syzbot


fixed (1343):
Title Repro Bisected Count Last Reported Closed Patch
KASAN: slab-out-of-bounds Read in linear_transfer (2) 1 72d 63d 19h03m ca0214ee ALSA: pcm: Fix possible OOB access in PCM oss plugins
KASAN: slab-out-of-bounds Read in rhashtable_walk_enter C yes 48 34d 38d 19h03m 526f5b85 tipc: fix modprobe tipc failed after switch order of device registration
BUG: spinlock bad magic in rhashtable_walk_enter C yes 8 34d 38d 19h03m 526f5b85 tipc: fix modprobe tipc failed after switch order of device registration
KASAN: use-after-free Write in check_and_subscribe_port 1 55d 49d 19h03m 7c32ae35 ALSA: seq: Cover unsubscribe_port() in list_mutex
WARNING: proc registration bug in snd_info_card_register C 453 30d 74d 19h03m 0b074ab7 ALSA: line6: Assure canceling delayed work at disconnection
KASAN: slab-out-of-bounds Write in default_read_copy_kernel C yes 3 121d 197d 19h03m ca0214ee ALSA: pcm: Fix possible OOB access in PCM oss plugins
INFO: task hung in __ia32_sys_io_uring_enter 2 71d 72d 2d06h b19062a5 io_uring: fix possible deadlock between io_uring_{enter,register}
INFO: task hung in __x64_sys_io_uring_enter 12 65d 72d 2d06h b19062a5 io_uring: fix possible deadlock between io_uring_{enter,register}
general protection fault in sctp_sched_dequeue_common (2) C yes 3 103d 102d 2d06h 2e990dfd sctp: remove sched init from sctp_stream_init
WARNING in ovl_instantiate syz yes 75 58d 226d 2d06h 146d62e5 ovl: detect overlapping layers acf3062a ovl: relax WARN_ON() for overlapping layers use case
general protection fault in sisusb_probe C 3 44d 47d 5d13h 9a5729f6 USB: sisusbvga: fix oops in error path of sisusb_probe
INFO: task hung in __get_super C 80 5d15h 450d 5d13h 33ec3e53 loop: Don't change loop device under exclusive opener
KASAN: slab-out-of-bounds Write in usb_get_bos_descriptor syz 3 33d 45d 5d13h a03ff544 USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor
KASAN: invalid-free in disconnect_rio C 180 29d 74d 5d13h 3864d339 USB: rio500: refuse more than one device at a time
general protection fault in smsusb_init_device C 23 29d 68d 5d13h 31e0456d media: usb: siano: Fix general protection fault in smsusb
memory leak in packet_setsockopt C 10 18d 35d 5d13h afa0925c packet: unconditionally free po->rollover
KASAN: wild-memory-access Read in refcount_sub_and_test_checked 2 25d 41d 7d00h 61fb0d01 ipv6: prevent possible fib6 leaks
KASAN: use-after-free Read in ip6_fragment 1 37d 37d 7d00h 61fb0d01 ipv6: prevent possible fib6 leaks
BUG: unable to handle kernel NULL pointer dereference in ip6_rcv_finish 3 13d 41d 7d00h 61fb0d01 ipv6: prevent possible fib6 leaks
KASAN: use-after-free Write in fib6_purge_rt 2 32d 39d 7d00h 61fb0d01 ipv6: prevent possible fib6 leaks
KASAN: null-ptr-deref Write in fib6_purge_rt 18 20d 43d 7d00h 61fb0d01 ipv6: prevent possible fib6 leaks
KASAN: use-after-free Read in napi_gro_frags C yes 16 25d 27d 7d00h a4270d67 net-gro: fix use-after-free read in napi_gro_frags()
memory leak in ip_mc_add_src C 14 11d 35d 7d00h 3580d04a ipv4/igmp: fix another memory leak in igmpv3_del_delrec()
memory leak in process_preds C 1 29d 28d 7d00h dfb4a6f2 tracing: Avoid memory leak in predicate_parse()
memory leak in llc_ui_create C 4 16d 29d 7d00h 8fb44d60 llc: fix skb leak in llc_build_and_send_ui_pkt()
memory leak in inet_create C 2 20d 35d 7d00h 100f6d8e net: correct zerocopy refcnt with udp MSG_MORE
KASAN: slab-out-of-bounds Write in fib6_purge_rt 6 7d15h 43d 7d00h 61fb0d01 ipv6: prevent possible fib6 leaks
INFO: trying to register non-static key in rhashtable_walk_enter C 16 34d 38d 7d00h 526f5b85 tipc: fix modprobe tipc failed after switch order of device registration
KASAN: use-after-free Read in __dev_map_entry_free C 473 89d 370d 7d00h 2baae354 bpf: devmap: fix use-after-free Read in __dev_map_entry_free
KASAN: null-ptr-deref Write in submit_audio_out_urb C 185 13d 29d 7d00h 0b074ab7 ALSA: line6: Assure canceling delayed work at disconnection
INFO: task hung in usb_kill_urb C 1515 68d 74d 11d 50896c41 USB: dummy-hcd: Fix failure to give back unlinked URBs USB: dummy-hcd: Fix failure to give back unlinked URBs
KASAN: use-after-free Read in snd_seq_timer_interrupt 1 244d 244d 11d fe1b26c9 ALSA: timer: Make snd_timer_close() really kill pending actions
general protection fault in do_move_mount 3 47d 47d 11d 05883eee do_move_mount(): fix an unsafe use of is_anon_ns()
KASAN: use-after-free Read in tipc_sk_filter_rcv C yes 3439 90d 96d 11d 77d5ad40 tipc: fix use-after-free in tipc_sk_filter_rcv
BUG: assuming atomic context at net/core/flow_dissector.c:LINE syz 19 41d 45d 11d b1c17a9a flow_dissector: disable preemption around BPF calls
general protection fault in load_elf_binary C yes 15 83d 88d 11d cc338010 fs/binfmt_elf.c: free PT_INTERP filename ASAP
INFO: task hung in snd_seq_kernel_client_ctl C yes 554 74d 75d 11d f0654ba9 Revert "ALSA: seq: Protect in-kernel ioctl calls with mutex"
BUG: unable to handle kernel paging request in isolate_freepages_block 3 55d 49d 11d 60fce36a mm/compaction.c: correct zone boundary handling when isolating pages from a pageblock
KASAN: use-after-free Read in snd_timer_process_callbacks C yes 4 76d 77d 11d df55531b ALSA: timer: Revert active callback sync check at close
WARNING in cma_exit_net 25 83d 85d 11d 061ccb52 RDMA/cma: Set proper port number as index
KASAN: use-after-free Read in snd_seq_ioctl_get_subscription 2 235d 267d 11d 2eabc5ec ALSA: seq: Fix race of get-subscription call vs port-delete ioctls
KASAN: use-after-free Read in tcp_v6_send_reset 1 91d 91d 11d 4f661542 tcp: fix zerocopy and notsent_lowat issues
WARNING in batadv_mcast_mla_update 75 42d 176d 11d a3c7cd0c batman-adv: mcast: fix multicast tt/tvlv worker locking
BUG: using __this_cpu_read() in preemptible code in ip6_finish_output C yes 18807 78d 83d 11d 28b05b92 net: use correct this_cpu primitive in dev_recursion_level
WARNING: ODEBUG bug in netdev_freemem syz yes 1042 11d 175d 11d a3c7cd0c batman-adv: mcast: fix multicast tt/tvlv worker locking
WARNING: locking bug in nfs_get_client C yes 13 46d 47d 11d c260121a NFS: Fix a double unlock from nfs_match,get_client
WARNING: locking bug in copy_process C yes 3 44d 46d 11d c3b7112d fork: do not release lock that wasn't taken
KASAN: use-after-free Read in string C 247 55d 294d 11d c03a0fd0 kobject: Don't trigger kobject_uevent(KOBJ_REMOVE) twice.
KASAN: use-after-free Read in get_mem_cgroup_from_mm C yes 375 57d 230d 11d c3f3ce04 userfaultfd: use RCU to free the task struct when fork fails
KASAN: slab-out-of-bounds Write in skb_release_data 1 90d 90d 11d 4f661542 tcp: fix zerocopy and notsent_lowat issues
KASAN: use-after-free Read in __vb2_perform_fileio C yes 786 48d 239d 11d d65842f7 media: vb2: add waiting_in_dqbuf flag
BUG: sleeping function called from invalid context in line6_pcm_acquire 119 29d 48d 11d 7f84ff68 ALSA: line6: toneport: Fix broken usage of timer for delayed execution
kernel BUG at drivers/android/binder_alloc.c:LINE! (3) C yes 24 20d 89d 11d a3c7cd0c batman-adv: mcast: fix multicast tt/tvlv worker locking
WARNING in batadv_mcast_mla_tt_retract syz yes 190 41d 176d 11d a3c7cd0c batman-adv: mcast: fix multicast tt/tvlv worker locking
KASAN: use-after-free Write in __ext4_expand_extra_isize C 95 57d 449d 11d 7bc04c5c ext4: fix use-after-free race with debug_want_extra_isize
general protection fault in tipc_mcast_filter_msg C yes 3889 75d 96d 11d 08e046c8 tipc: fix a null pointer deref
WARNING in port_delete syz yes 22 134d 348d 11d 7c32ae35 ALSA: seq: Cover unsubscribe_port() in list_mutex feb68902 ALSA: seq: Protect in-kernel ioctl calls with mutex
kernel BUG at mm/slab.c:LINE! (4) 12 23d 90d 11d 4f661542 tcp: fix zerocopy and notsent_lowat issues
possible deadlock in acct_pin_kill C yes 273 53d 271d 11d 9419a319 acct_on(): don't mess with freeze protection
kernel BUG at arch/x86/mm/physaddr.c:LINE! (2) C yes 522 11d 220d 11d dad7e270 media: vivid: use vfree() instead of kfree() for dev->bitmap_cap
general protection fault in __handle_mm_fault C yes 17 253d 262d 14d ff09d7ec mm/memory.c: recheck page table entry with page table lock held
KMSAN: uninit-value in aa_fqlookupn_profile C 39 225d 270d 14d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
BUG: bad usercopy in __check_heap_object (3) C 287 283d 353d 14d 1f4aace6 fs/seq_file.c: simplify seq_file iteration code and interface
general protection fault in put_fs_context C 9 237d 238d 14d 8d0347f6 convert do_remount_sb() to fs_context
kernel panic: MAC Initialization failed. (3) C yes 799 42d 117d 14d e80b1859 tomoyo: Add a kernel config option for fuzzing testing.
KASAN: use-after-free Read in br_mdb_ip_get 1 149d 148d 24d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
KMSAN: uninit-value in br_mdb_ip_get 5 89d 147d 25d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
WARNING in xfrm_state_fini (2) C 37510 53d 506d 29d dbb2483b xfrm: clean up xfrm protocol checks
KMSAN: uninit-value in rds_connect C 952 56d 299d 29d dd3ac9a6 net/rds: Check address length before reading address family
general protection fault in __dev_printk C 300 55d 69d 29d ef61eb43 USB: yurex: Fix protection fault after device removal
INFO: trying to register non-static key in vmk80xx_detach C 1528 29d 74d 29d 08b7c2f9 staging: comedi: vmk80xx: Fix use of uninitialized semaphore
KMSAN: uninit-value in rtnl_stats_dump syz 14 59d 74d 29d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
WARNING: suspicious RCU usage in fib_compute_spec_dst 1 73d 73d 29d c543cb4a ipv4: ensure rcu_read_lock() in ipv4_link_failure()
BUG: unable to handle page fault for address = ADDR C yes 3 61d 60d 29d baf76f0c slip: make slhc_free() silently accept an error pointer
KASAN: use-after-free Read in seccomp_notify_release (2) C yes 9 91d 92d 29d 7a0df7fb seccomp: Make NEW_LISTENER and TSYNC flags exclusive
WARNING in compat_copy_entries (2) syz yes 19416 42d 476d 29d 7caa56f0 netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON
KMSAN: uninit-value in tomoyo_check_inet_address 33 39d 40d 29d e6193f78 tomoyo: Check address length before reading address family
BUG: sleeping function called from invalid context at crypto/skcipher.c:LINE 1 73d 72d 29d 44427c0f crypto: xts - Fix atomic sleep when walking skcipher
KMSAN: uninit-value in rds_bind C 6202 56d 299d 29d dd3ac9a6 net/rds: Check address length before reading address family
INFO: trying to register non-static key in ni6501_detach C 127 29d 71d 29d 660cf4ce staging: comedi: ni_usb6501: Fix use of uninitialized mutex
KASAN: slab-out-of-bounds Read in skb_gro_receive (2) C yes 5 54d 54d 29d 4dd2b82d udp: fix GRO packet of death
KASAN: stack-out-of-bounds Write in __ip_options_echo syz yes 8 63d 66d 29d 20ff83f1 ipv4: add sanity checks in ipv4_link_failure()
general protection fault in vcpu_enter_guest (2) C yes 11286 55d 60d 29d b904cb8d KVM: lapic: Check for in-kernel LAPIC before deferencing apic pointer
KASAN: use-after-free Read in snd_info_free_entry C 47 41d 71d 29d 2a3f7221 ALSA: core: Fix card races between register and disconnect 8c2f8708 ALSA: info: Fix racy addition/deletion of nodes
WARNING in percpu_ref_kill_and_confirm C yes 443 57d 64d 29d 35fa71a0 io_uring: fail io_uring_register(2) on a dying io_uring instance
general protection fault in skb_queue_tail C yes 35 61d 63d 29d 032be5f1 rxrpc: fix race condition in rxrpc_input_packet()
WARNING in wiphy_register (4) syz yes 3 72d 101d 29d 45fcef8b mac80211_hwsim: calculate if_combination.max_interfaces
INFO: task hung in __io_uring_register C yes 51 64d 73d 29d b19062a5 io_uring: fix possible deadlock between io_uring_{enter,register}
WARNING in __kthread_bind_mask C yes 2929 63d 73d 29d 06058632 io_uring: park SQPOLL thread if it's percpu
general protection fault in ieee80211_debugfs_rename_netdev 8 58d 72d 29d 51787914 mac80211: don't attempt to rename ERR_PTR() debugfs dirs
KASAN: slab-out-of-bounds Read in ds_probe C 5 31d 69d 29d c114944d USB: w1 ds2490: Fix bug caused by improper use of altsetting array
INFO: rcu detected stall in rose_loopback_timer 5 44d 63d 29d 0453c682 net/rose: fix unbound loop in rose_loopback_timer()
KMSAN: uninit-value in rtnl_stats_get C 5 66d 74d 29d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KASAN: use-after-free Read in pid_nr_ns 1 59d 59d 29d 6c0afef5 ipv6/flowlabel: wait rcu grace period before put_pid()
KMSAN: uninit-value in tomoyo_check_unix_address 8 40d 40d 29d e6193f78 tomoyo: Check address length before reading address family
kernel BUG at net/core/net-sysfs.c:LINE! C yes 890 58d 94d 29d 8ed633b9 Revert "net-sysfs: Fix memory leak in netdev_register_kobject"
WARNING: refcount bug in l2tp_tunnel_get 1 56d 56d 29d a622b400 l2ip: fix possible use-after-free
WARNING in io_uring_setup C yes 3601 53d 73d 29d 917257da io_uring: only test SQPOLL cpu after we've verified it
KASAN: user-memory-access Write in fib6_purge_rt 6 30d 60d 29d 0e233874 ipv6: fix races in ip6_dst_destroy()
general protection fault in xfrmi_decode_session C yes 16694 53d 125d 29d 6ed69184 xfrm: Reset secpath in xfrm failure
INFO: task hung in vhost_net_stop_vq C yes 136 69d 206d 29d 813dbeb6 vhost: reject zero size iova range
general protection fault in fanotify_handle_event syz yes 5 68d 68d 29d b1da6a51 fsnotify: Fix NULL ptr deref in fanotify_get_fsid()
BUG: unable to handle kernel paging request in do_mount C 194 239d 277d 35d 3e1aeb00 vfs: Implement a filesystem superblock creation/configuration context
KASAN: stack-out-of-bounds Read in string C 46 62d 74d 40d c01c348e USB: core: Fix unterminated string returned by usb_string()
WARNING in usb_submit_urb (4) syz yes 46 42d 230d 40d c2b71462 USB: core: Fix bug caused by duplicate interface PM usage counter
WARNING: locking bug in icmp_send syz yes 1 126d 125d 46d 9926cb5f tipc: change to check tipc_own_id to return in tipc_net_stop
KMSAN: uninit-value in ip6_compressed_string C 9024 57d 209d 56d 7c2bd9a3 NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
kernel BUG at fs/inode.c:LINE! C yes 2 191d 190d 73d 9bf964c9 autofs: simplify parse_options() function call
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (2) C 6 103d 89d 74d 2ac695d1 tipc: handle the err returned from cmd header function
BUG: corrupted list in rhashtable_walk_enter syz yes 3 93d 92d 74d b5f9bd15 ila: Fix rhashtable walker list corruption
possible deadlock in seq_read C 19074 81d 571d 74d 73601ea5 fs/open.c: allow opening only regular files during execve()
KASAN: use-after-free Read in link_path_walk syz yes 5 193d 209d 74d 1da6c4d9 bpf: fix use after free in bpf_evict_inode
KASAN: slab-out-of-bounds Read in default_write_copy_kernel C yes 366 90d 213d 74d ca0214ee ALSA: pcm: Fix possible OOB access in PCM oss plugins
KASAN: use-after-free Read in trailing_symlink syz yes 2 194d 209d 74d 1da6c4d9 bpf: fix use after free in bpf_evict_inode
KMSAN: kernel-infoleak in sctp_getsockopt (3) syz 11 76d 89d 74d 09279e61 sctp: initialize _pad of sockaddr_in before copying to user memory
BUG: unable to handle kernel paging request in ip6_fragment 1 89d 88d 74d ef0efcd3 ipv6: Fix dangling pointer when ipv6 fragment
KMSAN: uninit-value in tipc_nl_compat_link_set (3) C 15 80d 90d 74d 8c63bf9a tipc: check link name with right length in tipc_nl_compat_link_set
KASAN: use-after-free Read in path_lookupat syz yes 1 209d 209d 74d 1da6c4d9 bpf: fix use after free in bpf_evict_inode
KMSAN: uninit-value in tipc_nl_compat_bearer_enable (2) C 51 77d 90d 74d 6f07e5f0 tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
KASAN: use-after-free Read in drm_gem_object_release C 480 90d 242d 74d 21d2b122 drm/vgem: fix use-after-free when drm_gem_handle_create() fails
WARNING: lock held when returning to user space in tun_get_user C yes 55 100d 101d 76d 9180bb4f tun: add a missing rcu_read_unlock() in error path
kernel panic: corrupted stack end in wb_workfn C yes 14 176d 176d 76d ef82bcfa sctp: use memdup_user instead of vmemdup_user
general protection fault in fib6_purge_rt C yes 60 77d 195d 76d 9926cb5f tipc: change to check tipc_own_id to return in tipc_net_stop
KASAN: slab-out-of-bounds Read in icmp6_send 1 103d 103d 76d 4477138f tun: properly test for IFF_UP
KASAN: stack-out-of-bounds Write in rose_write_internal 1 103d 103d 76d e5dcc0c3 net: rose: fix a possible stack overflow
KASAN: use-after-free Read in __icmp_send 1 94d 90d 76d 4477138f tun: properly test for IFF_UP
general protection fault in sctp_assoc_rwnd_increase C yes 28 89d 105d 76d 636d25d5 sctp: not copy sctp_sock pd_lobby in sctp_copy_descendant
WARNING in free_loaded_vmcs (2) syz yes 5 294d 315d 84d 5bea5123 KVM: VMX: check nested state and CR4.VMXE against SMM
general protection fault in kvm_lapic_hv_timer_in_use syz yes 205 276d 318d 84d 26b471c7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
WARNING in enter_vmx_operation syz yes 8 287d 298d 84d 5bea5123 KVM: VMX: check nested state and CR4.VMXE against SMM
general protection fault in loop_validate_file (2) 3 97d 99d 85d f7c8a412 loop: access lo_backing_file only when the loop device is Lo_bound
WARNING in lockdep_unregister_key C yes 214 92d 106d 85d 82efcab3 workqueue: Only unregister a registered lockdep key
WARNING: bad usercopy in fanotify_read C yes 5 105d 105d 85d b2d22b6b fanotify: Allow copying of file handle to userspace
KASAN: use-after-free Read in filemap_fault C 277 168d 178d 85d 6b4c9f44 filemap: drop the mmap_sem for all blocking operations
general protection fault in ebitmap_destroy (2) C yes 36 95d 102d 85d 6a1afffb selinux: fix NULL dereference in policydb_destroy()
WARNING in __flush_work (2) C 38 108d 109d 89d b30b61ff drm/vkms: Fix flush_work() without INIT_WORK().
general protection fault in sctp_sched_rr_dequeue C yes 11 101d 111d 89d 2e990dfd sctp: remove sched init from sctp_stream_init
KASAN: use-after-free Read in br_multicast_rcv 1 107d 107d 89d 083b78a9 ip: fix ip_mc_may_pull() return value
possible deadlock in shmem_fallocate (2) C 1325 110d 319d 89d fb4415a1 staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
BUG: MAX_STACK_TRACE_ENTRIES too low! C yes 1725 89d 115d 89d 009bb421 workqueue, lockdep: Fix an alloc_workqueue() error path
general protection fault in tc_ctl_chain C 21 123d 132d 89d af736bf0 net: sched: potential NULL dereference in tcf_block_find()
KMSAN: uninit-value in mpol_rebind_mm 6 91d 176d 89d 2e25644e mm, mempolicy: fix uninit memory access
INFO: trying to register non-static key in dump_header 1 121d 121d 89d b30b61ff drm/vkms: Fix flush_work() without INIT_WORK().
WARNING: lock held when returning to user space in grab_super 2 131d 174d 89d 399504e2 fix cgroup_do_mount() handling of failure exits
KASAN: use-after-free Read in unix_dgram_poll syz 2 118d 114d 89d 84c4e1f8 aio: simplify - and fix - fget/fput for io_submit()
general protection fault in hci_uart_write_work C 84 113d 162d 89d 32a7b4cb Bluetooth: hci_ldisc: Initialize hci_dev before open()
KASAN: use-after-free Read in rdma_listen C 1548 89d 449d 89d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KASAN: use-after-free Read in h5_reset_rx 2 120d 125d 89d 56897b21 Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
kernel BUG at drivers/android/binder_alloc.c:LINE! (2) C 1257 89d 131d 89d 26528be6 binder: fix handling of misaligned binder object
INFO: trying to register non-static key in __flush_work C 5255 109d 178d 89d b30b61ff drm/vkms: Fix flush_work() without INIT_WORK().
KASAN: use-after-free Read in alloc_workqueue C 37 101d 114d 89d 009bb421 workqueue, lockdep: Fix an alloc_workqueue() error path
general protection fault in cgroup_reconfigure C 7 324d 353d 89d 23bf1b6b kernfs, sysfs, cgroup, intel_rdt: Support fs_context
KASAN: use-after-free Read in x25_device_event C 548 103d 177d 89d 95d6ebd5 net/x25: fix use-after-free in x25_device_event()
possible deadlock in __do_page_fault C 820 110d 277d 89d fb4415a1 staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
possible deadlock in vfs_fallocate C 3981 310d 422d 89d fb4415a1 staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
WARNING in get_q_data C 649 137d 147d 89d db9a01b3 media: vicodec: check type in g/s_selection
KMSAN: kernel-infoleak in video_usercopy C 410 89d 189d 89d f45f3f75 media: v4l2-ctrls.c/uvc: zero v4l2_event
KMSAN: uninit-value in gue6_err (2) C 2826 89d 111d 89d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
kernel BUG at kernel/time/timer.c:LINE! (3) 1 110d 110d 89d 1e027960 net/hsr: fix possible crash in add_timer()
BUG: unable to handle kernel paging request in gro_cells_destroy (3) 3 91d 107d 89d 2a5ff07a gro_cells: make sure device is up in gro_cells_receive()
KMSAN: kernel-infoleak in move_addr_to_user (2) C 8 90d 105d 89d 163d1c3d l2tp: fix infoleak in l2tp_ip6_recvmsg()
general protection fault in nf_ct_gre_keymap_flush C 22 147d 153d 89d ac088a88 netfilter: conntrack: fix error path in nf_conntrack_pernet_init()
general protection fault in xsk_diag_dump C 5 107d 112d 89d 915905f8 xsk: fix potential crash in xsk_diag_put_umem()
BUG: unable to handle kernel paging request in h4_recv_buf C 203 112d 174d 89d 1dc2d785 Bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf()
general protection fault in x25_write_internal 8 105d 106d 89d ee74d0bd net/x25: reset state in x25_connect()
BUG: unable to handle kernel NULL pointer dereference in __generic_file_write_iter 5 115d 124d 89d ac5ceccc x86/unwind: Add hardcoded ORC entry for NULL f4f34e1b x86/unwind: Handle NULL pointer calls better in frame unwinder
possible deadlock in userfaultfd_read 239 89d 143d 89d d3d6a18d aio: Fix locking in aio_poll()
KMSAN: uninit-value in gue_err (2) C 1617 89d 111d 89d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KASAN: use-after-free Read in kobject_put C 12 117d 249d 89d e20a2e9c Bluetooth: Fix decrementing reference count twice in releasing socket
BUG: assuming atomic context at kernel/seccomp.c:LINE C 709 124d 125d 89d e80d02dd seccomp, bpf: disable preemption before calling into bpf prog
general protection fault in delayed_uprobe_remove C yes 2 233d 236d 94d 1aed58e6 Uprobes: Fix kernel oops with delayed_uprobe_remove()
WARNING: locking bug in lock_downgrade 30 154d 210d 95d 513e1073 locking/lockdep: Add debug_locks check in __lock_downgrade() locking/lockdep: Add debug_locks check in __lock_downgrade()
general protection fault in __x86_indirect_thunk_rbx C yes 16 229d 230d 96d d6367d62 fs/locks: use properly initialized file_lock when unlocking.
KASAN: use-after-free Read in update_blocked_averages C yes 3 211d 226d 96d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
kernel BUG at mm/slab.c:LINE! (3) C yes 14 96d 223d 96d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING in update_load_avg C yes 1 218d 217d 96d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING: bad usercopy in corrupted (2) C yes 12 165d 212d 96d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
KASAN: slab-out-of-bounds Read in tick_sched_handle C yes 7 162d 190d 100d bc6e019b fou: Prevent unbounded recursion in GUE error handler also with UDP-Lite
WARNING: lock held when returning to user space in set_property_atomic C 145 164d 177d 109d 4089e272 gpu/drm: Fix lock held when returning to user space.
general protection fault in ax25cmp C 2294 146d 178d 111d b0cf0292 net/rose: fix NULL ax25_cb kernel panic
KMSAN: uninit-value in batadv_interface_tx C 98 111d 134d 111d 4ffcbfac batman-adv: fix uninit-value in batadv_interface_tx()
kernel panic: stack is corrupted in perf_output_begin_forward 2 162d 168d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
kernel BUG at security/keys/keyring.c:LINE! C 12 163d 263d 111d ede0fa98 KEYS: always initialize keyring_index_key::desc_len
KASAN: slab-out-of-bounds Read in xfrm_policy_insert_list 1 163d 162d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in tipc_subscrb_rcv_cb C 13 422d 443d 111d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KASAN: use-after-free Write in __xfrm_policy_unlink C 254 114d 342d 111d 1548bc4e xfrm: policy: delete inexact policies from inexact list on hash rebuild
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page C 25 202d 230d 111d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KASAN: use-after-free Read in task_is_descendant C 27 160d 247d 111d 9474f4e7 Yama: Check for pid death before checking ancestry
KASAN: use-after-free Read in xfrm_migrate 5 146d 169d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: rcu detected stall in netlink_sendmsg syz 83 127d 183d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in xfrm_policy_insert_list 2 161d 172d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in __flush_work C 402 140d 147d 111d 2e3c18d0 block: pass no-op callback to INIT_WORK().
KASAN: use-after-free Read in __smc_diag_dump syz 34 161d 174d 111d 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: slab-out-of-bounds Read in xfrm_policy_lookup_bytype 6 165d 187d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
general protection fault in crypto_remove_spawns (2) 2 156d 162d 111d 6db43410 crypto: adiantum - initialize crypto_spawn::inst
KMSAN: uninit-value in tipc_nl_compat_doit C 153 126d 277d 111d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
general protection fault in watchdog C 1 194d 193d 111d e2c8d550 netfilter: ebtables: account ebt_table_info to kmemcg
KASAN: stack-out-of-bounds Read in select_task_rq_fair 2 161d 170d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in kernel_accept C 19 194d 344d 111d 78abe3d0 net/smc: fix TCP fallback socket release 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: use-after-free Read in xfrm_policy_insert_list 30 146d 188d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING: refcount bug in rds_sock_addref 1 145d 145d 111d 6fa19f56 rds: fix refcount bug in rds_sock_addref
WARNING in __skb_flow_dissect (3) syz 224 161d 250d 111d 0b7959b6 tun: publish tfile after it's fully initialized
general protection fault in fuse_dev_do_write C 134 139d 266d 111d 97e1532e fuse: handle zero sized retrieve correctly
KMSAN: uninit-value in tipc_nl_compat_name_table_dump C 51 197d 238d 111d 974cb0e3 tipc: fix uninit-value in tipc_nl_compat_name_table_dump
INFO: rcu detected stall in snd_pcm_oss_read C 2 183d 183d 111d e190161f ALSA: pcm: Fix tight loop of OSS capture stream
KASAN: use-after-free Read in sctp_outq_tail 1 133d 132d 111d af98c5a7 sctp: set stream ext to NULL after freeing it in sctp_stream_outq_migrate
net-next boot error: can't ssh into the instance 33 146d 148d 111d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
BUG: unable to handle kernel paging request in dput (2) C 4 145d 146d 111d 36991ca6 blk-mq: protect debugfs_create_files() from failures 37ea7b63 debugfs: debugfs_lookup() should return NULL if not found
KASAN: slab-out-of-bounds Read in batadv_interface_tx C 41 137d 176d 111d 9114daa8 batman-adv: Force mac header to start of data on xmit
INFO: rcu detected stall in pfkey_sendmsg 7 163d 188d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: task hung in generic_file_write_iter 7 204d 342d 111d 04906b2f blockdev: Fix livelocks on loop device
general protection fault in kernel_accept C 280 187d 348d 111d 78abe3d0 net/smc: fix TCP fallback socket release 26d92e95 smc: move unhash as early as possible in smc_release()
KASAN: stack-out-of-bounds in do_raw_spin_lock C 1 171d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in refcount_inc_not_zero_checked syz 24 114d 174d 111d 63346650 netrom: switch to sock timer API
KMSAN: uninit-value in tipc_nl_compat_link_set (2) C 13 148d 189d 111d edf5ff04 tipc: fix uninit-value in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable C 144 113d 238d 111d 0762216c tipc: fix uninit-value in tipc_nl_compat_bearer_enable
KMSAN: kernel-infoleak in move_addr_to_user 5 118d 168d 111d 7d033c9f ipv6: fix kernel-infoleak in ipv6_local_error()
KASAN: use-after-free Read in kmemdup 1 157d 157d 111d 63530aba ax25: fix possible use-after-free
KMSAN: uninit-value in tipc_nl_compat_link_reset_stats syz 16 115d 169d 111d 8b66fee7 tipc: fix uninit-value in tipc_nl_compat_link_reset_stats
BUG: unable to handle kernel paging request in depot_save_stack C 1 171d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: global-out-of-bounds Read in validate_nla C 14 147d 152d 111d a8b5c6d6 nl80211: fix NLA_POLICY_NESTED() arguments
KASAN: invalid-free in sctp_stream_free C 5 133d 141d 111d af98c5a7 sctp: set stream ext to NULL after freeing it in sctp_stream_outq_migrate
WARNING: refcount bug in nr_release 1 170d 169d 111d 63346650 netrom: switch to sock timer API
general protection fault in dccp_parse_options 1 146d 146d 111d 9b1f19d8 dccp: fool proof ccid_hc_[rt]x_parse_options()
KASAN: slab-out-of-bounds Read in __xfrm_policy_bysel_ctx 1 173d 173d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in kvm_clear_dirty_log_protect 6 111d 156d 111d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
BUG: unable to handle kernel NULL pointer dereference in corrupted (3) C 1 168d 168d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: slab-out-of-bounds Read in kvm_clear_dirty_log_protect C 54 163d 174d 111d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
net boot error: can't ssh into the instance 42 146d 148d 111d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
general protection fault in __dentry_path C 2082 113d 146d 111d 8ed0579c kvm: properly check debugfs dentry before using it
WARNING in tcp_send_loss_probe C 9 121d 173d 111d bf50b606 tcp: repaired skbs must init their tso_segs
BUG: unable to handle kernel paging request in do_csum C 11 204d 205d 111d d5be7f63 net-backports: net: validate untrusted gso packets without csum offload
KASAN: stack-out-of-bounds Read in pick_next_task_fair C 1 171d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in icmp6_send syz 2 172d 172d 111d 8d933670 ipv6: make icmp6_send() robust against null skb->dev
WARNING in batadv_is_on_batman_iface syz 10 152d 177d 111d 955d3411 batman-adv: Avoid WARN on net_device without parent in netns
kernel panic: stack is corrupted in rcu_irq_enter 1 160d 160d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
WARNING in clear_standby C 3522 152d 277d 111d 4aac9228 libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive()
general protection fault in __xfrm_policy_bysel_ctx 1 148d 147d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_insert 3 163d 187d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING in apparmor_cred_free C 109 158d 165d 111d a5795fd3 LSM: Check for NULL cred-security on free
KASAN: out-of-bounds Read in update_curr syz 1 171d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in team_nl_cmd_options_set C 7 181d 138d 111d 2fdeee25 team: avoid complex list operations in team_nl_cmd_options_set()
KASAN: slab-out-of-bounds Write in __xfrm_policy_unlink 34 146d 226d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: rcu detected stall in xfrm_hash_rebuild 77 146d 197d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
INFO: task hung in lo_ioctl 47 446d 562d 111d 04906b2f blockdev: Fix livelocks on loop device
WARNING in wiphy_register (3) syz 31 147d 177d 111d 9c5d3afa mac80211_hwsim: check that n_limits makes sense
general protection fault in sctp_sched_dequeue_common 6 126d 216d 111d cfe4bd7a sctp: check and update stream->out_curr when allocating stream_out
kernel panic: stack is corrupted in printk C 1 171d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KMSAN: kernel-infoleak in vmx_get_nested_state C 6 112d 223d 111d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
general protection fault in xfrm_policy_insert_list 4 168d 183d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
BUG: unable to handle kernel NULL pointer dereference in setup_kmem_cache_node 3 173d 174d 111d 09c2e76e slab: alien caches must not be initialized if the allocation of the alien cache failed
general protection fault in xfrm_policy_lookup_bytype 5 147d 176d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: slab-out-of-bounds Read in __pskb_copy_fclone 22 193d 259d 111d e7c87bd6 bpf: in __bpf_redirect_no_mac pull mac only if present
INFO: rcu detected stall in sys_bind 1 137d 137d 111d cf657d22 net/x25: do not hold the cpu too long in x25_new_lci()
kernel panic: stack is corrupted in udp4_lib_lookup2 11 176d 173d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
general protection fault in rb_erase_cached C 1 171d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: stack-out-of-bounds Read in gue_err_proto_handler C 1 169d 168d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in oom_kill_process 1 159d 155d 111d cefc7ef3 mm, oom: fix use-after-free in oom_kill_process
kernel panic: stack is corrupted in select_idle_sibling 1 171d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in __xfrm_policy_bysel_ctx 11 146d 183d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: out-of-bounds Read in __switch_to C 1 171d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in xfrm_policy_inexact_insert 42 146d 176d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: use-after-free Read in __wake_up_common_lock 1 146d 145d 111d bdcc5bc2 mISDN: fix a race in dev_expire_timer()
KMSAN: uninit-value in tipc_nl_compat_dumpit C 209 126d 277d 111d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
general protection fault in corrupted (2) C 2 168d 171d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
WARNING: locking bug in corrupted C 1 160d 160d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
possible deadlock in __wake_up_common_lock 7 165d 174d 111d 73444bc4 mm, page_alloc: do not wake kswapd with zone lock held
WARNING: refcount bug in kvm_vm_ioctl syz 13 145d 258d 111d cfa39381 kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
INFO: rcu detected stall in ipv6_rcv 7 149d 186d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt 1 146d 145d 111d 63346650 netrom: switch to sock timer API
KMSAN: uninit-value in gue_err C 4686 111d 165d 111d 26fc181e fou, fou6: do not assume linear skbs
KASAN: use-after-free Read in seccomp_notify_release C 27 116d 165d 111d a811dc61 seccomp: fix UAF in user-trap code
KASAN: use-after-free Read in batadv_interface_tx C 54 138d 176d 111d 9114daa8 batman-adv: Force mac header to start of data on xmit
general protection fault in ip6erspan_set_version C 39 120d 125d 111d efcc9bca net: ip6_gre: fix possible NULL pointer dereference in ip6erspan_set_version
WARNING in __might_sleep (2) C 36 151d 178d 111d fc01d8c6 tty/n_hdlc: fix __might_sleep warning
upstream boot error: can't ssh into the instance (2) 45 148d 149d 111d 947b7ac1 Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"
KASAN: use-after-free Read in xfrm_policy_lookup_bytype 33 147d 187d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
BUG: soft lockup in x25_connect 1 123d 123d 111d 797a22bd net/x25: fix a race in x25_bind()
WARNING in xfrm6_tunnel_net_exit (2) C 48816 120d 402d 111d f75a2804 xfrm: destroy xfrm_state synchronously on net exit path
WARNING in xfrm_policy_inexact_gc_tree 645 146d 197d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
KMSAN: uninit-value in tipc_conn_rcv_sub C 557 113d 408d 111d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
WARNING: refcount bug in xfrm_policy_bysel_ctx 1 165d 165d 111d 12750aba xfrm: policy: fix infinite loop when merging src-nodes
WARNING: bad unlock balance in rxrpc_recvmsg C 9 137d 141d 111d 6dce3c20 rxrpc: bad unlock balance in rxrpc_recvmsg
KASAN: stack-out-of-bounds Write in page_counter_try_charge 1 161d 161d 111d 44039e00 fou6: Prevent unbounded recursion in GUE error handler
KMSAN: kernel-infoleak in sctp_getsockopt (2) C 16 111d 162d 111d 400b8b9a sctp: allocate sctp_sockaddr_entry with kzalloc
general protection fault in relay_open_buf C 287 144d 145d 111d 2c1cf00e relay: check return of create_buf_file() properly
KASAN: use-after-free Write in __wake_up_common_lock 1 139d 139d 111d bdcc5bc2 mISDN: fix a race in dev_expire_timer()
KMSAN: uninit-value in gue6_err C 8359 111d 165d 111d 26fc181e fou, fou6: do not assume linear skbs
general protection fault in ebitmap_destroy syz 1 167d 167d 111d 5b0e7310 selinux: fix GPF on invalid policy
general protection fault in debugfs_create_files C 111 144d 145d 111d 36991ca6 blk-mq: protect debugfs_create_files() from failures
general protection fault in kvm_ioapic_scan_entry C 148 205d 315d 118d dcbd3e49 KVM: X86: Fix NULL deref in vcpu_scan_ioapic
general protection fault in finish_wait C 22 135d 351d 118d 78abe3d0 net/smc: fix TCP fallback socket release
KASAN: slab-out-of-bounds Write in fpstate_init C 15088 183d 184d 118d ed8e4812 KVM: x86: fix size of x86_fpu_cache objects
KASAN: out-of-bounds Write in tls_push_record C 10 251d 352d 118d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Read in tls_tx_records 1 270d 270d 118d d829e9c4 tls: convert to generic sk_msg interface
general protection fault in tls_push_sg 12 261d 370d 118d d829e9c4 tls: convert to generic sk_msg interface
general protection fault in gcmaes_crypt_by_sg 3 253d 262d 118d d829e9c4 tls: convert to generic sk_msg interface
kernel BUG at include/linux/mm.h:LINE! (2) C 1009 118d 382d 118d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Write in tls_push_record (2) C 64 246d 348d 118d d829e9c4 tls: convert to generic sk_msg interface
KASAN: use-after-free Read in rdma_resolve_addr 1 272d 272d 124d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in cma_acquire_dev 1 354d 353d 124d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in wait_for_completion 1 248d 247d 124d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in __list_add_valid (5) C 16 450d 456d 124d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in bpf_cgroup_storage_release C 2 327d 327d 128d 82c018d7 Merge branch 'bpf-cgroup-local-storage'
KASAN: stack-out-of-bounds Read in rb_erase (4) 1 162d 162d 128d 11789039 fou: Prevent unbounded recursion in GUE error handler
general protection fault in list_lru_count_one C 12 344d 343d 150d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
WARNING in __debug_object_init (3) C 1557 239d 240d 155d 2cb494a3 bpf: add tests for direct packet access from CGROUP_SKB
general protection fault in keyctl_pkey_params_get C 85 174d 234d 160d 57b0e314 KEYS: fix parsing invalid pkey info string 94c13f66 security: don't use a negative Opt_err token index
KASAN: stack-out-of-bounds Read in keyctl_pkey_params_get 2 175d 174d 160d 57b0e314 KEYS: fix parsing invalid pkey info string
general protection fault in encode_rpcb_string C 6 338d 434d 160d 81c88b18 sunrpc: handle ENOMEM in rpcb_getport_async
KMSAN: uninit-value in vti6_tnl_xmit syz 60 165d 189d 160d cb9f1b78 ip: validate header length on virtual device xmit
general protection fault in lo_ioctl (2) syz 2 419d 419d 160d 310ca162 block/loop: Use global lock for ioctl() operation.
inconsistent lock state in nr_find_socket C 19 162d 178d 160d 7314f548 netrom: fix locking in nr_find_socket()
KASAN: invalid-free in x25_asy_free C 67 172d 178d 160d d5c7c745 net/wan: fix a double free in x25_asy_open_tty()
WARNING in kmem_cache_create_usercopy C 10 176d 235d 160d 574d356b 9p/net: put a lower bound on msize
possible deadlock in blkdev_reread_part C 5736 180d 600d 160d 0da03cab loop: Fix deadlock when calling blkdev_reread_part() 85b0a54a loop: Move loop_reread_partitions() out of loop_ctl_mutex
KMSAN: uninit-value in check_6rd C 81 166d 189d 160d cb9f1b78 ip: validate header length on virtual device xmit
WARNING: locking bug in loop_control_ioctl C 4018 200d 227d 160d 628bd859 loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl()
WARNING: ODEBUG bug in tipc_enable_bearer C 3 181d 184d 160d dc4501ff tipc: fix a double free in tipc_enable_bearer()
kernel BUG at kernel/time/timer.c:LINE! (2) C 5 173d 175d 160d 202700e3 net/hamradio/6pack: use mod_timer() to rearm timers
KASAN: slab-out-of-bounds Read in tun_net_xmit (2) C 10 177d 344d 160d aff6db45 ptr_ring: wrap back ->producer in __ptr_ring_swap_queue()
KASAN: use-after-free Read in nr_rx_frame syz 2 167d 174d 160d 7314f548 netrom: fix locking in nr_find_socket()
possible deadlock in nr_destroy_socket syz 20 164d 174d 160d 7314f548 netrom: fix locking in nr_find_socket()
INFO: task hung in loop_control_ioctl 4 257d 450d 160d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: use-after-free Read in posix_lock_inode syz 5 174d 174d 160d bf77ae4c locks: fix error in locks_move_blocks()
general protection fault in transparent_hugepage_enabled C 626 174d 183d 160d 7635d9cb mm, thp, proc: report THP eligibility for each vma
KMSAN: kernel-infoleak in capi_unlocked_ioctl C 109 165d 176d 160d d63967e4 isdn: fix kernel-infoleak in capi_unlocked_ioctl
INFO: task hung in lo_open (2) 10 222d 450d 160d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: user-memory-access Write in n_tty_set_termios C 85 179d 450d 160d 83d817f4 tty: Hold tty_ldisc_lock() during tty_reopen()
KASAN: use-after-free Read in ax25_fillin_cb syz 4 181d 178d 160d c4335704 ax25: fix a use-after-free in ax25_fillin_cb()
INFO: task hung in lo_release 1 342d 342d 160d 1dded9ac loop: Avoid circular locking dependency between loop_ctl_mutex and bd_mutex
KASAN: use-after-free Read in locks_delete_block syz 4 201d 224d 160d 16306a61 fs/locks: always delete_block after waiting.
general protection fault in fdb_find_rcu C 3 181d 177d 160d f989d03e net: rtnetlink: address is mandatory for rtnl_fdb_get
general protection fault in kvm_arch_vcpu_ioctl_run C 12 187d 203d 165d dcbd3e49 KVM: X86: Fix NULL deref in vcpu_scan_ioapic
general protection fault in __vb2_queue_free C 38 181d 237d 165d 62dcb4f4 media: vb2: check memory model for VIDIOC_CREATE_BUFS
WARNING in static_key_enable_cpuslocked 1 212d 212d 165d 9c480601 udp: fix jump label misuse
WARNING in static_key_disable_cpuslocked syz 5 201d 220d 165d 9c480601 udp: fix jump label misuse
BUG: corrupted list in ___neigh_create C 706 194d 197d 165d 8cc196d6 neighbor: gc_list changes should be protected by table lock
WARNING in __rcu_read_unlock C 2 184d 192d 165d 11789039 fou: Prevent unbounded recursion in GUE error handler
KASAN: use-after-free Read in __ipv6_addr_type 1 186d 186d 165d cbb49697 ipv6: tunnels: fix two use-after-free
BUG: corrupted list in neigh_mark_dead C 4117 194d 197d 165d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KMSAN: kernel-infoleak in sctp_getsockopt syz 147 166d 201d 165d 4a2eb0c3 sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event
KASAN: use-after-free Read in tipc_group_bc_cong C 280 186d 197d 165d 143ece65 tipc: check tsk->group in tipc_wait_for_cond()
KASAN: use-after-free Read in tipc_mcast_xmit syz 7 183d 190d 165d 3c6306d4 tipc: check group dests after tipc_wait_for_cond()
KMSAN: uninit-value in __inet6_bind C 56 166d 196d 165d fb242745 ipv6: explicitly initialize udp6_addr in udp_sock_create6()
INFO: task hung in flush_workqueue C 293 184d 236d 165d 52117be6 media: vim2m: use cancel_delayed_work_sync instead of flush_schedule_work
KASAN: slab-out-of-bounds Read in neigh_mark_dead 12 194d 197d 165d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KASAN: slab-out-of-bounds Read in ___neigh_create 1 197d 197d 165d 8cc196d6 neighbor: gc_list changes should be protected by table lock
KASAN: null-ptr-deref Write in kthread_stop C 2527 181d 239d 165d 701f49bc media: vivid: fix error handling of kthread_run
KASAN: use-after-free Read in kfree_skb (2) C 66 187d 196d 165d acb4a33e tipc: fix a double kfree_skb()
KASAN: use-after-free Read in skcipher_recvmsg 6 211d 236d 165d f7d76e05 crypto: user - fix use_after_free of struct xxx_request
BUG: sleeping function called from invalid context at mm/slab.h:LINE (4) C 36 190d 351d 165d f9c9bdb5 crypto: x86/chacha - avoid sleeping under kernel_fpu_begin()
general protection fault in inet_lhash2_lookup C 1137 189d 192d 165d eedbbb0d net: dccp: initialize (addr,port) listening hashtable
divide error in alarm_forward 1 191d 190d 165d 0e334db6 posix-timers: Fix division by zero bug
KASAN: use-after-free Read in kvm_put_kvm C 143 188d 248d 165d 987d1149 KVM: fix unregistering coalesced mmio zone from wrong bus
general protection fault in inet6_lhash2_lookup C 718 189d 192d 165d eedbbb0d net: dccp: initialize (addr,port) listening hashtable
KASAN: use-after-free Read in neigh_mark_dead C 858 194d 197d 165d 8cc196d6 neighbor: gc_list changes should be protected by table lock
WARNING in rds_message_alloc_sgs C 6 204d 237d 165d ea010070 net/rds: fix warn in rds_message_alloc_sgs
WARNING in vkms_plane_duplicate_state C 108 182d 215d 165d 7cdf33ab drm/vkms: Fix plane duplicate_state
divide error in vivid_vid_cap_s_dv_timings C 108 181d 239d 165d 9729d6d2 media: vivid: set min width/height to a value > 0
KMSAN: uninit-value in packet_sendmsg 5 214d 189d 165d 99137b78 packet: validate address length
KASAN: use-after-free Read in vb2_mmap C 276 181d 238d 165d cd26d1c4 media: vb2: vb2_mmap: move lock up
general protection fault in __ipv6_sock_mc_join C 9 192d 196d 165d fb83ed49 tipc: compare remote and local protocols in tipc_udp_enable()
BUG: pagefault on kernel address ADDR in non-whitelisted uaccess C 17 190d 236d 165d 560ccb75 media: vivid: free bitmap_cap when updating std/timings/etc.
KASAN: global-out-of-bounds Read in tpg_print_str_4 C 52 204d 229d 165d e5f71a27 media: v4l2-tpg: array index could become negative
KASAN: use-after-free Read in ___neigh_create C 164 194d 197d 165d 8cc196d6 neighbor: gc_list changes should be protected by table lock
net build error 2 274d 275d 175d 16fdf8ba rds: Fix build regression.
WARNING in fuse_destroy_inode C 7 220d 220d 179d 4fc4bb79 fuse: Add bad inode check in fuse_destroy_inode()
WARNING in userfaultfd_ioctl C 11 194d 203d 179d 01e881f5 userfaultfd: check VM_MAYWRITE was set after verifying the uffd is registered
KASAN: use-after-free Read in sctp_hash_transport 1 220d 218d 189d fb6df5a6 sctp: kfree_rcu asoc
KASAN: use-after-free Read in vhost_transport_send_pkt syz 36 203d 330d 189d 834e772c vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in delayed_uprobe_remove C 2 232d 236d 189d 1aed58e6 Uprobes: Fix kernel oops with delayed_uprobe_remove()
KMSAN: kernel-infoleak in _copy_to_iter (4) C 56 204d 208d 189d 68883893 rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
KASAN: invalid-free in hub_event 1 211d 211d 189d d81bb019 USB: Fix invalid-free bug in port_over_current_notify()
KASAN: use-after-free Read in sctp_epaddr_lookup_transport syz 5 220d 220d 189d fb6df5a6 sctp: kfree_rcu asoc
KASAN: use-after-free Read in vhost_work_queue syz 30 201d 301d 189d 834e772c vhost/vsock: fix use-after-free in network stack callers
KASAN: use-after-free Read in vhost_transport_cancel_pkt syz 17 228d 272d 189d 834e772c vhost/vsock: fix use-after-free in network stack callers
WARNING in alloc_pages_vma C 98 198d 201d 189d 356ff8a9 Revert "mm, thp: consolidate THP gfp handling into alloc_hugepage_direct_gfpmask"
KASAN: use-after-free Read in snd_ctl_elem_add 1 223d 222d 191d e1a7bfe3 ALSA: control: Fix race between adding and removing a user element
WARNING in cttimeout_default_get C 44 201d 220d 200d 89259088 netfilter: nfnetlink_cttimeout: fetch timeouts for udplite and gre, too
WARNING in format_decode (2) C 16 220d 302d 200d 1efb6ee3 bpf: fix check of allowed specifiers in bpf_trace_printk
KMSAN: uninit-value in linear_transfer (2) C 7 205d 228d 200d 65766ee0 ALSA: oss: Use kvzalloc() for local buffer allocations
KASAN: use-after-free Read in nbp_vlan_rcu_free 1 225d 225d 200d 9d332e69 net: bridge: fix vlan stats use-after-free on destruction
KMSAN: kernel-infoleak in kvm_write_guest_page C 36 202d 229d 200d bcbfbd8e KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
BUG: GPF in non-whitelisted uaccess (non-canonical address?) C 10 219d 226d 200d 8c01db76 HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges
KASAN: slab-out-of-bounds Write in queue_stack_map_push_elem C 30 209d 212d 200d 813961de bpf: fix integer overflow in queue_stack_map
WARNING in bpf_check (2) C 9 222d 222d 200d afd59424 bpf: fix off-by-one error in adjust_subprog_starts
INFO: task hung in fuse_sb_destroy C 2 236d 236d 200d 7fabaf30 fuse: fix leaked notify reply
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl C 31 205d 220d 200d 7f9ad1df KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
general protection fault in icmp_timeout_obj_to_nlattr C 13 233d 237d 224d 8866df92 netfilter: nfnetlink_cttimeout: pass default timeout policy to obj_to_nlattr
general protection fault in addr_resolve C 32 260d 277d 224d fe33507e RDMA/core: Check error status of rdma_find_ndev_for_src_ip_rcu
KMSAN: uninit-value in synaptics_detect C 137 225d 277d 224d f39f8688 Input: synaptics - avoid using uninitialized variable when probing
BUG: unable to handle kernel NULL pointer dereference in sha256_mb_mgr_get_comp_job_avx2 1 258d 258d 224d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
KMSAN: uninit-value in dev_mc_add_excl C 13 229d 241d 224d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KASAN: stack-out-of-bounds Read in __aa_lookupn_ns C 52 240d 272d 224d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
KASAN: slab-out-of-bounds Read in sctp_getsockopt C 9 242d 242d 224d 71335836 sctp: check policy more carefully when getting pr status
WARNING in __put_task_struct (2) C 17 251d 260d 224d fe9bc164 RDMA/restrack: Protect from reentry to resource return path
KASAN: invalid-free in p9stat_free C 3 303d 303d 224d 62e39417 9p: clear dangling pointers in p9stat_free 81c99089 v9fs_dir_readdir: fix double-free on p9stat_read error
possible deadlock in ovl_copy_up_start 2 242d 250d 224d 6cd07870 ovl: fix recursive oi->lock in ovl_link()
KASAN: use-after-free Read in sha_complete_job 1 264d 262d 224d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
BUG: corrupted list in cpu_stop_queue_work C 24 343d 353d 224d 552446a4 shmem: Convert shmem_add_to_page_cache to XArray
KMSAN: uninit-value in dev_uc_add_excl C 20 236d 277d 224d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
general protection fault in rb_erase C 79836 232d 272d 224d 18aded17 ext4: fix EXT4_IOC_SWAP_BOOT
KASAN: use-after-free Read in tcf_block_find C 27 266d 272d 224d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KASAN: use-after-free Read in seq_escape 1 268d 267d 224d 33458eab ext4: fix use-after-free race in ext4_remount()'s error path
KASAN: use-after-free Read in _copy_from_iter C 12 328d 340d 224d 728356de 9p: Add refcount to p9_req_t
KASAN: use-after-free Read in gfs2_log_flush syz 14 246d 286d 224d 4c62bd9c gfs2: Don't leave s_fs_info pointing to freed memory in init_sbd
general protection fault in getname_kernel C 10 252d 260d 224d 3df629d8 gfs2_meta: ->mount() can get NULL dev_name
kernel BUG at arch/x86/mm/physaddr.c:LINE! C 10 226d 258d 224d babf4770 ovl: fix error handling in ovl_verify_set_fh()
general protection fault in __skb_flow_dissect (2) C 11 272d 280d 224d d0e13a14 flow_dissector: lookup netns by skb->sk if skb->dev is NULL
general protection fault in ctnetlink_alloc_filter C 80 274d 277d 224d 9306425b netfilter: ctnetlink: must check mark attributes vs NULL
WARNING: kmalloc bug in krealloc C 2 344d 344d 224d 61448479 mm: don't warn about large allocations for slab
KASAN: slab-out-of-bounds Read in refcount_inc_not_zero_checked 2 250d 251d 224d 5032d079 bpf: skmsg, fix psock create on existing kcm/tls port
WARNING: kmalloc bug in __v9fs_get_acl C 212 242d 350d 224d 61448479 mm: don't warn about large allocations for slab
BUG: unable to handle kernel NULL pointer dereference in blk_mq_map_swqueue C 8 251d 271d 224d e01ad46d blk-mq: fallback to previous nr_hw_queues when updating fails
KASAN: use-after-free Write in jbd2_log_do_checkpoint 1 286d 281d 224d ccd3c437 jbd2: fix use after free in jbd2_log_do_checkpoint()
WARNING: kmalloc bug in str_read C 11 247d 291d 224d 4458bba0 selinux: Add __GFP_NOWARN to allocation at str_read()
KASAN: use-after-free Read in __dev_queue_xmit (3) 11 267d 270d 224d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KMSAN: uninit-value in ip_tunnel_lookup (2) C 2 242d 243d 224d b0350d51 ip_gre: fix parsing gre header in ipgre_err
KASAN: use-after-free Read in sha512_ctx_mgr_resubmit C 4 264d 314d 224d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
kernel BUG at mm/shmem.c:LINE! C 30 351d 353d 224d 552446a4 shmem: Convert shmem_add_to_page_cache to XArray
KASAN: null-ptr-deref Read in refcount_sub_and_test_checked C 31 232d 263d 224d fda21d46 ipv6: do not leave garbage in rt->fib6_metrics
WARNING in tcp_cleanup_ulp syz 16 251d 252d 224d aadd4355 tcp, ulp: remove socket lock assertion on ULP cleanup
KASAN: use-after-free Read in sctp_outq_select_transport 1 245d 245d 224d df132eff sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer
WARNING: kmalloc bug in input_mt_init_slots C 54 243d 277d 224d 61448479 mm: don't warn about large allocations for slab
general protection fault in dev_gro_receive (2) syz 4 249d 256d 224d ece23711 net: Properly unlink GRO packets on overflow.
upstream boot error (2) 1 238d 238d 224d 153fcd5f block: brd: associate with queue until adding disk
WARNING: kmalloc bug in get_valid_checkpoint syz 2 410d 410d 224d 61448479 mm: don't warn about large allocations for slab
WARNING in tcp_close syz 284 246d 345d 224d 8873c064 tcp: do not release socket ownership in tcp_close()
BUG: corrupted list in p9_read_work syz 23 233d 344d 224d e4ca13f7 9p/trans_fd: abort p9_read_work if req status changed
general protection fault in netdev_master_upper_dev_get 1 242d 242d 224d aab456df net/neigh: fix NULL deref in pneigh_dump_table()
KASAN: use-after-free Read in kfree_skb 1 246d 246d 224d 604d415e llc: do not use sk_eat_skb()
KASAN: use-after-free Read in fuse_dev_do_read syz 19 237d 285d 224d bc78abbd fuse: Fix use-after-free in fuse_dev_do_read()
WARNING: kmalloc bug in vfs_getxattr_alloc C 9 300d 342d 224d 61448479 mm: don't warn about large allocations for slab
BUG: unable to handle kernel NULL pointer dereference in sha1_mb_mgr_get_comp_job_avx2 1 272d 272d 224d ab8085c1 crypto: x86 - remove SHA multibuffer routines and mcryptd
WARNING: kmalloc bug in bfs_fill_super C 147 407d 451d 224d 9f2df09a bfs: add sanity check at bfs_fill_super()
INFO: task hung in ext4_fallocate C 1 268d 267d 224d f18b2b83 ext4: fix argument checking in EXT4_IOC_MOVE_EXT
WARNING: refcount bug in qdisc_put 5 268d 268d 224d 460b3601 net_sched: fix a crash in tc_new_tfilter()
KMSAN: uninit-value in vcs_read C 2343 382d 406d 228d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
kernel BUG at include/linux/skbuff.h:LINE! 3 337d 345d 237d bab2c80e nsh: set mac len based on inner packet
KASAN: use-after-free Read in sctp_id2assoc 1 264d 264d 238d b336deca sctp: fix race on sctp_id2asoc
WARNING in usb_submit_urb (3) C 58 240d 255d 238d 665c365a USB: fix the usbfs flag sanitization for control transfers
KMSAN: kernel-infoleak in _copy_to_iter (3) C 36 239d 250d 238d b06f9d9f tipc: fix info leak from kernel tipc_event
KASAN: use-after-free Read in inet6_mc_check 1 255d 255d 238d dc012f36 ipv6: mcast: fix a use-after-free in inet6_mc_check
KASAN: slab-out-of-bounds Read in fscache_alloc_cookie C 1936 250d 351d 238d 1ff22883 fscache: Fix incomplete initialisation of inline key space fa520c47 fscache: Fix out of bound read in long cookie keys
KASAN: use-after-free Read in __llc_lookup_established 1 258d 257d 238d 5a8e7aea llc: set SOCK_RCU_FREE in llc_sap_add_socket()
KASAN: slab-out-of-bounds Read in vhci_hub_control C 43 249d 293d 238d 81f7567c usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control()
BUG: sleeping function called from invalid context at net/core/dev.c:LINE syz 8 251d 260d 238d cee27167 xsk: do not call synchronize_net() under RCU read lock
KASAN: slab-out-of-bounds Read in _decode_session6 C 35 238d 296d 238d 9f7e43da net/xfrm: fix out-of-bounds packet access
INFO: rcu detected stall in mousedev_write 18 291d 306d 250d f74c371f Input: mousedev - add a schedule point in mousedev_write()
kernel BUG at net/core/dev.c:LINE! (2) syz 2 258d 258d 250d 52b5d6f5 net: make skb_partial_csum_set() more robust against overflows
KASAN: use-after-free Read in finish_task_switch C 3047 274d 319d 253d 26b471c7 KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs
WARNING in __skb_flow_dissect syz 3 257d 258d 257d af3fb24e tun: napi flags belong to tfile
general protection fault in dev_gro_receive syz 8 258d 270d 257d af3fb24e tun: napi flags belong to tfile
possible deadlock in flush_workqueue C 73762 264d 306d 257d d4859d74 net-backports: bonding: avoid possible dead-lock
KASAN: use-after-free Read in rawv6_sendmsg C 84 258d 290d 257d a688caa3 net-backports: ipv6: take rcu lock in rawv6_send_hdrinc()
possible deadlock in rtnetlink_rcv_msg 1 280d 280d 257d d4859d74 net-backports: bonding: avoid possible dead-lock
KASAN: slab-out-of-bounds Read in string (2) 14 263d 270d 257d 601350ff ovl: fix access beyond unterminated strings
WARNING in pcpu_alloc C 4 258d 267d 257d b0584ea6 bpf: don't accept cgroup local storage with zero value size
KASAN: use-after-free Write in ucma_put_ctx syz 11 272d 291d 257d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
general protection fault in usb_find_alt_setting (2) C 53 273d 295d 257d c9a4cb20 USB: handle NULL config in usb_find_alt_setting()
INFO: trying to register non-static key in tun_chr_write_iter 14 258d 270d 257d c7256f57 tun: initialize napi_mutex unconditionally
WARNING in rollback_registered_many 1 268d 268d 257d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
KASAN: use-after-free Read in ip_cmsg_recv_offset C 9 266d 269d 257d 64199fc0 net-backports: ipv4: fix use-after-free in ip_cmsg_recv_dstaddr()
possible deadlock in team_vlan_rx_add_vid syz 5 286d 320d 257d 471b83bd team: Forbid enslaving team device to itself
general protection fault in ubifs_mount C 216 277d 294d 257d 37f31b6c ubifs: Check for name being NULL while mounting
KMSAN: uninit-value in ip6_tnl_start_xmit C 69 270d 281d 257d 76c0ddd8 ip6_tunnel: be careful when accessing the inner header
KASAN: use-after-free Read in destroy_async_on_interface C 134 273d 295d 257d bd729f9d USB: fix error handling in usb_driver_claim_interface()
WARNING in usb_submit_urb (2) C 259 257d 295d 257d 7a68d9fb USB: usbdevfs: sanitize flags more
INFO: task hung in unregister_netdevice_notifier (2) 1 266d 266d 257d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
KASAN: use-after-free Read in cma_bind_port syz 2 286d 291d 257d 5fe23f26 ucma: fix a use-after-free in ucma_resolve_ip()
KMSAN: uninit-value in pppoe_rcv C 2 416d 286d 257d 8540827e pppoe: fix reception of frames with no mac header
INFO: task hung in rollback_registered_many 4 260d 268d 257d 0e1d6eca rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
WARNING: suspicious RCU usage in inet_csk_route_req C 43 264d 499d 257d 1ad98e9d tcp/dccp: fix lockdep issue when SYN is backlogged
KMSAN: kernel-infoleak in _copy_to_iter (2) C 7 265d 293d 260d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
general protection fault in rhashtable_walk_start_check C 112 285d 296d 271d 8f5c5fcf tipc: call start and done ops directly in __tipc_nl_compat_dumpit()
WARNING in try_charge syz 649 271d 325d 271d 3100dab2 mm: memcontrol: print proper OOM header when no eligible victim left
divide error in nbd_ioctl C 50 286d 294d 271d bc811f05 nbd: don't allow invalid blocksize settings
WARNING in apparmor_secid_to_secctx C 3344 284d 299d 271d edf4e7b7 apparmor: fix bad debug check in apparmor_secid_to_secctx()
KASAN: use-after-free Read in ceph_destroy_options 1 307d 306d 271d 8aaff151 ceph: avoid a use-after-free in ceph_destroy_options()
general protection fault in ovl_free_fs C 4 289d 291d 271d 8c25741a ovl: fix oopses in ovl_fill_super() failure paths
KMSAN: uninit-value in snd_midi_event_encode_byte C 3 295d 295d 271d 5a7b44a8 ALSA: rawmidi: Initialize allocated buffers
KASAN: use-after-free Read in __rhashtable_lookup (2) C 22 286d 306d 271d cc4dfb7f rds: fix two RCU related problems
general protection fault in rhashtable_walk_exit C 8 285d 288d 271d 12a78b02 tipc: check return value of __tipc_dump_start()
KASAN: use-after-free Read in sock_i_ino syz 127 284d 294d 271d 0a3b8b2b tipc: orphan sock in tipc_release()
BUG: unable to handle kernel paging request in kfree (2) C 297 299d 351d 274d 7913690d net/9p/client.c: version pointer uninitialized
KMSAN: uninit-value in memcmp (2) C 131 285d 276d 274d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
KASAN: use-after-free Write in ip6_dst_destroy 1 352d 352d 285d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KASAN: stack-out-of-bounds Read in fib_table_lookup 1 344d 344d 287d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in wiphy_register (2) C 8 312d 314d 287d 48400433 mac80211_hwsim: require at least one channel
KASAN: use-after-free Read in tipc_group_fill_sock_diag syz 35 293d 310d 287d 9a07efa9 tipc: switch to rhashtable iterator
KASAN: global-out-of-bounds Read in ip6_xmit 2 468d 468d 287d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
WARNING in __fsnotify_recalc_mask syz 9 309d 311d 287d d3bc0fa8 fsnotify: fix false positive warning on inode delete
KASAN: use-after-free Read in sctp_transport_get_next C 6 302d 305d 287d bab1be79 sctp: hold transport before accessing its asoc in sctp_transport_get_next
KASAN: stack-out-of-bounds Read in __schedule syz 4 298d 301d 287d b845c898 bpf, sockmap: fix sock_hash_alloc and reject zero-sized keys
BUG: soft lockup in shrink_dcache_parent (2) 7 379d 386d 288d 4fb48871 restore cond_resched() in shrink_dcache_parent()
INFO: task hung in fsnotify_mark_destroy_workfn syz 13 319d 433d 290d 128f3804 android: binder: Rate-limit debug and userspace triggered err msgs
KASAN: use-after-free Read in ip6_tnl_start_xmit 1 420d 420d 292d b84bbaf7 packet: in packet_snd start writing at link layer allocation
INFO: rcu detected stall in snd_pcm_oss_prepare 4 441d 443d 293d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
WARNING in up_write C 725 400d 448d 293d d7d760ef locking/rwsem: Add a new RWSEM_ANONYMOUSLY_OWNED flag
BUG: soft lockup in d_walk C 163 379d 424d 293d 4fb48871 restore cond_resched() in shrink_dcache_parent()
general protection fault in vsscanf C 7 319d 349d 295d 10aa1452 9p: fix multiple NULL-pointer-dereferences
net-next boot error 66 329d 334d 301d ca9e83b4 virtio-net: correctly update XDP_TX counters
WARNING in input_alloc_absinfo C 318 303d 376d 301d 100294ce Input: do not use WARN() in input_alloc_absinfo()
KASAN: use-after-free Read in ip6_hold_safe C 1 327d 327d 301d 6d37fa49 l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
KASAN: use-after-free Read in iotlb_access_ok 1 326d 322d 301d b13f9c63 vhost: reset metadata cache when initializing new IOTLB
general protection fault in process_init_reply C 24 307d 342d 301d e8f3bd77 fuse: Fix oops at process_init_reply()
WARNING: suspicious RCU usage in bpf_prog_array_copy_core C 22873 301d 315d 301d 965931e3 bpf: fix a rcu usage warning in bpf_prog_array_copy_core()
WARNING: lock held when returning to user space in fuse_lock_inode C 1439 307d 348d 301d 63576c13 fuse: fix initial parallel dirops
WARNING: refcount bug in llc_sap_find C 18 320d 322d 301d 0dcb8225 llc: use refcount_inc_not_zero() for llc_sap_find()
possible deadlock in rhashtable_lookup_insert_fast C 28 312d 315d 301d ff93bca7 ila: make lockdep happy again
KASAN: slab-out-of-bounds Write in crypto_dh_encode_key C 1401 323d 351d 301d 35f7d522 crypto: dh - fix calculating encoded key size
KASAN: slab-out-of-bounds Read in _autofs_dev_ioctl C 5 313d 314d 301d 0633da48 autofs: fix autofs_sbi() does not check super block type
KASAN: use-after-free Write in ip6_hold_safe C 25 324d 335d 301d 6d37fa49 l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
general protection fault in validate_checkpoint 186 327d 328d 301d d3f07c04 f2fs: fix invalid memory access
BUG: soft lockup in snd_virmidi_output_trigger 3 340d 442d 301d 50e9ffb1 ALSA: virmidi: Fix too long output trigger loop
general protection fault in send_sigurg_to_task C 6 313d 316d 301d 84fe4cc0 signal: Don't send signals to tasks that don't exist
KASAN: slab-out-of-bounds Write in eth_header_parse C 7 319d 332d 301d 4576cd46 packet: refine ring v3 block size test to hold one frame
WARNING in __snd_rawmidi_transmit_ack (2) C 6 307d 315d 301d 82fd4b05 ALSA: seq: virmidi: Fix discarding the unsubscribed output
general protection fault in send_sigio_to_task C 176 312d 316d 301d 84fe4cc0 signal: Don't send signals to tasks that don't exist
KASAN: use-after-free Read in do_shrink_slab 9 307d 310d 301d 8df4a44c mm: check shrinker is memcg-aware in register_shrinker_prepared()
KMSAN: uninit-value in do_msgrcv C 8 301d 377d 301d 39cfffd7 ipc/util.c: use ipc_rcu_putref() for failues in ipc_addid() 615c999c ipc: compute kern_ipc_perm.id under the ipc lock e2652ae6 ipc: reorganize initialization of kern_ipc_perm.seq
WARNING: ODEBUG bug in vsock_stream_connect C 42 321d 330d 301d 455f05ec vsock: split dwork to avoid reinitializations
KASAN: slab-out-of-bounds Read in pdu_read C 267 316d 351d 301d f984579a 9p: validate PDU length 7913690d net/9p/client.c: version pointer uninitialized
WARNING in close_fs_devices C 137 342d 385d 301d 81ffd56b btrfs: fix mount and ioctl device scan ioctl race
general protection fault in string (2) 1 326d 326d 301d a6bcfc89 net: check extack._msg before print
general protection fault in p9_fd_create_unix C 4 347d 350d 301d 10aa1452 9p: fix multiple NULL-pointer-dereferences
general protection fault in mount_fs C 1 446d 446d 301d 7464726c hfsplus: don't return 0 when fill_super() failed
general protection fault in open_fs_devices C 8 352d 384d 301d 81ffd56b btrfs: fix mount and ioctl device scan ioctl race
general protection fault in smc_ioctl (3) C 15 320d 321d 301d 7311d665 net/smc: move sock lock in smc_ioctl()
KASAN: slab-out-of-bounds Write in vmac_final C 2 378d 374d 301d bb296481 crypto: vmac - separate tfm and request context
BUG: corrupted list in p9_fd_cancel C 34 337d 351d 301d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
general protection fault in smc_tx_prepared_sends C 7 325d 327d 301d 7311d665 net/smc: move sock lock in smc_ioctl()
KASAN: use-after-free Read in p9_poll_workfn C 148 312d 351d 301d 430ac66e net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
WARNING: bad usercopy in __kvm_write_guest_page C 4 401d 395d 305d 0a06d425 KVM: vmx: use local variable for current_vmptr when emulating VMPTRST
WARNING in refcount_inc (3) C 7 450d 450d 305d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Write in irq_bypass_register_consumer C 1632 342d 602d 305d b5020a8e KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel.
KASAN: slab-out-of-bounds Write in process_preds C 6020 364d 440d 305d 70303420 tracing: Check for no filter when processing event filters
kernel BUG at net/ipv6/route.c:LINE! C 197 323d 345d 321d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
possible deadlock in bond_get_stats C 11 327d 331d 321d 7e2556e4 bonding: avoid lockdep confusion in bond_get_stats()
kernel BUG at mm/memory.c:LINE! 1 352d 351d 321d bfd40eaf mm: fix vma_is_anonymous() false-positives
WARNING in __ip6_make_skb C 1 345d 345d 321d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
general protection fault in tcp_gso_segment 1 346d 346d 321d ff907a11 net: skb_segment() should not return NULL
KASAN: use-after-free Read in refcount_sub_and_test_checked 3 326d 327d 321d e6aed040 Revert "net/ipv6: fix metrics leak"
WARNING in ip6_sk_dst_lookup_flow C 2 326d 343d 321d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in __nf_conntrack_find_get C 67 336d 343d 321d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
KASAN: invalid-free in fat_fill_super 1 349d 348d 321d 35033ab9 fat: fix memory allocation failure handling of match_strdup()
WARNING in ip6_setup_cork C 4 325d 345d 321d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: kernel-infoleak in put_cmsg C 3 353d 343d 321d 2efd4fca ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
BUG: unable to handle kernel paging request in neigh_update 1 340d 340d 321d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in gc_worker 10 337d 348d 321d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
kernel BUG at fs/userfaultfd.c:LINE! (2) C 8 326d 344d 321d 31e810aa userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KASAN: use-after-free Write in dst_release (2) C 3 326d 327d 321d e6aed040 Revert "net/ipv6: fix metrics leak"
KMSAN: kernel-infoleak in _copy_to_iter C 285 336d 372d 321d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
general protection fault in __delayacct_blkio_end C 50 336d 432d 321d b512719f delayacct: fix crash in delayacct_blkio_end() after delayacct init failure
unregister_netdevice: waiting for DEV to become free C 170521 321d 432d 321d 8cc88773 xfrm: fix missing dst_release() after policy blocking lbcast and multicast
general protection fault in rds_ib_get_mr C 9 362d 461d 321d 9e630bcb RDS: RDMA: Fix the NULL-ptr deref in rds_ib_get_mr
KASAN: out-of-bounds Read in bpf_test_finish 9 345d 351d 322d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: slab-out-of-bounds Read in ipv6_gso_pull_exthdrs C 4 360d 376d 322d bab2c80e nsh: set mac len based on inner packet
KASAN: stack-out-of-bounds Read in __d_lookup_rcu 1 341d 341d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING: refcount bug in smap_release_sock C 55 338d 377d 322d 7ebc14d5 bpf: sockmap, consume_skb in close path 547b3aa4 bpf: sockmap, error path can not release psock in multi-map case
KASAN: stack-out-of-bounds Read in __handle_mm_fault (2) C 3 339d 341d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in vma_interval_tree_insert (2) 1 336d 336d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in kernfs_find_ns 1 341d 341d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in __snd_rawmidi_transmit_ack syz 2 344d 344d 322d 39675f7a ALSA: rawmidi: Change resized buffers atomically
KASAN: stack-out-of-bounds Read in rb_next (2) 1 341d 341d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in scheduler_tick C 1 352d 351d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in neigh_flush_dev 1 347d 345d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in copy_page_range 1 341d 341d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __cgroup_account_cputime_field 1 341d 341d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in debug_check_no_obj_freed (5) 4 337d 344d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in unmap_page_range (3) 1 337d 337d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in cpuacct_account_field (2) 1 339d 339d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in lock_sock_nested 1 344d 344d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in netlink_has_listeners 1 344d 344d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel NULL pointer dereference in corrupted (2) C 1 342d 342d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: slab-out-of-bounds Read in corrupted C 1 342d 342d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in cpuacct_charge 1 336d 336d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in bpf_tcp_close C 1 341d 341d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in update_blocked_averages 1 347d 347d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KMSAN: uninit-value in af_alg_free_areq_sgls C 640 336d 443d 322d 2546da99 crypto: af_alg - Initialize sg_num_bytes in error code path
WARNING in bpf_check 3 342d 348d 322d c7a89784 bpf: don't leave partial mangled prog in jit_subprogs error path
KASAN: stack-out-of-bounds Read in __enqueue_entity 1 346d 346d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in account_system_index_time C 2 344d 351d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in sctp_assoc_update_frag_point 5 342d 364d 322d a6592547 sctp: fix the issue that pathmtu may be set lower than MINSEGMENT
kernel BUG at mm/slab.c:LINE! (2) C 701 337d 351d 322d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: stack-out-of-bounds Read in __task_pid_nr_ns 1 350d 350d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in locks_remove_posix C 1 339d 339d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in get_mem_cgroup_from_mm 1 350d 349d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in change_protection 1 344d 344d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in do_debug (2) 1 342d 342d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __delayacct_add_tsk 1 349d 349d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in __sock_release 1 341d 341d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in add_wait_queue C 1 351d 351d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in ext4_symlink 1 345d 344d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
INFO: rcu detected stall in vprintk_emit syz 2 358d 364d 322d 3bc53be9 net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL.
WARNING: refcount bug in smc_tcp_listen_work 1 384d 384d 322d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
WARNING in set_precision C 140 341d 382d 322d c604cb76 KEYS: DNS: fix parsing multiple options
BUG: unable to handle kernel paging request in cpuacct_charge syz 2 343d 343d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __acct_update_integrals 2 339d 347d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: use-after-free Read in ipv6_gso_pull_exthdrs C 5 340d 372d 322d bab2c80e nsh: set mac len based on inner packet
general protection fault in rb_next 1 343d 342d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Write in __tlb_remove_page_size 1 338d 337d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in timerqueue_add C 4 340d 356d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in rb_insert_color (2) 1 346d 346d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in __tlb_remove_page_size 1 339d 339d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in enqueue_task_fair 1 342d 342d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel paging request in account_system_index_time 1 340d 339d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in find_inode_nowait 1 351d 351d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in iov_iter_revert C 74 341d 408d 322d 32da1221 tls: Stricter error checking in zerocopy sendmsg path
general protection fault in smc_ioctl (2) C 43 322d 345d 322d 1992d998 net/smc: take sock lock in smc_ioctl()
KASAN: stack-out-of-bounds Read in tlb_flush_mmu_free 2 348d 350d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
general protection fault in do_tcp_getsockopt C 9 340d 352d 322d 6508b678 tcp: cleanup copied_seq and urg_data in tcp_disconnect
KASAN: use-after-free Read in bpf_test_finish C 1211 337d 351d 322d 6e6fddc7 bpf: fix panic due to oob in bpf_prog_test_run_skb
KASAN: use-after-free Write in skb_release_data C 1903 396d 448d 322d 993675a3 packet: reset network header if packet shorter than ll reserved space
KASAN: stack-out-of-bounds Read in rcu_process_callbacks C 1 345d 345d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
BUG: unable to handle kernel paging request in ttwu_do_activate 1 355d 355d 322d 99ba2b5a bpf: sockhash, disallow bpf_tcp_close and update in parallel
WARNING in smc_unhash_sk C 155731 324d 487d 322d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
kernel BUG at net/packet/af_packet.c:LINE! (3) syz 5 472d 519d 330d a6361f0c packet: fix bitfield update race
KASAN: slab-out-of-bounds Read in getname_kernel C 8 346d 446d 336d 02f51d45 autofs: fix slab out of bounds read in getname_kernel()
kernel BUG at mm/gup.c:LINE! syz 4 358d 356d 336d 24962af7 fs, elf: make sure to page align bss in load_elf_library bb177a73 mm: do not bug_on on incorrect length in __mm_populate()
KASAN: global-out-of-bounds Write in string C 7 391d 448d 336d fe10e398 reiserfs: fix buffer overflow with long warning messages
KASAN: use-after-free Read in l2tp_session_create 119 458d 525d 340d 6b9f3423 l2tp: fix races in tunnel creation
KMSAN: uninit-value in ip_tunnel_xmit C 2594 343d 430d 343d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in br_nf_forward_arp 1 389d 386d 343d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: kernel-infoleak in vcs_read C 531 372d 382d 347d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
WARNING: suspicious RCU usage in fib6_info_alloc syz 2 433d 432d 351d 27b10608 net/ipv6: Fix gfp_flags arg to addrconf_prefix_route
WARNING in kernfs_add_one C 174 351d 416d 351d 84d0c27d driver core: Don't ignore class_dir_create_and_add() failure.
INFO: rcu detected stall in unwind_next_frame 2 400d 403d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
BUG: unable to handle kernel paging request in dput C 26 382d 385d 351d d85b399b fix proc_fill_cache() in case of d_alloc_parallel() failure
general protection fault in fuse_ctl_remove_conn C 16 385d 424d 351d 6becdb60 fuse: fix control dir setup and teardown
WARNING in bpf_int_jit_compile syz 11 358d 395d 351d 9facc336 bpf: reject any prog that failed read-only lock
possible deadlock in sock_hash_free C 45 392d 392d 351d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
possible deadlock in __might_fault (2) C 20 421d 424d 351d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
KMSAN: uninit-value in _copy_to_iter (2) C 226 382d 428d 351d 670ae9ca vhost: fix info leak due to uninitialized memory
BUG: unable to handle kernel NULL pointer dereference in do_select 45 361d 361d 351d e88958e6 net: handle NULL ->poll gracefully
kernel BUG at fs/f2fs/inode.c:LINE! C 1 430d 430d 351d 5d64600d f2fs: avoid bug_on on corrupted inode
WARNING: ODEBUG bug in sock_hash_free 1 365d 364d 351d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
KASAN: slab-out-of-bounds Write in sha512_final C 21 363d 381d 351d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in rmd320_final C 44 363d 382d 351d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in kmem_cache_alloc_node_trace 1 438d 421d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Read in bpf_csum_update C 2 388d 386d 351d 58990d1f bpf: reject passing modified ctx to helper functions
KMSAN: uninit-value in ip_vs_lblcr_check_expire 2050 351d 428d 351d 3aa1409a ipvs: initialize tbl->entries after allocation
general protection fault in wb_workfn (2) 38 370d 395d 351d 3ee7e869 bdi: Fix another oops in wb_workfn()
INFO: rcu detected stall in is_bpf_text_address C 1 402d 402d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in __vfs_write syz 14 379d 382d 351d 66e58e0e bpfilter: fix race in pipe access
general protection fault in pipe_write syz 1 382d 382d 351d 66e58e0e bpfilter: fix race in pipe access
possible deadlock in tcp_mmap C 1908 420d 424d 351d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
KASAN: use-after-free Read in bpf_skb_change_proto 1 381d 380d 351d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: use-after-free Write in prb_fill_curr_block C 2 389d 389d 351d eb73190f net/packet: refine check for priv area size
kernel BUG at fs/f2fs/node.c:LINE! C 1 430d 430d 351d a4f843bd f2fs: give message and set need_fsck given broken node id
WARNING in skb_warn_bad_offload (2) C 6 423d 423d 351d a8c744a8 udp: disable gso with no_check_tx
BUG: unable to handle kernel NULL pointer dereference in ep_item_poll C 15 361d 361d 351d e88958e6 net: handle NULL ->poll gracefully
WARNING in bpf_prog_select_runtime syz 45 375d 376d 351d 9facc336 bpf: reject any prog that failed read-only lock
KASAN: slab-out-of-bounds Read in bpf_skb_vlan_push syz 2 377d 377d 351d 58990d1f bpf: reject passing modified ctx to helper functions
WARNING: kernel stack regs has bad 'bp' value (3) C 7971 353d 508d 351d b7b73cd5 crypto: x86/salsa20 - remove x86 salsa20 implementations
general protection fault in __vfs_write syz 25 379d 383d 351d 66e58e0e bpfilter: fix race in pipe access
INFO: task hung in n_tty_flush_buffer 6 359d 434d 351d ebec3f8f n_tty: Access echo_* variables carefully.
KASAN: use-after-free Read in skb_ensure_writable C 4 380d 386d 351d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: use-after-free Read in build_segment_manager C 5 430d 431d 351d 8a29c126 f2fs: sanity check for total valid node blocks
KASAN: use-after-free Read in bpf_tcp_close C 1748 356d 395d 351d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
KMSAN: uninit-value in nfqnl_recv_config (2) C 10 364d 379d 351d ba062ebb netfilter: nf_queue: augment nfqa_cfg_policy
KASAN: use-after-free Read in pipe_read C 3 381d 382d 351d 66e58e0e bpfilter: fix race in pipe access
KASAN: slab-out-of-bounds Read in crypto_morus640_decrypt_chunk C 8 370d 377d 351d a81ae809 crypto: morus640 - Fix out-of-bounds access
WARNING in perf_trace_buf_alloc (2) C 22 491d 596d 351d 4d220ed0 bpf: remove tracepoints from bpf core
KASAN: use-after-free Read in finish_wait 8 380d 382d 351d 66e58e0e bpfilter: fix race in pipe access
BUG: unable to handle kernel paging request in bpf_prog_select_runtime 1 366d 366d 351d 85782e03 bpf: undo prog rejection on read-only lock failure
WARNING: kmalloc bug in xdp_umem_create C 7 374d 380d 351d a343993c xsk: silence warning on memory allocation failure
KASAN: use-after-free Write in tls_push_record C 24 351d 396d 351d a447da7d tls: fix use-after-free in tls_push_record
KASAN: use-after-free Read in fib6_table_lookup 1 373d 372d 351d 9b0a8da8 net/ipv6: respect rcu grace period before freeing fib6_info
INFO: rcu detected stall in skb_free_head 4 389d 422d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in __kernel_write syz 7 380d 382d 351d 66e58e0e bpfilter: fix race in pipe access
WARNING in ion_dma_buf_begin_cpu_access C 62 359d 380d 351d 0a2bc003 staging: android: ion: Return an ERR_PTR in ion_map_kernel
WARNING: lock held when returning to user space! (2) C 9 411d 412d 351d 9e575010 net/ipv6: fix lock imbalance in ip6_route_del()
INFO: rcu detected stall in corrupted syz 1 400d 400d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: rcu detected stall in ip_route_output_key_hash 2 401d 405d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KMSAN: uninit-value in ebt_stp_mt_check (2) C 222 351d 383d 351d c568503e netfilter: x_tables: initialise match/target check parameter struct
kernel BUG at fs/f2fs/segment.c:LINE! syz 1 430d 430d 351d 8a29c126 f2fs: sanity check for total valid node blocks
BUG: unable to handle kernel NULL pointer dereference in corrupted C 5 382d 382d 351d c0129a06 smc: convert to ->poll_mask
KMSAN: uninit-value in eth_mac_addr 2 353d 386d 351d 644c7eeb rtnetlink: validate attributes in do_setlink()
KASAN: slab-out-of-bounds Write in tgr192_final C 30 363d 381d 351d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in wp384_final C 27 363d 382d 351d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in dev_queue_xmit_nit 1 396d 396d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Write in crypto_sha3_final C 68 363d 382d 351d 3619dec5 dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto C 2 380d 380d 351d 58990d1f bpf: reject passing modified ctx to helper functions
BUG: unable to handle kernel paging request in build_segment_manager C 1 431d 431d 351d b2ca374f f2fs: sanity check on sit entry
KASAN: null-ptr-deref Write in simple_write_to_buffer C 5 391d 416d 351d fc14eebf PM / hibernate: Fix oops at snapshot_write()
INFO: rcu detected stall in sctp_packet_transmit 1 405d 405d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
general protection fault in touch_atime syz 6 379d 382d 351d 66e58e0e bpfilter: fix race in pipe access
WARNING: possible circular locking dependency detected (4) C 27 424d 431d 351d 05255b82 tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
BUG: delta (-6195) <= 0 at net/dccp/ccids/ccid3.c:LINE/ccid3_hc_rx_send_feedback() 1 368d 368d 351d 74174fe5 net: dccp: avoid crash in ccid3_hc_rx_send_feedback()
INFO: rcu detected stall in sctp_chunk_put 1 389d 389d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: slab-out-of-bounds Read in ip6_xmit (3) C 69 356d 398d 351d 9901c5d7 bpf: sockmap, fix crash when ipv6 sock is added
KASAN: slab-out-of-bounds Read in skb_ensure_writable C 9 377d 386d 351d 58990d1f bpf: reject passing modified ctx to helper functions
INFO: rcu detected stall in sctp_generate_heartbeat_event 2 403d 413d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KASAN: use-after-free Read in bpf_csum_update C 1 388d 386d 351d 58990d1f bpf: reject passing modified ctx to helper functions
BUG: soft lockup in do_raw_spin_unlock (2) 1 379d 379d 351d 4fb48871 restore cond_resched() in shrink_dcache_parent()
BUG: unable to handle kernel paging request in bpf_int_jit_compile syz 2 363d 366d 351d 85782e03 bpf: undo prog rejection on read-only lock failure
general protection fault in __mnt_want_write 1 380d 380d 351d 66e58e0e bpfilter: fix race in pipe access
KASAN: use-after-free Write in bpf_tcp_close C 67 358d 393d 351d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
general protection fault in bpf_tcp_close C 421 351d 395d 351d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close 54fedb42 bpf: sockmap, fix smap_list_map_remove when psock is in many maps
general protection fault in smc_ioctl C 5214 373d 402d 351d 2351abe6 net/smc: return 0 for ioctl calls in states INIT and CLOSED
INFO: rcu detected stall in kfree_skbmem 4 390d 421d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: task hung in tty_set_termios 1 452d 450d 351d ebec3f8f n_tty: Access echo_* variables carefully.
bpf-next boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 3 383d 385d 351d bf956be5 umh: fix race condition
WARNING in do_dentry_open C 26 374d 382d 351d b1655857 bpf: implement dummy fops for bpf objects
KASAN: slab-out-of-bounds Write in prb_fill_curr_block C 2 389d 389d 351d eb73190f net/packet: refine check for priv area size
KASAN: slab-out-of-bounds Read in build_segment_manager C 1 431d 431d 351d 8a29c126 f2fs: sanity check for total valid node blocks
KASAN: use-after-free Read in xfs_inobt_init_key_from_rec C 1 448d 448d 351d 2e050e64 xfs: fix inobt magic number check
WARNING: refcount bug in __udp_gso_segment 2 410d 410d 351d 575b65bc udp: avoid refcount_t saturation in __udp_gso_segment()
INFO: task hung in namespace_unlock 15 355d 364d 351d ebec3f8f n_tty: Access echo_* variables carefully.
KMSAN: uninit-value in rtnetlink_put_metrics syz 3 385d 386d 351d 5b5e7a0d net: metrics: add proper netlink validation
KASAN: slab-out-of-bounds Read in bpf_skb_change_head C 2 376d 376d 351d 58990d1f bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Write in sha1_finup C 119 363d 383d 351d 3619dec5 dh key: fix rounding up KDF output length
WARNING: kmalloc bug in map_get_next_key C 5 404d 405d 351d 683d2ac3 bpf: fix sock hashmap kmalloc warning
unexpected kernel reboot (2) C 2073 351d 441d 351d 0447378a kvm: vmx: Nested VM-entry prereqs for event inj.
BUG: workqueue lockup (3) C 1215 355d 407d 351d 4fb48871 restore cond_resched() in shrink_dcache_parent()
INFO: rcu detected stall in ipv6_addr_label 1 485d 484d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
WARNING: kernel stack frame pointer has bad value C 1108 353d 432d 351d f044a84e crypto: don't optimize keccakf()
KASAN: use-after-free Read in fuse_kill_sb_blk 4 401d 421d 351d 543b8f86 fuse: don't keep dead fuse_conn at fuse_fill_super().
general protection fault in vfs_read syz 2 381d 382d 351d 66e58e0e bpfilter: fix race in pipe access
KASAN: use-after-free Read in ip6_route_mpath_notify C 25 384d 388d 351d f7225172 net/ipv6: prevent use after free in ip6_route_mpath_notify
BUG: unable to handle kernel NULL pointer dereference in do_sys_poll C 297 361d 361d 351d e88958e6 net: handle NULL ->poll gracefully
WARNING in ebt_do_table C 13 359d 384d 351d 11ff7288 netfilter: ebtables: reject non-bridge targets
WARNING in sysfs_remove_group C 11125 352d 606d 351d d3349b6b loop: remember whether sysfs_create_group() was done
KASAN: null-ptr-deref Write in xdp_umem_unaccount_pages C 25 379d 383d 351d c09290c5 bpf, xdp: fix crash in xdp_umem_unaccount_pages
WARNING: kernel stack regs at (ptrval) in syzkaller has bad 'bp' value (ptrval) C 3 427d 428d 351d f044a84e crypto: don't optimize keccakf()
KASAN: slab-out-of-bounds Write in tls_push_record 2 366d 380d 351d a447da7d tls: fix use-after-free in tls_push_record
WARNING: suspicious RCU usage in rt6_remove_exception_rt syz 1761 426d 427d 351d 091311de net/ipv6: fix LOCKDEP issue in rt6_remove_exception_rt()
INFO: task hung in blk_queue_enter C 1595 351d 423d 351d cd4a4ae4 block: don't use blocking queue entered for recursive bio submits
KASAN: use-after-free Read in skb_dequeue C 4 369d 369d 351d 945d015e net/packet: fix use-after-free
KASAN: slab-out-of-bounds Write in sha1_final C 201 363d 382d 351d 3619dec5 dh key: fix rounding up KDF output length
KASAN: use-after-free Read in corrupted C 2 405d 408d 351d 543b8f86 fuse: don't keep dead fuse_conn at fuse_fill_super().
WARNING in ion_buffer_destroy C 7901 380d 531d 351d 45ad559a staging: android: ion: Switch to pr_warn_once in ion_buffer_destroy
KASAN: slab-out-of-bounds Write in tgr160_final C 55 363d 382d 351d 3619dec5 dh key: fix rounding up KDF output length
KASAN: use-after-free Read in crypto_morus640_decrypt_chunk C 3 377d 377d 351d a81ae809 crypto: morus640 - Fix out-of-bounds access
WARNING: ODEBUG bug in del_timer (2) C 6 403d 404d 351d be7f3e59 net/smc: init conn.tx_work & conn.send_lock sooner
INFO: task hung in jbd2_journal_stop 1 446d 446d 351d ebec3f8f n_tty: Access echo_* variables carefully.
INFO: rcu detected stall in n_tty_receive_char_special C 3 422d 445d 351d 3d63b7e4 n_tty: Fix stall at n_tty_receive_char_special().
net-next boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 8 382d 394d 351d bf956be5 umh: fix race condition
KMSAN: uninit-value in ip_vs_lblc_check_expire C 1431 351d 428d 351d 8b2ebb6c ipvs: initialize tbl->entries in ip_vs_lblc_init_svc()
KASAN: null-ptr-deref Read in refcount_sub_and_test C 4 431d 432d 351d 263243d6 net/ipv6: Fix ip6_convert_metrics() bug
INFO: rcu detected stall in __ipv6_dev_get_saddr 1 391d 391d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
WARNING: suspicious RCU usage in rt6_check_expired 4 428d 428d 351d c3c14da0 net/ipv6: add rcu locking to ip6_negative_advice
INFO: rcu detected stall in blkdev_ioctl C 249 381d 556d 351d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
INFO: rcu detected stall in __save_stack_trace 3 351d 484d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: task hung in commit_echoes 1 359d 355d 351d ebec3f8f n_tty: Access echo_* variables carefully.
WARNING: kmalloc bug in memdup_user (3) C 137 404d 405d 351d 683d2ac3 bpf: fix sock hashmap kmalloc warning
KASAN: slab-out-of-bounds Write in sha512_finup C 25 363d 380d 351d 3619dec5 dh key: fix rounding up KDF output length
INFO: rcu detected stall in d_walk C 25680 376d 438d 351d 4fb48871 restore cond_resched() in shrink_dcache_parent()
KASAN: use-after-free Read in pipe_wait 2 379d 380d 351d 66e58e0e bpfilter: fix race in pipe access
INFO: rcu detected stall in save_stack_trace C 1 401d 400d 351d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
INFO: rcu detected stall in __process_echoes C 326 358d 454d 351d ebec3f8f n_tty: Access echo_* variables carefully.
INFO: task hung in blk_freeze_queue C 188 352d 503d 351d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
upstream boot error: KASAN: use-after-free Write in call_usermodehelper_exec_work 5 380d 381d 351d bf956be5 umh: fix race condition
possible deadlock in bpf_tcp_close C 152 392d 393d 351d e9db4ef6 bpf: sockhash fix omitted bucket lock in sock_close
WARNING in arch_uprobe_analyze_insn C 2 407d 407d 351d 90718e32 uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn()
KASAN: use-after-free Read in rds_cong_queue_updates C 18168 356d 488d 351d f1693c63 rds: avoid unenecessary cong_update in loop transport c809195f rds: clean up loopback rds_connections on netns deletion
KASAN: use-after-free Read in iput C 2 433d 433d 352d 0c92c7a3 tracing: Fix bad use of igrab in trace_uprobe.c
INFO: task hung in ucma_destroy_id C 46 432d 469d 355d ef95a90a RDMA/ucma: ucma_context reference leak in error path
BUG: corrupted list in tipc_nametbl_unsubscribe C 40 413d 472d 355d c3317f4d tipc: fix unbalanced reference counter
general protection fault in kernel_sock_shutdown C 3329 429d 487d 355d 1255fcb2 net/smc: fix shutdown in state SMC_LISTEN
INFO: trying to register non-static key in tun_do_read C 28 407d 413d 372d 7063efd3 tuntap: fix use after free during release
KASAN: use-after-free Read in iptunnel_handle_offloads C 133 397d 442d 372d 9aad13b0 packet: fix reserve calculation
WARNING: suspicious RCU usage in rds_loop_conn_alloc C 34303 490d 498d 378d d4014d8c rds: do not call ->conn_alloc with GFP_KERNEL
KASAN: use-after-free Read in copyout C 11 400d 457d 383d b84bbaf7 packet: in packet_snd start writing at link layer allocation
BUG: unable to handle kernel paging request in nla_strlcpy 1 391d 391d 383d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
KMSAN: uninit-value in ebt_stp_mt_check C 211 383d 428d 383d a4995684 netfilter: bridge: stp fix reference to uninitialized data
KASAN: use-after-free Read in radix_tree_next_chunk C 2749 399d 450d 383d 79f546a6 fs: don't scan the inode cache before SB_BORN is set
WARNING in __mutex_unlock_slowpath C 2 419d 422d 383d 7a4deea1 idr: fix invalid ptr dereference on item delete
KASAN: use-after-free Read in nla_strlcpy C 59 387d 399d 383d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
kernel BUG at lib/string.c:LINE! (4) C 2 405d 405d 383d 52f96757 ipvs: fix buffer overflow with sync daemon and service
general protection fault in mr_mfc_find_parent 2 395d 401d 383d 66fb3325 ipmr: properly check rhltable_init() return value
KASAN: use-after-free Read in timer_is_static_object 1 404d 404d 383d 2677d206 dccp: don't free ccid2_hc_tx_sock struct in dccp_disconnect()
general protection fault in __radix_tree_delete C 38 395d 422d 383d 7a4deea1 idr: fix invalid ptr dereference on item delete
BUG: unable to handle kernel paging request in smc_ib_remember_port_attr C 112 400d 456d 383d d49baa7e net/smc: check for missing nlattrs in SMC_PNETID messages
KASAN: use-after-free Read in __sk_free 1 404d 404d 383d 9709020c sock_diag: fix use-after-free read in __sk_free
WARNING: ODEBUG bug in hfsplus_fill_super C 1 451d 450d 383d 66072c29 hfsplus: stop workqueue when fill_super() failed
kernel BUG at include/linux/mm.h:LINE! syz 68 383d 420d 383d a466ef76 x86/kexec: Avoid double free_page() upon do_kexec_load() failure
BUG: spinlock bad magic in tun_do_read syz 1 413d 413d 383d b196d88a tun: fix use after free for ptr_ring
general protection fault in shmem_unused_huge_count 8 405d 407d 383d 79f546a6 fs: don't scan the inode cache before SB_BORN is set
WARNING in kcm_exit_net (3) syz 5 390d 390d 383d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
KASAN: use-after-free Read in remove_wait_queue (2) C 4 471d 482d 383d af8d3c7c ppp: remove the PPPIOCDETACH ioctl
KASAN: slab-out-of-bounds Read in nla_strlcpy C 34 387d 399d 383d 4b83a904 netfilter: provide correct argument to nla_strlcpy()
BUG: soft lockup in _decode_session6 C 1 409d 409d 383d d9f92772 xfrm6: avoid potential infinite loop in _decode_session6()
general protection fault in kernfs_kill_sb (2) C 22 397d 409d 383d 82382ace kernfs: deal with kernfs_fill_super() failures
kernel BUG at net/ipv4/tcp_output.c:LINE! (2) syz 23 414d 520d 383d 7f582b24 tcp: purge write queue in tcp_connect_init()
KASAN: use-after-free Read in sock_recv_errqueue 1 406d 406d 383d b84bbaf7 packet: in packet_snd start writing at link layer allocation
WARNING in dev_vprintk_emit C 77 397d 524d 383d 81459649 cfg80211: further limit wiphy names to 64 bytes
KASAN: use-after-free Read in __dev_queue_xmit (2) C 2 400d 400d 383d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KASAN: stack-out-of-bounds Write in compat_copy_entries syz 10 388d 426d 383d 94c752f9 netfilter: ebtables: handle string from userspace with care
KASAN: use-after-free Read in skb_copy_datagram_iter C 7 418d 456d 383d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KASAN: slab-out-of-bounds Read in __ext4_check_dir_entry C 18 450d 450d 392d e40ff213 ext4: force revalidation of directory pointer after seekdir(2)
general protection fault in gfn_to_rmap syz 7 492d 602d 403d b7e31be3 KVM: x86: fix vcpu initialization with userspace lapic
KASAN: use-after-free Read in tls_sk_proto_close (2) C 297 409d 416d 404d 98f0a395 tls: fix use after free in tls_sk_proto_close
WARNING in add_uevent_var C 5 449d 449d 404d a7cfebcb cfg80211: limit wiphy names to 128 bytes
KASAN: use-after-free Read in debugfs_remove (2) 1 430d 428d 404d f53823c1 bdi: Fix use after free bug in debugfs_remove()
KMSAN: uninit-value in move_addr_to_user (2) C 44 405d 412d 404d 09c8b971 tipc: fix one byte leak in tipc_sk_set_orig_addr()
BUG: MAX_LOCK_DEPTH too low! 1 420d 420d 404d af50e4ba nsh: fix infinite loop
general protection fault in wb_workfn 63 405d 432d 404d b8b78495 bdi: Fix oops in wb_workfn()
INFO: task hung in handle_userfault 3 418d 441d 404d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
INFO: task hung in sock_sendmsg 1 441d 441d 404d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
INFO: task hung in get_timespec64 1 439d 439d 404d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
KASAN: use-after-free Read in perf_trace_rpc_stats_latency 1 421d 421d 404d 98eb6cf2 sunrpc: Fix latency trace point crashes
KASAN: use-after-free Read in sctp_do_sm 2 412d 413d 404d 6910e25d sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg
INFO: task hung in __do_page_fault 1 436d 435d 404d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
WARNING in __snd_pcm_lib_xfer syz 6 417d 419d 404d f13876e2 ALSA: pcm: Check PCM state at xfern compat ioctl
KMSAN: uninit-value in strcmp C 3 416d 418d 404d 94f6a80c tipc: eliminate KMSAN uninit-value in strcmp complaint
INFO: task hung in do_vfs_ioctl 2 419d 437d 404d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
BUG: bad usercopy in __check_object_size 1 414d 414d 404d 2c5d5b13 llc: better deal with too small mtu
WARNING in xfrm6_tunnel_net_exit syz 14002 407d 537d 404d b48c05ab xfrm: Fix warning in xfrm6_tunnel_net_exit.
INFO: task hung in wb_shutdown (2) 5064 416d 450d 404d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
KASAN: slab-out-of-bounds Read in pfkey_add C 835 409d 556d 404d 4b66af2d af_key: Always verify length of provided sadb_key
INFO: task hung in do_set_master 1 444d 444d 404d 8236b0ae bdi: wake up concurrent wb_shutdown() callers.
KMSAN: uninit-value in __sctp_v6_cmp_addr C 1109 405d 406d 404d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
kernel BUG at kernel/softirq.c:LINE! 1 418d 418d 405d a8d7aa17 dccp: fix tasklet usage
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt C 9 405d 410d 405d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
KASAN: slab-out-of-bounds Read in __sctp_v6_cmp_addr C 3202 416d 428d 405d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
general protection fault in smc_set_keepalive C 6 421d 426d 405d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
KMSAN: uninit-value in put_cmsg C 2 419d 419d 405d eb80ca47 rds: do not leak kernel memory to user land
KMSAN: uninit-value in rt6_multipath_hash C 3 405d 423d 405d cea67a2d ipv6: fix uninit-value in ip6_multipath_l3_keys()
general protection fault in smc_getname C 44 417d 481d 405d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
general protection fault in smc_setsockopt C 504 417d 481d 405d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
WARNING in tcp_mark_head_lost C 18 414d 496d 405d 16ae6aa1 net-backports: tcp: ignore Fast Open on repair mode
general protection fault in smc_getsockopt C 577 417d 477d 405d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
WARNING in tracepoint_probe_unregister (2) 120 414d 469d 405d d66a270b tracepoint: Do not warn on ENOMEM
WARNING: kobject bug in br_add_if 41 413d 440d 405d e8238fc2 bridge: check iface upper dev when setting master via ioctl 3e14c6ab kobject: don't use WARN for registration failures
WARNING in tcp_sacktag_write_queue C 8 421d 493d 405d bf2acc94 tcp: fix TCP_REPAIR_QUEUE bound checking
WARNING: ODEBUG bug in del_timer C 200 405d 422d 405d 784813ae net/smc: restrict non-blocking connect finish
WARNING in tracepoint_probe_register_prio (2) C 849 405d 469d 405d d66a270b tracepoint: Do not warn on ENOMEM
WARNING: kmalloc bug in memdup_user (2) 1 456d 455d 407d 5f3e3b85 RDMA/ucma: Correct option size check using optlen
KASAN: slab-out-of-bounds Read in clusterip_tg_check C 22 506d 513d 407d 1a38956c netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check()
WARNING: suspicious RCU usage in tipc_bearer_find C 21 500d 500d 407d ed4ffdfe tipc: Fix missing RTNL lock protection during setting link properties
general protection fault in account_system_index_time C 2 454d 454d 407d ae474573 net: Fix untag for vlan packets without ethernet header
INFO: trying to register non-static key in del_timer_sync C 89 486d 512d 407d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
general protection fault in rdma_addr_size C 2 465d 458d 407d e8980d67 RDMA/ucma: Ensure that CM_ID exists prior to access it
BUG: unable to handle kernel paging request in memset_erms (2) C 11 506d 521d 407d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KASAN: null-ptr-deref Write in linear_transfer C 116 453d 536d 408d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
BUG: unable to handle kernel paging request in cgroup_mt_destroy_v1 C 3 509d 509d 408d ba7cd5d9 netfilter: xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
BUG: workqueue lockup (2) C 406 411d 569d 408d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
KASAN: use-after-free Write in xt_rateest_put C 7 510d 512d 408d 7dc68e98 netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert
KASAN: use-after-free Read in ip6_xmit C 5174 459d 537d 412d c113187d tls: Use correct sk->sk_prot for IPV6
WARNING: bad unlock balance in xfs_iunlock C 1 448d 448d 412d 8241f7f9 xfs: don't iunlock the quota ip when quota block
KASAN: out-of-bounds Read in ip6_xmit 2 471d 512d 412d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
KASAN: use-after-free Read in work_is_static_object 3 517d 533d 412d 2cc683e8 kcm: lock lower socket in kcm_attach
KASAN: use-after-free Read in __dev_queue_xmit C 10 419d 537d 412d d0c081b4 flow_dissector: properly cap thoff field
KASAN: use-after-free Read in tipc_nametbl_stop C 12 431d 435d 413d be47e41d tipc: fix use-after-free in tipc_nametbl_stop
KMSAN: uninit-value in pppol2tp_connect C 13 413d 428d 413d eb1c28c0 l2tp: check sockaddr length in pppol2tp_connect()
KMSAN: uninit-value in alg_bind C 1950 413d 444d 413d a466856e crypto: af_alg - fix possible uninit-value in alg_bind()
BUG: corrupted list in sctp_association_free 1 473d 469d 413d d98985dd sctp: fix error return code in sctp_sendmsg_new_asoc()
KASAN: null-ptr-deref Read in xattr_getsecurity 68 429d 441d 413d 1f578172 commoncap: Handle memory allocation failure.
BUG: corrupted list in __dentry_kill C 35 430d 450d 413d 4a3877c4 rpc_pipefs: fix double-dput()
KMSAN: uninit-value in packet_set_ring C 6 419d 436d 413d 5171b37d net: af_packet: fix race in PACKET_{R|T}X_RING
INFO: rcu detected stall in __snd_pcm_lib_xfer (2) C 1064 440d 445d 413d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
KMSAN: uninit-value in strlcpy C 2 415d 415d 413d 537b361f vti6: better validate user provided tunnel names
KMSAN: uninit-value in iptable_mangle_hook C 1134 413d 444d 413d b855ff82 dccp: initialize ireq->ir_mark
general protection fault in tipc_conn_close C 3 490d 491d 413d 96c252bf tipc: fix bug on error path in tipc_topsrv_kern_subscr()
KASAN: stack-out-of-bounds Write in ip6gre_tunnel_locate C 923 438d 446d 413d 5f42df01 ip6_gre: better validate user provided tunnel names
WARNING in kill_block_super C 51 434d 452d 413d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Read in llc_conn_ac_send_sabme_cmd_p_set_x 1 436d 435d 413d f7e43672 llc: hold llc_sap before release_sock()
KASAN: use-after-free Read in mac80211_hwsim_del_radio 11 452d 481d 413d 8cfd36a0 mac80211_hwsim: fix use-after-free bug in hwsim_exit_net
KASAN: use-after-free Read in llc_conn_tmr_common_cb 1 434d 432d 413d b905ef9a llc: delete timers synchronously in llc_sk_free()
KASAN: use-after-free Read in pppol2tp_connect (3) C 22 439d 457d 413d 6b9f3423 l2tp: fix races in tunnel creation
KASAN: use-after-free Read in tipc_sub_unsubscribe (2) C 5 432d 440d 413d c3317f4d tipc: fix unbalanced reference counter
KMSAN: uninit-value in netlink_sendmsg C 2493 413d 444d 413d 6091f09c netlink: fix uninit-value in netlink_sendmsg
kernel BUG at fs/ext4/extents.c:LINE! C 1 450d 450d 413d 349fa7d6 ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS
general protection fault in snd_rawmidi_ioctl_compat 1 440d 432d 413d 8a56ef4f ALSA: rawmidi: Fix missing input substream checks in compat ioctls
WARNING: lock held when returning to user space! C 40 430d 445d 413d bdac616d loop: fix LOOP_GET_STATUS lock imbalance
KASAN: stack-out-of-bounds Write in ip6_tnl_locate 4 439d 440d 413d db7a65e3 ip6_tunnel: better validate user provided tunnel names
KMSAN: uninit-value in ip_route_output_key_hash_rcu 179 413d 444d 413d d0ea2b12 ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
WARNING: kobject bug in device_add C 563 413d 453d 413d 3e14c6ab kobject: don't use WARN for registration failures
inconsistent lock state in fs_reclaim_acquire C 36235 413d 424d 413d 6c1e851c random: fix possible sleeping allocation from irq context
INFO: task hung in __blkdev_get C 662 437d 563d 413d 1e047eaa block/loop: fix deadlock after loop_set_status
WARNING in ext4_superblock_csum_set C 1 449d 449d 413d a45403b5 ext4: always initialize the crc32c checksum driver
KASAN: stack-out-of-bounds Write in __ip_tunnel_create C 29 439d 446d 413d 9cb726a2 ip_tunnel: better validate user provided tunnel names
KMSAN: uninit-value in inet6_rtm_delroute C 9 432d 444d 413d b1993a2d net: fix rtnh_ok()
general protection fault in ucma_set_ib_path (2) C 6 440d 448d 413d 8435168d RDMA/ucma: Don't allow setting RDMA_OPTION_IB_PATH without an RDMA device
KMSAN: uninit-value in inet_csk_bind_conflict C 446 413d 444d 413d 3099a529 soreuseport: initialise timewait reuseport field
WARNING: inconsistent lock state C 22 424d 428d 413d 6c1e851c random: fix possible sleeping allocation from irq context
KMSAN: uninit-value in sctp_do_bind C 31 413d 443d 413d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
INFO: rcu detected stall in io_playback_transfer 9 440d 445d 413d e15dc99d ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation
KMSAN: uninit-value in move_addr_to_user C 74 413d 444d 413d 6780db24 sctp: do not leak kernel memory to user space
general protection fault in loopback_pos_update C 4 521d 518d 413d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KMSAN: uninit-value in netif_skb_features C 119 413d 439d 413d 7ce23672 vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
WARNING: refcount bug in free_nsproxy 4 452d 477d 413d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KMSAN: uninit-value in fib6_new_table C 3 429d 430d 413d aa8f8778 ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
general protection fault in __list_del_entry_valid (3) C 40 451d 450d 413d b714295a tipc: Fix missing list initializations in struct tipc_subscription
INFO: rcu detected stall in bitmap_parselist 8 421d 450d 413d 8351760f lib: fix stall in __bitmap_parselist()
KASAN: use-after-free Read in alloc_pid C 7 441d 450d 413d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KMSAN: uninit-value in fib_create_info C 19 438d 444d 413d b1993a2d net: fix rtnh_ok()
WARNING in tty_set_ldisc syz 177 421d 597d 413d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore().
KASAN: use-after-free Read in binder_release_work C 6 426d 447d 413d 7aa135fc ANDROID: binder: prevent transactions into own process.
BUG: unable to handle kernel paging request in snd_pcm_format_set_silence syz 11 413d 440d 413d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
WARNING in format_decode C 1 450d 450d 413d 9ad553ab fs/reiserfs/journal.c: add missing resierfs_warning() arg
KMSAN: uninit-value in neigh_dump_info C 6 425d 440d 413d 7dd07c14 net: validate attribute sizes in neigh_dump_table()
WARNING: kobject bug in gfs2_sys_fs_add C 49 424d 450d 413d 3e14c6ab kobject: don't use WARN for registration failures
kernel BUG at drivers/tty/tty_ldisc.c:LINE! 6 434d 450d 413d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore(). bcdd0ca8 tty: Use __GFP_NOFAIL for tty_ldisc_get()
possible deadlock in perf_event_detach_bpf_prog 1 453d 452d 413d 3a38bb98 bpf/tracing: fix a deadlock in perf_event_detach_bpf_prog
general protection fault in tipc_sk_fill_sock_diag C 180 438d 456d 413d 4b2e6877 tipc: Fix namespace violation in tipc_sk_fill_sock_diag e41f0548 tipc: use the right skb in tipc_sk_fill_sock_diag()
WARNING: kobject bug in netdev_queue_update_kobjects C 27 415d 477d 413d 3e14c6ab kobject: don't use WARN for registration failures
general protection fault in __mem_cgroup_free C 22 439d 450d 413d 4eaf431f memcg: fix per_node_info cleanup
general protection fault in kernfs_kill_sb C 29 413d 450d 413d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KMSAN: uninit-value in memcmp C 30 414d 444d 413d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
possible deadlock in rtnl_lock (5) C 1009 426d 455d 413d 5c64576a ipvs: fix rtnl_lock lockups caused by start_sync_thread
BUG: corrupted list in team_nl_cmd_options_set C 2 436d 439d 413d 4fb0534f team: avoid adding twice the same option to the event list
WARNING in strp_done C 2336 447d 496d 413d dff8baa2 kcm: Call strp_stop before strp_done in kcm_attach
KMSAN: uninit-value in inet_getpeer C 54 413d 442d 413d b6a37e5e inetpeer: fix uninit-value in inet_getpeer
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (3) C 234 490d 493d 413d 26736a08 tipc: don't call sock_release() in atomic context
KASAN: use-after-free Read in shm_get_unmapped_area 19 509d 600d 413d 3f05317d ipc/shm: fix use-after-free of shm file via remap_file_pages()
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected C 2126 413d 428d 413d 6c1e851c random: fix possible sleeping allocation from irq context
kernel panic: n_tty: init_tty C 141 413d 597d 413d 903f9db1 tty: Don't call panic() at tty_ldisc_init()
INFO: task hung in stop_sync_thread (2) C 9 436d 453d 413d 5c64576a ipvs: fix rtnl_lock lockups caused by start_sync_thread
kernel BUG at drivers/vhost/vhost.c:LINE! (2) C 139 414d 444d 413d d14d2b78 vhost: fix vhost_vq_access_ok() log check
WARNING in __might_sleep 6 425d 428d 413d 6c1e851c random: fix possible sleeping allocation from irq context
general protection fault in rds_sendmsg C 2 488d 487d 413d 79a5b972 rds: rds_msg_zcopy should return error of null rm->data.op_mmp_znotifier
WARNING: suspicious RCU usage in crng_reseed 39 414d 428d 413d 6c1e851c random: fix possible sleeping allocation from irq context
WARNING: refcount bug in put_pid_ns syz 6 451d 450d 413d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: use-after-free Write in dst_release C 832 438d 448d 413d bfacfb45 pptp: remove a buggy dst release in pptp_connect()
WARNING in snd_pcm_hw_params C 56 440d 445d 413d e1a3a981 ALSA: pcm: Remove WARN_ON() at snd_pcm_hw_params() error
KASAN: use-after-free Read in sctp_association_free (2) C 2 473d 472d 413d 0aee4c25 sctp: Fix double free in sctp_sendmsg_to_asoc
general protection fault in __tipc_nl_net_set syz 4 434d 435d 413d c6404122 tipc: fix possible crash in __tipc_nl_net_set()
KASAN: use-after-free Read in snd_pcm_timer_resolution C 3 452d 452d 413d a820ccbe ALSA: pcm: Fix UAF at PCM release via PCM timer access
WARNING: refcount bug in should_fail C 3 451d 482d 413d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KASAN: slab-out-of-bounds Write in perf_callchain_user syz 2 439d 439d 413d 5af44ca5 perf: Fix sample_max_stack maximum check
KASAN: stack-out-of-bounds Read in __free_filter C 41 431d 440d 413d 0b3dec05 tracing: Enforce passing in filter=NULL to create_filter()
WARNING in __local_bh_enable_ip (2) 23 457d 467d 413d 53d0e83f rds: tcp: must use spin_lock_irq* and not spin_lock_bh with rds_tcp_conn_lock
KMSAN: uninit-value in tcp_parse_options C 38 414d 440d 413d 72123032 tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
WARNING in kmem_cache_free 1 445d 445d 413d eea0d3ea crypto: drbg - set freed buffers to NULL
WARNING in __debug_object_init C 192 446d 456d 413d bd031430 alarmtimer: Init nanosleep alarm timer on stack
KMSAN: uninit-value in __skb_try_recv_from_queue C 108 413d 444d 413d b13dda9f net: initialize skb->peeked when cloning
KASAN: stack-out-of-bounds Write in ipip6_tunnel_locate C 33 438d 446d 413d b95211e0 ipv6: sit: better validate user provided tunnel names
KMSAN: uninit-value in tipc_node_get_mtu C 139 413d 444d 413d 335b929b tipc: fix missing initializer in tipc_sendmsg()
KASAN: null-ptr-deref Read in refcount_inc_not_zero C 2352 426d 428d 413d 3a04ce71 llc: fix NULL pointer deref for SOCK_ZAPPED
WARNING: refcount bug in nfs_alloc_client 2 450d 450d 413d 8e04944f mm,vmscan: Allow preallocating memory for register_shrinker().
KMSAN: uninit-value in ip6table_mangle_hook C 601 413d 444d 413d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in pppoe_connect 47 413d 428d 413d a49e2f5d pppoe: check sockaddr length in pppoe_connect()
KMSAN: uninit-value in sctp_sendmsg syz 27 413d 443d 413d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
possible deadlock in smc_close_non_accepted C 4 480d 480d 416d 3d502067 net/smc: simplify wait when closing listen socket
KASAN: slab-out-of-bounds Write in tcp_v6_syn_recv_sock C 1063 521d 538d 426d d91c3e17 net/tls: Only attach to sockets in ESTABLISHED state
possible deadlock in ftrace_profile_set_filter (2) C 1007 509d 569d 426d 43fa87f7 perf/core: Fix another perf,trace,cpuhp lock inversion
BUG: unable to handle kernel paging request in compat_copy_entries syz 5 479d 477d 426d b7181216 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
KASAN: use-after-free Read in perf_trace_lock_acquire (2) C 188 508d 580d 426d 4cd87951 vhost_net: stop device during reset owner
possible deadlock in perf_trace_destroy (2) C 2006 509d 595d 426d 82d94856 perf/core: Fix lock inversion between perf,trace,cpuhp
possible deadlock in __neigh_create 1 450d 450d 440d 1bfa26ff ipv6: fix possible deadlock in rt6_age_examine_exception()
KASAN: use-after-free Read in disk_unblock_events C 65 497d 602d 442d 89736653 genhd: Fix use after free in __blkdev_get()
WARNING in binder_send_failed_reply C 206 487d 571d 442d e46a3b3b ANDROID: binder: remove WARN() for redundant txn error
WARNING in skb_warn_bad_offload C 6527 477d 600d 442d 8d74e9f8 net: avoid skb_warn_bad_offload on IS_ERR
general protection fault in try_to_wake_up syz 1 457d 453d 445d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in rdma_notify C 3 461d 458d 445d c8d3bcbf RDMA/ucma: Check that device exists prior to accessing it
KASAN: use-after-free Read in worker_thread (2) syz 6 585d 594d 445d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
kernel BUG at ./include/linux/skbuff.h:LINE! (2) C 5 482d 459d 445d 10b8a3de ipv6: the entire IPv6 header chain must fit the first fragment
kernel BUG at drivers/vhost/vhost.c:LINE! C 152 445d 463d 445d d65026c6 vhost: validate log when IOTLB is enabled
BUG: corrupted list in remove_wait_queue C 5 458d 461d 445d dc6455a7 vhost: correctly remove wait queue during poll failure
BUG: unable to handle kernel (2) syz 1 454d 454d 445d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in native_write_cr4 C 132300 448d 552d 445d 8eb3f87d KVM: nVMX: fix guest CR4 loading when emulating L2 to L1 exit
general protection fault in timerqueue_add C 2 455d 455d 445d c769accd vlan: Fix vlan insertion for packets without ethernet header
kernel BUG at lib/string.c:LINE! (3) C 5 453d 454d 445d 84652aef RDMA/ucma: Introduce safer rdma_addr_size() variants
BUG: unable to handle kernel paging request in netdev_queue_update_kobjects syz 1 455d 455d 445d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in qlist_move_cache 1 455d 455d 445d c769accd vlan: Fix vlan insertion for packets without ethernet header
general protection fault in rdma_init_qp_attr (2) C 753 452d 458d 445d 4b658d1b RDMA/ucma: Check that device is connected prior to access it
BUG: unable to handle kernel paging request in __memmove 1 455d 455d 445d c769accd vlan: Fix vlan insertion for packets without ethernet header
possible deadlock in __ipv6_dev_mc_dec 1 459d 459d 445d 1bfa26ff ipv6: fix possible deadlock in rt6_age_examine_exception()
WARNING in xt_cluster_mt C 4 482d 482d 445d aebfa52a netfilter: drop template ct when conntrack is skipped.
possible deadlock in handle_rx C 4 456d 456d 445d aaa3149b vhost_net: add missing lock nesting notation
general protection fault in rdma_init_qp_attr C 2096 459d 475d 459d a5880b84 RDMA/ucma: Check that user doesn't overflow QP state
WARNING in __xlate_proc_name C 11 477d 513d 459d b1d0a5d0 netfilter: x_tables: add and use xt_check_proc_name
possible deadlock in get_user_pages_unlocked C 5 485d 508d 459d 96312e61 mm/gup.c: teach get_user_pages_unlocked to handle FOLL_NOWAIT
kernel BUG at lib/string.c:LINE! (2) syz 2 469d 469d 459d 0c81ffc6 RDMA/ucma: Don't allow join attempts for unsupported AF family
KASAN: slab-out-of-bounds Read in ip6_xmit (2) C 259 461d 475d 459d b954f940 l2tp: fix races with ipv4-mapped ipv6 addresses
KASAN: stack-out-of-bounds Read in xfrm_state_find (4) C 102 459d 510d 459d 19d7df69 xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems
WARNING: kmalloc bug in xfrm_add_sa C 109 459d 498d 459d d97ca5d7 xfrm_user: uncoditionally validate esn replay attribute struct
kernel panic: Out of memory and no killable processes... (2) C 1 513d 513d 459d 0537250f netfilter: x_tables: make allocation less aggressive
WARNING in kmalloc_slab (4) 1 470d 469d 459d d97ca5d7 xfrm_user: uncoditionally validate esn replay attribute struct
general protection fault in dccp_write_xmit C 5 476d 512d 459d 67f93df7 dccp: check sk for closed state in dccp_sendmsg()
KASAN: use-after-free Read in pppol2tp_connect (2) C 10 459d 474d 459d 17cfe79a l2tp: do not accept arbitrary sockets
KASAN: use-after-free Read in get_work_pool syz 8 584d 607d 459d 2cc683e8 kcm: lock lower socket in kcm_attach
general protection fault in lowpan_device_event C 79 460d 477d 459d ca0edb13 ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event()
possible deadlock in __might_fault C 8978 468d 483d 459d 740a5759 staging: android: ashmem: Fix possible deadlock in ashmem_ioctl
general protection fault in ucma_connect C 2 466d 465d 459d e8980d67 RDMA/ucma: Ensure that CM_ID exists prior to access it
WARNING in ata_qc_issue C 35 587d 606d 459d 9173e5e8 libata: remove WARN() for DMA or PIO command without data
BUG: unable to handle kernel paging request in ata_bmdma_qc_prep C 13 594d 602d 459d 058f58e2 libata: fix length validation of ATAPI-relayed SCSI commands
KASAN: use-after-free Read in ucma_close C 176 461d 475d 459d ed65a4dc RDMA/ucma: Fix use-after-free access in ucma_close
KASAN: null-ptr-deref Write in rdma_resolve_addr C 66 461d 472d 459d 2975d5de RDMA/ucma: Check AF family prior resolving address
WARNING in __proc_create C 12 479d 472d 459d b1d0a5d0 netfilter: x_tables: add and use xt_check_proc_name
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock C 4 476d 476d 459d 17cfe79a l2tp: do not accept arbitrary sockets
WARNING in ata_bmdma_qc_issue C 1 682d 602d 459d 2c1ec6fd libata: don't try to pass through NCQ commands to non-NCQ devices
KASAN: use-after-free Read in pfifo_fast_enqueue C 20 460d 525d 459d cce6294c net: sched: fix uses after free
INFO: rcu detected stall in xfrm_confirm_neigh 7 474d 498d 459d 013cb81e xfrm: Fix infinite loop in xfrm_get_dst_nexthop with transport mode.
general protection fault in rdma_join_multicast C 258 461d 475d 459d 7688f2c3 RDMA/ucma: Fix access to non-initialized CM_ID object
WARNING: kmalloc bug in memdup_user C 441 459d 475d 459d 6a21dfc0 RDMA/ucma: Limit possible option size
possible deadlock in shmem_file_llseek C 4432 468d 531d 459d cb57469c staging: android: ashmem: Fix lockdep issue during llseek
KASAN: use-after-free Read in snd_pcm_oss_get_formats C 3 473d 472d 459d 01c0b426 ALSA: pcm: Fix UAF in snd_pcm_oss_get_formats()
BUG: unable to handle kernel paging request in ebt_among_mt_check (2) C 946 459d 474d 459d c8d70a70 netfilter: bridge: ebt_among: add more missing match size checks
WARNING in kvm_arch_vcpu_ioctl_run (2) C 61018 512d 600d 469d c37c2873 KVM: VMX: Fix rflags cache during vCPU reset
KASAN: use-after-free Read in strp_data_ready C 204 516d 609d 470d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
WARNING in refcount_sub_and_test C 75150 508d 609d 470d d04adf1b sctp: reset owner sk for data chunks on out queues when migrating a sock
WARNING in tracepoint_probe_unregister C 115 470d 597d 470d a6da0024 blktrace: fix unlocked registration of tracepoints
WARNING in tracepoint_probe_register_prio C 830 470d 606d 470d a6da0024 blktrace: fix unlocked registration of tracepoints
kernel BUG at arch/x86/kvm/x86.c:LINE! syz 20 573d 606d 470d 61cb57c9 KVM: x86: Exit to user-mode on #UD intercept when emulator requires
KASAN: slab-out-of-bounds Read in ip6_route_me_harder C 66 477d 485d 476d 7d98386d netfilter: use skb_to_full_sk in ip6_route_me_harder
kernel BUG at arch/x86/kvm/mmu.c:LINE! C 695 483d 600d 476d b28676bb KVM: mmu: Fix overlap between public and private memslots
general protection fault in smc_create C 2 484d 484d 476d a5dcb73b net/smc: fix NULL pointer dereference on sock_create_kern() error path
WARNING in handle_ept_misconfig C 238 484d 607d 476d 95e057e2 KVM: X86: Fix SMRAM accessing even if VM is shutdown
BUG: unable to handle kernel paging request in ebt_among_mt_check C 823 476d 491d 476d c4585a28 netfilter: bridge: ebt_among: add missing match size checks
KASAN: slab-out-of-bounds Read in ip6_xmit C 156 477d 527d 476d c113187d tls: Use correct sk->sk_prot for IPV6
KASAN: use-after-free Read in pppol2tp_connect C 25 476d 525d 476d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
KASAN: use-after-free Write in nf_nat_ipv6_manip_pkt C 2 492d 491d 476d b078556a netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt
WARNING in __x86_set_memory_region C 716 484d 602d 476d 103c763c KVM/x86: remove WARN_ON() for when vm_munmap() fails
general protection fault in hrtimer_active (2) C 10612 478d 483d 476d b7e31be3 KVM: x86: fix vcpu initialization with userspace lapic
WARNING in compat_copy_entries C 434 476d 491d 476d b7181216 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
KASAN: use-after-free Read in inet_shutdown C 22 478d 525d 476d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
KASAN: use-after-free Read in ip6_route_me_harder C 44 477d 485d 476d 7d98386d netfilter: use skb_to_full_sk in ip6_route_me_harder
general protection fault in pppol2tp_connect C 1025 476d 525d 476d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
WARNING in debug_print_object C 2 509d 509d 476d 28f5bfb8 l2tp: fix tunnel lookup use-after-free race
WARNING: kmalloc bug in bpf_prog_array_copy_info C 4424 483d 496d 483d 9c481b90 bpf: fix bpf_prog_array_copy_to_user warning from perf event prog query
WARNING: kmalloc bug in cpu_map_update_elem C 2677 483d 495d 483d 7fc17e90 bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
possible deadlock in do_ip_getsockopt (2) 206 486d 501d 483d 01ea306f netfilter: drop outermost socket lock in getsockopt()
WARNING: kmalloc bug in relay_open_buf C 10 488d 503d 483d 88913bd8 kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
WARNING in __queue_work C 1 493d 493d 483d cfc2c740 netfilter: IDLETIMER: be syzkaller friendly
WARNING in kvmalloc_node C 513 490d 496d 483d 7fc17e90 bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
general protection fault in SyS_bpf (2) C 1065 483d 498d 483d 952fad8e bpf: fix sock_map_alloc() error path
WARNING in check_flush_dependency C 2205 486d 518d 483d ce162bfb mac80211_hwsim: don't use WQ_MEM_RECLAIM
WARNING: proc registration bug in clusterip_tg_check C 779 486d 504d 483d b3e456fc netfilter: ipt_CLUSTERIP: fix a race condition of proc file creation
kernel BUG at kernel/time/timer.c:LINE! C 18 486d 498d 483d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
KASAN: use-after-free Read in remove_wait_queue C 7 488d 498d 483d 5eeb2ca0 ANDROID: binder: synchronize_rcu() when using POLLFREE.
general protection fault in ip6t_do_table C 8077 487d 513d 483d 57ebd808 netfilter: add back stackpointer size checks
general protection fault in binder_poll C 159 487d 571d 483d f8898267 binder: check for binder_thread allocation failure in binder_poll()
possible deadlock in do_ip_setsockopt (3) 3731 486d 502d 483d 01ea306f netfilter: drop outermost socket lock in getsockopt()
divide error in nf_nat_l4proto_unique_tuple C 2 498d 498d 483d db57ccf0 netfilter: nat: cope with negative port range
general protection fault in arpt_do_table C 3 488d 488d 483d 57ebd808 netfilter: add back stackpointer size checks
lost connection to test machine (4) C 1189 484d 498d 483d 9c2d63b8 bpf: fix mlock precharge on arraymaps
possible deadlock in xt_find_table_lock (2) 4 501d 500d 483d 01ea306f netfilter: drop outermost socket lock in getsockopt()
WARNING: ODEBUG bug in led_tg_destroy C 4 489d 497d 483d 10414014 netfilter: x_tables: fix missing timer initialization in xt_LED
WARNING in kmalloc_slab (3) C 1901 484d 569d 483d 88913bd8 kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
possible deadlock in rtnl_lock (4) C 73333 486d 502d 483d 01ea306f netfilter: drop outermost socket lock in getsockopt()
WARNING: ODEBUG bug in __queue_work C 2 493d 489d 483d cfc2c740 netfilter: IDLETIMER: be syzkaller friendly
possible deadlock in do_ipv6_setsockopt (2) 3642 486d 501d 483d 01ea306f netfilter: drop outermost socket lock in getsockopt()
WARNING: bad unlock balance in hashlimit_mt_common C 2059 486d 499d 483d de526f40 netfilter: xt_hashlimit: fix lock imbalance
BUG: unable to handle kernel NULL pointer dereference in sha512_mb_mgr_get_comp_job_avx2 syz 32 515d 569d 483d eff84b37 crypto: sha512-mb - initialize pending lengths correctly
KASAN: use-after-free Read in rds_find_bound 1 546d 542d 495d ebeeb1ad rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
KASAN: use-after-free Read in rds_tcp_tune 12 519d 529d 496d ebeeb1ad rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
INFO: rcu detected stall in memcpy 12 533d 537d 496d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
INFO: rcu detected stall in tty_ioctl C 12 539d 552d 496d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
INFO: rcu detected stall in n_tty_ioctl 24 538d 552d 496d 966031f3 n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
KASAN: slab-out-of-bounds Read in string C 129 506d 516d 496d da17c73b netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target}
possible deadlock in lru_add_drain_all 1300 556d 606d 496d 9852a721 mm: drop hotplug lock from lru_add_drain_all()
KASAN: use-after-free Read in __do_page_fault syz 679 592d 602d 496d cb0631fd x86/mm: fix use-after-free of vma during userfaultfd fault
KASAN: use-after-free Read in __schedule C 145 550d 552d 496d 8dbfb2bf KVM: x86: don't forget vcpu_put() in kvm_arch_vcpu_ioctl_set_sregs()
KASAN: stack-out-of-bounds Read in csum_and_copy_from_iter_full 1 575d 571d 496d 8f659a03 net: ipv4: fix for a race condition in raw_sendmsg
possible deadlock in flush_work (2) 3 594d 597d 496d 528fd354 SUNRPC: Destroy transport from the system workqueue
KASAN: use-after-free Read in sock_release 1 577d 573d 496d a5739435 fix kcm_clone()
KASAN: use-after-free Read in rds_tcp_dev_event 1 601d 594d 496d 681648e6 rds: tcp: correctly sequence cleanup on netns deletion.
KASAN: stack-out-of-bounds Read in xfrm_selector_match 368 530d 536d 497d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
KASAN: use-after-free Read in __fput 23 566d 600d 497d a5739435 fix kcm_clone()
KASAN: stack-out-of-bounds Read in memcmp 1 539d 535d 497d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
WARNING in drm_modeset_lock_all 35 599d 606d 497d d18d1a5a drm: Require __GFP_NOFAIL for the legacy drm_modeset_lock_all
KASAN: use-after-free Write in xt_rateest_tg_checkentry C 2 510d 512d 498d 7dc68e98 netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert
general protection fault in cgroup_mt_destroy_v1 C 91 500d 513d 498d ba7cd5d9 netfilter: xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
WARNING: suspicious RCU usage in bpf_prog_array_copy_info C 17842 498d 504d 498d 0911287c bpf: fix bpf_prog_array_copy_to_user() issues
KASAN: double-free or invalid-free in relay_open C 106 504d 602d 498d a1be1f39 kernel/relay.c: revert "kernel/relay.c: fix potential memory leak"
WARNING: kmalloc bug in tun_device_event C 15 501d 503d 498d 6e6e41c3 ptr_ring: fail early if queue occupies more than KMALLOC_MAX_SIZE 0bf7800f ptr_ring: try vmalloc() when kmalloc() fails
WARNING in usercopy_warn C 171 504d 522d 498d 79a8a642 net: Whitelist the skbuff_head_cache "cb" field
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (4) C 7264 504d 508d 498d 0911287c bpf: fix bpf_prog_array_copy_to_user() issues
general protection fault in ___bpf_prog_run C 8 503d 510d 498d 65073a67 bpf: fix null pointer deref in bpf_prog_test_run_xdp
WARNING in do_debug C 905 502d 602d 498d efdab992 KVM: x86: fix escape of guest dr6 to the host
possible deadlock in rtnl_lock (3) C 3633 503d 504d 503d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
possible deadlock in do_ip_setsockopt (2) 59 503d 505d 503d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
WARNING: bad unlock balance in ipmr_mfc_seq_stop C 286 510d 556d 504d 4adfa79f ip6mr: fix stale iterator
WARNING in __check_heap_object C 5173 523d 595d 505d ab9ee8e3 sctp: Define usercopy region in SCTP proto slab cache
possible deadlock in xt_find_target 34 507d 513d 505d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
WARNING in sysfs_warn_dup 11 510d 554d 505d 5d54f948 sysfs: turn WARN() into pr_warn()
possible deadlock in rtnl_lock (2) C 10369 505d 508d 505d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
WARNING in reuseport_add_sock C 7 518d 528d 505d 4db428a7 soreuseport: fix mem leak in reuseport_add_sock()
WARNING in ion_ioctl C 8888 508d 537d 505d e4e179a8 staging: android: ion: Switch from WARN to pr_warn
KASAN: use-after-free Read in __lock_acquire (2) C 589 508d 584d 505d f5cb779b ANDROID: binder: remove waitqueue when thread exits.
WARNING in register_lock_class C 2 552d 549d 505d f5cb779b ANDROID: binder: remove waitqueue when thread exits.
possible deadlock in do_ip_getsockopt 22 508d 512d 505d 3f34cfae netfilter: on sockopt() acquire sock lock only in the required scope
suspicious RCU usage at ./include/linux/inetdevice.h:LINE (2) C 4 509d 509d 505d e7aadb27 net: igmp: add a missing rcu locking section
lost connection to test machine (3) C 4251 505d 545d 505d 889c604f netfilter: x_tables: fix int overflow in xt_alloc_table_info()
WARNING in __alloc_pages_slowpath C 9435 508d 537d 505d 0c75f103 staging: android: ion: Add __GFP_NOWARN for system contig heap
KASAN: use-after-free Read in __list_add_valid (3) 16 509d 516d 506d 4cd87951 vhost_net: stop device during reset owner
INFO: task hung in bpf_exit_net 1 567d 553d 506d b6c5734d sctp: fix the handling of ICMP Frag Needed for too small MTUs
INFO: trying to register non-static key in pfifo_fast_reset C 4 552d 555d 506d 1df94c3c net_sched: properly check for empty skb array on error path
KASAN: use-after-free Read in fib6_age 3 526d 528d 506d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in fib6_lookup_1 11 526d 528d 506d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in mon_bin_vma_fault 7 532d 543d 506d 46eb14a6 USB: fix usbmon BUG trigger
KASAN: use-after-free Read in fib6_remove_prefsrc 4 526d 528d 506d 591ff9ea ipv6: don't let tb6_root node share routes with other node
KASAN: use-after-free Read in tipc_group_size C 8 525d 533d 508d 60c25306 tipc: fix race between poll() and setsockopt()
general protection fault in trie_get_next_key C 3 515d 515d 508d 6dd1ec6c bpf: fix kernel page fault in lpm map trie_get_next_key
suspicious RCU usage at net/ipv6/ip6_fib.c:LINE C 56 516d 538d 508d 4512c43e ipv6: remove null_entry before adding default route
BUG: Bad page state (3) C 3 533d 540d 508d 46eb14a6 USB: fix usbmon BUG trigger
WARNING in usb_submit_urb C 2 603d 595d 508d 446f666d USB: usbfs: Filter flags passed in from user space
WARNING in task_participate_group_stop C 29 588d 602d 508d 42691579 kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal()
BUG: unable to handle kernel NULL pointer dereference in page_mapping C 4 552d 555d 509d 7d11f77f RDS: null pointer dereference in rds_atomic_free_op
general protection fault in __netlink_ns_capable C 74 532d 538d 509d f428fe4a rtnetlink: give a user socket to get_target_net()
general protection fault in page_mapping C 46 532d 560d 509d 7d11f77f RDS: null pointer dereference in rds_atomic_free_op
KASAN: double-free or invalid-free in skb_free_head C 13 548d 554d 509d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
kernel BUG at fs/userfaultfd.c:LINE! C 3 552d 549d 509d 0cbb4b4f userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
BUG: unable to handle kernel paging request in check_memory_region C 10 525d 528d 509d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: slab-out-of-bounds Read in xfrm_hash_rebuild C 18 527d 594d 509d 862591bf xfrm: skip policies marked as dead while rehashing
general protection fault in sidtab_search_core syz 1306 565d 571d 509d 4b14752e selinux: skip bounded transition processing if the policy isn't loaded
KASAN: use-after-free Read in map_lookup_elem C 6 524d 528d 509d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in vhost_dev_cleanup C 4 510d 516d 509d 4cd87951 vhost_net: stop device during reset owner
BUG: unable to handle kernel paging request in devpts_mntget C 21 522d 599d 509d c9cc8d01 devpts: fix error handling in devpts_mntget()
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (2) 185 573d 571d 509d 7d2c3f54 crypto: af_alg - remove locking in async callback
BUG: looking up invalid subclass: 8 C 5 596d 596d 509d 3510c7aa ALSA: seq: Avoid invalid lockdep class warning
KASAN: stack-out-of-bounds Read in rds_sendmsg C 120 539d 563d 509d 14e138a8 RDS: Check cmsg_len before dereferencing CMSG_DATA
general protection fault in fib6_add (2) C 3143 532d 538d 509d 7bbfe00e ipv6: fix general protection fault in fib6_add()
KASAN: use-after-free Read in __bpf_prog_put 1 530d 530d 509d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
inconsistent lock state in est_fetch_counters C 5829 509d 514d 509d 40ca54e3 net_sched: gen_estimator: fix lockdep splat
KASAN: use-after-free Read in __xfrm_state_lookup C 7 601d 601d 509d cb79a180 xfrm: defer daddr pointer assignment after spi parsing
KASAN: slab-out-of-bounds Write in sha3_update (2) C 49 510d 550d 509d 9fa68f62 crypto: hash - prevent using keyed hashes without setting key
general protection fault in tun_queue_purge C 4 515d 516d 509d 9fb582b6 Revert "net: ptr_ring: otherwise safe empty checks can overrun array bounds"
KASAN: use-after-free Read in __wake_up_common C 888 509d 518d 509d 4cd87951 vhost_net: stop device during reset owner
WARNING: kernel stack regs has bad 'bp' value (2) C 16238 509d 574d 509d d8c7fe9f crypto: x86/twofish-3way - Fix %rbp usage
kernel BUG at drivers/android/binder_alloc.c:LINE! C 856 566d 571d 509d fb2c4452 ANDROID: binder: fix transaction leak.
KASAN: use-after-free Read in sctp_association_free C 20 585d 601d 509d ca3af4dd sctp: do not free asoc when it is already dead in sctp_sendmsg
general protection fault in show_timer C 10 553d 572d 509d cef31d9a posix-timer: Properly check sigevent->sigev_notify
suspicious RCU usage at ./include/linux/inetdevice.h:LINE 28 592d 600d 509d 25dd169a fib: fib_dump_info can no longer use __in_dev_get_rtnl
KASAN: slab-out-of-bounds Read in sctp_send_reset_streams C 73 551d 563d 509d 2342b8d9 sctp: make sure stream nums can match optlen in sctp_setsockopt_reset_streams
general protection fault in nfs_idmap_legacy_upcall C 4 522d 521d 509d 49686cbb NFS: reject request for id_legacy key without auxdata
KASAN: slab-out-of-bounds Read in strcmp C 150 565d 574d 509d ef28df55 selinux: ensure the context is NUL terminated in security_context_to_sid_core()
WARNING in xdp_rxq_info_unreg C 198 518d 518d 509d c13da21c tun: avoid calling xdp_rxq_info_unreg() twice
KASAN: slab-out-of-bounds Read in erspan_xmit C 51 516d 518d 509d b423d13c net: erspan: fix use-after-free
possible deadlock in rtnl_lock C 15711 509d 566d 509d 124da8f6 tuntap: fix possible deadlock when fail to register netdev
KASAN: use-after-free Read in erspan_build_header C 60 509d 518d 509d b423d13c net: erspan: fix use-after-free
general protection fault in free_verifier_state (2) C 2 533d 533d 509d 5896351e bpf: fix verifier GPF in kmalloc failure path
KASAN: use-after-free Read in tipc_group_is_open C 1 525d 525d 509d 60c25306 tipc: fix race between poll() and setsockopt()
KASAN: use-after-free Read in rb_first_postorder C 17267 522d 531d 509d febafc84 tipc: fix a potental access after delete in tipc_sk_join()
general protection fault in get_info C 760 525d 528d 509d e3eeacba netfilter: x_tables: don't return garbage pointer on modprobe failure
suspicious RCU usage at mm/slab.h:LINE 1 518d 518d 509d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
KASAN: slab-out-of-bounds Read in erspan_build_header C 30 509d 518d 509d b423d13c net: erspan: fix use-after-free
suspicious RCU usage at net/netfilter/ipset/ip_set_core.c:LINE C 38048 530d 536d 509d f998b6b1 netfilter: ipset: Missing nfnl_lock()/nfnl_unlock() is added to ip_set_net_exit()
BUG: sleeping function called from invalid context at mm/slab.h:LINE (2) 2 518d 518d 509d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
KASAN: use-after-free Read in erspan_xmit C 68 516d 518d 509d b423d13c net: erspan: fix use-after-free
general protection fault in copy_verifier_state C 2 542d 538d 509d 5896351e bpf: fix verifier GPF in kmalloc failure path
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (3) C 5087 510d 519d 509d 2310035f bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
KASAN: stack-out-of-bounds Read in xfrm_state_find (3) C 10353 514d 582d 510d 732706af xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
WARNING in fpu__copy 8 552d 552d 510d 5663d8f9 kvm: x86: fix WARN due to uninitialized guest FPU state
BUG: unable to handle kernel NULL pointer dereference in sctp_stream_free 2 554d 551d 510d 79d08951 sctp: fix error path in sctp_stream_init
general protection fault in __list_del_entry_valid (2) C 21 524d 581d 510d 9ee332d9 sget(): handle failures of register_shrinker()
WARNING in xfrm_state_fini C 2231 525d 581d 510d 6a53b759 xfrm: check id proto in validate_tmpl()
general protection fault in sctp_stream_free 17 556d 597d 510d 79d08951 sctp: fix error path in sctp_stream_init
general protection fault in __rds_rdma_map C 12 562d 575d 510d f3069c6d rds: Fix NULL pointer dereference in __rds_rdma_map
general protection fault in skb_segment C 7 533d 543d 512d 121d57af gso: validate gso_type in GSO handlers
possible deadlock in vhost_chr_write_iter C 25952 516d 518d 512d e9cb4239 vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
kernel BUG at net/core/skbuff.c:LINE! (2) C 562 514d 603d 512d 02612bb0 pppoe: take ->needed_headroom of lower device into account on xmit
kernel BUG at net/l2tp/l2tp_ppp.c:LINE! C 22 516d 538d 512d e5571240 kcm: Check if sk_user_data already set in kcm_attach
KASAN: use-after-free Read in psock_write_space C 6 521d 532d 512d 581e7226 kcm: Only allow TCP sockets to be attached to a KCM mux
KASAN: slab-out-of-bounds Read in __dev_queue_xmit C 6 534d 522d 512d 7c68d1a6 net: qdisc_pkt_len_init() should be more robust
BUG: unable to handle kernel NULL pointer dereference in proc_flush_task syz 1 556d 552d 514d c0ee5549 pid: Handle failure to allocate the first pid in a pid namespace
general protection fault in proc_flush_task syz 2 555d 572d 514d c0ee5549 pid: Handle failure to allocate the first pid in a pid namespace
general protection fault in lockdep_invariant_state (2) C 114 565d 594d 514d 5e351ad1 locking/lockdep: Fix possible NULL deref
general protection fault in __lock_acquire (2) C 15 514d 600d 514d 672ecbe1 tipc: fix a null pointer deref on error path
KASAN: stack-out-of-bounds Read in write_mmio C 3 560d 571d 514d e39d200f KVM: Fix stack-out-of-bounds read in write_mmio
BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:LINE C 19609 576d 602d 514d 4d772cb8 KVM: x86: fix em_fxstor() sleeping while in atomic
KASAN: use-after-free Read in fib6_add_1 C 4 526d 528d 516d 591ff9ea net-backports: ipv6: don't let tb6_root node share routes with other node
WARNING in free_loaded_vmcs C 170 573d 581d 516d b7455825 KVM: VMX: Fix vmx->nested freeing when no SMI handler
possible deadlock in snd_seq_deliver_event C 6 596d 606d 518d 1f20f9ff ALSA: seq: Fix nested rwsem annotation for lockdep splat
KASAN: slab-out-of-bounds Read in map_lookup_elem C 6 525d 528d 518d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
BUG: unable to handle kernel paging request in bpf_fd_array_map_lookup_elem 5 524d 528d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (2) C 174 520d 600d 519d 2f10a61c xfrm: fix rcu usage in xfrm_get_type_offload
KASAN: use-after-free Read in bpf_fd_array_map_lookup_elem 21 524d 530d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
BUG: unable to handle kernel paging request in dst_release 113 524d 529d 519d 95ef498d ipv6: ip6_make_skb() needs to clear cork.base.dst
KASAN: use-after-free Read in fib6_ifup (2) C 18 526d 522d 519d 591ff9ea ipv6: don't let tb6_root node share routes with other node
BUG: sleeping function called from invalid context at ./include/linux/percpu-rwsem.h:LINE 20 527d 535d 519d b1bdcb59 xfrm: don't call xfrm_policy_cache_flush while holding spinlock
general protection fault in sctp_v6_get_dst C 6 531d 531d 519d c5006b8a sctp: do not allow the v4 socket to bind a v4mapped v6 address
general protection fault in ip6_xmit 16 520d 521d 519d 591ff9ea ipv6: don't let tb6_root node share routes with other node
general protection fault in cgroup_fd_array_put_ptr C 219 524d 531d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
kernel BUG at ./include/linux/skbuff.h:LINE! C 4502 524d 537d 519d 374d1b5a esp: Fix GRO when the headers not fully in the linear part of the skb.
WARNING in can_rcv C 5 526d 525d 519d 8cb68751 can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once
KASAN: stack-out-of-bounds Read in __nla_put C 57 521d 525d 519d cd443f1e netlink: reset extack earlier in netlink_rcv_skb
WARNING in ___bpf_prog_run C 28 524d 531d 519d 7891a87e bpf: arsh is not supported in 32 bit alu thus reject it
WARNING in rfkill_alloc C 6 526d 527d 519d 59b179b4 cfg80211: check dev_set_name() return value
general protection fault in strlen C 53 521d 523d 519d cd443f1e netlink: reset extack earlier in netlink_rcv_skb
BUG: unable to handle kernel paging request in fd_array_map_delete_elem 11 524d 531d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in __bpf_prog_put C 212 524d 531d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: slab-out-of-bounds Read in bpf_fd_array_map_lookup_elem 7 526d 530d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in adjust_ptr_min_max_vals C 252 521d 538d 519d 6f16101e bpf: mark dst unknown on inconsistent {s, u}bounds adjustments
WARNING: held lock freed! C 497 522d 533d 519d a0ff6600 sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf
BUG: unable to handle kernel paging request in __bpf_map_put 1 528d 527d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: use-after-free Write in array_map_update_elem C 11 524d 526d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in canfd_rcv C 4 526d 525d 519d d4689846 can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once
KASAN: use-after-free Read in tls_sk_proto_close C 9 524d 532d 519d d91c3e17 net/tls: Only attach to sockets in ESTABLISHED state
WARNING in snd_interval_mulkdiv C 21 524d 530d 519d 23b19b7b ALSA: pcm: Remove yet superfluous WARN_ON()
WARNING in wiphy_register C 15 526d 527d 519d 51a1aaa6 mac80211_hwsim: validate number of different channels
possible deadlock in ppp_dev_uninit C 6 524d 537d 519d 0171c418 ppp: unlock all_ppp_mutex before registering device
KASAN: slab-out-of-bounds Read in perf_event_fd_array_release C 96 524d 531d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
general protection fault in __bpf_map_put C 331 524d 531d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
KASAN: slab-out-of-bounds Write in array_map_update_elem C 6 526d 526d 519d bbeb6e43 bpf, array: fix overflow in max_entries and undefined behavior in index_mask
WARNING in netlink_ack (2) C 6 531d 531d 519d cbbdf843 netlink: extack needs to be reset each time through loop
divide error in ___bpf_prog_run C 28 521d 528d 519d 68fda450 bpf: fix 32-bit divide by zero
WARNING in rds_cmsg_rdma_args C 6 538d 538d 522d c0955087 RDS: Heap OOB write in rds_message_alloc_sgs()
general protection fault in nf_tables_dump_obj_done C 976 531d 537d 522d 8bea728d netfilter: nf_tables: fix potential NULL-ptr deref in nf_tables_dump_obj_done()
KASAN: use-after-free Read in fib6_ifdown C 26 526d 529d 522d 4512c43e ipv6: remove null_entry before adding default route
KASAN: use-after-free Read in rt6_mtu_change_route 5 526d 529d 522d 4512c43e ipv6: remove null_entry before adding default route
kernel BUG at ./include/linux/mm.h:LINE! (3) C 621 527d 544d 522d 46eb14a6 USB: fix usbmon BUG trigger
INFO: task hung in snd_pcm_oss_write syz 2 530d 530d 522d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
INFO: rcu detected stall in snd_pcm_plug_write_transfer 1 531d 531d 522d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
general protection fault in crypto_remove_spawns C 85 536d 574d 522d 9a006742 crypto: algapi - fix NULL dereference in crypto_remove_spawns()
BUG: soft lockup (2) C 29 533d 562d 522d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
WARNING in snd_pcm_hw_param_first C 2905 530d 540d 522d fe08f34d ALSA: pcm: Remove incorrect snd_BUG_ON() usages
INFO: rcu detected stall in mulaw_transfer 37 533d 536d 522d 898dfe46 ALSA: aloop: Fix racy hw constraints adjustment
suspicious RCU usage at sound/core/pcm_lib.c:LINE 1 538d 537d 522d 29159a4e ALSA: pcm: Abort properly at pending signal in OSS read/write loops
BUG: unable to handle kernel paging request in memset_erms C 35 522d 537d 522d b088b53e ALSA: aloop: Fix inconsistent format due to incomplete rule
WARNING in strp_data_ready C 59034 538d 609d 523d d66fa9ec strparser: Call sock_owned_by_user_nocheck
KASAN: double-free or invalid-free in kvm_arch_vcpu_uninit 1 532d 528d 527d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: unable to handle kernel paging request in ipcget 2 552d 549d 530d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
KASAN: wild-memory-access Write in scatterwalk_copychunks C 15 536d 562d 530d e57121d0 crypto: chacha20poly1305 - validate the digest size
BUG: bad usercopy in strncpy_from_user 1 545d 541d 530d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: unable to handle kernel NULL pointer dereference in scatterwalk_copychunks C 3 557d 558d 530d e57121d0 crypto: chacha20poly1305 - validate the digest size
KASAN: slab-out-of-bounds Read in cap_convert_nscap C 4148 535d 539d 530d dc32b5c3 capabilities: fix buffer overread on very short xattr
BUG: bad usercopy in alg_setsockopt 5 538d 536d 530d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
general protection fault in skcipher_walk_done C 8 532d 552d 530d e57121d0 crypto: chacha20poly1305 - validate the digest size
general protection fault in scatterwalk_copychunks (2) C 141 536d 563d 530d e57121d0 crypto: chacha20poly1305 - validate the digest size
BUG: bad usercopy in rw_copy_check_uvector 7 534d 549d 530d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: bad usercopy in do_syslog 1 540d 536d 530d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
KASAN: use-after-free Read in __list_del_entry_valid (2) C 11 552d 554d 530d d76c6810 crypto: pcrypt - fix freeing pcrypt instances
BUG: unable to handle kernel NULL pointer dereference in blkcipher_walk_done C 2 558d 558d 530d e57121d0 crypto: chacha20poly1305 - validate the digest size
KASAN: slab-out-of-bounds Read in cap_inode_getsecurity C 11 536d 537d 530d dc32b5c3 capabilities: fix buffer overread on very short xattr
KASAN: use-after-free Read in handle_userfault C 151 543d 606d 531d 0cbb4b4f userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
INFO: task hung in cleanup_net 1 565d 553d 538d 21b59443 net: Fix double free and memory corruption in get_net_ns_by_id()
BUG: unable to handle kernel paging request in copy_siginfo_to_user 1 566d 562d 538d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
BUG: unable to handle kernel paging request in __schedule 2 568d 563d 538d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
BUG: unable to handle kernel paging request in __put_user_8 1 569d 563d 538d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
BUG: unable to handle kernel paging request in kvm_arch_vcpu_ioctl_run 1 565d 561d 538d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
KASAN: global-out-of-bounds Read in crypto_chacha20_crypt C 74 552d 555d 538d 2b4f27c3 crypto: skcipher - set walk.iv for zero-length inputs
BUG: unable to handle kernel paging request in __switch_to 1 573d 569d 538d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
possible deadlock (2) 2 559d 561d 538d 2b4f27c3 crypto: skcipher - set walk.iv for zero-length inputs
general protection fault in crypto_chacha20_crypt C 2374 542d 574d 538d 2b4f27c3 crypto: skcipher - set walk.iv for zero-length inputs
general protection fault in blkcipher_walk_done C 47 539d 574d 538d 11edb555 crypto: af_alg - wait for data at beginning of recvmsg
general protection fault in blkcipher_walk_first C 7 550d 561d 538d 11edb555 crypto: af_alg - wait for data at beginning of recvmsg
BUG: unable to handle kernel paging request in match_subs_info 1 568d 563d 538d 7fb983b4 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss
KASAN: use-after-free Write in aead_recvmsg C 21 550d 568d 538d d53c5135 crypto: af_alg - fix race accessing cipher request
general protection fault in free_verifier_state C 2 551d 551d 545d 8c01c4f8 bpf: fix verifier NULL pointer dereference
WARNING in refcount_dec (2) 1 579d 579d 545d 15fe076e net/packet: fix a race in packet_bind() and packet_notifier()
WARNING in netlink_ack C 6 548d 549d 545d 48044eb4 netlink: fix netlink_ack() extack race
kernel BUG at net/packet/af_packet.c:LINE! (2) 2 569d 571d 545d 8e1611e2 make sock_alloc_file() do sock_release() on failures
KASAN: use-after-free in aead_recvmsg 2 563d 563d 545d b32a7dc8 crypto: algif_aead - fix reference counting of null skcipher
WARNING in lock_release C 72 553d 586d 549d ca0168e8 alloc_super(): do ->s_umount initialization earlier
general protection fault in kfree 13 562d 571d 551d ecaaab56 crypto: salsa20 - fix blkcipher_walk API usage
KASAN: stack-out-of-bounds Write in sha3_update C 5 578d 574d 551d af3ff804 crypto: hmac - require that the underlying hash algorithm is unkeyed
general protection fault in strcmp 1 572d 571d 551d 18026d86 KEYS: reject NULL restriction string when type is specified
KASAN: use-after-free Read in aead_recvmsg C 4338 555d 574d 551d b32a7dc8 crypto: algif_aead - fix reference counting of null skcipher
WARNING in initialize_timer 2 571d 572d 551d 43a35428 ALSA: seq: Remove spurious WARN_ON() at timer check
general protection fault in af_alg_free_areq_sgls C 2916 555d 574d 551d 887207ed crypto: af_alg - fix NULL pointer dereference in
general protection fault in ___cache_free 1 562d 557d 551d ecaaab56 crypto: salsa20 - fix blkcipher_walk API usage
WARNING: suspicious RCU usage (3) 16 573d 573d 551d ecaaab56 crypto: salsa20 - fix blkcipher_walk API usage
possible deadlock in blk_trace_remove 5 576d 583d 564d 2967acbb blktrace: fix trace mutex deadlock
kernel BUG at net/core/dev.c:LINE! C 5 575d 580d 564d 15fe076e net-backports: net/packet: fix a race in packet_bind() and packet_notifier()
general protection fault in fanout_demux_rollover 3 577d 597d 564d 57f015f5 packet: fix crash in fanout_demux_rollover()
kernel panic: softlockup: hung tasks 2 644d 614d 564d 4ba161a7 SUNRPC: Allow connect to return EHOSTUNREACH
general protection fault in scatterwalk_copychunks C 414 564d 574d 564d 8e1fa89a crypto: algif_aead - skip SGL entries with NULL page
kernel BUG at net/key/af_key.c:LINE! C 63 616d 609d 568d 0e74aa1d xfrm: Copy policy family in clone_policy
general protection fault in dax_alloc_inode 1 595d 588d 568d 9f586fff dax: fix general protection fault in dax_alloc_inode
kernel BUG at fs/notify/dnotify/dnotify.c:LINE! 19 590d 602d 574d b3a00660 dnotify: Handle errors from fsnotify_add_mark_locked() in fcntl_dirnotify()
WARNING in tun_get_user C 17398 591d 616d 574d 010f245b net-backports: tun: relax check on eth_get_headlen() return value
general protection fault in do_raw_spin_lock 8 606d 611d 574d 87b1af8d net-backports: ipv6: add ip6_null_entry check in rt6_select()
possible deadlock in generic_file_write_iter C 61506 574d 597d 574d e319e1fb block, locking/lockdep: Assign a lock_class per gendisk used for wait_for_completion()
KASAN: slab-out-of-bounds Read in tipc_nametbl_lookup_dst_nodes C 22388 586d 609d 574d f65163fe tipc: eliminate KASAN warning
general protection fault in iov_iter_fault_in_readable 5 592d 600d 574d ee74d996 tun: do not arm flow_gc_timer in tun_flow_init()
BUG: unable to handle kernel paging request in vsock_diag_dump C 6 606d 609d 574d c1eef220 vsock: always call vsock_init_tables()
KASAN: use-after-free Read in fsnotify 1 635d 599d 574d b3a00660 dnotify: Handle errors from fsnotify_add_mark_locked() in fcntl_dirnotify()
WARNING in fib6_add C 8225 591d 615d 574d 2ea2352e ipv6: prevent user from adding cached routes
general protection fault in hrtimer_active C 669 592d 615d 574d aec72f33 net-tun: fix panics at dismantle time
KASAN: use-after-free Read in tipc_group_self C 2942 591d 609d 574d e233df01 tipc: fix a dangling pointer
KASAN: use-after-free Read in mpi_free C 27 584d 592d 574d 12d41a02 crypto: dh - Fix double free of ctx->p
WARNING in free_kthread_struct C 136405 591d 595d 574d e10237cc kthread: zero the kthread data structure
general protection fault in tun_flow_cleanup 1 646d 614d 574d ee74d996 tun: do not arm flow_gc_timer in tun_flow_init()
general protection fault in bpf_check 3 595d 600d 574d 8c01c4f8 bpf: fix verifier NULL pointer dereference
KASAN: use-after-free Write in detach_if_pending C 4169 611d 606d 574d ee74d996 tun: do not arm flow_gc_timer in tun_flow_init()
KASAN: use-after-free Read in tipc_send_group_bcast 4 609d 600d 574d e233df01 tipc: fix a dangling pointer
KASAN: use-after-free Read in free_netdev C 42 591d 615d 574d aec72f33 net-tun: fix panics at dismantle time
WARNING in snd_timer_user_info_compat C 174 578d 581d 574d 3d4e8303 ALSA: timer: Remove kernel warning at compat ioctl error paths
KASAN: use-after-free Read in tcp_ack 68 587d 589d 574d 50895b9d net-backports: tcp: highest_sack fix
INFO: trying to register non-static key. (2) C 8624 593d 595d 574d 9eba9353 tcp: fix a lockdep issue in tcp_fastopen_reset_cipher()
BUG: sleeping function called from invalid context at net/core/sock.c:LINE C 407 575d 614d 575d 829385f0 strparser: Use delayed work instead of timer for msg timeout
KASAN: use-after-free Read in snd_timer_user_info_compat syz 2 616d 606d 580d 79fb0518 ALSA: timer: Add missing mutex lock for compat ioctls
WARNING in tcp_update_reordering 748 584d 581d 581d 0eb96bf7 tcp: fix tcp_fastretrans_alert warning
KASAN: stack-out-of-bounds Read in xfrm_state_find (2) C 93 592d 601d 584d c9f3f813 xfrm: Fix stack-out-of-bounds read in xfrm_state_find.
BUG: soft lockup C 466 587d 600d 584d 9b7d869e ALSA: timer: Limit max instances per timer
WARNING in refcount_add_not_zero 70 584d 601d 584d 7ec318fe tcp: gso: avoid refcount_t warning from tcp_gso_segment()
BUG: unable to handle kernel paging request in snd_seq_oss_readq_puts C 389 594d 601d 584d 132d358b ALSA: seq: Fix OSS sysex delivery in OSS emulation
general protection fault in asn1_ber_decoder C 5009 591d 596d 584d 624f5ab8 KEYS: fix NULL pointer dereference during ASN.1 parsing [ver #2]
KASAN: slab-out-of-bounds Read in asn1_ber_decoder C 17 592d 597d 591d 2eb9eabf KEYS: fix out-of-bounds read during ASN.1 parsing
BUG: workqueue lockup C 172 591d 602d 591d 93161922 tun/tap: sanitize TUNSETSNDBUF input
KASAN: use-after-free Read in packet_getsockopt (2) syz 12 605d 613d 591d 509c7a1e packet: avoid panic in packet_getsockopt()
KASAN: use-after-free Write in __run_timers 6144 611d 671d 591d 0ad646c8 net-backports: tun: call dev_get_valid_name() before register_netdevice()
INFO: rcu detected stall (2) C 56 591d 603d 591d 93161922 net-backports: tun/tap: sanitize TUNSETSNDBUF input
WARNING in refcount_dec 9 592d 615d 591d e669b869 ipv6: addrconf: increment ifp refcount before ipv6_del_addr()
WARNING in reuseport_alloc C 408 591d 615d 591d 1b5f962e soreuseport: fix initialization race
general protection fault in __list_del_entry_valid C 72 594d 609d 591d 1137b5e2 ipsec: Fix aborted xfrm policy dump crash
general protection fault in ip6_setup_cork 56 606d 615d 591d 864e2a1f net-backports: ipv6: flowlabel: do not leave opt->tot_len with garbage
KASAN: use-after-free Read in ip_queue_xmit 1 616d 616d 591d c92e8c02 net-backports: tcp/dccp: fix ireq->opt races
KASAN: use-after-free Read in do_raw_spin_unlock syz 3 600d 602d 591d 153fbd12 futex: Fix more put_pi_state() vs. exit_pi_state_list() races
KASAN: use-after-free Read in __lock_acquire syz 894 591d 601d 591d 153fbd12 futex: Fix more put_pi_state() vs. exit_pi_state_list() races
WARNING in kmalloc_slab (2) C 2478 591d 609d 591d 864e2a1f ipv6: flowlabel: do not leave opt->tot_len with garbage
WARNING in get_pi_state C 42 600d 602d 591d 153fbd12 futex: Fix more put_pi_state() vs. exit_pi_state_list() races
kernel BUG at net/ipv4/tcp_output.c:LINE! 37 651d 664d 594d b1ed4c4f tcp: add an ability to dump and restore window parameters
WARNING in sk_stream_kill_queues syz 96 678d 681d 594d 7749d4ff net-backports: dccp: purge write queue in dccp_destroy_sock()
general protection fault in refcount_sub_and_test 1 695d 679d 595d 12d94a80 ipv6: fix NULL dereference in ip6_route_dev_notify()
KASAN: use-after-free Read in ccid2_hc_tx_rto_expire 5 674d 678d 596d 120e9dab dccp: defer ccid_hc_tx_delete() at dismantle time
WARNING in fib6_del 24 657d 670d 596d 7483cea7 ipv6: fib: Unlink replaced routes from their nodes
BUG: unable to handle kernel NULL pointer dereference in free_fib_info_rcu 3 679d 679d 596d 187e5b3a ipv4: fix NULL dereference in free_fib_info_rcu()
KASAN: double-free or invalid-free in selinux_tun_dev_free_security C 12033 672d 683d 596d ff244c6b tun: handle register_netdevice() failures properly
KASAN: use-after-free Read in dev_queue_xmit_nit C 13 638d 650d 596d 008ba2a1 packet: hold bind lock when rebinding to fanout hook
kernel BUG at net/core/skbuff.c:LINE! 5 609d 679d 606d c780a049 ipv4: better IP_MAX_MTU enforcement
KASAN: use-after-free Read in __list_add_valid syz 26 612d 660d 608d 008ba2a1 packet: hold bind lock when rebinding to fanout hook
general protection fault in kvm_cpuid C 20 638d 657d 608d d1cd3ce9 KVM: MMU: check guest CR3 reserved bits based on its physical address width.
BUG: unable to handle kernel paging request in skb_release_data syz 15 678d 678d 608d 0bbd7dad tun: make tun_build_skb() thread safe
general protection fault in skb_clone syz 3 678d 677d 608d 0bbd7dad tun: make tun_build_skb() thread safe
WARNING in __switch_to C 535 636d 683d 609d 814fb7bb x86/fpu: Don't let userspace set bogus xcomp_bv
WARNING: kernel stack regs has bad 'bp' value C 66131 637d 683d 609d d3dfbfe2 crypto: x86/sha256-avx2 - Fix RBP usage
WARNING in __local_bh_enable_ip 22 639d 647d 609d 930651a7 bpf: do not disable/enable BH in bpf_map_free_id()
kernel BUG at lib/string.c:LINE! C 73 623d 639d 609d e466af75 netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user
KASAN: use-after-free Read in free_ldt_struct C 109 666d 680d 609d ccd5b323 x86/mm: Fix use-after-free of ldt_struct
BUG: Bad page state C 2 679d 679d 609d 263630e8 mm/madvise.c: fix freeing of locked page with MADV_FREE
general protection fault in SyS_bpf C 10 668d 669d 609d ae2b27b8 bpf: fix a return in sockmap_get_from_fd()
WARNING in refcount_inc 7 662d 670d 609d 551143d8 net_sched: fix a refcount_t issue with noop_qdisc
possible deadlock in kcm_sendpage syz 14 661d 664d 609d 351050ec kcm: do not attach PF_KCM sockets to avoid deadlock
WARNING in idr_replace C 1209 649d 681d 609d a47f68d6 idr: remove WARN_ON_ONCE() when trying to replace negative ID
general protection fault in perf_trace_block_get_rq C 180 649d 658d 609d f8e9ec16 block: tolerate tracing of NULL bio
BUG: unable to handle kernel NULL pointer dereference at ADDR C 63 666d 680d 609d 3fd87127 strparser: initialize all callbacks
general protection fault in skb_release_data syz 198 677d 678d 609d 0bbd7dad tun: make tun_build_skb() thread safe
KASAN: wild-memory-access Read in skb_copy_ubufs C 23 677d 678d 609d 0bbd7dad tun: make tun_build_skb() thread safe
KASAN: slab-out-of-bounds Read in skb_release_data 1 677d 677d 609d 0bbd7dad tun: make tun_build_skb() thread safe
general protection fault in __lock_acquire 5 619d 671d 609d 383143f3 ipv6: reset fn->rr_ptr when replacing route
kernel BUG at mm/slab.c:LINE! C 860 656d 660d 609d 96e5ae4e bpf: fix numa_node validation
suspicious RCU usage at ./include/linux/kvm_host.h:LINE C 103402 637d 683d 609d 021086e3 KVM: fix rcu warning on VM_CREATE errors
general protection fault in fib_dump_info C 428 672d 683d 609d bc3aae2b net: check and errout if res->fi is NULL when RTM_F_FIB_MATCH is set
general protection fault in fib6_add 18 673d 679d 609d 348a4002 ipv6: repair fib6 tree in failure case
KASAN: use-after-free Read in ip6_pol_route 249 672d 680d 609d 383143f3 ipv6: reset fn->rr_ptr when replacing route
KASAN: use-after-free Read in skb_push 4 673d 679d 609d 5bfd37b4 tipc: fix use-after-free
KASAN: use-after-free Read in get_mm_exe_file C 2 673d 677d 609d 2b7e8665 fork: fix incorrect fput of ->exe_file causing use-after-free
general protection fault in __ip_options_echo (2) C 2 658d 658d 609d ca2c1418 udp: drop head states only when all skb references are gone
general protection fault in __skb_flow_dissect C 37 679d 681d 609d 7324157b dsa: fix flow disector null pointer
KASAN: use-after-free Read in skb_release_data syz 7 678d 678d 609d 0bbd7dad tun: make tun_build_skb() thread safe
WARNING in kmalloc_slab C 22353 609d 681d 609d 81fbfe8a ptr_ring: use kmalloc_array()
WARNING in kvm_arch_vcpu_ioctl_run C 20284 637d 702d 637d bbeac283 KVM: X86: Fix residual mmio emulation request to userspace
INFO: task hung C 13878 637d 702d 637d bd9dfc54 tcp: fix hang in tcp_sendpage_locked()
inconsistent lock state in sk_clone_lock C 16 679d 682d 657d d624d276 tcp: fix possible deadlock in TCP stack vs BPF filter
kernel BUG at mm/usercopy.c:LINE! C 23 678d 683d 657d fd851ba9 udp: harden copy_linear_skb()
BUG: sleeping function called from invalid context at mm/slab.h:LINE C 8 679d 683d 657d 36f41f8f af_key: do not use GFP_KERNEL in atomic contexts