KASAN: user-memory-access Write in zram_slot_lock
block
reiserfs
|
C |
done |
|
3 |
7d12h |
7d12h
|
15/24 |
never |
3eb96946f0be
block: make bio_check_eod work for zero sized devices
|
WARNING in rmqueue
erofs
|
C |
error |
|
2 |
58d |
181d
|
23/24 |
never |
cc4efd3dd2ac
erofs: stop parsing non-compact HEAD index if clusterofs is invalid
|
KASAN: slab-out-of-bounds Read in __xfs_xattr_put_listent
xfs
|
|
|
|
12 |
104d |
108d
|
23/24 |
never |
dd07bb8b6baf
xfs: revert commit 8954c44ff477
|
KASAN: wild-memory-access Write in v9fs_get_acl
9p
|
C |
|
|
7 |
49d |
83d
|
23/24 |
never |
707823e7f22f
9P FS: Fix wild-memory-access write in v9fs_get_acl
|
KASAN: use-after-free Read in rdma_close
9p
net
f2fs
|
C |
|
|
590 |
225d |
246d
|
0/24 |
never |
9p: client_create/destroy: only call trans_mod->close after create
|
WARNING in xfs_qm_dqget_cache_insert
xfs
|
C |
error |
|
123 |
16d |
188d
|
23/24 |
never |
4b827b3f305d
xfs: remove WARN when dquot cache insertion fails
|
KMSAN: uninit-value in xfs_getfsmap_helper
xfs
|
|
|
|
1 |
114d |
108d
|
23/24 |
never |
60b730a40c43
xfs: fix uninitialized variable access
|
KASAN: slab-out-of-bounds Read in xfs_getbmap
xfs
|
C |
done |
|
5 |
27d |
28d
|
22/24 |
never |
1bba82fe1afa
xfs: fix negative array access in xfs_getbmap
|
KMSAN: kernel-infoleak in _copy_to_iter (8)
|
C |
|
|
15127 |
now |
84d
|
23/24 |
never |
8222d5910dae
xfrm: Zero padding when dumping algos and encap
|
KMSAN: kernel-infoleak in copyout (2)
net
|
C |
|
|
6703 |
11h43m |
1159d
|
23/24 |
never |
8222d5910dae
xfrm: Zero padding when dumping algos and encap
|
BUG: unable to handle kernel paging request in clear_user_rep_good
xfs
|
syz |
error |
done |
2 |
59d |
115d
|
23/24 |
never |
d2c95f9d6802
x86: don't use REP_GOOD or ERMS for user memory clearing
|
BUG: sleeping function called from invalid context in alloc_buffer_head
mm
|
|
|
|
15 |
15d |
20d
|
1/24 |
never |
workingset: add missing rcu_read_unlock() in lru_gen_refault()
|
KASAN: use-after-free Read in p9_req_put
9p
net
|
|
|
|
35 |
12d |
285d
|
1/24 |
never |
9p: p9_client_create: use p9_client_destroy on failure
|
upstream boot error: BUG: unable to handle kernel NULL pointer dereference in load_balance
|
|
|
|
5 |
18d |
24d
|
22/24 |
never |
2b951b0efbaa
ARM: 9297/1: vfp: avoid unbalanced stack on 'success' return path
|
general protection fault in jhash
wireless
|
C |
done |
done |
15 |
39d |
58d
|
23/24 |
never |
2bef4d1fb8b3
wifi: mac80211_hwsim: fix potential NULL deref in hwsim_pmsr_report_nl()
|
KASAN: slab-use-after-free Read in hci_conn_hash_flush
bluetooth
|
C |
error |
|
3481 |
1h29m |
86d
|
19/24 |
never |
a2ac591cb4d8
Bluetooth: Fix UAF in hci_conn_hash_flush again
ca1fd42e7dbf
Bluetooth: Fix potential double free caused by hci_conn_unlink
|
memory leak in ath9k_hif_usb_firmware_cb
wireless
|
C |
|
|
1591 |
134d |
930d
|
23/24 |
never |
9b25e3985477
wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
|
INFO: task hung in rfcomm_process_sessions (2)
bluetooth
|
C |
error |
done |
14 |
152d |
426d
|
23/24 |
never |
1d80d57ffcb5
Bluetooth: Fix possible deadlock in rfcomm_sk_state_change
|
KASAN: slab-use-after-free Read in hci_conn_del
bluetooth
|
|
|
|
7 |
4d10h |
27d
|
19/24 |
never |
ca1fd42e7dbf
Bluetooth: Fix potential double free caused by hci_conn_unlink
|
WARNING: bad unlock balance in l2cap_recv_frame
bluetooth
|
|
|
|
75 |
33d |
44d
|
23/24 |
never |
25e97f7b1866
Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp
|
memory leak in __build_skb (3)
wireless
|
C |
|
|
2 |
150d |
148d
|
23/24 |
never |
9b25e3985477
wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
|
memory leak in ath9k_hif_usb_rx_cb
wireless
|
C |
|
|
1 |
165d |
161d
|
23/24 |
never |
0af54343a762
wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails
|
WARNING in pegasus_open/usb_submit_urb
input
usb
|
C |
|
|
7 |
71d |
1081d
|
23/24 |
never |
b3d80fd27a3c
Input: pegasus-notetaker - check pipe type when probing
|
KMSAN: uninit-value in ath9k_wmi_ctrl_rx
wireless
|
C |
|
|
34 |
16h34m |
84d
|
0/24 |
never |
wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx
|
WARNING: kmalloc bug in memslot_rmap_alloc
kvm
|
C |
unreliable |
|
3 |
601d |
631d
|
1/24 |
never |
KVM: replace large kvmalloc allocation with vmalloc
|
WARNING in ath6kl_htc_pipe_rx_complete
usb
wireless
|
C |
error |
|
2008 |
29d |
1299d
|
23/24 |
never |
75c4a8154cb6
wifi: ath6kl: reduce WARN to dev_dbg() in callback
|
WARNING in kvm_tdp_mmu_invalidate_all_roots
kvm
|
|
|
|
1658 |
35d |
38d
|
23/24 |
never |
edbdb43fc96b
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
|
general protection fault in virtio_transport_purge_skbs
|
C |
done |
|
3 |
67d |
67d
|
23/24 |
never |
b465518dc27d
vsock/loopback: use only sk_buff_head.lock to protect the packet queue
|
net test error: WARNING: suspicious RCU usage in veth_set_xdp_features
|
|
|
|
24 |
75d |
77d
|
23/24 |
never |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
linux-next test error: WARNING: suspicious RCU usage in veth_set_xdp_features
|
|
|
|
12 |
75d |
76d
|
23/24 |
never |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
KASAN: slab-use-after-free Read in kvm_tdp_mmu_invalidate_all_roots
kvm
|
|
|
|
3 |
37d |
35d
|
23/24 |
never |
edbdb43fc96b
KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated
|
general protection fault in __sk_mem_raise_allocated
net
|
|
|
|
1 |
12d |
7d20h
|
18/24 |
never |
ad42a35bdfc6
udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().
|
WARNING in kvm_arch_vcpu_ioctl_run (4)
kvm
|
C |
error |
|
259 |
6h41m |
74d
|
23/24 |
never |
0dc902267cb3
KVM: x86: Suppress pending MMIO write exits if emulator detects exception
|
INFO: trying to register non-static key in rxe_cleanup_task (2)
rdma
|
|
|
|
148 |
24d |
90d
|
23/24 |
never |
b2b1ddc45745
RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
|
general protection fault in udf_fiiter_write_fi
udf
|
C |
error |
|
2 |
137d |
140d
|
23/24 |
never |
f950fd052913
udf: Protect rename against modification of moved directory
|
KASAN: slab-out-of-bounds Write in udf_find_entry
udf
|
C |
error |
|
19 |
200d |
231d
|
16/24 |
never |
c8af247de385
udf: Fix a slab-out-of-bounds write bug in udf_find_entry()
1c80afa04db3
udf: Implement searching for directory entry using new iteration code
|
unregister_netdevice: waiting for DEV to become free (7)
|
C |
inconclusive |
|
20404 |
14h46m |
192d
|
23/24 |
never |
266e9b3475ba
RDMA/siw: Remove namespace check from siw_netdev_event()
|
WARNING in udf_setsize
udf
|
C |
done |
|
22 |
31d |
163d
|
23/24 |
never |
256fe4162f8b
udf: Do not update file length for failed writes to inline files
|
general protection fault in xpad_probe
usb
|
C |
done |
|
24 |
26d |
48d
|
23/24 |
never |
53bea86b5712
Revert "Input: xpad - fix support for some third-party controllers"
|
KASAN: slab-out-of-bounds Read in udf_get_filelongad
udf
|
C |
|
|
2 |
169d |
168d
|
23/24 |
never |
53cafe1d6d8e
udf: Do not bother merging very long extents
|
WARNING in udf_free_inode
udf
|
C |
error |
|
19 |
101d |
235d
|
23/24 |
never |
85a37983ec69
udf: Detect system inodes linked into directory hierarchy
|
KASAN: null-ptr-deref Write in udf_write_fi
udf
|
C |
inconclusive |
done |
51 |
122d |
245d
|
23/24 |
never |
e9109a92d2a9
udf: Convert udf_rename() to new directory iteration code
|
net-next test error: WARNING in register_net_sysctl
net
|
|
|
|
21 |
12d |
13d
|
2/24 |
never |
Revert "net: Remove low_thresh in ip defrag"
|
general protection fault in mark_buffer_dirty_inode (2)
udf
|
C |
|
|
32 |
23d |
181d
|
23/24 |
never |
e9109a92d2a9
udf: Convert udf_rename() to new directory iteration code
|
linux-next test error: WARNING in register_net_sysctl
net
|
|
|
|
9 |
13d |
13d
|
2/24 |
never |
Revert "net: Remove low_thresh in ip defrag"
|
WARNING in __udf_add_aext
udf
|
C |
error |
|
169 |
57d |
231d
|
23/24 |
never |
e9109a92d2a9
udf: Convert udf_rename() to new directory iteration code
|
general protection fault in free_percpu (2)
wireless
|
|
|
|
1 |
136d |
136d
|
23/24 |
never |
80f8a66dede0
Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"
|
BUG: unable to handle kernel NULL pointer dereference in __writepage
udf
|
C |
done |
|
17 |
99d |
163d
|
23/24 |
never |
79d3c6dbada4
udf: Convert in-ICB files to use udf_writepages()
|
WARNING in udf_expand_dir_adinicb
udf
|
C |
done |
|
2 |
113d |
109d
|
23/24 |
never |
df97f64dfa31
udf: Avoid directory type conversion failure due to ENOMEM
|
WARNING in remove_proc_entry (5)
scsi
|
C |
|
|
158 |
73d |
115d
|
23/24 |
never |
2172e84ea00b
SUNRPC: Fix occasional warning when destroying gss_krb5_enctypes
|
general protection fault in cache_first_page
squashfs
|
C |
error |
|
4 |
130d |
143d
|
23/24 |
never |
f65c4bbbd682
Squashfs: fix handling and sanity checking of xattr_ids count
72e544b1b283
squashfs: harden sanity check in squashfs_read_xattr_id_table
|
kernel BUG in fou_build_udp
net
|
C |
|
|
1 |
25d |
25d
|
23/24 |
never |
c88f8d5cd95f
UPSTREAM: sit: update dev->needed_headroom in ipip6_tunnel_bind_dev()
|
BUG: bad usercopy in con_font_op
mm
hardening
|
C |
done |
|
1 |
87d |
87d
|
23/24 |
never |
18365ebf23f3
tty: vt: protect KD_FONT_OP_GET_TALL from unbound access
|
KCSAN: data-race in __fput / __tty_hangup (4)
kernel
|
|
|
|
1 |
61d |
38d
|
1/24 |
never |
tty: tty_io: remove hung_up_tty_fops
|
KASAN: use-after-free Write in gadgetfs_kill_sb
usb
|
C |
error |
|
5 |
133d |
167d
|
23/24 |
never |
d18dcfe9860e
USB: gadgetfs: Fix race between mounting and unmounting
|
WARNING in sisusb_send_bulk_msg/usb_submit_urb
usb
|
C |
unreliable |
|
418 |
41d |
1427d
|
23/24 |
never |
df05a9b05e46
USB: sisusbvga: Add endpoint checks
|
WARNING in usbtmc_ioctl/usb_submit_urb (2)
usb
|
C |
done |
|
3 |
28d |
40d
|
21/24 |
never |
94d25e912898
USB: usbtmc: Fix direction for 0-length ioctl control messages
|
KCSAN: data-race in tcp_disconnect / tcp_poll (7)
net
|
|
|
|
2 |
43d |
21d
|
23/24 |
never |
e14cadfd80d7
tcp: add annotations around sk->sk_shutdown accesses
|
general protection fault in skb_dequeue (3)
wireless
|
C |
done |
|
6 |
108d |
117d
|
23/24 |
never |
33b3b041543e
splice: Add a func to do a splice from an O_DIRECT file without ITER_PIPE
|
WARNING in net_free
net
|
|
|
|
1 |
43d |
43d
|
23/24 |
never |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
memory leak in copy_process (5)
kernel
|
C |
|
|
1 |
87d |
83d
|
23/24 |
never |
2aab4b969002
af_unix: fix struct pid leaks in OOB support
|
WARNING in cleanup_net (2)
net
|
C |
error |
|
72 |
25d |
52d
|
23/24 |
never |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
INFO: rcu detected stall in ext4_file_write_iter (6)
ext4
|
C |
error |
|
8 |
47d |
110d
|
23/24 |
never |
d125d1349abe
alarmtimer: Prevent starvation by small intervals and SIG_IGN
|
BUG: unable to handle kernel paging request in __alloc_skb
net
|
|
|
|
1 |
181d |
181d
|
23/24 |
never |
031af50045ea
arm64: cmpxchg_double*: hazard against entire exchange variable
|
WARNING in _copy_from_iter
block
tipc
|
C |
error |
|
32057 |
77d |
172d
|
23/24 |
never |
11a4d6f67cf5
tipc: fix kernel warning when sending SYN message
|
general protection fault in sctp_outq_tail
sctp
|
C |
error |
|
5 |
56d |
68d
|
23/24 |
never |
2584024b2355
sctp: check send stream number after wait_for_sndbuf
|
memory leak in __proc_create
scsi
usb
|
syz |
|
|
1 |
83d |
83d
|
23/24 |
never |
be03df3d4bfe
scsi: core: Fix a procfs host directory removal regression
|
WARNING: suspicious RCU usage in bond_mii_monitor
net
|
C |
|
|
13 |
144d |
163d
|
23/24 |
never |
42c7ded0eeac
bonding: fix lockdep splat in bond_miimon_commit()
|
WARNING in default_device_exit_batch (4)
net
|
C |
error |
|
954 |
66d |
192d
|
23/24 |
never |
e667d4690986
bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
|
kernel BUG in rxrpc_put_peer
net
afs
|
C |
|
|
80 |
131d |
174d
|
23/24 |
never |
9d35d880e0e4
rxrpc: Move client call connection to the I/O thread
03fc55adf876
rxrpc: Only disconnect calls in the I/O thread
|
BUG: stack guard page was hit in inet6_release
bpf
net
|
C |
done |
|
4 |
125d |
174d
|
23/24 |
never |
ddce1e091757
bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
|
kernel BUG in rxrpc_put_call
afs
net
|
C |
done |
|
9 |
128d |
140d
|
23/24 |
never |
01644a1f98ff
rxrpc: Fix wrong error return in rxrpc_connect_call()
|
KCSAN: data-race in rxrpc_send_data / rxrpc_set_call_completion
afs
net
|
|
|
|
2 |
56d |
35d
|
23/24 |
never |
2b5fdc0f5caa
rxrpc: Fix potential data race in rxrpc_wait_to_be_connected()
|
KASAN: stack-out-of-bounds Read in proc_pid_stack
riscv
|
|
|
|
2 |
24d |
27d
|
23/24 |
never |
76950340cf03
riscv: Use READ_ONCE_NOCHECK in imprecise unwinding stack mode
|
WARNING in sock_map_del_link
bpf
net
|
|
|
|
91 |
46d |
46d
|
23/24 |
never |
8c5c2a4898e3
bpf, sockmap: Revert buggy deadlock fix in the sockhash and sockmap
|
riscv/fixes boot error: WARNING in __apply_to_page_range (2)
bpf
|
|
|
|
5 |
97d |
159d
|
23/24 |
never |
96f9d4daf745
riscv: Rework kasan population functions
|
riscv/fixes test error: BUG: soft lockup in corrupted (2)
net
virt
|
|
|
|
4 |
229d |
306d
|
23/24 |
never |
61fc1ee8be26
riscv: Bump COMMAND_LINE_SIZE value to 1024
|
KMSAN: uninit-value in raw_sock_get
net
|
|
|
|
1 |
50d |
48d
|
23/24 |
never |
0a78cf7264d2
raw: Fix NULL deref in raw_get_next().
|
general protection fault in ethnl_set_plca_cfg
net
|
C |
done |
|
37 |
133d |
134d
|
23/24 |
never |
28dbf774bc87
plca.c: fix obvious mistake in checking retval
|
linux-next test error: UBSAN: array-index-out-of-bounds in alloc_pid
kernel
|
|
|
|
9 |
12d |
12d
|
0/24 |
never |
pid: Replace struct pid 1-element array with flex-array
|
BUG: unable to handle kernel NULL pointer dereference in __build_skb_around
bpf
net
|
C |
done |
|
29 |
70d |
75d
|
23/24 |
never |
e5995bc7e2ba
bpf, test_run: fix crashes due to XDP frame overwriting/corruption
|
KASAN: use-after-free Read in put_pmu_ctx
perf
|
C |
|
|
51 |
144d |
161d
|
23/24 |
never |
a551844e345b
perf: Fix use-after-free in error path
|
WARNING in put_pmu_ctx
perf
|
C |
error |
|
66 |
107d |
161d
|
23/24 |
never |
4f64a6c9f6f1
perf: Fix perf_event_pmu_context serialization
|
KCSAN: data-race in __bpf_lru_list_rotate / __htab_lru_percpu_map_update_elem (5)
bpf
|
|
|
|
10 |
13h20m |
34d
|
3/24 |
never |
bpf: Address KCSAN report on bpf_lru_list
|
memory leak in vfs_tmpfile_open
overlayfs
|
C |
|
|
14 |
127d |
228d
|
23/24 |
never |
baabaa505563
ovl: fix tmpfile leak
|
KASAN: slab-out-of-bounds Write in copy_verifier_state
bpf
|
C |
error |
done |
825 |
143d |
161d
|
23/24 |
never |
45435d8da71f
bpf: Always use maximal size for copy_array()
|
WARNING: stack going in the wrong direction? at do_syscall_64
kernel
|
|
|
|
193 |
96d |
103d
|
23/24 |
never |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
WARNING: stack going in the wrong direction? at finish_task_switch.isra.NUM
kernel
|
|
|
|
2 |
98d |
100d
|
23/24 |
never |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
general protection fault in bpf_struct_ops_link_create
bpf
net
|
C |
done |
|
17 |
64d |
66d
|
23/24 |
never |
55fbae05476d
bpf: Check IS_ERR for the bpf_map_get() return value
|
WARNING: stack going in the wrong direction? at __sys_setsockopt
net
|
|
|
|
6 |
97d |
102d
|
23/24 |
never |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
WARNING: bad unlock balance in bpf
bpf
|
C |
done |
|
12 |
3d13h |
3d15h
|
2/24 |
never |
bpf: Fix bad unlock balance on freeze_mutex
|
WARNING: can't access registers at entry_SYSCALL_64_after_hwframe
|
C |
|
|
15 |
97d |
102d
|
23/24 |
never |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
WARNING in bpf_verifier_vlog
bpf
|
C |
inconclusive |
|
6 |
26d |
262d
|
2/24 |
never |
bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log
|
KASAN: slab-out-of-bounds Read in ntfs_listxattr
ntfs3
|
C |
done |
|
17 |
40d |
173d
|
1/24 |
never |
ntfs: Fix panic about slab-out-of-bounds caused by ntfs_listxattr()
|
WARNING in nilfs_dat_prepare_end
nilfs
|
C |
error |
|
288 |
84d |
238d
|
23/24 |
never |
5124a0a54985
nilfs2: replace WARN_ONs for invalid DAT metadata block requests
|
WARNING in nilfs_dat_commit_end
nilfs
|
C |
error |
|
267 |
84d |
241d
|
23/24 |
never |
602ce7b8e134
nilfs2: prevent WARNING in nilfs_dat_commit_end()
|
general protection fault in start_transaction
btrfs
|
C |
error |
|
3 |
145d |
158d
|
23/24 |
never |
b7adbf9ada35
btrfs: fix race between quota rescan and disable leading to NULL pointer deref
|
kernel BUG in btrfs_csum_one_bio
btrfs
|
C |
done |
|
4 |
46d |
124d
|
16/24 |
never |
806570c0bb7b
btrfs: handle memory allocation failure in btrfs_csum_one_bio
|
KMSAN: uninit-value in nilfs_add_checksums_on_logs
nilfs
|
|
|
|
1075 |
7d18h |
84d
|
23/24 |
never |
7397031622e0
nilfs2: initialize "struct nilfs_binfo_dat"->bi_pad field
ef832747a82d
nilfs2: initialize unused bytes in segment summary blocks
|
KASAN: slab-use-after-free Write in nilfs_inode_sub_blocks
nilfs
|
|
|
|
4 |
14d |
18d
|
21/24 |
never |
9b5a04ac3ad9
nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()
|
INFO: task hung in extent_write_cache_pages
btrfs
|
C |
error |
|
5 |
21d |
130d
|
23/24 |
never |
519b7e13b5ae
btrfs: lock the inode in shared mode before starting fiemap
|
KASAN: slab-use-after-free Read in nilfs_load_inode_block
nilfs
|
C |
error |
|
10 |
6d00h |
22d
|
21/24 |
never |
9b5a04ac3ad9
nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()
|
WARNING: kmalloc bug in btrfs_ioctl_send
btrfs
|
C |
done |
|
53 |
111d |
181d
|
23/24 |
never |
33e17b3f5ab7
btrfs: send: limit number of clones and allocated memory size
|
INFO: task hung in nilfs_segctor_thread
nilfs
|
C |
error |
|
94 |
27d |
201d
|
23/24 |
never |
99b9402a36f0
nilfs2: fix underflow in second superblock position calculations
|
possible deadlock in nilfs_evict_inode
nilfs
|
|
|
|
5 |
70d |
88d
|
23/24 |
never |
42560f9c92cc
nilfs2: fix sysfs interface lifetime
|
KMSAN: uninit-value in longest_match
btrfs
|
|
|
|
4 |
166d |
171d
|
23/24 |
never |
eadd7deca0ad
btrfs: zlib: zero-initialize zlib workspace
|
possible deadlock in __nilfs_error (2)
nilfs
|
|
|
|
1 |
71d |
67d
|
23/24 |
never |
42560f9c92cc
nilfs2: fix sysfs interface lifetime
|
WARNING in io_cqring_overflow_flush
io-uring
|
C |
|
|
2 |
163d |
159d
|
23/24 |
never |
52ea806ad983
io_uring: finish waiting before flushing overflow entries
|
KMSAN: kernel-infoleak in nilfs_ioctl_wrap_copy
nilfs
|
|
|
|
4 |
57d |
84d
|
23/24 |
never |
003587000276
nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy()
|
KMSAN: uninit-value in vfs_write
fs
|
C |
|
|
3 |
113d |
83d
|
23/24 |
never |
2b4c99f7d9a5
can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write
|
INFO: task hung in lock_mount
nilfs
|
C |
error |
error |
1238 |
40d |
1855d
|
23/24 |
never |
a6a491c04888
nilfs2: fix infinite loop in nilfs_mdt_get_block()
|
kernel BUG in nilfs_btnode_create_block
nilfs
|
C |
|
|
8 |
10d |
217d
|
0/24 |
never |
nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key()
|
general protection fault in nilfs_btree_insert
nilfs
|
C |
error |
|
2 |
155d |
152d
|
23/24 |
never |
7633355e5c7f
nilfs2: fix general protection fault in nilfs_btree_insert()
|
WARNING in mark_buffer_dirty (4)
nilfs
|
C |
inconclusive |
|
1121 |
15h17m |
329d
|
23/24 |
never |
28a65b49eb53
nilfs2: do not write dirty data after degenerating to read-only
|
WARNING in print_tainted
ext4
|
C |
|
|
119 |
10h51m |
161d
|
23/24 |
never |
c6adf659a8ba
can: isotp: check CAN address family in isotp_bind()
4f027cba8216
can: isotp: split tx timer into transmission and timeout
|
general protection fault in pn533_out_complete
nfc
|
C |
error |
|
15 |
121d |
135d
|
23/24 |
never |
484b7059796e
nfc: pn533: initialize struct pn533_out_arg properly
|
WARNING in j1939_xtp_rx_abort_one
|
C |
done |
|
379 |
125d |
663d
|
23/24 |
never |
d0553680f94c
can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
|
memory leak in nfc_genl_se_io
nfc
|
C |
|
|
1 |
105d |
101d
|
23/24 |
never |
25ff6f8a5a3b
nfc: fix memory leak of se_io context in nfc_genl_se_io
|
WARNING: refcount bug in nr_release (4)
hams
|
C |
|
|
24 |
105d |
409d
|
23/24 |
never |
409db27e3a2e
netrom: Fix use-after-free of a listening socket.
|
KASAN: use-after-free Read in do_accept
hams
|
|
|
|
1 |
136d |
131d
|
23/24 |
never |
409db27e3a2e
netrom: Fix use-after-free of a listening socket.
|
KASAN: use-after-free Write in nr_release
hams
|
C |
done |
error |
1784 |
4d10h |
1277d
|
23/24 |
never |
611792920925
netrom: Fix use-after-free caused by accept on already connected socket
|
WARNING in j1939_session_deactivate_activate_next
can
|
C |
error |
done |
502 |
55d |
461d
|
23/24 |
never |
d0553680f94c
can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
|
possible deadlock in j1939_sk_errqueue
can
|
C |
unreliable |
|
227 |
61d |
598d
|
23/24 |
never |
d1366b283d94
can: j1939: prevent deadlock by moving j1939_sk_errqueue()
|
KASAN: use-after-free Write in j1939_sock_pending_del
can
|
syz |
done |
error |
17 |
1289d |
1301d
|
0/24 |
never |
can: j1939: socket: rework socket locking for
|
memory leak in nr_create (2)
hams
|
C |
|
|
11 |
60d |
120d
|
23/24 |
never |
611792920925
netrom: Fix use-after-free caused by accept on already connected socket
|
KASAN: use-after-free Read in j1939_session_get_by_addr
|
C |
done |
error |
66 |
1289d |
1301d
|
0/24 |
never |
can: j1939: transport: make sure the aborted session will be
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (6)
net
|
|
|
|
2 |
58d |
56d
|
23/24 |
never |
a1865f2e7d10
netlink: annotate lockless accesses to nlk->max_recvmsg_len
|
possible deadlock in static_key_slow_inc (2)
cgroups
|
C |
error |
|
31946 |
23m |
208d
|
23/24 |
never |
57dcd64c7e03
cgroup,freezer: hold cpu_hotplug_lock before freezer_mutex
|
WARNING in c_start (2)
kernel
|
|
|
|
616173 |
63d |
81d
|
23/24 |
never |
e7304080e0e5
cpumask: relax sanity checking constraints
|
upstream-arm64 build error
|
|
|
|
11 |
98d |
101d
|
23/24 |
never |
d54170812ef1
arm64: fix .idmap.text assertion for large kernels
|
KCSAN: data-race in netlink_getname / netlink_insert (4)
net
|
|
|
|
2 |
125d |
130d
|
23/24 |
never |
c1bb9484e3b0
netlink: annotate data races around nlk->portid
|
general protection fault in __aria_aesni_avx_gfni_crypt_16way
crypto
|
C |
|
|
49 |
4d23h |
21d
|
14/24 |
never |
6ab39f99927e
crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
|
KCSAN: data-race in __netlink_dump_start / netlink_recvmsg (5)
net
|
|
|
|
2 |
50d |
21d
|
23/24 |
never |
a939d14919b7
netlink: annotate accesses to nlk->cb_running
|
INFO: task hung in nfnetlink_rcv_msg (3)
netfilter
|
C |
done |
|
5 |
171d |
182d
|
23/24 |
never |
5e29dc36bd5e
netfilter: ipset: Rework long task execution when adding/deleting entries
|
WARNING: proc registration bug in clusterip_tg_check (3)
netfilter
|
C |
done |
inconclusive |
9 |
129d |
663d
|
23/24 |
never |
9db5d918e2c0
netfilter: ip_tables: remove clusterip target
|
WARNING in __mod_timer
keyrings
lsm
|
|
|
|
2 |
57d |
91d
|
23/24 |
never |
63a759694eed
debugobject: Prevent init race with static objects
|
possible deadlock in __mod_timer (2)
kernel
|
|
|
|
1 |
19d |
19d
|
15/24 |
never |
eb799279fb1f
debugobjects: Don't wake up kswapd from fill_pool()
|
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table
bridge
netfilter
|
C |
error |
|
4 |
100d |
101d
|
23/24 |
never |
e58a171d35e3
netfilter: ebtables: fix table blob use-after-free
|
INFO: rcu detected stall in devlink_nl_cmd_port_get_dumpit
net
|
syz |
|
|
7 |
89d |
105d
|
23/24 |
never |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
BUG: bad usercopy in put_cmsg
hardening
mm
|
C |
|
|
3 |
105d |
106d
|
23/24 |
never |
2558b8039d05
net: use a bounce buffer for copying skb->mark
|
KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (12)
net
|
|
|
|
3 |
83d |
82d
|
23/24 |
never |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
KCSAN: data-race in ip_finish_output2 / ip_tunnel_xmit
net
|
|
|
|
1 |
120d |
119d
|
23/24 |
never |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
INFO: task hung in tls_sw_sendpage (3)
net
|
|
|
|
30 |
94d |
91d
|
23/24 |
never |
f3221361dc85
net: tls: avoid hanging tasks on the tx_lock
|
UBSAN: array-index-out-of-bounds in qfq_update_agg (4)
net
|
|
|
|
1 |
41d |
41d
|
23/24 |
never |
3037933448f6
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
|
WARNING: refcount bug in consume_skb
net
|
|
|
|
3 |
109d |
118d
|
23/24 |
never |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
memory leak in regulatory_hint_core
wireless
|
C |
|
|
2 |
189d |
217d
|
23/24 |
never |
399ab7fe0fa0
net: sched: fix memory leak in tcindex_set_parms
|
WARNING in nla_get_range_unsigned (2)
net
|
C |
done |
|
433 |
66d |
101d
|
23/24 |
never |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
upstream test error: unregister_netdevice: waiting for DEV to become free
net
|
|
|
|
204 |
102d |
109d
|
23/24 |
never |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
WARNING: locking bug in __perf_event_task_sched_in (2)
perf
|
|
|
|
79 |
121d |
139d
|
23/24 |
never |
93e71edfd90c
devlink: keep the instance mutex alive until references are gone
|
WARNING in devlink_free
net
|
|
|
|
10 |
125d |
138d
|
23/24 |
never |
93e71edfd90c
devlink: keep the instance mutex alive until references are gone
|
KMSAN: uninit-value in qrtr_tx_resume
arm-msm
net
|
C |
|
|
8 |
63d |
124d
|
23/24 |
never |
6417070918de
net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()
|
WARNING: refcount bug in qrtr_recvmsg (2)
arm-msm
net
|
C |
error |
|
2 |
74d |
68d
|
23/24 |
never |
44d807320000
net: qrtr: Fix a refcount bug in qrtr_recvmsg()
|
KASAN: use-after-free Read in ovs_vport_locate
openvswitch
|
|
|
|
1 |
165d |
160d
|
23/24 |
never |
95637d91fefd
net: openvswitch: release vport resources on failure
|
kernel BUG in nsh_gso_segment
net
|
|
|
|
1 |
33d |
19d
|
21/24 |
never |
c83b49383b59
net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
|
INFO: trying to register non-static key in net_free
net
|
syz |
error |
|
17982 |
97d |
110d
|
23/24 |
never |
6e77a5a4af05
net: initialize net->notrefcnt_tracker earlier
|
kernel BUG in ip_frag_next
net
|
C |
done |
|
9 |
124d |
131d
|
23/24 |
never |
f72ff8b81ebc
net: fix kfree_skb_list use of skb_mark_not_on_list
|
general protection fault in pause_prepare_data
net
|
C |
error |
|
34 |
124d |
125d
|
23/24 |
never |
f5be9caf7bf0
net: ethtool: fix NULL pointer dereference in pause_prepare_data()
|
WARNING in class_register
usb
|
C |
done |
|
10 |
59d |
58d
|
0/24 |
never |
driver core: class : fix slab-use-after-free Read in class_register()
|
net-next boot error: BUG: bad usercopy in qrtr_sendmsg
hardening
mm
|
|
|
|
30 |
109d |
110d
|
23/24 |
never |
0b34d68049b0
net: enable usercopy for skb_small_head_cache
|
KCSAN: data-race in sk_stream_wait_connect / tcp_disconnect (2)
net
|
|
|
|
1 |
52d |
21d
|
23/24 |
never |
d0ac89f6f987
net: deal with most data-races in sk_wait_event()
|
KASAN: slab-use-after-free Read in class_register
usb
|
C |
done |
|
13 |
60d |
58d
|
23/24 |
never |
f326ea63ecc6
driver core: class: fix slab-use-after-free Read in class_register()
|
KASAN: use-after-free Read in cfusbl_device_notify
net
|
C |
done |
|
341 |
82d |
229d
|
23/24 |
never |
9781e98a9711
net: caif: Fix use-after-free in cfusbl_device_notify()
|
WARNING in inet_sock_destruct (3)
net
|
C |
|
|
82 |
3d03h |
96d
|
23/24 |
never |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
memory leak in class_create
usb
|
C |
|
|
9 |
10d |
28d
|
20/24 |
never |
ddaf098ea779
driver core: class: properly reference count class_dev_iter()
|
WARNING in vkms_get_vblank_timestamp
dri
|
syz |
error |
|
34 |
6h50m |
53d
|
23/24 |
never |
f2c7ca890182
drm/atomic-helper: Don't set deadline for modesets
|
KASAN: invalid-free in skb_free_head (2)
net
|
C |
error |
|
25 |
31d |
96d
|
23/24 |
never |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
KCSAN: data-race in do_recvmmsg / do_recvmmsg (2)
net
|
|
|
|
1 |
47d |
21d
|
23/24 |
never |
e05a5f510f26
net: annotate sk->sk_err write from do_recvmmsg()
|
WARNING in __usbnet_read_cmd/usb_submit_urb
usb
|
C |
error |
|
5 |
112d |
143d
|
16/24 |
never |
93fd565919cf
net: USB: Fix wrong-direction WARNING in plusb.c
net: USB: Fix wrong-direction WARNING in plusb.c
|
KMSAN: uninit-value in kalmia_send_init_packet
usb
|
C |
|
|
2 |
119d |
118d
|
23/24 |
never |
c68f345b7c42
net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
|
general protection fault in tcindex_set_parms
net
|
C |
done |
|
2 |
105d |
105d
|
23/24 |
never |
42018a322bd4
net/sched: tcindex: search key must be 16 bits
|
WARNING in blkdev_put (2)
block
|
C |
unreliable |
|
250 |
66d |
94d
|
23/24 |
never |
428913bce1e6
block: fix wrong mode for blkdev_put() from disk_scan_partitions()
|
general protection fault in taprio_dequeue
net
|
|
|
|
1 |
149d |
149d
|
23/24 |
never |
3a415d59c1db
net/sched: sch_taprio: fix possible use-after-free
|
KMSAN: uninit-value in qdisc_run
kernel
|
C |
|
|
2 |
202d |
138d
|
23/24 |
never |
3a415d59c1db
net/sched: sch_taprio: fix possible use-after-free
|
BUG: scheduling while atomic in msleep
net
|
C |
done |
|
40 |
123d |
132d
|
23/24 |
never |
ea4fdbaa2f77
net/sched: sch_taprio: do not schedule in taprio_reset()
|
WARNING: fbcon: Driver 'vkmsdrmfb' missed to adjust virtual screen size (0x0 vs. 64x768)
|
C |
unreliable |
error |
24 |
323d |
322d
|
23/24 |
never |
1935f0deb611
drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var
|
general protection fault in drm_crtc_next_vblank_start
dri
|
C |
done |
|
4 |
59d |
56d
|
23/24 |
never |
6f1ccbf07453
drm/vblank: Fix for drivers that do not drm_vblank_init()
|
KASAN: slab-use-after-free Read in tcf_action_destroy
net
|
C |
error |
|
32 |
17d |
92d
|
23/24 |
never |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
KASAN: null-ptr-deref Read in __fl_put
net
|
C |
error |
|
16 |
72d |
91d
|
23/24 |
never |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
WARNING in htb_destroy
net
|
C |
done |
|
2 |
108d |
108d
|
23/24 |
never |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
BUG: unable to handle kernel paging request in atm_tc_destroy
net
|
C |
error |
|
3 |
109d |
108d
|
23/24 |
never |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
WARNING in iomap_iter
xfs
|
C |
inconclusive |
|
141 |
140d |
567d
|
16/24 |
never |
6acd87d50998
erofs/zmap.c: Fix incorrect offset calculation
c490a0b5a4f3
loop: Check for overflow while configuring loop
|
general protection fault in hrtimer_active (5)
kernel
|
C |
error |
|
22 |
105d |
109d
|
23/24 |
never |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
WARNING: CPU: NUM PID: NUM at mm/page_alloc.c:LINE get_page_from_freeli
erofs
mm
|
C |
error |
|
1 |
162d |
158d
|
23/24 |
never |
12724ba38992
erofs: fix kvcalloc() misuse with __GFP_NOFAIL
|
general protection fault in erofs_bread (2)
erofs
|
C |
done |
|
7 |
2d16h |
12d
|
17/24 |
never |
0a17567b4a85
erofs: fix null-ptr-deref caused by erofs_xattr_prefixes_init
erofs: fix null-ptr-deref caused by erofs_xattr_prefixes_init
|
BUG: corrupted list in taprio_destroy
net
|
C |
done |
|
2 |
107d |
107d
|
23/24 |
never |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
memory leak in tcf_pedit_init
net
|
C |
|
|
1 |
30d |
30d
|
23/24 |
never |
1b483d9f5805
net/sched: act_pedit: free pedit keys on bail from offset check
|
memory leak in tcindex_set_parms (3)
net
|
C |
|
|
1 |
178d |
174d
|
23/24 |
never |
8c710f75256b
net/sched: Retire tcindex classifier
|
INFO: task hung in tcindex_partial_destroy_work
|
C |
done |
unreliable |
84 |
837d |
973d
|
23/24 |
never |
8c710f75256b
net/sched: Retire tcindex classifier
|
KCSAN: data-race in __neigh_event_send / neigh_resolve_output (7)
net
|
|
|
|
43 |
48d |
21d
|
23/24 |
never |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
KCSAN: data-race in __neigh_update / neigh_resolve_output
net
|
|
|
|
1 |
54d |
21d
|
23/24 |
never |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
WARNING in __mpage_writepage
hfs
|
C |
error |
|
81 |
117d |
118d
|
1/24 |
never |
mpage-convert-__mpage_writepage-to-use-a-folio-more-fully-fix
|
WARNING in ip6erspan_tunnel_xmit (2)
net
|
C |
unreliable |
|
5 |
70d |
70d
|
23/24 |
never |
8e50ed774554
erspan: do not use skb_mac_header() in ndo_start_xmit()
|
KCSAN: data-race in drain_all_stock / drain_obj_stock (4)
cgroups
mm
|
|
|
|
3 |
22d |
38d
|
1/24 |
never |
mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()
|
KMSAN: uninit-value in ethnl_set_linkmodes (2)
net
|
C |
|
|
40 |
23d |
329d
|
23/24 |
never |
9ad685dbfe7e
ethtool: Fix uninitialized number of lanes
|
kernel BUG in hpage_collapse_scan_file
mm
|
C |
unreliable |
|
3 |
42d |
80d
|
23/24 |
never |
2ce0bdfebc74
mm: khugepaged: fix kernel BUG in hpage_collapse_scan_file()
|
KASAN: use-after-free Read in xfs_btree_lookup_get_block
xfs
|
C |
error |
done |
7 |
54d |
151d
|
23/24 |
never |
22ed903eee23
xfs: verify buffer contents when we skip log replay
|
memory leak in prctl
mm
|
C |
|
|
1 |
163d |
159d
|
23/24 |
never |
a1193de562f5
mm: fix vma->anon_name memory leak for anonymous shmem VMAs
|
UBSAN: shift-out-of-bounds in ext2_fill_super
ext4
|
C |
|
|
2228 |
3d13h |
94d
|
23/24 |
never |
62aeb94433fc
ext2: Check block size validity during mount
|
kernel BUG in find_mergeable_anon_vma
mm
|
C |
error |
|
4 |
86d |
82d
|
23/24 |
never |
3dd443254941
mm: enable maple tree RCU mode by default
|
possible deadlock in tty_port_tty_get
serial
|
C |
|
|
22661 |
39d |
241d
|
23/24 |
never |
1007843a9190
mm/page_alloc: fix potential deadlock on zonelist_update_seq seqlock
|
general protection fault in vma_interval_tree_remove
mm
io-uring
|
C |
done |
|
13 |
374d |
392d
|
1/24 |
never |
mm/mmap: fix advanced maple tree API for mmap_region()
mm/mmap: qvoid dereferencing next on null in BUG_ON()
|
possible deadlock in jbd2_journal_lock_updates
ext4
|
C |
error |
|
83144 |
1d15h |
294d
|
23/24 |
never |
62913ae96de7
ext4, jbd2: add an optimized bmap for the journal inode
|
possible deadlock in __jbd2_log_wait_for_space
ext4
|
C |
error |
|
34993 |
46d |
294d
|
23/24 |
never |
62913ae96de7
ext4, jbd2: add an optimized bmap for the journal inode
|
possible deadlock in ext4_bmap
ext4
|
C |
error |
|
78082 |
2d19h |
294d
|
23/24 |
never |
62913ae96de7
ext4, jbd2: add an optimized bmap for the journal inode
|
WARNING in vma_merge
mm
|
C |
done |
|
9721 |
6m |
397d
|
1/24 |
never |
mm/mlock: use maple state in apply_mlockall_flags()
|
KASAN: slab-use-after-free Read in mas_next_entry
mm
|
syz |
error |
|
3 |
52d |
55d
|
23/24 |
never |
f4e9e0e69468
mm/mempolicy: fix use-after-free of VMA iterator
|
linux-next boot error: WARNING in prepare_kswapd_sleep
mm
|
|
|
|
15 |
915d |
916d
|
1/24 |
never |
mm/memcg: warn on missing memcg on mem_cgroup_page_lruvec()
|
linux-next test error: WARNING in vma_merge
mm
|
|
|
|
6 |
124d |
125d
|
1/24 |
never |
mm/madvise: fix VMA_ITERATOR start position
|
WARNING: suspicious RCU usage in mas_walk
kernfs
|
C |
error |
|
234 |
66d |
395d
|
23/24 |
never |
6db504ce55bd
mm/ksm: fix race with VMA iteration and mm_struct teardown
|
WARNING: suspicious RCU usage in mas_start
kernfs
|
C |
error |
done |
23 |
62d |
94d
|
23/24 |
never |
6db504ce55bd
mm/ksm: fix race with VMA iteration and mm_struct teardown
|
possible deadlock in collapse_file
mm
|
C |
done |
|
189 |
85d |
86d
|
1/24 |
never |
mm/khugepaged: fix vm_lock/i_mmap_rwsem inversion in retract_page_tables
|
BUG: unable to handle kernel paging request in alloc_huge_page
mm
|
C |
unreliable |
|
491 |
654d |
653d
|
1/24 |
never |
mm/hugetlb: Initialize page to NULL in alloc_buddy_huge_page_with_mpol()
|
WARNING in split_huge_page_to_list (2)
mm
|
C |
error |
|
2334 |
15d |
279d
|
23/24 |
never |
4737edbbdd49
mm/huge_memory.c: warn with pr_warn_ratelimited instead of VM_WARN_ON_ONCE_FOLIO
|
possible deadlock in jbd2_log_wait_commit
ext4
|
C |
done |
|
429 |
66d |
90d
|
23/24 |
never |
3c92792da850
ext4: Fix deadlock during directory rename
|
WARNING in vmap_pages_range_noflush (2)
bpf
net
|
C |
error |
|
250 |
279d |
281d
|
1/24 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
general protection fault in vma_is_shmem
mm
io-uring
|
C |
error |
|
28 |
280d |
281d
|
1/24 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
kernel BUG in folio_flags
mm
|
|
|
|
2 |
137d |
137d
|
1/24 |
never |
mm-reimplement-compound_nr-fix
|
KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size
ext4
|
C |
error |
|
21 |
22d |
60d
|
22/24 |
never |
2220eaf90992
ext4: add bounds checking in get_max_inline_xattr_value_size()
|
BUG: Bad page state (8)
jfs
mm
|
C |
|
|
878 |
1h04m |
847d
|
1/24 |
never |
mm-filemap-add-filemap_range_uptodate-fix
|
linux-next boot error: WARNING in kmem_cache_free
fs
|
|
|
|
45 |
1068d |
1071d
|
1/24 |
never |
mm, slab/slub: improve error reporting and overhead of cache_from_obj()-fix
|
kernel BUG in ext4_get_group_info
ext4
|
C |
error |
|
237 |
15d |
648d
|
22/24 |
never |
5354b2af3406
ext4: allow ext4_get_group_info() to fail
463808f237cf
ext4: remove a BUG_ON in ext4_mb_release_group_pa()
|
INFO: task hung in write_cache_pages (2)
fs
mm
|
C |
done |
|
36 |
18d |
89d
|
23/24 |
never |
fb3592c41a44
migrate_pages: fix deadlock in batched migration
|
KASAN: slab-out-of-bounds Read in ext4_group_desc_csum
ext4
|
C |
error |
|
26 |
15d |
116d
|
22/24 |
never |
4f04351888a8
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
|
KASAN: use-after-free Read in __media_entity_remove_links
usb
media
|
C |
|
|
7 |
1162d |
1260d
|
0/24 |
never |
media: uvcvideo: Avoid cyclic entity chains due to malformed
|
WARNING in shark_write_reg/usb_submit_urb
usb
|
C |
error |
|
63 |
39d |
1413d
|
23/24 |
never |
76e31045ba03
media: radio-shark: Add endpoint checks
|
WARNING in shark_write_val/usb_submit_urb
usb
|
C |
error |
done |
51 |
47d |
1407d
|
23/24 |
never |
76e31045ba03
media: radio-shark: Add endpoint checks
|
WARNING in mbind_range
mm
|
C |
error |
|
3 |
140d |
140d
|
23/24 |
never |
17dc622c7b0f
maple_tree: fix mas_prev() and mas_find() state handling
|
memory leak in hwsim_new_radio_nl
wireless
|
C |
|
|
1 |
18d |
17d
|
21/24 |
never |
098abbd48ec1
mac80211_hwsim: fix memory leak in hwsim_new_radio_nl
|
possible deadlock in release_sock
net
|
C |
done |
|
42 |
130d |
132d
|
23/24 |
never |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
possible deadlock in inet_put_port
net
|
|
|
|
2 |
131d |
131d
|
23/24 |
never |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
WARNING: locking bug in inet_autobind
net
|
C |
done |
error |
103 |
151d |
1474d
|
23/24 |
never |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
possible deadlock in l2tp_tunnel_register (2)
net
|
C |
|
|
153 |
84d |
94d
|
23/24 |
never |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
possible deadlock in lock_timer_base
kernel
|
|
|
|
13 |
168d |
876d
|
1/24 |
never |
kfence: fix potential deadlock due to wake_up()
|
possible deadlock in do_writepages
fs
mm
|
|
|
|
15 |
32d |
35d
|
22/24 |
never |
00d873c17e29
ext4: avoid deadlock in fs reclaim with page writeback
|
KCSAN: data-race in strscpy / strscpy (3)
ext4
mm
|
|
|
|
3 |
54d |
38d
|
23/24 |
never |
cf587db2ee02
kernel: Allow a kernel thread's name to be set in copy_process
|
WARNING in ext4_iomap_overwrite_begin
ext4
|
|
|
|
1 |
44d |
40d
|
22/24 |
never |
fa83c34e3e56
ext4: check iomap type only if ext4_iomap_begin() does not fail
|
WARNING in ext4_xattr_block_set (2)
ext4
|
C |
error |
|
32 |
17d |
82d
|
22/24 |
never |
a44be64bbecb
ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled
|
WARNING in ext4_update_inline_data
ext4
|
C |
error |
|
21 |
86d |
150d
|
23/24 |
never |
2b96b4a5d944
ext4: fix WARNING in ext4_update_inline_data
|
linux-next boot error: BUG: unable to handle kernel NULL pointer dereference in mempool_init_node
ceph
fs
|
|
|
|
12 |
928d |
929d
|
1/24 |
never |
kasan-simplify-kasan_poison_kfree-temp-fix
|
WARNING in mb_find_extent
ext4
|
C |
error |
error |
135 |
109d |
150d
|
22/24 |
never |
fa08a7b61dff
ext4: fix WARNING in mb_find_extent
|
KCSAN: data-race in __es_find_extent_range / __es_find_extent_range (6)
ext4
|
|
|
|
4 |
45d |
35d
|
22/24 |
never |
492888df0c7b
ext4: fix data races when using cached status extents
|
KMSAN: uninit-value in ipv6_find_tlv
net
|
C |
|
|
271 |
31d |
1385d
|
23/24 |
never |
ea30388baebc
ipv6: Fix an uninit variable access bug in __ip6_make_skb()
|
KMSAN: kernel-infoleak in iommufd_vfio_ioctl
iommu
|
C |
|
|
15 |
92d |
105d
|
23/24 |
never |
b3551ead6163
iommufd: Make sure to zero vfio_iommu_type1_info before copying to user
|
INFO: task hung in __sync_dirty_buffer
ext4
|
C |
inconclusive |
error |
831 |
16d |
635d
|
22/24 |
never |
f4ce24f54d9c
ext4: fix deadlock when converting an inline directory in nojournal mode
|
INFO: task hung in freeze_super (3)
gfs2
|
C |
error |
|
19 |
10d |
171d
|
23/24 |
never |
b66f723bb552
gfs2: Improve gfs2_make_fs_rw error handling
|
KASAN: slab-use-after-free Read in nilfs_segctor_thread
nilfs
|
|
|
|
1 |
69d |
63d
|
23/24 |
never |
6be49d100c22
nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()
|
KASAN: slab-out-of-bounds Write in copy_array (2)
bpf
|
|
|
|
82 |
1d14h |
19d
|
23/24 |
never |
45435d8da71f
bpf: Always use maximal size for copy_array()
|
INFO: task hung in io_sq_thread_stop
fs
io-uring
|
C |
done |
|
211 |
833d |
992d
|
1/24 |
never |
io_uring: don't sleep schedule in SQPOLL thread if we need to park
|
memory leak in ext4_expand_extra_isize_ea
ext4
|
C |
|
|
2 |
21d |
89d
|
22/24 |
never |
b87c7cdf2bed
ext4: fix invalid free tracking in ext4_xattr_move_to_block()
|
WARNING in kvfree (2)
ext4
|
C |
|
|
47 |
23d |
75d
|
22/24 |
never |
b87c7cdf2bed
ext4: fix invalid free tracking in ext4_xattr_move_to_block()
|
memory leak in io_submit_sqes (4)
io-uring
|
C |
|
|
1 |
141d |
140d
|
23/24 |
never |
febb985c06cb
io_uring/poll: add hash if ready poll request can't complete inline
|
WARNING in io_get_cqe_overflow
io-uring
|
|
|
|
1 |
127d |
126d
|
23/24 |
never |
e12d7a46f65a
io_uring/msg_ring: fix missing lock on overflow for IOPOLL
|
KASAN: use-after-free Read in io_worker_get
io-uring
|
C |
done |
done |
5 |
106d |
140d
|
23/24 |
never |
e6db6f9398da
io_uring/io-wq: only free worker if it was allocated for creation
|
possible deadlock in ext4_multi_mount_protect
ext4
|
C |
|
|
571 |
9d22h |
52d
|
22/24 |
never |
949f95ff39bf
ext4: fix lockdep warning when enabling MMP
|
general protection fault in ext4_fill_super (2)
ext4
|
|
|
|
1 |
32d |
32d
|
23/24 |
never |
d5e72c4e3256
ext4: fix lost error code reporting in __ext4_fill_super()
|
WARNING: bad unlock balance in ext4_rename2
ext4
|
|
|
|
105 |
66d |
84d
|
23/24 |
never |
70e42feab2e2
ext4: fix possible double unlock when moving a directory
|
INFO: task hung in find_inode_fast
ext4
|
C |
error |
|
26 |
9d10h |
141d
|
23/24 |
never |
0f7bfd6f8164
ext4: fix task hung in ext4_xattr_delete_inode
|
KASAN: use-after-free Read in ext4_find_extent (2)
ext4
|
C |
error |
|
2 |
25d |
149d
|
23/24 |
never |
835659598c67
ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline
|
KASAN: use-after-free Read in io_wq_worker_wake
io-uring
|
C |
done |
done |
1 |
107d |
140d
|
23/24 |
never |
e6db6f9398da
io_uring/io-wq: only free worker if it was allocated for creation
|
KASAN: wild-memory-access Read in io_wq_worker_running
io-uring
|
C |
|
|
39 |
136d |
142d
|
23/24 |
never |
e6db6f9398da
io_uring/io-wq: only free worker if it was allocated for creation
|
WARNING in io_sync_cancel
io-uring
|
C |
error |
|
3 |
163d |
159d
|
23/24 |
never |
23fffb2f09ce
io_uring/cancel: re-grab ctx mutex after finishing wait
|
KMSAN: uninit-value in htree_dirblock_to_tree
ext4
|
|
|
|
204 |
15d |
146d
|
22/24 |
never |
4b3cb1d108bf
ext4: improve error handling from ext4_dirhash()
|
WARNING in __ext4fs_dirhash
ext4
|
C |
done |
|
25 |
18d |
19d
|
22/24 |
never |
4b3cb1d108bf
ext4: improve error handling from ext4_dirhash()
|
BUG: unable to handle kernel NULL pointer dereference in set_page_dirty
f2fs
reiserfs
|
C |
|
|
310 |
145d |
277d
|
1/24 |
never |
f2fs: fix missing mapping caused by the mount/umount race
|
KCSAN: data-race in inotify_handle_inode_event / inotify_remove_from_idr
fs
|
|
|
|
363 |
21d |
35d
|
23/24 |
never |
c915d8f5918b
inotify: Avoid reporting event with invalid wd
|
KASAN: use-after-free Read in do_csum
net
|
C |
|
|
65 |
3d17h |
158d
|
23/24 |
never |
1ac885574470
inet: control sockets should not use current thread task_frag
|
kernel BUG in f2fs_abort_atomic_write
f2fs
|
syz |
|
|
2 |
103d |
147d
|
1/24 |
never |
f2fs: fix to avoid race condition of f2fs_abort_atomic_write()
|
kernel BUG in inet_sock_destruct
net
|
C |
error |
|
3 |
146d |
146d
|
23/24 |
never |
1ac885574470
inet: control sockets should not use current thread task_frag
|
WARNING in __dev_queue_xmit (2)
net
|
C |
|
|
76 |
22d |
94d
|
23/24 |
never |
693aa2c0d9b6
ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping()
|
KASAN: use-after-free Read in __update_extent_tree_range
f2fs
|
C |
done |
|
9 |
102d |
149d
|
23/24 |
never |
a46bebd502fe
f2fs: synchronize atomic write aborts
|
UBSAN: shift-out-of-bounds in fbcon_set_font
fbdev
|
C |
error |
|
3 |
120d |
120d
|
15/24 |
never |
2b09d5d36498
fbcon: Check font dimension limits
|
general protection fault in nl802154_trigger_scan
wpan
|
C |
error |
|
31 |
68d |
87d
|
23/24 |
never |
02f18662f6c6
ieee802154: Prevent user from crashing the host
|
WARNING in dlfb_submit_urb/usb_submit_urb (2)
fbdev
usb
|
C |
|
|
2 |
15d |
11d
|
20/24 |
never |
ed9de4ed3987
fbdev: udlfb: Fix endpoint check
|
KASAN: null-ptr-deref Read in filemap_fault
mm
udf
|
C |
done |
|
112 |
18d |
31d
|
23/24 |
never |
38a55db9877c
filemap: Handle error return from __filemap_get_folio()
|
kernel BUG in icmp_glue_bits
net
|
|
|
|
1 |
61d |
60d
|
23/24 |
never |
7d63b6712538
icmp: guard against too small mtu
|
KCSAN: data-race in random_recv_done / virtio_read (3)
crypto
|
|
|
|
12 |
20h49m |
38d
|
1/24 |
never |
hwrng: virtio - Fix race on data_avail and actual data
|
kernel BUG in hfs_bnode_put
hfs
|
C |
error |
|
5 |
121d |
175d
|
23/24 |
never |
a9dc087fd3c4
hfs: fix missing hfs_bnode_get() in __hfs_bnode_create
|
WARNING in hfs_write_inode
hfs
|
C |
done |
|
3 |
147d |
145d
|
23/24 |
never |
cb7a95af78d2
hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling
|
possible deadlock in freeze_super (2)
gfs2
|
C |
error |
done |
15 |
15d |
231d
|
23/24 |
never |
b66f723bb552
gfs2: Improve gfs2_make_fs_rw error handling
|
linux-next boot error: kernel BUG at include/linux/page-flags.h:LINE!
mm
|
|
|
|
3 |
907d |
907d
|
1/24 |
never |
fixup for "mm: refactor initialization of stuct page for holes"
|
WARNING in io_cqring_event_overflow
io-uring
|
C |
|
|
7 |
130d |
137d
|
23/24 |
never |
544d163d659d
io_uring: lock overflowing for IOPOLL
|
UBSAN: array-index-out-of-bounds in __gfs2_iomap_get
gfs2
|
C |
error |
|
26 |
35d |
159d
|
23/24 |
never |
cfcdb5bad34f
gfs2: Fix inode height consistency check
|
WARNING in __kernel_read (2)
fsverity
|
C |
error |
|
318 |
34d |
975d
|
23/24 |
never |
04839139213c
fsverity: reject FS_IOC_ENABLE_VERITY on mode 3 fds
|
WARNING in fscrypt_destroy_keyring
fscrypt
ext4
|
C |
|
|
2 |
79d |
77d
|
23/24 |
never |
ccb820dc7d22
fscrypt: destroy keyring after security_sb_delete()
|
WARNING: locking bug in umh_complete
kernel
|
|
|
|
1 |
127d |
123d
|
23/24 |
never |
eedeb787ebb5
freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL
|
KMSAN: uninit-value in ondemand_readahead
fs
mm
|
C |
|
|
221 |
88d |
251d
|
23/24 |
never |
3e35102666f8
fs/cramfs/inode.c: initialize file_ra_state
|
UBSAN: shift-out-of-bounds in dbFindCtl
jfs
|
C |
inconclusive |
done |
45 |
90d |
232d
|
23/24 |
never |
fad376fce0af
fs/jfs: fix shift exponent db_agl2size negative
|
WARNING in hfsplus_cat_write_inode
hfs
|
C |
error |
|
141 |
18d |
184d
|
23/24 |
never |
81b21c0f0138
fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode()
|
WARNING in hfsplus_cat_read_inode
hfs
|
C |
error |
|
599 |
14d |
179d
|
23/24 |
never |
81b21c0f0138
fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode()
|
UBSAN: shift-out-of-bounds in dbAllocBits
jfs
|
C |
error |
done |
4 |
98d |
231d
|
23/24 |
never |
fad376fce0af
fs/jfs: fix shift exponent db_agl2size negative
|
UBSAN: shift-out-of-bounds in blkstol2
jfs
|
C |
error |
|
2 |
209d |
209d
|
23/24 |
never |
fad376fce0af
fs/jfs: fix shift exponent db_agl2size negative
|
KASAN: use-after-free Read in hfsplus_release_folio
hfs
|
C |
error |
|
23 |
88d |
163d
|
23/24 |
never |
07db5e247ab5
fs: hfsplus: fix UAF issue in hfsplus_put_super
|
BUG: unable to handle kernel NULL pointer dereference in ni_write_inode
ntfs3
|
C |
error |
|
596 |
16d |
248d
|
23/24 |
never |
8dae4f6341e3
fs/ntfs3: Fix NULL dereference in ni_write_inode
db2a3cc6a348
fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode'
|
KASAN: null-ptr-deref Read in ida_free (3)
fs
|
C |
error |
|
4 |
64d |
61d
|
23/24 |
never |
cb2239c198ad
fs: drop peer group ids under namespace lock
|
KASAN: use-after-free Read in __vma_adjust
mm
|
C |
done |
|
10 |
295d |
351d
|
1/24 |
never |
fs/userfaultfd: fix vma iteration in mas_for_each() loop
|
KASAN: slab-out-of-bounds Read in indx_insert_into_buffer
ntfs3
|
C |
error |
|
2 |
176d |
175d
|
23/24 |
never |
b8c44949044e
fs/ntfs3: Fix OOB read in indx_insert_into_buffer
|
general protection fault in __d_add
ntfs3
|
C |
error |
|
16 |
176d |
231d
|
23/24 |
never |
254e69f284d7
fs/ntfs3: Fix null-ptr-deref on inode->i_op in ntfs_lookup()
|
INFO: task hung in do_user_addr_fault (3)
ntfs3
|
C |
|
|
32 |
73d |
148d
|
23/24 |
never |
0226635c304c
fs/ntfs3: don't hold ni_lock when calling truncate_setsize()
|
KASAN: slab-out-of-bounds Read in hdr_delete_de
ntfs3
|
C |
error |
|
2 |
174d |
174d
|
23/24 |
never |
ab84eee4c7ab
fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de()
|
WARNING in ntfs_load_attr_list
ntfs3
|
C |
|
|
4 |
29d |
147d
|
1/24 |
never |
fs/ntfs3: Use __GFP_NOWARN allocation at ntfs_load_attr_list()
|
WARNING in do_symlinkat
ntfs3
|
C |
error |
done |
65 |
35d |
158d
|
23/24 |
never |
267a36ba30a7
fs/ntfs3: Remove noacsrules
|
WARNING in inet_csk_destroy_sock (3)
net
|
|
|
|
1 |
4d07h |
4d07h
|
24/24 |
3d00h |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
WARNING in submit_bio_checks
|
C |
done |
unreliable |
1851 |
433d |
1052d
|
24/24 |
42d |
57e95e4670d1
block: fix and cleanup bio_check_ro
|
general protection fault in dma_fence_array_first
dri
media
|
C |
done |
|
7 |
426d |
426d
|
24/24 |
47d |
21d139d73f77
dma-buf/sync-file: fix logic error in new fence merge code
|
BUG: sleeping function called from invalid context in folio_copy
mm
|
C |
unreliable |
|
271 |
675d |
673d
|
24/24 |
47d |
715cbfd6c5c5
mm/migrate: Add folio_migrate_copy()
|
KASAN: use-after-free Read in hci_cmd_timeout
|
C |
done |
error |
371 |
171d |
1483d
|
24/24 |
47d |
97dfaf073f58
Bluetooth: hci_sync: cancel cmd_timer if hci_open failed
|
KASAN: slab-out-of-bounds Read in sk_psock_get
net
|
C |
done |
error |
9 |
307d |
642d
|
24/24 |
47d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
KASAN: use-after-free Read in delete_partition (2)
block
|
C |
done |
|
1 |
790d |
790d
|
24/24 |
47d |
b5cfbd35ecca
block: check disk exist before trying to add partition
|
INFO: task hung in port100_probe
usb
nfc
|
C |
error |
inconclusive |
10 |
448d |
706d
|
24/24 |
47d |
f80cfe2f2658
NFC: port100: fix use-after-free in port100_send_complete
|
KASAN: slab-out-of-bounds Read in ntfs_get_ea
ntfs3
|
C |
error |
done |
9 |
197d |
265d
|
24/24 |
47d |
0e8235d28f3a
fs/ntfs3: Check fields while reading
|
possible deadlock in nci_start_poll
nfc
|
C |
error |
done |
83 |
95d |
196d
|
24/24 |
48d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
possible deadlock in bpf_trace_printk
bpf
trace
|
C |
done |
done |
68 |
99d |
354d
|
24/24 |
67d |
05b24ff9b2cf
bpf: Prevent bpf program recursion for raw tracepoint probes
|
WARNING in btrfs_run_delayed_refs
btrfs
|
C |
error |
done |
15 |
111d |
224d
|
24/24 |
75d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
kernel BUG in pskb_expand_head
net
|
C |
done |
|
1600 |
109d |
560d
|
24/24 |
93d |
5f33a09e769a
can: isotp: convert struct tpcon::{idx,len} to unsigned int
7c759040c1dd
can: isotp: fix potential CAN frame reception race in isotp_rcv()
|
KMSAN: uninit-value in kvm_irq_delivery_to_apic_fast
kvm
|
C |
|
|
20 |
302d |
335d
|
24/24 |
94d |
8a414f943f8b
KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
|
kernel BUG in __text_poke
kernel
|
C |
|
|
80 |
294d |
469d
|
24/24 |
94d |
1d5f82d9dd47
bpf, x86: fix freeing of not-finalized bpf_prog_pack
d24d2a2b0a81
bpf: bpf_prog_pack: Set proper size before freeing ro_header
|
KASAN: vmalloc-out-of-bounds Read in bpf_jit_free
bpf
|
C |
|
|
68 |
293d |
469d
|
24/24 |
94d |
1d5f82d9dd47
bpf, x86: fix freeing of not-finalized bpf_prog_pack
d24d2a2b0a81
bpf: bpf_prog_pack: Set proper size before freeing ro_header
|
WARNING in __dev_queue_xmit
|
C |
done |
|
16774 |
94d |
308d
|
24/24 |
94d |
dc633700f00f
net/af_packet: check len when min_header_len equals to 0
b12e924a2f5b
net/ieee802154: don't warn zero-sized raw_sendmsg()
3a4d061c699b
net/ieee802154: reject zero-sized raw_sendmsg()
|
INFO: trying to register non-static key in ieee80211_do_stop
wireless
|
C |
error |
|
70591 |
279d |
319d
|
24/24 |
94d |
aa40d5a43526
wifi: mac80211: do not abuse fq.lock in ieee80211_do_stop()
wifi: mac80211: do not abuse fq.lock in ieee80211_do_stop()
|
KASAN: use-after-free Read in mgmt_pending_remove
bluetooth
|
C |
unreliable |
|
9 |
265d |
285d
|
24/24 |
94d |
3cfbc6ac22d6
Bluetooth: hci_sync: fix double mgmt_pending_free() in remove_adv_monitor()
Bluetooth: hci_sync: fix double mgmt_pending_free() in remove_adv_monitor()
|
WARNING in alloc_charge_hpage
mm
|
C |
error |
|
112 |
143d |
213d
|
24/24 |
94d |
e031ff96b334
mm: khugepaged: allow page allocation fallback to eligible nodes
dec1d352de5c
mm: replace VM_WARN_ON to pr_warn if the node is offline with __GFP_THISNODE
|
possible deadlock in worker_thread
rdma
|
|
|
|
1 |
477d |
473d
|
24/24 |
94d |
081bdc9fe05b
RDMA/ib_srp: Fix a deadlock
bf23747ee053
loop: revert "make autoclear operation asynchronous"
|
KMSAN: uninit-value in ext4_evict_inode
ext4
|
|
|
|
2734 |
140d |
194d
|
24/24 |
94d |
7ea71af94eaa
ext4: fix uninititialized value in 'ext4_evict_inode'
|
WARNING in ipgre_xmit
net
|
C |
done |
|
9916 |
345d |
361d
|
24/24 |
94d |
8d21e9963bec
ip_gre: test csum_start instead of transport header
|
kernel panic: corrupted stack end in vm_area_alloc
kernel
|
|
|
|
1 |
328d |
328d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
kernel panic: corrupted stack end in vlan_ioctl_handler
kernfs
|
|
|
|
1 |
350d |
350d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
inconsistent lock state in fs_reclaim_acquire (3)
kernel
|
C |
|
|
2 |
209d |
215d
|
24/24 |
94d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
net boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
18 |
347d |
353d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
KASAN: use-after-free Read in mas_next_nentry
fs
|
C |
error |
done |
343 |
203d |
397d
|
24/24 |
94d |
59f2f4b8a757
fs/userfaultfd: Fix maple tree iterator in userfaultfd_unregister()
|
KASAN: use-after-free Read in tty_release
io-uring
|
C |
done |
|
23 |
423d |
433d
|
24/24 |
94d |
d89a4fac0fbc
io_uring: fix assuming triggered poll waitqueue is the single poll
|
linux-next boot error: kernel BUG in putname
fs
|
|
|
|
1 |
286d |
286d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING: ODEBUG bug in ops_free_list
net
|
|
|
|
1 |
422d |
422d
|
24/24 |
94d |
1946014ca3b1
rxrpc: fix a race in rxrpc_exit_net()
|
KMSAN: uninit-value in ax88178_reset
usb
|
C |
|
|
284 |
402d |
509d
|
24/24 |
94d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
general protection fault in br_mst_info_size
bridge
|
C |
error |
|
26 |
431d |
434d
|
24/24 |
94d |
cde3fc244b3d
net: bridge: mst: prevent NULL deref in br_mst_info_size()
|
KASAN: wild-memory-access Read in skb_copy_bits
net
|
C |
|
|
2 |
262d |
262d
|
24/24 |
94d |
0d24148bd276
inet: ping: fix recent breakage
|
general protection fault in list_lru_add
mm
|
C |
done |
|
1125 |
143d |
432d
|
24/24 |
94d |
ae085d7f9365
mm: kfence: fix missing objcg housekeeping for SLAB
|
KCSAN: data-race in __ip_append_data / __ip_append_data
net
|
|
|
|
1 |
479d |
475d
|
24/24 |
94d |
a1cdec57e03a
net-timestamp: convert sk->sk_tskey to atomic_t
|
kernel panic: corrupted stack end in tun_chr_close
fs
|
|
|
|
1 |
386d |
386d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KMSAN: uninit-value in tipc_nl_compat_name_table_dump (3)
tipc
|
C |
|
|
65 |
191d |
207d
|
24/24 |
94d |
1c075b192fe4
tipc: fix the msg->req tlv len check in tipc_nl_compat_name_table_dump_header
|
WARNING: kmalloc bug in xdp_umem_create (2)
bpf
net
|
C |
done |
|
21 |
473d |
539d
|
24/24 |
94d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
general protection fault in sg_alloc_append_table_from_pages
media
dri
|
C |
done |
|
477 |
126d |
593d
|
24/24 |
94d |
2b6dd600dd72
udmabuf: validate ubuf->pagecount
|
WARNING in c_start
kernel
|
|
|
|
75097 |
225d |
227d
|
24/24 |
94d |
80493877d7d0
Revert "cpumask: fix checking valid cpu range".
|
KCSAN: data-race in tcp_send_challenge_ack / tcp_send_challenge_ack
net
|
|
|
|
1 |
272d |
272d
|
24/24 |
94d |
8c70521238b7
tcp: annotate data-race around challenge_timestamp
|
BUG: sleeping function called from invalid context in sk_psock_skb_ingress_self
bpf
net
|
C |
done |
|
151 |
204d |
226d
|
24/24 |
94d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
INFO: task hung in addrconf_verify_work (6)
|
C |
done |
|
86 |
98d |
335d
|
24/24 |
94d |
ff1fa2081d17
net: tun: avoid disabling NAPI twice
|
KASAN: use-after-free Read in ipvlan_queue_xmit (3)
net
|
C |
error |
error |
8 |
298d |
896d
|
24/24 |
94d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING in change_protection
mm
|
C |
unreliable |
|
13 |
236d |
241d
|
24/24 |
94d |
515778e2d790
mm/uffd: fix warning without PTE_MARKER_UFFD_WP compiled in
|
possible deadlock in dccp_v4_ctl_send_reset
mptcp
|
C |
done |
|
26 |
181d |
193d
|
24/24 |
94d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
WARNING in exit_tasks_rcu_finish
kernel
|
C |
done |
|
20 |
348d |
351d
|
24/24 |
94d |
0356d4e66214
rcu-tasks: Track blocked RCU Tasks Trace readers
|
memory leak in kobject_set_name_vargs (5)
nilfs
|
C |
|
|
4 |
238d |
341d
|
24/24 |
94d |
d0d51a97063d
nilfs2: fix leak of nilfs_root in case of writer thread creation failure
|
BUG: unable to handle kernel NULL pointer dereference in ni_find_attr
ntfs3
|
C |
done |
done |
81 |
143d |
278d
|
24/24 |
94d |
2681631c2973
fs/ntfs3: Add null pointer check to attr_load_runs_vcn
|
possible deadlock in console_unlock (2)
serial
|
C |
error |
done |
599 |
111d |
561d
|
24/24 |
94d |
09c5ba0aa2fc
printk: add kthread console printers
|
KASAN: use-after-free Read in ucma_destroy_private_ctx
rdma
|
|
|
|
1 |
517d |
511d
|
24/24 |
94d |
36e8169ec973
RDMA/ucma: Protect mc during concurrent multicast leaves
|
general protection fault in llc_build_and_send_xid_pkt
net
|
C |
done |
|
2 |
431d |
431d
|
24/24 |
94d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: use-after-free Read in unregister_shrinker (2)
mm
|
C |
error |
|
3799 |
206d |
250d
|
24/24 |
94d |
bd86c69dae65
NFSD: unregister shrinker when nfsd_init_net() fails
|
linux-next boot error: general protection fault in driver_bound
kernel
|
|
|
|
1 |
286d |
286d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KMSAN: uninit-value in mpol_rebind_mm (2)
mm
|
C |
|
|
11 |
348d |
472d
|
24/24 |
94d |
018160ad314d
mm/mempolicy: fix uninit-value in mpol_rebind_policy()
|
possible deadlock in snd_timer_interrupt (2)
alsa
|
C |
error |
|
29 |
293d |
554d
|
24/24 |
94d |
95cc637c1afd
ALSA: timer: Use deferred fasync helper
|
possible deadlock in display_open
usb
|
C |
inconclusive |
|
48888 |
362d |
1389d
|
24/24 |
94d |
db264d4c66c0
media: imon: reorganize serialization
|
kernel BUG in __clear_extent_bit
btrfs
|
C |
error |
|
5 |
170d |
185d
|
24/24 |
94d |
5a75034e71ef
btrfs: do not panic if we can't allocate a prealloc extent state
|
KASAN: use-after-free Read in reqsk_queue_unlink
net
|
|
|
|
4 |
180d |
231d
|
24/24 |
94d |
740ea3c4a0b2
tcp: Clean up kernel listener's reqsk in inet_twsk_purge()
|
kernel BUG in dev_args_match_device
btrfs
|
|
|
|
1 |
208d |
208d
|
24/24 |
94d |
0fca385d6ebc
btrfs: fix match incorrectly in dev_args_match_device
|
KASAN: use-after-free Read in pty_close
io-uring
fuse
|
C |
done |
|
4 |
299d |
326d
|
24/24 |
94d |
7a121ced6e64
io_uring: don't miss setting REQ_F_DOUBLE_POLL
|
KASAN: vmalloc-out-of-bounds Write in tpg_fill_plane_buffer (2)
media
|
C |
inconclusive |
done |
14 |
119d |
631d
|
24/24 |
94d |
94a7ad928346
media: vivid: fix compose size exceed boundary
|
general protection fault in pm_qos_update_target
pm
|
syz |
inconclusive |
done |
1 |
434d |
742d
|
24/24 |
94d |
3c3201f8c7bb
ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls
|
KMSAN: uninit-value in asix_mdio_read (3)
usb
|
C |
|
|
1582 |
377d |
442d
|
24/24 |
94d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
WARNING: refcount bug in tcp_release_cb
net
|
|
|
|
2 |
169d |
179d
|
24/24 |
94d |
0a182f8d6074
bpf, sockmap: fix race in sock_map_free()
|
INFO: rcu detected stall in sys_lsetxattr
fs
|
C |
done |
|
2 |
405d |
405d
|
24/24 |
94d |
0014edaedfd8
fs: unset MNT_WRITE_HOLD on failure
|
WARNING in ext4_da_release_space
ext4
|
C |
error |
|
9 |
106d |
229d
|
24/24 |
94d |
1b8f787ef547
ext4: fix warning in 'ext4_da_release_space'
|
BUG: unable to handle kernel NULL pointer dereference in ntfs_sparse_cluster
ntfs3
|
C |
error |
done |
11 |
160d |
162d
|
24/24 |
94d |
c380b52f6c57
fs/ntfs3: Change new sparse cluster processing
|
WARNING in cpuset_attach
cgroups
|
C |
error |
|
20922 |
277d |
278d
|
24/24 |
94d |
43626dade36f
cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()
|
net boot error: WARNING in genl_register_family
net
|
|
|
|
3 |
213d |
213d
|
24/24 |
94d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
WARNING in __skb_flow_dissect (4)
net
|
C |
error |
|
6 |
205d |
214d
|
24/24 |
94d |
9f225444467b
ppp: associate skb with a device at tx
|
WARNING in inet_csk_get_port
net
|
C |
done |
|
1166 |
143d |
371d
|
24/24 |
94d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
upstream boot error: general protection fault in __proc_create
fs
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
panic: runtime error: floating point error
kernel
|
|
|
|
2 |
106d |
385d
|
24/24 |
94d |
59f5ede3bc0f
x86/fpu: Prevent FPU state corruption
|
inconsistent lock state in kmem_cache_alloc_trace (2)
kernel
|
|
|
|
2 |
223d |
224d
|
24/24 |
94d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
memory leak in __insert_pending
ext4
|
C |
|
|
1 |
211d |
207d
|
24/24 |
94d |
1da18e38cb97
ext4: fix reserved cluster accounting in __es_remove_extent()
|
memory leak in crypto_create_tfm_node
ext4
crypto
|
C |
|
|
3 |
224d |
230d
|
24/24 |
94d |
ccd30a476f8e
fscrypt: fix keyring memory leak on mount failure
|
WARNING in vcpu_enter_guest (2)
kvm
|
C |
|
|
42 |
207d |
215d
|
24/24 |
94d |
dea0d5a2fde6
KVM: x86: Exempt pending triple fault from event injection sanity check
|
KASAN: use-after-free Read in drm_gem_object_release_handle
|
C |
done |
|
362 |
175d |
559d
|
24/24 |
94d |
24013314be6e
drm/shmem-helper: Remove errant put in error path
|
KMSAN: uninit-value in btrfs_clean_tree_block (2)
nilfs
|
|
|
|
15960 |
94d |
555d
|
24/24 |
94d |
cbddcc4fa344
btrfs: set generation before calling btrfs_clean_tree_block in btrfs_init_new_buffer
|
KASAN: use-after-free Read in do_shrink_slab (2)
mm
|
|
|
|
105 |
220d |
244d
|
24/24 |
94d |
bd86c69dae65
NFSD: unregister shrinker when nfsd_init_net() fails
|
WARNING in ext2_fill_super
ext4
|
C |
|
|
2 |
280d |
276d
|
24/24 |
94d |
d766f2d1e3e3
ext2: Add sanity checks for group and filesystem size
e7c7fbb9a857
ext2: Use kvmalloc() for group descriptor array
|
KASAN: use-after-free Read in btrfs_scan_one_device (2)
btrfs
|
C |
|
|
2 |
456d |
452d
|
24/24 |
94d |
79c9234ba596
btrfs: don't access possibly stale fs_info data in device_list_add
|
KASAN: use-after-free Read in free_netdev (3)
net
|
C |
inconclusive |
|
130 |
186d |
342d
|
24/24 |
94d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
WARNING in bpf_skb_load_helper_16_no_cache
bpf
|
C |
done |
|
6 |
301d |
331d
|
24/24 |
94d |
0326195f523a
bpf: Make sure mac_header was set before using it
|
general protection fault in release_udmabuf
media
dri
|
C |
inconclusive |
|
31 |
233d |
284d
|
24/24 |
94d |
d9c04a1b7a15
udmabuf: Set ubuf->sg = NULL if the creation of sg table fails
|
KASAN: slab-out-of-bounds Read in cttimeout_net_exit
netfilter
|
C |
|
|
1444 |
339d |
377d
|
24/24 |
94d |
aeed55a08d0b
netfilter: cttimeout: fix slab-out-of-bounds read in cttimeout_net_exit
394e771684f7
netfilter: cttimeout: fix slab-out-of-bounds read typo in cttimeout_net_exit
|
WARNING in snd_usbmidi_output_open
alsa
usb
|
C |
done |
|
37 |
192d |
199d
|
24/24 |
94d |
ad72c3c3f6eb
ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()
|
WARNING in send_packet/usb_submit_urb
usb
|
C |
inconclusive |
|
847 |
162d |
328d
|
24/24 |
94d |
813ceef062b5
media: imon: fix a race condition in send_packet()
|
KASAN: slab-out-of-bounds Read in io_uring_show_fdinfo
io-uring
|
C |
done |
|
5 |
226d |
231d
|
24/24 |
94d |
00927931cb63
io_uring: fix fdinfo sqe offsets calculation
|
KCSAN: data-race in dev_activate / qdisc_lookup_rcu
net
|
|
|
|
1 |
472d |
472d
|
24/24 |
94d |
5891cd5ec46c
net_sched: add __rcu annotation to netdev->qdisc
|
KASAN: slab-out-of-bounds Read in thrustmaster_probe
input
usb
|
C |
unreliable |
|
92 |
439d |
463d
|
24/24 |
94d |
fc3ef2e3297b
HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts
|
INFO: rcu detected stall in sys_setxattr (2)
fs
|
C |
done |
|
3 |
405d |
405d
|
24/24 |
94d |
0014edaedfd8
fs: unset MNT_WRITE_HOLD on failure
|
BUG: unable to handle kernel paging request in vmx_handle_exit_irqoff
kvm
|
C |
error |
|
7736 |
186d |
208d
|
24/24 |
94d |
1cfaac2400c7
x86/kasan: Populate shadow for shared chunk of the CPU entry area
|
WARNING in skb_try_coalesce
net
|
C |
error |
|
1521 |
366d |
820d
|
24/24 |
94d |
763087dab975
net: add skb_set_end_offset() helper
|
INFO: task hung in misc_open (4)
usb
|
C |
error |
inconclusive |
144 |
122d |
835d
|
24/24 |
94d |
8386c414e27c
PM: hibernate: defer device probing when resuming from hibernation
|
kernel panic: corrupted stack end in netdev_run_todo
net
|
|
|
|
1 |
338d |
338d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
general protection fault in sock_reserve_memory
net
|
C |
done |
|
2 |
470d |
470d
|
24/24 |
94d |
25206111512d
crypto: af_alg - get rid of alg_memory_allocated
|
general protection fault in __dentry_path (2)
fs
|
C |
error |
|
174 |
399d |
409d
|
24/24 |
94d |
5c697c367a66
KVM: Initialize debugfs_dentry when a VM is created to avoid NULL deref
|
WARNING in tcp_enter_loss (3)
net
|
C |
inconclusive |
|
7 |
211d |
508d
|
24/24 |
94d |
0c175da7b037
tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent
|
divide error in dbNextAG
jfs
|
syz |
error |
|
2 |
440d |
436d
|
24/24 |
94d |
2cc7cc01c15f
jfs: fix divide error in dbNextAG
|
usb-testing boot error: BUG: unable to handle kernel paging request in dequeue_task_fair
acpi
|
|
|
|
1 |
273d |
273d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in tls_sk_proto_close (3)
net
|
C |
done |
|
276 |
343d |
742d
|
24/24 |
94d |
69135c572d1f
net/tls: fix tls_sk_proto_close executed repeatedly
|
KCSAN: data-race in lru_add_fn / skb_append_pagefrags
mm
|
|
|
|
1 |
219d |
215d
|
24/24 |
94d |
228ebc41dfab
net: do not sense pfmemalloc status in skb_append_pagefrags()
|
possible deadlock in hugetlb_fault
mm
|
|
|
|
2 |
198d |
206d
|
24/24 |
94d |
04ada095dcfc
hugetlb: don't delete vma_lock in hugetlb MADV_DONTNEED processing
|
KASAN: use-after-free Read in nilfs_mdt_destroy
nilfs
|
C |
error |
|
20 |
234d |
250d
|
24/24 |
94d |
2e488f13755f
fs: fix UAF/GPF bug in nilfs_mdt_destroy
|
KASAN: slab-out-of-bounds Read in hfs_cat_keycmp
hfs
|
C |
error |
done |
2 |
97d |
163d
|
24/24 |
94d |
c53ed55cb275
hfs: Fix OOB Write in hfs_asc2mac
|
possible deadlock in l2tp_tunnel_register
net
|
C |
error |
|
9492 |
94d |
193d
|
24/24 |
94d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
general protection fault in em_cmp_match
net
|
C |
|
|
4 |
169d |
166d
|
24/24 |
94d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
kernel BUG in __filemap_get_folio
kernel
|
C |
done |
|
814 |
233d |
404d
|
24/24 |
94d |
63b1898fffcd
XArray: Disallow sibling entries of nodes
|
kernel BUG in commit_creds
io-uring
|
C |
done |
|
5 |
405d |
410d
|
24/24 |
94d |
701521403cfb
io_uring: abort file assignment prior to assigning creds
|
WARNING in mntput_no_expire (3)
fs
|
C |
inconclusive |
|
29 |
144d |
560d
|
24/24 |
94d |
a91714312eb1
percpu_ref_init(): clean ->percpu_count_ref on failure
|
WARNING in nilfs_segctor_do_construct
nilfs
|
C |
|
|
5 |
120d |
243d
|
24/24 |
94d |
723ac751208f
nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure
|
KASAN: slab-out-of-bounds Read in vxlan_vnifilter_dump_dev
|
C |
done |
|
30 |
424d |
425d
|
24/24 |
94d |
9d570741aec1
vxlan: do not feed vxlan_vnifilter_dump_dev with non vxlan devices
|
general protection fault in ip6_rcv_core
net
|
C |
done |
|
275 |
184d |
411d
|
24/24 |
94d |
0339d25a2807
ipv6: fix NULL deref in ip6_rcv_core()
|
BUG: unable to handle kernel paging request in ovl_set_acl
overlayfs
|
C |
error |
|
4 |
206d |
208d
|
24/24 |
94d |
5b52aebef895
ovl: call posix_acl_release() after error checking
|
KASAN: use-after-free Read in z_erofs_transform_plain
erofs
|
C |
done |
|
4 |
98d |
175d
|
24/24 |
94d |
c505feba4c0d
erofs: validate the extent length for uncompressed pclusters
|
KMSAN: uninit-value in mpol_rebind_task (2)
mm
|
C |
|
|
7 |
350d |
510d
|
24/24 |
94d |
018160ad314d
mm/mempolicy: fix uninit-value in mpol_rebind_policy()
|
KASAN: use-after-free Read in nh_netdev_event
net
|
|
|
|
3 |
194d |
271d
|
24/24 |
94d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KASAN: use-after-free Read in rxrpc_lookup_local
afs
net
|
C |
|
|
3997 |
144d |
174d
|
24/24 |
94d |
8fbcc83334a7
rxrpc: Fix I/O thread startup getting skipped
eaa02390adb0
rxrpc: Fix NULL deref in rxrpc_unuse_local()
|
WARNING in kernfs_active
kernfs
|
C |
error |
|
150 |
108d |
231d
|
24/24 |
94d |
1edfe4ea16ca
kernfs: Fix spurious lockdep warning in kernfs_find_and_get_node_by_id()
|
kernel BUG in warn_crc32c_csum_combine
net
fat
|
C |
error |
|
17 |
208d |
217d
|
24/24 |
94d |
7f57f8165cb6
af_key: Fix send_acquire race with pfkey_register
|
kernel panic: corrupted stack end in nf_tables_getset
net
|
|
|
|
1 |
203d |
203d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
net-next test error: WARNING in devl_port_unregister
net
|
|
|
|
52 |
200d |
202d
|
24/24 |
94d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
KMSAN: kernel-infoleak in v4l2_compat_put_array_args
media
|
|
|
|
8 |
192d |
496d
|
24/24 |
94d |
4e768c8e34e6
media: v4l2-compat-ioctl32.c: zero buffer passed to v4l2_compat_get_array_args()
|
kernel panic: stack is corrupted in ksys_write
fs
|
|
|
|
1 |
267d |
263d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in dev_uevent
kernel
|
syz |
|
|
54 |
101d |
1074d
|
24/24 |
94d |
16b1941eac2b
usb: gadget: Fix use-after-free bug by not setting udc->dev.driver
|
WARNING in u32_change
net
|
C |
|
|
28 |
149d |
246d
|
24/24 |
94d |
7cba18332e36
net: sched: cls_u32: Avoid memcpy() false-positive warning
|
general protection fault in metadata_dst_free
net
|
C |
|
|
348 |
225d |
264d
|
24/24 |
94d |
c52add61c27e
macsec: don't free NULL metadata_dst
|
memory leak in watch_queue_set_size
kernel
|
C |
|
|
1 |
436d |
429d
|
24/24 |
94d |
b490207017ba
watch_queue: Free the page array when watch_queue is dismantled
|
memory leak in virtual_ncidev_write
nfc
|
C |
|
|
1 |
193d |
193d
|
24/24 |
94d |
53270fb0fd77
NFC: nci: fix memory leak in nci_rx_data_packet()
|
memory leak in __vsock_create
net
virt
io-uring
|
C |
|
|
1 |
418d |
414d
|
24/24 |
94d |
7e97cfed9929
vsock: Fix memory leak in vsock_connect()
|
kernel panic: corrupted stack end in inet6_sendmsg
netfilter
|
|
|
|
1 |
242d |
242d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING: locking bug in hugetlb_no_page
mm
|
C |
|
|
1 |
198d |
198d
|
24/24 |
94d |
04ada095dcfc
hugetlb: don't delete vma_lock in hugetlb MADV_DONTNEED processing
|
KASAN: slab-out-of-bounds Read in __fscache_acquire_volume
cachefs
|
C |
done |
done |
1 |
273d |
273d
|
24/24 |
94d |
9f0933ac026f
fscache: fix OOB Read in __fscache_acquire_volume
|
usb-testing boot error: BUG: unable to handle kernel paging request in __handle_mm_fault
mm
|
|
|
|
1 |
287d |
287d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in blk_mq_update_nr_hw_queues
block
|
C |
error |
|
16 |
191d |
204d
|
24/24 |
94d |
90b0296ece4b
block: fix crash in 'blk_mq_elv_switch_none'
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (5)
net
|
|
|
|
12 |
136d |
389d
|
24/24 |
94d |
d5076fe4049c
netlink: do not reset transport header in netlink_recvmsg()
|
general protection fault in __inet_hash_connect
net
|
|
|
|
5 |
202d |
348d
|
24/24 |
94d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
kernel panic: corrupted stack end in tc_ctl_action
net
|
|
|
|
2 |
226d |
280d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in skb_checksum_help
net
|
|
|
|
15 |
99d |
272d
|
24/24 |
94d |
0d24148bd276
inet: ping: fix recent breakage
|
WARNING in skb_tunnel_check_pmtu
net
|
C |
done |
|
8 |
336d |
342d
|
24/24 |
94d |
853a76148802
tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()
|
general protection fault in nilfs_palloc_commit_free_entry
nilfs
|
C |
error |
|
2 |
210d |
218d
|
24/24 |
94d |
f0a0ccda18d6
nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry()
|
BUG: sleeping function called from invalid context in smc_pnet_apply_ib
rdma
|
C |
inconclusive |
|
92 |
458d |
466d
|
24/24 |
94d |
7ff57e98fb78
net/smc: Use a mutex for locking "struct smc_pnettable"
|
KASAN: use-after-free Read in nf_hook_entries_grow
netfilter
|
C |
done |
done |
5 |
485d |
525d
|
24/24 |
94d |
6069da443bf6
netfilter: nf_tables: unregister flowtable hooks on netns exit
|
BUG: unable to handle kernel NULL pointer dereference in lock_page
nilfs
|
C |
error |
|
4 |
204d |
213d
|
24/24 |
94d |
512c5ca01a36
nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty
|
WARNING: lock held when returning to user space in ieee80211_change_mac
wireless
|
|
|
|
1 |
244d |
240d
|
24/24 |
94d |
ceb3d688f922
wifi: mac80211: unlock on error in ieee80211_can_powered_addr_change()
|
KASAN: use-after-free Read in do_sync_mmap_readahead
fs
mm
|
|
|
|
1 |
373d |
369d
|
24/24 |
94d |
dcfa24ba6899
filemap: Cache the value of vm_flags
|
KMSAN: kernel-infoleak in vcs_read (2)
kernel
|
C |
|
|
1556 |
117d |
1272d
|
24/24 |
94d |
af77c56aa353
tty: vt: initialize unicode screen buffer
|
usb-testing boot error: general protection fault in rcu_core
fs
mm
|
|
|
|
23 |
268d |
287d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
memory leak in ipv6_renew_options
net
|
C |
|
|
1 |
320d |
316d
|
24/24 |
94d |
e27326009a3d
net: ping6: Fix memleak in ipv6_renew_options().
|
KMSAN: uninit-value in pagecache_write
ext4
|
|
|
|
5 |
220d |
203d
|
24/24 |
94d |
956510c0c743
fs: ext4: initialize fsdata in pagecache_write()
|
KASAN: vmalloc-out-of-bounds Write in imageblit (2)
fbdev
|
C |
done |
|
701 |
268d |
556d
|
24/24 |
94d |
566f9c9f8933
vt: Clear selection before changing the font
|
UBSAN: shift-out-of-bounds in ntfs_fill_super
ntfs3
|
C |
done |
|
3643 |
94d |
403d
|
24/24 |
94d |
a3b774342fa7
fs/ntfs3: validate BOOT sectors_per_clusters
|
possible deadlock in kcm_ioctl
net
|
C |
error |
|
20 |
280d |
281d
|
24/24 |
94d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
KMSAN: uninit-value in can_send
can
|
C |
|
|
630 |
189d |
207d
|
24/24 |
94d |
3eb3d283e857
can: j1939: j1939_send_one(): fix missing CAN header initialization
|
KASAN: invalid-access Read in copy_page
arm
|
|
|
|
302 |
230d |
297d
|
24/24 |
94d |
a8e5e5146ad0
arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored
|
memory leak in __tcp_send_ack
net
|
C |
|
|
10 |
232d |
763d
|
24/24 |
94d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
INFO: task hung in hub_port_init (2)
usb
|
C |
error |
|
486 |
97d |
559d
|
24/24 |
94d |
26fbe9772b8c
USB: core: Fix hang in usb_kill_urb by adding memory barriers
|
usb-testing boot error: WARNING in anon_vma_clone
mm
|
|
|
|
1 |
287d |
287d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KMSAN: uninit-value in __tipc_nl_bearer_enable
tipc
|
C |
|
|
1288 |
95d |
1623d
|
24/24 |
94d |
7f36f798f89b
tipc: check attribute length for bearer name
|
kernel BUG in __skb_gso_segment
net
|
C |
done |
|
11 |
361d |
360d
|
24/24 |
94d |
e9d3f80935b6
net/af_packet: make sure to pull mac header
|
inconsistent lock state in kmem_cache_alloc
io-uring
|
C |
|
|
4 |
238d |
245d
|
24/24 |
94d |
b000145e9907
io_uring/rw: defer fsnotify calls to task context
|
general protection fault in rlb_clear_slave
net
|
|
|
|
1 |
337d |
337d
|
24/24 |
94d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
WARNING: ODEBUG bug in mgmt_index_removed
bluetooth
|
|
|
|
1 |
268d |
263d
|
24/24 |
94d |
f74ca25d6d66
Bluetooth: avoid hci_dev_test_and_set_flag() in mgmt_init_hdev()
|
inconsistent lock state in padata_do_serial (2)
crypto
|
|
|
|
1 |
257d |
253d
|
24/24 |
94d |
34c3a47d20ae
padata: Always leave BHs disabled when running ->parallel()
|
WARNING in vmx_queue_exception (2)
kvm
|
C |
|
|
5 |
393d |
392d
|
24/24 |
94d |
053d2290c030
KVM: VMX: Exit to userspace if vCPU has injected exception and invalid state
|
usb-testing boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
7 |
350d |
356d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
BUG: unable to handle kernel NULL pointer dereference in gsmld_receive_buf
kernel
|
C |
error |
|
324 |
267d |
294d
|
24/24 |
94d |
f16c6d2e58a4
tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf()
|
KASAN: null-ptr-deref Write in io_file_get_normal
io-uring
fs
|
C |
done |
|
107 |
339d |
424d
|
24/24 |
94d |
d5361233e9ab
io_uring: drop the old style inflight file tracking
|
general protection fault in i2c_setup_smbus_alert
acpi
usb
|
C |
done |
|
20 |
461d |
479d
|
24/24 |
94d |
8302532f47bb
i2c: smbus: Check for parent device before dereference
|
KASAN: use-after-free Write in sco_sock_timeout
bluetooth
|
C |
done |
|
272 |
369d |
641d
|
24/24 |
94d |
7aa1e7d15f8a
Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout
|
general protection fault in tcp_create_openreq_child
net
|
C |
unreliable |
|
83 |
399d |
401d
|
24/24 |
94d |
ba5a4fdd63ae
tcp: make sure treq->af_specific is initialized
|
INFO: trying to register non-static key in rxe_cleanup_task
rdma
|
syz |
|
|
299 |
95d |
371d
|
24/24 |
94d |
fd5382c5805c
RDMA/rxe: Fix error unwind in rxe_create_qp()
|
WARNING in netif_rx
can
|
|
|
|
2 |
460d |
460d
|
24/24 |
94d |
167053f8dd0e
net: Correct wrong BH disable in hard-interrupt.
|
KASAN: out-of-bounds Read in ntfs_set_ea
ntfs3
|
C |
error |
done |
4 |
160d |
162d
|
24/24 |
94d |
0e8235d28f3a
fs/ntfs3: Check fields while reading
|
UBSAN: array-index-out-of-bounds in nfnetlink_unbind
netfilter
|
C |
done |
|
6621 |
360d |
377d
|
24/24 |
94d |
ffd219efd9ee
netfilter: nfnetlink: fix warn in nfnetlink_unbind
|
INFO: trying to register non-static key in nilfs_bmap_lookup_at_level
nilfs
|
C |
error |
|
124 |
203d |
242d
|
24/24 |
94d |
21a87d88c225
nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
|
general protection fault in ovl_dentry_upper
overlayfs
|
C |
error |
|
2 |
190d |
186d
|
24/24 |
94d |
672e4268b286
ovl: fix use inode directly in rcu-walk mode
|
net-next test error: WARNING in __napi_schedule
wireguard
|
|
|
|
110 |
434d |
437d
|
24/24 |
94d |
351bdbb6419c
net: Revert the softirq will run annotation in ____napi_schedule().
|
BUG: unable to handle kernel paging request in get_desc
kernel
|
syz |
error |
|
8 |
194d |
206d
|
24/24 |
94d |
97650148a15e
x86/mm: Populate KASAN shadow for entire per-CPU range of CPU entry area
|
general protection fault in ath9k_hif_usb_rx_cb (2)
wireless
|
C |
error |
|
1678 |
292d |
1046d
|
24/24 |
94d |
0ac4827f78c7
ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
|
upstream test error: WARNING in __queue_work
kernel
|
|
|
|
1 |
276d |
272d
|
24/24 |
94d |
deee93d13d38
Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works
|
UBSAN: shift-out-of-bounds in dbAllocAG
jfs
|
C |
error |
|
10 |
211d |
243d
|
24/24 |
94d |
898f70669568
fs: jfs: fix shift-out-of-bounds in dbAllocAG
|
kernel panic: corrupted stack end in tun_chr_ioctl
kernfs
|
|
|
|
1 |
341d |
341d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KCSAN: data-race in veth_xmit / veth_xmit
net
|
|
|
|
1 |
479d |
475d
|
24/24 |
94d |
68468d8c4cd4
veth: fix races around rq->rx_notify_masked
|
KASAN: vmalloc-out-of-bounds Write in ringbuf_map_alloc
bpf
|
C |
done |
|
541 |
479d |
482d
|
24/24 |
94d |
b293dcc473d2
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
|
kernel BUG in mld_newpack
net
|
|
|
|
1 |
226d |
226d
|
24/24 |
94d |
d89d7ff01235
ipv6: ensure sane device mtu in tunnels
|
BUG: sleeping function called from invalid context in break_ksm
mm
|
C |
|
|
9 |
221d |
221d
|
24/24 |
94d |
d7c0e68dab98
mm/ksm: convert break_ksm() to use walk_page_range_vma()
|
KMSAN: uninit-value in ipvlan_queue_xmit
net
|
C |
|
|
2 |
272d |
855d
|
24/24 |
94d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
possible deadlock in btrfs_commit_transaction
btrfs
|
C |
error |
done |
6 |
184d |
195d
|
24/24 |
94d |
b740d8061669
btrfs: free btrfs_path before copying root refs to userspace
|
net-next boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
23 |
347d |
353d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
UBSAN: shift-out-of-bounds in __access_remote_vm
ntfs3
|
C |
done |
|
3 |
282d |
279d
|
24/24 |
94d |
caad9dd8792a
fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()
|
WARNING in kcov_mmap
mm
|
|
|
|
14 |
371d |
426d
|
24/24 |
94d |
ecc04463d1a3
kcov: don't generate a warning on vm_insert_page()'s failure
|
WARNING: suspicious RCU usage in ipmr_rtm_dumplink
net
|
|
|
|
11 |
335d |
339d
|
24/24 |
94d |
0fcae3c8b1b3
ipmr: fix a lockdep splat in ipmr_rtm_dumplink()
|
possible deadlock in nci_set_local_general_bytes
nfc
|
C |
|
|
32 |
145d |
196d
|
24/24 |
94d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
KASAN: slab-out-of-bounds Read in run_unpack
ntfs3
|
C |
|
|
97 |
141d |
249d
|
24/24 |
94d |
887bfc546097
fs/ntfs3: Fix slab-out-of-bounds read in run_unpack
|
upstream boot error: BUG: corrupted list in copy_process
kernel
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Read in __snd_rawmidi_transmit_peek
alsa
usb
|
syz |
error |
|
48 |
296d |
406d
|
24/24 |
94d |
0665886ad139
ALSA: usb-audio: Clear MIDI port active flag after draining
|
BUG: MAX_LOCK_DEPTH too low! (3)
s390
net
|
C |
done |
|
18 |
466d |
475d
|
24/24 |
94d |
1de9770d121e
net/smc: Avoid overwriting the copies of clcsock callback functions
|
UBSAN: shift-out-of-bounds in hid_report_raw_event (2)
usb
input
|
C |
error |
|
1 |
199d |
195d
|
24/24 |
94d |
ec61b4191858
HID: core: fix shift-out-of-bounds in hid_report_raw_event
|
KASAN: use-after-free Read in port100_send_complete
nfc
usb
|
C |
|
|
1 |
451d |
447d
|
24/24 |
94d |
f80cfe2f2658
NFC: port100: fix use-after-free in port100_send_complete
|
KMSAN: uninit-value in iforce_init_device (2)
input
|
|
|
|
3 |
230d |
203d
|
24/24 |
94d |
b8ebf250997c
Input: iforce - invert valid length check when fetching device IDs
|
KASAN: use-after-free Read in usb_udc_uevent
usb
|
syz |
error |
|
30 |
305d |
1091d
|
24/24 |
94d |
2191c00855b0
USB: gadget: Fix use-after-free Read in usb_udc_uevent()
|
bpf-next boot error: WARNING in bpf_prog_pack_free
bpf
|
|
|
|
12 |
433d |
434d
|
24/24 |
94d |
96805674e562
bpf: Fix bpf_prog_pack for multi-node setup
|
general protection fault in skb_clone (5)
net
|
C |
done |
|
7 |
210d |
227d
|
24/24 |
94d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
KCSAN: data-race in fib6_info_hw_flags_set / fib6_purge_rt
net
|
|
|
|
1 |
499d |
497d
|
24/24 |
94d |
d95d6320ba7a
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
|
KASAN: use-after-free Read in macsec_get_iflink
net
|
|
|
|
1 |
371d |
367d
|
24/24 |
94d |
196a888ca657
macsec: fix UAF bug for real_dev
|
KASAN: slab-out-of-bounds Write in dbgfs_rm_context_write
damon
|
C |
error |
|
6 |
205d |
211d
|
24/24 |
94d |
1de09a7281ed
mm/damon/dbgfs: check if rm_contexts input is for a real context
|
KMSAN: kernel-infoleak in _copy_to_iter (7)
net
|
C |
|
|
138977 |
94d |
446d
|
24/24 |
94d |
633593a80898
sctp: fix kernel-infoleak for SCTP sockets
|
KASAN: use-after-free Write in inet_put_port
net
|
|
|
|
1 |
351d |
347d
|
24/24 |
94d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
upstream boot error: general protection fault in ieee80211_register_hw
wireless
|
|
|
|
1 |
287d |
287d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Read in bio_poll
block
|
C |
done |
|
6 |
385d |
385d
|
24/24 |
94d |
9650b453a3d4
block: ignore RWF_HIPRI hint for sync dio
|
WARNING in tcp_disconnect
net
|
|
|
|
2 |
222d |
226d
|
24/24 |
94d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
possible deadlock in virtual_nci_close
nfc
|
C |
done |
|
939 |
95d |
196d
|
24/24 |
94d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
WARNING in tcp_mtup_probe_success
net
|
|
|
|
3 |
362d |
368d
|
24/24 |
94d |
11825765291a
tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd
|
usb-testing boot error: BUG: unable to handle kernel paging request in insert_header
fs
|
|
|
|
1 |
272d |
272d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: slab-out-of-bounds Read in mi_find_attr
ntfs3
|
C |
done |
done |
1 |
166d |
162d
|
24/24 |
94d |
4f1dc7d9756e
fs/ntfs3: Validate attribute name offset
|
KASAN: use-after-free Read in do_garbage_collect
f2fs
|
C |
inconclusive |
|
2 |
197d |
197d
|
24/24 |
94d |
d3b7b4afd6b2
f2fs: fix to do sanity check on i_extra_isize in is_alive()
|
BUG: sleeping function called from invalid context in smc_pnet_add
net
|
C |
done |
|
45 |
476d |
477d
|
24/24 |
94d |
94fdd7c02a56
net/smc: use GFP_ATOMIC allocation in smc_pnet_add_eth()
|
KASAN: slab-out-of-bounds Write in bpf_prog_test_run_xdp
bpf
net
|
C |
done |
|
18 |
470d |
487d
|
24/24 |
94d |
a6763080856f
bpf: test_run: Fix OOB access in bpf_prog_test_run_xdp
|
usb-testing boot error: general protection fault in __handle_irq_event_percpu
kernel
|
|
|
|
1 |
273d |
273d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: slab-out-of-bounds Read in smc_fback_error_report
net
s390
|
C |
error |
|
72 |
397d |
473d
|
24/24 |
94d |
0558226cebee
net/smc: Fix slab-out-of-bounds issue in fallback
|
memory leak in iovec_from_user
fs
io-uring
|
C |
|
|
1 |
412d |
408d
|
24/24 |
94d |
323b190ba2de
io_uring: free iovec if file assignment fails
|
BUG: unable to handle kernel paging request in mi_enum_attr
ntfs3
|
C |
error |
done |
18 |
144d |
270d
|
24/24 |
94d |
0e8235d28f3a
fs/ntfs3: Check fields while reading
|
WARNING: refcount bug in nldev_newlink
rdma
|
C |
|
|
33 |
167d |
173d
|
24/24 |
94d |
e42f9c2e6aad
RDMA: Add missed netdev_put() for the netdevice_tracker
|
KASAN: slab-out-of-bounds Read in __hfs_brec_find
hfs
|
C |
|
|
5 |
168d |
182d
|
24/24 |
94d |
8d824e69d9f3
hfs: fix OOB Read in __hfs_brec_find
|
WARNING in bpf_check (3)
|
C |
done |
done |
1736 |
239d |
1173d
|
24/24 |
94d |
34dd3bad1a6f
bpf: Relax the requirement to use preallocated hash maps in tracing progs.
|
KASAN: use-after-free Read in raw_notifier_call_chain
kernel
|
|
|
|
68 |
181d |
419d
|
24/24 |
94d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KCSAN: data-race in packet_setsockopt / packet_setsockopt
net
|
|
|
|
1 |
501d |
489d
|
24/24 |
94d |
e42e70ad6ae2
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
|
memory leak in usb_set_configuration (3)
usb
|
C |
|
|
2 |
332d |
358d
|
24/24 |
94d |
945a9a8e448b
media: pvrusb2: fix memory leak in pvr_probe
|
KASAN: use-after-free Read in ar5523_cmd_tx_cb
usb
wireless
|
C |
inconclusive |
|
372 |
190d |
245d
|
24/24 |
94d |
b6702a942a06
wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
|
kernel panic: corrupted stack end in shmem_fault
cgroups
mm
|
|
|
|
5 |
101d |
232d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
possible deadlock in strp_work
net
|
C |
error |
|
4 |
280d |
281d
|
24/24 |
94d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
KASAN: use-after-free Read in __fib6_clean_all
net
|
|
|
|
30 |
184d |
437d
|
24/24 |
94d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KCSAN: data-race in do_epoll_wait / do_epoll_wait
fs
|
|
|
|
83 |
369d |
578d
|
24/24 |
94d |
d679ae94fdd5
list: fix a data-race around ep->rdllist
|
KMSAN: uninit-value in asix_mdio_write_nopm
net
usb
|
|
|
|
2 |
419d |
440d
|
24/24 |
94d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
WARNING in dlfb_submit_urb/usb_submit_urb
usb
fbdev
|
C |
done |
|
481 |
167d |
1428d
|
24/24 |
94d |
aaf7dbe07385
video: fbdev: udlfb: properly check endpoint type
|
KCSAN: data-race in kcm_rcv_strparser / kcm_rfree (7)
net
|
|
|
|
1 |
223d |
223d
|
24/24 |
94d |
0c745b5141a4
kcm: annotate data-races around kcm->rx_wait
|
linux-next test error: WARNING in set_peer
wireguard
|
|
|
|
39 |
251d |
258d
|
24/24 |
94d |
26c013108c12
wireguard: netlink: avoid variable-sized memcpy on sockaddr
|
BUG: sleeping function called from invalid context in blk_mq_release
block
|
|
|
|
1 |
424d |
424d
|
24/24 |
94d |
d578c770c852
block: avoid calling blkg_free() in atomic context
|
WARNING in devl_port_unregister
net
|
C |
|
|
1690 |
97d |
200d
|
24/24 |
94d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
WARNING: suspicious RCU usage in corrupted (2)
net
|
C |
unreliable |
|
7 |
338d |
350d
|
24/24 |
94d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
possible deadlock in __btrfs_release_delayed_node
btrfs
|
|
|
|
1 |
192d |
192d
|
24/24 |
94d |
796787c978ef
btrfs: do not modify log tree while holding a leaf from fs tree locked
|
usb-testing boot error: BUG: unable to handle kernel paging request in enqueue_task_fair
mm
|
|
|
|
1 |
272d |
272d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
kernel BUG in vhost_get_vq_desc
kvm
net
virt
|
C |
inconclusive |
|
19 |
458d |
471d
|
24/24 |
94d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
kernel panic: corrupted stack end in hub_event
kernfs
|
|
|
|
93 |
102d |
447d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in snd_rawmidi_transmit
alsa
usb
|
C |
done |
done |
7 |
362d |
396d
|
24/24 |
94d |
0125de38122f
ALSA: usb-audio: Cancel pending work at closing a MIDI substream
|
kernel panic: corrupted stack end in dput (2)
ext4
|
|
|
|
1 |
193d |
193d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in skb_warn_bad_offload (3)
net
|
C |
done |
|
115 |
95d |
232d
|
24/24 |
94d |
87445f369cca
ipv6: ping: fix wrong checksum for large frames
|
WARNING in arp_ioctl
net
|
C |
error |
done |
17 |
166d |
236d
|
24/24 |
94d |
b5f0de6df6dc
net: dev: Convert sa_data to flexible array in struct sockaddr
|
kernel panic: corrupted stack end in tcp_setsockopt
netfilter
|
|
|
|
3 |
199d |
348d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
general protection fault in __pm_runtime_resume (2)
pm
|
C |
error |
|
7 |
433d |
442d
|
24/24 |
94d |
32cb08e95869
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
|
KMSAN: kernel-usb-infoleak in hif_usb_send
wireless
|
C |
|
|
18149 |
402d |
1021d
|
24/24 |
94d |
d1e0df1c57bd
ath9k_htc: fix uninit value bugs
|
WARNING in ipvlan_queue_xmit
net
|
C |
inconclusive |
|
4 |
272d |
272d
|
24/24 |
94d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
kernel panic: corrupted stack end in loop_workfn
ext4
|
|
|
|
1 |
402d |
402d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in notifier_call_chain
kernel
|
C |
error |
|
157 |
186d |
192d
|
24/24 |
94d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
WARNING in wnd_init
ntfs3
|
C |
done |
|
23 |
160d |
242d
|
24/24 |
94d |
0d0f659bf713
fs/ntfs3: Use __GFP_NOWARN allocation at wnd_init()
019d22eb0eb7
fs/ntfs3: Validate attribute data and valid sizes
|
upstream build error (18)
kernel
|
|
|
|
20 |
96d |
367d
|
24/24 |
94d |
e68b823ab0ba
arm64/hugetlb: Fix building errors in huge_ptep_clear_flush()
|
usb-testing boot error: general protection fault in __register_sysctl_table (2)
fs
|
|
|
|
1 |
272d |
272d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Read in si470x_int_in_callback (2)
usb
media
|
C |
error |
|
7303 |
162d |
1319d
|
24/24 |
94d |
7d21e0b1b41b
media: si470x: Fix use-after-free in si470x_int_in_callback()
|
BUG: unable to handle kernel NULL pointer dereference in f2fs_stop_discard_thread
f2fs
|
C |
done |
|
23 |
162d |
228d
|
24/24 |
94d |
91586ce0d39a
f2fs: fix to invalidate dcc->f2fs_issue_discard in error path
|
WARNING in __perf_event_overflow
perf
|
C |
done |
|
9 |
183d |
208d
|
24/24 |
94d |
bb88f9695460
perf: Improve missing SIGTRAP checking
|
WARNING: still has locks held in tls_rx_reader_lock
net
|
C |
done |
|
4 |
312d |
313d
|
24/24 |
94d |
dde06aaa89b7
tls: rx: release the sock lock on locking timeout
|
KASAN: use-after-free Read in setup_rw_floppy
block
|
|
|
|
3 |
465d |
481d
|
24/24 |
94d |
233087ca0636
floppy: disable FDRAWCMD by default
|
memory leak in gs_usb_probe
can
usb
|
C |
|
|
1 |
430d |
426d
|
24/24 |
94d |
50d34a0d151d
can: gs_usb: gs_make_candev(): fix memory leak for devices with extended bit timing configuration
|
memory leak in airspy_probe
media
usb
|
C |
|
|
1 |
295d |
291d
|
24/24 |
94d |
23bc5eb55f8c
media: airspy: fix memory leak in airspy probe
|
general protection fault in hugetlbfs_parse_param
fs
mm
|
C |
error |
|
5 |
210d |
221d
|
24/24 |
94d |
26215b7ee923
hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()
|
possible deadlock in __snd_pcm_lib_xfer
alsa
|
C |
unreliable |
|
3 |
427d |
426d
|
24/24 |
94d |
bc55cfd5718c
ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
|
WARNING: suspicious RCU usage in in6_dump_addrs
net
|
C |
unreliable |
|
613 |
306d |
350d
|
24/24 |
94d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
upstream boot error: INFO: task hung in hwrng_register
crypto
|
|
|
|
23 |
352d |
359d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
kernel panic: corrupted stack end in inet_rtm_newaddr
net
|
|
|
|
23 |
97d |
434d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in __oom_reap_task_mm
mm
|
|
|
|
1 |
475d |
469d
|
24/24 |
94d |
f798a1d4f94d
mm: fix use-after-free bug when mm->mmap is reused after being freed
|
inconsistent lock state in smc_fback_state_change
net
s390
|
C |
error |
|
7 |
186d |
192d
|
24/24 |
94d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
memory leak in blk_iolatency_init (2)
cgroups
block
|
C |
|
|
131 |
236d |
443d
|
24/24 |
94d |
daaca3522a8e
block: release rq qos structures for queue without disk
|
linux-next test error: WARNING in devl_port_unregister
net
|
|
|
|
23 |
200d |
203d
|
24/24 |
94d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
KMSAN: uninit-value in idmouse_open
usb
|
C |
|
|
5 |
257d |
252d
|
24/24 |
94d |
bce2b0539933
usb: idmouse: fix an uninit-value in idmouse_open
|
KASAN: use-after-free Read in tcp_retransmit_timer (5)
net
|
C |
unreliable |
|
16000 |
178d |
1190d
|
24/24 |
94d |
3a58f13a881e
net: rds: acquire refcount on TCP sockets
|
WARNING in inet_csk_destroy_sock (2)
io-uring
net
|
C |
done |
|
8 |
143d |
229d
|
24/24 |
94d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
WARNING in ovl_fh_to_dentry
overlayfs
|
C |
|
|
169 |
168d |
248d
|
24/24 |
94d |
cf8aa9bf97ca
ovl: Use "buf" flexible array for memcpy() destination
|
WARNING in notify_change (2)
fuse
|
C |
unreliable |
|
2 |
187d |
188d
|
24/24 |
94d |
44361e8cf9dd
fuse: lock inode unconditionally in fuse_fallocate()
|
KASAN: null-ptr-deref Read in ida_free (2)
usb
|
C |
done |
|
3 |
338d |
339d
|
24/24 |
94d |
90bc2af24638
USB: gadget: Fix double-free bug in raw_gadget driver
|
KASAN: use-after-free Read in nf_confirm
netfilter
|
C |
done |
|
605 |
360d |
377d
|
24/24 |
94d |
56b14ecec97f
netfilter: conntrack: re-fetch conntrack after insertion
|
WARNING in __vunmap
net
|
C |
error |
error |
154 |
243d |
1563d
|
24/24 |
94d |
8a04d2fc700f
xfrm: Update ipcomp_scratches with NULL when freed
|
memory leak in xas_nomem
mm
|
C |
|
|
1 |
370d |
366d
|
24/24 |
94d |
69a37a8ba1b4
mm/huge_memory: Fix xarray node memory leak
|
WARNING in io_req_complete_failed
io-uring
|
C |
error |
|
2 |
185d |
182d
|
24/24 |
94d |
c06c6c5d2767
io_uring: always lock in io_apoll_task_func
|
memory leak in napi_get_frags
net
|
C |
|
|
11 |
843d |
864d
|
24/24 |
94d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
kernel panic: corrupted stack end in mld_dad_work
mm
|
|
|
|
1 |
266d |
266d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
memory leak in netlink_policy_dump_add_policy
net
|
C |
|
|
1 |
294d |
290d
|
24/24 |
94d |
249801360db3
net: genl: fix error path memory leak in policy dumping
|
KCSAN: data-race in fib6_clean_node / inet6_csk_route_socket
net
|
|
|
|
1 |
494d |
494d
|
24/24 |
94d |
aafc2e3285c2
ipv6: annotate accesses to fn->fn_sernum
|
KCSAN: data-race in lru_add_fn / tcp_build_frag
mm
|
|
|
|
4 |
264d |
273d
|
24/24 |
94d |
84ce071e38a6
net: introduce __skb_fill_page_desc_noacc
|
KASAN: use-after-free Read in nf_tables_trans_destroy_work
netfilter
|
C |
done |
|
6 |
224d |
231d
|
24/24 |
94d |
d4bc8271db21
netfilter: nf_tables: netlink notifier might race to release objects
26b5934ff419
netfilter: nf_tables: release flow rule object from commit path
|
linux-next boot error: WARNING in kfence_protect
kasan
mm
|
|
|
|
12 |
192d |
193d
|
24/24 |
94d |
3e844d842d49
x86/mm: Ensure forced page table splitting
|
KASAN: use-after-free Read in jbd2_journal_wait_updates
ext4
|
C |
error |
|
143 |
431d |
475d
|
24/24 |
94d |
cc16eecae687
jbd2: fix use-after-free of transaction_t race
|
BUG: unable to handle kernel paging request in inet_unhash
net
|
|
|
|
3 |
190d |
271d
|
24/24 |
94d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
bpf boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
13 |
345d |
353d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
KASAN: vmalloc-out-of-bounds Read in __text_poke
kernel
|
|
|
|
5 |
397d |
469d
|
24/24 |
94d |
d24d2a2b0a81
bpf: bpf_prog_pack: Set proper size before freeing ro_header
|
usb-testing boot error: BUG: unable to handle kernel paging request in follow_page_mask
mm
|
|
|
|
1 |
269d |
265d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in llc_ui_connect
net
|
C |
done |
|
17 |
427d |
430d
|
24/24 |
94d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
memory leak in ndisc_send_rs
net
|
C |
|
|
2 |
591d |
638d
|
24/24 |
94d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
WARNING in find_vma
mm
|
C |
done |
|
2616 |
271d |
294d
|
24/24 |
94d |
d6f35446d076
binder_alloc: Add missing mmap_lock calls when using the VMA
44e602b4e52f
binder_alloc: add missing mmap_lock calls when using the VMA
|
BUG: unable to handle kernel paging request in kvm_arch_hardware_enable
kvm
|
C |
error |
|
28 |
282d |
286d
|
24/24 |
94d |
4ba4f4194274
KVM: Properly unwind VM creation if creating debugfs fails
|
WARNING in __brelse
udf
|
C |
inconclusive |
|
22 |
101d |
243d
|
24/24 |
94d |
c791730f2554
udf: Avoid double brelse() in udf_rename()
|
WARNING: ODEBUG bug in kvm_xen_vcpu_set_attr
kvm
io-uring
|
C |
done |
|
4 |
302d |
354d
|
24/24 |
94d |
af735db31285
KVM: x86/xen: Initialize Xen timer only once
c03689913635
KVM: x86/xen: Stop Xen timer before changing IRQ
|
WARNING in erofs_iget
erofs
mm
|
C |
|
|
6 |
215d |
265d
|
24/24 |
94d |
1dd73601a1cb
erofs: fix order >= MAX_ORDER warning due to crafted negative i_size
|
KCSAN: data-race in bond_3ad_initiate_agg_selection / bond_3ad_state_machine_handler (2)
net
|
|
|
|
1 |
469d |
469d
|
24/24 |
94d |
9ceaf6f76b20
bonding: fix data-races around agg_select_timer
|
INFO: task hung in hci_dev_close_sync
bluetooth
|
C |
unreliable |
|
2366 |
235d |
391d
|
24/24 |
94d |
e36bea6e78ab
Bluetooth: core: Fix deadlock on hci_power_on_sync.
|
KMSAN: kernel-infoleak in vmci_host_unlocked_ioctl (2)
kernel
|
C |
|
|
2 |
243d |
243d
|
24/24 |
94d |
e5b0d06d9b10
misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
|
general protection fault in llc_ui_sendmsg
net
|
C |
done |
|
365 |
427d |
431d
|
24/24 |
94d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
WARNING in nf_tables_exit_net
netfilter
|
C |
error |
|
3 |
212d |
212d
|
24/24 |
94d |
03c1f1ef1584
netfilter: Cleanup nft_net->module_list from nf_tables_exit_net()
|
upstream boot error: general protection fault in __get_vm_area_node
kernel
|
|
|
|
1 |
286d |
286d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
possible deadlock in console_lock_spinning_enable (2)
serial
|
C |
inconclusive |
done |
117 |
375d |
561d
|
24/24 |
94d |
09c5ba0aa2fc
printk: add kthread console printers
|
WARNING in scsi_alloc_sgtables
fuse
scsi
|
C |
|
|
93 |
334d |
680d
|
24/24 |
94d |
d9a434fa0c12
scsi: core: Fix warning in scsi_alloc_sgtables()
|
UBSAN: shift-out-of-bounds in nilfs_load_super_block
nilfs
|
C |
error |
|
3 |
206d |
216d
|
24/24 |
94d |
610a2a3d7d8b
nilfs2: fix shift-out-of-bounds/overflow in nilfs_sb2_bad_offset()
|
INFO: task hung in blk_freeze_queue (3)
arm
|
C |
|
|
8 |
191d |
271d
|
24/24 |
94d |
1de7c3cf48fc
nbd: Fix hung when signal interrupts nbd_start_device_ioctl()
|
UBSAN: shift-out-of-bounds in init_sb (3)
gfs2
|
C |
|
|
40 |
223d |
289d
|
24/24 |
94d |
670f8ce56dd0
gfs2: Check sb_bsize_shift after reading superblock
|
memory leak in keyctl_watch_key
keyrings
lsm
|
C |
|
|
1 |
439d |
435d
|
24/24 |
94d |
3d8dcf278b1e
watch_queue: Actually free the watch
|
memory leak in fbcon_set_font (2)
fbdev
|
C |
|
|
1 |
176d |
175d
|
24/24 |
94d |
3c3bfb8586f8
fbdev: fbcon: release buffer when fbcon_do_set_font() failed
|
KASAN: use-after-free Read in inet_twsk_kill
net
|
|
|
|
86 |
486d |
489d
|
24/24 |
94d |
fbb8295248e1
tcp: allocate tcp_death_row outside of struct netns_ipv4
|
INFO: task hung in scsi_remove_host
scsi
usb
|
C |
done |
|
328 |
245d |
281d
|
24/24 |
94d |
2b36209ca818
scsi: core: Revert "Call blk_mq_free_tag_set() earlier"
d94b2d00f7bf
scsi: core: Revert "Make sure that hosts outlive targets"
f782201ebc2b
scsi: core: Revert "Make sure that targets outlive devices"
70e8d057bef5
scsi: core: Revert "Simplify LLD module reference counting"
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
net
|
C |
inconclusive |
|
12 |
443d |
844d
|
24/24 |
94d |
c700525fcc06
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
WARNING in binder_alloc_vma_close
kernel
|
C |
done |
|
18 |
246d |
336d
|
24/24 |
94d |
b0cab80ecd54
android: binder: fix lockdep check on clearing vma
|
general protection fault in ext4_fill_super
ext4
fat
|
C |
done |
|
5 |
282d |
497d
|
24/24 |
94d |
7c268d4ce2d3
ext4: fix potential NULL pointer dereference in ext4_fill_super()
|
INFO: task hung in vhost_work_dev_flush
kvm
net
virt
|
C |
error |
|
2 |
474d |
465d
|
24/24 |
94d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
stack segment fault in skb_clone
net
|
C |
unreliable |
inconclusive |
3 |
349d |
534d
|
24/24 |
94d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
WARNING: suspicious RCU usage in bond_ethtool_get_ts_info
net
|
C |
done |
|
6 |
380d |
382d
|
24/24 |
94d |
9b80ccda233f
bonding: fix missed rcu protection
|
WARNING in nsim_map_alloc_elem
mm
|
C |
error |
|
7 |
289d |
309d
|
24/24 |
94d |
d0b80a9edb1a
netdevsim: Avoid allocation warnings triggered from user space
|
KASAN: use-after-free Read in nilfs_segctor_sync
nilfs
|
C |
error |
|
3 |
200d |
210d
|
24/24 |
94d |
8cccf05fe857
nilfs2: fix use-after-free bug of ns_writer on remount
|
KASAN: slab-out-of-bounds Write in watch_queue_set_filter
kernel
|
C |
inconclusive |
|
7 |
435d |
438d
|
24/24 |
94d |
c993ee0f9f81
watch_queue: Fix filter limit check
|
UBSAN: array-index-out-of-bounds in pvr2_i2c_core_init
pvrusb2
usb
|
C |
inconclusive |
|
4 |
378d |
410d
|
24/24 |
94d |
471bec68457a
media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init
|
upstream boot error: BUG: unable to handle kernel paging request in copy_thread
kernel
|
|
|
|
1 |
286d |
286d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING in ext4_expand_extra_isize_ea
ext4
|
C |
error |
done |
3 |
168d |
180d
|
24/24 |
94d |
cc12a6f25e07
ext4: allocate extended attribute value in vmalloc area
|
general protection fault in do_check_common
bpf
|
C |
done |
|
5 |
326d |
330d
|
24/24 |
94d |
d1a6edecc1fd
bpf: Check attach_func_proto more carefully in check_return_code
|
usb-testing boot error: BUG: unable to handle kernel paging request in copy_namespaces
kernel
|
|
|
|
1 |
271d |
271d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in rlb_req_update_slave_clients
net
|
C |
inconclusive |
|
3 |
358d |
358d
|
24/24 |
94d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
WARNING in usbtmc_ioctl/usb_submit_urb
usb
|
C |
inconclusive |
|
8 |
107d |
452d
|
24/24 |
94d |
e9b667a82cdc
usb: usbtmc: Fix bug in pipe direction for control transfers
|
BUG: unable to handle kernel paging request in evict
fat
|
C |
error |
done |
23 |
202d |
247d
|
24/24 |
94d |
4e3c51f4e805
fs: do not update freeing inode i_io_list
|
BUG: unable to handle kernel paging request in truncate_inode_partial_folio
fs
mm
|
C |
error |
|
4 |
295d |
335d
|
24/24 |
94d |
84ac013046cc
secretmem: fix unhandled fault in truncate
|
WARNING in hugetlb_wp
mm
|
C |
error |
|
3 |
206d |
212d
|
24/24 |
94d |
f347454d0341
mm/gup: disallow FOLL_FORCE|FOLL_WRITE on hugetlb mappings
|
inconsistent lock state in l2tp_tunnel_register
net
|
|
|
|
5599 |
180d |
193d
|
24/24 |
94d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KASAN: invalid-free in tcp_disconnect
net
|
C |
unreliable |
|
74 |
223d |
237d
|
24/24 |
94d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
riscv/fixes boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
8 |
296d |
347d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
WARNING in wireless_send_event
wireless
|
C |
|
|
210 |
210d |
248d
|
24/24 |
94d |
e3e6e1d16a4c
wifi: wext: use flex array destination for memcpy()
|
WARNING in register_shrinker_prepared
mm
f2fs
|
C |
error |
|
64 |
355d |
357d
|
24/24 |
94d |
5035ebc644ae
mm: shrinkers: introduce debugfs interface for memory shrinkers
|
WARNING in __split_huge_page_tail
mm
io-uring
arch
|
C |
error |
|
155 |
143d |
215d
|
24/24 |
94d |
5aae9265ee1a
mm: prep_compound_tail() clear page->private
|
WARNING in __folio_mark_dirty
gfs2
|
C |
error |
|
1791 |
94d |
578d
|
24/24 |
94d |
e897be17a441
nilfs2: fix lockdep warnings in page operations for btree nodes
|
BUG: sleeping function called from invalid context in static_key_slow_inc
|
C |
done |
|
82 |
181d |
193d
|
24/24 |
94d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KCSAN: data-race in ip6_dst_gc / ip6_dst_gc (3)
net
|
|
|
|
2 |
410d |
412d
|
24/24 |
94d |
9cb7c013420f
ipv6: make ip6_rt_gc_expire an atomic_t
|
KASAN: use-after-free Read in ath9k_hif_usb_rx_cb (2)
|
C |
done |
|
48810 |
291d |
924d
|
24/24 |
94d |
0ac4827f78c7
ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
|
kernel BUG in ntfs_read_inode_mount
ntfs
|
|
|
|
1 |
498d |
497d
|
24/24 |
94d |
714fbf2647b1
ntfs: add sanity check on allocation size
|
kernel BUG in btrfs_drop_extents
btrfs
|
C |
|
|
4 |
170d |
185d
|
24/24 |
94d |
162d053e15fe
btrfs: do not BUG_ON() on ENOMEM when dropping extent items for a range
|
BUG: sleeping function called from invalid context in binder_ioctl
kernel
|
C |
done |
|
30 |
371d |
377d
|
24/24 |
94d |
aed86f8add0e
binder: fix atomic sleep when get extended error
|
KASAN: use-after-free Read in madvise_update_vma
|
C |
done |
|
38 |
458d |
476d
|
24/24 |
94d |
942341dcc574
mm: fix use-after-free when anon vma name is used after vma is freed
|
WARNING in mcba_usb_probe/usb_submit_urb
usb
can
|
C |
error |
|
537 |
424d |
1419d
|
24/24 |
94d |
136bed0bfd3b
can: mcba_usb: properly check endpoint type
|
KASAN: use-after-free Read in register_shrinker_prepared (2)
mm
|
C |
done |
|
1145 |
206d |
244d
|
24/24 |
94d |
bd86c69dae65
NFSD: unregister shrinker when nfsd_init_net() fails
|
possible deadlock in rds_tcp_reset_callbacks
rds
|
C |
error |
|
1458 |
203d |
281d
|
24/24 |
94d |
a91b750fd662
net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks()
|
BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission
lsm
|
C |
|
|
1 |
201d |
197d
|
24/24 |
94d |
578b565b240a
9p/fd: Fix write overflow in p9_read_work
|
possible deadlock in nci_close_device
nfc
|
|
|
|
2 |
174d |
188d
|
24/24 |
94d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
memory leak in nft_chain_parse_hook
netfilter
|
C |
|
|
1 |
276d |
273d
|
24/24 |
94d |
77972a36ecc4
netfilter: nf_tables: clean up hook list when offload flags check fails
|
memory leak in sctp_sched_prio_set
sctp
|
C |
|
|
2 |
187d |
192d
|
24/24 |
94d |
9ed7bfc79542
sctp: fix memory leak in sctp_stream_outq_migrate()
|
BUG: sleeping function called from invalid context in sk_psock_stop
|
C |
done |
|
232 |
295d |
353d
|
24/24 |
94d |
697fb80a5364
bpf: Fix sockmap calling sleepable function in teardown path
|
KCSAN: data-race in dropmon_net_event / trace_napi_poll_hit
net
|
|
|
|
1 |
490d |
473d
|
24/24 |
94d |
dcd54265c8bc
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
|
linux-next boot error: BUG: unable to handle kernel paging request in copy_namespaces
kernel
|
|
|
|
1 |
286d |
286d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
upstream boot error: general protection fault in enqueue_entity
block
|
|
|
|
1 |
286d |
286d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in btrfs_stop_all_workers
btrfs
|
C |
done |
|
554 |
392d |
397d
|
24/24 |
94d |
385de0ef387d
btrfs: use a normal workqueue for rmw_workers
|
BUG: corrupted list in hci_conn_add_sysfs
bluetooth
|
C |
error |
done |
9 |
249d |
248d
|
24/24 |
94d |
448a496f7606
Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times
|
kernel BUG in __set_page_owner_handle
gfs2
|
C |
|
|
37 |
224d |
386d
|
24/24 |
94d |
cd8c1fd8cdd1
mm/page_owner: use strscpy() instead of strlcpy()
|
kernel BUG in netem_enqueue
net
|
|
|
|
9 |
165d |
390d
|
24/24 |
94d |
eeee4b77dc52
net: add more debug info in skb_checksum_help()
|
KASAN: slab-out-of-bounds Write in hfs_asc2mac
hfs
|
C |
error |
|
161 |
167d |
185d
|
24/24 |
94d |
c53ed55cb275
hfs: Fix OOB Write in hfs_asc2mac
|
WARNING in __dma_map_sg_attrs
|
C |
inconclusive |
|
65 |
294d |
544d
|
24/24 |
94d |
9e9fa6a9198b
udmabuf: Set the DMA mask for the udmabuf device (v2)
|
WARNING: ODEBUG bug in __cancel_work
bluetooth
|
C |
inconclusive |
|
1 |
287d |
283d
|
24/24 |
94d |
2d2cb3066f2c
Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create()
|
kernel panic: corrupted stack end in ext4_file_mmap
ext4
|
|
|
|
2 |
99d |
244d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
INFO: trying to register non-static key in gsmld_write
kernel
|
C |
error |
|
803 |
265d |
294d
|
24/24 |
94d |
4bb1a53be85f
tty: n_gsm: initialize more members at gsm_alloc_mux()
|
linux-next boot error: WARNING in kthread_should_stop
crypto
|
|
|
|
6 |
202d |
202d
|
24/24 |
94d |
db516da95ce4
hw_random: use add_hwgenerator_randomness() for early entropy
|
KMSAN: uninit-value in ath9k_htc_rx_msg
wireless
|
C |
|
|
17731 |
104d |
1023d
|
24/24 |
94d |
b383e8abed41
wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()
|
memory leak in vlan_dev_set_egress_priority (2)
net
|
C |
|
|
1 |
325d |
325d
|
24/24 |
94d |
72a0b329114b
vlan: fix memory leak in vlan_newlink()
|
WARNING in ieee80211_link_info_change_notify
wireless
|
C |
inconclusive |
|
1376 |
94d |
337d
|
24/24 |
94d |
591e73ee3f73
wifi: mac80211: properly skip link info driver update
|
general protection fault in ieee80211_subif_start_xmit (2)
wireless
|
C |
error |
|
5 |
211d |
218d
|
24/24 |
94d |
780854186946
wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit()
|
kernel BUG in ext4_mb_use_inode_pa
ext4
|
C |
error |
done |
2 |
238d |
237d
|
24/24 |
94d |
4bb26f2885ac
ext4: avoid crash when inline data creation follows DIO write
|
kernel BUG in hugepage_add_anon_rmap
mm
|
|
|
|
2 |
458d |
454d
|
24/24 |
94d |
4eecb8b9163d
mm/migrate: Convert remove_migration_ptes() to folios
|
INFO: task hung in __writeback_inodes_sb_nr (5)
ext4
|
C |
done |
|
48 |
101d |
471d
|
24/24 |
94d |
7d9b1b578d67
ip6mr: fix use-after-free in ip6mr_sk_done()
|
kernel BUG in mcopy_continue
mm
|
|
|
|
4 |
353d |
350d
|
24/24 |
94d |
73f37dbcfe17
mm: userfaultfd: fix UFFDIO_CONTINUE on fallocated shmem pages
|
memory leak in z_erofs_do_read_page
erofs
|
C |
|
|
1 |
179d |
179d
|
24/24 |
94d |
c42c0ffe8117
erofs: Fix pcluster memleak when its block address is zero
|
possible deadlock in fscrypt_initialize
fscrypt
|
|
|
|
10 |
94d |
404d
|
24/24 |
94d |
4c0d5778385c
ext4: don't set up encryption key during jbd2 transaction
|
linux-next boot error: general protection fault in rcu_core
kernel
|
|
|
|
1 |
287d |
287d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
upstream boot error: WARNING in genl_register_family
net
|
|
|
|
468 |
207d |
213d
|
24/24 |
94d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
upstream boot error: WARNING in copy_process
kernel
|
|
|
|
5 |
285d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Write in io_sendrecv_fail
io-uring
|
C |
|
|
75 |
225d |
248d
|
24/24 |
94d |
a75155faef4e
io_uring/net: fix UAF in io_sendrecv_fail()
|
general protection fault in reweight_entity
kernel
|
C |
error |
done |
10 |
470d |
524d
|
24/24 |
94d |
13765de8148f
sched/fair: Fix fault in reweight_entity
|
KASAN: use-after-free Read in __nf_register_net_hook
netfilter
|
C |
error |
|
5 |
456d |
456d
|
24/24 |
94d |
56763f12b0f0
netfilter: fix use-after-free in __nf_register_net_hook()
|
WARNING in bpf_test_finish
bpf
net
|
C |
done |
|
3 |
456d |
456d
|
24/24 |
94d |
530e214c5b5a
bpf, test_run: Fix overflow in XDP frags bpf_test_finish
|
general protection fault in gfs2_dump_glock
gfs2
|
C |
|
|
25 |
96d |
497d
|
24/24 |
94d |
428f651cb80b
gfs2: assign rgrp glock before compute_bitstructs
|
upstream test error: WARNING: ODEBUG bug in mgmt_index_removed
bluetooth
|
|
|
|
551 |
291d |
298d
|
24/24 |
94d |
3f2893d3c142
Bluetooth: don't try to cancel uninitialized works at mgmt_index_removed()
|
BUG: corrupted list in p9_fd_cancel (2)
9p
net
fuse
|
C |
error |
|
8 |
193d |
218d
|
24/24 |
94d |
11c10956515b
9p/fd: fix issue of list_del corruption in p9_fd_cancel()
|
KASAN: use-after-free Read in ntfs_attr_find
ntfs
|
C |
done |
|
74 |
110d |
277d
|
24/24 |
94d |
36a4d82dddbb
ntfs: fix out-of-bounds read in ntfs_attr_find()
|
upstream boot error: BUG: unable to handle kernel paging request in sched_change_group
cgroups
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: use-after-free Write in enqueue_timer
net
|
|
|
|
1 |
195d |
195d
|
24/24 |
94d |
ab0377803daf
mrp: introduce active flags to prevent UAF when applicant uninit
|
KMSAN: uninit-value in ___bpf_prog_run (3)
bpf
|
C |
|
|
5 |
408d |
410d
|
24/24 |
94d |
99c07327ae11
netlink: reset network and mac headers in netlink_dump()
|
kernel BUG in __page_mapcount
kernel
|
C |
error |
|
45 |
494d |
729d
|
24/24 |
94d |
24d7275ce279
fs/proc: task_mmu.c: don't read mapcount for migration entry
|
general protection fault in check_helper_call
bpf
|
C |
done |
|
4 |
313d |
318d
|
24/24 |
94d |
d1a6edecc1fd
bpf: Check attach_func_proto more carefully in check_return_code
|
memory leak in do_replace
netfilter
bridge
|
C |
|
|
1 |
256d |
252d
|
24/24 |
94d |
62ce44c4fff9
netfilter: ebtables: fix memory leak when blob is malformed
|
KASAN: null-ptr-deref Write in kcm_tx_work (3)
net
|
C |
inconclusive |
inconclusive |
7 |
241d |
342d
|
24/24 |
94d |
ec7eede369fe
kcm: avoid potential race in kcm_tx_work
|
general protection fault in ax25_send_frame (2)
hams
|
|
|
|
13 |
205d |
192d
|
24/24 |
94d |
e97c089d7a49
rose: Fix NULL pointer dereference in rose_send_frame()
|
general protection fault in xas_create_range
mm
|
|
|
|
1 |
438d |
434d
|
24/24 |
94d |
3e3c658055c0
XArray: Fix xas_create_range() when multi-order entry present
|
KASAN: use-after-free Read in nilfs_segctor_confirm
nilfs
|
C |
inconclusive |
|
19 |
222d |
240d
|
24/24 |
94d |
d325dc6eb763
nilfs2: fix use-after-free bug of struct nilfs_root
|
KASAN: invalid-free in free_prealloced_shrinker
mm
|
C |
done |
|
3 |
314d |
313d
|
24/24 |
94d |
14773bfa70e6
mm: shrinkers: fix double kfree on shrinker name
|
kernel panic: corrupted stack end in lo_ioctl
fs
mm
|
|
|
|
4 |
100d |
222d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
kernel panic: corrupted stack end in vfs_fallocate
ext4
|
|
|
|
1 |
220d |
216d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
kernel panic: corrupted stack end in rtnl_newlink
net
kernfs
|
|
|
|
3489 |
94d |
441d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING: refcount bug in sk_psock_get (2)
net
|
C |
done |
|
4 |
319d |
360d
|
24/24 |
94d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
linux-next test error: WARNING in __napi_schedule
wireguard
|
|
|
|
15 |
437d |
436d
|
24/24 |
94d |
351bdbb6419c
net: Revert the softirq will run annotation in ____napi_schedule().
|
WARNING in free_loaded_vmcs (3)
kvm
|
C |
inconclusive |
|
2 |
490d |
490d
|
24/24 |
94d |
f7e570780efc
KVM: x86: Forcibly leave nested virt when SMM state is toggled
|
upstream boot error: general protection fault in copy_signal
kernel
|
|
|
|
1 |
287d |
287d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in submit_bio_checks
block
btrfs
|
C |
done |
|
1258 |
461d |
483d
|
24/24 |
94d |
78e3437450be
block: call bio_associate_blkg from bio_reset
|
WARNING in nci_send_cmd
nfc
|
C |
|
|
13 |
181d |
194d
|
24/24 |
94d |
0ad6bded175e
nfc/nci: fix race with opening and closing
|
WARNING in ext2_get_group_desc
ext4
|
|
|
|
1 |
316d |
312d
|
24/24 |
94d |
fa78f3369372
ext2: Add more validity checks for inode counts
|
kernel BUG in binder_alloc_deferred_release
kernel
|
C |
done |
|
4 |
342d |
344d
|
24/24 |
94d |
a43cfc87caaf
android: binder: stop saving a pointer to the VMA
|
WARNING in nfnetlink_unbind
netfilter
|
C |
done |
|
235 |
360d |
377d
|
24/24 |
94d |
ffd219efd9ee
netfilter: nfnetlink: fix warn in nfnetlink_unbind
|
general protection fault in legacy_parse_param
fs
|
C |
done |
|
20 |
434d |
695d
|
24/24 |
94d |
ecff30575b5a
LSM: general protection fault in legacy_parse_param
|
KCSAN: data-race in kcm_rfree / unreserve_rx_kcm (3)
net
|
|
|
|
4 |
219d |
224d
|
24/24 |
94d |
15e4dabda11b
kcm: annotate data-races around kcm->rx_psock
|
INFO: trying to register non-static key in f2fs_handle_error
f2fs
|
C |
|
|
523 |
144d |
205d
|
24/24 |
94d |
cc249e4cba9a
f2fs: fix to avoid accessing uninitialized spinlock
92b4cf5b4895
f2fs: initialize locks earlier in f2fs_fill_super()
|
general protection fault in btf_decl_tag_resolve
bpf
|
C |
done |
|
6 |
480d |
480d
|
24/24 |
94d |
d7e7b42f4f95
bpf: Fix a btf decl_tag bug when tagging a function
|
possible deadlock in p9_req_put
|
C |
done |
|
2815 |
204d |
294d
|
24/24 |
94d |
52f1c45dde91
9p: trans_fd/p9_conn_cancel: drop client lock earlier
|
KASAN: use-after-free Write in null_skcipher_crypt
crypto
|
C |
done |
|
3 |
452d |
650d
|
24/24 |
94d |
ebe48d368e97
esp: Fix possible buffer overflow in ESP transformation
|
WARNING in nci_add_new_protocol
nfc
|
|
|
|
1 |
187d |
183d
|
24/24 |
94d |
e329e71013c9
NFC: nci: Bounds check struct nfc_target arrays
|
memory leak in mld_newpack
net
|
C |
|
|
2 |
255d |
673d
|
24/24 |
94d |
a43206156263
usbnet: Fix memory leak in usbnet_disconnect()
|
KASAN: use-after-free Read in io_rsrc_node_ref_zero
fs
|
C |
done |
|
3 |
462d |
462d
|
24/24 |
94d |
80912cef18f1
io_uring: disallow modification of rsrc_data during quiesce
|
kernel panic: corrupted stack end in cleanup_net
wireguard
|
|
|
|
2 |
152d |
371d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in netif_napi_add_weight
net
|
C |
inconclusive |
done |
45 |
333d |
346d
|
24/24 |
94d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
WARNING in isotp_tx_timer_handler (2)
can
|
C |
error |
|
1416 |
120d |
443d
|
24/24 |
94d |
3ea566422cbd
can: isotp: sanitize CAN ID checks in isotp_bind()
d73497081710
can: isotp: stop timeout monitoring when no first frame was sent
|
WARNING in ext4_xattr_block_set
ext4
|
C |
error |
|
57 |
100d |
206d
|
24/24 |
94d |
fae381a3d79b
ext4: init quota for 'old.inode' in 'ext4_rename'
|
general protection fault in shm_close
kernel
|
C |
done |
|
48 |
195d |
196d
|
24/24 |
94d |
b6305049f306
ipc/shm: call underlying open/close vm_ops
|
linux-next boot error: WARNING: suspicious RCU usage in cpuacct_charge
cgroups
|
|
|
|
21 |
440d |
451d
|
24/24 |
94d |
f2aa197e4794
cgroup: Fix suspicious rcu_dereference_check() usage warning
|
KASAN: use-after-free Read in udl_get_urb_timeout
dri
usb
|
C |
done |
|
142 |
250d |
280d
|
24/24 |
94d |
ed9605a66b62
Revert "drm/udl: Kill pending URBs at suspend and disconnect"
|
WARNING in kvm_arch_vcpu_ioctl_run (3)
kvm
|
C |
done |
error |
16157 |
95d |
1888d
|
24/24 |
94d |
ec6e4d863258
KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks
|
WARNING in kvm_mmu_notifier_invalidate_range_start (2)
kvm
|
C |
done |
|
14 |
421d |
434d
|
24/24 |
94d |
01e67e04c281
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
|
memory leak in dvb_usb_device_init
usb
media
|
syz |
|
|
1 |
200d |
370d
|
24/24 |
94d |
94d90fb06b94
media: dvb-usb: fix memory leak in dvb_usb_adapter_init()
|
BUG: using smp_processor_id() in preemptible code in tun_chr_write_iter
net
|
C |
done |
|
1834 |
433d |
443d
|
24/24 |
94d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
upstream boot error: BUG: corrupted list in find_and_remove_object
mm
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING in cpuset_write_resmask
cgroups
|
C |
done |
done |
127 |
450d |
516d
|
24/24 |
94d |
d068eebbd482
cgroup/cpuset: Make child cpusets restrict parents on v1 hierarchy
|
WARNING in f2fs_is_valid_blkaddr
f2fs
|
C |
done |
|
2562 |
362d |
980d
|
24/24 |
94d |
dc2f78e2d4cc
f2fs: remove WARN_ON in f2fs_is_valid_blkaddr
|
general protection fault in binder_alloc_new_buf
kernel
|
C |
error |
|
315 |
250d |
281d
|
24/24 |
94d |
1da52815d5f1
binder: fix alloc->vma_vm_mm null-ptr dereference
|
BUG: using smp_processor_id() in preemptible code in netdev_core_stats_alloc
net
|
C |
error |
|
2210 |
433d |
443d
|
24/24 |
94d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
KASAN: use-after-free Read in remove_wait_queue (3)
kernfs
|
C |
inconclusive |
|
123 |
133d |
559d
|
24/24 |
94d |
a06247c6804f
psi: Fix uaf issue when psi trigger is destroyed while being polled
|
KASAN: use-after-free Write in sctp_auth_shkey_hold (2)
sctp
|
C |
inconclusive |
|
7 |
246d |
245d
|
24/24 |
94d |
022152aaebe1
sctp: handle the error returned from sctp_auth_asoc_init_active_key
|
WARNING in ovs_dp_reset_user_features
openvswitch
|
C |
done |
|
3 |
213d |
229d
|
24/24 |
94d |
fd954cc1919e
openvswitch: switch from WARN to pr_warn
|
kernel BUG in ext4_ind_remove_space
ext4
|
C |
error |
done |
10 |
419d |
469d
|
24/24 |
94d |
2da376228a24
ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
|
linux-next boot error: WARNING: refcount bug in dvb_register_device
media
|
|
|
|
42 |
174d |
182d
|
24/24 |
94d |
3a664569b71b
media: dvbdev: fix refcnt bug
|
kernel BUG in f2fs_init_xattr_caches
f2fs
|
C |
|
|
24 |
249d |
273d
|
24/24 |
94d |
7e9c323c52b3
mm/slub: fix to return errno if kmalloc() fails
|
KASAN: use-after-free Read in hugetlb_fault
mm
|
C |
|
|
383 |
122d |
218d
|
24/24 |
94d |
04ada095dcfc
hugetlb: don't delete vma_lock in hugetlb MADV_DONTNEED processing
|
BUG: missing reserved tailroom
bpf
net
|
C |
done |
|
2 |
445d |
445d
|
24/24 |
94d |
b6f1f780b393
bpf, test_run: Fix packet size check for live packet mode
|
upstream boot error: stack segment fault in kvmalloc_node
wireless
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in smc_pnet_add (2)
net
s390
|
C |
inconclusive |
|
590 |
409d |
425d
|
24/24 |
94d |
d22f4f977236
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
|
WARNING in ntfs_fill_super
ntfs3
|
C |
error |
|
20 |
174d |
239d
|
24/24 |
94d |
59bfd7a483da
fs/ntfs3: Use __GFP_NOWARN allocation at ntfs_fill_super()
|
WARNING: refcount bug in free_netdevs
rdma
|
|
|
|
3 |
168d |
171d
|
24/24 |
94d |
e42f9c2e6aad
RDMA: Add missed netdev_put() for the netdevice_tracker
|
possible deadlock in ___neigh_create
net
|
C |
error |
|
24 |
479d |
483d
|
24/24 |
94d |
4a81f6da9cb2
net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work
|
BUG: unable to handle kernel paging request in kernfs_put_active
kernfs
nilfs
|
C |
|
|
2 |
254d |
254d
|
24/24 |
94d |
2e488f13755f
fs: fix UAF/GPF bug in nilfs_mdt_destroy
|
KASAN: slab-out-of-bounds Read in ntfs_trim_fs
ntfs3
|
C |
done |
|
204 |
146d |
244d
|
24/24 |
94d |
557d19675a47
fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs
|
BUG: unable to handle kernel paging request in percpu_counter_add_batch
kernel
|
|
|
|
140 |
118d |
220d
|
24/24 |
94d |
64b4c411a6c7
ipc/msg.c: fix percpu_counter use after free
|
WARNING in pskb_expand_head
|
C |
done |
done |
222 |
208d |
855d
|
24/24 |
94d |
dbae2b062824
net: skb: introduce and use a single page frag cache
|
KASAN: use-after-free Read in __tcf_qdisc_find
net
|
|
|
|
1 |
267d |
267d
|
24/24 |
94d |
ebda44da44f6
net: sched: fix race condition in qdisc_graft()
|
KCSAN: data-race in __ip4_datagram_connect / raw_bind (2)
net
|
|
|
|
1 |
489d |
489d
|
24/24 |
94d |
153a0d187e76
ipv4: raw: lock the socket in raw_bind()
|
general protection fault in llc_build_and_send_ui_pkt
net
|
C |
done |
|
26 |
427d |
431d
|
24/24 |
94d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
net-next test error: WARNING: suspicious RCU usage in hsr_node_get_first
net
|
|
|
|
189 |
464d |
473d
|
24/24 |
94d |
e7f27420681f
net: hsr: fix suspicious RCU usage warning in hsr_node_get_first()
|
KFENCE: memory corruption in p9_req_put
net
9p
|
|
|
|
2 |
191d |
194d
|
24/24 |
94d |
26273ade77f5
9p: set req refcount to zero to avoid uninitialized usage
|
general protection fault in llc_alloc_frame
net
|
|
|
|
1 |
429d |
429d
|
24/24 |
94d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
memory leak in kvm_vcpu_ioctl_set_cpuid2
kvm
|
C |
|
|
1 |
492d |
488d
|
24/24 |
94d |
811f95ff9527
KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
|
BUG: unable to handle kernel paging request in can_rcv_filter
can
|
C |
|
|
5 |
176d |
174d
|
24/24 |
94d |
0acc442309a0
can: af_can: fix NULL pointer dereference in can_rcv_filter
|
general protection fault in ntfs_update_mftmirr
ntfs3
|
C |
error |
|
6680 |
279d |
403d
|
24/24 |
94d |
321460ca3b55
fs/ntfs3: Fix NULL deref in ntfs_update_mftmirr
|
WARNING in tls_strp_done
net
|
C |
error |
|
22 |
283d |
288d
|
24/24 |
94d |
849f16bbfb68
tls: rx: react to strparser initialization errors
|
linux-next test error: general protection fault in xfrm_policy_lookup_bytype
net
|
|
|
|
15 |
187d |
189d
|
24/24 |
94d |
b97df039a68b
xfrm: Fix oops in __xfrm_state_delete()
|
WARNING in __set_page_dirty
nilfs
|
C |
error |
|
9 |
453d |
677d
|
24/24 |
94d |
e897be17a441
nilfs2: fix lockdep warnings in page operations for btree nodes
|
KASAN: use-after-free Read in __post_watch_notification
kernel
|
C |
inconclusive |
|
1 |
308d |
306d
|
24/24 |
94d |
e64ab2dbd882
watch_queue: Fix missing locking in add_watch_to_object()
|
WARNING: locking bug in hfa384x_usbctlx_completion_task
staging
usb
|
C |
|
|
2 |
341d |
337d
|
24/24 |
94d |
ee6c6e734247
staging/wlan-ng: get the correct struct hfa384x in work callback
|
BUG: unable to handle kernel NULL pointer dereference in __rxe_do_task
rdma
|
syz |
|
|
120 |
221d |
289d
|
24/24 |
94d |
a625ca30eff8
RDMA/rxe: Fix "kernel NULL pointer dereference" error
|
KASAN: slab-out-of-bounds Write in __build_skb_around
bpf
net
|
C |
error |
|
2536 |
167d |
182d
|
24/24 |
94d |
ce098da1497c
skbuff: Introduce slab_build_skb()
|
general protection fault in end_page_writeback
mm
nilfs
|
C |
error |
done |
2 |
193d |
224d
|
24/24 |
94d |
512c5ca01a36
nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty
|
KASAN: use-after-free Read in add_wait_queue
fs
io-uring
|
C |
done |
done |
13 |
427d |
433d
|
24/24 |
94d |
d89a4fac0fbc
io_uring: fix assuming triggered poll waitqueue is the single poll
|
WARNING in sk_stream_kill_queues (8)
net
|
C |
unreliable |
|
4268 |
98d |
334d
|
24/24 |
94d |
e9c6e7976026
tcp: fix sock skb accounting in tcp_read_skb()
|
KMSAN: uninit-value in r871xu_drv_init
usb
|
C |
|
|
7342 |
342d |
1453d
|
24/24 |
94d |
0458e5428e5e
staging: rtl8712: fix uninit-value in r871xu_drv_init()
d1b57669732d
staging: rtl8712: fix uninit-value in usb_read8() and friends
|
KCSAN: data-race in register_netdevice / type_show (2)
x25
|
|
|
|
2 |
345d |
348d
|
24/24 |
94d |
cc26c2661fef
net: fix data-race in dev_isalive()
|
WARNING in fuse_write_file_get
fuse
|
C |
done |
|
85 |
280d |
409d
|
24/24 |
94d |
035ff33cf4db
fuse: write inode in fuse_release()
|
general protection fault in rose_send_frame (2)
hams
|
|
|
|
7 |
208d |
232d
|
24/24 |
94d |
e97c089d7a49
rose: Fix NULL pointer dereference in rose_send_frame()
|
WARNING in mroute_clean_tables
net
|
C |
|
|
10 |
453d |
473d
|
24/24 |
94d |
5611a00697c8
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
|
general protection fault in pse_prepare_data
net
|
C |
inconclusive |
|
6 |
144d |
222d
|
24/24 |
94d |
46cdedf2a0fa
ethtool: pse-pd: fix null-deref on genl_info in dump
|
BUG: unable to handle kernel NULL pointer dereference in io_do_iopoll
fs
io-uring
|
C |
done |
|
3 |
378d |
377d
|
24/24 |
94d |
aa184e8671f0
io_uring: don't attempt to IOPOLL for MSG_RING requests
|
WARNING in btf_type_id_size
bpf
|
C |
done |
|
10 |
154d |
225d
|
24/24 |
94d |
ea68376c8bed
bpf: prevent decl_tag from being referenced in func_proto
|
KMSAN: uninit-value in bcmp
net
|
C |
error |
done |
907 |
130d |
1451d
|
24/24 |
94d |
4f1dc7d9756e
fs/ntfs3: Validate attribute name offset
|
KASAN: use-after-free Read in move_expired_inodes (2)
fat
|
C |
done |
|
4 |
190d |
230d
|
24/24 |
94d |
4e3c51f4e805
fs: do not update freeing inode i_io_list
|
UBSAN: shift-out-of-bounds in tcf_pedit_init
net
|
C |
done |
|
59 |
374d |
382d
|
24/24 |
94d |
4d42d54a7d6a
net/sched: act_pedit: sanitize shift argument before usage
|
KASAN: use-after-free Read in ip6_fragment (2)
net
|
|
|
|
1 |
187d |
182d
|
24/24 |
94d |
803e84867de5
ipv6: avoid use-after-free in ip6_fragment()
|
general protection fault in llc_build_and_send_test_pkt
net
|
C |
done |
|
25 |
426d |
431d
|
24/24 |
94d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: null-ptr-deref Write in snd_pcm_format_set_silence
alsa
|
C |
unreliable |
|
8 |
271d |
416d
|
24/24 |
94d |
2f7a26abb824
ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
|
BUG: corrupted list in rdma_listen (2)
rdma
|
C |
inconclusive |
|
5 |
475d |
541d
|
24/24 |
94d |
22e9f71072fa
RDMA/cma: Do not change route.addr.src_addr outside state checks
|
linux-next boot error: INFO: task hung in add_early_randomness (2)
crypto
|
|
|
|
14 |
355d |
361d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
WARNING in vhost_dev_cleanup (2)
kvm
net
virt
|
|
|
|
79 |
458d |
466d
|
24/24 |
94d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
possible deadlock in snd_hrtimer_callback (2)
fs
|
C |
inconclusive |
|
582 |
299d |
565d
|
24/24 |
94d |
96b097091c66
ALSA: pcm: Use deferred fasync helper
95cc637c1afd
ALSA: timer: Use deferred fasync helper
|
KASAN: use-after-free Read in __kernfs_remove
|
C |
done |
|
3985 |
233d |
277d
|
24/24 |
94d |
4abc99652812
kernfs: fix use-after-free in __kernfs_remove
|
BUG: unable to handle kernel paging request in bitfill_aligned (3)
fbdev
|
C |
unreliable |
|
11 |
280d |
322d
|
24/24 |
94d |
a5a923038d70
fbdev: fbcon: Properly revert changes when vc_resize() failed
|
BUG: unable to handle kernel NULL pointer dereference in em_u32_match
net
|
C |
|
|
2 |
149d |
205d
|
24/24 |
94d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
WARNING: ODEBUG bug in htab_map_alloc
bpf
|
C |
|
|
6456 |
237d |
262d
|
24/24 |
94d |
cf7de6a53600
bpf: add missing percpu_counter_destroy() in htab_map_alloc()
|
memory leak in ntfs_init_fs_context
ntfs3
|
C |
|
|
169 |
158d |
279d
|
24/24 |
94d |
51e76a232f8c
fs/ntfs3: Fix memory leak on ntfs_fill_super() error path
|
inconsistent lock state in p9_req_put
9p
net
|
|
|
|
181 |
236d |
287d
|
24/24 |
94d |
296ab4a81384
net/9p: use a dedicated spinlock for trans_fd
|
KCSAN: data-race in sit_tunnel_xmit / sit_tunnel_xmit
net
|
|
|
|
702 |
167d |
1265d
|
24/24 |
94d |
cb34b7cf17ec
ipv6/sit: use DEV_STATS_INC() to avoid data-races
|
KASAN: use-after-free Read in tipc_named_reinit (2)
tipc
|
|
|
|
1 |
395d |
391d
|
24/24 |
94d |
911600bf5a5e
tipc: fix use-after-free Read in tipc_named_reinit
|
kernel BUG in ext4_es_cache_extent
ext4
|
C |
inconclusive |
|
6 |
118d |
477d
|
24/24 |
94d |
c878bea3c9d7
ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state
|
WARNING in ip6erspan_tunnel_xmit
net
|
|
|
|
23 |
101d |
346d
|
24/24 |
94d |
301bd140ed0b
erspan: do not assume transport header is always set
|
BUG: sleeping function called from invalid context in vm_area_dup
kernel
|
C |
|
|
3 |
221d |
221d
|
24/24 |
94d |
d7c0e68dab98
mm/ksm: convert break_ksm() to use walk_page_range_vma()
|
BUG: sleeping function called from invalid context in kernfs_walk_and_get_ns
kernfs
|
C |
error |
|
196 |
223d |
229d
|
24/24 |
94d |
46307fd6e27a
cgroup: Reorganize css_set_lock and kernfs path processing
|
WARNING: refcount bug in rds_tcp_tune
rds
|
|
|
|
166 |
382d |
391d
|
24/24 |
94d |
6997fbd7a3da
net: rds: use maybe_get_net() when acquiring refcount on TCP sockets
|
KASAN: use-after-free Read in hugetlb_handle_userfault
mm
|
C |
|
|
4 |
239d |
263d
|
24/24 |
94d |
958f32ce832b
mm: hugetlb: fix UAF in hugetlb_handle_userfault
|
WARNING in iomap_read_inline_data
gfs2
xfs
|
C |
|
|
3 |
163d |
181d
|
24/24 |
94d |
70376c7ff312
gfs2: Always check inode size of inline inodes
|
general protection fault in skb_unlink
net
|
C |
done |
error |
8 |
263d |
1824d
|
24/24 |
94d |
5121197ecc5d
kcm: close race conditions on sk_receive_queue
|
memory leak in kvm_set_memslot
kvm
|
C |
|
|
1 |
377d |
377d
|
24/24 |
94d |
c87661f855c3
KVM: Free new dirty bitmap if creating a new memslot fails
|
upstream boot error: WARNING in wiphy_register
wireless
|
|
|
|
1 |
287d |
287d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING in sk_destruct
net
|
C |
done |
|
454 |
370d |
497d
|
24/24 |
94d |
ebdc1a030962
tcp: add a missing sk_defer_free_flush() in tcp_splice_read()
|
BUG: unable to handle kernel paging request in eventfd_ctx_put
fs
|
C |
done |
|
7 |
219d |
247d
|
24/24 |
94d |
7353633814f6
KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()
|
KASAN: use-after-free Read in task_work_run (2)
kernel
|
C |
unreliable |
|
18 |
173d |
265d
|
24/24 |
94d |
517e6a301f34
perf: Fix perf_pending_task() UaF
|
KASAN: slab-out-of-bounds Read in ipvlan_queue_xmit
net
|
C |
error |
error |
8 |
457d |
934d
|
24/24 |
94d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
memory leak in do_seccomp (2)
kernel
|
C |
|
|
4 |
277d |
826d
|
24/24 |
94d |
a1140cb215fa
seccomp: Move copy_seccomp() to no failure path.
|
WARNING in wdev_chandef
wireless
|
|
|
|
12 |
296d |
338d
|
24/24 |
94d |
206bbcf76121
wifi: nl80211: hold wdev mutex for tid config
|
KASAN: use-after-free Read in __io_remove_buffers
io-uring
|
C |
done |
|
2 |
296d |
292d
|
24/24 |
94d |
ec8516f3b7c4
io_uring: fix free of unallocated buffer list
|
kernel panic: corrupted stack end in packet_sendmsg
net
|
|
|
|
1 |
265d |
265d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
general protection fault in virtio_gpu_array_put_free
dri
virt
|
|
|
|
4 |
504d |
541d
|
24/24 |
94d |
6b79f96f4a23
drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
|
BUG: bad usercopy in bpf_prog_get_info_by_fd
hardening
mm
|
|
|
|
1 |
366d |
366d
|
24/24 |
94d |
10f3b29c65bb
bpf, arm64: Clear prog->jited_len along prog->jited
|
WARNING in tcp_ack (3)
net
|
|
|
|
16 |
361d |
419d
|
24/24 |
94d |
40570375356c
tcp: add accessors to read/set tp->snd_cwnd
|
WARNING in cfg80211_ch_switch_notify
wireless
|
C |
done |
|
744 |
294d |
338d
|
24/24 |
94d |
77e7b6ba78ed
wifi: cfg80211: handle IBSS in channel switch
|
WARNING in napi_complete_done
net
|
C |
error |
|
104 |
202d |
206d
|
24/24 |
94d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
KCSAN: data-race in inet6_recvmsg / ipv6_setsockopt
net
|
|
|
|
1 |
478d |
475d
|
24/24 |
94d |
086d49058cd8
ipv6: annotate some data-races around sk->sk_prot
|
INFO: task hung in add_early_randomness (2)
usb
crypto
|
C |
done |
|
182 |
142d |
360d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
WARNING: kmalloc bug in bpf
bpf
|
C |
done |
done |
562 |
432d |
549d
|
24/24 |
94d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
possible deadlock in f2fs_write_checkpoint
f2fs
|
C |
done |
|
2208 |
454d |
500d
|
24/24 |
94d |
c7f91bd41029
f2fs: Restore rwsem lockdep support
|
KASAN: use-after-free Read in xfs_qm_dqfree_one
xfs
|
syz |
|
|
7 |
166d |
175d
|
24/24 |
94d |
52f31ed22821
xfs: dquot shrinker doesn't check for XFS_DQFLAG_FREEING
|
KMSAN: uninit-value in tomoyo_path_chown
fs
|
C |
|
|
13763 |
251d |
252d
|
24/24 |
94d |
f52d74b190f8
open: always initialize ownership fields
|
KMSAN: uninit-value in asix_check_host_enable
usb
|
C |
|
|
109 |
402d |
460d
|
24/24 |
94d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
WARNING in bpf_skb_load_helper_32
bpf
|
C |
done |
|
9 |
295d |
326d
|
24/24 |
94d |
0326195f523a
bpf: Make sure mac_header was set before using it
|
KASAN: use-after-free Read in ip6mr_sk_done
net
|
C |
done |
|
10988 |
208d |
478d
|
24/24 |
94d |
7d9b1b578d67
ip6mr: fix use-after-free in ip6mr_sk_done()
|
WARNING in jfs_symlink
jfs
|
C |
|
|
12 |
215d |
226d
|
24/24 |
94d |
ebe060369f8d
jfs: Fix fortify moan in symlink
|
possible deadlock in btrfs_search_slot_get_root
btrfs
|
C |
|
|
5 |
184d |
204d
|
24/24 |
94d |
b740d8061669
btrfs: free btrfs_path before copying root refs to userspace
|
WARNING in component_del
dri
|
C |
done |
|
6 |
475d |
497d
|
24/24 |
94d |
c853685d11c0
usb: core: Unregister device on component_add() failure
|
WARNING: refcount bug in smc_pnet_add
net
s390
|
C |
done |
|
98 |
464d |
478d
|
24/24 |
94d |
28f922213886
net/smc: fix ref_tracker issue in smc_pnet_add()
|
KASAN: use-after-free Write in mini_qdisc_pair_swap (2)
net
|
|
|
|
24 |
103d |
483d
|
24/24 |
94d |
04c2a47ffb13
net: sched: fix use-after-free in tc_new_tfilter()
|
KASAN: use-after-free Read in hdr_find_e
ntfs3
|
C |
done |
done |
66 |
102d |
244d
|
24/24 |
94d |
0e8235d28f3a
fs/ntfs3: Check fields while reading
|
possible deadlock in blkdev_put (3)
block
fat
|
C |
|
|
870 |
370d |
443d
|
24/24 |
94d |
d292dc80686a
loop: don't destroy lo->workqueue in __loop_clr_fd
|
KASAN: use-after-free Read in filp_close
io-uring
fs
|
C |
done |
|
17 |
136d |
364d
|
24/24 |
94d |
40a1926022d1
fix the breakage in close_fd_get_file() calling conventions change
|
KMSAN: uninit-value in tcp_recvmsg
net
|
C |
|
|
25918 |
216d |
341d
|
24/24 |
94d |
1228b34c8d0e
net: clear msg_get_inq in __sys_recvfrom() and __copy_msghdr_from_user()
|
memory leak in smc_sysctl_net_init
net
s390
|
C |
|
|
8 |
426d |
430d
|
24/24 |
94d |
5ae6acf1d00b
net/smc: fix a memory leak in smc_sysctl_net_exit()
|
upstream boot error: BUG: unable to handle kernel paging request in blk_mq_get_tag
block
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
general protection fault in binder_alloc_print_pages
kernel
|
C |
error |
|
157 |
250d |
281d
|
24/24 |
94d |
1da52815d5f1
binder: fix alloc->vma_vm_mm null-ptr dereference
|
WARNING: refcount bug in put_gid_ndev
rdma
|
|
|
|
3 |
171d |
171d
|
24/24 |
94d |
e42f9c2e6aad
RDMA: Add missed netdev_put() for the netdevice_tracker
|
KASAN: null-ptr-deref Read in __free_pages
kernel
|
C |
inconclusive |
|
21 |
173d |
435d
|
24/24 |
94d |
a635415a064e
watch_queue: Fix NULL dereference in error cleanup
|
upstream boot error: INFO: task hung in add_early_randomness
crypto
|
|
|
|
125 |
352d |
359d
|
24/24 |
94d |
228432551bd8
virtio-rng: make device ready before making request
|
KASAN: use-after-free Read in net_tx_action
kernel
|
C |
inconclusive |
|
3 |
229d |
274d
|
24/24 |
94d |
ebda44da44f6
net: sched: fix race condition in qdisc_graft()
|
usb-testing boot error: kernel BUG in putname
fs
|
|
|
|
1 |
272d |
272d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
kernel panic: stack is corrupted in __kmalloc
lsm
sctp
integrity
|
|
|
|
4 |
99d |
353d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in blk_mq_release
block
|
C |
error |
|
11 |
275d |
293d
|
24/24 |
94d |
aa0c680c3aa9
block: Do not call blk_put_queue() if gendisk allocation fails
|
WARNING in hif_usb_send/usb_submit_urb
wireless
|
C |
unreliable |
done |
374 |
175d |
966d
|
24/24 |
94d |
16ef02bad239
wifi: ath9k: verify the expected usb_endpoints are present
|
BUG: Bad page map (5)
mm
io-uring
|
C |
|
|
35 |
135d |
393d
|
24/24 |
94d |
4d24de9425f7
mm: MADV_COLLAPSE: refetch vm_end after reacquiring mmap_lock
|
KASAN: use-after-free Read in mas_next_entry
fs
|
C |
error |
|
16 |
205d |
218d
|
24/24 |
94d |
59f2f4b8a757
fs/userfaultfd: Fix maple tree iterator in userfaultfd_unregister()
|
linux-next boot error: general protection fault in add_mtd_device
mtd
|
|
|
|
117 |
300d |
333d
|
24/24 |
94d |
7ec4cdb32173
mtd: core: check partition before dereference
|
memory leak in hidraw_report_event
input
usb
|
C |
|
|
1 |
369d |
369d
|
24/24 |
94d |
a5623a203cff
HID: hidraw: fix memory leak in hidraw_release()
|
upstream boot error: WARNING in alloc_workqueue
net
rdma
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
usb-testing boot error: WARNING in __netif_set_xps_queue
net
virt
|
|
|
|
57 |
212d |
224d
|
24/24 |
94d |
fc8695eb11f0
Revert "net: fix cpu_max_bits_warn() usage in netif_attrmask_next{,_and}"
|
KASAN: use-after-free Read in inet_bind2_bucket_find
net
io-uring
|
C |
done |
|
13 |
349d |
356d
|
24/24 |
94d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
INFO: task hung in p9_fd_close
9p
net
|
C |
error |
error |
484 |
204d |
1368d
|
24/24 |
94d |
ef575281b21e
9p/trans_fd: always use O_NONBLOCK read/write
|
KASAN: use-after-free Read in post_one_notification
kernel
|
C |
inconclusive |
|
19 |
234d |
434d
|
24/24 |
94d |
353f7988dd84
watchqueue: make sure to serialize 'wqueue->defunct' properly
|
memory leak in smc_create (2)
net
s390
|
C |
|
|
2 |
431d |
427d
|
24/24 |
94d |
1a74e9932374
net/smc: Fix sock leak when release after smc_shutdown()
|
general protection fault in kernel_accept (5)
tipc
|
|
|
|
1 |
248d |
244d
|
24/24 |
94d |
82cb4e4612c6
tipc: fix a null-ptr-deref in tipc_topsrv_accept
|
WARNING in bpf_bprintf_prepare (2)
bpf
|
C |
|
|
2 |
228d |
267d
|
24/24 |
94d |
05b24ff9b2cf
bpf: Prevent bpf program recursion for raw tracepoint probes
|
KASAN: use-after-free Read in driver_register
usb
|
C |
|
|
131 |
337d |
388d
|
24/24 |
94d |
5f0b5f4d50fa
usb: gadget: fix race when gadget driver register via ioctl
|
possible deadlock in __inet_inherit_port
net
|
C |
done |
|
85 |
131d |
193d
|
24/24 |
94d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
WARNING: suspicious RCU usage in nft_do_chain
netfilter
|
|
|
|
1 |
456d |
456d
|
24/24 |
94d |
17a8f31bba7b
netfilter: egress: silence egress hook lockdep splats
|
WARNING: kobject bug in erofs_unregister_sysfs
erofs
|
C |
done |
|
5 |
435d |
437d
|
24/24 |
94d |
a942da24abc5
fs: erofs: add sanity check for kobject in erofs_unregister_sysfs
|
KASAN: use-after-free Read in blk_mq_sched_free_rqs
block
|
C |
error |
|
8 |
342d |
391d
|
24/24 |
94d |
50e34d78815e
block: disable the elevator int del_gendisk
|
WARNING in cleanup_net
net
|
|
|
|
613 |
94d |
216d
|
24/24 |
94d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
general protection fault in ip6_tnl_xmit
net
|
|
|
|
1 |
475d |
475d
|
24/24 |
94d |
3a5f238f2b36
ip6_tunnel: fix possible NULL deref in ip6_tnl_xmit
|
KASAN: use-after-free Read in __snd_rawmidi_transmit_ack
alsa
|
|
|
|
1 |
373d |
369d
|
24/24 |
94d |
0125de38122f
ALSA: usb-audio: Cancel pending work at closing a MIDI substream
|
WARNING in driver_unregister
input
usb
|
C |
|
|
1 |
371d |
367d
|
24/24 |
94d |
f2d8c2606825
usb: gadget: Fix non-unique driver names in raw-gadget driver
|
possible deadlock in sk_common_release
net
|
|
|
|
5 |
181d |
192d
|
24/24 |
94d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KASAN: use-after-free Read in ieee80211_scan_rx (3)
wireless
|
|
|
|
10 |
291d |
398d
|
24/24 |
94d |
60deb9f10eec
wifi: mac80211: Fix UAF in ieee80211_scan_rx()
|
KASAN: use-after-free Read in LZ4_decompress_safe_partial
erofs
|
C |
done |
|
13 |
422d |
577d
|
24/24 |
94d |
eafc0a02391b
lz4: fix LZ4_decompress_safe_partial read out of bound
|
KASAN: null-ptr-deref Write in kill_f2fs_super
f2fs
|
C |
error |
|
49 |
207d |
228d
|
24/24 |
94d |
91586ce0d39a
f2fs: fix to invalidate dcc->f2fs_issue_discard in error path
|
memory leak in setup_mq_sysctls
kernel
|
C |
|
|
2 |
172d |
343d
|
24/24 |
94d |
db7cfc380900
ipc: Free mq_sysctls if ipc namespace creation failed
|
UBSAN: array-index-out-of-bounds in io_submit_sqes
fs
|
|
|
|
4 |
363d |
363d
|
24/24 |
94d |
fcde59feb1af
io_uring: add io_op_defs 'def' pointer in req init and issue
|
kernel panic: stack is corrupted in sys_clock_nanosleep
kernel
|
|
|
|
2 |
272d |
353d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
kernel panic: corrupted stack end in inet6_ioctl
net
|
|
|
|
1 |
186d |
185d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
memory leak in vhci_write
bluetooth
|
C |
|
|
1 |
286d |
282d
|
24/24 |
94d |
7c9524d92964
Bluetooth: L2CAP: Fix memory leak in vhci_write
|
WARNING in btrfs_commit_transaction
btrfs
|
C |
inconclusive |
done |
3 |
114d |
208d
|
24/24 |
94d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
general protection fault in kvm_arch_vcpu_ioctl
kvm
|
C |
inconclusive |
|
365 |
294d |
332d
|
24/24 |
94d |
f83894b24c2a
KVM: x86: Fix handling of APIC LVT updates when userspace changes MCG_CAP
|
kernel panic: corrupted stack end in loop_control_ioctl
fs
|
|
|
|
2 |
216d |
301d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
INFO: task hung in ath6kl_usb_power_off
wireless
|
|
|
|
7454 |
291d |
1057d
|
24/24 |
94d |
62ebaf2f9261
ath6kl: avoid flush_scheduled_work() usage
|
possible deadlock in nilfs_count_free_blocks
nilfs
|
C |
|
|
60 |
212d |
224d
|
24/24 |
94d |
8ac932a4921a
nilfs2: fix deadlock in nilfs_count_free_blocks()
|
kernel BUG at fs/ext4/inline.c:LINE!
ext4
|
C |
done |
done |
76 |
134d |
957d
|
24/24 |
94d |
5c099c4fdc43
ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
|
INFO: trying to register non-static key in hci_uart_flush (2)
bluetooth
|
syz |
error |
error |
37 |
222d |
1364d
|
24/24 |
94d |
3124d320c22f
Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure
|
possible deadlock in snd_timer_notify (2)
fs
|
|
|
|
151 |
299d |
563d
|
24/24 |
94d |
95cc637c1afd
ALSA: timer: Use deferred fasync helper
|
WARNING: still has locks held in io_ring_submit_lock
fs
io-uring
|
C |
done |
|
3 |
379d |
379d
|
24/24 |
94d |
e7637a492b9f
io_uring: fix locking state for empty buffer group
|
INFO: rcu detected stall in mld_ifc_work
net
|
C |
inconclusive |
|
1 |
470d |
470d
|
24/24 |
94d |
5740d0689096
net: sched: limit TC_ACT_REPEAT loops
|
WARNING in aiptek_open/usb_submit_urb
usb
input
|
C |
error |
|
2380 |
430d |
1452d
|
24/24 |
94d |
5600f6986628
Input: aiptek - properly check endpoint type
|
WARNING: refcount bug in u32_destroy_key
net
|
|
|
|
1 |
412d |
412d
|
24/24 |
94d |
3db09e762dc7
net/sched: cls_u32: fix netns refcount changes in u32_change()
|
KASAN: use-after-free Read in ip_mc_sf_allow
net
|
|
|
|
1 |
396d |
396d
|
24/24 |
94d |
dba5bdd57bea
net: igmp: respect RCU rules in ip_mc_source() and ip_mc_msfilter()
|
WARNING: kmalloc bug in snd_pcm_plugin_alloc (2)
alsa
|
C |
done |
|
2 |
443d |
439d
|
24/24 |
94d |
efb6402c3c4a
ALSA: oss: Fix PCM OSS buffer allocation overflow
|
WARNING in __queue_work (3)
kernel
|
syz |
error |
|
953 |
195d |
1029d
|
24/24 |
94d |
877afadad2dc
Bluetooth: When HCI work queue is drained, only queue chained work
|
general protection fault in fq_codel_enqueue (3)
net
|
C |
inconclusive |
|
5 |
331d |
577d
|
24/24 |
94d |
fd1894224407
bpf: Don't redirect packets with invalid pkt_len
|
KCSAN: data-race in fib_alias_hw_flags_set / fib_alias_hw_flags_set
net
|
|
|
|
1 |
472d |
469d
|
24/24 |
94d |
9fcf986cc4bc
ipv4: fix data races in fib_alias_hw_flags_set
|
KASAN: invalid-free in io_clean_op
io-uring
|
C |
|
|
13 |
229d |
246d
|
24/24 |
94d |
4c17a496a7a0
io_uring/net: fix cleanup double free free_iov init
|
WARNING in check_map_prog_compatibility
bpf
|
C |
inconclusive |
done |
128 |
246d |
409d
|
24/24 |
94d |
34dd3bad1a6f
bpf: Relax the requirement to use preallocated hash maps in tracing progs.
|
INFO: trying to register non-static key in __fib6_clean_all (2)
net
|
|
|
|
3 |
231d |
255d
|
24/24 |
94d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
upstream boot error: BUG: unable to handle kernel paging request in tomoyo_encode
tomoyo
|
|
|
|
1 |
286d |
286d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING: bad unlock balance in rxrpc_do_sendmsg
afs
net
|
C |
inconclusive |
|
14 |
299d |
504d
|
24/24 |
94d |
b0f571ecd794
rxrpc: Fix locking in rxrpc's sendmsg
|
memory leak in tun_chr_open
net
|
C |
|
|
1 |
263d |
263d
|
24/24 |
94d |
1118b2049d77
net: tun: Fix memory leaks of napi_get_frags
|
possible deadlock in snd_pcm_period_elapsed (3)
alsa
|
C |
inconclusive |
|
23 |
291d |
517d
|
24/24 |
94d |
96b097091c66
ALSA: pcm: Use deferred fasync helper
|
upstream boot error: general protection fault in blk_mq_alloc_and_init_hctx
block
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
memory leak in blk_mq_init_tags
block
usb
|
C |
|
|
2 |
421d |
428d
|
24/24 |
94d |
03252259e18e
scsi: sd: Clean up gendisk if device_add_disk() failed
|
general protection fault in udpv6_sendmsg
net
|
C |
error |
|
69 |
190d |
200d
|
24/24 |
94d |
6423ac2eb31e
rxrpc: Fix oops from calling udpv6_sendmsg() on AF_INET socket
|
general protection fault in erofs_bread
erofs
|
C |
error |
|
3 |
211d |
220d
|
24/24 |
94d |
e5126de138ca
erofs: fix general protection fault when reading fragment
|
kernel panic: corrupted stack end in handle_mm_fault
riscv
|
|
|
|
1 |
355d |
355d
|
24/24 |
94d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in ieee80211_ibss_csa_beacon
wireless
|
C |
error |
|
4997 |
94d |
963d
|
24/24 |
94d |
15bc8966b6d3
wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected
|
INFO: task hung in synchronize_rcu (3)
|
C |
done |
done |
374 |
103d |
1041d
|
24/24 |
94d |
2d08935682ac
KVM: x86: Don't re-acquire SRCU lock in complete_emulated_io()
|
possible deadlock in start_this_handle (3)
ext4
|
|
|
|
8 |
131d |
319d
|
24/24 |
94d |
68aaee147e59
mm: memcontrol: fix potential oom_lock recursion deadlock
|
WARNING in static_key_slow_try_dec (3)
kernel
|
C |
|
|
26 |
105d |
265d
|
24/24 |
94d |
921ebde3c0d2
netfilter: nf_tables: fix nft_counters_enabled underflow at nf_tables_addchain()
|
upstream boot error: BUG: unable to handle kernel paging request in __init_work
pm
|
|
|
|
1 |
288d |
288d
|
24/24 |
94d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KASAN: slab-out-of-bounds Read in decrypt_internal
net
|
C |
inconclusive |
done |
4 |
416d |
507d
|
24/24 |
94d |
9381fe8c849c
net/tls: fix slab-out-of-bounds bug in decrypt_internal
|
INFO: task hung in __input_unregister_device (4)
usb
input
|
C |
done |
|
924 |
266d |
331d
|
24/24 |
94d |
98e01215708b
Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag
|
possible deadlock in __f2fs_ioctl
f2fs
|
|
|
|
17 |
139d |
171d
|
24/24 |
138d |
5eaac835f27f
f2fs: fix to avoid potential deadlock
|
general protection fault in __ext4_journal_get_write_access
fuse
ext4
|
C |
done |
done |
7 |
930d |
979d
|
24/24 |
195d |
384d87ef2c95
block: Do not discard buffers under a mounted filesystem
|
WARNING in sco_sock_sendmsg
mm
|
C |
inconclusive |
|
2 |
635d |
635d
|
24/24 |
228d |
0771cbb3b97d
Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg
|
WARNING in ipvlan_unregister_nf_hook
net
|
C |
done |
done |
4151 |
543d |
1179d
|
24/24 |
251d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
WARNING: ODEBUG bug in bt_host_release
bluetooth
|
syz |
done |
done |
7 |
776d |
1030d
|
24/24 |
251d |
e2cb6b891ad2
bluetooth: eliminate the potential race condition when removing the HCI controller
|
WARNING: suspicious RCU usage (5)
|
C |
done |
|
1 |
350d |
346d
|
22/24 |
339d |
f4e61f0c9add
x86/kvm: Fix broken irq restoration in kvm_wait
|
general protection fault in sock_close
net
|
syz |
done |
unreliable |
2 |
1004d |
1001d
|
22/24 |
369d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING in dev_change_net_namespace
net
|
syz |
done |
done |
8 |
554d |
1203d
|
22/24 |
375d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
general protection fault in hci_inquiry_result_with_rssi_evt
bluetooth
|
C |
done |
|
17 |
507d |
532d
|
22/24 |
375d |
72279d17df54
Bluetooth: hci_event: Rework hci_inquiry_result_with_rssi_evt
|
general protection fault in __loop_clr_fd
block
|
C |
done |
|
5702 |
1151d |
1178d
|
22/24 |
375d |
87579e9b7d8d
loop: use worker per cgroup instead of kworker
|
WARNING in rtnl_dellink
net
|
C |
done |
done |
94 |
502d |
1013d
|
22/24 |
381d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
INFO: task hung in linkwatch_event (2)
net
|
C |
done |
done |
1033 |
400d |
1125d
|
22/24 |
381d |
563fbefed46a
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
BUG: unable to handle kernel paging request in bitfill_aligned (2)
fbdev
|
C |
inconclusive |
done |
26 |
515d |
923d
|
22/24 |
381d |
0499f419b76f
video: vga16fb: Only probe for EGA and VGA 16 color graphic cards
|
WARNING in drm_gem_shmem_vm_open
|
syz |
done |
done |
38 |
513d |
648d
|
22/24 |
381d |
0499f419b76f
video: vga16fb: Only probe for EGA and VGA 16 color graphic cards
|
INFO: task hung in usb_get_descriptor
|
C |
done |
done |
4149 |
443d |
965d
|
22/24 |
381d |
363eaa3a450a
usbip: synchronize event handler with sysfs code paths
|
general protection fault in ieee80211_chanctx_num_assigned
wireless
|
C |
inconclusive |
done |
15 |
531d |
965d
|
22/24 |
381d |
563fbefed46a
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
general protection fault in xfrm_user_rcv_msg_compat
net
|
C |
unreliable |
done |
1543 |
662d |
874d
|
22/24 |
381d |
4e9505064f58
net/xfrm/compat: Copy xfrm_spdattr_type_t atributes
|
KASAN: slab-out-of-bounds Read in add_adv_patterns_monitor
bluetooth
|
C |
error |
done |
5 |
830d |
851d
|
22/24 |
382d |
b4a221ea8a1f
Bluetooth: advmon offload MSFT add rssi support
|
KASAN: use-after-free Read in ext4_xattr_set_entry (4)
ext4
|
C |
error |
done |
21 |
462d |
849d
|
22/24 |
427d |
6e47a3cc68fc
ext4: get rid of super block and sbi from handle_mount_ops()
|
KASAN: out-of-bounds Read in ath9k_hif_usb_rx_cb (3)
wireless
usb
|
C |
unreliable |
done |
7 |
470d |
874d
|
22/24 |
439d |
6ce708f54cc8
ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream
|
KASAN: slab-out-of-bounds Write in betop_probe
input
usb
|
C |
unreliable |
|
9 |
647d |
1204d
|
22/24 |
439d |
689e453a9b9c
HID: betop: fix slab-out-of-bounds Write in betop_probe
HID: betop: fix slab-out-of-bounds Write in betop_probe
|
possible deadlock in scheduler_tick
kvm
|
C |
error |
|
99 |
784d |
796d
|
22/24 |
439d |
a83829f56c7c
KVM: x86: disable interrupts while pvclock_gtod_sync_lock is taken
8228c77d8b56
KVM: x86: switch pvclock_gtod_sync_lock to a raw spinlock
|
WARNING in mptcp_sendmsg_frag
mptcp
|
C |
inconclusive |
|
6 |
615d |
621d
|
22/24 |
439d |
efe686ffce01
mptcp: ensure tx skbs always have the MPTCP ext
mptcp: ensure tx skbs always have the MPTCP ext
|
KMSAN: uninit-value in dvb_usb_adapter_dvb_init (2)
media
usb
|
C |
|
|
34 |
707d |
923d
|
22/24 |
439d |
c5453769f77c
media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init
899a61a3305d
media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte()
|
possible deadlock in cgroup_rstat_updated
cgroups
|
|
|
|
1 |
599d |
595d
|
22/24 |
439d |
3c08b0931eed
blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu
blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu
|
BUG: sleeping function called from invalid context in __might_resched
kernel
|
C |
inconclusive |
|
9 |
562d |
565d
|
22/24 |
447d |
1ee33b1ca2b8
tty: n_hdlc: make n_hdlc_tty_wakeup() asynchronous
|
WARNING in cgroup_finalize_control
|
syz |
done |
done |
9 |
585d |
1113d
|
22/24 |
447d |
7ee285395b21
cgroup: Make rebind_subsystems() disable v2 controllers all at once
|
KASAN: use-after-free Read in snd_mixer_oss_get_volume1
alsa
|
C |
inconclusive |
|
1 |
590d |
586d
|
22/24 |
447d |
411cef6adfb3
ALSA: mixer: oss: Fix racy access to slots
|
memory leak in blk_iolatency_init
block
cgroups
|
C |
|
|
833 |
447d |
623d
|
22/24 |
447d |
6f5ddde41069
blkcg: fix memory leak in blk_iolatency_init
|
possible deadlock in ktime_get_coarse_ts64
kernel
|
|
|
|
1 |
572d |
571d
|
22/24 |
447d |
5e0bc3082e2e
bpf: Forbid bpf_ktime_get_coarse_ns and bpf_timer_* in tracing progs
|
memory leak in __mdiobus_register
usb
|
C |
|
|
1 |
615d |
611d
|
22/24 |
447d |
ab609f25d198
net: mdiobus: Fix memory leak in __mdiobus_register
ca6e11c337da
phy: mdio: fix memory leak
|
WARNING in dst_release (3)
net
|
|
|
|
3 |
450d |
530d
|
22/24 |
447d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
WARNING in ref_tracker_dir_exit
|
C |
done |
|
16271 |
503d |
532d
|
22/24 |
447d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
WARNING in ovl_create_real
overlayfs
|
C |
unreliable |
|
164 |
568d |
636d
|
22/24 |
447d |
1f5573cfe7a7
ovl: fix warning in ovl_create_real()
|
KCSAN: data-race in call_rcu / rcu_gp_kthread
fs
|
|
|
|
1 |
686d |
686d
|
22/24 |
447d |
2431774f04d1
rcu: Mark accesses to rcu_state.n_force_qs
|
WARNING: kmalloc bug in hash_ip_create
netfilter
|
C |
done |
|
641 |
605d |
633d
|
22/24 |
447d |
7bbc3d385bd8
netfilter: ipset: Fix oversized kvmalloc() calls
|
KCSAN: data-race in __neigh_event_send / ip_finish_output2 (3)
net
|
|
|
|
1 |
584d |
581d
|
22/24 |
447d |
d18785e21386
net: annotate data-race in neigh_output()
|
general protection fault in unregister_vlan_dev
net
|
|
|
|
1 |
545d |
545d
|
22/24 |
447d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
possible deadlock in __loop_clr_fd (3)
block
|
|
|
|
2972 |
502d |
565d
|
22/24 |
447d |
6050fa4c84cc
loop: don't hold lo_mutex during __loop_clr_fd()
|
WARNING in __i2c_transfer (2)
i2c
|
C |
done |
|
337 |
511d |
560d
|
22/24 |
447d |
bb436283e25a
i2c: validate user data in compat ioctl
|
KCSAN: data-race in flush_tlb_batched_pending / try_to_unmap_one
mm
|
|
|
|
2 |
502d |
557d
|
22/24 |
447d |
5ee2fa2f0636
mm/rmap: fix potential batched TLB flush race
|
WARNING in sta_info_insert_rcu
|
C |
done |
done |
2533 |
540d |
977d
|
22/24 |
447d |
a6555f844549
mac80211: Drop frames from invalid MAC address in ad-hoc mode
|
KASAN: use-after-free Read in __crypto_xor
crypto
|
C |
done |
|
9 |
602d |
634d
|
22/24 |
447d |
68b6dea802ce
crypto: pcrypt - Delay write to padata->info
da353fac65fe
net/tls: Fix flipped sign in tls_err_abort() calls
|
KMSAN: uninit-value in legacy_dvb_usb_read_remote_control
media
usb
|
C |
|
|
186 |
557d |
898d
|
22/24 |
447d |
afae4ef7d5ad
media: dvb-usb: fix ununit-value in az6027_rc_query
|
KMSAN: kernel-infoleak in move_addr_to_user (6)
tipc
|
C |
|
|
4 |
487d |
525d
|
22/24 |
447d |
d6d86830705f
net ticp:fix a kernel-infoleak in __tipc_sendmsg()
|
memory leak in bsg_register_queue
usb
|
C |
|
|
1 |
630d |
626d
|
22/24 |
447d |
1a0db7744e45
scsi: bsg: Fix device unregistration
|
KASAN: use-after-free Read in nft_table_lookup (2)
netfilter
|
syz |
done |
|
1 |
627d |
623d
|
22/24 |
447d |
a499b03bf36b
netfilter: nf_tables: unlink table before deleting it
|
memory leak in reg_copy_regd
wireless
|
C |
|
|
1 |
680d |
676d
|
22/24 |
447d |
e53e9828a8d2
cfg80211: always free wiphy specific regdomain
|
divide error in usbnet_start_xmit
usb
|
C |
|
|
760 |
571d |
587d
|
22/24 |
447d |
397430b50a36
usbnet: sanity check for maxpacket
|
KASAN: null-ptr-deref Write in dst_release (3)
net
|
|
|
|
2 |
529d |
529d
|
22/24 |
447d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KASAN: use-after-free Read in srcu_invoke_callbacks
block
|
syz |
error |
|
4 |
491d |
503d
|
22/24 |
447d |
850fd2abbe02
block: cleanup q->srcu
|
KCSAN: data-race in bond_alb_init_slave / bond_alb_monitor
net
|
|
|
|
1 |
545d |
545d
|
22/24 |
447d |
dac8e00fb640
bonding: make tx_rebalance_counter an atomic
|
KMSAN: kernel-infoleak in _copy_to_iter (6)
net
|
C |
|
|
748 |
447d |
536d
|
22/24 |
447d |
71ddeac8cd1d
inet_diag: fix kernel-infoleak for UDP sockets
|
KMSAN: kernel-infoleak in ucma_init_qp_attr
rdma
|
|
|
|
1 |
520d |
510d
|
22/24 |
447d |
b35a0f4dd544
RDMA/core: Don't infoleak GRH fields
|
WARNING: ODEBUG bug in qdisc_create
net
|
C |
done |
|
6 |
615d |
643d
|
22/24 |
447d |
a56d447f196f
net/sched: sch_taprio: properly cancel timer from taprio_destroy()
|
WARNING: suspicious RCU usage in xfrm_set_default
net
|
C |
done |
|
20 |
610d |
615d
|
22/24 |
447d |
93ec1320b017
xfrm: fix rcu lock in xfrm_notify_userpolicy()
|
WARNING: refcount bug in rx_queue_release
net
|
|
|
|
12 |
549d |
563d
|
22/24 |
447d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
KASAN: slab-out-of-bounds Write in usb_hcd_poll_rh_status (2)
usb
|
C |
inconclusive |
|
116 |
510d |
993d
|
22/24 |
447d |
1d7d4c07932e
USB: Fix "slab-out-of-bounds Write" bug in usb_hcd_poll_rh_status
|
general protection fault in io_uring_register
fs
io-uring
|
syz |
done |
|
1 |
627d |
623d
|
22/24 |
447d |
41d3a6bd1d37
io_uring: pin SQPOLL data before unlocking ring lock
|
kmsan boot error: KMSAN: uninit-value in tcp_child_process
net
|
|
|
|
48 |
532d |
543d
|
22/24 |
447d |
03cfda4fa6ea
tcp: fix another uninit-value (sk_rx_queue_mapping)
|
bpf-next test error: WARNING: refcount bug in ref_tracker_free
mptcp
|
|
|
|
110 |
514d |
532d
|
22/24 |
447d |
1d2f3d3c6268
mptcp: adjust to use netns refcount tracker
|
kmsan boot error: KMSAN: uninit-value in tcp_conn_request
net
|
|
|
|
27 |
545d |
545d
|
22/24 |
447d |
a37a0ee4d25c
net: avoid uninit-value from tcp_conn_request
|
bpf-next boot error: KASAN: global-out-of-bounds Read in task_iter_init
bpf
|
|
|
|
42 |
563d |
567d
|
22/24 |
447d |
9e2ad638ae36
bpf: Extend BTF_ID_LIST_GLOBAL with parameter for number of IDs
|
KCSAN: data-race in netlink_insert / netlink_sendmsg (4)
net
|
|
|
|
88 |
599d |
680d
|
22/24 |
447d |
7707a4d01a64
netlink: annotate data races around nlk->bound
|
INFO: trying to register non-static key in mxl111sf_ctrl_msg
usb
media
|
C |
|
|
73 |
1402d |
1506d
|
22/24 |
447d |
44870a9e7a3c
media: mxl111sf: change mutex_init() location
|
KMSAN: uninit-value in __mpol_equal (3)
mm
|
|
|
|
13 |
585d |
609d
|
22/24 |
447d |
6d2aec9e123b
mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()
|
KASAN: use-after-free Write in io_queue_worker_create
fs
io-uring
|
C |
unreliable |
|
132 |
530d |
539d
|
22/24 |
447d |
71a85387546e
io-wq: check for wq exit after adding new worker task_work
e47498afeca9
io-wq: remove spurious bit clear on task_work addition
|
BUG: sleeping function called from invalid context in ref_tracker_alloc
net
|
|
|
|
1 |
530d |
530d
|
22/24 |
447d |
8b40a9d53d4f
ipv6: use GFP_ATOMIC in rt6_probe()
|
general protection fault in gro_cells_destroy (2)
net
|
|
|
|
2 |
500d |
516d
|
22/24 |
447d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KASAN: null-ptr-deref Write in sock_setsockopt
net
|
C |
|
|
45 |
464d |
572d
|
22/24 |
447d |
d00c8ee31729
net: fix possible NULL deref in sock_reserve_memory
|
possible deadlock in io_flush_timeouts
fs
|
|
|
|
5 |
548d |
549d
|
22/24 |
447d |
6af3f48bf615
io_uring: fix link traversal locking
|
general protection fault in rcu_segcblist_enqueue
kvm
|
C |
done |
done |
368 |
630d |
694d
|
22/24 |
447d |
eb7511bf9182
KVM: x86: Handle SRCU initialization failure during page track init
|
WARNING in atp_close (3)
input
|
C |
|
|
125 |
511d |
604d
|
22/24 |
447d |
9f3ccdc3f6ef
Input: appletouch - initialize work before device registration
|
WARNING: refcount bug in ip6gre_exit_batch_net
net
|
|
|
|
2 |
558d |
560d
|
22/24 |
447d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
KASAN: use-after-free Read in netlbl_catmap_walk
lsm
net
|
C |
inconclusive |
|
1 |
642d |
642d
|
22/24 |
447d |
0817534ff9ea
smackfs: Fix use-after-free in netlbl_catmap_walk()
|
WARNING in page_counter_cancel (3)
mm
|
C |
done |
|
22 |
504d |
554d
|
22/24 |
447d |
269bda9e7da4
mptcp: Check reclaim amount before reducing allocation
|
KCSAN: data-race in __nf_conntrack_alloc / __nf_conntrack_find_get (3)
netfilter
|
|
|
|
2 |
538d |
538d
|
22/24 |
447d |
802a7dc5cf1b
netfilter: conntrack: annotate data-races around ct->timeout
|
KMSAN: uninit-value in ppp_send_frame
ppp
|
C |
|
|
5 |
490d |
511d
|
22/24 |
447d |
44073187990d
ppp: ensure minimum packet size in ppp_write()
|
KASAN: out-of-bounds Write in virtio_gpu_cmd_set_scanout
dri
virt
|
|
|
|
1 |
572d |
572d
|
22/24 |
447d |
5bd4f20de8ac
virtio-gpu: fix possible memory allocation failure
|
general protection fault in bpf_skb_cgroup_id
bpf
net
|
C |
inconclusive |
|
107 |
603d |
619d
|
22/24 |
447d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
general protection fault in inet_csk_accept
net
|
C |
done |
|
8 |
536d |
535d
|
22/24 |
447d |
b0cdc5dbcf2b
mptcp: never allow the PM to close a listener subflow
|
KCSAN: data-race in sbitmap_queue_clear / sbitmap_queue_clear (3)
block
|
|
|
|
5 |
575d |
581d
|
22/24 |
447d |
9f8b93a7df4d
sbitmap: silence data race warning
|
KASAN: null-ptr-deref Write in rhashtable_free_and_destroy (2)
wireless
|
C |
unreliable |
|
38 |
511d |
776d
|
22/24 |
447d |
8b5cb7e41d9d
mac80211: mesh: embedd mesh_paths and mpp_paths into ieee80211_if_mesh
|
KASAN: use-after-free Read in tcp_v4_early_demux
net
|
|
|
|
1 |
528d |
528d
|
22/24 |
447d |
8f905c0e7354
inet: fully convert sk->sk_rx_dst to RCU rules
|
WARNING: kmalloc bug in snd_pcm_plugin_alloc
alsa
|
|
|
|
4 |
467d |
550d
|
22/24 |
447d |
9d2479c96087
ALSA: pcm: oss: Fix negative period/buffer sizes
8839c8c0f77a
ALSA: pcm: oss: Limit the period size to 16MB
|
general protection fault in set_task_ioprio
block
|
C |
done |
|
19 |
523d |
524d
|
22/24 |
447d |
a957b61254a7
block: fix error in handling dead task for ioprio setting
|
INFO: task hung in disconnect_work
wireless
|
C |
inconclusive |
done |
3 |
557d |
832d
|
22/24 |
447d |
563fbefed46a
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
INFO: trying to register non-static key in ath9k_htc_rxep
wireless
|
C |
unreliable |
|
9896 |
501d |
1075d
|
22/24 |
447d |
b0ec7e55fce6
ath9k_htc: fix NULL pointer dereference at ath9k_htc_rxep()
|
WARNING in nested_vmx_vmexit
kvm
|
C |
done |
|
101 |
523d |
540d
|
22/24 |
447d |
a80dfc025924
KVM: VMX: Always clear vmx->fail on emulation_required
|
WARNING in __get_free_pages
mm
|
|
|
|
21 |
503d |
561d
|
22/24 |
447d |
545a32498c53
floppy: Add max size check for user space request
|
KASAN: invalid-free in security_tun_dev_free_security
selinux
|
syz |
error |
error |
346 |
522d |
864d
|
22/24 |
447d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
KCSAN: data-race in unix_inflight / wait_for_unix_gc (3)
net
|
|
|
|
1 |
514d |
500d
|
22/24 |
447d |
9d6d7f1cb67c
af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
|
INFO: task hung in io_uring_del_tctx_node
io-uring
fs
|
C |
unreliable |
|
37 |
449d |
612d
|
22/24 |
447d |
8bab4c09f24e
io_uring: allow conditional reschedule for intensive iterators
|
KASAN: use-after-free Read in __isofs_iget
isofs
|
C |
inconclusive |
|
2 |
595d |
591d
|
22/24 |
447d |
e96a1866b405
isofs: Fix out of bound access for corrupted isofs image
|
linux-next boot error: general protection fault in blk_mq_free_request
block
|
|
|
|
6 |
587d |
587d
|
22/24 |
447d |
e0d78afeb8d1
block: fix too broad elevator check in blk_mq_free_request()
|
WARNING: ODEBUG bug in really_probe
kernel
|
|
|
|
1 |
517d |
511d
|
22/24 |
447d |
33812fc7c8d7
HID: magicmouse: Fix an error handling path in magicmouse_probe()
|
INFO: trying to register non-static key in l2cap_sock_teardown_cb
bluetooth
|
C |
done |
done |
88 |
575d |
878d
|
22/24 |
447d |
1bff51ea59a9
Bluetooth: fix use-after-free error in lock_sock_nested()
|
KASAN: use-after-free Read in cipso_v4_doi_add
lsm
net
|
|
|
|
1 |
591d |
587d
|
22/24 |
447d |
0934ad42bb2c
smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
|
KASAN: invalid-free in packet_set_ring
net
|
C |
inconclusive |
|
4 |
533d |
533d
|
22/24 |
447d |
ec6af094ea28
net/packet: rx_owner_map depends on pg_vec
|
KASAN: use-after-free Read in disk_release_events
block
fuse
fat
|
syz |
inconclusive |
|
1 |
535d |
531d
|
22/24 |
447d |
99d8690aae4b
block: fix error unwinding in device_add_disk
|
WARNING: ODEBUG bug in corrupted (2)
input
usb
|
C |
error |
|
2 |
517d |
728d
|
22/24 |
447d |
33812fc7c8d7
HID: magicmouse: Fix an error handling path in magicmouse_probe()
|
KASAN: use-after-free Read in rtl8712_dl_fw
usb
staging
|
C |
|
|
6961 |
563d |
587d
|
22/24 |
447d |
c052cc1a069c
staging: rtl8712: fix use-after-free in rtl8712_dl_fw
|
general protection fault in cgroup_sk_free
cgroups
|
C |
error |
|
2727 |
605d |
619d
|
22/24 |
447d |
78cc316e9583
bpf, cgroup: Assign cgroup in cgroup_sk_alloc when called from interrupt
|
general protection fault in bpf_skb_ancestor_cgroup_id
bpf
net
|
C |
unreliable |
|
232 |
603d |
619d
|
22/24 |
447d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
WARNING in loop_add
|
C |
done |
error |
64 |
562d |
1375d
|
22/24 |
447d |
278167fd2f8f
block: add __must_check for *add_disk*() callers
|
kernel BUG in kvm_read_guest_offset_cached
kvm
|
|
|
|
11 |
546d |
553d
|
22/24 |
447d |
8503fea6761d
KVM: VMX: do not use uninitialized gfn_to_hva_cache
|
linux-next test error: WARNING: refcount bug in ref_tracker_free
mptcp
|
|
|
|
12 |
530d |
531d
|
22/24 |
447d |
1d2f3d3c6268
mptcp: adjust to use netns refcount tracker
|
INFO: rcu detected stall in fq_pie_timer
net
|
C |
error |
|
35 |
488d |
705d
|
22/24 |
447d |
61c2402665f1
net/sched: fq_pie: prevent dismantle issue
|
INFO: rcu detected stall in sys_recvmmsg
mptcp
|
C |
done |
|
52 |
483d |
615d
|
22/24 |
447d |
612f71d7328c
mptcp: fix possible stall on recvmsg()
|
general protection fault in nldev_stat_set_doit (2)
rdma
|
|
|
|
12 |
552d |
561d
|
22/24 |
447d |
d821f7c13ca0
RDMA/nldev: Check stat attribute before accessing it
|
WARNING in vmx_queue_exception
kvm
|
|
|
|
8 |
458d |
520d
|
22/24 |
447d |
fc4fad79fc3d
KVM: VMX: Reject KVM_RUN if emulation is required with pending exception
|
WARNING: refcount bug in netdev_run_todo
net
|
|
|
|
5 |
549d |
559d
|
22/24 |
447d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
KASAN: use-after-free Write in io_submit_one
fs
|
C |
done |
|
11 |
534d |
572d
|
22/24 |
447d |
75feae73a280
block: fix single bio async DIO error handling
|
general protection fault in free_percpu
net
|
syz |
unreliable |
done |
80 |
515d |
782d
|
22/24 |
447d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
WARNING: kmalloc bug in hash_net_create
netfilter
|
C |
done |
|
283 |
606d |
633d
|
22/24 |
447d |
7bbc3d385bd8
netfilter: ipset: Fix oversized kvmalloc() calls
|
possible deadlock in snd_mixer_oss_ioctl1
alsa
|
C |
done |
|
149 |
579d |
583d
|
22/24 |
447d |
3ab799201845
|