WARNING in nft_socket_init
netfilter
|
C |
done |
|
9 |
1d06h |
16d
|
25/28 |
never |
b7529880cb96
netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level
|
WARNING in folio_memcg
cgroups
mm
|
C |
done |
|
219 |
17h34m |
114d
|
1/28 |
never |
mm: kmem: fix split_page_memcg()
|
BUG: sleeping function called from invalid context in alloc_buffer_head
mm
|
|
|
|
15 |
577d |
582d
|
1/28 |
never |
workingset: add missing rcu_read_unlock() in lru_gen_refault()
|
kernel BUG in f2fs_abort_atomic_write
f2fs
|
syz |
|
|
2 |
665d |
709d
|
1/28 |
never |
f2fs: fix to avoid race condition of f2fs_abort_atomic_write()
|
kernel BUG in f2fs_invalidate_blocks
f2fs
|
|
|
|
2 |
72d |
85d
|
26/28 |
never |
6babe00ccd34
f2fs: fix to do sanity check on node blkaddr in truncate_node()
|
linux-next test error: kernel BUG in folio_add_new_anon_rmap
mm
|
|
|
|
2 |
65d |
64d
|
1/28 |
never |
mm-add-pageanonnotksm-fix
|
linux-next boot error: kernel BUG at include/linux/page-flags.h:LINE!
mm
|
|
|
|
3 |
1469d |
1469d
|
1/28 |
never |
fixup for "mm: refactor initialization of stuct page for holes"
|
linux-next boot error: WARNING in kmem_cache_free
fs
|
|
|
|
45 |
1630d |
1633d
|
1/28 |
never |
mm, slab/slub: improve error reporting and overhead of cache_from_obj()-fix
|
KASAN: use-after-free Read in p9_req_put
v9fs
|
|
|
|
190 |
6d21h |
847d
|
1/28 |
never |
9p: p9_client_create: use p9_client_destroy on failure
|
WARNING in hrtimer_forward (3)
kernel
|
|
|
|
3 |
35d |
128d
|
27/28 |
never |
6ee0270943b5
wifi: mac80211_hwsim: use hrtimer_active()
|
possible deadlock in f2fs_evict_inode
f2fs
|
syz |
|
|
2 |
68d |
64d
|
26/28 |
never |
f10a890308a7
f2fs: fix to avoid potential deadlock in f2fs_record_stop_reason()
|
WARNING in mac80211_hwsim_config_mac_nl
wireless
|
|
|
|
79 |
6h23m |
31d
|
2/28 |
never |
wifi: mac80211: fix vif addr when switching from monitor to station
|
net-next test error: WARNING in __sock_create
net
|
|
|
|
41 |
44d |
56d
|
27/28 |
never |
ba4e469e42fe
vsock: do not leave dangling sk pointer in vsock_create()
|
kernel BUG in snd_pcm_mmap_data_fault
sound
|
|
|
|
1 |
85d |
81d
|
26/28 |
never |
d2913a07d903
ALSA: pcm: Add sanity NULL check for the default mmap fault handler
|
BUG: sleeping function called from invalid context in vfree
sound
|
|
|
|
1 |
16d |
16d
|
26/28 |
never |
20c0c49720dc
ALSA: rawmidi: Fix kvfree() call in spinlock
|
WARNING in iomap_write_begin
xfs
iomap
|
C |
error |
|
6 |
106d |
120d
|
1/28 |
never |
vfs: Fix implicit conversion problem when testing overflow case
|
KASAN: slab-use-after-free Read in finish_fault
mm
|
C |
done |
|
8 |
179d |
181d
|
1/28 |
never |
mm-memory-extend-finish_fault-to-support-large-folio-fix
|
WARNING in udf_rename (2)
udf
|
C |
error |
|
8 |
7d23h |
15d
|
25/28 |
never |
6756af923e06
udf: Verify inode link counts before performing rename
|
BUG: unable to handle kernel NULL pointer dereference in set_page_dirty
f2fs
reiserfs
|
C |
|
|
317 |
124d |
839d
|
1/28 |
never |
f2fs: fix missing mapping caused by the mount/umount race
|
INFO: task hung in snd_card_free
sound
|
C |
error |
|
24 |
24d |
39d
|
27/28 |
never |
dafb28f02be4
ALSA: usx2y: Use snd_card_free_when_closed() at disconnection
|
kernel BUG in bch2_bucket_alloc_trans (3)
bcachefs
|
C |
error |
|
326 |
51m |
23d
|
1/28 |
never |
bcachefs: Kill bch2_bucket_alloc_new_fs()
|
kernel BUG in folio_flags
mm
|
|
|
|
62 |
252d |
699d
|
1/28 |
never |
mm-reimplement-compound_nr-fix
|
KASAN: slab-out-of-bounds Read in ovl_inode_upper
overlayfs
|
C |
|
|
4 |
16d |
16d
|
26/28 |
never |
2957fa4931a3
fs/backing_file: fix wrong argument in callback
|
WARNING in NUM
net
|
|
|
|
1 |
8d23h |
4d23h
|
25/28 |
never |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
KCSAN: data-race in __fput / __tty_hangup (4)
serial
|
|
|
|
6 |
69d |
600d
|
1/28 |
never |
tty: tty_io: fix race between tty_fops and hung_up_tty_fops
|
KASAN: slab-use-after-free Read in set_powered_sync
bluetooth
|
C |
done |
|
153 |
13d |
149d
|
1/28 |
never |
Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
|
KASAN: slab-use-after-free Read in sco_sock_connect
bluetooth
|
syz |
|
|
1 |
18d |
16d
|
1/28 |
never |
Bluetooth: SCO: remove the redundant sco_conn_put
Bluetooth: SCO: remove the redundant sco_conn_put
|
KASAN: slab-use-after-free Read in bpf_trace_run2 (2)
bpf
trace
|
syz |
error |
|
123 |
37d |
54d
|
26/28 |
never |
2e8a12b82c40
tracing: Fix syscall tracepoint use-after-free
|
WARNING in page_add_anon_rmap
mm
|
C |
done |
|
1041 |
449d |
451d
|
1/28 |
never |
mm-rmap-simplify-pageanonexclusive-sanity-checks-when-adding-anon-rmap-fix
|
KASAN: use-after-free Read in netdev_unregister_kobject
pm
|
C |
error |
|
6281 |
2d17h |
233d
|
27/28 |
never |
27aabf27fd01
Bluetooth: fix use-after-free in device_for_each_child()
|
KASAN: out-of-bounds Read in copy_from_kernel_nofault
mm
|
C |
done |
|
1621 |
62d |
72d
|
26/28 |
never |
e4137f08816b
mm, kasan, kmsan: instrument copy_from/to_kernel_nofault
|
WARNING in hci_conn_timeout
bluetooth
|
C |
done |
|
6008 |
7h42m |
1593d
|
27/28 |
never |
2b0f2fc9ed62
Bluetooth: hci_conn: Use disable_delayed_work_sync
|
KMSAN: uninit-value in __exfat_get_dentry_set
exfat
|
C |
|
|
14 |
13d |
67d
|
26/28 |
never |
02dffe9ab092
exfat: fix uninit-value in __exfat_get_dentry_set
|
general protection fault in cleanup_bearer
tipc
|
C |
|
|
11868 |
now |
7d11h
|
1/28 |
never |
tipc: fix NULL deref in cleanup_bearer()
|
WARNING in thermal_thresholds_flush
pm
|
C |
done |
|
76 |
53d |
54d
|
27/28 |
never |
54219ee4eaeb
thermal: thresholds: Fix thermal lock annotation issue
|
WARNING in wnd_add_free_ext (3)
ntfs3
|
C |
done |
|
15 |
11d |
118d
|
26/28 |
never |
5fc982fe7eca
fs/ntfs3: Fix case when unmarked clusters intersect with zone
|
KMSAN: uninit-value in netdev_pick_tx
net
|
|
|
|
3 |
11d |
16d
|
25/28 |
never |
0a4cc4accf00
tcp: populate XPS related fields of timewait sockets
|
WARNING: suspicious RCU usage in mas_walk (3)
mm
|
C |
done |
|
12 |
414d |
428d
|
1/28 |
never |
mempolicy: migration attempt to match interleave nodes: fix
|
KMSAN: uninit-value in hci_rx_work
bluetooth
|
C |
|
|
29 |
22d |
141d
|
27/28 |
never |
3fe288a8214e
Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet
|
KASAN: slab-out-of-bounds Read in selinux_ip_output
selinux
|
C |
done |
|
1490 |
5d13h |
15d
|
25/28 |
never |
eedcad2f2a37
selinux: use sk_to_full_sk() in selinux_ip_output()
|
WARNING in ni_fiemap
ntfs3
|
C |
|
|
99 |
3d09h |
117d
|
26/28 |
never |
e2705dd3d16d
fs/ntfs3: Fix warning in ni_fiemap
|
KASAN: use-after-free Read in __vma_adjust
mm
|
C |
done |
|
10 |
857d |
913d
|
1/28 |
never |
fs/userfaultfd: fix vma iteration in mas_for_each() loop
|
KASAN: slab-use-after-free Read in sg_release
usb
scsi
|
syz |
|
|
1 |
25d |
35d
|
23/28 |
never |
f10593ad9bc3
scsi: sg: Fix slab-use-after-free read in sg_release()
|
kernel BUG in bch2_btree_node_lock_write
bcachefs
|
C |
done |
|
8 |
8d15h |
20d
|
1/28 |
never |
bcachefs: Issue a transaction restart after commit in repair
|
INFO: task hung in remove_inode_hugepages
fs
mm
|
C |
done |
|
52 |
64d |
156d
|
1/28 |
never |
INFO: task hung in remove_inode_hugepages
|
WARNING: lock held when returning to user space in rtnl_link_ops_get
net
|
C |
done |
|
9 |
16d |
24d
|
24/28 |
never |
9b234a97b10c
rtnetlink: fix rtnl_dump_ifinfo() error path
|
general protection fault in dev_prep_valid_name
net
|
C |
done |
|
788 |
5d15h |
25d
|
25/28 |
never |
48327566769a
rtnetlink: fix double call of rtnl_link_get_net_ifla()
|
kernel BUG in bch2_evacuate_bucket
bcachefs
|
C |
done |
|
4 |
17d |
16d
|
1/28 |
never |
bcachefs: Kill bch2_get_next_backpointer()
|
KCSAN: data-race in __mod_timer / kvfree_call_rcu
rcu
|
|
|
|
5 |
23d |
58d
|
27/28 |
never |
a23da88c6c80
rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu
|
WARNING in geneve_xmit (2)
net
|
|
|
|
1 |
14d |
8d09h
|
25/28 |
never |
8588c99c7d47
geneve: do not assume mac header is set in geneve_xmit_skb()
|
KMSAN: uninit-value in hfs_read_inode
hfs
|
C |
|
|
2 |
9d09h |
19d
|
1/28 |
never |
hfs: Sanity check the root record
|
WARNING in posixtimer_send_sigqueue
kernel
|
C |
error |
|
155 |
41m |
28d
|
27/28 |
never |
cdc905d16b07
posix-timers: Fix spurious warning on double enqueue versus do_exit()
|
WARNING in __v4l2_ctrl_modify_dimensions
media
|
C |
|
|
237 |
20d |
100d
|
27/28 |
never |
9f070b1862f3
media: v4l2-core: v4l2-dv-timings: check cvt/gtf result
|
KMSAN: uninit-value in io_nop
io-uring
|
C |
|
|
39 |
11d |
20d
|
26/28 |
never |
ee116574de84
io_uring/nop: ensure nop->fd is always initialized
|
WARNING: suspicious RCU usage in phonet_route_del
net
|
C |
done |
|
7 |
35d |
39d
|
27/28 |
never |
38a1f50a5efb
phonet: do not call synchronize_rcu() from phonet_route_del()
|
general protection fault in io_sqe_buffer_register
io-uring
|
C |
done |
|
55 |
38d |
40d
|
25/28 |
never |
d50f94d761a5
io_uring/rsrc: get rid of the empty node and dummy_ubuf
|
kernel BUG in free_bprm
fs
mm
|
C |
done |
|
445 |
35d |
36d
|
1/28 |
never |
exec: NULL out bprm->argv0 when it is an ERR_PTR
|
kernel BUG in const_folio_flags (2)
mm
|
syz |
|
|
1 |
22d |
18d
|
23/28 |
never |
3203b3ab0fcf
mm/filemap: don't call folio_test_locked() without a reference in next_uptodate_folio()
|
kernel BUG in ocfs2_set_new_buffer_uptodate
ocfs2
|
C |
inconclusive |
|
55 |
4d02h |
115d
|
27/28 |
never |
737f34137844
ocfs2: uncache inode which has failed entering the group
|
KMSAN: uninit-value in inode_go_dump (5)
gfs2
|
C |
|
|
6 |
17d |
71d
|
26/28 |
never |
f9417fcfca3c
KMSAN: uninit-value in inode_go_dump (5)
|
WARNING in media_create_pad_link
usb
media
|
C |
done |
done |
104 |
20d |
1672d
|
27/28 |
never |
3dd075fe8ebb
media: uvcvideo: Require entities to have a non-zero unique ID
|
general protection fault in io_uring_show_fdinfo (2)
io-uring
|
C |
done |
|
19 |
41d |
40d
|
25/28 |
never |
d50f94d761a5
io_uring/rsrc: get rid of the empty node and dummy_ubuf
|
VFS: Busy inodes after unmount (use-after-free)
ocfs2
|
C |
error |
|
37608 |
1h39m |
686d
|
23/28 |
never |
965b5dd1894f
ocfs2: free inode when ocfs2_get_init_inode() fails
|
KMSAN: uninit-value in ocfs2_file_read_iter
ocfs2
|
C |
|
|
3 |
48d |
44d
|
26/28 |
never |
adc77b19f62d
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
|
WARNING in iomap_iter (4)
iomap
erofs
|
C |
done |
|
1 |
30d |
26d
|
27/28 |
never |
0bc8061ffc73
erofs: handle NONHEAD !delta[1] lclusters gracefully
|
KASAN: use-after-free Read in ocfs2_search_dirblock
ocfs2
|
C |
inconclusive |
|
9 |
11d |
117d
|
1/28 |
never |
ocfs2: fix directory entry check in ocfs2_search_dirblock()
|
KASAN: slab-use-after-free Read in z_erofs_decompress_queue
erofs
|
|
|
|
5 |
10d |
10d
|
1/28 |
never |
erofs: fix rare pcluster memory leak after unmounting
|
UBSAN: shift-out-of-bounds in ocfs2_fill_super (2)
ocfs2
|
C |
|
|
81 |
25d |
46d
|
27/28 |
never |
23aab037106d
ocfs2: fix UBSAN warning in ocfs2_verify_volume()
|
general protection fault in fuse_do_readpage
fuse
|
C |
|
|
9 |
14d |
38d
|
27/28 |
never |
3a23787ca875
erofs: fix file-backed mounts over FUSE
|
KASAN: use-after-free Read in nilfs_find_entry
nilfs
|
C |
inconclusive |
|
8 |
8d17h |
29d
|
23/28 |
never |
985ebec4ab0a
nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
|
general protection fault in touch_buffer
nilfs
|
C |
|
|
8 |
32d |
42d
|
27/28 |
never |
cd45e963e44b
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
|
WARNING in kvm_handle_mmio_return
kvmarm
|
C |
|
|
5 |
20d |
27d
|
26/28 |
never |
e735a5da6442
KVM: arm64: Don't retire aborted MMIO instruction
|
KCSAN: data-race in __ep_remove / __fput (5)
fs
|
|
|
|
1 |
82d |
82d
|
27/28 |
never |
6474353a5e3d
epoll: annotate racy check
|
WARNING: refcount bug in sk_skb_reason_drop
can
|
C |
done |
|
8107 |
2d14h |
69d
|
25/28 |
never |
a8c695005bfe
can: j1939: j1939_session_new(): fix skb reference counting
|
KASAN: slab-use-after-free Read in free_block_entry
btrfs
|
|
|
|
1 |
30d |
26d
|
25/28 |
never |
7c4e39f9d2af
btrfs: ref-verify: fix use-after-free after invalid ref action
|
WARNING in __io_uring_free
io-uring
|
|
|
|
1 |
26d |
22d
|
26/28 |
never |
7eb75ce75271
io_uring/tctx: work around xa_store() allocation error issue
|
BUG: unable to handle kernel paging request in try_to_wake_up (2)
btrfs
|
C |
error |
|
12 |
1d02h |
15d
|
18/28 |
never |
f10bef73fb35
btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
|
WARNING in io_pin_pages
io-uring
|
C |
done |
|
14 |
22d |
19d
|
26/28 |
never |
0c0a4eae26ac
io_uring: check for overflows in io_pin_pages
|
general protection fault in btrfs_search_slot
btrfs
|
C |
done |
|
9 |
10d |
49d
|
25/28 |
never |
3ed51857a50f
btrfs: add a sanity check for btrfs root in btrfs_search_slot()
|
WARNING in kvm_timer_update_irq
kvmarm
|
C |
|
|
15 |
19d |
51d
|
26/28 |
never |
38d7aacca092
KVM: arm64: Get rid of userspace_irqchip_in_use
|
INFO: task hung in io_sq_thread_stop
fs
io-uring
|
C |
done |
|
211 |
1395d |
1554d
|
1/28 |
never |
io_uring: don't sleep schedule in SQPOLL thread if we need to park
|
WARNING in netlink_sock_destruct (2)
net
|
|
|
|
1 |
42d |
42d
|
26/28 |
never |
1904fb9ebf91
netlink: terminate outstanding dump on socket close
|
WARNING in netlink_ack_tlv_fill
net
|
C |
error |
|
3 |
32d |
28d
|
26/28 |
never |
3bf39fa849ab
netlink: fix false positive warning in extack during dumps
|
KMSAN: uninit-value in batadv_get_vid (2)
batman
|
C |
|
|
321 |
19h32m |
344d
|
1/28 |
never |
bpf: Don't redirect too small packets
|
kernel BUG in bch2_journal_pin_set
bcachefs
|
C |
done |
|
5 |
1d00h |
16d
|
1/28 |
never |
bcachefs: Guard against journal seq overflow
|
general protection fault in vma_is_shmem
mm
io-uring
|
C |
error |
|
28 |
842d |
843d
|
1/28 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
WARNING: kmalloc bug in memslot_rmap_alloc
kvm
|
C |
unreliable |
|
3 |
1164d |
1193d
|
1/28 |
never |
KVM: replace large kvmalloc allocation with vmalloc
|
KMSAN: uninit-value in erspan_build_header (2)
net
|
C |
|
|
55 |
39d |
264d
|
1/28 |
never |
bpf: Don't redirect too small packets
|
kernel BUG in __bch2_journal_pin_put
bcachefs
|
C |
|
|
6 |
2d15h |
17d
|
1/28 |
never |
bcachefs: Guard against journal seq overflow
|
linux-next test error: general protection fault in of_pci_supply_present
pci
|
|
|
|
1 |
20d |
20d
|
26/28 |
never |
278dd091e95d
PCI/pwrctl: Create pwrctl device only if at least one power supply is present
|
kernel BUG in bch2_btree_root_read
bcachefs
|
C |
|
|
5 |
12d |
19d
|
1/28 |
never |
bcachefs: Kill bch2_bucket_alloc_new_fs()
|
possible deadlock in usb_deregister_dev (3)
usb
|
C |
|
|
103 |
58d |
64d
|
26/28 |
never |
d73dc7b182be
USB: chaoskey: Fix possible deadlock chaoskey_list_lock
|
possible deadlock in chaoskey_open
usb
|
C |
|
|
475 |
58d |
64d
|
26/28 |
never |
d73dc7b182be
USB: chaoskey: Fix possible deadlock chaoskey_list_lock
|
BUG: using smp_processor_id() in preemptible code in bpf_mem_alloc
bpf
|
C |
done |
|
12 |
26d |
23d
|
27/28 |
never |
4ff04abf9d5b
bpf: Add necessary migrate_disable to range_tree.
|
KCSAN: data-race in __se_sys_io_uring_register / io_sqe_files_register (3)
io-uring
|
|
|
|
1 |
30d |
28d
|
26/28 |
never |
e358e09a894d
io_uring: protect register tracing
|
WARNING in vmap_pages_range_noflush (2)
bpf
net
|
C |
error |
|
250 |
841d |
843d
|
1/28 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
possible deadlock in chaoskey_release
usb
|
C |
|
|
90 |
58d |
64d
|
26/28 |
never |
d73dc7b182be
USB: chaoskey: Fix possible deadlock chaoskey_list_lock
|
general protection fault in netfs_write_collection_worker
netfs
|
|
|
|
6 |
8d15h |
58d
|
1/28 |
never |
netfs: Report on NULL folioq in netfs_writeback_unlock_folios()
|
BUG: unable to handle kernel paging request in alloc_huge_page
mm
|
C |
unreliable |
|
491 |
1216d |
1215d
|
1/28 |
never |
mm/hugetlb: Initialize page to NULL in alloc_buddy_huge_page_with_mpol()
|
kernel BUG in bch2_fs_btree_cache_exit
bcachefs
|
C |
done |
|
2766 |
23d |
54d
|
26/28 |
never |
ca43f73cd172
bcachefs: bch2_btree_write_buffer_flush_going_ro()
|
KASAN: slab-out-of-bounds Write in skb_copy_and_csum_bits
net
|
C |
|
|
76 |
38d |
42d
|
0/28 |
never |
iov-iter: do not return more bytes than requested in iov_iter_extract_bvec_pages()
|
KASAN: slab-use-after-free Read in chaoskey_disconnect
usb
|
|
|
|
2 |
88d |
75d
|
26/28 |
never |
422dc0a4d12d
USB: chaoskey: fail open after removal
|
kernel BUG in bch2_btree_write_buffer_flush_locked
bcachefs
|
C |
done |
|
17 |
3d11h |
44d
|
1/28 |
never |
bcachefs: Guard against journal seq overflow
|
WARNING in skb_release_data
net
|
|
|
|
8 |
38d |
42d
|
0/28 |
never |
iov-iter: do not return more bytes than requested in iov_iter_extract_bvec_pages()
|
kernel BUG in __bch2_trans_commit
bcachefs
|
C |
unreliable |
|
11858 |
27d |
51d
|
1/28 |
never |
bcachefs: -o norecovery now bails out of recovery earlier
|
KASAN: slab-out-of-bounds Read in led_tg_check
netfilter
|
C |
done |
|
5 |
10d |
21d
|
25/28 |
never |
04317f4eb2aa
netfilter: x_tables: fix LED ID check in led_tg_check()
|
WARNING in ip6mr_free_table
net
|
C |
done |
|
97859 |
3d02h |
9d08h
|
25/28 |
never |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
WARNING in ip6mr_net_exit_batch
net
|
|
|
|
1 |
7d02h |
7d02h
|
25/28 |
never |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
KASAN: invalid-free in hci_req_sync_complete
bluetooth
|
syz |
|
|
179 |
160d |
233d
|
1/28 |
never |
Bluetooth: Fix double free in hci_req_sync_complete
|
possible deadlock in xfs_icwalk_ag (2)
xfs
|
C |
|
|
358 |
32m |
239d
|
25/28 |
never |
45f69d091bab
xfs: eliminate lockdep false positives in xfs_attr_shortform_list
|
INFO: task hung in __writeback_inodes_sb_nr (6)
bcachefs
|
C |
done |
|
3009 |
28m |
544d
|
1/28 |
never |
PM: hibernate: Fix block device handling in test_resume mode
|
BUG: using smp_processor_id() in preemptible code in nft_inner_eval
netfilter
|
|
|
|
2 |
20d |
20d
|
25/28 |
never |
7b1d83da254b
netfilter: nft_inner: incorrect percpu area handling under softirq
|
kernel BUG in bch2_journal_noflush_seq
bcachefs
|
C |
done |
done |
177 |
49m |
154d
|
1/28 |
never |
bcachefs: Check for bucket journal seq in the future
|
kernel BUG in bch2_rechecksum_bio
bcachefs
|
C |
|
|
4 |
23d |
33d
|
1/28 |
never |
bcachefs: Check for extent crc uncompressed/compressed size mismatch
|
KASAN: slab-out-of-bounds Read in bitmap_ip_add (2)
netfilter
|
C |
|
|
3 |
33d |
30d
|
27/28 |
never |
35f56c554eb1
netfilter: ipset: add missing range check in bitmap_ip_uadt
|
kernel BUG in nr_header
hams
|
|
|
|
2 |
20d |
7d14h
|
1/28 |
never |
net: lapb: increase LAPB_HEADER_LEN
|
WARNING in sk_skb_reason_drop
net
|
C |
done |
|
1421 |
2h02m |
25d
|
27/28 |
never |
85c7975acd97
net: ip: fix unexpected return in fib_validate_source()
|
kernel BUG in send_hsr_supervision_frame
net
|
|
|
|
2 |
20d |
9d18h
|
25/28 |
never |
af8edaeddbc5
net: hsr: must allocate more bytes for RedBox support
|
WARNING in copy_net_ns
net
|
|
|
|
1 |
9d10h |
9d10h
|
25/28 |
never |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
general protection fault in modify_prefix_route
net
|
C |
done |
|
11 |
15d |
15d
|
25/28 |
never |
a747e02430df
ipv6: avoid possible NULL deref in modify_prefix_route()
|
BUG: corrupted list in ieee802154_if_remove
wpan
|
C |
error |
|
3 |
33d |
35d
|
1/28 |
never |
mac802154: check local interfaces before deleting sdata list
|
WARNING in bch2_journal_flush_seq_async
bcachefs
|
C |
|
|
23 |
3d15h |
84d
|
1/28 |
never |
bcachefs: Check for inode journal seq in the future
|
KMSAN: uninit-value in hsr_forward_skb (2)
net
|
C |
|
|
22 |
8d14h |
15d
|
25/28 |
never |
b9653d19e556
net: hsr: avoid potential out-of-bound access in fill_frame_info()
|
KASAN: slab-use-after-free Read in __dev_get_by_index
net
|
|
|
|
1 |
14d |
8d11h
|
24/28 |
never |
750e51603395
net: avoid potential UAF in default_operstate()
|
kernel BUG in bch2_journal_res_get (2)
bcachefs
|
C |
|
|
1710 |
23d |
47d
|
26/28 |
never |
ca43f73cd172
bcachefs: bch2_btree_write_buffer_flush_going_ro()
|
WARNING in l2tp_exit_net
net
|
syz |
done |
|
219 |
5d08h |
90d
|
26/28 |
never |
5d066766c5f1
net/l2tp: fix warning in l2tp_exit_net found by syzbot
|
kernel BUG in bch2_btree_path_traverse_one
bcachefs
|
C |
done |
|
9 |
2d03h |
35d
|
1/28 |
never |
bcachefs: Guard against backpointers to unknown btrees
|
divide error in __tcp_select_window (3)
net
|
C |
|
|
5 |
34d |
39d
|
26/28 |
never |
ce7356ae3594
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
|
kernel BUG in bch2_bio_compress (2)
bcachefs
|
C |
|
|
4 |
19d |
27d
|
1/28 |
never |
bcachefs: Don't BUG_ON() when superblock feature wasn't set for compressed data
|
possible deadlock in bch2_alloc_sectors_start_trans
bcachefs
|
C |
inconclusive |
|
64 |
8d08h |
30d
|
1/28 |
never |
bcachefs: Don't recurse in check_discard_freespace_key
|
general protection fault in bpf_prog_array_delete_safe
bpf
|
C |
done |
|
5 |
3d15h |
5d14h
|
1/28 |
never |
bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog
|
kernel BUG in mfill_atomic_copy
mm
|
C |
error |
|
3 |
520d |
517d
|
1/28 |
never |
mm: userfaultfd: check for start + len overflow in validate_range: fix
|
kernel BUG in bch2_fs_btree_write_buffer_exit
bcachefs
|
C |
done |
|
6138 |
23d |
75d
|
26/28 |
never |
ca43f73cd172
bcachefs: bch2_btree_write_buffer_flush_going_ro()
|
general protection fault in swap_reclaim_full_clusters
mm
|
C |
|
|
1530 |
28d |
36d
|
27/28 |
never |
dcf32ea7eced
mm: swapfile: fix cluster reclaim work crash on rotational devices
|
possible deadlock in blk_unregister_queue
block
|
|
|
|
6 |
2d23h |
16d
|
1/28 |
never |
blktrace: move copy_[to|from]_user() out of ->debugfs_lock
|
BUG: unable to handle kernel paging request in crypto_skcipher_encrypt
bcachefs
|
C |
|
|
290 |
11h24m |
180d
|
1/28 |
never |
bcachefs: Don't try to en/decrypt when encryption not available
|
KASAN: slab-use-after-free Read in madvise_collapse
mm
|
C |
error |
|
5 |
507d |
507d
|
1/28 |
never |
mm/khugepaged: collapse_pte_mapped_thp() with mmap_read_lock(): fix
|
kernel BUG in bch2_ptr_swab
bcachefs
|
C |
inconclusive |
|
11 |
32d |
49d
|
27/28 |
never |
840c2fbcc5cd
bcachefs: Fix assertion pop in bch2_ptr_swab()
|
UBSAN: array-index-out-of-bounds in dbAdjTree (2)
jfs
|
C |
inconclusive |
|
77 |
22d |
207d
|
27/28 |
never |
a174706ba4da
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
|
BUG: Bad page state in kvm_coalesced_mmio_init
mm
|
|
|
|
1 |
37d |
36d
|
27/28 |
never |
66edc3a5894c
mm: page_alloc: move mlocked flag clearance into free_pages_prepare()
|
kernel BUG in vma_replace_policy
mm
|
C |
done |
|
6 |
454d |
463d
|
1/28 |
never |
mm: lock VMAs skipped by a failed queue_pages_range()
|
kernel BUG in bch2_run_recovery_pass
bcachefs
|
C |
done |
|
17 |
27d |
48d
|
27/28 |
never |
2642084f26b5
bcachefs: Allow for unknown key types in backpointers fsck
|
UBSAN: array-index-out-of-bounds in dtReadFirst
jfs
|
C |
error |
|
199 |
4h38m |
224d
|
27/28 |
never |
ca84a2c9be48
jfs: array-index-out-of-bounds fix in dtReadFirst
|
kernel BUG in __bch2_btree_node_hash_insert
bcachefs
|
C |
done |
|
396 |
24d |
32d
|
26/28 |
never |
0b6ec0c5ac6c
bcachefs: Fix assertion pop in topology repair
|
kernel BUG in bch2_dev_btree_bitmap_mark
bcachefs
|
C |
done |
|
31 |
27d |
51d
|
27/28 |
never |
27a036a0c3e7
bcachefs: Fix bch_member.btree_bitmap_shift validation
|
UBSAN: array-index-out-of-bounds in jfs_readdir
jfs
|
C |
inconclusive |
|
89 |
2d17h |
254d
|
27/28 |
never |
839f102efb16
jfs: fix array-index-out-of-bounds in jfs_readdir
|
KASAN: vmalloc-out-of-bounds Write in push_insn_history
bpf
|
|
|
|
136 |
3d04h |
16d
|
19/28 |
never |
d699440f58ce
mm: fix vrealloc()'s KASAN poisoning logic
|
KASAN: vmalloc-out-of-bounds Write in vrealloc_noprof
bpf
|
C |
done |
|
33 |
1d23h |
17d
|
19/28 |
never |
d699440f58ce
mm: fix vrealloc()'s KASAN poisoning logic
|
kernel BUG in bch2_get_scanned_nodes
bcachefs
|
C |
done |
|
97 |
8d05h |
13d
|
1/28 |
never |
bcachefs: struct bkey_validate_context
|
general protection fault in follow_pfnmap_start
kernel
|
C |
|
|
38 |
57d |
71d
|
1/28 |
never |
mm: fix null pointer dereference in pfnmap_lockdep_assert
|
kernel BUG in __bkey_unpack_pos
bcachefs
|
C |
|
|
4 |
3d17h |
42d
|
27/28 |
never |
dc537189b5cf
bcachefs: Fix validate_bset() repair path
|
possible deadlock in fat_count_free_clusters
exfat
|
|
|
|
4 |
11d |
31d
|
26/28 |
never |
b49125574cae
loop: Fix ABBA locking race
|
WARNING in follow_pte
kernel
|
C |
|
|
230 |
81d |
161d
|
1/28 |
never |
mm: fix mmap_assert_locked() in follow_pte()
|
UBSAN: shift-out-of-bounds in dbSplit (2)
jfs
|
C |
error |
|
403 |
8d19h |
254d
|
27/28 |
never |
a5f5e4698f8a
jfs: fix shift-out-of-bounds in dbSplit
|
WARNING in handle_userfault
mm
|
C |
error |
|
71 |
518d |
525d
|
1/28 |
never |
mm: fix a lockdep issue in vma_assert_write_locked
|
possible deadlock in __bch2_trans_relock
bcachefs
|
C |
|
|
37 |
1d16h |
49d
|
1/28 |
never |
bcachefs: bch2_trans_relock() is trylock for lockdep
|
kernel BUG in bch2_btree_pos_to_text (2)
bcachefs
|
C |
|
|
18 |
1d09h |
19d
|
1/28 |
never |
bcachefs: Fix btree node scan when unknown btree IDs are present
|
KASAN: slab-use-after-free Read in handle_mm_fault
mm
|
C |
done |
|
107 |
146d |
148d
|
1/28 |
never |
mm: check for VM_DROPPABLE in vma prior to handling mm fault
|
kernel BUG in __bch2_btree_node_write
bcachefs
|
C |
|
|
37 |
10h00m |
69d
|
1/28 |
never |
bcachefs: Fix dup/misordered check in btree node read
|
linux-next boot error: BUG: unable to handle kernel NULL pointer dereference in mempool_init_node
ceph
fs
|
|
|
|
12 |
1490d |
1491d
|
1/28 |
never |
kasan-simplify-kasan_poison_kfree-temp-fix
|
KASAN: slab-out-of-bounds Read in shrink_folio_list
mm
|
C |
|
|
683 |
521d |
521d
|
1/28 |
never |
mm: call folio_mapping() inside folio_needs_release()
|
KASAN: slab-out-of-bounds Read in journal_entry_dev_usage_to_text
bcachefs
|
C |
done |
|
33 |
25d |
135d
|
27/28 |
never |
657d4282d8c4
bcachefs: Fix journal_entry_dev_usage_to_text() overrun
|
general protection fault in vma_interval_tree_remove
mm
|
C |
done |
|
14 |
196d |
954d
|
1/28 |
never |
mm/mmap: fix advanced maple tree API for mmap_region()
mm/mmap: qvoid dereferencing next on null in BUG_ON()
|
WARNING: locking bug in ext4_move_extents
ext4
|
C |
done |
|
12000 |
2d15h |
556d
|
27/28 |
never |
d7fe143cb115
locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass()
|
WARNING: locking bug in get_random_u8
kernel
|
syz |
|
|
26 |
17h50m |
25d
|
0/28 |
never |
kasan: Make kasan_record_aux_stack_noalloc() the default behaviour
|
BUG: corrupted list in bch2_btree_and_journal_iter_exit
bcachefs
|
C |
done |
|
5 |
10d |
16d
|
1/28 |
never |
bcachefs: Fix journal_iter list corruption
|
WARNING in vma_merge
mm
|
C |
done |
|
18115 |
380d |
959d
|
1/28 |
never |
mm/mlock: use maple state in apply_mlockall_flags()
|
WARNING: locking bug in __rmqueue_pcplist
mm
|
syz |
|
|
3938 |
38m |
38d
|
1/28 |
never |
kasan: make kasan_record_aux_stack_noalloc() the default behaviour
|
possible deadlock in lock_timer_base
bpf
trace
|
C |
|
|
134 |
4d16h |
1438d
|
1/28 |
never |
kfence: fix potential deadlock due to wake_up()
|
general protection fault in do_migrate_pages
mm
|
C |
|
|
2 |
4d20h |
22d
|
23/28 |
never |
091c1dd2d4df
mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM
|
kernel BUG in bch2_btree_path_level_init (2)
bcachefs
|
C |
done |
|
27 |
6d06h |
49d
|
27/28 |
never |
f8f1dde68681
bcachefs: Fix missing validation for bch_backpointer.level
|
kernel BUG in bch2_trans_node_iter_init
bcachefs
|
C |
done |
|
13 |
33d |
47d
|
27/28 |
never |
f8f1dde68681
bcachefs: Fix missing validation for bch_backpointer.level
|
linux-next boot error: WARNING in prepare_kswapd_sleep
mm
|
|
|
|
15 |
1477d |
1478d
|
1/28 |
never |
mm/memcg: warn on missing memcg on mem_cgroup_page_lruvec()
|
linux-next test error: WARNING in vma_merge
mm
|
|
|
|
6 |
686d |
687d
|
1/28 |
never |
mm/madvise: fix VMA_ITERATOR start position
|
general protection fault in put_page (3)
net
|
C |
done |
|
34 |
1d18h |
40d
|
27/28 |
never |
341468e0ab4b
lib/iov_iter: fix bvec iterator setup
|
kernel BUG in bch2_bkey_pack_pos_lossy
bcachefs
|
C |
|
|
7 |
34d |
46d
|
27/28 |
never |
dc537189b5cf
bcachefs: Fix validate_bset() repair path
|
general protection fault in bch2_checksum
bcachefs
|
C |
done |
|
13 |
23h10m |
147d
|
1/28 |
never |
bcachefs: cryptographic MACs on superblock are not (yet?) supported
|
possible deadlock in collapse_file
mm
|
C |
done |
|
189 |
647d |
648d
|
1/28 |
never |
mm/khugepaged: fix vm_lock/i_mmap_rwsem inversion in retract_page_tables
|
general protection fault in bch2_btree_path_traverse_one
bcachefs
|
C |
done |
|
89 |
11h00m |
47d
|
1/28 |
never |
bcachefs: Fix null ptr deref in btree_path_lock_root()
bcachefs: Ignore empty btree root journal entries
|
kernel BUG in collapse_file (3)
mm
|
C |
done |
|
14 |
507d |
513d
|
1/28 |
never |
mm/khugepaged: collapse_pte_mapped_thp() with mmap_read_lock(): fix
|
general protection fault in ocfs2_xa_block_wipe_namevalue
ocfs2
|
C |
|
|
4 |
49d |
45d
|
28/28 |
5h23m |
0b63c0e01fba
ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()
|
kernel BUG in __bch2_bkey_cmp_packed_format_checked
bcachefs
|
C |
|
|
4 |
47d |
47d
|
28/28 |
5h23m |
d335bb3fd3a4
bcachefs: Ancient versions with bad bkey_formats are no longer supported
|
kernel BUG in bch2_bkey_cmp_packed
bcachefs
|
C |
|
|
8 |
34d |
47d
|
28/28 |
5h23m |
d335bb3fd3a4
bcachefs: Ancient versions with bad bkey_formats are no longer supported
|
WARNING in __sock_create
net
|
C |
done |
|
4 |
35d |
35d
|
28/28 |
5h23m |
d293958a8595
net/smc: do not leave a dangling sk pointer in __smc_create()
|
KMSAN: uninit-value in sctp_sf_ootb
sctp
|
C |
|
|
18 |
39d |
107d
|
28/28 |
5h23m |
0ead60804b64
sctp: properly validate chunk size in sctp_sf_ootb()
|
kernel BUG in bch2_inconsistent_error
bcachefs
|
C |
|
|
4 |
34d |
46d
|
28/28 |
5h23m |
f9f0a5390dce
bcachefs: Change OPT_STR max to be 1 less than the size of choices array
|
possible deadlock in ni_fiemap
ntfs3
|
C |
error |
done |
4007 |
58d |
785d
|
28/28 |
12d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: null-ptr-deref Write in dst_release (4)
net
|
|
|
|
23 |
64d |
251d
|
28/28 |
12d |
ac888d58869b
net: do not delay dst_entries_add() in dst_release()
|
upstream test error: KASAN: invalid-access Write in setup_arch
arm
|
|
|
|
1 |
104d |
103d
|
28/28 |
15d |
7aed6a2c51ff
kasan: Disable Software Tag-Based KASAN with GCC
894b00a3350c
kasan: Fix Software Tag-Based KASAN with GCC
|
KASAN: slab-use-after-free Write in sco_sock_timeout
bluetooth
|
C |
done |
|
275 |
47d |
391d
|
28/28 |
15d |
1bf4470a3939
Bluetooth: SCO: Fix UAF on sco_sock_timeout
|
kernel BUG in eth_header (3)
net
|
|
|
|
1 |
48d |
48d
|
28/28 |
26d |
4ed234fe793f
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
|
KASAN: slab-use-after-free Read in bch2_reconstruct_alloc
bcachefs
|
C |
done |
|
2 |
44d |
49d
|
28/28 |
27d |
8e910ca20e11
bcachefs: Fix UAF in bch2_reconstruct_alloc()
|
BUG: Bad page state in bpf_test_run_xdp_live
net
|
C |
done |
|
17 |
41d |
45d
|
28/28 |
27d |
c40dd8c47325
bpf, test_run: Fix LIVE_FRAME frame update after a page has been recycled
|
WARNING in folio_walk_start
mm
|
|
|
|
1 |
60d |
58d
|
28/28 |
27d |
7c18d4811000
mm/pagewalk: fix usage of pmd_leaf()/pud_leaf() without present check
|
kernel BUG in bch2_bucket_alloc_trans (2)
bcachefs
|
C |
done |
|
103 |
27d |
55d
|
28/28 |
27d |
3fd27e9c57bf
bcachefs: init freespace inited bits to 0 in bch2_fs_initialize
|
kernel BUG in ocfs2_truncate_inline
ocfs2
|
C |
inconclusive |
|
3 |
49d |
63d
|
28/28 |
27d |
bc0a2f3a73fc
ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
|
WARNING in fuse_write_file_get (2)
fuse
|
|
|
|
6 |
55d |
71d
|
28/28 |
27d |
184429a17f8f
Revert "fuse: move initialization of fuse_file to fuse_writepages() instead of in callback"
|
KASAN: null-ptr-deref Read in bch2_sb_set_upgrade_extra
bcachefs
|
C |
|
|
2 |
53d |
49d
|
28/28 |
27d |
a25a83de45b4
bcachefs: fix null-ptr-deref in have_stripes()
|
possible deadlock in nilfs_dirty_inode (4)
nilfs
|
C |
|
|
2 |
43d |
53d
|
28/28 |
27d |
b3a033e3ecd3
nilfs2: fix potential deadlock with newly created symlinks
|
WARNING in push_jmp_history
bpf
|
C |
done |
|
5 |
65d |
65d
|
28/28 |
27d |
aa30eb3260b2
bpf: Force checkpoint when jmp history is too long
|
general protection fault in btree_node_iter_and_journal_peek
bcachefs
|
C |
|
|
3 |
50d |
72d
|
28/28 |
27d |
3726a1970bd7
bcachefs: Fix NULL ptr dereference in btree_node_iter_and_journal_peek
|
UBSAN: shift-out-of-bounds in bch2_alloc_to_text
bcachefs
|
C |
|
|
29 |
39d |
51d
|
28/28 |
27d |
5c41f75d1b92
bcachefs: fix shift oob in alloc_lru_idx_fragmentation
|
KASAN: slab-use-after-free Write in kvfree_call_rcu
wireless
|
|
|
|
2 |
59d |
55d
|
28/28 |
27d |
d5fee261dfd9
wifi: cfg80211: clear wdev->cqm_config pointer on free
|
KASAN: null-ptr-deref Write in xfs_filestream_select_ag (2)
xfs
|
syz |
|
|
3 |
54d |
54d
|
28/28 |
27d |
dc60992ce76f
xfs: fix finding a last resort AG in xfs_filestream_pick_ag
|
possible deadlock in process_measurement (4)
integrity
lsm
|
C |
done |
|
7976 |
37d |
74d
|
28/28 |
27d |
58a039e679fe
mm: split critical region in remap_file_pages() and invoke LSMs in between
|
KCSAN: assert: race in dequeue_entities
audit
|
|
|
|
2118 |
38d |
75d
|
28/28 |
27d |
b55945c500c5
sched: Fix pick_next_task_fair() vs try_to_wake_up() race
|
UBSAN: shift-out-of-bounds in validate_sb_layout
bcachefs
|
C |
done |
|
7 |
41d |
49d
|
28/28 |
27d |
2045fc4295c4
bcachefs: Fix invalid shift in validate_sb_layout()
|
kernel BUG in __block_write_begin_int (3)
nilfs
|
C |
|
|
4 |
56d |
56d
|
28/28 |
27d |
41e192ad2779
nilfs2: fix kernel bug due to missing clearing of checked flag
|
possible deadlock in lock_mm_and_find_vma (2)
mm
|
C |
|
|
6626 |
31d |
102d
|
28/28 |
27d |
58a039e679fe
mm: split critical region in remap_file_pages() and invoke LSMs in between
|
possible deadlock in bch2_replicas_entry_validate
bcachefs
|
C |
done |
|
9468 |
50d |
69d
|
28/28 |
28d |
bf4baaa087e2
bcachefs: Fix lockdep splat in bch2_accounting_read
|
possible deadlock in ext4_xattr_inode_iget (3)
ext4
|
C |
error |
done |
183 |
70d |
252d
|
28/28 |
28d |
d1bc560e9a9c
ext4: nested locking for xattr inode
|
KASAN: slab-use-after-free Read in rhashtable_walk_enter
nfs
|
|
|
|
8 |
66d |
84d
|
28/28 |
28d |
dc0d0f885aa4
NFSD: Mark filecache "down" if init fails
|
KASAN: slab-use-after-free Read in kvm_put_kvm
kvm
|
|
|
|
1 |
50d |
50d
|
28/28 |
28d |
ae8f8b376102
KVM: arm64: Unregister redistributor for failed vCPU creation
|
inconsistent lock state in ppp_input
ppp
|
C |
|
|
15 |
57d |
75d
|
28/28 |
29d |
aec7291003df
ppp: do not assume bh is held in ppp_channel_bridge_input()
|
kernel BUG in bch2_btree_pos_to_text
bcachefs
|
C |
|
|
8 |
32d |
81d
|
28/28 |
29d |
0151d10a480d
bcachefs: add check for btree id against max in try read node
|
possible deadlock in fsnotify_destroy_mark
squashfs
|
C |
|
|
46 |
68d |
111d
|
28/28 |
29d |
cad3f4a22cfa
inotify: Fix possible deadlock in fsnotify_destroy_mark
|
INFO: task hung in vcs_open (8)
nilfs
serial
|
C |
inconclusive |
|
7 |
70d |
76d
|
28/28 |
29d |
08cfa12adf88
nilfs2: propagate directory read errors from nilfs_find_entry()
|
possible deadlock in sk_clone_lock (3)
mptcp
|
C |
|
|
21 |
49d |
97d
|
28/28 |
29d |
3d041393ea8c
mptcp: prevent MPC handshake on port-based signal endpoints
|
general protection fault in btrfs_update_reloc_root
btrfs
|
|
|
|
3 |
83d |
75d
|
28/28 |
29d |
c3b47f49e831
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
|
WARNING in __mptcp_move_skbs_from_subflow
mptcp
|
C |
error |
|
90 |
62d |
149d
|
28/28 |
29d |
4dabcdf58121
tcp: fix mptcp DSS corruption due to large pmtu xmit
|
INFO: task hung in usb_port_suspend
usb
|
C |
|
|
12 |
51d |
61d
|
28/28 |
29d |
5189df7b8088
USB: gadget: dummy-hcd: Fix "task hung" problem
|
KCSAN: data-race in __fsnotify_parent / __fsnotify_recalc_mask (5)
fs
|
|
|
|
15 |
73d |
160d
|
28/28 |
29d |
35ceae44742e
fsnotify: Avoid data race between fsnotify_recalc_mask() and fsnotify_object_watched()
|
general protection fault in dev_map_enqueue (2)
bpf
net
|
C |
error |
done |
336 |
133d |
199d
|
28/28 |
29d |
09d88791c7cd
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
|
kernel BUG in submit_bh_wbc (3)
nilfs
fs
|
C |
done |
|
18 |
51d |
58d
|
28/28 |
29d |
6ed469df0bfb
nilfs2: fix kernel bug due to missing clearing of buffer delay flag
|
KCSAN: data-race in __delete_from_swap_cache / __try_to_reclaim_swap
mm
|
|
|
|
1 |
70d |
70d
|
28/28 |
29d |
818f916e3a07
mm: swap: prevent possible data-race in __try_to_reclaim_swap
|
general protection fault in prt_str
bcachefs
|
C |
done |
|
2 |
71d |
86d
|
28/28 |
29d |
a30f32222df2
bcachefs: Fix NULL pointer dereference in bch2_opt_to_text
|
WARNING in kthread_unpark (2)
wireguard
gfs2
|
syz |
done |
|
35 |
67d |
214d
|
28/28 |
29d |
214e01ad4ed7
kthread: unpark only parked kthread
|
general protection fault in bch2_alloc_read
bcachefs
|
C |
|
|
7 |
69d |
76d
|
28/28 |
29d |
a319aeaebb6c
bcachefs: Fix missing bounds checks in bch2_alloc_read()
|
INFO: task hung in nsim_dev_hwstats_exit
net
|
|
|
|
43 |
29d |
68d
|
28/28 |
29d |
a1494d532e28
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
|
general protection fault in run_is_mapped_full
ntfs3
|
C |
error |
|
72 |
64d |
151d
|
28/28 |
29d |
a33fb016e49e
fs/ntfs3: Fix general protection fault in run_is_mapped_full
|
WARNING: kmalloc bug in wnd_init
ntfs3
|
C |
done |
|
3 |
134d |
280d
|
28/28 |
29d |
c4a8ba334262
fs/ntfs3: Add rough attr alloc_size check
|
KASAN: slab-use-after-free Read in mptcp_pm_nl_rm_addr_or_subflow
mptcp
|
|
|
|
1 |
59d |
58d
|
28/28 |
29d |
7decd1f5904a
mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
|
WARNING: locking bug in try_to_wake_up
kernel
|
C |
error |
|
157 |
29d |
210d
|
28/28 |
29d |
41fd1e94066a
btrfs: wait for fixup workers before stopping cleaner kthread during umount
|
KASAN: slab-out-of-bounds Read in udf_get_filelongad (2)
udf
|
C |
|
|
4 |
85d |
99d
|
28/28 |
29d |
c226964ec786
udf: refactor inode_bmap() to handle error
|
INFO: trying to register non-static key in mark_as_free_ex
ntfs3
|
C |
done |
|
2 |
87d |
99d
|
28/28 |
29d |
d178944db36b
fs/ntfs3: Additional check in ni_clear()
|
UBSAN: shift-out-of-bounds in xfrm_selector_match (2)
net
|
C |
error |
|
10 |
73d |
86d
|
28/28 |
29d |
3f0ab59e6537
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
|
KMSAN: kernel-infoleak in con_font_op (2)
serial
|
|
|
|
8 |
53d |
62d
|
28/28 |
29d |
f956052e00de
vt: prevent kernel-infoleak in con_font_get()
|
WARNING in p9_client_create (2)
v9fs
|
C |
done |
|
26070 |
44d |
80d
|
28/28 |
29d |
79efebae4afc
9p: Avoid creating multiple slab caches with the same name
|
possible deadlock in ppp_do_recv
ppp
|
|
|
|
8 |
64d |
79d
|
28/28 |
29d |
aec7291003df
ppp: do not assume bh is held in ppp_channel_bridge_input()
|
WARNING in xt_cluster_mt (2)
netfilter
|
C |
inconclusive |
|
5 |
71d |
69d
|
28/28 |
29d |
0bfcb7b71e73
netfilter: xtables: avoid NFPROTO_UNSPEC where needed
|
KMSAN: uninit-value in ppp_async_push (4)
ppp
|
C |
|
|
43 |
62d |
63d
|
28/28 |
29d |
40dddd4b8bd0
ppp: fix ppp_async_encode() illegal access
|
KMSAN: uninit-value in netfs_clear_buffer
netfs
|
C |
|
|
46 |
73d |
82d
|
28/28 |
29d |
f6023535b52f
netfs: Fix a KMSAN uninit-value error in netfs_clear_buffer
|
UBSAN: shift-out-of-bounds in bch2_stripe_to_text
bcachefs
|
C |
|
|
3 |
80d |
77d
|
28/28 |
29d |
9f25dbe0bf91
bcachefs: Add missing validation for bch_stripe.csum_granularity_bits
|
BUG: using __this_cpu_write() in preemptible code in nf_dup_ipv4
netfilter
|
|
|
|
1 |
86d |
86d
|
28/28 |
29d |
92ceba94de6f
netfilter: nf_tables: prevent nf_skb_duplicated corruption
|
INFO: task hung in devlink_pernet_pre_exit (2)
net
|
|
|
|
32 |
33d |
52d
|
28/28 |
29d |
a1494d532e28
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
|
UBSAN: shift-out-of-bounds in member_to_text
bcachefs
|
C |
|
|
12 |
56d |
100d
|
28/28 |
29d |
c1bd21bb6518
bcachefs: Fix invalid shift in member_to_text()
|
possible deadlock in rfcomm_sk_state_change
bluetooth
|
C |
done |
|
22650 |
57d |
1185d
|
28/28 |
29d |
08d1914293da
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
|
KCSAN: data-race in virtqueue_disable_cb / vring_interrupt (4)
virt
|
|
|
|
1 |
91d |
90d
|
28/28 |
29d |
83c334ed5216
virtio_ring: tag event_triggered as racy for KCSAN
|
general protection fault in write_all_supers
btrfs
|
C |
|
|
21 |
49d |
92d
|
28/28 |
29d |
3c36a72c1d27
btrfs: reject ro->rw reconfiguration if there are hard ro requirements
|
KMSAN: uninit-value in from_kuid (2)
ocfs2
|
C |
|
|
75 |
51d |
82d
|
28/28 |
29d |
15f343474816
fs: Fix uninitialized value issue in from_kuid and from_kgid
|
KASAN: slab-use-after-free Read in bch2_direct_write
bcachefs
|
|
|
|
11 |
73d |
76d
|
28/28 |
29d |
573ddcdc5607
bcachefs: fix uaf in bch2_dio_write_done()
|
BUG: unable to handle kernel NULL pointer dereference in filemap_read_folio (3)
erofs
|
C |
|
|
492 |
29d |
85d
|
28/28 |
29d |
416a8b2c02fe
erofs: ensure regular inodes for file-backed mounts
|
KMSAN: uninit-value in vfat_rename2
exfat
|
C |
|
|
2 |
72d |
69d
|
28/28 |
29d |
963a7f4d3b90
fat: fix uninitialized variable
|
possible deadlock in ppp_input_error
ppp
|
|
|
|
61 |
69d |
81d
|
28/28 |
29d |
aec7291003df
ppp: do not assume bh is held in ppp_channel_bridge_input()
|
possible deadlock in mi_read
ntfs3
|
C |
error |
|
11141 |
29d |
802d
|
28/28 |
29d |
03b097099eef
fs/ntfs3: Fix possible deadlock in mi_read
|
INFO: task hung in ip_tunnel_init_net (3)
netfilter
|
|
|
|
41 |
30d |
61d
|
28/28 |
29d |
a1494d532e28
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
|
kernel BUG in dma_alloc_attrs
iommu
|
C |
|
|
4 |
52d |
57d
|
28/28 |
29d |
78b2770c935f
dma-mapping: fix tracing dma_alloc/free with vmalloc'd memory
|
INFO: rcu detected stall in br_handle_frame (5)
bridge
|
syz |
|
|
24 |
32d |
60d
|
28/28 |
29d |
a1494d532e28
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
|
general protection fault in sctp_inet_listen
sctp
|
|
|
|
1 |
89d |
75d
|
28/28 |
29d |
8beee4d8dee7
sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
|
BUG: sleeping function called from invalid context in ntfs_d_hash
ntfs3
|
C |
done |
|
740 |
64d |
101d
|
28/28 |
29d |
589996bf8c45
ntfs3: Change to non-blocking allocation in ntfs_d_hash
|
KMSAN: uninit-value in udf_get_fileshortad
udf
|
C |
|
|
3 |
73d |
85d
|
28/28 |
29d |
264db9d666ad
udf: fix uninit-value use in udf_get_fileshortad
|
INFO: trying to register non-static key in ntfs_file_release
ntfs3
|
|
|
|
2 |
57d |
99d
|
28/28 |
29d |
031d6f608290
fs/ntfs3: Additional check in ntfs_file_release
|
KASAN: slab-use-after-free Read in advance_sched
net
|
C |
error |
|
15 |
72d |
359d
|
28/28 |
29d |
f504465970ae
net: sched: fix use-after-free in taprio_change()
|
WARNING in copy_huge_pmd
mm
|
C |
done |
|
361 |
62d |
79d
|
28/28 |
29d |
47fa30118f02
mm/huge_memory: check pmd_special() only after pmd_present()
|
possible deadlock in ntfs_set_state (2)
ntfs3
|
C |
error |
|
943 |
61d |
302d
|
28/28 |
29d |
5b2db723455a
fs/ntfs3: Fix warning possible deadlock in ntfs_set_state
|
KMSAN: uninit-value in slhc_remember
net
|
|
|
|
4 |
64d |
63d
|
28/28 |
29d |
7d3fce8cbe3a
slip: make slhc_remember() more robust against malicious packets
|
KASAN: slab-use-after-free Read in l2cap_connect (2)
bluetooth
|
C |
done |
|
8 |
81d |
170d
|
28/28 |
29d |
333b4fd11e89
Bluetooth: L2CAP: Fix uaf in l2cap_connect
|
KASAN: stack-out-of-bounds Read in profile_pc
kernel
|
C |
error |
done |
9302 |
165d |
1290d
|
28/28 |
41d |
093d9603b600
x86: stop playing stack games in profile_pc()
|
INFO: task hung in ext4_stop_mmpd
ext4
|
C |
done |
done |
483 |
82d |
154d
|
28/28 |
44d |
d3476f3dad4a
ext4: don't set SB_RDONLY after filesystem errors
|
WARNING in io_sq_offload_create
io-uring
|
C |
|
|
284 |
78d |
82d
|
28/28 |
44d |
a09c17240bdf
io_uring/sqpoll: retain test for whether the CPU is valid
|
riscv/fixes test error: kernel panic: Kernel stack overflow
riscv
|
|
|
|
11 |
69d |
87d
|
28/28 |
45d |
cfb10de18538
riscv: Fix kernel stack size when KASAN is enabled
|
general protection fault in ethnl_phy_doit
net
|
C |
done |
|
6 |
91d |
92d
|
28/28 |
47d |
fce1e9f86af1
net: ethtool: phy: Check the req_info.pdn field for GET commands
|
WARNING in __bch2_fsck_err (2)
bcachefs
|
C |
|
|
3 |
69d |
65d
|
28/28 |
48d |
5612daafb764
bcachefs: Fix fsck warnings from bkey validation
|
WARNING in fuse_request_end (2)
fuse
|
|
|
|
677 |
78d |
74d
|
28/28 |
48d |
fcd2d9e1fdcd
fuse: clear FR_PENDING if abort is detected when sending request
|
general protection fault in rt6_disable_ip
net
|
|
|
|
1 |
90d |
90d
|
28/28 |
48d |
04ccecfa959d
UPSTREAM: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
|
WARNING in gid_table_release_one (2)
rdma
|
|
|
|
1 |
105d |
101d
|
28/28 |
49d |
1403c8b14765
IB/core: Fix ib_cache_setup_one error flow cleanup
|
KASAN: use-after-free Read in ila_nf_input (2)
net
|
|
|
|
14 |
54d |
102d
|
28/28 |
50d |
031ae72825ce
ila: call nf_unregister_net_hooks() sooner
|
BUG: unable to handle kernel NULL pointer dereference in attr_make_nonresident
ntfs3
|
C |
error |
done |
110 |
142d |
224d
|
28/28 |
50d |
0f9579d9e033
fs/ntfs3: Add missing .dirty_folio in address_space_operations
|
UBSAN: array-index-out-of-bounds in dbNextAG (2)
jfs
|
C |
inconclusive |
|
53 |
83d |
153d
|
28/28 |
50d |
e63866a47556
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
|
WARNING in kcov_remote_start (5)
wireless
|
|
|
|
4243 |
50d |
150d
|
28/28 |
50d |
7d4df2dad312
kcov: properly check for softirq context
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
kernel BUG in __page_table_check_zero
usb
|
C |
error |
done |
213 |
83d |
570d
|
28/28 |
50d |
79a61cc3fc04
mm: avoid leaving partial pfn mappings around in error case
|
WARNING: still has locks held in f2fs_ioc_start_atomic_write
f2fs
|
|
|
|
1 |
121d |
117d
|
28/28 |
50d |
b2c160f4f3cf
f2fs: atomic: fix to forbid dio in atomic_file
|
WARNING: lock held when returning to user space in f2fs_ioc_start_atomic_write
f2fs
|
C |
done |
|
34 |
118d |
119d
|
28/28 |
50d |
b2c160f4f3cf
f2fs: atomic: fix to forbid dio in atomic_file
|
general protection fault in ovl_llseek
overlayfs
|
C |
|
|
5 |
76d |
76d
|
28/28 |
50d |
0c33037c825e
ovl: fix file leak in ovl_real_fdget_meta()
|
riscv/fixes test error: can't ssh into the instance
|
|
|
|
48 |
99d |
117d
|
28/28 |
50d |
1ff95eb2bebd
riscv: Fix RISCV_ALTERNATIVE_EARLY
|
WARNING in pppol2tp_release
net
|
|
|
|
3 |
125d |
128d
|
28/28 |
50d |
c1b2e36b8776
l2tp: flush workqueue before draining it
|
KMSAN: uninit-value in nf_reject_ip6_tcphdr_put
netfilter
|
C |
|
|
136 |
76d |
89d
|
28/28 |
50d |
9c778fe48d20
UPSTREAM: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
|
WARNING in remove_proc_entry (6)
can
|
C |
done |
|
377 |
69d |
98d
|
28/28 |
50d |
94b0818fa635
can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().
|
kernel BUG in btrfs_get_ordered_extents_for_logging
btrfs
|
syz |
|
|
3 |
107d |
104d
|
28/28 |
50d |
cd9253c23aed
btrfs: fix race between direct IO write and fsync when using same fd
|
kernel BUG in clear_inode
btrfs
|
C |
|
|
12 |
52d |
194d
|
28/28 |
50d |
88b1afbf0f6b
vfs: fix race between evice_inodes() and find_inode()&iput()
|
general protection fault in nilfs_btree_insert (2)
nilfs
|
C |
inconclusive |
|
1 |
91d |
101d
|
28/28 |
50d |
9403001ad65a
nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()
|
general protection fault in bch2_fs_recovery
bcachefs
|
C |
|
|
10 |
73d |
92d
|
28/28 |
50d |
025c55a4c7f1
bcachefs: return err ptr instead of null in read sb clean
|
memory leak in clear_state_bit
btrfs
|
C |
|
|
3 |
372d |
384d
|
28/28 |
50d |
c346c629765a
btrfs: qgroup: don't use extent changeset when not needed
|
WARNING in rcu_sync_dtor
f2fs
|
C |
done |
|
749 |
74d |
138d
|
28/28 |
50d |
930c6ab93492
f2fs: fix to don't set SB_RDONLY in f2fs_handle_critical_error()
|
KASAN: null-ptr-deref Write in jbd2_journal_update_sb_log_tail
ext4
|
C |
|
|
4 |
77d |
114d
|
28/28 |
50d |
5784d9fcfd43
ocfs2: fix null-ptr-deref when journal load failed.
|
KASAN: slab-use-after-free Read in __uprobe_unregister
perf
trace
|
C |
|
|
9 |
85d |
123d
|
28/28 |
50d |
5fe6e308abae
bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()
|
KASAN: use-after-free Read in ext4_search_dir (2)
ext4
|
C |
|
|
5 |
91d |
114d
|
28/28 |
50d |
c6b72f5d82b1
ext4: avoid OOB when system.data xattr changes underneath the filesystem
|
WARNING: refcount bug in ethnl_phy_done
net
|
C |
done |
|
4 |
92d |
91d
|
28/28 |
50d |
1ad84a151af7
net: ethtool: phy: Don't set the context dev pointer for unfiltered DUMP
|
WARNING: bad unlock balance in ocfs2_read_blocks
ocfs2
|
C |
|
|
240 |
83d |
115d
|
28/28 |
50d |
c03a82b4a0c9
ocfs2: remove unreasonable unlock in ocfs2_read_blocks
|
kernel BUG in f2fs_evict_inode (3)
f2fs
|
C |
error |
|
33 |
68d |
115d
|
28/28 |
50d |
884ee6dc85b9
f2fs: get rid of online repaire on corrupted directory
|
kernel BUG in trace_dma_unmap_sg
iommu
|
C |
|
|
5 |
74d |
77d
|
28/28 |
50d |
bfc4a245a794
dma-mapping: fix DMA API tracing for chained scatterlists
|
INFO: rcu detected stall in schedule_timeout (6)
usb
|
C |
done |
|
40 |
52d |
209d
|
28/28 |
50d |
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
general protection fault in is_page_fault_stale
kvm
|
|
|
|
3 |
118d |
142d
|
28/28 |
50d |
28cec7f08b8b
KVM: x86/mmu: Check that root is valid/loaded when pre-faulting SPTEs
|
general protection fault in __smc_diag_dump (2)
net
s390
|
|
|
|
14 |
51d |
104d
|
28/28 |
50d |
98d4435efcbf
net/smc: prevent NULL pointer dereference in txopt_get
|
divide error in ext4_mb_regular_allocator
ext4
|
C |
done |
|
2 |
110d |
120d
|
28/28 |
50d |
ee85e0938aa8
ext4: check stripe size compatibility on remount as well
|
linux-next test error: WARNING in rcu_core
net
virt
|
|
|
|
16 |
124d |
131d
|
28/28 |
50d |
b8c8ba73c68b
slub: Introduce CONFIG_SLUB_RCU_DEBUG
|
WARNING in __rate_control_send_low (2)
wireless
|
C |
done |
|
3233 |
50d |
202d
|
28/28 |
50d |
e7a7ef9a0742
wifi: mac80211: don't use rate mask for offchannel TX either
|
WARNING in l2tp_udp_encap_destroy
net
|
|
|
|
3 |
124d |
123d
|
28/28 |
50d |
c1b2e36b8776
l2tp: flush workqueue before draining it
|
kernel BUG in __sock_sendmsg
net
|
C |
|
|
111 |
99d |
116d
|
28/28 |
50d |
fe1910f9337b
tcp_bpf: fix return value of tcp_bpf_sendmsg()
|
kernel BUG in vfs_get_tree
bcachefs
|
C |
done |
|
318 |
68d |
112d
|
28/28 |
50d |
b29c30ab48e0
bcachefs: Fix incorrect IS_ERR_OR_NULL usage
|
general protection fault in ata_msense_control
ide
|
C |
|
|
13 |
75d |
82d
|
28/28 |
50d |
03a9cfc1314b
ata: libata-scsi: Fix ata_msense_control_spgt2()
|
KASAN: slab-use-after-free Read in __timer_delete_sync
mptcp
|
syz |
error |
|
1 |
102d |
99d
|
28/28 |
50d |
b4cd80b03389
mptcp: pm: Fix uaf in __timer_delete_sync
|
UBSAN: array-index-out-of-bounds in dbSplit
jfs
|
C |
inconclusive |
|
31 |
90d |
138d
|
28/28 |
50d |
d64ff0d23067
jfs: check if leafidx greater than num leaves per dmap tree
|
UBSAN: shift-out-of-bounds in dbFindBits
jfs
|
C |
error |
|
53 |
53d |
156d
|
28/28 |
50d |
b0b2fc815e51
jfs: UBSAN: shift-out-of-bounds in dbFindBits
|
KMSAN: uninit-value in lzo1x_1_do_compress (3)
mm
|
|
|
|
1 |
108d |
104d
|
28/28 |
50d |
2b59ffad47db
jfs: Fix uninit-value access of new_ea in ea_buffer
|
KASAN: use-after-free Read in rtw_load_firmware_cb
usb
wireless
|
C |
|
|
848 |
76d |
139d
|
28/28 |
50d |
0e735a4c6137
wifi: rtw88: always wait for both firmware loading attempts
|
INFO: rcu detected stall in aoecmd_cfg (2)
usb
block
|
C |
done |
|
7 |
104d |
217d
|
28/28 |
50d |
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
KCSAN: data-race in next_expiry_recalc / update_process_times (2)
kernel
|
|
|
|
2 |
105d |
120d
|
28/28 |
50d |
79f8b28e85f8
timers: Annotate possible non critical data race of next_expiry
|
KMSAN: uninit-value in bch2_bkey_cmp_packed_inlined
bcachefs
|
C |
|
|
7 |
73d |
93d
|
28/28 |
50d |
0696a18a8cc3
bcachefs: memset bounce buffer portion to 0 after key_sort_fix_overlapping
|
WARNING in mptcp_pm_nl_set_flags
mptcp
|
syz |
done |
|
3 |
107d |
107d
|
28/28 |
50d |
9366922adc6a
mptcp: pm: fix ID 0 endp usage after multiple re-creations
|
INFO: rcu detected stall in do_vmi_munmap (2)
mm
|
|
|
|
40 |
97d |
114d
|
28/28 |
50d |
f806de88d8f7
maple_tree: remove rcu_read_lock() from mt_validate()
|
INFO: task hung in z_erofs_runqueue
erofs
|
C |
|
|
379 |
68d |
137d
|
28/28 |
50d |
9e2f9d34dd12
erofs: handle overlapped pclusters out of crafted images properly
|
WARNING in handle_std_frame
net
|
|
|
|
3 |
96d |
99d
|
28/28 |
50d |
430d67bdcb04
net: hsr: Use the seqnr lock for frames received via interlink port.
|
KASAN: slab-use-after-free Read in hugetlb_fault (2)
mm
|
|
|
|
2 |
90d |
94d
|
28/28 |
50d |
98b74bb4d7e9
mm/hugetlb.c: fix UAF of vma in hugetlb fault pathway
2a058ab3286d
mm: change vmf_anon_prepare() to __vmf_anon_prepare()
|
possible deadlock in ocfs2_get_system_file_inode
ocfs2
|
C |
done |
|
14785 |
68d |
118d
|
28/28 |
50d |
7bf1823e010e
ocfs2: fix deadlock in ocfs2_get_system_file_inode
|
WARNING: ODEBUG bug in ocfs2_local_read_info
ocfs2
|
C |
inconclusive |
|
7 |
68d |
100d
|
28/28 |
50d |
35fccce29feb
ocfs2: cancel dqi_sync_work before freeing oinfo
|
UBSAN: array-index-out-of-bounds in cake_enqueue
net
|
|
|
|
1 |
115d |
114d
|
28/28 |
50d |
546ea84d07e3
sched: sch_cake: fix bulk flow accounting logic for host fairness
|
KASAN: slab-use-after-free Read in dbFreeBits
jfs
|
C |
done |
|
6 |
87d |
117d
|
28/28 |
50d |
d6c1b3599b2f
jfs: Fix uaf in dbFreeBits
|
KMSAN: uninit-value in skb_trim (2)
wireless
|
|
|
|
5 |
93d |
123d
|
28/28 |
50d |
94745807f3eb
wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
|
KCSAN: data-race in mem_cgroup_iter / mem_cgroup_iter
cgroups
mm
|
|
|
|
59 |
82d |
103d
|
28/28 |
50d |
ec0db74b4b1f
mm: restart if multiple traversals raced
|
WARNING in __dev_queue_xmit (4)
net
|
C |
|
|
387 |
52d |
98d
|
28/28 |
50d |
9d301de12da6
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
|
BUG: corrupted list in gfs2_fill_super
gfs2
|
C |
done |
|
8527 |
77d |
192d
|
28/28 |
50d |
6cb9df81a2c4
gfs2: fix double destroy_workqueue error
|
WARNING in hsr_fill_frame_info
net
|
C |
error |
|
80 |
75d |
104d
|
28/28 |
50d |
430d67bdcb04
net: hsr: Use the seqnr lock for frames received via interlink port.
|
KMSAN: uninit-value in ocfs2_get_block
ocfs2
|
C |
|
|
5 |
81d |
78d
|
28/28 |
50d |
2af148ef8549
ocfs2: fix uninit-value in ocfs2_get_block()
|
memory leak in corrupted (2)
mm
exfat
|
syz |
|
|
432 |
88d |
254d
|
28/28 |
50d |
c290fe508eee
exfat: resolve memory leak from exfat_create_upcase_table()
|
general protection fault in hook_inode_free_security
lsm
|
|
|
|
12 |
150d |
217d
|
28/28 |
50d |
63dff3e48871
lsm: add the inode_free_security_rcu() LSM implementation hook
|
KMSAN: kernel-infoleak in raw_ioctl (2)
usb
|
C |
|
|
18201 |
75d |
141d
|
28/28 |
50d |
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
WARNING in vmx_handle_exit
kvm
|
C |
error |
|
5 |
80d |
253d
|
28/28 |
50d |
3f6821aa147b
KVM: x86: Forcibly leave nested if RSM to L2 hits shutdown
|
WARNING in fscrypt_fname_siphash
ext4
fscrypt
|
C |
unreliable |
|
32 |
102d |
196d
|
28/28 |
50d |
985b67cd8639
ext4: filesystems without casefold feature cannot be mounted with siphash
|
kernel BUG in new_curseg
f2fs
|
C |
|
|
8 |
81d |
93d
|
28/28 |
50d |
65a6ce4726c2
f2fs: fix to don't panic system for no free segment fault injection
|
BUG: unable to handle kernel NULL pointer dereference in fbcon_putcs (3)
fbdev
btrfs
|
C |
|
|
4 |
79d |
92d
|
28/28 |
50d |
5b97eebcce1b
fbcon: Fix a NULL pointer dereference issue in fbcon_putcs
|
general protection fault in hsr_proxy_announce
net
|
|
|
|
2 |
98d |
96d
|
28/28 |
50d |
a7789fd4caaf
net: hsr: prevent NULL pointer dereference in hsr_proxy_announce()
|
general protection fault in smack_log_callback
audit
|
C |
done |
|
12 |
78d |
83d
|
28/28 |
50d |
8a23c9e1ba46
selinux,smack: properly reference the LSM blob in security_watch_key()
|
WARNING in sock_map_close (2)
bpf
net
|
C |
done |
|
3 |
111d |
111d
|
28/28 |
50d |
1461f5a3d810
l2tp: avoid overriding sk->sk_user_data
|
WARNING in bond_xdp_get_xmit_slave (2)
net
|
|
|
|
124 |
84d |
184d
|
28/28 |
50d |
0cbfd45fbcf0
bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()
|
KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open
selinux
|
|
|
|
1 |
110d |
110d
|
28/28 |
50d |
2571bb9d553b
selinux: annotate false positive data race to avoid KCSAN warnings
|
KASAN: null-ptr-deref Write in f2fs_stop_gc_thread
f2fs
|
C |
done |
|
5 |
93d |
140d
|
28/28 |
50d |
c7f114d864ac
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
|
KMSAN: kernel-usb-infoleak in usbtmc_write
usb
|
C |
|
|
167 |
75d |
139d
|
28/28 |
50d |
625fa77151f0
USB: usbtmc: prevent kernel-usb-infoleak
|
INFO: task hung in uevent_show
usb
|
C |
done |
|
9704 |
121d |
182d
|
28/28 |
50d |
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
WARNING: suspicious RCU usage in bch2_snapshot_tree_oldest_subvol
bcachefs
|
C |
|
|
21 |
73d |
85d
|
28/28 |
50d |
39c3aad43f6f
bcachefs: Hold read lock in bch2_snapshot_tree_oldest_subvol()
|
general protection fault in __copy_super
bcachefs
|
C |
done |
|
5 |
79d |
81d
|
28/28 |
50d |
40d40c6bea19
bcachefs: assign return error when iterating through layout
|
KASAN: slab-use-after-free Read in unix_stream_read_actor (2)
net
|
C |
inconclusive |
|
4 |
103d |
98d
|
28/28 |
50d |
5aa57d9f2d53
af_unix: Don't return OOB skb in manage_oob().
|
KASAN: slab-use-after-free Read in lockref_get_not_dead (2)
fs
|
syz |
error |
|
1 |
100d |
96d
|
28/28 |
50d |
4e32c25b58b9
libfs: fix get_stashed_dentry()
|
INFO: rcu detected stall in sys_io_uring_enter (2)
io-uring
|
|
|
|
37 |
62d |
82d
|
28/28 |
50d |
eac2ca2d682f
io_uring: check if we need to reschedule during overflow flush
|
UBSAN: shift-out-of-bounds in ocfs2_fill_super
ocfs2
|
C |
|
|
199 |
51d |
118d
|
28/28 |
50d |
7f86b2942791
ocfs2: fix shift-out-of-bounds UBSAN bug in ocfs2_verify_volume()
|
WARNING: lock held when returning to user space in ethnl_act_cable_test
net
|
C |
done |
|
43 |
106d |
107d
|
28/28 |
50d |
3d6a0c4f4552
net: fix unreleased lock in cable test
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (3)
bpf
net
|
C |
done |
|
6 |
151d |
151d
|
28/28 |
50d |
92de36080c93
bpf: Fail verification for sign-extension of packet data/data_end/data_meta
|
WARNING in iopt_map_pages
iommu
|
C |
error |
|
3 |
104d |
185d
|
28/28 |
50d |
8f6887349b2f
iommufd: Protect against overflow of ALIGN() during iova allocation
|
KASAN: slab-use-after-free Read in btrfs_cleanup_defrag_inodes
btrfs
|
C |
|
|
266 |
80d |
86d
|
28/28 |
50d |
7f1b63f981b8
btrfs: fix use-after-free on rbtree that tracks inodes for auto defrag
|
WARNING in ethnl_req_get_phydev
net
|
C |
done |
|
73 |
106d |
107d
|
28/28 |
50d |
cff69f72d333
ethtool: pse-pd: move pse validation into set
|
linux-next test error: general protection fault in fuse_get_req
fuse
|
|
|
|
17 |
79d |
90d
|
28/28 |
50d |
3988a60d3aaa
fs/fuse: fix null-ptr-deref when checking SB_I_NOIDMAP flag
|
possible deadlock in hfsplus_file_extend
hfs
|
C |
error |
done |
31659 |
58d |
746d
|
28/28 |
51d |
be4edd1642ee
hfsplus: fix to avoid false alarm of circular locking
|
WARNING: ODEBUG bug in ext4_fill_super (4)
ext4
|
C |
|
|
6 |
81d |
174d
|
28/28 |
51d |
0ce160c5bdb6
ext4: fix timer use-after-free on failed mount
|
WARNING in ext4_fileattr_get
ext4
|
|
|
|
120 |
162d |
176d
|
28/28 |
51d |
be27cd64461c
ext4: use memtostr_pad() for s_volume_name
|
WARNING in input_mt_init_slots
input
|
C |
inconclusive |
|
14301 |
121d |
1431d
|
28/28 |
51d |
99d3bf5f7377
Input: MT - limit max slots
206f533a0a7c
Input: uinput - reject requests with unreasonable number of slots
|
INFO: rcu detected stall in neigh_timer_handler (8)
net
|
C |
done |
done |
72 |
122d |
182d
|
28/28 |
51d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
INFO: rcu detected stall in __mod_timer (5)
usb
|
C |
error |
done |
10 |
128d |
192d
|
28/28 |
51d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
KASAN: slab-use-after-free Read in ip6_send_skb
netfilter
|
|
|
|
1 |
116d |
116d
|
28/28 |
63d |
faa389b2fbaa
ipv6: prevent UAF in ip6_send_skb()
|
KMSAN: uninit-value in gtp_dev_xmit
net
|
|
|
|
3 |
134d |
134d
|
28/28 |
63d |
3a3be7ff9224
gtp: pull network headers in gtp_dev_xmit()
|
possible deadlock in touch_wq_lockdep_map
usb
|
C |
|
|
1208 |
74d |
270d
|
28/28 |
69d |
ccbde4b128ef
char: xillybus: Don't destroy workqueue from work item running on it
|
kernel BUG in bch2_lru_change (2)
bcachefs
|
C |
|
|
2 |
118d |
117d
|
28/28 |
69d |
9482f3b05332
bcachefs: avoid overflowing LRU_TIME_BITS for cached data lru
|
WARNING in bch2_fs_journal_stop
bcachefs
|
C |
done |
|
1463 |
116d |
147d
|
28/28 |
69d |
7f2de6947f92
bcachefs: Fix warning in bch2_fs_journal_stop()
|
BUG: workqueue leaked atomic, lock or RCU: kworker/u33:NUM[NUM]
bluetooth
|
C |
|
|
13 |
125d |
138d
|
28/28 |
69d |
c531e63871c0
Bluetooth: l2cap: always unlock channel in l2cap_conless_channel()
|
general protection fault in reuseport_add_sock (3)
net
|
C |
done |
|
3 |
136d |
135d
|
28/28 |
69d |
9ab0faa7f9ff
sctp: Fix null-ptr-deref in reuseport_add_sock().
|
KMSAN: uninit-value in line6_midibuf_read
usb
sound
|
C |
|
|
357 |
78d |
141d
|
28/28 |
69d |
15b7a03205b3
ALSA: line6: Fix racy access to midibuf
|
kernel BUG in bch2_journal_replay
bcachefs
|
C |
done |
|
3 |
112d |
184d
|
28/28 |
69d |
cab18be6957b
bcachefs: Fix replay_now_at() assert
|
WARNING in bch2_write_super
bcachefs
|
|
|
|
3 |
116d |
113d
|
28/28 |
69d |
6575b8c9877c
bcachefs: Fix locking in bch2_ioc_setlabel()
|
BUG: stack guard page was hit in vsock_bpf_recvmsg
net
virt
|
C |
done |
|
6 |
124d |
124d
|
28/28 |
69d |
69139d2919dd
vsock: fix recursive ->recvmsg calls
|
general protection fault in z_erofs_gbuf_growsize
erofs
|
|
|
|
1 |
118d |
113d
|
28/28 |
69d |
0005e01e1e87
erofs: fix out-of-bound access when z_erofs_gbuf_growsize() partially fails
|
KMSAN: uninit-value in bch2_alloc_v4_validate
bcachefs
|
C |
|
|
5 |
113d |
111d
|
28/28 |
69d |
8ed823b19214
bcachefs: Fix compat issue with old alloc_v4 keys
|
KMSAN: uninit-value in pick_link
squashfs
|
C |
|
|
9 |
129d |
133d
|
28/28 |
69d |
810ee43d9cd2
Squashfs: sanity check symbolic link size
|
KMSAN: uninit-value in nf_flow_offload_inet_hook
netfilter
|
|
|
|
4 |
114d |
124d
|
28/28 |
69d |
6ea14ccb60c8
netfilter: flowtable: validate vlan header
|
KASAN: slab-use-after-free Read in br_multicast_port_group_expired
bridge
|
|
|
|
1 |
168d |
167d
|
28/28 |
69d |
92c4ee25208d
net: bridge: mcast: wait for previous gc cycles when removing port
|
WARNING in kvm_recalculate_apic_map
kvm
|
C |
done |
|
23 |
120d |
156d
|
28/28 |
69d |
4b7c3f6d04bd
KVM: x86: Make x2APIC ID 100% readonly
|
KASAN: slab-use-after-free Read in percpu_ref_put
block
|
|
|
|
18 |
70d |
141d
|
28/28 |
69d |
0b50b7313ef2
bcachefs: Fix refcounting in discard path
|
KCSAN: data-race in __flush_work / __flush_work (2)
kernel
|
|
|
|
6 |
115d |
128d
|
28/28 |
69d |
8bc35475ef1a
workqueue: Fix spruious data race in __flush_work()
|
BUG: unable to handle kernel paging request in net_generic
net
|
|
|
|
1 |
144d |
139d
|
28/28 |
69d |
86a41ea9fd79
l2tp: fix lockdep splat
|
WARNING: refcount bug in inet_twsk_kill
net
|
|
|
|
5 |
123d |
123d
|
28/28 |
69d |
565d121b6998
tcp: prevent concurrent execution of tcp_sk_exit_batch
|
WARNING in try_queue_bulk_in/usb_submit_urb
kernel
|
|
|
|
1 |
125d |
121d
|
28/28 |
69d |
2374bf7558de
char: xillybus: Check USB endpoints when probing device
|
WARNING in __bch2_fsck_err
bcachefs
|
C |
|
|
200 |
70d |
117d
|
28/28 |
69d |
075cabf324c3
bcachefs: Fix forgetting to pass trans to fsck_err()
|
possible deadlock in __kernfs_remove
kernfs
|
C |
|
|
438 |
127d |
170d
|
28/28 |
69d |
15fffc6a5624
driver core: Fix uevent_show() vs driver detach race
|
KASAN: slab-use-after-free Read in kcm_release
net
|
C |
|
|
2 |
178d |
218d
|
28/28 |
69d |
807067bf014d
kcm: Serialise kcm_sendmsg() for the same socket.
|
KCSAN: data-race in io_sq_thread / io_sq_thread_park (9)
io-uring
|
|
|
|
1 |
125d |
120d
|
28/28 |
69d |
e4956dc7a84d
io_uring/sqpoll: annotate debug task == current with data_race()
|
KASAN: slab-out-of-bounds Write in bch2_dev_journal_init
bcachefs
|
C |
|
|
2 |
115d |
115d
|
28/28 |
69d |
bdbdd4759f08
bcachefs: Fix missing validation in bch2_sb_journal_v2_validate()
|
kernel BUG in binder_inc_ref_for_node
kernel
|
C |
error |
|
16721 |
122d |
151d
|
28/28 |
69d |
11512c197d38
binder: fix descriptor lookup for context manager
|
WARNING in tcp_sk_exit_batch
net
|
|
|
|
3 |
119d |
157d
|
28/28 |
69d |
565d121b6998
tcp: prevent concurrent execution of tcp_sk_exit_batch
|
WARNING in skb_warn_bad_offload (5)
net
|
C |
done |
|
18 |
115d |
149d
|
28/28 |
69d |
30b03f2a0592
udp: Fall back to software USO if IPv6 extension headers are present
|
KASAN: slab-out-of-bounds Read in cougar_report_fixup
input
usb
|
C |
|
|
31 |
100d |
134d
|
28/28 |
69d |
a6e9c391d45b
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
|
WARNING: bad unlock balance in btrfs_direct_write
btrfs
|
C |
done |
|
235 |
126d |
131d
|
28/28 |
69d |
e0391e92f9ab
btrfs: fix double inode unlock for direct IO sync writes
|
WARNING in discard_new_inode
bcachefs
|
C |
|
|
3 |
117d |
117d
|
28/28 |
69d |
99c87fe0f584
bcachefs: fix incorrect i_state usage
|
KASAN: slab-use-after-free Read in htab_map_alloc (2)
bpf
|
|
|
|
224 |
215d |
221d
|
27/28 |
90d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
kernel BUG in bch2_sort_keys
bcachefs
|
C |
error |
|
3 |
196d |
220d
|
27/28 |
96d |
5dfd3746b6c4
bcachefs: Fix needs_whiteout BUG_ON() in bkey_sort()
|
WARNING in __virt_to_phys (5)
bcachefs
|
|
|
|
4 |
120d |
116d
|
27/28 |
104d |
9bd01500e4d8
bcachefs: Fix freeing of error pointers
|
possible deadlock in bch2_btree_roots_to_journal_entries
bcachefs
|
C |
done |
|
29 |
157d |
191d
|
27/28 |
104d |
1841027c7de4
bcachefs: bch2_gc_btree() should not use btree_root_lock
|
possible deadlock in bch2_gc_mark_key
bcachefs
|
C |
done |
|
86 |
121d |
198d
|
27/28 |
104d |
1841027c7de4
bcachefs: bch2_gc_btree() should not use btree_root_lock
|
possible deadlock in __mmap_lock_do_trace_start_locking
mm
|
C |
done |
done |
30 |
136d |
230d
|
27/28 |
105d |
7d6be67cfdd4
mm: mmap_lock: replace get_memcg_path_buf() with on-stack buffer
|
BUG: unable to handle kernel paging request in list_lru_add
mm
|
C |
done |
done |
11367 |
152d |
464d
|
27/28 |
105d |
aacd897d4d75
Revert "bcachefs: Mark bch_inode_info as SLAB_ACCOUNT"
|
WARNING in __replicas_deltas_realloc
bcachefs
|
C |
|
|
9 |
124d |
147d
|
27/28 |
106d |
1d16c605cc55
bcachefs: Disk space accounting rewrite
|
kernel BUG in bch2_bucket_alloc_freelist
bcachefs
|
|
|
|
1 |
175d |
171d
|
27/28 |
106d |
44ec5990357b
bcachefs: Don't use the new_fs() bucket alloc path on an initialized fs
|
kernel BUG in bch2_fs_journal_stop
bcachefs
|
C |
done |
|
4370 |
120d |
212d
|
27/28 |
106d |
600b8be5e747
bcachefs: Change bch2_fs_journal_stop() BUG_ON() to warning
|
kernel BUG in __replicas_entry_idx
bcachefs
|
C |
done |
unreliable |
3 |
202d |
205d
|
27/28 |
106d |
8bb8d683a401
bcachefs: Delete journal-buf-sharded old style accounting
|
WARNING in bch2_fs_usage_read_one
bcachefs
|
C |
done |
|
18 |
218d |
218d
|
27/28 |
106d |
8bb8d683a401
bcachefs: Delete journal-buf-sharded old style accounting
|
kernel BUG in bch2_fs_release (2)
bcachefs
|
|
|
|
1 |
171d |
167d
|
27/28 |
107d |
759b2e800f16
bcachefs: Switch online_reserved shutdown assert to WARN()
|
WARNING: refcount bug in get_taint
net
|
|
|
|
2 |
107d |
133d
|
27/28 |
107d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
WARNING: refcount bug in sk_common_release
net
|
C |
|
|
9 |
132d |
147d
|
27/28 |
107d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
WARNING: refcount bug in inet_create
net
|
C |
done |
|
10 |
134d |
161d
|
27/28 |
107d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
kernel panic: not locked: inodes NUM:NUM:NUM cached
bcachefs
|
C |
|
|
2 |
190d |
201d
|
27/28 |
107d |
385f0c05d670
bcachefs: kill key cache arg to bch2_assert_pos_locked()
|
BUG: MAX_LOCK_DEPTH too low! (4)
bcachefs
|
C |
error |
|
1364 |
121d |
217d
|
27/28 |
108d |
375476c41405
bcachefs: Add lockdep support for btree node locks
|
WARNING in bch2_fs_ioctl
bcachefs
|
C |
done |
|
36 |
121d |
183d
|
27/28 |
111d |
d293ece10810
bcachefs: Fix shutdown ordering
|
KASAN: global-out-of-bounds Read in srcu_gp_start_if_needed
bcachefs
|
|
|
|
1 |
203d |
198d
|
27/28 |
111d |
d293ece10810
bcachefs: Fix shutdown ordering
|
kernel panic: bch_dev->ref underflow, last put: bch2_get_next_dev
bcachefs
|
C |
done |
|
21 |
201d |
211d
|
27/28 |
111d |
9667214b30ef
bcachefs: Fix ref in trans_mark_dev_sbs() error path
|
KASAN: wild-memory-access Read in __timer_delete_sync
bcachefs
|
|
|
|
5 |
131d |
198d
|
27/28 |
111d |
d293ece10810
bcachefs: Fix shutdown ordering
|
kernel BUG in btrfs_folio_end_all_writers
btrfs
|
C |
done |
|
102 |
130d |
142d
|
27/28 |
111d |
478574370bef
btrfs: make cow_file_range_inline() honor locked_page on error
|
KMSAN: uninit-value in profile_hits (3)
kernel
|
C |
|
|
1529 |
137d |
351d
|
27/28 |
111d |
7c51f7bbf057
profiling: remove prof_cpu_mask
|
KASAN: stack-out-of-bounds Read in xdp_do_check_flushed
bpf
net
|
C |
done |
|
127 |
131d |
152d
|
27/28 |
111d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KMSAN: uninit-value in io_req_task_work_add_remote
io-uring
|
C |
|
|
10 |
139d |
140d
|
27/28 |
111d |
0db4618e8fab
io_uring/msg_ring: fix uninitialized use of target_req->flags
|
general protection fault in __dev_flush
net
bpf
|
C |
|
|
35 |
132d |
146d
|
27/28 |
111d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KMSAN: uninit-value in cfg80211_inform_bss_frame_data
wireless
|
|
|
|
6 |
132d |
140d
|
27/28 |
111d |
6873cc441607
wifi: cfg80211: correct S1G beacon length calculation
|
KMSAN: uninit-value in tcf_ct_flow_table_get
net
|
C |
|
|
603 |
132d |
139d
|
27/28 |
111d |
2191a54f6322
sched: act_ct: take care of padding in struct zones_ht_key
|
general protection fault in bq_flush_to_queue
bpf
net
|
|
|
|
22 |
132d |
141d
|
27/28 |
111d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KASAN: slab-use-after-free Read in bq_xmit_all
bpf
net
|
C |
done |
|
29 |
132d |
145d
|
27/28 |
111d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
kernel BUG in nilfs_btnode_create_block (2)
nilfs
|
|
|
|
1 |
183d |
179d
|
27/28 |
111d |
4811f7af6090
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
|
general protection fault in __xsk_map_flush
bpf
net
|
C |
done |
|
26 |
132d |
149d
|
27/28 |
111d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __cpu_map_flush
bpf
net
|
C |
inconclusive |
|
25 |
132d |
146d
|
27/28 |
111d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
kernel BUG in ext4_write_inline_data
ext4
|
C |
error |
|
36 |
150d |
636d
|
27/28 |
112d |
5c099c4fdc43
ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
|
kernel BUG in f2fs_vm_page_mkwrite
f2fs
|
C |
error |
done |
12 |
161d |
188d
|
27/28 |
112d |
a8eb3de28e7a
f2fs: fix return value of f2fs_convert_inline_inode()
|
possible deadlock in __mmap_lock_do_trace_released
mm
|
C |
done |
done |
5 |
145d |
162d
|
27/28 |
114d |
7d6be67cfdd4
mm: mmap_lock: replace get_memcg_path_buf() with on-stack buffer
|
WARNING in __hci_cmd_sync_sk
bluetooth
|
syz |
|
|
36 |
140d |
155d
|
27/28 |
116d |
f1a8f402f13f
Bluetooth: L2CAP: Fix deadlock
|
WARNING in __btrfs_free_extent (2)
btrfs
|
C |
done |
|
118 |
120d |
171d
|
27/28 |
117d |
a776bf5f3c23
btrfs: slightly loosen the requirement for qgroup removal
|
divide error in tcp_rcv_space_adjust (3)
net
|
C |
done |
|
3 |
224d |
225d
|
27/28 |
119d |
94062790aedb
UPSTREAM: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
|
KASAN: slab-use-after-free Read in lru_add_fn
nilfs
mm
|
C |
inconclusive |
|
68 |
168d |
216d
|
27/28 |
119d |
49ae997f8f0d
nilfs2: add missing check for inode numbers on directory entries
nilfs2: add missing check for inode numbers on directory entries
|
BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (5)
btrfs
|
C |
|
|
931 |
120d |
150d
|
27/28 |
119d |
375476c41405
bcachefs: Add lockdep support for btree node locks
|
upstream test error: KMSAN: uninit-value in receive_buf
net
virt
|
|
|
|
351 |
145d |
200d
|
27/28 |
119d |
840b2d39a2dc
virtio_ring: fix KMSAN error for premapped mode
|
WARNING in __skb_flow_dissect (6)
net
|
|
|
|
1 |
219d |
219d
|
27/28 |
119d |
b975d3ee5962
net: add and use skb_get_hash_net
|
BUG: corrupted list in __folio_undo_large_rmappable
mm
|
C |
error |
|
36 |
154d |
154d
|
27/28 |
119d |
f708f6970cc9
mm/hugetlb: fix kernel NULL pointer dereference when migrating hugetlb folio
|
KMSAN: uninit-value in zswap_store
mm
|
|
|
|
2 |
128d |
186d
|
27/28 |
120d |
65121eff3e4c
ext4: avoid writing unitialized memory to disk in EA inodes
|
KMSAN: uninit-value in hfs_revalidate_dentry
hfs
|
C |
|
|
11669 |
180d |
747d
|
27/28 |
120d |
26a2ed107929
hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
|
general protection fault in xdp_do_generic_redirect
net
bpf
|
|
|
|
8 |
155d |
159d
|
27/28 |
120d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
possible deadlock in udf_setsize
udf
|
|
|
|
23 |
186d |
208d
|
27/28 |
120d |
8832fc1e5026
udf: Fix lock ordering in udf_evict_inode()
|
WARNING: suspicious RCU usage in bch2_bucket_ref_update
bcachefs
|
C |
done |
|
5 |
156d |
155d
|
27/28 |
120d |
6f692b1672bd
bcachefs: Fix RCU splat
|
inconsistent lock state in valid_state (3)
mm
|
C |
error |
|
376 |
131d |
180d
|
27/28 |
120d |
7d6be67cfdd4
mm: mmap_lock: replace get_memcg_path_buf() with on-stack buffer
|
kernel BUG in f2fs_evict_inode (2)
f2fs
|
C |
error |
|
575 |
120d |
399d
|
27/28 |
120d |
192b8fb8d1c8
f2fs: fix to don't dirty inode for readonly filesystem
|
general protection fault in dev_map_redirect
bpf
net
|
C |
|
|
362 |
155d |
163d
|
27/28 |
120d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in dev_hash_map_redirect
bpf
net
|
C |
done |
|
29 |
155d |
163d
|
27/28 |
120d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
general protection fault in dtInsertEntry
jfs
|
C |
inconclusive |
|
501 |
121d |
246d
|
27/28 |
120d |
ce6dede912f0
jfs: fix null ptr deref in dtInsertEntry
|
BUG: sleeping function called from invalid context in cgroup_rstat_flush
cgroups
|
|
|
|
6 |
155d |
167d
|
27/28 |
120d |
5a4d8944d6b1
cachestat: do not flush stats in recency check
|
WARNING in __fortify_report
ext4
|
C |
|
|
251 |
169d |
202d
|
27/28 |
120d |
be27cd64461c
ext4: use memtostr_pad() for s_volume_name
|
UBSAN: array-index-out-of-bounds in diFree
jfs
|
C |
inconclusive |
|
226 |
121d |
232d
|
27/28 |
120d |
f73f969b2eb3
jfs: Fix array-index-out-of-bounds in diFree
|
WARNING in _ieee80211_change_chanctx
wireless
|
|
|
|
7 |
149d |
226d
|
27/28 |
120d |
23daf1b4c91d
wifi: nl80211: disallow setting special AP channel widths
|
WARNING in __ip6_make_skb (2)
net
|
C |
done |
|
104 |
184d |
198d
|
27/28 |
120d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
general protection fault in xdp_do_redirect
bpf
net
|
|
|
|
15 |
156d |
163d
|
27/28 |
120d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
KMSAN: uninit-value in ext4_inlinedir_to_tree
ext4
|
C |
|
|
267 |
180d |
226d
|
27/28 |
120d |
8dc9c3da79c8
ext4: fix uninitialized variable in ext4_inlinedir_to_tree
|
KASAN: slab-use-after-free Read in l2tp_tunnel_del_work
net
|
C |
done |
|
99 |
155d |
169d
|
27/28 |
120d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
kernel BUG in bch2_bucket_alloc_trans
bcachefs
|
|
|
|
18 |
145d |
175d
|
27/28 |
120d |
44ec5990357b
bcachefs: Don't use the new_fs() bucket alloc path on an initialized fs
|
BUG: unable to handle kernel paging request in do_split
ext4
|
C |
inconclusive |
|
17 |
152d |
165d
|
27/28 |
120d |
50ea741def58
ext4: check dot and dotdot of dx_root before making dir indexed
f9ca51596bbf
ext4: make sure the first directory block is not a hole
|
WARNING in __cfg80211_connect_result (2)
wireless
|
C |
error |
|
232 |
133d |
198d
|
27/28 |
120d |
b5d14b0c6716
wifi: virt_wifi: avoid reporting connection success with wrong SSID
|
KASAN: slab-use-after-free Read in sanity_check_extent_cache
f2fs
|
C |
done |
|
5 |
183d |
226d
|
27/28 |
120d |
d7409b05a64f
f2fs: fix to cover read extent cache access with lock
|
possible deadlock in try_to_wake_up (5)
mm
|
C |
|
|
88 |
122d |
195d
|
27/28 |
120d |
7d6be67cfdd4
mm: mmap_lock: replace get_memcg_path_buf() with on-stack buffer
|
BUG: sleeping function called from invalid context in bch2_printbuf_make_room
bcachefs
|
C |
done |
|
27 |
144d |
142d
|
27/28 |
120d |
737759fc098f
bcachefs: Fix printbuf usage while atomic
|
UBSAN: shift-out-of-bounds in dbDiscardAG
jfs
|
C |
unreliable |
|
5 |
158d |
173d
|
27/28 |
120d |
7063b80268e2
jfs: Fix shift-out-of-bounds in dbDiscardAG
|
kernel BUG in __block_write_begin_int (2)
nilfs
|
C |
inconclusive |
|
2 |
157d |
221d
|
27/28 |
120d |
a9e1ddc09ca5
nilfs2: fix kernel bug on rename operation of broken directory
|
possible deadlock in hfsplus_file_truncate
hfs
|
C |
error |
|
51400 |
120d |
746d
|
27/28 |
120d |
be4edd1642ee
hfsplus: fix to avoid false alarm of circular locking
|
UBSAN: shift-out-of-bounds in bch2_bkey_format_invalid (2)
bcachefs
|
C |
|
|
117 |
120d |
184d
|
27/28 |
120d |
a0bd30e4ea9d
bcachefs: Fix shift greater than integer size
|
KMSAN: uninit-value in ppp_async_push (3)
ppp
|
C |
|
|
4 |
203d |
160d
|
27/28 |
120d |
f2aeb7306a89
ppp: reject claimed-as-LCP but actually malformed packets
|
KCSAN: data-race in __swap_writepage / scan_swap_map_slots (2)
mm
|
|
|
|
2 |
156d |
156d
|
27/28 |
120d |
7b7aca6d7c0f
mm: ignore data-race in __swap_writepage
|
memory leak in _r8712_init_xmit_priv (2)
staging
usb
|
C |
|
|
2 |
372d |
388d
|
27/28 |
120d |
9ed3e0a0e1b1
staging: rtl8712: remove unnecessary alignment of pxmitpriv->pxmitbuf
|
KMSAN: uninit-value in hfsplus_listxattr (2)
hfs
|
C |
|
|
6 |
222d |
246d
|
27/28 |
120d |
0570730c1630
hfsplus: fix uninit-value in copy_name
|
stack segment fault in bpf_xdp_redirect
bpf
net
|
C |
|
|
181 |
155d |
163d
|
27/28 |
120d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
general protection fault in __block_commit_write
ext4
|
C |
inconclusive |
|
7 |
163d |
310d
|
27/28 |
120d |
83f4414b8f84
ext4: sanity check for NULL pointer after ext4_force_shutdown
|
general protection fault in tomoyo_socket_bind_permission
io-uring
|
C |
|
|
4 |
151d |
151d
|
27/28 |
120d |
ad00e629145b
io_uring/net: check socket is valid in io_bind()/io_listen()
|
KMSAN: uninit-value in copy_name
hfs
|
C |
|
|
300 |
180d |
207d
|
27/28 |
120d |
0570730c1630
hfsplus: fix uninit-value in copy_name
|
kernel BUG in btrfs_free_tree_block
btrfs
|
C |
error |
|
150 |
121d |
807d
|
27/28 |
120d |
bb3868033a4c
btrfs: do not BUG_ON() when freeing tree block after error
|
KASAN: slab-use-after-free Read in add_ra_bio_pages (3)
btrfs
|
|
|
|
1 |
172d |
160d
|
27/28 |
120d |
8e7860543a94
btrfs: fix extent map use-after-free when adding pages to compressed bio
|
WARNING in __kvm_gpc_refresh (2)
kvm
|
C |
error |
|
2 |
183d |
197d
|
27/28 |
120d |
ebbdf37ce9ab
KVM: Validate hva in kvm_gpc_activate_hva() to fix __kvm_gpc_refresh() WARN
|
possible deadlock in exfat_evict_inode
exfat
|
|
|
|
2 |
170d |
207d
|
27/28 |
120d |
89fc548767a2
exfat: fix potential deadlock on __exfat_get_dentry_set
|
stack segment fault in cpu_map_redirect
net
bpf
|
C |
done |
|
11 |
156d |
155d
|
27/28 |
120d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
KASAN: slab-use-after-free Write in l2tp_session_delete
net
|
C |
done |
|
1286 |
150d |
169d
|
27/28 |
120d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
KMSAN: uninit-value in vsock_assign_transport (2)
net
virt
|
C |
|
|
14 |
181d |
236d
|
27/28 |
120d |
1e1fdcbdde3b
vhost/vsock: always initialize seqpacket_allow
|
WARNING in __ip_make_skb
net
|
C |
done |
|
54 |
184d |
198d
|
27/28 |
120d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
WARNING in btusb_submit_intr_urb/usb_submit_urb
usb
bluetooth
|
C |
error |
|
2 |
158d |
169d
|
27/28 |
120d |
a368ecde8a50
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
|
possible deadlock in attr_data_get_block
ntfs3
|
C |
error |
|
3111 |
120d |
786d
|
27/28 |
120d |
d57431c6f511
fs/ntfs3: Do copy_to_user out of run_lock
|
possible deadlock in btrfs_commit_inode_delayed_inode
btrfs
|
|
|
|
8 |
174d |
188d
|
27/28 |
120d |
68a3ebd18bc8
btrfs: use delayed iput during extent map shrinking
|
general protection fault in __io_remove_buffers
io-uring
|
C |
done |
|
3 |
148d |
147d
|
27/28 |
120d |
bcc87d978b83
io_uring: fix error pbuf checking
|
UBSAN: shift-out-of-bounds in parse_audio_unit
sound
|
C |
error |
|
3 |
151d |
150d
|
27/28 |
120d |
2f38cf730cae
ALSA: usb: Fix UBSAN warning in parse_audio_unit()
|
KMSAN: uninit-value in udf_update_tag
udf
|
C |
|
|
877 |
183d |
349d
|
27/28 |
120d |
27ab33854873
udf: Fix bogus checksum computation in udf_rename()
|
general protection fault in dequeue_hugetlb_folio_nodemask (2)
mm
|
C |
done |
|
14 |
177d |
183d
|
27/28 |
120d |
09a533622842
mm/hugetlb: guard dequeue_hugetlb_folio_nodemask against NUMA_NO_NODE uses
|
WARNING: lock held when returning to user space in ns_ioctl
fs
|
C |
done |
|
147 |
135d |
147d
|
27/28 |
120d |
280e36f0d5b9
nsfs: use cleanup guard
|
general protection fault in coalesce_fill_reply
net
|
C |
done |
|
27 |
163d |
168d
|
27/28 |
120d |
74d6529b78f7
net: ethtool: Fix the panic caused by dev being null when dumping coalesce
|
kernel BUG in submit_bh_wbc (2)
udf
|
C |
done |
|
123 |
125d |
230d
|
27/28 |
120d |
a90d4471146d
udf: Avoid using corrupted block bitmap buffer
|
WARNING in io_cqring_event_overflow (2)
io-uring
|
|
|
|
16 |
163d |
163d
|
27/28 |
120d |
3b7c16be30e3
io_uring/msg_ring: fix overflow posting
|
WARNING in bpf_lwt_seg6_adjust_srh
bpf
net
|
C |
done |
|
30 |
155d |
169d
|
27/28 |
120d |
c13fda93aca1
bpf: Remove tst_run from lwt_seg6local_prog_ops.
|
kernel BUG in f2fs_write_inline_data
f2fs
|
C |
inconclusive |
|
41 |
172d |
225d
|
27/28 |
120d |
a8eb3de28e7a
f2fs: fix return value of f2fs_convert_inline_inode()
fc01008c92f4
f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC
|
BUG: sleeping function called from invalid context in vma_alloc_folio_noprof
mm
|
C |
done |
|
1 |
150d |
149d
|
27/28 |
120d |
280e36f0d5b9
nsfs: use cleanup guard
|
UBSAN: shift-out-of-bounds in try_to_shrink_lruvec
mm
|
C |
done |
|
4 |
196d |
197d
|
27/28 |
120d |
462966dc7d70
mm: vmscan: reset sc->priority on retry
|
BUG: unable to handle kernel NULL pointer dereference in path_from_stashed
fs
|
C |
|
|
23 |
140d |
144d
|
27/28 |
120d |
f60d38cb02d0
pidfs: when time ns disabled add check for ioctl
|
INFO: rcu detected stall in security_file_ioctl (8)
tomoyo
|
C |
error |
done |
8 |
163d |
202d
|
26/28 |
127d |
e63413418088
net/sched: taprio: make q->picos_per_byte available to fill_sched_entry()
|
KASAN: slab-use-after-free Read in nf_tables_trans_destroy_work
netfilter
|
C |
error |
|
147 |
155d |
163d
|
26/28 |
127d |
9f6958ba2e90
netfilter: nf_tables: unconditionally flush pending work before notifier
|
KASAN: slab-out-of-bounds Read in btrfs_qgroup_inherit
btrfs
|
C |
done |
|
2 |
190d |
186d
|
26/28 |
127d |
724d8042cef8
btrfs: always do the basic checks for btrfs_qgroup_inherit structure
|
general protection fault in l2cap_sock_recv_cb
bluetooth
|
C |
inconclusive |
|
8 |
161d |
187d
|
26/28 |
127d |
89e856e124f9
bluetooth/l2cap: sync sock recv cb and release
|
WARNING in filemap_unaccount_folio
nilfs
|
C |
inconclusive |
|
13 |
169d |
204d
|
26/28 |
127d |
49ae997f8f0d
nilfs2: add missing check for inode numbers on directory entries
|
BUG: soft lockup in mld_ifc_work (2)
wireless
|
C |
|
|
2 |
214d |
226d
|
26/28 |
127d |
d1cba2ea8121
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
|
possible deadlock in __flush_workqueue
bluetooth
|
|
|
|
1456 |
130d |
329d
|
26/28 |
127d |
0d151a103775
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
|
WARNING in hci_conn_del
bluetooth
|
C |
done |
|
10497 |
156d |
287d
|
26/28 |
127d |
015d79c96d62
Bluetooth: Ignore too large handle values in BIG
1cc18c2ab2e8
bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX
|
WARNING in ieee80211_rx_list (2)
wireless
|
|
|
|
4 |
166d |
168d
|
26/28 |
127d |
321028bc45f0
wifi: mac80211: disable softirqs for queued frame handling
|
WARNING in __mptcp_clean_una
mptcp
|
C |
done |
done |
248 |
174d |
299d
|
26/28 |
131d |
fb7a0d334894
mptcp: ensure snd_nxt is properly initialized on connect
|
WARNING in implement
input
usb
|
C |
error |
done |
960 |
183d |
1913d
|
26/28 |
133d |
4aa2dcfbad53
HID: core: remove unnecessary WARN_ON() in implement()
|
INFO: rcu detected stall in __run_timer_base
usb
|
C |
done |
done |
10 |
173d |
242d
|
26/28 |
133d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
INFO: trying to register non-static key in btrfs_stop_all_workers
btrfs
|
|
|
|
1 |
190d |
186d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
kernel BUG in btrfs_free_fs_info
btrfs
|
|
|
|
2 |
193d |
196d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
KMSAN: uninit-value in btrfs_compress_heuristic
btrfs
|
|
|
|
4 |
196d |
196d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
general protection fault in btrfs_stop_all_workers (2)
btrfs
|
|
|
|
307 |
168d |
211d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
KMSAN: uninit-value in ZSTD_compressBlock_doubleFast
btrfs
|
|
|
|
2 |
192d |
188d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
BUG: spinlock bad magic in btrfs_stop_all_workers
btrfs
|
|
|
|
5 |
176d |
176d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
general protection fault in btrfs_simple_end_io
btrfs
|
|
|
|
18 |
175d |
200d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
KMSAN: uninit-value in deflate_fast
btrfs
|
|
|
|
3 |
183d |
187d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
general protection fault in put_pwq_unlocked
btrfs
|
|
|
|
7 |
190d |
204d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
general protection fault in apply_wqattrs_cleanup
btrfs
|
|
|
|
10 |
169d |
191d
|
26/28 |
134d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
KMSAN: uninit-value in io_req_cqe_overflow (3)
io-uring
|
C |
|
|
16 |
180d |
181d
|
26/28 |
138d |
18414a4a2eab
io_uring/net: assign kmsg inq/flags before buffer selection
|
WARNING in unmap_page_range (3)
mm
|
C |
|
|
169 |
258d |
267d
|
26/28 |
145d |
f8572367eaff
mm/memory: fix missing pte marker for !page on pte zaps
|
kernel BUG in bch2_ioctl_fsck_online
bcachefs
|
C |
done |
|
3 |
176d |
172d
|
26/28 |
151d |
9bd01500e4d8
bcachefs: Fix freeing of error pointers
|
WARNING in __virt_to_phys (4)
bcachefs
|
C |
|
|
2 |
164d |
160d
|
26/28 |
151d |
9bd01500e4d8
bcachefs: Fix freeing of error pointers
|
UBSAN: shift-out-of-bounds in bch2_btree_node_read_done
bcachefs
|
C |
|
|
3 |
179d |
202d
|
26/28 |
153d |
9e7cfb35e266
bcachefs: Check for invalid btree IDs
|
INFO: rcu detected stall in sys_wait4 (4)
mm
|
C |
done |
done |
2 |
211d |
244d
|
26/28 |
153d |
fb66df20a720
net/sched: taprio: extend minimum interval restriction to entire cycle too
|
general protection fault in find_match (5)
net
|
|
|
|
2 |
184d |
185d
|
26/28 |
154d |
b86762dbe19a
ipv6: prevent possible NULL dereference in rt6_probe()
|
possible deadlock in br_forward_delay_timer_expired (2)
net
|
|
|
|
1 |
175d |
175d
|
26/28 |
154d |
62e58ddb1465
net: add softirq safety to netdev_rename_lock
|
UBSAN: array-index-out-of-bounds in bch2_bkey_swab_key
bcachefs
|
|
|
|
2 |
188d |
186d
|
26/28 |
154d |
d47df4f616d5
bcachefs: Fix array-index-out-of-bounds
|
general protection fault in xfrm6_get_saddr (2)
net
|
|
|
|
1 |
185d |
185d
|
26/28 |
154d |
d46401052c2d
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
|
INFO: task hung in journal_quiesce
bcachefs
|
syz |
|
|
76 |
166d |
194d
|
26/28 |
154d |
89d21b69b4f8
bcachefs: Add missing bch2_journal_do_writes() call
|
WARNING in kcov_remote_start (4)
usb
|
|
|
|
107983 |
154d |
185d
|
26/28 |
154d |
f85d39dd7ed8
kcov, usb: disable interrupts in kcov_remote_start_usb_softirq
|
net-next test error: WARNING: suspicious RCU usage in _destroy_all_sets
netfilter
|
|
|
|
128 |
174d |
180d
|
26/28 |
155d |
8ecd06277a76
netfilter: ipset: Fix suspicious rcu_dereference_protected()
|
INFO: task hung in nilfs_segctor_thread (2)
nilfs
|
C |
inconclusive |
|
98 |
186d |
296d
|
26/28 |
155d |
7373a51e7998
nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors
|
INFO: task hung in devinet_ioctl (5)
net
|
|
|
|
59 |
155d |
181d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in addrconf_dad_work (4)
net
|
|
|
|
2632 |
155d |
206d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
general protection fault in fib6_nh_init (2)
net
|
|
|
|
2 |
176d |
180d
|
26/28 |
155d |
2eab4543a220
ipv6: prevent possible NULL deref in fib6_nh_init()
|
WARNING: suspicious RCU usage in br_mst_set_state (2)
bridge
|
|
|
|
10 |
175d |
186d
|
26/28 |
155d |
546ceb1dfdac
net: bridge: mst: fix suspicious rcu usage in br_mst_set_state
36c92936e868
net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state
|
WARNING in btrfs_put_transaction (2)
btrfs
|
|
|
|
3 |
195d |
191d
|
26/28 |
155d |
fb33eb2ef0d8
btrfs: fix leak of qgroup extent records after transaction abort
|
INFO: task hung in ieee80211_unregister_hw
wireless
|
|
|
|
151 |
159d |
195d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
UBSAN: array-index-out-of-bounds in lock_timer_base
bcachefs
kvm
|
|
|
|
4 |
177d |
191d
|
26/28 |
155d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
WARNING in bch2_fs_read_write_early
bcachefs
|
C |
|
|
35 |
172d |
180d
|
26/28 |
155d |
1ba44217f825
bcachefs: delete_dead_snapshots() doesn't need to go RW
|
INFO: task hung in linkwatch_event (3)
net
|
|
|
|
1634 |
155d |
750d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
upstream test error: WARNING: suspicious RCU usage in _destroy_all_sets
netfilter
|
|
|
|
293 |
174d |
180d
|
26/28 |
155d |
8ecd06277a76
netfilter: ipset: Fix suspicious rcu_dereference_protected()
|
INFO: task hung in wg_netns_pre_exit (4)
wireguard
|
|
|
|
127 |
156d |
195d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
WARNING in hid_output_report
input
usb
|
C |
error |
|
3 |
200d |
220d
|
26/28 |
155d |
4aa2dcfbad53
HID: core: remove unnecessary WARN_ON() in implement()
fba383985354
net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings
|
INFO: task hung in register_nexthop_notifier (3)
net
|
|
|
|
44 |
158d |
268d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in rfkill_global_led_trigger_worker (2)
net
nfc
|
C |
error |
|
1362 |
155d |
757d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
UBSAN: shift-out-of-bounds in read_one_super (2)
bcachefs
|
|
|
|
4 |
181d |
177d
|
26/28 |
155d |
d406545613b5
bcachefs: Fix shift overflow in read_one_super()
|
KASAN: slab-out-of-bounds Read in ea_get (2)
jfs
|
C |
|
|
33 |
157d |
222d
|
26/28 |
155d |
7c55b78818cf
jfs: xattr: fix buffer overflow for invalid xattr
|
INFO: task hung in wdm_release
usb
|
C |
error |
|
1 |
178d |
174d
|
26/28 |
155d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
WARNING in rdev_scan
wireless
|
C |
done |
|
3 |
178d |
183d
|
26/28 |
155d |
0941772342d5
wifi: cfg80211: wext: set ssids=NULL for passive scans
|
INFO: task hung in cfg80211_dfs_channels_update_work (7)
wireless
|
|
|
|
37 |
170d |
174d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
memory leak in nr_create (3)
hams
|
C |
|
|
9 |
357d |
547d
|
26/28 |
155d |
0b9130247f3b
netrom: Fix a memory leak in nr_heartbeat_expiry()
|
INFO: rcu detected stall in raw_ioctl
usb
|
C |
|
|
49 |
161d |
407d
|
26/28 |
155d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
BUG: soft lockup in tcp_write_timer (4)
kasan
mm
|
|
|
|
4 |
159d |
183d
|
26/28 |
155d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
KASAN: slab-use-after-free Read in bch2_sb_errors_from_cpu
bcachefs
|
C |
|
|
2 |
172d |
169d
|
26/28 |
155d |
211c581de28e
bcachefs: slab-use-after-free Read in bch2_sb_errors_from_cpu
|
KMSAN: uninit-value in asus_report_fixup
input
usb
|
C |
done |
|
35 |
176d |
201d
|
26/28 |
155d |
89e1ee118d6f
hid: asus: asus_report_fixup: fix potential read out of bounds
|
general protection fault in detach_extent_buffer_folio
btrfs
|
|
|
|
9 |
173d |
189d
|
26/28 |
155d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
INFO: task hung in cangw_pernet_exit_batch (3)
can
|
|
|
|
33 |
156d |
171d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
UBSAN: shift-out-of-bounds in bch2_blacklist_entries_gc
bcachefs
|
C |
|
|
45 |
169d |
169d
|
26/28 |
155d |
472237b69d07
bcachefs: Fix shift-out-of-bounds in bch2_blacklist_entries_gc
|
INFO: task hung in rtnetlink_rcv_msg
net
|
C |
inconclusive |
inconclusive |
1970 |
156d |
2119d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
kernel BUG in bch2_journal_res_get
bcachefs
|
C |
|
|
2 |
185d |
181d
|
26/28 |
155d |
dbf4d79b7fc7
bcachefs: Fix early init error path in journal code
|
INFO: task hung in addrconf_verify_work (8)
net
|
C |
error |
|
1294 |
155d |
359d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
kernel BUG in bch2_lru_change
bcachefs
|
C |
done |
|
4 |
172d |
188d
|
26/28 |
155d |
cff07e2739d8
bcachefs: Guard against overflowing LRU_TIME_BITS
|
INFO: task hung in mpls_net_exit (2)
net
|
|
|
|
50 |
161d |
181d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in switchdev_deferred_process_work (2)
net
|
C |
inconclusive |
|
1226 |
155d |
1598d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
possible deadlock in ovl_copy_up_flags
overlayfs
|
C |
done |
|
7 |
181d |
202d
|
26/28 |
155d |
db03d39053a9
ovl: fix copy-up in tmpfile
|
possible deadlock in console_flush_all (2)
trace
bpf
|
C |
error |
|
52996 |
155d |
430d
|
26/28 |
155d |
ae01e52da244
serial: drop debugging WARN_ON_ONCE() from uart_write()
|
kernel BUG in __vma_reservation_common
mm
|
C |
error |
|
8 |
186d |
219d
|
26/28 |
155d |
8daf9c702ee7
mm/hugetlb: do not call vma_add_reservation upon ENOMEM
|
WARNING: locking bug in srcu_gp_start_if_needed
kvm
bcachefs
|
|
|
|
2 |
182d |
184d
|
26/28 |
155d |
f770a6e9a3d7
bcachefs: Fix initialization order for srcu barrier
|
INFO: task hung in crda_timeout_work (7)
wireless
|
|
|
|
1084 |
157d |
201d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
KMSAN: kernel-infoleak in raw_recvmsg
can
|
C |
|
|
121 |
181d |
229d
|
26/28 |
155d |
b7cdf1dd5d2a
net: can: j1939: Initialize unused data in j1939_send_one()
|
BUG: soft lockup in inet6_rtm_newroute
net
|
|
|
|
1 |
171d |
171d
|
26/28 |
155d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
possible deadlock in btrfs_log_inode
btrfs
|
|
|
|
1 |
186d |
182d
|
26/28 |
155d |
d1825752e307
btrfs: use NOFS context when getting inodes during logging and log replay
|
INFO: task hung in reg_check_chans_work (6)
wireless
|
C |
error |
|
129 |
158d |
231d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in wg_destruct
wireguard
|
|
|
|
207 |
158d |
197d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
WARNING: kmalloc bug in __snapshot_t_mut
bcachefs
|
C |
done |
|
10 |
165d |
196d
|
26/28 |
155d |
64cd7de998f3
bcachefs: Fix kmalloc bug in __snapshot_t_mut
|
WARNING in skb_ensure_writable
bpf
net
|
C |
done |
|
2893 |
156d |
233d
|
26/28 |
155d |
2bbe3e5a2f4e
bpf: Avoid splat in pskb_pull_reason
|
BUG: soft lockup in hci_cmd_timeout
bluetooth
usb
|
C |
|
|
1 |
186d |
182d
|
26/28 |
155d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
KASAN: slab-use-after-free Read in bch2_fs_recovery
bcachefs
|
|
|
|
21 |
173d |
174d
|
26/28 |
155d |
2fe79ce7d1e8
bcachefs: Fix a UAF after write_super()
|
WARNING in cxacru_cm/usb_submit_urb
usb
|
C |
error |
inconclusive |
14 |
174d |
1742d
|
26/28 |
155d |
2eabb655a968
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
|
WARNING: locking bug in __timer_delete_sync
kvm
bcachefs
|
|
|
|
6 |
169d |
193d
|
26/28 |
155d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
INFO: task hung in bpf_prog_dev_bound_destroy
bpf
|
|
|
|
94 |
174d |
186d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
kernel BUG in gc_bucket
bcachefs
|
C |
done |
|
221 |
189d |
193d
|
26/28 |
155d |
9432e90df1b8
bcachefs: Check for invalid bucket from bucket_gen(), gc_bucket()
|
INFO: task hung in regdb_fw_cb
wireless
|
|
|
|
596 |
159d |
200d
|
26/28 |
155d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
KASAN: slab-out-of-bounds Read in cfg80211_wext_freq
wireless
|
C |
inconclusive |
|
133 |
170d |
196d
|
26/28 |
155d |
6ef09cdc5ba0
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
|
possible deadlock in xfs_can_free_eofblocks
xfs
|
|
|
|
4 |
190d |
215d
|
26/28 |
161d |
6fe60465e1d5
stackdepot: respect __GFP_NOLOCKDEP allocation flag
|
possible deadlock in __sock_map_delete
bpf
net
|
C |
|
|
14 |
197d |
241d
|
26/28 |
163d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
WARNING in geneve_xmit
net
|
C |
done |
|
42 |
229d |
236d
|
26/28 |
174d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
general protection fault in bch2_fs_btree_key_cache_exit
bcachefs
|
|
|
|
6 |
181d |
181d
|
26/28 |
174d |
b30b70ad8bff
bcachefs: Fix early error path in bch2_fs_btree_key_cache_exit()
|
possible deadlock in __hrtimer_run_queues (2)
kernel
|
C |
error |
done |
16 |
230d |
262d
|
26/28 |
174d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
general protection fault in ip6_pol_route
net
|
|
|
|
73 |
177d |
215d
|
26/28 |
176d |
b01e1c030770
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
general protection fault in __fib6_drop_pcpu_from (5)
net
|
|
|
|
467 |
176d |
221d
|
26/28 |
176d |
b01e1c030770
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
WARNING in ieee80211_link_info_change_notify (2)
wireless
|
C |
inconclusive |
|
8918 |
184d |
652d
|
26/28 |
176d |
02c665f048a4
wifi: mac80211: apply mcast rate only if interface is up
|
general protection fault in bpf_get_attach_cookie_tracing
bpf
trace
|
C |
error |
|
7 |
189d |
220d
|
26/28 |
176d |
d0d1df8ba18a
bpf: Set run context for rawtp test_run callback
|
KASAN: slab-use-after-free Read in bpf_link_free (2)
bpf
|
syz |
|
|
52 |
186d |
198d
|
26/28 |
176d |
2884dc7d08d9
bpf: Fix a potential use-after-free in bpf_link_free()
|
WARNING in ieee80211_rx_list
wireless
|
C |
inconclusive |
error |
3489 |
187d |
1539d
|
26/28 |
176d |
177c6ae9725d
wifi: mac80211: handle tasklet frames before stopping
|
WARNING in fuse_request_end
fuse
|
C |
error |
|
3 |
204d |
214d
|
26/28 |
180d |
246014876d78
fuse: clear FR_SENT when re-adding requests into pending list
|
WARNING in packet_setsockopt
net
|
C |
|
|
83 |
212d |
251d
|
26/28 |
181d |
86d43e2bf93c
af_packet: avoid a false positive warning in packet_setsockopt()
|
kernel BUG in dev_gro_receive
net
|
C |
done |
|
72 |
194d |
210d
|
25/28 |
183d |
be008726d0ac
net: gro: initialize network_offset in network layer
|
KMSAN: uninit-value in virtqueue_add (4)
mm
|
C |
|
|
203184 |
183d |
345d
|
25/28 |
183d |
61b258b0d2f6
x86: call instrumentation hooks from copy_mc.c
|
KMSAN: uninit-value in nilfs_add_checksums_on_logs (2)
nilfs
|
C |
|
|
171 |
183d |
344d
|
25/28 |
183d |
61b258b0d2f6
x86: call instrumentation hooks from copy_mc.c
|
KMSAN: uninit-value in nci_ntf_packet (2)
nfc
net
|
C |
|
|
13 |
186d |
199d
|
25/28 |
184d |
068648aab72c
nfc/nci: Add the inconsistency check between the input data length and count
|
UBSAN: shift-out-of-bounds in bch2_sb_dev_has_data
bcachefs
|
C |
done |
|
15 |
213d |
211d
|
25/28 |
184d |
bcfbaea8e547
bcachefs: Fix shift overflows in replicas.c
|
inconsistent lock state in valid_state (2)
sound
|
C |
inconclusive |
|
57405 |
184d |
309d
|
25/28 |
184d |
b79491896151
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
|
kernel panic: not locked: inodes NUM:ADDR:NUM cached
bcachefs
|
C |
|
|
2 |
210d |
206d
|
25/28 |
184d |
6ce26ad376bd
bcachefs: Fix missing parens in drop_locks_do()
|
kernel BUG in bch2_btree_iter_verify_entry_exit
bcachefs
|
C |
done |
|
3 |
203d |
209d
|
25/28 |
184d |
765b8cb8acab
bcachefs: Check for subvolues with bogus snapshot/inode fields
|
kernel BUG in bch2_checksum
bcachefs
|
C |
done |
|
9 |
201d |
211d
|
25/28 |
184d |
6b74fdcc8e25
bcachefs: bch2_checksum() returns 0 for unknown checksum type
|
WARNING in sock_map_close
bpf
net
|
C |
error |
|
182 |
184d |
247d
|
25/28 |
184d |
4b4647add7d3
sock_map: avoid race between sock_map_close and sk_psock_put
|
possible deadlock in sock_hash_delete_elem (2)
bpf
net
|
C |
|
|
1127 |
184d |
267d
|
25/28 |
184d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
general protection fault in poll_state_synchronize_srcu
bcachefs
|
|
|
|
5 |
203d |
203d
|
25/28 |
184d |
d293ece10810
bcachefs: Fix shutdown ordering
|
KASAN: slab-use-after-free Read in p9_fid_destroy
v9fs
|
C |
|
|
13 |
199d |
279d
|
25/28 |
184d |
f89ea63f1c65
netfs, 9p: Fix race between umount and async request completion
|
kernel BUG in cpu_replicas_add_entry
bcachefs
|
C |
done |
|
11 |
194d |
213d
|
25/28 |
184d |
5fa421448d1f
bcachefs: Fix bogus verify_replicas_entry() assert
|
kernel BUG in __journal_res_get
bcachefs
|
C |
done |
|
7 |
192d |
216d
|
25/28 |
184d |
cd3b31f9d417
bcachefs: Ensure we're RW before journalling
|
general protection fault in nf_tproxy_laddr4
netfilter
|
C |
error |
|
5 |
203d |
212d
|
25/28 |
184d |
21a673bddc8f
netfilter: tproxy: bail out if IP has been disabled on the device
|
KASAN: slab-use-after-free Read in p9_client_destroy
v9fs
|
|
|
|
7 |
202d |
215d
|
25/28 |
184d |
f89ea63f1c65
netfs, 9p: Fix race between umount and async request completion
|
KASAN: stack-out-of-bounds Read in __bch2_encrypt_bio
bcachefs
|
C |
done |
|
2 |
214d |
211d
|
25/28 |
184d |
2ba24864d2f6
bcachefs: Fix stack oob in __bch2_encrypt_bio()
|
KASAN: slab-use-after-free Write in v9fs_free_request
v9fs
|
|
|
|
9 |
198d |
213d
|
25/28 |
184d |
f89ea63f1c65
netfs, 9p: Fix race between umount and async request completion
|
INFO: rcu detected stall in packet_release
net
|
C |
unreliable |
|
1 |
276d |
198d
|
25/28 |
184d |
fb66df20a720
net/sched: taprio: extend minimum interval restriction to entire cycle too
|
WARNING in collect_domain_accesses
lsm
|
C |
done |
|
3 |
203d |
215d
|
25/28 |
184d |
88da52ccd66e
landlock: Fix d_parent walk
|
WARNING: suspicious RCU usage in nfqnl_reinject
netfilter
|
|
|
|
2 |
194d |
211d
|
25/28 |
184d |
dc21c6cc3d69
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
|
UBSAN: shift-out-of-bounds in bch2_btree_lost_data
bcachefs
|
C |
done |
|
3 |
209d |
208d
|
25/28 |
184d |
f108ddd467b5
bcachefs: Fix shift overflow in btree_lost_data()
|
KMSAN: uninit-value in p9_client_rpc (2)
v9fs
|
C |
|
|
5 |
223d |
256d
|
25/28 |
184d |
25460d6f3902
net/9p: fix uninit-value in p9_client_rpc()
|
WARNING: lock held when returning to user space in srcu_lock_acquire
rcu
|
C |
|
|
3 |
213d |
212d
|
25/28 |
184d |
70dd062e27e6
bcachefs: Fix btree_trans leak in bch2_readahead()
|
kernel BUG in bch2_fs_release
bcachefs
|
|
|
|
3 |
196d |
201d
|
25/28 |
184d |
d509cadc3a48
bcachefs: Fix debug assert
|
kernel panic: bch_dev->ref underflow, last put: bch2_trigger_alloc
bcachefs
|
C |
done |
|
6 |
201d |
212d
|
25/28 |
184d |
9667214b30ef
bcachefs: Fix ref in trans_mark_dev_sbs() error path
|
KMSAN: uninit-value in io_issue_sqe
io-uring
|
|
|
|
2 |
185d |
198d
|
25/28 |
184d |
18414a4a2eab
io_uring/net: assign kmsg inq/flags before buffer selection
|
general protection fault in __bch2_insert_snapshot_whiteouts
bcachefs
|
C |
done |
|
65 |
199d |
211d
|
25/28 |
184d |
6d48e61364ae
bcachefs: Add missing guard in bch2_snapshot_has_children()
|
KASAN: slab-use-after-free Read in evict_inodes
bcachefs
|
C |
done |
|
2 |
216d |
212d
|
25/28 |
184d |
d93ff5fa40b9
bcachefs: Fix race path in bch2_inode_insert()
|
INFO: task hung in nilfs_detach_log_writer
nilfs
|
C |
inconclusive |
|
125 |
203d |
779d
|
25/28 |
184d |
eb85dace897c
nilfs2: fix potential hang in nilfs_detach_log_writer()
|
general protection fault in crypto_skcipher_encrypt
crypto
bcachefs
|
C |
error |
|
66 |
184d |
211d
|
25/28 |
184d |
c06a8b75679d
bcachefs: Fix bch2_alloc_ciphers()
|
INFO: rcu detected stall in snd_timer_user_release (3)
sound
|
C |
inconclusive |
|
3 |
217d |
226d
|
25/28 |
184d |
4a63bd179fa8
ALSA: timer: Set lower bound of start tick time
|
KMSAN: uninit-value in bch2_dirent_invalid
bcachefs
|
C |
|
|
239 |
184d |
212d
|
25/28 |
184d |
2195b755ebd2
bcachefs: Fix unsafety in bch2_dirent_name_bytes()
|
kernel BUG in bch2_fs_recovery
bcachefs
|
C |
done |
done |
161 |
216d |
222d
|
25/28 |
184d |
7ffec9ccdc6a
bcachefs: don't free error pointers
|
INFO: trying to register non-static key in __timer_delete_sync (2)
net
|
C |
|
|
45524 |
211d |
229d
|
25/28 |
187d |
3c668cef61ad
net: hsr: init prune_proxy_timer sooner
|
possible deadlock in nr_rt_ioctl
hams
|
C |
inconclusive |
|
8 |
193d |
221d
|
25/28 |
187d |
e03e7f20ebf7
netrom: fix possible dead-lock in nr_rt_ioctl()
|
WARNING in __inet_accept
net
|
C |
done |
|
3 |
205d |
205d
|
25/28 |
189d |
26afda78cda3
UPSTREAM: net: relax socket state check at accept time.
|
KASAN: slab-out-of-bounds Read in f2fs_get_node_info
f2fs
|
C |
error |
|
4 |
217d |
230d
|
25/28 |
189d |
20faaf30e555
f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()
|
BUG: soft lockup in batadv_purge_orig
batman
|
|
|
|
1 |
257d |
257d
|
25/28 |
189d |
40dc8ab60589
batman-adv: bypass empty buckets in batadv_purge_orig_ref()
|
general protection fault in subflow_v6_route_req
mptcp
|
C |
done |
|
2 |
219d |
219d
|
25/28 |
189d |
445c0b69c729
mptcp: fix possible NULL dereferences
|
general protection fault in ip6_output
net
|
|
|
|
4 |
223d |
242d
|
25/28 |
189d |
4db783d68b9b
ipv6: prevent NULL dereference in ip6_output()
|
WARNING in sg_remove_sfp_usercontext
scsi
|
C |
|
|
36031 |
244d |
258d
|
25/28 |
189d |
d4e655c49f47
scsi: sg: Avoid race in error handling & drop bogus warn
|
KMSAN: uninit-value in __bpf_strtoull
bpf
|
C |
|
|
119 |
190d |
267d
|
25/28 |
189d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
WARNING in iomap_iter (2)
iomap
|
C |
|
|
4 |
227d |
223d
|
25/28 |
189d |
0c12028aec83
block: refine the EOF check in blkdev_iomap_begin
|
inconsistent lock state in padata_do_parallel (2)
crypto
|
|
|
|
2 |
254d |
254d
|
25/28 |
189d |
58329c431203
padata: Disable BH when taking works lock on MT path
|
KMSAN: uninit-value in trie_delete_elem
bpf
|
C |
|
|
52 |
190d |
260d
|
25/28 |
189d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
UBSAN: shift-out-of-bounds in read_one_super
bcachefs
|
C |
done |
|
31 |
190d |
219d
|
25/28 |
189d |
71dac2482ad3
bcachefs: BCH_SB_LAYOUT_SIZE_BITS_MAX
|
KMSAN: uninit-value in nci_rx_work
net
nfc
|
C |
|
|
582 |
189d |
345d
|
25/28 |
189d |
e4a87abf5885
nfc: nci: Fix uninit-value in nci_rx_work
|
KASAN: slab-use-after-free Read in unix_del_edges
net
|
C |
done |
|
2 |
237d |
236d
|
25/28 |
189d |
1af2dface5d2
af_unix: Don't access successor in unix_del_edges() during GC.
|
INFO: task hung in ext4_quota_write
ext4
|
C |
inconclusive |
|
22 |
240d |
345d
|
25/28 |
189d |
0a46ef234756
ext4: do not create EA inode under buffer lock
|
WARNING: kmalloc bug in bch2_dev_buckets_resize
bcachefs
|
C |
|
|
17 |
190d |
221d
|
25/28 |
189d |
db42549d402c
bcachefs: Add a better limit for maximum number of buckets
|
general protection fault in fib6_rule_action
net
|
|
|
|
1 |
238d |
238d
|
25/28 |
189d |
d101291b2681
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
|
WARNING in mb_cache_destroy
ext4
|
C |
done |
|
738 |
207d |
225d
|
25/28 |
189d |
0c0b4a49d3e7
ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
|
WARNING in __virt_to_phys (3)
bcachefs
|
C |
|
|
447 |
189d |
222d
|
25/28 |
189d |
7ffec9ccdc6a
bcachefs: don't free error pointers
|
KMSAN: uninit-value in br_dev_xmit (2)
bridge
|
C |
|
|
2 |
217d |
213d
|
25/28 |
189d |
8bd67ebb50c0
net: bridge: xmit: make sure we have at least eth header len bytes
|
KMSAN: uninit-value in dev_map_lookup_elem
bpf
net
|
C |
|
|
3 |
255d |
261d
|
25/28 |
189d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in __bch2_write_index
bcachefs
|
|
|
|
1 |
221d |
221d
|
25/28 |
189d |
1267df40acb2
bcachefs: Initialize bch_write_op->failed in inline data path
|
BUG: sleeping function called from invalid context in console_lock (2)
serial
|
C |
inconclusive |
inconclusive |
7447 |
189d |
1283d
|
25/28 |
189d |
6bd23e0c2bb6
tty: add the option to have a tty reject a new ldisc
|
KMSAN: uninit-value in trie_lookup_elem
bpf
|
C |
|
|
12 |
247d |
265d
|
25/28 |
189d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
possible deadlock in kvfree_call_rcu
bpf
|
C |
|
|
1431 |
191d |
260d
|
25/28 |
189d |
59f2f841179a
bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie.
|
BUG: unable to handle kernel paging request in bch2_fs_btree_key_cache_exit
bcachefs
|
C |
|
|
1002 |
189d |
222d
|
25/28 |
189d |
b30b70ad8bff
bcachefs: Fix early error path in bch2_fs_btree_key_cache_exit()
|
WARNING: suspicious RCU usage in bch2_fs_quota_read
bcachefs
|
C |
done |
|
24 |
190d |
220d
|
25/28 |
189d |
8060bf1d83f7
bcachefs: Fix snapshot_t() usage in bch2_fs_quota_read_inode()
|
WARNING in kcov_remote_start (3)
usb
|
|
|
|
265513 |
189d |
258d
|
25/28 |
189d |
19e35f24750d
nfc: nci: Fix kcov check in nci_rx_work()
|
KASAN: slab-out-of-bounds Write in do_handle_open
nfs
|
C |
|
|
643 |
251d |
253d
|
25/28 |
189d |
68d6f4f3fbd9
fs: Annotate struct file_handle with __counted_by() and use struct_size()
|
UBSAN: shift-out-of-bounds in __bch2_bkey_invalid
bcachefs
|
C |
done |
|
6 |
194d |
220d
|
25/28 |
189d |
2bb9600d5d47
bcachefs: Guard against unknown k.k->type in __bkey_invalid()
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (2)
bpf
|
C |
|
|
3 |
233d |
247d
|
25/28 |
189d |
543576ec15b1
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
|
KMSAN: uninit-value in unwind_dump
net
|
|
|
|
1 |
240d |
236d
|
25/28 |
189d |
90d1f14cbb9d
kmsan: compiler_types: declare __no_sanitize_or_inline
|
KASAN: slab-out-of-bounds Read in bch2_sb_downgrade_to_text
bcachefs
|
C |
done |
|
32 |
206d |
219d
|
25/28 |
189d |
692aa7a54b2b
bcachefs: Fix sb_field_downgrade validation
|
KMSAN: uninit-value in array_map_lookup_elem
bpf
|
C |
|
|
10 |
244d |
264d
|
25/28 |
189d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in sock_map_delete_elem
bpf
net
|
C |
|
|
44 |
191d |
261d
|
25/28 |
189d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KASAN: slab-use-after-free Read in fsnotify
ext4
|
C |
error |
|
3 |
238d |
244d
|
25/28 |
189d |
795bb82d12a1
fsnotify: fix UAF from FS_ERROR event on a shutting down filesystem
|
KASAN: slab-out-of-bounds Read in bch2_sb_clean_to_text
bcachefs
|
C |
done |
|
3 |
210d |
220d
|
25/28 |
189d |
f39055220f6f
bcachefs: Add missing validation for superblock section clean
|
WARNING in ar5523_cmd/usb_submit_urb
usb
wireless
|
C |
error |
|
39 |
222d |
1778d
|
25/28 |
189d |
e120b6388d7d
wifi: ar5523: enable proper endpoint verification
|
possible deadlock in sch_direct_xmit (4)
net
|
|
|
|
1 |
228d |
228d
|
25/28 |
189d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
WARNING in qdisc_alloc
net
|
C |
error |
|
1069 |
211d |
225d
|
25/28 |
189d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
WARNING in __mark_chain_precision (4)
bpf
|
C |
|
|
8 |
234d |
254d
|
25/28 |
189d |
1f2a74b41ea8
bpf: prevent r10 register from being marked as precise
|
kernel BUG in bch2_alloc_v4_invalid
bcachefs
|
C |
error |
|
3 |
197d |
220d
|
25/28 |
189d |
6b8cbfc3db75
bcachefs: Fix assert in bch2_alloc_v4_invalid()
|
KASAN: slab-out-of-bounds Read in bch2_varint_decode_fast
bcachefs
|
C |
|
|
583 |
189d |
222d
|
25/28 |
189d |
4a8521b6bb81
bcachefs: Inodes need extra padding for varint_decode_fast()
|
WARNING in __page_table_check_ptes_set
mm
|
C |
|
|
2 |
238d |
234d
|
25/28 |
189d |
c88033efe9a3
mm/userfaultfd: reset ptes when close() for wr-protected ones
|
KASAN: global-out-of-bounds Read in __nla_validate_parse
net
|
C |
|
|
5 |
247d |
247d
|
25/28 |
189d |
8750539ba317
net: team: fix incorrect maxattr
|
UBSAN: shift-out-of-bounds in bch2_bkey_format_invalid
bcachefs
|
C |
|
|
45 |
192d |
217d
|
25/28 |
189d |
61692c7812ab
bcachefs: bch2_bkey_format_field_overflows()
|
WARNING in __mod_memcg_lruvec_state
cgroups
mm
|
C |
|
|
270 |
218d |
253d
|
25/28 |
189d |
4f687281012e
mm: do not update memcg stats for NR_{FILE/SHMEM}_PMDMAPPED
|
WARNING in carl9170_usb_send_rx_irq_urb/usb_submit_urb
usb
wireless
|
C |
error |
inconclusive |
18 |
233d |
1377d
|
25/28 |
189d |
b6dd09b3dac8
wifi: carl9170: add a proper sanity check for endpoints
|
UBSAN: shift-out-of-bounds in rewrite_old_nodes_pred
bcachefs
|
C |
done |
|
3 |
220d |
220d
|
25/28 |
189d |
0ec5b3b7ccfc
bcachefs: Fix shift-by-64 in bformat_needs_redo()
|
kernel BUG in bch2_btree_node_read_done
bcachefs
|
C |
error |
|
5 |
220d |
222d
|
25/28 |
189d |
a2ddaf965f6a
bcachefs: bucket_pos_to_bp_noerror()
|
WARNING: suspicious RCU usage in br_mst_set_state
bridge
|
|
|
|
45 |
189d |
223d
|
25/28 |
189d |
3a7c1661ae13
net: bridge: mst: fix vlan use-after-free
|
KASAN: slab-use-after-free Read in vhost_task_fn
kvm
net
virt
|
C |
done |
|
2661 |
223d |
225d
|
25/28 |
189d |
db5247d9bf5c
vhost_task: Handle SIGKILL by flushing work and exiting
|
WARNING: zero-size vmalloc in ubi_read_volume_table
mtd
|
C |
|
|
3 |
256d |
254d
|
25/28 |
201d |
68a24aba7c59
ubi: Check for too small LEB size in VTBL code
|
WARNING in emit_fiemap_extent
btrfs
|
C |
error |
done |
14 |
284d |
540d
|
25/28 |
202d |
a1a4a9ca77f1
btrfs: fix race between ordered extent completion and fiemap
|
KASAN: slab-use-after-free Read in ovs_ct_exit
openvswitch
|
|
|
|
6 |
233d |
259d
|
25/28 |
202d |
5ea7b72d4fac
net: openvswitch: Fix Use-After-Free in ovs_ct_exit
|
possible deadlock in move_pages
mm
|
C |
|
|
206 |
258d |
267d
|
25/28 |
203d |
30af24facf0a
userfaultfd: fix deadlock warning when locking src and dst VMAs
|
KASAN: stack-out-of-bounds Read in hash
bpf
|
C |
done |
|
5 |
242d |
249d
|
25/28 |
203d |
a8d89feba7e5
bpf: Check bloom filter map value size
|
possible deadlock in force_sig_info_to_task
bpf
trace
|
C |
error |
|
6 |
223d |
230d
|
25/28 |
203d |
02b670c1f88e
x86/mm: Remove broken vsyscall emulation code from the page fault code
|
KMSAN: kernel-infoleak in btrfs_ioctl_logical_to_ino (2)
btrfs
|
|
|
|
1 |
239d |
239d
|
25/28 |
203d |
2f7ef5bb4a2f
btrfs: fix information leak in btrfs_ioctl_logical_to_ino()
|
possible deadlock in seq_read_iter (3)
overlayfs
|
|
|
|
148 |
214d |
303d
|
25/28 |
203d |
16b52bbee482
kernfs: annotate different lockdep class for of->mutex of writable files
|
KMSAN: uninit-value in geneve_xmit (3)
net
|
C |
|
|
14 |
244d |
252d
|
25/28 |
203d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
WARNING in mmu_free_root_page
kvm
|
C |
|
|
104 |
235d |
258d
|
25/28 |
203d |
1bc26cb90902
KVM: x86/mmu: Precisely invalidate MMU root_role during CPUID update
|
KMSAN: kernel-infoleak in __skb_datagram_iter (3)
net
|
C |
|
|
25 |
205d |
259d
|
25/28 |
203d |
d313eb8b7755
net/sched: act_skbmod: prevent kernel-infoleak
|
KASAN: slab-use-after-free Read in ip_skb_dst_mtu
netfilter
|
C |
error |
|
5 |
249d |
280d
|
25/28 |
203d |
18685451fc4e
inet: inet_defrag: prevent sk release while still in use
|
KMSAN: uninit-value in gre_rcv (3)
net
|
C |
|
|
3 |
257d |
258d
|
25/28 |
203d |
17af420545a7
erspan: make sure erspan_base_hdr is present in skb->head
|
KMSAN: uninit-value in line6_pod_process_message
sound
|
C |
|
|
5 |
253d |
254d
|
25/28 |
203d |
c4e51e424e2c
ALSA: line6: Zero-initialize message buffers
|
KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue
bpf
net
|
|
|
|
1 |
271d |
264d
|
25/28 |
203d |
6648e613226e
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
|
net-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
799 |
230d |
264d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
WARNING: suspicious RCU usage in __do_softirq
kernel
|
C |
|
|
199 |
226d |
253d
|
25/28 |
203d |
1dd1eff161bd
softirq: Fix suspicious RCU usage in __do_softirq()
|
upstream boot error: WARNING: refcount bug in __reset_page_owner
mm
|
|
|
|
555 |
237d |
268d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
KASAN: slab-out-of-bounds Read in nfc_llcp_setsockopt
net
nfc
|
C |
error |
|
5 |
240d |
249d
|
25/28 |
203d |
7a87441c9651
nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
|
KASAN: slab-use-after-free Read in __vma_reservation_common
mm
|
syz |
|
|
13 |
229d |
243d
|
25/28 |
203d |
37641efaa3fa
hugetlb: check for anon_vma prior to folio allocation
|
linux-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
177 |
259d |
296d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
riscv/fixes boot error: can't ssh into the instance (3)
|
|
|
|
210 |
204d |
258d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
upstream test error: WARNING: refcount bug in __reset_page_owner
mm
|
|
|
|
13 |
245d |
267d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
net boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
297 |
230d |
260d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
WARNING in vmk80xx_auto_attach/usb_submit_urb
usb
|
C |
unreliable |
inconclusive |
2 |
278d |
1279d
|
25/28 |
203d |
d1718530e3f6
comedi: vmk80xx: fix incomplete endpoint checking
|
WARNING: refcount bug in __reset_page_owner
mm
|
C |
|
|
93128 |
236d |
267d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
upstream boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
1463 |
237d |
267d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
KASAN: slab-out-of-bounds Read in update_counters
bridge
netfilter
|
C |
|
|
3 |
249d |
249d
|
25/28 |
203d |
0c83842df40f
netfilter: validate user input for expected length
|
KMSAN: uninit-value in ieee80211_rx_handlers (2)
wireless
|
C |
|
|
4 |
242d |
261d
|
25/28 |
203d |
7c1c73bf84c5
wifi: mac80211: check EHT/TTLM action frame length
|
KASAN: slab-out-of-bounds Read in do_ipt_set_ctl
netfilter
|
C |
|
|
111 |
240d |
251d
|
25/28 |
203d |
0c83842df40f
netfilter: validate user input for expected length
|
usb-testing boot error: WARNING: refcount bug in __reset_page_owner
mm
|
|
|
|
126 |
232d |
260d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
bpf-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
210 |
226d |
255d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
bpf boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
132 |
229d |
256d
|
25/28 |
203d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
possible deadlock in tty_port_tty_get (2)
bpf
net
|
|
|
|
3 |
246d |
264d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in put_pwq_unlocked
trace
bpf
|
|
|
|
3 |
240d |
240d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_delete_elem
bpf
net
|
C |
|
|
17183 |
229d |
268d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in scheduler_tick (3)
bpf
net
|
C |
|
|
1179 |
230d |
266d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in pit_timer_fn
bpf
net
|
|
|
|
7 |
240d |
252d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
BUG: soft lockup in sys_sendmsg
tipc
batman
|
C |
|
|
3 |
262d |
303d
|
25/28 |
203d |
b1f532a3b1e6
batman-adv: Avoid infinite loop trying to resize local TT
|
possible deadlock in rcu_exp_handler
bpf
net
|
C |
|
|
1 |
243d |
239d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
KMSAN: uninit-value in v9fs_evict_inode
v9fs
|
C |
|
|
5206 |
258d |
270d
|
25/28 |
203d |
6630036b7c22
fs/9p: fix uninitialized values during inode evict
|
possible deadlock in rcu_report_exp_cpu_mult
net
bpf
|
C |
done |
|
30 |
230d |
268d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in try_to_wake_up (4)
bpf
net
|
C |
error |
|
19 |
205d |
268d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in ahci_single_level_irq_intr
bpf
net
|
C |
|
|
10 |
251d |
259d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_unref
bpf
net
|
C |
error |
|
97 |
230d |
244d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
INFO: rcu detected stall in rtnl_newlink (4)
fs
batman
|
C |
error |
|
9 |
210d |
286d
|
25/28 |
203d |
b1f532a3b1e6
batman-adv: Avoid infinite loop trying to resize local TT
|
possible deadlock in __lock_task_sighand (2)
bpf
net
|
C |
|
|
1476 |
204d |
268d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_hash_delete_elem
bpf
net
|
C |
done |
|
16982 |
229d |
268d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in hrtimer_run_queues
net
bpf
|
C |
error |
|
592 |
230d |
267d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in swake_up_one
bpf
net
|
C |
|
|
4 |
241d |
240d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
BUG: unable to handle kernel paging request in copy_from_kernel_nofault (2)
mm
|
C |
|
|
2 |
243d |
253d
|
25/28 |
203d |
c6f48506ba30
arm32, bpf: Reimplement sign-extension mov instruction
|
possible deadlock in pwq_dec_nr_in_flight
trace
bpf
|
|
|
|
1 |
245d |
241d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in _prb_commit
net
bpf
|
|
|
|
4 |
240d |
236d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in posix_timer_fn (2)
net
bpf
|
|
|
|
1 |
244d |
240d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in drm_handle_vblank
bpf
net
|
|
|
|
30 |
241d |
266d
|
25/28 |
203d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
KASAN: slab-out-of-bounds Read in xsk_setsockopt
bpf
net
|
C |
|
|
17 |
242d |
251d
|
25/28 |
203d |
237f3cf13b20
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
|
KMSAN: uninit-value in ipvlan_queue_xmit (2)
net
|
C |
|
|
2 |
276d |
237d
|
25/28 |
203d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
possible deadlock in __unix_gc
net
|
C |
done |
|
5 |
230d |
232d
|
25/28 |
203d |
1971d13ffa84
af_unix: Suppress false-positive lockdep splat for spin_lock() in __unix_gc().
|
WARNING in gre_tap_xmit (2)
net
|
C |
done |
|
67 |
211d |
236d
|
25/28 |
203d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
UBSAN: array-index-out-of-bounds in check_stack_range_initialized
bpf
|
C |
error |
|
21 |
234d |
267d
|
25/28 |
203d |
ecc6a2101840
bpf: Protect against int overflow for stack access size
|
general protection fault in dev_map_enqueue
bpf
net
|
C |
|
|
676 |
203d |
260d
|
25/28 |
203d |
5bcf0dcbf906
xdp: use flags field to disambiguate broadcast redirect
|
KMSAN: uninit-value in xt_check_entry_offsets
netfilter
|
|
|
|
1 |
247d |
247d
|
25/28 |
203d |
65acf6e0501a
netfilter: complete validation of user input
|
KMSAN: uninit-value in nci_ntf_packet
net
nfc
|
C |
|
|
79 |
204d |
345d
|
25/28 |
203d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
KASAN: slab-use-after-free Read in v9fs_stat2inode_dotl
v9fs
|
C |
done |
|
585 |
258d |
313d
|
25/28 |
203d |
11763a8598f8
fs/9p: fix uaf in in v9fs_stat2inode_dotl
|
possible deadlock in unix_del_edges
net
|
C |
|
|
49 |
246d |
251d
|
25/28 |
203d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
WARNING in __hugetlb_cgroup_uncharge_folio
mm
|
syz |
|
|
3 |
232d |
241d
|
25/28 |
203d |
b76b46902c2d
mm/hugetlb: fix missing hugetlb_lock for resv uncharge
|
KASAN: slab-use-after-free Read in bpf_link_free
bpf
|
syz |
|
|
181 |
203d |
251d
|
25/28 |
203d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
WARNING: refcount bug in ax25_release (2)
hams
|
C |
|
|
240 |
203d |
268d
|
25/28 |
203d |
467324bcfe1a
ax25: Fix netdev refcount issue
|
KASAN: slab-out-of-bounds Read in data_sock_setsockopt
isdn4linux
|
C |
|
|
2 |
247d |
247d
|
25/28 |
203d |
138b787804f4
mISDN: fix MISDN_TIME_STAMP handling
|
KASAN: slab-use-after-free Read in bpf_trace_run4
bpf
trace
|
C |
error |
|
169 |
247d |
265d
|
25/28 |
203d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
KMSAN: uninit-value in nci_dev_up
nfc
net
|
C |
|
|
7 |
262d |
321d
|
25/28 |
203d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
UBSAN: array-index-out-of-bounds in nilfs_add_link
nilfs
|
C |
error |
|
4 |
239d |
240d
|
25/28 |
203d |
c4a7dc9523b5
nilfs2: fix OOB in nilfs_set_de_type
|
KASAN: slab-use-after-free Read in bpf_trace_run2
bpf
trace
|
C |
error |
|
653 |
247d |
265d
|
25/28 |
203d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
KASAN: slab-use-after-free Read in __fput (2)
fs
|
C |
done |
|
6 |
227d |
232d
|
25/28 |
203d |
4efaa5acf0a1
epoll: be better about file lifetimes
|
KASAN: slab-use-after-free Read in bpf_trace_run1
bpf
trace
|
C |
error |
|
78 |
247d |
262d
|
25/28 |
203d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
possible deadlock in unix_notinflight
net
|
C |
|
|
7 |
229d |
245d
|
25/28 |
203d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
general protection fault in __ep_remove
fs
|
C |
|
|
1 |
248d |
247d
|
25/28 |
203d |
4efaa5acf0a1
epoll: be better about file lifetimes
|
general protection fault in jbd2__journal_start
ext4
|
C |
error |
|
3 |
266d |
320d
|
25/28 |
203d |
f2e812c1522d
xfs: don't use current->journal_info
|
kernel BUG in sg_init_one
mm
|
C |
|
|
1032 |
258d |
268d
|
25/28 |
203d |
9c500835f279
mm: zswap: fix kernel BUG in sg_init_one
|
WARNING in __rate_control_send_low
wireless
|
C |
inconclusive |
|
2759 |
203d |
1519d
|
25/28 |
203d |
ab9177d83c04
wifi: mac80211: don't use rate mask for scanning
|
kernel BUG in PageHuge
mm
|
|
|
|
1 |
265d |
261d
|
25/28 |
203d |
d99e3140a4d3
mm: turn folio_test_hugetlb into a PageType
|
WARNING in clear_dirty_gfn_range
kvm
|
C |
|
|
3 |
252d |
274d
|
25/28 |
203d |
2673dfb591a3
KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
|
KMSAN: uninit-value in nf_flow_offload_ip_hook
netfilter
|
C |
|
|
5 |
251d |
251d
|
25/28 |
203d |
87b3593bed18
netfilter: flowtable: validate pppoe header
|
WARNING: ODEBUG bug in bdev_super_lock (2)
fs
|
C |
done |
|
3 |
240d |
238d
|
25/28 |
203d |
22650a99821d
fs,block: yield devices early
|
WARNING in hugetlb_change_protection (2)
mm
|
C |
|
|
631 |
223d |
250d
|
25/28 |
203d |
c5977c95dff1
mm/userfaultfd: allow hugetlb change protection upon poison entry
|
WARNING in __kvm_gpc_refresh
kvm
|
C |
|
|
178 |
204d |
268d
|
25/28 |
203d |
5c9ca4ed8908
KVM: Check validity of offset+length of gfn_to_pfn_cache prior to activation
|
WARNING in btrfs_sync_log
btrfs
|
C |
error |
inconclusive |
6 |
276d |
787d
|
25/28 |
203d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
WARNING in btrfs_put_transaction
btrfs
|
C |
error |
inconclusive |
83 |
220d |
742d
|
25/28 |
203d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
WARNING in __btrfs_free_extent
btrfs
|
C |
error |
|
300 |
212d |
770d
|
25/28 |
203d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
WARNING in btrfs_get_root_ref
btrfs
|
syz |
unreliable |
inconclusive |
3 |
278d |
293d
|
25/28 |
204d |
e2b54eaf28df
btrfs: fix double free of anonymous device after snapshot creation failure
|
kernel BUG at fs/inode.c:LINE! (2)
fs
|
C |
done |
unreliable |
322 |
218d |
1566d
|
25/28 |
204d |
319c15174757
epoll: take epitem list out of struct file
|
kernel BUG in create_pending_snapshot
btrfs
|
C |
error |
done |
32 |
443d |
748d
|
25/28 |
206d |
df9f27823904
btrfs: do not BUG_ON on failure to get dir index for new snapshot
|
WARNING in btrfs_free_reserved_data_space_noquota
btrfs
|
C |
done |
done |
7 |
331d |
743d
|
25/28 |
206d |
9e65bfca24cf
btrfs: fix qgroup_free_reserved_data int overflow
|
WARNING in stashed_dentry_prune (2)
fs
|
C |
done |
|
54 |
230d |
238d
|
25/28 |
207d |
9d9539db8638
pidfs: remove config option
|
kernel BUG in __extent_writepage_io
btrfs
|
syz |
done |
inconclusive |
8 |
284d |
402d
|
25/28 |
208d |
5571e41ec6e5
btrfs: don't drop extent_map for free space inode on write error
|
BUG: sleeping function called from invalid context in gsm_send
serial
|
C |
error |
|
16 |
291d |
805d
|
25/28 |
229d |
acdab4cb4ba7
Revert "tty: n_gsm: avoid call of sleeping functions from atomic context"
|
kernel BUG in submit_bh_wbc
nilfs
|
C |
done |
|
10 |
231d |
241d
|
25/28 |
231d |
269cdf353b5b
nilfs2: prevent kernel bug at submit_bh_wbc()
|
inconsistent lock state in snd_hrtimer_callback (2)
sound
|
C |
|
|
2600 |
240d |
242d
|
25/28 |
233d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
possible deadlock in snd_timer_close_locked (2)
sound
|
C |
done |
|
3036 |
240d |
242d
|
25/28 |
233d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
inconsistent lock state in snd_timer_interrupt (3)
sound
|
C |
|
|
710 |
240d |
244d
|
25/28 |
233d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
INFO: rcu detected stall in snd_timer_user_release (2)
sound
|
C |
|
|
7 |
234d |
247d
|
25/28 |
233d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
possible deadlock in _snd_pcm_stream_lock_irqsave (5)
sound
|
C |
|
|
5210 |
240d |
242d
|
25/28 |
233d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
INFO: task hung in netlink_dump (4)
net
|
|
|
|
72 |
247d |
287d
|
25/28 |
243d |
00af2aa93b76
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
|
INFO: task hung in xfs_inodegc_flush
xfs
|
C |
error |
|
7 |
312d |
308d
|
25/28 |
243d |
c70e1779b73a
workqueue: Fix pwq->nr_in_flight corruption in try_to_grab_pending()
|
INFO: task hung in devinet_ioctl (4)
net
|
|
|
|
5 |
274d |
274d
|
25/28 |
243d |
00af2aa93b76
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
|
WARNING in __sk_destruct
batman
fs
|
|
|
|
2 |
257d |
290d
|
25/28 |
243d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
WARNING in cleanup_net (3)
net
|
syz |
|
|
240 |
244d |
377d
|
25/28 |
243d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
WARNING in net_free (2)
net
|
syz |
|
|
27 |
250d |
296d
|
25/28 |
243d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
inconsistent lock state in snd_timer_interrupt (2)
sound
|
C |
done |
|
208 |
244d |
245d
|
25/28 |
244d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
KMSAN: uninit-value in em_ret_far
kvm
|
C |
|
|
37 |
271d |
337d
|
25/28 |
244d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
KMSAN: uninit-value in em_ret_near_imm
kvm
|
|
|
|
2 |
282d |
295d
|
25/28 |
244d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
KMSAN: uninit-value in em_ret
kvm
|
|
|
|
3 |
273d |
294d
|
25/28 |
244d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
KMSAN: uninit-value in ip_tunnel_rcv (2)
net
|
|
|
|
1 |
280d |
280d
|
25/28 |
244d |
b0ec2abf9826
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
|
WARNING in stashed_dentry_prune
fs
|
C |
done |
|
20 |
274d |
273d
|
25/28 |
244d |
9d9539db8638
pidfs: remove config option
|
possible deadlock in sch_direct_xmit (3)
net
|
|
|
|
1 |
303d |
303d
|
25/28 |
245d |
0bef512012b1
UPSTREAM: net: add netdev_lockdep_set_classes() to virtual drivers
|
BUG: bad usercopy in raw_getsockopt
mm
hardening
|
C |
done |
|
4 |
295d |
295d
|
25/28 |
245d |
c8fba5d6df5e
can: raw: fix getsockopt() for new CAN_RAW_XL_VCID_OPTS
|
WARNING: ODEBUG bug in bdev_super_lock
fs
|
C |
|
|
3 |
248d |
258d
|
25/28 |
245d |
59a55a63c246
fs,block: get holder during claim
|
KMSAN: uninit-value in cookie_v4_check
net
|
C |
|
|
9 |
267d |
273d
|
25/28 |
245d |
956c0d619107
tcp: Clear req->syncookie in reqsk_alloc().
|
linux-next boot error: WARNING in register_btf_kfunc_id_set
bpf
|
|
|
|
9 |
313d |
314d
|
25/28 |
245d |
a05e90427ef6
bpf: btf: Add BTF_KFUNCS_START/END macro pair
|
KMSAN: uninit-value in bcmp (2)
sound
btrfs
|
C |
|
|
7 |
310d |
332d
|
25/28 |
246d |
fde2497d2bc3
fat: fix uninitialized field in nostale filehandles
|
KASAN: slab-use-after-free Read in sys_io_cancel
fs
|
C |
done |
|
894 |
246d |
283d
|
25/28 |
246d |
28468cbed92e
Revert "fs/aio: Make io_cancel() generate completions again"
|
possible deadlock in _snd_pcm_stream_lock_irqsave (4)
sound
|
C |
|
|
24677 |
246d |
268d
|
25/28 |
246d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
divide error in isd200_ata_command
usb-storage
|
C |
done |
|
10 |
285d |
289d
|
25/28 |
246d |
014bcf41d946
USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
|
KASAN: slab-use-after-free Read in rt6_fill_node
net
|
|
|
|
1 |
297d |
297d
|
25/28 |
246d |
685f7d531264
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
|
KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt
net
|
|
|
|
1 |
272d |
272d
|
25/28 |
246d |
6ebfad33161a
packet: annotate data-races around ignore_outgoing
|
UBSAN: shift-out-of-bounds in taprio_change
net
|
C |
done |
|
4 |
275d |
275d
|
25/28 |
246d |
343041b59b78
net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
|
WARNING: suspicious RCU usage in in6_dump_addrs (2)
net
|
C |
done |
|
3 |
288d |
288d
|
25/28 |
246d |
67ea41d19d2a
inet6: expand rcu_read_lock() scope in inet6_dump_addr()
|
KASAN: slab-use-after-free Read in f2fs_filemap_fault
f2fs
|
C |
unreliable |
|
40 |
250d |
331d
|
25/28 |
246d |
eb70d5a6c932
f2fs: fix to avoid use-after-free issue in f2fs_filemap_fault
|
KMSAN: uninit-value in ieee80211_amsdu_to_8023s
wireless
|
C |
|
|
4 |
282d |
289d
|
25/28 |
246d |
9ad797485692
wifi: cfg80211: check A-MSDU format more carefully
|
general protection fault in btintel_read_version
bluetooth
|
C |
error |
|
5 |
318d |
329d
|
25/28 |
246d |
b79e04091010
Bluetooth: btintel: Fix null ptr deref in btintel_read_version
|
KMSAN: uninit-value in hsr_get_node (2)
net
|
C |
|
|
49 |
246d |
332d
|
25/28 |
246d |
ddbec99f5857
hsr: Fix uninit-value access in hsr_get_node()
|
KMSAN: kernel-infoleak in sys_name_to_handle_at (4)
nfs
|
C |
|
|
7 |
283d |
332d
|
25/28 |
246d |
3948abaa4e2b
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
|
KASAN: slab-use-after-free Write in __hci_acl_create_connection_sync
bluetooth
|
C |
done |
|
87 |
296d |
307d
|
25/28 |
246d |
5f641f03abcc
Bluetooth: hci_conn: Fix UAF Write in __hci_acl_create_connection_sync
|
WARNING in mpls_gso_segment
net
|
C |
done |
|
20 |
291d |
294d
|
25/28 |
246d |
025f8ad20f2e
net: mpls: error out if inner headers are not set
|
possible deadlock in snd_pcm_period_elapsed (4)
sound
|
C |
done |
|
90659 |
246d |
271d
|
25/28 |
246d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
possible deadlock in xfs_ilock
xfs
|
|
|
|
30 |
246d |
272d
|
25/28 |
246d |
0c6ca06aad84
xfs: quota radix tree allocations need to be NOFS on insert
|
inconsistent lock state in snd_timer_interrupt
sound
|
C |
|
|
1927 |
246d |
268d
|
25/28 |
246d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
WARNING in rds_conn_connect_if_down
rds
|
C |
error |
|
17 |
279d |
610d
|
25/28 |
246d |
c055fc00c07b
net/rds: fix WARNING in rds_conn_connect_if_down
|
general protection fault in bpf_struct_ops_find_value
bpf
|
C |
done |
|
9 |
318d |
321d
|
25/28 |
246d |
e6be8cd5d3cf
bpf: Fix error checks against bpf_get_btf_vmlinux().
|
BUG: unable to handle kernel NULL pointer dereference in dev_map_hash_update_elem
bpf
net
|
C |
|
|
2 |
290d |
297d
|
25/28 |
246d |
281d464a34f5
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
|
WARNING in sk_nulls_del_node_init_rcu
net
|
|
|
|
1 |
279d |
278d
|
25/28 |
246d |
04d9d1fc428a
tcp: Fix refcnt handling in __inet_hash_connect().
|
KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll (2)
wireguard
|
|
|
|
721 |
265d |
1037d
|
25/28 |
246d |
bba045dc4d99
wireguard: receive: annotate data-race around receiving_counter.counter
|
KMSAN: uninit-value in geneve_udp_encap_recv
net
|
C |
|
|
2 |
290d |
321d
|
25/28 |
246d |
1ca1ba465e55
geneve: make sure to pull inner header in geneve_rx()
|
WARNING in ovl_copy_up_file
overlayfs
|
C |
|
|
2 |
273d |
273d
|
25/28 |
246d |
77a28aa47687
ovl: relax WARN_ON in ovl_verify_area()
|
kernel BUG at fs/buffer.c:LINE!
nilfs
|
C |
done |
error |
567 |
247d |
2428d
|
25/28 |
246d |
f2f26b4a84a0
nilfs2: fix failure to detect DAT corruption in btree and direct mappings
|
kernel BUG in __nla_validate_parse
net
|
C |
done |
|
13 |
274d |
277d
|
25/28 |
246d |
d8a21070b6e1
nexthop: Fix out-of-bounds access during attribute validation
|
KASAN: slab-use-after-free Read in pvr2_context_set_notify (2)
pvrusb2
|
C |
|
|
1069 |
246d |
316d
|
25/28 |
246d |
0a0b79ea55de
media: pvrusb2: fix uaf in pvr2_context_set_notify
|
possible deadlock in xfs_qm_dqget_cache_insert
xfs
|
|
|
|
8 |
271d |
272d
|
25/28 |
246d |
0c6ca06aad84
xfs: quota radix tree allocations need to be NOFS on insert
|
KMSAN: uninit-value in ima_add_template_entry
erofs
|
C |
|
|
5 |
283d |
295d
|
25/28 |
246d |
893e5e9b7369
erofs: fix uninitialized page cache reported by KMSAN
|
BUG: sleeping function called from invalid context in __getblk_gfp
fs
|
C |
error |
done |
3673 |
350d |
744d
|
25/28 |
246d |
f123dc86388c
sysv: don't call sb_bread() with pointers_lock held
|
general protection fault in btf_is_module
bpf
|
C |
error |
|
318 |
318d |
321d
|
25/28 |
246d |
e6be8cd5d3cf
bpf: Fix error checks against bpf_get_btf_vmlinux().
|
KMSAN: uninit-value in io_sendrecv_fail
io-uring
|
C |
|
|
29 |
264d |
271d
|
25/28 |
246d |
e21e1c45e1fe
io_uring: clear opcode specific data for an early failure
|
INFO: task hung in deactivate_super (2)
reiserfs
|
C |
inconclusive |
done |
121 |
283d |
623d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: sleeping function called from invalid context in __lock_sock_fast (2)
net
|
C |
|
|
6 |
285d |
287d
|
25/28 |
253d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
possible deadlock in tcp_diag_get_aux
net
|
C |
|
|
117 |
279d |
296d
|
25/28 |
253d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
kernel BUG in eth_header (2)
net
|
C |
|
|
2 |
329d |
329d
|
25/28 |
253d |
dad555c816a5
llc: make llc_ui_sendmsg() more robust against bonding changes
|
BUG: unable to handle kernel NULL pointer dereference in unix_stream_sendmsg
bpf
net
|
C |
|
|
1 |
289d |
289d
|
25/28 |
253d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
BUG: unable to handle kernel NULL pointer dereference in sk_psock_verdict_data_ready
net
bpf
|
C |
unreliable |
|
15 |
284d |
404d
|
25/28 |
253d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
WARNING in blk_rq_map_user_iov
block
|
C |
done |
|
3546 |
318d |
460d
|
25/28 |
257d |
13f3956eb568
block: Fix WARNING in _copy_from_iter
|
WARNING in copy_page_from_iter
block
|
C |
done |
|
1987 |
326d |
638d
|
25/28 |
257d |
13f3956eb568
block: Fix WARNING in _copy_from_iter
|
possible deadlock in unix_set_peek_off
net
|
|
|
|
8 |
294d |
299d
|
25/28 |
258d |
56667da7399e
net: implement lockless setsockopt(SO_PEEK_OFF)
|
INFO: task hung in unix_stream_sendmsg
net
|
C |
done |
|
4 |
294d |
297d
|
25/28 |
258d |
aa82ac51d633
af_unix: Drop oob_skb ref before purging queue in GC.
|
possible deadlock in __unix_dgram_recvmsg (2)
net
|
|
|
|
3 |
296d |
299d
|
25/28 |
258d |
56667da7399e
net: implement lockless setsockopt(SO_PEEK_OFF)
|
WARNING in __alloc_skb (3)
ppp
|
C |
|
|
2 |
310d |
310d
|
25/28 |
258d |
cb88cb53badb
ppp_async: limit MRU to 64K
|
BUG: unable to handle kernel paging request in copy_from_kernel_nofault
mm
|
C |
done |
|
5 |
289d |
388d
|
25/28 |
258d |
32019c659ecf
x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
|
WARNING in zswap_folio_swapin
mm
|
|
|
|
1 |
316d |
312d
|
25/28 |
258d |
16e96ba5e92c
mm/swap_state: update zswap LRU's protection range with the folio locked
|
KASAN: slab-out-of-bounds Read in getname_kernel (2)
btrfs
|
C |
done |
|
5 |
312d |
359d
|
25/28 |
258d |
9845664b9ee4
btrfs: dev-replace: properly validate device names
|
kernel BUG in end_buffer_async_write
nilfs
|
C |
inconclusive |
|
6 |
346d |
557d
|
25/28 |
258d |
5bc09b397cbf
nilfs2: fix potential bug in end_buffer_async_write
|
WARNING in send_hsr_supervision_frame (3)
net
|
|
|
|
153 |
321d |
757d
|
25/28 |
258d |
37e8c97e5390
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
|
memory leak in pppoe_sendmsg
net
|
C |
|
|
26 |
349d |
2022d
|
25/28 |
258d |
dc34ebd5c018
pppoe: Fix memory leak in pppoe_sendmsg()
|
memory leak in corrupted
bluetooth
|
syz |
|
|
536 |
258d |
330d
|
25/28 |
258d |
0a186b49bba5
batman-adv: mcast: fix memory leak on deleting a batman-adv interface
|
WARNING in __unix_gc
net
|
C |
|
|
49 |
307d |
313d
|
25/28 |
258d |
1279f9d9dec2
af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.
|
KMSAN: uninit-value in des3_ede_decrypt
crypto
|
|
|
|
1 |
299d |
295d
|
25/28 |
258d |
7cfc2ab3f025
crypto: lskcipher - Copy IV in lskcipher glue code always
|
kernel BUG in iov_iter_revert
exfat
|
C |
done |
|
5 |
311d |
330d
|
25/28 |
258d |
0991abeddefa
exfat: fix zero the unwritten part for dio read
|
WARNING: ODEBUG bug in ip_set_free
netfilter
|
C |
|
|
42 |
299d |
302d
|
25/28 |
259d |
27c5a095e251
netfilter: ipset: Missing gc cancellations fixed
|
BUG: unable to handle kernel NULL pointer dereference in hrtimer_active
kernel
|
|
|
|
1 |
305d |
303d
|
25/28 |
259d |
fe9f801355f0
net: veth: clear GRO when clearing XDP even when down
|
possible deadlock in rds_wake_sk_sleep (4)
rds
|
C |
error |
|
16 |
309d |
938d
|
25/28 |
259d |
f1acf1ac84d2
net:rds: Fix possible deadlock in rds_message_put
|
bpf test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
4 |
324d |
324d
|
25/28 |
259d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
net test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
21 |
323d |
326d
|
25/28 |
259d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
possible deadlock in rds_message_put
rds
|
C |
done |
error |
5 |
397d |
708d
|
25/28 |
259d |
f1acf1ac84d2
net:rds: Fix possible deadlock in rds_message_put
|
linux-next test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
12 |
323d |
325d
|
25/28 |
259d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
possible deadlock in skb_queue_tail (6)
net
|
|
|
|
1 |
318d |
318d
|
25/28 |
259d |
4d322dce82a1
UPSTREAM: af_unix: fix lockdep positive in sk_diag_dump_icons()
|
KASAN: slab-use-after-free Read in sock_wfree (2)
intel-wired-lan
|
C |
|
|
4 |
321d |
329d
|
25/28 |
259d |
aa2b2eb39348
llc: call sock_orphan() at release time
|
WARNING: ODEBUG bug in hash_netiface4_destroy
netfilter
|
C |
done |
|
80 |
299d |
313d
|
25/28 |
259d |
27c5a095e251
netfilter: ipset: Missing gc cancellations fixed
|
KMSAN: uninit-value in __nla_validate_parse (3)
netfilter
|
|
|
|
24 |
274d |
295d
|
25/28 |
260d |
9a0d18853c28
netlink: add nla be16/32 types to minlen array
|
possible deadlock in j1939_sk_queue_drop_all
can
|
C |
error |
done |
281 |
317d |
1190d
|
25/28 |
260d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
possible deadlock in j1939_sk_errqueue (2)
can
|
C |
done |
|
24 |
300d |
526d
|
25/28 |
260d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
memory leak in virtual_ncidev_write (2)
net
nfc
|
C |
|
|
2 |
358d |
518d
|
25/28 |
260d |
bfb007aebe6b
nfc: nci: free rx_data_reassembly skb on NCI device cleanup
|
general protection fault in tipc_udp_is_known_peer
tipc
|
C |
error |
|
1 |
346d |
359d
|
25/28 |
260d |
3871aa01e1a7
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
|
KMSAN: uninit-value in IP6_ECN_decapsulate (2)
net
|
C |
|
|
3 |
311d |
326d
|
25/28 |
260d |
8d975c15c0cd
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
|
INFO: task hung in rtnl_lock (3)
net
|
C |
|
|
128 |
265d |
617d
|
25/28 |
260d |
3871aa01e1a7
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
|
WARNING in inet_csk_destroy_sock (5)
net
|
|
|
|
1 |
325d |
325d
|
25/28 |
260d |
66b60b0c8c4a
dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().
|
possible deadlock in j1939_session_activate
can
|
C |
done |
done |
67 |
312d |
1146d
|
25/28 |
260d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
WARNING in bcm5974_start_traffic/usb_submit_urb
input
|
C |
error |
|
41 |
265d |
1860d
|
25/28 |
260d |
2b9c3eb32a69
Input: bcm5974 - check endpoint type before starting traffic
|
WARNING in ieee80211_bss_info_change_notify (2)
wireless
|
C |
done |
|
1392 |
281d |
426d
|
25/28 |
260d |
f78c1375339a
wifi: nl80211: reject iftype change with mesh ID change
|
WARNING in btrfs_issue_discard
btrfs
|
C |
done |
|
9 |
318d |
331d
|
25/28 |
260d |
a208b3f132b4
btrfs: don't warn if discard range is not aligned to sector
|
WARNING in __nf_unregister_net_hook (6)
netfilter
|
C |
error |
|
2 |
304d |
421d
|
25/28 |
260d |
bccebf647017
netfilter: nf_tables: set dormant flag on hook register failure
|
memory leak in sctp_packet_transmit
sctp
|
C |
|
|
14 |
385d |
1603d
|
25/28 |
260d |
4e45170d9acc
net: sctp: fix skb leak in sctp_inq_free()
|
KMSAN: uninit-value in geneve_xmit (2)
net
|
C |
|
|
12 |
265d |
342d
|
25/28 |
261d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
WARNING in ip6gre_tunnel_xmit
net
|
C |
done |
|
2 |
290d |
290d
|
25/28 |
261d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
KASAN: use-after-free Read in __skb_flow_dissect (3)
net
|
C |
|
|
1 |
335d |
345d
|
25/28 |
261d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
memory leak in add_block_entry
btrfs
|
C |
|
|
4 |
358d |
550d
|
25/28 |
261d |
f03e274a8b29
btrfs: ref-verify: free ref cache before clearing mount opt
|
INFO: task hung in nsim_create
net
|
|
|
|
1 |
309d |
309d
|
25/28 |
261d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
KMSAN: uninit-value in af_alg_free_sg (2)
crypto
|
|
|
|
1 |
338d |
332d
|
25/28 |
261d |
24c890dd712f
crypto: algif_hash - Remove bogus SGL free on zero-length error path
|
INFO: task hung in addrconf_dad_work (3)
net
|
C |
|
|
185 |
274d |
316d
|
25/28 |
261d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
KASAN: invalid-access Read in neon_aes_ctr_encrypt
arm
crypto
|
C |
|
|
3 |
288d |
299d
|
25/28 |
261d |
1c0cf6d19690
crypto: arm64/neonbs - fix out-of-bounds access on short input
|
memory leak in add_tree_block
btrfs
|
C |
|
|
5 |
343d |
744d
|
25/28 |
261d |
f03e274a8b29
btrfs: ref-verify: free ref cache before clearing mount opt
|
KASAN: slab-out-of-bounds Read in ntfs_listxattr (2)
ntfs3
|
C |
error |
|
15 |
309d |
351d
|
25/28 |
261d |
731ab1f98288
fs/ntfs3: Fix oob in ntfs_listxattr
|
KMSAN: kernel-infoleak in __skb_datagram_iter (2)
net
|
C |
|
|
126 |
261d |
313d
|
25/28 |
261d |
661779e1fcaf
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
|
INFO: task hung in unix_dgram_sendmsg
net
|
C |
done |
|
36 |
287d |
306d
|
25/28 |
261d |
25236c91b5ab
af_unix: Fix task hung while purging oob_skb in GC.
|
upstream boot error: can't ssh into the instance (16)
|
|
|
|
415 |
284d |
337d
|
25/28 |
261d |
f6564fce256a
mm, kmsan: fix infinite recursion due to RCU critical section
|
KMSAN: uninit-value in __llc_lookup_established
net
|
C |
|
|
46 |
329d |
372d
|
25/28 |
261d |
e3f9bed9bee2
llc: Drop support for ETH_P_TR_802_2.
|
INFO: task hung in migrate_pages_batch
nilfs
|
C |
|
|
22 |
307d |
318d
|
25/28 |
261d |
38296afe3c6e
nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
|
BUG: unable to handle kernel NULL pointer dereference in crypto_arc4_crypt
crypto
|
C |
done |
|
4 |
319d |
317d
|
25/28 |
261d |
69fba378edca
crypto: cbc - Ensure statesize is zero
|
BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry
jfs
|
C |
error |
done |
29 |
314d |
807d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in reiserfs_dirty_inode
reiserfs
|
C |
done |
done |
519 |
316d |
744d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in ntfs_lookup_inode_by_name
ntfs3
|
C |
error |
done |
17 |
277d |
712d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in do_open_execat
ntfs3
|
C |
error |
done |
12 |
321d |
481d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in udf_finalize_lvid
udf
|
C |
inconclusive |
done |
39 |
338d |
541d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: sleeping function called from invalid context in gfs2_withdraw
gfs2
|
C |
error |
done |
182 |
338d |
458d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: shift-out-of-bounds in ntfs_iget
ntfs3
|
C |
error |
done |
9 |
319d |
560d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in ntfs_iget5
ntfs3
|
C |
done |
done |
3633 |
330d |
964d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in udf_free_blocks
udf
|
C |
done |
done |
2 |
340d |
550d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: trying to register non-static key in txEnd
jfs
|
C |
inconclusive |
done |
20 |
339d |
437d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
KMSAN: uninit-value in __crc32c_le_base (3)
xfs
|
|
|
|
15526 |
276d |
594d
|
25/28 |
266d |
0573676fdde7
xfs: initialise di_crc in xfs_log_dinode
|
KASAN: use-after-free Read in ntfs_read_folio
ntfs3
|
C |
error |
done |
12 |
327d |
635d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in hfs_mdb_commit
hfs
|
C |
error |
done |
25 |
317d |
695d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in map_mft_record
ntfs3
|
C |
error |
done |
845 |
316d |
784d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in ext4_xattr_inode_iget (2)
ext4
|
C |
done |
done |
22 |
331d |
524d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Write in hfs_bnode_read_key
hfs
|
C |
error |
done |
4 |
329d |
552d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in jfs_readdir
jfs
|
C |
error |
done |
17 |
339d |
699d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: sleeping function called from invalid context in __bread_gfp
fs
|
C |
error |
done |
359 |
342d |
743d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in ntfs_iget
ntfs3
|
C |
error |
done |
73 |
280d |
657d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in reiserfs_sync_fs
reiserfs
|
C |
error |
done |
22 |
342d |
721d
|
25/28 |
266d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in kvm_mmu_notifier_invalidate_range_start (3)
kvm
|
C |
inconclusive |
done |
44 |
330d |
390d
|
25/28 |
279d |
4cccb6221cae
fs/proc/task_mmu: move mmu notification mechanism inside mm lock
|
WARNING in gfs2_check_blk_type
gfs2
|
C |
error |
done |
67 |
327d |
730d
|
25/28 |
282d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in perf_event_open
perf
|
C |
done |
done |
43004 |
342d |
357d
|
25/28 |
288d |
7e2c1e4b34f0
perf: Fix perf_event_validate_size() lockdep splat
|
KASAN: slab-out-of-bounds Write in udf_adinicb_writepage
udf
|
C |
error |
done |
5 |
340d |
629d
|
25/28 |
289d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in lmLogClose (2)
jfs
|
C |
inconclusive |
done |
5 |
336d |
428d
|
25/28 |
292d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel panic: stack is corrupted in run_unpack_ex
ntfs3
|
C |
done |
done |
3 |
346d |
704d
|
25/28 |
292d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in common_perm_cond
apparmor
ext4
|
C |
error |
done |
1 |
346d |
511d
|
25/28 |
293d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: array-index-out-of-bounds in udf_process_sequence
udf
|
C |
error |
done |
6 |
340d |
499d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in __fget_files (2)
reiserfs
|
C |
done |
done |
1 |
349d |
345d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in __generic_file_fsync (3)
exfat
ntfs3
|
C |
inconclusive |
done |
8 |
347d |
854d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in ext4_discard_allocated_blocks
ext4
|
C |
inconclusive |
done |
4 |
340d |
457d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in write_cache_pages (3)
gfs2
|
C |
done |
done |
10 |
340d |
464d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in __get_metapage
jfs
|
C |
error |
done |
32 |
338d |
792d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Write in udf_close_lvid
udf
|
C |
done |
|
144 |
339d |
933d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in ext4_search_dir
prio:low
ext4
|
C |
error |
done |
20 |
339d |
580d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: unable to handle kernel paging request in reiserfs_readdir_inode
reiserfs
|
C |
error |
done |
11 |
340d |
706d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in entry_points_to_object
reiserfs
|
C |
done |
done |
21 |
340d |
385d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel panic: stack is corrupted in __lock_acquire (5)
ntfs3
|
C |
error |
done |
18 |
339d |
716d
|
25/28 |
294d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in txLock
jfs
|
C |
inconclusive |
done |
10 |
341d |
459d
|
25/28 |
299d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in lock_two_nondirectories
ext4
|
C |
|
|
3 |
351d |
362d
|
25/28 |
299d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in utf8nlookup
ext4
|
C |
done |
done |
3 |
342d |
448d
|
25/28 |
299d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in ext4_enable_quotas
ext4
|
C |
error |
done |
16 |
343d |
524d
|
25/28 |
299d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: out-of-bounds Read in ext4_ext_remove_space
ext4
|
C |
error |
done |
8 |
342d |
516d
|
25/28 |
299d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: vmalloc-out-of-bounds Read in cleanup_bitmap_list
reiserfs
|
C |
error |
done |
100 |
343d |
775d
|
25/28 |
299d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in hfsplus_read_wrapper
hfs
|
C |
inconclusive |
done |
7 |
350d |
573d
|
25/28 |
300d |
6f861765464f
fs: Block writes to mounted block devices
|
KMSAN: uninit-value in io_rw_fail (2)
io-uring
|
|
|
|
1 |
310d |
306d
|
25/28 |
301d |
0a535eddbe0d
io_uring/rw: ensure io->bytes_done is always initialized
|
KASAN: null-ptr-deref Read in ida_free (4)
bluetooth
|
C |
done |
done |
29 |
354d |
393d
|
25/28 |
301d |
af73483f4e8b
ida: Fix crash in ida_free when the bitmap is empty
|
KASAN: use-after-free Read in set_de_name_and_namelen
reiserfs
|
C |
error |
done |
15 |
346d |
747d
|
25/28 |
302d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in dtSearch
jfs
|
C |
error |
done |
33 |
345d |
808d
|
25/28 |
302d |
6f861765464f
fs: Block writes to mounted block devices
|
KMSAN: uninit-value in tcp_recvmsg (3)
net
|
|
|
|
1 |
347d |
334d
|
25/28 |
306d |
78fbb92af27d
nbd: always initialize struct msghdr completely
|
UBSAN: shift-out-of-bounds in dbSplit
jfs
|
C |
error |
done |
7 |
345d |
799d
|
25/28 |
306d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in hci_rfkill_set_block
bluetooth
|
C |
done |
|
3391 |
342d |
415d
|
25/28 |
310d |
769bf60e17ee
Bluetooth: Fix deadlock in vhci_send_frame
|
KASAN: use-after-free Read in udf_sync_fs
udf
|
C |
done |
done |
37 |
349d |
487d
|
25/28 |
312d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in ext4_convert_inline_data_nolock
ext4
|
C |
error |
done |
7 |
349d |
625d
|
25/28 |
312d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING: ODEBUG bug in netdev_run_todo
batman
|
C |
error |
error |
5467 |
536d |
1590d
|
25/28 |
312d |
abac3ac97fe8
batman-adv: Broken sync while rescheduling delayed work
|
BUG: unable to handle kernel NULL pointer dereference in reiserfs_find_entry
reiserfs
|
C |
error |
done |
25 |
349d |
785d
|
25/28 |
313d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: shift-out-of-bounds in ext4_handle_clustersize (2)
ext4
|
C |
error |
done |
3 |
350d |
354d
|
25/28 |
313d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in seq_read_iter (2)
overlayfs
|
C |
done |
done |
14 |
352d |
511d
|
25/28 |
313d |
da40448ce4eb
fs: move file_start_write() into direct_splice_actor()
|
KMSAN: uninit-value in io_rw_fail
io-uring
|
C |
|
|
25 |
316d |
332d
|
25/28 |
314d |
0a535eddbe0d
io_uring/rw: ensure io->bytes_done is always initialized
|
KASAN: slab-use-after-free Write in fib6_purge_rt
net
|
|
|
|
1 |
384d |
384d
|
25/28 |
314d |
5a08d0065a91
ipv6: add debug checks in fib6_info_release()
|
KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim (2)
net
|
C |
|
|
17 |
316d |
341d
|
25/28 |
314d |
d375b98e0248
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
|
riscv/fixes boot error: failed to read from qemu: EOF
|
|
|
|
54 |
370d |
379d
|
25/28 |
314d |
420370f3ae3d
riscv: Check if the code to patch lies in the exit section
|
kernel BUG in ntfs_truncate
ntfs3
|
C |
error |
done |
4 |
351d |
709d
|
25/28 |
315d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in hfsplus_find_init
hfs
|
C |
error |
done |
1 |
357d |
451d
|
25/28 |
315d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in reiserfs_get_unused_objectid
reiserfs
|
C |
inconclusive |
done |
3 |
351d |
624d
|
25/28 |
315d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in timerqueue_del (2)
kernel
|
C |
done |
done |
3 |
357d |
498d
|
25/28 |
315d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in udf_new_block
udf
|
C |
inconclusive |
done |
31 |
351d |
635d
|
25/28 |
315d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in __mark_chain_precision (3)
bpf
|
C |
done |
|
19 |
346d |
367d
|
25/28 |
315d |
482d548d40b0
bpf: handle fake register spill to stack with BPF_ST_MEM instruction
|
KMSAN: uninit-value in subflow_check_req
mptcp
|
C |
|
|
63 |
341d |
336d
|
25/28 |
315d |
66ff70df1a91
mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req()
|
KASAN: use-after-free Read in ext4_find_extent (3)
prio:low
ext4
|
C |
error |
done |
31 |
351d |
533d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in ext4_write_inline_data_end
ext4
|
C |
error |
done |
32 |
352d |
650d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in path_mount (2)
jfs
|
C |
error |
done |
8 |
352d |
480d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in crc_itu_t
udf
|
C |
inconclusive |
done |
50 |
352d |
802d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in scatterwalk_copychunks (5)
crypto
|
C |
done |
|
2920 |
344d |
351d
|
25/28 |
316d |
744e1885922a
crypto: scomp - fix req->dst buffer overflow
|
KASAN: slab-out-of-bounds Write in squashfs_readahead (2)
squashfs
|
C |
done |
|
2 |
399d |
395d
|
25/28 |
316d |
12427de9439d
Squashfs: fix variable overflow triggered by sysbot
|
KASAN: slab-use-after-free Read in nla_find
bpf
net
|
C |
done |
|
4 |
360d |
359d
|
25/28 |
316d |
2130c519a401
bpf: Use nla_ok() instead of checking nla_len directly
|
KASAN: slab-use-after-free Read in nfc_alloc_send_skb
net
nfc
|
C |
error |
|
3 |
369d |
398d
|
25/28 |
316d |
c95f919567d6
nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local
|
KASAN: slab-use-after-free Read in jfs_evict_inode
jfs
|
syz |
error |
|
1 |
415d |
411d
|
25/28 |
316d |
e0e1958f4c36
jfs: fix uaf in jfs_evict_inode
|
kernel BUG in move_pages
mm
|
C |
done |
|
2 |
339d |
335d
|
25/28 |
316d |
5d4747a6cc8e
userfaultfd: avoid huge_zero_page in UFFDIO_MOVE
|
general protection fault in bio_first_folio
block
|
C |
done |
|
683 |
327d |
361d
|
25/28 |
316d |
7bed6f3d08b7
block: Fix iterating over an empty bio with bio_for_each_folio_all
|
general protection fault in bfs_get_block (2)
bfs
|
C |
error |
done |
2 |
363d |
382d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in arc4_crypt
crypto
|
C |
done |
|
6 |
348d |
359d
|
25/28 |
316d |
37c6fc323a81
crypto: skcipher - Pass statesize for simple lskcipher instances
|
WARNING in get_pte_pfn
mm
io-uring
|
C |
error |
|
2 |
345d |
355d
|
25/28 |
316d |
c28ac3c7eb94
mm/mglru: skip special VMAs in lru_gen_look_around()
|
UBSAN: array-index-out-of-bounds in diNewExt
jfs
|
C |
inconclusive |
|
31 |
316d |
367d
|
25/28 |
316d |
49f9637aafa6
jfs: fix array-index-out-of-bounds in diNewExt
|
INFO: task hung in gfs2_gl_hash_clear (3)
gfs2
|
C |
error |
done |
80 |
355d |
743d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: corrupted list in efivar_entry_remove
efi
|
C |
|
|
104 |
317d |
838d
|
25/28 |
316d |
cdb46a8aefbf
efivarfs: Move efivarfs list into superblock s_fs_info
|
KCSAN: data-race in udpv6_sendmsg / udpv6_sendmsg (6)
net
|
|
|
|
1 |
338d |
334d
|
25/28 |
316d |
482521d8e0c6
udp: annotate data-races around up->pending
|
general protection fault in dtSplitUp
jfs
|
C |
error |
done |
2 |
366d |
802d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in ip6_route_multipath_add
net
|
|
|
|
1 |
367d |
367d
|
25/28 |
316d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
BUG: unable to handle kernel NULL pointer dereference in __bio_release_pages
block
|
C |
|
|
6 |
332d |
330d
|
25/28 |
316d |
7bed6f3d08b7
block: Fix iterating over an empty bio with bio_for_each_folio_all
|
general protection fault in tomoyo_check_acl (3)
hfs
|
C |
inconclusive |
done |
1 |
366d |
523d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in hfsc_tcf_block
net
|
C |
done |
|
1020 |
339d |
346d
|
25/28 |
316d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
possible deadlock in chown_common
reiserfs
|
C |
error |
done |
22 |
324d |
794d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in __udf_add_aext (2)
udf
|
syz |
error |
done |
6 |
366d |
547d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: sleeping function called from invalid context in glock_hash_walk
gfs2
|
C |
done |
done |
31 |
362d |
463d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: array-index-out-of-bounds in diWrite
jfs
|
C |
error |
done |
13 |
363d |
782d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in pvr2_context_set_notify
usb
pvrusb2
|
C |
|
|
3814 |
316d |
522d
|
25/28 |
316d |
ded85b0c0edd
media: pvrusb2: fix use after free on context disconnection
|
BUG: sleeping function called from invalid context in gfs2_make_fs_ro
gfs2
|
C |
error |
done |
1 |
362d |
505d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in kill_f2fs_super
f2fs
|
C |
done |
|
2331 |
329d |
334d
|
25/28 |
316d |
c919330dd578
f2fs: fix double free of f2fs_sb_info
|
kernel BUG in balance_leaf
reiserfs
|
C |
error |
done |
16 |
356d |
707d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING: locking bug in corrupted (2)
bpf
reiserfs
|
C |
done |
done |
1 |
366d |
520d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in mptcp_check_listen_stop
mptcp
|
C |
done |
|
47 |
316d |
364d
|
25/28 |
316d |
4c0288299fd0
mptcp: prevent tcp diag from closing listener subflows
|
WARNING in __sk_msg_free
bpf
net
|
C |
done |
|
4 |
342d |
341d
|
25/28 |
316d |
dc9dfc8dc629
net: tls, fix WARNIING in __sk_msg_free
|
possible deadlock in pipe_write
fs
|
C |
inconclusive |
|
181 |
318d |
997d
|
25/28 |
316d |
055ca8355991
fs/pipe: Fix lockdep false-positive in watchqueue pipe_write()
|
KMSAN: uninit-value in z_erofs_lz4_decompress (2)
erofs
|
C |
|
|
33 |
317d |
350d
|
25/28 |
316d |
496530c7c1df
erofs: avoid debugging output for (de)compressed data
|
INFO: trying to register non-static key in do_mpage_readpage
ntfs3
|
C |
error |
done |
24 |
360d |
714d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in direntry_check_right
reiserfs
|
C |
done |
done |
2 |
354d |
398d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in dsa_user_changeupper
net
|
C |
done |
|
1303 |
323d |
337d
|
25/28 |
316d |
844f104790bd
net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events
|
WARNING in __folio_rmap_sanity_checks
mm
|
C |
done |
|
168 |
338d |
343d
|
25/28 |
316d |
9c5938694cd0
mm/rmap: silence VM_WARN_ON_FOLIO() in __folio_rmap_sanity_checks()
|
WARNING in ea_get
jfs
|
C |
error |
done |
10 |
358d |
804d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
riscv/fixes boot error: kernel BUG in __phys_addr_symbol
riscv
|
|
|
|
24 |
357d |
369d
|
25/28 |
316d |
c29fc621e1a4
riscv: Fix wrong usage of lm_alias() when splitting a huge linear mapping
|
INFO: task hung in find_inode_fast (2)
ext4
|
C |
unreliable |
done |
10 |
363d |
517d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in search_by_key (2)
reiserfs
|
C |
|
|
4435 |
338d |
769d
|
25/28 |
316d |
dd8f87f21dc3
reiserfs: fix uninit-value in comp_keys
|
UBSAN: array-index-out-of-bounds in dtSplitRoot
jfs
|
C |
error |
inconclusive |
2 |
460d |
788d
|
25/28 |
316d |
27e56f59bab5
UBSAN: array-index-out-of-bounds in dtSplitRoot
|
possible deadlock in ntfs_set_state
ntfs3
|
C |
done |
done |
1360 |
328d |
721d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in txEnd
jfs
|
C |
inconclusive |
done |
6 |
326d |
540d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING: suspicious RCU usage in __cfg80211_bss_update
wireless
|
C |
done |
|
92 |
341d |
343d
|
25/28 |
316d |
1184950e341c
wifi: cfg80211: fix RCU dereference in __cfg80211_bss_update
|
general protection fault in qdisc_create
net
|
C |
done |
|
2821 |
338d |
346d
|
25/28 |
316d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
BUG: unable to handle kernel paging request in lookup_open
ntfs3
|
C |
error |
done |
1 |
365d |
510d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: unable to handle kernel NULL pointer dereference in gfs2_rgrp_dump
gfs2
|
C |
done |
|
9 |
373d |
716d
|
25/28 |
316d |
8877243beafa
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
|
general protection fault in __hrtimer_run_queues (3)
reiserfs
|
C |
error |
done |
2 |
367d |
532d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in dev_watchdog (2)
net
|
C |
inconclusive |
|
6791 |
318d |
1717d
|
25/28 |
316d |
e316dd1cf135
net: don't dump stack on queue timeout
|
WARNING in kvm_mmu_notifier_change_pte
kvm
|
C |
inconclusive |
|
2 |
354d |
364d
|
25/28 |
316d |
4cccb6221cae
fs/proc/task_mmu: move mmu notification mechanism inside mm lock
|
WARNING: refcount bug in tcp_sigpool_alloc_ahash
net
|
|
|
|
1 |
357d |
357d
|
25/28 |
316d |
b901a4e27694
net/tcp_sigpool: Use kref_get_unless_zero()
|
possible deadlock in stack_depot_put
kasan
|
|
|
|
23 |
360d |
382d
|
25/28 |
316d |
a414d4286f34
kasan: handle concurrent kasan_record_aux_stack calls
|
KMSAN: uninit-value in netif_skb_features (2)
net
|
C |
|
|
9 |
360d |
448d
|
25/28 |
316d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
INFO: task hung in hwrng_fillfn
crypto
|
C |
error |
|
27 |
318d |
382d
|
25/28 |
316d |
78aafb3884f6
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
|
kernel BUG in ext4_split_extent_at (2)
ext4
|
C |
error |
done |
3 |
353d |
547d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: unable to handle kernel NULL pointer dereference in gfs2_rindex_update
gfs2
|
C |
error |
done |
4 |
361d |
720d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in ip6_route_info_create
net
|
C |
done |
|
241 |
366d |
370d
|
25/28 |
316d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
general protection fault in page_pool_unlist
net
|
C |
done |
|
648 |
376d |
378d
|
25/28 |
316d |
f9893fdac319
net: page_pool: fix general protection fault in page_pool_unlist
|
KMSAN: uninit-value in shrinker_alloc
mm
|
syz |
|
|
2 |
366d |
344d
|
25/28 |
316d |
7fba9420b726
mm: shrinker: use kvzalloc_node() from expand_one_shrinker_info()
|
possible deadlock in __run_timers
reiserfs
|
C |
error |
done |
1 |
364d |
360d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: shift-out-of-bounds in dbJoin
jfs
|
C |
error |
|
3 |
409d |
793d
|
25/28 |
316d |
cca974daeb6c
jfs: fix shift-out-of-bounds in dbJoin
|
KCSAN: data-race in ipv6_mc_down / mld_ifc_work (2)
net
|
|
|
|
2 |
328d |
334d
|
25/28 |
316d |
2e7ef287f07c
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
|
UBSAN: array-index-out-of-bounds in dbAdjTree
jfs
|
C |
error |
error |
41 |
330d |
807d
|
25/28 |
316d |
9862ec7ac1cb
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
74ecdda68242
jfs: fix array-index-out-of-bounds in dbAdjTree
|
KASAN: slab-use-after-free Read in destroy_device_list
f2fs
|
C |
done |
|
3597 |
329d |
333d
|
25/28 |
316d |
c919330dd578
f2fs: fix double free of f2fs_sb_info
|
kernel BUG in gfs2_quota_cleanup
gfs2
|
C |
done |
|
4 |
358d |
458d
|
25/28 |
316d |
71733b492200
gfs2: fix kernel BUG in gfs2_quota_cleanup
|
KMSAN: uninit-value in validate_xmit_skb
net
|
C |
|
|
21 |
317d |
335d
|
25/28 |
316d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
kernel BUG in flush_journal_list
reiserfs
|
C |
done |
done |
3 |
360d |
548d
|
25/28 |
316d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in htb_tcf_block
net
|
C |
done |
|
885 |
338d |
346d
|
25/28 |
316d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
KMSAN: uninit-value in ppp_sync_receive
ppp
|
|
|
|
2 |
393d |
392d
|
25/28 |
317d |
719639853d88
tty: Fix uninit-value access in ppp_sync_receive()
|
INFO: trying to register non-static key in debugfs_file_get
fs
|
|
|
|
289 |
356d |
356d
|
25/28 |
323d |
88ac06a9f938
Revert "debugfs: annotate debugfs handlers vs. removal with lockdep"
|
WARNING in debugfs_file_get
fs
|
|
|
|
239 |
357d |
374d
|
25/28 |
323d |
88ac06a9f938
Revert "debugfs: annotate debugfs handlers vs. removal with lockdep"
|
kernel BUG in prog_array_map_poke_run
bpf
|
C |
done |
done |
35 |
359d |
400d
|
25/28 |
324d |
4b7de801606e
bpf: Fix prog_array_map_poke_run map poke update
|
WARNING in rose_device_event
hams
|
|
|
|
1 |
364d |
364d
|
25/28 |
324d |
64b8bc7d5f14
net/rose: fix races in rose_kill_by_device()
|
general protection fault in skb_segment (4)
net
|
C |
error |
|
4 |
360d |
368d
|
25/28 |
325d |
23d05d563b7e
net: prevent mss overflow in skb_segment()
|
Internal error in fib6_table_lookup
net
|
|
|
|
2 |
393d |
394d
|
25/28 |
325d |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
KCSAN: data-race in wg_xmit / wg_xmit (4)
wireguard
|
|
|
|
1 |
398d |
392d
|
25/28 |
325d |
93da8d75a665
wireguard: use DEV_STATS_INC()
|
Internal error in fib6_rule_lookup
net
|
|
|
|