KASAN: slab-out-of-bounds Read in xfrm_state_find
net
|
|
|
|
1 |
49d |
30d
|
1/28 |
never |
xfrm: state: fix out-of-bounds read during lookup
|
KMSAN: uninit-value in netdev_pick_tx
net
|
|
|
|
3 |
25d |
31d
|
27/28 |
never |
0a4cc4accf00
tcp: populate XPS related fields of timewait sockets
|
WARNING in rxrpc_send_data
net
afs
|
C |
done |
|
275 |
9d20h |
16d
|
2/28 |
never |
rxrpc: Fix ability to add more data to a call once MSG_MORE deasserted
|
WARNING: lock held when returning to user space in rtnl_link_ops_get
net
|
C |
done |
|
9 |
31d |
38d
|
27/28 |
never |
9b234a97b10c
rtnetlink: fix rtnl_dump_ifinfo() error path
|
WARNING in page_pool_put_unrefed_netmem
net
|
C |
error |
|
5 |
10d |
122d
|
2/28 |
never |
ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple()
|
WARNING in netlink_ack_tlv_fill
net
|
C |
error |
|
3 |
47d |
43d
|
27/28 |
never |
3bf39fa849ab
netlink: fix false positive warning in extack during dumps
|
WARNING in nsim_dev_health_break_write
net
|
C |
|
|
10 |
7d22h |
13d
|
23/28 |
never |
ee76746387f6
netdevsim: prevent bad user input in nsim_dev_health_break_write()
|
KASAN: slab-out-of-bounds Read in nsim_dev_health_break_write
net
|
C |
|
|
4 |
7d03h |
12d
|
23/28 |
never |
ee76746387f6
netdevsim: prevent bad user input in nsim_dev_health_break_write()
|
WARNING in __dev_queue_xmit (5)
net
|
C |
|
|
41 |
10d |
8d23h
|
23/28 |
never |
5eb70dbebf32
netdev-genl: avoid empty messages in queue dump
|
WARNING: lock held when returning to user space in nsim_pp_hold_write
net
|
C |
|
|
4 |
6d20h |
11d
|
22/28 |
never |
net: netdevsim: fix nsim_pp_hold_write()
|
kernel BUG in send_hsr_supervision_frame
net
|
|
|
|
2 |
35d |
24d
|
27/28 |
never |
af8edaeddbc5
net: hsr: must allocate more bytes for RedBox support
|
KMSAN: uninit-value in hsr_forward_skb (2)
net
|
C |
|
|
22 |
23d |
30d
|
27/28 |
never |
b9653d19e556
net: hsr: avoid potential out-of-bound access in fill_frame_info()
|
WARNING: suspicious RCU usage in __ethtool_get_ts_info
net
|
C |
done |
|
29 |
1d05h |
9d07h
|
1/28 |
never |
net: ethtool: Fix suspicious rcu_dereference usage
|
KASAN: slab-use-after-free Read in __dev_get_by_index
net
|
|
|
|
1 |
28d |
23d
|
27/28 |
never |
750e51603395
net: avoid potential UAF in default_operstate()
|
WARNING in l2tp_exit_net
net
|
syz |
done |
|
219 |
19d |
104d
|
27/28 |
never |
5d066766c5f1
net/l2tp: fix warning in l2tp_exit_net found by syzbot
|
WARNING in vmap_pages_range_noflush (2)
bpf
net
|
C |
error |
|
250 |
856d |
858d
|
1/28 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
general protection fault in modify_prefix_route
net
|
C |
done |
|
11 |
29d |
29d
|
27/28 |
never |
a747e02430df
ipv6: avoid possible NULL deref in modify_prefix_route()
|
WARNING in copy_net_ns
net
|
|
|
|
1 |
23d |
23d
|
27/28 |
never |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
WARNING in NUM
net
|
|
|
|
1 |
23d |
19d
|
27/28 |
never |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
WARNING in ip6mr_net_exit_batch
net
|
|
|
|
1 |
21d |
21d
|
27/28 |
never |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
WARNING in ip6mr_free_table
net
|
C |
done |
|
97859 |
17d |
23d
|
27/28 |
never |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
WARNING in sk_skb_reason_drop (2)
net
|
|
|
|
1 |
10d |
10d
|
25/28 |
never |
cdd0b9132d71
ip: Return drop reason if in_dev is NULL in ip_route_input_rcu().
|
WARNING in skb_release_data
net
|
|
|
|
8 |
52d |
57d
|
0/28 |
never |
iov-iter: do not return more bytes than requested in iov_iter_extract_bvec_pages()
|
KASAN: slab-out-of-bounds Write in skb_copy_and_csum_bits
net
|
C |
|
|
76 |
52d |
57d
|
0/28 |
never |
iov-iter: do not return more bytes than requested in iov_iter_extract_bvec_pages()
|
WARNING in geneve_xmit (2)
net
|
|
|
|
1 |
28d |
22d
|
27/28 |
never |
8588c99c7d47
geneve: do not assume mac header is set in geneve_xmit_skb()
|
KMSAN: uninit-value in erspan_build_header (2)
net
|
C |
|
|
55 |
54d |
279d
|
1/28 |
never |
bpf: Don't redirect too small packets
|
WARNING in netlink_sock_destruct (2)
net
|
|
|
|
1 |
56d |
56d
|
28/28 |
8d03h |
1904fb9ebf91
netlink: terminate outstanding dump on socket close
|
divide error in __tcp_select_window (3)
net
|
C |
|
|
5 |
48d |
54d
|
28/28 |
9d07h |
ce7356ae3594
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
|
WARNING: suspicious RCU usage in phonet_route_del
net
|
C |
done |
|
7 |
50d |
54d
|
28/28 |
9d19h |
38a1f50a5efb
phonet: do not call synchronize_rcu() from phonet_route_del()
|
general protection fault in put_page (3)
net
|
C |
done |
|
47 |
10d |
54d
|
28/28 |
10d |
341468e0ab4b
lib/iov_iter: fix bvec iterator setup
|
net-next test error: WARNING in __sock_create
net
|
|
|
|
41 |
58d |
70d
|
28/28 |
10d |
ba4e469e42fe
vsock: do not leave dangling sk pointer in vsock_create()
|
WARNING in sk_skb_reason_drop
net
|
C |
done |
|
1447 |
11d |
39d
|
28/28 |
10d |
85c7975acd97
net: ip: fix unexpected return in fib_validate_source()
|
WARNING in __sock_create
net
|
C |
done |
|
4 |
49d |
50d
|
28/28 |
14d |
d293958a8595
net/smc: do not leave a dangling sk pointer in __smc_create()
|
KASAN: null-ptr-deref Write in dst_release (4)
net
|
|
|
|
23 |
79d |
266d
|
28/28 |
27d |
ac888d58869b
net: do not delay dst_entries_add() in dst_release()
|
kernel BUG in eth_header (3)
net
|
|
|
|
1 |
62d |
62d
|
28/28 |
40d |
4ed234fe793f
netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
|
BUG: Bad page state in bpf_test_run_xdp_live
net
|
C |
done |
|
17 |
56d |
59d
|
28/28 |
42d |
c40dd8c47325
bpf, test_run: Fix LIVE_FRAME frame update after a page has been recycled
|
general protection fault in dev_map_enqueue (2)
bpf
net
|
C |
error |
done |
336 |
147d |
213d
|
28/28 |
43d |
09d88791c7cd
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
|
INFO: task hung in nsim_dev_hwstats_exit
net
|
|
|
|
43 |
44d |
82d
|
28/28 |
43d |
a1494d532e28
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
|
UBSAN: shift-out-of-bounds in xfrm_selector_match (2)
net
|
C |
error |
|
10 |
87d |
100d
|
28/28 |
43d |
3f0ab59e6537
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
|
INFO: task hung in devlink_pernet_pre_exit (2)
net
|
|
|
|
32 |
48d |
67d
|
28/28 |
43d |
a1494d532e28
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
|
KASAN: slab-use-after-free Read in advance_sched
net
|
C |
error |
|
15 |
87d |
373d
|
28/28 |
43d |
f504465970ae
net: sched: fix use-after-free in taprio_change()
|
KMSAN: uninit-value in slhc_remember
net
|
|
|
|
4 |
78d |
78d
|
28/28 |
43d |
7d3fce8cbe3a
slip: make slhc_remember() more robust against malicious packets
|
general protection fault in ethnl_phy_doit
net
|
C |
done |
|
6 |
106d |
107d
|
28/28 |
61d |
fce1e9f86af1
net: ethtool: phy: Check the req_info.pdn field for GET commands
|
general protection fault in rt6_disable_ip
net
|
|
|
|
1 |
105d |
105d
|
28/28 |
63d |
04ccecfa959d
UPSTREAM: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
|
KASAN: use-after-free Read in ila_nf_input (2)
net
|
|
|
|
14 |
68d |
117d
|
28/28 |
65d |
031ae72825ce
ila: call nf_unregister_net_hooks() sooner
|
WARNING in pppol2tp_release
net
|
|
|
|
3 |
140d |
143d
|
28/28 |
65d |
c1b2e36b8776
l2tp: flush workqueue before draining it
|
WARNING: refcount bug in ethnl_phy_done
net
|
C |
done |
|
4 |
106d |
106d
|
28/28 |
65d |
1ad84a151af7
net: ethtool: phy: Don't set the context dev pointer for unfiltered DUMP
|
general protection fault in __smc_diag_dump (2)
net
s390
|
|
|
|
14 |
65d |
119d
|
28/28 |
65d |
98d4435efcbf
net/smc: prevent NULL pointer dereference in txopt_get
|
linux-next test error: WARNING in rcu_core
net
virt
|
|
|
|
16 |
138d |
146d
|
28/28 |
65d |
b8c8ba73c68b
slub: Introduce CONFIG_SLUB_RCU_DEBUG
|
WARNING in l2tp_udp_encap_destroy
net
|
|
|
|
3 |
139d |
138d
|
28/28 |
65d |
c1b2e36b8776
l2tp: flush workqueue before draining it
|
kernel BUG in __sock_sendmsg
net
|
C |
|
|
111 |
114d |
131d
|
28/28 |
65d |
fe1910f9337b
tcp_bpf: fix return value of tcp_bpf_sendmsg()
|
WARNING in handle_std_frame
net
|
|
|
|
3 |
111d |
113d
|
28/28 |
65d |
430d67bdcb04
net: hsr: Use the seqnr lock for frames received via interlink port.
|
UBSAN: array-index-out-of-bounds in cake_enqueue
net
|
|
|
|
1 |
130d |
129d
|
28/28 |
65d |
546ea84d07e3
sched: sch_cake: fix bulk flow accounting logic for host fairness
|
WARNING in __dev_queue_xmit (4)
net
|
C |
|
|
387 |
66d |
112d
|
28/28 |
65d |
9d301de12da6
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
|
WARNING in hsr_fill_frame_info
net
|
C |
error |
|
80 |
90d |
118d
|
28/28 |
65d |
430d67bdcb04
net: hsr: Use the seqnr lock for frames received via interlink port.
|
general protection fault in hsr_proxy_announce
net
|
|
|
|
2 |
112d |
111d
|
28/28 |
65d |
a7789fd4caaf
net: hsr: prevent NULL pointer dereference in hsr_proxy_announce()
|
WARNING in sock_map_close (2)
bpf
net
|
C |
done |
|
3 |
126d |
126d
|
28/28 |
65d |
1461f5a3d810
l2tp: avoid overriding sk->sk_user_data
|
WARNING in bond_xdp_get_xmit_slave (2)
net
|
|
|
|
124 |
98d |
199d
|
28/28 |
65d |
0cbfd45fbcf0
bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()
|
KASAN: slab-use-after-free Read in unix_stream_read_actor (2)
net
|
C |
inconclusive |
|
4 |
117d |
113d
|
28/28 |
65d |
5aa57d9f2d53
af_unix: Don't return OOB skb in manage_oob().
|
WARNING: lock held when returning to user space in ethnl_act_cable_test
net
|
C |
done |
|
43 |
120d |
122d
|
28/28 |
65d |
3d6a0c4f4552
net: fix unreleased lock in cable test
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (3)
bpf
net
|
C |
done |
|
6 |
166d |
166d
|
28/28 |
65d |
92de36080c93
bpf: Fail verification for sign-extension of packet data/data_end/data_meta
|
WARNING in ethnl_req_get_phydev
net
|
C |
done |
|
73 |
120d |
122d
|
28/28 |
65d |
cff69f72d333
ethtool: pse-pd: move pse validation into set
|
INFO: rcu detected stall in neigh_timer_handler (8)
net
|
C |
done |
done |
72 |
137d |
196d
|
28/28 |
66d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
KMSAN: uninit-value in gtp_dev_xmit
net
|
|
|
|
3 |
149d |
149d
|
28/28 |
78d |
3a3be7ff9224
gtp: pull network headers in gtp_dev_xmit()
|
general protection fault in reuseport_add_sock (3)
net
|
C |
done |
|
3 |
150d |
150d
|
28/28 |
84d |
9ab0faa7f9ff
sctp: Fix null-ptr-deref in reuseport_add_sock().
|
BUG: stack guard page was hit in vsock_bpf_recvmsg
net
virt
|
C |
done |
|
6 |
138d |
138d
|
28/28 |
84d |
69139d2919dd
vsock: fix recursive ->recvmsg calls
|
BUG: unable to handle kernel paging request in net_generic
net
|
|
|
|
1 |
158d |
154d
|
28/28 |
84d |
86a41ea9fd79
l2tp: fix lockdep splat
|
WARNING: refcount bug in inet_twsk_kill
net
|
|
|
|
5 |
137d |
137d
|
28/28 |
84d |
565d121b6998
tcp: prevent concurrent execution of tcp_sk_exit_batch
|
KASAN: slab-use-after-free Read in kcm_release
net
|
C |
|
|
2 |
193d |
233d
|
28/28 |
84d |
807067bf014d
kcm: Serialise kcm_sendmsg() for the same socket.
|
WARNING in tcp_sk_exit_batch
net
|
|
|
|
3 |
134d |
171d
|
28/28 |
84d |
565d121b6998
tcp: prevent concurrent execution of tcp_sk_exit_batch
|
WARNING in skb_warn_bad_offload (5)
net
|
C |
done |
|
18 |
130d |
163d
|
28/28 |
84d |
30b03f2a0592
udp: Fall back to software USO if IPv6 extension headers are present
|
WARNING: refcount bug in get_taint
net
|
|
|
|
2 |
122d |
147d
|
27/28 |
122d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
WARNING: refcount bug in sk_common_release
net
|
C |
|
|
9 |
146d |
162d
|
27/28 |
122d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
WARNING: refcount bug in inet_create
net
|
C |
done |
|
10 |
148d |
175d
|
27/28 |
122d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
KASAN: stack-out-of-bounds Read in xdp_do_check_flushed
bpf
net
|
C |
done |
|
127 |
146d |
167d
|
27/28 |
125d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __dev_flush
net
bpf
|
C |
|
|
35 |
146d |
160d
|
27/28 |
125d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KMSAN: uninit-value in tcf_ct_flow_table_get
net
|
C |
|
|
603 |
146d |
154d
|
27/28 |
125d |
2191a54f6322
sched: act_ct: take care of padding in struct zones_ht_key
|
general protection fault in bq_flush_to_queue
bpf
net
|
|
|
|
22 |
146d |
155d
|
27/28 |
125d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KASAN: slab-use-after-free Read in bq_xmit_all
bpf
net
|
C |
done |
|
29 |
146d |
160d
|
27/28 |
125d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __xsk_map_flush
bpf
net
|
C |
done |
|
26 |
146d |
163d
|
27/28 |
125d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __cpu_map_flush
bpf
net
|
C |
inconclusive |
|
25 |
147d |
160d
|
27/28 |
125d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
divide error in tcp_rcv_space_adjust (3)
net
|
C |
done |
|
3 |
239d |
240d
|
27/28 |
133d |
94062790aedb
UPSTREAM: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
|
upstream test error: KMSAN: uninit-value in receive_buf
net
virt
|
|
|
|
351 |
159d |
215d
|
27/28 |
133d |
840b2d39a2dc
virtio_ring: fix KMSAN error for premapped mode
|
WARNING in __skb_flow_dissect (6)
net
|
|
|
|
1 |
233d |
233d
|
27/28 |
133d |
b975d3ee5962
net: add and use skb_get_hash_net
|
general protection fault in xdp_do_generic_redirect
net
bpf
|
|
|
|
8 |
170d |
174d
|
27/28 |
134d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
general protection fault in dev_map_redirect
bpf
net
|
C |
|
|
362 |
170d |
177d
|
27/28 |
134d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in dev_hash_map_redirect
bpf
net
|
C |
done |
|
29 |
170d |
177d
|
27/28 |
134d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
WARNING in __ip6_make_skb (2)
net
|
C |
done |
|
104 |
198d |
213d
|
27/28 |
134d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
general protection fault in xdp_do_redirect
bpf
net
|
|
|
|
15 |
171d |
177d
|
27/28 |
134d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
KASAN: slab-use-after-free Read in l2tp_tunnel_del_work
net
|
C |
done |
|
99 |
170d |
184d
|
27/28 |
134d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
stack segment fault in bpf_xdp_redirect
bpf
net
|
C |
|
|
181 |
170d |
177d
|
27/28 |
134d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in cpu_map_redirect
net
bpf
|
C |
done |
|
11 |
171d |
170d
|
27/28 |
134d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
KASAN: slab-use-after-free Write in l2tp_session_delete
net
|
C |
done |
|
1286 |
164d |
184d
|
27/28 |
134d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
KMSAN: uninit-value in vsock_assign_transport (2)
net
virt
|
C |
|
|
14 |
196d |
251d
|
27/28 |
134d |
1e1fdcbdde3b
vhost/vsock: always initialize seqpacket_allow
|
WARNING in __ip_make_skb
net
|
C |
done |
|
54 |
199d |
213d
|
27/28 |
134d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
general protection fault in coalesce_fill_reply
net
|
C |
done |
|
27 |
177d |
183d
|
27/28 |
134d |
74d6529b78f7
net: ethtool: Fix the panic caused by dev being null when dumping coalesce
|
WARNING in bpf_lwt_seg6_adjust_srh
bpf
net
|
C |
done |
|
30 |
169d |
184d
|
27/28 |
134d |
c13fda93aca1
bpf: Remove tst_run from lwt_seg6local_prog_ops.
|
general protection fault in find_match (5)
net
|
|
|
|
2 |
199d |
199d
|
26/28 |
169d |
b86762dbe19a
ipv6: prevent possible NULL dereference in rt6_probe()
|
possible deadlock in br_forward_delay_timer_expired (2)
net
|
|
|
|
1 |
189d |
189d
|
26/28 |
169d |
62e58ddb1465
net: add softirq safety to netdev_rename_lock
|
general protection fault in xfrm6_get_saddr (2)
net
|
|
|
|
1 |
199d |
199d
|
26/28 |
169d |
d46401052c2d
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
|
INFO: task hung in devinet_ioctl (5)
net
|
|
|
|
59 |
169d |
195d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in addrconf_dad_work (4)
net
|
|
|
|
2632 |
170d |
220d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
general protection fault in fib6_nh_init (2)
net
|
|
|
|
2 |
190d |
195d
|
26/28 |
169d |
2eab4543a220
ipv6: prevent possible NULL deref in fib6_nh_init()
|
INFO: task hung in linkwatch_event (3)
net
|
|
|
|
1634 |
170d |
765d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in register_nexthop_notifier (3)
net
|
|
|
|
44 |
173d |
283d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in rfkill_global_led_trigger_worker (2)
net
nfc
|
C |
error |
|
1362 |
170d |
772d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in rtnetlink_rcv_msg
net
|
C |
inconclusive |
inconclusive |
1970 |
170d |
2134d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in addrconf_verify_work (8)
net
|
C |
error |
|
1294 |
169d |
374d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in mpls_net_exit (2)
net
|
|
|
|
50 |
175d |
196d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in switchdev_deferred_process_work (2)
net
|
C |
inconclusive |
|
1226 |
170d |
1613d
|
26/28 |
169d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
BUG: soft lockup in inet6_rtm_newroute
net
|
|
|
|
1 |
186d |
186d
|
26/28 |
169d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
WARNING in skb_ensure_writable
bpf
net
|
C |
done |
|
2893 |
170d |
248d
|
26/28 |
169d |
2bbe3e5a2f4e
bpf: Avoid splat in pskb_pull_reason
|
possible deadlock in __sock_map_delete
bpf
net
|
C |
|
|
14 |
212d |
256d
|
26/28 |
178d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
WARNING in geneve_xmit
net
|
C |
done |
|
42 |
244d |
251d
|
26/28 |
188d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
general protection fault in ip6_pol_route
net
|
|
|
|
73 |
191d |
229d
|
26/28 |
191d |
b01e1c030770
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
general protection fault in __fib6_drop_pcpu_from (5)
net
|
|
|
|
467 |
191d |
236d
|
26/28 |
191d |
b01e1c030770
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
WARNING in packet_setsockopt
net
|
C |
|
|
83 |
227d |
266d
|
26/28 |
195d |
86d43e2bf93c
af_packet: avoid a false positive warning in packet_setsockopt()
|
kernel BUG in dev_gro_receive
net
|
C |
done |
|
72 |
208d |
225d
|
25/28 |
198d |
be008726d0ac
net: gro: initialize network_offset in network layer
|
KMSAN: uninit-value in nci_ntf_packet (2)
nfc
net
|
C |
|
|
13 |
200d |
213d
|
25/28 |
198d |
068648aab72c
nfc/nci: Add the inconsistency check between the input data length and count
|
WARNING in sock_map_close
bpf
net
|
C |
error |
|
182 |
198d |
261d
|
25/28 |
198d |
4b4647add7d3
sock_map: avoid race between sock_map_close and sk_psock_put
|
possible deadlock in sock_hash_delete_elem (2)
bpf
net
|
C |
|
|
1127 |
199d |
281d
|
25/28 |
198d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
INFO: rcu detected stall in packet_release
net
|
C |
unreliable |
|
1 |
290d |
213d
|
25/28 |
198d |
fb66df20a720
net/sched: taprio: extend minimum interval restriction to entire cycle too
|
INFO: trying to register non-static key in __timer_delete_sync (2)
net
|
C |
|
|
45524 |
226d |
244d
|
25/28 |
201d |
3c668cef61ad
net: hsr: init prune_proxy_timer sooner
|
WARNING in __inet_accept
net
|
C |
done |
|
3 |
220d |
220d
|
25/28 |
203d |
26afda78cda3
UPSTREAM: net: relax socket state check at accept time.
|
general protection fault in ip6_output
net
|
|
|
|
4 |
237d |
256d
|
25/28 |
203d |
4db783d68b9b
ipv6: prevent NULL dereference in ip6_output()
|
KMSAN: uninit-value in nci_rx_work
net
nfc
|
C |
|
|
582 |
204d |
360d
|
25/28 |
204d |
e4a87abf5885
nfc: nci: Fix uninit-value in nci_rx_work
|
KASAN: slab-use-after-free Read in unix_del_edges
net
|
C |
done |
|
2 |
251d |
251d
|
25/28 |
204d |
1af2dface5d2
af_unix: Don't access successor in unix_del_edges() during GC.
|
general protection fault in fib6_rule_action
net
|
|
|
|
1 |
252d |
252d
|
25/28 |
204d |
d101291b2681
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
|
KMSAN: uninit-value in dev_map_lookup_elem
bpf
net
|
C |
|
|
3 |
269d |
276d
|
25/28 |
204d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in unwind_dump
net
|
|
|
|
1 |
255d |
251d
|
25/28 |
204d |
90d1f14cbb9d
kmsan: compiler_types: declare __no_sanitize_or_inline
|
KMSAN: uninit-value in sock_map_delete_elem
bpf
net
|
C |
|
|
44 |
205d |
276d
|
25/28 |
204d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
possible deadlock in sch_direct_xmit (4)
net
|
|
|
|
1 |
242d |
242d
|
25/28 |
204d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
WARNING in qdisc_alloc
net
|
C |
error |
|
1069 |
226d |
240d
|
25/28 |
204d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
KASAN: global-out-of-bounds Read in __nla_validate_parse
net
|
C |
|
|
5 |
262d |
262d
|
25/28 |
204d |
8750539ba317
net: team: fix incorrect maxattr
|
KASAN: slab-use-after-free Read in vhost_task_fn
kvm
net
virt
|
C |
done |
|
2661 |
238d |
240d
|
25/28 |
204d |
db5247d9bf5c
vhost_task: Handle SIGKILL by flushing work and exiting
|
KMSAN: uninit-value in geneve_xmit (3)
net
|
C |
|
|
14 |
259d |
267d
|
25/28 |
217d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
KMSAN: kernel-infoleak in __skb_datagram_iter (3)
net
|
C |
|
|
25 |
220d |
274d
|
25/28 |
217d |
d313eb8b7755
net/sched: act_skbmod: prevent kernel-infoleak
|
KMSAN: uninit-value in gre_rcv (3)
net
|
C |
|
|
3 |
272d |
273d
|
25/28 |
217d |
17af420545a7
erspan: make sure erspan_base_hdr is present in skb->head
|
KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue
bpf
net
|
|
|
|
1 |
286d |
278d
|
25/28 |
217d |
6648e613226e
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
|
KASAN: slab-out-of-bounds Read in nfc_llcp_setsockopt
net
nfc
|
C |
error |
|
5 |
255d |
264d
|
25/28 |
217d |
7a87441c9651
nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
|
possible deadlock in tty_port_tty_get (2)
bpf
net
|
|
|
|
3 |
260d |
279d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_delete_elem
bpf
net
|
C |
|
|
17183 |
244d |
283d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in scheduler_tick (3)
bpf
net
|
C |
|
|
1179 |
244d |
280d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in pit_timer_fn
bpf
net
|
|
|
|
7 |
255d |
266d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in rcu_exp_handler
bpf
net
|
C |
|
|
1 |
258d |
254d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in rcu_report_exp_cpu_mult
net
bpf
|
C |
done |
|
30 |
245d |
283d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in try_to_wake_up (4)
bpf
net
|
C |
error |
|
19 |
220d |
283d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in ahci_single_level_irq_intr
bpf
net
|
C |
|
|
10 |
266d |
274d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_unref
bpf
net
|
C |
error |
|
97 |
245d |
258d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in __lock_task_sighand (2)
bpf
net
|
C |
|
|
1476 |
219d |
282d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_hash_delete_elem
bpf
net
|
C |
done |
|
16982 |
244d |
283d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in hrtimer_run_queues
net
bpf
|
C |
error |
|
592 |
244d |
281d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in swake_up_one
bpf
net
|
C |
|
|
4 |
256d |
254d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in _prb_commit
net
bpf
|
|
|
|
4 |
255d |
251d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in posix_timer_fn (2)
net
bpf
|
|
|
|
1 |
258d |
254d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in drm_handle_vblank
bpf
net
|
|
|
|
30 |
255d |
281d
|
25/28 |
217d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
KASAN: slab-out-of-bounds Read in xsk_setsockopt
bpf
net
|
C |
|
|
17 |
257d |
265d
|
25/28 |
217d |
237f3cf13b20
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
|
KMSAN: uninit-value in ipvlan_queue_xmit (2)
net
|
C |
|
|
2 |
291d |
252d
|
25/28 |
217d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
possible deadlock in __unix_gc
net
|
C |
done |
|
5 |
244d |
247d
|
25/28 |
217d |
1971d13ffa84
af_unix: Suppress false-positive lockdep splat for spin_lock() in __unix_gc().
|
WARNING in gre_tap_xmit (2)
net
|
C |
done |
|
67 |
226d |
251d
|
25/28 |
217d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
general protection fault in dev_map_enqueue
bpf
net
|
C |
|
|
676 |
217d |
274d
|
25/28 |
217d |
5bcf0dcbf906
xdp: use flags field to disambiguate broadcast redirect
|
KMSAN: uninit-value in nci_ntf_packet
net
nfc
|
C |
|
|
79 |
219d |
360d
|
25/28 |
217d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
possible deadlock in unix_del_edges
net
|
C |
|
|
49 |
261d |
266d
|
25/28 |
217d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
KMSAN: uninit-value in nci_dev_up
nfc
net
|
C |
|
|
7 |
277d |
336d
|
25/28 |
217d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
possible deadlock in unix_notinflight
net
|
C |
|
|
7 |
244d |
259d
|
25/28 |
217d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
INFO: task hung in netlink_dump (4)
net
|
|
|
|
72 |
262d |
302d
|
25/28 |
257d |
00af2aa93b76
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
|
INFO: task hung in devinet_ioctl (4)
net
|
|
|
|
5 |
288d |
289d
|
25/28 |
257d |
00af2aa93b76
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
|
WARNING in cleanup_net (3)
net
|
syz |
|
|
240 |
258d |
392d
|
25/28 |
258d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
WARNING in net_free (2)
net
|
syz |
|
|
27 |
264d |
311d
|
25/28 |
258d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
KMSAN: uninit-value in ip_tunnel_rcv (2)
net
|
|
|
|
1 |
294d |
294d
|
25/28 |
259d |
b0ec2abf9826
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
|
possible deadlock in sch_direct_xmit (3)
net
|
|
|
|
1 |
318d |
318d
|
25/28 |
260d |
0bef512012b1
UPSTREAM: net: add netdev_lockdep_set_classes() to virtual drivers
|
KMSAN: uninit-value in cookie_v4_check
net
|
C |
|
|
9 |
282d |
287d
|
25/28 |
260d |
956c0d619107
tcp: Clear req->syncookie in reqsk_alloc().
|
KASAN: slab-use-after-free Read in rt6_fill_node
net
|
|
|
|
1 |
312d |
312d
|
25/28 |
260d |
685f7d531264
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
|
KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt
net
|
|
|
|
1 |
287d |
287d
|
25/28 |
260d |
6ebfad33161a
packet: annotate data-races around ignore_outgoing
|
UBSAN: shift-out-of-bounds in taprio_change
net
|
C |
done |
|
4 |
289d |
289d
|
25/28 |
260d |
343041b59b78
net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
|
WARNING: suspicious RCU usage in in6_dump_addrs (2)
net
|
C |
done |
|
3 |
302d |
302d
|
25/28 |
260d |
67ea41d19d2a
inet6: expand rcu_read_lock() scope in inet6_dump_addr()
|
KMSAN: uninit-value in hsr_get_node (2)
net
|
C |
|
|
49 |
261d |
347d
|
25/28 |
260d |
ddbec99f5857
hsr: Fix uninit-value access in hsr_get_node()
|
WARNING in mpls_gso_segment
net
|
C |
done |
|
20 |
306d |
309d
|
25/28 |
260d |
025f8ad20f2e
net: mpls: error out if inner headers are not set
|
BUG: unable to handle kernel NULL pointer dereference in dev_map_hash_update_elem
bpf
net
|
C |
|
|
2 |
304d |
311d
|
25/28 |
260d |
281d464a34f5
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
|
WARNING in sk_nulls_del_node_init_rcu
net
|
|
|
|
1 |
294d |
292d
|
25/28 |
260d |
04d9d1fc428a
tcp: Fix refcnt handling in __inet_hash_connect().
|
KMSAN: uninit-value in geneve_udp_encap_recv
net
|
C |
|
|
2 |
305d |
335d
|
25/28 |
260d |
1ca1ba465e55
geneve: make sure to pull inner header in geneve_rx()
|
kernel BUG in __nla_validate_parse
net
|
C |
done |
|
13 |
289d |
292d
|
25/28 |
260d |
d8a21070b6e1
nexthop: Fix out-of-bounds access during attribute validation
|
BUG: sleeping function called from invalid context in __lock_sock_fast (2)
net
|
C |
|
|
6 |
299d |
301d
|
25/28 |
268d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
possible deadlock in tcp_diag_get_aux
net
|
C |
|
|
117 |
293d |
311d
|
25/28 |
268d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
kernel BUG in eth_header (2)
net
|
C |
|
|
2 |
344d |
344d
|
25/28 |
268d |
dad555c816a5
llc: make llc_ui_sendmsg() more robust against bonding changes
|
BUG: unable to handle kernel NULL pointer dereference in unix_stream_sendmsg
bpf
net
|
C |
|
|
1 |
303d |
303d
|
25/28 |
268d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
BUG: unable to handle kernel NULL pointer dereference in sk_psock_verdict_data_ready
net
bpf
|
C |
unreliable |
|
15 |
298d |
418d
|
25/28 |
268d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
possible deadlock in unix_set_peek_off
net
|
|
|
|
8 |
308d |
313d
|
25/28 |
272d |
56667da7399e
net: implement lockless setsockopt(SO_PEEK_OFF)
|
INFO: task hung in unix_stream_sendmsg
net
|
C |
done |
|
4 |
309d |
312d
|
25/28 |
272d |
aa82ac51d633
af_unix: Drop oob_skb ref before purging queue in GC.
|
possible deadlock in __unix_dgram_recvmsg (2)
net
|
|
|
|
3 |
311d |
313d
|
25/28 |
272d |
56667da7399e
net: implement lockless setsockopt(SO_PEEK_OFF)
|
WARNING in send_hsr_supervision_frame (3)
net
|
|
|
|
153 |
336d |
771d
|
25/28 |
273d |
37e8c97e5390
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
|
memory leak in pppoe_sendmsg
net
|
C |
|
|
26 |
364d |
2036d
|
25/28 |
273d |
dc34ebd5c018
pppoe: Fix memory leak in pppoe_sendmsg()
|
WARNING in __unix_gc
net
|
C |
|
|
49 |
321d |
328d
|
25/28 |
273d |
1279f9d9dec2
af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.
|
bpf test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
4 |
338d |
338d
|
25/28 |
273d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
net test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
21 |
338d |
341d
|
25/28 |
273d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
linux-next test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
12 |
337d |
339d
|
25/28 |
273d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
possible deadlock in skb_queue_tail (6)
net
|
|
|
|
1 |
333d |
333d
|
25/28 |
273d |
4d322dce82a1
UPSTREAM: af_unix: fix lockdep positive in sk_diag_dump_icons()
|
memory leak in virtual_ncidev_write (2)
net
nfc
|
C |
|
|
2 |
372d |
533d
|
25/28 |
274d |
bfb007aebe6b
nfc: nci: free rx_data_reassembly skb on NCI device cleanup
|
KMSAN: uninit-value in IP6_ECN_decapsulate (2)
net
|
C |
|
|
3 |
326d |
341d
|
25/28 |
274d |
8d975c15c0cd
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
|
INFO: task hung in rtnl_lock (3)
net
|
C |
|
|
128 |
279d |
631d
|
25/28 |
274d |
3871aa01e1a7
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
|
WARNING in inet_csk_destroy_sock (5)
net
|
|
|
|
1 |
340d |
340d
|
25/28 |
274d |
66b60b0c8c4a
dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().
|
KMSAN: uninit-value in geneve_xmit (2)
net
|
C |
|
|
12 |
280d |
357d
|
25/28 |
275d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
WARNING in ip6gre_tunnel_xmit
net
|
C |
done |
|
2 |
305d |
305d
|
25/28 |
275d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
KASAN: use-after-free Read in __skb_flow_dissect (3)
net
|
C |
|
|
1 |
349d |
359d
|
25/28 |
275d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
INFO: task hung in nsim_create
net
|
|
|
|
1 |
324d |
324d
|
25/28 |
275d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
INFO: task hung in addrconf_dad_work (3)
net
|
C |
|
|
185 |
289d |
330d
|
25/28 |
275d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
KMSAN: kernel-infoleak in __skb_datagram_iter (2)
net
|
C |
|
|
126 |
276d |
328d
|
25/28 |
275d |
661779e1fcaf
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
|
INFO: task hung in unix_dgram_sendmsg
net
|
C |
done |
|
36 |
302d |
320d
|
25/28 |
276d |
25236c91b5ab
af_unix: Fix task hung while purging oob_skb in GC.
|
KMSAN: uninit-value in __llc_lookup_established
net
|
C |
|
|
46 |
343d |
386d
|
25/28 |
276d |
e3f9bed9bee2
llc: Drop support for ETH_P_TR_802_2.
|
KMSAN: uninit-value in tcp_recvmsg (3)
net
|
|
|
|
1 |
362d |
349d
|
25/28 |
320d |
78fbb92af27d
nbd: always initialize struct msghdr completely
|
KASAN: slab-use-after-free Write in fib6_purge_rt
net
|
|
|
|
1 |
399d |
399d
|
25/28 |
329d |
5a08d0065a91
ipv6: add debug checks in fib6_info_release()
|
KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim (2)
net
|
C |
|
|
17 |
330d |
356d
|
25/28 |
329d |
d375b98e0248
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
|
KASAN: slab-use-after-free Read in nla_find
bpf
net
|
C |
done |
|
4 |
374d |
374d
|
25/28 |
331d |
2130c519a401
bpf: Use nla_ok() instead of checking nla_len directly
|
KASAN: slab-use-after-free Read in nfc_alloc_send_skb
net
nfc
|
C |
error |
|
3 |
383d |
413d
|
25/28 |
331d |
c95f919567d6
nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local
|
KCSAN: data-race in udpv6_sendmsg / udpv6_sendmsg (6)
net
|
|
|
|
1 |
353d |
349d
|
25/28 |
331d |
482521d8e0c6
udp: annotate data-races around up->pending
|
WARNING in ip6_route_multipath_add
net
|
|
|
|
1 |
381d |
381d
|
25/28 |
331d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
general protection fault in hfsc_tcf_block
net
|
C |
done |
|
1020 |
353d |
361d
|
25/28 |
331d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
WARNING in __sk_msg_free
bpf
net
|
C |
done |
|
4 |
357d |
355d
|
25/28 |
331d |
dc9dfc8dc629
net: tls, fix WARNIING in __sk_msg_free
|
KASAN: slab-out-of-bounds Read in dsa_user_changeupper
net
|
C |
done |
|
1303 |
337d |
351d
|
25/28 |
331d |
844f104790bd
net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events
|
general protection fault in qdisc_create
net
|
C |
done |
|
2821 |
353d |
361d
|
25/28 |
331d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
WARNING in dev_watchdog (2)
net
|
C |
inconclusive |
|
6791 |
333d |
1732d
|
25/28 |
331d |
e316dd1cf135
net: don't dump stack on queue timeout
|
WARNING: refcount bug in tcp_sigpool_alloc_ahash
net
|
|
|
|
1 |
371d |
371d
|
25/28 |
331d |
b901a4e27694
net/tcp_sigpool: Use kref_get_unless_zero()
|
KMSAN: uninit-value in netif_skb_features (2)
net
|
C |
|
|
9 |
374d |
462d
|
25/28 |
331d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
WARNING in ip6_route_info_create
net
|
C |
done |
|
241 |
381d |
384d
|
25/28 |
331d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
general protection fault in page_pool_unlist
net
|
C |
done |
|
648 |
391d |
393d
|
25/28 |
331d |
f9893fdac319
net: page_pool: fix general protection fault in page_pool_unlist
|
KCSAN: data-race in ipv6_mc_down / mld_ifc_work (2)
net
|
|
|
|
2 |
343d |
349d
|
25/28 |
331d |
2e7ef287f07c
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
|
KMSAN: uninit-value in validate_xmit_skb
net
|
C |
|
|
21 |
332d |
349d
|
25/28 |
331d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
general protection fault in htb_tcf_block
net
|
C |
done |
|
885 |
353d |
361d
|
25/28 |
331d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
general protection fault in skb_segment (4)
net
|
C |
error |
|
4 |
375d |
382d
|
25/28 |
339d |
23d05d563b7e
net: prevent mss overflow in skb_segment()
|
Internal error in fib6_table_lookup
net
|
|
|
|
2 |
408d |
408d
|
25/28 |
339d |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
Internal error in fib6_rule_lookup
net
|
|
|
|
2 |
411d |
418d
|
25/28 |
339d |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
KASAN: slab-use-after-free Read in ife_tlv_meta_decode
net
|
|
|
|
1 |
386d |
384d
|
25/28 |
339d |
19391a2ca98b
net: sched: ife: fix potential use-after-free
|
WARNING in fib6_add (5)
net
|
C |
done |
|
6 |
385d |
548d
|
25/28 |
339d |
75475bb51e78
ipv6: fix potential NULL deref in fib6_add()
|
KASAN: slab-out-of-bounds Read in dns_resolver_preparse
net
|
C |
done |
|
46 |
365d |
378d
|
25/28 |
340d |
1997b3cb4217
keys, dns: Fix missing size check of V1 server-list header
|
KASAN: null-ptr-deref Write in unix_stream_bpf_update_proto
bpf
net
|
C |
done |
|
54 |
362d |
392d
|
25/28 |
340d |
8d6650646ce4
bpf: syzkaller found null ptr deref in unix_bpf proto add
|
memory leak in skb_copy (2)
nfc
net
|
syz |
|
|
3 |
413d |
530d
|
25/28 |
340d |
84d2db91f14a
nfc: virtual_ncidev: Add variable to check if ndev is running
|
general protection fault in tls_merge_open_record
net
|
syz |
unreliable |
|
5 |
423d |
423d
|
25/28 |
340d |
53f2cb491b50
tls: fix NULL deref on tls_sw_splice_eof() with empty record
|
KASAN: slab-use-after-free Read in unix_stream_read_actor
net
|
C |
error |
|
6 |
395d |
411d
|
25/28 |
340d |
4b7b492615cf
af_unix: fix use-after-free in unix_stream_read_actor()
|
general protection fault in ptp_ioctl
net
|
C |
done |
|
8 |
415d |
416d
|
25/28 |
340d |
8a4f030dbced
ptp: Fixes a null pointer dereference in ptp_ioctl
|
kernel BUG in ip6gre_header (2)
net
|
C |
|
|
2 |
440d |
454d
|
25/28 |
340d |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
BUG: unable to handle kernel paging request in nsim_bpf
net
|
C |
|
|
3 |
397d |
413d
|
25/28 |
340d |
c0c6bde586c7
netdevsim: Don't accept device bound programs
|
kernel BUG in ipgre_header
net
|
C |
|
|
4 |
390d |
404d
|
25/28 |
340d |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
KCSAN: data-race in virtnet_poll / virtnet_stats (2)
net
virt
|
|
|
|
1 |
460d |
458d
|
25/28 |
346d |
61217d8f6360
virtio_net: use u64_stats_t infra to avoid data-races
|
KASAN: stack-out-of-bounds Read in tcp_inbound_hash
net
|
C |
done |
|
28 |
410d |
423d
|
25/28 |
350d |
02f0717e9835
net/tcp: fix possible out-of-bounds reads in tcp_hash_fail()
|
WARNING in dev_index_reserve (2)
net
|
C |
done |
|
68 |
430d |
440d
|
25/28 |
351d |
cbfbfe3aee71
tun: prevent negative ifindex
|
KCSAN: data-race in fib_select_path / fib_select_path
net
|
|
|
|
1 |
448d |
435d
|
25/28 |
353d |
195374d89368
ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr
|
KCSAN: data-race in xfrm_sk_policy_insert / xfrm_sk_policy_insert (3)
net
|
|
|
|
1 |
502d |
474d
|
25/28 |
358d |
3e4bc23926b8
xfrm: fix a data-race in xfrm_gen_index()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (7)
net
|
|
|
|
1 |
454d |
449d
|
25/28 |
370d |
d0f95894fda7
netlink: annotate data-races around sk->sk_err
|
general protection fault in scatterwalk_copychunks (4)
net
crypto
|
C |
done |
done |
1341 |
370d |
1381d
|
25/28 |
370d |
cfaa80c91f6f
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
|
KASAN: slab-use-after-free Read in ptp_poll
net
|
|
|
|
1 |
415d |
415d
|
25/28 |
371d |
b714ca2ccf6a
ptp: ptp_read should not release queue
|
WARNING: zero-size vmalloc in xskq_create
bpf
net
|
|
|
|
20 |
440d |
448d
|
25/28 |
371d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
WARNING: zero-size vmalloc in print_tainted
bpf
net
|
C |
|
|
79 |
564d |
598d
|
25/28 |
371d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
KMSAN: uninit-value in IP6_ECN_decapsulate
net
|
C |
|
|
981 |
372d |
2288d
|
25/28 |
371d |
484b4833c604
hsr: Fix uninit-value access in fill_frame_info()
|
memory leak in kcm_sendmsg (2)
net
|
C |
|
|
1 |
484d |
519d
|
25/28 |
371d |
c821a88bd720
kcm: Fix memory leak in error path of kcm_sendmsg()
|
KMSAN: uninit-value in virtio_transport_recv_pkt
net
|
C |
|
|
20713 |
412d |
426d
|
25/28 |
371d |
34c4effacfc3
virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
|
WARNING in skb_warn_bad_offload (4)
net
|
C |
done |
|
1763 |
433d |
461d
|
25/28 |
371d |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
WARNING in __ip6_append_data
net
|
C |
unreliable |
|
5 |
441d |
470d
|
25/28 |
371d |
9d4c75800f61
ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
|
BUG: corrupted list in ptp_open
net
|
C |
done |
|
7 |
417d |
427d
|
25/28 |
371d |
1bea2c3e6df8
ptp: fix corrupted list in ptp_open
b714ca2ccf6a
ptp: ptp_read should not release queue
|
KCSAN: data-race in xfrmi_xmit / xfrmi_xmit (3)
net
|
|
|
|
2 |
457d |
480d
|
25/28 |
371d |
f7c4e3e5d4f6
xfrm: interface: use DEV_STATS_INC()
|
WARNING in skb_checksum_help (2)
net
|
C |
done |
|
3816 |
371d |
461d
|
25/28 |
371d |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
BUG: corrupted list in nfc_llcp_register_device
nfc
net
|
C |
error |
|
136 |
448d |
736d
|
25/28 |
371d |
dfc7f7a988da
net: nfc: llcp: Add lock when modifying device list
|
UBSAN: shift-out-of-bounds in nci_activate_target
net
nfc
|
C |
done |
|
6 |
449d |
634d
|
25/28 |
371d |
354a6e707e29
nfc: nci: assert requested protocol is valid
|
WARNING in inet_csk_get_port (2)
net
|
C |
done |
|
88 |
432d |
462d
|
25/28 |
371d |
8702cf12e6ba
tcp: Fix listen() warning with v4-mapped-v6 address.
|
KCSAN: data-race in udp_lib_setsockopt / udp_lib_setsockopt
net
|
|
|
|
2 |
492d |
477d
|
25/28 |
371d |
882af43a0fc3
udplite: fix various data-races
|
KMSAN: uninit-value in fq_change
net
|
C |
|
|
8 |
413d |
415d
|
25/28 |
371d |
f1a3b283f852
UPSTREAM: net_sched: sch_fq: better validate TCA_FQ_WEIGHTS and TCA_FQ_PRIOMAP
|
KCSAN: data-race in xfrm_lookup_with_ifid / xfrm_lookup_with_ifid (7)
net
|
|
|
|
1 |
449d |
449d
|
25/28 |
371d |
de5724ca38fd
xfrm: fix a data-race in xfrm_lookup_with_ifid()
|
KMSAN: uninit-value in llc_station_rcv
net
|
C |
|
|
2 |
426d |
435d
|
25/28 |
371d |
7b3ba18703a6
llc: verify mac len before reading mac header
|
INFO: rcu detected stall in sys_close (5)
net
|
C |
done |
|
1 |
485d |
485d
|
23/28 |
441d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
WARNING in unregister_vlan_dev
net
|
C |
done |
|
1310 |
493d |
503d
|
23/28 |
441d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KCSAN: data-race in ____sys_sendmsg / do_ipv6_setsockopt
net
|
|
|
|
1 |
563d |
547d
|
23/28 |
441d |
1ded5e5a5931
net: annotate data-races around sock->ops
|
KCSAN: data-race in netlink_setsockopt / netlink_setsockopt
net
|
|
|
|
1 |
504d |
504d
|
23/28 |
441d |
8fe08d70a2b6
netlink: convert nlk->flags to atomic flags
|
general protection fault in generic_hwtstamp_ioctl_lower
net
|
C |
done |
|
7 |
507d |
510d
|
23/28 |
441d |
c35e927cbe09
net: omit ndo_hwtstamp_get() call when possible in dev_set_hwtstamp_phylib()
|
INFO: rcu detected stall in unix_release
net
|
C |
done |
|
1 |
504d |
500d
|
23/28 |
441d |
da71714e359b
net/sched: fix a qdisc modification with ambiguous command request
|
WARNING: refcount bug in xp_put_pool
bpf
net
|
C |
done |
|
2 |
516d |
514d
|
23/28 |
441d |
85c2c79a0730
xsk: fix refcount underflow in error path
|
WARNING in ip6_tnl_exit_batch_net
net
|
C |
done |
|
29 |
496d |
503d
|
23/28 |
441d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: stack-out-of-bounds Write in __nla_validate_parse
net
|
C |
done |
|
4 |
508d |
523d
|
23/28 |
441d |
4d50e50045aa
net: flower: fix stack-out-of-bounds in fl_set_key_cfm()
|
WARNING: bad unlock balance in sockopt_release_sock
net
|
C |
done |
|
2 |
489d |
489d
|
23/28 |
441d |
8be6f88b9d3f
inet: fix IP_TRANSPARENT error handling
|
KASAN: slab-use-after-free Read in xsk_diag_dump
net
bpf
|
C |
done |
|
9 |
476d |
485d
|
23/28 |
441d |
3e019d8a05a3
xsk: Fix xsk_diag use-after-free error during socket cleanup
|
KCSAN: data-race in __ip4_datagram_connect / __ip_make_skb (5)
net
|
|
|
|
3 |
519d |
547d
|
23/28 |
441d |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
general protection fault in skb_segment (3)
net
|
C |
done |
|
2 |
500d |
501d
|
23/28 |
441d |
b616be6b9768
net: do not allow gso_size to be set to GSO_BY_FRAGS
|
INFO: rcu detected stall in bond_3ad_state_machine_handler
net
|
|
|
|
1 |
518d |
518d
|
23/28 |
441d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
BUG: soft lockup in fq_pie_timer (4)
net
|
syz |
|
|
5 |
471d |
521d
|
23/28 |
441d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
INFO: rcu detected stall in nsim_dev_trap_report_work
net
|
syz |
|
|
4 |
476d |
519d
|
23/28 |
441d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
WARNING in rtnl_dellink (3)
net
|
C |
done |
|
492 |
493d |
503d
|
23/28 |
441d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: slab-use-after-free Read in team_device_event
net
|
C |
done |
|
2 |
477d |
476d
|
23/28 |
441d |
6afcf0fb9270
Revert "net: team: do not use dynamic lockdep key"
|
KCSAN: data-race in fib_release_info / fib_table_lookup
net
|
|
|
|
1 |
486d |
486d
|
23/28 |
441d |
fce92af1c29d
ipv4: annotate data-races around fi->fib_dead
|
general protection fault in ingress_destroy
net
|
|
|
|
10 |
521d |
525d
|
23/28 |
441d |
079082c60aff
tcx: Fix splat during dev unregister
|
KCSAN: data-race in tcp_make_synack / tcp_rtx_synack
net
|
|
|
|
1 |
532d |
531d
|
23/28 |
441d |
5e5265522a9a
tcp: annotate data-races around tcp_rsk(req)->txhash
|
WARNING in tcx_uninstall
bpf
net
|
C |
done |
|
7 |
515d |
519d
|
23/28 |
441d |
079082c60aff
tcx: Fix splat during dev unregister
|
KCSAN: data-race in tcp_check_req / tcp_check_req
net
|
|
|
|
2 |
549d |
547d
|
23/28 |
441d |
eba20811f326
tcp: annotate data-races around tcp_rsk(req)->ts_recent
|
KASAN: slab-out-of-bounds Read in do_csum
net
|
C |
|
|
160 |
445d |
486d
|
23/28 |
441d |
8bd795fedb84
arm64: csum: Fix OoB access in IP checksum code for negative lengths
|
KCSAN: data-race in iptunnel_xmit / iptunnel_xmit (5)
net
|
|
|
|
1 |
478d |
478d
|
23/28 |
441d |
9b271ebaf9a2
ip_tunnels: use DEV_STATS_INC()
|
KCSAN: data-race in __ip_make_skb / __ip_make_skb
net
|
|
|
|
624 |
489d |
1058d
|
23/28 |
441d |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
WARNING: ODEBUG bug in ingress_destroy
net
|
C |
done |
|
16 |
521d |
525d
|
23/28 |
441d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
WARNING: ODEBUG bug in tcx_uninstall
net
bpf
|
C |
done |
|
38 |
520d |
525d
|
23/28 |
441d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
KCSAN: data-race in macsec_handle_frame / macsec_handle_frame (3)
net
|
|
|
|
2 |
510d |
511d
|
23/28 |
441d |
32d0a49d36a2
macsec: use DEV_STATS_INC()
|
WARNING in macvlan_device_event
net
|
|
|
|
3 |
497d |
498d
|
23/28 |
441d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
WARNING in vlan_device_event
net
|
|
|
|
1 |
498d |
498d
|
23/28 |
441d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: slab-use-after-free Write in mini_qdisc_pair_swap
net
|
C |
error |
|
76 |
490d |
643d
|
23/28 |
454d |
84ad0af0bccd
net/sched: qdisc_destroy() old ingress and clsact Qdiscs before grafting
c7cfbd115001
net/sched: sch_ingress: Only create under TC_H_INGRESS
|
WARNING in sock_i_ino
net
|
C |
error |
|
22 |
548d |
552d
|
23/28 |
454d |
25a9c8a4431c
netlink: Add __sock_i_ino() for __netlink_diag_dump().
|
KMSAN: kernel-infoleak in __skb_datagram_iter
net
|
|
|
|
68 |
457d |
562d
|
23/28 |
454d |
aa5406950726
netlink: do not hard code device address lenth in fdb dumps
|
KASAN: stack-out-of-bounds Read in ip6mr_ioctl
net
|
C |
done |
|
192 |
553d |
558d
|
23/28 |
454d |
3a4f0edbb793
ipv6: fix a typo in ip6mr_sk_ioctl()
|
BUG: sleeping function called from invalid context in __lock_sock_fast
net
|
|
|
|
2 |
552d |
552d
|
23/28 |
454d |
57fc0f1ceaa4
mptcp: ensure listener is unhashed before updating the sk status
|
kernel BUG in ip6gre_header
net
|
C |
|
|
5 |
490d |
561d
|
23/28 |
454d |
9eed321cde22
net: lapbether: only support ethernet devices
|
WARNING in unreserve_psock
net
|
C |
done |
|
2816 |
554d |
562d
|
23/28 |
454d |
9f8d0dc0ec4a
kcm: Fix unnecessary psock unreservation.
|
WARNING: refcount bug in fib6_nh_init
net
|
C |
done |
|
45 |
554d |
560d
|
23/28 |
454d |
3515440df461
ipv6: also use netdev_hold() in ip6_route_check_nh()
|
linux-next test error: WARNING in register_net_sysctl
net
|
|
|
|
9 |
590d |
590d
|
23/28 |
454d |
e7480a44d7c4
Revert "net: Remove low_thresh in ip defrag"
|
net-next test error: WARNING in register_net_sysctl
net
|
|
|
|
21 |
589d |
590d
|
23/28 |
454d |
e7480a44d7c4
Revert "net: Remove low_thresh in ip defrag"
|
KASAN: stack-out-of-bounds Read in skb_splice_from_iter
net
|
C |
done |
|
64 |
554d |
563d
|
23/28 |
454d |
5a6f6873606e
ip, ip6: Fix splice to raw and ping sockets
|
possible deadlock in netlink_set_err
net
|
|
|
|
1 |
554d |
554d
|
23/28 |
454d |
8d61f926d420
netlink: fix potential deadlock in netlink_set_err()
|
possible deadlock in pie_timer (2)
net
|
|
|
|
2 |
552d |
553d
|
23/28 |
454d |
11b73313c124
sch_netem: fix issues in netem_change() vs get_dist_table()
|
KASAN: slab-out-of-bounds Read in taprio_dequeue_from_txq
net
|
syz |
error |
|
4 |
569d |
593d
|
23/28 |
454d |
be3618d96510
net/sched: taprio: fix slab-out-of-bounds Read in taprio_dequeue_from_txq
|
WARNING in scm_recv
net
|
C |
done |
|
8 |
541d |
544d
|
23/28 |
454d |
603fc57ab70c
af_unix: Skip SCM_PIDFD if scm->pid is NULL.
|
KASAN: stack-out-of-bounds Read in ipmr_ioctl
net
|
C |
done |
|
208 |
553d |
558d
|
23/28 |
454d |
634236b34d7a
net: remove sk_is_ipmr() and sk_is_icmpv6() helpers
|
BUG: soft lockup in addrconf_rs_timer (2)
net
|
C |
|
|
51 |
554d |
574d
|
23/28 |
541d |
cd2b8113c2e8
net/sched: fq_pie: ensure reasonable TCA_FQ_PIE_QUANTUM values
|
KCSAN: data-race in dev_graft_qdisc / qdisc_lookup_rcu
net
|
|
|
|
1 |
579d |
579d
|
23/28 |
541d |
d636fc5dd692
net: sched: add rcu annotations around qdisc->qdisc_sleeping
|
general protection fault in vhost_work_queue
kvm
net
virt
|
|
|
|
1 |
581d |
576d
|
23/28 |
541d |
a284f09effea
vhost: Fix crash during early vhost_transport_send_pkt calls
|
KCSAN: data-race in do_recvmmsg / do_recvmmsg (2)
net
|
|
|
|
1 |
623d |
598d
|
22/28 |
544d |
e05a5f510f26
net: annotate sk->sk_err write from do_recvmmsg()
|
KCSAN: data-race in tcp_disconnect / tcp_poll (7)
net
|
|
|
|
2 |
619d |
598d
|
22/28 |
544d |
e14cadfd80d7
tcp: add annotations around sk->sk_shutdown accesses
|
kernel BUG in nsh_gso_segment
net
|
|
|
|
1 |
610d |
596d
|
22/28 |
544d |
c83b49383b59
net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
|
general protection fault in __sk_mem_raise_allocated
net
|
|
|
|
1 |
589d |
584d
|
22/28 |
544d |
ad42a35bdfc6
udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().
|
KMSAN: uninit-value in xfrm_state_find
net
|
C |
error |
done |
215 |
587d |
2386d
|
22/28 |
544d |
3d776e31c841
xfrm: Reject optional tunnel/BEET mode templates in outbound policies
|
KMSAN: uninit-value in vlan_dev_hard_start_xmit (2)
net
|
|
|
|
1 |
619d |
619d
|
22/28 |
544d |
dacab578c7c6
vlan: fix a potential uninit-value in vlan_dev_hard_start_xmit()
|
divide error in tcp_rcv_space_adjust (2)
net
|
|
|
|
1 |
634d |
634d
|
22/28 |
544d |
4faeee0cf8a5
tcp: deny tcp_disconnect() when threads are waiting
|
KCSAN: data-race in sk_stream_wait_connect / tcp_disconnect (2)
net
|
|
|
|
1 |
628d |
598d
|
22/28 |
544d |
d0ac89f6f987
net: deal with most data-races in sk_wait_event()
|
KCSAN: data-race in __netlink_dump_start / netlink_recvmsg (5)
net
|
|
|
|
2 |
627d |
598d
|
22/28 |
544d |
a939d14919b7
netlink: annotate accesses to nlk->cb_running
|
memory leak in tcf_pedit_init
net
|
C |
|
|
1 |
607d |
607d
|
22/28 |
567d |
1b483d9f5805
net/sched: act_pedit: free pedit keys on bail from offset check
|
KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (12)
net
|
|
|
|
3 |
659d |
659d
|
22/28 |
567d |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
general protection fault in pause_prepare_data
net
|
C |
error |
|
34 |
700d |
702d
|
22/28 |
567d |
f5be9caf7bf0
net: ethtool: fix NULL pointer dereference in pause_prepare_data()
|
BUG: unable to handle kernel paging request in __alloc_skb
net
|
|
|
|
1 |
757d |
757d
|
22/28 |
567d |
031af50045ea
arm64: cmpxchg_double*: hazard against entire exchange variable
|
KASAN: use-after-free Read in do_csum
net
|
C |
|
|
72 |
569d |
734d
|
22/28 |
567d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
KCSAN: data-race in rxrpc_send_data / rxrpc_set_call_completion
afs
net
|
|
|
|
2 |
632d |
612d
|
22/28 |
567d |
2b5fdc0f5caa
rxrpc: Fix potential data race in rxrpc_wait_to_be_connected()
|
KMSAN: uninit-value in ethnl_set_linkmodes (2)
net
|
C |
|
|
40 |
600d |
906d
|
22/28 |
567d |
9ad685dbfe7e
ethtool: Fix uninitialized number of lanes
|
KCSAN: data-race in __neigh_event_send / neigh_resolve_output (7)
net
|
|
|
|
43 |
624d |
598d
|
22/28 |
567d |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
WARNING in htb_destroy
net
|
C |
done |
|
2 |
685d |
685d
|
22/28 |
567d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
general protection fault in ethnl_set_plca_cfg
net
|
C |
done |
|
37 |
710d |
710d
|
22/28 |
567d |
28dbf774bc87
plca.c: fix obvious mistake in checking retval
|
memory leak in tcindex_set_parms (3)
net
|
C |
|
|
1 |
754d |
750d
|
22/28 |
567d |
8c710f75256b
net/sched: Retire tcindex classifier
|
KCSAN: data-race in __neigh_update / neigh_resolve_output
net
|
|
|
|
1 |
631d |
598d
|
22/28 |
567d |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
BUG: unable to handle kernel NULL pointer dereference in __build_skb_around
net
bpf
|
C |
done |
|
29 |
646d |
652d
|
22/28 |
567d |
e5995bc7e2ba
bpf, test_run: fix crashes due to XDP frame overwriting/corruption
|
general protection fault in virtio_transport_purge_skbs
net
|
C |
done |
|
3 |
644d |
643d
|
22/28 |
567d |
b465518dc27d
vsock/loopback: use only sk_buff_head.lock to protect the packet queue
|
WARNING: stack going in the wrong direction? at __sys_setsockopt
net
|
|
|
|
6 |
673d |
679d
|
22/28 |
567d |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
upstream test error: unregister_netdevice: waiting for DEV to become free
net
|
|
|
|
204 |
679d |
685d
|
22/28 |
567d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
WARNING in net_free
net
|
|
|
|
1 |
620d |
620d
|
22/28 |
567d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
WARNING in cleanup_net (2)
net
|
C |
error |
|
72 |
601d |
629d
|
22/28 |
567d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
KASAN: use-after-free Read in cfusbl_device_notify
net
|
C |
done |
|
341 |
658d |
806d
|
22/28 |
567d |
9781e98a9711
net: caif: Fix use-after-free in cfusbl_device_notify()
|
general protection fault in taprio_dequeue
net
|
|
|
|
1 |
726d |
726d
|
22/28 |
567d |
3a415d59c1db
net/sched: sch_taprio: fix possible use-after-free
|
WARNING in ip6erspan_tunnel_xmit (2)
net
|
C |
unreliable |
|
5 |
646d |
647d
|
22/28 |
567d |
8e50ed774554
erspan: do not use skb_mac_header() in ndo_start_xmit()
|
KMSAN: uninit-value in qrtr_tx_resume
arm-msm
net
|
C |
|
|
8 |
640d |
701d
|
22/28 |
567d |
6417070918de
net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()
|
INFO: task hung in tls_sw_sendpage (3)
net
|
|
|
|
30 |
671d |
667d
|
22/28 |
567d |
f3221361dc85
net: tls: avoid hanging tasks on the tx_lock
|
WARNING in nla_get_range_unsigned (2)
net
|
C |
done |
|
433 |
642d |
678d
|
22/28 |
567d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
BUG: unable to handle kernel paging request in atm_tc_destroy
net
|
C |
error |
|
3 |
685d |
685d
|
22/28 |
567d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
kernel BUG in ip_frag_next
net
|
C |
done |
|
9 |
701d |
708d
|
22/28 |
567d |
f72ff8b81ebc
net: fix kfree_skb_list use of skb_mark_not_on_list
|
net test error: WARNING: suspicious RCU usage in veth_set_xdp_features
net
|
|
|
|
24 |
652d |
654d
|
22/28 |
567d |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
linux-next test error: WARNING: suspicious RCU usage in veth_set_xdp_features
net
|
|
|
|
12 |
652d |
653d
|
22/28 |
567d |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
KCSAN: data-race in netlink_getname / netlink_insert (4)
net
|
|
|
|
2 |
701d |
706d
|
22/28 |
567d |
c1bb9484e3b0
netlink: annotate data races around nlk->portid
|
WARNING: locking bug in inet_autobind
net
|
C |
done |
error |
103 |
728d |
2051d
|
22/28 |
567d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
UBSAN: array-index-out-of-bounds in qfq_update_agg (4)
net
|
|
|
|
1 |
618d |
618d
|
22/28 |
567d |
3037933448f6
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
|
KMSAN: uninit-value in raw_sock_get
net
|
|
|
|
1 |
626d |
625d
|
22/28 |
567d |
0a78cf7264d2
raw: Fix NULL deref in raw_get_next().
|
BUG: scheduling while atomic in msleep
net
|
C |
done |
|
40 |
700d |
708d
|
22/28 |
567d |
ea4fdbaa2f77
net/sched: sch_taprio: do not schedule in taprio_reset()
|
WARNING in __dev_queue_xmit (2)
net
|
C |
|
|
76 |
599d |
670d
|
22/28 |
567d |
693aa2c0d9b6
ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping()
|
kernel BUG in icmp_glue_bits
net
|
|
|
|
2 |
573d |
636d
|
22/28 |
567d |
7d63b6712538
icmp: guard against too small mtu
|
general protection fault in bpf_struct_ops_link_create
bpf
net
|
C |
done |
|
17 |
640d |
643d
|
22/28 |
567d |
55fbae05476d
bpf: Check IS_ERR for the bpf_map_get() return value
|
WARNING: refcount bug in qrtr_recvmsg (2)
arm-msm
net
|
C |
error |
|
2 |
651d |
644d
|
22/28 |
567d |
44d807320000
net: qrtr: Fix a refcount bug in qrtr_recvmsg()
|
WARNING in sock_map_del_link
bpf
net
|
|
|
|
91 |
622d |
623d
|
22/28 |
567d |
8c5c2a4898e3
bpf, sockmap: Revert buggy deadlock fix in the sockhash and sockmap
|
WARNING: refcount bug in consume_skb
net
|
|
|
|
3 |
685d |
695d
|
22/28 |
567d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
INFO: trying to register non-static key in net_free
net
|
syz |
error |
|
17982 |
674d |
687d
|
22/28 |
567d |
6e77a5a4af05
net: initialize net->notrefcnt_tracker earlier
|
WARNING: suspicious RCU usage in bond_mii_monitor
net
|
C |
|
|
13 |
721d |
739d
|
22/28 |
567d |
42c7ded0eeac
bonding: fix lockdep splat in bond_miimon_commit()
|
BUG: stack guard page was hit in inet6_release
bpf
net
|
C |
done |
|
4 |
701d |
750d
|
22/28 |
567d |
ddce1e091757
bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
|
possible deadlock in l2tp_tunnel_register (2)
net
|
C |
|
|
153 |
661d |
671d
|
22/28 |
567d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
KASAN: slab-use-after-free Read in tcf_action_destroy
net
|
C |
error |
|
32 |
594d |
669d
|
22/28 |
567d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
possible deadlock in release_sock
net
|
C |
done |
|
42 |
707d |
709d
|
22/28 |
567d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
memory leak in nfc_genl_se_io
net
nfc
|
C |
|
|
1 |
681d |
677d
|
22/28 |
567d |
25ff6f8a5a3b
nfc: fix memory leak of se_io context in nfc_genl_se_io
|
general protection fault in tcindex_set_parms
net
|
C |
done |
|
2 |
682d |
682d
|
22/28 |
567d |
42018a322bd4
net/sched: tcindex: search key must be 16 bits
|
kernel BUG in fou_build_udp
net
|
C |
|
|
1 |
602d |
602d
|
22/28 |
567d |
c88f8d5cd95f
UPSTREAM: sit: update dev->needed_headroom in ipip6_tunnel_bind_dev()
|
KCSAN: data-race in ip_finish_output2 / ip_tunnel_xmit
net
|
|
|
|
1 |
696d |
696d
|
22/28 |
567d |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
kernel BUG in rxrpc_put_call
afs
net
|
C |
done |
|
9 |
704d |
716d
|
22/28 |
567d |
01644a1f98ff
rxrpc: Fix wrong error return in rxrpc_connect_call()
|
kernel BUG in rxrpc_put_peer
afs
net
|
C |
|
|
80 |
707d |
751d
|
22/28 |
567d |
9d35d880e0e4
rxrpc: Move client call connection to the I/O thread
03fc55adf876
rxrpc: Only disconnect calls in the I/O thread
|
INFO: rcu detected stall in devlink_nl_cmd_port_get_dumpit
net
|
syz |
|
|
7 |
665d |
682d
|
22/28 |
567d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
WARNING in inet_sock_destruct (3)
net
|
C |
|
|
87 |
570d |
673d
|
22/28 |
567d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
WARNING in devlink_free
net
|
|
|
|
10 |
702d |
715d
|
22/28 |
567d |
93e71edfd90c
devlink: keep the instance mutex alive until references are gone
|
KMSAN: uninit-value in ipv6_find_tlv
net
|
C |
|
|
271 |
608d |
1962d
|
22/28 |
567d |
ea30388baebc
ipv6: Fix an uninit variable access bug in __ip6_make_skb()
|
WARNING in default_device_exit_batch (4)
net
|
C |
error |
|
954 |
643d |
769d
|
22/28 |
567d |
e667d4690986
bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
|
KMSAN: kernel-infoleak in copyout (2)
net
|
C |
|
|
6723 |
567d |
1735d
|
22/28 |
567d |
8222d5910dae
xfrm: Zero padding when dumping algos and encap
|
KASAN: null-ptr-deref Read in __fl_put
net
|
C |
error |
|
16 |
648d |
667d
|
22/28 |
567d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
kernel BUG in inet_sock_destruct
net
|
C |
error |
|
3 |
723d |
722d
|
22/28 |
567d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
possible deadlock in inet_put_port
net
|
|
|
|
2 |
708d |
708d
|
22/28 |
567d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
BUG: corrupted list in taprio_destroy
net
|
C |
done |
|
2 |
684d |
684d
|
22/28 |
567d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (6)
net
|
|
|
|
2 |
635d |
633d
|
22/28 |
567d |
a1865f2e7d10
netlink: annotate lockless accesses to nlk->max_recvmsg_len
|
KASAN: invalid-free in skb_free_head (2)
net
|
C |
error |
|
25 |
608d |
673d
|
22/28 |
567d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
riscv/fixes test error: BUG: soft lockup in corrupted (2)
net
virt
|
|
|
|
4 |
806d |
883d
|
22/28 |
567d |
61fc1ee8be26
riscv: Bump COMMAND_LINE_SIZE value to 1024
|
WARNING in inet_csk_destroy_sock (3)
net
|
|
|
|
1 |
580d |
580d
|
22/28 |
579d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
KASAN: slab-out-of-bounds Read in sk_psock_get
net
|
C |
done |
error |
9 |
884d |
1218d
|
22/28 |
623d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
possible deadlock in nci_start_poll
net
nfc
|
C |
error |
done |
83 |
671d |
772d
|
22/28 |
625d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
kernel BUG in pskb_expand_head
net
|
C |
done |
|
1600 |
686d |
1137d
|
22/28 |
670d |
5f33a09e769a
can: isotp: convert struct tpcon::{idx,len} to unsigned int
7c759040c1dd
can: isotp: fix potential CAN frame reception race in isotp_rcv()
|
WARNING in ipgre_xmit
net
|
C |
done |
|
9916 |
921d |
937d
|
22/28 |
671d |
8d21e9963bec
ip_gre: test csum_start instead of transport header
|
WARNING: ODEBUG bug in ops_free_list
net
|
|
|
|
1 |
998d |
998d
|
22/28 |
671d |
1946014ca3b1
rxrpc: fix a race in rxrpc_exit_net()
|
KASAN: wild-memory-access Read in skb_copy_bits
net
|
C |
|
|
2 |
839d |
839d
|
22/28 |
671d |
0d24148bd276
inet: ping: fix recent breakage
|
KCSAN: data-race in __ip_append_data / __ip_append_data
net
|
|
|
|
1 |
1056d |
1051d
|
22/28 |
671d |
a1cdec57e03a
net-timestamp: convert sk->sk_tskey to atomic_t
|
WARNING: kmalloc bug in xdp_umem_create (2)
bpf
net
|
C |
done |
|
21 |
1050d |
1116d
|
22/28 |
671d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
KCSAN: data-race in tcp_send_challenge_ack / tcp_send_challenge_ack
net
|
|
|
|
1 |
849d |
849d
|
22/28 |
671d |
8c70521238b7
tcp: annotate data-race around challenge_timestamp
|
BUG: sleeping function called from invalid context in sk_psock_skb_ingress_self
net
bpf
|
C |
done |
|
151 |
781d |
803d
|
22/28 |
671d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
KASAN: use-after-free Read in ipvlan_queue_xmit (3)
net
|
C |
error |
error |
8 |
875d |
1472d
|
22/28 |
671d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
general protection fault in llc_build_and_send_xid_pkt
net
|
C |
done |
|
2 |
1008d |
1008d
|
22/28 |
671d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: use-after-free Read in reqsk_queue_unlink
net
|
|
|
|
4 |
757d |
808d
|
22/28 |
671d |
740ea3c4a0b2
tcp: Clean up kernel listener's reqsk in inet_twsk_purge()
|
WARNING: refcount bug in tcp_release_cb
net
|
|
|
|
2 |
746d |
755d
|
22/28 |
671d |
0a182f8d6074
bpf, sockmap: fix race in sock_map_free()
|
net boot error: WARNING in genl_register_family
net
|
|
|
|
3 |
789d |
789d
|
22/28 |
671d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
WARNING in __skb_flow_dissect (4)
net
|
C |
error |
|
6 |
782d |
791d
|
22/28 |
671d |
9f225444467b
ppp: associate skb with a device at tx
|
WARNING in inet_csk_get_port
net
|
C |
done |
|
1166 |
720d |
948d
|
22/28 |
671d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
KASAN: use-after-free Read in free_netdev (3)
net
|
C |
inconclusive |
|
130 |
763d |
918d
|
22/28 |
671d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
KCSAN: data-race in dev_activate / qdisc_lookup_rcu
net
|
|
|
|
1 |
1049d |
1049d
|
22/28 |
671d |
5891cd5ec46c
net_sched: add __rcu annotation to netdev->qdisc
|
WARNING in skb_try_coalesce
net
|
C |
error |
|
1521 |
943d |
1396d
|
22/28 |
671d |
763087dab975
net: add skb_set_end_offset() helper
|
kernel panic: corrupted stack end in netdev_run_todo
net
|
|
|
|
1 |
915d |
915d
|
22/28 |
671d |
b81d591386c3
riscv: Increase stack size under KASAN
|
general protection fault in sock_reserve_memory
net
|
C |
done |
|
2 |
1047d |
1047d
|
22/28 |
671d |
25206111512d
crypto: af_alg - get rid of alg_memory_allocated
|
WARNING in tcp_enter_loss (3)
net
|
C |
inconclusive |
|
7 |
788d |
1084d
|
22/28 |
671d |
0c175da7b037
tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent
|
general protection fault in tls_sk_proto_close (3)
net
|
C |
done |
|
276 |
919d |
1319d
|
22/28 |
671d |
69135c572d1f
net/tls: fix tls_sk_proto_close executed repeatedly
|
possible deadlock in l2tp_tunnel_register
net
|
C |
error |
|
9492 |
671d |
770d
|
22/28 |
671d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
general protection fault in em_cmp_match
net
|
C |
|
|
4 |
746d |
742d
|
22/28 |
671d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
general protection fault in ip6_rcv_core
net
|
C |
done |
|
275 |
761d |
987d
|
22/28 |
671d |
0339d25a2807
ipv6: fix NULL deref in ip6_rcv_core()
|
KASAN: use-after-free Read in nh_netdev_event
net
|
|
|
|
3 |
771d |
847d
|
22/28 |
671d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KASAN: use-after-free Read in rxrpc_lookup_local
afs
net
|
C |
|
|
3997 |
721d |
751d
|
22/28 |
671d |
8fbcc83334a7
rxrpc: Fix I/O thread startup getting skipped
eaa02390adb0
rxrpc: Fix NULL deref in rxrpc_unuse_local()
|
kernel BUG in warn_crc32c_csum_combine
net
|
C |
error |
|
17 |
785d |
794d
|
22/28 |
671d |
7f57f8165cb6
af_key: Fix send_acquire race with pfkey_register
|
kernel panic: corrupted stack end in nf_tables_getset
net
|
|
|
|
1 |
780d |
780d
|
22/28 |
671d |
b81d591386c3
riscv: Increase stack size under KASAN
|
net-next test error: WARNING in devl_port_unregister
net
|
|
|
|
52 |
777d |
779d
|
22/28 |
671d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
WARNING in u32_change
net
|
C |
|
|
28 |
726d |
823d
|
22/28 |
671d |
7cba18332e36
net: sched: cls_u32: Avoid memcpy() false-positive warning
|
general protection fault in metadata_dst_free
net
|
C |
|
|
348 |
802d |
840d
|
22/28 |
671d |
c52add61c27e
macsec: don't free NULL metadata_dst
|
memory leak in virtual_ncidev_write
net
nfc
|
C |
|
|
1 |
770d |
770d
|
22/28 |
671d |
53270fb0fd77
NFC: nci: fix memory leak in nci_rx_data_packet()
|
memory leak in __vsock_create
net
|
C |
|
|
1 |
995d |
991d
|
22/28 |
671d |
7e97cfed9929
vsock: Fix memory leak in vsock_connect()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (5)
net
|
|
|
|
12 |
713d |
966d
|
22/28 |
671d |
d5076fe4049c
netlink: do not reset transport header in netlink_recvmsg()
|
general protection fault in __inet_hash_connect
net
|
|
|
|
5 |
779d |
925d
|
22/28 |
671d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
kernel panic: corrupted stack end in tc_ctl_action
net
|
|
|
|
2 |
802d |
857d
|
22/28 |
671d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in skb_checksum_help
net
|
|
|
|
15 |
676d |
848d
|
22/28 |
671d |
0d24148bd276
inet: ping: fix recent breakage
|
WARNING in skb_tunnel_check_pmtu
net
|
C |
done |
|
8 |
913d |
918d
|
22/28 |
671d |
853a76148802
tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()
|
memory leak in ipv6_renew_options
net
|
C |
|
|
1 |
896d |
892d
|
22/28 |
671d |
e27326009a3d
net: ping6: Fix memleak in ipv6_renew_options().
|
possible deadlock in kcm_ioctl
net
|
C |
error |
|
20 |
856d |
858d
|
22/28 |
671d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
memory leak in __tcp_send_ack
net
|
C |
|
|
10 |
808d |
1339d
|
22/28 |
671d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
kernel BUG in __skb_gso_segment
net
|
C |
done |
|
11 |
938d |
936d
|
22/28 |
671d |
e9d3f80935b6
net/af_packet: make sure to pull mac header
|
general protection fault in rlb_clear_slave
net
|
|
|
|
1 |
914d |
914d
|
22/28 |
671d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
general protection fault in tcp_create_openreq_child
net
|
C |
unreliable |
|
83 |
975d |
978d
|
22/28 |
671d |
ba5a4fdd63ae
tcp: make sure treq->af_specific is initialized
|
KCSAN: data-race in veth_xmit / veth_xmit
net
|
|
|
|
1 |
1056d |
1051d
|
22/28 |
671d |
68468d8c4cd4
veth: fix races around rq->rx_notify_masked
|
kernel BUG in mld_newpack
net
|
|
|
|
1 |
803d |
803d
|
22/28 |
671d |
d89d7ff01235
ipv6: ensure sane device mtu in tunnels
|
KMSAN: uninit-value in ipvlan_queue_xmit
net
|
C |
|
|
2 |
849d |
1432d
|
22/28 |
671d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING: suspicious RCU usage in ipmr_rtm_dumplink
net
|
|
|
|
11 |
912d |
915d
|
22/28 |
671d |
0fcae3c8b1b3
ipmr: fix a lockdep splat in ipmr_rtm_dumplink()
|
possible deadlock in nci_set_local_general_bytes
net
nfc
|
C |
|
|
32 |
721d |
772d
|
22/28 |
671d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
BUG: MAX_LOCK_DEPTH too low! (3)
net
s390
|
C |
done |
|
18 |
1042d |
1051d
|
22/28 |
671d |
1de9770d121e
net/smc: Avoid overwriting the copies of clcsock callback functions
|
general protection fault in skb_clone (5)
net
|
C |
done |
|
7 |
786d |
804d
|
22/28 |
671d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
KCSAN: data-race in fib6_info_hw_flags_set / fib6_purge_rt
net
|
|
|
|
1 |
1075d |
1074d
|
22/28 |
671d |
d95d6320ba7a
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
|
KASAN: use-after-free Read in macsec_get_iflink
net
|
|
|
|
1 |
948d |
944d
|
22/28 |
671d |
196a888ca657
macsec: fix UAF bug for real_dev
|
KMSAN: kernel-infoleak in _copy_to_iter (7)
net
|
C |
|
|
138977 |
671d |
1023d
|
22/28 |
671d |
633593a80898
sctp: fix kernel-infoleak for SCTP sockets
|
KASAN: use-after-free Write in inet_put_port
net
|
|
|
|
1 |
928d |
924d
|
22/28 |
671d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
WARNING in tcp_disconnect
net
|
|
|
|
2 |
798d |
803d
|
22/28 |
671d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
possible deadlock in virtual_nci_close
net
nfc
|
C |
done |
|
939 |
672d |
773d
|
22/28 |
671d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
WARNING in tcp_mtup_probe_success
net
|
|
|
|
3 |
938d |
944d
|
22/28 |
671d |
11825765291a
tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd
|
BUG: sleeping function called from invalid context in smc_pnet_add
net
|
C |
done |
|
45 |
1053d |
1054d
|
22/28 |
671d |
94fdd7c02a56
net/smc: use GFP_ATOMIC allocation in smc_pnet_add_eth()
|
KASAN: slab-out-of-bounds Write in bpf_prog_test_run_xdp
bpf
net
|
C |
done |
|
18 |
1046d |
1064d
|
22/28 |
671d |
a6763080856f
bpf: test_run: Fix OOB access in bpf_prog_test_run_xdp
|
KASAN: slab-out-of-bounds Read in smc_fback_error_report
net
s390
|
C |
error |
|
72 |
973d |
1049d
|
22/28 |
671d |
0558226cebee
net/smc: Fix slab-out-of-bounds issue in fallback
|
KCSAN: data-race in packet_setsockopt / packet_setsockopt
net
|
|
|
|
1 |
1078d |
1065d
|
22/28 |
671d |
e42e70ad6ae2
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
|
possible deadlock in strp_work
net
|
C |
error |
|
4 |
857d |
858d
|
22/28 |
671d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
KASAN: use-after-free Read in __fib6_clean_all
net
|
|
|
|
30 |
761d |
1014d
|
22/28 |
671d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KMSAN: uninit-value in asix_mdio_write_nopm
net
usb
|
|
|
|
2 |
996d |
1017d
|
22/28 |
671d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
KCSAN: data-race in kcm_rcv_strparser / kcm_rfree (7)
net
|
|
|
|
1 |
800d |
799d
|
22/28 |
671d |
0c745b5141a4
kcm: annotate data-races around kcm->rx_wait
|
WARNING in devl_port_unregister
net
|
C |
|
|
1690 |
674d |
777d
|
22/28 |
671d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
WARNING: suspicious RCU usage in corrupted (2)
net
|
C |
unreliable |
|
7 |
915d |
926d
|
22/28 |
671d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
kernel BUG in vhost_get_vq_desc
kvm
net
virt
|
C |
inconclusive |
|
19 |
1035d |
1047d
|
22/28 |
671d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
WARNING in skb_warn_bad_offload (3)
net
|
C |
done |
|
115 |
672d |
808d
|
22/28 |
671d |
87445f369cca
ipv6: ping: fix wrong checksum for large frames
|
WARNING in arp_ioctl
net
|
C |
error |
done |
17 |
743d |
812d
|
22/28 |
671d |
b5f0de6df6dc
net: dev: Convert sa_data to flexible array in struct sockaddr
|
WARNING in ipvlan_queue_xmit
net
|
C |
inconclusive |
|
4 |
849d |
849d
|
22/28 |
671d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING: still has locks held in tls_rx_reader_lock
net
|
C |
done |
|
4 |
888d |
890d
|
22/28 |
671d |
dde06aaa89b7
tls: rx: release the sock lock on locking timeout
|
WARNING: suspicious RCU usage in in6_dump_addrs
net
|
C |
unreliable |
|
613 |
883d |
926d
|
22/28 |
671d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
kernel panic: corrupted stack end in inet_rtm_newaddr
net
|
|
|
|
23 |
674d |
1011d
|
22/28 |
671d |
b81d591386c3
riscv: Increase stack size under KASAN
|
inconsistent lock state in smc_fback_state_change
s390
net
|
C |
error |
|
7 |
762d |
768d
|
22/28 |
671d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
linux-next test error: WARNING in devl_port_unregister
net
|
|
|
|
23 |
777d |
779d
|
22/28 |
671d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
KASAN: use-after-free Read in tcp_retransmit_timer (5)
net
|
C |
unreliable |
|
16000 |
755d |
1767d
|
22/28 |
671d |
3a58f13a881e
net: rds: acquire refcount on TCP sockets
|
WARNING in inet_csk_destroy_sock (2)
io-uring
net
|
C |
done |
|
8 |
720d |
806d
|
22/28 |
671d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
WARNING in __vunmap
net
|
C |
error |
error |
154 |
820d |
2140d
|
22/28 |
671d |
8a04d2fc700f
xfrm: Update ipcomp_scratches with NULL when freed
|
memory leak in napi_get_frags
net
|
C |
|
|
11 |
1420d |
1441d
|
22/28 |
671d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
memory leak in netlink_policy_dump_add_policy
net
|
C |
|
|
1 |
871d |
867d
|
22/28 |
671d |
249801360db3
net: genl: fix error path memory leak in policy dumping
|
KCSAN: data-race in fib6_clean_node / inet6_csk_route_socket
net
|
|
|
|
1 |
1071d |
1071d
|
22/28 |
671d |
aafc2e3285c2
ipv6: annotate accesses to fn->fn_sernum
|
BUG: unable to handle kernel paging request in inet_unhash
net
|
|
|
|
3 |
766d |
847d
|
22/28 |
671d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
general protection fault in llc_ui_connect
net
|
C |
done |
|
17 |
1003d |
1007d
|
22/28 |
671d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
memory leak in ndisc_send_rs
net
|
C |
|
|
2 |
1167d |
1215d
|
22/28 |
671d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
KCSAN: data-race in bond_3ad_initiate_agg_selection / bond_3ad_state_machine_handler (2)
net
|
|
|
|
1 |
1046d |
1046d
|
22/28 |
671d |
9ceaf6f76b20
bonding: fix data-races around agg_select_timer
|
general protection fault in llc_ui_sendmsg
net
|
C |
done |
|
365 |
1003d |
1008d
|
22/28 |
671d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: use-after-free Read in inet_twsk_kill
net
|
|
|
|
86 |
1063d |
1065d
|
22/28 |
671d |
fbb8295248e1
tcp: allocate tcp_death_row outside of struct netns_ipv4
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
net
|
C |
inconclusive |
|
12 |
1020d |
1421d
|
22/28 |
671d |
c700525fcc06
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
INFO: task hung in vhost_work_dev_flush
kvm
net
virt
|
C |
error |
|
2 |
1050d |
1041d
|
22/28 |
671d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
stack segment fault in skb_clone
net
|
C |
unreliable |
inconclusive |
3 |
925d |
1110d
|
22/28 |
671d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
WARNING: suspicious RCU usage in bond_ethtool_get_ts_info
net
|
C |
done |
|
6 |
956d |
958d
|
22/28 |
671d |
9b80ccda233f
bonding: fix missed rcu protection
|
general protection fault in rlb_req_update_slave_clients
net
|
C |
inconclusive |
|
3 |
934d |
934d
|
22/28 |
671d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
inconsistent lock state in l2tp_tunnel_register
net
|
|
|
|
5599 |
757d |
770d
|
22/28 |
671d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KASAN: invalid-free in tcp_disconnect
net
|
C |
unreliable |
|
74 |
799d |
814d
|
22/28 |
671d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
KCSAN: data-race in ip6_dst_gc / ip6_dst_gc (3)
net
|
|
|
|
2 |
986d |
988d
|
22/28 |
671d |
9cb7c013420f
ipv6: make ip6_rt_gc_expire an atomic_t
|
possible deadlock in nci_close_device
net
nfc
|
|
|
|
2 |
751d |
765d
|
22/28 |
671d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
KCSAN: data-race in dropmon_net_event / trace_napi_poll_hit
net
|
|
|
|
1 |
1067d |
1050d
|
22/28 |
671d |
dcd54265c8bc
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
|
kernel BUG in netem_enqueue
net
|
|
|
|
9 |
742d |
967d
|
22/28 |
671d |
eeee4b77dc52
net: add more debug info in skb_checksum_help()
|
memory leak in vlan_dev_set_egress_priority (2)
net
|
C |
|
|
1 |
902d |
902d
|
22/28 |
671d |
72a0b329114b
vlan: fix memory leak in vlan_newlink()
|
upstream boot error: WARNING in genl_register_family
net
|
|
|
|
468 |
784d |
790d
|
22/28 |
671d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
WARNING in bpf_test_finish
net
bpf
|
C |
done |
|
3 |
1032d |
1032d
|
22/28 |
671d |
530e214c5b5a
bpf, test_run: Fix overflow in XDP frags bpf_test_finish
|
KASAN: use-after-free Write in enqueue_timer
net
|
|
|
|
1 |
772d |
772d
|
22/28 |
671d |
ab0377803daf
mrp: introduce active flags to prevent UAF when applicant uninit
|
KASAN: null-ptr-deref Write in kcm_tx_work (3)
net
|
C |
inconclusive |
inconclusive |
7 |
817d |
918d
|
22/28 |
671d |
ec7eede369fe
kcm: avoid potential race in kcm_tx_work
|
kernel panic: corrupted stack end in rtnl_newlink
net
|
|
|
|
3489 |
671d |
1018d
|
22/28 |
671d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING: refcount bug in sk_psock_get (2)
net
|
C |
done |
|
4 |
896d |
937d
|
22/28 |
671d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
WARNING in nci_send_cmd
net
nfc
|
C |
|
|
13 |
757d |
771d
|
22/28 |
671d |
0ad6bded175e
nfc/nci: fix race with opening and closing
|
KCSAN: data-race in kcm_rfree / unreserve_rx_kcm (3)
net
|
|
|
|
4 |
796d |
800d
|
22/28 |
671d |
15e4dabda11b
kcm: annotate data-races around kcm->rx_psock
|
WARNING in nci_add_new_protocol
net
nfc
|
|
|
|
1 |
763d |
759d
|
22/28 |
671d |
e329e71013c9
NFC: nci: Bounds check struct nfc_target arrays
|
memory leak in mld_newpack
net
|
C |
|
|
2 |
831d |
1249d
|
22/28 |
671d |
a43206156263
usbnet: Fix memory leak in usbnet_disconnect()
|
WARNING in netif_napi_add_weight
net
|
C |
inconclusive |
done |
45 |
910d |
922d
|
22/28 |
671d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
BUG: using smp_processor_id() in preemptible code in tun_chr_write_iter
net
|
C |
done |
|
1834 |
1010d |
1019d
|
22/28 |
671d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
BUG: using smp_processor_id() in preemptible code in netdev_core_stats_alloc
net
|
C |
error |
|
2210 |
1010d |
1019d
|
22/28 |
671d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
BUG: missing reserved tailroom
bpf
net
|
C |
done |
|
2 |
1022d |
1021d
|
22/28 |
671d |
b6f1f780b393
bpf, test_run: Fix packet size check for live packet mode
|
general protection fault in smc_pnet_add (2)
net
s390
|
C |
inconclusive |
|
590 |
986d |
1001d
|
22/28 |
671d |
d22f4f977236
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
|
possible deadlock in ___neigh_create
net
|
C |
error |
|
24 |
1056d |
1059d
|
22/28 |
671d |
4a81f6da9cb2
net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work
|
KASAN: use-after-free Read in __tcf_qdisc_find
net
|
|
|
|
1 |
843d |
843d
|
22/28 |
671d |
ebda44da44f6
net: sched: fix race condition in qdisc_graft()
|
KCSAN: data-race in __ip4_datagram_connect / raw_bind (2)
net
|
|
|
|
1 |
1066d |
1065d
|
22/28 |
671d |
153a0d187e76
ipv4: raw: lock the socket in raw_bind()
|
general protection fault in llc_build_and_send_ui_pkt
net
|
C |
done |
|
26 |
1004d |
1007d
|
22/28 |
671d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
net-next test error: WARNING: suspicious RCU usage in hsr_node_get_first
net
|
|
|
|
189 |
1041d |
1050d
|
22/28 |
671d |
e7f27420681f
net: hsr: fix suspicious RCU usage warning in hsr_node_get_first()
|
general protection fault in llc_alloc_frame
net
|
|
|
|
1 |
1006d |
1006d
|
22/28 |
671d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
WARNING in tls_strp_done
net
|
C |
error |
|
22 |
860d |
865d
|
22/28 |
671d |
849f16bbfb68
tls: rx: react to strparser initialization errors
|
linux-next test error: general protection fault in xfrm_policy_lookup_bytype
net
|
|
|
|
15 |
764d |
766d
|
22/28 |
671d |
b97df039a68b
xfrm: Fix oops in __xfrm_state_delete()
|
KASAN: slab-out-of-bounds Write in __build_skb_around
bpf
net
|
C |
error |
|
2536 |
744d |
759d
|
22/28 |
671d |
ce098da1497c
skbuff: Introduce slab_build_skb()
|
WARNING in sk_stream_kill_queues (8)
net
|
C |
unreliable |
|
4268 |
674d |
910d
|
22/28 |
671d |
e9c6e7976026
tcp: fix sock skb accounting in tcp_read_skb()
|
WARNING in mroute_clean_tables
net
|
C |
|
|
10 |
1030d |
1050d
|
22/28 |
671d |
5611a00697c8
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
|
general protection fault in pse_prepare_data
net
|
C |
inconclusive |
|
6 |
721d |
799d
|
22/28 |
671d |
46cdedf2a0fa
ethtool: pse-pd: fix null-deref on genl_info in dump
|
KMSAN: uninit-value in bcmp
net
|
C |
error |
done |
907 |
707d |
2028d
|
22/28 |
671d |
4f1dc7d9756e
fs/ntfs3: Validate attribute name offset
|
UBSAN: shift-out-of-bounds in tcf_pedit_init
net
|
C |
done |
|
59 |
951d |
958d
|
22/28 |
671d |
4d42d54a7d6a
net/sched: act_pedit: sanitize shift argument before usage
|
KASAN: use-after-free Read in ip6_fragment (2)
net
|
|
|
|
1 |
763d |
759d
|
22/28 |
671d |
803e84867de5
ipv6: avoid use-after-free in ip6_fragment()
|
general protection fault in llc_build_and_send_test_pkt
net
|
C |
done |
|
25 |
1003d |
1008d
|
22/28 |
671d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
WARNING in vhost_dev_cleanup (2)
kvm
net
virt
|
|
|
|
79 |
1035d |
1043d
|
22/28 |
671d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
BUG: unable to handle kernel NULL pointer dereference in em_u32_match
net
|
C |
|
|
2 |
726d |
782d
|
22/28 |
671d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
KCSAN: data-race in sit_tunnel_xmit / sit_tunnel_xmit
net
|
|
|
|
702 |
744d |
1842d
|
22/28 |
671d |
cb34b7cf17ec
ipv6/sit: use DEV_STATS_INC() to avoid data-races
|
WARNING in ip6erspan_tunnel_xmit
net
|
|
|
|
23 |
678d |
922d
|
22/28 |
671d |
301bd140ed0b
erspan: do not assume transport header is always set
|
general protection fault in skb_unlink
net
|
C |
done |
error |
8 |
840d |
2401d
|
22/28 |
671d |
5121197ecc5d
kcm: close race conditions on sk_receive_queue
|
WARNING in sk_destruct
net
|
C |
done |
|
454 |
946d |
1073d
|
22/28 |
671d |
ebdc1a030962
tcp: add a missing sk_defer_free_flush() in tcp_splice_read()
|
KASAN: slab-out-of-bounds Read in ipvlan_queue_xmit
net
|
C |
error |
error |
8 |
1034d |
1511d
|
22/28 |
671d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
kernel panic: corrupted stack end in packet_sendmsg
net
|
|
|
|
1 |
842d |
842d
|
22/28 |
671d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in tcp_ack (3)
net
|
|
|
|
16 |
938d |
996d
|
22/28 |
671d |
40570375356c
tcp: add accessors to read/set tp->snd_cwnd
|
WARNING in napi_complete_done
net
|
C |
error |
|
104 |
778d |
782d
|
22/28 |
671d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
KCSAN: data-race in inet6_recvmsg / ipv6_setsockopt
net
|
|
|
|
1 |
1055d |
1051d
|
22/28 |
671d |
086d49058cd8
ipv6: annotate some data-races around sk->sk_prot
|
KASAN: use-after-free Read in ip6mr_sk_done
net
|
C |
done |
|
10988 |
785d |
1054d
|
22/28 |
671d |
7d9b1b578d67
ip6mr: fix use-after-free in ip6mr_sk_done()
|
WARNING: refcount bug in smc_pnet_add
net
s390
|
C |
done |
|
98 |
1041d |
1054d
|
22/28 |
671d |
28f922213886
net/smc: fix ref_tracker issue in smc_pnet_add()
|
KASAN: use-after-free Write in mini_qdisc_pair_swap (2)
net
|
|
|
|
24 |
679d |
1060d
|
22/28 |
671d |
04c2a47ffb13
net: sched: fix use-after-free in tc_new_tfilter()
|
KMSAN: uninit-value in tcp_recvmsg
net
|
C |
|
|
25918 |
793d |
918d
|
22/28 |
671d |
1228b34c8d0e
net: clear msg_get_inq in __sys_recvfrom() and __copy_msghdr_from_user()
|
memory leak in smc_sysctl_net_init
net
s390
|
C |
|
|
8 |
1003d |
1007d
|
22/28 |
671d |
5ae6acf1d00b
net/smc: fix a memory leak in smc_sysctl_net_exit()
|
usb-testing boot error: WARNING in __netif_set_xps_queue
net
virt
|
|
|
|
57 |
789d |
801d
|
22/28 |
671d |
fc8695eb11f0
Revert "net: fix cpu_max_bits_warn() usage in netif_attrmask_next{,_and}"
|
KASAN: use-after-free Read in inet_bind2_bucket_find
io-uring
net
|
C |
done |
|
13 |
926d |
932d
|
22/28 |
671d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
memory leak in smc_create (2)
net
s390
|
C |
|
|
2 |
1007d |
1003d
|
22/28 |
671d |
1a74e9932374
net/smc: Fix sock leak when release after smc_shutdown()
|
possible deadlock in __inet_inherit_port
net
|
C |
done |
|
85 |
708d |
769d
|
22/28 |
671d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
WARNING in cleanup_net
net
|
|
|
|
613 |
671d |
793d
|
22/28 |
671d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
general protection fault in ip6_tnl_xmit
net
|
|
|
|
1 |
1051d |
1051d
|
22/28 |
671d |
3a5f238f2b36
ip6_tunnel: fix possible NULL deref in ip6_tnl_xmit
|
possible deadlock in sk_common_release
net
|
|
|
|
5 |
758d |
769d
|
22/28 |
671d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
kernel panic: corrupted stack end in inet6_ioctl
net
|
|
|
|
1 |
762d |
762d
|
22/28 |
671d |
b81d591386c3
riscv: Increase stack size under KASAN
|
INFO: rcu detected stall in mld_ifc_work
net
|
C |
inconclusive |
|
1 |
1047d |
1047d
|
22/28 |
671d |
5740d0689096
net: sched: limit TC_ACT_REPEAT loops
|
WARNING: refcount bug in u32_destroy_key
net
|
|
|
|
1 |
989d |
989d
|
22/28 |
671d |
3db09e762dc7
net/sched: cls_u32: fix netns refcount changes in u32_change()
|
KASAN: use-after-free Read in ip_mc_sf_allow
net
|
|
|
|
1 |
972d |
972d
|
22/28 |
671d |
dba5bdd57bea
net: igmp: respect RCU rules in ip_mc_source() and ip_mc_msfilter()
|
general protection fault in fq_codel_enqueue (3)
net
|
C |
inconclusive |
|
5 |
908d |
1154d
|
22/28 |
671d |
fd1894224407
bpf: Don't redirect packets with invalid pkt_len
|
KCSAN: data-race in fib_alias_hw_flags_set / fib_alias_hw_flags_set
net
|
|
|
|
1 |
1048d |
1046d
|
22/28 |
671d |
9fcf986cc4bc
ipv4: fix data races in fib_alias_hw_flags_set
|
INFO: trying to register non-static key in __fib6_clean_all (2)
net
|
|
|
|
3 |
807d |
831d
|
22/28 |
671d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
WARNING: bad unlock balance in rxrpc_do_sendmsg
afs
net
|
C |
inconclusive |
|
14 |
876d |
1081d
|
22/28 |
671d |
b0f571ecd794
rxrpc: Fix locking in rxrpc's sendmsg
|
memory leak in tun_chr_open
net
|
C |
|
|
1 |
840d |
840d
|
22/28 |
671d |
1118b2049d77
net: tun: Fix memory leaks of napi_get_frags
|
general protection fault in udpv6_sendmsg
net
|
C |
error |
|
69 |
767d |
777d
|
22/28 |
671d |
6423ac2eb31e
rxrpc: Fix oops from calling udpv6_sendmsg() on AF_INET socket
|
KASAN: slab-out-of-bounds Read in decrypt_internal
net
|
C |
inconclusive |
done |
4 |
993d |
1083d
|
22/28 |
671d |
9381fe8c849c
net/tls: fix slab-out-of-bounds bug in decrypt_internal
|
WARNING in ipvlan_unregister_nf_hook
net
|
C |
done |
done |
4151 |
1119d |
1755d
|
22/28 |
828d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
general protection fault in sock_close
net
|
syz |
done |
unreliable |
2 |
1581d |
1577d
|
20/28 |
945d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING in dev_change_net_namespace
net
|
syz |
done |
done |
8 |
1131d |
1780d
|
20/28 |
951d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
WARNING in rtnl_dellink
net
|
C |
done |
done |
94 |
1078d |
1590d
|
20/28 |
958d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
INFO: task hung in linkwatch_event (2)
net
|
C |
done |
done |
1033 |
976d |
1702d
|
20/28 |
958d |
563fbefed46a
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
general protection fault in xfrm_user_rcv_msg_compat
net
|
C |
unreliable |
done |
1543 |
1239d |
1451d
|
20/28 |
958d |
4e9505064f58
net/xfrm/compat: Copy xfrm_spdattr_type_t atributes
|
WARNING in dst_release (3)
net
|
|
|
|
3 |
1027d |
1107d
|
20/28 |
1024d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KCSAN: data-race in __neigh_event_send / ip_finish_output2 (3)
net
|
|
|
|
1 |
1160d |
1158d
|
20/28 |
1024d |
d18785e21386
net: annotate data-race in neigh_output()
|
general protection fault in unregister_vlan_dev
net
|
|
|
|
1 |
1122d |
1122d
|
20/28 |
1024d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
KASAN: null-ptr-deref Write in dst_release (3)
net
|
|
|
|
2 |
1106d |
1106d
|
20/28 |
1024d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KCSAN: data-race in bond_alb_init_slave / bond_alb_monitor
net
|
|
|
|
1 |
1122d |
1121d
|
20/28 |
1024d |
dac8e00fb640
bonding: make tx_rebalance_counter an atomic
|
KMSAN: kernel-infoleak in _copy_to_iter (6)
net
|
C |
|
|
748 |
1024d |
1113d
|
20/28 |
1024d |
71ddeac8cd1d
inet_diag: fix kernel-infoleak for UDP sockets
|
WARNING: ODEBUG bug in qdisc_create
net
|
C |
done |
|
6 |
1192d |
1220d
|
20/28 |
1024d |
a56d447f196f
net/sched: sch_taprio: properly cancel timer from taprio_destroy()
|
WARNING: suspicious RCU usage in xfrm_set_default
net
|
C |
done |
|
20 |
1186d |
1191d
|
20/28 |
1024d |
93ec1320b017
xfrm: fix rcu lock in xfrm_notify_userpolicy()
|
WARNING: refcount bug in rx_queue_release
net
|
|
|
|
12 |
1126d |
1140d
|
20/28 |
1024d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
kmsan boot error: KMSAN: uninit-value in tcp_child_process
net
|
|
|
|
48 |
1109d |
1120d
|
20/28 |
1024d |
03cfda4fa6ea
tcp: fix another uninit-value (sk_rx_queue_mapping)
|
kmsan boot error: KMSAN: uninit-value in tcp_conn_request
net
|
|
|
|
27 |
1122d |
1122d
|
20/28 |
1024d |
a37a0ee4d25c
net: avoid uninit-value from tcp_conn_request
|
KCSAN: data-race in netlink_insert / netlink_sendmsg (4)
net
|
|
|
|
88 |
1176d |
1257d
|
20/28 |
1024d |
7707a4d01a64
netlink: annotate data races around nlk->bound
|
BUG: sleeping function called from invalid context in ref_tracker_alloc
net
|
|
|
|
1 |
1107d |
1107d
|
20/28 |
1024d |
8b40a9d53d4f
ipv6: use GFP_ATOMIC in rt6_probe()
|
general protection fault in gro_cells_destroy (2)
net
|
|
|
|
2 |
1076d |
1093d
|
20/28 |
1024d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KASAN: null-ptr-deref Write in sock_setsockopt
net
|
C |
|
|
45 |
1041d |
1149d
|
20/28 |
1024d |
d00c8ee31729
net: fix possible NULL deref in sock_reserve_memory
|
WARNING: refcount bug in ip6gre_exit_batch_net
net
|
|
|
|
2 |
1134d |
1136d
|
20/28 |
1024d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
KASAN: use-after-free Read in netlbl_catmap_walk
net
lsm
|
C |
inconclusive |
|
1 |
1219d |
1218d
|
20/28 |
1024d |
0817534ff9ea
smackfs: Fix use-after-free in netlbl_catmap_walk()
|
general protection fault in bpf_skb_cgroup_id
bpf
net
|
C |
inconclusive |
|
107 |
1180d |
1195d
|
20/28 |
1024d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
general protection fault in inet_csk_accept
net
|
C |
done |
|
8 |
1113d |
1112d
|
20/28 |
1024d |
b0cdc5dbcf2b
mptcp: never allow the PM to close a listener subflow
|
KASAN: use-after-free Read in tcp_v4_early_demux
net
|
|
|
|
1 |
1105d |
1105d
|
20/28 |
1024d |
8f905c0e7354
inet: fully convert sk->sk_rx_dst to RCU rules
|
KCSAN: data-race in unix_inflight / wait_for_unix_gc (3)
net
|
|
|
|
1 |
1091d |
1077d
|
20/28 |
1024d |
9d6d7f1cb67c
af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
|
KASAN: use-after-free Read in cipso_v4_doi_add
lsm
net
|
|
|
|
1 |
1168d |
1164d
|
20/28 |
1024d |
0934ad42bb2c
smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
|
KASAN: invalid-free in packet_set_ring
net
|
C |
inconclusive |
|
4 |
1110d |
1110d
|
20/28 |
1024d |
ec6af094ea28
net/packet: rx_owner_map depends on pg_vec
|
general protection fault in bpf_skb_ancestor_cgroup_id
bpf
net
|
C |
unreliable |
|
232 |
1179d |
1195d
|
20/28 |
1024d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
INFO: rcu detected stall in fq_pie_timer
net
|
C |
error |
|
35 |
1064d |
1282d
|
20/28 |
1024d |
61c2402665f1
net/sched: fq_pie: prevent dismantle issue
|
WARNING: refcount bug in netdev_run_todo
net
|
|
|
|
5 |
1126d |
1135d
|
20/28 |
1024d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
general protection fault in free_percpu
net
|
syz |
unreliable |
done |
80 |
1091d |
1358d
|
20/28 |
1024d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
WARNING: lock held when returning to user space in tcp_setsockopt (2)
net
|
C |
done |
done |
6 |
1097d |
1103d
|
20/28 |
1024d |
b29fcfb54cd7
mptcp: full disconnect implementation
|
WARNING in tcf_chain0_head_change_cb_del (3)
net
|
C |
inconclusive |
|
107 |
1107d |
1242d
|
20/28 |
1024d |
ab443c539167
sch_cake: do not call cake_destroy() from cake_init()
|
general protection fault in sock_release (2)
net
|
|
|
|
1 |
1111d |
1111d
|
20/28 |
1024d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
BUG: unable to handle kernel paging request in dev_fetch_sw_netstats
net
|
|
|
|
1 |
1103d |
1103d
|
20/28 |
1024d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
WARNING in free_netdev
net
|
|
|
|
4080 |
1038d |
1079d
|
20/28 |
1024d |
fcfb894d5952
net: bridge: fix net device refcount tracking issue in error path
|
WARNING in nsim_dev_reload_destroy
net
|
C |
done |
|
2895 |
1155d |
1159d
|
20/28 |
1024d |
fb9d19c2d844
Revert "devlink: Remove not-executed trap group notifications"
|
KASAN: use-after-free Read in free_netdev (2)
net
|
C |
done |
done |
1715 |
1121d |
1755d
|
20/28 |
1024d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
WARNING: refcount bug in linkwatch_do_dev
net
|
|
|
|
74 |
1117d |
1144d
|
20/28 |
1024d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
general protection fault in tls_init
net
|
|
|
|
1 |
1124d |
1118d
|
20/28 |
1024d |
404cd9a22150
mptcp: remove tcp ulp setsockopt support
|
WARNING: refcount bug in in_dev_finish_destroy (2)
net
|
|
|
|
42 |
1125d |
1140d
|
20/28 |
1024d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
general protection fault in smc_pnet_add
net
s390
|
|
|
|
578 |
1024d |
1079d
|
20/28 |
1024d |
7b9b1d449a7c
net/smc: fix possible NULL deref in smc_pnet_add_eth()
|
WARNING in __put_net
net
|
|
|
|
5215 |
1067d |
1079d
|
20/28 |
1024d |
cb963a19d99f
net: sched: do not allocate a tracker in tcf_exts_init()
|
KCSAN: data-race in skb_queue_tail / unix_dgram_poll (4)
net
|
|
|
|
2 |
1201d |
1206d
|
20/28 |
1024d |
04f08eb44b50
net/af_unix: fix a data-race in unix_dgram_poll
|
UBSAN: shift-out-of-bounds in __qdisc_calculate_pkt_len
net
|
C |
unreliable |
|
5660 |
1182d |
1480d
|
20/28 |
1024d |
b193e15ac69d
net: prevent user from passing illegal stab size
|
general protection fault in dev_get_by_index_rcu (2)
bpf
net
|
C |
error |
|
18 |
1083d |
1084d
|
20/28 |
1024d |
382778edc826
xdp: check prog type before updating BPF link
|
WARNING in __dev_set_promiscuity
net
|
C |
done |
|
11 |
1185d |
1188d
|
20/28 |
1024d |
a5b8fd657881
net: dev_addr_list: handle first address in __hw_addr_add_ex
|
BUG: sleeping function called from invalid context in hci_cmd_sync_cancel
usb
net
|
C |
done |
|
28 |
1099d |
1113d
|
20/28 |
1024d |
744451c162a5
Bluetooth: hci_sync: Push sync command cancellation to workqueue
|
UBSAN: array-index-out-of-bounds in llc_sap_add_socket
net
|
|
|
|
1 |
1149d |
1149d
|
20/28 |
1024d |
8ac9dfd58b13
llc: fix out-of-bound array index in llc_sk_dev_hash()
|
net-next test error: WARNING in devlink_nl_region_notify
net
|
|
|
|
24 |
1184d |
1181d
|
20/28 |
1024d |
ef91abfb20c7
devlink: Add missed notifications iterators
|
KCSAN: data-race in fib_create_info / free_fib_info
net
|
|
|
|
1 |
1097d |
1077d
|
20/28 |
1024d |
0a6e6b3c7db6
ipv4: update fib_info_cnt under spinlock protection
|
BUG: sleeping function called from invalid context in tipc_crypto_start
net
|
C |
done |
done |
6 |
1102d |
1108d
|
20/28 |
1024d |
f845fe5819ef
Revert "tipc: use consistent GFP flags"
|
general protection fault in ref_tracker_alloc
net
|
C |
done |
|
679 |
1079d |
1108d
|
20/28 |
1024d |
0976b888a150
ethtool: fix null-ptr-deref on ref tracker
|
WARNING: suspicious RCU usage in ref_tracker_alloc
net
|
|
|
|
17 |
1106d |
1108d
|
20/28 |
1024d |
8b40a9d53d4f
ipv6: use GFP_ATOMIC in rt6_probe()
|
UBSAN: shift-out-of-bounds in qfq_init_qdisc
net
|
|
|
|
1 |
1089d |
1089d
|
20/28 |
1024d |
7d18a07897d0
sch_qfq: prevent shift-out-of-bounds in qfq_init_qdisc
|
KMSAN: uninit-value in pneigh_fill_info
net
|
C |
|
|
14 |
1111d |
1116d
|
20/28 |
1024d |
e195e9b5dee6
net, neigh: clear whole pneigh_entry at alloc time
|
KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit (5)
net
|
|
|
|
1 |
1130d |
1129d
|
20/28 |
1024d |
7a10d8c810cf
net: annotate data-races on txq->xmit_lock_owner
|
WARNING in chnl_net_uninit (2)
net
|
|
|
|
1 |
1201d |
1201d
|
20/28 |
1024d |
550ac9c1aaaa
net-caif: avoid user-triggerable WARN_ON(1)
|
general protection fault in nfc_alloc_send_skb
net
nfc
|
C |
done |
|
2 |
1091d |
1086d
|
20/28 |
1024d |
dded08927ca3
nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind()
|
BUG: unable to handle kernel NULL pointer dereference in fifo_set_limit
net
|
C |
error |
|
1 |
1183d |
1183d
|
20/28 |
1024d |
560ee196fe9e
net_sched: fix NULL deref in fifo_set_limit()
|
possible deadlock in smc_switch_to_fallback
net
s390
|
|
|
|
43575 |
1113d |
1132d
|
20/28 |
1024d |
7a61432dc813
net/smc: Avoid warning of possible recursive locking
|
WARNING in rtnl_stats_get
net
|
C |
unreliable |
|
31 |
1151d |
1339d
|
20/28 |
1024d |
0854a0513321
net: bridge: fix under estimation in br_get_linkxstats_size()
|
kernel BUG at net/phonet/socket.c:LINE!
net
|
C |
inconclusive |
|
168 |
1100d |
1721d
|
20/28 |
1024d |
75a2f3152009
phonet/pep: refuse to enable an unbound pipe
|
KCSAN: data-race in __inet_hash_connect / inet_getname
net
|
|
|
|
1 |
1183d |
1157d
|
20/28 |
1024d |
9dfc685e0262
inet: remove races in inet{6}_getname()
|
KMSAN: uninit-value in fib_get_nhs
net
|
C |
|
|
14 |
1042d |
1112d
|
20/28 |
1024d |
7a3429bace0e
ipv4: Check attribute length for RTA_GATEWAY in multipath route
|
WARNING in sk_stream_kill_queues (7)
net
|
C |
|
|
6689 |
1024d |
1142d
|
20/28 |
1024d |
c4777efa751d
net: add and use skb_unclone_keeptruesize() helper
|
KASAN: use-after-free Read in vlan_dev_real_dev (2)
net
|
C |
error |
|
7 |
1160d |
1171d
|
20/28 |
1024d |
563bcbae3ba2
net: vlan: fix a UAF in vlan_dev_real_dev()
|
WARNING in cache_grow_begin
net
|
|
|
|
2 |
1071d |
1071d
|
20/28 |
1024d |
c12837d1bb31
ref_tracker: use __GFP_NOFAIL more carefully
|
UBSAN: shift-out-of-bounds in xfrm_get_default
net
|
C |
done |
|
104 |
1175d |
1213d
|
20/28 |
1024d |
3c10ffddc61f
net: xfrm: fix shift-out-of-bounds in xfrm_get_default
|
WARNING in ref_tracker_free
net
|
C |
done |
|
14831 |
1081d |
1108d
|
20/28 |
1024d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
inconsistent lock state in netlink_broadcast_filtered
net
|
|
|
|
1 |
1157d |
1157d
|
20/28 |
1024d |
f941eadd8d6d
bpf: Avoid races in __bpf_prog_run() for 32bit arches
|
WARNING in gnet_stats_add_basic
net
|
C |
done |
|
14 |
1164d |
1165d
|
20/28 |
1024d |
e22db7bd552f
net: sched: Allow statistics reads from softirq.
|
BUG: corrupted list in netif_napi_add
net
|
syz |
unreliable |
done |
17 |
1138d |
1170d
|
20/28 |
1024d |
0315a075f134
net: fix premature exit from NAPI state polling in napi_disable()
|
INFO: task can't die in __cond_resched
net
|
C |
error |
|
66 |
1138d |
1193d
|
20/28 |
1024d |
e9edc188fc76
netfilter: conntrack: serialize hash resizes and cleanups
|
general protection fault in ref_tracker_free
net
|
|
|
|
21 |
1083d |
1107d
|
20/28 |
1024d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
BUG: unable to handle kernel NULL pointer dereference in unix_shutdown
net
|
C |
unreliable |
|
413 |
1220d |
1223d
|
20/28 |
1066d |
d359902d5c35
af_unix: Fix NULL pointer bug in unix_shutdown
|
KASAN: use-after-free Read in cipso_v4_genopt
lsm
net
|
C |
inconclusive |
|
5 |
1393d |
1395d
|
20/28 |
1142d |
ad5d07f4a9cd
cipso,calipso: resolve a number of problems with the DOI refcounts
1165affd4848
net: mac802154: Fix general protection fault
|
WARNING in idr_get_next
arm-msm
net
|
C |
error |
done |
21 |
1333d |
1577d
|
20/28 |
1142d |
3cbf7530a163
qrtr: Convert qrtr_ports from IDR to XArray
|
KASAN: null-ptr-deref Read in phy_disconnect
net
usb
|
C |
|
|
255 |
1209d |
1213d
|
20/28 |
1142d |
1406e8cb4b05
net: usb: asix: do not call phy_disconnect() for ax88178
|
KMSAN: uninit-value in hsr_fill_frame_info
net
|
C |
|
|
249 |
1259d |
1557d
|
20/28 |
1142d |
2e9f60932a2c
net: hsr: check skb can contain struct hsr_ethhdr in fill_frame_info
|
WARNING: refcount bug in ip6_tnl_dev_uninit
net
|
C |
done |
|
16 |
1365d |
1370d
|
20/28 |
1142d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
KASAN: slab-out-of-bounds Read in fq_pie_qdisc_enqueue
net
|
|
|
|
1 |
1282d |
1282d
|
20/28 |
1142d |
e70f7a11876a
net/sched: fq_pie: fix OOB access in the traffic path
|
WARNING: suspicious RCU usage in do_ipv6_setsockopt
net
|
|
|
|
1 |
1368d |
1368d
|
20/28 |
1142d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
memory leak in garp_request_join
net
|
C |
|
|
414 |
1271d |
1794d
|
20/28 |
1142d |
42ca63f98084
net/802/garp: fix memleak in garp_request_join()
|
KMSAN: uninit-value in virtio_net_hdr_to_skb
net
|
C |
|
|
325 |
1260d |
1319d
|
20/28 |
1142d |
61431a5907fc
net: ensure mac header is set in virtio_net_hdr_to_skb()
|
WARNING in ethnl_default_doit
net
|
|
|
|
202 |
1286d |
1293d
|
20/28 |
1142d |
e175aef90269
ethtool: strset: fix message length calculation
|
KASAN: use-after-free Write in qdisc_class_hash_insert (2)
net
|
|
|
|
1 |
1286d |
1286d
|
20/28 |
1142d |
0cd58e5c53ba
pkt_sched: sch_qfq: fix qfq_change_class() error path
|
KCSAN: data-race in igmp_ifc_event / igmp_ifc_timer_expire
net
|
|
|
|
1 |
1236d |
1235d
|
20/28 |
1142d |
4a2b285e7e10
net: igmp: fix data-race in igmp_ifc_timer_expire()
|
kernel BUG in llc_sap_action_send_xid_c
net
|
C |
error |
|
61 |
1143d |
1356d
|
20/28 |
1142d |
c7c9d2102c9c
net: llc: fix skb_over_panic
|
BUG: unable to handle kernel NULL pointer dereference in htb_select_queue
net
|
syz |
done |
|
8 |
1373d |
1388d
|
20/28 |
1142d |
fb3a3e37de33
sch_htb: Fix offload cleanup in htb_destroy on htb_init failure
93bde210c434
sch_htb: Fix select_queue for non-offload mode
|
KCSAN: data-race in packet_do_bind / packet_sendmsg (3)
net
|
|
|
|
1 |
1302d |
1298d
|
20/28 |
1142d |
c7d2ef5dd4b0
net/packet: annotate accesses to po->bind
|
WARNING: suspicious RCU usage in do_recvmmsg
net
|
|
|
|
8 |
1295d |
1321d
|
20/28 |
1142d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
KASAN: use-after-free Write in sk_psock_stop
bpf
net
|
syz |
done |
|
74 |
1340d |
1360d
|
20/28 |
1142d |
aadb2bb83ff7
sock_map: Fix a potential use-after-free in sock_map_close()
|
KCSAN: data-race in unix_dgram_sendmsg / unix_release_sock
net
|
|
|
|
1 |
1292d |
1291d
|
20/28 |
1142d |
a494bd642d91
net/af_unix: fix a data-race in unix_dgram_sendmsg / unix_release_sock
|
INFO: rcu detected stall in wg_packet_tx_worker (3)
net
|
C |
inconclusive |
|
5 |
1228d |
1210d
|
20/28 |
1142d |
c7c5e6ff533f
fq_codel: reject silly quantum parameters
|
KCSAN: data-race in inet_dgram_connect / udp_lib_get_port (5)
net
|
|
|
|
6 |
1308d |
1295d
|
20/28 |
1142d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
WARNING: refcount bug in vti6_dev_uninit
net
|
C |
|
|
26 |
1365d |
1370d
|
20/28 |
1142d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
general protection fault in unix_dgram_connect
net
|
C |
done |
|
2 |
1217d |
1217d
|
20/28 |
1142d |
dc56ad7028c5
af_unix: fix potential NULL deref in unix_dgram_connect()
|
memory leak in xfrm_user_rcv_msg
net
|
C |
|
|
1 |
1286d |
1282d
|
20/28 |
1142d |
7c1a80e80cde
net: xfrm: fix memory leak in xfrm_user_rcv_msg
|
KMSAN: uninit-value in INET_ECN_decapsulate (2)
net
|
|
|
|
2 |
1297d |
1367d
|
20/28 |
1142d |
6628ddfec758
net: geneve: check skb is large enough for IPv4/IPv6 header
|
KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (5)
net
|
|
|
|
47 |
1143d |
1295d
|
20/28 |
1142d |
f13ef10059cc
net: annotate data race in sock_error()
|
divide error in __tcp_select_window (2)
net
|
C |
done |
|
4 |
1356d |
1357d
|
20/28 |
1142d |
a7150e382267
Revert "tcp: Reset tcp connections in SYN-SENT state"
|
KMSAN: uninit-value in ip_rcv_core
net
|
C |
|
|
141 |
1259d |
2293d
|
20/28 |
1142d |
6628ddfec758
net: geneve: check skb is large enough for IPv4/IPv6 header
|
WARNING in slave_kobj_release
net
|
C |
done |
|
3 |
1320d |
1409d
|
20/28 |
1142d |
35d96e631860
bonding: init notify_work earlier to avoid uninitialized use
|
linux-next boot error: KASAN: use-after-free Read in page_to_skb
net
virt
|
|
|
|
7 |
1345d |
1347d
|
20/28 |
1142d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
KASAN: use-after-free Read in eth_header_parse_protocol
net
|
C |
done |
|
1453 |
1341d |
1387d
|
20/28 |
1142d |
61431a5907fc
net: ensure mac header is set in virtio_net_hdr_to_skb()
|
KCSAN: data-race in udp_lib_setsockopt / udpv6_sendmsg
net
|
|
|
|
1 |
1277d |
1276d
|
20/28 |
1142d |
18a419bad63b
udp: annotate data races around unix_sk(sk)->gso_size
|
WARNING: suspicious RCU usage in nf_ct_iterate_cleanup (2)
net
|
|
|
|
4 |
1272d |
1331d
|
20/28 |
1142d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
WARNING: refcount bug in ip6gre_tunnel_uninit
net
|
C |
error |
|
10 |
1367d |
1370d
|
20/28 |
1142d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
KCSAN: data-race in inet_send_prepare / udp_lib_get_port (3)
net
|
|
|
|
4 |
1295d |
1298d
|
20/28 |
1142d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
net
|
|
|
|
2 |
1320d |
1339d
|
20/28 |
1142d |
821bbf79fe46
ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
|
BUG: using smp_processor_id() in preemptible code in radix_tree_node_alloc
arm-msm
net
|
C |
done |
done |
544 |
1328d |
1665d
|
20/28 |
1142d |
3cbf7530a163
qrtr: Convert qrtr_ports from IDR to XArray
|
general protection fault in smc_tx_sendmsg
net
s390
|
C |
done |
|
6369 |
1276d |
1284d
|
20/28 |
1142d |
17081633e22d
net/smc: Ensure correct state of the socket in send path
|
KCSAN: data-race in packet_do_bind / packet_getname (5)
net
|
|
|
|
4 |
1290d |
1290d
|
20/28 |
1142d |
e032f7c9c7ce
net/packet: annotate accesses to po->ifindex
|
memory leak in qrtr_create
arm-msm
net
|
C |
|
|
3 |
1246d |
1417d
|
20/28 |
1142d |
52f3456a96c0
net: qrtr: fix memory leaks
|
memory leak in virtio_transport_send_pkt_info
net
|
C |
|
|
2 |
1354d |
1417d
|
20/28 |
1142d |
8432b8114957
vsock/virtio: free queued packets when closing socket
|
possible deadlock in ieee80211_tx_frags
net
|
|
|
|
1 |
1343d |
1335d
|
20/28 |
1142d |
1d482e666b8e
netlink: disable IRQs for netlink_lock_table()
|
KCSAN: data-race in __inet_hash_connect / inet_send_prepare (4)
net
|
|
|
|
7 |
1292d |
1295d
|
20/28 |
1142d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
UBSAN: shift-out-of-bounds in choke_change (2)
net
|
C |
done |
|
7 |
1357d |
1372d
|
20/28 |
1142d |
3a87571f0ffc
sch_red: fix off-by-one checks in red_check_params()
|
UBSAN: shift-out-of-bounds in xprt_calc_majortimeo
net
nfs
|
C |
unreliable |
|
149 |
1343d |
1472d
|
20/28 |
1142d |
c09f11ef3595
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
|
INFO: rcu detected stall in tx
net
|
C |
error |
unreliable |
3 |
1209d |
1347d
|
20/28 |
1142d |
30fad76ce4e9
USB: usbtmc: Fix RCU stall warning
|
WARNING: lock held when returning to user space in sock_setsockopt
net
|
|
|
|
1 |
1269d |
1269d
|
20/28 |
1142d |
271dbc318432
sock: unlock on error in sock_setsockopt()
|
WARNING: suspicious RCU usage in inet_twsk_purge
net
|
|
|
|
10 |
1265d |
1367d
|
20/28 |
1142d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
general protection fault in kcm_sendmsg
net
|
C |
done |
|
7957 |
1276d |
1298d
|
20/28 |
1142d |
a47c397bb29f
revert "net: kcm: fix memory leak in kcm_sendmsg"
|
WARNING in sk_stream_kill_queues (6)
net
|
C |
|
|
11376 |
1142d |
1356d
|
20/28 |
1142d |
144748eb0c44
bpf, sockmap: Fix incorrect fwd_alloc accounting
|
linux-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb
net
virt
|
|
|
|
5 |
1345d |
1346d
|
20/28 |
1142d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
BUG: MAX_LOCKDEP_CHAINS too low! (2)
net
|
C |
error |
|
84838 |
1142d |
1618d
|
20/28 |
1142d |
5dc33592e955
lockdep: Allow tuning tracing capacity constants.
|
memory leak in cfserl_create
net
|
C |
|
|
13 |
1861d |
2030d
|
20/28 |
1142d |
b53558a950a8
net: caif: fix memory leak in caif_device_notify
|
UBSAN: shift-out-of-bounds in red_adaptative_timer (2)
net
|
|
|
|
28 |
1372d |
1387d
|
20/28 |
1142d |
e323d865b361
net: sched: validate stab values
|
memory leak in radix_tree_insert
arm-msm
net
|
C |
|
|
1 |
1367d |
1367d
|
20/28 |
1142d |
8a03dd925786
net: qrtr: Fix memory leak on qrtr_tx_wait failure
|
KASAN: use-after-free Read in nfc_llcp_put_ssap
net
nfc
|
syz |
done |
|
4 |
1328d |
1335d
|
20/28 |
1142d |
c61760e6940d
net/nfc: fix use-after-free llcp_sock_bind/connect
|
WARNING: suspicious RCU usage in tcp_bpf_update_proto
bpf
net
|
C |
done |
|
539 |
1340d |
1360d
|
20/28 |
1142d |
51e0158a5432
skmsg: Pass psock pointer to ->psock_update_sk_prot()
|
KCSAN: data-race in __ip4_datagram_connect / skb_set_owner_w (2)
net
|
|
|
|
1 |
1307d |
1295d
|
20/28 |
1142d |
b71eaed8c04f
inet: annotate date races around sk->sk_txhash
|
WARNING: suspicious RCU usage in __copy_msghdr_from_user
net
|
|
|
|
1 |
1308d |
1308d
|
20/28 |
1142d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
BUG: MAX_STACK_TRACE_ENTRIES too low! (3)
net
|
|
|
|
2 |
1345d |
1346d
|
20/28 |
1142d |
5dc33592e955
lockdep: Allow tuning tracing capacity constants.
|
BUG: sleeping function called from invalid context in __ipv6_dev_mc_dec
net
|
C |
done |
|
21 |
1275d |
1333d
|
20/28 |
1142d |
a100243d95a6
rtnetlink: avoid RCU read lock when holding RTNL
|
WARNING: refcount bug in in_dev_finish_destroy
net
|
C |
unreliable |
|
463 |
1143d |
1370d
|
20/28 |
1142d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
WARNING in macvlan_process_broadcast
net
|
|
|
|
32053 |
1142d |
1387d
|
20/28 |
1142d |
dd4fa1dae9f4
macvlan: macvlan_count_rx() needs to be aware of preemption
|
WARNING: suspicious RCU usage in vxlan_xmit
net
|
C |
error |
|
1 |
1284d |
1284d
|
20/28 |
1142d |
85e8b032d6eb
vxlan: add missing rcu_read_lock() in neigh_reduce()
|
linux-next boot error: WARNING: refcount bug in fib_create_info
net
|
|
|
|
3 |
1241d |
1241d
|
20/28 |
1142d |
28814cd18cd7
ipv4: Fix refcount warning for new fib_info
|
possible deadlock in br_ioctl_call
net
|
C |
unreliable |
|
4161 |
1233d |
1243d
|
20/28 |
1142d |
893b19587534
net: bridge: fix ioctl locking
|
BUG: sleeping function called from invalid context in _copy_to_iter
net
|
C |
done |
|
60 |
1228d |
1235d
|
20/28 |
1142d |
876c14ad014d
af_unix: fix holding spinlock in oob handling
|
UBSAN: array-index-out-of-bounds in taprio_change
net
|
|
|
|
2 |
1226d |
1234d
|
20/28 |
1142d |
efe487fce306
fix array-index-out-of-bounds in taprio_change
|
memory leak in tcindex_set_parms
net
|
C |
|
|
94 |
1301d |
1786d
|
20/28 |
1142d |
f5051bcece50
net: sched: fix memory leak in tcindex_partial_destroy_work
|
general protection fault in sock_from_file
net
io-uring
|
C |
inconclusive |
|
78 |
1206d |
1213d
|
20/28 |
1142d |
c6d3d9cbd659
io_uring: fix queueing half-created requests
|
KCSAN: data-race in __skb_try_recv_datagram / sock_setsockopt
net
|
|
|
|
1 |
1277d |
1276d
|
20/28 |
1142d |
0dbffbb5335a
net: annotate data race around sk_ll_usec
|
WARNING: ODEBUG bug in net_dm_cmd_trace
net
|
syz |
unreliable |
|
2 |
1393d |
1389d
|
20/28 |
1142d |
9398e9c0b1d4
drop_monitor: Perform cleanup upon probe registration failure
|
net-next boot error: WARNING: refcount bug in fib_create_info
net
|
|
|
|
39 |
1242d |
1241d
|
20/28 |
1142d |
28814cd18cd7
ipv4: Fix refcount warning for new fib_info
|
UBSAN: shift-out-of-bounds in gred_enqueue
net
|
|
|
|
1 |
1380d |
1380d
|
20/28 |
1142d |
e323d865b361
net: sched: validate stab values
|
WARNING in xfrm_alloc_compat (2)
net
|
C |
done |
|
47 |
1357d |
1367d
|
20/28 |
1142d |
ef19e111337f
xfrm/compat: Cleanup WARN()s that can be user-triggered
|
KMSAN: uninit-value in caif_seqpkt_sendmsg
net
|
C |
|
|
2365 |
1189d |
1606d
|
20/28 |
1142d |
991e634360f2
net: fix uninit-value in caif_seqpkt_sendmsg
|
memory leak in mrp_request_join
net
|
C |
|
|
215 |
1282d |
1800d
|
20/28 |
1142d |
996af62167d0
net/802/mrp: fix memleak in mrp_request_join()
|
net-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb
net
virt
|
|
|
|
15 |
1345d |
1349d
|
20/28 |
1142d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
general protection fault in bond_ipsec_add_sa (2)
net
|
|
|
|
1 |
1269d |
1269d
|
20/28 |
1142d |
105cd17a8660
bonding: fix null dereference in bond_ipsec_add_sa()
|
memory leak in tcp_cdg_init
net
|
syz |
|
|
6 |
1307d |
1446d
|
20/28 |
1142d |
be5d1b61a2ad
tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
|
WARNING: refcount bug in sk_psock_get
net
|
C |
done |
|
8 |
1329d |
1357d
|
20/28 |
1142d |
8621436671f3
smc: disallow TCP_ULP in smc_setsockopt()
|
net-next boot error: KASAN: use-after-free Read in page_to_skb
net
virt
|
|
|
|
11 |
1345d |
1348d
|
20/28 |
1142d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
WARNING: refcount bug in ipip6_tunnel_uninit
net
|
C |
done |
|
199 |
1365d |
1370d
|
20/28 |
1142d |
6289a98f0817
sit: proper dev_{hold|put} in ndo_[un]init methods
|
WARNING: refcount bug in register_netdevice
net
|
C |
unreliable |
|
97 |
1363d |
1370d
|
20/28 |
1142d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
WARNING: refcount bug in ip6erspan_tunnel_uninit
net
|
C |
error |
|
11 |
1367d |
1369d
|
20/28 |
1142d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
UBSAN: shift-out-of-bounds in xfrm_set_default
net
|
C |
unreliable |
|
79 |
1237d |
1248d
|
20/28 |
1142d |
5d8dbb7fb82b
net: xfrm: fix shift-out-of-bounce
|
KMSAN: kernel-infoleak in _copy_to_iter (5)
net
|
C |
|
|
23883 |
1251d |
1688d
|
20/28 |
1142d |
08c27f3322fe
batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field
|
WARNING: locking bug in l2tp_xmit_skb
net
|
|
|
|
1 |
1332d |
1332d
|
20/28 |
1142d |
69e16d01d1de
net: fix a concurrency bug in l2tp_tunnel_register()
|
KMSAN: uninit-value in __dev_mc_add
net
|
C |
|
|
213 |
2086d |
2283d
|
20/28 |
1142d |
cca8ea3b05c9
net: tun: set tun->dev->addr_len during TUNSETLINK processing
|
memory leak in kcm_sendmsg
net
|
C |
|
|
2 |
1638d |
1777d
|
20/28 |
1142d |
c47cc304990a
net: kcm: fix memory leak in kcm_sendmsg
|
UBSAN: shift-out-of-bounds in qdisc_get_rtab
net
|
C |
unreliable |
done |
521 |
1435d |
1480d
|
20/28 |
1290d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
memory leak in qrtr_tun_open
net
arm-msm
|
C |
|
|
4 |
1448d |
1492d
|
20/28 |
1356d |
fc0494ead639
net: qrtr: Fix memory leak in qrtr_tun_open
|
KASAN: null-ptr-deref Read in tcf_idrinfo_destroy
net
|
C |
|
|
115 |
1360d |
1550d
|
20/28 |
1356d |
396d7f23adf9
net: sched: fix police ext initialization
|
INFO: task hung in tcf_action_init_1
net
|
C |
done |
|
30 |
1416d |
1550d
|
20/28 |
1356d |
d349f9976868
net_sched: fix RTNL deadlock again caused by request_module()
|
KASAN: slab-out-of-bounds Read in skb_segment
net
|
C |
error |
|
311 |
1435d |
1439d
|
20/28 |
1356d |
00b229f762b0
net: fix GSO for SG-enabled devices
|
upstream test error: INFO: trying to register non-static key in nsim_get_stats64
net
|
|
|
|
381 |
1387d |
1429d
|
20/28 |
1356d |
863a42b289c2
netdevsim: init u64 stats for 32bit hardware
|
INFO: task can't die in connmark_exit_net
net
|
syz |
error |
|
1 |
1479d |
1475d
|
20/28 |
1356d |
d349f9976868
net_sched: fix RTNL deadlock again caused by request_module()
|
WARNING in __alloc_skb
arm-msm
net
|
C |
error |
|
24 |
1388d |
1400d
|
20/28 |
1356d |
093b036aa94e
net/qrtr: fix __netdev_alloc_skb call
|
WARNING in sk_stream_kill_queues (5)
net
|
C |
done |
|
4684 |
1356d |
1487d
|
20/28 |
1356d |
097b9146c0e2
net: fix up truesize of cloned skb in skb_prepare_for_shift()
|
WARNING in dst_release
net
|
syz |
done |
|
2 |
1409d |
1407d
|
20/28 |
1356d |
e0be4931f3fe
mptcp: reset last_snd on subflow close
|
KASAN: use-after-free Read in skb_segment
net
|
C |
error |
|
55 |
1435d |
1439d
|
20/28 |
1356d |
00b229f762b0
net: fix GSO for SG-enabled devices
|
UBSAN: shift-out-of-bounds in tcf_police_init
net
|
C |
unreliable |
|
8 |
1436d |
1473d
|
20/28 |
1386d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
UBSAN: shift-out-of-bounds in est_timer
net
|
C |
unreliable |
|
73 |
1395d |
1470d
|
20/28 |
1386d |
dd5e073381f2
net_sched: gen_estimator: support large ewma log
|
memory leak in xskq_create
bpf
net
|
C |
|
|
7 |
1453d |
1474d
|
19/28 |
1387d |
8bee68338408
xsk: Fix memory leak for failed bind
|
UBSAN: shift-out-of-bounds in __detect_linklayer
net
|
C |
unreliable |
done |
31 |
1435d |
1442d
|
19/28 |
1387d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
UBSAN: shift-out-of-bounds in tcindex_set_parms
net
|
C |
unreliable |
done |
45 |
1436d |
1470d
|
19/28 |
1387d |
bcd0cf19ef82
net_sched: avoid shift-out-of-bounds in tcindex_set_parms()
|
general protection fault in taprio_dequeue_soft
net
|
C |
done |
|
2 |
1472d |
1472d
|
19/28 |
1387d |
44d4775ca518
net/sched: sch_taprio: reset child qdiscs before freeing them
|
kernel BUG at net/core/dev.c:NUM!
net
|
C |
done |
|
35 |
1441d |
1443d
|
19/28 |
1387d |
47e4bb147a96
net: sit: unregister_netdevice on newlink's error path
|
KASAN: global-out-of-bounds Read in smc_nl_get_sys_info
net
s390
|
C |
error |
|
27 |
1440d |
1467d
|
19/28 |
1387d |
25fe2c9c4cd2
smc: fix out of bound access in smc_nl_get_sys_info()
|
KASAN: use-after-free Read in decode_session6
net
|
C |
done |
|
152 |
1434d |
1641d
|
19/28 |
1387d |
0356010d825e
sctp: bring inet(6)_skb_parm back to sctp_input_cb
|
divide error in __tcp_select_window
net
|
C |
done |
|
1119 |
1491d |
1496d
|
19/28 |
1387d |
fd8976790a6c
mptcp: be careful on MPTCP-level ack.
|
KMSAN: uninit-value in INET_ECN_decapsulate
net
|
|
|
|
3 |
1454d |
1487d
|
19/28 |
1387d |
4179b00c04d1
geneve: pull IP header before ECN decapsulation
|
UBSAN: shift-out-of-bounds in choke_enqueue
net
|
C |
inconclusive |
|
3853 |
1387d |
1480d
|
19/28 |
1387d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
WARNING: suspicious RCU usage in tcp_disconnect
net
|
C |
done |
|
25 |
1441d |
1443d
|
19/28 |
1387d |
13a9499e8333
mptcp: fix locking in mptcp_disconnect()
|
KMSAN: uninit-value in __nla_validate_parse (2)
net
|
C |
|
|
2 |
1449d |
1445d
|
19/28 |
1387d |
c96adff95619
cls_flower: call nla_ok() before nla_next()
|
general protection fault in xsk_recvmsg
bpf
net
|
C |
done |
unreliable |
1800 |
1472d |
1441d
|
19/28 |
1387d |
3546b9b8eced
xsk: Validate socket state in xsk_recvmsg, prior touching socket members
|
UBSAN: shift-out-of-bounds in sfq_init
net
|
C |
unreliable |
|
8 |
1450d |
1464d
|
19/28 |
1387d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KMSAN: uninit-value in gre_parse_header
net
|
C |
|
|
9283 |
1415d |
2013d
|
19/28 |
1387d |
085c7c4e1c0e
erspan: fix version 1 check in gre_parse_header()
|
UBSAN: shift-out-of-bounds in red_adaptative_timer
net
|
C |
unreliable |
|
260 |
1388d |
1480d
|
19/28 |
1387d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KASAN: slab-out-of-bounds Write in xfrm_attr_cpy32
net
|
C |
done |
|
106 |
1477d |
1525d
|
19/28 |
1387d |
d1949d045fd6
xfrm/compat: memset(0) 64-bit padding at right place
|
UBSAN: shift-out-of-bounds in __red_change
net
|
C |
unreliable |
|
24 |
1390d |
1479d
|
19/28 |
1387d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KASAN: use-after-free Read in rxrpc_get_skb
afs
net
|
|
|
|
1 |
1435d |
1431d
|
19/28 |
1387d |
7b5eab57cac4
rxrpc: Fix clearance of Tx/Rx ring when releasing a call
|
UBSAN: shift-out-of-bounds in gred_change
net
|
C |
unreliable |
|
5 |
1401d |
1455d
|
19/28 |
1387d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KASAN: slab-out-of-bounds Read in smc_nl_handle_smcr_dev
s390
net
|
|
|
|
1 |
1470d |
1466d
|
19/28 |
1387d |
995433b795ce
net/smc: fix access to parent of an ib device
|
memory leak in rxrpc_lookup_local
afs
net
|
C |
|
|
1415 |
1427d |
1891d
|
19/28 |
1387d |
b8323f7288ab
rxrpc: Fix memory leak in rxrpc_lookup_local
|
WARNING in xfrm_alloc_compat
net
|
C |
done |
|
130 |
1400d |
1522d
|
19/28 |
1387d |
dbd7ae5154d5
xfrm/compat: Translate by copying XFRMA_UNSPEC attribute
|
UBSAN: shift-out-of-bounds in red_enqueue
net
|
C |
unreliable |
|
4906 |
1387d |
1480d
|
19/28 |
1387d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KMSAN: kernel-infoleak in move_addr_to_user (4)
net
|
C |
|
|
59 |
1394d |
1446d
|
19/28 |
1387d |
b42b3a2744b3
can: isotp: isotp_getname(): fix kernel information leak
|
UBSAN: shift-out-of-bounds in strset_parse_request
net
|
C |
done |
|
16 |
1450d |
1474d
|
19/28 |
1387d |
efb796f5571f
ethtool: fix string set id check
|
UBSAN: shift-out-of-bounds in cbq_dequeue
net
|
C |
unreliable |
|
27 |
1436d |
1480d
|
19/28 |
1387d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
BUG: unable to handle kernel paging request in smc_nl_handle_smcr_dev
net
s390
|
C |
|
|
16 |
1456d |
1479d
|
19/28 |
1387d |
995433b795ce
net/smc: fix access to parent of an ib device
|
KASAN: stack-out-of-bounds Write in bitmap_from_arr32
net
|
C |
done |
|
2 |
1490d |
1487d
|
19/28 |
1387d |
a770bf515613
ethtool: fix stack overflow in ethnl_parse_bitset()
|
KASAN: use-after-free Read in rxrpc_send_data_packet
afs
net
|
|
|
|
1 |
1429d |
1424d
|
19/28 |
1387d |
7b5eab57cac4
rxrpc: Fix clearance of Tx/Rx ring when releasing a call
|
KASAN: use-after-free Read in dump_schedule
net
|
C |
done |
done |
7 |
1464d |
1575d
|
19/28 |
1387d |
cc00bcaa5899
netfilter: x_tables: Switch synchronization to RCU
|
KASAN: use-after-free Read in eth_type_trans
net
|
C |
done |
error |
3 |
1687d |
1830d
|
15/28 |
1464d |
96aa1b22bd6b
tun: correct header offsets in napi frags mode
|
BUG: MAX_LOCKDEP_KEYS too low!
net
|
C |
done |
error |
3496 |
1643d |
1887d
|
15/28 |
1477d |
1a33e10e4a95
net: partially revert dynamic lockdep key changes
|
general protection fault in xsk_release
bpf
net
|
C |
done |
|
2 |
1553d |
1553d
|
15/28 |
1501d |
1fd17c8cd0aa
xsk: Fix possible crash in socket_release when out-of-memory
|
KASAN: use-after-free Write in tcindex_change
net
|
C |
done |
done |
4 |
1744d |
1744d
|
15/28 |
1501d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
possible deadlock in cleanup_net
net
|
C |
done |
|
281 |
1570d |
1577d
|
15/28 |
1501d |
d966ddcc3821
tipc: fix a deadlock when flushing scheduled work
|
KMSAN: uninit-value in ip_tunnel_xmit (2)
net
|
C |
|
|
11778 |
1505d |
2330d
|
15/28 |
1501d |
fdafed459998
ip_gre: set dev->hard_header_len and dev->needed_headroom properly
|
INFO: rcu detected stall in ip_list_rcv
net
|
C |
error |
done |
3 |
1548d |
1575d
|
15/28 |
1501d |
1d0e850a49a5
afs: Fix cell removal
|
general protection fault in tcf_generic_walker
net
|
syz |
|
|
9 |
1547d |
1550d
|
15/28 |
1501d |
580e4273d7a8
net_sched: check error pointer in tcf_dump_walker()
|
KMSAN: uninit-value in unix_find_other
net
|
C |
|
|
57 |
1546d |
2362d
|
15/28 |
1501d |
7ca1db21ef8e
net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
|
INFO: task hung in ctrl_getfamily
net
|
syz |
done |
done |
22 |
1594d |
2207d
|
15/28 |
1501d |
47733f9daf4f
tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
|
WARNING: suspicious RCU usage in qrtr_ns_worker
arm-msm
net
|
C |
done |
|
1 |
1582d |
1645d
|
15/28 |
1501d |
a7809ff90ce6
net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
|
WARNING in rxrpc_recvmsg
afs
net
|
C |
error |
done |
5 |
1636d |
1636d
|
15/28 |
1501d |
65550098c1c4
rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
|
KASAN: use-after-free Read in tcf_action_init
net
|
C |
done |
|
1 |
1553d |
1550d
|
15/28 |
1501d |
0fedc63fadf0
net_sched: commit action insertions together
|
KASAN: slab-out-of-bounds Read in strset_parse_request
net
|
C |
error |
|
141 |
1539d |
1540d
|
15/28 |
1501d |
db972e532518
ethtool: strset: allow ETHTOOL_A_STRSET_COUNTS_ONLY attr
|
KASAN: stack-out-of-bounds Read in xfrm_selector_match (2)
net
|
|
|
|
1 |
1559d |
1557d
|
15/28 |
1501d |
e94ee171349d
xfrm: Use correct address family in xfrm_state_find
|
BUG: unable to handle kernel paging request in tcf_action_dump_terse
net
|
C |
done |
|
15 |
1544d |
1550d
|
15/28 |
1501d |
580e4273d7a8
net_sched: check error pointer in tcf_dump_walker()
|
INFO: task hung in lock_sock_nested (3)
net
|
C |
done |
|
5 |
1544d |
1546d
|
15/28 |
1501d |
d9fb8c507d42
mptcp: fix infinite loop on recvmsg()/worker() race.
|
kernel BUG at net/rxrpc/conn_object.c:LINE!
afs
net
|
C |
done |
|
855 |
1503d |
1568d
|
15/28 |
1501d |
546a42410bf7
rxrpc: Fix conn bundle leak in net-namespace exit
|
possible deadlock in dev_uc_sync
net
|
C |
done |
|
3 |
1536d |
1634d
|
15/28 |
1501d |
0e8b8d6a2d85
net: core: use list_del_init() instead of list_del() in netdev_run_todo()
|
general protection fault in rt6_fill_node
net
|
C |
done |
done |
3 |
1585d |
1583d
|
15/28 |
1501d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
memory leak in __team_options_register
net
|
C |
|
|
1 |
1570d |
1570d
|
15/28 |
1501d |
9a9e77495958
net: team: fix memory leak in __team_options_register
|
general protection fault in nexthop_is_blackhole
net
|
C |
done |
done |
1 |
1585d |
1583d
|
15/28 |
1501d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
KASAN: use-after-free Write in xp_put_pool
bpf
net
|
C |
done |
|
50 |
1554d |
1576d
|
15/28 |
1501d |
83cf5c68d663
xsk: Fix use-after-free in failed shared_umem bind
|
WARNING in nla_get_range_unsigned
net
|
C |
done |
|
63 |
1576d |
1578d
|
15/28 |
1501d |
c30a3c957c88
netlink: policy: correct validation type check
|
general protection fault in xsk_is_setup_for_bpf_map
bpf
net
|
C |
error |
|
294 |
1553d |
1576d
|
15/28 |
1501d |
968be23ceaca
xsk: Fix possible segfault at xskmap entry insertion
|
inconsistent lock state in icmp_send
net
|
syz |
done |
done |
1 |
1708d |
2206d
|
15/28 |
1501d |
1378817486d6
tipc: block BH before using dst_cache
|
INFO: task can't die in rtnetlink_rcv_msg
net
|
|
|
|
5 |
1541d |
1549d
|
15/28 |
1501d |
0fedc63fadf0
net_sched: commit action insertions together
|
KASAN: use-after-free Write in rxrpc_put_bundle
afs
net
|
C |
done |
|
229 |
1539d |
1562d
|
15/28 |
1501d |
f3af4ad1e08a
rxrpc: Fix bundle counting for exclusive connections
|
KASAN: use-after-free Read in tcf_action_destroy
net
|
C |
done |
|
8 |
1543d |
1558d
|
15/28 |
1501d |
0fedc63fadf0
net_sched: commit action insertions together
|
memory leak in xdp_umem_create
net
bpf
|
C |
|
|
17 |
1505d |
1525d
|
15/28 |
1501d |
e5e1a4bc916d
xsk: Fix possible memory leak at socket close
|
general protection fault in xsk_diag_dump (2)
bpf
net
|
C |
|
|
354 |
1557d |
1576d
|
15/28 |
1501d |
53ea2076d851
xsk: Fix possible segfault in xsk umem diagnostics
|
general protection fault in tcf_action_destroy (2)
net
|
C |
done |
done |
29 |
1538d |
1751d
|
15/28 |
1501d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
WARNING: suspicious RCU usage in ctrl_cmd_new_lookup
arm-msm
net
|
C |
done |
done |
10 |
1556d |
1645d
|
15/28 |
1501d |
a7809ff90ce6
net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
|
WARNING: suspicious RCU usage in fib6_del (2)
net
|
|
|
|
1 |
1570d |
1570d
|
15/28 |
1538d |
843d926b003e
ipv6: avoid lockdep issue in fib6_del()
|
KASAN: use-after-free Write in skb_queue_tail
net
arm-msm
|
|
|
|
1 |
1570d |
1570d
|
15/28 |
1538d |
3ca1a42a52ca
net: qrtr: check skb_put_padto() return value
|
possible deadlock in peernet2id_alloc
net
|
|
|
|
12 |
1569d |
1741d
|
15/28 |
1538d |
e1f469cd5866
Revert "netns: don't disable BHs when locking "nsid_lock""
|
KMSAN: uninit-value in __inet_diag_dump
net
|
C |
|
|
37 |
1540d |
1557d
|
15/28 |
1538d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
INFO: task hung in tcf_ife_init
net
|
C |
done |
|
4 |
1570d |
1575d
|
15/28 |
1538d |
cc8e58f8325c
act_ife: load meta modules before tcf_idr_check_alloc()
|
KMSAN: uninit-value in inet_diag_cmd_exact
net
|
C |
|
|
31 |
1539d |
1551d
|
15/28 |
1538d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
general protection fault in free_netdev
net
|
C |
error |
done |
3605 |
1614d |
1649d
|
15/28 |
1546d |
46ef5b89ec0e
ip6_gre: fix null-ptr-deref in ip6gre_init_net()
|
KMSAN: kernel-infoleak in move_addr_to_user (3)
net
|
C |
|
|
79 |
1561d |
1596d
|
15/28 |
1550d |
38ba8b9241f5
can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
|
WARNING: refcount bug in red_destroy
net
|
C |
done |
|
1 |
1584d |
1583d
|
15/28 |
1553d |
5438dd45831e
net_sched: fix error path in red_init()
|
WARNING: refcount bug in smc_release (3)
net
s390
|
|
|
|
1 |
1581d |
1570d
|
15/28 |
1553d |
5fb8642a17aa
net/smc: fix sock refcounting in case of termination
|
WARNING: refcount bug in qdisc_put (2)
net
|
C |
done |
|
7 |
1583d |
1583d
|
15/28 |
1553d |
5438dd45831e
net_sched: fix error path in red_init()
|
KASAN: use-after-free Write in __linkwatch_run_queue
net
|
C |
error |
|
24 |
1616d |
1617d
|
15/28 |
1561d |
c75d1d5248c0
bonding: check return value of register_netdevice() in bond_newlink()
|
KASAN: use-after-free Read in sock_def_write_space (2)
arm-msm
net
|
C |
error |
|
29 |
1562d |
1619d
|
15/28 |
1561d |
af9f691f0f5b
qrtr: orphan socket in qrtr_release()
|
kernel BUG at net/rxrpc/recvmsg.c:LINE!
afs
net
|
C |
error |
|
10 |
1608d |
1636d
|
15/28 |
1561d |
65550098c1c4
rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
|
WARNING in idr_alloc
arm-msm
net
|
C |
done |
|
65 |
1571d |
1645d
|
15/28 |
1561d |
8dfddfb79653
net: qrtr: fix usage of idr in port assignment to socket
|
general protection fault in fib_dump_info (2)
net
|
C |
done |
|
16 |
1585d |
1588d
|
15/28 |
1561d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
KMSAN: uninit-value in netlink_policy_dump_start
net
|
C |
|
|
31 |
1567d |
1570d
|
15/28 |
1561d |
d1fb55592909
netlink: fix state reallocation in policy export
|
KASAN: use-after-free Read in devlink_health_reporter_destroy
net
|
C |
error |
|
1188 |
1625d |
1626d
|
15/28 |
1561d |
5d037b4d3df7
devlink: Fix use-after-free when destroying health reporters
|
kernel BUG at net/core/dev.c:LINE! (3)
net
|
C |
done |
|
979 |
1576d |
1720d
|
15/28 |
1561d |
832707021666
bonding: fix a potential double-unregister
|
general protection fault in vsock_poll
net
virt
|
syz |
done |
|
15 |
1606d |
1618d
|
15/28 |
1561d |
1980c0584483
vsock: fix potential null pointer dereference in vsock_poll()
|
KMSAN: uninit-value in geneve_xmit
net
|
C |
|
|
163 |
1565d |
1618d
|
15/28 |
1561d |
32818c075c54
geneve: fix an uninitialized value in geneve_changelink()
|
KASAN: wild-memory-access Read in rawv6_setsockopt
net
|
|
|
|
2 |
1603d |
1603d
|
15/28 |
1561d |
519a8a6cf91d
net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
|
KASAN: use-after-free Read in __xfrm6_tunnel_spi_lookup
net
|
C |
error |
|
12 |
1620d |
1624d
|
15/28 |
1561d |
8b404f46dd6a
xfrm: interface: not xfrmi_ipv6/ipip_handler twice
|
INFO: trying to register non-static key in red_destroy
net
|
C |
error |
|
318 |
1613d |
1635d
|
15/28 |
1561d |
608b4adab178
net_sched: initialize timer earlier in red_init()
|
KASAN: wild-memory-access Read in ip_setsockopt
net
|
C |
|
|
2 |
1596d |
1596d
|
15/28 |
1561d |
519a8a6cf91d
net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
|
WARNING: suspicious RCU usage in bond_ipsec_add_sa
net
|
|
|
|
214 |
1563d |
1634d
|
15/28 |
1561d |
f548a476268d
bonding: don't need RTNL for ipsec helpers
|
possible deadlock in dev_mc_unsync
net
|
C |
error |
done |
78 |
1628d |
1644d
|
15/28 |
1590d |
be74294ffa24
net: get rid of lockdep_set_class_and_subclass()
|
WARNING: locking bug in try_to_grab_pending
net
|
syz |
error |
done |
1 |
1680d |
2142d
|
15/28 |
1591d |
1378817486d6
tipc: block BH before using dst_cache
|
general protection fault in qrtr_endpoint_post
arm-msm
net
|
C |
done |
done |
54 |
1628d |
1646d
|
15/28 |
1597d |
8ff41cc21714
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
|
WARNING in xfrm_policy_insert
net
|
C |
inconclusive |
done |
6 |
1654d |
2507d
|
15/28 |
1611d |
ed17b8d377ea
xfrm: fix a warning in xfrm_policy_insert_list
|
KASAN: use-after-free Read in sock_def_write_space
arm-msm
net
|
C |
done |
|
67 |
1620d |
1985d
|
15/28 |
1620d |
a9b111016235
llc: make sure applications use ARPHRD_ETHER
|
KASAN: slab-out-of-bounds Read in qrtr_endpoint_post
arm-msm
net
|
C |
|
|
8 |
1642d |
1643d
|
15/28 |
1620d |
8ff41cc21714
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
|
memory leak in qdisc_create_dflt
net
|
C |
|
|
1 |
1639d |
1635d
|
15/28 |
1620d |
306381aec7c2
net_sched: fix a memory leak in atm_tc_init()
|
WARNING in hsr_dev_finalize
net
|
C |
error |
|
1546 |
1628d |
1643d
|
15/28 |
1620d |
ccfc9df1352b
hsr: fix interface leak in error path of hsr_dev_finalize()
|
kernel BUG at net/l2tp/l2tp_core.c:LINE!
net
|
C |
|
|
10 |
1645d |
1640d
|
15/28 |
1620d |
c9a368f1c0fb
bpf: net: Avoid incorrect bpf_sk_reuseport_detach call
|
possible deadlock in dev_uc_sync_multiple (2)
net
|
|
|
|
26 |
1630d |
1641d
|
15/28 |
1620d |
be74294ffa24
net: get rid of lockdep_set_class_and_subclass()
|
KASAN: use-after-free Read in devlink_get_from_attrs
net
|
C |
|
|
25 |
1628d |
1641d
|
15/28 |
1620d |
bf64ff4c2aac
genetlink: get rid of family->attrbuf
|
KASAN: use-after-free Read in ip_icmp_error
net
|
C |
done |
|
14 |
1674d |
1675d
|
15/28 |
1622d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
KASAN: slab-out-of-bounds Read in ip_icmp_error
net
|
C |
done |
|
13 |
1674d |
1675d
|
15/28 |
1622d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
WARNING: proc registration bug in snmp6_register_dev
net
|
C |
done |
|
14 |
1650d |
1716d
|
15/28 |
1622d |
de0083c7ed7d
hsr: avoid to create proc file after unregister
|
KASAN: use-after-free Read in inet_diag_bc_sk
net
|
C |
done |
|
30 |
1698d |
1700d
|
15/28 |
1622d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
linux-next boot error: WARNING: suspicious RCU usage in ipmr_get_table
net
|
|
|
|
60 |
1695d |
1703d
|
15/28 |
1622d |
7013908c2db2
ipmr: Add lockdep expression to ipmr_for_each_table macro
|
BUG: unable to handle kernel NULL pointer dereference in dev_ifconf
net
|
|
|
|
1 |
1653d |
1653d
|
15/28 |
1622d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: using smp_processor_id() in preemptible [ADDR] code: /NUM
net
|
|
|
|
1 |
1680d |
1680d
|
15/28 |
1622d |
1378817486d6
tipc: block BH before using dst_cache
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (3)
net
|
|
|
|
1 |
1672d |
1672d
|
15/28 |
1622d |
d9a81a225277
l2tp: add sk_family checks to l2tp_validate_socket
|
KMSAN: uninit-value in tbf_enqueue
net
|
|
|
|
21 |
1623d |
1710d
|
15/28 |
1622d |
9274124f023b
net: stricter validation of untrusted gso packets
|
general protection fault in fq_codel_enqueue
net
|
C |
done |
|
25 |
1627d |
1712d
|
15/28 |
1622d |
9274124f023b
net: stricter validation of untrusted gso packets
|
general protection fault in put_cmsg
net
|
C |
done |
|
3 |
1688d |
1688d
|
15/28 |
1622d |
1b2f08df0a88
ipv6: set msg_control_is_user in do_ipv6_getsockopt
|
KASAN: slab-out-of-bounds Read in inet_diag_bc_sk
net
|
C |
done |
|
45 |
1698d |
1700d
|
15/28 |
1622d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
BUG: unable to handle kernel NULL pointer dereference in debug_smp_processor_id (2)
net
|
|
|
|
3 |
1645d |
1652d
|
15/28 |
1622d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: unable to handle kernel NULL pointer dereference in net_rx_queue_update_kobjects
net
|
|
|
|
1 |
1653d |
1653d
|
15/28 |
1622d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
general protection fault in erspan_validate
net
|
C |
done |
|
520 |
1688d |
1695d
|
15/28 |
1622d |
51fa960d3b51
erspan: Check IFLA_GRE_ERSPAN_VER is set.
|
general protection fault in inet_unhash
net
|
C |
done |
|
40 |
1644d |
1673d
|
15/28 |
1622d |
02c71b144c81
l2tp: do not use inet_hash()/inet_unhash()
|
linux-next boot error: WARNING: suspicious RCU usage in bpq_device_event
net
|
|
|
|
6 |
1686d |
1687d
|
15/28 |
1622d |
95f59bf88bb7
drivers: net: hamradio: Fix suspicious RCU usage warning in bpqether.c
|
KASAN: use-after-free Read in rpc_net_ns
nfs
net
|
syz |
done |
|
10 |
1688d |
1694d
|
15/28 |
1622d |
31e9a7f35352
SUNRPC: fix use-after-free in rpc_free_client_work()
|
general protection fault in skb_clone (3)
net
|
|
|
|
44 |
1673d |
1675d
|
15/28 |
1622d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
KMSAN: uninit-value in do_tcp_getsockopt
net
|
|
|
|
5 |
1635d |
1687d
|
15/28 |
1622d |
e776af608f69
net-backports: tcp: fix error recovery in tcp_zerocopy_receive()
|
linux-next test error: WARNING: suspicious RCU usage in ipmr_device_event
net
|
|
|
|
24 |
1704d |
1710d
|
15/28 |
1622d |
a14fbcd4f157
ipmr: Fix RCU list debugging warning
|
memory leak in genl_rcv_msg
net
|
C |
|
|
116 |
1658d |
1848d
|
15/28 |
1622d |
c36f05559104
genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()
|
KASAN: slab-out-of-bounds Read in fl6_update_dst
net
|
C |
done |
|
43 |
1644d |
1689d
|
15/28 |
1622d |
bb986a50421a
seg6: fix seg6_validate_srh() to avoid slab-out-of-bounds
|
general protection fault in sock_hash_free
net
bpf
|
|
|
|
1 |
1667d |
1667d
|
15/28 |
1622d |
75e68e5bf2c7
bpf, sockhash: Synchronize delete from bucket list on map free
|
KASAN: slab-out-of-bounds Read in skb_gso_transport_seglen
net
|
C |
done |
|
4 |
1692d |
1712d
|
15/28 |
1622d |
9274124f023b
net: stricter validation of untrusted gso packets
|
WARNING: locking bug in dev_mc_seq_show
net
|
C |
done |
|
3 |
1663d |
1675d
|
15/28 |
1622d |
845e0ebb4408
net: change addr_list_lock back to static key
|
general protection fault in inet_diag_bc_sk
net
|
|
|
|
12 |
1698d |
1700d
|
15/28 |
1622d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
KMSAN: uninit-value in skbprio_enqueue
net
|
syz |
|
|
11 |
1637d |
1700d
|
15/28 |
1622d |
2761121af87d
net_sched: sch_skbprio: add message validation to skbprio_change()
|
INFO: rcu detected stall in wg_packet_tx_worker
net
|
C |
done |
|
24 |
1651d |
1704d
|
15/28 |
1622d |
df4953e4e997
sch_sfq: validate silly quantum values
|
KCSAN: data-race in tcp_add_backlog / tcp_try_rmem_schedule
net
|
|
|
|
3 |
1902d |
1906d
|
15/28 |
1639d |
ebb3b78db7bf
tcp: annotate sk->sk_rcvbuf lockless reads
|
WARNING in sk_stream_kill_queues (4)
net
|
C |
done |
done |
6 |
1762d |
1766d
|
15/28 |
1639d |
b6f6118901d1
ipv6: restrict IPV6_ADDRFORM operation
|
WARNING in kfree (2)
net
|
syz |
done |
done |
1 |
1752d |
1751d
|
15/28 |
1642d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
KMSAN: uninit-value in etf_enqueue_timesortedlist
net
|
|
|
|
3 |
1693d |
1700d
|
15/28 |
1652d |
a1211bf9a777
sched: etf: do not assume all sockets are full blown
|
general protection fault in macvlan_device_event
net
|
|
|
|
86 |
1701d |
1715d
|
15/28 |
1652d |
4dee15b4fd0d
macvlan: fix null dereference in macvlan_device_event()
|
KASAN: use-after-free Read in report_sock_error
net
|
|
|
|
2 |
1705d |
1710d
|
15/28 |
1652d |
a1211bf9a777
sched: etf: do not assume all sockets are full blown
|
KASAN: use-after-free Write in tcindex_set_parms
net
|
C |
done |
|
13 |
1732d |
1751d
|
15/28 |
1691d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
KASAN: use-after-free Read in tcindex_dump
net
|
syz |
|
|
1 |
1754d |
1751d
|
15/28 |
1691d |
b1be2e8cd290
net_sched: hold rtnl lock in tcindex_partial_destroy_work()
|
general protection fault in macsec_upd_offload
net
|
C |
done |
|
5 |
1729d |
1728d
|
15/28 |
1691d |
aa81700cf232
macsec: fix NULL dereference in macsec_upd_offload()
|
general protection fault in hfsc_unbind_tcf
net
|
|
|
|
1 |
1743d |
1739d
|
15/28 |
1691d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING in geneve_exit_batch_net (2)
net
|
C |
done |
|
9 |
1738d |
1762d
|
15/28 |
1691d |
0fda7600c2e1
geneve: move debug check after netdev unregister
|
KASAN: invalid-free in tcf_exts_destroy
net
|
C |
done |
|
1 |
1754d |
1753d
|
15/28 |
1691d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
general protection fault in do_tcp_getsockopt (2)
net
|
C |
done |
|
1 |
1743d |
1743d
|
15/28 |
1691d |
6cd6cbf593bf
net-backports: tcp: repair: fix TCP_QUEUE_SEQ implementation
|
WARNING: refcount bug in __tcf_action_put
net
|
syz |
|
|
1 |
1752d |
1751d
|
15/28 |
1691d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
general protection fault in ethnl_parse_header
net
|
C |
done |
|
9 |
1738d |
1743d
|
15/28 |
1691d |
55b474c41e58
netlink: check for null extack in cookie helpers
|
general protection fault in hsr_addr_is_self (2)
net
|
|
|
|
1 |
1742d |
1742d
|
15/28 |
1691d |
3a303cfdd28d
hsr: fix general protection fault in hsr_addr_is_self()
|
WARNING: ODEBUG bug in __init_work
net
|
syz |
done |
|
1 |
1739d |
1738d
|
15/28 |
1691d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING in call_rcu
net
|
C |
done |
|
8 |
1745d |
1752d
|
15/28 |
1691d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING: ODEBUG bug in tcf_queue_work
net
|
C |
done |
|
30 |
1757d |
1756d
|
15/28 |
1691d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
general protection fault in qdisc_hash_add
net
|
C |
done |
|
47 |
1749d |
1750d
|
15/28 |
1691d |
7c4046b1c53b
Revert "net: sched: make newly activated qdiscs visible"
|
WARNING: refcount bug in tcindex_data_put
net
|
C |
done |
|
27 |
1727d |
1728d
|
15/28 |
1691d |
a8eab6d35e22
net_sched: fix a missing refcnt in tcindex_init()
|
KASAN: use-after-free Read in route4_get
net
|
C |
|
|
8 |
1719d |
1749d
|
15/28 |
1691d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
general protection fault in erspan_netlink_parms
net
|
C |
done |
|
5 |
1746d |
1746d
|
15/28 |
1691d |
32ca98feab8c
net: ip_gre: Accept IFLA_INFO_DATA-less configuration
|
KMSAN: uninit-value in tcf_exts_change
net
|
C |
|
|
5 |
1742d |
1751d
|
15/28 |
1691d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
BUG: sleeping function called from invalid context in kmem_cache_alloc_node_trace
net
|
C |
done |
|
364 |
1752d |
1755d
|
15/28 |
1691d |
138470a9b2cc
net/sched: act_ct: fix lockdep splat in tcf_ct_flow_table_get
|
WARNING: ODEBUG bug in tcindex_destroy_work (3)
net
|
syz |
done |
|
13 |
1730d |
1766d
|
15/28 |
1691d |
304e024216a8
net_sched: add a temporary refcnt for struct tcindex_data
|
KMSAN: uninit-value in macsec_handle_frame
net
|
|
|
|
1 |
1741d |
1741d
|
15/28 |
1691d |
b06d072ccc4b
macsec: restrict to ethernet devices
|
WARNING: refcount bug in igmp_start_timer
net
|
syz |
done |
done |
19 |
1956d |
2322d
|
15/28 |
1713d |
323ebb61e32b
net: use listified RX for handling GRO_NORMAL skbs
|
possible deadlock in sch_direct_xmit
net
|
C |
done |
done |
1548 |
1857d |
2535d
|
15/28 |
1713d |
323ebb61e32b
net: use listified RX for handling GRO_NORMAL skbs
|
KASAN: use-after-free Read in alloc_netdev_mqs
net
|
|
|
|
1 |
1777d |
1777d
|
15/28 |
1715d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in __iptunnel_pull_header
net
|
C |
|
|
12 |
1747d |
1756d
|
15/28 |
1715d |
17c25cafd4d3
gre: fix uninit-value in __iptunnel_pull_header
|
KASAN: use-after-free Read in inet_gifconf
net
|
|
|
|
24 |
1769d |
1775d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ipv6_get_ifaddr
net
|
|
|
|
1 |
1773d |
1773d
|
15/28 |
1715d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KASAN: use-after-free Read in inet_lookup_ifaddr_rcu
net
|
|
|
|
2 |
1769d |
1772d
|
15/28 |
1715d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in netdev_state_change
net
|
|
|
|
2 |
1760d |
1760d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in rtnl_fill_ifinfo (2)
net
|
|
|
|
2 |
1774d |
1775d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KMSAN: uninit-value in slhc_compress
net
|
C |
|
|
3 |
1758d |
1758d
|
15/28 |
1715d |
110a40dfb708
slip: make slhc_compress() more robust against malicious packets
|
WARNING: ODEBUG bug in smc_ib_remove_dev
net
s390
|
|
|
|
52 |
1746d |
1760d
|
15/28 |
1715d |
ece0d7bd7461
net/smc: cancel event worker during device removal
|
KASAN: use-after-free Read in netdev_state_change
net
|
|
|
|
2 |
1774d |
1775d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
BUG: unable to handle kernel NULL pointer dereference in inet_release
net
|
syz |
|
|
3 |
1765d |
1766d
|
15/28 |
1715d |
b6f6118901d1
ipv6: restrict IPV6_ADDRFORM operation
|
BUG: unable to handle kernel paging request in ethnl_update_bitset32
net
|
C |
|
|
168 |
1755d |
1767d
|
15/28 |
1715d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in ipv6_chk_addr_and_flags
net
|
|
|
|
1 |
1775d |
1775d
|
15/28 |
1715d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in find_match
net
|
C |
|
|
52 |
1746d |
1775d
|
15/28 |
1715d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache
net
bpf
|
|
|
|
2 |
1786d |
1784d
|
15/28 |
1715d |
457fed775c97
net/smc: fix leak of kernel memory to user space
|
KMSAN: uninit-value in bond_alb_xmit
net
|
syz |
|
|
3 |
1756d |
1758d
|
15/28 |
1715d |
b7469e83d2ad
bonding/alb: make sure arp header is pulled before accessing it
|
general protection fault in smc_ib_remove_dev
s390
net
|
C |
done |
|
98 |
1755d |
1767d
|
15/28 |
1715d |
a2f2ef4a54c0
net/smc: check for valid ib_client_data
|
KMSAN: use-after-free in inet_gifconf
net
|
|
|
|
10 |
1746d |
1769d
|
15/28 |
1715d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in ip6_dst_destroy
net
|
C |
|
|
2 |
1748d |
1761d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
possible deadlock in inet_csk_accept
net
|
C |
done |
|
992 |
1750d |
1751d
|
15/28 |
1715d |
06669ea346e4
net: memcg: fix lockdep splat in inet_csk_accept()
|
KASAN: slab-out-of-bounds Read in ethnl_update_bitset32
net
|
syz |
|
|
2 |
1761d |
1767d
|
15/28 |
1715d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in dev_get_by_index_rcu
net
|
|
|
|
1 |
1770d |
1770d
|
15/28 |
1715d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
possible deadlock in bond_get_stats (3)
net
|
syz |
done |
|
2 |
1770d |
1770d
|
15/28 |
1715d |
b3e80d44f5b1
bonding: fix lockdep warning in bond_get_stats()
|
KMSAN: use-after-free in veth_xmit
net
|
|
|
|
8 |
1746d |
1761d
|
15/28 |
1715d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in kstrdup
net
|
C |
|
|
8 |
1752d |
1778d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ethnl_update_bitset32
net
|
C |
done |
|
6 |
1759d |
1767d
|
15/28 |
1715d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in fib_nexthop_info
net
|
|
|
|
1 |
1775d |
1775d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: slab-out-of-bounds Read in inet_gifconf
net
|
|
|
|
2 |
1775d |
1775d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ip6_dst_destroy
net
|
C |
done |
|
1 |
1775d |
1775d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in l3mdev_master_ifindex_rcu
net
|
C |
done |
done |
13 |
1771d |
1777d
|
15/28 |
1715d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
kernel panic: stack is corrupted in vhost_net_ioctl
virt
kvm
net
|
C |
done |
|
2 |
1776d |
1862d
|
15/28 |
1715d |
42d84c8490f9
vhost: Check docket sk_family instead of call getname
|
KASAN: use-after-free Read in __neigh_notify
net
|
|
|
|
2 |
1774d |
1775d
|
15/28 |
1715d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
lsm
net
|
C |
done |
|
8 |
1756d |
1766d
|
15/28 |
1715d |
dc24f8b4ecd3
mptcp: add dummy icsk_sync_mss()
|
INFO: task hung in lock_sock_nested (2)
net
|
C |
done |
|
418 |
1755d |
1768d
|
15/28 |
1715d |
3f74957fcbea
vsock: fix potential deadlock in transport->release()
|
KMSAN: use-after-free in l3mdev_master_ifindex_rcu
net
|
C |
|
|
5 |
1746d |
1769d
|
15/28 |
1715d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in dev_alloc_name_ns
net
|
|
|
|
3 |
1746d |
1760d
|
15/28 |
1715d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KASAN: use-after-free Read in mld_in_v1_mode
net
|
C |
done |
|
3 |
1774d |
1777d
|
15/28 |
1715d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
BUG: unable to handle kernel paging request in slhc_free
net
|
C |
done |
done |
177 |
2071d |
2189d
|
15/28 |
1750d |
baf76f0c58ae
slip: make slhc_free() silently accept an error pointer
|
KMSAN: uninit-value in setup_udp_tunnel_sock
net
|
C |
|
|
1 |
1801d |
1801d
|
15/28 |
1773d |
940ba1498665
net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
WARNING: lock held when returning to user space in tun_get_user (2)
net
|
|
|
|
7 |
1789d |
1800d
|
15/28 |
1773d |
1efba987c486
net-backports: tun: add mutex_unlock() call and napi.skb clearing in tun_get_user()
|
WARNING in devlink_port_type_warn
net
|
|
|
|
2340 |
1803d |
1875d
|
15/28 |
1773d |
4c582234ab39
devlink: Wait longer before warning about unset port type
|
KMSAN: uninit-value in rsvp_change
net
|
C |
|
|
4 |
1793d |
1794d
|
15/28 |
1773d |
cb3c0e6bdf64
cls_rsvp: fix rsvp_policy
|
BUG: unable to handle kernel paging request in rhashtable_replace_fast
net
|
|
|
|
2 |
1799d |
1806d
|
15/28 |
1773d |
41cdc741048b
netdevsim: fix nsim_fib6_rt_create() error path
|
general protection fault in hsr_addr_is_self
net
|
|
|
|
3 |
1774d |
1790d
|
15/28 |
1773d |
2b5b8251bc9f
net: hsr: fix possible NULL deref in hsr_handle_frame()
|
INFO: rcu detected stall in addrconf_rs_timer (3)
net
|
C |
inconclusive |
done |
81 |
1833d |
1829d
|
15/28 |
1773d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (2)
net
|
C |
done |
|
8 |
1799d |
1801d
|
15/28 |
1773d |
940ba1498665
net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
BUG: sleeping function called from invalid context in lock_sock_nested
bpf
net
|
C |
|
|
1232 |
1773d |
1848d
|
15/28 |
1773d |
37f96694cf73
crypto: af_alg - Use bh_lock_sock in sk_destruct
|
memory leak in vlan_dev_set_egress_priority
net
|
C |
|
|
1 |
1815d |
1815d
|
15/28 |
1773d |
9bbd917e0bec
vlan: fix memory leak in vlan_dev_set_egress_priority
|
WARNING in sk_psock_drop
bpf
net
|
|
|
|
157 |
1796d |
1805d
|
15/28 |
1773d |
58c8db929db1
net, sk_msg: Don't check if sock is locked when tearing down psock
|
KMSAN: uninit-value in macvlan_broadcast
net
|
C |
|
|
2 |
1815d |
1815d
|
15/28 |
1773d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
WARNING in tcp_ack
net
|
C |
done |
|
3 |
1813d |
1814d
|
15/28 |
1773d |
90d72256addf
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
memory leak in em_nbyte_change
net
|
C |
|
|
1 |
1797d |
1797d
|
15/28 |
1773d |
55cd9f67f1e4
net_sched: ematch: reject invalid TCF_EM_SIMPLE
|
KCSAN: data-race in __skb_try_recv_from_queue / unix_dgram_sendmsg
net
|
|
|
|
61 |
1788d |
1807d
|
15/28 |
1773d |
86b18aaa2b5b
skbuff: fix a data race in skb_queue_len()
|
KASAN: slab-out-of-bounds Read in macvlan_broadcast
net
|
C |
done |
|
10 |
1813d |
1816d
|
15/28 |
1773d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
KASAN: slab-out-of-bounds Read in nla_put_nohdr
net
|
C |
done |
|
1 |
1800d |
1800d
|
15/28 |
1773d |
61678d28d4a4
net_sched: fix datalen for ematch
|
WARNING: bad unlock balance in release_sock
net
|
|
|
|
1 |
1814d |
1814d
|
15/28 |
1773d |
90d72256addf
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
KASAN: use-after-free Read in tcp_fastretrans_alert
net
|
C |
done |
|
1 |
1804d |
1804d
|
15/28 |
1773d |
2bec445f9bf3
net-backports: tcp: do not leave dangling pointers in tp->highest_sack
|
BUG: unable to handle kernel paging request in rhashtable_jhash2
net
|
C |
done |
|
6 |
1805d |
1806d
|
15/28 |
1773d |
41cdc741048b
netdevsim: fix nsim_fib6_rt_create() error path
|
memory leak in tcf_ctinfo_init
net
|
C |
|
|
2 |
1802d |
1803d
|
15/28 |
1773d |
09d4f10a5e78
net: sched: act_ctinfo: fix memory leak
|
KASAN: slab-out-of-bounds Read in __nla_put_nohdr
net
|
C |
done |
|
4 |
1800d |
1800d
|
15/28 |
1773d |
61678d28d4a4
net_sched: fix datalen for ematch
|
INFO: rcu detected stall in br_handle_frame (2)
net
|
C |
done |
|
2 |
1833d |
1829d
|
15/28 |
1773d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
INFO: rcu detected stall in netlink_sendmsg (3)
net
|
C |
done |
|
6 |
1780d |
1833d
|
15/28 |
1773d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
WARNING in cbq_destroy_class
net
|
C |
done |
|
7 |
1778d |
1800d
|
15/28 |
1773d |
2e24cd755552
net_sched: fix ops->bind_class() implementations
|
WARNING in cbq_destroy
net
|
C |
done |
|
1 |
1800d |
1800d
|
15/28 |
1773d |
2e24cd755552
net_sched: fix ops->bind_class() implementations
|
KASAN: use-after-free Read in tcp_check_sack_reordering
net
|
C |
done |
|
2 |
1795d |
1804d
|
15/28 |
1773d |
2bec445f9bf3
net-backports: tcp: do not leave dangling pointers in tp->highest_sack
|
KASAN: use-after-free Read in macvlan_broadcast
net
|
C |
done |
|
12 |
1813d |
1816d
|
15/28 |
1773d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
WARNING: bad unlock balance in gtp_encap_enable_socket
net
|
C |
done |
|
8 |
1812d |
1816d
|
15/28 |
1773d |
90d72256addf
net-backports: gtp: fix bad unlock balance in gtp_encap_enable_socket
|
WARNING: bad unlock balance in sch_direct_xmit
net
|
C |
done |
|
35 |
1803d |
1850d
|
15/28 |
1773d |
53d374979ef1
net: avoid updating qdisc_xmit_lock_key in netdev_update_lockdep_key()
|
general protection fault in inet6_set_link_af
net
|
C |
done |
|
8 |
1782d |
1786d
|
15/28 |
1773d |
db3fa271022d
ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
|
general protection fault in tcf_ife_cleanup
net
|
C |
done |
|
111 |
1787d |
1811d
|
15/28 |
1773d |
44c23d71599f
net/sched: act_ife: initalize ife->metalist earlier
|
KASAN: use-after-free Write in __alloc_skb (2)
net
|
C |
done |
|
7 |
1823d |
1840d
|
15/28 |
1773d |
d836f5c69d87
net-backports: net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
|
WARNING in geneve_exit_batch_net
net
|
|
|
|
15 |
1773d |
1798d
|
15/28 |
1773d |
760d228e322e
net_sched: walk through all child classes in tc_bind_tclass()
|
KASAN: slab-out-of-bounds Read in tcf_exts_destroy
net
|
C |
done |
error |
8 |
1895d |
1798d
|
15/28 |
1773d |
599be01ee567
net_sched: fix an OOB access in cls_tcindex
|
WARNING: ODEBUG bug in tcindex_destroy_work (2)
net
|
|
|
|
5 |
1778d |
1788d
|
15/28 |
1773d |
599be01ee567
net_sched: fix an OOB access in cls_tcindex
|
inconsistent lock state in rxrpc_put_client_connection_id
net
afs
|
C |
done |
|
473 |
1781d |
1787d
|
15/28 |
1773d |
963485d436cc
rxrpc: Fix call RCU cleanup using non-bh-safe locks
|
KASAN: null-ptr-deref Read in tcf_generic_walker
net
|
C |
done |
|
6 |
1776d |
1795d
|
15/28 |
1773d |
760d228e322e
net_sched: walk through all child classes in tc_bind_tclass()
|
WARNING in tcp_enter_loss (2)
net
|
C |
done |
unreliable |
4 |
2430d |
2481d
|
15/28 |
1773d |
16ae6aa17052
tcp: ignore Fast Open on repair mode
|
KMSAN: uninit-value in bond_neigh_setup
net
|
|
|
|
64 |
1822d |
1845d
|
15/28 |
1777d |
f394722fb0d0
net-backports: neighbour: remove neigh_cleanup() method
|
KASAN: slab-out-of-bounds Read in hsr_debugfs_rename
net
|
C |
done |
|
18 |
1816d |
1825d
|
15/28 |
1777d |
04b69426d846
hsr: fix slab-out-of-bounds Read in hsr_debugfs_rename()
|
WARNING: refcount bug in smc_release (2)
net
s390
|
C |
done |
|
9 |
1835d |
1858d
|
15/28 |
1777d |
86434744fedf
net/smc: add fallback check to connect()
|
BUG: corrupted list in hsr_add_node
net
|
|
|
|
1 |
1879d |
1878d
|
15/28 |
1777d |
92a35678ec07
hsr: fix a race condition in node list insertion and deletion
|
kernel BUG at include/linux/mm.h:LINE! (5)
net
|
C |
done |
done |
129 |
2053d |
2123d
|
15/28 |
1814d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
KASAN: slab-out-of-bounds Read in bpf_prog_create
bpf
net
|
C |
done |
|
447 |
1845d |
1926d
|
15/28 |
1814d |
0033b34a03ec
ppp: fix out-of-bounds access in bpf_prog_create()
|
memory leak in register_netdevice
net
|
C |
|
|
19 |
1845d |
1850d
|
15/28 |
1814d |
42c17fa69f98
net: fix a leak in register_netdevice()
|
KCSAN: data-race in mod_timer / run_timer_softirq
net
|
|
|
|
4 |
1831d |
1896d
|
15/28 |
1814d |
56144737e673
net-backports: hrtimer: Annotate lockless access to timer->state
|
WARNING: refcount bug in skb_set_owner_w
net
|
C |
done |
|
2 |
1851d |
1851d
|
15/28 |
1814d |
501a90c94510
net-backports: inet: protect against too small mtu values.
|
KMSAN: use-after-free in netlink_recvmsg
net
|
C |
|
|
1 |
1870d |
1870d
|
15/28 |
1840d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
KMSAN: use-after-free in __skb_try_recv_from_queue
net
|
C |
|
|
4 |
1869d |
1893d
|
15/28 |
1840d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in ip_sublist_rcv
net
|
C |
done |
|
287 |
1883d |
1893d
|
15/28 |
1840d |
51210ad5a558
inet: do not call sublist_rcv on empty list
|
kernel BUG at include/linux/scatterlist.h:LINE!
net
|
C |
done |
|
307 |
1851d |
2045d
|
15/28 |
1840d |
d10523d0b3d7
net/tls: free the record on encryption error
|
KCSAN: data-race in __ip4_datagram_connect / raw_bind
net
|
|
|
|
1 |
1888d |
1888d
|
15/28 |
1840d |
25c7a6d1f90e
net: avoid potential false sharing in neighbor related code
|
KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit
net
|
|
|
|
40 |
1841d |
1890d
|
15/28 |
1840d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
general protection fault in ip6_sublist_rcv
net
|
C |
done |
|
327 |
1883d |
1885d
|
15/28 |
1840d |
51210ad5a558
inet: do not call sublist_rcv on empty list
|
KCSAN: data-race in inet_putpeer / inet_putpeer
net
|
|
|
|
20 |
1873d |
1890d
|
15/28 |
1840d |
71685eb4ce80
inetpeer: fix data-race in inet_putpeer / inet_putpeer
|
KCSAN: data-race in eth_header_cache / neigh_resolve_output
net
|
|
|
|
1 |
1878d |
1877d
|
15/28 |
1840d |
c305c6ae79e2
net-backports: net: add annotations on hh->hh_len lockless accesses
|
KMSAN: use-after-free in sk_forced_mem_schedule
net
|
|
|
|
2 |
1863d |
1871d
|
15/28 |
1840d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in devlink_get_from_attrs
net
|
C |
|
|
7 |
1907d |
1906d
|
15/28 |
1840d |
82a843de41d4
net: devlink: fix reporter dump dumpit
|
general protection fault in vti6_ioctl
net
|
|
|
|
1 |
1898d |
1898d
|
15/28 |
1840d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in tun_get_user / tun_net_get_stats64
net
|
|
|
|
1 |
1885d |
1885d
|
15/28 |
1840d |
de7d5084d827
net-backports: net: provide dev_lstats_read() helper
|
KCSAN: data-race in sk_wait_data / tcp_queue_rcv
net
|
|
|
|
4 |
1880d |
1877d
|
15/28 |
1840d |
f8cc62ca3e66
net: add a READ_ONCE() in skb_peek_tail()
|
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg (2)
net
|
|
|
|
47 |
1840d |
1877d
|
15/28 |
1840d |
9ed498c6280a
net-backports: net: silence data-races on sk_backlog.tail
|
KCSAN: data-race in sk_wait_data / skb_queue_tail
net
|
|
|
|
3 |
1888d |
1889d
|
15/28 |
1840d |
f8cc62ca3e66
net-backports: net: add a READ_ONCE() in skb_peek_tail()
|
general protection fault in veth_get_stats64
net
|
C |
done |
|
2 |
1912d |
1911d
|
15/28 |
1840d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in icmp_global_allow / icmp_global_allow
net
|
|
|
|
29 |
1840d |
1891d
|
15/28 |
1840d |
bbab7ef23503
net-backports: net: icmp: fix data-race in cmp_global_allow()
|
KCSAN: data-race in __dev_queue_xmit / pfifo_fast_dequeue
net
|
|
|
|
6 |
1854d |
1891d
|
15/28 |
1840d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
KCSAN: data-race in tcp_chrono_stop / tcp_recvmsg
net
|
|
|
|
3 |
1875d |
1877d
|
15/28 |
1840d |
a5a7daa52edb
net-backports: tcp: fix data-race in tcp_recvmsg()
|
KCSAN: data-race in gro_normal_list.part.0 / napi_busy_loop
net
|
|
|
|
1 |
1873d |
1873d
|
15/28 |
1840d |
c39e342a050a
net-backports: tun: fix data-race in gro_normal_list()
|
KASAN: use-after-free Read in slip_open
net
|
C |
done |
|
3 |
1859d |
1860d
|
15/28 |
1840d |
e58c19124189
slip: Fix use-after-free Read in slip_open
|
KCSAN: data-race in fanout_demux_rollover / fanout_demux_rollover
net
|
|
|
|
1 |
1875d |
1875d
|
15/28 |
1840d |
b756ad928d98
net-backports: packet: fix data-race in fanout_flow_is_huge()
|
WARNING in __rtnl_newlink
net
|
C |
done |
|
2 |
1910d |
1910d
|
15/28 |
1840d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
WARNING: ODEBUG bug in free_netdev
net
|
C |
done |
|
2 |
1909d |
1909d
|
15/28 |
1840d |
11fc7d5a0a2d
tun: fix memory leak in error path
|
general protection fault in ip6_tnl_ioctl
net
|
C |
done |
|
7 |
1900d |
1911d
|
15/28 |
1840d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in __dev_queue_xmit / net_tx_action
net
|
|
|
|
1 |
1875d |
1875d
|
15/28 |
1840d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
KMSAN: use-after-free in copyout
net
|
C |
|
|
1 |
1905d |
1905d
|
15/28 |
1840d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in virtio_transport_release
net
|
C |
done |
|
7 |
1862d |
1864d
|
15/28 |
1840d |
039fcccaed33
vsock: avoid to assign transport if its initialization fails
|
WARNING in smc_unhash_sk (3)
net
s390
|
C |
done |
|
362 |
1857d |
1947d
|
14/28 |
1854d |
8204df72bea1
net/smc: fix fastopen for non-blocking connect()
|
memory leak in smc_create
net
s390
|
C |
|
|
19 |
1866d |
1879d
|
14/28 |
1854d |
6d6dd528d5af
net/smc: fix refcount non-blocking connect() -part 2
|
KCSAN: data-race in neigh_resolve_output / neigh_resolve_output
net
|
|
|
|
4 |
1875d |
1889d
|
14/28 |
1854d |
1b53d64435d5
net-backports: net: fix data-race in neigh_event_send()
|
KCSAN: data-race in find_match / find_match
net
|
|
|
|
2 |
1876d |
1880d
|
14/28 |
1854d |
1bef4c223b85
net-backports: ipv6: fixes rt6_probe() and fib6_nh->last_probe init
|
BUG: spinlock recursion in release_sock
net
|
C |
done |
|
116 |
1981d |
1981d
|
13/28 |
1856d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
KMSAN: use-after-free in rxrpc_put_peer
afs
net
|
|
|
|
1 |
1897d |
1897d
|
13/28 |
1856d |
91fcfbe8852e
rxrpc: Fix call crypto state cleanup
|
WARNING in sk_stream_kill_queues (3)
net
|
C |
done |
|
622 |
2027d |
2387d
|
13/28 |
1856d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
KCSAN: data-race in udp_set_dev_scratch / udpv6_recvmsg
net
|
|
|
|
5 |
1879d |
1890d
|
13/28 |
1860d |
a793183caa9a
udp: fix data-race in udp_set_dev_scratch()
|
KCSAN: data-race in __skb_wait_for_more_packets / skb_queue_tail
net
|
|
|
|
1 |
1883d |
1883d
|
13/28 |
1860d |
7c422d0ce975
net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
WARNING: refcount bug in smc_release
net
s390
|
C |
done |
|
8 |
1867d |
1890d
|
13/28 |
1860d |
301428ea3708
net/smc: fix refcounting for non-blocking connect()
|
INFO: trying to register non-static key in bond_3ad_update_lacp_rate
net
|
C |
done |
|
26 |
1883d |
1885d
|
13/28 |
1860d |
ad9bd8daf2f9
bonding: fix using uninitialized mode_lock
|
KCSAN: data-race in datagram_poll / skb_queue_tail
net
|
|
|
|
5 |
1879d |
1889d
|
13/28 |
1860d |
3ef7cf57c72f
net-backports: net: use skb_queue_empty_lockless() in poll() handlers
|
general protection fault in process_one_work
net
|
|
|
|
2 |
1885d |
1885d
|
13/28 |
1860d |
6d6f0383b697
netdevsim: Fix use-after-free during device dismantle
|
KCSAN: data-race in udp6_lib_lookup2 / udpv6_queue_rcv_one_skb
net
|
|
|
|
1 |
1890d |
1890d
|
13/28 |
1860d |
7170a977743b
net: annotate accesses to sk->sk_incoming_cpu
|
KCSAN: data-race in tcp_v4_rcv / tcp_v4_rcv
net
|
|
|
|
4 |
1879d |
1884d
|
13/28 |
1860d |
7170a977743b
net-backports: net: annotate accesses to sk->sk_incoming_cpu
|
KCSAN: data-race in __skb_recv_udp / __udp_enqueue_schedule_skb
net
|
|
|
|
7 |
1879d |
1891d
|
13/28 |
1860d |
137a0dbe3426
net-backports: udp: use skb_queue_empty_lockless()
|
KCSAN: data-race in first_packet_length / udp_poll
net
|
|
|
|
2 |
1882d |
1889d
|
13/28 |
1860d |
137a0dbe3426
net-backports: udp: use skb_queue_empty_lockless()
|
INFO: trying to register non-static key in bond_3ad_update_ad_actor_settings
net
|
C |
done |
|
69 |
1883d |
1885d
|
13/28 |
1860d |
ad9bd8daf2f9
bonding: fix using uninitialized mode_lock
|
KCSAN: data-race in __skb_wait_for_more_packets / __sock_queue_rcv_skb
net
|
|
|
|
10 |
1879d |
1890d
|
13/28 |
1860d |
7c422d0ce975
net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
KCSAN: data-race in udpv6_queue_rcv_one_skb / udpv6_queue_rcv_one_skb
net
|
|
|
|
1 |
1887d |
1886d
|
13/28 |
1860d |
ee8d153d46a3
net-backports: net: annotate lockless accesses to sk->sk_napi_id
|
KCSAN: data-race in __skb_recv_udp / datagram_poll
net
|
|
|
|
1 |
1880d |
1880d
|
13/28 |
1860d |
3f926af3f4d6
net: use skb_queue_empty_lockless() in busy poll contexts
|
KCSAN: data-race in __skb_wait_for_more_packets / __udp_enqueue_schedule_skb
net
|
|
|
|
2 |
1883d |
1890d
|
13/28 |
1860d |
7c422d0ce975
net-backports: net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
BUG: MAX_LOCK_DEPTH too low! (2)
net
|
C |
|
done |
5 |
2358d |
2388d
|
13/28 |
1872d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
inconsistent lock state in ila_xlat_nl_cmd_del_mapping
net
|
C |
|
unreliable |
2496 |
2320d |
2326d
|
13/28 |
1872d |
7494de0454af
mfd: da9063: Replace regmap_add_irq_chip with devm counterpart
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (5)
net
|
C |
|
done |
654 |
2158d |
2460d
|
13/28 |
1872d |
32bf94fb5c2e
xfrm: validate template mode
|
KASAN: use-after-free Read in _decode_session4
net
|
C |
|
done |
3 |
2463d |
2462d
|
13/28 |
1872d |
c6741fbed6dc
vti6: Properly adjust vti6 MTU from MTU of lower device
|
general protection fault in tcp_cleanup_ulp
net
|
syz |
done |
done |
6 |
2287d |
2303d
|
13/28 |
1872d |
5607fff30363
bpf: sockmap only allow ESTABLISHED sock state
|
general protection fault in tcp_splice_read
net
|
C |
done |
done |
23 |
2088d |
2198d
|
13/28 |
1873d |
07603b230895
net/smc: propagate file from SMC to TCP socket
|
kernel BUG at net/ipv4/ip_output.c:LINE!
net
|
C |
|
done |
28225 |
2167d |
2358d
|
13/28 |
1875d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
suspicious RCU usage at ./include/net/inet_sock.h:LINE
net
|
C |
|
done |
171 |
2517d |
2608d
|
13/28 |
1875d |
3f32d0be6c16
tipc: lock wakeup & inputq at tipc_link_reset()
|
KASAN: use-after-free Read in _decode_session6
net
|
C |
|
done |
4 |
2235d |
2303d
|
13/28 |
1875d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
KCSAN: data-race in sk_stream_wait_memory / tcp_shifted_skb
net
|
|
|
|
1 |
1889d |
1877d
|
13/28 |
1876d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in sk_stream_wait_memory / tcp_fragment
net
|
|
|
|
1 |
1880d |
1877d
|
13/28 |
1876d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in tcp_sendmsg_locked / tcp_stream_memory_free
net
|
|
|
|
2 |
1888d |
1877d
|
13/28 |
1876d |
0f31746452e6
tcp: annotate tp->write_seq lockless reads
|
KCSAN: data-race in tcp_event_new_data_sent / tcp_stream_memory_free
net
|
|
|
|
3 |
1880d |
1877d
|
13/28 |
1876d |
e0d694d638db
tcp: annotate tp->snd_nxt lockless reads
|
KCSAN: data-race in tcp_ack / tcp_poll (2)
net
|
|
|
|
5 |
1884d |
1877d
|
13/28 |
1876d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in sk_stream_wait_memory / tcp_ack
net
|
|
|
|
2 |
1881d |
1877d
|
13/28 |
1876d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in tcp_add_backlog / tcp_rcv_space_adjust (2)
net
|
|
|
|
18 |
1891d |
1897d
|
13/28 |
1879d |
ebb3b78db7bf
tcp: annotate sk->sk_rcvbuf lockless reads
|
BUG: unable to handle kernel NULL pointer dereference in xsk_poll
bpf
net
|
C |
done |
|
10 |
1896d |
1914d
|
13/28 |
1879d |
df551058f7a3
xsk: Fix crash in poll when device does not support ndo_xsk_wakeup
|
KASAN: use-after-free Read in rxrpc_release_call
afs
net
|
syz |
done |
|
13 |
1896d |
1952d
|
13/28 |
1879d |
91fcfbe8852e
rxrpc: Fix call crypto state cleanup
|
KASAN: use-after-free Read in rxrpc_send_keepalive
afs
net
|
C |
error |
|
694 |
1893d |
1965d
|
13/28 |
1879d |
c48fc11b69e9
rxrpc: Fix call ref leak
|
KCSAN: data-race in __tcp_select_window / tcp_add_backlog
net
|
|
|
|
23502 |
1879d |
1909d
|
13/28 |
1879d |
70c2655849a2
net: silence KCSAN warnings about sk->sk_backlog.len reads
|
memory leak in llc_ui_sendmsg
net
|
C |
|
|
125 |
1894d |
2046d
|
13/28 |
1879d |
c6ee11c39fcc
llc: fix sk_buff leak in llc_sap_state_process()
|
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg
net
|
|
|
|
17719 |
1879d |
1909d
|
13/28 |
1879d |
8265792bf887
net-backports: net: silence KCSAN warnings around sk_add_backlog() calls
|
INFO: task hung in addrconf_verify_work (2)
net
|
C |
|
|
22 |
1900d |
1900d
|
13/28 |
1879d |
39f13ea2f61b
net: avoid potential infinite loop in tc_ctl_action()
|
KCSAN: data-race in tcp_poll / tcp_recvmsg (2)
net
|
|
|
|
22 |
1892d |
1897d
|
13/28 |
1879d |
7db48e983930
tcp: annotate tp->copied_seq lockless reads
|
KASAN: use-after-free Read in rxrpc_put_peer
afs
net
|
C |
error |
|
38 |
1894d |
1946d
|
13/28 |
1879d |
55f6c98e3674
rxrpc: Fix trace-after-put looking at the put peer record
9ebeddef58c4
rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record
|
KCSAN: data-race in tcp_poll / tcp_queue_rcv
net
|
|
|
|
1897 |
1879d |
1909d
|
13/28 |
1879d |
dba7d9b8c739
net-backports: tcp: annotate tp->rcv_nxt lockless reads
|
memory leak in llc_conn_ac_send_sabme_cmd_p_set_x
net
|
C |
|
|
225 |
1894d |
2046d
|
13/28 |
1879d |
b74555de21ac
llc: fix sk_buff leak in llc_conn_service()
|
general protection fault in rxrpc_error_report
afs
net
|
C |
done |
|
6 |
1894d |
1906d
|
13/28 |
1879d |
f0308fb07080
rxrpc: Fix possible NULL pointer access in ICMP handling
|
KCSAN: data-race in tcp_add_backlog / tcp_grow_window.isra.0
net
|
|
|
|
21713 |
1879d |
1909d
|
13/28 |
1879d |
70c2655849a2
net-backports: net: silence KCSAN warnings about sk->sk_backlog.len reads
|
WARNING: suspicious RCU usage in xfrm_alloc_userspi
net
|
C |
done |
error |
86 |
2107d |
2109d
|
13/28 |
1879d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
general protection fault in get_work_pool
net
|
C |
|
done |
24 |
2087d |
2490d
|
13/28 |
1879d |
07bf7908950a
xfrm: Validate address prefix lengths in the xfrm selector.
|
general protection fault in xfrm_init_replay
net
|
syz |
inconclusive |
done |
2 |
2477d |
2476d
|
13/28 |
1879d |
d97ca5d714a5
xfrm_user: uncoditionally validate esn replay attribute struct
|
WARNING: suspicious RCU usage in xfrm_get_spdinfo
net
|
C |
done |
error |
46 |
2107d |
2109d
|
13/28 |
1879d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
WARNING: suspicious RCU usage in xfrm_get_sadinfo
net
|
C |
done |
error |
28 |
2107d |
2109d
|
13/28 |
1879d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
WARNING: suspicious RCU usage in xfrm_get_policy
net
|
syz |
done |
error |
8 |
2108d |
2109d
|
13/28 |
1879d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
INFO: rcu detected stall in rt6_probe_deferred
net
|
|
|
|
336 |
1928d |
1933d
|
13/28 |
1893d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in addrconf_rs_timer (2)
net
|
|
|
|
362 |
1911d |
1933d
|
13/28 |
1893d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
divide error in tabledist
net
|
|
|
|
3 |
1916d |
1925d
|
13/28 |
1898d |
b41d936b5ecf
sch_netem: fix a divide by zero in tabledist()
|
BUG: using smp_processor_id() in preemptible [ADDR] code: mime_typevmnet0/NUM
net
|
|
|
|
1 |
1942d |
1940d
|
13/28 |
1898d |
00d9e47f8ec2
posix-cpu-timers: Always clear head pointer on dequeue
|
KMSAN: uninit-value in inet_ehash_insert
net
|
C |
|
|
7 |
1907d |
1914d
|
13/28 |
1898d |
6af1799aaf3f
net-backports: ipv6: drop incoming packets having a v4mapped source address
|
general protection fault in xsk_poll
bpf
net
|
C |
done |
|
430 |
1928d |
1955d
|
13/28 |
1898d |
42fddcc7c64b
xsk: use state member for socket synchronization
|
BUG: sleeping function called from invalid context in tcf_chain0_head_change_cb_del
net
|
C |
done |
|
187 |
1914d |
1927d
|
13/28 |
1898d |
e3ae1f96accd
net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
|
BUG: corrupted list in __netif_receive_skb_list_core
net
|
|
|
|
3 |
1906d |
1960d
|
13/28 |
1898d |
c7a42eb49212
net: ipv6: fix listify ip6_rcv_finish in case of forwarding
|
KASAN: slab-out-of-bounds Read in do_tcp_getsockopt
net
|
|
|
|
3 |
1922d |
1941d
|
13/28 |
1898d |
3afb09618840
tcp: fix slab-out-of-bounds in tcp_zerocopy_receive()
|
INFO: rcu detected stall in pie_timer
net
|
C |
|
|
19 |
1899d |
1934d
|
13/28 |
1898d |
4ce70b4aed57
net-backports: net: sched: sch_htb: don't call qdisc_put() while holding tree lock
|
KASAN: use-after-free Read in cbq_enqueue
net
|
C |
done |
|
4 |
1907d |
1908d
|
13/28 |
1898d |
e9789c7cc182
sch_cbq: validate TCA_CBQ_WRROPT to avoid crash
|
general protection fault in dsmark_init
net
|
C |
done |
|
3 |
1907d |
1910d
|
13/28 |
1898d |
474f0813a300
sch_dsmark: fix potential NULL deref in dsmark_init()
|
possible deadlock in pie_timer
net
|
C |
done |
|
2 |
1915d |
1916d
|
13/28 |
1898d |
e3ae1f96accd
net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
|
general protection fault in tcf_action_destroy
net
|
|
|
|
128 |
1915d |
1933d
|
13/28 |
1898d |
3d66b89c30f9
net: sched: fix possible crash in tcf_action_destroy()
|
general protection fault in dev_map_hash_update_elem
bpf
net
|
C |
done |
|
4 |
1932d |
1938d
|
13/28 |
1898d |
af58e7ee6a8d
xdp: Fix race in dev_map_hash_update_elem() when replacing element
|
INFO: rcu detected stall in sys_sendmmsg
net
|
|
|
|
2 |
1934d |
1934d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in pppoe_sendmsg
net
|
|
|
|
7 |
1929d |
1936d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
WARNING in xfrm_policy_inexact_list_reinsert
net
|
|
|
|
2 |
1939d |
1967d
|
13/28 |
1905d |
769a807d0b41
xfrm: policy: avoid warning splat when merging nodes
|
INFO: rcu detected stall in sys_sendmsg
net
|
C |
done |
|
2 |
1930d |
1930d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in br_hello_timer_expired
net
|
|
|
|
4 |
1928d |
1933d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in inet_release
net
|
|
|
|
1 |
1937d |
1937d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in packet_sendmsg
net
|
|
|
|
10 |
1929d |
1935d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
general protection fault in addrconf_f6i_alloc
net
|
C |
|
|
305 |
1928d |
1939d
|
13/28 |
1905d |
8652f17c658d
ipv6: addrconf_f6i_alloc - fix non-null pointer check to !IS_ERR()
|
INFO: rcu detected stall in dccp_write_timer
net
|
|
|
|
5 |
1934d |
1937d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
general protection fault in tls_sk_proto_close (2)
net
|
syz |
error |
|
246 |
1928d |
1947d
|
13/28 |
1905d |
44580a0118d3
net: sock_map, fix missing ulp check in sock hash case
|
INFO: rcu detected stall in neigh_timer_handler (2)
net
|
|
|
|
2 |
1933d |
1935d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
BUG: soft lockup in addrconf_dad_work
net
|
C |
done |
|
1 |
1932d |
1932d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in igmp_ifc_timer_expire
net
|
C |
|
|
57 |
1928d |
2187d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in mld_dad_timer_expire
net
|
|
|
|
3 |
1933d |
1934d
|
13/28 |
1905d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass
net
|
C |
done |
|
61 |
1928d |
1936d
|
13/28 |
1905d |
8b142a00edcf
net_sched: check cops->tcf_block in tc_bind_tclass()
|
general protection fault in icmpv6_xrlim_allow
net
|
|
|
|
4 |
2032d |
2038d
|
13/28 |
1906d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
general protection fault in ip6_rcv_finish
net
|
|
|
|
3 |
2022d |
2029d
|
13/28 |
1906d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
general protection fault in requeue_rx_msgs
net
|
syz |
done |
inconclusive |
1 |
2401d |
2401d
|
13/28 |
1910d |
eb7f54b90bd8
kcm: Fix use-after-free caused by clonned sockets
|
KASAN: user-memory-access Read in ip6_hold_safe (3)
net
|
|
|
|
456 |
2016d |
2035d
|
13/28 |
1910d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
WARNING in cbs_dequeue_soft
net
|
C |
done |
|
13 |
1929d |
1936d
|
12/28 |
1928d |
1c6c09a0ae62
net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate
|
general protection fault in packet_lookup_frame
net
|
C |
done |
|
7 |
1961d |
1961d
|
12/28 |
1937d |
32d3182cd2cd
net/packet: fix race in tpacket_snd()
|
memory leak in ip6_mc_add_src
net
|
C |
|
|
1 |
1948d |
1948d
|
12/28 |
1937d |
a84d01647989
mld: fix memory leak in mld_del_delrec()
|
KASAN: use-after-free Read in rxrpc_queue_local
afs
net
|
C |
done |
|
1 |
1963d |
1963d
|
12/28 |
1937d |
06d9532fa6b3
rxrpc: Fix read-after-free in rxrpc_queue_local()
|
general protection fault in tls_write_space
net
|
syz |
|
|
33 |
1955d |
1966d
|
12/28 |
1937d |
57c722e932cf
net/tls: swap sk_write_space on close
|
KMSAN: uninit-value in rtm_new_nexthop
net
|
C |
|
|
8 |
1954d |
1953d
|
12/28 |
1937d |
d00ee64e1dcf
netlink: Fix nlmsg_parse as a wrapper for strict message parsing
|
kernel BUG at net/rxrpc/local_object.c:LINE!
afs
net
|
C |
done |
|
11167 |
1941d |
2008d
|
12/28 |
1937d |
730c5fd42c1e
rxrpc: Fix local endpoint refcounting
|
KMSAN: uninit-value in rtm_dump_nexthop
net
|
C |
|
|
6 |
1948d |
1964d
|
12/28 |
1937d |
d00ee64e1dcf
netlink: Fix nlmsg_parse as a wrapper for strict message parsing
|
KASAN: slab-out-of-bounds Read in usbnet_generic_cdc_bind
net
usb
|
C |
|
|
2 |
1961d |
1963d
|
12/28 |
1937d |
54364278fb3c
USB: CDC: fix sanity checks in CDC union parser
|
BUG: corrupted list in rxrpc_local_processor
afs
net
|
C |
done |
|
1679 |
1958d |
1966d
|
12/28 |
1937d |
b00df840fb40
rxrpc: Fix local endpoint replacement
|
KASAN: use-after-free Write in __xfrm_policy_unlink (2)
net
|
|
|
|
7 |
2005d |
2051d
|
12/28 |
1942d |
b805d78d300b
xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink
|
WARNING: ODEBUG bug in tls_sw_free_resources_tx
net
|
|
|
|
23 |
1983d |
2241d
|
12/28 |
1948d |
f87e62d45e51
net/tls: remove close callback sock unlock/lock around TX work flush
|
general protection fault in tls_trim_both_msgs
net
|
C |
done |
|
36 |
1970d |
1981d
|
12/28 |
1948d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
KASAN: invalid-free in tls_sk_proto_cleanup
net
|
|
|
|
5 |
1972d |
1975d
|
12/28 |
1948d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
BUG: unable to handle kernel paging request in tls_prots
net
bpf
|
syz |
done |
|
1 |
2010d |
2010d
|
12/28 |
1948d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
KASAN: use-after-free Read in tls_wait_data
net
|
|
|
|
1 |
1973d |
1967d
|
12/28 |
1948d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
WARNING: ODEBUG bug in __sk_destruct
net
s390
|
C |
|
|
2855 |
1968d |
2433d
|
12/28 |
1948d |
f9cedf1a9b1c
net/smc: do not schedule tx_work in SMC_CLOSED state
|
general protection fault in tls_tx_records
net
|
|
|
|
1 |
1974d |
1967d
|
12/28 |
1948d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
memory leak in create_ctx
net
|
syz |
|
|
1 |
2028d |
2027d
|
12/28 |
1948d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
KASAN: use-after-free Read in tls_sk_proto_cleanup
net
|
|
|
|
9 |
1970d |
1981d
|
12/28 |
1948d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
general protection fault in tls_setsockopt
net
|
syz |
done |
|
7 |
1976d |
1989d
|
12/28 |
1948d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
KASAN: use-after-free Read in tls_push_sg
net
|
|
|
|
2 |
1976d |
2049d
|
12/28 |
1955d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
possible deadlock in xsk_notifier
bpf
net
|
C |
done |
|
495 |
1986d |
1998d
|
12/28 |
1961d |
5464c3a0e9a0
xdp: fix potential deadlock on socket mutex
|
general protection fault in send_hsr_supervision_frame
net
|
C |
done |
|
1395 |
1990d |
1998d
|
12/28 |
1970d |
311633b60406
hsr: switch ->dellink() to ->ndo_uninit()
|
memory leak in ip_mc_add_src (2)
net
|
C |
|
|
7 |
1980d |
2009d
|
12/28 |
1970d |
e5b1c6c6277d
igmp: fix memory leak in igmpv3_del_delrec()
|
general protection fault in ip6_datagram_dst_update
net
|
C |
done |
|
12 |
1993d |
1996d
|
12/28 |
1970d |
8975a3abc303
ipv6: fix potential crash in ip6_datagram_dst_update()
|
KASAN: use-after-free Read in ip_expire
net
|
|
|
|
1 |
2018d |
2018d
|
12/28 |
1970d |
d5dd88794a13
inet: fix various use-after-free in defrags units
|
KMSAN: uninit-value in bond_start_xmit (2)
net
|
C |
|
|
2309 |
1970d |
2294d
|
12/28 |
1970d |
9d1bc24b52fb
bonding: validate ip header before check IPPROTO_IGMP
|
memory leak in pfkey_xfrm_policy2msg_prep
net
|
C |
|
|
4 |
2010d |
2041d
|
12/28 |
1970d |
7c80eb1c7e2b
af_key: fix leaks in key_pol_get_resp and dump_sp.
|
KASAN: use-after-free Read in kfree_skb_list
net
|
C |
done |
|
383 |
2016d |
2035d
|
12/28 |
1970d |
b7034146756b
net: fix use-after-free in kfree_skb_list
|
memory leak in __ip6_append_data
net
|
C |
|
|
10 |
2012d |
2039d
|
12/28 |
1970d |
dc93f46bc4e0
inet: frags: fix use-after-free read in inet_frag_destroy_rcu
|
KASAN: use-after-free Write in xfrm_hash_rebuild
net
|
syz |
done |
|
8 |
2003d |
2051d
|
12/28 |
1970d |
fd709721352d
xfrm: policy: fix bydst hlist corruption on hash rebuild
|
WARNING: suspicious RCU usage in in_dev_dump_addr
net
|
C |
done |
|
107 |
2030d |
2032d
|
12/28 |
1970d |
d3e6e285fff3
net: ipv4: fix rcu lockdep splat due to wrong annotation
|
general protection fault in tcp_v6_send_reset
net
|
C |
done |
|
353 |
2025d |
2029d
|
12/28 |
1970d |
392096736a06
ipv6: tcp: fix potential NULL deref in tcp_v6_send_reset()
|
KASAN: use-after-free Read in inet_frag_destroy_rcu
net
|
C |
done |
|
61 |
2037d |
2040d
|
12/28 |
1970d |
dc93f46bc4e0
inet: frags: fix use-after-free read in inet_frag_destroy_rcu
|
KASAN: use-after-free Read in rhashtable_last_table (2)
net
|
|
|
|
1 |
2044d |
2044d
|
12/28 |
1970d |
dc93f46bc4e0
inet: frags: fix use-after-free read in inet_frag_destroy_rcu
|
general protection fault in rxrpc_connect_call
net
afs
|
C |
done |
|
15 |
2018d |
2164d
|
12/28 |
1970d |
e835ada07091
rxrpc: Fix send on a connected, but unbound socket
|
WARNING: suspicious RCU usage in fib_dump_info_fnhe
net
|
C |
done |
|
7 |
2010d |
2010d
|
12/28 |
1970d |
3b525691529b
ipv6: fix suspicious RCU usage in rt6_dump_route()
|
memory leak in hsr_create_self_node
net
|
C |
|
|
5 |
2008d |
2039d
|
12/28 |
1970d |
b9a1e627405d
hsr: implement dellink to clean up resources
|
general protection fault in call_fib6_multipath_entry_notifiers
net
|
C |
done |
|
94 |
2011d |
2017d
|
12/28 |
1970d |
9eee3b4913d7
ipv6: Error when route does not have any valid nexthops
|
memory leak in packet_set_ring
net
|
C |
|
|
2 |
2009d |
2013d
|
12/28 |
1977d |
55655e3d1197
net/packet: fix memory leak in packet_set_ring()
|
general protection fault in inet_accept
net
|
C |
|
|
131 |
2198d |
2359d
|
12/28 |
1995d |
07603b230895
net/smc: propagate file from SMC to TCP socket
|
BUG: unable to handle kernel paging request in ipv6_rcv (2)
net
|
|
|
|
18 |
2017d |
2041d
|
12/28 |
1995d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KMSAN: uninit-value in tcp_create_openreq_child
net
|
C |
|
|
4000 |
1996d |
2017d
|
12/28 |
1995d |
85f9aa7565bd
inet: clear num_timeout reqsk_alloc()
|
KASAN: slab-out-of-bounds Read in dst_dev_put
net
|
|
|
|
3 |
2129d |
2180d
|
12/28 |
1995d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KASAN: use-after-free Read in pneigh_get_next
net
|
syz |
done |
|
2 |
2020d |
2020d
|
12/28 |
1995d |
f3e92cb8e2eb
neigh: fix use-after-free read in pneigh_get_next
|
KASAN: slab-out-of-bounds Read in __fib6_drop_pcpu_from
net
|
|
|
|
1 |
2020d |
2020d
|
12/28 |
1995d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
memory leak in inet6_create
net
|
C |
|
|
2 |
2027d |
2029d
|
12/28 |
1995d |
522924b58308
net: correct udp zerocopy refcnt also when zerocopy only on append
|
general protection fault in rt_cache_valid
net
|
|
|
|
24 |
2013d |
2140d
|
12/28 |
1995d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KASAN: use-after-free Read in sprintf
net
|
syz |
done |
|
2 |
2020d |
2020d
|
12/28 |
1995d |
f3e92cb8e2eb
neigh: fix use-after-free read in pneigh_get_next
|
general protection fault in dst_dev_put (2)
net
|
C |
done |
|
442 |
2017d |
2207d
|
12/28 |
1995d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KASAN: slab-out-of-bounds Read in rt_cache_valid
net
|
|
|
|
3 |
2033d |
2032d
|
12/28 |
1995d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
BUG: unable to handle kernel paging request in dst_dev_put
net
|
|
|
|
3 |
2037d |
2180d
|
12/28 |
1995d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KASAN: use-after-free Read in rt_cache_valid
net
|
syz |
done |
|
5 |
2028d |
2143d
|
12/28 |
1995d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
memory leak in new_inode_pseudo
net
s390
|
C |
|
|
136 |
1996d |
2044d
|
12/28 |
1995d |
355e8d26f719
io_uring: fix memory leak of UNIX domain socket inode
|
memory leak in packet_setsockopt
net
|
C |
|
|
10 |
2029d |
2046d
|
12/28 |
2016d |
afa0925c6fcc
packet: unconditionally free po->rollover
|
KASAN: wild-memory-access Read in refcount_sub_and_test_checked
net
|
|
|
|
2 |
2036d |
2052d
|
12/28 |
2017d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
KASAN: use-after-free Read in ip6_fragment
net
|
|
|
|
1 |
2048d |
2048d
|
12/28 |
2017d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
BUG: unable to handle kernel NULL pointer dereference in ip6_rcv_finish
net
|
|
|
|
3 |
2024d |
2052d
|
12/28 |
2017d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
KASAN: use-after-free Write in fib6_purge_rt
net
|
|
|
|
2 |
2043d |
2050d
|
12/28 |
2017d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
KASAN: null-ptr-deref Write in fib6_purge_rt
net
|
|
|
|
18 |
2031d |
2054d
|
12/28 |
2017d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
memory leak in ip_mc_add_src
net
|
C |
|
|
14 |
2022d |
2046d
|
12/28 |
2017d |
3580d04aa674
ipv4/igmp: fix another memory leak in igmpv3_del_delrec()
|
memory leak in llc_ui_create
net
|
C |
|
|
4 |
2027d |
2040d
|
12/28 |
2017d |
8fb44d60d414
llc: fix skb leak in llc_build_and_send_ui_pkt()
|
memory leak in inet_create
net
|
C |
|
|
2 |
2031d |
2046d
|
12/28 |
2017d |
100f6d8e0990
net: correct zerocopy refcnt with udp MSG_MORE
|
KASAN: slab-out-of-bounds Write in fib6_purge_rt
net
|
|
|
|
6 |
2018d |
2054d
|
12/28 |
2017d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
KASAN: use-after-free Read in __dev_map_entry_free
bpf
net
|
C |
|
|
473 |
2100d |
2381d
|
12/28 |
2017d |
2baae3545327
bpf: devmap: fix use-after-free Read in __dev_map_entry_free
|
BUG: assuming atomic context at net/core/flow_dissector.c:LINE
net
|
syz |
|
|
19 |
2052d |
2056d
|
12/28 |
2021d |
b1c17a9a3538
flow_dissector: disable preemption around BPF calls
|
KASAN: use-after-free Read in tcp_v6_send_reset
net
|
|
|
|
1 |
2102d |
2102d
|
12/28 |
2021d |
4f661542a402
tcp: fix zerocopy and notsent_lowat issues
|
KASAN: slab-out-of-bounds Write in skb_release_data
net
|
|
|
|
1 |
2101d |
2101d
|
12/28 |
2021d |
4f661542a402
tcp: fix zerocopy and notsent_lowat issues
|
general protection fault in __handle_mm_fault
net
|
C |
error |
|
17 |
2264d |
2273d
|
12/28 |
2025d |
ff09d7ec9786
mm/memory.c: recheck page table entry with page table lock held
|
WARNING in xfrm_state_fini (2)
net
|
C |
|
|
37510 |
2064d |
2517d
|
12/28 |
2040d |
dbb2483b2a46
xfrm: clean up xfrm protocol checks
|
KMSAN: uninit-value in rtnl_stats_dump
net
|
syz |
|
|
14 |
2070d |
2085d
|
12/28 |
2040d |
69f23a09daf9
rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
|
WARNING: suspicious RCU usage in fib_compute_spec_dst
net
|
|
|
|
1 |
2084d |
2083d
|
12/28 |
2040d |
c543cb4a5f07
ipv4: ensure rcu_read_lock() in ipv4_link_failure()
|
KASAN: slab-out-of-bounds Read in skb_gro_receive (2)
net
|
C |
done |
|
5 |
2065d |
2065d
|
12/28 |
2040d |
4dd2b82d5adf
udp: fix GRO packet of death
|
KASAN: stack-out-of-bounds Write in __ip_options_echo
net
|
syz |
done |
|
8 |
2073d |
2077d
|
12/28 |
2040d |
20ff83f10f11
ipv4: add sanity checks in ipv4_link_failure()
|
KMSAN: uninit-value in rtnl_stats_get
net
|
C |
|
|
5 |
2077d |
2085d
|
12/28 |
2040d |
69f23a09daf9
rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
|
kernel BUG at net/core/net-sysfs.c:LINE!
net
|
C |
done |
|
890 |
2069d |
2105d
|
12/28 |
2040d |
8ed633b9baf9
Revert "net-sysfs: Fix memory leak in netdev_register_kobject"
|
WARNING: refcount bug in l2tp_tunnel_get
net
|
|
|
|
1 |
2067d |
2067d
|
12/28 |
2040d |
a622b40035d1
l2ip: fix possible use-after-free
|
KASAN: user-memory-access Write in fib6_purge_rt
net
|
|
|
|
6 |
2041d |
2071d
|
12/28 |
2040d |
0e2338749192
ipv6: fix races in ip6_dst_destroy()
|
INFO: task hung in vhost_net_stop_vq
kvm
net
virt
|
C |
done |
|
136 |
2080d |
2217d
|
12/28 |
2040d |
813dbeb656d6
vhost: reject zero size iova range
|
WARNING: locking bug in icmp_send
net
|
syz |
done |
|
1 |
2137d |
2136d
|
12/28 |
2057d |
9926cb5f8b0f
tipc: change to check tipc_own_id to return in tipc_net_stop
|
KMSAN: uninit-value in ip6_compressed_string
net
nfs
|
C |
|
|
9024 |
2068d |
2219d
|
12/28 |
2067d |
7c2bd9a39845
NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
|
BUG: corrupted list in rhashtable_walk_enter
net
|
syz |
error |
|
3 |
2104d |
2103d
|
12/28 |
2085d |
b5f9bd15b885
ila: Fix rhashtable walker list corruption
|
BUG: unable to handle kernel paging request in ip6_fragment
net
|
|
|
|
1 |
2100d |
2099d
|
12/28 |
2085d |
ef0efcd3bd3f
ipv6: Fix dangling pointer when ipv6 fragment
|
WARNING: lock held when returning to user space in tun_get_user
net
|
C |
done |
|
55 |
2111d |
2112d
|
12/28 |
2087d |
9180bb4f0460
tun: add a missing rcu_read_unlock() in error path
|
general protection fault in fib6_purge_rt
net
|
C |
done |
|
60 |
2088d |
2205d
|
12/28 |
2087d |
9926cb5f8b0f
tipc: change to check tipc_own_id to return in tipc_net_stop
|
KASAN: slab-out-of-bounds Read in icmp6_send
net
|
|
|
|
1 |
2114d |
2114d
|
12/28 |
2087d |
4477138fa0ae
tun: properly test for IFF_UP
|
KASAN: use-after-free Read in __icmp_send
net
|
|
|
|
1 |
2105d |
2101d
|
12/28 |
2087d |
4477138fa0ae
tun: properly test for IFF_UP
|
general protection fault in tc_ctl_chain
net
|
C |
|
|
21 |
2134d |
2142d
|
11/28 |
2100d |
af736bf071e8
net: sched: potential NULL dereference in tcf_block_find()
|
KASAN: use-after-free Read in unix_dgram_poll
net
|
syz |
|
|
2 |
2129d |
2125d
|
11/28 |
2100d |
84c4e1f89fef
aio: simplify - and fix - fget/fput for io_submit()
|
KMSAN: uninit-value in gue6_err (2)
net
|
C |
|
|
2826 |
2100d |
2122d
|
11/28 |
2100d |
5355ed6388e2
fou, fou6: avoid uninit-value in gue_err() and gue6_err()
|
kernel BUG at kernel/time/timer.c:LINE! (3)
net
|
|
|
|
1 |
2121d |
2121d
|
11/28 |
2100d |
1e027960edfa
net/hsr: fix possible crash in add_timer()
|
BUG: unable to handle kernel paging request in gro_cells_destroy (3)
net
|
|
|
|
3 |
2102d |
2118d
|
11/28 |
2100d |
2a5ff07a0eb9
gro_cells: make sure device is up in gro_cells_receive()
|
KMSAN: kernel-infoleak in move_addr_to_user (2)
net
|
C |
|
|
8 |
2101d |
2116d
|
11/28 |
2100d |
163d1c3d6f17
l2tp: fix infoleak in l2tp_ip6_recvmsg()
|
general protection fault in xsk_diag_dump
bpf
net
|
C |
|
|
5 |
2117d |
2123d
|
11/28 |
2100d |
915905f8b1d4
xsk: fix potential crash in xsk_diag_put_umem()
|
KMSAN: uninit-value in gue_err (2)
net
|
C |
|
|
1617 |
2100d |
2122d
|
11/28 |
2100d |
5355ed6388e2
fou, fou6: avoid uninit-value in gue_err() and gue6_err()
|
KASAN: slab-out-of-bounds Read in xfrm_policy_insert_list
net
|
|
|
|
1 |
2174d |
2173d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: use-after-free Write in __xfrm_policy_unlink
net
|
C |
|
|
254 |
2125d |
2353d
|
11/28 |
2122d |
1548bc4e0512
xfrm: policy: delete inexact policies from inexact list on hash rebuild
|
KASAN: use-after-free Read in xfrm_migrate
net
|
|
|
|
5 |
2157d |
2180d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in xfrm_policy_insert_list
net
|
|
|
|
2 |
2172d |
2183d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: use-after-free Read in __smc_diag_dump
net
s390
|
syz |
|
|
34 |
2172d |
2185d
|
11/28 |
2122d |
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
KASAN: slab-out-of-bounds Read in xfrm_policy_lookup_bytype
net
|
|
|
|
6 |
2176d |
2198d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: use-after-free Read in kernel_accept
net
s390
|
C |
|
|
19 |
2205d |
2355d
|
11/28 |
2122d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
KASAN: use-after-free Read in xfrm_policy_insert_list
net
|
|
|
|
30 |
2157d |
2198d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in __skb_flow_dissect (3)
net
|
syz |
|
|
224 |
2172d |
2261d
|
11/28 |
2122d |
0b7959b62573
tun: publish tfile after it's fully initialized
|
INFO: rcu detected stall in pfkey_sendmsg
net
|
|
|
|
7 |
2174d |
2198d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
general protection fault in kernel_accept
net
s390
|
C |
|
|
280 |
2198d |
2359d
|
11/28 |
2122d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
KMSAN: kernel-infoleak in move_addr_to_user
net
|
|
|
|
5 |
2129d |
2179d
|
11/28 |
2122d |
7d033c9f6a7f
ipv6: fix kernel-infoleak in ipv6_local_error()
|
BUG: unable to handle kernel paging request in depot_save_stack
net
|
C |
|
|
1 |
2182d |
2182d
|
11/28 |
2122d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
KASAN: slab-out-of-bounds Read in __xfrm_policy_bysel_ctx
net
|
|
|
|
1 |
2184d |
2184d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in tcp_send_loss_probe
net
|
C |
|
|
9 |
2132d |
2184d
|
11/28 |
2122d |
bf50b606cfd8
tcp: repaired skbs must init their tso_segs
|
KASAN: stack-out-of-bounds Read in pick_next_task_fair
net
|
C |
|
|
1 |
2182d |
2182d
|
11/28 |
2122d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
general protection fault in icmp6_send
net
|
syz |
|
|
2 |
2183d |
2183d
|
11/28 |
2122d |
8d9336704521
ipv6: make icmp6_send() robust against null skb->dev
|
WARNING in clear_standby
ceph
net
|
C |
|
|
3522 |
2163d |
2287d
|
11/28 |
2122d |
4aac9228d164
libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive()
|
general protection fault in __xfrm_policy_bysel_ctx
net
|
|
|
|
1 |
2159d |
2158d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_insert
net
|
|
|
|
3 |
2174d |
2198d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
general protection fault in team_nl_cmd_options_set
net
|
C |
|
|
7 |
2192d |
2149d
|
11/28 |
2122d |
2fdeee254923
team: avoid complex list operations in team_nl_cmd_options_set()
|
KASAN: slab-out-of-bounds Write in __xfrm_policy_unlink
net
|
|
|
|
34 |
2157d |
2237d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
INFO: rcu detected stall in xfrm_hash_rebuild
net
|
|
|
|
77 |
2157d |
2208d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
general protection fault in xfrm_policy_insert_list
net
|
|
|
|
4 |
2179d |
2194d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
general protection fault in xfrm_policy_lookup_bytype
net
|
|
|
|
5 |
2158d |
2187d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: slab-out-of-bounds Read in __pskb_copy_fclone
net
|
|
|
|
22 |
2204d |
2270d
|
11/28 |
2122d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
kernel panic: stack is corrupted in udp4_lib_lookup2
net
|
|
|
|
11 |
2187d |
2184d
|
11/28 |
2122d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
KASAN: stack-out-of-bounds Read in gue_err_proto_handler
net
|
C |
|
|
1 |
2179d |
2179d
|
11/28 |
2122d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
KASAN: use-after-free Read in __xfrm_policy_bysel_ctx
net
|
|
|
|
11 |
2157d |
2194d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: use-after-free Read in xfrm_policy_inexact_insert
net
|
|
|
|
42 |
2157d |
2187d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
INFO: rcu detected stall in ipv6_rcv
net
|
|
|
|
7 |
2160d |
2197d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KMSAN: uninit-value in gue_err
net
|
C |
|
|
4686 |
2122d |
2176d
|
11/28 |
2122d |
26fc181e6cac
fou, fou6: do not assume linear skbs
|
general protection fault in ip6erspan_set_version
net
|
C |
|
|
39 |
2131d |
2136d
|
11/28 |
2122d |
efcc9bcaf77c
net: ip6_gre: fix possible NULL pointer dereference in ip6erspan_set_version
|
KASAN: use-after-free Read in xfrm_policy_lookup_bytype
net
|
|
|
|
33 |
2157d |
2198d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in xfrm6_tunnel_net_exit (2)
net
|
C |
|
|
48816 |
2131d |
2413d
|
11/28 |
2122d |
f75a2804da39
xfrm: destroy xfrm_state synchronously on net exit path
|
WARNING in xfrm_policy_inexact_gc_tree
net
|
|
|
|
645 |
2157d |
2208d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING: refcount bug in xfrm_policy_bysel_ctx
net
|
|
|
|
1 |
2176d |
2176d
|
11/28 |
2122d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING: bad unlock balance in rxrpc_recvmsg
afs
net
|
C |
|
|
9 |
2148d |
2152d
|
11/28 |
2122d |
6dce3c20ac42
rxrpc: bad unlock balance in rxrpc_recvmsg
|
KMSAN: uninit-value in gue6_err
net
|
C |
|
|
8359 |
2122d |
2176d
|
11/28 |
2122d |
26fc181e6cac
fou, fou6: do not assume linear skbs
|
general protection fault in finish_wait
net
|
C |
|
|
22 |
2146d |
2362d
|
11/28 |
2129d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
|
KASAN: out-of-bounds Write in tls_push_record
net
|
C |
|
|
10 |
2262d |
2363d
|
11/28 |
2129d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
KASAN: use-after-free Read in tls_tx_records
net
|
|
|
|
1 |
2281d |
2281d
|
11/28 |
2129d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
general protection fault in tls_push_sg
net
|
|
|
|
12 |
2272d |
2381d
|
11/28 |
2129d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
kernel BUG at include/linux/mm.h:LINE! (2)
net
|
C |
|
|
1009 |
2129d |
2393d
|
11/28 |
2129d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
KASAN: use-after-free Write in tls_push_record (2)
net
|
C |
|
|
64 |
2257d |
2359d
|
11/28 |
2129d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
WARNING in __debug_object_init (3)
bpf
net
|
C |
|
|
1557 |
2250d |
2251d
|
11/28 |
2166d |
2cb494a36c98
bpf: add tests for direct packet access from CGROUP_SKB
|
general protection fault in encode_rpcb_string
net
nfs
|
C |
|
|
6 |
2349d |
2445d
|
11/28 |
2171d |
81c88b18de1f
sunrpc: handle ENOMEM in rpcb_getport_async
|
KMSAN: uninit-value in vti6_tnl_xmit
net
|
syz |
|
|
60 |
2176d |
2200d
|
11/28 |
2171d |
cb9f1b783850
ip: validate header length on virtual device xmit
|
KASAN: invalid-free in x25_asy_free
net
|
C |
|
|
67 |
2183d |
2189d
|
11/28 |
2171d |
d5c7c745f254
net/wan: fix a double free in x25_asy_open_tty()
|
KMSAN: uninit-value in check_6rd
net
|
C |
|
|
81 |
2177d |
2200d
|
11/28 |
2171d |
cb9f1b783850
ip: validate header length on virtual device xmit
|
KASAN: slab-out-of-bounds Read in tun_net_xmit (2)
net
|
C |
|
|
10 |
2187d |
2355d
|
11/28 |
2171d |
aff6db454599
ptr_ring: wrap back ->producer in __ptr_ring_swap_queue()
|
BUG: corrupted list in ___neigh_create
net
|
C |
|
|
706 |
2205d |
2208d
|
11/28 |
2176d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
KASAN: use-after-free Read in __ipv6_addr_type
net
|
|
|
|
1 |
2197d |
2197d
|
11/28 |
2176d |
cbb49697d551
ipv6: tunnels: fix two use-after-free
|
BUG: corrupted list in neigh_mark_dead
net
|
C |
|
|
4117 |
2205d |
2208d
|
11/28 |
2176d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
KMSAN: uninit-value in __inet6_bind
net
|
C |
|
|
56 |
2177d |
2207d
|
11/28 |
2176d |
fb2427454631
ipv6: explicitly initialize udp6_addr in udp_sock_create6()
|
KASAN: slab-out-of-bounds Read in neigh_mark_dead
net
|
|
|
|
12 |
2205d |
2208d
|
11/28 |
2176d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
KASAN: slab-out-of-bounds Read in ___neigh_create
net
|
|
|
|
1 |
2208d |
2208d
|
11/28 |
2176d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
general protection fault in inet_lhash2_lookup
net
|
C |
|
|
1137 |
2200d |
2203d
|
11/28 |
2176d |
eedbbb0d98b2
net: dccp: initialize (addr,port) listening hashtable
|
general protection fault in inet6_lhash2_lookup
net
|
C |
|
|
718 |
2200d |
2203d
|
11/28 |
2176d |
eedbbb0d98b2
net: dccp: initialize (addr,port) listening hashtable
|
KASAN: use-after-free Read in neigh_mark_dead
net
|
C |
|
|
858 |
2205d |
2208d
|
11/28 |
2176d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
KMSAN: uninit-value in packet_sendmsg
net
|
|
|
|
5 |
2225d |
2200d
|
11/28 |
2176d |
99137b7888f4
packet: validate address length
|
general protection fault in __ipv6_sock_mc_join
net
|
C |
|
|
9 |
2203d |
2207d
|
11/28 |
2176d |
fb83ed496b9a
tipc: compare remote and local protocols in tipc_udp_enable()
|
KASAN: use-after-free Read in ___neigh_create
net
|
C |
|
|
164 |
2205d |
2208d
|
11/28 |
2176d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
KASAN: use-after-free Read in vhost_transport_send_pkt
net
virt
kvm
|
syz |
|
|
36 |
2214d |
2340d
|
11/28 |
2200d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
KMSAN: kernel-infoleak in _copy_to_iter (4)
net
|
C |
|
|
56 |
2214d |
2219d
|
11/28 |
2200d |
688838934c23
rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
|
KASAN: use-after-free Read in vhost_work_queue
kvm
net
virt
|
syz |
|
|
30 |
2212d |
2312d
|
11/28 |
2200d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
KASAN: use-after-free Read in vhost_transport_cancel_pkt
kvm
net
virt
|
syz |
|
|
17 |
2238d |
2283d
|
11/28 |
2200d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
KMSAN: uninit-value in dev_mc_add_excl
net
|
C |
|
|
13 |
2240d |
2252d
|
11/28 |
2235d |
da71577545a5
rtnetlink: Disallow FDB configuration for non-Ethernet device
|
KMSAN: uninit-value in dev_uc_add_excl
net
|
C |
|
|
20 |
2247d |
2288d
|
11/28 |
2235d |
da71577545a5
rtnetlink: Disallow FDB configuration for non-Ethernet device
|
KASAN: use-after-free Read in tcf_block_find
net
|
C |
|
|
27 |
2277d |
2283d
|
11/28 |
2235d |
460b360104d5
net_sched: fix a crash in tc_new_tfilter()
|
general protection fault in __skb_flow_dissect (2)
net
|
C |
|
|
11 |
2283d |
2291d
|
11/28 |
2235d |
d0e13a1488ad
flow_dissector: lookup netns by skb->sk if skb->dev is NULL
|
KASAN: slab-out-of-bounds Read in refcount_inc_not_zero_checked
bpf
net
|
|
|
|
2 |
2261d |
2262d
|
11/28 |
2235d |
5032d079909d
bpf: skmsg, fix psock create on existing kcm/tls port
|
KASAN: use-after-free Read in __dev_queue_xmit (3)
net
|
|
|
|
11 |
2278d |
2281d
|
11/28 |
2235d |
460b360104d5
net_sched: fix a crash in tc_new_tfilter()
|
KMSAN: uninit-value in ip_tunnel_lookup (2)
net
|
C |
|
|
2 |
2253d |
2254d
|
11/28 |
2235d |
b0350d51f001
ip_gre: fix parsing gre header in ipgre_err
|
WARNING in tcp_cleanup_ulp
net
|
syz |
|
|
16 |
2262d |
2263d
|
11/28 |
2235d |
aadd4355918f
tcp, ulp: remove socket lock assertion on ULP cleanup
|
general protection fault in dev_gro_receive (2)
net
|
syz |
|
|
4 |
2260d |
2267d
|
11/28 |
2235d |
ece23711dd95
net: Properly unlink GRO packets on overflow.
|
WARNING in tcp_close
net
|
syz |
|
|
284 |
2257d |
2356d
|
11/28 |
2235d |
8873c064d1de
tcp: do not release socket ownership in tcp_close()
|
general protection fault in netdev_master_upper_dev_get
net
|
|
|
|
1 |
2253d |
2253d
|
11/28 |
2235d |
aab456dfa404
net/neigh: fix NULL deref in pneigh_dump_table()
|
KASAN: use-after-free Read in kfree_skb
net
|
|
|
|
1 |
2257d |
2257d
|
11/28 |
2235d |
604d415e2bd6
llc: do not use sk_eat_skb()
|
WARNING: refcount bug in qdisc_put
net
|
|
|
|
5 |
2279d |
2279d
|
11/28 |
2235d |
460b360104d5
net_sched: fix a crash in tc_new_tfilter()
|
kernel BUG at include/linux/skbuff.h:LINE!
net
|
|
|
|
3 |
2348d |
2356d
|
11/28 |
2248d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
KMSAN: kernel-infoleak in _copy_to_iter (3)
net
|
C |
|
|
36 |
2250d |
2261d
|
11/28 |
2249d |
b06f9d9f1a90
tipc: fix info leak from kernel tipc_event
|
KASAN: use-after-free Read in inet6_mc_check
net
|
|
|
|
1 |
2266d |
2266d
|
11/28 |
2249d |
dc012f3628ea
ipv6: mcast: fix a use-after-free in inet6_mc_check
|
KASAN: use-after-free Read in __llc_lookup_established
net
|
|
|
|
1 |
2269d |
2268d
|
11/28 |
2249d |
5a8e7aea953b
llc: set SOCK_RCU_FREE in llc_sap_add_socket()
|
KASAN: slab-out-of-bounds Read in _decode_session6
net
|
C |
|
|
35 |
2249d |
2307d
|
11/28 |
2249d |
9f7e43da6ae4
net/xfrm: fix out-of-bounds packet access
|
kernel BUG at net/core/dev.c:LINE! (2)
net
|
syz |
|
|
2 |
2269d |
2269d
|
11/28 |
2261d |
52b5d6f5dcf0
net: make skb_partial_csum_set() more robust against overflows
|
WARNING in __skb_flow_dissect
net
|
syz |
|
|
3 |
2268d |
2269d
|
11/28 |
2267d |
af3fb24eecb2
tun: napi flags belong to tfile
|
general protection fault in dev_gro_receive
net
|
syz |
|
|
8 |
2269d |
2281d
|
11/28 |
2268d |
af3fb24eecb2
tun: napi flags belong to tfile
|
possible deadlock in flush_workqueue
net
|
C |
|
|
73762 |
2274d |
2317d
|
11/28 |
2268d |
d4859d749aa7
net-backports: bonding: avoid possible dead-lock
|
KASAN: use-after-free Read in rawv6_sendmsg
net
|
C |
|
|
84 |
2269d |
2301d
|
11/28 |
2268d |
a688caa34beb
net-backports: ipv6: take rcu lock in rawv6_send_hdrinc()
|
possible deadlock in rtnetlink_rcv_msg
net
|
|
|
|
1 |
2291d |
2291d
|
11/28 |
2268d |
d4859d749aa7
net-backports: bonding: avoid possible dead-lock
|
INFO: trying to register non-static key in tun_chr_write_iter
net
|
|
|
|
14 |
2269d |
2281d
|
11/28 |
2268d |
c7256f579f83
tun: initialize napi_mutex unconditionally
|
WARNING in rollback_registered_many
net
|
|
|
|
1 |
2279d |
2279d
|
11/28 |
2268d |
0e1d6eca5113
rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
|
KASAN: use-after-free Read in ip_cmsg_recv_offset
net
|
C |
|
|
9 |
2277d |
2280d
|
11/28 |
2268d |
64199fc0a46b
net-backports: ipv4: fix use-after-free in ip_cmsg_recv_dstaddr()
|
possible deadlock in team_vlan_rx_add_vid
net
|
syz |
|
|
5 |
2297d |
2331d
|
11/28 |
2268d |
471b83bd8bbe
team: Forbid enslaving team device to itself
|
KMSAN: uninit-value in ip6_tnl_start_xmit
net
|
C |
|
|
69 |
2281d |
2292d
|
11/28 |
2268d |
76c0ddd8c3a6
ip6_tunnel: be careful when accessing the inner header
|
KMSAN: uninit-value in pppoe_rcv
net
|
C |
|
|
2 |
2427d |
2297d
|
11/28 |
2268d |
8540827ebac6
pppoe: fix reception of frames with no mac header
|
WARNING: suspicious RCU usage in inet_csk_route_req
net
|
C |
|
|
43 |
2275d |
2510d
|
11/28 |
2268d |
1ad98e9d1bdf
tcp/dccp: fix lockdep issue when SYN is backlogged
|
KMSAN: kernel-infoleak in _copy_to_iter (2)
net
|
C |
|
|
7 |
2276d |
2304d
|
11/28 |
2271d |
45c180bc29ba
xfrm_user: prevent leaking 2 bytes of kernel memory
|
KASAN: use-after-free Read in ceph_destroy_options
ceph
net
|
|
|
|
1 |
2318d |
2317d
|
10/28 |
2282d |
8aaff15168cf
ceph: avoid a use-after-free in ceph_destroy_options()
|
KMSAN: uninit-value in memcmp (2)
net
|
C |
|
|
131 |
2296d |
2287d
|
10/28 |
2285d |
77d36398d99f
net: fix uninit-value in __hw_addr_add_ex()
|
KASAN: use-after-free Write in ip6_dst_destroy
net
|
|
|
|
1 |
2363d |
2363d
|
10/28 |
2296d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
KASAN: stack-out-of-bounds Read in fib_table_lookup
net
|
|
|
|
1 |
2355d |
2355d
|
10/28 |
2298d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
KASAN: global-out-of-bounds Read in ip6_xmit
net
|
|
|
|
2 |
2478d |
2479d
|
10/28 |
2298d |
b954f94023dc
l2tp: fix races with ipv4-mapped ipv6 addresses
|
KASAN: use-after-free Read in ip6_tnl_start_xmit
net
|
|
|
|
1 |
2431d |
2431d
|
10/28 |
2303d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
KASAN: use-after-free Read in ip6_hold_safe
net
|
C |
|
|
1 |
2338d |
2338d
|
8/28 |
2311d |
6d37fa49da1e
l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
|
KASAN: use-after-free Read in iotlb_access_ok
kvm
net
virt
|
|
|
|
1 |
2337d |
2333d
|
8/28 |
2311d |
b13f9c636437
vhost: reset metadata cache when initializing new IOTLB
|
WARNING: refcount bug in llc_sap_find
net
|
C |
|
|
18 |
2331d |
2333d
|
8/28 |
2311d |
0dcb82254d65
llc: use refcount_inc_not_zero() for llc_sap_find()
|
possible deadlock in rhashtable_lookup_insert_fast
net
|
C |
|
|
28 |
2323d |
2326d
|
8/28 |
2311d |
ff93bca76992
ila: make lockdep happy again
|
KASAN: use-after-free Write in ip6_hold_safe
net
|
C |
|
|
25 |
2335d |
2346d
|
8/28 |
2311d |
6d37fa49da1e
l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
|
KASAN: slab-out-of-bounds Write in eth_header_parse
net
|
C |
|
|
7 |
2330d |
2343d
|
8/28 |
2311d |
4576cd469d98
packet: refine ring v3 block size test to hold one frame
|
WARNING: ODEBUG bug in vsock_stream_connect
net
virt
|
C |
|
|
42 |
2331d |
2341d
|
8/28 |
2311d |
455f05ecd2b2
vsock: split dwork to avoid reinitializations
|
general protection fault in string (2)
net
|
|
|
|
1 |
2337d |
2337d
|
8/28 |
2311d |
a6bcfc89694e
net: check extack._msg before print
|
general protection fault in smc_ioctl (3)
net
s390
|
C |
|
|
15 |
2331d |
2332d
|
8/28 |
2311d |
7311d665ca68
net/smc: move sock lock in smc_ioctl()
|
general protection fault in smc_tx_prepared_sends
net
s390
|
C |
|
|
7 |
2336d |
2338d
|
8/28 |
2311d |
7311d665ca68
net/smc: move sock lock in smc_ioctl()
|
WARNING in refcount_inc (3)
net
|
C |
|
|
7 |
2460d |
2461d
|
8/28 |
2315d |
8e04944f0ea8
mm,vmscan: Allow preallocating memory for register_shrinker().
|
kernel BUG at net/ipv6/route.c:LINE!
net
|
C |
|
|
197 |
2334d |
2356d
|
8/28 |
2331d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
possible deadlock in bond_get_stats
net
|
C |
|
|
11 |
2338d |
2342d
|
8/28 |
2331d |
7e2556e40026
bonding: avoid lockdep confusion in bond_get_stats()
|
WARNING in __ip6_make_skb
net
|
C |
|
|
1 |
2356d |
2356d
|
8/28 |
2331d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
general protection fault in tcp_gso_segment
net
|
|
|
|
1 |
2357d |
2357d
|
8/28 |
2331d |
ff907a11a0d6
net: skb_segment() should not return NULL
|
KASAN: use-after-free Read in refcount_sub_and_test_checked
net
|
|
|
|
3 |
2337d |
2338d
|
8/28 |
2331d |
e6aed040eafb
Revert "net/ipv6: fix metrics leak"
|
WARNING in ip6_sk_dst_lookup_flow
net
|
C |
|
|
2 |
2337d |
2354d
|
8/28 |
2331d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
WARNING in ip6_setup_cork
net
|
C |
|
|
4 |
2336d |
2356d
|
8/28 |
2331d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
KMSAN: kernel-infoleak in put_cmsg
net
|
C |
|
|
3 |
2364d |
2354d
|
8/28 |
2331d |
2efd4fca703a
ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
|
BUG: unable to handle kernel paging request in neigh_update
net
|
|
|
|
1 |
2351d |
2351d
|
8/28 |
2331d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
KASAN: use-after-free Write in dst_release (2)
net
|
C |
|
|
3 |
2337d |
2338d
|
8/28 |
2331d |
e6aed040eafb
Revert "net/ipv6: fix metrics leak"
|
KMSAN: kernel-infoleak in _copy_to_iter
net
|
C |
|
|
285 |
2347d |
2383d
|
8/28 |
2331d |
45c180bc29ba
xfrm_user: prevent leaking 2 bytes of kernel memory
|
KASAN: out-of-bounds Read in bpf_test_finish
bpf
net
|
|
|
|
9 |
2355d |
2362d
|
8/28 |
2333d |
6e6fddc78323
bpf: fix panic due to oob in bpf_prog_test_run_skb
|
KASAN: slab-out-of-bounds Read in ipv6_gso_pull_exthdrs
net
|
C |
|
|
4 |
2371d |
2387d
|
8/28 |
2333d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
KASAN: stack-out-of-bounds Read in neigh_flush_dev
net
|
|
|
|
1 |
2358d |
2356d
|
8/28 |
2333d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
KASAN: stack-out-of-bounds Read in lock_sock_nested
net
|
|
|
|
1 |
2355d |
2355d
|
8/28 |
2333d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
KASAN: stack-out-of-bounds Read in netlink_has_listeners
net
|
|
|
|
1 |
2355d |
2355d
|
8/28 |
2333d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
general protection fault in __sock_release
net
|
|
|
|
1 |
2352d |
2351d
|
8/28 |
2333d |
99ba2b5aba24
bpf: sockhash, disallow bpf_tcp_close and update in parallel
|
INFO: rcu detected stall in vprintk_emit
net
nfc
|
syz |
|
|
2 |
2369d |
2375d
|
8/28 |
2333d |
3bc53be9db21
net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL.
|
WARNING: refcount bug in smc_tcp_listen_work
net
s390
|
|
|
|
1 |
2395d |
2395d
|
8/28 |
2333d |
e1bbdd570474
net/smc: reduce sock_put() for fallback sockets
|
WARNING in set_precision
net
|
C |
|
|
140 |
2352d |
2393d
|
8/28 |
2333d |
c604cb767049
KEYS: DNS: fix parsing multiple options
|
KASAN: use-after-free Read in ipv6_gso_pull_exthdrs
net
|
C |
|
|
5 |
2351d |
2383d
|
8/28 |
2333d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
WARNING in iov_iter_revert
net
|
C |
|
|
74 |
2352d |
2419d
|
8/28 |
2333d |
32da12216e46
tls: Stricter error checking in zerocopy sendmsg path
|
general protection fault in smc_ioctl (2)
net
s390
|
C |
|
|
43 |
2333d |
2356d
|
8/28 |
2333d |
1992d99882af
net/smc: take sock lock in smc_ioctl()
|
general protection fault in do_tcp_getsockopt
net
|
C |
|
|
9 |
2351d |
2363d
|
8/28 |
2333d |
6508b6781be0
tcp: cleanup copied_seq and urg_data in tcp_disconnect
|
KASAN: use-after-free Read in bpf_test_finish
bpf
net
|
C |
|
|
1211 |
2347d |
2362d
|
8/28 |
2333d |
6e6fddc78323
bpf: fix panic due to oob in bpf_prog_test_run_skb
|
KASAN: use-after-free Write in skb_release_data
net
|
C |
|
|
1903 |
2407d |
2459d
|
8/28 |
2333d |
993675a3100b
packet: reset network header if packet shorter than ll reserved space
|
WARNING in smc_unhash_sk
s390
net
|
C |
|
|
155731 |
2335d |
2498d
|
8/28 |
2333d |
e1bbdd570474
net/smc: reduce sock_put() for fallback sockets
|
kernel BUG at net/packet/af_packet.c:LINE! (3)
net
|
syz |
|
|
5 |
2483d |
2530d
|
8/28 |
2341d |
a6361f0ca4b2
packet: fix bitfield update race
|
KASAN: use-after-free Read in l2tp_session_create
net
|
|
|
|
119 |
2469d |
2535d
|
8/28 |
2350d |
6b9f34239b00
l2tp: fix races in tunnel creation
|
KMSAN: uninit-value in ip_tunnel_xmit
net
|
C |
|
|
2594 |
2354d |
2440d
|
8/28 |
2354d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
WARNING: suspicious RCU usage in fib6_info_alloc
net
|
syz |
|
|
2 |
2444d |
2443d
|
8/28 |
2361d |
27b10608a2fe
net/ipv6: Fix gfp_flags arg to addrconf_prefix_route
|
WARNING in bpf_int_jit_compile
bpf
net
|
syz |
|
|
11 |
2369d |
2406d
|
8/28 |
2361d |
9facc336876f
bpf: reject any prog that failed read-only lock
|
possible deadlock in __might_fault (2)
net
|
C |
|
|
20 |
2431d |
2435d
|
8/28 |
2361d |
05255b823a61
tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
|
KMSAN: uninit-value in _copy_to_iter (2)
kvm
net
virt
|
C |
|
|
226 |
2393d |
2439d
|
8/28 |
2361d |
670ae9caaca4
vhost: fix info leak due to uninitialized memory
|
KASAN: slab-out-of-bounds Read in bpf_csum_update
bpf
net
|
C |
|
|
2 |
2399d |
2397d
|
8/28 |
2361d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
possible deadlock in tcp_mmap
net
|
C |
|
|
1908 |
2431d |
2435d
|
8/28 |
2361d |
05255b823a61
tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
|
KASAN: use-after-free Read in bpf_skb_change_proto
bpf
net
|
|
|
|
1 |
2392d |
2391d
|
8/28 |
2361d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
KASAN: use-after-free Write in prb_fill_curr_block
net
|
C |
|
|
2 |
2400d |
2400d
|
8/28 |
2361d |
eb73190f4fbe
net/packet: refine check for priv area size
|
WARNING in skb_warn_bad_offload (2)
net
|
C |
|
|
6 |
2434d |
2434d
|
8/28 |
2361d |
a8c744a8b437
udp: disable gso with no_check_tx
|
KASAN: slab-out-of-bounds Read in bpf_skb_vlan_push
bpf
net
|
syz |
|
|
2 |
2388d |
2388d
|
8/28 |
2361d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
KASAN: use-after-free Read in skb_ensure_writable
bpf
net
|
C |
|
|
4 |
2391d |
2397d
|
8/28 |
2361d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
WARNING: kmalloc bug in xdp_umem_create
bpf
net
|
C |
|
|
7 |
2385d |
2391d
|
8/28 |
2361d |
a343993c518c
xsk: silence warning on memory allocation failure
|
KASAN: use-after-free Write in tls_push_record
net
|
C |
|
|
24 |
2362d |
2407d
|
8/28 |
2361d |
a447da7d0041
tls: fix use-after-free in tls_push_record
|
KASAN: use-after-free Read in fib6_table_lookup
net
|
|
|
|
1 |
2384d |
2383d
|
8/28 |
2361d |
9b0a8da8c4c6
net/ipv6: respect rcu grace period before freeing fib6_info
|
INFO: rcu detected stall in skb_free_head
net
|
|
|
|
4 |
2400d |
2433d
|
8/28 |
2361d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
WARNING: lock held when returning to user space! (2)
net
|
C |
|
|
9 |
2422d |
2423d
|
8/28 |
2361d |
9e5750106630
net/ipv6: fix lock imbalance in ip6_route_del()
|
INFO: rcu detected stall in corrupted
net
|
syz |
|
|
1 |
2411d |
2410d
|
8/28 |
2361d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
INFO: rcu detected stall in ip_route_output_key_hash
net
|
|
|
|
2 |
2412d |
2416d
|
8/28 |
2361d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
BUG: unable to handle kernel NULL pointer dereference in corrupted
net
|
C |
|
|
5 |
2393d |
2393d
|
8/28 |
2361d |
c0129a061442
smc: convert to ->poll_mask
|
KMSAN: uninit-value in eth_mac_addr
net
|
|
|
|
2 |
2364d |
2397d
|
8/28 |
2361d |
644c7eebbfd5
rtnetlink: validate attributes in do_setlink()
|
INFO: rcu detected stall in dev_queue_xmit_nit
net
|
|
|
|
1 |
2407d |
2407d
|
8/28 |
2361d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto
bpf
net
|
C |
|
|
2 |
2391d |
2391d
|
8/28 |
2361d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
WARNING: possible circular locking dependency detected (4)
net
|
C |
|
|
27 |
2435d |
2442d
|
8/28 |
2361d |
05255b823a61
tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
|
KASAN: slab-out-of-bounds Read in ip6_xmit (3)
net
|
C |
|
|
69 |
2367d |
2409d
|
8/28 |
2361d |
9901c5d77e96
bpf: sockmap, fix crash when ipv6 sock is added
|
KASAN: slab-out-of-bounds Read in skb_ensure_writable
bpf
net
|
C |
|
|
9 |
2388d |
2397d
|
8/28 |
2361d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
KASAN: use-after-free Read in bpf_csum_update
bpf
net
|
C |
|
|
1 |
2399d |
2397d
|
8/28 |
2361d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
BUG: unable to handle kernel paging request in bpf_int_jit_compile
bpf
net
|
syz |
|
|
2 |
2374d |
2377d
|
8/28 |
2361d |
85782e037f8a
bpf: undo prog rejection on read-only lock failure
|
general protection fault in smc_ioctl
net
s390
|
C |
|
|
5214 |
2384d |
2413d
|
8/28 |
2361d |
2351abe6f873
net/smc: return 0 for ioctl calls in states INIT and CLOSED
|
INFO: rcu detected stall in kfree_skbmem
net
|
|
|
|
4 |
2401d |
2431d
|
8/28 |
2361d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
KASAN: slab-out-of-bounds Write in prb_fill_curr_block
net
|
C |
|
|
2 |
2400d |
2400d
|
8/28 |
2361d |
eb73190f4fbe
net/packet: refine check for priv area size
|
WARNING: refcount bug in __udp_gso_segment
net
|
|
|
|
2 |
2421d |
2421d
|
8/28 |
2361d |
575b65bc5bff
udp: avoid refcount_t saturation in __udp_gso_segment()
|
KMSAN: uninit-value in rtnetlink_put_metrics
net
|
syz |
|
|
3 |
2395d |
2397d
|
8/28 |
2361d |
5b5e7a0de2bb
net: metrics: add proper netlink validation
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_head
bpf
net
|
C |
|
|
2 |
2387d |
2387d
|
8/28 |
2361d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
INFO: rcu detected stall in ipv6_addr_label
net
|
|
|
|
1 |
2496d |
2495d
|
8/28 |
2361d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
KASAN: use-after-free Read in ip6_route_mpath_notify
net
|
C |
|
|
25 |
2395d |
2399d
|
8/28 |
2361d |
f7225172f25a
net/ipv6: prevent use after free in ip6_route_mpath_notify
|
KASAN: null-ptr-deref Write in xdp_umem_unaccount_pages
bpf
net
|
C |
|
|
25 |
2390d |
2393d
|
8/28 |
2361d |
c09290c56376
bpf, xdp: fix crash in xdp_umem_unaccount_pages
|
KASAN: slab-out-of-bounds Write in tls_push_record
net
|
|
|
|
2 |
2377d |
2391d
|
8/28 |
2361d |
a447da7d0041
tls: fix use-after-free in tls_push_record
|
WARNING: suspicious RCU usage in rt6_remove_exception_rt
net
|
syz |
|
|
1761 |
2437d |
2438d
|
8/28 |
2361d |
091311debcf0
net/ipv6: fix LOCKDEP issue in rt6_remove_exception_rt()
|
KASAN: use-after-free Read in skb_dequeue
net
|
C |
|
|
4 |
2380d |
2380d
|
8/28 |
2361d |
945d015ee0c3
net/packet: fix use-after-free
|
WARNING: ODEBUG bug in del_timer (2)
net
s390
|
C |
|
|
6 |
2414d |
2415d
|
8/28 |
2361d |
be7f3e59997b
net/smc: init conn.tx_work & conn.send_lock sooner
|
KASAN: null-ptr-deref Read in refcount_sub_and_test
net
|
C |
|
|
4 |
2441d |
2443d
|
8/28 |
2361d |
263243d6c257
net/ipv6: Fix ip6_convert_metrics() bug
|
INFO: rcu detected stall in __ipv6_dev_get_saddr
net
|
|
|
|
1 |
2402d |
2402d
|
8/28 |
2361d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
WARNING: suspicious RCU usage in rt6_check_expired
net
|
|
|
|
4 |
2438d |
2439d
|
8/28 |
2361d |
c3c14da0288d
net/ipv6: add rcu locking to ip6_negative_advice
|
general protection fault in kernel_sock_shutdown
net
s390
|
C |
|
|
3329 |
2440d |
2498d
|
5/28 |
2366d |
1255fcb2a655
net/smc: fix shutdown in state SMC_LISTEN
|
INFO: trying to register non-static key in tun_do_read
net
|
C |
|
|
28 |
2418d |
2424d
|
5/28 |
2382d |
7063efd33bb1
tuntap: fix use after free during release
|
KASAN: use-after-free Read in iptunnel_handle_offloads
net
|
C |
|
|
133 |
2408d |
2453d
|
5/28 |
2382d |
9aad13b087ab
packet: fix reserve calculation
|
KASAN: use-after-free Read in sock_recv_errqueue
net
|
|
|
|
1 |
2417d |
2417d
|
5/28 |
2394d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
KASAN: use-after-free Read in __sk_free
net
|
|
|
|
1 |
2415d |
2414d
|
5/28 |
2394d |
9709020c86f6
sock_diag: fix use-after-free read in __sk_free
|
BUG: soft lockup in _decode_session6
net
|
C |
|
|
1 |
2420d |
2420d
|
5/28 |
2394d |
d9f92772e8ec
xfrm6: avoid potential infinite loop in _decode_session6()
|
KASAN: use-after-free Read in skb_copy_datagram_iter
net
|
C |
|
|
7 |
2429d |
2467d
|
5/28 |
2394d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
KASAN: use-after-free Read in __dev_queue_xmit (2)
net
|
C |
|
|
2 |
2411d |
2411d
|
5/28 |
2394d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
WARNING in kcm_exit_net (3)
net
|
syz |
|
|
5 |
2401d |
2401d
|
5/28 |
2394d |
eb7f54b90bd8
kcm: Fix use-after-free caused by clonned sockets
|
general protection fault in mr_mfc_find_parent
net
|
|
|
|
2 |
2406d |
2412d
|
5/28 |
2394d |
66fb33254f45
ipmr: properly check rhltable_init() return value
|
KASAN: use-after-free Read in copyout
net
|
C |
|
|
11 |
2411d |
2468d
|
5/28 |
2394d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
BUG: unable to handle kernel paging request in smc_ib_remember_port_attr
net
s390
|
C |
|
|
112 |
2411d |
2467d
|
5/28 |
2394d |
d49baa7e12ee
net/smc: check for missing nlattrs in SMC_PNETID messages
|
BUG: spinlock bad magic in tun_do_read
net
|
syz |
|
|
1 |
2424d |
2424d
|
5/28 |
2394d |
b196d88aba8a
tun: fix use after free for ptr_ring
|
kernel BUG at net/ipv4/tcp_output.c:LINE! (2)
net
|
syz |
|
|
23 |
2425d |
2531d
|
5/28 |
2394d |
7f582b248d0a
tcp: purge write queue in tcp_connect_init()
|
KMSAN: uninit-value in move_addr_to_user (2)
net
|
C |
|
|
44 |
2416d |
2423d
|
5/28 |
2415d |
09c8b9718a7a
tipc: fix one byte leak in tipc_sk_set_orig_addr()
|
KASAN: use-after-free Read in tls_sk_proto_close (2)
net
|
C |
|
|
297 |
2420d |
2427d
|
5/28 |
2415d |
98f0a39529e5
tls: fix use after free in tls_sk_proto_close
|
BUG: MAX_LOCK_DEPTH too low!
net
|
|
|
|
1 |
2431d |
2431d
|
5/28 |
2415d |
af50e4ba34f4
nsh: fix infinite loop
|
KASAN: use-after-free Read in perf_trace_rpc_stats_latency
net
nfs
|
|
|
|
1 |
2432d |
2432d
|
5/28 |
2415d |
98eb6cf25f03
sunrpc: Fix latency trace point crashes
|
KASAN: slab-out-of-bounds Read in pfkey_add
net
|
C |
|
|
835 |
2420d |
2567d
|
5/28 |
2415d |
4b66af2d6356
af_key: Always verify length of provided sadb_key
|
INFO: task hung in sock_sendmsg
net
|
|
|
|
1 |
2452d |
2452d
|
5/28 |
2415d |
8236b0ae31c8
bdi: wake up concurrent wb_shutdown() callers.
|
WARNING in xfrm6_tunnel_net_exit
net
|
syz |
|
|
14002 |
2418d |
2548d
|
5/28 |
2415d |
b48c05ab5d32
xfrm: Fix warning in xfrm6_tunnel_net_exit.
|
WARNING in tcp_mark_head_lost
net
|
C |
|
|
18 |
2425d |
2507d
|
5/28 |
2416d |
16ae6aa17052
net-backports: tcp: ignore Fast Open on repair mode
|
general protection fault in smc_setsockopt
net
s390
|
C |
|
|
504 |
2428d |
2492d
|
5/28 |
2416d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
KMSAN: uninit-value in put_cmsg
net
|
C |
|
|
2 |
2430d |
2429d
|
5/28 |
2416d |
eb80ca476ec1
rds: do not leak kernel memory to user land
|
general protection fault in smc_set_keepalive
s390
net
|
C |
|
|
6 |
2432d |
2437d
|
5/28 |
2416d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
WARNING in tcp_sacktag_write_queue
net
|
C |
|
|
8 |
2432d |
2504d
|
5/28 |
2416d |
bf2acc943a45
tcp: fix TCP_REPAIR_QUEUE bound checking
|
general protection fault in smc_getname
net
s390
|
C |
|
|
44 |
2428d |
2492d
|
5/28 |
2416d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt
net
s390
|
C |
|
|
9 |
2416d |
2421d
|
5/28 |
2416d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
KMSAN: uninit-value in rt6_multipath_hash
net
|
C |
|
|
3 |
2416d |
2434d
|
5/28 |
2416d |
cea67a2dd6b2
ipv6: fix uninit-value in ip6_multipath_l3_keys()
|
WARNING: ODEBUG bug in del_timer
net
s390
|
C |
|
|
200 |
2416d |
2433d
|
5/28 |
2416d |
784813aed6ba
net/smc: restrict non-blocking connect finish
|
general protection fault in smc_getsockopt
net
s390
|
C |
|
|
577 |
2428d |
2488d
|
5/28 |
2416d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
KASAN: use-after-free Read in work_is_static_object
net
|
|
|
|
3 |
2528d |
2544d
|
5/28 |
2423d |
2cc683e88c0c
kcm: lock lower socket in kcm_attach
|
KASAN: out-of-bounds Read in ip6_xmit
net
|
|
|
|
2 |
2482d |
2523d
|
5/28 |
2423d |
b954f94023dc
l2tp: fix races with ipv4-mapped ipv6 addresses
|
KASAN: use-after-free Read in __dev_queue_xmit
net
|
C |
|
|
10 |
2430d |
2548d
|
5/28 |
2423d |
d0c081b49137
flow_dissector: properly cap thoff field
|
KASAN: use-after-free Read in ip6_xmit
net
|
C |
|
|
5174 |
2470d |
2548d
|
5/28 |
2423d |
c113187d38ff
tls: Use correct sk->sk_prot for IPV6
|
KASAN: use-after-free Read in llc_conn_ac_send_sabme_cmd_p_set_x
net
|
|
|
|
1 |
2447d |
2446d
|
5/28 |
2423d |
f7e43672683b
llc: hold llc_sap before release_sock()
|
WARNING in strp_done
net
|
C |
|
|
2336 |
2458d |
2507d
|
5/28 |
2423d |
dff8baa26117
kcm: Call strp_stop before strp_done in kcm_attach
|
BUG: corrupted list in team_nl_cmd_options_set
net
|
C |
|
|
2 |
2447d |
2450d
|
5/28 |
2423d |
4fb0534fb7bb
team: avoid adding twice the same option to the event list
|
KASAN: null-ptr-deref Read in refcount_inc_not_zero
net
|
C |
|
|
2352 |
2437d |
2439d
|
5/28 |
2423d |
3a04ce7130a7
llc: fix NULL pointer deref for SOCK_ZAPPED
|
WARNING: kobject bug in netdev_queue_update_kobjects
net
|
C |
|
|
27 |
2426d |
2487d
|
5/28 |
2423d |
3e14c6abbfb5
kobject: don't use WARN for registration failures
|
KMSAN: uninit-value in inet_getpeer
net
|
C |
|
|
54 |
2424d |
2453d
|
5/28 |
2423d |
b6a37e5e2541
inetpeer: fix uninit-value in inet_getpeer
|
KMSAN: uninit-value in tcp_parse_options
net
|
C |
|
|
38 |
2425d |
2451d
|
5/28 |
2423d |
721230326891
tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
|
KMSAN: uninit-value in fib_create_info
net
|
C |
|
|
19 |
2449d |
2455d
|
5/28 |
2423d |
b1993a2de12c
net: fix rtnh_ok()
|
KMSAN: uninit-value in fib6_new_table
net
|
C |
|
|
3 |
2440d |
2440d
|
5/28 |
2423d |
aa8f8778493c
ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
|
KMSAN: uninit-value in pppol2tp_connect
net
|
C |
|
|
13 |
2424d |
2439d
|
5/28 |
2423d |
eb1c28c05894
l2tp: check sockaddr length in pppol2tp_connect()
|
KASAN: stack-out-of-bounds Write in ipip6_tunnel_locate
net
|
C |
|
|
33 |
2449d |
2457d
|
5/28 |
2423d |
b95211e066fc
ipv6: sit: better validate user provided tunnel names
|
KASAN: stack-out-of-bounds Write in ip6_tnl_locate
net
|
|
|
|
4 |
2450d |
2451d
|
5/28 |
2423d |
db7a65e3ab78
ip6_tunnel: better validate user provided tunnel names
|
KASAN: stack-out-of-bounds Write in ip6gre_tunnel_locate
net
|
C |
|
|
923 |
2449d |
2457d
|
5/28 |
2423d |
5f42df013b8b
ip6_gre: better validate user provided tunnel names
|
KMSAN: uninit-value in netlink_sendmsg
net
|
C |
|
|
2493 |
2423d |
2455d
|
5/28 |
2423d |
6091f09c2f79
netlink: fix uninit-value in netlink_sendmsg
|
KMSAN: uninit-value in inet_csk_bind_conflict
net
|
C |
|
|
446 |
2423d |
2455d
|
5/28 |
2423d |
3099a5291893
soreuseport: initialise timewait reuseport field
|
KASAN: use-after-free Write in dst_release
net
|
C |
|
|
832 |
2449d |
2459d
|
5/28 |
2423d |
bfacfb457b36
pptp: remove a buggy dst release in pptp_connect()
|
KASAN: stack-out-of-bounds Write in __ip_tunnel_create
net
|
C |
|
|
29 |
2450d |
2457d
|
5/28 |
2423d |
9cb726a212a8
ip_tunnel: better validate user provided tunnel names
|
KMSAN: uninit-value in netif_skb_features
net
|
C |
|
|
119 |
2424d |
2450d
|
5/28 |
2423d |
7ce2367254e8
vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
|
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (3)
net
|
C |
|
|
234 |
2501d |
2504d
|
5/28 |
2423d |
26736a08ee0f
tipc: don't call sock_release() in atomic context
|
KMSAN: uninit-value in ip_route_output_key_hash_rcu
net
|
|
|
|
179 |
2423d |
2455d
|
5/28 |
2423d |
d0ea2b125005
ipv4: fix uninit-value in ip_route_output_key_hash_rcu()
|
KMSAN: uninit-value in strlcpy
net
|
C |
|
|
2 |
2426d |
2426d
|
5/28 |
2423d |
537b361fbcbc
vti6: better validate user provided tunnel names
|
KMSAN: uninit-value in pppoe_connect
net
|
|
|
|
47 |
2424d |
2439d
|
5/28 |
2423d |
a49e2f5d5fb1
pppoe: check sockaddr length in pppoe_connect()
|
KMSAN: uninit-value in packet_set_ring
net
|
C |
|
|
6 |
2430d |
2447d
|
5/28 |
2423d |
5171b37d9596
net: af_packet: fix race in PACKET_{R|T}X_RING
|
KASAN: use-after-free Read in pppol2tp_connect (3)
net
|
C |
|
|
22 |
2450d |
2468d
|
5/28 |
2423d |
6b9f34239b00
l2tp: fix races in tunnel creation
|
KASAN: use-after-free Read in llc_conn_tmr_common_cb
net
|
|
|
|
1 |
2445d |
2443d
|
5/28 |
2423d |
b905ef9ab901
llc: delete timers synchronously in llc_sk_free()
|
KMSAN: uninit-value in __skb_try_recv_from_queue
net
|
C |
|
|
108 |
2424d |
2455d
|
5/28 |
2423d |
b13dda9f9aa7
net: initialize skb->peeked when cloning
|
possible deadlock in rtnl_lock (5)
net
|
C |
|
|
1009 |
2437d |
2466d
|
5/28 |
2423d |
5c64576a7789
ipvs: fix rtnl_lock lockups caused by start_sync_thread
|
KMSAN: uninit-value in neigh_dump_info
net
|
C |
|
|
6 |
2436d |
2451d
|
5/28 |
2423d |
7dd07c143a4b
net: validate attribute sizes in neigh_dump_table()
|
KMSAN: uninit-value in inet6_rtm_delroute
net
|
C |
|
|
9 |
2443d |
2455d
|
5/28 |
2423d |
b1993a2de12c
net: fix rtnh_ok()
|
KMSAN: uninit-value in memcmp
net
|
C |
|
|
30 |
2425d |
2455d
|
5/28 |
2423d |
77d36398d99f
net: fix uninit-value in __hw_addr_add_ex()
|
kernel BUG at drivers/vhost/vhost.c:LINE! (2)
kvm
net
virt
|
C |
|
|
139 |
2425d |
2455d
|
5/28 |
2423d |
d14d2b78090c
vhost: fix vhost_vq_access_ok() log check
|
KMSAN: uninit-value in move_addr_to_user
net
|
C |
|
|
74 |
2424d |
2455d
|
5/28 |
2423d |
6780db244d6b
sctp: do not leak kernel memory to user space
|
possible deadlock in smc_close_non_accepted
net
s390
|
C |
|
|
4 |
2491d |
2491d
|
5/28 |
2427d |
3d502067599f
net/smc: simplify wait when closing listen socket
|
KASAN: slab-out-of-bounds Write in tcp_v6_syn_recv_sock
net
|
C |
|
|
1063 |
2532d |
2549d
|
5/28 |
2437d |
d91c3e17f75f
net/tls: Only attach to sockets in ESTABLISHED state
|
KASAN: use-after-free Read in perf_trace_lock_acquire (2)
kvm
net
virt
|
C |
|
|
188 |
2519d |
2591d
|
5/28 |
2437d |
4cd879515d68
vhost_net: stop device during reset owner
|
possible deadlock in __neigh_create
net
|
|
|
|
1 |
2461d |
2461d
|
5/28 |
2451d |
1bfa26ff8c4b
ipv6: fix possible deadlock in rt6_age_examine_exception()
|
WARNING in skb_warn_bad_offload
net
|
C |
|
|
6527 |
2488d |
2611d
|
5/28 |
2453d |
8d74e9f88d65
net: avoid skb_warn_bad_offload on IS_ERR
|
kernel BUG at ./include/linux/skbuff.h:LINE! (2)
net
|
C |
|
|
5 |
2493d |
2470d
|
5/28 |
2456d |
10b8a3de603d
ipv6: the entire IPv6 header chain must fit the first fragment
|
BUG: unable to handle kernel (2)
net
|
syz |
|
|
1 |
2465d |
2465d
|
5/28 |
2456d |
c769accdf3d8
vlan: Fix vlan insertion for packets without ethernet header
|
BUG: unable to handle kernel paging request in __memmove
net
|
|
|
|
1 |
2466d |
2466d
|
5/28 |
2456d |
c769accdf3d8
vlan: Fix vlan insertion for packets without ethernet header
|
KASAN: use-after-free Read in worker_thread (2)
net
|
syz |
|
|
6 |
2596d |
2605d
|
5/28 |
2456d |
581e7226a5d4
kcm: Only allow TCP sockets to be attached to a KCM mux
|
BUG: unable to handle kernel paging request in netdev_queue_update_kobjects
net
|
syz |
|
|
1 |
2466d |
2466d
|
5/28 |
2456d |
c769accdf3d8
vlan: Fix vlan insertion for packets without ethernet header
|
BUG: corrupted list in remove_wait_queue
kvm
net
virt
|
C |
|
|
5 |
2469d |
2472d
|
5/28 |
2456d |
dc6455a71c7f
vhost: correctly remove wait queue during poll failure
|
kernel BUG at drivers/vhost/vhost.c:LINE!
kvm
net
virt
|
C |
|
|
152 |
2456d |
2474d
|
5/28 |
2456d |
d65026c6c62e
vhost: validate log when IOTLB is enabled
|
possible deadlock in __ipv6_dev_mc_dec
net
|
|
|
|
1 |
2470d |
2470d
|
5/28 |
2456d |
1bfa26ff8c4b
ipv6: fix possible deadlock in rt6_age_examine_exception()
|
possible deadlock in handle_rx
kvm
net
virt
|
C |
|
|
4 |
2467d |
2467d
|
5/28 |
2456d |
aaa3149bbee9
vhost_net: add missing lock nesting notation
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (4)
net
|
C |
|
|
102 |
2470d |
2521d
|
4/28 |
2469d |
19d7df69fdb2
xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems
|
INFO: rcu detected stall in xfrm_confirm_neigh
net
|
|
|
|
7 |
2485d |
2509d
|
4/28 |
2469d |
013cb81e89f8
xfrm: Fix infinite loop in xfrm_get_dst_nexthop with transport mode.
|
WARNING: kmalloc bug in xfrm_add_sa
net
|
C |
|
|
109 |
2470d |
2509d
|
4/28 |
2469d |
d97ca5d714a5
xfrm_user: uncoditionally validate esn replay attribute struct
|
KASAN: use-after-free Read in pfifo_fast_enqueue
net
|
C |
|
|
20 |
2471d |
2535d
|
4/28 |
2469d |
cce6294cc2ea
net: sched: fix uses after free
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock
net
|
C |
|
|
4 |
2487d |
2487d
|
4/28 |
2469d |
17cfe79a65f9
l2tp: do not accept arbitrary sockets
|
KASAN: use-after-free Read in pppol2tp_connect (2)
net
|
C |
|
|
10 |
2470d |
2485d
|
4/28 |
2469d |
17cfe79a65f9
l2tp: do not accept arbitrary sockets
|
KASAN: slab-out-of-bounds Read in ip6_xmit (2)
net
|
C |
|
|
259 |
2472d |
2486d
|
4/28 |
2469d |
b954f94023dc
l2tp: fix races with ipv4-mapped ipv6 addresses
|
WARNING in kmalloc_slab (4)
net
|
|
|
|
1 |
2481d |
2480d
|
4/28 |
2469d |
d97ca5d714a5
xfrm_user: uncoditionally validate esn replay attribute struct
|
KASAN: use-after-free Read in strp_data_ready
net
|
C |
|
|
204 |
2527d |
2620d
|
4/28 |
2481d |
581e7226a5d4
kcm: Only allow TCP sockets to be attached to a KCM mux
|
WARNING in debug_print_object
net
|
C |
|
|
2 |
2520d |
2520d
|
4/28 |
2487d |
28f5bfb81919
l2tp: fix tunnel lookup use-after-free race
|
general protection fault in smc_create
net
s390
|
C |
|
|
2 |
2495d |
2495d
|
4/28 |
2487d |
a5dcb73b96a9
net/smc: fix NULL pointer dereference on sock_create_kern() error path
|
KASAN: use-after-free Read in pppol2tp_connect
net
|
C |
|
|
25 |
2487d |
2536d
|
4/28 |
2487d |
28f5bfb81919
l2tp: fix tunnel lookup use-after-free race
|
KASAN: use-after-free Read in inet_shutdown
net
|
C |
|
|
22 |
2489d |
2535d
|
4/28 |
2487d |
28f5bfb81919
l2tp: fix tunnel lookup use-after-free race
|
KASAN: slab-out-of-bounds Read in ip6_xmit
net
|
C |
|
|
156 |
2488d |
2538d
|
4/28 |
2487d |
c113187d38ff
tls: Use correct sk->sk_prot for IPV6
|
general protection fault in pppol2tp_connect
net
|
C |
|
|
1025 |
2487d |
2536d
|
4/28 |
2487d |
28f5bfb81919
l2tp: fix tunnel lookup use-after-free race
|
WARNING in kvmalloc_node
bpf
net
|
C |
|
|
513 |
2501d |
2507d
|
4/28 |
2494d |
7fc17e909edf
bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
|
possible deadlock in rtnl_lock (4)
net
|
C |
|
|
73333 |
2497d |
2513d
|
4/28 |
2494d |
01ea306f2ac2
netfilter: drop outermost socket lock in getsockopt()
|
WARNING: kmalloc bug in cpu_map_update_elem
bpf
net
|
C |
|
|
2677 |
2494d |
2506d
|
4/28 |
2494d |
7fc17e909edf
bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
|
WARNING in kmalloc_slab (3)
net
|
C |
|
|
1901 |
2495d |
2580d
|
4/28 |
2494d |
88913bd8ea2a
kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
|
KASAN: stack-out-of-bounds Read in csum_and_copy_from_iter_full
net
|
|
|
|
1 |
2586d |
2582d
|
4/28 |
2506d |
8f659a03a0ba
net: ipv4: fix for a race condition in raw_sendmsg
|
KASAN: use-after-free Read in sock_release
net
|
|
|
|
1 |
2588d |
2584d
|
4/28 |
2506d |
a5739435b5a3
fix kcm_clone()
|
possible deadlock in flush_work (2)
net
nfs
|
|
|
|
3 |
2605d |
2608d
|
4/28 |
2506d |
528fd3547bad
SUNRPC: Destroy transport from the system workqueue
|
KASAN: stack-out-of-bounds Read in memcmp
net
|
|
|
|
1 |
2549d |
2546d
|
4/28 |
2508d |
732706afe1cc
xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
|
KASAN: stack-out-of-bounds Read in xfrm_selector_match
net
|
|
|
|
368 |
2541d |
2547d
|
4/28 |
2508d |
732706afe1cc
xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
|
WARNING: kmalloc bug in tun_device_event
net
|
C |
|
|
15 |
2512d |
2514d
|
4/28 |
2508d |
6e6e41c31122
ptr_ring: fail early if queue occupies more than KMALLOC_MAX_SIZE
0bf7800f1799
ptr_ring: try vmalloc() when kmalloc() fails
|
possible deadlock in rtnl_lock (3)
net
|
C |
|
|
3633 |
2514d |
2514d
|
4/28 |
2514d |
3f34cfae1238
netfilter: on sockopt() acquire sock lock only in the required scope
|
WARNING: bad unlock balance in ipmr_mfc_seq_stop
net
|
C |
|
|
286 |
2521d |
2567d
|
4/28 |
2515d |
4adfa79fc254
ip6mr: fix stale iterator
|
WARNING in reuseport_add_sock
net
|
C |
|
|
7 |
2529d |
2539d
|
4/28 |
2516d |
4db428a7c9ab
soreuseport: fix mem leak in reuseport_add_sock()
|
suspicious RCU usage at ./include/linux/inetdevice.h:LINE (2)
net
|
C |
|
|
4 |
2520d |
2520d
|
4/28 |
2516d |
e7aadb27a541
net: igmp: add a missing rcu locking section
|
possible deadlock in rtnl_lock (2)
net
|
C |
|
|
10369 |
2516d |
2519d
|
4/28 |
2516d |
3f34cfae1238
netfilter: on sockopt() acquire sock lock only in the required scope
|
INFO: task hung in bpf_exit_net
net
|
|
|
|
1 |
2577d |
2564d
|
4/28 |
2517d |
b6c5734db070
sctp: fix the handling of ICMP Frag Needed for too small MTUs
|
KASAN: use-after-free Read in fib6_age
net
|
|
|
|
3 |
2537d |
2539d
|
4/28 |
2517d |
591ff9ea51ce
ipv6: don't let tb6_root node share routes with other node
|
KASAN: use-after-free Read in fib6_remove_prefsrc
net
|
|
|
|
4 |
2537d |
2539d
|
4/28 |
2517d |
591ff9ea51ce
ipv6: don't let tb6_root node share routes with other node
|
KASAN: use-after-free Read in fib6_lookup_1
net
|
|
|
|
11 |
2537d |
2539d
|
4/28 |
2517d |
591ff9ea51ce
ipv6: don't let tb6_root node share routes with other node
|
KASAN: use-after-free Read in __list_add_valid (3)
kvm
net
virt
|
|
|
|
16 |
2520d |
2527d
|
4/28 |
2517d |
4cd879515d68
vhost_net: stop device during reset owner
|
INFO: trying to register non-static key in pfifo_fast_reset
net
|
C |
|
|
4 |
2563d |
2566d
|
4/28 |
2517d |
1df94c3c5dad
net_sched: properly check for empty skb array on error path
|
suspicious RCU usage at net/ipv6/ip6_fib.c:LINE
net
|
C |
|
|
56 |
2527d |
2549d
|
4/28 |
2519d |
4512c43eac7e
ipv6: remove null_entry before adding default route
|
general protection fault in __netlink_ns_capable
net
|
C |
|
|
74 |
2543d |
2549d
|
4/28 |
2520d |
f428fe4a04cc
rtnetlink: give a user socket to get_target_net()
|
KASAN: double-free or invalid-free in skb_free_head
net
virt
|
C |
|
|
13 |
2559d |
2565d
|
4/28 |
2520d |
d76c68109f37
crypto: pcrypt - fix freeing pcrypt instances
|
KASAN: slab-out-of-bounds Read in xfrm_hash_rebuild
net
|
C |
|
|
18 |
2538d |
2605d
|
4/28 |
2520d |
862591bf4f51
xfrm: skip policies marked as dead while rehashing
|
WARNING in vhost_dev_cleanup
net
virt
kvm
|
C |
|
|
4 |
2521d |
2527d
|
4/28 |
2520d |
4cd879515d68
vhost_net: stop device during reset owner
|
general protection fault in tun_queue_purge
net
|
C |
|
|
4 |
2526d |
2527d
|
4/28 |
2520d |
9fb582b67072
Revert "net: ptr_ring: otherwise safe empty checks can overrun array bounds"
|
KASAN: use-after-free Read in __xfrm_state_lookup
net
|
C |
|
|
7 |
2612d |
2611d
|
4/28 |
2520d |
cb79a180f2e7
xfrm: defer daddr pointer assignment after spi parsing
|
suspicious RCU usage at ./include/linux/inetdevice.h:LINE
net
|
|
|
|
28 |
2603d |
2611d
|
4/28 |
2520d |
25dd169aea65
fib: fib_dump_info can no longer use __in_dev_get_rtnl
|
inconsistent lock state in est_fetch_counters
net
|
C |
|
|
5829 |
2520d |
2525d
|
4/28 |
2520d |
40ca54e3a686
net_sched: gen_estimator: fix lockdep splat
|
general protection fault in fib6_add (2)
net
|
C |
|
|
3143 |
2543d |
2549d
|
4/28 |
2520d |
7bbfe00e0252
ipv6: fix general protection fault in fib6_add()
|
KASAN: use-after-free Read in erspan_build_header
net
|
C |
|
|
60 |
2520d |
2529d
|
4/28 |
2520d |
b423d13c08a6
net: erspan: fix use-after-free
|
KASAN: slab-out-of-bounds Read in erspan_build_header
net
|
C |
|
|
30 |
2520d |
2529d
|
4/28 |
2520d |
b423d13c08a6
net: erspan: fix use-after-free
|
KASAN: slab-out-of-bounds Read in erspan_xmit
net
|
C |
|
|
51 |
2527d |
2529d
|
4/28 |
2520d |
b423d13c08a6
net: erspan: fix use-after-free
|
KASAN: use-after-free Read in erspan_xmit
net
|
C |
|
|
68 |
2527d |
2529d
|
4/28 |
2520d |
b423d13c08a6
net: erspan: fix use-after-free
|
WARNING in xdp_rxq_info_unreg
bpf
net
|
C |
|
|
198 |
2529d |
2529d
|
4/28 |
2520d |
c13da21cdb80
tun: avoid calling xdp_rxq_info_unreg() twice
|
possible deadlock in rtnl_lock
net
|
C |
|
|
15711 |
2520d |
2577d
|
4/28 |
2520d |
124da8f6118b
tuntap: fix possible deadlock when fail to register netdev
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (3)
net
|
C |
|
|
10353 |
2525d |
2592d
|
4/28 |
2521d |
732706afe1cc
xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
|
WARNING in xfrm_state_fini
net
|
C |
|
|
2231 |
2536d |
2592d
|
4/28 |
2521d |
6a53b7593233
xfrm: check id proto in validate_tmpl()
|
KASAN: slab-out-of-bounds Read in __dev_queue_xmit
net
|
C |
|
|
6 |
2545d |
2533d
|
4/28 |
2523d |
7c68d1a6b4db
net: qdisc_pkt_len_init() should be more robust
|
kernel BUG at net/l2tp/l2tp_ppp.c:LINE!
net
|
C |
|
|
22 |
2527d |
2549d
|
4/28 |
2523d |
e5571240236c
kcm: Check if sk_user_data already set in kcm_attach
|
possible deadlock in vhost_chr_write_iter
kvm
net
virt
|
C |
|
|
25952 |
2527d |
2529d
|
4/28 |
2523d |
e9cb4239134c
vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
|
kernel BUG at net/core/skbuff.c:LINE! (2)
net
|
C |
|
|
562 |
2525d |
2614d
|
4/28 |
2523d |
02612bb05e51
pppoe: take ->needed_headroom of lower device into account on xmit
|
KASAN: use-after-free Read in psock_write_space
net
|
C |
|
|
6 |
2532d |
2543d
|
4/28 |
2523d |
581e7226a5d4
kcm: Only allow TCP sockets to be attached to a KCM mux
|
KASAN: use-after-free Read in fib6_add_1
net
|
C |
|
|
4 |
2537d |
2539d
|
4/28 |
2527d |
591ff9ea51ce
net-backports: ipv6: don't let tb6_root node share routes with other node
|
KASAN: stack-out-of-bounds Read in __nla_put
net
|
C |
|
|
57 |
2532d |
2535d
|
4/28 |
2530d |
cd443f1e91ca
netlink: reset extack earlier in netlink_rcv_skb
|
general protection fault in strlen
net
|
C |
|
|
53 |
2532d |
2534d
|
4/28 |
2530d |
cd443f1e91ca
netlink: reset extack earlier in netlink_rcv_skb
|
BUG: unable to handle kernel paging request in dst_release
net
|
|
|
|
113 |
2535d |
2540d
|
4/28 |
2530d |
95ef498d977b
ipv6: ip6_make_skb() needs to clear cork.base.dst
|
KASAN: use-after-free Read in fib6_ifup (2)
net
|
C |
|
|
18 |
2536d |
2533d
|
4/28 |
2530d |
591ff9ea51ce
ipv6: don't let tb6_root node share routes with other node
|
KASAN: use-after-free Read in tls_sk_proto_close
net
|
C |
|
|
9 |
2535d |
2543d
|
4/28 |
2530d |
d91c3e17f75f
net/tls: Only attach to sockets in ESTABLISHED state
|
BUG: sleeping function called from invalid context at ./include/linux/percpu-rwsem.h:LINE
net
|
|
|
|
20 |
2538d |
2546d
|
4/28 |
2530d |
b1bdcb59b64f
xfrm: don't call xfrm_policy_cache_flush while holding spinlock
|
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (2)
net
|
C |
|
|
174 |
2531d |
2610d
|
4/28 |
2530d |
2f10a61cee8f
xfrm: fix rcu usage in xfrm_get_type_offload
|
kernel BUG at ./include/linux/skbuff.h:LINE!
net
|
C |
|
|
4502 |
2535d |
2548d
|
4/28 |
2530d |
374d1b5a81f7
esp: Fix GRO when the headers not fully in the linear part of the skb.
|
general protection fault in ip6_xmit
net
|
|
|
|
16 |
2531d |
2532d
|
4/28 |
2530d |
591ff9ea51ce
ipv6: don't let tb6_root node share routes with other node
|
WARNING in netlink_ack (2)
net
|
C |
|
|
6 |
2542d |
2541d
|
4/28 |
2530d |
cbbdf8433a5f
netlink: extack needs to be reset each time through loop
|
KASAN: use-after-free Read in rt6_mtu_change_route
net
|
|
|
|
5 |
2537d |
2540d
|
3/28 |
2533d |
4512c43eac7e
ipv6: remove null_entry before adding default route
|
KASAN: use-after-free Read in fib6_ifdown
net
|
C |
|
|
26 |
2536d |
2540d
|
3/28 |
2533d |
4512c43eac7e
ipv6: remove null_entry before adding default route
|
WARNING in strp_data_ready
net
|
C |
|
|
59034 |
2549d |
2620d
|
3/28 |
2534d |
d66fa9ec53c4
strparser: Call sock_owned_by_user_nocheck
|
INFO: task hung in cleanup_net
net
|
|
|
|
1 |
2576d |
2564d
|
3/28 |
2549d |
21b594435005
net: Fix double free and memory corruption in get_net_ns_by_id()
|
WARNING in refcount_dec (2)
net
|
|
|
|
1 |
2590d |
2590d
|
3/28 |
2556d |
15fe076edea7
net/packet: fix a race in packet_bind() and packet_notifier()
|
kernel BUG at net/packet/af_packet.c:LINE! (2)
net
|
|
|
|
2 |
2580d |
2582d
|
3/28 |
2556d |
8e1611e23579
make sock_alloc_file() do sock_release() on failures
|
WARNING in netlink_ack
net
|
C |
|
|
6 |
2559d |
2560d
|
3/28 |
2556d |
48044eb490be
netlink: fix netlink_ack() extack race
|
general protection fault in fanout_demux_rollover
net
|
|
|
|
3 |
2588d |
2608d
|
3/28 |
2575d |
57f015f5eccf
packet: fix crash in fanout_demux_rollover()
|
kernel BUG at net/core/dev.c:LINE!
net
|
C |
|
|
5 |
2586d |
2591d
|
3/28 |
2575d |
15fe076edea7
net-backports: net/packet: fix a race in packet_bind() and packet_notifier()
|
BUG: unable to handle kernel paging request in vsock_diag_dump
net
virt
|
C |
|
|
6 |
2617d |
2620d
|
3/28 |
2585d |
c1eef220c176
vsock: always call vsock_init_tables()
|
WARNING in tun_get_user
net
|
C |
|
|
17398 |
2602d |
2627d
|
3/28 |
2585d |
010f245b9dd7
net-backports: tun: relax check on eth_get_headlen() return value
|
KASAN: use-after-free Write in detach_if_pending
net
|
C |
|
|
4169 |
2622d |
2617d
|
3/28 |
2585d |
ee74d9967b82
tun: do not arm flow_gc_timer in tun_flow_init()
|
KASAN: use-after-free Read in tcp_ack
net
|
|
|
|
68 |
2598d |
2600d
|
3/28 |
2585d |
50895b9de1d3
net-backports: tcp: highest_sack fix
|
INFO: trying to register non-static key. (2)
net
|
C |
|
|
8624 |
2604d |
2606d
|
3/28 |
2585d |
9eba9353388d
tcp: fix a lockdep issue in tcp_fastopen_reset_cipher()
|
KASAN: use-after-free Read in free_netdev
net
|
C |
|
|
42 |
2602d |
2626d
|
3/28 |
2585d |
aec72f3392b1
net-tun: fix panics at dismantle time
|
WARNING in fib6_add
net
|
C |
|
|
8225 |
2602d |
2626d
|
3/28 |
2585d |
2ea2352ede9d
ipv6: prevent user from adding cached routes
|
WARNING in tcp_update_reordering
net
|
|
|
|
748 |
2595d |
2592d
|
3/28 |
2592d |
0eb96bf754d7
tcp: fix tcp_fastretrans_alert warning
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (2)
net
|
C |
|
|
93 |
2603d |
2611d
|
3/28 |
2595d |
c9f3f813d462
xfrm: Fix stack-out-of-bounds read in xfrm_state_find.
|
WARNING in refcount_add_not_zero
net
|
|
|
|
70 |
2595d |
2612d
|
3/28 |
2595d |
7ec318feeed1
tcp: gso: avoid refcount_t warning from tcp_gso_segment()
|
INFO: rcu detected stall (2)
net
|
C |
|
|
56 |
2602d |
2614d
|
3/28 |
2602d |
93161922c658
net-backports: tun/tap: sanitize TUNSETSNDBUF input
|
WARNING in reuseport_alloc
net
|
C |
|
|
408 |
2602d |
2626d
|
3/28 |
2602d |
1b5f962e71bf
soreuseport: fix initialization race
|
general protection fault in ip6_setup_cork
net
|
|
|
|
56 |
2617d |
2626d
|
3/28 |
2602d |
864e2a1f8aac
net-backports: ipv6: flowlabel: do not leave opt->tot_len with garbage
|
WARNING in refcount_dec
net
|
|
|
|
9 |
2602d |
2626d
|
3/28 |
2602d |
e669b8694547
ipv6: addrconf: increment ifp refcount before ipv6_del_addr()
|
KASAN: use-after-free Read in packet_getsockopt (2)
net
|
syz |
|
|
12 |
2616d |
2624d
|
3/28 |
2602d |
509c7a1ecc86
packet: avoid panic in packet_getsockopt()
|
KASAN: use-after-free Read in ip_queue_xmit
net
|
|
|
|
1 |
2627d |
2627d
|
3/28 |
2602d |
c92e8c02fe66
net-backports: tcp/dccp: fix ireq->opt races
|
WARNING in kmalloc_slab
net
|
C |
|
|
22353 |
2620d |
2692d
|
3/28 |
2620d |
81fbfe8adaf3
ptr_ring: use kmalloc_array()
|