syzbot


Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
general protection fault in em_cmp_match 2 C 1 989d 989d 1/1 959d b9b47801cef5 net_sched: reject TCF_EM_SIMPLE case for complex ematch module
KASAN: use-after-free Read in bcm_can_tx 19 C 2 1332d 1788d 1/1 1313d 632881680ba0 can: bcm: fix UAF of bcm op
general protection fault in ieee802154_llsec_parse_key_id 11 C done 101 1602d 1657d 1/1 1570d 37580e6837c0 net: ieee802154: nl-mac: fix check on panid
general protection fault in nl802154_del_llsec_devkey 2 C done 171 1601d 1663d 1/1 1570d 266e3f2ef0d1 net: ieee802154: fix nl802154 del llsec devkey
general protection fault in nl802154_del_llsec_key 2 C done 135 1601d 1657d 1/1 1570d 1804bf103e73 net: ieee802154: fix nl802154 del llsec key
general protection fault in try_to_wake_up 2 C done 707 1601d 1631d 1/1 1570d f6420532cfd7 net: tun: set tun->dev->addr_len during TUNSETLINK processing
general protection fault in nl802154_add_llsec_key 2 C done 168 1601d 1662d 1/1 1570d 3a94a5b2e0ba net: ieee802154: fix nl802154 add llsec key
general protection fault in nl802154_del_llsec_dev 2 C done 136 1602d 1663d 1/1 1572d 3ee9f1bafd06 net: ieee802154: fix nl802154 del llsec dev
INFO: trying to register non-static key in ieee802154_get_llsec_params -1 C done 8 1604d 1628d 1/1 1574d df9aa96b613d net: ieee802154: stop dump llsec params for monitors
WARNING in cfg80211_connect -1 C done 101 1619d 1798d 1/1 1584d bd7b29fb365e cfg80211: remove WARN_ON() in cfg80211_sme_connect
BUG: unable to handle kernel NULL pointer dereference in __lookup_hash 10 C done 31 1615d 1808d 1/1 1584d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
general protection fault in selinux_socket_sendmsg 2 C done 3 1623d 1796d 1/1 1592d 534d2cf487b9 usbip: synchronize event handler with sysfs code paths
KASAN: use-after-free Read in ieee80211_ibss_build_presp 19 C done 2 1625d 1771d 1/1 1595d d2ddd5417f6d mac80211: fix double free in ibss_leave
possible deadlock in red_adaptative_timer 4 C done 2 1627d 1718d 1/1 1596d 43c9bffda3a2 net: sched: validate stab values
BUG: unable to handle kernel NULL pointer dereference in vhci_shutdown_connection 10 syz done 1335 1631d 1722d 1/1 1598d 534d2cf487b9 usbip: synchronize event handler with sysfs code paths
WARNING in ext4_xattr_set_entry -1 C done 19 1642d 1798d 1/1 1610d 470f69cb3742 ext4: do not try to set xattr into ea_inode if value is empty
BUG: unable to handle kernel NULL pointer dereference in amp_read_loc_assoc_final_data 10 C done 207 1643d 1860d 1/1 1610d 2f642a2b3365 Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
KASAN: use-after-free Read in ntfs_iget 19 C done 2 1655d 1731d 1/1 1625d 49ee014a2070 ntfs: check for valid standard information attribute
KASAN: use-after-free Read in ntfs_read_locked_inode 19 C done 2 1657d 1809d 1/1 1626d 49ee014a2070 ntfs: check for valid standard information attribute
KASAN: slab-out-of-bounds Read in squashfs_export_iget 17 C done 4 1685d 1788d 1/1 1651d 69396cfd7908 squashfs: add more sanity checks in inode lookup
general protection fault in ieee80211_subif_start_xmit 2 syz done 1 1682d 1742d 1/1 1651d d882652c1c6f mac80211: pause TX while changing interface type
general protection fault in ioctl_standard_call 2 C done 24 1682d 1778d 1/1 1651d 173b67cf1e72 wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
KASAN: slab-out-of-bounds Read in squashfs_get_id 17 C 11 1654d 1807d 1/1 1653d 8d9ca7e328ef squashfs: add more sanity checks in id lookup
KASAN: use-after-free Read in squashfs_get_id 19 C 1 1653d 1749d 1/1 1653d 8d9ca7e328ef squashfs: add more sanity checks in id lookup
KASAN: use-after-free Read in reiserfs_fill_super 19 C done 2 1702d 1702d 1/1 1655d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
divide error in do_journal_end 2 C done 1 1699d 1759d 1/1 1655d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
KASAN: use-after-free Read in search_by_entry_key 19 C done 3 1701d 1807d 1/1 1655d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
KASAN: use-after-free Read in reiserfs_read_locked_inode 19 C done 5 1704d 1808d 1/1 1656d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
general protection fault in dqput 2 C done 1 1711d 1711d 1/1 1680d a9c625fcddc0 quota: Sanity-check quota file headers on load
KASAN: use-after-free Read in leaf_paste_entries 19 C done 6 1712d 1756d 1/1 1681d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
general protection fault in hci_phy_link_complete_evt 2 C done 40 1712d 1858d 1/1 1681d 4113f6f73f6e Bluetooth: Fix null pointer dereference in hci_event_packet()
BUG: unable to handle kernel paging request in dquot_add_inodes 8 C done 2 1714d 1736d 1/1 1684d a9c625fcddc0 quota: Sanity-check quota file headers on load
BUG: unable to handle kernel paging request in dqput 8 C done 9 1716d 1806d 1/1 1685d a9c625fcddc0 quota: Sanity-check quota file headers on load
kernel BUG at net/core/dev.c:LINE! -1 C inconclusive 3 1709d 1978d 1/1 1690d 8f9a69a92fc6 net: drop bogus skb with CHECKSUM_PARTIAL and offset beyond end of trimmed packet
kernel BUG at fs/reiserfs/prints.c:LINE! -1 C done 3 1725d 1806d 1/1 1695d b74d5f70523a reiserfs: add check for an invalid ih_entry_count
general protection fault in get_work_pool 2 C done 1 1728d 1758d 1/1 1698d 42a387dc80c3 mac80211: mesh: fix mesh_pathtbl_init() error path
BUG: corrupted list in dquot_disable 8 C done 1 1729d 1729d 1/1 1698d a9c625fcddc0 quota: Sanity-check quota file headers on load
KASAN: use-after-free Read in sco_chan_del 19 C done 10 1732d 1857d 1/1 1701d 4113f6f73f6e Bluetooth: Fix null pointer dereference in hci_event_packet()
INFO: trying to register non-static key in rhashtable_free_and_destroy -1 C done 4 1736d 1749d 1/1 1703d 42a387dc80c3 mac80211: mesh: fix mesh_pathtbl_init() error path
KASAN: slab-out-of-bounds Read in hci_le_meta_evt 17 C done 15 1738d 1858d 1/1 1708d 7ee2cd49f722 Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
BUG: unable to handle kernel paging request in dquot_add_space 8 C done 1 1739d 1799d 1/1 1709d a9c625fcddc0 quota: Sanity-check quota file headers on load
BUG: sleeping function called from invalid context in sta_info_move_state 5 C done 1101 1744d 1746d 1/1 1713d 89ab6b90b7d9 mac80211: free sta in sta_info_insert_finish() on errors
general protection fault in qp_release_pages 2 C done 2 1746d 1776d 1/1 1715d 2b8c7395d275 VMCI: check return value of get_user_pages_fast() for errors
WARNING in unlock_new_inode -1 C done 55 1772d 1810d 1/1 1742d a8ca9f684674 reiserfs: only call unlock_new_inode() if I_NEW
KASAN: slab-out-of-bounds Write in init_sb 23 C done 3 1774d 1808d 1/1 1743d 78734edd11cc gfs2: add validation checks for size of superblock
KASAN: global-out-of-bounds Read in fbcon_resize 17 C done 529 1778d 1826d 1/1 1747d d31eccab7abd fbcon: Fix user font detection test at fbcon_resize().
INFO: task hung in ucma_close 1 C done 421 1778d 2191d 1/1 1748d ef13017d65b0 RDMA/ucma: ucma_context reference leak in error path
KASAN: global-out-of-bounds Read in vga16fb_imageblit 17 C done 723 1778d 2102d 1/1 1748d 0472aa0c36c7 video: fbdev: fix OOB read in vga_8planes_imageblit()
KASAN: slab-out-of-bounds Read in ntfs_attr_find 17 C done 10 1778d 1806d 1/1 1748d d2918cca649f ntfs: add check for mft record size in superblock
KASAN: global-out-of-bounds Read in fbcon_get_font 17 C done 42 1785d 2101d 1/1 1755d 30386c13a1bf fbcon: Fix global-out-of-bounds read in fbcon_get_font()
KASAN: use-after-free Read in ntfs_attr_find 19 C done 4 1787d 1806d 1/1 1756d d2918cca649f ntfs: add check for mft record size in superblock
KASAN: global-out-of-bounds Read in get_unique_tuple 17 C done 5 1800d 1972d 1/1 1769d 60634d81cb43 netfilter: ctnetlink: add a range check for l3/l4 protonum
general protection fault in open_xa_dir 2 C done 1 1807d 1807d 1/1 1777d e2b6b34324c4 reiserfs: Fix oops during mount
KASAN: use-after-free Read in rxrpc_see_skb 19 syz done 1 1828d 1828d 1/1 1778d 38eefb196438 MIPS: SNI: Fix MIPS_L1_CACHE_SHIFT
INFO: task hung in nbd_ioctl (2) 1 C done 16 1825d 2070d 1/1 1778d 7241d653bcc1 tipc: fix shutdown() of connection oriented socket
WARNING in restore_regulatory_settings -1 C done 2264 1820d 2066d 1/1 1790d 02015d244d9c cfg80211: regulatory: reject invalid hints
general protection fault in __sock_release 2 syz done 12 1820d 1833d 1/1 1790d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
general protection fault in locks_remove_file 2 syz done 6 1821d 1832d 1/1 1790d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
general protection fault in tty_release 2 C done 10 1821d 1831d 1/1 1791d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in seq_release_private 19 syz done 1 1823d 1823d 1/1 1791d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
WARNING: ODEBUG bug in corrupted -1 syz done 1 1823d 1823d 1/1 1791d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
WARNING: ODEBUG bug in exit_to_usermode_loop -1 syz done 2 1825d 1827d 1/1 1794d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in __sock_release 19 syz done 3 1825d 1833d 1/1 1794d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
WARNING in snd_pcm_drop -1 syz done 1 1824d 1824d 1/1 1794d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
BUG: corrupted list in fuse_dev_free 8 syz done 1 1827d 1827d 1/1 1796d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
general protection fault in kmem_cache_free 2 syz done 3 1827d 1828d 1/1 1796d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Read in snd_pcm_oss_release 19 syz done 1 1827d 1827d 1/1 1796d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
KASAN: use-after-free Write in ex_handler_refcount 24 C done 16 1827d 2036d 1/1 1796d af7122cfbaee Bluetooth: add a mutex lock to avoid UAF in do_enale_set
KASAN: double-free or invalid-free in (null) 22 syz done 1 1828d 1828d 1/1 1798d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
BUG: corrupted list in mousedev_release 8 syz done 1 1830d 1830d 1/1 1799d c5c6e00f6cc5 fix regression in "epoll: Keep a reference on files added to the check list"
INFO: trying to register non-static key in uhid_char_release -1 C done 2 1831d 1850d 1/1 1801d 9e5894b7e222 HID: core: Correctly handle ReportSize being zero
KASAN: slab-out-of-bounds Read in hci_event_packet 17 C done 17 1843d 2316d 1/1 1812d 68bb9eddbf5d Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt 17 C done 6 1843d 1860d 1/1 1813d 68bb9eddbf5d Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
KASAN: use-after-free Read in get_block 19 C done 8 1849d 1974d 1/1 1818d 0900097ef667 fs/minix: reject too-large maximum file size
WARNING in inc_nlink -1 C done 21 1849d 1991d 1/1 1818d 12490f06ef08 fs/minix: don't allow getting deleted inodes
KASAN: slab-out-of-bounds Read in get_block 17 C done 2 1849d 1879d 1/1 1818d 0900097ef667 fs/minix: reject too-large maximum file size
BUG: unable to handle kernel NULL pointer dereference in get_block 10 C done 45 1849d 1996d 1/1 1819d 3c775629a5ff fs/minix: check return value of sb_getblk()
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt 17 C done 5 1853d 1858d 1/1 1820d d91299b8382b Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
KASAN: use-after-free Read in delete_and_unsubscribe_port 19 syz done 2 1861d 1861d 1/1 1828d ccafbed8b2f6 ALSA: seq: oss: Serialize ioctls
KASAN: double-free or invalid-free in 0x2 22 syz done 1 1861d 1861d 1/1 1828d ccafbed8b2f6 ALSA: seq: oss: Serialize ioctls
INFO: task hung in fb_release 1 C done 48 1863d 2094d 1/1 1832d c388072f90cc fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
unregister_netdevice: waiting for DEV to become free 2 C done 120 1890d 2328d 1/1 1858d 0f7f0b057417 ipvs: fix tinfo memory leak in start_sync_thread
general protection fault in batadv_iv_ogm_schedule_buff 2 1 1965d 1965d 1/1 1883d e181bb93c904 batman-adv: Don't schedule OGM for disabled interface
KASAN: null-ptr-deref Write in choke_reset 12 C done 283 1932d 1962d 1/1 1902d 4836eb6b5965 sch_choke: avoid potential panic in choke_reset()
KASAN: use-after-free Read in do_blk_trace_setup 19 C done 342 1933d 2337d 1/1 1903d b390c22c0bc7 blktrace: fix unlocked access to init/start-stop/teardown
WARNING in xfrm_policy_insert -1 syz done 8 1937d 2195d 1/1 1906d 1cd914b02b5a xfrm: fix a warning in xfrm_policy_insert_list
KASAN: slab-out-of-bounds Write in snd_rawmidi_kernel_write1 23 C done 1 1938d 1968d 1/1 1908d 8645ac3684a7 ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
WARNING: ODEBUG bug in route4_change -1 C done 23 1980d 2008d 1/1 1950d f0c92f59cf52 net_sched: cls_route: remove the right filter from hashtable
KASAN: use-after-free Write in release_tty 24 C done 124 1981d 2100d 1/1 1951d b9eb60a0ef39 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
WARNING: ODEBUG bug in rfcomm_dev_ioctl -1 C done 2 1990d 1990d 1/1 1959d 0da9c032adbb Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user 17 C done 1 1991d 1991d 1/1 1961d 25106012e91a xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
WARNING: refcount bug in sock_wfree 13 C done done 3 1992d 2112d 1/1 1962d 968f831d9056 sctp: fix refcount bug in sctp_wfree
KASAN: use-after-free Write in tcindex_set_parms 24 C done 3 1994d 1995d 1/1 1964d 9f8b6c44be17 net_sched: keep alloc_hash updated after hash allocation
KASAN: slab-out-of-bounds Write in tcindex_set_parms 23 C done 2 1995d 1995d 1/1 1965d 9f8b6c44be17 net_sched: keep alloc_hash updated after hash allocation
WARNING: ODEBUG bug in rfcomm_dlc_free -1 C done 16 1997d 2230d 1/1 1966d 0da9c032adbb Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
KASAN: use-after-free Read in tty_open 19 C done 5 1999d 2101d 1/1 1969d b9eb60a0ef39 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: use-after-free Read in tty_buffer_cancel_work 19 C done 2 2008d 2097d 1/1 1978d b9eb60a0ef39 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: use-after-free Read in get_work_pool 19 C done 1 2009d 2100d 1/1 1979d b9eb60a0ef39 vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
KASAN: use-after-free Read in n_tty_receive_buf_common 19 C done 25 2011d 2100d 1/1 1980d a4719f6d07b2 vt: selection, push sel_lock up
WARNING: kernel stack frame pointer has bad value -1 C done 65 2016d 2320d 1/1 1982d 377d7378a605 fjes: fix missed check in fjes_acpi_add
INFO: task hung in paste_selection 1 C done 8 2017d 2092d 1/1 1986d 7c315855c6f4 ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()
INFO: task hung in drain_all_pages 1 C done 1 2017d 2017d 1/1 1987d a86265edeb33 netfilter: xt_hashlimit: limit the max size of hashtable
INFO: task hung in tty_ldisc_hangup 1 C done 17 2025d 2096d 1/1 1995d a4719f6d07b2 vt: selection, push sel_lock up
INFO: task hung in hashlimit_mt_check_common 1 C done 6 2028d 2079d 1/1 1996d a86265edeb33 netfilter: xt_hashlimit: limit the max size of hashtable
KASAN: stack-out-of-bounds Write in ax25_getname 23 C done 4 2027d 2323d 1/1 1996d ff8e12b0cfe2 vhost: Check docket sk_family instead of call getname
KASAN: slab-out-of-bounds Read in tcf_exts_destroy 17 C done 1 2031d 2144d 1/1 2001d 6cb448ee493c net_sched: fix an OOB access in cls_tcindex
general protection fault in path_openat 2 C done 40 2037d 2044d 1/1 2007d 40642747dd9f vfs: fix do_last() regression
BUG: sleeping function called from invalid context in tpk_write 5 C done 10 2037d 2099d 1/1 2007d ab84fd0d3dc8 ttyprintk: fix a potential deadlock in interrupt context issue
BUG: sleeping function called from invalid context in lock_sock_nested (2) 5 syz done 1 2039d 2100d 1/1 2009d 713ff7e4d605 crypto: af_alg - Use bh_lock_sock in sk_destruct
KASAN: use-after-free Read in ext4_xattr_set_entry 19 C done 9 2042d 2134d 1/1 2012d 08e4a312439c ext4: validate the debug_want_extra_isize mount option at parse time
KASAN: slab-out-of-bounds Read in __nla_put_nohdr 17 C done 2 2046d 2046d 1/1 2015d c5fd8a37e971 net-sysfs: Fix reference count leak
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock 23 C done 1 2049d 2049d 1/1 2019d c57b0f88fce8 Documentation: Document arm64 kpti control
KASAN: use-after-free Read in snd_timer_resolution 19 C done 1 2052d 2052d 1/1 2021d 43bb0a16b25d ALSA: seq: Fix racy access for queue timer in proc read
INFO: task hung in genl_rcv_msg 1 syz done 2 2056d 2056d 1/1 2026d 24070b40926b tcp: clear tp->total_retrans in tcp_disconnect()
WARNING in reconnect_path -1 C done done 1 2057d 2117d 1/1 2026d b6e209a13a61 exportfs: fix 'passing zero to ERR_PTR()' warning
KASAN: use-after-free Write in __alloc_skb 24 C done 1 2061d 2091d 1/1 2028d e841252840c4 net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
KASAN: use-after-free Read in cdev_put 19 C done 6 2061d 2104d 1/1 2030d 0ce254bc68ed xen-blkback: prevent premature module unload
KASAN: slab-out-of-bounds Read in macvlan_broadcast 17 C done 6 2062d 2067d 1/1 2032d 4a953272f2d2 macvlan: do not assume mac_header is set in macvlan_broadcast()
KASAN: use-after-free Read in macvlan_broadcast 19 C done 8 2064d 2067d 1/1 2033d 4a953272f2d2 macvlan: do not assume mac_header is set in macvlan_broadcast()
WARNING: bad unlock balance in gtp_encap_enable_socket 4 C done 2 2064d 2067d 1/1 2033d 887b0296a905 gtp: fix bad unlock balance in gtp_encap_enable_socket
KASAN: slab-out-of-bounds Read in bpf_skb_change_tail 17 C done 2 2070d 2216d 1/1 2037d 7fed98f4a1e6 bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto 17 C done 2 2070d 2217d 1/1 2037d 7fed98f4a1e6 bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Read in bpf_clone_redirect 17 C done 11 2075d 2238d 1/1 2045d 7fed98f4a1e6 bpf: reject passing modified ctx to helper functions
KASAN: slab-out-of-bounds Read in bpf_skb_change_head 17 C done 2 2079d 2148d 1/1 2048d 7fed98f4a1e6 bpf: reject passing modified ctx to helper functions
possible deadlock in refcount_dec_and_mutex_lock 4 C done 10 2078d 2151d 1/1 2048d 4df728651b8a nbd: verify socket is supported during setup
WARNING: refcount bug in cdev_get 13 C done 21 2079d 2210d 1/1 2049d 03a709593040 net: usb: lan78xx: Connect PHY before registering MAC
INFO: rcu detected stall in br_handle_frame (2) 1 C done 1 2084d 2084d 1/1 2054d 73a6f18d8390 pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
WARNING in ovl_rename -1 syz done 2 2088d 2320d 1/1 2055d 6890751cfea7 ovl: relax WARN_ON() on rename to self
inconsistent lock state in sp_get 4 C done 2 2092d 2092d 1/1 2061d 8b58905f212b 6pack,mkiss: fix possible deadlock
KASAN: slab-out-of-bounds Read in linear_transfer 17 C done 4 2093d 2100d 1/1 2063d 2a76606d8a83 ALSA: pcm: oss: Avoid potential buffer overflows
possible deadlock in __might_fault 4 C done 295 2095d 2335d 1/1 2064d d41971493d28 usb: mon: Fix a deadlock in usbmon between mmap and read
possible deadlock in mon_bin_vma_fault 4 C done 282 2096d 2332d 1/1 2066d d41971493d28 usb: mon: Fix a deadlock in usbmon between mmap and read
WARNING: refcount bug in kobject_get 13 C done 20 2101d 2334d 1/1 2070d 227db8e4c346 tipc: fix unlimited bundling of small messages
WARNING in refcount_error_report -1 syz done 1 2103d 2103d 1/1 2070d 7272e8e3bfa3 inet: protect against too small mtu values.
BUG: corrupted list in p9_fd_cancelled 8 syz done 2 2102d 2147d 1/1 2070d 8a82aee7bdfd arm64: Add MIDR encoding for Arm Cortex-A55 and Cortex-A35
BUG: unable to handle kernel paging request in slhc_free 8 C done 4 2105d 2332d 1/1 2074d da0bbf51bdcb slip: make slhc_free() silently accept an error pointer
WARNING in dio_complete -1 C done 27 2105d 2335d 1/1 2074d 365874a0eab5 blk-mq: avoid sysfs buffer overflow with too many CPU cores
KASAN: use-after-free Read in slip_open 19 C done done 2 2109d 2109d 1/1 2076d f5bcc687e3d6 slip: Fix use-after-free Read in slip_open
KASAN: use-after-free Read in kfree_skb 19 C done 98 2107d 2234d 1/1 2076d 79d404a2aa86 Bluetooth: Fix invalid-free in bcsp_close()
INFO: task hung in nbd_ioctl 1 C done 18 2078d 2152d 1/1 2076d 4df728651b8a nbd: verify socket is supported during setup
WARNING: suspicious RCU usage in shmem_add_seals 4 C done done 1435 2114d 2136d 1/1 2083d 988f701a805b memfd: Use radix_tree_deref_slot_protected to avoid the warning.
possible deadlock in flush_workqueue 4 C done 15 2116d 2209d 1/1 2086d 4df728651b8a nbd: verify socket is supported during setup
WARNING in bpf_jit_free -1 syz done 60 2158d 2331d 1/1 2087d 47569360be87 bpf: fix use after free in prog symbol exposure
INFO: task hung in lo_release 1 syz done 128 2224d 2337d 1/1 2088d 22f36db48781 Revert "block/loop: Use global lock for ioctl() operation."
BUG: unable to handle kernel NULL pointer dereference in inet_autobind 10 C inconclusive done 3133 2128d 2136d 1/1 2088d 7c3c0d51129a sctp: not bind the socket in sctp_connect
BUG: unable to handle kernel NULL pointer dereference in blk_mq_map_swqueue 10 C done 20 2089d 2327d 1/1 2088d 0b584bf573ae nbd: fix max number of supported devs
BUG: unable to handle kernel paging request in dummy_set_vf_vlan 8 C done 5 2122d 2216d 1/1 2088d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
BUG: unable to handle kernel paging request in dummy_set_vf_spoofchk 8 C done 6 2125d 2237d 1/1 2088d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
BUG: unable to handle kernel paging request in dummy_get_vf_config 8 C done 4 2141d 2238d 1/1 2091d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
WARNING: suspicious RCU usage in netem_enqueue 4 C done 3 2145d 2168d 1/1 2091d 6f492e801033 net_sched: add max len check for TCA_KIND
BUG: unable to handle kernel paging request in dummy_set_vf_rss_query_en 8 C done 5 2145d 2237d 1/1 2091d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
BUG: unable to handle kernel paging request in dummy_set_vf_mac 8 C done 5 2154d 2227d 1/1 2092d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass 10 C done 14 2148d 2188d 1/1 2092d 54b9f5791846 net_sched: check cops->tcf_block in tc_bind_tclass()
KASAN: null-ptr-deref Write in kvm_write_guest_virt_system 12 C done 53 2154d 2172d 1/1 2092d 2890b718f4a8 watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout
WARNING in tcp_send_loss_probe -1 C done 22 2175d 2185d 1/1 2095d ba2ddb43f270 tcp: Don't dequeue SYN/FIN-segments from write-queue
general protection fault in tcp_push 2 C done 55 2174d 2185d 1/1 2095d f1dcc5ed4bea tcp: Reset send_head when removing skb from write-queue
BUG: unable to handle kernel paging request in dummy_set_vf_rate 8 C done 3 2175d 2190d 1/1 2095d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
WARNING in tcp_retransmit_timer -1 C done 215 2174d 2185d 1/1 2095d ba2ddb43f270 tcp: Don't dequeue SYN/FIN-segments from write-queue
general protection fault in qdisc_destroy 2 C done 4 2175d 2179d 1/1 2095d e0f600b69df3 net_sched: let qdisc_put() accept NULL pointer
INFO: rcu detected stall in mld_dad_timer_expire 1 C done 1 2181d 2181d 1/1 2095d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in br_handle_frame 1 C done 15 2177d 2188d 1/1 2097d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
WARNING in kernfs_get -1 C done 17 2207d 2327d 1/1 2097d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
INFO: rcu detected stall in mld_ifc_timer_expire 1 C done 9 2179d 2188d 1/1 2098d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
WARNING in xfrm_state_fini -1 C done 193 2181d 2336d 1/1 2098d cd393b38514d xfrm: clean up xfrm protocol checks
INFO: rcu detected stall in addrconf_dad_work 1 C done 18 2182d 2189d 1/1 2098d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
INFO: rcu detected stall in corrupted 1 C done 3 2182d 2204d 1/1 2099d cc243e2427ce sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
BUG: unable to handle kernel paging request in dummy_set_vf_trust 8 C done 2 2190d 2224d 1/1 2099d 9ed49fc95f37 net: rtnetlink: prevent underflows in do_setvfinfo()
WARNING in map_lookup_elem -1 C done 2 2197d 2197d 1/1 2099d 95867919494d KVM: x86: add tracepoints around __direct_map and FNAME(fetch)
WARNING: refcount bug in hci_register_dev 13 C done 3 2195d 2209d 1/1 2099d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
kernel BUG at ./include/linux/skbuff.h:LINE! -1 C done 16 2190d 2216d 1/1 2099d e5df4baea324 tcp: fix tcp_rtx_queue_tail in case of empty retransmit queue
general protection fault in packet_lookup_frame 2 C done 1 2212d 2212d 1/1 2100d 5ac73816dda7 net/packet: fix race in tpacket_snd()
WARNING: refcount bug in kobject_put 13 C done 3 2217d 2323d 1/1 2100d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
general protection fault in tcf_ife_init 2 C done 12 2228d 2238d 1/1 2101d 7fcc60e5f837 ife: error out when nla attributes are empty
general protection fault in kernfs_add_one 2 C done 5 2225d 2294d 1/1 2101d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
WARNING in sysfs_remove_group -1 C done 1 2241d 2241d 1/1 2102d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
BUG: unable to handle kernel paging request in coalesced_mmio_write 8 C done 4 2258d 2265d 1/1 2103d bf81752d808c KVM: coalesced_mmio: add bounds checking
WARNING in kernfs_put -1 C done 2 2257d 2323d 1/1 2103d 5432923a6b20 driver core: Fix use-after-free and double free on glue directory
KASAN: use-after-free Read in erspan_build_header 19 C done 18 2303d 2337d 1/1 2104d 1d629bf9b576 net: erspan: fix use-after-free
KASAN: slab-out-of-bounds Read in erspan_build_header 17 C done 8 2301d 2337d 1/1 2104d d93fb604c079 tipc: fix modprobe tipc failed after switch order of device registration
WARNING in notify_change -1 C done 14 2266d 2332d 1/1 2104d 2c5462425563 Abort file_remove_privs() for non-reg. files
KASAN: use-after-free Read in tcp_init_tso_segs 19 C 1424 2174d 2185d 1/1 2161d f1dcc5ed4bea tcp: Reset send_head when removing skb from write-queue