syzbot


Title Repro Bisected Count Last Reported Closed Patch
KMSAN: uninit-value in etf_enqueue_timesortedlist 3 55d 62d 13d a1211bf9 sched: etf: do not assume all sockets are full blown
KMSAN: uninit-value in simple_attr_read C 6 56d 126d 52d a65cab7d libfs: fix infoleak in simple_attr_read()
BUG: corrupted list in rdma_listen C 202 225d 804d 52d 7c119107 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KMSAN: uninit-value in tcf_exts_change C 5 104d 113d 52d 0d1c3530 net_sched: keep alloc_hash updated after hash allocation
KMSAN: uninit-value in __iptunnel_pull_header C 12 108d 117d 77d 17c25caf gre: fix uninit-value in __iptunnel_pull_header
KMSAN: use-after-free in netdev_state_change 2 121d 121d 77d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: uninit-value in slhc_compress C 3 120d 120d 77d 110a40df slip: make slhc_compress() more robust against malicious packets
KMSAN: use-after-free in find_match C 52 107d 137d 77d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache 2 147d 145d 77d 457fed77 net/smc: fix leak of kernel memory to user space
KMSAN: uninit-value in bond_alb_xmit syz 3 118d 120d 77d b7469e83 bonding/alb: make sure arp header is pulled before accessing it
KMSAN: use-after-free in inet_gifconf 10 108d 131d 77d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in ip6_dst_destroy C 2 110d 122d 77d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: use-after-free in veth_xmit 8 108d 123d 77d e08ad805 net-backports: net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: uninit-value in kstrdup C 8 113d 140d 77d 44bfa9c5 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KMSAN: use-after-free in l3mdev_master_ifindex_rcu C 5 107d 131d 77d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in dev_alloc_name_ns 3 108d 121d 77d e08ad805 net: add strict checks in netdev_name_node_alt_destroy()
KMSAN: use-after-free in rdma_listen C 26 118d 264d 98d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen C 28 275d 640d 98d 5fc01fb8 RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in setup_udp_tunnel_sock C 1 162d 162d 134d 940ba149 net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
KMSAN: uninit-value in can_receive C 14 137d 226d 134d e7153bf7 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
KMSAN: uninit-value in sd_init (2) C 94 240d 236d 134d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in __request_module (3) C 58 135d 163d 134d 36d79af7 net-backports: net_sched: use validated TCA_KIND attribute in tc_new_tfilter()
KMSAN: uninit-value in rsvp_change C 4 155d 156d 134d cb3c0e6b cls_rsvp: fix rsvp_policy
KMSAN: uninit-value in macvlan_broadcast C 2 177d 177d 134d 96cc4b69 macvlan: do not assume mac_header is set in macvlan_broadcast()
KMSAN: uninit-value in digitv_rc_query C 4 253d 236d 134d eecc70d2 media: digitv: don't continue if remote control state can't be read 569bc8d6 media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0
KMSAN: uninit-value in number C 190 139d 236d 134d 51d0c99b media: af9005: uninitialized variable printked
KMSAN: uninit-value in __tipc_nl_compat_dumpit C 4428 134d 203d 134d a7869e5f tipc: eliminate KMSAN: uninit-value in __tipc_nl_compat_dumpit error
KMSAN: uninit-value in i2c_w (2) C 3 248d 236d 134d de89d086 media: gspca: zero usb_buf
WARNING in tracepoint_probe_register_prio (3) syz cause 979 138d 775d 134d 64ae572b tracing: Fix sched switch start/stop refcount racy updates
KMSAN: uninit-value in read_sensor_register (2) C 44 242d 259d 134d de89d086 media: gspca: zero usb_buf
KMSAN: uninit-value in dvb_usb_adapter_dvb_init 1 244d 236d 134d 26cff637 media: vp7045: do not read uninitialized values if usb transfer fails
WARNING in tcp_enter_loss (2) C cause+fix 4 792d 842d 134d 16ae6aa1 tcp: ignore Fast Open on repair mode
KMSAN: uninit-value in __crc32c_le_base syz 567 175d 221d 139d b6f3320b sctp: fully initialize v4 addr in some functions
unregister_netdevice: waiting for DEV to become free (2) C cause 385621 139d 686d 139d ddd9b5e3 net-sysfs: Call dev_hold always in rx_queue_add_kobject
KMSAN: uninit-value in br_nf_forward_arp (3) 2 215d 207d 139d 56042858 net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
KMSAN: uninit-value in bond_neigh_setup 64 183d 207d 139d f394722f net-backports: neighbour: remove neigh_cleanup() method
BUG: Bad rss-counter state (3) C cause+fix 438 339d 805d 152d 173d9d9f mm/huge_memory: splitting set mapping+index before unfreeze
KMSAN: uninit-value in __request_module (2) 3 195d 207d 176d 2dd5616e net-backports: net_sched: validate TCA_KIND attribute in tc_chain_tmplt_add()
KMSAN: uninit-value in usbnet_probe C 1 392d 392d 176d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in nf_conntrack_tcp_packet syz 3 210d 213d 176d 9424e2e7 net-backports: tcp: md5: fix potential overestimation of TCP option space
KMSAN: use-after-free in netlink_recvmsg C 1 232d 232d 202d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in kfree_skb syz 34 219d 267d 202d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __skb_try_recv_from_queue C 4 231d 254d 202d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in sk_forced_mem_schedule 2 225d 233d 202d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in __netif_receive_skb_core 1 232d 232d 202d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in skb_dequeue C 1 262d 262d 202d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in copyout C 1 267d 267d 202d cf94da6f Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: uninit-value in ax88172a_bind C 5 247d 261d 215d a9a51bd7 ax88172a: fix information leak on short answers
KMSAN: uninit-value in gf128mul_4k_lle (3) C 2958 221d 586d 215d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: uninit-value in aesti_encrypt C 54 269d 370d 215d 683916f6 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: use-after-free in build_audio_procunit C 2 253d 253d 215d 976a68f0 ALSA: usb-audio: Fix incorrect size check for processing/extension units
KMSAN: uninit-value in get_min_max_with_quirks C 11 248d 236d 215d 167beb17 ALSA: usb-audio: Fix missing error check at mixer resolution test
KMSAN: uninit-value in cdc_ncm_set_dgram_size C 4 246d 245d 215d 332f989a CDC-NCM: handle incomplete transfer of MTU
KMSAN: kernel-usb-infoleak in pcan_usb_wait_rsp C 2 259d 259d 215d f7a1337f can: peak_usb: fix slab info leak
WARNING in generic_make_request_checks C cause 7760 217d 693d 216d 8b2ded1c block: don't warn when doing fsync on read-only devices
KMSAN: use-after-free in adu_disconnect C 16 261d 267d 218d 44efc269 USB: adutux: fix use-after-free on disconnect
KMSAN: use-after-free in mutex_spin_on_owner C 1 267d 267d 218d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in iowarrior_disconnect C 21 261d 267d 218d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: use-after-free in usb_autopm_put_interface C 63 247d 261d 218d 7a759197 USB: usblp: fix use-after-free on disconnect
KMSAN: use-after-free in __pm_runtime_resume 1 267d 267d 218d 5f924277 HID: logitech: Fix general protection fault caused by Logitech driver
KMSAN: use-after-free in hidraw_ioctl 1 267d 267d 218d 416dacb8 HID: hidraw: Fix invalid read in hidraw_ioctl
KMSAN: use-after-free in rxrpc_put_peer 1 258d 258d 218d 91fcfbe8 rxrpc: Fix call crypto state cleanup
KMSAN: uninit-value in lg4ff_set_autocenter_default C 1 248d 247d 218d d9d4b1e4 HID: Fix assumption that devices have inputs
WARNING in sk_stream_kill_queues (3) C cause 622 389d 748d 218d 9354544c net/tls: fix page double free on TX cleanup
INFO: task hung in fuse_reverse_inval_entry C fix 23 697d 710d 233d c59fd85e fuse: change interrupt requests allocation algorithm
KMSAN: uninit-value in sr9800_bind C 27 250d 273d 240d 77b6d09f net: usb: sr9800: fix uninitialized local variable
KMSAN: uninit-value in mts_usb_probe C 29 267d 273d 248d 177238c3 USB: microtek: fix info-leak at probe
KMSAN: uninit-value in iowarrior_disconnect C 18 266d 272d 248d edc4746f USB: iowarrior: fix use-after-free on disconnect
KMSAN: uninit-value in read_sensor_register C 25 260d 390d 260d 4843a543 media: gspca: zero usb_buf on error
KMSAN: kernel-usb-infoleak in ttusb_dec_send_command C 2 328d 337d 260d a10feaf8 media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()
KMSAN: uninit-value in inet_ehash_insert C 7 269d 275d 260d 6af1799a net-backports: ipv6: drop incoming packets having a v4mapped source address
KMSAN: uninit-value in i2c_w C 2 394d 393d 260d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in __request_module C 13 270d 289d 260d 62794fc4 net_sched: add max len check for TCA_KIND
KMSAN: uninit-value in sd_init C 122 260d 393d 260d 4843a543 media: gspca: zero usb_buf on error
KMSAN: uninit-value in capi_write C 445 267d 506d 266d fe163e53 isdn/capi: check message length in capi_write()
KMSAN: uninit-value in batadv_iv_send_outstanding_bat_ogm_packet C 9 315d 315d 290d a15d56a6 batman-adv: Only read OGM tvlv_len after buffer len check
KMSAN: uninit-value in rtm_new_nexthop C 8 315d 315d 299d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: uninit-value in batadv_netlink_dump_hardif C 58 310d 345d 299d 3ee1bb7a batman-adv: fix uninit-value in batadv_netlink_get_ifindex()
KMSAN: uninit-value in rtm_dump_nexthop C 6 309d 325d 299d d00ee64e netlink: Fix nlmsg_parse as a wrapper for strict message parsing
KMSAN: kernel-usb-infoleak in pcan_usb_pro_send_req C 16 312d 337d 309d 30a8beeb can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
KMSAN: kernel-usb-infoleak in pcan_usb_pro_init C 13 313d 337d 309d ead16e53 can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices
KMSAN: uninit-value in read_eprom_word C 31 311d 337d 309d 224c0497 net: usb: pegasus: fix improper read if get_registers() fail
KMSAN: uninit-value in ax88772_bind C 80 333d 394d 331d 78226f6e net: usb: asix: init MAC address buffers
KMSAN: uninit-value in bond_start_xmit (2) C 2309 331d 655d 331d 9d1bc24b bonding: validate ip header before check IPPROTO_IGMP
KMSAN: uninit-value in tipc_nl_compat_bearer_disable C 19 365d 378d 338d 4f07b80c tipc: check msg->req data len in tipc_nl_compat_bearer_disable
KMSAN: uninit-value in tcp_create_openreq_child C 4000 358d 378d 357d 85f9aa75 inet: clear num_timeout reqsk_alloc()
KMSAN: kernel-infoleak in copy_siginfo_to_user (2) C 15 387d 416d 357d f6e2aa91 signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO
KMSAN: uninit-value in aa_fqlookupn_profile C 39 598d 643d 386d 250f2da4 apparmor: Fix uninitialized value in aa_split_fqname
KMSAN: uninit-value in br_mdb_ip_get 5 461d 520d 397d 1515a63f net: bridge: always clear mcast matching struct on reports and leaves
WARNING in xfrm_state_fini (2) C 37510 426d 878d 401d dbb2483b xfrm: clean up xfrm protocol checks
KMSAN: uninit-value in rds_connect C 952 429d 671d 401d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_dump syz 14 432d 446d 401d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_inet_address 33 412d 412d 401d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in rds_bind C 6202 429d 671d 401d dd3ac9a6 net/rds: Check address length before reading address family
KMSAN: uninit-value in rtnl_stats_get C 5 439d 446d 401d 69f23a09 rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
KMSAN: uninit-value in tomoyo_check_unix_address 8 412d 412d 401d e6193f78 tomoyo: Check address length before reading address family
KMSAN: uninit-value in ip6_compressed_string C 9024 429d 581d 429d 7c2bd9a3 NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (2) C 6 476d 461d 447d 2ac695d1 tipc: handle the err returned from cmd header function
KMSAN: kernel-infoleak in sctp_getsockopt (3) syz 11 449d 461d 447d 09279e61 sctp: initialize _pad of sockaddr_in before copying to user memory
KMSAN: uninit-value in tipc_nl_compat_link_set (3) C 15 452d 462d 447d 8c63bf9a tipc: check link name with right length in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable (2) C 51 449d 462d 447d 6f07e5f0 tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
KMSAN: uninit-value in mpol_rebind_mm 6 464d 549d 461d 2e25644e mm, mempolicy: fix uninit memory access
KMSAN: kernel-infoleak in video_usercopy C 410 462d 561d 461d f45f3f75 media: v4l2-ctrls.c/uvc: zero v4l2_event
KMSAN: uninit-value in gue6_err (2) C 2826 461d 484d 461d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: kernel-infoleak in move_addr_to_user (2) C 8 463d 477d 461d 163d1c3d l2tp: fix infoleak in l2tp_ip6_recvmsg()
KMSAN: uninit-value in gue_err (2) C 1617 461d 484d 461d 5355ed63 fou, fou6: avoid uninit-value in gue_err() and gue6_err()
KMSAN: uninit-value in batadv_interface_tx C 98 484d 506d 484d 4ffcbfac batman-adv: fix uninit-value in batadv_interface_tx()
KMSAN: uninit-value in tipc_subscrb_rcv_cb C 13 794d 815d 484d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page C 25 575d 603d 484d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_doit C 153 499d 650d 484d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in tipc_nl_compat_name_table_dump C 51 570d 610d 484d 974cb0e3 tipc: fix uninit-value in tipc_nl_compat_name_table_dump
KMSAN: uninit-value in tipc_nl_compat_link_set (2) C 13 520d 561d 484d edf5ff04 tipc: fix uninit-value in tipc_nl_compat_link_set
KMSAN: uninit-value in tipc_nl_compat_bearer_enable C 144 485d 610d 484d 0762216c tipc: fix uninit-value in tipc_nl_compat_bearer_enable
KMSAN: kernel-infoleak in move_addr_to_user 5 491d 541d 484d 7d033c9f ipv6: fix kernel-infoleak in ipv6_local_error()
KMSAN: uninit-value in tipc_nl_compat_link_reset_stats syz 16 488d 541d 484d 8b66fee7 tipc: fix uninit-value in tipc_nl_compat_link_reset_stats
KMSAN: uninit-value in kvm_clear_dirty_log_protect 6 484d 528d 484d 98938aa8 KVM: validate userspace input in kvm_clear_dirty_log_protect()
KMSAN: kernel-infoleak in vmx_get_nested_state C 6 484d 595d 484d 3a33d030 kvm: x86/vmx: Use kzalloc for cached_vmcs12
KMSAN: uninit-value in tipc_nl_compat_dumpit C 209 499d 649d 484d 2753ca5d tipc: fix uninit-value in tipc_nl_compat_doit
KMSAN: uninit-value in gue_err C 4686 484d 538d 484d 26fc181e fou, fou6: do not assume linear skbs
WARNING in xfrm6_tunnel_net_exit (2) C 48816 493d 775d 484d f75a2804 xfrm: destroy xfrm_state synchronously on net exit path
KMSAN: uninit-value in tipc_conn_rcv_sub C 557 485d 780d 484d a88289f4 tipc: fix uninit-value in in tipc_conn_rcv_sub
KMSAN: kernel-infoleak in sctp_getsockopt (2) C 16 484d 534d 484d 400b8b9a sctp: allocate sctp_sockaddr_entry with kzalloc
KMSAN: uninit-value in gue6_err C 8359 484d 538d 484d 26fc181e fou, fou6: do not assume linear skbs
KMSAN: uninit-value in vti6_tnl_xmit syz 60 538d 561d 533d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: uninit-value in check_6rd C 81 539d 561d 533d cb9f1b78 ip: validate header length on virtual device xmit
KMSAN: kernel-infoleak in capi_unlocked_ioctl C 109 538d 548d 533d d63967e4 isdn: fix kernel-infoleak in capi_unlocked_ioctl
KMSAN: kernel-infoleak in sctp_getsockopt syz 147 538d 574d 538d 4a2eb0c3 sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event
KMSAN: uninit-value in __inet6_bind C 56 539d 569d 538d fb242745 ipv6: explicitly initialize udp6_addr in udp_sock_create6()
KMSAN: uninit-value in packet_sendmsg 5 587d 561d 538d 99137b78 packet: validate address length
KMSAN: kernel-infoleak in _copy_to_iter (4) C 56 576d 580d 561d 68883893 rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
KMSAN: uninit-value in linear_transfer (2) C 7 578d 601d 573d 65766ee0 ALSA: oss: Use kvzalloc() for local buffer allocations
KMSAN: kernel-infoleak in kvm_write_guest_page C 36 575d 602d 573d bcbfbd8e KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall
KMSAN: kernel-infoleak in kvm_arch_vcpu_ioctl C 31 578d 593d 573d 7f9ad1df KVM: nVMX: Fix kernel info-leak when enabling KVM_CAP_HYPERV_ENLIGHTENED_VMCS more than once
KMSAN: uninit-value in synaptics_detect C 137 597d 650d 597d f39f8688 Input: synaptics - avoid using uninitialized variable when probing
KMSAN: uninit-value in dev_mc_add_excl C 13 602d 614d 597d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in dev_uc_add_excl C 20 608d 650d 597d da715775 rtnetlink: Disallow FDB configuration for non-Ethernet device
KMSAN: uninit-value in ip_tunnel_lookup (2) C 2 615d 615d 597d b0350d51 ip_gre: fix parsing gre header in ipgre_err
KMSAN: uninit-value in vcs_read C 2343 754d 778d 601d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
KMSAN: kernel-infoleak in _copy_to_iter (3) C 36 611d 622d 611d b06f9d9f tipc: fix info leak from kernel tipc_event
KMSAN: uninit-value in ip6_tnl_start_xmit C 69 643d 653d 629d 76c0ddd8 ip6_tunnel: be careful when accessing the inner header
WARNING in usb_submit_urb (2) C 259 629d 667d 629d 7a68d9fb USB: usbdevfs: sanitize flags more
KMSAN: uninit-value in pppoe_rcv C 2 789d 658d 629d 8540827e pppoe: fix reception of frames with no mac header
KMSAN: kernel-infoleak in _copy_to_iter (2) C 7 638d 665d 633d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
WARNING in apparmor_secid_to_secctx C 3344 657d 672d 644d edf4e7b7 apparmor: fix bad debug check in apparmor_secid_to_secctx()
KMSAN: uninit-value in snd_midi_event_encode_byte C 3 668d 668d 644d 5a7b44a8 ALSA: rawmidi: Initialize allocated buffers
BUG: unable to handle kernel paging request in kfree (2) C 297 672d 724d 647d 7913690d net/9p/client.c: version pointer uninitialized
KMSAN: uninit-value in memcmp (2) C 131 658d 649d 647d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
WARNING in wiphy_register (2) C 8 685d 686d 660d 48400433 mac80211_hwsim: require at least one channel
WARNING in input_alloc_absinfo C 318 676d 748d 673d 100294ce Input: do not use WARN() in input_alloc_absinfo()
KMSAN: uninit-value in do_msgrcv C 8 673d 750d 673d 39cfffd7 ipc/util.c: use ipc_rcu_putref() for failues in ipc_addid() 615c999c ipc: compute kern_ipc_perm.id under the ipc lock e2652ae6 ipc: reorganize initialization of kern_ipc_perm.seq
BUG: corrupted list in p9_fd_cancel C 34 709d 723d 673d 9f476d7c net/9p/trans_fd.c: fix race by holding the lock
kernel BUG at net/ipv6/route.c:LINE! C 197 696d 718d 693d e873e4b9 ipv6: use fib6_info_hold_safe() when necessary
KMSAN: uninit-value in __nf_conntrack_find_get C 67 709d 715d 693d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
KMSAN: kernel-infoleak in put_cmsg C 3 726d 715d 693d 2efd4fca ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
KMSAN: uninit-value in gc_worker 10 709d 721d 693d 6613b617 netfilter: conntrack: dccp: treat SYNC/SYNCACK as invalid if no prior state
kernel BUG at fs/userfaultfd.c:LINE! (2) C 8 699d 717d 693d 31e810aa userfaultfd: remove uffd flags from vma->vm_flags if UFFD_EVENT_FORK fails
KMSAN: kernel-infoleak in _copy_to_iter C 285 709d 744d 693d 45c180bc xfrm_user: prevent leaking 2 bytes of kernel memory
unregister_netdevice: waiting for DEV to become free C 170521 693d 804d 693d 8cc88773 xfrm: fix missing dst_release() after policy blocking lbcast and multicast
KMSAN: uninit-value in af_alg_free_areq_sgls C 640 708d 816d 694d 2546da99 crypto: af_alg - Initialize sg_num_bytes in error code path
WARNING in iov_iter_revert C 74 714d 780d 694d 32da1221 tls: Stricter error checking in zerocopy sendmsg path
WARNING in smc_unhash_sk C 155731 697d 859d 694d e1bbdd57 net/smc: reduce sock_put() for fallback sockets
KMSAN: uninit-value in ip_tunnel_xmit C 2594 715d 802d 715d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in br_nf_forward_arp 1 762d 758d 715d b84bbaf7 packet: in packet_snd start writing at link layer allocation
KMSAN: kernel-infoleak in vcs_read C 531 744d 754d 719d 21eff69a vt: prevent leaking uninitialized data to userspace via /dev/vcs*
WARNING in kernfs_add_one C 174 724d 788d 723d 84d0c27d driver core: Don't ignore class_dir_create_and_add() failure.
WARNING in bpf_int_jit_compile syz 11 731d 768d 723d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in _copy_to_iter (2) C 226 755d 800d 723d 670ae9ca vhost: fix info leak due to uninitialized memory
KMSAN: uninit-value in ip_vs_lblcr_check_expire 2050 723d 800d 723d 3aa1409a ipvs: initialize tbl->entries after allocation
WARNING in bpf_prog_select_runtime syz 45 747d 749d 723d 9facc336 bpf: reject any prog that failed read-only lock
KMSAN: uninit-value in nfqnl_recv_config (2) C 10 736d 752d 723d ba062ebb netfilter: nf_queue: augment nfqa_cfg_policy
KMSAN: uninit-value in ebt_stp_mt_check (2) C 222 723d 755d 723d c568503e netfilter: x_tables: initialise match/target check parameter struct
KMSAN: uninit-value in eth_mac_addr 2 725d 758d 723d 644c7eeb rtnetlink: validate attributes in do_setlink()
INFO: rcu detected stall in dev_queue_xmit_nit 1 768d 768d 723d 1d88ba1e sctp: not allow transport timeout value less than HZ/5 for hb_timer
KMSAN: uninit-value in rtnetlink_put_metrics syz 3 757d 759d 723d 5b5e7a0d net: metrics: add proper netlink validation
unexpected kernel reboot (2) C 2073 723d 813d 723d 0447378a kvm: vmx: Nested VM-entry prereqs for event inj.
WARNING in ebt_do_table C 13 732d 757d 723d 11ff7288 netfilter: ebtables: reject non-bridge targets
WARNING in sysfs_remove_group C 11125 725d 979d 723d d3349b6b loop: remember whether sysfs_create_group() was done
INFO: task hung in blk_queue_enter C 1595 723d 795d 723d cd4a4ae4 block: don't use blocking queue entered for recursive bio submits
KMSAN: uninit-value in ip_vs_lblc_check_expire C 1431 723d 800d 723d 8b2ebb6c ipvs: initialize tbl->entries in ip_vs_lblc_init_svc()
INFO: rcu detected stall in blkdev_ioctl C 249 754d 929d 723d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
INFO: task hung in blk_freeze_queue C 188 725d 876d 723d d2ac838e loop: add recursion validation to LOOP_CHANGE_FD
BUG: corrupted list in tipc_nametbl_unsubscribe C 40 786d 845d 728d c3317f4d tipc: fix unbalanced reference counter
KMSAN: uninit-value in ebt_stp_mt_check C 211 756d 801d 755d a4995684 netfilter: bridge: stp fix reference to uninitialized data
WARNING in kcm_exit_net (3) syz 5 763d 763d 755d eb7f54b9 kcm: Fix use-after-free caused by clonned sockets
KMSAN: uninit-value in move_addr_to_user (2) C 44 778d 785d 776d 09c8b971 tipc: fix one byte leak in tipc_sk_set_orig_addr()
WARNING in xfrm6_tunnel_net_exit syz 14002 779d 909d 776d b48c05ab xfrm: Fix warning in xfrm6_tunnel_net_exit.
KMSAN: uninit-value in strcmp C 3 788d 790d 776d 94f6a80c tipc: eliminate KMSAN uninit-value in strcmp complaint
KMSAN: uninit-value in __sctp_v6_cmp_addr C 1109 777d 778d 777d d625329b sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
WARNING: kobject bug in br_add_if 41 785d 812d 777d e8238fc2 bridge: check iface upper dev when setting master via ioctl 3e14c6ab kobject: don't use WARN for registration failures
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt C 9 778d 783d 777d 070204a3 net/smc: keep clcsock reference in smc_tcp_listen_work()
KMSAN: uninit-value in rt6_multipath_hash C 3 778d 795d 777d cea67a2d ipv6: fix uninit-value in ip6_multipath_l3_keys()
WARNING in tcp_mark_head_lost C 18 786d 869d 777d 16ae6aa1 net-backports: tcp: ignore Fast Open on repair mode
WARNING in tracepoint_probe_register_prio (2) C 849 778d 842d 777d d66a270b tracepoint: Do not warn on ENOMEM
KMSAN: uninit-value in put_cmsg C 2 791d 791d 777d eb80ca47 rds: do not leak kernel memory to user land
KMSAN: uninit-value in inet6_rtm_delroute C 9 805d 816d 785d b1993a2d net: fix rtnh_ok()
WARNING: kobject bug in device_add C 563 785d 825d 785d 3e14c6ab kobject: don't use WARN for registration failures
KMSAN: uninit-value in sctp_sendmsg syz 27 786d 815d 785d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
KMSAN: uninit-value in memcmp C 30 787d 816d 785d 77d36398 net: fix uninit-value in __hw_addr_add_ex()
KMSAN: uninit-value in ip_route_output_key_hash_rcu 179 785d 816d 785d d0ea2b12 ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
KMSAN: uninit-value in inet_getpeer C 54 785d 815d 785d b6a37e5e inetpeer: fix uninit-value in inet_getpeer
KMSAN: uninit-value in ip6table_mangle_hook C 601 785d 816d 785d b855ff82 dccp: initialize ireq->ir_mark
KMSAN: uninit-value in strlcpy C 2 788d 788d 785d 537b361f vti6: better validate user provided tunnel names
KMSAN: uninit-value in inet_csk_bind_conflict C 446 785d 816d 785d 3099a529 soreuseport: initialise timewait reuseport field
KMSAN: uninit-value in fib6_new_table C 3 802d 802d 785d aa8f8778 ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
KMSAN: uninit-value in pppol2tp_connect C 13 786d 801d 785d eb1c28c0 l2tp: check sockaddr length in pppol2tp_connect()
KMSAN: uninit-value in move_addr_to_user C 74 785d 816d 785d 6780db24 sctp: do not leak kernel memory to user space
KMSAN: uninit-value in sctp_do_bind C 31 786d 816d 785d 81e98370 sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6
WARNING in tty_set_ldisc syz 177 794d 970d 785d 598c2d41 tty: Avoid possible error pointer dereference at tty_ldisc_restore().
WARNING: kobject bug in netdev_queue_update_kobjects C 27 787d 849d 785d 3e14c6ab kobject: don't use WARN for registration failures
kernel panic: n_tty: init_tty C 141 785d 970d 785d 903f9db1 tty: Don't call panic() at tty_ldisc_init()
KMSAN: uninit-value in netif_skb_features C 119 785d 812d 785d 7ce23672 vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
BUG: unable to handle kernel paging request in snd_pcm_format_set_silence syz 11 785d 812d 785d 02a5d692 ALSA: pcm: Avoid potential races between OSS ioctls and read/write
KMSAN: uninit-value in iptable_mangle_hook C 1134 785d 816d 785d b855ff82 dccp: initialize ireq->ir_mark
kernel BUG at drivers/vhost/vhost.c:LINE! (2) C 139 786d 817d 785d d14d2b78 vhost: fix vhost_vq_access_ok() log check
KMSAN: uninit-value in pppoe_connect 47 785d 801d 785d a49e2f5d pppoe: check sockaddr length in pppoe_connect()
KMSAN: uninit-value in neigh_dump_info C 6 798d 812d 785d 7dd07c14 net: validate attribute sizes in neigh_dump_table()
KMSAN: uninit-value in __skb_try_recv_from_queue C 108 785d 816d 785d b13dda9f net: initialize skb->peeked when cloning
KMSAN: uninit-value in tipc_node_get_mtu C 139 785d 816d 785d 335b929b tipc: fix missing initializer in tipc_sendmsg()
KMSAN: uninit-value in tcp_parse_options C 38 786d 813d 785d 72123032 tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
INFO: rcu detected stall in bitmap_parselist 8 793d 822d 785d 8351760f lib: fix stall in __bitmap_parselist()
KMSAN: uninit-value in alg_bind C 1950 785d 816d 785d a466856e crypto: af_alg - fix possible uninit-value in alg_bind()
KMSAN: uninit-value in fib_create_info C 19 810d 816d 785d b1993a2d net: fix rtnh_ok()
KMSAN: uninit-value in netlink_sendmsg C 2493 785d 816d 785d 6091f09c netlink: fix uninit-value in netlink_sendmsg
KMSAN: uninit-value in packet_set_ring C 6 792d 808d 785d 5171b37d net: af_packet: fix race in PACKET_{R|T}X_RING