbacks C cause 4 166d 167d 100d df55531b ALSA: timer: Revert active callback sync check at close
WARNING in cma_exit_net 25 173d 174d 100d 061ccb52 RDMA/cma: Set proper port number as index
KASAN: use-after-free Read in snd_seq_ioctl_get_subscription 2 324d 357d 100d 2eabc5ec ALSA: seq: Fix race of get-subscription call vs port-delete ioctls
KASAN: use-after-free Read in tcp_v6_send_reset 1 181d 181d 100d 4f661542 tcp: fix zerocopy and notsent_lowat issues
WARNING in batadv_mcast_mla_update 75 132d 266d 100d a3c7cd0c batman-adv: mcast: fix multicast tt/tvlv worker locking
BUG: using __this_cpu_read() in preemptible code in ip6_finish_output C cause 18807 168d 173d 100d 28b05b92 net: use correct this_cpu primitive in dev_recursion_level
WARNING: ODEBUG bug in netdev_freemem syz cause 1042 100d 265d 100d a3c7cd0c batman-adv: mcast: fix multicast tt/tvlv worker locking
WARNING: locking bug in nfs_get_client C cause 13 136d 137d 100d c260121a NFS: Fix a double unlock from nfs_match,get_client
WARNING: locking bug in copy_process C cause 3 134d 136d 100d c3b7112d fork: do not release lock that wasn't taken
KASAN: use-after-free Read in string C 247 145d 384d 100d c03a0fd0 kobject: Don't trigger kobject_uevent(KOBJ_REMOVE) twice.
KASAN: use-after-free Read in get_mem_cgroup_from_mm C cause 375 146d 320d 100d c3f3ce04 userfaultfd: use RCU to free the task struct when fork fails
KASAN: slab-out-of-bounds Write in skb_release_data 1 180d 180d 100d 4f661542 tcp: fix zerocopy and notsent_lowat issues
KASAN: use-after-free Read in __vb2_perform_fileio C cause 786 138d 329d 100d d65842f7 media: vb2: add waiting_in_dqbuf flag
BUG: sleeping function called from invalid context in line6_pcm_acquire 119 119d 138d 100d 7f84ff68 ALSA: line6: toneport: Fix broken usage of timer for delayed execution
kernel BUG at drivers/android/binder_alloc.c:LINE! (3) C cause 24 109d 178d 100d a3c7cd0c batman-adv: mcast: fix multicast tt/tvlv worker locking
WARNING in batadv_mcast_mla_tt_retract syz cause 190 131d 266d 100d a3c7cd0c batman-adv: mcast: fix multicast tt/tvlv worker locking
KASAN: use-after-free Write in __ext4_expand_extra_isize C 95 147d 538d 100d 7bc04c5c ext4: fix use-after-free race with debug_want_extra_isize
general protection fault in tipc_mcast_filter_msg C cause 3889 164d 186d 100d 08e046c8 tipc: fix a null pointer deref
WARNING in port_delete syz cause 22 224d 438d 100d 7c32ae35 ALSA: seq: Cover unsubscribe_port() in list_mutex feb68902 ALSA: seq: Protect in-kernel ioctl calls with mutex
kernel BUG at mm/slab.c:LINE! (4) 12 112d 180d 100d 4f661542 tcp: fix zerocopy and notsent_lowat issues
possible deadlock in acct_pin_kill C cause 273 143d 360d 100d 9419a319 acct_on(): don't mess with freeze protection
kernel BUG at arch/x86/mm/physaddr.c:LINE! (2) C cause 522 100d 310d 100d dad7e270 media: vivid: use vfree() instead of kfree() for dev->bitmap_cap
general protection fault in __handle_mm_fault C cause 17 343d 352d 104d ff09d7ec mm/memory.c: recheck page table entry with page table lock held
KMSAN: uninit-value in aa_fqlookupn_profile C 39 315d 360d 104d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
BUG: bad usercopy in __check_heap_object (3) C 287 372d 443d 104d 1f4aace6 fs/seq_file.c: simplify seq_file iteration code and interface
general protection fault in put_fs_context C 9 327d 327d 104d 8d0347f6 convert do_remount_sb() to fs_context
kernel panic: MAC Initialization failed. (3) C cause 799 132d 206d 104d e80b1859 tomoyo: Add a kernel config option for fuzzing testing.
KASAN: use-after-free Read in br_mdb_ip_get 1 238d 238d 114d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
KMSAN: uninit-value in br_mdb_ip_get 5 179d 237d 115d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
WARNING in xfrm_state_fini (2) C 37510 143d 596d 119d dbb2483b xfrm: clean up xfrm protocol checks
KMSAN: uninit-value in rds_connect C 952 146d 388d 119d dd3ac9a6 net/rds: Check address length before reading address family
general protection fault in __dev_printk C 300 145d 159d 119d ef61eb43 USB: yurex: Fix protection fault after device removal
INFO: trying to register non-static key in vmk80xx_detach C 1528 119d 163d 119d 08b7c2f9 staging: comedi: vmk80xx: Fix use of uninitialized semaphore
KMSAN: uninit-value in rtnl_stats_dump syz 14 149d 164d 119d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
WARNING: suspicious RCU usage in fib_compute_spec_dst 1 162d 162d 119d c543cb4a ipv4: ensure rcu_read_lock() in ipv4_link_failure()
BUG: unable to handle page fault for address = ADDR C cause 3 151d 150d 119d baf76f0c slip: make slhc_free() silently accept an error pointer
KASAN: use-after-free Read in seccomp_notify_release (2) C cause 9 181d 182d 119d 7a0df7fb seccomp: Make NEW_LISTENER and TSYNC flags exclusive
WARNING in compat_copy_entries (2) syz cause 19416 132d 565d 119d 7caa56f0 netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON
KMSAN: uninit-value in tomoyo_check_inet_address 33 129d 130d 119d e6193f78 tomoyo: Check address length before reading address family
BUG: sleeping function called from invalid context at crypto/skcipher.c:LINE 1 163d 162d 119d 44427c0f crypto: xts - Fix atomic sleep when walking skcipher
KMSAN: uninit-value in rds_bind C 6202 146d 388d 119d dd3ac9a6 net/rds: Check address length before reading address family
INFO: trying to register non-static key in ni6501_detach C 127 119d 161d 119d 660cf4ce staging: comedi: ni_usb6501: Fix use of uninitialized mutex
KASAN: slab-out-of-bounds Read in skb_gro_receive (2) C cause 5 144d 144d 119d 4dd2b82d udp: fix GRO packet of death
KASAN: stack-out-of-bounds Write in __ip_options_echo syz cause 8 152d 156d 119d 20ff83f1 ipv4: add sanity checks in ipv4_link_failure()
general protection fault in vcpu_enter_guest (2) C cause 11286 145d 150d 119d b904cb8d KVM: lapic: Check for in-kernel LAPIC before deferencing apic pointer
KASAN: use-after-free Read in snd_info_free_entry C 47 131d 161d 119d 2a3f7221 ALSA: core: Fix card races between register and disconnect 8c2f8708 ALSA: info: Fix racy addition/deletion of nodes
WARNING in percpu_ref_kill_and_confirm C cause 443 147d 153d 119d 35fa71a0 io_uring: fail io_uring_register(2) on a dying io_uring instance
general protection fault in skb_queue_tail C cause 35 151d 153d 119d 032be5f1 rxrpc: fix race condition in rxrpc_input_packet()
WARNING in wiphy_register (4) syz cause 3 162d 191d 119d 45fcef8b mac80211_hwsim: calculate if_combination.max_interfaces
INFO: task hung in __io_uring_register C cause 51 154d 163d 119d b19062a5 io_uring: fix possible deadlock between io_uring_{enter,register}
WARNING in __kthread_bind_mask C cause 2929 152d 163d 119d 06058632 io_uring: park SQPOLL thread if it's percpu
general protection fault in ieee80211_debugfs_rename_netdev 8 148d 161d 119d 51787914 mac80211: don't attempt to rename ERR_PTR() debugfs dirs
KASAN: slab-out-of-bounds Read in ds_probe C 5 121d 159d 119d c114944d USB: w1 ds2490: Fix bug caused by improper use of altsetting array
INFO: rcu detected stall in rose_loopback_timer 5 134d 152d 119d 0453c682 net/rose: fix unbound loop in rose_loopback_timer()
KMSAN: uninit-value in rtnl_stats_get C 5 156d 164d 119d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KASAN: use-after-free Read in pid_nr_ns 1 148d 148d 119d 6c0afef5 ipv6/flowlabel: wait rcu grace period before put_pid()
KMSAN: uninit-value in tomoyo_check_unix_address 8 129d 130d 119d e6193f78 tomoyo: Check address length before reading address family
kernel BUG at net/core/net-sysfs.c:LINE! C cause 890 148d 184d 119d 8ed633b9 Revert "net-sysfs: Fix memory leak in netdev_register_kobject"
WARNING: refcount bug in l2tp_tunnel_get 1 146d 146d 119d a622b400 l2ip: fix possible use-after-free
WARNING in io_uring_setup C cause 3601 143d 163d 119d 917257da io_uring: only test SQPOLL cpu after we've verified it
KASAN: user-memory-access Write in fib6_purge_rt 6 120d 149d 119d 0e233874 ipv6: fix races in ip6_dst_destroy()
general protection fault in xfrmi_decode_session C cause 16694 143d 214d 119d 6ed69184 xfrm: Reset secpath in xfrm failure
INFO: task hung in vhost_net_stop_vq C cause 136 159d 296d 119d 813dbeb6 vhost: reject zero size iova range
general protection fault in fanotify_handle_event syz cause 5 157d 157d 119d b1da6a51 fsnotify: Fix NULL ptr deref in fanotify_get_fsid()
BUG: unable to handle kernel paging request in do_mount C 194 329d 367d 125d 3e1aeb00 vfs: Implement a filesystem superblock creation/configuration context
KASAN: stack-out-of-bounds Read in string C 46 152d 164d 130d c01c348e USB: core: Fix unterminated string returned by usb_string()
WARNING in usb_submit_urb (4) syz cause 46 132d 320d 130d c2b71462 USB: core: Fix bug caused by duplicate interface PM usage counter
WARNING: locking bug in icmp_send syz cause 1 215d 215d 136d 9926cb5f tipc: change to check tipc_own_id to return in tipc_net_stop
KMSAN: uninit-value in ip6_compressed_string C 9024 146d 298d 146d 7c2bd9a3 NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
kernel BUG at fs/inode.c:LINE! C cause 2 281d 280d 163d 9bf964c9 autofs: simplify parse_options() function call
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (2) C 6 193d 178d 164d 2ac695d1 tipc: handle the err returned from cmd header function
BUG: corrupted list in rhashtable_walk_enter syz cause 3 183d 182d 164d b5f9bd15 ila: Fix rhashtable walker list corruption
possible deadlock in seq_read C 19074 171d 661d 164d 73601ea5 fs/open.c: allow opening only regular files during execve()
KASAN: use-after-free Read in link_path_walk syz cause 5 283d 298d 164d 1da6c4d9 bpf: fix use after free in bpf_evict_inode
KASAN: slab-out-of-bounds Read in default_write_copy_kernel C cause 366 179d 302d 164d ca0214ee ALSA: pcm: Fix possible OOB access in PCM oss plugins
KASAN: use-after-free Read in trailing_symlink syz cause 2 284d 298d 164d 1da6c4d9 bpf: fix use after free in bpf_evict_inode
KMSAN: kernel-infoleak in sctp_getsockopt (3) syz 11 166d 178d 164d 09279e61 sctp: initialize _pad of sockaddr_in before copying to user memory
BUG: unable to handle kernel paging request in ip6_fragment 1 179d 178d 164d ef0efcd3 ipv6: Fix dangling pointer when ipv6 fragment
KMSAN: uninit-value in tipc_nl_compat_link_set (3) C 15 169d 179d 164d 8c63bf9a tipc: check link name with right length in tipc_nl_compat_link_set
KASAN: use-after-free Read in path_lookupat syz cause 1 298d 298d 164d 1da6c4d9 bpf: fix use after free in bpf_evict_inode
KMSAN: uninit-value in tipc_nl_compat_bearer_enable (2) C 51 166d 179d 164d 6f07e5f0 tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
KASAN: use-after-free Read in drm_gem_object_release C 480 180d 332d 164d 21d2b122 drm/vgem: fix use-after-free when drm_gem_handle_create() fails
WARNING: lock held when returning to user space in tun_get_user C cause 55 190d 191d 165d 9180bb4f tun: add a missing rcu_read_unlock() in error path
kernel panic: corrupted stack end in wb_workfn C cause 14 266d 266d 165d ef82bcfa sctp: use memdup_user instead of vmemdup_user
general protection fault in fib6_purge_rt C cause 60 167d 284d 165d 9926cb5f tipc: change to check tipc_own_id to return in tipc_net_stop
KASAN: slab-out-of-bounds Read in icmp6_send 1 193d 193d 165d 4477138f tun: properly test for IFF_UP
KASAN: stack-out-of-bounds Write in rose_write_internal 1 193d 193d 165d e5dcc0c3 net: rose: fix a possible stack overflow
KASAN: use-after-free Read in __icmp_send 1 184d 180d 165d 4477138f tun: properly test for IFF_UP
general protection fault in sctp_assoc_rwnd_increase C cause 28 179d 194d 165d 636d25d5 sctp: not copy sctp_sock pd_lobby in sctp_copy_descendant
WARNING in free_loaded_vmcs (2) syz cause 5 383d 405d 174d 5bea5123 KVM: VMX: check nested state and CR4.VMXE against SMM
general protection fault in kvm_lapic_hv_timer_in_use syz cause 205 366d 408d 174d 26b471c7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
WARNING in enter_vmx_operation syz cause 8 377d 388d 174d 5bea5123 KVM: VMX: check nested state and CR4.VMXE against SMM
general protection fault in loop_validate_file (2) 3 186d 189d 175d f7c8a412 loop: access lo_backing_file only when the loop device is Lo_bound
WARNING in lockdep_unregister_key C cause 214 182d 195d 175d 82efcab3 workqueue: Only unregister a registered lockdep key
WARNING: bad usercopy in fanotify_read C cause 5 195d 195d 175d b2d22b6b fanotify: Allow copying of file handle to userspace
KASAN: use-after-free Read in filemap_fault C 277 258d 268d 175d 6b4c9f44 filemap: drop the mmap_sem for all blocking operations
general protection fault in ebitmap_destroy (2) C cause 36 184d 192d 175d 6a1afffb selinux: fix NULL dereference in policydb_destroy()
WARNING in __flush_work (2) C 38 198d 199d 179d b30b61ff drm/vkms: Fix flush_work() without INIT_WORK().
general protection fault in sctp_sched_rr_dequeue C cause 11 191d 201d 179d 2e990dfd sctp: remove sched init from sctp_stream_init
KASAN: use-after-free Read in br_multicast_rcv 1 197d 197d 179d 083b78a9 ip: fix ip_mc_may_pull() return value
possible deadlock in shmem_fallocate (2) C 1325 200d 409d 179d fb4415a1 staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
BUG: MAX_STACK_TRACE_ENTRIES too low! C cause 1725 179d 205d 179d 009bb421 workqueue, lockdep: Fix an alloc_workqueue() error path
general protection fault in tc_ctl_chain C 21 213d 221d 179d af736bf0 net: sched: potential NULL dereference in tcf_block_find()
KMSAN: uninit-value in mpol_rebind_mm 6 181d 266d 179d 2e25644e mm, mempolicy: fix uninit memory access
INFO: trying to register non-static key in dump_header 1 210d 210d 179d b30b61ff drm/vkms: Fix flush_work() without INIT_WORK().
WARNING: lock held when returning to user space in grab_super 2 221d 264d 179d 399504e2 fix cgroup_do_mount() handling of failure exits
KASAN: use-after-free Read in unix_dgram_poll syz 2 207d 204d 179d 84c4e1f8 aio: simplify - and fix - fget/fput for io_submit()
general protection fault in hci_uart_write_work C 84 203d 251d 179d 32a7b4cb Bluetooth: hci_ldisc: Initialize hci_dev before open()
KASAN: use-after-free Read in rdma_listen C 1548 179d 539d 179d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KASAN: use-after-free Read in h5_reset_rx 2 209d 215d 179d 56897b21 Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
kernel BUG at drivers/android/binder_alloc.c:LINE! (2) C 1257 179d 221d 179d 26528be6 binder: fix handling of misaligned binder object
INFO: trying to register non-static key in __flush_work C 5255 199d 268d 179d b30b61ff drm/vkms: Fix flush_work() without INIT_WORK().
KASAN: use-after-free Read in alloc_workqueue C 37 191d 203d 179d 009bb421 workqueue, lockdep: Fix an alloc_workqueue() error path
general protection fault in cgroup_reconfigure C 7 414d 443d 179d 23bf1b6b kernfs, sysfs, cgroup, intel_rdt: Support fs_context
KASAN: use-after-free Read in x25_device_event C 548 192d 267d 179d 95d6ebd5 net/x25: fix use-after-free in x25_device_event()
possible deadlock in __do_page_fault C 820 200d 367d 179d fb4415a1 staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
possible deadlock in vfs_fallocate C 3981 400d 511d 179d fb4415a1 staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
WARNING in get_q_data C 649 227d 236d 179d db9a01b3 media: vicodec: check type in g/s_selection
KMSAN: kernel-infoleak in video_usercopy C 410 179d 279d 179d f45f3f75 media: v4l2-ctrls.c/uvc: zero v4l2_event
KMSAN: uninit-value in gue6_err (2) C 2826 179d 201d 179d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
kernel BUG at kernel/time/timer.c:LINE! (3) 1 200d 200d 179d 1e027960 net/hsr: fix possible crash in add_timer()
BUG: unable to handle kernel paging request in gro_cells_destroy (3) 3 180d 197d 179d 2a5ff07a gro_cells: make sure device is up in gro_cells_receive()
KMSAN: kernel-infoleak in move_addr_to_user (2) C 8 180d 194d 179d 163d1c3d l2tp: fix infoleak in l2tp_ip6_recvmsg()
general protection fault in nf_ct_gre_keymap_flush C 22 237d 243d 179d ac088a88 netfilter: conntrack: fix error path in nf_conntrack_pernet_init()
general protection fault in xsk_diag_dump C 5 196d 202d 179d 915905f8 xsk: fix potential crash in xsk_diag_put_umem()
BUG: unable to handle kernel paging request in h4_recv_buf C 203 202d 264d 179d 1dc2d785 Bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf()
general protection fault in x25_write_internal 8 195d 195d 179d ee74d0bd net/x25: reset state in x25_connect()
BUG: unable to handle kernel NULL pointer dereference in __generic_file_write_iter 5 205d 213d 179d ac5ceccc x86/unwind: Add hardcoded ORC entry for NULL f4f34e1b x86/unwind: Handle NULL pointer calls better in frame unwinder
possible deadlock in userfaultfd_read 239 179d 233d 179d d3d6a18d aio: Fix locking in aio_poll()
KMSAN: uninit-value in gue_err (2) C 1617 179d 201d 179d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KASAN: use-after-free Read in kobject_put C 12 207d 338d 179d e20a2e9c Bluetooth: Fix decrementing reference count twice in releasing socket
BUG: assuming atomic context at kernel/seccomp.c:LINE C 709 214d 215d 179d e80d02dd seccomp, bpf: disable preemption before calling into bpf prog
general protection fault in delayed_uprobe_remove C cause 2 323d 325d 184d 1aed58e6 Uprobes: Fix kernel oops with delayed_uprobe_remove()
WARNING: locking bug in lock_downgrade 30 244d 300d 185d 513e1073 locking/lockdep: Add debug_locks check in __lock_downgrade() locking/lockdep: Add debug_locks check in __lock_downgrade()
general protection fault in __x86_indirect_thunk_rbx C cause 16 319d 320d 185d d6367d62 fs/locks: use properly initialized file_lock when unlocking.
KASAN: use-after-free Read in update_blocked_averages C cause 3 301d 315d 185d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
kernel BUG at mm/slab.c:LINE! (3) C cause 14 186d 313d 185d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING in update_load_avg C cause 1 308d 307d 186d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING: bad usercopy in corrupted (2) C cause 12 255d 301d 186d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
KASAN: slab-out-of-bounds Read in tick_sched_handle C cause 7 252d 280d 190d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING: lock held when returning to user space in set_property_atomic C 145 253d 267d 199d 4089e272 gpu/drm: Fix lock held when returning to user space.
general protection fault in ax25cmp C 2294 236d 268d 201d b0cf0292 net/rose: fix NULL ax25_cb kernel panic
KMSAN: uninit-value in batadv_interface_tx C 98 201d 223d 201d 4ffcbfac batman-adv: fix uninit-value in batadv_interface_tx()
kernel panic: stack is corrupted in perf_output_begin_forward 2 252d 258d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
kernel BUG at security/keys/keyring.c:LINE! C 12 253d 353d 201d ede0fa98 KEYS: always initialize keyring_index_key::desc_len
KASAN: slab-out-of-bounds Read in xfrm_policy_insert_list 1 252d 252d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in tipc_subscrb_rcv_cb C 13 511d 532d 201d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KASAN: use-after-free Write in __xfrm_policy_unlink C 254 204d 432d 201d 1548bc4e xfrm: policy: delete inexact policies from inexact list on hash rebuild
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page C 25 292d 320d 201d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KASAN: use-after-free Read in task_is_descendant C 27 250d 337d 201d 9474f4e7 Yama: Check for pid death before checking ancestry
KASAN: use-after-free Read in xfrm_migrate 5 236d 259d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: rcu detected stall in netlink_sendmsg syz 83 217d 273d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in xfrm_policy_insert_list 2 251d 261d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in __flush_work C 402 230d 236d 201d 2e3c18d0 block: pass no-op callback to INIT_WORK().
KASAN: use-after-free Read in __smc_diag_dump syz 34 251d 264d 201d 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: slab-out-of-bounds Read in xfrm_policy_lookup_bytype 6 255d 277d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
general protection fault in crypto_remove_spawns (2) 2 246d 252d 201d 6db43410 crypto: adiantum - initialize crypto_spawn::inst
KMSAN: uninit-value in tipc_nl_compat_doit C 153 216d 367d 201d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
general protection fault in watchdog C 1 283d 283d 201d e2c8d550 netfilter: ebtables: account ebt_table_info to kmemcg
KASAN: stack-out-of-bounds Read in select_task_rq_fair 2 251d 260d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in kernel_accept C 19 284d 433d 201d 78abe3d0 net/smc: fix TCP fallback socket release 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: use-after-free Read in xfrm_policy_insert_list 30 236d 277d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING: refcount bug in rds_sock_addref 1 235d 235d 201d 6fa19f56 rds: fix refcount bug in rds_sock_addref
WARNING in __skb_flow_dissect (3) syz 224 251d 340d 201d 0b7959b6 tun: publish tfile after it's fully initialized
general protection fault in fuse_dev_do_write C 134 229d 356d 201d 97e1532e fuse: handle zero sized retrieve correctly
KMSAN: uninit-value in tipc_nl_compat_name_table_dump C 51 287d 327d 201d 974cb0e3 tipc: fix uninit-value in tipc_nl_compat_name_table_dump
INFO: rcu detected stall in snd_pcm_oss_read C 2 273d 272d 201d e190161f ALSA: pcm: Fix tight loop of OSS capture stream
KASAN: use-after-free Read in sctp_outq_tail 1 223d 222d 201d af98c5a7 sctp: set stream ext to NULL after freeing it in sctp_stream_outq_migrate
net-next boot error: can't ssh into the instance 33 236d 238d 201d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
BUG: unable to handle kernel paging request in dput (2) C 4 235d 236d 201d 36991ca6 blk-mq: protect debugfs_create_files() from failures 37ea7b63 debugfs: debugfs_lookup() should return NULL if not found
KASAN: slab-out-of-bounds Read in batadv_interface_tx C 41 227d 266d 201d 9114daa8 batman-adv: Force mac header to start of data on xmit
INFO: rcu detected stall in pfkey_sendmsg 7 252d 277d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: task hung in generic_file_write_iter 7 294d 432d 201d 04906b2f blockdev: Fix livelocks on loop device
general protection fault in kernel_accept C 280 277d 438d 201d 78abe3d0 net/smc: fix TCP fallback socket release 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: stack-out-of-bounds in do_raw_spin_lock C 1 261d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in refcount_inc_not_zero_checked syz 24 204d 264d 201d 63346650 netrom: switch to sock timer API
KMSAN: uninit-value in tipc_nl_compat_link_set (2) C 13 237d 279d 201d edf5ff04 tipc: fix uninit-value in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable C 144 202d 327d 201d 0762216c tipc: fix uninit-value in tipc_nl_compat_bearer_enable
KMSAN: kernel-infoleak in move_addr_to_user 5 208d 258d 201d 7d033c9f ipv6: fix kernel-infoleak in ipv6_local_error()
KASAN: use-after-free Read in kmemdup 1 247d 247d 201d 63530aba ax25: fix possible use-after-free
KMSAN: uninit-value in tipc_nl_compat_link_reset_stats syz 16 205d 258d 201d 8b66fee7 tipc: fix uninit-value in tipc_nl_compat_link_reset_stats
BUG: unable to handle kernel paging request in depot_save_stack C 1 261d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: global-out-of-bounds Read in validate_nla C 14 236d 241d 201d a8b5c6d6 nl80211: fix NLA_POLICY_NESTED() arguments
KASAN: invalid-free in sctp_stream_free C 5 223d 230d 201d af98c5a7 sctp: set stream ext to NULL after freeing it in sctp_stream_outq_migrate
WARNING: refcount bug in nr_release 1 260d 259d 201d 63346650 netrom: switch to sock timer API
general protection fault in dccp_parse_options 1 236d 236d 201d 9b1f19d8 dccp: fool proof ccid_hc_[rt]x_parse_options()
KASAN: slab-out-of-bounds Read in __xfrm_policy_bysel_ctx 1 263d 263d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in kvm_clear_dirty_log_protect 6 201d 246d 201d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
BUG: unable to handle kernel NULL pointer dereference in corrupted (3) C 1 258d 258d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: slab-out-of-bounds Read in kvm_clear_dirty_log_protect C 54 252d 264d 201d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
net boot error: can't ssh into the instance 42 236d 238d 201d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
general protection fault in __dentry_path C 2082 203d 236d 201d 8ed0579c kvm: properly check debugfs dentry before using it
WARNING in tcp_send_loss_probe C 9 211d 263d 201d bf50b606 tcp: repaired skbs must init their tso_segs
BUG: unable to handle kernel paging request in do_csum C 11 294d 294d 201d d5be7f63 net-backports: net: validate untrusted gso packets without csum offload
KASAN: stack-out-of-bounds Read in pick_next_task_fair C 1 261d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in icmp6_send syz 2 262d 262d 201d 8d933670 ipv6: make icmp6_send() robust against null skb->dev
WARNING in batadv_is_on_batman_iface syz 10 241d 267d 201d 955d3411 batman-adv: Avoid WARN on net_device without parent in netns
kernel panic: stack is corrupted in rcu_irq_enter 1 250d 250d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
WARNING in clear_standby C 3522 241d 366d 201d 4aac9228 libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive()
general protection fault in __xfrm_policy_bysel_ctx 1 238d 237d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_insert 3 253d 277d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in apparmor_cred_free C 109 248d 255d 201d a5795fd3 LSM: Check for NULL cred-security on free
KASAN: out-of-bounds Read in update_curr syz 1 261d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in team_nl_cmd_options_set C 7 271d 228d 201d 2fdeee25 team: avoid complex list operations in team_nl_cmd_options_set()
KASAN: slab-out-of-bounds Write in __xfrm_policy_unlink 34 236d 316d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: rcu detected stall in xfrm_hash_rebuild 77 236d 287d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: task hung in lo_ioctl 47 535d 651d 201d 04906b2f blockdev: Fix livelocks on loop device
WARNING in wiphy_register (3) syz 31 236d 267d 201d 9c5d3afa mac80211_hwsim: check that n_limits makes sense
general protection fault in sctp_sched_dequeue_common 6 216d 306d 201d cfe4bd7a sctp: check and update stream->out_curr when allocating stream_out
kernel panic: stack is corrupted in printk C 1 261d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KMSAN: kernel-infoleak in vmx_get_nested_state C 6 201d 313d 201d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
general protection fault in xfrm_policy_insert_list 4 258d 272d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
BUG: unable to handle kernel NULL pointer dereference in setup_kmem_cache_node 3 263d 264d 201d 09c2e76e slab: alien caches must not be initialized if the allocation of the alien cache failed
general protection fault in xfrm_policy_lookup_bytype 5 236d 266d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: slab-out-of-bounds Read in __pskb_copy_fclone 22 283d 349d 201d e7c87bd6 bpf: in __bpf_redirect_no_mac pull mac only if present
INFO: rcu detected stall in sys_bind 1 227d 227d 201d cf657d22 net/x25: do not hold the cpu too long in x25_new_lci()
kernel panic: stack is corrupted in udp4_lib_lookup2 11 266d 262d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in rb_erase_cached C 1 261d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: stack-out-of-bounds Read in gue_err_proto_handler C 1 258d 258d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in oom_kill_process 1 249d 245d 201d cefc7ef3 mm, oom: fix use-after-free in oom_kill_process
kernel panic: stack is corrupted in select_idle_sibling 1 261d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in __xfrm_policy_bysel_ctx 11 236d 273d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: out-of-bounds Read in __switch_to C 1 261d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in xfrm_policy_inexact_insert 42 236d 266d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: use-after-free Read in __wake_up_common_lock 1 236d 235d 201d bdcc5bc2 mISDN: fix a race in dev_expire_timer()
KMSAN: uninit-value in tipc_nl_compat_dumpit C 209 216d 366d 201d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
general protection fault in corrupted (2) C 2 258d 261d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
WARNING: locking bug in corrupted C 1 250d 250d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
possible deadlock in __wake_up_common_lock 7 255d 264d 201d 73444bc4 mm, page_alloc: do not wake kswapd with zone lock held
WARNING: refcount bug in kvm_vm_ioctl syz 13 235d 348d 201d cfa39381 kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
INFO: rcu detected stall in ipv6_rcv 7 238d 275d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt 1 236d 235d 201d 63346650 netrom: switch to sock timer API
KMSAN: uninit-value in gue_err C 4686 201d 255d 201d 26fc181e fou, fou6: do not assume linear skbs
KASAN: use-after-free Read in seccomp_notify_release C 27 206d 254d 201d a811dc61 seccomp: fix UAF in user-trap code
KASAN: use-after-free Read in batadv_interface_tx C 54 228d 266d 201d 9114daa8 batman-adv: Force mac header to start of data on xmit
general protection fault in ip6erspan_set_version C 39 210d 215d 201d efcc9bca net: ip6_gre: fix possible NULL pointer dereference in ip6erspan_set_version
WARNING in __might_sleep (2) C 36 241d 268d 201d fc01d8c6 tty/n_hdlc: fix __might_sleep warning
upstream boot error: can't ssh into the instance (2) 45 238d 239d 201d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
KASAN: use-after-free Read in xfrm_policy_lookup_bytype 33 236d 277d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
BUG: soft lockup in x25_connect 1 213d 213d 201d 797a22bd net/x25: fix a race in x25_bind()
WARNING in xfrm6_tunnel_net_exit (2) C 48816 210d 492d 201d f75a2804 xfrm: destroy xfrm_state synchronously on net exit path
WARNING in xfrm_policy_inexact_gc_tree 645 236d 287d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in tipc_conn_rcv_sub C 557 203d 497d 201d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
WARNING: refcount bug in xfrm_policy_bysel_ctx 1 255d 254d 201d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING: bad unlock balance in rxrpc_recvmsg C 9 227d 231d 201d 6dce3c20 rxrpc: bad unlock balance in rxrpc_recvmsg
KASAN: stack-out-of-bounds Write in page_counter_try_charge 1 251d 251d 201d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KMSAN: kernel-infoleak in sctp_getsockopt (2) C 16 201d 252d 201d 400b8b9a sctp: allocate sctp_sockaddr_entry with kzalloc
general protection fault in relay_open_buf C 287 234d 235d 201d 2c1cf00e relay: check return of create_buf_file() properly
KASAN: use-after-free Write in __wake_up_common_lock 1 229d 229d 201d bdcc5bc2 mISDN: fix a race in dev_expire_timer()
KMSAN: uninit-value in gue6_err C 8359 201d 255d 201d 26fc181e fou, fou6: do not assume linear skbs
general protection fault in ebitmap_destroy syz 1 256d 256d 201d 5b0e7310 selinux: fix GPF on invalid policy
general protection fault in debugfs_create_files C 111 234d 235d 201d 36991ca6 blk-mq: protect debugfs_create_files() from failures
general protection fault in kvm_ioapic_scan_entry C 148 295d 405d 208d dcbd3e49 KVM: X86: Fix NULL deref in vcpu_scan_ioapic
general protection fault in finish_wait C 22 225d 441d 208d 78abe3d0 net/smc: fix TCP fallback socket release
KASAN: slab-out-of-bounds Write in fpstate_init C 15088 273d 274d 208d ed8e4812 KVM: x86: fix size of x86_fpu_cache objects
KASAN: out-of-bounds Write in tls_push_record C 10 341d 442d 208d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Read in tls_tx_records 1 360d 359d 208d d829e9c4 tls: convert to generic sk_msg interface
general protection fault in tls_push_sg 12 350d 460d 208d d829e9c4 tls: convert to generic sk_msg interface
general protection fault in gcmaes_crypt_by_sg 3 343d 351d 208d d829e9c4 tls: convert to generic sk_msg interface
kernel BUG at include/linux/mm.h:LINE! (2) C 1009 208d 471d 208d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Write in tls_push_record (2) C 64 336d 438d 208d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Read in rdma_resolve_addr 1 362d 361d 214d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in cma_acquire_dev 1 444d 443d 214d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in wait_for_completion 1 337d 337d 214d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in __list_add_valid (5) C 16 540d 546d 214d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in bpf_cgroup_storage_release C 2 416d 416d 217d 82c018d7 Merge branch 'bpf-cgroup-local-storage'
KASAN: stack-out-of-bounds Read in rb_erase (4) 1 252d 252d 217d 11789039 fou: Prevent unbounded recursion in GUE error handler
general protection fault in list_lru_count_one C 12 434d 432d 240d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
WARNING in __debug_object_init (3) C 1557 329d 330d 245d 2cb494a3 bpf: add tests for direct packet access from CGROUP_SKB
general protection fault in keyctl_pkey_params_get C 85 264d 323d 250d 57b0e314 KEYS: fix parsing invalid pkey info string 94c13f66 security: don't use a negative Opt_err token index
KASAN: stack-out-of-bounds Read in keyctl_pkey_params_get 2 264d 263d 250d 57b0e314 KEYS: fix parsing invalid pkey info string
general protection fault in encode_rpcb_string C 6 427d 524d 250d 81c88b18 sunrpc: handle ENOMEM in rpcb_getport_async
KMSAN: uninit-value in vti6_tnl_xmit syz 60 255d 279d 250d cb9f1b78 ip: validate header length on virtual device xmit
general protection fault in lo_ioctl (2) syz 2 509d 509d 250d 310ca162 block/loop: Use global lock for ioctl() operation.
inconsistent lock state in nr_find_socket C 19 252d 268d 250d 7314f548 netrom: fix locking in nr_find_socket()
KASAN: invalid-free in x25_asy_free C 67 262d 268d 250d d5c7c745 net/wan: fix a double free in x25_asy_open_tty()
WARNING in kmem_cache_create_usercopy C 10 266d 324d 250d 574d356b 9p/net: put a lower bound on msize
possible deadlock in blkdev_reread_part C 5736 269d 690d 250d 0da03cab loop: Fix deadlock when calling blkdev_reread_part() 85b0a54a loop: Move loop_reread_partitions() out of loop_ctl_mutex
KMSAN: uninit-value in check_6rd C 81 256d 279d 250d cb9f1b78 ip: validate header length on virtual device xmit
WARNING: locking bug in loop_control_ioctl C 4018 290d 317d 250d 628bd859 loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl()
WARNING: ODEBUG bug in tipc_enable_bearer C 3 271d 274d 250d dc4501ff tipc: fix a double free in tipc_enable_bearer()
kernel BUG at kernel/time/timer.c:LINE! (2) C 5 263d 265d 250d 202700e3 net/hamradio/6pack: use mod_timer() to rearm timers
KASAN: slab-out-of-bounds Read in tun_net_xmit (2) C 10 266d 434d 250d aff6db45 ptr_ring: wrap back ->producer in __ptr_ring_swap_queue()
KASAN: use-after-free Read in nr_rx_frame syz 2 257d 264d 250d 7314f548 netrom: fix locking in nr_find_socket()
possible deadlock in nr_destroy_socket syz 20 254d 264d 250d 7314f548 netrom: fix locking in nr_find_socket()
INFO: task hung in loop_control_ioctl 4 346d 540d 250d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: use-after-free Read in posix_lock_inode syz 5 264d 264d 250d bf77ae4c locks: fix error in locks_move_blocks()
general protection fault in transparent_hugepage_enabled C 626 264d 272d 250d 7635d9cb mm, thp, proc: report THP eligibility for each vma
KMSAN: kernel-infoleak in capi_unlocked_ioctl C 109 255d 266d 250d d63967e4 isdn: fix kernel-infoleak in capi_unlocked_ioctl
INFO: task hung in lo_open (2) 10 312d 540d 250d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: user-memory-access Write in n_tty_set_termios C 85 269d 539d 250d 83d817f4 tty: Hold tty_ldisc_lock() during tty_reopen()
KASAN: use-after-free Read in ax25_fillin_cb syz 4 271d 268d 250d c4335704 ax25: fix a use-after-free in ax25_fillin_cb()
INFO: task hung in lo_release 1 432d 432d 250d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: use-after-free Read in locks_delete_block syz 4 291d 314d 250d 16306a61 fs/locks: always delete_block after waiting.
general protection fault in fdb_find_rcu C 3 271d 267d 250d f989d03e net: rtnetlink: address is mandatory for rtnl_fdb_get
general protection fault in kvm_arch_vcpu_ioctl_run C 12 277d 293d 255d dcbd3e49 KVM: X86: Fix NULL deref in vcpu_scan_ioapic
general protection fault in __vb2_queue_free C 38 271d 327d 255d 62dcb4f4 media: vb2: check memory model for VIDIOC_CREATE_BUFS
WARNING in static_key_enable_cpuslocked 1 302d 302d 255d 9c480601 udp: fix jump label misuse
WARNING in static_key_disable_cpuslocked syz 5 291d 310d 255d 9c480601 udp: fix jump label misuse
BUG: corrupted list in ___neigh_create C 706 284d 287d 255d 8cc196d6 neighbor: gc_list changes should be protected by table lock
WARNING in __rcu_read_unlock C 2 274d 282d 255d 11789039 fou: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in __ipv6_addr_type 1 276d 276d 255d cbb49697 ipv6: tunnels: fix two use-after-free
BUG: corrupted list in neigh_mark_dead C 4117 284d 287d 255d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KMSAN: kernel-infoleak in sctp_getsockopt syz 147 255d 291d 255d 4a2eb0c3 sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event
KASAN: use-after-free Read in tipc_group_bc_cong C 280 276d 287d 255d 143ece65 tipc: check tsk->group in tipc_wait_for_cond()
KASAN: use-after-free Read in tipc_mcast_xmit syz 7 273d 280d 255d 3c6306d4 tipc: check group dests after tipc_wait_for_cond()
KMSAN: uninit-value in __inet6_bind C 56 256d 286d 255d fb242745 ipv6: explicitly initialize udp6_addr in udp_sock_create6()
INFO: task hung in flush_workqueue C 293 274d 325d 255d 52117be6 media: vim2m: use cancel_delayed_work_sync instead of flush_schedule_work
KASAN: slab-out-of-bounds Read in neigh_mark_dead 12 284d 287d 255d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KASAN: slab-out-of-bounds Read in ___neigh_create 1 287d 287d 255d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KASAN: null-ptr-deref Write in kthread_stop C 2527 271d 329d 255d 701f49bc media: vivid: fix error handling of kthread_run
KASAN: use-after-free Read in kfree_skb (2) C 66 277d 286d 255d acb4a33e tipc: fix a double kfree_skb()
KASAN: use-after-free Read in skcipher_recvmsg 6 301d 325d 255d f7d76e05 crypto: user - fix use_after_free of struct xxx_request
BUG: sleeping function called from invalid context at mm/slab.h:LINE (4) C 36 280d 441d 255d f9c9bdb5 crypto: x86/chacha - avoid sleeping under kernel_fpu_begin()
general protection fault in inet_lhash2_lookup C 1137 279d 282d 255d eedbbb0d net: dccp: initialize (addr,port) listening hashtable
divide error in alarm_forward 1 281d 280d 255d 0e334db6 posix-timers: Fix division by zero bug
KASAN: use-after-free Read in kvm_put_kvm C 143 277d 337d 255d 987d1149 KVM: fix unregistering coalesced mmio zone from wrong bus
general protection fault in inet6_lhash2_lookup C 718 279d 282d 255d eedbbb0d net: dccp: initialize (addr,port) listening hashtable
KASAN: use-after-free Read in neigh_mark_dead C 858 284d 287d 255d 8cc196d6 neighbor: gc_list changes should be protected by table lock
WARNING in rds_message_alloc_sgs C 6 293d 327d 255d ea010070 net/rds: fix warn in rds_message_alloc_sgs
WARNING in vkms_plane_duplicate_state C 108 272d 304d 255d 7cdf33ab drm/vkms: Fix plane duplicate_state
divide error in vivid_vid_cap_s_dv_timings C 108 271d 328d 255d 9729d6d2 media: vivid: set min width/height to a value > 0
KMSAN: uninit-value in packet_sendmsg 5 304d 279d 255d 99137b78 packet: validate address length
KASAN: use-after-free Read in vb2_mmap C 276 271d 328d 255d cd26d1c4 media: vb2: vb2_mmap: move lock up
general protection fault in __ipv6_sock_mc_join C 9 282d 286d 255d fb83ed49 tipc: compare remote and local protocols in tipc_udp_enable()
BUG: pagefault on kernel address ADDR in non-whitelisted uaccess C 17 280d 325d 255d 560ccb75 media: vivid: free bitmap_cap when updating std/timings/etc.
KASAN: global-out-of-bounds Read in tpg_print_str_4 C 52 293d 318d 255d e5f71a27 media: v4l2-tpg: array index could become negative
KASAN: use-after-free Read in ___neigh_create C 164 284d 287d 255d 8cc196d6 neighbor: gc_list changes should be protected by table lock
net build error 2 364d 365d 265d 16fdf8ba rds: Fix build regression.
WARNING in fuse_destroy_inode C 7 310d 310d 269d 4fc4bb79 fuse: Add bad inode check in fuse_destroy_inode()
WARNING in userfaultfd_ioctl C 11 283d 293d 269d 01e881f5 userfaultfd: check VM_MAYWRITE was set after verifying the uffd is registered
KASAN: use-after-free Read in sctp_hash_transport 1 309d 308d 279d fb6df5a6 sctp: kfree_rcu asoc
KASAN: use-after-free Read in vhost_transport_send_pkt syz 36 293d 419d 279d 834e772c vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in delayed_uprobe_remove C 2 322d 325d 279d 1aed58e6 Uprobes: Fix kernel oops with delayed_uprobe_remove()
KMSAN: kernel-infoleak in _copy_to_iter (4) C 56 293d 298d 279d 68883893 rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
KASAN: invalid-free in hub_event 1 301d 300d 279d d81bb019 USB: Fix invalid-free bug in port_over_current_notify()
KASAN: use-after-free Read in sctp_epaddr_lookup_transport syz 5 309d 310d 279d fb6df5a6 sctp: kfree_rcu asoc
KASAN: use-after-free Read in vhost_work_queue syz 30 291d 390d 279d 834e772c vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_transport_cancel_pkt syz 17 317d 362d 279d 834e772c vhost/vsock: fix use-after-free in network stack callers
WARNING in alloc_pages_vma C 98 287d 291d 279d 356ff8a9 Revert "mm, thp: consolidate THP gfp handling into alloc_hugepage_direct_gfpmask"
KASAN: use-after-free Read in snd_ctl_elem_add 1 312d 311d 281d e1a7bfe3 ALSA: control: Fix race between adding and removing a user element
WARNING in cttimeout_default_get C 44 290d 310d 290d 89259088 netfilter: nfnetlink_cttimeout: fetch timeouts for udplite and gre, too
WARNING in format_decode (2) C 16 309d 391d 290d 1efb6ee3 bpf: fix check of allowed specifiers in bpf_trace_printk
KMSAN: uninit-value in linear_transfer (2) C 7 295d 318d 290d 65766ee0 ALSA: oss: Use kvzalloc() for local buffer allocations
KASAN: use-after-free Read in nbp_vlan_rcu_free 1 315d 315d 290d 9d332e69 net: bridge: fix vlan stats use-after-free on destruction
KMSAN: kernel-infoleak in kvm_write_guest_page C 36 292d 319d 290d bcbfbd8e KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
BUG: GPF in non-whitelisted uaccess (non-canonical address?) C 10 308d 315d 290d 8c01db76 HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges
KASAN: slab-out-of-bounds Write in queue_stack_map_push_elem C 30 299d 301d 290d 813961de bpf: fix integer overflow in queue_stack_map
WARNING in bpf_check (2) C 9 312d 312d 290d afd59424 bpf: fix off-by-one error in adjust_subprog_starts
INFO: task hung in fuse_sb_destroy C 2 326d 326d 290d 7fabaf30 fuse: fix leaked notify reply
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl C 31 295d 310d 290d 7f9ad1df KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
general protection fault in icmp_timeout_obj_to_nlattr C 13 322d 326d 314d 8866df92 netfilter: nfnetlink_cttimeout: pass default timeout policy to obj_to_nlattr
general protection fault in addr_resolve C 32 350d 367d 314d fe33507e RDMA/core: Check error status of rdma_find_ndev_for_src_ip_rcu
KMSAN: uninit-value in synaptics_detect C 137 314d 367d 314d f39f8688 Input: synaptics - avoid using uninitialized variable when probing
BUG: unable to handle kernel NULL pointer dereference in sha256_mb_mgr_get_comp_job_avx2 1 348d 348d 314d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
KMSAN: uninit-value in dev_mc_add_excl C 13 319d 331d 314d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KASAN: stack-out-of-bounds Read in __aa_lookupn_ns C 52 330d 362d 314d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
KASAN: slab-out-of-bounds Read in sctp_getsockopt C 9 332d 331d 314d 71335836 sctp: check policy more carefully when getting pr status
WARNING in __put_task_struct (2) C 17 341d 349d 314d fe9bc164 RDMA/restrack: Protect from reentry to resource return path
KASAN: invalid-free in p9stat_free C 3 392d 392d 314d 62e39417 9p: clear dangling pointers in p9stat_free 81c99089 v9fs_dir_readdir: fix double-free on p9stat_read error
possible deadlock in ovl_copy_up_start 2 332d 340d 314d 6cd07870 ovl: fix recursive oi->lock in ovl_link()
KASAN: use-after-free Read in sha_complete_job 1 354d 352d 314d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
BUG: corrupted list in cpu_stop_queue_work C 24 433d 443d 314d 552446a4 shmem: Convert shmem_add_to_page_cache to XArray
KMSAN: uninit-value in dev_uc_add_excl C 20 326d 367d 314d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
general protection fault in rb_erase C 79836 322d 362d 314d 18aded17 ext4: fix EXT4_IOC_SWAP_BOOT
KASAN: use-after-free Read in tcf_block_find C 27 355d 361d 314d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KASAN: use-after-free Read in seq_escape 1 357d 357d 314d 33458eab ext4: fix use-after-free race in ext4_remount()'s error path
KASAN: use-after-free Read in _copy_from_iter C 12 418d 430d 314d 728356de 9p: Add refcount to p9_req_t
KASAN: use-after-free Read in gfs2_log_flush syz 14 336d 376d 314d 4c62bd9c gfs2: Don't leave s_fs_info pointing to freed memory in init_sbd
general protection fault in getname_kernel C 10 342d 350d 314d 3df629d8 gfs2_meta: ->mount() can get NULL dev_name
kernel BUG at arch/x86/mm/physaddr.c:LINE! C 10 315d 347d 314d babf4770 ovl: fix error handling in ovl_verify_set_fh()
general protection fault in __skb_flow_dissect (2) C 11 362d 370d 314d d0e13a14 flow_dissector: lookup netns by skb->sk if skb->dev is NULL
general protection fault in ctnetlink_alloc_filter C 80 364d 367d 314d 9306425b netfilter: ctnetlink: must check mark attributes vs NULL
WARNING: kmalloc bug in krealloc C 2 434d 434d 314d 61448479 mm: don't warn about large allocations for slab
KASAN: slab-out-of-bounds Read in refcount_inc_not_zero_checked 2 340d 341d 314d 5032d079 bpf: skmsg, fix psock create on existing kcm/tls port
WARNING: kmalloc bug in __v9fs_get_acl C 212 332d 439d 314d 61448479 mm: don't warn about large allocations for slab
BUG: unable to handle kernel NULL pointer dereference in blk_mq_map_swqueue C 8 341d 361d 314d e01ad46d blk-mq: fallback to previous nr_hw_queues when updating fails
KASAN: use-after-free Write in jbd2_log_do_checkpoint 1 376d 371d 314d ccd3c437 jbd2: fix use after free in jbd2_log_do_checkpoint()
WARNING: kmalloc bug in str_read C 11 336d 381d 314d 4458bba0 selinux: Add __GFP_NOWARN to allocation at str_read()
KASAN: use-after-free Read in __dev_queue_xmit (3) 11 357d 360d 314d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KMSAN: uninit-value in ip_tunnel_lookup (2) C 2 332d 333d 314d b0350d51 ip_gre: fix parsing gre header in ipgre_err
KASAN: use-after-free Read in sha512_ctx_mgr_resubmit C 4 353d 403d 314d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
kernel BUG at mm/shmem.c:LINE! C 30 441d 443d 314d 552446a4 shmem: Convert shmem_add_to_page_cache to XArray
KASAN: null-ptr-deref Read in refcount_sub_and_test_checked C 31 322d 353d 314d fda21d46 ipv6: do not leave garbage in rt->fib6_metrics
WARNING in tcp_cleanup_ulp syz 16 341d 341d 314d aadd4355 tcp, ulp: remove socket lock assertion on ULP cleanup
KASAN: use-after-free Read in sctp_outq_select_transport 1 335d 335d 314d df132eff sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer
WARNING: kmalloc bug in input_mt_init_slots C 54 333d 366d 314d 61448479 mm: don't warn about large allocations for slab
general protection fault in dev_gro_receive (2) syz 4 339d 346d 314d ece23711 net: Properly unlink GRO packets on overflow.
upstream boot error (2) 1 327d 327d 314d 153fcd5f block: brd: associate with queue until adding disk
WARNING: kmalloc bug in get_valid_checkpoint syz 2 500d 500d 314d 61448479 mm: don't warn about large allocations for slab
WARNING in tcp_close syz 284 335d 435d 314d 8873c064 tcp: do not release socket ownership in tcp_close()
BUG: corrupted list in p9_read_work syz 23 322d 434d 314d e4ca13f7 9p/trans_fd: abort p9_read_work if req status changed
general protection fault in netdev_master_upper_dev_get 1 332d 332d 314d aab456df net/neigh: fix NULL deref in pneigh_dump_table()
KASAN: use-after-free Read in kfree_skb 1 336d 336d 314d 604d415e llc: do not use sk_eat_skb()
KASAN: use-after-free Read in fuse_dev_do_read syz 19 327d 375d 314d bc78abbd fuse: Fix use-after-free in fuse_dev_do_read()
WARNING: kmalloc bug in vfs_getxattr_alloc C 9 389d 432d 314d 61448479 mm: don't warn about large allocations for slab
BUG: unable to handle kernel NULL pointer dereference in sha1_mb_mgr_get_comp_job_avx2 1 362d 361d 314d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
WARNING: kmalloc bug in bfs_fill_super C 147 497d 541d 314d 9f2df09a bfs: add sanity check at bfs_fill_super()
INFO: task hung in ext4_fallocate C 1 357d 356d 314d f18b2b83 ext4: fix argument checking in EXT4_IOC_MOVE_EXT
WARNING: refcount bug in qdisc_put 5 357d 358d 314d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KMSAN: uninit-value in vcs_read C 2343 472d 495d 318d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
kernel BUG at include/linux/skbuff.h:LINE! 3 427d 435d 327d bab2c80e nsh: set mac len based on inner packet
KASAN: use-after-free Read in sctp_id2assoc 1 354d 354d 328d b336deca sctp: fix race on sctp_id2asoc
WARNING in usb_submit_urb (3) C 58 329d 345d 328d 665c365a USB: fix the usbfs flag sanitization for control transfers
KMSAN: kernel-infoleak in _copy_to_iter (3) C 36 328d 339d 328d b06f9d9f tipc: fix info leak from kernel tipc_event
KASAN: use-after-free Read in inet6_mc_check 1 345d 345d 328d dc012f36 ipv6: mcast: fix a use-after-free in inet6_mc_check
KASAN: slab-out-of-bounds Read in fscache_alloc_cookie C 1936 339d 441d 328d 1ff22883 fscache: Fix incomplete initialisation of inline key space fa520c47 fscache: Fix out of bound read in long cookie keys
KASAN: use-after-free Read in __llc_lookup_established 1 348d 347d 328d 5a8e7aea llc: set SOCK_RCU_FREE in llc_sap_add_socket()
KASAN: slab-out-of-bounds Read in vhci_hub_control C 43 338d 383d 328d 81f7567c usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control()
BUG: sleeping function called from invalid context at net/core/dev.c:LINE syz 8 341d 350d 328d cee27167 xsk: do not call synchronize_net() under RCU read lock
KASAN: slab-out-of-bounds Read in _decode_session6 C 35 328d 386d 328d 9f7e43da net/xfrm: fix out-of-bounds packet access
INFO: rcu detected stall in mousedev_write 18 381d 395d 339d f74c371f Input: mousedev - add a schedule point in mousedev_write()
kernel BUG at net/core/dev.c:LINE! (2) syz 2 348d 348d 339d 52b5d6f5 net: make skb_partial_csum_set() more robust against overflows
KASAN: use-after-free Read in finish_task_switch C 3047 364d 408d 342d 26b471c7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
WARNING in __skb_flow_dissect syz 3 347d 348d 346d af3fb24e tun: napi flags belong to tfile
general protection fault in dev_gro_receive syz 8 348d 360d 346d af3fb24e tun: napi flags belong to tfile
possible deadlock in flush_workqueue C 73762 353d 396d 346d d4859d74 net-backports: bonding: avoid possible dead-lock
KASAN: use-after-free Read in rawv6_sendmsg C 84 348d 380d 346d a688caa3 net-backports: ipv6: take rcu lock in rawv6_send_hdrinc()
possible deadlock in rtnetlink_rcv_msg 1 370d 370d 346d d4859d74 net-backports: bonding: avoid possible dead-lock
KASAN: slab-out-of-bounds Read in string (2) 14 353d 359d 346d 601350ff ovl: fix access beyond unterminated strings
WARNING in pcpu_alloc C 4 348d 356d 346d b0584ea6 bpf: don't accept cgroup local storage with zero value size
KASAN: use-after-free Write in ucma_put_ctx syz 11 362d 381d 346d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
general protection fault in usb_find_alt_setting (2) C 53 362d 384d 346d c9a4cb20 USB: handle NULL config in usb_find_alt_setting()
INFO: trying to register non-static key in tun_chr_write_iter 14 348d 359d 346d c7256f57 tun: initialize napi_mutex unconditionally
WARNING in rollback_registered_many 1 358d 358d 346d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
KASAN: use-after-free Read in ip_cmsg_recv_offset C 9 356d 359d 346d 64199fc0 net-backports: ipv4: fix use-after-free in ip_cmsg_recv_dstaddr()
possible deadlock in team_vlan_rx_add_vid syz 5 376d 410d 346d 471b83bd team: Forbid enslaving team device to itself
general protection fault in ubifs_mount C 216 367d 384d 346d 37f31b6c ubifs: Check for name being NULL while mounting
KMSAN: uninit-value in ip6_tnl_start_xmit C 69 360d 370d 346d 76c0ddd8 ip6_tunnel: be careful when accessing the inner header
KASAN: use-after-free Read in destroy_async_on_interface C 134 362d 384d 346d bd729f9d USB: fix error handling in usb_driver_claim_interface()
WARNING in usb_submit_urb (2) C 259 347d 384d 346d 7a68d9fb USB: usbdevfs: sanitize flags more
INFO: task hung in unregister_netdevice_notifier (2) 1 356d 356d 346d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
KASAN: use-after-free Read in cma_bind_port syz 2 376d 381d 346d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KMSAN: uninit-value in pppoe_rcv C 2 506d 376d 346d 8540827e pppoe: fix reception of frames with no mac header
INFO: task hung in rollback_registered_many 4 350d 357d 346d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
WARNING: suspicious RCU usage in inet_csk_route_req C 43 354d 588d 346d 1ad98e9d tcp/dccp: fix lockdep issue when SYN is backlogged
KMSAN: kernel-infoleak in _copy_to_iter (2) C 7 355d 382d 350d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
general protection fault in rhashtable_walk_start_check C 112 375d 386d 361d 8f5c5fcf tipc: call start and done ops directly in __tipc_nl_compat_dumpit()
WARNING in try_charge syz 649 361d 414d 361d 3100dab2 mm: memcontrol: print proper OOM header when no eligible victim left
divide error in nbd_ioctl C 50 376d 384d 361d bc811f05 nbd: don't allow invalid blocksize settings
WARNING in apparmor_secid_to_secctx C 3344 374d 389d 361d edf4e7b7 apparmor: fix bad debug check in apparmor_secid_to_secctx()
KASAN: use-after-free Read in ceph_destroy_options 1 396d 395d 361d 8aaff151 ceph: avoid a use-after-free in ceph_destroy_options()
general protection fault in ovl_free_fs C 4 379d 381d 361d 8c25741a ovl: fix oopses in ovl_fill_super() failure paths
KMSAN: uninit-value in snd_midi_event_encode_byte C 3 385d 385d 361d 5a7b44a8 ALSA: rawmidi: Initialize allocated buffers
KASAN: use-after-free Read in __rhashtable_lookup (2) C 22 375d 395d 361d cc4dfb7f rds: fix two RCU related problems
general protection fault in rhashtable_walk_exit C 8 375d 378d 361d 12a78b02 tipc: check return value of __tipc_dump_start()
KASAN: use-after-free Read in sock_i_ino syz 127 374d 384d 361d 0a3b8b2b tipc: orphan sock in tipc_release()
BUG: unable to handle kernel paging request in kfree (2) C 297 389d 441d 364d 7913690d net/9p/client.c: version pointer uninitialized
KMSAN: uninit-value in memcmp (2) C 131 375d 366d 364d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
KASAN: use-after-free Write in ip6_dst_destroy 1 442d 442d 375d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KASAN: stack-out-of-bounds Read in fib_table_lookup 1 434d 434d 376d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in wiphy_register (2) C 8 402d 403d 377d 48400433 mac80211_hwsim: require at least one channel
KASAN: use-after-free Read in tipc_group_fill_sock_diag syz 35 383d 400d 377d 9a07efa9 tipc: switch to rhashtable iterator
KASAN: global-out-of-bounds Read in ip6_xmit 2 557d 558d 377d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
WARNING in __fsnotify_recalc_mask syz 9 399d 400d 377d d3bc0fa8 fsnotify: fix false positive warning on inode delete
KASAN: use-after-free Read in sctp_transport_get_next C 6 392d 395d 377d bab1be79 sctp: hold transport before accessing its asoc in sctp_transport_get_next
KASAN: stack-out-of-bounds Read in __schedule syz 4 388d 390d 377d b845c898 bpf, sockmap: fix sock_hash_alloc and reject zero-sized keys
BUG: soft lockup in shrink_dcache_parent (2) 7 469d 476d 377d 4fb48871 restore cond_resched() in shrink_dcache_parent()
INFO: task hung in fsnotify_mark_destroy_workfn syz 13 409d 523d 380d 128f3804 android: binder: Rate-limit debug and userspace triggered err msgs
KASAN: use-after-free Read in ip6_tnl_start_xmit 1 510d 510d 382d b84bbaf7 packet: in packet_snd start writing at link layer allocation
INFO: rcu detected stall in snd_pcm_oss_prepare 4 530d 533d 383d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
WARNING in up_write C 725 490d 538d 383d d7d760ef locking/rwsem: Add a new RWSEM_ANONYMOUSLY_OWNED flag
BUG: soft lockup in d_walk C 163 469d 514d 383d 4fb48871 restore cond_resched() in shrink_dcache_parent()
general protection fault in vsscanf C 7 409d 439d 384d 10aa1452 9p: fix multiple NULL-pointer-dereferences
net-next boot error 66 418d 424d 390d ca9e83b4 virtio-net: correctly update XDP_TX counters
WARNING in input_alloc_absinfo C 318 393d 466d 390d 100294ce Input: do not use WARN() in input_alloc_absinfo()
KASAN: use-after-free Read in ip6_hold_safe C 1 416d 416d 390d 6d37fa49 l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
KASAN: use-after-free Read in iotlb_access_ok 1 416d 412d 390d b13f9c63 vhost: reset metadata cache when initializing new IOTLB
general protection fault in process_init_reply C 24 397d 432d 390d e8f3bd77 fuse: Fix oops at process_init_reply()
WARNING: suspicious RCU usage in bpf_prog_array_copy_core C 22873 391d 405d 390d 965931e3 bpf: fix a rcu usage warning in bpf_prog_array_copy_core()
WARNING: lock held when returning to user space in fuse_lock_inode C 1439 397d 437d 390d 63576c13 fuse: fix initial parallel dirops
WARNING: refcount bug in llc_sap_find C 18 410d 411d 390d 0dcb8225 llc: use refcount_inc_not_zero() for llc_sap_find()
possible deadlock in rhashtable_lookup_insert_fast C 28 402d 405d 390d ff93bca7 ila: make lockdep happy again
KASAN: slab-out-of-bounds Write in crypto_dh_encode_key C 1401 413d 441d 390d 35f7d522 crypto: dh - fix calculating encoded key size
KASAN: slab-out-of-bounds Read in _autofs_dev_ioctl C 5 403d 404d 390d 0633da48 autofs: fix autofs_sbi() does not check super block type
KASAN: use-after-free Write in ip6_hold_safe C 25 414d 425d 390d 6d37fa49 l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
general protection fault in validate_checkpoint 186 417d 417d 390d d3f07c04 f2fs: fix invalid memory access
BUG: soft lockup in snd_virmidi_output_trigger 3 430d 532d 390d 50e9ffb1 ALSA: virmidi: Fix too long output trigger loop
general protection fault in send_sigurg_to_task C 6 402d 406d 390d 84fe4cc0 signal: Don't send signals to tasks that don't exist
KASAN: slab-out-of-bounds Write in eth_header_parse C 7 409d 422d 390d 4576cd46 packet: refine ring v3 block size test to hold one frame
WARNING in __snd_rawmidi_transmit_ack (2) C 6 397d 404d 390d 82fd4b05 ALSA: seq: virmidi: Fix discarding the unsubscribed output
general protection fault in send_sigio_to_task C 176 402d 406d 390d 84fe4cc0 signal: Don't send signals to tasks that don't exist
KASAN: use-after-free Read in do_shrink_slab 9 397d 400d 390d 8df4a44c mm: check shrinker is memcg-aware in register_shrinker_prepared()
KMSAN: uninit-value in do_msgrcv C 8 390d 467d 390d 39cfffd7 ipc/util.c: use ipc_rcu_putref() for failues in ipc_addid() 615c999c ipc: compute kern_ipc_perm.id under the ipc lock e2652ae6 ipc: reorganize initialization of kern_ipc_perm.seq
WARNING: ODEBUG bug in vsock_stream_connect C 42 410d 419d 390d 455f05ec vsock: split dwork to avoid reinitializations
KASAN: slab-out-of-bounds Read in pdu_read C 267 406d 441d 390d f984579a 9p: validate PDU length 7913690d net/9p/client.c: version pointer uninitialized
WARNING in close_fs_devices C 137 431d 474d 390d 81ffd56b btrfs: fix mount and ioctl device scan ioctl race
general protection fault in string (2) 1 416d 416d 390d a6bcfc89 net: check extack._msg before print
general protection fault in p9_fd_create_unix C 4 436d 440d 390d 10aa1452 9p: fix multiple NULL-pointer-dereferences
general protection fault in mount_fs C 1 536d 536d 390d 7464726c hfsplus: don't return 0 when fill_super() failed
general protection fault in open_fs_devices C 8 442d 473d 390d 81ffd56b btrfs: fix mount and ioctl device scan ioctl race
general protection fault in smc_ioctl (3) C 15 409d 411d 390d 7311d665 net/smc: move sock lock in smc_ioctl()
KASAN: slab-out-of-bounds Write in vmac_final C 2 467d 464d 390d bb296481 crypto: vmac - separate tfm and request context
BUG: corrupted list in p9_fd_cancel C 34 427d 440d 390d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
general protection fault in smc_tx_prepared_sends C 7 415d 417d 390d 7311d665 net/smc: move sock lock in smc_ioctl()
KASAN: use-after-free Read in p9_poll_workfn C 148 401d 441d 390d 430ac66e net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
WARNING: bad usercopy in __kvm_write_guest_page C 4 491d 484d 394d 0a06d425 KVM: vmx: use local variable for current_vmptr when emulating VMPTRST
WARNING in refcount_inc (3) C 7 539d 540d 394d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Write in irq_bypass_register_consumer C 1632 431d 692d 394d b5020a8e KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel.
KASAN: slab-out-of-bounds Write in process_preds C 6020 454d 530d 394d 70303420 tracing: Check for no filter when processing event filters
kernel BUG at net/ipv6/route.c:LINE! C 197 413d 435d 410d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
possible deadlock in bond_get_stats C 11 416d 420d 410d 7e2556e4 bonding: avoid lockdep confusion in bond_get_stats()
kernel BUG at mm/memory.c:LINE! 1 442d 441d 410d bfd40eaf mm: fix vma_is_anonymous() false-positives
WARNING in __ip6_make_skb C 1 435d 435d 410d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
general protection fault in tcp_gso_segment 1 436d 436d 410d ff907a11 net: skb_segment() should not return NULL
KASAN: use-after-free Read in refcount_sub_and_test_checked 3 416d 417d 410d e6aed040 Revert "net/ipv6: fix metrics leak"
WARNING in ip6_sk_dst_lookup_flow C 2 416d 433d 410d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in __nf_conntrack_find_get C 67 426d 432d 410d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
KASAN: invalid-free in fat_fill_super 1 439d 438d 410d 35033ab9 fat: fix memory allocation failure handling of match_strdup()
WARNING in ip6_setup_cork C 4 415d 435d 410d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: kernel-infoleak in put_cmsg C 3 443d 432d 410d 2efd4fca ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
BUG: unable to handle kernel paging request in neigh_update 1 430d 430d 410d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in gc_worker 10 426d 438d 410d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
kernel BUG at fs/userfaultfd.c:LINE! (2) C 8 416d 434d 410d 31e810aa userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KASAN: use-after-free Write in dst_release (2) C 3 416d 417d 410d e6aed040 Revert "net/ipv6: fix metrics leak"
KMSAN: kernel-infoleak in _copy_to_iter C 285 426d 461d 410d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
general protection fault in __delayacct_blkio_end C 50 426d 521d 410d b512719f delayacct: fix crash in delayacct_blkio_end() after delayacct init failure
unregister_netdevice: waiting for DEV to become free C 170521 410d 521d 410d 8cc88773 xfrm: fix missing dst_release() after policy blocking lbcast and multicast
general protection fault in rds_ib_get_mr C 9 451d 550d 410d 9e630bcb RDS: RDMA: Fix the NULL-ptr deref in rds_ib_get_mr
KASAN: out-of-bounds Read in bpf_test_finish 9 434d 441d 411d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: slab-out-of-bounds Read in ipv6_gso_pull_exthdrs C 4 450d 465d 411d bab2c80e nsh: set mac len based on inner packet
KASAN: stack-out-of-bounds Read in __d_lookup_rcu 1 431d 430d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING: refcount bug in smap_release_sock C 55 428d 466d 411d 7ebc14d5 bpf: sockmap, consume_skb in close path 547b3aa4 bpf: sockmap, error path can not release psock in multi-map case
KASAN: stack-out-of-bounds Read in __handle_mm_fault (2) C 3 429d 431d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in vma_interval_tree_insert (2) 1 426d 426d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in kernfs_find_ns 1 431d 431d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in __snd_rawmidi_transmit_ack syz 2 434d 434d 411d 39675f7a ALSA: rawmidi: Change resized buffers atomically
KASAN: stack-out-of-bounds Read in rb_next (2) 1 431d 431d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in scheduler_tick C 1 441d 441d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in neigh_flush_dev 1 436d 434d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in copy_page_range 1 431d 431d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __cgroup_account_cputime_field 1 431d 431d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in debug_check_no_obj_freed (5) 4 427d 433d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in unmap_page_range (3) 1 427d 427d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in cpuacct_account_field (2) 1 429d 428d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in lock_sock_nested 1 434d 434d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in netlink_has_listeners 1 434d 433d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel NULL pointer dereference in corrupted (2) C 1 432d 432d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: slab-out-of-bounds Read in corrupted C 1 432d 432d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in cpuacct_charge 1 426d 426d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in bpf_tcp_close C 1 431d 431d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in update_blocked_averages 1 437d 437d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KMSAN: uninit-value in af_alg_free_areq_sgls C 640 426d 533d 411d 2546da99 crypto: af_alg - Initialize sg_num_bytes in error code path
WARNING in bpf_check 3 431d 438d 411d c7a89784 bpf: don't leave partial mangled prog in jit_subprogs error path
KASAN: stack-out-of-bounds Read in __enqueue_entity 1 435d 435d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in account_system_index_time C 2 434d 441d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in sctp_assoc_update_frag_point 5 432d 454d 411d a6592547 sctp: fix the issue that pathmtu may be set lower than MINSEGMENT
kernel BUG at mm/slab.c:LINE! (2) C 701 426d 441d 411d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: stack-out-of-bounds Read in __task_pid_nr_ns 1 440d 440d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in locks_remove_posix C 1 429d 428d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in get_mem_cgroup_from_mm 1 439d 439d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in change_protection 1 434d 434d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in do_debug (2) 1 432d 432d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __delayacct_add_tsk 1 438d 438d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in __sock_release 1 430d 430d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in add_wait_queue C 1 441d 441d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in ext4_symlink 1 434d 434d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
INFO: rcu detected stall in vprintk_emit syz 2 448d 454d 411d 3bc53be9 net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL.
WARNING: refcount bug in smc_tcp_listen_work 1 474d 473d 411d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
WARNING in set_precision C 140 431d 472d 411d c604cb76 KEYS: DNS: fix parsing multiple options
BUG: unable to handle kernel paging request in cpuacct_charge syz 2 433d 433d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __acct_update_integrals 2 429d 437d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: use-after-free Read in ipv6_gso_pull_exthdrs C 5 429d 461d 411d bab2c80e nsh: set mac len based on inner packet
general protection fault in rb_next 1 432d 432d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Write in __tlb_remove_page_size 1 428d 427d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in timerqueue_add C 4 429d 445d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in rb_insert_color (2) 1 435d 435d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __tlb_remove_page_size 1 429d 428d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in enqueue_task_fair 1 432d 432d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel paging request in account_system_index_time 1 429d 428d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in find_inode_nowait 1 441d 441d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in iov_iter_revert C 74 431d 497d 411d 32da1221 tls: Stricter error checking in zerocopy sendmsg path
general protection fault in smc_ioctl (2) C 43 412d 434d 411d 1992d998 net/smc: take sock lock in smc_ioctl()
KASAN: stack-out-of-bounds Read in tlb_flush_mmu_free 2 437d 440d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in do_tcp_getsockopt C 9 430d 442d 411d 6508b678 tcp: cleanup copied_seq and urg_data in tcp_disconnect
KASAN: use-after-free Read in bpf_test_finish C 1211 426d 441d 411d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: use-after-free Write in skb_release_data C 1903 485d 538d 411d 993675a3 packet: reset network header if packet shorter than ll reserved space
KASAN: stack-out-of-bounds Read in rcu_process_callbacks C 1 435d 435d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel paging request in ttwu_do_activate 1 445d 445d 411d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in smc_unhash_sk C 155731 414d 576d 411d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
kernel BUG at net/packet/af_packet.c:LINE! (3) syz 5 561d 608d 420d a6361f0c packet: fix bitfield update race
KASAN: slab-out-of-bounds Read in getname_kernel C 8 436d 535d 426d 02f51d45 autofs: fix slab out of bounds read in getname_kernel()
kernel BUG at mm/gup.c:LINE! syz 4 448d 446d 426d 24962af7 fs, elf: make sure to page align bss in load_elf_library bb177a73 mm: do not bug_on on incorrect length in __mm_populate()
KASAN: global-out-of-bounds Write in string C 7 481d 537d 426d fe10e398 reiserfs: fix buffer overflow with long warning messages
KASAN: use-after-free Read in l2tp_session_create 119 548d 614d 429d 6b9f3423 l2tp: fix races in tunnel creation
KMSAN: uninit-value in ip_tunnel_xmit C 2594 432d 519d 432d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in br_nf_forward_arp 1 479d 476d 432d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: kernel-infoleak in vcs_read C 531 461d 471d 437d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
WARNING: suspicious RCU usage in fib6_info_alloc syz 2 523d 522d 440d 27b10608 net/ipv6: Fix gfp_flags arg to addrconf_prefix_route
WARNING in kernfs_add_one C 174 441d 505d 440d 84d0c27d driver core: Don't ignore class_dir_create_and_add() failure.
INFO: rcu detected stall in unwind_next_frame 2 490d 493d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
BUG: unable to handle kernel paging request in dput C 26 472d 474d 440d d85b399b fix proc_fill_cache() in case of d_alloc_parallel() failure
general protection fault in fuse_ctl_remove_conn C 16 474d 513d 440d 6becdb60 fuse: fix control dir setup and teardown
WARNING in bpf_int_jit_compile syz 11 448d 485d 440d 9facc336 bpf: reject any prog that failed read-only lock
possible deadlock in sock_hash_free C 45 482d 482d 440d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
possible deadlock in __might_fault (2) C 20 510d 513d 440d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
KMSAN: uninit-value in _copy_to_iter (2) C 226 472d 517d 440d 670ae9ca vhost: fix info leak due to uninitialized memory
BUG: unable to handle kernel NULL pointer dereference in do_select 45 450d 451d 440d e88958e6 net: handle NULL ->poll gracefully
kernel BUG at fs/f2fs/inode.c:LINE! C 1 520d 520d 440d 5d64600d f2fs: avoid bug_on on corrupted inode
WARNING: ODEBUG bug in sock_hash_free 1 454d 454d 440d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
KASAN: slab-out-of-bounds Write in sha512_final C 21 453d 470d 440d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in rmd320_final C 44 452d 472d 440d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in kmem_cache_alloc_node_trace 1 528d 510d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Read in bpf_csum_update C 2 478d 476d 440d 58990d1f bpf: reject passing modified ctx to helper functions
KMSAN: uninit-value in ip_vs_lblcr_check_expire 2050 440d 517d 440d 3aa1409a ipvs: initialize tbl->entries after allocation
general protection fault in wb_workfn (2) 38 460d 485d 440d 3ee7e869 bdi: Fix another oops in wb_workfn()
INFO: rcu detected stall in is_bpf_text_address C 1 491d 491d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in __vfs_write syz 14 469d 472d 440d 66e58e0e bpfilter: fix race in pipe access
general protection fault in pipe_write syz 1 472d 471d 440d 66e58e0e bpfilter: fix race in pipe access
possible deadlock in tcp_mmap C 1908 510d 513d 440d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
KASAN: use-after-free Read in bpf_skb_change_proto 1 470d 469d 440d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: use-after-free Write in prb_fill_curr_block C 2 478d 479d 440d eb73190f net/packet: refine check for priv area size
kernel BUG at fs/f2fs/node.c:LINE! C 1 520d 519d 440d a4f843bd f2fs: give message and set need_fsck given broken node id
WARNING in skb_warn_bad_offload (2) C 6 513d 513d 440d a8c744a8 udp: disable gso with no_check_tx
BUG: unable to handle kernel NULL pointer dereference in ep_item_poll C 15 450d 451d 440d e88958e6 net: handle NULL ->poll gracefully
WARNING in bpf_prog_select_runtime syz 45 464d 466d 440d 9facc336 bpf: reject any prog that failed read-only lock
KASAN: slab-out-of-bounds Read in bpf_skb_vlan_push syz 2 466d 466d 440d 58990d1f bpf: reject passing modified ctx to helper functions
WARNING: kernel stack regs has bad 'bp' value (3) C 7971 442d 597d 440d b7b73cd5 crypto: x86/salsa20 - remove x86 salsa20 implementations
general protection fault in __vfs_write syz 25 469d 472d 440d 66e58e0e bpfilter: fix race in pipe access
INFO: task hung in n_tty_flush_buffer 6 449d 523d 440d ebec3f8f n_tty: Access echo_* variables carefully.
KASAN: use-after-free Read in skb_ensure_writable C 4 469d 476d 440d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: use-after-free Read in build_segment_manager C 5 520d 520d 440d 8a29c126 f2fs: sanity check for total valid node blocks
KASAN: use-after-free Read in bpf_tcp_close C 1748 446d 485d 440d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
KMSAN: uninit-value in nfqnl_recv_config (2) C 10 453d 469d 440d ba062ebb netfilter: nf_queue: augment nfqa_cfg_policy
KASAN: use-after-free Read in pipe_read C 3 471d 472d 440d 66e58e0e bpfilter: fix race in pipe access
KASAN: slab-out-of-bounds Read in crypto_morus640_decrypt_chunk C 8 460d 467d 440d a81ae809 crypto: morus640 - Fix out-of-bounds access
WARNING in perf_trace_buf_alloc (2) C 22 580d 686d 440d 4d220ed0 bpf: remove tracepoints from bpf core
KASAN: use-after-free Read in finish_wait 8 470d 472d 440d 66e58e0e bpfilter: fix race in pipe access
BUG: unable to handle kernel paging request in bpf_prog_select_runtime 1 456d 456d 440d 85782e03 bpf: undo prog rejection on read-only lock failure
WARNING: kmalloc bug in xdp_umem_create C 7 464d 470d 440d a343993c xsk: silence warning on memory allocation failure
KASAN: use-after-free Write in tls_push_record C 24 441d 485d 440d a447da7d tls: fix use-after-free in tls_push_record
KASAN: use-after-free Read in fib6_table_lookup 1 463d 462d 440d 9b0a8da8 net/ipv6: respect rcu grace period before freeing fib6_info
INFO: rcu detected stall in skb_free_head 4 479d 511d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in __kernel_write syz 7 469d 472d 440d 66e58e0e bpfilter: fix race in pipe access
WARNING in ion_dma_buf_begin_cpu_access C 62 448d 470d 440d 0a2bc003 staging: android: ion: Return an ERR_PTR in ion_map_kernel
WARNING: lock held when returning to user space! (2) C 9 500d 502d 440d 9e575010 net/ipv6: fix lock imbalance in ip6_route_del()
INFO: rcu detected stall in corrupted syz 1 490d 489d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: rcu detected stall in ip_route_output_key_hash 2 491d 494d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KMSAN: uninit-value in ebt_stp_mt_check (2) C 222 440d 472d 440d c568503e netfilter: x_tables: initialise match/target check parameter struct
kernel BUG at fs/f2fs/segment.c:LINE! syz 1 520d 520d 440d 8a29c126 f2fs: sanity check for total valid node blocks
BUG: unable to handle kernel NULL pointer dereference in corrupted C 5 471d 471d 440d c0129a06 smc: convert to ->poll_mask
KMSAN: uninit-value in eth_mac_addr 2 443d 476d 440d 644c7eeb rtnetlink: validate attributes in do_setlink()
KASAN: slab-out-of-bounds Write in tgr192_final C 30 452d 471d 440d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in wp384_final C 27 453d 472d 440d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in dev_queue_xmit_nit 1 486d 486d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Write in crypto_sha3_final C 68 453d 472d 440d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto C 2 470d 469d 440d 58990d1f bpf: reject passing modified ctx to helper functions
BUG: unable to handle kernel paging request in build_segment_manager C 1 520d 520d 440d b2ca374f f2fs: sanity check on sit entry
KASAN: null-ptr-deref Write in simple_write_to_buffer C 5 481d 505d 440d fc14eebf PM / hibernate: Fix oops at snapshot_write()
INFO: rcu detected stall in sctp_packet_transmit 1 495d 495d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
general protection fault in touch_atime syz 6 469d 472d 440d 66e58e0e bpfilter: fix race in pipe access
WARNING: possible circular locking dependency detected (4) C 27 514d 521d 440d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
BUG: delta (-6195) <= 0 at net/dccp/ccids/ccid3.c:LINE/ccid3_hc_rx_send_feedback() 1 458d 458d 440d 74174fe5 net: dccp: avoid crash in ccid3_hc_rx_send_feedback()
INFO: rcu detected stall in sctp_chunk_put 1 479d 479d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Read in ip6_xmit (3) C 69 446d 488d 440d 9901c5d7 bpf: sockmap, fix crash when ipv6 sock is added
KASAN: slab-out-of-bounds Read in skb_ensure_writable C 9 467d 476d 440d 58990d1f bpf: reject passing modified ctx to helper functions
INFO: rcu detected stall in sctp_generate_heartbeat_event 2 493d 503d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in bpf_csum_update C 1 478d 476d 440d 58990d1f bpf: reject passing modified ctx to helper functions
BUG: soft lockup in do_raw_spin_unlock (2) 1 468d 468d 440d 4fb48871 restore cond_resched() in shrink_dcache_parent()
BUG: unable to handle kernel paging request in bpf_int_jit_compile syz 2 452d 456d 440d 85782e03 bpf: undo prog rejection on read-only lock failure
general protection fault in __mnt_want_write 1 470d 470d 440d 66e58e0e bpfilter: fix race in pipe access
KASAN: use-after-free Write in bpf_tcp_close C 67 447d 483d 440d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
general protection fault in bpf_tcp_close C 421 441d 485d 440d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close 54fedb42 bpf: sockmap, fix smap_list_map_remove when psock is in many maps
general protection fault in smc_ioctl C 5214 462d 492d 440d 2351abe6 net/smc: return 0 for ioctl calls in states INIT and CLOSED
INFO: rcu detected stall in kfree_skbmem 4 480d 510d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: task hung in tty_set_termios 1 542d 540d 440d ebec3f8f n_tty: Access echo_* variables carefully.
bpf-next boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 3 473d 475d 440d bf956be5 umh: fix race condition
WARNING in do_dentry_open C 26 464d 471d 440d b1655857 bpf: implement dummy fops for bpf objects
KASAN: slab-out-of-bounds Write in prb_fill_curr_block C 2 479d 479d 440d eb73190f net/packet: refine check for priv area size
KASAN: slab-out-of-bounds Read in build_segment_manager C 1 520d 520d 440d 8a29c126 f2fs: sanity check for total valid node blocks
KASAN: use-after-free Read in xfs_inobt_init_key_from_rec C 1 537d 537d 440d 2e050e64 xfs: fix inobt magic number check
WARNING: refcount bug in __udp_gso_segment 2 500d 500d 440d 575b65bc udp: avoid refcount_t saturation in __udp_gso_segment()
INFO: task hung in namespace_unlock 15 444d 453d 440d ebec3f8f n_tty: Access echo_* variables carefully.
KMSAN: uninit-value in rtnetlink_put_metrics syz 3 474d 476d 440d 5b5e7a0d net: metrics: add proper netlink validation
KASAN: slab-out-of-bounds Read in bpf_skb_change_head C 2 466d 466d 440d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Write in sha1_finup C 119 452d 472d 440d 3619dec5 dh key: fix rounding up KDF output length
WARNING: kmalloc bug in map_get_next_key C 5 494d 494d 440d 683d2ac3 bpf: fix sock hashmap kmalloc warning
unexpected kernel reboot (2) C 2073 440d 531d 440d 0447378a kvm: vmx: Nested VM-entry prereqs for event inj.
BUG: workqueue lockup (3) C 1215 444d 497d 440d 4fb48871 restore cond_resched() in shrink_dcache_parent()
INFO: rcu detected stall in ipv6_addr_label 1 575d 574d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
WARNING: kernel stack frame pointer has bad value C 1108 443d 521d 440d f044a84e crypto: don't optimize keccakf()
KASAN: use-after-free Read in fuse_kill_sb_blk 4 491d 510d 440d 543b8f86 fuse: don't keep dead fuse_conn at fuse_fill_super().
general protection fault in vfs_read syz 2 470d 472d 440d 66e58e0e bpfilter: fix race in pipe access
KASAN: use-after-free Read in ip6_route_mpath_notify C 25 473d 478d 440d f7225172 net/ipv6: prevent use after free in ip6_route_mpath_notify
BUG: unable to handle kernel NULL pointer dereference in do_sys_poll C 297 450d 451d 440d e88958e6 net: handle NULL ->poll gracefully
WARNING in ebt_do_table C 13 449d 474d 440d 11ff7288 netfilter: ebtables: reject non-bridge targets
WARNING in sysfs_remove_group C 11125 442d 696d 440d d3349b6b loop: remember whether sysfs_create_group() was done
KASAN: null-ptr-deref Write in xdp_umem_unaccount_pages C 25 469d 472d 440d c09290c5 bpf, xdp: fix crash in xdp_umem_unaccount_pages
WARNING: kernel stack regs at (ptrval) in syzkaller has bad 'bp' value (ptrval) C 3 517d 518d 440d f044a84e crypto: don't optimize keccakf()
KASAN: slab-out-of-bounds Write in tls_push_record 2 456d 470d 440d a447da7d tls: fix use-after-free in tls_push_record
WARNING: suspicious RCU usage in rt6_remove_exception_rt syz 1761 516d 517d 440d 091311de net/ipv6: fix LOCKDEP issue in rt6_remove_exception_rt()
INFO: task hung in blk_queue_enter C 1595 440d 513d 440d cd4a4ae4 block: don't use blocking queue entered for recursive bio submits
KASAN: use-after-free Read in skb_dequeue C 4 459d 459d 440d 945d015e net/packet: fix use-after-free
KASAN: slab-out-of-bounds Write in sha1_final C 201 452d 472d 440d 3619dec5 dh key: fix rounding up KDF output length
KASAN: use-after-free Read in corrupted C 2 495d 498d 440d 543b8f86 fuse: don't keep dead fuse_conn at fuse_fill_super().
WARNING in ion_buffer_destroy C 7901 470d 621d 440d 45ad559a staging: android: ion: Switch to pr_warn_once in ion_buffer_destroy
KASAN: slab-out-of-bounds Write in tgr160_final C 55 453d 472d 440d 3619dec5 dh key: fix rounding up KDF output length
KASAN: use-after-free Read in crypto_morus640_decrypt_chunk C 3 466d 466d 440d a81ae809 crypto: morus640 - Fix out-of-bounds access
WARNING: ODEBUG bug in del_timer (2) C 6 493d 494d 440d be7f3e59 net/smc: init conn.tx_work & conn.send_lock sooner
INFO: task hung in jbd2_journal_stop 1 536d 535d 440d ebec3f8f n_tty: Access echo_* variables carefully.
INFO: rcu detected stall in n_tty_receive_char_special C 3 512d 535d 440d 3d63b7e4 n_tty: Fix stall at n_tty_receive_char_special().
net-next boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 8 472d 484d 440d bf956be5 umh: fix race condition
KMSAN: uninit-value in ip_vs_lblc_check_expire C 1431 440d 517d 440d 8b2ebb6c ipvs: initialize tbl->entries in ip_vs_lblc_init_svc()
KASAN: null-ptr-deref Read in refcount_sub_and_test C 4 520d 522d 440d 263243d6 net/ipv6: Fix ip6_convert_metrics() bug
INFO: rcu detected stall in __ipv6_dev_get_saddr 1 481d 481d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
WARNING: suspicious RCU usage in rt6_check_expired 4 517d 518d 440d c3c14da0 net/ipv6: add rcu locking to ip6_negative_advice
INFO: rcu detected stall in blkdev_ioctl C 249 471d 646d 440d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
INFO: rcu detected stall in __save_stack_trace 3 441d 574d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: task hung in commit_echoes 1 449d 445d 440d ebec3f8f n_tty: Access echo_* variables carefully.
WARNING: kmalloc bug in memdup_user (3) C 137 494d 494d 440d 683d2ac3 bpf: fix sock hashmap kmalloc warning
KASAN: slab-out-of-bounds Write in sha512_finup C 25 453d 470d 440d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in d_walk C 25680 466d 528d 440d 4fb48871 restore cond_resched() in shrink_dcache_parent()
KASAN: use-after-free Read in pipe_wait 2 469d 470d 440d 66e58e0e bpfilter: fix race in pipe access
INFO: rcu detected stall in save_stack_trace C 1 491d 489d 440d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: rcu detected stall in __process_echoes C 326 448d 544d 440d ebec3f8f n_tty: Access echo_* variables carefully.
INFO: task hung in blk_freeze_queue C 188 442d 593d 440d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
upstream boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 5 470d 471d 440d bf956be5 umh: fix race condition
possible deadlock in bpf_tcp_close C 152 482d 482d 440d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
WARNING in arch_uprobe_analyze_insn C 2 497d 496d 440d 90718e32 uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn()
KASAN: use-after-free Read in rds_cong_queue_updates C 18168 446d 578d 440d f1693c63 rds: avoid unenecessary cong_update in loop transport c809195f rds: clean up loopback rds_connections on netns deletion
KASAN: use-after-free Read in iput C 2 523d 523d 442d 0c92c7a3 tracing: Fix bad use of igrab in trace_uprobe.c
INFO: task hung in ucma_destroy_id C 46 522d 559d 445d ef95a90a RDMA/ucma: ucma_context reference leak in error path
BUG: corrupted list in tipc_nametbl_unsubscribe C 40 503d 562d 445d c3317f4d tipc: fix unbalanced reference counter
general protection fault in kernel_sock_shutdown C 3329 519d 576d 445d 1255fcb2 net/smc: fix shutdown in state SMC_LISTEN
INFO: trying to register non-static key in tun_do_read C 28 497d 503d 461d 7063efd3 tuntap: fix use after free during release
KASAN: use-after-free Read in iptunnel_handle_offloads C 133 486d 532d 461d 9aad13b0 packet: fix reserve calculation
WARNING: suspicious RCU usage in rds_loop_conn_alloc C 34303 580d 587d 467d d4014d8c rds: do not call ->conn_alloc with GFP_KERNEL
BUG: spinlock bad magic in tun_do_read syz 1 503d 503d 472d b196d88a tun: fix use after free for ptr_ring
BUG: soft lockup in _decode_session6 C 1 499d 499d 472d d9f92772 xfrm6: avoid potential infinite loop in _decode_session6()
KASAN: use-after-free Read in __sk_free 1 493d 493d 472d 9709020c sock_diag: fix use-after-free read in __sk_free
KASAN: stack-out-of-bounds Write in compat_copy_entries syz 10 478d 516d 472d 94c752f9 netfilter: ebtables: handle string from userspace with care
kernel BUG at include/linux/mm.h:LINE! syz 68 473d 510d 472d a466ef76 x86/kexec: Avoid double free_page() upon do_kexec_load() failure
KASAN: use-after-free Read in remove_wait_queue (2) C 4 561d 571d 472d af8d3c7c ppp: remove the PPPIOCDETACH ioctl
KASAN: use-after-free Read in __dev_queue_xmit (2) C 2 490d 490d 472d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KASAN: use-after-free Read in radix_tree_next_chunk C 2749 489d 540d 472d 79f546a6 fs: don't scan the inode cache before SB_BORN is set
kernel BUG at net/ipv4/tcp_output.c:LINE! (2) syz 23 504d 609d 472d 7f582b24 tcp: purge write queue in tcp_connect_init()
kernel BUG at lib/string.c:LINE! (4) C 2 494d 494d 472d 52f96757 ipvs: fix buffer overflow with sync daemon and service
KASAN: use-after-free Read in timer_is_static_object 1 494d 493d 472d 2677d206 dccp: don't free ccid2_hc_tx_sock struct in dccp_disconnect()
general protection fault in kernfs_kill_sb (2) C 22 486d 498d 472d 82382ace kernfs: deal with kernfs_fill_super() failures
WARNING in __mutex_unlock_slowpath C 2 509d 511d 472d 7a4deea1 idr: fix invalid ptr dereference on item delete
KASAN: use-after-free Read in sock_recv_errqueue 1 496d 496d 472d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KASAN: slab-out-of-bounds Read in nla_strlcpy C 34 476d 489d 472d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
KASAN: use-after-free Read in copyout C 11 490d 546d 472d b84bbaf7 packet: in packet_snd start writing at link layer allocation
general protection fault in shmem_unused_huge_count 8 494d 497d 472d 79f546a6 fs: don't scan the inode cache before SB_BORN is set
KMSAN: uninit-value in ebt_stp_mt_check C 211 473d 518d 472d a4995684 netfilter: bridge: stp fix reference to uninitialized data
BUG: unable to handle kernel paging request in nla_strlcpy 1 481d 481d 472d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
general protection fault in __radix_tree_delete C 38 485d 511d 472d 7a4deea1 idr: fix invalid ptr dereference on item delete
WARNING: ODEBUG bug in hfsplus_fill_super C 1 541d 540d 472d 66072c29 hfsplus: stop workqueue when fill_super() failed
KASAN: use-after-free Read in skb_copy_datagram_iter C 7 508d 546d 472d b84bbaf7 packet: in packet_snd start writing at link layer allocation
BUG: unable to handle kernel paging request in smc_ib_remember_port_attr C 112 490d 546d 472d d49baa7e net/smc: check for missing nlattrs in SMC_PNETID messages
WARNING in kcm_exit_net (3) syz 5 480d 480d 472d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
KASAN: use-after-free Read in nla_strlcpy C 59 476d 489d 472d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
general protection fault in mr_mfc_find_parent 2 485d 490d 472d 66fb3325 ipmr: properly check rhltable_init() return value
WARNING in dev_vprintk_emit C 77 486d 613d 472d 81459649 cfg80211: further limit wiphy names to 64 bytes
KASAN: slab-out-of-bounds Read in __ext4_check_dir_entry C 18 539d 540d 482d e40ff213 ext4: force revalidation of directory pointer after seekdir(2)
general protection fault in gfn_to_rmap syz 7 582d 691d 493d b7e31be3 KVM: x86: fix vcpu initialization with userspace lapic
INFO: task hung in handle_userfault 3 508d 530d 494d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
general protection fault in wb_workfn 63 495d 521d 494d b8b78495 bdi: Fix oops in wb_workfn()
KMSAN: uninit-value in strcmp C 3 505d 507d 494d 94f6a80c tipc: eliminate KMSAN uninit-value in strcmp complaint
KMSAN: uninit-value in move_addr_to_user (2) C 44 495d 502d 494d 09c8b971 tipc: fix one byte leak in tipc_sk_set_orig_addr()
KASAN: slab-out-of-bounds Read in pfkey_add C 835 499d 646d 494d 4b66af2d af_key: Always verify length of provided sadb_key
INFO: task hung in wb_shutdown (2) 5064 506d 539d 494d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
WARNING in add_uevent_var C 5 539d 539d 494d a7cfebcb cfg80211: limit wiphy names to 128 bytes
INFO: task hung in sock_sendmsg 1 531d 531d 494d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
KASAN: use-after-free Read in tls_sk_proto_close (2) C 297 499d 506d 494d 98f0a395 tls: fix use after free in tls_sk_proto_close
KASAN: use-after-free Read in debugfs_remove (2) 1 520d 518d 494d f53823c1 bdi: Fix use after free bug in debugfs_remove()
INFO: task hung in __do_page_fault 1 525d 525d 494d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
KASAN: use-after-free Read in perf_trace_rpc_stats_latency 1 511d 510d 494d 98eb6cf2 sunrpc: Fix latency trace point crashes
INFO: task hung in do_set_master 1 534d 534d 494d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
KASAN: use-after-free Read in sctp_do_sm 2 502d 502d 494d 6910e25d sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg
WARNING in xfrm6_tunnel_net_exit syz 14002 496d 627d 494d b48c05ab xfrm: Fix warning in xfrm6_tunnel_net_exit.
BUG: bad usercopy in __check_object_size 1 504d 504d 494d 2c5d5b13 llc: better deal with too small mtu
INFO: task hung in do_vfs_ioctl 2 509d 526d 494d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
WARNING in __snd_pcm_lib_xfer syz 6 507d 509d 494d f13876e2 ALSA: pcm: Check PCM state at xfern compat ioctl
BUG: MAX_LOCK_DEPTH too low! 1 509d 509d 494d af50e4ba nsh: fix infinite loop
INFO: task hung in get_timespec64 1 529d 529d 494d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
KMSAN: uninit-value in __sctp_v6_cmp_addr C 1109 495d 495d 494d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
KMSAN: uninit-value in put_cmsg C 2 508d 508d 495d eb80ca47 rds: do not leak kernel memory to user land
general protection fault in smc_set_keepalive C 6 511d 516d 495d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
WARNING in tracepoint_probe_unregister (2) 120 503d 559d 495d d66a270b tracepoint: Do not warn on ENOMEM
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt C 9 495d 500d 495d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
general protection fault in smc_getname C 44 507d 571d 495d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
WARNING: kobject bug in br_add_if 41 503d 529d 495d e8238fc2 bridge: check iface upper dev when setting master via ioctl 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in rt6_multipath_hash C 3 495d 513d 495d cea67a2d ipv6: fix uninit-value in ip6_multipath_l3_keys()
general protection fault in smc_getsockopt C 577 507d 567d 495d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
kernel BUG at kernel/softirq.c:LINE! 1 508d 508d 495d a8d7aa17 dccp: fix tasklet usage
WARNING in tcp_sacktag_write_queue C 8 511d 583d 495d bf2acc94 tcp: fix TCP_REPAIR_QUEUE bound checking
WARNING in tracepoint_probe_register_prio (2) C 849 495d 559d 495d d66a270b tracepoint: Do not warn on ENOMEM
WARNING in tcp_mark_head_lost C 18 504d 586d 495d 16ae6aa1 net-backports: tcp: ignore Fast Open on repair mode
KASAN: slab-out-of-bounds Read in __sctp_v6_cmp_addr C 3202 506d 518d 495d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
general protection fault in smc_setsockopt C 504 507d 571d 495d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
WARNING: ODEBUG bug in del_timer C 200 495d 511d 495d 784813ae net/smc: restrict non-blocking connect finish
WARNING: kmalloc bug in memdup_user (2) 1 545d 545d 497d 5f3e3b85 RDMA/ucma: Correct option size check using optlen
WARNING: suspicious RCU usage in tipc_bearer_find C 21 590d 590d 497d ed4ffdfe tipc: Fix missing RTNL lock protection during setting link properties
KASAN: slab-out-of-bounds Read in clusterip_tg_check C 22 596d 602d 497d 1a38956c netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check()
general protection fault in account_system_index_time C 2 544d 544d 497d ae474573 net: Fix untag for vlan packets without ethernet header
BUG: unable to handle kernel paging request in memset_erms (2) C 11 596d 611d 497d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
INFO: trying to register non-static key in del_timer_sync C 89 576d 602d 497d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
general protection fault in rdma_addr_size C 2 555d 548d 497d e8980d67 RDMA/ucma: Ensure that CM_ID exists prior to access it
BUG: unable to handle kernel paging request in cgroup_mt_destroy_v1 C 3 599d 599d 498d ba7cd5d9 netfilter: xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
KASAN: null-ptr-deref Write in linear_transfer C 116 543d 626d 498d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
BUG: workqueue lockup (2) C 406 500d 658d 498d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
KASAN: use-after-free Write in xt_rateest_put C 7 600d 601d 498d 7dc68e98 netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert
KASAN: use-after-free Read in __dev_queue_xmit C 10 509d 627d 502d d0c081b4 flow_dissector: properly cap thoff field
KASAN: use-after-free Read in work_is_static_object 3 607d 623d 502d 2cc683e8 kcm: lock lower socket in kcm_attach
KASAN: use-after-free Read in ip6_xmit C 5174 549d 627d 502d c113187d tls: Use correct sk->sk_prot for IPV6
KASAN: out-of-bounds Read in ip6_xmit 2 561d 602d 502d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
WARNING: bad unlock balance in xfs_iunlock C 1 538d 538d 502d 8241f7f9 xfs: don't iunlock the quota ip when quota block
KASAN: stack-out-of-bounds Write in ip6_tnl_locate 4 529d 530d 502d db7a65e3 ip6_tunnel: better validate user provided tunnel names
WARNING: refcount bug in should_fail C 3 541d 572d 502d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Read in shm_get_unmapped_area 19 598d 689d 502d 3f05317d ipc/shm: fix use-after-free of shm file via remap_file_pages()
KMSAN: uninit-value in ip6table_mangle_hook C 601 502d 534d 502d b855ff82 dccp: initialize ireq->ir_mark
KASAN: use-after-free Read in binder_release_work C 6 516d 537d 502d 7aa135fc ANDROID: binder: prevent transactions into own process.
BUG: corrupted list in team_nl_cmd_options_set C 2 526d 529d 502d 4fb0534f team: avoid adding twice the same option to the event list
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (3) C 234 580d 583d 502d 26736a08 tipc: don't call sock_release() in atomic context
KMSAN: uninit-value in inet6_rtm_delroute C 9 522d 533d 502d b1993a2d net: fix rtnh_ok()
possible deadlock in rtnl_lock (5) C 1009 516d 545d 502d 5c64576a ipvs: fix rtnl_lock lockups caused by start_sync_thread
KMSAN: uninit-value in neigh_dump_info C 6 515d 529d 502d 7dd07c14 net: validate attribute sizes in neigh_dump_table()
WARNING in kmem_cache_free 1 535d 534d 502d eea0d3ea crypto: drbg - set freed buffers to NULL
possible deadlock in perf_event_detach_bpf_prog 1 543d 542d 502d 3a38bb98 bpf/tracing: fix a deadlock in perf_event_detach_bpf_prog
INFO: rcu detected stall in bitmap_parselist 8 511d 539d 502d 8351760f lib: fix stall in __bitmap_parselist()
WARNING: kobject bug in gfs2_sys_fs_add C 49 514d 540d 502d 3e14c6ab kobject: don't use WARN for registration failures
general protection fault in loopback_pos_update C 4 610d 608d 502d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KASAN: use-after-free Read in llc_conn_ac_send_sabme_cmd_p_set_x 1 525d 525d 502d f7e43672 llc: hold llc_sap before release_sock()
general protection fault in tipc_conn_close C 3 580d 581d 502d 96c252bf tipc: fix bug on error path in tipc_topsrv_kern_subscr()
WARNING in format_decode C 1 540d 540d 502d 9ad553ab fs/reiserfs/journal.c: add missing resierfs_warning() arg
WARNING in kill_block_super C 51 524d 542d 502d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
BUG: corrupted list in __dentry_kill C 35 520d 540d 502d 4a3877c4 rpc_pipefs: fix double-dput()
general protection fault in __tipc_nl_net_set syz 4 524d 525d 502d c6404122 tipc: fix possible crash in __tipc_nl_net_set()
WARNING in ext4_superblock_csum_set C 1 539d 538d 502d a45403b5 ext4: always initialize the crc32c checksum driver
WARNING in __local_bh_enable_ip (2) 23 547d 557d 502d 53d0e83f rds: tcp: must use spin_lock_irq* and not spin_lock_bh with rds_tcp_conn_lock
KASAN: stack-out-of-bounds Write in __ip_tunnel_create C 29 529d 536d 502d 9cb726a2 ip_tunnel: better validate user provided tunnel names
KASAN: use-after-free Read in tipc_sub_unsubscribe (2) C 5 522d 529d 502d c3317f4d tipc: fix unbalanced reference counter
kernel BUG at fs/ext4/extents.c:LINE! C 1 540d 539d 502d 349fa7d6 ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS
WARNING in __might_sleep 6 515d 518d 502d 6c1e851c random: fix possible sleeping allocation from irq context
KASAN: use-after-free Read in mac80211_hwsim_del_radio 11 541d 571d 502d 8cfd36a0 mac80211_hwsim: fix use-after-free bug in hwsim_exit_net
KASAN: use-after-free Read in tipc_nametbl_stop C 12 521d 525d 502d be47e41d tipc: fix use-after-free in tipc_nametbl_stop
kernel BUG at drivers/tty/tty_ldisc.c:LINE! 6 524d 540d 502d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore(). bcdd0ca8 tty: Use __GFP_NOFAIL for tty_ldisc_get()
KMSAN: uninit-value in inet_csk_bind_conflict C 446 502d 533d 502d 3099a529 soreuseport: initialise timewait reuseport field
INFO: task hung in __blkdev_get C 662 527d 653d 502d 1e047eaa block/loop: fix deadlock after loop_set_status
KMSAN: uninit-value in fib6_new_table C 3 519d 519d 502d aa8f8778 ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
general protection fault in rds_sendmsg C 2 577d 577d 502d 79a5b972 rds: rds_msg_zcopy should return error of null rm->data.op_mmp_znotifier
WARNING: refcount bug in nfs_alloc_client 2 539d 540d 502d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KMSAN: uninit-value in pppol2tp_connect C 13 503d 518d 502d eb1c28c0 l2tp: check sockaddr length in pppol2tp_connect()
KMSAN: uninit-value in tcp_parse_options C 38 504d 530d 502d 72123032 tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
KMSAN: uninit-value in tipc_node_get_mtu C 139 503d 533d 502d 335b929b tipc: fix missing initializer in tipc_sendmsg()
KMSAN: uninit-value in __skb_try_recv_from_queue C 108 503d 533d 502d b13dda9f net: initialize skb->peeked when cloning
KMSAN: uninit-value in iptable_mangle_hook C 1134 502d 533d 502d b855ff82 dccp: initialize ireq->ir_mark
kernel BUG at drivers/vhost/vhost.c:LINE! (2) C 139 504d 534d 502d d14d2b78 vhost: fix vhost_vq_access_ok() log check
KMSAN: uninit-value in strlcpy C 2 505d 505d 502d 537b361f vti6: better validate user provided tunnel names
INFO: rcu detected stall in io_playback_transfer 9 530d 535d 502d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
KASAN: use-after-free Read in sctp_association_free (2) C 2 563d 562d 502d 0aee4c25 sctp: Fix double free in sctp_sendmsg_to_asoc
KMSAN: uninit-value in move_addr_to_user C 74 503d 533d 502d 6780db24 sctp: do not leak kernel memory to user space
WARNING in tty_set_ldisc syz 177 511d 687d 502d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore().
KMSAN: uninit-value in inet_getpeer C 54 502d 532d 502d b6a37e5e inetpeer: fix uninit-value in inet_getpeer
KASAN: use-after-free Read in pppol2tp_connect (3) C 22 529d 547d 502d 6b9f3423 l2tp: fix races in tunnel creation
KMSAN: uninit-value in packet_set_ring C 6 509d 526d 502d 5171b37d net: af_packet: fix race in PACKET_{R|T}X_RING
WARNING in strp_done C 2336 537d 585d 502d dff8baa2 kcm: Call strp_stop before strp_done in kcm_attach
WARNING: inconsistent lock state C 22 514d 518d 502d 6c1e851c random: fix possible sleeping allocation from irq context
KASAN: null-ptr-deref Read in xattr_getsecurity 68 519d 531d 502d 1f578172 commoncap: Handle memory allocation failure.
KASAN: stack-out-of-bounds Write in ipip6_tunnel_locate C 33 528d 536d 502d b95211e0 ipv6: sit: better validate user provided tunnel names
KMSAN: uninit-value in alg_bind C 1950 502d 533d 502d a466856e crypto: af_alg - fix possible uninit-value in alg_bind()
BUG: corrupted list in sctp_association_free 1 563d 559d 502d d98985dd sctp: fix error return code in sctp_sendmsg_new_asoc()
KASAN: stack-out-of-bounds Read in __free_filter C 41 520d 530d 502d 0b3dec05 tracing: Enforce passing in filter=NULL to create_filter()
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected C 2126 503d 518d 502d 6c1e851c random: fix possible sleeping allocation from irq context
INFO: rcu detected stall in __snd_pcm_lib_xfer (2) C 1064 530d 535d 502d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
KASAN: use-after-free Read in llc_conn_tmr_common_cb 1 524d 521d 502d b905ef9a llc: delete timers synchronously in llc_sk_free()
general protection fault in kernfs_kill_sb C 29 503d 539d 502d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
general protection fault in ucma_set_ib_path (2) C 6 530d 537d 502d 8435168d RDMA/ucma: Don't allow setting RDMA_OPTION_IB_PATH without an RDMA device
KASAN: slab-out-of-bounds Write in perf_callchain_user syz 2 529d 529d 502d 5af44ca5 perf: Fix sample_max_stack maximum check
KMSAN: uninit-value in sctp_do_bind C 31 503d 533d 502d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
KASAN: use-after-free Read in alloc_pid C 7 530d 540d 502d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KMSAN: uninit-value in sctp_sendmsg syz 27 503d 533d 502d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
BUG: unable to handle kernel paging request in snd_pcm_format_set_silence syz 11 503d 529d 502d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KMSAN: uninit-value in netif_skb_features C 119 502d 529d 502d 7ce23672 vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
WARNING in snd_pcm_hw_params C 56 530d 535d 502d e1a3a981 ALSA: pcm: Remove WARN_ON() at snd_pcm_hw_params() error
WARNING: lock held when returning to user space! C 40 520d 534d 502d bdac616d loop: fix LOOP_GET_STATUS lock imbalance
KMSAN: uninit-value in pppoe_connect 47 502d 518d 502d a49e2f5d pppoe: check sockaddr length in pppoe_connect()
WARNING: refcount bug in free_nsproxy 4 542d 566d 502d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
general protection fault in __mem_cgroup_free C 22 529d 540d 502d 4eaf431f memcg: fix per_node_info cleanup
KMSAN: uninit-value in netlink_sendmsg C 2493 502d 533d 502d 6091f09c netlink: fix uninit-value in netlink_sendmsg
WARNING: suspicious RCU usage in crng_reseed 39 504d 518d 502d 6c1e851c random: fix possible sleeping allocation from irq context
inconsistent lock state in fs_reclaim_acquire C 36235 503d 513d 502d 6c1e851c random: fix possible sleeping allocation from irq context
KMSAN: uninit-value in fib_create_info C 19 527d 533d 502d b1993a2d net: fix rtnh_ok()
kernel panic: n_tty: init_tty C 141 503d 687d 502d 903f9db1 tty: Don't call panic() at tty_ldisc_init()
KASAN: use-after-free Read in snd_pcm_timer_resolution C 3 542d 542d 502d a820ccbe ALSA: pcm: Fix UAF at PCM release via PCM timer access
general protection fault in tipc_sk_fill_sock_diag C 180 528d 546d 502d 4b2e6877 tipc: Fix namespace violation in tipc_sk_fill_sock_diag e41f0548 tipc: use the right skb in tipc_sk_fill_sock_diag()
KMSAN: uninit-value in ip_route_output_key_hash_rcu 179 502d 533d 502d d0ea2b12 ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
KASAN: stack-out-of-bounds Write in ip6gre_tunnel_locate C 923 528d 536d 502d 5f42df01 ip6_gre: better validate user provided tunnel names
general protection fault in snd_rawmidi_ioctl_compat 1 529d 521d 502d 8a56ef4f ALSA: rawmidi: Fix missing input substream checks in compat ioctls
KMSAN: uninit-value in memcmp C 30 504d 533d 502d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
WARNING: kobject bug in netdev_queue_update_kobjects C 27 504d 566d 502d 3e14c6ab kobject: don't use WARN for registration failures
KASAN: use-after-free Write in dst_release C 832 528d 538d 502d bfacfb45 pptp: remove a buggy dst release in pptp_connect()
general protection fault in __list_del_entry_valid (3) C 40 540d 540d 502d b714295a tipc: Fix missing list initializations in struct tipc_subscription
WARNING in __debug_object_init C 192 536d 546d 502d bd031430 alarmtimer: Init nanosleep alarm timer on stack
KASAN: null-ptr-deref Read in refcount_inc_not_zero C 2352 516d 518d 502d 3a04ce71 llc: fix NULL pointer deref for SOCK_ZAPPED
INFO: task hung in stop_sync_thread (2) C 9 526d 543d 502d 5c64576a ipvs: fix rtnl_lock lockups caused by start_sync_thread
WARNING: refcount bug in put_pid_ns syz 6 540d 540d 502d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
WARNING: kobject bug in device_add C 563 503d 542d 502d 3e14c6ab kobject: don't use WARN for registration failures
possible deadlock in smc_close_non_accepted C 4 570d 570d 506d 3d502067 net/smc: simplify wait when closing listen socket
BUG: unable to handle kernel paging request in compat_copy_entries syz 5 568d 567d 516d b7181216 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
possible deadlock in perf_trace_destroy (2) C 2006 599d 685d 516d 82d94856 perf/core: Fix lock inversion between perf,trace,cpuhp
possible deadlock in ftrace_profile_set_filter (2) C 1007 599d 658d 516d 43fa87f7 perf/core: Fix another perf,trace,cpuhp lock inversion
KASAN: slab-out-of-bounds Write in tcp_v6_syn_recv_sock C 1063 611d 628d 516d d91c3e17 net/tls: Only attach to sockets in ESTABLISHED state
KASAN: use-after-free Read in perf_trace_lock_acquire (2) C 188 598d 670d 516d 4cd87951 vhost_net: stop device during reset owner
possible deadlock in __neigh_create 1 540d 540d 530d 1bfa26ff ipv6: fix possible deadlock in rt6_age_examine_exception()
WARNING in binder_send_failed_reply C 206 577d 660d 532d e46a3b3b ANDROID: binder: remove WARN() for redundant txn error
WARNING in skb_warn_bad_offload C 6527 567d 690d 532d 8d74e9f8 net: avoid skb_warn_bad_offload on IS_ERR
KASAN: use-after-free Read in disk_unblock_events C 65 586d 692d 532d 89736653 genhd: Fix use after free in __blkdev_get()
kernel BUG at drivers/vhost/vhost.c:LINE! C 152 534d 553d 534d d65026c6 vhost: validate log when IOTLB is enabled
general protection fault in rdma_notify C 3 551d 548d 534d c8d3bcbf RDMA/ucma: Check that device exists prior to accessing it
BUG: corrupted list in remove_wait_queue C 5 547d 550d 534d dc6455a7 vhost: correctly remove wait queue during poll failure
general protection fault in timerqueue_add C 2 544d 545d 534d c769accd vlan: Fix vlan insertion for packets without ethernet header
BUG: unable to handle kernel paging request in __memmove 1 545d 545d 534d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in native_write_cr4 C 132300 537d 642d 534d 8eb3f87d KVM: nVMX: fix guest CR4 loading when emulating L2 to L1 exit
BUG: unable to handle kernel (2) syz 1 544d 544d 534d c769accd vlan: Fix vlan insertion for packets without ethernet header
kernel BUG at ./include/linux/skbuff.h:LINE! (2) C 5 571d 549d 534d 10b8a3de ipv6: the entire IPv6 header chain must fit the first fragment
WARNING in xt_cluster_mt C 4 572d 572d 534d aebfa52a netfilter: drop template ct when conntrack is skipped.
possible deadlock in handle_rx C 4 546d 546d 534d aaa3149b vhost_net: add missing lock nesting notation
KASAN: use-after-free Read in worker_thread (2) syz 6 674d 684d 534d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
general protection fault in try_to_wake_up syz 1 546d 542d 534d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in qlist_move_cache 1 545d 545d 534d c769accd vlan: Fix vlan insertion for packets without ethernet header
possible deadlock in __ipv6_dev_mc_dec 1 549d 549d 534d 1bfa26ff ipv6: fix possible deadlock in rt6_age_examine_exception()
BUG: unable to handle kernel paging request in netdev_queue_update_kobjects syz 1 545d 545d 534d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in rdma_init_qp_attr (2) C 753 542d 548d 534d 4b658d1b RDMA/ucma: Check that device is connected prior to access it
kernel BUG at lib/string.c:LINE! (3) C 5 543d 544d 534d 84652aef RDMA/ucma: Introduce safer rdma_addr_size() variants
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock C 4 566d 566d 548d 17cfe79a l2tp: do not accept arbitrary sockets
kernel BUG at lib/string.c:LINE! (2) syz 2 559d 559d 548d 0c81ffc6 RDMA/ucma: Don't allow join attempts for unsupported AF family
INFO: rcu detected stall in xfrm_confirm_neigh 7 564d 587d 548d 013cb81e xfrm: Fix infinite loop in xfrm_get_dst_nexthop with transport mode.
WARNING in ata_qc_issue C 35 677d 696d 548d 9173e5e8 libata: remove WARN() for DMA or PIO command without data
WARNING: kmalloc bug in xfrm_add_sa C 109 548d 588d 548d d97ca5d7 xfrm_user: uncoditionally validate esn replay attribute struct
KASAN: null-ptr-deref Write in rdma_resolve_addr C 66 551d 562d 548d 2975d5de RDMA/ucma: Check AF family prior resolving address
general protection fault in ucma_connect C 2 556d 555d 548d e8980d67 RDMA/ucma: Ensure that CM_ID exists prior to access it
KASAN: stack-out-of-bounds Read in xfrm_state_find (4) C 102 548d 599d 548d 19d7df69 xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems
general protection fault in rdma_join_multicast C 258 551d 565d 548d 7688f2c3 RDMA/ucma: Fix access to non-initialized CM_ID object
BUG: unable to handle kernel paging request in ebt_among_mt_check (2) C 946 548d 564d 548d c8d70a70 netfilter: bridge: ebt_among: add more missing match size checks
KASAN: use-after-free Read in pfifo_fast_enqueue C 20 550d 614d 548d cce6294c net: sched: fix uses after free
WARNING in kmalloc_slab (4) 1 560d 559d 548d d97ca5d7 xfrm_user: uncoditionally validate esn replay attribute struct
WARNING in __xlate_proc_name C 11 567d 603d 548d b1d0a5d0 netfilter: x_tables: add and use xt_check_proc_name
general protection fault in rdma_init_qp_attr C 2096 548d 564d 548d a5880b84 RDMA/ucma: Check that user doesn't overflow QP state
KASAN: slab-out-of-bounds Read in ip6_xmit (2) C 259 551d 565d 548d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
WARNING in __proc_create C 12 569d 562d 548d b1d0a5d0 netfilter: x_tables: add and use xt_check_proc_name
general protection fault in lowpan_device_event C 79 549d 566d 548d ca0edb13 ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event()
BUG: unable to handle kernel paging request in ata_bmdma_qc_prep C 13 684d 692d 548d 058f58e2 libata: fix length validation of ATAPI-relayed SCSI commands
kernel panic: Out of memory and no killable processes... (2) C 1 603d 602d 548d 0537250f netfilter: x_tables: make allocation less aggressive
possible deadlock in get_user_pages_unlocked C 5 575d 598d 548d 96312e61 mm/gup.c: teach get_user_pages_unlocked to handle FOLL_NOWAIT
general protection fault in dccp_write_xmit C 5 566d 602d 548d 67f93df7 dccp: check sk for closed state in dccp_sendmsg()
KASAN: use-after-free Read in pppol2tp_connect (2) C 10 549d 564d 548d 17cfe79a l2tp: do not accept arbitrary sockets
KASAN: use-after-free Read in snd_pcm_oss_get_formats C 3 562d 562d 548d 01c0b426 ALSA: pcm: Fix UAF in snd_pcm_oss_get_formats()
WARNING: kmalloc bug in memdup_user C 441 549d 565d 548d 6a21dfc0 RDMA/ucma: Limit possible option size
WARNING in ata_bmdma_qc_issue C 1 772d 692d 548d 2c1ec6fd libata: don't try to pass through NCQ commands to non-NCQ devices
KASAN: use-after-free Read in ucma_close C 176 551d 565d 548d ed65a4dc RDMA/ucma: Fix use-after-free access in ucma_close
KASAN: use-after-free Read in get_work_pool syz 8 674d 696d 548d 2cc683e8 kcm: lock lower socket in kcm_attach
possible deadlock in shmem_file_llseek C 4432 557d 621d 548d cb57469c staging: android: ashmem: Fix lockdep issue during llseek
possible deadlock in __might_fault C 8978 557d 573d 548d 740a5759 staging: android: ashmem: Fix possible deadlock in ashmem_ioctl
WARNING in kvm_arch_vcpu_ioctl_run (2) C 61018 602d 690d 559d c37c2873 KVM: VMX: Fix rflags cache during vCPU reset
kernel BUG at arch/x86/kvm/x86.c:LINE! syz 20 663d 696d 560d 61cb57c9 KVM: x86: Exit to user-mode on #UD intercept when emulator requires
WARNING in tracepoint_probe_unregister C 115 560d 687d 560d a6da0024 blktrace: fix unlocked registration of tracepoints
KASAN: use-after-free Read in strp_data_ready C 204 606d 698d 560d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
WARNING in tracepoint_probe_register_prio C 830 560d 696d 560d a6da0024 blktrace: fix unlocked registration of tracepoints
WARNING in refcount_sub_and_test C 75150 597d 698d 560d d04adf1b sctp: reset owner sk for data chunks on out queues when migrating a sock
KASAN: use-after-free Read in inet_shutdown C 22 568d 614d 565d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
general protection fault in hrtimer_active (2) C 10612 568d 573d 565d b7e31be3 KVM: x86: fix vcpu initialization with userspace lapic
general protection fault in pppol2tp_connect C 1025 566d 615d 565d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
KASAN: use-after-free Write in nf_nat_ipv6_manip_pkt C 2 581d 581d 565d b078556a netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt
KASAN: slab-out-of-bounds Read in ip6_route_me_harder C 66 567d 574d 565d 7d98386d netfilter: use skb_to_full_sk in ip6_route_me_harder
WARNING in debug_print_object C 2 598d 598d 565d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
KASAN: use-after-free Read in pppol2tp_connect C 25 566d 615d 565d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
kernel BUG at arch/x86/kvm/mmu.c:LINE! C 695 573d 690d 565d b28676bb KVM: mmu: Fix overlap between public and private memslots
WARNING in __x86_set_memory_region C 716 573d 691d 565d 103c763c KVM/x86: remove WARN_ON() for when vm_munmap() fails
KASAN: slab-out-of-bounds Read in ip6_xmit C 156 567d 617d 565d c113187d tls: Use correct sk->sk_prot for IPV6
WARNING in compat_copy_entries C 434 566d 581d 565d b7181216 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
BUG: unable to handle kernel paging request in ebt_among_mt_check C 823 565d 581d 565d c4585a28 netfilter: bridge: ebt_among: add missing match size checks
general protection fault in smc_create C 2 574d 573d 565d a5dcb73b net/smc: fix NULL pointer dereference on sock_create_kern() error path
WARNING in handle_ept_misconfig C 238 574d 696d 565d 95e057e2 KVM: X86: Fix SMRAM accessing even if VM is shutdown
KASAN: use-after-free Read in ip6_route_me_harder C 44 567d 574d 565d 7d98386d netfilter: use skb_to_full_sk in ip6_route_me_harder
BUG: unable to handle kernel NULL pointer dereference in sha512_mb_mgr_get_comp_job_avx2 syz 32 605d 658d 573d eff84b37 crypto: sha512-mb - initialize pending lengths correctly
WARNING: proc registration bug in clusterip_tg_check C 779 576d 593d 573d b3e456fc netfilter: ipt_CLUSTERIP: fix a race condition of proc file creation
lost connection to test machine (4) C 1189 573d 587d 573d 9c2d63b8 bpf: fix mlock precharge on arraymaps
possible deadlock in do_ip_getsockopt (2) 206 576d 590d 573d 01ea306f netfilter: drop outermost socket lock in getsockopt()
WARNING in __queue_work C 1 583d 583d 573d cfc2c740 netfilter: IDLETIMER: be syzkaller friendly
divide error in nf_nat_l4proto_unique_tuple C 2 588d 587d 573d db57ccf0 netfilter: nat: cope with negative port range
kernel BUG at kernel/time/timer.c:LINE! C 18 576d 587d 573d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
WARNING: bad unlock balance in hashlimit_mt_common C 2059 576d 588d 573d de526f40 netfilter: xt_hashlimit: fix lock imbalance
WARNING: ODEBUG bug in led_tg_destroy C 4 579d 587d 573d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
WARNING: kmalloc bug in cpu_map_update_elem C 2677 573d 585d 573d 7fc17e90 bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
WARNING: kmalloc bug in relay_open_buf C 10 578d 593d 573d 88913bd8 kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
possible deadlock in rtnl_lock (4) C 73333 575d 592d 573d 01ea306f netfilter: drop outermost socket lock in getsockopt()
general protection fault in binder_poll C 159 577d 660d 573d f8898267 binder: check for binder_thread allocation failure in binder_poll()
WARNING in check_flush_dependency C 2205 576d 608d 573d ce162bfb mac80211_hwsim: don't use WQ_MEM_RECLAIM
possible deadlock in do_ip_setsockopt (3) 3731 575d 592d 573d 01ea306f netfilter: drop outermost socket lock in getsockopt()
KASAN: use-after-free Read in remove_wait_queue C 7 578d 587d 573d 5eeb2ca0 ANDROID: binder: synchronize_rcu() when using POLLFREE.
general protection fault in arpt_do_table C 3 578d 578d 573d 57ebd808 netfilter: add back stackpointer size checks
possible deadlock in do_ipv6_setsockopt (2) 3642 575d 591d 573d 01ea306f netfilter: drop outermost socket lock in getsockopt()
possible deadlock in xt_find_table_lock (2) 4 591d 589d 573d 01ea306f netfilter: drop outermost socket lock in getsockopt()
WARNING in kmalloc_slab (3) C 1901 574d 658d 573d 88913bd8 kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
general protection fault in ip6t_do_table C 8077 577d 603d 573d 57ebd808 netfilter: add back stackpointer size checks
WARNING: ODEBUG bug in __queue_work C 2 583d 579d 573d cfc2c740 netfilter: IDLETIMER: be syzkaller friendly
WARNING in kvmalloc_node C 513 580d 586d 573d 7fc17e90 bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
WARNING: kmalloc bug in bpf_prog_array_copy_info C 4424 573d 586d 573d 9c481b90 bpf: fix bpf_prog_array_copy_to_user warning from perf event prog query
general protection fault in SyS_bpf (2) C 1065 573d 587d 573d 952fad8e bpf: fix sock_map_alloc() error path
KASAN: use-after-free Read in rds_find_bound 1 636d 632d 585d ebeeb1ad rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
KASAN: use-after-free Read in rds_tcp_tune 12 609d 619d 585d ebeeb1ad rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
INFO: rcu detected stall in n_tty_ioctl 24 628d 641d 585d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
KASAN: use-after-free Read in __do_page_fault syz 679 681d 692d 585d cb0631fd x86/mm: fix use-after-free of vma during userfaultfd fault
INFO: rcu detected stall in memcpy 12 623d 627d 585d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
possible deadlock in lru_add_drain_all 1300 646d 696d 585d 9852a721 mm: drop hotplug lock from lru_add_drain_all()
INFO: rcu detected stall in tty_ioctl C 12 629d 641d 585d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
KASAN: slab-out-of-bounds Read in string C 129 596d 606d 585d da17c73b netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target}
possible deadlock in flush_work (2) 3 684d 687d 585d 528fd354 SUNRPC: Destroy transport from the system workqueue
KASAN: stack-out-of-bounds Read in csum_and_copy_from_iter_full 1 665d 661d 585d 8f659a03 net: ipv4: fix for a race condition in raw_sendmsg
KASAN: use-after-free Read in __schedule C 145 640d 641d 585d 8dbfb2bf KVM: x86: don't forget vcpu_put() in kvm_arch_vcpu_ioctl_set_sregs()
KASAN: use-after-free Read in sock_release 1 667d 663d 585d a5739435 fix kcm_clone()
KASAN: use-after-free Read in rds_tcp_dev_event 1 691d 684d 585d 681648e6 rds: tcp: correctly sequence cleanup on netns deletion.
WARNING in drm_modeset_lock_all 35 689d 696d 587d d18d1a5a drm: Require __GFP_NOFAIL for the legacy drm_modeset_lock_all
KASAN: use-after-free Read in __fput 23 656d 690d 587d a5739435 fix kcm_clone()
KASAN: stack-out-of-bounds Read in xfrm_selector_match 368 619d 626d 587d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
KASAN: stack-out-of-bounds Read in memcmp 1 628d 625d 587d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
KASAN: use-after-free Write in xt_rateest_tg_checkentry C 2 600d 601d 587d 7dc68e98 netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert
KASAN: double-free or invalid-free in relay_open C 106 593d 691d 587d a1be1f39 kernel/relay.c: revert "kernel/relay.c: fix potential memory leak"
WARNING in usercopy_warn C 171 593d 611d 587d 79a8a642 net: Whitelist the skbuff_head_cache "cb" field
WARNING: kmalloc bug in tun_device_event C 15 591d 593d 587d 6e6e41c3 ptr_ring: fail early if queue occupies more than KMALLOC_MAX_SIZE 0bf7800f ptr_ring: try vmalloc() when kmalloc() fails
WARNING: suspicious RCU usage in bpf_prog_array_copy_info C 17842 587d 593d 587d 0911287c bpf: fix bpf_prog_array_copy_to_user() issues
general protection fault in cgroup_mt_destroy_v1 C 91 590d 602d 587d ba7cd5d9 netfilter: xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
general protection fault in ___bpf_prog_run C 8 593d 600d 587d 65073a67 bpf: fix null pointer deref in bpf_prog_test_run_xdp
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (4) C 7264 593d 597d 587d 0911287c bpf: fix bpf_prog_array_copy_to_user() issues
WARNING in do_debug C 905 592d 692d 587d efdab992 KVM: x86: fix escape of guest dr6 to the host
possible deadlock in rtnl_lock (3) C 3633 592d 593d 592d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
possible deadlock in do_ip_setsockopt (2) 59 593d 595d 592d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
WARNING: bad unlock balance in ipmr_mfc_seq_stop C 286 599d 646d 593d 4adfa79f ip6mr: fix stale iterator
WARNING in reuseport_add_sock C 7 608d 618d 595d 4db428a7 soreuseport: fix mem leak in reuseport_add_sock()
WARNING in sysfs_warn_dup 11 600d 643d 595d 5d54f948 sysfs: turn WARN() into pr_warn()
WARNING in __check_heap_object C 5173 612d 684d 595d ab9ee8e3 sctp: Define usercopy region in SCTP proto slab cache
WARNING in __alloc_pages_slowpath C 9435 598d 626d 595d 0c75f103 staging: android: ion: Add __GFP_NOWARN for system contig heap
possible deadlock in do_ip_getsockopt 22 597d 602d 595d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
possible deadlock in xt_find_target 34 596d 603d 595d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
suspicious RCU usage at ./include/linux/inetdevice.h:LINE (2) C 4 598d 598d 595d e7aadb27 net: igmp: add a missing rcu locking section
lost connection to test machine (3) C 4251 595d 634d 595d 889c604f netfilter: x_tables: fix int overflow in xt_alloc_table_info()
WARNING in ion_ioctl C 8888 598d 626d 595d e4e179a8 staging: android: ion: Switch from WARN to pr_warn
WARNING in register_lock_class C 2 642d 638d 595d f5cb779b ANDROID: binder: remove waitqueue when thread exits.
possible deadlock in rtnl_lock (2) C 10369 595d 598d 595d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
KASAN: use-after-free Read in __lock_acquire (2) C 589 598d 673d 595d f5cb779b ANDROID: binder: remove waitqueue when thread exits.
KASAN: use-after-free Read in mon_bin_vma_fault 7 622d 633d 596d 46eb14a6 USB: fix usbmon BUG trigger
INFO: task hung in bpf_exit_net 1 656d 643d 596d b6c5734d sctp: fix the handling of ICMP Frag Needed for too small MTUs
KASAN: use-after-free Read in fib6_lookup_1 11 616d 618d 596d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in fib6_age 3 616d 618d 596d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in __list_add_valid (3) 16 599d 606d 596d 4cd87951 vhost_net: stop device during reset owner
INFO: trying to register non-static key in pfifo_fast_reset C 4 642d 645d 596d 1df94c3c net_sched: properly check for empty skb array on error path
KASAN: use-after-free Read in fib6_remove_prefsrc 4 616d 618d 596d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in tipc_group_size C 8 615d 622d 598d 60c25306 tipc: fix race between poll() and setsockopt()
suspicious RCU usage at net/ipv6/ip6_fib.c:LINE C 56 606d 628d 598d 4512c43e ipv6: remove null_entry before adding default route
general protection fault in trie_get_next_key C 3 605d 605d 598d 6dd1ec6c bpf: fix kernel page fault in lpm map trie_get_next_key
BUG: Bad page state (3) C 3 623d 630d 598d 46eb14a6 USB: fix usbmon BUG trigger
WARNING in task_participate_group_stop C 29 677d 692d 598d 42691579 kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal()
WARNING in usb_submit_urb C 2 693d 684d 598d 446f666d USB: usbfs: Filter flags passed in from user space
general protection fault in page_mapping C 46 622d 649d 598d 7d11f77f RDS: null pointer dereference in rds_atomic_free_op
BUG: unable to handle kernel NULL pointer dereference in page_mapping C 4 642d 644d 598d 7d11f77f RDS: null pointer dereference in rds_atomic_free_op
general protection fault in __netlink_ns_capable C 74 621d 628d 598d f428fe4a rtnetlink: give a user socket to get_target_net()
KASAN: double-free or invalid-free in skb_free_head C 13 637d 644d 598d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
KASAN: use-after-free Read in __bpf_prog_put 1 620d 620d 599d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in vhost_dev_cleanup C 4 600d 606d 599d 4cd87951 vhost_net: stop device during reset owner
inconsistent lock state in est_fetch_counters C 5829 599d 603d 599d 40ca54e3 net_sched: gen_estimator: fix lockdep splat
kernel BUG at drivers/android/binder_alloc.c:LINE! C 856 656d 660d 599d fb2c4452 ANDROID: binder: fix transaction leak.
general protection fault in nfs_idmap_legacy_upcall C 4 612d 611d 599d 49686cbb NFS: reject request for id_legacy key without auxdata
KASAN: slab-out-of-bounds Read in xfrm_hash_rebuild C 18 617d 684d 599d 862591bf xfrm: skip policies marked as dead while rehashing
WARNING: kernel stack regs has bad 'bp' value (2) C 16238 599d 663d 599d d8c7fe9f crypto: x86/twofish-3way - Fix %rbp usage
BUG: unable to handle kernel paging request in devpts_mntget C 21 612d 689d 599d c9cc8d01 devpts: fix error handling in devpts_mntget()
BUG: unable to handle kernel paging request in check_memory_region C 10 615d 618d 599d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in fib6_add (2) C 3143 621d 628d 599d 7bbfe00e ipv6: fix general protection fault in fib6_add()
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (2) 185 663d 661d 599d 7d2c3f54 crypto: af_alg - remove locking in async callback
KASAN: use-after-free Read in sctp_association_free C 20 675d 690d 599d ca3af4dd sctp: do not free asoc when it is already dead in sctp_sendmsg
kernel BUG at fs/userfaultfd.c:LINE! C 3 642d 639d 599d 0cbb4b4f userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
KASAN: use-after-free Read in __xfrm_state_lookup C 7 691d 690d 599d cb79a180 xfrm: defer daddr pointer assignment after spi parsing
KASAN: slab-out-of-bounds Read in strcmp C 150 655d 664d 599d ef28df55 selinux: ensure the context is NUL terminated in security_context_to_sid_core()
KASAN: stack-out-of-bounds Read in rds_sendmsg C 120 629d 653d 599d 14e138a8 RDS: Check cmsg_len before dereferencing CMSG_DATA
general protection fault in sidtab_search_core syz 1306 654d 661d 599d 4b14752e selinux: skip bounded transition processing if the policy isn't loaded
BUG: looking up invalid subclass: 8 C 5 685d 685d 599d 3510c7aa ALSA: seq: Avoid invalid lockdep class warning
KASAN: slab-out-of-bounds Read in sctp_send_reset_streams C 73 641d 653d 599d 2342b8d9 sctp: make sure stream nums can match optlen in sctp_setsockopt_reset_streams
KASAN: use-after-free Read in map_lookup_elem C 6 614d 618d 599d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
suspicious RCU usage at ./include/linux/inetdevice.h:LINE 28 682d 690d 599d 25dd169a fib: fib_dump_info can no longer use __in_dev_get_rtnl
general protection fault in tun_queue_purge C 4 605d 606d 599d 9fb582b6 Revert "net: ptr_ring: otherwise safe empty checks can overrun array bounds"
KASAN: use-after-free Read in __wake_up_common C 888 599d 608d 599d 4cd87951 vhost_net: stop device during reset owner
general protection fault in show_timer C 10 643d 662d 599d cef31d9a posix-timer: Properly check sigevent->sigev_notify
KASAN: slab-out-of-bounds Write in sha3_update (2) C 49 600d 639d 599d 9fa68f62 crypto: hash - prevent using keyed hashes without setting key
possible deadlock in rtnl_lock C 15711 599d 656d 599d 124da8f6 tuntap: fix possible deadlock when fail to register netdev
WARNING in xdp_rxq_info_unreg C 198 608d 608d 599d c13da21c tun: avoid calling xdp_rxq_info_unreg() twice
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (3) C 5087 600d 608d 599d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
general protection fault in copy_verifier_state C 2 632d 628d 599d 5896351e bpf: fix verifier GPF in kmalloc failure path
general protection fault in get_info C 760 615d 618d 599d e3eeacba netfilter: x_tables: don't return garbage pointer on modprobe failure
KASAN: slab-out-of-bounds Read in erspan_build_header C 30 599d 608d 599d b423d13c net: erspan: fix use-after-free
suspicious RCU usage at mm/slab.h:LINE 1 608d 608d 599d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
KASAN: use-after-free Read in tipc_group_is_open C 1 615d 615d 599d 60c25306 tipc: fix race between poll() and setsockopt()
KASAN: use-after-free Read in erspan_xmit C 68 606d 608d 599d b423d13c net: erspan: fix use-after-free
KASAN: use-after-free Read in erspan_build_header C 60 599d 608d 599d b423d13c net: erspan: fix use-after-free
KASAN: use-after-free Read in rb_first_postorder C 17267 612d 621d 599d febafc84 tipc: fix a potental access after delete in tipc_sk_join()
KASAN: slab-out-of-bounds Read in erspan_xmit C 51 606d 608d 599d b423d13c net: erspan: fix use-after-free
general protection fault in free_verifier_state (2) C 2 623d 623d 599d 5896351e bpf: fix verifier GPF in kmalloc failure path
suspicious RCU usage at net/netfilter/ipset/ip_set_core.c:LINE C 38048 620d 626d 599d f998b6b1 netfilter: ipset: Missing nfnl_lock()/nfnl_unlock() is added to ip_set_net_exit()
BUG: sleeping function called from invalid context at mm/slab.h:LINE (2) 2 607d 607d 599d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
general protection fault in sctp_stream_free 17 646d 687d 600d 79d08951 sctp: fix error path in sctp_stream_init
WARNING in fpu__copy 8 642d 642d 600d 5663d8f9 kvm: x86: fix WARN due to uninitialized guest FPU state
BUG: unable to handle kernel NULL pointer dereference in sctp_stream_free 2 643d 641d 600d 79d08951 sctp: fix error path in sctp_stream_init
general protection fault in __list_del_entry_valid (2) C 21 614d 671d 600d 9ee332d9 sget(): handle failures of register_shrinker()
KASAN: stack-out-of-bounds Read in xfrm_state_find (3) C 10353 604d 671d 600d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
general protection fault in __rds_rdma_map C 12 652d 664d 600d f3069c6d rds: Fix NULL pointer dereference in __rds_rdma_map
WARNING in xfrm_state_fini C 2231 615d 671d 600d 6a53b759 xfrm: check id proto in validate_tmpl()
kernel BUG at net/l2tp/l2tp_ppp.c:LINE! C 22 606d 628d 602d e5571240 kcm: Check if sk_user_data already set in kcm_attach
kernel BUG at net/core/skbuff.c:LINE! (2) C 562 603d 692d 602d 02612bb0 pppoe: take ->needed_headroom of lower device into account on xmit
possible deadlock in vhost_chr_write_iter C 25952 606d 608d 602d e9cb4239 vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
KASAN: slab-out-of-bounds Read in __dev_queue_xmit C 6 624d 612d 602d 7c68d1a6 net: qdisc_pkt_len_init() should be more robust
KASAN: use-after-free Read in psock_write_space C 6 610d 622d 602d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
general protection fault in skb_segment C 7 622d 632d 602d 121d57af gso: validate gso_type in GSO handlers
BUG: unable to handle kernel NULL pointer dereference in proc_flush_task syz 1 646d 642d 603d c0ee5549 pid: Handle failure to allocate the first pid in a pid namespace
general protection fault in __lock_acquire (2) C 15 604d 690d 603d 672ecbe1 tipc: fix a null pointer deref on error path
general protection fault in lockdep_invariant_state (2) C 114 655d 684d 603d 5e351ad1 locking/lockdep: Fix possible NULL deref
KASAN: stack-out-of-bounds Read in write_mmio C 3 650d 661d 603d e39d200f KVM: Fix stack-out-of-bounds read in write_mmio
general protection fault in proc_flush_task syz 2 645d 662d 603d c0ee5549 pid: Handle failure to allocate the first pid in a pid namespace
BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:LINE C 19609 666d 692d 604d 4d772cb8 KVM: x86: fix em_fxstor() sleeping while in atomic
WARNING in free_loaded_vmcs C 170 663d 671d 606d b7455825 KVM: VMX: Fix vmx->nested freeing when no SMI handler
KASAN: use-after-free Read in fib6_add_1 C 4 616d 618d 606d 591ff9ea net-backports: ipv6: don't let tb6_root node share routes with other node
possible deadlock in snd_seq_deliver_event C 6 685d 696d 608d 1f20f9ff ALSA: seq: Fix nested rwsem annotation for lockdep splat
KASAN: slab-out-of-bounds Read in map_lookup_elem C 6 615d 618d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in can_rcv C 5 615d 614d 608d 8cb68751 can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once
KASAN: slab-out-of-bounds Read in bpf_fd_array_map_lookup_elem 7 615d 619d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in strlen C 53 611d 612d 608d cd443f1e netlink: reset extack earlier in netlink_rcv_skb
BUG: unable to handle kernel paging request in fd_array_map_delete_elem 11 614d 620d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in adjust_ptr_min_max_vals C 252 611d 628d 608d 6f16101e bpf: mark dst unknown on inconsistent {s, u}bounds adjustments
KASAN: use-after-free Write in array_map_update_elem C 11 614d 615d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
BUG: unable to handle kernel paging request in bpf_fd_array_map_lookup_elem 5 614d 618d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in ___bpf_prog_run C 28 614d 620d 608d 7891a87e bpf: arsh is not supported in 32 bit alu thus reject it
WARNING in wiphy_register C 15 615d 617d 608d 51a1aaa6 mac80211_hwsim: validate number of different channels
WARNING: held lock freed! C 497 612d 623d 608d a0ff6600 sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf
general protection fault in ip6_xmit 16 609d 611d 608d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: slab-out-of-bounds Write in array_map_update_elem C 6 616d 615d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: use-after-free Read in fib6_ifup (2) C 18 615d 612d 608d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in tls_sk_proto_close C 9 614d 621d 608d d91c3e17 net/tls: Only attach to sockets in ESTABLISHED state
BUG: sleeping function called from invalid context at ./include/linux/percpu-rwsem.h:LINE 20 617d 625d 608d b1bdcb59 xfrm: don't call xfrm_policy_cache_flush while holding spinlock
WARNING in rfkill_alloc C 6 616d 617d 608d 59b179b4 cfg80211: check dev_set_name() return value
divide error in ___bpf_prog_run C 28 611d 618d 608d 68fda450 bpf: fix 32-bit divide by zero
KASAN: use-after-free Read in bpf_fd_array_map_lookup_elem 21 614d 620d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in canfd_rcv C 4 616d 614d 608d d4689846 can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once
KASAN: slab-out-of-bounds Read in perf_event_fd_array_release C 96 614d 621d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
kernel BUG at ./include/linux/skbuff.h:LINE! C 4502 614d 626d 608d 374d1b5a esp: Fix GRO when the headers not fully in the linear part of the skb.
general protection fault in sctp_v6_get_dst C 6 620d 620d 608d c5006b8a sctp: do not allow the v4 socket to bind a v4mapped v6 address
general protection fault in cgroup_fd_array_put_ptr C 219 614d 621d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (2) C 174 610d 689d 608d 2f10a61c xfrm: fix rcu usage in xfrm_get_type_offload
general protection fault in __bpf_map_put C 331 614d 621d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in __bpf_prog_put C 212 614d 621d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in netlink_ack (2) C 6 620d 620d 608d cbbdf843 netlink: extack needs to be reset each time through loop
KASAN: stack-out-of-bounds Read in __nla_put C 57 611d 614d 608d cd443f1e netlink: reset extack earlier in netlink_rcv_skb
WARNING in snd_interval_mulkdiv C 21 614d 620d 608d 23b19b7b ALSA: pcm: Remove yet superfluous WARN_ON()
possible deadlock in ppp_dev_uninit C 6 614d 627d 608d 0171c418 ppp: unlock all_ppp_mutex before registering device
BUG: unable to handle kernel paging request in __bpf_map_put 1 618d 617d 608d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
BUG: unable to handle kernel paging request in dst_release 113 614d 619d 608d 95ef498d ipv6: ip6_make_skb() needs to clear cork.base.dst
WARNING in rds_cmsg_rdma_args C 6 628d 628d 612d c0955087 RDS: Heap OOB write in rds_message_alloc_sgs()
kernel BUG at ./include/linux/mm.h:LINE! (3) C 621 617d 634d 612d 46eb14a6 USB: fix usbmon BUG trigger
INFO: rcu detected stall in mulaw_transfer 37 623d 626d 612d 898dfe46 ALSA: aloop: Fix racy hw constraints adjustment
KASAN: use-after-free Read in rt6_mtu_change_route 5 616d 619d 612d 4512c43e ipv6: remove null_entry before adding default route
KASAN: use-after-free Read in fib6_ifdown C 26 615d 619d 612d 4512c43e ipv6: remove null_entry before adding default route
suspicious RCU usage at sound/core/pcm_lib.c:LINE 1 628d 627d 612d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
BUG: unable to handle kernel paging request in memset_erms C 35 612d 627d 612d b088b53e ALSA: aloop: Fix inconsistent format due to incomplete rule
general protection fault in nf_tables_dump_obj_done C 976 621d 626d 612d 8bea728d netfilter: nf_tables: fix potential NULL-ptr deref in nf_tables_dump_obj_done()
WARNING in snd_pcm_hw_param_first C 2905 620d 630d 612d fe08f34d ALSA: pcm: Remove incorrect snd_BUG_ON() usages
BUG: soft lockup (2) C 29 623d 651d 612d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
INFO: task hung in snd_pcm_oss_write syz 2 620d 620d 612d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
INFO: rcu detected stall in snd_pcm_plug_write_transfer 1 620d 620d 612d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
general protection fault in crypto_remove_spawns C 85 626d</