syzbot


Applied filters: Label=subsystems:bridge (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KCSAN: data-race in br_fdb_update / br_fdb_update (8) bridge 6 44 116d 116d 28/29 never b25a0b4a2193 net: bridge: annotate data-races around fdb->{updated,used}
WARNING in br_multicast_del_pg bridge -1 2 76d 82d 28/29 never 8b769e311a86 net: bridge: mcast: always update mdb_n_entries for vlan contexts
KASAN: slab-use-after-free Read in br_switchdev_fdb_notify (2) bridge 19 4 188d 204d 29/29 100d 8dca36978aa8 net: bridge: fix use-after-free due to MST port state bypass
KASAN: slab-use-after-free Read in br_switchdev_fdb_populate bridge 19 1 187d 181d 29/29 116d 8dca36978aa8 net: bridge: fix use-after-free due to MST port state bypass
WARNING in br_nf_local_in bridge netfilter -1 1 240d 236d 29/29 180d netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
KASAN: slab-use-after-free Read in br_multicast_has_router_adjacent bridge 19 2 314d 312d 29/29 240d 7544f3f5b0b5 bridge: mcast: Fix use-after-free during router port configuration
KASAN: slab-use-after-free Read in br_multicast_add_router bridge 19 1 328d 324d 29/29 240d 7544f3f5b0b5 bridge: mcast: Fix use-after-free during router port configuration
INFO: rcu detected stall in br_handle_frame (5) bridge 1 syz 24 539d 568d 28/29 536d a1494d532e28 netdevsim: use cond_resched() in nsim_dev_trap_report_work()
KASAN: slab-use-after-free Read in br_multicast_port_group_expired bridge 19 1 675d 675d 28/29 576d 92c4ee25208d net: bridge: mcast: wait for previous gc cycles when removing port
WARNING: suspicious RCU usage in br_mst_set_state (2) bridge 4 10 682d 693d 26/29 662d 546ceb1dfdac net: bridge: mst: fix suspicious rcu usage in br_mst_set_state 36c92936e868 net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state
KMSAN: uninit-value in br_dev_xmit (2) bridge 7 C 2 725d 721d 25/29 696d 8bd67ebb50c0 net: bridge: xmit: make sure we have at least eth header len bytes
WARNING: suspicious RCU usage in br_mst_set_state bridge 4 45 696d 730d 25/29 696d 3a7c1661ae13 net: bridge: mst: fix vlan use-after-free
KASAN: slab-out-of-bounds Read in update_counters netfilter bridge 17 C 3 757d 757d 25/29 710d 0c83842df40f netfilter: validate user input for expected length
KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish (8) bridge 6 1 959d 958d 25/29 864d 44bdb313da57 net: bridge: use DEV_STATS_INC()
WARNING in dev_index_reserve bridge -1 C done 7120 936d 990d 23/29 934d f534f6581ec0 net: validate veth and vxcan peer ifindexes 30188bd7838c rtnetlink: Reject negative ifindexes in RTM_NEWLINK
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table bridge netfilter 17 C error 4 1170d 1170d 22/29 1059d e58a171d35e3 netfilter: ebtables: fix table blob use-after-free
general protection fault in br_mst_info_size bridge 2 C error 26 1500d 1503d 22/29 1163d cde3fc244b3d net: bridge: mst: prevent NULL deref in br_mst_info_size()
memory leak in do_replace bridge netfilter 3 C 1 1325d 1321d 22/29 1163d 62ce44c4fff9 netfilter: ebtables: fix memory leak when blob is malformed
KASAN: slab-out-of-bounds Read in add_del_if bridge 17 C unreliable 970 1726d 1703d 20/29 1635d 9384eacd80f3 net: core: don't call SIOCBRADD/DELIF for non-bridge devices
general protection fault in br_switchdev_fdb_notify bridge 2 C error 82 1730d 1735d 20/29 1635d 0541a6293298 net: bridge: validate the NUD_PERMANENT bit when adding an extern_learn FDB entry
WARNING in compat_do_ebt_get_ctl bridge netfilter -1 C done 15 2084d 2095d 15/29 2054d 5c04da55c754 netfilter: ebtables: reject bogus getopt len value
KASAN: slab-out-of-bounds Read in br_mrp_parse bridge 17 C done 5 2172d 2173d 15/29 2115d 617504c67e01 bridge: mrp: Fix out-of-bounds read in br_mrp_parse
KASAN: use-after-free Read in br_dev_xmit bridge 19 1 2258d 2258d 15/29 2208d 823d81b0fa2c net: bridge: fix stale eth hdr pointer in br_dev_xmit
KMSAN: uninit-value in br_nf_forward_arp (3) bridge netfilter 7 2 2346d 2338d 15/29 2270d 5604285839aa net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
KASAN: vmalloc-out-of-bounds Read in compat_copy_entries netfilter bridge 17 C done 3 2331d 2331d 15/29 2270d e608f631f0ba netfilter: ebtables: compat: reject all padding in matches/watchers
memory leak in fdb_create (2) bridge 3 C 1 2344d 2343d 15/29 2307d c4b4c421857d net: bridge: deny dev_set_mac_address() when unregistering
memory leak in fdb_create bridge 3 C done 4 2465d 2505d 12/29 2440d d7bae09fa008 net: bridge: delete local fdb on device init failure
KASAN: use-after-free Read in brnf_exit_net bridge netfilter 19 syz done 3 2506d 2509d 12/29 2462d 7e6daf50e1f4 netfilter: bridge: prevent UAF in brnf_exit_net()
KASAN: use-after-free Read in br_mdb_ip_get bridge 19 1 2652d 2652d 12/29 2528d 1515a63fc413 net: bridge: always clear mcast matching struct on reports and leaves
KMSAN: uninit-value in br_mdb_ip_get bridge 7 5 2593d 2651d 12/29 2529d 1515a63fc413 net: bridge: always clear mcast matching struct on reports and leaves
KASAN: use-after-free Read in br_multicast_rcv bridge 19 1 2611d 2611d 11/29 2593d 083b78a9ed64 ip: fix ip_mc_may_pull() return value
general protection fault in fdb_find_rcu bridge 2 C 3 2685d 2681d 11/29 2664d f989d03ef25d net: rtnetlink: address is mandatory for rtnl_fdb_get
KASAN: use-after-free Read in nbp_vlan_rcu_free bridge 19 1 2729d 2729d 11/29 2704d 9d332e69c1dc net: bridge: fix vlan stats use-after-free on destruction
KMSAN: uninit-value in br_nf_forward_arp netfilter bridge 7 1 2893d 2890d 8/29 2846d b84bbaf7a6c8 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in ebt_stp_mt_check (2) bridge netfilter 7 C 222 2854d 2886d 8/29 2854d c568503ef020 netfilter: x_tables: initialise match/target check parameter struct
WARNING in ebt_do_table bridge netfilter -1 C 13 2863d 2888d 8/29 2854d 11ff7288beb2 netfilter: ebtables: reject non-bridge targets
KASAN: stack-out-of-bounds Write in compat_copy_entries netfilter bridge 21 syz 10 2892d 2930d 5/29 2886d 94c752f99954 netfilter: ebtables: handle string from userspace with care
KMSAN: uninit-value in ebt_stp_mt_check netfilter bridge 7 C 211 2887d 2932d 5/29 2886d a4995684a949 netfilter: bridge: stp fix reference to uninitialized data
WARNING: kobject bug in br_add_if bridge -1 41 2917d 2943d 5/29 2909d e8238fc2bd7b bridge: check iface upper dev when setting master via ioctl 3e14c6abbfb5 kobject: don't use WARN for registration failures
BUG: unable to handle kernel paging request in compat_copy_entries netfilter bridge 8 syz 5 2982d 2981d 5/29 2930d b71812168571 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
BUG: unable to handle kernel paging request in ebt_among_mt_check (2) netfilter bridge 8 C 946 2962d 2978d 4/29 2962d c8d70a700a5b netfilter: bridge: ebt_among: add more missing match size checks
BUG: unable to handle kernel paging request in ebt_among_mt_check bridge netfilter 8 C 823 2979d 2995d 4/29 2979d c4585a2823ed netfilter: bridge: ebt_among: add missing match size checks
WARNING in compat_copy_entries netfilter bridge -1 C 434 2980d 2995d 4/29 2979d b71812168571 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets