INFO: rcu detected stall in neigh_timer_handler (8)
net
|
C |
done |
done |
72 |
55d |
114d
|
27/28 |
never |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
KASAN: slab-use-after-free Read in unix_stream_read_actor (2)
net
|
C |
inconclusive |
|
4 |
35d |
30d
|
27/28 |
never |
5aa57d9f2d53
af_unix: Don't return OOB skb in manage_oob().
|
WARNING in __dev_queue_xmit (4)
net
|
C |
|
|
382 |
1d01h |
30d
|
27/28 |
never |
9d301de12da6
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
|
WARNING in bond_xdp_get_xmit_slave (2)
net
|
|
|
|
124 |
16d |
117d
|
26/28 |
never |
0cbfd45fbcf0
bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()
|
KMSAN: uninit-value in erspan_build_header (2)
net
|
C |
|
|
45 |
16d |
197d
|
1/28 |
never |
bpf: Don't redirect too small packets
|
general protection fault in rt6_disable_ip
net
|
|
|
|
1 |
23d |
23d
|
25/28 |
never |
04ccecfa959d
UPSTREAM: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
|
kernel BUG in __sock_sendmsg
net
|
C |
|
|
111 |
32d |
49d
|
27/28 |
never |
fe1910f9337b
tcp_bpf: fix return value of tcp_bpf_sendmsg()
|
linux-next test error: WARNING in rcu_core
net
virt
|
|
|
|
16 |
56d |
64d
|
27/28 |
never |
b8c8ba73c68b
slub: Introduce CONFIG_SLUB_RCU_DEBUG
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (3)
bpf
net
|
C |
done |
|
6 |
84d |
83d
|
27/28 |
never |
92de36080c93
bpf: Fail verification for sign-extension of packet data/data_end/data_meta
|
UBSAN: array-index-out-of-bounds in cake_enqueue
net
|
|
|
|
1 |
48d |
47d
|
27/28 |
never |
546ea84d07e3
sched: sch_cake: fix bulk flow accounting logic for host fairness
|
general protection fault in dev_map_enqueue (2)
bpf
net
|
C |
error |
done |
336 |
65d |
131d
|
2/28 |
never |
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
|
WARNING in ethnl_req_get_phydev
net
|
C |
done |
|
73 |
38d |
40d
|
27/28 |
never |
cff69f72d333
ethtool: pse-pd: move pse validation into set
|
general protection fault in hsr_proxy_announce
net
|
|
|
|
2 |
30d |
29d
|
27/28 |
never |
a7789fd4caaf
net: hsr: prevent NULL pointer dereference in hsr_proxy_announce()
|
WARNING: lock held when returning to user space in ethnl_act_cable_test
net
|
C |
done |
|
43 |
38d |
40d
|
27/28 |
never |
3d6a0c4f4552
net: fix unreleased lock in cable test
|
WARNING: refcount bug in ethnl_phy_done
net
|
C |
done |
|
4 |
24d |
24d
|
27/28 |
never |
1ad84a151af7
net: ethtool: phy: Don't set the context dev pointer for unfiltered DUMP
|
general protection fault in ethnl_phy_doit
net
|
C |
done |
|
6 |
24d |
24d
|
25/28 |
never |
fce1e9f86af1
net: ethtool: phy: Check the req_info.pdn field for GET commands
|
general protection fault in __smc_diag_dump (2)
net
s390
|
|
|
|
8 |
1h14m |
37d
|
26/28 |
never |
98d4435efcbf
net/smc: prevent NULL pointer dereference in txopt_get
|
WARNING in vmap_pages_range_noflush (2)
net
bpf
|
C |
error |
|
250 |
774d |
776d
|
1/28 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
WARNING in hsr_fill_frame_info
net
|
C |
error |
|
80 |
7d21h |
36d
|
27/28 |
never |
430d67bdcb04
net: hsr: Use the seqnr lock for frames received via interlink port.
|
WARNING in pppol2tp_release
net
|
|
|
|
3 |
57d |
61d
|
27/28 |
never |
c1b2e36b8776
l2tp: flush workqueue before draining it
|
WARNING in l2tp_udp_encap_destroy
net
|
|
|
|
3 |
57d |
55d
|
27/28 |
never |
c1b2e36b8776
l2tp: flush workqueue before draining it
|
WARNING in sock_map_close (2)
net
bpf
|
C |
done |
|
3 |
44d |
43d
|
27/28 |
never |
1461f5a3d810
l2tp: avoid overriding sk->sk_user_data
|
KMSAN: uninit-value in gtp_dev_xmit
net
|
|
|
|
3 |
67d |
67d
|
27/28 |
never |
3a3be7ff9224
gtp: pull network headers in gtp_dev_xmit()
|
KASAN: use-after-free Read in ila_nf_input (2)
net
|
|
|
|
10 |
15h11m |
34d
|
26/28 |
never |
031ae72825ce
ila: call nf_unregister_net_hooks() sooner
|
general protection fault in reuseport_add_sock (3)
net
|
C |
done |
|
3 |
68d |
67d
|
28/28 |
1d21h |
9ab0faa7f9ff
sctp: Fix null-ptr-deref in reuseport_add_sock().
|
BUG: stack guard page was hit in vsock_bpf_recvmsg
net
virt
|
C |
done |
|
6 |
56d |
56d
|
28/28 |
1d21h |
69139d2919dd
vsock: fix recursive ->recvmsg calls
|
BUG: unable to handle kernel paging request in net_generic
net
|
|
|
|
1 |
76d |
72d
|
28/28 |
1d21h |
86a41ea9fd79
l2tp: fix lockdep splat
|
WARNING: refcount bug in inet_twsk_kill
net
|
|
|
|
5 |
55d |
55d
|
28/28 |
1d21h |
565d121b6998
tcp: prevent concurrent execution of tcp_sk_exit_batch
|
KASAN: slab-use-after-free Read in kcm_release
net
|
C |
|
|
2 |
110d |
150d
|
28/28 |
1d21h |
807067bf014d
kcm: Serialise kcm_sendmsg() for the same socket.
|
WARNING in tcp_sk_exit_batch
net
|
|
|
|
3 |
52d |
89d
|
28/28 |
1d21h |
565d121b6998
tcp: prevent concurrent execution of tcp_sk_exit_batch
|
WARNING in skb_warn_bad_offload (5)
net
|
C |
done |
|
18 |
48d |
81d
|
28/28 |
1d21h |
30b03f2a0592
udp: Fall back to software USO if IPv6 extension headers are present
|
WARNING: refcount bug in get_taint
net
|
|
|
|
2 |
40d |
65d
|
27/28 |
40d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
WARNING: refcount bug in sk_common_release
net
|
C |
|
|
9 |
64d |
80d
|
27/28 |
40d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
WARNING: refcount bug in inet_create
net
|
C |
done |
|
10 |
66d |
93d
|
27/28 |
40d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
KASAN: stack-out-of-bounds Read in xdp_do_check_flushed
bpf
net
|
C |
done |
|
127 |
64d |
84d
|
27/28 |
43d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __dev_flush
net
bpf
|
C |
|
|
35 |
64d |
78d
|
27/28 |
43d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KMSAN: uninit-value in tcf_ct_flow_table_get
net
|
C |
|
|
603 |
64d |
72d
|
27/28 |
43d |
2191a54f6322
sched: act_ct: take care of padding in struct zones_ht_key
|
general protection fault in bq_flush_to_queue
bpf
net
|
|
|
|
22 |
64d |
73d
|
27/28 |
43d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
KASAN: slab-use-after-free Read in bq_xmit_all
bpf
net
|
C |
done |
|
29 |
64d |
78d
|
27/28 |
43d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __xsk_map_flush
bpf
net
|
C |
done |
|
26 |
64d |
81d
|
27/28 |
43d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
general protection fault in __cpu_map_flush
bpf
net
|
C |
inconclusive |
|
25 |
64d |
78d
|
27/28 |
43d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
divide error in tcp_rcv_space_adjust (3)
net
|
C |
done |
|
3 |
156d |
158d
|
27/28 |
51d |
94062790aedb
UPSTREAM: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
|
upstream test error: KMSAN: uninit-value in receive_buf
net
virt
|
|
|
|
351 |
77d |
132d
|
27/28 |
51d |
840b2d39a2dc
virtio_ring: fix KMSAN error for premapped mode
|
WARNING in __skb_flow_dissect (6)
net
|
|
|
|
1 |
151d |
151d
|
27/28 |
51d |
b975d3ee5962
net: add and use skb_get_hash_net
|
general protection fault in xdp_do_generic_redirect
net
bpf
|
|
|
|
8 |
88d |
92d
|
27/28 |
52d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
general protection fault in dev_map_redirect
bpf
net
|
C |
|
|
362 |
88d |
95d
|
27/28 |
52d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in dev_hash_map_redirect
bpf
net
|
C |
done |
|
29 |
88d |
95d
|
27/28 |
52d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
WARNING in __ip6_make_skb (2)
net
|
C |
done |
|
104 |
116d |
131d
|
27/28 |
52d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
general protection fault in xdp_do_redirect
bpf
net
|
|
|
|
15 |
89d |
95d
|
27/28 |
52d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
KASAN: slab-use-after-free Read in l2tp_tunnel_del_work
net
|
C |
done |
|
99 |
88d |
102d
|
27/28 |
52d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
stack segment fault in bpf_xdp_redirect
bpf
net
|
C |
|
|
181 |
88d |
95d
|
27/28 |
52d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
stack segment fault in cpu_map_redirect
net
bpf
|
C |
done |
|
11 |
88d |
87d
|
27/28 |
52d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
KASAN: slab-use-after-free Write in l2tp_session_delete
net
|
C |
done |
|
1286 |
82d |
101d
|
27/28 |
52d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
KMSAN: uninit-value in vsock_assign_transport (2)
net
virt
|
C |
|
|
14 |
113d |
169d
|
27/28 |
52d |
1e1fdcbdde3b
vhost/vsock: always initialize seqpacket_allow
|
WARNING in __ip_make_skb
net
|
C |
done |
|
54 |
116d |
130d
|
27/28 |
52d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
general protection fault in coalesce_fill_reply
net
|
C |
done |
|
27 |
95d |
101d
|
27/28 |
52d |
74d6529b78f7
net: ethtool: Fix the panic caused by dev being null when dumping coalesce
|
WARNING in bpf_lwt_seg6_adjust_srh
bpf
net
|
C |
done |
|
30 |
87d |
101d
|
27/28 |
52d |
c13fda93aca1
bpf: Remove tst_run from lwt_seg6local_prog_ops.
|
general protection fault in find_match (5)
net
|
|
|
|
2 |
117d |
117d
|
26/28 |
87d |
b86762dbe19a
ipv6: prevent possible NULL dereference in rt6_probe()
|
possible deadlock in br_forward_delay_timer_expired (2)
net
|
|
|
|
1 |
107d |
107d
|
26/28 |
87d |
62e58ddb1465
net: add softirq safety to netdev_rename_lock
|
general protection fault in xfrm6_get_saddr (2)
net
|
|
|
|
1 |
117d |
117d
|
26/28 |
87d |
d46401052c2d
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
|
INFO: task hung in devinet_ioctl (5)
net
|
|
|
|
59 |
87d |
113d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in addrconf_dad_work (4)
net
|
|
|
|
2632 |
88d |
138d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
general protection fault in fib6_nh_init (2)
net
|
|
|
|
2 |
108d |
113d
|
26/28 |
87d |
2eab4543a220
ipv6: prevent possible NULL deref in fib6_nh_init()
|
INFO: task hung in linkwatch_event (3)
net
|
|
|
|
1634 |
88d |
682d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in register_nexthop_notifier (3)
net
|
|
|
|
44 |
91d |
201d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in rfkill_global_led_trigger_worker (2)
net
nfc
|
C |
error |
|
1362 |
88d |
689d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in rtnetlink_rcv_msg
net
|
C |
inconclusive |
inconclusive |
1970 |
88d |
2051d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in addrconf_verify_work (8)
net
|
C |
error |
|
1294 |
87d |
291d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in mpls_net_exit (2)
net
|
|
|
|
50 |
93d |
114d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
INFO: task hung in switchdev_deferred_process_work (2)
net
|
C |
inconclusive |
|
1226 |
88d |
1530d
|
26/28 |
87d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
BUG: soft lockup in inet6_rtm_newroute
net
|
|
|
|
1 |
104d |
104d
|
26/28 |
87d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
WARNING in skb_ensure_writable
bpf
net
|
C |
done |
|
2893 |
88d |
165d
|
26/28 |
87d |
2bbe3e5a2f4e
bpf: Avoid splat in pskb_pull_reason
|
possible deadlock in __sock_map_delete
bpf
net
|
C |
|
|
14 |
130d |
174d
|
26/28 |
96d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
WARNING in geneve_xmit
net
|
C |
done |
|
42 |
162d |
169d
|
26/28 |
106d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
general protection fault in ip6_pol_route
net
|
|
|
|
73 |
109d |
147d
|
26/28 |
109d |
b01e1c030770
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
general protection fault in __fib6_drop_pcpu_from (5)
net
|
|
|
|
467 |
109d |
154d
|
26/28 |
109d |
b01e1c030770
ipv6: fix possible race in __fib6_drop_pcpu_from()
|
WARNING in packet_setsockopt
net
|
C |
|
|
83 |
144d |
183d
|
26/28 |
113d |
86d43e2bf93c
af_packet: avoid a false positive warning in packet_setsockopt()
|
kernel BUG in dev_gro_receive
net
|
C |
done |
|
72 |
126d |
143d
|
25/28 |
116d |
be008726d0ac
net: gro: initialize network_offset in network layer
|
KMSAN: uninit-value in nci_ntf_packet (2)
nfc
net
|
C |
|
|
13 |
118d |
131d
|
25/28 |
116d |
068648aab72c
nfc/nci: Add the inconsistency check between the input data length and count
|
WARNING in sock_map_close
bpf
net
|
C |
error |
|
182 |
116d |
179d
|
25/28 |
116d |
4b4647add7d3
sock_map: avoid race between sock_map_close and sk_psock_put
|
possible deadlock in sock_hash_delete_elem (2)
bpf
net
|
C |
|
|
1127 |
117d |
199d
|
25/28 |
116d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
INFO: rcu detected stall in packet_release
net
|
C |
unreliable |
|
1 |
208d |
131d
|
25/28 |
116d |
fb66df20a720
net/sched: taprio: extend minimum interval restriction to entire cycle too
|
INFO: trying to register non-static key in __timer_delete_sync (2)
net
|
C |
|
|
45524 |
143d |
161d
|
25/28 |
119d |
3c668cef61ad
net: hsr: init prune_proxy_timer sooner
|
WARNING in __inet_accept
net
|
C |
done |
|
3 |
138d |
138d
|
25/28 |
121d |
26afda78cda3
UPSTREAM: net: relax socket state check at accept time.
|
general protection fault in ip6_output
net
|
|
|
|
4 |
155d |
174d
|
25/28 |
121d |
4db783d68b9b
ipv6: prevent NULL dereference in ip6_output()
|
KMSAN: uninit-value in nci_rx_work
net
nfc
|
C |
|
|
582 |
122d |
277d
|
25/28 |
121d |
e4a87abf5885
nfc: nci: Fix uninit-value in nci_rx_work
|
KASAN: slab-use-after-free Read in unix_del_edges
net
|
C |
done |
|
2 |
169d |
169d
|
25/28 |
121d |
1af2dface5d2
af_unix: Don't access successor in unix_del_edges() during GC.
|
general protection fault in fib6_rule_action
net
|
|
|
|
1 |
170d |
170d
|
25/28 |
121d |
d101291b2681
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
|
KMSAN: uninit-value in dev_map_lookup_elem
bpf
net
|
C |
|
|
3 |
187d |
194d
|
25/28 |
121d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
KMSAN: uninit-value in unwind_dump
net
|
|
|
|
1 |
172d |
168d
|
25/28 |
121d |
90d1f14cbb9d
kmsan: compiler_types: declare __no_sanitize_or_inline
|
KMSAN: uninit-value in sock_map_delete_elem
bpf
net
|
C |
|
|
44 |
123d |
193d
|
25/28 |
121d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
possible deadlock in sch_direct_xmit (4)
net
|
|
|
|
1 |
160d |
160d
|
25/28 |
121d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
WARNING in qdisc_alloc
net
|
C |
error |
|
1069 |
144d |
158d
|
25/28 |
121d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
KASAN: global-out-of-bounds Read in __nla_validate_parse
net
|
C |
|
|
5 |
180d |
180d
|
25/28 |
121d |
8750539ba317
net: team: fix incorrect maxattr
|
KASAN: slab-use-after-free Read in vhost_task_fn
kvm
net
virt
|
C |
done |
|
2661 |
156d |
158d
|
25/28 |
121d |
db5247d9bf5c
vhost_task: Handle SIGKILL by flushing work and exiting
|
KMSAN: uninit-value in geneve_xmit (3)
net
|
C |
|
|
14 |
177d |
185d
|
25/28 |
135d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
KMSAN: kernel-infoleak in __skb_datagram_iter (3)
net
|
C |
|
|
25 |
138d |
192d
|
25/28 |
135d |
d313eb8b7755
net/sched: act_skbmod: prevent kernel-infoleak
|
KMSAN: uninit-value in gre_rcv (3)
net
|
C |
|
|
3 |
190d |
191d
|
25/28 |
135d |
17af420545a7
erspan: make sure erspan_base_hdr is present in skb->head
|
KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue
bpf
net
|
|
|
|
1 |
204d |
196d
|
25/28 |
135d |
6648e613226e
bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
|
KASAN: slab-out-of-bounds Read in nfc_llcp_setsockopt
net
nfc
|
C |
error |
|
5 |
173d |
181d
|
25/28 |
135d |
7a87441c9651
nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
|
possible deadlock in tty_port_tty_get (2)
bpf
net
|
|
|
|
3 |
178d |
197d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_delete_elem
bpf
net
|
C |
|
|
17183 |
162d |
200d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in scheduler_tick (3)
bpf
net
|
C |
|
|
1179 |
162d |
198d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in pit_timer_fn
bpf
net
|
|
|
|
7 |
173d |
184d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in rcu_exp_handler
bpf
net
|
C |
|
|
1 |
175d |
171d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in rcu_report_exp_cpu_mult
net
bpf
|
C |
done |
|
30 |
163d |
201d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in try_to_wake_up (4)
bpf
net
|
C |
error |
|
19 |
137d |
200d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in ahci_single_level_irq_intr
bpf
net
|
C |
|
|
10 |
184d |
192d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_map_unref
bpf
net
|
C |
error |
|
97 |
162d |
176d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in __lock_task_sighand (2)
bpf
net
|
C |
|
|
1476 |
136d |
200d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in sock_hash_delete_elem
bpf
net
|
C |
done |
|
16982 |
162d |
200d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in hrtimer_run_queues
net
bpf
|
C |
error |
|
592 |
162d |
199d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in swake_up_one
bpf
net
|
C |
|
|
4 |
174d |
172d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
WARNING in _prb_commit
net
bpf
|
|
|
|
4 |
173d |
169d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in posix_timer_fn (2)
net
bpf
|
|
|
|
1 |
176d |
172d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
possible deadlock in drm_handle_vblank
bpf
net
|
|
|
|
30 |
173d |
198d
|
25/28 |
135d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
KASAN: slab-out-of-bounds Read in xsk_setsockopt
bpf
net
|
C |
|
|
17 |
175d |
183d
|
25/28 |
135d |
237f3cf13b20
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
|
KMSAN: uninit-value in ipvlan_queue_xmit (2)
net
|
C |
|
|
2 |
209d |
170d
|
25/28 |
135d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
possible deadlock in __unix_gc
net
|
C |
done |
|
5 |
162d |
164d
|
25/28 |
135d |
1971d13ffa84
af_unix: Suppress false-positive lockdep splat for spin_lock() in __unix_gc().
|
WARNING in gre_tap_xmit (2)
net
|
C |
done |
|
67 |
143d |
169d
|
25/28 |
135d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
general protection fault in dev_map_enqueue
bpf
net
|
C |
|
|
676 |
135d |
192d
|
25/28 |
135d |
5bcf0dcbf906
xdp: use flags field to disambiguate broadcast redirect
|
KMSAN: uninit-value in nci_ntf_packet
net
nfc
|
C |
|
|
79 |
137d |
277d
|
25/28 |
135d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
possible deadlock in unix_del_edges
net
|
C |
|
|
49 |
179d |
183d
|
25/28 |
135d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
KMSAN: uninit-value in nci_dev_up
nfc
net
|
C |
|
|
7 |
194d |
253d
|
25/28 |
135d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
possible deadlock in unix_notinflight
net
|
C |
|
|
7 |
162d |
177d
|
25/28 |
135d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
INFO: task hung in netlink_dump (4)
net
|
|
|
|
72 |
180d |
220d
|
25/28 |
175d |
00af2aa93b76
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
|
INFO: task hung in devinet_ioctl (4)
net
|
|
|
|
5 |
206d |
207d
|
25/28 |
175d |
00af2aa93b76
net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()
|
WARNING in cleanup_net (3)
net
|
syz |
|
|
240 |
176d |
310d
|
25/28 |
176d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
WARNING in net_free (2)
net
|
syz |
|
|
27 |
182d |
229d
|
25/28 |
176d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
KMSAN: uninit-value in ip_tunnel_rcv (2)
net
|
|
|
|
1 |
212d |
212d
|
25/28 |
177d |
b0ec2abf9826
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
|
possible deadlock in sch_direct_xmit (3)
net
|
|
|
|
1 |
236d |
236d
|
25/28 |
177d |
0bef512012b1
UPSTREAM: net: add netdev_lockdep_set_classes() to virtual drivers
|
KMSAN: uninit-value in cookie_v4_check
net
|
C |
|
|
9 |
200d |
205d
|
25/28 |
177d |
956c0d619107
tcp: Clear req->syncookie in reqsk_alloc().
|
KASAN: slab-use-after-free Read in rt6_fill_node
net
|
|
|
|
1 |
229d |
229d
|
25/28 |
178d |
685f7d531264
net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
|
KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt
net
|
|
|
|
1 |
205d |
204d
|
25/28 |
178d |
6ebfad33161a
packet: annotate data-races around ignore_outgoing
|
UBSAN: shift-out-of-bounds in taprio_change
net
|
C |
done |
|
4 |
207d |
207d
|
25/28 |
178d |
343041b59b78
net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
|
WARNING: suspicious RCU usage in in6_dump_addrs (2)
net
|
C |
done |
|
3 |
220d |
220d
|
25/28 |
178d |
67ea41d19d2a
inet6: expand rcu_read_lock() scope in inet6_dump_addr()
|
KMSAN: uninit-value in hsr_get_node (2)
net
|
C |
|
|
49 |
179d |
265d
|
25/28 |
178d |
ddbec99f5857
hsr: Fix uninit-value access in hsr_get_node()
|
WARNING in mpls_gso_segment
net
|
C |
done |
|
20 |
224d |
227d
|
25/28 |
178d |
025f8ad20f2e
net: mpls: error out if inner headers are not set
|
BUG: unable to handle kernel NULL pointer dereference in dev_map_hash_update_elem
bpf
net
|
C |
|
|
2 |
222d |
229d
|
25/28 |
178d |
281d464a34f5
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
|
WARNING in sk_nulls_del_node_init_rcu
net
|
|
|
|
1 |
212d |
210d
|
25/28 |
178d |
04d9d1fc428a
tcp: Fix refcnt handling in __inet_hash_connect().
|
KMSAN: uninit-value in geneve_udp_encap_recv
net
|
C |
|
|
2 |
223d |
253d
|
25/28 |
178d |
1ca1ba465e55
geneve: make sure to pull inner header in geneve_rx()
|
kernel BUG in __nla_validate_parse
net
|
C |
done |
|
13 |
207d |
209d
|
25/28 |
178d |
d8a21070b6e1
nexthop: Fix out-of-bounds access during attribute validation
|
BUG: sleeping function called from invalid context in __lock_sock_fast (2)
net
|
C |
|
|
6 |
217d |
219d
|
25/28 |
186d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
possible deadlock in tcp_diag_get_aux
net
|
C |
|
|
117 |
211d |
228d
|
25/28 |
186d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
kernel BUG in eth_header (2)
net
|
C |
|
|
2 |
262d |
262d
|
25/28 |
186d |
dad555c816a5
llc: make llc_ui_sendmsg() more robust against bonding changes
|
BUG: unable to handle kernel NULL pointer dereference in unix_stream_sendmsg
bpf
net
|
C |
|
|
1 |
221d |
221d
|
25/28 |
186d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
BUG: unable to handle kernel NULL pointer dereference in sk_psock_verdict_data_ready
net
bpf
|
C |
unreliable |
|
15 |
216d |
336d
|
25/28 |
186d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
possible deadlock in unix_set_peek_off
net
|
|
|
|
8 |
226d |
231d
|
25/28 |
190d |
56667da7399e
net: implement lockless setsockopt(SO_PEEK_OFF)
|
INFO: task hung in unix_stream_sendmsg
net
|
C |
done |
|
4 |
227d |
230d
|
25/28 |
190d |
aa82ac51d633
af_unix: Drop oob_skb ref before purging queue in GC.
|
possible deadlock in __unix_dgram_recvmsg (2)
net
|
|
|
|
3 |
229d |
231d
|
25/28 |
190d |
56667da7399e
net: implement lockless setsockopt(SO_PEEK_OFF)
|
WARNING in send_hsr_supervision_frame (3)
net
|
|
|
|
153 |
254d |
689d
|
25/28 |
190d |
37e8c97e5390
net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
|
memory leak in pppoe_sendmsg
net
|
C |
|
|
26 |
282d |
1954d
|
25/28 |
190d |
dc34ebd5c018
pppoe: Fix memory leak in pppoe_sendmsg()
|
WARNING in __unix_gc
net
|
C |
|
|
49 |
239d |
245d
|
25/28 |
190d |
1279f9d9dec2
af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.
|
bpf test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
4 |
256d |
256d
|
25/28 |
191d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
net test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
21 |
256d |
258d
|
25/28 |
191d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
linux-next test error: INFO: trying to register non-static key in inet_csk_listen_stop
net
|
|
|
|
12 |
255d |
257d
|
25/28 |
191d |
435e202d645c
ipv6: init the accept_queue's spinlocks in inet6_create
|
possible deadlock in skb_queue_tail (6)
net
|
|
|
|
1 |
251d |
251d
|
25/28 |
191d |
4d322dce82a1
UPSTREAM: af_unix: fix lockdep positive in sk_diag_dump_icons()
|
memory leak in virtual_ncidev_write (2)
net
nfc
|
C |
|
|
2 |
290d |
451d
|
25/28 |
192d |
bfb007aebe6b
nfc: nci: free rx_data_reassembly skb on NCI device cleanup
|
KMSAN: uninit-value in IP6_ECN_decapsulate (2)
net
|
C |
|
|
3 |
243d |
258d
|
25/28 |
192d |
8d975c15c0cd
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
|
INFO: task hung in rtnl_lock (3)
net
|
C |
|
|
128 |
197d |
549d
|
25/28 |
192d |
3871aa01e1a7
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
|
WARNING in inet_csk_destroy_sock (5)
net
|
|
|
|
1 |
258d |
258d
|
25/28 |
192d |
66b60b0c8c4a
dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().
|
KMSAN: uninit-value in geneve_xmit (2)
net
|
C |
|
|
12 |
197d |
275d
|
25/28 |
193d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
WARNING in ip6gre_tunnel_xmit
net
|
C |
done |
|
2 |
223d |
223d
|
25/28 |
193d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
KASAN: use-after-free Read in __skb_flow_dissect (3)
net
|
C |
|
|
1 |
267d |
277d
|
25/28 |
193d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
INFO: task hung in nsim_create
net
|
|
|
|
1 |
242d |
242d
|
25/28 |
193d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
INFO: task hung in addrconf_dad_work (3)
net
|
C |
|
|
185 |
207d |
248d
|
25/28 |
193d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
KMSAN: kernel-infoleak in __skb_datagram_iter (2)
net
|
C |
|
|
126 |
194d |
245d
|
25/28 |
193d |
661779e1fcaf
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
|
INFO: task hung in unix_dgram_sendmsg
net
|
C |
done |
|
36 |
220d |
238d
|
25/28 |
194d |
25236c91b5ab
af_unix: Fix task hung while purging oob_skb in GC.
|
KMSAN: uninit-value in __llc_lookup_established
net
|
C |
|
|
46 |
261d |
304d
|
25/28 |
194d |
e3f9bed9bee2
llc: Drop support for ETH_P_TR_802_2.
|
KMSAN: uninit-value in tcp_recvmsg (3)
net
|
|
|
|
1 |
280d |
267d
|
25/28 |
238d |
78fbb92af27d
nbd: always initialize struct msghdr completely
|
KASAN: slab-use-after-free Write in fib6_purge_rt
net
|
|
|
|
1 |
316d |
316d
|
25/28 |
247d |
5a08d0065a91
ipv6: add debug checks in fib6_info_release()
|
KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim (2)
net
|
C |
|
|
17 |
248d |
274d
|
25/28 |
247d |
d375b98e0248
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
|
KASAN: slab-use-after-free Read in nla_find
bpf
net
|
C |
done |
|
4 |
292d |
291d
|
25/28 |
248d |
2130c519a401
bpf: Use nla_ok() instead of checking nla_len directly
|
KASAN: slab-use-after-free Read in nfc_alloc_send_skb
net
nfc
|
C |
error |
|
3 |
301d |
331d
|
25/28 |
248d |
c95f919567d6
nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local
|
KCSAN: data-race in udpv6_sendmsg / udpv6_sendmsg (6)
net
|
|
|
|
1 |
270d |
267d
|
25/28 |
248d |
482521d8e0c6
udp: annotate data-races around up->pending
|
WARNING in ip6_route_multipath_add
net
|
|
|
|
1 |
299d |
299d
|
25/28 |
248d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
general protection fault in hfsc_tcf_block
net
|
C |
done |
|
1020 |
271d |
279d
|
25/28 |
248d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
WARNING in __sk_msg_free
bpf
net
|
C |
done |
|
4 |
275d |
273d
|
25/28 |
248d |
dc9dfc8dc629
net: tls, fix WARNIING in __sk_msg_free
|
KASAN: slab-out-of-bounds Read in dsa_user_changeupper
net
|
C |
done |
|
1303 |
255d |
269d
|
25/28 |
248d |
844f104790bd
net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events
|
general protection fault in qdisc_create
net
|
C |
done |
|
2821 |
271d |
279d
|
25/28 |
248d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
WARNING in dev_watchdog (2)
net
|
C |
inconclusive |
|
6791 |
251d |
1650d
|
25/28 |
248d |
e316dd1cf135
net: don't dump stack on queue timeout
|
WARNING: refcount bug in tcp_sigpool_alloc_ahash
net
|
|
|
|
1 |
289d |
289d
|
25/28 |
248d |
b901a4e27694
net/tcp_sigpool: Use kref_get_unless_zero()
|
KMSAN: uninit-value in netif_skb_features (2)
net
|
C |
|
|
9 |
292d |
380d
|
25/28 |
248d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
WARNING in ip6_route_info_create
net
|
C |
done |
|
241 |
299d |
302d
|
25/28 |
248d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
general protection fault in page_pool_unlist
net
|
C |
done |
|
648 |
309d |
311d
|
25/28 |
248d |
f9893fdac319
net: page_pool: fix general protection fault in page_pool_unlist
|
KCSAN: data-race in ipv6_mc_down / mld_ifc_work (2)
net
|
|
|
|
2 |
261d |
267d
|
25/28 |
248d |
2e7ef287f07c
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
|
KMSAN: uninit-value in validate_xmit_skb
net
|
C |
|
|
21 |
250d |
267d
|
25/28 |
248d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
general protection fault in htb_tcf_block
net
|
C |
done |
|
885 |
271d |
279d
|
25/28 |
248d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
general protection fault in skb_segment (4)
net
|
C |
error |
|
4 |
293d |
300d
|
25/28 |
257d |
23d05d563b7e
net: prevent mss overflow in skb_segment()
|
Internal error in fib6_table_lookup
net
|
|
|
|
2 |
326d |
326d
|
25/28 |
257d |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
Internal error in fib6_rule_lookup
net
|
|
|
|
2 |
329d |
336d
|
25/28 |
257d |
18f039428c7d
ipvlan: add ipvlan_route_v6_outbound() helper
|
KASAN: slab-use-after-free Read in ife_tlv_meta_decode
net
|
|
|
|
1 |
303d |
301d
|
25/28 |
257d |
19391a2ca98b
net: sched: ife: fix potential use-after-free
|
WARNING in fib6_add (5)
net
|
C |
done |
|
6 |
302d |
465d
|
25/28 |
257d |
75475bb51e78
ipv6: fix potential NULL deref in fib6_add()
|
KASAN: slab-out-of-bounds Read in dns_resolver_preparse
net
|
C |
done |
|
46 |
283d |
296d
|
25/28 |
258d |
1997b3cb4217
keys, dns: Fix missing size check of V1 server-list header
|
KASAN: null-ptr-deref Write in unix_stream_bpf_update_proto
bpf
net
|
C |
done |
|
54 |
279d |
309d
|
25/28 |
258d |
8d6650646ce4
bpf: syzkaller found null ptr deref in unix_bpf proto add
|
memory leak in skb_copy (2)
nfc
net
|
syz |
|
|
3 |
331d |
448d
|
25/28 |
258d |
84d2db91f14a
nfc: virtual_ncidev: Add variable to check if ndev is running
|
general protection fault in tls_merge_open_record
net
|
syz |
unreliable |
|
5 |
341d |
341d
|
25/28 |
258d |
53f2cb491b50
tls: fix NULL deref on tls_sw_splice_eof() with empty record
|
KASAN: slab-use-after-free Read in unix_stream_read_actor
net
|
C |
error |
|
6 |
313d |
329d
|
25/28 |
258d |
4b7b492615cf
af_unix: fix use-after-free in unix_stream_read_actor()
|
general protection fault in ptp_ioctl
net
|
C |
done |
|
8 |
333d |
334d
|
25/28 |
258d |
8a4f030dbced
ptp: Fixes a null pointer dereference in ptp_ioctl
|
kernel BUG in ip6gre_header (2)
net
|
C |
|
|
2 |
358d |
372d
|
25/28 |
258d |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
BUG: unable to handle kernel paging request in nsim_bpf
net
|
C |
|
|
3 |
315d |
331d
|
25/28 |
258d |
c0c6bde586c7
netdevsim: Don't accept device bound programs
|
kernel BUG in ipgre_header
net
|
C |
|
|
4 |
308d |
322d
|
25/28 |
258d |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
KCSAN: data-race in virtnet_poll / virtnet_stats (2)
net
virt
|
|
|
|
1 |
378d |
376d
|
25/28 |
264d |
61217d8f6360
virtio_net: use u64_stats_t infra to avoid data-races
|
KASAN: stack-out-of-bounds Read in tcp_inbound_hash
net
|
C |
done |
|
28 |
328d |
341d
|
25/28 |
268d |
02f0717e9835
net/tcp: fix possible out-of-bounds reads in tcp_hash_fail()
|
WARNING in dev_index_reserve (2)
net
|
C |
done |
|
68 |
348d |
358d
|
25/28 |
269d |
cbfbfe3aee71
tun: prevent negative ifindex
|
KCSAN: data-race in fib_select_path / fib_select_path
net
|
|
|
|
1 |
366d |
353d
|
25/28 |
271d |
195374d89368
ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr
|
KCSAN: data-race in xfrm_sk_policy_insert / xfrm_sk_policy_insert (3)
net
|
|
|
|
1 |
420d |
392d
|
25/28 |
275d |
3e4bc23926b8
xfrm: fix a data-race in xfrm_gen_index()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (7)
net
|
|
|
|
1 |
372d |
367d
|
25/28 |
287d |
d0f95894fda7
netlink: annotate data-races around sk->sk_err
|
general protection fault in scatterwalk_copychunks (4)
net
crypto
|
C |
done |
done |
1341 |
287d |
1299d
|
25/28 |
287d |
cfaa80c91f6f
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
|
KASAN: slab-use-after-free Read in ptp_poll
net
|
|
|
|
1 |
333d |
333d
|
25/28 |
289d |
b714ca2ccf6a
ptp: ptp_read should not release queue
|
WARNING: zero-size vmalloc in xskq_create
bpf
net
|
|
|
|
20 |
358d |
366d
|
25/28 |
289d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
WARNING: zero-size vmalloc in print_tainted
bpf
net
|
C |
|
|
79 |
481d |
515d
|
25/28 |
289d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
KMSAN: uninit-value in IP6_ECN_decapsulate
net
|
C |
|
|
981 |
290d |
2206d
|
25/28 |
289d |
484b4833c604
hsr: Fix uninit-value access in fill_frame_info()
|
memory leak in kcm_sendmsg (2)
net
|
C |
|
|
1 |
402d |
436d
|
25/28 |
289d |
c821a88bd720
kcm: Fix memory leak in error path of kcm_sendmsg()
|
KMSAN: uninit-value in virtio_transport_recv_pkt
net
|
C |
|
|
20713 |
330d |
344d
|
25/28 |
289d |
34c4effacfc3
virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
|
WARNING in skb_warn_bad_offload (4)
net
|
C |
done |
|
1763 |
351d |
379d
|
25/28 |
289d |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
WARNING in __ip6_append_data
net
|
C |
unreliable |
|
5 |
359d |
388d
|
25/28 |
289d |
9d4c75800f61
ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
|
BUG: corrupted list in ptp_open
net
|
C |
done |
|
7 |
335d |
344d
|
25/28 |
289d |
1bea2c3e6df8
ptp: fix corrupted list in ptp_open
b714ca2ccf6a
ptp: ptp_read should not release queue
|
KCSAN: data-race in xfrmi_xmit / xfrmi_xmit (3)
net
|
|
|
|
2 |
374d |
398d
|
25/28 |
289d |
f7c4e3e5d4f6
xfrm: interface: use DEV_STATS_INC()
|
WARNING in skb_checksum_help (2)
net
|
C |
done |
|
3816 |
289d |
379d
|
25/28 |
289d |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
BUG: corrupted list in nfc_llcp_register_device
nfc
net
|
C |
error |
|
136 |
365d |
654d
|
25/28 |
289d |
dfc7f7a988da
net: nfc: llcp: Add lock when modifying device list
|
UBSAN: shift-out-of-bounds in nci_activate_target
net
nfc
|
C |
done |
|
6 |
367d |
551d
|
25/28 |
289d |
354a6e707e29
nfc: nci: assert requested protocol is valid
|
WARNING in inet_csk_get_port (2)
net
|
C |
done |
|
88 |
350d |
380d
|
25/28 |
289d |
8702cf12e6ba
tcp: Fix listen() warning with v4-mapped-v6 address.
|
KCSAN: data-race in udp_lib_setsockopt / udp_lib_setsockopt
net
|
|
|
|
2 |
409d |
395d
|
25/28 |
289d |
882af43a0fc3
udplite: fix various data-races
|
KMSAN: uninit-value in fq_change
net
|
C |
|
|
8 |
331d |
333d
|
25/28 |
289d |
f1a3b283f852
UPSTREAM: net_sched: sch_fq: better validate TCA_FQ_WEIGHTS and TCA_FQ_PRIOMAP
|
KCSAN: data-race in xfrm_lookup_with_ifid / xfrm_lookup_with_ifid (7)
net
|
|
|
|
1 |
367d |
366d
|
25/28 |
289d |
de5724ca38fd
xfrm: fix a data-race in xfrm_lookup_with_ifid()
|
KMSAN: uninit-value in llc_station_rcv
net
|
C |
|
|
2 |
344d |
353d
|
25/28 |
289d |
7b3ba18703a6
llc: verify mac len before reading mac header
|
INFO: rcu detected stall in sys_close (5)
net
|
C |
done |
|
1 |
403d |
403d
|
23/28 |
359d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
WARNING in unregister_vlan_dev
net
|
C |
done |
|
1310 |
411d |
420d
|
23/28 |
359d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KCSAN: data-race in ____sys_sendmsg / do_ipv6_setsockopt
net
|
|
|
|
1 |
481d |
465d
|
23/28 |
359d |
1ded5e5a5931
net: annotate data-races around sock->ops
|
KCSAN: data-race in netlink_setsockopt / netlink_setsockopt
net
|
|
|
|
1 |
422d |
422d
|
23/28 |
359d |
8fe08d70a2b6
netlink: convert nlk->flags to atomic flags
|
general protection fault in generic_hwtstamp_ioctl_lower
net
|
C |
done |
|
7 |
425d |
428d
|
23/28 |
359d |
c35e927cbe09
net: omit ndo_hwtstamp_get() call when possible in dev_set_hwtstamp_phylib()
|
INFO: rcu detected stall in unix_release
net
|
C |
done |
|
1 |
422d |
418d
|
23/28 |
359d |
da71714e359b
net/sched: fix a qdisc modification with ambiguous command request
|
WARNING: refcount bug in xp_put_pool
bpf
net
|
C |
done |
|
2 |
434d |
432d
|
23/28 |
359d |
85c2c79a0730
xsk: fix refcount underflow in error path
|
WARNING in ip6_tnl_exit_batch_net
net
|
C |
done |
|
29 |
414d |
420d
|
23/28 |
359d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: stack-out-of-bounds Write in __nla_validate_parse
net
|
C |
done |
|
4 |
426d |
441d
|
23/28 |
359d |
4d50e50045aa
net: flower: fix stack-out-of-bounds in fl_set_key_cfm()
|
WARNING: bad unlock balance in sockopt_release_sock
net
|
C |
done |
|
2 |
407d |
407d
|
23/28 |
359d |
8be6f88b9d3f
inet: fix IP_TRANSPARENT error handling
|
KASAN: slab-use-after-free Read in xsk_diag_dump
net
bpf
|
C |
done |
|
9 |
394d |
403d
|
23/28 |
359d |
3e019d8a05a3
xsk: Fix xsk_diag use-after-free error during socket cleanup
|
KCSAN: data-race in __ip4_datagram_connect / __ip_make_skb (5)
net
|
|
|
|
3 |
436d |
465d
|
23/28 |
359d |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
general protection fault in skb_segment (3)
net
|
C |
done |
|
2 |
418d |
418d
|
23/28 |
359d |
b616be6b9768
net: do not allow gso_size to be set to GSO_BY_FRAGS
|
INFO: rcu detected stall in bond_3ad_state_machine_handler
net
|
|
|
|
1 |
436d |
436d
|
23/28 |
359d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
BUG: soft lockup in fq_pie_timer (4)
net
|
syz |
|
|
5 |
389d |
439d
|
23/28 |
359d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
INFO: rcu detected stall in nsim_dev_trap_report_work
net
|
syz |
|
|
4 |
394d |
437d
|
23/28 |
359d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
WARNING in rtnl_dellink (3)
net
|
C |
done |
|
492 |
411d |
420d
|
23/28 |
359d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: slab-use-after-free Read in team_device_event
net
|
C |
done |
|
2 |
395d |
393d
|
23/28 |
359d |
6afcf0fb9270
Revert "net: team: do not use dynamic lockdep key"
|
KCSAN: data-race in fib_release_info / fib_table_lookup
net
|
|
|
|
1 |
404d |
403d
|
23/28 |
359d |
fce92af1c29d
ipv4: annotate data-races around fi->fib_dead
|
general protection fault in ingress_destroy
net
|
|
|
|
10 |
439d |
443d
|
23/28 |
359d |
079082c60aff
tcx: Fix splat during dev unregister
|
KCSAN: data-race in tcp_make_synack / tcp_rtx_synack
net
|
|
|
|
1 |
450d |
449d
|
23/28 |
359d |
5e5265522a9a
tcp: annotate data-races around tcp_rsk(req)->txhash
|
WARNING in tcx_uninstall
bpf
net
|
C |
done |
|
7 |
433d |
437d
|
23/28 |
359d |
079082c60aff
tcx: Fix splat during dev unregister
|
KCSAN: data-race in tcp_check_req / tcp_check_req
net
|
|
|
|
2 |
466d |
465d
|
23/28 |
359d |
eba20811f326
tcp: annotate data-races around tcp_rsk(req)->ts_recent
|
KASAN: slab-out-of-bounds Read in do_csum
net
|
C |
|
|
160 |
363d |
404d
|
23/28 |
359d |
8bd795fedb84
arm64: csum: Fix OoB access in IP checksum code for negative lengths
|
KCSAN: data-race in iptunnel_xmit / iptunnel_xmit (5)
net
|
|
|
|
1 |
396d |
396d
|
23/28 |
359d |
9b271ebaf9a2
ip_tunnels: use DEV_STATS_INC()
|
KCSAN: data-race in __ip_make_skb / __ip_make_skb
net
|
|
|
|
624 |
407d |
976d
|
23/28 |
359d |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
WARNING: ODEBUG bug in ingress_destroy
net
|
C |
done |
|
16 |
439d |
442d
|
23/28 |
359d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
WARNING: ODEBUG bug in tcx_uninstall
net
bpf
|
C |
done |
|
38 |
438d |
442d
|
23/28 |
359d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
KCSAN: data-race in macsec_handle_frame / macsec_handle_frame (3)
net
|
|
|
|
2 |
428d |
429d
|
23/28 |
359d |
32d0a49d36a2
macsec: use DEV_STATS_INC()
|
WARNING in macvlan_device_event
net
|
|
|
|
3 |
415d |
416d
|
23/28 |
359d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
WARNING in vlan_device_event
net
|
|
|
|
1 |
416d |
416d
|
23/28 |
359d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: slab-use-after-free Write in mini_qdisc_pair_swap
net
|
C |
error |
|
76 |
408d |
561d
|
23/28 |
372d |
84ad0af0bccd
net/sched: qdisc_destroy() old ingress and clsact Qdiscs before grafting
c7cfbd115001
net/sched: sch_ingress: Only create under TC_H_INGRESS
|
WARNING in sock_i_ino
net
|
C |
error |
|
22 |
465d |
469d
|
23/28 |
372d |
25a9c8a4431c
netlink: Add __sock_i_ino() for __netlink_diag_dump().
|
KMSAN: kernel-infoleak in __skb_datagram_iter
net
|
|
|
|
68 |
374d |
480d
|
23/28 |
372d |
aa5406950726
netlink: do not hard code device address lenth in fdb dumps
|
KASAN: stack-out-of-bounds Read in ip6mr_ioctl
net
|
C |
done |
|
192 |
471d |
476d
|
23/28 |
372d |
3a4f0edbb793
ipv6: fix a typo in ip6mr_sk_ioctl()
|
BUG: sleeping function called from invalid context in __lock_sock_fast
net
|
|
|
|
2 |
470d |
469d
|
23/28 |
372d |
57fc0f1ceaa4
mptcp: ensure listener is unhashed before updating the sk status
|
kernel BUG in ip6gre_header
net
|
C |
|
|
5 |
408d |
479d
|
23/28 |
372d |
9eed321cde22
net: lapbether: only support ethernet devices
|
WARNING in unreserve_psock
net
|
C |
done |
|
2816 |
472d |
479d
|
23/28 |
372d |
9f8d0dc0ec4a
kcm: Fix unnecessary psock unreservation.
|
WARNING: refcount bug in fib6_nh_init
net
|
C |
done |
|
45 |
472d |
478d
|
23/28 |
372d |
3515440df461
ipv6: also use netdev_hold() in ip6_route_check_nh()
|
linux-next test error: WARNING in register_net_sysctl
net
|
|
|
|
9 |
507d |
507d
|
23/28 |
372d |
e7480a44d7c4
Revert "net: Remove low_thresh in ip defrag"
|
net-next test error: WARNING in register_net_sysctl
net
|
|
|
|
21 |
507d |
507d
|
23/28 |
372d |
e7480a44d7c4
Revert "net: Remove low_thresh in ip defrag"
|
KASAN: stack-out-of-bounds Read in skb_splice_from_iter
net
|
C |
done |
|
64 |
472d |
481d
|
23/28 |
372d |
5a6f6873606e
ip, ip6: Fix splice to raw and ping sockets
|
possible deadlock in netlink_set_err
net
|
|
|
|
1 |
472d |
471d
|
23/28 |
372d |
8d61f926d420
netlink: fix potential deadlock in netlink_set_err()
|
possible deadlock in pie_timer (2)
net
|
|
|
|
2 |
470d |
470d
|
23/28 |
372d |
11b73313c124
sch_netem: fix issues in netem_change() vs get_dist_table()
|
KASAN: slab-out-of-bounds Read in taprio_dequeue_from_txq
net
|
syz |
error |
|
4 |
486d |
511d
|
23/28 |
372d |
be3618d96510
net/sched: taprio: fix slab-out-of-bounds Read in taprio_dequeue_from_txq
|
WARNING in scm_recv
net
|
C |
done |
|
8 |
459d |
462d
|
23/28 |
372d |
603fc57ab70c
af_unix: Skip SCM_PIDFD if scm->pid is NULL.
|
KASAN: stack-out-of-bounds Read in ipmr_ioctl
net
|
C |
done |
|
208 |
471d |
476d
|
23/28 |
372d |
634236b34d7a
net: remove sk_is_ipmr() and sk_is_icmpv6() helpers
|
BUG: soft lockup in addrconf_rs_timer (2)
net
|
C |
|
|
51 |
471d |
492d
|
23/28 |
459d |
cd2b8113c2e8
net/sched: fq_pie: ensure reasonable TCA_FQ_PIE_QUANTUM values
|
KCSAN: data-race in dev_graft_qdisc / qdisc_lookup_rcu
net
|
|
|
|
1 |
497d |
497d
|
23/28 |
459d |
d636fc5dd692
net: sched: add rcu annotations around qdisc->qdisc_sleeping
|
general protection fault in vhost_work_queue
kvm
net
virt
|
|
|
|
1 |
499d |
494d
|
23/28 |
459d |
a284f09effea
vhost: Fix crash during early vhost_transport_send_pkt calls
|
KCSAN: data-race in do_recvmmsg / do_recvmmsg (2)
net
|
|
|
|
1 |
541d |
516d
|
22/28 |
461d |
e05a5f510f26
net: annotate sk->sk_err write from do_recvmmsg()
|
KCSAN: data-race in tcp_disconnect / tcp_poll (7)
net
|
|
|
|
2 |
537d |
516d
|
22/28 |
461d |
e14cadfd80d7
tcp: add annotations around sk->sk_shutdown accesses
|
kernel BUG in nsh_gso_segment
net
|
|
|
|
1 |
528d |
514d
|
22/28 |
461d |
c83b49383b59
net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
|
general protection fault in __sk_mem_raise_allocated
net
|
|
|
|
1 |
506d |
502d
|
22/28 |
461d |
ad42a35bdfc6
udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().
|
KMSAN: uninit-value in xfrm_state_find
net
|
C |
error |
done |
215 |
505d |
2304d
|
22/28 |
461d |
3d776e31c841
xfrm: Reject optional tunnel/BEET mode templates in outbound policies
|
KMSAN: uninit-value in vlan_dev_hard_start_xmit (2)
net
|
|
|
|
1 |
537d |
537d
|
22/28 |
461d |
dacab578c7c6
vlan: fix a potential uninit-value in vlan_dev_hard_start_xmit()
|
divide error in tcp_rcv_space_adjust (2)
net
|
|
|
|
1 |
552d |
552d
|
22/28 |
461d |
4faeee0cf8a5
tcp: deny tcp_disconnect() when threads are waiting
|
KCSAN: data-race in sk_stream_wait_connect / tcp_disconnect (2)
net
|
|
|
|
1 |
546d |
516d
|
22/28 |
461d |
d0ac89f6f987
net: deal with most data-races in sk_wait_event()
|
KCSAN: data-race in __netlink_dump_start / netlink_recvmsg (5)
net
|
|
|
|
2 |
545d |
516d
|
22/28 |
461d |
a939d14919b7
netlink: annotate accesses to nlk->cb_running
|
memory leak in tcf_pedit_init
net
|
C |
|
|
1 |
525d |
525d
|
22/28 |
484d |
1b483d9f5805
net/sched: act_pedit: free pedit keys on bail from offset check
|
KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (12)
net
|
|
|
|
3 |
577d |
576d
|
22/28 |
484d |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
general protection fault in pause_prepare_data
net
|
C |
error |
|
34 |
618d |
620d
|
22/28 |
484d |
f5be9caf7bf0
net: ethtool: fix NULL pointer dereference in pause_prepare_data()
|
BUG: unable to handle kernel paging request in __alloc_skb
net
|
|
|
|
1 |
675d |
675d
|
22/28 |
484d |
031af50045ea
arm64: cmpxchg_double*: hazard against entire exchange variable
|
KASAN: use-after-free Read in do_csum
net
|
C |
|
|
72 |
487d |
652d
|
22/28 |
484d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
KCSAN: data-race in rxrpc_send_data / rxrpc_set_call_completion
afs
net
|
|
|
|
2 |
550d |
530d
|
22/28 |
484d |
2b5fdc0f5caa
rxrpc: Fix potential data race in rxrpc_wait_to_be_connected()
|
KMSAN: uninit-value in ethnl_set_linkmodes (2)
net
|
C |
|
|
40 |
518d |
823d
|
22/28 |
484d |
9ad685dbfe7e
ethtool: Fix uninitialized number of lanes
|
KCSAN: data-race in __neigh_event_send / neigh_resolve_output (7)
net
|
|
|
|
43 |
542d |
516d
|
22/28 |
484d |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
WARNING in htb_destroy
net
|
C |
done |
|
2 |
603d |
603d
|
22/28 |
484d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
general protection fault in ethnl_set_plca_cfg
net
|
C |
done |
|
37 |
628d |
628d
|
22/28 |
484d |
28dbf774bc87
plca.c: fix obvious mistake in checking retval
|
memory leak in tcindex_set_parms (3)
net
|
C |
|
|
1 |
672d |
668d
|
22/28 |
484d |
8c710f75256b
net/sched: Retire tcindex classifier
|
KCSAN: data-race in __neigh_update / neigh_resolve_output
net
|
|
|
|
1 |
548d |
516d
|
22/28 |
484d |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
BUG: unable to handle kernel NULL pointer dereference in __build_skb_around
net
bpf
|
C |
done |
|
29 |
564d |
570d
|
22/28 |
484d |
e5995bc7e2ba
bpf, test_run: fix crashes due to XDP frame overwriting/corruption
|
general protection fault in virtio_transport_purge_skbs
net
|
C |
done |
|
3 |
562d |
561d
|
22/28 |
484d |
b465518dc27d
vsock/loopback: use only sk_buff_head.lock to protect the packet queue
|
WARNING: stack going in the wrong direction? at __sys_setsockopt
net
|
|
|
|
6 |
591d |
597d
|
22/28 |
484d |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
upstream test error: unregister_netdevice: waiting for DEV to become free
net
|
|
|
|
204 |
597d |
603d
|
22/28 |
484d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
WARNING in net_free
net
|
|
|
|
1 |
538d |
538d
|
22/28 |
484d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
WARNING in cleanup_net (2)
net
|
C |
error |
|
72 |
519d |
547d
|
22/28 |
484d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
KASAN: use-after-free Read in cfusbl_device_notify
net
|
C |
done |
|
341 |
576d |
723d
|
22/28 |
484d |
9781e98a9711
net: caif: Fix use-after-free in cfusbl_device_notify()
|
general protection fault in taprio_dequeue
net
|
|
|
|
1 |
644d |
644d
|
22/28 |
484d |
3a415d59c1db
net/sched: sch_taprio: fix possible use-after-free
|
WARNING in ip6erspan_tunnel_xmit (2)
net
|
C |
unreliable |
|
5 |
564d |
565d
|
22/28 |
484d |
8e50ed774554
erspan: do not use skb_mac_header() in ndo_start_xmit()
|
KMSAN: uninit-value in qrtr_tx_resume
arm-msm
net
|
C |
|
|
8 |
558d |
619d
|
22/28 |
484d |
6417070918de
net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()
|
INFO: task hung in tls_sw_sendpage (3)
net
|
|
|
|
30 |
588d |
585d
|
22/28 |
484d |
f3221361dc85
net: tls: avoid hanging tasks on the tx_lock
|
WARNING in nla_get_range_unsigned (2)
net
|
C |
done |
|
433 |
560d |
596d
|
22/28 |
484d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
BUG: unable to handle kernel paging request in atm_tc_destroy
net
|
C |
error |
|
3 |
603d |
602d
|
22/28 |
484d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
kernel BUG in ip_frag_next
net
|
C |
done |
|
9 |
618d |
625d
|
22/28 |
484d |
f72ff8b81ebc
net: fix kfree_skb_list use of skb_mark_not_on_list
|
net test error: WARNING: suspicious RCU usage in veth_set_xdp_features
net
|
|
|
|
24 |
570d |
571d
|
22/28 |
484d |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
linux-next test error: WARNING: suspicious RCU usage in veth_set_xdp_features
net
|
|
|
|
12 |
570d |
571d
|
22/28 |
484d |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
KCSAN: data-race in netlink_getname / netlink_insert (4)
net
|
|
|
|
2 |
619d |
624d
|
22/28 |
484d |
c1bb9484e3b0
netlink: annotate data races around nlk->portid
|
WARNING: locking bug in inet_autobind
net
|
C |
done |
error |
103 |
646d |
1969d
|
22/28 |
484d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
UBSAN: array-index-out-of-bounds in qfq_update_agg (4)
net
|
|
|
|
1 |
536d |
536d
|
22/28 |
484d |
3037933448f6
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
|
KMSAN: uninit-value in raw_sock_get
net
|
|
|
|
1 |
544d |
543d
|
22/28 |
484d |
0a78cf7264d2
raw: Fix NULL deref in raw_get_next().
|
BUG: scheduling while atomic in msleep
net
|
C |
done |
|
40 |
618d |
626d
|
22/28 |
484d |
ea4fdbaa2f77
net/sched: sch_taprio: do not schedule in taprio_reset()
|
WARNING in __dev_queue_xmit (2)
net
|
C |
|
|
76 |
517d |
588d
|
22/28 |
484d |
693aa2c0d9b6
ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping()
|
kernel BUG in icmp_glue_bits
net
|
|
|
|
2 |
491d |
554d
|
22/28 |
484d |
7d63b6712538
icmp: guard against too small mtu
|
general protection fault in bpf_struct_ops_link_create
bpf
net
|
C |
done |
|
17 |
558d |
561d
|
22/28 |
484d |
55fbae05476d
bpf: Check IS_ERR for the bpf_map_get() return value
|
WARNING: refcount bug in qrtr_recvmsg (2)
arm-msm
net
|
C |
error |
|
2 |
569d |
562d
|
22/28 |
484d |
44d807320000
net: qrtr: Fix a refcount bug in qrtr_recvmsg()
|
WARNING in sock_map_del_link
bpf
net
|
|
|
|
91 |
540d |
540d
|
22/28 |
484d |
8c5c2a4898e3
bpf, sockmap: Revert buggy deadlock fix in the sockhash and sockmap
|
WARNING: refcount bug in consume_skb
net
|
|
|
|
3 |
603d |
613d
|
22/28 |
484d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
INFO: trying to register non-static key in net_free
net
|
syz |
error |
|
17982 |
592d |
605d
|
22/28 |
484d |
6e77a5a4af05
net: initialize net->notrefcnt_tracker earlier
|
WARNING: suspicious RCU usage in bond_mii_monitor
net
|
C |
|
|
13 |
638d |
657d
|
22/28 |
484d |
42c7ded0eeac
bonding: fix lockdep splat in bond_miimon_commit()
|
BUG: stack guard page was hit in inet6_release
bpf
net
|
C |
done |
|
4 |
619d |
668d
|
22/28 |
484d |
ddce1e091757
bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
|
possible deadlock in l2tp_tunnel_register (2)
net
|
C |
|
|
153 |
579d |
588d
|
22/28 |
484d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
KASAN: slab-use-after-free Read in tcf_action_destroy
net
|
C |
error |
|
32 |
512d |
587d
|
22/28 |
484d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
possible deadlock in release_sock
net
|
C |
done |
|
42 |
625d |
627d
|
22/28 |
484d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
memory leak in nfc_genl_se_io
net
nfc
|
C |
|
|
1 |
599d |
595d
|
22/28 |
484d |
25ff6f8a5a3b
nfc: fix memory leak of se_io context in nfc_genl_se_io
|
general protection fault in tcindex_set_parms
net
|
C |
done |
|
2 |
599d |
599d
|
22/28 |
484d |
42018a322bd4
net/sched: tcindex: search key must be 16 bits
|
kernel BUG in fou_build_udp
net
|
C |
|
|
1 |
520d |
520d
|
22/28 |
484d |
c88f8d5cd95f
UPSTREAM: sit: update dev->needed_headroom in ipip6_tunnel_bind_dev()
|
KCSAN: data-race in ip_finish_output2 / ip_tunnel_xmit
net
|
|
|
|
1 |
614d |
614d
|
22/28 |
484d |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
kernel BUG in rxrpc_put_call
afs
net
|
C |
done |
|
9 |
622d |
634d
|
22/28 |
484d |
01644a1f98ff
rxrpc: Fix wrong error return in rxrpc_connect_call()
|
kernel BUG in rxrpc_put_peer
afs
net
|
C |
|
|
80 |
625d |
668d
|
22/28 |
484d |
9d35d880e0e4
rxrpc: Move client call connection to the I/O thread
03fc55adf876
rxrpc: Only disconnect calls in the I/O thread
|
INFO: rcu detected stall in devlink_nl_cmd_port_get_dumpit
net
|
syz |
|
|
7 |
583d |
600d
|
22/28 |
484d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
WARNING in inet_sock_destruct (3)
net
|
C |
|
|
87 |
488d |
591d
|
22/28 |
484d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
WARNING in devlink_free
net
|
|
|
|
10 |
620d |
633d
|
22/28 |
484d |
93e71edfd90c
devlink: keep the instance mutex alive until references are gone
|
KMSAN: uninit-value in ipv6_find_tlv
net
|
C |
|
|
271 |
526d |
1879d
|
22/28 |
484d |
ea30388baebc
ipv6: Fix an uninit variable access bug in __ip6_make_skb()
|
WARNING in default_device_exit_batch (4)
net
|
C |
error |
|
954 |
560d |
687d
|
22/28 |
484d |
e667d4690986
bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
|
KMSAN: kernel-infoleak in copyout (2)
net
|
C |
|
|
6723 |
485d |
1653d
|
22/28 |
484d |
8222d5910dae
xfrm: Zero padding when dumping algos and encap
|
KASAN: null-ptr-deref Read in __fl_put
net
|
C |
error |
|
16 |
566d |
585d
|
22/28 |
484d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
kernel BUG in inet_sock_destruct
net
|
C |
error |
|
3 |
641d |
640d
|
22/28 |
484d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
possible deadlock in inet_put_port
net
|
|
|
|
2 |
626d |
626d
|
22/28 |
484d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
BUG: corrupted list in taprio_destroy
net
|
C |
done |
|
2 |
602d |
602d
|
22/28 |
484d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (6)
net
|
|
|
|
2 |
553d |
550d
|
22/28 |
484d |
a1865f2e7d10
netlink: annotate lockless accesses to nlk->max_recvmsg_len
|
KASAN: invalid-free in skb_free_head (2)
net
|
C |
error |
|
25 |
526d |
591d
|
22/28 |
484d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
riscv/fixes test error: BUG: soft lockup in corrupted (2)
net
virt
|
|
|
|
4 |
724d |
801d
|
22/28 |
484d |
61fc1ee8be26
riscv: Bump COMMAND_LINE_SIZE value to 1024
|
WARNING in inet_csk_destroy_sock (3)
net
|
|
|
|
1 |
498d |
498d
|
22/28 |
497d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
KASAN: slab-out-of-bounds Read in sk_psock_get
net
|
C |
done |
error |
9 |
802d |
1136d
|
22/28 |
541d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
possible deadlock in nci_start_poll
net
nfc
|
C |
error |
done |
83 |
589d |
690d
|
22/28 |
542d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
kernel BUG in pskb_expand_head
net
|
C |
done |
|
1600 |
604d |
1055d
|
22/28 |
588d |
5f33a09e769a
can: isotp: convert struct tpcon::{idx,len} to unsigned int
7c759040c1dd
can: isotp: fix potential CAN frame reception race in isotp_rcv()
|
WARNING in ipgre_xmit
net
|
C |
done |
|
9916 |
839d |
855d
|
22/28 |
588d |
8d21e9963bec
ip_gre: test csum_start instead of transport header
|
WARNING: ODEBUG bug in ops_free_list
net
|
|
|
|
1 |
916d |
916d
|
22/28 |
588d |
1946014ca3b1
rxrpc: fix a race in rxrpc_exit_net()
|
KASAN: wild-memory-access Read in skb_copy_bits
net
|
C |
|
|
2 |
757d |
757d
|
22/28 |
588d |
0d24148bd276
inet: ping: fix recent breakage
|
KCSAN: data-race in __ip_append_data / __ip_append_data
net
|
|
|
|
1 |
974d |
969d
|
22/28 |
588d |
a1cdec57e03a
net-timestamp: convert sk->sk_tskey to atomic_t
|
WARNING: kmalloc bug in xdp_umem_create (2)
bpf
net
|
C |
done |
|
21 |
968d |
1034d
|
22/28 |
588d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
KCSAN: data-race in tcp_send_challenge_ack / tcp_send_challenge_ack
net
|
|
|
|
1 |
767d |
767d
|
22/28 |
588d |
8c70521238b7
tcp: annotate data-race around challenge_timestamp
|
BUG: sleeping function called from invalid context in sk_psock_skb_ingress_self
net
bpf
|
C |
done |
|
151 |
698d |
720d
|
22/28 |
588d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
KASAN: use-after-free Read in ipvlan_queue_xmit (3)
net
|
C |
error |
error |
8 |
792d |
1390d
|
22/28 |
588d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
general protection fault in llc_build_and_send_xid_pkt
net
|
C |
done |
|
2 |
926d |
926d
|
22/28 |
588d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: use-after-free Read in reqsk_queue_unlink
net
|
|
|
|
4 |
675d |
725d
|
22/28 |
588d |
740ea3c4a0b2
tcp: Clean up kernel listener's reqsk in inet_twsk_purge()
|
WARNING: refcount bug in tcp_release_cb
net
|
|
|
|
2 |
663d |
673d
|
22/28 |
588d |
0a182f8d6074
bpf, sockmap: fix race in sock_map_free()
|
net boot error: WARNING in genl_register_family
net
|
|
|
|
3 |
707d |
707d
|
22/28 |
588d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
WARNING in __skb_flow_dissect (4)
net
|
C |
error |
|
6 |
699d |
709d
|
22/28 |
588d |
9f225444467b
ppp: associate skb with a device at tx
|
WARNING in inet_csk_get_port
net
|
C |
done |
|
1166 |
637d |
865d
|
22/28 |
588d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
KASAN: use-after-free Read in free_netdev (3)
net
|
C |
inconclusive |
|
130 |
681d |
836d
|
22/28 |
588d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
KCSAN: data-race in dev_activate / qdisc_lookup_rcu
net
|
|
|
|
1 |
967d |
967d
|
22/28 |
588d |
5891cd5ec46c
net_sched: add __rcu annotation to netdev->qdisc
|
WARNING in skb_try_coalesce
net
|
C |
error |
|
1521 |
861d |
1314d
|
22/28 |
588d |
763087dab975
net: add skb_set_end_offset() helper
|
kernel panic: corrupted stack end in netdev_run_todo
net
|
|
|
|
1 |
833d |
833d
|
22/28 |
588d |
b81d591386c3
riscv: Increase stack size under KASAN
|
general protection fault in sock_reserve_memory
net
|
C |
done |
|
2 |
964d |
964d
|
22/28 |
588d |
25206111512d
crypto: af_alg - get rid of alg_memory_allocated
|
WARNING in tcp_enter_loss (3)
net
|
C |
inconclusive |
|
7 |
706d |
1002d
|
22/28 |
588d |
0c175da7b037
tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent
|
general protection fault in tls_sk_proto_close (3)
net
|
C |
done |
|
276 |
837d |
1237d
|
22/28 |
588d |
69135c572d1f
net/tls: fix tls_sk_proto_close executed repeatedly
|
possible deadlock in l2tp_tunnel_register
net
|
C |
error |
|
9492 |
588d |
688d
|
22/28 |
588d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
general protection fault in em_cmp_match
net
|
C |
|
|
4 |
664d |
660d
|
22/28 |
588d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
general protection fault in ip6_rcv_core
net
|
C |
done |
|
275 |
679d |
905d
|
22/28 |
588d |
0339d25a2807
ipv6: fix NULL deref in ip6_rcv_core()
|
KASAN: use-after-free Read in nh_netdev_event
net
|
|
|
|
3 |
689d |
765d
|
22/28 |
588d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KASAN: use-after-free Read in rxrpc_lookup_local
afs
net
|
C |
|
|
3997 |
639d |
668d
|
22/28 |
588d |
8fbcc83334a7
rxrpc: Fix I/O thread startup getting skipped
eaa02390adb0
rxrpc: Fix NULL deref in rxrpc_unuse_local()
|
kernel BUG in warn_crc32c_csum_combine
net
|
C |
error |
|
17 |
703d |
712d
|
22/28 |
588d |
7f57f8165cb6
af_key: Fix send_acquire race with pfkey_register
|
kernel panic: corrupted stack end in nf_tables_getset
net
|
|
|
|
1 |
697d |
697d
|
22/28 |
588d |
b81d591386c3
riscv: Increase stack size under KASAN
|
net-next test error: WARNING in devl_port_unregister
net
|
|
|
|
52 |
695d |
697d
|
22/28 |
588d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
WARNING in u32_change
net
|
C |
|
|
28 |
643d |
741d
|
22/28 |
588d |
7cba18332e36
net: sched: cls_u32: Avoid memcpy() false-positive warning
|
general protection fault in metadata_dst_free
net
|
C |
|
|
348 |
719d |
758d
|
22/28 |
588d |
c52add61c27e
macsec: don't free NULL metadata_dst
|
memory leak in virtual_ncidev_write
net
nfc
|
C |
|
|
1 |
687d |
687d
|
22/28 |
588d |
53270fb0fd77
NFC: nci: fix memory leak in nci_rx_data_packet()
|
memory leak in __vsock_create
net
|
C |
|
|
1 |
913d |
909d
|
22/28 |
588d |
7e97cfed9929
vsock: Fix memory leak in vsock_connect()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (5)
net
|
|
|
|
12 |
631d |
884d
|
22/28 |
588d |
d5076fe4049c
netlink: do not reset transport header in netlink_recvmsg()
|
general protection fault in __inet_hash_connect
net
|
|
|
|
5 |
697d |
843d
|
22/28 |
588d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
kernel panic: corrupted stack end in tc_ctl_action
net
|
|
|
|
2 |
720d |
775d
|
22/28 |
588d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in skb_checksum_help
net
|
|
|
|
15 |
594d |
766d
|
22/28 |
588d |
0d24148bd276
inet: ping: fix recent breakage
|
WARNING in skb_tunnel_check_pmtu
net
|
C |
done |
|
8 |
830d |
836d
|
22/28 |
588d |
853a76148802
tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()
|
memory leak in ipv6_renew_options
net
|
C |
|
|
1 |
814d |
810d
|
22/28 |
588d |
e27326009a3d
net: ping6: Fix memleak in ipv6_renew_options().
|
possible deadlock in kcm_ioctl
net
|
C |
error |
|
20 |
774d |
776d
|
22/28 |
588d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
memory leak in __tcp_send_ack
net
|
C |
|
|
10 |
726d |
1257d
|
22/28 |
588d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
kernel BUG in __skb_gso_segment
net
|
C |
done |
|
11 |
856d |
854d
|
22/28 |
588d |
e9d3f80935b6
net/af_packet: make sure to pull mac header
|
general protection fault in rlb_clear_slave
net
|
|
|
|
1 |
832d |
832d
|
22/28 |
588d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
general protection fault in tcp_create_openreq_child
net
|
C |
unreliable |
|
83 |
893d |
896d
|
22/28 |
588d |
ba5a4fdd63ae
tcp: make sure treq->af_specific is initialized
|
KCSAN: data-race in veth_xmit / veth_xmit
net
|
|
|
|
1 |
974d |
969d
|
22/28 |
588d |
68468d8c4cd4
veth: fix races around rq->rx_notify_masked
|
kernel BUG in mld_newpack
net
|
|
|
|
1 |
721d |
721d
|
22/28 |
588d |
d89d7ff01235
ipv6: ensure sane device mtu in tunnels
|
KMSAN: uninit-value in ipvlan_queue_xmit
net
|
C |
|
|
2 |
767d |
1350d
|
22/28 |
588d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING: suspicious RCU usage in ipmr_rtm_dumplink
net
|
|
|
|
11 |
830d |
833d
|
22/28 |
588d |
0fcae3c8b1b3
ipmr: fix a lockdep splat in ipmr_rtm_dumplink()
|
possible deadlock in nci_set_local_general_bytes
net
nfc
|
C |
|
|
32 |
639d |
690d
|
22/28 |
588d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
BUG: MAX_LOCK_DEPTH too low! (3)
net
s390
|
C |
done |
|
18 |
960d |
969d
|
22/28 |
588d |
1de9770d121e
net/smc: Avoid overwriting the copies of clcsock callback functions
|
general protection fault in skb_clone (5)
net
|
C |
done |
|
7 |
704d |
722d
|
22/28 |
588d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
KCSAN: data-race in fib6_info_hw_flags_set / fib6_purge_rt
net
|
|
|
|
1 |
993d |
991d
|
22/28 |
588d |
d95d6320ba7a
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
|
KASAN: use-after-free Read in macsec_get_iflink
net
|
|
|
|
1 |
866d |
862d
|
22/28 |
588d |
196a888ca657
macsec: fix UAF bug for real_dev
|
KMSAN: kernel-infoleak in _copy_to_iter (7)
net
|
C |
|
|
138977 |
589d |
941d
|
22/28 |
588d |
633593a80898
sctp: fix kernel-infoleak for SCTP sockets
|
KASAN: use-after-free Write in inet_put_port
net
|
|
|
|
1 |
846d |
842d
|
22/28 |
588d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
WARNING in tcp_disconnect
net
|
|
|
|
2 |
716d |
720d
|
22/28 |
588d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
possible deadlock in virtual_nci_close
net
nfc
|
C |
done |
|
939 |
589d |
691d
|
22/28 |
588d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
WARNING in tcp_mtup_probe_success
net
|
|
|
|
3 |
856d |
862d
|
22/28 |
588d |
11825765291a
tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd
|
BUG: sleeping function called from invalid context in smc_pnet_add
net
|
C |
done |
|
45 |
971d |
971d
|
22/28 |
588d |
94fdd7c02a56
net/smc: use GFP_ATOMIC allocation in smc_pnet_add_eth()
|
KASAN: slab-out-of-bounds Write in bpf_prog_test_run_xdp
bpf
net
|
C |
done |
|
18 |
964d |
982d
|
22/28 |
588d |
a6763080856f
bpf: test_run: Fix OOB access in bpf_prog_test_run_xdp
|
KASAN: slab-out-of-bounds Read in smc_fback_error_report
net
s390
|
C |
error |
|
72 |
891d |
967d
|
22/28 |
588d |
0558226cebee
net/smc: Fix slab-out-of-bounds issue in fallback
|
KCSAN: data-race in packet_setsockopt / packet_setsockopt
net
|
|
|
|
1 |
996d |
983d
|
22/28 |
588d |
e42e70ad6ae2
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
|
possible deadlock in strp_work
net
|
C |
error |
|
4 |
774d |
776d
|
22/28 |
588d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
KASAN: use-after-free Read in __fib6_clean_all
net
|
|
|
|
30 |
678d |
932d
|
22/28 |
588d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KMSAN: uninit-value in asix_mdio_write_nopm
net
usb
|
|
|
|
2 |
914d |
934d
|
22/28 |
588d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
KCSAN: data-race in kcm_rcv_strparser / kcm_rfree (7)
net
|
|
|
|
1 |
718d |
717d
|
22/28 |
588d |
0c745b5141a4
kcm: annotate data-races around kcm->rx_wait
|
WARNING in devl_port_unregister
net
|
C |
|
|
1690 |
592d |
695d
|
22/28 |
588d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
WARNING: suspicious RCU usage in corrupted (2)
net
|
C |
unreliable |
|
7 |
833d |
844d
|
22/28 |
588d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
kernel BUG in vhost_get_vq_desc
kvm
net
virt
|
C |
inconclusive |
|
19 |
953d |
965d
|
22/28 |
588d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
WARNING in skb_warn_bad_offload (3)
net
|
C |
done |
|
115 |
589d |
726d
|
22/28 |
588d |
87445f369cca
ipv6: ping: fix wrong checksum for large frames
|
WARNING in arp_ioctl
net
|
C |
error |
done |
17 |
661d |
730d
|
22/28 |
588d |
b5f0de6df6dc
net: dev: Convert sa_data to flexible array in struct sockaddr
|
WARNING in ipvlan_queue_xmit
net
|
C |
inconclusive |
|
4 |
767d |
767d
|
22/28 |
588d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING: still has locks held in tls_rx_reader_lock
net
|
C |
done |
|
4 |
806d |
807d
|
22/28 |
588d |
dde06aaa89b7
tls: rx: release the sock lock on locking timeout
|
WARNING: suspicious RCU usage in in6_dump_addrs
net
|
C |
unreliable |
|
613 |
801d |
844d
|
22/28 |
588d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
kernel panic: corrupted stack end in inet_rtm_newaddr
net
|
|
|
|
23 |
592d |
928d
|
22/28 |
588d |
b81d591386c3
riscv: Increase stack size under KASAN
|
inconsistent lock state in smc_fback_state_change
s390
net
|
C |
error |
|
7 |
680d |
686d
|
22/28 |
588d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
linux-next test error: WARNING in devl_port_unregister
net
|
|
|
|
23 |
694d |
697d
|
22/28 |
588d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
KASAN: use-after-free Read in tcp_retransmit_timer (5)
net
|
C |
unreliable |
|
16000 |
673d |
1685d
|
22/28 |
588d |
3a58f13a881e
net: rds: acquire refcount on TCP sockets
|
WARNING in inet_csk_destroy_sock (2)
io-uring
net
|
C |
done |
|
8 |
637d |
724d
|
22/28 |
588d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
WARNING in __vunmap
net
|
C |
error |
error |
154 |
738d |
2058d
|
22/28 |
588d |
8a04d2fc700f
xfrm: Update ipcomp_scratches with NULL when freed
|
memory leak in napi_get_frags
net
|
C |
|
|
11 |
1338d |
1359d
|
22/28 |
588d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
memory leak in netlink_policy_dump_add_policy
net
|
C |
|
|
1 |
788d |
784d
|
22/28 |
588d |
249801360db3
net: genl: fix error path memory leak in policy dumping
|
KCSAN: data-race in fib6_clean_node / inet6_csk_route_socket
net
|
|
|
|
1 |
989d |
989d
|
22/28 |
588d |
aafc2e3285c2
ipv6: annotate accesses to fn->fn_sernum
|
BUG: unable to handle kernel paging request in inet_unhash
net
|
|
|
|
3 |
684d |
765d
|
22/28 |
588d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
general protection fault in llc_ui_connect
net
|
C |
done |
|
17 |
921d |
925d
|
22/28 |
588d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
memory leak in ndisc_send_rs
net
|
C |
|
|
2 |
1085d |
1132d
|
22/28 |
588d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
KCSAN: data-race in bond_3ad_initiate_agg_selection / bond_3ad_state_machine_handler (2)
net
|
|
|
|
1 |
964d |
963d
|
22/28 |
588d |
9ceaf6f76b20
bonding: fix data-races around agg_select_timer
|
general protection fault in llc_ui_sendmsg
net
|
C |
done |
|
365 |
921d |
926d
|
22/28 |
588d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: use-after-free Read in inet_twsk_kill
net
|
|
|
|
86 |
981d |
983d
|
22/28 |
588d |
fbb8295248e1
tcp: allocate tcp_death_row outside of struct netns_ipv4
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
net
|
C |
inconclusive |
|
12 |
937d |
1338d
|
22/28 |
588d |
c700525fcc06
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
INFO: task hung in vhost_work_dev_flush
kvm
net
virt
|
C |
error |
|
2 |
968d |
959d
|
22/28 |
588d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
stack segment fault in skb_clone
net
|
C |
unreliable |
inconclusive |
3 |
843d |
1028d
|
22/28 |
588d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
WARNING: suspicious RCU usage in bond_ethtool_get_ts_info
net
|
C |
done |
|
6 |
874d |
876d
|
22/28 |
588d |
9b80ccda233f
bonding: fix missed rcu protection
|
general protection fault in rlb_req_update_slave_clients
net
|
C |
inconclusive |
|
3 |
852d |
852d
|
22/28 |
588d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
inconsistent lock state in l2tp_tunnel_register
net
|
|
|
|
5599 |
675d |
688d
|
22/28 |
588d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KASAN: invalid-free in tcp_disconnect
net
|
C |
unreliable |
|
74 |
717d |
731d
|
22/28 |
588d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
KCSAN: data-race in ip6_dst_gc / ip6_dst_gc (3)
net
|
|
|
|
2 |
904d |
906d
|
22/28 |
588d |
9cb7c013420f
ipv6: make ip6_rt_gc_expire an atomic_t
|
possible deadlock in nci_close_device
net
nfc
|
|
|
|
2 |
669d |
683d
|
22/28 |
588d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
KCSAN: data-race in dropmon_net_event / trace_napi_poll_hit
net
|
|
|
|
1 |
984d |
967d
|
22/28 |
588d |
dcd54265c8bc
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
|
kernel BUG in netem_enqueue
net
|
|
|
|
9 |
659d |
884d
|
22/28 |
588d |
eeee4b77dc52
net: add more debug info in skb_checksum_help()
|
memory leak in vlan_dev_set_egress_priority (2)
net
|
C |
|
|
1 |
820d |
820d
|
22/28 |
588d |
72a0b329114b
vlan: fix memory leak in vlan_newlink()
|
upstream boot error: WARNING in genl_register_family
net
|
|
|
|
468 |
702d |
708d
|
22/28 |
588d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
WARNING in bpf_test_finish
net
bpf
|
C |
done |
|
3 |
950d |
950d
|
22/28 |
588d |
530e214c5b5a
bpf, test_run: Fix overflow in XDP frags bpf_test_finish
|
KASAN: use-after-free Write in enqueue_timer
net
|
|
|
|
1 |
690d |
690d
|
22/28 |
588d |
ab0377803daf
mrp: introduce active flags to prevent UAF when applicant uninit
|
KASAN: null-ptr-deref Write in kcm_tx_work (3)
net
|
C |
inconclusive |
inconclusive |
7 |
735d |
836d
|
22/28 |
588d |
ec7eede369fe
kcm: avoid potential race in kcm_tx_work
|
kernel panic: corrupted stack end in rtnl_newlink
net
|
|
|
|
3489 |
589d |
936d
|
22/28 |
588d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING: refcount bug in sk_psock_get (2)
net
|
C |
done |
|
4 |
813d |
854d
|
22/28 |
588d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
WARNING in nci_send_cmd
net
nfc
|
C |
|
|
13 |
675d |
689d
|
22/28 |
588d |
0ad6bded175e
nfc/nci: fix race with opening and closing
|
KCSAN: data-race in kcm_rfree / unreserve_rx_kcm (3)
net
|
|
|
|
4 |
714d |
718d
|
22/28 |
588d |
15e4dabda11b
kcm: annotate data-races around kcm->rx_psock
|
WARNING in nci_add_new_protocol
net
nfc
|
|
|
|
1 |
681d |
677d
|
22/28 |
588d |
e329e71013c9
NFC: nci: Bounds check struct nfc_target arrays
|
memory leak in mld_newpack
net
|
C |
|
|
2 |
749d |
1167d
|
22/28 |
588d |
a43206156263
usbnet: Fix memory leak in usbnet_disconnect()
|
WARNING in netif_napi_add_weight
net
|
C |
inconclusive |
done |
45 |
828d |
840d
|
22/28 |
588d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
BUG: using smp_processor_id() in preemptible code in tun_chr_write_iter
net
|
C |
done |
|
1834 |
928d |
937d
|
22/28 |
588d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
BUG: using smp_processor_id() in preemptible code in netdev_core_stats_alloc
net
|
C |
error |
|
2210 |
928d |
937d
|
22/28 |
588d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
BUG: missing reserved tailroom
bpf
net
|
C |
done |
|
2 |
940d |
939d
|
22/28 |
588d |
b6f1f780b393
bpf, test_run: Fix packet size check for live packet mode
|
general protection fault in smc_pnet_add (2)
net
s390
|
C |
inconclusive |
|
590 |
904d |
919d
|
22/28 |
588d |
d22f4f977236
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
|
possible deadlock in ___neigh_create
net
|
C |
error |
|
24 |
974d |
977d
|
22/28 |
588d |
4a81f6da9cb2
net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work
|
KASAN: use-after-free Read in __tcf_qdisc_find
net
|
|
|
|
1 |
761d |
761d
|
22/28 |
588d |
ebda44da44f6
net: sched: fix race condition in qdisc_graft()
|
KCSAN: data-race in __ip4_datagram_connect / raw_bind (2)
net
|
|
|
|
1 |
984d |
983d
|
22/28 |
588d |
153a0d187e76
ipv4: raw: lock the socket in raw_bind()
|
general protection fault in llc_build_and_send_ui_pkt
net
|
C |
done |
|
26 |
922d |
925d
|
22/28 |
588d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
net-next test error: WARNING: suspicious RCU usage in hsr_node_get_first
net
|
|
|
|
189 |
958d |
967d
|
22/28 |
588d |
e7f27420681f
net: hsr: fix suspicious RCU usage warning in hsr_node_get_first()
|
general protection fault in llc_alloc_frame
net
|
|
|
|
1 |
924d |
924d
|
22/28 |
588d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
WARNING in tls_strp_done
net
|
C |
error |
|
22 |
778d |
783d
|
22/28 |
588d |
849f16bbfb68
tls: rx: react to strparser initialization errors
|
linux-next test error: general protection fault in xfrm_policy_lookup_bytype
net
|
|
|
|
15 |
682d |
683d
|
22/28 |
588d |
b97df039a68b
xfrm: Fix oops in __xfrm_state_delete()
|
KASAN: slab-out-of-bounds Write in __build_skb_around
bpf
net
|
C |
error |
|
2536 |
662d |
676d
|
22/28 |
588d |
ce098da1497c
skbuff: Introduce slab_build_skb()
|
WARNING in sk_stream_kill_queues (8)
net
|
C |
unreliable |
|
4268 |
592d |
828d
|
22/28 |
588d |
e9c6e7976026
tcp: fix sock skb accounting in tcp_read_skb()
|
WARNING in mroute_clean_tables
net
|
C |
|
|
10 |
948d |
968d
|
22/28 |
588d |
5611a00697c8
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
|
general protection fault in pse_prepare_data
net
|
C |
inconclusive |
|
6 |
638d |
717d
|
22/28 |
588d |
46cdedf2a0fa
ethtool: pse-pd: fix null-deref on genl_info in dump
|
KMSAN: uninit-value in bcmp
net
|
C |
error |
done |
907 |
624d |
1945d
|
22/28 |
588d |
4f1dc7d9756e
fs/ntfs3: Validate attribute name offset
|
UBSAN: shift-out-of-bounds in tcf_pedit_init
net
|
C |
done |
|
59 |
869d |
876d
|
22/28 |
588d |
4d42d54a7d6a
net/sched: act_pedit: sanitize shift argument before usage
|
KASAN: use-after-free Read in ip6_fragment (2)
net
|
|
|
|
1 |
681d |
677d
|
22/28 |
588d |
803e84867de5
ipv6: avoid use-after-free in ip6_fragment()
|
general protection fault in llc_build_and_send_test_pkt
net
|
C |
done |
|
25 |
921d |
925d
|
22/28 |
588d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
WARNING in vhost_dev_cleanup (2)
kvm
net
virt
|
|
|
|
79 |
953d |
961d
|
22/28 |
588d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
BUG: unable to handle kernel NULL pointer dereference in em_u32_match
net
|
C |
|
|
2 |
644d |
700d
|
22/28 |
588d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
KCSAN: data-race in sit_tunnel_xmit / sit_tunnel_xmit
net
|
|
|
|
702 |
662d |
1759d
|
22/28 |
588d |
cb34b7cf17ec
ipv6/sit: use DEV_STATS_INC() to avoid data-races
|
WARNING in ip6erspan_tunnel_xmit
net
|
|
|
|
23 |
596d |
840d
|
22/28 |
588d |
301bd140ed0b
erspan: do not assume transport header is always set
|
general protection fault in skb_unlink
net
|
C |
done |
error |
8 |
758d |
2319d
|
22/28 |
588d |
5121197ecc5d
kcm: close race conditions on sk_receive_queue
|
WARNING in sk_destruct
net
|
C |
done |
|
454 |
864d |
991d
|
22/28 |
588d |
ebdc1a030962
tcp: add a missing sk_defer_free_flush() in tcp_splice_read()
|
KASAN: slab-out-of-bounds Read in ipvlan_queue_xmit
net
|
C |
error |
error |
8 |
951d |
1428d
|
22/28 |
588d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
kernel panic: corrupted stack end in packet_sendmsg
net
|
|
|
|
1 |
760d |
760d
|
22/28 |
588d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in tcp_ack (3)
net
|
|
|
|
16 |
855d |
913d
|
22/28 |
588d |
40570375356c
tcp: add accessors to read/set tp->snd_cwnd
|
WARNING in napi_complete_done
net
|
C |
error |
|
104 |
696d |
700d
|
22/28 |
588d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
KCSAN: data-race in inet6_recvmsg / ipv6_setsockopt
net
|
|
|
|
1 |
972d |
969d
|
22/28 |
588d |
086d49058cd8
ipv6: annotate some data-races around sk->sk_prot
|
KASAN: use-after-free Read in ip6mr_sk_done
net
|
C |
done |
|
10988 |
703d |
972d
|
22/28 |
588d |
7d9b1b578d67
ip6mr: fix use-after-free in ip6mr_sk_done()
|
WARNING: refcount bug in smc_pnet_add
net
s390
|
C |
done |
|
98 |
958d |
972d
|
22/28 |
588d |
28f922213886
net/smc: fix ref_tracker issue in smc_pnet_add()
|
KASAN: use-after-free Write in mini_qdisc_pair_swap (2)
net
|
|
|
|
24 |
597d |
978d
|
22/28 |
588d |
04c2a47ffb13
net: sched: fix use-after-free in tc_new_tfilter()
|
KMSAN: uninit-value in tcp_recvmsg
net
|
C |
|
|
25918 |
711d |
836d
|
22/28 |
588d |
1228b34c8d0e
net: clear msg_get_inq in __sys_recvfrom() and __copy_msghdr_from_user()
|
memory leak in smc_sysctl_net_init
net
s390
|
C |
|
|
8 |
920d |
925d
|
22/28 |
588d |
5ae6acf1d00b
net/smc: fix a memory leak in smc_sysctl_net_exit()
|
usb-testing boot error: WARNING in __netif_set_xps_queue
net
virt
|
|
|
|
57 |
706d |
719d
|
22/28 |
588d |
fc8695eb11f0
Revert "net: fix cpu_max_bits_warn() usage in netif_attrmask_next{,_and}"
|
KASAN: use-after-free Read in inet_bind2_bucket_find
io-uring
net
|
C |
done |
|
13 |
843d |
850d
|
22/28 |
588d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
memory leak in smc_create (2)
net
s390
|
C |
|
|
2 |
925d |
921d
|
22/28 |
588d |
1a74e9932374
net/smc: Fix sock leak when release after smc_shutdown()
|
possible deadlock in __inet_inherit_port
net
|
C |
done |
|
85 |
626d |
687d
|
22/28 |
588d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
WARNING in cleanup_net
net
|
|
|
|
613 |
589d |
711d
|
22/28 |
588d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
general protection fault in ip6_tnl_xmit
net
|
|
|
|
1 |
969d |
969d
|
22/28 |
588d |
3a5f238f2b36
ip6_tunnel: fix possible NULL deref in ip6_tnl_xmit
|
possible deadlock in sk_common_release
net
|
|
|
|
5 |
676d |
687d
|
22/28 |
588d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
kernel panic: corrupted stack end in inet6_ioctl
net
|
|
|
|
1 |
680d |
680d
|
22/28 |
588d |
b81d591386c3
riscv: Increase stack size under KASAN
|
INFO: rcu detected stall in mld_ifc_work
net
|
C |
inconclusive |
|
1 |
965d |
965d
|
22/28 |
588d |
5740d0689096
net: sched: limit TC_ACT_REPEAT loops
|
WARNING: refcount bug in u32_destroy_key
net
|
|
|
|
1 |
907d |
907d
|
22/28 |
588d |
3db09e762dc7
net/sched: cls_u32: fix netns refcount changes in u32_change()
|
KASAN: use-after-free Read in ip_mc_sf_allow
net
|
|
|
|
1 |
890d |
890d
|
22/28 |
588d |
dba5bdd57bea
net: igmp: respect RCU rules in ip_mc_source() and ip_mc_msfilter()
|
general protection fault in fq_codel_enqueue (3)
net
|
C |
inconclusive |
|
5 |
826d |
1071d
|
22/28 |
588d |
fd1894224407
bpf: Don't redirect packets with invalid pkt_len
|
KCSAN: data-race in fib_alias_hw_flags_set / fib_alias_hw_flags_set
net
|
|
|
|
1 |
966d |
963d
|
22/28 |
588d |
9fcf986cc4bc
ipv4: fix data races in fib_alias_hw_flags_set
|
INFO: trying to register non-static key in __fib6_clean_all (2)
net
|
|
|
|
3 |
725d |
749d
|
22/28 |
588d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
WARNING: bad unlock balance in rxrpc_do_sendmsg
afs
net
|
C |
inconclusive |
|
14 |
794d |
999d
|
22/28 |
588d |
b0f571ecd794
rxrpc: Fix locking in rxrpc's sendmsg
|
memory leak in tun_chr_open
net
|
C |
|
|
1 |
758d |
758d
|
22/28 |
588d |
1118b2049d77
net: tun: Fix memory leaks of napi_get_frags
|
general protection fault in udpv6_sendmsg
net
|
C |
error |
|
69 |
685d |
695d
|
22/28 |
588d |
6423ac2eb31e
rxrpc: Fix oops from calling udpv6_sendmsg() on AF_INET socket
|
KASAN: slab-out-of-bounds Read in decrypt_internal
net
|
C |
inconclusive |
done |
4 |
911d |
1001d
|
22/28 |
588d |
9381fe8c849c
net/tls: fix slab-out-of-bounds bug in decrypt_internal
|
WARNING in ipvlan_unregister_nf_hook
net
|
C |
done |
done |
4151 |
1037d |
1673d
|
22/28 |
746d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
general protection fault in sock_close
net
|
syz |
done |
unreliable |
2 |
1499d |
1495d
|
20/28 |
863d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING in dev_change_net_namespace
net
|
syz |
done |
done |
8 |
1049d |
1697d
|
20/28 |
869d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
WARNING in rtnl_dellink
net
|
C |
done |
done |
94 |
996d |
1507d
|
20/28 |
876d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
INFO: task hung in linkwatch_event (2)
net
|
C |
done |
done |
1033 |
894d |
1620d
|
20/28 |
876d |
563fbefed46a
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
general protection fault in xfrm_user_rcv_msg_compat
net
|
C |
unreliable |
done |
1543 |
1156d |
1369d
|
20/28 |
876d |
4e9505064f58
net/xfrm/compat: Copy xfrm_spdattr_type_t atributes
|
WARNING in dst_release (3)
net
|
|
|
|
3 |
945d |
1025d
|
20/28 |
941d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KCSAN: data-race in __neigh_event_send / ip_finish_output2 (3)
net
|
|
|
|
1 |
1078d |
1076d
|
20/28 |
941d |
d18785e21386
net: annotate data-race in neigh_output()
|
general protection fault in unregister_vlan_dev
net
|
|
|
|
1 |
1040d |
1040d
|
20/28 |
941d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
KASAN: null-ptr-deref Write in dst_release (3)
net
|
|
|
|
2 |
1023d |
1024d
|
20/28 |
941d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KCSAN: data-race in bond_alb_init_slave / bond_alb_monitor
net
|
|
|
|
1 |
1040d |
1039d
|
20/28 |
941d |
dac8e00fb640
bonding: make tx_rebalance_counter an atomic
|
KMSAN: kernel-infoleak in _copy_to_iter (6)
net
|
C |
|
|
748 |
941d |
1030d
|
20/28 |
941d |
71ddeac8cd1d
inet_diag: fix kernel-infoleak for UDP sockets
|
WARNING: ODEBUG bug in qdisc_create
net
|
C |
done |
|
6 |
1110d |
1138d
|
20/28 |
941d |
a56d447f196f
net/sched: sch_taprio: properly cancel timer from taprio_destroy()
|
WARNING: suspicious RCU usage in xfrm_set_default
net
|
C |
done |
|
20 |
1104d |
1109d
|
20/28 |
941d |
93ec1320b017
xfrm: fix rcu lock in xfrm_notify_userpolicy()
|
WARNING: refcount bug in rx_queue_release
net
|
|
|
|
12 |
1044d |
1057d
|
20/28 |
941d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
kmsan boot error: KMSAN: uninit-value in tcp_child_process
net
|
|
|
|
48 |
1026d |
1038d
|
20/28 |
941d |
03cfda4fa6ea
tcp: fix another uninit-value (sk_rx_queue_mapping)
|
kmsan boot error: KMSAN: uninit-value in tcp_conn_request
net
|
|
|
|
27 |
1040d |
1039d
|
20/28 |
941d |
a37a0ee4d25c
net: avoid uninit-value from tcp_conn_request
|
KCSAN: data-race in netlink_insert / netlink_sendmsg (4)
net
|
|
|
|
88 |
1094d |
1175d
|
20/28 |
941d |
7707a4d01a64
netlink: annotate data races around nlk->bound
|
BUG: sleeping function called from invalid context in ref_tracker_alloc
net
|
|
|
|
1 |
1025d |
1025d
|
20/28 |
941d |
8b40a9d53d4f
ipv6: use GFP_ATOMIC in rt6_probe()
|
general protection fault in gro_cells_destroy (2)
net
|
|
|
|
2 |
994d |
1011d
|
20/28 |
941d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KASAN: null-ptr-deref Write in sock_setsockopt
net
|
C |
|
|
45 |
959d |
1067d
|
20/28 |
941d |
d00c8ee31729
net: fix possible NULL deref in sock_reserve_memory
|
WARNING: refcount bug in ip6gre_exit_batch_net
net
|
|
|
|
2 |
1052d |
1054d
|
20/28 |
941d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
KASAN: use-after-free Read in netlbl_catmap_walk
net
lsm
|
C |
inconclusive |
|
1 |
1136d |
1136d
|
20/28 |
941d |
0817534ff9ea
smackfs: Fix use-after-free in netlbl_catmap_walk()
|
general protection fault in bpf_skb_cgroup_id
bpf
net
|
C |
inconclusive |
|
107 |
1098d |
1113d
|
20/28 |
941d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
general protection fault in inet_csk_accept
net
|
C |
done |
|
8 |
1031d |
1030d
|
20/28 |
941d |
b0cdc5dbcf2b
mptcp: never allow the PM to close a listener subflow
|
KASAN: use-after-free Read in tcp_v4_early_demux
net
|
|
|
|
1 |
1023d |
1023d
|
20/28 |
941d |
8f905c0e7354
inet: fully convert sk->sk_rx_dst to RCU rules
|
KCSAN: data-race in unix_inflight / wait_for_unix_gc (3)
net
|
|
|
|
1 |
1008d |
994d
|
20/28 |
941d |
9d6d7f1cb67c
af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
|
KASAN: use-after-free Read in cipso_v4_doi_add
lsm
net
|
|
|
|
1 |
1086d |
1082d
|
20/28 |
941d |
0934ad42bb2c
smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
|
KASAN: invalid-free in packet_set_ring
net
|
C |
inconclusive |
|
4 |
1027d |
1028d
|
20/28 |
941d |
ec6af094ea28
net/packet: rx_owner_map depends on pg_vec
|
general protection fault in bpf_skb_ancestor_cgroup_id
bpf
net
|
C |
unreliable |
|
232 |
1097d |
1113d
|
20/28 |
941d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
INFO: rcu detected stall in fq_pie_timer
net
|
C |
error |
|
35 |
982d |
1200d
|
20/28 |
941d |
61c2402665f1
net/sched: fq_pie: prevent dismantle issue
|
WARNING: refcount bug in netdev_run_todo
net
|
|
|
|
5 |
1044d |
1053d
|
20/28 |
941d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
general protection fault in free_percpu
net
|
syz |
unreliable |
done |
80 |
1009d |
1276d
|
20/28 |
941d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
WARNING: lock held when returning to user space in tcp_setsockopt (2)
net
|
C |
done |
done |
6 |
1015d |
1021d
|
20/28 |
941d |
b29fcfb54cd7
mptcp: full disconnect implementation
|
WARNING in tcf_chain0_head_change_cb_del (3)
net
|
C |
inconclusive |
|
107 |
1025d |
1160d
|
20/28 |
941d |
ab443c539167
sch_cake: do not call cake_destroy() from cake_init()
|
general protection fault in sock_release (2)
net
|
|
|
|
1 |
1029d |
1029d
|
20/28 |
941d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
BUG: unable to handle kernel paging request in dev_fetch_sw_netstats
net
|
|
|
|
1 |
1021d |
1021d
|
20/28 |
941d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
WARNING in free_netdev
net
|
|
|
|
4080 |
955d |
997d
|
20/28 |
941d |
fcfb894d5952
net: bridge: fix net device refcount tracking issue in error path
|
WARNING in nsim_dev_reload_destroy
net
|
C |
done |
|
2895 |
1073d |
1077d
|
20/28 |
941d |
fb9d19c2d844
Revert "devlink: Remove not-executed trap group notifications"
|
KASAN: use-after-free Read in free_netdev (2)
net
|
C |
done |
done |
1715 |
1039d |
1673d
|
20/28 |
941d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
WARNING: refcount bug in linkwatch_do_dev
net
|
|
|
|
74 |
1035d |
1062d
|
20/28 |
941d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
general protection fault in tls_init
net
|
|
|
|
1 |
1041d |
1036d
|
20/28 |
941d |
404cd9a22150
mptcp: remove tcp ulp setsockopt support
|
WARNING: refcount bug in in_dev_finish_destroy (2)
net
|
|
|
|
42 |
1043d |
1058d
|
20/28 |
941d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
general protection fault in smc_pnet_add
net
s390
|
|
|
|
578 |
942d |
997d
|
20/28 |
941d |
7b9b1d449a7c
net/smc: fix possible NULL deref in smc_pnet_add_eth()
|
WARNING in __put_net
net
|
|
|
|
5215 |
984d |
997d
|
20/28 |
941d |
cb963a19d99f
net: sched: do not allocate a tracker in tcf_exts_init()
|
KCSAN: data-race in skb_queue_tail / unix_dgram_poll (4)
net
|
|
|
|
2 |
1119d |
1124d
|
20/28 |
941d |
04f08eb44b50
net/af_unix: fix a data-race in unix_dgram_poll
|
UBSAN: shift-out-of-bounds in __qdisc_calculate_pkt_len
net
|
C |
unreliable |
|
5660 |
1100d |
1397d
|
20/28 |
941d |
b193e15ac69d
net: prevent user from passing illegal stab size
|
general protection fault in dev_get_by_index_rcu (2)
bpf
net
|
C |
error |
|
18 |
1001d |
1001d
|
20/28 |
941d |
382778edc826
xdp: check prog type before updating BPF link
|
WARNING in __dev_set_promiscuity
net
|
C |
done |
|
11 |
1103d |
1106d
|
20/28 |
941d |
a5b8fd657881
net: dev_addr_list: handle first address in __hw_addr_add_ex
|
BUG: sleeping function called from invalid context in hci_cmd_sync_cancel
usb
net
|
C |
done |
|
28 |
1017d |
1031d
|
20/28 |
941d |
744451c162a5
Bluetooth: hci_sync: Push sync command cancellation to workqueue
|
UBSAN: array-index-out-of-bounds in llc_sap_add_socket
net
|
|
|
|
1 |
1067d |
1067d
|
20/28 |
941d |
8ac9dfd58b13
llc: fix out-of-bound array index in llc_sk_dev_hash()
|
net-next test error: WARNING in devlink_nl_region_notify
net
|
|
|
|
24 |
1101d |
1099d
|
20/28 |
941d |
ef91abfb20c7
devlink: Add missed notifications iterators
|
KCSAN: data-race in fib_create_info / free_fib_info
net
|
|
|
|
1 |
1014d |
994d
|
20/28 |
941d |
0a6e6b3c7db6
ipv4: update fib_info_cnt under spinlock protection
|
BUG: sleeping function called from invalid context in tipc_crypto_start
net
|
C |
done |
done |
6 |
1019d |
1026d
|
20/28 |
941d |
f845fe5819ef
Revert "tipc: use consistent GFP flags"
|
general protection fault in ref_tracker_alloc
net
|
C |
done |
|
679 |
997d |
1026d
|
20/28 |
941d |
0976b888a150
ethtool: fix null-ptr-deref on ref tracker
|
WARNING: suspicious RCU usage in ref_tracker_alloc
net
|
|
|
|
17 |
1024d |
1026d
|
20/28 |
941d |
8b40a9d53d4f
ipv6: use GFP_ATOMIC in rt6_probe()
|
UBSAN: shift-out-of-bounds in qfq_init_qdisc
net
|
|
|
|
1 |
1007d |
1007d
|
20/28 |
941d |
7d18a07897d0
sch_qfq: prevent shift-out-of-bounds in qfq_init_qdisc
|
KMSAN: uninit-value in pneigh_fill_info
net
|
C |
|
|
14 |
1029d |
1033d
|
20/28 |
941d |
e195e9b5dee6
net, neigh: clear whole pneigh_entry at alloc time
|
KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit (5)
net
|
|
|
|
1 |
1048d |
1047d
|
20/28 |
941d |
7a10d8c810cf
net: annotate data-races on txq->xmit_lock_owner
|
WARNING in chnl_net_uninit (2)
net
|
|
|
|
1 |
1119d |
1119d
|
20/28 |
941d |
550ac9c1aaaa
net-caif: avoid user-triggerable WARN_ON(1)
|
general protection fault in nfc_alloc_send_skb
net
nfc
|
C |
done |
|
2 |
1009d |
1003d
|
20/28 |
941d |
dded08927ca3
nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind()
|
BUG: unable to handle kernel NULL pointer dereference in fifo_set_limit
net
|
C |
error |
|
1 |
1101d |
1101d
|
20/28 |
941d |
560ee196fe9e
net_sched: fix NULL deref in fifo_set_limit()
|
possible deadlock in smc_switch_to_fallback
net
s390
|
|
|
|
43575 |
1031d |
1050d
|
20/28 |
941d |
7a61432dc813
net/smc: Avoid warning of possible recursive locking
|
WARNING in rtnl_stats_get
net
|
C |
unreliable |
|
31 |
1068d |
1257d
|
20/28 |
941d |
0854a0513321
net: bridge: fix under estimation in br_get_linkxstats_size()
|
kernel BUG at net/phonet/socket.c:LINE!
net
|
C |
inconclusive |
|
168 |
1018d |
1639d
|
20/28 |
941d |
75a2f3152009
phonet/pep: refuse to enable an unbound pipe
|
KCSAN: data-race in __inet_hash_connect / inet_getname
net
|
|
|
|
1 |
1100d |
1074d
|
20/28 |
941d |
9dfc685e0262
inet: remove races in inet{6}_getname()
|
KMSAN: uninit-value in fib_get_nhs
net
|
C |
|
|
14 |
960d |
1030d
|
20/28 |
941d |
7a3429bace0e
ipv4: Check attribute length for RTA_GATEWAY in multipath route
|
WARNING in sk_stream_kill_queues (7)
net
|
C |
|
|
6689 |
942d |
1060d
|
20/28 |
941d |
c4777efa751d
net: add and use skb_unclone_keeptruesize() helper
|
KASAN: use-after-free Read in vlan_dev_real_dev (2)
net
|
C |
error |
|
7 |
1078d |
1089d
|
20/28 |
941d |
563bcbae3ba2
net: vlan: fix a UAF in vlan_dev_real_dev()
|
WARNING in cache_grow_begin
net
|
|
|
|
2 |
989d |
989d
|
20/28 |
941d |
c12837d1bb31
ref_tracker: use __GFP_NOFAIL more carefully
|
UBSAN: shift-out-of-bounds in xfrm_get_default
net
|
C |
done |
|
104 |
1093d |
1131d
|
20/28 |
941d |
3c10ffddc61f
net: xfrm: fix shift-out-of-bounds in xfrm_get_default
|
WARNING in ref_tracker_free
net
|
C |
done |
|
14831 |
999d |
1026d
|
20/28 |
941d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
inconsistent lock state in netlink_broadcast_filtered
net
|
|
|
|
1 |
1075d |
1075d
|
20/28 |
941d |
f941eadd8d6d
bpf: Avoid races in __bpf_prog_run() for 32bit arches
|
WARNING in gnet_stats_add_basic
net
|
C |
done |
|
14 |
1082d |
1083d
|
20/28 |
941d |
e22db7bd552f
net: sched: Allow statistics reads from softirq.
|
BUG: corrupted list in netif_napi_add
net
|
syz |
unreliable |
done |
17 |
1056d |
1088d
|
20/28 |
941d |
0315a075f134
net: fix premature exit from NAPI state polling in napi_disable()
|
INFO: task can't die in __cond_resched
net
|
C |
error |
|
66 |
1056d |
1110d
|
20/28 |
941d |
e9edc188fc76
netfilter: conntrack: serialize hash resizes and cleanups
|
general protection fault in ref_tracker_free
net
|
|
|
|
21 |
1000d |
1025d
|
20/28 |
941d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
BUG: unable to handle kernel NULL pointer dereference in unix_shutdown
net
|
C |
unreliable |
|
413 |
1138d |
1140d
|
20/28 |
984d |
d359902d5c35
af_unix: Fix NULL pointer bug in unix_shutdown
|
KASAN: use-after-free Read in cipso_v4_genopt
lsm
net
|
C |
inconclusive |
|
5 |
1311d |
1313d
|
20/28 |
1060d |
ad5d07f4a9cd
cipso,calipso: resolve a number of problems with the DOI refcounts
1165affd4848
net: mac802154: Fix general protection fault
|
WARNING in idr_get_next
arm-msm
net
|
C |
error |
done |
21 |
1251d |
1495d
|
20/28 |
1060d |
3cbf7530a163
qrtr: Convert qrtr_ports from IDR to XArray
|
KASAN: null-ptr-deref Read in phy_disconnect
net
usb
|
C |
|
|
255 |
1127d |
1131d
|
20/28 |
1060d |
1406e8cb4b05
net: usb: asix: do not call phy_disconnect() for ax88178
|
KMSAN: uninit-value in hsr_fill_frame_info
net
|
C |
|
|
249 |
1177d |
1475d
|
20/28 |
1060d |
2e9f60932a2c
net: hsr: check skb can contain struct hsr_ethhdr in fill_frame_info
|
WARNING: refcount bug in ip6_tnl_dev_uninit
net
|
C |
done |
|
16 |
1283d |
1288d
|
20/28 |
1060d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
KASAN: slab-out-of-bounds Read in fq_pie_qdisc_enqueue
net
|
|
|
|
1 |
1200d |
1200d
|
20/28 |
1060d |
e70f7a11876a
net/sched: fq_pie: fix OOB access in the traffic path
|
WARNING: suspicious RCU usage in do_ipv6_setsockopt
net
|
|
|
|
1 |
1286d |
1286d
|
20/28 |
1060d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
memory leak in garp_request_join
net
|
C |
|
|
414 |
1189d |
1712d
|
20/28 |
1060d |
42ca63f98084
net/802/garp: fix memleak in garp_request_join()
|
KMSAN: uninit-value in virtio_net_hdr_to_skb
net
|
C |
|
|
325 |
1178d |
1237d
|
20/28 |
1060d |
61431a5907fc
net: ensure mac header is set in virtio_net_hdr_to_skb()
|
WARNING in ethnl_default_doit
net
|
|
|
|
202 |
1203d |
1211d
|
20/28 |
1060d |
e175aef90269
ethtool: strset: fix message length calculation
|
KASAN: use-after-free Write in qdisc_class_hash_insert (2)
net
|
|
|
|
1 |
1204d |
1203d
|
20/28 |
1060d |
0cd58e5c53ba
pkt_sched: sch_qfq: fix qfq_change_class() error path
|
KCSAN: data-race in igmp_ifc_event / igmp_ifc_timer_expire
net
|
|
|
|
1 |
1153d |
1152d
|
20/28 |
1060d |
4a2b285e7e10
net: igmp: fix data-race in igmp_ifc_timer_expire()
|
kernel BUG in llc_sap_action_send_xid_c
net
|
C |
error |
|
61 |
1060d |
1274d
|
20/28 |
1060d |
c7c9d2102c9c
net: llc: fix skb_over_panic
|
BUG: unable to handle kernel NULL pointer dereference in htb_select_queue
net
|
syz |
done |
|
8 |
1291d |
1305d
|
20/28 |
1060d |
fb3a3e37de33
sch_htb: Fix offload cleanup in htb_destroy on htb_init failure
93bde210c434
sch_htb: Fix select_queue for non-offload mode
|
KCSAN: data-race in packet_do_bind / packet_sendmsg (3)
net
|
|
|
|
1 |
1220d |
1216d
|
20/28 |
1060d |
c7d2ef5dd4b0
net/packet: annotate accesses to po->bind
|
WARNING: suspicious RCU usage in do_recvmmsg
net
|
|
|
|
8 |
1212d |
1238d
|
20/28 |
1060d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
KASAN: use-after-free Write in sk_psock_stop
bpf
net
|
syz |
done |
|
74 |
1258d |
1278d
|
20/28 |
1060d |
aadb2bb83ff7
sock_map: Fix a potential use-after-free in sock_map_close()
|
KCSAN: data-race in unix_dgram_sendmsg / unix_release_sock
net
|
|
|
|
1 |
1209d |
1208d
|
20/28 |
1060d |
a494bd642d91
net/af_unix: fix a data-race in unix_dgram_sendmsg / unix_release_sock
|
INFO: rcu detected stall in wg_packet_tx_worker (3)
net
|
C |
inconclusive |
|
5 |
1146d |
1128d
|
20/28 |
1060d |
c7c5e6ff533f
fq_codel: reject silly quantum parameters
|
KCSAN: data-race in inet_dgram_connect / udp_lib_get_port (5)
net
|
|
|
|
6 |
1225d |
1212d
|
20/28 |
1060d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
WARNING: refcount bug in vti6_dev_uninit
net
|
C |
|
|
26 |
1283d |
1288d
|
20/28 |
1060d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
general protection fault in unix_dgram_connect
net
|
C |
done |
|
2 |
1134d |
1135d
|
20/28 |
1060d |
dc56ad7028c5
af_unix: fix potential NULL deref in unix_dgram_connect()
|
memory leak in xfrm_user_rcv_msg
net
|
C |
|
|
1 |
1204d |
1200d
|
20/28 |
1060d |
7c1a80e80cde
net: xfrm: fix memory leak in xfrm_user_rcv_msg
|
KMSAN: uninit-value in INET_ECN_decapsulate (2)
net
|
|
|
|
2 |
1214d |
1284d
|
20/28 |
1060d |
6628ddfec758
net: geneve: check skb is large enough for IPv4/IPv6 header
|
KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (5)
net
|
|
|
|
47 |
1061d |
1212d
|
20/28 |
1060d |
f13ef10059cc
net: annotate data race in sock_error()
|
divide error in __tcp_select_window (2)
net
|
C |
done |
|
4 |
1274d |
1275d
|
20/28 |
1060d |
a7150e382267
Revert "tcp: Reset tcp connections in SYN-SENT state"
|
KMSAN: uninit-value in ip_rcv_core
net
|
C |
|
|
141 |
1177d |
2211d
|
20/28 |
1060d |
6628ddfec758
net: geneve: check skb is large enough for IPv4/IPv6 header
|
WARNING in slave_kobj_release
net
|
C |
done |
|
3 |
1238d |
1326d
|
20/28 |
1060d |
35d96e631860
bonding: init notify_work earlier to avoid uninitialized use
|
linux-next boot error: KASAN: use-after-free Read in page_to_skb
net
virt
|
|
|
|
7 |
1263d |
1265d
|
20/28 |
1060d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
KASAN: use-after-free Read in eth_header_parse_protocol
net
|
C |
done |
|
1453 |
1258d |
1305d
|
20/28 |
1060d |
61431a5907fc
net: ensure mac header is set in virtio_net_hdr_to_skb()
|
KCSAN: data-race in udp_lib_setsockopt / udpv6_sendmsg
net
|
|
|
|
1 |
1195d |
1193d
|
20/28 |
1060d |
18a419bad63b
udp: annotate data races around unix_sk(sk)->gso_size
|
WARNING: suspicious RCU usage in nf_ct_iterate_cleanup (2)
net
|
|
|
|
4 |
1190d |
1249d
|
20/28 |
1060d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
WARNING: refcount bug in ip6gre_tunnel_uninit
net
|
C |
error |
|
10 |
1285d |
1288d
|
20/28 |
1060d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
KCSAN: data-race in inet_send_prepare / udp_lib_get_port (3)
net
|
|
|
|
4 |
1213d |
1216d
|
20/28 |
1060d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
net
|
|
|
|
2 |
1237d |
1257d
|
20/28 |
1060d |
821bbf79fe46
ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
|
BUG: using smp_processor_id() in preemptible code in radix_tree_node_alloc
arm-msm
net
|
C |
done |
done |
544 |
1246d |
1583d
|
20/28 |
1060d |
3cbf7530a163
qrtr: Convert qrtr_ports from IDR to XArray
|
general protection fault in smc_tx_sendmsg
net
s390
|
C |
done |
|
6369 |
1194d |
1202d
|
20/28 |
1060d |
17081633e22d
net/smc: Ensure correct state of the socket in send path
|
KCSAN: data-race in packet_do_bind / packet_getname (5)
net
|
|
|
|
4 |
1208d |
1207d
|
20/28 |
1060d |
e032f7c9c7ce
net/packet: annotate accesses to po->ifindex
|
memory leak in qrtr_create
arm-msm
net
|
C |
|
|
3 |
1164d |
1335d
|
20/28 |
1060d |
52f3456a96c0
net: qrtr: fix memory leaks
|
memory leak in virtio_transport_send_pkt_info
net
|
C |
|
|
2 |
1271d |
1334d
|
20/28 |
1060d |
8432b8114957
vsock/virtio: free queued packets when closing socket
|
possible deadlock in ieee80211_tx_frags
net
|
|
|
|
1 |
1261d |
1253d
|
20/28 |
1060d |
1d482e666b8e
netlink: disable IRQs for netlink_lock_table()
|
KCSAN: data-race in __inet_hash_connect / inet_send_prepare (4)
net
|
|
|
|
7 |
1209d |
1212d
|
20/28 |
1060d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
UBSAN: shift-out-of-bounds in choke_change (2)
net
|
C |
done |
|
7 |
1275d |
1290d
|
20/28 |
1060d |
3a87571f0ffc
sch_red: fix off-by-one checks in red_check_params()
|
UBSAN: shift-out-of-bounds in xprt_calc_majortimeo
net
nfs
|
C |
unreliable |
|
149 |
1261d |
1389d
|
20/28 |
1060d |
c09f11ef3595
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
|
INFO: rcu detected stall in tx
net
|
C |
error |
unreliable |
3 |
1127d |
1265d
|
20/28 |
1060d |
30fad76ce4e9
USB: usbtmc: Fix RCU stall warning
|
WARNING: lock held when returning to user space in sock_setsockopt
net
|
|
|
|
1 |
1187d |
1187d
|
20/28 |
1060d |
271dbc318432
sock: unlock on error in sock_setsockopt()
|
WARNING: suspicious RCU usage in inet_twsk_purge
net
|
|
|
|
10 |
1183d |
1285d
|
20/28 |
1060d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
general protection fault in kcm_sendmsg
net
|
C |
done |
|
7957 |
1194d |
1215d
|
20/28 |
1060d |
a47c397bb29f
revert "net: kcm: fix memory leak in kcm_sendmsg"
|
WARNING in sk_stream_kill_queues (6)
net
|
C |
|
|
11376 |
1060d |
1274d
|
20/28 |
1060d |
144748eb0c44
bpf, sockmap: Fix incorrect fwd_alloc accounting
|
linux-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb
net
virt
|
|
|
|
5 |
1263d |
1264d
|
20/28 |
1060d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
BUG: MAX_LOCKDEP_CHAINS too low! (2)
net
|
C |
error |
|
84838 |
1060d |
1536d
|
20/28 |
1060d |
5dc33592e955
lockdep: Allow tuning tracing capacity constants.
|
memory leak in cfserl_create
net
|
C |
|
|
13 |
1779d |
1948d
|
20/28 |
1060d |
b53558a950a8
net: caif: fix memory leak in caif_device_notify
|
UBSAN: shift-out-of-bounds in red_adaptative_timer (2)
net
|
|
|
|
28 |
1289d |
1305d
|
20/28 |
1060d |
e323d865b361
net: sched: validate stab values
|
memory leak in radix_tree_insert
arm-msm
net
|
C |
|
|
1 |
1285d |
1284d
|
20/28 |
1060d |
8a03dd925786
net: qrtr: Fix memory leak on qrtr_tx_wait failure
|
KASAN: use-after-free Read in nfc_llcp_put_ssap
net
nfc
|
syz |
done |
|
4 |
1245d |
1253d
|
20/28 |
1060d |
c61760e6940d
net/nfc: fix use-after-free llcp_sock_bind/connect
|
WARNING: suspicious RCU usage in tcp_bpf_update_proto
bpf
net
|
C |
done |
|
539 |
1258d |
1278d
|
20/28 |
1060d |
51e0158a5432
skmsg: Pass psock pointer to ->psock_update_sk_prot()
|
KCSAN: data-race in __ip4_datagram_connect / skb_set_owner_w (2)
net
|
|
|
|
1 |
1225d |
1212d
|
20/28 |
1060d |
b71eaed8c04f
inet: annotate date races around sk->sk_txhash
|
WARNING: suspicious RCU usage in __copy_msghdr_from_user
net
|
|
|
|
1 |
1226d |
1226d
|
20/28 |
1060d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
BUG: MAX_STACK_TRACE_ENTRIES too low! (3)
net
|
|
|
|
2 |
1263d |
1264d
|
20/28 |
1060d |
5dc33592e955
lockdep: Allow tuning tracing capacity constants.
|
BUG: sleeping function called from invalid context in __ipv6_dev_mc_dec
net
|
C |
done |
|
21 |
1193d |
1250d
|
20/28 |
1060d |
a100243d95a6
rtnetlink: avoid RCU read lock when holding RTNL
|
WARNING: refcount bug in in_dev_finish_destroy
net
|
C |
unreliable |
|
463 |
1061d |
1288d
|
20/28 |
1060d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
WARNING in macvlan_process_broadcast
net
|
|
|
|
32053 |
1060d |
1305d
|
20/28 |
1060d |
dd4fa1dae9f4
macvlan: macvlan_count_rx() needs to be aware of preemption
|
WARNING: suspicious RCU usage in vxlan_xmit
net
|
C |
error |
|
1 |
1202d |
1202d
|
20/28 |
1060d |
85e8b032d6eb
vxlan: add missing rcu_read_lock() in neigh_reduce()
|
linux-next boot error: WARNING: refcount bug in fib_create_info
net
|
|
|
|
3 |
1159d |
1159d
|
20/28 |
1060d |
28814cd18cd7
ipv4: Fix refcount warning for new fib_info
|
possible deadlock in br_ioctl_call
net
|
C |
unreliable |
|
4161 |
1151d |
1161d
|
20/28 |
1060d |
893b19587534
net: bridge: fix ioctl locking
|
BUG: sleeping function called from invalid context in _copy_to_iter
net
|
C |
done |
|
60 |
1146d |
1153d
|
20/28 |
1060d |
876c14ad014d
af_unix: fix holding spinlock in oob handling
|
UBSAN: array-index-out-of-bounds in taprio_change
net
|
|
|
|
2 |
1144d |
1152d
|
20/28 |
1060d |
efe487fce306
fix array-index-out-of-bounds in taprio_change
|
memory leak in tcindex_set_parms
net
|
C |
|
|
94 |
1219d |
1704d
|
20/28 |
1060d |
f5051bcece50
net: sched: fix memory leak in tcindex_partial_destroy_work
|
general protection fault in sock_from_file
net
io-uring
|
C |
inconclusive |
|
78 |
1124d |
1131d
|
20/28 |
1060d |
c6d3d9cbd659
io_uring: fix queueing half-created requests
|
KCSAN: data-race in __skb_try_recv_datagram / sock_setsockopt
net
|
|
|
|
1 |
1194d |
1194d
|
20/28 |
1060d |
0dbffbb5335a
net: annotate data race around sk_ll_usec
|
WARNING: ODEBUG bug in net_dm_cmd_trace
net
|
syz |
unreliable |
|
2 |
1311d |
1307d
|
20/28 |
1060d |
9398e9c0b1d4
drop_monitor: Perform cleanup upon probe registration failure
|
net-next boot error: WARNING: refcount bug in fib_create_info
net
|
|
|
|
39 |
1159d |
1158d
|
20/28 |
1060d |
28814cd18cd7
ipv4: Fix refcount warning for new fib_info
|
UBSAN: shift-out-of-bounds in gred_enqueue
net
|
|
|
|
1 |
1298d |
1298d
|
20/28 |
1060d |
e323d865b361
net: sched: validate stab values
|
WARNING in xfrm_alloc_compat (2)
net
|
C |
done |
|
47 |
1275d |
1285d
|
20/28 |
1060d |
ef19e111337f
xfrm/compat: Cleanup WARN()s that can be user-triggered
|
KMSAN: uninit-value in caif_seqpkt_sendmsg
net
|
C |
|
|
2365 |
1107d |
1523d
|
20/28 |
1060d |
991e634360f2
net: fix uninit-value in caif_seqpkt_sendmsg
|
memory leak in mrp_request_join
net
|
C |
|
|
215 |
1200d |
1718d
|
20/28 |
1060d |
996af62167d0
net/802/mrp: fix memleak in mrp_request_join()
|
net-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb
net
virt
|
|
|
|
15 |
1263d |
1267d
|
20/28 |
1060d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
general protection fault in bond_ipsec_add_sa (2)
net
|
|
|
|
1 |
1187d |
1187d
|
20/28 |
1060d |
105cd17a8660
bonding: fix null dereference in bond_ipsec_add_sa()
|
memory leak in tcp_cdg_init
net
|
syz |
|
|
6 |
1225d |
1364d
|
20/28 |
1060d |
be5d1b61a2ad
tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
|
WARNING: refcount bug in sk_psock_get
net
|
C |
done |
|
8 |
1247d |
1274d
|
20/28 |
1060d |
8621436671f3
smc: disallow TCP_ULP in smc_setsockopt()
|
net-next boot error: KASAN: use-after-free Read in page_to_skb
net
virt
|
|
|
|
11 |
1263d |
1266d
|
20/28 |
1060d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
WARNING: refcount bug in ipip6_tunnel_uninit
net
|
C |
done |
|
199 |
1283d |
1288d
|
20/28 |
1060d |
6289a98f0817
sit: proper dev_{hold|put} in ndo_[un]init methods
|
WARNING: refcount bug in register_netdevice
net
|
C |
unreliable |
|
97 |
1281d |
1288d
|
20/28 |
1060d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
WARNING: refcount bug in ip6erspan_tunnel_uninit
net
|
C |
error |
|
11 |
1285d |
1287d
|
20/28 |
1060d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
UBSAN: shift-out-of-bounds in xfrm_set_default
net
|
C |
unreliable |
|
79 |
1155d |
1166d
|
20/28 |
1060d |
5d8dbb7fb82b
net: xfrm: fix shift-out-of-bounce
|
KMSAN: kernel-infoleak in _copy_to_iter (5)
net
|
C |
|
|
23883 |
1169d |
1605d
|
20/28 |
1060d |
08c27f3322fe
batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field
|
WARNING: locking bug in l2tp_xmit_skb
net
|
|
|
|
1 |
1250d |
1250d
|
20/28 |
1060d |
69e16d01d1de
net: fix a concurrency bug in l2tp_tunnel_register()
|
KMSAN: uninit-value in __dev_mc_add
net
|
C |
|
|
213 |
2004d |
2200d
|
20/28 |
1060d |
cca8ea3b05c9
net: tun: set tun->dev->addr_len during TUNSETLINK processing
|
memory leak in kcm_sendmsg
net
|
C |
|
|
2 |
1556d |
1695d
|
20/28 |
1060d |
c47cc304990a
net: kcm: fix memory leak in kcm_sendmsg
|
UBSAN: shift-out-of-bounds in qdisc_get_rtab
net
|
C |
unreliable |
done |
521 |
1353d |
1397d
|
20/28 |
1208d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
memory leak in qrtr_tun_open
net
arm-msm
|
C |
|
|
4 |
1366d |
1410d
|
20/28 |
1274d |
fc0494ead639
net: qrtr: Fix memory leak in qrtr_tun_open
|
KASAN: null-ptr-deref Read in tcf_idrinfo_destroy
net
|
C |
|
|
115 |
1277d |
1468d
|
20/28 |
1274d |
396d7f23adf9
net: sched: fix police ext initialization
|
INFO: task hung in tcf_action_init_1
net
|
C |
done |
|
30 |
1334d |
1468d
|
20/28 |
1274d |
d349f9976868
net_sched: fix RTNL deadlock again caused by request_module()
|
KASAN: slab-out-of-bounds Read in skb_segment
net
|
C |
error |
|
311 |
1353d |
1357d
|
20/28 |
1274d |
00b229f762b0
net: fix GSO for SG-enabled devices
|
upstream test error: INFO: trying to register non-static key in nsim_get_stats64
net
|
|
|
|
381 |
1305d |
1347d
|
20/28 |
1274d |
863a42b289c2
netdevsim: init u64 stats for 32bit hardware
|
INFO: task can't die in connmark_exit_net
net
|
syz |
error |
|
1 |
1397d |
1393d
|
20/28 |
1274d |
d349f9976868
net_sched: fix RTNL deadlock again caused by request_module()
|
WARNING in __alloc_skb
arm-msm
net
|
C |
error |
|
24 |
1305d |
1317d
|
20/28 |
1274d |
093b036aa94e
net/qrtr: fix __netdev_alloc_skb call
|
WARNING in sk_stream_kill_queues (5)
net
|
C |
done |
|
4684 |
1274d |
1405d
|
20/28 |
1274d |
097b9146c0e2
net: fix up truesize of cloned skb in skb_prepare_for_shift()
|
WARNING in dst_release
net
|
syz |
done |
|
2 |
1326d |
1325d
|
20/28 |
1274d |
e0be4931f3fe
mptcp: reset last_snd on subflow close
|
KASAN: use-after-free Read in skb_segment
net
|
C |
error |
|
55 |
1353d |
1357d
|
20/28 |
1274d |
00b229f762b0
net: fix GSO for SG-enabled devices
|
UBSAN: shift-out-of-bounds in tcf_police_init
net
|
C |
unreliable |
|
8 |
1354d |
1391d
|
20/28 |
1304d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
UBSAN: shift-out-of-bounds in est_timer
net
|
C |
unreliable |
|
73 |
1313d |
1388d
|
20/28 |
1304d |
dd5e073381f2
net_sched: gen_estimator: support large ewma log
|
memory leak in xskq_create
bpf
net
|
C |
|
|
7 |
1371d |
1391d
|
19/28 |
1305d |
8bee68338408
xsk: Fix memory leak for failed bind
|
UBSAN: shift-out-of-bounds in __detect_linklayer
net
|
C |
unreliable |
done |
31 |
1353d |
1360d
|
19/28 |
1305d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
UBSAN: shift-out-of-bounds in tcindex_set_parms
net
|
C |
unreliable |
done |
45 |
1353d |
1388d
|
19/28 |
1305d |
bcd0cf19ef82
net_sched: avoid shift-out-of-bounds in tcindex_set_parms()
|
general protection fault in taprio_dequeue_soft
net
|
C |
done |
|
2 |
1390d |
1390d
|
19/28 |
1305d |
44d4775ca518
net/sched: sch_taprio: reset child qdiscs before freeing them
|
kernel BUG at net/core/dev.c:NUM!
net
|
C |
done |
|
35 |
1359d |
1361d
|
19/28 |
1305d |
47e4bb147a96
net: sit: unregister_netdevice on newlink's error path
|
KASAN: global-out-of-bounds Read in smc_nl_get_sys_info
net
s390
|
C |
error |
|
27 |
1358d |
1384d
|
19/28 |
1305d |
25fe2c9c4cd2
smc: fix out of bound access in smc_nl_get_sys_info()
|
KASAN: use-after-free Read in decode_session6
net
|
C |
done |
|
152 |
1351d |
1559d
|
19/28 |
1305d |
0356010d825e
sctp: bring inet(6)_skb_parm back to sctp_input_cb
|
divide error in __tcp_select_window
net
|
C |
done |
|
1119 |
1409d |
1414d
|
19/28 |
1305d |
fd8976790a6c
mptcp: be careful on MPTCP-level ack.
|
KMSAN: uninit-value in INET_ECN_decapsulate
net
|
|
|
|
3 |
1372d |
1405d
|
19/28 |
1305d |
4179b00c04d1
geneve: pull IP header before ECN decapsulation
|
UBSAN: shift-out-of-bounds in choke_enqueue
net
|
C |
inconclusive |
|
3853 |
1305d |
1398d
|
19/28 |
1305d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
WARNING: suspicious RCU usage in tcp_disconnect
net
|
C |
done |
|
25 |
1359d |
1361d
|
19/28 |
1305d |
13a9499e8333
mptcp: fix locking in mptcp_disconnect()
|
KMSAN: uninit-value in __nla_validate_parse (2)
net
|
C |
|
|
2 |
1366d |
1362d
|
19/28 |
1305d |
c96adff95619
cls_flower: call nla_ok() before nla_next()
|
general protection fault in xsk_recvmsg
bpf
net
|
C |
done |
unreliable |
1800 |
1390d |
1359d
|
19/28 |
1305d |
3546b9b8eced
xsk: Validate socket state in xsk_recvmsg, prior touching socket members
|
UBSAN: shift-out-of-bounds in sfq_init
net
|
C |
unreliable |
|
8 |
1368d |
1382d
|
19/28 |
1305d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KMSAN: uninit-value in gre_parse_header
net
|
C |
|
|
9283 |
1333d |
1931d
|
19/28 |
1305d |
085c7c4e1c0e
erspan: fix version 1 check in gre_parse_header()
|
UBSAN: shift-out-of-bounds in red_adaptative_timer
net
|
C |
unreliable |
|
260 |
1305d |
1397d
|
19/28 |
1305d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KASAN: slab-out-of-bounds Write in xfrm_attr_cpy32
net
|
C |
done |
|
106 |
1395d |
1443d
|
19/28 |
1305d |
d1949d045fd6
xfrm/compat: memset(0) 64-bit padding at right place
|
UBSAN: shift-out-of-bounds in __red_change
net
|
C |
unreliable |
|
24 |
1308d |
1397d
|
19/28 |
1305d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KASAN: use-after-free Read in rxrpc_get_skb
afs
net
|
|
|
|
1 |
1353d |
1349d
|
19/28 |
1305d |
7b5eab57cac4
rxrpc: Fix clearance of Tx/Rx ring when releasing a call
|
UBSAN: shift-out-of-bounds in gred_change
net
|
C |
unreliable |
|
5 |
1319d |
1373d
|
19/28 |
1305d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KASAN: slab-out-of-bounds Read in smc_nl_handle_smcr_dev
s390
net
|
|
|
|
1 |
1388d |
1384d
|
19/28 |
1305d |
995433b795ce
net/smc: fix access to parent of an ib device
|
memory leak in rxrpc_lookup_local
afs
net
|
C |
|
|
1415 |
1345d |
1809d
|
19/28 |
1305d |
b8323f7288ab
rxrpc: Fix memory leak in rxrpc_lookup_local
|
WARNING in xfrm_alloc_compat
net
|
C |
done |
|
130 |
1318d |
1439d
|
19/28 |
1305d |
dbd7ae5154d5
xfrm/compat: Translate by copying XFRMA_UNSPEC attribute
|
UBSAN: shift-out-of-bounds in red_enqueue
net
|
C |
unreliable |
|
4906 |
1305d |
1398d
|
19/28 |
1305d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KMSAN: kernel-infoleak in move_addr_to_user (4)
net
|
C |
|
|
59 |
1312d |
1364d
|
19/28 |
1305d |
b42b3a2744b3
can: isotp: isotp_getname(): fix kernel information leak
|
UBSAN: shift-out-of-bounds in strset_parse_request
net
|
C |
done |
|
16 |
1368d |
1392d
|
19/28 |
1305d |
efb796f5571f
ethtool: fix string set id check
|
UBSAN: shift-out-of-bounds in cbq_dequeue
net
|
C |
unreliable |
|
27 |
1354d |
1397d
|
19/28 |
1305d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
BUG: unable to handle kernel paging request in smc_nl_handle_smcr_dev
net
s390
|
C |
|
|
16 |
1374d |
1397d
|
19/28 |
1305d |
995433b795ce
net/smc: fix access to parent of an ib device
|
KASAN: stack-out-of-bounds Write in bitmap_from_arr32
net
|
C |
done |
|
2 |
1408d |
1404d
|
19/28 |
1305d |
a770bf515613
ethtool: fix stack overflow in ethnl_parse_bitset()
|
KASAN: use-after-free Read in rxrpc_send_data_packet
afs
net
|
|
|
|
1 |
1347d |
1342d
|
19/28 |
1305d |
7b5eab57cac4
rxrpc: Fix clearance of Tx/Rx ring when releasing a call
|
KASAN: use-after-free Read in dump_schedule
net
|
C |
done |
done |
7 |
1382d |
1492d
|
19/28 |
1305d |
cc00bcaa5899
netfilter: x_tables: Switch synchronization to RCU
|
KASAN: use-after-free Read in eth_type_trans
net
|
C |
done |
error |
3 |
1605d |
1747d
|
15/28 |
1382d |
96aa1b22bd6b
tun: correct header offsets in napi frags mode
|
BUG: MAX_LOCKDEP_KEYS too low!
net
|
C |
done |
error |
3496 |
1561d |
1805d
|
15/28 |
1395d |
1a33e10e4a95
net: partially revert dynamic lockdep key changes
|
general protection fault in xsk_release
bpf
net
|
C |
done |
|
2 |
1471d |
1470d
|
15/28 |
1419d |
1fd17c8cd0aa
xsk: Fix possible crash in socket_release when out-of-memory
|
KASAN: use-after-free Write in tcindex_change
net
|
C |
done |
done |
4 |
1661d |
1662d
|
15/28 |
1419d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
possible deadlock in cleanup_net
net
|
C |
done |
|
281 |
1487d |
1495d
|
15/28 |
1419d |
d966ddcc3821
tipc: fix a deadlock when flushing scheduled work
|
KMSAN: uninit-value in ip_tunnel_xmit (2)
net
|
C |
|
|
11778 |
1423d |
2247d
|
15/28 |
1419d |
fdafed459998
ip_gre: set dev->hard_header_len and dev->needed_headroom properly
|
INFO: rcu detected stall in ip_list_rcv
net
|
C |
error |
done |
3 |
1466d |
1492d
|
15/28 |
1419d |
1d0e850a49a5
afs: Fix cell removal
|
general protection fault in tcf_generic_walker
net
|
syz |
|
|
9 |
1465d |
1468d
|
15/28 |
1419d |
580e4273d7a8
net_sched: check error pointer in tcf_dump_walker()
|
KMSAN: uninit-value in unix_find_other
net
|
C |
|
|
57 |
1463d |
2280d
|
15/28 |
1419d |
7ca1db21ef8e
net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
|
INFO: task hung in ctrl_getfamily
net
|
syz |
done |
done |
22 |
1512d |
2125d
|
15/28 |
1419d |
47733f9daf4f
tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
|
WARNING: suspicious RCU usage in qrtr_ns_worker
arm-msm
net
|
C |
done |
|
1 |
1500d |
1563d
|
15/28 |
1419d |
a7809ff90ce6
net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
|
WARNING in rxrpc_recvmsg
afs
net
|
C |
error |
done |
5 |
1554d |
1554d
|
15/28 |
1419d |
65550098c1c4
rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
|
KASAN: use-after-free Read in tcf_action_init
net
|
C |
done |
|
1 |
1470d |
1468d
|
15/28 |
1419d |
0fedc63fadf0
net_sched: commit action insertions together
|
KASAN: slab-out-of-bounds Read in strset_parse_request
net
|
C |
error |
|
141 |
1457d |
1457d
|
15/28 |
1419d |
db972e532518
ethtool: strset: allow ETHTOOL_A_STRSET_COUNTS_ONLY attr
|
KASAN: stack-out-of-bounds Read in xfrm_selector_match (2)
net
|
|
|
|
1 |
1477d |
1474d
|
15/28 |
1419d |
e94ee171349d
xfrm: Use correct address family in xfrm_state_find
|
BUG: unable to handle kernel paging request in tcf_action_dump_terse
net
|
C |
done |
|
15 |
1462d |
1468d
|
15/28 |
1419d |
580e4273d7a8
net_sched: check error pointer in tcf_dump_walker()
|
INFO: task hung in lock_sock_nested (3)
net
|
C |
done |
|
5 |
1462d |
1463d
|
15/28 |
1419d |
d9fb8c507d42
mptcp: fix infinite loop on recvmsg()/worker() race.
|
kernel BUG at net/rxrpc/conn_object.c:LINE!
afs
net
|
C |
done |
|
855 |
1421d |
1486d
|
15/28 |
1419d |
546a42410bf7
rxrpc: Fix conn bundle leak in net-namespace exit
|
possible deadlock in dev_uc_sync
net
|
C |
done |
|
3 |
1454d |
1551d
|
15/28 |
1419d |
0e8b8d6a2d85
net: core: use list_del_init() instead of list_del() in netdev_run_todo()
|
general protection fault in rt6_fill_node
net
|
C |
done |
done |
3 |
1503d |
1500d
|
15/28 |
1419d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
memory leak in __team_options_register
net
|
C |
|
|
1 |
1488d |
1488d
|
15/28 |
1419d |
9a9e77495958
net: team: fix memory leak in __team_options_register
|
general protection fault in nexthop_is_blackhole
net
|
C |
done |
done |
1 |
1503d |
1500d
|
15/28 |
1419d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
KASAN: use-after-free Write in xp_put_pool
bpf
net
|
C |
done |
|
50 |
1472d |
1494d
|
15/28 |
1419d |
83cf5c68d663
xsk: Fix use-after-free in failed shared_umem bind
|
WARNING in nla_get_range_unsigned
net
|
C |
done |
|
63 |
1494d |
1495d
|
15/28 |
1419d |
c30a3c957c88
netlink: policy: correct validation type check
|
general protection fault in xsk_is_setup_for_bpf_map
bpf
net
|
C |
error |
|
294 |
1471d |
1494d
|
15/28 |
1419d |
968be23ceaca
xsk: Fix possible segfault at xskmap entry insertion
|
inconsistent lock state in icmp_send
net
|
syz |
done |
done |
1 |
1626d |
2124d
|
15/28 |
1419d |
1378817486d6
tipc: block BH before using dst_cache
|
INFO: task can't die in rtnetlink_rcv_msg
net
|
|
|
|
5 |
1458d |
1467d
|
15/28 |
1419d |
0fedc63fadf0
net_sched: commit action insertions together
|
KASAN: use-after-free Write in rxrpc_put_bundle
afs
net
|
C |
done |
|
229 |
1457d |
1480d
|
15/28 |
1419d |
f3af4ad1e08a
rxrpc: Fix bundle counting for exclusive connections
|
KASAN: use-after-free Read in tcf_action_destroy
net
|
C |
done |
|
8 |
1461d |
1475d
|
15/28 |
1419d |
0fedc63fadf0
net_sched: commit action insertions together
|
memory leak in xdp_umem_create
net
bpf
|
C |
|
|
17 |
1422d |
1442d
|
15/28 |
1419d |
e5e1a4bc916d
xsk: Fix possible memory leak at socket close
|
general protection fault in xsk_diag_dump (2)
bpf
net
|
C |
|
|
354 |
1475d |
1494d
|
15/28 |
1419d |
53ea2076d851
xsk: Fix possible segfault in xsk umem diagnostics
|
general protection fault in tcf_action_destroy (2)
net
|
C |
done |
done |
29 |
1456d |
1669d
|
15/28 |
1419d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
WARNING: suspicious RCU usage in ctrl_cmd_new_lookup
arm-msm
net
|
C |
done |
done |
10 |
1474d |
1563d
|
15/28 |
1419d |
a7809ff90ce6
net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
|
WARNING: suspicious RCU usage in fib6_del (2)
net
|
|
|
|
1 |
1488d |
1488d
|
15/28 |
1456d |
843d926b003e
ipv6: avoid lockdep issue in fib6_del()
|
KASAN: use-after-free Write in skb_queue_tail
net
arm-msm
|
|
|
|
1 |
1487d |
1487d
|
15/28 |
1456d |
3ca1a42a52ca
net: qrtr: check skb_put_padto() return value
|
possible deadlock in peernet2id_alloc
net
|
|
|
|
12 |
1487d |
1659d
|
15/28 |
1456d |
e1f469cd5866
Revert "netns: don't disable BHs when locking "nsid_lock""
|
KMSAN: uninit-value in __inet_diag_dump
net
|
C |
|
|
37 |
1458d |
1475d
|
15/28 |
1456d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
INFO: task hung in tcf_ife_init
net
|
C |
done |
|
4 |
1488d |
1493d
|
15/28 |
1456d |
cc8e58f8325c
act_ife: load meta modules before tcf_idr_check_alloc()
|
KMSAN: uninit-value in inet_diag_cmd_exact
net
|
C |
|
|
31 |
1457d |
1469d
|
15/28 |
1456d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
general protection fault in free_netdev
net
|
C |
error |
done |
3605 |
1532d |
1566d
|
15/28 |
1464d |
46ef5b89ec0e
ip6_gre: fix null-ptr-deref in ip6gre_init_net()
|
KMSAN: kernel-infoleak in move_addr_to_user (3)
net
|
C |
|
|
79 |
1479d |
1513d
|
15/28 |
1468d |
38ba8b9241f5
can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
|
WARNING: refcount bug in red_destroy
net
|
C |
done |
|
1 |
1502d |
1500d
|
15/28 |
1471d |
5438dd45831e
net_sched: fix error path in red_init()
|
WARNING: refcount bug in smc_release (3)
net
s390
|
|
|
|
1 |
1499d |
1488d
|
15/28 |
1471d |
5fb8642a17aa
net/smc: fix sock refcounting in case of termination
|
WARNING: refcount bug in qdisc_put (2)
net
|
C |
done |
|
7 |
1501d |
1500d
|
15/28 |
1471d |
5438dd45831e
net_sched: fix error path in red_init()
|
KASAN: use-after-free Write in __linkwatch_run_queue
net
|
C |
error |
|
24 |
1534d |
1535d
|
15/28 |
1479d |
c75d1d5248c0
bonding: check return value of register_netdevice() in bond_newlink()
|
KASAN: use-after-free Read in sock_def_write_space (2)
arm-msm
net
|
C |
error |
|
29 |
1480d |
1537d
|
15/28 |
1479d |
af9f691f0f5b
qrtr: orphan socket in qrtr_release()
|
kernel BUG at net/rxrpc/recvmsg.c:LINE!
afs
net
|
C |
error |
|
10 |
1526d |
1554d
|
15/28 |
1479d |
65550098c1c4
rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
|
WARNING in idr_alloc
arm-msm
net
|
C |
done |
|
65 |
1488d |
1563d
|
15/28 |
1479d |
8dfddfb79653
net: qrtr: fix usage of idr in port assignment to socket
|
general protection fault in fib_dump_info (2)
net
|
C |
done |
|
16 |
1503d |
1505d
|
15/28 |
1479d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
KMSAN: uninit-value in netlink_policy_dump_start
net
|
C |
|
|
31 |
1484d |
1488d
|
15/28 |
1479d |
d1fb55592909
netlink: fix state reallocation in policy export
|
KASAN: use-after-free Read in devlink_health_reporter_destroy
net
|
C |
error |
|
1188 |
1543d |
1544d
|
15/28 |
1479d |
5d037b4d3df7
devlink: Fix use-after-free when destroying health reporters
|
kernel BUG at net/core/dev.c:LINE! (3)
net
|
C |
done |
|
979 |
1494d |
1638d
|
15/28 |
1479d |
832707021666
bonding: fix a potential double-unregister
|
general protection fault in vsock_poll
net
virt
|
syz |
done |
|
15 |
1524d |
1536d
|
15/28 |
1479d |
1980c0584483
vsock: fix potential null pointer dereference in vsock_poll()
|
KMSAN: uninit-value in geneve_xmit
net
|
C |
|
|
163 |
1483d |
1536d
|
15/28 |
1479d |
32818c075c54
geneve: fix an uninitialized value in geneve_changelink()
|
KASAN: wild-memory-access Read in rawv6_setsockopt
net
|
|
|
|
2 |
1521d |
1521d
|
15/28 |
1479d |
519a8a6cf91d
net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
|
KASAN: use-after-free Read in __xfrm6_tunnel_spi_lookup
net
|
C |
error |
|
12 |
1538d |
1542d
|
15/28 |
1479d |
8b404f46dd6a
xfrm: interface: not xfrmi_ipv6/ipip_handler twice
|
INFO: trying to register non-static key in red_destroy
net
|
C |
error |
|
318 |
1531d |
1553d
|
15/28 |
1479d |
608b4adab178
net_sched: initialize timer earlier in red_init()
|
KASAN: wild-memory-access Read in ip_setsockopt
net
|
C |
|
|
2 |
1513d |
1513d
|
15/28 |
1479d |
519a8a6cf91d
net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
|
WARNING: suspicious RCU usage in bond_ipsec_add_sa
net
|
|
|
|
214 |
1481d |
1551d
|
15/28 |
1479d |
f548a476268d
bonding: don't need RTNL for ipsec helpers
|
possible deadlock in dev_mc_unsync
net
|
C |
error |
done |
78 |
1546d |
1561d
|
15/28 |
1508d |
be74294ffa24
net: get rid of lockdep_set_class_and_subclass()
|
WARNING: locking bug in try_to_grab_pending
net
|
syz |
error |
done |
1 |
1598d |
2060d
|
15/28 |
1509d |
1378817486d6
tipc: block BH before using dst_cache
|
general protection fault in qrtr_endpoint_post
arm-msm
net
|
C |
done |
done |
54 |
1546d |
1564d
|
15/28 |
1515d |
8ff41cc21714
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
|
WARNING in xfrm_policy_insert
net
|
C |
inconclusive |
done |
6 |
1572d |
2425d
|
15/28 |
1529d |
ed17b8d377ea
xfrm: fix a warning in xfrm_policy_insert_list
|
KASAN: use-after-free Read in sock_def_write_space
arm-msm
net
|
C |
done |
|
67 |
1538d |
1903d
|
15/28 |
1538d |
a9b111016235
llc: make sure applications use ARPHRD_ETHER
|
KASAN: slab-out-of-bounds Read in qrtr_endpoint_post
arm-msm
net
|
C |
|
|
8 |
1560d |
1561d
|
15/28 |
1538d |
8ff41cc21714
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
|
memory leak in qdisc_create_dflt
net
|
C |
|
|
1 |
1557d |
1553d
|
15/28 |
1538d |
306381aec7c2
net_sched: fix a memory leak in atm_tc_init()
|
WARNING in hsr_dev_finalize
net
|
C |
error |
|
1546 |
1546d |
1561d
|
15/28 |
1538d |
ccfc9df1352b
hsr: fix interface leak in error path of hsr_dev_finalize()
|
kernel BUG at net/l2tp/l2tp_core.c:LINE!
net
|
C |
|
|
10 |
1563d |
1558d
|
15/28 |
1538d |
c9a368f1c0fb
bpf: net: Avoid incorrect bpf_sk_reuseport_detach call
|
possible deadlock in dev_uc_sync_multiple (2)
net
|
|
|
|
26 |
1548d |
1559d
|
15/28 |
1538d |
be74294ffa24
net: get rid of lockdep_set_class_and_subclass()
|
KASAN: use-after-free Read in devlink_get_from_attrs
net
|
C |
|
|
25 |
1546d |
1558d
|
15/28 |
1538d |
bf64ff4c2aac
genetlink: get rid of family->attrbuf
|
KASAN: use-after-free Read in ip_icmp_error
net
|
C |
done |
|
14 |
1592d |
1593d
|
15/28 |
1540d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
KASAN: slab-out-of-bounds Read in ip_icmp_error
net
|
C |
done |
|
13 |
1592d |
1592d
|
15/28 |
1540d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
WARNING: proc registration bug in snmp6_register_dev
net
|
C |
done |
|
14 |
1568d |
1634d
|
15/28 |
1540d |
de0083c7ed7d
hsr: avoid to create proc file after unregister
|
KASAN: use-after-free Read in inet_diag_bc_sk
net
|
C |
done |
|
30 |
1616d |
1618d
|
15/28 |
1540d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
linux-next boot error: WARNING: suspicious RCU usage in ipmr_get_table
net
|
|
|
|
60 |
1613d |
1621d
|
15/28 |
1540d |
7013908c2db2
ipmr: Add lockdep expression to ipmr_for_each_table macro
|
BUG: unable to handle kernel NULL pointer dereference in dev_ifconf
net
|
|
|
|
1 |
1571d |
1571d
|
15/28 |
1540d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: using smp_processor_id() in preemptible [ADDR] code: /NUM
net
|
|
|
|
1 |
1598d |
1598d
|
15/28 |
1540d |
1378817486d6
tipc: block BH before using dst_cache
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (3)
net
|
|
|
|
1 |
1590d |
1590d
|
15/28 |
1540d |
d9a81a225277
l2tp: add sk_family checks to l2tp_validate_socket
|
KMSAN: uninit-value in tbf_enqueue
net
|
|
|
|
21 |
1540d |
1628d
|
15/28 |
1540d |
9274124f023b
net: stricter validation of untrusted gso packets
|
general protection fault in fq_codel_enqueue
net
|
C |
done |
|
25 |
1545d |
1630d
|
15/28 |
1540d |
9274124f023b
net: stricter validation of untrusted gso packets
|
general protection fault in put_cmsg
net
|
C |
done |
|
3 |
1606d |
1606d
|
15/28 |
1540d |
1b2f08df0a88
ipv6: set msg_control_is_user in do_ipv6_getsockopt
|
KASAN: slab-out-of-bounds Read in inet_diag_bc_sk
net
|
C |
done |
|
45 |
1615d |
1618d
|
15/28 |
1540d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
BUG: unable to handle kernel NULL pointer dereference in debug_smp_processor_id (2)
net
|
|
|
|
3 |
1562d |
1570d
|
15/28 |
1540d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: unable to handle kernel NULL pointer dereference in net_rx_queue_update_kobjects
net
|
|
|
|
1 |
1571d |
1571d
|
15/28 |
1540d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
general protection fault in erspan_validate
net
|
C |
done |
|
520 |
1606d |
1613d
|
15/28 |
1540d |
51fa960d3b51
erspan: Check IFLA_GRE_ERSPAN_VER is set.
|
general protection fault in inet_unhash
net
|
C |
done |
|
40 |
1562d |
1590d
|
15/28 |
1540d |
02c71b144c81
l2tp: do not use inet_hash()/inet_unhash()
|
linux-next boot error: WARNING: suspicious RCU usage in bpq_device_event
net
|
|
|
|
6 |
1604d |
1605d
|
15/28 |
1540d |
95f59bf88bb7
drivers: net: hamradio: Fix suspicious RCU usage warning in bpqether.c
|
KASAN: use-after-free Read in rpc_net_ns
nfs
net
|
syz |
done |
|
10 |
1606d |
1612d
|
15/28 |
1540d |
31e9a7f35352
SUNRPC: fix use-after-free in rpc_free_client_work()
|
general protection fault in skb_clone (3)
net
|
|
|
|
44 |
1591d |
1593d
|
15/28 |
1540d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
KMSAN: uninit-value in do_tcp_getsockopt
net
|
|
|
|
5 |
1553d |
1605d
|
15/28 |
1540d |
e776af608f69
net-backports: tcp: fix error recovery in tcp_zerocopy_receive()
|
linux-next test error: WARNING: suspicious RCU usage in ipmr_device_event
net
|
|
|
|
24 |
1622d |
1628d
|
15/28 |
1540d |
a14fbcd4f157
ipmr: Fix RCU list debugging warning
|
memory leak in genl_rcv_msg
net
|
C |
|
|
116 |
1576d |
1766d
|
15/28 |
1540d |
c36f05559104
genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()
|
KASAN: slab-out-of-bounds Read in fl6_update_dst
net
|
C |
done |
|
43 |
1562d |
1607d
|
15/28 |
1540d |
bb986a50421a
seg6: fix seg6_validate_srh() to avoid slab-out-of-bounds
|
general protection fault in sock_hash_free
net
bpf
|
|
|
|
1 |
1585d |
1585d
|
15/28 |
1540d |
75e68e5bf2c7
bpf, sockhash: Synchronize delete from bucket list on map free
|
KASAN: slab-out-of-bounds Read in skb_gso_transport_seglen
net
|
C |
done |
|
4 |
1610d |
1630d
|
15/28 |
1540d |
9274124f023b
net: stricter validation of untrusted gso packets
|
WARNING: locking bug in dev_mc_seq_show
net
|
C |
done |
|
3 |
1581d |
1592d
|
15/28 |
1540d |
845e0ebb4408
net: change addr_list_lock back to static key
|
general protection fault in inet_diag_bc_sk
net
|
|
|
|
12 |
1615d |
1618d
|
15/28 |
1540d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
KMSAN: uninit-value in skbprio_enqueue
net
|
syz |
|
|
11 |
1555d |
1618d
|
15/28 |
1540d |
2761121af87d
net_sched: sch_skbprio: add message validation to skbprio_change()
|
INFO: rcu detected stall in wg_packet_tx_worker
net
|
C |
done |
|
24 |
1569d |
1622d
|
15/28 |
1540d |
df4953e4e997
sch_sfq: validate silly quantum values
|
KCSAN: data-race in tcp_add_backlog / tcp_try_rmem_schedule
net
|
|
|
|
3 |
1819d |
1824d
|
15/28 |
1557d |
ebb3b78db7bf
tcp: annotate sk->sk_rcvbuf lockless reads
|
WARNING in sk_stream_kill_queues (4)
net
|
C |
done |
done |
6 |
1680d |
1684d
|
15/28 |
1557d |
b6f6118901d1
ipv6: restrict IPV6_ADDRFORM operation
|
WARNING in kfree (2)
net
|
syz |
done |
done |
1 |
1670d |
1669d
|
15/28 |
1559d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
KMSAN: uninit-value in etf_enqueue_timesortedlist
net
|
|
|
|
3 |
1611d |
1618d
|
15/28 |
1569d |
a1211bf9a777
sched: etf: do not assume all sockets are full blown
|
general protection fault in macvlan_device_event
net
|
|
|
|
86 |
1618d |
1633d
|
15/28 |
1569d |
4dee15b4fd0d
macvlan: fix null dereference in macvlan_device_event()
|
KASAN: use-after-free Read in report_sock_error
net
|
|
|
|
2 |
1623d |
1628d
|
15/28 |
1569d |
a1211bf9a777
sched: etf: do not assume all sockets are full blown
|
KASAN: use-after-free Write in tcindex_set_parms
net
|
C |
done |
|
13 |
1649d |
1669d
|
15/28 |
1609d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
KASAN: use-after-free Read in tcindex_dump
net
|
syz |
|
|
1 |
1671d |
1669d
|
15/28 |
1609d |
b1be2e8cd290
net_sched: hold rtnl lock in tcindex_partial_destroy_work()
|
general protection fault in macsec_upd_offload
net
|
C |
done |
|
5 |
1647d |
1646d
|
15/28 |
1609d |
aa81700cf232
macsec: fix NULL dereference in macsec_upd_offload()
|
general protection fault in hfsc_unbind_tcf
net
|
|
|
|
1 |
1661d |
1657d
|
15/28 |
1609d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING in geneve_exit_batch_net (2)
net
|
C |
done |
|
9 |
1656d |
1680d
|
15/28 |
1609d |
0fda7600c2e1
geneve: move debug check after netdev unregister
|
KASAN: invalid-free in tcf_exts_destroy
net
|
C |
done |
|
1 |
1672d |
1671d
|
15/28 |
1609d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
general protection fault in do_tcp_getsockopt (2)
net
|
C |
done |
|
1 |
1661d |
1661d
|
15/28 |
1609d |
6cd6cbf593bf
net-backports: tcp: repair: fix TCP_QUEUE_SEQ implementation
|
WARNING: refcount bug in __tcf_action_put
net
|
syz |
|
|
1 |
1670d |
1669d
|
15/28 |
1609d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
general protection fault in ethnl_parse_header
net
|
C |
done |
|
9 |
1656d |
1660d
|
15/28 |
1609d |
55b474c41e58
netlink: check for null extack in cookie helpers
|
general protection fault in hsr_addr_is_self (2)
net
|
|
|
|
1 |
1660d |
1660d
|
15/28 |
1609d |
3a303cfdd28d
hsr: fix general protection fault in hsr_addr_is_self()
|
WARNING: ODEBUG bug in __init_work
net
|
syz |
done |
|
1 |
1657d |
1656d
|
15/28 |
1609d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING in call_rcu
net
|
C |
done |
|
8 |
1662d |
1669d
|
15/28 |
1609d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING: ODEBUG bug in tcf_queue_work
net
|
C |
done |
|
30 |
1674d |
1674d
|
15/28 |
1609d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
general protection fault in qdisc_hash_add
net
|
C |
done |
|
47 |
1667d |
1668d
|
15/28 |
1609d |
7c4046b1c53b
Revert "net: sched: make newly activated qdiscs visible"
|
WARNING: refcount bug in tcindex_data_put
net
|
C |
done |
|
27 |
1645d |
1646d
|
15/28 |
1609d |
a8eab6d35e22
net_sched: fix a missing refcnt in tcindex_init()
|
KASAN: use-after-free Read in route4_get
net
|
C |
|
|
8 |
1637d |
1667d
|
15/28 |
1609d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
general protection fault in erspan_netlink_parms
net
|
C |
done |
|
5 |
1664d |
1664d
|
15/28 |
1609d |
32ca98feab8c
net: ip_gre: Accept IFLA_INFO_DATA-less configuration
|
KMSAN: uninit-value in tcf_exts_change
net
|
C |
|
|
5 |
1660d |
1669d
|
15/28 |
1609d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
BUG: sleeping function called from invalid context in kmem_cache_alloc_node_trace
net
|
C |
done |
|
364 |
1670d |
1673d
|
15/28 |
1609d |
138470a9b2cc
net/sched: act_ct: fix lockdep splat in tcf_ct_flow_table_get
|
WARNING: ODEBUG bug in tcindex_destroy_work (3)
net
|
syz |
done |
|
13 |
1648d |
1684d
|
15/28 |
1609d |
304e024216a8
net_sched: add a temporary refcnt for struct tcindex_data
|
KMSAN: uninit-value in macsec_handle_frame
net
|
|
|
|
1 |
1659d |
1659d
|
15/28 |
1609d |
b06d072ccc4b
macsec: restrict to ethernet devices
|
WARNING: refcount bug in igmp_start_timer
net
|
syz |
done |
done |
19 |
1874d |
2239d
|
15/28 |
1631d |
323ebb61e32b
net: use listified RX for handling GRO_NORMAL skbs
|
possible deadlock in sch_direct_xmit
net
|
C |
done |
done |
1548 |
1775d |
2453d
|
15/28 |
1631d |
323ebb61e32b
net: use listified RX for handling GRO_NORMAL skbs
|
KASAN: use-after-free Read in alloc_netdev_mqs
net
|
|
|
|
1 |
1695d |
1695d
|
15/28 |
1633d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in __iptunnel_pull_header
net
|
C |
|
|
12 |
1665d |
1673d
|
15/28 |
1633d |
17c25cafd4d3
gre: fix uninit-value in __iptunnel_pull_header
|
KASAN: use-after-free Read in inet_gifconf
net
|
|
|
|
24 |
1687d |
1693d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ipv6_get_ifaddr
net
|
|
|
|
1 |
1691d |
1691d
|
15/28 |
1633d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KASAN: use-after-free Read in inet_lookup_ifaddr_rcu
net
|
|
|
|
2 |
1687d |
1689d
|
15/28 |
1633d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in netdev_state_change
net
|
|
|
|
2 |
1677d |
1678d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in rtnl_fill_ifinfo (2)
net
|
|
|
|
2 |
1692d |
1693d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KMSAN: uninit-value in slhc_compress
net
|
C |
|
|
3 |
1676d |
1676d
|
15/28 |
1633d |
110a40dfb708
slip: make slhc_compress() more robust against malicious packets
|
WARNING: ODEBUG bug in smc_ib_remove_dev
net
s390
|
|
|
|
52 |
1664d |
1678d
|
15/28 |
1633d |
ece0d7bd7461
net/smc: cancel event worker during device removal
|
KASAN: use-after-free Read in netdev_state_change
net
|
|
|
|
2 |
1692d |
1693d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
BUG: unable to handle kernel NULL pointer dereference in inet_release
net
|
syz |
|
|
3 |
1683d |
1684d
|
15/28 |
1633d |
b6f6118901d1
ipv6: restrict IPV6_ADDRFORM operation
|
BUG: unable to handle kernel paging request in ethnl_update_bitset32
net
|
C |
|
|
168 |
1673d |
1685d
|
15/28 |
1633d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in ipv6_chk_addr_and_flags
net
|
|
|
|
1 |
1693d |
1693d
|
15/28 |
1633d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in find_match
net
|
C |
|
|
52 |
1664d |
1693d
|
15/28 |
1633d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache
net
bpf
|
|
|
|
2 |
1703d |
1702d
|
15/28 |
1633d |
457fed775c97
net/smc: fix leak of kernel memory to user space
|
KMSAN: uninit-value in bond_alb_xmit
net
|
syz |
|
|
3 |
1674d |
1676d
|
15/28 |
1633d |
b7469e83d2ad
bonding/alb: make sure arp header is pulled before accessing it
|
general protection fault in smc_ib_remove_dev
s390
net
|
C |
done |
|
98 |
1673d |
1685d
|
15/28 |
1633d |
a2f2ef4a54c0
net/smc: check for valid ib_client_data
|
KMSAN: use-after-free in inet_gifconf
net
|
|
|
|
10 |
1664d |
1687d
|
15/28 |
1633d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in ip6_dst_destroy
net
|
C |
|
|
2 |
1666d |
1678d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
possible deadlock in inet_csk_accept
net
|
C |
done |
|
992 |
1668d |
1669d
|
15/28 |
1633d |
06669ea346e4
net: memcg: fix lockdep splat in inet_csk_accept()
|
KASAN: slab-out-of-bounds Read in ethnl_update_bitset32
net
|
syz |
|
|
2 |
1679d |
1685d
|
15/28 |
1633d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in dev_get_by_index_rcu
net
|
|
|
|
1 |
1688d |
1688d
|
15/28 |
1633d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
possible deadlock in bond_get_stats (3)
net
|
syz |
done |
|
2 |
1688d |
1688d
|
15/28 |
1633d |
b3e80d44f5b1
bonding: fix lockdep warning in bond_get_stats()
|
KMSAN: use-after-free in veth_xmit
net
|
|
|
|
8 |
1664d |
1679d
|
15/28 |
1633d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in kstrdup
net
|
C |
|
|
8 |
1669d |
1696d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ethnl_update_bitset32
net
|
C |
done |
|
6 |
1677d |
1685d
|
15/28 |
1633d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in fib_nexthop_info
net
|
|
|
|
1 |
1693d |
1693d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: slab-out-of-bounds Read in inet_gifconf
net
|
|
|
|
2 |
1693d |
1693d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ip6_dst_destroy
net
|
C |
done |
|
1 |
1693d |
1693d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in l3mdev_master_ifindex_rcu
net
|
C |
done |
done |
13 |
1689d |
1695d
|
15/28 |
1633d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
kernel panic: stack is corrupted in vhost_net_ioctl
virt
kvm
net
|
C |
done |
|
2 |
1693d |
1780d
|
15/28 |
1633d |
42d84c8490f9
vhost: Check docket sk_family instead of call getname
|
KASAN: use-after-free Read in __neigh_notify
net
|
|
|
|
2 |
1692d |
1693d
|
15/28 |
1633d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
lsm
net
|
C |
done |
|
8 |
1674d |
1684d
|
15/28 |
1633d |
dc24f8b4ecd3
mptcp: add dummy icsk_sync_mss()
|
INFO: task hung in lock_sock_nested (2)
net
|
C |
done |
|
418 |
1673d |
1686d
|
15/28 |
1633d |
3f74957fcbea
vsock: fix potential deadlock in transport->release()
|
KMSAN: use-after-free in l3mdev_master_ifindex_rcu
net
|
C |
|
|
5 |
1664d |
1687d
|
15/28 |
1633d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in dev_alloc_name_ns
net
|
|
|
|
3 |
1664d |
1678d
|
15/28 |
1633d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KASAN: use-after-free Read in mld_in_v1_mode
net
|
C |
done |
|
3 |
1692d |
1695d
|
15/28 |
1633d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
BUG: unable to handle kernel paging request in slhc_free
net
|
C |
done |
done |
177 |
1989d |
2107d
|
15/28 |
1668d |
baf76f0c58ae
slip: make slhc_free() silently accept an error pointer
|
KMSAN: uninit-value in setup_udp_tunnel_sock
net
|
C |
|
|
1 |
1719d |
1719d
|
15/28 |
1690d |
940ba1498665
net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
WARNING: lock held when returning to user space in tun_get_user (2)
net
|
|
|
|
7 |
1707d |
1718d
|
15/28 |
1690d |
1efba987c486
net-backports: tun: add mutex_unlock() call and napi.skb clearing in tun_get_user()
|
WARNING in devlink_port_type_warn
net
|
|
|
|
2340 |
1721d |
1793d
|
15/28 |
1690d |
4c582234ab39
devlink: Wait longer before warning about unset port type
|
KMSAN: uninit-value in rsvp_change
net
|
C |
|
|
4 |
1711d |
1712d
|
15/28 |
1690d |
cb3c0e6bdf64
cls_rsvp: fix rsvp_policy
|
BUG: unable to handle kernel paging request in rhashtable_replace_fast
net
|
|
|
|
2 |
1716d |
1724d
|
15/28 |
1690d |
41cdc741048b
netdevsim: fix nsim_fib6_rt_create() error path
|
general protection fault in hsr_addr_is_self
net
|
|
|
|
3 |
1692d |
1708d
|
15/28 |
1690d |
2b5b8251bc9f
net: hsr: fix possible NULL deref in hsr_handle_frame()
|
INFO: rcu detected stall in addrconf_rs_timer (3)
net
|
C |
inconclusive |
done |
81 |
1751d |
1747d
|
15/28 |
1690d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (2)
net
|
C |
done |
|
8 |
1717d |
1719d
|
15/28 |
1690d |
940ba1498665
net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
BUG: sleeping function called from invalid context in lock_sock_nested
bpf
net
|
C |
|
|
1232 |
1690d |
1766d
|
15/28 |
1690d |
37f96694cf73
crypto: af_alg - Use bh_lock_sock in sk_destruct
|
memory leak in vlan_dev_set_egress_priority
net
|
C |
|
|
1 |
1733d |
1733d
|
15/28 |
1690d |
9bbd917e0bec
vlan: fix memory leak in vlan_dev_set_egress_priority
|
WARNING in sk_psock_drop
bpf
net
|
|
|
|
157 |
1713d |
1722d
|
15/28 |
1690d |
58c8db929db1
net, sk_msg: Don't check if sock is locked when tearing down psock
|
KMSAN: uninit-value in macvlan_broadcast
net
|
C |
|
|
2 |
1733d |
1733d
|
15/28 |
1690d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
WARNING in tcp_ack
net
|
C |
done |
|
3 |
1731d |
1732d
|
15/28 |
1690d |
90d72256addf
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
memory leak in em_nbyte_change
net
|
C |
|
|
1 |
1715d |
1715d
|
15/28 |
1690d |
55cd9f67f1e4
net_sched: ematch: reject invalid TCF_EM_SIMPLE
|
KCSAN: data-race in __skb_try_recv_from_queue / unix_dgram_sendmsg
net
|
|
|
|
61 |
1706d |
1724d
|
15/28 |
1690d |
86b18aaa2b5b
skbuff: fix a data race in skb_queue_len()
|
KASAN: slab-out-of-bounds Read in macvlan_broadcast
net
|
C |
done |
|
10 |
1731d |
1733d
|
15/28 |
1690d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
KASAN: slab-out-of-bounds Read in nla_put_nohdr
net
|
C |
done |
|
1 |
1718d |
1718d
|
15/28 |
1690d |
61678d28d4a4
net_sched: fix datalen for ematch
|
WARNING: bad unlock balance in release_sock
net
|
|
|
|
1 |
1732d |
1732d
|
15/28 |
1690d |
90d72256addf
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
KASAN: use-after-free Read in tcp_fastretrans_alert
net
|
C |
done |
|
1 |
1721d |
1721d
|
15/28 |
1690d |
2bec445f9bf3
net-backports: tcp: do not leave dangling pointers in tp->highest_sack
|
BUG: unable to handle kernel paging request in rhashtable_jhash2
net
|
C |
done |
|
6 |
1723d |
1724d
|
15/28 |
1690d |
41cdc741048b
netdevsim: fix nsim_fib6_rt_create() error path
|
memory leak in tcf_ctinfo_init
net
|
C |
|
|
2 |
1720d |
1721d
|
15/28 |
1690d |
09d4f10a5e78
net: sched: act_ctinfo: fix memory leak
|
KASAN: slab-out-of-bounds Read in __nla_put_nohdr
net
|
C |
done |
|
4 |
1718d |
1718d
|
15/28 |
1690d |
61678d28d4a4
net_sched: fix datalen for ematch
|
INFO: rcu detected stall in br_handle_frame (2)
net
|
C |
done |
|
2 |
1750d |
1746d
|
15/28 |
1690d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
INFO: rcu detected stall in netlink_sendmsg (3)
net
|
C |
done |
|
6 |
1698d |
1751d
|
15/28 |
1690d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
WARNING in cbq_destroy_class
net
|
C |
done |
|
7 |
1695d |
1718d
|
15/28 |
1690d |
2e24cd755552
net_sched: fix ops->bind_class() implementations
|
WARNING in cbq_destroy
net
|
C |
done |
|
1 |
1718d |
1718d
|
15/28 |
1690d |
2e24cd755552
net_sched: fix ops->bind_class() implementations
|
KASAN: use-after-free Read in tcp_check_sack_reordering
net
|
C |
done |
|
2 |
1713d |
1722d
|
15/28 |
1690d |
2bec445f9bf3
net-backports: tcp: do not leave dangling pointers in tp->highest_sack
|
KASAN: use-after-free Read in macvlan_broadcast
net
|
C |
done |
|
12 |
1731d |
1733d
|
15/28 |
1690d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
WARNING: bad unlock balance in gtp_encap_enable_socket
net
|
C |
done |
|
8 |
1730d |
1734d
|
15/28 |
1690d |
90d72256addf
net-backports: gtp: fix bad unlock balance in gtp_encap_enable_socket
|
WARNING: bad unlock balance in sch_direct_xmit
net
|
C |
done |
|
35 |
1721d |
1767d
|
15/28 |
1690d |
53d374979ef1
net: avoid updating qdisc_xmit_lock_key in netdev_update_lockdep_key()
|
general protection fault in inet6_set_link_af
net
|
C |
done |
|
8 |
1700d |
1704d
|
15/28 |
1690d |
db3fa271022d
ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
|
general protection fault in tcf_ife_cleanup
net
|
C |
done |
|
111 |
1705d |
1729d
|
15/28 |
1690d |
44c23d71599f
net/sched: act_ife: initalize ife->metalist earlier
|
KASAN: use-after-free Write in __alloc_skb (2)
net
|
C |
done |
|
7 |
1741d |
1758d
|
15/28 |
1690d |
d836f5c69d87
net-backports: net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
|
WARNING in geneve_exit_batch_net
net
|
|
|
|
15 |
1691d |
1716d
|
15/28 |
1690d |
760d228e322e
net_sched: walk through all child classes in tc_bind_tclass()
|
KASAN: slab-out-of-bounds Read in tcf_exts_destroy
net
|
C |
done |
error |
8 |
1813d |
1716d
|
15/28 |
1690d |
599be01ee567
net_sched: fix an OOB access in cls_tcindex
|
WARNING: ODEBUG bug in tcindex_destroy_work (2)
net
|
|
|
|
5 |
1695d |
1706d
|
15/28 |
1690d |
599be01ee567
net_sched: fix an OOB access in cls_tcindex
|
inconsistent lock state in rxrpc_put_client_connection_id
net
afs
|
C |
done |
|
473 |
1699d |
1705d
|
15/28 |
1690d |
963485d436cc
rxrpc: Fix call RCU cleanup using non-bh-safe locks
|
KASAN: null-ptr-deref Read in tcf_generic_walker
net
|
C |
done |
|
6 |
1694d |
1713d
|
15/28 |
1690d |
760d228e322e
net_sched: walk through all child classes in tc_bind_tclass()
|
WARNING in tcp_enter_loss (2)
net
|
C |
done |
unreliable |
4 |
2348d |
2398d
|
15/28 |
1691d |
16ae6aa17052
tcp: ignore Fast Open on repair mode
|
KMSAN: uninit-value in bond_neigh_setup
net
|
|
|
|
64 |
1739d |
1763d
|
15/28 |
1695d |
f394722fb0d0
net-backports: neighbour: remove neigh_cleanup() method
|
KASAN: slab-out-of-bounds Read in hsr_debugfs_rename
net
|
C |
done |
|
18 |
1734d |
1743d
|
15/28 |
1695d |
04b69426d846
hsr: fix slab-out-of-bounds Read in hsr_debugfs_rename()
|
WARNING: refcount bug in smc_release (2)
net
s390
|
C |
done |
|
9 |
1752d |
1776d
|
15/28 |
1695d |
86434744fedf
net/smc: add fallback check to connect()
|
BUG: corrupted list in hsr_add_node
net
|
|
|
|
1 |
1797d |
1796d
|
15/28 |
1695d |
92a35678ec07
hsr: fix a race condition in node list insertion and deletion
|
kernel BUG at include/linux/mm.h:LINE! (5)
net
|
C |
done |
done |
129 |
1971d |
2041d
|
15/28 |
1732d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
KASAN: slab-out-of-bounds Read in bpf_prog_create
bpf
net
|
C |
done |
|
447 |
1762d |
1844d
|
15/28 |
1732d |
0033b34a03ec
ppp: fix out-of-bounds access in bpf_prog_create()
|
memory leak in register_netdevice
net
|
C |
|
|
19 |
1763d |
1768d
|
15/28 |
1732d |
42c17fa69f98
net: fix a leak in register_netdevice()
|
KCSAN: data-race in mod_timer / run_timer_softirq
net
|
|
|
|
4 |
1749d |
1814d
|
15/28 |
1732d |
56144737e673
net-backports: hrtimer: Annotate lockless access to timer->state
|
WARNING: refcount bug in skb_set_owner_w
net
|
C |
done |
|
2 |
1768d |
1769d
|
15/28 |
1732d |
501a90c94510
net-backports: inet: protect against too small mtu values.
|
KMSAN: use-after-free in netlink_recvmsg
net
|
C |
|
|
1 |
1788d |
1788d
|
15/28 |
1758d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
KMSAN: use-after-free in __skb_try_recv_from_queue
net
|
C |
|
|
4 |
1787d |
1810d
|
15/28 |
1758d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in ip_sublist_rcv
net
|
C |
done |
|
287 |
1801d |
1811d
|
15/28 |
1758d |
51210ad5a558
inet: do not call sublist_rcv on empty list
|
kernel BUG at include/linux/scatterlist.h:LINE!
net
|
C |
done |
|
307 |
1769d |
1962d
|
15/28 |
1758d |
d10523d0b3d7
net/tls: free the record on encryption error
|
KCSAN: data-race in __ip4_datagram_connect / raw_bind
net
|
|
|
|
1 |
1806d |
1806d
|
15/28 |
1758d |
25c7a6d1f90e
net: avoid potential false sharing in neighbor related code
|
KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit
net
|
|
|
|
40 |
1758d |
1808d
|
15/28 |
1758d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
general protection fault in ip6_sublist_rcv
net
|
C |
done |
|
327 |
1801d |
1803d
|
15/28 |
1758d |
51210ad5a558
inet: do not call sublist_rcv on empty list
|
KCSAN: data-race in inet_putpeer / inet_putpeer
net
|
|
|
|
20 |
1791d |
1808d
|
15/28 |
1758d |
71685eb4ce80
inetpeer: fix data-race in inet_putpeer / inet_putpeer
|
KCSAN: data-race in eth_header_cache / neigh_resolve_output
net
|
|
|
|
1 |
1795d |
1795d
|
15/28 |
1758d |
c305c6ae79e2
net-backports: net: add annotations on hh->hh_len lockless accesses
|
KMSAN: use-after-free in sk_forced_mem_schedule
net
|
|
|
|
2 |
1781d |
1789d
|
15/28 |
1758d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in devlink_get_from_attrs
net
|
C |
|
|
7 |
1825d |
1824d
|
15/28 |
1758d |
82a843de41d4
net: devlink: fix reporter dump dumpit
|
general protection fault in vti6_ioctl
net
|
|
|
|
1 |
1816d |
1816d
|
15/28 |
1758d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in tun_get_user / tun_net_get_stats64
net
|
|
|
|
1 |
1803d |
1803d
|
15/28 |
1758d |
de7d5084d827
net-backports: net: provide dev_lstats_read() helper
|
KCSAN: data-race in sk_wait_data / tcp_queue_rcv
net
|
|
|
|
4 |
1797d |
1794d
|
15/28 |
1758d |
f8cc62ca3e66
net: add a READ_ONCE() in skb_peek_tail()
|
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg (2)
net
|
|
|
|
47 |
1758d |
1794d
|
15/28 |
1758d |
9ed498c6280a
net-backports: net: silence data-races on sk_backlog.tail
|
KCSAN: data-race in sk_wait_data / skb_queue_tail
net
|
|
|
|
3 |
1805d |
1806d
|
15/28 |
1758d |
f8cc62ca3e66
net-backports: net: add a READ_ONCE() in skb_peek_tail()
|
general protection fault in veth_get_stats64
net
|
C |
done |
|
2 |
1830d |
1829d
|
15/28 |
1758d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in icmp_global_allow / icmp_global_allow
net
|
|
|
|
29 |
1758d |
1809d
|
15/28 |
1758d |
bbab7ef23503
net-backports: net: icmp: fix data-race in cmp_global_allow()
|
KCSAN: data-race in __dev_queue_xmit / pfifo_fast_dequeue
net
|
|
|
|
6 |
1772d |
1809d
|
15/28 |
1758d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
KCSAN: data-race in tcp_chrono_stop / tcp_recvmsg
net
|
|
|
|
3 |
1793d |
1794d
|
15/28 |
1758d |
a5a7daa52edb
net-backports: tcp: fix data-race in tcp_recvmsg()
|
KCSAN: data-race in gro_normal_list.part.0 / napi_busy_loop
net
|
|
|
|
1 |
1791d |
1791d
|
15/28 |
1758d |
c39e342a050a
net-backports: tun: fix data-race in gro_normal_list()
|
KASAN: use-after-free Read in slip_open
net
|
C |
done |
|
3 |
1776d |
1778d
|
15/28 |
1758d |
e58c19124189
slip: Fix use-after-free Read in slip_open
|
KCSAN: data-race in fanout_demux_rollover / fanout_demux_rollover
net
|
|
|
|
1 |
1793d |
1793d
|
15/28 |
1758d |
b756ad928d98
net-backports: packet: fix data-race in fanout_flow_is_huge()
|
WARNING in __rtnl_newlink
net
|
C |
done |
|
2 |
1828d |
1828d
|
15/28 |
1758d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
WARNING: ODEBUG bug in free_netdev
net
|
C |
done |
|
2 |
1827d |
1827d
|
15/28 |
1758d |
11fc7d5a0a2d
tun: fix memory leak in error path
|
general protection fault in ip6_tnl_ioctl
net
|
C |
done |
|
7 |
1818d |
1829d
|
15/28 |
1758d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in __dev_queue_xmit / net_tx_action
net
|
|
|
|
1 |
1793d |
1793d
|
15/28 |
1758d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
KMSAN: use-after-free in copyout
net
|
C |
|
|
1 |
1823d |
1823d
|
15/28 |
1758d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in virtio_transport_release
net
|
C |
done |
|
7 |
1780d |
1782d
|
15/28 |
1758d |
039fcccaed33
vsock: avoid to assign transport if its initialization fails
|
WARNING in smc_unhash_sk (3)
net
s390
|
C |
done |
|
362 |
1775d |
1865d
|
14/28 |
1771d |
8204df72bea1
net/smc: fix fastopen for non-blocking connect()
|
memory leak in smc_create
net
s390
|
C |
|
|
19 |
1784d |
1797d
|
14/28 |
1771d |
6d6dd528d5af
net/smc: fix refcount non-blocking connect() -part 2
|
KCSAN: data-race in neigh_resolve_output / neigh_resolve_output
net
|
|
|
|
4 |
1793d |
1807d
|
14/28 |
1771d |
1b53d64435d5
net-backports: net: fix data-race in neigh_event_send()
|
KCSAN: data-race in find_match / find_match
net
|
|
|
|
2 |
1794d |
1798d
|
14/28 |
1771d |
1bef4c223b85
net-backports: ipv6: fixes rt6_probe() and fib6_nh->last_probe init
|
BUG: spinlock recursion in release_sock
net
|
C |
done |
|
116 |
1898d |
1899d
|
13/28 |
1773d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
KMSAN: use-after-free in rxrpc_put_peer
afs
net
|
|
|
|
1 |
1815d |
1814d
|
13/28 |
1774d |
91fcfbe8852e
rxrpc: Fix call crypto state cleanup
|
WARNING in sk_stream_kill_queues (3)
net
|
C |
done |
|
622 |
1945d |
2305d
|
13/28 |
1774d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
KCSAN: data-race in udp_set_dev_scratch / udpv6_recvmsg
net
|
|
|
|
5 |
1797d |
1808d
|
13/28 |
1778d |
a793183caa9a
udp: fix data-race in udp_set_dev_scratch()
|
KCSAN: data-race in __skb_wait_for_more_packets / skb_queue_tail
net
|
|
|
|
1 |
1801d |
1801d
|
13/28 |
1778d |
7c422d0ce975
net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
WARNING: refcount bug in smc_release
net
s390
|
C |
done |
|
8 |
1785d |
1808d
|
13/28 |
1778d |
301428ea3708
net/smc: fix refcounting for non-blocking connect()
|
INFO: trying to register non-static key in bond_3ad_update_lacp_rate
net
|
C |
done |
|
26 |
1801d |
1803d
|
13/28 |
1778d |
ad9bd8daf2f9
bonding: fix using uninitialized mode_lock
|
KCSAN: data-race in datagram_poll / skb_queue_tail
net
|
|
|
|
5 |
1797d |
1807d
|
13/28 |
1778d |
3ef7cf57c72f
net-backports: net: use skb_queue_empty_lockless() in poll() handlers
|
general protection fault in process_one_work
net
|
|
|
|
2 |
1803d |
1803d
|
13/28 |
1778d |
6d6f0383b697
netdevsim: Fix use-after-free during device dismantle
|
KCSAN: data-race in udp6_lib_lookup2 / udpv6_queue_rcv_one_skb
net
|
|
|
|
1 |
1807d |
1807d
|
13/28 |
1778d |
7170a977743b
net: annotate accesses to sk->sk_incoming_cpu
|
KCSAN: data-race in tcp_v4_rcv / tcp_v4_rcv
net
|
|
|
|
4 |
1797d |
1801d
|
13/28 |
1778d |
7170a977743b
net-backports: net: annotate accesses to sk->sk_incoming_cpu
|
KCSAN: data-race in __skb_recv_udp / __udp_enqueue_schedule_skb
net
|
|
|
|
7 |
1796d |
1809d
|
13/28 |
1778d |
137a0dbe3426
net-backports: udp: use skb_queue_empty_lockless()
|
KCSAN: data-race in first_packet_length / udp_poll
net
|
|
|
|
2 |
1800d |
1807d
|
13/28 |
1778d |
137a0dbe3426
net-backports: udp: use skb_queue_empty_lockless()
|
INFO: trying to register non-static key in bond_3ad_update_ad_actor_settings
net
|
C |
done |
|
69 |
1801d |
1803d
|
13/28 |
1778d |
ad9bd8daf2f9
bonding: fix using uninitialized mode_lock
|
KCSAN: data-race in __skb_wait_for_more_packets / __sock_queue_rcv_skb
net
|
|
|
|
10 |
1797d |
1807d
|
13/28 |
1778d |
7c422d0ce975
net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
KCSAN: data-race in udpv6_queue_rcv_one_skb / udpv6_queue_rcv_one_skb
net
|
|
|
|
1 |
1804d |
1803d
|
13/28 |
1778d |
ee8d153d46a3
net-backports: net: annotate lockless accesses to sk->sk_napi_id
|
KCSAN: data-race in __skb_recv_udp / datagram_poll
net
|
|
|
|
1 |
1797d |
1797d
|
13/28 |
1778d |
3f926af3f4d6
net: use skb_queue_empty_lockless() in busy poll contexts
|
KCSAN: data-race in __skb_wait_for_more_packets / __udp_enqueue_schedule_skb
net
|
|
|
|
2 |
1801d |
1808d
|
13/28 |
1778d |
7c422d0ce975
net-backports: net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
BUG: MAX_LOCK_DEPTH too low! (2)
net
|
C |
|
done |
5 |
2276d |
2306d
|
13/28 |
1789d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
inconsistent lock state in ila_xlat_nl_cmd_del_mapping
net
|
C |
|
unreliable |
2496 |
2238d |
2244d
|
13/28 |
1789d |
7494de0454af
mfd: da9063: Replace regmap_add_irq_chip with devm counterpart
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (5)
net
|
C |
|
done |
654 |
2076d |
2378d
|
13/28 |
1789d |
32bf94fb5c2e
xfrm: validate template mode
|
KASAN: use-after-free Read in _decode_session4
net
|
C |
|
done |
3 |
2381d |
2380d
|
13/28 |
1789d |
c6741fbed6dc
vti6: Properly adjust vti6 MTU from MTU of lower device
|
general protection fault in tcp_cleanup_ulp
net
|
syz |
done |
done |
6 |
2205d |
2221d
|
13/28 |
1789d |
5607fff30363
bpf: sockmap only allow ESTABLISHED sock state
|
general protection fault in tcp_splice_read
net
|
C |
done |
done |
23 |
2006d |
2115d
|
13/28 |
1791d |
07603b230895
net/smc: propagate file from SMC to TCP socket
|
kernel BUG at net/ipv4/ip_output.c:LINE!
net
|
C |
|
done |
28225 |
2085d |
2276d
|
13/28 |
1793d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
suspicious RCU usage at ./include/net/inet_sock.h:LINE
net
|
C |
|
done |
171 |
2435d |
2526d
|
13/28 |
1793d |
3f32d0be6c16
tipc: lock wakeup & inputq at tipc_link_reset()
|
KASAN: use-after-free Read in _decode_session6
net
|
C |
|
done |
4 |
2152d |
2220d
|
13/28 |
1793d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
KCSAN: data-race in sk_stream_wait_memory / tcp_shifted_skb
net
|
|
|
|
1 |
1806d |
1794d
|
13/28 |
1794d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in sk_stream_wait_memory / tcp_fragment
net
|
|
|
|
1 |
1798d |
1794d
|
13/28 |
1794d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in tcp_sendmsg_locked / tcp_stream_memory_free
net
|
|
|
|
2 |
1805d |
1794d
|
13/28 |
1794d |
0f31746452e6
tcp: annotate tp->write_seq lockless reads
|
KCSAN: data-race in tcp_event_new_data_sent / tcp_stream_memory_free
net
|
|
|
|
3 |
1798d |
1794d
|
13/28 |
1794d |
e0d694d638db
tcp: annotate tp->snd_nxt lockless reads
|
KCSAN: data-race in tcp_ack / tcp_poll (2)
net
|
|
|
|
5 |
1802d |
1794d
|
13/28 |
1794d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in sk_stream_wait_memory / tcp_ack
net
|
|
|
|
2 |
1799d |
1794d
|
13/28 |
1794d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in tcp_add_backlog / tcp_rcv_space_adjust (2)
net
|
|
|
|
18 |
1809d |
1815d
|
13/28 |
1796d |
ebb3b78db7bf
tcp: annotate sk->sk_rcvbuf lockless reads
|
BUG: unable to handle kernel NULL pointer dereference in xsk_poll
bpf
net
|
C |
done |
|
10 |
1814d |
1832d
|
13/28 |
1796d |
df551058f7a3
xsk: Fix crash in poll when device does not support ndo_xsk_wakeup
|
KASAN: use-after-free Read in rxrpc_release_call
afs
net
|
syz |
done |
|
13 |
1814d |
1869d
|
13/28 |
1796d |
91fcfbe8852e
rxrpc: Fix call crypto state cleanup
|
KASAN: use-after-free Read in rxrpc_send_keepalive
afs
net
|
C |
error |
|
694 |
1811d |
1883d
|
13/28 |
1796d |
c48fc11b69e9
rxrpc: Fix call ref leak
|
KCSAN: data-race in __tcp_select_window / tcp_add_backlog
net
|
|
|
|
23502 |
1797d |
1827d
|
13/28 |
1796d |
70c2655849a2
net: silence KCSAN warnings about sk->sk_backlog.len reads
|
memory leak in llc_ui_sendmsg
net
|
C |
|
|
125 |
1812d |
1963d
|
13/28 |
1796d |
c6ee11c39fcc
llc: fix sk_buff leak in llc_sap_state_process()
|
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg
net
|
|
|
|
17719 |
1797d |
1827d
|
13/28 |
1796d |
8265792bf887
net-backports: net: silence KCSAN warnings around sk_add_backlog() calls
|
INFO: task hung in addrconf_verify_work (2)
net
|
C |
|
|
22 |
1818d |
1818d
|
13/28 |
1796d |
39f13ea2f61b
net: avoid potential infinite loop in tc_ctl_action()
|
KCSAN: data-race in tcp_poll / tcp_recvmsg (2)
net
|
|
|
|
22 |
1810d |
1815d
|
13/28 |
1796d |
7db48e983930
tcp: annotate tp->copied_seq lockless reads
|
KASAN: use-after-free Read in rxrpc_put_peer
afs
net
|
C |
error |
|
38 |
1812d |
1864d
|
13/28 |
1796d |
55f6c98e3674
rxrpc: Fix trace-after-put looking at the put peer record
9ebeddef58c4
rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record
|
KCSAN: data-race in tcp_poll / tcp_queue_rcv
net
|
|
|
|
1897 |
1797d |
1827d
|
13/28 |
1796d |
dba7d9b8c739
net-backports: tcp: annotate tp->rcv_nxt lockless reads
|
memory leak in llc_conn_ac_send_sabme_cmd_p_set_x
net
|
C |
|
|
225 |
1812d |
1963d
|
13/28 |
1796d |
b74555de21ac
llc: fix sk_buff leak in llc_conn_service()
|
general protection fault in rxrpc_error_report
afs
net
|
C |
done |
|
6 |
1812d |
1824d
|
13/28 |
1796d |
f0308fb07080
rxrpc: Fix possible NULL pointer access in ICMP handling
|
KCSAN: data-race in tcp_add_backlog / tcp_grow_window.isra.0
net
|
|
|
|
21713 |
1797d |
1827d
|
13/28 |
1796d |
70c2655849a2
net-backports: net: silence KCSAN warnings about sk->sk_backlog.len reads
|
WARNING: suspicious RCU usage in xfrm_alloc_userspi
net
|
C |
done |
error |
86 |
2025d |
2026d
|
13/28 |
1797d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
general protection fault in get_work_pool
net
|
C |
|
done |
24 |
2005d |
2408d
|
13/28 |
1797d |
07bf7908950a
xfrm: Validate address prefix lengths in the xfrm selector.
|
general protection fault in xfrm_init_replay
net
|
syz |
inconclusive |
done |
2 |
2395d |
2394d
|
13/28 |
1797d |
d97ca5d714a5
xfrm_user: uncoditionally validate esn replay attribute struct
|
WARNING: suspicious RCU usage in xfrm_get_spdinfo
net
|
C |
done |
error |
46 |
2025d |
2026d
|
13/28 |
1797d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
WARNING: suspicious RCU usage in xfrm_get_sadinfo
net
|
C |
done |
error |
28 |
2025d |
2026d
|
13/28 |
1797d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
WARNING: suspicious RCU usage in xfrm_get_policy
net
|
syz |
done |
error |
8 |
2026d |
2026d
|
13/28 |
1797d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
INFO: rcu detected stall in rt6_probe_deferred
net
|
|
|
|
336 |
1846d |
1851d
|
13/28 |
1811d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in addrconf_rs_timer (2)
net
|
|
|
|
362 |
1829d |
1851d
|
13/28 |
1811d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
divide error in tabledist
net
|
|
|
|
3 |
1834d |
1842d
|
13/28 |
1816d |
b41d936b5ecf
sch_netem: fix a divide by zero in tabledist()
|
BUG: using smp_processor_id() in preemptible [ADDR] code: mime_typevmnet0/NUM
net
|
|
|
|
1 |
1860d |
1858d
|
13/28 |
1816d |
00d9e47f8ec2
posix-cpu-timers: Always clear head pointer on dequeue
|
KMSAN: uninit-value in inet_ehash_insert
net
|
C |
|
|
7 |
1825d |
1832d
|
13/28 |
1816d |
6af1799aaf3f
net-backports: ipv6: drop incoming packets having a v4mapped source address
|
general protection fault in xsk_poll
bpf
net
|
C |
done |
|
430 |
1846d |
1873d
|
13/28 |
1816d |
42fddcc7c64b
xsk: use state member for socket synchronization
|
BUG: sleeping function called from invalid context in tcf_chain0_head_change_cb_del
net
|
C |
done |
|
187 |
1832d |
1845d
|
13/28 |
1816d |
e3ae1f96accd
net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
|
BUG: corrupted list in __netif_receive_skb_list_core
net
|
|
|
|
3 |
1824d |
1877d
|
13/28 |
1816d |
c7a42eb49212
net: ipv6: fix listify ip6_rcv_finish in case of forwarding
|
KASAN: slab-out-of-bounds Read in do_tcp_getsockopt
net
|
|
|
|
3 |
1840d |
1859d
|
13/28 |
1816d |
3afb09618840
tcp: fix slab-out-of-bounds in tcp_zerocopy_receive()
|
INFO: rcu detected stall in pie_timer
net
|
C |
|
|
19 |
1817d |
1852d
|
13/28 |
1816d |
4ce70b4aed57
net-backports: net: sched: sch_htb: don't call qdisc_put() while holding tree lock
|
KASAN: use-after-free Read in cbq_enqueue
net
|
C |
done |
|
4 |
1825d |
1826d
|
13/28 |
1816d |
e9789c7cc182
sch_cbq: validate TCA_CBQ_WRROPT to avoid crash
|
general protection fault in dsmark_init
net
|
C |
done |
|
3 |
1825d |
1827d
|
13/28 |
1816d |
474f0813a300
sch_dsmark: fix potential NULL deref in dsmark_init()
|
possible deadlock in pie_timer
net
|
C |
done |
|
2 |
1833d |
1834d
|
13/28 |
1816d |
e3ae1f96accd
net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
|
general protection fault in tcf_action_destroy
net
|
|
|
|
128 |
1833d |
1851d
|
13/28 |
1816d |
3d66b89c30f9
net: sched: fix possible crash in tcf_action_destroy()
|
general protection fault in dev_map_hash_update_elem
bpf
net
|
C |
done |
|
4 |
1850d |
1856d
|
13/28 |
1816d |
af58e7ee6a8d
xdp: Fix race in dev_map_hash_update_elem() when replacing element
|
INFO: rcu detected stall in sys_sendmmsg
net
|
|
|
|
2 |
1852d |
1852d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in pppoe_sendmsg
net
|
|
|
|
7 |
1847d |
1854d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
WARNING in xfrm_policy_inexact_list_reinsert
net
|
|
|
|
2 |
1857d |
1884d
|
13/28 |
1823d |
769a807d0b41
xfrm: policy: avoid warning splat when merging nodes
|
INFO: rcu detected stall in sys_sendmsg
net
|
C |
done |
|
2 |
1848d |
1848d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in br_hello_timer_expired
net
|
|
|
|
4 |
1846d |
1851d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in inet_release
net
|
|
|
|
1 |
1855d |
1855d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in packet_sendmsg
net
|
|
|
|
10 |
1847d |
1853d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
general protection fault in addrconf_f6i_alloc
net
|
C |
|
|
305 |
1846d |
1857d
|
13/28 |
1823d |
8652f17c658d
ipv6: addrconf_f6i_alloc - fix non-null pointer check to !IS_ERR()
|
INFO: rcu detected stall in dccp_write_timer
net
|
|
|
|
5 |
1852d |
1855d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
general protection fault in tls_sk_proto_close (2)
net
|
syz |
error |
|
246 |
1846d |
1865d
|
13/28 |
1823d |
44580a0118d3
net: sock_map, fix missing ulp check in sock hash case
|
INFO: rcu detected stall in neigh_timer_handler (2)
net
|
|
|
|
2 |
1851d |
1853d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
BUG: soft lockup in addrconf_dad_work
net
|
C |
done |
|
1 |
1850d |
1850d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in igmp_ifc_timer_expire
net
|
C |
|
|
57 |
1846d |
2105d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in mld_dad_timer_expire
net
|
|
|
|
3 |
1851d |
1852d
|
13/28 |
1823d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
BUG: unable to handl |