syzbot


Title Repro Cause bisect Fix bisect Count Last Reported Closed Patch
upstream build error (11) 25 3d03h 79d 3d03h f78f63da mm/process_vm_access: Add missing #include <linux/compat.h>
possible deadlock in process_measurement (2) C done done 56 43d 410d 9d19h 15a8d68e mm/hugetlb: a page from buddy is not on any list
INFO: rcu detected stall in sys_open (2) C done done 42 66d 417d 23d 1d0e850a afs: Fix cell removal
BUG: unable to handle kernel paging request in cfb_imageblit C done done 30 58d 101d 23d a49145ac fbmem: add margin check to fb_check_caps()
KASAN: use-after-free Read in eth_type_trans C done error 3 246d 389d 23d 96aa1b22 tun: correct header offsets in napi frags mode
BUG: MAX_LOCKDEP_KEYS too low! C done error 3496 202d 446d 37d 1a33e10e net: partially revert dynamic lockdep key changes
BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! C done error 25236 240d 681d 37d 1a33e10e net: partially revert dynamic lockdep key changes
INFO: rcu detected stall in __se_sys_mount C done done 2 69d 193d 38d 1d0e850a afs: Fix cell removal
BUG: sleeping function called from invalid context in ext4_superblock_csum_set 2 68d 74d 41d d196e229 Revert "ext4: fix superblock checksum calculation race"
KASAN: null-ptr-deref Write in kthread_use_mm C done 2 74d 74d 56d 4b70cf9d io_uring: ensure consistent view of original task ->mm from SQPOLL
WARNING in close_fs_devices (2) C 23 58d 119d 56d cf89af14 btrfs: dev-replace: fail mount if we don't have replace item with target device
memory leak in gadget_setup C 49 67d 84d 56d 129aa973 usb: raw-gadget: fix memory leak in gadget_setup
memory leak in gadget_bind C 62 67d 84d 56d 129aa973 usb: raw-gadget: fix memory leak in gadget_setup
general protection fault in io_uring_show_cred C done 4 71d 71d 56d 6b47ab81 io_uring: use correct pointer for io_uring_show_cred()
KASAN: use-after-free Write in io_submit_sqes C error 2 74d 73d 56d cb8a8ae3 io_uring: drop req/tctx io_identity separately
KASAN: use-after-free Read in __proc_create 1 111d 109d 60d 1d0e850a afs: Fix cell removal
INFO: rcu detected stall in process_one_work (3) C done done 1 100d 142d 60d 1d0e850a afs: Fix cell removal
INFO: task can't die in corrupted C done 4 73d 100d 60d 86f33603 f2fs: handle errors of f2fs_get_meta_page_nofail
BUG: corrupted list in kobject_add_internal C done done 9 98d 161d 60d a46b7ed4 Bluetooth: Fix auto-creation of hci_conn at Conn Complete event
WARNING in dma_map_page_attrs C unreliable 304 69d 86d 60d 683a9c7e RDMA: Fix software RDMA drivers for dma mapping error
WARNING in unlock_new_inode C done 76 97d 1002d 60d 8859bf2b reiserfs: only call unlock_new_inode() if I_NEW
memory leak in ieee80211_check_fast_xmit C 983 69d 113d 60d dcd479e1 mac80211: always wind down STA state
WARNING: suspicious RCU usage in ovs_flow_tbl_masks_cache_resize C error 1 79d 79d 60d fea07a48 net: openvswitch: silence suspicious RCU usage warning
general protection fault in xsk_release C done 2 112d 112d 60d 1fd17c8c xsk: Fix possible crash in socket_release when out-of-memory
memory leak in reiserfs_parse_options C 4 124d 320d 60d e9d4709f reiserfs: Fix memory leak in reiserfs_parse_options()
KMSAN: kernel-infoleak in scsi_cmd_ioctl 131 64d 137d 60d 6d53a9fe block/scsi-ioctl: Fix kernel-infoleak in scsi_put_cdrom_generic_arg()
WARNING in binder_transaction_buffer_release (2) C done done 442 193d 233d 60d e8b8ae7c binder: Remove bogus warning on failed same-process transaction
BUG: using __this_cpu_read() in preemptible code in trace_hardirqs_on C done 502745 62d 94d 60d f8e48a3d lockdep: Fix preemption WARN for spurious IRQ-enable
INFO: task hung in wdm_flush C 38294 137d 522d 60d 37d2a363 USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync().
INFO: trying to register non-static key in uhid_char_release C done done 26 137d 314d 60d bce1305c HID: core: Correctly handle ReportSize being zero
WARNING in ieee80211_s1g_channel_width C done 3 102d 102d 60d c1cd35c6 cfg80211: only allow S1G channels on S1G band
KMSAN: uninit-value in ieee80211_skb_resize C 5 88d 113d 60d 14f46c1e mac80211: fix use of skb payload instead of header
KASAN: global-out-of-bounds Read in precalculate_color C done done 170 121d 413d 60d e3158a5e media: vivid: Fix global-out-of-bounds read in precalculate_color()
general protection fault in percpu_ref_exit C done 3 95d 99d 60d 7ea6bf2e percpu_ref: don't refer to ref->data if it isn't allocated
KASAN: use-after-free Write in tcindex_change C done done 4 303d 303d 60d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
general protection fault in gfs2_rgrp_dump 1 101d 101d 60d 0e539ca1 gfs2: Fix NULL pointer dereference in gfs2_rgrp_dump
WARNING: refcount bug in do_enable_set C inconclusive done 8 162d 272d 60d b83764f9 Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
possible deadlock in cleanup_net C done 281 129d 137d 60d d966ddcc tipc: fix a deadlock when flushing scheduled work
general protection fault in utf8_casefold C done 1 99d 99d 60d f6322f3f f2fs: reject CASEFOLD inode flag without casefold feature
KASAN: use-after-free Read in sctp_auth_free C done 4 98d 100d 60d d42ee76e net-backports: sctp: fix sctp_auth_init_hmacs() error path
kernel panic: Fatal exception (3) C done 2 94d 93d 60d eadd1bef netem: fix zero division in tabledist
KASAN: use-after-free Read in ath9k_hif_usb_rx_cb C 2849 60d 295d 60d 03fb92a4 ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs()
memory leak in udf_process_sequence C 4 112d 116d 60d a7be300d udf: Fix memory leak when mounting
general protection fault in unlink_file_vma C done 1 132d 128d 60d bc4fe4cd mm: mmap: Fix general protection fault in unlink_file_vma()
KASAN: use-after-free Read in fscache_alloc_cookie syz done 1 112d 112d 60d 1d0e850a afs: Fix cell removal
KASAN: unknown-crash Read in do_exit C inconclusive done 2 118d 123d 60d a49145ac fbmem: add margin check to fb_check_caps()
WARNING in handle_exception_nmi C error done 2653 101d 106d 60d f8e48a3d lockdep: Fix preemption WARN for spurious IRQ-enable
KASAN: use-after-free Read in tipc_named_reinit 6 165d 219d 60d fdeba99b tipc: fix use-after-free in tipc_bcast_get_mode
kernel BUG at fs/f2fs/segment.h:LINE! 9 106d 117d 60d 6a257471 f2fs: fix to check segment boundary during SIT page readahead
KMSAN: uninit-value in ip_tunnel_xmit (2) C 11778 64d 889d 60d fdafed45 ip_gre: set dev->hard_header_len and dev->needed_headroom properly
WARNING: refcount bug in p9_req_put syz inconclusive done 6 239d 792d 60d a39c4606 net/9p: validate fds in p9_fd_open
INFO: rcu detected stall in ip_list_rcv C error done 3 108d 134d 60d 1d0e850a afs: Fix cell removal
UBSAN: array-index-out-of-bounds in precalculate_color C 153 95d 120d 60d e3158a5e media: vivid: Fix global-out-of-bounds read in precalculate_color()
KMSAN: uninit-value in can_receive (2) C 2060 64d 159d 60d e009f95b can: j1935: j1939_tp_tx_dat_new(): fix missing initialization of skbcnt
WARNING in syscall_exit_to_user_mode C done done 1 98d 126d 60d a49145ac fbmem: add margin check to fb_check_caps()
general protection fault in tcf_generic_walker syz 9 107d 109d 60d 580e4273 net_sched: check error pointer in tcf_dump_walker()
WARNING in print_bfs_bug C done 14759 92d 444d 60d 6d1823cc lockdep: Optimize the memory usage of circular queue
KASAN: use-after-free Read in io_wqe_worker C error 2 109d 111d 60d c4068bf8 io-wq: fix use-after-free in io_wq_worker_running
INFO: task hung in io_uring_setup C done 51 129d 134d 60d 7e84e1c7 io_uring: allow disabling rings during the creation
KMSAN: uninit-value in unix_find_other C 57 105d 921d 60d 7ca1db21 net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
KASAN: use-after-free Read in delete_partition C done done 3 136d 132d 60d 08fc1ab6 block: fix locking in bdev_del_partition
WARNING in get_signal C done 2 103d 105d 60d 7b3c36fc ptrace: fix task_join_group_stop() for the case when current is traced
KASAN: use-after-free Write in refcount_warn_saturate C inconclusive done 2 163d 322d 60d b83764f9 Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
INFO: task hung in addrconf_verify_work (3) C done 75 73d 107d 60d 0fedc63f net_sched: commit action insertions together
kernel panic: stack is corrupted in get_kernel_gp_address syz done done 1 93d 125d 60d a49145ac fbmem: add margin check to fb_check_caps()
WARNING: ODEBUG bug in exit_to_user_mode_prepare C done done 27 134d 140d 60d 77f4689d fix regression in "epoll: Keep a reference on files added to the check list"
KMSAN: uninit-value in batadv_hard_if_event (2) C 162 76d 159d 60d f45a4248 net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails
INFO: task hung in ctrl_getfamily syz done done 22 153d 766d 60d 47733f9d tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
WARNING: suspicious RCU usage in io_init_identity 1536 86d 91d 60d 1e6fa521 io_uring: COW io_identity on mismatch
KASAN: out-of-bounds Read in __switch_to (2) syz done done 1 108d 104d 60d a49145ac fbmem: add margin check to fb_check_caps()
WARNING: suspicious RCU usage in qrtr_ns_worker C done 1 141d 204d 60d a7809ff9 net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
inconsistent lock state in xa_destroy C 755 98d 99d 60d ca6484cd io_uring: no need to call xa_destroy() on empty xarray
KASAN: use-after-free Write in afs_manage_cell C done done 20 92d 161d 60d 1d0e850a afs: Fix cell removal
possible deadlock in _snd_pcm_stream_lock_irqsave C done 997 91d 128d 60d 6564d0ad ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock
INFO: task hung in io_uring_flush C done done 11 151d 158d 60d b7ddce3c io_uring: fix cancel of deferred reqs with ->files
memory leak in kobject_set_name_vargs (3) C 19 60d 116d 60d cb8d53d2 ext4: fix leaking sysfs kobject after failed mount
WARNING in percpu_ref_exit (2) C done done 272 95d 391d 60d c1e2148f io_uring: free fixed_file_data after RCU grace period
KASAN: slab-out-of-bounds Write in gfs2_fill_super C done 1 108d 107d 60d 0ddc5154 gfs2: add validation checks for size of superblock
WARNING in rxrpc_recvmsg C error done 5 195d 195d 60d 65550098 rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
general protection fault in open_xa_dir C done 3 95d 107d 60d c2bb80b8 reiserfs: Fix oops during mount
KASAN: use-after-free Read in tcf_action_init C done 1 112d 109d 60d 0fedc63f net_sched: commit action insertions together
KMSAN: uninit-value in search_by_key 1549 65d 116d 60d 4443390e reiserfs: Initialize inode keys properly
INFO: task hung in ubi_detach_mtd_dev syz error error 4 240d 326d 60d d005f8c6 ubi: check kthread_should_stop() after the setting of task state
bpf-next test error: BUG: program execution failed: executor 0: exit status 67 12 91d 92d 60d d25e2e93 netfilter: restore NF_INET_NUMHOOKS
KMSAN: uninit-value in f2fs_lookup 17 72d 112d 60d 6d7ab88a f2fs: fix uninit-value in f2fs_lookup
INFO: rcu detected stall in exit_group C done done 1 97d 127d 60d 1d0e850a afs: Fix cell removal
KASAN: slab-out-of-bounds Read in ntfs_attr_find C done 9 93d 1019d 60d 4f8c9402 ntfs: add check for mft record size in superblock
KASAN: slab-out-of-bounds Read in strset_parse_request C error 141 99d 99d 60d db972e53 ethtool: strset: allow ETHTOOL_A_STRSET_COUNTS_ONLY attr
WARNING in arch_install_hw_breakpoint C inconclusive done 8 546d 663d 60d e898e69d x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error
KASAN: stack-out-of-bounds Read in xfrm_selector_match (2) 1 118d 116d 60d e94ee171 xfrm: Use correct address family in xfrm_state_find
KASAN: use-after-free Read in tipc_mcast_xmit (2) C done 37 91d 105d 60d ed42989e tipc: fix the skb_unshare() in tipc_buf_append()
KASAN: use-after-free Read in tipc_bcast_get_mode 1 165d 165d 60d fdeba99b tipc: fix use-after-free in tipc_bcast_get_mode
INFO: task hung in flush_to_ldisc C inconclusive done 15 336d 406d 60d e8c75a30 vt: selection, push sel_lock up
KASAN: use-after-free Write in io_wq_worker_running C error 14 103d 129d 60d c4068bf8 io-wq: fix use-after-free in io_wq_worker_running
KASAN: slab-out-of-bounds Read in soft_cursor C done 218 99d 408d 60d 988d0763 vt_ioctl: make VT_RESIZEX behave like VT_RESIZE
BUG: unable to handle kernel paging request in tcf_action_dump_terse C done 15 103d 109d 60d 580e4273 net_sched: check error pointer in tcf_dump_walker()
INFO: rcu detected stall in sys_mount (5) C done done 10 107d 128d 60d 1d0e850a afs: Fix cell removal
general protection fault in qp_release_pages C done 2 95d 95d 60d 90ca6333 VMCI: check return value of get_user_pages_fast() for errors
INFO: task hung in lock_sock_nested (3) C done 5 103d 105d 60d d9fb8c50 mptcp: fix infinite loop on recvmsg()/worker() race.
KMSAN: uninit-value in __fget_light (2) C 18 77d 86d 60d d5e4d0a5 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
WARNING in ati_remote_sendpacket/usb_submit_urb C 22 231d 542d 60d a8be8005 media: ati_remote: sanity check for both endpoints
KASAN: stack-out-of-bounds Read in csd_lock_record C 226 191d 195d 60d 35feb604 kernel/smp: Provide CSD lock timeout diagnostics
KASAN: use-after-free Read in afs_deactivate_cell (2) C done 11 98d 116d 60d 1d0e850a afs: Fix cell removal
possible deadlock in mnt_want_write C done done 662 99d 907d 60d 146d62e5 ovl: detect overlapping layers
general protection fault in ieee80211_key_free C done 3 95d 100d 60d 3dc289f8 net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key()
general protection fault in __do_sys_io_uring_register 80 87d 93d 60d 55cbc256 io_uring: fix error path cleanup in io_sqe_files_register()
KASAN: use-after-free Write in vcs_read C done 11 142d 147d 60d 52c3c3a5 Revert "vc_screen: extract vcs_read_buf_header"
WARNING in irqentry_exit C error done 2080 94d 161d 60d 4d004099 lockdep: Fix lockdep recursion
INFO: rcu detected stall in sys_newlstat C error done 1 114d 113d 60d 1d0e850a afs: Fix cell removal
kernel BUG at net/rxrpc/conn_object.c:LINE! C done 855 62d 127d 60d 546a4241 rxrpc: Fix conn bundle leak in net-namespace exit
possible deadlock in dev_uc_sync C done 3 95d 193d 60d 0e8b8d6a net: core: use list_del_init() instead of list_del() in netdev_run_todo()
WARNING in wp_page_copy syz done done 9 333d 410d 60d c3e5ea6e mm: avoid data corruption on CoW fault into PFN-mapped VMA
general protection fault in vmk80xx_write_packet C 82 100d 556d 60d e1f13c87 staging: comedi: check validity of wMaxPacketSize of usb endpoints found
general protection fault in rt6_fill_node C done done 3 144d 142d 60d eeaac363 net: nexthop: don't allow empty NHA_GROUP
KASAN: use-after-free Read in afs_manage_cell 5 101d 116d 60d 1d0e850a afs: Fix cell removal
KMSAN: uninit-value in do_ip_vs_set_ctl C 365 65d 854d 60d c5a8a849 ipvs: Fix uninit-value in do_ip_vs_set_ctl()
memory leak in __team_options_register C 1 130d 129d 60d 9a9e7749 net: team: fix memory leak in __team_options_register
general protection fault in nexthop_is_blackhole C done done 1 145d 142d 60d eeaac363 net: nexthop: don't allow empty NHA_GROUP
KASAN: use-after-free Read in ucma_close (2) syz done 1 127d 127d 60d f5449e74 RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
UBSAN: array-index-out-of-bounds in ieee80211_del_key C done 685 69d 113d 60d 3dc289f8 net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key()
INFO: task hung in htable_put C done done 29 332d 385d 60d 99b79c39 netfilter: xt_hashlimit: unregister proc file before releasing mutex
KASAN: use-after-free Write in xp_put_pool C done 50 113d 135d 60d 83cf5c68 xsk: Fix use-after-free in failed shared_umem bind
KASAN: use-after-free Read in __cfg8NUM_wpan_dev_from_attrs (2) C error done 5 194d 194d 60d bf64ff4c genetlink: get rid of family->attrbuf
kernel panic: System is deadlocked on memory C done 43 186d 184d 60d 9066e5cf mm, oom: make the calculation of oom badness more accurate
general protection fault in strncasecmp C done 1 115d 113d 60d 92e3cc91 afs: Fix rapid cell addition/removal by not using RCU on cells tree
KASAN: slab-out-of-bounds Read in f2fs_build_segment_manager C error 2 112d 112d 60d 3a22e9ac f2fs: fix to do sanity check on segment/section count
KMSAN: uninit-value in udf_get_pblock_spar15 1 115d 113d 60d 44ac6b82 udf: Limit sparing table size
WARNING: refcount bug in l2cap_chan_put C inconclusive done 13 162d 326d 60d b83764f9 Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
KASAN: use-after-free Write in afs_deactivate_cell 4 93d 113d 60d 1d0e850a afs: Fix cell removal
WARNING: proc registration bug in afs_manage_cell C done 1 113d 109d 60d 1d0e850a afs: Fix cell removal
INFO: trying to register non-static key in exfat_cache_inval_inode C done 4 102d 109d 60d 8ff006e5 exfat: fix use of uninitialized spinlock on error path
WARNING in nla_get_range_unsigned C done 63 135d 137d 60d c30a3c95 netlink: policy: correct validation type check
KASAN: use-after-free Read in bit_putcs C 12 107d 327d 60d 988d0763 vt_ioctl: make VT_RESIZEX behave like VT_RESIZE
BUG: using smp_processor_id() in preemptible code in tipc_crypto_xmit C done done 468 132d 203d 60d bb8872a1 tipc: fix using smp_processor_id() in preemptible
general protection fault in xsk_is_setup_for_bpf_map C error 294 112d 135d 60d 968be23c xsk: Fix possible segfault at xskmap entry insertion
KMSAN: uninit-value in udf_evict_inode 159 64d 112d 60d 044e2e26 udf: Avoid accessing uninitialized data on failed inode read
inconsistent lock state in io_uring_add_task_file 1 99d 98d 60d ce765372 io_uring: Fix use of XArray in __io_uring_files_cancel
memory leak in read_adv_mon_features C 2 129d 153d 60d cafd472a Bluetooth: Fix memory leak in read_adv_mon_features()
INFO: trying to register non-static key in del_timer_sync (2) C 1206 592d 644d 60d 621a3a8b mwifiex: don't call del_timer_sync() on uninitialized timer
inconsistent lock state in icmp_send syz done done 1 267d 765d 60d 13788174 tipc: block BH before using dst_cache
INFO: task can't die in rtnetlink_rcv_msg 5 100d 109d 60d 0fedc63f net_sched: commit action insertions together
BUG: unable to handle kernel paging request in pvclock_gtod_notify C done done 8 106d 125d 60d a49145ac fbmem: add margin check to fb_check_caps()
INFO: trying to register non-static key in uhid_dev_destroy C unreliable done 40 142d 315d 60d bce1305c HID: core: Correctly handle ReportSize being zero
WARNING in bpf_raw_tp_link_fill_link_info C error 56 113d 127d 60d b474959d bpf: Fix a buffer out-of-bound access when filling raw_tp link_info
KMSAN: uninit-value in qtree_entry_unused 396 64d 116d 60d 3d3dc274 quota: clear padding in v2r1_mem2diskdqb()
KASAN: use-after-free Write in rxrpc_put_bundle C done 229 98d 121d 60d f3af4ad1 rxrpc: Fix bundle counting for exclusive connections
KASAN: use-after-free Read in tcf_action_destroy C done 8 102d 117d 60d 0fedc63f net_sched: commit action insertions together
memory leak in xdp_umem_create C 17 64d 84d 60d e5e1a4bc xsk: Fix possible memory leak at socket close
general protection fault in xsk_diag_dump (2) C 354 117d 135d 60d 53ea2076 xsk: Fix possible segfault in xsk umem diagnostics
INFO: rcu detected stall in security_file_open (3) C done done 2 108d 107d 60d 1d0e850a afs: Fix cell removal
general protection fault in tcf_action_destroy (2) C done done 29 97d 310d 60d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
KASAN: global-out-of-bounds Read in fbcon_get_font C inconclusive inconclusive 41 105d 402d 60d 5af08640 fbcon: Fix global-out-of-bounds read in fbcon_get_font()
WARNING: suspicious RCU usage in ctrl_cmd_new_lookup C done done 10 115d 204d 60d a7809ff9 net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
general protection fault in io_poll_double_wake (2) C error 2 110d 109d 86d 8706e04e io_uring: always delete double poll wait entry on match
possible deadlock in io_write 2 107d 109d 86d fad8e0de io_uring: fix potential ABBA deadlock in ->show_fdinfo()
kernel BUG at lib/string.c:LINE! (5) C done 558 113d 122d 92d 35be8851 btrfs: fix overflow when copying corrupt csums for a message
general protection fault in madvise_cold_or_pageout_pte_range C done 3 113d 123d 94d ce268425 mm: validate pmd after splitting
KASAN: global-out-of-bounds Read in fbcon_resize C error 673 116d 148d 97d ec0972ad fbcon: Fix user font detection test at fbcon_resize().
WARNING: suspicious RCU usage in fib6_del (2) 1 129d 129d 97d 843d926b ipv6: avoid lockdep issue in fib6_del()
KASAN: use-after-free Read in ieee8NUM_tx 1 131d 131d 97d 0ff4628f mac802154: tx: fix use-after-free
general protection fault in wg_index_hashtable_replace 2 118d 129d 97d 9179ba31 wireguard: noise: take lock when removing handshake entry from table
memory leak in do_seccomp C 6 130d 157d 97d a566a901 seccomp: don't leak memory when filter install races
inconsistent lock state in padata_do_parallel 9 116d 135d 97d 1b0df11f padata: fix possible padata_works_lock deadlock
KASAN: use-after-free Write in skb_queue_tail 1 129d 129d 97d 3ca1a42a net: qrtr: check skb_put_padto() return value
possible deadlock in peernet2id_alloc 12 128d 300d 97d e1f469cd Revert "netns: don't disable BHs when locking "nsid_lock""
KMSAN: uninit-value in __inet_diag_dump C 37 99d 116d 97d d5e4d0a5 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
memory leak in do_eventfd C 2 144d 239d 97d f6588660 KVM: fix memory leak in kvm_io_bus_unregister_dev()
KASAN: slab-out-of-bounds Read in read_descriptors (2) 1 147d 143d 97d a18cd6c9 usb: core: fix slab-out-of-bounds Read in read_descriptors
INFO: rcu detected stall in cleanup_net (4) C done 5 132d 128d 97d b5b73b26 taprio: Fix allowing too small intervals
KASAN: slab-out-of-bounds Read in fbcon_scrolldelta 1 123d 123d 97d 50145474 fbcon: remove soft scrollback code
INFO: task hung in tcf_ife_init C done 4 129d 134d 97d cc8e58f8 act_ife: load meta modules before tcf_idr_check_alloc()
KASAN: slab-out-of-bounds Read in prism2sta_probe_usb C 8 138d 169d 97d fea22e15 staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb()
KMSAN: uninit-value in inet_diag_cmd_exact C 31 98d 110d 97d d5e4d0a5 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
KASAN: global-out-of-bounds Read in vga16fb_imageblit C done 1071 124d 409d 97d bd018a6a video: fbdev: fix OOB read in vga_8planes_imageblit()
memory leak in tipc_group_create_member C 32 125d 532d 97d bb3a420d tipc: Fix memory leak in tipc_group_create_member()
general protection fault in free_netdev C error done 3605 173d 208d 105d 46ef5b89 ip6_gre: fix null-ptr-deref in ip6gre_init_net()
KASAN: use-after-free Write in page_counter_uncharge 2 145d 150d 106d f1796544 memcg: fix use-after-free in uncharge_batch
KASAN: use-after-free Write in page_counter_cancel 1 154d 150d 106d f1796544 memcg: fix use-after-free in uncharge_batch
KASAN: use-after-free Read in do_madvise syz error 4 145d 147d 106d 7867fd7c mm: madvise: fix vma user-after-free
KMSAN: kernel-infoleak in move_addr_to_user (3) C 79 121d 155d 109d 38ba8b92 can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
KASAN: slab-out-of-bounds Write in hiddev_ioctl_usage C 279 140d 483d 112d 25a097f5 HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage()
WARNING: refcount bug in red_destroy C done 1 143d 142d 112d 5438dd45 net_sched: fix error path in red_init()
WARNING in slab_pre_alloc_hook C 210 137d 158d 112d f176ede3 USB: yurex: Fix bad gfp argument
WARNING: refcount bug in smc_release (3) 1 140d 129d 112d 5fb8642a net/smc: fix sock refcounting in case of termination
INFO: rcu detected stall in ext4_file_write_iter C inconclusive done 93 157d 689d 112d 7e249690 block: allow for_each_bvec to support zero len bvec
WARNING: refcount bug in qdisc_put (2) C done 7 142d 142d 112d 5438dd45 net_sched: fix error path in red_init()
BUG: corrupted list in mousedev_release syz done 5 136d 137d 112d 77f4689d fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in snd_pcm_oss_release 1 141d 141d 112d 77f4689d fix regression in "epoll: Keep a reference on files added to the check list"
possible deadlock in __lock_task_sighand C done 12 137d 138d 112d fd7d6de2 io_uring: don't recurse on tsk->sighand->siglock with signalfd
WARNING in snd_pcm_plugin_build_mulaw C done 4 139d 136d 112d 949a1ebe ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
general protection fault in snd_ctl_release syz done 4 134d 135d 112d 77f4689d fix regression in "epoll: Keep a reference on files added to the check list"
KMSAN: uninit-value in batadv_tt_hash_find 11 128d 185d 112d 303216e7 batman-adv: Avoid uninitialized chaddr when handling DHCP
KASAN: global-out-of-bounds Read in bit_putcs C done 262 113d 407d 112d 39b3cffb fbcon: prevent user font height or width change from causing potential out-of-bounds access bc5269ca vt_ioctl: change VT_RESIZEX ioctl to check for error return from vc_resize()
KASAN: use-after-free Read in fbcon_cursor syz done error 10 152d 396d 112d f8d1653d vt: defer kfree() of vc_screenbuf in vc_do_resize()
KASAN: use-after-free Read in rc_dev_uevent 1 161d 161d 112d 4f0835d6 media: rc: uevent sysfs file races with rc_unregister_device()
upstream boot error: KASAN: global-out-of-bounds Read in internal_create_group 273 143d 156d 112d 62c78927 libnvdimm: KASAN: global-out-of-bounds Read in internal_create_group
KMSAN: uninit-value in video_usercopy C 28 177d 177d 112d 4ffb879e media: media/v4l2-core: Fix kernel-infoleak in video_put_user()
INFO: task hung in nbd_ioctl (2) 37 140d 193d 112d 2a63866c tipc: fix shutdown() of connectionless socket
WARNING in restore_regulatory_settings C done 10414 130d 374d 112d 47caf685 cfg80211: regulatory: reject invalid hints
INFO: task hung in pipe_release (2) syz done 3 135d 166d 112d 7e249690 block: allow for_each_bvec to support zero len bvec
KMSAN: kernel-infoleak in raw_ioctl C 22 134d 159d 112d a092b723 net: usb: Fix uninit-was-stored issue in asix_read_phy_addr()
KASAN: use-after-free Read in bdev_del_partition C done 1 137d 137d 112d 08fc1ab6 block: fix locking in bdev_del_partition
KASAN: vmalloc-out-of-bounds Write in bitfill_aligned C 475 173d 407d 115d 033724d6 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
BUG: unable to handle kernel paging request in vmx_vcpu_run C error error 194 895d 1010d 117d kvm: vmx: Nested VM-entry prereqs for event inj.
possible deadlock in __io_queue_deferred C error 1 159d 158d 120d 7271ef3a io_uring: fix recursive completion locking on oveflow flush
kernel BUG at mm/hugetlb.c:LINE! C done error 10 171d 284d 120d 15568299 hugetlbfs: prevent filesystem stacking of hugetlbfs
WARNING in r871xu_dev_remove C 47375 160d 512d 120d b4383c97 staging: rtl8712: handle firmware load failure
WARNING in ptrace_stop C done 1413 172d 175d 120d d136122f sched: Fix race against ptrace_freeze_trace()
general protection fault in do_con_write C done 10703 173d 408d 120d ce684552 vt: Reject zero-sized screen buffer size.
general protection fault in __btf_resolve_helper_id C 17 185d 194d 120d 5b801dfb bpf: Fix NULL pointer dereference in __btf_resolve_helper_id()
KASAN: use-after-free Read in line6_submit_audio_in_all_urbs 2 189d 203d 120d 68359a1a ALSA: line6: Sync the pending work cancel at disconnection
INFO: task hung in ovs_exit_net 65 173d 176d 120d a65878d6 net: openvswitch: fixes potential deadlock in dp cleanup code
memory leak in erase_aeb (2) syz 25 179d 249d 120d 3b185255 ubi: fastmap: Don't produce the initial next anchor PEB when fastmap is disabled
KASAN: use-after-free Write in __linkwatch_run_queue C error 24 175d 176d 120d c75d1d52 bonding: check return value of register_netdevice() in bond_newlink()
WARNING in fat12_ent_blocknr 2 164d 189d 120d a090a5a7 fat: fix fat_ra_init() for data clusters == 0
general protection fault in x86_fsgsbase_read_task C done 2 154d 154d 120d 8ab49526 x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task
WARNING in __kernel_read C done 60 128d 186d 120d a39c4606 net/9p: validate fds in p9_fd_open
WARNING in inc_nlink C done 26 186d 290d 120d facb03dd fs/minix: don't allow getting deleted inodes
KASAN: use-after-free Read in delete_and_unsubscribe_port (2) syz done 4 164d 190d 120d 80982c7e ALSA: seq: oss: Serialize ioctls
KASAN: use-after-free Write in addr_resolve 1 222d 219d 120d f6a9d47a RDMA/cma: Execute rdma_cm destruction from a handler properly
general protection fault in cdev_del C 315 130d 598d 120d e911e99a usb: hso: check for return value in hso_serial_common_create()
general protection fault in afs_dynroot_depopulate 1 148d 147d 120d 5e0b17b0 afs: Fix NULL deref in afs_dynroot_depopulate()
KASAN: use-after-free Read in sock_def_write_space (2) C error 29 121d 178d 120d af9f691f qrtr: orphan socket in qrtr_release()
kernel BUG at mm/khugepaged.c:LINE! C done 30 147d 159d 120d f3f99d63 khugepaged: adjust VM_BUG_ON_MM() in __khugepaged_enter()
possible deadlock in shmem_fallocate (4) C done 81 171d 385d 120d 3e338d3c staging: android: ashmem: Fix lockdep warning for write operation
BUG: unable to handle kernel NULL pointer dereference in loop_rw_iter C done 24 146d 158d 120d 2dd2111d io_uring: Fix NULL pointer dereference in loop_rw_iter()
kernel BUG at net/rxrpc/recvmsg.c:LINE! C error 10 167d 195d 120d 65550098 rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
KASAN: use-after-free Read in addr_handler (2) 2 176d 219d 120d f6a9d47a RDMA/cma: Execute rdma_cm destruction from a handler properly
KASAN: use-after-free Read in io_async_task_func syz error 1 157d 157d 120d 6d816e08 io_uring: hold 'ctx' reference around task_work queue + execute
WARNING in idr_alloc C done 65 130d 204d 120d 8dfddfb7 net: qrtr: fix usage of idr in port assignment to socket
WARNING in drop_nlink C done error 1 268d 264d 120d facb03dd fs/minix: don't allow getting deleted inodes
KASAN: slab-out-of-bounds Read in vc_do_resize C done 55 158d 393d 120d d88ca7e1 fbmem: pull fbcon_update_vcs() out of fb_set_var()
general protection fault in fib_dump_info (2) C done 16 145d 147d 120d eeaac363 net: nexthop: don't allow empty NHA_GROUP
KASAN: slab-out-of-bounds Read in vsscanf (2) C error 5 163d 177d 120d a6bd4f6d Smack: fix another vsscanf out of bounds
KMSAN: uninit-value in netlink_policy_dump_start C 31 126d 129d 120d d1fb5559 netlink: fix state reallocation in policy export
possible deadlock in uprobe_clear_state (2) 1 188d 184d 120d f867c771 binder: Don't use mmput() from shrinker function.
KASAN: null-ptr-deref Write in media_request_close C done 17 163d 212d 120d e30cc79c media: media-request: Fix crash if memory allocation fails
KASAN: use-after-free Read in devlink_health_reporter_destroy C error 1188 185d 185d 120d 5d037b4d devlink: Fix use-after-free when destroying health reporters
kernel BUG at net/core/dev.c:LINE! (3) C done 979 135d 279d 120d 83270702 bonding: fix a potential double-unregister
KASAN: use-after-free Read in ceph_mdsc_destroy 4 160d 176d 120d a7caa88f ceph: fix use-after-free for fsc->mdsc
KASAN: use-after-free Read in path_init (2) C done 29 155d 156d 120d 24fb33d4 fix breakage in do_rmdir()
WARNING in __kernel_write C done 522 169d 189d 120d a39c4606 net/9p: validate fds in p9_fd_open
KMSAN: uninit-value in get_block C 13 236d 240d 120d 270ef410 fs/minix: reject too-large maximum file size
WARNING: suspicious RCU usage in ovs_flow_tbl_masks_cache_size C done 4093 161d 164d 120d fea07a48 net: openvswitch: silence suspicious RCU usage warning
WARNING in submit_rx_urb/usb_submit_urb C 397 172d 597d 120d faaff976 staging: wlan-ng: properly check endpoint types
WARNING in ib_unregister_device_queued 2 253d 264d 120d 0cb42c02 RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued()
KASAN: use-after-free Read in get_block C done 23 187d 264d 120d 270ef410 fs/minix: reject too-large maximum file size
WARNING in idtentry_exit_cond_rcu syz 6 194d 191d 120d bce9b042 x86/traps: Disable interrupts in exc_aligment_check()
INFO: task hung in ovs_dp_masks_rebalance 771 133d 176d 120d a65878d6 net: openvswitch: fixes potential deadlock in dp cleanup code
memory leak in nf_tables_addchain C 1 159d 157d 120d 59136aa3 netfilter: nf_tables: free chain context when BINDING flag is missing
KASAN: null-ptr-deref Write in get_block C done 101 187d 300d 120d da27e0a0 fs/minix: check return value of sb_getblk()
WARNING: suspicious RCU usage in tipc_l2_send_msg syz done 60 145d 203d 120d f6db9096 tipc: call rcu_read_lock() in tipc_aead_encrypt_done()
WARNING in compat_do_ebt_get_ctl C done 15 150d 161d 120d 5c04da55 netfilter: ebtables: reject bogus getopt len value
memory leak in io_submit_sqes C 2 138d 157d 120d a36da65c io_uring: fail poll arm on queue proc failure
WARNING in __nf_unregister_net_hook (2) C done 9 187d 185d 120d 1e9451cb netfilter: nf_tables: fix nat hook table deletion
KCSAN: data-race in page_counter_try_charge / page_counter_try_charge (2) 148 156d 399d 120d 6e4bd50f mm/page_counter: fix various data races at memsw
KASAN: use-after-free Read in j1939_tp_txtimer C done error 5 187d 385d 120d cd3b3636 can: j1939: transport: j1939_session_tx_dat(): fix use-after-free read in j1939_tp_txtimer()
KASAN: use-after-free Write in get_block C inconclusive inconclusive 12 203d 253d 120d 270ef410 fs/minix: reject too-large maximum file size
KASAN: use-after-free Read in l2cap_chan_close C done 37 162d 343d 120d f9c70bdc Bluetooth: add a mutex lock to avoid UAF in do_enale_set
KASAN: use-after-free Read in ax88172a_unbind C done 2723 172d 412d 120d c28d9a28 ax88172a: fix ax88172a_unbind() failures
linux-next boot error: WARNING in mem_cgroup_css_alloc 6 155d 155d 120d 9f457179 mm: memcontrol: fix warning when allocating the root cgroup
KCSAN: data-race in vm_area_dup / vma_interval_tree_remove (2) 70 215d 329d 120d cda099b3 fork: Annotate a data race in vm_area_dup()
general protection fault in vsock_poll syz done 15 165d 177d 120d 1980c058 vsock: fix potential null pointer dereference in vsock_poll()
BUG: corrupted list in p9_read_work (2) syz done error 38 422d 784d 120d 74d6a5d5 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work
general protection fault in io_poll_double_wake C done 8 125d 153d 120d d4e7cd36 io_uring: sanitize double poll handling
KMSAN: uninit-value in geneve_xmit C 163 124d 177d 120d 32818c07 geneve: fix an uninitialized value in geneve_changelink()
general protection fault in syscall_return_slowpath syz inconclusive done 1 227d 313d 120d 033724d6 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
KMSAN: uninit-value in ax25_connect C 15 129d 262d 120d 2f2a7ffa AX.25: Fix out-of-bounds read in ax25_connect()
general protection fault in j1939_netdev_start C done 8 173d 325d 120d af804b78 can: j1939: socket: j1939_sk_bind(): make sure ml_priv is allocated
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt C 16 164d 191d 120d 51c19bf3 Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
KASAN: wild-memory-access Read in rawv6_setsockopt 2 162d 162d 120d 519a8a6c net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
KASAN: out-of-bounds Read in pebs_update_state syz inconclusive done 1 198d 245d 120d 033724d6 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
WARNING in submit_audio_out_urb/usb_submit_urb syz 2 190d 190d 120d 6e8a914a ALSA: line6: Perform sanity check for each URB creation
KASAN: use-after-free Read in lockref_get 7 224d 324d 120d bad8e64f blktrace: fix debugfs use after free
KASAN: use-after-free Read in io_uring_setup (2) 1 169d 169d 120d d1719f70 io_uring: don't touch 'ctx' after installing file descriptor
KASAN: use-after-free Read in __xfrm6_tunnel_spi_lookup C error 12 179d 184d 120d 8b404f46 xfrm: interface: not xfrmi_ipv6/ipip_handler twice
general protection fault in khugepaged C done 3 178d 190d 120d 594cced1 khugepaged: fix null-pointer dereference due to race
KASAN: invalid-free in snd_seq_port_disconnect syz done 9 164d 169d 120d 80982c7e ALSA: seq: oss: Serialize ioctls
KASAN: slab-out-of-bounds Write in sctp_setsockopt C error 590 172d 177d 120d dfd3d526 sctp: fix slab-out-of-bounds in SCTP_DELAYED_SACK processing
possible deadlock in io_timeout_fn C done 4 155d 158d 120d 51a4cc11 io_uring: defer file table grabbing request cleanup for locked requests
KMSAN: uninit-value in ucma_connect C 138 125d 177d 120d 31142a4b RDMA/cm: Add min length checks to user structure copies
WARNING in snd_usbmidi_submit_urb/usb_submit_urb C done 42 204d 228d 120d 9b7e5208 ALSA: usb-audio: Fix race against the error recovery URB submission
WARNING in snd_info_get_line C done 36 177d 182d 120d 60379ba0 ALSA: info: Drop WARN_ON() from buffer NULL sanity check
WARNING: suspicious RCU usage in ovs_flow_tbl_destroy C done 658 161d 164d 120d fea07a48 net: openvswitch: silence suspicious RCU usage warning
INFO: task hung in __do_sys_reboot 1554 137d 193d 120d b292b50b driver core: Fix probe_count imbalance in really_probe()
INFO: trying to register non-static key in red_destroy C error 318 172d 194d 120d 608b4ada net_sched: initialize timer earlier in red_init()
general protection fault in go7007_usb_probe C 2103 160d 268d 120d 13764128 go7007: add sanity checking for endpoints
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt C error 9 165d 186d 120d 629b49c8 Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
KMSAN: uninit-value in __tipc_nl_compat_dumpit (3) C 6181 121d 185d 120d 47733f9d tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
KASAN: wild-memory-access Read in ip_setsockopt C 2 155d 155d 120d 519a8a6c net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
WARNING: suspicious RCU usage in bond_ipsec_add_sa 214 122d 193d 120d f548a476 bonding: don't need RTNL for ipsec helpers
KASAN: wild-memory-access Read in sctp_setsockopt C 2 154d 154d 120d 519a8a6c net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
KMSAN: uninit-value in xa_load C 208 121d 177d 120d 31142a4b RDMA/cm: Add min length checks to user structure copies
WARNING in vkms_vblank_simulate C done 12903 127d 703d 120d 51f644b4 drm/atomic-helper: reset vblank on crtc reset
WARNING in snd_usbmidi_input_start/usb_submit_urb C done 231 181d 224d 120d 9b7e5208 ALSA: usb-audio: Fix race against the error recovery URB submission
KASAN: use-after-free Read in smk_write_relabel_self C done 2 224d 220d 120d beb4ee67 Smack: fix use-after-free in smk_write_relabel_self()
possible deadlock in pipe_lock (3) C inconclusive done 4 348d 385d 149d 1a980b8c ovl: add splice file read write helper
possible deadlock in dev_mc_unsync C error done 78 187d 203d 149d be74294f net: get rid of lockdep_set_class_and_subclass()
possible deadlock in lock_trace (3) syz inconclusive done 69 288d 423d 149d 2db9dbf7 proc: Use new infrastructure to fix deadlocks in execve
possible deadlock in do_io_accounting (3) C inconclusive done 39 295d 385d 149d 76518d37 proc: io_accounting: Use new infrastructure to fix deadlocks in execve
possible deadlock in proc_pid_personality syz inconclusive done 3 305d 314d 149d 2db9dbf7 proc: Use new infrastructure to fix deadlocks in execve
WARNING: bad unlock balance in rcu_lock_release C inconclusive done 1433 290d 572d 150d 10476e63 locking/lockdep: Fix bad recursion pattern
WARNING in hsr_addr_subst_dest C done done 8639 287d 744d 150d 4b793acd hsr: use netdev_err() instead of WARN_ONCE()
WARNING: locking bug in try_to_grab_pending syz error done 1 239d 702d 150d 13788174 tipc: block BH before using dst_cache
KASAN: stack-out-of-bounds Read in update_stack_state C unreliable done 388 364d 1058d 150d init, tracing: Add initcall trace events
WARNING: bad unlock balance in rcu_core C inconclusive done 3578 286d 642d 150d 10476e63 locking/lockdep: Fix bad recursion pattern
general protection fault in qrtr_endpoint_post C done done 54 187d 205d 156d 8ff41cc2 net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
invalid opcode in __phys_addr (2) 1 200d 200d 164d c4e8fa90 netfilter: ipset: call ip_set_free() instead of kfree()
PANIC: double fault in fixup_bad_iret C error 11753 190d 231d 167d 5144f8a8 compiler_types.h: Add __no_sanitize_{address,undefined} to noinstr
general protection fault in __apic_accept_irq (2) C done 9 204d 200d 167d 9d3c447c KVM: X86: Fix async pf caused null-ptr-deref
KCSAN: data-race in copy_process / release_task 154 196d 325d 167d c17d1a3a fork: annotate data race in copy_process()
KASAN: use-after-free Read in dmabuffs_dname 1 318d 314d 167d 4ab59c3c dma-buf: Move dma_buf_release() from fops to dentry_ops
WARNING in enqueue_task_dl C done 13 211d 789d 167d 740797ce sched/core: Fix PI boosting between RT and DEADLINE tasks
KCSAN: data-race in copy_process / copy_process (2) 294 197d 374d 167d c17d1a3a fork: annotate data race in copy_process()
PANIC: double fault in check_preemption_disabled C 2181 199d 203d 167d c7aadc09 x86/entry: Increase entry_stack size to a full page
memory leak in nbd_add_socket C 1 290d 290d 167d 579dd91a nbd: Fix memory leak in nbd_add_socket
WARNING in xfrm_policy_insert C inconclusive done 6 213d 1066d 171d ed17b8d3 xfrm: fix a warning in xfrm_policy_insert_list
BUG: unable to handle kernel paging request in netif_receive_generic_xdp C done done 160 226d 362d 172d 96aa1b22 tun: correct header offsets in napi frags mode
WARNING in iomap_apply C done 25 239d 279d 179d 175efa81 ext4: fix EXT4_MAX_LOGICAL_BLOCK macro ext4: fix EXT4_MAX_LOGICAL_BLOCK macro
KASAN: use-after-free Read in sock_def_write_space C done 67 179d 545d 179d a9b11101 llc: make sure applications use ARPHRD_ETHER
KASAN: slab-out-of-bounds Read in qrtr_endpoint_post C 8 201d 202d 179d 8ff41cc2 net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
memory leak in qdisc_create_dflt C 1 198d 194d 179d 306381ae net_sched: fix a memory leak in atm_tc_init()
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu 1 200d 200d 179d bf64ff4c genetlink: get rid of family->attrbuf
WARNING in hsr_dev_finalize C error 1546 187d 203d 179d ccfc9df1 hsr: fix interface leak in error path of hsr_dev_finalize()
kernel BUG at net/l2tp/l2tp_core.c:LINE! C 10 204d 199d 179d c9a368f1 bpf: net: Avoid incorrect bpf_sk_reuseport_detach call
KASAN: vmalloc-out-of-bounds Read in tipc_nl_publ_dump C 22 185d 203d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu C error 17 188d 199d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in nl8NUM_dump_wpan_phy (2) C 18 189d 203d 179d bf64ff4c genetlink: get rid of family->attrbuf
possible deadlock in dev_uc_sync_multiple (2) 26 190d 200d 179d be74294f net: get rid of lockdep_set_class_and_subclass()
KASAN: vmalloc-out-of-bounds Read in __nla_validate_parse 7 185d 202d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_publ_dump (2) C 14 188d 200d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_node_dump_monitor_peer (2) C 54 187d 202d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_udp_nl_dump_remoteip (2) C 9 187d 207d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in devlink_get_from_attrs C 25 187d 200d 179d bf64ff4c genetlink: get rid of family->attrbuf
WARNING in warn_bad_map 1 211d 207d 179d 9c29e361 mptcp: fix DSS map generation on fin retransmission
KASAN: vmalloc-out-of-bounds Read in nl8NUM_dump_wpan_phy C 145 185d 206d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: vmalloc-out-of-bounds Read in __cfg8NUM_wpan_dev_from_attrs 4 188d 202d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_node_dump_link C error 10 193d 203d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name C 4 194d 199d 179d bf64ff4c genetlink: get rid of family->attrbuf
KASAN: vmalloc-out-of-bounds Read in tipc_nl_node_dump_monitor_peer C error 9 188d 206d 179d bf64ff4c genetlink: get rid of family->attrbuf
BUG: unable to handle kernel NULL pointer dereference in tomoyo_domain_quota_is_ok (2) 7 203d 218d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in unpin_user_pages C done 13 240d 240d 182d f78cdbd7 rds: fix crash in rds_info_getsockopt()
KASAN: use-after-free Write in bpf_link_put 2 258d 260d 182d 138c6767 bpf: Fix use-after-free of bpf_link when priming half-fails
KASAN: use-after-free Write in fsnotify_detach_connector_from_object C done 4 212d 217d 182d ef1548ad proc: Use new_inode not new_inode_pseudo
KASAN: use-after-free Read in ip_icmp_error C done 14 233d 234d 182d 23917494 tcp: tcp_v4_err() icmp skb is named icmp_skb
BUG: unable to handle kernel NULL pointer dereference in schedule_timeout 1 203d 203d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Write in ath9k_htc_rx_msg C 93 217d 295d 182d e4ff08a4 ath9k: Fix use-after-free Write in ath9k_htc_rx_msg
BUG: using smp_processor_id() in preemptible [ADDR] code: syz-executor C done 22297 227d 566d 182d 13788174 tipc: block BH before using dst_cache
KASAN: slab-out-of-bounds Read in vsscanf C done 61 191d 294d 182d 84e99e58 Smack: slab-out-of-bounds in vsscanf
KASAN: slab-out-of-bounds Read in ip_icmp_error C done 13 233d 234d 182d 23917494 tcp: tcp_v4_err() icmp skb is named icmp_skb
WARNING: proc registration bug in snmp6_register_dev C done 14 209d 275d 182d de0083c7 hsr: avoid to create proc file after unregister
KASAN: null-ptr-deref Write in choke_reset C done 1441 238d 271d 182d 8738c85c sch_choke: avoid potential panic in choke_reset()
KASAN: slab-out-of-bounds Write in snd_usb_mixer_notify_id C done 39 200d 206d 182d 220345e9 ALSA: usb-audio: Fix OOB access of mixer element list
BUG: unable to handle kernel NULL pointer dereference in number 1 212d 208d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Write in snd_usb_mixer_interrupt C done 5 204d 205d 182d 220345e9 ALSA: usb-audio: Fix OOB access of mixer element list
KASAN: use-after-free Read in vkms_dumb_create syz done 2 267d 263d 182d 0ea2ea42 drm/vkms: Hold gem object while still in-use
BUG: unable to handle kernel NULL pointer dereference in check_preemption_disabled (3) 3 212d 212d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Read in inet_diag_bc_sk C done 30 257d 259d 182d ee1bd483 inet_diag: bc: read cgroup id only for full sockets
memory leak in ctnetlink_del_conntrack C 1 222d 219d 182d 6c2d2176 netfilter: ctnetlink: memleak in filter initialization error path
INFO: rcu detected stall in inet_sendmsg (2) 13 183d 267d 182d df4953e4 sch_sfq: validate silly quantum values
linux-next boot error: WARNING: suspicious RCU usage in ipmr_get_table 60 254d 262d 182d 7013908c ipmr: Add lockdep expression to ipmr_for_each_table macro
BUG: unable to handle kernel NULL pointer dereference in dev_ifconf 1 212d 212d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
BUG: using smp_processor_id() in preemptible [ADDR] code: /NUM 1 239d 239d 182d 13788174 tipc: block BH before using dst_cache
BUG: MAX_LOCKDEP_CHAINS too low! C done 17240 182d 840d 182d e7511f56 bonding: remove useless stats_lock_key 1a33e10e net: partially revert dynamic lockdep key changes
INFO: task hung in locks_remove_posix syz 2231 217d 239d 182d 187b96db x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks
WARNING: refcount bug in crypto_mod_get C done 2 247d 259d 182d 6603523b crypto: api - Fix use-after-free and race in crypto_spawn_alg
BUG: unable to handle kernel NULL pointer dereference in mpihelp_addmul_1 1 212d 212d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (3) 1 232d 232d 182d d9a81a22 l2tp: add sk_family checks to l2tp_validate_socket
linux-next test error: BUG: using smp_processor_id() in preemptible [ADDR] code: syz-fuzzer/6792 1 227d 227d 182d 81198536 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KCSAN: data-race in __fat_write_inode / fat12_ent_get 2 293d 287d 182d b1b65750 fat: don't allow to mount if the FAT length == 0
KASAN: stack-out-of-bounds Write in ath9k_hif_usb_rx_cb C 57 217d 291d 182d 19d6c375 ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb
KASAN: slab-out-of-bounds Read in ovl_check_fb_len syz done 3 238d 237d 182d 522f6e6c ovl: fix out of bounds access warning in ovl_check_fb_len()
KASAN: use-after-free Read in usblp_bulk_read 7 191d 269d 182d 296a193b usblp: poison URBs upon disconnect
BUG: unable to handle kernel NULL pointer dereference in alloc_pages_vma 1 212d 208d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
linux-next boot error: general protection fault in tomoyo_get_local_path 18 239d 245d 182d 9d78edea proc: proc_pid_ns takes super_block as an argument
KASAN: use-after-free Read in htc_connect_service C 41041 217d 295d 182d ced21a4c ath9k: Fix use-after-free Read in htc_connect_service
KMSAN: uninit-value in tbf_enqueue 21 182d 269d 182d 9274124f net: stricter validation of untrusted gso packets
general protection fault in ima_free_template_entry C done 3 205d 225d 182d 42413b49 ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
WARNING in kvm_inject_emulated_page_fault C done 20 205d 225d 182d 7a35e515 KVM: VMX: Properly handle kvm_read/write_guest_virt*() result
general protection fault in kobject_get (2) 2 211d 240d 182d 11a0ae4c RDMA: Allow ib_client's to fail when add() is called
general protection fault in fq_codel_enqueue C done 25 186d 271d 182d 9274124f net: stricter validation of untrusted gso packets
BUG: unable to handle kernel NULL pointer dereference in create_empty_buffers 1 223d 219d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
memory leak in crypto_create_tfm C 14 209d 226d 182d 819966c0 crypto: drbg - always try to free Jitter RNG instance
WARNING in memtype_reserve C done 600 242d 251d 182d a0e710a7 USB: usbfs: fix mmap dma mismatch
general protection fault in put_cmsg C done 3 247d 247d 182d 1b2f08df ipv6: set msg_control_is_user in do_ipv6_getsockopt
WARNING in usbhid_raw_request/usb_submit_urb (3) syz 18 261d 367d 182d ac854131 USB: core: Fix misleading driver bug report
memory leak in nf_tables_parse_netdev_hooks (3) C 1 222d 219d 182d 3003055f netfilter: nf_tables: hook list memleak in flowtable deletion
general protection fault in proc_kill_sb 8 207d 219d 182d 058f2e4d proc: s_fs_info may be NULL when proc_kill_sb is called
INFO: trying to register non-static key in io_cqring_ev_posted (3) C done 3 241d 243d 182d 583863ed io_uring: initialize ctx->sqo_wait earlier
BUG: unable to handle kernel paging request in do_xdp_generic C done done 7444 255d 362d 182d 96aa1b22 tun: correct header offsets in napi frags mode
KASAN: slab-out-of-bounds Read in inet_diag_bc_sk C done 45 257d 259d 182d ee1bd483 inet_diag: bc: read cgroup id only for full sockets
BUG: stack guard page was hit in deref_stack_reg 2 246d 307d 182d dd912306 net: fix a potential recursive NETDEV_FEAT_CHANGE
INFO: task syz-executor can't die for more than 143 seconds. (2) C done 2512 183d 450d 182d 566d1362 pipe: Fix pipe_full() test in opipe_prep().
BUG: unable to handle kernel NULL pointer dereference in debug_smp_processor_id (2) 3 204d 211d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
net-next test error: KASAN: use-after-free Write in afs_wake_up_async_call 60 203d 212d 182d 0041cd5a rxrpc: Fix notification call on completion of discarded calls
BUG: unable to handle kernel NULL pointer dereference in net_rx_queue_update_kobjects 1 212d 212d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in erspan_validate C done 520 247d 254d 182d 51fa960d erspan: Check IFLA_GRE_ERSPAN_VER is set.
bpf test error: BUG: using smp_processor_id() in preemptible code in ext4_mb_new_blocks 48 211d 213d 182d 81198536 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
kernel BUG at arch/x86/mm/physaddr.c:LINE! (5) C done 241 186d 259d 182d 57d38f26 vt: fix unicode console freeing with a common interface
WARNING: refcount bug in crypto_destroy_tfm C done 4 261d 284d 182d 6603523b crypto: api - Fix use-after-free and race in crypto_spawn_alg
general protection fault in inet_unhash C done 40 203d 232d 182d 02c71b14 l2tp: do not use inet_hash()/inet_unhash()
BUG: unable to handle kernel NULL pointer dereference in direct_page_fault 1 212d 208d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
linux-next boot error: WARNING: suspicious RCU usage in bpq_device_event 6 245d 246d 182d 95f59bf8 drivers: net: hamradio: Fix suspicious RCU usage warning in bpqether.c
BUG: unable to handle kernel NULL pointer dereference in try_async_pf 1 212d 208d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
BUG: unable to handle kernel NULL pointer dereference in unlock_page 1 214d 214d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Read in rpc_net_ns syz done 10 247d 253d 182d 31e9a7f3 SUNRPC: fix use-after-free in rpc_free_client_work()
WARNING in tipc_msg_append C done 107 208d 223d 182d c9aa81fa tipc: fix kernel WARNING in tipc_msg_append()
BUG: unable to handle kernel NULL pointer dereference in __es_insert_extent 1 214d 214d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
bpf-next test error: BUG: using smp_processor_id() in preemptible code in ext4_mb_new_blocks 90 212d 218d 182d 81198536 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
general protection fault in cfg80211_dev_rename 1 252d 247d 182d 0bbab5f0 cfg80211: fix debugfs rename crash
KASAN: slab-out-of-bounds Read in garmin_read_process C 1 300d 300d 182d e9b3c610 USB: serial: garmin_gps: add sanity checking for data length
net-next test error: BUG: using smp_processor_id() in preemptible code in corrupted 4 215d 217d 182d 81198536 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KASAN: use-after-free Read in usbhid_close (3) C 6 255d 283d 182d 0ed08fad HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
BUG: unable to handle kernel NULL pointer dereference in kvm_vm_ioctl 1 211d 211d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in skb_clone (3) 44 232d 234d 182d 23917494 tcp: tcp_v4_err() icmp skb is named icmp_skb
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE! (2) C done 46328 202d 233d 182d 7d2e8748 KVM: x86: Initialize tdp_level during vCPU creation
KMSAN: uninit-value in do_tcp_getsockopt 5 194d 246d 182d e776af60 net-backports: tcp: fix error recovery in tcp_zerocopy_receive()
linux-next test error: WARNING: suspicious RCU usage in ipmr_device_event 24 264d 269d 182d a14fbcd4 ipmr: Fix RCU list debugging warning
net test error: KASAN: null-ptr-deref Write in x25_disconnect 12 262d 262d 182d 8999dc89 net/x25: Fix null-ptr-deref in x25_disconnect
BUG: unable to handle kernel NULL pointer dereference in kvm_vcpu_gfn_to_memslot 1 211d 211d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
memory leak in genl_rcv_msg C 116 217d 407d 182d c36f0555 genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()
KMSAN: uninit-value in __dev_get_by_name C 2 244d 244d 182d 687775ce ax25: fix setsockopt(SO_BINDTODEVICE)
general protection fault in start_creating C done 106 203d 233d 182d d56f5136 KVM: let kvm_destroy_vm_debugfs clean up vCPU debugfs directories
BUG: unable to handle kernel NULL pointer dereference in udc_bind_to_driver 1 210d 210d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_node_cpus (2) 9 250d 416d 182d 314eeb43 rcu: Add *_ONCE() and data_race() to rcu_node ->exp_tasks plus locking
bpf test error: KASAN: null-ptr-deref Write in x25_disconnect 78 249d 262d 182d 8999dc89 net/x25: Fix null-ptr-deref in x25_disconnect
KASAN: slab-out-of-bounds Read in fl6_update_dst C done 43 203d 249d 182d bb986a50 seg6: fix seg6_validate_srh() to avoid slab-out-of-bounds
general protection fault in __tipc_sendstream C done 444 202d 233d 182d 4c21daae tipc: Fix NULL pointer dereference in __tipc_sendstream() 5e9eeccc tipc: fix NULL pointer dereference in streaming
net test error: BUG: using smp_processor_id() in preemptible code in corrupted 3 212d 214d 182d 81198536 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KASAN: use-after-free Read in ath9k_wmi_ctrl_rx C 1 294d 294d 182d abeaa850 ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx
upstream test error: BUG: using smp_processor_id() in preemptible code in ext4_map_blocks 1 216d 216d 182d 81198536 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
general protection fault in sock_hash_free 1 226d 226d 182d 75e68e5b bpf, sockhash: Synchronize delete from bucket list on map free
KASAN: slab-out-of-bounds Read in skb_gso_transport_seglen C done 4 252d 271d 182d 9274124f net: stricter validation of untrusted gso packets
BUG: unable to handle kernel NULL pointer dereference in local_bh_disable 1 212d 212d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
BUG: unable to handle kernel NULL pointer dereference in generic_perform_write (2) C done 3 278d 276d 182d 829b37b8 ext4: avoid race conditions when remounting with options that change dax
BUG: stack guard page was hit in update_stack_state 5 332d 346d 182d dd912306 net: fix a potential recursive NETDEV_FEAT_CHANGE
WARNING: locking bug in dev_mc_seq_show C done 3 223d 234d 182d 845e0ebb net: change addr_list_lock back to static key
general protection fault in inet_diag_bc_sk 12 257d 259d 182d ee1bd483 inet_diag: bc: read cgroup id only for full sockets
general protection fault in selinux_socket_recvmsg C done 4 237d 237d 182d 0a82e230 mptcp: avoid NULL-ptr derefence on fallback
KMSAN: uninit-value in skbprio_enqueue syz 11 196d 260d 182d 2761121a net_sched: sch_skbprio: add message validation to skbprio_change()
general protection fault in ath9k_hif_usb_rx_cb C 913 182d 295d 182d 2bbcaaee ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb
BUG: soft lockup in wg_packet_tx_worker 1 254d 254d 182d df4953e4 sch_sfq: validate silly quantum values
INFO: rcu detected stall in wg_packet_tx_worker C done 24 211d 264d 182d df4953e4 sch_sfq: validate silly quantum values
linux-next test error: KASAN: use-after-free Write in afs_wake_up_async_call 111 208d 216d 182d 0041cd5a rxrpc: Fix notification call on completion of discarded calls
BUG: unable to handle kernel NULL pointer dereference in smp_call_function_many_cond (2) 1 205d 205d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Read in br_mrp_parse C done 5 238d 240d 182d 617504c6 bridge: mrp: Fix out-of-bounds read in br_mrp_parse
BUG: unable to handle kernel NULL pointer dereference in __ext4_journal_start_sb 1 211d 211d 182d 3021e692 kcov: check kcov_softirq in kcov_remote_stop()
INFO: task hung in blkdev_issue_flush (2) C done error 3 404d 563d 199d 2b5c8f00 nbd: replace kill_bdev() with __invalidate_device() again
KASAN: use-after-free Read in blkdev_direct_IO C done error 8 527d 532d 199d 0eb6ddfb block: Fix __blkdev_direct_IO() for bio fragments
KASAN: use-after-free Read in blkdev_bio_end_io C done error 13 517d 529d 199d 7b6620d7 block: remove REQ_NOWAIT_INLINE
KCSAN: data-race in tcp_add_backlog / tcp_try_rmem_schedule 3 461d 465d 199d ebb3b78d tcp: annotate sk->sk_rcvbuf lockless reads
memory leak in bio_clone_fast C 1 521d 520d 199d 7b6620d7 block: remove REQ_NOWAIT_INLINE
WARNING: refcount bug in blk_mq_free_request (2) C done error 5 529d 529d 199d de6346ec nbd: protect cmd->status with cmd->lock
memory leak in bio_copy_user_iov C done 34 391d 576d 199d 3b7995a9 block: fix memleak when __blk_rq_map_user_iov() is failed
WARNING in sk_stream_kill_queues (4) C done done 6 321d 325d 199d b6f61189 ipv6: restrict IPV6_ADDRFORM operation
WARNING: bad unlock balance in get_user_pages_unlocked 1 287d 282d 201d c7b6a566 mm/gup: Mark lock taken only after a successful retake
WARNING in __mmdrop syz done 14 537d 546d 201d 3d2c7d37 Revert "vhost: access vq metadata through kernel virtual address"
WARNING in wa_nep_create/usb_submit_urb C 114 271d 555d 201d caa6772d Staging: remove wusbcore and UWB from the kernel tree.
upstream boot error: KASAN: slab-out-of-bounds Write in virtio_gpu_object_create 6 275d 284d 201d b513b0d4 drm/virtio: fix OOB in virtio_gpu_object_create
WARNING in kfree (2) syz done done 1 311d 310d 201d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
WARNING in hwarc_neep_init/usb_submit_urb C 1 305d 305d 201d caa6772d Staging: remove wusbcore and UWB from the kernel tree.
BUG: corrupted list in __uwb_rc_neh_rm C 9 277d 312d 201d caa6772d Staging: remove wusbcore and UWB from the kernel tree.
KASAN: null-ptr-deref Write in blk_mq_map_swqueue C done 3 295d 295d 204d d0930bb8 blk-mq: Fix a recently introduced regression in blk_mq_realloc_hw_ctxs()
KASAN: use-after-free Read in chaoskey_disconnect C 44 414d 443d 210d 93ddb1f5 USB: chaoskey: fix use-after-free on release
KMSAN: uninit-value in etf_enqueue_timesortedlist 3 252d 259d 211d a1211bf9 sched: etf: do not assume all sockets are full blown
KMSAN: uninit-value in audit_log_vformat (2) C 104 251d 270d 211d 763dafc5 audit: check the length of userspace generated audit records
general protection fault in macvlan_device_event 86 260d 274d 211d 4dee15b4 macvlan: fix null dereference in macvlan_device_event()
WARNING in __vm_enough_memory (2) syz done 6 272d 275d 211d dadbd85f mm: Fix MREMAP_DONTUNMAP accounting on VMA merge
WARNING in hwsim_new_radio_nl C done 3 277d 280d 211d 7ea86204 mac80211_hwsim: Use kstrndup() in place of kasprintf()
KASAN: invalid-free in nf_tables_newset C done 21 274d 289d 211d 7fb6f78d netfilter: nf_tables: do not leave dangling pointer in nf_tables_set_alloc_name
WARNING: bad unlock balance in mptcp_poll C done 10 276d 279d 211d e154659b mptcp: fix double-unlock in mptcp_poll
KASAN: use-after-free Read in dput (2) syz done 4 275d 275d 211d 4fa3b1c4 proc: Handle umounts cleanly
possible deadlock in user_shm_lock 12 239d 277d 211d ea0dfeb4 shmem: fix possible deadlocks on shmlock_user_lock
possible deadlock in shmem_mfill_atomic_pte C done 82 238d 290d 211d 94b7cc01 mm: shmem: disable interrupt when acquiring info->lock in userfaultfd_copy path
KASAN: slab-out-of-bounds Read in __kvm_gfn_to_hva_cache_init C done 1537 238d 283d 211d b6467ab1 KVM: Check validity of resolved slot when searching memslots
WARNING in set_precision (2) C done 117 273d 371d 211d 7ea86204 mac80211_hwsim: Use kstrndup() in place of kasprintf()
INFO: rcu detected stall in io_uring_release syz 15 231d 272d 211d 3fd44c86 io_uring: use cond_resched() in io_ring_ctx_wait_and_kill()
KASAN: use-after-free Read in report_sock_error 2 264d 269d 211d a1211bf9 sched: etf: do not assume all sockets are full blown
linux-next test error: WARNING: suspicious RCU usage in ovs_ct_exit 132 269d 307d 211d 27de77ce net: openvswitch: ovs_ct_exit to be done under ovs_lock
WARNING in nf_nat_unregister_fn 1 274d 273d 211d b4faef17 netfilter: nat: fix error handling upon registering inet hook
possible deadlock in shmem_uncharge C done 101 239d 278d 211d ea0dfeb4 shmem: fix possible deadlocks on shmlock_user_lock
possible deadlock in ext4_evict_inode syz error error 38 823d 862d 238d e5bfad3d smack: use GFP_NOFS while holding inode_smack::smk_lock
general protection fault in kobject_get 4 253d 319d 250d 5bdfa854 RDMA/mad: Do not crash if the rdma device does not have a umad interface
KASAN: use-after-free Write in tcindex_set_parms C done 13 291d 310d 250d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
WARNING: kobject bug in add_one_compat_dev 2 321d 323d 250d f2f2b3bb RDMA/core: Fix missing error check on dev_set_name()
possible deadlock in io_submit_one (3) syz done 45 280d 287d 250d 63f818f4 proc: Use a dedicated lock in struct pid
INFO: task hung in io_queue_file_removal C done 16 292d 300d 250d 4afdb733 io-uring: drop completion when removing file
KASAN: slab-out-of-bounds Write in tcindex_set_parms C done 10 291d 312d 250d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in tcindex_dump syz 1 313d 310d 250d b1be2e8c net_sched: hold rtnl lock in tcindex_partial_destroy_work()
KMSAN: uninit-value in simple_attr_read C 6 253d 323d 250d a65cab7d libfs: fix infoleak in simple_attr_read()
general protection fault in macsec_upd_offload C done 5 288d 288d 250d aa81700c macsec: fix NULL dereference in macsec_upd_offload()
general protection fault in hfsc_unbind_tcf 1 302d 298d 250d ef299cc3 net_sched: cls_route: remove the right filter from hashtable
memory leak in erase_aeb C 109 250d 404d 250d c16f39d1 ubi: fastmap: Free unused fastmap anchor peb during detach
BUG: unable to handle kernel NULL pointer dereference in handle_external_interrupt_irqoff C done 6404 294d 299d 250d 428b8f1d KVM: VMX: don't allow memory operands for inline asm that modifies SP
possible deadlock in send_sigurg C done 65 273d 287d 250d 63f818f4 proc: Use a dedicated lock in struct pid
WARNING: bad unlock balance in ucma_event_handler C done 143 282d 947d 250d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING in geneve_exit_batch_net (2) C done 9 297d 321d 250d 0fda7600 geneve: move debug check after netdev unregister
general protection fault in fbcon_switch 1 294d 294d 250d b139f8b0 fbcon: fix null-ptr-deref in fbcon_switch
KASAN: invalid-free in tcf_exts_destroy C done 1 313d 313d 250d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in __hrtimer_run_queues C done 299 282d 290d 250d 73d20564 hrtimer: Don't dereference the hrtimer pointer after the callback
WARNING: bad unlock balance in ucma_destroy_id syz done 44 317d 871d 250d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING: bad unlock balance in __get_user_pages_remote C done 15 282d 283d 250d c7b6a566 mm/gup: Mark lock taken only after a successful retake
INFO: trying to register non-static key in __io_uring_register C done 39 282d 283d 250d f7fe9346 io_uring: initialize fixed_file_data lock
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user C done 1 292d 291d 250d a1a7e3a3 xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
KASAN: stack-out-of-bounds Write in mpol_to_str C done 23 291d 295d 250d aa9f7d51 mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
general protection fault in do_tcp_getsockopt (2) C done 1 302d 302d 250d 6cd6cbf5 net-backports: tcp: repair: fix TCP_QUEUE_SEQ implementation
KASAN: use-after-free Read in addr_handler syz done 12 282d 764d 250d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
INFO: trying to register non-static key in io_cqring_ev_posted (2) C done 42 253d 290d 250d 10bea96d io_uring: add missing finish_wait() in io_sq_thread()
KASAN: use-after-free Read in cma_cancel_operation C done 617 338d 1018d 250d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
BUG: unable to handle kernel paging request in kernel_get_mempolicy C done 1 287d 284d 250d ba841078 mm/mempolicy: Allow lookup_node() to handle fatal signal
WARNING: ODEBUG bug in rfcomm_dev_ioctl 1 314d 314d 250d 71811cac Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
KASAN: slab-out-of-bounds Read in cgroup_file_notify C done 1 315d 311d 250d 726b7bbe hugetlb_cgroup: fix illegal access to memory
WARNING: refcount bug in __tcf_action_put syz 1 311d 310d 250d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in rdma_listen (2) C done 354 288d 657d 250d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING: kobject bug in ib_register_device C done 14 288d 326d 250d 7aefa623 RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET
general protection fault in ethnl_parse_header C done 9 297d 302d 250d 55b474c4 netlink: check for null extack in cookie helpers
WARNING in vcpu_enter_guest syz done 19 299d 413d 250d d3329454 KVM: x86: remove bogus user-triggerable WARN_ON
general protection fault in hsr_addr_is_self (2) 1 301d 301d 250d 3a303cfd hsr: fix general protection fault in hsr_addr_is_self()
linux-next test error: KASAN: use-after-free Read in l2cap_sock_release 12 345d 347d 250d 2a154903 Bluetooth: prefetch channel before killing sock
possible deadlock in send_sigio C done 7 277d 286d 250d 63f818f4 proc: Use a dedicated lock in struct pid
WARNING: ODEBUG bug in __init_work syz done 1 298d 298d 250d ef299cc3 net_sched: cls_route: remove the right filter from hashtable
WARNING in call_rcu C done 8 304d 311d 250d ef299cc3 net_sched: cls_route: remove the right filter from hashtable
WARNING: ODEBUG bug in prism2sta_disconnect_usb 1 299d 298d 250d a1f165a6 staging: wlan-ng: fix ODEBUG bug in prism2sta_disconnect_usb
WARNING: ODEBUG bug in tcf_queue_work C done 30 316d 316d 250d ef299cc3 net_sched: cls_route: remove the right filter from hashtable
WARNING in __blk_mq_delay_run_hw_queue C done error 6 363d 468d 250d 6e66b493 blk-mq: Keep set->nr_hw_queues and set->map[].nr_queues in sync
general protection fault in qdisc_hash_add C done 47 308d 309d 250d 7c4046b1 Revert "net: sched: make newly activated qdiscs visible"
WARNING: refcount bug in tcindex_data_put C done 27 286d 288d 250d a8eab6d3 net_sched: fix a missing refcnt in tcindex_init()
KASAN: use-after-free Read in route4_get C 8 278d 308d 250d ef299cc3 net_sched: cls_route: remove the right filter from hashtable
KASAN: use-after-free Read in __list_del_entry_valid (4) C done 16 338d 1026d 250d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
general protection fault in erspan_netlink_parms C done 5 305d 305d 250d 32ca98fe net: ip_gre: Accept IFLA_INFO_DATA-less configuration
WARNING in kernfs_create_dir_ns C done done 3 305d 566d 250d 810507fe locking/lockdep: Reuse freed chain_hlocks entries
WARNING in af_alg_make_sg C done 13 281d 282d 250d ae46d2aa mm/gup: Let __get_user_pages_locked() return -EINTR for fatal signal
general protection fault in rdma_listen (2) syz done 104 288d 800d 250d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING in kernfs_new_node C done done 2 304d 529d 250d 810507fe locking/lockdep: Reuse freed chain_hlocks entries
possible deadlock in cma_netdev_callback C done 1399 282d 324d 250d 33fb27fd RDMA/siw: Fix passive connection establishment
WARNING: refcount bug in sctp_wfree C done 20 290d 311d 250d 5c3e82fe sctp: fix refcount bug in sctp_wfree
WARNING in ext4_write_inode 13 317d 324d 250d 10a98cb1 xfs: clear PF_MEMALLOC before exiting xfsaild thread
BUG: corrupted list in rdma_listen C 202 422d 1002d 250d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
possible deadlock in free_ioctx_users (2) C done 44 280d 287d 250d 63f818f4 proc: Use a dedicated lock in struct pid
WARNING: ODEBUG bug in route4_change C done 68 287d 310d 250d ef299cc3 net_sched: cls_route: remove the right filter from hashtable
KASAN: use-after-free Read in tty_open C done done 8 296d 408d 250d ca4463bf vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: slab-out-of-bounds Read in edge_interrupt_callback C 1 299d 298d 250d 57aa9f29 USB: serial: io_edgeport: fix slab-out-of-bounds read in edge_interrupt_callback
KMSAN: uninit-value in tcf_exts_change C 5 301d 310d 250d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
BUG: sleeping function called from invalid context in kmem_cache_alloc_node_trace C done 364 312d 314d 250d 138470a9 net/sched: act_ct: fix lockdep splat in tcf_ct_flow_table_get
KASAN: use-after-free Write in release_tty C done 591 287d 409d 250d ca4463bf vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
WARNING: ODEBUG bug in tcindex_destroy_work (3) syz done 13 289d 325d 250d 304e0242 net_sched: add a temporary refcnt for struct tcindex_data
KASAN: slab-out-of-bounds Read in hfa384x_usbin_callback C 1 301d 301d 250d 1165dd73 staging: wlan-ng: fix use-after-free Read in hfa384x_usbin_callback
KMSAN: uninit-value in macsec_handle_frame 1 300d 300d 250d b06d072c macsec: restrict to ethernet devices
WARNING: refcount bug in igmp_start_timer syz done done 19 515d 881d 273d 323ebb61 net: use listified RX for handling GRO_NORMAL skbs
possible deadlock in sch_direct_xmit C done done 1548 416d 1095d 273d 323ebb61 net: use listified RX for handling GRO_NORMAL skbs
KASAN: use-after-free Read in alloc_netdev_mqs 1 336d 336d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in __iptunnel_pull_header C 12 306d 315d 275d 17c25caf gre: fix uninit-value in __iptunnel_pull_header
KASAN: use-after-free Read in inet_gifconf 24 328d 335d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
INFO: task hung in hashlimit_mt_check_common C done 20 331d 371d 275d 8d0015a7 netfilter: xt_hashlimit: limit the max size of hashtable c4a3922d netfilter: xt_hashlimit: reduce hashlimit_mutex scope for htable_put()
divide error in wg_packet_encrypt_worker C done 12 329d 336d 275d 175f1ca9 wireguard: send: account for mtu=0 devices
WARNING in idr_destroy C done 5 303d 318d 275d b216a8e7 drm/lease: fix WARNING in idr_destroy
BUG: soft lockup in sys_exit_group C 6 300d 323d 275d d683469b ALSA: line6: Fix endless MIDI read loop
KASAN: use-after-free Read in ipv6_get_ifaddr 1 332d 332d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in inet_lookup_ifaddr_rcu 2 328d 331d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Write in hiddev_disconnect 20 302d 367d 275d 5c02c447 HID: hiddev: Fix race in in hiddev_disconnect()
KMSAN: use-after-free in netdev_state_change 2 319d 319d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in audit_receive C 4 326d 326d 275d 75612528 audit: always check the netlink payload length in audit_receive_msg()
WARNING: lock held when returning to user space in ovl_write_iter C done 6 305d 320d 275d c8536804 ovl: fix lockdep warning for async write
general protection fault in vt_ioctl 1 340d 340d 275d 6cd1ed50 net-backports: vt: vt_ioctl: fix race in VT_RESIZEX
KASAN: use-after-free Read in percpu_ref_switch_to_atomic_rcu 5 321d 343d 275d c1e2148f io_uring: free fixed_file_data after RCU grace period
KASAN: use-after-free Read in rtnl_fill_ifinfo (2) 2 333d 335d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
INFO: task hung in hashlimit_net_exit syz done 53 329d 337d 275d 8d0015a7 netfilter: xt_hashlimit: limit the max size of hashtable
kernel BUG at arch/x86/mm/physaddr.c:LINE! (4) C 18 294d 328d 275d 2ad3e17e audit: fix error handling in audit_data_to_entry()
KMSAN: uninit-value in slhc_compress C 3 317d 317d 275d 110a40df slip: make slhc_compress() more robust against malicious packets
WARNING: proc registration bug in hashlimit_mt_check_common C done 320 314d 340d 275d 99b79c39 netfilter: xt_hashlimit: unregister proc file before releasing mutex
linux-next test error: WARNING in snd_pcm_plug_alloc 3 309d 309d 275d 5461e053 ALSA: pcm: oss: Remove WARNING from snd_pcm_plug_alloc() checks
WARNING: ODEBUG bug in smc_ib_remove_dev 52 305d 319d 275d ece0d7bd net/smc: cancel event worker during device removal
memory leak in dma_buf_ioctl C done 129 325d 541d 275d d1f37226 dma-buf: free dmabuf->name in dma_buf_release()
KASAN: use-after-free Read in netdev_state_change 2 333d 334d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KCSAN: data-race in snd_seq_check_queue / snd_seq_control_queue 97 275d 374d 275d bb51e669 ALSA: seq: Avoid concurrent access to queue flags
INFO: trying to register non-static key in xa_destroy C done 46 298d 325d 275d 12e5eef0 RDMA/siw: Fix failure handling during device creation
BUG: unable to handle kernel NULL pointer dereference in inet_release syz 3 324d 325d 275d b6f61189 ipv6: restrict IPV6_ADDRFORM operation
INFO: rcu detected stall in ip_set_uadd C done 11 320d 357d 275d f66ee041 netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
general protection fault in batadv_iv_ogm_schedule 2 328d 342d 275d 8e8ce081 batman-adv: Don't schedule OGM for disabled interface
INFO: task hung in paste_selection C inconclusive done 8 341d 406d 275d e8c75a30 vt: selection, push sel_lock up
BUG: unable to handle kernel paging request in ethnl_update_bitset32 C 168 315d 326d 275d e34f1753 ethtool: limit bitset size
KASAN: use-after-free Read in ipv6_chk_addr_and_flags 1 334d 334d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in find_match C 52 305d 334d 275d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in vgem_gem_dumb_create C done 15 338d 349d 275d 4b848f20 drm/vgem: Close use-after-free race in vgem_gem_create
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache 2 345d 343d 275d 457fed77 net/smc: fix leak of kernel memory to user space
memory leak in nf_tables_parse_netdev_hooks (2) C 2 314d 319d 275d 2d285f26 netfilter: nf_tables: free flowtable hooks on hook register error
KMSAN: uninit-value in bond_alb_xmit syz 3 315d 317d 275d b7469e83 bonding/alb: make sure arp header is pulled before accessing it
divide error in encrypt_packet C done 89 328d 336d 275d 175f1ca9 wireguard: send: account for mtu=0 devices
general protection fault in smc_ib_remove_dev C done 98 314d 326d 275d a2f2ef4a net/smc: check for valid ib_client_data
possible deadlock in htab_lru_map_delete_node C done 264 328d 333d 275d b9aff38d bpf: Fix a potential deadlock with bpf_map_do_batch
KMSAN: use-after-free in inet_gifconf 10 305d 328d 275d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in ip6_dst_destroy C 2 308d 320d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KASAN: use-after-free Read in raw_notifier 3 333d 335d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
memory leak in fasync_helper C 14 343d 404d 275d 67f562e3 net/smc: transfer fasync_list in case of fallback
possible deadlock in tty_unthrottle 3 299d 323d 275d e8c75a30 vt: selection, push sel_lock up
possible deadlock in inet_csk_accept C done 992 309d 310d 275d 06669ea3 net: memcg: fix lockdep splat in inet_csk_accept()
KASAN: slab-out-of-bounds Read in ethnl_update_bitset32 syz 2 321d 326d 275d e34f1753 ethtool: limit bitset size
KMSAN: uninit-value in audit_log_vformat C 220 275d 326d 275d 75612528 audit: always check the netlink payload length in audit_receive_msg()
KASAN: use-after-free Read in dev_get_by_index_rcu 1 329d 329d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
INFO: rcu detected stall in hash_ip4_gc C done 1 356d 355d 275d f66ee041 netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
KCSAN: data-race in queue_access_lock / snd_seq_check_queue 58 314d 356d 275d bb51e669 ALSA: seq: Avoid concurrent access to queue flags
KMSAN: kernel-infoleak in tty_compat_ioctl C 162 296d 326d 275d 17329563 tty: fix compat TIOCGSERIAL leaking uninitialized memory
BUG: sleeping function called from invalid context in __kmalloc C done 5 336d 343d 275d b27a939e ceph: canonicalize server path in place
INFO: rcu detected stall in ip_set_udel C done 12 334d 357d 275d f66ee041 netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
general protection fault in ip_set_comment_free C done 19 318d 355d 275d 8af1c6fb netfilter: ipset: Fix forceadd evaluation path
possible deadlock in bond_get_stats (3) syz done 2 329d 329d 275d b3e80d44 bonding: fix lockdep warning in bond_get_stats()
general protection fault in batadv_iv_ogm_schedule_buff 24 311d 334d 275d 8e8ce081 batman-adv: Don't schedule OGM for disabled interface
KMSAN: use-after-free in veth_xmit 8 305d 320d 275d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in kstrdup C 8 311d 338d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
possible deadlock in sidtab_sid2str_put C done 1382 336d 353d 275d 39a706fb selinux: fix sidtab string cache locking
KCSAN: data-race in __snd_rawmidi_transmit_ack / snd_rawmidi_write 168 276d 401d 275d dfa9a5ef ALSA: rawmidi: Avoid bit fields for state flags
KASAN: use-after-free Read in vsscanf 2 331d 333d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in n_tty_receive_buf_common C done 68 330d 406d 275d 07e6124a vt: selection, close sel_buffer race
KASAN: use-after-free Read in ethnl_update_bitset32 C done 6 318d 326d 275d e34f1753 ethtool: limit bitset size
KASAN: use-after-free Read in fib_nexthop_info 1 334d 334d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
general protection fault in nf_flow_table_offload_setup C done done 835 328d 362d 275d a7da92c2 netfilter: flowtable: skip offload setup if disabled
memory leak in nfs_fs_context_parse_monolithic C 18 309d 336d 275d 75a9b917 NFS: Fix leak of ctx->nfs_server.hostname
KASAN: slab-out-of-bounds Read in inet_gifconf 2 335d 335d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KASAN: use-after-free Read in find_match C done 142 328d 335d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in fat_evict_inode C 256 305d 329d 275d bc87302a fat: fix uninit-memory access for partial initialized inode
KASAN: use-after-free Read in br_dev_xmit 1 324d 324d 275d 823d81b0 net: bridge: fix stale eth hdr pointer in br_dev_xmit
KASAN: use-after-free Read in ip6_dst_destroy C done 1 334d 334d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
WARNING: bad unlock balance in ovl_llseek C done 4 306d 320d 275d 531d3040 ovl: fix lock in ovl_llseek()
KASAN: use-after-free Read in l3mdev_master_ifindex_rcu C done done 13 331d 336d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: slab-out-of-bounds Read in resample_shrink C done 5 297d 315d 275d f2ecf903 ALSA: pcm: oss: Avoid plugin buffer overflow
general protection fault in nldev_stat_set_doit C done 8 308d 325d 275d 78f34a16 RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing
kernel panic: stack is corrupted in vhost_net_ioctl C done 2 335d 421d 275d 42d84c84 vhost: Check docket sk_family instead of call getname
KASAN: use-after-free Read in __neigh_notify 2 333d 334d 275d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr C done 8 315d 325d 275d dc24f8b4 mptcp: add dummy icsk_sync_mss()
INFO: task hung in lock_sock_nested (2) C done 418 315d 328d 275d 3f74957f vsock: fix potential deadlock in transport->release()
KMSAN: use-after-free in l3mdev_master_ifindex_rcu C 5 305d 328d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
unregister_netdevice: waiting for DEV to become free (3) C 1864 275d 336d 275d e34f1753 ethtool: limit bitset size
KMSAN: use-after-free in dev_alloc_name_ns 3 305d 319d 275d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KCSAN: data-race in snd_seq_prioq_cell_out / snd_seq_timer_interrupt 118 276d 370d 275d dc749779 ALSA: seq: Fix concurrent access to queue current tick/time
KASAN: use-after-free Read in mld_in_v1_mode C done 3 333d 336d 275d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
possible deadlock in bpf_lru_push_free C done 609 328d 334d 275d b9aff38d bpf: Fix a potential deadlock with bpf_map_do_batch
WARNING in switch_fpu_return syz done done 11 346d 379d 296d 2620fe26 KVM: x86: Revert "KVM: X86: Fix fpu state crash in kvm guest"
KMSAN: use-after-free in rdma_listen C 26 316d 462d 296d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen C 28 473d 838d 296d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KASAN: slab-out-of-bounds Read in bitmap_ip_add syz done done 7 351d 362d 296d 32c72165 netfilter: ipset: use bitmap infrastructure completely
general protection fault in __nf_tables_chain_type_lookup 1 361d 360d 302d 82603549 netfilter: nf_tables: add __nft_chain_type_get()
KASAN: slab-out-of-bounds Read in bitmap_ip_ext_cleanup C done done 8 345d 361d 303d 32c72165 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_port_ext_cleanup C done done 10 354d 362d 303d 32c72165 netfilter: ipset: use bitmap infrastructure completely
BUG: corrupted list in __nf_tables_abort C done done 29 356d 363d 303d eb014de4 netfilter: nf_tables: autoload modules from the abort path
KASAN: slab-out-of-bounds Read in bitmap_ipmac_destroy C done done 2 357d 357d 303d 32c72165 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_ipmac_gc C done done 70 344d 361d 303d 32c72165 netfilter: ipset: use bitmap infrastructure completely
BUG: unable to handle kernel paging request in ion_heap_sglist_zero 1 409d 409d 303d d98c9e83 kasan: fix crashes on access to memory mapped by vm_map_ram()
KASAN: slab-out-of-bounds Read in bitmap_ipmac_ext_cleanup C unreliable done 15 345d 361d 303d 32c72165 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_port_destroy C done done 2 358d 357d 303d 32c72165 netfilter: ipset: use bitmap infrastructure completely
general protection fault in gcmaes_crypt_by_sg (2) C error done 28 361d 408d 310d db885e66 net/tls: fix async operation
possible deadlock in wg_noise_handshake_create_initiation C done 11 343d 347d 310d ec31c267 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in slcan_open C done 2 411d 410d 310d 9ebd796e can: slcan: Fix use-after-free Read in slcan_open
kernel BUG at fs/btrfs/volumes.c:LINE! 130 415d 954d 310d 321f69f8 btrfs: reset device back to allocation state when removing
BUG: unable to handle kernel paging request in slhc_free C done done 177 631d 748d 310d baf76f0c slip: make slhc_free() silently accept an error pointer
WARNING in _chaoskey_fill/usb_submit_urb C 15 427d 480d 310d 92aa5986 USB: chaoskey: fix error case of a timeout
KASAN: slab-out-of-bounds Read in iov_iter_alignment C error error 79 410d 407d 310d e0ff126e pipe: Fix bogus dereference in iov_iter_alignment()
possible deadlock in wg_set_device C done 33 342d 346d 310d ec31c267 wireguard: noise: reject peers with low order public keys
WARNING: ODEBUG bug in io_sqe_files_unregister C done 964 344d 391d 310d 2faf852d io_uring: cleanup fixed file data table references
WARNING in flexcop_usb_probe/usb_submit_urb C 4 475d 513d 310d 1b976fc6 media: b2c2-flexcop-usb: add sanity checking
linux-next build error (7) 7 355d 359d 310d ac6119e7 efi/x86: Disable instrumentation in the EFI runtime handling code
BUG: unable to handle kernel paging request in xfs_sb_read_verify 69 392d 412d 314d d98c9e83 kasan: fix crashes on access to memory mapped by vm_map_ram()
BUG: unable to handle kernel paging request in ion_heap_clear_pages C 4378 392d 412d 314d d98c9e83 kasan: fix crashes on access to memory mapped by vm_map_ram()
KASAN: use-after-free Read in bitmap_ip_ext_cleanup C done done 2 361d 362d 327d 32c72165 netfilter: ipset: use bitmap infrastructure completely
KASAN: use-after-free Read in bitmap_ipmac_ext_cleanup C done done 2 361d 361d 327d 32c72165 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Write in bitmap_ip_del C done done 7 359d 361d 327d 32c72165 netfilter: ipset: use bitmap infrastructure completely
KASAN: use-after-free Read in bitmap_ip_destroy C done done 1 362d 361d 331d 32c72165 netfilter: ipset: use bitmap infrastructure completely
upstream boot error: KASAN: slab-out-of-bounds Write in hpet_alloc 33 350d 351d 332d 98c49f17 char: hpet: Fix out-of-bounds read bug
KMSAN: uninit-value in setup_udp_tunnel_sock C 1 360d 360d 332d 940ba149 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
WARNING in nft_request_module C done 7 365d 365d 332d 9332d27d netfilter: nf_tables: remove WARN and add NLA_STRING upper limits
memory leak in reiserfs_fill_super C 20 351d 400d 332d 5474ca7d reiserfs: Fix memory leak of journal device string
WARNING: lock held when returning to user space in tun_get_user (2) 7 348d 359d 332d 1efba987 net-backports: tun: add mutex_unlock() call and napi.skb clearing in tun_get_user()
memory leak in kobject_set_name_vargs (2) C done 47 357d 541d 332d cb626bf5 net-sysfs: Fix reference count leak
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_cpus 7 344d 438d 332d c51f83c3 rcu: Use READ_ONCE() for ->expmask in rcu_read_unlock_special()
KASAN: slab-out-of-bounds Read in bitmap_port_gc C done 197 345d 363d 332d 32c72165 netfilter: ipset: use bitmap infrastructure completely
KMSAN: uninit-value in can_receive C 14 335d 424d 332d e7153bf7 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
memory leak in _sctp_make_chunk C 1 396d 396d 332d be7a7729 sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY
WARNING in devlink_port_type_warn 2340 362d 434d 332d 4c582234 devlink: Wait longer before warning about unset port type
BUG: unable to handle kernel NULL pointer dereference in x25_connect 1 406d 405d 332d e21dba7a net/x25: fix nonblocking connect
KASAN: user-memory-access Write in video_usercopy 3 372d 373d 332d 1dc8b65c media: v4l2-core: only zero-out ioctl-read buffers
BUG: unable to handle kernel NULL pointer dereference in cfg80211_wext_siwrts 3 362d 371d 332d 24953de0 cfg80211: check for set_wiphy_params
KASAN: null-ptr-deref Write in x25_connect 1 410d 406d 332d e21dba7a net/x25: fix nonblocking connect
KASAN: slab-out-of-bounds Read in bitmap_ip_list C 85 347d 363d 332d 32c72165 netfilter: ipset: use bitmap infrastructure completely
kernel BUG at fs/namei.c:LINE! 3593 367d 367d 332d c64cd6e3 reimplement path_mountpoint() with less magic
KASAN: use-after-free Read in bitmap_port_ext_cleanup C done 11 362d 371d 332d c1209593 netfilter: fix a use-after-free in mtype_destroy()
KMSAN: uninit-value in sd_init (2) C 94 438d 434d 332d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in __request_module (3) C 58 332d 361d 332d 36d79af7 net-backports: net_sched: use validated TCA_KIND attribute in tc_new_tfilter()
KMSAN: uninit-value in rsvp_change C 4 352d 353d 332d cb3c0e6b cls_rsvp: fix rsvp_policy
BUG: unable to handle kernel paging request in rhashtable_replace_fast 2 358d 365d 332d 41cdc741 netdevsim: fix nsim_fib6_rt_create() error path
KASAN: use-after-free Read in __nf_tables_abort C done 3 359d 361d 332d eb014de4 netfilter: nf_tables: autoload modules from the abort path
KASAN: use-after-free Read in rsi_rx_done_handler 8 371d 500d 332d e93cd351 rsi: fix use-after-free on failed probe and unbind
general protection fault in hsr_addr_is_self 3 334d 349d 332d 2b5b8251 net: hsr: fix possible NULL deref in hsr_handle_frame()
WARNING: suspicious RCU usage in find_set_and_id syz done 6 357d 360d 332d 50385171 netfilter: ipset: fix suspicious RCU usage in find_set_and_id
BUG: corrupted list in nft_obj_del C done 7 363d 365d 332d 335178d5 netfilter: nf_tables: fix flowtable list del corruption
BUG: corrupted list in nf_tables_commit C done 8 365d 365d 332d 335178d5 netfilter: nf_tables: fix flowtable list del corruption
kernel panic: stack is corrupted in __lock_acquire (4) syz error error 75 427d 585d 332d 4da6a196 bpf: Sockmap/tls, during free we may call tcp_bpf_unhash() in loop
INFO: rcu detected stall in addrconf_rs_timer (3) C inconclusive done 81 392d 388d 332d d9e15a27 pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
KASAN: slab-out-of-bounds Read in bitmap_ipmac_list C done 108 348d 363d 332d 32c72165 netfilter: ipset: use bitmap infrastructure completely
BUG: corrupted list in __dentry_kill (2) C done 4945 400d 400d 332d a3d1e7eb simple_recursive_removal(): kernel-side rm -rf for ramfs-style filesystems
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (2) C done 8 358d 360d 332d 940ba149 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
BUG: sleeping function called from invalid context in lock_sock_nested C 1232 332d 407d 332d 37f96694 crypto: af_alg - Use bh_lock_sock in sk_destruct
general protection fault in dccp_timeout_nlattr_to_obj C done 7 372d 374d 332d 1d9a7acd netfilter: conntrack: dccp, sctp: handle null timeout argument
memory leak in vlan_dev_set_egress_priority C 1 374d 374d 332d 9bbd917e vlan: fix memory leak in vlan_dev_set_egress_priority
general protection fault in nft_parse_register 1 363d 363d 332d 7eaecf79 netfilter: nft_osf: add missing check for DREG attribute
WARNING in sk_psock_drop 157 355d 364d 332d 58c8db92 net, sk_msg: Don't check if sock is locked when tearing down psock
KCSAN: data-race in __rcu_read_unlock / rcu_report_exp_cpu_mult 21 347d 407d 332d c51f83c3 rcu: Use READ_ONCE() for ->expmask in rcu_read_unlock_special()
KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor (3) 142 337d 389d 332d a8772fad tomoyo: Use atomic_t for statistics counter
KMSAN: uninit-value in macvlan_broadcast C 2 374d 375d 332d 96cc4b69 macvlan: do not assume mac_header is set in macvlan_broadcast()
general protection fault in xt_rateest_tg_checkentry C done 12 375d 385d 332d 1b789577 netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
general protection fault in hash_netiface6_uadt 1 371d 371d 332d 22dad713 netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
WARNING in tcp_ack C done 3 372d 373d 332d 90d72256 gtp: fix bad unlock balance in gtp_encap_enable_socket
memory leak in em_nbyte_change C 1 357d 356d 332d 55cd9f67 net_sched: ematch: reject invalid TCF_EM_SIMPLE
KCSAN: data-race in __skb_try_recv_from_queue / unix_dgram_sendmsg 61 347d 366d 332d 86b18aaa skbuff: fix a data race in skb_queue_len()
KMSAN: uninit-value in digitv_rc_query C 4 450d 434d 332d eecc70d2 media: digitv: don't continue if remote control state can't be read 569bc8d6 media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0
general protection fault in xt_rateest_put C done 97 363d 370d 332d 212e7f56 netfilter: arp_tables: init netns pointer in xt_tgdtor_param struct
KCSAN: data-race in rcu_gp_fqs_check_wake / rcu_preempt_deferred_qs_irqrestore 99 343d 464d 332d 6935c398 rcu: Avoid data-race in rcu_gp_fqs_check_wake()
BUG: sleeping function called from invalid context in tpk_write C done 12 364d 405d 332d 9a655c77 ttyprintk: fix a potential deadlock in interrupt context issue
KCSAN: data-race in rcu_gp_fqs_check_wake / rcu_note_context_switch 51 344d 457d 332d 6935c398 rcu: Avoid data-race in rcu_gp_fqs_check_wake()
memory leak in snd_pcm_hw_params C 25 344d 352d 332d 66f2d19f ALSA: pcm: Fix memory leak at closing a stream without hw_free
KASAN: slab-out-of-bounds Read in macvlan_broadcast C done 10 372d 375d 332d 96cc4b69 macvlan: do not assume mac_header is set in macvlan_broadcast()
KMSAN: uninit-value in number C 190 336d 434d 332d 51d0c99b media: af9005: uninitialized variable printked
KCSAN: data-race in find_next_bit / rcu_report_exp_cpu_mult 203 343d 466d 332d 15c7c972 rcu: Use *_ONCE() to protect lockless ->expmask accesses
KMSAN: uninit-value in __tipc_nl_compat_dumpit C 4428 332d 401d 332d a7869e5f tipc: eliminate KMSAN: uninit-value in __tipc_nl_compat_dumpit error
KASAN: slab-out-of-bounds Read in nla_put_nohdr C done 1 359d 359d 332d 61678d28 net_sched: fix datalen for ematch
general protection fault in path_openat C done 7 349d 349d 332d 6404674a vfs: fix do_last() regression
general protection fault in free_verifier_state (3) C 5 360d 366d 332d f59bbfc2 bpf: Fix error path under memory pressure
WARNING: bad unlock balance in release_sock 1 373d 373d 332d 90d72256 gtp: fix bad unlock balance in gtp_encap_enable_socket
KASAN: use-after-free Read in tcp_fastretrans_alert C done 1 363d 363d 332d 2bec445f net-backports: tcp: do not leave dangling pointers in tp->highest_sack
KASAN: use-after-free Read in root_remove_peer_lists C done 2 349d 349d 332d 9981159f wireguard: allowedips: fix use-after-free in root_remove_peer_lists
KASAN: use-after-free Read in snd_timer_resolution C 5 348d 366d 332d 60adcfde ALSA: seq: Fix racy access for queue timer in proc read
KMSAN: uninit-value in i2c_w (2) C 3 445d 434d 332d de89d086 media: gspca: zero usb_buf
KCSAN: data-race in tick_do_update_jiffies64 / tick_do_update_jiffies64 (4) 394 337d 408d 332d de95a991 net-backports: tick/sched: Annotate lockless access to last_jiffies_update
general protection fault in hash_netnet6_uadt 1 372d 372d 332d 22dad713 netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
BUG: unable to handle kernel paging request in rhashtable_jhash2 C done 6 365d 366d 332d 41cdc741 netdevsim: fix nsim_fib6_rt_create() error path
memory leak in tcf_ctinfo_init C 2 361d 363d 332d 09d4f10a net: sched: act_ctinfo: fix memory leak
WARNING in do_dentry_open (2) C done 17 352d 349d 332d a37f4958 debugfs: Return -EPERM when locked down
KASAN: slab-out-of-bounds Read in __nla_put_nohdr C done 4 359d 360d 332d 61678d28 net_sched: fix datalen for ematch
INFO: rcu detected stall in br_handle_frame (2) C done 2 392d 388d 332d d9e15a27 pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
memory leak in nf_tables_parse_netdev_hooks C 6 335d 365d 332d cd77e75b netfilter: nf_tables: fix memory leak in nf_tables_parse_netdev_hooks()
KCSAN: data-race in process_srcu / synchronize_srcu 112 343d 438d 332d 844a378d srcu: Apply *_ONCE() to ->srcu_last_gp_end
WARNING in __proc_create (2) C done 4 359d 359d 332d a45ea48e afs: Fix characters allowed into cell names
INFO: rcu detected stall in netlink_sendmsg (3) C done 6 339d 392d 332d d9e15a27 pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
general protection fault in timer_is_static_object C 2 416d 413d 332d cb222aed Input: add safety guards to input_set_keycode()
KASAN: null-ptr-deref Write in queue_work_on C done error 5 516d 512d 332d 0ace17d5 can, slip: Protect tty->disc_data in write_wakeup and close with RCU
WARNING in cbq_destroy_class C done 7 337d 360d 332d 2e24cd75 net_sched: fix ops->bind_class() implementations
WARNING in tracepoint_probe_register_prio (3) syz done 979 335d 973d 332d 64ae572b tracing: Fix sched switch start/stop refcount racy updates
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE! C done 6 388d 396d 332d 005ba37c mm: thp: KVM: Explicitly check for THP when populating secondary MMU
BUG: spinlock already unlocked in input_set_keycode C 2 425d 424d 332d cb222aed Input: add safety guards to input_set_keycode()
WARNING: refcount bug in cdev_get C done 105 373d 513d 332d 68faa679 chardev: Avoid potential use-after-free in 'chrdev_open()'
KMSAN: uninit-value in read_sensor_register (2) C 44 439d 456d 332d de89d086 media: gspca: zero usb_buf
inconsistent lock state in rxrpc_put_client_conn C done 18198 340d 346d 332d 963485d4 rxrpc: Fix call RCU cleanup using non-bh-safe locks
general protection fault in hash_ipmark6_uadt 2 371d 372d 332d 22dad713 netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
WARNING in cbq_destroy C done 1 359d 359d 332d 2e24cd75 net_sched: fix ops->bind_class() implementations
WARNING in dln2_start_rx_urbs/usb_submit_urb C 44 347d 436d 332d 2b8bd606 mfd: dln2: More sanity checking for endpoints
KASAN: use-after-free Read in tcp_check_sack_reordering C done 2 354d 363d 332d 2bec445f net-backports: tcp: do not leave dangling pointers in tp->highest_sack
BUG: unable to handle kernel NULL pointer dereference in cfg80211_wext_siwfrag C done 8 362d 374d 332d 24953de0 cfg80211: check for set_wiphy_params
WARNING in cgroup_apply_control_enable C done 178 368d 921d 332d 3bc0bb36 cgroup: Prevent double killing of css when enabling threaded cgroup
KASAN: slab-out-of-bounds Read in hid_field_extract C 6 372d 406d 332d 8ec321e9 HID: Fix slab-out-of-bounds read in hid_field_extract
general protection fault in nft_chain_parse_hook C done 48 351d 365d 332d 82603549 netfilter: nf_tables: add __nft_chain_type_get()
WARNING in nf_tables_table_destroy C done done 1 363d 363d 332d eb014de4 netfilter: nf_tables: autoload modules from the abort path
KASAN: slab-out-of-bounds Write in mpol_parse_str C done 3 370d 366d 332d c7a91bc7 mm/mempolicy.c: fix out of bounds write in mpol_parse_str()
KASAN: slab-out-of-bounds Read in bitmap_ip_gc C done 15 344d 363d 332d 32c72165 netfilter: ipset: use bitmap infrastructure completely
WARNING: ODEBUG bug in rsi_probe C 10487 346d 642d 332d 92aafe77 rsi: fix use-after-free on probe errors
KASAN: use-after-free Read in macvlan_broadcast C done 12 373d 375d 332d 96cc4b69 macvlan: do not assume mac_header is set in macvlan_broadcast()
general protection fault in nft_tunnel_get_init C done 7 365d 365d 332d 1c702bf9 netfilter: nft_tunnel: fix null-attribute check
KASAN: slab-out-of-bounds Read in bitmap_port_add syz done 9 356d 363d 332d 32c72165 netfilter: ipset: use bitmap infrastructure completely
WARNING: bad unlock balance in gtp_encap_enable_socket C done 8 371d 375d 332d 90d72256 net-backports: gtp: fix bad unlock balance in gtp_encap_enable_socket
WARNING: bad unlock balance in sch_direct_xmit C done 35 362d 409d 332d 53d37497 net: avoid updating qdisc_xmit_lock_key in netdev_update_lockdep_key()
general protection fault in inet6_set_link_af C done 8 341d 345d 332d db3fa271 ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
general protection fault in tcf_ife_cleanup C done 111 346d 370d 332d 44c23d71 net/sched: act_ife: initalize ife->metalist earlier
BUG: unable to handle kernel paging request in do_csum (2) C done 6 355d 357d 332d 6cd021a5 udp: segment looped gso packets correctly
KASAN: use-after-free Write in hci_sock_bind 4 334d 366d 332d 11eb85ec Bluetooth: Fix race condition in hci_release_sock()
KASAN: use-after-free Write in __alloc_skb (2) C done 7 383d 399d 332d d836f5c6 net-backports: net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
KASAN: slab-out-of-bounds Read in bitmap_ip_test syz 10 352d 363d 332d 32c72165 netfilter: ipset: use bitmap infrastructure completely
WARNING in geneve_exit_batch_net 15 332d 357d 332d 760d228e net_sched: walk through all child classes in tc_bind_tclass()
KASAN: slab-out-of-bounds Read in tcf_exts_destroy C done error 8 454d 357d 332d 599be01e net_sched: fix an OOB access in cls_tcindex
general protection fault in hash_ipportnet4_uadt C done 13 371d 374d 332d 22dad713 netfilter: ipset: avoid null deref when IPSET_ATTR_LINENO is present
KASAN: use-after-free Write in percpu_ref_switch_to_percpu 1 346d 345d 332d 2faf852d io_uring: cleanup fixed file data table references
KASAN: slab-out-of-bounds Read in bitmap_port_list C 152 355d 363d 332d 32c72165 netfilter: ipset: use bitmap infrastructure completely
WARNING in uvc_scan_chain_forward C 6 371d 396d 332d 68035c80 media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
WARNING: ODEBUG bug in tcindex_destroy_work (2) 5 337d 347d 332d 599be01e net_sched: fix an OOB access in cls_tcindex
inconsistent lock state in rxrpc_put_client_connection_id C done 473 340d 346d 332d 963485d4 rxrpc: Fix call RCU cleanup using non-bh-safe locks
INFO: task hung in aead_recvmsg C done 11991 358d 1132d 332d bbefa1dd crypto: pcrypt - Avoid deadlock by using per-instance padata queues
KASAN: use-after-free Read in bitmap_port_destroy C 1 363d 363d 332d c1209593 netfilter: fix a use-after-free in mtype_destroy()
KASAN: null-ptr-deref Read in tcf_generic_walker C done 6 336d 354d 332d 760d228e net_sched: walk through all child classes in tc_bind_tclass()
WARNING: refcount bug in chrdev_open C inconclusive done 15 411d 514d 332d 68faa679 chardev: Avoid potential use-after-free in 'chrdev_open()'
KMSAN: uninit-value in dvb_usb_adapter_dvb_init 1 441d 434d 332d 26cff637 media: vp7045: do not read uninitialized values if usb transfer fails
INFO: task hung in __generic_file_fsync (2) C done done 28 378d 379d 332d 85a8ce62 block: add bio_truncate to fix guard_bio_eod
WARNING in tcp_enter_loss (2) C done unreliable 4 990d 1040d 332d 16ae6aa1 tcp: ignore Fast Open on repair mode
KASAN: null-ptr-deref Read in refcount_sub_and_test_checked (2) C inconclusive done 916 591d 793d 332d 62dcb4f4 media: vb2: check memory model for VIDIOC_CREATE_BUFS
BUG: unable to handle kernel paging request in xfs_sb_quiet_read_verify C done 6 392d 393d 336d d98c9e83 kasan: fix crashes on access to memory mapped by vm_map_ram()
KASAN: vmalloc-out-of-bounds Write in pcpu_alloc C done 31 384d 408d 336d 253a496d kasan: don't assume percpu shadow allocations will succeed
KASAN: use-after-free Read in iov_iter_alignment C error 3 410d 410d 336d e0ff126e pipe: Fix bogus dereference in iov_iter_alignment()
memory leak in sctp_stream_init C 1 397d 396d 336d 951c6db9 sctp: fix memleak on err handling of stream initialization
general protection fault in gigaset_probe C 6 421d 540d 336d 53f35a39 staging: gigaset: fix general protection fault on probe
KASAN: use-after-free Read in ext4_xattr_set_entry (2) C done 19 396d 805d 336d 9803387c ext4: validate the debug_want_extra_isize mount option at parse time
KMSAN: uninit-value in __crc32c_le_base syz 567 373d 419d 336d b6f3320b sctp: fully initialize v4 addr in some functions
unregister_netdevice: waiting for DEV to become free (2) C done 385621 336d 884d 336d ddd9b5e3 net-sysfs: Call dev_hold always in rx_queue_add_kobject
KMSAN: uninit-value in br_nf_forward_arp (3) 2 412d 405d 336d 56042858 net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
KCSAN: data-race in taskstats_exit / taskstats_exit 157 337d 468d 336d 0b8d616f taskstats: fix data-race
WARNING in azx_rirb_get_response 4 394d 396d 336d 475feec0 ALSA: hda - Downgrade error message for single-cmd fallback
INFO: task hung in sync_inodes_sb (3) C done 6 377d 385d 336d 85a8ce62 block: add bio_truncate to fix guard_bio_eod
linux-next boot error: general protection fault in do_mount_root 9 395d 396d 336d 7de7de7c Fix root mounting with no mount options
upstream boot error: general protection fault in do_mount_root 12 396d 396d 336d 7de7de7c Fix root mounting with no mount options
KMSAN: uninit-value in bond_neigh_setup 64 381d 405d 336d f394722f net-backports: neighbour: remove neigh_cleanup() method
KASAN: use-after-free Read in tomoyo_realpath_from_path syz error error 7 396d 590d 336d 6f7c4137 tomoyo: Don't use nifty names on sockets.
KASAN: slab-out-of-bounds Read in hsr_debugfs_rename C done 18 375d 384d 336d 04b69426 hsr: fix slab-out-of-bounds Read in hsr_debugfs_rename()
general protection fault in j1939_sk_bind syz done done 22 411d 437d 336d 00d4e14d can: j1939: j1939_sk_bind(): take priv after lock is held
BUG: unable to handle kernel paging request in pcpu_alloc C done 24 389d 408d 336d 253a496d kasan: don't assume percpu shadow allocations will succeed
general protection fault in sctp_stream_free (2) C done 25 381d 392d 336d 61d5d406 sctp: fix err handling of stream initialization
inconsistent lock state in sp_get C done 2 400d 400d 336d 5c9934b6 6pack,mkiss: fix possible deadlock
general protection fault in j1939_jsk_del (2) syz 21 395d 412d 336d 00d4e14d can: j1939: j1939_sk_bind(): take priv after lock is held
KASAN: vmalloc-out-of-bounds Read in compat_copy_entries C done 3 397d 397d 336d e608f631 netfilter: ebtables: compat: reject all padding in matches/watchers
WARNING in ovl_rename C done done 5 628d 625d 336d 6889ee5a ovl: relax WARN_ON() on rename to self
possible deadlock in mon_bin_vma_fault C done 11427 398d 864d 336d 19e6317d usb: mon: Fix a deadlock in usbmon between mmap and read
WARNING: refcount bug in smc_release (2) C done 9 394d 417d 336d 86434744 net/smc: add fallback check to connect()
BUG: corrupted list in hsr_add_node 1 438d 437d 336d 92a35678 hsr: fix a race condition in node list insertion and deletion
BUG: Bad rss-counter state (3) C unreliable done 438 536d 1002d 350d 173d9d9f mm/huge_memory: splitting set mapping+index before unfreeze
possible deadlock in flush_workqueue (2) C done done 256 384d 818d 350d e7c58097 hugetlbfs: revert "Use i_mmap_rwsem to fix page fault/truncate race"
KASAN: slab-out-of-bounds Read in build_audio_procunit (2) C 1 435d 435d 357d 976a68f0 ALSA: usb-audio: Fix incorrect size check for processing/extension units
KASAN: use-after-free Read in j1939_xtp_rx_abort_one C done done 11 430d 437d 362d ddeeb7d4 can: j1939: j1939_can_recv(): add priv refcounting
memory leak in fdb_create (2) C 1 410d 410d 373d c4b4c421 net: bridge: deny dev_set_mac_address() when unregistering
KMSAN: uninit-value in __request_module (2) 3 392d 405d 373d 2dd5616e net-backports: net_sched: validate TCA_KIND attribute in tc_chain_tmplt_add()
KASAN: vmalloc-out-of-bounds Write in kvm_dev_ioctl_get_cpuid C 41 408d 408d 373d 433f4ba1 KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)
kernel BUG at include/linux/mm.h:LINE! (5) C done done 129 612d 682d 373d 9354544c net/tls: fix page double free on TX cleanup
KASAN: use-after-free Read in __queue_work (2) C done done 577 568d 921d 373d 430ac66e net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
KASAN: slab-out-of-bounds Read in bpf_prog_create C done 447 404d 486d 373d 0033b34a ppp: fix out-of-bounds access in bpf_prog_create()
memory leak in register_netdevice C 19 404d 410d 373d 42c17fa6 net: fix a leak in register_netdevice()
KASAN: slab-out-of-bounds Read in vcs_scr_readw C done done 16 408d 409d 373d 0c9acb1a vcs: prevent write access to vcsu devices
kernel BUG at fs/pipe.c:LINE! C done 693 403d 410d 373d 8c7b8c34 pipe: Remove assertion from pipe_poll()
KMSAN: uninit-value in usbnet_probe C 1 590d 590d 373d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in nf_conntrack_tcp_packet syz 3 407d 410d 373d 9424e2e7 net-backports: tcp: md5: fix potential overestimation of TCP option space
KASAN: slab-out-of-bounds Read in linear_transfer (3) C done 5 407d 408d 373d 4cc8d650 ALSA: pcm: oss: Avoid potential buffer overflows
KCSAN: data-race in mod_timer / run_timer_softirq 4 390d 455d 373d 56144737 net-backports: hrtimer: Annotate lockless access to timer->state
KASAN: slab-out-of-bounds Write in pipe_write C done 40 405d 410d 373d 8f868d68 pipe: Fix missing mask update after pipe_wait()
WARNING in tty_set_termios C done done 1997 533d 733d 373d b36a1552 Bluetooth: hci_uart: check for missing tty operations
general protection fault in override_creds C done 6 407d 410d 373d 0b8c0ec7 io_uring: use current task creds instead of allocating a new one
WARNING in drm_mode_createblob_ioctl C done 7 436d 459d 373d 5bf8bec3 drm: limit to INT_MAX in create_blob ioctl
WARNING: refcount bug in skb_set_owner_w C done 2 410d 410d 373d 501a90c9 net-backports: inet: protect against too small mtu values.
KASAN: use-after-free Read in xlog_alloc_log (2) 55 404d 412d 373d 798a9cad xfs: fix mount failure crash on invalid iclog memory access
KMSAN: use-after-free in netlink_recvmsg C 1 429d 429d 399d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in kfree_skb syz 34 416d 464d 399d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in io_commit_cqring C done 3 428d 429d 399d 15dff286 io_uring: check for validity of ->rings in teardown
general protection fault in ext4_writepages C done 18 423d 431d 399d 4d06bfb9 ext4: Add error handling for io_end_vec struct allocation
KMSAN: use-after-free in __skb_try_recv_from_queue C 4 428d 452d 399d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in ip_sublist_rcv C done 287 442d 452d 399d 51210ad5 inet: do not call sublist_rcv on empty list
kernel BUG at include/linux/scatterlist.h:LINE! C done 307 410d 604d 399d d10523d0 net/tls: free the record on encryption error
KASAN: use-after-free Read in snd_timer_open C done 87 430d 431d 399d 0c4f09ce ALSA: timer: Fix the breakage of slave link open
linux-next boot error: general protection fault in __x64_sys_settimeofday 6 427d 428d 399d 5e0fb1b5 y2038: time: avoid timespec usage in settimeofday()
INFO: task hung in io_wq_destroy C done 20 414d 445d 399d b60fda60 io-wq: wait for io_wq_create() to setup necessary workers
INFO: trying to register non-static key in io_cqring_ev_posted C done 6 415d 427d 399d eb065d30 io_uring: io_allocate_scq_urings() should return a sane state
KASAN: global-out-of-bounds Write in kbd_event C 6 413d 436d 399d b2b2dd71 tty: vt: keyboard: reject invalid keycodes
KCSAN: data-race in __ip4_datagram_connect / raw_bind 1 447d 447d 399d 25c7a6d1 net: avoid potential false sharing in neighbor related code
KASAN: slab-out-of-bounds Write in __ext4_expand_extra_isize 16 522d 865d 399d 4ea99936 ext4: add more paranoia checking in ext4_expand_extra_isize handling
KASAN: use-after-free Read in tipc_nl_node_dump_monitor_peer C done 3 464d 464d 399d ab5b526d net: genetlink: always allocate separate attrs for dumpit ops
KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit 40 400d 449d 399d 90b2be27 net/sched: annotate lockless accesses to qdisc->empty
general protection fault in tss_update_io_bitmap C done 65 415d 421d 399d e3cb0c71 x86/ioperm: Fix use of deprecated config option
general protection fault in ip6_sublist_rcv C done 327 442d 444d 399d 51210ad5 inet: do not call sublist_rcv on empty list
KCSAN: data-race in inet_putpeer / inet_putpeer 20 432d 449d 399d 71685eb4 inetpeer: fix data-race in inet_putpeer / inet_putpeer
KASAN: use-after-free Write in __ext4_expand_extra_isize (2) 14 435d 452d 399d 4ea99936 ext4: add more paranoia checking in ext4_expand_extra_isize handling
general protection fault in flexcop_usb_probe C 403 413d 644d 399d 1b976fc6 media: b2c2-flexcop-usb: add sanity checking
KCSAN: data-race in __remove_hrtimer / __tcp_ack_snd_check 4 414d 436d 399d 56144737 hrtimer: Annotate lockless access to timer->state
KCSAN: data-race in eth_header_cache / neigh_resolve_output 1 437d 437d 399d c305c6ae net-backports: net: add annotations on hh->hh_len lockless accesses
KMSAN: use-after-free in sk_forced_mem_schedule 2 422d 430d 399d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
WARNING in iov_iter_pipe C done 1117 417d 435d 399d 419e9c38 iomap: Fix pipe page leakage during splicing
kernel BUG at kernel/time/timer.c:LINE! (4) syz 1 469d 466d 399d f3f5ba42 media: imon: invalid dereference in imon_touch_event
general protection fault in devlink_get_from_attrs C 7 466d 466d 399d 82a843de net: devlink: fix reporter dump dumpit
KASAN: use-after-free Read in appledisplay_bl_get_brightness C 1 482d 480d 399d 91feb015 appledisplay: fix error handling in the scheduled work
general protection fault in vti6_ioctl 1 458d 457d 399d 9077f052 net: propagate errors correctly in register_netdevice()
INFO: trying to register non-static key in ida_destroy C 4272 413d 536d 399d 8c279e93 media: uvcvideo: Fix error path in control parsing failure
KCSAN: data-race in tun_get_user / tun_net_get_stats64 1 444d 444d 399d de7d5084 net-backports: net: provide dev_lstats_read() helper
KCSAN: data-race in sk_wait_data / tcp_queue_rcv 4 439d 436d 399d f8cc62ca net: add a READ_ONCE() in skb_peek_tail()
KCSAN: data-race in __remove_hrtimer / tcp_pacing_check 1 438d 436d 399d 56144737 hrtimer: Annotate lockless access to timer->state
KMSAN: use-after-free in __netif_receive_skb_core 1 430d 430d 399d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg (2) 47 400d 436d 399d 9ed498c6 net-backports: net: silence data-races on sk_backlog.tail
KCSAN: data-race in sk_wait_data / skb_queue_tail 3 447d 448d 399d f8cc62ca net-backports: net: add a READ_ONCE() in skb_peek_tail()
KMSAN: use-after-free in skb_dequeue C 1 459d 459d 399d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KASAN: use-after-free Read in tipc_nl_publ_dump C 2 466d 466d 399d ab5b526d net: genetlink: always allocate separate attrs for dumpit ops
KCSAN: data-race in ip_finish_output2 / ip_finish_output2 26 403d 448d 399d 25c7a6d1 net: avoid potential false sharing in neighbor related code
general protection fault in snd_usb_create_mixer C 1 422d 421d 399d 9435f2bb ALSA: usb-audio: Fix NULL dereference at parsing BADD
general protection fault in tipc_nl_publ_dump C 135 463d 466d 399d 6ea67769 net: tipc: prepare attrs in __tipc_nl_compat_dumpit()
KASAN: use-after-free Read in nf_ct_deliver_cached_events C done 169 445d 451d 399d ad88b7a6 netfilter: ecache: don't look for ecache extension on dying/unconfirmed conntracks
general protection fault in veth_get_stats64 C done 2 471d 471d 399d 9077f052 net: propagate errors correctly in register_netdevice()
KCSAN: data-race in icmp_global_allow / icmp_global_allow 29 399d 450d 399d bbab7ef2 net-backports: net: icmp: fix data-race in cmp_global_allow()
general protection fault in usb_set_interface C 3 484d 487d 399d c7a19146 media: usbvision: Fix invalid accesses after device disconnect
KCSAN: data-race in __dev_queue_xmit / pfifo_fast_dequeue 6 413d 450d 399d 90b2be27 net/sched: annotate lockless accesses to qdisc->empty
KCSAN: data-race in tcp_chrono_stop / tcp_recvmsg 3 434d 436d 399d a5a7daa5 net-backports: tcp: fix data-race in tcp_recvmsg()
KCSAN: data-race in gro_normal_list.part.0 / napi_busy_loop 1 433d 433d 399d c39e342a net-backports: tun: fix data-race in gro_normal_list()
KASAN: use-after-free Read in slip_open C done 3 418d 419d 399d e58c1912 slip: Fix use-after-free Read in slip_open
KCSAN: data-race in fanout_demux_rollover / fanout_demux_rollover 1 434d 434d 399d b756ad92 net-backports: packet: fix data-race in fanout_flow_is_huge()
WARNING in __rtnl_newlink C done 2 469d 469d 399d 9077f052 net: propagate errors correctly in register_netdevice()
BUG: unable to handle kernel paging request in __ext4_expand_extra_isize 6 472d 452d 399d 4ea99936 ext4: add more paranoia checking in ext4_expand_extra_isize handling
KASAN: use-after-free Read in shmem_fault (2) 5 443d 504d 399d 8897c1b1 shmem: pin the file in shmem_fault() if mmap_sem is dropped
BUG: unable to handle kernel paging request in io_wq_cancel_all C done 2 443d 443d 399d 975c99a5 io_uring: io_wq_create() returns an error pointer, not NULL
KASAN: invalid-free in io_sqe_files_unregister C done 3 432d 432d 399d 46568e9b io_uring: fix error clear of ->file_table in io_sqe_files_register()
KASAN: invalid-free in skb_free_head C done 1 441d 441d 399d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in ovs_vport_add C done 5 461d 470d 399d 9077f052 net: propagate errors correctly in register_netdevice()
KASAN: use-after-free Read in nl8NUM_dump_wpan_phy C done 6 464d 466d 399d ab5b526d net: genetlink: always allocate separate attrs for dumpit ops
KASAN: use-after-free Read in tipc_udp_nl_dump_remoteip C done 3 465d 466d 399d ab5b526d net: genetlink: always allocate separate attrs for dumpit ops
KASAN: use-after-free Read in __cfg8NUM_wpan_dev_from_attrs C done 3 466d 466d 399d ab5b526d net: genetlink: always allocate separate attrs for dumpit ops
WARNING: ODEBUG bug in free_netdev C done 2 468d 468d 399d 11fc7d5a tun: fix memory leak in error path
KCSAN: data-race in sctp_assoc_migrate / sctp_hash_obj 12 408d 435d 399d 31243461 sctp: cache netns in sctp_ep_common
general protection fault in ip6_tnl_ioctl C done 7 459d 470d 399d 9077f052 net: propagate errors correctly in register_netdevice()
KCSAN: data-race in __dev_queue_xmit / net_tx_action 1 434d 434d 399d 90b2be27 net/sched: annotate lockless accesses to qdisc->empty
KMSAN: use-after-free in copyout C 1 464d 464d 399d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in virtio_transport_release C done 7 422d 423d 399d 039fccca vsock: avoid to assign transport if its initialization fails
BUG: workqueue lockup (4) C 47 424d 831d 399d 7e7c005b rtc: disable uie before setting time and enable after
WARNING in port100_send_cmd_async/usb_submit_urb C 83 414d 555d 401d 5f9f0b11 nfc: port100: handle command failure cleanly
general protection fault in kvm_coalesced_mmio_init syz done 48 429d 438d 413d 8a44119a KVM: Fix NULL-ptr deref after kvm_create_vm fails
general protection fault in j1939_netdev_notify syz done 11 425d 437d 413d c48c8c1e can: j1939: main: j1939_ndev_to_priv(): avoid crash if can_ml_priv is NULL
KASAN: use-after-free Read in j1939_sk_recv C done 2 432d 432d 413d ddeeb7d4 can: j1939: j1939_can_recv(): add priv refcounting
KASAN: use-after-free Read in j1939_session_deactivate syz done 1 434d 434d 413d ddeeb7d4 can: j1939: j1939_can_recv(): add priv refcounting
WARNING in smc_unhash_sk (3) C done 362 416d 506d 413d 8204df72 net/smc: fix fastopen for non-blocking connect()
KASAN: use-after-free Read in do_mount syz done 6 457d 465d 413d 0ecee669 fs/namespace.c: fix use-after-free of mount in mnt_warn_timestamp_expiry()
general protection fault in j1939_jsk_del syz done 132 413d 437d 413d fd81ebfe can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
memory leak in smc_create C 19 426d 439d 413d 6d6dd528 net/smc: fix refcount non-blocking connect() -part 2
KASAN: use-after-free Read in j1939_session_get_by_addr_locked C done 1 432d 431d 413d ddeeb7d4 can: j1939: j1939_can_recv(): add priv refcounting
INFO: task hung in synchronize_rcu syz done 1206 413d 439d 413d 8a44119a KVM: Fix NULL-ptr deref after kvm_create_vm fails
KMSAN: uninit-value in ax88172a_bind C 5 445d 458d 413d a9a51bd7 ax88172a: fix information leak on short answers
KMSAN: uninit-value in gf128mul_4k_lle (3) C 2958 418d 783d 413d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: uninit-value in aesti_encrypt C 54 467d 568d 413d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
WARNING: suspicious RCU usage in kvm_dev_ioctl C done 333 429d 439d 413d e2d3fcaf KVM: fix placement of refcount initialization
KMSAN: use-after-free in build_audio_procunit C 2 450d 450d 413d 976a68f0 ALSA: usb-audio: Fix incorrect size check for processing/extension units
WARNING: refcount bug in j1939_netdev_start syz done 6 415d 436d 413d fd81ebfe can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
KMSAN: uninit-value in get_min_max_with_quirks C 11 445d 434d 413d 167beb17 ALSA: usb-audio: Fix missing error check at mixer resolution test
WARNING: ODEBUG bug in input_ff_destroy C 6 421d 429d 413d fa3a5a18 Input: ff-memless - kill timer in destroy()
general protection fault in memcg_flush_percpu_vmstats C error 19 442d 505d 413d 7961eee3 mm: memcontrol: fix NULL-ptr deref in percpu stats flush
KCSAN: data-race in neigh_resolve_output / neigh_resolve_output 4 434d 448d 413d 1b53d644 net-backports: net: fix data-race in neigh_event_send()
KCSAN: data-race in find_match / find_match 2 435d 439d 413d 1bef4c22 net-backports: ipv6: fixes rt6_probe() and fib6_nh->last_probe init
INFO: task hung in mpage_prepare_extent_to_map syz done 18606 437d 445d 413d 4655e5e5 mm,thp: recheck each page before collapsing file THP
KMSAN: uninit-value in cdc_ncm_set_dgram_size C 4 443d 443d 413d 332f989a CDC-NCM: handle incomplete transfer of MTU
KASAN: use-after-free Read in mcba_usb_disconnect C 2 440d 472d 413d 4d663649 can: mcba_usb: fix use-after-free on disconnect
KMSAN: kernel-usb-infoleak in pcan_usb_wait_rsp C 2 457d 456d 413d f7a1337f can: peak_usb: fix slab info leak
KASAN: invalid-free in rsi_91x_deinit C 109 486d 633d 413d 8b51dc72 rsi: fix a double free bug in rsi_91x_deinit()
WARNING in generic_make_request_checks C done 7760 414d 890d 414d 8b2ded1c block: don't warn when doing fsync on read-only devices
BUG: spinlock recursion in release_sock C done 116 540d 541d 415d 5d92e631 net/tls: partially revert fix transition through disconnect with close
KMSAN: use-after-free in adu_disconnect C 16 459d 465d 415d 44efc269 USB: adutux: fix use-after-free on disconnect
KMSAN: use-after-free in mutex_spin_on_owner C 1 464d 464d 415d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in iowarrior_disconnect C 21 459d 465d 415d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in usb_autopm_put_interface C 63 445d 459d 415d 7a759197 USB: usblp: fix use-after-free on disconnect
KMSAN: use-after-free in __pm_runtime_resume 1 465d 465d 415d 5f924277 HID: logitech: Fix general protection fault caused by Logitech driver
KMSAN: use-after-free in hidraw_ioctl 1 465d 465d 415d 416dacb8 HID: hidraw: Fix invalid read in hidraw_ioctl
KMSAN: use-after-free in rxrpc_put_peer 1 456d 456d 415d 91fcfbe8 rxrpc: Fix call crypto state cleanup
KMSAN: uninit-value in lg4ff_set_autocenter_default C 1 445d 445d 416d d9d4b1e4 HID: Fix assumption that devices have inputs
WARNING in sk_stream_kill_queues (3) C done 622 587d 946d 416d 9354544c net/tls: fix page double free on TX cleanup
KCSAN: data-race in udp_set_dev_scratch / udpv6_recvmsg 5 438d 449d 419d a793183c udp: fix data-race in udp_set_dev_scratch()
KCSAN: data-race in __skb_wait_for_more_packets / skb_queue_tail 1 442d 442d 419d 7c422d0c net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
KASAN: use-after-free Read in batadv_iv_ogm_queue_add 3 441d 472d 419d 40e220b4 batman-adv: Avoid free/alloc race when handling OGM buffer
WARNING: refcount bug in smc_release C done 8 426d 449d 419d 301428ea net/smc: fix refcounting for non-blocking connect()
INFO: trying to register non-static key in bond_3ad_update_lacp_rate C done 26 442d 444d 419d ad9bd8da bonding: fix using uninitialized mode_lock
KCSAN: data-race in datagram_poll / skb_queue_tail 5 438d 448d 419d 3ef7cf57 net-backports: net: use skb_queue_empty_lockless() in poll() handlers
general protection fault in process_one_work 2 444d 444d 419d 6d6f0383 netdevsim: Fix use-after-free during device dismantle
KASAN: use-after-free Read in fuse_request_end syz done 6 450d 454d 419d 2b319d1f fuse: don't dereference req->args on finished request
KCSAN: data-race in udp6_lib_lookup2 / udpv6_queue_rcv_one_skb 1 449d 449d 419d 7170a977 net: annotate accesses to sk->sk_incoming_cpu
KCSAN: data-race in tcp_v4_rcv / tcp_v4_rcv 4 439d 443d 419d 7170a977 net-backports: net: annotate accesses to sk->sk_incoming_cpu
memory leak in internal_dev_create C 88 441d 528d 419d 9464cc37 net: openvswitch: free vport unless register_netdevice() succeeds
divide error in dummy_timer C 3 443d 449d 419d 54f83b8c USB: gadget: Reject endpoints with 0 maxpacket value
KCSAN: data-race in __skb_recv_udp / __udp_enqueue_schedule_skb 7 438d 450d 419d 137a0dbe net-backports: udp: use skb_queue_empty_lockless()
KCSAN: data-race in first_packet_length / udp_poll 2 441d 448d 419d 137a0dbe net-backports: udp: use skb_queue_empty_lockless()
memory leak in copy_net_ns C done 422 441d 478d 419d 82ecff65 keys: Fix memory leak in copy_net_ns
KCSAN: data-race in update_defense_level / update_defense_level (2) 20 438d 450d 419d c24b75e0 ipvs: move old_secure_tcp into struct netns_ipvs
INFO: trying to register non-static key in bond_3ad_update_ad_actor_settings C done 69 442d 445d 419d ad9bd8da bonding: fix using uninitialized mode_lock
KASAN: use-after-free Read in bpf_prog_kallsyms_find (2) C done 9 449d 459d 419d cd7455f1 bpf: Fix use after free in subprog's jited symbol removal
KASAN: use-after-free Read in is_bpf_text_address C done 3 449d 451d 419d cd7455f1 bpf: Fix use after free in subprog's jited symbol removal
KCSAN: data-race in __skb_wait_for_more_packets / __sock_queue_rcv_skb 10 438d 449d 419d 7c422d0c net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
KASAN: use-after-free Read in io_uring_setup syz error 1 446d 445d 419d 044c1ab3 io_uring: don't touch ctx in setup after ring fd install
KCSAN: data-race in udpv6_queue_rcv_one_skb / udpv6_queue_rcv_one_skb 1 446d 445d 419d ee8d153d net-backports: net: annotate lockless accesses to sk->sk_napi_id
BUG: unable to handle kernel paging request in is_bpf_text_address C done 2 455d 455d 419d cd7455f1 bpf: Fix use after free in subprog's jited symbol removal
INFO: task hung in ld_usb_write C 831 438d 451d 419d 52403cfb USB: ldusb: fix control-message timeout
KCSAN: data-race in __skb_recv_udp / datagram_poll 1 439d 439d 419d 3f926af3 net: use skb_queue_empty_lockless() in busy poll contexts
KCSAN: data-race in __skb_wait_for_more_packets / __udp_enqueue_schedule_skb 2 442d 449d 419d 7c422d0c net-backports: net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
general protection fault in kernfs_add_one C done 98 528d 852d 420d ac43432c driver core: Fix use-after-free and double free on glue directory
KASAN: use-after-free Read in ep_scan_ready_list C done 39 883d 919d 421d 430ac66e net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
KASAN: use-after-free Read in iowarrior_disconnect C 3056 459d 515d 421d edc4746f USB: iowarrior: fix use-after-free on disconnect
WARNING in kernfs_get C done 316 529d 858d 421d ac43432c driver core: Fix use-after-free and double free on glue directory
KASAN: use-after-free Read in __schedule (2) C done 961 678d 897d 421d 26b471c7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
divide error in usbtmc_generic_read C 2 520d 520d 421d de7b9aa6 usbtmc: more sanity checking for packet size
KASAN: use-after-free Read in p9_fd_poll C done 8 886d 919d 421d 430ac66e net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
KASAN: use-after-free Read in vhci_hub_control C done 41 819d 865d 421d 81f7567c usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control()
INFO: task hung in vivid_stop_generating_vid_cap C done done 81 806d 809d 431d d65842f7 media: vb2: add waiting_in_dqbuf flag
WARNING in event_function_local C unreliable 15451 828d 1084d 431d 214ff83d KVM: x86: hyperv: implement PV IPI send hypercalls
BUG: MAX_LOCK_DEPTH too low! (2) C done 5 917d 948d 431d bab2c80e nsh: set mac len based on inner packet
inconsistent lock state in ila_xlat_nl_cmd_del_mapping C unreliable 2496 879d 885d 431d 7494de04 mfd: da9063: Replace regmap_add_irq_chip with devm counterpart
INFO: task hung in fuse_reverse_inval_entry C done 23 894d 907d 431d c59fd85e fuse: change interrupt requests allocation algorithm
BUG: corrupted list in p9_conn_cancel C done 18 820d 921d 431d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
general protection fault in p9_conn_cancel C done 2 901d 919d 431d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
WARNING: ODEBUG bug in p9_fd_close C done 82 881d 921d 431d 430ac66e net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
general protection fault in vb2_mmap C inconclusive done 21 752d 796d 431d cd26d1c4 media: vb2: vb2_mmap: move lock up
KASAN: stack-out-of-bounds Read in xfrm_state_find (5) C done 654 717d 1019d 431d 32bf94fb xfrm: validate template mode
KASAN: slab-out-of-bounds Write in end_requests C done 2 895d 900d 431d 45ff350b fuse: fix unlocked access to processing queue
KASAN: use-after-free Read in uprobe_perf_close C done 54 700d 1018d 431d 621b6d2e perf/core: Fix use-after-free in uprobe_perf_close()
KASAN: use-after-free Read in _decode_session4 C done 3 1022d 1022d 431d c6741fbe vti6: Properly adjust vti6 MTU from MTU of lower device
general protection fault in tcp_cleanup_ulp syz done done 6 847d 862d 431d 5607fff3 bpf: sockmap only allow ESTABLISHED sock state
WARNING in request_end C done done 14 807d 844d 431d 4c316f2f fuse: set FR_SENT while locked
WARNING in dma_buf_vunmap C done done 17 756d 794d 431d 62dcb4f4 media: vb2: check memory model for VIDIOC_CREATE_BUFS
BUG: corrupted list in p9_write_work C done 5 844d 889d 431d 728356de 9p: Add refcount to p9_req_t
KASAN: use-after-free Read in tick_sched_handle (3) C done 12 732d 787d 432d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
general protection fault in qca_setup C done done 6 704d 704d 432d b36a1552 Bluetooth: hci_uart: check for missing tty operations
general protection fault in tcp_splice_read C done done 23 647d 757d 432d 07603b23 net/smc: propagate file from SMC to TCP socket
KASAN: use-after-free Read in crypto_gcm_init_common C done done 14 735d 800d 434d 9354544c net/tls: fix page double free on TX cleanup
KASAN: slab-out-of-bounds Read in find_first_zero_bit C done 1 1021d 1020d 434d d1877155 bfs: extra sanity checking and static inode bitmap
kernel BUG at net/ipv4/ip_output.c:LINE! C done 28225 726d 917d 434d e7c87bd6 bpf: in __bpf_redirect_no_mac pull mac only if present
general protection fault in put_pid syz done done 3 756d 766d 434d a8e911d1 x86_64: increase stack size for KASAN_EXTRA
suspicious RCU usage at ./include/net/inet_sock.h:LINE C done 171 1077d 1167d 434d 3f32d0be tipc: lock wakeup & inputq at tipc_link_reset()
KASAN: use-after-free Read in _decode_session6 C done 4 794d 862d 435d e7c87bd6 bpf: in __bpf_redirect_no_mac pull mac only if present
general protection fault in propagate_entity_cfs_rq C done 1 917d 917d 435d bab2c80e nsh: set mac len based on inner packet
KASAN: use-after-free Write in __vb2_cleanup_fileio C done inconclusive 2 806d 809d 435d d65842f7 media: vb2: add waiting_in_dqbuf flag
KCSAN: data-race in sk_stream_wait_memory / tcp_shifted_skb 1 448d 436d 435d ab4e846a tcp: annotate sk->sk_wmem_queued lockless reads
KCSAN: data-race in sk_stream_wait_memory / tcp_fragment 1 439d 436d 435d ab4e846a tcp: annotate sk->sk_wmem_queued lockless reads
KCSAN: data-race in tcp_sendmsg_locked / tcp_stream_memory_free 2 447d 436d 435d 0f317464 tcp: annotate tp->write_seq lockless reads
KCSAN: data-race in tcp_event_new_data_sent / tcp_stream_memory_free 3 439d 436d 435d e0d694d6 tcp: annotate tp->snd_nxt lockless reads
KCSAN: data-race in tcp_ack / tcp_poll (2) 5 443d 436d 435d ab4e846a tcp: annotate sk->sk_wmem_queued lockless reads
KCSAN: data-race in sk_stream_wait_memory / tcp_ack 2 440d 436d 435d ab4e846a tcp: annotate sk->sk_wmem_queued lockless reads
KASAN: slab-out-of-bounds Read in ld_usb_read (3) C 74 446d 456d 436d 7a6f22d7 USB: ldusb: fix read info leaks
KASAN: slab-out-of-bounds Read in build_audio_procunit C 6 442d 451d 436d ba8bf096 ALSA: usb-audio: Fix copy&paste error in the validator
KASAN: slab-out-of-bounds Write in ga_probe C 5 465d 487d 436d d9d4b1e4 HID: Fix assumption that devices have inputs
INFO: task hung in nbd_ioctl C done 71 437d 472d 436d cf1b2326 nbd: verify socket is supported during setup
KASAN: use-after-free Read in usb_autopm_put_interface C 2373 445d 458d 436d 7a759197 USB: usblp: fix use-after-free on disconnect
memory leak in gfs2_init_fs_context C 13 448d 470d 436d 30aecae8 gfs2: Fix memory leak when gfs2meta's fs_context is freed
KMSAN: uninit-value in sr9800_bind C 27 447d 470d 438d 77b6d09f net: usb: sr9800: fix uninitialized local variable
WARNING in filldir64 76 456d 466d 438d b9959c7a filldir[64]: remove WARN_ON_ONCE() for bad directory entries
memory leak in llc_ui_create (2) C done 19 454d 574d 438d c6ee11c3 llc: fix sk_buff leak in llc_sap_state_process()
KCSAN: data-race in tcp_add_backlog / tcp_rcv_space_adjust (2) 18 450d 457d 438d ebb3b78d tcp: annotate sk->sk_rcvbuf lockless reads
KCSAN: data-race in __nf_ct_refresh_acct / __nf_ct_refresh_acct 2460 438d 469d 438d e37542ba net-backports: netfilter: conntrack: avoid possible false sharing
BUG: unable to handle kernel NULL pointer dereference in xsk_poll C done 10 455d 473d 438d df551058 xsk: Fix crash in poll when device does not support ndo_xsk_wakeup
KASAN: use-after-free Read in rxrpc_release_call syz done 13 456d 511d 438d 91fcfbe8 rxrpc: Fix call crypto state cleanup
KASAN: use-after-free Read in rxrpc_send_keepalive C error 694 452d 525d 438d c48fc11b rxrpc: Fix call ref leak
KCSAN: data-race in __tcp_select_window / tcp_add_backlog 23502 438d 469d 438d 70c26558 net: silence KCSAN warnings about sk->sk_backlog.len reads
memory leak in sctp_get_port_local (3) C 4 453d 459d 438d 63dfb793 sctp: change sctp_prot .no_autobind with true
memory leak in llc_ui_sendmsg C 125 453d 605d 438d c6ee11c3 llc: fix sk_buff leak in llc_sap_state_process()
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg 17719 438d 469d 438d 8265792b net-backports: net: silence KCSAN warnings around sk_add_backlog() calls
INFO: task hung in addrconf_verify_work (2) C 22 459d 459d 438d 39f13ea2 net: avoid potential infinite loop in tc_ctl_action()
KASAN: use-after-free Read in pn533_send_complete C 4 445d 466d 438d 6af3aa57 NFC: pn533: fix use-after-free and memleaks
KCSAN: data-race in tcp_poll / tcp_recvmsg (2) 22 451d 457d 438d 7db48e98 tcp: annotate tp->copied_seq lockless reads
KASAN: use-after-free Read in rxrpc_put_peer C error 38 453d 506d 438d 55f6c98e rxrpc: Fix trace-after-put looking at the put peer record 9ebeddef rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record
KCSAN: data-race in tcp_poll / tcp_queue_rcv 1897 438d 469d 438d dba7d9b8 net-backports: tcp: annotate tp->rcv_nxt lockless reads
memory leak in llc_conn_ac_send_sabme_cmd_p_set_x C 225 453d 605d 438d b74555de llc: fix sk_buff leak in llc_conn_service()
general protection fault in rxrpc_error_report C done 6 453d 466d 438d f0308fb0 rxrpc: Fix possible NULL pointer access in ICMP handling
KCSAN: data-race in tcp_add_backlog / tcp_grow_window.isra.0 21713 438d 469d 438d 70c26558 net-backports: net: silence KCSAN warnings about sk->sk_backlog.len reads
WARNING: suspicious RCU usage in xfrm_alloc_userspi C done error 86 666d 668d 438d f10e0010 net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
general protection fault in get_work_pool C done 24 646d 1049d 438d 07bf7908 xfrm: Validate address prefix lengths in the xfrm selector.
general protection fault in xfrm_init_replay syz inconclusive done 2 1036d 1035d 438d d97ca5d7 xfrm_user: uncoditionally validate esn replay attribute struct
WARNING: suspicious RCU usage in xfrm_get_spdinfo C done error 46 666d 668d 438d f10e0010 net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
WARNING: suspicious RCU usage in xfrm_get_sadinfo C done error 28 667d 668d 438d f10e0010 net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
WARNING: suspicious RCU usage in xfrm_get_policy syz done error 8 667d 668d 438d f10e0010 net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
memory leak in sctp_stream_init_ext C 34 460d 595d 445d 3c52b0af lib/generic-radix-tree.c: add kmemleak annotations
possible deadlock in usb_deregister_dev (2) C 956 459d 487d 445d 33a78132 USB: legousbtower: fix deadlock on disconnect
KMSAN: uninit-value in mts_usb_probe C 29 465d 470d 445d 177238c3 USB: microtek: fix info-leak at probe
WARNING in mark_lock (2) 14 452d 479d 445d 8e00c4e9 writeback: fix use-after-free in finish_writeback_work()
BUG: bad usercopy in read_rio 2 461d 464d 445d 015664d1 USB: rio500: Remove Rio 500 kernel driver
KMSAN: uninit-value in iowarrior_disconnect C 18 463d 470d 445d edc4746f USB: iowarrior: fix use-after-free on disconnect
general protection fault in open_rio 2 478d 479d 445d 015664d1 USB: rio500: Remove Rio 500 kernel driver
KASAN: use-after-free Read in adu_disconnect C 5304 459d 529d 445d 44efc269 USB: adutux: fix use-after-free on disconnect
INFO: rcu detected stall in dummy_timer C 16 460d 525d 445d 32a0721c USB: yurex: Don't retry on unexpected errors
KASAN: invalid-free in disconnect_rio (2) C 51 462d 484d 445d 015664d1 USB: rio500: Remove Rio 500 kernel driver
general protection fault in finish_writeback_work 10 454d 480d 445d 8e00c4e9 writeback: fix use-after-free in finish_writeback_work()
INFO: trying to register non-static key in finish_writeback_work syz error 1 481d 478d 445d 8e00c4e9 writeback: fix use-after-free in finish_writeback_work()
INFO: rcu detected stall in rt6_probe_deferred 336 487d 493d 452d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in addrconf_rs_timer (2) 362 470d 493d 452d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
general protection fault in bpf_tcp_close (2) C done 26 875d 919d 452d e06fa9c1 bpf, sockmap: fix potential use after free in bpf_tcp_close
BUG: unable to handle kernel NULL pointer dereference in rds_bind C done 51 475d 487d 457d 05733434 net/rds: Check laddr_check before calling it
divide error in tabledist 3 475d 484d 457d b41d936b sch_netem: fix a divide by zero in tabledist()
WARNING: lock held when returning to user space in rcu_lock_acquire C done 3 470d 470d 457d 73956fc0 membarrier: Fix RCU locking bug caused by faulty merge
memory leak in v9fs_cache_session_get_cookie C 242 458d 605d 457d 962a991c 9p/cache.c: Fix memory leak in v9fs_cache_session_get_cookie
WARNING in em28xx_usb_disconnect C 8 492d 525d 457d 46e4a266 media: em28xx: modules workqueue not inited for 2nd device
KASAN: use-after-free Read in si470x_int_in_callback C 25 467d 556d 457d 0d616f2a media: radio/si470x: kill urb on error
kernel BUG at include/linux/skbuff.h:LINE! (2) C done 58 508d 518d 457d c7a42eb4 net: ipv6: fix listify ip6_rcv_finish in case of forwarding
general protection fault in make_kuid C done 4 518d 543d 457d 1dd9bc08 vfs: set fs_context::user_ns for reconfigure
general protection fault in ath6kl_usb_alloc_urb_from_pipe C 1160 484d 644d 457d 39d170b3 ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()
KMSAN: uninit-value in read_sensor_register C 25 458d 587d 457d 4843a543 media: gspca: zero usb_buf on error
WARNING in rcu_note_context_switch C done 1 472d 472d 457d 73956fc0 membarrier: Fix RCU locking bug caused by faulty merge
KMSAN: kernel-usb-infoleak in ttusb_dec_send_command C 2 525d 535d 457d a10feaf8 media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
KASAN: use-after-free Read in atusb_disconnect C 112 459d 500d 457d 7fd25e6f ieee802154: atusb: fix use-after-free at disconnect
possible deadlock in io_submit_one (2) 353 478d 516d 457d 76e43c8c fuse: fix deadlock with aio poll and fuse_iqueue::waitq.lock
BUG: using smp_processor_id() in preemptible [ADDR] code: mime_typevmnet0/NUM 1 502d 500d 457d 00d9e47f posix-cpu-timers: Always clear head pointer on dequeue
KMSAN: uninit-value in inet_ehash_insert C 7 466d 473d 457d 6af1799a net-backports: ipv6: drop incoming packets having a v4mapped source address
KASAN: slab-out-of-bounds Read in hdpvr_probe C 10 494d 569d 457d 8b8900b7 media: hdpvr: add terminating 0 at end of string
BUG: assuming atomic context at net/kcm/kcmsock.c:LINE C done 178 473d 480d 457d 0355d6c1 net-backports: kcm: disable preemption in kcm_parse_func_strparser()
WARNING: suspicious RCU usage in netem_enqueue C done 16 476d 490d 457d 159d2c7d net-backports: sch_netem: fix rcu splat in netem_enqueue()
general protection fault in xsk_poll C done 430 487d 514d 457d 42fddcc7 xsk: use state member for socket synchronization
INFO: task syz-executor can't die for more than 143 seconds. C done 61 475d 582d 457d 8619e5bd /dev/mem: Bail out upon SIGKILL. 7c3a6aed kexec: bail out upon SIGKILL when allocating memory. 8f9e86ee staging: android: ion: Bail out upon SIGKILL when allocating memory.
BUG: sleeping function called from invalid context in tcf_chain0_head_change_cb_del C done 187 473d 486d 457d e3ae1f96 net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
KASAN: global-out-of-bounds Read in load_next_firmware_from_table C 5 506d 556d 457d 764f3f1e libertas: Add missing sentinel at end of if_usb.c fw_table
WARNING in handle_desc C done 6 483d 491d 457d 3ca94192 KVM: X86: Fix userspace set invalid CR4
KASAN: use-after-free Read in ext4_data_block_valid 108 541d 988d 457d 7727ae52 ext4: fix potential use after free after remounting with noblock_validity
general protection fault in kstrtouint (2) C done 40 504d 547d 457d 74983ac2 vfs: Make fs_parse() handle fs_param_is_fd-type params better
BUG: corrupted list in __netif_receive_skb_list_core 3 465d 519d 457d c7a42eb4 net: ipv6: fix listify ip6_rcv_finish in case of forwarding
divide error in usbnet_update_max_qlen C 17 474d 487d 457d 280ceaed usbnet: sanity checking of packet sizes and device mtu
KASAN: slab-out-of-bounds Read in technisat_usb2_rc_query C 2236 503d 642d 457d 0c4df39e media: technisat-usb2: break out of loop at end of buffer
KASAN: slab-out-of-bounds Read in do_tcp_getsockopt 3 481d 500d 457d 3afb0961 tcp: fix slab-out-of-bounds in tcp_zerocopy_receive()
general protection fault in __apic_accept_irq C done 69 485d 498d 457d a073d7e3 KVM: hyperv: Fix Direct Synthetic timers assert an interrupt w/o lapic_in_kernel
INFO: rcu detected stall in pie_timer C 19 458d 493d 457d 4ce70b4a net-backports: net: sched: sch_htb: don't call qdisc_put() while holding tree lock
KASAN: global-out-of-bounds Read in dvb_pll_attach C 2 495d 555d 457d c268e7ad media: dvb-frontends: use ida for pll number
general protection fault in pk_probe C 2 504d 500d 457d 98375b86 HID: prodikeys: Fix general protection fault during probe
possible deadlock in free_ioctx_users C 509 478d 859d 457d 76e43c8c fuse: fix deadlock with aio poll and fuse_iqueue::waitq.lock
KASAN: use-after-free Read in cbq_enqueue C done 4 466d 467d 457d e9789c7c sch_cbq: validate TCA_CBQ_WRROPT to avoid crash
general protection fault in dsmark_init C done 3 466d 469d 457d 474f0813 sch_dsmark: fix potential NULL deref in dsmark_init()
KASAN: global-out-of-bounds Read in hdpvr_probe C 15 510d 624d 457d d4a6a953 media: hdpvr: Add device num check and handling
KASAN: slab-out-of-bounds Read in sctp_inq_pop 1 510d 508d 457d c7a42eb4 net: ipv6: fix listify ip6_rcv_finish in case of forwarding
WARNING: lock held when returning to user space in membarrier_private_expedited C done 7 470d 472d 457d 73956fc0 membarrier: Fix RCU locking bug caused by faulty merge
WARNING in blk_mq_sched_free_requests (2) 7 475d 480d 457d 284b94be blk-mq: move lockdep_assert_held() into elevator_exit
WARNING: ODEBUG bug in usbhid_disconnect (2) C 48 478d 500d 457d 2bcdacb7 HID: sony: Fix memory corruption issue on cleanup.
KASAN: slab-out-of-bounds Read in usb_reset_and_verify_device syz 1 508d 500d 457d 3dd550a2 USB: usbcore: Fix slab-out-of-bounds bug during device reset
general protection fault in sctp_inq_pop 4 508d 512d 457d c7a42eb4 net: ipv6: fix listify ip6_rcv_finish in case of forwarding
KMSAN: uninit-value in i2c_w C 2 591d 590d 457d 4843a543 media: gspca: zero usb_buf on error
BUG: MAX_STACK_TRACE_ENTRIES too low! (2) C done 5045 489d 658d 457d 12593b74 locking/lockdep: Reduce space occupied by stack traces
possible deadlock in open_rio (3) C 169 484d 486d 457d 9472aff1 USB: rio500: Fix lockdep violation
WARNING in kfree C done 2 505d 504d 457d 43ce4c1f vfs: Add a single-or-reconfig keying to vfs_get_super()
KMSAN: uninit-value in __request_module C 13 467d 487d 457d 62794fc4 net_sched: add max len check for TCA_KIND
WARNING in zd_mac_clear C 13194 484d 644d 457d 7a2eb736 zd1211rw: remove false assertion from zd_mac_clear()
general protection fault in xsk_map_update_elem C done 12 477d 480d 457d fcd30ae0 bpf/xskmap: Return ERR_PTR for failure case instead of NULL.
possible deadlock in pie_timer C done 2 475d 475d 457d e3ae1f96 net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
KMSAN: uninit-value in sd_init C 122 458d 590d 457d 4843a543 media: gspca: zero usb_buf on error
WARNING in iguanair_probe/usb_submit_urb C 3 488d 539d 457d ab1cbdf1 media: iguanair: add sanity checks
memory leak in llcp_sock_bind C done 2 479d 544d 457d a0c2dc1f nfc: fix memory leak in llcp_sock_bind()
general protection fault in __pm_runtime_resume C 197 478d 541d 457d 5f924277 HID: logitech: Fix general protection fault caused by Logitech driver
BUG: unable to handle kernel paging request in coalesced_mmio_write C done 10 565d 569d 457d b60fe990 KVM: coalesced_mmio: add bounds checking
divide error in cdc_ncm_update_rxtx_max C 5 473d 487d 457d 3fe4b335 cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize
general protection fault in tcf_action_destroy 128 474d 492d 457d 3d66b89c net: sched: fix possible crash in tcf_action_destroy()
general protection fault in trace_probe_unlink C done 7 483d 486d 457d d59fae6f tracing/kprobe: Fix NULL pointer access in trace_porbe_unlink()
memory leak in ppp_write C 5 484d 529d 457d 4c247de5 ppp: Fix memory leak in ppp_write
general protection fault in qdisc_put C done 60 485d 495d 457d 6efb971b net_sched: let qdisc_put() accept NULL pointer
general protection fault in dev_map_hash_update_elem C done 4 491d 498d 457d af58e7ee xdp: Fix race in dev_map_hash_update_elem() when replacing element
KASAN: slab-out-of-bounds Read in hidraw_ioctl C 104 484d 535d 457d 416dacb8 HID: hidraw: Fix invalid read in hidraw_ioctl
INFO: rcu detected stall in sys_exit_group C done 1 489d 485d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in sys_sendmmsg 2 493d 493d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in pppoe_sendmsg 7 488d 495d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
WARNING in xfrm_policy_inexact_list_reinsert 2 498d 526d 464d 769a807d xfrm: policy: avoid warning splat when merging nodes
general protection fault in rds_recv_rcvbuf_delta C done 35 568d 795d 464d c5c1a030 net/rds: An rds_sock is added too early to the hash table
INFO: rcu detected stall in sys_sendmsg C done 2 489d 489d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in br_hello_timer_expired 4 487d 493d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in addrconf_dad_work C done 126 487d 493d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in inet_release 1 497d 496d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in packet_sendmsg 10 489d 494d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
general protection fault in addrconf_f6i_alloc C 305 487d 498d 464d 8652f17c ipv6: addrconf_f6i_alloc - fix non-null pointer check to !IS_ERR()
INFO: rcu detected stall in sys_clone 1 491d 491d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
WARNING in __mark_chain_precision (2) C done 18 486d 505d 464d 2339cd6c bpf: fix precision tracking of stack slots
INFO: rcu detected stall in dccp_write_timer 5 493d 496d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in br_handle_frame C done 341 487d 493d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
general protection fault in tls_sk_proto_close (2) syz error 246 487d 506d 464d 44580a01 net: sock_map, fix missing ulp check in sock hash case
INFO: rcu detected stall in mld_ifc_timer_expire C done 152 487d 495d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in neigh_timer_handler (2) 2 493d 494d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
BUG: soft lockup in addrconf_dad_work C done 1 492d 492d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in igmp_ifc_timer_expire C 57 487d 746d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in mld_dad_timer_expire 3 492d 493d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
memory leak in sctp_get_port_local (2) C 34 467d 526d 464d 29b99f54 sctp: destroy bucket if failed to bind addr
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass C done 61 487d 495d 464d 8b142a00 net_sched: check cops->tcf_block in tc_bind_tclass()
INFO: rcu detected stall in netlink_sendmsg (2) C done 11 488d 494d 464d d4d6ec6d sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
KMSAN: uninit-value in capi_write C 445 464d 703d 464d fe163e53 isdn/capi: check message length in capi_write()
general protection fault in icmpv6_xrlim_allow 4 591d 598d 465d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
general protection fault in ip6_rcv_finish 3 582d 588d 465d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
memory leak in sctp_send_reset_streams C 7 518d 594d 469d 6d5afe20 sctp: fix memleak in sctp_send_reset_streams
general protection fault in requeue_rx_msgs syz done inconclusive 1 961d 960d 469d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
WARNING: suspicious RCU usage (4) C done 1 866d 865d 469d 865e63b0 tracing: Add back in rcu_irq_enter/exit_irqson() for rcuidle tracepoints
WARNING: suspicious RCU usage in trace_call_bpf C done 327 848d 865d 469d 865e63b0 tracing: Add back in rcu_irq_enter/exit_irqson() for rcuidle tracepoints
KASAN: use-after-free Read in psock_map_pop C done 204 815d 858d 469d 5607fff3 bpf: sockmap only allow ESTABLISHED sock state
WARNING in lockdep_unregister_key (2) 3 638d 642d 469d 8b39adbe locking/lockdep: Make lockdep_unregister_key() honor 'debug_locks' again
WARNING: refcount bug in nr_insert_socket C done 55 531d 556d 469d 4638faac netrom: hold sock when setting skb->destructor
KASAN: slab-out-of-bounds Read in sock_hash_ctx_update_elem C done 5 900d 900d 469d b845c898 bpf, sockmap: fix sock_hash_alloc and reject zero-sized keys
general protection fault in smap_list_hash_remove C done 52 907d 926d 469d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: user-memory-access Read in ip6_hold_safe (3) 456 575d 594d 469d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
WARNING in cbs_dequeue_soft C done 13 488d 495d 487d 1c6c09a0 net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate
KMSAN: uninit-value in batadv_iv_send_outstanding_bat_ogm_packet C 9 513d 512d 487d a15d56a6 batman-adv: Only read OGM tvlv_len after buffer len check
possible deadlock in open_rio 1107 496d 533d 496d 2ca359f4 Revert "USB: rio500: simplify locking"
possible deadlock in usb_deregister_dev C 82 522d 529d 496d c468a8aa usb: iowarrior: fix deadlock on disconnect
general protection fault in packet_lookup_frame C done 7 520d 520d 496d 32d3182c net/packet: fix race in tpacket_snd()
WARNING in bpf_jit_free C done 21697 497d 914d 496d c751798a bpf: fix use after free in prog symbol exposure
BUG: Dentry still in use [unmount of nfsd nfsd] 1 527d 522d 496d d6846bfb nfsd: fix dentry leak upon mkdir failure.
kernel BUG at mm/huge_memory.c:LINE! 27 573d 743d 496d a53190a4 mm: mempolicy: handle vma with unmovable pages mapped correctly in mbind
memory leak in ip6_mc_add_src C 1 507d 507d 496d a84d0164 mld: fix memory leak in mld_del_delrec()
WARNING in bpf_prog_kallsyms_add syz done done 2 539d 742d 496d c751798a bpf: fix use after free in prog symbol exposure
WARNING in __iforce_usb_xmit/usb_submit_urb C 3 525d 529d 496d 849f5ae3 Input: iforce - add sanity checks
WARNING in kbtab_open/usb_submit_urb C 5 524d 542d 496d c88090df Input: kbtab - sanity check for endpoint type
BUG: unable to handle kernel paging request in bpf_prog_kallsyms_find syz done inconclusive 3 714d 789d 496d c751798a bpf: fix use after free in prog symbol exposure
KASAN: use-after-free Read in rxrpc_queue_local C done 1 522d 522d 496d 06d9532f rxrpc: Fix read-after-free in rxrpc_queue_local()
BUG: unable to handle kernel paging request in bpf_prog_kallsyms_add syz error 234 498d 858d 496d c751798a bpf: fix use after free in prog symbol exposure
general protection fault in tls_write_space syz 33 515d 525d 496d 57c722e9 net/tls: swap sk_write_space on close
WARNING in usbtouch_open C 768 522d 536d 496d b55d996f Input: usbtouchscreen - initialize PM mutex before using it
KASAN: use-after-free Read in usb_free_coherent 310 522d 533d 496d fc05481b usb: yurex: Fix use-after-free in yurex_delete
KMSAN: uninit-value in rtm_new_nexthop C 8 513d 512d 496d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KASAN: slab-out-of-bounds Read in bpf_int_jit_compile C done 1 544d 541d 496d 7c2e988f bpf: fix x64 JIT code generation for jmp to 1st insn
KASAN: use-after-free Read in snd_seq_ioctl_get_client_pool 1 514d 512d 496d 75545304 ALSA: seq: Fix potential concurrent access to the deleted pool
KASAN: use-after-free Read in bpf_prog_kallsyms_del syz done inconclusive 3 745d 823d 496d c751798a bpf: fix use after free in prog symbol exposure
kernel BUG at net/rxrpc/local_object.c:LINE! C done 11167 500d 567d 496d 730c5fd4 rxrpc: Fix local endpoint refcounting
KASAN: null-ptr-deref Write in rxrpc_unuse_local C done 4422 521d 525d 496d 68553f1a rxrpc: Fix local refcounting
KASAN: use-after-free Read in bpf_get_prog_name 1 539d 539d 496d c751798a bpf: fix use after free in prog symbol exposure
KMSAN: uninit-value in batadv_netlink_dump_hardif C 58 507d 543d 496d 3ee1bb7a batman-adv: fix uninit-value in batadv_netlink_get_ifindex()
WARNING in bpf_prog_kallsyms_find C error 5632 497d 618d 496d c751798a bpf: fix use after free in prog symbol exposure
KASAN: slab-out-of-bounds Read in do_jit C done 16 497d 542d 496d 7c2e988f bpf: fix x64 JIT code generation for jmp to 1st insn
KASAN: use-after-free Read in ld_usb_release C 14 516d 525d 496d 303911cf USB: core: Fix races in character device registration and deregistraion
KMSAN: uninit-value in rtm_dump_nexthop C 6 507d 523d 496d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
WARNING in is_bpf_text_address C done 104 507d 574d 496d c751798a bpf: fix use after free in prog symbol exposure
KASAN: slab-out-of-bounds Read in usbnet_generic_cdc_bind C 2 520d 522d 496d 54364278 USB: CDC: fix sanity checks in CDC union parser
WARNING in __blkdev_put (2) syz 3082 522d 529d 496d e91455ba bdev: Fixup error handling in blkdev_get()
KASAN: use-after-free Read in device_release_driver_internal C 5 518d 542d 496d c52873e5 usb: cdc-acm: make sure a refcount is taken early enough
KASAN: use-after-free Read in bpf_prog_kallsyms_add syz error inconclusive 120 624d 858d 496d c751798a bpf: fix use after free in prog symbol exposure
WARNING in wdm_write/usb_submit_urb C 15 500d 515d 496d 1426bd2c USB: cdc-wdm: fix race between write and disconnect due to flag abuse
BUG: corrupted list in rxrpc_local_processor C done 1679 517d 525d 496d b00df840 rxrpc: Fix local endpoint replacement
KASAN: use-after-free Write in __xfrm_policy_unlink (2) 7 564d 610d 501d b805d78d xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink
BUG: unable to handle kernel paging request in hrtimer_interrupt syz done 2 539d 576d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING in smc_unhash_sk (2) C done 1047 507d 643d 507d cd206360 net/smc: avoid fallback in case of non-blocking connect
WARNING: ODEBUG bug in tls_sw_free_resources_tx 23 542d 800d 507d f87e62d4 net/tls: remove close callback sock unlock/lock around TX work flush
general protection fault in rcu_core syz done 1 556d 555d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in mm_update_next_owner syz done done 1 587d 587d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
KMSAN: kernel-usb-infoleak in pcan_usb_pro_send_req C 16 509d 535d 507d 30a8beeb can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
KASAN: use-after-free Write in validate_chain syz done 3 563d 574d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING: held lock freed! (2) C done 1 560d 557d 507d 4638faac netrom: hold sock when setting skb->destructor
general protection fault in tls_trim_both_msgs C done 36 529d 540d 507d 5d92e631 net/tls: partially revert fix transition through disconnect with close
KASAN: use-after-free Read in psi_task_change syz done 1 540d 539d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: slab-out-of-bounds Read in class_equal syz done 45 527d 601d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: slab-out-of-bounds Write in check_noncircular syz done 1 546d 546d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING in mark_lock syz done 2 515d 570d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in holtek_kbd_input_event C 67 527d 540d 507d 01ec0a5f HID: holtek: test for sanity of intfdata
KASAN: use-after-free Read in release_sock C done 10 530d 539d 507d 4638faac netrom: hold sock when setting skb->destructor
KASAN: slab-out-of-bounds Write in validate_chain syz done 6 559d 574d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in tcf_ife_init C done 72 528d 543d 507d c8ec4632 ife: error out when nla attributes are empty
KASAN: invalid-free in tls_sk_proto_cleanup 5 531d 534d 507d 5d92e631 net/tls: partially revert fix transition through disconnect with close
BUG: unable to handle kernel paging request in __do_softirq syz done done 1 576d 576d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
kernel panic: stack is corrupted in validate_chain syz done 1 570d 569d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: slab-out-of-bounds Read in corrupted (2) syz done 3 539d 589d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
BUG: unable to handle kernel paging request in tls_prots syz done 1 569d 569d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
kernel panic: corrupted stack end in dput syz done 1 564d 564d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in tls_sk_proto_close syz done 260 507d 539d 507d 5d92e631 net/tls: partially revert fix transition through disconnect with close
WARNING in debug_check_no_obj_freed C done 47 507d 575d 507d f9cedf1a net/smc: do not schedule tx_work in SMC_CLOSED state
BUG: unable to handle kernel paging request in cpuacct_account_field syz done done 1 574d 574d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
memory leak in fdb_create C done 4 532d 571d 507d d7bae09f net: bridge: delete local fdb on device init failure
KASAN: use-after-free Read in tls_wait_data 1 532d 526d 507d 5d92e631 net/tls: partially revert fix transition through disconnect with close
BUG: unable to handle kernel NULL pointer dereference in corrupted (4) syz done done 1 570d 569d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
possible deadlock in rxrpc_put_peer 1 543d 539d 507d 60034d3d rxrpc: Fix potential deadlock
WARNING: held lock freed in nr_release C done 344 527d 548d 507d 4638faac netrom: hold sock when setting skb->destructor
KASAN: use-after-free Read in corrupted (3) syz done 1 569d 569d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING: ODEBUG bug in __sk_destruct C 2855 527d 992d 507d f9cedf1a net/smc: do not schedule tx_work in SMC_CLOSED state
WARNING in cgroup_rstat_updated syz done 1 527d 527d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in rb_erase (2) syz done 4 536d 743d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: slab-out-of-bounds Read in usage_accumulate syz done 3 570d 589d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
KASAN: use-after-free Read in nr_release C done 25 508d 587d 507d 4638faac netrom: hold sock when setting skb->destructor
WARNING: refcount bug in nr_rx_frame C done 15 531d 547d 507d 4638faac netrom: hold sock when setting skb->destructor
KASAN: use-after-free Read in hiddev_release C 11 517d 533d 507d 9c09b214 HID: hiddev: avoid opening a disconnected device 6d4472d7 HID: hiddev: do cleanup in failure of opening a device
KASAN: use-after-free Read in nr_insert_socket C done 22 531d 547d 507d 4638faac netrom: hold sock when setting skb->destructor
general protection fault in tls_tx_records 1 534d 526d 507d 5d92e631 net/tls: partially revert fix transition through disconnect with close
BUG: unable to handle kernel paging request in bpf_prog_ADDR C done 13 529d 546d 507d 06a22d89 bpf: fix access to skb_shared_info->gso_segs
KASAN: use-after-free Read in nr_rx_frame (2) C done 3 534d 542d 507d 4638faac netrom: hold sock when setting skb->destructor
memory leak in create_ctx syz 1 587d 587d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING in xt_compat_add_offset C done 18 529d 693d 507d 3b48300d netfilter: ebtables: also count base chain policies
KMSAN: kernel-usb-infoleak in pcan_usb_pro_init C 13 511d 535d 507d ead16e53 can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
kernel panic: corrupted stack end in corrupted syz done 17 527d 575d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
WARNING in gpio_to_desc C 3 524d 555d 507d c3953a3c NFC: nfcmrvl: fix gpio-handling regression
KASAN: use-after-free Read in tls_sk_proto_cleanup 9 529d 540d 507d 5d92e631 net/tls: partially revert fix transition through disconnect with close
general protection fault in rb_next (3) syz done done 1 580d 578d 507d 95fa1454 bpf: sockmap/tls, close can race with map free
general protection fault in tls_setsockopt syz done 7 535d 548d 507d 5d92e631 net/tls: partially revert fix transition through disconnect with close
KMSAN: uninit-value in read_eprom_word C 31 509d 535d 507d 224c0497 net: usb: pegasus: fix improper read if get_registers() fail
general protection fault in finish_task_switch (2) C done 1538 844d 889d 511d 26b471c7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
KASAN: use-after-free Read in tls_push_sg 2 535d 609d 514d 9354544c net/tls: fix page double free on TX cleanup
possible deadlock in xsk_notifier C done 495 545d 557d 520d 5464c3a0 xdp: fix potential deadlock on socket mutex
KASAN: use-after-free Write in _free_event C 112 684d 921d 520d 1cf8dfe8 perf/core: Fix race between close() and fork()
WARNING in __mark_chain_precision C done 105 520d 557d 520d b3b50f05 bpf: fix precision bit propagation for BPF_ST instructions
linux-next boot error: WARNING in corrupted 12 559d 561d 520d 18c49926 cpufreq: Add QoS requests for userspace constraints
INFO: task hung in snd_seq_write 6 666d 871d 520d ede34f39 ALSA: seq: Break too long mutex context in the write loop
memory leak in nfs_get_client C 12 557d 584d 520d 9f7761cf NFS: Cleanup if nfs_match_client is interrupted
usb-fuzzer boot error: general protection fault in dma_direct_max_mapping_size 21 538d 542d 520d 1b5d9a6e scsi: core: fix the dma_max_mapping_size call
memory leak in policydb_read C done 1 544d 542d 520d 45385237 selinux: fix memory leak in policydb_init()
WARNING in binder_transaction_buffer_release syz error 38 563d 606d 520d 49ed9694 binder: prevent transactions to context manager from its own process.
general protection fault in snd_usb_pipe_sanity_check C 72 522d 536d 520d 5d78e1c2 ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check
INFO: rcu detected stall in snd_seq_write syz error 18 541d 872d 520d ede34f39 ALSA: seq: Break too long mutex context in the write loop
KASAN: stack-out-of-bounds Read in hfcsusb_probe C 634 536d 642d 520d f384e62a ISDN: hfcsusb: checking idx of ep configuration
BUG: unable to handle kernel NULL pointer dereference in hci_uart_set_flow_control C done 7 666d 666d 520d b36a1552 Bluetooth: hci_uart: check for missing tty operations
kernel BUG at drivers/usb/wusbcore/wusbhc.c:LINE! C 1 542d 542d 520d f90bf1ec usb: wusbcore: fix unbalanced get/put cluster_id
memory leak in sctp_get_port_local C 28 530d 598d 529d 9b6c0887 sctp: not bind the socket in sctp_connect
WARNING: Support for this device (Terratec Grabster AV400) is experimental. C 371 536d 626d 529d 1753c7c4 media: pvrusb2: use a different format for warnings
general protection fault in send_hsr_supervision_frame C done 1395 549d 557d 529d 311633b6 hsr: switch ->dellink() to ->ndo_uninit()
memory leak in ip_mc_add_src (2) C 7 539d 568d 529d e5b1c6c6 igmp: fix memory leak in igmpv3_del_delrec()
general protection fault in btf_array_resolve C error 109 553d 576d 529d e4f07120 bpf: fix NULL deref in btf_type_is_resolve_source_only
general protection fault in sctp_sched_prio_sched C done 3 566d 579d 529d 4d141581 sctp: fix error handling on stream scheduler initialization
general protection fault in ip6_datagram_dst_update C done 12 552d 555d 529d 8975a3ab ipv6: fix potential crash in ip6_datagram_dst_update()
KMSAN: uninit-value in ax88772_bind C 80 531d 592d 529d 78226f6e net: usb: asix: init MAC address buffers
KASAN: use-after-free Read in ip_expire 1 577d 577d 529d d5dd8879 inet: fix various use-after-free in defrags units
kernel BUG at drivers/android/binder_alloc.c:LINE! (4) C done 26 569d 577d 529d bb4a2e48 binder: return errors from buffer copy functions
KASAN: use-after-free Read in cpia2_usb_disconnect C 3 555d 640d 529d eff73de2 media: cpia2_usb: first wake up, then free in disconnect
general protection fault in ovs_ct_exit C done 9888 570d 576d 529d b272a0ad netns: restore ops before calling ops_exit_list
memory leak in binder_transaction C 3 569d 581d 529d 1909a671 binder: fix memory leak in error path
KASAN: use-after-free Read in xlog_alloc_log 16 548d 568d 529d 89b171ac xfs: fix iclog allocation size
KMSAN: uninit-value in bond_start_xmit (2) C 2309 529d 853d 529d 9d1bc24b bonding: validate ip header before check IPPROTO_IGMP
WARNING in __flush_work (3) C 1251 532d 642d 529d 11a087f4 media: uvcvideo: Fix access to uninitialized fields on probe error
memory leak in pfkey_xfrm_policy2msg_prep C 4 569d 601d 529d 7c80eb1c af_key: fix leaks in key_pol_get_resp and dump_sp.
KASAN: use-after-free Read in dvb_usb_device_exit C 825 529d 644d 529d 6cf97230 media: dvb: usb: fix use after free in dvb_usb_device_exit
KASAN: slab-out-of-bounds Read in au0828_rc_unregister (2) 11 600d 611d 529d 6d0d1ff9 media: au0828: fix null dereference in error path
INFO: trying to register non-static key in rtl_c2hcmd_launcher C 48950 536d 644d 529d 6c0ed66f rtlwifi: rtl8192cu: fix error handle when usb probe failed
KASAN: use-after-free Read in kfree_skb_list C done 383 575d 594d 529d b7034146 net: fix use-after-free in kfree_skb_list
KASAN: null-ptr-deref Read in zr364xx_vidioc_querycap C 76 536d 627d 529d 5d2e73a5 media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
memory leak in __ip6_append_data C 10 572d 598d 529d dc93f46b inet: frags: fix use-after-free read in inet_frag_destroy_rcu
WARNING: ath10k USB support is incomplete, don't expect anything to work! C 347 537d 617d 529d 265df32e ath10k: Change the warning message string
KASAN: use-after-free Write in xfrm_hash_rebuild syz done 8 562d 610d 529d fd709721 xfrm: policy: fix bydst hlist corruption on hash rebuild
memory leak in bcsp_recv C 3 573d 601d 529d 4ce9146e Bluetooth: hci_bcsp: Fix memory leak in rx_skb
memory leak in start_sync_thread C 7 565d 598d 529d 5db7c8b9 ipvs: fix tinfo memory leak in start_sync_thread
KASAN: use-after-free Read in v4l2_release C 275 537d 641d 529d c666355e media: radio-raremono: change devm_k*alloc to k*alloc
net-next build error (2) 2 595d 595d 529d c9bb6165 netfilter: nf_conntrack_bridge: fix CONFIG_IPV6=y
KASAN: use-after-free Read in brnf_exit_net syz done 3 573d 576d 529d 7e6daf50 netfilter: bridge: prevent UAF in brnf_exit_net()
WARNING in static_key_slow_try_dec C done 58 552d 556d 529d d44e3fa5 ipv6: fix static key imbalance in fl_create()
WARNING: suspicious RCU usage in in_dev_dump_addr C done 107 590d 592d 529d d3e6e285 net: ipv4: fix rcu lockdep splat due to wrong annotation
memory leak in nf_hook_entries_grow C 99 556d 592d 529d cf47a0b8 ipvs: defer hook registration to avoid leaks
general protection fault in tcp_v6_send_reset C done 353 584d 588d 529d 39209673 ipv6: tcp: fix potential NULL deref in tcp_v6_send_reset()
KASAN: use-after-free Read in inet_frag_destroy_rcu C done 61 596d 599d 529d dc93f46b inet: frags: fix use-after-free read in inet_frag_destroy_rcu
general protection fault in btf_struct_resolve C error 49 553d 576d 529d e4f07120 bpf: fix NULL deref in btf_type_is_resolve_source_only
KASAN: use-after-free Read in rhashtable_last_table (2) 1 603d 603d 529d dc93f46b inet: frags: fix use-after-free read in inet_frag_destroy_rcu
KASAN: use-after-free Read in unregister_shrinker syz done 3 585d 590d 529d 689d7ba4 nfsd: fix cleanup of nfsd_reply_cache_init on failure
general protection fault in oom_unkillable_task 1 586d 580d 529d ac311a14 oom: decouple mems_allowed from oom_unkillable_task
general protection fault in rxrpc_connect_call C done 15 577d 723d 529d e835ada0 rxrpc: Fix send on a connected, but unbound socket
WARNING: Detected a wedged cx25840 chip; the device will not work. C 62 537d 626d 529d 1753c7c4 media: pvrusb2: use a different format for warnings
WARNING: suspicious RCU usage in fib_dump_info_fnhe C done 7 569d 569d 529d 3b525691 ipv6: fix suspicious RCU usage in rt6_dump_route()
memory leak in hsr_create_self_node C 5 568d 599d 529d b9a1e627 hsr: implement dellink to clean up resources
general protection fault in call_fib6_multipath_entry_notifiers C done 94 570d 576d 529d 9eee3b49 ipv6: Error when route does not have any valid nexthops
WARNING in snd_usb_motu_microbookii_communicate/usb_submit_urb C 3 546d 584d 529d 801ebf10 ALSA: usb-audio: Sanity checks for each pipe and EP types
memory leak in nr_rx_frame C 5 535d 598d 529d c8c8218e netrom: fix a memory leak in nr_rx_frame()
KASAN: use-after-free Read in p54u_load_firmware_cb syz 40 537d 620d 529d 6e41e225 p54usb: Fix race between disconnect and firmware loading
memory leak in batadv_tvlv_handler_register C 313 553d 605d 529d 17f78dd1 batman-adv: fix for leaked TVLV handler.
INFO: task hung in io_uring_release 24 553d 571d 529d a4c0b3de io_uring: fix io_sq_thread_stop running in front of io_sq_thread
general protection fault in get_task_pid C done 24 561d 564d 536d 28dd29c0 fork: return proper negative error code
general protection fault in do_move_mount (2) syz done 7 568d 577d 536d 570d7a98 vfs: move_mount: reject moving kernel internal mounts
memory leak in packet_set_ring C 2 568d 572d 536d 55655e3d net/packet: fix memory leak in packet_set_ring()
possible deadlock in io_submit_one C done 1779 540d 710d 536d cbcfa130 fs/userfaultfd.c: disable irqs for fault_pending and event locks
KMSAN: uninit-value in tipc_nl_compat_bearer_disable C 19 562d 576d 536d 4f07b80c tipc: check msg->req data len in tipc_nl_compat_bearer_disable
memory leak in sctp_v6_create_accept_sk C 1 593d 593d 536d 25bff6d5 sctp: change to hold sk after auth shkey is created successfully
memory leak in sctp_v4_create_accept_sk C 1 573d 571d 536d 25bff6d5 sctp: change to hold sk after auth shkey is created successfully
possible deadlock in userfaultfd_release C done 137 568d 811d 536d cbcfa130 fs/userfaultfd.c: disable irqs for fault_pending and event locks
possible deadlock in userfaultfd_read (2) 228 559d 658d 536d cbcfa130 fs/userfaultfd.c: disable irqs for fault_pending and event locks
memory leak in mpihelp_mul_karatsuba_case C 2 570d 571d 536d c8ea9fce lib/mpi: Fix karactx leak in mpi_powm
KASAN: global-out-of-bounds Read in qmi_wwan_probe C 2 559d 571d 536d 904d88d7 qmi_wwan: Fix out-of-bounds read
KASAN: null-ptr-deref Write in submit_audio_out_urb (2) C 3423 536d 568d 536d 34501219 ALSA: line6: Fix write on zero-sized buffer
WARNING in kvm_set_tsc_khz C 5 891d 888d 536d 3f16a5c3 KVM: x86: degrade WARN to pr_warn_ratelimited
WARNING in notify_change C 566 623d 1012d 541d f69e749a Abort file_remove_privs() for non-reg. files
WARNING in cgroup_exit C done 64 616d 618d 541d f2b31bb5 cgroup: never call do_group_exit() with task->frozen bit set
WARNING: syz-executor still has locks held! C done 233 772d 783d 541d a72173ec Revert "exec: make de_thread() freezable"
general protection fault in inet_accept C 131 757d 919d 554d 07603b23 net/smc: propagate file from SMC to TCP socket
memory leak in sctp_process_init C 10 579d 598d 554d 0a8dd9f6 Fix memory leak in sctp_process_init ce950f10 sctp: Free cookie before we memdup a new one
BUG: unable to handle kernel paging request in ipv6_rcv (2) 18 576d 600d 554d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
memory leak in __memcg_init_list_lru_node C 3 585d 599d 554d 3510955b mm/list_lru.c: fix memory leak in __memcg_init_list_lru_node
KMSAN: uninit-value in tcp_create_openreq_child C 4000 555d 576d 554d 85f9aa75 inet: clear num_timeout reqsk_alloc()
KASAN: slab-out-of-bounds Read in dst_dev_put 3 688d 739d 554d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
WARNING in fanotify_handle_event C done 5 578d 577d 554d c285a2f0 fanotify: update connector fsid cache on add mark
KASAN: use-after-free Read in pneigh_get_next syz done 2 580d 580d 554d f3e92cb8 neigh: fix use-after-free read in pneigh_get_next
KASAN: use-after-free Read in css_task_iter_advance 48 584d 591d 554d c596687a cgroup: Fix css_task_iter_advance_css_set() cset skip condition
BUG: Dentry still in use [unmount of tmpfs tmpfs] 2 587d 586d 554d 1b0b9cc8 vfs: fsmount: add missing mntget()
KASAN: slab-out-of-bounds Read in __fib6_drop_pcpu_from 1 579d 579d 554d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
WARNING: refcount bug in css_task_iter_next 11 584d 589d 554d c596687a cgroup: Fix css_task_iter_advance_css_set() cset skip condition
memory leak in raw_sendmsg C 2 580d 591d 554d fd704bd5 can: purge socket error queue on sock destruct
KASAN: slab-out-of-bounds Read in css_task_iter_advance C done 19 584d 591d 554d c596687a cgroup: Fix css_task_iter_advance_css_set() cset skip condition
memory leak in tipc_buf_acquire C 15 578d 601d 554d 5cf02612 tipc: purge deferredq list for each grp member in tipc_group_delete
general protection fault in __smc_diag_dump syz done 309 731d 744d 554d b03faa1f net/smc: postpone release of clcsock
inconsistent lock state in ax25_destroy_timer 2 578d 580d 554d d4d5d8e8 ax25: fix inconsistent lock state in ax25_destroy_timer
memory leak in inet6_create C 2 586d 589d 554d 522924b5 net: correct udp zerocopy refcnt also when zerocopy only on append
memory leak in kobject_set_name_vargs C 12 563d 597d 554d 4f488fbc cfg80211: fix memory leak of wiphy device name
inconsistent lock state in ax25_rt_autobind 2 578d 579d 554d d4d5d8e8 ax25: fix inconsistent lock state in ax25_destroy_timer
general protection fault in rt_cache_valid 24 572d 699d 554d c3bcde02 tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
KASAN: use-after-free Read in sprintf syz done 2 580d 580d 554d f3e92cb8 neigh: fix use-after-free read in pneigh_get_next
BUG: Dentry still in use [unmount of sysfs sysfs] C done 6 579d 580d 554d 1b0b9cc8 vfs: fsmount: add missing mntget()