syzbot


Applied filters: Label=subsystems:fs (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
INFO: task hung in remove_inode_hugepages fs mm 1 C done 52 324d 416d 1/29 never INFO: task hung in remove_inode_hugepages
BUG: sleeping function called from invalid context in procfs_procmap_ioctl fs 5 syz done 101 55d 57d 2/29 never mm/maps: move kmalloc() call location in do_procmap_query() out of RCU critical section
linux-next boot error: WARNING in kmem_cache_free fs -1 45 1889d 1893d 1/29 never mm, slab/slub: improve error reporting and overhead of cache_from_obj()-fix
linux-next boot error: BUG: unable to handle kernel NULL pointer dereference in mempool_init_node fs ceph -1 12 1749d 1751d 1/29 never kasan-simplify-kasan_poison_kfree-temp-fix
kernel BUG in may_open (2) fs -1 C done 11125 now 51d 1/29 never isofs: Verify inode mode when loading from disk minixfs: Verify inode mode when loading from disk nilfs2: reject invalid file types when reading inodes squashfs: verify inode mode when loading from disk
INFO: task hung in io_sq_thread_stop fs io-uring 1 C done 211 1655d 1814d 1/29 never io_uring: don't sleep schedule in SQPOLL thread if we need to park
kernel BUG in free_bprm fs mm -1 C done 445 295d 296d 1/29 never exec: NULL out bprm->argv0 when it is an ERR_PTR
KASAN: use-after-free Read in sysv_new_inode (2) fs 19 C inconclusive error 21224 143d 476d 29/29 43d 448fa70158f9 sysv: Remove the filesystem
BUG: unable to handle kernel NULL pointer dereference in do_pagemap_scan fs 10 C inconclusive done 45 109d 612d 29/29 51d 65c66047259f proc: fix the issue of proc_mem_open returning NULL
kernel BUG in may_open fs -1 C error 137019 51d 148d 29/29 51d cfd86ef7e8e7 anon_inode: use a proper mode internally
KCSAN: data-race in bprm_execve / copy_fs (4) fs mm 6 1 161d 160d 28/29 79d af7bb0d2ca45 exec: fix the racy usage of fs_struct->in_exec
BUG: unable to handle kernel paging request in efivarfs_pm_notify efi fs 8 C 1037 175d 186d 28/29 79d cb6ae457bc6a efivarfs: Defer PM notifier registration until .fill_super
general protection fault in proc_scheduler fs 2 syz 6 233d 238d 28/29 114d d38e26e36206 mptcp: sysctl: sched: avoid using current->nsproxy
kernel BUG in const_folio_flags (2) fs mm -1 syz 3 218d 278d 28/29 114d 3203b3ab0fcf mm/filemap: don't call folio_test_locked() without a reference in next_uptodate_folio()
WARNING: locking bug in eventfd_signal_mask io-uring fs 4 C done 6 238d 242d 28/29 114d a9c83a0ab66a io_uring/timeout: flush timeouts outside of the timeout lock
WARNING in mark_buffer_dirty (6) fs -1 C error 11669 114d 681d 28/29 114d ca76bb226bf4 nilfs2: do not force clear folio if buffer is referenced
KASAN: slab-out-of-bounds Write in __put_unused_fd fs 24 C done 5 236d 240d 28/29 114d 0c0214df28f0 fanotify: Fix crash in fanotify_init(2)
possible deadlock in page_cache_ra_unbounded mm fs 4 C error done 163 220d 981d 28/29 176d 6f861765464f fs: Block writes to mounted block devices
KASAN: use-after-free Read in reiserfs_fill_super (3) fs 19 C error done 47 283d 328d 28/29 226d fb6f20ecb121 reiserfs: The last commit
KCSAN: data-race in __ep_remove / __fput (5) fs 6 1 342d 341d 28/29 255d 6474353a5e3d epoll: annotate racy check
KCSAN: data-race in __fsnotify_parent / __fsnotify_recalc_mask (5) fs 6 15 333d 420d 28/29 288d 35ceae44742e fsnotify: Avoid data race between fsnotify_recalc_mask() and fsnotify_object_watched()
kernel BUG in submit_bh_wbc (3) nilfs fs -1 C done 18 311d 318d 28/29 288d 6ed469df0bfb nilfs2: fix kernel bug due to missing clearing of buffer delay flag
KASAN: slab-use-after-free Read in lockref_get_not_dead (2) fs 19 syz error 1 360d 356d 28/29 310d 4e32c25b58b9 libfs: fix get_stashed_dentry()
WARNING: lock held when returning to user space in ns_ioctl fs 4 C done 147 395d 406d 27/29 379d 280e36f0d5b9 nsfs: use cleanup guard
BUG: unable to handle kernel NULL pointer dereference in path_from_stashed fs 10 C 23 400d 404d 27/29 379d f60d38cb02d0 pidfs: when time ns disabled add check for ioctl
INFO: rcu detected stall in rtnl_newlink (4) sctp fs 1 C error 9 470d 546d 25/29 462d b1f532a3b1e6 batman-adv: Avoid infinite loop trying to resize local TT
KASAN: slab-use-after-free Read in __fput (2) fs 19 C done 6 486d 492d 25/29 462d 4efaa5acf0a1 epoll: be better about file lifetimes
general protection fault in __ep_remove fs 2 C 1 507d 507d 25/29 462d 4efaa5acf0a1 epoll: be better about file lifetimes
WARNING: ODEBUG bug in bdev_super_lock (2) fs -1 C done 3 500d 498d 25/29 462d 22650a99821d fs,block: yield devices early
kernel BUG at fs/inode.c:LINE! (2) fs -1 C done unreliable 322 478d 1826d 25/29 464d 319c15174757 epoll: take epitem list out of struct file
WARNING in stashed_dentry_prune (2) fs -1 C done 54 489d 498d 25/29 466d 9d9539db8638 pidfs: remove config option
WARNING in __sk_destruct batman fs -1 2 517d 549d 25/29 503d 2a750d6a5b36 rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
WARNING in stashed_dentry_prune fs -1 C done 20 534d 533d 25/29 504d 9d9539db8638 pidfs: remove config option
WARNING: ODEBUG bug in bdev_super_lock fs -1 C 3 507d 518d 25/29 505d 59a55a63c246 fs,block: get holder during claim
KASAN: slab-use-after-free Read in sys_io_cancel fs 19 C done 894 505d 543d 25/29 505d 28468cbed92e Revert "fs/aio: Make io_cancel() generate completions again"
BUG: sleeping function called from invalid context in __getblk_gfp fs 5 C error done 3673 610d 1004d 25/29 505d f123dc86388c sysv: don't call sb_bread() with pointers_lock held
possible deadlock in reiserfs_dirty_inode fs 4 C done done 519 576d 1004d 25/29 526d 6f861765464f fs: Block writes to mounted block devices
BUG: sleeping function called from invalid context in __bread_gfp fs 5 C error done 359 602d 1003d 25/29 526d 6f861765464f fs: Block writes to mounted block devices
INFO: task hung in reiserfs_sync_fs fs 1 C error done 22 601d 981d 25/29 526d 6f861765464f fs: Block writes to mounted block devices
general protection fault in __fget_files (2) fs 2 C done done 1 609d 605d 25/29 553d 6f861765464f fs: Block writes to mounted block devices
BUG: unable to handle kernel paging request in reiserfs_readdir_inode fs 19 C error done 11 600d 965d 25/29 553d 6f861765464f fs: Block writes to mounted block devices
kernel BUG in entry_points_to_object fs -1 C done done 21 600d 645d 25/29 553d 6f861765464f fs: Block writes to mounted block devices
KASAN: vmalloc-out-of-bounds Read in cleanup_bitmap_list fs 17 C error done 100 603d 1034d 25/29 558d 6f861765464f fs: Block writes to mounted block devices
KASAN: use-after-free Read in set_de_name_and_namelen fs 19 C error done 15 606d 1007d 25/29 562d 6f861765464f fs: Block writes to mounted block devices
BUG: unable to handle kernel NULL pointer dereference in reiserfs_find_entry fs 19 C error done 25 609d 1045d 25/29 573d 6f861765464f fs: Block writes to mounted block devices
KASAN: use-after-free Read in reiserfs_get_unused_objectid fs 19 C inconclusive done 3 610d 883d 25/29 575d 6f861765464f fs: Block writes to mounted block devices
possible deadlock in chown_common fs 4 C error done 22 584d 1053d 25/29 576d 6f861765464f fs: Block writes to mounted block devices
kernel BUG in balance_leaf fs -1 C error done 16 615d 967d 25/29 576d 6f861765464f fs: Block writes to mounted block devices
possible deadlock in pipe_write fs 4 C inconclusive 181 578d 1256d 25/29 576d 055ca8355991 fs/pipe: Fix lockdep false-positive in watchqueue pipe_write()
kernel BUG in direntry_check_right fs -1 C done done 2 614d 658d 25/29 576d 6f861765464f fs: Block writes to mounted block devices
KASAN: slab-out-of-bounds Read in search_by_key (2) fs 17 C 4435 597d 1029d 25/29 576d dd8f87f21dc3 reiserfs: fix uninit-value in comp_keys
INFO: trying to register non-static key in debugfs_file_get fs -1 289 616d 616d 25/29 583d 88ac06a9f938 Revert "debugfs: annotate debugfs handlers vs. removal with lockdep"
WARNING in debugfs_file_get fs -1 239 617d 634d 25/29 583d 88ac06a9f938 Revert "debugfs: annotate debugfs handlers vs. removal with lockdep"
WARNING in pagemap_scan_pmd_entry fs -1 C inconclusive 48 629d 652d 25/29 585d 0dff1b407def mm/pagemap: fix ioctl(PAGEMAP_SCAN) on vma check
WARNING in page_copy_sane mm fs -1 C done 3 714d 710d 25/29 616d a08c7193e4f1 mm/filemap: remove hugetlb special casing in filemap.c
INFO: rcu detected stall in statfs fs 1 1 746d 746d 23/29 686d 8c21ab1bae94 net/sched: fq_pie: avoid stalls in fq_pie_timer()
possible deadlock in inode_add_bytes fs 4 C done 124 773d 772d 23/29 686d 509f006932de shmem: fix quota lock nesting in huge hole handling
INFO: task hung in pipe_release (4) fs 1 C done 51 778d 778d 23/29 686d 0f71c9caf267 udp: Fix __ip_append_data()'s handling of MSG_SPLICE_PAGES
KASAN: slab-use-after-free Read in test_bdev_super_fc fs 19 C done 7 753d 755d 23/29 686d aca740cecbe5 fs: open block device after superblock creation
KMSAN: uninit-value in reiserfs_security_init fs 7 4169 780d 840d 23/29 700d d031f4e8b493 reiserfs: Initialize sec->length in reiserfs_security_init().
general protection fault in splice_to_socket fs 2 C done 4 805d 808d 23/29 700d ca2d49f77ce4 splice, net: Fix splice_to_socket() to handle pipe bufs larger than a page
KASAN: null-ptr-deref Write in get_block (2) fs 12 C error 11 795d 828d 23/29 700d ea2b62f30589 fs/sysv: Null check to prevent null-ptr-deref bug
KCSAN: data-race in inotify_handle_inode_event / inotify_remove_from_idr fs 6 363 843d 857d 22/29 789d c915d8f5918b inotify: Avoid reporting event with invalid wd
possible deadlock in do_writepages fs mm 4 15 854d 857d 22/29 789d 00d873c17e29 ext4: avoid deadlock in fs reclaim with page writeback
KASAN: null-ptr-deref Read in ida_free (3) fs 11 C error 4 886d 882d 22/29 812d cb2239c198ad fs: drop peer group ids under namespace lock
KMSAN: uninit-value in ondemand_readahead fs mm 7 C 221 909d 1073d 22/29 812d 3e35102666f8 fs/cramfs/inode.c: initialize file_ra_state
INFO: task hung in write_cache_pages (2) fs mm 1 C done 36 839d 910d 22/29 812d fb3592c41a44 migrate_pages: fix deadlock in batched migration
KMSAN: uninit-value in vfs_write fs 7 C 3 935d 905d 22/29 812d 2b4c99f7d9a5 can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write
KASAN: use-after-free Read in mas_next_nentry mm fs 19 C error done 343 1025d 1219d 22/29 916d 59f2f4b8a757 fs/userfaultfd: Fix maple tree iterator in userfaultfd_unregister()
linux-next boot error: kernel BUG in putname fs -1 1 1108d 1108d 22/29 916d 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
kernel panic: corrupted stack end in tun_chr_close fs 2 1 1207d 1207d 22/29 916d b81d591386c3 riscv: Increase stack size under KASAN
INFO: rcu detected stall in sys_lsetxattr fs 1 C done 2 1227d 1227d 22/29 916d 0014edaedfd8 fs: unset MNT_WRITE_HOLD on failure
upstream boot error: general protection fault in __proc_create fs -1 1 1110d 1110d 22/29 916d 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
INFO: rcu detected stall in sys_setxattr (2) fs 1 C done 3 1227d 1227d 22/29 916d 0014edaedfd8 fs: unset MNT_WRITE_HOLD on failure
general protection fault in __dentry_path (2) fs 8 C error 174 1221d 1231d 22/29 916d 5c697c367a66 KVM: Initialize debugfs_dentry when a VM is created to avoid NULL deref
WARNING in mntput_no_expire (3) fs -1 C inconclusive 29 966d 1381d 22/29 916d a91714312eb1 percpu_ref_init(): clean ->percpu_count_ref on failure
kernel panic: stack is corrupted in ksys_write fs 2 1 1089d 1085d 22/29 916d b81d591386c3 riscv: Increase stack size under KASAN
KASAN: slab-out-of-bounds Read in __fscache_acquire_volume fs mm 17 C done done 1 1095d 1094d 22/29 916d 9f0933ac026f fscache: fix OOB Read in __fscache_acquire_volume
KASAN: use-after-free Read in do_sync_mmap_readahead fs mm 19 1 1195d 1191d 22/29 916d dcfa24ba6899 filemap: Cache the value of vm_flags
usb-testing boot error: general protection fault in rcu_core fs mm -1 23 1090d 1108d 22/29 916d 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
KASAN: null-ptr-deref Write in io_file_get_normal io-uring fs 12 C done 107 1161d 1246d 22/29 916d d5361233e9ab io_uring: drop the old style inflight file tracking
usb-testing boot error: BUG: unable to handle kernel paging request in insert_header fs -1 1 1094d 1094d 22/29 916d 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
memory leak in iovec_from_user fs io-uring 3 C 1 1233d 1229d 22/29 916d 323b190ba2de io_uring: free iovec if file assignment fails
KCSAN: data-race in do_epoll_wait / do_epoll_wait fs 6 83 1191d 1400d 22/29 916d d679ae94fdd5 list: fix a data-race around ep->rdllist
usb-testing boot error: general protection fault in __register_sysctl_table (2) fs -1 1 1094d 1094d 22/29 916d 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
BUG: unable to handle kernel paging request in truncate_inode_partial_folio mm fs 8 C error 4 1117d 1156d 22/29 916d 84ac013046cc secretmem: fix unhandled fault in truncate
kernel BUG in ntfs_read_inode_mount fs -1 1 1320d 1319d 22/29 916d 714fbf2647b1 ntfs: add sanity check on allocation size
kernel panic: corrupted stack end in lo_ioctl mm fs 2 4 922d 1044d 22/29 916d b81d591386c3 riscv: Increase stack size under KASAN
general protection fault in legacy_parse_param fs 23 C done 20 1256d 1517d 22/29 916d ecff30575b5a LSM: general protection fault in legacy_parse_param
KASAN: use-after-free Read in io_rsrc_node_ref_zero fs 19 C done 3 1284d 1283d 22/29 916d 80912cef18f1 io_uring: disallow modification of rsrc_data during quiesce
KASAN: use-after-free Read in add_wait_queue fs io-uring 19 C done done 13 1248d 1255d 22/29 916d d89a4fac0fbc io_uring: fix assuming triggered poll waitqueue is the single poll
BUG: unable to handle kernel NULL pointer dereference in io_do_iopoll fs io-uring 10 C done 3 1200d 1199d 22/29 916d aa184e8671f0 io_uring: don't attempt to IOPOLL for MSG_RING requests
possible deadlock in snd_hrtimer_callback (2) fs 4 C inconclusive 582 1120d 1387d 22/29 916d 96b097091c66 ALSA: pcm: Use deferred fasync helper 95cc637c1afd ALSA: timer: Use deferred fasync helper
BUG: unable to handle kernel paging request in eventfd_ctx_put fs 8 C done 7 1040d 1069d 22/29 916d 7353633814f6 KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()
KMSAN: uninit-value in tomoyo_path_chown fs 7 C 13763 1073d 1074d 22/29 916d f52d74b190f8 open: always initialize ownership fields
KASAN: use-after-free Read in filp_close io-uring fs 19 C done 17 957d 1186d 22/29 916d 40a1926022d1 fix the breakage in close_fd_get_file() calling conventions change
usb-testing boot error: kernel BUG in putname fs -1 1 1094d 1094d 22/29 916d 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
KASAN: use-after-free Read in mas_next_entry fs mm 19 C error 16 1026d 1040d 22/29 916d 59f2f4b8a757 fs/userfaultfd: Fix maple tree iterator in userfaultfd_unregister()
UBSAN: array-index-out-of-bounds in io_submit_sqes fs 15 4 1184d 1185d 22/29 916d fcde59feb1af io_uring: add io_op_defs 'def' pointer in req init and issue
kernel panic: corrupted stack end in loop_control_ioctl fs 2 2 1038d 1122d 22/29 916d b81d591386c3 riscv: Increase stack size under KASAN
possible deadlock in snd_timer_notify (2) fs 4 151 1121d 1384d 22/29 916d 95cc637c1afd ALSA: timer: Use deferred fasync helper
WARNING: still has locks held in io_ring_submit_lock fs io-uring 4 C done 3 1200d 1201d 22/29 916d e7637a492b9f io_uring: fix locking state for empty buffer group
KCSAN: data-race in call_rcu / rcu_gp_kthread fs 6 1 1508d 1508d 20/29 1269d 2431774f04d1 rcu: Mark accesses to rcu_state.n_force_qs
general protection fault in io_uring_register io-uring fs 2 syz done 1 1448d 1444d 20/29 1269d 41d3a6bd1d37 io_uring: pin SQPOLL data before unlocking ring lock
KASAN: use-after-free Write in io_queue_worker_create fs io-uring 24 C unreliable 132 1352d 1361d 20/29 1269d 71a85387546e io-wq: check for wq exit after adding new worker task_work e47498afeca9 io-wq: remove spurious bit clear on task_work addition
possible deadlock in io_flush_timeouts fs 4 5 1369d 1371d 20/29 1269d 6af3f48bf615 io_uring: fix link traversal locking
INFO: task hung in io_uring_del_tctx_node io-uring fs 1 C unreliable 37 1271d 1434d 20/29 1269d 8bab4c09f24e io_uring: allow conditional reschedule for intensive iterators
KASAN: use-after-free Write in io_submit_one fs 24 C done 11 1356d 1393d 20/29 1269d 75feae73a280 block: fix single bio async DIO error handling
KCSAN: data-race in call_rcu / rcu_gp_fqs_loop fs 6 1 1405d 1403d 20/29 1269d 2431774f04d1 rcu: Mark accesses to rcu_state.n_force_qs
inconsistent lock state in io_poll_remove_all fs 4 63 1369d 1371d 20/29 1269d 6af3f48bf615 io_uring: fix link traversal locking
WARNING in inc_nlink (2) fs -1 C inconclusive done 21 1269d 1606d 20/29 1269d 97f044f690ba fuse: don't increment nlink in link()
possible deadlock in io_worker_cancel_cb fs io-uring 4 C done 9 1350d 1354d 20/29 1269d d800c65c2d4e io-wq: drop wqe lock before creating new worker
INFO: task hung in io_uring_try_cancel_requests fs io-uring 1 C error 41 1358d 1400d 20/29 1269d f75d118349be io_uring: harder fdinfo sq/cq ring iterating
WARNING in io_try_cancel_userdata (2) fs -1 1 1375d 1371d 20/29 1269d 617a89484deb io_uring: fail cancellation for EXITING tasks
WARNING in signalfd_cleanup fs io-uring -1 C done 201 1315d 1331d 20/29 1269d 791f3465c4af io_uring: fix UAF due to missing POLLFREE handling
INFO: rcu detected stall in newstat fs usb 1 C unreliable done 4 1363d 1486d 20/29 1269d 476db72e5219 media: mceusb: return without resubmitting URB in case of -EPROTO error.
INFO: task hung in io_uring_cancel_generic (2) io-uring fs 1 C done 97 1352d 1379d 20/29 1269d 78a780602075 io_uring: ensure task_work gets run as part of cancelations
INFO: rcu detected stall in io_wqe_worker (2) io-uring fs 1 C done 2 1401d 1401d 20/29 1269d c5e0321e43de Revert "devlink: Remove not-executed trap policer notifications"
possible deadlock in io_poll_double_wake (3) io-uring fs 4 C error done 703 1324d 1597d 20/29 1269d aa43477b0402 io_uring: poll rework
INFO: task hung in io_wqe_worker fs io-uring 1 C unreliable 3 1410d 1406d 20/29 1269d 1d5f5ea7cb7d io-wq: remove worker to owner tw dependency
KASAN: null-ptr-deref Read in filp_close (2) fs 19 C 3 1507d 1616d 20/29 1387d 3b0462726e7e cgroup: verify that source is a string 9b5b872215fe file: fix close_range() for unshare+cloexec
WARNING in io_sq_thread_park fs -1 1 1619d 1619d 20/29 1387d a185f1db59f1 io_uring: do ctx sqd ejection in a clear context
possible deadlock in snd_timer_notify fs 4 119 1389d 1495d 20/29 1387d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
memory leak in io_sqe_buffers_register fs 3 C 2 1580d 1581d 20/29 1387d bb6659cc0ad3 io_uring: Fix memory leak in io_sqe_buffers_register()
WARNING in io_link_timeout_fn fs io-uring -1 C done 2 1569d 1568d 20/29 1387d 447c19f3b507 io_uring: fix ltout double free on completion race
KASAN: out-of-bounds Read in leaf_paste_entries fs 17 C inconclusive 8 1419d 1650d 20/29 1387d 13d257503c09 reiserfs: check directory items on read from disk
upstream boot error: kernel panic: VFS: Unable to mount root fs on unknown-block(0,0) fs -1 235 1509d 1517d 20/29 1387d c43ddbf97f46 scsi: virtio_scsi: Do not overwrite SCSI status
WARNING: suspicious RCU usage in count (2) fs mm 4 1 1560d 1560d 20/29 1387d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in io_commit_cqring (2) fs io-uring 12 C done 82 1599d 1613d 20/29 1387d 51520426f4bc io_uring: handle setup-failed ctx in kill_timeouts
INFO: task hung in io_sq_thread_park (2) fs io-uring 1 syz done 2 1509d 1505d 20/29 1387d 46fee9ab02cb io_uring: remove double poll entry on arm failure
KCSAN: data-race in __io_uring_cancel / io_uring_try_cancel_requests fs 6 3 1553d 1555d 20/29 1387d b16ef427adf3 io_uring: fix data race to avoid potential NULL-deref
WARNING in __percpu_ref_exit (2) fs -1 C error done 31 1388d 1627d 20/29 1387d a298232ee6b9 io_uring: fix link timeout refs
INFO: task hung in __io_uring_cancel fs io-uring 1 C done 5 1525d 1591d 20/29 1387d 28090c133869 io_uring: fix work_exit sqpoll cancellations
possible deadlock in _snd_pcm_stream_lock_irqsave (2) fs 4 120 1388d 1495d 20/29 1387d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
memory leak in create_io_worker io-uring fs 3 C 5 1410d 1449d 20/29 1387d 66e70be72288 io-wq: fix memory leak in create_io_worker()
WARNING in io_wqe_enqueue io-uring fs -1 C done 13 1546d 1546d 20/29 1387d e6ab8991c5d0 io_uring: fix false WARN_ONCE
usb-testing boot error: kernel panic: VFS: Unable to mount root fs on unknown-block(0,0) fs -1 27 1508d 1513d 20/29 1387d c43ddbf97f46 scsi: virtio_scsi: Do not overwrite SCSI status
possible deadlock in snd_pcm_period_elapsed (2) fs 4 52 1389d 1495d 20/29 1387d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
WARNING in io_poll_double_wake fs io-uring -1 C done done 1124 1489d 1590d 20/29 1387d a890d01e4ee0 io_uring: fix poll requests leaking second poll entries
general protection fault in cdev_del (2) fs 11 C error 45 1521d 1799d 20/29 1387d 8a12f8836145 net: hso: fix null-ptr-deref during tty device unregistration 0a360e8b65d6 tty: n_gsm: check error while registering tty devices
INFO: task hung in io_wq_put_and_exit io-uring fs 1 C unreliable 628 1388d 1449d 20/29 1387d 3b33e3f4a6c0 io-wq: fix silly logic error in io_task_work_match()
possible deadlock in do_fcntl usb fs 4 C done 245 1463d 1795d 20/29 1387d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
WARNING: suspicious RCU usage in kernel_execve mm fs 4 1 1524d 1524d 20/29 1387d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING: refcount bug in __io_queue_sqe fs 13 1 1589d 1580d 20/29 1387d a298232ee6b9 io_uring: fix link timeout refs
BUG: unable to handle kernel NULL pointer dereference in kiocb_done fs io-uring 10 C unreliable done 3 1455d 1454d 20/29 1387d b8ce1b9d25cc io_uring: don't submit half-prepared drain request
possible deadlock in io_uring_register fs 4 16 1447d 1449d 20/29 1387d 009ad9f0c6ee io_uring: drop ctx->uring_lock before acquiring sqd->lock
WARNING in io_try_cancel_userdata fs io-uring -1 syz unreliable 4 1462d 1466d 20/29 1387d dadebc350da2 io_uring: fix io_try_cancel_userdata race for iowq
KMSAN: kernel-infoleak in copy_page_to_iter (2) mm fs 9 C 2099 1483d 2541d 20/29 1387d ce3aba43599f ext4: fix kernel infoleak via ext4_extent_header
KASAN: use-after-free Read in io_worker_handle_work fs 19 2 1532d 1562d 20/29 1387d 3743c1723bfc io-wq: Fix UAF when wakeup wqe in hash waitqueue
WARNING: suspicious RCU usage in proc_alloc_inode fs 4 1 1529d 1529d 20/29 1387d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING in mntput_no_expire (2) fs -1 C done 68 1395d 1610d 20/29 1387d 7d01ef7585c0 Make sure nd->path.mnt and nd->path.dentry are always valid pointers
WARNING: suspicious RCU usage in __fput fs 4 1 1555d 1555d 20/29 1387d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in __io_file_supports_nowait fs io-uring 2 C done done 13 1452d 1457d 20/29 1387d c6d3d9cbd659 io_uring: fix queueing half-created requests
KASAN: use-after-free Read in bdev_evict_inode fs 19 C unreliable 1305 1472d 1475d 20/29 1387d 889c05cc5834 block: ensure the bdi is freed after inode_detach_wb
WARNING in pvr2_i2c_core_done usb fs -1 C error 5780 1508d 2164d 20/29 1387d f8194e5e63fd media: pvrusb2: fix warning in pvr2_i2c_core_done
INFO: task hung in io_uring_cancel_generic io-uring fs 1 C unreliable 151 1387d 1509d 20/29 1387d 1b48773f9fd0 io_uring: fix io_drain_req()
WARNING: suspicious RCU usage in getname_flags fs 4 2 1516d 1607d 20/29 1387d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
KASAN: use-after-free Read in __d_alloc (2) fs 19 C unreliable 6774 1429d 1473d 20/29 1387d 0766ec82e5fb namei: Fix use after free in kern_path_locked
possible deadlock in f_getown fs 4 C done done 164 1465d 1795d 20/29 1387d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
possible deadlock in snd_hrtimer_callback fs 4 C done 571 1388d 1495d 20/29 1387d f671a691e299 fcntl: fix potential deadlocks for &fown_struct.lock
possible deadlock in io_sq_thread_finish fs 4 C unreliable done 4 1633d 1635d 20/29 1387d f4e61f0c9add x86/kvm: Fix broken irq restoration in kvm_wait
WARNING: suspicious RCU usage in __alloc_file fs 4 1 1575d 1575d 20/29 1387d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
WARNING in io_rsrc_node_switch io-uring fs -1 C done 174 1573d 1582d 20/29 1387d 47b228ce6f66 io_uring: fix unchecked error in switch_start()
WARNING in io_wq_submit_work (2) io-uring fs -1 C done done 52 1447d 1449d 20/29 1387d 713b9825a4c4 io-wq: fix cancellation on create-worker failure
KASAN: null-ptr-deref Write in io_uring_cancel_sqpoll fs 12 170 1389d 1644d 20/29 1387d 6d042ffb598e io_uring: Check current->io_uring in io_uring_cancel_sqpoll
KASAN: stack-out-of-bounds Read in iov_iter_revert fs io-uring 17 C error 14 1460d 1477d 20/29 1387d 89c2b3b74918 io_uring: reexpand under-reexpanded iters
WARNING in internal_create_group fs -1 C inconclusive 20 1452d 1505d 20/29 1387d b1a811633f73 block: nbd: add sanity check for first_minor
kernel BUG in remove_inode_hugepages fs mm -1 C unreliable 3 1472d 1472d 20/29 1387d c7b1850dfb41 hugetlb: don't pass page cache pages to restore_reserve_on_error
WARNING in io_wq_put fs io-uring -1 C unreliable 3 1621d 1633d 20/29 1387d f5d2d23bf0d9 io-wq: fix race around pending work on teardown
WARNING in io_uring_setup (2) fs io-uring -1 C done 40 1573d 1582d 20/29 1387d 47b228ce6f66 io_uring: fix unchecked error in switch_start()
INFO: task can't die in d_alloc_parallel fs 1 2 1696d 1713d 20/29 1550d 0ce20dd84089 mm: add Kernel Electric-Fence infrastructure
KASAN: use-after-free Read in idr_for_each (2) io-uring fs 19 C error done 86 1626d 1788d 20/29 1591d 61cf93700fe6 io_uring: Convert personality_idr to XArray
INFO: task hung in io_uring_cancel_task_requests io-uring fs 1 C 305 1626d 1660d 20/29 1601d 34343786ecc5 io_uring: unpark SQPOLL thread for cancelation
KASAN: use-after-free Read in tctx_task_work fs 19 2 1645d 1642d 20/29 1601d 2c32395d8111 io_uring: fix __tctx_task_work() ctx race
KASAN: invalid-free in io_req_caches_free fs 22 5 1645d 1648d 20/29 1601d 8e5c66c485a8 io_uring: clear request count when freeing caches
INFO: task hung in io_sq_thread_park fs io-uring 1 C unreliable 263 1636d 1641d 20/29 1601d 3ebba796fa25 io_uring: ensure that SQPOLL thread is started for exit
memory leak in io_submit_sqes (2) fs io-uring 3 C 1 1639d 1638d 20/29 1601d f01272541d2c io-wq: ensure all pending work is canceled on exit
possible deadlock in io_poll_double_wake (2) io-uring fs 4 C error error 431 1602d 1794d 20/29 1601d 1c3b3e6527e5 io_uring: ignore double poll add on the same waitqueue head
inconsistent lock state in io_dismantle_req fs io-uring 4 C 2 1669d 1669d 20/29 1601d 9ae1f8dd372e io_uring: fix inconsistent lock state
general protection fault in io_sqe_files_unregister fs 2 2 1694d 1692d 19/29 1632d 3e2224c5867f io_uring: Fix return value from alloc_fixed_file_ref_node
kernel BUG at mm/page-writeback.c:LINE! fs mm -1 1 1702d 1698d 19/29 1632d c2407cf7d22d mm: make wait_on_page_writeback() wait for multiple pending writebacks
WARNING in io_uring_flush fs io-uring -1 C unreliable 10 1676d 1686d 19/29 1632d 4325cb498cb7 io_uring: fix uring_flush in exit_files() warning
KASAN: use-after-free Read in search_by_entry_key fs 19 C done 3 1781d 1785d 19/29 1632d d24396c5290b reiserfs: add check for an invalid ih_entry_count
WARNING in percpu_ref_kill_and_confirm (2) fs -1 C done 71 1707d 1715d 19/29 1632d 9faadcc8abe4 io_uring: fix double io_uring free
WARNING in io_ring_ctx_wait_and_kill fs -1 C done 9 1687d 1688d 19/29 1632d 06585c497b55 io_uring: do sqo disable on install_fd error
INFO: task hung in __io_uring_files_cancel io-uring fs 1 C done 30 1673d 1740d 19/29 1632d bee749b187ac io_uring: fix files cancellation
KASAN: use-after-free Read in reiserfs_fill_super fs 19 C error done 2 1726d 1725d 19/29 1632d d24396c5290b reiserfs: add check for an invalid ih_entry_count
BUG: unable to handle kernel paging request in percpu_ref_exit fs 8 C done 3 1694d 1692d 19/29 1632d 3e2224c5867f io_uring: Fix return value from alloc_fixed_file_ref_node
INFO: task can't die in io_sq_thread_stop fs 1 1 1751d 1747d 19/29 1632d 65b2b213484a io_uring: check kthread stopped flag when sq thread is unparked
general protection fault in io_disable_sqo_submit fs io-uring 2 C done 124 1684d 1688d 19/29 1632d b4411616c26f io_uring: fix null-deref in io_disable_sqo_submit
WARNING in io_uring_cancel_task_requests io-uring fs -1 syz done 69 1669d 1673d 19/29 1632d 70b2c60d3797 io_uring: fix sqo ownership false positive warning
inconsistent lock state in io_file_data_ref_zero fs 4 C done 7152 1715d 1739d 19/29 1632d ac0648a56c1f io_uring: use bottom half safe lock for fixed file data
BUG: corrupted list in io_file_get fs io-uring 8 C done 3 1672d 1673d 19/29 1632d f609cbb8911e io_uring: fix list corruption for splice file_get
WARNING in io_wq_submit_work fs -1 4 1679d 1684d 19/29 1632d ca70f00bed6c io_uring: fix cancellation taking mutex while TASK_UNINTERRUPTIBLE
possible deadlock in send_sigio (2) fs 4 C done done 40 1702d 1814d 19/29 1632d 8d1ddb5e7937 fcntl: Fix potential deadlock in send_sig{io, urg}()
kernel BUG at fs/reiserfs/prints.c:LINE! fs -1 C done done 5 1723d 1802d 19/29 1632d d24396c5290b reiserfs: add check for an invalid ih_entry_count
memory leak in generic_parse_monolithic fs 3 C 11 1723d 1749d 19/29 1632d 4cb682964706 afs: Fix memory leak when mounting with multiple source parameters
KASAN: slab-out-of-bounds Write in record_print_text fs 23 C done unreliable 17 1673d 1676d 19/29 1632d 08d60e599954 printk: fix string termination for record_print_text()
BUG: unable to handle kernel NULL pointer dereference in __lookup_slow fs 10 C inconclusive done 3 1655d 1795d 19/29 1632d d24396c5290b reiserfs: add check for an invalid ih_entry_count
possible deadlock in send_sigurg (2) fs 4 C done 25 1719d 1770d 19/29 1632d 8d1ddb5e7937 fcntl: Fix potential deadlock in send_sig{io, urg}()
possible deadlock in proc_pid_syscall (2) fs 4 2 1816d 1826d 19/29 1632d f7cfd871ae0c exec: Transform exec_update_mutex into a rw_semaphore 78af4dc949da perf: Break deadlock involving exec_update_mutex
WARNING in io_disable_sqo_submit fs -1 C done 9 1677d 1685d 19/29 1632d 6b393a1ff174 io_uring: fix false positive sqo warning on flush
KASAN: null-ptr-deref Read in filp_close fs 11 C done 9 1713d 1715d 19/29 1632d fec8a6a69103 close_range: unshare all fds for CLOSE_RANGE_UNSHARE | CLOSE_RANGE_CLOEXEC 6abc20f8f879 selftests/core: add regression test for CLOSE_RANGE_UNSHARE | CLOSE_RANGE_CLOEXEC
possible deadlock in io_timeout_fn (2) fs 4 4 1694d 1701d 19/29 1632d 4aa84f2ffa81 io_uring: dont kill fasync under completion_lock
KASAN: null-ptr-deref Write in kthread_use_mm fs io-uring 12 C done 2 1760d 1760d 15/29 1742d 4b70cf9dea4c io_uring: ensure consistent view of original task ->mm from SQPOLL
general protection fault in io_uring_show_cred fs 2 C done 4 1757d 1757d 15/29 1742d 6b47ab81c9a9 io_uring: use correct pointer for io_uring_show_cred()
KASAN: use-after-free Write in io_submit_sqes io-uring fs 24 C error 2 1760d 1759d 15/29 1742d cb8a8ae31074 io_uring: drop req/tctx io_identity separately
INFO: task can't die in corrupted fs 1 C done 4 1759d 1786d 15/29 1746d 86f33603f8c5 f2fs: handle errors of f2fs_get_meta_page_nofail
WARNING in unlock_new_inode fs -1 C done 76 1783d 2688d 15/29 1746d 8859bf2b1278 reiserfs: only call unlock_new_inode() if I_NEW
memory leak in reiserfs_parse_options fs 3 C 4 1810d 2005d 15/29 1746d e9d4709fcc26 reiserfs: Fix memory leak in reiserfs_parse_options()
general protection fault in percpu_ref_exit fs 2 C done 3 1781d 1785d 15/29 1746d 7ea6bf2e6c40 percpu_ref: don't refer to ref->data if it isn't allocated
KASAN: use-after-free Read in fscache_alloc_cookie fs 19 syz done 1 1798d 1798d 15/29 1746d 1d0e850a49a5 afs: Fix cell removal
KASAN: use-after-free Read in io_wqe_worker fs io-uring 19 C error 2 1795d 1797d 15/29 1746d c4068bf898dd io-wq: fix use-after-free in io_wq_worker_running
WARNING: suspicious RCU usage in io_init_identity fs 4 1536 1772d 1777d 15/29 1746d 1e6fa5216a0e io_uring: COW io_identity on mismatch
inconsistent lock state in xa_destroy io-uring fs 4 C 755 1784d 1785d 15/29 1746d ca6484cd308a io_uring: no need to call xa_destroy() on empty xarray
INFO: task hung in io_uring_flush io-uring fs 1 C done done 11 1836d 1844d 15/29 1746d b7ddce3cbf01 io_uring: fix cancel of deferred reqs with ->files
general protection fault in open_xa_dir fs 2 C done 3 1781d 1793d 15/29 1746d c2bb80b8bdd0 reiserfs: Fix oops during mount
KMSAN: uninit-value in search_by_key fs 7 1549 1751d 1802d 15/29 1746d 4443390e08d3 reiserfs: Initialize inode keys properly
KASAN: use-after-free Write in io_wq_worker_running io-uring fs 24 C error 14 1789d 1815d 15/29 1746d c4068bf898dd io-wq: fix use-after-free in io_wq_worker_running
KMSAN: uninit-value in __fget_light (2) fs 7 C 18 1763d 1772d 15/29 1746d d5e4d0a5e692 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
possible deadlock in mnt_want_write fs 4 C done done 662 1785d 2593d 15/29 1746d 146d62e5a586 ovl: detect overlapping layers
general protection fault in __do_sys_io_uring_register fs 2 80 1772d 1779d 15/29 1746d 55cbc2564ab2 io_uring: fix error path cleanup in io_sqe_files_register()
inconsistent lock state in io_uring_add_task_file fs 4 1 1785d 1784d 15/29 1746d ce765372bc44 io_uring: Fix use of XArray in __io_uring_files_cancel
KMSAN: uninit-value in qtree_entry_unused fs 7 396 1750d 1802d 15/29 1746d 3d3dc274ce73 quota: clear padding in v2r1_mem2diskdqb()
general protection fault in io_poll_double_wake (2) io-uring fs 2 C error 2 1796d 1795d 15/29 1772d 8706e04ed7d6 io_uring: always delete double poll wait entry on match
possible deadlock in io_write fs 4 2 1793d 1795d 15/29 1772d fad8e0de4426 io_uring: fix potential ABBA deadlock in ->show_fdinfo()
memory leak in do_eventfd fs 3 C 2 1830d 1925d 15/29 1783d f65886606c2d KVM: fix memory leak in kvm_io_bus_unregister_dev()
upstream boot error: KASAN: global-out-of-bounds Read in internal_create_group fs -1 273 1829d 1842d 15/29 1798d 62c789270c0b libnvdimm: KASAN: global-out-of-bounds Read in internal_create_group
possible deadlock in __io_queue_deferred fs io-uring 4 C error 1 1845d 1844d 15/29 1806d 7271ef3a93a8 io_uring: fix recursive completion locking on oveflow flush
WARNING in __kernel_read fs -1 C done 60 1814d 1872d 15/29 1806d a39c46067c84 net/9p: validate fds in p9_fd_open
general protection fault in cdev_del usb fs 2 C 315 1816d 2284d 15/29 1806d e911e99a0770 usb: hso: check for return value in hso_serial_common_create()
BUG: unable to handle kernel NULL pointer dereference in loop_rw_iter io-uring fs 10 C done 24 1832d 1844d 15/29 1806d 2dd2111d0d38 io_uring: Fix NULL pointer dereference in loop_rw_iter()
KASAN: use-after-free Read in io_async_task_func io-uring fs 19 syz error 1 1843d 1843d 15/29 1806d 6d816e088c35 io_uring: hold 'ctx' reference around task_work queue + execute
WARNING in drop_nlink fs -1 C done error 1 1954d 1950d 15/29 1806d facb03dddec0 fs/minix: don't allow getting deleted inodes
KASAN: use-after-free Read in ceph_mdsc_destroy ceph fs 19 4 1846d 1862d 15/29 1806d a7caa88f8b72 ceph: fix use-after-free for fsc->mdsc
KASAN: use-after-free Read in path_init (2) fs 19 C done 29 1841d 1842d 15/29 1806d 24fb33d40d60 fix breakage in do_rmdir()
WARNING in __kernel_write fs -1 C done 522 1855d 1875d 15/29 1806d a39c46067c84 net/9p: validate fds in p9_fd_open
KMSAN: uninit-value in get_block fs 7 C 13 1922d 1925d 15/29 1806d 270ef41094e9 fs/minix: reject too-large maximum file size
KASAN: null-ptr-deref Write in get_block fs 12 C done 101 1872d 1986d 15/29 1806d da27e0a0e5f6 fs/minix: check return value of sb_getblk()
memory leak in io_submit_sqes fs io-uring 3 C 2 1824d 1843d 15/29 1806d a36da65c4656 io_uring: fail poll arm on queue proc failure
KASAN: use-after-free Write in get_block fs 24 C inconclusive inconclusive 12 1889d 1939d 15/29 1806d 270ef41094e9 fs/minix: reject too-large maximum file size
general protection fault in io_poll_double_wake io-uring fs 2 C done 8 1811d 1839d 15/29 1806d d4e7cd36a90e io_uring: sanitize double poll handling
KASAN: use-after-free Read in lockref_get fs 19 7 1910d 2010d 15/29 1806d bad8e64fb19d blktrace: fix debugfs use after free
KASAN: use-after-free Read in io_uring_setup (2) fs 19 1 1855d 1854d 15/29 1806d d1719f70d0a5 io_uring: don't touch 'ctx' after installing file descriptor
possible deadlock in io_timeout_fn io-uring fs 4 C done 4 1841d 1844d 15/29 1806d 51a4cc112c7a io_uring: defer file table grabbing request cleanup for locked requests
possible deadlock in lock_trace (3) fs 4 syz inconclusive done 69 1974d 2109d 15/29 1835d 2db9dbf71bf9 proc: Use new infrastructure to fix deadlocks in execve
possible deadlock in do_io_accounting (3) fs 4 C inconclusive done 39 1981d 2071d 15/29 1835d 76518d379885 proc: io_accounting: Use new infrastructure to fix deadlocks in execve
possible deadlock in proc_pid_personality fs 4 syz inconclusive done 3 1991d 2000d 15/29 1835d 2db9dbf71bf9 proc: Use new infrastructure to fix deadlocks in execve
WARNING: bad unlock balance in rcu_lock_release fs 4 C inconclusive done 1433 1976d 2258d 15/29 1836d 10476e630422 locking/lockdep: Fix bad recursion pattern
WARNING: bad unlock balance in rcu_core fs 4 C inconclusive done 3578 1972d 2328d 15/29 1836d 10476e630422 locking/lockdep: Fix bad recursion pattern
KASAN: use-after-free Write in fsnotify_detach_connector_from_object fs 24 C done 4 1898d 1903d 15/29 1868d ef1548adada5 proc: Use new_inode not new_inode_pseudo
BUG: unable to handle kernel NULL pointer dereference in number fs 10 1 1898d 1894d 15/29 1868d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
INFO: task hung in locks_remove_posix fs usb input 1 syz 2231 1903d 1925d 15/29 1868d 187b96db5ca7 x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks
linux-next boot error: general protection fault in tomoyo_get_local_path fs -1 18 1925d 1931d 15/29 1868d 9d78edeaec75 proc: proc_pid_ns takes super_block as an argument
general protection fault in proc_kill_sb fs 2 8 1893d 1905d 15/29 1868d 058f2e4da79b proc: s_fs_info may be NULL when proc_kill_sb is called
INFO: trying to register non-static key in io_cqring_ev_posted (3) fs -1 C done 3 1926d 1929d 15/29 1868d 583863ed9181 io_uring: initialize ctx->sqo_wait earlier
BUG: unable to handle kernel NULL pointer dereference in unlock_page mm fs 10 1 1899d 1899d 15/29 1868d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
general protection fault in start_creating fs 2 C done 106 1889d 1919d 15/29 1868d d56f5136b010 KVM: let kvm_destroy_vm_debugfs clean up vCPU debugfs directories
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_node_cpus (2) fs mm 6 9 1936d 2102d 15/29 1868d 314eeb43e5f2 rcu: Add *_ONCE() and data_race() to rcu_node ->exp_tasks plus locking
KASAN: use-after-free Read in blkdev_direct_IO fs 19 C done error 8 2213d 2218d 15/29 1884d 0eb6ddfb865c block: Fix __blkdev_direct_IO() for bio fragments
KASAN: use-after-free Read in blkdev_bio_end_io fs 19 C done error 13 2203d 2215d 15/29 1884d 7b6620d7db56 block: remove REQ_NOWAIT_INLINE
KASAN: use-after-free Read in dput (2) fs 19 syz done 4 1961d 1961d 15/29 1897d 4fa3b1c41737 proc: Handle umounts cleanly
INFO: rcu detected stall in io_uring_release fs 1 syz 15 1917d 1957d 15/29 1897d 3fd44c86711f io_uring: use cond_resched() in io_ring_ctx_wait_and_kill()
possible deadlock in io_submit_one (3) fs 4 syz done 45 1966d 1973d 15/29 1936d 63f818f46af9 proc: Use a dedicated lock in struct pid
INFO: task hung in io_queue_file_removal fs 1 C done 16 1978d 1986d 15/29 1936d 4afdb733b160 io-uring: drop completion when removing file
KMSAN: uninit-value in simple_attr_read fs 7 C 6 1939d 2009d 15/29 1936d a65cab7d7f05 libfs: fix infoleak in simple_attr_read()
possible deadlock in send_sigurg fs 4 C done 65 1959d 1973d 15/29 1936d 63f818f46af9 proc: Use a dedicated lock in struct pid
INFO: trying to register non-static key in __io_uring_register fs -1 C done 39 1967d 1969d 15/29 1936d f7fe9346869a io_uring: initialize fixed_file_data lock
INFO: trying to register non-static key in io_cqring_ev_posted (2) fs -1 C done 42 1939d 1976d 15/29 1936d 10bea96dcc13 io_uring: add missing finish_wait() in io_sq_thread()
possible deadlock in send_sigio fs 4 C done 7 1963d 1972d 15/29 1936d 63f818f46af9 proc: Use a dedicated lock in struct pid
memory leak in fasync_helper fs 3 C 14 2029d 2090d 15/29 1961d 67f562e3e147 net/smc: transfer fasync_list in case of fallback
BUG: sleeping function called from invalid context in __kmalloc ceph fs 5 C done 5 2022d 2029d 15/29 1961d b27a939e8376 ceph: canonicalize server path in place
WARNING: ODEBUG bug in io_sqe_files_unregister fs -1 C done 964 2030d 2077d 15/29 1995d 2faf852d1be8 io_uring: cleanup fixed file data table references
memory leak in reiserfs_fill_super fs 3 C 20 2037d 2086d 15/29 2018d 5474ca7da6f3 reiserfs: Fix memory leak of journal device string
KCSAN: data-race in __rcu_read_unlock / sync_rcu_exp_select_cpus mm fs 6 7 2030d 2124d 15/29 2018d c51f83c315c3 rcu: Use READ_ONCE() for ->expmask in rcu_read_unlock_special()
kernel BUG at fs/namei.c:LINE! fs -1 3593 2053d 2053d 15/29 2018d c64cd6e34ea3 reimplement path_mountpoint() with less magic
BUG: corrupted list in __dentry_kill (2) fs 8 C done 4945 2086d 2086d 15/29 2018d a3d1e7eb5abe simple_recursive_removal(): kernel-side rm -rf for ramfs-style filesystems
WARNING in do_dentry_open (2) fs -1 C done 17 2038d 2035d 15/29 2018d a37f4958f7b6 debugfs: Return -EPERM when locked down
KASAN: use-after-free Write in percpu_ref_switch_to_percpu fs 24 1 2032d 2031d 15/29 2018d 2faf852d1be8 io_uring: cleanup fixed file data table references
WARNING: refcount bug in chrdev_open fs 13 C inconclusive done 15 2097d 2199d 15/29 2018d 68faa679b8be chardev: Avoid potential use-after-free in 'chrdev_open()'
linux-next boot error: general protection fault in do_mount_root fs -1 9 2081d 2082d 15/29 2022d 7de7de7ca0ae Fix root mounting with no mount options
upstream boot error: general protection fault in do_mount_root fs -1 12 2082d 2082d 15/29 2022d 7de7de7ca0ae Fix root mounting with no mount options
kernel BUG at fs/pipe.c:LINE! fs -1 C done 693 2089d 2096d 15/29 2059d 8c7b8c34ae95 pipe: Remove assertion from pipe_poll()
general protection fault in io_commit_cqring fs 2 C done 3 2114d 2115d 15/29 2085d 15dff286d0e0 io_uring: check for validity of ->rings in teardown
INFO: task hung in io_wq_destroy fs 1 C done 20 2099d 2130d 15/29 2085d b60fda6000a9 io-wq: wait for io_wq_create() to setup necessary workers
INFO: trying to register non-static key in io_cqring_ev_posted fs -1 C done 6 2100d 2113d 15/29 2085d eb065d301e8c io_uring: io_allocate_scq_urings() should return a sane state
WARNING in iov_iter_pipe fs -1 C done 1117 2103d 2120d 15/29 2085d 419e9c38aa07 iomap: Fix pipe page leakage during splicing
BUG: unable to handle kernel paging request in io_wq_cancel_all fs 8 C done 2 2129d 2129d 15/29 2085d 975c99a57096 io_uring: io_wq_create() returns an error pointer, not NULL
KASAN: invalid-free in io_sqe_files_unregister fs 22 C done 3 2118d 2118d 15/29 2085d 46568e9be70f io_uring: fix error clear of ->file_table in io_sqe_files_register()
KASAN: use-after-free Read in do_mount fs 19 syz done 6 2143d 2151d 14/29 2099d 0ecee6699064 fs/namespace.c: fix use-after-free of mount in mnt_warn_timestamp_expiry()
KMSAN: use-after-free in hidraw_ioctl fs lsm 18 1 2151d 2151d 13/29 2101d 416dacb819f5 HID: hidraw: Fix invalid read in hidraw_ioctl
KASAN: use-after-free Read in io_uring_setup fs 19 syz error 1 2132d 2131d 13/29 2105d 044c1ab399af io_uring: don't touch ctx in setup after ring fd install
KASAN: use-after-free Read in ep_scan_ready_list fs 19 C done 39 2569d 2605d 13/29 2107d 430ac66eb4c5 net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
WARNING in mark_lock (2) fs -1 14 2138d 2165d 13/29 2131d 8e00c4e9dd85 writeback: fix use-after-free in finish_writeback_work()
general protection fault in finish_writeback_work fs 2 10 2140d 2165d 13/29 2131d 8e00c4e9dd85 writeback: fix use-after-free in finish_writeback_work()
INFO: trying to register non-static key in finish_writeback_work fs -1 syz error 1 2167d 2164d 13/29 2131d 8e00c4e9dd85 writeback: fix use-after-free in finish_writeback_work()
INFO: task syz-executor can't die for more than 143 seconds. fs -1 C done 61 2160d 2268d 13/29 2143d 8619e5bdeee8 /dev/mem: Bail out upon SIGKILL. 7c3a6aedcd6a kexec: bail out upon SIGKILL when allocating memory. 8f9e86ee7959 staging: android: ion: Bail out upon SIGKILL when allocating memory.
WARNING in kfree fs -1 C done 2 2191d 2189d 13/29 2143d 43ce4c1feadb vfs: Add a single-or-reconfig keying to vfs_get_super()
WARNING in __blkdev_put (2) fs -1 syz 3082 2208d 2215d 12/29 2182d e91455bad5cf bdev: Fixup error handling in blkdev_get()
kernel panic: corrupted stack end in dput fs 2 syz done 1 2250d 2250d 12/29 2193d 95fa145479fb bpf: sockmap/tls, close can race with map free
INFO: task hung in io_uring_release fs 1 24 2239d 2257d 12/29 2215d a4c0b3decb33 io_uring: fix io_sq_thread_stop running in front of io_sq_thread
general protection fault in do_move_mount (2) fs 2 syz done 7 2254d 2263d 12/29 2222d 570d7a98e7d6 vfs: move_mount: reject moving kernel internal mounts
possible deadlock in io_submit_one fs 4 C done 1779 2226d 2396d 12/29 2222d cbcfa130a911 fs/userfaultfd.c: disable irqs for fault_pending and event locks
possible deadlock in userfaultfd_read (2) fs mm 4 228 2245d 2344d 12/29 2222d cbcfa130a911 fs/userfaultfd.c: disable irqs for fault_pending and event locks
WARNING in notify_change fs -1 C 566 2309d 2698d 12/29 2227d f69e749a4935 Abort file_remove_privs() for non-reg. files
WARNING in fanotify_handle_event fs -1 C done 5 2264d 2263d 12/29 2240d c285a2f01d69 fanotify: update connector fsid cache on add mark
BUG: Dentry still in use [unmount of tmpfs tmpfs] fs -1 2 2273d 2272d 12/29 2240d 1b0b9cc8d379 vfs: fsmount: add missing mntget()
BUG: Dentry still in use [unmount of hugetlbfs hugetlbfs] fs -1 C done 3 2263d 2263d 12/29 2240d 1b0b9cc8d379 vfs: fsmount: add missing mntget()
possible deadlock in aio_poll fs 4 C 5041 2399d 2544d 12/29 2251d ae62c16e105a userfaultfd: disable irqs when taking the waitqueue lock
INFO: task hung in __ia32_sys_io_uring_enter fs 1 2 2327d 2328d 12/29 2258d b19062a56726 io_uring: fix possible deadlock between io_uring_{enter,register}
INFO: task hung in __x64_sys_io_uring_enter fs 1 12 2321d 2328d 12/29 2258d b19062a56726 io_uring: fix possible deadlock between io_uring_{enter,register}
INFO: task hung in __get_super fs 1 C 80 2261d 2706d 12/29 2261d 33ec3e53e7b1 loop: Don't change loop device under exclusive opener
general protection fault in do_move_mount fs 2 3 2303d 2303d 12/29 2266d 05883eee857e do_move_mount(): fix an unsafe use of is_anon_ns()
general protection fault in load_elf_binary fs mm 2 C done 15 2339d 2344d 12/29 2266d cc338010a233 fs/binfmt_elf.c: free PT_INTERP filename ASAP
kernel BUG at mm/slab.c:LINE! (4) fs -1 12 2279d 2346d 12/29 2266d 4f661542a402 tcp: fix zerocopy and notsent_lowat issues
general protection fault in put_fs_context fs 2 C 9 2493d 2494d 12/29 2270d 8d0347f6c3a9 convert do_remount_sb() to fs_context
INFO: task hung in __io_uring_register fs 1 C done 51 2320d 2329d 12/29 2285d b19062a56726 io_uring: fix possible deadlock between io_uring_{enter,register}
general protection fault in fanotify_handle_event fs 2 syz done 5 2324d 2324d 12/29 2285d b1da6a51871c fsnotify: Fix NULL ptr deref in fanotify_get_fsid()
BUG: unable to handle kernel paging request in do_mount fs 8 C 194 2495d 2533d 12/29 2291d 3e1aeb00e6d1 vfs: Implement a filesystem superblock creation/configuration context
possible deadlock in seq_read fs 4 C 19074 2337d 2827d 12/29 2330d 73601ea5b7b1 fs/open.c: allow opening only regular files during execve()
KASAN: use-after-free Read in link_path_walk fs 19 syz done 5 2449d 2465d 12/29 2330d 1da6c4d9140c bpf: fix use after free in bpf_evict_inode
KASAN: use-after-free Read in trailing_symlink fs 19 syz done 2 2450d 2465d 12/29 2330d 1da6c4d9140c bpf: fix use after free in bpf_evict_inode
KASAN: use-after-free Read in path_lookupat fs 19 syz done 1 2465d 2465d 12/29 2330d 1da6c4d9140c bpf: fix use after free in bpf_evict_inode
KASAN: use-after-free Read in filemap_fault fs mm 19 C 277 2424d 2434d 11/29 2341d 6b4c9f446981 filemap: drop the mmap_sem for all blocking operations
possible deadlock in __do_page_fault mm fs 4 C 820 2366d 2533d 11/29 2345d fb4415a12632 staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
possible deadlock in vfs_fallocate fs 4 C 3981 2566d 2678d 11/29 2345d fb4415a12632 staging: android: ashmem: Don't call fallocate() with ashmem_mutex held.
BUG: unable to handle kernel NULL pointer dereference in __generic_file_write_iter fs mm 10 5 2371d 2380d 11/29 2345d ac5ceccce550 x86/unwind: Add hardcoded ORC entry for NULL f4f34e1b82eb x86/unwind: Handle NULL pointer calls better in frame unwinder
possible deadlock in userfaultfd_read mm fs 4 239 2345d 2399d 11/29 2345d d3d6a18d7d35 aio: Fix locking in aio_poll()
BUG: unable to handle kernel paging request in dput (2) fs 8 C 4 2401d 2402d 11/29 2367d 36991ca68db9 blk-mq: protect debugfs_create_files() from failures 37ea7b630ae5 debugfs: debugfs_lookup() should return NULL if not found
INFO: task hung in generic_file_write_iter fs mm 1 7 2460d 2598d 11/29 2367d 04906b2f542c blockdev: Fix livelocks on loop device
general protection fault in __dentry_path fs 2 C 2082 2369d 2402d 11/29 2367d 8ed0579c12b2 kvm: properly check debugfs dentry before using it
KASAN: use-after-free Read in posix_lock_inode fs 19 syz 5 2430d 2430d 11/29 2416d bf77ae4c98d7 locks: fix error in locks_move_blocks()
KASAN: use-after-free Read in locks_delete_block fs 19 syz 4 2457d 2480d 11/29 2416d 16306a61d3b7 fs/locks: always delete_block after waiting.
WARNING in userfaultfd_ioctl fs mm -1 C 11 2450d 2459d 11/29 2435d 01e881f5a1fc userfaultfd: check VM_MAYWRITE was set after verifying the uffd is registered
WARNING: kmalloc bug in krealloc fs -1 C 2 2600d 2600d 11/29 2480d 61448479a9f2 mm: don't warn about large allocations for slab
WARNING: kmalloc bug in vfs_getxattr_alloc fs -1 C 9 2556d 2598d 11/29 2480d 61448479a9f2 mm: don't warn about large allocations for slab
KASAN: slab-out-of-bounds Read in fscache_alloc_cookie fs 17 C 1936 2506d 2607d 11/29 2494d 1ff22883b0b2 fscache: Fix incomplete initialisation of inline key space fa520c47eaa1 fscache: Fix out of bound read in long cookie keys
general protection fault in ubifs_mount fs mtd 2 C 216 2533d 2550d 11/29 2513d 37f31b6ca431 ubifs: Check for name being NULL while mounting
WARNING in __fsnotify_recalc_mask fs -1 syz 9 2565d 2567d 10/29 2543d d3bc0fa8411c fsnotify: fix false positive warning on inode delete
BUG: soft lockup in shrink_dcache_parent (2) fs 1 7 2635d 2642d 10/29 2544d 4fb48871409e restore cond_resched() in shrink_dcache_parent()
INFO: task hung in fsnotify_mark_destroy_workfn fs 1 syz 13 2575d 2689d 10/29 2546d 128f38041035 android: binder: Rate-limit debug and userspace triggered err msgs
BUG: soft lockup in d_walk fs 1 C 163 2635d 2680d 8/29 2549d 4fb48871409e restore cond_resched() in shrink_dcache_parent()
general protection fault in send_sigurg_to_task fs 2 C 6 2569d 2572d 8/29 2557d 84fe4cc09abc signal: Don't send signals to tasks that don't exist
general protection fault in send_sigio_to_task fs 2 C 176 2568d 2572d 8/29 2557d 84fe4cc09abc signal: Don't send signals to tasks that don't exist
kernel BUG at mm/memory.c:LINE! fs mm -1 1 2608d 2607d 8/29 2577d bfd40eaff5ab mm: fix vma_is_anonymous() false-positives
kernel BUG at fs/userfaultfd.c:LINE! (2) fs mm -1 C 8 2582d 2600d 8/29 2577d 31e810aa1033 userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KASAN: stack-out-of-bounds Read in __d_lookup_rcu fs 17 1 2597d 2597d 8/29 2578d 99ba2b5aba24 bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: stack-out-of-bounds Read in locks_remove_posix fs 17 C 1 2595d 2594d 8/29 2578d 99ba2b5aba24 bpf: sockhash, disallow bpf_tcp_close and update in parallel
KASAN: slab-out-of-bounds Read in getname_kernel fs 17 C 8 2602d 2702d 8/29 2592d 02f51d45937f autofs: fix slab out of bounds read in getname_kernel()
KASAN: global-out-of-bounds Write in string fs 23 C 7 2647d 2704d 8/29 2592d fe10e398e860 reiserfs: fix buffer overflow with long warning messages
BUG: unable to handle kernel paging request in dput fs 8 C 26 2638d 2641d 8/29 2607d d85b399b64e8 fix proc_fill_cache() in case of d_alloc_parallel() failure
BUG: unable to handle kernel NULL pointer dereference in do_select fs 10 45 2617d 2617d 8/29 2607d e88958e6369a net: handle NULL ->poll gracefully
general protection fault in wb_workfn (2) fs 2 38 2626d 2651d 8/29 2607d 3ee7e8697d58 bdi: Fix another oops in wb_workfn()
KASAN: use-after-free Read in __vfs_write fs 19 syz 14 2635d 2638d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
general protection fault in pipe_write fs 2 syz 1 2638d 2638d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
BUG: unable to handle kernel NULL pointer dereference in ep_item_poll fs 10 C 15 2617d 2617d 8/29 2607d e88958e6369a net: handle NULL ->poll gracefully
general protection fault in __vfs_write fs 2 syz 25 2635d 2639d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
KASAN: use-after-free Read in pipe_read fs 19 C 3 2637d 2638d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
KASAN: use-after-free Read in finish_wait fs 19 8 2636d 2638d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
KASAN: use-after-free Read in __kernel_write fs 19 syz 7 2636d 2638d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
KASAN: null-ptr-deref Write in simple_write_to_buffer fs 12 C 5 2647d 2672d 8/29 2607d fc14eebfc208 PM / hibernate: Fix oops at snapshot_write()
general protection fault in touch_atime fs 2 syz 6 2635d 2638d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
BUG: soft lockup in do_raw_spin_unlock (2) fs 1 1 2635d 2635d 8/29 2607d 4fb48871409e restore cond_resched() in shrink_dcache_parent()
general protection fault in __mnt_want_write fs 2 1 2636d 2636d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
WARNING in do_dentry_open fs -1 C 26 2630d 2638d 8/29 2607d b16558579576 bpf: implement dummy fops for bpf objects
INFO: task hung in namespace_unlock fs 1 15 2611d 2620d 8/29 2607d ebec3f8f5271 n_tty: Access echo_* variables carefully.
general protection fault in vfs_read fs 2 syz 2 2637d 2638d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
BUG: unable to handle kernel NULL pointer dereference in do_sys_poll fs 10 C 297 2617d 2617d 8/29 2607d e88958e6369a net: handle NULL ->poll gracefully
WARNING in sysfs_remove_group fs -1 C 11125 2608d 2862d 8/29 2607d d3349b6b3c37 loop: remember whether sysfs_create_group() was done
INFO: rcu detected stall in d_walk fs 1 C 25680 2632d 2694d 8/29 2607d 4fb48871409e restore cond_resched() in shrink_dcache_parent()
KASAN: use-after-free Read in pipe_wait fs 19 2 2635d 2636d 8/29 2607d 66e58e0ef80a bpfilter: fix race in pipe access
KASAN: use-after-free Read in remove_wait_queue (2) fs 19 C 4 2727d 2738d 5/29 2639d af8d3c7c001a ppp: remove the PPPIOCDETACH ioctl
INFO: task hung in __do_page_fault fs mm 1 1 2692d 2691d 5/29 2660d 8236b0ae31c8 bdi: wake up concurrent wb_shutdown() callers.
INFO: task hung in handle_userfault mm fs 1 3 2674d 2697d 5/29 2660d 8236b0ae31c8 bdi: wake up concurrent wb_shutdown() callers.
KASAN: use-after-free Read in debugfs_remove (2) fs 19 1 2686d 2684d 5/29 2660d f53823c18131 bdi: Fix use after free bug in debugfs_remove()
general protection fault in wb_workfn fs 2 63 2661d 2688d 5/29 2660d b8b784958ecc bdi: Fix oops in wb_workfn()
INFO: task hung in __blkdev_get fs 1 C 662 2693d 2819d 5/29 2668d 1e047eaab3bb block/loop: fix deadlock after loop_set_status
KASAN: null-ptr-deref Read in xattr_getsecurity fs 11 68 2685d 2697d 5/29 2668d 1f5781725dcb commoncap: Handle memory allocation failure.
WARNING in format_decode fs -1 C 1 2706d 2706d 5/29 2668d 9ad553abe66f fs/reiserfs/journal.c: add missing resierfs_warning() arg
WARNING: refcount bug in put_pid_ns fs 13 syz 6 2707d 2706d 5/29 2668d 8e04944f0ea8 mm,vmscan: Allow preallocating memory for register_shrinker().
WARNING in kmem_cache_free fs -1 1 2701d 2701d 5/29 2668d eea0d3ea7546 crypto: drbg - set freed buffers to NULL
BUG: corrupted list in __dentry_kill fs 8 C 35 2686d 2706d 5/29 2668d 4a3877c4cedd rpc_pipefs: fix double-dput()
KASAN: use-after-free Read in remove_wait_queue fs 19 C 7 2744d 2754d 4/29 2739d 5eeb2ca02a2f ANDROID: binder: synchronize_rcu() when using POLLFREE.
KASAN: use-after-free Read in __fput fs 19 23 2822d 2856d 4/29 2753d a5739435b5a3 fix kcm_clone()
WARNING in register_lock_class fs -1 C 2 2808d 2805d 4/29 2761d f5cb779ba163 ANDROID: binder: remove waitqueue when thread exits.
KASAN: use-after-free Read in __lock_acquire (2) fs 19 C 589 2764d 2840d 4/29 2761d f5cb779ba163 ANDROID: binder: remove waitqueue when thread exits.
WARNING in sysfs_warn_dup fs -1 11 2766d 2810d 4/29 2761d 5d54f948aaac sysfs: turn WARN() into pr_warn()
general protection fault in page_mapping fs mm 2 C 46 2788d 2816d 4/29 2765d 7d11f77f84b2 RDS: null pointer dereference in rds_atomic_free_op
BUG: unable to handle kernel NULL pointer dereference in page_mapping fs mm 10 C 4 2808d 2811d 4/29 2765d 7d11f77f84b2 RDS: null pointer dereference in rds_atomic_free_op
BUG: unable to handle kernel paging request in devpts_mntget fs 8 C 21 2778d 2855d 4/29 2765d c9cc8d01fb04 devpts: fix error handling in devpts_mntget()
kernel BUG at fs/userfaultfd.c:LINE! fs mm -1 C 3 2808d 2805d 4/29 2765d 0cbb4b4f4c44 userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
KASAN: use-after-free Read in __wake_up_common fs 19 C 888 2765d 2774d 4/29 2765d 4cd879515d68 vhost_net: stop device during reset owner
general protection fault in show_timer fs 2 C 10 2809d 2828d 4/29 2765d cef31d9af908 posix-timer: Properly check sigevent->sigev_notify
BUG: unable to handle kernel NULL pointer dereference in proc_flush_task fs 10 syz 1 2812d 2808d 4/29 2770d c0ee554906c3 pid: Handle failure to allocate the first pid in a pid namespace
general protection fault in proc_flush_task fs 2 syz 2 2811d 2828d 4/29 2770d c0ee554906c3 pid: Handle failure to allocate the first pid in a pid namespace
KASAN: use-after-free Read in handle_userfault fs mm 19 C 151 2799d 2862d 3/29 2787d 0cbb4b4f4c44 userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails
WARNING in lock_release fs -1 C 72 2809d 2842d 3/29 2805d ca0168e8a77c alloc_super(): do ->s_umount initialization earlier
general protection fault in iov_iter_fault_in_readable mm fs 2 5 2848d 2856d 3/29 2830d ee74d9967b82 tun: do not arm flow_gc_timer in tun_flow_init()
kernel BUG at fs/notify/dnotify/dnotify.c:LINE! fs -1 19 2846d 2858d 3/29 2830d b3a006600582 dnotify: Handle errors from fsnotify_add_mark_locked() in fcntl_dirnotify()
KASAN: use-after-free Read in fsnotify fs 19 1 2891d 2855d 3/29 2830d b3a006600582 dnotify: Handle errors from fsnotify_add_mark_locked() in fcntl_dirnotify()