syzbot


fixed (208):
Title Repro Bisected Count Last Reported Closed Patch
KMSAN: use-after-free in rdma_listen C 26 25d 171d 5d07h 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen C 28 182d 547d 5d07h 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in setup_udp_tunnel_sock C 1 69d 69d 41d 940ba149 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
KMSAN: uninit-value in can_receive C 14 44d 133d 41d e7153bf7 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
KMSAN: uninit-value in sd_init (2) C 94 147d 143d 41d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in __request_module (3) C 58 42d 70d 41d 36d79af7 net-backports: net_sched: use validated TCA_KIND attribute in tc_new_tfilter()
KMSAN: uninit-value in rsvp_change C 4 61d 62d 41d cb3c0e6b cls_rsvp: fix rsvp_policy
KMSAN: uninit-value in macvlan_broadcast C 2 84d 84d 41d 96cc4b69 macvlan: do not assume mac_header is set in macvlan_broadcast()
KMSAN: uninit-value in digitv_rc_query C 4 160d 143d 41d eecc70d2 media: digitv: don't continue if remote control state can't be read 569bc8d6 media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0
KMSAN: uninit-value in number C 190 45d 143d 41d 51d0c99b media: af9005: uninitialized variable printked
KMSAN: uninit-value in __tipc_nl_compat_dumpit C 4428 41d 110d 41d a7869e5f tipc: eliminate KMSAN: uninit-value in __tipc_nl_compat_dumpit error
KMSAN: uninit-value in i2c_w (2) C 3 154d 143d 41d de89d086 media: gspca: zero usb_buf
WARNING in tracepoint_probe_register_prio (3) syz cause 979 44d 682d 41d 64ae572b tracing: Fix sched switch start/stop refcount racy updates
KMSAN: uninit-value in read_sensor_register (2) C 44 148d 166d 41d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in dvb_usb_adapter_dvb_init 1 151d 143d 41d 26cff637 media: vp7045: do not read uninitialized values if usb transfer fails
WARNING in tcp_enter_loss (2) C cause+fix 4 699d 749d 41d 16ae6aa1 tcp: ignore Fast Open on repair mode
KMSAN: uninit-value in __crc32c_le_base syz 567 82d 128d 46d b6f3320b sctp: fully initialize v4 addr in some functions
unregister_netdevice: waiting for DEV to become free (2) C cause 385621 46d 593d 46d ddd9b5e3 net-sysfs: Call dev_hold always in rx_queue_add_kobject
KMSAN: uninit-value in br_nf_forward_arp (3) 2 121d 114d 46d 56042858 net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
KMSAN: uninit-value in bond_neigh_setup 64 90d 114d 46d f394722f net-backports: neighbour: remove neigh_cleanup() method
BUG: Bad rss-counter state (3) C cause+fix 438 245d 711d 59d 173d9d9f mm/huge_memory: splitting set mapping+index before unfreeze
KMSAN: uninit-value in __request_module (2) 3 102d 114d 83d 2dd5616e net-backports: net_sched: validate TCA_KIND attribute in tc_chain_tmplt_add()
KMSAN: uninit-value in usbnet_probe C 1 299d 299d 83d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in nf_conntrack_tcp_packet syz 3 116d 119d 83d 9424e2e7 net-backports: tcp: md5: fix potential overestimation of TCP option space
KMSAN: use-after-free in netlink_recvmsg C 1 138d 138d 109d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in kfree_skb syz 34 126d 174d 109d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __skb_try_recv_from_queue C 4 137d 161d 109d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in sk_forced_mem_schedule 2 132d 139d 109d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __netif_receive_skb_core 1 139d 139d 109d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in skb_dequeue C 1 169d 168d 109d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in copyout C 1 174d 174d 109d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: uninit-value in ax88172a_bind C 5 154d 167d 122d a9a51bd7 ax88172a: fix information leak on short answers
KMSAN: uninit-value in gf128mul_4k_lle (3) C 2958 128d 493d 122d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: uninit-value in aesti_encrypt C 54 176d 277d 122d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: use-after-free in build_audio_procunit C 2 160d 160d 122d 976a68f0 ALSA: usb-audio: Fix incorrect size check for processing/extension units
KMSAN: uninit-value in get_min_max_with_quirks C 11 155d 143d 122d 167beb17 ALSA: usb-audio: Fix missing error check at mixer resolution test
KMSAN: uninit-value in cdc_ncm_set_dgram_size C 4 153d 152d 122d 332f989a CDC-NCM: handle incomplete transfer of MTU
KMSAN: kernel-usb-infoleak in pcan_usb_wait_rsp C 2 166d 166d 122d f7a1337f can: peak_usb: fix slab info leak
WARNING in generic_make_request_checks C cause 7760 123d 599d 123d 8b2ded1c block: don't warn when doing fsync on read-only devices
KMSAN: use-after-free in adu_disconnect C 16 168d 174d 124d 44efc269 USB: adutux: fix use-after-free on disconnect
KMSAN: use-after-free in mutex_spin_on_owner C 1 173d 173d 124d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in iowarrior_disconnect C 21 168d 174d 124d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in usb_autopm_put_interface C 63 154d 168d 124d 7a759197 USB: usblp: fix use-after-free on disconnect
KMSAN: use-after-free in __pm_runtime_resume 1 174d 174d 124d 5f924277 HID: logitech: Fix general protection fault caused by Logitech driver
KMSAN: use-after-free in hidraw_ioctl 1 174d 174d 124d 416dacb8 HID: hidraw: Fix invalid read in hidraw_ioctl
KMSAN: use-after-free in rxrpc_put_peer 1 165d 165d 124d 91fcfbe8 rxrpc: Fix call crypto state cleanup
KMSAN: uninit-value in lg4ff_set_autocenter_default C 1 154d 154d 125d d9d4b1e4 HID: Fix assumption that devices have inputs
WARNING in sk_stream_kill_queues (3) C cause 622 296d 655d 125d 9354544c net/tls: fix page double free on TX cleanup
INFO: task hung in fuse_reverse_inval_entry C fix 23 604d 616d 140d c59fd85e fuse: change interrupt requests allocation algorithm
KMSAN: uninit-value in sr9800_bind C 27 156d 179d 147d 77b6d09f net: usb: sr9800: fix uninitialized local variable
KMSAN: uninit-value in mts_usb_probe C 29 174d 180d 155d 177238c3 USB: microtek: fix info-leak at probe
KMSAN: uninit-value in iowarrior_disconnect C 18 172d 179d 155d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: uninit-value in read_sensor_register C 25 167d 297d 167d 4843a543 media: gspca: zero usb_buf on error
KMSAN: kernel-usb-infoleak in ttusb_dec_send_command C 2 234d 244d 167d a10feaf8 media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
KMSAN: uninit-value in inet_ehash_insert C 7 175d 182d 167d 6af1799a net-backports: ipv6: drop incoming packets having a v4mapped source address
KMSAN: uninit-value in i2c_w C 2 300d 300d 167d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in __request_module C 13 176d 196d 167d 62794fc4 net_sched: add max len check for TCA_KIND
KMSAN: uninit-value in sd_init C 122 167d 300d 167d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in capi_write C 445 173d 413d 173d fe163e53 isdn/capi: check message length in capi_write()
KMSAN: uninit-value in batadv_iv_send_outstanding_bat_ogm_packet C 9 222d 222d 196d a15d56a6 batman-adv: Only read OGM tvlv_len after buffer len check
KMSAN: uninit-value in rtm_new_nexthop C 8 222d 222d 206d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: uninit-value in batadv_netlink_dump_hardif C 58 217d 252d 206d 3ee1bb7a batman-adv: fix uninit-value in batadv_netlink_get_ifindex()
KMSAN: uninit-value in rtm_dump_nexthop C 6 216d 232d 206d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: kernel-usb-infoleak in pcan_usb_pro_send_req C 16 219d 244d 216d 30a8beeb can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
KMSAN: kernel-usb-infoleak in pcan_usb_pro_init C 13 220d 244d 216d ead16e53 can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
KMSAN: uninit-value in read_eprom_word C 31 218d 244d 216d 224c0497 net: usb: pegasus: fix improper read if get_registers() fail
KMSAN: uninit-value in ax88772_bind C 80 240d 301d 238d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in bond_start_xmit (2) C 2309 238d 562d 238d 9d1bc24b bonding: validate ip header before check IPPROTO_IGMP
KMSAN: uninit-value in tipc_nl_compat_bearer_disable C 19 272d 285d 245d 4f07b80c tipc: check msg->req data len in tipc_nl_compat_bearer_disable
KMSAN: uninit-value in tcp_create_openreq_child C 4000 264d 285d 264d 85f9aa75 inet: clear num_timeout reqsk_alloc()
KMSAN: kernel-infoleak in copy_siginfo_to_user (2) C 15 293d 323d 264d f6e2aa91 signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO
KMSAN: uninit-value in aa_fqlookupn_profile C 39 504d 549d 293d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
KMSAN: uninit-value in br_mdb_ip_get 5 368d 427d 304d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
WARNING in xfrm_state_fini (2) C 37510 332d 785d 308d dbb2483b xfrm: clean up xfrm protocol checks
KMSAN: uninit-value in rds_connect C 952 336d 578d 308d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_dump syz 14 338d 353d 308d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_inet_address 33 319d 319d 308d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in rds_bind C 6202 336d 578d 308d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_get C 5 345d 353d 308d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_unix_address 8 319d 319d 308d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in ip6_compressed_string C 9024 336d 488d 336d 7c2bd9a3 NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (2) C 6 383d 368d 353d 2ac695d1 tipc: handle the err returned from cmd header function
KMSAN: kernel-infoleak in sctp_getsockopt (3) syz 11 356d 368d 353d 09279e61 sctp: initialize _pad of sockaddr_in before copying to user memory
KMSAN: uninit-value in tipc_nl_compat_link_set (3) C 15 359d 369d 353d 8c63bf9a tipc: check link name with right length in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable (2) C 51 356d 369d 353d 6f07e5f0 tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
KMSAN: uninit-value in mpol_rebind_mm 6 371d 455d 368d 2e25644e mm, mempolicy: fix uninit memory access
KMSAN: kernel-infoleak in video_usercopy C 410 369d 468d 368d f45f3f75 media: v4l2-ctrls.c/uvc: zero v4l2_event
KMSAN: uninit-value in gue6_err (2) C 2826 368d 390d 368d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: kernel-infoleak in move_addr_to_user (2) C 8 369d 384d 368d 163d1c3d l2tp: fix infoleak in l2tp_ip6_recvmsg()
KMSAN: uninit-value in gue_err (2) C 1617 368d 390d 368d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: uninit-value in batadv_interface_tx C 98 391d 413d 390d 4ffcbfac batman-adv: fix uninit-value in batadv_interface_tx()
KMSAN: uninit-value in tipc_subscrb_rcv_cb C 13 701d 722d 390d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page C 25 481d 510d 390d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_doit C 153 405d 557d 390d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in tipc_nl_compat_name_table_dump C 51 476d 517d 390d 974cb0e3 tipc: fix uninit-value in tipc_nl_compat_name_table_dump
KMSAN: uninit-value in tipc_nl_compat_link_set (2) C 13 427d 468d 390d edf5ff04 tipc: fix uninit-value in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable C 144 392d 517d 390d 0762216c tipc: fix uninit-value in tipc_nl_compat_bearer_enable
KMSAN: kernel-infoleak in move_addr_to_user 5 397d 447d 390d 7d033c9f ipv6: fix kernel-infoleak in ipv6_local_error()
KMSAN: uninit-value in tipc_nl_compat_link_reset_stats syz 16 395d 448d 390d 8b66fee7 tipc: fix uninit-value in tipc_nl_compat_link_reset_stats
KMSAN: uninit-value in kvm_clear_dirty_log_protect 6 390d 435d 390d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
KMSAN: kernel-infoleak in vmx_get_nested_state C 6 391d 502d 390d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_dumpit C 209 406d 556d 390d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in gue_err C 4686 390d 444d 390d 26fc181e fou, fou6: do not assume linear skbs
WARNING in xfrm6_tunnel_net_exit (2) C 48816 400d 681d 390d f75a2804 xfrm: destroy xfrm_state synchronously on net exit path
KMSAN: uninit-value in tipc_conn_rcv_sub C 557 392d 687d 390d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in sctp_getsockopt (2) C 16 390d 441d 390d 400b8b9a sctp: allocate sctp_sockaddr_entry with kzalloc
KMSAN: uninit-value in gue6_err C 8359 390d 444d 390d 26fc181e fou, fou6: do not assume linear skbs
KMSAN: uninit-value in vti6_tnl_xmit syz 60 445d 468d 440d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: uninit-value in check_6rd C 81 446d 468d 440d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: kernel-infoleak in capi_unlocked_ioctl C 109 445d 455d 440d d63967e4 isdn: fix kernel-infoleak in capi_unlocked_ioctl
KMSAN: kernel-infoleak in sctp_getsockopt syz 147 445d 481d 445d 4a2eb0c3 sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event
KMSAN: uninit-value in __inet6_bind C 56 446d 476d 445d fb242745 ipv6: explicitly initialize udp6_addr in udp_sock_create6()
KMSAN: uninit-value in packet_sendmsg 5 494d 468d 445d 99137b78 packet: validate address length
KMSAN: kernel-infoleak in _copy_to_iter (4) C 56 483d 487d 468d 68883893 rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
KMSAN: uninit-value in linear_transfer (2) C 7 485d 508d 479d 65766ee0 ALSA: oss: Use kvzalloc() for local buffer allocations
KMSAN: kernel-infoleak in kvm_write_guest_page C 36 482d 509d 479d bcbfbd8e KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl C 31 485d 500d 479d 7f9ad1df KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
KMSAN: uninit-value in synaptics_detect C 137 504d 557d 504d f39f8688 Input: synaptics - avoid using uninitialized variable when probing
KMSAN: uninit-value in dev_mc_add_excl C 13 509d 521d 504d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in dev_uc_add_excl C 20 515d 557d 504d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in ip_tunnel_lookup (2) C 2 522d 522d 504d b0350d51 ip_gre: fix parsing gre header in ipgre_err
KMSAN: uninit-value in vcs_read C 2343 661d 685d 507d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
KMSAN: kernel-infoleak in _copy_to_iter (3) C 36 518d 529d 518d b06f9d9f tipc: fix info leak from kernel tipc_event
KMSAN: uninit-value in ip6_tnl_start_xmit C 69 550d 560d 536d 76c0ddd8 ip6_tunnel: be careful when accessing the inner header
WARNING in usb_submit_urb (2) C 259 536d 574d 536d 7a68d9fb USB: usbdevfs: sanitize flags more
KMSAN: uninit-value in pppoe_rcv C 2 695d 565d 536d 8540827e pppoe: fix reception of frames with no mac header
KMSAN: kernel-infoleak in _copy_to_iter (2) C 7 544d 572d 539d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
WARNING in apparmor_secid_to_secctx C 3344 564d 579d 551d edf4e7b7 apparmor: fix bad debug check in apparmor_secid_to_secctx()
KMSAN: uninit-value in snd_midi_event_encode_byte C 3 575d 575d 551d 5a7b44a8 ALSA: rawmidi: Initialize allocated buffers
BUG: unable to handle kernel paging request in kfree (2) C 297 579d 630d 553d 7913690d net/9p/client.c: version pointer uninitialized
KMSAN: uninit-value in memcmp (2) C 131 565d 556d 554d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
WARNING in wiphy_register (2) C 8 591d 593d 566d 48400433 mac80211_hwsim: require at least one channel
WARNING in input_alloc_absinfo C 318 582d 655d 580d 100294ce Input: do not use WARN() in input_alloc_absinfo()
KMSAN: uninit-value in do_msgrcv C 8 580d 657d 580d 39cfffd7 ipc/util.c: use ipc_rcu_putref() for failues in ipc_addid() 615c999c ipc: compute kern_ipc_perm.id under the ipc lock e2652ae6 ipc: reorganize initialization of kern_ipc_perm.seq
BUG: corrupted list in p9_fd_cancel C 34 616d 630d 580d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
kernel BUG at net/ipv6/route.c:LINE! C 197 602d 624d 600d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in __nf_conntrack_find_get C 67 615d 622d 600d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
KMSAN: kernel-infoleak in put_cmsg C 3 632d 622d 600d 2efd4fca ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
KMSAN: uninit-value in gc_worker 10 616d 628d 600d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
kernel BUG at fs/userfaultfd.c:LINE! (2) C 8 605d 624d 600d 31e810aa userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KMSAN: kernel-infoleak in _copy_to_iter C 285 615d 651d 600d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
unregister_netdevice: waiting for DEV to become free C 170521 600d 711d 600d 8cc88773 xfrm: fix missing dst_release() after policy blocking lbcast and multicast
KMSAN: uninit-value in af_alg_free_areq_sgls C 640 615d 722d 601d 2546da99 crypto: af_alg - Initialize sg_num_bytes in error code path
WARNING in iov_iter_revert C 74 621d 687d 601d 32da1221 tls: Stricter error checking in zerocopy sendmsg path
WARNING in smc_unhash_sk C 155731 604d 766d 601d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
KMSAN: uninit-value in ip_tunnel_xmit C 2594 622d 709d 622d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in br_nf_forward_arp 1 668d 665d 622d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: kernel-infoleak in vcs_read C 531 651d 661d 626d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
WARNING in kernfs_add_one C 174 630d 695d 630d 84d0c27d driver core: Don't ignore class_dir_create_and_add() failure.
WARNING in bpf_int_jit_compile syz 11 638d 674d 630d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in _copy_to_iter (2) C 226 662d 707d 630d 670ae9ca vhost: fix info leak due to uninitialized memory
KMSAN: uninit-value in ip_vs_lblcr_check_expire 2050 630d 707d 630d 3aa1409a ipvs: initialize tbl->entries after allocation
WARNING in bpf_prog_select_runtime syz 45 654d 655d 630d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in nfqnl_recv_config (2) C 10 643d 658d 630d ba062ebb netfilter: nf_queue: augment nfqa_cfg_policy
KMSAN: uninit-value in ebt_stp_mt_check (2) C 222 630d 662d 630d c568503e netfilter: x_tables: initialise match/target check parameter struct
KMSAN: uninit-value in eth_mac_addr 2 632d 665d 630d 644c7eeb rtnetlink: validate attributes in do_setlink()
INFO: rcu detected stall in dev_queue_xmit_nit 1 675d 675d 630d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KMSAN: uninit-value in rtnetlink_put_metrics syz 3 664d 665d 630d 5b5e7a0d net: metrics: add proper netlink validation
unexpected kernel reboot (2) C 2073 630d 720d 630d 0447378a kvm: vmx: Nested VM-entry prereqs for event inj.
WARNING in ebt_do_table C 13 639d 663d 630d 11ff7288 netfilter: ebtables: reject non-bridge targets
WARNING in sysfs_remove_group C 11125 631d 885d 630d d3349b6b loop: remember whether sysfs_create_group() was done
INFO: task hung in blk_queue_enter C 1595 630d 702d 630d cd4a4ae4 block: don't use blocking queue entered for recursive bio submits
KMSAN: uninit-value in ip_vs_lblc_check_expire C 1431 630d 707d 630d 8b2ebb6c ipvs: initialize tbl->entries in ip_vs_lblc_init_svc()
INFO: rcu detected stall in blkdev_ioctl C 249 661d 835d 630d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
INFO: task hung in blk_freeze_queue C 188 632d 782d 630d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
BUG: corrupted list in tipc_nametbl_unsubscribe C 40 692d 752d 634d c3317f4d tipc: fix unbalanced reference counter
WARNING in kcm_exit_net (3) syz 5 669d 669d 662d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
KMSAN: uninit-value in ebt_stp_mt_check C 211 662d 707d 662d a4995684 netfilter: bridge: stp fix reference to uninitialized data
WARNING in xfrm6_tunnel_net_exit syz 14002 686d 816d 683d b48c05ab xfrm: Fix warning in xfrm6_tunnel_net_exit.
KMSAN: uninit-value in move_addr_to_user (2) C 44 684d 691d 683d 09c8b971 tipc: fix one byte leak in tipc_sk_set_orig_addr()
KMSAN: uninit-value in strcmp C 3 695d 697d 683d 94f6a80c tipc: eliminate KMSAN uninit-value in strcmp complaint
KMSAN: uninit-value in __sctp_v6_cmp_addr C 1109 684d 685d 684d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
KMSAN: uninit-value in put_cmsg C 2 698d 698d 684d eb80ca47 rds: do not leak kernel memory to user land
WARNING in tcp_mark_head_lost C 18 693d 775d 684d 16ae6aa1 net-backports: tcp: ignore Fast Open on repair mode
WARNING: kobject bug in br_add_if 41 692d 719d 684d e8238fc2 bridge: check iface upper dev when setting master via ioctl 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in rt6_multipath_hash C 3 685d 702d 684d cea67a2d ipv6: fix uninit-value in ip6_multipath_l3_keys()
WARNING in tracepoint_probe_register_prio (2) C 849 684d 749d 684d d66a270b tracepoint: Do not warn on ENOMEM
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt C 9 684d 690d 684d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
KMSAN: uninit-value in pppol2tp_connect C 13 692d 707d 692d eb1c28c0 l2tp: check sockaddr length in pppol2tp_connect()
KMSAN: uninit-value in ip_route_output_key_hash_rcu 179 692d 723d 692d d0ea2b12 ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
KMSAN: uninit-value in inet6_rtm_delroute C 9 711d 723d 692d b1993a2d net: fix rtnh_ok()
KMSAN: uninit-value in strlcpy C 2 694d 694d 692d 537b361f vti6: better validate user provided tunnel names
WARNING: kobject bug in device_add C 563 692d 732d 692d 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in netif_skb_features C 119 692d 718d 692d 7ce23672 vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
BUG: unable to handle kernel paging request in snd_pcm_format_set_silence syz 11 692d 719d 692d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KMSAN: uninit-value in inet_getpeer C 54 692d 721d 692d b6a37e5e inetpeer: fix uninit-value in inet_getpeer
WARNING in tty_set_ldisc syz 177 701d 876d 692d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore().
KMSAN: uninit-value in ip6table_mangle_hook C 601 692d 723d 692d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in inet_csk_bind_conflict C 446 692d 723d 692d 3099a529 soreuseport: initialise timewait reuseport field
KMSAN: uninit-value in memcmp C 30 694d 723d 692d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
INFO: rcu detected stall in bitmap_parselist 8 700d 729d 692d 8351760f lib: fix stall in __bitmap_parselist()
KMSAN: uninit-value in fib6_new_table C 3 708d 709d 692d aa8f8778 ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
KMSAN: uninit-value in move_addr_to_user C 74 692d 723d 692d 6780db24 sctp: do not leak kernel memory to user space
KMSAN: uninit-value in sctp_do_bind C 31 692d 722d 692d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
WARNING: kobject bug in netdev_queue_update_kobjects C 27 694d 756d 692d 3e14c6ab kobject: don't use WARN for registration failures
kernel panic: n_tty: init_tty C 141 692d 876d 692d 903f9db1 tty: Don't call panic() at tty_ldisc_init()
KMSAN: uninit-value in packet_set_ring C 6 698d 715d 692d 5171b37d net: af_packet: fix race in PACKET_{R|T}X_RING
KMSAN: uninit-value in tipc_node_get_mtu C 139 692d 723d 692d 335b929b tipc: fix missing initializer in tipc_sendmsg()
KMSAN: uninit-value in tcp_parse_options C 38 693d 719d 692d 72123032 tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
KMSAN: uninit-value in netlink_sendmsg C 2493 692d 723d 692d 6091f09c netlink: fix uninit-value in netlink_sendmsg
KMSAN: uninit-value in neigh_dump_info C 6 705d 719d 692d 7dd07c14 net: validate attribute sizes in neigh_dump_table()
KMSAN: uninit-value in iptable_mangle_hook C 1134 692d 723d 692d b855ff82 dccp: initialize ireq->ir_mark
kernel BUG at drivers/vhost/vhost.c:LINE! (2) C 139 693d 724d 692d d14d2b78 vhost: fix vhost_vq_access_ok() log check
KMSAN: uninit-value in alg_bind C 1950 692d 723d 692d a466856e crypto: af_alg - fix possible uninit-value in alg_bind()
KMSAN: uninit-value in fib_create_info C 19 717d 723d 692d b1993a2d net: fix rtnh_ok()
KMSAN: uninit-value in pppoe_connect 47 692d 707d 692d a49e2f5d pppoe: check sockaddr length in pppoe_connect()
KMSAN: uninit-value in __skb_try_recv_from_queue C 108 692d 723d 692d b13dda9f net: initialize skb->peeked when cloning
KMSAN: uninit-value in sctp_sendmsg syz 27 692d 722d 692d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6