|
KASAN: null-ptr-deref Read in smc_tcp_syn_recv_sock
smc
|
11 |
C |
error |
inconclusive |
24 |
14d |
358d
|
26/29 |
never |
6d5e4538364b
net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock()
|
|
general protection fault in __smc_diag_dump (4)
smc
|
2 |
C |
done |
|
6 |
153d |
188d
|
29/29 |
127d |
f584239a9ed2
net/smc: fix general protection fault in __smc_diag_dump
|
|
KASAN: use-after-free Read in __pnet_find_base_ndev
smc
|
19 |
|
|
|
2 |
182d |
195d
|
29/29 |
146d |
3d3466878afd
smc: Fix use-after-free in __pnet_find_base_ndev().
|
|
possible deadlock in smc_diag_dump_proto
smc
|
4 |
C |
error |
|
113 |
201d |
203d
|
29/29 |
146d |
5d6b58c932ec
net: lockless sock_i_ino()
|
|
possible deadlock in smc_shutdown (3)
smc
|
4 |
|
|
|
2 |
180d |
207d
|
29/29 |
146d |
9f7c02e03157
nbd: restrict sockets to TCP and UDP
|
|
general protection fault in __smc_diag_dump (3)
smc
|
2 |
C |
error |
|
102 |
209d |
503d
|
29/29 |
201d |
60ada4fe644e
smc: Fix various oops due to inet_sock type confusion.
|
|
possible deadlock in smc_switch_to_fallback (2)
smc
|
4 |
C |
error |
done |
27435 |
330d |
638d
|
29/29 |
263d |
752e2217d789
smc: Fix lockdep false-positive for IPPROTO_SMC.
|
|
general protection fault in __smc_diag_dump (2)
smc
|
2 |
|
|
|
14 |
519d |
573d
|
28/29 |
519d |
98d4435efcbf
net/smc: prevent NULL pointer dereference in txopt_get
|
|
BUG: MAX_LOCK_DEPTH too low! (3)
smc
|
-1 |
C |
done |
|
18 |
1496d |
1505d
|
22/29 |
1125d |
1de9770d121e
net/smc: Avoid overwriting the copies of clcsock callback functions
|
|
KASAN: slab-out-of-bounds Read in smc_fback_error_report
smc
|
19 |
C |
error |
|
72 |
1427d |
1503d
|
22/29 |
1125d |
0558226cebee
net/smc: Fix slab-out-of-bounds issue in fallback
|
|
inconsistent lock state in smc_fback_state_change
smc
|
4 |
C |
error |
|
7 |
1216d |
1222d
|
22/29 |
1125d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
|
general protection fault in smc_pnet_add (2)
smc
|
2 |
C |
inconclusive |
|
590 |
1440d |
1455d
|
22/29 |
1125d |
d22f4f977236
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
|
|
WARNING: refcount bug in smc_pnet_add
smc
|
13 |
C |
done |
|
98 |
1494d |
1508d
|
22/29 |
1125d |
28f922213886
net/smc: fix ref_tracker issue in smc_pnet_add()
|
|
memory leak in smc_sysctl_net_init
smc
|
3 |
C |
|
|
8 |
1456d |
1461d
|
22/29 |
1125d |
5ae6acf1d00b
net/smc: fix a memory leak in smc_sysctl_net_exit()
|
|
memory leak in smc_create (2)
smc
|
3 |
C |
|
|
2 |
1461d |
1457d
|
22/29 |
1125d |
1a74e9932374
net/smc: Fix sock leak when release after smc_shutdown()
|
|
general protection fault in smc_pnet_add
smc
|
2 |
|
|
|
578 |
1478d |
1533d
|
20/29 |
1477d |
7b9b1d449a7c
net/smc: fix possible NULL deref in smc_pnet_add_eth()
|
|
possible deadlock in smc_switch_to_fallback
smc
|
4 |
|
|
|
43575 |
1567d |
1586d
|
20/29 |
1477d |
7a61432dc813
net/smc: Avoid warning of possible recursive locking
|
|
general protection fault in smc_tx_sendmsg
smc
|
2 |
C |
done |
|
6369 |
1730d |
1738d
|
20/29 |
1596d |
17081633e22d
net/smc: Ensure correct state of the socket in send path
|
|
KASAN: global-out-of-bounds Read in smc_nl_get_sys_info
smc
|
17 |
C |
error |
|
27 |
1894d |
1921d
|
19/29 |
1841d |
25fe2c9c4cd2
smc: fix out of bound access in smc_nl_get_sys_info()
|
|
KASAN: slab-out-of-bounds Read in smc_nl_handle_smcr_dev
smc
|
17 |
|
|
|
1 |
1924d |
1920d
|
19/29 |
1841d |
995433b795ce
net/smc: fix access to parent of an ib device
|
|
BUG: unable to handle kernel paging request in smc_nl_handle_smcr_dev
smc
|
8 |
C |
|
|
16 |
1910d |
1933d
|
19/29 |
1841d |
995433b795ce
net/smc: fix access to parent of an ib device
|
|
WARNING: refcount bug in smc_release (3)
smc
|
13 |
|
|
|
1 |
2035d |
2024d
|
15/29 |
2007d |
5fb8642a17aa
net/smc: fix sock refcounting in case of termination
|
|
WARNING: ODEBUG bug in smc_ib_remove_dev
smc
|
-1 |
|
|
|
52 |
2200d |
2214d
|
15/29 |
2169d |
ece0d7bd7461
net/smc: cancel event worker during device removal
|
|
general protection fault in smc_ib_remove_dev
smc
|
2 |
C |
done |
|
98 |
2209d |
2221d
|
15/29 |
2169d |
a2f2ef4a54c0
net/smc: check for valid ib_client_data
|
|
WARNING: refcount bug in smc_release (2)
smc
|
13 |
C |
done |
|
9 |
2289d |
2312d
|
15/29 |
2231d |
86434744fedf
net/smc: add fallback check to connect()
|
|
WARNING in smc_unhash_sk (3)
smc
|
-1 |
C |
done |
|
362 |
2311d |
2401d
|
14/29 |
2307d |
8204df72bea1
net/smc: fix fastopen for non-blocking connect()
|
|
memory leak in smc_create
smc
|
3 |
C |
|
|
19 |
2320d |
2333d
|
14/29 |
2307d |
6d6dd528d5af
net/smc: fix refcount non-blocking connect() -part 2
|
|
WARNING: refcount bug in smc_release
smc
|
13 |
C |
done |
|
8 |
2321d |
2344d
|
13/29 |
2314d |
301428ea3708
net/smc: fix refcounting for non-blocking connect()
|
|
WARNING: ODEBUG bug in __sk_destruct
smc
|
-1 |
C |
|
|
2855 |
2421d |
2886d
|
12/29 |
2401d |
f9cedf1a9b1c
net/smc: do not schedule tx_work in SMC_CLOSED state
|
|
memory leak in new_inode_pseudo
smc
|
3 |
C |
|
|
136 |
2450d |
2498d
|
12/29 |
2449d |
355e8d26f719
io_uring: fix memory leak of UNIX domain socket inode
|
|
KASAN: use-after-free Read in __smc_diag_dump
smc
|
19 |
syz |
|
|
34 |
2626d |
2639d
|
11/29 |
2576d |
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
|
KASAN: use-after-free Read in kernel_accept
smc
|
19 |
C |
|
|
19 |
2659d |
2808d
|
11/29 |
2576d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
|
general protection fault in kernel_accept
smc
|
2 |
C |
|
|
280 |
2652d |
2813d
|
11/29 |
2576d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
26d92e951fe0
smc: move unhash as early as possible in smc_release()
|
|
general protection fault in smc_ioctl (3)
smc
|
2 |
C |
|
|
15 |
2784d |
2786d
|
8/29 |
2765d |
7311d665ca68
net/smc: move sock lock in smc_ioctl()
|
|
general protection fault in smc_tx_prepared_sends
smc
|
2 |
C |
|
|
7 |
2790d |
2792d
|
8/29 |
2765d |
7311d665ca68
net/smc: move sock lock in smc_ioctl()
|
|
WARNING: refcount bug in smc_tcp_listen_work
smc
|
13 |
|
|
|
1 |
2849d |
2849d
|
8/29 |
2787d |
e1bbdd570474
net/smc: reduce sock_put() for fallback sockets
|
|
general protection fault in smc_ioctl (2)
smc
|
2 |
C |
|
|
43 |
2787d |
2810d
|
8/29 |
2787d |
1992d99882af
net/smc: take sock lock in smc_ioctl()
|
|
WARNING in smc_unhash_sk
smc
|
-1 |
C |
|
|
155731 |
2789d |
2951d
|
8/29 |
2787d |
e1bbdd570474
net/smc: reduce sock_put() for fallback sockets
|
|
general protection fault in smc_ioctl
smc
|
2 |
C |
|
|
5214 |
2838d |
2867d
|
8/29 |
2815d |
2351abe6f873
net/smc: return 0 for ioctl calls in states INIT and CLOSED
|
|
WARNING: ODEBUG bug in del_timer (2)
smc
|
-1 |
C |
|
|
6 |
2868d |
2869d
|
8/29 |
2815d |
be7f3e59997b
net/smc: init conn.tx_work & conn.send_lock sooner
|
|
general protection fault in kernel_sock_shutdown
smc
|
2 |
C |
|
|
3329 |
2894d |
2951d
|
5/29 |
2820d |
1255fcb2a655
net/smc: fix shutdown in state SMC_LISTEN
|
|
BUG: unable to handle kernel paging request in smc_ib_remember_port_attr
smc
|
8 |
C |
|
|
112 |
2865d |
2921d
|
5/29 |
2848d |
d49baa7e12ee
net/smc: check for missing nlattrs in SMC_PNETID messages
|
|
general protection fault in smc_getname
smc
|
2 |
C |
|
|
44 |
2882d |
2946d
|
5/29 |
2870d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
|
general protection fault in smc_set_keepalive
smc
|
2 |
C |
|
|
6 |
2886d |
2891d
|
5/29 |
2870d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
|
general protection fault in smc_setsockopt
smc
|
2 |
C |
|
|
504 |
2882d |
2946d
|
5/29 |
2870d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
|
general protection fault in smc_getsockopt
smc
|
2 |
C |
|
|
577 |
2882d |
2942d
|
5/29 |
2870d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
|
WARNING: ODEBUG bug in del_timer
smc
|
-1 |
C |
|
|
200 |
2870d |
2886d
|
5/29 |
2870d |
784813aed6ba
net/smc: restrict non-blocking connect finish
|
|
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt
smc
|
10 |
C |
|
|
9 |
2870d |
2875d
|
5/29 |
2870d |
070204a34884
net/smc: keep clcsock reference in smc_tcp_listen_work()
|
|
possible deadlock in smc_close_non_accepted
smc
|
4 |
C |
|
|
4 |
2945d |
2945d
|
5/29 |
2881d |
3d502067599f
net/smc: simplify wait when closing listen socket
|
|
general protection fault in smc_create
smc
|
2 |
C |
|
|
2 |
2949d |
2948d
|
4/29 |
2941d |
a5dcb73b96a9
net/smc: fix NULL pointer dereference on sock_create_kern() error path
|