kernel BUG in new_curseg
f2fs
|
C |
|
|
8 |
12d |
25d
|
27/28 |
never |
65a6ce4726c2
f2fs: fix to don't panic system for no free segment fault injection
|
INFO: task hung in __writeback_inodes_sb_nr (6)
bcachefs
|
C |
done |
|
1574 |
19h36m |
475d
|
1/28 |
never |
PM: hibernate: Fix block device handling in test_resume mode
|
KASAN: use-after-free Read in rtw_load_firmware_cb
usb
wireless
|
C |
|
|
848 |
7d20h |
71d
|
27/28 |
never |
0e735a4c6137
wifi: rtw88: always wait for both firmware loading attempts
|
KASAN: use-after-free Read in __vma_adjust
mm
|
C |
done |
|
10 |
789d |
845d
|
1/28 |
never |
fs/userfaultfd: fix vma iteration in mas_for_each() loop
|
possible deadlock in mi_read
ntfs3
|
C |
error |
|
10662 |
now |
734d
|
1/28 |
never |
fs/ntfs3: Fix possible deadlock in mi_read
|
KCSAN: data-race in __fsnotify_parent / __fsnotify_recalc_mask (5)
fs
|
|
|
|
15 |
5d08h |
92d
|
10/28 |
never |
35ceae44742e
fsnotify: Avoid data race between fsnotify_recalc_mask() and fsnotify_object_watched()
|
KCSAN: data-race in __ep_remove / __fput (5)
fs
|
|
|
|
1 |
14d |
13d
|
1/28 |
never |
epoll: annotate racy check
|
WARNING in fuse_request_end (2)
fuse
|
|
|
|
677 |
9d20h |
6d14h
|
25/28 |
never |
fcd2d9e1fdcd
fuse: clear FR_PENDING if abort is detected when sending request
|
BUG: unable to handle kernel NULL pointer dereference in filemap_read_folio (3)
erofs
mm
|
C |
|
|
157 |
1h38m |
17d
|
1/28 |
never |
erofs: ensure regular inodes for file-backed mounts
|
WARNING in __dev_queue_xmit (4)
net
|
C |
|
|
382 |
11h03m |
30d
|
27/28 |
never |
9d301de12da6
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
|
WARNING in remove_proc_entry (6)
can
|
C |
done |
|
377 |
21h12m |
30d
|
27/28 |
never |
94b0818fa635
can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().
|
WARNING in __rate_control_send_low (2)
wireless
|
C |
done |
|
2870 |
2h32m |
134d
|
27/28 |
never |
e7a7ef9a0742
wifi: mac80211: don't use rate mask for offchannel TX either
|
KMSAN: uninit-value in skb_trim (2)
wireless
|
|
|
|
5 |
25d |
55d
|
27/28 |
never |
94745807f3eb
wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
|
BUG: corrupted list in gfs2_fill_super
gfs2
|
C |
done |
|
8527 |
9d11h |
124d
|
27/28 |
never |
6cb9df81a2c4
gfs2: fix double destroy_workqueue error
|
KMSAN: uninit-value in gtp_dev_xmit
net
|
|
|
|
3 |
66d |
66d
|
27/28 |
never |
3a3be7ff9224
gtp: pull network headers in gtp_dev_xmit()
|
KCSAN: data-race in virtqueue_disable_cb / vring_interrupt (4)
virt
|
|
|
|
1 |
22d |
22d
|
1/28 |
never |
virtio_ring: tag event_triggered as racy for KCSAN
|
WARNING: locking bug in try_to_wake_up
kernel
|
C |
error |
|
77 |
10m |
142d
|
10/28 |
never |
41fd1e94066a
btrfs: wait for fixup workers before stopping cleaner kthread during umount
|
KASAN: use-after-free Read in ila_nf_input (2)
net
|
|
|
|
10 |
28m |
34d
|
26/28 |
never |
031ae72825ce
ila: call nf_unregister_net_hooks() sooner
|
memory leak in clear_state_bit
btrfs
|
C |
|
|
3 |
304d |
315d
|
27/28 |
never |
c346c629765a
btrfs: qgroup: don't use extent changeset when not needed
|
possible deadlock in fsnotify_destroy_mark
squashfs
|
C |
|
|
46 |
13h38m |
43d
|
10/28 |
never |
cad3f4a22cfa
inotify: Fix possible deadlock in fsnotify_destroy_mark
|
INFO: task hung in z_erofs_runqueue
erofs
|
C |
|
|
379 |
8h22m |
69d
|
27/28 |
never |
9e2f9d34dd12
erofs: handle overlapped pclusters out of crafted images properly
|
kernel BUG in clear_inode
btrfs
|
C |
|
|
9 |
37d |
126d
|
27/28 |
never |
88b1afbf0f6b
vfs: fix race between evice_inodes() and find_inode()&iput()
|
WARNING in io_sq_offload_create
io-uring
|
C |
|
|
284 |
10d |
14d
|
26/28 |
never |
a09c17240bdf
io_uring/sqpoll: retain test for whether the CPU is valid
|
WARNING in ethnl_req_get_phydev
net
|
C |
done |
|
73 |
38d |
39d
|
27/28 |
never |
cff69f72d333
ethtool: pse-pd: move pse validation into set
|
WARNING in iomap_write_begin
xfs
iomap
|
C |
error |
|
6 |
38d |
52d
|
1/28 |
never |
vfs: Fix implicit conversion problem when testing overflow case
|
memory leak in corrupted (2)
mm
exfat
|
syz |
|
|
432 |
19d |
186d
|
27/28 |
never |
c290fe508eee
exfat: resolve memory leak from exfat_create_upcase_table()
|
KASAN: slab-use-after-free Read in btrfs_cleanup_defrag_inodes
btrfs
|
C |
|
|
266 |
12d |
18d
|
27/28 |
never |
7f1b63f981b8
btrfs: fix use-after-free on rbtree that tracks inodes for auto defrag
|
general protection fault in run_is_mapped_full
ntfs3
|
C |
error |
|
58 |
11h47m |
83d
|
1/28 |
never |
fs/ntfs3: Fix general protection fault in run_is_mapped_full
|
INFO: rcu detected stall in sys_io_uring_enter (2)
io-uring
|
|
|
|
34 |
1d22h |
14d
|
27/28 |
never |
eac2ca2d682f
io_uring: check if we need to reschedule during overflow flush
|
INFO: rcu detected stall in schedule_timeout (6)
usb
|
C |
done |
|
39 |
4d11h |
141d
|
26/28 |
never |
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
INFO: rcu detected stall in aoecmd_cfg (2)
usb
block
|
C |
done |
|
7 |
36d |
149d
|
26/28 |
never |
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
INFO: task hung in io_sq_thread_stop
fs
io-uring
|
C |
done |
|
211 |
1327d |
1486d
|
1/28 |
never |
io_uring: don't sleep schedule in SQPOLL thread if we need to park
|
KMSAN: kernel-infoleak in raw_ioctl (2)
usb
|
C |
|
|
18201 |
7d08h |
73d
|
26/28 |
never |
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
INFO: trying to register non-static key in ntfs_file_release
ntfs3
|
|
|
|
1 |
35d |
31d
|
1/28 |
never |
fs/ntfs3: Additional check in ntfs_file_release
|
WARNING in iopt_map_pages
iommu
|
C |
error |
|
3 |
36d |
117d
|
27/28 |
never |
8f6887349b2f
iommufd: Protect against overflow of ALIGN() during iova allocation
|
INFO: task hung in uevent_show
usb
|
C |
done |
|
9704 |
53d |
114d
|
26/28 |
never |
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
kernel BUG in btrfs_get_ordered_extents_for_logging
btrfs
|
syz |
|
|
3 |
39d |
36d
|
27/28 |
never |
cd9253c23aed
btrfs: fix race between direct IO write and fsync when using same fd
|
KASAN: slab-use-after-free Read in ip6_send_skb
netfilter
|
|
|
|
1 |
47d |
47d
|
27/28 |
never |
faa389b2fbaa
ipv6: prevent UAF in ip6_send_skb()
|
KASAN: slab-out-of-bounds Read in udf_get_filelongad (2)
udf
|
C |
|
|
4 |
17d |
31d
|
10/28 |
never |
c226964ec786
udf: refactor inode_bmap() to handle error
|
KASAN: slab-use-after-free Read in dbFreeBits
jfs
|
C |
done |
|
6 |
19d |
49d
|
27/28 |
never |
d6c1b3599b2f
jfs: Fix uaf in dbFreeBits
|
KMSAN: uninit-value in lzo1x_1_do_compress (3)
mm
|
|
|
|
1 |
40d |
36d
|
27/28 |
never |
2b59ffad47db
jfs: Fix uninit-value access of new_ea in ea_buffer
|
KMSAN: uninit-value in udf_get_fileshortad
udf
|
C |
|
|
3 |
5d07h |
17d
|
10/28 |
never |
264db9d666ad
udf: fix uninit-value use in udf_get_fileshortad
|
KCSAN: data-race in __fput / __tty_hangup (4)
serial
|
|
|
|
6 |
21h09m |
532d
|
1/28 |
never |
tty: tty_io: fix race between tty_fops and hung_up_tty_fops
|
UBSAN: shift-out-of-bounds in dbFindBits
jfs
|
C |
error |
|
46 |
1d18h |
88d
|
27/28 |
never |
b0b2fc815e51
jfs: UBSAN: shift-out-of-bounds in dbFindBits
|
KCSAN: data-race in next_expiry_recalc / update_process_times (2)
kernel
|
|
|
|
2 |
36d |
52d
|
27/28 |
never |
79f8b28e85f8
timers: Annotate possible non critical data race of next_expiry
|
general protection fault in btrfs_update_reloc_root
btrfs
|
|
|
|
3 |
15d |
7d08h
|
10/28 |
never |
c3b47f49e831
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
|
general protection fault in dev_map_enqueue (2)
bpf
net
|
C |
error |
done |
336 |
64d |
130d
|
2/28 |
never |
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
|
kernel BUG in __sock_sendmsg
net
|
C |
|
|
111 |
31d |
48d
|
27/28 |
never |
fe1910f9337b
tcp_bpf: fix return value of tcp_bpf_sendmsg()
|
UBSAN: array-index-out-of-bounds in dbSplit
jfs
|
C |
inconclusive |
|
31 |
22d |
70d
|
27/28 |
never |
d64ff0d23067
jfs: check if leafidx greater than num leaves per dmap tree
|
KASAN: use-after-free Read in ext4_search_dir (2)
ext4
|
C |
|
|
5 |
22d |
46d
|
27/28 |
never |
c6b72f5d82b1
ext4: avoid OOB when system.data xattr changes underneath the filesystem
|
UBSAN: array-index-out-of-bounds in dbNextAG (2)
jfs
|
C |
inconclusive |
|
53 |
15d |
85d
|
25/28 |
never |
e63866a47556
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
|
KASAN: slab-use-after-free Read in __uprobe_unregister
perf
trace
|
C |
|
|
9 |
17d |
55d
|
27/28 |
never |
5fe6e308abae
bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (3)
bpf
net
|
C |
done |
|
6 |
83d |
83d
|
27/28 |
never |
92de36080c93
bpf: Fail verification for sign-extension of packet data/data_end/data_meta
|
linux-next test error: WARNING in rcu_core
net
virt
|
|
|
|
16 |
55d |
63d
|
27/28 |
never |
b8c8ba73c68b
slub: Introduce CONFIG_SLUB_RCU_DEBUG
|
INFO: trying to register non-static key in mark_as_free_ex
ntfs3
|
C |
done |
|
2 |
18d |
30d
|
1/28 |
never |
fs/ntfs3: Additional check in ni_clear()
|
kernel BUG in vma_replace_policy
mm
|
C |
done |
|
6 |
385d |
394d
|
1/28 |
never |
mm: lock VMAs skipped by a failed queue_pages_range()
|
WARNING in kcov_remote_start (5)
wireless
|
|
|
|
4233 |
2d01h |
82d
|
25/28 |
never |
7d4df2dad312
kcov: properly check for softirq context
9313d139aa25
usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
|
KMSAN: uninit-value in batadv_get_vid (2)
batman
|
C |
|
|
251 |
8d07h |
276d
|
1/28 |
never |
bpf: Don't redirect too small packets
|
KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open
selinux
|
|
|
|
1 |
42d |
42d
|
27/28 |
never |
2571bb9d553b
selinux: annotate false positive data race to avoid KCSAN warnings
|
possible deadlock in lock_timer_base
bpf
trace
|
C |
|
|
131 |
2d04h |
1370d
|
1/28 |
never |
kfence: fix potential deadlock due to wake_up()
|
general protection fault in smack_log_callback
audit
|
C |
done |
|
12 |
10d |
15d
|
27/28 |
never |
8a23c9e1ba46
selinux,smack: properly reference the LSM blob in security_watch_key()
|
divide error in ext4_mb_regular_allocator
ext4
|
C |
done |
|
2 |
42d |
52d
|
27/28 |
never |
ee85e0938aa8
ext4: check stripe size compatibility on remount as well
|
general protection fault in sctp_inet_listen
sctp
|
|
|
|
1 |
21d |
7d07h
|
22/28 |
never |
8beee4d8dee7
sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
|
WARNING in kthread_unpark (2)
wireguard
gfs2
|
syz |
done |
|
34 |
3d10h |
146d
|
1/28 |
never |
kthread: Unpark only parked kthread
|
UBSAN: array-index-out-of-bounds in cake_enqueue
net
|
|
|
|
1 |
47d |
46d
|
27/28 |
never |
546ea84d07e3
sched: sch_cake: fix bulk flow accounting logic for host fairness
|
riscv/fixes test error: kernel panic: Kernel stack overflow
riscv
|
|
|
|
11 |
1d11h |
19d
|
1/28 |
never |
cfb10de18538
riscv: Fix kernel stack size when KASAN is enabled
|
WARNING in sock_map_close (2)
net
bpf
|
C |
done |
|
3 |
43d |
43d
|
27/28 |
never |
1461f5a3d810
l2tp: avoid overriding sk->sk_user_data
|
WARNING in l2tp_udp_encap_destroy
net
|
|
|
|
3 |
56d |
55d
|
27/28 |
never |
c1b2e36b8776
l2tp: flush workqueue before draining it
|
WARNING in pppol2tp_release
net
|
|
|
|
3 |
57d |
60d
|
27/28 |
never |
c1b2e36b8776
l2tp: flush workqueue before draining it
|
KASAN: slab-use-after-free Read in lockref_get_not_dead (2)
fs
|
syz |
error |
|
1 |
32d |
28d
|
27/28 |
never |
4e32c25b58b9
libfs: fix get_stashed_dentry()
|
KMSAN: uninit-value in erspan_build_header (2)
net
|
C |
|
|
45 |
16d |
196d
|
1/28 |
never |
bpf: Don't redirect too small packets
|
general protection fault in hook_inode_free_security
lsm
|
|
|
|
12 |
82d |
149d
|
27/28 |
never |
63dff3e48871
lsm: add the inode_free_security_rcu() LSM implementation hook
|
WARNING in fscrypt_fname_siphash
ext4
fscrypt
|
C |
unreliable |
|
32 |
34d |
128d
|
27/28 |
never |
985b67cd8639
ext4: filesystems without casefold feature cannot be mounted with siphash
|
WARNING: kmalloc bug in wnd_init
ntfs3
|
C |
done |
|
3 |
66d |
212d
|
1/28 |
never |
fs/ntfs3: Add rough attr alloc_size check
|
INFO: rcu detected stall in do_vmi_munmap (2)
mm
|
|
|
|
40 |
29d |
46d
|
27/28 |
never |
f806de88d8f7
maple_tree: remove rcu_read_lock() from mt_validate()
|
WARNING: suspicious RCU usage in mas_walk (3)
mm
|
C |
done |
|
12 |
346d |
360d
|
1/28 |
never |
mempolicy: migration attempt to match interleave nodes: fix
|
riscv/fixes test error: can't ssh into the instance
|
|
|
|
48 |
31d |
49d
|
27/28 |
never |
1ff95eb2bebd
riscv: Fix RISCV_ALTERNATIVE_EARLY
|
inconsistent lock state in ppp_input
ppp
|
C |
|
|
8 |
1d01h |
7d14h
|
22/28 |
never |
aec7291003df
ppp: do not assume bh is held in ppp_channel_bridge_input()
|
BUG: unable to handle kernel NULL pointer dereference in attr_make_nonresident
ntfs3
|
C |
error |
done |
110 |
74d |
156d
|
27/28 |
never |
0f9579d9e033
fs/ntfs3: Add missing .dirty_folio in address_space_operations
|
WARNING in bond_xdp_get_xmit_slave (2)
net
|
|
|
|
124 |
16d |
116d
|
26/28 |
never |
0cbfd45fbcf0
bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()
|
linux-next boot error: WARNING in kmem_cache_free
fs
|
|
|
|
45 |
1561d |
1565d
|
1/28 |
never |
mm, slab/slub: improve error reporting and overhead of cache_from_obj()-fix
|
WARNING: ODEBUG bug in ext4_fill_super (4)
ext4
|
C |
|
|
6 |
12d |
106d
|
27/28 |
never |
0ce160c5bdb6
ext4: fix timer use-after-free on failed mount
|
linux-next test error: general protection fault in fuse_get_req
fuse
|
|
|
|
17 |
11d |
22d
|
27/28 |
never |
3988a60d3aaa
fs/fuse: fix null-ptr-deref when checking SB_I_NOIDMAP flag
|
general protection fault in bch2_fs_recovery
bcachefs
|
C |
|
|
10 |
5d17h |
24d
|
27/28 |
never |
025c55a4c7f1
bcachefs: return err ptr instead of null in read sb clean
|
KMSAN: uninit-value in bch2_bkey_cmp_packed_inlined
bcachefs
|
C |
|
|
7 |
5d15h |
25d
|
26/28 |
never |
0696a18a8cc3
bcachefs: memset bounce buffer portion to 0 after key_sort_fix_overlapping
|
WARNING in p9_client_create (2)
v9fs
|
C |
done |
|
10077 |
6m |
12d
|
1/28 |
never |
9p: Avoid creating multiple slab caches with the same name
|
WARNING in ext4_fileattr_get
ext4
|
|
|
|
120 |
94d |
108d
|
27/28 |
never |
be27cd64461c
ext4: use memtostr_pad() for s_volume_name
|
general protection fault in __copy_super
bcachefs
|
C |
done |
|
5 |
11d |
13d
|
26/28 |
never |
40d40c6bea19
bcachefs: assign return error when iterating through layout
|
WARNING: suspicious RCU usage in bch2_snapshot_tree_oldest_subvol
bcachefs
|
C |
|
|
21 |
5d16h |
17d
|
26/28 |
never |
39c3aad43f6f
bcachefs: Hold read lock in bch2_snapshot_tree_oldest_subvol()
|
KASAN: use-after-free Read in p9_req_put
v9fs
|
|
|
|
180 |
5d06h |
779d
|
1/28 |
never |
9p: p9_client_create: use p9_client_destroy on failure
|
KASAN: invalid-free in hci_req_sync_complete
bluetooth
|
syz |
|
|
179 |
91d |
165d
|
1/28 |
never |
Bluetooth: Fix double free in hci_req_sync_complete
|
possible deadlock in ppp_do_recv
ppp
|
|
|
|
6 |
2d05h |
11d
|
22/28 |
never |
aec7291003df
ppp: do not assume bh is held in ppp_channel_bridge_input()
|
kernel BUG in vfs_get_tree
bcachefs
|
C |
done |
|
318 |
8h38m |
44d
|
26/28 |
never |
b29c30ab48e0
bcachefs: Fix incorrect IS_ERR_OR_NULL usage
|
BUG: Bad page state (8)
jfs
mm
|
C |
|
|
12946 |
9m |
1341d
|
1/28 |
never |
mm-filemap-add-filemap_range_uptodate-fix
|
general protection fault in ata_msense_control
ide
|
C |
|
|
13 |
7d15h |
14d
|
26/28 |
never |
03a9cfc1314b
ata: libata-scsi: Fix ata_msense_control_spgt2()
|
KASAN: slab-use-after-free Read in finish_fault
mm
|
C |
done |
|
8 |
111d |
113d
|
1/28 |
never |
mm-memory-extend-finish_fault-to-support-large-folio-fix
|
KASAN: slab-use-after-free Read in l2cap_connect (2)
bluetooth
|
C |
done |
|
8 |
13d |
102d
|
23/28 |
never |
333b4fd11e89
Bluetooth: L2CAP: Fix uaf in l2cap_connect
|
WARNING: lock held when returning to user space in f2fs_ioc_start_atomic_write
f2fs
|
C |
done |
|
34 |
50d |
51d
|
25/28 |
never |
b2c160f4f3cf
f2fs: atomic: fix to forbid dio in atomic_file
|
kernel BUG in folio_flags
mm
|
|
|
|
62 |
184d |
631d
|
1/28 |
never |
mm-reimplement-compound_nr-fix
|
possible deadlock in ppp_input_error
ppp
|
|
|
|
61 |
1d02h |
13d
|
22/28 |
never |
aec7291003df
ppp: do not assume bh is held in ppp_channel_bridge_input()
|
WARNING: still has locks held in f2fs_ioc_start_atomic_write
f2fs
|
|
|
|
1 |
53d |
49d
|
25/28 |
never |
b2c160f4f3cf
f2fs: atomic: fix to forbid dio in atomic_file
|
kernel BUG in trace_dma_unmap_sg
iommu
|
C |
|
|
5 |
6d16h |
9d02h
|
26/28 |
never |
bfc4a245a794
dma-mapping: fix DMA API tracing for chained scatterlists
|
WARNING in page_add_anon_rmap
mm
|
C |
done |
|
1041 |
381d |
382d
|
1/28 |
never |
mm-rmap-simplify-pageanonexclusive-sanity-checks-when-adding-anon-rmap-fix
|
general protection fault in vma_is_shmem
io-uring
mm
|
C |
error |
|
28 |
774d |
775d
|
1/28 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
general protection fault in ovl_llseek
overlayfs
|
C |
|
|
5 |
8d03h |
8d05h
|
26/28 |
never |
0c33037c825e
ovl: fix file leak in ovl_real_fdget_meta()
|
WARNING: bad unlock balance in ocfs2_read_blocks
ocfs2
|
C |
|
|
240 |
15d |
47d
|
27/28 |
never |
c03a82b4a0c9
ocfs2: remove unreasonable unlock in ocfs2_read_blocks
|
possible deadlock in rfcomm_sk_state_change
bluetooth
|
C |
done |
|
22545 |
1h26m |
1117d
|
1/28 |
never |
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
|
WARNING in hci_conn_timeout
bluetooth
|
C |
done |
|
5765 |
15h20m |
1525d
|
1/28 |
never |
Bluetooth: hci_conn: Use disable_delayed_work_sync
|
KMSAN: uninit-value in ocfs2_get_block
ocfs2
|
C |
|
|
5 |
13d |
9d20h
|
26/28 |
never |
2af148ef8549
ocfs2: fix uninit-value in ocfs2_get_block()
|
UBSAN: shift-out-of-bounds in ocfs2_fill_super
ocfs2
|
C |
|
|
161 |
3h06m |
50d
|
27/28 |
never |
7f86b2942791
ocfs2: fix shift-out-of-bounds UBSAN bug in ocfs2_verify_volume()
|
KASAN: null-ptr-deref Write in jbd2_journal_update_sb_log_tail
ocfs2
ext4
|
C |
|
|
4 |
8d20h |
46d
|
27/28 |
never |
5784d9fcfd43
ocfs2: fix null-ptr-deref when journal load failed.
|
possible deadlock in ocfs2_get_system_file_inode
ocfs2
|
C |
done |
|
14785 |
6h57m |
50d
|
26/28 |
never |
7bf1823e010e
ocfs2: fix deadlock in ocfs2_get_system_file_inode
|
BUG: unable to handle kernel NULL pointer dereference in set_page_dirty
reiserfs
f2fs
|
C |
|
|
317 |
55d |
771d
|
1/28 |
never |
f2fs: fix missing mapping caused by the mount/umount race
|
WARNING in vmap_pages_range_noflush (2)
net
bpf
|
C |
error |
|
250 |
773d |
775d
|
1/28 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
WARNING in gid_table_release_one (2)
rdma
|
|
|
|
1 |
36d |
32d
|
25/28 |
never |
1403c8b14765
IB/core: Fix ib_cache_setup_one error flow cleanup
|
KASAN: slab-use-after-free Read in unix_stream_read_actor (2)
net
|
C |
inconclusive |
|
4 |
34d |
30d
|
27/28 |
never |
5aa57d9f2d53
af_unix: Don't return OOB skb in manage_oob().
|
WARNING: ODEBUG bug in ocfs2_local_read_info
ocfs2
|
C |
inconclusive |
|
7 |
7h45m |
32d
|
27/28 |
never |
35fccce29feb
ocfs2: cancel dqi_sync_work before freeing oinfo
|
BUG: sleeping function called from invalid context in ntfs_d_hash
ntfs3
|
C |
done |
|
625 |
21m |
33d
|
1/28 |
never |
ntfs3: Change to non-blocking allocation in ntfs_d_hash
|
INFO: task hung in remove_inode_hugepages
fs
mm
|
C |
done |
|
49 |
25d |
88d
|
1/28 |
never |
INFO: task hung in remove_inode_hugepages
|
general protection fault in nilfs_btree_insert (2)
nilfs
|
C |
inconclusive |
|
1 |
22d |
33d
|
27/28 |
never |
9403001ad65a
nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()
|
WARNING in copy_huge_pmd
mm
|
C |
done |
|
289 |
1h12m |
11d
|
1/28 |
never |
mm/huge_memory: check pmd_special() only after pmd_present()
|
KMSAN: uninit-value in netfs_clear_buffer
netfs
|
C |
|
|
46 |
5d10h |
14d
|
23/28 |
never |
f6023535b52f
netfs: Fix a KMSAN uninit-value error in netfs_clear_buffer
|
KASAN: slab-use-after-free Read in hugetlb_fault (2)
mm
|
|
|
|
2 |
22d |
26d
|
27/28 |
never |
98b74bb4d7e9
mm/hugetlb.c: fix UAF of vma in hugetlb fault pathway
2a058ab3286d
mm: change vmf_anon_prepare() to __vmf_anon_prepare()
|
BUG: unable to handle kernel paging request in alloc_huge_page
mm
|
C |
unreliable |
|
491 |
1148d |
1147d
|
1/28 |
never |
mm/hugetlb: Initialize page to NULL in alloc_buddy_huge_page_with_mpol()
|
BUG: using __this_cpu_write() in preemptible code in nf_dup_ipv4
netfilter
|
|
|
|
1 |
18d |
18d
|
13/28 |
never |
92ceba94de6f
netfilter: nf_tables: prevent nf_skb_duplicated corruption
|
KMSAN: kernel-usb-infoleak in usbtmc_write
usb
|
C |
|
|
167 |
7d09h |
71d
|
26/28 |
never |
625fa77151f0
USB: usbtmc: prevent kernel-usb-infoleak
|
general protection fault in hsr_proxy_announce
net
|
|
|
|
2 |
30d |
28d
|
27/28 |
never |
a7789fd4caaf
net: hsr: prevent NULL pointer dereference in hsr_proxy_announce()
|
WARNING in input_mt_init_slots
input
|
C |
inconclusive |
|
14301 |
52d |
1362d
|
25/28 |
never |
99d3bf5f7377
Input: MT - limit max slots
206f533a0a7c
Input: uinput - reject requests with unreasonable number of slots
|
linux-next boot error: kernel BUG at include/linux/page-flags.h:LINE!
mm
|
|
|
|
3 |
1401d |
1401d
|
1/28 |
never |
fixup for "mm: refactor initialization of stuct page for holes"
|
WARNING: kmalloc bug in memslot_rmap_alloc
kvm
|
C |
unreliable |
|
3 |
1095d |
1125d
|
1/28 |
never |
KVM: replace large kvmalloc allocation with vmalloc
|
kernel BUG in f2fs_abort_atomic_write
f2fs
|
syz |
|
|
2 |
597d |
641d
|
1/28 |
never |
f2fs: fix to avoid race condition of f2fs_abort_atomic_write()
|
WARNING in hsr_fill_frame_info
net
|
C |
error |
|
80 |
7d06h |
35d
|
27/28 |
never |
430d67bdcb04
net: hsr: Use the seqnr lock for frames received via interlink port.
|
WARNING: lock held when returning to user space in ethnl_act_cable_test
net
|
C |
done |
|
43 |
38d |
39d
|
27/28 |
never |
3d6a0c4f4552
net: fix unreleased lock in cable test
|
WARNING: refcount bug in ethnl_phy_done
net
|
C |
done |
|
4 |
24d |
23d
|
27/28 |
never |
1ad84a151af7
net: ethtool: phy: Don't set the context dev pointer for unfiltered DUMP
|
WARNING in folio_memcg
cgroups
mm
|
C |
done |
|
164 |
45d |
46d
|
1/28 |
never |
mm: kmem: fix split_page_memcg()
|
KASAN: slab-use-after-free Read in madvise_collapse
mm
|
C |
error |
|
5 |
438d |
439d
|
1/28 |
never |
mm/khugepaged: collapse_pte_mapped_thp() with mmap_read_lock(): fix
|
BUG: unable to handle kernel NULL pointer dereference in fbcon_putcs (3)
btrfs
fbdev
|
C |
|
|
4 |
11d |
24d
|
26/28 |
never |
5b97eebcce1b
fbcon: Fix a NULL pointer dereference issue in fbcon_putcs
|
kernel BUG in collapse_file (3)
mm
|
C |
done |
|
14 |
438d |
445d
|
1/28 |
never |
mm/khugepaged: collapse_pte_mapped_thp() with mmap_read_lock(): fix
|
general protection fault in ethnl_phy_doit
net
|
C |
done |
|
6 |
23d |
24d
|
25/28 |
never |
fce1e9f86af1
net: ethtool: phy: Check the req_info.pdn field for GET commands
|
general protection fault in __smc_diag_dump (2)
net
s390
|
|
|
|
6 |
1d13h |
36d
|
26/28 |
never |
98d4435efcbf
net/smc: prevent NULL pointer dereference in txopt_get
|
kernel BUG in f2fs_evict_inode (3)
f2fs
|
C |
error |
|
32 |
9d02h |
47d
|
27/28 |
never |
884ee6dc85b9
f2fs: get rid of online repaire on corrupted directory
|
WARNING in mptcp_pm_nl_set_flags
mptcp
|
syz |
done |
|
3 |
39d |
39d
|
27/28 |
never |
9366922adc6a
mptcp: pm: fix ID 0 endp usage after multiple re-creations
|
KASAN: null-ptr-deref Write in f2fs_stop_gc_thread
f2fs
|
C |
done |
|
5 |
25d |
72d
|
27/28 |
never |
c7f114d864ac
f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
|
possible deadlock in collapse_file
mm
|
C |
done |
|
189 |
578d |
579d
|
1/28 |
never |
mm/khugepaged: fix vm_lock/i_mmap_rwsem inversion in retract_page_tables
|
KASAN: slab-use-after-free Read in __timer_delete_sync
mptcp
|
syz |
error |
|
1 |
34d |
31d
|
27/28 |
never |
b4cd80b03389
mptcp: pm: Fix uaf in __timer_delete_sync
|
linux-next test error: WARNING in vma_merge
mm
|
|
|
|
6 |
618d |
619d
|
1/28 |
never |
mm/madvise: fix VMA_ITERATOR start position
|
kernel BUG in mfill_atomic_copy
mm
|
C |
error |
|
3 |
452d |
448d
|
1/28 |
never |
mm: userfaultfd: check for start + len overflow in validate_range: fix
|
WARNING in vmx_handle_exit
kvm
|
C |
error |
|
5 |
12d |
185d
|
26/28 |
never |
3f6821aa147b
KVM: x86: Forcibly leave nested if RSM to L2 hits shutdown
|
possible deadlock in ntfs_set_state (2)
ntfs3
|
C |
error |
|
926 |
14h44m |
234d
|
1/28 |
never |
fs/ntfs3: Fix warning possible deadlock in ntfs_set_state
|
KCSAN: data-race in mem_cgroup_iter / mem_cgroup_iter
cgroups
mm
|
|
|
|
59 |
13d |
35d
|
27/28 |
never |
ec0db74b4b1f
mm: restart if multiple traversals raced
|
INFO: rcu detected stall in neigh_timer_handler (8)
net
|
C |
done |
done |
72 |
54d |
113d
|
27/28 |
never |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
linux-next boot error: WARNING in prepare_kswapd_sleep
mm
|
|
|
|
15 |
1409d |
1410d
|
1/28 |
never |
mm/memcg: warn on missing memcg on mem_cgroup_page_lruvec()
|
linux-next boot error: BUG: unable to handle kernel NULL pointer dereference in mempool_init_node
ceph
fs
|
|
|
|
12 |
1421d |
1423d
|
1/28 |
never |
kasan-simplify-kasan_poison_kfree-temp-fix
|
BUG: sleeping function called from invalid context in alloc_buffer_head
mm
|
|
|
|
15 |
509d |
514d
|
1/28 |
never |
workingset: add missing rcu_read_unlock() in lru_gen_refault()
|
general protection fault in is_page_fault_stale
kvm
|
|
|
|
3 |
49d |
74d
|
27/28 |
never |
28cec7f08b8b
KVM: x86/mmu: Check that root is valid/loaded when pre-faulting SPTEs
|
WARNING in vma_merge
mm
|
C |
done |
|
18115 |
312d |
891d
|
1/28 |
never |
mm/mlock: use maple state in apply_mlockall_flags()
|
general protection fault in vma_interval_tree_remove
mm
|
C |
done |
|
14 |
128d |
886d
|
1/28 |
never |
mm/mmap: fix advanced maple tree API for mmap_region()
mm/mmap: qvoid dereferencing next on null in BUG_ON()
|
WARNING in rcu_sync_dtor
f2fs
|
C |
done |
|
749 |
6d16h |
70d
|
27/28 |
never |
930c6ab93492
f2fs: fix to don't set SB_RDONLY in f2fs_handle_critical_error()
|
WARNING in follow_pte
kernel
|
C |
|
|
230 |
13d |
93d
|
1/28 |
never |
mm: fix mmap_assert_locked() in follow_pte()
|
INFO: rcu detected stall in __mod_timer (5)
usb
|
C |
error |
done |
10 |
60d |
124d
|
27/28 |
never |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
WARNING in handle_userfault
mm
|
C |
error |
|
71 |
450d |
457d
|
1/28 |
never |
mm: fix a lockdep issue in vma_assert_write_locked
|
KMSAN: uninit-value in nf_reject_ip6_tcphdr_put
netfilter
|
C |
|
|
136 |
8d02h |
21d
|
25/28 |
never |
9c778fe48d20
UPSTREAM: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
|
general protection fault in rt6_disable_ip
net
|
|
|
|
1 |
22d |
22d
|
25/28 |
never |
04ccecfa959d
UPSTREAM: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
|
KASAN: slab-use-after-free Read in handle_mm_fault
mm
|
C |
done |
|
107 |
77d |
80d
|
1/28 |
never |
mm: check for VM_DROPPABLE in vma prior to handling mm fault
|
KASAN: slab-out-of-bounds Read in shrink_folio_list
mm
|
C |
|
|
683 |
452d |
453d
|
1/28 |
never |
mm: call folio_mapping() inside folio_needs_release()
|
possible deadlock in touch_wq_lockdep_map
usb
|
C |
|
|
1208 |
6d04h |
202d
|
28/28 |
1d07h |
ccbde4b128ef
char: xillybus: Don't destroy workqueue from work item running on it
|
kernel BUG in bch2_lru_change (2)
bcachefs
|
C |
|
|
2 |
49d |
49d
|
28/28 |
1d07h |
9482f3b05332
bcachefs: avoid overflowing LRU_TIME_BITS for cached data lru
|
WARNING in bch2_fs_journal_stop
bcachefs
|
C |
done |
|
1463 |
48d |
79d
|
28/28 |
1d07h |
7f2de6947f92
bcachefs: Fix warning in bch2_fs_journal_stop()
|
BUG: workqueue leaked atomic, lock or RCU: kworker/u33:NUM[NUM]
bluetooth
|
C |
|
|
13 |
57d |
70d
|
28/28 |
1d07h |
c531e63871c0
Bluetooth: l2cap: always unlock channel in l2cap_conless_channel()
|
general protection fault in reuseport_add_sock (3)
net
|
C |
done |
|
3 |
68d |
67d
|
28/28 |
1d07h |
9ab0faa7f9ff
sctp: Fix null-ptr-deref in reuseport_add_sock().
|
KMSAN: uninit-value in line6_midibuf_read
usb
sound
|
C |
|
|
357 |
10d |
72d
|
28/28 |
1d07h |
15b7a03205b3
ALSA: line6: Fix racy access to midibuf
|
kernel BUG in bch2_journal_replay
bcachefs
|
C |
done |
|
3 |
44d |
116d
|
28/28 |
1d07h |
cab18be6957b
bcachefs: Fix replay_now_at() assert
|
WARNING in bch2_write_super
bcachefs
|
|
|
|
3 |
48d |
45d
|
28/28 |
1d07h |
6575b8c9877c
bcachefs: Fix locking in bch2_ioc_setlabel()
|
BUG: stack guard page was hit in vsock_bpf_recvmsg
net
virt
|
C |
done |
|
6 |
55d |
56d
|
28/28 |
1d07h |
69139d2919dd
vsock: fix recursive ->recvmsg calls
|
general protection fault in z_erofs_gbuf_growsize
erofs
|
|
|
|
1 |
50d |
45d
|
28/28 |
1d07h |
0005e01e1e87
erofs: fix out-of-bound access when z_erofs_gbuf_growsize() partially fails
|
KMSAN: uninit-value in bch2_alloc_v4_validate
bcachefs
|
C |
|
|
5 |
45d |
43d
|
28/28 |
1d07h |
8ed823b19214
bcachefs: Fix compat issue with old alloc_v4 keys
|
KMSAN: uninit-value in pick_link
squashfs
|
C |
|
|
9 |
61d |
65d
|
28/28 |
1d07h |
810ee43d9cd2
Squashfs: sanity check symbolic link size
|
KMSAN: uninit-value in nf_flow_offload_inet_hook
netfilter
|
|
|
|
4 |
46d |
56d
|
28/28 |
1d07h |
6ea14ccb60c8
netfilter: flowtable: validate vlan header
|
KASAN: slab-use-after-free Read in br_multicast_port_group_expired
bridge
|
|
|
|
1 |
99d |
99d
|
28/28 |
1d07h |
92c4ee25208d
net: bridge: mcast: wait for previous gc cycles when removing port
|
WARNING in kvm_recalculate_apic_map
kvm
|
C |
done |
|
23 |
52d |
88d
|
28/28 |
1d07h |
4b7c3f6d04bd
KVM: x86: Make x2APIC ID 100% readonly
|
KASAN: slab-use-after-free Read in percpu_ref_put
block
|
|
|
|
18 |
2d16h |
73d
|
28/28 |
1d07h |
0b50b7313ef2
bcachefs: Fix refcounting in discard path
|
KCSAN: data-race in __flush_work / __flush_work (2)
kernel
|
|
|
|
6 |
47d |
60d
|
28/28 |
1d07h |
8bc35475ef1a
workqueue: Fix spruious data race in __flush_work()
|
BUG: unable to handle kernel paging request in net_generic
net
|
|
|
|
1 |
76d |
71d
|
28/28 |
1d07h |
86a41ea9fd79
l2tp: fix lockdep splat
|
WARNING: refcount bug in inet_twsk_kill
net
|
|
|
|
5 |
54d |
54d
|
28/28 |
1d07h |
565d121b6998
tcp: prevent concurrent execution of tcp_sk_exit_batch
|
WARNING in try_queue_bulk_in/usb_submit_urb
kernel
|
|
|
|
1 |
57d |
53d
|
28/28 |
1d07h |
2374bf7558de
char: xillybus: Check USB endpoints when probing device
|
WARNING in __bch2_fsck_err
bcachefs
|
C |
|
|
200 |
2d16h |
49d
|
28/28 |
1d07h |
075cabf324c3
bcachefs: Fix forgetting to pass trans to fsck_err()
|
possible deadlock in __kernfs_remove
kernfs
|
C |
|
|
438 |
59d |
102d
|
28/28 |
1d07h |
15fffc6a5624
driver core: Fix uevent_show() vs driver detach race
|
KASAN: slab-use-after-free Read in kcm_release
net
|
C |
|
|
2 |
110d |
150d
|
28/28 |
1d07h |
807067bf014d
kcm: Serialise kcm_sendmsg() for the same socket.
|
KCSAN: data-race in io_sq_thread / io_sq_thread_park (9)
io-uring
|
|
|
|
1 |
57d |
52d
|
28/28 |
1d07h |
e4956dc7a84d
io_uring/sqpoll: annotate debug task == current with data_race()
|
KASAN: slab-out-of-bounds Write in bch2_dev_journal_init
bcachefs
|
C |
|
|
2 |
47d |
47d
|
28/28 |
1d07h |
bdbdd4759f08
bcachefs: Fix missing validation in bch2_sb_journal_v2_validate()
|
kernel BUG in binder_inc_ref_for_node
kernel
|
C |
error |
|
16721 |
54d |
83d
|
28/28 |
1d07h |
11512c197d38
binder: fix descriptor lookup for context manager
|
WARNING in tcp_sk_exit_batch
net
|
|
|
|
3 |
51d |
89d
|
28/28 |
1d07h |
565d121b6998
tcp: prevent concurrent execution of tcp_sk_exit_batch
|
WARNING in skb_warn_bad_offload (5)
net
|
C |
done |
|
18 |
47d |
80d
|
28/28 |
1d07h |
30b03f2a0592
udp: Fall back to software USO if IPv6 extension headers are present
|
KASAN: slab-out-of-bounds Read in cougar_report_fixup
input
usb
|
C |
|
|
31 |
32d |
66d
|
28/28 |
1d07h |
a6e9c391d45b
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
|
WARNING: bad unlock balance in btrfs_direct_write
btrfs
|
C |
done |
|
235 |
58d |
63d
|
28/28 |
1d07h |
e0391e92f9ab
btrfs: fix double inode unlock for direct IO sync writes
|
WARNING in discard_new_inode
bcachefs
|
C |
|
|
3 |
49d |
49d
|
28/28 |
1d07h |
99c87fe0f584
bcachefs: fix incorrect i_state usage
|
KASAN: slab-use-after-free Read in htab_map_alloc (2)
bpf
|
|
|
|
224 |
147d |
153d
|
27/28 |
22d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
kernel BUG in bch2_sort_keys
bcachefs
|
C |
error |
|
3 |
128d |
152d
|
27/28 |
28d |
5dfd3746b6c4
bcachefs: Fix needs_whiteout BUG_ON() in bkey_sort()
|
WARNING in __virt_to_phys (5)
bcachefs
|
|
|
|
4 |
52d |
48d
|
27/28 |
36d |
9bd01500e4d8
bcachefs: Fix freeing of error pointers
|
possible deadlock in bch2_btree_roots_to_journal_entries
bcachefs
|
C |
done |
|
29 |
89d |
123d
|
27/28 |
36d |
1841027c7de4
bcachefs: bch2_gc_btree() should not use btree_root_lock
|
possible deadlock in bch2_gc_mark_key
bcachefs
|
C |
done |
|
86 |
53d |
130d
|
27/28 |
36d |
1841027c7de4
bcachefs: bch2_gc_btree() should not use btree_root_lock
|
possible deadlock in __mmap_lock_do_trace_start_locking
mm
|
C |
done |
done |
30 |
68d |
161d
|
27/28 |
37d |
7d6be67cfdd4
mm: mmap_lock: replace get_memcg_path_buf() with on-stack buffer
|
BUG: unable to handle kernel paging request in list_lru_add
mm
|
C |
done |
done |
11367 |
83d |
396d
|
27/28 |
37d |
aacd897d4d75
Revert "bcachefs: Mark bch_inode_info as SLAB_ACCOUNT"
|
WARNING in __replicas_deltas_realloc
bcachefs
|
C |
|
|
9 |
56d |
78d
|
27/28 |
37d |
1d16c605cc55
bcachefs: Disk space accounting rewrite
|
kernel BUG in bch2_bucket_alloc_freelist
bcachefs
|
|
|
|
1 |
107d |
103d
|
27/28 |
38d |
44ec5990357b
bcachefs: Don't use the new_fs() bucket alloc path on an initialized fs
|
kernel BUG in bch2_fs_journal_stop
bcachefs
|
C |
done |
|
4370 |
51d |
144d
|
27/28 |
38d |
600b8be5e747
bcachefs: Change bch2_fs_journal_stop() BUG_ON() to warning
|
kernel BUG in __replicas_entry_idx
bcachefs
|
C |
done |
unreliable |
3 |
134d |
137d
|
27/28 |
38d |
8bb8d683a401
bcachefs: Delete journal-buf-sharded old style accounting
|
WARNING in bch2_fs_usage_read_one
bcachefs
|
C |
done |
|
18 |
150d |
150d
|
27/28 |
38d |
8bb8d683a401
bcachefs: Delete journal-buf-sharded old style accounting
|
kernel BUG in bch2_fs_release (2)
bcachefs
|
|
|
|
1 |
102d |
98d
|
27/28 |
38d |
759b2e800f16
bcachefs: Switch online_reserved shutdown assert to WARN()
|
WARNING: refcount bug in get_taint
net
|
|
|
|
2 |
39d |
64d
|
27/28 |
39d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
WARNING: refcount bug in sk_common_release
net
|
C |
|
|
9 |
64d |
79d
|
27/28 |
39d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
WARNING: refcount bug in inet_create
net
|
C |
done |
|
10 |
65d |
92d
|
27/28 |
39d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
kernel panic: not locked: inodes NUM:NUM:NUM cached
bcachefs
|
C |
|
|
2 |
122d |
133d
|
27/28 |
39d |
385f0c05d670
bcachefs: kill key cache arg to bch2_assert_pos_locked()
|
BUG: MAX_LOCK_DEPTH too low! (4)
bcachefs
|
C |
error |
|
1364 |
53d |
149d
|
27/28 |
40d |
375476c41405
bcachefs: Add lockdep support for btree node locks
|
WARNING in bch2_fs_ioctl
bcachefs
|
C |
done |
|
36 |
53d |
115d
|
27/28 |
42d |
d293ece10810
bcachefs: Fix shutdown ordering
|
KASAN: global-out-of-bounds Read in srcu_gp_start_if_needed
bcachefs
|
|
|
|
1 |
134d |
130d
|
27/28 |
42d |
d293ece10810
bcachefs: Fix shutdown ordering
|
kernel panic: bch_dev->ref underflow, last put: bch2_get_next_dev
bcachefs
|
C |
done |
|
21 |
133d |
143d
|
27/28 |
42d |
9667214b30ef
bcachefs: Fix ref in trans_mark_dev_sbs() error path
|
KASAN: wild-memory-access Read in __timer_delete_sync
bcachefs
|
|
|
|
5 |
63d |
130d
|
27/28 |
42d |
d293ece10810
bcachefs: Fix shutdown ordering
|
kernel BUG in btrfs_folio_end_all_writers
btrfs
|
C |
done |
|
102 |
62d |
73d
|
27/28 |
42d |
478574370bef
btrfs: make cow_file_range_inline() honor locked_page on error
|
KMSAN: uninit-value in profile_hits (3)
kernel
|
C |
|
|
1529 |
68d |
283d
|
27/28 |
42d |
7c51f7bbf057
profiling: remove prof_cpu_mask
|
KASAN: stack-out-of-bounds Read in xdp_do_check_flushed
bpf
net
|
C |
done |
|
127 |
63d |
84d
|
27/28 |
42d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KMSAN: uninit-value in io_req_task_work_add_remote
io-uring
|
C |
|
|
10 |
70d |
72d
|
27/28 |
42d |
0db4618e8fab
io_uring/msg_ring: fix uninitialized use of target_req->flags
|
general protection fault in __dev_flush
net
bpf
|
C |
|
|
35 |
64d |
77d
|
27/28 |
42d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KMSAN: uninit-value in cfg80211_inform_bss_frame_data
wireless
|
|
|
|
6 |
64d |
72d
|
27/28 |
42d |
6873cc441607
wifi: cfg80211: correct S1G beacon length calculation
|
KMSAN: uninit-value in tcf_ct_flow_table_get
net
|
C |
|
|
603 |
64d |
71d
|
27/28 |
42d |
2191a54f6322
sched: act_ct: take care of padding in struct zones_ht_key
|
general protection fault in bq_flush_to_queue
bpf
net
|
|
|
|
22 |
64d |
73d
|
27/28 |
42d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KASAN: slab-use-after-free Read in bq_xmit_all
bpf
net
|
C |
done |
|
29 |
64d |
77d
|
27/28 |
42d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
kernel BUG in nilfs_btnode_create_block (2)
nilfs
|
|
|
|
1 |
115d |
111d
|
27/28 |
42d |
4811f7af6090
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
|
general protection fault in __xsk_map_flush
bpf
net
|
C |
done |
|
26 |
64d |
80d
|
27/28 |
42d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __cpu_map_flush
bpf
net
|
C |
inconclusive |
|
25 |
64d |
78d
|
27/28 |
42d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
kernel BUG in ext4_write_inline_data
ext4
|
C |
error |
|
36 |
82d |
567d
|
27/28 |
43d |
5c099c4fdc43
ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
|
kernel BUG in f2fs_vm_page_mkwrite
f2fs
|
C |
error |
done |
12 |
93d |
120d
|
27/28 |
44d |
a8eb3de28e7a
f2fs: fix return value of f2fs_convert_inline_inode()
|
possible deadlock in __mmap_lock_do_trace_released
mm
|
C |
done |
done |
5 |
77d |
94d
|
27/28 |
46d |
7d6be67cfdd4
mm: mmap_lock: replace get_memcg_path_buf() with on-stack buffer
|
WARNING in __hci_cmd_sync_sk
bluetooth
|
syz |
|
|
36 |
72d |
87d
|
27/28 |
48d |
f1a8f402f13f
Bluetooth: L2CAP: Fix deadlock
|
WARNING in __btrfs_free_extent (2)
btrfs
|
C |
done |
|
118 |
52d |
103d
|
27/28 |
49d |
a776bf5f3c23
btrfs: slightly loosen the requirement for qgroup removal
|
divide error in tcp_rcv_space_adjust (3)
net
|
C |
done |
|
3 |
156d |
157d
|
27/28 |
51d |
94062790aedb
UPSTREAM: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
|
KASAN: slab-use-after-free Read in lru_add_fn
nilfs
mm
|
C |
inconclusive |
|
68 |
100d |
148d
|
27/28 |
51d |
49ae997f8f0d
nilfs2: add missing check for inode numbers on directory entries
nilfs2: add missing check for inode numbers on directory entries
|
BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (5)
btrfs
|
C |
|
|
931 |
51d |
82d
|
27/28 |
51d |
375476c41405
bcachefs: Add lockdep support for btree node locks
|
upstream test error: KMSAN: uninit-value in receive_buf
net
virt
|
|
|
|
351 |
77d |
132d
|
27/28 |
51d |
840b2d39a2dc
virtio_ring: fix KMSAN error for premapped mode
|
WARNING in __skb_flow_dissect (6)
net
|
|
|
|
1 |
150d |
150d
|
27/28 |
51d |
b975d3ee5962
net: add and use skb_get_hash_net
|
BUG: corrupted list in __folio_undo_large_rmappable
mm
|
C |
error |
|
36 |
86d |
86d
|
27/28 |
51d |
f708f6970cc9
mm/hugetlb: fix kernel NULL pointer dereference when migrating hugetlb folio
|
KMSAN: uninit-value in zswap_store
mm
|
|
|
|
2 |
59d |
118d
|
27/28 |
51d |
65121eff3e4c
ext4: avoid writing unitialized memory to disk in EA inodes
|
KMSAN: uninit-value in hfs_revalidate_dentry
hfs
|
C |
|
|
11669 |
112d |
679d
|
27/28 |
51d |
26a2ed107929
hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
|
general protection fault in xdp_do_generic_redirect
net
bpf
|
|
|
|
8 |
87d |
91d
|
27/28 |
51d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
possible deadlock in udf_setsize
udf
|
|
|
|
23 |
117d |
140d
|
27/28 |
51d |
8832fc1e5026
udf: Fix lock ordering in udf_evict_inode()
|
WARNING: suspicious RCU usage in bch2_bucket_ref_update
bcachefs
|
C |
done |
|
5 |
88d |
87d
|
27/28 |
51d |
6f692b1672bd
bcachefs: Fix RCU splat
|
inconsistent lock state in valid_state (3)
mm
|
C |
error |
|
376 |
63d |
112d
|
27/28 |
51d |
7d6be67cfdd4
mm: mmap_lock: replace get_memcg_path_buf() with on-stack buffer
|
kernel BUG in f2fs_evict_inode (2)
f2fs
|
C |
error |
|
575 |
51d |
331d
|
27/28 |
51d |
192b8fb8d1c8
f2fs: fix to don't dirty inode for readonly filesystem
|
general protection fault in dev_map_redirect
bpf
net
|
C |
|
|
362 |
87d |
95d
|
27/28 |
51d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in dev_hash_map_redirect
bpf
net
|
C |
done |
|
29 |
87d |
95d
|
27/28 |
51d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
general protection fault in dtInsertEntry
jfs
|
C |
inconclusive |
|
501 |
53d |
178d
|
27/28 |
51d |
ce6dede912f0
jfs: fix null ptr deref in dtInsertEntry
|
BUG: sleeping function called from invalid context in cgroup_rstat_flush
cgroups
|
|
|
|
6 |
86d |
99d
|
27/28 |
51d |
5a4d8944d6b1
cachestat: do not flush stats in recency check
|
WARNING in __fortify_report
ext4
|
C |
|
|
251 |
101d |
134d
|
27/28 |
51d |
be27cd64461c
ext4: use memtostr_pad() for s_volume_name
|
UBSAN: array-index-out-of-bounds in diFree
jfs
|
C |
inconclusive |
|
226 |
53d |
164d
|
27/28 |
51d |
f73f969b2eb3
jfs: Fix array-index-out-of-bounds in diFree
|
WARNING in _ieee80211_change_chanctx
wireless
|
|
|
|
7 |
81d |
158d
|
27/28 |
51d |
23daf1b4c91d
wifi: nl80211: disallow setting special AP channel widths
|
WARNING in __ip6_make_skb (2)
net
|
C |
done |
|
104 |
115d |
130d
|
27/28 |
51d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
general protection fault in xdp_do_redirect
bpf
net
|
|
|
|
15 |
88d |
94d
|
27/28 |
51d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
KMSAN: uninit-value in ext4_inlinedir_to_tree
ext4
|
C |
|
|
267 |
112d |
158d
|
27/28 |
51d |
8dc9c3da79c8
ext4: fix uninitialized variable in ext4_inlinedir_to_tree
|
KASAN: slab-use-after-free Read in l2tp_tunnel_del_work
net
|
C |
done |
|
99 |
87d |
101d
|
27/28 |
51d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
kernel BUG in bch2_bucket_alloc_trans
bcachefs
|
|
|
|
18 |
77d |
106d
|
27/28 |
51d |
44ec5990357b
bcachefs: Don't use the new_fs() bucket alloc path on an initialized fs
|
BUG: unable to handle kernel paging request in do_split
ext4
|
C |
inconclusive |
|
17 |
84d |
97d
|
27/28 |
51d |
50ea741def58
ext4: check dot and dotdot of dx_root before making dir indexed
f9ca51596bbf
ext4: make sure the first directory block is not a hole
|
WARNING in __cfg80211_connect_result (2)
wireless
|
C |
error |
|
232 |
64d |
130d
|
27/28 |
51d |
b5d14b0c6716
wifi: virt_wifi: avoid reporting connection success with wrong SSID
|
KASAN: slab-use-after-free Read in sanity_check_extent_cache
f2fs
|
C |
done |
|
5 |
115d |
158d
|
27/28 |
51d |
d7409b05a64f
f2fs: fix to cover read extent cache access with lock
|
possible deadlock in try_to_wake_up (5)
mm
|
C |
|
|
88 |
54d |
127d
|
27/28 |
51d |
7d6be67cfdd4
mm: mmap_lock: replace get_memcg_path_buf() with on-stack buffer
|
BUG: sleeping function called from invalid context in bch2_printbuf_make_room
bcachefs
|
C |
done |
|
27 |
76d |
74d
|
27/28 |
51d |
737759fc098f
bcachefs: Fix printbuf usage while atomic
|
UBSAN: shift-out-of-bounds in dbDiscardAG
jfs
|
C |
unreliable |
|
5 |
90d |
105d
|
27/28 |
51d |
7063b80268e2
jfs: Fix shift-out-of-bounds in dbDiscardAG
|
kernel BUG in __block_write_begin_int (2)
nilfs
|
C |
inconclusive |
|
2 |
89d |
153d
|
27/28 |
51d |
a9e1ddc09ca5
nilfs2: fix kernel bug on rename operation of broken directory
|
possible deadlock in hfsplus_file_truncate
hfs
|
C |
error |
|
51400 |
52d |
678d
|
27/28 |
51d |
be4edd1642ee
hfsplus: fix to avoid false alarm of circular locking
|
UBSAN: shift-out-of-bounds in bch2_bkey_format_invalid (2)
bcachefs
|
C |
|
|
117 |
52d |
116d
|
27/28 |
51d |
a0bd30e4ea9d
bcachefs: Fix shift greater than integer size
|
KMSAN: uninit-value in ppp_async_push (3)
ppp
|
C |
|
|
4 |
135d |
92d
|
27/28 |
51d |
f2aeb7306a89
ppp: reject claimed-as-LCP but actually malformed packets
|
KCSAN: data-race in __swap_writepage / scan_swap_map_slots (2)
mm
|
|
|
|
2 |
88d |
88d
|
27/28 |
51d |
7b7aca6d7c0f
mm: ignore data-race in __swap_writepage
|
memory leak in _r8712_init_xmit_priv (2)
staging
usb
|
C |
|
|
2 |
304d |
319d
|
27/28 |
51d |
9ed3e0a0e1b1
staging: rtl8712: remove unnecessary alignment of pxmitpriv->pxmitbuf
|
KMSAN: uninit-value in hfsplus_listxattr (2)
hfs
|
C |
|
|
6 |
154d |
178d
|
27/28 |
51d |
0570730c1630
hfsplus: fix uninit-value in copy_name
|
stack segment fault in bpf_xdp_redirect
bpf
net
|
C |
|
|
181 |
87d |
95d
|
27/28 |
51d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
general protection fault in __block_commit_write
ext4
|
C |
inconclusive |
|
7 |
95d |
242d
|
27/28 |
51d |
83f4414b8f84
ext4: sanity check for NULL pointer after ext4_force_shutdown
|
general protection fault in tomoyo_socket_bind_permission
io-uring
|
C |
|
|
4 |
83d |
83d
|
27/28 |
51d |
ad00e629145b
io_uring/net: check socket is valid in io_bind()/io_listen()
|
KMSAN: uninit-value in copy_name
hfs
|
C |
|
|
300 |
112d |
139d
|
27/28 |
51d |
0570730c1630
hfsplus: fix uninit-value in copy_name
|
kernel BUG in btrfs_free_tree_block
btrfs
|
C |
error |
|
150 |
52d |
739d
|
27/28 |
51d |
bb3868033a4c
btrfs: do not BUG_ON() when freeing tree block after error
|
KASAN: slab-use-after-free Read in add_ra_bio_pages (3)
btrfs
|
|
|
|
1 |
103d |
92d
|
27/28 |
51d |
8e7860543a94
btrfs: fix extent map use-after-free when adding pages to compressed bio
|
WARNING in __kvm_gpc_refresh (2)
kvm
|
C |
error |
|
2 |
115d |
129d
|
27/28 |
51d |
ebbdf37ce9ab
KVM: Validate hva in kvm_gpc_activate_hva() to fix __kvm_gpc_refresh() WARN
|
possible deadlock in exfat_evict_inode
exfat
|
|
|
|
2 |
102d |
139d
|
27/28 |
51d |
89fc548767a2
exfat: fix potential deadlock on __exfat_get_dentry_set
|
stack segment fault in cpu_map_redirect
net
bpf
|
C |
done |
|
11 |
88d |
87d
|
27/28 |
51d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
KASAN: slab-use-after-free Write in l2tp_session_delete
net
|
C |
done |
|
1286 |
81d |
101d
|
27/28 |
51d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
KMSAN: uninit-value in vsock_assign_transport (2)
net
virt
|
C |
|
|
14 |
113d |
168d
|
27/28 |
51d |
1e1fdcbdde3b
vhost/vsock: always initialize seqpacket_allow
|
WARNING in __ip_make_skb
net
|
C |
done |
|
54 |
116d |
130d
|
27/28 |
51d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
WARNING in btusb_submit_intr_urb/usb_submit_urb
usb
bluetooth
|
C |
error |
|
2 |
90d |
100d
|
27/28 |
51d |
a368ecde8a50
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
|
possible deadlock in attr_data_get_block
ntfs3
|
C |
error |
|
3111 |
51d |
718d
|
27/28 |
51d |
d57431c6f511
fs/ntfs3: Do copy_to_user out of run_lock
|
possible deadlock in btrfs_commit_inode_delayed_inode
btrfs
|
|
|
|
8 |
105d |
120d
|
27/28 |
51d |
68a3ebd18bc8
btrfs: use delayed iput during extent map shrinking
|
general protection fault in __io_remove_buffers
io-uring
|
C |
done |
|
3 |
80d |
78d
|
27/28 |
51d |
bcc87d978b83
io_uring: fix error pbuf checking
|
UBSAN: shift-out-of-bounds in parse_audio_unit
sound
|
C |
error |
|
3 |
83d |
82d
|
27/28 |
51d |
2f38cf730cae
ALSA: usb: Fix UBSAN warning in parse_audio_unit()
|
KMSAN: uninit-value in udf_update_tag
udf
|
C |
|
|
877 |
115d |
281d
|
27/28 |
51d |
27ab33854873
udf: Fix bogus checksum computation in udf_rename()
|
general protection fault in dequeue_hugetlb_folio_nodemask (2)
mm
|
C |
done |
|
14 |
109d |
115d
|
27/28 |
51d |
09a533622842
mm/hugetlb: guard dequeue_hugetlb_folio_nodemask against NUMA_NO_NODE uses
|
WARNING: lock held when returning to user space in ns_ioctl
fs
|
C |
done |
|
147 |
67d |
78d
|
27/28 |
51d |
280e36f0d5b9
nsfs: use cleanup guard
|
general protection fault in coalesce_fill_reply
net
|
C |
done |
|
27 |
95d |
100d
|
27/28 |
51d |
74d6529b78f7
net: ethtool: Fix the panic caused by dev being null when dumping coalesce
|
kernel BUG in submit_bh_wbc (2)
udf
|
C |
done |
|
123 |
57d |
162d
|
27/28 |
51d |
a90d4471146d
udf: Avoid using corrupted block bitmap buffer
|
WARNING in io_cqring_event_overflow (2)
io-uring
|
|
|
|
16 |
95d |
95d
|
27/28 |
51d |
3b7c16be30e3
io_uring/msg_ring: fix overflow posting
|
WARNING in bpf_lwt_seg6_adjust_srh
bpf
net
|
C |
done |
|
30 |
87d |
101d
|
27/28 |
51d |
c13fda93aca1
bpf: Remove tst_run from lwt_seg6local_prog_ops.
|
kernel BUG in f2fs_write_inline_data
f2fs
|
C |
inconclusive |
|
41 |
104d |
157d
|
27/28 |
51d |
a8eb3de28e7a
f2fs: fix return value of f2fs_convert_inline_inode()
fc01008c92f4
f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC
|
BUG: sleeping function called from invalid context in vma_alloc_folio_noprof
mm
|
C |
done |
|
1 |
81d |
80d
|
27/28 |
51d |
280e36f0d5b9
nsfs: use cleanup guard
|
UBSAN: shift-out-of-bounds in try_to_shrink_lruvec
mm
|
C |
done |
|
4 |
127d |
129d
|
27/28 |
51d |
462966dc7d70
mm: vmscan: reset sc->priority on retry
|
BUG: unable to handle kernel NULL pointer dereference in path_from_stashed
fs
|
C |
|
|
23 |
72d |
76d
|
27/28 |
51d |
f60d38cb02d0
pidfs: when time ns disabled add check for ioctl
|
INFO: rcu detected stall in security_file_ioctl (8)
tomoyo
|
C |
error |
done |
8 |
94d |
134d
|
26/28 |
59d |
e63413418088
net/sched: taprio: make q->picos_per_byte available to fill_sched_entry()
|
KASAN: slab-use-after-free Read in nf_tables_trans_destroy_work
netfilter
|
C |
error |
|
147 |
87d |
95d
|
26/28 |
59d |
9f6958ba2e90
netfilter: nf_tables: unconditionally flush pending work before notifier
|
KASAN: slab-out-of-bounds Read in btrfs_qgroup_inherit
btrfs
|
C |
done |
|
2 |
121d |
118d
|
26/28 |
59d |
724d8042cef8
btrfs: always do the basic checks for btrfs_qgroup_inherit structure
|
general protection fault in l2cap_sock_recv_cb
bluetooth
|
C |
inconclusive |
|
8 |
93d |
119d
|
26/28 |
59d |
89e856e124f9
bluetooth/l2cap: sync sock recv cb and release
|
WARNING in filemap_unaccount_folio
nilfs
|
C |
inconclusive |
|
13 |
100d |
135d
|
26/28 |
59d |
49ae997f8f0d
nilfs2: add missing check for inode numbers on directory entries
|
BUG: soft lockup in mld_ifc_work (2)
wireless
|
C |
|
|
2 |
146d |
158d
|
26/28 |
59d |
d1cba2ea8121
wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
|
possible deadlock in __flush_workqueue
bluetooth
|
|
|
|
1456 |
62d |
261d
|
26/28 |
59d |
0d151a103775
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
|
WARNING in hci_conn_del
bluetooth
|
C |
done |
|
10497 |
88d |
219d
|
26/28 |
59d |
015d79c96d62
Bluetooth: Ignore too large handle values in BIG
1cc18c2ab2e8
bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX
|
WARNING in ieee80211_rx_list (2)
wireless
|
|
|
|
4 |
98d |
100d
|
26/28 |
59d |
321028bc45f0
wifi: mac80211: disable softirqs for queued frame handling
|
WARNING in __mptcp_clean_una
mptcp
|
C |
done |
done |
248 |
106d |
231d
|
26/28 |
63d |
fb7a0d334894
mptcp: ensure snd_nxt is properly initialized on connect
|
WARNING in implement
input
usb
|
C |
error |
done |
960 |
115d |
1845d
|
26/28 |
64d |
4aa2dcfbad53
HID: core: remove unnecessary WARN_ON() in implement()
|
INFO: rcu detected stall in __run_timer_base
usb
|
C |
done |
done |
10 |
105d |
173d
|
26/28 |
64d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
INFO: trying to register non-static key in btrfs_stop_all_workers
btrfs
|
|
|
|
1 |
122d |
118d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
kernel BUG in btrfs_free_fs_info
btrfs
|
|
|
|
2 |
125d |
128d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
KMSAN: uninit-value in btrfs_compress_heuristic
btrfs
|
|
|
|
4 |
128d |
128d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
general protection fault in btrfs_stop_all_workers (2)
btrfs
|
|
|
|
307 |
99d |
143d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
KMSAN: uninit-value in ZSTD_compressBlock_doubleFast
btrfs
|
|
|
|
2 |
123d |
119d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
BUG: spinlock bad magic in btrfs_stop_all_workers
btrfs
|
|
|
|
5 |
108d |
108d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
general protection fault in btrfs_simple_end_io
btrfs
|
|
|
|
18 |
107d |
132d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
KMSAN: uninit-value in deflate_fast
btrfs
|
|
|
|
3 |
115d |
119d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
general protection fault in put_pwq_unlocked
btrfs
|
|
|
|
7 |
122d |
136d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
general protection fault in apply_wqattrs_cleanup
btrfs
|
|
|
|
10 |
101d |
123d
|
26/28 |
65d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
KMSAN: uninit-value in io_req_cqe_overflow (3)
io-uring
|
C |
|
|
16 |
112d |
113d
|
26/28 |
70d |
18414a4a2eab
io_uring/net: assign kmsg inq/flags before buffer selection
|
WARNING in unmap_page_range (3)
mm
|
C |
|
|
169 |
189d |
199d
|
26/28 |
76d |
f8572367eaff
mm/memory: fix missing pte marker for !page on pte zaps
|
kernel BUG in bch2_ioctl_fsck_online
bcachefs
|
C |
done |
|
3 |
108d |
104d
|
26/28 |
83d |
9bd01500e4d8
bcachefs: Fix freeing of error pointers
|
WARNING in __virt_to_phys (4)
bcachefs
|
C |
|
|
2 |
96d |
92d
|
26/28 |
83d |
9bd01500e4d8
bcachefs: Fix freeing of error pointers
|
UBSAN: shift-out-of-bounds in bch2_btree_node_read_done
bcachefs
|
C |
|
|
3 |
110d |
134d
|
26/28 |
84d |
9e7cfb35e266
bcachefs: Check for invalid btree IDs
|
INFO: rcu detected stall in sys_wait4 (4)
mm
|
C |
done |
done |
2 |
143d |
176d
|
26/28 |
84d |
fb66df20a720
net/sched: taprio: extend minimum interval restriction to entire cycle too
|
general protection fault in find_match (5)
net
|
|
|
|
2 |
116d |
117d
|
26/28 |
86d |
b86762dbe19a
ipv6: prevent possible NULL dereference in rt6_probe()
|
possible deadlock in br_forward_delay_timer_expired (2)
net
|
|
|
|
1 |
107d |
107d
|
26/28 |
86d |
62e58ddb1465
net: add softirq safety to netdev_rename_lock
|
UBSAN: array-index-out-of-bounds in bch2_bkey_swab_key
bcachefs
|
|
|
|
2 |
119d |
118d
|
26/28 |
86d |
d47df4f616d5
bcachefs: Fix array-index-out-of-bounds
|
general protection fault in xfrm6_get_saddr (2)
net
|
|
|
|
1 |
117d |
117d
|
26/28 |
86d |
d46401052c2d
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
|
INFO: task hung in journal_quiesce
bcachefs
|
syz |
|
|
76 |
98d |
126d
|
26/28 |
86d |
89d21b69b4f8
bcachefs: Add missing bch2_journal_do_writes() call
|
WARNING in kcov_remote_start (4)
usb
|
|
|
|
107983 |
86d |
117d
|
26/28 |
86d |
f85d39dd7ed8
kcov, usb: disable interrupts in kcov_remote_start_usb_softirq
|
net-next test error: WARNING: suspicious RCU usage in _destroy_all_sets
netfilter
|
|
|
|
128 |
106d |
112d
|
26/28 |
87d |
8ecd06277a76
netfilter: ipset: Fix suspicious rcu_dereference_protected()
|
INFO: task hung in nilfs_segctor_thread (2)
nilfs
|
C |
inconclusive |
|
98 |
118d |
228d
|
26/28 |
87d |
7373a51e7998
nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors
|
INFO: task hung in devinet_ioctl (5)
net
|
|
|
|
59 |
87d |
113d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in addrconf_dad_work (4)
net
|
|
|
|
2632 |
87d |
137d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
general protection fault in fib6_nh_init (2)
net
|
|
|
|
2 |
108d |
112d
|
26/28 |
87d |
2eab4543a220
ipv6: prevent possible NULL deref in fib6_nh_init()
|
WARNING: suspicious RCU usage in br_mst_set_state (2)
bridge
|
|
|
|
10 |
106d |
118d
|
26/28 |
87d |
546ceb1dfdac
net: bridge: mst: fix suspicious rcu usage in br_mst_set_state
36c92936e868
net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state
|
WARNING in btrfs_put_transaction (2)
btrfs
|
|
|
|
3 |
127d |
123d
|
26/28 |
87d |
fb33eb2ef0d8
btrfs: fix leak of qgroup extent records after transaction abort
|
INFO: task hung in ieee80211_unregister_hw
wireless
|
|
|
|
151 |
91d |
127d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
UBSAN: array-index-out-of-bounds in lock_timer_base
bcachefs
kvm
|
|
|
|
4 |
109d |
123d
|
26/28 |
87d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
WARNING in bch2_fs_read_write_early
bcachefs
|
C |
|
|
35 |
104d |
112d
|
26/28 |
87d |
1ba44217f825
bcachefs: delete_dead_snapshots() doesn't need to go RW
|
INFO: task hung in linkwatch_event (3)
net
|
|
|
|
1634 |
87d |
682d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
upstream test error: WARNING: suspicious RCU usage in _destroy_all_sets
netfilter
|
|
|
|
293 |
106d |
112d
|
26/28 |
87d |
8ecd06277a76
netfilter: ipset: Fix suspicious rcu_dereference_protected()
|
INFO: task hung in wg_netns_pre_exit (4)
wireguard
|
|
|
|
127 |
88d |
127d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
WARNING in hid_output_report
input
usb
|
C |
error |
|
3 |
132d |
151d
|
26/28 |
87d |
4aa2dcfbad53
HID: core: remove unnecessary WARN_ON() in implement()
fba383985354
net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings
|
INFO: task hung in register_nexthop_notifier (3)
net
|
|
|
|
44 |
90d |
200d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in rfkill_global_led_trigger_worker (2)
net
nfc
|
C |
error |
|
1362 |
87d |
689d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
UBSAN: shift-out-of-bounds in read_one_super (2)
bcachefs
|
|
|
|
4 |
113d |
109d
|
26/28 |
87d |
d406545613b5
bcachefs: Fix shift overflow in read_one_super()
|
KASAN: slab-out-of-bounds Read in ea_get (2)
jfs
|
C |
|
|
33 |
89d |
154d
|
26/28 |
87d |
7c55b78818cf
jfs: xattr: fix buffer overflow for invalid xattr
|
INFO: task hung in wdm_release
usb
|
C |
error |
|
1 |
110d |
106d
|
26/28 |
87d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
WARNING in rdev_scan
wireless
|
C |
done |
|
3 |
110d |
115d
|
26/28 |
87d |
0941772342d5
wifi: cfg80211: wext: set ssids=NULL for passive scans
|
INFO: task hung in cfg80211_dfs_channels_update_work (7)
wireless
|
|
|
|
37 |
102d |
106d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
memory leak in nr_create (3)
hams
|
C |
|
|
9 |
289d |
479d
|
26/28 |
87d |
0b9130247f3b
netrom: Fix a memory leak in nr_heartbeat_expiry()
|
INFO: rcu detected stall in raw_ioctl
usb
|
C |
|
|
49 |
93d |
339d
|
26/28 |
87d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
BUG: soft lockup in tcp_write_timer (4)
kasan
mm
|
|
|
|
4 |
90d |
115d
|
26/28 |
87d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
KASAN: slab-use-after-free Read in bch2_sb_errors_from_cpu
bcachefs
|
C |
|
|
2 |
104d |
101d
|
26/28 |
87d |
211c581de28e
bcachefs: slab-use-after-free Read in bch2_sb_errors_from_cpu
|
KMSAN: uninit-value in asus_report_fixup
input
usb
|
C |
done |
|
35 |
108d |
133d
|
26/28 |
87d |
89e1ee118d6f
hid: asus: asus_report_fixup: fix potential read out of bounds
|
general protection fault in detach_extent_buffer_folio
btrfs
|
|
|
|
9 |
104d |
121d
|
26/28 |
87d |
f3a5367c679d
btrfs: protect folio::private when attaching extent buffer folios
|
INFO: task hung in cangw_pernet_exit_batch (3)
can
|
|
|
|
33 |
87d |
103d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
UBSAN: shift-out-of-bounds in bch2_blacklist_entries_gc
bcachefs
|
C |
|
|
45 |
101d |
101d
|
26/28 |
87d |
472237b69d07
bcachefs: Fix shift-out-of-bounds in bch2_blacklist_entries_gc
|
INFO: task hung in rtnetlink_rcv_msg
net
|
C |
inconclusive |
inconclusive |
1970 |
87d |
2051d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
kernel BUG in bch2_journal_res_get
bcachefs
|
C |
|
|
2 |
117d |
113d
|
26/28 |
87d |
dbf4d79b7fc7
bcachefs: Fix early init error path in journal code
|
INFO: task hung in addrconf_verify_work (8)
net
|
C |
error |
|
1294 |
87d |
291d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
kernel BUG in bch2_lru_change
bcachefs
|
C |
done |
|
4 |
104d |
120d
|
26/28 |
87d |
cff07e2739d8
bcachefs: Guard against overflowing LRU_TIME_BITS
|
INFO: task hung in mpls_net_exit (2)
net
|
|
|
|
50 |
92d |
113d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in switchdev_deferred_process_work (2)
net
|
C |
inconclusive |
|
1226 |
87d |
1530d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
possible deadlock in ovl_copy_up_flags
overlayfs
|
C |
done |
|
7 |
113d |
134d
|
26/28 |
87d |
db03d39053a9
ovl: fix copy-up in tmpfile
|
possible deadlock in console_flush_all (2)
trace
bpf
|
C |
error |
|
52996 |
87d |
362d
|
26/28 |
87d |
ae01e52da244
serial: drop debugging WARN_ON_ONCE() from uart_write()
|
kernel BUG in __vma_reservation_common
mm
|
C |
error |
|
8 |
118d |
151d
|
26/28 |
87d |
8daf9c702ee7
mm/hugetlb: do not call vma_add_reservation upon ENOMEM
|
WARNING: locking bug in srcu_gp_start_if_needed
kvm
bcachefs
|
|
|
|
2 |
114d |
115d
|
26/28 |
87d |
f770a6e9a3d7
bcachefs: Fix initialization order for srcu barrier
|
INFO: task hung in crda_timeout_work (7)
wireless
|
|
|
|
1084 |
89d |
133d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
KMSAN: kernel-infoleak in raw_recvmsg
can
|
C |
|
|
121 |
113d |
161d
|
26/28 |
87d |
b7cdf1dd5d2a
net: can: j1939: Initialize unused data in j1939_send_one()
|
BUG: soft lockup in inet6_rtm_newroute
net
|
|
|
|
1 |
103d |
103d
|
26/28 |
87d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
possible deadlock in btrfs_log_inode
btrfs
|
|
|
|
1 |
117d |
113d
|
26/28 |
87d |
d1825752e307
btrfs: use NOFS context when getting inodes during logging and log replay
|
INFO: task hung in reg_check_chans_work (6)
wireless
|
C |
error |
|
129 |
90d |
163d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in wg_destruct
wireguard
|
|
|
|
207 |
90d |
128d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
WARNING: kmalloc bug in __snapshot_t_mut
bcachefs
|
C |
done |
|
10 |
97d |
128d
|
26/28 |
87d |
64cd7de998f3
bcachefs: Fix kmalloc bug in __snapshot_t_mut
|
WARNING in skb_ensure_writable
bpf
net
|
C |
done |
|
2893 |
87d |
165d
|
26/28 |
87d |
2bbe3e5a2f4e
bpf: Avoid splat in pskb_pull_reason
|
BUG: soft lockup in hci_cmd_timeout
bluetooth
usb
|
C |
|
|
1 |
118d |
114d
|
26/28 |
87d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
KASAN: slab-use-after-free Read in bch2_fs_recovery
bcachefs
|
|
|
|
21 |
105d |
105d
|
26/28 |
87d |
2fe79ce7d1e8
bcachefs: Fix a UAF after write_super()
|
WARNING in cxacru_cm/usb_submit_urb
usb
|
C |
error |
inconclusive |
14 |
105d |
1674d
|
26/28 |
87d |
2eabb655a968
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
|
WARNING: locking bug in __timer_delete_sync
kvm
bcachefs
|
|
|
|
6 |
101d |
125d
|
26/28 |
87d |
b79922009214
bcachefs: Add missing synchronize_srcu_expedited() call when shutting down
|
INFO: task hung in bpf_prog_dev_bound_destroy
bpf
|
|
|
|
94 |
106d |
118d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
kernel BUG in gc_bucket
bcachefs
|
C |
done |
|
221 |
120d |
125d
|
26/28 |
87d |
9432e90df1b8
bcachefs: Check for invalid bucket from bucket_gen(), gc_bucket()
|
INFO: task hung in regdb_fw_cb
wireless
|
|
|
|
596 |
91d |
132d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
KASAN: slab-out-of-bounds Read in cfg80211_wext_freq
wireless
|
C |
inconclusive |
|
133 |
102d |
128d
|
26/28 |
87d |
6ef09cdc5ba0
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
|
possible deadlock in xfs_can_free_eofblocks
xfs
|
|
|
|
4 |
122d |
147d
|
26/28 |
93d |
6fe60465e1d5
stackdepot: respect __GFP_NOLOCKDEP allocation flag
|
possible deadlock in __sock_map_delete
bpf
net
|
C |
|
|
14 |
129d |
173d
|
26/28 |
95d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
WARNING in geneve_xmit
net
|
C |
done |
|
42 |
161d |
168d
|
26/28 |
106d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
general protection fault in bch2_fs_btree_key_cache_exit
bcachefs
|
|
|
|
6 |
113d |
113d
|
26/28 |
106d |
b30b70ad8bff
bcachefs: Fix early error path in bch2_fs_btree_key_cache_exit()
|
possible deadlock in __hrtimer_run_queues (2)
kernel
|
C |
error |
done |
16 |
162d |
194d
|
26/28 |
106d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
general protection fault in ip6_pol_route
net
|
|
|
|
73 |
108d |
146d
|
26/28 |
108d |
b01e1c030770
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
general protection fault in __fib6_drop_pcpu_from (5)
net
|
|
|
|
467 |
108d |
153d
|
26/28 |
108d |
b01e1c030770
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
WARNING in ieee80211_link_info_change_notify (2)
wireless
|
C |
inconclusive |
|
8918 |
116d |
584d
|
26/28 |
108d |
02c665f048a4
wifi: mac80211: apply mcast rate only if interface is up
|
general protection fault in bpf_get_attach_cookie_tracing
bpf
trace
|
C |
error |
|
7 |
121d |
152d
|
26/28 |
108d |
d0d1df8ba18a
bpf: Set run context for rawtp test_run callback
|
KASAN: slab-use-after-free Read in bpf_link_free (2)
bpf
|
syz |
|
|
52 |
118d |
130d
|
26/28 |
108d |
2884dc7d08d9
bpf: Fix a potential use-after-free in bpf_link_free()
|
WARNING in ieee80211_rx_list
wireless
|
C |
inconclusive |
error |
3489 |
119d |
1471d
|
26/28 |
108d |
177c6ae9725d
wifi: mac80211: handle tasklet frames before stopping
|
WARNING in fuse_request_end
fuse
|
C |
error |
|
3 |
135d |
146d
|
26/28 |
111d |
246014876d78
fuse: clear FR_SENT when re-adding requests into pending list
|
WARNING in packet_setsockopt
net
|
C |
|
|
83 |
144d |
183d
|
26/28 |
113d |
86d43e2bf93c
af_packet: avoid a false positive warning in packet_setsockopt()
|
kernel BUG in dev_gro_receive
net
|
C |
done |
|
72 |
126d |
142d
|
25/28 |
115d |
be008726d0ac
net: gro: initialize network_offset in network layer
|
KMSAN: uninit-value in virtqueue_add (4)
mm
|
C |
|
|
203184 |
115d |
277d
|
25/28 |
115d |
61b258b0d2f6
x86: call instrumentation hooks from copy_mc.c
|
KMSAN: uninit-value in nilfs_add_checksums_on_logs (2)
nilfs
|
C |
|
|
171 |
115d |
276d
|
25/28 |
115d |
61b258b0d2f6
x86: call instrumentation hooks from copy_mc.c
|
KMSAN: uninit-value in nci_ntf_packet (2)
nfc
net
|
C |
|
|
13 |
117d |
130d
|
25/28 |
115d |
068648aab72c
nfc/nci: Add the inconsistency check between the input data length and count
|
UBSAN: shift-out-of-bounds in bch2_sb_dev_has_data
bcachefs
|
C |
done |
|
15 |
145d |
143d
|
25/28 |
115d |
bcfbaea8e547
bcachefs: Fix shift overflows in replicas.c
|
inconsistent lock state in valid_state (2)
sound
|
C |
inconclusive |
|
57405 |
116d |
240d
|
25/28 |
115d |
b79491896151
dma-buf/sw-sync: don't enable IRQ from sync_print_obj()
|
kernel panic: not locked: inodes NUM:ADDR:NUM cached
bcachefs
|
C |
|
|
2 |
142d |
138d
|
25/28 |
115d |
6ce26ad376bd
bcachefs: Fix missing parens in drop_locks_do()
|
kernel BUG in bch2_btree_iter_verify_entry_exit
bcachefs
|
C |
done |
|
3 |
135d |
141d
|
25/28 |
115d |
765b8cb8acab
bcachefs: Check for subvolues with bogus snapshot/inode fields
|
kernel BUG in bch2_checksum
bcachefs
|
C |
done |
|
9 |
133d |
143d
|
25/28 |
115d |
6b74fdcc8e25
bcachefs: bch2_checksum() returns 0 for unknown checksum type
|
WARNING in sock_map_close
bpf
net
|
C |
error |
|
182 |
115d |
178d
|
25/28 |
115d |
4b4647add7d3
sock_map: avoid race between sock_map_close and sk_psock_put
|
possible deadlock in sock_hash_delete_elem (2)
bpf
net
|
C |
|
|
1127 |
116d |
199d
|
25/28 |
115d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
general protection fault in poll_state_synchronize_srcu
bcachefs
|
|
|
|
5 |
135d |
135d
|
25/28 |
115d |
d293ece10810
bcachefs: Fix shutdown ordering
|
KASAN: slab-use-after-free Read in p9_fid_destroy
v9fs
|
C |
|
|
13 |
130d |
211d
|
25/28 |
115d |
f89ea63f1c65
netfs, 9p: Fix race between umount and async request completion
|
kernel BUG in cpu_replicas_add_entry
bcachefs
|
C |
done |
|
11 |
126d |
145d
|
25/28 |
115d |
5fa421448d1f
bcachefs: Fix bogus verify_replicas_entry() assert
|
kernel BUG in __journal_res_get
bcachefs
|
C |
done |
|
7 |
124d |
148d
|
25/28 |
115d |
cd3b31f9d417
bcachefs: Ensure we're RW before journalling
|
general protection fault in nf_tproxy_laddr4
netfilter
|
C |
error |
|
5 |
135d |
144d
|
25/28 |
115d |
21a673bddc8f
netfilter: tproxy: bail out if IP has been disabled on the device
|
KASAN: slab-use-after-free Read in p9_client_destroy
v9fs
|
|
|
|
7 |
134d |
147d
|
25/28 |
115d |
f89ea63f1c65
netfs, 9p: Fix race between umount and async request completion
|
KASAN: stack-out-of-bounds Read in __bch2_encrypt_bio
bcachefs
|
C |
done |
|
2 |
146d |
143d
|
25/28 |
115d |
2ba24864d2f6
bcachefs: Fix stack oob in __bch2_encrypt_bio()
|
KASAN: slab-use-after-free Write in v9fs_free_request
v9fs
|
|
|
|
9 |
130d |
145d
|
25/28 |
115d |
f89ea63f1c65
netfs, 9p: Fix race between umount and async request completion
|
INFO: rcu detected stall in packet_release
net
|
C |
unreliable |
|
1 |
208d |
130d
|
25/28 |
115d |
fb66df20a720
net/sched: taprio: extend minimum interval restriction to entire cycle too
|
WARNING in collect_domain_accesses
lsm
|
C |
done |
|
3 |
135d |
147d
|
25/28 |
115d |
88da52ccd66e
landlock: Fix d_parent walk
|
WARNING: suspicious RCU usage in nfqnl_reinject
netfilter
|
|
|
|
2 |
126d |
143d
|
25/28 |
115d |
dc21c6cc3d69
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
|
UBSAN: shift-out-of-bounds in bch2_btree_lost_data
bcachefs
|
C |
done |
|
3 |
141d |
140d
|
25/28 |
115d |
f108ddd467b5
bcachefs: Fix shift overflow in btree_lost_data()
|
KMSAN: uninit-value in p9_client_rpc (2)
v9fs
|
C |
|
|
5 |
154d |
188d
|
25/28 |
115d |
25460d6f3902
net/9p: fix uninit-value in p9_client_rpc()
|
WARNING: lock held when returning to user space in srcu_lock_acquire
rcu
|
C |
|
|
3 |
145d |
144d
|
25/28 |
115d |
70dd062e27e6
bcachefs: Fix btree_trans leak in bch2_readahead()
|
kernel BUG in bch2_fs_release
bcachefs
|
|
|
|
3 |
127d |
132d
|
25/28 |
115d |
d509cadc3a48
bcachefs: Fix debug assert
|
kernel panic: bch_dev->ref underflow, last put: bch2_trigger_alloc
bcachefs
|
C |
done |
|
6 |
133d |
144d
|
25/28 |
115d |
9667214b30ef
bcachefs: Fix ref in trans_mark_dev_sbs() error path
|
KMSAN: uninit-value in io_issue_sqe
io-uring
|
|
|
|
2 |
116d |
130d
|
25/28 |
115d |
18414a4a2eab
io_uring/net: assign kmsg inq/flags before buffer selection
|
general protection fault in __bch2_insert_snapshot_whiteouts
bcachefs
|
C |
done |
|
65 |
130d |
143d
|
25/28 |
115d |
6d48e61364ae
bcachefs: Add missing guard in bch2_snapshot_has_children()
|
KASAN: slab-use-after-free Read in evict_inodes
bcachefs
|
C |
done |
|
2 |
148d |
144d
|
25/28 |
115d |
d93ff5fa40b9
bcachefs: Fix race path in bch2_inode_insert()
|
INFO: task hung in nilfs_detach_log_writer
nilfs
|
C |
inconclusive |
|
125 |
134d |
711d
|
25/28 |
115d |
eb85dace897c
nilfs2: fix potential hang in nilfs_detach_log_writer()
|
general protection fault in crypto_skcipher_encrypt
crypto
bcachefs
|
C |
error |
|
66 |
115d |
143d
|
25/28 |
115d |
c06a8b75679d
bcachefs: Fix bch2_alloc_ciphers()
|
INFO: rcu detected stall in snd_timer_user_release (3)
sound
|
C |
inconclusive |
|
3 |
149d |
158d
|
25/28 |
115d |
4a63bd179fa8
ALSA: timer: Set lower bound of start tick time
|
KMSAN: uninit-value in bch2_dirent_invalid
bcachefs
|
C |
|
|
239 |
115d |
143d
|
25/28 |
115d |
2195b755ebd2
bcachefs: Fix unsafety in bch2_dirent_name_bytes()
|
kernel BUG in bch2_fs_recovery
bcachefs
|
C |
done |
done |
161 |
148d |
154d
|
25/28 |
116d |
7ffec9ccdc6a
bcachefs: don't free error pointers
|
INFO: trying to register non-static key in __timer_delete_sync (2)
net
|
C |
|
|
45524 |
143d |
161d
|
25/28 |
119d |
3c668cef61ad
net: hsr: init prune_proxy_timer sooner
|
possible deadlock in nr_rt_ioctl
hams
|
C |
inconclusive |
|
8 |
125d |
152d
|
25/28 |
119d |
e03e7f20ebf7
netrom: fix possible dead-lock in nr_rt_ioctl()
|
WARNING in __inet_accept
net
|
C |
done |
|
3 |
137d |
137d
|
25/28 |
121d |
26afda78cda3
UPSTREAM: net: relax socket state check at accept time.
|
KASAN: slab-out-of-bounds Read in f2fs_get_node_info
f2fs
|
C |
error |
|
4 |
149d |
162d
|
25/28 |
121d |
20faaf30e555
f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()
|
BUG: soft lockup in batadv_purge_orig
batman
|
|
|
|
1 |
189d |
189d
|
25/28 |
121d |
40dc8ab60589
batman-adv: bypass empty buckets in batadv_purge_orig_ref()
|
general protection fault in subflow_v6_route_req
mptcp
|
C |
done |
|
2 |
151d |
151d
|
25/28 |
121d |
445c0b69c729
mptcp: fix possible NULL dereferences
|
general protection fault in ip6_output
net
|
|
|
|
4 |
154d |
173d
|
25/28 |
121d |
4db783d68b9b
ipv6: prevent NULL dereference in ip6_output()
|
WARNING in sg_remove_sfp_usercontext
scsi
|
C |
|
|
36031 |
176d |
190d
|
25/28 |
121d |
d4e655c49f47
scsi: sg: Avoid race in error handling & drop bogus warn
|
KMSAN: uninit-value in __bpf_strtoull
bpf
|
C |
|
|
119 |
122d |
199d
|
25/28 |
121d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
WARNING in iomap_iter (2)
iomap
|
C |
|
|
4 |
159d |
155d
|
25/28 |
121d |
0c12028aec83
block: refine the EOF check in blkdev_iomap_begin
|
inconsistent lock state in padata_do_parallel (2)
crypto
|
|
|
|
2 |
186d |
186d
|
25/28 |
121d |
58329c431203
padata: Disable BH when taking works lock on MT path
|
KMSAN: uninit-value in trie_delete_elem
bpf
|
C |
|
|
52 |
122d |
192d
|
25/28 |
121d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
UBSAN: shift-out-of-bounds in read_one_super
bcachefs
|
C |
done |
|
31 |
122d |
151d
|
25/28 |
121d |
71dac2482ad3
bcachefs: BCH_SB_LAYOUT_SIZE_BITS_MAX
|
KMSAN: uninit-value in nci_rx_work
net
nfc
|
C |
|
|
582 |
121d |
277d
|
25/28 |
121d |
e4a87abf5885
nfc: nci: Fix uninit-value in nci_rx_work
|
KASAN: slab-use-after-free Read in unix_del_edges
net
|
C |
done |
|
2 |
168d |
168d
|
25/28 |
121d |
1af2dface5d2
af_unix: Don't access successor in unix_del_edges() during GC.
|
INFO: task hung in ext4_quota_write
ext4
|
C |
inconclusive |
|
22 |
172d |
277d
|
25/28 |
121d |
0a46ef234756
ext4: do not create EA inode under buffer lock
|
WARNING: kmalloc bug in bch2_dev_buckets_resize
bcachefs
|
C |
|
|
17 |
122d |
153d
|
25/28 |
121d |
db42549d402c
bcachefs: Add a better limit for maximum number of buckets
|
general protection fault in fib6_rule_action
net
|
|
|
|
1 |
170d |
170d
|
25/28 |
121d |
d101291b2681
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
|
WARNING in mb_cache_destroy
ext4
|
C |
done |
|
738 |
138d |
157d
|
25/28 |
121d |
0c0b4a49d3e7
ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
|
WARNING in __virt_to_phys (3)
bcachefs
|
C |
|
|
447 |
121d |
154d
|
25/28 |
121d |
7ffec9ccdc6a
bcachefs: don't free error pointers
|
KMSAN: uninit-value in br_dev_xmit (2)
bridge
|
C |
|
|
2 |
149d |
145d
|
25/28 |
121d |
8bd67ebb50c0
net: bridge: xmit: make sure we have at least eth header len bytes
|
KMSAN: uninit-value in dev_map_lookup_elem
bpf
net
|
C |
|
|
3 |
186d |
193d
|
25/28 |
121d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in __bch2_write_index
bcachefs
|
|
|
|
1 |
153d |
153d
|
25/28 |
121d |
1267df40acb2
bcachefs: Initialize bch_write_op->failed in inline data path
|
BUG: sleeping function called from invalid context in console_lock (2)
serial
|
C |
inconclusive |
inconclusive |
7447 |
121d |
1215d
|
25/28 |
121d |
6bd23e0c2bb6
tty: add the option to have a tty reject a new ldisc
|
KMSAN: uninit-value in trie_lookup_elem
bpf
|
C |
|
|
12 |
179d |
197d
|
25/28 |
121d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
possible deadlock in kvfree_call_rcu
bpf
|
C |
|
|
1431 |
122d |
192d
|
25/28 |
121d |
59f2f841179a
bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie.
|
BUG: unable to handle kernel paging request in bch2_fs_btree_key_cache_exit
bcachefs
|
C |
|
|
1002 |
121d |
154d
|
25/28 |
121d |
b30b70ad8bff
bcachefs: Fix early error path in bch2_fs_btree_key_cache_exit()
|
WARNING: suspicious RCU usage in bch2_fs_quota_read
bcachefs
|
C |
done |
|
24 |
122d |
152d
|
25/28 |
121d |
8060bf1d83f7
bcachefs: Fix snapshot_t() usage in bch2_fs_quota_read_inode()
|
WARNING in kcov_remote_start (3)
usb
|
|
|
|
265513 |
121d |
190d
|
25/28 |
121d |
19e35f24750d
nfc: nci: Fix kcov check in nci_rx_work()
|
KASAN: slab-out-of-bounds Write in do_handle_open
nfs
|
C |
|
|
643 |
183d |
185d
|
25/28 |
121d |
68d6f4f3fbd9
fs: Annotate struct file_handle with __counted_by() and use struct_size()
|
UBSAN: shift-out-of-bounds in __bch2_bkey_invalid
bcachefs
|
C |
done |
|
6 |
126d |
152d
|
25/28 |
121d |
2bb9600d5d47
bcachefs: Guard against unknown k.k->type in __bkey_invalid()
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (2)
bpf
|
C |
|
|
3 |
164d |
178d
|
25/28 |
121d |
543576ec15b1
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
|
KMSAN: uninit-value in unwind_dump
net
|
|
|
|
1 |
172d |
168d
|
25/28 |
121d |
90d1f14cbb9d
kmsan: compiler_types: declare __no_sanitize_or_inline
|
KASAN: slab-out-of-bounds Read in bch2_sb_downgrade_to_text
bcachefs
|
C |
done |
|
32 |
138d |
151d
|
25/28 |
121d |
692aa7a54b2b
bcachefs: Fix sb_field_downgrade validation
|
KMSAN: uninit-value in array_map_lookup_elem
bpf
|
C |
|
|
10 |
176d |
196d
|
25/28 |
121d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in sock_map_delete_elem
bpf
net
|
C |
|
|
44 |
122d |
193d
|
25/28 |
121d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KASAN: slab-use-after-free Read in fsnotify
ext4
|
C |
error |
|
3 |
170d |
176d
|
25/28 |
121d |
795bb82d12a1
fsnotify: fix UAF from FS_ERROR event on a shutting down filesystem
|
KASAN: slab-out-of-bounds Read in bch2_sb_clean_to_text
bcachefs
|
C |
done |
|
3 |
142d |
152d
|
25/28 |
121d |
f39055220f6f
bcachefs: Add missing validation for superblock section clean
|
WARNING in ar5523_cmd/usb_submit_urb
usb
wireless
|
C |
error |
|
39 |
154d |
1710d
|
25/28 |
121d |
e120b6388d7d
wifi: ar5523: enable proper endpoint verification
|
possible deadlock in sch_direct_xmit (4)
net
|
|
|
|
1 |
160d |
160d
|
25/28 |
121d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
WARNING in qdisc_alloc
net
|
C |
error |
|
1069 |
143d |
157d
|
25/28 |
121d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
WARNING in __mark_chain_precision (4)
bpf
|
C |
|
|
8 |
166d |
186d
|
25/28 |
121d |
1f2a74b41ea8
bpf: prevent r10 register from being marked as precise
|
kernel BUG in bch2_alloc_v4_invalid
bcachefs
|
C |
error |
|
3 |
128d |
152d
|
25/28 |
121d |
6b8cbfc3db75
bcachefs: Fix assert in bch2_alloc_v4_invalid()
|
KASAN: slab-out-of-bounds Read in bch2_varint_decode_fast
bcachefs
|
C |
|
|
583 |
121d |
154d
|
25/28 |
121d |
4a8521b6bb81
bcachefs: Inodes need extra padding for varint_decode_fast()
|
WARNING in __page_table_check_ptes_set
mm
|
C |
|
|
2 |
170d |
166d
|
25/28 |
121d |
c88033efe9a3
mm/userfaultfd: reset ptes when close() for wr-protected ones
|
KASAN: global-out-of-bounds Read in __nla_validate_parse
net
|
C |
|
|
5 |
179d |
179d
|
25/28 |
121d |
8750539ba317
net: team: fix incorrect maxattr
|
UBSAN: shift-out-of-bounds in bch2_bkey_format_invalid
bcachefs
|
C |
|
|
45 |
124d |
149d
|
25/28 |
121d |
61692c7812ab
bcachefs: bch2_bkey_format_field_overflows()
|
WARNING in __mod_memcg_lruvec_state
cgroups
mm
|
C |
|
|
270 |
150d |
185d
|
25/28 |
121d |
4f687281012e
mm: do not update memcg stats for NR_{FILE/SHMEM}_PMDMAPPED
|
WARNING in carl9170_usb_send_rx_irq_urb/usb_submit_urb
usb
wireless
|
C |
error |
inconclusive |
18 |
165d |
1309d
|
25/28 |
121d |
b6dd09b3dac8
wifi: carl9170: add a proper sanity check for endpoints
|
UBSAN: shift-out-of-bounds in rewrite_old_nodes_pred
bcachefs
|
C |
done |
|
3 |
152d |
152d
|
25/28 |
121d |
0ec5b3b7ccfc
bcachefs: Fix shift-by-64 in bformat_needs_redo()
|
kernel BUG in bch2_btree_node_read_done
bcachefs
|
C |
error |
|
5 |
151d |
154d
|
25/28 |
121d |
a2ddaf965f6a
bcachefs: bucket_pos_to_bp_noerror()
|
WARNING: suspicious RCU usage in br_mst_set_state
bridge
|
|
|
|
45 |
121d |
155d
|
25/28 |
121d |
3a7c1661ae13
net: bridge: mst: fix vlan use-after-free
|
KASAN: slab-use-after-free Read in vhost_task_fn
kvm
net
virt
|
C |
done |
|
2661 |
155d |
157d
|
25/28 |
121d |
db5247d9bf5c
vhost_task: Handle SIGKILL by flushing work and exiting
|
WARNING: zero-size vmalloc in ubi_read_volume_table
mtd
|
C |
|
|
3 |
188d |
186d
|
25/28 |
132d |
68a24aba7c59
ubi: Check for too small LEB size in VTBL code
|
WARNING in emit_fiemap_extent
btrfs
|
C |
error |
done |
14 |
216d |
472d
|
25/28 |
134d |
a1a4a9ca77f1
btrfs: fix race between ordered extent completion and fiemap
|
KASAN: slab-use-after-free Read in ovs_ct_exit
openvswitch
|
|
|
|
6 |
165d |
191d
|
25/28 |
134d |
5ea7b72d4fac
net: openvswitch: Fix Use-After-Free in ovs_ct_exit
|
possible deadlock in move_pages
mm
|
C |
|
|
206 |
190d |
199d
|
25/28 |
134d |
30af24facf0a
userfaultfd: fix deadlock warning when locking src and dst VMAs
|
KASAN: stack-out-of-bounds Read in hash
bpf
|
C |
done |
|
5 |
174d |
181d
|
25/28 |
134d |
a8d89feba7e5
bpf: Check bloom filter map value size
|
possible deadlock in force_sig_info_to_task
bpf
trace
|
C |
error |
|
6 |
155d |
162d
|
25/28 |
134d |
02b670c1f88e
x86/mm: Remove broken vsyscall emulation code from the page fault code
|
KMSAN: kernel-infoleak in btrfs_ioctl_logical_to_ino (2)
btrfs
|
|
|
|
1 |
171d |
171d
|
25/28 |
134d |
2f7ef5bb4a2f
btrfs: fix information leak in btrfs_ioctl_logical_to_ino()
|
possible deadlock in seq_read_iter (3)
overlayfs
|
|
|
|
148 |
146d |
235d
|
25/28 |
134d |
16b52bbee482
kernfs: annotate different lockdep class for of->mutex of writable files
|
KMSAN: uninit-value in geneve_xmit (3)
net
|
C |
|
|
14 |
176d |
184d
|
25/28 |
134d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
WARNING in mmu_free_root_page
kvm
|
C |
|
|
104 |
167d |
189d
|
25/28 |
134d |
1bc26cb90902
KVM: x86/mmu: Precisely invalidate MMU root_role during CPUID update
|
KMSAN: kernel-infoleak in __skb_datagram_iter (3)
net
|
C |
|
|
25 |
137d |
191d
|
25/28 |
134d |
d313eb8b7755
net/sched: act_skbmod: prevent kernel-infoleak
|
KASAN: slab-use-after-free Read in ip_skb_dst_mtu
netfilter
|
C |
error |
|
5 |
180d |
212d
|
25/28 |
134d |
18685451fc4e
inet: inet_defrag: prevent sk release while still in use
|
KMSAN: uninit-value in gre_rcv (3)
net
|
C |
|
|
3 |
189d |
190d
|
25/28 |
134d |
17af420545a7
erspan: make sure erspan_base_hdr is present in skb->head
|
KMSAN: uninit-value in line6_pod_process_message
sound
|
C |
|
|
5 |
185d |
186d
|
25/28 |
134d |
c4e51e424e2c
ALSA: line6: Zero-initialize message buffers
|
KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue
bpf
net
|
|
|
|
1 |
203d |
196d
|
25/28 |
134d |
6648e613226e
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
|
net-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
799 |
162d |
196d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
WARNING: suspicious RCU usage in __do_softirq
kernel
|
C |
|
|
199 |
158d |
185d
|
25/28 |
134d |
1dd1eff161bd
softirq: Fix suspicious RCU usage in __do_softirq()
|
upstream boot error: WARNING: refcount bug in __reset_page_owner
mm
|
|
|
|
555 |
168d |
200d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
KASAN: slab-out-of-bounds Read in nfc_llcp_setsockopt
net
nfc
|
C |
error |
|
5 |
172d |
181d
|
25/28 |
134d |
7a87441c9651
nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
|
KASAN: slab-use-after-free Read in __vma_reservation_common
mm
|
syz |
|
|
13 |
161d |
175d
|
25/28 |
134d |
37641efaa3fa
hugetlb: check for anon_vma prior to folio allocation
|
linux-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
177 |
191d |
228d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
riscv/fixes boot error: can't ssh into the instance (3)
|
|
|
|
210 |
136d |
190d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
upstream test error: WARNING: refcount bug in __reset_page_owner
mm
|
|
|
|
13 |
177d |
198d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
net boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
297 |
162d |
191d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
WARNING in vmk80xx_auto_attach/usb_submit_urb
usb
|
C |
unreliable |
inconclusive |
2 |
209d |
1211d
|
25/28 |
134d |
d1718530e3f6
comedi: vmk80xx: fix incomplete endpoint checking
|
WARNING: refcount bug in __reset_page_owner
mm
|
C |
|
|
93128 |
168d |
199d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
upstream boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
1463 |
168d |
199d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
KASAN: slab-out-of-bounds Read in update_counters
bridge
netfilter
|
C |
|
|
3 |
181d |
181d
|
25/28 |
134d |
0c83842df40f
netfilter: validate user input for expected length
|
KMSAN: uninit-value in ieee80211_rx_handlers (2)
wireless
|
C |
|
|
4 |
174d |
192d
|
25/28 |
134d |
7c1c73bf84c5
wifi: mac80211: check EHT/TTLM action frame length
|
KASAN: slab-out-of-bounds Read in do_ipt_set_ctl
netfilter
|
C |
|
|
111 |
172d |
183d
|
25/28 |
134d |
0c83842df40f
netfilter: validate user input for expected length
|
usb-testing boot error: WARNING: refcount bug in __reset_page_owner
mm
|
|
|
|
126 |
164d |
192d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
bpf-next boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
210 |
158d |
187d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
bpf boot error: WARNING: refcount bug in __free_pages_ok
virt
|
|
|
|
132 |
160d |
188d
|
25/28 |
134d |
f5c12105c15f
mm,page_owner: fix refcount imbalance
|
possible deadlock in tty_port_tty_get (2)
bpf
net
|
|
|
|
3 |
178d |
196d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in put_pwq_unlocked
trace
bpf
|
|
|
|
3 |
172d |
171d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_delete_elem
bpf
net
|
C |
|
|
17183 |
161d |
200d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in scheduler_tick (3)
bpf
net
|
C |
|
|
1179 |
161d |
198d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in pit_timer_fn
bpf
net
|
|
|
|
7 |
172d |
183d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
BUG: soft lockup in sys_sendmsg
tipc
batman
|
C |
|
|
3 |
194d |
235d
|
25/28 |
134d |
b1f532a3b1e6
batman-adv: Avoid infinite loop trying to resize local TT
|
possible deadlock in rcu_exp_handler
bpf
net
|
C |
|
|
1 |
175d |
171d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
KMSAN: uninit-value in v9fs_evict_inode
v9fs
|
C |
|
|
5206 |
190d |
202d
|
25/28 |
134d |
6630036b7c22
fs/9p: fix uninitialized values during inode evict
|
possible deadlock in rcu_report_exp_cpu_mult
net
bpf
|
C |
done |
|
30 |
162d |
200d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in try_to_wake_up (4)
bpf
net
|
C |
error |
|
19 |
137d |
200d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in ahci_single_level_irq_intr
bpf
net
|
C |
|
|
10 |
183d |
191d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_unref
bpf
net
|
C |
error |
|
97 |
162d |
175d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
INFO: rcu detected stall in rtnl_newlink (4)
fs
batman
|
C |
error |
|
9 |
142d |
218d
|
25/28 |
134d |
b1f532a3b1e6
batman-adv: Avoid infinite loop trying to resize local TT
|
possible deadlock in __lock_task_sighand (2)
bpf
net
|
C |
|
|
1476 |
136d |
200d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_hash_delete_elem
bpf
net
|
C |
done |
|
16982 |
161d |
200d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in hrtimer_run_queues
net
bpf
|
C |
error |
|
592 |
161d |
198d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in swake_up_one
bpf
net
|
C |
|
|
4 |
173d |
172d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
BUG: unable to handle kernel paging request in copy_from_kernel_nofault (2)
mm
|
C |
|
|
2 |
175d |
185d
|
25/28 |
134d |
c6f48506ba30
arm32, bpf: Reimplement sign-extension mov instruction
|
possible deadlock in pwq_dec_nr_in_flight
trace
bpf
|
|
|
|
1 |
177d |
173d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in _prb_commit
net
bpf
|
|
|
|
4 |
172d |
168d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in posix_timer_fn (2)
net
bpf
|
|
|
|
1 |
176d |
172d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in drm_handle_vblank
bpf
net
|
|
|
|
30 |
172d |
198d
|
25/28 |
134d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
KASAN: slab-out-of-bounds Read in xsk_setsockopt
bpf
net
|
C |
|
|
17 |
174d |
183d
|
25/28 |
134d |
237f3cf13b20
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
|
KMSAN: uninit-value in ipvlan_queue_xmit (2)
net
|
C |
|
|
2 |
208d |
169d
|
25/28 |
134d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
possible deadlock in __unix_gc
net
|
C |
done |
|
5 |
162d |
164d
|
25/28 |
134d |
1971d13ffa84
af_unix: Suppress false-positive lockdep splat for spin_lock() in __unix_gc().
|
WARNING in gre_tap_xmit (2)
net
|
C |
done |
|
67 |
143d |
168d
|
25/28 |
134d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
UBSAN: array-index-out-of-bounds in check_stack_range_initialized
bpf
|
C |
error |
|
21 |
166d |
199d
|
25/28 |
134d |
ecc6a2101840
bpf: Protect against int overflow for stack access size
|
general protection fault in dev_map_enqueue
bpf
net
|
C |
|
|
676 |
135d |
192d
|
25/28 |
134d |
5bcf0dcbf906
xdp: use flags field to disambiguate broadcast redirect
|
KMSAN: uninit-value in xt_check_entry_offsets
netfilter
|
|
|
|
1 |
178d |
178d
|
25/28 |
134d |
65acf6e0501a
netfilter: complete validation of user input
|
KMSAN: uninit-value in nci_ntf_packet
net
nfc
|
C |
|
|
79 |
136d |
277d
|
25/28 |
134d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
KASAN: slab-use-after-free Read in v9fs_stat2inode_dotl
v9fs
|
C |
done |
|
585 |
190d |
245d
|
25/28 |
134d |
11763a8598f8
fs/9p: fix uaf in in v9fs_stat2inode_dotl
|
possible deadlock in unix_del_edges
net
|
C |
|
|
49 |
178d |
183d
|
25/28 |
134d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
WARNING in __hugetlb_cgroup_uncharge_folio
mm
|
syz |
|
|
3 |
164d |
172d
|
25/28 |
134d |
b76b46902c2d
mm/hugetlb: fix missing hugetlb_lock for resv uncharge
|
KASAN: slab-use-after-free Read in bpf_link_free
bpf
|
syz |
|
|
181 |
135d |
183d
|
25/28 |
134d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
WARNING: refcount bug in ax25_release (2)
hams
|
C |
|
|
240 |
135d |
200d
|
25/28 |
134d |
467324bcfe1a
ax25: Fix netdev refcount issue
|
KASAN: slab-out-of-bounds Read in data_sock_setsockopt
isdn4linux
|
C |
|
|
2 |
179d |
179d
|
25/28 |
134d |
138b787804f4
mISDN: fix MISDN_TIME_STAMP handling
|
KASAN: slab-use-after-free Read in bpf_trace_run4
bpf
trace
|
C |
error |
|
169 |
179d |
197d
|
25/28 |
134d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
KMSAN: uninit-value in nci_dev_up
nfc
net
|
C |
|
|
7 |
194d |
253d
|
25/28 |
134d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
UBSAN: array-index-out-of-bounds in nilfs_add_link
nilfs
|
C |
error |
|
4 |
171d |
172d
|
25/28 |
134d |
c4a7dc9523b5
nilfs2: fix OOB in nilfs_set_de_type
|
KASAN: slab-use-after-free Read in bpf_trace_run2
bpf
trace
|
C |
error |
|
653 |
179d |
197d
|
25/28 |
134d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
KASAN: slab-use-after-free Read in __fput (2)
fs
|
C |
done |
|
6 |
159d |
164d
|
25/28 |
134d |
4efaa5acf0a1
epoll: be better about file lifetimes
|
KASAN: slab-use-after-free Read in bpf_trace_run1
bpf
trace
|
C |
error |
|
78 |
179d |
193d
|
25/28 |
134d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
possible deadlock in unix_notinflight
net
|
C |
|
|
7 |
161d |
177d
|
25/28 |
134d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
general protection fault in __ep_remove
fs
|
C |
|
|
1 |
180d |
179d
|
25/28 |
134d |
4efaa5acf0a1
epoll: be better about file lifetimes
|
general protection fault in jbd2__journal_start
ext4
|
C |
error |
|
3 |
198d |
252d
|
25/28 |
134d |
f2e812c1522d
xfs: don't use current->journal_info
|
kernel BUG in sg_init_one
mm
|
C |
|
|
1032 |
190d |
200d
|
25/28 |
134d |
9c500835f279
mm: zswap: fix kernel BUG in sg_init_one
|
WARNING in __rate_control_send_low
wireless
|
C |
inconclusive |
|
2759 |
135d |
1451d
|
25/28 |
134d |
ab9177d83c04
wifi: mac80211: don't use rate mask for scanning
|
kernel BUG in PageHuge
mm
|
|
|
|
1 |
197d |
193d
|
25/28 |
134d |
d99e3140a4d3
mm: turn folio_test_hugetlb into a PageType
|
WARNING in clear_dirty_gfn_range
kvm
|
C |
|
|
3 |
184d |
205d
|
25/28 |
134d |
2673dfb591a3
KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
|
KMSAN: uninit-value in nf_flow_offload_ip_hook
netfilter
|
C |
|
|
5 |
183d |
183d
|
25/28 |
134d |
87b3593bed18
netfilter: flowtable: validate pppoe header
|
WARNING: ODEBUG bug in bdev_super_lock (2)
fs
|
C |
done |
|
3 |
172d |
170d
|
25/28 |
134d |
22650a99821d
fs,block: yield devices early
|
WARNING in hugetlb_change_protection (2)
mm
|
C |
|
|
631 |
155d |
182d
|
25/28 |
134d |
c5977c95dff1
mm/userfaultfd: allow hugetlb change protection upon poison entry
|
WARNING in __kvm_gpc_refresh
kvm
|
C |
|
|
178 |
135d |
200d
|
25/28 |
134d |
5c9ca4ed8908
KVM: Check validity of offset+length of gfn_to_pfn_cache prior to activation
|
WARNING in btrfs_sync_log
btrfs
|
C |
error |
inconclusive |
6 |
208d |
719d
|
25/28 |
135d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
WARNING in btrfs_put_transaction
btrfs
|
C |
error |
inconclusive |
83 |
151d |
674d
|
25/28 |
135d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
WARNING in __btrfs_free_extent
btrfs
|
C |
error |
|
300 |
143d |
701d
|
25/28 |
135d |
8bb808c6ad91
btrfs: don't print stack trace when transaction is aborted due to ENOMEM
|
WARNING in btrfs_get_root_ref
btrfs
|
syz |
unreliable |
inconclusive |
3 |
210d |
224d
|
25/28 |
136d |
e2b54eaf28df
btrfs: fix double free of anonymous device after snapshot creation failure
|
kernel BUG at fs/inode.c:LINE! (2)
fs
|
C |
done |
unreliable |
322 |
150d |
1498d
|
25/28 |
136d |
319c15174757
epoll: take epitem list out of struct file
|
kernel BUG in create_pending_snapshot
btrfs
|
C |
error |
done |
32 |
374d |
680d
|
25/28 |
138d |
df9f27823904
btrfs: do not BUG_ON on failure to get dir index for new snapshot
|
WARNING in btrfs_free_reserved_data_space_noquota
btrfs
|
C |
done |
done |
7 |
263d |
675d
|
25/28 |
138d |
9e65bfca24cf
btrfs: fix qgroup_free_reserved_data int overflow
|
WARNING in stashed_dentry_prune (2)
fs
|
C |
done |
|
54 |
161d |
170d
|
25/28 |
139d |
9d9539db8638
pidfs: remove config option
|
kernel BUG in __extent_writepage_io
btrfs
|
syz |
done |
inconclusive |
8 |
215d |
333d
|
25/28 |
139d |
5571e41ec6e5
btrfs: don't drop extent_map for free space inode on write error
|
BUG: sleeping function called from invalid context in gsm_send
serial
|
C |
error |
|
16 |
223d |
737d
|
25/28 |
161d |
acdab4cb4ba7
Revert "tty: n_gsm: avoid call of sleeping functions from atomic context"
|
kernel BUG in submit_bh_wbc
nilfs
|
C |
done |
|
10 |
163d |
172d
|
25/28 |
163d |
269cdf353b5b
nilfs2: prevent kernel bug at submit_bh_wbc()
|
inconsistent lock state in snd_hrtimer_callback (2)
sound
|
C |
|
|
2600 |
172d |
173d
|
25/28 |
165d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
possible deadlock in snd_timer_close_locked (2)
sound
|
C |
done |
|
3036 |
172d |
173d
|
25/28 |
165d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
inconsistent lock state in snd_timer_interrupt (3)
sound
|
C |
|
|
710 |
172d |
176d
|
25/28 |
165d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
INFO: rcu detected stall in snd_timer_user_release (2)
sound
|
C |
|
|
7 |
165d |
178d
|
25/28 |
165d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
possible deadlock in _snd_pcm_stream_lock_irqsave (5)
sound
|
C |
|
|
5210 |
172d |
173d
|
25/28 |
165d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
INFO: task hung in netlink_dump (4)
net
|
|
|
|
72 |
179d |
219d
|
25/28 |
175d |
00af2aa93b76
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
|
INFO: task hung in xfs_inodegc_flush
xfs
|
C |
error |
|
7 |
244d |
240d
|
25/28 |
175d |
c70e1779b73a
workqueue: Fix pwq->nr_in_flight corruption in try_to_grab_pending()
|
INFO: task hung in devinet_ioctl (4)
net
|
|
|
|
5 |
206d |
206d
|
25/28 |
175d |
00af2aa93b76
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
|
WARNING in __sk_destruct
batman
fs
|
|
|
|
2 |
189d |
221d
|
25/28 |
175d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
WARNING in cleanup_net (3)
net
|
syz |
|
|
240 |
176d |
309d
|
25/28 |
175d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
WARNING in net_free (2)
net
|
syz |
|
|
27 |
182d |
228d
|
25/28 |
175d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
inconsistent lock state in snd_timer_interrupt (2)
sound
|
C |
done |
|
208 |
176d |
177d
|
25/28 |
176d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
KMSAN: uninit-value in em_ret_far
kvm
|
C |
|
|
37 |
203d |
269d
|
25/28 |
176d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
KMSAN: uninit-value in em_ret_near_imm
kvm
|
|
|
|
2 |
213d |
226d
|
25/28 |
176d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
KMSAN: uninit-value in em_ret
kvm
|
|
|
|
3 |
204d |
226d
|
25/28 |
176d |
6fd1e3963f20
KVM: x86: Clean up partially uninitialized integer in emulate_pop()
|
KMSAN: uninit-value in ip_tunnel_rcv (2)
net
|
|
|
|
1 |
211d |
211d
|
25/28 |
176d |
b0ec2abf9826
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
|
WARNING in stashed_dentry_prune
fs
|
C |
done |
|
20 |
206d |
205d
|
25/28 |
176d |
9d9539db8638
pidfs: remove config option
|
possible deadlock in sch_direct_xmit (3)
net
|
|
|
|
1 |
235d |
235d
|
25/28 |
177d |
0bef512012b1
UPSTREAM: net: add netdev_lockdep_set_classes() to virtual drivers
|
BUG: bad usercopy in raw_getsockopt
mm
hardening
|
C |
done |
|
4 |
227d |
227d
|
25/28 |
177d |
c8fba5d6df5e
can: raw: fix getsockopt() for new CAN_RAW_XL_VCID_OPTS
|
WARNING: ODEBUG bug in bdev_super_lock
fs
|
C |
|
|
3 |
180d |
190d
|
25/28 |
177d |
59a55a63c246
fs,block: get holder during claim
|
KMSAN: uninit-value in cookie_v4_check
net
|
C |
|
|
9 |
199d |
205d
|
25/28 |
177d |
956c0d619107
tcp: Clear req->syncookie in reqsk_alloc().
|
linux-next boot error: WARNING in register_btf_kfunc_id_set
bpf
|
|
|
|
9 |
245d |
246d
|
25/28 |
177d |
a05e90427ef6
bpf: btf: Add BTF_KFUNCS_START/END macro pair
|
KMSAN: uninit-value in bcmp (2)
sound
btrfs
|
C |
|
|
7 |
242d |
264d
|
25/28 |
177d |
fde2497d2bc3
fat: fix uninitialized field in nostale filehandles
|
KASAN: slab-use-after-free Read in sys_io_cancel
fs
|
C |
done |
|
894 |
177d |
215d
|
25/28 |
177d |
28468cbed92e
Revert "fs/aio: Make io_cancel() generate completions again"
|
possible deadlock in _snd_pcm_stream_lock_irqsave (4)
sound
|
C |
|
|
24677 |
177d |
200d
|
25/28 |
177d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
divide error in isd200_ata_command
usb-storage
|
C |
done |
|
10 |
217d |
221d
|
25/28 |
177d |
014bcf41d946
USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
|
KASAN: slab-use-after-free Read in rt6_fill_node
net
|
|
|
|
1 |
229d |
229d
|
25/28 |
177d |
685f7d531264
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
|
KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt
net
|
|
|
|
1 |
204d |
204d
|
25/28 |
177d |
6ebfad33161a
packet: annotate data-races around ignore_outgoing
|
UBSAN: shift-out-of-bounds in taprio_change
net
|
C |
done |
|
4 |
207d |
207d
|
25/28 |
177d |
343041b59b78
net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
|
WARNING: suspicious RCU usage in in6_dump_addrs (2)
net
|
C |
done |
|
3 |
220d |
220d
|
25/28 |
177d |
67ea41d19d2a
inet6: expand rcu_read_lock() scope in inet6_dump_addr()
|
KASAN: slab-use-after-free Read in f2fs_filemap_fault
f2fs
|
C |
unreliable |
|
40 |
181d |
263d
|
25/28 |
177d |
eb70d5a6c932
f2fs: fix to avoid use-after-free issue in f2fs_filemap_fault
|
KMSAN: uninit-value in ieee80211_amsdu_to_8023s
wireless
|
C |
|
|
4 |
214d |
221d
|
25/28 |
177d |
9ad797485692
wifi: cfg80211: check A-MSDU format more carefully
|
general protection fault in btintel_read_version
bluetooth
|
C |
error |
|
5 |
250d |
261d
|
25/28 |
177d |
b79e04091010
Bluetooth: btintel: Fix null ptr deref in btintel_read_version
|
KMSAN: uninit-value in hsr_get_node (2)
net
|
C |
|
|
49 |
178d |
264d
|
25/28 |
177d |
ddbec99f5857
hsr: Fix uninit-value access in hsr_get_node()
|
KMSAN: kernel-infoleak in sys_name_to_handle_at (4)
nfs
|
C |
|
|
7 |
215d |
264d
|
25/28 |
177d |
3948abaa4e2b
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
|
KASAN: slab-use-after-free Write in __hci_acl_create_connection_sync
bluetooth
|
C |
done |
|
87 |
228d |
239d
|
25/28 |
177d |
5f641f03abcc
Bluetooth: hci_conn: Fix UAF Write in __hci_acl_create_connection_sync
|
WARNING in mpls_gso_segment
net
|
C |
done |
|
20 |
223d |
226d
|
25/28 |
177d |
025f8ad20f2e
net: mpls: error out if inner headers are not set
|
possible deadlock in snd_pcm_period_elapsed (4)
sound
|
C |
done |
|
90659 |
177d |
203d
|
25/28 |
177d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
possible deadlock in xfs_ilock
xfs
|
|
|
|
30 |
177d |
204d
|
25/28 |
177d |
0c6ca06aad84
xfs: quota radix tree allocations need to be NOFS on insert
|
inconsistent lock state in snd_timer_interrupt
sound
|
C |
|
|
1927 |
177d |
200d
|
25/28 |
177d |
587d67fd929a
ALSA: timer: Fix missing irq-disable at closing
|
WARNING in rds_conn_connect_if_down
rds
|
C |
error |
|
17 |
211d |
542d
|
25/28 |
177d |
c055fc00c07b
net/rds: fix WARNING in rds_conn_connect_if_down
|
general protection fault in bpf_struct_ops_find_value
bpf
|
C |
done |
|
9 |
250d |
253d
|
25/28 |
177d |
e6be8cd5d3cf
bpf: Fix error checks against bpf_get_btf_vmlinux().
|
BUG: unable to handle kernel NULL pointer dereference in dev_map_hash_update_elem
bpf
net
|
C |
|
|
2 |
221d |
229d
|
25/28 |
177d |
281d464a34f5
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
|
WARNING in sk_nulls_del_node_init_rcu
net
|
|
|
|
1 |
211d |
210d
|
25/28 |
177d |
04d9d1fc428a
tcp: Fix refcnt handling in __inet_hash_connect().
|
KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll (2)
wireguard
|
|
|
|
721 |
197d |
969d
|
25/28 |
177d |
bba045dc4d99
wireguard: receive: annotate data-race around receiving_counter.counter
|
KMSAN: uninit-value in geneve_udp_encap_recv
net
|
C |
|
|
2 |
222d |
253d
|
25/28 |
177d |
1ca1ba465e55
geneve: make sure to pull inner header in geneve_rx()
|
WARNING in ovl_copy_up_file
overlayfs
|
C |
|
|
2 |
205d |
205d
|
25/28 |
177d |
77a28aa47687
ovl: relax WARN_ON in ovl_verify_area()
|
kernel BUG at fs/buffer.c:LINE!
nilfs
|
C |
done |
error |
567 |
178d |
2360d
|
25/28 |
177d |
f2f26b4a84a0
nilfs2: fix failure to detect DAT corruption in btree and direct mappings
|
kernel BUG in __nla_validate_parse
net
|
C |
done |
|
13 |
206d |
209d
|
25/28 |
177d |
d8a21070b6e1
nexthop: Fix out-of-bounds access during attribute validation
|
KASAN: slab-use-after-free Read in pvr2_context_set_notify (2)
pvrusb2
|
C |
|
|
1069 |
177d |
248d
|
25/28 |
177d |
0a0b79ea55de
media: pvrusb2: fix uaf in pvr2_context_set_notify
|
possible deadlock in xfs_qm_dqget_cache_insert
xfs
|
|
|
|
8 |
203d |
204d
|
25/28 |
177d |
0c6ca06aad84
xfs: quota radix tree allocations need to be NOFS on insert
|
KMSAN: uninit-value in ima_add_template_entry
erofs
|
C |
|
|
5 |
214d |
227d
|
25/28 |
177d |
893e5e9b7369
erofs: fix uninitialized page cache reported by KMSAN
|
BUG: sleeping function called from invalid context in __getblk_gfp
fs
|
C |
error |
done |
3673 |
282d |
676d
|
25/28 |
177d |
f123dc86388c
sysv: don't call sb_bread() with pointers_lock held
|
general protection fault in btf_is_module
bpf
|
C |
error |
|
318 |
249d |
253d
|
25/28 |
177d |
e6be8cd5d3cf
bpf: Fix error checks against bpf_get_btf_vmlinux().
|
KMSAN: uninit-value in io_sendrecv_fail
io-uring
|
C |
|
|
29 |
195d |
202d
|
25/28 |
177d |
e21e1c45e1fe
io_uring: clear opcode specific data for an early failure
|
INFO: task hung in deactivate_super (2)
reiserfs
|
C |
inconclusive |
done |
121 |
215d |
554d
|
25/28 |
179d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: sleeping function called from invalid context in __lock_sock_fast (2)
net
|
C |
|
|
6 |
217d |
218d
|
25/28 |
185d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
possible deadlock in tcp_diag_get_aux
net
|
C |
|
|
117 |
211d |
228d
|
25/28 |
185d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
kernel BUG in eth_header (2)
net
|
C |
|
|
2 |
261d |
261d
|
25/28 |
185d |
dad555c816a5
llc: make llc_ui_sendmsg() more robust against bonding changes
|
BUG: unable to handle kernel NULL pointer dereference in unix_stream_sendmsg
bpf
net
|
C |
|
|
1 |
220d |
220d
|
25/28 |
185d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
BUG: unable to handle kernel NULL pointer dereference in sk_psock_verdict_data_ready
net
bpf
|
C |
unreliable |
|
15 |
216d |
335d
|
25/28 |
185d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
WARNING in blk_rq_map_user_iov
block
|
C |
done |
|
3546 |
250d |
392d
|
25/28 |
188d |
13f3956eb568
block: Fix WARNING in _copy_from_iter
|
WARNING in copy_page_from_iter
block
|
C |
done |
|
1987 |
258d |
569d
|
25/28 |
188d |
13f3956eb568
block: Fix WARNING in _copy_from_iter
|
possible deadlock in unix_set_peek_off
net
|
|
|
|
8 |
225d |
231d
|
25/28 |
189d |
56667da7399e
net: implement lockless setsockopt(SO_PEEK_OFF)
|
INFO: task hung in unix_stream_sendmsg
net
|
C |
done |
|
4 |
226d |
229d
|
25/28 |
189d |
aa82ac51d633
af_unix: Drop oob_skb ref before purging queue in GC.
|
possible deadlock in __unix_dgram_recvmsg (2)
net
|
|
|
|
3 |
228d |
231d
|
25/28 |
189d |
56667da7399e
net: implement lockless setsockopt(SO_PEEK_OFF)
|
WARNING in __alloc_skb (3)
ppp
|
C |
|
|
2 |
242d |
242d
|
25/28 |
189d |
cb88cb53badb
ppp_async: limit MRU to 64K
|
BUG: unable to handle kernel paging request in copy_from_kernel_nofault
mm
|
C |
done |
|
5 |
221d |
320d
|
25/28 |
189d |
32019c659ecf
x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
|
WARNING in zswap_folio_swapin
mm
|
|
|
|
1 |
248d |
244d
|
25/28 |
189d |
16e96ba5e92c
mm/swap_state: update zswap LRU's protection range with the folio locked
|
KASAN: slab-out-of-bounds Read in getname_kernel (2)
btrfs
|
C |
done |
|
5 |
244d |
291d
|
25/28 |
190d |
9845664b9ee4
btrfs: dev-replace: properly validate device names
|
kernel BUG in end_buffer_async_write
nilfs
|
C |
inconclusive |
|
6 |
278d |
488d
|
25/28 |
190d |
5bc09b397cbf
nilfs2: fix potential bug in end_buffer_async_write
|
WARNING in send_hsr_supervision_frame (3)
net
|
|
|
|
153 |
253d |
689d
|
25/28 |
190d |
37e8c97e5390
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
|
memory leak in pppoe_sendmsg
net
|
C |
|
|
26 |
281d |
1953d
|
25/28 |
190d |
dc34ebd5c018
pppoe: Fix memory leak in pppoe_sendmsg()
|
memory leak in corrupted
bluetooth
|
syz |
|
|
536 |
190d |
262d
|
25/28 |
190d |
0a186b49bba5
batman-adv: mcast: fix memory leak on deleting a batman-adv interface
|
WARNING in __unix_gc
net
|
C |
|
|
49 |
239d |
245d
|
25/28 |
190d |
1279f9d9dec2
af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.
|
KMSAN: uninit-value in des3_ede_decrypt
crypto
|
|
|
|
1 |
231d |
227d
|
25/28 |
190d |
7cfc2ab3f025
crypto: lskcipher - Copy IV in lskcipher glue code always
|
kernel BUG in iov_iter_revert
exfat
|
C |
done |
|
5 |
242d |
262d
|
25/28 |
190d |
0991abeddefa
exfat: fix zero the unwritten part for dio read
|
WARNING: ODEBUG bug in ip_set_free
netfilter
|
C |
|
|
42 |
231d |
234d
|
25/28 |
191d |
27c5a095e251
netfilter: ipset: Missing gc cancellations fixed
|
BUG: unable to handle kernel NULL pointer dereference in hrtimer_active
kernel
|
|
|
|
1 |
237d |
235d
|
25/28 |
191d |
fe9f801355f0
net: veth: clear GRO when clearing XDP even when down
|
possible deadlock in rds_wake_sk_sleep (4)
rds
|
C |
error |
|
16 |
241d |
869d
|
25/28 |
191d |
f1acf1ac84d2
net:rds: Fix possible deadlock in rds_message_put
|
bpf test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
4 |
255d |
256d
|
25/28 |
191d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
net test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
21 |
255d |
258d
|
25/28 |
191d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
possible deadlock in rds_message_put
rds
|
C |
done |
error |
5 |
328d |
639d
|
25/28 |
191d |
f1acf1ac84d2
net:rds: Fix possible deadlock in rds_message_put
|
linux-next test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
12 |
255d |
256d
|
25/28 |
191d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
possible deadlock in skb_queue_tail (6)
net
|
|
|
|
1 |
250d |
250d
|
25/28 |
191d |
4d322dce82a1
UPSTREAM: af_unix: fix lockdep positive in sk_diag_dump_icons()
|
KASAN: slab-use-after-free Read in sock_wfree (2)
intel-wired-lan
|
C |
|
|
4 |
252d |
261d
|
25/28 |
191d |
aa2b2eb39348
llc: call sock_orphan() at release time
|
WARNING: ODEBUG bug in hash_netiface4_destroy
netfilter
|
C |
done |
|
80 |
231d |
245d
|
25/28 |
191d |
27c5a095e251
netfilter: ipset: Missing gc cancellations fixed
|
KMSAN: uninit-value in __nla_validate_parse (3)
netfilter
|
|
|
|
24 |
205d |
227d
|
25/28 |
192d |
9a0d18853c28
netlink: add nla be16/32 types to minlen array
|
possible deadlock in j1939_sk_queue_drop_all
can
|
C |
error |
done |
281 |
249d |
1122d
|
25/28 |
192d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
possible deadlock in j1939_sk_errqueue (2)
can
|
C |
done |
|
24 |
232d |
458d
|
25/28 |
192d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
memory leak in virtual_ncidev_write (2)
net
nfc
|
C |
|
|
2 |
289d |
450d
|
25/28 |
192d |
bfb007aebe6b
nfc: nci: free rx_data_reassembly skb on NCI device cleanup
|
general protection fault in tipc_udp_is_known_peer
tipc
|
C |
error |
|
1 |
278d |
291d
|
25/28 |
192d |
3871aa01e1a7
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
|
KMSAN: uninit-value in IP6_ECN_decapsulate (2)
net
|
C |
|
|
3 |
243d |
258d
|
25/28 |
192d |
8d975c15c0cd
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
|
INFO: task hung in rtnl_lock (3)
net
|
C |
|
|
128 |
197d |
548d
|
25/28 |
192d |
3871aa01e1a7
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
|
WARNING in inet_csk_destroy_sock (5)
net
|
|
|
|
1 |
257d |
257d
|
25/28 |
192d |
66b60b0c8c4a
dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().
|
possible deadlock in j1939_session_activate
can
|
C |
done |
done |
67 |
243d |
1078d
|
25/28 |
192d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
WARNING in bcm5974_start_traffic/usb_submit_urb
input
|
C |
error |
|
41 |
196d |
1792d
|
25/28 |
192d |
2b9c3eb32a69
Input: bcm5974 - check endpoint type before starting traffic
|
WARNING in ieee80211_bss_info_change_notify (2)
wireless
|
C |
done |
|
1392 |
213d |
358d
|
25/28 |
192d |
f78c1375339a
wifi: nl80211: reject iftype change with mesh ID change
|
WARNING in btrfs_issue_discard
btrfs
|
C |
done |
|
9 |
249d |
263d
|
25/28 |
192d |
a208b3f132b4
btrfs: don't warn if discard range is not aligned to sector
|
WARNING in __nf_unregister_net_hook (6)
netfilter
|
C |
error |
|
2 |
236d |
353d
|
25/28 |
192d |
bccebf647017
netfilter: nf_tables: set dormant flag on hook register failure
|
memory leak in sctp_packet_transmit
sctp
|
C |
|
|
14 |
317d |
1535d
|
25/28 |
192d |
4e45170d9acc
net: sctp: fix skb leak in sctp_inq_free()
|
KMSAN: uninit-value in geneve_xmit (2)
net
|
C |
|
|
12 |
197d |
274d
|
25/28 |
192d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
WARNING in ip6gre_tunnel_xmit
net
|
C |
done |
|
2 |
222d |
222d
|
25/28 |
192d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
KASAN: use-after-free Read in __skb_flow_dissect (3)
net
|
C |
|
|
1 |
267d |
277d
|
25/28 |
192d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
memory leak in add_block_entry
btrfs
|
C |
|
|
4 |
290d |
482d
|
25/28 |
192d |
f03e274a8b29
btrfs: ref-verify: free ref cache before clearing mount opt
|
INFO: task hung in nsim_create
net
|
|
|
|
1 |
241d |
241d
|
25/28 |
192d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
KMSAN: uninit-value in af_alg_free_sg (2)
crypto
|
|
|
|
1 |
270d |
264d
|
25/28 |
192d |
24c890dd712f
crypto: algif_hash - Remove bogus SGL free on zero-length error path
|
INFO: task hung in addrconf_dad_work (3)
net
|
C |
|
|
185 |
206d |
248d
|
25/28 |
192d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
KASAN: invalid-access Read in neon_aes_ctr_encrypt
arm
crypto
|
C |
|
|
3 |
219d |
230d
|
25/28 |
192d |
1c0cf6d19690
crypto: arm64/neonbs - fix out-of-bounds access on short input
|
memory leak in add_tree_block
btrfs
|
C |
|
|
5 |
275d |
676d
|
25/28 |
192d |
f03e274a8b29
btrfs: ref-verify: free ref cache before clearing mount opt
|
KASAN: slab-out-of-bounds Read in ntfs_listxattr (2)
ntfs3
|
C |
error |
|
15 |
241d |
282d
|
25/28 |
192d |
731ab1f98288
fs/ntfs3: Fix oob in ntfs_listxattr
|
KMSAN: kernel-infoleak in __skb_datagram_iter (2)
net
|
C |
|
|
126 |
193d |
245d
|
25/28 |
192d |
661779e1fcaf
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
|
INFO: task hung in unix_dgram_sendmsg
net
|
C |
done |
|
36 |
219d |
238d
|
25/28 |
193d |
25236c91b5ab
af_unix: Fix task hung while purging oob_skb in GC.
|
upstream boot error: can't ssh into the instance (16)
|
|
|
|
415 |
216d |
268d
|
25/28 |
193d |
f6564fce256a
mm, kmsan: fix infinite recursion due to RCU critical section
|
KMSAN: uninit-value in __llc_lookup_established
net
|
C |
|
|
46 |
260d |
304d
|
25/28 |
193d |
e3f9bed9bee2
llc: Drop support for ETH_P_TR_802_2.
|
INFO: task hung in migrate_pages_batch
nilfs
|
C |
|
|
22 |
238d |
250d
|
25/28 |
193d |
38296afe3c6e
nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
|
BUG: unable to handle kernel NULL pointer dereference in crypto_arc4_crypt
crypto
|
C |
done |
|
4 |
250d |
249d
|
25/28 |
193d |
69fba378edca
crypto: cbc - Ensure statesize is zero
|
BUG: unable to handle kernel NULL pointer dereference in dtInsertEntry
jfs
|
C |
error |
done |
29 |
245d |
739d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in reiserfs_dirty_inode
reiserfs
|
C |
done |
done |
519 |
248d |
676d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in ntfs_lookup_inode_by_name
ntfs3
|
C |
error |
done |
17 |
208d |
644d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in do_open_execat
ntfs3
|
C |
error |
done |
12 |
253d |
413d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in udf_finalize_lvid
udf
|
C |
inconclusive |
done |
39 |
270d |
473d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: sleeping function called from invalid context in gfs2_withdraw
gfs2
|
C |
error |
done |
182 |
270d |
390d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: shift-out-of-bounds in ntfs_iget
ntfs3
|
C |
error |
done |
9 |
250d |
492d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in ntfs_iget5
ntfs3
|
C |
done |
done |
3633 |
262d |
896d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in udf_free_blocks
udf
|
C |
done |
done |
2 |
272d |
482d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: trying to register non-static key in txEnd
jfs
|
C |
inconclusive |
done |
20 |
271d |
369d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
KMSAN: uninit-value in __crc32c_le_base (3)
xfs
|
|
|
|
15526 |
208d |
526d
|
25/28 |
198d |
0573676fdde7
xfs: initialise di_crc in xfs_log_dinode
|
KASAN: use-after-free Read in ntfs_read_folio
ntfs3
|
C |
error |
done |
12 |
259d |
567d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in hfs_mdb_commit
hfs
|
C |
error |
done |
25 |
249d |
627d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in map_mft_record
ntfs3
|
C |
error |
done |
845 |
247d |
716d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in ext4_xattr_inode_iget (2)
ext4
|
C |
done |
done |
22 |
263d |
456d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Write in hfs_bnode_read_key
hfs
|
C |
error |
done |
4 |
261d |
484d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in jfs_readdir
jfs
|
C |
error |
done |
17 |
270d |
631d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: sleeping function called from invalid context in __bread_gfp
fs
|
C |
error |
done |
359 |
274d |
675d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in ntfs_iget
ntfs3
|
C |
error |
done |
73 |
211d |
589d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in reiserfs_sync_fs
reiserfs
|
C |
error |
done |
22 |
274d |
653d
|
25/28 |
198d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in kvm_mmu_notifier_invalidate_range_start (3)
kvm
|
C |
inconclusive |
done |
44 |
262d |
322d
|
25/28 |
211d |
4cccb6221cae
fs/proc/task_mmu: move mmu notification mechanism inside mm lock
|
WARNING in gfs2_check_blk_type
gfs2
|
C |
error |
done |
67 |
259d |
662d
|
25/28 |
214d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in perf_event_open
perf
|
C |
done |
done |
43004 |
274d |
289d
|
25/28 |
220d |
7e2c1e4b34f0
perf: Fix perf_event_validate_size() lockdep splat
|
KASAN: slab-out-of-bounds Write in udf_adinicb_writepage
udf
|
C |
error |
done |
5 |
272d |
560d
|
25/28 |
221d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in lmLogClose (2)
jfs
|
C |
inconclusive |
done |
5 |
268d |
360d
|
25/28 |
223d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel panic: stack is corrupted in run_unpack_ex
ntfs3
|
C |
done |
done |
3 |
278d |
636d
|
25/28 |
223d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in common_perm_cond
apparmor
ext4
|
C |
error |
done |
1 |
278d |
442d
|
25/28 |
225d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: array-index-out-of-bounds in udf_process_sequence
udf
|
C |
error |
done |
6 |
272d |
431d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in __fget_files (2)
reiserfs
|
C |
done |
done |
1 |
281d |
277d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in __generic_file_fsync (3)
exfat
ntfs3
|
C |
inconclusive |
done |
8 |
279d |
786d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in ext4_discard_allocated_blocks
ext4
|
C |
inconclusive |
done |
4 |
272d |
389d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in write_cache_pages (3)
gfs2
|
C |
done |
done |
10 |
271d |
396d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in __get_metapage
jfs
|
C |
error |
done |
32 |
270d |
724d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Write in udf_close_lvid
udf
|
C |
done |
|
144 |
270d |
864d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in ext4_search_dir
prio:low
ext4
|
C |
error |
done |
20 |
271d |
512d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: unable to handle kernel paging request in reiserfs_readdir_inode
reiserfs
|
C |
error |
done |
11 |
272d |
638d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in entry_points_to_object
reiserfs
|
C |
done |
done |
21 |
272d |
317d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel panic: stack is corrupted in __lock_acquire (5)
ntfs3
|
C |
error |
done |
18 |
270d |
648d
|
25/28 |
226d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in txLock
jfs
|
C |
inconclusive |
done |
10 |
273d |
391d
|
25/28 |
231d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in lock_two_nondirectories
ext4
|
C |
|
|
3 |
283d |
294d
|
25/28 |
231d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in utf8nlookup
ext4
|
C |
done |
done |
3 |
273d |
380d
|
25/28 |
231d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in ext4_enable_quotas
ext4
|
C |
error |
done |
16 |
275d |
456d
|
25/28 |
231d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: out-of-bounds Read in ext4_ext_remove_space
ext4
|
C |
error |
done |
8 |
274d |
448d
|
25/28 |
231d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: vmalloc-out-of-bounds Read in cleanup_bitmap_list
reiserfs
|
C |
error |
done |
100 |
275d |
707d
|
25/28 |
231d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in hfsplus_read_wrapper
hfs
|
C |
inconclusive |
done |
7 |
282d |
505d
|
25/28 |
232d |
6f861765464f
fs: Block writes to mounted block devices
|
KMSAN: uninit-value in io_rw_fail (2)
io-uring
|
|
|
|
1 |
242d |
238d
|
25/28 |
233d |
0a535eddbe0d
io_uring/rw: ensure io->bytes_done is always initialized
|
KASAN: null-ptr-deref Read in ida_free (4)
bluetooth
|
C |
done |
done |
29 |
286d |
325d
|
25/28 |
233d |
af73483f4e8b
ida: Fix crash in ida_free when the bitmap is empty
|
KASAN: use-after-free Read in set_de_name_and_namelen
reiserfs
|
C |
error |
done |
15 |
278d |
679d
|
25/28 |
234d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in dtSearch
jfs
|
C |
error |
done |
33 |
277d |
740d
|
25/28 |
234d |
6f861765464f
fs: Block writes to mounted block devices
|
KMSAN: uninit-value in tcp_recvmsg (3)
net
|
|
|
|
1 |
279d |
266d
|
25/28 |
238d |
78fbb92af27d
nbd: always initialize struct msghdr completely
|
UBSAN: shift-out-of-bounds in dbSplit
jfs
|
C |
error |
done |
7 |
277d |
731d
|
25/28 |
238d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in hci_rfkill_set_block
bluetooth
|
C |
done |
|
3391 |
274d |
346d
|
25/28 |
242d |
769bf60e17ee
Bluetooth: Fix deadlock in vhci_send_frame
|
KASAN: use-after-free Read in udf_sync_fs
udf
|
C |
done |
done |
37 |
281d |
419d
|
25/28 |
244d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in ext4_convert_inline_data_nolock
ext4
|
C |
error |
done |
7 |
280d |
557d
|
25/28 |
244d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING: ODEBUG bug in netdev_run_todo
batman
|
C |
error |
error |
5467 |
468d |
1522d
|
25/28 |
244d |
abac3ac97fe8
batman-adv: Broken sync while rescheduling delayed work
|
BUG: unable to handle kernel NULL pointer dereference in reiserfs_find_entry
reiserfs
|
C |
error |
done |
25 |
281d |
717d
|
25/28 |
245d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: shift-out-of-bounds in ext4_handle_clustersize (2)
ext4
|
C |
error |
done |
3 |
282d |
286d
|
25/28 |
245d |
6f861765464f
fs: Block writes to mounted block devices
|
possible deadlock in seq_read_iter (2)
overlayfs
|
C |
done |
done |
14 |
283d |
443d
|
25/28 |
245d |
da40448ce4eb
fs: move file_start_write() into direct_splice_actor()
|
KMSAN: uninit-value in io_rw_fail
io-uring
|
C |
|
|
25 |
248d |
264d
|
25/28 |
245d |
0a535eddbe0d
io_uring/rw: ensure io->bytes_done is always initialized
|
KASAN: slab-use-after-free Write in fib6_purge_rt
net
|
|
|
|
1 |
316d |
316d
|
25/28 |
246d |
5a08d0065a91
ipv6: add debug checks in fib6_info_release()
|
KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim (2)
net
|
C |
|
|
17 |
247d |
273d
|
25/28 |
246d |
d375b98e0248
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
|
riscv/fixes boot error: failed to read from qemu: EOF
|
|
|
|
54 |
302d |
311d
|
25/28 |
246d |
420370f3ae3d
riscv: Check if the code to patch lies in the exit section
|
kernel BUG in ntfs_truncate
ntfs3
|
C |
error |
done |
4 |
283d |
641d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in hfsplus_find_init
hfs
|
C |
error |
done |
1 |
289d |
383d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in reiserfs_get_unused_objectid
reiserfs
|
C |
inconclusive |
done |
3 |
282d |
555d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in timerqueue_del (2)
kernel
|
C |
done |
done |
3 |
289d |
430d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in udf_new_block
udf
|
C |
inconclusive |
done |
31 |
283d |
567d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in __mark_chain_precision (3)
bpf
|
C |
done |
|
19 |
277d |
299d
|
25/28 |
247d |
482d548d40b0
bpf: handle fake register spill to stack with BPF_ST_MEM instruction
|
KMSAN: uninit-value in subflow_check_req
mptcp
|
C |
|
|
63 |
273d |
268d
|
25/28 |
247d |
66ff70df1a91
mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req()
|
KASAN: use-after-free Read in ext4_find_extent (3)
prio:low
ext4
|
C |
error |
done |
31 |
283d |
465d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in ext4_write_inline_data_end
ext4
|
C |
error |
done |
32 |
284d |
582d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
INFO: task hung in path_mount (2)
jfs
|
C |
error |
done |
8 |
284d |
412d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: use-after-free Read in crc_itu_t
udf
|
C |
inconclusive |
done |
50 |
283d |
734d
|
25/28 |
247d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in scatterwalk_copychunks (5)
crypto
|
C |
done |
|
2920 |
276d |
283d
|
25/28 |
248d |
744e1885922a
crypto: scomp - fix req->dst buffer overflow
|
KASAN: slab-out-of-bounds Write in squashfs_readahead (2)
squashfs
|
C |
done |
|
2 |
331d |
327d
|
25/28 |
248d |
12427de9439d
Squashfs: fix variable overflow triggered by sysbot
|
KASAN: slab-use-after-free Read in nla_find
bpf
net
|
C |
done |
|
4 |
292d |
291d
|
25/28 |
248d |
2130c519a401
bpf: Use nla_ok() instead of checking nla_len directly
|
KASAN: slab-use-after-free Read in nfc_alloc_send_skb
net
nfc
|
C |
error |
|
3 |
300d |
330d
|
25/28 |
248d |
c95f919567d6
nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local
|
KASAN: slab-use-after-free Read in jfs_evict_inode
jfs
|
syz |
error |
|
1 |
347d |
343d
|
25/28 |
248d |
e0e1958f4c36
jfs: fix uaf in jfs_evict_inode
|
kernel BUG in move_pages
mm
|
C |
done |
|
2 |
271d |
267d
|
25/28 |
248d |
5d4747a6cc8e
userfaultfd: avoid huge_zero_page in UFFDIO_MOVE
|
general protection fault in bio_first_folio
block
|
C |
done |
|
683 |
259d |
293d
|
25/28 |
248d |
7bed6f3d08b7
block: Fix iterating over an empty bio with bio_for_each_folio_all
|
general protection fault in bfs_get_block (2)
bfs
|
C |
error |
done |
2 |
295d |
314d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in arc4_crypt
crypto
|
C |
done |
|
6 |
280d |
291d
|
25/28 |
248d |
37c6fc323a81
crypto: skcipher - Pass statesize for simple lskcipher instances
|
WARNING in get_pte_pfn
mm
io-uring
|
C |
error |
|
2 |
277d |
287d
|
25/28 |
248d |
c28ac3c7eb94
mm/mglru: skip special VMAs in lru_gen_look_around()
|
UBSAN: array-index-out-of-bounds in diNewExt
jfs
|
C |
inconclusive |
|
31 |
248d |
299d
|
25/28 |
248d |
49f9637aafa6
jfs: fix array-index-out-of-bounds in diNewExt
|
INFO: task hung in gfs2_gl_hash_clear (3)
gfs2
|
C |
error |
done |
80 |
286d |
675d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: corrupted list in efivar_entry_remove
efi
|
C |
|
|
104 |
249d |
770d
|
25/28 |
248d |
cdb46a8aefbf
efivarfs: Move efivarfs list into superblock s_fs_info
|
KCSAN: data-race in udpv6_sendmsg / udpv6_sendmsg (6)
net
|
|
|
|
1 |
270d |
266d
|
25/28 |
248d |
482521d8e0c6
udp: annotate data-races around up->pending
|
general protection fault in dtSplitUp
jfs
|
C |
error |
done |
2 |
297d |
734d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in ip6_route_multipath_add
net
|
|
|
|
1 |
298d |
298d
|
25/28 |
248d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
BUG: unable to handle kernel NULL pointer dereference in __bio_release_pages
block
|
C |
|
|
6 |
264d |
262d
|
25/28 |
248d |
7bed6f3d08b7
block: Fix iterating over an empty bio with bio_for_each_folio_all
|
general protection fault in tomoyo_check_acl (3)
hfs
|
C |
inconclusive |
done |
1 |
298d |
455d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in hfsc_tcf_block
net
|
C |
done |
|
1020 |
270d |
278d
|
25/28 |
248d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
possible deadlock in chown_common
reiserfs
|
C |
error |
done |
22 |
256d |
725d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in __udf_add_aext (2)
udf
|
syz |
error |
done |
6 |
298d |
479d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: sleeping function called from invalid context in glock_hash_walk
gfs2
|
C |
done |
done |
31 |
293d |
395d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: array-index-out-of-bounds in diWrite
jfs
|
C |
error |
done |
13 |
294d |
714d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in pvr2_context_set_notify
usb
pvrusb2
|
C |
|
|
3814 |
248d |
454d
|
25/28 |
248d |
ded85b0c0edd
media: pvrusb2: fix use after free on context disconnection
|
BUG: sleeping function called from invalid context in gfs2_make_fs_ro
gfs2
|
C |
error |
done |
1 |
293d |
437d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-use-after-free Read in kill_f2fs_super
f2fs
|
C |
done |
|
2331 |
260d |
266d
|
25/28 |
248d |
c919330dd578
f2fs: fix double free of f2fs_sb_info
|
kernel BUG in balance_leaf
reiserfs
|
C |
error |
done |
16 |
287d |
639d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING: locking bug in corrupted (2)
bpf
reiserfs
|
C |
done |
done |
1 |
298d |
451d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in mptcp_check_listen_stop
mptcp
|
C |
done |
|
47 |
248d |
296d
|
25/28 |
248d |
4c0288299fd0
mptcp: prevent tcp diag from closing listener subflows
|
WARNING in __sk_msg_free
bpf
net
|
C |
done |
|
4 |
274d |
273d
|
25/28 |
248d |
dc9dfc8dc629
net: tls, fix WARNIING in __sk_msg_free
|
possible deadlock in pipe_write
fs
|
C |
inconclusive |
|
181 |
250d |
928d
|
25/28 |
248d |
055ca8355991
fs/pipe: Fix lockdep false-positive in watchqueue pipe_write()
|
KMSAN: uninit-value in z_erofs_lz4_decompress (2)
erofs
|
C |
|
|
33 |
249d |
282d
|
25/28 |
248d |
496530c7c1df
erofs: avoid debugging output for (de)compressed data
|
INFO: trying to register non-static key in do_mpage_readpage
ntfs3
|
C |
error |
done |
24 |
292d |
646d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in direntry_check_right
reiserfs
|
C |
done |
done |
2 |
286d |
330d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in dsa_user_changeupper
net
|
C |
done |
|
1303 |
255d |
269d
|
25/28 |
248d |
844f104790bd
net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events
|
WARNING in __folio_rmap_sanity_checks
mm
|
C |
done |
|
168 |
270d |
275d
|
25/28 |
248d |
9c5938694cd0
mm/rmap: silence VM_WARN_ON_FOLIO() in __folio_rmap_sanity_checks()
|
WARNING in ea_get
jfs
|
C |
error |
done |
10 |
290d |
736d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
riscv/fixes boot error: kernel BUG in __phys_addr_symbol
riscv
|
|
|
|
24 |
288d |
301d
|
25/28 |
248d |
c29fc621e1a4
riscv: Fix wrong usage of lm_alias() when splitting a huge linear mapping
|
INFO: task hung in find_inode_fast (2)
ext4
|
C |
unreliable |
done |
10 |
295d |
449d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
KASAN: slab-out-of-bounds Read in search_by_key (2)
reiserfs
|
C |
|
|
4435 |
270d |
701d
|
25/28 |
248d |
dd8f87f21dc3
reiserfs: fix uninit-value in comp_keys
|
UBSAN: array-index-out-of-bounds in dtSplitRoot
jfs
|
C |
error |
inconclusive |
2 |
392d |
720d
|
25/28 |
248d |
27e56f59bab5
UBSAN: array-index-out-of-bounds in dtSplitRoot
|
possible deadlock in ntfs_set_state
ntfs3
|
C |
done |
done |
1360 |
260d |
653d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
kernel BUG in txEnd
jfs
|
C |
inconclusive |
done |
6 |
258d |
472d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING: suspicious RCU usage in __cfg80211_bss_update
wireless
|
C |
done |
|
92 |
273d |
275d
|
25/28 |
248d |
1184950e341c
wifi: cfg80211: fix RCU dereference in __cfg80211_bss_update
|
general protection fault in qdisc_create
net
|
C |
done |
|
2821 |
270d |
278d
|
25/28 |
248d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
BUG: unable to handle kernel paging request in lookup_open
ntfs3
|
C |
error |
done |
1 |
296d |
442d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: unable to handle kernel NULL pointer dereference in gfs2_rgrp_dump
gfs2
|
C |
done |
|
9 |
304d |
648d
|
25/28 |
248d |
8877243beafa
gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
|
general protection fault in __hrtimer_run_queues (3)
reiserfs
|
C |
error |
done |
2 |
299d |
463d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in dev_watchdog (2)
net
|
C |
inconclusive |
|
6791 |
250d |
1649d
|
25/28 |
248d |
e316dd1cf135
net: don't dump stack on queue timeout
|
WARNING in kvm_mmu_notifier_change_pte
kvm
|
C |
inconclusive |
|
2 |
286d |
296d
|
25/28 |
248d |
4cccb6221cae
fs/proc/task_mmu: move mmu notification mechanism inside mm lock
|
WARNING: refcount bug in tcp_sigpool_alloc_ahash
net
|
|
|
|
1 |
289d |
289d
|
25/28 |
248d |
b901a4e27694
net/tcp_sigpool: Use kref_get_unless_zero()
|
possible deadlock in stack_depot_put
kasan
|
|
|
|
23 |
292d |
314d
|
25/28 |
248d |
a414d4286f34
kasan: handle concurrent kasan_record_aux_stack calls
|
KMSAN: uninit-value in netif_skb_features (2)
net
|
C |
|
|
9 |
291d |
380d
|
25/28 |
248d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
INFO: task hung in hwrng_fillfn
crypto
|
C |
error |
|
27 |
250d |
314d
|
25/28 |
248d |
78aafb3884f6
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
|
kernel BUG in ext4_split_extent_at (2)
ext4
|
C |
error |
done |
3 |
284d |
479d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
BUG: unable to handle kernel NULL pointer dereference in gfs2_rindex_update
gfs2
|
C |
error |
done |
4 |
293d |
652d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in ip6_route_info_create
net
|
C |
done |
|
241 |
298d |
302d
|
25/28 |
248d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
general protection fault in page_pool_unlist
net
|
C |
done |
|
648 |
308d |
310d
|
25/28 |
248d |
f9893fdac319
net: page_pool: fix general protection fault in page_pool_unlist
|
KMSAN: uninit-value in shrinker_alloc
mm
|
syz |
|
|
2 |
298d |
276d
|
25/28 |
248d |
7fba9420b726
mm: shrinker: use kvzalloc_node() from expand_one_shrinker_info()
|
possible deadlock in __run_timers
reiserfs
|
C |
error |
done |
1 |
296d |
292d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
UBSAN: shift-out-of-bounds in dbJoin
jfs
|
C |
error |
|
3 |
341d |
725d
|
25/28 |
248d |
cca974daeb6c
jfs: fix shift-out-of-bounds in dbJoin
|
KCSAN: data-race in ipv6_mc_down / mld_ifc_work (2)
net
|
|
|
|
2 |
260d |
266d
|
25/28 |
248d |
2e7ef287f07c
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
|
UBSAN: array-index-out-of-bounds in dbAdjTree
jfs
|
C |
error |
error |
41 |
262d |
739d
|
25/28 |
248d |
9862ec7ac1cb
FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
74ecdda68242
jfs: fix array-index-out-of-bounds in dbAdjTree
|
KASAN: slab-use-after-free Read in destroy_device_list
f2fs
|
C |
done |
|
3597 |
260d |
265d
|
25/28 |
248d |
c919330dd578
f2fs: fix double free of f2fs_sb_info
|
kernel BUG in gfs2_quota_cleanup
gfs2
|
C |
done |
|
4 |
290d |
390d
|
25/28 |
248d |
71733b492200
gfs2: fix kernel BUG in gfs2_quota_cleanup
|
KMSAN: uninit-value in validate_xmit_skb
net
|
C |
|
|
21 |
249d |
267d
|
25/28 |
248d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
kernel BUG in flush_journal_list
reiserfs
|
C |
done |
done |
3 |
291d |
480d
|
25/28 |
248d |
6f861765464f
fs: Block writes to mounted block devices
|
general protection fault in htb_tcf_block
net
|
C |
done |
|
885 |
270d |
278d
|
25/28 |
248d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
KMSAN: uninit-value in ppp_sync_receive
ppp
|
|
|
|
2 |
325d |
324d
|
25/28 |
249d |
719639853d88
tty: Fix uninit-value access in ppp_sync_receive()
|
INFO: trying to register non-static key in debugfs_file_get
fs
|
|
|
|
289 |
288d |
288d
|
25/28 |
255d |
88ac06a9f938
Revert "debugfs: annotate debugfs handlers vs. removal with lockdep"
|
WARNING in debugfs_file_get
fs
|
|
|
|
239 |
289d |
306d
|
25/28 |
255d |
88ac06a9f938
Revert "debugfs: annotate debugfs handlers vs. removal with lockdep"
|
kernel BUG in prog_array_map_poke_run
bpf
|
C |
done |
done |
35 |
291d |
332d
|
25/28 |
255d |
4b7de801606e
bpf: Fix prog_array_map_poke_run map poke update
|
WARNING in rose_device_event
hams
|
|
|
|
1 |
296d |
296d
|
25/28 |
256d |
64b8bc7d5f14
net/rose: fix races in rose_kill_by_device()
|
general protection fault in skb_segment (4)
net
|
C |
error |
|
4 |
292d |
300d
|
25/28 |
256d |
23d05d563b7e
net: prevent mss overflow in skb_segment()
|
Internal error in fib6_table_lookup
net
|
|
|
|
2 |
325d |
325d
|
25/28 |
256d |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
KCSAN: data-race in wg_xmit / wg_xmit (4)
wireguard
|
|
|
|
1 |
329d |
324d
|
25/28 |
256d |
93da8d75a665
wireguard: use DEV_STATS_INC()
|
Internal error in fib6_rule_lookup
net
|
|
|
|
2 |
328d |
335d
|
25/28 |
256d |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
KASAN: slab-use-after-free Read in ife_tlv_meta_decode
net
|
|
|
|
1 |
303d |
301d
|
25/28 |
256d |
19391a2ca98b
net: sched: ife: fix potential use-after-free
|
WARNING in fib6_add (5)
net
|
C |
done |
|
6 |
302d |
465d
|
25/28 |
256d |
75475bb51e78
ipv6: fix potential NULL deref in fib6_add()
|
KASAN: slab-use-after-free Read in btrfs_qgroup_account_extent
btrfs
|
C |
done |
|
40 |
326d |
336d
|
25/28 |
258d |
6c8e69e4a702
btrfs: fix race between accounting qgroup extents and removing a qgroup
|
KASAN: slab-out-of-bounds Read in dns_resolver_preparse
net
|
C |
done |
|
46 |
282d |
295d
|
25/28 |
258d |
1997b3cb4217
keys, dns: Fix missing size check of V1 server-list header
|
WARNING in rate_control_rate_init (2)
wireless
|
C |
done |
|
9 |
288d |
460d
|
25/28 |
258d |
c1393c132b90
wifi: mac80211: check if the existing link config remains unchanged
|
general protection fault in dccp_write_xmit (2)
dccp
|
C |
done |
|
32 |
290d |
345d
|
25/28 |
258d |
cac23b7d7627
net: Return error from sk_stream_wait_connect() if sk_wait_event() fails
|
WARNING in ieee80211_rfkill_poll
wireless
|
C |
|
|
684 |
298d |
331d
|
25/28 |
258d |
8e2f6f236621
wifi: cfg80211: lock wiphy mutex for rfkill poll
|
general protection fault in d_path
integrity
overlayfs
|
C |
done |
|
210 |
315d |
457d
|
25/28 |
258d |
8a924db2d7b5
fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
|
KASAN: null-ptr-deref Write in unix_stream_bpf_update_proto
bpf
net
|
C |
done |
|
54 |
279d |
309d
|
25/28 |
258d |
8d6650646ce4
bpf: syzkaller found null ptr deref in unix_bpf proto add
|
memory leak in skb_copy (2)
nfc
net
|
syz |
|
|
3 |
330d |
447d
|
25/28 |
258d |
84d2db91f14a
nfc: virtual_ncidev: Add variable to check if ndev is running
|
WARNING in squashfs_read_data
squashfs
|
C |
error |
|
2 |
328d |
324d
|
25/28 |
258d |
eb66b8abae98
squashfs: squashfs_read_data need to check if the length is 0
|
general protection fault in hugetlb_vma_lock_write
mm
|
C |
done |
|
110 |
301d |
341d
|
25/28 |
258d |
187da0f8250a
hugetlb: fix null-ptr-deref in hugetlb_vma_lock_write
|
general protection fault in tls_merge_open_record
net
|
syz |
unreliable |
|
5 |
340d |
340d
|
25/28 |
258d |
53f2cb491b50
tls: fix NULL deref on tls_sw_splice_eof() with empty record
|
WARNING in pagemap_scan_pmd_entry
fs
|
C |
inconclusive |
|
48 |
302d |
324d
|
25/28 |
258d |
0dff1b407def
mm/pagemap: fix ioctl(PAGEMAP_SCAN) on vma check
|
WARNING in __alloc_skb (2)
ppp
|
C |
done |
|
2 |
313d |
327d
|
25/28 |
258d |
c0a2a1b0d631
ppp: limit MRU to 64K
|
WARNING in nilfs_sufile_set_segment_usage
nilfs
|
C |
inconclusive |
|
341 |
316d |
734d
|
25/28 |
258d |
675abf8df135
nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage()
|
WARNING in unmap_page_range (2)
mm
|
C |
done |
|
2112 |
298d |
324d
|
25/28 |
258d |
4980e837cab7
mm/pagemap: fix wr-protect even if PM_SCAN_WP_MATCHING not set
|
UBSAN: array-index-out-of-bounds in FSE_decompress_wksp_body_bmi2
btrfs
|
|
|
|
1 |
405d |
401d
|
25/28 |
258d |
77618db34645
zstd: Fix array-index-out-of-bounds UBSAN warning
|
memory leak in btrfs_ref_tree_mod
btrfs
|
syz |
|
|
1 |
420d |
416d
|
25/28 |
258d |
f91192cd6859
btrfs: ref-verify: fix memory leaks in btrfs_ref_tree_mod()
|
general protection fault in autofs_fill_super
autofs
|
syz |
done |
|
7 |
317d |
325d
|
25/28 |
258d |
66917f85db60
autofs: add: new_inode check in autofs_fill_super()
|
general protection fault in __mptcp_set_connected
mptcp
|
|
|
|
2 |
328d |
333d
|
25/28 |
258d |
d109a7767273
mptcp: fix possible NULL pointer dereference on close
|
BUG: unable to handle kernel paging request in __pte_offset_map_lock
mm
|
C |
|
|
2 |
333d |
344d
|
25/28 |
258d |
9aa1345d66b8
mm: fix oops when filemap_map_pmd() without prealloc_pte
|
memory leak in ovl_parse_param
overlayfs
|
C |
|
|
1 |
331d |
327d
|
25/28 |
258d |
37f32f526438
ovl: fix memory leak in ovl_parse_param()
|
KMSAN: uninit-value in drm_mode_setcrtc
dri
|
C |
|
|
41 |
299d |
475d
|
25/28 |
258d |
3823119b9c2b
drm/crtc: Fix uninit-value bug in drm_mode_setcrtc
6e455f5dcdd1
drm/crtc: fix uninitialized variable use
|
WARNING in blk_mq_start_request
block
|
C |
done |
|
29 |
316d |
332d
|
25/28 |
258d |
53f2bca26092
block/null_blk: Fix double blk_mq_start_request() warning
|
KASAN: slab-use-after-free Read in unix_stream_read_actor
net
|
C |
error |
|
6 |
312d |
328d
|
25/28 |
258d |
4b7b492615cf
af_unix: fix use-after-free in unix_stream_read_actor()
|
WARNING in create_pending_snapshot
btrfs
|
C |
done |
|
3 |
325d |
330d
|
25/28 |
258d |
8049ba5d0a28
btrfs: do not abort transaction if there is already an existing qgroup
|
general protection fault in ptp_ioctl
net
|
C |
done |
|
8 |
332d |
334d
|
25/28 |
258d |
8a4f030dbced
ptp: Fixes a null pointer dereference in ptp_ioctl
|
kernel BUG in ip6gre_header (2)
net
|
C |
|
|
2 |
357d |
371d
|
25/28 |
258d |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
KMSAN: uninit-value in mptcp_incoming_options
mptcp
|
C |
|
|
93 |
308d |
317d
|
25/28 |
258d |
237ff253f2d4
mptcp: fix uninit-value in mptcp_incoming_options
|
WARNING in __kernel_write_iter
btrfs
|
C |
inconclusive |
|
1149 |
309d |
725d
|
25/28 |
258d |
0ac1d13a55eb
btrfs: send: ensure send_fd is writable
|
memory leak in btrfs_add_delayed_tree_ref
btrfs
|
C |
|
|
6 |
329d |
333d
|
25/28 |
258d |
609d99379736
btrfs: fix qgroup record leaks when using simple quotas
|
WARNING in ext4_dio_write_end_io
ext4
|
C |
done |
|
2 |
318d |
317d
|
25/28 |
258d |
619f75dae2cf
ext4: fix warning in ext4_dio_write_end_io()
|
KASAN: slab-use-after-free Read in iommufd_vfio_ioas
iommu
|
C |
done |
|
4 |
319d |
336d
|
25/28 |
258d |
6f9c4d8c468c
iommufd: Do not UAF during iommufd_put_object()
|
BUG: unable to handle kernel paging request in nsim_bpf
net
|
C |
|
|
3 |
315d |
330d
|
25/28 |
258d |
c0c6bde586c7
netdevsim: Don't accept device bound programs
|
WARNING in subflow_data_ready
mptcp
|
|
|
|
42 |
260d |
345d
|
25/28 |
258d |
4fd19a307016
mptcp: fix inconsistent state on fastopen race
|
BUG: Dentry still in use in unmount
f2fs
|
C |
done |
|
58 |
293d |
770d
|
25/28 |
258d |
413ba91089c7
ovl: fix dentry reference leak after changes to underlying layers
|
kernel BUG in ipgre_header
net
|
C |
|
|
4 |
307d |
321d
|
25/28 |
258d |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
KCSAN: data-race in virtnet_poll / virtnet_stats (2)
net
virt
|
|
|
|
1 |
377d |
375d
|
25/28 |
263d |
61217d8f6360
virtio_net: use u64_stats_t infra to avoid data-races
|
KASAN: use-after-free Read in j1939_session_get_by_addr
|
C |
done |
error |
66 |
1783d |
1795d
|
25/28 |
266d |
d966635b384b
can: j1939: transport: make sure the aborted session will be deactivated only once
|
KASAN: stack-out-of-bounds Read in tcp_inbound_hash
net
|
C |
done |
|
28 |
327d |
341d
|
25/28 |
267d |
02f0717e9835
net/tcp: fix possible out-of-bounds reads in tcp_hash_fail()
|
WARNING in dev_index_reserve (2)
net
|
C |
done |
|
68 |
347d |
357d
|
25/28 |
268d |
cbfbfe3aee71
tun: prevent negative ifindex
|
possible deadlock in super_lock
reiserfs
|
C |
done |
done |
52 |
316d |
396d
|
25/28 |
269d |
fd1464105cb3
fs: Avoid grabbing sb->s_umount under bdev->bd_holder_lock
|
KMSAN: uninit-value in dccp_v6_err
dccp
|
C |
|
|
4 |
383d |
388d
|
25/28 |
270d |
6af289746a63
dccp: fix dccp_v4_err()/dccp_v6_err() again
|
KCSAN: data-race in fib_select_path / fib_select_path
net
|
|
|
|
1 |
366d |
353d
|
25/28 |
270d |
195374d89368
ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr
|
UBSAN: array-index-out-of-bounds in xtSearch
jfs
|
C |
unreliable |
done |
122 |
313d |
731d
|
25/28 |
270d |
a779ed754e52
jfs: define xtree root and page independently
|
UBSAN: array-index-out-of-bounds in txCommit
jfs
|
C |
error |
done |
396 |
337d |
718d
|
25/28 |
270d |
a779ed754e52
jfs: define xtree root and page independently
|
inconsistent lock state in nf_connlabels_put
netfilter
|
C |
done |
|
4 |
344d |
345d
|
25/28 |
275d |
643d12603664
netfilter: conntrack: switch connlabels to atomic_t
|
KCSAN: data-race in xfrm_sk_policy_insert / xfrm_sk_policy_insert (3)
net
|
|
|
|
1 |
419d |
392d
|
25/28 |
275d |
3e4bc23926b8
xfrm: fix a data-race in xfrm_gen_index()
|
KASAN: use-after-free Read in __media_entity_remove_links
usb
media
|
C |
|
|
7 |
1656d |
1754d
|
25/28 |
275d |
68035c80e129
media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
|
KASAN: slab-out-of-bounds Read in ntfs_listxattr
ntfs3
|
C |
done |
|
70 |
288d |
667d
|
25/28 |
287d |
8e7e27b2ee1e
fs/ntfs3: fix panic about slab-out-of-bounds caused by ntfs_list_ea()
3c675ddffb17
ntfs: Fix panic about slab-out-of-bounds caused by ntfs_listxattr()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (7)
net
|
|
|
|
1 |
371d |
367d
|
25/28 |
287d |
d0f95894fda7
netlink: annotate data-races around sk->sk_err
|
general protection fault in scatterwalk_copychunks (4)
net
crypto
|
C |
done |
done |
1341 |
287d |
1298d
|
25/28 |
287d |
cfaa80c91f6f
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
|
WARNING in bpf_mprog_pos_after
bpf
|
|
|
|
3 |
374d |
382d
|
25/28 |
288d |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
WARNING in page_copy_sane
fs
mm
|
C |
done |
|
3 |
386d |
382d
|
25/28 |
288d |
a08c7193e4f1
mm/filemap: remove hugetlb special casing in filemap.c
|
general protection fault in ovl_encode_real_fh
overlayfs
|
C |
done |
|
3 |
367d |
367d
|
25/28 |
288d |
c7242a45cb8c
ovl: fix NULL pointer defer when encoding non-decodable lower fid
|
KASAN: slab-use-after-free Read in ptp_poll
net
|
|
|
|
1 |
332d |
332d
|
25/28 |
288d |
b714ca2ccf6a
ptp: ptp_read should not release queue
|
possible deadlock in __btrfs_release_delayed_node (3)
btrfs
|
syz |
|
|
2 |
406d |
402d
|
25/28 |
288d |
e110f8911ddb
btrfs: fix lockdep splat and potential deadlock after failure running delayed items
|
kernel BUG in btrfs_insert_delayed_dir_index
btrfs
|
|
|
|
3 |
399d |
404d
|
25/28 |
288d |
8e7f82deb0c0
btrfs: fix race between reading a directory and adding entries to it
|
KMSAN: uninit-value in smsc95xx_reset
usb
|
C |
|
|
425 |
344d |
1509d
|
25/28 |
288d |
51a32e828109
net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg
|
general protection fault in lbmStartIO
jfs
|
C |
done |
|
2 |
355d |
363d
|
25/28 |
288d |
6306ff39a7fc
jfs: fix log->bdev_handle null ptr deref in lbmStartIO
|
general protection fault in usb_hub_create_port_device
kernel
|
C |
done |
done |
4 |
389d |
394d
|
25/28 |
288d |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
KASAN: slab-out-of-bounds Read in create_monitor_event
bluetooth
|
C |
done |
|
952 |
347d |
361d
|
25/28 |
288d |
18f547f3fc07
Bluetooth: hci_sock: fix slab oob read in create_monitor_event
|
WARNING: zero-size vmalloc in xskq_create
bpf
net
|
|
|
|
20 |
357d |
365d
|
25/28 |
288d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
WARNING: zero-size vmalloc in print_tainted
bpf
net
|
C |
|
|
79 |
481d |
515d
|
25/28 |
288d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
BUG: unable to handle kernel NULL pointer dereference in __io_remove_buffers (2)
io-uring
|
|
|
|
86 |
363d |
368d
|
25/28 |
288d |
f8024f1f36a3
io_uring/kbuf: don't allow registered buffer rings on highmem pages
|
UBSAN: shift-out-of-bounds in dbAlloc (2)
jfs
|
|
|
|
1 |
386d |
382d
|
25/28 |
288d |
525b861a0081
fs/jfs: Add check for negative db_l2nbperpage
|
kernel BUG in __block_write_begin_int
block
|
C |
done |
|
14 |
377d |
396d
|
25/28 |
288d |
4aa8cdd5e523
iomap: handle error conditions more gracefully in iomap_to_bh
|
WARNING in ext4_iomap_begin (2)
ext4
|
C |
done |
|
7 |
361d |
475d
|
25/28 |
288d |
ce56d21355cd
ext4: fix racy may inline data check in dio write
|
KASAN: use-after-free Read in bcmp
ntfs3
|
C |
done |
|
289 |
291d |
450d
|
25/28 |
288d |
34e6552a442f
fs/ntfs3: Fix OOB read in ntfs_init_from_boot
|
general protection fault in serio_handle_event
kernel
|
C |
done |
done |
6 |
384d |
392d
|
25/28 |
288d |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
KMSAN: uninit-value in IP6_ECN_decapsulate
net
|
C |
|
|
981 |
290d |
2206d
|
25/28 |
288d |
484b4833c604
hsr: Fix uninit-value access in fill_frame_info()
|
UBSAN: array-index-out-of-bounds in diAlloc
jfs
|
C |
error |
inconclusive |
37 |
328d |
738d
|
25/28 |
288d |
05d9ea1ceb62
jfs: fix array-index-out-of-bounds in diAlloc
|
KMSAN: uninit-value in __tipc_nl_bearer_enable (2)
tipc
|
C |
|
|
21 |
334d |
379d
|
25/28 |
288d |
19b3f72a41a8
tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING
|
memory leak in kcm_sendmsg (2)
net
|
C |
|
|
1 |
401d |
436d
|
25/28 |
288d |
c821a88bd720
kcm: Fix memory leak in error path of kcm_sendmsg()
|
INFO: task hung in clean_bdev_aliases
block
|
C |
done |
|
201 |
370d |
395d
|
25/28 |
288d |
381c043233e6
iomap: add a workaround for racy i_size updates on block devices
|
KMSAN: uninit-value in virtio_transport_recv_pkt
net
|
C |
|
|
20713 |
329d |
343d
|
25/28 |
288d |
34c4effacfc3
virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
|
WARNING in skb_warn_bad_offload (4)
net
|
C |
done |
|
1763 |
350d |
378d
|
25/28 |
288d |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
UBSAN: array-index-out-of-bounds in io_setup_async_msg
io-uring
|
C |
done |
|
3 |
388d |
387d
|
25/28 |
288d |
c21a8027ad8a
io_uring/net: fix iter retargeting for selected buf
|
linux-next boot error: KASAN: slab-out-of-bounds Write in vhci_setup
usb
|
|
|
|
34 |
353d |
357d
|
25/28 |
288d |
17d6b82d2d6d
usb/usbip: fix wrong data added to platform device
|
WARNING in bpf_mprog_attach
bpf
|
C |
|
|
3 |
366d |
374d
|
25/28 |
288d |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
WARNING in __ip6_append_data
net
|
C |
unreliable |
|
5 |
358d |
387d
|
25/28 |
288d |
9d4c75800f61
ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
|
BUG: unable to handle kernel NULL pointer dereference in hdr_find_e (2)
ntfs3
|
C |
done |
|
4 |
356d |
428d
|
25/28 |
288d |
1f9b94af923c
fs/ntfs3: Fix possible null-pointer dereference in hdr_find_e()
|
BUG: corrupted list in ptp_open
net
|
C |
done |
|
7 |
334d |
344d
|
25/28 |
288d |
1bea2c3e6df8
ptp: fix corrupted list in ptp_open
b714ca2ccf6a
ptp: ptp_read should not release queue
|
general protection fault in nfc_register_device
kernel
|
C |
done |
|
190 |
290d |
403d
|
25/28 |
288d |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
possible deadlock in rfkill_send_events
wireless
|
C |
done |
|
22 |
350d |
361d
|
25/28 |
288d |
f2ac54ebf856
net: rfkill: reduce data->mtx scope in rfkill_fop_open
|
general protection fault in wpan_phy_register
kernel
|
C |
done |
done |
7 |
381d |
388d
|
25/28 |
288d |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
BUG: Bad page map (7)
mm
|
C |
done |
|
19 |
369d |
391d
|
25/28 |
288d |
ce60f27bb62d
mm: abstract moving to the next PFN
|
KMSAN: uninit-value in mii_nway_restart
usb
|
C |
|
|
2449 |
357d |
1949d
|
25/28 |
288d |
8f8abb863fa5
net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read
|
WARNING in bpf_mprog_pos_before
bpf
|
C |
done |
|
26 |
366d |
374d
|
25/28 |
288d |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
KCSAN: data-race in xfrmi_xmit / xfrmi_xmit (3)
net
|
|
|
|
2 |
374d |
398d
|
25/28 |
288d |
f7c4e3e5d4f6
xfrm: interface: use DEV_STATS_INC()
|
kernel BUG in f2fs_put_super
f2fs
|
|
|
|
2 |
365d |
394d
|
25/28 |
288d |
a4639380bbe6
f2fs: fix to drop meta_inode's page cache in f2fs_put_super()
|
general protection fault in io_get_cqe_overflow
io-uring
|
C |
done |
|
2 |
370d |
368d
|
25/28 |
288d |
1658633c0465
io_uring: ensure io_lockdep_assert_cq_locked() handles disabled rings
|
general protection fault in hci_register_dev
kernel
|
C |
unreliable |
done |
4 |
386d |
393d
|
25/28 |
288d |
fd6f7ad2fd4d
driver core: return an error when dev_set_name() hasn't happened
|
WARNING in skb_checksum_help (2)
net
|
C |
done |
|
3816 |
288d |
378d
|
25/28 |
288d |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
divide error in iommufd_test
iommu
|
C |
done |
|
4 |
341d |
343d
|
25/28 |
288d |
2e22aac3ea9c
iommufd/selftest: Fix page-size check in iommufd_test_dirty()
|
KMSAN: uninit-value in tipc_nl_node_reset_link_stats
tipc
|
C |
|
|
2 |
370d |
379d
|
25/28 |
288d |
19b3f72a41a8
tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING
|
WARNING: suspicious RCU usage in gfs2_permission
gfs2
|
C |
done |
|
263 |
339d |
360d
|
25/28 |
288d |
074d7306a4fe
gfs2: Silence "suspicious RCU usage in gfs2_permission" warning
|
BUG: corrupted list in nfc_llcp_register_device
nfc
net
|
C |
error |
|
136 |
365d |
653d
|
25/28 |
288d |
dfc7f7a988da
net: nfc: llcp: Add lock when modifying device list
|
KASAN: slab-use-after-free Read in pwq_release_workfn
kernel
|
C |
unreliable |
|
79 |
350d |
401d
|
25/28 |
288d |
643445531829
workqueue: Fix UAF report by KASAN in pwq_release_workfn()
|
UBSAN: array-index-out-of-bounds in dbFindLeaf
jfs
|
C |
error |
|
6 |
388d |
702d
|
25/28 |
288d |
22cad8bc1d36
jfs: fix array-index-out-of-bounds in dbFindLeaf
|
KMSAN: uninit-value in smsc75xx_bind
usb
|
C |
|
|
63 |
386d |
1883d
|
25/28 |
288d |
e9c65989920f
net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
|
BUG: sleeping function called from invalid context in __hci_cmd_sync_sk
bluetooth
|
C |
done |
|
34 |
358d |
475d
|
25/28 |
288d |
acab8ff29a2a
Bluetooth: ISO: Fix invalid context error
|
general protection fault in bpf_prog_offload_verifier_prep
bpf
|
C |
done |
|
31 |
378d |
397d
|
25/28 |
288d |
1a49f4195d34
bpf: Avoid dummy bpf_offload_netdev in __bpf_prog_dev_bound_init
|
possible deadlock in btrfs_search_slot (2)
btrfs
|
C |
error |
|
2 |
410d |
406d
|
25/28 |
288d |
ee34a82e890a
btrfs: release path before inode lookup during the ino lookup ioctl
|
KASAN: slab-out-of-bounds Read in imon_probe
media
usb
|
syz |
|
|
2 |
383d |
405d
|
25/28 |
288d |
a1766a4fd83b
media: imon: fix access to invalid resource for the second interface
|
KASAN: slab-use-after-free Write in gfs2_qd_dealloc
gfs2
|
C |
inconclusive |
|
27 |
318d |
371d
|
25/28 |
288d |
bdcb8aa434c6
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
|
memory leak in binder_transaction (2)
kernel
|
C |
|
|
2 |
389d |
684d
|
25/28 |
288d |
1aa3aaf8953c
binder: fix memory leaks of spam and pending work
|
general protection fault in inherit_task_group
perf
|
C |
done |
done |
4 |
341d |
339d
|
25/28 |
288d |
a71ef31485bb
perf/core: Fix potential NULL deref
|
KMSAN: uninit-value in smsc95xx_eeprom_confirm_not_busy
usb
|
C |
|
|
521 |
344d |
457d
|
25/28 |
288d |
51a32e828109
net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg
|
UBSAN: shift-out-of-bounds in nci_activate_target
net
nfc
|
C |
done |
|
6 |
367d |
551d
|
25/28 |
288d |
354a6e707e29
nfc: nci: assert requested protocol is valid
|
KASAN: use-after-free Read in powermate_config_complete (4)
input
|
syz |
done |
unreliable |
14 |
392d |
764d
|
25/28 |
288d |
5c15c60e7be6
Input: powermate - fix use-after-free in powermate_config_complete
|
UBSAN: shift-out-of-bounds in set_flicker
usb
media
|
syz |
|
|
5 |
333d |
414d
|
25/28 |
288d |
099be1822d1f
media: gspca: cpia1: shift-out-of-bounds in set_flicker
|
UBSAN: shift-out-of-bounds in ntfs_fill_super (2)
ntfs3
|
C |
error |
|
5716 |
314d |
584d
|
25/28 |
288d |
91a4b1ee78cb
fs/ntfs3: Fix shift-out-of-bounds in ntfs_fill_super
|
possible deadlock in mnt_want_write (2)
integrity
overlayfs
|
C |
done |
|
867 |
339d |
1207d
|
25/28 |
288d |
e044374a8a0a
ima: annotate iint mutex to avoid lockdep false positive warnings
|
WARNING in inet_csk_get_port (2)
net
|
C |
done |
|
88 |
349d |
380d
|
25/28 |
288d |
8702cf12e6ba
tcp: Fix listen() warning with v4-mapped-v6 address.
|
WARNING in ieee80211_get_ringparam
wireless
|
C |
done |
|
151 |
375d |
381d
|
25/28 |
288d |
6b348f6e34ce
wifi: mac80211: ethtool: always hold wiphy mutex
|
KASAN: slab-use-after-free Read in ntfs_write_bh
ntfs3
|
C |
done |
|
100 |
364d |
388d
|
25/28 |
288d |
493c71926c20
ntfs3: put resources during ntfs_fill_super()
|
KCSAN: data-race in udp_lib_setsockopt / udp_lib_setsockopt
net
|
|
|
|
2 |
409d |
395d
|
25/28 |
288d |
882af43a0fc3
udplite: fix various data-races
|
KASAN: use-after-free Read in ntfs_test_inode
ntfs3
|
C |
done |
|
402 |
302d |
1236d
|
25/28 |
288d |
493c71926c20
ntfs3: put resources during ntfs_fill_super()
|
UBSAN: array-index-out-of-bounds in dbNextAG
jfs
|
C |
inconclusive |
inconclusive |
52 |
311d |
739d
|
25/28 |
288d |
64933ab7b048
fs/jfs: Add validity check for db_maxag and db_agpref
|
KMSAN: uninit-value in fq_change
net
|
C |
|
|
8 |
330d |
332d
|
25/28 |
288d |
f1a3b283f852
UPSTREAM: net_sched: sch_fq: better validate TCA_FQ_WEIGHTS and TCA_FQ_PRIOMAP
|
possible deadlock in ieee80211_change_mac
wireless
|
|
|
|
1 |
362d |
358d
|
25/28 |
288d |
74a7c93f45ab
wifi: mac80211: fix change_address deadlock during unregister
|
KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish (8)
bridge
|
|
|
|
1 |
383d |
382d
|
25/28 |
288d |
44bdb313da57
net: bridge: use DEV_STATS_INC()
|
KCSAN: data-race in xfrm_lookup_with_ifid / xfrm_lookup_with_ifid (7)
net
|
|
|
|
1 |
366d |
366d
|
25/28 |
288d |
de5724ca38fd
xfrm: fix a data-race in xfrm_lookup_with_ifid()
|
KMSAN: uninit-value in llc_station_rcv
net
|
C |
|
|
2 |
343d |
353d
|
25/28 |
288d |
7b3ba18703a6
llc: verify mac len before reading mac header
|
KASAN: invalid-free in ovl_copy_up_one
overlayfs
|
C |
done |
|
2 |
378d |
374d
|
25/28 |
288d |
5b02bfc1e7e3
ovl: do not encode lower fh with upper sb_writers held
|
WARNING in try_grab_page
xfs
mm
|
C |
|
|
48 |
373d |
459d
|
23/28 |
358d |
f443fd5af5db
crypto, cifs: fix error handling in extract_iter_to_sg()
|
kernel BUG in add_new_free_space
btrfs
|
C |
|
|
3 |
462d |
531d
|
23/28 |
358d |
d8ccbd21918f
btrfs: remove BUG_ON()'s in add_new_free_space()
|
KCSAN: data-race in sctp_poll / sctp_wfree (3)
sctp
|
|
|
|
1 |
404d |
403d
|
23/28 |
358d |
dc9511dd6f37
sctp: annotate data-races around sk->sk_wmem_queued
|
INFO: rcu detected stall in sys_close (5)
net
|
C |
done |
|
1 |
402d |
402d
|
23/28 |
358d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
general protection fault in io_sqpoll_wq_cpu_affinity
io-uring
|
|
|
|
33 |
392d |
403d
|
23/28 |
358d |
bd6fc5da4c51
io_uring: Don't set affinity on a dying sqpoll thread
|
possible deadlock in shmem_uncharge (2)
mm
|
C |
done |
|
29 |
446d |
444d
|
23/28 |
358d |
509f006932de
shmem: fix quota lock nesting in huge hole handling
|
WARNING in unregister_vlan_dev
net
|
C |
done |
|
1310 |
410d |
420d
|
23/28 |
358d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
general protection fault in __drop_extent_tree
f2fs
|
C |
error |
|
3 |
503d |
542d
|
23/28 |
358d |
458c15dfbce6
f2fs: don't reset unchangable mount option in f2fs_remount()
|
KCSAN: data-race in ____sys_sendmsg / do_ipv6_setsockopt
net
|
|
|
|
1 |
481d |
464d
|
23/28 |
358d |
1ded5e5a5931
net: annotate data-races around sock->ops
|
general protection fault in io_uring_show_fdinfo
io-uring
|
C |
done |
|
17 |
390d |
399d
|
23/28 |
358d |
32f5dea040ee
io_uring/fdinfo: only print ->sq_array[] if it's there
|
KCSAN: data-race in random_recv_done / virtio_read (3)
crypto
|
|
|
|
13 |
468d |
532d
|
23/28 |
358d |
ac52578d6e8d
hwrng: virtio - Fix race on data_avail and actual data
|
KCSAN: data-race in netlink_setsockopt / netlink_setsockopt
net
|
|
|
|
1 |
421d |
421d
|
23/28 |
358d |
8fe08d70a2b6
netlink: convert nlk->flags to atomic flags
|
KASAN: slab-out-of-bounds Read in read_descriptors (3)
usb
|
C |
error |
|
7 |
445d |
472d
|
23/28 |
358d |
ff33299ec8bb
USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
|
WARNING in do_chunk_alloc
btrfs
|
C |
error |
done |
35 |
465d |
681d
|
23/28 |
358d |
cd361199ff23
btrfs: wait on uncached block groups on every allocation loop
|
general protection fault in generic_hwtstamp_ioctl_lower
net
|
C |
done |
|
7 |
424d |
427d
|
23/28 |
358d |
c35e927cbe09
net: omit ndo_hwtstamp_get() call when possible in dev_set_hwtstamp_phylib()
|
KASAN: use-after-free Read in raw_release
can
|
|
|
|
1 |
429d |
429d
|
23/28 |
358d |
11c9027c983e
can: raw: fix lockdep issue in raw_release()
|
INFO: rcu detected stall in unix_release
net
|
C |
done |
|
1 |
422d |
418d
|
23/28 |
358d |
da71714e359b
net/sched: fix a qdisc modification with ambiguous command request
|
UBSAN: array-index-out-of-bounds in f2fs_iget
f2fs
|
C |
done |
|
6 |
398d |
442d
|
23/28 |
358d |
958ccbbf1ce7
Revert "f2fs: fix to do sanity check on extent cache correctly"
|
WARNING in init_module_from_file
modules
|
C |
|
|
98 |
451d |
459d
|
23/28 |
358d |
f1962207150c
module: fix init_module_from_file() error handling
|
WARNING: refcount bug in xp_put_pool
bpf
net
|
C |
done |
|
2 |
433d |
431d
|
23/28 |
358d |
85c2c79a0730
xsk: fix refcount underflow in error path
|
WARNING in ip6_tnl_exit_batch_net
net
|
C |
done |
|
29 |
413d |
420d
|
23/28 |
358d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: invalid-free in dbUnmount
jfs
|
syz |
error |
|
119 |
375d |
634d
|
23/28 |
358d |
cade5397e546
fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount()
|
KASAN: stack-out-of-bounds Write in __nla_validate_parse
net
|
C |
done |
|
4 |
426d |
440d
|
23/28 |
358d |
4d50e50045aa
net: flower: fix stack-out-of-bounds in fl_set_key_cfm()
|
KMSAN: uninit-value in af_alg_free_resources
crypto
|
C |
|
|
156 |
410d |
448d
|
23/28 |
358d |
080aa61e370b
crypto: fix uninit-value in af_alg_free_resources
|
general protection fault in sco_conn_add
bluetooth
|
C |
done |
|
4 |
444d |
453d
|
23/28 |
358d |
b4066eb04bb6
Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link
|
net-next test error: UBSAN: array-index-out-of-bounds in alloc_pid
kernel
|
|
|
|
30 |
457d |
459d
|
23/28 |
358d |
b69f0aeb0689
pid: Replace struct pid 1-element array with flex-array
|
KASAN: null-ptr-deref Read in txBegin
jfs
|
C |
error |
|
30 |
459d |
594d
|
23/28 |
358d |
47cfdc338d67
FS: JFS: Fix null-ptr-deref Read in txBegin
|
WARNING in ntfs_load_attr_list
ntfs3
|
C |
|
|
4 |
523d |
641d
|
23/28 |
358d |
ea303f72d70c
fs/ntfs3: Use __GFP_NOWARN allocation at ntfs_load_attr_list()
|
WARNING in iommufd_access_destroy
iommu
|
C |
done |
|
3 |
447d |
448d
|
23/28 |
358d |
99f98a7c0d69
iommufd: IOMMUFD_DESTROY should not increase the refcount
|
BUG: unable to handle kernel paging request in handshake_nl_done_doit
tls
|
C |
|
|
2 |
403d |
403d
|
23/28 |
358d |
82ba0ff7bf04
net/handshake: fix null-ptr-deref in handshake_nl_done_doit()
|
WARNING: bad unlock balance in sockopt_release_sock
net
|
C |
done |
|
2 |
406d |
406d
|
23/28 |
358d |
8be6f88b9d3f
inet: fix IP_TRANSPARENT error handling
|
KASAN: slab-use-after-free Read in xsk_diag_dump
net
bpf
|
C |
done |
|
9 |
393d |
402d
|
23/28 |
358d |
3e019d8a05a3
xsk: Fix xsk_diag use-after-free error during socket cleanup
|
linux-next test error: UBSAN: array-index-out-of-bounds in alloc_pid
kernel
|
|
|
|
9 |
505d |
506d
|
23/28 |
358d |
b69f0aeb0689
pid: Replace struct pid 1-element array with flex-array
|
KMSAN: uninit-value in alauda_check_media
usb
usb-storage
|
C |
|
|
1059 |
440d |
1824d
|
23/28 |
358d |
a6ff6e7a9dd6
usb-storage: alauda: Fix uninit-value in alauda_check_media()
|
INFO: rcu detected stall in tipc_sendmsg (2)
tipc
|
|
|
|
1 |
427d |
427d
|
23/28 |
358d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
UBSAN: array-index-out-of-bounds in xfs_attr3_leaf_add_work
xfs
|
C |
error |
done |
1923 |
435d |
475d
|
23/28 |
358d |
a49bbce58ea9
xfs: convert flex-array declarations in xfs attr leaf blocks
|
UBSAN: array-index-out-of-bounds in bpf_mprog_detach
bpf
|
|
|
|
3 |
427d |
432d
|
23/28 |
358d |
d210f9735e13
bpf: Fix mprog detachment for empty mprog entry
|
KASAN: slab-use-after-free Read in input_dev_uevent
input
|
C |
done |
|
7 |
399d |
410d
|
23/28 |
358d |
dd613a4e45f8
HID: uclogic: Correct devm device reference for hidinput input_dev name
|
BUG: unable to handle kernel paging request in ovs_vport_add
openvswitch
|
C |
done |
|
2 |
420d |
420d
|
23/28 |
358d |
a552bfa16bab
net: openvswitch: reject negative ifindex
|
KASAN: slab-use-after-free Read in nilfs_load_inode_block (2)
nilfs
|
C |
done |
|
4 |
425d |
440d
|
23/28 |
358d |
f8654743a0e6
nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput
|
KCSAN: data-race in bpf_percpu_array_update / bpf_percpu_array_update (2)
bpf
|
|
|
|
1 |
402d |
402d
|
23/28 |
358d |
6a86b5b5cd76
bpf: Annotate bpf_long_memcpy with data_race
|
memory leak in autofs_wait
autofs
|
C |
|
|
4 |
492d |
863d
|
23/28 |
358d |
ccbe77f7e45d
autofs: fix memory leak of waitqueues in autofs_catatonic_mode
|
KCSAN: data-race in dccp_connect / dccp_sendmsg (3)
dccp
|
|
|
|
1 |
428d |
428d
|
23/28 |
358d |
a47e598fbd86
dccp: fix data-race around dp->dccps_mss_cache
|
general protection fault in f2fs_drop_extent_tree
f2fs
|
C |
error |
done |
1 |
467d |
463d
|
23/28 |
358d |
458c15dfbce6
f2fs: don't reset unchangable mount option in f2fs_remount()
|
KCSAN: data-race in __ip4_datagram_connect / __ip_make_skb (5)
net
|
|
|
|
3 |
436d |
464d
|
23/28 |
358d |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
WARNING in mark_buffer_dirty (5)
nilfs
|
C |
done |
|
172 |
360d |
480d
|
23/28 |
358d |
cdaac8e7e5a0
nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse
|
KMSAN: uninit-value in udf_name_from_CS0
udf
|
|
|
|
1 |
471d |
471d
|
23/28 |
358d |
028f6055c912
udf: Fix uninitialized array access for some pathnames
|
INFO: rcu detected stall in statfs
fs
|
|
|
|
1 |
418d |
418d
|
23/28 |
358d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
WARNING in ieee80211_probe_client
wireless
|
C |
done |
error |
124 |
390d |
1459d
|
23/28 |
358d |
67dfa589aa88
wifi: mac80211: check for station first in client probe
|
general protection fault in skb_segment (3)
net
|
C |
done |
|
2 |
418d |
418d
|
23/28 |
358d |
b616be6b9768
net: do not allow gso_size to be set to GSO_BY_FRAGS
|
INFO: rcu detected stall in bond_3ad_state_machine_handler
net
|
|
|
|
1 |
435d |
435d
|
23/28 |
358d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
BUG: soft lockup in fq_pie_timer (4)
net
|
syz |
|
|
5 |
388d |
438d
|
23/28 |
358d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
UBSAN: array-index-out-of-bounds in dbAllocDmapLev
jfs
|
C |
error |
|
2 |
478d |
651d
|
23/28 |
358d |
4e302336d5ca
fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev
|
INFO: rcu detected stall in nsim_dev_trap_report_work
net
|
syz |
|
|
4 |
393d |
436d
|
23/28 |
358d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
WARNING in rtnl_dellink (3)
net
|
C |