syzbot


Title Repro Cause bisect Fix bisect Count Last Reported Closed Patch
KMSAN: uninit-value in ieee80211_skb_resize C 5 133d 157d 104d 14f46c1e mac80211: fix use of skb payload instead of header
KMSAN: uninit-value in ip_tunnel_xmit (2) C 11778 108d 933d 104d fdafed45 ip_gre: set dev->hard_header_len and dev->needed_headroom properly
KMSAN: uninit-value in can_receive (2) C 2060 108d 203d 104d e009f95b can: j1935: j1939_tp_tx_dat_new(): fix missing initialization of skbcnt
KMSAN: uninit-value in unix_find_other C 57 149d 965d 104d 7ca1db21 net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
KMSAN: uninit-value in batadv_hard_if_event (2) C 162 120d 203d 104d f45a4248 net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails
KMSAN: uninit-value in do_ip_vs_set_ctl C 365 109d 898d 104d c5a8a849 ipvs: Fix uninit-value in do_ip_vs_set_ctl()
KMSAN: uninit-value in __inet_diag_dump C 37 143d 160d 141d d5e4d0a5 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
KMSAN: uninit-value in inet_diag_cmd_exact C 31 143d 154d 141d d5e4d0a5 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
KMSAN: kernel-infoleak in move_addr_to_user (3) C 79 165d 199d 153d 38ba8b92 can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
KMSAN: uninit-value in video_usercopy C 28 222d 221d 156d 4ffb879e media: media/v4l2-core: Fix kernel-infoleak in video_put_user()
KMSAN: kernel-infoleak in raw_ioctl C 22 178d 203d 156d a092b723 net: usb: Fix uninit-was-stored issue in asix_read_phy_addr()
KMSAN: uninit-value in netlink_policy_dump_start C 31 170d 173d 165d d1fb5559 netlink: fix state reallocation in policy export
KMSAN: uninit-value in geneve_xmit C 163 168d 221d 165d 32818c07 geneve: fix an uninitialized value in geneve_changelink()
KMSAN: uninit-value in ucma_connect C 138 169d 221d 165d 31142a4b RDMA/cm: Add min length checks to user structure copies
KMSAN: uninit-value in __tipc_nl_compat_dumpit (3) C 6181 165d 230d 165d 47733f9d tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
KMSAN: uninit-value in xa_load C 208 166d 221d 165d 31142a4b RDMA/cm: Add min length checks to user structure copies
KMSAN: uninit-value in tbf_enqueue 21 226d 313d 226d 9274124f net: stricter validation of untrusted gso packets
KMSAN: uninit-value in do_tcp_getsockopt 5 238d 290d 226d e776af60 net-backports: tcp: fix error recovery in tcp_zerocopy_receive()
KMSAN: uninit-value in skbprio_enqueue syz 11 240d 304d 226d 2761121a net_sched: sch_skbprio: add message validation to skbprio_change()
KMSAN: uninit-value in etf_enqueue_timesortedlist 3 296d 303d 255d a1211bf9 sched: etf: do not assume all sockets are full blown
KMSAN: uninit-value in simple_attr_read C 6 297d 367d 294d a65cab7d libfs: fix infoleak in simple_attr_read()
BUG: corrupted list in rdma_listen C 202 467d 1046d 294d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KMSAN: uninit-value in tcf_exts_change C 5 345d 355d 294d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
KMSAN: uninit-value in __iptunnel_pull_header C 12 350d 359d 319d 17c25caf gre: fix uninit-value in __iptunnel_pull_header
KMSAN: use-after-free in netdev_state_change 2 363d 363d 319d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in slhc_compress C 3 362d 361d 319d 110a40df slip: make slhc_compress() more robust against malicious packets
KMSAN: use-after-free in find_match C 52 349d 378d 319d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache 2 389d 387d 319d 457fed77 net/smc: fix leak of kernel memory to user space
KMSAN: uninit-value in bond_alb_xmit syz 3 360d 361d 319d b7469e83 bonding/alb: make sure arp header is pulled before accessing it
KMSAN: use-after-free in inet_gifconf 10 349d 372d 319d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in ip6_dst_destroy C 2 352d 364d 319d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: use-after-free in veth_xmit 8 349d 365d 319d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in kstrdup C 8 355d 382d 319d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: use-after-free in l3mdev_master_ifindex_rcu C 5 349d 373d 319d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in dev_alloc_name_ns 3 349d 363d 319d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in rdma_listen C 26 360d 506d 340d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen C 28 517d 882d 340d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in setup_udp_tunnel_sock C 1 404d 404d 376d 940ba149 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
KMSAN: uninit-value in can_receive C 14 379d 468d 376d e7153bf7 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
KMSAN: uninit-value in sd_init (2) C 94 482d 478d 376d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in __request_module (3) C 58 377d 405d 376d 36d79af7 net-backports: net_sched: use validated TCA_KIND attribute in tc_new_tfilter()
KMSAN: uninit-value in rsvp_change C 4 396d 397d 376d cb3c0e6b cls_rsvp: fix rsvp_policy
KMSAN: uninit-value in macvlan_broadcast C 2 418d 419d 376d 96cc4b69 macvlan: do not assume mac_header is set in macvlan_broadcast()
KMSAN: uninit-value in digitv_rc_query C 4 494d 478d 376d eecc70d2 media: digitv: don't continue if remote control state can't be read 569bc8d6 media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0
KMSAN: uninit-value in number C 190 380d 478d 376d 51d0c99b media: af9005: uninitialized variable printked
KMSAN: uninit-value in __tipc_nl_compat_dumpit C 4428 376d 445d 376d a7869e5f tipc: eliminate KMSAN: uninit-value in __tipc_nl_compat_dumpit error
KMSAN: uninit-value in i2c_w (2) C 3 489d 478d 376d de89d086 media: gspca: zero usb_buf
WARNING in tracepoint_probe_register_prio (3) syz done 979 379d 1017d 376d 64ae572b tracing: Fix sched switch start/stop refcount racy updates
KMSAN: uninit-value in read_sensor_register (2) C 44 483d 500d 376d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in dvb_usb_adapter_dvb_init 1 485d 478d 376d 26cff637 media: vp7045: do not read uninitialized values if usb transfer fails
WARNING in tcp_enter_loss (2) C done unreliable 4 1034d 1084d 376d 16ae6aa1 tcp: ignore Fast Open on repair mode
KMSAN: uninit-value in __crc32c_le_base syz 567 417d 463d 380d b6f3320b sctp: fully initialize v4 addr in some functions
unregister_netdevice: waiting for DEV to become free (2) C done 385621 380d 928d 380d ddd9b5e3 net-sysfs: Call dev_hold always in rx_queue_add_kobject
KMSAN: uninit-value in br_nf_forward_arp (3) 2 456d 449d 380d 56042858 net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
KMSAN: uninit-value in bond_neigh_setup 64 425d 449d 380d f394722f net-backports: neighbour: remove neigh_cleanup() method
BUG: Bad rss-counter state (3) C unreliable done 438 580d 1046d 394d 173d9d9f mm/huge_memory: splitting set mapping+index before unfreeze
KMSAN: uninit-value in __request_module (2) 3 437d 449d 417d 2dd5616e net-backports: net_sched: validate TCA_KIND attribute in tc_chain_tmplt_add()
KMSAN: uninit-value in usbnet_probe C 1 634d 634d 417d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in nf_conntrack_tcp_packet syz 3 451d 454d 417d 9424e2e7 net-backports: tcp: md5: fix potential overestimation of TCP option space
KMSAN: use-after-free in netlink_recvmsg C 1 473d 473d 443d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in kfree_skb syz 34 460d 509d 443d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __skb_try_recv_from_queue C 4 472d 496d 443d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in sk_forced_mem_schedule 2 466d 474d 443d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __netif_receive_skb_core 1 474d 474d 443d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in skb_dequeue C 1 503d 503d 443d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in copyout C 1 509d 509d 443d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: uninit-value in ax88172a_bind C 5 489d 502d 457d a9a51bd7 ax88172a: fix information leak on short answers
KMSAN: uninit-value in gf128mul_4k_lle (3) C 2958 462d 828d 457d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: uninit-value in aesti_encrypt C 54 511d 612d 457d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: use-after-free in build_audio_procunit C 2 495d 495d 457d 976a68f0 ALSA: usb-audio: Fix incorrect size check for processing/extension units
KMSAN: uninit-value in get_min_max_with_quirks C 11 490d 478d 457d 167beb17 ALSA: usb-audio: Fix missing error check at mixer resolution test
KMSAN: uninit-value in cdc_ncm_set_dgram_size C 4 488d 487d 457d 332f989a CDC-NCM: handle incomplete transfer of MTU
KMSAN: kernel-usb-infoleak in pcan_usb_wait_rsp C 2 501d 500d 457d f7a1337f can: peak_usb: fix slab info leak
WARNING in generic_make_request_checks C done 7760 458d 934d 458d 8b2ded1c block: don't warn when doing fsync on read-only devices
KMSAN: use-after-free in adu_disconnect C 16 503d 509d 459d 44efc269 USB: adutux: fix use-after-free on disconnect
KMSAN: use-after-free in mutex_spin_on_owner C 1 508d 508d 459d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in iowarrior_disconnect C 21 503d 509d 459d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in usb_autopm_put_interface C 63 489d 503d 459d 7a759197 USB: usblp: fix use-after-free on disconnect
KMSAN: use-after-free in __pm_runtime_resume 1 509d 509d 459d 5f924277 HID: logitech: Fix general protection fault caused by Logitech driver
KMSAN: use-after-free in hidraw_ioctl 1 509d 509d 459d 416dacb8 HID: hidraw: Fix invalid read in hidraw_ioctl
KMSAN: use-after-free in rxrpc_put_peer 1 500d 500d 459d 91fcfbe8 rxrpc: Fix call crypto state cleanup
KMSAN: uninit-value in lg4ff_set_autocenter_default C 1 489d 489d 460d d9d4b1e4 HID: Fix assumption that devices have inputs
WARNING in sk_stream_kill_queues (3) C done 622 631d 990d 460d 9354544c net/tls: fix page double free on TX cleanup
INFO: task hung in fuse_reverse_inval_entry C done 23 938d 951d 475d c59fd85e fuse: change interrupt requests allocation algorithm
KMSAN: uninit-value in sr9800_bind C 27 491d 514d 482d 77b6d09f net: usb: sr9800: fix uninitialized local variable
KMSAN: uninit-value in mts_usb_probe C 29 509d 515d 490d 177238c3 USB: microtek: fix info-leak at probe
KMSAN: uninit-value in iowarrior_disconnect C 18 507d 514d 490d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: uninit-value in read_sensor_register C 25 502d 632d 501d 4843a543 media: gspca: zero usb_buf on error
KMSAN: kernel-usb-infoleak in ttusb_dec_send_command C 2 569d 579d 501d a10feaf8 media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
KMSAN: uninit-value in inet_ehash_insert C 7 510d 517d 501d 6af1799a net-backports: ipv6: drop incoming packets having a v4mapped source address
KMSAN: uninit-value in i2c_w C 2 635d 634d 501d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in __request_module C 13 511d 531d 501d 62794fc4 net_sched: add max len check for TCA_KIND
KMSAN: uninit-value in sd_init C 122 502d 634d 501d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in capi_write C 445 508d 748d 508d fe163e53 isdn/capi: check message length in capi_write()
KMSAN: uninit-value in batadv_iv_send_outstanding_bat_ogm_packet C 9 557d 557d 531d a15d56a6 batman-adv: Only read OGM tvlv_len after buffer len check
KMSAN: uninit-value in rtm_new_nexthop C 8 557d 557d 541d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: uninit-value in batadv_netlink_dump_hardif C 58 551d 587d 541d 3ee1bb7a batman-adv: fix uninit-value in batadv_netlink_get_ifindex()
KMSAN: uninit-value in rtm_dump_nexthop C 6 551d 567d 541d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: kernel-usb-infoleak in pcan_usb_pro_send_req C 16 553d 579d 551d 30a8beeb can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
KMSAN: kernel-usb-infoleak in pcan_usb_pro_init C 13 555d 579d 551d ead16e53 can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
KMSAN: uninit-value in read_eprom_word C 31 553d 579d 551d 224c0497 net: usb: pegasus: fix improper read if get_registers() fail
KMSAN: uninit-value in ax88772_bind C 80 575d 636d 573d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in bond_start_xmit (2) C 2309 573d 897d 573d 9d1bc24b bonding: validate ip header before check IPPROTO_IGMP
KMSAN: uninit-value in tipc_nl_compat_bearer_disable C 19 607d 620d 580d 4f07b80c tipc: check msg->req data len in tipc_nl_compat_bearer_disable
KMSAN: uninit-value in tcp_create_openreq_child C 4000 599d 620d 599d 85f9aa75 inet: clear num_timeout reqsk_alloc()
KMSAN: kernel-infoleak in copy_siginfo_to_user (2) C 15 628d 658d 599d f6e2aa91 signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO
KMSAN: uninit-value in aa_fqlookupn_profile C 39 839d 884d 628d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
KMSAN: uninit-value in br_mdb_ip_get 5 703d 762d 639d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
WARNING in xfrm_state_fini (2) C 37510 667d 1120d 643d dbb2483b xfrm: clean up xfrm protocol checks
KMSAN: uninit-value in rds_connect C 952 671d 913d 643d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_dump syz 14 673d 688d 643d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_inet_address 33 654d 654d 643d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in rds_bind C 6202 671d 913d 643d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_get C 5 680d 688d 643d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_unix_address 8 654d 654d 643d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in ip6_compressed_string C 9024 671d 823d 671d 7c2bd9a3 NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (2) C 6 718d 703d 688d 2ac695d1 tipc: handle the err returned from cmd header function
KMSAN: kernel-infoleak in sctp_getsockopt (3) syz 11 690d 703d 688d 09279e61 sctp: initialize _pad of sockaddr_in before copying to user memory
KMSAN: uninit-value in tipc_nl_compat_link_set (3) C 15 694d 704d 688d 8c63bf9a tipc: check link name with right length in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable (2) C 51 691d 704d 688d 6f07e5f0 tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
KMSAN: uninit-value in mpol_rebind_mm 6 705d 790d 703d 2e25644e mm, mempolicy: fix uninit memory access
KMSAN: kernel-infoleak in video_usercopy C 410 704d 803d 703d f45f3f75 media: v4l2-ctrls.c/uvc: zero v4l2_event
KMSAN: uninit-value in gue6_err (2) C 2826 703d 725d 703d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: kernel-infoleak in move_addr_to_user (2) C 8 704d 719d 703d 163d1c3d l2tp: fix infoleak in l2tp_ip6_recvmsg()
KMSAN: uninit-value in gue_err (2) C 1617 703d 725d 703d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: uninit-value in batadv_interface_tx C 98 725d 748d 725d 4ffcbfac batman-adv: fix uninit-value in batadv_interface_tx()
KMSAN: uninit-value in tipc_subscrb_rcv_cb C 13 1036d 1057d 725d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page C 25 816d 844d 725d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_doit C 153 740d 892d 725d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in tipc_nl_compat_name_table_dump C 51 811d 852d 725d 974cb0e3 tipc: fix uninit-value in tipc_nl_compat_name_table_dump
KMSAN: uninit-value in tipc_nl_compat_link_set (2) C 13 762d 803d 725d edf5ff04 tipc: fix uninit-value in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable C 144 727d 852d 725d 0762216c tipc: fix uninit-value in tipc_nl_compat_bearer_enable
KMSAN: kernel-infoleak in move_addr_to_user 5 732d 782d 725d 7d033c9f ipv6: fix kernel-infoleak in ipv6_local_error()
KMSAN: uninit-value in tipc_nl_compat_link_reset_stats syz 16 729d 783d 725d 8b66fee7 tipc: fix uninit-value in tipc_nl_compat_link_reset_stats
KMSAN: uninit-value in kvm_clear_dirty_log_protect 6 725d 770d 725d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
KMSAN: kernel-infoleak in vmx_get_nested_state C 6 726d 837d 725d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_dumpit C 209 740d 891d 725d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in gue_err C 4686 725d 779d 725d 26fc181e fou, fou6: do not assume linear skbs
WARNING in xfrm6_tunnel_net_exit (2) C 48816 734d 1016d 725d f75a2804 xfrm: destroy xfrm_state synchronously on net exit path
KMSAN: uninit-value in tipc_conn_rcv_sub C 557 727d 1022d 725d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in sctp_getsockopt (2) C 16 725d 776d 725d 400b8b9a sctp: allocate sctp_sockaddr_entry with kzalloc
KMSAN: uninit-value in gue6_err C 8359 725d 779d 725d 26fc181e fou, fou6: do not assume linear skbs
KMSAN: uninit-value in vti6_tnl_xmit syz 60 779d 803d 775d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: uninit-value in check_6rd C 81 781d 803d 775d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: kernel-infoleak in capi_unlocked_ioctl C 109 780d 790d 775d d63967e4 isdn: fix kernel-infoleak in capi_unlocked_ioctl
KMSAN: kernel-infoleak in sctp_getsockopt syz 147 780d 816d 779d 4a2eb0c3 sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event
KMSAN: uninit-value in __inet6_bind C 56 781d 810d 779d fb242745 ipv6: explicitly initialize udp6_addr in udp_sock_create6()
KMSAN: uninit-value in packet_sendmsg 5 829d 803d 779d 99137b78 packet: validate address length
KMSAN: kernel-infoleak in _copy_to_iter (4) C 56 818d 822d 803d 68883893 rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
KMSAN: uninit-value in linear_transfer (2) C 7 820d 843d 814d 65766ee0 ALSA: oss: Use kvzalloc() for local buffer allocations
KMSAN: kernel-infoleak in kvm_write_guest_page C 36 817d 844d 814d bcbfbd8e KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl C 31 820d 835d 814d 7f9ad1df KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
KMSAN: uninit-value in synaptics_detect C 137 839d 892d 839d f39f8688 Input: synaptics - avoid using uninitialized variable when probing
KMSAN: uninit-value in dev_mc_add_excl C 13 843d 856d 839d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in dev_uc_add_excl C 20 850d 892d 839d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in ip_tunnel_lookup (2) C 2 856d 857d 839d b0350d51 ip_gre: fix parsing gre header in ipgre_err
KMSAN: uninit-value in vcs_read C 2343 996d 1020d 842d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
KMSAN: kernel-infoleak in _copy_to_iter (3) C 36 853d 864d 852d b06f9d9f tipc: fix info leak from kernel tipc_event
KMSAN: uninit-value in ip6_tnl_start_xmit C 69 884d 895d 871d 76c0ddd8 ip6_tunnel: be careful when accessing the inner header
WARNING in usb_submit_urb (2) C 259 871d 909d 871d 7a68d9fb USB: usbdevfs: sanitize flags more
KMSAN: uninit-value in pppoe_rcv C 2 1030d 900d 871d 8540827e pppoe: fix reception of frames with no mac header
KMSAN: kernel-infoleak in _copy_to_iter (2) C 7 879d 907d 874d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
WARNING in apparmor_secid_to_secctx C 3344 898d 913d 886d edf4e7b7 apparmor: fix bad debug check in apparmor_secid_to_secctx()
KMSAN: uninit-value in snd_midi_event_encode_byte C 3 909d 910d 886d 5a7b44a8 ALSA: rawmidi: Initialize allocated buffers
BUG: unable to handle kernel paging request in kfree (2) C 297 913d 965d 888d 7913690d net/9p/client.c: version pointer uninitialized
KMSAN: uninit-value in memcmp (2) C 131 900d 891d 889d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
WARNING in wiphy_register (2) C 8 926d 928d 901d 48400433 mac80211_hwsim: require at least one channel
WARNING in input_alloc_absinfo C 318 917d 990d 915d 100294ce Input: do not use WARN() in input_alloc_absinfo()
KMSAN: uninit-value in do_msgrcv C 8 915d 992d 915d 39cfffd7 ipc/util.c: use ipc_rcu_putref() for failues in ipc_addid() 615c999c ipc: compute kern_ipc_perm.id under the ipc lock e2652ae6 ipc: reorganize initialization of kern_ipc_perm.seq
BUG: corrupted list in p9_fd_cancel C 34 951d 965d 915d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
kernel BUG at net/ipv6/route.c:LINE! C 197 937d 959d 935d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in __nf_conntrack_find_get C 67 950d 957d 935d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
KMSAN: kernel-infoleak in put_cmsg C 3 967d 957d 935d 2efd4fca ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
KMSAN: uninit-value in gc_worker 10 951d 963d 935d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
kernel BUG at fs/userfaultfd.c:LINE! (2) C 8 940d 958d 935d 31e810aa userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KMSAN: kernel-infoleak in _copy_to_iter C 285 950d 986d 935d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
unregister_netdevice: waiting for DEV to become free C 170521 935d 1046d 935d 8cc88773 xfrm: fix missing dst_release() after policy blocking lbcast and multicast
KMSAN: uninit-value in af_alg_free_areq_sgls C 640 950d 1057d 936d 2546da99 crypto: af_alg - Initialize sg_num_bytes in error code path
WARNING in iov_iter_revert C 74 955d 1022d 936d 32da1221 tls: Stricter error checking in zerocopy sendmsg path
WARNING in smc_unhash_sk C 155731 939d 1101d 936d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
KMSAN: uninit-value in ip_tunnel_xmit C 2594 957d 1044d 957d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in br_nf_forward_arp 1 1003d 1000d 957d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: kernel-infoleak in vcs_read C 531 986d 996d 961d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
WARNING in kernfs_add_one C 174 965d 1030d 965d 84d0c27d driver core: Don't ignore class_dir_create_and_add() failure.
WARNING in bpf_int_jit_compile syz 11 973d 1009d 965d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in _copy_to_iter (2) C 226 996d 1042d 965d 670ae9ca vhost: fix info leak due to uninitialized memory
KMSAN: uninit-value in ip_vs_lblcr_check_expire 2050 965d 1042d 965d 3aa1409a ipvs: initialize tbl->entries after allocation
WARNING in bpf_prog_select_runtime syz 45 989d 990d 965d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in nfqnl_recv_config (2) C 10 978d 993d 965d ba062ebb netfilter: nf_queue: augment nfqa_cfg_policy
KMSAN: uninit-value in ebt_stp_mt_check (2) C 222 965d 997d 965d c568503e netfilter: x_tables: initialise match/target check parameter struct
KMSAN: uninit-value in eth_mac_addr 2 967d 1000d 965d 644c7eeb rtnetlink: validate attributes in do_setlink()
INFO: rcu detected stall in dev_queue_xmit_nit 1 1010d 1010d 965d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KMSAN: uninit-value in rtnetlink_put_metrics syz 3 999d 1000d 965d 5b5e7a0d net: metrics: add proper netlink validation
unexpected kernel reboot (2) C 2073 965d 1055d 965d 0447378a kvm: vmx: Nested VM-entry prereqs for event inj.
WARNING in ebt_do_table C 13 973d 998d 965d 11ff7288 netfilter: ebtables: reject non-bridge targets
WARNING in sysfs_remove_group C 11125 966d 1220d 965d d3349b6b loop: remember whether sysfs_create_group() was done
INFO: task hung in blk_queue_enter C 1595 965d 1037d 965d cd4a4ae4 block: don't use blocking queue entered for recursive bio submits
KMSAN: uninit-value in ip_vs_lblc_check_expire C 1431 965d 1042d 965d 8b2ebb6c ipvs: initialize tbl->entries in ip_vs_lblc_init_svc()
INFO: rcu detected stall in blkdev_ioctl C 249 996d 1170d 965d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
INFO: task hung in blk_freeze_queue C 188 966d 1117d 965d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
BUG: corrupted list in tipc_nametbl_unsubscribe C 40 1027d 1087d 969d c3317f4d tipc: fix unbalanced reference counter
KMSAN: uninit-value in ebt_stp_mt_check C 211 997d 1042d 997d a4995684 netfilter: bridge: stp fix reference to uninitialized data
WARNING in kcm_exit_net (3) syz 5 1004d 1004d 997d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
KMSAN: uninit-value in move_addr_to_user (2) C 44 1019d 1026d 1018d 09c8b971 tipc: fix one byte leak in tipc_sk_set_orig_addr()
KMSAN: uninit-value in strcmp C 3 1030d 1032d 1018d 94f6a80c tipc: eliminate KMSAN uninit-value in strcmp complaint
WARNING in xfrm6_tunnel_net_exit syz 14002 1021d 1151d 1018d b48c05ab xfrm: Fix warning in xfrm6_tunnel_net_exit.
KMSAN: uninit-value in __sctp_v6_cmp_addr C 1109 1019d 1020d 1019d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
KMSAN: uninit-value in rt6_multipath_hash C 3 1020d 1037d 1019d cea67a2d ipv6: fix uninit-value in ip6_multipath_l3_keys()
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt C 9 1019d 1025d 1019d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
KMSAN: uninit-value in put_cmsg C 2 1033d 1033d 1019d eb80ca47 rds: do not leak kernel memory to user land
WARNING: kobject bug in br_add_if 41 1027d 1054d 1019d e8238fc2 bridge: check iface upper dev when setting master via ioctl 3e14c6ab kobject: don't use WARN for registration failures
WARNING in tracepoint_probe_register_prio (2) C 849 1019d 1083d 1019d d66a270b tracepoint: Do not warn on ENOMEM
WARNING in tcp_mark_head_lost C 18 1028d 1110d 1019d 16ae6aa1 net-backports: tcp: ignore Fast Open on repair mode
KMSAN: uninit-value in ip_route_output_key_hash_rcu 179 1027d 1058d 1027d d0ea2b12 ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
KMSAN: uninit-value in strlcpy C 2 1029d 1029d 1027d 537b361f vti6: better validate user provided tunnel names
KMSAN: uninit-value in inet_csk_bind_conflict C 446 1027d 1058d 1027d 3099a529 soreuseport: initialise timewait reuseport field
KMSAN: uninit-value in fib6_new_table C 3 1043d 1044d 1027d aa8f8778 ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
KMSAN: uninit-value in ip6table_mangle_hook C 601 1027d 1058d 1027d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in move_addr_to_user C 74 1027d 1058d 1027d 6780db24 sctp: do not leak kernel memory to user space
INFO: rcu detected stall in bitmap_parselist 8 1035d 1064d 1027d 8351760f lib: fix stall in __bitmap_parselist()
KMSAN: uninit-value in sctp_do_bind C 31 1027d 1057d 1027d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
WARNING: kobject bug in netdev_queue_update_kobjects C 27 1029d 1091d 1027d 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in alg_bind C 1950 1027d 1058d 1027d a466856e crypto: af_alg - fix possible uninit-value in alg_bind()
KMSAN: uninit-value in pppol2tp_connect C 13 1027d 1042d 1027d eb1c28c0 l2tp: check sockaddr length in pppol2tp_connect()
WARNING in tty_set_ldisc syz 177 1035d 1211d 1027d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore().
KMSAN: uninit-value in inet_getpeer C 54 1027d 1056d 1027d b6a37e5e inetpeer: fix uninit-value in inet_getpeer
kernel panic: n_tty: init_tty C 141 1027d 1211d 1027d 903f9db1 tty: Don't call panic() at tty_ldisc_init()
KMSAN: uninit-value in tipc_node_get_mtu C 139 1027d 1058d 1027d 335b929b tipc: fix missing initializer in tipc_sendmsg()
KMSAN: uninit-value in netlink_sendmsg C 2493 1027d 1058d 1027d 6091f09c netlink: fix uninit-value in netlink_sendmsg
KMSAN: uninit-value in sctp_sendmsg syz 27 1027d 1057d 1027d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
KMSAN: uninit-value in tcp_parse_options C 38 1028d 1054d 1027d 72123032 tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
KMSAN: uninit-value in packet_set_ring C 6 1033d 1050d 1027d 5171b37d net: af_packet: fix race in PACKET_{R|T}X_RING
KMSAN: uninit-value in memcmp C 30 1029d 1058d 1027d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
KMSAN: uninit-value in iptable_mangle_hook C 1134 1027d 1058d 1027d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in neigh_dump_info C 6 1039d 1054d 1027d 7dd07c14 net: validate attribute sizes in neigh_dump_table()
WARNING: kobject bug in device_add C 563 1027d 1067d 1027d 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in fib_create_info C 19 1052d 1058d 1027d b1993a2d net: fix rtnh_ok()
kernel BUG at drivers/vhost/vhost.c:LINE! (2) C 139 1028d 1059d 1027d d14d2b78 vhost: fix vhost_vq_access_ok() log check
KMSAN: uninit-value in pppoe_connect 47 1027d 1042d 1027d a49e2f5d pppoe: check sockaddr length in pppoe_connect()
KMSAN: uninit-value in __skb_try_recv_from_queue C 108 1027d 1058d 1027d b13dda9f net: initialize skb->peeked when cloning
BUG: unable to handle kernel paging request in snd_pcm_format_set_silence syz 11 1027d 1054d 1027d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KMSAN: uninit-value in netif_skb_features C 119 1027d 1053d 1027d 7ce23672 vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
KMSAN: uninit-value in inet6_rtm_delroute C 9 1046d 1058d 1027d b1993a2d net: fix rtnh_ok()