possible deadlock in xsk_notifier (3)
net
bpf
|
4 |
|
|
|
3 |
36d |
86d
|
28/29 |
never |
53898ebabe84
net: lapbether: ignore ops-locked netdevs
|
possible deadlock in lock_timer_base
bpf
trace
|
4 |
C |
|
|
142 |
246d |
1720d
|
1/29 |
never |
kfence: fix potential deadlock due to wake_up()
|
WARNING in do_misc_fixups
bpf
|
-1 |
C |
|
|
7604 |
8d09h |
46d
|
27/29 |
never |
e4414b01c1cd
bpf: Check the helper function is valid in get_helper_proto
|
WARNING in convert_ctx_accesses (2)
bpf
|
-1 |
C |
|
|
12 |
2d20h |
6d09h
|
1/29 |
never |
bpf: Explicitly check accesses to bpf_sock_addr
|
WARNING in maybe_exit_scc
bpf
|
-1 |
C |
done |
|
36 |
4d01h |
3d23h
|
1/29 |
never |
bpf: dont report verifier bug for missing bpf_scc_visit on speculative path
|
possible deadlock in xsk_diag_dump (2)
bpf
net
|
4 |
|
|
|
1 |
46d |
46d
|
28/29 |
never |
c64237960819
hamradio: ignore ops-locked netdevs
|
WARNING in vmap_pages_range_noflush (2)
bpf
net
|
-1 |
C |
error |
|
250 |
1123d |
1125d
|
1/29 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
WARNING in bpf_check (4)
bpf
|
-1 |
C |
done |
|
5241 |
15d |
121d
|
29/29 |
15d |
e09299225d5b
bpf: Reject narrower access to pointer ctx fields
|
KASAN: slab-use-after-free Read in do_check
bpf
|
19 |
C |
|
|
15 |
98d |
100d
|
29/29 |
15d |
3d71b8b9abae
bpf: Fix state use-after-free on push_stack() err
|
WARNING in reg_bounds_sanity_check
bpf
|
-1 |
C |
done |
|
6525 |
15d |
79d
|
29/29 |
15d |
6279846b9b25
bpf: Forget ranges when refining tnum after JSET
|
WARNING in do_check
bpf
|
-1 |
C |
error |
|
51 |
26d |
98d
|
29/29 |
15d |
3157f7e29996
bpf: handle jset (if a & b ...) as a jump in CFG computation
|
WARNING in check_helper_call
bpf
|
-1 |
C |
done |
|
7 |
37d |
79d
|
29/29 |
15d |
65fdafd6765f
bpf: Avoid warning on multiple referenced args in call
|
WARNING in format_decode (3)
bpf
trace
|
-1 |
C |
done |
|
2248 |
61d |
667d
|
29/29 |
15d |
f8242745871f
bpf: Reject %p% format string in bprintf-like helpers
|
WARNING in record_func_key
bpf
|
-1 |
C |
|
|
90 |
77d |
79d
|
29/29 |
15d |
032547272eb0
bpf: Avoid warning on unexpected map for tail call
|
WARNING: kernel/bpf/verifier.c:LINE at do_check, CPU: syz.NUM.NUM/NUM
bpf
|
-1 |
syz |
done |
|
5 |
94d |
86d
|
29/29 |
15d |
dadb59104c64
bpf: Fix aux usage after do_check_insn()
|
WARNING in convert_ctx_accesses
bpf
|
-1 |
C |
done |
|
80 |
28d |
50d
|
29/29 |
15d |
ead3d7b2b6af
bpf: Check flow_dissector ctx accesses are aligned
|
WARNING in bpf_map_lookup_percpu_elem
bpf
|
-1 |
C |
done |
|
2116 |
123d |
507d
|
29/29 |
73d |
d4965578267e
bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()
|
WARNING in get_bpf_raw_tp_regs
bpf
trace
|
-1 |
C |
|
|
2 |
127d |
130d
|
29/29 |
73d |
3880cdbed1c4
bpf: Fix WARN() in get_bpf_raw_tp_regs
|
WARNING in __bpf_prog_ret0_warn
bpf
|
-1 |
C |
|
|
9 |
114d |
138d
|
29/29 |
73d |
86bc9c742426
bpf: Avoid __bpf_prog_ret0_warn when jit fails
|
possible deadlock in trie_delete_elem
bpf
|
4 |
C |
done |
done |
21444 |
174d |
548d
|
28/29 |
95d |
47979314c0fe
bpf: Convert lpm_trie.c to rqspinlock
|
possible deadlock in __bpf_ringbuf_reserve
bpf
|
4 |
C |
error |
|
2490 |
151d |
556d
|
28/29 |
101d |
a650d38915c1
bpf: Convert ringbuf map to rqspinlock
|
WARNING in dev_xdp_install
bpf
|
-1 |
C |
|
|
245 |
168d |
175d
|
28/29 |
101d |
d996e412b2df
bpf: add missing ops lock around dev_xdp_attach_link
|
KMSAN: uninit-value in ___bpf_prog_run (4)
bpf
|
7 |
C |
|
|
322 |
219d |
633d
|
28/29 |
101d |
4c2d14c40a68
ppp: Fix KMSAN uninit-value warning with bpf
|
possible deadlock in xsk_diag_dump
bpf
net
|
4 |
|
|
|
4 |
157d |
164d
|
28/29 |
101d |
f0433eea4688
net: don't mix device locking in dev_close_many() calls
|
UBSAN: array-index-out-of-bounds in bpf_prog_select_runtime
bpf
|
15 |
C |
done |
|
1160 |
172d |
554d
|
28/29 |
101d |
6ebc5030e0c5
bpf: Fix array bounds error with may_goto
|
KASAN: slab-out-of-bounds Read in atomic_ptr_type_ok
bpf
|
17 |
C |
done |
|
4 |
193d |
190d
|
28/29 |
101d |
9aa8fe29f624
Merge branch 'bpf-fix-oob-read-and-add-tests-for-load-acquire-store-release'
c03bb2fa327e
bpf: Fix out-of-bounds read in check_atomic_load/store()
|
possible deadlock in queue_stack_map_push_elem
bpf
|
4 |
C |
error |
|
78 |
167d |
519d
|
28/29 |
101d |
2f41503d6476
bpf: Convert queue_stack map to rqspinlock
|
possible deadlock in __queue_map_get
bpf
|
4 |
C |
error |
|
180 |
165d |
524d
|
28/29 |
101d |
2f41503d6476
bpf: Convert queue_stack map to rqspinlock
|
general protection fault in bpf_map_offload_map_alloc
bpf
|
2 |
|
|
|
494 |
195d |
196d
|
28/29 |
101d |
0a5c8b2c8ccb
bpf: fix a possible NULL deref in bpf_map_offload_map_alloc()
|
possible deadlock in bpf_map_mmap
bpf
|
4 |
|
|
|
1 |
246d |
242d
|
28/29 |
101d |
bc27c52eea18
bpf: avoid holding freeze_mutex during mmap operation
|
KASAN: vmalloc-out-of-bounds Write in push_insn_history
bpf
|
23 |
|
|
|
136 |
284d |
297d
|
28/29 |
135d |
d699440f58ce
mm: fix vrealloc()'s KASAN poisoning logic
|
KASAN: vmalloc-out-of-bounds Write in vrealloc_noprof
bpf
|
23 |
C |
done |
|
440 |
135d |
298d
|
28/29 |
135d |
d699440f58ce
mm: fix vrealloc()'s KASAN poisoning logic
|
general protection fault in bpf_prog_array_delete_safe
bpf
|
2 |
C |
done |
|
5 |
285d |
287d
|
28/29 |
136d |
978c4486cca5
bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog
|
KASAN: slab-use-after-free Read in bpf_trace_run2 (2)
bpf
trace
|
19 |
syz |
error |
|
123 |
319d |
336d
|
28/29 |
136d |
2e8a12b82c40
tracing: Fix syscall tracepoint use-after-free
|
WARNING: locking bug in __lock_task_sighand
trace
bpf
|
4 |
C |
unreliable |
|
89 |
238d |
295d
|
28/29 |
136d |
87c544108b61
bpf: Send signals asynchronously if !preemptible
|
BUG: using smp_processor_id() in preemptible code in bpf_mem_alloc
bpf
|
4 |
C |
done |
|
12 |
308d |
305d
|
28/29 |
276d |
4ff04abf9d5b
bpf: Add necessary migrate_disable to range_tree.
|
WARNING in push_jmp_history
bpf
|
-1 |
C |
done |
|
5 |
347d |
346d
|
28/29 |
309d |
aa30eb3260b2
bpf: Force checkpoint when jmp history is too long
|
general protection fault in dev_map_enqueue (2)
bpf
net
|
19 |
C |
error |
done |
336 |
414d |
480d
|
28/29 |
310d |
09d88791c7cd
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
|
WARNING in sock_map_close (2)
bpf
net
|
-1 |
C |
done |
|
3 |
393d |
393d
|
28/29 |
332d |
1461f5a3d810
l2tp: avoid overriding sk->sk_user_data
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (3)
bpf
net
|
8 |
C |
done |
|
6 |
433d |
433d
|
28/29 |
332d |
92de36080c93
bpf: Fail verification for sign-extension of packet data/data_end/data_meta
|
KASAN: slab-use-after-free Read in htab_map_alloc (2)
bpf
|
19 |
|
|
|
224 |
497d |
503d
|
27/29 |
372d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
KASAN: stack-out-of-bounds Read in xdp_do_check_flushed
bpf
net
|
17 |
C |
done |
|
127 |
413d |
434d
|
27/29 |
392d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __dev_flush
bpf
net
|
19 |
C |
|
|
35 |
413d |
427d
|
27/29 |
392d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in bq_flush_to_queue
bpf
net
|
17 |
|
|
|
22 |
414d |
422d
|
27/29 |
392d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KASAN: slab-use-after-free Read in bq_xmit_all
net
bpf
|
19 |
C |
done |
|
29 |
414d |
427d
|
27/29 |
392d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __xsk_map_flush
bpf
net
|
19 |
C |
done |
|
26 |
413d |
430d
|
27/29 |
392d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __cpu_map_flush
bpf
net
|
10 |
C |
inconclusive |
|
25 |
414d |
427d
|
27/29 |
392d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in xdp_do_generic_redirect
bpf
net
|
2 |
|
|
|
8 |
437d |
441d
|
27/29 |
401d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
general protection fault in dev_map_redirect
bpf
net
|
2 |
C |
|
|
362 |
437d |
444d
|
27/29 |
401d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in dev_hash_map_redirect
bpf
net
|
2 |
C |
done |
|
29 |
437d |
444d
|
27/29 |
401d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
general protection fault in xdp_do_redirect
bpf
net
|
2 |
|
|
|
15 |
438d |
444d
|
27/29 |
401d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in bpf_xdp_redirect
bpf
net
|
2 |
C |
|
|
181 |
437d |
444d
|
27/29 |
401d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in cpu_map_redirect
bpf
net
|
2 |
C |
done |
|
11 |
438d |
437d
|
27/29 |
401d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
WARNING in bpf_lwt_seg6_adjust_srh
bpf
net
|
-1 |
C |
done |
|
30 |
436d |
451d
|
27/29 |
401d |
c13fda93aca1
bpf: Remove tst_run from lwt_seg6local_prog_ops.
|
possible deadlock in console_flush_all (2)
bpf
trace
|
4 |
C |
error |
|
52996 |
437d |
712d
|
26/29 |
436d |
ae01e52da244
serial: drop debugging WARN_ON_ONCE() from uart_write()
|
WARNING in skb_ensure_writable
bpf
net
|
-1 |
C |
done |
|
2893 |
437d |
515d
|
26/29 |
436d |
2bbe3e5a2f4e
bpf: Avoid splat in pskb_pull_reason
|
INFO: task hung in bpf_prog_dev_bound_destroy
bpf
|
1 |
|
|
|
94 |
456d |
467d
|
26/29 |
436d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
possible deadlock in __sock_map_delete
bpf
net
|
4 |
C |
|
|
14 |
479d |
523d
|
26/29 |
445d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
general protection fault in bpf_get_attach_cookie_tracing
bpf
trace
|
2 |
C |
error |
|
7 |
471d |
502d
|
26/29 |
458d |
d0d1df8ba18a
bpf: Set run context for rawtp test_run callback
|
KASAN: slab-use-after-free Read in bpf_link_free (2)
bpf
|
19 |
syz |
|
|
52 |
468d |
480d
|
26/29 |
458d |
2884dc7d08d9
bpf: Fix a potential use-after-free in bpf_link_free()
|
WARNING in sock_map_close
net
bpf
|
-1 |
C |
error |
|
182 |
465d |
528d
|
25/29 |
465d |
4b4647add7d3
sock_map: avoid race between sock_map_close and sk_psock_put
|
possible deadlock in sock_hash_delete_elem (2)
bpf
net
|
4 |
C |
|
|
1127 |
466d |
549d
|
25/29 |
465d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
KMSAN: uninit-value in __bpf_strtoull
bpf
|
7 |
C |
|
|
119 |
472d |
549d
|
25/29 |
471d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in trie_delete_elem
bpf
|
7 |
C |
|
|
52 |
472d |
541d
|
25/29 |
471d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in dev_map_lookup_elem
net
bpf
|
7 |
C |
|
|
3 |
536d |
543d
|
25/29 |
471d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in trie_lookup_elem
bpf
|
7 |
C |
|
|
12 |
529d |
547d
|
25/29 |
471d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
possible deadlock in kvfree_call_rcu
bpf
|
4 |
C |
|
|
1431 |
472d |
541d
|
25/29 |
471d |
59f2f841179a
bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie.
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (2)
bpf
|
8 |
C |
|
|
3 |
514d |
528d
|
25/29 |
471d |
543576ec15b1
bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
|
KMSAN: uninit-value in array_map_lookup_elem
bpf
|
7 |
C |
|
|
10 |
526d |
546d
|
25/29 |
471d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in sock_map_delete_elem
bpf
net
|
7 |
C |
|
|
44 |
472d |
543d
|
25/29 |
471d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
WARNING in __mark_chain_precision (4)
bpf
|
-1 |
C |
|
|
8 |
516d |
536d
|
25/29 |
471d |
1f2a74b41ea8
bpf: prevent r10 register from being marked as precise
|
KASAN: stack-out-of-bounds Read in hash
bpf
|
17 |
C |
done |
|
5 |
524d |
531d
|
25/29 |
484d |
a8d89feba7e5
bpf: Check bloom filter map value size
|
possible deadlock in force_sig_info_to_task
bpf
trace
|
4 |
C |
error |
|
6 |
504d |
512d
|
25/29 |
484d |
02b670c1f88e
x86/mm: Remove broken vsyscall emulation code from the page fault code
|
KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue
bpf
net
|
6 |
|
|
|
1 |
553d |
545d
|
25/29 |
484d |
6648e613226e
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
|
possible deadlock in tty_port_tty_get (2)
bpf
net
|
4 |
|
|
|
3 |
528d |
546d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in put_pwq_unlocked
trace
bpf
|
4 |
|
|
|
3 |
522d |
521d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_delete_elem
bpf
net
|
-1 |
C |
|
|
17183 |
511d |
550d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in scheduler_tick (3)
bpf
net
|
4 |
C |
|
|
1179 |
511d |
547d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in pit_timer_fn
bpf
net
|
4 |
|
|
|
7 |
522d |
533d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in rcu_exp_handler
bpf
net
|
4 |
C |
|
|
1 |
525d |
521d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in rcu_report_exp_cpu_mult
bpf
net
|
4 |
C |
done |
|
30 |
512d |
550d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in try_to_wake_up (4)
bpf
net
|
4 |
C |
error |
|
19 |
487d |
550d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in ahci_single_level_irq_intr
net
bpf
|
4 |
C |
|
|
10 |
533d |
541d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_unref
bpf
net
|
-1 |
C |
error |
|
97 |
512d |
525d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in __lock_task_sighand (2)
bpf
|
4 |
C |
|
|
1476 |
486d |
549d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_hash_delete_elem
net
bpf
|
-1 |
C |
done |
|
16982 |
511d |
550d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in hrtimer_run_queues
net
bpf
|
4 |
C |
error |
|
592 |
511d |
548d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in swake_up_one
bpf
net
|
4 |
C |
|
|
4 |
523d |
521d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in pwq_dec_nr_in_flight
bpf
trace
|
4 |
|
|
|
1 |
527d |
523d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in _prb_commit
bpf
net
|
-1 |
|
|
|
4 |
522d |
518d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in posix_timer_fn (2)
bpf
net
|
4 |
|
|
|
1 |
525d |
521d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in drm_handle_vblank
bpf
net
|
4 |
|
|
|
30 |
522d |
548d
|
25/29 |
484d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
KASAN: slab-out-of-bounds Read in xsk_setsockopt
bpf
net
|
17 |
C |
|
|
17 |
524d |
532d
|
25/29 |
484d |
237f3cf13b20
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
|
UBSAN: array-index-out-of-bounds in check_stack_range_initialized
bpf
|
15 |
C |
error |
|
21 |
515d |
549d
|
25/29 |
484d |
ecc6a2101840
bpf: Protect against int overflow for stack access size
|
general protection fault in dev_map_enqueue
net
bpf
|
19 |
C |
|
|
676 |
484d |
541d
|
25/29 |
484d |
5bcf0dcbf906
xdp: use flags field to disambiguate broadcast redirect
|
KASAN: slab-use-after-free Read in bpf_link_free
bpf
|
19 |
syz |
|
|
181 |
484d |
532d
|
25/29 |
484d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
KASAN: slab-use-after-free Read in bpf_trace_run4
bpf
trace
|
19 |
C |
error |
|
169 |
529d |
547d
|
25/29 |
484d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
KASAN: slab-use-after-free Read in bpf_trace_run2
bpf
trace
|
19 |
C |
error |
|
653 |
529d |
547d
|
25/29 |
484d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
KASAN: slab-use-after-free Read in bpf_trace_run1
bpf
trace
|
19 |
C |
error |
|
78 |
529d |
543d
|
25/29 |
484d |
1a80dbcb2dba
bpf: support deferring bpf_link dealloc to after RCU grace period
|
linux-next boot error: WARNING in register_btf_kfunc_id_set
bpf
|
-1 |
|
|
|
9 |
595d |
595d
|
25/29 |
527d |
a05e90427ef6
bpf: btf: Add BTF_KFUNCS_START/END macro pair
|
general protection fault in bpf_struct_ops_find_value
bpf
|
2 |
C |
done |
|
9 |
600d |
603d
|
25/29 |
527d |
e6be8cd5d3cf
bpf: Fix error checks against bpf_get_btf_vmlinux().
|
BUG: unable to handle kernel NULL pointer dereference in dev_map_hash_update_elem
net
bpf
|
10 |
C |
|
|
2 |
571d |
578d
|
25/29 |
527d |
281d464a34f5
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
|
general protection fault in btf_is_module
bpf
|
2 |
C |
error |
|
318 |
599d |
603d
|
25/29 |
527d |
e6be8cd5d3cf
bpf: Fix error checks against bpf_get_btf_vmlinux().
|
BUG: unable to handle kernel NULL pointer dereference in unix_stream_sendmsg
net
bpf
|
10 |
C |
|
|
1 |
570d |
570d
|
25/29 |
535d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
BUG: unable to handle kernel NULL pointer dereference in sk_psock_verdict_data_ready
bpf
net
|
10 |
C |
unreliable |
|
15 |
565d |
685d
|
25/29 |
535d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
WARNING in __mark_chain_precision (3)
bpf
|
-1 |
C |
done |
|
19 |
627d |
649d
|
25/29 |
597d |
482d548d40b0
bpf: handle fake register spill to stack with BPF_ST_MEM instruction
|
KASAN: slab-use-after-free Read in nla_find
bpf
net
|
19 |
C |
done |
|
4 |
642d |
641d
|
25/29 |
598d |
2130c519a401
bpf: Use nla_ok() instead of checking nla_len directly
|
WARNING: locking bug in corrupted (2)
bpf
|
4 |
C |
done |
done |
1 |
648d |
801d
|
25/29 |
598d |
6f861765464f
fs: Block writes to mounted block devices
|
WARNING in __sk_msg_free
bpf
net
|
-1 |
C |
done |
|
4 |
624d |
623d
|
25/29 |
598d |
dc9dfc8dc629
net: tls, fix WARNIING in __sk_msg_free
|
kernel BUG in prog_array_map_poke_run
bpf
|
-1 |
C |
done |
done |
35 |
641d |
682d
|
25/29 |
605d |
4b7de801606e
bpf: Fix prog_array_map_poke_run map poke update
|
KASAN: null-ptr-deref Write in unix_stream_bpf_update_proto
net
bpf
|
12 |
C |
done |
|
54 |
629d |
659d
|
25/29 |
607d |
8d6650646ce4
bpf: syzkaller found null ptr deref in unix_bpf proto add
|
WARNING in bpf_mprog_pos_after
bpf
|
-1 |
|
|
|
3 |
724d |
732d
|
25/29 |
638d |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
WARNING: zero-size vmalloc in xskq_create
net
bpf
|
-1 |
|
|
|
20 |
707d |
715d
|
25/29 |
638d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
WARNING: zero-size vmalloc in print_tainted
bpf
net
|
-1 |
C |
|
|
79 |
831d |
865d
|
25/29 |
638d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
WARNING in bpf_mprog_attach
bpf
|
-1 |
C |
|
|
3 |
716d |
723d
|
25/29 |
638d |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
WARNING in bpf_mprog_pos_before
bpf
|
-1 |
C |
done |
|
26 |
716d |
723d
|
25/29 |
638d |
f9b0e1088bbf
bpf, mprog: Fix maximum program check on mprog attachment
|
general protection fault in bpf_prog_offload_verifier_prep
bpf
|
8 |
C |
done |
|
31 |
728d |
746d
|
25/29 |
638d |
1a49f4195d34
bpf: Avoid dummy bpf_offload_netdev in __bpf_prog_dev_bound_init
|
WARNING: refcount bug in xp_put_pool
bpf
net
|
13 |
C |
done |
|
2 |
783d |
781d
|
23/29 |
708d |
85c2c79a0730
xsk: fix refcount underflow in error path
|
KASAN: slab-use-after-free Read in xsk_diag_dump
bpf
net
|
19 |
C |
done |
|
9 |
743d |
752d
|
23/29 |
708d |
3e019d8a05a3
xsk: Fix xsk_diag use-after-free error during socket cleanup
|
UBSAN: array-index-out-of-bounds in bpf_mprog_detach
bpf
|
15 |
|
|
|
3 |
776d |
782d
|
23/29 |
708d |
d210f9735e13
bpf: Fix mprog detachment for empty mprog entry
|
KCSAN: data-race in bpf_percpu_array_update / bpf_percpu_array_update (2)
bpf
|
6 |
|
|
|
1 |
752d |
752d
|
23/29 |
708d |
6a86b5b5cd76
bpf: Annotate bpf_long_memcpy with data_race
|
WARNING in tcx_uninstall
bpf
net
|
-1 |
C |
done |
|
7 |
782d |
786d
|
23/29 |
708d |
079082c60aff
tcx: Fix splat during dev unregister
|
WARNING in bpf_xdp_adjust_tail (4)
bpf
|
-1 |
C |
error |
|
466 |
773d |
984d
|
23/29 |
708d |
d14eea09edf4
net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()
|
KMSAN: uninit-value in ieee802154_subif_start_xmit
bpf
|
8 |
C |
done |
|
119 |
778d |
774d
|
23/29 |
708d |
db2baf82b098
bpf: Fix an incorrect verification success with movsx insn
|
WARNING: ODEBUG bug in tcx_uninstall
bpf
net
|
-1 |
C |
done |
|
38 |
787d |
792d
|
23/29 |
708d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
INFO: rcu detected stall in ext4_file_write_iter (7)
mm
bpf
ext4
|
1 |
|
|
|
3 |
750d |
792d
|
23/29 |
708d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
UBSAN: array-index-out-of-bounds in print_bpf_insn
bpf
|
15 |
C |
done |
|
9 |
779d |
781d
|
23/29 |
708d |
e99688eba2e9
bpf: Fix an array-index-out-of-bounds issue in disasm.c
|
KCSAN: data-race in __bpf_lru_list_rotate / __htab_lru_percpu_map_update_elem (5)
bpf
|
6 |
|
|
|
13 |
816d |
878d
|
23/29 |
722d |
ee9fd0ac3017
bpf: Address KCSAN report on bpf_lru_list
|
WARNING in btf_type_id_size (2)
bpf
|
-1 |
C |
error |
|
8 |
817d |
848d
|
23/29 |
722d |
e6c2f594ed96
bpf: Silence a warning in btf_type_id_size()
|
WARNING: bad unlock balance in bpf
bpf
|
4 |
C |
done |
|
12 |
847d |
847d
|
23/29 |
722d |
4266f41feaee
bpf: Fix bad unlock balance on freeze_mutex
|
WARNING in bpf_verifier_vlog
bpf
|
-1 |
C |
inconclusive |
|
6 |
869d |
1106d
|
23/29 |
722d |
cff36398bd4c
bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log
|
BUG: unable to handle kernel NULL pointer dereference in __build_skb_around
net
bpf
|
10 |
C |
done |
|
29 |
913d |
919d
|
22/29 |
834d |
e5995bc7e2ba
bpf, test_run: fix crashes due to XDP frame overwriting/corruption
|
KASAN: slab-out-of-bounds Write in copy_array (2)
bpf
|
23 |
|
|
|
108 |
834d |
862d
|
22/29 |
834d |
45435d8da71f
bpf: Always use maximal size for copy_array()
|
riscv/fixes boot error: WARNING in __apply_to_page_range (2)
bpf
riscv
|
-1 |
|
|
|
5 |
941d |
1003d
|
22/29 |
834d |
96f9d4daf745
riscv: Rework kasan population functions
|
general protection fault in bpf_struct_ops_link_create
bpf
net
|
2 |
C |
done |
|
17 |
908d |
910d
|
22/29 |
834d |
55fbae05476d
bpf: Check IS_ERR for the bpf_map_get() return value
|
WARNING in sock_map_del_link
net
bpf
|
-1 |
|
|
|
91 |
889d |
890d
|
22/29 |
834d |
8c5c2a4898e3
bpf, sockmap: Revert buggy deadlock fix in the sockhash and sockmap
|
KASAN: slab-out-of-bounds Write in copy_verifier_state
bpf
|
23 |
C |
error |
done |
825 |
987d |
1005d
|
22/29 |
834d |
45435d8da71f
bpf: Always use maximal size for copy_array()
|
BUG: stack guard page was hit in inet6_release
net
bpf
|
-1 |
C |
done |
|
4 |
968d |
1017d
|
22/29 |
834d |
ddce1e091757
bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
|
possible deadlock in bpf_trace_printk
trace
bpf
|
4 |
C |
done |
done |
68 |
942d |
1198d
|
22/29 |
911d |
05b24ff9b2cf
bpf: Prevent bpf program recursion for raw tracepoint probes
|
KASAN: vmalloc-out-of-bounds Read in bpf_jit_free
bpf
|
17 |
C |
|
|
68 |
1137d |
1312d
|
22/29 |
938d |
1d5f82d9dd47
bpf, x86: fix freeing of not-finalized bpf_prog_pack
d24d2a2b0a81
bpf: bpf_prog_pack: Set proper size before freeing ro_header
|
WARNING: kmalloc bug in xdp_umem_create (2)
bpf
net
|
-1 |
C |
done |
|
21 |
1317d |
1383d
|
22/29 |
938d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
BUG: sleeping function called from invalid context in sk_psock_skb_ingress_self
bpf
net
|
5 |
C |
done |
|
151 |
1048d |
1070d
|
22/29 |
938d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
WARNING in bpf_skb_load_helper_16_no_cache
bpf
|
-1 |
C |
done |
|
6 |
1144d |
1174d
|
22/29 |
938d |
0326195f523a
bpf: Make sure mac_header was set before using it
|
KASAN: vmalloc-out-of-bounds Write in ringbuf_map_alloc
bpf
|
23 |
C |
done |
|
541 |
1323d |
1326d
|
22/29 |
938d |
b293dcc473d2
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
|
bpf-next boot error: WARNING in bpf_prog_pack_free
bpf
|
-1 |
|
|
|
12 |
1277d |
1278d
|
22/29 |
938d |
96805674e562
bpf: Fix bpf_prog_pack for multi-node setup
|
KASAN: slab-out-of-bounds Write in bpf_prog_test_run_xdp
bpf
net
|
23 |
C |
done |
|
18 |
1313d |
1331d
|
22/29 |
938d |
a6763080856f
bpf: test_run: Fix OOB access in bpf_prog_test_run_xdp
|
general protection fault in do_check_common
bpf
|
2 |
C |
done |
|
5 |
1170d |
1174d
|
22/29 |
938d |
d1a6edecc1fd
bpf: Check attach_func_proto more carefully in check_return_code
|
WARNING in bpf_test_finish
bpf
net
|
-1 |
C |
done |
|
3 |
1299d |
1299d
|
22/29 |
938d |
530e214c5b5a
bpf, test_run: Fix overflow in XDP frags bpf_test_finish
|
KMSAN: uninit-value in ___bpf_prog_run (3)
bpf
|
7 |
C |
|
|
5 |
1252d |
1254d
|
22/29 |
938d |
99c07327ae11
netlink: reset network and mac headers in netlink_dump()
|
general protection fault in check_helper_call
bpf
|
2 |
C |
done |
|
4 |
1157d |
1162d
|
22/29 |
938d |
d1a6edecc1fd
bpf: Check attach_func_proto more carefully in check_return_code
|
general protection fault in btf_decl_tag_resolve
bpf
|
2 |
C |
done |
|
6 |
1324d |
1324d
|
22/29 |
938d |
d7e7b42f4f95
bpf: Fix a btf decl_tag bug when tagging a function
|
BUG: missing reserved tailroom
bpf
net
|
-1 |
C |
done |
|
2 |
1289d |
1288d
|
22/29 |
938d |
b6f1f780b393
bpf, test_run: Fix packet size check for live packet mode
|
KASAN: slab-out-of-bounds Write in __build_skb_around
bpf
net
|
23 |
C |
error |
|
2536 |
1011d |
1026d
|
22/29 |
938d |
ce098da1497c
skbuff: Introduce slab_build_skb()
|
WARNING in btf_type_id_size
bpf
|
-1 |
C |
done |
|
10 |
998d |
1069d
|
22/29 |
938d |
ea68376c8bed
bpf: prevent decl_tag from being referenced in func_proto
|
WARNING: ODEBUG bug in htab_map_alloc
bpf
|
-1 |
C |
|
|
6456 |
1081d |
1105d
|
22/29 |
938d |
cf7de6a53600
bpf: add missing percpu_counter_destroy() in htab_map_alloc()
|
WARNING: kmalloc bug in bpf
bpf
|
-1 |
C |
done |
done |
562 |
1276d |
1393d
|
22/29 |
938d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
WARNING in bpf_skb_load_helper_32
bpf
|
-1 |
C |
done |
|
9 |
1139d |
1170d
|
22/29 |
938d |
0326195f523a
bpf: Make sure mac_header was set before using it
|
WARNING in bpf_bprintf_prepare (2)
bpf
|
-1 |
C |
|
|
2 |
1071d |
1110d
|
22/29 |
938d |
05b24ff9b2cf
bpf: Prevent bpf program recursion for raw tracepoint probes
|
WARNING in check_map_prog_compatibility
bpf
|
-1 |
C |
inconclusive |
done |
128 |
1089d |
1252d
|
22/29 |
938d |
34dd3bad1a6f
bpf: Relax the requirement to use preallocated hash maps in tracing progs.
|
bpf-next boot error: KASAN: global-out-of-bounds Read in task_iter_init
bpf
|
-1 |
|
|
|
42 |
1407d |
1410d
|
20/29 |
1291d |
9e2ad638ae36
bpf: Extend BTF_ID_LIST_GLOBAL with parameter for number of IDs
|
general protection fault in bpf_skb_cgroup_id
bpf
net
|
2 |
C |
inconclusive |
|
107 |
1447d |
1462d
|
20/29 |
1291d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
general protection fault in bpf_skb_ancestor_cgroup_id
net
bpf
|
2 |
C |
unreliable |
|
232 |
1446d |
1462d
|
20/29 |
1291d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
general protection fault in dev_get_by_index_rcu (2)
net
bpf
|
2 |
C |
error |
|
18 |
1350d |
1351d
|
20/29 |
1291d |
382778edc826
xdp: check prog type before updating BPF link
|
WARNING: kmalloc bug in bpf_check
bpf
|
-1 |
C |
done |
|
34 |
1464d |
1476d
|
20/29 |
1291d |
0e6491b55970
bpf: Add oversize check before call kvcalloc()
|
KASAN: vmalloc-out-of-bounds Read in bpf_prog_put
bpf
|
17 |
C |
done |
|
2 |
1370d |
1369d
|
20/29 |
1291d |
218d747a4142
bpf, sockmap: Fix double bpf_prog_put on error case in map_link
|
WARNING in bpf_bprintf_prepare
bpf
|
-1 |
C |
unreliable |
|
96 |
1555d |
1593d
|
20/29 |
1409d |
e2d5b2bb769f
bpf: Fix nested bpf_bprintf_prepare with more per-cpu buffers
|
UBSAN: shift-out-of-bounds in ___bpf_prog_run
bpf
|
-1 |
C |
unreliable |
|
38 |
1543d |
1654d
|
20/29 |
1409d |
28131e9d9333
bpf: Fix up register-based shifts in interpreter to silence KUBSAN
|
KASAN: use-after-free Write in sk_psock_stop
bpf
net
|
24 |
syz |
done |
|
74 |
1608d |
1627d
|
20/29 |
1409d |
aadb2bb83ff7
sock_map: Fix a potential use-after-free in sock_map_close()
|
memory leak in bpf (2)
bpf
|
3 |
C |
|
|
3 |
1564d |
1632d
|
20/29 |
1409d |
ccff81e1d028
bpf: Fix false positive kmemleak report in bpf_ringbuf_area_alloc()
|
general protection fault in btf_type_id_size
bpf
|
2 |
C |
unreliable |
|
6 |
1660d |
1656d
|
20/29 |
1409d |
350a5c4dd245
bpf: Dont allow vmlinux BTF to be used in map_create and prog_load.
|
WARNING: suspicious RCU usage in tcp_bpf_update_proto
net
bpf
|
4 |
C |
done |
|
539 |
1607d |
1627d
|
20/29 |
1409d |
51e0158a5432
skmsg: Pass psock pointer to ->psock_update_sk_prot()
|
WARNING: suspicious RCU usage in bpf_get_current_cgroup_id
bpf
|
4 |
C |
done |
|
764 |
1480d |
1518d
|
20/29 |
1409d |
2d3a1e3615c5
bpf: Add rcu_read_lock in bpf_get_current_[ancestor_]cgroup_id() helpers
|
WARNING in tracepoint_add_func
trace
bpf
|
-1 |
C |
done |
|
20635 |
1525d |
1909d
|
20/29 |
1409d |
9913d5745bd7
tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing
|
KASAN: vmalloc-out-of-bounds Read in bpf_trace_run2
bpf
trace
|
17 |
C |
done |
done |
5 |
1666d |
1824d
|
20/29 |
1619d |
befe6d946551
tracepoint: Do not fail unregistering a probe due to memory failure
|
BUG: unable to handle kernel paging request in bpf_trace_run2
bpf
trace
|
8 |
C |
done |
done |
10 |
1663d |
1824d
|
20/29 |
1619d |
befe6d946551
tracepoint: Do not fail unregistering a probe due to memory failure
|
KMSAN: uninit-value in bpf_iter_prog_supported
bpf
|
7 |
|
|
|
4479 |
1623d |
1685d
|
20/29 |
1623d |
17d8beda277a
bpf: Fix an unitialized value in bpf_iter
|
KCSAN: data-race in bpf_lru_pop_free / bpf_lru_push_free
bpf
|
6 |
|
|
|
237 |
1672d |
1859d
|
20/29 |
1623d |
6df8fb83301d
bpf_lru_list: Read double-checked variable once without lock
|
KCSAN: data-race in __bpf_lru_list_rotate / bpf_lru_push_free (2)
bpf
|
6 |
|
|
|
32 |
1678d |
1747d
|
20/29 |
1623d |
6df8fb83301d
bpf_lru_list: Read double-checked variable once without lock
|
KASAN: vmalloc-out-of-bounds Read in bpf_trace_run3
bpf
trace
|
17 |
C |
done |
|
6 |
1680d |
1782d
|
20/29 |
1623d |
befe6d946551
tracepoint: Do not fail unregistering a probe due to memory failure
|
BUG: unable to handle kernel paging request in bpf_trace_run3
trace
bpf
|
8 |
C |
done |
|
40 |
1671d |
1793d
|
20/29 |
1623d |
befe6d946551
tracepoint: Do not fail unregistering a probe due to memory failure
|
memory leak in xskq_create
bpf
net
|
3 |
C |
|
|
7 |
1720d |
1741d
|
19/29 |
1654d |
8bee68338408
xsk: Fix memory leak for failed bind
|
BUG: unable to handle kernel paging request in htab_map_alloc (2)
bpf
|
8 |
C |
unreliable |
|
8 |
1741d |
1749d
|
19/29 |
1654d |
e1868b9e36d0
bpf: Avoid overflows involving hash elem_size
|
BUG: unable to handle kernel paging request in bpf_lru_populate
bpf
|
8 |
C |
done |
|
12 |
1741d |
1747d
|
19/29 |
1654d |
e1868b9e36d0
bpf: Avoid overflows involving hash elem_size
|
general protection fault in xsk_recvmsg
bpf
net
|
2 |
C |
done |
unreliable |
1800 |
1739d |
1708d
|
19/29 |
1654d |
3546b9b8eced
xsk: Validate socket state in xsk_recvmsg, prior touching socket members
|
KASAN: vmalloc-out-of-bounds Write in pcpu_freelist_populate
bpf
|
23 |
|
|
|
6 |
1743d |
1746d
|
19/29 |
1654d |
e1868b9e36d0
bpf: Avoid overflows involving hash elem_size
|
KASAN: use-after-free Read in htab_map_alloc
bpf
|
19 |
C |
done |
|
38 |
1781d |
1784d
|
19/29 |
1654d |
8aaeed81fcb9
bpf: Fix error path in htab_map_alloc()
|
BUG: unable to handle kernel paging request in htab_free_elems
bpf
|
8 |
|
|
|
1 |
1748d |
1748d
|
19/29 |
1654d |
e1868b9e36d0
bpf: Avoid overflows involving hash elem_size
|
KASAN: vmalloc-out-of-bounds Write in htab_map_alloc
bpf
|
23 |
|
|
|
6 |
1741d |
1750d
|
19/29 |
1654d |
e1868b9e36d0
bpf: Avoid overflows involving hash elem_size
|
BUG: unable to handle kernel paging request in pcpu_freelist_populate
bpf
|
8 |
C |
unreliable |
|
42 |
1739d |
1750d
|
19/29 |
1654d |
e1868b9e36d0
bpf: Avoid overflows involving hash elem_size
|
KASAN: vmalloc-out-of-bounds Read in htab_free_elems
bpf
|
17 |
C |
unreliable |
|
7 |
1747d |
1748d
|
19/29 |
1654d |
e1868b9e36d0
bpf: Avoid overflows involving hash elem_size
|
KASAN: vmalloc-out-of-bounds Write in bpf_lru_populate
bpf
|
23 |
C |
unreliable |
|
19 |
1740d |
1751d
|
19/29 |
1654d |
e1868b9e36d0
bpf: Avoid overflows involving hash elem_size
|
general protection fault in xsk_release
bpf
net
|
2 |
C |
done |
|
2 |
1820d |
1820d
|
15/29 |
1768d |
1fd17c8cd0aa
xsk: Fix possible crash in socket_release when out-of-memory
|
KASAN: use-after-free Write in xp_put_pool
net
bpf
|
24 |
C |
done |
|
50 |
1821d |
1843d
|
15/29 |
1768d |
83cf5c68d663
xsk: Fix use-after-free in failed shared_umem bind
|
general protection fault in xsk_is_setup_for_bpf_map
bpf
net
|
2 |
C |
error |
|
294 |
1820d |
1843d
|
15/29 |
1768d |
968be23ceaca
xsk: Fix possible segfault at xskmap entry insertion
|
WARNING in bpf_raw_tp_link_fill_link_info
bpf
|
-1 |
C |
error |
|
56 |
1820d |
1835d
|
15/29 |
1768d |
b474959d5afd
bpf: Fix a buffer out-of-bound access when filling raw_tp link_info
|
memory leak in xdp_umem_create
bpf
net
|
3 |
C |
|
|
17 |
1772d |
1792d
|
15/29 |
1768d |
e5e1a4bc916d
xsk: Fix possible memory leak at socket close
|
general protection fault in xsk_diag_dump (2)
bpf
net
|
2 |
C |
|
|
354 |
1825d |
1843d
|
15/29 |
1768d |
53ea2076d851
xsk: Fix possible segfault in xsk umem diagnostics
|
general protection fault in __btf_resolve_helper_id
bpf
|
2 |
C |
|
|
17 |
1893d |
1901d
|
15/29 |
1828d |
5b801dfb7feb
bpf: Fix NULL pointer dereference in __btf_resolve_helper_id()
|
KASAN: use-after-free Write in bpf_link_put
bpf
|
24 |
|
|
|
2 |
1966d |
1968d
|
15/29 |
1890d |
138c67677ff5
bpf: Fix use-after-free of bpf_link when priming half-fails
|
general protection fault in sock_hash_free
bpf
net
|
2 |
|
|
|
1 |
1934d |
1934d
|
15/29 |
1890d |
75e68e5bf2c7
bpf, sockhash: Synchronize delete from bucket list on map free
|
BUG: unable to handle kernel NULL pointer dereference in smp_call_function_many_cond (2)
bpf
|
10 |
|
|
|
1 |
1913d |
1913d
|
15/29 |
1890d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache
net
bpf
|
7 |
|
|
|
2 |
2053d |
2051d
|
15/29 |
1983d |
457fed775c97
net/smc: fix leak of kernel memory to user space
|
possible deadlock in htab_lru_map_delete_node
bpf
|
4 |
C |
done |
|
264 |
2036d |
2041d
|
15/29 |
1983d |
b9aff38de2cb
bpf: Fix a potential deadlock with bpf_map_do_batch
|
possible deadlock in bpf_lru_push_free
bpf
|
4 |
C |
done |
|
609 |
2036d |
2042d
|
15/29 |
1983d |
b9aff38de2cb
bpf: Fix a potential deadlock with bpf_map_do_batch
|
BUG: sleeping function called from invalid context in lock_sock_nested
bpf
net
|
5 |
C |
|
|
1232 |
2040d |
2115d
|
15/29 |
2040d |
37f96694cf73
crypto: af_alg - Use bh_lock_sock in sk_destruct
|
WARNING in sk_psock_drop
bpf
net
|
-1 |
|
|
|
157 |
2063d |
2072d
|
15/29 |
2040d |
58c8db929db1
net, sk_msg: Don't check if sock is locked when tearing down psock
|
general protection fault in free_verifier_state (3)
bpf
|
2 |
C |
|
|
5 |
2067d |
2074d
|
15/29 |
2040d |
f59bbfc2f609
bpf: Fix error path under memory pressure
|
KASAN: vmalloc-out-of-bounds Write in pcpu_alloc
bpf
|
23 |
C |
done |
|
31 |
2092d |
2116d
|
15/29 |
2044d |
253a496d8e57
kasan: don't assume percpu shadow allocations will succeed
|
BUG: unable to handle kernel paging request in pcpu_alloc
bpf
|
8 |
C |
done |
|
24 |
2097d |
2116d
|
15/29 |
2044d |
253a496d8e57
kasan: don't assume percpu shadow allocations will succeed
|
KASAN: slab-out-of-bounds Read in bpf_prog_create
bpf
net
|
17 |
C |
done |
|
447 |
2112d |
2193d
|
15/29 |
2081d |
0033b34a03ec
ppp: fix out-of-bounds access in bpf_prog_create()
|
KASAN: use-after-free Read in bpf_prog_kallsyms_find (2)
bpf
|
19 |
C |
done |
|
9 |
2156d |
2167d
|
13/29 |
2127d |
cd7455f1013e
bpf: Fix use after free in subprog's jited symbol removal
|
KASAN: use-after-free Read in is_bpf_text_address
bpf
|
19 |
C |
done |
|
3 |
2157d |
2159d
|
13/29 |
2127d |
cd7455f1013e
bpf: Fix use after free in subprog's jited symbol removal
|
BUG: unable to handle kernel paging request in is_bpf_text_address
bpf
|
8 |
C |
done |
|
2 |
2163d |
2163d
|
13/29 |
2127d |
cd7455f1013e
bpf: Fix use after free in subprog's jited symbol removal
|
BUG: unable to handle kernel NULL pointer dereference in xsk_poll
bpf
net
|
10 |
C |
done |
|
10 |
2163d |
2181d
|
13/29 |
2146d |
df551058f7a3
xsk: Fix crash in poll when device does not support ndo_xsk_wakeup
|
general protection fault in bpf_tcp_close (2)
bpf
|
2 |
C |
|
done |
26 |
2583d |
2626d
|
13/29 |
2160d |
e06fa9c16ce4
bpf, sockmap: fix potential use after free in bpf_tcp_close
|
general protection fault in xsk_poll
net
bpf
|
2 |
C |
done |
|
430 |
2195d |
2222d
|
13/29 |
2165d |
42fddcc7c64b
xsk: use state member for socket synchronization
|
general protection fault in xsk_map_update_elem
bpf
|
2 |
C |
done |
|
12 |
2185d |
2188d
|
13/29 |
2165d |
fcd30ae0665c
bpf/xskmap: Return ERR_PTR for failure case instead of NULL.
|
general protection fault in dev_map_hash_update_elem
bpf
net
|
2 |
C |
done |
|
4 |
2199d |
2205d
|
13/29 |
2165d |
af58e7ee6a8d
xdp: Fix race in dev_map_hash_update_elem() when replacing element
|
WARNING in __mark_chain_precision (2)
bpf
|
-1 |
C |
done |
|
18 |
2194d |
2213d
|
13/29 |
2172d |
2339cd6cd0b5
bpf: fix precision tracking of stack slots
|
WARNING: suspicious RCU usage (4)
bpf
trace
|
-1 |
C |
|
done |
1 |
2574d |
2573d
|
13/29 |
2177d |
865e63b04e9b
tracing: Add back in rcu_irq_enter/exit_irqson() for rcuidle tracepoints
|
WARNING: suspicious RCU usage in trace_call_bpf
trace
bpf
|
4 |
C |
|
done |
327 |
2555d |
2573d
|
13/29 |
2177d |
865e63b04e9b
tracing: Add back in rcu_irq_enter/exit_irqson() for rcuidle tracepoints
|
KASAN: use-after-free Read in psock_map_pop
bpf
|
19 |
C |
|
done |
204 |
2523d |
2566d
|
13/29 |
2177d |
5607fff30363
bpf: sockmap only allow ESTABLISHED sock state
|
KASAN: slab-out-of-bounds Read in sock_hash_ctx_update_elem
bpf
|
17 |
C |
|
done |
5 |
2607d |
2608d
|
13/29 |
2177d |
b845c898b2f1
bpf, sockmap: fix sock_hash_alloc and reject zero-sized keys
|
general protection fault in smap_list_hash_remove
bpf
|
2 |
C |
|
done |
52 |
2615d |
2634d
|
13/29 |
2177d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
WARNING in bpf_jit_free
bpf
|
-1 |
C |
done |
|
21697 |
2205d |
2622d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
WARNING in bpf_prog_kallsyms_add
bpf
|
-1 |
syz |
done |
done |
2 |
2247d |
2450d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
BUG: unable to handle kernel paging request in bpf_prog_kallsyms_find
bpf
|
8 |
syz |
done |
inconclusive |
3 |
2422d |
2496d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
BUG: unable to handle kernel paging request in bpf_prog_kallsyms_add
bpf
|
8 |
syz |
error |
|
234 |
2205d |
2566d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
KASAN: use-after-free Read in bpf_prog_kallsyms_del
bpf
|
19 |
syz |
done |
inconclusive |
3 |
2452d |
2531d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
KASAN: use-after-free Read in bpf_get_prog_name
bpf
|
19 |
|
|
|
1 |
2247d |
2247d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
WARNING in bpf_prog_kallsyms_find
bpf
|
-1 |
C |
error |
|
5632 |
2205d |
2326d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
WARNING in is_bpf_text_address
bpf
|
-1 |
C |
done |
|
104 |
2215d |
2282d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
KASAN: use-after-free Read in bpf_prog_kallsyms_add
bpf
|
19 |
syz |
error |
inconclusive |
120 |
2332d |
2566d
|
12/29 |
2204d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
BUG: unable to handle kernel paging request in __do_softirq
bpf
|
8 |
syz |
done |
done |
1 |
2284d |
2284d
|
12/29 |
2215d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
BUG: unable to handle kernel paging request in tls_prots
bpf
net
|
8 |
syz |
done |
|
1 |
2277d |
2277d
|
12/29 |
2215d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
possible deadlock in xsk_notifier
bpf
net
|
4 |
C |
done |
|
495 |
2253d |
2265d
|
12/29 |
2228d |
5464c3a0e9a0
xdp: fix potential deadlock on socket mutex
|
general protection fault in btf_array_resolve
bpf
|
2 |
C |
error |
|
109 |
2261d |
2284d
|
12/29 |
2237d |
e4f07120210a
bpf: fix NULL deref in btf_type_is_resolve_source_only
|
general protection fault in btf_struct_resolve
bpf
|
2 |
C |
error |
|
49 |
2261d |
2284d
|
12/29 |
2237d |
e4f07120210a
bpf: fix NULL deref in btf_type_is_resolve_source_only
|
KASAN: use-after-free Read in __dev_map_entry_free
bpf
net
|
19 |
C |
|
|
473 |
2367d |
2648d
|
12/29 |
2285d |
2baae3545327
bpf: devmap: fix use-after-free Read in __dev_map_entry_free
|
general protection fault in xsk_diag_dump
bpf
net
|
2 |
C |
|
|
5 |
2385d |
2390d
|
11/29 |
2367d |
915905f8b1d4
xsk: fix potential crash in xsk_diag_put_umem()
|
KASAN: use-after-free Read in bpf_cgroup_storage_release
bpf
|
19 |
C |
|
|
2 |
2605d |
2605d
|
11/29 |
2406d |
82c018d734a7
Merge branch 'bpf-cgroup-local-storage'
|
WARNING in __debug_object_init (3)
bpf
net
|
-1 |
C |
|
|
1557 |
2517d |
2518d
|
11/29 |
2433d |
2cb494a36c98
bpf: add tests for direct packet access from CGROUP_SKB
|
KASAN: slab-out-of-bounds Write in queue_stack_map_push_elem
bpf
|
23 |
C |
|
|
30 |
2487d |
2490d
|
11/29 |
2478d |
813961de3ee6
bpf: fix integer overflow in queue_stack_map
|
WARNING in bpf_check (2)
bpf
|
-1 |
C |
|
|
9 |
2500d |
2500d
|
11/29 |
2478d |
afd594240806
bpf: fix off-by-one error in adjust_subprog_starts
|
KASAN: slab-out-of-bounds Read in refcount_inc_not_zero_checked
net
bpf
|
17 |
|
|
|
2 |
2528d |
2529d
|
11/29 |
2502d |
5032d079909d
bpf: skmsg, fix psock create on existing kcm/tls port
|
BUG: sleeping function called from invalid context at net/core/dev.c:LINE
bpf
|
-1 |
syz |
|
|
8 |
2529d |
2538d
|
11/29 |
2516d |
cee271678d0e
xsk: do not call synchronize_net() under RCU read lock
|
WARNING in pcpu_alloc
bpf
|
-1 |
C |
|
|
4 |
2536d |
2545d
|
11/29 |
2535d |
b0584ea66d73
bpf: don't accept cgroup local storage with zero value size
|
WARNING: suspicious RCU usage in bpf_prog_array_copy_core
bpf
|
4 |
C |
|
|
22873 |
2579d |
2593d
|
8/29 |
2579d |
965931e3a803
bpf: fix a rcu usage warning in bpf_prog_array_copy_core()
|
KASAN: out-of-bounds Read in bpf_test_finish
bpf
net
|
17 |
|
|
|
9 |
2623d |
2629d
|
8/29 |
2600d |
6e6fddc78323
bpf: fix panic due to oob in bpf_prog_test_run_skb
|
WARNING: refcount bug in smap_release_sock
bpf
|
13 |
C |
|
|
55 |
2616d |
2655d
|
8/29 |
2600d |
7ebc14d507b4
bpf: sockmap, consume_skb in close path
547b3aa451ae
bpf: sockmap, error path can not release psock in multi-map case
|
KASAN: stack-out-of-bounds Read in bpf_tcp_close
bpf
|
17 |
C |
|
|
1 |
2619d |
2619d
|
8/29 |
2600d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
WARNING in bpf_check
bpf
|
-1 |
|
|
|
3 |
2620d |
2626d
|
8/29 |
2600d |
c7a897843224
bpf: don't leave partial mangled prog in jit_subprogs error path
|
WARNING in do_debug (2)
bpf
|
-1 |
|
|
|
1 |
2620d |
2620d
|
8/29 |
2600d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
KASAN: use-after-free Read in bpf_test_finish
net
bpf
|
19 |
C |
|
|
1211 |
2615d |
2629d
|
8/29 |
2600d |
6e6fddc78323
bpf: fix panic due to oob in bpf_prog_test_run_skb
|
WARNING in bpf_int_jit_compile
bpf
net
|
-1 |
syz |
|
|
11 |
2636d |
2673d
|
8/29 |
2629d |
9facc336876f
bpf: reject any prog that failed read-only lock
|
possible deadlock in sock_hash_free
bpf
|
4 |
C |
|
|
45 |
2670d |
2670d
|
8/29 |
2629d |
e9db4ef6bf4c
bpf: sockhash fix omitted bucket lock in sock_close
|
WARNING: ODEBUG bug in sock_hash_free
bpf
|
-1 |
|
|
|
1 |
2643d |
2642d
|
8/29 |
2629d |
e9db4ef6bf4c
bpf: sockhash fix omitted bucket lock in sock_close
|
KASAN: slab-out-of-bounds Read in bpf_csum_update
bpf
net
|
17 |
C |
|
|
2 |
2666d |
2664d
|
8/29 |
2629d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
INFO: rcu detected stall in is_bpf_text_address
bpf
|
1 |
C |
|
|
1 |
2680d |
2680d
|
8/29 |
2629d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
KASAN: use-after-free Read in bpf_skb_change_proto
net
bpf
|
19 |
|
|
|
1 |
2659d |
2658d
|
8/29 |
2629d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
WARNING in bpf_prog_select_runtime
bpf
|
-1 |
syz |
|
|
45 |
2653d |
2654d
|
8/29 |
2629d |
9facc336876f
bpf: reject any prog that failed read-only lock
|
KASAN: slab-out-of-bounds Read in bpf_skb_vlan_push
net
bpf
|
17 |
syz |
|
|
2 |
2655d |
2655d
|
8/29 |
2629d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
KASAN: use-after-free Read in skb_ensure_writable
bpf
net
|
19 |
C |
|
|
4 |
2658d |
2664d
|
8/29 |
2629d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
KASAN: use-after-free Read in bpf_tcp_close
bpf
|
19 |
C |
|
|
1748 |
2634d |
2673d
|
8/29 |
2629d |
e9db4ef6bf4c
bpf: sockhash fix omitted bucket lock in sock_close
|
BUG: unable to handle kernel paging request in bpf_prog_select_runtime
bpf
|
8 |
|
|
|
1 |
2644d |
2644d
|
8/29 |
2629d |
85782e037f8a
bpf: undo prog rejection on read-only lock failure
|
WARNING: kmalloc bug in xdp_umem_create
net
bpf
|
-1 |
C |
|
|
7 |
2652d |
2658d
|
8/29 |
2629d |
a343993c518c
xsk: silence warning on memory allocation failure
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto
bpf
net
|
17 |
C |
|
|
2 |
2658d |
2658d
|
8/29 |
2629d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
KASAN: slab-out-of-bounds Read in skb_ensure_writable
net
bpf
|
17 |
C |
|
|
9 |
2655d |
2664d
|
8/29 |
2629d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
KASAN: use-after-free Read in bpf_csum_update
net
bpf
|
19 |
C |
|
|
1 |
2666d |
2664d
|
8/29 |
2629d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
BUG: unable to handle kernel paging request in bpf_int_jit_compile
net
bpf
|
8 |
syz |
|
|
2 |
2641d |
2644d
|
8/29 |
2629d |
85782e037f8a
bpf: undo prog rejection on read-only lock failure
|
KASAN: use-after-free Write in bpf_tcp_close
bpf
|
24 |
C |
|
|
67 |
2636d |
2671d
|
8/29 |
2629d |
e9db4ef6bf4c
bpf: sockhash fix omitted bucket lock in sock_close
|
general protection fault in bpf_tcp_close
bpf
|
2 |
C |
|
|
421 |
2629d |
2673d
|
8/29 |
2629d |
e9db4ef6bf4c
bpf: sockhash fix omitted bucket lock in sock_close
54fedb42c653
bpf: sockmap, fix smap_list_map_remove when psock is in many maps
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_head
bpf
net
|
17 |
C |
|
|
2 |
2654d |
2654d
|
8/29 |
2629d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
WARNING: kmalloc bug in map_get_next_key
bpf
|
-1 |
C |
|
|
5 |
2682d |
2683d
|
8/29 |
2629d |
683d2ac3904c
bpf: fix sock hashmap kmalloc warning
|
KASAN: null-ptr-deref Write in xdp_umem_unaccount_pages
net
bpf
|
12 |
C |
|
|
25 |
2657d |
2661d
|
8/29 |
2629d |
c09290c56376
bpf, xdp: fix crash in xdp_umem_unaccount_pages
|
WARNING: kmalloc bug in memdup_user (3)
bpf
|
-1 |
C |
|
|
137 |
2682d |
2683d
|
8/29 |
2629d |
683d2ac3904c
bpf: fix sock hashmap kmalloc warning
|
possible deadlock in bpf_tcp_close
bpf
|
4 |
C |
|
|
152 |
2670d |
2671d
|
8/29 |
2629d |
e9db4ef6bf4c
bpf: sockhash fix omitted bucket lock in sock_close
|
possible deadlock in perf_event_detach_bpf_prog
bpf
trace
|
4 |
|
|
|
1 |
2731d |
2730d
|
5/29 |
2690d |
3a38bb98d9ab
bpf/tracing: fix a deadlock in perf_event_detach_bpf_prog
|
WARNING in kvmalloc_node
bpf
net
|
-1 |
C |
|
|
513 |
2768d |
2774d
|
4/29 |
2761d |
7fc17e909edf
bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
|
general protection fault in SyS_bpf (2)
bpf
|
2 |
C |
|
|
1065 |
2761d |
2776d
|
4/29 |
2761d |
952fad8e3239
bpf: fix sock_map_alloc() error path
|
WARNING: kmalloc bug in bpf_prog_array_copy_info
bpf
|
-1 |
C |
|
|
4424 |
2761d |
2774d
|
4/29 |
2761d |
9c481b908b01
bpf: fix bpf_prog_array_copy_to_user warning from perf event prog query
|
WARNING: kmalloc bug in cpu_map_update_elem
net
bpf
|
-1 |
C |
|
|
2677 |
2761d |
2773d
|
4/29 |
2761d |
7fc17e909edf
bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
|
general protection fault in ___bpf_prog_run
bpf
|
2 |
C |
|
|
8 |
2781d |
2788d
|
4/29 |
2776d |
65073a67331d
bpf: fix null pointer deref in bpf_prog_test_run_xdp
|
general protection fault in trie_get_next_key
bpf
|
2 |
C |
|
|
3 |
2793d |
2793d
|
4/29 |
2786d |
6dd1ec6c7a2c
bpf: fix kernel page fault in lpm map trie_get_next_key
|
KASAN: use-after-free Read in __bpf_prog_put
bpf
|
19 |
|
|
|
1 |
2808d |
2808d
|
4/29 |
2787d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
BUG: unable to handle kernel paging request in check_memory_region
bpf
|
8 |
C |
|
|
10 |
2803d |
2806d
|
4/29 |
2787d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
KASAN: use-after-free Read in map_lookup_elem
bpf
|
19 |
C |
|
|
6 |
2802d |
2806d
|
4/29 |
2787d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (3)
bpf
|
-1 |
C |
|
|
5087 |
2788d |
2797d
|
4/29 |
2787d |
2310035fa03f
bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
|
general protection fault in copy_verifier_state
bpf
|
2 |
C |
|
|
2 |
2820d |
2816d
|
4/29 |
2787d |
5896351ea936
bpf: fix verifier GPF in kmalloc failure path
|
BUG: sleeping function called from invalid context at mm/slab.h:LINE (2)
bpf
|
-1 |
|
|
|
2 |
2796d |
2796d
|
4/29 |
2787d |
2310035fa03f
bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
|
WARNING in xdp_rxq_info_unreg
bpf
net
|
-1 |
C |
|
|
198 |
2796d |
2796d
|
4/29 |
2787d |
c13da21cdb80
tun: avoid calling xdp_rxq_info_unreg() twice
|
general protection fault in free_verifier_state (2)
bpf
|
2 |
C |
|
|
2 |
2811d |
2811d
|
4/29 |
2787d |
5896351ea936
bpf: fix verifier GPF in kmalloc failure path
|
suspicious RCU usage at mm/slab.h:LINE
bpf
|
-1 |
|
|
|
1 |
2796d |
2796d
|
4/29 |
2787d |
2310035fa03f
bpf: fix incorrect kmalloc usage in lpm_trie MAP_GET_NEXT_KEY rcu region
|
KASAN: slab-out-of-bounds Read in map_lookup_elem
bpf
|
17 |
C |
|
|
6 |
2803d |
2806d
|
4/29 |
2796d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
KASAN: use-after-free Write in array_map_update_elem
bpf
|
24 |
C |
|
|
11 |
2802d |
2804d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
BUG: unable to handle kernel paging request in bpf_fd_array_map_lookup_elem
bpf
|
8 |
|
|
|
5 |
2802d |
2806d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
general protection fault in __bpf_prog_put
bpf
|
2 |
C |
|
|
212 |
2802d |
2809d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
WARNING in ___bpf_prog_run
bpf
|
-1 |
C |
|
|
28 |
2802d |
2809d
|
4/29 |
2797d |
7891a87efc71
bpf: arsh is not supported in 32 bit alu thus reject it
|
BUG: unable to handle kernel paging request in fd_array_map_delete_elem
bpf
|
8 |
|
|
|
11 |
2802d |
2809d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
KASAN: slab-out-of-bounds Read in perf_event_fd_array_release
bpf
|
17 |
C |
|
|
96 |
2802d |
2809d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
KASAN: use-after-free Read in bpf_fd_array_map_lookup_elem
bpf
|
19 |
|
|
|
21 |
2802d |
2808d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
general protection fault in __bpf_map_put
bpf
|
2 |
C |
|
|
331 |
2802d |
2809d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
general protection fault in cgroup_fd_array_put_ptr
bpf
|
2 |
C |
|
|
219 |
2802d |
2809d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
divide error in ___bpf_prog_run
bpf
|
2 |
C |
|
|
28 |
2799d |
2806d
|
4/29 |
2797d |
68fda450a7df
bpf: fix 32-bit divide by zero
|
KASAN: slab-out-of-bounds Read in bpf_fd_array_map_lookup_elem
bpf
|
17 |
|
|
|
7 |
2804d |
2808d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
KASAN: slab-out-of-bounds Write in array_map_update_elem
bpf
|
23 |
C |
|
|
6 |
2804d |
2804d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
BUG: unable to handle kernel paging request in __bpf_map_put
bpf
|
8 |
|
|
|
1 |
2806d |
2805d
|
4/29 |
2797d |
bbeb6e4323da
bpf, array: fix overflow in max_entries and undefined behavior in index_mask
|
WARNING in adjust_ptr_min_max_vals
bpf
|
-1 |
C |
|
|
252 |
2799d |
2816d
|
4/29 |
2797d |
6f16101e6a8b
bpf: mark dst unknown on inconsistent {s, u}bounds adjustments
|
general protection fault in free_verifier_state
bpf
|
2 |
C |
|
|
2 |
2829d |
2829d
|
3/29 |
2823d |
8c01c4f896aa
bpf: fix verifier NULL pointer dereference
|
general protection fault in bpf_check
bpf
|
2 |
|
|
|
3 |
2873d |
2878d
|
3/29 |
2852d |
8c01c4f896aa
bpf: fix verifier NULL pointer dereference
|