syzbot


BUG: sleeping function called from invalid context in lock_sock_nested (3)

Status: upstream: reported C repro on 2024/05/13 12:58
Subsystems: bluetooth
[Documentation on labels]
Reported-by: syzbot+55cd5225f71c5cff7f6f@syzkaller.appspotmail.com
First crash: 471d, last: 12d
Cause bisection: the issue happens on the oldest tested release (bisect log)
Crash: BUG: sleeping function called from invalid context in lock_sock_nested (log)
Repro: C syz .config
  
Fix bisection: failed (error log, bisect log)
  
Discussions (7)
Title Replies (including bot) Last reply
[syzbot] [bluetooth?] BUG: sleeping function called from invalid context in lock_sock_nested (3) 2 (6) 2025/07/28 13:12
[syzbot] Monthly bluetooth report (Mar 2025) 0 (1) 2025/03/20 23:48
[syzbot] Monthly bluetooth report (Jan 2025) 0 (1) 2025/01/17 10:35
[syzbot] Monthly bluetooth report (Dec 2024) 0 (1) 2024/12/17 09:47
[syzbot] Monthly bluetooth report (Nov 2024) 0 (1) 2024/11/15 14:41
[syzbot] Monthly bluetooth report (Oct 2024) 0 (1) 2024/10/15 08:33
[syzbot] Monthly bluetooth report (Sep 2024) 0 (1) 2024/09/14 10:58
Similar bugs (31)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: sleeping function called from invalid context in lock_sock_nested (2) 5 C done 3909 1442d 1535d 1/1 fixed on 2021/10/12 13:38
upstream BUG: sleeping function called from invalid context in lock_sock_nested (2) bluetooth 5 C done error 19391 1473d 2009d 20/29 fixed on 2021/11/10 13:22
linux-4.14 BUG: sleeping function called from invalid context in lock_sock_nested 5 1 2244d 2244d 0/1 auto-closed as invalid on 2019/10/30 11:24
linux-6.1 BUG: sleeping function called from invalid context in lock_sock_nested (2) origin:upstream missing-backport 24 C error 7 4d08h 182d 0/3 upstream: reported C repro on 2025/02/23 00:56
linux-4.14 BUG: sleeping function called from invalid context in lock_sock_nested (2) 5 syz done 1 2029d 2089d 1/1 fixed on 2020/03/04 10:17
linux-4.19 BUG: sleeping function called from invalid context in lock_sock_nested 5 syz done 1 2059d 2089d 1/1 fixed on 2020/02/05 13:33
linux-6.1 BUG: sleeping function called from invalid context in lock_sock_nested 5 7 400d 420d 0/3 auto-obsoleted due to no activity on 2024/10/28 05:57
upstream BUG: sleeping function called from invalid context in lock_sock_nested bpf net 5 C 1232 2013d 2089d 15/29 fixed on 2020/02/18 14:31
linux-4.14 BUG: sleeping function called from invalid context in lock_sock_nested (3) 5 syz error 144 1029d 1535d 0/1 upstream: reported syz repro on 2021/06/10 20:33
linux-5.15 BUG: sleeping function called from invalid context in lock_sock_nested missing-backport origin:upstream 19 C error 23 4d07h 420d 0/3 upstream: reported C repro on 2024/06/29 07:50
upstream BUG: unable to handle kernel paging request in lock_sock_nested bluetooth 17 43 1404d 1844d 0/29 auto-closed as invalid on 2022/02/16 22:16
linux-4.19 KASAN: wild-memory-access Write in lock_sock_nested 23 2 1668d 1737d 0/1 auto-closed as invalid on 2021/05/28 14:35
linux-4.14 general protection fault in lock_sock_nested 2 4 1569d 1787d 0/1 auto-closed as invalid on 2021/09/04 19:35
linux-4.19 KASAN: use-after-free Read in lock_sock_nested 23 C 471 907d 2220d 0/1 upstream: reported C repro on 2019/07/26 21:27
linux-4.14 KASAN: use-after-free Read in lock_sock_nested 19 C inconclusive 331 947d 2314d 0/1 upstream: reported C repro on 2019/04/24 06:28
upstream KASAN: use-after-free Read in lock_sock_nested hams 19 C inconclusive done 1856 816d 2425d 0/29 auto-obsoleted due to no activity on 2023/08/23 09:06
upstream general protection fault in lock_sock_nested bluetooth 19 C done done 3215 55m 712d 0/29 upstream: reported C repro on 2023/09/11 07:52
linux-5.15 general protection fault in lock_sock_nested missing-backport origin:upstream 8 C error 141 5d19h 506d 0/3 upstream: reported C repro on 2024/04/04 13:25
linux-4.14 BUG: unable to handle kernel paging request in lock_sock_nested 8 4 1562d 1682d 0/1 auto-closed as invalid on 2021/09/11 11:51
linux-6.1 general protection fault in lock_sock_nested origin:upstream 19 C 151 3d13h 496d 0/3 upstream: reported C repro on 2024/04/14 08:46
upstream KASAN: slab-out-of-bounds Read in lock_sock_nested bluetooth 17 syz unreliable done 23 1398d 1838d 0/29 auto-obsoleted due to no activity on 2022/09/29 10:19
linux-4.19 KASAN: slab-out-of-bounds Read in lock_sock_nested 23 14 1081d 1745d 0/1 auto-obsoleted due to no activity on 2023/01/05 15:59
linux-6.6 general protection fault in lock_sock_nested 2 7 31d 66d 0/2 upstream: reported on 2025/06/19 04:51
linux-5.15 KASAN: use-after-free Read in __lock_sock 19 16 257d 323d 0/3 auto-obsoleted due to no activity on 2025/02/17 16:37
upstream KASAN: slab-use-after-free Read in __lock_sock bluetooth 19 C 1 640d 640d 0/29 auto-obsoleted due to no activity on 2024/03/01 14:18
upstream KASAN: use-after-free Read in __lock_sock sctp 19 syz done error 26 1656d 2471d 20/29 fixed on 2022/03/08 16:11
linux-6.6 KASAN: slab-use-after-free Read in __lock_sock origin:upstream 19 C 6 32d 37d 0/2 upstream: reported C repro on 2025/07/17 21:41
linux-5.15 KASAN: use-after-free Read in __lock_sock (2) 19 1 139d 139d 0/3 auto-obsoleted due to no activity on 2025/07/15 20:45
upstream KASAN: slab-use-after-free Read in __lock_sock (2) bluetooth 19 C 5 419d 433d 0/29 auto-obsoleted due to no activity on 2024/10/08 16:07
linux-6.1 KASAN: use-after-free Read in __lock_sock origin:upstream 19 C 1 21d 21d 0/3 upstream: reported C repro on 2025/08/03 04:51
linux-5.15 KASAN: use-after-free Read in __lock_sock (3) origin:upstream 19 C 5 13d 31d 0/3 upstream: reported C repro on 2025/07/23 10:25
Last patch testing requests (12)
Created Duration User Patch Repo Result
2025/08/11 10:15 23m retest repro bpf report log
2025/08/11 10:15 21m retest repro bpf report log
2025/08/11 10:15 27m retest repro bpf report log
2025/08/11 10:15 18m retest repro bpf report log
2025/08/11 10:15 26m retest repro bpf report log
2025/07/28 13:12 2h29m aha310510@gmail.com upstream OK log
2025/06/19 14:53 28m retest repro linux-next OK log
2025/06/19 13:44 0m retest repro upstream error
2025/06/19 13:44 0m retest repro upstream error
2025/06/19 13:44 0m retest repro upstream error
2025/06/19 13:44 0m retest repro upstream error
2024/06/29 11:33 1h38m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 6c0483dbfe72 OK log

Sample crash report:
BUG: sleeping function called from invalid context at net/core/sock.c:3536
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5092, name: kworker/u9:2
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
6 locks held by kworker/u9:2/5092:
 #0: ffff888021bc4148 ((wq_completion)hci1#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3206 [inline]
 #0: ffff888021bc4148 ((wq_completion)hci1#2){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 kernel/workqueue.c:3312
 #1: ffffc900036afd00 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3207 [inline]
 #1: ffffc900036afd00 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 kernel/workqueue.c:3312
 #2: ffff888023958078 (&hdev->lock){+.+.}-{3:3}, at: hci_sync_conn_complete_evt+0xb1/0xaa0 net/bluetooth/hci_event.c:4926
 #3: ffffffff8f744688 (hci_cb_list_lock){+.+.}-{3:3}, at: hci_connect_cfm include/net/bluetooth/hci_core.h:1967 [inline]
 #3: ffffffff8f744688 (hci_cb_list_lock){+.+.}-{3:3}, at: hci_sync_conn_complete_evt+0x532/0xaa0 net/bluetooth/hci_event.c:5009
 #4: ffff88807ed84020 (&conn->lock#2){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #4: ffff88807ed84020 (&conn->lock#2){+.+.}-{2:2}, at: sco_conn_ready net/bluetooth/sco.c:1277 [inline]
 #4: ffff88807ed84020 (&conn->lock#2){+.+.}-{2:2}, at: sco_connect_cfm+0x28a/0xb40 net/bluetooth/sco.c:1362
 #5: ffff88807538e258 (sk_lock-AF_BLUETOOTH-BTPROTO_SCO){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1602 [inline]
 #5: ffff88807538e258 (sk_lock-AF_BLUETOOTH-BTPROTO_SCO){+.+.}-{0:0}, at: sco_conn_ready net/bluetooth/sco.c:1290 [inline]
 #5: ffff88807538e258 (sk_lock-AF_BLUETOOTH-BTPROTO_SCO){+.+.}-{0:0}, at: sco_connect_cfm+0x461/0xb40 net/bluetooth/sco.c:1362
Preemption disabled at:
[<0000000000000000>] 0x0
CPU: 1 PID: 5092 Comm: kworker/u9:2 Not tainted 6.10.0-syzkaller-01193-g408323581b72 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
Workqueue: hci1 hci_rx_work
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 __might_resched+0x5d4/0x780 kernel/sched/core.c:10199
 lock_sock_nested+0x5d/0x100 net/core/sock.c:3536
 lock_sock include/net/sock.h:1602 [inline]
 sco_conn_ready net/bluetooth/sco.c:1290 [inline]
 sco_connect_cfm+0x461/0xb40 net/bluetooth/sco.c:1362
 hci_connect_cfm include/net/bluetooth/hci_core.h:1970 [inline]
 hci_sync_conn_complete_evt+0x5ab/0xaa0 net/bluetooth/hci_event.c:5009
 hci_event_func net/bluetooth/hci_event.c:7444 [inline]
 hci_event_packet+0xac0/0x1540 net/bluetooth/hci_event.c:7496
 hci_rx_work+0x3e8/0xca0 net/bluetooth/hci_core.c:4042
 process_one_work kernel/workqueue.c:3231 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
 worker_thread+0x86d/0xd40 kernel/workqueue.c:3390
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
==================================================================
BUG: KASAN: slab-use-after-free in __lock_acquire+0x78/0x1fd0 kernel/locking/lockdep.c:5005
Read of size 8 at addr ffff88807538e1d8 by task kworker/u9:2/5092

CPU: 1 PID: 5092 Comm: kworker/u9:2 Tainted: G        W          6.10.0-syzkaller-01193-g408323581b72 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
Workqueue: hci1 hci_rx_work
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 __lock_acquire+0x78/0x1fd0 kernel/locking/lockdep.c:5005
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
 _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
 spin_lock_bh include/linux/spinlock.h:356 [inline]
 lock_sock_nested+0x6a/0x100 net/core/sock.c:3537
 lock_sock include/net/sock.h:1602 [inline]
 sco_conn_ready net/bluetooth/sco.c:1290 [inline]
 sco_connect_cfm+0x461/0xb40 net/bluetooth/sco.c:1362
 hci_connect_cfm include/net/bluetooth/hci_core.h:1970 [inline]
 hci_sync_conn_complete_evt+0x5ab/0xaa0 net/bluetooth/hci_event.c:5009
 hci_event_func net/bluetooth/hci_event.c:7444 [inline]
 hci_event_packet+0xac0/0x1540 net/bluetooth/hci_event.c:7496
 hci_rx_work+0x3e8/0xca0 net/bluetooth/hci_core.c:4042
 process_one_work kernel/workqueue.c:3231 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
 worker_thread+0x86d/0xd40 kernel/workqueue.c:3390
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>

Allocated by task 5113:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
 __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
 kasan_kmalloc include/linux/kasan.h:211 [inline]
 __do_kmalloc_node mm/slub.c:4123 [inline]
 __kmalloc_noprof+0x1f9/0x400 mm/slub.c:4136
 kmalloc_noprof include/linux/slab.h:664 [inline]
 sk_prot_alloc+0xe0/0x210 net/core/sock.c:2080
 sk_alloc+0x38/0x370 net/core/sock.c:2133
 bt_sock_alloc+0x3c/0x340 net/bluetooth/af_bluetooth.c:148
 sco_sock_alloc net/bluetooth/sco.c:500 [inline]
 sco_sock_create+0xbb/0x390 net/bluetooth/sco.c:531
 bt_sock_create+0x161/0x230 net/bluetooth/af_bluetooth.c:132
 __sock_create+0x490/0x920 net/socket.c:1571
 sock_create net/socket.c:1622 [inline]
 __sys_socket_create net/socket.c:1659 [inline]
 __sys_socket+0x150/0x3c0 net/socket.c:1706
 __do_sys_socket net/socket.c:1720 [inline]
 __se_sys_socket net/socket.c:1718 [inline]
 __x64_sys_socket+0x7a/0x90 net/socket.c:1718
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 5113:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2196 [inline]
 slab_free mm/slub.c:4438 [inline]
 kfree+0x149/0x360 mm/slub.c:4559
 sk_prot_free net/core/sock.c:2116 [inline]
 __sk_destruct+0x476/0x5f0 net/core/sock.c:2208
 sco_sock_release+0x25e/0x320 net/bluetooth/sco.c:1259
 __sock_release net/socket.c:659 [inline]
 sock_close+0xbc/0x240 net/socket.c:1421
 __fput+0x24a/0x8a0 fs/file_table.c:422
 __do_sys_close fs/open.c:1566 [inline]
 __se_sys_close fs/open.c:1551 [inline]
 __x64_sys_close+0x7f/0x110 fs/open.c:1551
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The buggy address belongs to the object at ffff88807538e000
 which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 472 bytes inside of
 freed 2048-byte region [ffff88807538e000, ffff88807538e800)

The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x75388
head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
page_type: 0xffffefff(slab)
raw: 00fff00000000040 ffff888015042000 dead000000000122 0000000000000000
raw: 0000000000000000 0000000000080008 00000001ffffefff 0000000000000000
head: 00fff00000000040 ffff888015042000 dead000000000122 0000000000000000
head: 0000000000000000 0000000000080008 00000001ffffefff 0000000000000000
head: 00fff00000000003 ffffea0001d4e201 ffffffffffffffff 0000000000000000
head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5085, tgid 5085 (syz-executor289), ts 61801569049, free_ts 14985715302
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x1f3/0x230 mm/page_alloc.c:1473
 prep_new_page mm/page_alloc.c:1481 [inline]
 get_page_from_freelist+0x2e4c/0x2f10 mm/page_alloc.c:3425
 __alloc_pages_noprof+0x256/0x6c0 mm/page_alloc.c:4683
 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline]
 alloc_pages_node_noprof include/linux/gfp.h:296 [inline]
 alloc_slab_page+0x5f/0x120 mm/slub.c:2265
 allocate_slab+0x5a/0x2f0 mm/slub.c:2428
 new_slab mm/slub.c:2481 [inline]
 ___slab_alloc+0xcd1/0x14b0 mm/slub.c:3667
 __slab_alloc+0x58/0xa0 mm/slub.c:3757
 __slab_alloc_node mm/slub.c:3810 [inline]
 slab_alloc_node mm/slub.c:3990 [inline]
 kmalloc_trace_noprof+0x1d5/0x2c0 mm/slub.c:4149
 kmalloc_noprof include/linux/slab.h:660 [inline]
 kzalloc_noprof include/linux/slab.h:778 [inline]
 rxrpc_alloc_connection+0x7b/0x560 net/rxrpc/conn_object.c:62
 rxrpc_prealloc_service_connection+0x26/0x300 net/rxrpc/conn_service.c:123
 rxrpc_service_prealloc_one+0x2cb/0xd70 net/rxrpc/call_accept.c:87
 rxrpc_kernel_charge_accept+0xd2/0x100 net/rxrpc/call_accept.c:475
 afs_charge_preallocation+0xba/0x2c0 fs/afs/rxrpc.c:712
 afs_open_socket+0x459/0x610 fs/afs/rxrpc.c:94
 afs_net_init+0x7b9/0x9a0 fs/afs/main.c:123
 ops_init+0x359/0x610 net/core/net_namespace.c:139
page last free pid 1 tgid 1 stack trace:
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1093 [inline]
 free_unref_page+0xd19/0xea0 mm/page_alloc.c:2588
 free_contig_range+0x9e/0x160 mm/page_alloc.c:6642
 destroy_args+0x8a/0x890 mm/debug_vm_pgtable.c:1017
 debug_vm_pgtable+0x4be/0x550 mm/debug_vm_pgtable.c:1397
 do_one_initcall+0x248/0x880 init/main.c:1267
 do_initcall_level+0x157/0x210 init/main.c:1329
 do_initcalls+0x3f/0x80 init/main.c:1345
 kernel_init_freeable+0x435/0x5d0 init/main.c:1578
 kernel_init+0x1d/0x2b0 init/main.c:1467
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

Memory state around the buggy address:
 ffff88807538e080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff88807538e100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff88807538e180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                    ^
 ffff88807538e200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff88807538e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================

Crashes (152):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/07/17 06:24 upstream 408323581b72 215bec2d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/17 02:35 upstream 408323581b72 215bec2d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/06/29 08:26 upstream 6c0483dbfe72 757f06b1 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/08 20:48 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 77c95b8c7a16 7e3bd60d .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/04 19:47 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/04 18:55 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/07/22 00:03 bpf 7abc678e3084 0b3788a0 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/21 17:13 bpf 7abc678e3084 0b3788a0 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/21 03:47 bpf 7abc678e3084 7117feec .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/21 01:56 bpf 7abc678e3084 7117feec .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/20 19:53 bpf 7abc678e3084 7117feec .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/20 10:08 bpf 7abc678e3084 7117feec .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/28 05:17 bpf-next 5345e64760d3 fb8f743d .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/06/30 16:55 bpf-next c4b1be928ea0 fc9d8ee5 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2024/10/29 03:50 upstream 819837584309 9efb3cc7 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/16 15:02 upstream 31d7109a19f6 e2826670 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/09 15:14 upstream 1110ce6a1e34 163f510d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/03 10:12 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/24 01:13 upstream d0d106a2bd21 f6a35ef3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/21 07:58 upstream 43fb83c17ba2 4b25d554 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/17 04:06 upstream 4a5df3796467 cfe3a04a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/08/26 01:11 upstream 5be63fc19fca d7d32352 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/08/01 13:02 upstream 21b136cc63d2 1e9c4cf3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/21 09:50 upstream 2c9b3512402e b88348e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/20 14:20 upstream d7e78951a8b8 b88348e9 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/20 12:35 upstream d7e78951a8b8 b88348e9 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/20 10:50 upstream d7e78951a8b8 b88348e9 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/26 22:32 upstream 1e26c5e28ca5 19e40f48 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/26 22:32 upstream 1e26c5e28ca5 19e40f48 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/25 00:14 upstream 38fec10eb60d 875573af .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/24 21:28 upstream 38fec10eb60d 875573af .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/24 20:45 upstream 38fec10eb60d 875573af .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/23 19:43 upstream 586de92313fc 4e8d3850 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/23 19:11 upstream 586de92313fc 4e8d3850 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/23 07:22 upstream 183601b78a9b 4e8d3850 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/22 15:24 upstream 88d324e69ea9 c6512ef7 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/21 03:24 upstream 5fc319360819 62330552 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/19 16:09 upstream 81e4f8d68c66 8d0a2921 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/17 08:41 upstream 4701f33a1070 948c34e4 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/12 08:10 upstream 0b46b049d6ec ee70e6db .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/08 18:51 upstream 2a520073e74f 7e3bd60d .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/27 18:01 upstream dd83757f6e68 6a8fcbc4 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/21 12:43 upstream 334426094588 0808a665 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/05 09:17 upstream 5c8c229261f1 5896748e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/04 17:56 upstream 0de63bb7d919 44c01590 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/03 05:07 upstream 69e858e0b8b2 568559e4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/03 03:42 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/01 07:09 upstream 69e858e0b8b2 aa47157c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/29 20:19 upstream 805ba04cb7cc d03b0c97 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/15 16:40 upstream 619f0b6fad52 968edaf4 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/12 09:05 upstream b62cef9a5c67 6dbc6a9b .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/09 19:51 upstream eea6e4b4dfb8 9220929f .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/09 19:51 upstream eea6e4b4dfb8 9220929f .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/05 18:32 upstream ab75170520d4 f3558dbf .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/30 01:27 upstream 4099a71718b0 d3ccff63 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/26 03:19 upstream 9b2ffa6148b1 444551c4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/25 22:13 upstream 9b2ffa6148b1 444551c4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/25 16:06 upstream 9b2ffa6148b1 444551c4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/22 17:10 upstream 48f506ad0b68 b4fbdbd4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/21 07:12 upstream e9b8ffafd20a d7f584ee .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/19 21:32 upstream baaa2567a712 1d58202c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/19 14:19 upstream eabcdba3ad40 1d58202c .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/19 00:53 upstream aef25be35d23 1432fc84 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/09 08:47 upstream 62b5a46999c7 9ac0fdc6 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/02 18:33 upstream e70140ba0d2b b499ea68 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/19 07:16 upstream 9fb2cfa4635a 571351cb .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/14 09:39 upstream 0a9b9d17f3a7 a8c99394 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/13 10:48 upstream 3022e9d00ebe 62026c85 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/11 10:13 upstream 2d5404caa8c7 0c4b1325 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/08 06:31 upstream 906bd684e4b1 179b040e .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/03 22:29 upstream b9021de3ec2f f00eed24 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/03 01:02 upstream 11066801dd4b f00eed24 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/30 20:05 upstream c1e939a21eb1 f3a00767 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/28 21:51 upstream 819837584309 9efb3cc7 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/25 01:16 upstream 4e46774408d9 c79b8ca5 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/22 10:42 upstream c2ee9f594da8 a93682b3 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/06 18:34 upstream 92514ef226f5 1e1faf27 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/12 17:27 upstream b62cef9a5c67 6dbc6a9b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in lock_sock_nested
2024/08/21 18:45 linux-next eb8c5ca373cb db5852f9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/21 02:18 linux-next 41c196e567fb b88348e9 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/26 14:35 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a1c24ab82279 d34966d1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/02 04:54 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1950a0af2d55 0dff8567 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2024/05/09 12:54 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1c9135d29e9e 20bf80e1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/07/08 02:38 upstream d7b8f8e20813 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root KASAN: slab-use-after-free Read in __lock_sock
2025/07/05 02:57 upstream 4c06e63b9203 d869b261 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root KASAN: slab-use-after-free Read in __lock_sock
2025/07/28 09:40 bpf-next 5345e64760d3 fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
* Struck through repros no longer work on HEAD.