|
INFO: task hung in bchfs_fallocate (2)
fs
|
1 |
C |
done |
inconclusive |
6 |
159d |
386d
|
2/29 |
never |
bcachefs: Fix readahead involved deadlock
|
|
INFO: task hung in io_sq_thread_stop
fs
io-uring
|
1 |
C |
done |
|
211 |
1802d |
1962d
|
1/29 |
never |
io_uring: don't sleep schedule in SQPOLL thread if we need to park
|
|
linux-next boot error: BUG: unable to handle kernel NULL pointer dereference in mempool_init_node
ceph
fs
|
-1 |
|
|
|
12 |
1897d |
1899d
|
1/29 |
never |
kasan-simplify-kasan_poison_kfree-temp-fix
|
|
INFO: task hung in remove_inode_hugepages
mm
fs
|
1 |
C |
done |
|
52 |
471d |
563d
|
1/29 |
never |
INFO: task hung in remove_inode_hugepages
|
|
BUG: unable to handle kernel NULL pointer dereference in filemap_read_folio (4)
fs
|
10 |
C |
done |
|
5746 |
3d04h |
432d
|
22/29 |
never |
777a8560fd29
lib/buildid: use __kernel_read() for sleepable context
|
|
kernel BUG in socket
fs
|
-1 |
C |
|
|
145 |
35d |
30d
|
28/29 |
never |
afb9917d9b37
Revert "net/socket: convert sock_map_fd() to FD_ADD()"
|
|
kernel BUG in sctp_getsockopt_peeloff_common
fs
|
-1 |
C |
done |
|
6 |
51d |
53d
|
28/29 |
never |
afb9917d9b37
Revert "net/socket: convert sock_map_fd() to FD_ADD()"
|
|
KMSAN: uninit-value in bch2_alloc_sectors_start_trans (2)
fs
|
7 |
syz |
|
|
875 |
116d |
281d
|
2/29 |
never |
bcachefs: Add missing ei_last_dirtied update
|
|
general protection fault in __bch2_err_trace
fs
|
2 |
C |
done |
|
25 |
115d |
170d
|
2/29 |
never |
bcachefs: Delete faulty read_only/nochanges check in fs_open()
|
|
WARNING in bch2_fs_journal_start
fs
|
-1 |
C |
done |
|
14 |
216d |
236d
|
2/29 |
never |
bcachefs: Don't allow mounting with crazy numbers of dirty journal entries
|
|
WARNING in closure_put_after_sub
fs
|
-1 |
|
|
|
2 |
166d |
190d
|
2/29 |
never |
bcachefs: Ensure we don't return with closure on waitlist
|
|
KASAN: slab-use-after-free Write in bch2_get_next_dev
fs
|
24 |
C |
|
|
1331 |
95d |
188d
|
2/29 |
never |
bcachefs: Fix UAF by journal write path
|
|
KASAN: slab-use-after-free Write in bch2_do_discards
fs
|
24 |
syz |
|
|
137 |
115d |
185d
|
2/29 |
never |
bcachefs: Fix UAF by journal write path
|
|
KASAN: use-after-free Read in check_dirent
fs
|
19 |
C |
done |
|
13 |
154d |
335d
|
2/29 |
never |
bcachefs: Fix UAF in check_dirent()
|
|
KASAN: use-after-free Read in bch2_check_dirents
fs
|
19 |
C |
done |
|
769 |
115d |
434d
|
2/29 |
never |
bcachefs: Fix UAF in check_dirent()
|
|
KASAN: slab-out-of-bounds Read in __bch2_alloc_to_v4
fs
|
17 |
|
|
|
20 |
202d |
200d
|
2/29 |
never |
bcachefs: Fix __bch2_alloc_to_v4 copy
|
|
kernel BUG in __journal_res_get (3)
fs
|
-1 |
C |
inconclusive |
|
175 |
95d |
218d
|
2/29 |
never |
bcachefs: Fix __bch2_fs_read_write() error path
|
|
WARNING in bch2_dev_free (2)
fs
|
-1 |
C |
done |
|
5 |
184d |
189d
|
2/29 |
never |
bcachefs: Fix __bch2_fs_read_write() error path
|
|
kernel panic: in transaction restart: transaction_restart_relock, last restarted by
fs
|
2 |
|
|
|
5 |
176d |
176d
|
2/29 |
never |
bcachefs: Fix incorrect transaction handling
|
|
KMSAN: uninit-value in bch2_check_subvols
fs
|
7 |
C |
|
|
53 |
116d |
205d
|
2/29 |
never |
bcachefs: Fix missing compat code in check_subvol()
|
|
KASAN: slab-out-of-bounds Write in bch2_dirent_init_name
fs
|
23 |
C |
error |
|
1496 |
95d |
219d
|
2/29 |
never |
bcachefs: Fix padding zeroout when creating casefolded dirents
|
|
memory leak in __shmem_file_setup
fs
|
3 |
C |
|
|
1 |
15d |
11d
|
21/29 |
never |
605f6586ecf7
mm/vma: do not leak memory when .mmap_prepare swaps the file
|
|
INFO: task hung in invalidate_inode_pages2_range (3)
fs
|
1 |
C |
done |
|
55 |
59d |
329d
|
2/29 |
never |
bcachefs: Fix readahead involved deadlock
|
|
kernel BUG in free_bprm
fs
mm
|
-1 |
C |
done |
|
445 |
443d |
444d
|
1/29 |
never |
exec: NULL out bprm->argv0 when it is an ERR_PTR
|
|
INFO: task hung in bch2_readahead
fs
|
1 |
C |
done |
|
375 |
131d |
613d
|
2/29 |
never |
bcachefs: Fix readahead involved deadlock
|
|
INFO: task hung in bchfs_fpunch (2)
mm
fs
|
1 |
C |
done |
|
2 |
168d |
212d
|
2/29 |
never |
bcachefs: Fix readahead involved deadlock
|
|
INFO: task hung in pipe_release (6)
fs
|
1 |
syz |
done |
|
17 |
14d |
329d
|
2/29 |
never |
bcachefs: Fix readahead involved deadlock
|
|
KMSAN: uninit-value in __bch2_alloc_v4_to_text
fs
|
7 |
C |
|
|
3 |
214d |
220d
|
2/29 |
never |
bcachefs: Fix refs to undefined fields in __bch2_alloc_v4_to_text()
|
|
kernel BUG in bch2_fill_extent (2)
fs
|
-1 |
|
|
|
10 |
110d |
192d
|
2/29 |
never |
bcachefs: Fix unhandled key type in fiemap_fill_extent
|
|
UBSAN: array-index-out-of-bounds in bch2_accounting_validate
fs
|
15 |
C |
done |
|
23 |
104d |
172d
|
2/29 |
never |
bcachefs: Ignore accounting key type larger than BCH_DISK_ACCOUNTING_TYPE_NR
|
|
WARNING in bchfs_truncate
fs
|
-1 |
C |
done |
|
366 |
118d |
629d
|
2/29 |
never |
bcachefs: Increase BCH_MIN_NR_NBUCKETS
|
|
INFO: task hung in __closure_sync
fs
|
1 |
C |
done |
|
8591 |
102d |
629d
|
2/29 |
never |
bcachefs: Increase BCH_MIN_NR_NBUCKETS
|
|
INFO: task hung in __bch2_fs_stop
fs
|
1 |
C |
done |
|
1589 |
111d |
587d
|
2/29 |
never |
bcachefs: Increase BCH_MIN_NR_NBUCKETS
|
|
BUG: sleeping function called from invalid context in procfs_procmap_ioctl
fs
|
5 |
syz |
done |
|
101 |
203d |
205d
|
2/29 |
never |
mm/maps: move kmalloc() call location in do_procmap_query() out of RCU critical section
|
|
kernel BUG in bch2_btree_repair_topology_recurse
fs
|
-1 |
C |
done |
|
7 |
116d |
176d
|
2/29 |
never |
bcachefs: btree_check_root_boundaries()
|
|
kernel BUG in bch2_printbuf_exit
fs
|
-1 |
C |
error |
|
29 |
186d |
189d
|
2/29 |
never |
bcachefs: convert str_hash.c to CLASS
|
|
WARNING in bch2_verify_accounting_clean
fs
|
-1 |
|
|
|
29 |
99d |
348d
|
2/29 |
never |
bcachefs: do_bch2_trans_commit_to_journal_replay handles accounting
|
|
kernel BUG in do_bch2_trans_commit_to_journal_replay
fs
|
-1 |
syz |
|
|
22 |
183d |
187d
|
2/29 |
never |
bcachefs: do_bch2_trans_commit_to_journal_replay handles accounting
|
|
kernel BUG in bch2_btree_path_peek_slot
fs
|
-1 |
C |
error |
error |
1546 |
241d |
420d
|
2/29 |
never |
bcachefs: fix assert in bch2_btree_path_traverse_cached()
|
|
KASAN: use-after-free Read in check_extent_overbig
fs
|
19 |
C |
done |
done |
18 |
131d |
413d
|
2/29 |
never |
bcachefs: fix check_extent_overbig() call
|
|
WARNING in bch2_prt_printf
fs
|
-1 |
C |
done |
error |
103 |
118d |
622d
|
2/29 |
never |
bcachefs: journal_entry_btree_keys_to_text() is more careful
|
|
general protection fault in bch2_prt_vprintf
fs
|
2 |
C |
error |
inconclusive |
4 |
383d |
420d
|
2/29 |
never |
bcachefs: journal_entry_btree_keys_to_text() is more careful
|
|
linux-next boot error: WARNING in kmem_cache_free
fs
|
-1 |
|
|
|
45 |
2037d |
2041d
|
1/29 |
never |
mm, slab/slub: improve error reporting and overhead of cache_from_obj()-fix
|
|
UBSAN: shift-out-of-bounds in minix_statfs
fs
|
-1 |
C |
inconclusive |
error |
74 |
11d |
1502d
|
2/29 |
never |
minix: Add required sanity checking to minix_check_superblock()
|
|
memory leak in debugfs_change_name
fs
|
3 |
C |
|
|
1 |
50d |
46d
|
29/29 |
2d02h |
d412ff9e26eb
debugfs: Fix memleak in debugfs_change_name().
|
|
WARNING in minix_unlink
fs
|
-1 |
C |
inconclusive |
done |
458 |
45d |
426d
|
29/29 |
2d02h |
009a2ba40303
Fix a drop_nlink warning in minix_rename
|
|
memory leak in getname_flags
fs
|
3 |
C |
|
|
1 |
30d |
30d
|
29/29 |
2d02h |
b14fad555302
io_uring: fix filename leak in __io_openat_prep()
|
|
KASAN: slab-use-after-free Read in driver_remove_file
fs
|
19 |
C |
error |
done |
296 |
48d |
178d
|
29/29 |
3d03h |
72262330f7b3
comedi: c6xdigio: Fix invalid PNP driver unregistration
|
|
general protection fault in fd_install
fs
|
2 |
C |
|
|
64 |
48d |
50d
|
29/29 |
16d |
8cf01d0c4372
mqueue: correct the type of ro to int
|
|
WARNING in minix_rmdir
fs
|
-1 |
C |
inconclusive |
|
92 |
66d |
380d
|
29/29 |
16d |
d3e0e8661ceb
Fix a drop_nlink warning in minix_rmdir
|
|
WARNING in nsproxy_ns_active_get
fs
|
-1 |
C |
|
|
377 |
72d |
78d
|
29/29 |
16d |
cefd55bd2159
nsproxy: fix free_nsproxy() and simplify create_new_namespaces()
|
|
kernel BUG in may_open (2)
fs
|
-1 |
C |
done |
|
17716 |
16d |
198d
|
29/29 |
16d |
34ab4c75588c
bfs: Reconstruct file type when loading from disk
7f9d34b0a7cb
cramfs: Verify inode mode when loading from disk
005d4b0d33f6
hfsplus: Verify inode mode when loading from disk
0a9e74051313
isofs: Verify inode mode when loading from disk
7a5aa54fba2b
jfs: Verify inode mode when loading from disk
73861970938a
minixfs: Verify inode mode when loading from disk
4aead50caf67
nilfs2: reject invalid file types when reading inodes
4e8011ffec79
ntfs3: pretend $Extend records as regular files
bc107a619f02
squashfs: verify inode mode when loading from disk
|
|
KMSAN: kernel-infoleak in hugetlbfs_read_iter
fs
mm
|
9 |
C |
|
|
7 |
74d |
73d
|
29/29 |
16d |
de8798965fd0
mm/memfd: fix information leak in hugetlb folios
|
|
general protection fault in fsnotify_destroy_group
fs
|
2 |
C |
error |
|
2 |
58d |
56d
|
29/29 |
16d |
7129098f4f7b
fanotify: convert fanotify_init() to FD_PREPARE()
|
|
WARNING in nsproxy_ns_active_put
fs
|
-1 |
C |
done |
|
38 |
72d |
78d
|
29/29 |
16d |
cefd55bd2159
nsproxy: fix free_nsproxy() and simplify create_new_namespaces()
|
|
WARNING in minix_rename
fs
|
-1 |
syz |
error |
|
7 |
126d |
212d
|
29/29 |
16d |
009a2ba40303
Fix a drop_nlink warning in minix_rename
|
|
WARNING in destroy_super_work
fs
|
-1 |
syz |
done |
|
107 |
72d |
77d
|
29/29 |
16d |
f8d5a8970d2f
ns: handle setns(pidfd, ...) cleanly
|
|
general protection fault in mntput
fs
|
2 |
C |
error |
|
17 |
51d |
56d
|
29/29 |
16d |
05885f41658c
namespace: convert fsmount() to FD_PREPARE()
|
|
BUG: sleeping function called from invalid context in hook_sb_delete
fs
|
5 |
C |
done |
|
11887 |
33d |
121d
|
29/29 |
16d |
56325e8c68c0
landlock: fix splats from iput() after it started calling might_sleep()
|
|
WARNING in dax_iomap_rw
fs
|
-1 |
C |
|
|
5 |
100d |
113d
|
29/29 |
52d |
154d1e7ad9e5
dax: skip read lock assertion for read-only filesystems
|
|
WARNING in invalidate_bh_lru
fs
|
-1 |
C |
done |
done |
5172 |
300d |
1128d
|
29/29 |
65d |
6f861765464f
fs: Block writes to mounted block devices
|
|
kernel BUG in qlist_free_all (2)
fs
|
-1 |
C |
done |
|
5 |
99d |
130d
|
29/29 |
66d |
25718fdcbdd2
net: gro_cells: Use nested-BH locking for gro_cell
|
|
INFO: task hung in v9fs_file_fsync
mm
fs
|
1 |
C |
done |
|
14 |
118d |
158d
|
29/29 |
85d |
e8fe3f07a357
9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN
|
|
WARNING in sysfs_emit_at
fs
|
-1 |
C |
|
|
2 |
139d |
135d
|
29/29 |
85d |
9dfec4a51df9
USB: core: remove the move buf action
|
|
possible deadlock in path_openat (3)
fs
|
4 |
|
|
|
1 |
145d |
145d
|
29/29 |
85d |
9f7c02e03157
nbd: restrict sockets to TCP and UDP
|
|
general protection fault in iter_file_splice_write
fs
|
2 |
C |
done |
done |
2812 |
156d |
613d
|
29/29 |
100d |
netfs: Fix unbuffered write error handling
|
|
WARNING in path_noexec
fs
mm
|
-1 |
C |
done |
|
14318 |
114d |
200d
|
29/29 |
114d |
secretmem: use SB_I_NOEXEC
|
|
kernel BUG in bch2_journal_keys_peek_max
fs
|
-1 |
C |
done |
|
45 |
207d |
345d
|
29/29 |
130d |
425da82c63e3
bcachefs: btree_iter: fix updates, journal overlay
|
|
kernel panic: in transaction restart: transaction_restart_mem_realloced, last restarted by
fs
|
2 |
|
|
|
2 |
210d |
207d
|
29/29 |
140d |
fbf913cb72a5
bcachefs: Fix incorrect transaction restart handling
|
|
KASAN: slab-use-after-free Read in bch2_str_hash_repair_key
fs
|
19 |
C |
done |
|
226 |
207d |
226d
|
29/29 |
140d |
9b54efe66c9b
bcachefs: Fix alloc_req use after free
|
|
kernel BUG in __bch2_bkey_unpack_key
fs
|
-1 |
C |
|
|
43 |
219d |
240d
|
29/29 |
140d |
9fe8ec866442
bcachefs: Don't build aux search tree when still repairing node
|
|
UBSAN: shift-out-of-bounds in __bch2_btree_node_hash_insert
fs
|
-1 |
C |
done |
|
434 |
202d |
387d
|
29/29 |
140d |
96de8f852031
bcachefs: mark invalid_btree_id autofix
|
|
KASAN: slab-use-after-free Read in bch2_bucket_alloc_trans
fs
|
19 |
C |
error |
|
550 |
207d |
225d
|
29/29 |
140d |
9b54efe66c9b
bcachefs: Fix alloc_req use after free
|
|
UBSAN: shift-out-of-bounds in __bch2_bkey_unpack_key
fs
|
-1 |
C |
done |
|
54 |
223d |
239d
|
29/29 |
140d |
03208bd06a61
bcachefs: don't return fsck_fix for unfixable node errors in __btree_err
|
|
kernel BUG in __btree_trans_update_by_path
fs
|
-1 |
C |
done |
|
20 |
199d |
204d
|
29/29 |
140d |
c72d628469b8
bcachefs: Fix btree for nonexistent tree depth
|
|
kernel BUG in __bkey_unpack_pos (2)
fs
|
-1 |
C |
done |
|
24 |
196d |
393d
|
29/29 |
140d |
9fe8ec866442
bcachefs: Don't build aux search tree when still repairing node
|
|
KASAN: use-after-free Read in poly1305_update
fs
|
19 |
C |
done |
|
8 |
208d |
223d
|
29/29 |
140d |
d89a34b14df5
bcachefs: Move bset size check before csum check
|
|
BUG: unable to handle kernel NULL pointer dereference in mempool_alloc_noprof (2)
fs
|
10 |
C |
done |
|
8 |
220d |
236d
|
29/29 |
140d |
56be92c63f02
bcachefs: Fix pool->alloc NULL pointer dereference
|
|
KASAN: slab-use-after-free Read in bch2_copygc
fs
|
19 |
C |
done |
|
25 |
141d |
198d
|
29/29 |
140d |
c02b943f7d12
bcachefs: Fix reference to invalid bucket in copygc
|
|
possible deadlock in __bch2_fsck_err (2)
fs
|
4 |
C |
|
|
4 |
254d |
255d
|
29/29 |
169d |
0acb385ec19c
bcachefs: Fix possible console lock involved deadlock
|
|
KASAN: slab-out-of-bounds Read in bch2_sb_members_v2_to_text
fs
|
17 |
C |
done |
|
34 |
225d |
242d
|
29/29 |
169d |
205da7c02673
bcachefs: Don't trust sb->nr_devices in members_to_text()
|
|
WARNING in __init_work (2)
fs
|
-1 |
C |
|
|
5971 |
217d |
225d
|
29/29 |
169d |
757601ef8533
bcachefs: Don't put rhashtable on stack
|
|
possible deadlock in bch2_trans_begin
fs
|
4 |
|
|
|
5 |
238d |
368d
|
29/29 |
169d |
0acb385ec19c
bcachefs: Fix possible console lock involved deadlock
|
|
divide error in bch2_sb_members_v2_to_text
fs
|
2 |
C |
done |
|
3 |
226d |
226d
|
29/29 |
169d |
205da7c02673
bcachefs: Don't trust sb->nr_devices in members_to_text()
|
|
UBSAN: array-index-out-of-bounds in bch2_sb_downgrade_update
fs
|
15 |
C |
|
|
539 |
217d |
269d
|
29/29 |
169d |
082c74411491
bcachefs: Fix downgrade_table_extra()
|
|
kernel BUG in vfs_get_tree (2)
fs
|
-1 |
C |
done |
|
22 |
232d |
229d
|
29/29 |
190d |
9c6185609947
bcachefs: Call bch2_fs_start before getting vfs superblock
|
|
KASAN: use-after-free Read in sysv_new_inode (2)
fs
|
19 |
C |
inconclusive |
error |
21224 |
291d |
624d
|
29/29 |
191d |
448fa70158f9
sysv: Remove the filesystem
|
|
BUG: unable to handle kernel NULL pointer dereference in do_pagemap_scan
fs
|
10 |
C |
inconclusive |
done |
45 |
257d |
760d
|
29/29 |
199d |
65c66047259f
proc: fix the issue of proc_mem_open returning NULL
|
|
kernel BUG in may_open
fs
|
-1 |
C |
error |
|
137019 |
199d |
295d
|
29/29 |
199d |
cfd86ef7e8e7
anon_inode: use a proper mode internally
|
|
kernel BUG in __bch2_trans_commit (2)
fs
|
-1 |
|
|
|
105 |
199d |
243d
|
29/29 |
199d |
97e69f12edb1
bcachefs: Fix missing BTREE_UPDATE_internal_snapshot_node
|
|
KMSAN: uninit-value in btree_interior_update_work
fs
|
7 |
|
|
|
2 |
306d |
359d
|
28/29 |
223d |
1f88c3567495
bcachefs: Fix a KMSAN splat in btree_update_nodes_written()
|
|
KMSAN: uninit-value in bch2_extent_crc_append (2)
fs
|
7 |
C |
|
|
4 |
309d |
320d
|
28/29 |
224d |
53cf2a3daa4c
bcachefs: Fix kmsan warnings in bch2_extent_crc_pack()
|
|
KMSAN: uninit-value in bch2_xattr_validate
fs
|
7 |
C |
|
|
22 |
324d |
406d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in bch2_alloc_v4_validate (2)
fs
|
7 |
C |
|
|
514 |
304d |
432d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in __bch2_bkey_cmp_left_packed
fs
|
7 |
syz |
|
|
2 |
367d |
394d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in rw_aux_tree_set (2)
fs
|
7 |
C |
|
|
2356 |
302d |
426d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
WARNING in bch2_opt_check_may_set
fs
|
-1 |
|
|
|
4 |
301d |
297d
|
28/29 |
225d |
2dd202dbaf0a
bcachefs: Recovery no longer holds state_lock
|
|
KMSAN: uninit-value in bch2_dirent_rename (2)
fs
|
7 |
|
|
|
5 |
389d |
400d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in bch2_dirent_validate
fs
|
7 |
|
|
|
214 |
367d |
418d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in bch2_bkey_val_validate
fs
|
7 |
C |
|
|
17 |
307d |
419d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in bch2_inode_unpack (2)
fs
|
7 |
|
|
|
9 |
371d |
386d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in bch2_bkey_ptrs_validate
fs
|
7 |
C |
|
|
15 |
306d |
418d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in bch2_readdir (2)
fs
|
7 |
|
|
|
2 |
376d |
376d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in bch2_bucket_alloc_trans
fs
|
7 |
C |
|
|
15 |
278d |
410d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
KMSAN: uninit-value in bch2_bkey_cmp_packed_inlined (2)
fs
|
7 |
C |
|
|
309 |
302d |
421d
|
28/29 |
225d |
9c3a2c9b471a
bcachefs: Disable asm memcpys when kmsan enabled
|
|
kernel BUG in bch2_stripe_validate
fs
|
-1 |
C |
done |
done |
6 |
304d |
389d
|
28/29 |
226d |
71f8e806a5e4
bcachefs: Stricter checks on "key allowed in this btree"
|
|
kernel BUG in __journal_res_get (2)
fs
|
-1 |
C |
error |
done |
1527 |
227d |
435d
|
28/29 |
226d |
4c0d2c67ac6d
bcachefs: Fix early startup error path
|
|
KCSAN: data-race in bprm_execve / copy_fs (4)
mm
fs
|
6 |
|
|
|
1 |
309d |
308d
|
28/29 |
226d |
af7bb0d2ca45
exec: fix the racy usage of fs_struct->in_exec
|
|
BUG: unable to handle kernel paging request in efivarfs_pm_notify
fs
efi
|
8 |
C |
|
|
1037 |
323d |
334d
|
28/29 |
226d |
cb6ae457bc6a
efivarfs: Defer PM notifier registration until .fill_super
|
|
kernel BUG in __bch2_trans_commit
fs
|
-1 |
C |
unreliable |
|
11858 |
434d |
459d
|
28/29 |
257d |
8b22abb4c840
bcachefs: -o norecovery now bails out of recovery earlier
|
|
possible deadlock in bch2_alloc_sectors_start_trans
fs
|
4 |
C |
inconclusive |
|
64 |
415d |
437d
|
28/29 |
259d |
2cd85fea49d8
bcachefs: Don't recurse in check_discard_freespace_key
|
|
general protection fault in proc_scheduler
fs
|
2 |
syz |
|
|
6 |
380d |
385d
|
28/29 |
261d |
d38e26e36206
mptcp: sysctl: sched: avoid using current->nsproxy
|
|
kernel BUG in const_folio_flags (2)
fs
mm
|
-1 |
syz |
|
|
3 |
366d |
426d
|
28/29 |
261d |
3203b3ab0fcf
mm/filemap: don't call folio_test_locked() without a reference in next_uptodate_folio()
|
|
general protection fault in bch2_checksum
fs
|
19 |
C |
done |
|
34 |
263d |
554d
|
28/29 |
261d |
f7f196170dcd
bcachefs: cryptographic MACs on superblock are not (yet?) supported
|
|
possible deadlock in __bch2_fsck_err
fs
|
4 |
|
|
|
2 |
411d |
411d
|
28/29 |
261d |
49f2d182638a
bcachefs: Kill unnecessary mark_lock usage
|
|
WARNING: locking bug in eventfd_signal_mask
io-uring
fs
|
4 |
C |
done |
|
6 |
386d |
390d
|
28/29 |
261d |
a9c83a0ab66a
io_uring/timeout: flush timeouts outside of the timeout lock
|
|
general protection fault in bch2_btree_path_traverse_one
fs
|
8 |
C |
done |
|
564 |
354d |
455d
|
28/29 |
261d |
90f3683e8f7c
bcachefs: Fix null ptr deref in btree_path_lock_root()
c7e78f7b0178
bcachefs: Ignore empty btree root journal entries
|
|
BUG: corrupted list in bch2_btree_and_journal_iter_exit
fs
|
8 |
C |
done |
|
7 |
378d |
423d
|
28/29 |
261d |
0184dfa3b821
bcachefs: Fix journal_iter list corruption
|
|
WARNING in mark_buffer_dirty (6)
fs
|
-1 |
C |
error |
|
11669 |
261d |
828d
|
28/29 |
261d |
ca76bb226bf4
nilfs2: do not force clear folio if buffer is referenced
|
|
kernel BUG in bch2_bio_compress (2)
fs
|
-1 |
C |
|
|
5 |
310d |
434d
|
28/29 |
261d |
3d0b3b51c5ab
bcachefs: Don't BUG_ON() when superblock feature wasn't set for compressed data
|
|
kernel BUG in bch2_btree_write_buffer_flush_locked
fs
|
-1 |
C |
done |
|
35 |
371d |
451d
|
28/29 |
261d |
b3d82c2f2761
bcachefs: Guard against journal seq overflow
|
|
kernel BUG in bch2_btree_root_read
fs
|
-1 |
C |
|
|
9 |
352d |
426d
|
28/29 |
261d |
828552ca74a4
bcachefs: Kill bch2_bucket_alloc_new_fs()
|
|
KASAN: slab-out-of-bounds Write in __put_unused_fd
fs
|
24 |
C |
done |
|
5 |
384d |
387d
|
28/29 |
261d |
0c0214df28f0
fanotify: Fix crash in fanotify_init(2)
|
|
possible deadlock in page_cache_ra_unbounded
mm
fs
|
4 |
C |
error |
done |
163 |
368d |
1129d
|
28/29 |
324d |
6f861765464f
fs: Block writes to mounted block devices
|
|
KASAN: use-after-free Read in reiserfs_fill_super (3)
fs
|
19 |
C |
error |
done |
47 |
430d |
475d
|
28/29 |
374d |
fb6f20ecb121
reiserfs: The last commit
|
|
kernel BUG in bch2_journal_res_get (2)
fs
|
-1 |
C |
|
|
1710 |
431d |
455d
|
28/29 |
390d |
ca43f73cd172
bcachefs: bch2_btree_write_buffer_flush_going_ro()
|
|
kernel BUG in bch2_fs_btree_cache_exit
fs
|
-1 |
C |
done |
|
2766 |
431d |
462d
|
28/29 |
390d |
ca43f73cd172
bcachefs: bch2_btree_write_buffer_flush_going_ro()
|
|
KCSAN: data-race in __ep_remove / __fput (5)
fs
|
6 |
|
|
|
1 |
489d |
489d
|
28/29 |
403d |
6474353a5e3d
epoll: annotate racy check
|
|
kernel BUG in bch2_bkey_pack_pos_lossy
fs
|
-1 |
C |
|
|
7 |
441d |
453d
|
28/29 |
403d |
dc537189b5cf
bcachefs: Fix validate_bset() repair path
|
|
kernel BUG in bch2_run_recovery_pass
fs
|
-1 |
C |
done |
|
17 |
435d |
455d
|
28/29 |
403d |
2642084f26b5
bcachefs: Allow for unknown key types in backpointers fsck
|
|
kernel BUG in bch2_ptr_swab
fs
|
-1 |
C |
inconclusive |
|
11 |
440d |
457d
|
28/29 |
403d |
840c2fbcc5cd
bcachefs: Fix assertion pop in bch2_ptr_swab()
|
|
kernel BUG in __bch2_bkey_cmp_packed_format_checked
fs
|
-1 |
C |
|
|
4 |
455d |
455d
|
28/29 |
407d |
d335bb3fd3a4
bcachefs: Ancient versions with bad bkey_formats are no longer supported
|
|
kernel BUG in bch2_bkey_cmp_packed
fs
|
-1 |
C |
|
|
8 |
441d |
455d
|
28/29 |
407d |
d335bb3fd3a4
bcachefs: Ancient versions with bad bkey_formats are no longer supported
|
|
kernel BUG in bch2_inconsistent_error
fs
|
-1 |
C |
|
|
4 |
441d |
453d
|
28/29 |
407d |
f9f0a5390dce
bcachefs: Change OPT_STR max to be 1 less than the size of choices array
|
|
UBSAN: shift-out-of-bounds in bch2_alloc_to_text
fs
|
-1 |
C |
|
|
29 |
446d |
459d
|
28/29 |
435d |
5c41f75d1b92
bcachefs: fix shift oob in alloc_lru_idx_fragmentation
|
|
UBSAN: shift-out-of-bounds in validate_sb_layout
fs
|
-1 |
C |
done |
|
7 |
448d |
456d
|
28/29 |
435d |
2045fc4295c4
bcachefs: Fix invalid shift in validate_sb_layout()
|
|
KCSAN: data-race in __fsnotify_parent / __fsnotify_recalc_mask (5)
fs
|
6 |
|
|
|
15 |
480d |
567d
|
28/29 |
436d |
35ceae44742e
fsnotify: Avoid data race between fsnotify_recalc_mask() and fsnotify_object_watched()
|
|
kernel BUG in submit_bh_wbc (3)
nilfs
fs
|
-1 |
C |
done |
|
18 |
459d |
466d
|
28/29 |
436d |
6ed469df0bfb
nilfs2: fix kernel bug due to missing clearing of buffer delay flag
|
|
KASAN: slab-use-after-free Read in bch2_direct_write
fs
|
19 |
|
|
|
11 |
480d |
483d
|
28/29 |
436d |
573ddcdc5607
bcachefs: fix uaf in bch2_dio_write_done()
|
|
WARNING: suspicious RCU usage in bch2_snapshot_tree_oldest_subvol
fs
|
4 |
C |
|
|
21 |
481d |
492d
|
28/29 |
458d |
39c3aad43f6f
bcachefs: Hold read lock in bch2_snapshot_tree_oldest_subvol()
|
|
general protection fault in __copy_super
fs
|
2 |
C |
done |
|
5 |
486d |
489d
|
28/29 |
458d |
40d40c6bea19
bcachefs: assign return error when iterating through layout
|
|
KASAN: slab-use-after-free Read in lockref_get_not_dead (2)
fs
|
19 |
syz |
error |
|
1 |
508d |
504d
|
28/29 |
458d |
4e32c25b58b9
libfs: fix get_stashed_dentry()
|
|
WARNING in __bch2_fsck_err
fs
|
-1 |
C |
|
|
200 |
478d |
525d
|
28/29 |
476d |
075cabf324c3
bcachefs: Fix forgetting to pass trans to fsck_err()
|
|
KASAN: slab-out-of-bounds Write in bch2_dev_journal_init
fs
|
23 |
C |
|
|
2 |
523d |
522d
|
28/29 |
476d |
bdbdd4759f08
bcachefs: Fix missing validation in bch2_sb_journal_v2_validate()
|
|
WARNING in discard_new_inode
fs
|
-1 |
C |
|
|
3 |
525d |
525d
|
28/29 |
476d |
99c87fe0f584
bcachefs: fix incorrect i_state usage
|
|
possible deadlock in bch2_gc_mark_key
fs
|
4 |
C |
done |
|
86 |
529d |
605d
|
27/29 |
511d |
1841027c7de4
bcachefs: bch2_gc_btree() should not use btree_root_lock
|
|
kernel BUG in bch2_fs_journal_stop
fs
|
-1 |
C |
done |
|
4370 |
527d |
619d
|
27/29 |
513d |
600b8be5e747
bcachefs: Change bch2_fs_journal_stop() BUG_ON() to warning
|
|
kernel panic: not locked: inodes NUM:NUM:NUM cached
fs
|
2 |
C |
|
|
2 |
598d |
608d
|
27/29 |
514d |
385f0c05d670
bcachefs: kill key cache arg to bch2_assert_pos_locked()
|
|
WARNING: lock held when returning to user space in ns_ioctl
fs
|
4 |
C |
done |
|
147 |
543d |
554d
|
27/29 |
527d |
280e36f0d5b9
nsfs: use cleanup guard
|
|
BUG: unable to handle kernel NULL pointer dereference in path_from_stashed
fs
|
10 |
C |
|
|
23 |
548d |
551d
|
27/29 |
527d |
f60d38cb02d0
pidfs: when time ns disabled add check for ioctl
|
|
kernel BUG in bch2_ioctl_fsck_online
fs
|
-1 |
C |
done |
|
3 |
583d |
579d
|
26/29 |
558d |
9bd01500e4d8
bcachefs: Fix freeing of error pointers
|
|
WARNING in __virt_to_phys (4)
fs
|
-1 |
C |
|
|
2 |
572d |
568d
|
26/29 |
558d |
9bd01500e4d8
bcachefs: Fix freeing of error pointers
|
|
UBSAN: array-index-out-of-bounds in bch2_bkey_swab_key
fs
|
15 |
|
|
|
2 |
595d |
593d
|
26/29 |
562d |
d47df4f616d5
bcachefs: Fix array-index-out-of-bounds
|
|
kernel BUG in bch2_journal_res_get
fs
|
-1 |
C |
|
|
2 |
592d |
588d
|
26/29 |
562d |
dbf4d79b7fc7
bcachefs: Fix early init error path in journal code
|
|
kernel BUG in bch2_lru_change
fs
|
-1 |
C |
done |
|
4 |
580d |
595d
|
26/29 |
562d |
cff07e2739d8
bcachefs: Guard against overflowing LRU_TIME_BITS
|
|
WARNING: locking bug in srcu_gp_start_if_needed
kvm
fs
|
4 |
|
|
|
2 |
589d |
591d
|
26/29 |
562d |
f770a6e9a3d7
bcachefs: Fix initialization order for srcu barrier
|
|
WARNING: kmalloc bug in __snapshot_t_mut
fs
|
-1 |
C |
done |
|
10 |
573d |
603d
|
26/29 |
562d |
64cd7de998f3
bcachefs: Fix kmalloc bug in __snapshot_t_mut
|
|
KASAN: slab-use-after-free Read in bch2_fs_recovery
fs
|
19 |
|
|
|
21 |
580d |
581d
|
26/29 |
562d |
2fe79ce7d1e8
bcachefs: Fix a UAF after write_super()
|
|
WARNING: locking bug in __timer_delete_sync
fs
kvm
|
4 |
|
|
|
6 |
576d |
600d
|
26/29 |
562d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
|
kernel BUG in gc_bucket
fs
|
-1 |
C |
done |
|
221 |
596d |
601d
|
26/29 |
562d |
9432e90df1b8
bcachefs: Check for invalid bucket from bucket_gen(), gc_bucket()
|
|
general protection fault in bch2_fs_btree_key_cache_exit
fs
|
2 |
|
|
|
6 |
588d |
589d
|
26/29 |
581d |
b30b70ad8bff
bcachefs: Fix early error path in bch2_fs_btree_key_cache_exit()
|
|
UBSAN: shift-out-of-bounds in bch2_btree_lost_data
fs
|
-1 |
C |
done |
|
3 |
617d |
616d
|
25/29 |
591d |
f108ddd467b5
bcachefs: Fix shift overflow in btree_lost_data()
|
|
kernel BUG in bch2_fs_release
fs
|
-1 |
|
|
|
3 |
603d |
608d
|
25/29 |
591d |
d509cadc3a48
bcachefs: Fix debug assert
|
|
kernel panic: bch_dev->ref underflow, last put: bch2_trigger_alloc
fs
|
2 |
C |
done |
|
6 |
608d |
620d
|
25/29 |
591d |
9667214b30ef
bcachefs: Fix ref in trans_mark_dev_sbs() error path
|
|
general protection fault in __bch2_insert_snapshot_whiteouts
fs
|
8 |
C |
done |
|
65 |
606d |
619d
|
25/29 |
591d |
6d48e61364ae
bcachefs: Add missing guard in bch2_snapshot_has_children()
|
|
KASAN: slab-use-after-free Read in evict_inodes
fs
|
19 |
C |
done |
|
2 |
623d |
619d
|
25/29 |
591d |
d93ff5fa40b9
bcachefs: Fix race path in bch2_inode_insert()
|
|
KMSAN: uninit-value in bch2_dirent_invalid
fs
|
7 |
C |
|
|
239 |
591d |
619d
|
25/29 |
591d |
2195b755ebd2
bcachefs: Fix unsafety in bch2_dirent_name_bytes()
|
|
kernel BUG in bch2_fs_recovery
fs
|
-1 |
C |
done |
done |
161 |
624d |
629d
|
25/29 |
591d |
7ffec9ccdc6a
bcachefs: don't free error pointers
|
|
KASAN: slab-out-of-bounds Read in bch2_sb_clean_to_text
fs
|
17 |
C |
done |
|
3 |
618d |
627d
|
25/29 |
596d |
f39055220f6f
bcachefs: Add missing validation for superblock section clean
|
|
kernel BUG in bch2_alloc_v4_invalid
fs
|
-1 |
C |
error |
|
3 |
604d |
627d
|
25/29 |
596d |
6b8cbfc3db75
bcachefs: Fix assert in bch2_alloc_v4_invalid()
|
|
KASAN: slab-out-of-bounds Read in bch2_varint_decode_fast
fs
|
17 |
C |
|
|
583 |
597d |
629d
|
25/29 |
596d |
4a8521b6bb81
bcachefs: Inodes need extra padding for varint_decode_fast()
|
|
UBSAN: shift-out-of-bounds in bch2_bkey_format_invalid
fs
|
-1 |
C |
|
|
45 |
599d |
625d
|
25/29 |
596d |
61692c7812ab
bcachefs: bch2_bkey_format_field_overflows()
|
|
UBSAN: shift-out-of-bounds in rewrite_old_nodes_pred
fs
|
-1 |
C |
done |
|
3 |
628d |
627d
|
25/29 |
596d |
0ec5b3b7ccfc
bcachefs: Fix shift-by-64 in bformat_needs_redo()
|
|
kernel BUG in bch2_btree_node_read_done
fs
|
-1 |
C |
error |
|
5 |
627d |
629d
|
25/29 |
596d |
a2ddaf965f6a
bcachefs: bucket_pos_to_bp_noerror()
|
|
INFO: rcu detected stall in rtnl_newlink (4)
sctp
fs
|
1 |
C |
error |
|
9 |
617d |
693d
|
25/29 |
610d |
b1f532a3b1e6
batman-adv: Avoid infinite loop trying to resize local TT
|
|
KASAN: slab-use-after-free Read in __fput (2)
fs
|
19 |
C |
done |
|
6 |
634d |
640d
|
25/29 |
610d |
4efaa5acf0a1
epoll: be better about file lifetimes
|
|
general protection fault in __ep_remove
fs
|
2 |
C |
|
|
1 |
655d |
655d
|
25/29 |
610d |
4efaa5acf0a1
epoll: be better about file lifetimes
|
|
WARNING: ODEBUG bug in bdev_super_lock (2)
fs
|
-1 |
C |
done |
|
3 |
648d |
645d
|
25/29 |
610d |
22650a99821d
fs,block: yield devices early
|
|
kernel BUG at fs/inode.c:LINE! (2)
fs
|
-1 |
C |
done |
unreliable |
322 |
625d |
1973d
|
25/29 |
612d |
319c15174757
epoll: take epitem list out of struct file
|
|
WARNING in stashed_dentry_prune (2)
fs
|
-1 |
C |
done |
|
54 |
637d |
646d
|
25/29 |
614d |
9d9539db8638
pidfs: remove config option
|
|
WARNING in __sk_destruct
batman
fs
|
-1 |
|
|
|
2 |
665d |
697d
|
25/29 |
651d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
|
WARNING in stashed_dentry_prune
fs
|
-1 |
C |
done |
|
20 |
682d |
681d
|
25/29 |
652d |
9d9539db8638
pidfs: remove config option
|
|
WARNING: ODEBUG bug in bdev_super_lock
fs
|
-1 |
C |
|
|
3 |
655d |
665d
|
25/29 |
652d |
59a55a63c246
fs,block: get holder during claim
|
|
KASAN: slab-use-after-free Read in sys_io_cancel
fs
|
19 |
C |
done |
|
894 |
653d |
691d
|
25/29 |
653d |
28468cbed92e
Revert "fs/aio: Make io_cancel() generate completions again"
|
|
BUG: sleeping function called from invalid context in __getblk_gfp
fs
|
5 |
C |
error |
done |
3673 |
757d |
1152d
|
25/29 |
653d |
f123dc86388c
sysv: don't call sb_bread() with pointers_lock held
|
|
possible deadlock in reiserfs_dirty_inode
fs
|
4 |
C |
done |
done |
519 |
723d |
1152d
|
25/29 |
674d |
6f861765464f
fs: Block writes to mounted block devices
|
|
BUG: sleeping function called from invalid context in __bread_gfp
fs
|
5 |
C |
error |
done |
359 |
749d |
1151d
|
25/29 |
674d |
6f861765464f
fs: Block writes to mounted block devices
|
|
INFO: task hung in reiserfs_sync_fs
fs
|
1 |
C |
error |
done |
22 |
749d |
1128d
|
25/29 |
674d |
6f861765464f
fs: Block writes to mounted block devices
|
|
general protection fault in __fget_files (2)
fs
|
2 |
C |
done |
done |
1 |
757d |
753d
|
25/29 |
701d |
6f861765464f
fs: Block writes to mounted block devices
|
|
BUG: unable to handle kernel paging request in reiserfs_readdir_inode
fs
|
19 |
C |
error |
done |
11 |
748d |
1113d
|
25/29 |
701d |
6f861765464f
fs: Block writes to mounted block devices
|
|
kernel BUG in entry_points_to_object
fs
|
-1 |
C |
done |
done |
21 |
748d |
792d
|
25/29 |
701d |
6f861765464f
fs: Block writes to mounted block devices
|
|
KASAN: vmalloc-out-of-bounds Read in cleanup_bitmap_list
fs
|
17 |
C |
error |
done |
100 |
751d |
1182d
|
25/29 |
706d |
6f861765464f
fs: Block writes to mounted block devices
|
|
KASAN: use-after-free Read in set_de_name_and_namelen
fs
|
19 |
C |
error |
done |
15 |
754d |
1155d
|
25/29 |
710d |
6f861765464f
fs: Block writes to mounted block devices
|
|
BUG: unable to handle kernel NULL pointer dereference in reiserfs_find_entry
fs
|
19 |
C |
error |
done |
25 |
756d |
1193d
|
25/29 |
721d |
6f861765464f
fs: Block writes to mounted block devices
|
|
KASAN: use-after-free Read in reiserfs_get_unused_objectid
fs
|
19 |
C |
inconclusive |
done |
3 |
758d |
1031d
|
25/29 |
722d |
6f861765464f
fs: Block writes to mounted block devices
|
|
possible deadlock in chown_common
fs
|
4 |
C |
error |
done |
22 |
731d |
1201d
|
25/29 |
723d |
6f861765464f
fs: Block writes to mounted block devices
|
|
kernel BUG in balance_leaf
fs
|
-1 |
C |
error |
done |
16 |
763d |
1115d
|
25/29 |
723d |
6f861765464f
fs: Block writes to mounted block devices
|
|
possible deadlock in pipe_write
fs
|
4 |
C |
inconclusive |
|
181 |
726d |
1404d
|
25/29 |
723d |
055ca8355991
fs/pipe: Fix lockdep false-positive in watchqueue pipe_write()
|
|
kernel BUG in direntry_check_right
fs
|
-1 |
C |
done |
done |
2 |
762d |
805d
|
25/29 |
723d |
6f861765464f
fs: Block writes to mounted block devices
|
|
KASAN: slab-out-of-bounds Read in search_by_key (2)
fs
|
17 |
C |
|
|
4435 |
745d |
1176d
|
25/29 |
723d |
dd8f87f21dc3
reiserfs: fix uninit-value in comp_keys
|
|
INFO: trying to register non-static key in debugfs_file_get
fs
|
-1 |
|
|
|
289 |
764d |
763d
|
25/29 |
731d |
88ac06a9f938
Revert "debugfs: annotate debugfs handlers vs. removal with lockdep"
|
|
WARNING in debugfs_file_get
fs
|
-1 |
|
|
|
239 |
764d |
782d
|
25/29 |
731d |
88ac06a9f938
Revert "debugfs: annotate debugfs handlers vs. removal with lockdep"
|
|
WARNING in pagemap_scan_pmd_entry
fs
|
-1 |
C |
inconclusive |
|
48 |
777d |
799d
|
25/29 |
733d |
0dff1b407def
mm/pagemap: fix ioctl(PAGEMAP_SCAN) on vma check
|
|
WARNING in page_copy_sane
mm
fs
|
-1 |
C |
done |
|
3 |
862d |
858d
|
25/29 |
764d |
a08c7193e4f1
mm/filemap: remove hugetlb special casing in filemap.c
|
|
INFO: rcu detected stall in statfs
fs
|
1 |
|
|
|
1 |
894d |
894d
|
23/29 |
833d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
|
possible deadlock in inode_add_bytes
fs
|
4 |
C |
done |
|
124 |
921d |
920d
|
23/29 |
833d |
509f006932de
shmem: fix quota lock nesting in huge hole handling
|
|
INFO: task hung in pipe_release (4)
fs
|
1 |
C |
done |
|
51 |
926d |
926d
|
23/29 |
833d |
0f71c9caf267
udp: Fix __ip_append_data()'s handling of MSG_SPLICE_PAGES
|
|
KASAN: slab-use-after-free Read in test_bdev_super_fc
fs
|
19 |
C |
done |
|
7 |
900d |
903d
|
23/29 |
833d |
aca740cecbe5
fs: open block device after superblock creation
|
|
KMSAN: uninit-value in reiserfs_security_init
fs
|
7 |
|
|
|
4169 |
928d |
988d
|
23/29 |
847d |
d031f4e8b493
reiserfs: Initialize sec->length in reiserfs_security_init().
|
|
general protection fault in splice_to_socket
fs
|
2 |
C |
done |
|
4 |
953d |
956d
|
23/29 |
847d |
ca2d49f77ce4
splice, net: Fix splice_to_socket() to handle pipe bufs larger than a page
|
|
KASAN: null-ptr-deref Write in get_block (2)
fs
|
12 |
C |
error |
|
11 |
942d |
976d
|
23/29 |
847d |
ea2b62f30589
fs/sysv: Null check to prevent null-ptr-deref bug
|
|
KCSAN: data-race in inotify_handle_inode_event / inotify_remove_from_idr
fs
|
6 |
|
|
|
363 |
991d |
1005d
|
22/29 |
936d |
c915d8f5918b
inotify: Avoid reporting event with invalid wd
|
|
possible deadlock in do_writepages
fs
mm
|
4 |
|
|
|
15 |
1002d |
1005d
|
22/29 |
936d |
00d873c17e29
ext4: avoid deadlock in fs reclaim with page writeback
|
|
KASAN: null-ptr-deref Read in ida_free (3)
fs
|
11 |
C |
error |
|
4 |
1034d |
1030d
|
22/29 |
959d |
cb2239c198ad
fs: drop peer group ids under namespace lock
|
|
KMSAN: uninit-value in ondemand_readahead
fs
mm
|
7 |
C |
|
|
221 |
1057d |
1221d
|
22/29 |
959d |
3e35102666f8
fs/cramfs/inode.c: initialize file_ra_state
|
|
INFO: task hung in write_cache_pages (2)
mm
fs
|
1 |
C |
done |
|
36 |
987d |
1058d
|
22/29 |
959d |
fb3592c41a44
migrate_pages: fix deadlock in batched migration
|
|
KMSAN: uninit-value in vfs_write
fs
|
7 |
C |
|
|
3 |
1083d |
1053d
|
22/29 |
959d |
2b4c99f7d9a5
can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write
|
|
KASAN: use-after-free Read in mas_next_nentry
mm
fs
|
19 |
C |
error |
done |
343 |
1172d |
1366d
|
22/29 |
1063d |
59f2f4b8a757
fs/userfaultfd: Fix maple tree iterator in userfaultfd_unregister()
|
|
linux-next boot error: kernel BUG in putname
fs
|
-1 |
|
|
|
1 |
1256d |
1256d
|
22/29 |
1063d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
|
kernel panic: corrupted stack end in tun_chr_close
fs
|
2 |
|
|
|
1 |
1355d |
1355d
|
22/29 |
1063d |
b81d591386c3
riscv: Increase stack size under KASAN
|
|
INFO: rcu detected stall in sys_lsetxattr
fs
|
1 |
C |
done |
|
2 |
1375d |
1374d
|
22/29 |
1063d |
0014edaedfd8
fs: unset MNT_WRITE_HOLD on failure
|
|
upstream boot error: general protection fault in __proc_create
fs
|
-1 |
|
|
|
1 |
1258d |
1258d
|
22/29 |
1063d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
|
INFO: rcu detected stall in sys_setxattr (2)
fs
|
1 |
C |
done |
|
3 |
1375d |
1374d
|
22/29 |
1063d |
0014edaedfd8
fs: unset MNT_WRITE_HOLD on failure
|
|
general protection fault in __dentry_path (2)
fs
|
8 |
C |
error |
|
174 |
1368d |
1379d
|
22/29 |
1063d |
5c697c367a66
KVM: Initialize debugfs_dentry when a VM is created to avoid NULL deref
|
|
WARNING in mntput_no_expire (3)
fs
|
-1 |
C |
inconclusive |
|
29 |
1113d |
1529d
|
22/29 |
1063d |
a91714312eb1
percpu_ref_init(): clean ->percpu_count_ref on failure
|
|
kernel panic: stack is corrupted in ksys_write
fs
|
2 |
|
|
|
1 |
1237d |
1233d
|
22/29 |
1063d |
b81d591386c3
riscv: Increase stack size under KASAN
|
|
KASAN: slab-out-of-bounds Read in __fscache_acquire_volume
fs
mm
|
17 |
C |
done |
done |
1 |
1243d |
1242d
|
22/29 |
1063d |
9f0933ac026f
fscache: fix OOB Read in __fscache_acquire_volume
|
|
KASAN: use-after-free Read in do_sync_mmap_readahead
fs
mm
|
19 |
|
|
|
1 |
1342d |
1338d
|
22/29 |
1063d |
dcfa24ba6899
filemap: Cache the value of vm_flags
|
|
usb-testing boot error: general protection fault in rcu_core
fs
mm
|
-1 |
|
|
|
23 |
1237d |
1256d
|
22/29 |
1063d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
|
KASAN: null-ptr-deref Write in io_file_get_normal
io-uring
fs
|
12 |
C |
done |
|
107 |
1309d |
1393d
|
22/29 |
1063d |
d5361233e9ab
io_uring: drop the old style inflight file tracking
|
|
usb-testing boot error: BUG: unable to handle kernel paging request in insert_header
fs
|
-1 |
|
|
|
1 |
1242d |
1242d
|
22/29 |
1063d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
|
memory leak in iovec_from_user
fs
io-uring
|
3 |
C |
|
|
1 |
1381d |
1377d
|
22/29 |
1063d |
323b190ba2de
io_uring: free iovec if file assignment fails
|
|
KCSAN: data-race in do_epoll_wait / do_epoll_wait
fs
|
6 |
|
|
|
83 |
1339d |
1548d
|
22/29 |
1063d |
d679ae94fdd5
list: fix a data-race around ep->rdllist
|
|
usb-testing boot error: general protection fault in __register_sysctl_table (2)
fs
|
-1 |
|
|
|
1 |
1241d |
1241d
|
22/29 |
1063d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
|
BUG: unable to handle kernel paging request in truncate_inode_partial_folio
mm
fs
|
8 |
C |
error |
|
4 |
1265d |
1304d
|
22/29 |
1063d |
84ac013046cc
secretmem: fix unhandled fault in truncate
|
|
kernel BUG in ntfs_read_inode_mount
fs
|
-1 |
|
|
|
1 |
1467d |
1467d
|
22/29 |
1063d |
714fbf2647b1
ntfs: add sanity check on allocation size
|
|
kernel panic: corrupted stack end in lo_ioctl
mm
fs
|
2 |
|
|
|
4 |
1070d |
1192d
|
22/29 |
1063d |
b81d591386c3
riscv: Increase stack size under KASAN
|
|
general protection fault in legacy_parse_param
fs
|
23 |
C |
done |
|
20 |
1403d |
1665d
|
22/29 |
1063d |
ecff30575b5a
LSM: general protection fault in legacy_parse_param
|
|
KASAN: use-after-free Read in io_rsrc_node_ref_zero
fs
|
19 |
C |
done |
|
3 |
1432d |
1431d
|
22/29 |
1063d |
80912cef18f1
io_uring: disallow modification of rsrc_data during quiesce
|
|
KASAN: use-after-free Read in add_wait_queue
fs
io-uring
|
19 |
C |
done |
done |
13 |
1396d |
1403d
|
22/29 |
1063d |
d89a4fac0fbc
io_uring: fix assuming triggered poll waitqueue is the single poll
|
|
BUG: unable to handle kernel NULL pointer dereference in io_do_iopoll
fs
io-uring
|
10 |
C |
done |
|
3 |
1347d |
1346d
|
22/29 |
1063d |
aa184e8671f0
io_uring: don't attempt to IOPOLL for MSG_RING requests
|
|
possible deadlock in snd_hrtimer_callback (2)
fs
|
4 |
C |
inconclusive |
|
582 |
1268d |
1534d
|
22/29 |
1063d |
96b097091c66
ALSA: pcm: Use deferred fasync helper
95cc637c1afd
ALSA: timer: Use deferred fasync helper
|
|
BUG: unable to handle kernel paging request in eventfd_ctx_put
fs
|
8 |
C |
done |
|
7 |
1188d |
1217d
|
22/29 |
1063d |
7353633814f6
KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()
|
|
KMSAN: uninit-value in tomoyo_path_chown
fs
|
7 |
C |
|
|
13763 |
1221d |
1222d
|
22/29 |
1063d |
f52d74b190f8
open: always initialize ownership fields
|
|
KASAN: use-after-free Read in filp_close
io-uring
fs
|
19 |
C |
done |
|
17 |
1105d |
1334d
|
22/29 |
1063d |
40a1926022d1
fix the breakage in close_fd_get_file() calling conventions change
|
|
usb-testing boot error: kernel BUG in putname
fs
|
-1 |
|
|
|
1 |
1241d |
1241d
|
22/29 |
1063d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
|
KASAN: use-after-free Read in mas_next_entry
fs
mm
|
19 |
C |
error |
|
16 |
1174d |
1188d
|
22/29 |
1063d |
59f2f4b8a757
fs/userfaultfd: Fix maple tree iterator in userfaultfd_unregister()
|
|
UBSAN: array-index-out-of-bounds in io_submit_sqes
fs
|
15 |
|
|
|
4 |
1332d |
1333d
|
22/29 |
1063d |
fcde59feb1af
io_uring: add io_op_defs 'def' pointer in req init and issue
|
|
kernel panic: corrupted stack end in loop_control_ioctl
fs
|
2 |
|
|
|
2 |
1185d |
1270d
|
22/29 |
1063d |
b81d591386c3
riscv: Increase stack size under KASAN
|
|
possible deadlock in snd_timer_notify (2)
fs
|
4 |
|
|
|
151 |
1268d |
1532d
|
22/29 |
1063d |
95cc637c1afd
ALSA: timer: Use deferred fasync helper
|
|
WARNING: still has locks held in io_ring_submit_lock
fs
io-uring
|
4 |
C |
done |
|
3 |
1348d |
1348d
|
22/29 |
1063d |
e7637a492b9f
io_uring: fix locking state for empty buffer group
|
|
KCSAN: data-race in call_rcu / rcu_gp_kthread
fs
|
6 |
|
|
|
1 |
1655d |
1655d
|
20/29 |
1416d |
2431774f04d1
rcu: Mark accesses to rcu_state.n_force_qs
|
|
general protection fault in io_uring_register
io-uring
fs
|
2 |
syz |
done |
|
1 |
1596d |
1592d
|
20/29 |
1416d |
41d3a6bd1d37
io_uring: pin SQPOLL data before unlocking ring lock
|
|
KASAN: use-after-free Write in io_queue_worker_create
fs
io-uring
|
24 |
C |
unreliable |
|
132 |
1499d |
1509d
|
20/29 |
1416d |
71a85387546e
io-wq: check for wq exit after adding new worker task_work
e47498afeca9
io-wq: remove spurious bit clear on task_work addition
|
|
possible deadlock in io_flush_timeouts
fs
|
4 |
|
|
|
5 |
1517d |
1519d
|
20/29 |
1416d |
6af3f48bf615
io_uring: fix link traversal locking
|
|
INFO: task hung in io_uring_del_tctx_node
io-uring
fs
|
1 |
C |
unreliable |
|
37 |
1418d |
1582d
|
20/29 |
1416d |
8bab4c09f24e
io_uring: allow conditional reschedule for intensive iterators
|
|
KASAN: use-after-free Write in io_submit_one
fs
|
24 |
C |
done |
|
11 |
1503d |
1541d
|
20/29 |
1416d |
75feae73a280
block: fix single bio async DIO error handling
|
|
KCSAN: data-race in call_rcu / rcu_gp_fqs_loop
fs
|
6 |
|
|
|
1 |
1553d |
1551d
|
20/29 |
1416d |
2431774f04d1
rcu: Mark accesses to rcu_state.n_force_qs
|
|
inconsistent lock state in io_poll_remove_all
fs
|
4 |
|
|
|
63 |
1517d |
1519d
|
20/29 |
1416d |
6af3f48bf615
io_uring: fix link traversal locking
|
|
WARNING in inc_nlink (2)
fs
|
-1 |
C |
inconclusive |
done |
21 |
1417d |
1754d
|
20/29 |
1416d |
97f044f690ba
fuse: don't increment nlink in link()
|
|
possible deadlock in io_worker_cancel_cb
fs
io-uring
|
4 |
C |
done |
|
9 |
1497d |
1502d
|
20/29 |
1416d |
d800c65c2d4e
io-wq: drop wqe lock before creating new worker
|
|
INFO: task hung in io_uring_try_cancel_requests
fs
io-uring
|
1 |
C |
error |
|
41 |
1506d |
1548d
|
20/29 |
1416d |
f75d118349be
io_uring: harder fdinfo sq/cq ring iterating
|
|
WARNING in io_try_cancel_userdata (2)
fs
|
-1 |
|
|
|
1 |
1523d |
1519d
|
20/29 |
1416d |
617a89484deb
io_uring: fail cancellation for EXITING tasks
|
|
WARNING in signalfd_cleanup
fs
io-uring
|
-1 |
C |
done |
|
201 |
1463d |
1478d
|
20/29 |
1416d |
791f3465c4af
io_uring: fix UAF due to missing POLLFREE handling
|
|
INFO: rcu detected stall in newstat
fs
usb
|
1 |
C |
unreliable |
done |
4 |
1511d |
1634d
|
20/29 |
1416d |
476db72e5219
media: mceusb: return without resubmitting URB in case of -EPROTO error.
|
|
INFO: task hung in io_uring_cancel_generic (2)
io-uring
fs
|
1 |
C |
done |
|
97 |
1500d |
1527d
|
20/29 |
1416d |
78a780602075
io_uring: ensure task_work gets run as part of cancelations
|
|
INFO: rcu detected stall in io_wqe_worker (2)
fs
io-uring
|
1 |
C |
done |
|
2 |
1549d |
1549d
|
20/29 |
1416d |
c5e0321e43de
Revert "devlink: Remove not-executed trap policer notifications"
|
|
possible deadlock in io_poll_double_wake (3)
io-uring
fs
|
4 |
C |
error |
done |
703 |
1472d |
1745d
|
20/29 |
1416d |
aa43477b0402
io_uring: poll rework
|
|
INFO: task hung in io_wqe_worker
fs
io-uring
|
1 |
C |
unreliable |
|
3 |
1558d |
1554d
|
20/29 |
1416d |
1d5f5ea7cb7d
io-wq: remove worker to owner tw dependency
|
|
KASAN: null-ptr-deref Read in filp_close (2)
fs
|
19 |
C |
|
|
3 |
1655d |
1764d
|
20/29 |
1534d |
3b0462726e7e
cgroup: verify that source is a string
9b5b872215fe
file: fix close_range() for unshare+cloexec
|
|
WARNING in io_sq_thread_park
fs
|
-1 |
|
|
|
1 |
1767d |
1767d
|
20/29 |
1535d |
a185f1db59f1
io_uring: do ctx sqd ejection in a clear context
|
|
possible deadlock in snd_timer_notify
fs
|
4 |
|
|
|
119 |
1537d |
1643d
|
20/29 |
1535d |
f671a691e299
fcntl: fix potential deadlocks for &fown_struct.lock
|
|
memory leak in io_sqe_buffers_register
fs
|
3 |
C |
|
|
2 |
1728d |
1729d
|
20/29 |
1535d |
bb6659cc0ad3
io_uring: Fix memory leak in io_sqe_buffers_register()
|
|
WARNING in io_link_timeout_fn
fs
io-uring
|
-1 |
C |
done |
|
2 |
1716d |
1716d
|
20/29 |
1535d |
447c19f3b507
io_uring: fix ltout double free on completion race
|
|
KASAN: out-of-bounds Read in leaf_paste_entries
fs
|
17 |
C |
inconclusive |
|
8 |
1567d |
1798d
|
20/29 |
1535d |
13d257503c09
reiserfs: check directory items on read from disk
|
|
upstream boot error: kernel panic: VFS: Unable to mount root fs on unknown-block(0,0)
fs
|
-1 |
|
|
|
235 |
1657d |
1665d
|
20/29 |
1535d |
c43ddbf97f46
scsi: virtio_scsi: Do not overwrite SCSI status
|
|
WARNING: suspicious RCU usage in count (2)
fs
mm
|
4 |
|
|
|
1 |
1707d |
1707d
|
20/29 |
1535d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
|
general protection fault in io_commit_cqring (2)
fs
io-uring
|
12 |
C |
done |
|
82 |
1747d |
1761d
|
20/29 |
1535d |
51520426f4bc
io_uring: handle setup-failed ctx in kill_timeouts
|
|
INFO: task hung in io_sq_thread_park (2)
fs
io-uring
|
1 |
syz |
done |
|
2 |
1657d |
1653d
|
20/29 |
1535d |
46fee9ab02cb
io_uring: remove double poll entry on arm failure
|
|
KCSAN: data-race in __io_uring_cancel / io_uring_try_cancel_requests
fs
|
6 |
|
|
|
3 |
1700d |
1702d
|
20/29 |
1535d |
b16ef427adf3
io_uring: fix data race to avoid potential NULL-deref
|
|
WARNING in __percpu_ref_exit (2)
fs
|
-1 |
C |
error |
done |
31 |
1536d |
1775d
|
20/29 |
1535d |
a298232ee6b9
io_uring: fix link timeout refs
|
|
INFO: task hung in __io_uring_cancel
fs
io-uring
|
1 |
C |
done |
|
5 |
1673d |
1739d
|
20/29 |
1535d |
28090c133869
io_uring: fix work_exit sqpoll cancellations
|
|
possible deadlock in _snd_pcm_stream_lock_irqsave (2)
fs
|
4 |
|
|
|
120 |
1536d |
1643d
|
20/29 |
1535d |
f671a691e299
fcntl: fix potential deadlocks for &fown_struct.lock
|
|
memory leak in create_io_worker
io-uring
fs
|
3 |
C |
|
|
5 |
1558d |
1597d
|
20/29 |
1535d |
66e70be72288
io-wq: fix memory leak in create_io_worker()
|
|
WARNING in io_wqe_enqueue
io-uring
fs
|
-1 |
C |
done |
|
13 |
1694d |
1694d
|
20/29 |
1535d |
e6ab8991c5d0
io_uring: fix false WARN_ONCE
|
|
usb-testing boot error: kernel panic: VFS: Unable to mount root fs on unknown-block(0,0)
fs
|
-1 |
|
|
|
27 |
1656d |
1661d
|
20/29 |
1535d |
c43ddbf97f46
scsi: virtio_scsi: Do not overwrite SCSI status
|
|
possible deadlock in snd_pcm_period_elapsed (2)
fs
|
4 |
|
|
|
52 |
1536d |
1643d
|
20/29 |
1535d |
f671a691e299
fcntl: fix potential deadlocks for &fown_struct.lock
|
|
WARNING in io_poll_double_wake
fs
io-uring
|
-1 |
C |
done |
done |
1124 |
1637d |
1738d
|
20/29 |
1535d |
a890d01e4ee0
io_uring: fix poll requests leaking second poll entries
|
|
general protection fault in cdev_del (2)
fs
|
11 |
C |
error |
|
45 |
1669d |
1947d
|
20/29 |
1535d |
8a12f8836145
net: hso: fix null-ptr-deref during tty device unregistration
0a360e8b65d6
tty: n_gsm: check error while registering tty devices
|
|
INFO: task hung in io_wq_put_and_exit
io-uring
fs
|
1 |
C |
unreliable |
|
628 |
1536d |
1597d
|
20/29 |
1535d |
3b33e3f4a6c0
io-wq: fix silly logic error in io_task_work_match()
|
|
possible deadlock in do_fcntl
usb
fs
|
4 |
C |
done |
|
245 |
1611d |
1943d
|
20/29 |
1535d |
f671a691e299
fcntl: fix potential deadlocks for &fown_struct.lock
|
|
WARNING: suspicious RCU usage in kernel_execve
mm
fs
|
4 |
|
|
|
1 |
1672d |
1672d
|
20/29 |
1535d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
|
WARNING: refcount bug in __io_queue_sqe
fs
|
13 |
|
|
|
1 |
1737d |
1728d
|
20/29 |
1535d |
a298232ee6b9
io_uring: fix link timeout refs
|
|
BUG: unable to handle kernel NULL pointer dereference in kiocb_done
fs
io-uring
|
10 |
C |
unreliable |
done |
3 |
1603d |
1602d
|
20/29 |
1535d |
b8ce1b9d25cc
io_uring: don't submit half-prepared drain request
|
|
possible deadlock in io_uring_register
fs
|
4 |
|
|
|
16 |
1595d |
1597d
|
20/29 |
1535d |
009ad9f0c6ee
io_uring: drop ctx->uring_lock before acquiring sqd->lock
|
|
WARNING in io_try_cancel_userdata
fs
io-uring
|
-1 |
syz |
unreliable |
|
4 |
1610d |
1614d
|
20/29 |
1535d |
dadebc350da2
io_uring: fix io_try_cancel_userdata race for iowq
|
|
KMSAN: kernel-infoleak in copy_page_to_iter (2)
mm
fs
|
9 |
C |
|
|
2099 |
1630d |
2689d
|
20/29 |
1535d |
ce3aba43599f
ext4: fix kernel infoleak via ext4_extent_header
|
|
KASAN: use-after-free Read in io_worker_handle_work
fs
|
19 |
|
|
|
2 |
1679d |
1710d
|
20/29 |
1535d |
3743c1723bfc
io-wq: Fix UAF when wakeup wqe in hash waitqueue
|
|
WARNING: suspicious RCU usage in proc_alloc_inode
fs
|
4 |
|
|
|
1 |
1677d |
1677d
|
20/29 |
1535d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
|
WARNING in mntput_no_expire (2)
fs
|
-1 |
C |
done |
|
68 |
1543d |
1758d
|
20/29 |
1535d |
7d01ef7585c0
Make sure nd->path.mnt and nd->path.dentry are always valid pointers
|
|
WARNING: suspicious RCU usage in __fput
fs
|
4 |
|
|
|
1 |
1703d |
1703d
|
20/29 |
1535d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
|
general protection fault in __io_file_supports_nowait
fs
io-uring
|
2 |
C |
done |
done |
13 |
1600d |
1605d
|
20/29 |
1535d |
c6d3d9cbd659
io_uring: fix queueing half-created requests
|
|
KASAN: use-after-free Read in bdev_evict_inode
fs
|
19 |
C |
unreliable |
|
1305 |
1619d |
1623d
|
20/29 |
1535d |
889c05cc5834
block: ensure the bdi is freed after inode_detach_wb
|
|
WARNING in pvr2_i2c_core_done
usb
fs
|
-1 |
C |
error |
|
5780 |
1656d |
2311d
|
20/29 |
1535d |
f8194e5e63fd
media: pvrusb2: fix warning in pvr2_i2c_core_done
|
|
INFO: task hung in io_uring_cancel_generic
io-uring
fs
|
1 |
C |
unreliable |
|
151 |
1535d |
1657d
|
20/29 |
1535d |
1b48773f9fd0
io_uring: fix io_drain_req()
|
|
WARNING: suspicious RCU usage in getname_flags
fs
|
4 |
|
|
|
2 |
1664d |
1755d
|
20/29 |
1535d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
|
KASAN: use-after-free Read in __d_alloc (2)
fs
|
19 |
C |
unreliable |
|
6774 |
1577d |
1621d
|
20/29 |
1535d |
0766ec82e5fb
namei: Fix use after free in kern_path_locked
|
|
possible deadlock in f_getown
fs
|
4 |
C |
done |
done |
164 |
1613d |
1943d
|
20/29 |
1535d |
f671a691e299
fcntl: fix potential deadlocks for &fown_struct.lock
|
|
possible deadlock in snd_hrtimer_callback
fs
|
4 |
C |
done |
|
571 |
1536d |
1643d
|
20/29 |
1535d |
f671a691e299
fcntl: fix potential deadlocks for &fown_struct.lock
|
|
possible deadlock in io_sq_thread_finish
fs
|
4 |
C |
unreliable |
done |
4 |
1780d |
1783d
|
20/29 |
1535d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
|
WARNING: suspicious RCU usage in __alloc_file
fs
|
4 |
|
|
|
1 |
1723d |
1723d
|
20/29 |
1535d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
|
WARNING in io_rsrc_node_switch
io-uring
fs
|
-1 |
C |
done |
|
174 |
1720d |
1730d
|
20/29 |
1535d |
47b228ce6f66
io_uring: fix unchecked error in switch_start()
|
|
WARNING in io_wq_submit_work (2)
io-uring
fs
|
-1 |
C |
done |
done |
52 |
1594d |
1597d
|
20/29 |
1535d |
713b9825a4c4
io-wq: fix cancellation on create-worker failure
|
|
KASAN: null-ptr-deref Write in io_uring_cancel_sqpoll
fs
|
12 |
|
|
|
170 |
1537d |
1792d
|
20/29 |
1535d |
6d042ffb598e
io_uring: Check current->io_uring in io_uring_cancel_sqpoll
|
|
KASAN: stack-out-of-bounds Read in iov_iter_revert
fs
io-uring
|
17 |
C |
error |
|
14 |
1608d |
1624d
|
20/29 |
1535d |
89c2b3b74918
io_uring: reexpand under-reexpanded iters
|
|
WARNING in internal_create_group
fs
|
-1 |
C |
inconclusive |
|
20 |
1600d |
1653d
|
20/29 |
1535d |
b1a811633f73
block: nbd: add sanity check for first_minor
|
|
kernel BUG in remove_inode_hugepages
fs
mm
|
-1 |
C |
unreliable |
|
3 |
1620d |
1620d
|
20/29 |
1535d |
c7b1850dfb41
hugetlb: don't pass page cache pages to restore_reserve_on_error
|
|
WARNING in io_wq_put
fs
io-uring
|
-1 |
C |
unreliable |
|
3 |
1769d |
1780d
|
20/29 |
1535d |
f5d2d23bf0d9
io-wq: fix race around pending work on teardown
|
|
WARNING in io_uring_setup (2)
fs
io-uring
|
-1 |
C |
done |
|
40 |
1720d |
1729d
|
20/29 |
1535d |
47b228ce6f66
io_uring: fix unchecked error in switch_start()
|
|
INFO: task can't die in d_alloc_parallel
fs
|
1 |
|
|
|
2 |
1844d |
1860d
|
20/29 |
1698d |
0ce20dd84089
mm: add Kernel Electric-Fence infrastructure
|
|
KASAN: use-after-free Read in idr_for_each (2)
io-uring
fs
|
19 |
C |
error |
done |
86 |
1773d |
1936d
|
20/29 |
1739d |
61cf93700fe6
io_uring: Convert personality_idr to XArray
|
|
INFO: task hung in io_uring_cancel_task_requests
io-uring
fs
|
1 |
C |
|
|
305 |
1773d |
1808d
|
20/29 |
1749d |
34343786ecc5
io_uring: unpark SQPOLL thread for cancelation
|
|
KASAN: use-after-free Read in tctx_task_work
fs
|
19 |
|
|
|
2 |
1792d |
1790d
|
20/29 |
1749d |
2c32395d8111
io_uring: fix __tctx_task_work() ctx race
|
|
KASAN: invalid-free in io_req_caches_free
fs
|
22 |
|
|
|
5 |
1793d |
1796d
|
20/29 |
1749d |
8e5c66c485a8
io_uring: clear request count when freeing caches
|
|
INFO: task hung in io_sq_thread_park
fs
io-uring
|
1 |
C |
unreliable |
|
263 |
1784d |
1789d
|
20/29 |
1749d |
3ebba796fa25
io_uring: ensure that SQPOLL thread is started for exit
|
|
memory leak in io_submit_sqes (2)
fs
io-uring
|
3 |
C |
|
|
1 |
1787d |
1786d
|
20/29 |
1749d |
f01272541d2c
io-wq: ensure all pending work is canceled on exit
|
|
possible deadlock in io_poll_double_wake (2)
io-uring
fs
|
4 |
C |
error |
error |
431 |
1749d |
1942d
|
20/29 |
1749d |
1c3b3e6527e5
io_uring: ignore double poll add on the same waitqueue head
|
|
inconsistent lock state in io_dismantle_req
fs
io-uring
|
4 |
C |
|
|
2 |
1817d |
1817d
|
20/29 |
1749d |
9ae1f8dd372e
io_uring: fix inconsistent lock state
|
|
general protection fault in io_sqe_files_unregister
fs
|
2 |
|
|
|
2 |
1841d |
1840d
|
19/29 |
1780d |
3e2224c5867f
io_uring: Fix return value from alloc_fixed_file_ref_node
|
|
kernel BUG at mm/page-writeback.c:LINE!
fs
mm
|
-1 |
|
|
|
1 |
1849d |
1845d
|
19/29 |
1780d |
c2407cf7d22d
mm: make wait_on_page_writeback() wait for multiple pending writebacks
|
|
WARNING in io_uring_flush
fs
io-uring
|
-1 |
C |
unreliable |
|
10 |
1824d |
1833d
|
19/29 |
1780d |
4325cb498cb7
io_uring: fix uring_flush in exit_files() warning
|
|
KASAN: use-after-free Read in search_by_entry_key
fs
|
19 |
C |
done |
|
3 |
1929d |
1932d
|
19/29 |
1780d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
WARNING in percpu_ref_kill_and_confirm (2)
fs
|
-1 |
C |
done |
|
71 |
1855d |
1863d
|
19/29 |
1780d |
9faadcc8abe4
io_uring: fix double io_uring free
|
|
WARNING in io_ring_ctx_wait_and_kill
fs
|
-1 |
C |
done |
|
9 |
1834d |
1836d
|
19/29 |
1780d |
06585c497b55
io_uring: do sqo disable on install_fd error
|
|
INFO: task hung in __io_uring_files_cancel
io-uring
fs
|
1 |
C |
done |
|
30 |
1821d |
1888d
|
19/29 |
1780d |
bee749b187ac
io_uring: fix files cancellation
|
|
KASAN: use-after-free Read in reiserfs_fill_super
fs
|
19 |
C |
error |
done |
2 |
1874d |
1873d
|
19/29 |
1780d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
BUG: unable to handle kernel paging request in percpu_ref_exit
fs
|
8 |
C |
done |
|
3 |
1841d |
1839d
|
19/29 |
1780d |
3e2224c5867f
io_uring: Fix return value from alloc_fixed_file_ref_node
|
|
INFO: task can't die in io_sq_thread_stop
fs
|
1 |
|
|
|
1 |
1899d |
1895d
|
19/29 |
1780d |
65b2b213484a
io_uring: check kthread stopped flag when sq thread is unparked
|
|
general protection fault in io_disable_sqo_submit
fs
io-uring
|
2 |
C |
done |
|
124 |
1832d |
1836d
|
19/29 |
1780d |
b4411616c26f
io_uring: fix null-deref in io_disable_sqo_submit
|
|
WARNING in io_uring_cancel_task_requests
io-uring
fs
|
-1 |
syz |
done |
|
69 |
1817d |
1820d
|
19/29 |
1780d |
70b2c60d3797
io_uring: fix sqo ownership false positive warning
|
|
inconsistent lock state in io_file_data_ref_zero
fs
|
4 |
C |
done |
|
7152 |
1863d |
1887d
|
19/29 |
1780d |
ac0648a56c1f
io_uring: use bottom half safe lock for fixed file data
|
|
BUG: corrupted list in io_file_get
fs
io-uring
|
8 |
C |
done |
|
3 |
1820d |
1820d
|
19/29 |
1780d |
f609cbb8911e
io_uring: fix list corruption for splice file_get
|
|
WARNING in io_wq_submit_work
fs
|
-1 |
|
|
|
4 |
1827d |
1832d
|
19/29 |
1780d |
ca70f00bed6c
io_uring: fix cancellation taking mutex while TASK_UNINTERRUPTIBLE
|
|
possible deadlock in send_sigio (2)
fs
|
4 |
C |
done |
done |
40 |
1849d |
1962d
|
19/29 |
1780d |
8d1ddb5e7937
fcntl: Fix potential deadlock in send_sig{io, urg}()
|
|
kernel BUG at fs/reiserfs/prints.c:LINE!
fs
|
-1 |
C |
done |
done |
5 |
1871d |
1949d
|
19/29 |
1780d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
memory leak in generic_parse_monolithic
fs
|
3 |
C |
|
|
11 |
1871d |
1896d
|
19/29 |
1780d |
4cb682964706
afs: Fix memory leak when mounting with multiple source parameters
|
|
KASAN: slab-out-of-bounds Write in record_print_text
fs
|
23 |
C |
done |
unreliable |
17 |
1821d |
1823d
|
19/29 |
1780d |
08d60e599954
printk: fix string termination for record_print_text()
|
|
BUG: unable to handle kernel NULL pointer dereference in __lookup_slow
fs
|
10 |
C |
inconclusive |
done |
3 |
1802d |
1943d
|
19/29 |
1780d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
possible deadlock in send_sigurg (2)
fs
|
4 |
C |
done |
|
25 |
1867d |
1918d
|
19/29 |
1780d |
8d1ddb5e7937
fcntl: Fix potential deadlock in send_sig{io, urg}()
|
|
possible deadlock in proc_pid_syscall (2)
fs
|
4 |
|
|
|
2 |
1964d |
1974d
|
19/29 |
1780d |
f7cfd871ae0c
exec: Transform exec_update_mutex into a rw_semaphore
78af4dc949da
perf: Break deadlock involving exec_update_mutex
|
|
WARNING in io_disable_sqo_submit
fs
|
-1 |
C |
done |
|
9 |
1825d |
1833d
|
19/29 |
1780d |
6b393a1ff174
io_uring: fix false positive sqo warning on flush
|
|
KASAN: null-ptr-deref Read in filp_close
fs
|
11 |
C |
done |
|
9 |
1860d |
1862d
|
19/29 |
1780d |
fec8a6a69103
close_range: unshare all fds for CLOSE_RANGE_UNSHARE | CLOSE_RANGE_CLOEXEC
6abc20f8f879
selftests/core: add regression test for CLOSE_RANGE_UNSHARE | CLOSE_RANGE_CLOEXEC
|
|
possible deadlock in io_timeout_fn (2)
fs
|
4 |
|
|
|
4 |
1842d |
1848d
|
19/29 |
1780d |
4aa84f2ffa81
io_uring: dont kill fasync under completion_lock
|
|
KASAN: null-ptr-deref Write in kthread_use_mm
fs
io-uring
|
12 |
C |
done |
|
2 |
1908d |
1908d
|
15/29 |
1889d |
4b70cf9dea4c
io_uring: ensure consistent view of original task ->mm from SQPOLL
|
|
general protection fault in io_uring_show_cred
fs
|
2 |
C |
done |
|
4 |
1905d |
1904d
|
15/29 |
1889d |
6b47ab81c9a9
io_uring: use correct pointer for io_uring_show_cred()
|
|
KASAN: use-after-free Write in io_submit_sqes
fs
io-uring
|
24 |
C |
error |
|
2 |
1907d |
1906d
|
15/29 |
1889d |
cb8a8ae31074
io_uring: drop req/tctx io_identity separately
|
|
INFO: task can't die in corrupted
fs
|
1 |
C |
done |
|
4 |
1907d |
1934d
|
15/29 |
1894d |
86f33603f8c5
f2fs: handle errors of f2fs_get_meta_page_nofail
|
|
WARNING in unlock_new_inode
fs
|
-1 |
C |
done |
|
76 |
1931d |
2835d
|
15/29 |
1894d |
8859bf2b1278
reiserfs: only call unlock_new_inode() if I_NEW
|
|
memory leak in reiserfs_parse_options
fs
|
3 |
C |
|
|
4 |
1958d |
2153d
|
15/29 |
1894d |
e9d4709fcc26
reiserfs: Fix memory leak in reiserfs_parse_options()
|
|
general protection fault in percpu_ref_exit
fs
|
2 |
C |
done |
|
3 |
1929d |
1932d
|
15/29 |
1894d |
7ea6bf2e6c40
percpu_ref: don't refer to ref->data if it isn't allocated
|
|
KASAN: use-after-free Read in fscache_alloc_cookie
fs
|
19 |
syz |
done |
|
1 |
1946d |
1946d
|
15/29 |
1894d |
1d0e850a49a5
afs: Fix cell removal
|
|
KASAN: use-after-free Read in io_wqe_worker
fs
io-uring
|
19 |
C |
error |
|
2 |
1943d |
1945d
|
15/29 |
1894d |
c4068bf898dd
io-wq: fix use-after-free in io_wq_worker_running
|
|
WARNING: suspicious RCU usage in io_init_identity
fs
|
4 |
|
|
|
1536 |
1920d |
1925d
|
15/29 |
1894d |
1e6fa5216a0e
io_uring: COW io_identity on mismatch
|
|
inconsistent lock state in xa_destroy
io-uring
fs
|
4 |
C |
|
|
755 |
1932d |
1932d
|
15/29 |
1894d |
ca6484cd308a
io_uring: no need to call xa_destroy() on empty xarray
|
|
INFO: task hung in io_uring_flush
io-uring
fs
|
1 |
C |
done |
done |
11 |
1984d |
1991d
|
15/29 |
1894d |
b7ddce3cbf01
io_uring: fix cancel of deferred reqs with ->files
|
|
general protection fault in open_xa_dir
fs
|
2 |
C |
done |
|
3 |
1929d |
1940d
|
15/29 |
1894d |
c2bb80b8bdd0
reiserfs: Fix oops during mount
|
|
KMSAN: uninit-value in search_by_key
fs
|
7 |
|
|
|
1549 |
1899d |
1950d
|
15/29 |
1894d |
4443390e08d3
reiserfs: Initialize inode keys properly
|
|
KASAN: use-after-free Write in io_wq_worker_running
io-uring
fs
|
24 |
C |
error |
|
14 |
1936d |
1963d
|
15/29 |
1894d |
c4068bf898dd
io-wq: fix use-after-free in io_wq_worker_running
|
|
KMSAN: uninit-value in __fget_light (2)
fs
|
7 |
C |
|
|
18 |
1910d |
1920d
|
15/29 |
1894d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
|
possible deadlock in mnt_want_write
fs
|
4 |
C |
done |
done |
662 |
1933d |
2740d
|
15/29 |
1894d |
146d62e5a586
ovl: detect overlapping layers
|
|
general protection fault in __do_sys_io_uring_register
fs
|
2 |
|
|
|
80 |
1920d |
1927d
|
15/29 |
1894d |
55cbc2564ab2
io_uring: fix error path cleanup in io_sqe_files_register()
|
|
inconsistent lock state in io_uring_add_task_file
fs
|
4 |
|
|
|
1 |
1932d |
1932d
|
15/29 |
1894d |
ce765372bc44
io_uring: Fix use of XArray in __io_uring_files_cancel
|
|
KMSAN: uninit-value in qtree_entry_unused
fs
|
7 |
|
|
|
396 |
1898d |
1950d
|
15/29 |
1894d |
3d3dc274ce73
quota: clear padding in v2r1_mem2diskdqb()
|
|
general protection fault in io_poll_double_wake (2)
io-uring
fs
|
2 |
C |
error |
|
2 |
1944d |
1943d
|
15/29 |
1920d |
8706e04ed7d6
io_uring: always delete double poll wait entry on match
|
|
possible deadlock in io_write
fs
|
4 |
|
|
|
2 |
1940d |
1943d
|
15/29 |
1920d |
fad8e0de4426
io_uring: fix potential ABBA deadlock in ->show_fdinfo()
|
|
memory leak in do_eventfd
fs
|
3 |
C |
|
|
2 |
1978d |
2073d
|
15/29 |
1931d |
f65886606c2d
KVM: fix memory leak in kvm_io_bus_unregister_dev()
|
|
upstream boot error: KASAN: global-out-of-bounds Read in internal_create_group
fs
|
-1 |
|
|
|
273 |
1977d |
1990d
|
15/29 |
1946d |
62c789270c0b
libnvdimm: KASAN: global-out-of-bounds Read in internal_create_group
|
|
possible deadlock in __io_queue_deferred
fs
io-uring
|
4 |
C |
error |
|
1 |
1993d |
1991d
|
15/29 |
1954d |
7271ef3a93a8
io_uring: fix recursive completion locking on oveflow flush
|
|
WARNING in __kernel_read
fs
|
-1 |
C |
done |
|
60 |
1961d |
2020d
|
15/29 |
1954d |
a39c46067c84
net/9p: validate fds in p9_fd_open
|
|
general protection fault in cdev_del
usb
fs
|
2 |
C |
|
|
315 |
1964d |
2432d
|
15/29 |
1954d |
e911e99a0770
usb: hso: check for return value in hso_serial_common_create()
|
|
BUG: unable to handle kernel NULL pointer dereference in loop_rw_iter
io-uring
fs
|
10 |
C |
done |
|
24 |
1980d |
1991d
|
15/29 |
1954d |
2dd2111d0d38
io_uring: Fix NULL pointer dereference in loop_rw_iter()
|
|
KASAN: use-after-free Read in io_async_task_func
io-uring
fs
|
19 |
syz |
error |
|
1 |
1991d |
1991d
|
15/29 |
1954d |
6d816e088c35
io_uring: hold 'ctx' reference around task_work queue + execute
|
|
WARNING in drop_nlink
fs
|
-1 |
C |
done |
error |
1 |
2102d |
2098d
|
15/29 |
1954d |
facb03dddec0
fs/minix: don't allow getting deleted inodes
|
|
KASAN: use-after-free Read in ceph_mdsc_destroy
ceph
fs
|
19 |
|
|
|
4 |
1994d |
2010d
|
15/29 |
1954d |
a7caa88f8b72
ceph: fix use-after-free for fsc->mdsc
|
|
KASAN: use-after-free Read in path_init (2)
fs
|
19 |
C |
done |
|
29 |
1988d |
1990d
|
15/29 |
1954d |
24fb33d40d60
fix breakage in do_rmdir()
|
|
WARNING in __kernel_write
fs
|
-1 |
C |
done |
|
522 |
2003d |
2023d
|
15/29 |
1954d |
a39c46067c84
net/9p: validate fds in p9_fd_open
|
|
KMSAN: uninit-value in get_block
fs
|
7 |
C |
|
|
13 |
2070d |
2073d
|
15/29 |
1954d |
270ef41094e9
fs/minix: reject too-large maximum file size
|
|
KASAN: null-ptr-deref Write in get_block
fs
|
12 |
C |
done |
|
101 |
2020d |
2134d
|
15/29 |
1954d |
da27e0a0e5f6
fs/minix: check return value of sb_getblk()
|
|
memory leak in io_submit_sqes
fs
io-uring
|
3 |
C |
|
|
2 |
1971d |
1990d
|
15/29 |
1954d |
a36da65c4656
io_uring: fail poll arm on queue proc failure
|
|
KASAN: use-after-free Write in get_block
fs
|
24 |
C |
inconclusive |
inconclusive |
12 |
2037d |
2087d
|
15/29 |
1954d |
270ef41094e9
fs/minix: reject too-large maximum file size
|
|
general protection fault in io_poll_double_wake
io-uring
fs
|
2 |
C |
done |
|
8 |
1958d |
1986d
|
15/29 |
1954d |
d4e7cd36a90e
io_uring: sanitize double poll handling
|
|
KASAN: use-after-free Read in lockref_get
fs
|
19 |
|
|
|
7 |
2058d |
2158d
|
15/29 |
1954d |
bad8e64fb19d
blktrace: fix debugfs use after free
|
|
KASAN: use-after-free Read in io_uring_setup (2)
fs
|
19 |
|
|
|
1 |
2003d |
2002d
|
15/29 |
1954d |
d1719f70d0a5
io_uring: don't touch 'ctx' after installing file descriptor
|
|
possible deadlock in io_timeout_fn
io-uring
fs
|
4 |
C |
done |
|
4 |
1989d |
1991d
|
15/29 |
1954d |
51a4cc112c7a
io_uring: defer file table grabbing request cleanup for locked requests
|
|
possible deadlock in lock_trace (3)
fs
|
4 |
syz |
inconclusive |
done |
69 |
2122d |
2257d
|
15/29 |
1983d |
2db9dbf71bf9
proc: Use new infrastructure to fix deadlocks in execve
|
|
possible deadlock in do_io_accounting (3)
fs
|
4 |
C |
inconclusive |
done |
39 |
2129d |
2219d
|
15/29 |
1983d |
76518d379885
proc: io_accounting: Use new infrastructure to fix deadlocks in execve
|
|
possible deadlock in proc_pid_personality
fs
|
4 |
syz |
inconclusive |
done |
3 |
2138d |
2148d
|
15/29 |
1983d |
2db9dbf71bf9
proc: Use new infrastructure to fix deadlocks in execve
|
|
WARNING: bad unlock balance in rcu_lock_release
fs
|
4 |
C |
inconclusive |
done |
1433 |
2124d |
2405d
|
15/29 |
1984d |
10476e630422
locking/lockdep: Fix bad recursion pattern
|
|
WARNING: bad unlock balance in rcu_core
fs
|
4 |
C |
inconclusive |
done |
3578 |
2120d |
2476d
|
15/29 |
1984d |
10476e630422
locking/lockdep: Fix bad recursion pattern
|
|
KASAN: use-after-free Write in fsnotify_detach_connector_from_object
fs
|
24 |
C |
done |
|
4 |
2046d |
2051d
|
15/29 |
2015d |
ef1548adada5
proc: Use new_inode not new_inode_pseudo
|
|
BUG: unable to handle kernel NULL pointer dereference in number
fs
|
10 |
|
|
|
1 |
2045d |
2041d
|
15/29 |
2015d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
|
INFO: task hung in locks_remove_posix
fs
usb
input
|
1 |
syz |
|
|
2231 |
2050d |
2073d
|
15/29 |
2015d |
187b96db5ca7
x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks
|
|
linux-next boot error: general protection fault in tomoyo_get_local_path
fs
|
-1 |
|
|
|
18 |
2073d |
2078d
|
15/29 |
2015d |
9d78edeaec75
proc: proc_pid_ns takes super_block as an argument
|
|
general protection fault in proc_kill_sb
fs
|
2 |
|
|
|
8 |
2041d |
2053d
|
15/29 |
2015d |
058f2e4da79b
proc: s_fs_info may be NULL when proc_kill_sb is called
|
|
INFO: trying to register non-static key in io_cqring_ev_posted (3)
fs
|
-1 |
C |
done |
|
3 |
2074d |
2077d
|
15/29 |
2015d |
583863ed9181
io_uring: initialize ctx->sqo_wait earlier
|
|
BUG: unable to handle kernel NULL pointer dereference in unlock_page
mm
fs
|
10 |
|
|
|
1 |
2047d |
2047d
|
15/29 |
2015d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
|
general protection fault in start_creating
fs
|
2 |
C |
done |
|
106 |
2037d |
2067d
|
15/29 |
2015d |
d56f5136b010
KVM: let kvm_destroy_vm_debugfs clean up vCPU debugfs directories
|
|
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_node_cpus (2)
fs
mm
|
6 |
|
|
|
9 |
2083d |
2250d
|
15/29 |
2015d |
314eeb43e5f2
rcu: Add *_ONCE() and data_race() to rcu_node ->exp_tasks plus locking
|
|
KASAN: use-after-free Read in blkdev_direct_IO
fs
|
19 |
C |
done |
error |
8 |
2361d |
2365d
|
15/29 |
2032d |
0eb6ddfb865c
block: Fix __blkdev_direct_IO() for bio fragments
|
|
KASAN: use-after-free Read in blkdev_bio_end_io
fs
|
19 |
C |
done |
error |
13 |
2351d |
2362d
|
15/29 |
2032d |
7b6620d7db56
block: remove REQ_NOWAIT_INLINE
|
|
KASAN: use-after-free Read in dput (2)
fs
|
19 |
syz |
done |
|
4 |
2109d |
2108d
|
15/29 |
2044d |
4fa3b1c41737
proc: Handle umounts cleanly
|
|
INFO: rcu detected stall in io_uring_release
fs
|
1 |
syz |
|
|
15 |
2065d |
2105d
|
15/29 |
2044d |
3fd44c86711f
io_uring: use cond_resched() in io_ring_ctx_wait_and_kill()
|
|
possible deadlock in io_submit_one (3)
fs
|
4 |
syz |
done |
|
45 |
2113d |
2121d
|
15/29 |
2084d |
63f818f46af9
proc: Use a dedicated lock in struct pid
|
|
INFO: task hung in io_queue_file_removal
fs
|
1 |
C |
done |
|
16 |
2126d |
2134d
|
15/29 |
2084d |
4afdb733b160
io-uring: drop completion when removing file
|
|
KMSAN: uninit-value in simple_attr_read
fs
|
7 |
C |
|
|
6 |
2087d |
2157d
|
15/29 |
2084d |
a65cab7d7f05
libfs: fix infoleak in simple_attr_read()
|
|
possible deadlock in send_sigurg
fs
|
4 |
C |
done |
|
65 |
2107d |
2121d
|
15/29 |
2084d |
63f818f46af9
proc: Use a dedicated lock in struct pid
|
|
INFO: trying to register non-static key in __io_uring_register
fs
|
-1 |
C |
done |
|
39 |
2115d |
2117d
|
15/29 |
2084d |
f7fe9346869a
io_uring: initialize fixed_file_data lock
|
|
INFO: trying to register non-static key in io_cqring_ev_posted (2)
fs
|
-1 |
C |
done |
|
42 |
2087d |
2124d
|
15/29 |
2084d |
10bea96dcc13
io_uring: add missing finish_wait() in io_sq_thread()
|
|
possible deadlock in send_sigio
fs
|
4 |
C |
done |
|
7 |
2111d |
2120d
|
15/29 |
2084d |
63f818f46af9
proc: Use a dedicated lock in struct pid
|
|
memory leak in fasync_helper
fs
|
3 |
C |
|
|
14 |
2177d |
2238d
|
15/29 |
2108d |
67f562e3e147
net/smc: transfer fasync_list in case of fallback
|
|
BUG: sleeping function called from invalid context in __kmalloc
ceph
fs
|
5 |
C |
done |
|
5 |
2170d |
2176d
|
15/29 |
2108d |
b27a939e8376
ceph: canonicalize server path in place
|
|
WARNING: ODEBUG bug in io_sqe_files_unregister
fs
|
-1 |
C |
done |
|
964 |
2178d |
2225d
|
15/29 |
2143d |
2faf852d1be8
io_uring: cleanup fixed file data table references
|
|
memory leak in reiserfs_fill_super
fs
|
3 |
C |
|
|
20 |
2184d |
2234d
|
15/29 |
2165d |
5474ca7da6f3
reiserfs: Fix memory leak of journal device string
|
|
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_cpus
mm
fs
|
6 |
|
|
|
7 |
2178d |
2272d
|
15/29 |
2165d |
c51f83c315c3
rcu: Use READ_ONCE() for ->expmask in rcu_read_unlock_special()
|
|
kernel BUG at fs/namei.c:LINE!
fs
|
-1 |
|
|
|
3593 |
2201d |
2201d
|
15/29 |
2165d |
c64cd6e34ea3
reimplement path_mountpoint() with less magic
|
|
BUG: corrupted list in __dentry_kill (2)
fs
|
8 |
C |
done |
|
4945 |
2234d |
2234d
|
15/29 |
2165d |
a3d1e7eb5abe
simple_recursive_removal(): kernel-side rm -rf for ramfs-style filesystems
|
|
WARNING in do_dentry_open (2)
fs
|
-1 |
C |
done |
|
17 |
2185d |
2183d
|
15/29 |
2165d |
a37f4958f7b6
debugfs: Return -EPERM when locked down
|
|
KASAN: use-after-free Write in percpu_ref_switch_to_percpu
fs
|
24 |
|
|
|
1 |
2180d |
2179d
|
15/29 |
2165d |
2faf852d1be8
io_uring: cleanup fixed file data table references
|
|
WARNING: refcount bug in chrdev_open
fs
|
13 |
C |
inconclusive |
done |
15 |
2245d |
2347d
|
15/29 |
2165d |
68faa679b8be
chardev: Avoid potential use-after-free in 'chrdev_open()'
|
|
linux-next boot error: general protection fault in do_mount_root
fs
|
-1 |
|
|
|
9 |
2229d |
2229d
|
15/29 |
2170d |
7de7de7ca0ae
Fix root mounting with no mount options
|
|
upstream boot error: general protection fault in do_mount_root
fs
|
-1 |
|
|
|
12 |
2230d |
2230d
|
15/29 |
2170d |
7de7de7ca0ae
Fix root mounting with no mount options
|
|
kernel BUG at fs/pipe.c:LINE!
fs
|
-1 |
C |
done |
|
693 |
2237d |
2244d
|
15/29 |
2207d |
8c7b8c34ae95
pipe: Remove assertion from pipe_poll()
|
|
general protection fault in io_commit_cqring
fs
|
2 |
C |
done |
|
3 |
2262d |
2262d
|
15/29 |
2233d |
15dff286d0e0
io_uring: check for validity of ->rings in teardown
|
|
INFO: task hung in io_wq_destroy
fs
|
1 |
C |
done |
|
20 |
2247d |
2278d
|
15/29 |
2233d |
b60fda6000a9
io-wq: wait for io_wq_create() to setup necessary workers
|
|
INFO: trying to register non-static key in io_cqring_ev_posted
fs
|
-1 |
C |
done |
|
6 |
2248d |
2260d
|
15/29 |
2233d |
eb065d301e8c
io_uring: io_allocate_scq_urings() should return a sane state
|
|
WARNING in iov_iter_pipe
fs
|
-1 |
C |
done |
|
1117 |
2251d |
2268d
|
15/29 |
2233d |
419e9c38aa07
iomap: Fix pipe page leakage during splicing
|
|
BUG: unable to handle kernel paging request in io_wq_cancel_all
fs
|
8 |
C |
done |
|
2 |
2277d |
2277d
|
15/29 |
2233d |
975c99a57096
io_uring: io_wq_create() returns an error pointer, not NULL
|
|
KASAN: invalid-free in io_sqe_files_unregister
fs
|
22 |
C |
done |
|
3 |
2266d |
2266d
|
15/29 |
2233d |
46568e9be70f
io_uring: fix error clear of ->file_table in io_sqe_files_register()
|
|
KASAN: use-after-free Read in do_mount
fs
|
19 |
syz |
done |
|
6 |
2291d |
2299d
|
14/29 |
2246d |
0ecee6699064
fs/namespace.c: fix use-after-free of mount in mnt_warn_timestamp_expiry()
|
|
KMSAN: use-after-free in hidraw_ioctl
fs
lsm
|
18 |
|
|
|
1 |
2298d |
2298d
|
13/29 |
2249d |
416dacb819f5
HID: hidraw: Fix invalid read in hidraw_ioctl
|
|
KASAN: use-after-free Read in io_uring_setup
fs
|
19 |
syz |
error |
|
1 |
2279d |
2279d
|
13/29 |
2253d |
044c1ab399af
io_uring: don't touch ctx in setup after ring fd install
|
|
KASAN: use-after-free Read in ep_scan_ready_list
fs
|
19 |
C |
|
done |
39 |
2717d |
2752d
|
13/29 |
2255d |
430ac66eb4c5
net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
|
|
WARNING in mark_lock (2)
fs
|
-1 |
|
|
|
14 |
2286d |
2313d
|
13/29 |
2279d |
8e00c4e9dd85
writeback: fix use-after-free in finish_writeback_work()
|
|
general protection fault in finish_writeback_work
fs
|
2 |
|
|
|
10 |
2288d |
2313d
|
13/29 |
2279d |
8e00c4e9dd85
writeback: fix use-after-free in finish_writeback_work()
|
|
INFO: trying to register non-static key in finish_writeback_work
fs
|
-1 |
syz |
error |
|
1 |
2315d |
2312d
|
13/29 |
2279d |
8e00c4e9dd85
writeback: fix use-after-free in finish_writeback_work()
|
|
INFO: task syz-executor can't die for more than 143 seconds.
fs
|
-1 |
C |
done |
|
61 |
2308d |
2416d
|
13/29 |
2291d |
8619e5bdeee8
/dev/mem: Bail out upon SIGKILL.
7c3a6aedcd6a
kexec: bail out upon SIGKILL when allocating memory.
8f9e86ee7959
staging: android: ion: Bail out upon SIGKILL when allocating memory.
|
|
WARNING in kfree
fs
|
-1 |
C |
done |
|
2 |
2338d |
2337d
|
13/29 |
2291d |
43ce4c1feadb
vfs: Add a single-or-reconfig keying to vfs_get_super()
|
|
WARNING in __blkdev_put (2)
fs
|
-1 |
syz |
|
|
3082 |
2355d |
2362d
|
12/29 |
2330d |
e91455bad5cf
bdev: Fixup error handling in blkdev_get()
|
|
kernel panic: corrupted stack end in dput
fs
|
2 |
syz |
done |
|
1 |
2398d |
2398d
|
12/29 |
2340d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
|
INFO: task hung in io_uring_release
fs
|
1 |
|
|
|
24 |
2387d |
2405d
|
12/29 |
2362d |
a4c0b3decb33
io_uring: fix io_sq_thread_stop running in front of io_sq_thread
|
|
general protection fault in do_move_mount (2)
fs
|
2 |
syz |
done |
|
7 |
2402d |
2411d
|
12/29 |
2369d |
570d7a98e7d6
vfs: move_mount: reject moving kernel internal mounts
|
|
possible deadlock in io_submit_one
fs
|
4 |
C |
done |
|
1779 |
2373d |
2544d
|
12/29 |
2369d |
cbcfa130a911
fs/userfaultfd.c: disable irqs for fault_pending and event locks
|
|
possible deadlock in userfaultfd_read (2)
fs
mm
|
4 |
|
|
|
228 |
2392d |
2492d
|
12/29 |
2369d |
cbcfa130a911
fs/userfaultfd.c: disable irqs for fault_pending and event locks
|
|
WARNING in notify_change
fs
|
-1 |
C |
|
|
566 |
2456d |
2846d
|
12/29 |
2374d |
f69e749a4935
Abort file_remove_privs() for non-reg. files
|
|
WARNING in fanotify_handle_event
fs
|
-1 |
C |
done |
|
5 |
2411d |
2410d
|
12/29 |
2388d |
c285a2f01d69
fanotify: update connector fsid cache on add mark
|
|
BUG: Dentry still in use [unmount of tmpfs tmpfs]
fs
|
-1 |
|
|
|
2 |
2420d |
2420d
|
12/29 |
2388d |
1b0b9cc8d379
vfs: fsmount: add missing mntget()
|
|
BUG: Dentry still in use [unmount of hugetlbfs hugetlbfs]
fs
|
-1 |
C |
done |
|
3 |
2411d |
2411d
|
12/29 |
2388d |
1b0b9cc8d379
vfs: fsmount: add missing mntget()
|
|
possible deadlock in aio_poll
fs
|
4 |
C |
|
|
5041 |
2547d |
2692d
|
12/29 |
2399d |
ae62c16e105a
userfaultfd: disable irqs when taking the waitqueue lock
|
|
INFO: task hung in __ia32_sys_io_uring_enter
fs
|
1 |
|
|
|
2 |
2474d |
2476d
|
12/29 |
2406d |
b19062a56726
io_uring: fix possible deadlock between io_uring_{enter,register}
|
|
INFO: task hung in __x64_sys_io_uring_enter
fs
|
1 |
|
|
|
12 |
2469d |
2475d
|
12/29 |
2406d |
b19062a56726
io_uring: fix possible deadlock between io_uring_{enter,register}
|
|
INFO: task hung in __get_super
fs
|
1 |
C |
|
|
80 |
2409d |
2853d
|
12/29 |
2409d |
33ec3e53e7b1
loop: Don't change loop device under exclusive opener
|
|
general protection fault in do_move_mount
fs
|
2 |
|
|
|
3 |
2451d |
2451d
|
12/29 |
2414d |
05883eee857e
do_move_mount(): fix an unsafe use of is_anon_ns()
|
|
general protection fault in load_elf_binary
fs
mm
|
2 |
C |
done |
|
15 |
2487d |
2491d
|
12/29 |
2414d |
cc338010a233
fs/binfmt_elf.c: free PT_INTERP filename ASAP
|
|
kernel BUG at mm/slab.c:LINE! (4)
fs
|
-1 |
|
|
|
12 |
2426d |
2494d
|
12/29 |
2414d |
4f661542a402
tcp: fix zerocopy and notsent_lowat issues
|
|
general protection fault in put_fs_context
fs
|
2 |
C |
|
|
9 |
2641d |
2641d
|
12/29 |
2418d |
8d0347f6c3a9
convert do_remount_sb() to fs_context
|
|
INFO: task hung in __io_uring_register
fs
|
1 |
C |
done |
|
51 |
2468d |
2477d
|
12/29 |
2432d |
b19062a56726
io_uring: fix possible deadlock between io_uring_{enter,register}
|
|
general protection fault in fanotify_handle_event
fs
|
2 |
syz |
done |
|
5 |
2471d |
2471d
|
12/29 |
2432d |
b1da6a51871c
fsnotify: Fix NULL ptr deref in fanotify_get_fsid()
|
|
BUG: unable to handle kernel paging request in do_mount
fs
|
8 |
C |
|
|
194 |
2643d |
2681d
|
12/29 |
2439d |
3e1aeb00e6d1
vfs: Implement a filesystem superblock creation/configuration context
|
|
possible deadlock in seq_read
fs
|
4 |
C |
|
|
19074 |
2485d |
2975d
|
12/29 |
2478d |
73601ea5b7b1
fs/open.c: allow opening only regular files during execve()
|
|
KASAN: use-after-free Read in link_path_walk
fs
|
19 |
syz |
done |
|
5 |
2597d |
2612d
|
12/29 |
2478d |
1da6c4d9140c
bpf: fix use after free in bpf_evict_inode
|
|
KASAN: use-after-free Read in trailing_symlink
fs
|
19 |
syz |
done |
|
2 |
2598d |
2612d
|
12/29 |
2478d |
1da6c4d9140c
bpf: fix use after free in bpf_evict_inode
|
|
KASAN: use-after-free Read in path_lookupat
fs
|
19 |
syz |
done |
|
1 |
2612d |
2612d
|
12/29 |
2478d |
1da6c4d9140c
bpf: fix use after free in bpf_evict_inode
|
|
KASAN: use-after-free Read in filemap_fault
mm
fs
|
19 |
C |
|
|
277 |
2572d |
2582d
|
11/29 |
2489d |
6b4c9f446981
filemap: drop the mmap_sem for all blocking operations
|
|
possible deadlock in __do_page_fault
mm
fs
|
4 |
C |
|
|
820 |
2514d |
2681d
|
11/29 |
2493d |
fb4415a12632
staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
|
|
possible deadlock in vfs_fallocate
fs
|
4 |
C |
|
|
3981 |
2714d |
2825d
|
11/29 |
2493d |
fb4415a12632
staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
|
|
BUG: unable to handle kernel NULL pointer dereference in __generic_file_write_iter
mm
fs
|
10 |
|
|
|
5 |
2519d |
2527d
|
11/29 |
2493d |
ac5ceccce550
x86/unwind: Add hardcoded ORC entry for NULL
f4f34e1b82eb
x86/unwind: Handle NULL pointer calls better in frame unwinder
|
|
possible deadlock in userfaultfd_read
fs
mm
|
4 |
|
|
|
239 |
2493d |
2547d
|
11/29 |
2493d |
d3d6a18d7d35
aio: Fix locking in aio_poll()
|
|
BUG: unable to handle kernel paging request in dput (2)
fs
|
8 |
C |
|
|
4 |
2549d |
2550d
|
11/29 |
2515d |
36991ca68db9
blk-mq: protect debugfs_create_files() from failures
37ea7b630ae5
debugfs: debugfs_lookup() should return NULL if not found
|
|
INFO: task hung in generic_file_write_iter
fs
mm
|
1 |
|
|
|
7 |
2607d |
2746d
|
11/29 |
2515d |
04906b2f542c
blockdev: Fix livelocks on loop device
|
|
general protection fault in __dentry_path
fs
|
2 |
C |
|
|
2082 |
2517d |
2550d
|
11/29 |
2515d |
8ed0579c12b2
kvm: properly check debugfs dentry before using it
|
|
KASAN: use-after-free Read in posix_lock_inode
fs
|
19 |
syz |
|
|
5 |
2578d |
2578d
|
11/29 |
2564d |
bf77ae4c98d7
locks: fix error in locks_move_blocks()
|
|
KASAN: use-after-free Read in locks_delete_block
fs
|
19 |
syz |
|
|
4 |
2605d |
2628d
|
11/29 |
2564d |
16306a61d3b7
fs/locks: always delete_block after waiting.
|
|
WARNING in userfaultfd_ioctl
fs
mm
|
-1 |
C |
|
|
11 |
2597d |
2607d
|
11/29 |
2583d |
01e881f5a1fc
userfaultfd: check VM_MAYWRITE was set after verifying the uffd is registered
|
|
WARNING: kmalloc bug in krealloc
fs
|
-1 |
C |
|
|
2 |
2748d |
2748d
|
11/29 |
2628d |
61448479a9f2
mm: don't warn about large allocations for slab
|
|
WARNING: kmalloc bug in vfs_getxattr_alloc
fs
|
-1 |
C |
|
|
9 |
2703d |
2746d
|
11/29 |
2628d |
61448479a9f2
mm: don't warn about large allocations for slab
|
|
KASAN: slab-out-of-bounds Read in fscache_alloc_cookie
fs
|
17 |
C |
|
|
1936 |
2653d |
2755d
|
11/29 |
2642d |
1ff22883b0b2
fscache: Fix incomplete initialisation of inline key space
fa520c47eaa1
fscache: Fix out of bound read in long cookie keys
|
|
general protection fault in ubifs_mount
fs
mtd
|
2 |
C |
|
|
216 |
2681d |
2698d
|
11/29 |
2660d |
37f31b6ca431
ubifs: Check for name being NULL while mounting
|
|
WARNING in __fsnotify_recalc_mask
fs
|
-1 |
syz |
|
|
9 |
2713d |
2714d
|
10/29 |
2691d |
d3bc0fa8411c
fsnotify: fix false positive warning on inode delete
|
|
BUG: soft lockup in shrink_dcache_parent (2)
fs
|
1 |
|
|
|
7 |
2783d |
2790d
|
10/29 |
2691d |
4fb48871409e
restore cond_resched() in shrink_dcache_parent()
|
|
INFO: task hung in fsnotify_mark_destroy_workfn
fs
|
1 |
syz |
|
|
13 |
2723d |
2837d
|
10/29 |
2694d |
128f38041035
android: binder: Rate-limit debug and userspace triggered err msgs
|
|
BUG: soft lockup in d_walk
fs
|
1 |
C |
|
|
163 |
2783d |
2828d
|
8/29 |
2697d |
4fb48871409e
restore cond_resched() in shrink_dcache_parent()
|
|
general protection fault in send_sigurg_to_task
fs
|
2 |
C |
|
|
6 |
2716d |
2719d
|
8/29 |
2704d |
84fe4cc09abc
signal: Don't send signals to tasks that don't exist
|
|
general protection fault in send_sigio_to_task
fs
|
2 |
C |
|
|
176 |
2716d |
2719d
|
8/29 |
2704d |
84fe4cc09abc
signal: Don't send signals to tasks that don't exist
|
|
kernel BUG at mm/memory.c:LINE!
fs
mm
|
-1 |
|
|
|
1 |
2756d |
2755d
|
8/29 |
2724d |
bfd40eaff5ab
mm: fix vma_is_anonymous() false-positives
|
|
kernel BUG at fs/userfaultfd.c:LINE! (2)
fs
mm
|
-1 |
C |
|
|
8 |
2730d |
2748d
|
8/29 |
2724d |
31e810aa1033
userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
|
|
KASAN: stack-out-of-bounds Read in __d_lookup_rcu
fs
|
17 |
|
|
|
1 |
2745d |
2744d
|
8/29 |
2725d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
|
KASAN: stack-out-of-bounds Read in locks_remove_posix
fs
|
17 |
C |
|
|
1 |
2743d |
2742d
|
8/29 |
2725d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
|
KASAN: slab-out-of-bounds Read in getname_kernel
fs
|
17 |
C |
|
|
8 |
2750d |
2849d
|
8/29 |
2739d |
02f51d45937f
autofs: fix slab out of bounds read in getname_kernel()
|
|
KASAN: global-out-of-bounds Write in string
fs
|
23 |
C |
|
|
7 |
2795d |
2851d
|
8/29 |
2739d |
fe10e398e860
reiserfs: fix buffer overflow with long warning messages
|
|
BUG: unable to handle kernel paging request in dput
fs
|
8 |
C |
|
|
26 |
2786d |
2788d
|
8/29 |
2754d |
d85b399b64e8
fix proc_fill_cache() in case of d_alloc_parallel() failure
|
|
BUG: unable to handle kernel NULL pointer dereference in do_select
fs
|
10 |
|
|
|
45 |
2764d |
2765d
|
8/29 |
2754d |
e88958e6369a
net: handle NULL ->poll gracefully
|
|
general protection fault in wb_workfn (2)
fs
|
2 |
|
|
|
38 |
2774d |
2799d
|
8/29 |
2754d |
3ee7e8697d58
bdi: Fix another oops in wb_workfn()
|
|
KASAN: use-after-free Read in __vfs_write
fs
|
19 |
syz |
|
|
14 |
2783d |
2786d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
general protection fault in pipe_write
fs
|
2 |
syz |
|
|
1 |
2786d |
2785d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
BUG: unable to handle kernel NULL pointer dereference in ep_item_poll
fs
|
10 |
C |
|
|
15 |
2764d |
2765d
|
8/29 |
2754d |
e88958e6369a
net: handle NULL ->poll gracefully
|
|
general protection fault in __vfs_write
fs
|
2 |
syz |
|
|
25 |
2783d |
2786d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
KASAN: use-after-free Read in pipe_read
fs
|
19 |
C |
|
|
3 |
2785d |
2786d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
KASAN: use-after-free Read in finish_wait
fs
|
19 |
|
|
|
8 |
2784d |
2786d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
KASAN: use-after-free Read in __kernel_write
fs
|
19 |
syz |
|
|
7 |
2783d |
2786d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
KASAN: null-ptr-deref Write in simple_write_to_buffer
fs
|
12 |
C |
|
|
5 |
2795d |
2819d
|
8/29 |
2754d |
fc14eebfc208
PM / hibernate: Fix oops at snapshot_write()
|
|
general protection fault in touch_atime
fs
|
2 |
syz |
|
|
6 |
2783d |
2786d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
BUG: soft lockup in do_raw_spin_unlock (2)
fs
|
1 |
|
|
|
1 |
2782d |
2782d
|
8/29 |
2754d |
4fb48871409e
restore cond_resched() in shrink_dcache_parent()
|
|
general protection fault in __mnt_want_write
fs
|
2 |
|
|
|
1 |
2784d |
2784d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
WARNING in do_dentry_open
fs
|
-1 |
C |
|
|
26 |
2778d |
2785d
|
8/29 |
2754d |
b16558579576
bpf: implement dummy fops for bpf objects
|
|
INFO: task hung in namespace_unlock
fs
|
1 |
|
|
|
15 |
2758d |
2767d
|
8/29 |
2754d |
ebec3f8f5271
n_tty: Access echo_* variables carefully.
|
|
general protection fault in vfs_read
fs
|
2 |
syz |
|
|
2 |
2784d |
2786d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
BUG: unable to handle kernel NULL pointer dereference in do_sys_poll
fs
|
10 |
C |
|
|
297 |
2764d |
2765d
|
8/29 |
2754d |
e88958e6369a
net: handle NULL ->poll gracefully
|
|
WARNING in sysfs_remove_group
fs
|
-1 |
C |
|
|
11125 |
2756d |
3010d
|
8/29 |
2754d |
d3349b6b3c37
loop: remember whether sysfs_create_group() was done
|
|
INFO: rcu detected stall in d_walk
fs
|
1 |
C |
|
|
25680 |
2780d |
2842d
|
8/29 |
2754d |
4fb48871409e
restore cond_resched() in shrink_dcache_parent()
|
|
KASAN: use-after-free Read in pipe_wait
fs
|
19 |
|
|
|
2 |
2783d |
2784d
|
8/29 |
2754d |
66e58e0ef80a
bpfilter: fix race in pipe access
|
|
KASAN: use-after-free Read in remove_wait_queue (2)
fs
|
19 |
C |
|
|
4 |
2875d |
2885d
|
5/29 |
2786d |
af8d3c7c001a
ppp: remove the PPPIOCDETACH ioctl
|
|
INFO: task hung in __do_page_fault
fs
mm
|
1 |
|
|
|
1 |
2839d |
2839d
|
5/29 |
2808d |
8236b0ae31c8
bdi: wake up concurrent wb_shutdown() callers.
|
|
KASAN: use-after-free Read in debugfs_remove (2)
fs
|
19 |
|
|
|
1 |
2834d |
2832d
|
5/29 |
2808d |
f53823c18131
bdi: Fix use after free bug in debugfs_remove()
|
|
INFO: task hung in handle_userfault
fs
mm
|
1 |
|
|
|
3 |
2822d |
2844d
|
5/29 |
2808d |
8236b0ae31c8
bdi: wake up concurrent wb_shutdown() callers.
|
|
general protection fault in wb_workfn
fs
|
2 |
|
|
|
63 |
2809d |
2835d
|
5/29 |
2808d |
b8b784958ecc
bdi: Fix oops in wb_workfn()
|
|
WARNING: refcount bug in put_pid_ns
fs
|
13 |
syz |
|
|
6 |
2854d |
2854d
|
5/29 |
2816d |
8e04944f0ea8
mm,vmscan: Allow preallocating memory for register_shrinker().
|
|
WARNING in format_decode
fs
|
-1 |
C |
|
|
1 |
2854d |
2854d
|
5/29 |
2816d |
9ad553abe66f
fs/reiserfs/journal.c: add missing resierfs_warning() arg
|
|
BUG: corrupted list in __dentry_kill
fs
|
8 |
C |
|
|
35 |
2834d |
2854d
|
5/29 |
2816d |
4a3877c4cedd
rpc_pipefs: fix double-dput()
|
|
WARNING in kmem_cache_free
fs
|
-1 |
|
|
|
1 |
2849d |
2848d
|
5/29 |
2816d |
eea0d3ea7546
crypto: drbg - set freed buffers to NULL
|
|
KASAN: null-ptr-deref Read in xattr_getsecurity
fs
|
11 |
|
|
|
68 |
2833d |
2845d
|
5/29 |
2816d |
1f5781725dcb
commoncap: Handle memory allocation failure.
|
|
INFO: task hung in __blkdev_get
fs
|
1 |
C |
|
|
662 |
2841d |
2967d
|
5/29 |
2816d |
1e047eaab3bb
block/loop: fix deadlock after loop_set_status
|
|
KASAN: use-after-free Read in remove_wait_queue
fs
|
19 |
C |
|
|
7 |
2892d |
2901d
|
4/29 |
2887d |
5eeb2ca02a2f
ANDROID: binder: synchronize_rcu() when using POLLFREE.
|
|
KASAN: use-after-free Read in __fput
fs
|
19 |
|
|
|
23 |
2970d |
3004d
|
4/29 |
2901d |
a5739435b5a3
fix kcm_clone()
|
|
KASAN: use-after-free Read in __lock_acquire (2)
fs
|
19 |
C |
|
|
589 |
2912d |
2987d
|
4/29 |
2909d |
f5cb779ba163
ANDROID: binder: remove waitqueue when thread exits.
|
|
WARNING in sysfs_warn_dup
fs
|
-1 |
|
|
|
11 |
2914d |
2957d
|
4/29 |
2909d |
5d54f948aaac
sysfs: turn WARN() into pr_warn()
|
|
WARNING in register_lock_class
fs
|
-1 |
C |
|
|
2 |
2956d |
2952d
|
4/29 |
2909d |
f5cb779ba163
ANDROID: binder: remove waitqueue when thread exits.
|
|
BUG: unable to handle kernel NULL pointer dereference in page_mapping
fs
mm
|
10 |
C |
|
|
4 |
2956d |
2958d
|
4/29 |
2912d |
7d11f77f84b2
RDS: null pointer dereference in rds_atomic_free_op
|
|
general protection fault in page_mapping
fs
mm
|
2 |
C |
|
|
46 |
2936d |
2963d
|
4/29 |
2912d |
7d11f77f84b2
RDS: null pointer dereference in rds_atomic_free_op
|
|
kernel BUG at fs/userfaultfd.c:LINE!
fs
mm
|
-1 |
C |
|
|
3 |
2956d |
2953d
|
4/29 |
2913d |
0cbb4b4f4c44
userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
|
|
BUG: unable to handle kernel paging request in devpts_mntget
fs
|
8 |
C |
|
|
21 |
2926d |
3002d
|
4/29 |
2913d |
c9cc8d01fb04
devpts: fix error handling in devpts_mntget()
|
|
general protection fault in show_timer
fs
|
2 |
C |
|
|
10 |
2957d |
2976d
|
4/29 |
2913d |
cef31d9af908
posix-timer: Properly check sigevent->sigev_notify
|
|
KASAN: use-after-free Read in __wake_up_common
fs
|
19 |
C |
|
|
888 |
2913d |
2922d
|
4/29 |
2913d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
BUG: unable to handle kernel NULL pointer dereference in proc_flush_task
fs
|
10 |
syz |
|
|
1 |
2960d |
2956d
|
4/29 |
2917d |
c0ee554906c3
pid: Handle failure to allocate the first pid in a pid namespace
|
|
general protection fault in proc_flush_task
fs
|
2 |
syz |
|
|
2 |
2959d |
2976d
|
4/29 |
2917d |
c0ee554906c3
pid: Handle failure to allocate the first pid in a pid namespace
|
|
KASAN: use-after-free Read in handle_userfault
fs
mm
|
19 |
C |
|
|
151 |
2947d |
3010d
|
3/29 |
2935d |
0cbb4b4f4c44
userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
|
|
WARNING in lock_release
fs
|
-1 |
C |
|
|
72 |
2957d |
2990d
|
3/29 |
2953d |
ca0168e8a77c
alloc_super(): do ->s_umount initialization earlier
|
|
general protection fault in iov_iter_fault_in_readable
fs
mm
|
2 |
|
|
|
5 |
2995d |
3004d
|
3/29 |
2978d |
ee74d9967b82
tun: do not arm flow_gc_timer in tun_flow_init()
|
|
kernel BUG at fs/notify/dnotify/dnotify.c:LINE!
fs
|
-1 |
|
|
|
19 |
2994d |
3006d
|
3/29 |
2978d |
b3a006600582
dnotify: Handle errors from fsnotify_add_mark_locked() in fcntl_dirnotify()
|
|
KASAN: use-after-free Read in fsnotify
fs
|
19 |
|
|
|
1 |
3039d |
3002d
|
3/29 |
2978d |
b3a006600582
dnotify: Handle errors from fsnotify_add_mark_locked() in fcntl_dirnotify()
|