|
general protection fault in veth_xdp_rcv
wireguard
|
2 |
|
|
|
12 |
220d |
226d
|
29/29 |
161d |
9337c54401a5
veth: prevent NULL pointer dereference in veth_xdp_rcv
|
|
WARNING in kthread_unpark (2)
wireguard
gfs2
|
-1 |
syz |
done |
|
35 |
466d |
612d
|
28/29 |
427d |
214e01ad4ed7
kthread: unpark only parked kthread
|
|
INFO: task hung in wg_netns_pre_exit (4)
wireguard
|
1 |
|
|
|
127 |
555d |
594d
|
26/29 |
554d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
|
INFO: task hung in wg_destruct
wireguard
|
1 |
|
|
|
207 |
557d |
595d
|
26/29 |
554d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
|
KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll (2)
wireguard
|
6 |
|
|
|
721 |
664d |
1436d
|
25/29 |
644d |
bba045dc4d99
wireguard: receive: annotate data-race around receiving_counter.counter
|
|
KCSAN: data-race in wg_xmit / wg_xmit (4)
wireguard
|
6 |
|
|
|
1 |
796d |
791d
|
25/29 |
723d |
93da8d75a665
wireguard: use DEV_STATS_INC()
|
|
KMSAN: uninit-value in __netif_receive_skb_core
wireguard
wireless
|
19 |
C |
done |
|
353 |
864d |
2834d
|
23/29 |
825d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
|
net-next test error: WARNING in __napi_schedule
wireguard
|
-1 |
|
|
|
110 |
1395d |
1397d
|
22/29 |
1055d |
351bdbb6419c
net: Revert the softirq will run annotation in ____napi_schedule().
|
|
linux-next test error: WARNING in set_peer
wireguard
|
-1 |
|
|
|
39 |
1212d |
1219d
|
22/29 |
1055d |
26c013108c12
wireguard: netlink: avoid variable-sized memcpy on sockaddr
|
|
linux-next test error: WARNING in __napi_schedule
wireguard
|
-1 |
|
|
|
15 |
1398d |
1397d
|
22/29 |
1055d |
351bdbb6419c
net: Revert the softirq will run annotation in ____napi_schedule().
|
|
kernel panic: corrupted stack end in cleanup_net
wireguard
|
2 |
|
|
|
2 |
1113d |
1332d
|
22/29 |
1055d |
b81d591386c3
riscv: Increase stack size under KASAN
|
|
WARNING: suspicious RCU usage in wg_ratelimiter_gc_entries
wireguard
|
4 |
|
|
|
5 |
1677d |
1752d
|
20/29 |
1526d |
3066820034b5
rcu: Reject RCU_LOCKDEP_WARN() false positives
|
|
general protection fault in wg_index_hashtable_replace
wireguard
|
2 |
|
|
|
2 |
1943d |
1954d
|
15/29 |
1922d |
9179ba31367b
wireguard: noise: take lock when removing handshake entry from table
|
|
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu
wireguard
|
17 |
|
|
|
1 |
2025d |
2025d
|
15/29 |
2004d |
bf64ff4c2aac
genetlink: get rid of family->attrbuf
|
|
KASAN: use-after-free Read in netdev_name_node_lookup_rcu
wireguard
|
19 |
C |
error |
|
17 |
2013d |
2024d
|
15/29 |
2004d |
bf64ff4c2aac
genetlink: get rid of family->attrbuf
|
|
KASAN: use-after-free Read in dev_get_by_name
wireguard
|
19 |
C |
|
|
4 |
2019d |
2024d
|
15/29 |
2004d |
bf64ff4c2aac
genetlink: get rid of family->attrbuf
|
|
divide error in wg_packet_encrypt_worker
wireguard
|
2 |
C |
done |
|
12 |
2154d |
2161d
|
15/29 |
2100d |
175f1ca9a9ed
wireguard: send: account for mtu=0 devices
|
|
divide error in encrypt_packet
wireguard
|
2 |
C |
done |
|
89 |
2153d |
2161d
|
15/29 |
2100d |
175f1ca9a9ed
wireguard: send: account for mtu=0 devices
|
|
possible deadlock in wg_noise_handshake_create_initiation
wireguard
|
4 |
C |
done |
|
11 |
2168d |
2172d
|
15/29 |
2134d |
ec31c2676a10
wireguard: noise: reject peers with low order public keys
|
|
KASAN: use-after-free Read in root_remove_peer_lists
wireguard
|
19 |
C |
done |
|
2 |
2174d |
2174d
|
15/29 |
2157d |
9981159fc3b6
wireguard: allowedips: fix use-after-free in root_remove_peer_lists
|