syzbot


Applied filters: Label=subsystems:bridge (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KASAN: slab-use-after-free Read in br_multicast_port_group_expired bridge 1 102d 101d 28/28 3d21h 92c4ee25208d net: bridge: mcast: wait for previous gc cycles when removing port
WARNING: suspicious RCU usage in br_mst_set_state (2) bridge 10 109d 120d 26/28 89d 546ceb1dfdac net: bridge: mst: fix suspicious rcu usage in br_mst_set_state 36c92936e868 net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state
KMSAN: uninit-value in br_dev_xmit (2) bridge C 2 152d 148d 25/28 123d 8bd67ebb50c0 net: bridge: xmit: make sure we have at least eth header len bytes
WARNING: suspicious RCU usage in br_mst_set_state bridge 45 123d 157d 25/28 123d 3a7c1661ae13 net: bridge: mst: fix vlan use-after-free
KASAN: slab-out-of-bounds Read in update_counters bridge netfilter C 3 184d 184d 25/28 137d 0c83842df40f netfilter: validate user input for expected length
KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish (8) bridge 1 386d 385d 25/28 291d 44bdb313da57 net: bridge: use DEV_STATS_INC()
WARNING in dev_index_reserve bridge C done 7120 363d 417d 23/28 360d f534f6581ec0 net: validate veth and vxcan peer ifindexes 30188bd7838c rtnetlink: Reject negative ifindexes in RTM_NEWLINK
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table bridge netfilter C error 4 597d 597d 22/28 486d e58a171d35e3 netfilter: ebtables: fix table blob use-after-free
general protection fault in br_mst_info_size bridge C error 26 927d 930d 22/28 590d cde3fc244b3d net: bridge: mst: prevent NULL deref in br_mst_info_size()
memory leak in do_replace netfilter bridge C 1 752d 748d 22/28 590d 62ce44c4fff9 netfilter: ebtables: fix memory leak when blob is malformed
KASAN: slab-out-of-bounds Read in add_del_if bridge C unreliable 970 1153d 1130d 20/28 1062d 9384eacd80f3 net: core: don't call SIOCBRADD/DELIF for non-bridge devices
general protection fault in br_switchdev_fdb_notify bridge C error 82 1157d 1162d 20/28 1062d 0541a6293298 net: bridge: validate the NUD_PERMANENT bit when adding an extern_learn FDB entry
WARNING in compat_do_ebt_get_ctl bridge netfilter C done 15 1511d 1522d 15/28 1481d 5c04da55c754 netfilter: ebtables: reject bogus getopt len value
KASAN: slab-out-of-bounds Read in br_mrp_parse bridge C done 5 1599d 1600d 15/28 1542d 617504c67e01 bridge: mrp: Fix out-of-bounds read in br_mrp_parse
KASAN: use-after-free Read in br_dev_xmit bridge 1 1685d 1685d 15/28 1635d 823d81b0fa2c net: bridge: fix stale eth hdr pointer in br_dev_xmit
KMSAN: uninit-value in br_nf_forward_arp (3) bridge netfilter 2 1773d 1765d 15/28 1697d 5604285839aa net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
KASAN: vmalloc-out-of-bounds Read in compat_copy_entries netfilter bridge C done 3 1758d 1758d 15/28 1697d e608f631f0ba netfilter: ebtables: compat: reject all padding in matches/watchers
memory leak in fdb_create (2) bridge C 1 1771d 1770d 15/28 1734d c4b4c421857d net: bridge: deny dev_set_mac_address() when unregistering
memory leak in fdb_create bridge C done 4 1892d 1932d 12/28 1867d d7bae09fa008 net: bridge: delete local fdb on device init failure
KASAN: use-after-free Read in brnf_exit_net bridge netfilter syz done 3 1933d 1936d 12/28 1889d 7e6daf50e1f4 netfilter: bridge: prevent UAF in brnf_exit_net()
KASAN: use-after-free Read in br_mdb_ip_get bridge 1 2079d 2079d 12/28 1955d 1515a63fc413 net: bridge: always clear mcast matching struct on reports and leaves
KMSAN: uninit-value in br_mdb_ip_get bridge 5 2020d 2078d 12/28 1955d 1515a63fc413 net: bridge: always clear mcast matching struct on reports and leaves
KASAN: use-after-free Read in br_multicast_rcv bridge 1 2038d 2038d 11/28 2020d 083b78a9ed64 ip: fix ip_mc_may_pull() return value
general protection fault in fdb_find_rcu bridge C 3 2112d 2108d 11/28 2091d f989d03ef25d net: rtnetlink: address is mandatory for rtnl_fdb_get
KASAN: use-after-free Read in nbp_vlan_rcu_free bridge 1 2156d 2156d 11/28 2131d 9d332e69c1dc net: bridge: fix vlan stats use-after-free on destruction
KMSAN: uninit-value in br_nf_forward_arp bridge netfilter 1 2320d 2317d 8/28 2273d b84bbaf7a6c8 packet: in packet_snd start writing at link layer allocation
KMSAN: uninit-value in ebt_stp_mt_check (2) bridge netfilter C 222 2281d 2313d 8/28 2281d c568503ef020 netfilter: x_tables: initialise match/target check parameter struct
WARNING in ebt_do_table bridge netfilter C 13 2290d 2315d 8/28 2281d 11ff7288beb2 netfilter: ebtables: reject non-bridge targets
KMSAN: uninit-value in ebt_stp_mt_check bridge netfilter C 211 2314d 2359d 5/28 2313d a4995684a949 netfilter: bridge: stp fix reference to uninitialized data
KASAN: stack-out-of-bounds Write in compat_copy_entries bridge netfilter syz 10 2319d 2357d 5/28 2313d 94c752f99954 netfilter: ebtables: handle string from userspace with care
WARNING: kobject bug in br_add_if bridge 41 2344d 2370d 5/28 2336d e8238fc2bd7b bridge: check iface upper dev when setting master via ioctl 3e14c6abbfb5 kobject: don't use WARN for registration failures
BUG: unable to handle kernel paging request in compat_copy_entries bridge netfilter syz 5 2409d 2408d 5/28 2357d b71812168571 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
BUG: unable to handle kernel paging request in ebt_among_mt_check (2) bridge netfilter C 946 2389d 2405d 4/28 2389d c8d70a700a5b netfilter: bridge: ebt_among: add more missing match size checks
WARNING in compat_copy_entries bridge netfilter C 434 2406d 2422d 4/28 2406d b71812168571 netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
BUG: unable to handle kernel paging request in ebt_among_mt_check bridge netfilter C 823 2406d 2422d 4/28 2406d c4585a2823ed netfilter: bridge: ebt_among: add missing match size checks