KASAN: slab-out-of-bounds Write in squashfs_readahead (2)
squashfs
|
C |
done |
|
2 |
28d |
24d
|
1/25 |
never |
Squashfs: fix variable overflow triggered by sysbot
|
BUG: sleeping function called from invalid context in __hci_cmd_sync_sk
bluetooth
|
C |
done |
|
34 |
55d |
172d
|
24/25 |
never |
acab8ff29a2a
Bluetooth: ISO: Fix invalid context error
|
UBSAN: array-index-out-of-bounds in FSE_decompress_wksp_body_bmi2
btrfs
|
|
|
|
1 |
102d |
98d
|
24/25 |
never |
77618db34645
zstd: Fix array-index-out-of-bounds UBSAN warning
|
general protection fault in lbmStartIO
jfs
|
C |
done |
|
2 |
52d |
60d
|
24/25 |
never |
6306ff39a7fc
jfs: fix log->bdev_handle null ptr deref in lbmStartIO
|
UBSAN: array-index-out-of-bounds in diAlloc
jfs
|
C |
error |
inconclusive |
37 |
26d |
435d
|
24/25 |
never |
05d9ea1ceb62
jfs: fix array-index-out-of-bounds in diAlloc
|
UBSAN: shift-out-of-bounds in dbJoin
jfs
|
C |
error |
|
3 |
38d |
422d
|
1/25 |
never |
jfs: fix shift-out-of-bounds in dbJoin
|
UBSAN: array-index-out-of-bounds in dbFindLeaf
jfs
|
C |
error |
|
6 |
85d |
399d
|
24/25 |
never |
22cad8bc1d36
jfs: fix array-index-out-of-bounds in dbFindLeaf
|
KASAN: slab-use-after-free Read in jfs_evict_inode
jfs
|
syz |
error |
|
1 |
44d |
40d
|
1/25 |
never |
jfs: fix uaf in jfs_evict_inode
|
KCSAN: data-race in xfrmi_xmit / xfrmi_xmit (3)
net
|
|
|
|
2 |
71d |
95d
|
24/25 |
never |
f7c4e3e5d4f6
xfrm: interface: use DEV_STATS_INC()
|
memory leak in btrfs_ref_tree_mod
btrfs
|
syz |
|
|
1 |
117d |
113d
|
23/25 |
never |
f91192cd6859
btrfs: ref-verify: fix memory leaks in btrfs_ref_tree_mod()
|
KCSAN: data-race in xfrm_lookup_with_ifid / xfrm_lookup_with_ifid (7)
net
|
|
|
|
1 |
63d |
63d
|
24/25 |
never |
de5724ca38fd
xfrm: fix a data-race in xfrm_lookup_with_ifid()
|
KCSAN: data-race in xfrm_sk_policy_insert / xfrm_sk_policy_insert (3)
net
|
|
|
|
1 |
116d |
89d
|
24/25 |
never |
3e4bc23926b8
xfrm: fix a data-race in xfrm_gen_index()
|
possible deadlock in btrfs_search_slot (2)
btrfs
|
C |
error |
|
2 |
107d |
103d
|
24/25 |
never |
ee34a82e890a
btrfs: release path before inode lookup during the ino lookup ioctl
|
WARNING in __kernel_write_iter
btrfs
|
C |
inconclusive |
|
1149 |
6d05h |
422d
|
23/25 |
never |
0ac1d13a55eb
btrfs: send: ensure send_fd is writable
|
UBSAN: array-index-out-of-bounds in xtSearch
jfs
|
C |
unreliable |
done |
122 |
10d |
428d
|
24/25 |
never |
a779ed754e52
jfs: define xtree root and page independently
|
KASAN: use-after-free Read in j1939_session_get_by_addr
|
C |
done |
error |
66 |
1480d |
1492d
|
0/25 |
never |
d966635b384b
can: j1939: transport: make sure the aborted session will be deactivated only once
|
WARNING: zero-size vmalloc in xskq_create
bpf
net
|
|
|
|
20 |
55d |
63d
|
24/25 |
never |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
UBSAN: array-index-out-of-bounds in txCommit
jfs
|
C |
error |
done |
396 |
34d |
415d
|
24/25 |
never |
a779ed754e52
jfs: define xtree root and page independently
|
linux-next boot error: BUG: unable to handle kernel NULL pointer dereference in mempool_init_node
ceph
fs
|
|
|
|
12 |
1119d |
1120d
|
1/25 |
never |
kasan-simplify-kasan_poison_kfree-temp-fix
|
memory leak in kcm_sendmsg (2)
net
|
C |
|
|
1 |
98d |
133d
|
24/25 |
never |
c821a88bd720
kcm: Fix memory leak in error path of kcm_sendmsg()
|
KMSAN: uninit-value in dccp_v6_err
dccp
|
C |
|
|
4 |
80d |
85d
|
24/25 |
never |
6af289746a63
dccp: fix dccp_v4_err()/dccp_v6_err() again
|
possible deadlock in lock_timer_base
batman
|
|
|
|
14 |
183d |
1067d
|
1/25 |
never |
kfence: fix potential deadlock due to wake_up()
|
KMSAN: uninit-value in llc_station_rcv
net
|
C |
|
|
2 |
41d |
50d
|
24/25 |
never |
7b3ba18703a6
llc: verify mac len before reading mac header
|
WARNING: zero-size vmalloc in print_tainted
bpf
net
|
C |
|
|
79 |
178d |
212d
|
24/25 |
never |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
general protection fault in hci_register_dev
kernel
|
C |
unreliable |
done |
4 |
83d |
90d
|
24/25 |
never |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
Internal error in fib6_table_lookup
net
|
|
|
|
2 |
22d |
23d
|
24/25 |
never |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
UBSAN: shift-out-of-bounds in set_flicker
usb
media
|
syz |
|
|
5 |
31d |
111d
|
24/25 |
never |
099be1822d1f
media: gspca: cpia1: shift-out-of-bounds in set_flicker
|
KASAN: slab-out-of-bounds Read in imon_probe
media
usb
|
syz |
|
|
2 |
80d |
102d
|
24/25 |
never |
a1766a4fd83b
media: imon: fix access to invalid resource for the second interface
|
KASAN: slab-use-after-free Read in pwq_release_workfn
kernel
|
C |
unreliable |
|
79 |
48d |
98d
|
24/25 |
never |
643445531829
workqueue: Fix UAF report by KASAN in pwq_release_workfn()
|
KASAN: slab-use-after-free Read in pvr2_context_set_notify
usb
pvrusb2
|
C |
|
|
2748 |
27m |
151d
|
1/25 |
never |
media: pvrusb2: fix use after free on context disconnection
|
BUG: sleeping function called from invalid context in alloc_buffer_head
mm
|
|
|
|
15 |
206d |
211d
|
1/25 |
never |
workingset: add missing rcu_read_unlock() in lru_gen_refault()
|
KASAN: use-after-free Read in __media_entity_remove_links
usb
media
|
C |
|
|
7 |
1353d |
1451d
|
0/25 |
never |
68035c80e129
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
|
KCSAN: data-race in wg_xmit / wg_xmit (4)
wireguard
|
|
|
|
1 |
26d |
21d
|
24/25 |
never |
93da8d75a665
wireguard: use DEV_STATS_INC()
|
kernel BUG in btrfs_insert_delayed_dir_index
btrfs
|
|
|
|
3 |
96d |
101d
|
24/25 |
never |
8e7f82deb0c0
btrfs: fix race between reading a directory and adding entries to it
|
possible deadlock in ieee80211_change_mac
wireless
|
|
|
|
1 |
59d |
55d
|
24/25 |
never |
74a7c93f45ab
wifi: mac80211: fix change_address deadlock during unregister
|
Internal error in fib6_rule_lookup
net
|
|
|
|
2 |
25d |
33d
|
24/25 |
never |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
KCSAN: data-race in fib_select_path / fib_select_path
net
|
|
|
|
1 |
63d |
50d
|
24/25 |
never |
195374d89368
ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr
|
WARNING in __ip6_append_data
net
|
C |
unreliable |
|
5 |
55d |
84d
|
24/25 |
never |
9d4c75800f61
ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
|
KASAN: slab-use-after-free Read in iommufd_vfio_ioas
iommu
|
C |
done |
|
4 |
16d |
34d
|
18/25 |
never |
6f9c4d8c468c
iommufd: Do not UAF during iommufd_put_object()
|
WARNING: suspicious RCU usage in mas_walk (3)
mm
|
C |
done |
|
12 |
43d |
57d
|
1/25 |
never |
mempolicy: migration attempt to match interleave nodes: fix
|
general protection fault in wpan_phy_register
kernel
|
C |
done |
done |
7 |
78d |
85d
|
24/25 |
never |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
divide error in iommufd_test
iommu
|
C |
done |
|
4 |
38d |
40d
|
24/25 |
never |
2e22aac3ea9c
iommufd/selftest: Fix page-size check in iommufd_test_dirty()
|
WARNING in ieee80211_get_ringparam
wireless
|
C |
done |
|
151 |
72d |
78d
|
24/25 |
never |
6b348f6e34ce
wifi: mac80211: ethtool: always hold wiphy mutex
|
kernel BUG in __block_write_begin_int
block
|
C |
done |
|
14 |
74d |
93d
|
24/25 |
never |
4aa8cdd5e523
iomap: handle error conditions more gracefully in iomap_to_bh
|
linux-next boot error: WARNING in kmem_cache_free
fs
|
|
|
|
45 |
1258d |
1262d
|
1/25 |
never |
mm, slab/slub: improve error reporting and overhead of cache_from_obj()-fix
|
WARNING in ieee80211_rfkill_poll
wireless
|
C |
|
|
593 |
47m |
28d
|
23/25 |
never |
8e2f6f236621
wifi: cfg80211: lock wiphy mutex for rfkill poll
|
BUG: Bad page state (8)
mm
|
C |
|
|
6779 |
18h05m |
1038d
|
1/25 |
never |
mm-filemap-add-filemap_range_uptodate-fix
|
INFO: task hung in clean_bdev_aliases
block
|
C |
done |
|
201 |
67d |
92d
|
24/25 |
never |
381c043233e6
iomap: add a workaround for racy i_size updates on block devices
|
kernel BUG in folio_flags
mm
|
|
|
|
42 |
1d15h |
328d
|
1/25 |
never |
mm-reimplement-compound_nr-fix
|
KCSAN: data-race in virtnet_poll / virtnet_stats (2)
net
virtualization
|
|
|
|
1 |
74d |
72d
|
24/25 |
never |
61217d8f6360
virtio_net: use u64_stats_t infra to avoid data-races
|
WARNING in page_add_anon_rmap
mm
|
C |
done |
|
1041 |
78d |
79d
|
1/25 |
never |
mm-rmap-simplify-pageanonexclusive-sanity-checks-when-adding-anon-rmap-fix
|
KMSAN: uninit-value in virtio_transport_recv_pkt
net
|
C |
|
|
20713 |
26d |
40d
|
24/25 |
never |
34c4effacfc3
virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
|
linux-next boot error: KASAN: slab-out-of-bounds Write in vhci_setup
usb
|
|
|
|
34 |
50d |
54d
|
24/25 |
never |
17d6b82d2d6d
usb/usbip: fix wrong data added to platform device
|
KASAN: slab-use-after-free Read in btrfs_qgroup_account_extent
btrfs
|
C |
done |
|
40 |
23d |
34d
|
24/25 |
never |
6c8e69e4a702
btrfs: fix race between accounting qgroup extents and removing a qgroup
|
WARNING in page_copy_sane
fs
mm
|
C |
done |
|
3 |
83d |
79d
|
24/25 |
never |
a08c7193e4f1
mm/filemap: remove hugetlb special casing in filemap.c
|
general protection fault in io_get_cqe_overflow
io-uring
|
C |
done |
|
2 |
67d |
65d
|
24/25 |
never |
1658633c0465
io_uring: ensure io_lockdep_assert_cq_locked() handles disabled rings
|
general protection fault in vma_is_shmem
mm
io-uring
|
C |
error |
|
28 |
471d |
472d
|
1/25 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
general protection fault in nfc_register_device
kernel
|
C |
done |
|
186 |
1d01h |
100d
|
24/25 |
never |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
general protection fault in serio_handle_event
kernel
|
C |
done |
done |
6 |
81d |
89d
|
24/25 |
never |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
INFO: task hung in io_sq_thread_stop
fs
io-uring
|
C |
done |
|
211 |
1024d |
1183d
|
1/25 |
never |
io_uring: don't sleep schedule in SQPOLL thread if we need to park
|
KCSAN: data-race in udp_lib_setsockopt / udp_lib_setsockopt
net
|
|
|
|
2 |
106d |
92d
|
24/25 |
never |
882af43a0fc3
udplite: fix various data-races
|
general protection fault in usb_hub_create_port_device
kernel
|
C |
done |
done |
4 |
86d |
91d
|
24/25 |
never |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
WARNING in vmap_pages_range_noflush (2)
bpf
net
|
C |
error |
|
250 |
470d |
472d
|
1/25 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
BUG: unable to handle kernel paging request in alloc_huge_page
mm
|
C |
unreliable |
|
491 |
845d |
844d
|
1/25 |
never |
mm/hugetlb: Initialize page to NULL in alloc_buddy_huge_page_with_mpol()
|
KASAN: slab-use-after-free Read in madvise_collapse
mm
|
C |
error |
|
5 |
136d |
136d
|
1/25 |
never |
mm/khugepaged: collapse_pte_mapped_thp() with mmap_read_lock(): fix
|
memory leak in btrfs_add_delayed_tree_ref
btrfs
|
C |
|
|
6 |
26d |
30d
|
24/25 |
never |
609d99379736
btrfs: fix qgroup record leaks when using simple quotas
|
kernel BUG in collapse_file (3)
mm
|
C |
done |
|
14 |
135d |
142d
|
1/25 |
never |
mm/khugepaged: collapse_pte_mapped_thp() with mmap_read_lock(): fix
|
memory leak in skb_copy (2)
net
nfc
|
syz |
|
|
3 |
27d |
144d
|
24/25 |
never |
84d2db91f14a
nfc: virtual_ncidev: Add variable to check if ndev is running
|
memory leak in binder_transaction (2)
kernel
|
C |
|
|
2 |
86d |
381d
|
24/25 |
never |
1aa3aaf8953c
binder: fix memory leaks of spam and pending work
|
possible deadlock in __btrfs_release_delayed_node (3)
btrfs
|
syz |
|
|
2 |
103d |
100d
|
24/25 |
never |
e110f8911ddb
btrfs: fix lockdep splat and potential deadlock after failure running delayed items
|
possible deadlock in collapse_file
mm
|
C |
done |
|
189 |
276d |
276d
|
1/25 |
never |
mm/khugepaged: fix vm_lock/i_mmap_rwsem inversion in retract_page_tables
|
linux-next test error: WARNING in vma_merge
mm
|
|
|
|
6 |
315d |
316d
|
1/25 |
never |
mm/madvise: fix VMA_ITERATOR start position
|
linux-next boot error: WARNING in prepare_kswapd_sleep
mm
|
|
|
|
15 |
1106d |
1107d
|
1/25 |
never |
mm/memcg: warn on missing memcg on mem_cgroup_page_lruvec()
|
UBSAN: array-index-out-of-bounds in io_setup_async_msg
io-uring
|
C |
done |
|
3 |
85d |
84d
|
24/25 |
never |
c21a8027ad8a
io_uring/net: fix iter retargeting for selected buf
|
WARNING in vma_merge
mm
|
C |
done |
|
18115 |
9d16h |
588d
|
1/25 |
never |
mm/mlock: use maple state in apply_mlockall_flags()
|
general protection fault in vma_interval_tree_remove
mm
io-uring
|
C |
done |
|
13 |
565d |
583d
|
1/25 |
never |
mm/mmap: fix advanced maple tree API for mmap_region()
mm/mmap: qvoid dereferencing next on null in BUG_ON()
|
BUG: unable to handle kernel NULL pointer dereference in __io_remove_buffers (2)
io-uring
|
|
|
|
86 |
60d |
65d
|
24/25 |
never |
f8024f1f36a3
io_uring/kbuf: don't allow registered buffer rings on highmem pages
|
kernel BUG in ext4_write_inline_data
ext4
|
C |
error |
|
21 |
51d |
264d
|
0/25 |
never |
ext4: fix race condition between buffer write and page_mkwrite
|
kernel BUG in ext4_do_writepages
ext4
|
C |
error |
|
412 |
8h01m |
354d
|
0/25 |
never |
ext4: fix race condition between buffer write and page_mkwrite
|
WARNING in dev_index_reserve (2)
net
|
C |
done |
|
68 |
45d |
55d
|
24/25 |
never |
cbfbfe3aee71
tun: prevent negative ifindex
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (7)
net
|
|
|
|
1 |
68d |
64d
|
24/25 |
never |
d0f95894fda7
netlink: annotate data-races around sk->sk_err
|
inconsistent lock state in nf_connlabels_put
netfilter
|
C |
done |
|
4 |
41d |
42d
|
24/25 |
never |
643d12603664
netfilter: conntrack: switch connlabels to atomic_t
|
BUG: unable to handle kernel paging request in nsim_bpf
net
|
C |
|
|
3 |
12d |
27d
|
23/25 |
never |
c0c6bde586c7
netdevsim: Don't accept device bound programs
|
KASAN: use-after-free Read in p9_req_put
net
v9fs
|
|
|
|
60 |
2h33m |
476d
|
1/25 |
never |
9p: p9_client_create: use p9_client_destroy on failure
|
WARNING in ext4_iomap_begin (2)
ext4
|
C |
done |
|
7 |
58d |
172d
|
24/25 |
never |
ce56d21355cd
ext4: fix racy may inline data check in dio write
|
WARNING in pagemap_scan_pmd_entry
fs
|
C |
inconclusive |
|
32 |
1d01h |
21d
|
1/25 |
never |
mm/pagemap: fix ioctl(PAGEMAP_SCAN) on vma check
|
WARNING in unmap_page_range (2)
mm
|
C |
done |
|
1780 |
4h13m |
21d
|
1/25 |
never |
mm/pagemap: fix wr-protect even if PM_SCAN_WP_MATCHING not set
|
UBSAN: shift-out-of-bounds in nci_activate_target
net
nfc
|
C |
done |
|
6 |
64d |
248d
|
24/25 |
never |
354a6e707e29
nfc: nci: assert requested protocol is valid
|
KCSAN: data-race in __fput / __tty_hangup (4)
serial
|
|
|
|
2 |
121d |
229d
|
1/25 |
never |
tty: tty_io: remove hung_up_tty_fops
|
KMSAN: uninit-value in ppp_sync_receive
ppp
|
|
|
|
2 |
22d |
21d
|
24/25 |
never |
719639853d88
tty: Fix uninit-value access in ppp_sync_receive()
|
general protection fault in tls_merge_open_record
net
|
syz |
unreliable |
|
5 |
37d |
37d
|
24/25 |
never |
53f2cb491b50
tls: fix NULL deref on tls_sw_splice_eof() with empty record
|
KMSAN: uninit-value in __tipc_nl_bearer_enable (2)
tipc
|
C |
|
|
21 |
31d |
76d
|
24/25 |
never |
19b3f72a41a8
tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING
|
possible deadlock in mnt_want_write (2)
integrity
overlayfs
|
C |
done |
|
867 |
36d |
904d
|
24/25 |
never |
e044374a8a0a
ima: annotate iint mutex to avoid lockdep false positive warnings
|
BUG: Bad page map (7)
mm
|
C |
done |
|
19 |
66d |
88d
|
24/25 |
never |
ce60f27bb62d
mm: abstract moving to the next PFN
|
WARNING in create_pending_snapshot
btrfs
|
C |
done |
|
3 |
22d |
27d
|
23/25 |
never |
8049ba5d0a28
btrfs: do not abort transaction if there is already an existing qgroup
|
KMSAN: uninit-value in smsc95xx_reset
usb
|
C |
|
|
425 |
41d |
1206d
|
24/25 |
never |
51a32e828109
net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg
|
KMSAN: uninit-value in tipc_nl_node_reset_link_stats
tipc
|
C |
|
|
2 |
67d |
76d
|
24/25 |
never |
19b3f72a41a8
tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING
|
KASAN: slab-out-of-bounds Read in create_monitor_event
bluetooth
|
C |
done |
|
952 |
44d |
58d
|
24/25 |
never |
18f547f3fc07
Bluetooth: hci_sock: fix slab oob read in create_monitor_event
|
WARNING in inet_csk_get_port (2)
net
|
C |
done |
|
88 |
46d |
77d
|
24/25 |
never |
8702cf12e6ba
tcp: Fix listen() warning with v4-mapped-v6 address.
|
KASAN: slab-out-of-bounds Read in shrink_folio_list
mm
|
C |
|
|
683 |
149d |
150d
|
1/25 |
never |
mm: call folio_mapping() inside folio_needs_release()
|
WARNING in squashfs_read_data
squashfs
|
C |
error |
|
2 |
25d |
21d
|
1/25 |
never |
squashfs: squashfs_read_data need to check if the length is 0
|
WARNING in handle_userfault
mm
|
C |
error |
|
71 |
147d |
154d
|
1/25 |
never |
mm: fix a lockdep issue in vma_assert_write_locked
|
BUG: unable to handle kernel paging request in __pte_offset_map_lock
mm
|
C |
|
|
2 |
31d |
41d
|
1/25 |
never |
mm: fix oops when filemap_map_pmd() without prealloc_pte
|
KASAN: slab-use-after-free Read in ptp_poll
net
|
|
|
|
1 |
29d |
29d
|
24/25 |
never |
b714ca2ccf6a
ptp: ptp_read should not release queue
|
general protection fault in bpf_prog_offload_verifier_prep
bpf
|
C |
done |
|
31 |
75d |
94d
|
24/25 |
never |
1a49f4195d34
bpf: Avoid dummy bpf_offload_netdev in __bpf_prog_dev_bound_init
|
WARNING in bpf_mprog_pos_after
bpf
|
|
|
|
3 |
71d |
79d
|
24/25 |
never |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
WARNING in ext4_dio_write_end_io
ext4
|
C |
done |
|
2 |
15d |
14d
|
1/25 |
never |
ext4: fix warning in ext4_dio_write_end_io()
|
general protection fault in hugetlb_vma_lock_write
mm
|
C |
done |
|
106 |
59m |
38d
|
1/25 |
never |
hugetlb: fix null-ptr-deref in hugetlb_vma_lock_write
|
UBSAN: array-index-out-of-bounds in dbAdjTree
jfs
|
C |
error |
error |
36 |
7d00h |
436d
|
1/25 |
never |
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
jfs: fix array-index-out-of-bounds in dbAdjTree
|
BUG: corrupted list in ptp_open
net
|
C |
done |
|
7 |
31d |
41d
|
24/25 |
never |
1bea2c3e6df8
ptp: fix corrupted list in ptp_open
b714ca2ccf6a
ptp: ptp_read should not release queue
|
kernel BUG in vma_replace_policy
mm
|
C |
done |
|
6 |
83d |
92d
|
1/25 |
never |
mm: lock VMAs skipped by a failed queue_pages_range()
|
kernel BUG in mfill_atomic_copy
mm
|
C |
error |
|
3 |
149d |
145d
|
1/25 |
never |
mm: userfaultfd: check for start + len overflow in validate_range: fix
|
WARNING in bpf_mprog_attach
bpf
|
C |
|
|
3 |
63d |
71d
|
24/25 |
never |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
general protection fault in __mptcp_set_connected
mptcp
|
|
|
|
2 |
26d |
30d
|
24/25 |
never |
d109a7767273
mptcp: fix possible NULL pointer dereference on close
|
KMSAN: uninit-value in mptcp_incoming_options
mptcp
|
C |
|
|
93 |
5d22h |
14d
|
23/25 |
never |
237ff253f2d4
mptcp: fix uninit-value in mptcp_incoming_options
|
general protection fault in ptp_ioctl
net
|
C |
done |
|
8 |
30d |
31d
|
24/25 |
never |
8a4f030dbced
ptp: Fixes a null pointer dereference in ptp_ioctl
|
WARNING in __alloc_skb (2)
ppp
|
C |
done |
|
2 |
10d |
24d
|
24/25 |
never |
c0a2a1b0d631
ppp: limit MRU to 64K
|
WARNING in bpf_mprog_pos_before
bpf
|
C |
done |
|
26 |
63d |
71d
|
24/25 |
never |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
KMSAN: uninit-value in IP6_ECN_decapsulate
net
|
C |
|
|
961 |
5h23m |
1903d
|
24/25 |
never |
484b4833c604
hsr: Fix uninit-value access in fill_frame_info()
|
kernel BUG in gfs2_quota_cleanup
gfs2
|
C |
done |
|
3 |
5d01h |
87d
|
1/25 |
never |
gfs2: fix kernel BUG in gfs2_quota_cleanup
|
BUG: unable to handle kernel NULL pointer dereference in set_page_dirty
f2fs
reiserfs
|
C |
|
|
310 |
336d |
468d
|
1/25 |
never |
f2fs: fix missing mapping caused by the mount/umount race
|
general protection fault in inherit_task_group
perf
|
C |
done |
done |
4 |
38d |
36d
|
24/25 |
never |
a71ef31485bb
perf/core: Fix potential NULL deref
|
KASAN: stack-out-of-bounds Read in tcp_inbound_hash
net
|
C |
done |
|
28 |
24d |
38d
|
24/25 |
never |
02f0717e9835
net/tcp: fix possible out-of-bounds reads in tcp_hash_fail()
|
memory leak in ovl_parse_param
overlayfs
|
C |
|
|
1 |
28d |
24d
|
24/25 |
never |
37f32f526438
ovl: fix memory leak in ovl_parse_param()
|
WARNING: suspicious RCU usage in gfs2_permission
gfs2
|
C |
done |
|
263 |
36d |
57d
|
24/25 |
never |
074d7306a4fe
gfs2: Silence "suspicious RCU usage in gfs2_permission" warning
|
KASAN: use-after-free Read in powermate_config_complete (4)
input
|
syz |
done |
unreliable |
14 |
89d |
461d
|
24/25 |
never |
5c15c60e7be6
Input: powermate - fix use-after-free in powermate_config_complete
|
WARNING: kmalloc bug in memslot_rmap_alloc
kvm
|
C |
unreliable |
|
3 |
792d |
822d
|
1/25 |
never |
KVM: replace large kvmalloc allocation with vmalloc
|
general protection fault in scatterwalk_copychunks (4)
net
crypto
|
C |
done |
done |
227 |
85d |
995d
|
24/25 |
never |
cfaa80c91f6f
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
|
KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish (8)
bridge
|
|
|
|
1 |
80d |
79d
|
24/25 |
never |
44bdb313da57
net: bridge: use DEV_STATS_INC()
|
general protection fault in ovl_encode_real_fh
overlayfs
|
C |
done |
|
3 |
65d |
65d
|
24/25 |
never |
c7242a45cb8c
ovl: fix NULL pointer defer when encoding non-decodable lower fid
|
WARNING in dev_watchdog (2)
net
|
C |
inconclusive |
|
6698 |
3h41m |
1346d
|
3/25 |
never |
net: don't dump stack on queue timeout
|
KASAN: invalid-free in ovl_copy_up_one
overlayfs
|
C |
done |
|
2 |
75d |
72d
|
24/25 |
never |
5b02bfc1e7e3
ovl: do not encode lower fh with upper sb_writers held
|
INFO: task hung in __writeback_inodes_sb_nr (6)
ext4
|
C |
done |
|
75 |
6d21h |
173d
|
1/25 |
never |
PM: hibernate: Fix block device handling in test_resume mode
|
kernel BUG in f2fs_abort_atomic_write
f2fs
|
syz |
|
|
2 |
294d |
338d
|
1/25 |
never |
f2fs: fix to avoid race condition of f2fs_abort_atomic_write()
|
KASAN: slab-use-after-free Write in gfs2_qd_dealloc
gfs2
|
C |
inconclusive |
|
27 |
15d |
68d
|
24/25 |
never |
bdcb8aa434c6
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
|
WARNING in skb_checksum_help (2)
net
|
C |
done |
|
3709 |
8h06m |
75d
|
24/25 |
never |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
kernel BUG in f2fs_put_super
f2fs
|
|
|
|
2 |
62d |
92d
|
24/25 |
never |
a4639380bbe6
f2fs: fix to drop meta_inode's page cache in f2fs_put_super()
|
kernel BUG in ip6gre_header (2)
net
|
C |
|
|
2 |
54d |
68d
|
24/25 |
never |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
KASAN: slab-out-of-bounds Read in ntfs_listxattr
ntfs3
|
C |
done |
|
47 |
37m |
364d
|
1/25 |
never |
3c675ddffb17
ntfs: Fix panic about slab-out-of-bounds caused by ntfs_listxattr()
|
general protection fault in d_path
integrity
overlayfs
|
C |
done |
|
210 |
12d |
154d
|
24/25 |
never |
8a924db2d7b5
fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
|
WARNING in skb_warn_bad_offload (4)
net
|
C |
done |
|
1763 |
48d |
75d
|
24/25 |
never |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
KASAN: use-after-free Read in __vma_adjust
mm
|
C |
done |
|
10 |
486d |
542d
|
1/25 |
never |
fs/userfaultfd: fix vma iteration in mas_for_each() loop
|
BUG: corrupted list in nfc_llcp_register_device
net
nfc
|
C |
error |
|
136 |
62d |
350d
|
24/25 |
never |
dfc7f7a988da
net: nfc: llcp: Add lock when modifying device list
|
KASAN: slab-use-after-free Read in ntfs_write_bh
ntfs3
|
C |
done |
|
100 |
61d |
86d
|
24/25 |
never |
493c71926c20
ntfs3: put resources during ntfs_fill_super()
|
linux-next boot error: kernel BUG at include/linux/page-flags.h:LINE!
mm
|
|
|
|
3 |
1098d |
1098d
|
1/25 |
never |
fixup for "mm: refactor initialization of stuct page for holes"
|
UBSAN: shift-out-of-bounds in dbAlloc (2)
jfs
|
|
|
|
1 |
83d |
79d
|
24/25 |
never |
525b861a0081
fs/jfs: Add check for negative db_l2nbperpage
|
general protection fault in page_pool_unlist
net
|
C |
done |
|
648 |
5d18h |
7d14h
|
3/25 |
never |
net: page_pool: fix general protection fault in page_pool_unlist
|
WARNING in blk_mq_start_request
block
|
C |
done |
|
29 |
13d |
29d
|
24/25 |
never |
53f2bca26092
block/null_blk: Fix double blk_mq_start_request() warning
|
KMSAN: uninit-value in smsc95xx_eeprom_confirm_not_busy
usb
|
C |
|
|
521 |
41d |
154d
|
24/25 |
never |
51a32e828109
net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg
|
UBSAN: array-index-out-of-bounds in dtSplitRoot
jfs
|
C |
error |
inconclusive |
2 |
89d |
417d
|
1/25 |
never |
UBSAN: array-index-out-of-bounds in dtSplitRoot
|
possible deadlock in pipe_write
fs
|
C |
inconclusive |
|
161 |
3d11h |
625d
|
1/25 |
never |
fs/pipe: Fix lockdep false-positive in watchqueue pipe_write()
|
KMSAN: uninit-value in fq_change
net
|
C |
|
|
8 |
27d |
29d
|
24/25 |
never |
f1a3b283f852
UPSTREAM: net_sched: sch_fq: better validate TCA_FQ_WEIGHTS and TCA_FQ_PRIOMAP
|
KASAN: slab-use-after-free Read in unix_stream_read_actor
net
|
C |
error |
|
6 |
9d14h |
25d
|
24/25 |
never |
4b7b492615cf
af_unix: fix use-after-free in unix_stream_read_actor()
|
UBSAN: shift-out-of-bounds in ntfs_fill_super (2)
ntfs3
|
C |
error |
|
5716 |
11d |
281d
|
24/25 |
never |
91a4b1ee78cb
fs/ntfs3: Fix shift-out-of-bounds in ntfs_fill_super
|
BUG: unable to handle kernel NULL pointer dereference in hdr_find_e (2)
ntfs3
|
C |
done |
|
4 |
53d |
125d
|
24/25 |
never |
1f9b94af923c
fs/ntfs3: Fix possible null-pointer dereference in hdr_find_e()
|
UBSAN: array-index-out-of-bounds in dbNextAG
jfs
|
C |
inconclusive |
inconclusive |
52 |
8d23h |
436d
|
24/25 |
never |
64933ab7b048
fs/jfs: Add validity check for db_maxag and db_agpref
|
possible deadlock in rfkill_send_events
wireless
|
C |
done |
|
22 |
47d |
58d
|
24/25 |
never |
f2ac54ebf856
net: rfkill: reduce data->mtx scope in rfkill_fop_open
|
KMSAN: uninit-value in mii_nway_restart
usb
|
C |
|
|
2449 |
55d |
1646d
|
24/25 |
never |
8f8abb863fa5
net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read
|
kernel BUG in ipgre_header
net
|
C |
|
|
4 |
4d17h |
19d
|
24/25 |
never |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
KASAN: use-after-free Read in bcmp
ntfs3
|
C |
done |
|
287 |
3d13h |
147d
|
24/25 |
never |
34e6552a442f
fs/ntfs3: Fix OOB read in ntfs_init_from_boot
|
KASAN: use-after-free Read in ntfs_test_inode
ntfs
|
C |
done |
|
401 |
19d |
933d
|
24/25 |
never |
493c71926c20
ntfs3: put resources during ntfs_fill_super()
|
general protection fault in autofs_fill_super
autofs
|
syz |
done |
|
7 |
14d |
23d
|
24/25 |
never |
66917f85db60
autofs: add: new_inode check in autofs_fill_super()
|
KMSAN: uninit-value in smsc75xx_bind
usb
|
C |
|
|
63 |
83d |
1580d
|
24/25 |
never |
e9c65989920f
net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
|
WARNING in nilfs_sufile_set_segment_usage
nilfs
|
C |
inconclusive |
|
341 |
13d |
432d
|
1/25 |
never |
nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage()
|
WARNING in try_grab_page
xfs
mm
|
C |
|
|
48 |
70d |
156d
|
25/25 |
55d |
f443fd5af5db
crypto, cifs: fix error handling in extract_iter_to_sg()
|
kernel BUG in add_new_free_space
btrfs
|
C |
|
|
3 |
160d |
228d
|
25/25 |
55d |
d8ccbd21918f
btrfs: remove BUG_ON()'s in add_new_free_space()
|
KCSAN: data-race in sctp_poll / sctp_wfree (3)
sctp
|
|
|
|
1 |
101d |
100d
|
25/25 |
55d |
dc9511dd6f37
sctp: annotate data-races around sk->sk_wmem_queued
|
INFO: rcu detected stall in sys_close (5)
net
|
C |
done |
|
1 |
99d |
99d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
general protection fault in io_sqpoll_wq_cpu_affinity
io-uring
|
|
|
|
33 |
89d |
100d
|
25/25 |
55d |
bd6fc5da4c51
io_uring: Don't set affinity on a dying sqpoll thread
|
possible deadlock in shmem_uncharge (2)
mm
|
C |
done |
|
29 |
143d |
141d
|
25/25 |
55d |
509f006932de
shmem: fix quota lock nesting in huge hole handling
|
WARNING in unregister_vlan_dev
net
|
C |
done |
|
1310 |
108d |
117d
|
25/25 |
55d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
general protection fault in __drop_extent_tree
f2fs
|
C |
error |
|
3 |
200d |
239d
|
25/25 |
55d |
458c15dfbce6
f2fs: don't reset unchangable mount option in f2fs_remount()
|
KCSAN: data-race in ____sys_sendmsg / do_ipv6_setsockopt
net
|
|
|
|
1 |
178d |
161d
|
25/25 |
55d |
1ded5e5a5931
net: annotate data-races around sock->ops
|
general protection fault in io_uring_show_fdinfo
io-uring
|
C |
done |
|
17 |
87d |
96d
|
25/25 |
55d |
32f5dea040ee
io_uring/fdinfo: only print ->sq_array[] if it's there
|
KCSAN: data-race in random_recv_done / virtio_read (3)
crypto
|
|
|
|
13 |
165d |
229d
|
25/25 |
55d |
ac52578d6e8d
hwrng: virtio - Fix race on data_avail and actual data
|
KCSAN: data-race in netlink_setsockopt / netlink_setsockopt
net
|
|
|
|
1 |
118d |
118d
|
25/25 |
55d |
8fe08d70a2b6
netlink: convert nlk->flags to atomic flags
|
KASAN: slab-out-of-bounds Read in read_descriptors (3)
usb
|
C |
error |
|
7 |
142d |
169d
|
25/25 |
55d |
ff33299ec8bb
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
|
WARNING in do_chunk_alloc
btrfs
|
C |
error |
done |
35 |
162d |
378d
|
25/25 |
55d |
cd361199ff23
btrfs: wait on uncached block groups on every allocation loop
|
general protection fault in generic_hwtstamp_ioctl_lower
net
|
C |
done |
|
7 |
121d |
124d
|
25/25 |
55d |
c35e927cbe09
net: omit ndo_hwtstamp_get() call when possible in dev_set_hwtstamp_phylib()
|
KASAN: use-after-free Read in raw_release
can
|
|
|
|
1 |
127d |
127d
|
25/25 |
55d |
11c9027c983e
can: raw: fix lockdep issue in raw_release()
|
INFO: rcu detected stall in unix_release
net
|
C |
done |
|
1 |
119d |
115d
|
25/25 |
55d |
da71714e359b
net/sched: fix a qdisc modification with ambiguous command request
|
UBSAN: array-index-out-of-bounds in f2fs_iget
f2fs
|
C |
done |
|
6 |
95d |
139d
|
25/25 |
55d |
958ccbbf1ce7
Revert "f2fs: fix to do sanity check on extent cache correctly"
|
WARNING in init_module_from_file
modules
|
C |
|
|
98 |
148d |
156d
|
25/25 |
55d |
f1962207150c
module: fix init_module_from_file() error handling
|
WARNING: refcount bug in xp_put_pool
bpf
net
|
C |
done |
|
2 |
130d |
128d
|
25/25 |
55d |
85c2c79a0730
xsk: fix refcount underflow in error path
|
WARNING in ip6_tnl_exit_batch_net
net
|
C |
done |
|
29 |
110d |
117d
|
25/25 |
55d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: invalid-free in dbUnmount
jfs
|
syz |
error |
|
119 |
72d |
331d
|
25/25 |
55d |
cade5397e546
fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount()
|
KASAN: stack-out-of-bounds Write in __nla_validate_parse
net
|
C |
done |
|
4 |
123d |
137d
|
25/25 |
55d |
4d50e50045aa
net: flower: fix stack-out-of-bounds in fl_set_key_cfm()
|
KMSAN: uninit-value in af_alg_free_resources
crypto
|
C |
|
|
156 |
108d |
145d
|
25/25 |
55d |
080aa61e370b
crypto: fix uninit-value in af_alg_free_resources
|
general protection fault in sco_conn_add
bluetooth
|
C |
done |
|
4 |
141d |
150d
|
25/25 |
55d |
b4066eb04bb6
Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link
|
net-next test error: UBSAN: array-index-out-of-bounds in alloc_pid
kernel
|
|
|
|
30 |
154d |
156d
|
25/25 |
55d |
b69f0aeb0689
pid: Replace struct pid 1-element array with flex-array
|
KASAN: null-ptr-deref Read in txBegin
jfs
|
C |
error |
|
30 |
156d |
291d
|
25/25 |
55d |
47cfdc338d67
FS: JFS: Fix null-ptr-deref Read in txBegin
|
WARNING in ntfs_load_attr_list
ntfs3
|
C |
|
|
4 |
220d |
338d
|
25/25 |
55d |
ea303f72d70c
fs/ntfs3: Use __GFP_NOWARN allocation at ntfs_load_attr_list()
|
WARNING in iommufd_access_destroy
iommu
|
C |
done |
|
3 |
144d |
145d
|
25/25 |
55d |
99f98a7c0d69
iommufd: IOMMUFD_DESTROY should not increase the refcount
|
BUG: unable to handle kernel paging request in handshake_nl_done_doit
tls
|
C |
|
|
2 |
101d |
101d
|
25/25 |
55d |
82ba0ff7bf04
net/handshake: fix null-ptr-deref in handshake_nl_done_doit()
|
WARNING: bad unlock balance in sockopt_release_sock
net
|
C |
done |
|
2 |
103d |
103d
|
25/25 |
55d |
8be6f88b9d3f
inet: fix IP_TRANSPARENT error handling
|
KASAN: slab-use-after-free Read in xsk_diag_dump
net
bpf
|
C |
done |
|
9 |
90d |
99d
|
25/25 |
55d |
3e019d8a05a3
xsk: Fix xsk_diag use-after-free error during socket cleanup
|
linux-next test error: UBSAN: array-index-out-of-bounds in alloc_pid
kernel
|
|
|
|
9 |
203d |
203d
|
25/25 |
55d |
b69f0aeb0689
pid: Replace struct pid 1-element array with flex-array
|
KMSAN: uninit-value in alauda_check_media
usb
usb-storage
|
C |
|
|
1059 |
137d |
1521d
|
25/25 |
55d |
a6ff6e7a9dd6
usb-storage: alauda: Fix uninit-value in alauda_check_media()
|
INFO: rcu detected stall in tipc_sendmsg (2)
tipc
|
|
|
|
1 |
124d |
124d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
UBSAN: array-index-out-of-bounds in xfs_attr3_leaf_add_work
xfs
|
C |
error |
done |
1923 |
132d |
172d
|
25/25 |
55d |
a49bbce58ea9
xfs: convert flex-array declarations in xfs attr leaf blocks
|
UBSAN: array-index-out-of-bounds in bpf_mprog_detach
bpf
|
|
|
|
3 |
124d |
130d
|
25/25 |
55d |
d210f9735e13
bpf: Fix mprog detachment for empty mprog entry
|
KASAN: slab-use-after-free Read in input_dev_uevent
input
|
C |
done |
|
7 |
96d |
107d
|
25/25 |
55d |
dd613a4e45f8
HID: uclogic: Correct devm device reference for hidinput input_dev name
|
BUG: unable to handle kernel paging request in ovs_vport_add
openvswitch
|
C |
done |
|
2 |
118d |
117d
|
25/25 |
55d |
a552bfa16bab
net: openvswitch: reject negative ifindex
|
KASAN: slab-use-after-free Read in nilfs_load_inode_block (2)
nilfs
|
C |
done |
|
4 |
122d |
137d
|
25/25 |
55d |
f8654743a0e6
nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput
|
KCSAN: data-race in bpf_percpu_array_update / bpf_percpu_array_update (2)
bpf
|
|
|
|
1 |
99d |
99d
|
25/25 |
55d |
6a86b5b5cd76
bpf: Annotate bpf_long_memcpy with data_race
|
memory leak in autofs_wait
autofs
|
C |
|
|
4 |
189d |
560d
|
25/25 |
55d |
ccbe77f7e45d
autofs: fix memory leak of waitqueues in autofs_catatonic_mode
|
KCSAN: data-race in dccp_connect / dccp_sendmsg (3)
dccp
|
|
|
|
1 |
125d |
125d
|
25/25 |
55d |
a47e598fbd86
dccp: fix data-race around dp->dccps_mss_cache
|
general protection fault in f2fs_drop_extent_tree
f2fs
|
C |
error |
done |
1 |
165d |
161d
|
25/25 |
55d |
458c15dfbce6
f2fs: don't reset unchangable mount option in f2fs_remount()
|
KCSAN: data-race in __ip4_datagram_connect / __ip_make_skb (5)
net
|
|
|
|
3 |
133d |
161d
|
25/25 |
55d |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
WARNING in mark_buffer_dirty (5)
nilfs
|
C |
done |
|
172 |
58d |
177d
|
25/25 |
55d |
cdaac8e7e5a0
nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse
|
KMSAN: uninit-value in udf_name_from_CS0
udf
|
|
|
|
1 |
168d |
168d
|
25/25 |
55d |
028f6055c912
udf: Fix uninitialized array access for some pathnames
|
INFO: rcu detected stall in statfs
fs
|
|
|
|
1 |
115d |
115d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
WARNING in ieee80211_probe_client
wireless
|
C |
done |
error |
124 |
87d |
1156d
|
25/25 |
55d |
67dfa589aa88
wifi: mac80211: check for station first in client probe
|
general protection fault in skb_segment (3)
net
|
C |
done |
|
2 |
115d |
115d
|
25/25 |
55d |
b616be6b9768
net: do not allow gso_size to be set to GSO_BY_FRAGS
|
INFO: rcu detected stall in bond_3ad_state_machine_handler
net
|
|
|
|
1 |
132d |
132d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
BUG: soft lockup in fq_pie_timer (4)
net
|
syz |
|
|
5 |
85d |
136d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
UBSAN: array-index-out-of-bounds in dbAllocDmapLev
jfs
|
C |
error |
|
2 |
175d |
348d
|
25/25 |
55d |
4e302336d5ca
fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev
|
INFO: rcu detected stall in nsim_dev_trap_report_work
net
|
syz |
|
|
4 |
91d |
133d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
WARNING in rtnl_dellink (3)
net
|
C |
done |
|
492 |
107d |
117d
|
25/25 |
55d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
INFO: rcu detected stall in shmem_fault (5)
cgroups
mm
|
|
|
|
3 |
110d |
131d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
KASAN: slab-use-after-free Read in team_device_event
net
|
C |
done |
|
2 |
91d |
90d
|
25/25 |
55d |
6afcf0fb9270
Revert "net: team: do not use dynamic lockdep key"
|
general protection fault in ext4_finish_bio
ext4
|
C |
done |
|
1 |
160d |
156d
|
25/25 |
55d |
0b7ec177b589
crypto: algif_hash - Fix race between MORE and non-MORE sends
|
WARNING in sta_info_insert_rcu (3)
wireless
|
C |
done |
|
6 |
103d |
144d
|
25/25 |
55d |
5d4e04bf3a0f
wifi: cfg80211: reject auth/assoc to AP with our address
|
KCSAN: data-race in fib_release_info / fib_table_lookup
net
|
|
|
|
1 |
100d |
100d
|
25/25 |
55d |
fce92af1c29d
ipv4: annotate data-races around fi->fib_dead
|
KASAN: slab-use-after-free Read in fuse_test_super
fuse
|
C |
done |
|
6 |
99d |
102d
|
25/25 |
55d |
dc3216b14160
super: ensure valid info
|
KASAN: slab-use-after-free Read in iopt_unmap_iova_range
iommu
|
C |
error |
|
7 |
162d |
173d
|
25/25 |
55d |
804ca14d04df
iommufd: Do not access the area pointer after unlocking
|
possible deadlock in inode_add_bytes
fs
|
C |
done |
|
124 |
142d |
141d
|
25/25 |
55d |
509f006932de
shmem: fix quota lock nesting in huge hole handling
|
general protection fault in ingress_destroy
net
|
|
|
|
10 |
135d |
139d
|
25/25 |
55d |
079082c60aff
tcx: Fix splat during dev unregister
|
KCSAN: data-race in tcp_make_synack / tcp_rtx_synack
net
|
|
|
|
1 |
146d |
145d
|
25/25 |
55d |
5e5265522a9a
tcp: annotate data-races around tcp_rsk(req)->txhash
|
KASAN: slab-out-of-bounds Read in xlog_pack_data
xfs
|
C |
error |
done |
4 |
175d |
172d
|
25/25 |
55d |
f1e1765aad7d
xfs: journal geometry is not properly bounds checked
|
WARNING in tcx_uninstall
bpf
net
|
C |
done |
|
7 |
129d |
133d
|
25/25 |
55d |
079082c60aff
tcx: Fix splat during dev unregister
|
INFO: task hung in pipe_release (4)
fs
|
C |
done |
|
51 |
147d |
147d
|
25/25 |
55d |
0f71c9caf267
udp: Fix __ip_append_data()'s handling of MSG_SPLICE_PAGES
|
possible deadlock in do_user_addr_fault
exfat
|
C |
unreliable |
done |
39 |
162d |
253d
|
25/25 |
55d |
ff84772fd45d
exfat: release s_lock before calling dir_emit()
|
KCSAN: data-race in tcp_check_req / tcp_check_req
net
|
|
|
|
2 |
163d |
161d
|
25/25 |
55d |
eba20811f326
tcp: annotate data-races around tcp_rsk(req)->ts_recent
|
general protection fault in sys_finit_module
modules
|
C |
error |
done |
84 |
154d |
155d
|
25/25 |
55d |
f1962207150c
module: fix init_module_from_file() error handling
|
KASAN: slab-out-of-bounds Read in do_csum
net
|
C |
|
|
160 |
59d |
100d
|
25/25 |
55d |
8bd795fedb84
arm64: csum: Fix OoB access in IP checksum code for negative lengths
|
kernel BUG in btrfs_ioctl
btrfs
|
C |
error |
|
1 |
171d |
167d
|
25/25 |
55d |
b19c98f237cd
btrfs: fix race between balance and cancel/pause
|
KCSAN: data-race in iptunnel_xmit / iptunnel_xmit (5)
net
|
|
|
|
1 |
92d |
92d
|
25/25 |
55d |
9b271ebaf9a2
ip_tunnels: use DEV_STATS_INC()
|
KMSAN: uninit-value in hwsim_cloned_frame_received_nl
wireless
|
C |
|
|
8315 |
99d |
1168d
|
25/25 |
55d |
fba360a047d5
wifi: mac80211_hwsim: drop short frames
|
WARNING in dev_index_reserve
bridge
|
C |
done |
|
7120 |
57d |
112d
|
25/25 |
55d |
f534f6581ec0
net: validate veth and vxcan peer ifindexes
30188bd7838c
rtnetlink: Reject negative ifindexes in RTM_NEWLINK
|
memory leak in raw_open
usb
|
C |
|
|
1 |
150d |
146d
|
25/25 |
55d |
83e30f2bf86e
USB: gadget: Fix the memory leak in raw_gadget driver
|
possible deadlock in lock_mm_and_find_vma
exfat
|
C |
error |
|
2 |
126d |
146d
|
25/25 |
55d |
ff84772fd45d
exfat: release s_lock before calling dir_emit()
|
possible deadlock in raw_bind
can
|
|
|
|
4535 |
128d |
140d
|
25/25 |
55d |
11c9027c983e
can: raw: fix lockdep issue in raw_release()
|
KCSAN: data-race in __ip_make_skb / __ip_make_skb
net
|
|
|
|
624 |
103d |
673d
|
25/25 |
55d |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
WARNING in netdev_open
staging
|
|
|
|
1 |
133d |
129d
|
25/25 |
55d |
1422b526fba9
staging: rtl8712: fix race condition
|
KASAN: use-after-free Read in gsm_cleanup_mux
serial
|
C |
done |
done |
16 |
121d |
400d
|
25/25 |
55d |
3c4f8333b582
tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux
|
inconsistent lock state in btrfs_run_delayed_iputs
btrfs
|
|
|
|
1 |
158d |
154d
|
25/25 |
55d |
866e98a4d95d
btrfs: use irq safe locking when running and adding delayed iputs
|
UBSAN: shift-out-of-bounds in ext2_fill_super (2)
ext4
|
C |
|
|
571 |
133d |
177d
|
25/25 |
55d |
404615d7f1dc
ext2: Drop fragment support
|
WARNING in bpf_xdp_adjust_tail (4)
bpf
|
C |
error |
|
466 |
121d |
331d
|
25/25 |
55d |
d14eea09edf4
net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()
|
KMSAN: uninit-value in ieee802154_subif_start_xmit
bpf
|
C |
done |
|
119 |
126d |
122d
|
25/25 |
55d |
db2baf82b098
bpf: Fix an incorrect verification success with movsx insn
|
WARNING: ODEBUG bug in ingress_destroy
net
|
C |
done |
|
16 |
136d |
139d
|
25/25 |
55d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
WARNING in ext4_file_write_iter
ext4
|
C |
error |
|
17314 |
73d |
172d
|
25/25 |
55d |
194505b55dd7
ext4: drop dio overwrite only flag and associated warning
|
KASAN: slab-out-of-bounds Read in mt_validate_nulls
mm
|
C |
error |
done |
15 |
155d |
153d
|
25/25 |
55d |
ae80b4041984
mm: validate the mm before dropping the mmap lock
|
general protection fault in rxe_completer
rdma
|
|
|
|
281 |
89d |
170d
|
25/25 |
55d |
5993b75d0bc7
RDMA/rxe: Fix unsafe drain work queue code
|
general protection fault in prepare_to_wait (2)
hams
|
syz |
inconclusive |
|
4 |
72d |
110d
|
25/25 |
55d |
c2f8fd794960
netrom: Deny concurrent connect().
|
kernel BUG in validate_mm (2)
mm
|
C |
unreliable |
done |
217 |
155d |
154d
|
25/25 |
55d |
ae80b4041984
mm: validate the mm before dropping the mmap lock
|
KASAN: invalid-free in init_file
overlayfs
|
C |
done |
|
6 |
157d |
158d
|
25/25 |
55d |
dff745c1221a
fs: move cleanup from init_file() into its callers
|
kernel BUG in prepare_to_merge
btrfs
|
C |
done |
|
48 |
118d |
158d
|
25/25 |
55d |
773e722a98e2
btrfs: avoid race between qgroup tree creation and relocation
05d7ce504545
btrfs: exit gracefully if reloc roots don't match
6ebcd021c92b
btrfs: reject invalid reloc tree root keys with stack dump
|
KASAN: slab-out-of-bounds Read in bio_split_rw
block
|
C |
done |
|
1 |
159d |
155d
|
25/25 |
55d |
0b7ec177b589
crypto: algif_hash - Fix race between MORE and non-MORE sends
|
WARNING: ODEBUG bug in tcx_uninstall
bpf
net
|
C |
done |
|
38 |
134d |
139d
|
25/25 |
55d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
INFO: rcu detected stall in ext4_file_write_iter (7)
mm
bpf
ext4
|
|
|
|
3 |
97d |
139d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2)
kernel
|
C |
|
|
2688 |
56d |
1012d
|
25/25 |
55d |
39285e124edb
net: team: do not use dynamic lockdep key
|
KMSAN: uninit-value in ieee80211_rx_handlers
wireless
|
C |
|
|
8 |
100d |
156d
|
25/25 |
55d |
19e4a47ee747
wifi: mac80211: check S1G action frame size
|
WARNING in call_netdevice_notifiers_info
batman
|
C |
done |
|
20 |
105d |
107d
|
25/25 |
55d |
987aae75fc10
batman-adv: Hold rtnl lock during MTU update via netlink
|
KASAN: slab-use-after-free Read in test_bdev_super_fc
fs
|
C |
done |
|
7 |
122d |
125d
|
25/25 |
55d |
aca740cecbe5
fs: open block device after superblock creation
|
KASAN: slab-use-after-free Read in afs_dynroot_test_super
afs
|
C |
done |
|
4 |
99d |
95d
|
25/25 |
55d |
dc3216b14160
super: ensure valid info
|
general protection fault in folio_create_empty_buffers
nilfs
|
C |
error |
|
6 |
124d |
199d
|
25/25 |
55d |
f83913f8c5b8
nilfs2: fix general protection fault in nilfs_lookup_dirty_data_buffers()
|
WARNING in corrupted (3)
usb
|
C |
done |
|
19 |
150d |
198d
|
25/25 |
55d |
6f489a966fbe
media: usb: siano: Fix warning due to null work_func_t function pointer
|
KCSAN: data-race in macsec_handle_frame / macsec_handle_frame (3)
net
|
|
|
|
2 |
124d |
126d
|
25/25 |
55d |
32d0a49d36a2
macsec: use DEV_STATS_INC()
|
general protection fault in gfs2_lookup_simple
gfs2
|
C |
done |
|
3 |
126d |
123d
|
25/25 |
55d |
111c7d27a1b7
gfs2: Use mapping->gfp_mask for metadata inodes
|
KASAN: slab-use-after-free Write in sco_chan_del
bluetooth
|
C |
done |
|
19 |
71d |
205d
|
25/25 |
55d |
3344d318337d
Bluetooth: hci_conn: fail SCO/ISO via hci_conn_failed if ACL gone early
|
WARNING in usbnet_start_xmit/usb_submit_urb
usb
|
C |
done |
|
92 |
169d |
751d
|
25/25 |
55d |
5e1627cb43dd
net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb
|
WARNING in ieee80211_bss_info_change_notify
wireless
|
C |
done |
|
7725 |
55d |
1160d
|
25/25 |
55d |
abc76cf552e1
wifi: cfg80211: ocb: don't leave if not joined
|
UBSAN: shift-out-of-bounds in dbFree
jfs
|
C |
error |
|
3 |
195d |
261d
|
25/25 |
55d |
11509910c599
jfs: jfs_dmap: Validate db_l2nbperpage while mounting
|
UBSAN: array-index-out-of-bounds in print_bpf_insn
bpf
|
C |
done |
|
9 |
127d |
128d
|
25/25 |
55d |
e99688eba2e9
bpf: Fix an array-index-out-of-bounds issue in disasm.c
|
WARNING in macvlan_device_event
net
|
|
|
|
3 |
111d |
113d
|
25/25 |
55d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
general protection fault in ext4_acquire_dquot
ext4
|
C |
|
|
4 |
169d |
208d
|
25/25 |
55d |
6a4e3363792e
quota: Properly disable quotas when add_dquot_ref() fails
|
BUG: unable to handle kernel paging request in ext4_calculate_overhead
ext4
|
C |
done |
|
31 |
101d |
103d
|
25/25 |
55d |
ee5c807137ce
ext4: ext4_get_{dev}_journal return proper error value
|
KASAN: slab-use-after-free Read in f2fs_truncate_data_blocks_range
f2fs
|
C |
error |
|
1 |
168d |
164d
|
25/25 |
55d |
a6ec83786ab9
f2fs: fix to do sanity check on direct node in truncate_dnode()
|
WARNING in diUnmount
jfs
|
C |
error |
|
100 |
82d |
375d
|
25/25 |
55d |
6e2bda2c192d
jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount
|
WARNING in vlan_device_event
net
|
|
|
|
1 |
113d |
113d
|
25/25 |
55d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KMSAN: uninit-value in __netif_receive_skb_core
wireguard
wireless
|
C |
done |
|
353 |
95d |
2064d
|
25/25 |
55d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
memory leak in snd_seq_create_port
sound
|
C |
|
|
1 |
147d |
143d
|
25/25 |
55d |
057849ccc3d8
ALSA: seq: Fix memory leak at error path in snd_seq_create_port()
|
INFO: rcu detected stall in uinput_write
input
|
|
|
|
1 |
135d |
135d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
possible deadlock in f2fs_getxattr
f2fs
|
C |
done |
|
4570 |
72d |
152d
|
25/25 |
55d |
5c13e2388bf3
f2fs: avoid false alarm of circular locking
|
general protection fault in btrfs_finish_ordered_extent
btrfs
|
C |
done |
|
8 |
145d |
146d
|
25/25 |
55d |
7cad645ebf20
btrfs: fix ordered extent split error handling in btrfs_dio_submit_io
|
memory leak in _r8712_init_xmit_priv
staging
usb
|
C |
|
|
1 |
151d |
147d
|
25/25 |
55d |
ac83631230f7
staging: r8712: Fix memory leak in _r8712_init_xmit_priv()
|
kernel BUG in f2fs_evict_inode
f2fs
|
C |
error |
|
135 |
70d |
349d
|
25/25 |
55d |
a3ab55746612
f2fs: flush inode if atomic file is aborted
|
INFO: rcu detected stall in hci_cmd_timeout
bluetooth
|
|
|
|
1 |
118d |
118d
|
25/25 |
55d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
KASAN: use-after-free Read in qd_unlock (2)
gfs2
|
C |
error |
done |
5 |
109d |
338d
|
25/25 |
55d |
f66af88e3321
gfs2: Stop using gfs2_make_fs_ro for withdraw
|
WARNING in kvm_arch_vcpu_ioctl_run (5)
kvm
|
C |
error |
|
343 |
89d |
177d
|
25/25 |
55d |
26a0652cb453
KVM: x86: Disallow KVM_SET_SREGS{2} if incoming CR0 is invalid
|
UBSAN: shift-out-of-bounds in extAlloc
jfs
|
C |
error |
|
6605 |
76d |
436d
|
25/25 |
55d |
0225e10972fa
jfs: validate max amount of blocks before allocation.
|
WARNING in __gup_longterm_locked
mm
|
C |
error |
|
90 |
154d |
155d
|
25/25 |
55d |
6cd06ab12d1a
gup: make the stack expansion warning a bit more targeted
|
KASAN: slab-use-after-free Write in mini_qdisc_pair_swap
net
|
C |
error |
|
76 |
104d |
258d
|
25/25 |
68d |
84ad0af0bccd
net/sched: qdisc_destroy() old ingress and clsact Qdiscs before grafting
c7cfbd115001
net/sched: sch_ingress: Only create under TC_H_INGRESS
|
KASAN: slab-out-of-bounds Read in extract_iter_to_sg
crypto
|
C |
done |
|
13 |
172d |
177d
|
25/25 |
68d |
4380499218c6
crypto: Fix af_alg_sendmsg(MSG_SPLICE_PAGES) sglist limit
b6d972f68983
crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
|
upstream build error (20)
kernel
|
|
|
|
498 |
118d |
157d
|
25/25 |
69d |
0a9567ac5e6a
x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build
|
memory leak in htc_connect_service
wireless
|
C |
|
|
1 |
204d |
285d
|
25/25 |
69d |
061b0cb9327b
wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
|
general protection fault in shash_async_final
crypto
|
C |
done |
|
13 |
169d |
177d
|
25/25 |
69d |
b6d972f68983
crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
|
WARNING in blkdev_put (3)
reiserfs
block
|
C |
done |
|
377 |
168d |
172d
|
25/25 |
69d |
c576c4bf9ecf
reiserfs: fix blkdev_put() warning from release_journal_dev()
|
WARNING in iommufd_test_check_pages
iommu
|
C |
error |
|
4 |
168d |
219d
|
25/25 |
69d |
9883c7f84053
mm/gup: do not return 0 from pin_user_pages_fast() for bad args
|
possible deadlock in static_key_slow_inc (3)
cgroups
|
C |
done |
|
6387 |
133d |
181d
|
25/25 |
69d |
f0cc749254d1
cgroup,freezer: hold cpu_hotplug_lock before freezer_mutex in freezer_css_{online,offline}()
|
KCSAN: data-race in drain_all_stock / drain_obj_stock (4)
cgroups
mm
|
|
|
|
3 |
213d |
229d
|
25/25 |
69d |
3b8abb323953
mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
|
WARNING in sock_i_ino
net
|
C |
error |
|
22 |
162d |
166d
|
25/25 |
69d |
25a9c8a4431c
netlink: Add __sock_i_ino() for __netlink_diag_dump().
|
INFO: trying to register non-static key in skb_dequeue (2)
rdma
|
syz |
error |
|
123 |
173d |
217d
|
25/25 |
69d |
2a62b6210ce8
RDMA/rxe: Fix the use-before-initialization error of resp_pkts
|
KMSAN: kernel-infoleak in __skb_datagram_iter
net
|
|
|
|
68 |
71d |
176d
|
25/25 |
69d |
aa5406950726
netlink: do not hard code device address lenth in fdb dumps
|
WARNING: ODEBUG bug in __mod_timer
kernel
|
|
|
|
1 |
229d |
191d
|
25/25 |
69d |
8b64d420fe24
debugobjects: Recheck debug_objects_enabled before reporting
|
kernel BUG in assertfail (2)
btrfs
|
C |
done |
done |
162 |
174d |
436d
|
25/25 |
69d |
745806fb4554
btrfs: do not ASSERT() on duplicated global roots
|
general protection fault in crypto_shash_final
crypto
|
C |
done |
|
2 |
180d |
177d
|
25/25 |
69d |
b6d972f68983
crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
|
KCSAN: data-race in __bpf_lru_list_rotate / __htab_lru_percpu_map_update_elem (5)
bpf
|
|
|
|
13 |
163d |
225d
|
25/25 |
69d |
ee9fd0ac3017
bpf: Address KCSAN report on bpf_lru_list
|
KMSAN: uninit-value in reiserfs_security_init
reiserfs
|
|
|
|
4169 |
149d |
210d
|
25/25 |
69d |
d031f4e8b493
reiserfs: Initialize sec->length in reiserfs_security_init().
|
WARNING in extract_iter_to_sg
crypto
|
|
|
|
1 |
154d |
154d
|
25/25 |
69d |
3fc40265ae2b
iov_iter: Kill ITER_PIPE
|
general protection fault in shash_async_update
crypto
|
C |
done |
done |
12 |
169d |
166d
|
25/25 |
69d |
b6d972f68983
crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
|
KASAN: stack-out-of-bounds Read in ip6mr_ioctl
net
|
C |
done |
|
192 |
167d |
173d
|
25/25 |
69d |
3a4f0edbb793
ipv6: fix a typo in ip6mr_sk_ioctl()
|
WARNING in btf_type_id_size (2)
bpf
|
C |
error |
|
8 |
165d |
196d
|
25/25 |
69d |
e6c2f594ed96
bpf: Silence a warning in btf_type_id_size()
|
WARNING: bad unlock balance in bpf
bpf
|
C |
done |
|
12 |
194d |
194d
|
25/25 |
69d |
4266f41feaee
bpf: Fix bad unlock balance on freeze_mutex
|
general protection fault in shash_ahash_update
crypto
|
C |
done |
done |
5 |
170d |
170d
|
25/25 |
69d |
b6d972f68983
crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
|
WARNING in blkdev_get_by_dev
block
|
C |
done |
|
45 |
168d |
172d
|
25/25 |
69d |
985958b8584c
block: fix wrong mode for blkdev_get_by_dev() from disk_scan_partitions()
|
BUG: sleeping function called from invalid context in ext4_update_super
ext4
|
|
|
|
1 |
183d |
179d
|
25/25 |
69d |
f451fd97dd2b
ext4: drop the call to ext4_error() from ext4_get_group_info()
|
BUG: sleeping function called from invalid context in __lock_sock_fast
net
|
|
|
|
2 |
166d |
166d
|
25/25 |
69d |
57fc0f1ceaa4
mptcp: ensure listener is unhashed before updating the sk status
|
inconsistent lock state in lru_gen_rotate_memcg
mm
|
C |
|
|
61 |
159d |
170d
|
25/25 |
69d |
814bc1de03ea
mm/mglru: make memcg_lru->lock irq safe
|
INFO: trying to register non-static key in skb_queue_tail
wireless
|
C |
unreliable |
done |
171 |
159d |
1262d
|
25/25 |
69d |
061b0cb9327b
wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
|
kernel BUG in ip6gre_header
net
|
C |
|
|
5 |
105d |
175d
|
25/25 |
69d |
9eed321cde22
net: lapbether: only support ethernet devices
|
WARNING in unreserve_psock
net
|
C |
done |
|
2816 |
168d |
176d
|
25/25 |
69d |
9f8d0dc0ec4a
kcm: Fix unnecessary psock unreservation.
|
WARNING in btrfs_split_ordered_extent
btrfs
|
C |
done |
|
5 |
177d |
198d
|
25/25 |
69d |
7833b865953c
btrfs: fix iomap_begin length for nocow writes
|
general protection fault in splice_to_socket
fs
|
C |
done |
|
4 |
174d |
177d
|
25/25 |
69d |
ca2d49f77ce4
splice, net: Fix splice_to_socket() to handle pipe bufs larger than a page
|
KASAN: null-ptr-deref Write in get_block (2)
fs
|
C |
error |
|
11 |
164d |
198d
|
25/25 |
69d |
ea2b62f30589
fs/sysv: Null check to prevent null-ptr-deref bug
|
WARNING: refcount bug in fib6_nh_init
net
|
C |
done |
|
45 |
168d |
174d
|
25/25 |
69d |
3515440df461
ipv6: also use netdev_hold() in ip6_route_check_nh()
|
WARNING in nilfs_btree_assign
nilfs
|
C |
error |
|
799 |
133d |
437d
|
25/25 |
69d |
679bd7ebdd31
nilfs2: fix buffer corruption due to concurrent device reads
|
linux-next test error: WARNING in register_net_sysctl
net
|
|
|
|
9 |
204d |
204d
|
25/25 |
69d |
e7480a44d7c4
Revert "net: Remove low_thresh in ip defrag"
|
general protection fault in shash_async_export
crypto
|
C |
done |
|
25 |
171d |
177d
|
25/25 |
69d |
b6d972f68983
crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
|
KMSAN: uninit-value in ath9k_wmi_ctrl_rx
wireless
|
C |
|
|
45 |
153d |
275d
|
25/25 |
69d |
f24292e82708
wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx
|
net-next test error: WARNING in register_net_sysctl
net
|
|
|
|
21 |
203d |
204d
|
25/25 |
69d |
e7480a44d7c4
Revert "net: Remove low_thresh in ip defrag"
|
general protection fault in nilfs_clear_dirty_page
nilfs
|
C |
done |
|
15 |
176d |
410d
|
25/25 |
69d |
782e53d0c144
nilfs2: prevent general protection fault in nilfs_clear_dirty_page()
|
INFO: task hung in btrfs_sync_file (2)
btrfs
|
C |
error |
|
5 |
192d |
188d
|
25/25 |
69d |
745806fb4554
btrfs: do not ASSERT() on duplicated global roots
|
KASAN: stack-out-of-bounds Read in skb_splice_from_iter
net
|
C |
done |
|
64 |
169d |
177d
|
25/25 |
69d |
5a6f6873606e
ip, ip6: Fix splice to raw and ping sockets
|
KCSAN: data-race in do_timer_create / do_timer_create (8)
kernel
|
|
|
|
9 |
198d |
229d
|
25/25 |
69d |
8ce8849dd1e7
posix-timers: Ensure timer ID search-loop limit is valid
|
possible deadlock in netlink_set_err
net
|
|
|
|
1 |
168d |
168d
|
25/25 |
69d |
8d61f926d420
netlink: fix potential deadlock in netlink_set_err()
|
possible deadlock in pie_timer (2)
net
|
|
|
|
2 |
166d |
167d
|
25/25 |
69d |
11b73313c124
sch_netem: fix issues in netem_change() vs get_dist_table()
|
WARNING in bpf_verifier_vlog
bpf
|
C |
inconclusive |
|
6 |
216d |
453d
|
25/25 |
69d |
cff36398bd4c
bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log
|
general protection fault in skb_queue_tail (3)
afs
|
C |
inconclusive |
done |
9 |
187d |
420d
|
25/25 |
69d |
061b0cb9327b
wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
|
KASAN: slab-out-of-bounds Read in taprio_dequeue_from_txq
net
|
syz |
error |
|
4 |
183d |
208d
|
25/25 |
69d |
be3618d96510
net/sched: taprio: fix slab-out-of-bounds Read in taprio_dequeue_from_txq
|
possible deadlock in scheduler_tick (2)
ntfs3
|
C |
|
|
10 |
184d |
200d
|
25/25 |
69d |
726ccdba1521
kasan,kmsan: remove __GFP_KSWAPD_RECLAIM usage from kasan/kmsan
|
WARNING in scm_recv
net
|
C |
done |
|
8 |
155d |
159d
|
25/25 |
69d |
603fc57ab70c
af_unix: Skip SCM_PIDFD if scm->pid is NULL.
|
general protection fault in cryptd_hash_export
crypto
|
C |
done |
done |
12 |
169d |
177d
|
25/25 |
69d |
b6d972f68983
crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
|
KASAN: stack-out-of-bounds Read in ipmr_ioctl
net
|
C |
done |
|
208 |
167d |
173d
|
25/25 |
69d |
634236b34d7a
net: remove sk_is_ipmr() and sk_is_icmpv6() helpers
|
general protection fault in crypto_shash_finup
crypto
|
C |
done |
|
6 |
170d |
177d
|
25/25 |
69d |
b6d972f68983
crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
|
possible deadlock in quotactl_fd
ext4
|
C |
error |
done |
141 |
159d |
239d
|
25/25 |
111d |
949f95ff39bf
ext4: fix lockdep warning when enabling MMP
|
possible deadlock in btrfs_search_slot
btrfs
|
C |
error |
done |
188 |
119d |
394d
|
25/25 |
118d |
b740d8061669
btrfs: free btrfs_path before copying root refs to userspace
|
WARNING in class_register
usb
|
C |
done |
|
10 |
250d |
249d
|
25/25 |
118d |
f326ea63ecc6
driver core: class: fix slab-use-after-free Read in class_register()
|
KASAN: use-after-free Write in j1939_sock_pending_del
can
|
syz |
done |
error |
17 |
1480d |
1492d
|
25/25 |
118d |
fd81ebfe7975
can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
|
BUG: soft lockup in addrconf_rs_timer (2)
net
|
C |
|
|
51 |
168d |
189d
|
25/25 |
155d |
cd2b8113c2e8
net/sched: fq_pie: ensure reasonable TCA_FQ_PIE_QUANTUM values
|
INFO: task hung in sync_inodes_sb (4)
nilfs
|
C |
done |
inconclusive |
345 |
156d |
1110d
|
25/25 |
155d |
92c5d1b860e9
nilfs2: reject devices with insufficient block count
|
riscv/fixes boot error: can't ssh into the instance (2)
|
|
|
|
109 |
182d |
188d
|
25/25 |
155d |
25abe0db9243
riscv: Fix kfence now that the linear mapping can be backed by PUD/P4D/PGD
|
KCSAN: data-race in dev_graft_qdisc / qdisc_lookup_rcu
net
|
|
|
|
1 |
194d |
194d
|
25/25 |
155d |
d636fc5dd692
net: sched: add rcu annotations around qdisc->qdisc_sleeping
|
kernel BUG in nilfs_btnode_create_block
nilfs
|
C |
|
|
8 |
201d |
408d
|
25/25 |
155d |
2f012f2baca1
nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key()
|
WARNING in nilfs_segctor_do_construct (2)
nilfs
|
C |
error |
|
3 |
207d |
205d
|
25/25 |
155d |
fee5eaecca86
nilfs2: fix possible out-of-bounds segment allocation in resize ioctl
|
divide error in damon_set_attrs
damon
|
|
|
|
2 |
182d |
194d
|
25/25 |
155d |
5ff6e2fff88e
mm/damon/core: fix divide error in damon_nr_accesses_to_accesses_bp()
|
general protection fault in vhost_work_queue
net
virtualization
kvm
|
|
|
|
1 |
195d |
190d
|
25/25 |
155d |
a284f09effea
vhost: Fix crash during early vhost_transport_send_pkt calls
|
KCSAN: data-race in inotify_handle_inode_event / inotify_remove_from_idr
fs
|
|
|
|
363 |
212d |
226d
|
24/25 |
158d |
c915d8f5918b
inotify: Avoid reporting event with invalid wd
|
WARNING in __ext4fs_dirhash
ext4
|
C |
done |
|
25 |
209d |
210d
|
24/25 |
158d |
4b3cb1d108bf
ext4: improve error handling from ext4_dirhash()
|
KCSAN: data-race in __es_find_extent_range / __es_find_extent_range (6)
ext4
|
|
|
|
4 |
236d |
226d
|
24/25 |
158d |
492888df0c7b
ext4: fix data races when using cached status extents
|
WARNING in ext4_iomap_overwrite_begin
ext4
|
|
|
|
1 |
235d |
231d
|
24/25 |
158d |
fa83c34e3e56
ext4: check iomap type only if ext4_iomap_begin() does not fail
|
possible deadlock in __mod_timer (2)
kernel
|
|
|
|
1 |
210d |
210d
|
24/25 |
158d |
eb799279fb1f
debugobjects: Don't wake up kswapd from fill_pool()
|
KASAN: user-memory-access Write in zram_slot_lock
block
reiserfs
|
C |
done |
|
3 |
198d |
198d
|
24/25 |
158d |
3eb96946f0be
block: make bio_check_eod work for zero sized devices
|
kernel BUG in btrfs_exclop_balance (2)
btrfs
|
C |
error |
|
8 |
184d |
286d
|
24/25 |
158d |
ac868bc9d136
btrfs: fix assertion of exclop condition when starting balance
|
KMSAN: uninit-value in htree_dirblock_to_tree
ext4
|
|
|
|
204 |
206d |
337d
|
24/25 |
158d |
4b3cb1d108bf
ext4: improve error handling from ext4_dirhash()
|
WARNING: locking bug in ext4_xattr_inode_iget
ext4
|
C |
error |
|
23 |
181d |
212d
|
24/25 |
158d |
2bc7e7c1a3bc
ext4: disallow ea_inodes with extended attributes
|
possible deadlock in ext4_xattr_get
ext4
|
C |
inconclusive |
|
3 |
213d |
486d
|
24/25 |
158d |
b3e6bcb94590
ext4: add EA_INODE checking to ext4_iget()
|
WARNING in dlfb_submit_urb/usb_submit_urb (2)
fbdev
usb
|
C |
|
|
2 |
206d |
202d
|
24/25 |
158d |
ed9de4ed3987
fbdev: udlfb: Fix endpoint check
|
KASAN: slab-use-after-free Read in hci_conn_del
bluetooth
|
|
|
|
7 |
195d |
218d
|
24/25 |
158d |
ca1fd42e7dbf
Bluetooth: Fix potential double free caused by hci_conn_unlink
|
INFO: task hung in __sync_dirty_buffer
ext4
|
C |
inconclusive |
error |
832 |
177d |
826d
|
24/25 |
158d |
f4ce24f54d9c
ext4: fix deadlock when converting an inline directory in nojournal mode
|
KCSAN: data-race in do_recvmmsg / do_recvmmsg (2)
net
|
|
|
|
1 |
238d |
212d
|
24/25 |
158d |
e05a5f510f26
net: annotate sk->sk_err write from do_recvmmsg()
|
upstream boot error: BUG: unable to handle kernel NULL pointer dereference in load_balance
kernel
|
|
|
|
5 |
209d |
215d
|
24/25 |
158d |
2b951b0efbaa
ARM: 9297/1: vfp: avoid unbalanced stack on 'success' return path
|
possible deadlock in ext4_multi_mount_protect
ext4
|
C |
|
|
584 |
158d |
243d
|
24/25 |
158d |
949f95ff39bf
ext4: fix lockdep warning when enabling MMP
|
general protection fault in __aria_aesni_avx_gfni_crypt_16way
crypto
|
C |
|
|
49 |
195d |
212d
|
24/25 |
158d |
6ab39f99927e
crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
|
WARNING: locking bug in ext4_xattr_inode_update_ref
ext4
|
C |
error |
|
4 |
202d |
329d
|
24/25 |
158d |
b928dfdcb27d
ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find()
|
KCSAN: data-race in tcp_disconnect / tcp_poll (7)
net
|
|
|
|
2 |
234d |
212d
|
24/25 |
158d |
e14cadfd80d7
tcp: add annotations around sk->sk_shutdown accesses
|
possible deadlock in ext4_setattr
ext4
|
C |
done |
|
7 |
207d |
326d
|
24/25 |
158d |
b3e6bcb94590
ext4: add EA_INODE checking to ext4_iget()
|
general protection fault in gfs2_evict_inode (2)
gfs2
|
C |
error |
done |
134 |
207d |
527d
|
24/25 |
158d |
504a10d9e46b
gfs2: Don't deref jdesc in evict
|
WARNING in usbtmc_ioctl/usb_submit_urb (2)
usb
|
C |
done |
|
3 |
219d |
231d
|
24/25 |
158d |
94d25e912898
USB: usbtmc: Fix direction for 0-length ioctl control messages
|
possible deadlock in do_writepages
fs
mm
|
|
|
|
15 |
223d |
226d
|
24/25 |
158d |
00d873c17e29
ext4: avoid deadlock in fs reclaim with page writeback
|
KASAN: slab-use-after-free Write in nilfs_inode_sub_blocks
nilfs
|
|
|
|
4 |
205d |
209d
|
24/25 |
158d |
9b5a04ac3ad9
nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()
|
KASAN: slab-use-after-free Read in nilfs_load_inode_block
nilfs
|
C |
error |
|
18 |
160d |
213d
|
24/25 |
158d |
9b5a04ac3ad9
nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()
|
KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size
ext4
|
C |
|
|
21 |
213d |
251d
|
24/25 |
158d |
2220eaf90992
ext4: add bounds checking in get_max_inline_xattr_value_size()
|
KASAN: slab-out-of-bounds Read in ext4_group_desc_csum
ext4
|
C |
error |
|
26 |
206d |
307d
|
24/25 |
158d |
4f04351888a8
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
|
kernel BUG in ext4_get_group_info
ext4
|
C |
error |
|
237 |
206d |
839d
|
24/25 |
158d |
5354b2af3406
ext4: allow ext4_get_group_info() to fail
463808f237cf
ext4: remove a BUG_ON in ext4_mb_release_group_pa()
|
WARNING in ext4_xattr_block_set (2)
ext4
|
C |
error |
|
32 |
208d |
273d
|
24/25 |
158d |
a44be64bbecb
ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled
|
kernel BUG in nsh_gso_segment
net
|
|
|
|
1 |
224d |
210d
|
24/25 |
158d |
c83b49383b59
net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
|
WARNING in kvfree (2)
ext4
|
C |
|
|
47 |
214d |
266d
|
24/25 |
158d |
b87c7cdf2bed
ext4: fix invalid free tracking in ext4_xattr_move_to_block()
|
possible deadlock in sco_conn_del
bluetooth
|
C |
done |
done |
279 |
204d |
608d
|
24/25 |
158d |
a2ac591cb4d8
Bluetooth: Fix UAF in hci_conn_hash_flush again
|
general protection fault in __sk_mem_raise_allocated
net
|
|
|
|
1 |
203d |
198d
|
24/25 |
158d |
ad42a35bdfc6
udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().
|
KMSAN: uninit-value in xfrm_state_find
net
|
C |
error |
done |
215 |
201d |
2000d
|
24/25 |
158d |
3d776e31c841
xfrm: Reject optional tunnel/BEET mode templates in outbound policies
|
kernel BUG in workingset_activation (2)
kernel
|
C |
inconclusive |
done |
40 |
194d |
386d
|
24/25 |
158d |
0143d148d1e8
usb: usbfs: Enforce page requirements for mmap
|
KMSAN: uninit-value in vlan_dev_hard_start_xmit (2)
net
|
|
|
|
1 |
234d |
233d
|
24/25 |
158d |
dacab578c7c6
vlan: fix a potential uninit-value in vlan_dev_hard_start_xmit()
|
memory leak in class_create
usb
|
C |
|
|
9 |
201d |
219d
|
24/25 |
158d |
ddaf098ea779
driver core: class: properly reference count class_dev_iter()
|
memory leak in ext4_expand_extra_isize_ea
ext4
|
C |
|
|
2 |
212d |
280d
|
24/25 |
158d |
b87c7cdf2bed
ext4: fix invalid free tracking in ext4_xattr_move_to_block()
|
divide error in tcp_rcv_space_adjust (2)
net
|
|
|
|
1 |
248d |
248d
|
24/25 |
158d |
4faeee0cf8a5
tcp: deny tcp_disconnect() when threads are waiting
|
possible deadlock in ext4_xattr_inode_iget
ext4
|
C |
done |
|
351 |
167d |
325d
|
24/25 |
158d |
aff3bea95388
ext4: add lockdep annotations for i_data_sem for ea_inode's
|
general protection fault in soft_cursor
fbdev
|
C |
|
|
3 |
193d |
193d
|
24/25 |
158d |
d78bd6cc6827
fbcon: Fix null-ptr-deref in soft_cursor
|
KASAN: slab-out-of-bounds Read in xfs_getbmap
xfs
|
C |
done |
|
5 |
218d |
219d
|
24/25 |
158d |
1bba82fe1afa
xfs: fix negative array access in xfs_getbmap
|
KCSAN: data-race in sk_stream_wait_connect / tcp_disconnect (2)
net
|
|
|
|
1 |
243d |
212d
|
24/25 |
158d |
d0ac89f6f987
net: deal with most data-races in sk_wait_event()
|
kernel BUG in btrfs_csum_one_bio
btrfs
|
C |
done |
|
4 |
237d |
315d
|
24/25 |
158d |
806570c0bb7b
btrfs: handle memory allocation failure in btrfs_csum_one_bio
|
kernel BUG in btrfs_ioctl_add_dev
btrfs
|
C |
error |
done |
46 |
213d |
289d
|
24/25 |
158d |
ac868bc9d136
btrfs: fix assertion of exclop condition when starting balance
|
general protection fault in erofs_bread (2)
erofs
|
C |
done |
|
7 |
193d |
203d
|
24/25 |
158d |
0a17567b4a85
erofs: fix null-ptr-deref caused by erofs_xattr_prefixes_init
erofs: fix null-ptr-deref caused by erofs_xattr_prefixes_init
|
possible deadlock in ext4_xattr_set_handle (3)
ext4
|
C |
|
|
451 |
158d |
316d
|
24/25 |
158d |
b3e6bcb94590
ext4: add EA_INODE checking to ext4_iget()
|
KCSAN: data-race in __netlink_dump_start / netlink_recvmsg (5)
net
|
|
|
|
2 |
241d |
212d
|
24/25 |
158d |
a939d14919b7
netlink: annotate accesses to nlk->cb_running
|
KASAN: slab-use-after-free Read in hci_conn_hash_flush
bluetooth
|
C |
error |
|
3511 |
184d |
277d
|
24/25 |
158d |
a2ac591cb4d8
Bluetooth: Fix UAF in hci_conn_hash_flush again
ca1fd42e7dbf
Bluetooth: Fix potential double free caused by hci_conn_unlink
|
kernel BUG in page_table_check_clear
mm
|
C |
error |
|
17 |
183d |
216d
|
24/25 |
158d |
44d0fb387b53
mm: page_table_check: Ensure user pages are not slab pages
0143d148d1e8
usb: usbfs: Enforce page requirements for mmap
|
memory leak in hwsim_new_radio_nl
wireless
|
C |
|
|
1 |
209d |
208d
|
24/25 |
158d |
098abbd48ec1
mac80211_hwsim: fix memory leak in hwsim_new_radio_nl
|
WARNING in mb_find_extent
ext4
|
C |
error |
error |
135 |
300d |
341d
|
24/25 |
158d |
fa08a7b61dff
ext4: fix WARNING in mb_find_extent
|
kernel BUG in vmf_insert_pfn_prot
|
C |
done |
done |
1933 |
206d |
810d
|
24/25 |
175d |
a5b44c4adb16
drm/fbdev-generic: Always use shadow buffering
|
WARNING in __usbnet_read_cmd/usb_submit_urb
usb
|
C |
error |
|
5 |
303d |
334d
|
24/25 |
177d |
93fd565919cf
net: USB: Fix wrong-direction WARNING in plusb.c
net: USB: Fix wrong-direction WARNING in plusb.c
|
WARNING in iomap_iter
iomap
|
C |
inconclusive |
|
141 |
331d |
758d
|
24/25 |
177d |
6acd87d50998
erofs/zmap.c: Fix incorrect offset calculation
c490a0b5a4f3
loop: Check for overflow while configuring loop
|
KASAN: slab-out-of-bounds Write in udf_find_entry
udf
|
C |
error |
|
19 |
391d |
422d
|
24/25 |
177d |
c8af247de385
udf: Fix a slab-out-of-bounds write bug in udf_find_entry()
1c80afa04db3
udf: Implement searching for directory entry using new iteration code
|
memory leak in tcf_pedit_init
net
|
C |
|
|
1 |
221d |
221d
|
24/25 |
181d |
1b483d9f5805
net/sched: act_pedit: free pedit keys on bail from offset check
|
INFO: trying to register non-static key in rxe_cleanup_task (2)
rdma
|
|
|
|
148 |
215d |
281d
|
24/25 |
181d |
b2b1ddc45745
RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
|
KMSAN: kernel-infoleak in iommufd_vfio_ioctl
iommu
|
C |
|
|
15 |
283d |
296d
|
24/25 |
181d |
b3551ead6163
iommufd: Make sure to zero vfio_iommu_type1_info before copying to user
|
KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (12)
net
|
|
|
|
3 |
274d |
273d
|
24/25 |
181d |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
KASAN: wild-memory-access Write in v9fs_get_acl
v9fs
|
C |
|
|
7 |
240d |
274d
|
24/25 |
181d |
707823e7f22f
9P FS: Fix wild-memory-access write in v9fs_get_acl
|
WARNING: stack going in the wrong direction? at do_syscall_64
kernel
|
|
|
|
193 |
287d |
294d
|
24/25 |
181d |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
WARNING in sisusb_send_bulk_msg/usb_submit_urb
usb
|
C |
unreliable |
|
418 |
232d |
1618d
|
24/25 |
181d |
df05a9b05e46
USB: sisusbvga: Add endpoint checks
|
general protection fault in pause_prepare_data
net
|
C |
error |
|
34 |
315d |
316d
|
24/25 |
181d |
f5be9caf7bf0
net: ethtool: fix NULL pointer dereference in pause_prepare_data()
|
KASAN: slab-use-after-free Read in nilfs_segctor_thread
nilfs
|
|
|
|
1 |
260d |
254d
|
24/25 |
181d |
6be49d100c22
nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()
|
WARNING in udf_expand_dir_adinicb
udf
|
C |
done |
|
2 |
304d |
300d
|
24/25 |
181d |
df97f64dfa31
udf: Avoid directory type conversion failure due to ENOMEM
|
memory leak in vfs_tmpfile_open
overlayfs
|
C |
|
|
14 |
318d |
419d
|
24/25 |
181d |
baabaa505563
ovl: fix tmpfile leak
|
WARNING: stack going in the wrong direction? at finish_task_switch.isra.NUM
kernel
|
|
|
|
2 |
289d |
291d
|
24/25 |
181d |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
WARNING in io_get_cqe_overflow
io-uring
|
|
|
|
1 |
318d |
317d
|
24/25 |
181d |
e12d7a46f65a
io_uring/msg_ring: fix missing lock on overflow for IOPOLL
|
kernel BUG in find_mergeable_anon_vma
mm
|
C |
error |
|
4 |
277d |
273d
|
24/25 |
181d |
3dd443254941
mm: enable maple tree RCU mode by default
|
unregister_netdevice: waiting for DEV to become free (7)
|
C |
inconclusive |
|
20422 |
181d |
383d
|
24/25 |
181d |
266e9b3475ba
RDMA/siw: Remove namespace check from siw_netdev_event()
|
possible deadlock in nilfs_evict_inode
nilfs
|
|
|
|
5 |
261d |
279d
|
24/25 |
181d |
42560f9c92cc
nilfs2: fix sysfs interface lifetime
|
UBSAN: shift-out-of-bounds in fbcon_set_font
fbdev
|
C |
error |
|
3 |
311d |
311d
|
24/25 |
181d |
2b09d5d36498
fbcon: Check font dimension limits
|
KASAN: use-after-free Write in gadgetfs_kill_sb
usb
|
C |
error |
|
5 |
324d |
358d
|
24/25 |
181d |
d18dcfe9860e
USB: gadgetfs: Fix race between mounting and unmounting
|
BUG: unable to handle kernel paging request in __alloc_skb
net
|
|
|
|
1 |
372d |
372d
|
24/25 |
181d |
031af50045ea
arm64: cmpxchg_double*: hazard against entire exchange variable
|
possible deadlock in jbd2_log_wait_commit
ext4
|
C |
done |
|
429 |
257d |
281d
|
24/25 |
181d |
3c92792da850
ext4: Fix deadlock during directory rename
|
possible deadlock in static_key_slow_inc (2)
cgroups
|
C |
error |
|
32622 |
181d |
399d
|
24/25 |
181d |
57dcd64c7e03
cgroup,freezer: hold cpu_hotplug_lock before freezer_mutex
|
INFO: task hung in rfcomm_process_sessions (2)
bluetooth
|
C |
error |
done |
14 |
343d |
616d
|
24/25 |
181d |
1d80d57ffcb5
Bluetooth: Fix possible deadlock in rfcomm_sk_state_change
|
WARNING: proc registration bug in clusterip_tg_check (3)
netfilter
|
C |
done |
inconclusive |
9 |
320d |
854d
|
24/25 |
181d |
9db5d918e2c0
netfilter: ip_tables: remove clusterip target
|
KASAN: use-after-free Write in nr_release
hams
|
C |
done |
error |
1784 |
195d |
1468d
|
24/25 |
181d |
611792920925
netrom: Fix use-after-free caused by accept on already connected socket
|
KASAN: use-after-free Read in do_csum
net
|
C |
|
|
72 |
183d |
349d
|
24/25 |
181d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
KCSAN: data-race in rxrpc_send_data / rxrpc_set_call_completion
afs
net
|
|
|
|
2 |
247d |
226d
|
24/25 |
181d |
2b5fdc0f5caa
rxrpc: Fix potential data race in rxrpc_wait_to_be_connected()
|
WARNING in ext4_update_inline_data
ext4
|
C |
error |
|
21 |
277d |
341d
|
24/25 |
181d |
2b96b4a5d944
ext4: fix WARNING in ext4_update_inline_data
|
KMSAN: uninit-value in ethnl_set_linkmodes (2)
net
|
C |
|
|
40 |
214d |
520d
|
24/25 |
181d |
9ad685dbfe7e
ethtool: Fix uninitialized number of lanes
|
KCSAN: data-race in __neigh_event_send / neigh_resolve_output (7)
net
|
|
|
|
43 |
239d |
212d
|
24/25 |
181d |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
general protection fault in free_percpu (2)
wireless
|
|
|
|
1 |
327d |
327d
|
24/25 |
181d |
80f8a66dede0
Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"
|
KASAN: null-ptr-deref Read in ida_free (3)
fs
|
C |
error |
|
4 |
255d |
252d
|
24/25 |
181d |
cb2239c198ad
fs: drop peer group ids under namespace lock
|
possible deadlock in ext4_bmap
ext4
|
C |
error |
|
78083 |
181d |
485d
|
24/25 |
181d |
62913ae96de7
ext4, jbd2: add an optimized bmap for the journal inode
|
WARNING in put_pmu_ctx
perf
|
C |
error |
|
66 |
298d |
352d
|
24/25 |
181d |
4f64a6c9f6f1
perf: Fix perf_event_pmu_context serialization
|
WARNING in htb_destroy
net
|
C |
done |
|
2 |
299d |
299d
|
24/25 |
181d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
KASAN: use-after-free Read in xfs_btree_lookup_get_block
xfs
|
C |
error |
done |
7 |
245d |
342d
|
24/25 |
181d |
22ed903eee23
xfs: verify buffer contents when we skip log replay
|
general protection fault in ethnl_set_plca_cfg
net
|
C |
done |
|
37 |
324d |
325d
|
24/25 |
181d |
28dbf774bc87
plca.c: fix obvious mistake in checking retval
|
KMSAN: uninit-value in nilfs_add_checksums_on_logs
nilfs
|
|
|
|
1079 |
181d |
275d
|
24/25 |
181d |
7397031622e0
nilfs2: initialize "struct nilfs_binfo_dat"->bi_pad field
ef832747a82d
nilfs2: initialize unused bytes in segment summary blocks
|
memory leak in tcindex_set_parms (3)
net
|
C |
|
|
1 |
369d |
365d
|
24/25 |
181d |
8c710f75256b
net/sched: Retire tcindex classifier
|
WARNING in hfsplus_cat_write_inode
hfs
|
C |
error |
|
141 |
209d |
375d
|
24/25 |
181d |
81b21c0f0138
fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode()
|
INFO: rcu detected stall in ext4_file_write_iter (6)
ext4
|
C |
error |
|
8 |
238d |
301d
|
24/25 |
181d |
d125d1349abe
alarmtimer: Prevent starvation by small intervals and SIG_IGN
|
KASAN: null-ptr-deref Write in udf_write_fi
udf
|
C |
inconclusive |
done |
51 |
313d |
436d
|
24/25 |
181d |
e9109a92d2a9
udf: Convert udf_rename() to new directory iteration code
|
WARNING in c_start (2)
kernel
|
|
|
|
616173 |
254d |
272d
|
24/25 |
181d |
e7304080e0e5
cpumask: relax sanity checking constraints
|
KCSAN: data-race in __neigh_update / neigh_resolve_output
net
|
|
|
|
1 |
245d |
212d
|
24/25 |
181d |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
WARNING in hfs_write_inode
hfs
|
C |
done |
|
3 |
338d |
336d
|
24/25 |
181d |
cb7a95af78d2
hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling
|
KASAN: slab-out-of-bounds Read in __xfs_xattr_put_listent
xfs
|
|
|
|
12 |
295d |
299d
|
24/25 |
181d |
dd07bb8b6baf
xfs: revert commit 8954c44ff477
|
INFO: task hung in tcindex_partial_destroy_work
|
C |
done |
unreliable |
84 |
1028d |
1164d
|
24/25 |
181d |
8c710f75256b
net/sched: Retire tcindex classifier
|
general protection fault in nl802154_trigger_scan
wpan
|
C |
error |
|
31 |
259d |
278d
|
24/25 |
181d |
02f18662f6c6
ieee802154: Prevent user from crashing the host
|
BUG: unable to handle kernel NULL pointer dereference in __build_skb_around
bpf
net
|
C |
done |
|
29 |
261d |
266d
|
24/25 |
181d |
e5995bc7e2ba
bpf, test_run: fix crashes due to XDP frame overwriting/corruption
|
KASAN: null-ptr-deref Read in filemap_fault
mm
udf
|
C |
done |
|
112 |
209d |
222d
|
24/25 |
181d |
38a55db9877c
filemap: Handle error return from __filemap_get_folio()
|
WARNING in udf_free_inode
udf
|
C |
error |
|
19 |
292d |
426d
|
24/25 |
181d |
85a37983ec69
udf: Detect system inodes linked into directory hierarchy
|
INFO: task hung in do_user_addr_fault (3)
ntfs3
|
C |
|
|
32 |
264d |
339d
|
24/25 |
181d |
0226635c304c
fs/ntfs3: don't hold ni_lock when calling truncate_setsize()
|
general protection fault in virtio_transport_purge_skbs
net
|
C |
done |
|
3 |
258d |
258d
|
24/25 |
181d |
b465518dc27d
vsock/loopback: use only sk_buff_head.lock to protect the packet queue
|
WARNING in do_symlinkat
ntfs3
|
C |
error |
done |
66 |
185d |
349d
|
24/25 |
181d |
267a36ba30a7
fs/ntfs3: Remove noacsrules
|
KASAN: use-after-free Read in ext4_find_extent (2)
ext4
|
C |
error |
|
2 |
216d |
340d
|
24/25 |
181d |
835659598c67
ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline
|
general protection fault in nilfs_btree_insert
nilfs
|
C |
error |
|
2 |
346d |
343d
|
24/25 |
181d |
7633355e5c7f
nilfs2: fix general protection fault in nilfs_btree_insert()
|
KASAN: slab-out-of-bounds Write in copy_array (2)
bpf
|
|
|
|
108 |
181d |
210d
|
24/25 |
181d |
45435d8da71f
bpf: Always use maximal size for copy_array()
|
WARNING: stack going in the wrong direction? at __sys_setsockopt
net
|
|
|
|
6 |
288d |
293d
|
24/25 |
181d |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
KMSAN: uninit-value in ondemand_readahead
fs
mm
|
C |
|
|
221 |
279d |
442d
|
24/25 |
181d |
3e35102666f8
fs/cramfs/inode.c: initialize file_ra_state
|
upstream test error: unregister_netdevice: waiting for DEV to become free
net
|
|
|
|
204 |
293d |
300d
|
24/25 |
181d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
KMSAN: uninit-value in longest_match
btrfs
|
|
|
|
4 |
357d |
362d
|
24/25 |
181d |
eadd7deca0ad
btrfs: zlib: zero-initialize zlib workspace
|
WARNING in j1939_session_deactivate_activate_next
can
|
C |
error |
done |
502 |
246d |
652d
|
24/25 |
181d |
d0553680f94c
can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
|
WARNING in net_free
net
|
|
|
|
1 |
234d |
234d
|
24/25 |
181d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
WARNING: fbcon: Driver 'vkmsdrmfb' missed to adjust virtual screen size (0x0 vs. 64x768)
|
C |
unreliable |
error |
24 |
514d |
513d
|
24/25 |
181d |
1935f0deb611
drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var
|
WARNING in cleanup_net (2)
net
|
C |
error |
|
72 |
216d |
243d
|
24/25 |
181d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
KASAN: use-after-free Read in cfusbl_device_notify
net
|
C |
done |
|
341 |
273d |
420d
|
24/25 |
181d |
9781e98a9711
net: caif: Fix use-after-free in cfusbl_device_notify()
|
KMSAN: uninit-value in kalmia_send_init_packet
usb
|
C |
|
|
2 |
310d |
309d
|
24/25 |
181d |
c68f345b7c42
net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
|
general protection fault in taprio_dequeue
net
|
|
|
|
1 |
340d |
340d
|
24/25 |
181d |
3a415d59c1db
net/sched: sch_taprio: fix possible use-after-free
|
WARNING in ip6erspan_tunnel_xmit (2)
net
|
C |
unreliable |
|
5 |
261d |
261d
|
24/25 |
181d |
8e50ed774554
erspan: do not use skb_mac_header() in ndo_start_xmit()
|
KMSAN: uninit-value in qrtr_tx_resume
arm-msm
net
|
C |
|
|
8 |
254d |
315d
|
24/25 |
181d |
6417070918de
net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()
|
general protection fault in __d_add
ntfs3
|
C |
error |
|
16 |
367d |
422d
|
24/25 |
181d |
254e69f284d7
fs/ntfs3: Fix null-ptr-deref on inode->i_op in ntfs_lookup()
|
INFO: task hung in tls_sw_sendpage (3)
net
|
|
|
|
30 |
285d |
282d
|
24/25 |
181d |
f3221361dc85
net: tls: avoid hanging tasks on the tx_lock
|
WARNING in pegasus_open/usb_submit_urb
usb
input
|
C |
|
|
7 |
262d |
1272d
|
24/25 |
181d |
b3d80fd27a3c
Input: pegasus-notetaker - check pipe type when probing
|
WARNING: locking bug in umh_complete
kernel
|
|
|
|
1 |
318d |
314d
|
24/25 |
181d |
eedeb787ebb5
freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL
|
possible deadlock in j1939_sk_errqueue
can
|
C |
unreliable |
|
227 |
252d |
789d
|
24/25 |
181d |
d1366b283d94
can: j1939: prevent deadlock by moving j1939_sk_errqueue()
|
KASAN: use-after-free Read in __update_extent_tree_range
f2fs
|
C |
done |
|
9 |
293d |
340d
|
24/25 |
181d |
a46bebd502fe
f2fs: synchronize atomic write aborts
|
WARNING in nla_get_range_unsigned (2)
net
|
C |
done |
|
433 |
257d |
292d
|
24/25 |
181d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
KASAN: slab-out-of-bounds Read in indx_insert_into_buffer
ntfs3
|
C |
error |
|
2 |
367d |
366d
|
24/25 |
181d |
b8c44949044e
fs/ntfs3: Fix OOB read in indx_insert_into_buffer
|
WARNING: kmalloc bug in btrfs_ioctl_send
btrfs
|
C |
done |
|
53 |
302d |
372d
|
24/25 |
181d |
33e17b3f5ab7
btrfs: send: limit number of clones and allocated memory size
|
WARNING in shark_write_reg/usb_submit_urb
usb
|
C |
error |
|
63 |
230d |
1604d
|
24/25 |
181d |
76e31045ba03
media: radio-shark: Add endpoint checks
|
BUG: unable to handle kernel paging request in atm_tc_destroy
net
|
C |
error |
|
3 |
300d |
299d
|
24/25 |
181d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
kernel BUG in ip_frag_next
net
|
C |
done |
|
9 |
315d |
322d
|
24/25 |
181d |
f72ff8b81ebc
net: fix kfree_skb_list use of skb_mark_not_on_list
|
WARNING in xfs_qm_dqget_cache_insert
xfs
|
C |
error |
|
123 |
207d |
379d
|
24/25 |
181d |
4b827b3f305d
xfs: remove WARN when dquot cache insertion fails
|
KMSAN: kernel-infoleak in _copy_to_iter (8)
mm
|
C |
|
|
21180 |
181d |
275d
|
24/25 |
181d |
8222d5910dae
xfrm: Zero padding when dumping algos and encap
|
WARNING in io_cqring_event_overflow
io-uring
|
C |
|
|
7 |
321d |
328d
|
24/25 |
181d |
544d163d659d
io_uring: lock overflowing for IOPOLL
|
net test error: WARNING: suspicious RCU usage in veth_set_xdp_features
net
|
|
|
|
24 |
266d |
268d
|
24/25 |
181d |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
riscv/fixes boot error: WARNING in __apply_to_page_range (2)
bpf
|
|
|
|
5 |
288d |
350d
|
24/25 |
181d |
96f9d4daf745
riscv: Rework kasan population functions
|
linux-next test error: WARNING: suspicious RCU usage in veth_set_xdp_features
net
|
|
|
|
12 |
266d |
267d
|
24/25 |
181d |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
KCSAN: data-race in netlink_getname / netlink_insert (4)
net
|
|
|
|
2 |
316d |
321d
|
24/25 |
181d |
c1bb9484e3b0
netlink: annotate data races around nlk->portid
|
WARNING: locking bug in inet_autobind
net
|
C |
done |
error |
103 |
342d |
1665d
|
24/25 |
181d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
UBSAN: array-index-out-of-bounds in qfq_update_agg (4)
net
|
|
|
|
1 |
232d |
232d
|
24/25 |
181d |
3037933448f6
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
|
WARNING in rmqueue
erofs
|
C |
error |
|
2 |
249d |
372d
|
24/25 |
181d |
cc4efd3dd2ac
erofs: stop parsing non-compact HEAD index if clusterofs is invalid
|
KMSAN: kernel-infoleak in nilfs_ioctl_wrap_copy
nilfs
|
|
|
|
4 |
248d |
275d
|
24/25 |
181d |
003587000276
nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy()
|
KMSAN: uninit-value in raw_sock_get
net
|
|
|
|
1 |
241d |
239d
|
24/25 |
181d |
0a78cf7264d2
raw: Fix NULL deref in raw_get_next().
|
BUG: scheduling while atomic in msleep
net
|
C |
done |
|
40 |
314d |
323d
|
24/25 |
181d |
ea4fdbaa2f77
net/sched: sch_taprio: do not schedule in taprio_reset()
|
WARNING in __dev_queue_xmit (2)
net
|
C |
|
|
76 |
213d |
285d
|
24/25 |
181d |
693aa2c0d9b6
ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping()
|
memory leak in ath9k_hif_usb_rx_cb
wireless
|
C |
|
|
1 |
356d |
352d
|
24/25 |
181d |
0af54343a762
wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails
|
kernel BUG in icmp_glue_bits
net
|
|
|
|
2 |
187d |
251d
|
24/25 |
181d |
7d63b6712538
icmp: guard against too small mtu
|
general protection fault in bpf_struct_ops_link_create
bpf
net
|
C |
done |
|
17 |
255d |
257d
|
24/25 |
181d |
55fbae05476d
bpf: Check IS_ERR for the bpf_map_get() return value
|
WARNING: can't access registers at entry_SYSCALL_64_after_hwframe
|
C |
|
|
15 |
288d |
293d
|
24/25 |
181d |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
INFO: task hung in find_inode_fast
ext4
|
C |
error |
|
28 |
183d |
332d
|
24/25 |
181d |
0f7bfd6f8164
ext4: fix task hung in ext4_xattr_delete_inode
|
memory leak in io_submit_sqes (4)
io-uring
|
C |
|
|
1 |
332d |
331d
|
24/25 |
181d |
febb985c06cb
io_uring/poll: add hash if ready poll request can't complete inline
|
WARNING in hfsplus_cat_read_inode
hfs
|
C |
error |
|
599 |
205d |
370d
|
24/25 |
181d |
81b21c0f0138
fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode()
|
KASAN: slab-out-of-bounds Read in udf_get_filelongad
udf
|
C |
|
|
2 |
360d |
359d
|
24/25 |
181d |
53cafe1d6d8e
udf: Do not bother merging very long extents
|
BUG: unable to handle kernel NULL pointer dereference in ni_write_inode
ntfs3
|
C |
error |
|
596 |
207d |
439d
|
24/25 |
181d |
8dae4f6341e3
fs/ntfs3: Fix NULL dereference in ni_write_inode
db2a3cc6a348
fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode'
|
KASAN: use-after-free Read in put_pmu_ctx
perf
|
C |
|
|
51 |
335d |
352d
|
24/25 |
181d |
a551844e345b
perf: Fix use-after-free in error path
|
KASAN: stack-out-of-bounds Read in proc_pid_stack
riscv
|
|
|
|
3 |
184d |
218d
|
24/25 |
181d |
76950340cf03
riscv: Use READ_ONCE_NOCHECK in imprecise unwinding stack mode
|
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table
bridge
netfilter
|
C |
error |
|
4 |
291d |
292d
|
24/25 |
181d |
e58a171d35e3
netfilter: ebtables: fix table blob use-after-free
|
WARNING: refcount bug in qrtr_recvmsg (2)
net
arm-msm
|
C |
error |
|
2 |
265d |
259d
|
24/25 |
181d |
44d807320000
net: qrtr: Fix a refcount bug in qrtr_recvmsg()
|
WARNING in remove_proc_entry (5)
scsi
|
C |
|
|
158 |
264d |
306d
|
24/25 |
181d |
2172e84ea00b
SUNRPC: Fix occasional warning when destroying gss_krb5_enctypes
|
possible deadlock in __jbd2_log_wait_for_space
ext4
|
C |
error |
|
34993 |
237d |
485d
|
24/25 |
181d |
62913ae96de7
ext4, jbd2: add an optimized bmap for the journal inode
|
WARNING in split_huge_page_to_list (2)
mm
|
C |
error |
|
2334 |
206d |
470d
|
24/25 |
181d |
4737edbbdd49
mm/huge_memory.c: warn with pr_warn_ratelimited instead of VM_WARN_ON_ONCE_FOLIO
|
KASAN: slab-use-after-free Read in mas_next_entry
mm
|
syz |
error |
|
3 |
243d |
246d
|
24/25 |
181d |
f4e9e0e69468
mm/mempolicy: fix use-after-free of VMA iterator
|
UBSAN: shift-out-of-bounds in blkstol2
jfs
|
C |
error |
|
2 |
400d |
400d
|
24/25 |
181d |
fad376fce0af
fs/jfs: fix shift exponent db_agl2size negative
|
WARNING in sock_map_del_link
bpf
net
|
|
|
|
91 |
237d |
237d
|
24/25 |
181d |
8c5c2a4898e3
bpf, sockmap: Revert buggy deadlock fix in the sockhash and sockmap
|
WARNING in nilfs_dat_prepare_end
nilfs
|
C |
error |
|
288 |
275d |
429d
|
24/25 |
181d |
5124a0a54985
nilfs2: replace WARN_ONs for invalid DAT metadata block requests
|
general protection fault in cache_first_page
squashfs
|
C |
error |
|
4 |
321d |
334d
|
24/25 |
181d |
f65c4bbbd682
Squashfs: fix handling and sanity checking of xattr_ids count
72e544b1b283
squashfs: harden sanity check in squashfs_read_xattr_id_table
|
general protection fault in jhash
wireless
|
C |
done |
done |
15 |
230d |
249d
|
24/25 |
181d |
2bef4d1fb8b3
wifi: mac80211_hwsim: fix potential NULL deref in hwsim_pmsr_report_nl()
|
general protection fault in mark_buffer_dirty_inode (2)
udf
|
C |
|
|
32 |
214d |
372d
|
24/25 |
181d |
e9109a92d2a9
udf: Convert udf_rename() to new directory iteration code
|
WARNING in blkdev_put (2)
block
|
C |
unreliable |
|
250 |
257d |
285d
|
24/25 |
181d |
428913bce1e6
block: fix wrong mode for blkdev_put() from disk_scan_partitions()
|
WARNING: refcount bug in nr_release (4)
hams
|
C |
|
|
24 |
296d |
600d
|
24/25 |
181d |
409db27e3a2e
netrom: Fix use-after-free of a listening socket.
|
KASAN: use-after-free Read in hfsplus_release_folio
hfs
|
C |
error |
|
23 |
279d |
354d
|
24/25 |
181d |
07db5e247ab5
fs: hfsplus: fix UAF issue in hfsplus_put_super
|
net-next boot error: BUG: bad usercopy in qrtr_sendmsg
hardening
mm
|
|
|
|
30 |
300d |
301d
|
24/25 |
181d |
0b34d68049b0
net: enable usercopy for skb_small_head_cache
|
memory leak in __proc_create
usb
scsi
|
syz |
|
|
1 |
274d |
274d
|
24/25 |
181d |
be03df3d4bfe
scsi: core: Fix a procfs host directory removal regression
|
KASAN: use-after-free Read in ovs_vport_locate
openvswitch
|
|
|
|
1 |
356d |
351d
|
24/25 |
181d |
95637d91fefd
net: openvswitch: release vport resources on failure
|
general protection fault in pn533_out_complete
nfc
|
C |
error |
|
15 |
312d |
326d
|
24/25 |
181d |
484b7059796e
nfc: pn533: initialize struct pn533_out_arg properly
|
general protection fault in __xfs_free_extent
xfs
|
C |
error |
done |
17 |
234d |
353d
|
24/25 |
181d |
b2ccab3199aa
xfs: pass per-ag references to xfs_free_extent
|
WARNING: bad unlock balance in ext4_rename2
ext4
|
|
|
|
105 |
257d |
275d
|
24/25 |
181d |
70e42feab2e2
ext4: fix possible double unlock when moving a directory
|
INFO: task hung in lock_mount
nilfs
|
C |
error |
error |
1238 |
231d |
2046d
|
24/25 |
181d |
a6a491c04888
nilfs2: fix infinite loop in nilfs_mdt_get_block()
|
kernel BUG in hpage_collapse_scan_file
mm
|
C |
unreliable |
|
3 |
233d |
271d
|
24/25 |
181d |
2ce0bdfebc74
mm: khugepaged: fix kernel BUG in hpage_collapse_scan_file()
|
INFO: task hung in nfnetlink_rcv_msg (3)
netfilter
|
C |
done |
|
5 |
362d |
373d
|
24/25 |
181d |
5e29dc36bd5e
netfilter: ipset: Rework long task execution when adding/deleting entries
|
WARNING in io_sync_cancel
io-uring
|
C |
error |
|
3 |
354d |
350d
|
24/25 |
181d |
23fffb2f09ce
io_uring/cancel: re-grab ctx mutex after finishing wait
|
WARNING: refcount bug in consume_skb
net
|
|
|
|
3 |
300d |
309d
|
24/25 |
181d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
KMSAN: uninit-value in xfs_getfsmap_helper
xfs
|
|
|
|
1 |
305d |
299d
|
24/25 |
181d |
60b730a40c43
xfs: fix uninitialized variable access
|
WARNING in io_cqring_overflow_flush
io-uring
|
C |
|
|
2 |
354d |
350d
|
24/25 |
181d |
52ea806ad983
io_uring: finish waiting before flushing overflow entries
|
KASAN: slab-out-of-bounds Write in copy_verifier_state
bpf
|
C |
error |
done |
825 |
334d |
352d
|
24/25 |
181d |
45435d8da71f
bpf: Always use maximal size for copy_array()
|
INFO: trying to register non-static key in net_free
net
|
syz |
error |
|
17982 |
288d |
301d
|
24/25 |
181d |
6e77a5a4af05
net: initialize net->notrefcnt_tracker earlier
|
BUG: unable to handle kernel paging request in clear_user_rep_good
iomap
|
syz |
error |
done |
2 |
250d |
306d
|
24/25 |
181d |
d2c95f9d6802
x86: don't use REP_GOOD or ERMS for user memory clearing
|
WARNING: suspicious RCU usage in bond_mii_monitor
net
|
C |
|
|
13 |
335d |
354d
|
24/25 |
181d |
42c7ded0eeac
bonding: fix lockdep splat in bond_miimon_commit()
|
general protection fault in start_transaction
btrfs
|
C |
error |
|
3 |
336d |
349d
|
24/25 |
181d |
b7adbf9ada35
btrfs: fix race between quota rescan and disable leading to NULL pointer deref
|
WARNING in mbind_range
mm
|
C |
error |
|
3 |
331d |
331d
|
24/25 |
181d |
17dc622c7b0f
maple_tree: fix mas_prev() and mas_find() state handling
|
BUG: stack guard page was hit in inet6_release
bpf
net
|
C |
done |
|
4 |
316d |
365d
|
24/25 |
181d |
ddce1e091757
bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
|
general protection fault in ext4_fill_super (2)
ext4
|
|
|
|
1 |
223d |
223d
|
24/25 |
181d |
d5e72c4e3256
ext4: fix lost error code reporting in __ext4_fill_super()
|
memory leak in copy_process (5)
kernel
|
C |
|
|
1 |
278d |
274d
|
24/25 |
181d |
2aab4b969002
af_unix: fix struct pid leaks in OOB support
|
possible deadlock in l2tp_tunnel_register (2)
net
|
C |
|
|
153 |
275d |
285d
|
24/25 |
181d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
KASAN: slab-use-after-free Read in tcf_action_destroy
net
|
C |
error |
|
32 |
208d |
283d
|
24/25 |
181d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
possible deadlock in release_sock
net
|
C |
done |
|
42 |
321d |
323d
|
24/25 |
181d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
possible deadlock in tty_port_tty_get
serial
|
C |
|
|
22661 |
230d |
432d
|
24/25 |
181d |
1007843a9190
mm/page_alloc: fix potential deadlock on zonelist_update_seq seqlock
|
WARNING in j1939_xtp_rx_abort_one
|
C |
done |
|
379 |
316d |
854d
|
24/25 |
181d |
d0553680f94c
can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
|
WARNING: suspicious RCU usage in mas_walk
kernfs
|
C |
error |
|
234 |
257d |
586d
|
24/25 |
181d |
6db504ce55bd
mm/ksm: fix race with VMA iteration and mm_struct teardown
|
memory leak in nfc_genl_se_io
nfc
net
|
C |
|
|
1 |
296d |
292d
|
24/25 |
181d |
25ff6f8a5a3b
nfc: fix memory leak of se_io context in nfc_genl_se_io
|
BUG: bad usercopy in con_font_op
hardening
mm
|
C |
done |
|
1 |
278d |
278d
|
24/25 |
181d |
18365ebf23f3
tty: vt: protect KD_FONT_OP_GET_TALL from unbound access
|
general protection fault in xpad_probe
usb
|
C |
done |
|
24 |
217d |
239d
|
24/25 |
181d |
53bea86b5712
Revert "Input: xpad - fix support for some third-party controllers"
|
BUG: bad usercopy in put_cmsg
hardening
mm
|
C |
|
|
3 |
296d |
297d
|
24/25 |
181d |
2558b8039d05
net: use a bounce buffer for copying skb->mark
|
general protection fault in tcindex_set_parms
net
|
C |
done |
|
2 |
296d |
296d
|
24/25 |
181d |
42018a322bd4
net/sched: tcindex: search key must be 16 bits
|
KCSAN: data-race in strscpy / strscpy (3)
ext4
mm
|
|
|
|
3 |
245d |
229d
|
24/25 |
181d |
cf587db2ee02
kernel: Allow a kernel thread's name to be set in copy_process
|
UBSAN: shift-out-of-bounds in dbAllocBits
jfs
|
C |
error |
done |
4 |
289d |
422d
|
24/25 |
181d |
fad376fce0af
fs/jfs: fix shift exponent db_agl2size negative
|
kernel BUG in fou_build_udp
net
|
C |
|
|
1 |
216d |
216d
|
24/25 |
181d |
c88f8d5cd95f
UPSTREAM: sit: update dev->needed_headroom in ipip6_tunnel_bind_dev()
|
KASAN: use-after-free Read in io_worker_get
io-uring
|
C |
done |
done |
5 |
297d |
331d
|
24/25 |
181d |
e6db6f9398da
io_uring/io-wq: only free worker if it was allocated for creation
|
INFO: task hung in nilfs_segctor_thread
nilfs
|
C |
error |
|
94 |
218d |
392d
|
24/25 |
181d |
99b9402a36f0
nilfs2: fix underflow in second superblock position calculations
|
KASAN: use-after-free Read in do_accept
hams
|
|
|
|
1 |
327d |
322d
|
24/25 |
181d |
409db27e3a2e
netrom: Fix use-after-free of a listening socket.
|
general protection fault in drm_crtc_next_vblank_start
dri
|
C |
done |
|
4 |
250d |
247d
|
24/25 |
181d |
6f1ccbf07453
drm/vblank: Fix for drivers that do not drm_vblank_init()
|
KCSAN: data-race in ip_finish_output2 / ip_tunnel_xmit
net
|
|
|
|
1 |
311d |
310d
|
24/25 |
181d |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
memory leak in nr_create (2)
hams
|
C |
|
|
11 |
251d |
311d
|
24/25 |
181d |
611792920925
netrom: Fix use-after-free caused by accept on already connected socket
|
kernel BUG in rxrpc_put_call
afs
net
|
C |
done |
|
9 |
319d |
331d
|
24/25 |
181d |
01644a1f98ff
rxrpc: Fix wrong error return in rxrpc_connect_call()
|
kernel BUG in rxrpc_put_peer
afs
net
|
C |
|
|
80 |
322d |
365d
|
24/25 |
181d |
9d35d880e0e4
rxrpc: Move client call connection to the I/O thread
03fc55adf876
rxrpc: Only disconnect calls in the I/O thread
|
WARNING in nilfs_dat_commit_end
nilfs
|
C |
error |
|
267 |
275d |
432d
|
24/25 |
181d |
602ce7b8e134
nilfs2: prevent WARNING in nilfs_dat_commit_end()
|
KASAN: slab-use-after-free Read in kvm_tdp_mmu_invalidate_all_roots
kvm
|
|
|
|
3 |
228d |
226d
|
24/25 |
181d |
edbdb43fc96b
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
|
WARNING: bad unlock balance in l2cap_recv_frame
bluetooth
|
|
|
|
75 |
224d |
235d
|
24/25 |
181d |
25e97f7b1866
Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp
|
possible deadlock in freeze_super (2)
gfs2
|
C |
error |
done |
15 |
206d |
422d
|
24/25 |
181d |
b66f723bb552
gfs2: Improve gfs2_make_fs_rw error handling
|
INFO: task hung in write_cache_pages (2)
fs
mm
|
C |
done |
|
36 |
209d |
280d
|
24/25 |
181d |
fb3592c41a44
migrate_pages: fix deadlock in batched migration
|
KMSAN: uninit-value in vfs_write
fs
|
C |
|
|
3 |
304d |
274d
|
24/25 |
181d |
2b4c99f7d9a5
can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write
|
WARNING in _copy_from_iter
block
tipc
|
C |
error |
|
32057 |
268d |
363d
|
24/25 |
181d |
11a4d6f67cf5
tipc: fix kernel warning when sending SYN message
|
UBSAN: shift-out-of-bounds in dbFindCtl
jfs
|
C |
inconclusive |
done |
45 |
281d |
423d
|
24/25 |
181d |
fad376fce0af
fs/jfs: fix shift exponent db_agl2size negative
|
INFO: rcu detected stall in devlink_nl_cmd_port_get_dumpit
net
|
syz |
|
|
7 |
280d |
296d
|
24/25 |
181d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
KASAN: use-after-free Read in io_wq_worker_wake
io-uring
|
C |
done |
done |
1 |
298d |
331d
|
24/25 |
181d |
e6db6f9398da
io_uring/io-wq: only free worker if it was allocated for creation
|
UBSAN: array-index-out-of-bounds in __gfs2_iomap_get
gfs2
|
C |
error |
|
26 |
226d |
350d
|
24/25 |
181d |
cfcdb5bad34f
gfs2: Fix inode height consistency check
|
KASAN: slab-use-after-free Read in class_register
usb
|
C |
done |
|
13 |
251d |
249d
|
24/25 |
181d |
f326ea63ecc6
driver core: class: fix slab-use-after-free Read in class_register()
|
memory leak in ath9k_hif_usb_firmware_cb
wireless
|
C |
|
|
1591 |
325d |
1121d
|
24/25 |
181d |
9b25e3985477
wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
|
WARNING in inet_sock_destruct (3)
net
|
C |
|
|
87 |
185d |
287d
|
24/25 |
181d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
WARNING in devlink_free
net
|
|
|
|
10 |
316d |
329d
|
24/25 |
181d |
93e71edfd90c
devlink: keep the instance mutex alive until references are gone
|
KMSAN: uninit-value in ipv6_find_tlv
net
|
C |
|
|
271 |
222d |
1576d
|
24/25 |
181d |
ea30388baebc
ipv6: Fix an uninit variable access bug in __ip6_make_skb()
|
WARNING in mark_buffer_dirty (4)
nilfs
bfs
|
C |
inconclusive |
|
1152 |
181d |
520d
|
24/25 |
181d |
28a65b49eb53
nilfs2: do not write dirty data after degenerating to read-only
|
possible deadlock in __nilfs_error (2)
nilfs
|
|
|
|
1 |
262d |
258d
|
24/25 |
181d |
42560f9c92cc
nilfs2: fix sysfs interface lifetime
|
WARNING in fscrypt_destroy_keyring
fscrypt
ext4
|
C |
|
|
2 |
270d |
268d
|
24/25 |
181d |
ccb820dc7d22
fscrypt: destroy keyring after security_sb_delete()
|
WARNING in default_device_exit_batch (4)
net
|
C |
error |
|
954 |
257d |
383d
|
24/25 |
181d |
e667d4690986
bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
|
upstream-arm64 build error
|
|
|
|
11 |
289d |
292d
|
24/25 |
181d |
d54170812ef1
arm64: fix .idmap.text assertion for large kernels
|
WARNING: locking bug in __perf_event_task_sched_in (2)
perf
|
|
|
|
79 |
311d |
330d
|
24/25 |
181d |
93e71edfd90c
devlink: keep the instance mutex alive until references are gone
|
memory leak in regulatory_hint_core
wireless
|
C |
|
|
2 |
380d |
408d
|
24/25 |
181d |
399ab7fe0fa0
net: sched: fix memory leak in tcindex_set_parms
|
WARNING in __udf_add_aext
udf
|
C |
error |
|
170 |
184d |
422d
|
24/25 |
181d |
e9109a92d2a9
udf: Convert udf_rename() to new directory iteration code
|
BUG: unable to handle kernel NULL pointer dereference in __writepage
udf
|
C |
done |
|
17 |
290d |
354d
|
24/25 |
181d |
79d3c6dbada4
udf: Convert in-ICB files to use udf_writepages()
|
KMSAN: kernel-infoleak in copyout (2)
net
|
C |
|
|
6723 |
181d |
1350d
|
24/25 |
181d |
8222d5910dae
xfrm: Zero padding when dumping algos and encap
|
WARNING in ath6kl_htc_pipe_rx_complete
usb
wireless
|
C |
error |
|
2008 |
220d |
1490d
|
24/25 |
181d |
75c4a8154cb6
wifi: ath6kl: reduce WARN to dev_dbg() in callback
|
WARNING in udf_setsize
udf
|
C |
done |
|
24 |
184d |
354d
|
24/25 |
181d |
256fe4162f8b
udf: Do not update file length for failed writes to inline files
|
kernel BUG in hfs_bnode_put
hfs
|
C |
error |
|
5 |
312d |
366d
|
24/25 |
181d |
a9dc087fd3c4
hfs: fix missing hfs_bnode_get() in __hfs_bnode_create
|
KASAN: null-ptr-deref Read in __fl_put
net
|
C |
error |
|
16 |
263d |
282d
|
24/25 |
181d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
general protection fault in udf_fiiter_write_fi
udf
|
C |
error |
|
2 |
328d |
331d
|
24/25 |
181d |
f950fd052913
udf: Protect rename against modification of moved directory
|
general protection fault in sctp_outq_tail
sctp
|
C |
error |
|
5 |
247d |
259d
|
24/25 |
181d |
2584024b2355
sctp: check send stream number after wait_for_sndbuf
|
WARNING: CPU: NUM PID: NUM at mm/page_alloc.c:LINE get_page_from_freeli
mm
erofs
|
C |
error |
|
1 |
353d |
349d
|
24/25 |
181d |
12724ba38992
erofs: fix kvcalloc() misuse with __GFP_NOFAIL
|
WARNING in kvm_tdp_mmu_invalidate_all_roots
kvm
|
|
|
|
1658 |
226d |
229d
|
24/25 |
181d |
edbdb43fc96b
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
|
WARNING in kvm_arch_vcpu_ioctl_run (4)
kvm
|
C |
error |
|
288 |
181d |
265d
|
24/25 |
181d |
0dc902267cb3
KVM: x86: Suppress pending MMIO write exits if emulator detects exception
|
WARNING in __mod_timer
lsm
keyrings
|
|
|
|
2 |
248d |
282d
|
24/25 |
181d |
63a759694eed
debugobject: Prevent init race with static objects
|
general protection fault in hrtimer_active (5)
kernel
|
C |
error |
|
22 |
296d |
300d
|
24/25 |
181d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
WARNING in __kernel_read (2)
fsverity
|
C |
error |
|
318 |
225d |
1166d
|
24/25 |
181d |
04839139213c
fsverity: reject FS_IOC_ENABLE_VERITY on mode 3 fds
|
INFO: task hung in extent_write_cache_pages
btrfs
|
C |
error |
|
5 |
212d |
321d
|
24/25 |
181d |
519b7e13b5ae
btrfs: lock the inode in shared mode before starting fiemap
|
kernel BUG in inet_sock_destruct
net
|
C |
error |
|
3 |
337d |
337d
|
24/25 |
181d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
possible deadlock in inet_put_port
net
|
|
|
|
2 |
322d |
322d
|
24/25 |
181d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
BUG: corrupted list in taprio_destroy
net
|
C |
done |
|
2 |
298d |
298d
|
24/25 |
181d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
WARNING: suspicious RCU usage in mas_start
kernfs
|
C |
error |
done |
23 |
253d |
285d
|
24/25 |
181d |
6db504ce55bd
mm/ksm: fix race with VMA iteration and mm_struct teardown
|
WARNING in shark_write_val/usb_submit_urb
usb
|
C |
error |
done |
51 |
238d |
1598d
|
24/25 |
181d |
76e31045ba03
media: radio-shark: Add endpoint checks
|
memory leak in prctl
mm
|
C |
|
|
1 |
354d |
350d
|
24/25 |
181d |
a1193de562f5
mm: fix vma->anon_name memory leak for anonymous shmem VMAs
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (6)
net
|
|
|
|
2 |
249d |
247d
|
24/25 |
181d |
a1865f2e7d10
netlink: annotate lockless accesses to nlk->max_recvmsg_len
|
WARNING in print_tainted
ext4
|
C |
|
|
162 |
181d |
352d
|
24/25 |
181d |
c6adf659a8ba
can: isotp: check CAN address family in isotp_bind()
4f027cba8216
can: isotp: split tx timer into transmission and timeout
|
WARNING in vkms_get_vblank_timestamp
dri
|
syz |
error |
|
41 |
184d |
244d
|
24/25 |
181d |
f2c7ca890182
drm/atomic-helper: Don't set deadline for modesets
|
KASAN: invalid-free in skb_free_head (2)
net
|
C |
error |
|
25 |
222d |
287d
|
24/25 |
181d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
riscv/fixes test error: BUG: soft lockup in corrupted (2)
net
virtualization
|
|
|
|
4 |
420d |
497d
|
24/25 |
181d |
61fc1ee8be26
riscv: Bump COMMAND_LINE_SIZE value to 1024
|
general protection fault in skb_dequeue (3)
wireless
|
C |
done |
|
6 |
299d |
308d
|
24/25 |
181d |
33b3b041543e
splice: Add a func to do a splice from an O_DIRECT file without ITER_PIPE
|
possible deadlock in jbd2_journal_lock_updates
ext4
|
C |
error |
|
83148 |
188d |
485d
|
24/25 |
181d |
62913ae96de7
ext4, jbd2: add an optimized bmap for the journal inode
|
memory leak in __build_skb (3)
wireless
|
C |
|
|
2 |
341d |
339d
|
24/25 |
181d |
9b25e3985477
wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
|
INFO: task hung in freeze_super (3)
gfs2
|
C |
error |
|
19 |
201d |
362d
|
24/25 |
181d |
b66f723bb552
gfs2: Improve gfs2_make_fs_rw error handling
|
KMSAN: uninit-value in qdisc_run
kernel
|
C |
|
|
2 |
393d |
329d
|
24/25 |
181d |
3a415d59c1db
net/sched: sch_taprio: fix possible use-after-free
|
UBSAN: shift-out-of-bounds in ext2_fill_super
ext4
|
C |
|
|
2265 |
181d |
285d
|
24/25 |
181d |
62aeb94433fc
ext2: Check block size validity during mount
|
KASAN: wild-memory-access Read in io_wq_worker_running
io-uring
|
C |
|
|
39 |
327d |
333d
|
24/25 |
181d |
e6db6f9398da
io_uring/io-wq: only free worker if it was allocated for creation
|
KASAN: slab-out-of-bounds Read in hdr_delete_de
ntfs3
|
C |
error |
|
2 |
365d |
365d
|
24/25 |
181d |
ab84eee4c7ab
fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de()
|
WARNING in inet_csk_destroy_sock (3)
net
|
|
|
|
1 |
195d |
195d
|
24/25 |
194d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
WARNING in submit_bio_checks
|
C |
done |
unreliable |
1851 |
624d |
1243d
|
24/25 |
233d |
57e95e4670d1
block: fix and cleanup bio_check_ro
|
general protection fault in dma_fence_array_first
dri
media
|
C |
done |
|
7 |
617d |
617d
|
24/25 |
238d |
21d139d73f77
dma-buf/sync-file: fix logic error in new fence merge code
|
BUG: sleeping function called from invalid context in folio_copy
mm
|
C |
unreliable |
|
271 |
866d |
864d
|
24/25 |
238d |
715cbfd6c5c5
mm/migrate: Add folio_migrate_copy()
|
KASAN: use-after-free Read in hci_cmd_timeout
|
C |
done |
error |
371 |
362d |
1674d
|
24/25 |
238d |
97dfaf073f58
Bluetooth: hci_sync: cancel cmd_timer if hci_open failed
|
KASAN: slab-out-of-bounds Read in sk_psock_get
net
|
C |
done |
error |
9 |
498d |
833d
|
24/25 |
238d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
KASAN: use-after-free Read in delete_partition (2)
block
|
C |
done |
|
1 |
981d |
981d
|
24/25 |
238d |
b5cfbd35ecca
block: check disk exist before trying to add partition
|
INFO: task hung in port100_probe
usb
nfc
|
C |
error |
inconclusive |
10 |
639d |
897d
|
24/25 |
238d |
f80cfe2f2658
NFC: port100: fix use-after-free in port100_send_complete
|
KASAN: slab-out-of-bounds Read in ntfs_get_ea
ntfs3
|
C |
error |
done |
9 |
388d |
456d
|
24/25 |
238d |
0e8235d28f3a
fs/ntfs3: Check fields while reading
|
possible deadlock in nci_start_poll
nfc
net
|
C |
error |
done |
83 |
286d |
387d
|
24/25 |
239d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
possible deadlock in bpf_trace_printk
bpf
trace
|
C |
done |
done |
68 |
289d |
545d
|
24/25 |
258d |
05b24ff9b2cf
bpf: Prevent bpf program recursion for raw tracepoint probes
|
WARNING in btrfs_run_delayed_refs
btrfs
|
C |
error |
done |
15 |
302d |
415d
|
24/25 |
266d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
kernel BUG in pskb_expand_head
net
|
C |
done |
|
1600 |
300d |
751d
|
24/25 |
284d |
5f33a09e769a
can: isotp: convert struct tpcon::{idx,len} to unsigned int
7c759040c1dd
can: isotp: fix potential CAN frame reception race in isotp_rcv()
|
KMSAN: uninit-value in kvm_irq_delivery_to_apic_fast
kvm
|
C |
|
|
20 |
493d |
526d
|
24/25 |
285d |
8a414f943f8b
KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
|
kernel BUG in __text_poke
kernel
|
C |
|
|
80 |
485d |
660d
|
24/25 |
285d |
1d5f82d9dd47
bpf, x86: fix freeing of not-finalized bpf_prog_pack
d24d2a2b0a81
bpf: bpf_prog_pack: Set proper size before freeing ro_header
|
KASAN: vmalloc-out-of-bounds Read in bpf_jit_free
bpf
|
C |
|
|
68 |
484d |
660d
|
24/25 |
285d |
1d5f82d9dd47
bpf, x86: fix freeing of not-finalized bpf_prog_pack
d24d2a2b0a81
bpf: bpf_prog_pack: Set proper size before freeing ro_header
|
WARNING in __dev_queue_xmit
|
C |
done |
|
16774 |
285d |
499d
|
24/25 |
285d |
dc633700f00f
net/af_packet: check len when min_header_len equals to 0
b12e924a2f5b
net/ieee802154: don't warn zero-sized raw_sendmsg()
3a4d061c699b
net/ieee802154: reject zero-sized raw_sendmsg()
|
INFO: trying to register non-static key in ieee80211_do_stop
wireless
|
C |
error |
|
70591 |
470d |
510d
|
24/25 |
285d |
aa40d5a43526
wifi: mac80211: do not abuse fq.lock in ieee80211_do_stop()
wifi: mac80211: do not abuse fq.lock in ieee80211_do_stop()
|
KASAN: use-after-free Read in mgmt_pending_remove
bluetooth
|
C |
unreliable |
|
9 |
456d |
476d
|
24/25 |
285d |
3cfbc6ac22d6
Bluetooth: hci_sync: fix double mgmt_pending_free() in remove_adv_monitor()
Bluetooth: hci_sync: fix double mgmt_pending_free() in remove_adv_monitor()
|
WARNING in alloc_charge_hpage
mm
|
C |
error |
|
112 |
334d |
404d
|
24/25 |
285d |
e031ff96b334
mm: khugepaged: allow page allocation fallback to eligible nodes
dec1d352de5c
mm: replace VM_WARN_ON to pr_warn if the node is offline with __GFP_THISNODE
|
possible deadlock in worker_thread
rdma
|
|
|
|
1 |
668d |
664d
|
24/25 |
285d |
081bdc9fe05b
RDMA/ib_srp: Fix a deadlock
bf23747ee053
loop: revert "make autoclear operation asynchronous"
|
KMSAN: uninit-value in ext4_evict_inode
ext4
|
|
|
|
2734 |
331d |
385d
|
24/25 |
285d |
7ea71af94eaa
ext4: fix uninititialized value in 'ext4_evict_inode'
|
WARNING in ipgre_xmit
net
|
C |
done |
|
9916 |
536d |
552d
|
24/25 |
285d |
8d21e9963bec
ip_gre: test csum_start instead of transport header
|
kernel panic: corrupted stack end in vm_area_alloc
kernel
|
|
|
|
1 |
519d |
519d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
kernel panic: corrupted stack end in vlan_ioctl_handler
kernfs
|
|
|
|
1 |
541d |
541d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
inconsistent lock state in fs_reclaim_acquire (3)
kernel
|
C |
|
|
2 |
400d |
406d
|
24/25 |
285d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
net boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
18 |
538d |
544d
|
24/25 |
285d |
228432551bd8
virtio-rng: make device ready before making request
|
KASAN: use-after-free Read in mas_next_nentry
fs
|
C |
error |
done |
343 |
394d |
588d
|
24/25 |
285d |
59f2f4b8a757
fs/userfaultfd: Fix maple tree iterator in userfaultfd_unregister()
|
KASAN: use-after-free Read in tty_release
io-uring
serial
|
C |
done |
|
23 |
614d |
624d
|
24/25 |
285d |
d89a4fac0fbc
io_uring: fix assuming triggered poll waitqueue is the single poll
|
linux-next boot error: kernel BUG in putname
fs
|
|
|
|
1 |
477d |
477d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING: ODEBUG bug in ops_free_list
net
|
|
|
|
1 |
613d |
613d
|
24/25 |
285d |
1946014ca3b1
rxrpc: fix a race in rxrpc_exit_net()
|
KMSAN: uninit-value in ax88178_reset
usb
|
C |
|
|
284 |
593d |
700d
|
24/25 |
285d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
general protection fault in br_mst_info_size
bridge
|
C |
error |
|
26 |
622d |
625d
|
24/25 |
285d |
cde3fc244b3d
net: bridge: mst: prevent NULL deref in br_mst_info_size()
|
KASAN: wild-memory-access Read in skb_copy_bits
net
|
C |
|
|
2 |
453d |
453d
|
24/25 |
285d |
0d24148bd276
inet: ping: fix recent breakage
|
general protection fault in list_lru_add
mm
|
C |
done |
|
1125 |
334d |
623d
|
24/25 |
285d |
ae085d7f9365
mm: kfence: fix missing objcg housekeeping for SLAB
|
KCSAN: data-race in __ip_append_data / __ip_append_data
net
|
|
|
|
1 |
670d |
666d
|
24/25 |
285d |
a1cdec57e03a
net-timestamp: convert sk->sk_tskey to atomic_t
|
kernel panic: corrupted stack end in tun_chr_close
fs
|
|
|
|
1 |
577d |
577d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (3)
tipc
|
C |
|
|
65 |
381d |
398d
|
24/25 |
285d |
1c075b192fe4
tipc: fix the msg->req tlv len check in tipc_nl_compat_name_table_dump_header
|
WARNING: kmalloc bug in xdp_umem_create (2)
net
bpf
|
C |
done |
|
21 |
664d |
730d
|
24/25 |
285d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
general protection fault in sg_alloc_append_table_from_pages
dri
media
|
C |
done |
|
477 |
317d |
784d
|
24/25 |
285d |
2b6dd600dd72
udmabuf: validate ubuf->pagecount
|
WARNING in c_start
kernel
|
|
|
|
75097 |
416d |
418d
|
24/25 |
285d |
80493877d7d0
Revert "cpumask: fix checking valid cpu range".
|
KCSAN: data-race in tcp_send_challenge_ack / tcp_send_challenge_ack
net
|
|
|
|
1 |
463d |
463d
|
24/25 |
285d |
8c70521238b7
tcp: annotate data-race around challenge_timestamp
|
BUG: sleeping function called from invalid context in sk_psock_skb_ingress_self
bpf
net
|
C |
done |
|
151 |
395d |
417d
|
24/25 |
285d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
INFO: task hung in addrconf_verify_work (6)
|
C |
done |
|
86 |
289d |
526d
|
24/25 |
285d |
ff1fa2081d17
net: tun: avoid disabling NAPI twice
|
KASAN: use-after-free Read in ipvlan_queue_xmit (3)
net
|
C |
error |
error |
8 |
489d |
1087d
|
24/25 |
285d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING in change_protection
mm
|
C |
unreliable |
|
13 |
427d |
432d
|
24/25 |
285d |
515778e2d790
mm/uffd: fix warning without PTE_MARKER_UFFD_WP compiled in
|
possible deadlock in dccp_v4_ctl_send_reset
mptcp
|
C |
done |
|
26 |
372d |
384d
|
24/25 |
285d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
WARNING in exit_tasks_rcu_finish
kernel
|
C |
done |
|
20 |
539d |
542d
|
24/25 |
285d |
0356d4e66214
rcu-tasks: Track blocked RCU Tasks Trace readers
|
memory leak in kobject_set_name_vargs (5)
nilfs
|
C |
|
|
4 |
429d |
532d
|
24/25 |
285d |
d0d51a97063d
nilfs2: fix leak of nilfs_root in case of writer thread creation failure
|
BUG: unable to handle kernel NULL pointer dereference in ni_find_attr
ntfs3
|
C |
done |
done |
81 |
334d |
469d
|
24/25 |
285d |
2681631c2973
fs/ntfs3: Add null pointer check to attr_load_runs_vcn
|
possible deadlock in console_unlock (2)
serial
|
C |
error |
done |
599 |
301d |
752d
|
24/25 |
285d |
09c5ba0aa2fc
printk: add kthread console printers
|
KASAN: use-after-free Read in ucma_destroy_private_ctx
rdma
|
|
|
|
1 |
708d |
702d
|
24/25 |
285d |
36e8169ec973
RDMA/ucma: Protect mc during concurrent multicast leaves
|
general protection fault in llc_build_and_send_xid_pkt
net
|
C |
done |
|
2 |
622d |
622d
|
24/25 |
285d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: use-after-free Read in unregister_shrinker (2)
mm
|
C |
error |
|
3799 |
397d |
441d
|
24/25 |
285d |
bd86c69dae65
NFSD: unregister shrinker when nfsd_init_net() fails
|
linux-next boot error: general protection fault in driver_bound
kernel
|
|
|
|
1 |
477d |
477d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KMSAN: uninit-value in mpol_rebind_mm (2)
mm
|
C |
|
|
11 |
539d |
663d
|
24/25 |
285d |
018160ad314d
mm/mempolicy: fix uninit-value in mpol_rebind_policy()
|
possible deadlock in snd_timer_interrupt (2)
sound
|
C |
error |
|
29 |
484d |
745d
|
24/25 |
285d |
95cc637c1afd
ALSA: timer: Use deferred fasync helper
|
possible deadlock in display_open
usb
|
C |
inconclusive |
|
48888 |
553d |
1580d
|
24/25 |
285d |
db264d4c66c0
media: imon: reorganize serialization
|
kernel BUG in __clear_extent_bit
btrfs
|
C |
error |
|
5 |
361d |
376d
|
24/25 |
285d |
5a75034e71ef
btrfs: do not panic if we can't allocate a prealloc extent state
|
KASAN: use-after-free Read in reqsk_queue_unlink
net
|
|
|
|
4 |
371d |
422d
|
24/25 |
285d |
740ea3c4a0b2
tcp: Clean up kernel listener's reqsk in inet_twsk_purge()
|
kernel BUG in dev_args_match_device
btrfs
|
|
|
|
1 |
399d |
399d
|
24/25 |
285d |
0fca385d6ebc
btrfs: fix match incorrectly in dev_args_match_device
|
KASAN: use-after-free Read in pty_close
fuse
io-uring
serial
|
C |
done |
|
4 |
490d |
517d
|
24/25 |
285d |
7a121ced6e64
io_uring: don't miss setting REQ_F_DOUBLE_POLL
|
KASAN: vmalloc-out-of-bounds Write in tpg_fill_plane_buffer (2)
media
|
C |
inconclusive |
done |
14 |
310d |
822d
|
24/25 |
285d |
94a7ad928346
media: vivid: fix compose size exceed boundary
|
general protection fault in pm_qos_update_target
pm
|
syz |
inconclusive |
done |
1 |
625d |
933d
|
24/25 |
285d |
3c3201f8c7bb
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
|
KMSAN: uninit-value in asix_mdio_read (3)
usb
|
C |
|
|
1582 |
568d |
633d
|
24/25 |
285d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
WARNING: refcount bug in tcp_release_cb
net
|
|
|
|
2 |
360d |
370d
|
24/25 |
285d |
0a182f8d6074
bpf, sockmap: fix race in sock_map_free()
|
INFO: rcu detected stall in sys_lsetxattr
fs
|
C |
done |
|
2 |
596d |
596d
|
24/25 |
285d |
0014edaedfd8
fs: unset MNT_WRITE_HOLD on failure
|
WARNING in ext4_da_release_space
ext4
|
C |
error |
|
9 |
297d |
420d
|
24/25 |
285d |
1b8f787ef547
ext4: fix warning in 'ext4_da_release_space'
|
BUG: unable to handle kernel NULL pointer dereference in ntfs_sparse_cluster
ntfs3
|
C |
error |
done |
11 |
351d |
353d
|
24/25 |
285d |
c380b52f6c57
fs/ntfs3: Change new sparse cluster processing
|
WARNING in cpuset_attach
cgroups
|
C |
error |
|
20922 |
468d |
469d
|
24/25 |
285d |
43626dade36f
cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()
|
net boot error: WARNING in genl_register_family
net
|
|
|
|
3 |
404d |
404d
|
24/25 |
285d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
WARNING in __skb_flow_dissect (4)
net
|
C |
error |
|
6 |
396d |
405d
|
24/25 |
285d |
9f225444467b
ppp: associate skb with a device at tx
|
WARNING in inet_csk_get_port
net
|
C |
done |
|
1166 |
334d |
562d
|
24/25 |
285d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
upstream boot error: general protection fault in __proc_create
fs
|
|
|
|
1 |
479d |
479d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
panic: runtime error: floating point error
kernel
|
|
|
|
2 |
297d |
576d
|
24/25 |
285d |
59f5ede3bc0f
x86/fpu: Prevent FPU state corruption
|
inconsistent lock state in kmem_cache_alloc_trace (2)
kernel
|
|
|
|
2 |
414d |
415d
|
24/25 |
285d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
memory leak in __insert_pending
ext4
|
C |
|
|
1 |
402d |
398d
|
24/25 |
285d |
1da18e38cb97
ext4: fix reserved cluster accounting in __es_remove_extent()
|
memory leak in crypto_create_tfm_node
ext4
crypto
|
C |
|
|
3 |
415d |
421d
|
24/25 |
285d |
ccd30a476f8e
fscrypt: fix keyring memory leak on mount failure
|
WARNING in vcpu_enter_guest (2)
kvm
|
C |
|
|
42 |
398d |
406d
|
24/25 |
285d |
dea0d5a2fde6
KVM: x86: Exempt pending triple fault from event injection sanity check
|
KASAN: use-after-free Read in drm_gem_object_release_handle
|
C |
done |
|
362 |
366d |
750d
|
24/25 |
285d |
24013314be6e
drm/shmem-helper: Remove errant put in error path
|
KMSAN: uninit-value in btrfs_clean_tree_block (2)
nilfs
|
|
|
|
15960 |
285d |
746d
|
24/25 |
285d |
cbddcc4fa344
btrfs: set generation before calling btrfs_clean_tree_block in btrfs_init_new_buffer
|
KASAN: use-after-free Read in do_shrink_slab (2)
mm
|
|
|
|
105 |
411d |
435d
|
24/25 |
285d |
bd86c69dae65
NFSD: unregister shrinker when nfsd_init_net() fails
|
WARNING in ext2_fill_super
ext4
|
C |
|
|
2 |
471d |
467d
|
24/25 |
285d |
d766f2d1e3e3
ext2: Add sanity checks for group and filesystem size
e7c7fbb9a857
ext2: Use kvmalloc() for group descriptor array
|
KASAN: use-after-free Read in btrfs_scan_one_device (2)
btrfs
|
C |
|
|
2 |
647d |
643d
|
24/25 |
285d |
79c9234ba596
btrfs: don't access possibly stale fs_info data in device_list_add
|
KASAN: use-after-free Read in free_netdev (3)
net
|
C |
inconclusive |
|
130 |
377d |
533d
|
24/25 |
285d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
WARNING in bpf_skb_load_helper_16_no_cache
bpf
|
C |
done |
|
6 |
492d |
521d
|
24/25 |
285d |
0326195f523a
bpf: Make sure mac_header was set before using it
|
general protection fault in release_udmabuf
dri
media
|
C |
inconclusive |
|
31 |
424d |
475d
|
24/25 |
285d |
d9c04a1b7a15
udmabuf: Set ubuf->sg = NULL if the creation of sg table fails
|
KASAN: slab-out-of-bounds Read in cttimeout_net_exit
netfilter
|
C |
|
|
1444 |
530d |
568d
|
24/25 |
285d |
aeed55a08d0b
netfilter: cttimeout: fix slab-out-of-bounds read in cttimeout_net_exit
394e771684f7
netfilter: cttimeout: fix slab-out-of-bounds read typo in cttimeout_net_exit
|
WARNING in snd_usbmidi_output_open
alsa
usb
|
C |
done |
|
37 |
382d |
390d
|
24/25 |
285d |
ad72c3c3f6eb
ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()
|
WARNING in send_packet/usb_submit_urb
usb
|
C |
inconclusive |
|
847 |
353d |
519d
|
24/25 |
285d |
813ceef062b5
media: imon: fix a race condition in send_packet()
|
KASAN: slab-out-of-bounds Read in io_uring_show_fdinfo
io-uring
|
C |
done |
|
5 |
417d |
422d
|
24/25 |
285d |
00927931cb63
io_uring: fix fdinfo sqe offsets calculation
|
KCSAN: data-race in dev_activate / qdisc_lookup_rcu
net
|
|
|
|
1 |
663d |
663d
|
24/25 |
285d |
5891cd5ec46c
net_sched: add __rcu annotation to netdev->qdisc
|
KASAN: slab-out-of-bounds Read in thrustmaster_probe
input
usb
|
C |
unreliable |
|
92 |
630d |
654d
|
24/25 |
285d |
fc3ef2e3297b
HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts
|
INFO: rcu detected stall in sys_setxattr (2)
fs
|
C |
done |
|
3 |
596d |
596d
|
24/25 |
285d |
0014edaedfd8
fs: unset MNT_WRITE_HOLD on failure
|
BUG: unable to handle kernel paging request in vmx_handle_exit_irqoff
kvm
|
C |
error |
|
7736 |
377d |
399d
|
24/25 |
285d |
1cfaac2400c7
x86/kasan: Populate shadow for shared chunk of the CPU entry area
|
WARNING in skb_try_coalesce
net
|
C |
error |
|
1521 |
557d |
1011d
|
24/25 |
285d |
763087dab975
net: add skb_set_end_offset() helper
|
INFO: task hung in misc_open (4)
usb
|
C |
error |
inconclusive |
144 |
313d |
1026d
|
24/25 |
285d |
8386c414e27c
PM: hibernate: defer device probing when resuming from hibernation
|
kernel panic: corrupted stack end in netdev_run_todo
net
|
|
|
|
1 |
529d |
529d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
general protection fault in sock_reserve_memory
net
|
C |
done |
|
2 |
661d |
661d
|
24/25 |
285d |
25206111512d
crypto: af_alg - get rid of alg_memory_allocated
|
general protection fault in __dentry_path (2)
fs
|
C |
error |
|
174 |
590d |
600d
|
24/25 |
285d |
5c697c367a66
KVM: Initialize debugfs_dentry when a VM is created to avoid NULL deref
|
WARNING in tcp_enter_loss (3)
net
|
C |
inconclusive |
|
7 |
402d |
699d
|
24/25 |
285d |
0c175da7b037
tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent
|
divide error in dbNextAG
jfs
|
syz |
error |
|
2 |
631d |
627d
|
24/25 |
285d |
2cc7cc01c15f
jfs: fix divide error in dbNextAG
|
usb-testing boot error: BUG: unable to handle kernel paging request in dequeue_task_fair
acpi
|
|
|
|
1 |
464d |
464d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in tls_sk_proto_close (3)
net
|
C |
done |
|
276 |
534d |
933d
|
24/25 |
285d |
69135c572d1f
net/tls: fix tls_sk_proto_close executed repeatedly
|
KCSAN: data-race in lru_add_fn / skb_append_pagefrags
mm
|
|
|
|
1 |
410d |
405d
|
24/25 |
285d |
228ebc41dfab
net: do not sense pfmemalloc status in skb_append_pagefrags()
|
possible deadlock in hugetlb_fault
mm
|
|
|
|
2 |
389d |
397d
|
24/25 |
285d |
04ada095dcfc
hugetlb: don't delete vma_lock in hugetlb MADV_DONTNEED processing
|
KASAN: use-after-free Read in nilfs_mdt_destroy
nilfs
|
C |
error |
|
20 |
425d |
441d
|
24/25 |
285d |
2e488f13755f
fs: fix UAF/GPF bug in nilfs_mdt_destroy
|
KASAN: slab-out-of-bounds Read in hfs_cat_keycmp
hfs
|
C |
error |
done |
2 |
288d |
354d
|
24/25 |
285d |
c53ed55cb275
hfs: Fix OOB Write in hfs_asc2mac
|
possible deadlock in l2tp_tunnel_register
net
|
C |
error |
|
9492 |
285d |
384d
|
24/25 |
285d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
general protection fault in em_cmp_match
net
|
C |
|
|
4 |
360d |
357d
|
24/25 |
285d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
kernel BUG in __filemap_get_folio
kernel
|
C |
done |
|
814 |
424d |
595d
|
24/25 |
285d |
63b1898fffcd
XArray: Disallow sibling entries of nodes
|
kernel BUG in commit_creds
io-uring
|
C |
done |
|
5 |
596d |
600d
|
24/25 |
285d |
701521403cfb
io_uring: abort file assignment prior to assigning creds
|
WARNING in mntput_no_expire (3)
fs
|
C |
inconclusive |
|
29 |
335d |
751d
|
24/25 |
285d |
a91714312eb1
percpu_ref_init(): clean ->percpu_count_ref on failure
|
WARNING in nilfs_segctor_do_construct
nilfs
|
C |
|
|
5 |
311d |
434d
|
24/25 |
285d |
723ac751208f
nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure
|
KASAN: slab-out-of-bounds Read in vxlan_vnifilter_dump_dev
|
C |
done |
|
30 |
615d |
616d
|
24/25 |
285d |
9d570741aec1
vxlan: do not feed vxlan_vnifilter_dump_dev with non vxlan devices
|
general protection fault in ip6_rcv_core
net
|
C |
done |
|
275 |
375d |
602d
|
24/25 |
285d |
0339d25a2807
ipv6: fix NULL deref in ip6_rcv_core()
|
BUG: unable to handle kernel paging request in ovl_set_acl
overlayfs
|
C |
error |
|
4 |
397d |
399d
|
24/25 |
285d |
5b52aebef895
ovl: call posix_acl_release() after error checking
|
KASAN: use-after-free Read in z_erofs_transform_plain
erofs
|
C |
done |
|
4 |
289d |
366d
|
24/25 |
285d |
c505feba4c0d
erofs: validate the extent length for uncompressed pclusters
|
KMSAN: uninit-value in mpol_rebind_task (2)
mm
|
C |
|
|
7 |
541d |
701d
|
24/25 |
285d |
018160ad314d
mm/mempolicy: fix uninit-value in mpol_rebind_policy()
|
KASAN: use-after-free Read in nh_netdev_event
net
|
|
|
|
3 |
385d |
462d
|
24/25 |
285d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KASAN: use-after-free Read in rxrpc_lookup_local
afs
net
|
C |
|
|
3997 |
335d |
365d
|
24/25 |
285d |
8fbcc83334a7
rxrpc: Fix I/O thread startup getting skipped
eaa02390adb0
rxrpc: Fix NULL deref in rxrpc_unuse_local()
|
WARNING in kernfs_active
kernfs
|
C |
error |
|
150 |
299d |
422d
|
24/25 |
285d |
1edfe4ea16ca
kernfs: Fix spurious lockdep warning in kernfs_find_and_get_node_by_id()
|
kernel BUG in warn_crc32c_csum_combine
net
|
C |
error |
|
17 |
399d |
408d
|
24/25 |
285d |
7f57f8165cb6
af_key: Fix send_acquire race with pfkey_register
|
kernel panic: corrupted stack end in nf_tables_getset
net
|
|
|
|
1 |
394d |
394d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
net-next test error: WARNING in devl_port_unregister
net
|
|
|
|
52 |
391d |
393d
|
24/25 |
285d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
KMSAN: kernel-infoleak in v4l2_compat_put_array_args
media
|
|
|
|
8 |
383d |
687d
|
24/25 |
285d |
4e768c8e34e6
media: v4l2-compat-ioctl32.c: zero buffer passed to v4l2_compat_get_array_args()
|
kernel panic: stack is corrupted in ksys_write
fs
|
|
|
|
1 |
458d |
454d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in dev_uevent
kernel
|
syz |
|
|
54 |
292d |
1265d
|
24/25 |
285d |
16b1941eac2b
usb: gadget: Fix use-after-free bug by not setting udc->dev.driver
|
WARNING in u32_change
net
|
C |
|
|
28 |
340d |
437d
|
24/25 |
285d |
7cba18332e36
net: sched: cls_u32: Avoid memcpy() false-positive warning
|
general protection fault in metadata_dst_free
net
|
C |
|
|
348 |
416d |
455d
|
24/25 |
285d |
c52add61c27e
macsec: don't free NULL metadata_dst
|
memory leak in watch_queue_set_size
kernel
|
C |
|
|
1 |
627d |
620d
|
24/25 |
285d |
b490207017ba
watch_queue: Free the page array when watch_queue is dismantled
|
memory leak in virtual_ncidev_write
net
nfc
|
C |
|
|
1 |
384d |
384d
|
24/25 |
285d |
53270fb0fd77
NFC: nci: fix memory leak in nci_rx_data_packet()
|
memory leak in __vsock_create
net
|
C |
|
|
1 |
609d |
605d
|
24/25 |
285d |
7e97cfed9929
vsock: Fix memory leak in vsock_connect()
|
kernel panic: corrupted stack end in inet6_sendmsg
netfilter
|
|
|
|
1 |
433d |
433d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING: locking bug in hugetlb_no_page
mm
|
C |
|
|
1 |
389d |
389d
|
24/25 |
285d |
04ada095dcfc
hugetlb: don't delete vma_lock in hugetlb MADV_DONTNEED processing
|
KASAN: slab-out-of-bounds Read in __fscache_acquire_volume
cachefs
|
C |
done |
done |
1 |
464d |
464d
|
24/25 |
285d |
9f0933ac026f
fscache: fix OOB Read in __fscache_acquire_volume
|
usb-testing boot error: BUG: unable to handle kernel paging request in __handle_mm_fault
mm
|
|
|
|
1 |
478d |
478d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in blk_mq_update_nr_hw_queues
block
|
C |
error |
|
16 |
382d |
395d
|
24/25 |
285d |
90b0296ece4b
block: fix crash in 'blk_mq_elv_switch_none'
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (5)
net
|
|
|
|
12 |
327d |
580d
|
24/25 |
285d |
d5076fe4049c
netlink: do not reset transport header in netlink_recvmsg()
|
general protection fault in __inet_hash_connect
net
|
|
|
|
5 |
393d |
539d
|
24/25 |
285d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
kernel panic: corrupted stack end in tc_ctl_action
net
|
|
|
|
2 |
417d |
471d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in skb_checksum_help
net
|
|
|
|
15 |
290d |
463d
|
24/25 |
285d |
0d24148bd276
inet: ping: fix recent breakage
|
WARNING in skb_tunnel_check_pmtu
net
|
C |
done |
|
8 |
527d |
533d
|
24/25 |
285d |
853a76148802
tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()
|
general protection fault in nilfs_palloc_commit_free_entry
nilfs
|
C |
error |
|
2 |
401d |
409d
|
24/25 |
285d |
f0a0ccda18d6
nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry()
|
BUG: sleeping function called from invalid context in smc_pnet_apply_ib
rdma
|
C |
inconclusive |
|
92 |
649d |
657d
|
24/25 |
285d |
7ff57e98fb78
net/smc: Use a mutex for locking "struct smc_pnettable"
|
KASAN: use-after-free Read in nf_hook_entries_grow
netfilter
|
C |
done |
done |
5 |
676d |
716d
|
24/25 |
285d |
6069da443bf6
netfilter: nf_tables: unregister flowtable hooks on netns exit
|
BUG: unable to handle kernel NULL pointer dereference in lock_page
nilfs
|
C |
error |
|
4 |
395d |
404d
|
24/25 |
285d |
512c5ca01a36
nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty
|
WARNING: lock held when returning to user space in ieee80211_change_mac
wireless
|
|
|
|
1 |
435d |
431d
|
24/25 |
285d |
ceb3d688f922
wifi: mac80211: unlock on error in ieee80211_can_powered_addr_change()
|
KASAN: use-after-free Read in do_sync_mmap_readahead
fs
mm
|
|
|
|
1 |
564d |
560d
|
24/25 |
285d |
dcfa24ba6899
filemap: Cache the value of vm_flags
|
KMSAN: kernel-infoleak in vcs_read (2)
serial
|
C |
|
|
1556 |
308d |
1463d
|
24/25 |
285d |
af77c56aa353
tty: vt: initialize unicode screen buffer
|
usb-testing boot error: general protection fault in rcu_core
fs
mm
|
|
|
|
23 |
459d |
478d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
memory leak in ipv6_renew_options
net
|
C |
|
|
1 |
511d |
507d
|
24/25 |
285d |
e27326009a3d
net: ping6: Fix memleak in ipv6_renew_options().
|
KMSAN: uninit-value in pagecache_write
ext4
|
|
|
|
5 |
411d |
394d
|
24/25 |
285d |
956510c0c743
fs: ext4: initialize fsdata in pagecache_write()
|
KASAN: vmalloc-out-of-bounds Write in imageblit (2)
fbdev
|
C |
done |
|
701 |
459d |
747d
|
24/25 |
285d |
566f9c9f8933
vt: Clear selection before changing the font
|
UBSAN: shift-out-of-bounds in ntfs_fill_super
ntfs3
|
C |
done |
|
3643 |
285d |
594d
|
24/25 |
285d |
a3b774342fa7
fs/ntfs3: validate BOOT sectors_per_clusters
|
possible deadlock in kcm_ioctl
net
|
C |
error |
|
20 |
471d |
472d
|
24/25 |
285d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
KMSAN: uninit-value in can_send
can
|
C |
|
|
630 |
380d |
398d
|
24/25 |
285d |
3eb3d283e857
can: j1939: j1939_send_one(): fix missing CAN header initialization
|
KASAN: invalid-access Read in copy_page
arm
|
|
|
|
302 |
421d |
487d
|
24/25 |
285d |
a8e5e5146ad0
arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored
|
memory leak in __tcp_send_ack
net
|
C |
|
|
10 |
423d |
954d
|
24/25 |
285d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
INFO: task hung in hub_port_init (2)
usb
|
C |
error |
|
486 |
288d |
750d
|
24/25 |
285d |
26fbe9772b8c
USB: core: Fix hang in usb_kill_urb by adding memory barriers
|
usb-testing boot error: WARNING in anon_vma_clone
mm
|
|
|
|
1 |
478d |
478d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KMSAN: uninit-value in __tipc_nl_bearer_enable
tipc
|
C |
|
|
1288 |
286d |
1814d
|
24/25 |
285d |
7f36f798f89b
tipc: check attribute length for bearer name
|
kernel BUG in __skb_gso_segment
net
|
C |
done |
|
11 |
552d |
551d
|
24/25 |
285d |
e9d3f80935b6
net/af_packet: make sure to pull mac header
|
inconsistent lock state in kmem_cache_alloc
io-uring
|
C |
|
|
4 |
429d |
436d
|
24/25 |
285d |
b000145e9907
io_uring/rw: defer fsnotify calls to task context
|
general protection fault in rlb_clear_slave
net
|
|
|
|
1 |
528d |
528d
|
24/25 |
285d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
WARNING: ODEBUG bug in mgmt_index_removed
bluetooth
|
|
|
|
1 |
459d |
454d
|
24/25 |
285d |
f74ca25d6d66
Bluetooth: avoid hci_dev_test_and_set_flag() in mgmt_init_hdev()
|
inconsistent lock state in padata_do_serial (2)
crypto
|
|
|
|
1 |
448d |
444d
|
24/25 |
285d |
34c3a47d20ae
padata: Always leave BHs disabled when running ->parallel()
|
WARNING in vmx_queue_exception (2)
kvm
|
C |
|
|
5 |
584d |
583d
|
24/25 |
285d |
053d2290c030
KVM: VMX: Exit to userspace if vCPU has injected exception and invalid state
|
usb-testing boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
7 |
541d |
547d
|
24/25 |
285d |
228432551bd8
virtio-rng: make device ready before making request
|
BUG: unable to handle kernel NULL pointer dereference in gsmld_receive_buf
serial
|
C |
error |
|
324 |
458d |
485d
|
24/25 |
285d |
f16c6d2e58a4
tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf()
|
KASAN: null-ptr-deref Write in io_file_get_normal
io-uring
fs
|
C |
done |
|
107 |
530d |
615d
|
24/25 |
285d |
d5361233e9ab
io_uring: drop the old style inflight file tracking
|
general protection fault in i2c_setup_smbus_alert
acpi
usb
|
C |
done |
|
20 |
652d |
670d
|
24/25 |
285d |
8302532f47bb
i2c: smbus: Check for parent device before dereference
|
KASAN: use-after-free Write in sco_sock_timeout
bluetooth
|
C |
done |
|
272 |
560d |
832d
|
24/25 |
285d |
7aa1e7d15f8a
Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout
|
general protection fault in tcp_create_openreq_child
net
|
C |
unreliable |
|
83 |
590d |
592d
|
24/25 |
285d |
ba5a4fdd63ae
tcp: make sure treq->af_specific is initialized
|
INFO: trying to register non-static key in rxe_cleanup_task
rdma
|
syz |
|
|
299 |
286d |
562d
|
24/25 |
285d |
fd5382c5805c
RDMA/rxe: Fix error unwind in rxe_create_qp()
|
WARNING in netif_rx
can
|
|
|
|
2 |
651d |
651d
|
24/25 |
285d |
167053f8dd0e
net: Correct wrong BH disable in hard-interrupt.
|
KASAN: out-of-bounds Read in ntfs_set_ea
ntfs3
|
C |
error |
done |
4 |
351d |
353d
|
24/25 |
285d |
0e8235d28f3a
fs/ntfs3: Check fields while reading
|
UBSAN: array-index-out-of-bounds in nfnetlink_unbind
netfilter
|
C |
done |
|
6621 |
551d |
568d
|
24/25 |
285d |
ffd219efd9ee
netfilter: nfnetlink: fix warn in nfnetlink_unbind
|
INFO: trying to register non-static key in nilfs_bmap_lookup_at_level
nilfs
|
C |
error |
|
124 |
394d |
433d
|
24/25 |
285d |
21a87d88c225
nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
|
general protection fault in ovl_dentry_upper
overlayfs
|
C |
error |
|
2 |
381d |
377d
|
24/25 |
285d |
672e4268b286
ovl: fix use inode directly in rcu-walk mode
|
net-next test error: WARNING in __napi_schedule
wireguard
|
|
|
|
110 |
625d |
628d
|
24/25 |
285d |
351bdbb6419c
net: Revert the softirq will run annotation in ____napi_schedule().
|
BUG: unable to handle kernel paging request in get_desc
kernel
|
syz |
error |
|
8 |
385d |
397d
|
24/25 |
285d |
97650148a15e
x86/mm: Populate KASAN shadow for entire per-CPU range of CPU entry area
|
general protection fault in ath9k_hif_usb_rx_cb (2)
wireless
|
C |
error |
|
1678 |
483d |
1237d
|
24/25 |
285d |
0ac4827f78c7
ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
|
upstream test error: WARNING in __queue_work
kernel
|
|
|
|
1 |
467d |
463d
|
24/25 |
285d |
deee93d13d38
Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works
|
UBSAN: shift-out-of-bounds in dbAllocAG
jfs
|
C |
error |
|
10 |
402d |
434d
|
24/25 |
285d |
898f70669568
fs: jfs: fix shift-out-of-bounds in dbAllocAG
|
kernel panic: corrupted stack end in tun_chr_ioctl
kernfs
|
|
|
|
1 |
532d |
532d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KCSAN: data-race in veth_xmit / veth_xmit
net
|
|
|
|
1 |
670d |
666d
|
24/25 |
285d |
68468d8c4cd4
veth: fix races around rq->rx_notify_masked
|
KASAN: vmalloc-out-of-bounds Write in ringbuf_map_alloc
bpf
|
C |
done |
|
541 |
670d |
673d
|
24/25 |
285d |
b293dcc473d2
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
|
kernel BUG in mld_newpack
net
|
|
|
|
1 |
417d |
417d
|
24/25 |
285d |
d89d7ff01235
ipv6: ensure sane device mtu in tunnels
|
BUG: sleeping function called from invalid context in break_ksm
mm
|
C |
|
|
9 |
412d |
412d
|
24/25 |
285d |
d7c0e68dab98
mm/ksm: convert break_ksm() to use walk_page_range_vma()
|
KMSAN: uninit-value in ipvlan_queue_xmit
net
|
C |
|
|
2 |
463d |
1046d
|
24/25 |
285d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
possible deadlock in btrfs_commit_transaction
btrfs
|
C |
error |
done |
6 |
375d |
386d
|
24/25 |
285d |
b740d8061669
btrfs: free btrfs_path before copying root refs to userspace
|
net-next boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
23 |
538d |
544d
|
24/25 |
285d |
228432551bd8
virtio-rng: make device ready before making request
|
UBSAN: shift-out-of-bounds in __access_remote_vm
ntfs3
|
C |
done |
|
3 |
473d |
470d
|
24/25 |
285d |
caad9dd8792a
fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()
|
WARNING in kcov_mmap
mm
|
|
|
|
14 |
562d |
617d
|
24/25 |
285d |
ecc04463d1a3
kcov: don't generate a warning on vm_insert_page()'s failure
|
WARNING: suspicious RCU usage in ipmr_rtm_dumplink
net
|
|
|
|
11 |
526d |
529d
|
24/25 |
285d |
0fcae3c8b1b3
ipmr: fix a lockdep splat in ipmr_rtm_dumplink()
|
possible deadlock in nci_set_local_general_bytes
net
nfc
|
C |
|
|
32 |
336d |
387d
|
24/25 |
285d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
KASAN: slab-out-of-bounds Read in run_unpack
ntfs3
|
C |
|
|
97 |
332d |
440d
|
24/25 |
285d |
887bfc546097
fs/ntfs3: Fix slab-out-of-bounds read in run_unpack
|
upstream boot error: BUG: corrupted list in copy_process
kernel
|
|
|
|
1 |
479d |
479d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Read in __snd_rawmidi_transmit_peek
sound
usb
|
syz |
error |
|
48 |
487d |
597d
|
24/25 |
285d |
0665886ad139
ALSA: usb-audio: Clear MIDI port active flag after draining
|
BUG: MAX_LOCK_DEPTH too low! (3)
s390
net
|
C |
done |
|
18 |
657d |
666d
|
24/25 |
285d |
1de9770d121e
net/smc: Avoid overwriting the copies of clcsock callback functions
|
UBSAN: shift-out-of-bounds in hid_report_raw_event (2)
usb
input
|
C |
error |
|
1 |
390d |
386d
|
24/25 |
285d |
ec61b4191858
HID: core: fix shift-out-of-bounds in hid_report_raw_event
|
KASAN: use-after-free Read in port100_send_complete
nfc
usb
|
C |
|
|
1 |
642d |
638d
|
24/25 |
285d |
f80cfe2f2658
NFC: port100: fix use-after-free in port100_send_complete
|
KMSAN: uninit-value in iforce_init_device (2)
input
|
|
|
|
3 |
421d |
394d
|
24/25 |
285d |
b8ebf250997c
Input: iforce - invert valid length check when fetching device IDs
|
KASAN: use-after-free Read in usb_udc_uevent
usb
|
syz |
error |
|
30 |
496d |
1282d
|
24/25 |
285d |
2191c00855b0
USB: gadget: Fix use-after-free Read in usb_udc_uevent()
|
bpf-next boot error: WARNING in bpf_prog_pack_free
bpf
|
|
|
|
12 |
624d |
625d
|
24/25 |
285d |
96805674e562
bpf: Fix bpf_prog_pack for multi-node setup
|
general protection fault in skb_clone (5)
net
|
C |
done |
|
7 |
401d |
418d
|
24/25 |
285d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
KCSAN: data-race in fib6_info_hw_flags_set / fib6_purge_rt
net
|
|
|
|
1 |
690d |
688d
|
24/25 |
285d |
d95d6320ba7a
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
|
KASAN: use-after-free Read in macsec_get_iflink
net
|
|
|
|
1 |
562d |
558d
|
24/25 |
285d |
196a888ca657
macsec: fix UAF bug for real_dev
|
KASAN: slab-out-of-bounds Write in dbgfs_rm_context_write
damon
|
C |
error |
|
6 |
396d |
401d
|
24/25 |
285d |
1de09a7281ed
mm/damon/dbgfs: check if rm_contexts input is for a real context
|
KMSAN: kernel-infoleak in _copy_to_iter (7)
net
|
C |
|
|
138977 |
285d |
637d
|
24/25 |
285d |
633593a80898
sctp: fix kernel-infoleak for SCTP sockets
|
KASAN: use-after-free Write in inet_put_port
net
|
|
|
|
1 |
542d |
538d
|
24/25 |
285d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
upstream boot error: general protection fault in ieee80211_register_hw
wireless
|
|
|
|
1 |
478d |
478d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Read in bio_poll
block
|
C |
done |
|
6 |
576d |
576d
|
24/25 |
285d |
9650b453a3d4
block: ignore RWF_HIPRI hint for sync dio
|
WARNING in tcp_disconnect
net
|
|
|
|
2 |
413d |
417d
|
24/25 |
285d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
possible deadlock in virtual_nci_close
net
nfc
|
C |
done |
|
939 |
286d |
387d
|
24/25 |
285d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
WARNING in tcp_mtup_probe_success
net
|
|
|
|
3 |
553d |
559d
|
24/25 |
285d |
11825765291a
tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd
|
usb-testing boot error: BUG: unable to handle kernel paging request in insert_header
fs
|
|
|
|
1 |
463d |
463d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: slab-out-of-bounds Read in mi_find_attr
ntfs3
|
C |
done |
done |
1 |
357d |
353d
|
24/25 |
285d |
4f1dc7d9756e
fs/ntfs3: Validate attribute name offset
|
KASAN: use-after-free Read in do_garbage_collect
f2fs
|
C |
inconclusive |
|
2 |
388d |
388d
|
24/25 |
285d |
d3b7b4afd6b2
f2fs: fix to do sanity check on i_extra_isize in is_alive()
|
BUG: sleeping function called from invalid context in smc_pnet_add
net
|
C |
done |
|
45 |
667d |
668d
|
24/25 |
285d |
94fdd7c02a56
net/smc: use GFP_ATOMIC allocation in smc_pnet_add_eth()
|
KASAN: slab-out-of-bounds Write in bpf_prog_test_run_xdp
bpf
net
|
C |
done |
|
18 |
661d |
678d
|
24/25 |
285d |
a6763080856f
bpf: test_run: Fix OOB access in bpf_prog_test_run_xdp
|
usb-testing boot error: general protection fault in __handle_irq_event_percpu
kernel
|
|
|
|
1 |
464d |
464d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: slab-out-of-bounds Read in smc_fback_error_report
net
s390
|
C |
error |
|
72 |
588d |
664d
|
24/25 |
285d |
0558226cebee
net/smc: Fix slab-out-of-bounds issue in fallback
|
memory leak in iovec_from_user
fs
io-uring
|
C |
|
|
1 |
602d |
598d
|
24/25 |
285d |
323b190ba2de
io_uring: free iovec if file assignment fails
|
BUG: unable to handle kernel paging request in mi_enum_attr
ntfs3
|
C |
error |
done |
18 |
335d |
461d
|
24/25 |
285d |
0e8235d28f3a
fs/ntfs3: Check fields while reading
|
WARNING: refcount bug in nldev_newlink
rdma
|
C |
|
|
33 |
358d |
364d
|
24/25 |
285d |
e42f9c2e6aad
RDMA: Add missed netdev_put() for the netdevice_tracker
|
KASAN: slab-out-of-bounds Read in __hfs_brec_find
hfs
|
C |
|
|
5 |
359d |
373d
|
24/25 |
285d |
8d824e69d9f3
hfs: fix OOB Read in __hfs_brec_find
|
WARNING in bpf_check (3)
|
C |
done |
done |
1736 |
430d |
1364d
|
24/25 |
285d |
34dd3bad1a6f
bpf: Relax the requirement to use preallocated hash maps in tracing progs.
|
KASAN: use-after-free Read in raw_notifier_call_chain
kernel
|
|
|
|
68 |
372d |
610d
|
24/25 |
285d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KCSAN: data-race in packet_setsockopt / packet_setsockopt
net
|
|
|
|
1 |
692d |
680d
|
24/25 |
285d |
e42e70ad6ae2
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
|
memory leak in usb_set_configuration (3)
usb
|
C |
|
|
2 |
523d |
549d
|
24/25 |
285d |
945a9a8e448b
media: pvrusb2: fix memory leak in pvr_probe
|
KASAN: use-after-free Read in ar5523_cmd_tx_cb
usb
wireless
|
C |
inconclusive |
|
372 |
381d |
436d
|
24/25 |
285d |
b6702a942a06
wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
|
kernel panic: corrupted stack end in shmem_fault
cgroups
mm
|
|
|
|
5 |
292d |
423d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
possible deadlock in strp_work
net
|
C |
error |
|
4 |
471d |
472d
|
24/25 |
285d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
KASAN: use-after-free Read in __fib6_clean_all
net
|
|
|
|
30 |
375d |
628d
|
24/25 |
285d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KCSAN: data-race in do_epoll_wait / do_epoll_wait
fs
|
|
|
|
83 |
560d |
769d
|
24/25 |
285d |
d679ae94fdd5
list: fix a data-race around ep->rdllist
|
KMSAN: uninit-value in asix_mdio_write_nopm
net
usb
|
|
|
|
2 |
610d |
631d
|
24/25 |
285d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
WARNING in dlfb_submit_urb/usb_submit_urb
usb
fbdev
|
C |
done |
|
481 |
358d |
1619d
|
24/25 |
285d |
aaf7dbe07385
video: fbdev: udlfb: properly check endpoint type
|
KCSAN: data-race in kcm_rcv_strparser / kcm_rfree (7)
net
|
|
|
|
1 |
414d |
414d
|
24/25 |
285d |
0c745b5141a4
kcm: annotate data-races around kcm->rx_wait
|
linux-next test error: WARNING in set_peer
wireguard
|
|
|
|
39 |
442d |
449d
|
24/25 |
285d |
26c013108c12
wireguard: netlink: avoid variable-sized memcpy on sockaddr
|
BUG: sleeping function called from invalid context in blk_mq_release
block
|
|
|
|
1 |
615d |
615d
|
24/25 |
285d |
d578c770c852
block: avoid calling blkg_free() in atomic context
|
WARNING in devl_port_unregister
net
|
C |
|
|
1690 |
288d |
391d
|
24/25 |
285d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
WARNING: suspicious RCU usage in corrupted (2)
net
|
C |
unreliable |
|
7 |
529d |
541d
|
24/25 |
285d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
possible deadlock in __btrfs_release_delayed_node
btrfs
|
|
|
|
1 |
383d |
383d
|
24/25 |
285d |
796787c978ef
btrfs: do not modify log tree while holding a leaf from fs tree locked
|
usb-testing boot error: BUG: unable to handle kernel paging request in enqueue_task_fair
mm
|
|
|
|
1 |
463d |
463d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
kernel BUG in vhost_get_vq_desc
kvm
net
virtualization
|
C |
inconclusive |
|
19 |
649d |
662d
|
24/25 |
285d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
kernel panic: corrupted stack end in hub_event
kernfs
|
|
|
|
93 |
293d |
638d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in snd_rawmidi_transmit
sound
usb
|
C |
done |
done |
7 |
553d |
587d
|
24/25 |
285d |
0125de38122f
ALSA: usb-audio: Cancel pending work at closing a MIDI substream
|
kernel panic: corrupted stack end in dput (2)
ext4
|
|
|
|
1 |
384d |
384d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in skb_warn_bad_offload (3)
net
|
C |
done |
|
115 |
286d |
423d
|
24/25 |
285d |
87445f369cca
ipv6: ping: fix wrong checksum for large frames
|
WARNING in arp_ioctl
net
|
C |
error |
done |
17 |
357d |
427d
|
24/25 |
285d |
b5f0de6df6dc
net: dev: Convert sa_data to flexible array in struct sockaddr
|
kernel panic: corrupted stack end in tcp_setsockopt
netfilter
|
|
|
|
3 |
390d |
539d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
general protection fault in __pm_runtime_resume (2)
pm
|
C |
error |
|
7 |
624d |
633d
|
24/25 |
285d |
32cb08e95869
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
|
KMSAN: kernel-usb-infoleak in hif_usb_send
wireless
|
C |
|
|
18149 |
593d |
1212d
|
24/25 |
285d |
d1e0df1c57bd
ath9k_htc: fix uninit value bugs
|
WARNING in ipvlan_queue_xmit
net
|
C |
inconclusive |
|
4 |
463d |
463d
|
24/25 |
285d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
kernel panic: corrupted stack end in loop_workfn
ext4
|
|
|
|
1 |
593d |
593d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in notifier_call_chain
kernel
|
C |
error |
|
157 |
377d |
383d
|
24/25 |
285d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
WARNING in wnd_init
ntfs3
|
C |
done |
|
23 |
351d |
433d
|
24/25 |
285d |
0d0f659bf713
fs/ntfs3: Use __GFP_NOWARN allocation at wnd_init()
019d22eb0eb7
fs/ntfs3: Validate attribute data and valid sizes
|
upstream build error (18)
kernel
|
|
|
|
20 |
287d |
558d
|
24/25 |
285d |
e68b823ab0ba
arm64/hugetlb: Fix building errors in huge_ptep_clear_flush()
|
usb-testing boot error: general protection fault in __register_sysctl_table (2)
fs
|
|
|
|
1 |
463d |
463d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Read in si470x_int_in_callback (2)
usb
media
|
C |
error |
|
7303 |
353d |
1510d
|
24/25 |
285d |
7d21e0b1b41b
media: si470x: Fix use-after-free in si470x_int_in_callback()
|
BUG: unable to handle kernel NULL pointer dereference in f2fs_stop_discard_thread
f2fs
|
C |
done |
|
23 |
353d |
419d
|
24/25 |
285d |
91586ce0d39a
f2fs: fix to invalidate dcc->f2fs_issue_discard in error path
|
WARNING in __perf_event_overflow
perf
|
C |
done |
|
9 |
374d |
399d
|
24/25 |
285d |
bb88f9695460
perf: Improve missing SIGTRAP checking
|
WARNING: still has locks held in tls_rx_reader_lock
net
|
C |
done |
|
4 |
503d |
504d
|
24/25 |
285d |
dde06aaa89b7
tls: rx: release the sock lock on locking timeout
|
KASAN: use-after-free Read in setup_rw_floppy
block
|
|
|
|
3 |
656d |
672d
|
24/25 |
285d |
233087ca0636
floppy: disable FDRAWCMD by default
|
memory leak in gs_usb_probe
can
usb
|
C |
|
|
1 |
621d |
617d
|
24/25 |
285d |
50d34a0d151d
can: gs_usb: gs_make_candev(): fix memory leak for devices with extended bit timing configuration
|
memory leak in airspy_probe
usb
media
|
C |
|
|
1 |
486d |
482d
|
24/25 |
285d |
23bc5eb55f8c
media: airspy: fix memory leak in airspy probe
|
general protection fault in hugetlbfs_parse_param
fs
mm
|
C |
error |
|
5 |
401d |
412d
|
24/25 |
285d |
26215b7ee923
hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()
|
possible deadlock in __snd_pcm_lib_xfer
sound
|
C |
unreliable |
|
3 |
618d |
617d
|
24/25 |
285d |
bc55cfd5718c
ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
|
WARNING: suspicious RCU usage in in6_dump_addrs
net
|
C |
unreliable |
|
613 |
497d |
541d
|
24/25 |
285d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
upstream boot error: INFO: task hung in hwrng_register
crypto
|
|
|
|
23 |
543d |
550d
|
24/25 |
285d |
228432551bd8
virtio-rng: make device ready before making request
|
kernel panic: corrupted stack end in inet_rtm_newaddr
net
|
|
|
|
23 |
288d |
625d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in __oom_reap_task_mm
mm
|
|
|
|
1 |
665d |
660d
|
24/25 |
285d |
f798a1d4f94d
mm: fix use-after-free bug when mm->mmap is reused after being freed
|
inconsistent lock state in smc_fback_state_change
net
s390
|
C |
error |
|
7 |
377d |
383d
|
24/25 |
285d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
memory leak in blk_iolatency_init (2)
block
cgroups
|
C |
|
|
131 |
427d |
634d
|
24/25 |
285d |
daaca3522a8e
block: release rq qos structures for queue without disk
|
linux-next test error: WARNING in devl_port_unregister
net
|
|
|
|
23 |
391d |
394d
|
24/25 |
285d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
KMSAN: uninit-value in idmouse_open
usb
|
C |
|
|
5 |
448d |
443d
|
24/25 |
285d |
bce2b0539933
usb: idmouse: fix an uninit-value in idmouse_open
|
KASAN: use-after-free Read in tcp_retransmit_timer (5)
net
|
C |
unreliable |
|
16000 |
369d |
1381d
|
24/25 |
285d |
3a58f13a881e
net: rds: acquire refcount on TCP sockets
|
WARNING in inet_csk_destroy_sock (2)
io-uring
net
|
C |
done |
|
8 |
334d |
420d
|
24/25 |
285d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
WARNING in ovl_fh_to_dentry
overlayfs
|
C |
|
|
169 |
359d |
439d
|
24/25 |
285d |
cf8aa9bf97ca
ovl: Use "buf" flexible array for memcpy() destination
|
WARNING in notify_change (2)
fuse
|
C |
unreliable |
|
2 |
378d |
379d
|
24/25 |
285d |
44361e8cf9dd
fuse: lock inode unconditionally in fuse_fallocate()
|
KASAN: null-ptr-deref Read in ida_free (2)
usb
|
C |
done |
|
3 |
529d |
530d
|
24/25 |
285d |
90bc2af24638
USB: gadget: Fix double-free bug in raw_gadget driver
|
KASAN: use-after-free Read in nf_confirm
netfilter
|
C |
done |
|
605 |
551d |
568d
|
24/25 |
285d |
56b14ecec97f
netfilter: conntrack: re-fetch conntrack after insertion
|
WARNING in __vunmap
net
|
C |
error |
error |
154 |
434d |
1754d
|
24/25 |
285d |
8a04d2fc700f
xfrm: Update ipcomp_scratches with NULL when freed
|
memory leak in xas_nomem
mm
|
C |
|
|
1 |
561d |
557d
|
24/25 |
285d |
69a37a8ba1b4
mm/huge_memory: Fix xarray node memory leak
|
WARNING in io_req_complete_failed
io-uring
|
C |
error |
|
2 |
376d |
373d
|
24/25 |
285d |
c06c6c5d2767
io_uring: always lock in io_apoll_task_func
|
memory leak in napi_get_frags
net
|
C |
|
|
11 |
1034d |
1055d
|
24/25 |
285d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
kernel panic: corrupted stack end in mld_dad_work
mm
|
|
|
|
1 |
457d |
457d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
memory leak in netlink_policy_dump_add_policy
net
|
C |
|
|
1 |
485d |
481d
|
24/25 |
285d |
249801360db3
net: genl: fix error path memory leak in policy dumping
|
KCSAN: data-race in fib6_clean_node / inet6_csk_route_socket
net
|
|
|
|
1 |
685d |
685d
|
24/25 |
285d |
aafc2e3285c2
ipv6: annotate accesses to fn->fn_sernum
|
KCSAN: data-race in lru_add_fn / tcp_build_frag
mm
|
|
|
|
4 |
455d |
464d
|
24/25 |
285d |
84ce071e38a6
net: introduce __skb_fill_page_desc_noacc
|
KASAN: use-after-free Read in nf_tables_trans_destroy_work
netfilter
|
C |
done |
|
6 |
415d |
422d
|
24/25 |
285d |
d4bc8271db21
netfilter: nf_tables: netlink notifier might race to release objects
26b5934ff419
netfilter: nf_tables: release flow rule object from commit path
|
linux-next boot error: WARNING in kfence_protect
kasan
mm
|
|
|
|
12 |
383d |
384d
|
24/25 |
285d |
3e844d842d49
x86/mm: Ensure forced page table splitting
|
KASAN: use-after-free Read in jbd2_journal_wait_updates
ext4
|
C |
error |
|
143 |
622d |
666d
|
24/25 |
285d |
cc16eecae687
jbd2: fix use-after-free of transaction_t race
|
BUG: unable to handle kernel paging request in inet_unhash
net
|
|
|
|
3 |
381d |
462d
|
24/25 |
285d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
bpf boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
13 |
536d |
544d
|
24/25 |
285d |
228432551bd8
virtio-rng: make device ready before making request
|
KASAN: vmalloc-out-of-bounds Read in __text_poke
kernel
|
|
|
|
5 |
588d |
660d
|
24/25 |
285d |
d24d2a2b0a81
bpf: bpf_prog_pack: Set proper size before freeing ro_header
|
usb-testing boot error: BUG: unable to handle kernel paging request in follow_page_mask
mm
|
|
|
|
1 |
460d |
456d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in llc_ui_connect
net
|
C |
done |
|
17 |
618d |
621d
|
24/25 |
285d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
memory leak in ndisc_send_rs
net
|
C |
|
|
2 |
782d |
829d
|
24/25 |
285d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
WARNING in find_vma
mm
|
C |
done |
|
2616 |
462d |
485d
|
24/25 |
285d |
d6f35446d076
binder_alloc: Add missing mmap_lock calls when using the VMA
44e602b4e52f
binder_alloc: add missing mmap_lock calls when using the VMA
|
BUG: unable to handle kernel paging request in kvm_arch_hardware_enable
kvm
|
C |
error |
|
28 |
473d |
477d
|
24/25 |
285d |
4ba4f4194274
KVM: Properly unwind VM creation if creating debugfs fails
|
WARNING in __brelse
udf
|
C |
inconclusive |
|
22 |
292d |
434d
|
24/25 |
285d |
c791730f2554
udf: Avoid double brelse() in udf_rename()
|
WARNING: ODEBUG bug in kvm_xen_vcpu_set_attr
kvm
io-uring
|
C |
done |
|
4 |
493d |
545d
|
24/25 |
285d |
af735db31285
KVM: x86/xen: Initialize Xen timer only once
c03689913635
KVM: x86/xen: Stop Xen timer before changing IRQ
|
WARNING in erofs_iget
erofs
mm
|
C |
|
|
6 |
406d |
456d
|
24/25 |
285d |
1dd73601a1cb
erofs: fix order >= MAX_ORDER warning due to crafted negative i_size
|
KCSAN: data-race in bond_3ad_initiate_agg_selection / bond_3ad_state_machine_handler (2)
net
|
|
|
|
1 |
660d |
660d
|
24/25 |
285d |
9ceaf6f76b20
bonding: fix data-races around agg_select_timer
|
INFO: task hung in hci_dev_close_sync
bluetooth
|
C |
unreliable |
|
2366 |
426d |
582d
|
24/25 |
285d |
e36bea6e78ab
Bluetooth: core: Fix deadlock on hci_power_on_sync.
|
KMSAN: kernel-infoleak in vmci_host_unlocked_ioctl (2)
kernel
|
C |
|
|
2 |
434d |
434d
|
24/25 |
285d |
e5b0d06d9b10
misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
|
general protection fault in llc_ui_sendmsg
net
|
C |
done |
|
365 |
618d |
622d
|
24/25 |
285d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
WARNING in nf_tables_exit_net
netfilter
|
C |
error |
|
3 |
403d |
403d
|
24/25 |
285d |
03c1f1ef1584
netfilter: Cleanup nft_net->module_list from nf_tables_exit_net()
|
upstream boot error: general protection fault in __get_vm_area_node
kernel
|
|
|
|
1 |
477d |
477d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
possible deadlock in console_lock_spinning_enable (2)
serial
|
C |
inconclusive |
done |
117 |
566d |
752d
|
24/25 |
285d |
09c5ba0aa2fc
printk: add kthread console printers
|
WARNING in scsi_alloc_sgtables
scsi
fuse
|
C |
|
|
93 |
525d |
871d
|
24/25 |
285d |
d9a434fa0c12
scsi: core: Fix warning in scsi_alloc_sgtables()
|
UBSAN: shift-out-of-bounds in nilfs_load_super_block
nilfs
|
C |
error |
|
3 |
397d |
407d
|
24/25 |
285d |
610a2a3d7d8b
nilfs2: fix shift-out-of-bounds/overflow in nilfs_sb2_bad_offset()
|
INFO: task hung in blk_freeze_queue (3)
arm
|
C |
|
|
8 |
382d |
462d
|
24/25 |
285d |
1de7c3cf48fc
nbd: Fix hung when signal interrupts nbd_start_device_ioctl()
|
UBSAN: shift-out-of-bounds in init_sb (3)
gfs2
|
C |
|
|
40 |
414d |
480d
|
24/25 |
285d |
670f8ce56dd0
gfs2: Check sb_bsize_shift after reading superblock
|
memory leak in keyctl_watch_key
keyrings
lsm
|
C |
|
|
1 |
630d |
626d
|
24/25 |
285d |
3d8dcf278b1e
watch_queue: Actually free the watch
|
memory leak in fbcon_set_font (2)
fbdev
|
C |
|
|
1 |
367d |
366d
|
24/25 |
285d |
3c3bfb8586f8
fbdev: fbcon: release buffer when fbcon_do_set_font() failed
|
KASAN: use-after-free Read in inet_twsk_kill
net
|
|
|
|
86 |
677d |
680d
|
24/25 |
285d |
fbb8295248e1
tcp: allocate tcp_death_row outside of struct netns_ipv4
|
INFO: task hung in scsi_remove_host
scsi
usb
|
C |
done |
|
328 |
436d |
472d
|
24/25 |
285d |
2b36209ca818
scsi: core: Revert "Call blk_mq_free_tag_set() earlier"
d94b2d00f7bf
scsi: core: Revert "Make sure that hosts outlive targets"
f782201ebc2b
scsi: core: Revert "Make sure that targets outlive devices"
70e8d057bef5
scsi: core: Revert "Simplify LLD module reference counting"
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
net
|
C |
inconclusive |
|
12 |
634d |
1035d
|
24/25 |
285d |
c700525fcc06
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
WARNING in binder_alloc_vma_close
kernel
|
C |
done |
|
18 |
437d |
527d
|
24/25 |
285d |
b0cab80ecd54
android: binder: fix lockdep check on clearing vma
|
general protection fault in ext4_fill_super
ext4
|
C |
done |
|
5 |
473d |
688d
|
24/25 |
285d |
7c268d4ce2d3
ext4: fix potential NULL pointer dereference in ext4_fill_super()
|
INFO: task hung in vhost_work_dev_flush
virtualization
kvm
net
|
C |
error |
|
2 |
665d |
656d
|
24/25 |
285d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
stack segment fault in skb_clone
net
|
C |
unreliable |
inconclusive |
3 |
540d |
725d
|
24/25 |
285d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
WARNING: suspicious RCU usage in bond_ethtool_get_ts_info
net
|
C |
done |
|
6 |
571d |
573d
|
24/25 |
285d |
9b80ccda233f
bonding: fix missed rcu protection
|
WARNING in nsim_map_alloc_elem
mm
|
C |
error |
|
7 |
480d |
500d
|
24/25 |
285d |
d0b80a9edb1a
netdevsim: Avoid allocation warnings triggered from user space
|
KASAN: use-after-free Read in nilfs_segctor_sync
nilfs
|
C |
error |
|
3 |
391d |
401d
|
24/25 |
285d |
8cccf05fe857
nilfs2: fix use-after-free bug of ns_writer on remount
|
KASAN: slab-out-of-bounds Write in watch_queue_set_filter
kernel
|
C |
inconclusive |
|
7 |
626d |
629d
|
24/25 |
285d |
c993ee0f9f81
watch_queue: Fix filter limit check
|
UBSAN: array-index-out-of-bounds in pvr2_i2c_core_init
usb
pvrusb2
|
C |
inconclusive |
|
4 |
569d |
601d
|
24/25 |
285d |
471bec68457a
media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init
|
upstream boot error: BUG: unable to handle kernel paging request in copy_thread
kernel
|
|
|
|
1 |
477d |
477d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING in ext4_expand_extra_isize_ea
ext4
|
C |
error |
done |
3 |
359d |
371d
|
24/25 |
285d |
cc12a6f25e07
ext4: allocate extended attribute value in vmalloc area
|
general protection fault in do_check_common
bpf
|
C |
done |
|
5 |
517d |
521d
|
24/25 |
285d |
d1a6edecc1fd
bpf: Check attach_func_proto more carefully in check_return_code
|
usb-testing boot error: BUG: unable to handle kernel paging request in copy_namespaces
kernel
|
|
|
|
1 |
462d |
462d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in rlb_req_update_slave_clients
net
|
C |
inconclusive |
|
3 |
549d |
549d
|
24/25 |
285d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
WARNING in usbtmc_ioctl/usb_submit_urb
usb
|
C |
inconclusive |
|
8 |
298d |
643d
|
24/25 |
285d |
e9b667a82cdc
usb: usbtmc: Fix bug in pipe direction for control transfers
|
BUG: unable to handle kernel paging request in evict
exfat
|
C |
error |
done |
23 |
393d |
438d
|
24/25 |
285d |
4e3c51f4e805
fs: do not update freeing inode i_io_list
|
BUG: unable to handle kernel paging request in truncate_inode_partial_folio
fs
mm
|
C |
error |
|
4 |
486d |
526d
|
24/25 |
285d |
84ac013046cc
secretmem: fix unhandled fault in truncate
|
WARNING in hugetlb_wp
mm
|
C |
error |
|
3 |
397d |
403d
|
24/25 |
285d |
f347454d0341
mm/gup: disallow FOLL_FORCE|FOLL_WRITE on hugetlb mappings
|
inconsistent lock state in l2tp_tunnel_register
net
|
|
|
|
5599 |
371d |
384d
|
24/25 |
285d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KASAN: invalid-free in tcp_disconnect
net
|
C |
unreliable |
|
74 |
414d |
428d
|
24/25 |
285d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
riscv/fixes boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
8 |
487d |
538d
|
24/25 |
285d |
228432551bd8
virtio-rng: make device ready before making request
|
WARNING in wireless_send_event
wireless
|
C |
|
|
210 |
401d |
439d
|
24/25 |
285d |
e3e6e1d16a4c
wifi: wext: use flex array destination for memcpy()
|
WARNING in register_shrinker_prepared
mm
f2fs
|
C |
error |
|
64 |
546d |
548d
|
24/25 |
285d |
5035ebc644ae
mm: shrinkers: introduce debugfs interface for memory shrinkers
|
WARNING in __split_huge_page_tail
arch
mm
io-uring
|
C |
error |
|
155 |
334d |
406d
|
24/25 |
285d |
5aae9265ee1a
mm: prep_compound_tail() clear page->private
|
WARNING in __folio_mark_dirty
gfs2
|
C |
error |
|
1791 |
285d |
769d
|
24/25 |
285d |
e897be17a441
nilfs2: fix lockdep warnings in page operations for btree nodes
|
BUG: sleeping function called from invalid context in static_key_slow_inc
|
C |
done |
|
82 |
372d |
384d
|
24/25 |
285d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KCSAN: data-race in ip6_dst_gc / ip6_dst_gc (3)
net
|
|
|
|
2 |
601d |
603d
|
24/25 |
285d |
9cb7c013420f
ipv6: make ip6_rt_gc_expire an atomic_t
|
KASAN: use-after-free Read in ath9k_hif_usb_rx_cb (2)
|
C |
done |
|
48810 |
482d |
1115d
|
24/25 |
285d |
0ac4827f78c7
ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
|
kernel BUG in ntfs_read_inode_mount
ntfs
|
|
|
|
1 |
689d |
688d
|
24/25 |
285d |
714fbf2647b1
ntfs: add sanity check on allocation size
|
kernel BUG in btrfs_drop_extents
btrfs
|
C |
|
|
4 |
361d |
376d
|
24/25 |
285d |
162d053e15fe
btrfs: do not BUG_ON() on ENOMEM when dropping extent items for a range
|
BUG: sleeping function called from invalid context in binder_ioctl
kernel
|
C |
done |
|
30 |
562d |
568d
|
24/25 |
285d |
aed86f8add0e
binder: fix atomic sleep when get extended error
|
KASAN: use-after-free Read in madvise_update_vma
|
C |
done |
|
38 |
649d |
667d
|
24/25 |
285d |
942341dcc574
mm: fix use-after-free when anon vma name is used after vma is freed
|
WARNING in mcba_usb_probe/usb_submit_urb
usb
can
|
C |
error |
|
537 |
615d |
1610d
|
24/25 |
285d |
136bed0bfd3b
can: mcba_usb: properly check endpoint type
|
KASAN: use-after-free Read in register_shrinker_prepared (2)
mm
|
C |
done |
|
1145 |
397d |
435d
|
24/25 |
285d |
bd86c69dae65
NFSD: unregister shrinker when nfsd_init_net() fails
|
possible deadlock in rds_tcp_reset_callbacks
rds
|
C |
error |
|
1458 |
394d |
472d
|
24/25 |
285d |
a91b750fd662
net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks()
|
BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission
lsm
|
C |
|
|
1 |
392d |
388d
|
24/25 |
285d |
578b565b240a
9p/fd: Fix write overflow in p9_read_work
|
possible deadlock in nci_close_device
net
nfc
|
|
|
|
2 |
365d |
379d
|
24/25 |
285d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
memory leak in nft_chain_parse_hook
netfilter
|
C |
|
|
1 |
467d |
464d
|
24/25 |
285d |
77972a36ecc4
netfilter: nf_tables: clean up hook list when offload flags check fails
|
memory leak in sctp_sched_prio_set
sctp
|
C |
|
|
2 |
378d |
383d
|
24/25 |
285d |
9ed7bfc79542
sctp: fix memory leak in sctp_stream_outq_migrate()
|
BUG: sleeping function called from invalid context in sk_psock_stop
|
C |
done |
|
232 |
486d |
544d
|
24/25 |
285d |
697fb80a5364
bpf: Fix sockmap calling sleepable function in teardown path
|
KCSAN: data-race in dropmon_net_event / trace_napi_poll_hit
net
|
|
|
|
1 |
681d |
664d
|
24/25 |
285d |
dcd54265c8bc
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
|
linux-next boot error: BUG: unable to handle kernel paging request in copy_namespaces
kernel
|
|
|
|
1 |
477d |
477d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
upstream boot error: general protection fault in enqueue_entity
block
|
|
|
|
1 |
477d |
477d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in btrfs_stop_all_workers
btrfs
|
C |
done |
|
554 |
583d |
588d
|
24/25 |
285d |
385de0ef387d
btrfs: use a normal workqueue for rmw_workers
|
BUG: corrupted list in hci_conn_add_sysfs
bluetooth
|
C |
error |
done |
9 |
439d |
439d
|
24/25 |
285d |
448a496f7606
Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times
|
kernel BUG in __set_page_owner_handle
gfs2
|
C |
|
|
37 |
415d |
577d
|
24/25 |
285d |
cd8c1fd8cdd1
mm/page_owner: use strscpy() instead of strlcpy()
|
kernel BUG in netem_enqueue
net
|
|
|
|
9 |
356d |
581d
|
24/25 |
285d |
eeee4b77dc52
net: add more debug info in skb_checksum_help()
|
KASAN: slab-out-of-bounds Write in hfs_asc2mac
hfs
|
C |
error |
|
161 |
358d |
376d
|
24/25 |
285d |
c53ed55cb275
hfs: Fix OOB Write in hfs_asc2mac
|
WARNING in __dma_map_sg_attrs
|
C |
inconclusive |
|
65 |
485d |
735d
|
24/25 |
285d |
9e9fa6a9198b
udmabuf: Set the DMA mask for the udmabuf device (v2)
|
WARNING: ODEBUG bug in __cancel_work
bluetooth
|
C |
inconclusive |
|
1 |
478d |
474d
|
24/25 |
285d |
2d2cb3066f2c
Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create()
|
kernel panic: corrupted stack end in ext4_file_mmap
ext4
|
|
|
|
2 |
290d |
435d
|
24/25 |
285d |
b81d591386c3
riscv: Increase stack size under KASAN
|
INFO: trying to register non-static key in gsmld_write
serial
|
C |
error |
|
803 |
456d |
485d
|
24/25 |
285d |
4bb1a53be85f
tty: n_gsm: initialize more members at gsm_alloc_mux()
|
linux-next boot error: WARNING in kthread_should_stop
crypto
|
|
|
|
6 |
393d |
393d
|
24/25 |
285d |
db516da95ce4
hw_random: use add_hwgenerator_randomness() for early entropy
|
KMSAN: uninit-value in ath9k_htc_rx_msg
wireless
|
C |
|
|
17731 |
295d |
1214d
|
24/25 |
285d |
b383e8abed41
wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()
|
memory leak in vlan_dev_set_egress_priority (2)
net
|
C |
|
|
1 |
516d |
516d
|
24/25 |
285d |
72a0b329114b
vlan: fix memory leak in vlan_newlink()
|
WARNING in ieee80211_link_info_change_notify
wireless
|
C |
inconclusive |
|
1376 |
285d |
528d
|
24/25 |
285d |
591e73ee3f73
wifi: mac80211: properly skip link info driver update
|
general protection fault in ieee80211_subif_start_xmit (2)
wireless
|
C |
error |
|
5 |
402d |
409d
|
24/25 |
285d |
780854186946
wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit()
|
kernel BUG in ext4_mb_use_inode_pa
ext4
|
C |
error |
done |
2 |
429d |
428d
|
24/25 |
285d |
4bb26f2885ac
ext4: avoid crash when inline data creation follows DIO write
|
kernel BUG in hugepage_add_anon_rmap
mm
|
|
|
|
2 |
649d |
645d
|
24/25 |
285d |
4eecb8b9163d
mm/migrate: Convert remove_migration_ptes() to folios
|
INFO: task hung in __writeback_inodes_sb_nr (5)
ext4
|
C |
done |
|
48 |
292d |
662d
|
24/25 |
285d |
7d9b1b578d67
ip6mr: fix use-after-free in ip6mr_sk_done()
|
kernel BUG in mcopy_continue
mm
|
|
|
|
4 |
544d |
541d
|
24/25 |
285d |
73f37dbcfe17
mm: userfaultfd: fix UFFDIO_CONTINUE on fallocated shmem pages
|
memory leak in z_erofs_do_read_page
erofs
|
C |
|
|
1 |
370d |
370d
|
24/25 |
285d |
c42c0ffe8117
erofs: Fix pcluster memleak when its block address is zero
|
possible deadlock in fscrypt_initialize
fscrypt
|
|
|
|
10 |
285d |
595d
|
24/25 |
285d |
4c0d5778385c
ext4: don't set up encryption key during jbd2 transaction
|
linux-next boot error: general protection fault in rcu_core
kernel
|
|
|
|
1 |
478d |
478d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
upstream boot error: WARNING in genl_register_family
net
|
|
|
|
468 |
398d |
404d
|
24/25 |
285d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
upstream boot error: WARNING in copy_process
kernel
|
|
|
|
5 |
476d |
479d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Write in io_sendrecv_fail
io-uring
|
C |
|
|
75 |
416d |
439d
|
24/25 |
285d |
a75155faef4e
io_uring/net: fix UAF in io_sendrecv_fail()
|
general protection fault in reweight_entity
kernel
|
C |
error |
done |
10 |
661d |
715d
|
24/25 |
285d |
13765de8148f
sched/fair: Fix fault in reweight_entity
|
KASAN: use-after-free Read in __nf_register_net_hook
netfilter
|
C |
error |
|
5 |
647d |
647d
|
24/25 |
285d |
56763f12b0f0
netfilter: fix use-after-free in __nf_register_net_hook()
|
WARNING in bpf_test_finish
bpf
net
|
C |
done |
|
3 |
647d |
647d
|
24/25 |
285d |
530e214c5b5a
bpf, test_run: Fix overflow in XDP frags bpf_test_finish
|
general protection fault in gfs2_dump_glock
gfs2
|
C |
|
|
25 |
287d |
688d
|
24/25 |
285d |
428f651cb80b
gfs2: assign rgrp glock before compute_bitstructs
|
upstream test error: WARNING: ODEBUG bug in mgmt_index_removed
bluetooth
|
|
|
|
551 |
482d |
489d
|
24/25 |
285d |
3f2893d3c142
Bluetooth: don't try to cancel uninitialized works at mgmt_index_removed()
|
BUG: corrupted list in p9_fd_cancel (2)
net
v9fs
fuse
|
C |
error |
|
8 |
384d |
409d
|
24/25 |
285d |
11c10956515b
9p/fd: fix issue of list_del corruption in p9_fd_cancel()
|
KASAN: use-after-free Read in ntfs_attr_find
ntfs
|
C |
done |
|
74 |
301d |
468d
|
24/25 |
285d |
36a4d82dddbb
ntfs: fix out-of-bounds read in ntfs_attr_find()
|
upstream boot error: BUG: unable to handle kernel paging request in sched_change_group
cgroups
|
|
|
|
1 |
479d |
479d
|
24/25 |
285d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Write in enqueue_timer
net
|
|
|
|
1 |
386d |
386d
|
24/25 |
285d |
ab0377803daf
mrp: introduce active flags to prevent UAF when applicant uninit
|
KMSAN: uninit-value in ___bpf_prog_run (3)
bpf
|
C |
|
|
5 |
599d |
601d
|
24/25 |
285d |
99c07327ae11
netlink: reset network and mac headers in netlink_dump()
|
kernel BUG in __page_mapcount
kernel
|
C |
error |
|
45 |
685d |
920d
|
24/25 |
285d |
24d7275ce279
fs/proc: task_mmu.c: don't read mapcount for migration entry
|
general protection fault in check_helper_call
bpf
|
C |
done |
|
4 |
504d |
509d
|
24/25 |
285d |
d1a6edecc1fd
bpf: Check attach_func_proto more carefully in check_return_code
|
memory leak in do_replace
bridge
netfilter
|
C |
|
|
1 |
447d |
443d
|
24/25 |
285d |
62ce44c4fff9
netfilter: ebtables: fix memory leak when blob is malformed
|
KASAN: null-ptr-deref Write in kcm_tx_work (3)
net
|
C |
inconclusive |
inconclusive |
7 |
432d |
533d
|
24/25 |
285d |
ec7eede369fe
kcm: avoid potential race in kcm_tx_work
|
general protection fault in ax25_send_frame (2)
hams
|
|
|
|
13 |
396d |
383d
|
24/25 |
285d |
e97c089d7a49
rose: Fix NULL pointer dereference in rose_send_frame()
|
general protection fault in xas_create_range
mm
|
|
|
< |