WARNING in rds_conn_connect_if_down
rds
|
-1 |
C |
error |
|
17 |
520d |
851d
|
25/29 |
486d |
c055fc00c07b
net/rds: fix WARNING in rds_conn_connect_if_down
|
possible deadlock in rds_wake_sk_sleep (4)
rds
|
4 |
C |
error |
|
16 |
550d |
1178d
|
25/29 |
500d |
f1acf1ac84d2
net:rds: Fix possible deadlock in rds_message_put
|
possible deadlock in rds_message_put
rds
|
4 |
C |
done |
error |
5 |
637d |
949d
|
25/29 |
500d |
f1acf1ac84d2
net:rds: Fix possible deadlock in rds_message_put
|
possible deadlock in rds_tcp_reset_callbacks
rds
|
4 |
C |
error |
|
1458 |
1006d |
1084d
|
22/29 |
897d |
a91b750fd662
net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks()
|
WARNING: refcount bug in rds_tcp_tune
rds
|
13 |
|
|
|
166 |
1185d |
1194d
|
22/29 |
897d |
6997fbd7a3da
net: rds: use maybe_get_net() when acquiring refcount on TCP sockets
|
BUG: unable to handle kernel NULL pointer dereference in rds_bind
rds
|
10 |
C |
done |
|
51 |
2143d |
2154d
|
13/29 |
2125d |
05733434ee9a
net/rds: Check laddr_check before calling it
|
general protection fault in rds_recv_rcvbuf_delta
rds
|
2 |
C |
done |
|
35 |
2235d |
2462d
|
13/29 |
2131d |
c5c1a030a7db
net/rds: An rds_sock is added too early to the hash table
|
KMSAN: uninit-value in rds_connect
rds
|
7 |
C |
|
|
952 |
2294d |
2536d
|
12/29 |
2266d |
dd3ac9a68435
net/rds: Check address length before reading address family
|
KMSAN: uninit-value in rds_bind
rds
|
7 |
C |
|
|
6202 |
2294d |
2536d
|
12/29 |
2266d |
dd3ac9a68435
net/rds: Check address length before reading address family
|
WARNING: refcount bug in rds_sock_addref
rds
|
13 |
|
|
|
1 |
2382d |
2382d
|
11/29 |
2348d |
6fa19f5637a6
rds: fix refcount bug in rds_sock_addref
|
WARNING in rds_message_alloc_sgs
rds
|
-1 |
C |
|
|
6 |
2441d |
2475d
|
11/29 |
2403d |
ea010070d0a7
net/rds: fix warn in rds_message_alloc_sgs
|
KASAN: use-after-free Read in __rhashtable_lookup (2)
rds
|
19 |
C |
|
|
22 |
2523d |
2543d
|
10/29 |
2509d |
cc4dfb7f70a3
rds: fix two RCU related problems
|
general protection fault in rds_ib_get_mr
rds
|
2 |
C |
|
|
9 |
2599d |
2698d
|
8/29 |
2558d |
9e630bcb7701
RDS: RDMA: Fix the NULL-ptr deref in rds_ib_get_mr
|
KASAN: use-after-free Read in rds_cong_queue_updates
rds
|
19 |
C |
|
|
18168 |
2593d |
2725d
|
8/29 |
2588d |
f1693c63ab13
rds: avoid unenecessary cong_update in loop transport
c809195f5523
rds: clean up loopback rds_connections on netns deletion
|
WARNING: suspicious RCU usage in rds_loop_conn_alloc
rds
|
4 |
C |
|
|
34303 |
2727d |
2735d
|
5/29 |
2615d |
d4014d8cc6df
rds: do not call ->conn_alloc with GFP_KERNEL
|
WARNING in __local_bh_enable_ip (2)
rds
|
-1 |
|
|
|
23 |
2694d |
2705d
|
5/29 |
2650d |
53d0e83f9329
rds: tcp: must use spin_lock_irq* and not spin_lock_bh with rds_tcp_conn_lock
|
general protection fault in rds_sendmsg
rds
|
2 |
C |
|
|
2 |
2725d |
2725d
|
5/29 |
2650d |
79a5b9727a1c
rds: rds_msg_zcopy should return error of null rm->data.op_mmp_znotifier
|
KASAN: use-after-free Read in rds_find_bound
rds
|
19 |
|
|
|
1 |
2783d |
2779d
|
4/29 |
2732d |
ebeeb1ad9b8a
rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
|
KASAN: use-after-free Read in rds_tcp_tune
rds
|
19 |
|
|
|
12 |
2756d |
2766d
|
4/29 |
2733d |
ebeeb1ad9b8a
rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
|
KASAN: use-after-free Read in rds_tcp_dev_event
rds
|
19 |
|
|
|
1 |
2838d |
2832d
|
4/29 |
2733d |
681648e67d43
rds: tcp: correctly sequence cleanup on netns deletion.
|
KASAN: stack-out-of-bounds Read in rds_sendmsg
rds
|
17 |
C |
|
|
120 |
2776d |
2800d
|
4/29 |
2746d |
14e138a86f63
RDS: Check cmsg_len before dereferencing CMSG_DATA
|
general protection fault in __rds_rdma_map
rds
|
2 |
C |
|
|
12 |
2800d |
2812d
|
4/29 |
2748d |
f3069c6d33f6
rds: Fix NULL pointer dereference in __rds_rdma_map
|
WARNING in rds_cmsg_rdma_args
rds
|
-1 |
C |
|
|
6 |
2775d |
2775d
|
3/29 |
2760d |
c095508770ae
RDS: Heap OOB write in rds_message_alloc_sgs()
|