syzbot


Title Repro Cause bisect Fix bisect Count Last Reported Closed Patch
KMSAN: uninit-value in ieee80211_skb_resize C 5 35d 60d 7d06h 14f46c1e mac80211: fix use of skb payload instead of header
KMSAN: uninit-value in ip_tunnel_xmit (2) C 11778 11d 836d 7d06h fdafed45 ip_gre: set dev->hard_header_len and dev->needed_headroom properly
KMSAN: uninit-value in can_receive (2) C 2060 11d 106d 7d06h e009f95b can: j1935: j1939_tp_tx_dat_new(): fix missing initialization of skbcnt
KMSAN: uninit-value in unix_find_other C 57 52d 868d 7d06h 7ca1db21 net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
KMSAN: uninit-value in batadv_hard_if_event (2) C 162 23d 106d 7d06h f45a4248 net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails
KMSAN: uninit-value in do_ip_vs_set_ctl C 365 12d 801d 7d06h c5a8a849 ipvs: Fix uninit-value in do_ip_vs_set_ctl()
KMSAN: uninit-value in __inet_diag_dump C 37 46d 63d 44d d5e4d0a5 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
KMSAN: uninit-value in inet_diag_cmd_exact C 31 45d 57d 44d d5e4d0a5 inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
KMSAN: kernel-infoleak in move_addr_to_user (3) C 79 68d 102d 56d 38ba8b92 can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
KMSAN: uninit-value in video_usercopy C 28 124d 124d 59d 4ffb879e media: media/v4l2-core: Fix kernel-infoleak in video_put_user()
KMSAN: kernel-infoleak in raw_ioctl C 22 81d 106d 59d a092b723 net: usb: Fix uninit-was-stored issue in asix_read_phy_addr()
KMSAN: uninit-value in netlink_policy_dump_start C 31 73d 76d 67d d1fb5559 netlink: fix state reallocation in policy export
KMSAN: uninit-value in geneve_xmit C 163 71d 124d 67d 32818c07 geneve: fix an uninitialized value in geneve_changelink()
KMSAN: uninit-value in ucma_connect C 138 72d 124d 67d 31142a4b RDMA/cm: Add min length checks to user structure copies
KMSAN: uninit-value in __tipc_nl_compat_dumpit (3) C 6181 68d 132d 67d 47733f9d tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
KMSAN: uninit-value in xa_load C 208 68d 124d 67d 31142a4b RDMA/cm: Add min length checks to user structure copies
KMSAN: uninit-value in tbf_enqueue 21 129d 216d 129d 9274124f net: stricter validation of untrusted gso packets
KMSAN: uninit-value in do_tcp_getsockopt 5 141d 193d 129d e776af60 net-backports: tcp: fix error recovery in tcp_zerocopy_receive()
KMSAN: uninit-value in skbprio_enqueue syz 11 143d 206d 129d 2761121a net_sched: sch_skbprio: add message validation to skbprio_change()
KMSAN: uninit-value in etf_enqueue_timesortedlist 3 199d 206d 158d a1211bf9 sched: etf: do not assume all sockets are full blown
KMSAN: uninit-value in simple_attr_read C 6 200d 270d 197d a65cab7d libfs: fix infoleak in simple_attr_read()
BUG: corrupted list in rdma_listen C 202 369d 949d 197d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KMSAN: uninit-value in tcf_exts_change C 5 248d 257d 197d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
KMSAN: uninit-value in __iptunnel_pull_header C 12 253d 262d 222d 17c25caf gre: fix uninit-value in __iptunnel_pull_header
KMSAN: use-after-free in netdev_state_change 2 266d 266d 222d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in slhc_compress C 3 264d 264d 222d 110a40df slip: make slhc_compress() more robust against malicious packets
KMSAN: use-after-free in find_match C 52 252d 281d 222d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache 2 292d 290d 222d 457fed77 net/smc: fix leak of kernel memory to user space
KMSAN: uninit-value in bond_alb_xmit syz 3 262d 264d 222d b7469e83 bonding/alb: make sure arp header is pulled before accessing it
KMSAN: use-after-free in inet_gifconf 10 252d 275d 222d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in ip6_dst_destroy C 2 255d 267d 222d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: use-after-free in veth_xmit 8 252d 267d 222d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in kstrdup C 8 258d 285d 222d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: use-after-free in l3mdev_master_ifindex_rcu C 5 252d 275d 222d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in dev_alloc_name_ns 3 252d 266d 222d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in rdma_listen C 26 263d 408d 242d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen C 28 420d 784d 242d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in setup_udp_tunnel_sock C 1 307d 307d 279d 940ba149 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
KMSAN: uninit-value in can_receive C 14 282d 371d 279d e7153bf7 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
KMSAN: uninit-value in sd_init (2) C 94 385d 381d 279d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in __request_module (3) C 58 279d 308d 279d 36d79af7 net-backports: net_sched: use validated TCA_KIND attribute in tc_new_tfilter()
KMSAN: uninit-value in rsvp_change C 4 299d 300d 279d cb3c0e6b cls_rsvp: fix rsvp_policy
KMSAN: uninit-value in macvlan_broadcast C 2 321d 322d 279d 96cc4b69 macvlan: do not assume mac_header is set in macvlan_broadcast()
KMSAN: uninit-value in digitv_rc_query C 4 397d 381d 279d eecc70d2 media: digitv: don't continue if remote control state can't be read 569bc8d6 media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0
KMSAN: uninit-value in number C 190 283d 381d 279d 51d0c99b media: af9005: uninitialized variable printked
KMSAN: uninit-value in __tipc_nl_compat_dumpit C 4428 279d 348d 279d a7869e5f tipc: eliminate KMSAN: uninit-value in __tipc_nl_compat_dumpit error
KMSAN: uninit-value in i2c_w (2) C 3 392d 381d 279d de89d086 media: gspca: zero usb_buf
WARNING in tracepoint_probe_register_prio (3) syz done 979 282d 920d 279d 64ae572b tracing: Fix sched switch start/stop refcount racy updates
KMSAN: uninit-value in read_sensor_register (2) C 44 386d 403d 279d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in dvb_usb_adapter_dvb_init 1 388d 381d 279d 26cff637 media: vp7045: do not read uninitialized values if usb transfer fails
WARNING in tcp_enter_loss (2) C done unreliable 4 937d 987d 279d 16ae6aa1 tcp: ignore Fast Open on repair mode
KMSAN: uninit-value in __crc32c_le_base syz 567 320d 366d 283d b6f3320b sctp: fully initialize v4 addr in some functions
unregister_netdevice: waiting for DEV to become free (2) C done 385621 283d 831d 283d ddd9b5e3 net-sysfs: Call dev_hold always in rx_queue_add_kobject
KMSAN: uninit-value in br_nf_forward_arp (3) 2 359d 352d 283d 56042858 net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
KMSAN: uninit-value in bond_neigh_setup 64 328d 352d 283d f394722f net-backports: neighbour: remove neigh_cleanup() method
BUG: Bad rss-counter state (3) C unreliable done 438 483d 949d 297d 173d9d9f mm/huge_memory: splitting set mapping+index before unfreeze
KMSAN: uninit-value in __request_module (2) 3 339d 352d 320d 2dd5616e net-backports: net_sched: validate TCA_KIND attribute in tc_chain_tmplt_add()
KMSAN: uninit-value in usbnet_probe C 1 537d 537d 320d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in nf_conntrack_tcp_packet syz 3 354d 357d 320d 9424e2e7 net-backports: tcp: md5: fix potential overestimation of TCP option space
KMSAN: use-after-free in netlink_recvmsg C 1 376d 376d 346d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in kfree_skb syz 34 363d 411d 346d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __skb_try_recv_from_queue C 4 375d 399d 346d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in sk_forced_mem_schedule 2 369d 377d 346d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __netif_receive_skb_core 1 377d 377d 346d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in skb_dequeue C 1 406d 406d 346d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in copyout C 1 411d 411d 346d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: uninit-value in ax88172a_bind C 5 391d 405d 360d a9a51bd7 ax88172a: fix information leak on short answers
KMSAN: uninit-value in gf128mul_4k_lle (3) C 2958 365d 730d 360d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: uninit-value in aesti_encrypt C 54 414d 515d 360d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: use-after-free in build_audio_procunit C 2 397d 397d 360d 976a68f0 ALSA: usb-audio: Fix incorrect size check for processing/extension units
KMSAN: uninit-value in get_min_max_with_quirks C 11 392d 381d 360d 167beb17 ALSA: usb-audio: Fix missing error check at mixer resolution test
KMSAN: uninit-value in cdc_ncm_set_dgram_size C 4 390d 389d 360d 332f989a CDC-NCM: handle incomplete transfer of MTU
KMSAN: kernel-usb-infoleak in pcan_usb_wait_rsp C 2 404d 403d 360d f7a1337f can: peak_usb: fix slab info leak
WARNING in generic_make_request_checks C done 7760 361d 837d 361d 8b2ded1c block: don't warn when doing fsync on read-only devices
KMSAN: use-after-free in adu_disconnect C 16 406d 412d 362d 44efc269 USB: adutux: fix use-after-free on disconnect
KMSAN: use-after-free in mutex_spin_on_owner C 1 411d 411d 362d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in iowarrior_disconnect C 21 406d 412d 362d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in usb_autopm_put_interface C 63 392d 405d 362d 7a759197 USB: usblp: fix use-after-free on disconnect
KMSAN: use-after-free in __pm_runtime_resume 1 412d 412d 362d 5f924277 HID: logitech: Fix general protection fault caused by Logitech driver
KMSAN: use-after-free in hidraw_ioctl 1 412d 412d 362d 416dacb8 HID: hidraw: Fix invalid read in hidraw_ioctl
KMSAN: use-after-free in rxrpc_put_peer 1 403d 403d 362d 91fcfbe8 rxrpc: Fix call crypto state cleanup
KMSAN: uninit-value in lg4ff_set_autocenter_default C 1 392d 392d 362d d9d4b1e4 HID: Fix assumption that devices have inputs
WARNING in sk_stream_kill_queues (3) C done 622 533d 893d 362d 9354544c net/tls: fix page double free on TX cleanup
INFO: task hung in fuse_reverse_inval_entry C done 23 841d 854d 378d c59fd85e fuse: change interrupt requests allocation algorithm
KMSAN: uninit-value in sr9800_bind C 27 394d 417d 385d 77b6d09f net: usb: sr9800: fix uninitialized local variable
KMSAN: uninit-value in mts_usb_probe C 29 412d 417d 392d 177238c3 USB: microtek: fix info-leak at probe
KMSAN: uninit-value in iowarrior_disconnect C 18 410d 416d 392d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: uninit-value in read_sensor_register C 25 404d 534d 404d 4843a543 media: gspca: zero usb_buf on error
KMSAN: kernel-usb-infoleak in ttusb_dec_send_command C 2 472d 482d 404d a10feaf8 media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
KMSAN: uninit-value in inet_ehash_insert C 7 413d 420d 404d 6af1799a net-backports: ipv6: drop incoming packets having a v4mapped source address
KMSAN: uninit-value in i2c_w C 2 538d 537d 404d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in __request_module C 13 414d 434d 404d 62794fc4 net_sched: add max len check for TCA_KIND
KMSAN: uninit-value in sd_init C 122 405d 537d 404d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in capi_write C 445 411d 650d 411d fe163e53 isdn/capi: check message length in capi_write()
KMSAN: uninit-value in batadv_iv_send_outstanding_bat_ogm_packet C 9 460d 459d 434d a15d56a6 batman-adv: Only read OGM tvlv_len after buffer len check
KMSAN: uninit-value in rtm_new_nexthop C 8 460d 459d 443d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: uninit-value in batadv_netlink_dump_hardif C 58 454d 490d 443d 3ee1bb7a batman-adv: fix uninit-value in batadv_netlink_get_ifindex()
KMSAN: uninit-value in rtm_dump_nexthop C 6 454d 470d 443d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: kernel-usb-infoleak in pcan_usb_pro_send_req C 16 456d 482d 454d 30a8beeb can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
KMSAN: kernel-usb-infoleak in pcan_usb_pro_init C 13 458d 482d 454d ead16e53 can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
KMSAN: uninit-value in read_eprom_word C 31 456d 482d 454d 224c0497 net: usb: pegasus: fix improper read if get_registers() fail
KMSAN: uninit-value in ax88772_bind C 80 478d 539d 476d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in bond_start_xmit (2) C 2309 476d 800d 476d 9d1bc24b bonding: validate ip header before check IPPROTO_IGMP
KMSAN: uninit-value in tipc_nl_compat_bearer_disable C 19 509d 523d 483d 4f07b80c tipc: check msg->req data len in tipc_nl_compat_bearer_disable
KMSAN: uninit-value in tcp_create_openreq_child C 4000 502d 523d 501d 85f9aa75 inet: clear num_timeout reqsk_alloc()
KMSAN: kernel-infoleak in copy_siginfo_to_user (2) C 15 531d 561d 501d f6e2aa91 signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO
KMSAN: uninit-value in aa_fqlookupn_profile C 39 742d 787d 531d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
KMSAN: uninit-value in br_mdb_ip_get 5 606d 664d 542d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
WARNING in xfrm_state_fini (2) C 37510 570d 1023d 546d dbb2483b xfrm: clean up xfrm protocol checks
KMSAN: uninit-value in rds_connect C 952 573d 816d 546d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_dump syz 14 576d 591d 546d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_inet_address 33 556d 557d 546d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in rds_bind C 6202 573d 816d 546d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_get C 5 583d 591d 546d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_unix_address 8 557d 557d 546d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in ip6_compressed_string C 9024 574d 726d 573d 7c2bd9a3 NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (2) C 6 620d 606d 591d 2ac695d1 tipc: handle the err returned from cmd header function
KMSAN: kernel-infoleak in sctp_getsockopt (3) syz 11 593d 606d 591d 09279e61 sctp: initialize _pad of sockaddr_in before copying to user memory
KMSAN: uninit-value in tipc_nl_compat_link_set (3) C 15 597d 607d 591d 8c63bf9a tipc: check link name with right length in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable (2) C 51 594d 607d 591d 6f07e5f0 tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
KMSAN: uninit-value in mpol_rebind_mm 6 608d 693d 606d 2e25644e mm, mempolicy: fix uninit memory access
KMSAN: kernel-infoleak in video_usercopy C 410 607d 706d 606d f45f3f75 media: v4l2-ctrls.c/uvc: zero v4l2_event
KMSAN: uninit-value in gue6_err (2) C 2826 606d 628d 606d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: kernel-infoleak in move_addr_to_user (2) C 8 607d 622d 606d 163d1c3d l2tp: fix infoleak in l2tp_ip6_recvmsg()
KMSAN: uninit-value in gue_err (2) C 1617 606d 628d 606d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: uninit-value in batadv_interface_tx C 98 628d 651d 628d 4ffcbfac batman-adv: fix uninit-value in batadv_interface_tx()
KMSAN: uninit-value in tipc_subscrb_rcv_cb C 13 939d 960d 628d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page C 25 719d 747d 628d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_doit C 153 643d 794d 628d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in tipc_nl_compat_name_table_dump C 51 714d 755d 628d 974cb0e3 tipc: fix uninit-value in tipc_nl_compat_name_table_dump
KMSAN: uninit-value in tipc_nl_compat_link_set (2) C 13 665d 706d 628d edf5ff04 tipc: fix uninit-value in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable C 144 630d 755d 628d 0762216c tipc: fix uninit-value in tipc_nl_compat_bearer_enable
KMSAN: kernel-infoleak in move_addr_to_user 5 635d 685d 628d 7d033c9f ipv6: fix kernel-infoleak in ipv6_local_error()
KMSAN: uninit-value in tipc_nl_compat_link_reset_stats syz 16 632d 686d 628d 8b66fee7 tipc: fix uninit-value in tipc_nl_compat_link_reset_stats
KMSAN: uninit-value in kvm_clear_dirty_log_protect 6 628d 673d 628d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
KMSAN: kernel-infoleak in vmx_get_nested_state C 6 629d 740d 628d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_dumpit C 209 643d 794d 628d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in gue_err C 4686 628d 682d 628d 26fc181e fou, fou6: do not assume linear skbs
WARNING in xfrm6_tunnel_net_exit (2) C 48816 637d 919d 628d f75a2804 xfrm: destroy xfrm_state synchronously on net exit path
KMSAN: uninit-value in tipc_conn_rcv_sub C 557 630d 925d 628d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in sctp_getsockopt (2) C 16 628d 679d 628d 400b8b9a sctp: allocate sctp_sockaddr_entry with kzalloc
KMSAN: uninit-value in gue6_err C 8359 628d 682d 628d 26fc181e fou, fou6: do not assume linear skbs
KMSAN: uninit-value in vti6_tnl_xmit syz 60 682d 706d 677d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: uninit-value in check_6rd C 81 683d 706d 677d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: kernel-infoleak in capi_unlocked_ioctl C 109 682d 693d 677d d63967e4 isdn: fix kernel-infoleak in capi_unlocked_ioctl
KMSAN: kernel-infoleak in sctp_getsockopt syz 147 683d 718d 682d 4a2eb0c3 sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event
KMSAN: uninit-value in __inet6_bind C 56 683d 713d 682d fb242745 ipv6: explicitly initialize udp6_addr in udp_sock_create6()
KMSAN: uninit-value in packet_sendmsg 5 731d 706d 682d 99137b78 packet: validate address length
KMSAN: kernel-infoleak in _copy_to_iter (4) C 56 721d 725d 706d 68883893 rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
KMSAN: uninit-value in linear_transfer (2) C 7 722d 745d 717d 65766ee0 ALSA: oss: Use kvzalloc() for local buffer allocations
KMSAN: kernel-infoleak in kvm_write_guest_page C 36 719d 747d 717d bcbfbd8e KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl C 31 722d 737d 717d 7f9ad1df KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
KMSAN: uninit-value in synaptics_detect C 137 742d 794d 741d f39f8688 Input: synaptics - avoid using uninitialized variable when probing
KMSAN: uninit-value in dev_mc_add_excl C 13 746d 758d 741d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in dev_uc_add_excl C 20 753d 794d 741d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in ip_tunnel_lookup (2) C 2 759d 760d 741d b0350d51 ip_gre: fix parsing gre header in ipgre_err
KMSAN: uninit-value in vcs_read C 2343 899d 923d 745d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
KMSAN: kernel-infoleak in _copy_to_iter (3) C 36 756d 767d 755d b06f9d9f tipc: fix info leak from kernel tipc_event
KMSAN: uninit-value in ip6_tnl_start_xmit C 69 787d 798d 774d 76c0ddd8 ip6_tunnel: be careful when accessing the inner header
WARNING in usb_submit_urb (2) C 259 774d 812d 774d 7a68d9fb USB: usbdevfs: sanitize flags more
KMSAN: uninit-value in pppoe_rcv C 2 933d 803d 774d 8540827e pppoe: fix reception of frames with no mac header
KMSAN: kernel-infoleak in _copy_to_iter (2) C 7 782d 810d 777d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
WARNING in apparmor_secid_to_secctx C 3344 801d 816d 788d edf4e7b7 apparmor: fix bad debug check in apparmor_secid_to_secctx()
KMSAN: uninit-value in snd_midi_event_encode_byte C 3 812d 812d 788d 5a7b44a8 ALSA: rawmidi: Initialize allocated buffers
BUG: unable to handle kernel paging request in kfree (2) C 297 816d 868d 791d 7913690d net/9p/client.c: version pointer uninitialized
KMSAN: uninit-value in memcmp (2) C 131 802d 793d 791d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
WARNING in wiphy_register (2) C 8 829d 831d 804d 48400433 mac80211_hwsim: require at least one channel
WARNING in input_alloc_absinfo C 318 820d 893d 818d 100294ce Input: do not use WARN() in input_alloc_absinfo()
KMSAN: uninit-value in do_msgrcv C 8 818d 894d 818d 39cfffd7 ipc/util.c: use ipc_rcu_putref() for failues in ipc_addid() 615c999c ipc: compute kern_ipc_perm.id under the ipc lock e2652ae6 ipc: reorganize initialization of kern_ipc_perm.seq
BUG: corrupted list in p9_fd_cancel C 34 854d 868d 818d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
kernel BUG at net/ipv6/route.c:LINE! C 197 840d 862d 838d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in __nf_conntrack_find_get C 67 853d 860d 838d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
KMSAN: kernel-infoleak in put_cmsg C 3 870d 860d 838d 2efd4fca ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
KMSAN: uninit-value in gc_worker 10 854d 865d 838d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
kernel BUG at fs/userfaultfd.c:LINE! (2) C 8 843d 861d 838d 31e810aa userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KMSAN: kernel-infoleak in _copy_to_iter C 285 853d 889d 838d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
unregister_netdevice: waiting for DEV to become free C 170521 838d 949d 838d 8cc88773 xfrm: fix missing dst_release() after policy blocking lbcast and multicast
KMSAN: uninit-value in af_alg_free_areq_sgls C 640 853d 960d 839d 2546da99 crypto: af_alg - Initialize sg_num_bytes in error code path
WARNING in iov_iter_revert C 74 858d 925d 839d 32da1221 tls: Stricter error checking in zerocopy sendmsg path
WARNING in smc_unhash_sk C 155731 841d 1004d 839d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
KMSAN: uninit-value in ip_tunnel_xmit C 2594 860d 947d 860d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in br_nf_forward_arp 1 906d 903d 860d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: kernel-infoleak in vcs_read C 531 889d 899d 864d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
WARNING in kernfs_add_one C 174 868d 933d 868d 84d0c27d driver core: Don't ignore class_dir_create_and_add() failure.
WARNING in bpf_int_jit_compile syz 11 875d 912d 868d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in _copy_to_iter (2) C 226 899d 945d 868d 670ae9ca vhost: fix info leak due to uninitialized memory
KMSAN: uninit-value in ip_vs_lblcr_check_expire 2050 868d 945d 868d 3aa1409a ipvs: initialize tbl->entries after allocation
WARNING in bpf_prog_select_runtime syz 45 892d 893d 868d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in nfqnl_recv_config (2) C 10 881d 896d 868d ba062ebb netfilter: nf_queue: augment nfqa_cfg_policy
KMSAN: uninit-value in ebt_stp_mt_check (2) C 222 868d 900d 868d c568503e netfilter: x_tables: initialise match/target check parameter struct
KMSAN: uninit-value in eth_mac_addr 2 870d 903d 868d 644c7eeb rtnetlink: validate attributes in do_setlink()
INFO: rcu detected stall in dev_queue_xmit_nit 1 913d 913d 868d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KMSAN: uninit-value in rtnetlink_put_metrics syz 3 902d 903d 868d 5b5e7a0d net: metrics: add proper netlink validation
unexpected kernel reboot (2) C 2073 868d 958d 868d 0447378a kvm: vmx: Nested VM-entry prereqs for event inj.
WARNING in ebt_do_table C 13 876d 901d 868d 11ff7288 netfilter: ebtables: reject non-bridge targets
WARNING in sysfs_remove_group C 11125 869d 1123d 868d d3349b6b loop: remember whether sysfs_create_group() was done
INFO: task hung in blk_queue_enter C 1595 868d 940d 868d cd4a4ae4 block: don't use blocking queue entered for recursive bio submits
KMSAN: uninit-value in ip_vs_lblc_check_expire C 1431 868d 945d 868d 8b2ebb6c ipvs: initialize tbl->entries in ip_vs_lblc_init_svc()
INFO: rcu detected stall in blkdev_ioctl C 249 898d 1073d 868d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
INFO: task hung in blk_freeze_queue C 188 869d 1020d 868d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
BUG: corrupted list in tipc_nametbl_unsubscribe C 40 930d 989d 872d c3317f4d tipc: fix unbalanced reference counter
KMSAN: uninit-value in ebt_stp_mt_check C 211 900d 945d 900d a4995684 netfilter: bridge: stp fix reference to uninitialized data
WARNING in kcm_exit_net (3) syz 5 907d 907d 900d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
KMSAN: uninit-value in move_addr_to_user (2) C 44 922d 929d 921d 09c8b971 tipc: fix one byte leak in tipc_sk_set_orig_addr()
KMSAN: uninit-value in strcmp C 3 933d 935d 921d 94f6a80c tipc: eliminate KMSAN uninit-value in strcmp complaint
WARNING in xfrm6_tunnel_net_exit syz 14002 924d 1054d 921d b48c05ab xfrm: Fix warning in xfrm6_tunnel_net_exit.
KMSAN: uninit-value in __sctp_v6_cmp_addr C 1109 922d 923d 921d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
KMSAN: uninit-value in rt6_multipath_hash C 3 923d 940d 922d cea67a2d ipv6: fix uninit-value in ip6_multipath_l3_keys()
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt C 9 922d 927d 922d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
KMSAN: uninit-value in put_cmsg C 2 936d 936d 922d eb80ca47 rds: do not leak kernel memory to user land
WARNING: kobject bug in br_add_if 41 930d 957d 922d e8238fc2 bridge: check iface upper dev when setting master via ioctl 3e14c6ab kobject: don't use WARN for registration failures
WARNING in tracepoint_probe_register_prio (2) C 849 922d 986d 922d d66a270b tracepoint: Do not warn on ENOMEM
WARNING in tcp_mark_head_lost C 18 931d 1013d 922d 16ae6aa1 net-backports: tcp: ignore Fast Open on repair mode
KMSAN: uninit-value in ip_route_output_key_hash_rcu 179 930d 961d 930d d0ea2b12 ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
KMSAN: uninit-value in strlcpy C 2 932d 932d 930d 537b361f vti6: better validate user provided tunnel names
KMSAN: uninit-value in inet_csk_bind_conflict C 446 930d 961d 930d 3099a529 soreuseport: initialise timewait reuseport field
KMSAN: uninit-value in fib6_new_table C 3 946d 947d 930d aa8f8778 ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
KMSAN: uninit-value in ip6table_mangle_hook C 601 930d 961d 930d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in move_addr_to_user C 74 930d 961d 930d 6780db24 sctp: do not leak kernel memory to user space
INFO: rcu detected stall in bitmap_parselist 8 938d 967d 930d 8351760f lib: fix stall in __bitmap_parselist()
KMSAN: uninit-value in sctp_do_bind C 31 930d 960d 930d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
WARNING: kobject bug in netdev_queue_update_kobjects C 27 932d 994d 930d 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in alg_bind C 1950 930d 961d 930d a466856e crypto: af_alg - fix possible uninit-value in alg_bind()
KMSAN: uninit-value in pppol2tp_connect C 13 930d 945d 930d eb1c28c0 l2tp: check sockaddr length in pppol2tp_connect()
WARNING in tty_set_ldisc syz 177 938d 1114d 930d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore().
KMSAN: uninit-value in inet_getpeer C 54 930d 959d 930d b6a37e5e inetpeer: fix uninit-value in inet_getpeer
kernel panic: n_tty: init_tty C 141 930d 1114d 930d 903f9db1 tty: Don't call panic() at tty_ldisc_init()
KMSAN: uninit-value in tipc_node_get_mtu C 139 930d 961d 930d 335b929b tipc: fix missing initializer in tipc_sendmsg()
KMSAN: uninit-value in netlink_sendmsg C 2493 930d 961d 930d 6091f09c netlink: fix uninit-value in netlink_sendmsg
KMSAN: uninit-value in sctp_sendmsg syz 27 930d 960d 930d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
KMSAN: uninit-value in tcp_parse_options C 38 931d 957d 930d 72123032 tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
KMSAN: uninit-value in packet_set_ring C 6 936d 953d 930d 5171b37d net: af_packet: fix race in PACKET_{R|T}X_RING
KMSAN: uninit-value in memcmp C 30 931d 961d 930d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
KMSAN: uninit-value in iptable_mangle_hook C 1134 930d 961d 930d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in neigh_dump_info C 6 942d 957d 930d 7dd07c14 net: validate attribute sizes in neigh_dump_table()
WARNING: kobject bug in device_add C 563 930d 970d 930d 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in fib_create_info C 19 955d 961d 930d b1993a2d net: fix rtnh_ok()
kernel BUG at drivers/vhost/vhost.c:LINE! (2) C 139 931d 962d 930d d14d2b78 vhost: fix vhost_vq_access_ok() log check
KMSAN: uninit-value in pppoe_connect 47 930d 945d 930d a49e2f5d pppoe: check sockaddr length in pppoe_connect()
KMSAN: uninit-value in __skb_try_recv_from_queue C 108 930d 961d 930d b13dda9f net: initialize skb->peeked when cloning
BUG: unable to handle kernel paging request in snd_pcm_format_set_silence syz 11 930d 957d 930d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KMSAN: uninit-value in netif_skb_features C 119 930d 956d 930d 7ce23672 vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
KMSAN: uninit-value in inet6_rtm_delroute C 9 949d 961d 930d b1993a2d net: fix rtnh_ok()