syzbot


BUG: sleeping function called from invalid context in lock_sock_nested (3)

Status: upstream: reported C repro on 2024/05/13 12:58
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+55cd5225f71c5cff7f6f@syzkaller.appspotmail.com
First crash: 517d, last: 35d
Cause bisection: the issue happens on the oldest tested release (bisect log)
Crash: BUG: sleeping function called from invalid context in lock_sock_nested (log)
Repro: C syz .config
  
Fix bisection: failed (error log, bisect log)
  
Discussions (7)
Title Replies (including bot) Last reply
[syzbot] [bluetooth?] BUG: sleeping function called from invalid context in lock_sock_nested (3) 2 (6) 2025/07/28 13:12
[syzbot] Monthly bluetooth report (Mar 2025) 0 (1) 2025/03/20 23:48
[syzbot] Monthly bluetooth report (Jan 2025) 0 (1) 2025/01/17 10:35
[syzbot] Monthly bluetooth report (Dec 2024) 0 (1) 2024/12/17 09:47
[syzbot] Monthly bluetooth report (Nov 2024) 0 (1) 2024/11/15 14:41
[syzbot] Monthly bluetooth report (Oct 2024) 0 (1) 2024/10/15 08:33
[syzbot] Monthly bluetooth report (Sep 2024) 0 (1) 2024/09/14 10:58
Similar bugs (31)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: sleeping function called from invalid context in lock_sock_nested (2) 5 C done 3909 1488d 1581d 1/1 fixed on 2021/10/12 13:38
upstream BUG: sleeping function called from invalid context in lock_sock_nested (2) bluetooth 5 C done error 19391 1519d 2055d 20/29 fixed on 2021/11/10 13:22
linux-4.14 BUG: sleeping function called from invalid context in lock_sock_nested 5 1 2290d 2290d 0/1 auto-closed as invalid on 2019/10/30 11:24
linux-6.1 BUG: sleeping function called from invalid context in lock_sock_nested (2) origin:upstream missing-backport 24 C error 7 50d 228d 0/3 upstream: reported C repro on 2025/02/23 00:56
linux-4.14 BUG: sleeping function called from invalid context in lock_sock_nested (2) 5 syz done 1 2074d 2135d 1/1 fixed on 2020/03/04 10:17
linux-4.19 BUG: sleeping function called from invalid context in lock_sock_nested 5 syz done 1 2104d 2134d 1/1 fixed on 2020/02/05 13:33
linux-6.1 BUG: sleeping function called from invalid context in lock_sock_nested 5 7 445d 466d 0/3 auto-obsoleted due to no activity on 2024/10/28 05:57
upstream BUG: sleeping function called from invalid context in lock_sock_nested bpf net 5 C 1232 2059d 2134d 15/29 fixed on 2020/02/18 14:31
linux-4.14 BUG: sleeping function called from invalid context in lock_sock_nested (3) 5 syz error 144 1075d 1581d 0/1 upstream: reported syz repro on 2021/06/10 20:33
linux-5.15 BUG: sleeping function called from invalid context in lock_sock_nested missing-backport origin:upstream 19 C error 23 50d 466d 0/3 upstream: reported C repro on 2024/06/29 07:50
upstream BUG: unable to handle kernel paging request in lock_sock_nested bluetooth 17 43 1450d 1890d 0/29 auto-closed as invalid on 2022/02/16 22:16
linux-4.19 KASAN: wild-memory-access Write in lock_sock_nested 23 2 1714d 1783d 0/1 auto-closed as invalid on 2021/05/28 14:35
linux-4.14 general protection fault in lock_sock_nested 2 4 1615d 1833d 0/1 auto-closed as invalid on 2021/09/04 19:35
linux-4.19 KASAN: use-after-free Read in lock_sock_nested 23 C 471 952d 2266d 0/1 upstream: reported C repro on 2019/07/26 21:27
linux-4.14 KASAN: use-after-free Read in lock_sock_nested 19 C inconclusive 331 993d 2359d 0/1 upstream: reported C repro on 2019/04/24 06:28
upstream KASAN: use-after-free Read in lock_sock_nested hams 19 C inconclusive done 1856 862d 2471d 0/29 auto-obsoleted due to no activity on 2023/08/23 09:06
upstream general protection fault in lock_sock_nested bluetooth 19 C done done 3502 1h21m 758d 0/29 upstream: reported C repro on 2023/09/11 07:52
linux-5.15 general protection fault in lock_sock_nested missing-backport origin:upstream 8 C error 143 1d19h 552d 0/3 upstream: reported C repro on 2024/04/04 13:25
linux-4.14 BUG: unable to handle kernel paging request in lock_sock_nested 8 4 1608d 1727d 0/1 auto-closed as invalid on 2021/09/11 11:51
linux-6.1 general protection fault in lock_sock_nested origin:upstream missing-backport 19 C inconclusive 164 4d08h 542d 0/3 upstream: reported C repro on 2024/04/14 08:46
upstream KASAN: slab-out-of-bounds Read in lock_sock_nested bluetooth 17 syz unreliable done 23 1444d 1884d 0/29 auto-obsoleted due to no activity on 2022/09/29 10:19
linux-4.19 KASAN: slab-out-of-bounds Read in lock_sock_nested 23 14 1127d 1791d 0/1 auto-obsoleted due to no activity on 2023/01/05 15:59
linux-6.6 general protection fault in lock_sock_nested origin:upstream 2 syz 19 1d15h 111d 0/2 upstream: reported syz repro on 2025/06/19 04:51
linux-5.15 KASAN: use-after-free Read in __lock_sock 19 16 303d 368d 0/3 auto-obsoleted due to no activity on 2025/02/17 16:37
upstream KASAN: slab-use-after-free Read in __lock_sock bluetooth 19 C 1 686d 686d 0/29 auto-obsoleted due to no activity on 2024/03/01 14:18
upstream KASAN: use-after-free Read in __lock_sock sctp 19 syz done error 26 1702d 2517d 20/29 fixed on 2022/03/08 16:11
linux-6.6 KASAN: slab-use-after-free Read in __lock_sock origin:upstream missing-backport 19 C error 6 78d 83d 0/2 upstream: reported C repro on 2025/07/17 21:41
linux-5.15 KASAN: use-after-free Read in __lock_sock (2) 19 1 185d 185d 0/3 auto-obsoleted due to no activity on 2025/07/15 20:45
upstream KASAN: slab-use-after-free Read in __lock_sock (2) bluetooth 19 C 5 465d 479d 0/29 auto-obsoleted due to no activity on 2024/10/08 16:07
linux-6.1 KASAN: use-after-free Read in __lock_sock origin:upstream missing-backport 19 C 1 17d 66d 0/3 upstream: reported C repro on 2025/08/03 04:51
linux-5.15 KASAN: use-after-free Read in __lock_sock (3) origin:upstream 19 C 7 3d14h 77d 0/3 upstream: reported C repro on 2025/07/23 10:25
Last patch testing requests (12)
Created Duration User Patch Repo Result
2025/09/17 16:59 22m retest repro upstream OK log
2025/09/17 16:59 24m retest repro upstream OK log
2025/09/17 16:59 24m retest repro upstream OK log
2025/09/17 16:59 22m retest repro upstream OK log
2025/09/17 14:34 26m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci OK log
2025/09/17 14:34 27m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci OK log
2025/09/17 14:34 1h17m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci OK log
2025/08/25 21:31 57m retest repro bpf-next report log
2025/08/25 21:31 38m retest repro bpf report log
2025/08/25 21:31 16m retest repro bpf-next report log
2025/07/28 13:12 2h29m aha310510@gmail.com upstream OK log
2024/06/29 11:33 1h38m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 6c0483dbfe72 OK log

Sample crash report:
==================================================================
BUG: KASAN: slab-use-after-free in __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
BUG: KASAN: slab-use-after-free in _raw_spin_lock_bh+0x36/0x50 kernel/locking/spinlock.c:178
Read of size 1 at addr ffff8880781f90d8 by task kworker/u8:0/12

CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: kkcmd kcm_tx_work
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x230 mm/kasan/report.c:480
 kasan_report+0x118/0x150 mm/kasan/report.c:593
 __kasan_check_byte+0x2a/0x40 mm/kasan/common.c:557
 kasan_check_byte include/linux/kasan.h:399 [inline]
 lock_acquire+0x8d/0x360 kernel/locking/lockdep.c:5845
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
 _raw_spin_lock_bh+0x36/0x50 kernel/locking/spinlock.c:178
 spin_lock_bh include/linux/spinlock.h:356 [inline]
 __lock_sock+0x156/0x2b0 net/core/sock.c:3190
 lock_sock_nested+0x9f/0x100 net/core/sock.c:3757
 lock_sock include/net/sock.h:1667 [inline]
 kcm_tx_work+0x31/0x180 net/kcm/kcmsock.c:717
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>

Allocated by task 6297:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 unpoison_slab_object mm/kasan/common.c:319 [inline]
 __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:345
 kasan_slab_alloc include/linux/kasan.h:250 [inline]
 slab_post_alloc_hook mm/slub.c:4148 [inline]
 slab_alloc_node mm/slub.c:4197 [inline]
 kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4204
 sk_prot_alloc+0x57/0x220 net/core/sock.c:2241
 sk_alloc+0x3a/0x370 net/core/sock.c:2303
 kcm_clone net/kcm/kcmsock.c:1519 [inline]
 kcm_ioctl+0x214/0xff0 net/kcm/kcmsock.c:1564
 sock_do_ioctl+0xd9/0x300 net/socket.c:1190
 sock_ioctl+0x576/0x790 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 6299:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2381 [inline]
 slab_free mm/slub.c:4643 [inline]
 kmem_cache_free+0x18f/0x400 mm/slub.c:4745
 sk_prot_free net/core/sock.c:2284 [inline]
 __sk_destruct+0x4d2/0x660 net/core/sock.c:2381
 kcm_release+0x528/0x5c0 net/kcm/kcmsock.c:1731
 __sock_release net/socket.c:647 [inline]
 sock_close+0xc0/0x240 net/socket.c:1391
 __fput+0x44c/0xa70 fs/file_table.c:465
 fput_close_sync+0x119/0x200 fs/file_table.c:570
 __do_sys_close fs/open.c:1589 [inline]
 __se_sys_close fs/open.c:1574 [inline]
 __x64_sys_close+0x7f/0x110 fs/open.c:1574
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Last potentially related work creation:
 kasan_save_stack+0x3e/0x60 mm/kasan/common.c:47
 kasan_record_aux_stack+0xbd/0xd0 mm/kasan/generic.c:548
 insert_work+0x3d/0x330 kernel/workqueue.c:2183
 __queue_work+0xcfc/0xfe0 kernel/workqueue.c:2341
 queue_work_on+0x181/0x270 kernel/workqueue.c:2392
 queue_work include/linux/workqueue.h:662 [inline]
 kcm_unattach+0x863/0xe90 net/kcm/kcmsock.c:1428
 kcm_unattach_ioctl net/kcm/kcmsock.c:1485 [inline]
 kcm_ioctl+0x794/0xff0 net/kcm/kcmsock.c:1552
 sock_do_ioctl+0xd9/0x300 net/socket.c:1190
 sock_ioctl+0x576/0x790 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Second to last potentially related work creation:
 kasan_save_stack+0x3e/0x60 mm/kasan/common.c:47
 kasan_record_aux_stack+0xbd/0xd0 mm/kasan/generic.c:548
 insert_work+0x3d/0x330 kernel/workqueue.c:2183
 __queue_work+0xcfc/0xfe0 kernel/workqueue.c:2341
 queue_work_on+0x181/0x270 kernel/workqueue.c:2392
 kcm_attach net/kcm/kcmsock.c:1308 [inline]
 kcm_attach_ioctl net/kcm/kcmsock.c:1336 [inline]
 kcm_ioctl+0xe52/0xff0 net/kcm/kcmsock.c:1542
 sock_do_ioctl+0xd9/0x300 net/socket.c:1190
 sock_ioctl+0x576/0x790 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The buggy address belongs to the object at ffff8880781f8f00
 which belongs to the cache KCM of size 1792
The buggy address is located 472 bytes inside of
 freed 1792-byte region [ffff8880781f8f00, ffff8880781f9600)

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x781f8
head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
memcg:ffff88807d6b8901
flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
page_type: f5(slab)
raw: 00fff00000000040 ffff88814c68a8c0 dead000000000122 0000000000000000
raw: 0000000000000000 0000000080110011 00000000f5000000 ffff88807d6b8901
head: 00fff00000000040 ffff88814c68a8c0 dead000000000122 0000000000000000
head: 0000000000000000 0000000080110011 00000000f5000000 ffff88807d6b8901
head: 00fff00000000003 ffffea0001e07e01 00000000ffffffff 00000000ffffffff
head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 6286, tgid 6283 (syz.0.62), ts 114410927985, free_ts 114400669262
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1704
 prep_new_page mm/page_alloc.c:1712 [inline]
 get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3669
 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:4959
 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2419
 alloc_slab_page mm/slub.c:2451 [inline]
 allocate_slab+0x8a/0x3b0 mm/slub.c:2619
 new_slab mm/slub.c:2673 [inline]
 ___slab_alloc+0xbfc/0x1480 mm/slub.c:3859
 __slab_alloc mm/slub.c:3949 [inline]
 __slab_alloc_node mm/slub.c:4024 [inline]
 slab_alloc_node mm/slub.c:4185 [inline]
 kmem_cache_alloc_noprof+0x283/0x3c0 mm/slub.c:4204
 sk_prot_alloc+0x57/0x220 net/core/sock.c:2241
 sk_alloc+0x3a/0x370 net/core/sock.c:2303
 kcm_clone net/kcm/kcmsock.c:1519 [inline]
 kcm_ioctl+0x214/0xff0 net/kcm/kcmsock.c:1564
 sock_do_ioctl+0xd9/0x300 net/socket.c:1190
 sock_ioctl+0x576/0x790 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5217 tgid 5217 stack trace:
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1248 [inline]
 __free_frozen_pages+0xc71/0xe70 mm/page_alloc.c:2706
 discard_slab mm/slub.c:2717 [inline]
 __put_partials+0x161/0x1c0 mm/slub.c:3186
 put_cpu_partial+0x17c/0x250 mm/slub.c:3261
 __slab_free+0x2f7/0x400 mm/slub.c:4513
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286
 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:329
 kasan_slab_alloc include/linux/kasan.h:250 [inline]
 slab_post_alloc_hook mm/slub.c:4148 [inline]
 slab_alloc_node mm/slub.c:4197 [inline]
 __do_kmalloc_node mm/slub.c:4327 [inline]
 __kmalloc_noprof+0x224/0x4f0 mm/slub.c:4340
 kmalloc_noprof include/linux/slab.h:909 [inline]
 tomoyo_realpath_from_path+0xe3/0x5d0 security/tomoyo/realpath.c:251
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_path_perm+0x213/0x4b0 security/tomoyo/file.c:822
 security_inode_getattr+0x12f/0x330 security/security.c:2377
 vfs_getattr fs/stat.c:259 [inline]
 vfs_fstat fs/stat.c:281 [inline]
 __do_sys_newfstat fs/stat.c:555 [inline]
 __se_sys_newfstat fs/stat.c:550 [inline]
 __x64_sys_newfstat+0xfc/0x200 fs/stat.c:550
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Memory state around the buggy address:
 ffff8880781f8f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff8880781f9000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff8880781f9080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                    ^
 ffff8880781f9100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff8880781f9180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================

Crashes (153):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/07/22 00:03 bpf 7abc678e3084 0b3788a0 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/21 17:13 bpf 7abc678e3084 0b3788a0 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/21 03:47 bpf 7abc678e3084 7117feec .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/21 01:56 bpf 7abc678e3084 7117feec .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/20 19:53 bpf 7abc678e3084 7117feec .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/20 10:08 bpf 7abc678e3084 7117feec .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/28 05:17 bpf-next 5345e64760d3 fb8f743d .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/06/30 16:55 bpf-next c4b1be928ea0 fc9d8ee5 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/03/16 15:02 upstream 31d7109a19f6 e2826670 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/09 15:14 upstream 1110ce6a1e34 163f510d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/03 10:12 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/24 01:13 upstream d0d106a2bd21 f6a35ef3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/21 07:58 upstream 43fb83c17ba2 4b25d554 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/17 04:06 upstream 4a5df3796467 cfe3a04a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/29 03:50 upstream 819837584309 9efb3cc7 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/08/26 01:11 upstream 5be63fc19fca d7d32352 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/08/01 13:02 upstream 21b136cc63d2 1e9c4cf3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/21 09:50 upstream 2c9b3512402e b88348e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/20 14:20 upstream d7e78951a8b8 b88348e9 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/20 12:35 upstream d7e78951a8b8 b88348e9 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/20 10:50 upstream d7e78951a8b8 b88348e9 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/17 06:24 upstream 408323581b72 215bec2d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/17 02:35 upstream 408323581b72 215bec2d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/06/29 08:26 upstream 6c0483dbfe72 757f06b1 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/26 22:32 upstream 1e26c5e28ca5 19e40f48 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/26 22:32 upstream 1e26c5e28ca5 19e40f48 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/25 00:14 upstream 38fec10eb60d 875573af .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/24 21:28 upstream 38fec10eb60d 875573af .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/24 20:45 upstream 38fec10eb60d 875573af .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/23 19:43 upstream 586de92313fc 4e8d3850 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/23 19:11 upstream 586de92313fc 4e8d3850 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/23 07:22 upstream 183601b78a9b 4e8d3850 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/22 15:24 upstream 88d324e69ea9 c6512ef7 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/21 03:24 upstream 5fc319360819 62330552 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/19 16:09 upstream 81e4f8d68c66 8d0a2921 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/17 08:41 upstream 4701f33a1070 948c34e4 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/12 08:10 upstream 0b46b049d6ec ee70e6db .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/08 18:51 upstream 2a520073e74f 7e3bd60d .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/27 18:01 upstream dd83757f6e68 6a8fcbc4 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/21 12:43 upstream 334426094588 0808a665 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/05 09:17 upstream 5c8c229261f1 5896748e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/04 17:56 upstream 0de63bb7d919 44c01590 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/03 05:07 upstream 69e858e0b8b2 568559e4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/03 03:42 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/01 07:09 upstream 69e858e0b8b2 aa47157c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/29 20:19 upstream 805ba04cb7cc d03b0c97 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/15 16:40 upstream 619f0b6fad52 968edaf4 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/12 09:05 upstream b62cef9a5c67 6dbc6a9b .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/09 19:51 upstream eea6e4b4dfb8 9220929f .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/09 19:51 upstream eea6e4b4dfb8 9220929f .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/05 18:32 upstream ab75170520d4 f3558dbf .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/30 01:27 upstream 4099a71718b0 d3ccff63 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/26 03:19 upstream 9b2ffa6148b1 444551c4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/25 22:13 upstream 9b2ffa6148b1 444551c4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/25 16:06 upstream 9b2ffa6148b1 444551c4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/22 17:10 upstream 48f506ad0b68 b4fbdbd4 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/21 07:12 upstream e9b8ffafd20a d7f584ee .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/19 21:32 upstream baaa2567a712 1d58202c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/19 14:19 upstream eabcdba3ad40 1d58202c .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/19 00:53 upstream aef25be35d23 1432fc84 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/09 08:47 upstream 62b5a46999c7 9ac0fdc6 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/12/02 18:33 upstream e70140ba0d2b b499ea68 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/19 07:16 upstream 9fb2cfa4635a 571351cb .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/14 09:39 upstream 0a9b9d17f3a7 a8c99394 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/13 10:48 upstream 3022e9d00ebe 62026c85 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/11 10:13 upstream 2d5404caa8c7 0c4b1325 .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/08 06:31 upstream 906bd684e4b1 179b040e .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/03 22:29 upstream b9021de3ec2f f00eed24 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/11/03 01:02 upstream 11066801dd4b f00eed24 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/30 20:05 upstream c1e939a21eb1 f3a00767 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/28 21:51 upstream 819837584309 9efb3cc7 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/25 01:16 upstream 4e46774408d9 c79b8ca5 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/10/22 10:42 upstream c2ee9f594da8 a93682b3 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/06 18:34 upstream 92514ef226f5 1e1faf27 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in lock_sock_nested
2025/01/12 17:27 upstream b62cef9a5c67 6dbc6a9b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: sleeping function called from invalid context in lock_sock_nested
2024/08/21 18:45 linux-next eb8c5ca373cb db5852f9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2024/07/21 02:18 linux-next 41c196e567fb b88348e9 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/08 20:48 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 77c95b8c7a16 7e3bd60d .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/04 19:47 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/03/04 18:55 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/26 14:35 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a1c24ab82279 d34966d1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/02/02 04:54 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1950a0af2d55 0dff8567 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2024/05/09 12:54 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1c9135d29e9e 20bf80e1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: sleeping function called from invalid context in lock_sock_nested
2025/07/08 02:38 upstream d7b8f8e20813 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root KASAN: slab-use-after-free Read in __lock_sock
2025/07/05 02:57 upstream 4c06e63b9203 d869b261 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root KASAN: slab-use-after-free Read in __lock_sock
2025/09/03 14:24 bpf 71ca59e23445 96a211bc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
2025/07/28 09:40 bpf-next 5345e64760d3 fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __lock_sock
* Struck through repros no longer work on HEAD.