syzbot


Applied filters: Label=subsystems:trace (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
WARNING in __dma_map_sg_attrs (2) trace -1 C 4 9d16h 9d14h 22/29 never daafcc0ef0b3 tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow
possible deadlock in lock_timer_base bpf trace 4 C 142 388d 1862d 1/29 never kfence: fix potential deadlock due to wake_up()
WARNING in __blk_add_trace trace block -1 C done 94 102d 106d 29/29 32d 4a0940bdcac2 blktrace: use debug print to report dropped events
WARNING in tracing_start_tr trace -1 C 20 64d 297d 29/29 32d 02e7769e38c8 tracing: Fix enabling of tracing on file release
WARNING in ring_buffer_map_get_reader trace -1 5 37d 94d 29/29 32d aa997d2d2a0b ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up
WARNING in tracing_buffers_mmap_close (2) trace -1 C 4 51d 88d 29/29 32d b042fdf18e89 tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs
WARNING in write_raw_marker_to_buffer trace -1 C 29 119d 120d 29/29 101d bda745ee8fbb tracing: Fix tracing_mark_raw_write() to use buf and not ubuf 54b91e54b113 tracing: Stop fortify-string from warning in tracing_mark_raw_write()
WARNING in tracing_buffers_mmap_close trace -1 C 1378 121d 419d 29/29 101d de4cbd704731 ring buffer: Propagate __rb_map_vma return value to caller
possible deadlock in task_fork_fair bpf trace 4 C done done 9106 440d 854d 29/29 115d ff9105993240 bpf, sockmap: Prevent lock inversion deadlock in map delete elem
WARNING in format_decode (3) bpf trace -1 C done 2248 202d 809d 29/29 156d f8242745871f bpf: Reject %p% format string in bprintf-like helpers
KASAN: slab-use-after-free Read in __free_filter trace 19 C 4 229d 229d 29/29 156d 6921d1e07cb5 tracing: Fix filter logic error
BUG: corrupted list in ring_buffer_subbuf_order_set trace 8 C 1 251d 247d 29/29 215d 40ee2afafc1d ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set()
WARNING in get_bpf_raw_tp_regs bpf trace -1 C 2 269d 272d 29/29 215d 3880cdbed1c4 bpf: Fix WARN() in get_bpf_raw_tp_regs
possible deadlock in print_event_fields trace 4 2 286d 282d 29/29 215d 0a8f11f8569e tracing: Do not take trace_event_sem in print_event_fields()
KASAN: slab-out-of-bounds Write in tracing_splice_read_pipe trace 21 1 301d 297d 29/29 215d f5178c41bb43 tracing: Fix oob write in trace_seq_to_buffer()
KCSAN: assert: race in srcu_gp_start_if_needed perf trace 14 1 441d 440d 28/29 242d d31e31365b5b srcu: Force synchronization for srcu_get_delay()
KASAN: use-after-free Read in ring_buffer_map trace 19 C 15 414d 419d 28/29 277d c58a812c8e49 ring-buffer: Fix overflow in __rb_map_vma
WARNING in bitmap_parse_user trace -1 C 83 399d 419d 28/29 277d 98feccbf32cf tracing: Prevent bad count for tracing_cpumask_write
KASAN: slab-use-after-free Read in bpf_trace_run2 (2) bpf trace 19 syz error 123 461d 478d 28/29 277d 2e8a12b82c40 tracing: Fix syscall tracepoint use-after-free
WARNING: locking bug in __lock_task_sighand bpf trace 4 C unreliable 89 380d 437d 28/29 277d 87c544108b61 bpf: Send signals asynchronously if !preemptible
KASAN: slab-use-after-free Read in __uprobe_unregister perf trace 19 C 9 508d 546d 28/29 474d 5fe6e308abae bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()
possible deadlock in console_flush_all (2) trace bpf 4 C error 52996 579d 854d 26/29 578d ae01e52da244 serial: drop debugging WARN_ON_ONCE() from uart_write()
general protection fault in bpf_get_attach_cookie_tracing trace bpf 2 C error 7 612d 643d 26/29 600d d0d1df8ba18a bpf: Set run context for rawtp test_run callback
possible deadlock in force_sig_info_to_task bpf trace 4 C error 6 646d 654d 25/29 626d 02b670c1f88e x86/mm: Remove broken vsyscall emulation code from the page fault code
possible deadlock in put_pwq_unlocked trace bpf 4 3 664d 663d 25/29 626d ff9105993240 bpf, sockmap: Prevent lock inversion deadlock in map delete elem
possible deadlock in pwq_dec_nr_in_flight trace bpf 4 1 669d 665d 25/29 626d ff9105993240 bpf, sockmap: Prevent lock inversion deadlock in map delete elem
KASAN: slab-use-after-free Read in bpf_trace_run4 bpf trace 19 C error 169 670d 689d 25/29 626d 1a80dbcb2dba bpf: support deferring bpf_link dealloc to after RCU grace period
KASAN: slab-use-after-free Read in bpf_trace_run2 bpf trace 19 C error 653 670d 689d 25/29 626d 1a80dbcb2dba bpf: support deferring bpf_link dealloc to after RCU grace period
KASAN: slab-use-after-free Read in bpf_trace_run1 bpf trace 19 C error 78 671d 685d 25/29 626d 1a80dbcb2dba bpf: support deferring bpf_link dealloc to after RCU grace period
possible deadlock in bpf_trace_printk bpf trace 4 C done done 68 1084d 1339d 22/29 1052d 05b24ff9b2cf bpf: Prevent bpf program recursion for raw tracepoint probes
WARNING in tracepoint_add_func trace bpf -1 C done 20635 1667d 2051d 20/29 1551d 9913d5745bd7 tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing
general protection fault in do_blk_trace_setup block trace 2 C done 25 1627d 1628d 20/29 1551d 1d1cf156dc17 sg: pass the device name to blk_trace_setup
KASAN: vmalloc-out-of-bounds Read in bpf_trace_run2 trace bpf 17 C done done 5 1808d 1966d 20/29 1761d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
BUG: unable to handle kernel paging request in bpf_trace_run2 trace bpf 8 C done done 10 1805d 1966d 20/29 1761d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
KASAN: vmalloc-out-of-bounds Read in bpf_trace_run3 bpf trace 17 C done 6 1821d 1924d 20/29 1765d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
BUG: unable to handle kernel paging request in bpf_trace_run3 bpf trace 8 C done 40 1812d 1935d 20/29 1765d befe6d946551 tracepoint: Do not fail unregistering a probe due to memory failure
UBSAN: array-index-out-of-bounds in arch_uprobe_analyze_insn trace 15 C done 604 1889d 1966d 19/29 1796d 12cb908a11b2 x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes 84da009f06e6 x86/sev-es: Use new for_each_insn_prefix() macro to loop over prefixes bytes 4e9a5ae8df5b x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
possible deadlock in uprobe_clear_state (2) perf trace 4 1 2037d 2033d 15/29 1970d f867c771f988 binder: Don't use mmput() from shrinker function.
WARNING in tracepoint_probe_register_prio (3) trace -1 syz done 979 2185d 2823d 15/29 2181d 64ae572bc7d0 tracing: Fix sched switch start/stop refcount racy updates
KASAN: use-after-free Read in uprobe_perf_close trace 19 C done 54 2549d 2868d 13/29 2280d 621b6d2ea297 perf/core: Fix use-after-free in uprobe_perf_close()
general protection fault in trace_probe_unlink trace 2 C done 7 2332d 2336d 13/29 2307d d59fae6fea39 tracing/kprobe: Fix NULL pointer access in trace_porbe_unlink()
WARNING: suspicious RCU usage (4) bpf trace -1 C done 1 2716d 2715d 13/29 2319d 865e63b04e9b tracing: Add back in rcu_irq_enter/exit_irqson() for rcuidle tracepoints
WARNING: suspicious RCU usage in trace_call_bpf bpf trace 4 C done 327 2697d 2715d 13/29 2319d 865e63b04e9b tracing: Add back in rcu_irq_enter/exit_irqson() for rcuidle tracepoints
memory leak in process_preds trace 3 C 1 2449d 2448d 12/29 2426d dfb4a6f2191a tracing: Avoid memory leak in predicate_parse()
general protection fault in delayed_uprobe_remove perf trace 2 C done 2 2653d 2655d 11/29 2514d 1aed58e67a6e Uprobes: Fix kernel oops with delayed_uprobe_remove()
general protection fault in corrupted (2) trace perf 2 C 2 2588d 2591d 11/29 2531d 44039e00171b fou6: Prevent unbounded recursion in GUE error handler
general protection fault in relay_open_buf trace block 2 C 287 2564d 2565d 11/29 2531d 2c1cf00eeacb relay: check return of create_buf_file() properly
KASAN: use-after-free Read in delayed_uprobe_remove perf trace 19 C 2 2652d 2655d 11/29 2609d 1aed58e67a6e Uprobes: Fix kernel oops with delayed_uprobe_remove()
WARNING in format_decode (2) trace -1 C 16 2639d 2721d 11/29 2620d 1efb6ee3edea bpf: fix check of allowed specifiers in bpf_trace_printk
KASAN: slab-out-of-bounds Write in process_preds trace 21 C 6020 2784d 2860d 8/29 2724d 70303420b572 tracing: Check for no filter when processing event filters
WARNING in perf_trace_buf_alloc (2) trace -1 C 22 2910d 3016d 8/29 2770d 4d220ed0f814 bpf: remove tracepoints from bpf core
WARNING in arch_uprobe_analyze_insn trace -1 C 2 2827d 2826d 8/29 2770d 90718e32e1dc uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn()
WARNING in tracepoint_probe_unregister (2) trace -1 120 2833d 2889d 5/29 2825d d66a270be331 tracepoint: Do not warn on ENOMEM
WARNING in tracepoint_probe_register_prio (2) trace -1 C 849 2825d 2889d 5/29 2825d d66a270be331 tracepoint: Do not warn on ENOMEM
possible deadlock in perf_event_detach_bpf_prog trace bpf 4 1 2873d 2872d 5/29 2832d 3a38bb98d9ab bpf/tracing: fix a deadlock in perf_event_detach_bpf_prog
KASAN: stack-out-of-bounds Read in __free_filter trace 17 C 41 2850d 2860d 5/29 2832d 0b3dec05dbbc tracing: Enforce passing in filter=NULL to create_filter()
possible deadlock in ftrace_profile_set_filter (2) trace 4 C 1007 2929d 2988d 5/29 2846d 43fa87f7deed perf/core: Fix another perf,trace,cpuhp lock inversion
possible deadlock in perf_trace_destroy (2) trace 4 C 2006 2929d 3015d 5/29 2846d 82d94856fa22 perf/core: Fix lock inversion between perf,trace,cpuhp
WARNING in tracepoint_probe_register_prio trace block -1 C 830 2890d 3026d 4/29 2890d a6da0024ffc1 blktrace: fix unlocked registration of tracepoints
WARNING in tracepoint_probe_unregister block trace -1 C 115 2890d 3017d 4/29 2890d a6da0024ffc1 blktrace: fix unlocked registration of tracepoints
WARNING: kmalloc bug in relay_open_buf trace block -1 C 10 2908d 2923d 4/29 2903d 88913bd8ea2a kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
KASAN: double-free or invalid-free in relay_open trace block 24 C 106 2923d 3022d 4/29 2917d a1be1f3931bf kernel/relay.c: revert "kernel/relay.c: fix potential memory leak"
possible deadlock in blk_trace_remove trace block 4 5 2995d 3003d 3/29 2984d 2967acbb257a blktrace: fix trace mutex deadlock
WARNING in kmalloc_slab (2) block trace -1 C 2478 3011d 3029d 3/29 3011d 864e2a1f8aac ipv6: flowlabel: do not leave opt->tot_len with garbage