KCSAN: data-race in xfrmi_xmit / xfrmi_xmit (3)
net
|
|
|
|
2 |
4d18h |
28d
|
1/25 |
never |
xfrm: interface: use DEV_STATS_INC()
|
KCSAN: data-race in xfrm_sk_policy_insert / xfrm_sk_policy_insert (3)
net
|
|
|
|
1 |
50d |
22d
|
1/25 |
never |
xfrm: fix a data-race in xfrm_gen_index()
|
WARNING in ieee80211_get_ringparam
net
wireless
|
C |
done |
|
151 |
5d14h |
12d
|
1/25 |
never |
wifi: mac80211: ethtool: always hold wiphy mutex
|
WARNING in ieee80211_probe_client
net
wireless
|
C |
done |
error |
124 |
20d |
1090d
|
24/25 |
never |
67dfa589aa88
wifi: mac80211: check for station first in client probe
|
KMSAN: uninit-value in ieee80211_rx_handlers
wireless
net
|
C |
|
|
8 |
34d |
89d
|
24/25 |
never |
19e4a47ee747
wifi: mac80211: check S1G action frame size
|
WARNING in ieee80211_bss_info_change_notify
net
wireless
|
C |
done |
|
7639 |
1d02h |
1093d
|
24/25 |
never |
abc76cf552e1
wifi: cfg80211: ocb: don't leave if not joined
|
WARNING: refcount bug in xp_put_pool
bpf
net
|
C |
done |
|
2 |
63d |
62d
|
24/25 |
never |
85c2c79a0730
xsk: fix refcount underflow in error path
|
KCSAN: data-race in udp_lib_setsockopt / udp_lib_setsockopt
net
|
|
|
|
2 |
39d |
25d
|
3/25 |
never |
udplite: fix various data-races
|
WARNING: ODEBUG bug in ingress_destroy
net
|
C |
done |
|
16 |
69d |
72d
|
24/25 |
never |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
WARNING: ODEBUG bug in tcx_uninstall
bpf
net
|
C |
done |
|
38 |
68d |
72d
|
24/25 |
never |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
general protection fault in ingress_destroy
net
|
|
|
|
10 |
68d |
73d
|
24/25 |
never |
079082c60aff
tcx: Fix splat during dev unregister
|
WARNING in tcx_uninstall
bpf
net
|
C |
done |
|
7 |
63d |
67d
|
24/25 |
never |
079082c60aff
tcx: Fix splat during dev unregister
|
KCSAN: data-race in tcp_make_synack / tcp_rtx_synack
net
|
|
|
|
1 |
80d |
78d
|
24/25 |
never |
5e5265522a9a
tcp: annotate data-races around tcp_rsk(req)->txhash
|
KCSAN: data-race in tcp_check_req / tcp_check_req
net
|
|
|
|
2 |
96d |
94d
|
24/25 |
never |
eba20811f326
tcp: annotate data-races around tcp_rsk(req)->ts_recent
|
KASAN: use-after-free Read in p9_req_put
net
v9fs
|
|
|
|
52 |
1d02h |
410d
|
1/25 |
never |
9p: p9_client_create: use p9_client_destroy on failure
|
KCSAN: data-race in netlink_setsockopt / netlink_setsockopt
net
|
|
|
|
1 |
52d |
52d
|
24/25 |
never |
8fe08d70a2b6
netlink: convert nlk->flags to atomic flags
|
general protection fault in generic_hwtstamp_ioctl_lower
net
|
C |
done |
|
7 |
55d |
58d
|
24/25 |
never |
c35e927cbe09
net: omit ndo_hwtstamp_get() call when possible in dev_set_hwtstamp_phylib()
|
KASAN: stack-out-of-bounds Write in __nla_validate_parse
net
|
C |
done |
|
4 |
56d |
71d
|
24/25 |
never |
4d50e50045aa
net: flower: fix stack-out-of-bounds in fl_set_key_cfm()
|
general protection fault in skb_segment (3)
net
|
C |
done |
|
2 |
48d |
48d
|
24/25 |
never |
b616be6b9768
net: do not allow gso_size to be set to GSO_BY_FRAGS
|
KCSAN: data-race in ____sys_sendmsg / do_ipv6_setsockopt
net
|
|
|
|
1 |
111d |
94d
|
24/25 |
never |
1ded5e5a5931
net: annotate data-races around sock->ops
|
INFO: rcu detected stall in sys_close (5)
net
|
C |
done |
|
1 |
33d |
33d
|
24/25 |
never |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
INFO: rcu detected stall in bond_3ad_state_machine_handler
net
|
|
|
|
1 |
66d |
66d
|
24/25 |
never |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
BUG: soft lockup in fq_pie_timer (4)
net
|
syz |
|
|
5 |
19d |
69d
|
24/25 |
never |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
INFO: rcu detected stall in nsim_dev_trap_report_work
net
|
syz |
|
|
4 |
24d |
67d
|
24/25 |
never |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
INFO: rcu detected stall in unix_release
net
|
C |
done |
|
1 |
52d |
48d
|
24/25 |
never |
da71714e359b
net/sched: fix a qdisc modification with ambiguous command request
|
WARNING in vmap_pages_range_noflush (2)
bpf
net
|
C |
error |
|
250 |
404d |
406d
|
1/25 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
KCSAN: data-race in macsec_handle_frame / macsec_handle_frame (3)
net
|
|
|
|
2 |
58d |
59d
|
24/25 |
never |
32d0a49d36a2
macsec: use DEV_STATS_INC()
|
memory leak in kcm_sendmsg (2)
net
|
C |
|
|
1 |
32d |
66d
|
23/25 |
never |
c821a88bd720
kcm: Fix memory leak in error path of kcm_sendmsg()
|
KCSAN: data-race in __ip4_datagram_connect / __ip_make_skb (5)
net
|
|
|
|
3 |
66d |
94d
|
24/25 |
never |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
KCSAN: data-race in __ip_make_skb / __ip_make_skb
net
|
|
|
|
624 |
37d |
606d
|
24/25 |
never |
f866fbc842de
ipv4: fix data-races around inet->inet_id
|
KCSAN: data-race in fib_release_info / fib_table_lookup
net
|
|
|
|
1 |
34d |
33d
|
24/25 |
never |
fce92af1c29d
ipv4: annotate data-races around fi->fib_dead
|
KCSAN: data-race in iptunnel_xmit / iptunnel_xmit (5)
net
|
|
|
|
1 |
26d |
26d
|
24/25 |
never |
9b271ebaf9a2
ip_tunnels: use DEV_STATS_INC()
|
KASAN: slab-use-after-free Read in team_device_event
net
|
C |
done |
|
2 |
24d |
23d
|
24/25 |
never |
6afcf0fb9270
Revert "net: team: do not use dynamic lockdep key"
|
WARNING in vlan_device_event
net
|
|
|
|
1 |
46d |
46d
|
24/25 |
never |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
WARNING: bad unlock balance in sockopt_release_sock
net
|
C |
done |
|
2 |
37d |
37d
|
24/25 |
never |
8be6f88b9d3f
inet: fix IP_TRANSPARENT error handling
|
WARNING in macvlan_device_event
net
|
|
|
|
3 |
45d |
46d
|
24/25 |
never |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KMSAN: uninit-value in IP6_ECN_decapsulate
net
|
C |
|
|
793 |
20h53m |
1836d
|
23/25 |
never |
484b4833c604
hsr: Fix uninit-value access in fill_frame_info()
|
KASAN: slab-use-after-free Read in xsk_diag_dump
bpf
net
|
C |
done |
|
9 |
24d |
33d
|
24/25 |
never |
3e019d8a05a3
xsk: Fix xsk_diag use-after-free error during socket cleanup
|
WARNING in rtnl_dellink (3)
net
|
C |
done |
|
492 |
40d |
50d
|
24/25 |
never |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
WARNING in ip6_tnl_exit_batch_net
net
|
C |
done |
|
29 |
44d |
50d
|
24/25 |
never |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
WARNING in unregister_vlan_dev
net
|
C |
done |
|
1310 |
41d |
50d
|
24/25 |
never |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
KASAN: slab-out-of-bounds Read in do_csum
net
|
C |
|
|
159 |
3d18h |
34d
|
24/25 |
never |
8bd795fedb84
arm64: csum: Fix OoB access in IP checksum code for negative lengths
|
KASAN: slab-use-after-free Write in mini_qdisc_pair_swap
net
|
C |
error |
|
76 |
37d |
191d
|
25/25 |
2d07h |
84ad0af0bccd
net/sched: qdisc_destroy() old ingress and clsact Qdiscs before grafting
c7cfbd115001
net/sched: sch_ingress: Only create under TC_H_INGRESS
|
WARNING in sock_i_ino
net
|
C |
error |
|
22 |
95d |
99d
|
25/25 |
2d16h |
25a9c8a4431c
netlink: Add __sock_i_ino() for __netlink_diag_dump().
|
KMSAN: kernel-infoleak in __skb_datagram_iter
net
|
|
|
|
68 |
4d20h |
109d
|
25/25 |
2d16h |
aa5406950726
netlink: do not hard code device address lenth in fdb dumps
|
KASAN: stack-out-of-bounds Read in ip6mr_ioctl
net
|
C |
done |
|
192 |
101d |
106d
|
25/25 |
2d16h |
3a4f0edbb793
ipv6: fix a typo in ip6mr_sk_ioctl()
|
BUG: sleeping function called from invalid context in __lock_sock_fast
net
|
|
|
|
2 |
100d |
99d
|
25/25 |
2d16h |
57fc0f1ceaa4
mptcp: ensure listener is unhashed before updating the sk status
|
kernel BUG in ip6gre_header
net
|
C |
|
|
5 |
38d |
109d
|
25/25 |
2d16h |
9eed321cde22
net: lapbether: only support ethernet devices
|
WARNING in unreserve_psock
net
|
C |
done |
|
2816 |
102d |
109d
|
25/25 |
2d16h |
9f8d0dc0ec4a
kcm: Fix unnecessary psock unreservation.
|
WARNING: refcount bug in fib6_nh_init
net
|
C |
done |
|
45 |
102d |
107d
|
25/25 |
2d16h |
3515440df461
ipv6: also use netdev_hold() in ip6_route_check_nh()
|
linux-next test error: WARNING in register_net_sysctl
net
|
|
|
|
9 |
137d |
137d
|
25/25 |
2d16h |
e7480a44d7c4
Revert "net: Remove low_thresh in ip defrag"
|
net-next test error: WARNING in register_net_sysctl
net
|
|
|
|
21 |
137d |
137d
|
25/25 |
2d16h |
e7480a44d7c4
Revert "net: Remove low_thresh in ip defrag"
|
KASAN: stack-out-of-bounds Read in skb_splice_from_iter
net
|
C |
done |
|
64 |
102d |
111d
|
25/25 |
2d16h |
5a6f6873606e
ip, ip6: Fix splice to raw and ping sockets
|
possible deadlock in netlink_set_err
net
|
|
|
|
1 |
102d |
101d
|
25/25 |
2d16h |
8d61f926d420
netlink: fix potential deadlock in netlink_set_err()
|
possible deadlock in pie_timer (2)
net
|
|
|
|
2 |
100d |
100d
|
25/25 |
2d16h |
11b73313c124
sch_netem: fix issues in netem_change() vs get_dist_table()
|
general protection fault in skb_queue_tail (3)
afs
net
|
C |
inconclusive |
done |
9 |
120d |
353d
|
25/25 |
2d16h |
061b0cb9327b
wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
|
KASAN: slab-out-of-bounds Read in taprio_dequeue_from_txq
net
|
syz |
error |
|
4 |
116d |
141d
|
25/25 |
2d16h |
be3618d96510
net/sched: taprio: fix slab-out-of-bounds Read in taprio_dequeue_from_txq
|
WARNING in scm_recv
net
|
C |
done |
|
8 |
89d |
92d
|
25/25 |
2d16h |
603fc57ab70c
af_unix: Skip SCM_PIDFD if scm->pid is NULL.
|
KASAN: stack-out-of-bounds Read in ipmr_ioctl
net
|
C |
done |
|
208 |
101d |
106d
|
25/25 |
2d16h |
634236b34d7a
net: remove sk_is_ipmr() and sk_is_icmpv6() helpers
|
BUG: soft lockup in addrconf_rs_timer (2)
net
|
C |
|
|
51 |
101d |
122d
|
25/25 |
89d |
cd2b8113c2e8
net/sched: fq_pie: ensure reasonable TCA_FQ_PIE_QUANTUM values
|
KCSAN: data-race in dev_graft_qdisc / qdisc_lookup_rcu
net
|
|
|
|
1 |
127d |
127d
|
25/25 |
89d |
d636fc5dd692
net: sched: add rcu annotations around qdisc->qdisc_sleeping
|
general protection fault in vhost_work_queue
net
virt
kvm
|
|
|
|
1 |
128d |
124d
|
25/25 |
89d |
a284f09effea
vhost: Fix crash during early vhost_transport_send_pkt calls
|
KCSAN: data-race in do_recvmmsg / do_recvmmsg (2)
net
|
|
|
|
1 |
171d |
145d
|
24/25 |
91d |
e05a5f510f26
net: annotate sk->sk_err write from do_recvmmsg()
|
KCSAN: data-race in tcp_disconnect / tcp_poll (7)
net
|
|
|
|
2 |
167d |
145d
|
24/25 |
91d |
e14cadfd80d7
tcp: add annotations around sk->sk_shutdown accesses
|
kernel BUG in nsh_gso_segment
net
|
|
|
|
1 |
158d |
143d
|
24/25 |
91d |
c83b49383b59
net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
|
general protection fault in __sk_mem_raise_allocated
net
|
|
|
|
1 |
136d |
132d
|
24/25 |
91d |
ad42a35bdfc6
udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().
|
KMSAN: uninit-value in xfrm_state_find
net
|
C |
error |
done |
215 |
134d |
1934d
|
24/25 |
91d |
3d776e31c841
xfrm: Reject optional tunnel/BEET mode templates in outbound policies
|
KMSAN: uninit-value in vlan_dev_hard_start_xmit (2)
net
|
|
|
|
1 |
167d |
167d
|
24/25 |
91d |
dacab578c7c6
vlan: fix a potential uninit-value in vlan_dev_hard_start_xmit()
|
divide error in tcp_rcv_space_adjust (2)
net
|
|
|
|
1 |
182d |
182d
|
24/25 |
91d |
4faeee0cf8a5
tcp: deny tcp_disconnect() when threads are waiting
|
KCSAN: data-race in sk_stream_wait_connect / tcp_disconnect (2)
net
|
|
|
|
1 |
176d |
145d
|
24/25 |
91d |
d0ac89f6f987
net: deal with most data-races in sk_wait_event()
|
KCSAN: data-race in __netlink_dump_start / netlink_recvmsg (5)
net
|
|
|
|
2 |
175d |
145d
|
24/25 |
91d |
a939d14919b7
netlink: annotate accesses to nlk->cb_running
|
memory leak in tcf_pedit_init
net
|
C |
|
|
1 |
155d |
155d
|
24/25 |
114d |
1b483d9f5805
net/sched: act_pedit: free pedit keys on bail from offset check
|
KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (12)
net
|
|
|
|
3 |
207d |
206d
|
24/25 |
114d |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
general protection fault in pause_prepare_data
net
|
C |
error |
|
34 |
248d |
250d
|
24/25 |
114d |
f5be9caf7bf0
net: ethtool: fix NULL pointer dereference in pause_prepare_data()
|
BUG: unable to handle kernel paging request in __alloc_skb
net
|
|
|
|
1 |
305d |
305d
|
24/25 |
114d |
031af50045ea
arm64: cmpxchg_double*: hazard against entire exchange variable
|
KASAN: use-after-free Read in do_csum
net
|
C |
|
|
72 |
117d |
282d
|
24/25 |
114d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
KCSAN: data-race in rxrpc_send_data / rxrpc_set_call_completion
afs
net
|
|
|
|
2 |
180d |
160d
|
24/25 |
114d |
2b5fdc0f5caa
rxrpc: Fix potential data race in rxrpc_wait_to_be_connected()
|
KMSAN: uninit-value in ethnl_set_linkmodes (2)
net
|
C |
|
|
40 |
148d |
453d
|
24/25 |
114d |
9ad685dbfe7e
ethtool: Fix uninitialized number of lanes
|
KCSAN: data-race in __neigh_event_send / neigh_resolve_output (7)
net
|
|
|
|
43 |
172d |
145d
|
24/25 |
114d |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
general protection fault in free_percpu (2)
net
wireless
|
|
|
|
1 |
261d |
261d
|
24/25 |
114d |
80f8a66dede0
Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"
|
WARNING in htb_destroy
net
|
C |
done |
|
2 |
232d |
232d
|
24/25 |
114d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
general protection fault in ethnl_set_plca_cfg
net
|
C |
done |
|
37 |
258d |
258d
|
24/25 |
114d |
28dbf774bc87
plca.c: fix obvious mistake in checking retval
|
memory leak in tcindex_set_parms (3)
net
|
C |
|
|
1 |
302d |
298d
|
24/25 |
114d |
8c710f75256b
net/sched: Retire tcindex classifier
|
KCSAN: data-race in __neigh_update / neigh_resolve_output
net
|
|
|
|
1 |
178d |
145d
|
24/25 |
114d |
b071af523579
neighbour: annotate lockless accesses to n->nud_state
|
BUG: unable to handle kernel NULL pointer dereference in __build_skb_around
bpf
net
|
C |
done |
|
29 |
194d |
199d
|
24/25 |
114d |
e5995bc7e2ba
bpf, test_run: fix crashes due to XDP frame overwriting/corruption
|
general protection fault in virtio_transport_purge_skbs
net
|
C |
done |
|
3 |
192d |
191d
|
24/25 |
114d |
b465518dc27d
vsock/loopback: use only sk_buff_head.lock to protect the packet queue
|
WARNING: stack going in the wrong direction? at __sys_setsockopt
net
|
|
|
|
6 |
221d |
227d
|
24/25 |
114d |
00c8f01c4e84
objtool: Fix ORC 'signal' propagation
|
upstream test error: unregister_netdevice: waiting for DEV to become free
net
|
|
|
|
204 |
227d |
233d
|
24/25 |
114d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
WARNING in net_free
net
|
|
|
|
1 |
168d |
168d
|
24/25 |
114d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
WARNING in cleanup_net (2)
net
|
C |
error |
|
72 |
149d |
176d
|
24/25 |
114d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
KASAN: use-after-free Read in cfusbl_device_notify
net
|
C |
done |
|
341 |
206d |
353d
|
24/25 |
114d |
9781e98a9711
net: caif: Fix use-after-free in cfusbl_device_notify()
|
general protection fault in taprio_dequeue
net
|
|
|
|
1 |
273d |
273d
|
24/25 |
114d |
3a415d59c1db
net/sched: sch_taprio: fix possible use-after-free
|
WARNING in ip6erspan_tunnel_xmit (2)
net
|
C |
unreliable |
|
5 |
194d |
194d
|
24/25 |
114d |
8e50ed774554
erspan: do not use skb_mac_header() in ndo_start_xmit()
|
KMSAN: uninit-value in qrtr_tx_resume
arm-msm
net
|
C |
|
|
8 |
188d |
248d
|
24/25 |
114d |
6417070918de
net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()
|
INFO: task hung in tls_sw_sendpage (3)
net
|
|
|
|
30 |
218d |
215d
|
24/25 |
114d |
f3221361dc85
net: tls: avoid hanging tasks on the tx_lock
|
WARNING in nla_get_range_unsigned (2)
net
|
C |
done |
|
433 |
190d |
226d
|
24/25 |
114d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
BUG: unable to handle kernel paging request in atm_tc_destroy
net
|
C |
error |
|
3 |
233d |
232d
|
24/25 |
114d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
kernel BUG in ip_frag_next
net
|
C |
done |
|
9 |
248d |
255d
|
24/25 |
114d |
f72ff8b81ebc
net: fix kfree_skb_list use of skb_mark_not_on_list
|
net test error: WARNING: suspicious RCU usage in veth_set_xdp_features
net
|
|
|
|
24 |
200d |
201d
|
24/25 |
114d |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
linux-next test error: WARNING: suspicious RCU usage in veth_set_xdp_features
net
|
|
|
|
12 |
199d |
201d
|
24/25 |
114d |
5ce76fe1eead
veth: rely on rtnl_dereference() instead of on rcu_dereference() in veth_set_xdp_features()
|
KCSAN: data-race in netlink_getname / netlink_insert (4)
net
|
|
|
|
2 |
249d |
254d
|
24/25 |
114d |
c1bb9484e3b0
netlink: annotate data races around nlk->portid
|
WARNING: locking bug in inet_autobind
net
|
C |
done |
error |
103 |
276d |
1599d
|
24/25 |
114d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
UBSAN: array-index-out-of-bounds in qfq_update_agg (4)
net
|
|
|
|
1 |
166d |
166d
|
24/25 |
114d |
3037933448f6
net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
|
KMSAN: uninit-value in raw_sock_get
net
|
|
|
|
1 |
174d |
173d
|
24/25 |
114d |
0a78cf7264d2
raw: Fix NULL deref in raw_get_next().
|
BUG: scheduling while atomic in msleep
net
|
C |
done |
|
40 |
248d |
256d
|
24/25 |
114d |
ea4fdbaa2f77
net/sched: sch_taprio: do not schedule in taprio_reset()
|
WARNING in __dev_queue_xmit (2)
net
|
C |
|
|
76 |
147d |
218d
|
24/25 |
114d |
693aa2c0d9b6
ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping()
|
kernel BUG in icmp_glue_bits
net
|
|
|
|
2 |
120d |
184d
|
24/25 |
114d |
7d63b6712538
icmp: guard against too small mtu
|
general protection fault in bpf_struct_ops_link_create
bpf
net
|
C |
done |
|
17 |
188d |
191d
|
24/25 |
114d |
55fbae05476d
bpf: Check IS_ERR for the bpf_map_get() return value
|
WARNING: refcount bug in qrtr_recvmsg (2)
arm-msm
net
|
C |
error |
|
2 |
199d |
192d
|
24/25 |
114d |
44d807320000
net: qrtr: Fix a refcount bug in qrtr_recvmsg()
|
WARNING in sock_map_del_link
bpf
net
|
|
|
|
91 |
170d |
170d
|
24/25 |
114d |
8c5c2a4898e3
bpf, sockmap: Revert buggy deadlock fix in the sockhash and sockmap
|
WARNING: refcount bug in consume_skb
net
|
|
|
|
3 |
233d |
243d
|
24/25 |
114d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
INFO: trying to register non-static key in net_free
net
|
syz |
error |
|
17982 |
222d |
235d
|
24/25 |
114d |
6e77a5a4af05
net: initialize net->notrefcnt_tracker earlier
|
WARNING: suspicious RCU usage in bond_mii_monitor
net
|
C |
|
|
13 |
268d |
287d
|
24/25 |
114d |
42c7ded0eeac
bonding: fix lockdep splat in bond_miimon_commit()
|
BUG: stack guard page was hit in inet6_release
bpf
net
|
C |
done |
|
4 |
249d |
298d
|
24/25 |
114d |
ddce1e091757
bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
|
possible deadlock in l2tp_tunnel_register (2)
net
|
C |
|
|
153 |
208d |
218d
|
24/25 |
114d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
KASAN: slab-use-after-free Read in tcf_action_destroy
net
|
C |
error |
|
32 |
141d |
216d
|
24/25 |
114d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
possible deadlock in release_sock
net
|
C |
done |
|
42 |
255d |
256d
|
24/25 |
114d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
memory leak in nfc_genl_se_io
net
nfc
|
C |
|
|
1 |
229d |
225d
|
24/25 |
114d |
25ff6f8a5a3b
nfc: fix memory leak of se_io context in nfc_genl_se_io
|
general protection fault in tcindex_set_parms
net
|
C |
done |
|
2 |
229d |
229d
|
24/25 |
114d |
42018a322bd4
net/sched: tcindex: search key must be 16 bits
|
kernel BUG in fou_build_udp
net
|
C |
|
|
1 |
150d |
150d
|
24/25 |
114d |
c88f8d5cd95f
UPSTREAM: sit: update dev->needed_headroom in ipip6_tunnel_bind_dev()
|
KCSAN: data-race in ip_finish_output2 / ip_tunnel_xmit
net
|
|
|
|
1 |
244d |
244d
|
24/25 |
114d |
4b397c06cb98
net: tunnels: annotate lockless accesses to dev->needed_headroom
|
kernel BUG in rxrpc_put_call
afs
net
|
C |
done |
|
9 |
252d |
264d
|
24/25 |
114d |
01644a1f98ff
rxrpc: Fix wrong error return in rxrpc_connect_call()
|
kernel BUG in rxrpc_put_peer
afs
net
|
C |
|
|
80 |
255d |
298d
|
24/25 |
114d |
9d35d880e0e4
rxrpc: Move client call connection to the I/O thread
03fc55adf876
rxrpc: Only disconnect calls in the I/O thread
|
INFO: rcu detected stall in devlink_nl_cmd_port_get_dumpit
net
|
syz |
|
|
7 |
213d |
230d
|
24/25 |
114d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
WARNING in inet_sock_destruct (3)
net
|
C |
|
|
87 |
118d |
221d
|
24/25 |
114d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
WARNING in devlink_free
net
|
|
|
|
10 |
250d |
263d
|
24/25 |
114d |
93e71edfd90c
devlink: keep the instance mutex alive until references are gone
|
KMSAN: uninit-value in ipv6_find_tlv
net
|
C |
|
|
271 |
156d |
1509d
|
24/25 |
114d |
ea30388baebc
ipv6: Fix an uninit variable access bug in __ip6_make_skb()
|
WARNING in default_device_exit_batch (4)
net
|
C |
error |
|
954 |
190d |
316d
|
24/25 |
114d |
e667d4690986
bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
|
memory leak in regulatory_hint_core
net
wireless
|
C |
|
|
2 |
313d |
341d
|
24/25 |
114d |
399ab7fe0fa0
net: sched: fix memory leak in tcindex_set_parms
|
KMSAN: kernel-infoleak in copyout (2)
net
|
C |
|
|
6723 |
115d |
1283d
|
24/25 |
114d |
8222d5910dae
xfrm: Zero padding when dumping algos and encap
|
KASAN: null-ptr-deref Read in __fl_put
net
|
C |
error |
|
16 |
196d |
215d
|
24/25 |
114d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
kernel BUG in inet_sock_destruct
net
|
C |
error |
|
3 |
271d |
270d
|
24/25 |
114d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
possible deadlock in inet_put_port
net
|
|
|
|
2 |
255d |
256d
|
24/25 |
114d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
BUG: corrupted list in taprio_destroy
net
|
C |
done |
|
2 |
232d |
232d
|
24/25 |
114d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (6)
net
|
|
|
|
2 |
183d |
180d
|
24/25 |
114d |
a1865f2e7d10
netlink: annotate lockless accesses to nlk->max_recvmsg_len
|
KASAN: invalid-free in skb_free_head (2)
net
|
C |
error |
|
25 |
156d |
221d
|
24/25 |
114d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
riscv/fixes test error: BUG: soft lockup in corrupted (2)
virt
net
|
|
|
|
4 |
354d |
431d
|
24/25 |
114d |
61fc1ee8be26
riscv: Bump COMMAND_LINE_SIZE value to 1024
|
general protection fault in skb_dequeue (3)
net
wireless
|
C |
done |
|
6 |
232d |
242d
|
24/25 |
114d |
33b3b041543e
splice: Add a func to do a splice from an O_DIRECT file without ITER_PIPE
|
WARNING in inet_csk_destroy_sock (3)
net
|
|
|
|
1 |
128d |
128d
|
24/25 |
127d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
KASAN: slab-out-of-bounds Read in sk_psock_get
net
|
C |
done |
error |
9 |
432d |
766d
|
24/25 |
171d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
possible deadlock in nci_start_poll
net
nfc
|
C |
error |
done |
83 |
219d |
320d
|
24/25 |
172d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
kernel BUG in pskb_expand_head
net
|
C |
done |
|
1600 |
233d |
685d
|
24/25 |
218d |
5f33a09e769a
can: isotp: convert struct tpcon::{idx,len} to unsigned int
7c759040c1dd
can: isotp: fix potential CAN frame reception race in isotp_rcv()
|
INFO: trying to register non-static key in ieee80211_do_stop
net
wireless
|
C |
error |
|
70591 |
403d |
443d
|
24/25 |
218d |
aa40d5a43526
wifi: mac80211: do not abuse fq.lock in ieee80211_do_stop()
wifi: mac80211: do not abuse fq.lock in ieee80211_do_stop()
|
WARNING in ipgre_xmit
net
|
C |
done |
|
9916 |
469d |
485d
|
24/25 |
218d |
8d21e9963bec
ip_gre: test csum_start instead of transport header
|
WARNING: ODEBUG bug in ops_free_list
net
|
|
|
|
1 |
546d |
546d
|
24/25 |
218d |
1946014ca3b1
rxrpc: fix a race in rxrpc_exit_net()
|
KASAN: wild-memory-access Read in skb_copy_bits
net
|
C |
|
|
2 |
387d |
387d
|
24/25 |
218d |
0d24148bd276
inet: ping: fix recent breakage
|
KCSAN: data-race in __ip_append_data / __ip_append_data
net
|
|
|
|
1 |
603d |
599d
|
24/25 |
218d |
a1cdec57e03a
net-timestamp: convert sk->sk_tskey to atomic_t
|
WARNING: kmalloc bug in xdp_umem_create (2)
bpf
net
|
C |
done |
|
21 |
598d |
663d
|
24/25 |
218d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
KCSAN: data-race in tcp_send_challenge_ack / tcp_send_challenge_ack
net
|
|
|
|
1 |
396d |
396d
|
24/25 |
218d |
8c70521238b7
tcp: annotate data-race around challenge_timestamp
|
BUG: sleeping function called from invalid context in sk_psock_skb_ingress_self
bpf
net
|
C |
done |
|
151 |
328d |
350d
|
24/25 |
218d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
KASAN: use-after-free Read in ipvlan_queue_xmit (3)
net
|
C |
error |
error |
8 |
422d |
1020d
|
24/25 |
218d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
general protection fault in llc_build_and_send_xid_pkt
net
|
C |
done |
|
2 |
555d |
556d
|
24/25 |
218d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: use-after-free Read in reqsk_queue_unlink
net
|
|
|
|
4 |
305d |
355d
|
24/25 |
218d |
740ea3c4a0b2
tcp: Clean up kernel listener's reqsk in inet_twsk_purge()
|
WARNING: refcount bug in tcp_release_cb
net
|
|
|
|
2 |
293d |
303d
|
24/25 |
218d |
0a182f8d6074
bpf, sockmap: fix race in sock_map_free()
|
net boot error: WARNING in genl_register_family
net
|
|
|
|
3 |
337d |
337d
|
24/25 |
218d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
WARNING in __skb_flow_dissect (4)
net
|
C |
error |
|
6 |
329d |
339d
|
24/25 |
218d |
9f225444467b
ppp: associate skb with a device at tx
|
WARNING in inet_csk_get_port
net
|
C |
done |
|
1166 |
267d |
495d
|
24/25 |
218d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
KASAN: use-after-free Read in free_netdev (3)
net
|
C |
inconclusive |
|
130 |
311d |
466d
|
24/25 |
218d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
KCSAN: data-race in dev_activate / qdisc_lookup_rcu
net
|
|
|
|
1 |
597d |
596d
|
24/25 |
218d |
5891cd5ec46c
net_sched: add __rcu annotation to netdev->qdisc
|
WARNING in skb_try_coalesce
net
|
C |
error |
|
1521 |
490d |
944d
|
24/25 |
218d |
763087dab975
net: add skb_set_end_offset() helper
|
kernel panic: corrupted stack end in netdev_run_todo
net
|
|
|
|
1 |
463d |
463d
|
24/25 |
218d |
b81d591386c3
riscv: Increase stack size under KASAN
|
general protection fault in sock_reserve_memory
net
|
C |
done |
|
2 |
594d |
594d
|
24/25 |
218d |
25206111512d
crypto: af_alg - get rid of alg_memory_allocated
|
WARNING in tcp_enter_loss (3)
net
|
C |
inconclusive |
|
7 |
335d |
632d
|
24/25 |
218d |
0c175da7b037
tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent
|
general protection fault in tls_sk_proto_close (3)
net
|
C |
done |
|
276 |
467d |
866d
|
24/25 |
218d |
69135c572d1f
net/tls: fix tls_sk_proto_close executed repeatedly
|
possible deadlock in l2tp_tunnel_register
net
|
C |
error |
|
9492 |
218d |
318d
|
24/25 |
218d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
general protection fault in em_cmp_match
net
|
C |
|
|
4 |
294d |
290d
|
24/25 |
218d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
general protection fault in ip6_rcv_core
net
|
C |
done |
|
275 |
309d |
535d
|
24/25 |
218d |
0339d25a2807
ipv6: fix NULL deref in ip6_rcv_core()
|
KASAN: use-after-free Read in nh_netdev_event
net
|
|
|
|
3 |
319d |
395d
|
24/25 |
218d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KASAN: use-after-free Read in rxrpc_lookup_local
afs
net
|
C |
|
|
3997 |
269d |
298d
|
24/25 |
218d |
8fbcc83334a7
rxrpc: Fix I/O thread startup getting skipped
eaa02390adb0
rxrpc: Fix NULL deref in rxrpc_unuse_local()
|
kernel BUG in warn_crc32c_csum_combine
net
|
C |
error |
|
17 |
332d |
342d
|
24/25 |
218d |
7f57f8165cb6
af_key: Fix send_acquire race with pfkey_register
|
kernel panic: corrupted stack end in nf_tables_getset
net
|
|
|
|
1 |
327d |
327d
|
24/25 |
218d |
b81d591386c3
riscv: Increase stack size under KASAN
|
net-next test error: WARNING in devl_port_unregister
net
|
|
|
|
52 |
324d |
326d
|
24/25 |
218d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
WARNING in u32_change
net
|
C |
|
|
28 |
273d |
370d
|
24/25 |
218d |
7cba18332e36
net: sched: cls_u32: Avoid memcpy() false-positive warning
|
general protection fault in metadata_dst_free
net
|
C |
|
|
348 |
349d |
388d
|
24/25 |
218d |
c52add61c27e
macsec: don't free NULL metadata_dst
|
memory leak in virtual_ncidev_write
net
nfc
|
C |
|
|
1 |
317d |
317d
|
24/25 |
218d |
53270fb0fd77
NFC: nci: fix memory leak in nci_rx_data_packet()
|
memory leak in __vsock_create
net
|
C |
|
|
1 |
543d |
539d
|
24/25 |
218d |
7e97cfed9929
vsock: Fix memory leak in vsock_connect()
|
KCSAN: data-race in netlink_recvmsg / netlink_recvmsg (5)
net
|
|
|
|
12 |
260d |
513d
|
24/25 |
218d |
d5076fe4049c
netlink: do not reset transport header in netlink_recvmsg()
|
general protection fault in __inet_hash_connect
net
|
|
|
|
5 |
326d |
473d
|
24/25 |
218d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
kernel panic: corrupted stack end in tc_ctl_action
net
|
|
|
|
2 |
350d |
404d
|
24/25 |
218d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in skb_checksum_help
net
|
|
|
|
15 |
224d |
396d
|
24/25 |
218d |
0d24148bd276
inet: ping: fix recent breakage
|
WARNING in skb_tunnel_check_pmtu
net
|
C |
done |
|
8 |
460d |
466d
|
24/25 |
218d |
853a76148802
tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()
|
WARNING: lock held when returning to user space in ieee80211_change_mac
net
wireless
|
|
|
|
1 |
368d |
364d
|
24/25 |
218d |
ceb3d688f922
wifi: mac80211: unlock on error in ieee80211_can_powered_addr_change()
|
memory leak in ipv6_renew_options
net
|
C |
|
|
1 |
444d |
440d
|
24/25 |
218d |
e27326009a3d
net: ping6: Fix memleak in ipv6_renew_options().
|
possible deadlock in kcm_ioctl
net
|
C |
error |
|
20 |
404d |
406d
|
24/25 |
218d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
memory leak in __tcp_send_ack
net
|
C |
|
|
10 |
356d |
887d
|
24/25 |
218d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
kernel BUG in __skb_gso_segment
net
|
C |
done |
|
11 |
486d |
484d
|
24/25 |
218d |
e9d3f80935b6
net/af_packet: make sure to pull mac header
|
general protection fault in rlb_clear_slave
net
|
|
|
|
1 |
462d |
462d
|
24/25 |
218d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
general protection fault in tcp_create_openreq_child
net
|
C |
unreliable |
|
83 |
523d |
526d
|
24/25 |
218d |
ba5a4fdd63ae
tcp: make sure treq->af_specific is initialized
|
KCSAN: data-race in veth_xmit / veth_xmit
net
|
|
|
|
1 |
604d |
599d
|
24/25 |
218d |
68468d8c4cd4
veth: fix races around rq->rx_notify_masked
|
kernel BUG in mld_newpack
net
|
|
|
|
1 |
350d |
350d
|
24/25 |
218d |
d89d7ff01235
ipv6: ensure sane device mtu in tunnels
|
KMSAN: uninit-value in ipvlan_queue_xmit
net
|
C |
|
|
2 |
397d |
980d
|
24/25 |
218d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING: suspicious RCU usage in ipmr_rtm_dumplink
net
|
|
|
|
11 |
460d |
463d
|
24/25 |
218d |
0fcae3c8b1b3
ipmr: fix a lockdep splat in ipmr_rtm_dumplink()
|
possible deadlock in nci_set_local_general_bytes
nfc
net
|
C |
|
|
32 |
269d |
320d
|
24/25 |
218d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
BUG: MAX_LOCK_DEPTH too low! (3)
net
s390
|
C |
done |
|
18 |
590d |
599d
|
24/25 |
218d |
1de9770d121e
net/smc: Avoid overwriting the copies of clcsock callback functions
|
general protection fault in skb_clone (5)
net
|
C |
done |
|
7 |
334d |
352d
|
24/25 |
218d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
KCSAN: data-race in fib6_info_hw_flags_set / fib6_purge_rt
net
|
|
|
|
1 |
623d |
621d
|
24/25 |
218d |
d95d6320ba7a
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
|
KASAN: use-after-free Read in macsec_get_iflink
net
|
|
|
|
1 |
496d |
492d
|
24/25 |
218d |
196a888ca657
macsec: fix UAF bug for real_dev
|
KMSAN: kernel-infoleak in _copy_to_iter (7)
net
|
C |
|
|
138977 |
218d |
571d
|
24/25 |
218d |
633593a80898
sctp: fix kernel-infoleak for SCTP sockets
|
KASAN: use-after-free Write in inet_put_port
net
|
|
|
|
1 |
476d |
472d
|
24/25 |
218d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
upstream boot error: general protection fault in ieee80211_register_hw
net
wireless
|
|
|
|
1 |
412d |
412d
|
24/25 |
218d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING in tcp_disconnect
net
|
|
|
|
2 |
346d |
350d
|
24/25 |
218d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
possible deadlock in virtual_nci_close
net
nfc
|
C |
done |
|
939 |
219d |
321d
|
24/25 |
218d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
WARNING in tcp_mtup_probe_success
net
|
|
|
|
3 |
486d |
492d
|
24/25 |
218d |
11825765291a
tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd
|
BUG: sleeping function called from invalid context in smc_pnet_add
net
|
C |
done |
|
45 |
600d |
601d
|
24/25 |
218d |
94fdd7c02a56
net/smc: use GFP_ATOMIC allocation in smc_pnet_add_eth()
|
KASAN: slab-out-of-bounds Write in bpf_prog_test_run_xdp
bpf
net
|
C |
done |
|
18 |
594d |
611d
|
24/25 |
218d |
a6763080856f
bpf: test_run: Fix OOB access in bpf_prog_test_run_xdp
|
KASAN: slab-out-of-bounds Read in smc_fback_error_report
net
s390
|
C |
error |
|
72 |
521d |
597d
|
24/25 |
218d |
0558226cebee
net/smc: Fix slab-out-of-bounds issue in fallback
|
KCSAN: data-race in packet_setsockopt / packet_setsockopt
net
|
|
|
|
1 |
626d |
613d
|
24/25 |
218d |
e42e70ad6ae2
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
|
possible deadlock in strp_work
net
|
C |
error |
|
4 |
404d |
406d
|
24/25 |
218d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
KASAN: use-after-free Read in __fib6_clean_all
net
|
|
|
|
30 |
308d |
562d
|
24/25 |
218d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
KMSAN: uninit-value in asix_mdio_write_nopm
net
usb
|
|
|
|
2 |
544d |
564d
|
24/25 |
218d |
920a9fa27e78
net: asix: add proper error handling of usb read errors
|
KCSAN: data-race in kcm_rcv_strparser / kcm_rfree (7)
net
|
|
|
|
1 |
348d |
347d
|
24/25 |
218d |
0c745b5141a4
kcm: annotate data-races around kcm->rx_wait
|
WARNING in devl_port_unregister
net
|
C |
|
|
1690 |
222d |
324d
|
24/25 |
218d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
WARNING: suspicious RCU usage in corrupted (2)
net
|
C |
unreliable |
|
7 |
463d |
474d
|
24/25 |
218d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
kernel BUG in vhost_get_vq_desc
virt
kvm
net
|
C |
inconclusive |
|
19 |
582d |
595d
|
24/25 |
218d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
WARNING in skb_warn_bad_offload (3)
net
|
C |
done |
|
115 |
219d |
356d
|
24/25 |
218d |
87445f369cca
ipv6: ping: fix wrong checksum for large frames
|
WARNING in arp_ioctl
net
|
C |
error |
done |
17 |
291d |
360d
|
24/25 |
218d |
b5f0de6df6dc
net: dev: Convert sa_data to flexible array in struct sockaddr
|
WARNING in ipvlan_queue_xmit
net
|
C |
inconclusive |
|
4 |
397d |
397d
|
24/25 |
218d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING: still has locks held in tls_rx_reader_lock
net
|
C |
done |
|
4 |
436d |
437d
|
24/25 |
218d |
dde06aaa89b7
tls: rx: release the sock lock on locking timeout
|
WARNING: suspicious RCU usage in in6_dump_addrs
net
|
C |
unreliable |
|
613 |
431d |
474d
|
24/25 |
218d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
kernel panic: corrupted stack end in inet_rtm_newaddr
net
|
|
|
|
23 |
222d |
558d
|
24/25 |
218d |
b81d591386c3
riscv: Increase stack size under KASAN
|
inconsistent lock state in smc_fback_state_change
net
s390
|
C |
error |
|
7 |
310d |
316d
|
24/25 |
218d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
linux-next test error: WARNING in devl_port_unregister
net
|
|
|
|
23 |
324d |
327d
|
24/25 |
218d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
KASAN: use-after-free Read in tcp_retransmit_timer (5)
net
|
C |
unreliable |
|
16000 |
302d |
1315d
|
24/25 |
218d |
3a58f13a881e
net: rds: acquire refcount on TCP sockets
|
WARNING in inet_csk_destroy_sock (2)
io-uring
net
|
C |
done |
|
8 |
267d |
354d
|
24/25 |
218d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
WARNING in __vunmap
net
|
C |
error |
error |
154 |
368d |
1688d
|
24/25 |
218d |
8a04d2fc700f
xfrm: Update ipcomp_scratches with NULL when freed
|
memory leak in napi_get_frags
net
|
C |
|
|
11 |
968d |
989d
|
24/25 |
218d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
memory leak in netlink_policy_dump_add_policy
net
|
C |
|
|
1 |
418d |
414d
|
24/25 |
218d |
249801360db3
net: genl: fix error path memory leak in policy dumping
|
KCSAN: data-race in fib6_clean_node / inet6_csk_route_socket
net
|
|
|
|
1 |
618d |
618d
|
24/25 |
218d |
aafc2e3285c2
ipv6: annotate accesses to fn->fn_sernum
|
BUG: unable to handle kernel paging request in inet_unhash
net
|
|
|
|
3 |
314d |
395d
|
24/25 |
218d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
general protection fault in llc_ui_connect
net
|
C |
done |
|
17 |
551d |
555d
|
24/25 |
218d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
memory leak in ndisc_send_rs
net
|
C |
|
|
2 |
715d |
762d
|
24/25 |
218d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
KCSAN: data-race in bond_3ad_initiate_agg_selection / bond_3ad_state_machine_handler (2)
net
|
|
|
|
1 |
594d |
593d
|
24/25 |
218d |
9ceaf6f76b20
bonding: fix data-races around agg_select_timer
|
general protection fault in llc_ui_sendmsg
net
|
C |
done |
|
365 |
551d |
555d
|
24/25 |
218d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
KASAN: use-after-free Read in inet_twsk_kill
net
|
|
|
|
86 |
611d |
613d
|
24/25 |
218d |
fbb8295248e1
tcp: allocate tcp_death_row outside of struct netns_ipv4
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
net
|
C |
inconclusive |
|
12 |
567d |
968d
|
24/25 |
218d |
c700525fcc06
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
INFO: task hung in vhost_work_dev_flush
kvm
net
virt
|
C |
error |
|
2 |
598d |
589d
|
24/25 |
218d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
stack segment fault in skb_clone
net
|
C |
unreliable |
inconclusive |
3 |
473d |
658d
|
24/25 |
218d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
WARNING: suspicious RCU usage in bond_ethtool_get_ts_info
net
|
C |
done |
|
6 |
504d |
506d
|
24/25 |
218d |
9b80ccda233f
bonding: fix missed rcu protection
|
general protection fault in rlb_req_update_slave_clients
net
|
C |
inconclusive |
|
3 |
482d |
482d
|
24/25 |
218d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
inconsistent lock state in l2tp_tunnel_register
net
|
|
|
|
5599 |
305d |
318d
|
24/25 |
218d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KASAN: invalid-free in tcp_disconnect
net
|
C |
unreliable |
|
74 |
347d |
361d
|
24/25 |
218d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
WARNING in wireless_send_event
wireless
net
|
C |
|
|
210 |
335d |
372d
|
24/25 |
218d |
e3e6e1d16a4c
wifi: wext: use flex array destination for memcpy()
|
KCSAN: data-race in ip6_dst_gc / ip6_dst_gc (3)
net
|
|
|
|
2 |
534d |
536d
|
24/25 |
218d |
9cb7c013420f
ipv6: make ip6_rt_gc_expire an atomic_t
|
possible deadlock in nci_close_device
net
nfc
|
|
|
|
2 |
299d |
312d
|
24/25 |
218d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
KCSAN: data-race in dropmon_net_event / trace_napi_poll_hit
net
|
|
|
|
1 |
614d |
597d
|
24/25 |
218d |
dcd54265c8bc
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
|
kernel BUG in netem_enqueue
net
|
|
|
|
9 |
289d |
514d
|
24/25 |
218d |
eeee4b77dc52
net: add more debug info in skb_checksum_help()
|
memory leak in vlan_dev_set_egress_priority (2)
net
|
C |
|
|
1 |
450d |
450d
|
24/25 |
218d |
72a0b329114b
vlan: fix memory leak in vlan_newlink()
|
WARNING in ieee80211_link_info_change_notify
net
wireless
|
C |
inconclusive |
|
1376 |
218d |
461d
|
24/25 |
218d |
591e73ee3f73
wifi: mac80211: properly skip link info driver update
|
upstream boot error: WARNING in genl_register_family
net
|
|
|
|
468 |
331d |
338d
|
24/25 |
218d |
e4ba4554209f
net: openvswitch: add missing .resv_start_op
|
WARNING in bpf_test_finish
bpf
net
|
C |
done |
|
3 |
580d |
580d
|
24/25 |
218d |
530e214c5b5a
bpf, test_run: Fix overflow in XDP frags bpf_test_finish
|
BUG: corrupted list in p9_fd_cancel (2)
net
v9fs
fuse
|
C |
error |
|
8 |
317d |
342d
|
24/25 |
218d |
11c10956515b
9p/fd: fix issue of list_del corruption in p9_fd_cancel()
|
KASAN: use-after-free Write in enqueue_timer
net
|
|
|
|
1 |
320d |
320d
|
24/25 |
218d |
ab0377803daf
mrp: introduce active flags to prevent UAF when applicant uninit
|
KASAN: null-ptr-deref Write in kcm_tx_work (3)
net
|
C |
inconclusive |
inconclusive |
7 |
365d |
466d
|
24/25 |
218d |
ec7eede369fe
kcm: avoid potential race in kcm_tx_work
|
kernel panic: corrupted stack end in rtnl_newlink
net
|
|
|
|
3489 |
218d |
566d
|
24/25 |
218d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING: refcount bug in sk_psock_get (2)
net
|
C |
done |
|
4 |
443d |
484d
|
24/25 |
218d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
WARNING in nci_send_cmd
nfc
net
|
C |
|
|
13 |
305d |
318d
|
24/25 |
218d |
0ad6bded175e
nfc/nci: fix race with opening and closing
|
KCSAN: data-race in kcm_rfree / unreserve_rx_kcm (3)
net
|
|
|
|
4 |
344d |
348d
|
24/25 |
218d |
15e4dabda11b
kcm: annotate data-races around kcm->rx_psock
|
WARNING in nci_add_new_protocol
net
nfc
|
|
|
|
1 |
311d |
307d
|
24/25 |
218d |
e329e71013c9
NFC: nci: Bounds check struct nfc_target arrays
|
memory leak in mld_newpack
net
|
C |
|
|
2 |
379d |
797d
|
24/25 |
218d |
a43206156263
usbnet: Fix memory leak in usbnet_disconnect()
|
WARNING in netif_napi_add_weight
net
|
C |
inconclusive |
done |
45 |
457d |
470d
|
24/25 |
218d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
BUG: using smp_processor_id() in preemptible code in tun_chr_write_iter
net
|
C |
done |
|
1834 |
558d |
567d
|
24/25 |
218d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
BUG: using smp_processor_id() in preemptible code in netdev_core_stats_alloc
net
|
C |
error |
|
2210 |
558d |
567d
|
24/25 |
218d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
BUG: missing reserved tailroom
bpf
net
|
C |
done |
|
2 |
570d |
569d
|
24/25 |
218d |
b6f1f780b393
bpf, test_run: Fix packet size check for live packet mode
|
general protection fault in smc_pnet_add (2)
net
s390
|
C |
inconclusive |
|
590 |
534d |
549d
|
24/25 |
218d |
d22f4f977236
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
|
possible deadlock in ___neigh_create
net
|
C |
error |
|
24 |
604d |
607d
|
24/25 |
218d |
4a81f6da9cb2
net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work
|
KASAN: use-after-free Read in __tcf_qdisc_find
net
|
|
|
|
1 |
391d |
391d
|
24/25 |
218d |
ebda44da44f6
net: sched: fix race condition in qdisc_graft()
|
KCSAN: data-race in __ip4_datagram_connect / raw_bind (2)
net
|
|
|
|
1 |
614d |
613d
|
24/25 |
218d |
153a0d187e76
ipv4: raw: lock the socket in raw_bind()
|
general protection fault in llc_build_and_send_ui_pkt
net
|
C |
done |
|
26 |
552d |
555d
|
24/25 |
218d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
net-next test error: WARNING: suspicious RCU usage in hsr_node_get_first
net
|
|
|
|
189 |
588d |
597d
|
24/25 |
218d |
e7f27420681f
net: hsr: fix suspicious RCU usage warning in hsr_node_get_first()
|
KFENCE: memory corruption in p9_req_put
net
v9fs
|
|
|
|
2 |
316d |
318d
|
24/25 |
218d |
26273ade77f5
9p: set req refcount to zero to avoid uninitialized usage
|
general protection fault in llc_alloc_frame
net
|
|
|
|
1 |
554d |
554d
|
24/25 |
218d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
WARNING in tls_strp_done
net
|
C |
error |
|
22 |
408d |
413d
|
24/25 |
218d |
849f16bbfb68
tls: rx: react to strparser initialization errors
|
linux-next test error: general protection fault in xfrm_policy_lookup_bytype
net
|
|
|
|
15 |
312d |
313d
|
24/25 |
218d |
b97df039a68b
xfrm: Fix oops in __xfrm_state_delete()
|
KASAN: slab-out-of-bounds Write in __build_skb_around
bpf
net
|
C |
error |
|
2536 |
292d |
306d
|
24/25 |
218d |
ce098da1497c
skbuff: Introduce slab_build_skb()
|
WARNING in sk_stream_kill_queues (8)
net
|
C |
unreliable |
|
4268 |
222d |
458d
|
24/25 |
218d |
e9c6e7976026
tcp: fix sock skb accounting in tcp_read_skb()
|
WARNING in mroute_clean_tables
net
|
C |
|
|
10 |
578d |
598d
|
24/25 |
218d |
5611a00697c8
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
|
general protection fault in pse_prepare_data
net
|
C |
inconclusive |
|
6 |
268d |
346d
|
24/25 |
218d |
46cdedf2a0fa
ethtool: pse-pd: fix null-deref on genl_info in dump
|
KMSAN: uninit-value in bcmp
net
|
C |
error |
done |
907 |
254d |
1575d
|
24/25 |
218d |
4f1dc7d9756e
fs/ntfs3: Validate attribute name offset
|
UBSAN: shift-out-of-bounds in tcf_pedit_init
net
|
C |
done |
|
59 |
499d |
506d
|
24/25 |
218d |
4d42d54a7d6a
net/sched: act_pedit: sanitize shift argument before usage
|
KASAN: use-after-free Read in ip6_fragment (2)
net
|
|
|
|
1 |
311d |
307d
|
24/25 |
218d |
803e84867de5
ipv6: avoid use-after-free in ip6_fragment()
|
general protection fault in llc_build_and_send_test_pkt
net
|
C |
done |
|
25 |
550d |
555d
|
24/25 |
218d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
WARNING in vhost_dev_cleanup (2)
virt
kvm
net
|
|
|
|
79 |
583d |
591d
|
24/25 |
218d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
BUG: unable to handle kernel NULL pointer dereference in em_u32_match
net
|
C |
|
|
2 |
273d |
330d
|
24/25 |
218d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
inconsistent lock state in p9_req_put
v9fs
net
|
|
|
|
181 |
360d |
411d
|
24/25 |
218d |
296ab4a81384
net/9p: use a dedicated spinlock for trans_fd
|
KCSAN: data-race in sit_tunnel_xmit / sit_tunnel_xmit
net
|
|
|
|
702 |
292d |
1389d
|
24/25 |
218d |
cb34b7cf17ec
ipv6/sit: use DEV_STATS_INC() to avoid data-races
|
WARNING in ip6erspan_tunnel_xmit
net
|
|
|
|
23 |
226d |
470d
|
24/25 |
218d |
301bd140ed0b
erspan: do not assume transport header is always set
|
general protection fault in skb_unlink
net
|
C |
done |
error |
8 |
388d |
1949d
|
24/25 |
218d |
5121197ecc5d
kcm: close race conditions on sk_receive_queue
|
upstream boot error: WARNING in wiphy_register
net
wireless
|
|
|
|
1 |
412d |
412d
|
24/25 |
218d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
WARNING in sk_destruct
net
|
C |
done |
|
454 |
494d |
621d
|
24/25 |
218d |
ebdc1a030962
tcp: add a missing sk_defer_free_flush() in tcp_splice_read()
|
KASAN: slab-out-of-bounds Read in ipvlan_queue_xmit
net
|
C |
error |
error |
8 |
581d |
1058d
|
24/25 |
218d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
WARNING in wdev_chandef
net
wireless
|
|
|
|
12 |
420d |
462d
|
24/25 |
218d |
206bbcf76121
wifi: nl80211: hold wdev mutex for tid config
|
kernel panic: corrupted stack end in packet_sendmsg
net
|
|
|
|
1 |
390d |
390d
|
24/25 |
218d |
b81d591386c3
riscv: Increase stack size under KASAN
|
WARNING in tcp_ack (3)
net
|
|
|
|
16 |
485d |
543d
|
24/25 |
218d |
40570375356c
tcp: add accessors to read/set tp->snd_cwnd
|
WARNING in cfg80211_ch_switch_notify
net
wireless
|
C |
done |
|
744 |
419d |
462d
|
24/25 |
218d |
77e7b6ba78ed
wifi: cfg80211: handle IBSS in channel switch
|
WARNING in napi_complete_done
net
|
C |
error |
|
104 |
326d |
330d
|
24/25 |
218d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
KCSAN: data-race in inet6_recvmsg / ipv6_setsockopt
net
|
|
|
|
1 |
602d |
599d
|
24/25 |
218d |
086d49058cd8
ipv6: annotate some data-races around sk->sk_prot
|
KASAN: use-after-free Read in ip6mr_sk_done
net
|
C |
done |
|
10988 |
333d |
602d
|
24/25 |
218d |
7d9b1b578d67
ip6mr: fix use-after-free in ip6mr_sk_done()
|
WARNING: refcount bug in smc_pnet_add
s390
net
|
C |
done |
|
98 |
588d |
602d
|
24/25 |
218d |
28f922213886
net/smc: fix ref_tracker issue in smc_pnet_add()
|
KASAN: use-after-free Write in mini_qdisc_pair_swap (2)
net
|
|
|
|
24 |
227d |
608d
|
24/25 |
218d |
04c2a47ffb13
net: sched: fix use-after-free in tc_new_tfilter()
|
KMSAN: uninit-value in tcp_recvmsg
net
|
C |
|
|
25918 |
341d |
466d
|
24/25 |
218d |
1228b34c8d0e
net: clear msg_get_inq in __sys_recvfrom() and __copy_msghdr_from_user()
|
memory leak in smc_sysctl_net_init
net
s390
|
C |
|
|
8 |
550d |
555d
|
24/25 |
218d |
5ae6acf1d00b
net/smc: fix a memory leak in smc_sysctl_net_exit()
|
usb-testing boot error: WARNING in __netif_set_xps_queue
net
virt
|
|
|
|
57 |
336d |
349d
|
24/25 |
218d |
fc8695eb11f0
Revert "net: fix cpu_max_bits_warn() usage in netif_attrmask_next{,_and}"
|
KASAN: use-after-free Read in inet_bind2_bucket_find
net
io-uring
|
C |
done |
|
13 |
473d |
480d
|
24/25 |
218d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
INFO: task hung in p9_fd_close
net
v9fs
|
C |
error |
error |
484 |
328d |
1492d
|
24/25 |
218d |
ef575281b21e
9p/trans_fd: always use O_NONBLOCK read/write
|
memory leak in smc_create (2)
net
s390
|
C |
|
|
2 |
555d |
551d
|
24/25 |
218d |
1a74e9932374
net/smc: Fix sock leak when release after smc_shutdown()
|
possible deadlock in __inet_inherit_port
net
|
C |
done |
|
85 |
256d |
317d
|
24/25 |
218d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
WARNING in cleanup_net
net
|
|
|
|
613 |
218d |
341d
|
24/25 |
218d |
d1e96cc4fbe0
mptcp: fix tracking issue in mptcp_subflow_create_socket()
|
general protection fault in ip6_tnl_xmit
net
|
|
|
|
1 |
599d |
599d
|
24/25 |
218d |
3a5f238f2b36
ip6_tunnel: fix possible NULL deref in ip6_tnl_xmit
|
possible deadlock in sk_common_release
net
|
|
|
|
5 |
306d |
317d
|
24/25 |
218d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
KASAN: use-after-free Read in ieee80211_scan_rx (3)
wireless
net
|
|
|
|
10 |
415d |
523d
|
24/25 |
218d |
60deb9f10eec
wifi: mac80211: Fix UAF in ieee80211_scan_rx()
|
kernel panic: corrupted stack end in inet6_ioctl
net
|
|
|
|
1 |
310d |
310d
|
24/25 |
218d |
b81d591386c3
riscv: Increase stack size under KASAN
|
INFO: rcu detected stall in mld_ifc_work
net
|
C |
inconclusive |
|
1 |
594d |
594d
|
24/25 |
218d |
5740d0689096
net: sched: limit TC_ACT_REPEAT loops
|
WARNING: refcount bug in u32_destroy_key
net
|
|
|
|
1 |
537d |
537d
|
24/25 |
218d |
3db09e762dc7
net/sched: cls_u32: fix netns refcount changes in u32_change()
|
KASAN: use-after-free Read in ip_mc_sf_allow
net
|
|
|
|
1 |
520d |
520d
|
24/25 |
218d |
dba5bdd57bea
net: igmp: respect RCU rules in ip_mc_source() and ip_mc_msfilter()
|
general protection fault in fq_codel_enqueue (3)
net
|
C |
inconclusive |
|
5 |
456d |
701d
|
24/25 |
218d |
fd1894224407
bpf: Don't redirect packets with invalid pkt_len
|
KCSAN: data-race in fib_alias_hw_flags_set / fib_alias_hw_flags_set
net
|
|
|
|
1 |
596d |
593d
|
24/25 |
218d |
9fcf986cc4bc
ipv4: fix data races in fib_alias_hw_flags_set
|
INFO: trying to register non-static key in __fib6_clean_all (2)
net
|
|
|
|
3 |
355d |
379d
|
24/25 |
218d |
5daadc86f27e
net: tun: Fix use-after-free in tun_detach()
|
WARNING: bad unlock balance in rxrpc_do_sendmsg
afs
net
|
C |
inconclusive |
|
14 |
424d |
628d
|
24/25 |
218d |
b0f571ecd794
rxrpc: Fix locking in rxrpc's sendmsg
|
memory leak in tun_chr_open
net
|
C |
|
|
1 |
388d |
388d
|
24/25 |
218d |
1118b2049d77
net: tun: Fix memory leaks of napi_get_frags
|
general protection fault in udpv6_sendmsg
net
|
C |
error |
|
69 |
315d |
324d
|
24/25 |
218d |
6423ac2eb31e
rxrpc: Fix oops from calling udpv6_sendmsg() on AF_INET socket
|
WARNING in ieee80211_ibss_csa_beacon
net
wireless
|
C |
error |
|
4997 |
218d |
1088d
|
24/25 |
218d |
15bc8966b6d3
wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected
|
KASAN: slab-out-of-bounds Read in decrypt_internal
net
|
C |
inconclusive |
done |
4 |
541d |
631d
|
24/25 |
218d |
9381fe8c849c
net/tls: fix slab-out-of-bounds bug in decrypt_internal
|
WARNING in ipvlan_unregister_nf_hook
net
|
C |
done |
done |
4151 |
667d |
1303d
|
24/25 |
376d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
general protection fault in sock_close
net
|
syz |
done |
unreliable |
2 |
1129d |
1125d
|
22/25 |
493d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING in dev_change_net_namespace
net
|
syz |
done |
done |
8 |
679d |
1327d
|
22/25 |
499d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
WARNING in rtnl_dellink
net
|
C |
done |
done |
94 |
626d |
1137d
|
22/25 |
505d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
INFO: task hung in linkwatch_event (2)
net
|
C |
done |
done |
1033 |
524d |
1250d
|
22/25 |
505d |
563fbefed46a
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
general protection fault in xfrm_user_rcv_msg_compat
net
|
C |
unreliable |
done |
1543 |
786d |
998d
|
22/25 |
505d |
4e9505064f58
net/xfrm/compat: Copy xfrm_spdattr_type_t atributes
|
WARNING in dst_release (3)
net
|
|
|
|
3 |
574d |
655d
|
22/25 |
571d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KCSAN: data-race in __neigh_event_send / ip_finish_output2 (3)
net
|
|
|
|
1 |
708d |
705d
|
22/25 |
571d |
d18785e21386
net: annotate data-race in neigh_output()
|
general protection fault in unregister_vlan_dev
net
|
|
|
|
1 |
670d |
670d
|
22/25 |
571d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
memory leak in reg_copy_regd
net
wireless
|
C |
|
|
1 |
805d |
801d
|
22/25 |
571d |
e53e9828a8d2
cfg80211: always free wiphy specific regdomain
|
KASAN: null-ptr-deref Write in dst_release (3)
net
|
|
|
|
2 |
653d |
654d
|
22/25 |
571d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KCSAN: data-race in bond_alb_init_slave / bond_alb_monitor
net
|
|
|
|
1 |
670d |
669d
|
22/25 |
571d |
dac8e00fb640
bonding: make tx_rebalance_counter an atomic
|
KMSAN: kernel-infoleak in _copy_to_iter (6)
net
|
C |
|
|
748 |
571d |
660d
|
22/25 |
571d |
71ddeac8cd1d
inet_diag: fix kernel-infoleak for UDP sockets
|
WARNING: ODEBUG bug in qdisc_create
net
|
C |
done |
|
6 |
740d |
768d
|
22/25 |
571d |
a56d447f196f
net/sched: sch_taprio: properly cancel timer from taprio_destroy()
|
WARNING: suspicious RCU usage in xfrm_set_default
net
|
C |
done |
|
20 |
734d |
739d
|
22/25 |
571d |
93ec1320b017
xfrm: fix rcu lock in xfrm_notify_userpolicy()
|
WARNING: refcount bug in rx_queue_release
net
|
|
|
|
12 |
673d |
687d
|
22/25 |
571d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
kmsan boot error: KMSAN: uninit-value in tcp_child_process
net
|
|
|
|
48 |
656d |
667d
|
22/25 |
571d |
03cfda4fa6ea
tcp: fix another uninit-value (sk_rx_queue_mapping)
|
kmsan boot error: KMSAN: uninit-value in tcp_conn_request
net
|
|
|
|
27 |
669d |
669d
|
22/25 |
571d |
a37a0ee4d25c
net: avoid uninit-value from tcp_conn_request
|
KCSAN: data-race in netlink_insert / netlink_sendmsg (4)
net
|
|
|
|
88 |
723d |
805d
|
22/25 |
571d |
7707a4d01a64
netlink: annotate data races around nlk->bound
|
BUG: sleeping function called from invalid context in ref_tracker_alloc
net
|
|
|
|
1 |
655d |
655d
|
22/25 |
571d |
8b40a9d53d4f
ipv6: use GFP_ATOMIC in rt6_probe()
|
general protection fault in gro_cells_destroy (2)
net
|
|
|
|
2 |
624d |
641d
|
22/25 |
571d |
e28587cc491e
sit: do not call ipip6_dev_free() from sit_init_net()
|
KASAN: null-ptr-deref Write in sock_setsockopt
net
|
C |
|
|
45 |
589d |
696d
|
22/25 |
571d |
d00c8ee31729
net: fix possible NULL deref in sock_reserve_memory
|
WARNING: refcount bug in ip6gre_exit_batch_net
net
|
|
|
|
2 |
682d |
684d
|
22/25 |
571d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
KASAN: use-after-free Read in netlbl_catmap_walk
net
lsm
|
C |
inconclusive |
|
1 |
766d |
766d
|
22/25 |
571d |
0817534ff9ea
smackfs: Fix use-after-free in netlbl_catmap_walk()
|
general protection fault in bpf_skb_cgroup_id
bpf
net
|
C |
inconclusive |
|
107 |
728d |
743d
|
22/25 |
571d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
general protection fault in inet_csk_accept
net
|
C |
done |
|
8 |
660d |
659d
|
22/25 |
571d |
b0cdc5dbcf2b
mptcp: never allow the PM to close a listener subflow
|
KASAN: null-ptr-deref Write in rhashtable_free_and_destroy (2)
net
wireless
|
C |
unreliable |
|
38 |
635d |
901d
|
22/25 |
571d |
8b5cb7e41d9d
mac80211: mesh: embedd mesh_paths and mpp_paths into ieee80211_if_mesh
|
KASAN: use-after-free Read in tcp_v4_early_demux
net
|
|
|
|
1 |
653d |
653d
|
22/25 |
571d |
8f905c0e7354
inet: fully convert sk->sk_rx_dst to RCU rules
|
INFO: task hung in disconnect_work
net
wireless
|
C |
inconclusive |
done |
3 |
682d |
956d
|
22/25 |
571d |
563fbefed46a
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
KCSAN: data-race in unix_inflight / wait_for_unix_gc (3)
net
|
|
|
|
1 |
638d |
624d
|
22/25 |
571d |
9d6d7f1cb67c
af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
|
KASAN: use-after-free Read in cipso_v4_doi_add
lsm
net
|
|
|
|
1 |
716d |
712d
|
22/25 |
571d |
0934ad42bb2c
smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
|
KASAN: invalid-free in packet_set_ring
net
|
C |
inconclusive |
|
4 |
657d |
657d
|
22/25 |
571d |
ec6af094ea28
net/packet: rx_owner_map depends on pg_vec
|
general protection fault in bpf_skb_ancestor_cgroup_id
bpf
net
|
C |
unreliable |
|
232 |
727d |
743d
|
22/25 |
571d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
INFO: rcu detected stall in fq_pie_timer
net
|
C |
error |
|
35 |
612d |
830d
|
22/25 |
571d |
61c2402665f1
net/sched: fq_pie: prevent dismantle issue
|
WARNING: refcount bug in netdev_run_todo
net
|
|
|
|
5 |
674d |
683d
|
22/25 |
571d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
general protection fault in free_percpu
net
|
syz |
unreliable |
done |
80 |
639d |
906d
|
22/25 |
571d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
WARNING: lock held when returning to user space in tcp_setsockopt (2)
net
|
C |
done |
done |
6 |
645d |
651d
|
22/25 |
571d |
b29fcfb54cd7
mptcp: full disconnect implementation
|
WARNING in tcf_chain0_head_change_cb_del (3)
net
|
C |
inconclusive |
|
107 |
655d |
790d
|
22/25 |
571d |
ab443c539167
sch_cake: do not call cake_destroy() from cake_init()
|
general protection fault in sock_release (2)
net
|
|
|
|
1 |
659d |
659d
|
22/25 |
571d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
WARNING in ieee80211_parse_tx_radiotap
net
wireless
|
|
|
|
2 |
748d |
746d
|
22/25 |
571d |
13cb6d826e0a
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
|
BUG: unable to handle kernel paging request in dev_fetch_sw_netstats
net
|
|
|
|
1 |
651d |
651d
|
22/25 |
571d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
WARNING in free_netdev
net
|
|
|
|
4080 |
585d |
627d
|
22/25 |
571d |
fcfb894d5952
net: bridge: fix net device refcount tracking issue in error path
|
WARNING in nsim_dev_reload_destroy
net
|
C |
done |
|
2895 |
702d |
707d
|
22/25 |
571d |
fb9d19c2d844
Revert "devlink: Remove not-executed trap group notifications"
|
KASAN: use-after-free Read in free_netdev (2)
net
|
C |
done |
done |
1715 |
669d |
1303d
|
22/25 |
571d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
WARNING: refcount bug in linkwatch_do_dev
net
|
|
|
|
74 |
665d |
691d
|
22/25 |
571d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
general protection fault in tls_init
net
|
|
|
|
1 |
671d |
666d
|
22/25 |
571d |
404cd9a22150
mptcp: remove tcp ulp setsockopt support
|
KMSAN: uninit-value in ieee80211_sta_tx_notify (2)
net
wireless
|
|
|
|
283 |
589d |
679d
|
22/25 |
571d |
d5e568c3a4ec
mac80211: track only QoS data frames for admission control
|
WARNING: refcount bug in in_dev_finish_destroy (2)
net
|
|
|
|
42 |
673d |
688d
|
22/25 |
571d |
34ac17ecbf57
ethtool: use ethnl_parse_header_dev_put()
|
general protection fault in smc_pnet_add
net
s390
|
|
|
|
578 |
571d |
627d
|
22/25 |
571d |
7b9b1d449a7c
net/smc: fix possible NULL deref in smc_pnet_add_eth()
|
WARNING in __put_net
net
|
|
|
|
5215 |
614d |
627d
|
22/25 |
571d |
cb963a19d99f
net: sched: do not allocate a tracker in tcf_exts_init()
|
KCSAN: data-race in skb_queue_tail / unix_dgram_poll (4)
net
|
|
|
|
2 |
749d |
754d
|
22/25 |
571d |
04f08eb44b50
net/af_unix: fix a data-race in unix_dgram_poll
|
UBSAN: shift-out-of-bounds in __qdisc_calculate_pkt_len
net
|
C |
unreliable |
|
5660 |
730d |
1027d
|
22/25 |
571d |
b193e15ac69d
net: prevent user from passing illegal stab size
|
WARNING in ieee80211_vif_release_channel (2)
net
wireless
|
C |
done |
|
5 |
646d |
650d
|
22/25 |
571d |
87a270625a89
mac80211: fix locking in ieee80211_start_ap error path
|
general protection fault in dev_get_by_index_rcu (2)
bpf
net
|
C |
error |
|
18 |
631d |
631d
|
22/25 |
571d |
382778edc826
xdp: check prog type before updating BPF link
|
WARNING in __dev_set_promiscuity
net
|
C |
done |
|
11 |
733d |
736d
|
22/25 |
571d |
a5b8fd657881
net: dev_addr_list: handle first address in __hw_addr_add_ex
|
BUG: sleeping function called from invalid context in hci_cmd_sync_cancel
usb
net
|
C |
done |
|
28 |
647d |
661d
|
22/25 |
571d |
744451c162a5
Bluetooth: hci_sync: Push sync command cancellation to workqueue
|
UBSAN: array-index-out-of-bounds in llc_sap_add_socket
net
|
|
|
|
1 |
697d |
697d
|
22/25 |
571d |
8ac9dfd58b13
llc: fix out-of-bound array index in llc_sk_dev_hash()
|
net-next test error: WARNING in devlink_nl_region_notify
net
|
|
|
|
24 |
731d |
729d
|
22/25 |
571d |
ef91abfb20c7
devlink: Add missed notifications iterators
|
KCSAN: data-race in fib_create_info / free_fib_info
net
|
|
|
|
1 |
644d |
624d
|
22/25 |
571d |
0a6e6b3c7db6
ipv4: update fib_info_cnt under spinlock protection
|
BUG: sleeping function called from invalid context in tipc_crypto_start
net
|
C |
done |
done |
6 |
649d |
656d
|
22/25 |
571d |
f845fe5819ef
Revert "tipc: use consistent GFP flags"
|
general protection fault in ref_tracker_alloc
net
|
C |
done |
|
679 |
627d |
656d
|
22/25 |
571d |
0976b888a150
ethtool: fix null-ptr-deref on ref tracker
|
WARNING: suspicious RCU usage in ref_tracker_alloc
net
|
|
|
|
17 |
654d |
656d
|
22/25 |
571d |
8b40a9d53d4f
ipv6: use GFP_ATOMIC in rt6_probe()
|
KMSAN: uninit-value in p9pdu_readf
net
v9fs
|
|
|
|
14 |
606d |
721d
|
22/25 |
571d |
27eb4c3144f7
9p/net: fix missing error check in p9_check_errors
|
UBSAN: shift-out-of-bounds in qfq_init_qdisc
net
|
|
|
|
1 |
637d |
637d
|
22/25 |
571d |
7d18a07897d0
sch_qfq: prevent shift-out-of-bounds in qfq_init_qdisc
|
KMSAN: uninit-value in pneigh_fill_info
net
|
C |
|
|
14 |
659d |
663d
|
22/25 |
571d |
e195e9b5dee6
net, neigh: clear whole pneigh_entry at alloc time
|
KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit (5)
net
|
|
|
|
1 |
678d |
676d
|
22/25 |
571d |
7a10d8c810cf
net: annotate data-races on txq->xmit_lock_owner
|
WARNING in chnl_net_uninit (2)
net
|
|
|
|
1 |
749d |
749d
|
22/25 |
571d |
550ac9c1aaaa
net-caif: avoid user-triggerable WARN_ON(1)
|
INFO: rcu detected stall in ieee80211_tasklet_handler
net
wireless
|
C |
error |
done |
74 |
735d |
1015d
|
22/25 |
571d |
313bbd1990b6
mac80211-hwsim: fix late beacon hrtimer handling
|
general protection fault in nfc_alloc_send_skb
net
nfc
|
C |
done |
|
2 |
639d |
633d
|
22/25 |
571d |
dded08927ca3
nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind()
|
BUG: unable to handle kernel NULL pointer dereference in fifo_set_limit
net
|
C |
error |
|
1 |
730d |
730d
|
22/25 |
571d |
560ee196fe9e
net_sched: fix NULL deref in fifo_set_limit()
|
possible deadlock in smc_switch_to_fallback
s390
net
|
|
|
|
43575 |
660d |
680d
|
22/25 |
571d |
7a61432dc813
net/smc: Avoid warning of possible recursive locking
|
WARNING in rtnl_stats_get
net
|
C |
unreliable |
|
31 |
698d |
887d
|
22/25 |
571d |
0854a0513321
net: bridge: fix under estimation in br_get_linkxstats_size()
|
kernel BUG at net/phonet/socket.c:LINE!
net
|
C |
inconclusive |
|
168 |
648d |
1269d
|
22/25 |
571d |
75a2f3152009
phonet/pep: refuse to enable an unbound pipe
|
KCSAN: data-race in __inet_hash_connect / inet_getname
net
|
|
|
|
1 |
730d |
704d
|
22/25 |
571d |
9dfc685e0262
inet: remove races in inet{6}_getname()
|
KMSAN: uninit-value in fib_get_nhs
net
|
C |
|
|
14 |
589d |
660d
|
22/25 |
571d |
7a3429bace0e
ipv4: Check attribute length for RTA_GATEWAY in multipath route
|
WARNING in sk_stream_kill_queues (7)
net
|
C |
|
|
6689 |
572d |
690d
|
22/25 |
571d |
c4777efa751d
net: add and use skb_unclone_keeptruesize() helper
|
KASAN: use-after-free Read in vlan_dev_real_dev (2)
net
|
C |
error |
|
7 |
708d |
719d
|
22/25 |
571d |
563bcbae3ba2
net: vlan: fix a UAF in vlan_dev_real_dev()
|
WARNING in cache_grow_begin
net
|
|
|
|
2 |
619d |
619d
|
22/25 |
571d |
c12837d1bb31
ref_tracker: use __GFP_NOFAIL more carefully
|
UBSAN: shift-out-of-bounds in xfrm_get_default
net
|
C |
done |
|
104 |
723d |
761d
|
22/25 |
571d |
3c10ffddc61f
net: xfrm: fix shift-out-of-bounds in xfrm_get_default
|
WARNING in ref_tracker_free
net
|
C |
done |
|
14831 |
629d |
656d
|
22/25 |
571d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
KMSAN: uninit-value in _ieee802_11_parse_elems_crc
net
wireless
|
|
|
|
1 |
666d |
659d
|
22/25 |
571d |
768c0b19b506
mac80211: validate extended element ID is present
|
inconsistent lock state in netlink_broadcast_filtered
net
|
|
|
|
1 |
704d |
704d
|
22/25 |
571d |
f941eadd8d6d
bpf: Avoid races in __bpf_prog_run() for 32bit arches
|
WARNING in gnet_stats_add_basic
net
|
C |
done |
|
14 |
712d |
712d
|
22/25 |
571d |
e22db7bd552f
net: sched: Allow statistics reads from softirq.
|
BUG: corrupted list in netif_napi_add
net
|
syz |
unreliable |
done |
17 |
686d |
717d
|
22/25 |
571d |
0315a075f134
net: fix premature exit from NAPI state polling in napi_disable()
|
INFO: task can't die in __cond_resched
net
|
C |
error |
|
66 |
686d |
740d
|
22/25 |
571d |
e9edc188fc76
netfilter: conntrack: serialize hash resizes and cleanups
|
general protection fault in ref_tracker_free
net
|
|
|
|
21 |
630d |
655d
|
22/25 |
571d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
BUG: unable to handle kernel NULL pointer dereference in unix_shutdown
net
|
C |
unreliable |
|
413 |
768d |
770d
|
22/25 |
614d |
d359902d5c35
af_unix: Fix NULL pointer bug in unix_shutdown
|
KASAN: use-after-free Read in cipso_v4_genopt
lsm
net
|
C |
inconclusive |
|
5 |
941d |
942d
|
22/25 |
690d |
ad5d07f4a9cd
cipso,calipso: resolve a number of problems with the DOI refcounts
1165affd4848
net: mac802154: Fix general protection fault
|
WARNING in idr_get_next
arm-msm
net
|
C |
error |
done |
21 |
881d |
1125d
|
22/25 |
690d |
3cbf7530a163
qrtr: Convert qrtr_ports from IDR to XArray
|
KASAN: null-ptr-deref Read in phy_disconnect
net
usb
|
C |
|
|
255 |
757d |
760d
|
22/25 |
690d |
1406e8cb4b05
net: usb: asix: do not call phy_disconnect() for ax88178
|
KMSAN: uninit-value in hsr_fill_frame_info
net
|
C |
|
|
249 |
807d |
1105d
|
22/25 |
690d |
2e9f60932a2c
net: hsr: check skb can contain struct hsr_ethhdr in fill_frame_info
|
WARNING: refcount bug in ip6_tnl_dev_uninit
net
|
C |
done |
|
16 |
913d |
918d
|
22/25 |
690d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
KASAN: slab-out-of-bounds Read in fq_pie_qdisc_enqueue
net
|
|
|
|
1 |
830d |
830d
|
22/25 |
690d |
e70f7a11876a
net/sched: fq_pie: fix OOB access in the traffic path
|
WARNING: suspicious RCU usage in do_ipv6_setsockopt
net
|
|
|
|
1 |
916d |
916d
|
22/25 |
690d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
memory leak in garp_request_join
net
|
C |
|
|
414 |
819d |
1342d
|
22/25 |
690d |
42ca63f98084
net/802/garp: fix memleak in garp_request_join()
|
KMSAN: uninit-value in virtio_net_hdr_to_skb
net
|
C |
|
|
325 |
808d |
866d
|
22/25 |
690d |
61431a5907fc
net: ensure mac header is set in virtio_net_hdr_to_skb()
|
WARNING in ethnl_default_doit
net
|
|
|
|
202 |
833d |
841d
|
22/25 |
690d |
e175aef90269
ethtool: strset: fix message length calculation
|
KASAN: use-after-free Write in qdisc_class_hash_insert (2)
net
|
|
|
|
1 |
833d |
833d
|
22/25 |
690d |
0cd58e5c53ba
pkt_sched: sch_qfq: fix qfq_change_class() error path
|
KCSAN: data-race in igmp_ifc_event / igmp_ifc_timer_expire
net
|
|
|
|
1 |
783d |
782d
|
22/25 |
690d |
4a2b285e7e10
net: igmp: fix data-race in igmp_ifc_timer_expire()
|
kernel BUG in llc_sap_action_send_xid_c
net
|
C |
error |
|
61 |
690d |
904d
|
22/25 |
690d |
c7c9d2102c9c
net: llc: fix skb_over_panic
|
BUG: unable to handle kernel NULL pointer dereference in htb_select_queue
net
|
syz |
done |
|
8 |
920d |
935d
|
22/25 |
690d |
fb3a3e37de33
sch_htb: Fix offload cleanup in htb_destroy on htb_init failure
93bde210c434
sch_htb: Fix select_queue for non-offload mode
|
KCSAN: data-race in packet_do_bind / packet_sendmsg (3)
net
|
|
|
|
1 |
849d |
845d
|
22/25 |
690d |
c7d2ef5dd4b0
net/packet: annotate accesses to po->bind
|
WARNING: suspicious RCU usage in do_recvmmsg
net
|
|
|
|
8 |
842d |
868d
|
22/25 |
690d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
KASAN: use-after-free Write in sk_psock_stop
bpf
net
|
syz |
done |
|
74 |
888d |
908d
|
22/25 |
690d |
aadb2bb83ff7
sock_map: Fix a potential use-after-free in sock_map_close()
|
KCSAN: data-race in unix_dgram_sendmsg / unix_release_sock
net
|
|
|
|
1 |
839d |
838d
|
22/25 |
690d |
a494bd642d91
net/af_unix: fix a data-race in unix_dgram_sendmsg / unix_release_sock
|
INFO: rcu detected stall in wg_packet_tx_worker (3)
net
|
C |
inconclusive |
|
5 |
776d |
758d
|
22/25 |
690d |
c7c5e6ff533f
fq_codel: reject silly quantum parameters
|
KCSAN: data-race in inet_dgram_connect / udp_lib_get_port (5)
net
|
|
|
|
6 |
855d |
842d
|
22/25 |
690d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
WARNING: refcount bug in vti6_dev_uninit
net
|
C |
|
|
26 |
913d |
918d
|
22/25 |
690d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
general protection fault in unix_dgram_connect
net
|
C |
done |
|
2 |
764d |
764d
|
22/25 |
690d |
dc56ad7028c5
af_unix: fix potential NULL deref in unix_dgram_connect()
|
memory leak in xfrm_user_rcv_msg
net
|
C |
|
|
1 |
834d |
830d
|
22/25 |
690d |
7c1a80e80cde
net: xfrm: fix memory leak in xfrm_user_rcv_msg
|
KMSAN: uninit-value in INET_ECN_decapsulate (2)
net
|
|
|
|
2 |
844d |
914d
|
22/25 |
690d |
6628ddfec758
net: geneve: check skb is large enough for IPv4/IPv6 header
|
KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (5)
net
|
|
|
|
47 |
691d |
842d
|
22/25 |
690d |
f13ef10059cc
net: annotate data race in sock_error()
|
divide error in __tcp_select_window (2)
net
|
C |
done |
|
4 |
904d |
905d
|
22/25 |
690d |
a7150e382267
Revert "tcp: Reset tcp connections in SYN-SENT state"
|
KMSAN: uninit-value in ip_rcv_core
net
|
C |
|
|
141 |
806d |
1840d
|
22/25 |
690d |
6628ddfec758
net: geneve: check skb is large enough for IPv4/IPv6 header
|
WARNING in slave_kobj_release
net
|
C |
done |
|
3 |
868d |
956d
|
22/25 |
690d |
35d96e631860
bonding: init notify_work earlier to avoid uninitialized use
|
linux-next boot error: KASAN: use-after-free Read in page_to_skb
net
virt
|
|
|
|
7 |
893d |
894d
|
22/25 |
690d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
KASAN: use-after-free Read in eth_header_parse_protocol
net
|
C |
done |
|
1453 |
888d |
934d
|
22/25 |
690d |
61431a5907fc
net: ensure mac header is set in virtio_net_hdr_to_skb()
|
KCSAN: data-race in udp_lib_setsockopt / udpv6_sendmsg
net
|
|
|
|
1 |
824d |
823d
|
22/25 |
690d |
18a419bad63b
udp: annotate data races around unix_sk(sk)->gso_size
|
WARNING: suspicious RCU usage in nf_ct_iterate_cleanup (2)
net
|
|
|
|
4 |
820d |
879d
|
22/25 |
690d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
WARNING: refcount bug in ip6gre_tunnel_uninit
net
|
C |
error |
|
10 |
915d |
918d
|
22/25 |
690d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
KCSAN: data-race in inet_send_prepare / udp_lib_get_port (3)
net
|
|
|
|
4 |
842d |
845d
|
22/25 |
690d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
net
|
|
|
|
2 |
867d |
887d
|
22/25 |
690d |
821bbf79fe46
ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
|
WARNING in ieee80211_get_sband
net
wireless
|
C |
done |
|
7 |
858d |
1083d
|
22/25 |
690d |
0ee4d55534f8
mac80211: remove warning in ieee80211_get_sband()
|
BUG: using smp_processor_id() in preemptible code in radix_tree_node_alloc
arm-msm
net
|
C |
done |
done |
544 |
876d |
1213d
|
22/25 |
690d |
3cbf7530a163
qrtr: Convert qrtr_ports from IDR to XArray
|
general protection fault in smc_tx_sendmsg
net
s390
|
C |
done |
|
6369 |
824d |
832d
|
22/25 |
690d |
17081633e22d
net/smc: Ensure correct state of the socket in send path
|
KCSAN: data-race in packet_do_bind / packet_getname (5)
net
|
|
|
|
4 |
838d |
837d
|
22/25 |
690d |
e032f7c9c7ce
net/packet: annotate accesses to po->ifindex
|
memory leak in qrtr_create
arm-msm
net
|
C |
|
|
3 |
794d |
964d
|
22/25 |
690d |
52f3456a96c0
net: qrtr: fix memory leaks
|
memory leak in virtio_transport_send_pkt_info
net
|
C |
|
|
2 |
901d |
964d
|
22/25 |
690d |
8432b8114957
vsock/virtio: free queued packets when closing socket
|
possible deadlock in ieee80211_tx_frags
net
|
|
|
|
1 |
891d |
883d
|
22/25 |
690d |
1d482e666b8e
netlink: disable IRQs for netlink_lock_table()
|
KCSAN: data-race in __inet_hash_connect / inet_send_prepare (4)
net
|
|
|
|
7 |
839d |
842d
|
22/25 |
690d |
dcd01eeac144
inet: annotate data race in inet_send_prepare() and inet_dgram_connect()
|
UBSAN: shift-out-of-bounds in choke_change (2)
net
|
C |
done |
|
7 |
905d |
920d
|
22/25 |
690d |
3a87571f0ffc
sch_red: fix off-by-one checks in red_check_params()
|
UBSAN: shift-out-of-bounds in xprt_calc_majortimeo
net
nfs
|
C |
unreliable |
|
149 |
891d |
1019d
|
22/25 |
690d |
c09f11ef3595
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
|
INFO: rcu detected stall in tx
net
|
C |
error |
unreliable |
3 |
757d |
895d
|
22/25 |
690d |
30fad76ce4e9
USB: usbtmc: Fix RCU stall warning
|
WARNING: lock held when returning to user space in sock_setsockopt
net
|
|
|
|
1 |
817d |
817d
|
22/25 |
690d |
271dbc318432
sock: unlock on error in sock_setsockopt()
|
WARNING: suspicious RCU usage in inet_twsk_purge
net
|
|
|
|
10 |
813d |
915d
|
22/25 |
690d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
general protection fault in kcm_sendmsg
net
|
C |
done |
|
7957 |
824d |
845d
|
22/25 |
690d |
a47c397bb29f
revert "net: kcm: fix memory leak in kcm_sendmsg"
|
WARNING in sk_stream_kill_queues (6)
net
|
C |
|
|
11376 |
690d |
904d
|
22/25 |
690d |
144748eb0c44
bpf, sockmap: Fix incorrect fwd_alloc accounting
|
linux-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb
net
virt
|
|
|
|
5 |
893d |
894d
|
22/25 |
690d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
BUG: MAX_LOCKDEP_CHAINS too low! (2)
net
|
C |
error |
|
84838 |
690d |
1166d
|
22/25 |
690d |
5dc33592e955
lockdep: Allow tuning tracing capacity constants.
|
memory leak in cfserl_create
net
|
C |
|
|
13 |
1409d |
1578d
|
22/25 |
690d |
b53558a950a8
net: caif: fix memory leak in caif_device_notify
|
UBSAN: shift-out-of-bounds in red_adaptative_timer (2)
net
|
|
|
|
28 |
919d |
935d
|
22/25 |
690d |
e323d865b361
net: sched: validate stab values
|
memory leak in radix_tree_insert
arm-msm
net
|
C |
|
|
1 |
915d |
914d
|
22/25 |
690d |
8a03dd925786
net: qrtr: Fix memory leak on qrtr_tx_wait failure
|
KASAN: use-after-free Read in nfc_llcp_put_ssap
net
nfc
|
syz |
done |
|
4 |
875d |
883d
|
22/25 |
690d |
c61760e6940d
net/nfc: fix use-after-free llcp_sock_bind/connect
|
WARNING: suspicious RCU usage in tcp_bpf_update_proto
bpf
net
|
C |
done |
|
539 |
888d |
908d
|
22/25 |
690d |
51e0158a5432
skmsg: Pass psock pointer to ->psock_update_sk_prot()
|
KCSAN: data-race in __ip4_datagram_connect / skb_set_owner_w (2)
net
|
|
|
|
1 |
855d |
842d
|
22/25 |
690d |
b71eaed8c04f
inet: annotate date races around sk->sk_txhash
|
WARNING: suspicious RCU usage in __copy_msghdr_from_user
net
|
|
|
|
1 |
856d |
856d
|
22/25 |
690d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
BUG: MAX_STACK_TRACE_ENTRIES too low! (3)
net
|
|
|
|
2 |
893d |
894d
|
22/25 |
690d |
5dc33592e955
lockdep: Allow tuning tracing capacity constants.
|
BUG: sleeping function called from invalid context in __ipv6_dev_mc_dec
net
|
C |
done |
|
21 |
823d |
880d
|
22/25 |
690d |
a100243d95a6
rtnetlink: avoid RCU read lock when holding RTNL
|
WARNING: refcount bug in in_dev_finish_destroy
net
|
C |
unreliable |
|
463 |
690d |
918d
|
22/25 |
690d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
KMSAN: uninit-value in validate_beacon_head
wireless
net
|
C |
|
|
284 |
809d |
1036d
|
22/25 |
690d |
9a6847ba1747
nl80211: fix beacon head validation
|
WARNING in macvlan_process_broadcast
net
|
|
|
|
32053 |
690d |
935d
|
22/25 |
690d |
dd4fa1dae9f4
macvlan: macvlan_count_rx() needs to be aware of preemption
|
WARNING: suspicious RCU usage in vxlan_xmit
net
|
C |
error |
|
1 |
832d |
832d
|
22/25 |
690d |
85e8b032d6eb
vxlan: add missing rcu_read_lock() in neigh_reduce()
|
linux-next boot error: WARNING: refcount bug in fib_create_info
net
|
|
|
|
3 |
789d |
789d
|
22/25 |
690d |
28814cd18cd7
ipv4: Fix refcount warning for new fib_info
|
possible deadlock in br_ioctl_call
net
|
C |
unreliable |
|
4161 |
781d |
790d
|
22/25 |
690d |
893b19587534
net: bridge: fix ioctl locking
|
BUG: sleeping function called from invalid context in _copy_to_iter
net
|
C |
done |
|
60 |
776d |
783d
|
22/25 |
690d |
876c14ad014d
af_unix: fix holding spinlock in oob handling
|
UBSAN: array-index-out-of-bounds in taprio_change
net
|
|
|
|
2 |
773d |
782d
|
22/25 |
690d |
efe487fce306
fix array-index-out-of-bounds in taprio_change
|
memory leak in tcindex_set_parms
net
|
C |
|
|
94 |
849d |
1334d
|
22/25 |
690d |
f5051bcece50
net: sched: fix memory leak in tcindex_partial_destroy_work
|
general protection fault in sock_from_file
net
io-uring
|
C |
inconclusive |
|
78 |
754d |
761d
|
22/25 |
690d |
c6d3d9cbd659
io_uring: fix queueing half-created requests
|
KCSAN: data-race in __skb_try_recv_datagram / sock_setsockopt
net
|
|
|
|
1 |
824d |
824d
|
22/25 |
690d |
0dbffbb5335a
net: annotate data race around sk_ll_usec
|
WARNING: ODEBUG bug in net_dm_cmd_trace
net
|
syz |
unreliable |
|
2 |
941d |
937d
|
22/25 |
690d |
9398e9c0b1d4
drop_monitor: Perform cleanup upon probe registration failure
|
net-next boot error: WARNING: refcount bug in fib_create_info
net
|
|
|
|
39 |
789d |
788d
|
22/25 |
690d |
28814cd18cd7
ipv4: Fix refcount warning for new fib_info
|
UBSAN: shift-out-of-bounds in gred_enqueue
net
|
|
|
|
1 |
928d |
928d
|
22/25 |
690d |
e323d865b361
net: sched: validate stab values
|
WARNING in xfrm_alloc_compat (2)
net
|
C |
done |
|
47 |
905d |
915d
|
22/25 |
690d |
ef19e111337f
xfrm/compat: Cleanup WARN()s that can be user-triggered
|
KMSAN: uninit-value in caif_seqpkt_sendmsg
net
|
C |
|
|
2365 |
737d |
1153d
|
22/25 |
690d |
991e634360f2
net: fix uninit-value in caif_seqpkt_sendmsg
|
memory leak in mrp_request_join
net
|
C |
|
|
215 |
830d |
1348d
|
22/25 |
690d |
996af62167d0
net/802/mrp: fix memleak in mrp_request_join()
|
net-next boot error: KASAN: slab-out-of-bounds Read in page_to_skb
net
virt
|
|
|
|
15 |
893d |
896d
|
22/25 |
690d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
general protection fault in bond_ipsec_add_sa (2)
net
|
|
|
|
1 |
817d |
817d
|
22/25 |
690d |
105cd17a8660
bonding: fix null dereference in bond_ipsec_add_sa()
|
memory leak in tcp_cdg_init
net
|
syz |
|
|
6 |
855d |
994d
|
22/25 |
690d |
be5d1b61a2ad
tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
|
WARNING: refcount bug in sk_psock_get
net
|
C |
done |
|
8 |
877d |
904d
|
22/25 |
690d |
8621436671f3
smc: disallow TCP_ULP in smc_setsockopt()
|
net-next boot error: KASAN: use-after-free Read in page_to_skb
virt
net
|
|
|
|
11 |
893d |
896d
|
22/25 |
690d |
af39c8f72301
virtio-net: fix use-after-free in page_to_skb()
|
WARNING: refcount bug in ipip6_tunnel_uninit
net
|
C |
done |
|
199 |
912d |
918d
|
22/25 |
690d |
6289a98f0817
sit: proper dev_{hold|put} in ndo_[un]init methods
|
WARNING: refcount bug in register_netdevice
net
|
C |
unreliable |
|
97 |
911d |
918d
|
22/25 |
690d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
WARNING: refcount bug in ip6erspan_tunnel_uninit
net
|
C |
error |
|
11 |
915d |
917d
|
22/25 |
690d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
UBSAN: shift-out-of-bounds in xfrm_set_default
net
|
C |
unreliable |
|
79 |
785d |
795d
|
22/25 |
690d |
5d8dbb7fb82b
net: xfrm: fix shift-out-of-bounce
|
possible deadlock in cfg80211_netdev_notifier_call (2)
net
wireless
|
|
|
|
2 |
862d |
873d
|
22/25 |
690d |
d5befb224edb
mac80211: fix deadlock in AP/VLAN handling
|
KMSAN: kernel-infoleak in _copy_to_iter (5)
net
|
C |
|
|
23883 |
799d |
1235d
|
22/25 |
690d |
08c27f3322fe
batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field
|
WARNING: locking bug in l2tp_xmit_skb
net
|
|
|
|
1 |
880d |
880d
|
22/25 |
690d |
69e16d01d1de
net: fix a concurrency bug in l2tp_tunnel_register()
|
KMSAN: uninit-value in __dev_mc_add
net
|
C |
|
|
213 |
1634d |
1830d
|
22/25 |
690d |
cca8ea3b05c9
net: tun: set tun->dev->addr_len during TUNSETLINK processing
|
memory leak in kcm_sendmsg
net
|
C |
|
|
2 |
1186d |
1325d
|
22/25 |
690d |
c47cc304990a
net: kcm: fix memory leak in kcm_sendmsg
|
UBSAN: shift-out-of-bounds in qdisc_get_rtab
net
|
C |
unreliable |
done |
521 |
983d |
1027d
|
22/25 |
837d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
possible deadlock in cfg80211_netdev_notifier_call
net
wireless
|
syz |
done |
|
13 |
906d |
972d
|
22/25 |
904d |
40c575d1ec71
cfg80211: fix netdev registration deadlock
|
memory leak in qrtr_tun_open
arm-msm
net
|
C |
|
|
4 |
996d |
1040d
|
22/25 |
904d |
fc0494ead639
net: qrtr: Fix memory leak in qrtr_tun_open
|
KASAN: null-ptr-deref Read in tcf_idrinfo_destroy
net
|
C |
|
|
115 |
907d |
1098d
|
22/25 |
904d |
396d7f23adf9
net: sched: fix police ext initialization
|
INFO: task hung in tcf_action_init_1
net
|
C |
done |
|
30 |
964d |
1098d
|
22/25 |
904d |
d349f9976868
net_sched: fix RTNL deadlock again caused by request_module()
|
KASAN: slab-out-of-bounds Read in skb_segment
net
|
C |
error |
|
311 |
983d |
986d
|
22/25 |
904d |
00b229f762b0
net: fix GSO for SG-enabled devices
|
upstream test error: INFO: trying to register non-static key in nsim_get_stats64
net
|
|
|
|
381 |
935d |
977d
|
22/25 |
904d |
863a42b289c2
netdevsim: init u64 stats for 32bit hardware
|
INFO: task can't die in connmark_exit_net
net
|
syz |
error |
|
1 |
1027d |
1023d
|
22/25 |
904d |
d349f9976868
net_sched: fix RTNL deadlock again caused by request_module()
|
linux-next test error: possible deadlock in cfg80211_netdev_notifier_call
net
wireless
|
|
|
|
6 |
976d |
976d
|
22/25 |
904d |
38ec7c6b6bd6
virt_wifi: fix deadlock on RTNL
|
WARNING in __alloc_skb
arm-msm
net
|
C |
error |
|
24 |
935d |
947d
|
22/25 |
904d |
093b036aa94e
net/qrtr: fix __netdev_alloc_skb call
|
WARNING in cfg80211_change_iface
net
wireless
|
C |
inconclusive |
|
4 |
971d |
975d
|
22/25 |
904d |
bae173563cbf
wext: call cfg80211_change_iface() with wiphy lock held
|
WARNING in sk_stream_kill_queues (5)
net
|
C |
done |
|
4684 |
904d |
1035d
|
22/25 |
904d |
097b9146c0e2
net: fix up truesize of cloned skb in skb_prepare_for_shift()
|
WARNING in cfg80211_dev_rename
net
wireless
|
C |
inconclusive |
|
22 |
970d |
975d
|
22/25 |
904d |
0391a45c8007
nl80211: call cfg80211_dev_rename() under RTNL
|
WARNING in _cfg80211_unregister_wdev
net
wireless
|
C |
inconclusive |
|
48 |
969d |
975d
|
22/25 |
904d |
776a39b8196d
cfg80211: call cfg80211_destroy_ifaces() with wiphy lock held
|
WARNING in dst_release
net
|
syz |
done |
|
2 |
956d |
955d
|
22/25 |
904d |
e0be4931f3fe
mptcp: reset last_snd on subflow close
|
KASAN: use-after-free Read in skb_segment
net
|
C |
error |
|
55 |
983d |
986d
|
22/25 |
904d |
00b229f762b0
net: fix GSO for SG-enabled devices
|
UBSAN: shift-out-of-bounds in tcf_police_init
net
|
C |
unreliable |
|
8 |
984d |
1021d
|
22/25 |
934d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
UBSAN: shift-out-of-bounds in est_timer
net
|
C |
unreliable |
|
73 |
943d |
1018d
|
22/25 |
934d |
dd5e073381f2
net_sched: gen_estimator: support large ewma log
|
memory leak in xskq_create
bpf
net
|
C |
|
|
7 |
1001d |
1021d
|
21/25 |
935d |
8bee68338408
xsk: Fix memory leak for failed bind
|
BUG: sleeping function called from invalid context in corrupted
net
wireless
|
syz |
done |
|
18 |
1031d |
1055d
|
21/25 |
935d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
UBSAN: shift-out-of-bounds in __detect_linklayer
net
|
C |
unreliable |
done |
31 |
983d |
989d
|
21/25 |
935d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
UBSAN: shift-out-of-bounds in tcindex_set_parms
net
|
C |
unreliable |
done |
45 |
983d |
1018d
|
21/25 |
935d |
bcd0cf19ef82
net_sched: avoid shift-out-of-bounds in tcindex_set_parms()
|
general protection fault in taprio_dequeue_soft
net
|
C |
done |
|
2 |
1020d |
1020d
|
21/25 |
935d |
44d4775ca518
net/sched: sch_taprio: reset child qdiscs before freeing them
|
bpf test error: BUG: sleeping function called from invalid context in sta_info_move_state
net
wireless
|
|
|
|
6 |
1045d |
1051d
|
21/25 |
935d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
KASAN: null-ptr-deref Write in rhashtable_free_and_destroy
net
wireless
|
|
|
|
11 |
954d |
1031d
|
21/25 |
935d |
905b2032fa42
mac80211: mesh: fix mesh_pathtbl_init() error path
|
kernel BUG at net/core/dev.c:NUM!
net
|
C |
done |
|
35 |
989d |
990d
|
21/25 |
935d |
47e4bb147a96
net: sit: unregister_netdevice on newlink's error path
|
KASAN: global-out-of-bounds Read in smc_nl_get_sys_info
s390
net
|
C |
error |
|
27 |
987d |
1014d
|
21/25 |
935d |
25fe2c9c4cd2
smc: fix out of bound access in smc_nl_get_sys_info()
|
KASAN: use-after-free Read in decode_session6
net
|
C |
done |
|
152 |
981d |
1189d
|
21/25 |
935d |
0356010d825e
sctp: bring inet(6)_skb_parm back to sctp_input_cb
|
divide error in __tcp_select_window
net
|
C |
done |
|
1119 |
1038d |
1044d
|
21/25 |
935d |
fd8976790a6c
mptcp: be careful on MPTCP-level ack.
|
KMSAN: uninit-value in INET_ECN_decapsulate
net
|
|
|
|
3 |
1002d |
1034d
|
21/25 |
935d |
4179b00c04d1
geneve: pull IP header before ECN decapsulation
|
UBSAN: shift-out-of-bounds in choke_enqueue
net
|
C |
inconclusive |
|
3853 |
935d |
1027d
|
21/25 |
935d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
WARNING: suspicious RCU usage in get_wiphy_regdom
net
wireless
|
C |
done |
|
5031 |
986d |
1018d
|
21/25 |
935d |
51d62f2f2c50
cfg80211: Save the regulatory domain with a lock
|
WARNING: suspicious RCU usage in tcp_disconnect
net
|
C |
done |
|
25 |
989d |
991d
|
21/25 |
935d |
13a9499e8333
mptcp: fix locking in mptcp_disconnect()
|
KMSAN: uninit-value in __nla_validate_parse (2)
net
|
C |
|
|
2 |
996d |
992d
|
21/25 |
935d |
c96adff95619
cls_flower: call nla_ok() before nla_next()
|
general protection fault in xsk_recvmsg
bpf
net
|
C |
done |
unreliable |
1800 |
1020d |
989d
|
21/25 |
935d |
3546b9b8eced
xsk: Validate socket state in xsk_recvmsg, prior touching socket members
|
UBSAN: shift-out-of-bounds in sfq_init
net
|
C |
unreliable |
|
8 |
998d |
1012d
|
21/25 |
935d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KMSAN: uninit-value in gre_parse_header
net
|
C |
|
|
9283 |
963d |
1560d
|
21/25 |
935d |
085c7c4e1c0e
erspan: fix version 1 check in gre_parse_header()
|
UBSAN: shift-out-of-bounds in red_adaptative_timer
net
|
C |
unreliable |
|
260 |
935d |
1027d
|
21/25 |
935d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KASAN: slab-out-of-bounds Write in xfrm_attr_cpy32
net
|
C |
done |
|
106 |
1025d |
1073d
|
21/25 |
935d |
d1949d045fd6
xfrm/compat: memset(0) 64-bit padding at right place
|
UBSAN: shift-out-of-bounds in __red_change
net
|
C |
unreliable |
|
24 |
938d |
1026d
|
21/25 |
935d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KASAN: use-after-free Read in rxrpc_get_skb
afs
net
|
|
|
|
1 |
983d |
979d
|
21/25 |
935d |
7b5eab57cac4
rxrpc: Fix clearance of Tx/Rx ring when releasing a call
|
upstream test error: BUG: sleeping function called from invalid context in sta_info_move_state
net
wireless
|
|
|
|
53 |
1045d |
1054d
|
21/25 |
935d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
UBSAN: shift-out-of-bounds in gred_change
net
|
C |
unreliable |
|
5 |
948d |
1003d
|
21/25 |
935d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
linux-next test error: BUG: sleeping function called from invalid context in sta_info_move_state
net
wireless
|
|
|
|
3 |
1055d |
1059d
|
21/25 |
935d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
net test error: BUG: sleeping function called from invalid context in sta_info_move_state
net
wireless
|
|
|
|
4 |
1052d |
1059d
|
21/25 |
935d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
KASAN: slab-out-of-bounds Read in smc_nl_handle_smcr_dev
s390
net
|
|
|
|
1 |
1018d |
1014d
|
21/25 |
935d |
995433b795ce
net/smc: fix access to parent of an ib device
|
net-next test error: BUG: sleeping function called from invalid context in sta_info_move_state
net
wireless
|
|
|
|
12 |
1045d |
1054d
|
21/25 |
935d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
memory leak in rxrpc_lookup_local
afs
net
|
C |
|
|
1415 |
975d |
1439d
|
21/25 |
935d |
b8323f7288ab
rxrpc: Fix memory leak in rxrpc_lookup_local
|
WARNING: suspicious RCU usage in wiphy_apply_custom_regulatory
net
wireless
|
C |
done |
|
28 |
1018d |
1015d
|
21/25 |
935d |
51d62f2f2c50
cfg80211: Save the regulatory domain with a lock
|
WARNING in xfrm_alloc_compat
net
|
C |
done |
|
130 |
947d |
1069d
|
21/25 |
935d |
dbd7ae5154d5
xfrm/compat: Translate by copying XFRMA_UNSPEC attribute
|
UBSAN: shift-out-of-bounds in red_enqueue
net
|
C |
unreliable |
|
4906 |
935d |
1027d
|
21/25 |
935d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
KMSAN: kernel-infoleak in move_addr_to_user (4)
net
|
C |
|
|
59 |
942d |
994d
|
21/25 |
935d |
b42b3a2744b3
can: isotp: isotp_getname(): fix kernel information leak
|
WARNING in rhashtable_free_and_destroy
net
wireless
|
C |
error |
|
3 |
1031d |
1124d
|
21/25 |
935d |
905b2032fa42
mac80211: mesh: fix mesh_pathtbl_init() error path
|
BUG: sleeping function called from invalid context in sta_info_move_state
net
wireless
|
C |
done |
|
39248 |
1030d |
1061d
|
21/25 |
935d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
UBSAN: shift-out-of-bounds in strset_parse_request
net
|
C |
done |
|
16 |
998d |
1021d
|
21/25 |
935d |
efb796f5571f
ethtool: fix string set id check
|
UBSAN: shift-out-of-bounds in cbq_dequeue
net
|
C |
unreliable |
|
27 |
983d |
1027d
|
21/25 |
935d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
bpf-next test error: BUG: sleeping function called from invalid context in sta_info_move_state
net
wireless
|
|
|
|
13 |
1030d |
1050d
|
21/25 |
935d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
BUG: unable to handle kernel paging request in smc_nl_handle_smcr_dev
net
s390
|
C |
|
|
16 |
1004d |
1026d
|
21/25 |
935d |
995433b795ce
net/smc: fix access to parent of an ib device
|
KASAN: stack-out-of-bounds Write in bitmap_from_arr32
net
|
C |
done |
|
2 |
1038d |
1034d
|
21/25 |
935d |
a770bf515613
ethtool: fix stack overflow in ethnl_parse_bitset()
|
UBSAN: array-index-out-of-bounds in ieee80211_del_key (2)
net
wireless
|
C |
error |
|
3 |
1026d |
1034d
|
21/25 |
935d |
2d9463083ce9
nl80211: validate key indexes for cfg80211_registered_device
|
KASAN: use-after-free Read in rxrpc_send_data_packet
afs
net
|
|
|
|
1 |
977d |
972d
|
21/25 |
935d |
7b5eab57cac4
rxrpc: Fix clearance of Tx/Rx ring when releasing a call
|
KASAN: use-after-free Read in dump_schedule
net
|
C |
done |
done |
7 |
1011d |
1122d
|
21/25 |
935d |
cc00bcaa5899
netfilter: x_tables: Switch synchronization to RCU
|
KASAN: invalid-free in p9_client_create (2)
v9fs
net
|
C |
done |
|
3 |
976d |
976d
|
21/25 |
935d |
757fed1d0898
Revert "mm/slub: fix a memory leak in sysfs_slab_add()"
|
general protection fault in wext_handle_ioctl
net
wireless
|
C |
inconclusive |
|
9 |
978d |
1067d
|
21/25 |
935d |
5122565188ba
wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
|
KASAN: use-after-free Read in eth_type_trans
net
|
C |
done |
error |
3 |
1235d |
1377d
|
17/25 |
1011d |
96aa1b22bd6b
tun: correct header offsets in napi frags mode
|
BUG: MAX_LOCKDEP_KEYS too low!
net
|
C |
done |
error |
3496 |
1191d |
1435d
|
17/25 |
1025d |
1a33e10e4a95
net: partially revert dynamic lockdep key changes
|
memory leak in ieee80211_check_fast_xmit
net
wireless
|
C |
|
|
983 |
1058d |
1102d
|
17/25 |
1048d |
dcd479e10a05
mac80211: always wind down STA state
|
general protection fault in xsk_release
bpf
net
|
C |
done |
|
2 |
1101d |
1100d
|
17/25 |
1048d |
1fd17c8cd0aa
xsk: Fix possible crash in socket_release when out-of-memory
|
WARNING in ieee80211_s1g_channel_width
net
wireless
|
C |
done |
|
3 |
1091d |
1091d
|
17/25 |
1048d |
c1cd35c60601
cfg80211: only allow S1G channels on S1G band
|
KMSAN: uninit-value in ieee80211_skb_resize
net
wireless
|
C |
|
|
5 |
1077d |
1102d
|
17/25 |
1048d |
14f46c1e5108
mac80211: fix use of skb payload instead of header
|
KASAN: use-after-free Write in tcindex_change
net
|
C |
done |
done |
4 |
1291d |
1292d
|
17/25 |
1048d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
possible deadlock in cleanup_net
net
|
C |
done |
|
281 |
1117d |
1125d
|
17/25 |
1048d |
d966ddcc3821
tipc: fix a deadlock when flushing scheduled work
|
KMSAN: uninit-value in ip_tunnel_xmit (2)
net
|
C |
|
|
11778 |
1052d |
1877d
|
17/25 |
1048d |
fdafed459998
ip_gre: set dev->hard_header_len and dev->needed_headroom properly
|
WARNING: refcount bug in p9_req_put
net
v9fs
|
syz |
inconclusive |
done |
6 |
1228d |
1780d
|
17/25 |
1048d |
a39c46067c84
net/9p: validate fds in p9_fd_open
|
INFO: rcu detected stall in ip_list_rcv
net
|
C |
error |
done |
3 |
1096d |
1122d
|
17/25 |
1048d |
1d0e850a49a5
afs: Fix cell removal
|
general protection fault in tcf_generic_walker
net
|
syz |
|
|
9 |
1095d |
1098d
|
17/25 |
1048d |
580e4273d7a8
net_sched: check error pointer in tcf_dump_walker()
|
KMSAN: uninit-value in unix_find_other
net
|
C |
|
|
57 |
1093d |
1910d
|
17/25 |
1048d |
7ca1db21ef8e
net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
|
INFO: task hung in ctrl_getfamily
net
|
syz |
done |
done |
22 |
1142d |
1755d
|
17/25 |
1048d |
47733f9daf4f
tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
|
WARNING: suspicious RCU usage in qrtr_ns_worker
arm-msm
net
|
C |
done |
|
1 |
1130d |
1193d
|
17/25 |
1048d |
a7809ff90ce6
net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
|
WARNING in rxrpc_recvmsg
afs
net
|
C |
error |
done |
5 |
1184d |
1184d
|
17/25 |
1048d |
65550098c1c4
rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
|
KASAN: use-after-free Read in tcf_action_init
net
|
C |
done |
|
1 |
1100d |
1098d
|
17/25 |
1048d |
0fedc63fadf0
net_sched: commit action insertions together
|
KASAN: slab-out-of-bounds Read in strset_parse_request
net
|
C |
error |
|
141 |
1087d |
1087d
|
17/25 |
1048d |
db972e532518
ethtool: strset: allow ETHTOOL_A_STRSET_COUNTS_ONLY attr
|
KASAN: stack-out-of-bounds Read in xfrm_selector_match (2)
net
|
|
|
|
1 |
1106d |
1104d
|
17/25 |
1048d |
e94ee171349d
xfrm: Use correct address family in xfrm_state_find
|
BUG: unable to handle kernel paging request in tcf_action_dump_terse
net
|
C |
done |
|
15 |
1092d |
1098d
|
17/25 |
1048d |
580e4273d7a8
net_sched: check error pointer in tcf_dump_walker()
|
INFO: task hung in lock_sock_nested (3)
net
|
C |
done |
|
5 |
1092d |
1093d
|
17/25 |
1048d |
d9fb8c507d42
mptcp: fix infinite loop on recvmsg()/worker() race.
|
general protection fault in ieee80211_key_free
net
wireless
|
C |
done |
|
3 |
1084d |
1089d
|
17/25 |
1048d |
3dc289f8f139
net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key()
|
kernel BUG at net/rxrpc/conn_object.c:LINE!
afs
net
|
C |
done |
|
855 |
1051d |
1116d
|
17/25 |
1048d |
546a42410bf7
rxrpc: Fix conn bundle leak in net-namespace exit
|
possible deadlock in dev_uc_sync
net
|
C |
done |
|
3 |
1084d |
1181d
|
17/25 |
1048d |
0e8b8d6a2d85
net: core: use list_del_init() instead of list_del() in netdev_run_todo()
|
general protection fault in rt6_fill_node
net
|
C |
done |
done |
3 |
1133d |
1130d
|
17/25 |
1048d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
memory leak in __team_options_register
net
|
C |
|
|
1 |
1118d |
1118d
|
17/25 |
1048d |
9a9e77495958
net: team: fix memory leak in __team_options_register
|
general protection fault in nexthop_is_blackhole
net
|
C |
done |
done |
1 |
1133d |
1130d
|
17/25 |
1048d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
UBSAN: array-index-out-of-bounds in ieee80211_del_key
net
wireless
|
C |
done |
|
685 |
1058d |
1102d
|
17/25 |
1048d |
3dc289f8f139
net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key()
|
KASAN: use-after-free Write in xp_put_pool
bpf
net
|
C |
done |
|
50 |
1101d |
1124d
|
17/25 |
1048d |
83cf5c68d663
xsk: Fix use-after-free in failed shared_umem bind
|
WARNING in nla_get_range_unsigned
net
|
C |
done |
|
63 |
1124d |
1125d
|
17/25 |
1048d |
c30a3c957c88
netlink: policy: correct validation type check
|
general protection fault in xsk_is_setup_for_bpf_map
net
bpf
|
C |
error |
|
294 |
1101d |
1124d
|
17/25 |
1048d |
968be23ceaca
xsk: Fix possible segfault at xskmap entry insertion
|
inconsistent lock state in icmp_send
net
|
syz |
done |
done |
1 |
1256d |
1753d
|
17/25 |
1048d |
1378817486d6
tipc: block BH before using dst_cache
|
INFO: task can't die in rtnetlink_rcv_msg
net
|
|
|
|
5 |
1088d |
1097d
|
17/25 |
1048d |
0fedc63fadf0
net_sched: commit action insertions together
|
KASAN: use-after-free Write in rxrpc_put_bundle
afs
net
|
C |
done |
|
229 |
1086d |
1110d
|
17/25 |
1048d |
f3af4ad1e08a
rxrpc: Fix bundle counting for exclusive connections
|
KASAN: use-after-free Read in tcf_action_destroy
net
|
C |
done |
|
8 |
1090d |
1105d
|
17/25 |
1048d |
0fedc63fadf0
net_sched: commit action insertions together
|
memory leak in xdp_umem_create
bpf
net
|
C |
|
|
17 |
1052d |
1072d
|
17/25 |
1048d |
e5e1a4bc916d
xsk: Fix possible memory leak at socket close
|
general protection fault in xsk_diag_dump (2)
bpf
net
|
C |
|
|
354 |
1105d |
1124d
|
17/25 |
1048d |
53ea2076d851
xsk: Fix possible segfault in xsk umem diagnostics
|
general protection fault in tcf_action_destroy (2)
net
|
C |
done |
done |
29 |
1086d |
1299d
|
17/25 |
1048d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
WARNING: suspicious RCU usage in ctrl_cmd_new_lookup
arm-msm
net
|
C |
done |
done |
10 |
1104d |
1193d
|
17/25 |
1048d |
a7809ff90ce6
net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
|
WARNING: suspicious RCU usage in fib6_del (2)
net
|
|
|
|
1 |
1118d |
1118d
|
17/25 |
1086d |
843d926b003e
ipv6: avoid lockdep issue in fib6_del()
|
KASAN: use-after-free Write in skb_queue_tail
arm-msm
net
|
|
|
|
1 |
1117d |
1117d
|
17/25 |
1086d |
3ca1a42a52ca
net: qrtr: check skb_put_padto() return value
|
possible deadlock in peernet2id_alloc
net
|
|
|
|
12 |
1117d |
1289d
|
17/25 |
1086d |
e1f469cd5866
Revert "netns: don't disable BHs when locking "nsid_lock""
|
KMSAN: uninit-value in __inet_diag_dump
net
|
C |
|
|
37 |
1087d |
1105d
|
17/25 |
1086d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
INFO: task hung in tcf_ife_init
net
|
C |
done |
|
4 |
1118d |
1123d
|
17/25 |
1086d |
cc8e58f8325c
act_ife: load meta modules before tcf_idr_check_alloc()
|
KMSAN: uninit-value in inet_diag_cmd_exact
net
|
C |
|
|
31 |
1087d |
1099d
|
17/25 |
1086d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
general protection fault in free_netdev
net
|
C |
error |
done |
3605 |
1162d |
1196d
|
17/25 |
1094d |
46ef5b89ec0e
ip6_gre: fix null-ptr-deref in ip6gre_init_net()
|
KMSAN: kernel-infoleak in move_addr_to_user (3)
net
|
C |
|
|
79 |
1109d |
1143d
|
17/25 |
1098d |
38ba8b9241f5
can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
|
WARNING: refcount bug in red_destroy
net
|
C |
done |
|
1 |
1132d |
1130d
|
17/25 |
1101d |
5438dd45831e
net_sched: fix error path in red_init()
|
WARNING: refcount bug in smc_release (3)
s390
net
|
|
|
|
1 |
1129d |
1118d
|
17/25 |
1101d |
5fb8642a17aa
net/smc: fix sock refcounting in case of termination
|
WARNING: refcount bug in qdisc_put (2)
net
|
C |
done |
|
7 |
1131d |
1130d
|
17/25 |
1101d |
5438dd45831e
net_sched: fix error path in red_init()
|
KASAN: use-after-free Write in __linkwatch_run_queue
net
|
C |
error |
|
24 |
1164d |
1165d
|
17/25 |
1109d |
c75d1d5248c0
bonding: check return value of register_netdevice() in bond_newlink()
|
KASAN: use-after-free Read in sock_def_write_space (2)
net
arm-msm
|
C |
error |
|
29 |
1110d |
1167d
|
17/25 |
1109d |
af9f691f0f5b
qrtr: orphan socket in qrtr_release()
|
kernel BUG at net/rxrpc/recvmsg.c:LINE!
afs
net
|
C |
error |
|
10 |
1156d |
1184d
|
17/25 |
1109d |
65550098c1c4
rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
|
WARNING in idr_alloc
arm-msm
net
|
C |
done |
|
65 |
1118d |
1193d
|
17/25 |
1109d |
8dfddfb79653
net: qrtr: fix usage of idr in port assignment to socket
|
general protection fault in fib_dump_info (2)
net
|
C |
done |
|
16 |
1133d |
1135d
|
17/25 |
1109d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
KMSAN: uninit-value in netlink_policy_dump_start
net
|
C |
|
|
31 |
1114d |
1118d
|
17/25 |
1109d |
d1fb55592909
netlink: fix state reallocation in policy export
|
KASAN: use-after-free Read in devlink_health_reporter_destroy
net
|
C |
error |
|
1188 |
1173d |
1174d
|
17/25 |
1109d |
5d037b4d3df7
devlink: Fix use-after-free when destroying health reporters
|
kernel BUG at net/core/dev.c:LINE! (3)
net
|
C |
done |
|
979 |
1124d |
1268d
|
17/25 |
1109d |
832707021666
bonding: fix a potential double-unregister
|
general protection fault in vsock_poll
net
virt
|
syz |
done |
|
15 |
1154d |
1166d
|
17/25 |
1109d |
1980c0584483
vsock: fix potential null pointer dereference in vsock_poll()
|
BUG: corrupted list in p9_read_work (2)
net
v9fs
|
syz |
done |
error |
38 |
1411d |
1773d
|
17/25 |
1109d |
74d6a5d56629
9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work
|
KMSAN: uninit-value in geneve_xmit
net
|
C |
|
|
163 |
1113d |
1166d
|
17/25 |
1109d |
32818c075c54
geneve: fix an uninitialized value in geneve_changelink()
|
KASAN: wild-memory-access Read in rawv6_setsockopt
net
|
|
|
|
2 |
1150d |
1150d
|
17/25 |
1109d |
519a8a6cf91d
net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
|
KASAN: use-after-free Read in __xfrm6_tunnel_spi_lookup
net
|
C |
error |
|
12 |
1167d |
1172d
|
17/25 |
1109d |
8b404f46dd6a
xfrm: interface: not xfrmi_ipv6/ipip_handler twice
|
INFO: trying to register non-static key in red_destroy
net
|
C |
error |
|
318 |
1161d |
1182d
|
17/25 |
1109d |
608b4adab178
net_sched: initialize timer earlier in red_init()
|
KASAN: wild-memory-access Read in ip_setsockopt
net
|
C |
|
|
2 |
1143d |
1143d
|
17/25 |
1109d |
519a8a6cf91d
net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
|
WARNING: suspicious RCU usage in bond_ipsec_add_sa
net
|
|
|
|
214 |
1110d |
1181d
|
17/25 |
1109d |
f548a476268d
bonding: don't need RTNL for ipsec helpers
|
possible deadlock in dev_mc_unsync
net
|
C |
error |
done |
78 |
1176d |
1191d
|
17/25 |
1138d |
be74294ffa24
net: get rid of lockdep_set_class_and_subclass()
|
WARNING: locking bug in try_to_grab_pending
net
|
syz |
error |
done |
1 |
1228d |
1690d
|
17/25 |
1138d |
1378817486d6
tipc: block BH before using dst_cache
|
general protection fault in qrtr_endpoint_post
arm-msm
net
|
C |
done |
done |
54 |
1176d |
1194d
|
17/25 |
1145d |
8ff41cc21714
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
|
WARNING in xfrm_policy_insert
net
|
C |
inconclusive |
done |
6 |
1202d |
2055d
|
17/25 |
1159d |
ed17b8d377ea
xfrm: fix a warning in xfrm_policy_insert_list
|
KASAN: use-after-free Read in sock_def_write_space
arm-msm
net
|
C |
done |
|
67 |
1168d |
1533d
|
17/25 |
1168d |
a9b111016235
llc: make sure applications use ARPHRD_ETHER
|
KASAN: slab-out-of-bounds Read in qrtr_endpoint_post
arm-msm
net
|
C |
|
|
8 |
1190d |
1191d
|
17/25 |
1168d |
8ff41cc21714
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
|
memory leak in qdisc_create_dflt
net
|
C |
|
|
1 |
1187d |
1183d
|
17/25 |
1168d |
306381aec7c2
net_sched: fix a memory leak in atm_tc_init()
|
WARNING in hsr_dev_finalize
net
|
C |
error |
|
1546 |
1176d |
1191d
|
17/25 |
1168d |
ccfc9df1352b
hsr: fix interface leak in error path of hsr_dev_finalize()
|
kernel BUG at net/l2tp/l2tp_core.c:LINE!
net
|
C |
|
|
10 |
1192d |
1188d
|
17/25 |
1168d |
c9a368f1c0fb
bpf: net: Avoid incorrect bpf_sk_reuseport_detach call
|
possible deadlock in dev_uc_sync_multiple (2)
net
|
|
|
|
26 |
1178d |
1189d
|
17/25 |
1168d |
be74294ffa24
net: get rid of lockdep_set_class_and_subclass()
|
KASAN: use-after-free Read in devlink_get_from_attrs
net
|
C |
|
|
25 |
1176d |
1188d
|
17/25 |
1168d |
bf64ff4c2aac
genetlink: get rid of family->attrbuf
|
KASAN: use-after-free Read in ip_icmp_error
net
|
C |
done |
|
14 |
1222d |
1222d
|
17/25 |
1170d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
KASAN: slab-out-of-bounds Read in ip_icmp_error
net
|
C |
done |
|
13 |
1222d |
1222d
|
17/25 |
1170d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
WARNING: proc registration bug in snmp6_register_dev
net
|
C |
done |
|
14 |
1198d |
1264d
|
17/25 |
1170d |
de0083c7ed7d
hsr: avoid to create proc file after unregister
|
KASAN: use-after-free Read in inet_diag_bc_sk
net
|
C |
done |
|
30 |
1245d |
1247d
|
17/25 |
1170d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
linux-next boot error: WARNING: suspicious RCU usage in ipmr_get_table
net
|
|
|
|
60 |
1242d |
1251d
|
17/25 |
1170d |
7013908c2db2
ipmr: Add lockdep expression to ipmr_for_each_table macro
|
BUG: unable to handle kernel NULL pointer dereference in dev_ifconf
net
|
|
|
|
1 |
1201d |
1201d
|
17/25 |
1170d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: using smp_processor_id() in preemptible [ADDR] code: /NUM
net
|
|
|
|
1 |
1228d |
1228d
|
17/25 |
1170d |
1378817486d6
tipc: block BH before using dst_cache
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (3)
net
|
|
|
|
1 |
1220d |
1220d
|
17/25 |
1170d |
d9a81a225277
l2tp: add sk_family checks to l2tp_validate_socket
|
KMSAN: uninit-value in tbf_enqueue
net
|
|
|
|
21 |
1170d |
1257d
|
17/25 |
1170d |
9274124f023b
net: stricter validation of untrusted gso packets
|
general protection fault in fq_codel_enqueue
net
|
C |
done |
|
25 |
1175d |
1260d
|
17/25 |
1170d |
9274124f023b
net: stricter validation of untrusted gso packets
|
general protection fault in put_cmsg
net
|
C |
done |
|
3 |
1236d |
1236d
|
17/25 |
1170d |
1b2f08df0a88
ipv6: set msg_control_is_user in do_ipv6_getsockopt
|
KASAN: slab-out-of-bounds Read in inet_diag_bc_sk
net
|
C |
done |
|
45 |
1245d |
1247d
|
17/25 |
1170d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
BUG: unable to handle kernel NULL pointer dereference in debug_smp_processor_id (2)
net
|
|
|
|
3 |
1192d |
1200d
|
17/25 |
1170d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
BUG: unable to handle kernel NULL pointer dereference in net_rx_queue_update_kobjects
net
|
|
|
|
1 |
1200d |
1200d
|
17/25 |
1170d |
3021e69219e2
kcov: check kcov_softirq in kcov_remote_stop()
|
general protection fault in erspan_validate
net
|
C |
done |
|
520 |
1236d |
1243d
|
17/25 |
1170d |
51fa960d3b51
erspan: Check IFLA_GRE_ERSPAN_VER is set.
|
general protection fault in inet_unhash
net
|
C |
done |
|
40 |
1192d |
1220d
|
17/25 |
1170d |
02c71b144c81
l2tp: do not use inet_hash()/inet_unhash()
|
linux-next boot error: WARNING: suspicious RCU usage in bpq_device_event
net
|
|
|
|
6 |
1233d |
1234d
|
17/25 |
1170d |
95f59bf88bb7
drivers: net: hamradio: Fix suspicious RCU usage warning in bpqether.c
|
KASAN: use-after-free Read in rpc_net_ns
net
nfs
|
syz |
done |
|
10 |
1236d |
1242d
|
17/25 |
1170d |
31e9a7f35352
SUNRPC: fix use-after-free in rpc_free_client_work()
|
general protection fault in cfg80211_dev_rename
net
wireless
|
|
|
|
1 |
1240d |
1236d
|
17/25 |
1170d |
0bbab5f03015
cfg80211: fix debugfs rename crash
|
general protection fault in skb_clone (3)
net
|
|
|
|
44 |
1221d |
1223d
|
17/25 |
1170d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
KMSAN: uninit-value in do_tcp_getsockopt
net
|
|
|
|
5 |
1183d |
1235d
|
17/25 |
1170d |
e776af608f69
net-backports: tcp: fix error recovery in tcp_zerocopy_receive()
|
linux-next test error: WARNING: suspicious RCU usage in ipmr_device_event
net
|
|
|
|
24 |
1252d |
1257d
|
17/25 |
1170d |
a14fbcd4f157
ipmr: Fix RCU list debugging warning
|
memory leak in genl_rcv_msg
net
|
C |
|
|
116 |
1206d |
1396d
|
17/25 |
1170d |
c36f05559104
genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()
|
KASAN: slab-out-of-bounds Read in fl6_update_dst
net
|
C |
done |
|
43 |
1192d |
1237d
|
17/25 |
1170d |
bb986a50421a
seg6: fix seg6_validate_srh() to avoid slab-out-of-bounds
|
general protection fault in sock_hash_free
bpf
net
|
|
|
|
1 |
1215d |
1215d
|
17/25 |
1170d |
75e68e5bf2c7
bpf, sockhash: Synchronize delete from bucket list on map free
|
KASAN: slab-out-of-bounds Read in skb_gso_transport_seglen
net
|
C |
done |
|
4 |
1240d |
1259d
|
17/25 |
1170d |
9274124f023b
net: stricter validation of untrusted gso packets
|
WARNING: locking bug in dev_mc_seq_show
net
|
C |
done |
|
3 |
1211d |
1222d
|
17/25 |
1170d |
845e0ebb4408
net: change addr_list_lock back to static key
|
general protection fault in inet_diag_bc_sk
net
|
|
|
|
12 |
1245d |
1248d
|
17/25 |
1170d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
KMSAN: uninit-value in skbprio_enqueue
net
|
syz |
|
|
11 |
1185d |
1248d
|
17/25 |
1170d |
2761121af87d
net_sched: sch_skbprio: add message validation to skbprio_change()
|
INFO: rcu detected stall in wg_packet_tx_worker
net
|
C |
done |
|
24 |
1199d |
1252d
|
17/25 |
1170d |
df4953e4e997
sch_sfq: validate silly quantum values
|
KCSAN: data-race in tcp_add_backlog / tcp_try_rmem_schedule
net
|
|
|
|
3 |
1449d |
1454d
|
17/25 |
1187d |
ebb3b78db7bf
tcp: annotate sk->sk_rcvbuf lockless reads
|
WARNING in sk_stream_kill_queues (4)
net
|
C |
done |
done |
6 |
1310d |
1314d
|
17/25 |
1187d |
b6f6118901d1
ipv6: restrict IPV6_ADDRFORM operation
|
WARNING in kfree (2)
net
|
syz |
done |
done |
1 |
1300d |
1299d
|
17/25 |
1189d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
KMSAN: uninit-value in etf_enqueue_timesortedlist
net
|
|
|
|
3 |
1241d |
1248d
|
17/25 |
1199d |
a1211bf9a777
sched: etf: do not assume all sockets are full blown
|
general protection fault in macvlan_device_event
net
|
|
|
|
86 |
1248d |
1262d
|
17/25 |
1199d |
4dee15b4fd0d
macvlan: fix null dereference in macvlan_device_event()
|
KASAN: use-after-free Read in report_sock_error
net
|
|
|
|
2 |
1253d |
1257d
|
17/25 |
1199d |
a1211bf9a777
sched: etf: do not assume all sockets are full blown
|
KASAN: use-after-free Write in tcindex_set_parms
net
|
C |
done |
|
13 |
1279d |
1299d
|
17/25 |
1238d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
KASAN: use-after-free Read in tcindex_dump
net
|
syz |
|
|
1 |
1301d |
1299d
|
17/25 |
1238d |
b1be2e8cd290
net_sched: hold rtnl lock in tcindex_partial_destroy_work()
|
general protection fault in macsec_upd_offload
net
|
C |
done |
|
5 |
1277d |
1276d
|
17/25 |
1238d |
aa81700cf232
macsec: fix NULL dereference in macsec_upd_offload()
|
general protection fault in hfsc_unbind_tcf
net
|
|
|
|
1 |
1291d |
1287d
|
17/25 |
1238d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING in geneve_exit_batch_net (2)
net
|
C |
done |
|
9 |
1286d |
1310d
|
17/25 |
1238d |
0fda7600c2e1
geneve: move debug check after netdev unregister
|
KASAN: invalid-free in tcf_exts_destroy
net
|
C |
done |
|
1 |
1302d |
1301d
|
17/25 |
1238d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
general protection fault in do_tcp_getsockopt (2)
net
|
C |
done |
|
1 |
1291d |
1291d
|
17/25 |
1238d |
6cd6cbf593bf
net-backports: tcp: repair: fix TCP_QUEUE_SEQ implementation
|
WARNING: refcount bug in __tcf_action_put
net
|
syz |
|
|
1 |
1300d |
1299d
|
17/25 |
1238d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
general protection fault in ethnl_parse_header
net
|
C |
done |
|
9 |
1285d |
1290d
|
17/25 |
1238d |
55b474c41e58
netlink: check for null extack in cookie helpers
|
general protection fault in hsr_addr_is_self (2)
net
|
|
|
|
1 |
1290d |
1290d
|
17/25 |
1238d |
3a303cfdd28d
hsr: fix general protection fault in hsr_addr_is_self()
|
WARNING: ODEBUG bug in __init_work
net
|
syz |
done |
|
1 |
1287d |
1286d
|
17/25 |
1238d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING in call_rcu
net
|
C |
done |
|
8 |
1292d |
1299d
|
17/25 |
1238d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
WARNING: ODEBUG bug in tcf_queue_work
net
|
C |
done |
|
30 |
1304d |
1304d
|
17/25 |
1238d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
general protection fault in qdisc_hash_add
net
|
C |
done |
|
47 |
1297d |
1298d
|
17/25 |
1238d |
7c4046b1c53b
Revert "net: sched: make newly activated qdiscs visible"
|
WARNING: refcount bug in tcindex_data_put
net
|
C |
done |
|
27 |
1275d |
1276d
|
17/25 |
1238d |
a8eab6d35e22
net_sched: fix a missing refcnt in tcindex_init()
|
KASAN: use-after-free Read in route4_get
net
|
C |
|
|
8 |
1267d |
1297d
|
17/25 |
1238d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
general protection fault in erspan_netlink_parms
net
|
C |
done |
|
5 |
1294d |
1294d
|
17/25 |
1238d |
32ca98feab8c
net: ip_gre: Accept IFLA_INFO_DATA-less configuration
|
KMSAN: uninit-value in tcf_exts_change
net
|
C |
|
|
5 |
1290d |
1299d
|
17/25 |
1238d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
BUG: sleeping function called from invalid context in kmem_cache_alloc_node_trace
net
|
C |
done |
|
364 |
1300d |
1302d
|
17/25 |
1238d |
138470a9b2cc
net/sched: act_ct: fix lockdep splat in tcf_ct_flow_table_get
|
WARNING: ODEBUG bug in tcindex_destroy_work (3)
net
|
syz |
done |
|
13 |
1278d |
1314d
|
17/25 |
1238d |
304e024216a8
net_sched: add a temporary refcnt for struct tcindex_data
|
KMSAN: uninit-value in macsec_handle_frame
net
|
|
|
|
1 |
1288d |
1288d
|
17/25 |
1238d |
b06d072ccc4b
macsec: restrict to ethernet devices
|
WARNING: refcount bug in igmp_start_timer
net
|
syz |
done |
done |
19 |
1504d |
1869d
|
17/25 |
1261d |
323ebb61e32b
net: use listified RX for handling GRO_NORMAL skbs
|
possible deadlock in sch_direct_xmit
net
|
C |
done |
done |
1548 |
1405d |
2083d
|
17/25 |
1261d |
323ebb61e32b
net: use listified RX for handling GRO_NORMAL skbs
|
KASAN: use-after-free Read in alloc_netdev_mqs
net
|
|
|
|
1 |
1325d |
1325d
|
17/25 |
1263d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in __iptunnel_pull_header
net
|
C |
|
|
12 |
1295d |
1303d
|
17/25 |
1263d |
17c25cafd4d3
gre: fix uninit-value in __iptunnel_pull_header
|
KASAN: use-after-free Read in inet_gifconf
net
|
|
|
|
24 |
1317d |
1323d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ipv6_get_ifaddr
net
|
|
|
|
1 |
1321d |
1321d
|
17/25 |
1263d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KASAN: use-after-free Read in inet_lookup_ifaddr_rcu
net
|
|
|
|
2 |
1317d |
1319d
|
17/25 |
1263d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in netdev_state_change
net
|
|
|
|
2 |
1307d |
1307d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in rtnl_fill_ifinfo (2)
net
|
|
|
|
2 |
1322d |
1323d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KMSAN: uninit-value in slhc_compress
net
|
C |
|
|
3 |
1306d |
1306d
|
17/25 |
1263d |
110a40dfb708
slip: make slhc_compress() more robust against malicious packets
|
WARNING: ODEBUG bug in smc_ib_remove_dev
net
s390
|
|
|
|
52 |
1294d |
1308d
|
17/25 |
1263d |
ece0d7bd7461
net/smc: cancel event worker during device removal
|
KASAN: use-after-free Read in netdev_state_change
net
|
|
|
|
2 |
1322d |
1323d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
BUG: unable to handle kernel NULL pointer dereference in inet_release
net
|
syz |
|
|
3 |
1313d |
1314d
|
17/25 |
1263d |
b6f6118901d1
ipv6: restrict IPV6_ADDRFORM operation
|
BUG: unable to handle kernel paging request in ethnl_update_bitset32
net
|
C |
|
|
168 |
1303d |
1315d
|
17/25 |
1263d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in ipv6_chk_addr_and_flags
net
|
|
|
|
1 |
1322d |
1322d
|
17/25 |
1263d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in find_match
net
|
C |
|
|
52 |
1293d |
1323d
|
17/25 |
1263d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in bpf_skb_load_helper_32_no_cache
bpf
net
|
|
|
|
2 |
1333d |
1332d
|
17/25 |
1263d |
457fed775c97
net/smc: fix leak of kernel memory to user space
|
KMSAN: uninit-value in bond_alb_xmit
net
|
syz |
|
|
3 |
1304d |
1306d
|
17/25 |
1263d |
b7469e83d2ad
bonding/alb: make sure arp header is pulled before accessing it
|
general protection fault in smc_ib_remove_dev
net
s390
|
C |
done |
|
98 |
1303d |
1315d
|
17/25 |
1263d |
a2f2ef4a54c0
net/smc: check for valid ib_client_data
|
KMSAN: use-after-free in inet_gifconf
net
|
|
|
|
10 |
1294d |
1317d
|
17/25 |
1263d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in ip6_dst_destroy
net
|
C |
|
|
2 |
1296d |
1308d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
possible deadlock in inet_csk_accept
net
|
C |
done |
|
992 |
1298d |
1299d
|
17/25 |
1263d |
06669ea346e4
net: memcg: fix lockdep splat in inet_csk_accept()
|
KASAN: slab-out-of-bounds Read in ethnl_update_bitset32
net
|
syz |
|
|
2 |
1309d |
1315d
|
17/25 |
1263d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in dev_get_by_index_rcu
net
|
|
|
|
1 |
1318d |
1318d
|
17/25 |
1263d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
possible deadlock in bond_get_stats (3)
net
|
syz |
done |
|
2 |
1318d |
1318d
|
17/25 |
1263d |
b3e80d44f5b1
bonding: fix lockdep warning in bond_get_stats()
|
KMSAN: use-after-free in veth_xmit
net
|
|
|
|
8 |
1294d |
1309d
|
17/25 |
1263d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: uninit-value in kstrdup
net
|
C |
|
|
8 |
1299d |
1326d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ethnl_update_bitset32
net
|
C |
done |
|
6 |
1307d |
1315d
|
17/25 |
1263d |
e34f1753eebc
ethtool: limit bitset size
|
KASAN: use-after-free Read in fib_nexthop_info
net
|
|
|
|
1 |
1322d |
1322d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: slab-out-of-bounds Read in inet_gifconf
net
|
|
|
|
2 |
1323d |
1323d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in ip6_dst_destroy
net
|
C |
done |
|
1 |
1323d |
1323d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
KASAN: use-after-free Read in l3mdev_master_ifindex_rcu
net
|
C |
done |
done |
13 |
1319d |
1325d
|
17/25 |
1263d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
kernel panic: stack is corrupted in vhost_net_ioctl
kvm
net
virt
|
C |
done |
|
2 |
1323d |
1410d
|
17/25 |
1263d |
42d84c8490f9
vhost: Check docket sk_family instead of call getname
|
KASAN: use-after-free Read in __neigh_notify
net
|
|
|
|
2 |
1322d |
1323d
|
17/25 |
1263d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
lsm
net
|
C |
done |
|
8 |
1304d |
1314d
|
17/25 |
1263d |
dc24f8b4ecd3
mptcp: add dummy icsk_sync_mss()
|
INFO: task hung in lock_sock_nested (2)
net
|
C |
done |
|
418 |
1303d |
1316d
|
17/25 |
1263d |
3f74957fcbea
vsock: fix potential deadlock in transport->release()
|
KMSAN: use-after-free in l3mdev_master_ifindex_rcu
net
|
C |
|
|
5 |
1294d |
1317d
|
17/25 |
1263d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KMSAN: use-after-free in dev_alloc_name_ns
net
|
|
|
|
3 |
1294d |
1307d
|
17/25 |
1263d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
KASAN: use-after-free Read in mld_in_v1_mode
net
|
C |
done |
|
3 |
1322d |
1325d
|
17/25 |
1263d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
BUG: unable to handle kernel paging request in slhc_free
net
|
C |
done |
done |
177 |
1619d |
1737d
|
17/25 |
1298d |
baf76f0c58ae
slip: make slhc_free() silently accept an error pointer
|
KMSAN: uninit-value in setup_udp_tunnel_sock
net
|
C |
|
|
1 |
1349d |
1348d
|
16/25 |
1320d |
940ba1498665
net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
WARNING: lock held when returning to user space in tun_get_user (2)
net
|
|
|
|
7 |
1337d |
1347d
|
16/25 |
1320d |
1efba987c486
net-backports: tun: add mutex_unlock() call and napi.skb clearing in tun_get_user()
|
WARNING in devlink_port_type_warn
net
|
|
|
|
2340 |
1351d |
1423d
|
16/25 |
1320d |
4c582234ab39
devlink: Wait longer before warning about unset port type
|
BUG: unable to handle kernel NULL pointer dereference in cfg80211_wext_siwrts
net
wireless
|
|
|
|
3 |
1350d |
1359d
|
16/25 |
1320d |
24953de0a5e3
cfg80211: check for set_wiphy_params
|
KMSAN: uninit-value in rsvp_change
net
|
C |
|
|
4 |
1341d |
1342d
|
16/25 |
1320d |
cb3c0e6bdf64
cls_rsvp: fix rsvp_policy
|
BUG: unable to handle kernel paging request in rhashtable_replace_fast
net
|
|
|
|
2 |
1346d |
1354d
|
16/25 |
1320d |
41cdc741048b
netdevsim: fix nsim_fib6_rt_create() error path
|
general protection fault in hsr_addr_is_self
net
|
|
|
|
3 |
1322d |
1338d
|
16/25 |
1320d |
2b5b8251bc9f
net: hsr: fix possible NULL deref in hsr_handle_frame()
|
INFO: rcu detected stall in addrconf_rs_timer (3)
net
|
C |
inconclusive |
done |
81 |
1381d |
1377d
|
16/25 |
1320d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (2)
net
|
C |
done |
|
8 |
1347d |
1349d
|
16/25 |
1320d |
940ba1498665
net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
BUG: sleeping function called from invalid context in lock_sock_nested
bpf
net
|
C |
|
|
1232 |
1320d |
1396d
|
16/25 |
1320d |
37f96694cf73
crypto: af_alg - Use bh_lock_sock in sk_destruct
|
memory leak in vlan_dev_set_egress_priority
net
|
C |
|
|
1 |
1363d |
1363d
|
16/25 |
1320d |
9bbd917e0bec
vlan: fix memory leak in vlan_dev_set_egress_priority
|
WARNING in sk_psock_drop
bpf
net
|
|
|
|
157 |
1343d |
1352d
|
16/25 |
1320d |
58c8db929db1
net, sk_msg: Don't check if sock is locked when tearing down psock
|
KMSAN: uninit-value in macvlan_broadcast
net
|
C |
|
|
2 |
1363d |
1363d
|
16/25 |
1320d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
WARNING in tcp_ack
net
|
C |
done |
|
3 |
1361d |
1362d
|
16/25 |
1320d |
90d72256addf
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
memory leak in em_nbyte_change
net
|
C |
|
|
1 |
1345d |
1345d
|
16/25 |
1320d |
55cd9f67f1e4
net_sched: ematch: reject invalid TCF_EM_SIMPLE
|
KCSAN: data-race in __skb_try_recv_from_queue / unix_dgram_sendmsg
net
|
|
|
|
61 |
1336d |
1354d
|
16/25 |
1320d |
86b18aaa2b5b
skbuff: fix a data race in skb_queue_len()
|
KASAN: slab-out-of-bounds Read in macvlan_broadcast
net
|
C |
done |
|
10 |
1361d |
1363d
|
16/25 |
1320d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
KASAN: slab-out-of-bounds Read in nla_put_nohdr
net
|
C |
done |
|
1 |
1348d |
1348d
|
16/25 |
1320d |
61678d28d4a4
net_sched: fix datalen for ematch
|
WARNING: bad unlock balance in release_sock
net
|
|
|
|
1 |
1362d |
1362d
|
16/25 |
1320d |
90d72256addf
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
KASAN: use-after-free Read in tcp_fastretrans_alert
net
|
C |
done |
|
1 |
1351d |
1351d
|
16/25 |
1320d |
2bec445f9bf3
net-backports: tcp: do not leave dangling pointers in tp->highest_sack
|
BUG: unable to handle kernel paging request in rhashtable_jhash2
net
|
C |
done |
|
6 |
1353d |
1354d
|
16/25 |
1320d |
41cdc741048b
netdevsim: fix nsim_fib6_rt_create() error path
|
memory leak in tcf_ctinfo_init
net
|
C |
|
|
2 |
1350d |
1351d
|
16/25 |
1320d |
09d4f10a5e78
net: sched: act_ctinfo: fix memory leak
|
KASAN: slab-out-of-bounds Read in __nla_put_nohdr
net
|
C |
done |
|
4 |
1348d |
1348d
|
16/25 |
1320d |
61678d28d4a4
net_sched: fix datalen for ematch
|
INFO: rcu detected stall in br_handle_frame (2)
net
|
C |
done |
|
2 |
1380d |
1376d
|
16/25 |
1320d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
INFO: rcu detected stall in netlink_sendmsg (3)
net
|
C |
done |
|
6 |
1328d |
1381d
|
16/25 |
1320d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
WARNING in cbq_destroy_class
net
|
C |
done |
|
7 |
1325d |
1348d
|
16/25 |
1320d |
2e24cd755552
net_sched: fix ops->bind_class() implementations
|
WARNING in cbq_destroy
net
|
C |
done |
|
1 |
1348d |
1348d
|
16/25 |
1320d |
2e24cd755552
net_sched: fix ops->bind_class() implementations
|
KASAN: use-after-free Read in tcp_check_sack_reordering
net
|
C |
done |
|
2 |
1343d |
1352d
|
16/25 |
1320d |
2bec445f9bf3
net-backports: tcp: do not leave dangling pointers in tp->highest_sack
|
BUG: unable to handle kernel NULL pointer dereference in cfg80211_wext_siwfrag
net
wireless
|
C |
done |
|
8 |
1351d |
1363d
|
16/25 |
1320d |
24953de0a5e3
cfg80211: check for set_wiphy_params
|
KASAN: use-after-free Read in macvlan_broadcast
net
|
C |
done |
|
12 |
1361d |
1363d
|
16/25 |
1320d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
WARNING: bad unlock balance in gtp_encap_enable_socket
net
|
C |
done |
|
8 |
1360d |
1364d
|
16/25 |
1320d |
90d72256addf
net-backports: gtp: fix bad unlock balance in gtp_encap_enable_socket
|
WARNING: bad unlock balance in sch_direct_xmit
net
|
C |
done |
|
35 |
1350d |
1397d
|
16/25 |
1320d |
53d374979ef1
net: avoid updating qdisc_xmit_lock_key in netdev_update_lockdep_key()
|
general protection fault in inet6_set_link_af
net
|
C |
done |
|
8 |
1330d |
1334d
|
16/25 |
1320d |
db3fa271022d
ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
|
general protection fault in tcf_ife_cleanup
net
|
C |
done |
|
111 |
1335d |
1359d
|
16/25 |
1320d |
44c23d71599f
net/sched: act_ife: initalize ife->metalist earlier
|
KASAN: use-after-free Write in __alloc_skb (2)
net
|
C |
done |
|
7 |
1371d |
1388d
|
16/25 |
1320d |
d836f5c69d87
net-backports: net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
|
WARNING in geneve_exit_batch_net
net
|
|
|
|
15 |
1320d |
1346d
|
16/25 |
1320d |
760d228e322e
net_sched: walk through all child classes in tc_bind_tclass()
|
KASAN: slab-out-of-bounds Read in tcf_exts_destroy
net
|
C |
done |
error |
8 |
1443d |
1346d
|
16/25 |
1320d |
599be01ee567
net_sched: fix an OOB access in cls_tcindex
|
WARNING: ODEBUG bug in tcindex_destroy_work (2)
net
|
|
|
|
5 |
1325d |
1336d
|
16/25 |
1320d |
599be01ee567
net_sched: fix an OOB access in cls_tcindex
|
inconsistent lock state in rxrpc_put_client_connection_id
afs
net
|
C |
done |
|
473 |
1329d |
1335d
|
16/25 |
1320d |
963485d436cc
rxrpc: Fix call RCU cleanup using non-bh-safe locks
|
KASAN: null-ptr-deref Read in tcf_generic_walker
net
|
C |
done |
|
6 |
1324d |
1343d
|
16/25 |
1320d |
760d228e322e
net_sched: walk through all child classes in tc_bind_tclass()
|
WARNING in tcp_enter_loss (2)
net
|
C |
done |
unreliable |
4 |
1978d |
2028d
|
16/25 |
1320d |
16ae6aa17052
tcp: ignore Fast Open on repair mode
|
KMSAN: uninit-value in bond_neigh_setup
net
|
|
|
|
64 |
1369d |
1393d
|
16/25 |
1325d |
f394722fb0d0
net-backports: neighbour: remove neigh_cleanup() method
|
KASAN: slab-out-of-bounds Read in hsr_debugfs_rename
net
|
C |
done |
|
18 |
1364d |
1373d
|
16/25 |
1325d |
04b69426d846
hsr: fix slab-out-of-bounds Read in hsr_debugfs_rename()
|
WARNING: refcount bug in smc_release (2)
net
s390
|
C |
done |
|
9 |
1382d |
1406d
|
16/25 |
1325d |
86434744fedf
net/smc: add fallback check to connect()
|
BUG: corrupted list in hsr_add_node
net
|
|
|
|
1 |
1427d |
1426d
|
16/25 |
1325d |
92a35678ec07
hsr: fix a race condition in node list insertion and deletion
|
kernel BUG at include/linux/mm.h:LINE! (5)
net
|
C |
done |
done |
129 |
1601d |
1671d
|
16/25 |
1362d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
KASAN: slab-out-of-bounds Read in bpf_prog_create
bpf
net
|
C |
done |
|
447 |
1392d |
1474d
|
16/25 |
1362d |
0033b34a03ec
ppp: fix out-of-bounds access in bpf_prog_create()
|
memory leak in register_netdevice
net
|
C |
|
|
19 |
1393d |
1398d
|
16/25 |
1362d |
42c17fa69f98
net: fix a leak in register_netdevice()
|
KCSAN: data-race in mod_timer / run_timer_softirq
net
|
|
|
|
4 |
1378d |
1444d
|
16/25 |
1362d |
56144737e673
net-backports: hrtimer: Annotate lockless access to timer->state
|
WARNING: refcount bug in skb_set_owner_w
net
|
C |
done |
|
2 |
1398d |
1399d
|
16/25 |
1362d |
501a90c94510
net-backports: inet: protect against too small mtu values.
|
KMSAN: use-after-free in netlink_recvmsg
net
|
C |
|
|
1 |
1418d |
1418d
|
16/25 |
1388d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
KMSAN: use-after-free in __skb_try_recv_from_queue
net
|
C |
|
|
4 |
1417d |
1440d
|
16/25 |
1388d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in ip_sublist_rcv
net
|
C |
done |
|
287 |
1431d |
1441d
|
16/25 |
1388d |
51210ad5a558
inet: do not call sublist_rcv on empty list
|
kernel BUG at include/linux/scatterlist.h:LINE!
net
|
C |
done |
|
307 |
1399d |
1592d
|
16/25 |
1388d |
d10523d0b3d7
net/tls: free the record on encryption error
|
KCSAN: data-race in __ip4_datagram_connect / raw_bind
net
|
|
|
|
1 |
1436d |
1436d
|
16/25 |
1388d |
25c7a6d1f90e
net: avoid potential false sharing in neighbor related code
|
KCSAN: data-race in __dev_queue_xmit / __dev_queue_xmit
net
|
|
|
|
40 |
1388d |
1438d
|
16/25 |
1388d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
general protection fault in ip6_sublist_rcv
net
|
C |
done |
|
327 |
1431d |
1433d
|
16/25 |
1388d |
51210ad5a558
inet: do not call sublist_rcv on empty list
|
KCSAN: data-race in inet_putpeer / inet_putpeer
net
|
|
|
|
20 |
1421d |
1438d
|
16/25 |
1388d |
71685eb4ce80
inetpeer: fix data-race in inet_putpeer / inet_putpeer
|
KCSAN: data-race in eth_header_cache / neigh_resolve_output
net
|
|
|
|
1 |
1425d |
1425d
|
16/25 |
1388d |
c305c6ae79e2
net-backports: net: add annotations on hh->hh_len lockless accesses
|
KMSAN: use-after-free in sk_forced_mem_schedule
net
|
|
|
|
2 |
1411d |
1419d
|
16/25 |
1388d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in devlink_get_from_attrs
net
|
C |
|
|
7 |
1455d |
1454d
|
16/25 |
1388d |
82a843de41d4
net: devlink: fix reporter dump dumpit
|
general protection fault in vti6_ioctl
net
|
|
|
|
1 |
1446d |
1446d
|
16/25 |
1388d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in tun_get_user / tun_net_get_stats64
net
|
|
|
|
1 |
1433d |
1433d
|
16/25 |
1388d |
de7d5084d827
net-backports: net: provide dev_lstats_read() helper
|
KCSAN: data-race in sk_wait_data / tcp_queue_rcv
net
|
|
|
|
4 |
1427d |
1424d
|
16/25 |
1388d |
f8cc62ca3e66
net: add a READ_ONCE() in skb_peek_tail()
|
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg (2)
net
|
|
|
|
47 |
1388d |
1424d
|
16/25 |
1388d |
9ed498c6280a
net-backports: net: silence data-races on sk_backlog.tail
|
KCSAN: data-race in sk_wait_data / skb_queue_tail
net
|
|
|
|
3 |
1435d |
1436d
|
16/25 |
1388d |
f8cc62ca3e66
net-backports: net: add a READ_ONCE() in skb_peek_tail()
|
general protection fault in veth_get_stats64
net
|
C |
done |
|
2 |
1459d |
1459d
|
16/25 |
1388d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in icmp_global_allow / icmp_global_allow
net
|
|
|
|
29 |
1388d |
1439d
|
16/25 |
1388d |
bbab7ef23503
net-backports: net: icmp: fix data-race in cmp_global_allow()
|
KCSAN: data-race in __dev_queue_xmit / pfifo_fast_dequeue
net
|
|
|
|
6 |
1402d |
1439d
|
16/25 |
1388d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
KCSAN: data-race in tcp_chrono_stop / tcp_recvmsg
net
|
|
|
|
3 |
1423d |
1424d
|
16/25 |
1388d |
a5a7daa52edb
net-backports: tcp: fix data-race in tcp_recvmsg()
|
KCSAN: data-race in gro_normal_list.part.0 / napi_busy_loop
net
|
|
|
|
1 |
1421d |
1421d
|
16/25 |
1388d |
c39e342a050a
net-backports: tun: fix data-race in gro_normal_list()
|
KASAN: use-after-free Read in slip_open
net
|
C |
done |
|
3 |
1406d |
1408d
|
16/25 |
1388d |
e58c19124189
slip: Fix use-after-free Read in slip_open
|
KCSAN: data-race in fanout_demux_rollover / fanout_demux_rollover
net
|
|
|
|
1 |
1423d |
1423d
|
16/25 |
1388d |
b756ad928d98
net-backports: packet: fix data-race in fanout_flow_is_huge()
|
WARNING in __rtnl_newlink
net
|
C |
done |
|
2 |
1458d |
1458d
|
16/25 |
1388d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
WARNING: ODEBUG bug in free_netdev
net
|
C |
done |
|
2 |
1457d |
1457d
|
16/25 |
1388d |
11fc7d5a0a2d
tun: fix memory leak in error path
|
general protection fault in ip6_tnl_ioctl
net
|
C |
done |
|
7 |
1447d |
1458d
|
16/25 |
1388d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
KCSAN: data-race in __dev_queue_xmit / net_tx_action
net
|
|
|
|
1 |
1423d |
1423d
|
16/25 |
1388d |
90b2be27bb0e
net/sched: annotate lockless accesses to qdisc->empty
|
KMSAN: use-after-free in copyout
net
|
C |
|
|
1 |
1453d |
1453d
|
16/25 |
1388d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
general protection fault in virtio_transport_release
net
|
C |
done |
|
7 |
1410d |
1411d
|
16/25 |
1388d |
039fcccaed33
vsock: avoid to assign transport if its initialization fails
|
WARNING in smc_unhash_sk (3)
net
s390
|
C |
done |
|
362 |
1405d |
1495d
|
15/25 |
1401d |
8204df72bea1
net/smc: fix fastopen for non-blocking connect()
|
memory leak in smc_create
net
s390
|
C |
|
|
19 |
1414d |
1427d
|
15/25 |
1401d |
6d6dd528d5af
net/smc: fix refcount non-blocking connect() -part 2
|
KCSAN: data-race in neigh_resolve_output / neigh_resolve_output
net
|
|
|
|
4 |
1423d |
1437d
|
15/25 |
1401d |
1b53d64435d5
net-backports: net: fix data-race in neigh_event_send()
|
KCSAN: data-race in find_match / find_match
net
|
|
|
|
2 |
1424d |
1427d
|
15/25 |
1401d |
1bef4c223b85
net-backports: ipv6: fixes rt6_probe() and fib6_nh->last_probe init
|
BUG: spinlock recursion in release_sock
net
|
C |
done |
|
116 |
1528d |
1529d
|
14/25 |
1403d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
KMSAN: use-after-free in rxrpc_put_peer
afs
net
|
|
|
|
1 |
1444d |
1444d
|
14/25 |
1404d |
91fcfbe8852e
rxrpc: Fix call crypto state cleanup
|
WARNING in sk_stream_kill_queues (3)
net
|
C |
done |
|
622 |
1575d |
1934d
|
14/25 |
1404d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
KCSAN: data-race in udp_set_dev_scratch / udpv6_recvmsg
net
|
|
|
|
5 |
1427d |
1438d
|
14/25 |
1408d |
a793183caa9a
udp: fix data-race in udp_set_dev_scratch()
|
KCSAN: data-race in __skb_wait_for_more_packets / skb_queue_tail
net
|
|
|
|
1 |
1431d |
1431d
|
14/25 |
1408d |
7c422d0ce975
net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
WARNING: refcount bug in smc_release
net
s390
|
C |
done |
|
8 |
1414d |
1438d
|
14/25 |
1408d |
301428ea3708
net/smc: fix refcounting for non-blocking connect()
|
INFO: trying to register non-static key in bond_3ad_update_lacp_rate
net
|
C |
done |
|
26 |
1431d |
1433d
|
14/25 |
1408d |
ad9bd8daf2f9
bonding: fix using uninitialized mode_lock
|
KCSAN: data-race in datagram_poll / skb_queue_tail
net
|
|
|
|
5 |
1427d |
1436d
|
14/25 |
1408d |
3ef7cf57c72f
net-backports: net: use skb_queue_empty_lockless() in poll() handlers
|
general protection fault in process_one_work
net
|
|
|
|
2 |
1433d |
1433d
|
14/25 |
1408d |
6d6f0383b697
netdevsim: Fix use-after-free during device dismantle
|
KCSAN: data-race in udp6_lib_lookup2 / udpv6_queue_rcv_one_skb
net
|
|
|
|
1 |
1437d |
1437d
|
14/25 |
1408d |
7170a977743b
net: annotate accesses to sk->sk_incoming_cpu
|
KCSAN: data-race in tcp_v4_rcv / tcp_v4_rcv
net
|
|
|
|
4 |
1427d |
1431d
|
14/25 |
1408d |
7170a977743b
net-backports: net: annotate accesses to sk->sk_incoming_cpu
|
KCSAN: data-race in __skb_recv_udp / __udp_enqueue_schedule_skb
net
|
|
|
|
7 |
1426d |
1439d
|
14/25 |
1408d |
137a0dbe3426
net-backports: udp: use skb_queue_empty_lockless()
|
KCSAN: data-race in first_packet_length / udp_poll
net
|
|
|
|
2 |
1430d |
1436d
|
14/25 |
1408d |
137a0dbe3426
net-backports: udp: use skb_queue_empty_lockless()
|
INFO: trying to register non-static key in bond_3ad_update_ad_actor_settings
net
|
C |
done |
|
69 |
1431d |
1433d
|
14/25 |
1408d |
ad9bd8daf2f9
bonding: fix using uninitialized mode_lock
|
KCSAN: data-race in __skb_wait_for_more_packets / __sock_queue_rcv_skb
net
|
|
|
|
10 |
1427d |
1437d
|
14/25 |
1408d |
7c422d0ce975
net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
KCSAN: data-race in udpv6_queue_rcv_one_skb / udpv6_queue_rcv_one_skb
net
|
|
|
|
1 |
1434d |
1433d
|
14/25 |
1408d |
ee8d153d46a3
net-backports: net: annotate lockless accesses to sk->sk_napi_id
|
KCSAN: data-race in __skb_recv_udp / datagram_poll
net
|
|
|
|
1 |
1427d |
1427d
|
14/25 |
1408d |
3f926af3f4d6
net: use skb_queue_empty_lockless() in busy poll contexts
|
KCSAN: data-race in __skb_wait_for_more_packets / __udp_enqueue_schedule_skb
net
|
|
|
|
2 |
1431d |
1438d
|
14/25 |
1408d |
7c422d0ce975
net-backports: net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
|
KASAN: use-after-free Read in p9_fd_poll
net
v9fs
|
C |
|
done |
8 |
1875d |
1907d
|
14/25 |
1410d |
430ac66eb4c5
net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
|
BUG: MAX_LOCK_DEPTH too low! (2)
net
|
C |
|
done |
5 |
1906d |
1936d
|
14/25 |
1419d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
inconsistent lock state in ila_xlat_nl_cmd_del_mapping
net
|
C |
|
unreliable |
2496 |
1868d |
1874d
|
14/25 |
1419d |
7494de0454af
mfd: da9063: Replace regmap_add_irq_chip with devm counterpart
|
BUG: corrupted list in p9_conn_cancel
net
v9fs
|
C |
|
done |
18 |
1809d |
1909d
|
14/25 |
1419d |
9f476d7c540c
net/9p/trans_fd.c: fix race by holding the lock
|
general protection fault in p9_conn_cancel
net
v9fs
|
C |
|
done |
2 |
1889d |
1907d
|
14/25 |
1419d |
9f476d7c540c
net/9p/trans_fd.c: fix race by holding the lock
|
WARNING: ODEBUG bug in p9_fd_close
net
v9fs
|
C |
|
done |
82 |
1870d |
1910d
|
14/25 |
1419d |
430ac66eb4c5
net/9p/trans_fd.c: fix race-condition by flushing workqueue before the kfree()
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (5)
net
|
C |
|
done |
654 |
1706d |
2008d
|
14/25 |
1419d |
32bf94fb5c2e
xfrm: validate template mode
|
KASAN: use-after-free Read in _decode_session4
net
|
C |
|
done |
3 |
2010d |
2010d
|
14/25 |
1419d |
c6741fbed6dc
vti6: Properly adjust vti6 MTU from MTU of lower device
|
general protection fault in tcp_cleanup_ulp
net
|
syz |
done |
done |
6 |
1835d |
1851d
|
14/25 |
1419d |
5607fff30363
bpf: sockmap only allow ESTABLISHED sock state
|
BUG: corrupted list in p9_write_work
net
v9fs
|
C |
|
done |
5 |
1832d |
1878d
|
14/25 |
1419d |
728356dedeff
9p: Add refcount to p9_req_t
|
general protection fault in tcp_splice_read
net
|
C |
done |
done |
23 |
1636d |
1745d
|
14/25 |
1421d |
07603b230895
net/smc: propagate file from SMC to TCP socket
|
kernel BUG at net/ipv4/ip_output.c:LINE!
net
|
C |
|
done |
28225 |
1715d |
1906d
|
14/25 |
1423d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
suspicious RCU usage at ./include/net/inet_sock.h:LINE
net
|
C |
|
done |
171 |
2065d |
2156d
|
14/25 |
1423d |
3f32d0be6c16
tipc: lock wakeup & inputq at tipc_link_reset()
|
KASAN: use-after-free Read in _decode_session6
net
|
C |
|
done |
4 |
1782d |
1850d
|
14/25 |
1423d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
KCSAN: data-race in sk_stream_wait_memory / tcp_shifted_skb
net
|
|
|
|
1 |
1436d |
1424d
|
14/25 |
1424d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in sk_stream_wait_memory / tcp_fragment
net
|
|
|
|
1 |
1427d |
1424d
|
14/25 |
1424d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in tcp_sendmsg_locked / tcp_stream_memory_free
net
|
|
|
|
2 |
1435d |
1424d
|
14/25 |
1424d |
0f31746452e6
tcp: annotate tp->write_seq lockless reads
|
KCSAN: data-race in tcp_event_new_data_sent / tcp_stream_memory_free
net
|
|
|
|
3 |
1428d |
1424d
|
14/25 |
1424d |
e0d694d638db
tcp: annotate tp->snd_nxt lockless reads
|
KCSAN: data-race in tcp_ack / tcp_poll (2)
net
|
|
|
|
5 |
1432d |
1424d
|
14/25 |
1424d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in sk_stream_wait_memory / tcp_ack
net
|
|
|
|
2 |
1429d |
1424d
|
14/25 |
1424d |
ab4e846a82d0
tcp: annotate sk->sk_wmem_queued lockless reads
|
KCSAN: data-race in tcp_add_backlog / tcp_rcv_space_adjust (2)
net
|
|
|
|
18 |
1439d |
1445d
|
14/25 |
1426d |
ebb3b78db7bf
tcp: annotate sk->sk_rcvbuf lockless reads
|
BUG: unable to handle kernel NULL pointer dereference in xsk_poll
bpf
net
|
C |
done |
|
10 |
1444d |
1462d
|
14/25 |
1426d |
df551058f7a3
xsk: Fix crash in poll when device does not support ndo_xsk_wakeup
|
KASAN: use-after-free Read in rxrpc_release_call
net
afs
|
syz |
done |
|
13 |
1444d |
1499d
|
14/25 |
1426d |
91fcfbe8852e
rxrpc: Fix call crypto state cleanup
|
KASAN: use-after-free Read in rxrpc_send_keepalive
afs
net
|
C |
error |
|
694 |
1441d |
1513d
|
14/25 |
1426d |
c48fc11b69e9
rxrpc: Fix call ref leak
|
KCSAN: data-race in __tcp_select_window / tcp_add_backlog
net
|
|
|
|
23502 |
1426d |
1457d
|
14/25 |
1426d |
70c2655849a2
net: silence KCSAN warnings about sk->sk_backlog.len reads
|
memory leak in llc_ui_sendmsg
net
|
C |
|
|
125 |
1442d |
1593d
|
14/25 |
1426d |
c6ee11c39fcc
llc: fix sk_buff leak in llc_sap_state_process()
|
KCSAN: data-race in tcp_add_backlog / tcp_recvmsg
net
|
|
|
|
17719 |
1427d |
1457d
|
14/25 |
1426d |
8265792bf887
net-backports: net: silence KCSAN warnings around sk_add_backlog() calls
|
INFO: task hung in addrconf_verify_work (2)
net
|
C |
|
|
22 |
1448d |
1448d
|
14/25 |
1426d |
39f13ea2f61b
net: avoid potential infinite loop in tc_ctl_action()
|
KCSAN: data-race in tcp_poll / tcp_recvmsg (2)
net
|
|
|
|
22 |
1439d |
1445d
|
14/25 |
1426d |
7db48e983930
tcp: annotate tp->copied_seq lockless reads
|
KASAN: use-after-free Read in rxrpc_put_peer
afs
net
|
C |
error |
|
38 |
1442d |
1494d
|
14/25 |
1426d |
55f6c98e3674
rxrpc: Fix trace-after-put looking at the put peer record
9ebeddef58c4
rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record
|
KCSAN: data-race in tcp_poll / tcp_queue_rcv
net
|
|
|
|
1897 |
1426d |
1457d
|
14/25 |
1426d |
dba7d9b8c739
net-backports: tcp: annotate tp->rcv_nxt lockless reads
|
memory leak in llc_conn_ac_send_sabme_cmd_p_set_x
net
|
C |
|
|
225 |
1442d |
1593d
|
14/25 |
1426d |
b74555de21ac
llc: fix sk_buff leak in llc_conn_service()
|
general protection fault in rxrpc_error_report
net
afs
|
C |
done |
|
6 |
1442d |
1454d
|
14/25 |
1426d |
f0308fb07080
rxrpc: Fix possible NULL pointer access in ICMP handling
|
KCSAN: data-race in tcp_add_backlog / tcp_grow_window.isra.0
net
|
|
|
|
21713 |
1426d |
1457d
|
14/25 |
1426d |
70c2655849a2
net-backports: net: silence KCSAN warnings about sk->sk_backlog.len reads
|
WARNING: suspicious RCU usage in xfrm_alloc_userspi
net
|
C |
done |
error |
86 |
1655d |
1656d
|
14/25 |
1427d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
general protection fault in get_work_pool
net
|
C |
|
done |
24 |
1635d |
2038d
|
14/25 |
1427d |
07bf7908950a
xfrm: Validate address prefix lengths in the xfrm selector.
|
general protection fault in xfrm_init_replay
net
|
syz |
inconclusive |
done |
2 |
2025d |
2024d
|
14/25 |
1427d |
d97ca5d714a5
xfrm_user: uncoditionally validate esn replay attribute struct
|
WARNING: suspicious RCU usage in xfrm_get_spdinfo
net
|
C |
done |
error |
46 |
1655d |
1656d
|
14/25 |
1427d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
WARNING: suspicious RCU usage in xfrm_get_sadinfo
net
|
C |
done |
error |
28 |
1655d |
1656d
|
14/25 |
1427d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
WARNING: suspicious RCU usage in xfrm_get_policy
net
|
syz |
done |
error |
8 |
1656d |
1656d
|
14/25 |
1427d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
INFO: rcu detected stall in rt6_probe_deferred
net
|
|
|
|
336 |
1476d |
1481d
|
14/25 |
1440d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in addrconf_rs_timer (2)
net
|
|
|
|
362 |
1459d |
1481d
|
14/25 |
1440d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
divide error in tabledist
net
|
|
|
|
3 |
1463d |
1472d
|
14/25 |
1446d |
b41d936b5ecf
sch_netem: fix a divide by zero in tabledist()
|
BUG: using smp_processor_id() in preemptible [ADDR] code: mime_typevmnet0/NUM
net
|
|
|
|
1 |
1490d |
1488d
|
14/25 |
1446d |
00d9e47f8ec2
posix-cpu-timers: Always clear head pointer on dequeue
|
KMSAN: uninit-value in inet_ehash_insert
net
|
C |
|
|
7 |
1455d |
1462d
|
14/25 |
1446d |
6af1799aaf3f
net-backports: ipv6: drop incoming packets having a v4mapped source address
|
general protection fault in xsk_poll
bpf
net
|
C |
done |
|
430 |
1476d |
1503d
|
14/25 |
1446d |
42fddcc7c64b
xsk: use state member for socket synchronization
|
BUG: sleeping function called from invalid context in tcf_chain0_head_change_cb_del
net
|
C |
done |
|
187 |
1462d |
1475d
|
14/25 |
1446d |
e3ae1f96accd
net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
|
BUG: corrupted list in __netif_receive_skb_list_core
net
|
|
|
|
3 |
1454d |
1507d
|
14/25 |
1446d |
c7a42eb49212
net: ipv6: fix listify ip6_rcv_finish in case of forwarding
|
KASAN: slab-out-of-bounds Read in do_tcp_getsockopt
net
|
|
|
|
3 |
1470d |
1489d
|
14/25 |
1446d |
3afb09618840
tcp: fix slab-out-of-bounds in tcp_zerocopy_receive()
|
INFO: rcu detected stall in pie_timer
net
|
C |
|
|
19 |
1447d |
1482d
|
14/25 |
1446d |
4ce70b4aed57
net-backports: net: sched: sch_htb: don't call qdisc_put() while holding tree lock
|
KASAN: use-after-free Read in cbq_enqueue
net
|
C |
done |
|
4 |
1454d |
1456d
|
14/25 |
1446d |
e9789c7cc182
sch_cbq: validate TCA_CBQ_WRROPT to avoid crash
|
general protection fault in dsmark_init
net
|
C |
done |
|
3 |
1455d |
1457d
|
14/25 |
1446d |
474f0813a300
sch_dsmark: fix potential NULL deref in dsmark_init()
|
possible deadlock in pie_timer
net
|
C |
done |
|
2 |
1463d |
1464d
|
14/25 |
1446d |
e3ae1f96accd
net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
|
general protection fault in tcf_action_destroy
net
|
|
|
|
128 |
1463d |
1481d
|
14/25 |
1446d |
3d66b89c30f9
net: sched: fix possible crash in tcf_action_destroy()
|
general protection fault in dev_map_hash_update_elem
bpf
net
|
C |
done |
|
4 |
1480d |
1486d
|
14/25 |
1446d |
af58e7ee6a8d
xdp: Fix race in dev_map_hash_update_elem() when replacing element
|
INFO: rcu detected stall in sys_sendmmsg
net
|
|
|
|
2 |
1482d |
1482d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in pppoe_sendmsg
net
|
|
|
|
7 |
1477d |
1484d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
WARNING in xfrm_policy_inexact_list_reinsert
net
|
|
|
|
2 |
1487d |
1514d
|
14/25 |
1452d |
769a807d0b41
xfrm: policy: avoid warning splat when merging nodes
|
INFO: rcu detected stall in sys_sendmsg
net
|
C |
done |
|
2 |
1478d |
1478d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in br_hello_timer_expired
net
|
|
|
|
4 |
1476d |
1481d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in inet_release
net
|
|
|
|
1 |
1485d |
1484d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in packet_sendmsg
net
|
|
|
|
10 |
1477d |
1483d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
general protection fault in addrconf_f6i_alloc
net
|
C |
|
|
305 |
1476d |
1486d
|
14/25 |
1452d |
8652f17c658d
ipv6: addrconf_f6i_alloc - fix non-null pointer check to !IS_ERR()
|
INFO: rcu detected stall in dccp_write_timer
net
|
|
|
|
5 |
1482d |
1484d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
general protection fault in tls_sk_proto_close (2)
net
|
syz |
error |
|
246 |
1476d |
1495d
|
14/25 |
1452d |
44580a0118d3
net: sock_map, fix missing ulp check in sock hash case
|
INFO: rcu detected stall in neigh_timer_handler (2)
net
|
|
|
|
2 |
1481d |
1483d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
BUG: soft lockup in addrconf_dad_work
net
|
C |
done |
|
1 |
1480d |
1480d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in igmp_ifc_timer_expire
net
|
C |
|
|
57 |
1476d |
1735d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in mld_dad_timer_expire
net
|
|
|
|
3 |
1481d |
1482d
|
14/25 |
1452d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass
net
|
C |
done |
|
61 |
1476d |
1484d
|
14/25 |
1452d |
8b142a00edcf
net_sched: check cops->tcf_block in tc_bind_tclass()
|
general protection fault in icmpv6_xrlim_allow
net
|
|
|
|
4 |
1580d |
1586d
|
14/25 |
1453d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
general protection fault in ip6_rcv_finish
net
|
|
|
|
3 |
1570d |
1577d
|
14/25 |
1453d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
general protection fault in requeue_rx_msgs
net
|
syz |
done |
inconclusive |
1 |
1949d |
1949d
|
14/25 |
1457d |
eb7f54b90bd8
kcm: Fix use-after-free caused by clonned sockets
|
KASAN: user-memory-access Read in ip6_hold_safe (3)
net
|
|
|
|
456 |
1564d |
1583d
|
14/25 |
1457d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
WARNING in cbs_dequeue_soft
net
|
C |
done |
|
13 |
1477d |
1484d
|
13/25 |
1476d |
1c6c09a0ae62
net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate
|
general protection fault in packet_lookup_frame
net
|
C |
done |
|
7 |
1509d |
1509d
|
13/25 |
1485d |
32d3182cd2cd
net/packet: fix race in tpacket_snd()
|
memory leak in ip6_mc_add_src
net
|
C |
|
|
1 |
1496d |
1496d
|
13/25 |
1485d |
a84d01647989
mld: fix memory leak in mld_del_delrec()
|
KASAN: use-after-free Read in rxrpc_queue_local
afs
net
|
C |
done |
|
1 |
1511d |
1510d
|
13/25 |
1485d |
06d9532fa6b3
rxrpc: Fix read-after-free in rxrpc_queue_local()
|
general protection fault in tls_write_space
net
|
syz |
|
|
33 |
1503d |
1513d
|
13/25 |
1485d |
57c722e932cf
net/tls: swap sk_write_space on close
|
KMSAN: uninit-value in rtm_new_nexthop
net
|
C |
|
|
8 |
1501d |
1501d
|
13/25 |
1485d |
d00ee64e1dcf
netlink: Fix nlmsg_parse as a wrapper for strict message parsing
|
kernel BUG at net/rxrpc/local_object.c:LINE!
afs
net
|
C |
done |
|
11167 |
1489d |
1556d
|
13/25 |
1485d |
730c5fd42c1e
rxrpc: Fix local endpoint refcounting
|
KMSAN: uninit-value in rtm_dump_nexthop
net
|
C |
|
|
6 |
1495d |
1512d
|
13/25 |
1485d |
d00ee64e1dcf
netlink: Fix nlmsg_parse as a wrapper for strict message parsing
|
KASAN: slab-out-of-bounds Read in usbnet_generic_cdc_bind
net
usb
|
C |
|
|
2 |
1509d |
1510d
|
13/25 |
1485d |
54364278fb3c
USB: CDC: fix sanity checks in CDC union parser
|
BUG: corrupted list in rxrpc_local_processor
afs
net
|
C |
done |
|
1679 |
1505d |
1513d
|
13/25 |
1485d |
b00df840fb40
rxrpc: Fix local endpoint replacement
|
KASAN: use-after-free Write in __xfrm_policy_unlink (2)
net
|
|
|
|
7 |
1553d |
1598d
|
13/25 |
1490d |
b805d78d300b
xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink
|
WARNING: ODEBUG bug in tls_sw_free_resources_tx
net
|
|
|
|
23 |
1530d |
1789d
|
13/25 |
1495d |
f87e62d45e51
net/tls: remove close callback sock unlock/lock around TX work flush
|
general protection fault in tls_trim_both_msgs
net
|
C |
done |
|
36 |
1517d |
1529d
|
13/25 |
1495d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
KASAN: invalid-free in tls_sk_proto_cleanup
net
|
|
|
|
5 |
1520d |
1523d
|
13/25 |
1495d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
BUG: unable to handle kernel paging request in tls_prots
bpf
net
|
syz |
done |
|
1 |
1558d |
1558d
|
13/25 |
1495d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
KASAN: use-after-free Read in tls_wait_data
net
|
|
|
|
1 |
1521d |
1514d
|
13/25 |
1495d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
WARNING: ODEBUG bug in __sk_destruct
net
s390
|
C |
|
|
2855 |
1515d |
1980d
|
13/25 |
1495d |
f9cedf1a9b1c
net/smc: do not schedule tx_work in SMC_CLOSED state
|
general protection fault in tls_tx_records
net
|
|
|
|
1 |
1522d |
1514d
|
13/25 |
1495d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
memory leak in create_ctx
net
|
syz |
|
|
1 |
1575d |
1575d
|
13/25 |
1495d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
KASAN: use-after-free Read in tls_sk_proto_cleanup
net
|
|
|
|
9 |
1518d |
1529d
|
13/25 |
1495d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
general protection fault in tls_setsockopt
net
|
syz |
done |
|
7 |
1524d |
1537d
|
13/25 |
1495d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
KASAN: use-after-free Read in tls_push_sg
net
|
|
|
|
2 |
1524d |
1597d
|
13/25 |
1502d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
possible deadlock in xsk_notifier
bpf
net
|
C |
done |
|
495 |
1534d |
1546d
|
13/25 |
1509d |
5464c3a0e9a0
xdp: fix potential deadlock on socket mutex
|
general protection fault in send_hsr_supervision_frame
net
|
C |
done |
|
1395 |
1538d |
1546d
|
13/25 |
1517d |
311633b60406
hsr: switch ->dellink() to ->ndo_uninit()
|
memory leak in ip_mc_add_src (2)
net
|
C |
|
|
7 |
1528d |
1557d
|
13/25 |
1517d |
e5b1c6c6277d
igmp: fix memory leak in igmpv3_del_delrec()
|
general protection fault in ip6_datagram_dst_update
net
|
C |
done |
|
12 |
1541d |
1544d
|
13/25 |
1517d |
8975a3abc303
ipv6: fix potential crash in ip6_datagram_dst_update()
|
KASAN: use-after-free Read in ip_expire
net
|
|
|
|
1 |
1566d |
1566d
|
13/25 |
1517d |
d5dd88794a13
inet: fix various use-after-free in defrags units
|
KMSAN: uninit-value in bond_start_xmit (2)
net
|
C |
|
|
2309 |
1517d |
1841d
|
13/25 |
1517d |
9d1bc24b52fb
bonding: validate ip header before check IPPROTO_IGMP
|
memory leak in pfkey_xfrm_policy2msg_prep
net
|
C |
|
|
4 |
1558d |
1589d
|
13/25 |
1517d |
7c80eb1c7e2b
af_key: fix leaks in key_pol_get_resp and dump_sp.
|
KASAN: use-after-free Read in kfree_skb_list
net
|
C |
done |
|
383 |
1564d |
1582d
|
13/25 |
1517d |
b7034146756b
net: fix use-after-free in kfree_skb_list
|
memory leak in __ip6_append_data
net
|
C |
|
|
10 |
1560d |
1586d
|
13/25 |
1517d |
dc93f46bc4e0
inet: frags: fix use-after-free read in inet_frag_destroy_rcu
|
KASAN: use-after-free Write in xfrm_hash_rebuild
net
|
syz |
done |
|
8 |
1550d |
1598d
|
13/25 |
1517d |
fd709721352d
xfrm: policy: fix bydst hlist corruption on hash rebuild
|
WARNING: suspicious RCU usage in in_dev_dump_addr
net
|
C |
done |
|
107 |
1578d |
1580d
|
13/25 |
1517d |
d3e6e285fff3
net: ipv4: fix rcu lockdep splat due to wrong annotation
|
general protection fault in tcp_v6_send_reset
net
|
C |
done |
|
353 |
1573d |
1577d
|
13/25 |
1517d |
392096736a06
ipv6: tcp: fix potential NULL deref in tcp_v6_send_reset()
|
KASAN: use-after-free Read in inet_frag_destroy_rcu
net
|
C |
done |
|
61 |
1585d |
1587d
|
13/25 |
1517d |
dc93f46bc4e0
inet: frags: fix use-after-free read in inet_frag_destroy_rcu
|
KASAN: use-after-free Read in rhashtable_last_table (2)
net
|
|
|
|
1 |
1591d |
1591d
|
13/25 |
1517d |
dc93f46bc4e0
inet: frags: fix use-after-free read in inet_frag_destroy_rcu
|
general protection fault in rxrpc_connect_call
afs
net
|
C |
done |
|
15 |
1566d |
1712d
|
13/25 |
1517d |
e835ada07091
rxrpc: Fix send on a connected, but unbound socket
|
WARNING: suspicious RCU usage in fib_dump_info_fnhe
net
|
C |
done |
|
7 |
1557d |
1558d
|
13/25 |
1517d |
3b525691529b
ipv6: fix suspicious RCU usage in rt6_dump_route()
|
memory leak in hsr_create_self_node
net
|
C |
|
|
5 |
1556d |
1587d
|
13/25 |
1517d |
b9a1e627405d
hsr: implement dellink to clean up resources
|
general protection fault in call_fib6_multipath_entry_notifiers
net
|
C |
done |
|
94 |
1559d |
1564d
|
13/25 |
1517d |
9eee3b4913d7
ipv6: Error when route does not have any valid nexthops
|
memory leak in packet_set_ring
net
|
C |
|
|
2 |
1557d |
1561d
|
13/25 |
1524d |
55655e3d1197
net/packet: fix memory leak in packet_set_ring()
|
general protection fault in inet_accept
net
|
C |
|
|
131 |
1746d |
1907d
|
13/25 |
1542d |
07603b230895
net/smc: propagate file from SMC to TCP socket
|
BUG: unable to handle kernel paging request in ipv6_rcv (2)
net
|
|
|
|
18 |
1565d |
1589d
|
13/25 |
1543d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KMSAN: uninit-value in tcp_create_openreq_child
net
|
C |
|
|
4000 |
1544d |
1565d
|
13/25 |
1543d |
85f9aa7565bd
inet: clear num_timeout reqsk_alloc()
|
KASAN: slab-out-of-bounds Read in dst_dev_put
net
|
|
|
|
3 |
1677d |
1728d
|
13/25 |
1543d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KASAN: use-after-free Read in pneigh_get_next
net
|
syz |
done |
|
2 |
1568d |
1568d
|
13/25 |
1543d |
f3e92cb8e2eb
neigh: fix use-after-free read in pneigh_get_next
|
KASAN: slab-out-of-bounds Read in __fib6_drop_pcpu_from
net
|
|
|
|
1 |
1568d |
1567d
|
13/25 |
1543d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
memory leak in inet6_create
net
|
C |
|
|
2 |
1574d |
1577d
|
13/25 |
1543d |
522924b58308
net: correct udp zerocopy refcnt also when zerocopy only on append
|
general protection fault in rt_cache_valid
net
|
|
|
|
24 |
1561d |
1688d
|
13/25 |
1543d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KASAN: use-after-free Read in sprintf
net
|
syz |
done |
|
2 |
1568d |
1568d
|
13/25 |
1543d |
f3e92cb8e2eb
neigh: fix use-after-free read in pneigh_get_next
|
general protection fault in dst_dev_put (2)
net
|
C |
done |
|
442 |
1565d |
1754d
|
13/25 |
1543d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KASAN: slab-out-of-bounds Read in rt_cache_valid
net
|
|
|
|
3 |
1581d |
1580d
|
13/25 |
1543d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
BUG: unable to handle kernel paging request in dst_dev_put
net
|
|
|
|
3 |
1585d |
1728d
|
13/25 |
1543d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
KASAN: use-after-free Read in rt_cache_valid
net
|
syz |
done |
|
5 |
1575d |
1691d
|
13/25 |
1543d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
memory leak in new_inode_pseudo
s390
net
|
C |
|
|
136 |
1544d |
1592d
|
13/25 |
1543d |
355e8d26f719
io_uring: fix memory leak of UNIX domain socket inode
|
memory leak in packet_setsockopt
net
|
C |
|
|
10 |
1577d |
1593d
|
13/25 |
1564d |
afa0925c6fcc
packet: unconditionally free po->rollover
|
KASAN: wild-memory-access Read in refcount_sub_and_test_checked
net
|
|
|
|
2 |
1584d |
1600d
|
13/25 |
1565d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
KASAN: use-after-free Read in ip6_fragment
net
|
|
|
|
1 |
1596d |
1596d
|
13/25 |
1565d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
BUG: unable to handle kernel NULL pointer dereference in ip6_rcv_finish
net
|
|
|
|
3 |
1572d |
1600d
|
13/25 |
1565d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
KASAN: use-after-free Write in fib6_purge_rt
net
|
|
|
|
2 |
1590d |
1598d
|
13/25 |
1565d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
KASAN: null-ptr-deref Write in fib6_purge_rt
net
|
|
|
|
18 |
1579d |
1602d
|
13/25 |
1565d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
memory leak in ip_mc_add_src
net
|
C |
|
|
14 |
1570d |
1593d
|
13/25 |
1565d |
3580d04aa674
ipv4/igmp: fix another memory leak in igmpv3_del_delrec()
|
memory leak in llc_ui_create
net
|
C |
|
|
4 |
1575d |
1588d
|
13/25 |
1565d |
8fb44d60d414
llc: fix skb leak in llc_build_and_send_ui_pkt()
|
memory leak in inet_create
net
|
C |
|
|
2 |
1579d |
1593d
|
13/25 |
1565d |
100f6d8e0990
net: correct zerocopy refcnt with udp MSG_MORE
|
KASAN: slab-out-of-bounds Write in fib6_purge_rt
net
|
|
|
|
6 |
1566d |
1601d
|
13/25 |
1565d |
61fb0d016807
ipv6: prevent possible fib6 leaks
|
KASAN: use-after-free Read in __dev_map_entry_free
net
bpf
|
C |
|
|
473 |
1647d |
1928d
|
13/25 |
1565d |
2baae3545327
bpf: devmap: fix use-after-free Read in __dev_map_entry_free
|
BUG: assuming atomic context at net/core/flow_dissector.c:LINE
net
|
syz |
|
|
19 |
1600d |
1604d
|
13/25 |
1569d |
b1c17a9a3538
flow_dissector: disable preemption around BPF calls
|
KASAN: use-after-free Read in tcp_v6_send_reset
net
|
|
|
|
1 |
1650d |
1650d
|
13/25 |
1569d |
4f661542a402
tcp: fix zerocopy and notsent_lowat issues
|
KASAN: slab-out-of-bounds Write in skb_release_data
net
|
|
|
|
1 |
1649d |
1649d
|
13/25 |
1569d |
4f661542a402
tcp: fix zerocopy and notsent_lowat issues
|
general protection fault in __handle_mm_fault
net
|
C |
error |
|
17 |
1812d |
1821d
|
13/25 |
1573d |
ff09d7ec9786
mm/memory.c: recheck page table entry with page table lock held
|
WARNING in xfrm_state_fini (2)
net
|
C |
|
|
37510 |
1612d |
2064d
|
13/25 |
1587d |
dbb2483b2a46
xfrm: clean up xfrm protocol checks
|
KMSAN: uninit-value in rtnl_stats_dump
net
|
syz |
|
|
14 |
1618d |
1632d
|
13/25 |
1587d |
69f23a09daf9
rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
|
WARNING: suspicious RCU usage in fib_compute_spec_dst
net
|
|
|
|
1 |
1631d |
1631d
|
13/25 |
1587d |
c543cb4a5f07
ipv4: ensure rcu_read_lock() in ipv4_link_failure()
|
KASAN: slab-out-of-bounds Read in skb_gro_receive (2)
net
|
C |
done |
|
5 |
1613d |
1613d
|
13/25 |
1587d |
4dd2b82d5adf
udp: fix GRO packet of death
|
KASAN: stack-out-of-bounds Write in __ip_options_echo
net
|
syz |
done |
|
8 |
1621d |
1625d
|
13/25 |
1587d |
20ff83f10f11
ipv4: add sanity checks in ipv4_link_failure()
|
WARNING in wiphy_register (4)
net
wireless
|
syz |
error |
|
3 |
1631d |
1660d
|
13/25 |
1587d |
45fcef8b727b
mac80211_hwsim: calculate if_combination.max_interfaces
|
general protection fault in ieee80211_debugfs_rename_netdev
wireless
net
|
|
|
|
8 |
1616d |
1630d
|
13/25 |
1587d |
517879147493
mac80211: don't attempt to rename ERR_PTR() debugfs dirs
|
KMSAN: uninit-value in rtnl_stats_get
net
|
C |
|
|
5 |
1625d |
1632d
|
13/25 |
1587d |
69f23a09daf9
rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
|
kernel BUG at net/core/net-sysfs.c:LINE!
net
|
C |
done |
|
890 |
1617d |
1653d
|
13/25 |
1587d |
8ed633b9baf9
Revert "net-sysfs: Fix memory leak in netdev_register_kobject"
|
WARNING: refcount bug in l2tp_tunnel_get
net
|
|
|
|
1 |
1615d |
1615d
|
13/25 |
1587d |
a622b40035d1
l2ip: fix possible use-after-free
|
KASAN: user-memory-access Write in fib6_purge_rt
net
|
|
|
|
6 |
1589d |
1618d
|
13/25 |
1587d |
0e2338749192
ipv6: fix races in ip6_dst_destroy()
|
INFO: task hung in vhost_net_stop_vq
net
virt
kvm
|
C |
done |
|
136 |
1627d |
1765d
|
13/25 |
1587d |
813dbeb656d6
vhost: reject zero size iova range
|
WARNING: locking bug in icmp_send
net
|
syz |
done |
|
1 |
1684d |
1684d
|
13/25 |
1605d |
9926cb5f8b0f
tipc: change to check tipc_own_id to return in tipc_net_stop
|
KMSAN: uninit-value in ip6_compressed_string
net
nfs
|
C |
|
|
9024 |
1615d |
1767d
|
13/25 |
1615d |
7c2bd9a39845
NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
|
BUG: corrupted list in rhashtable_walk_enter
net
|
syz |
error |
|
3 |
1652d |
1651d
|
13/25 |
1633d |
b5f9bd15b885
ila: Fix rhashtable walker list corruption
|
BUG: unable to handle kernel paging request in ip6_fragment
net
|
|
|
|
1 |
1648d |
1647d
|
13/25 |
1633d |
ef0efcd3bd3f
ipv6: Fix dangling pointer when ipv6 fragment
|
WARNING: lock held when returning to user space in tun_get_user
net
|
C |
done |
|
55 |
1659d |
1660d
|
13/25 |
1634d |
9180bb4f0460
tun: add a missing rcu_read_unlock() in error path
|
general protection fault in fib6_purge_rt
net
|
C |
done |
|
60 |
1636d |
1753d
|
13/25 |
1634d |
9926cb5f8b0f
tipc: change to check tipc_own_id to return in tipc_net_stop
|
KASAN: slab-out-of-bounds Read in icmp6_send
net
|
|
|
|
1 |
1662d |
1662d
|
13/25 |
1634d |
4477138fa0ae
tun: properly test for IFF_UP
|
KASAN: use-after-free Read in __icmp_send
net
|
|
|
|
1 |
1653d |
1649d
|
13/25 |
1634d |
4477138fa0ae
tun: properly test for IFF_UP
|
general protection fault in tc_ctl_chain
net
|
C |
|
|
21 |
1682d |
1690d
|
12/25 |
1647d |
af736bf071e8
net: sched: potential NULL dereference in tcf_block_find()
|
KASAN: use-after-free Read in unix_dgram_poll
net
|
syz |
|
|
2 |
1676d |
1673d
|
12/25 |
1647d |
84c4e1f89fef
aio: simplify - and fix - fget/fput for io_submit()
|
KMSAN: uninit-value in gue6_err (2)
net
|
C |
|
|
2826 |
1647d |
1670d
|
12/25 |
1647d |
5355ed6388e2
fou, fou6: avoid uninit-value in gue_err() and gue6_err()
|
kernel BUG at kernel/time/timer.c:LINE! (3)
net
|
|
|
|
1 |
1668d |
1668d
|
12/25 |
1647d |
1e027960edfa
net/hsr: fix possible crash in add_timer()
|
BUG: unable to handle kernel paging request in gro_cells_destroy (3)
net
|
|
|
|
3 |
1649d |
1666d
|
12/25 |
1647d |
2a5ff07a0eb9
gro_cells: make sure device is up in gro_cells_receive()
|
KMSAN: kernel-infoleak in move_addr_to_user (2)
net
|
C |
|
|
8 |
1649d |
1663d
|
12/25 |
1647d |
163d1c3d6f17
l2tp: fix infoleak in l2tp_ip6_recvmsg()
|
general protection fault in xsk_diag_dump
bpf
net
|
C |
|
|
5 |
1665d |
1671d
|
12/25 |
1647d |
915905f8b1d4
xsk: fix potential crash in xsk_diag_put_umem()
|
KMSAN: uninit-value in gue_err (2)
net
|
C |
|
|
1617 |
1647d |
1670d
|
12/25 |
1647d |
5355ed6388e2
fou, fou6: avoid uninit-value in gue_err() and gue6_err()
|
KASAN: slab-out-of-bounds Read in xfrm_policy_insert_list
net
|
|
|
|
1 |
1721d |
1721d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: use-after-free Write in __xfrm_policy_unlink
net
|
C |
|
|
254 |
1673d |
1901d
|
12/25 |
1670d |
1548bc4e0512
xfrm: policy: delete inexact policies from inexact list on hash rebuild
|
KASAN: use-after-free Read in xfrm_migrate
net
|
|
|
|
5 |
1705d |
1728d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in xfrm_policy_insert_list
net
|
|
|
|
2 |
1719d |
1730d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: use-after-free Read in __smc_diag_dump
s390
net
|
syz |
|
|
34 |
1720d |
1732d
|
12/25 |
1670d |
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
KASAN: slab-out-of-bounds Read in xfrm_policy_lookup_bytype
net
|
|
|
|
6 |
1723d |
1745d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: use-after-free Read in kernel_accept
net
s390
|
C |
|
|
19 |
1752d |
1902d
|
12/25 |
1670d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
KASAN: use-after-free Read in xfrm_policy_insert_list
net
|
|
|
|
30 |
1705d |
1746d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in __skb_flow_dissect (3)
net
|
syz |
|
|
224 |
1720d |
1809d
|
12/25 |
1670d |
0b7959b62573
tun: publish tfile after it's fully initialized
|
INFO: rcu detected stall in pfkey_sendmsg
net
|
|
|
|
7 |
1721d |
1746d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
general protection fault in kernel_accept
net
s390
|
C |
|
|
280 |
1746d |
1907d
|
12/25 |
1670d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
KMSAN: kernel-infoleak in move_addr_to_user
net
|
|
|
|
5 |
1677d |
1727d
|
12/25 |
1670d |
7d033c9f6a7f
ipv6: fix kernel-infoleak in ipv6_local_error()
|
BUG: unable to handle kernel paging request in depot_save_stack
net
|
C |
|
|
1 |
1730d |
1730d
|
12/25 |
1670d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
KASAN: global-out-of-bounds Read in validate_nla
net
wireless
|
C |
|
|
14 |
1705d |
1710d
|
12/25 |
1670d |
a8b5c6d69261
nl80211: fix NLA_POLICY_NESTED() arguments
|
KASAN: slab-out-of-bounds Read in __xfrm_policy_bysel_ctx
net
|
|
|
|
1 |
1732d |
1731d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in tcp_send_loss_probe
net
|
C |
|
|
9 |
1680d |
1732d
|
12/25 |
1670d |
bf50b606cfd8
tcp: repaired skbs must init their tso_segs
|
KASAN: stack-out-of-bounds Read in pick_next_task_fair
net
|
C |
|
|
1 |
1730d |
1730d
|
12/25 |
1670d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
general protection fault in icmp6_send
net
|
syz |
|
|
2 |
1731d |
1731d
|
12/25 |
1670d |
8d9336704521
ipv6: make icmp6_send() robust against null skb->dev
|
WARNING in clear_standby
ceph
net
|
C |
|
|
3522 |
1710d |
1835d
|
12/25 |
1670d |
4aac9228d164
libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive()
|
general protection fault in __xfrm_policy_bysel_ctx
net
|
|
|
|
1 |
1707d |
1706d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: slab-out-of-bounds Read in xfrm_policy_inexact_insert
net
|
|
|
|
3 |
1722d |
1745d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
general protection fault in team_nl_cmd_options_set
net
|
C |
|
|
7 |
1739d |
1697d
|
12/25 |
1670d |
2fdeee254923
team: avoid complex list operations in team_nl_cmd_options_set()
|
KASAN: slab-out-of-bounds Write in __xfrm_policy_unlink
net
|
|
|
|
34 |
1705d |
1785d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
INFO: rcu detected stall in xfrm_hash_rebuild
net
|
|
|
|
77 |
1705d |
1756d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in wiphy_register (3)
net
wireless
|
syz |
|
|
31 |
1705d |
1736d
|
12/25 |
1670d |
9c5d3afac436
mac80211_hwsim: check that n_limits makes sense
|
general protection fault in xfrm_policy_insert_list
net
|
|
|
|
4 |
1727d |
1741d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
BUG: unable to handle kernel NULL pointer dereference in setup_kmem_cache_node
net
v9fs
|
|
|
|
3 |
1732d |
1732d
|
12/25 |
1670d |
09c2e76ed734
slab: alien caches must not be initialized if the allocation of the alien cache failed
|
general protection fault in xfrm_policy_lookup_bytype
net
|
|
|
|
5 |
1705d |
1735d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: slab-out-of-bounds Read in __pskb_copy_fclone
net
|
|
|
|
22 |
1752d |
1818d
|
12/25 |
1670d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
kernel panic: stack is corrupted in udp4_lib_lookup2
net
|
|
|
|
11 |
1735d |
1731d
|
12/25 |
1670d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
KASAN: stack-out-of-bounds Read in gue_err_proto_handler
net
|
C |
|
|
1 |
1727d |
1727d
|
12/25 |
1670d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
KASAN: use-after-free Read in __xfrm_policy_bysel_ctx
net
|
|
|
|
11 |
1705d |
1742d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KASAN: use-after-free Read in xfrm_policy_inexact_insert
net
|
|
|
|
42 |
1705d |
1735d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
INFO: rcu detected stall in ipv6_rcv
net
|
|
|
|
7 |
1707d |
1744d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
KMSAN: uninit-value in gue_err
net
|
C |
|
|
4686 |
1670d |
1724d
|
12/25 |
1670d |
26fc181e6cac
fou, fou6: do not assume linear skbs
|
general protection fault in ip6erspan_set_version
net
|
C |
|
|
39 |
1679d |
1684d
|
12/25 |
1670d |
efcc9bcaf77c
net: ip6_gre: fix possible NULL pointer dereference in ip6erspan_set_version
|
KASAN: use-after-free Read in xfrm_policy_lookup_bytype
net
|
|
|
|
33 |
1705d |
1745d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING in xfrm6_tunnel_net_exit (2)
net
|
C |
|
|
48816 |
1679d |
1961d
|
12/25 |
1670d |
f75a2804da39
xfrm: destroy xfrm_state synchronously on net exit path
|
WARNING in xfrm_policy_inexact_gc_tree
net
|
|
|
|
645 |
1705d |
1756d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING: refcount bug in xfrm_policy_bysel_ctx
net
|
|
|
|
1 |
1723d |
1723d
|
12/25 |
1670d |
12750abad517
xfrm: policy: fix infinite loop when merging src-nodes
|
WARNING: bad unlock balance in rxrpc_recvmsg
afs
net
|
C |
|
|
9 |
1696d |
1700d
|
12/25 |
1670d |
6dce3c20ac42
rxrpc: bad unlock balance in rxrpc_recvmsg
|
KMSAN: uninit-value in gue6_err
net
|
C |
|
|
8359 |
1670d |
1724d
|
12/25 |
1670d |
26fc181e6cac
fou, fou6: do not assume linear skbs
|
general protection fault in finish_wait
net
|
C |
|
|
22 |
1694d |
1909d
|
12/25 |
1676d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
|
KASAN: out-of-bounds Write in tls_push_record
net
|
C |
|
|
10 |
1810d |
1911d
|
12/25 |
1677d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
KASAN: use-after-free Read in tls_tx_records
net
|
|
|
|
1 |
1828d |
1828d
|
12/25 |
1677d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
general protection fault in tls_push_sg
net |