syzbot


Title Repro Cause bisect Fix bisect Count Last Reported Closed Patch
BUG: unable to handle kernel NULL pointer dereference in unix_shutdown C unreliable 413 156d 159d 3d02h d359902d5c35 af_unix: Fix NULL pointer bug in unix_shutdown
kernel BUG at mm/vmalloc.c:LINE! (2) C done done 6605 155d 566d 3d02h 537cf4e3cc2f xsk: Fix umem cleanup bug at socket destruct
memory leak in __pskb_copy_fclone C 21 197d 339d 20d 1090340f7ee5 net: Fix memory leak in ieee802154_raw_deliver
WARNING in rtl28xxu_ctrl_msg/usb_submit_urb C 50 200d 248d 78d 76f22c93b209 media: rtl28xxu: fix zero-length control request media: rtl28xxu: fix zero-length control request
WARNING in hso_free_net_device C error 528 196d 877d 78d 788e67f18d79 usb: hso: fix error handling code of hso_create_net_device usb: hso: fix error handling code of hso_create_net_device
KASAN: null-ptr-deref Read in filp_close (2) C 3 198d 307d 78d 3b0462726e7e cgroup: verify that source is a string 9b5b872215fe file: fix close_range() for unshare+cloexec
BUG: sleeping function called from invalid context in lock_sock_nested (2) C done error 19391 169d 705d 78d e04480920d1e Bluetooth: defer cleanup of resources in hci_unregister_dev() Bluetooth: defer cleanup of resources in hci_unregister_dev()
KASAN: use-after-free Write in dec_rlimit_ucounts C 4 161d 194d 78d 345daff2e994 ucounts: Fix race condition between alloc_ucounts and put_ucounts bbb6d0f3e1fe ucounts: Increase ucounts reference counter before the security hook
KMSAN: kernel-infoleak in compat_drm_wait_vblank 37 294d 339d 78d de066e116306 drm/compat: Clear bounce structures drm/compat: Clear bounce structures
KASAN: use-after-free Read in cipso_v4_genopt C inconclusive 5 330d 331d 78d ad5d07f4a9cd cipso,calipso: resolve a number of problems with the DOI refcounts 1165affd4848 net: mac802154: Fix general protection fault
net-next build error (4) 4 146d 147d 78d ea7b4244b365 x86/setup: Explicitly include acpi.h
memory leak in kobject_set_name_vargs (4) C 171 146d 433d 78d 8fd0c1b0647a nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
WARNING in io_sq_thread_park 1 310d 310d 78d a185f1db59f1 io_uring: do ctx sqd ejection in a clear context
WARNING in destroy_conntrack C done 1 173d 171d 78d e3245a7b7b34 netfilter: nft_ct: protect nft_ct_pcpu_template_refcnt with mutex
upstream boot error: WARNING in kvm_wait 233 314d 328d 78d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
general protection fault in hwsim_del_edge_nl C done 3 224d 224d 78d 0303b30375df ieee802154: hwsim: avoid possible crash in hwsim_del_edge_nl()
KMSAN: uninit-value in number (3) C 8575 78d 322d 78d eaaea4681984 media: gspca/sq905.c: fix uninitialized variable
WARNING: suspicious RCU usage in kernfs_fop_read_iter 1 301d 301d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING in idr_get_next C error done 21 269d 514d 78d 3cbf7530a163 qrtr: Convert qrtr_ports from IDR to XArray
KASAN: null-ptr-deref Read in phy_disconnect C 255 145d 149d 78d 1406e8cb4b05 net: usb: asix: do not call phy_disconnect() for ax88178
WARNING in ex_handler_fprestore C done 5 241d 248d 78d 484cea4f362e x86/fpu: Prevent state corruption in __fpu__restore_sig()
KMSAN: uninit-value in hsr_fill_frame_info C 249 195d 493d 78d 2e9f60932a2c net: hsr: check skb can contain struct hsr_ethhdr in fill_frame_info
possible deadlock in snd_timer_interrupt C done 41 86d 186d 78d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
WARNING: refcount bug in ip6_tnl_dev_uninit C done 16 301d 306d 78d 0d7a7b2014b1 ipv6: remove extra dev_hold() for fallback tunnels
WARNING in bpf_bprintf_prepare C unreliable 96 224d 262d 78d e2d5b2bb769f bpf: Fix nested bpf_bprintf_prepare with more per-cpu buffers
KASAN: use-after-free Read in snd_seq_timer_interrupt (2) C inconclusive 2 235d 234d 78d 83e197a8414c ALSA: seq: Fix race of snd_seq_timer_open()
bpf-next build error (3) 10 135d 305d 78d 7e32a09fdcb3 bpf: tcp: Remove comma which is causing build error
WARNING: suspicious RCU usage in tomoyo_encode2 1 264d 264d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KASAN: use-after-free Read in sctp_do_8_2_transport_strike 1 283d 282d 78d 35b4f24415c8 sctp: do asoc update earlier in sctp_sf_do_dupcook_a
KASAN: use-after-free Read in gfs2_glock_shrink_scan 1 258d 254d 78d 1ab19c5de4c5 gfs2: Fix use-after-free in gfs2_glock_shrink_scan
possible deadlock in hfs_find_init C done error 1 385d 1375d 78d b3b2177a2d79 hfs: add lock nesting notation to hfs_find_init
KASAN: slab-out-of-bounds Read in add_del_if C unreliable 970 170d 146d 78d 9384eacd80f3 net: core: don't call SIOCBRADD/DELIF for non-bridge devices
memory leak in zr364xx_start_readpipe C 2 228d 255d 78d 0a045eac8d04 media: zr364xx: fix memory leak in zr364xx_start_readpipe
KASAN: use-after-free Write in alloc_ucounts syz 7 177d 194d 78d 345daff2e994 ucounts: Fix race condition between alloc_ucounts and put_ucounts
UBSAN: shift-out-of-bounds in ___bpf_prog_run C unreliable 38 212d 323d 78d 28131e9d9333 bpf: Fix up register-based shifts in interpreter to silence KUBSAN
KASAN: slab-out-of-bounds Read in fq_pie_qdisc_enqueue 1 218d 218d 78d e70f7a11876a net/sched: fq_pie: fix OOB access in the traffic path
KMSAN: uninit-value in video_usercopy (2) 13058 125d 317d 78d c344f07aa1b4 media: v4l2-core: ignore native time32 ioctls on 64-bit
WARNING: suspicious RCU usage in do_ipv6_setsockopt 1 304d 304d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
memory leak in garp_request_join C 414 208d 731d 78d 42ca63f98084 net/802/garp: fix memleak in garp_request_join()
memory leak in pcan_usb_fd_init C 19 342d 412d 78d a0b96b4a6274 drivers: net: fix memory leak in peak_usb_create_dev
unregister_netdevice: waiting for DEV to become free (5) C done 40035 78d 323d 78d 0d7a7b2014b1 ipv6: remove extra dev_hold() for fallback tunnels
possible deadlock in snd_timer_notify 119 80d 187d 78d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
WARNING in dtv5100_probe/usb_submit_urb C 51 200d 246d 78d 8c8b9a9be2af media: dtv5100: fix control-request directions
memory leak in io_sqe_buffers_register C 2 271d 272d 78d bb6659cc0ad3 io_uring: Fix memory leak in io_sqe_buffers_register()
BUG: using smp_processor_id() in preemptible code in clock_was_set C done 231 167d 168d 78d 9482fd71dbb8 hrtimer: Use raw_cpu_ptr() in clock_was_set()
possible deadlock in __queue_work 2 216d 275d 78d 3f804f6d201c KVM: x86: Prevent deadlock against tk_core.seq
KMSAN: uninit-value in virtio_net_hdr_to_skb C 325 196d 255d 78d 61431a5907fc net: ensure mac header is set in virtio_net_hdr_to_skb()
memory leak in kvm_dev_ioctl C 37 196d 208d 78d 004d62eb4e57 kvm: debugfs: fix memory leak in kvm_create_vm_debugfs
WARNING in blk_rq_append_bio C done 6 290d 255d 78d cbb749cf377a block: remove an incorrect check from blk_rq_append_bio
WARNING: suspicious RCU usage in validate_mm 1 234d 234d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
INFO: task hung in ext4_put_super C inconclusive done 1 225d 255d 78d 618f003199c6 ext4: fix memory leak in ext4_fill_super
WARNING in io_link_timeout_fn C done 2 260d 260d 78d 447c19f3b507 io_uring: fix ltout double free on completion race
kernel BUG in put_ucounts 3 105d 191d 78d 345daff2e994 ucounts: Fix race condition between alloc_ucounts and put_ucounts
KASAN: slab-out-of-bounds Write in ext4_write_inline_data_end C done 1 162d 161d 78d a54c4613dac1 ext4: fix race writing to an inline_data file while its xattrs are changing
KASAN: use-after-free Write in put_ucounts 3 192d 194d 78d 345daff2e994 ucounts: Fix race condition between alloc_ucounts and put_ucounts
general protection fault in nl802154_del_llsec_devkey C inconclusive 229 292d 344d 78d 27c746869e1a net: ieee802154: fix nl802154 del llsec devkey
WARNING in exception_type C error 1 151d 150d 78d e7177339d7b5 Revert "KVM: x86: mmu: Add guest physical address check in translate_gpa()"
WARNING in e2i_init/usb_submit_urb 4 219d 248d 78d 41e81022a04a Input: usbtouchscreen - fix control-request directions
WARNING in ethnl_default_doit 202 222d 230d 78d e175aef90269 ethtool: strset: fix message length calculation
memory leak in hwsim_add_one C 1 236d 234d 78d 28a5501c3383 ieee802154: hwsim: Fix memory leak in hwsim_add_one
WARNING in taprio_change C done 746 264d 500d 78d ed8157f1ebf1 net: sched: tapr: prevent cycle_time == 0 in parse_taprio_schedule
KASAN: out-of-bounds Read in leaf_paste_entries C inconclusive 8 110d 341d 78d 13d257503c09 reiserfs: check directory items on read from disk
upstream boot error: kernel panic: VFS: Unable to mount root fs on unknown-block(0,0) 235 200d 208d 78d c43ddbf97f46 scsi: virtio_scsi: Do not overwrite SCSI status
KASAN: use-after-free Write in qdisc_class_hash_insert (2) 1 222d 222d 78d 0cd58e5c53ba pkt_sched: sch_qfq: fix qfq_change_class() error path
WARNING: suspicious RCU usage in count (2) 1 251d 251d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KCSAN: data-race in igmp_ifc_event / igmp_ifc_timer_expire 1 172d 171d 78d 4a2b285e7e10 net: igmp: fix data-race in igmp_ifc_timer_expire()
kernel BUG in llc_sap_action_send_xid_c C error 61 79d 293d 78d c7c9d2102c9c net: llc: fix skb_over_panic
BUG: unable to handle kernel NULL pointer dereference in htb_select_queue syz done 8 309d 324d 78d fb3a3e37de33 sch_htb: Fix offload cleanup in htb_destroy on htb_init failure 93bde210c434 sch_htb: Fix select_queue for non-offload mode
usb-testing boot error: WARNING in kvm_wait 3 322d 324d 78d f4e61f0c9add  x86/kvm: Fix broken irq restoration in kvm_wait
WARNING in netlbl_cipsov4_add C inconclusive 4433 142d 341d 78d 8ca34a13f7f9 net: cipso: fix warnings in netlbl_cipsov4_add_std
general protection fault in io_commit_cqring (2) C done 82 290d 304d 78d 51520426f4bc io_uring: handle setup-failed ctx in kill_timeouts
KCSAN: data-race in packet_do_bind / packet_sendmsg (3) 1 238d 234d 78d c7d2ef5dd4b0 net/packet: annotate accesses to po->bind
WARNING: suspicious RCU usage in do_recvmmsg 8 231d 257d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
memory leak in __ieee80211_beacon_get syz 14 233d 354d 78d bd18de517923 mac80211_hwsim: drop pending frames on stop
KASAN: use-after-free Write in sk_psock_stop syz done 74 277d 296d 78d aadb2bb83ff7 sock_map: Fix a potential use-after-free in sock_map_close()
INFO: task hung in io_sq_thread_park (2) syz done 2 200d 196d 78d 46fee9ab02cb io_uring: remove double poll entry on arm failure
KCSAN: data-race in unix_dgram_sendmsg / unix_release_sock 1 228d 227d 78d a494bd642d91 net/af_unix: fix a data-race in unix_dgram_sendmsg / unix_release_sock
INFO: rcu detected stall in wg_packet_tx_worker (3) C inconclusive 5 164d 146d 78d c7c5e6ff533f fq_codel: reject silly quantum parameters
KCSAN: data-race in inet_dgram_connect / udp_lib_get_port (5) 6 244d 231d 78d dcd01eeac144 inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
WARNING: refcount bug in vti6_dev_uninit C 26 302d 306d 78d 0d7a7b2014b1 ipv6: remove extra dev_hold() for fallback tunnels
KCSAN: data-race in __io_uring_cancel / io_uring_try_cancel_requests 3 244d 246d 78d b16ef427adf3 io_uring: fix data race to avoid potential NULL-deref
memory leak in smsc75xx_bind syz 2 247d 248d 78d 46a8b29c6306 net: usb: fix memory leak in smsc75xx_bind
memory leak in mcba_usb_probe C 34 225d 402d 78d 91c02557174b can: mcba_usb: fix memory leak in mcba_usb
KMSAN: kernel-infoleak in i2cdev_read C 592 195d 321d 78d 86ff25ed6cd8 i2c: dev: zero out array used for i2c reads from userspace
WARNING: suspicious RCU usage in get_counters (2) 1 214d 214d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in unix_dgram_connect C done 2 153d 153d 78d dc56ad7028c5 af_unix: fix potential NULL deref in unix_dgram_connect()
WARNING in __percpu_ref_exit (2) C error done 31 79d 318d 78d a298232ee6b9 io_uring: fix link timeout refs
WARNING in cfg80211_connect C done 2320 291d 483d 78d 1b5ab825d9ac cfg80211: remove WARN_ON() in cfg80211_sme_connect
WARNING: suspicious RCU usage in gc_worker 3 233d 259d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
BUG: unable to handle kernel paging request in vga16fb_fillrect C inconclusive 14 81d 197d 78d 8c28051cdcbe fbmem: don't allow too huge resolutions
BUG: unable to handle kernel paging request in csum_partial (3) C done 1 165d 196d 78d 9cf448c200ba ip6_gre: add validation for csum_start 1d011c4803c7 ip_gre: add validation for csum_start
WARNING in hid_submit_ctrl/usb_submit_urb C done 38 144d 193d 78d 0a824efdb724 HID: usbhid: Fix warning caused by 0-length input reports
WARNING in ext4_xattr_set_entry C unreliable 7 328d 411d 78d 6b22489911b7 ext4: do not try to set xattr into ea_inode if value is empty
WARNING: suspicious RCU usage in wg_ratelimiter_gc_entries 5 229d 304d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
net build error (3) 29 141d 147d 78d ea7b4244b365 x86/setup: Explicitly include acpi.h
memory leak in nfcmrvl_nci_register_dev C 9 345d 390d 78d e0652f8bb44d NFC: nci: fix memory leak in nci_allocate_device
WARNING in kvm_wait C error 119882 307d 325d 78d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
general protection fault in ieee802154_llsec_parse_key_id C inconclusive 92 238d 339d 78d 6f7f657f2440 net: ieee802154: nl-mac: fix check on panid
WARNING: suspicious RCU usage in rmap_walk_file 1 258d 258d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
memory leak in xfrm_user_rcv_msg C 1 223d 219d 78d 7c1a80e80cde net: xfrm: fix memory leak in xfrm_user_rcv_msg
KMSAN: uninit-value in INET_ECN_decapsulate (2) 2 233d 303d 78d 6628ddfec758 net: geneve: check skb is large enough for IPv4/IPv6 header
memory leak in bpf (2) C 3 233d 301d 78d ccff81e1d028 bpf: Fix false positive kmemleak report in bpf_ringbuf_area_alloc()
WARNING: refcount bug in rxe_qp_do_cleanup 1 264d 262d 78d 67f29896fdc8 RDMA/rxe: Clear all QP fields if creation failed
KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (5) 47 79d 231d 78d f13ef10059cc net: annotate data race in sock_error()
possible deadlock in __fs_reclaim_acquire syz unreliable 672 196d 207d 78d 187ad460b841 mm/page_alloc: avoid page allocator recursion with pagesets.lock held
general protection fault in btf_type_id_size C unreliable 6 329d 326d 78d 350a5c4dd245 bpf: Dont allow vmlinux BTF to be used in map_create and prog_load.
WARNING: suspicious RCU usage in __get_free_pages 1 268d 268d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
memory leak in tty_init_dev C 9 238d 882d 78d 58af3d3d54e8 net: caif: fix memory leak in ldisc_open
INFO: task hung in __io_uring_cancel C done 5 217d 283d 78d 28090c133869 io_uring: fix work_exit sqpoll cancellations
divide error in __tcp_select_window (2) C done 4 292d 294d 78d a7150e382267 Revert "tcp: Reset tcp connections in SYN-SENT state"
KASAN: out-of-bounds Read in i801_isr 16 221d 261d 78d e4d8716c3dce i2c: i801: Don't generate an interrupt on bus reset
riscv/fixes boot error: WARNING in vkms_vblank_simulate 13 279d 303d 78d b4142fc4d52d drm/vkms: fix misuse of WARN_ON
WARNING: suspicious RCU usage in __ext4_mark_inode_dirty 1 237d 236d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KCSAN: data-race in start_this_handle / start_this_handle 54 321d 322d 78d 3b1833e92bab ext4: annotate data race in start_this_handle()
WARNING: suspicious RCU usage in shrink_page_list 1 262d 262d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KASAN: use-after-free Read in tipc_recvmsg C done 2198 185d 193d 78d cc19862ffe45 tipc: fix an use-after-free issue in tipc_recvmsg
possible deadlock in _snd_pcm_stream_lock_irqsave (2) 120 79d 187d 78d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
general protection fault in br_switchdev_fdb_notify C error 82 174d 179d 78d 0541a6293298 net: bridge: validate the NUD_PERMANENT bit when adding an extern_learn FDB entry
memory leak in create_io_worker C 5 102d 140d 78d 66e70be72288 io-wq: fix memory leak in create_io_worker()
INFO: trying to register non-static key in l2cap_chan_del syz inconclusive 73 321d 540d 78d 3af70b39fa2d Bluetooth: check for zapped sk before connecting
KMSAN: uninit-value in ip_rcv_core C 141 195d 1229d 78d 6628ddfec758 net: geneve: check skb is large enough for IPv4/IPv6 header
memory leak in hdcs_probe_1020 C 1 306d 302d 78d 4f4e6644cd87 media: gscpa/stv06xx: fix memory leak
WARNING in ieee802154_get_llsec_params C done 36 292d 338d 78d 1534efc7bbc1 net: ieee802154: stop dump llsec params for monitors
WARNING in slave_kobj_release C done 3 256d 345d 78d 35d96e631860 bonding: init notify_work earlier to avoid uninitialized use
WARNING in io_wqe_enqueue C done 13 237d 237d 78d e6ab8991c5d0 io_uring: fix false WARN_ONCE
KASAN: use-after-free Write in get_ucounts syz unreliable done 7 176d 203d 78d 345daff2e994 ucounts: Fix race condition between alloc_ucounts and put_ucounts
usb-testing boot error: kernel panic: VFS: Unable to mount root fs on unknown-block(0,0) 27 199d 204d 78d c43ddbf97f46 scsi: virtio_scsi: Do not overwrite SCSI status
divide error in nft_limit_init C done 4 291d 293d 78d b895bdf5d643 netfilter: nft_limit: avoid possible divide error in nft_limit_init
WARNING: suspicious RCU usage in exit_mmap 1 258d 258d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
BUG: unable to handle kernel paging request in cap_capable C unreliable 4 175d 176d 78d 9384eacd80f3 net: core: don't call SIOCBRADD/DELIF for non-bridge devices
KASAN: slab-out-of-bounds Write in xt_compat_target_from_user C error error 1 529d 528d 78d b29c457a6511 netfilter: x_tables: fix compat match/target pad out-of-bound write
linux-next boot error: KASAN: use-after-free Read in page_to_skb 7 281d 283d 78d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
KASAN: use-after-free Read in eth_header_parse_protocol C done 1453 277d 323d 78d 61431a5907fc net: ensure mac header is set in virtio_net_hdr_to_skb()
possible deadlock in snd_pcm_period_elapsed (2) 52 80d 187d 78d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
KMSAN: uninit-value in pegasus_probe C 258 177d 847d 78d af35fc37354c net: pegasus: fix uninit-value in get_interrupt_interval
general protection fault in magicmouse_remove C 47 229d 255d 78d 4b4f6cecca44 HID: magicmouse: fix NULL-deref on disconnect
KASAN: use-after-free Read in nbd_genl_connect (2) C unreliable 6 155d 155d 78d 7ee656c3ac3d nbd: remove nbd->destroy_complete
KCSAN: data-race in udp_lib_setsockopt / udpv6_sendmsg 1 213d 212d 78d 18a419bad63b udp: annotate data races around unix_sk(sk)->gso_size
KASAN: use-after-free Read in ntfs_iget (2) C inconclusive 2 237d 234d 78d d98e4d95411b ntfs: fix validity check for file name attribute
UBSAN: shift-out-of-bounds in ext4_mb_init C done 5 349d 360d 78d f91436d55a27 fs/ext4: fix integer overflow in s_log_groups_per_flex
memory leak in __send_signal syz 3 221d 235d 78d 399f8dd9a866 signal: Prevent sigqueue caching after task got released
WARNING: suspicious RCU usage in nf_ct_iterate_cleanup (2) 4 208d 267d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING in ieee80211_free_ack_frame syz done 117 83d 477d 78d bd18de517923 mac80211_hwsim: drop pending frames on stop
BUG: unable to handle kernel access to user memory in schedule_tail 21843 300d 323d 78d 285a76bb2cf5 riscv: evaluate put_user() arg before enabling user access
WARNING in batadv_iv_send_outstanding_bat_ogm_packet C done 12568 211d 837d 78d 9f460ae31c44 batman-adv: Avoid WARN_ON timing related checks
WARNING in io_poll_double_wake C done done 1124 180d 282d 78d a890d01e4ee0 io_uring: fix poll requests leaking second poll entries
KMSAN: kernel-infoleak in move_addr_to_user (5) 3 179d 321d 78d 50535249f624 net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()
WARNING: suspicious RCU usage in console_conditional_schedule 1 257d 257d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: refcount bug in ip6gre_tunnel_uninit C error 10 303d 306d 78d 7f700334be9a ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
memory leak in dvb_create_media_graph C 26 284d 442d 78d bf9a40ae8d72 media: dvbdev: Fix memory leak in dvb_media_device_free()
WARNING in vkms_vblank_simulate (2) C error 77748 79d 453d 78d b4142fc4d52d drm/vkms: fix misuse of WARN_ON
memory leak in hdcs_probe_1x00 C 1 335d 335d 78d 4f4e6644cd87 media: gscpa/stv06xx: fix memory leak
WARNING in osif_probe/usb_submit_urb C 45 203d 248d 78d 4ca070ef0dd8 i2c: robotfuzz-osif: fix control-request directions
KCSAN: data-race in inet_send_prepare / udp_lib_get_port (3) 4 231d 234d 78d dcd01eeac144 inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
general protection fault in cdev_del (2) C error 45 212d 490d 78d 8a12f8836145 net: hso: fix null-ptr-deref during tty device unregistration 0a360e8b65d6 tty: n_gsm: check error while registering tty devices
WARNING: suspicious RCU usage in shmem_alloc_page 1 272d 272d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in nl802154_del_llsec_dev C inconclusive 166 292d 343d 78d 3d1eac2f4558 net: ieee802154: fix nl802154 del llsec dev
KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions 2 256d 276d 78d 821bbf79fe46 ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
WARNING: ODEBUG bug in __sk_destruct (2) C done done 62 88d 285d 78d 14a4696bc311 can: isotp: isotp_release(): omit unintended hrtimer restart on socket release
INFO: task hung in io_wq_put_and_exit C unreliable 628 79d 140d 78d 3b33e3f4a6c0 io-wq: fix silly logic error in io_task_work_match()
upstream build error (16) 243 87d 209d 78d 498cc50b3fa9 clk: hisilicon: hi3559a: Drop __init markings everywhere
KASAN: use-after-free Read in bcm_rx_handler syz done 2 230d 260d 78d d5f9023fa61e can: bcm: delay release of struct bcm_op after synchronize_rcu()
possible deadlock in do_fcntl C done 245 154d 486d 78d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
WARNING in qt2_attach/usb_submit_urb C 171 227d 248d 78d eb8dbe80326c USB: serial: quatech2: fix control-request directions
BUG: sleeping function called from invalid context in stack_depot_save C unreliable 8490 178d 207d 78d 187ad460b841 mm/page_alloc: avoid page allocator recursion with pagesets.lock held
memory leak in hub_event (2) C 2 315d 318d 78d dcb4b8ad6a44 misc/uss720: fix memory leak in uss720_probe
WARNING: suspicious RCU usage in vfree 1 253d 253d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
memory leak in usb_set_configuration (2) C 2 173d 281d 78d be8656e62e9e media: cpia2: fix memory leak in cpia2_usb_probe
WARNING in usb_new_device/usb_submit_urb C 2 242d 238d 78d 60dfe484cef4 USB: core: Avoid WARNings for 0-length descriptor requests
WARNING in rtl8152_probe C 23 237d 260d 78d 1a44fb38cc65 r8152: check the informaton of the device
inconsistent lock state in sco_sock_timeout C done 16 183d 528d 78d ba316be1b6a0 Bluetooth: schedule SCO timeouts with delayed_work
WARNING in ieee80211_get_sband C done 7 246d 472d 78d 0ee4d55534f8 mac80211: remove warning in ieee80211_get_sband()
KASAN: use-after-free Write in j1939_can_recv 2 308d 341d 78d 22c696fed25c can: j1939: j1939_sk_init(): set SOCK_RCU_FREE to call sk_destruct() after RCU is done
general protection fault in hci_release_dev C done 41 157d 178d 78d e04480920d1e Bluetooth: defer cleanup of resources in hci_unregister_dev()
WARNING in do_proc_control/usb_submit_urb C error 456 187d 201d 78d b0863f192732 USB: core: Fix incorrect pipe calculation in do_proc_control()
memory leak in skb_clone C 2 187d 292d 78d 1090340f7ee5 net: Fix memory leak in ieee802154_raw_deliver
general protection fault in gadget_setup 1 305d 289d 78d 4a5d797a9f9c usb: gadget: dummy_hcd: fix gpf in gadget_setup
general protection fault in try_grab_compound_head C done 5 180d 208d 78d d08af0a59684 mm/hugetlb: fix refs calculation from unaligned @vaddr
BUG: using smp_processor_id() in preemptible code in radix_tree_node_alloc C done done 544 265d 601d 78d 3cbf7530a163 qrtr: Convert qrtr_ports from IDR to XArray
general protection fault in reiserfs_security_init C done 26311 301d 493d 78d 5e46d1b78a03 reiserfs: update reiserfs_xattrs_initialized() condition
KASAN: slab-out-of-bounds Read in do_wait_for_common C error 5 172d 192d 78d e9e6aa51b273 staging: rtl8712: error handling refactoring
BUG: sleeping function called from invalid context in __alloc_skb C done 33 126d 267d 78d 7072a355ba19 netfilter: nfnetlink: add a missing rcu_read_unlock()
WARNING: suspicious RCU usage in kernel_execve 1 215d 215d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: suspicious RCU usage in do_nanosleep 1 265d 265d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: refcount bug in __io_queue_sqe 1 280d 271d 78d a298232ee6b9 io_uring: fix link timeout refs
bpf-next test error: WARNING in kvm_wait 1 317d 317d 78d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
WARNING in do_proc_bulk C inconclusive 3 269d 270d 78d 4f2629ea67e7 USB: usbfs: Don't WARN about excessively large memory allocations
BUG: unable to handle kernel paging request in corrupted (3) C done 45 87d 255d 78d 7a274727702c io_uring: don't modify req->poll for rw
BUG: unable to handle kernel NULL pointer dereference in kiocb_done C unreliable done 3 146d 146d 78d b8ce1b9d25cc io_uring: don't submit half-prepared drain request
general protection fault in smc_tx_sendmsg C done 6369 212d 220d 78d 17081633e22d net/smc: Ensure correct state of the socket in send path
KCSAN: data-race in __se_sys_perf_event_open / find_get_context 7 233d 245d 78d 6c605f837115 perf: Fix data race between pin_count increment/decrement
WARNING: suspicious RCU usage in kernfs_iop_getattr 1 273d 269d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: suspicious RCU usage in dup_mmap 1 244d 244d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
UBSAN: array-index-out-of-bounds in ima_inode_setxattr C unreliable 6 159d 161d 78d cb181da16196 IMA: reject unknown hash algorithms in ima_get_hash_algo
possible deadlock in io_uring_register 16 138d 140d 78d 009ad9f0c6ee io_uring: drop ctx->uring_lock before acquiring sqd->lock
KCSAN: data-race in packet_do_bind / packet_getname (5) 4 226d 226d 78d e032f7c9c7ce net/packet: annotate accesses to po->ifindex
memory leak in em28xx_dvb_init C 1 317d 317d 78d 0ae10a7dc899 media: em28xx: fix memory leak
memory leak in qrtr_create C 3 182d 353d 78d 52f3456a96c0 net: qrtr: fix memory leaks
memory leak in virtio_transport_send_pkt_info C 2 290d 353d 78d 8432b8114957 vsock/virtio: free queued packets when closing socket
possible deadlock in loop_probe C done 20656 200d 225d 78d 962bf783ef65 mtd: break circular locks in register_mtd_blktrans
possible deadlock in ieee80211_tx_frags 1 279d 272d 78d 1d482e666b8e netlink: disable IRQs for netlink_lock_table()
linux-next test error: KASAN: null-ptr-deref Read in fuse_conn_put 18 143d 143d 78d 660585b56e63 fuse: wait for writepages in syncfs
possible deadlock in __loop_clr_fd (2) C unreliable 6977 78d 203d 78d 1c500ad70638 loop: reduce the loop_ctl_mutex scope
memory leak in __usbhid_submit_report C 129 148d 442d 78d f7744fa16b96 HID: usbhid: free raw_report buffers in usbhid_stop
WARNING in io_try_cancel_userdata syz unreliable 4 153d 157d 78d dadebc350da2 io_uring: fix io_try_cancel_userdata race for iowq
WARNING in x86_emulate_instruction C done 4 254d 250d 78d da6393cdd8aa KVM: X86: Fix warning caused by stale emulation context
KCSAN: data-race in __inet_hash_connect / inet_send_prepare (4) 7 228d 231d 78d dcd01eeac144 inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
UBSAN: shift-out-of-bounds in choke_change (2) C done 7 293d 309d 78d 3a87571f0ffc sch_red: fix off-by-one checks in red_check_params()
KMSAN: kernel-infoleak in copy_page_to_iter (2) C 2099 174d 1232d 78d ce3aba43599f ext4: fix kernel infoleak via ext4_extent_header
UBSAN: shift-out-of-bounds in snd_timer_user_ccallback 1 243d 239d 78d 9c1fe96bded9 ALSA: timer: Fix master timer notification
BUG: scheduling while atomic: syz-executor/ADDR C done 5 154d 211d 78d 72ff2bf04db2 crypto: aesni - xts_crypt() return if walk.nbytes is 0
UBSAN: shift-out-of-bounds in xprt_calc_majortimeo C unreliable 149 279d 408d 78d c09f11ef3595 NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
INFO: rcu detected stall in tx C error unreliable 3 145d 283d 78d 30fad76ce4e9 USB: usbtmc: Fix RCU stall warning
KASAN: use-after-free Read in r871xu_dev_remove C unreliable 152 172d 198d 78d e9e6aa51b273 staging: rtl8712: error handling refactoring
KASAN: use-after-free Read in io_worker_handle_work 2 223d 253d 78d 3743c1723bfc io-wq: Fix UAF when wakeup wqe in hash waitqueue
WARNING: suspicious RCU usage in proc_alloc_inode 1 221d 221d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
net test error: WARNING in kvm_wait 1 320d 320d 78d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
KMSAN: kernel-infoleak in fb_cmap_to_user C 439 195d 346d 78d 19ab233989d0 fbdev: zero-fill colormap in fbcmap.c
KASAN: slab-out-of-bounds Read in snd_usbmidi_get_ms_info C 10 257d 262d 78d e84749a78dc8 ALSA: usb-audio: Validate MS endpoint descriptors
WARNING: lock held when returning to user space in sock_setsockopt 1 205d 205d 78d 271dbc318432 sock: unlock on error in sock_setsockopt()
WARNING in mntput_no_expire (2) C done 68 86d 301d 78d 7d01ef7585c0 Make sure nd->path.mnt and nd->path.dentry are always valid pointers
WARNING: suspicious RCU usage in __fput 1 246d 246d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING in ieee802154_del_seclevel C done 7 303d 339d 78d 9dde130937e9 net: ieee802154: forbid monitor for del llsec seclevel
memory leak in snd_ctl_led_register C 1 265d 255d 78d 3ae72f6ab9c1 ALSA: control led: fix memory leak in snd_ctl_led_register
KMSAN: kernel-usb-infoleak in hid_submit_ctrl C 839 253d 861d 78d 6be388f4a35d HID: usbhid: fix info leak in hid_submit_ctrl
linux-next build error (12) 63 205d 304d 78d 7aae231ac93b bpf: tcp: Limit calling some tcp cc functions to CONFIG_DYNAMIC_FTRACE
BUG: unable to handle kernel paging request in diFree C done 13 215d 486d 78d 9d574f985fe3 jfs: fix GPF in diFree
WARNING: suspicious RCU usage in inet_twsk_purge 10 201d 303d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
net-next test error: WARNING in __nf_unregister_net_hook 42 265d 275d 78d 43016d02cf6e netfilter: arptables: use pernet ops struct during unregister
KMSAN: uninit-value in asix_mdio_read C 915 179d 843d 78d a786e3195d6a net: asix: fix uninit value bugs
WARNING: suspicious RCU usage in populate_vma_page_range 1 242d 242d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in kcm_sendmsg C done 7957 212d 234d 78d a47c397bb29f revert "net: kcm: fix memory leak in kcm_sendmsg"
WARNING in sk_stream_kill_queues (6) C 11376 78d 293d 78d 144748eb0c44 bpf, sockmap: Fix incorrect fwd_alloc accounting
linux-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb 5 281d 283d 78d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
WARNING: suspicious RCU usage in schedule_debug 1 271d 271d 78d 7072a355ba19 netfilter: nfnetlink: add a missing rcu_read_unlock()
BUG: MAX_LOCKDEP_CHAINS too low! (2) C error 84838 79d 555d 78d 5dc33592e955 lockdep: Allow tuning tracing capacity constants.
WARNING in input_register_device C error done 11 295d 447d 78d b4104180a2ef kobject_uevent: remove warning in init_uevent_argv()
KASAN: use-after-free Read in disk_part_iter_next (2) C done 327 301d 319d 78d e82fc7855749 block: don't create too many partitions
memory leak in cfserl_create C 13 797d 967d 78d b53558a950a8 net: caif: fix memory leak in caif_device_notify
memory leak in cinergyt2_fe_attach C 3 383d 441d 78d 9ad1efee086e media: dvd_usb: memory leak in cinergyt2_fe_attach
UBSAN: shift-out-of-bounds in red_adaptative_timer (2) 28 308d 323d 78d e323d865b361 net: sched: validate stab values
upstream test error: WARNING in corrupted 1 265d 265d 78d 43016d02cf6e netfilter: arptables: use pernet ops struct during unregister
memory leak in radix_tree_insert C 1 303d 303d 78d 8a03dd925786 net: qrtr: Fix memory leak on qrtr_tx_wait failure
KASAN: use-after-free Read in nfc_llcp_put_ssap syz done 4 264d 271d 78d c61760e6940d net/nfc: fix use-after-free llcp_sock_bind/connect
BUG: unable to handle kernel paging request in vga16fb_imageblit (2) C done 27 261d 629d 78d ffb324e6f874 tty: vt: always invoke vc->vc_sw->con_resize callback
WARNING: suspicious RCU usage in kernfs_iop_get_link 1 234d 230d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: suspicious RCU usage in tcp_bpf_update_proto C done 539 276d 297d 78d 51e0158a5432 skmsg: Pass psock pointer to ->psock_update_sk_prot()
UBSAN: array-index-out-of-bounds in udf_statfs C error error 3 186d 272d 78d 781d2a9a2fc7 udf: Check LVID earlier
linux-next boot error: WARNING in kvm_wait 9 313d 324d 78d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
WARNING: suspicious RCU usage in bpf_get_current_cgroup_id C done 764 149d 187d 78d 2d3a1e3615c5 bpf: Add rcu_read_lock in bpf_get_current_[ancestor_]cgroup_id() helpers
general protection fault in __io_file_supports_nowait C done done 13 143d 149d 78d c6d3d9cbd659 io_uring: fix queueing half-created requests
possible deadlock in pipe_lock (5) C done 5 187d 187d 78d 9b91b6b019fd ovl: fix deadlock in splice write
upstream test error: WARNING in kvm_wait 2 320d 321d 78d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
upstream boot error: KASAN: invalid-access Read in tomoyo_memory_ok 3 310d 323d 78d cf10bd4c4aff kasan: fix per-page tags for non-page_alloc pages
INFO: task hung in usb_remote_wakeup (2) syz inconclusive done 9 160d 359d 78d 363eaa3a450a usbip: synchronize event handler with sysfs code paths
WARNING: suspicious RCU usage in bond_ipsec_add_sa (2) C done 540 206d 493d 78d b648eba4c69e bonding: fix suspicious RCU usage in bond_ipsec_add_sa()
KCSAN: data-race in __ip4_datagram_connect / skb_set_owner_w (2) 1 243d 231d 78d b71eaed8c04f inet: annotate date races around sk->sk_txhash
WARNING: suspicious RCU usage in __copy_msghdr_from_user 1 244d 244d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KASAN: use-after-free Read in bdev_evict_inode C unreliable 1305 163d 166d 78d 889c05cc5834 block: ensure the bdi is freed after inode_detach_wb
WARNING in pvr2_i2c_core_done C error 5780 200d 855d 78d f8194e5e63fd media: pvrusb2: fix warning in pvr2_i2c_core_done
BUG: sleeping function called from invalid context in __fdget_pos 4 151d 213d 78d 821720b9f34e crypto: x86/aes-ni - add missing error checks in XTS code
linux-next test error: unregister_netdevice: waiting for DEV to become free 2 302d 302d 78d 0d7a7b2014b1 ipv6: remove extra dev_hold() for fallback tunnels
upstream test error: BUG: sleeping function called from invalid context in stack_depot_save 4 198d 210d 78d 187ad460b841 mm/page_alloc: avoid page allocator recursion with pagesets.lock held
general protection fault in nl802154_add_llsec_key C inconclusive 340 291d 346d 78d 20d5fe2d7103 net: ieee802154: fix nl802154 add llsec key
INFO: task hung in io_uring_cancel_generic C unreliable 151 78d 200d 78d 1b48773f9fd0 io_uring: fix io_drain_req()
BUG: MAX_STACK_TRACE_ENTRIES too low! (3) 2 281d 282d 78d 5dc33592e955 lockdep: Allow tuning tracing capacity constants.
divide error in fill_meta_index C inconclusive 1 268d 267d 78d d6e621de1fce squashfs: fix divide error in calculate_skip()
memory leak in copy_process (2) C 2 319d 318d 78d f60a85cad677 bpf: Fix umd memory leak in copy_process()
WARNING in handle_mm_fault 5 318d 321d 78d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
WARNING in __i2c_transfer C done 2847 79d 321d 78d 71581562ee36 i2c: bail out early when RDWR parameters are wrong
KASAN: slab-out-of-bounds Read in qrtr_endpoint_post (2) C done 41 180d 545d 78d ad9d24c9429e net: qrtr: fix OOB Read in qrtr_endpoint_post
BUG: sleeping function called from invalid context in __ipv6_dev_mc_dec C done 21 212d 269d 78d a100243d95a6 rtnetlink: avoid RCU read lock when holding RTNL
INFO: task hung in del_gendisk C done 5 167d 200d 78d 68c9417b193d nbd: do del_gendisk() asynchronously for NBD_DESTROY_ON_DISCONNECT
INFO: trying to register non-static key in skb_dequeue C error 28951 264d 545d 78d be8597239379 Bluetooth: initialize skb_queue_head at l2cap_chan_create()
net-next test error: unregister_netdevice: waiting for DEV to become free 18 302d 303d 78d 0d7a7b2014b1 ipv6: remove extra dev_hold() for fallback tunnels
WARNING: suspicious RCU usage in getname_flags 2 207d 298d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: refcount bug in in_dev_finish_destroy C unreliable 463 79d 306d 78d 0d7a7b2014b1 ipv6: remove extra dev_hold() for fallback tunnels
KASAN: use-after-free Read in j1939_xtp_rx_dat_one (2) 3 192d 255d 78d 2030043e616c can: j1939: fix Use-after-Free, hold skb ref while in use
WARNING: suspicious RCU usage in vm_mmap_pgoff 1 244d 244d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KASAN: use-after-free Read in __d_alloc (2) C unreliable 6774 120d 164d 78d 0766ec82e5fb namei: Fix use after free in kern_path_locked
WARNING: suspicious RCU usage in get_timespec64 3 249d 298d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KMSAN: uninit-value in validate_beacon_head C 284 197d 425d 78d 9a6847ba1747 nl80211: fix beacon head validation
WARNING in macvlan_process_broadcast 32053 78d 323d 78d dd4fa1dae9f4 macvlan: macvlan_count_rx() needs to be aware of preemption
WARNING: suspicious RCU usage in vxlan_xmit C error 1 220d 220d 78d 85e8b032d6eb vxlan: add missing rcu_read_lock() in neigh_reduce()
general protection fault in udmabuf_create C done 2 173d 170d 78d b9770b0b6eac udmabuf: fix general protection fault in udmabuf_create
memory leak in new_inode C 5 125d 433d 78d a8867f4e3809 ext4: fix memory leak in ext4_mb_init_backend on error path.
linux-next boot error: WARNING: refcount bug in fib_create_info 3 177d 177d 78d 28814cd18cd7 ipv4: Fix refcount warning for new fib_info
WARNING: zero-size vmalloc in dvb_dmx_init C 62 201d 264d 78d c680ed46e418 media: dvb-usb: fix wrong definition
memory leak in ext4_multi_mount_protect C 12 222d 399d 78d 618f003199c6 ext4: fix memory leak in ext4_fill_super
WARNING in tracepoint_add_func C done 20635 194d 578d 78d 9913d5745bd7 tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing
UBSAN: shift-out-of-bounds in nft_hash_estimate C done 3 267d 267d 78d a54754ec9891 netfilter: nftables: avoid overflows in nft_hash_buckets()
BUG: sleeping function called from invalid context in munlock_vma_pages_range 1 200d 196d 78d 023e1a8dd502 mm/rmap: fix new bug: premature return from page_mlock_one()
KASAN: use-after-free Read in blk_mq_exit_sched C done 9 218d 232d 78d f0c1c4d2864e blk-mq: fix use-after-free in blk_mq_exit_sched
divide error in do_journal_end (2) C inconclusive 2 261d 260d 78d a149127be52f reiserfs: add check for invalid 1st journal block
BUG: MAX_LOCKDEP_ENTRIES too low! C done 179076 264d 955d 78d 5dc33592e955 lockdep: Allow tuning tracing capacity constants.
BUG: corrupted list in kobject_add_internal (3) C inconclusive 3 114d 219d 78d 92fe24a7db75 Bluetooth: skip invalid hci_sync_conn_complete_evt
WARNING in nbd_dev_add C inconclusive 131 80d 339d 78d b1a811633f73 block: nbd: add sanity check for first_minor
possible deadlock in del_gendisk C done 158215 141d 289d 78d 990e78116d38 block: loop: fix deadlock between open and remove
possible deadlock in br_ioctl_call C unreliable 4161 169d 179d 78d 893b19587534 net: bridge: fix ioctl locking
WARNING in __vmalloc_node_range C 7 265d 266d 78d c680ed46e418 media: dvb-usb: fix wrong definition
WARNING: ODEBUG bug in ext4_fill_super (3) C done 392 81d 319d 78d 2a4ae3bcdf05 ext4: fix timer use-after-free on failed mount
linux-next test error: WARNING in __nf_unregister_net_hook 21 269d 271d 78d 43016d02cf6e netfilter: arptables: use pernet ops struct during unregister
BUG: sleeping function called from invalid context in _copy_to_iter C done 60 164d 171d 78d 876c14ad014d af_unix: fix holding spinlock in oob handling
possible deadlock in f_getown C done done 164 157d 486d 78d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
UBSAN: array-index-out-of-bounds in taprio_change 2 162d 170d 78d efe487fce306 fix array-index-out-of-bounds in taprio_change
memory leak in rds_send_probe C done 27 376d 919d 78d 49bfcbfd989a net: rds: fix memory leak in rds_recvmsg
general protection fault in blk_mq_run_hw_queues C unreliable 305 159d 206d 78d 16ad3db3b24c nbd: fix order of cleaning up the queue and freeing the tagset
INFO: task hung in fuse_launder_page C unreliable 1 171d 167d 78d 76224355db75 fuse: truncate pagecache on atomic_o_trunc
INFO: task hung in register_netdevice_notifier (2) syz done 10555 222d 827d 78d 8d0caedb7596 can: bcm/raw/isotp: use per module netdevice notifier
general protection fault in hwsim_set_edge_lqi C done 4 168d 220d 78d 0303b30375df ieee802154: hwsim: avoid possible crash in hwsim_del_edge_nl()
KCSAN: data-race in expire_timers / try_to_del_timer_sync 1029 172d 577d 78d bb7262b29547 timers: Move clearing of base::timer_running under base:: Lock
WARNING: suspicious RCU usage in kernfs_find_and_get_ns 1 226d 226d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: still has locks held in io_sq_thread C done 8689 290d 304d 78d 82734c5b1b24 io_uring: drop sqd lock before handling signals for SQPOLL
KASAN: use-after-free Write in nft_ct_tmpl_put_pcpu C done 3 173d 173d 78d e3245a7b7b34 netfilter: nft_ct: protect nft_ct_pcpu_template_refcnt with mutex
memory leak in tcindex_set_parms C 94 238d 723d 78d f5051bcece50 net: sched: fix memory leak in tcindex_partial_destroy_work
general protection fault in sock_from_file C inconclusive 78 143d 150d 78d c6d3d9cbd659 io_uring: fix queueing half-created requests
memory leak in h4_recv_buf C done 21 188d 948d 78d bb2853a6a421 tty: Fix data race between tiocsti() and flush_to_ldisc()
KCSAN: data-race in __skb_try_recv_datagram / sock_setsockopt 1 213d 213d 78d 0dbffbb5335a net: annotate data race around sk_ll_usec
WARNING in sta_info_alloc C done done 145 225d 478d 78d 0ee4d55534f8 mac80211: remove warning in ieee80211_get_sband()
possible deadlock in snd_hrtimer_callback C done 571 79d 187d 78d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
general protection fault in gfn_to_rmap (2) C done 1 234d 233d 78d 78fcb2c91adf KVM: x86: Immediately reset the MMU context when the SMM flag is cleared
UBSAN: shift-out-of-bounds in profile_init C unreliable 23 146d 197d 78d 2d186afd04d6 profiling: fix shift-out-of-bounds bugs
KASAN: use-after-free Read in hci_send_acl C done 2 332d 543d 78d 5c4c8c954409 Bluetooth: verify AMP hci_chan before amp_destroy
WARNING: ODEBUG bug in cancel_delayed_work C done 3384 95d 545d 78d 3a9d54b1947e Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default
KFENCE: use-after-free in kmem_cache_destroy 1 271d 269d 78d cad83c968c2e f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances
bpf build error (3) 15 135d 147d 78d ea7b4244b365 x86/setup: Explicitly include acpi.h
memory leak in usb_urb_init C 1 391d 387d 78d b7cd0da982e3 media: dvb-usb: fix memory leak in dvb_usb_adapter_init
general protection fault in crypto_destroy_tfm syz unreliable 57 292d 333d 78d 83681f2bebb3 crypto: api - check for ERR pointers in crypto_destroy_tfm()
possible deadlock in console_lock_spinning_enable C done 1693 78d 952d 78d c0070e1e6027 ttyprintk: Add TTY hangup callback.
memory leak in ip_vs_add_service C 1 252d 248d 78d 56e4ee82e850 ipvs: ignore IP_VS_SVC_F_HASHED flag when adding service
possible deadlock in io_sq_thread_finish C unreliable done 4 324d 326d 78d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
BUG: unable to handle kernel NULL pointer dereference in fbcon_cursor C done 21 304d 437d 78d 01faae5193d6 drivers: video: fbcon: fix NULL dereference in fbcon_cursor()
memory leak in nr_create C 250 190d 975d 78d 517a16b1a88b netrom: Decrease sock refcount when sock timers expire
general protection fault in ieee802154_llsec_parse_dev_addr C inconclusive 80 206d 336d 78d 88c17855ac42 net: ieee802154: forbid monitor for set llsec params
WARNING in smk_set_cipso (2) C inconclusive 24 212d 290d 78d 49ec114a6e62 smackfs: restrict bytes count in smk_set_cipso()
memory leak in atusb_probe C 71 295d 440d 78d 6b9fbe169551 drivers: net: fix memory leak in atusb_probe
WARNING: ODEBUG bug in net_dm_cmd_trace syz unreliable 2 329d 325d 78d 9398e9c0b1d4 drop_monitor: Perform cleanup upon probe registration failure
WARNING: suspicious RCU usage in __alloc_file 1 266d 266d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in nft_set_elem_expr_alloc C done 3 242d 239d 78d ad9f151e560b netfilter: nf_tables: initialize set before expression setup
net-next boot error: WARNING: refcount bug in fib_create_info 39 178d 177d 78d 28814cd18cd7 ipv4: Fix refcount warning for new fib_info
general protection fault in do_blk_trace_setup C done 25 154d 156d 78d 1d1cf156dc17 sg: pass the device name to blk_trace_setup
UBSAN: shift-out-of-bounds in gred_enqueue 1 316d 316d 78d e323d865b361 net: sched: validate stab values
WARNING in xfrm_alloc_compat (2) C done 47 294d 304d 78d ef19e111337f xfrm/compat: Cleanup WARN()s that can be user-triggered
possible deadlock in bd_register_pending_holders 3 85d 139d 78d dfbb3409b27f block: genhd: don't call blkdev_show() with major_names_lock held
KASAN: use-after-free Write in sctp_auth_shkey_hold C done 4 191d 199d 78d 58acd1009226 sctp: update active_key for asoc when old key is being replaced
KMSAN: uninit-value in tipc_nl_node_set_key 1 319d 319d 78d 0217ed2848e8 tipc: better validate user input in tipc_nl_retrieve_key()
UBSAN: shift-out-of-bounds in load_balance syz 2167 264d 368d 78d 39a2a6eb5c9b sched/fair: Fix shift-out-of-bounds in load_balance()
WARNING in io_rsrc_node_switch C done 174 264d 273d 78d 47b228ce6f66 io_uring: fix unchecked error in switch_start()
KASAN: use-after-free Read in firmware_fallback_sysfs C error 16514 161d 360d 78d 75d95e2e39b2 firmware_loader: fix use-after-free in firmware_fallback_sysfs
WARNING in tcindex_alloc_perfect_hash C inconclusive 349 208d 383d 78d 3f2db250099f net: sched: fix warning in tcindex_alloc_perfect_hash
KMSAN: uninit-value in caif_seqpkt_sendmsg C 2365 125d 542d 78d 991e634360f2 net: fix uninit-value in caif_seqpkt_sendmsg
KASAN: invalid-free in ieee80211_ibss_leave C inconclusive 1 323d 351d 78d 3bd801b14e0c mac80211: fix double free in ibss_leave
WARNING in io_wq_submit_work (2) C done done 52 138d 140d 78d 713b9825a4c4 io-wq: fix cancellation on create-worker failure
memory leak in prepare_creds (2) C 2 217d 312d 78d f60a85cad677 bpf: Fix umd memory leak in copy_process()
WARNING: suspicious RCU usage in __clear_user 1 247d 247d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KASAN: null-ptr-deref Write in io_uring_cancel_sqpoll 170 80d 335d 78d 6d042ffb598e io_uring: Check current->io_uring in io_uring_cancel_sqpoll
WARNING in cfg80211_inform_single_bss_frame_data C done 1 268d 360d 78d e298aa358f0c mac80211: fix skb length check in ieee80211_scan_rx()
memory leak in mrp_request_join C 215 219d 737d 78d 996af62167d0 net/802/mrp: fix memleak in mrp_request_join()
INFO: task hung in unregister_netdevice_notifier (3) syz error error 184 891d 1075d 78d 8d0caedb7596 can: bcm/raw/isotp: use per module netdevice notifier
KASAN: slab-out-of-bounds Write in decode_data C done error 7 629d 784d 78d 19d1532a1876 net: 6pack: fix slab-out-of-bounds in decode_data
net-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb 15 281d 285d 78d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
general protection fault in bond_ipsec_add_sa (2) 1 206d 206d 78d 105cd17a8660 bonding: fix null dereference in bond_ipsec_add_sa()
memory leak in tcp_cdg_init syz 6 243d 383d 78d be5d1b61a2ad tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
WARNING: suspicious RCU usage in get_signal 1 270d 266d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KASAN: use-after-free Read in drm_getunique syz inconclusive 2 240d 239d 78d b436acd1cf7f drm: Fix use-after-free read in drm_getunique()
WARNING in hsr_forward_skb C done done 1310 293d 1121d 78d 9d6803921a16 net: hsr: Reset MAC header for Tx path
WARNING: refcount bug in sk_psock_get C done 8 265d 293d 78d 8621436671f3 smc: disallow TCP_ULP in smc_setsockopt()
WARNING in close_fs_devices (3) C done 98 181d 425d 78d b2a616676839 btrfs: fix rw device counting in __btrfs_free_extra_devids
KASAN: use-after-free Read in check_all_holdout_tasks_trace syz done 4 181d 251d 78d 1d10bf55d85d rcu-tasks: Don't delete holdouts within trc_inspect_reader()
kernel BUG in assertfail 1 247d 241d 78d aefd7f706556 btrfs: promote debugging asserts to full-fledged checks in validate_super
net-next boot error: KASAN: use-after-free Read in page_to_skb 11 281d 285d 78d af39c8f72301 virtio-net: fix use-after-free in page_to_skb()
BUG: unable to handle kernel paging request in nl802154_del_llsec_key C inconclusive 235 291d 343d 78d 37feaaf5ceb2 net: ieee802154: fix nl802154 del llsec key
WARNING: refcount bug in ipip6_tunnel_uninit C done 199 301d 306d 78d 6289a98f0817 sit: proper dev_{hold|put} in ndo_[un]init methods
WARNING: suspicious RCU usage in tomoyo_update_domain 1 219d 219d 78d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: refcount bug in register_netdevice C unreliable 97 299d 306d 78d 7f700334be9a ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
possible deadlock in sctp_addr_wq_timeout_handler C done 8 271d 272d 78d 01bfe5e8e428 Revert "net/sctp: fix race condition in sctp_destroy_sock"
INFO: task hung in hci_req_sync C inconclusive 1 172d 168d 78d f41a4b2b5eb7 Bluetooth: add timeout sanity check to hci_inquiry
WARNING: refcount bug in ip6erspan_tunnel_uninit C error 11 303d 305d 78d 7f700334be9a ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
UBSAN: shift-out-of-bounds in xfrm_set_default C unreliable 79 174d 184d 78d 5d8dbb7fb82b net: xfrm: fix shift-out-of-bounce
possible deadlock in cfg80211_netdev_notifier_call (2) 2 251d 262d 78d d5befb224edb mac80211: fix deadlock in AP/VLAN handling
WARNING in fuse_get_tree C unreliable 22 174d 180d 78d 5d5b74aa9c76 fuse: allow sharing existing sb
INFO: task hung in hub_port_init C done 15888 79d 478d 78d 258c81b341c8 usbip: give back URBs for unsent unlink requests during cleanup
general protection fault in wb_timer_fn C done 60 156d 166d 78d d152c682f03c block: add an explicit ->disk backpointer to the request_queue
memory leak in con_do_clear_unimap C 13 280d 339d 78d 211b4d42b70f tty: fix memory leak in vc_deallocate
KMSAN: kernel-infoleak in _copy_to_iter (5) C 23883 188d 624d 78d 08c27f3322fe batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field
WARNING: locking bug in l2tp_xmit_skb 1 268d 268d 78d 69e16d01d1de net: fix a concurrency bug in l2tp_tunnel_register()
KMSAN: uninit-value in __dev_mc_add C 213 1023d 1219d 78d cca8ea3b05c9 net: tun: set tun->dev->addr_len during TUNSETLINK processing
KASAN: vmalloc-out-of-bounds Write in imageblit C 104 93d 386d 78d 3b0c40612471 tty: Fix out-of-bound vmalloc access in imageblit
WARNING in init_timer_key C done 2 249d 355d 78d a64b6a25dd9f cfg80211: call cfg80211_leave_ocb when switching away from OCB
KASAN: stack-out-of-bounds Read in iov_iter_revert C error 14 151d 168d 78d 89c2b3b74918 io_uring: reexpand under-reexpanded iters
WARNING in futex_requeue syz 4 143d 148d 78d 4f07ec0d76f2 futex: Prevent inconsistent state and exit race
WARNING in internal_create_group C inconclusive 20 143d 197d 78d b1a811633f73 block: nbd: add sanity check for first_minor
UBSAN: shift-out-of-bounds in vhci_hub_control (2) C unreliable 5 300d 309d 78d 1cc5ed25bdad usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control()
WARNING in __static_key_slow_dec C unreliable 19 142d 146d 78d 6d5f1ef83868 bonding: Fix negative jump label count on nested bonding
memory leak in kcm_sendmsg C 2 574d 714d 78d c47cc304990a net: kcm: fix memory leak in kcm_sendmsg
kernel BUG in remove_inode_hugepages C unreliable 3 163d 163d 78d c7b1850dfb41 hugetlb: don't pass page cache pages to restore_reserve_on_error
WARNING in io_wq_put C unreliable 3 312d 324d 78d f5d2d23bf0d9 io-wq: fix race around pending work on teardown
memory leak in v4l2_ctrl_handler_init_class C 12 283d 336d 78d 9c39be40c015 media: drivers/media/usb: fix memory leak in zr364xx_probe
KMSAN: uninit-value in ax88179_get_mac_addr C 149 197d 461d 78d bd78980be1a6 net: usb: ax88179_178a: initialize local variables before use
WARNING in io_uring_setup (2) C done 40 264d 273d 78d 47b228ce6f66 io_uring: fix unchecked error in switch_start()
general protection fault in drm_atomic_set_crtc_for_connector C unreliable 586 436d 433d 104d 0003b687ee6d drm: fix oops in drm_atomic_set_crtc_for_connector
UBSAN: shift-out-of-bounds in qdisc_get_rtab C unreliable done 521 372d 416d 226d e4bedf48aaa5 net_sched: reject silly cell_log in qdisc_get_rtab()
KASAN: out-of-bounds Read in kfence_guarded_free C error 20 389d 400d 230d 2b8305260fb3 kfence, kasan: make KFENCE compatible with KASAN
INFO: task can't die in d_alloc_parallel 2 388d 404d 241d 0ce20dd84089 mm: add Kernel Electric-Fence infrastructure
KASAN: global-out-of-bounds Read in netlink_policy_dump_add_policy (2) C done 2 353d 353d 246d 33b347503f01 vdpa: Define vdpa mgmt device, ops and a netlink interface
KASAN: use-after-free Read in __cpuhp_state_remove_instance C unreliable done 2726 313d 335d 283d 470ec4ed8c91 io-wq: fix double put of 'wq' in error path
KASAN: use-after-free Read in idr_for_each (2) C error done 86 317d 479d 283d 61cf93700fe6 io_uring: Convert personality_idr to XArray
KASAN: vmalloc-out-of-bounds Read in bpf_trace_run2 C done done 5 335d 493d 289d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
general protection fault in drm_client_buffer_vunmap C unreliable done 247 321d 423d 289d 874a52f9b693 drm/fb-helper: only unmap if buffer not null
BUG: unable to handle kernel paging request in bpf_trace_run2 C done done 10 332d 493d 289d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
INFO: rcu detected stall in smp_call_function C 107 292d 547d 289d c583bcb8f5ed rcu: Don't invoke try_invoke_on_locked_down_task() with irqs disabled 1b7af295541d sched/core: Allow try_invoke_on_locked_down_task() with irqs disabled
INFO: task hung in io_uring_cancel_task_requests C 305 317d 351d 293d 34343786ecc5 io_uring: unpark SQPOLL thread for cancelation
general protection fault in usb_audio_probe C done 360 323d 325d 293d 30dea07180de ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe
UBSAN: shift-out-of-bounds in erofs_fc_fill_super C unreliable 11 343d 373d 293d bde545295b71 erofs: fix shift-out-of-bounds of blkszbits
net-next build error (3) 7 356d 353d 293d 9c97921a51a0 net: fix building errors on powerpc when CONFIG_RETPOLINE is not set
KASAN: use-after-free Read in tctx_task_work 2 336d 333d 293d 2c32395d8111 io_uring: fix __tctx_task_work() ctx race
INFO: task hung in addrconf_verify_work (4) C done 132 341d 428d 293d d349f9976868 net_sched: fix RTNL deadlock again caused by request_module()
possible deadlock in cfg80211_netdev_notifier_call syz done 13 294d 360d 293d 40c575d1ec71 cfg80211: fix netdev registration deadlock
memory leak in qrtr_tun_open C 4 384d 428d 293d fc0494ead639 net: qrtr: Fix memory leak in qrtr_tun_open
UBSAN: shift-out-of-bounds in mceusb_dev_printdata C error 331 339d 407d 293d 9dec0f48a75e media: mceusb: sanity check for prescaler value
KMSAN: uninit-value in bpf_iter_prog_supported 4479 293d 354d 293d 17d8beda277a bpf: Fix an unitialized value in bpf_iter
KASAN: invalid-free in io_req_caches_free 5 336d 339d 293d 8e5c66c485a8 io_uring: clear request count when freeing caches
memory leak in v2_read_file_info C 71 342d 401d 293d a4db1072e1a3 quota: Fix memory leak when handling corrupted quota file
KASAN: null-ptr-deref Read in tcf_idrinfo_destroy C 115 296d 486d 293d 396d7f23adf9 net: sched: fix police ext initialization
general protection fault in j1939_netdev_notify (2) C done 19 345d 403d 293d 4e096a18867a net: introduce CAN specific pointer in the struct net_device
INFO: task hung in tcf_action_init_1 C done 30 352d 486d 293d d349f9976868 net_sched: fix RTNL deadlock again caused by request_module()
general protection fault in kobject_cleanup C unreliable 72 323d 336d 293d a6112998ee45 gpio: fix NULL-deref-on-deregistration regression
KASAN: slab-out-of-bounds Read in skb_segment C error 311 371d 375d 293d 00b229f762b0 net: fix GSO for SG-enabled devices
upstream test error: INFO: trying to register non-static key in nsim_get_stats64 381 324d 366d 293d 863a42b289c2 netdevsim: init u64 stats for 32bit hardware
UBSAN: shift-out-of-bounds in snto32 C error 58 337d 409d 293d a0312af1f94d HID: core: detect and skip invalid inputs to snto32()
UBSAN: shift-out-of-bounds in exfat_fill_super C error 3 349d 367d 293d 78c276f5495a exfat: fix shift-out-of-bounds in exfat_fill_super()
INFO: task hung in io_sq_thread_park C unreliable 263 328d 333d 293d 3ebba796fa25 io_uring: ensure that SQPOLL thread is started for exit
KCSAN: data-race in tomoyo_domain_quota_is_ok / tomoyo_merge_path_acl (4) 12 349d 416d 293d 5797e861e402 tomoyo: ignore data race while checking quota
INFO: task hung in walk_component (2) 31 321d 321d 293d 775c5033a0d1 fuse: fix live lock in fuse_iget()
KCSAN: data-race in bpf_lru_pop_free / bpf_lru_push_free 237 341d 528d 293d 6df8fb83301d bpf_lru_list: Read double-checked variable once without lock
KASAN: use-after-free Read in ntfs_iget C error error 1 430d 426d 293d 4dfe6bd94959 ntfs: check for valid standard information attribute
general protection fault in kvm_hv_irq_routing_update C done 33 329d 335d 293d 919f4ebc5987 KVM: x86: hyper-v: Fix Hyper-V context null-ptr-deref
WARNING in memdup_user_nul C inconclusive 2 378d 378d 293d 7ef4c19d245f smackfs: restrict bytes count in smackfs write functions
memory leak in io_submit_sqes (2) C 1 331d 330d 293d f01272541d2c io-wq: ensure all pending work is canceled on exit
INFO: task can't die in connmark_exit_net syz error 1 415d 411d 293d d349f9976868 net_sched: fix RTNL deadlock again caused by request_module()
memory leak in dlfb_usb_probe C 3 406d 409d 293d 5c0e4110f751 udlfb: Fix memory leak in dlfb_usb_probe
INFO: task can't die in iget5_locked 7 337d 361d 293d 775c5033a0d1 fuse: fix live lock in fuse_iget()
UBSAN: shift-out-of-bounds in std_validate C unreliable 2 373d 373d 293d 048c96e28674 media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate
memory leak in zr364xx_probe C 6 347d 400d 293d ea354b6ddd6f media: zr364xx: fix memory leaks in probe()
linux-next test error: possible deadlock in cfg80211_netdev_notifier_call 6 365d 365d 293d 38ec7c6b6bd6 virt_wifi: fix deadlock on RTNL
KASAN: use-after-free Read in usb_audio_disconnect C done 15 323d 324d 293d c5aa956eaeb0 ALSA: usb-audio: fix use after free in usb_audio_disconnect
WARNING in pstore_kill_sb 1 352d 348d 293d 9c7d83ae6ba6 pstore: Fix warning in pstore_kill_sb()
UBSAN: shift-out-of-bounds in chkSuper C unreliable 28 341d 407d 293d 3bef198f1b17 JFS: more checks for invalid superblock
KCSAN: data-race in __bpf_lru_list_rotate / bpf_lru_push_free (2) 32 347d 416d 293d 6df8fb83301d bpf_lru_list: Read double-checked variable once without lock
KASAN: vmalloc-out-of-bounds Read in bpf_trace_run3 C done 6 349d 451d 293d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
UBSAN: shift-out-of-bounds in mceusb_dev_recv C 13 339d 404d 293d 1b43bad31fb0 media: mceusb: Fix potential out-of-bounds shift
memory leak in video_usercopy C 19 341d 404d 293d fb18802a338b media: v4l: ioctl: Fix memory leak in video_usercopy
BUG: sleeping function called from invalid context in rxe_alloc_nl C done 475 359d 373d 293d c4369575b2bc RDMA/rxe: Fix bug in rxe_alloc()
WARNING in __alloc_skb C error 24 324d 336d 293d 093b036aa94e net/qrtr: fix __netdev_alloc_skb call
WARNING in iov_iter_revert (2) C done 9 344d 345d 293d 3342ff2698e9 tty: protect tty_write from odd low-level tty disciplines
WARNING in cfg80211_change_iface C inconclusive 4 359d 364d 293d bae173563cbf wext: call cfg80211_change_iface() with wiphy lock held
general protection fault in tomoyo_socket_sendmsg_permission 17 350d 440d 293d 9380afd6df70 usbip: fix stub_dev usbip_sockfd_store() races leading to gpf 718ad9693e36 usbip: fix vhci_hcd attach_store() races leading to gpf 46613c9dfa96 usbip: fix vudc usbip_sockfd_store races leading to gpf
memory leak in edge_startup C 1 336d 332d 293d cfdc67acc785 USB: serial: io_edgeport: fix memory leak in edge_startup
unexpected kernel reboot (3) C error error 21132 293d 1294d 293d c8e2fe13d1d1 x86/perf: Use RET0 as default for guest_get_msrs to handle "no PMU" case
WARNING in qp_broker_alloc C inconclusive 24 338d 373d 293d 2fd10bcf0310 drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue
WARNING in sk_stream_kill_queues (5) C done 4684 293d 423d 293d 097b9146c0e2 net: fix up truesize of cloned skb in skb_prepare_for_shift()
BUG: unable to handle kernel paging request in bpf_trace_run3 C done 40 340d 462d 293d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
KASAN: null-ptr-deref Write in event_handler C done 2869 332d 479d 293d 9380afd6df70 usbip: fix stub_dev usbip_sockfd_store() races leading to gpf 718ad9693e36 usbip: fix vhci_hcd attach_store() races leading to gpf 46613c9dfa96 usbip: fix vudc usbip_sockfd_store races leading to gpf
KASAN: use-after-free Read in nbd_genl_connect C inconclusive 16 324d 339d 293d c9a2f90f4d6b nbd: handle device refs for DESTROY_ON_DISCONNECT properly
WARNING in cfg80211_dev_rename C inconclusive 22 358d 364d 293d 0391a45c8007 nl80211: call cfg80211_dev_rename() under RTNL
general protection fault in gfs2_withdraw C done 81 340d 489d 293d d5bf630f355d gfs2: bypass signal_our_withdraw if no journal
KASAN: null-ptr-deref Write in amp_read_loc_assoc_final_data C done 185 344d 545d 293d e8bd76ede155 Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
possible deadlock in io_poll_double_wake (2) C error error 431 293d 485d 293d 1c3b3e6527e5 io_uring: ignore double poll add on the same waitqueue head
WARNING in _cfg80211_unregister_wdev C inconclusive 48 358d 364d 293d 776a39b8196d cfg80211: call cfg80211_destroy_ifaces() with wiphy lock held
INFO: task can't die in io_sq_thread_finish syz 137 304d 336d 293d eb85890b29e4 io_uring: ensure SQPOLL startup is triggered before error shutdown
WARNING in dst_release syz done 2 345d 344d 293d e0be4931f3fe mptcp: reset last_snd on subflow close
BUG: sleeping function called from invalid context in mm_access C done 684 377d 380d 293d 38e891849003 kbuild: lto: fix module versioning
KASAN: use-after-free Read in skb_segment C error 55 371d 375d 293d 00b229f762b0 net: fix GSO for SG-enabled devices
inconsistent lock state in io_dismantle_req C 2 360d 360d 293d 9ae1f8dd372e io_uring: fix inconsistent lock state
BUG: unable to handle kernel paging request in __kvm_mmu_prepare_zap_page syz error 2 1056d 1067d 314d 47c42e6b4192 KVM: x86: fix handling of role.cr4_pae and rename it to 'gpte_size'
kernel BUG in memory_bm_free 72 358d 358d 318d 91cb2c8b072e arm64: Do not pass tagged addresses to __is_lm_address()
KASAN: slab-out-of-bounds Read in squashfs_get_id C error done 77 352d 489d 321d e812cbbbbbb1 squashfs: avoid out of bounds writes in decompressors
UBSAN: shift-out-of-bounds in tcf_police_init C unreliable 8 373d 409d 322d e4bedf48aaa5 net_sched: reject silly cell_log in qdisc_get_rtab()
UBSAN: shift-out-of-bounds in est_timer C unreliable 73 332d 406d 322d dd5e073381f2 net_sched: gen_estimator: support large ewma log
memory leak in xskq_create C 7 389d 410d 323d 8bee68338408 xsk: Fix memory leak for failed bind
BUG: sleeping function called from invalid context in corrupted syz done 18 420d 444d 323d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
WARNING in md_ioctl C done error 684 407d 1368d 323d c731b84b51bf md: fix a warning caused by a race between concurrent md_ioctl()s
BUG: unable to handle kernel paging request in htab_map_alloc (2) C unreliable 8 410d 419d 323d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
general protection fault in io_sqe_files_unregister 2 385d 383d 323d 3e2224c5867f io_uring: Fix return value from alloc_fixed_file_ref_node
UBSAN: shift-out-of-bounds in __detect_linklayer C unreliable done 31 372d 378d 323d e4bedf48aaa5 net_sched: reject silly cell_log in qdisc_get_rtab()
BUG: receive list entry not found for dev vxcan1, id 003, mask C00007FF C unreliable 2 428d 428d 323d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
UBSAN: shift-out-of-bounds in tcindex_set_parms C unreliable done 45 372d 407d 323d bcd0cf19ef82 net_sched: avoid shift-out-of-bounds in tcindex_set_parms()
kernel BUG at mm/page-writeback.c:LINE! 1 393d 389d 323d c2407cf7d22d mm: make wait_on_page_writeback() wait for multiple pending writebacks
WARNING in io_uring_flush C unreliable 10 367d 377d 323d 4325cb498cb7 io_uring: fix uring_flush in exit_files() warning
general protection fault in rose_send_frame C done done 664 433d 1113d 323d 3b3fd068c56e rose: Fix Null pointer dereference in rose_send_frame()
general protection fault in taprio_dequeue_soft C done 2 408d 408d 323d 44d4775ca518 net/sched: sch_taprio: reset child qdiscs before freeing them
BUG: unable to handle kernel paging request in bpf_lru_populate C done 12 410d 416d 323d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
bpf test error: BUG: sleeping function called from invalid context in sta_info_move_state 6 433d 439d 323d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
KASAN: slab-out-of-bounds Read in hci_le_meta_evt C error error 45 421d 542d 323d f7e0e8b2f1b0 Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
KASAN: null-ptr-deref Write in rhashtable_free_and_destroy 11 343d 420d 323d 905b2032fa42 mac80211: mesh: fix mesh_pathtbl_init() error path
KASAN: use-after-free Read in disk_part_iter_next C unreliable 243 323d 412d 323d aebf5db91705 block: fix use-after-free in disk_part_iter_next
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected (2) C done 640 387d 505d 323d 8d1ddb5e7937 fcntl: Fix potential deadlock in send_sig{io, urg}()
kernel BUG at net/core/dev.c:NUM! C done 35 378d 379d 323d 47e4bb147a96 net: sit: unregister_netdevice on newlink's error path
KASAN: use-after-free Read in search_by_entry_key C done 3 472d 476d 323d d24396c5290b reiserfs: add check for an invalid ih_entry_count
KCSAN: data-race in snd_rawmidi_transmit / snd_rawmidi_write 232 357d 532d 323d 88a06d6fd6b3 ALSA: rawmidi: Access runtime->avail always in spinlock
UBSAN: shift-out-of-bounds in f2fs_fill_super C 4 415d 414d 323d e584bbe82122 f2fs: fix shift-out-of-bounds in sanity_check_raw_super()
KASAN: global-out-of-bounds Read in smc_nl_get_sys_info C error 27 376d 403d 323d 25fe2c9c4cd2 smc: fix out of bound access in smc_nl_get_sys_info()
KASAN: use-after-free Read in btrfs_scan_one_device C error 70 428d 494d 323d 0697d9a61099 btrfs: don't access possibly stale fs_info data for printing duplicate device
memory leak in prepare_creds C 10 343d 518d 323d f26c08b444df io_uring: fix file leak on error path of io ctx creation
WARNING in percpu_ref_kill_and_confirm (2) C done 71 399d 407d 323d 9faadcc8abe4 io_uring: fix double io_uring free
WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anywa C unreliable 1 420d 416d 323d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
general protection fault in ieee80211_subif_start_xmit C unreliable 29 363d 430d 323d 054c9939b480 mac80211: pause TX while changing interface type
WARNING in rds_rdma_extra_size C done 165 358d 383d 323d a11148e6fcce net/rds: restrict iovecs length for RDS_CMSG_RDMA_ARGS
KASAN: use-after-free Read in decode_session6 C done 152 370d 577d 323d 0356010d825e sctp: bring inet(6)_skb_parm back to sctp_input_cb
WARNING: filesystem loop2 was created with 512 inodes, the real maximum is 511, mounting anyway 2 437d 432d 323d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
divide error in __tcp_select_window C done 1119 427d 432d 323d fd8976790a6c mptcp: be careful on MPTCP-level ack.
WARNING: suspicious RCU usage in kernfs_iop_permission C done 1 360d 360d 323d b854cc659dcb ovl: avoid deadlock on directory ioctl
KMSAN: uninit-value in INET_ECN_decapsulate 3 390d 423d 323d 4179b00c04d1 geneve: pull IP header before ECN decapsulation
WARNING in io_ring_ctx_wait_and_kill C done 9 378d 379d 323d 06585c497b55 io_uring: do sqo disable on install_fd error
WARNING in mc1NUM_get_time 13 354d 356d 323d ebb22a059436 rtc: mc146818: Dont test for bit 0-5 in Register D
INFO: task hung in lock_sock_nested (4) C done 6 375d 422d 323d 05e3ecea4a63 mptcp: avoid potential infinite loop in mptcp_recvmsg()
UBSAN: shift-out-of-bounds in choke_enqueue C inconclusive 3853 323d 416d 323d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
WARNING: suspicious RCU usage in get_wiphy_regdom C done 5031 375d 407d 323d 51d62f2f2c50 cfg80211: Save the regulatory domain with a lock
WARNING: suspicious RCU usage in tcp_disconnect C done 25 377d 379d 323d 13a9499e8333 mptcp: fix locking in mptcp_disconnect()
WARNING in spi_register_controller C 1848 407d 1021d 323d 9c60cc797cf7 media: msi2500: assign SPI bus number dynamically
KMSAN: uninit-value in __nla_validate_parse (2) C 2 385d 381d 323d c96adff95619 cls_flower: call nla_ok() before nla_next()
INFO: task hung in __io_uring_files_cancel C done 30 365d 432d 323d bee749b187ac io_uring: fix files cancellation
general protection fault in xsk_recvmsg C done unreliable 1800 408d 378d 323d 3546b9b8eced xsk: Validate socket state in xsk_recvmsg, prior touching socket members
KASAN: use-after-free Write in rtl_fw_do_work (2) 4 408d 414d 323d 4dfde294b979 rtlwifi: rise completion at the last step of firmware callback
UBSAN: shift-out-of-bounds in sfq_init C unreliable 8 387d 400d 323d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
memory leak in h5_rx_pkt_start C 5 520d 864d 323d 70f259a3f427 Bluetooth: hci_h5: close serdev device and free hu in h5_close 855af2d74c87 Bluetooth: hci_h5: fix memory leak in h5_close
kernel BUG at lib/string.c:LINE! (6) C done 2 405d 401d 323d 6cb56218ad9e netfilter: xt_RATEEST: reject non-null terminated string from userspace
kernel BUG at include/linux/highmem.h:LINE! C error 32 427d 432d 323d 0060ef3b4e6d mm: support THPs in zero_user_segments
UBSAN: shift-out-of-bounds in dummy_hub_control C done 5 400d 398d 323d c318840fb2a4 USB: Gadget: dummy-hcd: Fix shift-out-of-bounds bug
KASAN: use-after-free Read in reiserfs_fill_super C error done 2 417d 416d 323d d24396c5290b reiserfs: add check for an invalid ih_entry_count
KASAN: vmalloc-out-of-bounds Write in pcpu_freelist_populate 6 412d 416d 323d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
BUG: unable to handle kernel NULL pointer dereference in kcsan_setup_watchpoint 128 454d 462d 323d 55a2346c7ac4 kcsan: Never set up watchpoints on NULL pointers
BUG: unable to handle kernel paging request in percpu_ref_exit C done 3 385d 383d 323d 3e2224c5867f io_uring: Fix return value from alloc_fixed_file_ref_node
KMSAN: uninit-value in gre_parse_header C 9283 351d 949d 323d 085c7c4e1c0e erspan: fix version 1 check in gre_parse_header()
UBSAN: shift-out-of-bounds in red_adaptative_timer C unreliable 260 324d 416d 323d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
KASAN: slab-out-of-bounds Write in xfrm_attr_cpy32 C done 106 413d 461d 323d d1949d045fd6 xfrm/compat: memset(0) 64-bit padding at right place
WARNING in squashfs_read_table C inconclusive 50 353d 382d 323d 506220d2ba21 squashfs: add more sanity checks in xattr id lookup
BUG: receive list entry not found for dev vcan0, id 002, mask C00007FF C unreliable 5 427d 428d 323d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
UBSAN: shift-out-of-bounds in parse_audio_format_i C error 19 408d 414d 323d 175b8d89fe29 ALSA: pcm: oss: Fix potential out-of-bounds shift 43d5ca88dfcd ALSA: usb-audio: Fix potential out-of-bounds shift
INFO: task can't die in io_sq_thread_stop 1 442d 438d 323d 65b2b213484a io_uring: check kthread stopped flag when sq thread is unparked
UBSAN: array-index-out-of-bounds in dquot_resume C done 1 417d 416d 323d e51d68e76d60 fs: quota: fix array-index-out-of-bounds bug by passing correct argument to vfs_cleanup_quota_inode()
WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anyway C done 11 418d 486d 323d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
KASAN: use-after-free Read in htab_map_alloc C done 38 451d 453d 323d 8aaeed81fcb9 bpf: Fix error path in htab_map_alloc()
general protection fault in io_disable_sqo_submit C done 124 375d 379d 323d b4411616c26f io_uring: fix null-deref in io_disable_sqo_submit
BUG: unable to handle kernel paging request in htab_free_elems 1 417d 417d 323d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
KASAN: null-ptr-deref Write in bdi_put C done done 601 380d 414d 323d 2d2f6f1b4799 block: pre-initialize struct block_device in bdev_alloc_inode
general protection fault in rose_transmit_clear_request C done 5 452d 918d 323d 3b3fd068c56e rose: Fix Null pointer dereference in rose_send_frame()
kernel BUG at net/core/skbuff.c:LINE! (3) C done 4399 339d 1456d 323d afbc293add64 af_key: relax availability checks for skb size calculation
UBSAN: shift-out-of-bounds in __red_change C unreliable 24 326d 415d 323d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
KASAN: vmalloc-out-of-bounds Write in htab_map_alloc 6 410d 419d 323d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
KASAN: use-after-free Read in rxrpc_get_skb 1 371d 367d 323d 7b5eab57cac4 rxrpc: Fix clearance of Tx/Rx ring when releasing a call
WARNING in io_uring_cancel_task_requests syz done 69 360d 364d 323d 70b2c60d3797 io_uring: fix sqo ownership false positive warning
upstream test error: BUG: sleeping function called from invalid context in sta_info_move_state 53 434d 443d 323d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
kernel BUG at fs/notify/dnotify/dnotify.c:LINE! (2) C inconclusive 2 425d 430d 323d 5d069dbe8aaf fuse: fix bad inode
BUG: receive list entry not found for dev vcan0, id 001, mask C00007FF C unreliable 5 431d 430d 323d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
inconsistent lock state in io_file_data_ref_zero C done 7152 406d 430d 323d ac0648a56c1f io_uring: use bottom half safe lock for fixed file data
unregister_netdevice: waiting for DEV to become free (4) C done 50394 323d 526d 323d 5399d52233c4 rxrpc: Fix deadlock around release of dst cached on udp tunnel
WARNING in bpf_prog_test_run_raw_tp C done 36 372d 383d 323d 7ac6ad051150 bpf: Reject too big ctx_size_in for raw_tp test run
UBSAN: shift-out-of-bounds in gred_change C unreliable 5 337d 392d 323d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
BUG: corrupted list in io_file_get C done 3 364d 364d 323d f609cbb8911e io_uring: fix list corruption for splice file_get
linux-next test error: BUG: sleeping function called from invalid context in sta_info_move_state 3 444d 448d 323d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
WARNING in io_wq_submit_work 4 371d 375d 323d ca70f00bed6c io_uring: fix cancellation taking mutex while TASK_UNINTERRUPTIBLE
UBSAN: shift-out-of-bounds in option_probe C error 22 413d 414d 323d a251963f76fa USB: serial: option: add interface-number sanity check to flag handling
KMSAN: kernel-infoleak in vmci_host_unlocked_ioctl C 22 352d 436d 323d 31dcb6c30a26 misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells()
general protection fault in jffs2_parse_param C error done 1632 405d 493d 323d a61df3c413e4 jffs2: Fix NULL pointer dereference in rp_size fs option parsing
KMSAN: uninit-value in number (2) C 168 324d 703d 323d c8c958a58fc6 can: af_can: prevent potential access of uninitialized member in can_rcv() 9aa9379d8f86 can: af_can: prevent potential access of uninitialized member in canfd_rcv()
net test error: BUG: sleeping function called from invalid context in sta_info_move_state 4 440d 448d 323d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
possible deadlock in send_sigio (2) C done done 40 393d 505d 323d 8d1ddb5e7937 fcntl: Fix potential deadlock in send_sig{io, urg}()
kernel BUG at fs/reiserfs/prints.c:LINE! C done done 5 414d 493d 323d d24396c5290b reiserfs: add check for an invalid ih_entry_count
KASAN: vmalloc-out-of-bounds Write in lzo_uncompress C done 8 354d 379d 323d e812cbbbbbb1 squashfs: avoid out of bounds writes in decompressors
KASAN: slab-out-of-bounds Read in smc_nl_handle_smcr_dev 1 406d 402d 323d 995433b795ce net/smc: fix access to parent of an ib device
BUG: unable to handle kernel paging request in pcpu_freelist_populate C unreliable 42 408d 420d 323d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
UBSAN: array-index-out-of-bounds in alg_bind C error 700 408d 468d 323d 92eb6c3060eb crypto: af_alg - avoid undefined behavior accessing salg_name
net-next test error: BUG: sleeping function called from invalid context in sta_info_move_state 12 433d 443d 323d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
general protection fault in gfs2_ri_update 1 437d 433d 323d 778721510e84 gfs2: check for empty rgrp tree in gfs2_ri_update
memory leak in rxrpc_lookup_local C 1415 363d 828d 323d b8323f7288ab rxrpc: Fix memory leak in rxrpc_lookup_local
WARNING: suspicious RCU usage in wiphy_apply_custom_regulatory C done 28 407d 403d 323d 51d62f2f2c50 cfg80211: Save the regulatory domain with a lock
memory leak in generic_parse_monolithic C 11 414d 440d 323d 4cb682964706 afs: Fix memory leak when mounting with multiple source parameters
WARNING in mptcp_reset_timer C unreliable 1307 340d 435d 323d b680a214ec28 mptcp: update rtx timeout only if required.
KASAN: slab-out-of-bounds Write in record_print_text C done unreliable 17 364d 367d 323d 08d60e599954 printk: fix string termination for record_print_text()
WARNING in xfrm_alloc_compat C done 130 336d 458d 323d dbd7ae5154d5 xfrm/compat: Translate by copying XFRMA_UNSPEC attribute
UBSAN: shift-out-of-bounds in red_enqueue C unreliable 4906 323d 416d 323d bd1248f1ddbc net: sched: prevent invalid Scell_log shift count
KMSAN: kernel-infoleak in move_addr_to_user (4) C 59 330d 382d 323d b42b3a2744b3 can: isotp: isotp_getname(): fix kernel information leak
general protection fault in ext4_commit_super C done 4 402d 401d 323d c92dc856848f ext4: defer saving error info from atomic context
UBSAN: array-index-out-of-bounds in arch_uprobe_analyze_insn C done 604 417d 493d 323d 12cb908a11b2 x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes 84da009f06e6 x86/sev-es: Use new for_each_insn_prefix() macro to loop over prefixes bytes 4e9a5ae8df5b x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
BUG: unable to handle kernel NULL pointer dereference in call_rcu C done 85 393d 396d 323d 13384f6125ad kasan: fix null pointer dereference in kasan_record_aux_stack
KASAN: vmalloc-out-of-bounds Read in htab_free_elems C unreliable 7 416d 418d 323d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
BUG: receive list entry not found for dev vxcan1, id 002, mask C00007FF C unreliable 3 428d 430d 323d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
WARNING in rhashtable_free_and_destroy C error 3 420d 512d 323d 905b2032fa42 mac80211: mesh: fix mesh_pathtbl_init() error path
BUG: unable to handle kernel NULL pointer dereference in __lookup_slow C inconclusive done 3 346d 486d 323d d24396c5290b reiserfs: add check for an invalid ih_entry_count
BUG: sleeping function called from invalid context in sta_info_move_state C done 39248 418d 450d 323d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
UBSAN: shift-out-of-bounds in strset_parse_request C done 16 387d 410d 323d efb796f5571f ethtool: fix string set id check
KASAN: slab-out-of-bounds Read in btrfs_scan_one_device C done done 1 447d 443d 323d 0697d9a61099 btrfs: don't access possibly stale fs_info data for printing duplicate device
WARNING in qrtr_tun_write_iter C error 57 351d 382d 323d 2a80c1581237 net/qrtr: restrict user-controlled length in qrtr_tun_write_iter()
memory leak in hub_event C 7 344d 433d 323d e469d0b09a19 media: gspca: Fix memory leak in probe
KASAN: invalid-access Read in kmem_cache_destroy 2 360d 365d 323d 757fed1d0898 Revert "mm/slub: fix a memory leak in sysfs_slab_add()"
possible deadlock in send_sigurg (2) C done 25 410d 461d 323d 8d1ddb5e7937 fcntl: Fix potential deadlock in send_sig{io, urg}()
possible deadlock in ovl_dir_real_file 1 360d 360d 323d b854cc659dcb ovl: avoid deadlock on directory ioctl
WARNING in yurex_write/usb_submit_urb C error 78 382d 411d 323d 372c93131998 USB: yurex: fix control-URB timeout handling
kernel BUG at fs/ext4/inode.c:LINE! C done 9 393d 518d 323d 073861ed77b6 mm: fix VM_BUG_ON(PageTail) and BUG_ON(PageWriteback)
KCSAN: data-race in snd_rawmidi_poll / snd_rawmidi_proceed 378 408d 534d 323d 88a06d6fd6b3 ALSA: rawmidi: Access runtime->avail always in spinlock
UBSAN: shift-out-of-bounds in cbq_dequeue C unreliable 27 372d 416d 323d e4bedf48aaa5 net_sched: reject silly cell_log in qdisc_get_rtab()
bpf-next test error: BUG: sleeping function called from invalid context in sta_info_move_state 13 419d 438d 323d 7bc40aedf24d mac80211: free sta in sta_info_insert_finish() on errors
KASAN: use-after-free Write in __sco_sock_close C done done 10 445d 543d 323d 6dfccd13db2f Bluetooth: Fix null pointer dereference in hci_event_packet()
BUG: unable to handle kernel paging request in dqput C done 7 418d 488d 323d 11c514a99bb9 quota: Sanity-check quota file headers on load
KMSAN: uninit-value in snd_seq_oss_synth_make_info (2) 1 382d 377d 323d 217bfbb8b0bf ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info()
UBSAN: shift-out-of-bounds in intel_pmu_refresh C unreliable 1237 364d 414d 323d e61ab2a320c3 KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh()
UBSAN: shift-out-of-bounds in snd_usbmidi_get_ms_info C error 9 381d 401d 323d c06ccf3ebb75 ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks
UBSAN: shift-out-of-bounds in snd_pcm_oss_change_params_locked C unreliable 225 400d 414d 323d 11cb881bf075 ALSA: pcm: oss: Fix a few more UBSAN fixes
UBSAN: shift-out-of-bounds in ext4_fill_super C unreliable 88 399d 414d 323d c9200760da8a ext4: check for invalid block size early when mounting a file system
INFO: rcu detected stall in tipc_release C done done 4 434d 570d 323d cc00bcaa5899 netfilter: x_tables: Switch synchronization to RCU
UBSAN: shift-out-of-bounds in vhci_hub_control C unreliable 4 364d 400d 323d 718bf42b119d usb: usbip: vhci_hcd: protect shift size
WARNING: filesystem loop5 was created with 512 inodes, the real maximum is 511, mounting anyway 2 430d 426d 323d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
general protection fault in tower_disconnect C 53 407d 415d 323d b175d273d4e4 USB: legotower: fix logical error in recent commit
kernel BUG at drivers/dma-buf/dma-buf.c:LINE! syz error done 11 441d 691d 323d e722a295cf49 staging: ion: remove from the tree
WARNING: filesystem loop1 was created with 512 inodes, the real maximum is 511, mounting anyway 4 437d 486d 323d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
KCSAN: data-race in snd_seq_check_queue / snd_seq_control_queue (3) 111 408d 554d 323d 4ebd47037027 ALSA: seq: Use bool for snd_seq_queue internal flags
KMSAN: uninit-value in x25_bind 2 385d 407d 323d 6ee50c8e262a net/x25: prevent a couple of overflows
memory leak in wacom_probe C 26 386d 441d 323d 37309f47e2f5 HID: wacom: Fix memory leakage caused by kfifo_alloc
KASAN: use-after-free Read in service_outstanding_interrupt C 28 383d 538d 323d 5e5ff0b4b6bc USB: cdc-wdm: Fix use after free in service_outstanding_interrupt().
general protection fault in call_commit_handler C done 428 380d 461d 323d 5122565188ba wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
BUG: unable to handle kernel paging request in smc_nl_handle_smcr_dev C 16 392d 415d 323d 995433b795ce net/smc: fix access to parent of an ib device
KASAN: vmalloc-out-of-bounds Write in bpf_lru_populate C unreliable 19 410d 420d 323d e1868b9e36d0 bpf: Avoid overflows involving hash elem_size
memory leak in copy_process C 23 341d 438d 323d 450677dcb0cc mm/madvise: fix memory leak from process_madvise
UBSAN: shift-out-of-bounds in kvm_vcpu_after_set_cpuid 2 407d 401d 323d 2f80d502d627 KVM: x86: fix shift out of bounds reported by UBSAN
KASAN: stack-out-of-bounds Write in bitmap_from_arr32 C done 2 427d 423d 323d a770bf515613 ethtool: fix stack overflow in ethnl_parse_bitset()
WARNING: filesystem loop3 was created with 512 inodes, the real maximum is 511, mounting anyway 3 422d 490d 323d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
possible deadlock in hugetlb_cow C unreliable 341 393d 417d 323d e7dd91c456a8 mm/hugetlb: fix deadlock in hugetlb_cow error path
KASAN: null-ptr-deref Write in start_transaction C done done 1 416d 443d 323d ecfdc08b8cc6 btrfs: remove dio iomap DSYNC workaround
possible deadlock in proc_pid_syscall (2) 2 507d 517d 323d f7cfd871ae0c exec: Transform exec_update_mutex into a rw_semaphore 78af4dc949da perf: Break deadlock involving exec_update_mutex
KASAN: slab-out-of-bounds Read in squashfs_export_iget C done error 3 395d 413d 323d eabac19e40c0 squashfs: add more sanity checks in inode lookup
WARNING in io_disable_sqo_submit C done 9 369d 376d 323d 6b393a1ff174 io_uring: fix false positive sqo warning on flush
KASAN: null-ptr-deref Read in filp_close C done 9 404d 406d 323d fec8a6a69103 close_range: unshare all fds for CLOSE_RANGE_UNSHARE | CLOSE_RANGE_CLOEXEC 6abc20f8f879 selftests/core: add regression test for CLOSE_RANGE_UNSHARE | CLOSE_RANGE_CLOEXEC
possible deadlock in _destroy_id C unreliable 28 427d 435d 323d dd37d2f59eb8 RDMA/cma: Fix deadlock on &lock in rdma_cma_listen_on_all() error unwind
UBSAN: array-index-out-of-bounds in ieee80211_del_key (2) C error 3 414d 423d 323d 2d9463083ce9 nl80211: validate key indexes for cfg80211_registered_device
KASAN: use-after-free Read in rxrpc_send_data_packet 1 366d 360d 323d 7b5eab57cac4 rxrpc: Fix clearance of Tx/Rx ring when releasing a call
general protection fault in hci_event_packet C done 25 490d 543d 323d 6dfccd13db2f Bluetooth: Fix null pointer dereference in hci_event_packet()
KASAN: use-after-free Read in dump_schedule C done done 7 400d 511d 323d cc00bcaa5899 netfilter: x_tables: Switch synchronization to RCU
KASAN: invalid-free in p9_client_create (2) C done 3 365d 365d 323d 757fed1d0898 Revert "mm/slub: fix a memory leak in sysfs_slab_add()"
possible deadlock in io_timeout_fn (2) 4 385d 392d 323d 4aa84f2ffa81 io_uring: dont kill fasync under completion_lock
WARNING: filesystem loop4 was created with 512 inodes, the real maximum is 511, mounting anyway 3 436d 432d 323d dc889b8d4a81 bfs: don't use WARNING: string when it's just info.
general protection fault in wext_handle_ioctl C inconclusive 9 367d 456d 323d 5122565188ba wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
INFO: rcu detected stall in sys_exit_group (6) C 4 484d 490d 323d c583bcb8f5ed rcu: Don't invoke try_invoke_on_locked_down_task() with irqs disabled
WARNING in cm109_input_ev/usb_submit_urb C unreliable 8 412d 433d 323d 82e060904732 Input: cm109 - do not stomp on control URB
UBSAN: shift-out-of-bounds in hash_mac_create C unreliable 29 390d 410d 323d 5c8193f568ae netfilter: ipset: fix shift-out-of-bounds in htable_bits()
upstream build error (11) 25 380d 456d 380d f78f63da916e mm/process_vm_access: Add missing #include <linux/compat.h>
possible deadlock in process_measurement (2) C done done 56 420d 787d 386d 15a8d68e9dc2 mm/hugetlb: a page from buddy is not on any list
INFO: rcu detected stall in sys_open (2) C done done 42 443d 794d 400d 1d0e850a49a5 afs: Fix cell removal
BUG: unable to handle kernel paging request in cfb_imageblit C done done 30 435d 478d 400d a49145acfb97 fbmem: add margin check to fb_check_caps()
KASAN: use-after-free Read in eth_type_trans C done error 3 623d 766d 400d 96aa1b22bd6b tun: correct header offsets in napi frags mode
BUG: MAX_LOCKDEP_KEYS too low! C done error 3496 579d 823d 414d 1a33e10e4a95 net: partially revert dynamic lockdep key changes
BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! C done error 25236 618d 1058d 414d 1a33e10e4a95 net: partially revert dynamic lockdep key changes
INFO: rcu detected stall in __se_sys_mount C done done 2 446d 570d 415d 1d0e850a49a5 afs: Fix cell removal
BUG: sleeping function called from invalid context in ext4_superblock_csum_set 2 446d 451d 418d d196e229a80c Revert "ext4: fix superblock checksum calculation race"
KASAN: null-ptr-deref Write in kthread_use_mm C done 2 451d 451d 433d 4b70cf9dea4c io_uring: ensure consistent view of original task ->mm from SQPOLL
WARNING in close_fs_devices (2) C 23 435d 496d 433d cf89af146b7e btrfs: dev-replace: fail mount if we don't have replace item with target device
memory leak in gadget_setup C 49 444d 461d 433d 129aa9734559 usb: raw-gadget: fix memory leak in gadget_setup
memory leak in gadget_bind C 62 444d 461d 433d 129aa9734559 usb: raw-gadget: fix memory leak in gadget_setup
general protection fault in io_uring_show_cred C done 4 448d 448d 433d 6b47ab81c9a9 io_uring: use correct pointer for io_uring_show_cred()
KASAN: use-after-free Write in io_submit_sqes C error 2 451d 450d 433d cb8a8ae31074 io_uring: drop req/tctx io_identity separately
KASAN: use-after-free Read in __proc_create 1 488d 486d 437d 1d0e850a49a5 afs: Fix cell removal
INFO: rcu detected stall in process_one_work (3) C done done 1 477d 519d 437d 1d0e850a49a5 afs: Fix cell removal
INFO: task can't die in corrupted C done 4 450d 477d 437d 86f33603f8c5 f2fs: handle errors of f2fs_get_meta_page_nofail
BUG: corrupted list in kobject_add_internal C done done 9 475d 538d 437d a46b7ed4d52d Bluetooth: Fix auto-creation of hci_conn at Conn Complete event
WARNING in dma_map_page_attrs C unreliable 304 446d 463d 437d 683a9c7ed817 RDMA: Fix software RDMA drivers for dma mapping error
WARNING in unlock_new_inode C done 76 474d 1379d 437d 8859bf2b1278 reiserfs: only call unlock_new_inode() if I_NEW
memory leak in ieee80211_check_fast_xmit C 983 446d 490d 437d dcd479e10a05 mac80211: always wind down STA state
WARNING: suspicious RCU usage in ovs_flow_tbl_masks_cache_resize C error 1 456d 456d 437d fea07a487c6d net: openvswitch: silence suspicious RCU usage warning
general protection fault in xsk_release C done 2 489d 489d 437d 1fd17c8cd0aa xsk: Fix possible crash in socket_release when out-of-memory
memory leak in reiserfs_parse_options C 4 501d 697d 437d e9d4709fcc26 reiserfs: Fix memory leak in reiserfs_parse_options()
KMSAN: kernel-infoleak in scsi_cmd_ioctl 131 441d 514d 437d 6d53a9fe5a19 block/scsi-ioctl: Fix kernel-infoleak in scsi_put_cdrom_generic_arg()
WARNING in binder_transaction_buffer_release (2) C done done 442 570d 610d 437d e8b8ae7ce32e binder: Remove bogus warning on failed same-process transaction
BUG: using __this_cpu_read() in preemptible code in trace_hardirqs_on C done 502745 439d 471d 437d f8e48a3dca06 lockdep: Fix preemption WARN for spurious IRQ-enable
INFO: task hung in wdm_flush C 38294 514d 899d 437d 37d2a36394d9 USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync().
INFO: trying to register non-static key in uhid_char_release C done done 26 514d 691d 437d bce1305c0ece HID: core: Correctly handle ReportSize being zero
WARNING in ieee80211_s1g_channel_width C done 3 479d 479d 437d c1cd35c60601 cfg80211: only allow S1G channels on S1G band
KMSAN: uninit-value in ieee80211_skb_resize C 5 466d 490d 437d 14f46c1e5108 mac80211: fix use of skb payload instead of header
KASAN: global-out-of-bounds Read in precalculate_color C done done 170 498d 790d 437d e3158a5e7e66 media: vivid: Fix global-out-of-bounds read in precalculate_color()
general protection fault in percpu_ref_exit C done 3 472d 476d 437d 7ea6bf2e6c40 percpu_ref: don't refer to ref->data if it isn't allocated
KASAN: use-after-free Write in tcindex_change C done done 4 680d 680d 437d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
general protection fault in gfs2_rgrp_dump 1 478d 478d 437d 0e539ca1bbbe gfs2: Fix NULL pointer dereference in gfs2_rgrp_dump
WARNING: refcount bug in do_enable_set C inconclusive done 8 539d 649d 437d b83764f9220a Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
possible deadlock in cleanup_net C done 281 506d 514d 437d d966ddcc3821 tipc: fix a deadlock when flushing scheduled work
general protection fault in utf8_casefold C done 1 476d 476d 437d f6322f3f1212 f2fs: reject CASEFOLD inode flag without casefold feature
KASAN: use-after-free Read in sctp_auth_free C done 4 475d 477d 437d d42ee76ecb6c net-backports: sctp: fix sctp_auth_init_hmacs() error path
kernel panic: Fatal exception (3) C done 2 471d 470d 437d eadd1befdd77 netem: fix zero division in tabledist
KASAN: use-after-free Read in ath9k_hif_usb_rx_cb C 2849 437d 672d 437d 03fb92a432ea ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs()
memory leak in udf_process_sequence C 4 489d 493d 437d a7be300de800 udf: Fix memory leak when mounting
general protection fault in unlink_file_vma C done 1 509d 505d 437d bc4fe4cdd602 mm: mmap: Fix general protection fault in unlink_file_vma()
KASAN: use-after-free Read in fscache_alloc_cookie syz done 1 489d 489d 437d 1d0e850a49a5 afs: Fix cell removal
KASAN: unknown-crash Read in do_exit C inconclusive done 2 495d 500d 437d a49145acfb97 fbmem: add margin check to fb_check_caps()
WARNING in handle_exception_nmi C error done 2653 478d 483d 437d f8e48a3dca06 lockdep: Fix preemption WARN for spurious IRQ-enable
KASAN: use-after-free Read in tipc_named_reinit 6 542d 596d 437d fdeba99b1e58 tipc: fix use-after-free in tipc_bcast_get_mode
kernel BUG at fs/f2fs/segment.h:LINE! 9 483d 494d 437d 6a257471fa42 f2fs: fix to check segment boundary during SIT page readahead
KMSAN: uninit-value in ip_tunnel_xmit (2) C 11778 441d 1266d 437d fdafed459998 ip_gre: set dev->hard_header_len and dev->needed_headroom properly
WARNING: refcount bug in p9_req_put syz inconclusive done 6 616d 1169d 437d a39c46067c84 net/9p: validate fds in p9_fd_open
INFO: rcu detected stall in ip_list_rcv C error done 3 485d 511d 437d 1d0e850a49a5 afs: Fix cell removal
UBSAN: array-index-out-of-bounds in precalculate_color C 153 472d 497d 437d e3158a5e7e66 media: vivid: Fix global-out-of-bounds read in precalculate_color()
KMSAN: uninit-value in can_receive (2) C 2060 441d 536d 437d e009f95b1543 can: j1935: j1939_tp_tx_dat_new(): fix missing initialization of skbcnt
WARNING in syscall_exit_to_user_mode C done done 1 475d 503d 437d a49145acfb97 fbmem: add margin check to fb_check_caps()
general protection fault in tcf_generic_walker syz 9 484d 486d 437d 580e4273d7a8 net_sched: check error pointer in tcf_dump_walker()
WARNING in print_bfs_bug C done 14759 469d 821d 437d 6d1823ccc480 lockdep: Optimize the memory usage of circular queue
KASAN: use-after-free Read in io_wqe_worker C error 2 486d 488d 437d c4068bf898dd io-wq: fix use-after-free in io_wq_worker_running
INFO: task hung in io_uring_setup C done 51 506d 511d 437d 7e84e1c7566a io_uring: allow disabling rings during the creation
KMSAN: uninit-value in unix_find_other C 57 482d 1298d 437d 7ca1db21ef8e net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
KASAN: use-after-free Read in delete_partition C done done 3 513d 509d 437d 08fc1ab6d748 block: fix locking in bdev_del_partition
WARNING in get_signal C done 2 480d 482d 437d 7b3c36fc4c23 ptrace: fix task_join_group_stop() for the case when current is traced
KASAN: use-after-free Write in refcount_warn_saturate C inconclusive done 2 541d 699d 437d b83764f9220a Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
INFO: task hung in addrconf_verify_work (3) C done 75 450d 484d 437d 0fedc63fadf0 net_sched: commit action insertions together
kernel panic: stack is corrupted in get_kernel_gp_address syz done done 1 470d 502d 437d a49145acfb97 fbmem: add margin check to fb_check_caps()
WARNING: ODEBUG bug in exit_to_user_mode_prepare C done done 27 511d 517d 437d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
KMSAN: uninit-value in batadv_hard_if_event (2) C 162 453d 536d 437d f45a4248ea4c net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails
INFO: task hung in ctrl_getfamily syz done done 22 530d 1143d 437d 47733f9daf4f tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
WARNING: suspicious RCU usage in io_init_identity 1536 463d 468d 437d 1e6fa5216a0e io_uring: COW io_identity on mismatch
KASAN: out-of-bounds Read in __switch_to (2) syz done done 1 485d 481d 437d a49145acfb97 fbmem: add margin check to fb_check_caps()
WARNING: suspicious RCU usage in qrtr_ns_worker C done 1 518d 581d 437d a7809ff90ce6 net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
inconsistent lock state in xa_destroy C 755 475d 476d 437d ca6484cd308a io_uring: no need to call xa_destroy() on empty xarray
KASAN: use-after-free Write in afs_manage_cell C done done 20 469d 538d 437d 1d0e850a49a5 afs: Fix cell removal
possible deadlock in _snd_pcm_stream_lock_irqsave C done 997 468d 505d 437d 6564d0ad67ef ALSA: ctl: Workaround for lockdep warning wrt card->ctl_files_rwlock
INFO: task hung in io_uring_flush C done done 11 528d 535d 437d b7ddce3cbf01 io_uring: fix cancel of deferred reqs with ->files
memory leak in kobject_set_name_vargs (3) C 19 437d 493d 437d cb8d53d2c973 ext4: fix leaking sysfs kobject after failed mount
WARNING in percpu_ref_exit (2) C done done 272 473d 768d 437d c1e2148f8ecb io_uring: free fixed_file_data after RCU grace period
KASAN: slab-out-of-bounds Write in gfs2_fill_super C done 1 485d 484d 437d 0ddc5154b24c gfs2: add validation checks for size of superblock
WARNING in rxrpc_recvmsg C error done 5 572d 572d 437d 65550098c1c4 rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
general protection fault in open_xa_dir C done 3 472d 484d 437d c2bb80b8bdd0 reiserfs: Fix oops during mount
KASAN: use-after-free Read in tcf_action_init C done 1 489d 486d 437d 0fedc63fadf0 net_sched: commit action insertions together
KMSAN: uninit-value in search_by_key 1549 442d 493d 437d 4443390e08d3 reiserfs: Initialize inode keys properly
INFO: task hung in ubi_detach_mtd_dev syz error error 4 617d 703d 437d d005f8c6588e ubi: check kthread_should_stop() after the setting of task state
bpf-next test error: BUG: program execution failed: executor 0: exit status 67 12 469d 469d 437d d25e2e9388ed netfilter: restore NF_INET_NUMHOOKS
KMSAN: uninit-value in f2fs_lookup 17 449d 489d 437d 6d7ab88a98c1 f2fs: fix uninit-value in f2fs_lookup
INFO: rcu detected stall in exit_group C done done 1 474d 504d 437d 1d0e850a49a5 afs: Fix cell removal
KASAN: slab-out-of-bounds Read in ntfs_attr_find C done 9 470d 1396d 437d 4f8c94022f0b ntfs: add check for mft record size in superblock
KASAN: slab-out-of-bounds Read in strset_parse_request C error 141 476d 476d 437d db972e532518 ethtool: strset: allow ETHTOOL_A_STRSET_COUNTS_ONLY attr
WARNING in arch_install_hw_breakpoint C inconclusive done 8 923d 1040d 437d e898e69d6b94 x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error
KASAN: stack-out-of-bounds Read in xfrm_selector_match (2) 1 495d 493d 437d e94ee171349d xfrm: Use correct address family in xfrm_state_find
KASAN: use-after-free Read in tipc_mcast_xmit (2) C done 37 468d 482d 437d ed42989eab57 tipc: fix the skb_unshare() in tipc_buf_append()
KASAN: use-after-free Read in tipc_bcast_get_mode 1 542d 542d 437d fdeba99b1e58 tipc: fix use-after-free in tipc_bcast_get_mode
INFO: task hung in flush_to_ldisc C inconclusive done 15 713d 783d 437d e8c75a30a23c vt: selection, push sel_lock up
KASAN: use-after-free Write in io_wq_worker_running C error 14 480d 507d 437d c4068bf898dd io-wq: fix use-after-free in io_wq_worker_running
KASAN: slab-out-of-bounds Read in soft_cursor C done 218 476d 785d 437d 988d0763361b vt_ioctl: make VT_RESIZEX behave like VT_RESIZE
BUG: unable to handle kernel paging request in tcf_action_dump_terse C done 15 480d 486d 437d 580e4273d7a8 net_sched: check error pointer in tcf_dump_walker()
INFO: rcu detected stall in sys_mount (5) C done done 10 484d 505d 437d 1d0e850a49a5 afs: Fix cell removal
general protection fault in qp_release_pages C done 2 472d 472d 437d 90ca6333fd65 VMCI: check return value of get_user_pages_fast() for errors
INFO: task hung in lock_sock_nested (3) C done 5 481d 482d 437d d9fb8c507d42 mptcp: fix infinite loop on recvmsg()/worker() race.
KMSAN: uninit-value in __fget_light (2) C 18 454d 463d 437d d5e4d0a5e692 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
WARNING in ati_remote_sendpacket/usb_submit_urb C 22 608d 919d 437d a8be80053ea7 media: ati_remote: sanity check for both endpoints
KASAN: stack-out-of-bounds Read in csd_lock_record C 226 568d 572d 437d 35feb60474bf kernel/smp: Provide CSD lock timeout diagnostics
KASAN: use-after-free Read in afs_deactivate_cell (2) C done 11 475d 493d 437d 1d0e850a49a5 afs: Fix cell removal
possible deadlock in mnt_want_write C done done 662 476d 1284d 437d 146d62e5a586 ovl: detect overlapping layers
general protection fault in ieee80211_key_free C done 3 472d 477d 437d 3dc289f8f139 net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key()
general protection fault in __do_sys_io_uring_register 80 464d 470d 437d 55cbc2564ab2 io_uring: fix error path cleanup in io_sqe_files_register()
KASAN: use-after-free Write in vcs_read C done 11 519d 524d 437d 52c3c3a59234 Revert "vc_screen: extract vcs_read_buf_header"
WARNING in irqentry_exit C error done 2080 472d 538d 437d 4d004099a668 lockdep: Fix lockdep recursion
INFO: rcu detected stall in sys_newlstat C error done 1 491d 490d 437d 1d0e850a49a5 afs: Fix cell removal
kernel BUG at net/rxrpc/conn_object.c:LINE! C done 855 439d 504d 437d 546a42410bf7 rxrpc: Fix conn bundle leak in net-namespace exit
possible deadlock in dev_uc_sync C done 3 472d 570d 437d 0e8b8d6a2d85 net: core: use list_del_init() instead of list_del() in netdev_run_todo()
WARNING in wp_page_copy syz done done 9 710d 787d 437d c3e5ea6ee574 mm: avoid data corruption on CoW fault into PFN-mapped VMA
general protection fault in vmk80xx_write_packet C 82 477d 933d 437d e1f13c879a7c staging: comedi: check validity of wMaxPacketSize of usb endpoints found
general protection fault in rt6_fill_node C done done 3 522d 519d 437d eeaac3634ee0 net: nexthop: don't allow empty NHA_GROUP
KASAN: use-after-free Read in afs_manage_cell 5 478d 493d 437d 1d0e850a49a5 afs: Fix cell removal
KMSAN: uninit-value in do_ip_vs_set_ctl C 365 442d 1231d 437d c5a8a8498eed ipvs: Fix uninit-value in do_ip_vs_set_ctl()
memory leak in __team_options_register C 1 507d 507d 437d 9a9e77495958 net: team: fix memory leak in __team_options_register
general protection fault in nexthop_is_blackhole C done done 1 522d 519d 437d eeaac3634ee0 net: nexthop: don't allow empty NHA_GROUP
KASAN: use-after-free Read in ucma_close (2) syz done 1 504d 504d 437d f5449e74802c RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
UBSAN: array-index-out-of-bounds in ieee80211_del_key C done 685 446d 490d 437d 3dc289f8f139 net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key()
INFO: task hung in htable_put C done done 29 709d 763d 437d 99b79c3900d4 netfilter: xt_hashlimit: unregister proc file before releasing mutex
KASAN: use-after-free Write in xp_put_pool C done 50 490d 512d 437d 83cf5c68d663 xsk: Fix use-after-free in failed shared_umem bind
KASAN: use-after-free Read in __cfg8NUM_wpan_dev_from_attrs (2) C error done 5 571d 571d 437d bf64ff4c2aac genetlink: get rid of family->attrbuf
kernel panic: System is deadlocked on memory C done 43 563d 561d 437d 9066e5cfb73c mm, oom: make the calculation of oom badness more accurate
general protection fault in strncasecmp C done 1 492d 490d 437d 92e3cc91d8f5 afs: Fix rapid cell addition/removal by not using RCU on cells tree
KASAN: slab-out-of-bounds Read in f2fs_build_segment_manager C error 2 489d 489d 437d 3a22e9ac7158 f2fs: fix to do sanity check on segment/section count
KMSAN: uninit-value in udf_get_pblock_spar15 1 492d 490d 437d 44ac6b829c4e udf: Limit sparing table size
WARNING: refcount bug in l2cap_chan_put C inconclusive done 13 539d 703d 437d b83764f9220a Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
KASAN: use-after-free Write in afs_deactivate_cell 4 470d 490d 437d 1d0e850a49a5 afs: Fix cell removal
WARNING: proc registration bug in afs_manage_cell C done 1 490d 486d 437d 1d0e850a49a5 afs: Fix cell removal
INFO: trying to register non-static key in exfat_cache_inval_inode C done 4 480d 486d 437d 8ff006e57ad3 exfat: fix use of uninitialized spinlock on error path
WARNING in nla_get_range_unsigned C done 63 512d 514d 437d c30a3c957c88 netlink: policy: correct validation type check
KASAN: use-after-free Read in bit_putcs C 12 484d 704d 437d 988d0763361b vt_ioctl: make VT_RESIZEX behave like VT_RESIZE
BUG: using smp_processor_id() in preemptible code in tipc_crypto_xmit C done done 468 509d 580d 437d bb8872a1e6bc tipc: fix using smp_processor_id() in preemptible
general protection fault in xsk_is_setup_for_bpf_map C error 294 490d 512d 437d 968be23ceaca xsk: Fix possible segfault at xskmap entry insertion
KMSAN: uninit-value in udf_evict_inode 159 441d 489d 437d 044e2e26f214 udf: Avoid accessing uninitialized data on failed inode read
inconsistent lock state in io_uring_add_task_file 1 476d 475d 437d ce765372bc44 io_uring: Fix use of XArray in __io_uring_files_cancel
memory leak in read_adv_mon_features C 2 506d 530d 437d cafd472a10ff Bluetooth: Fix memory leak in read_adv_mon_features()
INFO: trying to register non-static key in del_timer_sync (2) C 1206 969d 1021d 437d 621a3a8b1c0e mwifiex: don't call del_timer_sync() on uninitialized timer
inconsistent lock state in icmp_send syz done done 1 644d 1142d 437d 1378817486d6 tipc: block BH before using dst_cache
INFO: task can't die in rtnetlink_rcv_msg 5 477d 486d 437d 0fedc63fadf0 net_sched: commit action insertions together
BUG: unable to handle kernel paging request in pvclock_gtod_notify C done done 8 483d 502d 437d a49145acfb97 fbmem: add margin check to fb_check_caps()
INFO: trying to register non-static key in uhid_dev_destroy C unreliable done 40 519d 692d 437d bce1305c0ece HID: core: Correctly handle ReportSize being zero
WARNING in bpf_raw_tp_link_fill_link_info C error 56 490d 504d 437d b474959d5afd bpf: Fix a buffer out-of-bound access when filling raw_tp link_info
KMSAN: uninit-value in qtree_entry_unused 396 442d 493d 437d 3d3dc274ce73 quota: clear padding in v2r1_mem2diskdqb()
KASAN: use-after-free Write in rxrpc_put_bundle C done 229 475d 498d 437d f3af4ad1e08a rxrpc: Fix bundle counting for exclusive connections
KASAN: use-after-free Read in tcf_action_destroy C done 8 479d 494d 437d 0fedc63fadf0 net_sched: commit action insertions together
memory leak in xdp_umem_create C 17 441d 461d 437d e5e1a4bc916d xsk: Fix possible memory leak at socket close
general protection fault in xsk_diag_dump (2) C 354 494d 512d 437d 53ea2076d851 xsk: Fix possible segfault in xsk umem diagnostics
INFO: rcu detected stall in security_file_open (3) C done done 2 485d 484d 437d 1d0e850a49a5 afs: Fix cell removal
general protection fault in tcf_action_destroy (2) C done done 29 474d 688d 437d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
KASAN: global-out-of-bounds Read in fbcon_get_font C inconclusive inconclusive 41 482d 779d 437d 5af08640795b fbcon: Fix global-out-of-bounds read in fbcon_get_font()
WARNING: suspicious RCU usage in ctrl_cmd_new_lookup C done done 10 492d 581d 437d a7809ff90ce6 net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
general protection fault in io_poll_double_wake (2) C error 2 487d 486d 463d 8706e04ed7d6 io_uring: always delete double poll wait entry on match
possible deadlock in io_write 2 484d 486d 463d fad8e0de4426 io_uring: fix potential ABBA deadlock in ->show_fdinfo()
kernel BUG at lib/string.c:LINE! (5) C done 558 490d 499d 469d 35be8851d172 btrfs: fix overflow when copying corrupt csums for a message
general protection fault in madvise_cold_or_pageout_pte_range C done 3 490d 500d 471d ce2684254bd4 mm: validate pmd after splitting
KASAN: global-out-of-bounds Read in fbcon_resize C error 673 493d 525d 474d ec0972adecb3 fbcon: Fix user font detection test at fbcon_resize().
WARNING: suspicious RCU usage in fib6_del (2) 1 506d 506d 474d 843d926b003e ipv6: avoid lockdep issue in fib6_del()
KASAN: use-after-free Read in ieee8NUM_tx 1 508d 508d 474d 0ff4628f4c6c mac802154: tx: fix use-after-free
general protection fault in wg_index_hashtable_replace 2 495d 507d 474d 9179ba31367b wireguard: noise: take lock when removing handshake entry from table
memory leak in do_seccomp C 6 507d 534d 474d a566a9012acd seccomp: don't leak memory when filter install races
inconsistent lock state in padata_do_parallel 9 493d 512d 474d 1b0df11fde0f padata: fix possible padata_works_lock deadlock
KASAN: use-after-free Write in skb_queue_tail 1 506d 506d 474d 3ca1a42a52ca net: qrtr: check skb_put_padto() return value
possible deadlock in peernet2id_alloc 12 505d 677d 474d e1f469cd5866 Revert "netns: don't disable BHs when locking "nsid_lock""
KMSAN: uninit-value in __inet_diag_dump C 37 476d 493d 474d d5e4d0a5e692 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
memory leak in do_eventfd C 2 521d 616d 474d f65886606c2d KVM: fix memory leak in kvm_io_bus_unregister_dev()
KASAN: slab-out-of-bounds Read in read_descriptors (2) 1 524d 520d 474d a18cd6c9b6bc usb: core: fix slab-out-of-bounds Read in read_descriptors
INFO: rcu detected stall in cleanup_net (4) C done 5 509d 505d 474d b5b73b26b3ca taprio: Fix allowing too small intervals
KASAN: slab-out-of-bounds Read in fbcon_scrolldelta 1 501d 500d 474d 50145474f6ef fbcon: remove soft scrollback code
INFO: task hung in tcf_ife_init C done 4 507d 511d 474d cc8e58f8325c act_ife: load meta modules before tcf_idr_check_alloc()
KASAN: slab-out-of-bounds Read in prism2sta_probe_usb C 8 515d 546d 474d fea22e159d51 staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb()
KMSAN: uninit-value in inet_diag_cmd_exact C 31 476d 487d 474d d5e4d0a5e692 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
KASAN: global-out-of-bounds Read in vga16fb_imageblit C done 1071 501d 786d 474d bd018a6a75ce video: fbdev: fix OOB read in vga_8planes_imageblit()
memory leak in tipc_group_create_member C 32 502d 909d 474d bb3a420d47ab tipc: Fix memory leak in tipc_group_create_member()
general protection fault in free_netdev C error done 3605 550d 585d 483d 46ef5b89ec0e ip6_gre: fix null-ptr-deref in ip6gre_init_net()
KASAN: use-after-free Write in page_counter_uncharge 2 522d 527d 483d f1796544a0ca memcg: fix use-after-free in uncharge_batch
KASAN: use-after-free Write in page_counter_cancel 1 531d 527d 483d f1796544a0ca memcg: fix use-after-free in uncharge_batch
KASAN: use-after-free Read in do_madvise syz error 4 522d 524d 483d 7867fd7cc44e mm: madvise: fix vma user-after-free
KMSAN: kernel-infoleak in move_addr_to_user (3) C 79 498d 532d 486d 38ba8b9241f5 can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
KASAN: slab-out-of-bounds Write in hiddev_ioctl_usage C 279 517d 860d 489d 25a097f52046 HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage()
WARNING: refcount bug in red_destroy C done 1 520d 519d 489d 5438dd45831e net_sched: fix error path in red_init()
WARNING in slab_pre_alloc_hook C 210 514d 535d 489d f176ede3a3bd USB: yurex: Fix bad gfp argument
WARNING: refcount bug in smc_release (3) 1 517d 506d 489d 5fb8642a17aa net/smc: fix sock refcounting in case of termination
INFO: rcu detected stall in ext4_file_write_iter C inconclusive done 93 534d 1066d 489d 7e24969022cb block: allow for_each_bvec to support zero len bvec
WARNING: refcount bug in qdisc_put (2) C done 7 519d 519d 489d 5438dd45831e net_sched: fix error path in red_init()
BUG: corrupted list in mousedev_release syz done 5 513d 515d 489d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in snd_pcm_oss_release 1 518d 518d 489d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
possible deadlock in __lock_task_sighand C done 12 514d 515d 489d fd7d6de22414 io_uring: don't recurse on tsk->sighand->siglock with signalfd
WARNING in snd_pcm_plugin_build_mulaw C done 4 516d 513d 489d 949a1ebe8cea ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
general protection fault in snd_ctl_release syz done 4 512d 512d 489d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
KMSAN: uninit-value in batadv_tt_hash_find 11 505d 562d 489d 303216e76dca batman-adv: Avoid uninitialized chaddr when handling DHCP
KASAN: global-out-of-bounds Read in bit_putcs C done 262 490d 784d 489d 39b3cffb8cf3 fbcon: prevent user font height or width change from causing potential out-of-bounds access bc5269ca7650 vt_ioctl: change VT_RESIZEX ioctl to check for error return from vc_resize()
KASAN: use-after-free Read in fbcon_cursor syz done error 10 529d 774d 489d f8d1653daec0 vt: defer kfree() of vc_screenbuf in vc_do_resize()
KASAN: use-after-free Read in rc_dev_uevent 1 538d 538d 489d 4f0835d6677d media: rc: uevent sysfs file races with rc_unregister_device()
upstream boot error: KASAN: global-out-of-bounds Read in internal_create_group 273 520d 533d 489d 62c789270c0b libnvdimm: KASAN: global-out-of-bounds Read in internal_create_group
KMSAN: uninit-value in video_usercopy C 28 555d 554d 489d 4ffb879ea648 media: media/v4l2-core: Fix kernel-infoleak in video_put_user()
INFO: task hung in nbd_ioctl (2) 37 517d 570d 489d 2a63866c8b51 tipc: fix shutdown() of connectionless socket
WARNING in restore_regulatory_settings C done 10414 507d 752d 489d 47caf685a685 cfg80211: regulatory: reject invalid hints
INFO: task hung in pipe_release (2) syz done 3 512d 543d 489d 7e24969022cb block: allow for_each_bvec to support zero len bvec
KMSAN: kernel-infoleak in raw_ioctl C 22 511d 536d 489d a092b7233f0e net: usb: Fix uninit-was-stored issue in asix_read_phy_addr()
KASAN: use-after-free Read in bdev_del_partition C done 1 514d 514d 489d 08fc1ab6d748 block: fix locking in bdev_del_partition
KASAN: vmalloc-out-of-bounds Write in bitfill_aligned C 475 550d 784d 493d 033724d68642 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
BUG: unable to handle kernel paging request in vmx_vcpu_run C error error 194 1272d 1387d 494d kvm: vmx: Nested VM-entry prereqs for event inj.
possible deadlock in __io_queue_deferred C error 1 536d 535d 498d 7271ef3a93a8 io_uring: fix recursive completion locking on oveflow flush
kernel BUG at mm/hugetlb.c:LINE! C done error 10 548d 661d 498d 15568299b7d9 hugetlbfs: prevent filesystem stacking of hugetlbfs
WARNING in r871xu_dev_remove C 47375 537d 889d 498d b4383c971bc5 staging: rtl8712: handle firmware load failure
WARNING in ptrace_stop C done 1413 549d 553d 498d d136122f5845 sched: Fix race against ptrace_freeze_trace()
general protection fault in do_con_write C done 10703 550d 785d 498d ce684552a266 vt: Reject zero-sized screen buffer size.
general protection fault in __btf_resolve_helper_id C 17 562d 571d 498d 5b801dfb7feb bpf: Fix NULL pointer dereference in __btf_resolve_helper_id()
KASAN: use-after-free Read in line6_submit_audio_in_all_urbs 2 566d 580d 498d 68359a1ad844 ALSA: line6: Sync the pending work cancel at disconnection
INFO: task hung in ovs_exit_net 65 550d 553d 498d a65878d6f00b net: openvswitch: fixes potential deadlock in dp cleanup code
memory leak in erase_aeb (2) syz 25 556d 626d 498d 3b185255bb2f ubi: fastmap: Don't produce the initial next anchor PEB when fastmap is disabled
KASAN: use-after-free Write in __linkwatch_run_queue C error 24 552d 554d 498d c75d1d5248c0 bonding: check return value of register_netdevice() in bond_newlink()
WARNING in fat12_ent_blocknr 2 541d 566d 498d a090a5a7d73f fat: fix fat_ra_init() for data clusters == 0
general protection fault in x86_fsgsbase_read_task C done 2 531d 531d 498d 8ab49526b53d x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task
WARNING in __kernel_read C done 60 505d 563d 498d a39c46067c84 net/9p: validate fds in p9_fd_open
WARNING in inc_nlink C done 26 564d 667d 498d facb03dddec0 fs/minix: don't allow getting deleted inodes
KASAN: use-after-free Read in delete_and_unsubscribe_port (2) syz done 4 541d 567d 498d 80982c7e834e ALSA: seq: oss: Serialize ioctls
KASAN: use-after-free Write in addr_resolve 1 599d 596d 498d f6a9d47ae685 RDMA/cma: Execute rdma_cm destruction from a handler properly
general protection fault in cdev_del C 315 507d 975d 498d e911e99a0770 usb: hso: check for return value in hso_serial_common_create()
general protection fault in afs_dynroot_depopulate 1 525d 524d 498d 5e0b17b026eb afs: Fix NULL deref in afs_dynroot_depopulate()
KASAN: use-after-free Read in sock_def_write_space (2) C error 29 498d 555d 498d af9f691f0f5b qrtr: orphan socket in qrtr_release()
kernel BUG at mm/khugepaged.c:LINE! C done 30 524d 536d 498d f3f99d63a815 khugepaged: adjust VM_BUG_ON_MM() in __khugepaged_enter()
possible deadlock in shmem_fallocate (4) C done 81 548d 763d 498d 3e338d3c95c7 staging: android: ashmem: Fix lockdep warning for write operation
BUG: unable to handle kernel NULL pointer dereference in loop_rw_iter C done 24 523d 535d 498d 2dd2111d0d38 io_uring: Fix NULL pointer dereference in loop_rw_iter()
kernel BUG at net/rxrpc/recvmsg.c:LINE! C error 10 544d 572d 498d 65550098c1c4 rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
KASAN: use-after-free Read in addr_handler (2) 2 553d 596d 498d f6a9d47ae685 RDMA/cma: Execute rdma_cm destruction from a handler properly
KASAN: use-after-free Read in io_async_task_func syz error 1 534d 534d 498d 6d816e088c35 io_uring: hold 'ctx' reference around task_work queue + execute
WARNING in idr_alloc C done 65 507d 581d 498d 8dfddfb79653 net: qrtr: fix usage of idr in port assignment to socket
WARNING in drop_nlink C done error 1 645d 641d 498d facb03dddec0 fs/minix: don't allow getting deleted inodes
KASAN: slab-out-of-bounds Read in vc_do_resize C done 55 535d 770d 498d d88ca7e1a27e fbmem: pull fbcon_update_vcs() out of fb_set_var()
general protection fault in fib_dump_info (2) C done 16 522d 524d 498d eeaac3634ee0 net: nexthop: don't allow empty NHA_GROUP
KASAN: slab-out-of-bounds Read in vsscanf (2) C error 5 540d 554d 498d a6bd4f6d9b07 Smack: fix another vsscanf out of bounds
KMSAN: uninit-value in netlink_policy_dump_start C 31 503d 506d 498d d1fb55592909 netlink: fix state reallocation in policy export
possible deadlock in uprobe_clear_state (2) 1 565d 561d 498d f867c771f988 binder: Don't use mmput() from shrinker function.
KASAN: null-ptr-deref Write in media_request_close C done 17 540d 589d 498d e30cc79cc80f media: media-request: Fix crash if memory allocation fails
KASAN: use-after-free Read in devlink_health_reporter_destroy C error 1188 562d 562d 498d 5d037b4d3df7 devlink: Fix use-after-free when destroying health reporters
kernel BUG at net/core/dev.c:LINE! (3) C done 979 512d 656d 498d 832707021666 bonding: fix a potential double-unregister
KASAN: use-after-free Read in ceph_mdsc_destroy 4 537d 553d 498d a7caa88f8b72 ceph: fix use-after-free for fsc->mdsc
KASAN: use-after-free Read in path_init (2) C done 29 532d 533d 498d 24fb33d40d60 fix breakage in do_rmdir()
WARNING in __kernel_write C done 522 547d 566d 498d a39c46067c84 net/9p: validate fds in p9_fd_open
KMSAN: uninit-value in get_block C 13 613d 617d 498d 270ef41094e9 fs/minix: reject too-large maximum file size
WARNING: suspicious RCU usage in ovs_flow_tbl_masks_cache_size C done 4093 539d 541d 498d fea07a487c6d net: openvswitch: silence suspicious RCU usage warning
WARNING in submit_rx_urb/usb_submit_urb C 397 549d 974d 498d faaff9765664 staging: wlan-ng: properly check endpoint types
WARNING in ib_unregister_device_queued 2 630d 641d 498d 0cb42c026583 RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued()
KASAN: use-after-free Read in get_block C done 23 564d 641d 498d 270ef41094e9 fs/minix: reject too-large maximum file size
WARNING in idtentry_exit_cond_rcu syz 6 571d 568d 498d bce9b042ec73 x86/traps: Disable interrupts in exc_aligment_check()
INFO: task hung in ovs_dp_masks_rebalance 771 511d 554d 498d a65878d6f00b net: openvswitch: fixes potential deadlock in dp cleanup code
memory leak in nf_tables_addchain C 1 536d 534d 498d 59136aa3b264 netfilter: nf_tables: free chain context when BINDING flag is missing
KASAN: null-ptr-deref Write in get_block C done 101 564d 677d 498d da27e0a0e5f6 fs/minix: check return value of sb_getblk()
WARNING: suspicious RCU usage in tipc_l2_send_msg syz done 60 522d 580d 498d f6db90964162 tipc: call rcu_read_lock() in tipc_aead_encrypt_done()
WARNING in compat_do_ebt_get_ctl C done 15 527d 538d 498d 5c04da55c754 netfilter: ebtables: reject bogus getopt len value
memory leak in io_submit_sqes C 2 515d 534d 498d a36da65c4656 io_uring: fail poll arm on queue proc failure
WARNING in __nf_unregister_net_hook (2) C done 9 564d 562d 498d 1e9451cbda45 netfilter: nf_tables: fix nat hook table deletion
KCSAN: data-race in page_counter_try_charge / page_counter_try_charge (2) 148 533d 776d 498d 6e4bd50f3888 mm/page_counter: fix various data races at memsw
KASAN: use-after-free Read in j1939_tp_txtimer C done error 5 564d 763d 498d cd3b3636c99f can: j1939: transport: j1939_session_tx_dat(): fix use-after-free read in j1939_tp_txtimer()
KASAN: use-after-free Write in get_block C inconclusive inconclusive 12 580d 630d 498d 270ef41094e9 fs/minix: reject too-large maximum file size
KASAN: use-after-free Read in l2cap_chan_close C done 37 539d 720d 498d f9c70bdc279b Bluetooth: add a mutex lock to avoid UAF in do_enale_set
KASAN: use-after-free Read in ax88172a_unbind C done 2723 549d 790d 498d c28d9a285668 ax88172a: fix ax88172a_unbind() failures
linux-next boot error: WARNING in mem_cgroup_css_alloc 6 532d 532d 498d 9f457179244a mm: memcontrol: fix warning when allocating the root cgroup
KCSAN: data-race in vm_area_dup / vma_interval_tree_remove (2) 70 592d 706d 498d cda099b37d71 fork: Annotate a data race in vm_area_dup()
general protection fault in vsock_poll syz done 15 542d 555d 498d 1980c0584483 vsock: fix potential null pointer dereference in vsock_poll()
BUG: corrupted list in p9_read_work (2) syz done error 38 799d 1161d 498d 74d6a5d56629 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work
general protection fault in io_poll_double_wake C done 8 502d 530d 498d d4e7cd36a90e io_uring: sanitize double poll handling
KMSAN: uninit-value in geneve_xmit C 163 501d 554d 498d 32818c075c54 geneve: fix an uninitialized value in geneve_changelink()
general protection fault in syscall_return_slowpath syz inconclusive done 1 604d 690d 498d 033724d68642 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
KMSAN: uninit-value in ax25_connect C 15 506d 639d 498d 2f2a7ffad5c6 AX.25: Fix out-of-bounds read in ax25_connect()
general protection fault in j1939_netdev_start C done 8 550d 702d 498d af804b782635 can: j1939: socket: j1939_sk_bind(): make sure ml_priv is allocated
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt C 16 541d 568d 498d 51c19bf3d5cf Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
KASAN: wild-memory-access Read in rawv6_setsockopt 2 539d 539d 498d 519a8a6cf91d net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
KASAN: out-of-bounds Read in pebs_update_state syz inconclusive done 1 575d 622d 498d 033724d68642 fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
WARNING in submit_audio_out_urb/usb_submit_urb syz 2 567d 567d 498d 6e8a914ad619 ALSA: line6: Perform sanity check for each URB creation
KASAN: use-after-free Read in lockref_get 7 602d 701d 498d bad8e64fb19d blktrace: fix debugfs use after free
KASAN: use-after-free Read in io_uring_setup (2) 1 546d 546d 498d d1719f70d0a5 io_uring: don't touch 'ctx' after installing file descriptor
KASAN: use-after-free Read in __xfrm6_tunnel_spi_lookup C error 12 556d 561d 498d 8b404f46dd6a xfrm: interface: not xfrmi_ipv6/ipip_handler twice
general protection fault in khugepaged C done 3 555d 567d 498d 594cced14ad3 khugepaged: fix null-pointer dereference due to race
KASAN: invalid-free in snd_seq_port_disconnect syz done 9 541d 546d 498d 80982c7e834e ALSA: seq: oss: Serialize ioctls
KASAN: slab-out-of-bounds Write in sctp_setsockopt C error 590 549d 554d 498d dfd3d5266dc1 sctp: fix slab-out-of-bounds in SCTP_DELAYED_SACK processing
possible deadlock in io_timeout_fn C done 4 532d 535d 498d 51a4cc112c7a io_uring: defer file table grabbing request cleanup for locked requests
KMSAN: uninit-value in ucma_connect C 138 502d 554d 498d 31142a4ba617 RDMA/cm: Add min length checks to user structure copies
WARNING in snd_usbmidi_submit_urb/usb_submit_urb C done 42 581d 605d 498d 9b7e5208a941 ALSA: usb-audio: Fix race against the error recovery URB submission
WARNING in snd_info_get_line C done 36 554d 559d 498d 60379ba08532 ALSA: info: Drop WARN_ON() from buffer NULL sanity check
WARNING: suspicious RCU usage in ovs_flow_tbl_destroy C done 658 539d 541d 498d fea07a487c6d net: openvswitch: silence suspicious RCU usage warning
INFO: task hung in __do_sys_reboot 1554 514d 570d 498d b292b50b0efc driver core: Fix probe_count imbalance in really_probe()
INFO: trying to register non-static key in red_destroy C error 318 549d 571d 498d 608b4adab178 net_sched: initialize timer earlier in red_init()
general protection fault in go7007_usb_probe C 2103 537d 645d 498d 137641287eb4 go7007: add sanity checking for endpoints
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt C error 9 542d 563d 498d 629b49c848ee Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
KMSAN: uninit-value in __tipc_nl_compat_dumpit (3) C 6181 498d 563d 498d 47733f9daf4f tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
KASAN: wild-memory-access Read in ip_setsockopt C 2 532d 532d 498d 519a8a6cf91d net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
WARNING: suspicious RCU usage in bond_ipsec_add_sa 214 499d 570d 498d f548a476268d bonding: don't need RTNL for ipsec helpers
KASAN: wild-memory-access Read in sctp_setsockopt C 2 531d 531d 498d 519a8a6cf91d net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
KMSAN: uninit-value in xa_load C 208 498d 554d 498d 31142a4ba617 RDMA/cm: Add min length checks to user structure copies
WARNING in vkms_vblank_simulate C done 12903 504d 1081d 498d 51f644b40b4b drm/atomic-helper: reset vblank on crtc reset
WARNING in snd_usbmidi_input_start/usb_submit_urb C done 231 558d 601d 498d 9b7e5208a941 ALSA: usb-audio: Fix race against the error recovery URB submission
KASAN: use-after-free Read in smk_write_relabel_self C done 2 602d 598d 498d beb4ee6770a8 Smack: fix use-after-free in smk_write_relabel_self()
possible deadlock in pipe_lock (3) C inconclusive done 4 725d 763d 527d 1a980b8cbf00 ovl: add splice file read write helper
possible deadlock in dev_mc_unsync C error done 78 564d 580d 527d be74294ffa24 net: get rid of lockdep_set_class_and_subclass()
possible deadlock in lock_trace (3) syz inconclusive done 69 665d 800d 527d 2db9dbf71bf9 proc: Use new infrastructure to fix deadlocks in execve
possible deadlock in do_io_accounting (3) C inconclusive done 39 672d 763d 527d 76518d379885 proc: io_accounting: Use new infrastructure to fix deadlocks in execve
possible deadlock in proc_pid_personality syz inconclusive done 3 682d 692d 527d 2db9dbf71bf9 proc: Use new infrastructure to fix deadlocks in execve
WARNING: bad unlock balance in rcu_lock_release C inconclusive done 1433 667d 949d 527d 10476e630422 locking/lockdep: Fix bad recursion pattern
WARNING in hsr_addr_subst_dest C done done 8639 664d 1121d 527d 4b793acdca00 hsr: use netdev_err() instead of WARN_ONCE()
WARNING: locking bug in try_to_grab_pending syz error done 1 616d 1079d 527d 1378817486d6 tipc: block BH before using dst_cache
KASAN: stack-out-of-bounds Read in update_stack_state C unreliable done 388 741d 1436d 527d init, tracing: Add initcall trace events
WARNING: bad unlock balance in rcu_core C inconclusive done 3578 663d 1019d 527d 10476e630422 locking/lockdep: Fix bad recursion pattern
general protection fault in qrtr_endpoint_post C done done 54 564d 582d 533d 8ff41cc21714 net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
invalid opcode in __phys_addr (2) 1 577d 577d 541d c4e8fa9074ad netfilter: ipset: call ip_set_free() instead of kfree()
PANIC: double fault in fixup_bad_iret C error 11753 567d 608d 544d 5144f8a8dfd7 compiler_types.h: Add __no_sanitize_{address,undefined} to noinstr
general protection fault in __apic_accept_irq (2) C done 9 581d 577d 544d 9d3c447c72fb KVM: X86: Fix async pf caused null-ptr-deref
KCSAN: data-race in copy_process / release_task 154 573d 702d 544d c17d1a3a8ee4 fork: annotate data race in copy_process()
KASAN: use-after-free Read in dmabuffs_dname 1 695d 691d 544d 4ab59c3c638c dma-buf: Move dma_buf_release() from fops to dentry_ops
WARNING in enqueue_task_dl C done 13 588d 1166d 544d 740797ce3a12 sched/core: Fix PI boosting between RT and DEADLINE tasks
KCSAN: data-race in copy_process / copy_process (2) 294 574d 752d 544d c17d1a3a8ee4 fork: annotate data race in copy_process()
PANIC: double fault in check_preemption_disabled C 2181 576d 580d 544d c7aadc09321d x86/entry: Increase entry_stack size to a full page
memory leak in nbd_add_socket C 1 667d 667d 544d 579dd91ab3a5 nbd: Fix memory leak in nbd_add_socket
WARNING in xfrm_policy_insert C inconclusive done 6 590d 1443d 548d ed17b8d377ea xfrm: fix a warning in xfrm_policy_insert_list
BUG: unable to handle kernel paging request in netif_receive_generic_xdp C done done 160 603d 739d 549d 96aa1b22bd6b tun: correct header offsets in napi frags mode
WARNING in iomap_apply C done 25 616d 656d 556d 175efa81feb8 ext4: fix EXT4_MAX_LOGICAL_BLOCK macro ext4: fix EXT4_MAX_LOGICAL_BLOCK macro
KASAN: use-after-free Read in sock_def_write_space C done 67 556d 922d 556d a9b111016235 llc: make sure applications use ARPHRD_ETHER
KASAN: slab-out-of-bounds Read in qrtr_endpoint_post C 8 578d 579d 556d 8ff41cc21714 net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
memory leak in qdisc_create_dflt C 1 575d 571d 556d 306381aec7c2 net_sched: fix a memory leak in atm_tc_init()
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu 1 577d 577d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
WARNING in hsr_dev_finalize C error 1546 564d 580d 556d ccfc9df1352b hsr: fix interface leak in error path of hsr_dev_finalize()
kernel BUG at net/l2tp/l2tp_core.c:LINE! C 10 581d 576d 556d c9a368f1c0fb bpf: net: Avoid incorrect bpf_sk_reuseport_detach call
KASAN: vmalloc-out-of-bounds Read in tipc_nl_publ_dump C 22 562d 580d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu C error 17 566d 576d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in nl8NUM_dump_wpan_phy (2) C 18 566d 580d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
possible deadlock in dev_uc_sync_multiple (2) 26 567d 577d 556d be74294ffa24 net: get rid of lockdep_set_class_and_subclass()
KASAN: vmalloc-out-of-bounds Read in __nla_validate_parse 7 562d 579d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_publ_dump (2) C 14 565d 577d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_node_dump_monitor_peer (2) C 54 564d 579d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_udp_nl_dump_remoteip (2) C 9 564d 584d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in devlink_get_from_attrs C 25 564d 577d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
WARNING in warn_bad_map 1 588d 584d 556d 9c29e3615274 mptcp: fix DSS map generation on fin retransmission
KASAN: vmalloc-out-of-bounds Read in nl8NUM_dump_wpan_phy C 145 562d 583d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: vmalloc-out-of-bounds Read in __cfg8NUM_wpan_dev_from_attrs 4 565d 579d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in tipc_nl_node_dump_link C error 10 570d 580d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name C 4 571d 576d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: vmalloc-out-of-bounds Read in tipc_nl_node_dump_monitor_peer C error 9 565d 583d 556d bf64ff4c2aac genetlink: get rid of family->attrbuf
BUG: unable to handle kernel NULL pointer dereference in tomoyo_domain_quota_is_ok (2) 7 580d 595d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in unpin_user_pages C done 13 617d 617d 559d f78cdbd75a57 rds: fix crash in rds_info_getsockopt()
KASAN: use-after-free Write in bpf_link_put 2 635d 637d 559d 138c67677ff5 bpf: Fix use-after-free of bpf_link when priming half-fails
KASAN: use-after-free Write in fsnotify_detach_connector_from_object C done 4 590d 594d 559d ef1548adada5 proc: Use new_inode not new_inode_pseudo
KASAN: use-after-free Read in ip_icmp_error C done 14 610d 611d 559d 239174945dac tcp: tcp_v4_err() icmp skb is named icmp_skb
BUG: unable to handle kernel NULL pointer dereference in schedule_timeout 1 580d 580d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Write in ath9k_htc_rx_msg C 93 594d 672d 559d e4ff08a4d727 ath9k: Fix use-after-free Write in ath9k_htc_rx_msg
BUG: using smp_processor_id() in preemptible [ADDR] code: syz-executor C done 22297 604d 943d 559d 1378817486d6 tipc: block BH before using dst_cache
KASAN: slab-out-of-bounds Read in vsscanf C done 61 569d 671d 559d 84e99e58e8d1 Smack: slab-out-of-bounds in vsscanf
KASAN: slab-out-of-bounds Read in ip_icmp_error C done 13 610d 611d 559d 239174945dac tcp: tcp_v4_err() icmp skb is named icmp_skb
WARNING: proc registration bug in snmp6_register_dev C done 14 586d 652d 559d de0083c7ed7d hsr: avoid to create proc file after unregister
KASAN: null-ptr-deref Write in choke_reset C done 1441 615d 648d 559d 8738c85c72b3 sch_choke: avoid potential panic in choke_reset()
KASAN: slab-out-of-bounds Write in snd_usb_mixer_notify_id C done 39 578d 583d 559d 220345e98f1c ALSA: usb-audio: Fix OOB access of mixer element list
BUG: unable to handle kernel NULL pointer dereference in number 1 589d 585d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Write in snd_usb_mixer_interrupt C done 5 581d 583d 559d 220345e98f1c ALSA: usb-audio: Fix OOB access of mixer element list
KASAN: use-after-free Read in vkms_dumb_create syz done 2 644d 640d 559d 0ea2ea42b31a drm/vkms: Hold gem object while still in-use
BUG: unable to handle kernel NULL pointer dereference in check_preemption_disabled (3) 3 589d 589d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Read in inet_diag_bc_sk C done 30 634d 636d 559d ee1bd483cc06 inet_diag: bc: read cgroup id only for full sockets
memory leak in ctnetlink_del_conntrack C 1 599d 597d 559d 6c2d2176a85e netfilter: ctnetlink: memleak in filter initialization error path
INFO: rcu detected stall in inet_sendmsg (2) 13 560d 644d 559d df4953e4e997 sch_sfq: validate silly quantum values
linux-next boot error: WARNING: suspicious RCU usage in ipmr_get_table 60 631d 639d 559d 7013908c2db2 ipmr: Add lockdep expression to ipmr_for_each_table macro
BUG: unable to handle kernel NULL pointer dereference in dev_ifconf 1 589d 589d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
BUG: using smp_processor_id() in preemptible [ADDR] code: /NUM 1 616d 616d 559d 1378817486d6 tipc: block BH before using dst_cache
BUG: MAX_LOCKDEP_CHAINS too low! C done 17240 559d 1217d 559d e7511f560f54 bonding: remove useless stats_lock_key 1a33e10e4a95 net: partially revert dynamic lockdep key changes
INFO: task hung in locks_remove_posix syz 2231 594d 617d 559d 187b96db5ca7 x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks
WARNING: refcount bug in crypto_mod_get C done 2 624d 636d 559d 6603523bf5e4 crypto: api - Fix use-after-free and race in crypto_spawn_alg
BUG: unable to handle kernel NULL pointer dereference in mpihelp_addmul_1 1 589d 589d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (3) 1 609d 609d 559d d9a81a225277 l2tp: add sk_family checks to l2tp_validate_socket
linux-next test error: BUG: using smp_processor_id() in preemptible [ADDR] code: syz-fuzzer/6792 1 604d 604d 559d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KCSAN: data-race in __fat_write_inode / fat12_ent_get 2 670d 664d 559d b1b65750b8db fat: don't allow to mount if the FAT length == 0
KASAN: stack-out-of-bounds Write in ath9k_hif_usb_rx_cb C 57 594d 668d 559d 19d6c375d671 ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb
KASAN: slab-out-of-bounds Read in ovl_check_fb_len syz done 3 616d 615d 559d 522f6e6cba68 ovl: fix out of bounds access warning in ovl_check_fb_len()
KASAN: use-after-free Read in usblp_bulk_read 7 568d 646d 559d 296a193b0612 usblp: poison URBs upon disconnect
BUG: unable to handle kernel NULL pointer dereference in alloc_pages_vma 1 589d 585d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
linux-next boot error: general protection fault in tomoyo_get_local_path 18 616d 622d 559d 9d78edeaec75 proc: proc_pid_ns takes super_block as an argument
KASAN: use-after-free Read in htc_connect_service C 41041 594d 672d 559d ced21a4c726b ath9k: Fix use-after-free Read in htc_connect_service
KMSAN: uninit-value in tbf_enqueue 21 559d 646d 559d 9274124f023b net: stricter validation of untrusted gso packets
general protection fault in ima_free_template_entry C done 3 582d 602d 559d 42413b49804b ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
WARNING in kvm_inject_emulated_page_fault C done 20 582d 602d 559d 7a35e515a705 KVM: VMX: Properly handle kvm_read/write_guest_virt*() result
general protection fault in kobject_get (2) 2 588d 617d 559d 11a0ae4c4bff RDMA: Allow ib_client's to fail when add() is called
general protection fault in fq_codel_enqueue C done 25 563d 648d 559d 9274124f023b net: stricter validation of untrusted gso packets
BUG: unable to handle kernel NULL pointer dereference in create_empty_buffers 1 600d 596d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
memory leak in crypto_create_tfm C 14 587d 603d 559d 819966c06b75 crypto: drbg - always try to free Jitter RNG instance
WARNING in memtype_reserve C done 600 620d 628d 559d a0e710a7def4 USB: usbfs: fix mmap dma mismatch
general protection fault in put_cmsg C done 3 624d 625d 559d 1b2f08df0a88 ipv6: set msg_control_is_user in do_ipv6_getsockopt
WARNING in usbhid_raw_request/usb_submit_urb (3) syz 18 638d 744d 559d ac854131d984 USB: core: Fix misleading driver bug report
memory leak in nf_tables_parse_netdev_hooks (3) C 1 599d 597d 559d 3003055f5066 netfilter: nf_tables: hook list memleak in flowtable deletion
general protection fault in proc_kill_sb 8 584d 596d 559d 058f2e4da79b proc: s_fs_info may be NULL when proc_kill_sb is called
INFO: trying to register non-static key in io_cqring_ev_posted (3) C done 3 618d 620d 559d 583863ed9181 io_uring: initialize ctx->sqo_wait earlier
BUG: unable to handle kernel paging request in do_xdp_generic C done done 7444 632d 739d 559d 96aa1b22bd6b tun: correct header offsets in napi frags mode
KASAN: slab-out-of-bounds Read in inet_diag_bc_sk C done 45 634d 636d 559d ee1bd483cc06 inet_diag: bc: read cgroup id only for full sockets
BUG: stack guard page was hit in deref_stack_reg 2 623d 684d 559d dd912306ff00 net: fix a potential recursive NETDEV_FEAT_CHANGE
INFO: task syz-executor can't die for more than 143 seconds. (2) C done 2512 560d 827d 559d 566d136289dc pipe: Fix pipe_full() test in opipe_prep().
BUG: unable to handle kernel NULL pointer dereference in debug_smp_processor_id (2) 3 581d 588d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
net-next test error: KASAN: use-after-free Write in afs_wake_up_async_call 60 580d 589d 559d 0041cd5a5044 rxrpc: Fix notification call on completion of discarded calls
BUG: unable to handle kernel NULL pointer dereference in net_rx_queue_update_kobjects 1 589d 589d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in erspan_validate C done 520 625d 631d 559d 51fa960d3b51 erspan: Check IFLA_GRE_ERSPAN_VER is set.
bpf test error: BUG: using smp_processor_id() in preemptible code in ext4_mb_new_blocks 48 588d 591d 559d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
kernel BUG at arch/x86/mm/physaddr.c:LINE! (5) C done 241 563d 636d 559d 57d38f26d81e vt: fix unicode console freeing with a common interface
WARNING: refcount bug in crypto_destroy_tfm C done 4 638d 661d 559d 6603523bf5e4 crypto: api - Fix use-after-free and race in crypto_spawn_alg
general protection fault in inet_unhash C done 40 580d 609d 559d 02c71b144c81 l2tp: do not use inet_hash()/inet_unhash()
BUG: unable to handle kernel NULL pointer dereference in direct_page_fault 1 589d 585d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
linux-next boot error: WARNING: suspicious RCU usage in bpq_device_event 6 622d 623d 559d 95f59bf88bb7 drivers: net: hamradio: Fix suspicious RCU usage warning in bpqether.c
BUG: unable to handle kernel NULL pointer dereference in try_async_pf 1 589d 585d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
BUG: unable to handle kernel NULL pointer dereference in unlock_page 1 591d 591d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: use-after-free Read in rpc_net_ns syz done 10 624d 630d 559d 31e9a7f35352 SUNRPC: fix use-after-free in rpc_free_client_work()
WARNING in tipc_msg_append C done 107 585d 600d 559d c9aa81faf191 tipc: fix kernel WARNING in tipc_msg_append()
BUG: unable to handle kernel NULL pointer dereference in __es_insert_extent 1 591d 591d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
bpf-next test error: BUG: using smp_processor_id() in preemptible code in ext4_mb_new_blocks 90 589d 595d 559d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
general protection fault in cfg80211_dev_rename 1 629d 624d 559d 0bbab5f03015 cfg80211: fix debugfs rename crash
KASAN: slab-out-of-bounds Read in garmin_read_process C 1 677d 677d 559d e9b3c610a05c USB: serial: garmin_gps: add sanity checking for data length
net-next test error: BUG: using smp_processor_id() in preemptible code in corrupted 4 592d 594d 559d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KASAN: use-after-free Read in usbhid_close (3) C 6 633d 660d 559d 0ed08faded1d HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
BUG: unable to handle kernel NULL pointer dereference in kvm_vm_ioctl 1 589d 589d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in skb_clone (3) 44 609d 611d 559d 239174945dac tcp: tcp_v4_err() icmp skb is named icmp_skb
kernel BUG at arch/x86/kvm/mmu/mmu.c:LINE! (2) C done 46328 579d 611d 559d 7d2e8748af62 KVM: x86: Initialize tdp_level during vCPU creation
KMSAN: uninit-value in do_tcp_getsockopt 5 571d 623d 559d e776af608f69 net-backports: tcp: fix error recovery in tcp_zerocopy_receive()
linux-next test error: WARNING: suspicious RCU usage in ipmr_device_event 24 641d 646d 559d a14fbcd4f157 ipmr: Fix RCU list debugging warning
net test error: KASAN: null-ptr-deref Write in x25_disconnect 12 639d 639d 559d 8999dc89497a net/x25: Fix null-ptr-deref in x25_disconnect
BUG: unable to handle kernel NULL pointer dereference in kvm_vcpu_gfn_to_memslot 1 588d 588d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
memory leak in genl_rcv_msg C 116 594d 784d 559d c36f05559104 genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()
KMSAN: uninit-value in __dev_get_by_name C 2 621d 621d 559d 687775cec056 ax25: fix setsockopt(SO_BINDTODEVICE)
general protection fault in start_creating C done 106 581d 610d 559d d56f5136b010 KVM: let kvm_destroy_vm_debugfs clean up vCPU debugfs directories
BUG: unable to handle kernel NULL pointer dereference in udc_bind_to_driver 1 587d 587d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_node_cpus (2) 9 627d 794d 559d 314eeb43e5f2 rcu: Add *_ONCE() and data_race() to rcu_node ->exp_tasks plus locking
bpf test error: KASAN: null-ptr-deref Write in x25_disconnect 78 626d 639d 559d 8999dc89497a net/x25: Fix null-ptr-deref in x25_disconnect
KASAN: slab-out-of-bounds Read in fl6_update_dst C done 43 580d 626d 559d bb986a50421a seg6: fix seg6_validate_srh() to avoid slab-out-of-bounds
general protection fault in __tipc_sendstream C done 444 579d 610d 559d 4c21daae3dbc tipc: Fix NULL pointer dereference in __tipc_sendstream() 5e9eeccc58f3 tipc: fix NULL pointer dereference in streaming
net test error: BUG: using smp_processor_id() in preemptible code in corrupted 3 590d 592d 559d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
KASAN: use-after-free Read in ath9k_wmi_ctrl_rx C 1 671d 671d 559d abeaa85054ff ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx
upstream test error: BUG: using smp_processor_id() in preemptible code in ext4_map_blocks 1 593d 593d 559d 811985365378 ext4: mballoc: Use this_cpu_read instead of this_cpu_ptr
general protection fault in sock_hash_free 1 603d 603d 559d 75e68e5bf2c7 bpf, sockhash: Synchronize delete from bucket list on map free
KASAN: slab-out-of-bounds Read in skb_gso_transport_seglen C done 4 629d 648d 559d 9274124f023b net: stricter validation of untrusted gso packets
BUG: unable to handle kernel NULL pointer dereference in local_bh_disable 1 589d 589d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
BUG: unable to handle kernel NULL pointer dereference in generic_perform_write (2) C done 3 655d 653d 559d 829b37b8cddb ext4: avoid race conditions when remounting with options that change dax
BUG: stack guard page was hit in update_stack_state 5 709d 723d 559d dd912306ff00 net: fix a potential recursive NETDEV_FEAT_CHANGE
WARNING: locking bug in dev_mc_seq_show C done 3 600d 611d 559d 845e0ebb4408 net: change addr_list_lock back to static key
general protection fault in inet_diag_bc_sk 12 634d 636d 559d ee1bd483cc06 inet_diag: bc: read cgroup id only for full sockets
general protection fault in selinux_socket_recvmsg C done 4 614d 614d 559d 0a82e230c688 mptcp: avoid NULL-ptr derefence on fallback
KMSAN: uninit-value in skbprio_enqueue syz 11 573d 637d 559d 2761121af87d net_sched: sch_skbprio: add message validation to skbprio_change()
general protection fault in ath9k_hif_usb_rx_cb C 913 559d 672d 559d 2bbcaaee1fcb ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb
BUG: soft lockup in wg_packet_tx_worker 1 631d 631d 559d df4953e4e997 sch_sfq: validate silly quantum values
INFO: rcu detected stall in wg_packet_tx_worker C done 24 588d 641d 559d df4953e4e997 sch_sfq: validate silly quantum values
linux-next test error: KASAN: use-after-free Write in afs_wake_up_async_call 111 585d 593d 559d 0041cd5a5044 rxrpc: Fix notification call on completion of discarded calls
BUG: unable to handle kernel NULL pointer dereference in smp_call_function_many_cond (2) 1 582d 582d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
KASAN: slab-out-of-bounds Read in br_mrp_parse C done 5 615d 617d 559d 617504c67e01 bridge: mrp: Fix out-of-bounds read in br_mrp_parse
BUG: unable to handle kernel NULL pointer dereference in __ext4_journal_start_sb 1 588d 588d 559d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
INFO: task hung in blkdev_issue_flush (2) C done error 3 781d 940d 576d 2b5c8f0063e4 nbd: replace kill_bdev() with __invalidate_device() again
KASAN: use-after-free Read in blkdev_direct_IO C done error 8 904d 909d 576d 0eb6ddfb865c block: Fix __blkdev_direct_IO() for bio fragments
KASAN: use-after-free Read in blkdev_bio_end_io C done error 13 894d 906d 576d 7b6620d7db56 block: remove REQ_NOWAIT_INLINE
KCSAN: data-race in tcp_add_backlog / tcp_try_rmem_schedule 3 838d 842d 576d ebb3b78db7bf tcp: annotate sk->sk_rcvbuf lockless reads
memory leak in bio_clone_fast C 1 898d 898d 576d 7b6620d7db56 block: remove REQ_NOWAIT_INLINE
WARNING: refcount bug in blk_mq_free_request (2) C done error 5 906d 906d 576d de6346ecbc8f nbd: protect cmd->status with cmd->lock
memory leak in bio_copy_user_iov C done 34 768d 954d 576d 3b7995a98ad7 block: fix memleak when __blk_rq_map_user_iov() is failed
WARNING in sk_stream_kill_queues (4) C done done 6 698d 702d 576d b6f6118901d1 ipv6: restrict IPV6_ADDRFORM operation
WARNING: bad unlock balance in get_user_pages_unlocked 1 664d 659d 578d c7b6a566b985 mm/gup: Mark lock taken only after a successful retake
WARNING in __mmdrop syz done 14 914d 923d 578d 3d2c7d370475 Revert "vhost: access vq metadata through kernel virtual address"
WARNING in wa_nep_create/usb_submit_urb C 114 648d 932d 578d caa6772db4c1 Staging: remove wusbcore and UWB from the kernel tree.
upstream boot error: KASAN: slab-out-of-bounds Write in virtio_gpu_object_create 6 652d 661d 578d b513b0d4563a drm/virtio: fix OOB in virtio_gpu_object_create
WARNING in kfree (2) syz done done 1 688d 688d 578d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
WARNING in hwarc_neep_init/usb_submit_urb C 1 682d 682d 578d caa6772db4c1 Staging: remove wusbcore and UWB from the kernel tree.
BUG: corrupted list in __uwb_rc_neh_rm C 9 654d 689d 578d caa6772db4c1 Staging: remove wusbcore and UWB from the kernel tree.
KASAN: null-ptr-deref Write in blk_mq_map_swqueue C done 3 672d 672d 581d d0930bb8f46b blk-mq: Fix a recently introduced regression in blk_mq_realloc_hw_ctxs()
KASAN: use-after-free Read in chaoskey_disconnect C 44 791d 820d 587d 93ddb1f56ae1 USB: chaoskey: fix use-after-free on release
KMSAN: uninit-value in etf_enqueue_timesortedlist 3 629d 636d 588d a1211bf9a777 sched: etf: do not assume all sockets are full blown
KMSAN: uninit-value in audit_log_vformat (2) C 104 628d 647d 588d 763dafc520ad audit: check the length of userspace generated audit records
general protection fault in macvlan_device_event 86 637d 651d 588d 4dee15b4fd0d macvlan: fix null dereference in macvlan_device_event()
WARNING in __vm_enough_memory (2) syz done 6 649d 652d 588d dadbd85f2afc mm: Fix MREMAP_DONTUNMAP accounting on VMA merge
WARNING in hwsim_new_radio_nl C done 3 654d 657d 588d 7ea862048317 mac80211_hwsim: Use kstrndup() in place of kasprintf()
KASAN: invalid-free in nf_tables_newset C done 21 651d 666d 588d 7fb6f78df700 netfilter: nf_tables: do not leave dangling pointer in nf_tables_set_alloc_name
WARNING: bad unlock balance in mptcp_poll C done 10 653d 656d 588d e154659ba39a mptcp: fix double-unlock in mptcp_poll
KASAN: use-after-free Read in dput (2) syz done 4 652d 652d 588d 4fa3b1c41737 proc: Handle umounts cleanly
possible deadlock in user_shm_lock 12 616d 654d 588d ea0dfeb4209b shmem: fix possible deadlocks on shmlock_user_lock
possible deadlock in shmem_mfill_atomic_pte C done 82 615d 667d 588d 94b7cc01da5a mm: shmem: disable interrupt when acquiring info->lock in userfaultfd_copy path
KASAN: slab-out-of-bounds Read in __kvm_gfn_to_hva_cache_init C done 1537 615d 660d 588d b6467ab142b7 KVM: Check validity of resolved slot when searching memslots
WARNING in set_precision (2) C done 117 650d 748d 588d 7ea862048317 mac80211_hwsim: Use kstrndup() in place of kasprintf()
INFO: rcu detected stall in io_uring_release syz 15 608d 649d 588d 3fd44c86711f io_uring: use cond_resched() in io_ring_ctx_wait_and_kill()
KASAN: use-after-free Read in report_sock_error 2 641d 646d 588d a1211bf9a777 sched: etf: do not assume all sockets are full blown
linux-next test error: WARNING: suspicious RCU usage in ovs_ct_exit 132 646d 684d 588d 27de77cec985 net: openvswitch: ovs_ct_exit to be done under ovs_lock
WARNING in nf_nat_unregister_fn 1 651d 650d 588d b4faef1739dd netfilter: nat: fix error handling upon registering inet hook
possible deadlock in shmem_uncharge C done 101 616d 655d 588d ea0dfeb4209b shmem: fix possible deadlocks on shmlock_user_lock
possible deadlock in ext4_evict_inode syz error error 38 1200d 1239d 615d e5bfad3d7acc smack: use GFP_NOFS while holding inode_smack::smk_lock
general protection fault in kobject_get 4 630d 696d 627d 5bdfa854013c RDMA/mad: Do not crash if the rdma device does not have a umad interface
KASAN: use-after-free Write in tcindex_set_parms C done 13 668d 688d 627d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
WARNING: kobject bug in add_one_compat_dev 2 698d 700d 627d f2f2b3bbf0d9 RDMA/core: Fix missing error check on dev_set_name()
possible deadlock in io_submit_one (3) syz done 45 657d 664d 627d 63f818f46af9 proc: Use a dedicated lock in struct pid
INFO: task hung in io_queue_file_removal C done 16 669d 677d 627d 4afdb733b160 io-uring: drop completion when removing file
KASAN: slab-out-of-bounds Write in tcindex_set_parms C done 10 668d 690d 627d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in tcindex_dump syz 1 690d 688d 627d b1be2e8cd290 net_sched: hold rtnl lock in tcindex_partial_destroy_work()
KMSAN: uninit-value in simple_attr_read C 6 630d 700d 627d a65cab7d7f05 libfs: fix infoleak in simple_attr_read()
general protection fault in macsec_upd_offload C done 5 666d 665d 627d aa81700cf232 macsec: fix NULL dereference in macsec_upd_offload()
general protection fault in hfsc_unbind_tcf 1 679d 675d 627d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
memory leak in erase_aeb C 109 627d 781d 627d c16f39d14a7e ubi: fastmap: Free unused fastmap anchor peb during detach
BUG: unable to handle kernel NULL pointer dereference in handle_external_interrupt_irqoff C done 6404 671d 676d 627d 428b8f1d9f92 KVM: VMX: don't allow memory operands for inline asm that modifies SP
possible deadlock in send_sigurg C done 65 651d 664d 627d 63f818f46af9 proc: Use a dedicated lock in struct pid
WARNING: bad unlock balance in ucma_event_handler C done 143 660d 1324d 627d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING in geneve_exit_batch_net (2) C done 9 674d 698d 627d 0fda7600c2e1 geneve: move debug check after netdev unregister
general protection fault in fbcon_switch 1 671d 671d 627d b139f8b00db4 fbcon: fix null-ptr-deref in fbcon_switch
KASAN: invalid-free in tcf_exts_destroy C done 1 690d 690d 627d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in __hrtimer_run_queues C done 299 660d 667d 627d 73d20564e0dc hrtimer: Don't dereference the hrtimer pointer after the callback
WARNING: bad unlock balance in ucma_destroy_id syz done 44 694d 1248d 627d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING: bad unlock balance in __get_user_pages_remote C done 15 659d 660d 627d c7b6a566b985 mm/gup: Mark lock taken only after a successful retake
INFO: trying to register non-static key in __io_uring_register C done 39 659d 660d 627d f7fe9346869a io_uring: initialize fixed_file_data lock
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user C done 1 669d 668d 627d a1a7e3a36e01 xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
KASAN: stack-out-of-bounds Write in mpol_to_str C done 23 669d 672d 627d aa9f7d5172fa mm: mempolicy: require at least one nodeid for MPOL_PREFERRED
general protection fault in do_tcp_getsockopt (2) C done 1 679d 679d 627d 6cd6cbf593bf net-backports: tcp: repair: fix TCP_QUEUE_SEQ implementation
KASAN: use-after-free Read in addr_handler syz done 12 659d 1141d 627d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
INFO: trying to register non-static key in io_cqring_ev_posted (2) C done 42 630d 667d 627d 10bea96dcc13 io_uring: add missing finish_wait() in io_sq_thread()
KASAN: use-after-free Read in cma_cancel_operation C done 617 715d 1395d 627d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
BUG: unable to handle kernel paging request in kernel_get_mempolicy C done 1 664d 661d 627d ba841078cd05 mm/mempolicy: Allow lookup_node() to handle fatal signal
WARNING: ODEBUG bug in rfcomm_dev_ioctl 1 691d 691d 627d 71811cac8532 Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
KASAN: slab-out-of-bounds Read in cgroup_file_notify C done 1 692d 688d 627d 726b7bbeafd4 hugetlb_cgroup: fix illegal access to memory
WARNING: refcount bug in __tcf_action_put syz 1 688d 688d 627d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
KASAN: use-after-free Read in rdma_listen (2) C done 354 665d 1034d 627d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING: kobject bug in ib_register_device C done 14 665d 703d 627d 7aefa6237cfe RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET
general protection fault in ethnl_parse_header C done 9 674d 679d 627d 55b474c41e58 netlink: check for null extack in cookie helpers
WARNING in vcpu_enter_guest syz done 19 677d 790d 627d d33294541889 KVM: x86: remove bogus user-triggerable WARN_ON
general protection fault in hsr_addr_is_self (2) 1 679d 678d 627d 3a303cfdd28d hsr: fix general protection fault in hsr_addr_is_self()
linux-next test error: KASAN: use-after-free Read in l2cap_sock_release 12 722d 724d 627d 2a154903cec2 Bluetooth: prefetch channel before killing sock
possible deadlock in send_sigio C done 7 655d 663d 627d 63f818f46af9 proc: Use a dedicated lock in struct pid
WARNING: ODEBUG bug in __init_work syz done 1 675d 675d 627d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
WARNING in call_rcu C done 8 681d 688d 627d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
WARNING: ODEBUG bug in prism2sta_disconnect_usb 1 676d 675d 627d a1f165a6b738 staging: wlan-ng: fix ODEBUG bug in prism2sta_disconnect_usb
WARNING: ODEBUG bug in tcf_queue_work C done 30 693d 693d 627d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
WARNING in __blk_mq_delay_run_hw_queue C done error 6 740d 845d 627d 6e66b4939241 blk-mq: Keep set->nr_hw_queues and set->map[].nr_queues in sync
general protection fault in qdisc_hash_add C done 47 685d 686d 627d 7c4046b1c53b Revert "net: sched: make newly activated qdiscs visible"
WARNING: refcount bug in tcindex_data_put C done 27 663d 665d 627d a8eab6d35e22 net_sched: fix a missing refcnt in tcindex_init()
KASAN: use-after-free Read in route4_get C 8 655d 685d 627d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
KASAN: use-after-free Read in __list_del_entry_valid (4) C done 16 716d 1403d 627d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
general protection fault in erspan_netlink_parms C done 5 682d 682d 627d 32ca98feab8c net: ip_gre: Accept IFLA_INFO_DATA-less configuration
WARNING in kernfs_create_dir_ns C done done 3 682d 943d 627d 810507fe6fd5 locking/lockdep: Reuse freed chain_hlocks entries
WARNING in af_alg_make_sg C done 13 659d 659d 627d ae46d2aa6a7f mm/gup: Let __get_user_pages_locked() return -EINTR for fatal signal
general protection fault in rdma_listen (2) syz done 104 665d 1177d 627d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
WARNING in kernfs_new_node C done done 2 682d 906d 627d 810507fe6fd5 locking/lockdep: Reuse freed chain_hlocks entries
possible deadlock in cma_netdev_callback C done 1399 659d 701d 627d 33fb27fd5446 RDMA/siw: Fix passive connection establishment
WARNING: refcount bug in sctp_wfree C done 20 667d 688d 627d 5c3e82fe1596 sctp: fix refcount bug in sctp_wfree
WARNING in ext4_write_inode 13 694d 701d 627d 10a98cb16d80 xfs: clear PF_MEMALLOC before exiting xfsaild thread
BUG: corrupted list in rdma_listen C 202 800d 1379d 627d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
possible deadlock in free_ioctx_users (2) C done 44 657d 664d 627d 63f818f46af9 proc: Use a dedicated lock in struct pid
WARNING: ODEBUG bug in route4_change C done 68 664d 688d 627d ef299cc3fa1a net_sched: cls_route: remove the right filter from hashtable
KASAN: use-after-free Read in tty_open C done done 8 674d 785d 627d ca4463bf8438 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: slab-out-of-bounds Read in edge_interrupt_callback C 1 676d 675d 627d 57aa9f294b09 USB: serial: io_edgeport: fix slab-out-of-bounds read in edge_interrupt_callback
KMSAN: uninit-value in tcf_exts_change C 5 678d 688d 627d 0d1c3530e1bd net_sched: keep alloc_hash updated after hash allocation
BUG: sleeping function called from invalid context in kmem_cache_alloc_node_trace C done 364 689d 691d 627d 138470a9b2cc net/sched: act_ct: fix lockdep splat in tcf_ct_flow_table_get
KASAN: use-after-free Write in release_tty C done 591 664d 786d 627d ca4463bf8438 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
WARNING: ODEBUG bug in tcindex_destroy_work (3) syz done 13 666d 702d 627d 304e024216a8 net_sched: add a temporary refcnt for struct tcindex_data
KASAN: slab-out-of-bounds Read in hfa384x_usbin_callback C 1 678d 678d 627d 1165dd73e811 staging: wlan-ng: fix use-after-free Read in hfa384x_usbin_callback
KMSAN: uninit-value in macsec_handle_frame 1 677d 677d 627d b06d072ccc4b macsec: restrict to ethernet devices
WARNING: refcount bug in igmp_start_timer syz done done 19 892d 1258d 650d 323ebb61e32b net: use listified RX for handling GRO_NORMAL skbs
possible deadlock in sch_direct_xmit C done done 1548 793d 1472d 650d 323ebb61e32b net: use listified RX for handling GRO_NORMAL skbs
KASAN: use-after-free Read in alloc_netdev_mqs 1 713d 713d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in __iptunnel_pull_header C 12 683d 692d 652d 17c25cafd4d3 gre: fix uninit-value in __iptunnel_pull_header
KASAN: use-after-free Read in inet_gifconf 24 706d 712d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
INFO: task hung in hashlimit_mt_check_common C done 20 708d 748d 652d 8d0015a7ab76 netfilter: xt_hashlimit: limit the max size of hashtable c4a3922d2d20 netfilter: xt_hashlimit: reduce hashlimit_mutex scope for htable_put()
divide error in wg_packet_encrypt_worker C done 12 706d 713d 652d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
WARNING in idr_destroy C done 5 680d 695d 652d b216a8e7908c drm/lease: fix WARNING in idr_destroy
BUG: soft lockup in sys_exit_group C 6 677d 700d 652d d683469b3c93 ALSA: line6: Fix endless MIDI read loop
KASAN: use-after-free Read in ipv6_get_ifaddr 1 709d 709d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in inet_lookup_ifaddr_rcu 2 706d 708d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Write in hiddev_disconnect 20 679d 744d 652d 5c02c447eaed HID: hiddev: Fix race in in hiddev_disconnect()
KMSAN: use-after-free in netdev_state_change 2 696d 696d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in audit_receive C 4 703d 703d 652d 756125289285 audit: always check the netlink payload length in audit_receive_msg()
WARNING: lock held when returning to user space in ovl_write_iter C done 6 682d 697d 652d c853680453ac ovl: fix lockdep warning for async write
general protection fault in vt_ioctl 1 717d 717d 652d 6cd1ed50efd8 net-backports: vt: vt_ioctl: fix race in VT_RESIZEX
KASAN: use-after-free Read in percpu_ref_switch_to_atomic_rcu 5 698d 720d 652d c1e2148f8ecb io_uring: free fixed_file_data after RCU grace period
KASAN: use-after-free Read in rtnl_fill_ifinfo (2) 2 710d 712d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
INFO: task hung in hashlimit_net_exit syz done 53 706d 714d 652d 8d0015a7ab76 netfilter: xt_hashlimit: limit the max size of hashtable
kernel BUG at arch/x86/mm/physaddr.c:LINE! (4) C 18 671d 705d 652d 2ad3e17ebf94 audit: fix error handling in audit_data_to_entry()
KMSAN: uninit-value in slhc_compress C 3 695d 694d 652d 110a40dfb708 slip: make slhc_compress() more robust against malicious packets
WARNING: proc registration bug in hashlimit_mt_check_common C done 320 692d 717d 652d 99b79c3900d4 netfilter: xt_hashlimit: unregister proc file before releasing mutex
linux-next test error: WARNING in snd_pcm_plug_alloc 3 686d 686d 652d 5461e0530c22 ALSA: pcm: oss: Remove WARNING from snd_pcm_plug_alloc() checks
WARNING: ODEBUG bug in smc_ib_remove_dev 52 682d 696d 652d ece0d7bd7461 net/smc: cancel event worker during device removal
memory leak in dma_buf_ioctl C done 129 702d 918d 652d d1f37226431f dma-buf: free dmabuf->name in dma_buf_release()
KASAN: use-after-free Read in netdev_state_change 2 710d 711d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KCSAN: data-race in snd_seq_check_queue / snd_seq_control_queue 97 653d 751d 652d bb51e669fa49 ALSA: seq: Avoid concurrent access to queue flags
INFO: trying to register non-static key in xa_destroy C done 46 675d 702d 652d 12e5eef0f4d8 RDMA/siw: Fix failure handling during device creation
BUG: unable to handle kernel NULL pointer dereference in inet_release syz 3 701d 702d 652d b6f6118901d1 ipv6: restrict IPV6_ADDRFORM operation
INFO: rcu detected stall in ip_set_uadd C done 11 697d 734d 652d f66ee0410b1c netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
general protection fault in batadv_iv_ogm_schedule 2 705d 719d 652d 8e8ce08198de batman-adv: Don't schedule OGM for disabled interface
INFO: task hung in paste_selection C inconclusive done 8 718d 783d 652d e8c75a30a23c vt: selection, push sel_lock up
BUG: unable to handle kernel paging request in ethnl_update_bitset32 C 168 692d 703d 652d e34f1753eebc ethtool: limit bitset size
KASAN: use-after-free Read in ipv6_chk_addr_and_flags 1 711d 711d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in find_match C 52 682d 711d 652d e08ad80551b4 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in vgem_gem_dumb_create C done 15 715d 727d 652d 4b848f20eda5 drm/vgem: Close use-after-free race in vgem_gem_create
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache 2 722d 720d 652d 457fed775c97 net/smc: fix leak of kernel memory to user space
memory leak in nf_tables_parse_netdev_hooks (2) C 2 691d 696d 652d 2d285f26ecd0 netfilter: nf_tables: free flowtable hooks on hook register error
KMSAN: uninit-value in bond_alb_xmit syz 3 693d 694d 652d b7469e83d2ad bonding/alb: make sure arp header is pulled before accessing it
divide error in encrypt_packet C done 89 705d 713d 652d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
general protection fault in smc_ib_remove_dev C done 98 692d 703d 652d a2f2ef4a54c0 net/smc: check for valid ib_client_data
possible deadlock in htab_lru_map_delete_node C done 264 705d 710d 652d b9aff38de2cb bpf: Fix a potential deadlock with bpf_map_do_batch
KMSAN: use-after-free in inet_gifconf 10 682d 705d 652d e08ad80551b4 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in ip6_dst_destroy C 2 685d 697d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KASAN: use-after-free Read in raw_notifier 3 710d 712d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
memory leak in fasync_helper C 14 720d 781d 652d 67f562e3e147 net/smc: transfer fasync_list in case of fallback
possible deadlock in tty_unthrottle 3 676d 700d 652d e8c75a30a23c vt: selection, push sel_lock up
possible deadlock in inet_csk_accept C done 992 686d 687d 652d 06669ea346e4 net: memcg: fix lockdep splat in inet_csk_accept()
KASAN: slab-out-of-bounds Read in ethnl_update_bitset32 syz 2 698d 703d 652d e34f1753eebc ethtool: limit bitset size
KMSAN: uninit-value in audit_log_vformat C 220 652d 703d 652d 756125289285 audit: always check the netlink payload length in audit_receive_msg()
KASAN: use-after-free Read in dev_get_by_index_rcu 1 707d 707d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
INFO: rcu detected stall in hash_ip4_gc C done 1 733d 732d 652d f66ee0410b1c netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
KCSAN: data-race in queue_access_lock / snd_seq_check_queue 58 692d 734d 652d bb51e669fa49 ALSA: seq: Avoid concurrent access to queue flags
KMSAN: kernel-infoleak in tty_compat_ioctl C 162 673d 703d 652d 17329563a97d tty: fix compat TIOCGSERIAL leaking uninitialized memory
BUG: sleeping function called from invalid context in __kmalloc C done 5 713d 720d 652d b27a939e8376 ceph: canonicalize server path in place
INFO: rcu detected stall in ip_set_udel C done 12 711d 734d 652d f66ee0410b1c netfilter: ipset: Fix "INFO: rcu detected stall in hash_xxx" reports
general protection fault in ip_set_comment_free C done 19 695d 732d 652d 8af1c6fbd923 netfilter: ipset: Fix forceadd evaluation path
possible deadlock in bond_get_stats (3) syz done 2 706d 706d 652d b3e80d44f5b1 bonding: fix lockdep warning in bond_get_stats()
general protection fault in batadv_iv_ogm_schedule_buff 24 688d 711d 652d 8e8ce08198de batman-adv: Don't schedule OGM for disabled interface
KMSAN: use-after-free in veth_xmit 8 682d 698d 652d e08ad80551b4 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in kstrdup C 8 688d 715d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
possible deadlock in sidtab_sid2str_put C done 1382 714d 730d 652d 39a706fbcf26 selinux: fix sidtab string cache locking
KCSAN: data-race in __snd_rawmidi_transmit_ack / snd_rawmidi_write 168 653d 779d 652d dfa9a5efe8b9 ALSA: rawmidi: Avoid bit fields for state flags
KASAN: use-after-free Read in vsscanf 2 708d 710d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in n_tty_receive_buf_common C done 68 707d 783d 652d 07e6124a1a46 vt: selection, close sel_buffer race
KASAN: use-after-free Read in ethnl_update_bitset32 C done 6 696d 703d 652d e34f1753eebc ethtool: limit bitset size
KASAN: use-after-free Read in fib_nexthop_info 1 711d 711d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
general protection fault in nf_flow_table_offload_setup C done done 835 706d 739d 652d a7da92c2c8a1 netfilter: flowtable: skip offload setup if disabled
memory leak in nfs_fs_context_parse_monolithic C 18 686d 713d 652d 75a9b9176157 NFS: Fix leak of ctx->nfs_server.hostname
KASAN: slab-out-of-bounds Read in inet_gifconf 2 712d 712d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KASAN: use-after-free Read in find_match C done 142 705d 712d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in fat_evict_inode C 256 682d 706d 652d bc87302a093f fat: fix uninit-memory access for partial initialized inode
KASAN: use-after-free Read in br_dev_xmit 1 701d 701d 652d 823d81b0fa2c net: bridge: fix stale eth hdr pointer in br_dev_xmit
KASAN: use-after-free Read in ip6_dst_destroy C done 1 711d 711d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
WARNING: bad unlock balance in ovl_llseek C done 4 683d 697d 652d 531d3040bc5c ovl: fix lock in ovl_llseek()
KASAN: use-after-free Read in l3mdev_master_ifindex_rcu C done done 13 708d 713d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: slab-out-of-bounds Read in resample_shrink C done 5 674d 692d 652d f2ecf903ef06 ALSA: pcm: oss: Avoid plugin buffer overflow
general protection fault in nldev_stat_set_doit C done 8 685d 702d 652d 78f34a16c286 RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing
kernel panic: stack is corrupted in vhost_net_ioctl C done 2 712d 798d 652d 42d84c8490f9 vhost: Check docket sk_family instead of call getname
KASAN: use-after-free Read in __neigh_notify 2 711d 711d 652d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr C done 8 692d 702d 652d dc24f8b4ecd3 mptcp: add dummy icsk_sync_mss()
INFO: task hung in lock_sock_nested (2) C done 418 692d 705d 652d 3f74957fcbea vsock: fix potential deadlock in transport->release()
KMSAN: use-after-free in l3mdev_master_ifindex_rcu C 5 682d 706d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
unregister_netdevice: waiting for DEV to become free (3) C 1864 652d 713d 652d e34f1753eebc ethtool: limit bitset size
KMSAN: use-after-free in dev_alloc_name_ns 3 682d 696d 652d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KCSAN: data-race in snd_seq_prioq_cell_out / snd_seq_timer_interrupt 118 653d 747d 652d dc7497795e01 ALSA: seq: Fix concurrent access to queue current tick/time
KASAN: use-after-free Read in mld_in_v1_mode C done 3 710d 713d 652d e08ad80551b4 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
possible deadlock in bpf_lru_push_free C done 609 705d 711d 652d b9aff38de2cb bpf: Fix a potential deadlock with bpf_map_do_batch
WARNING in switch_fpu_return syz done done 11 723d 756d 673d 2620fe268e80 KVM: x86: Revert "KVM: X86: Fix fpu state crash in kvm guest"
KMSAN: use-after-free in rdma_listen C 26 693d 839d 673d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen C 28 850d 1215d 673d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
KASAN: slab-out-of-bounds Read in bitmap_ip_add syz done done 7 728d 739d 673d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
general protection fault in __nf_tables_chain_type_lookup 1 738d 737d 679d 826035498ec1 netfilter: nf_tables: add __nft_chain_type_get()
KASAN: slab-out-of-bounds Read in bitmap_ip_ext_cleanup C done done 8 722d 738d 681d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_port_ext_cleanup C done done 10 731d 739d 681d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
BUG: corrupted list in __nf_tables_abort C done done 29 733d 740d 681d eb014de4fd41 netfilter: nf_tables: autoload modules from the abort path
KASAN: slab-out-of-bounds Read in bitmap_ipmac_destroy C done done 2 734d 734d 681d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_ipmac_gc C done done 70 722d 738d 681d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
BUG: unable to handle kernel paging request in ion_heap_sglist_zero 1 787d 786d 681d d98c9e83b5e7 kasan: fix crashes on access to memory mapped by vm_map_ram()
KASAN: slab-out-of-bounds Read in bitmap_ipmac_ext_cleanup C unreliable done 15 723d 738d 681d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Read in bitmap_port_destroy C done done 2 735d 734d 681d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
general protection fault in gcmaes_crypt_by_sg (2) C error done 28 738d 785d 687d db885e66d268 net/tls: fix async operation
possible deadlock in wg_noise_handshake_create_initiation C done 11 720d 724d 687d ec31c2676a10 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in slcan_open C done 2 788d 787d 687d 9ebd796e2400 can: slcan: Fix use-after-free Read in slcan_open
kernel BUG at fs/btrfs/volumes.c:LINE! 130 792d 1331d 687d 321f69f86a0f btrfs: reset device back to allocation state when removing
BUG: unable to handle kernel paging request in slhc_free C done done 177 1008d 1125d 687d baf76f0c58ae slip: make slhc_free() silently accept an error pointer
WARNING in _chaoskey_fill/usb_submit_urb C 15 804d 857d 687d 92aa5986f4f7 USB: chaoskey: fix error case of a timeout
KASAN: slab-out-of-bounds Read in iov_iter_alignment C error error 79 787d 784d 687d e0ff126ee7ad pipe: Fix bogus dereference in iov_iter_alignment()
possible deadlock in wg_set_device C done 33 719d 724d 687d ec31c2676a10 wireguard: noise: reject peers with low order public keys
WARNING: ODEBUG bug in io_sqe_files_unregister C done 964 721d 768d 687d 2faf852d1be8 io_uring: cleanup fixed file data table references
WARNING in flexcop_usb_probe/usb_submit_urb C 4 852d 890d 687d 1b976fc6d684 media: b2c2-flexcop-usb: add sanity checking
linux-next build error (7) 7 732d 736d 687d ac6119e7f25b efi/x86: Disable instrumentation in the EFI runtime handling code
BUG: unable to handle kernel paging request in xfs_sb_read_verify 69 770d 789d 692d d98c9e83b5e7 kasan: fix crashes on access to memory mapped by vm_map_ram()
BUG: unable to handle kernel paging request in ion_heap_clear_pages C 4378 769d 789d 692d d98c9e83b5e7 kasan: fix crashes on access to memory mapped by vm_map_ram()
KASAN: use-after-free Read in bitmap_ip_ext_cleanup C done done 2 739d 739d 705d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: use-after-free Read in bitmap_ipmac_ext_cleanup C done done 2 738d 738d 705d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: slab-out-of-bounds Write in bitmap_ip_del C done done 7 736d 738d 705d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KASAN: use-after-free Read in bitmap_ip_destroy C done done 1 739d 738d 708d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
upstream boot error: KASAN: slab-out-of-bounds Write in hpet_alloc 33 727d 728d 709d 98c49f1746ac char: hpet: Fix out-of-bounds read bug
KMSAN: uninit-value in setup_udp_tunnel_sock C 1 737d 737d 709d 940ba1498665 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
WARNING in nft_request_module C done 7 742d 742d 709d 9332d27d7918 netfilter: nf_tables: remove WARN and add NLA_STRING upper limits
memory leak in reiserfs_fill_super C 20 728d 777d 709d 5474ca7da6f3 reiserfs: Fix memory leak of journal device string
WARNING: lock held when returning to user space in tun_get_user (2) 7 725d 736d 709d 1efba987c486 net-backports: tun: add mutex_unlock() call and napi.skb clearing in tun_get_user()
memory leak in kobject_set_name_vargs (2) C done 47 734d 918d 709d cb626bf566eb net-sysfs: Fix reference count leak
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_cpus 7 721d 815d 709d c51f83c315c3 rcu: Use READ_ONCE() for ->expmask in rcu_read_unlock_special()
KASAN: slab-out-of-bounds Read in bitmap_port_gc C done 197 722d 740d 709d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
KMSAN: uninit-value in can_receive C 14 712d 801d 709d e7153bf70c34 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
memory leak in _sctp_make_chunk C 1 773d 773d 709d be7a77292077 sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY
WARNING in devlink_port_type_warn 2340 739d 811d 709d 4c582234ab39 devlink: Wait longer before warning about unset port type
BUG: unable to handle kernel NULL pointer dereference in x25_connect 1 783d 782d 709d e21dba7a4df4 net/x25: fix nonblocking connect
KASAN: user-memory-access Write in video_usercopy 3 749d 750d 709d 1dc8b65c944e media: v4l2-core: only zero-out ioctl-read buffers
BUG: unable to handle kernel NULL pointer dereference in cfg80211_wext_siwrts 3 739d 748d 709d 24953de0a5e3 cfg80211: check for set_wiphy_params
KASAN: null-ptr-deref Write in x25_connect 1 788d 783d 709d e21dba7a4df4 net/x25: fix nonblocking connect
KASAN: slab-out-of-bounds Read in bitmap_ip_list C 85 724d 740d 709d 32c72165dbd0 netfilter: ipset: use bitmap infrastructure completely
kernel BUG at fs/namei.c:LINE! 3593 744d 744d 709d c64cd6e34ea3 reimplement path_mountpoint() with less magic
KASAN: use-after-free Read in bitmap_port_ext_cleanup C done 11 739d 748d 709d c120959387ef netfilter: fix a use-after-free in mtype_destroy()
KMSAN: uninit-value in sd_init (2) C 94 815d 811d 709d de89d0864f66 media: gspca: zero usb_buf
KMSAN: uninit-value in __request_module (3) C 58 710d 738d 709d 36d79af7fb59 net-backports: net_sched: use validated TCA_KIND attribute in tc_new_tfilter()
KMSAN: uninit-value in rsvp_change C 4 729d 730d 709d cb3c0e6bdf64 cls_rsvp: fix rsvp_policy
BUG: unable to handle kernel paging request in rhashtable_replace_fast 2 735d 742d 709d 41cdc741048b netdevsim: fix nsim_fib6_rt_create() error path
KASAN: use-after-free Read in __nf_tables_abort C done 3 736d 738d 709d eb014de4fd41 netfilter: nf_tables: autoload modules from the abort path
KASAN: use-after-free Read in rsi_rx_done_handler