syzbot


fixed (187):
Title Repro Bisected Count Last Reported Closed Patch
KMSAN: uninit-value in __request_module (2) 3 30d 42d 10d 2dd5616e net-backports: net_sched: validate TCA_KIND attribute in tc_chain_tmplt_add()
KMSAN: uninit-value in usbnet_probe C 1 227d 227d 10d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in nf_conntrack_tcp_packet syz 3 44d 47d 10d 9424e2e7 net-backports: tcp: md5: fix potential overestimation of TCP option space
KMSAN: use-after-free in netlink_recvmsg C 1 66d 66d 36d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in kfree_skb syz 34 53d 102d 36d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __skb_try_recv_from_queue C 4 65d 89d 36d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in sk_forced_mem_schedule 2 59d 67d 36d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __netif_receive_skb_core 1 67d 67d 36d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in skb_dequeue C 1 96d 96d 36d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in copyout C 1 102d 102d 36d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: uninit-value in ax88172a_bind C 5 82d 95d 50d a9a51bd7 ax88172a: fix information leak on short answers
KMSAN: uninit-value in gf128mul_4k_lle (3) C 2958 55d 420d 50d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: uninit-value in aesti_encrypt C 54 104d 205d 50d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: use-after-free in build_audio_procunit C 2 88d 88d 50d 976a68f0 ALSA: usb-audio: Fix incorrect size check for processing/extension units
KMSAN: uninit-value in get_min_max_with_quirks C 11 83d 71d 50d 167beb17 ALSA: usb-audio: Fix missing error check at mixer resolution test
KMSAN: uninit-value in cdc_ncm_set_dgram_size C 4 81d 80d 50d 332f989a CDC-NCM: handle incomplete transfer of MTU
KMSAN: kernel-usb-infoleak in pcan_usb_wait_rsp C 2 94d 93d 50d f7a1337f can: peak_usb: fix slab info leak
WARNING in generic_make_request_checks C cause 7760 51d 527d 51d 8b2ded1c block: don't warn when doing fsync on read-only devices
KMSAN: use-after-free in adu_disconnect C 16 96d 102d 52d 44efc269 USB: adutux: fix use-after-free on disconnect
KMSAN: use-after-free in mutex_spin_on_owner C 1 101d 101d 52d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in iowarrior_disconnect C 21 96d 102d 52d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in usb_autopm_put_interface C 63 82d 96d 52d 7a759197 USB: usblp: fix use-after-free on disconnect
KMSAN: use-after-free in __pm_runtime_resume 1 102d 102d 52d 5f924277 HID: logitech: Fix general protection fault caused by Logitech driver
KMSAN: use-after-free in hidraw_ioctl 1 102d 102d 52d 416dacb8 HID: hidraw: Fix invalid read in hidraw_ioctl
KMSAN: use-after-free in rxrpc_put_peer 1 93d 93d 52d 91fcfbe8 rxrpc: Fix call crypto state cleanup
KMSAN: uninit-value in lg4ff_set_autocenter_default C 1 82d 82d 53d d9d4b1e4 HID: Fix assumption that devices have inputs
WARNING in sk_stream_kill_queues (3) C cause 622 224d 583d 53d 9354544c net/tls: fix page double free on TX cleanup
INFO: task hung in fuse_reverse_inval_entry C fix 23 531d 544d 68d c59fd85e fuse: change interrupt requests allocation algorithm
KMSAN: uninit-value in sr9800_bind C 27 84d 107d 75d 77b6d09f net: usb: sr9800: fix uninitialized local variable
KMSAN: uninit-value in mts_usb_probe C 29 102d 108d 83d 177238c3 USB: microtek: fix info-leak at probe
KMSAN: uninit-value in iowarrior_disconnect C 18 100d 107d 83d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: uninit-value in read_sensor_register C 25 95d 225d 94d 4843a543 media: gspca: zero usb_buf on error
KMSAN: kernel-usb-infoleak in ttusb_dec_send_command C 2 162d 172d 94d a10feaf8 media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
KMSAN: uninit-value in inet_ehash_insert C 7 103d 110d 94d 6af1799a net-backports: ipv6: drop incoming packets having a v4mapped source address
KMSAN: uninit-value in i2c_w C 2 228d 227d 94d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in __request_module C 13 104d 124d 94d 62794fc4 net_sched: add max len check for TCA_KIND
KMSAN: uninit-value in sd_init C 122 95d 227d 94d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in capi_write C 445 101d 341d 101d fe163e53 isdn/capi: check message length in capi_write()
KMSAN: uninit-value in batadv_iv_send_outstanding_bat_ogm_packet C 9 150d 150d 124d a15d56a6 batman-adv: Only read OGM tvlv_len after buffer len check
KMSAN: uninit-value in rtm_new_nexthop C 8 150d 150d 134d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: uninit-value in batadv_netlink_dump_hardif C 58 144d 180d 134d 3ee1bb7a batman-adv: fix uninit-value in batadv_netlink_get_ifindex()
KMSAN: uninit-value in rtm_dump_nexthop C 6 144d 160d 134d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: kernel-usb-infoleak in pcan_usb_pro_send_req C 16 146d 172d 144d 30a8beeb can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
KMSAN: kernel-usb-infoleak in pcan_usb_pro_init C 13 148d 172d 144d ead16e53 can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
KMSAN: uninit-value in read_eprom_word C 31 146d 172d 144d 224c0497 net: usb: pegasus: fix improper read if get_registers() fail
KMSAN: uninit-value in ax88772_bind C 80 168d 229d 166d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in bond_start_xmit (2) C 2309 166d 490d 166d 9d1bc24b bonding: validate ip header before check IPPROTO_IGMP
KMSAN: uninit-value in tipc_nl_compat_bearer_disable C 19 200d 213d 173d 4f07b80c tipc: check msg->req data len in tipc_nl_compat_bearer_disable
KMSAN: uninit-value in tcp_create_openreq_child C 4000 192d 213d 192d 85f9aa75 inet: clear num_timeout reqsk_alloc()
KMSAN: kernel-infoleak in copy_siginfo_to_user (2) C 15 221d 251d 192d f6e2aa91 signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO
KMSAN: uninit-value in aa_fqlookupn_profile C 39 432d 477d 221d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
KMSAN: uninit-value in br_mdb_ip_get 5 296d 355d 232d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
WARNING in xfrm_state_fini (2) C 37510 260d 713d 236d dbb2483b xfrm: clean up xfrm protocol checks
KMSAN: uninit-value in rds_connect C 952 264d 506d 236d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_dump syz 14 266d 281d 236d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_inet_address 33 247d 247d 236d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in rds_bind C 6202 264d 506d 236d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_get C 5 273d 281d 236d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_unix_address 8 247d 247d 236d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in ip6_compressed_string C 9024 264d 416d 264d 7c2bd9a3 NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (2) C 6 311d 296d 281d 2ac695d1 tipc: handle the err returned from cmd header function
KMSAN: kernel-infoleak in sctp_getsockopt (3) syz 11 283d 296d 281d 09279e61 sctp: initialize _pad of sockaddr_in before copying to user memory
KMSAN: uninit-value in tipc_nl_compat_link_set (3) C 15 287d 297d 281d 8c63bf9a tipc: check link name with right length in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable (2) C 51 284d 297d 281d 6f07e5f0 tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
KMSAN: uninit-value in mpol_rebind_mm 6 298d 383d 296d 2e25644e mm, mempolicy: fix uninit memory access
KMSAN: kernel-infoleak in video_usercopy C 410 297d 396d 296d f45f3f75 media: v4l2-ctrls.c/uvc: zero v4l2_event
KMSAN: uninit-value in gue6_err (2) C 2826 296d 318d 296d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: kernel-infoleak in move_addr_to_user (2) C 8 297d 312d 296d 163d1c3d l2tp: fix infoleak in l2tp_ip6_recvmsg()
KMSAN: uninit-value in gue_err (2) C 1617 296d 318d 296d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: uninit-value in batadv_interface_tx C 98 318d 341d 318d 4ffcbfac batman-adv: fix uninit-value in batadv_interface_tx()
KMSAN: uninit-value in tipc_subscrb_rcv_cb C 13 629d 650d 318d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page C 25 409d 437d 318d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_doit C 153 333d 485d 318d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in tipc_nl_compat_name_table_dump C 51 404d 445d 318d 974cb0e3 tipc: fix uninit-value in tipc_nl_compat_name_table_dump
KMSAN: uninit-value in tipc_nl_compat_link_set (2) C 13 355d 396d 318d edf5ff04 tipc: fix uninit-value in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable C 144 320d 445d 318d 0762216c tipc: fix uninit-value in tipc_nl_compat_bearer_enable
KMSAN: kernel-infoleak in move_addr_to_user 5 325d 375d 318d 7d033c9f ipv6: fix kernel-infoleak in ipv6_local_error()
KMSAN: uninit-value in tipc_nl_compat_link_reset_stats syz 16 322d 376d 318d 8b66fee7 tipc: fix uninit-value in tipc_nl_compat_link_reset_stats
KMSAN: uninit-value in kvm_clear_dirty_log_protect 6 318d 363d 318d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
KMSAN: kernel-infoleak in vmx_get_nested_state C 6 319d 430d 318d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_dumpit C 209 333d 484d 318d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in gue_err C 4686 318d 372d 318d 26fc181e fou, fou6: do not assume linear skbs
WARNING in xfrm6_tunnel_net_exit (2) C 48816 327d 609d 318d f75a2804 xfrm: destroy xfrm_state synchronously on net exit path
KMSAN: uninit-value in tipc_conn_rcv_sub C 557 320d 615d 318d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in sctp_getsockopt (2) C 16 318d 369d 318d 400b8b9a sctp: allocate sctp_sockaddr_entry with kzalloc
KMSAN: uninit-value in gue6_err C 8359 318d 372d 318d 26fc181e fou, fou6: do not assume linear skbs
KMSAN: uninit-value in vti6_tnl_xmit syz 60 372d 396d 368d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: uninit-value in check_6rd C 81 374d 396d 368d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: kernel-infoleak in capi_unlocked_ioctl C 109 372d 383d 368d d63967e4 isdn: fix kernel-infoleak in capi_unlocked_ioctl
KMSAN: kernel-infoleak in sctp_getsockopt syz 147 373d 409d 372d 4a2eb0c3 sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event
KMSAN: uninit-value in __inet6_bind C 56 374d 403d 372d fb242745 ipv6: explicitly initialize udp6_addr in udp_sock_create6()
KMSAN: uninit-value in packet_sendmsg 5 422d 396d 372d 99137b78 packet: validate address length
KMSAN: kernel-infoleak in _copy_to_iter (4) C 56 411d 415d 396d 68883893 rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
KMSAN: uninit-value in linear_transfer (2) C 7 413d 436d 407d 65766ee0 ALSA: oss: Use kvzalloc() for local buffer allocations
KMSAN: kernel-infoleak in kvm_write_guest_page C 36 410d 437d 407d bcbfbd8e KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl C 31 413d 428d 407d 7f9ad1df KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
KMSAN: uninit-value in synaptics_detect C 137 432d 485d 432d f39f8688 Input: synaptics - avoid using uninitialized variable when probing
KMSAN: uninit-value in dev_mc_add_excl C 13 436d 448d 432d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in dev_uc_add_excl C 20 443d 485d 432d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in ip_tunnel_lookup (2) C 2 449d 450d 432d b0350d51 ip_gre: fix parsing gre header in ipgre_err
KMSAN: uninit-value in vcs_read C 2343 589d 613d 435d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
KMSAN: kernel-infoleak in _copy_to_iter (3) C 36 446d 457d 445d b06f9d9f tipc: fix info leak from kernel tipc_event
KMSAN: uninit-value in ip6_tnl_start_xmit C 69 477d 488d 464d 76c0ddd8 ip6_tunnel: be careful when accessing the inner header
WARNING in usb_submit_urb (2) C 259 464d 502d 464d 7a68d9fb USB: usbdevfs: sanitize flags more
KMSAN: uninit-value in pppoe_rcv C 2 623d 493d 464d 8540827e pppoe: fix reception of frames with no mac header
KMSAN: kernel-infoleak in _copy_to_iter (2) C 7 472d 500d 467d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
WARNING in apparmor_secid_to_secctx C 3344 491d 506d 479d edf4e7b7 apparmor: fix bad debug check in apparmor_secid_to_secctx()
KMSAN: uninit-value in snd_midi_event_encode_byte C 3 502d 503d 479d 5a7b44a8 ALSA: rawmidi: Initialize allocated buffers
BUG: unable to handle kernel paging request in kfree (2) C 297 506d 558d 481d 7913690d net/9p/client.c: version pointer uninitialized
KMSAN: uninit-value in memcmp (2) C 131 493d 484d 482d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
WARNING in wiphy_register (2) C 8 519d 521d 494d 48400433 mac80211_hwsim: require at least one channel
WARNING in input_alloc_absinfo C 318 510d 583d 508d 100294ce Input: do not use WARN() in input_alloc_absinfo()
KMSAN: uninit-value in do_msgrcv C 8 508d 585d 508d 39cfffd7 ipc/util.c: use ipc_rcu_putref() for failues in ipc_addid() 615c999c ipc: compute kern_ipc_perm.id under the ipc lock e2652ae6 ipc: reorganize initialization of kern_ipc_perm.seq
BUG: corrupted list in p9_fd_cancel C 34 544d 558d 508d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
kernel BUG at net/ipv6/route.c:LINE! C 197 530d 552d 528d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in __nf_conntrack_find_get C 67 543d 550d 528d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
KMSAN: kernel-infoleak in put_cmsg C 3 560d 550d 528d 2efd4fca ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
KMSAN: uninit-value in gc_worker 10 544d 556d 528d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
kernel BUG at fs/userfaultfd.c:LINE! (2) C 8 533d 551d 528d 31e810aa userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KMSAN: kernel-infoleak in _copy_to_iter C 285 543d 579d 528d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
unregister_netdevice: waiting for DEV to become free C 170521 528d 639d 528d 8cc88773 xfrm: fix missing dst_release() after policy blocking lbcast and multicast
KMSAN: uninit-value in af_alg_free_areq_sgls C 640 543d 650d 529d 2546da99 crypto: af_alg - Initialize sg_num_bytes in error code path
WARNING in iov_iter_revert C 74 548d 615d 529d 32da1221 tls: Stricter error checking in zerocopy sendmsg path
WARNING in smc_unhash_sk C 155731 532d 694d 529d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
KMSAN: uninit-value in ip_tunnel_xmit C 2594 550d 637d 550d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in br_nf_forward_arp 1 596d 593d 550d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: kernel-infoleak in vcs_read C 531 579d 589d 554d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
WARNING in kernfs_add_one C 174 558d 623d 558d 84d0c27d driver core: Don't ignore class_dir_create_and_add() failure.
WARNING in bpf_int_jit_compile syz 11 566d 602d 558d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in _copy_to_iter (2) C 226 589d 635d 558d 670ae9ca vhost: fix info leak due to uninitialized memory
KMSAN: uninit-value in ip_vs_lblcr_check_expire 2050 558d 635d 558d 3aa1409a ipvs: initialize tbl->entries after allocation
WARNING in bpf_prog_select_runtime syz 45 582d 583d 558d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in nfqnl_recv_config (2) C 10 571d 586d 558d ba062ebb netfilter: nf_queue: augment nfqa_cfg_policy
KMSAN: uninit-value in ebt_stp_mt_check (2) C 222 558d 590d 558d c568503e netfilter: x_tables: initialise match/target check parameter struct
KMSAN: uninit-value in eth_mac_addr 2 560d 593d 558d 644c7eeb rtnetlink: validate attributes in do_setlink()
INFO: rcu detected stall in dev_queue_xmit_nit 1 603d 603d 558d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KMSAN: uninit-value in rtnetlink_put_metrics syz 3 592d 593d 558d 5b5e7a0d net: metrics: add proper netlink validation
unexpected kernel reboot (2) C 2073 558d 648d 558d 0447378a kvm: vmx: Nested VM-entry prereqs for event inj.
WARNING in ebt_do_table C 13 566d 591d 558d 11ff7288 netfilter: ebtables: reject non-bridge targets
WARNING in sysfs_remove_group C 11125 559d 813d 558d d3349b6b loop: remember whether sysfs_create_group() was done
INFO: task hung in blk_queue_enter C 1595 558d 630d 558d cd4a4ae4 block: don't use blocking queue entered for recursive bio submits
KMSAN: uninit-value in ip_vs_lblc_check_expire C 1431 558d 635d 558d 8b2ebb6c ipvs: initialize tbl->entries in ip_vs_lblc_init_svc()
INFO: rcu detected stall in blkdev_ioctl C 249 588d 763d 558d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
INFO: task hung in blk_freeze_queue C 188 559d 710d 558d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
BUG: corrupted list in tipc_nametbl_unsubscribe C 40 620d 680d 562d c3317f4d tipc: fix unbalanced reference counter
WARNING in kcm_exit_net (3) syz 5 597d 597d 590d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
KMSAN: uninit-value in ebt_stp_mt_check C 211 590d 635d 590d a4995684 netfilter: bridge: stp fix reference to uninitialized data
KMSAN: uninit-value in move_addr_to_user (2) C 44 612d 619d 611d 09c8b971 tipc: fix one byte leak in tipc_sk_set_orig_addr()
WARNING in xfrm6_tunnel_net_exit syz 14002 614d 744d 611d b48c05ab xfrm: Fix warning in xfrm6_tunnel_net_exit.
KMSAN: uninit-value in strcmp C 3 623d 625d 611d 94f6a80c tipc: eliminate KMSAN uninit-value in strcmp complaint
KMSAN: uninit-value in __sctp_v6_cmp_addr C 1109 612d 613d 612d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt C 9 612d 618d 612d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
WARNING in tcp_mark_head_lost C 18 621d 703d 612d 16ae6aa1 net-backports: tcp: ignore Fast Open on repair mode
WARNING in tracepoint_probe_register_prio (2) C 849 612d 676d 612d d66a270b tracepoint: Do not warn on ENOMEM
WARNING: kobject bug in br_add_if 41 620d 647d 612d e8238fc2 bridge: check iface upper dev when setting master via ioctl 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in put_cmsg C 2 626d 626d 612d eb80ca47 rds: do not leak kernel memory to user land
KMSAN: uninit-value in rt6_multipath_hash C 3 613d 630d 612d cea67a2d ipv6: fix uninit-value in ip6_multipath_l3_keys()
kernel BUG at drivers/vhost/vhost.c:LINE! (2) C 139 621d 652d 620d d14d2b78 vhost: fix vhost_vq_access_ok() log check
KMSAN: uninit-value in fib_create_info C 19 645d 651d 620d b1993a2d net: fix rtnh_ok()
INFO: rcu detected stall in bitmap_parselist 8 628d 657d 620d 8351760f lib: fix stall in __bitmap_parselist()
KMSAN: uninit-value in netlink_sendmsg C 2493 620d 651d 620d 6091f09c netlink: fix uninit-value in netlink_sendmsg
KMSAN: uninit-value in memcmp C 30 622d 651d 620d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
KMSAN: uninit-value in ip_route_output_key_hash_rcu 179 620d 651d 620d d0ea2b12 ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
KMSAN: uninit-value in ip6table_mangle_hook C 601 620d 651d 620d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in __skb_try_recv_from_queue C 108 620d 651d 620d b13dda9f net: initialize skb->peeked when cloning
KMSAN: uninit-value in tipc_node_get_mtu C 139 620d 651d 620d 335b929b tipc: fix missing initializer in tipc_sendmsg()
KMSAN: uninit-value in tcp_parse_options C 38 621d 647d 620d 72123032 tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
KMSAN: uninit-value in pppoe_connect 47 620d 635d 620d a49e2f5d pppoe: check sockaddr length in pppoe_connect()
KMSAN: uninit-value in alg_bind C 1950 620d 651d 620d a466856e crypto: af_alg - fix possible uninit-value in alg_bind()
KMSAN: uninit-value in pppol2tp_connect C 13 620d 635d 620d eb1c28c0 l2tp: check sockaddr length in pppol2tp_connect()
KMSAN: uninit-value in iptable_mangle_hook C 1134 620d 651d 620d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in strlcpy C 2 622d 622d 620d 537b361f vti6: better validate user provided tunnel names
WARNING: kobject bug in device_add C 563 620d 660d 620d 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in packet_set_ring C 6 626d 643d 620d 5171b37d net: af_packet: fix race in PACKET_{R|T}X_RING
KMSAN: uninit-value in sctp_sendmsg syz 27 620d 650d 620d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
kernel panic: n_tty: init_tty C 141 620d 804d 620d 903f9db1 tty: Don't call panic() at tty_ldisc_init()
KMSAN: uninit-value in inet6_rtm_delroute C 9 639d 651d 620d b1993a2d net: fix rtnh_ok()
WARNING: kobject bug in netdev_queue_update_kobjects C 27 622d 684d 620d 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in inet_getpeer C 54 620d 649d 620d b6a37e5e inetpeer: fix uninit-value in inet_getpeer
KMSAN: uninit-value in sctp_do_bind C 31 620d 650d 620d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
BUG: unable to handle kernel paging request in snd_pcm_format_set_silence syz 11 620d 647d 620d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
WARNING in tty_set_ldisc syz 177 628d 804d 620d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore().
KMSAN: uninit-value in move_addr_to_user C 74 620d 651d 620d 6780db24 sctp: do not leak kernel memory to user space
KMSAN: uninit-value in fib6_new_table C 3 636d 637d 620d aa8f8778 ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
KMSAN: uninit-value in inet_csk_bind_conflict C 446 620d 651d 620d 3099a529 soreuseport: initialise timewait reuseport field
KMSAN: uninit-value in netif_skb_features C 119 620d 646d 620d 7ce23672 vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
KMSAN: uninit-value in neigh_dump_info C 6 632d 647d 620d 7dd07c14 net: validate attribute sizes in neigh_dump_table()