KCSAN: data-race in can_send / can_send (5)
can
|
6 |
|
|
|
56 |
144d |
154d
|
28/29 |
61d |
80b5f90158d1
can: statistics: use atomic access in hot path
|
WARNING in ucan_probe
can
|
-1 |
C |
done |
|
143 |
143d |
174d
|
28/29 |
61d |
1d22a122ffb1
can: ucan: fix out of bound read in strscpy() source
|
WARNING: refcount bug in sk_skb_reason_drop
can
|
13 |
C |
done |
|
8107 |
244d |
311d
|
28/29 |
96d |
a8c695005bfe
can: j1939: j1939_session_new(): fix skb reference counting
|
WARNING in remove_proc_entry (6)
can
|
-1 |
C |
done |
|
377 |
310d |
340d
|
28/29 |
292d |
94b0818fa635
can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().
|
INFO: task hung in cangw_pernet_exit_batch (3)
can
|
1 |
|
|
|
33 |
397d |
413d
|
26/29 |
397d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
KMSAN: kernel-infoleak in raw_recvmsg
can
|
9 |
C |
|
|
121 |
423d |
471d
|
26/29 |
397d |
b7cdf1dd5d2a
net: can: j1939: Initialize unused data in j1939_send_one()
|
possible deadlock in j1939_sk_queue_drop_all
can
|
4 |
C |
error |
done |
281 |
559d |
1432d
|
25/29 |
502d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
possible deadlock in j1939_sk_errqueue (2)
can
|
4 |
C |
done |
|
24 |
542d |
768d
|
25/29 |
502d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
possible deadlock in j1939_session_activate
can
|
4 |
C |
done |
done |
67 |
553d |
1388d
|
25/29 |
502d |
6cdedc18ba7b
can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
|
KASAN: use-after-free Read in raw_release
can
|
19 |
|
|
|
1 |
739d |
739d
|
23/29 |
668d |
11c9027c983e
can: raw: fix lockdep issue in raw_release()
|
possible deadlock in raw_bind
can
|
4 |
|
|
|
4535 |
741d |
753d
|
23/29 |
668d |
11c9027c983e
can: raw: fix lockdep issue in raw_release()
|
KASAN: use-after-free Write in j1939_sock_pending_del
can
|
24 |
syz |
done |
error |
17 |
2093d |
2105d
|
23/29 |
731d |
fd81ebfe7975
can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
|
WARNING in j1939_session_deactivate_activate_next
can
|
-1 |
C |
error |
done |
502 |
859d |
1265d
|
22/29 |
794d |
d0553680f94c
can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
|
possible deadlock in j1939_sk_errqueue
can
|
4 |
C |
unreliable |
|
227 |
865d |
1402d
|
22/29 |
794d |
d1366b283d94
can: j1939: prevent deadlock by moving j1939_sk_errqueue()
|
KMSAN: uninit-value in can_send
can
|
7 |
C |
|
|
630 |
993d |
1011d
|
22/29 |
898d |
3eb3d283e857
can: j1939: j1939_send_one(): fix missing CAN header initialization
|
WARNING in netif_rx
can
|
-1 |
|
|
|
2 |
1264d |
1264d
|
22/29 |
898d |
167053f8dd0e
net: Correct wrong BH disable in hard-interrupt.
|
memory leak in gs_usb_probe
can
usb
|
3 |
C |
|
|
1 |
1234d |
1230d
|
22/29 |
898d |
50d34a0d151d
can: gs_usb: gs_make_candev(): fix memory leak for devices with extended bit timing configuration
|
WARNING in mcba_usb_probe/usb_submit_urb
usb
can
|
-1 |
C |
error |
|
537 |
1228d |
2223d
|
22/29 |
898d |
136bed0bfd3b
can: mcba_usb: properly check endpoint type
|
WARNING in isotp_tx_timer_handler (2)
can
|
-1 |
C |
|
|
1416 |
924d |
1247d
|
22/29 |
898d |
3ea566422cbd
can: isotp: sanitize CAN ID checks in isotp_bind()
d73497081710
can: isotp: stop timeout monitoring when no first frame was sent
|
BUG: unable to handle kernel paging request in can_rcv_filter
can
|
8 |
C |
|
|
5 |
980d |
978d
|
22/29 |
898d |
0acc442309a0
can: af_can: fix NULL pointer dereference in can_rcv_filter
|
WARNING: refcount bug in j1939_netdev_start (2)
can
|
13 |
syz |
error |
error |
51 |
1390d |
2036d
|
20/29 |
1251d |
d9d52a3ebd28
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
|
WARNING in isotp_tx_timer_handler
can
|
-1 |
C |
error |
|
1553 |
1251d |
1694d
|
20/29 |
1251d |
9acf636215a6
can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
|
memory leak in pcan_usb_fd_init
usb
can
|
3 |
C |
|
|
19 |
1633d |
1703d
|
20/29 |
1369d |
a0b96b4a6274
drivers: net: fix memory leak in peak_usb_create_dev
|
WARNING: ODEBUG bug in __sk_destruct (2)
can
|
-1 |
C |
done |
done |
62 |
1379d |
1576d
|
20/29 |
1369d |
14a4696bc311
can: isotp: isotp_release(): omit unintended hrtimer restart on socket release
|
KASAN: use-after-free Read in bcm_rx_handler
can
|
19 |
syz |
done |
|
2 |
1521d |
1551d
|
20/29 |
1369d |
d5f9023fa61e
can: bcm: delay release of struct bcm_op after synchronize_rcu()
|
KASAN: use-after-free Write in j1939_can_recv
can
|
24 |
|
|
|
2 |
1599d |
1632d
|
20/29 |
1369d |
22c696fed25c
can: j1939: j1939_sk_init(): set SOCK_RCU_FREE to call sk_destruct() after RCU is done
|
KASAN: use-after-free Read in j1939_xtp_rx_dat_one (2)
can
|
19 |
|
|
|
3 |
1483d |
1546d
|
20/29 |
1369d |
2030043e616c
can: j1939: fix Use-after-Free, hold skb ref while in use
|
INFO: task hung in register_netdevice_notifier (2)
can
wireless
|
1 |
syz |
done |
|
10555 |
1513d |
2118d
|
20/29 |
1369d |
8d0caedb7596
can: bcm/raw/isotp: use per module netdevice notifier
|
INFO: task hung in unregister_netdevice_notifier (3)
can
|
1 |
syz |
error |
error |
184 |
2182d |
2366d
|
20/29 |
1369d |
8d0caedb7596
can: bcm/raw/isotp: use per module netdevice notifier
|
general protection fault in j1939_netdev_notify (2)
can
|
2 |
C |
done |
|
19 |
1636d |
1694d
|
20/29 |
1584d |
4e096a18867a
net: introduce CAN specific pointer in the struct net_device
|
BUG: receive list entry not found for dev vxcan1, id 003, mask C00007FF
can
|
-1 |
C |
unreliable |
|
2 |
1719d |
1719d
|
19/29 |
1614d |
d73ff9b7c4ea
can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
|
BUG: receive list entry not found for dev vcan0, id 002, mask C00007FF
can
|
-1 |
C |
unreliable |
|
5 |
1718d |
1718d
|
19/29 |
1614d |
d73ff9b7c4ea
can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
|
BUG: receive list entry not found for dev vcan0, id 001, mask C00007FF
can
|
-1 |
C |
unreliable |
|
5 |
1722d |
1721d
|
19/29 |
1614d |
d73ff9b7c4ea
can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
|
KMSAN: uninit-value in number (2)
can
|
7 |
C |
|
|
168 |
1615d |
1994d
|
19/29 |
1614d |
c8c958a58fc6
can: af_can: prevent potential access of uninitialized member in can_rcv()
9aa9379d8f86
can: af_can: prevent potential access of uninitialized member in canfd_rcv()
|
BUG: receive list entry not found for dev vxcan1, id 002, mask C00007FF
can
|
-1 |
C |
unreliable |
|
3 |
1719d |
1721d
|
19/29 |
1614d |
d73ff9b7c4ea
can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
|
KMSAN: uninit-value in can_receive (2)
can
|
7 |
C |
|
|
2060 |
1732d |
1827d
|
15/29 |
1728d |
e009f95b1543
can: j1935: j1939_tp_tx_dat_new(): fix missing initialization of skbcnt
|
KASAN: use-after-free Read in j1939_tp_txtimer
can
|
19 |
C |
done |
error |
5 |
1855d |
2054d
|
15/29 |
1788d |
cd3b3636c99f
can: j1939: transport: j1939_session_tx_dat(): fix use-after-free read in j1939_tp_txtimer()
|
general protection fault in j1939_netdev_start
can
|
2 |
C |
done |
|
8 |
1841d |
1993d
|
15/29 |
1788d |
af804b782635
can: j1939: socket: j1939_sk_bind(): make sure ml_priv is allocated
|
KASAN: use-after-free Read in raw_notifier
can
|
19 |
|
|
|
3 |
2001d |
2003d
|
15/29 |
1943d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in vsscanf
can
|
19 |
|
|
|
2 |
1999d |
2001d
|
15/29 |
1943d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KASAN: use-after-free Read in slcan_open
can
|
19 |
C |
done |
|
2 |
2079d |
2078d
|
15/29 |
1978d |
9ebd796e2400
can: slcan: Fix use-after-free Read in slcan_open
|
KMSAN: uninit-value in can_receive
can
|
7 |
C |
|
|
14 |
2003d |
2092d
|
15/29 |
2000d |
e7153bf70c34
can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
|
KASAN: null-ptr-deref Write in queue_work_on
can
|
12 |
C |
done |
error |
5 |
2184d |
2180d
|
15/29 |
2000d |
0ace17d56824
can, slip: Protect tty->disc_data in write_wakeup and close with RCU
|
general protection fault in j1939_jsk_del (2)
can
|
2 |
syz |
|
|
21 |
2064d |
2080d
|
15/29 |
2004d |
00d4e14d2e4c
can: j1939: j1939_sk_bind(): take priv after lock is held
|
KASAN: use-after-free Read in j1939_xtp_rx_abort_one
can
|
19 |
C |
done |
done |
11 |
2098d |
2105d
|
15/29 |
2030d |
ddeeb7d4822e
can: j1939: j1939_can_recv(): add priv refcounting
|
general protection fault in j1939_netdev_notify
can
|
2 |
syz |
done |
|
11 |
2093d |
2105d
|
14/29 |
2081d |
c48c8c1e2e81
can: j1939: main: j1939_ndev_to_priv(): avoid crash if can_ml_priv is NULL
|
KASAN: use-after-free Read in j1939_sk_recv
can
|
19 |
C |
done |
|
2 |
2100d |
2100d
|
14/29 |
2081d |
ddeeb7d4822e
can: j1939: j1939_can_recv(): add priv refcounting
|
KASAN: use-after-free Read in j1939_session_deactivate
can
|
19 |
syz |
done |
|
1 |
2102d |
2102d
|
14/29 |
2081d |
ddeeb7d4822e
can: j1939: j1939_can_recv(): add priv refcounting
|
KASAN: use-after-free Read in j1939_session_get_by_addr_locked
can
|
19 |
C |
done |
|
1 |
2100d |
2099d
|
14/29 |
2081d |
ddeeb7d4822e
can: j1939: j1939_can_recv(): add priv refcounting
|
WARNING: refcount bug in j1939_netdev_start
can
|
13 |
syz |
done |
|
6 |
2083d |
2104d
|
14/29 |
2081d |
fd81ebfe7975
can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
|
KASAN: use-after-free Read in mcba_usb_disconnect
can
usb
|
19 |
C |
|
|
2 |
2108d |
2140d
|
14/29 |
2081d |
4d6636498c41
can: mcba_usb: fix use-after-free on disconnect
|
memory leak in raw_sendmsg
can
|
3 |
C |
|
|
2 |
2248d |
2260d
|
12/29 |
2222d |
fd704bd5ee74
can: purge socket error queue on sock destruct
|
INFO: task hung in unregister_netdevice_notifier (2)
can
|
1 |
|
|
|
1 |
2504d |
2504d
|
11/29 |
2495d |
0e1d6eca5113
rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
|
INFO: task hung in rollback_registered_many
can
|
1 |
|
|
|
4 |
2499d |
2506d
|
11/29 |
2495d |
0e1d6eca5113
rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
|
WARNING in can_rcv
can
|
-1 |
C |
|
|
5 |
2764d |
2763d
|
4/29 |
2757d |
8cb68751c115
can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once
|
WARNING in canfd_rcv
can
|
-1 |
C |
|
|
4 |
2764d |
2763d
|
4/29 |
2757d |
d4689846881d
can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once
|