|
memory leak in xfrm_policy_construct
net
|
3 |
C |
|
|
8 |
41d |
41d
|
28/29 |
never |
xfrm: fix refcount leak in xfrm_migrate_policy_find
|
|
BUG: sleeping function called from invalid context in vhost_get_avail_idx
kvm
net
virt
|
5 |
C |
|
|
1 |
31d |
29d
|
28/29 |
never |
e08a9fac5cf8
vhost_net: fix sleeping with preempt-disabled in vhost_net_busy_poll()
|
|
general protection fault in bond_header_create
net
|
2 |
syz |
|
|
10 |
56d |
67d
|
28/29 |
never |
425000dbf173
team: fix header_ops type confusion with non-Ethernet ports
|
|
WARNING in sock_map_destroy (3)
bpf
net
|
-1 |
C |
done |
error |
5 |
26d |
47d
|
27/29 |
never |
6451d58a3556
sockmap: Fix sk_psock_drop() race vs sock_map_{unhash,close,destroy}().
|
|
kernel BUG in pfkey_send_migrate
net
|
-1 |
C |
error |
|
3 |
59d |
66d
|
28/29 |
never |
eb2d16a7d599
af_key: validate families in pfkey_send_migrate()
|
|
KMSAN: uninit-value in netif_skb_features (4)
net
|
7 |
C |
|
|
116 |
48d |
224d
|
28/29 |
never |
ddc748a391dd
net: use skb_header_pointer() for TCPv4 GSO frag_off check
|
|
KASAN: slab-use-after-free Read in sock_def_readable (2)
net
|
19 |
C |
|
|
123 |
31d |
72d
|
28/29 |
never |
922814879542
atm: lec: fix use-after-free in sock_def_readable()
|
|
WARNING in u32_change (2)
net
|
-1 |
C |
error |
|
760 |
34d |
76d
|
28/29 |
never |
34bd3c6b0bd3
net: sched: cls_u32: Avoid memcpy() false-positive warning in u32_init_knode()
|
|
memory leak in radix_tree_insert (2)
arm-msm
net
|
3 |
C |
|
|
1 |
112d |
894d
|
28/29 |
never |
2428083101f6
net: qrtr: replace qrtr_tx_flow radix_tree with xarray to fix memory leak
|
|
kernel BUG in pn_socket_sendmsg
net
|
-1 |
C |
|
|
19 |
20d |
28d
|
27/29 |
never |
5b0c911bcdbd
net: phonet: do not BUG_ON() in pn_socket_autobind() on failed bind
|
|
KASAN: global-out-of-bounds Read in ip6gre_header
net
|
17 |
C |
error |
|
3 |
45d |
48d
|
28/29 |
never |
b120e4432f9f
net: lapbether: handle NETDEV_PRE_TYPE_CHANGE
|
|
WARNING in vmap_pages_range_noflush (2)
bpf
net
|
-1 |
C |
error |
|
250 |
1365d |
1367d
|
1/29 |
never |
mm/gup.c: Fix return value for __gup_longterm_locked()
|
|
KASAN: slab-use-after-free Read in ip6gre_tunnel_xmit
net
|
19 |
C |
error |
error |
33 |
138d |
546d
|
0/29 |
never |
ip6_gre: use skb_vlan_inet_prepare() instead of pskb_inet_may_pull()
|
|
KMSAN: uninit-value in erspan_build_header (2)
net
|
7 |
C |
|
|
344 |
35d |
788d
|
1/29 |
never |
bpf: Don't redirect too small packets
|
|
general protection fault in bq_flush_to_queue (2)
net
bpf
|
2 |
C |
error |
error |
6 |
81d |
162d
|
5/29 |
never |
869c63d5975d
bpf: Fix race in cpumap on PREEMPT_RT
net: move promiscuity handling into netdev_rx_mode_work
|
|
unregister_netdevice: waiting for DEV to become free (8)
net
|
2 |
C |
done |
|
443850 |
13d |
1074d
|
29/29 |
13d |
9af0feae8016
RDMA/core: Fix stale RoCE GIDs during netdev events at registration
fa3c411d21eb
RDMA/core: always drop device refcount in ib_del_sub_device_and_put()
f12b69d8f228
batman-adv: Release references to inactive interfaces
ec69daabe452
bpf: Fix reference count leak in bpf_prog_test_run_xdp()
7fcbe5b2c6a4
can: j1939: implement NETDEV_UNREGISTER notification handler
5d5602236f5d
can: j1939: make j1939_session_activate() fail if device is no longer registered
ac782f4e3bfc
ipv4: Fix reference count leak when using error routes with nexthop objects
1809c82aa073
net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts
bb4c698633c0
team: avoid NETDEV_CHANGEMTU event when unregistering slave
4efa91a28576
xfrm: always flush state and policy upon NETDEV_UNREGISTER event
|
|
BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
net
|
17 |
C |
|
|
910 |
75d |
95d
|
29/29 |
13d |
21ec92774d15
net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop
|
|
general protection fault in sigd_send
net
|
11 |
C |
error |
|
10 |
104d |
201d
|
29/29 |
13d |
ae88a5d2f29b
net: atm: fix crash due to unvalidated vcc pointer in sigd_send()
|
|
memory leak in napi_skb_cache_get (2)
net
virt
|
3 |
C |
|
|
1 |
126d |
124d
|
29/29 |
13d |
21e4271e6509
Bluetooth: purge error queues in socket destructors
|
|
memory leak in l2tp_tunnel_create
net
|
3 |
C |
|
|
9 |
122d |
126d
|
29/29 |
13d |
4d10edfd1475
l2tp: Fix memleak in l2tp_udp_encap_recv().
|
|
general protection fault in ife_tlv_meta_encode
net
|
2 |
C |
error |
|
6 |
117d |
118d
|
29/29 |
13d |
27880b0b0d35
net/sched: act_ife: avoid possible NULL deref
|
|
KASAN: slab-out-of-bounds Read in fib6_add_rt2node
net
|
17 |
C |
|
|
38 |
89d |
97d
|
29/29 |
13d |
8244f959e2c1
ipv6: Fix out-of-bound access in fib6_add_rt2node().
|
|
kernel BUG in fib6_add_rt2node (2)
net
|
-1 |
C |
error |
|
18 |
113d |
133d
|
29/29 |
13d |
bbf4a17ad9ff
ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF
|
|
kernel BUG in ipgre_header (4)
net
|
-1 |
C |
|
|
9 |
122d |
131d
|
29/29 |
13d |
e67c577d8989
ipv4: ip_gre: make ipgre_header() robust
|
|
KMSAN: uninit-value in __inet_bind
net
|
7 |
C |
|
|
410 |
88d |
94d
|
29/29 |
13d |
7b821da55b3f
rds: tcp: fix uninit-value in __inet_bind
|
|
WARNING in skb_attempt_defer_free
net
|
-1 |
C |
|
|
16 |
110d |
134d
|
29/29 |
13d |
e5c8eda39a9f
udp: call skb_orphan() before skb_attempt_defer_free()
|
|
memory leak in __build_skb (4)
net
|
3 |
C |
|
|
1 |
130d |
127d
|
29/29 |
13d |
9a56796ad258
gue: Fix skb memleak with inner IP protocol 0.
|
|
KASAN: use-after-free Read in __linkwatch_run_queue
net
|
19 |
syz |
|
|
108 |
104d |
370d
|
29/29 |
13d |
83b67cc9be92
linkwatch: use __dev_put() in callers to prevent UAF
|
|
KMSAN: uninit-value in __inet6_bind (2)
net
|
7 |
C |
|
|
78 |
89d |
96d
|
29/29 |
13d |
7b821da55b3f
rds: tcp: fix uninit-value in __inet_bind
|
|
BUG: sleeping function called from invalid context in __bpf_stream_push_str
net
virt
|
5 |
C |
done |
|
88 |
120d |
162d
|
29/29 |
13d |
99a3e3a1cfc9
slab: fix kmalloc_nolock() context check for PREEMPT_RT
|
|
WARNING in ip_rt_bug (2)
net
|
-1 |
C |
done |
error |
612 |
13d |
1315d
|
29/29 |
13d |
81b84de32bb2
xfrm: fix ip_rt_bug race in icmp_route_lookup reverse path
|
|
possible deadlock in sch_direct_xmit (5)
net
|
4 |
C |
unreliable |
|
1245 |
13d |
133d
|
29/29 |
13d |
872ac785e768
ipv4: ip_tunnel: spread netdev_lockdep_set_classes()
|
|
general protection fault in lec_arp_clear_vccs
net
|
19 |
C |
error |
|
84 |
41d |
245d
|
29/29 |
13d |
101bacb303e8
atm: lec: fix null-ptr-deref in lec_arp_clear_vccs
|
|
KASAN: slab-use-after-free Read in handle_tx (2)
net
|
19 |
C |
|
|
1086 |
96d |
818d
|
29/29 |
13d |
308e7e4d0a84
serial: caif: fix use-after-free in caif_serial ldisc_close()
|
|
KMSAN: uninit-value in IP6_ECN_decapsulate (3)
net
|
7 |
C |
|
|
4 |
132d |
132d
|
29/29 |
13d |
81c734dae203
ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()
|
|
possible deadlock in inet6_getname
net
|
4 |
C |
error |
|
122 |
82d |
95d
|
29/29 |
13d |
021fd0f87004
net/rds: fix recursive lock in rds_tcp_conn_slots_available
|
|
WARNING in kcm_write_msgs
net
|
-1 |
C |
done |
|
622 |
95d |
2252d
|
29/29 |
13d |
ca220141fa8e
kcm: fix zero-frag skb in frag_list on partial sendmsg error
|
|
memory leak in llcp_sock_create
net
nfc
|
3 |
C |
|
|
6 |
132d |
115d
|
29/29 |
13d |
165c34fb6068
nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().
|
|
BUG: corrupted list in dev_deactivate_many
net
|
19 |
C |
|
|
22 |
21d |
260d
|
29/29 |
13d |
83b67cc9be92
linkwatch: use __dev_put() in callers to prevent UAF
|
|
WARNING in mdiobus_get_phy
net
usb
|
-1 |
syz |
|
|
2 |
145d |
155d
|
29/29 |
113d |
a1e077a3f76e
net: usb: asix: validate PHY address before use
|
|
WARNING in nfc_dev_down
net
nfc
|
-1 |
C |
error |
|
12 |
140d |
155d
|
29/29 |
113d |
1ab526d97a57
net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
|
|
memory leak in rtl8150_set_multicast
net
usb
|
3 |
syz |
|
|
1 |
158d |
154d
|
29/29 |
113d |
12cab1191d98
net: usb: rtl8150: fix memory leak on usb_submit_urb() failure
|
|
kernel BUG in ip6_pol_route (2)
net
|
-1 |
C |
error |
|
1134 |
140d |
185d
|
29/29 |
113d |
1adaea51c61b
ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT
|
|
kernel BUG in ip6gre_header (6)
net
|
-1 |
C |
|
|
127 |
141d |
159d
|
29/29 |
113d |
db5b4e39c4e6
ip6_gre: make ip6gre_header() robust
|
|
possible deadlock in ipv6_sock_mc_close (4)
net
|
4 |
C |
done |
|
7 |
164d |
162d
|
29/29 |
118d |
b98f06f9a5d3
sctp: Fetch inet6_sk() after setting ->pinet6 in sctp_clone_sock().
|
|
KASAN: invalid-free in inet_sock_destruct
net
|
24 |
C |
inconclusive |
|
10 |
152d |
162d
|
29/29 |
118d |
d7ff61e6f3ef
sctp: Clear inet_opt in sctp_v6_copy_ip_options().
|
|
WARNING in em_nbyte_match
net
|
-1 |
C |
done |
|
7 |
164d |
179d
|
29/29 |
132d |
4fe5a00ec707
net: sched: fix TCF_LAYER_TRANSPORT handling in tcf_get_base_ptr()
|
|
divide error in __tcp_select_window (4)
net
|
2 |
C |
done |
|
14 |
173d |
175d
|
29/29 |
132d |
f07f4ea53e22
mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose().
|
|
WARNING in xfrm_state_fini (4)
net
|
-1 |
C |
done |
|
89278 |
166d |
219d
|
29/29 |
132d |
10deb6986484
xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added
|
|
kernel BUG in ipgre_header (3)
net
|
-1 |
C |
|
|
99 |
133d |
211d
|
29/29 |
132d |
0ae9cfc454ea
team: Move team device type change at the end of team_port_add
|
|
KMSAN: uninit-value in em_canid_match
can
net
|
7 |
C |
|
|
7 |
173d |
175d
|
29/29 |
132d |
0c922106d7a5
net/sched: em_canid: fix uninit-value in em_canid_match
|
|
KMSAN: kernel-infoleak in __skb_datagram_iter (4)
net
|
18 |
C |
|
|
1050 |
132d |
725d
|
29/29 |
132d |
62b656e43eae
net: sched: act_connmark: initialize struct tc_ife to fix kernel leak
ce50039be49e
net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak
|
|
BUG: sleeping function called from invalid context in sock_map_delete_elem
net
bpf
|
5 |
C |
error |
|
58 |
212d |
265d
|
29/29 |
182d |
7c33e97a6ef5
bpf: Do not disable preemption in bpf_test_run().
|
|
possible deadlock in vsock_linger
virt
net
|
4 |
C |
|
|
7 |
211d |
211d
|
29/29 |
182d |
f7c877e75352
vsock: fix lock inversion in vsock_assign_transport()
|
|
BUG: sleeping function called from invalid context in __set_page_owner
net
virt
|
5 |
C |
done |
|
79 |
208d |
222d
|
29/29 |
182d |
c83aab85e181
mm: don't spin in add_stack_record when gfp flags don't allow
|
|
WARNING in rtl8150_start_xmit/usb_submit_urb
net
usb
|
-1 |
C |
|
|
5 |
243d |
263d
|
29/29 |
202d |
958baf5eaee3
net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
|
|
WARNING in ah6_output
net
|
-1 |
C |
error |
|
8 |
239d |
360d
|
29/29 |
202d |
2327a3d6f65c
net: ipv6: fix field-spanning memcpy warning in AH output
|
|
WARNING in max_vclocks_store
mm
net
|
-1 |
C |
|
|
3 |
262d |
498d
|
29/29 |
202d |
e9f35294e18d
ptp: Add a upper bound on max_vclocks
|
|
KMSAN: uninit-value in nci_dev_up (2)
nfc
net
|
7 |
C |
|
|
34 |
229d |
285d
|
29/29 |
202d |
9c328f54741b
net: nfc: nci: Add parameter validation for packet data
|
|
WARNING in __linkwatch_sync_dev (2)
net
|
-1 |
C |
done |
|
952 |
215d |
341d
|
29/29 |
202d |
23a6037ce76c
bonding: Remove support for use_carrier
|
|
KASAN: slab-use-after-free Write in __xfrm_state_delete
net
|
22 |
C |
done |
|
4863 |
211d |
294d
|
29/29 |
202d |
cd8ae32e4e46
xfrm: xfrm_alloc_spi shouldn't use 0 as SPI
|
|
possible deadlock in inet_shutdown
net
|
4 |
C |
done |
|
11 |
247d |
256d
|
29/29 |
202d |
9f7c02e03157
nbd: restrict sockets to TCP and UDP
|
|
WARNING in inet_sock_destruct (5)
net
|
-1 |
C |
error |
|
8 |
215d |
252d
|
29/29 |
202d |
a3967baad4d5
tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
|
|
KASAN: slab-use-after-free Read in napi_gro_frags (2)
net
|
19 |
C |
done |
|
3 |
252d |
245d
|
29/29 |
202d |
1091860a16a8
net: tun: Update napi->skb after XDP process
|
|
general protection fault in find_match (6)
net
|
17 |
C |
|
|
102 |
239d |
245d
|
29/29 |
202d |
390b3a300d78
nexthop: Forbid FDB status change while nexthop is in a group
|
|
WARNING in est_timer
net
|
-1 |
C |
error |
|
497 |
257d |
266d
|
29/29 |
202d |
9f74c0ea9b26
net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y
|
|
KMSAN: uninit-value in lan78xx_reset
net
usb
|
7 |
C |
|
|
14 |
223d |
257d
|
29/29 |
202d |
49bdb63ff644
net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in lan78xx_read_raw_eeprom
|
|
possible deadlock in __netdev_update_features
net
|
4 |
C |
done |
|
227 |
204d |
351d
|
29/29 |
202d |
0f82c3ba66c6
macsec: sync features on RTM_NEWLINK
|
|
WARNING in xfrm_state_fini (3)
net
|
-1 |
C |
done |
|
122008 |
223d |
294d
|
29/29 |
223d |
42e42562c9cf
xfrm: flush all states in xfrm_state_fini
|
|
WARNING: ODEBUG bug in __sk_destruct (3)
net
|
-1 |
C |
error |
|
12 |
268d |
284d
|
29/29 |
223d |
52565a935213
net: kcm: Fix race condition in kcm_unattach()
|
|
BUG: unable to handle kernel paging request in nsim_queue_free
net
|
8 |
syz |
|
|
49 |
258d |
292d
|
29/29 |
223d |
b2cafefaf047
netdevsim: Fix wild pointer access in nsim_queue_free().
|
|
KMSAN: uninit-value in hsr_get_node (3)
net
|
7 |
C |
|
|
30 |
272d |
761d
|
29/29 |
223d |
7af76e9d18a9
net, hsr: reject HSR frame if skb can't hold tag
|
|
WARNING in virtio_transport_send_pkt_info
net
virt
kvm
|
-1 |
C |
|
|
145 |
263d |
281d
|
29/29 |
223d |
7fb1291257ea
vsock/virtio: Fix message iterator handling on transmit path
|
|
WARNING: suspicious RCU usage in corrupted (3)
net
|
4 |
C |
done |
done |
1 |
297d |
358d
|
29/29 |
244d |
7f12c3385048
net, bpf: Fix RCU usage in task_cls_state() for BPF programs
|
|
WARNING in ip6_mr_output
net
|
-1 |
C |
done |
|
143 |
322d |
326d
|
29/29 |
257d |
af232e7615e4
ipv6: guard ip6_mr_output() with rcu
|
|
WARNING in ipv6_gso_segment
net
|
-1 |
C |
|
|
8 |
293d |
293d
|
29/29 |
257d |
d45cf1e7d718
ipv6: reject malicious packets in ipv6_gso_segment()
|
|
possible deadlock in team_del_slave (3)
net
|
4 |
C |
error |
|
386707 |
269d |
753d
|
29/29 |
257d |
bfb4fb77f9a8
team: replace team lock with rtnl lock
|
|
general protection fault in clip_push
ext4
net
|
8 |
C |
|
|
5 |
326d |
333d
|
29/29 |
257d |
b993ea46b3b6
atm: clip: prevent NULL deref in clip_push()
|
|
general protection fault in qfq_qlen_notify
net
|
2 |
C |
|
|
18 |
313d |
319d
|
29/29 |
257d |
ffdde7bf5a43
net/sched: Abort __tc_modify_qdisc if parent class does not exist
|
|
general protection fault in drr_qlen_notify
net
|
10 |
C |
done |
|
101 |
310d |
319d
|
29/29 |
257d |
ffdde7bf5a43
net/sched: Abort __tc_modify_qdisc if parent class does not exist
|
|
general protection fault in qdisc_tree_reduce_backlog
net
|
8 |
C |
done |
|
255 |
307d |
319d
|
29/29 |
257d |
ffdde7bf5a43
net/sched: Abort __tc_modify_qdisc if parent class does not exist
|
|
general protection fault in hfsc_qlen_notify
net
|
10 |
C |
|
|
161 |
306d |
320d
|
29/29 |
257d |
ffdde7bf5a43
net/sched: Abort __tc_modify_qdisc if parent class does not exist
|
|
KMSAN: uninit-value in pptp_xmit (3)
net
|
7 |
C |
|
|
49 |
287d |
294d
|
29/29 |
257d |
de9c4861fb42
pptp: ensure minimal skb length in pptp_xmit()
|
|
general protection fault in htb_qlen_notify
net
|
10 |
C |
done |
|
166 |
310d |
320d
|
29/29 |
257d |
ffdde7bf5a43
net/sched: Abort __tc_modify_qdisc if parent class does not exist
|
|
KASAN: slab-out-of-bounds Read in pause_parse_request
net
|
17 |
C |
done |
|
217 |
321d |
327d
|
29/29 |
257d |
99e3eb454cc4
net: ethtool: avoid OOB accesses in PAUSE_SET
|
|
WARNING in kvfree_call_rcu
net
lsm
|
-1 |
C |
|
|
2 |
316d |
315d
|
29/29 |
257d |
60ada4fe644e
smc: Fix various oops due to inet_sock type confusion.
|
|
possible deadlock in rpc_close_pipes
net
nfs
|
4 |
C |
|
|
904 |
319d |
321d
|
29/29 |
257d |
2a8061ee5e41
better lockdep annotations for simple_recursive_removal()
|
|
WARNING: suspicious RCU usage in task_cls_state
net
|
4 |
C |
done |
|
175 |
270d |
358d
|
29/29 |
257d |
7f12c3385048
net, bpf: Fix RCU usage in task_cls_state() for BPF programs
|
|
WARNING in remove_proc_entry (8)
net
nfs
|
-1 |
syz |
|
|
76 |
291d |
341d
|
29/29 |
257d |
e8d6f3ab5946
nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails.
|
|
possible deadlock in team_device_event (3)
net
|
4 |
C |
error |
|
38569 |
269d |
740d
|
29/29 |
257d |
bfb4fb77f9a8
team: replace team lock with rtnl lock
|
|
KASAN: slab-use-after-free Read in tcp_prune_ofo_queue
net
|
19 |
C |
done |
|
356 |
306d |
308d
|
29/29 |
257d |
7eeabfb23738
tcp: fix UaF in tcp_prune_ofo_queue()
|
|
WARNING in inet_sock_destruct (4)
net
|
-1 |
C |
done |
|
6683 |
259d |
1061d
|
29/29 |
257d |
d3a5f2871adc
tcp: Correct signedness in skb remaining space calculation
|
|
WARNING: proc registration bug in atm_dev_register
net
|
-1 |
C |
error |
|
5 |
327d |
335d
|
29/29 |
257d |
a433791aeaea
atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().
|
|
KASAN: null-ptr-deref Write in rcuref_put (4)
net
|
12 |
C |
done |
|
7 |
287d |
405d
|
29/29 |
257d |
ae633388cae3
pptp: fix pptp_xmit() error path
|
|
possible deadlock in rtnl_newlink
net
|
4 |
C |
|
|
11 |
342d |
355d
|
29/29 |
286d |
b4a8085ceefb
e1000: Move cancel_work_sync to avoid deadlock
|
|
KASAN: slab-use-after-free Read in lane_ioctl
net
|
19 |
syz |
|
|
7 |
334d |
335d
|
29/29 |
286d |
d13a3824bfd2
net: atm: add lec_mutex
|
|
BUG: sleeping function called from invalid context in team_change_rx_flags
net
|
5 |
C |
done |
|
71 |
316d |
364d
|
29/29 |
316d |
d8d85ef0a631
af_packet: move notifier's packet_dev_mc out of rcu critical section
|
|
general protection fault in dev_set_group
net
|
2 |
C |
error |
|
3 |
349d |
349d
|
29/29 |
316d |
feafc73f3e6a
net: prevent a NULL deref in rtnl_create_link()
|
|
BUG: sleeping function called from invalid context in pcpu_alloc_noprof
net
|
5 |
C |
done |
|
4 |
366d |
380d
|
29/29 |
316d |
8e5f1bb81274
ipv6: Narrow down RCU critical section in inet6_rtm_newroute().
|
|
WARNING in ipv6_addr_prefix
net
|
-1 |
C |
error |
|
3056 |
334d |
383d
|
29/29 |
316d |
586ceac9acb7
ipv6: Restore fib6_config validation for SIOCADDRT.
|
|
WARNING in udp_tunnel_update_gro_rcv
net
|
-1 |
C |
error |
|
108 |
397d |
427d
|
29/29 |
316d |
c26c192c3d48
udp: properly deal with xfrm encap and ADDRFORM
|
|
WARNING in nla_get_range_unsigned (3)
net
|
-1 |
C |
done |
|
22 |
372d |
376d
|
29/29 |
316d |
a96876057b9e
netlink: fix policy dump for int with validation callback
|
|
WARNING in tls_strp_msg_load
net
|
-1 |
C |
done |
|
4 |
424d |
417d
|
28/29 |
343d |
5071a1e606b3
net: tls: explicitly disallow disconnect
|
|
kernel BUG in qlist_free_all
net
fs
|
-1 |
C |
done |
done |
12 |
395d |
543d
|
28/29 |
343d |
3a04334d6282
bcachefs: Fix b->written overflow
|
|
WARNING in __linkwatch_sync_dev
net
|
-1 |
C |
done |
|
1038 |
343d |
406d
|
28/29 |
343d |
10a77965760c
batman-adv: Fix double-hold of meshif when getting enabled
f7a11cba0ed7
bonding: hold ops lock around get_link
|
|
WARNING in cleanup_net (4)
net
|
-1 |
C |
error |
|
309 |
434d |
453d
|
28/29 |
343d |
5c70eb5c593d
net: better track kernel sockets lifetime
|
|
WARNING in net_free (4)
net
|
-1 |
syz |
|
|
4 |
470d |
540d
|
28/29 |
343d |
5c70eb5c593d
net: better track kernel sockets lifetime
|
|
general protection fault in ethnl_default_dumpit
net
|
2 |
C |
error |
|
321 |
437d |
438d
|
28/29 |
343d |
f36a9285828c
net: ethtool: use correct device pointer in ethnl_default_dump_one()
|
|
WARNING: bad unlock balance in do_setlink
net
|
4 |
C |
done |
|
401 |
400d |
407d
|
28/29 |
343d |
445e99bdf68d
rtnetlink: Fix bad unlock balance in do_setlink().
|
|
general protection fault in rtnl_create_link
net
|
8 |
C |
done |
|
49 |
390d |
400d
|
28/29 |
343d |
4798cfa2097f
net: don't try to ops lock uninitialized devs
|
|
general protection fault in kernel_sock_shutdown (3)
net
|
2 |
syz |
|
|
5 |
415d |
414d
|
28/29 |
343d |
10206302af85
sctp: add mutual exclusion in proc_sctp_do_udp_port()
|
|
possible deadlock in gtp_encap_enable_socket
net
|
4 |
C |
error |
done |
24 |
402d |
603d
|
28/29 |
343d |
752e2217d789
smc: Fix lockdep false-positive for IPPROTO_SMC.
|
|
general protection fault in vxlan_vnigroup_uninit
net
|
2 |
C |
|
|
9 |
461d |
463d
|
28/29 |
343d |
5805402dcc56
vxlan: check vxlan_vnigroup_init() return value
|
|
general protection fault in add_wait_queue
kvm
net
virt
|
10 |
C |
done |
|
676 |
457d |
470d
|
28/29 |
343d |
78dafe1cf3af
vsock: Orphan socket after transport release
|
|
kernel BUG in skbprio_enqueue
net
|
-1 |
C |
|
|
7 |
418d |
418d
|
28/29 |
343d |
ce8fe975fd99
net_sched: skbprio: Remove overly strict queue assertions
|
|
KMSAN: uninit-value in __ipv6_addr_type
net
|
7 |
C |
|
|
3 |
453d |
453d
|
28/29 |
343d |
27843ce6ba3d
ipvlan: ensure network headers are in skb linear part
|
|
possible deadlock in ipv6_sock_ac_close (4)
net
|
4 |
C |
error |
|
5 |
409d |
447d
|
28/29 |
343d |
752e2217d789
smc: Fix lockdep false-positive for IPPROTO_SMC.
|
|
WARNING: bad unlock balance in __rtnl_unlock
net
|
4 |
C |
done |
|
18 |
439d |
441d
|
28/29 |
343d |
f130a0cc1b4f
inet: fix lwtunnel_valid_encap_type() lock imbalance
|
|
WARNING: lock held when returning to user space in rtnl_link_ops_get
net
|
4 |
C |
done |
|
9 |
540d |
547d
|
28/29 |
377d |
9b234a97b10c
rtnetlink: fix rtnl_dump_ifinfo() error path
|
|
WARNING: lock held when returning to user space in nsim_pp_hold_write
net
|
4 |
C |
|
|
4 |
516d |
521d
|
28/29 |
377d |
b9b8301d369b
net: netdevsim: fix nsim_pp_hold_write()
|
|
general protection fault in vsock_stream_has_data
net
virt
|
2 |
C |
done |
done |
6 |
494d |
490d
|
28/29 |
377d |
df137da9d6d1
vsock/virtio: cancel close work in the destructor
|
|
WARNING in nsim_udp_tunnel_set_port
net
|
-1 |
C |
|
|
15 |
475d |
489d
|
28/29 |
378d |
50bf398e1cea
net: netdevsim: try to close UDP port harness races
|
|
BUG: unable to handle kernel paging request in try_to_wake_up (2)
net
|
19 |
C |
error |
|
31 |
454d |
539d
|
28/29 |
378d |
f10bef73fb35
btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
|
|
general protection fault in put_page (4)
net
|
2 |
C |
done |
|
170 |
501d |
518d
|
28/29 |
378d |
cbb26f7d8451
mptcp: fix TCP options overflow.
|
|
WARNING in nsim_dev_health_break_write
net
|
-1 |
C |
|
|
10 |
517d |
522d
|
28/29 |
378d |
ee76746387f6
netdevsim: prevent bad user input in nsim_dev_health_break_write()
|
|
WARNING in netlink_ack_tlv_fill
net
|
-1 |
C |
error |
|
3 |
556d |
552d
|
28/29 |
378d |
3bf39fa849ab
netlink: fix false positive warning in extack during dumps
|
|
KMSAN: uninit-value in nsim_get_ringparam
net
|
7 |
C |
|
|
59 |
473d |
481d
|
28/29 |
378d |
6db9d3a536cd
netdevsim: don't assume core pre-populates HDS params on GET
|
|
general protection fault in modify_prefix_route
net
|
2 |
C |
done |
|
11 |
538d |
539d
|
28/29 |
378d |
a747e02430df
ipv6: avoid possible NULL deref in modify_prefix_route()
|
|
WARNING in __dev_queue_xmit (5)
net
|
-1 |
C |
|
|
41 |
520d |
518d
|
28/29 |
378d |
5eb70dbebf32
netdev-genl: avoid empty messages in queue dump
|
|
WARNING in free_netdev (2)
net
|
-1 |
syz |
|
|
259 |
381d |
487d
|
28/29 |
378d |
bff406bc0424
net: destroy dev->lock later in free_netdev()
|
|
KMSAN: uninit-value in hsr_forward_skb (2)
net
|
7 |
C |
|
|
22 |
532d |
539d
|
28/29 |
378d |
b9653d19e556
net: hsr: avoid potential out-of-bound access in fill_frame_info()
|
|
UBSAN: array-index-out-of-bounds in mr_table_dump
net
|
15 |
C |
|
|
4 |
483d |
483d
|
28/29 |
378d |
15a901361ec3
ipmr: do not call mr_mfc_uses_dev() for unres entries
|
|
WARNING: suspicious RCU usage in __ethtool_get_ts_info
net
|
4 |
C |
done |
|
41 |
498d |
518d
|
28/29 |
378d |
4c61d809cf60
net: ethtool: Fix suspicious rcu_dereference usage
|
|
UBSAN: shift-out-of-bounds in flow_classify
net
|
-1 |
C |
error |
|
5 |
502d |
501d
|
28/29 |
378d |
a039e54397c6
net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
|
|
WARNING in rxrpc_send_data
afs
net
|
-1 |
C |
done |
|
275 |
519d |
525d
|
28/29 |
378d |
ae4f89989479
rxrpc: Fix ability to add more data to a call once MSG_MORE deasserted
|
|
WARNING in l2tp_exit_net
net
|
-1 |
syz |
done |
|
219 |
529d |
613d
|
28/29 |
378d |
5d066766c5f1
net/l2tp: fix warning in l2tp_exit_net found by syzbot
|
|
possible deadlock in team_port_change_check (2)
net
|
4 |
C |
done |
|
16406 |
389d |
810d
|
28/29 |
378d |
3fff5da4ca21
team: prevent adding a device which is already a team device lower
|
|
KASAN: slab-use-after-free Read in ila_nf_input
net
|
19 |
syz |
|
|
38 |
502d |
505d
|
28/29 |
378d |
260466b576bc
ila: serialize calls to nf_register_net_hooks()
|
|
kernel BUG in vlan_get_tci
net
|
-1 |
C |
done |
|
5 |
505d |
505d
|
28/29 |
378d |
77ee7a6d16b6
af_packet: fix vlan_get_tci() vs MSG_PEEK
|
|
WARNING in ip6mr_free_table
net
|
-1 |
C |
done |
|
97859 |
526d |
533d
|
28/29 |
378d |
50b94204446e
ipmr: tune the ipmr_can_free_table() checks.
|
|
KASAN: slab-out-of-bounds Read in nsim_dev_health_break_write
net
|
17 |
C |
|
|
4 |
516d |
521d
|
28/29 |
378d |
ee76746387f6
netdevsim: prevent bad user input in nsim_dev_health_break_write()
|
|
WARNING in page_pool_put_unrefed_netmem
net
|
-1 |
C |
error |
|
7 |
491d |
631d
|
28/29 |
378d |
a126061c80d5
ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple()
|
|
general protection fault in vsock_connectible_has_data
net
virt
|
2 |
C |
done |
|
7 |
497d |
495d
|
28/29 |
378d |
f6abafcd32f9
vsock/bpf: return early if transport is not assigned
|
|
kernel BUG in vlan_get_protocol_dgram
net
|
-1 |
C |
done |
|
8 |
505d |
505d
|
28/29 |
378d |
f91a5b808938
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK
|
|
WARNING in skb_checksum_help (3)
net
|
-1 |
C |
done |
done |
9460 |
552d |
880d
|
28/29 |
477d |
89add40066f9
net: drop bad gso csum_start and offset in virtio_net_hdr
|
|
divide error in __tcp_select_window (3)
net
|
2 |
C |
|
|
5 |
558d |
563d
|
28/29 |
518d |
ce7356ae3594
mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
|
|
WARNING: suspicious RCU usage in phonet_route_del
net
|
4 |
C |
done |
|
7 |
559d |
563d
|
28/29 |
519d |
38a1f50a5efb
phonet: do not call synchronize_rcu() from phonet_route_del()
|
|
general protection fault in put_page (3)
net
|
2 |
C |
done |
|
47 |
519d |
564d
|
28/29 |
519d |
341468e0ab4b
lib/iov_iter: fix bvec iterator setup
|
|
WARNING in sk_skb_reason_drop
net
|
-1 |
C |
done |
|
1447 |
520d |
549d
|
28/29 |
519d |
85c7975acd97
net: ip: fix unexpected return in fib_validate_source()
|
|
WARNING in __sock_create
net
|
-1 |
C |
done |
|
4 |
559d |
559d
|
28/29 |
524d |
d293958a8595
net/smc: do not leave a dangling sk pointer in __smc_create()
|
|
BUG: Bad page state in bpf_test_run_xdp_live
net
|
-1 |
C |
done |
|
17 |
565d |
569d
|
28/29 |
551d |
c40dd8c47325
bpf, test_run: Fix LIVE_FRAME frame update after a page has been recycled
|
|
general protection fault in dev_map_enqueue (2)
bpf
net
|
19 |
C |
error |
done |
336 |
657d |
723d
|
28/29 |
553d |
09d88791c7cd
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
|
|
UBSAN: shift-out-of-bounds in xfrm_selector_match (2)
net
|
-1 |
C |
error |
|
10 |
597d |
610d
|
28/29 |
553d |
3f0ab59e6537
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
|
|
KASAN: slab-use-after-free Read in advance_sched
net
|
19 |
C |
error |
|
15 |
596d |
883d
|
28/29 |
553d |
f504465970ae
net: sched: fix use-after-free in taprio_change()
|
|
general protection fault in ethnl_phy_doit
net
|
2 |
C |
done |
|
6 |
615d |
616d
|
28/29 |
571d |
fce1e9f86af1
net: ethtool: phy: Check the req_info.pdn field for GET commands
|
|
WARNING: refcount bug in ethnl_phy_done
net
|
13 |
C |
done |
|
4 |
616d |
615d
|
28/29 |
574d |
1ad84a151af7
net: ethtool: phy: Don't set the context dev pointer for unfiltered DUMP
|
|
kernel BUG in __sock_sendmsg
net
|
-1 |
C |
|
|
111 |
623d |
640d
|
28/29 |
574d |
fe1910f9337b
tcp_bpf: fix return value of tcp_bpf_sendmsg()
|
|
WARNING in __dev_queue_xmit (4)
net
|
-1 |
C |
|
|
387 |
575d |
622d
|
28/29 |
574d |
9d301de12da6
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
|
|
WARNING in hsr_fill_frame_info
net
|
-1 |
C |
error |
|
80 |
599d |
628d
|
28/29 |
574d |
430d67bdcb04
net: hsr: Use the seqnr lock for frames received via interlink port.
|
|
WARNING in sock_map_close (2)
bpf
net
|
-1 |
C |
done |
|
3 |
635d |
635d
|
28/29 |
574d |
1461f5a3d810
l2tp: avoid overriding sk->sk_user_data
|
|
KASAN: slab-use-after-free Read in unix_stream_read_actor (2)
net
|
19 |
C |
inconclusive |
|
4 |
626d |
622d
|
28/29 |
574d |
5aa57d9f2d53
af_unix: Don't return OOB skb in manage_oob().
|
|
WARNING: lock held when returning to user space in ethnl_act_cable_test
net
|
4 |
C |
done |
|
43 |
630d |
631d
|
28/29 |
574d |
3d6a0c4f4552
net: fix unreleased lock in cable test
|
|
BUG: unable to handle kernel paging request in bpf_prog_ADDR (3)
bpf
net
|
8 |
C |
done |
|
6 |
675d |
675d
|
28/29 |
574d |
92de36080c93
bpf: Fail verification for sign-extension of packet data/data_end/data_meta
|
|
WARNING in ethnl_req_get_phydev
net
|
-1 |
C |
done |
|
73 |
630d |
631d
|
28/29 |
574d |
cff69f72d333
ethtool: pse-pd: move pse validation into set
|
|
INFO: rcu detected stall in neigh_timer_handler (8)
net
|
1 |
C |
done |
done |
72 |
646d |
706d
|
28/29 |
575d |
22f008128625
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
|
|
general protection fault in reuseport_add_sock (3)
net
|
2 |
C |
done |
|
3 |
660d |
659d
|
28/29 |
593d |
9ab0faa7f9ff
sctp: Fix null-ptr-deref in reuseport_add_sock().
|
|
BUG: stack guard page was hit in vsock_bpf_recvmsg
net
virt
|
-1 |
C |
done |
|
6 |
648d |
648d
|
28/29 |
593d |
69139d2919dd
vsock: fix recursive ->recvmsg calls
|
|
KASAN: slab-use-after-free Read in kcm_release
net
|
19 |
C |
|
|
2 |
702d |
742d
|
28/29 |
593d |
807067bf014d
kcm: Serialise kcm_sendmsg() for the same socket.
|
|
WARNING in skb_warn_bad_offload (5)
net
|
-1 |
C |
done |
|
18 |
639d |
673d
|
28/29 |
593d |
30b03f2a0592
udp: Fall back to software USO if IPv6 extension headers are present
|
|
WARNING: refcount bug in sk_common_release
net
|
13 |
C |
|
|
9 |
656d |
671d
|
27/29 |
631d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
|
WARNING: refcount bug in inet_create
net
|
13 |
C |
done |
|
10 |
658d |
684d
|
27/29 |
631d |
2fe5273f149c
net/smc: prevent UAF in inet_create()
|
|
KASAN: stack-out-of-bounds Read in xdp_do_check_flushed
bpf
net
|
17 |
C |
done |
|
127 |
655d |
676d
|
27/29 |
634d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
|
general protection fault in __dev_flush
net
bpf
|
19 |
C |
|
|
35 |
656d |
669d
|
27/29 |
634d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
|
KMSAN: uninit-value in tcf_ct_flow_table_get
net
|
7 |
C |
|
|
603 |
656d |
663d
|
27/29 |
634d |
2191a54f6322
sched: act_ct: take care of padding in struct zones_ht_key
|
|
KASAN: slab-use-after-free Read in bq_xmit_all
bpf
net
|
19 |
C |
done |
|
29 |
656d |
669d
|
27/29 |
634d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
|
general protection fault in __xsk_map_flush
net
bpf
|
19 |
C |
done |
|
26 |
656d |
673d
|
27/29 |
634d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
|
general protection fault in __cpu_map_flush
bpf
net
|
10 |
C |
inconclusive |
|
25 |
656d |
670d
|
27/29 |
634d |
9da49aa80d68
tun: Add missing bpf_net_ctx_clear() in do_xdp_generic()
|
|
divide error in tcp_rcv_space_adjust (3)
net
|
2 |
C |
done |
|
3 |
748d |
749d
|
27/29 |
643d |
94062790aedb
UPSTREAM: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
|
|
general protection fault in dev_map_redirect
bpf
net
|
2 |
C |
|
|
362 |
679d |
687d
|
27/29 |
643d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
|
stack segment fault in dev_hash_map_redirect
bpf
net
|
2 |
C |
done |
|
29 |
679d |
687d
|
27/29 |
643d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
|
WARNING in __ip6_make_skb (2)
net
|
-1 |
C |
done |
|
104 |
707d |
722d
|
27/29 |
643d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
|
KASAN: slab-use-after-free Read in l2tp_tunnel_del_work
net
|
19 |
C |
done |
|
99 |
679d |
693d
|
27/29 |
643d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
|
stack segment fault in bpf_xdp_redirect
bpf
net
|
2 |
C |
|
|
181 |
679d |
687d
|
27/29 |
643d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
|
stack segment fault in cpu_map_redirect
bpf
net
|
2 |
C |
done |
|
11 |
680d |
679d
|
27/29 |
643d |
fecef4cd42c6
tun: Assign missing bpf_net_context.
|
|
KASAN: slab-use-after-free Write in l2tp_session_delete
net
|
22 |
C |
done |
|
1286 |
673d |
693d
|
27/29 |
643d |
f8ad00f3fb2a
l2tp: fix possible UAF when cleaning up tunnels
|
|
KMSAN: uninit-value in vsock_assign_transport (2)
net
virt
|
7 |
C |
|
|
14 |
705d |
760d
|
27/29 |
643d |
1e1fdcbdde3b
vhost/vsock: always initialize seqpacket_allow
|
|
WARNING in __ip_make_skb
net
|
-1 |
C |
done |
|
54 |
708d |
722d
|
27/29 |
643d |
73451e9aaa24
net: validate SO_TXTIME clockid coming from userspace
|
|
general protection fault in coalesce_fill_reply
net
|
2 |
C |
done |
|
27 |
687d |
692d
|
27/29 |
643d |
74d6529b78f7
net: ethtool: Fix the panic caused by dev being null when dumping coalesce
|
|
WARNING in bpf_lwt_seg6_adjust_srh
net
bpf
|
-1 |
C |
done |
|
30 |
679d |
693d
|
27/29 |
643d |
c13fda93aca1
bpf: Remove tst_run from lwt_seg6local_prog_ops.
|
|
INFO: task hung in rfkill_global_led_trigger_worker (2)
net
nfc
|
1 |
C |
error |
|
1362 |
679d |
1281d
|
26/29 |
679d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
|
INFO: task hung in rtnetlink_rcv_msg
net
|
1 |
C |
inconclusive |
inconclusive |
1970 |
679d |
2643d
|
26/29 |
679d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
|
INFO: task hung in addrconf_verify_work (8)
net
|
1 |
C |
error |
|
1294 |
679d |
883d
|
26/29 |
679d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
|
INFO: task hung in switchdev_deferred_process_work (2)
net
|
1 |
C |
inconclusive |
|
1226 |
679d |
2122d
|
26/29 |
679d |
d864319871b0
net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
|
|
WARNING in skb_ensure_writable
bpf
net
|
-1 |
C |
done |
|
2893 |
680d |
757d
|
26/29 |
679d |
2bbe3e5a2f4e
bpf: Avoid splat in pskb_pull_reason
|
|
possible deadlock in __sock_map_delete
net
bpf
|
4 |
C |
|
|
14 |
721d |
765d
|
26/29 |
687d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
|
WARNING in geneve_xmit
net
|
-1 |
C |
done |
|
42 |
753d |
760d
|
26/29 |
698d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
|
WARNING in packet_setsockopt
net
|
-1 |
C |
|
|
83 |
736d |
775d
|
26/29 |
705d |
86d43e2bf93c
af_packet: avoid a false positive warning in packet_setsockopt()
|
|
kernel BUG in dev_gro_receive
net
|
-1 |
C |
done |
|
72 |
718d |
734d
|
25/29 |
707d |
be008726d0ac
net: gro: initialize network_offset in network layer
|
|
KMSAN: uninit-value in nci_ntf_packet (2)
net
nfc
|
7 |
C |
|
|
13 |
710d |
723d
|
25/29 |
707d |
068648aab72c
nfc/nci: Add the inconsistency check between the input data length and count
|
|
WARNING in sock_map_close
bpf
net
|
-1 |
C |
error |
|
182 |
708d |
771d
|
25/29 |
707d |
4b4647add7d3
sock_map: avoid race between sock_map_close and sk_psock_put
|
|
possible deadlock in sock_hash_delete_elem (2)
bpf
net
|
4 |
C |
|
|
1127 |
708d |
791d
|
25/29 |
707d |
98e948fb60d4
bpf: Allow delete from sockmap/sockhash only if update is allowed
|
|
INFO: rcu detected stall in packet_release
net
|
1 |
C |
unreliable |
|
1 |
800d |
722d
|
25/29 |
707d |
fb66df20a720
net/sched: taprio: extend minimum interval restriction to entire cycle too
|
|
INFO: trying to register non-static key in __timer_delete_sync (2)
net
|
-1 |
C |
|
|
45524 |
735d |
753d
|
25/29 |
711d |
3c668cef61ad
net: hsr: init prune_proxy_timer sooner
|
|
WARNING in __inet_accept
net
|
-1 |
C |
done |
|
3 |
729d |
729d
|
25/29 |
713d |
26afda78cda3
UPSTREAM: net: relax socket state check at accept time.
|
|
KMSAN: uninit-value in nci_rx_work
nfc
net
|
7 |
C |
|
|
582 |
713d |
869d
|
25/29 |
713d |
e4a87abf5885
nfc: nci: Fix uninit-value in nci_rx_work
|
|
KASAN: slab-use-after-free Read in unix_del_edges
net
|
19 |
C |
done |
|
2 |
761d |
760d
|
25/29 |
713d |
1af2dface5d2
af_unix: Don't access successor in unix_del_edges() during GC.
|
|
KMSAN: uninit-value in dev_map_lookup_elem
bpf
net
|
7 |
C |
|
|
3 |
778d |
785d
|
25/29 |
713d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
|
KMSAN: uninit-value in sock_map_delete_elem
bpf
net
|
7 |
C |
|
|
44 |
714d |
785d
|
25/29 |
713d |
e8742081db7d
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
|
|
WARNING in qdisc_alloc
net
|
-1 |
C |
error |
|
1069 |
735d |
749d
|
25/29 |
713d |
86735b57c905
net/sched: unregister lockdep keys in qdisc_create/qdisc_alloc error path
|
|
KASAN: global-out-of-bounds Read in __nla_validate_parse
net
|
17 |
C |
|
|
5 |
771d |
771d
|
25/29 |
713d |
8750539ba317
net: team: fix incorrect maxattr
|
|
KASAN: slab-use-after-free Read in vhost_task_fn
kvm
net
virt
|
19 |
C |
done |
|
2661 |
747d |
749d
|
25/29 |
713d |
db5247d9bf5c
vhost_task: Handle SIGKILL by flushing work and exiting
|
|
KMSAN: uninit-value in geneve_xmit (3)
net
|
7 |
C |
|
|
14 |
768d |
776d
|
25/29 |
727d |
d8a6213d70ac
geneve: fix header validation in geneve[6]_xmit_skb
|
|
KMSAN: kernel-infoleak in __skb_datagram_iter (3)
net
|
9 |
C |
|
|
25 |
729d |
783d
|
25/29 |
727d |
d313eb8b7755
net/sched: act_skbmod: prevent kernel-infoleak
|
|
KMSAN: uninit-value in gre_rcv (3)
net
|
7 |
C |
|
|
3 |
781d |
782d
|
25/29 |
727d |
17af420545a7
erspan: make sure erspan_base_hdr is present in skb->head
|
|
KASAN: slab-out-of-bounds Read in nfc_llcp_setsockopt
net
nfc
|
17 |
C |
error |
|
5 |
764d |
773d
|
25/29 |
727d |
7a87441c9651
nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies
|
|
WARNING in sock_map_delete_elem
bpf
net
|
-1 |
C |
|
|
17183 |
753d |
792d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
possible deadlock in scheduler_tick (3)
bpf
net
|
4 |
C |
|
|
1179 |
754d |
790d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
possible deadlock in rcu_exp_handler
net
bpf
|
4 |
C |
|
|
1 |
767d |
763d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
possible deadlock in rcu_report_exp_cpu_mult
net
bpf
|
4 |
C |
done |
|
30 |
754d |
792d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
possible deadlock in try_to_wake_up (4)
bpf
net
|
4 |
C |
error |
|
19 |
729d |
792d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
possible deadlock in ahci_single_level_irq_intr
bpf
net
|
4 |
C |
|
|
10 |
775d |
783d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
WARNING in sock_map_unref
bpf
net
|
-1 |
C |
error |
|
97 |
754d |
768d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
WARNING in sock_hash_delete_elem
bpf
net
|
-1 |
C |
done |
|
16982 |
753d |
792d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
possible deadlock in hrtimer_run_queues
bpf
net
|
4 |
C |
error |
|
592 |
754d |
791d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
possible deadlock in swake_up_one
bpf
net
|
4 |
C |
|
|
4 |
765d |
764d
|
25/29 |
727d |
ff9105993240
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
|
|
KASAN: slab-out-of-bounds Read in xsk_setsockopt
bpf
net
|
17 |
C |
|
|
17 |
766d |
775d
|
25/29 |
727d |
237f3cf13b20
xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
|
|
KMSAN: uninit-value in ipvlan_queue_xmit (2)
net
|
7 |
C |
|
|
2 |
800d |
761d
|
25/29 |
727d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
|
possible deadlock in __unix_gc
net
|
4 |
C |
done |
|
5 |
754d |
756d
|
25/29 |
727d |
1971d13ffa84
af_unix: Suppress false-positive lockdep splat for spin_lock() in __unix_gc().
|
|
WARNING in gre_tap_xmit (2)
net
|
-1 |
C |
done |
|
67 |
735d |
760d
|
25/29 |
727d |
4b911a9690d7
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
|
|
general protection fault in dev_map_enqueue
net
bpf
|
19 |
C |
|
|
676 |
727d |
784d
|
25/29 |
727d |
5bcf0dcbf906
xdp: use flags field to disambiguate broadcast redirect
|
|
KMSAN: uninit-value in nci_ntf_packet
net
nfc
|
7 |
C |
|
|
79 |
728d |
869d
|
25/29 |
727d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
|
possible deadlock in unix_del_edges
net
|
4 |
C |
|
|
49 |
770d |
775d
|
25/29 |
727d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
|
KASAN: slab-out-of-bounds Read in data_sock_setsockopt
net
|
17 |
C |
|
|
2 |
771d |
771d
|
25/29 |
727d |
138b787804f4
mISDN: fix MISDN_TIME_STAMP handling
|
|
KMSAN: uninit-value in nci_dev_up
net
nfc
|
7 |
C |
|
|
7 |
786d |
845d
|
25/29 |
727d |
d24b03535e5e
nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
|
|
possible deadlock in unix_notinflight
net
|
4 |
C |
|
|
7 |
753d |
769d
|
25/29 |
727d |
b46f4eaa4f0e
af_unix: Clear stale u->oob_skb.
|
|
WARNING in cleanup_net (3)
net
|
-1 |
syz |
|
|
240 |
768d |
901d
|
25/29 |
767d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
|
WARNING in net_free (2)
net
|
-1 |
syz |
|
|
27 |
774d |
820d
|
25/29 |
767d |
2a750d6a5b36
rds: tcp: Fix use-after-free of net in reqsk_timer_handler().
|
|
KMSAN: uninit-value in cookie_v4_check
net
|
7 |
C |
|
|
9 |
791d |
797d
|
25/29 |
769d |
956c0d619107
tcp: Clear req->syncookie in reqsk_alloc().
|
|
UBSAN: shift-out-of-bounds in taprio_change
net
|
-1 |
C |
done |
|
4 |
799d |
799d
|
25/29 |
769d |
343041b59b78
net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
|
|
WARNING: suspicious RCU usage in in6_dump_addrs (2)
net
|
4 |
C |
done |
|
3 |
812d |
812d
|
25/29 |
769d |
67ea41d19d2a
inet6: expand rcu_read_lock() scope in inet6_dump_addr()
|
|
KMSAN: uninit-value in hsr_get_node (2)
net
|
7 |
C |
|
|
49 |
770d |
856d
|
25/29 |
769d |
ddbec99f5857
hsr: Fix uninit-value access in hsr_get_node()
|
|
WARNING in mpls_gso_segment
net
|
-1 |
C |
done |
|
20 |
815d |
818d
|
25/29 |
769d |
025f8ad20f2e
net: mpls: error out if inner headers are not set
|
|
BUG: unable to handle kernel NULL pointer dereference in dev_map_hash_update_elem
net
bpf
|
10 |
C |
|
|
2 |
813d |
821d
|
25/29 |
769d |
281d464a34f5
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
|
|
KMSAN: uninit-value in geneve_udp_encap_recv
net
|
7 |
C |
|
|
2 |
814d |
845d
|
25/29 |
769d |
1ca1ba465e55
geneve: make sure to pull inner header in geneve_rx()
|
|
kernel BUG in __nla_validate_parse
net
|
-1 |
C |
done |
|
13 |
798d |
801d
|
25/29 |
769d |
d8a21070b6e1
nexthop: Fix out-of-bounds access during attribute validation
|
|
BUG: sleeping function called from invalid context in __lock_sock_fast (2)
net
|
5 |
C |
|
|
6 |
809d |
811d
|
25/29 |
777d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
|
possible deadlock in tcp_diag_get_aux
net
|
4 |
C |
|
|
117 |
803d |
820d
|
25/29 |
777d |
d6a9608af9a7
mptcp: fix possible deadlock in subflow diag
|
|
kernel BUG in eth_header (2)
net
|
-1 |
C |
|
|
2 |
853d |
853d
|
25/29 |
777d |
dad555c816a5
llc: make llc_ui_sendmsg() more robust against bonding changes
|
|
BUG: unable to handle kernel NULL pointer dereference in unix_stream_sendmsg
net
bpf
|
10 |
C |
|
|
1 |
812d |
812d
|
25/29 |
777d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
|
BUG: unable to handle kernel NULL pointer dereference in sk_psock_verdict_data_ready
bpf
net
|
10 |
C |
unreliable |
|
15 |
808d |
928d
|
25/29 |
777d |
4cd12c6065df
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
|
|
INFO: task hung in unix_stream_sendmsg
net
|
1 |
C |
done |
|
4 |
818d |
821d
|
25/29 |
781d |
aa82ac51d633
af_unix: Drop oob_skb ref before purging queue in GC.
|
|
memory leak in pppoe_sendmsg
net
|
3 |
C |
|
|
26 |
873d |
2545d
|
25/29 |
782d |
dc34ebd5c018
pppoe: Fix memory leak in pppoe_sendmsg()
|
|
WARNING in __unix_gc
net
|
-1 |
C |
|
|
49 |
831d |
837d
|
25/29 |
782d |
1279f9d9dec2
af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.
|
|
memory leak in virtual_ncidev_write (2)
net
nfc
|
3 |
C |
|
|
2 |
882d |
1042d
|
25/29 |
784d |
bfb007aebe6b
nfc: nci: free rx_data_reassembly skb on NCI device cleanup
|
|
KMSAN: uninit-value in IP6_ECN_decapsulate (2)
net
|
7 |
C |
|
|
3 |
835d |
850d
|
25/29 |
784d |
8d975c15c0cd
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
|
|
INFO: task hung in rtnl_lock (3)
net
|
1 |
C |
|
|
128 |
789d |
1140d
|
25/29 |
784d |
3871aa01e1a7
tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
|
|
KMSAN: uninit-value in geneve_xmit (2)
net
|
7 |
C |
|
|
12 |
789d |
866d
|
25/29 |
785d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
|
WARNING in ip6gre_tunnel_xmit
net
|
-1 |
C |
done |
|
2 |
814d |
814d
|
25/29 |
785d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
|
KASAN: use-after-free Read in __skb_flow_dissect (3)
net
|
19 |
C |
|
|
1 |
859d |
869d
|
25/29 |
785d |
5ae1e9922bbd
net: ip_tunnel: prevent perpetual headroom growth
|
|
INFO: task hung in addrconf_dad_work (3)
net
|
1 |
C |
|
|
185 |
798d |
840d
|
25/29 |
785d |
ba5e1272142d
netdevsim: avoid potential loop in nsim_dev_trap_report_work()
|
|
KMSAN: kernel-infoleak in __skb_datagram_iter (2)
net
|
19 |
C |
|
|
126 |
785d |
837d
|
25/29 |
785d |
661779e1fcaf
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
|
|
INFO: task hung in unix_dgram_sendmsg
net
|
1 |
C |
done |
|
36 |
811d |
830d
|
25/29 |
785d |
25236c91b5ab
af_unix: Fix task hung while purging oob_skb in GC.
|
|
KMSAN: uninit-value in __llc_lookup_established
net
|
7 |
C |
|
|
46 |
853d |
896d
|
25/29 |
785d |
e3f9bed9bee2
llc: Drop support for ETH_P_TR_802_2.
|
|
KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim (2)
net
|
7 |
C |
|
|
17 |
840d |
865d
|
25/29 |
838d |
d375b98e0248
ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()
|
|
KASAN: slab-use-after-free Read in nla_find
bpf
net
|
19 |
C |
done |
|
4 |
884d |
883d
|
25/29 |
840d |
2130c519a401
bpf: Use nla_ok() instead of checking nla_len directly
|
|
KASAN: slab-use-after-free Read in nfc_alloc_send_skb
net
nfc
|
19 |
C |
error |
|
3 |
893d |
922d
|
25/29 |
840d |
c95f919567d6
nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local
|
|
general protection fault in hfsc_tcf_block
net
|
2 |
C |
done |
|
1020 |
863d |
870d
|
25/29 |
840d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
|
WARNING in __sk_msg_free
bpf
net
|
-1 |
C |
done |
|
4 |
866d |
865d
|
25/29 |
840d |
dc9dfc8dc629
net: tls, fix WARNIING in __sk_msg_free
|
|
KASAN: slab-out-of-bounds Read in dsa_user_changeupper
net
|
17 |
C |
done |
|
1303 |
847d |
861d
|
25/29 |
840d |
844f104790bd
net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events
|
|
general protection fault in qdisc_create
net
|
10 |
C |
done |
|
2821 |
862d |
870d
|
25/29 |
840d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
|
WARNING in dev_watchdog (2)
net
|
-1 |
C |
inconclusive |
|
6791 |
842d |
2241d
|
25/29 |
840d |
e316dd1cf135
net: don't dump stack on queue timeout
|
|
KMSAN: uninit-value in netif_skb_features (2)
net
|
7 |
C |
|
|
9 |
884d |
972d
|
25/29 |
840d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
|
WARNING in ip6_route_info_create
net
|
-1 |
C |
done |
|
241 |
890d |
894d
|
25/29 |
840d |
a3c205d0560f
ipv6: do not check fib6_has_expires() in fib6_info_release()
|
|
general protection fault in page_pool_unlist
net
|
2 |
C |
done |
|
648 |
900d |
902d
|
25/29 |
840d |
f9893fdac319
net: page_pool: fix general protection fault in page_pool_unlist
|
|
KMSAN: uninit-value in validate_xmit_skb
net
|
7 |
C |
|
|
21 |
841d |
859d
|
25/29 |
840d |
9181d6f8a2bb
net: add more sanity check in virtio_net_hdr_to_skb()
|
|
general protection fault in htb_tcf_block
net
|
2 |
C |
done |
|
885 |
862d |
870d
|
25/29 |
840d |
94e2557d086a
net: sched: move block device tracking into tcf_block_get/put_ext()
|
|
general protection fault in skb_segment (4)
net
|
8 |
C |
error |
|
4 |
884d |
892d
|
25/29 |
849d |
23d05d563b7e
net: prevent mss overflow in skb_segment()
|
|
WARNING in fib6_add (5)
net
|
-1 |
C |
done |
|
6 |
894d |
1057d
|
25/29 |
849d |
75475bb51e78
ipv6: fix potential NULL deref in fib6_add()
|
|
KASAN: slab-out-of-bounds Read in dns_resolver_preparse
net
|
17 |
C |
done |
|
46 |
874d |
887d
|
25/29 |
850d |
1997b3cb4217
keys, dns: Fix missing size check of V1 server-list header
|
|
general protection fault in dccp_write_xmit (2)
net
|
8 |
C |
done |
|
32 |
882d |
937d
|
25/29 |
850d |
cac23b7d7627
net: Return error from sk_stream_wait_connect() if sk_wait_event() fails
|
|
KASAN: null-ptr-deref Write in unix_stream_bpf_update_proto
bpf
net
|
12 |
C |
done |
|
54 |
871d |
901d
|
25/29 |
850d |
8d6650646ce4
bpf: syzkaller found null ptr deref in unix_bpf proto add
|
|
memory leak in skb_copy (2)
nfc
net
|
3 |
syz |
|
|
3 |
922d |
1039d
|
25/29 |
850d |
84d2db91f14a
nfc: virtual_ncidev: Add variable to check if ndev is running
|
|
general protection fault in tls_merge_open_record
net
|
2 |
syz |
unreliable |
|
5 |
932d |
932d
|
25/29 |
850d |
53f2cb491b50
tls: fix NULL deref on tls_sw_splice_eof() with empty record
|
|
KASAN: slab-use-after-free Read in unix_stream_read_actor
net
|
19 |
C |
error |
|
6 |
904d |
920d
|
25/29 |
850d |
4b7b492615cf
af_unix: fix use-after-free in unix_stream_read_actor()
|
|
general protection fault in ptp_ioctl
net
|
2 |
C |
done |
|
8 |
925d |
926d
|
25/29 |
850d |
8a4f030dbced
ptp: Fixes a null pointer dereference in ptp_ioctl
|
|
kernel BUG in ip6gre_header (2)
net
|
-1 |
C |
|
|
2 |
949d |
963d
|
25/29 |
850d |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
|
BUG: unable to handle kernel paging request in nsim_bpf
net
|
8 |
C |
|
|
3 |
907d |
922d
|
25/29 |
850d |
c0c6bde586c7
netdevsim: Don't accept device bound programs
|
|
kernel BUG in ipgre_header
net
|
-1 |
C |
|
|
4 |
899d |
914d
|
25/29 |
850d |
3cffa2ddc4d3
bonding: stop the device in bond_setup_by_slave()
|
|
KASAN: stack-out-of-bounds Read in tcp_inbound_hash
net
|
17 |
C |
done |
|
28 |
919d |
933d
|
25/29 |
860d |
02f0717e9835
net/tcp: fix possible out-of-bounds reads in tcp_hash_fail()
|
|
WARNING in dev_index_reserve (2)
net
|
-1 |
C |
done |
|
68 |
940d |
950d
|
25/29 |
860d |
cbfbfe3aee71
tun: prevent negative ifindex
|
|
KMSAN: uninit-value in dccp_v6_err
net
|
7 |
C |
|
|
4 |
975d |
980d
|
25/29 |
862d |
6af289746a63
dccp: fix dccp_v4_err()/dccp_v6_err() again
|
|
general protection fault in scatterwalk_copychunks (4)
net
crypto
|
19 |
C |
done |
done |
1341 |
879d |
1890d
|
25/29 |
879d |
cfaa80c91f6f
net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
|
|
WARNING: zero-size vmalloc in print_tainted
bpf
net
|
-1 |
C |
|
|
79 |
1073d |
1107d
|
25/29 |
880d |
a12bbb3cccf0
xdp: Fix zero-size allocation warning in xskq_create()
|
|
KMSAN: uninit-value in IP6_ECN_decapsulate
net
|
7 |
C |
|
|
981 |
882d |
2798d
|
25/29 |
880d |
484b4833c604
hsr: Fix uninit-value access in fill_frame_info()
|
|
memory leak in kcm_sendmsg (2)
net
|
3 |
C |
|
|
1 |
993d |
1028d
|
25/29 |
880d |
c821a88bd720
kcm: Fix memory leak in error path of kcm_sendmsg()
|
|
KMSAN: uninit-value in virtio_transport_recv_pkt
virt
kvm
net
|
7 |
C |
|
|
20713 |
921d |
935d
|
25/29 |
880d |
34c4effacfc3
virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
|
|
WARNING in skb_warn_bad_offload (4)
net
|
-1 |
C |
done |
|
1763 |
943d |
970d
|
25/29 |
880d |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
|
WARNING in __ip6_append_data
net
|
-1 |
C |
unreliable |
|
5 |
950d |
979d
|
25/29 |
880d |
9d4c75800f61
ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
|
|
BUG: corrupted list in ptp_open
net
|
8 |
C |
done |
|
7 |
926d |
936d
|
25/29 |
880d |
1bea2c3e6df8
ptp: fix corrupted list in ptp_open
b714ca2ccf6a
ptp: ptp_read should not release queue
|
|
WARNING in skb_checksum_help (2)
net
|
-1 |
C |
done |
|
3816 |
880d |
970d
|
25/29 |
880d |
fc8b2a619469
net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
|
|
BUG: corrupted list in nfc_llcp_register_device
net
nfc
|
22 |
C |
error |
|
136 |
957d |
1245d
|
25/29 |
880d |
dfc7f7a988da
net: nfc: llcp: Add lock when modifying device list
|
|
UBSAN: shift-out-of-bounds in nci_activate_target
net
nfc
|
-1 |
C |
done |
|
6 |
959d |
1143d
|
25/29 |
880d |
354a6e707e29
nfc: nci: assert requested protocol is valid
|
|
WARNING in inet_csk_get_port (2)
net
|
-1 |
C |
done |
|
88 |
941d |
972d
|
25/29 |
880d |
8702cf12e6ba
tcp: Fix listen() warning with v4-mapped-v6 address.
|
|
KMSAN: uninit-value in fq_change
net
|
7 |
C |
|
|
8 |
922d |
924d
|
25/29 |
880d |
f1a3b283f852
UPSTREAM: net_sched: sch_fq: better validate TCA_FQ_WEIGHTS and TCA_FQ_PRIOMAP
|
|
KMSAN: uninit-value in llc_station_rcv
net
|
7 |
C |
|
|
2 |
936d |
945d
|
25/29 |
880d |
7b3ba18703a6
llc: verify mac len before reading mac header
|
|
INFO: rcu detected stall in sys_close (5)
net
|
1 |
C |
done |
|
1 |
994d |
994d
|
23/29 |
950d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
|
WARNING in unregister_vlan_dev
net
|
-1 |
C |
done |
|
1310 |
1003d |
1012d
|
23/29 |
950d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
|
general protection fault in generic_hwtstamp_ioctl_lower
net
|
2 |
C |
done |
|
7 |
1016d |
1019d
|
23/29 |
950d |
c35e927cbe09
net: omit ndo_hwtstamp_get() call when possible in dev_set_hwtstamp_phylib()
|
|
INFO: rcu detected stall in unix_release
net
|
1 |
C |
done |
|
1 |
1014d |
1010d
|
23/29 |
950d |
da71714e359b
net/sched: fix a qdisc modification with ambiguous command request
|
|
WARNING: refcount bug in xp_put_pool
bpf
net
|
13 |
C |
done |
|
2 |
1025d |
1023d
|
23/29 |
950d |
85c2c79a0730
xsk: fix refcount underflow in error path
|
|
WARNING in ip6_tnl_exit_batch_net
net
|
-1 |
C |
done |
|
29 |
1005d |
1012d
|
23/29 |
950d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
|
KASAN: stack-out-of-bounds Write in __nla_validate_parse
net
|
21 |
C |
done |
|
4 |
1018d |
1032d
|
23/29 |
950d |
4d50e50045aa
net: flower: fix stack-out-of-bounds in fl_set_key_cfm()
|
|
WARNING: bad unlock balance in sockopt_release_sock
net
|
4 |
C |
done |
|
2 |
998d |
998d
|
23/29 |
950d |
8be6f88b9d3f
inet: fix IP_TRANSPARENT error handling
|
|
KASAN: slab-use-after-free Read in xsk_diag_dump
net
bpf
|
19 |
C |
done |
|
9 |
985d |
994d
|
23/29 |
950d |
3e019d8a05a3
xsk: Fix xsk_diag use-after-free error during socket cleanup
|
|
general protection fault in skb_segment (3)
net
|
2 |
C |
done |
|
2 |
1010d |
1010d
|
23/29 |
950d |
b616be6b9768
net: do not allow gso_size to be set to GSO_BY_FRAGS
|
|
BUG: soft lockup in fq_pie_timer (4)
net
|
1 |
syz |
|
|
5 |
980d |
1031d
|
23/29 |
950d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
|
INFO: rcu detected stall in nsim_dev_trap_report_work
net
|
1 |
syz |
|
|
4 |
986d |
1028d
|
23/29 |
950d |
8c21ab1bae94
net/sched: fq_pie: avoid stalls in fq_pie_timer()
|
|
WARNING in rtnl_dellink (3)
net
|
-1 |
C |
done |
|
492 |
1002d |
1012d
|
23/29 |
950d |
ace0ab3a4b54
Revert "vlan: Fix VLAN 0 memory leak"
|
|
KASAN: slab-use-after-free Read in team_device_event
net
|
19 |
C |
done |
|
2 |
986d |
985d
|
23/29 |
950d |
6afcf0fb9270
Revert "net: team: do not use dynamic lockdep key"
|
|
WARNING in tcx_uninstall
net
bpf
|
-1 |
C |
done |
|
7 |
1024d |
1028d
|
23/29 |
950d |
079082c60aff
tcx: Fix splat during dev unregister
|
|
KASAN: slab-out-of-bounds Read in do_csum
net
|
19 |
C |
|
|
160 |
954d |
995d
|
23/29 |
950d |
8bd795fedb84
arm64: csum: Fix OoB access in IP checksum code for negative lengths
|
|
WARNING: ODEBUG bug in ingress_destroy
net
|
-1 |
C |
done |
|
16 |
1031d |
1034d
|
23/29 |
950d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
|
WARNING: ODEBUG bug in tcx_uninstall
bpf
net
|
-1 |
C |
done |
|
38 |
1029d |
1034d
|
23/29 |
950d |
dc644b540a2d
tcx: Fix splat in ingress_destroy upon tcx_entry_free
|
|
KASAN: slab-use-after-free Write in mini_qdisc_pair_swap
net
|
22 |
C |
error |
|
76 |
999d |
1153d
|
23/29 |
963d |
84ad0af0bccd
net/sched: qdisc_destroy() old ingress and clsact Qdiscs before grafting
c7cfbd115001
net/sched: sch_ingress: Only create under TC_H_INGRESS
|
|
WARNING in sock_i_ino
net
|
-1 |
C |
error |
|
22 |
1057d |
1061d
|
23/29 |
964d |
25a9c8a4431c
netlink: Add __sock_i_ino() for __netlink_diag_dump().
|
|
KASAN: stack-out-of-bounds Read in ip6mr_ioctl
net
|
21 |
C |
done |
|
192 |
1062d |
1068d
|
23/29 |
964d |
3a4f0edbb793
ipv6: fix a typo in ip6mr_sk_ioctl()
|
|
kernel BUG in ip6gre_header
net
|
-1 |
C |
|
|
5 |
1000d |
1070d
|
23/29 |
964d |
9eed321cde22
net: lapbether: only support ethernet devices
|
|
WARNING in unreserve_psock
net
|
-1 |
C |
done |
|
2816 |
1063d |
1071d
|
23/29 |
964d |
9f8d0dc0ec4a
kcm: Fix unnecessary psock unreservation.
|
|
WARNING: refcount bug in fib6_nh_init
net
|
13 |
C |
done |
|
45 |
1063d |
1069d
|
23/29 |
964d |
3515440df461
ipv6: also use netdev_hold() in ip6_route_check_nh()
|
|
KASAN: stack-out-of-bounds Read in skb_splice_from_iter
net
|
17 |
C |
done |
|
64 |
1064d |
1072d
|
23/29 |
964d |
5a6f6873606e
ip, ip6: Fix splice to raw and ping sockets
|
|
KASAN: slab-out-of-bounds Read in taprio_dequeue_from_txq
net
|
17 |
syz |
error |
|
4 |
1078d |
1103d
|
23/29 |
964d |
be3618d96510
net/sched: taprio: fix slab-out-of-bounds Read in taprio_dequeue_from_txq
|
|
WARNING in scm_recv
net
|
-1 |
C |
done |
|
8 |
1050d |
1054d
|
23/29 |
964d |
603fc57ab70c
af_unix: Skip SCM_PIDFD if scm->pid is NULL.
|
|
KASAN: stack-out-of-bounds Read in ipmr_ioctl
net
|
21 |
C |
done |
|
208 |
1062d |
1068d
|
23/29 |
964d |
634236b34d7a
net: remove sk_is_ipmr() and sk_is_icmpv6() helpers
|
|
BUG: soft lockup in addrconf_rs_timer (2)
net
|
1 |
C |
|
|
51 |
1063d |
1084d
|
23/29 |
1050d |
cd2b8113c2e8
net/sched: fq_pie: ensure reasonable TCA_FQ_PIE_QUANTUM values
|
|
KMSAN: uninit-value in xfrm_state_find
net
|
17 |
C |
error |
done |
215 |
1096d |
2895d
|
22/29 |
1053d |
3d776e31c841
xfrm: Reject optional tunnel/BEET mode templates in outbound policies
|
|
memory leak in tcf_pedit_init
net
|
3 |
C |
|
|
1 |
1116d |
1116d
|
22/29 |
1076d |
1b483d9f5805
net/sched: act_pedit: free pedit keys on bail from offset check
|
|
general protection fault in pause_prepare_data
net
|
2 |
C |
error |
|
34 |
1210d |
1211d
|
22/29 |
1076d |
f5be9caf7bf0
net: ethtool: fix NULL pointer dereference in pause_prepare_data()
|
|
KASAN: use-after-free Read in do_csum
net
|
19 |
C |
|
|
72 |
1078d |
1244d
|
22/29 |
1076d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
|
KMSAN: uninit-value in ethnl_set_linkmodes (2)
net
|
7 |
C |
|
|
40 |
1109d |
1415d
|
22/29 |
1076d |
9ad685dbfe7e
ethtool: Fix uninitialized number of lanes
|
|
WARNING in htb_destroy
net
|
-1 |
C |
done |
|
2 |
1194d |
1194d
|
22/29 |
1076d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
|
general protection fault in ethnl_set_plca_cfg
net
|
2 |
C |
done |
|
37 |
1219d |
1220d
|
22/29 |
1076d |
28dbf774bc87
plca.c: fix obvious mistake in checking retval
|
|
memory leak in tcindex_set_parms (3)
net
|
3 |
C |
|
|
1 |
1264d |
1260d
|
22/29 |
1076d |
8c710f75256b
net/sched: Retire tcindex classifier
|
|
BUG: unable to handle kernel NULL pointer dereference in __build_skb_around
bpf
net
|
10 |
C |
done |
|
29 |
1156d |
1161d
|
22/29 |
1076d |
e5995bc7e2ba
bpf, test_run: fix crashes due to XDP frame overwriting/corruption
|
|
general protection fault in virtio_transport_purge_skbs
net
|
2 |
C |
done |
|
3 |
1153d |
1153d
|
22/29 |
1076d |
b465518dc27d
vsock/loopback: use only sk_buff_head.lock to protect the packet queue
|
|
WARNING in cleanup_net (2)
net
|
-1 |
C |
error |
|
72 |
1111d |
1138d
|
22/29 |
1076d |
9744d2bf1976
smc: Fix use-after-free in tcp_write_timer_handler().
|
|
KASAN: use-after-free Read in cfusbl_device_notify
net
|
19 |
C |
done |
|
341 |
1168d |
1315d
|
22/29 |
1076d |
9781e98a9711
net: caif: Fix use-after-free in cfusbl_device_notify()
|
|
WARNING in ip6erspan_tunnel_xmit (2)
net
|
-1 |
C |
unreliable |
|
5 |
1156d |
1156d
|
22/29 |
1076d |
8e50ed774554
erspan: do not use skb_mac_header() in ndo_start_xmit()
|
|
KMSAN: uninit-value in qrtr_tx_resume
net
arm-msm
|
7 |
C |
|
|
8 |
1149d |
1210d
|
22/29 |
1076d |
6417070918de
net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()
|
|
WARNING in nla_get_range_unsigned (2)
net
|
-1 |
C |
done |
|
433 |
1152d |
1187d
|
22/29 |
1076d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
|
BUG: unable to handle kernel paging request in atm_tc_destroy
net
|
8 |
C |
error |
|
3 |
1195d |
1194d
|
22/29 |
1076d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
|
kernel BUG in ip_frag_next
net
|
-1 |
C |
done |
|
9 |
1210d |
1217d
|
22/29 |
1076d |
f72ff8b81ebc
net: fix kfree_skb_list use of skb_mark_not_on_list
|
|
WARNING: locking bug in inet_autobind
net
|
4 |
C |
done |
error |
103 |
1237d |
2560d
|
22/29 |
1076d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
|
BUG: scheduling while atomic in msleep
net
|
5 |
C |
done |
|
40 |
1209d |
1218d
|
22/29 |
1076d |
ea4fdbaa2f77
net/sched: sch_taprio: do not schedule in taprio_reset()
|
|
WARNING in __dev_queue_xmit (2)
net
|
-1 |
C |
|
|
76 |
1108d |
1180d
|
22/29 |
1076d |
693aa2c0d9b6
ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping()
|
|
general protection fault in bpf_struct_ops_link_create
bpf
net
|
2 |
C |
done |
|
17 |
1150d |
1152d
|
22/29 |
1076d |
55fbae05476d
bpf: Check IS_ERR for the bpf_map_get() return value
|
|
WARNING: refcount bug in qrtr_recvmsg (2)
arm-msm
net
|
13 |
C |
error |
|
2 |
1160d |
1154d
|
22/29 |
1076d |
44d807320000
net: qrtr: Fix a refcount bug in qrtr_recvmsg()
|
|
INFO: trying to register non-static key in net_free
net
|
-1 |
syz |
error |
|
17982 |
1183d |
1196d
|
22/29 |
1076d |
6e77a5a4af05
net: initialize net->notrefcnt_tracker earlier
|
|
WARNING: suspicious RCU usage in bond_mii_monitor
net
|
4 |
C |
|
|
13 |
1230d |
1249d
|
22/29 |
1076d |
42c7ded0eeac
bonding: fix lockdep splat in bond_miimon_commit()
|
|
BUG: stack guard page was hit in inet6_release
bpf
net
|
-1 |
C |
done |
|
4 |
1211d |
1260d
|
22/29 |
1076d |
ddce1e091757
bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
|
|
possible deadlock in l2tp_tunnel_register (2)
net
|
4 |
C |
|
|
153 |
1170d |
1180d
|
22/29 |
1076d |
0b2c59720e65
l2tp: close all race conditions in l2tp_tunnel_register()
|
|
KASAN: slab-use-after-free Read in tcf_action_destroy
net
|
19 |
C |
error |
|
32 |
1103d |
1178d
|
22/29 |
1076d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
|
possible deadlock in release_sock
net
|
4 |
C |
done |
|
42 |
1216d |
1218d
|
22/29 |
1076d |
b9fb10d131b8
l2tp: prevent lockdep issue in l2tp_tunnel_register()
|
|
memory leak in nfc_genl_se_io
net
nfc
|
3 |
C |
|
|
1 |
1191d |
1187d
|
22/29 |
1076d |
25ff6f8a5a3b
nfc: fix memory leak of se_io context in nfc_genl_se_io
|
|
general protection fault in tcindex_set_parms
net
|
2 |
C |
done |
|
2 |
1191d |
1191d
|
22/29 |
1076d |
42018a322bd4
net/sched: tcindex: search key must be 16 bits
|
|
kernel BUG in fou_build_udp
net
|
-1 |
C |
|
|
1 |
1111d |
1111d
|
22/29 |
1076d |
c88f8d5cd95f
UPSTREAM: sit: update dev->needed_headroom in ipip6_tunnel_bind_dev()
|
|
kernel BUG in rxrpc_put_call
afs
net
|
-1 |
C |
done |
|
9 |
1214d |
1226d
|
22/29 |
1076d |
01644a1f98ff
rxrpc: Fix wrong error return in rxrpc_connect_call()
|
|
kernel BUG in rxrpc_put_peer
net
afs
|
-1 |
C |
|
|
80 |
1217d |
1260d
|
22/29 |
1076d |
9d35d880e0e4
rxrpc: Move client call connection to the I/O thread
03fc55adf876
rxrpc: Only disconnect calls in the I/O thread
|
|
INFO: rcu detected stall in devlink_nl_cmd_port_get_dumpit
net
|
1 |
syz |
|
|
7 |
1175d |
1191d
|
22/29 |
1076d |
b20b8aec6ffc
devlink: Fix netdev notifier chain corruption
|
|
WARNING in inet_sock_destruct (3)
net
|
-1 |
C |
|
|
87 |
1080d |
1182d
|
22/29 |
1076d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
|
KMSAN: uninit-value in ipv6_find_tlv
net
|
7 |
C |
|
|
271 |
1117d |
2471d
|
22/29 |
1076d |
ea30388baebc
ipv6: Fix an uninit variable access bug in __ip6_make_skb()
|
|
WARNING in default_device_exit_batch (4)
net
|
-1 |
C |
error |
|
954 |
1152d |
1278d
|
22/29 |
1076d |
e667d4690986
bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
|
|
KMSAN: kernel-infoleak in copyout (2)
net
|
17 |
C |
|
|
6723 |
1076d |
2245d
|
22/29 |
1076d |
8222d5910dae
xfrm: Zero padding when dumping algos and encap
|
|
KASAN: null-ptr-deref Read in __fl_put
net
|
11 |
C |
error |
|
16 |
1158d |
1177d
|
22/29 |
1076d |
dfd2f0eb2347
net/sched: flower: fix fl_change() error recovery path
|
|
kernel BUG in inet_sock_destruct
net
|
-1 |
C |
error |
|
3 |
1232d |
1232d
|
22/29 |
1076d |
1ac885574470
inet: control sockets should not use current thread task_frag
|
|
BUG: corrupted list in taprio_destroy
net
|
8 |
C |
done |
|
2 |
1193d |
1193d
|
22/29 |
1076d |
4fab64126891
net/sched: fix error recovery in qdisc_create()
|
|
KASAN: invalid-free in skb_free_head (2)
net
|
24 |
C |
error |
|
25 |
1117d |
1182d
|
22/29 |
1076d |
880ce5f20033
net: avoid skb end_offset change in __skb_unclone_keeptruesize()
|
|
KASAN: slab-out-of-bounds Read in sk_psock_get
net
|
17 |
C |
done |
error |
9 |
1393d |
1728d
|
22/29 |
1133d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
|
possible deadlock in nci_start_poll
net
nfc
|
4 |
C |
error |
done |
83 |
1181d |
1282d
|
22/29 |
1134d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
|
kernel BUG in pskb_expand_head
net
|
-1 |
C |
done |
|
1600 |
1195d |
1646d
|
22/29 |
1179d |
5f33a09e769a
can: isotp: convert struct tpcon::{idx,len} to unsigned int
7c759040c1dd
can: isotp: fix potential CAN frame reception race in isotp_rcv()
|
|
WARNING in ipgre_xmit
net
|
-1 |
C |
done |
|
9916 |
1431d |
1447d
|
22/29 |
1180d |
8d21e9963bec
ip_gre: test csum_start instead of transport header
|
|
KASAN: wild-memory-access Read in skb_copy_bits
net
|
17 |
C |
|
|
2 |
1348d |
1348d
|
22/29 |
1180d |
0d24148bd276
inet: ping: fix recent breakage
|
|
WARNING: kmalloc bug in xdp_umem_create (2)
bpf
net
|
-1 |
C |
done |
|
21 |
1559d |
1625d
|
22/29 |
1180d |
0708a0afe291
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
|
|
BUG: sleeping function called from invalid context in sk_psock_skb_ingress_self
bpf
net
|
5 |
C |
done |
|
151 |
1290d |
1312d
|
22/29 |
1180d |
2d1f274b95c6
skmsg: pass gfp argument to alloc_sk_msg()
|
|
KASAN: use-after-free Read in ipvlan_queue_xmit (3)
net
|
19 |
C |
error |
error |
8 |
1384d |
1982d
|
22/29 |
1180d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
|
general protection fault in llc_build_and_send_xid_pkt
net
|
2 |
C |
done |
|
2 |
1517d |
1517d
|
22/29 |
1180d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
|
WARNING in __skb_flow_dissect (4)
net
|
-1 |
C |
error |
|
6 |
1291d |
1300d
|
22/29 |
1180d |
9f225444467b
ppp: associate skb with a device at tx
|
|
WARNING in inet_csk_get_port
net
|
-1 |
C |
done |
|
1166 |
1229d |
1457d
|
22/29 |
1180d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
|
KASAN: use-after-free Read in free_netdev (3)
net
|
19 |
C |
inconclusive |
|
130 |
1272d |
1428d
|
22/29 |
1180d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
|
WARNING in skb_try_coalesce
net
|
-1 |
C |
error |
|
1521 |
1452d |
1906d
|
22/29 |
1180d |
763087dab975
net: add skb_set_end_offset() helper
|
|
general protection fault in sock_reserve_memory
net
|
2 |
C |
done |
|
2 |
1556d |
1556d
|
22/29 |
1180d |
25206111512d
crypto: af_alg - get rid of alg_memory_allocated
|
|
WARNING in tcp_enter_loss (3)
net
|
-1 |
C |
inconclusive |
|
7 |
1297d |
1594d
|
22/29 |
1180d |
0c175da7b037
tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent
|
|
general protection fault in tls_sk_proto_close (3)
net
|
2 |
C |
done |
|
276 |
1429d |
1828d
|
22/29 |
1180d |
69135c572d1f
net/tls: fix tls_sk_proto_close executed repeatedly
|
|
possible deadlock in l2tp_tunnel_register
net
|
4 |
C |
error |
|
9492 |
1180d |
1279d
|
22/29 |
1180d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
|
general protection fault in em_cmp_match
net
|
10 |
C |
|
|
4 |
1255d |
1252d
|
22/29 |
1180d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
|
general protection fault in ip6_rcv_core
net
|
8 |
C |
done |
|
275 |
1270d |
1497d
|
22/29 |
1180d |
0339d25a2807
ipv6: fix NULL deref in ip6_rcv_core()
|
|
KASAN: use-after-free Read in rxrpc_lookup_local
afs
net
|
22 |
C |
|
|
3997 |
1230d |
1260d
|
22/29 |
1180d |
8fbcc83334a7
rxrpc: Fix I/O thread startup getting skipped
eaa02390adb0
rxrpc: Fix NULL deref in rxrpc_unuse_local()
|
|
kernel BUG in warn_crc32c_csum_combine
net
exfat
|
-1 |
C |
error |
|
17 |
1294d |
1303d
|
22/29 |
1180d |
7f57f8165cb6
af_key: Fix send_acquire race with pfkey_register
|
|
WARNING in u32_change
net
|
-1 |
C |
|
|
28 |
1235d |
1332d
|
22/29 |
1180d |
7cba18332e36
net: sched: cls_u32: Avoid memcpy() false-positive warning
|
|
general protection fault in metadata_dst_free
net
|
2 |
C |
|
|
348 |
1311d |
1350d
|
22/29 |
1180d |
c52add61c27e
macsec: don't free NULL metadata_dst
|
|
memory leak in virtual_ncidev_write
net
nfc
|
3 |
C |
|
|
1 |
1279d |
1279d
|
22/29 |
1180d |
53270fb0fd77
NFC: nci: fix memory leak in nci_rx_data_packet()
|
|
memory leak in __vsock_create
net
virt
io-uring
|
3 |
C |
|
|
1 |
1504d |
1500d
|
22/29 |
1180d |
7e97cfed9929
vsock: Fix memory leak in vsock_connect()
|
|
WARNING in skb_tunnel_check_pmtu
net
|
-1 |
C |
done |
|
8 |
1422d |
1428d
|
22/29 |
1180d |
853a76148802
tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()
|
|
memory leak in ipv6_renew_options
net
|
3 |
C |
|
|
1 |
1406d |
1402d
|
22/29 |
1180d |
e27326009a3d
net: ping6: Fix memleak in ipv6_renew_options().
|
|
possible deadlock in kcm_ioctl
net
|
4 |
C |
error |
|
20 |
1366d |
1367d
|
22/29 |
1180d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
|
memory leak in __tcp_send_ack
net
|
3 |
C |
|
|
10 |
1318d |
1849d
|
22/29 |
1180d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
|
kernel BUG in __skb_gso_segment
net
|
-1 |
C |
done |
|
11 |
1447d |
1446d
|
22/29 |
1180d |
e9d3f80935b6
net/af_packet: make sure to pull mac header
|
|
general protection fault in tcp_create_openreq_child
net
|
2 |
C |
unreliable |
|
83 |
1485d |
1487d
|
22/29 |
1180d |
ba5a4fdd63ae
tcp: make sure treq->af_specific is initialized
|
|
KMSAN: uninit-value in ipvlan_queue_xmit
net
|
7 |
C |
|
|
2 |
1358d |
1941d
|
22/29 |
1180d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
|
possible deadlock in nci_set_local_general_bytes
net
nfc
|
4 |
C |
|
|
32 |
1231d |
1282d
|
22/29 |
1180d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
|
general protection fault in skb_clone (5)
net
|
10 |
C |
done |
|
7 |
1296d |
1313d
|
22/29 |
1180d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
|
KMSAN: kernel-infoleak in _copy_to_iter (7)
net
|
21 |
C |
|
|
138977 |
1180d |
1532d
|
22/29 |
1180d |
633593a80898
sctp: fix kernel-infoleak for SCTP sockets
|
|
possible deadlock in virtual_nci_close
nfc
net
|
4 |
C |
done |
|
939 |
1181d |
1282d
|
22/29 |
1180d |
b2e44aac91b2
NFC: nci: Allow to create multiple virtual nci devices
|
|
BUG: sleeping function called from invalid context in smc_pnet_add
net
|
5 |
C |
done |
|
45 |
1562d |
1563d
|
22/29 |
1180d |
94fdd7c02a56
net/smc: use GFP_ATOMIC allocation in smc_pnet_add_eth()
|
|
KASAN: slab-out-of-bounds Write in bpf_prog_test_run_xdp
net
bpf
|
21 |
C |
done |
|
18 |
1556d |
1573d
|
22/29 |
1180d |
a6763080856f
bpf: test_run: Fix OOB access in bpf_prog_test_run_xdp
|
|
possible deadlock in strp_work
net
|
4 |
C |
error |
|
4 |
1366d |
1367d
|
22/29 |
1180d |
8fc29ff3910f
kcm: fix strp_init() order and cleanup
|
|
WARNING in devl_port_unregister
net
|
-1 |
C |
|
|
1690 |
1183d |
1286d
|
22/29 |
1180d |
1fb22ed67195
devlink: Fix warning when unregistering a port
|
|
WARNING: suspicious RCU usage in corrupted (2)
net
|
4 |
C |
unreliable |
|
7 |
1424d |
1436d
|
22/29 |
1180d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
|
kernel BUG in vhost_get_vq_desc
virt
kvm
net
|
-1 |
C |
inconclusive |
|
19 |
1544d |
1557d
|
22/29 |
1180d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
|
WARNING in skb_warn_bad_offload (3)
net
|
-1 |
C |
done |
|
115 |
1181d |
1318d
|
22/29 |
1180d |
87445f369cca
ipv6: ping: fix wrong checksum for large frames
|
|
WARNING in arp_ioctl
net
|
-1 |
C |
error |
done |
17 |
1252d |
1322d
|
22/29 |
1180d |
b5f0de6df6dc
net: dev: Convert sa_data to flexible array in struct sockaddr
|
|
WARNING in ipvlan_queue_xmit
net
|
-1 |
C |
inconclusive |
|
4 |
1358d |
1358d
|
22/29 |
1180d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
|
WARNING: still has locks held in tls_rx_reader_lock
net
|
4 |
C |
done |
|
4 |
1398d |
1399d
|
22/29 |
1180d |
dde06aaa89b7
tls: rx: release the sock lock on locking timeout
|
|
WARNING: suspicious RCU usage in in6_dump_addrs
net
|
4 |
C |
unreliable |
|
613 |
1392d |
1436d
|
22/29 |
1180d |
4e43e64d0f13
ipv6: fix lockdep splat in in6_dump_addrs()
|
|
KASAN: use-after-free Read in tcp_retransmit_timer (5)
net
|
19 |
C |
unreliable |
|
16000 |
1264d |
2276d
|
22/29 |
1180d |
3a58f13a881e
net: rds: acquire refcount on TCP sockets
|
|
WARNING in inet_csk_destroy_sock (2)
io-uring
net
|
-1 |
C |
done |
|
8 |
1229d |
1315d
|
22/29 |
1180d |
e0833d1fedb0
dccp/tcp: Fixup bhash2 bucket when connect() fails.
|
|
WARNING in __vunmap
net
|
-1 |
C |
error |
error |
154 |
1329d |
2649d
|
22/29 |
1180d |
8a04d2fc700f
xfrm: Update ipcomp_scratches with NULL when freed
|
|
memory leak in napi_get_frags
net
|
3 |
C |
|
|
11 |
1929d |
1950d
|
22/29 |
1180d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
|
memory leak in netlink_policy_dump_add_policy
net
|
3 |
C |
|
|
1 |
1380d |
1376d
|
22/29 |
1180d |
249801360db3
net: genl: fix error path memory leak in policy dumping
|
|
general protection fault in llc_ui_connect
net
|
2 |
C |
done |
|
17 |
1513d |
1516d
|
22/29 |
1180d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
|
memory leak in ndisc_send_rs
net
|
3 |
C |
|
|
2 |
1677d |
1724d
|
22/29 |
1180d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
|
general protection fault in llc_ui_sendmsg
net
|
2 |
C |
done |
|
365 |
1513d |
1517d
|
22/29 |
1180d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
net
|
21 |
C |
inconclusive |
|
12 |
1529d |
1930d
|
22/29 |
1180d |
c700525fcc06
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
|
INFO: task hung in vhost_work_dev_flush
virt
kvm
net
|
1 |
C |
error |
|
2 |
1560d |
1551d
|
22/29 |
1180d |
e2ae38cf3d91
vhost: fix hung thread due to erroneous iotlb entries
|
|
stack segment fault in skb_clone
net
|
2 |
C |
unreliable |
inconclusive |
3 |
1435d |
1620d
|
22/29 |
1180d |
d8b57135fd9f
net: hsr: avoid possible NULL deref in skb_clone()
|
|
WARNING: suspicious RCU usage in bond_ethtool_get_ts_info
net
|
4 |
C |
done |
|
6 |
1466d |
1468d
|
22/29 |
1180d |
9b80ccda233f
bonding: fix missed rcu protection
|
|
general protection fault in rlb_req_update_slave_clients
net
|
2 |
C |
inconclusive |
|
3 |
1444d |
1444d
|
22/29 |
1180d |
ab84db251c04
net: bonding: fix possible NULL deref in rlb code
|
|
KASAN: invalid-free in tcp_disconnect
net
|
24 |
C |
unreliable |
|
74 |
1309d |
1323d
|
22/29 |
1180d |
72e560cb8c6f
tcp: cdg: allow tcp_cdg_release() to be called multiple times
|
|
memory leak in vlan_dev_set_egress_priority (2)
net
|
3 |
C |
|
|
1 |
1411d |
1411d
|
22/29 |
1180d |
72a0b329114b
vlan: fix memory leak in vlan_newlink()
|
|
WARNING in bpf_test_finish
bpf
net
|
-1 |
C |
done |
|
3 |
1542d |
1542d
|
22/29 |
1180d |
530e214c5b5a
bpf, test_run: Fix overflow in XDP frags bpf_test_finish
|
|
KASAN: null-ptr-deref Write in kcm_tx_work (3)
net
|
12 |
C |
inconclusive |
inconclusive |
7 |
1327d |
1428d
|
22/29 |
1180d |
ec7eede369fe
kcm: avoid potential race in kcm_tx_work
|
|
WARNING: refcount bug in sk_psock_get (2)
net
|
13 |
C |
done |
|
4 |
1405d |
1446d
|
22/29 |
1180d |
2a0133723f9e
net: fix refcount bug in sk_psock_get (2)
|
|
WARNING in nci_send_cmd
net
nfc
|
-1 |
C |
|
|
13 |
1267d |
1280d
|
22/29 |
1180d |
0ad6bded175e
nfc/nci: fix race with opening and closing
|
|
memory leak in mld_newpack
net
|
3 |
C |
|
|
2 |
1341d |
1759d
|
22/29 |
1180d |
a43206156263
usbnet: Fix memory leak in usbnet_disconnect()
|
|
WARNING in netif_napi_add_weight
net
|
-1 |
C |
inconclusive |
done |
45 |
1419d |
1432d
|
22/29 |
1180d |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
|
BUG: using smp_processor_id() in preemptible code in tun_chr_write_iter
net
|
4 |
C |
done |
|
1834 |
1519d |
1529d
|
22/29 |
1180d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
|
BUG: using smp_processor_id() in preemptible code in netdev_core_stats_alloc
net
|
4 |
C |
error |
|
2210 |
1519d |
1529d
|
22/29 |
1180d |
fc93db153b01
net: disable preemption in dev_core_stats_XXX_inc() helpers
|
|
BUG: missing reserved tailroom
bpf
net
|
-1 |
C |
done |
|
2 |
1531d |
1531d
|
22/29 |
1180d |
b6f1f780b393
bpf, test_run: Fix packet size check for live packet mode
|
|
possible deadlock in ___neigh_create
net
|
4 |
C |
error |
|
24 |
1565d |
1569d
|
22/29 |
1180d |
4a81f6da9cb2
net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work
|
|
general protection fault in llc_build_and_send_ui_pkt
net
|
2 |
C |
done |
|
26 |
1513d |
1517d
|
22/29 |
1180d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
|
WARNING in tls_strp_done
net
|
-1 |
C |
error |
|
22 |
1369d |
1374d
|
22/29 |
1180d |
849f16bbfb68
tls: rx: react to strparser initialization errors
|
|
KASAN: slab-out-of-bounds Write in __build_skb_around
net
bpf
|
21 |
C |
error |
|
2536 |
1253d |
1268d
|
22/29 |
1180d |
ce098da1497c
skbuff: Introduce slab_build_skb()
|
|
WARNING in sk_stream_kill_queues (8)
net
|
-1 |
C |
unreliable |
|
4268 |
1184d |
1420d
|
22/29 |
1180d |
e9c6e7976026
tcp: fix sock skb accounting in tcp_read_skb()
|
|
WARNING in mroute_clean_tables
net
|
-1 |
C |
|
|
10 |
1539d |
1559d
|
22/29 |
1180d |
5611a00697c8
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
|
|
general protection fault in pse_prepare_data
net
|
10 |
C |
inconclusive |
|
6 |
1230d |
1308d
|
22/29 |
1180d |
46cdedf2a0fa
ethtool: pse-pd: fix null-deref on genl_info in dump
|
|
KMSAN: uninit-value in bcmp
net
|
19 |
C |
error |
done |
907 |
1216d |
2537d
|
22/29 |
1180d |
4f1dc7d9756e
fs/ntfs3: Validate attribute name offset
|
|
UBSAN: shift-out-of-bounds in tcf_pedit_init
net
|
-1 |
C |
done |
|
59 |
1460d |
1468d
|
22/29 |
1180d |
4d42d54a7d6a
net/sched: act_pedit: sanitize shift argument before usage
|
|
general protection fault in llc_build_and_send_test_pkt
net
|
2 |
C |
done |
|
25 |
1512d |
1517d
|
22/29 |
1180d |
2d327a79ee17
llc: only change llc->dev when bind() succeeds
|
|
BUG: unable to handle kernel NULL pointer dereference in em_u32_match
net
|
10 |
C |
|
|
2 |
1235d |
1291d
|
22/29 |
1180d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
|
general protection fault in skb_unlink
net
|
2 |
C |
done |
error |
8 |
1349d |
2910d
|
22/29 |
1180d |
5121197ecc5d
kcm: close race conditions on sk_receive_queue
|
|
WARNING in sk_destruct
net
|
-1 |
C |
done |
|
454 |
1456d |
1583d
|
22/29 |
1180d |
ebdc1a030962
tcp: add a missing sk_defer_free_flush() in tcp_splice_read()
|
|
KASAN: slab-out-of-bounds Read in ipvlan_queue_xmit
net
|
17 |
C |
error |
error |
8 |
1543d |
2020d
|
22/29 |
1180d |
81225b2ea161
ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
|
|
WARNING in napi_complete_done
net
|
-1 |
C |
error |
|
104 |
1287d |
1292d
|
22/29 |
1180d |
07d120aa33cc
net: tun: call napi_schedule_prep() to ensure we own a napi
|
|
KASAN: use-after-free Read in ip6mr_sk_done
net
|
19 |
C |
done |
|
10988 |
1294d |
1564d
|
22/29 |
1180d |
7d9b1b578d67
ip6mr: fix use-after-free in ip6mr_sk_done()
|
|
KMSAN: uninit-value in tcp_recvmsg
net
|
7 |
C |
|
|
25918 |
1302d |
1427d
|
22/29 |
1180d |
1228b34c8d0e
net: clear msg_get_inq in __sys_recvfrom() and __copy_msghdr_from_user()
|
|
KASAN: use-after-free Read in inet_bind2_bucket_find
net
io-uring
|
19 |
C |
done |
|
13 |
1435d |
1442d
|
22/29 |
1180d |
593d1ebe00a4
Revert "net: Add a second bind table hashed by port and address"
|
|
possible deadlock in __inet_inherit_port
net
|
4 |
C |
done |
|
85 |
1217d |
1279d
|
22/29 |
1180d |
af295e854a4e
l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
|
|
INFO: rcu detected stall in mld_ifc_work
net
|
1 |
C |
inconclusive |
|
1 |
1556d |
1556d
|
22/29 |
1180d |
5740d0689096
net: sched: limit TC_ACT_REPEAT loops
|
|
general protection fault in fq_codel_enqueue (3)
net
|
2 |
C |
inconclusive |
|
5 |
1417d |
1663d
|
22/29 |
1180d |
fd1894224407
bpf: Don't redirect packets with invalid pkt_len
|
|
WARNING: bad unlock balance in rxrpc_do_sendmsg
afs
net
|
4 |
C |
inconclusive |
|
14 |
1385d |
1590d
|
22/29 |
1180d |
b0f571ecd794
rxrpc: Fix locking in rxrpc's sendmsg
|
|
memory leak in tun_chr_open
net
|
3 |
C |
|
|
1 |
1349d |
1349d
|
22/29 |
1180d |
1118b2049d77
net: tun: Fix memory leaks of napi_get_frags
|
|
general protection fault in udpv6_sendmsg
net
|
2 |
C |
error |
|
69 |
1276d |
1286d
|
22/29 |
1180d |
6423ac2eb31e
rxrpc: Fix oops from calling udpv6_sendmsg() on AF_INET socket
|
|
KASAN: slab-out-of-bounds Read in decrypt_internal
net
|
17 |
C |
inconclusive |
done |
4 |
1502d |
1593d
|
22/29 |
1180d |
9381fe8c849c
net/tls: fix slab-out-of-bounds bug in decrypt_internal
|
|
WARNING in ipvlan_unregister_nf_hook
net
|
-1 |
C |
done |
done |
4151 |
1629d |
2265d
|
22/29 |
1337d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
|
general protection fault in sock_close
net
|
2 |
syz |
done |
unreliable |
2 |
2090d |
2087d
|
20/29 |
1455d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
WARNING in dev_change_net_namespace
net
|
-1 |
syz |
done |
done |
8 |
1640d |
2289d
|
20/29 |
1461d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
|
WARNING in rtnl_dellink
net
|
-1 |
C |
done |
done |
94 |
1588d |
2099d
|
20/29 |
1467d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
|
INFO: task hung in linkwatch_event (2)
net
|
1 |
C |
done |
done |
1033 |
1485d |
2211d
|
20/29 |
1467d |
563fbefed46a
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
|
|
general protection fault in xfrm_user_rcv_msg_compat
net
|
2 |
C |
unreliable |
done |
1543 |
1748d |
1960d
|
20/29 |
1467d |
4e9505064f58
net/xfrm/compat: Copy xfrm_spdattr_type_t atributes
|
|
KMSAN: kernel-infoleak in _copy_to_iter (6)
net
|
9 |
C |
|
|
748 |
1533d |
1622d
|
20/29 |
1533d |
71ddeac8cd1d
inet_diag: fix kernel-infoleak for UDP sockets
|
|
WARNING: ODEBUG bug in qdisc_create
net
|
-1 |
C |
done |
|
6 |
1701d |
1729d
|
20/29 |
1533d |
a56d447f196f
net/sched: sch_taprio: properly cancel timer from taprio_destroy()
|
|
WARNING: suspicious RCU usage in xfrm_set_default
net
|
4 |
C |
done |
|
20 |
1696d |
1701d
|
20/29 |
1533d |
93ec1320b017
xfrm: fix rcu lock in xfrm_notify_userpolicy()
|
|
KASAN: null-ptr-deref Write in sock_setsockopt
net
|
12 |
C |
|
|
45 |
1550d |
1658d
|
20/29 |
1533d |
d00c8ee31729
net: fix possible NULL deref in sock_reserve_memory
|
|
KASAN: use-after-free Read in netlbl_catmap_walk
lsm
net
|
19 |
C |
inconclusive |
|
1 |
1728d |
1728d
|
20/29 |
1533d |
0817534ff9ea
smackfs: Fix use-after-free in netlbl_catmap_walk()
|
|
general protection fault in bpf_skb_cgroup_id
net
bpf
|
2 |
C |
inconclusive |
|
107 |
1689d |
1705d
|
20/29 |
1533d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
|
general protection fault in inet_csk_accept
net
|
2 |
C |
done |
|
8 |
1622d |
1621d
|
20/29 |
1533d |
b0cdc5dbcf2b
mptcp: never allow the PM to close a listener subflow
|
|
KASAN: invalid-free in packet_set_ring
net
|
24 |
C |
inconclusive |
|
4 |
1619d |
1619d
|
20/29 |
1533d |
ec6af094ea28
net/packet: rx_owner_map depends on pg_vec
|
|
general protection fault in bpf_skb_ancestor_cgroup_id
net
bpf
|
2 |
C |
unreliable |
|
232 |
1689d |
1705d
|
20/29 |
1533d |
435b08ec0094
bpf, test, cgroup: Use sk_{alloc,free} for test cases
|
|
INFO: rcu detected stall in fq_pie_timer
net
|
1 |
C |
error |
|
35 |
1574d |
1791d
|
20/29 |
1533d |
61c2402665f1
net/sched: fq_pie: prevent dismantle issue
|
|
general protection fault in free_percpu
net
|
2 |
syz |
unreliable |
done |
80 |
1601d |
1867d
|
20/29 |
1533d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
|
WARNING: lock held when returning to user space in tcp_setsockopt (2)
net
|
4 |
C |
done |
done |
6 |
1606d |
1612d
|
20/29 |
1533d |
b29fcfb54cd7
mptcp: full disconnect implementation
|
|
WARNING in tcf_chain0_head_change_cb_del (3)
net
|
-1 |
C |
inconclusive |
|
107 |
1617d |
1752d
|
20/29 |
1533d |
ab443c539167
sch_cake: do not call cake_destroy() from cake_init()
|
|
WARNING in nsim_dev_reload_destroy
net
|
-1 |
C |
done |
|
2895 |
1664d |
1669d
|
20/29 |
1533d |
fb9d19c2d844
Revert "devlink: Remove not-executed trap group notifications"
|
|
KASAN: use-after-free Read in free_netdev (2)
net
|
19 |
C |
done |
done |
1715 |
1631d |
2265d
|
20/29 |
1533d |
f123cffdd8fe
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
|
|
UBSAN: shift-out-of-bounds in __qdisc_calculate_pkt_len
net
|
-1 |
C |
unreliable |
|
5660 |
1691d |
1989d
|
20/29 |
1533d |
b193e15ac69d
net: prevent user from passing illegal stab size
|
|
general protection fault in dev_get_by_index_rcu (2)
bpf
net
|
2 |
C |
error |
|
18 |
1593d |
1593d
|
20/29 |
1533d |
382778edc826
xdp: check prog type before updating BPF link
|
|
WARNING in __dev_set_promiscuity
net
|
-1 |
C |
done |
|
11 |
1694d |
1698d
|
20/29 |
1533d |
a5b8fd657881
net: dev_addr_list: handle first address in __hw_addr_add_ex
|
|
BUG: sleeping function called from invalid context in hci_cmd_sync_cancel
net
usb
|
5 |
C |
done |
|
28 |
1609d |
1623d
|
20/29 |
1533d |
744451c162a5
Bluetooth: hci_sync: Push sync command cancellation to workqueue
|
|
BUG: sleeping function called from invalid context in tipc_crypto_start
net
|
5 |
C |
done |
done |
6 |
1611d |
1617d
|
20/29 |
1533d |
f845fe5819ef
Revert "tipc: use consistent GFP flags"
|
|
general protection fault in ref_tracker_alloc
net
|
2 |
C |
done |
|
679 |
1589d |
1618d
|
20/29 |
1533d |
0976b888a150
ethtool: fix null-ptr-deref on ref tracker
|
|
KMSAN: uninit-value in pneigh_fill_info
net
|
7 |
C |
|
|
14 |
1620d |
1625d
|
20/29 |
1533d |
e195e9b5dee6
net, neigh: clear whole pneigh_entry at alloc time
|
|
general protection fault in nfc_alloc_send_skb
net
nfc
|
2 |
C |
done |
|
2 |
1601d |
1595d
|
20/29 |
1533d |
dded08927ca3
nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind()
|
|
BUG: unable to handle kernel NULL pointer dereference in fifo_set_limit
net
|
10 |
C |
error |
|
1 |
1692d |
1692d
|
20/29 |
1533d |
560ee196fe9e
net_sched: fix NULL deref in fifo_set_limit()
|
|
WARNING in rtnl_stats_get
net
|
-1 |
C |
unreliable |
|
31 |
1660d |
1849d
|
20/29 |
1533d |
0854a0513321
net: bridge: fix under estimation in br_get_linkxstats_size()
|
|
kernel BUG at net/phonet/socket.c:LINE!
net
|
-1 |
C |
inconclusive |
|
168 |
1610d |
2230d
|
20/29 |
1533d |
75a2f3152009
phonet/pep: refuse to enable an unbound pipe
|
|
KMSAN: uninit-value in fib_get_nhs
net
|
7 |
C |
|
|
14 |
1551d |
1622d
|
20/29 |
1533d |
7a3429bace0e
ipv4: Check attribute length for RTA_GATEWAY in multipath route
|
|
WARNING in sk_stream_kill_queues (7)
net
|
-1 |
C |
|
|
6689 |
1534d |
1652d
|
20/29 |
1533d |
c4777efa751d
net: add and use skb_unclone_keeptruesize() helper
|
|
KASAN: use-after-free Read in vlan_dev_real_dev (2)
net
|
19 |
C |
error |
|
7 |
1669d |
1681d
|
20/29 |
1533d |
563bcbae3ba2
net: vlan: fix a UAF in vlan_dev_real_dev()
|
|
UBSAN: shift-out-of-bounds in xfrm_get_default
net
|
-1 |
C |
done |
|
104 |
1684d |
1723d
|
20/29 |
1533d |
3c10ffddc61f
net: xfrm: fix shift-out-of-bounds in xfrm_get_default
|
|
WARNING in ref_tracker_free
net
|
-1 |
C |
done |
|
14831 |
1590d |
1618d
|
20/29 |
1533d |
123e495ecc25
net: linkwatch: be more careful about dev->linkwatch_dev_tracker
|
|
WARNING in gnet_stats_add_basic
net
|
-1 |
C |
done |
|
14 |
1673d |
1674d
|
20/29 |
1533d |
e22db7bd552f
net: sched: Allow statistics reads from softirq.
|
|
BUG: corrupted list in netif_napi_add
net
|
8 |
syz |
unreliable |
done |
17 |
1648d |
1679d
|
20/29 |
1533d |
0315a075f134
net: fix premature exit from NAPI state polling in napi_disable()
|
|
INFO: task can't die in __cond_resched
net
|
1 |
C |
error |
|
66 |
1648d |
1702d
|
20/29 |
1533d |
e9edc188fc76
netfilter: conntrack: serialize hash resizes and cleanups
|
|
BUG: unable to handle kernel NULL pointer dereference in unix_shutdown
net
|
10 |
C |
unreliable |
|
413 |
1729d |
1732d
|
20/29 |
1576d |
d359902d5c35
af_unix: Fix NULL pointer bug in unix_shutdown
|
|
KASAN: use-after-free Read in cipso_v4_genopt
lsm
net
|
19 |
C |
inconclusive |
|
5 |
1903d |
1904d
|
20/29 |
1651d |
ad5d07f4a9cd
cipso,calipso: resolve a number of problems with the DOI refcounts
1165affd4848
net: mac802154: Fix general protection fault
|
|
WARNING in idr_get_next
arm-msm
net
|
-1 |
C |
error |
done |
21 |
1842d |
2087d
|
20/29 |
1652d |
3cbf7530a163
qrtr: Convert qrtr_ports from IDR to XArray
|
|
KASAN: null-ptr-deref Read in phy_disconnect
net
usb
|
11 |
C |
|
|
255 |
1718d |
1722d
|
20/29 |
1652d |
1406e8cb4b05
net: usb: asix: do not call phy_disconnect() for ax88178
|
|
KMSAN: uninit-value in hsr_fill_frame_info
net
|
7 |
C |
|
|
249 |
1768d |
2066d
|
20/29 |
1652d |
2e9f60932a2c
net: hsr: check skb can contain struct hsr_ethhdr in fill_frame_info
|
|
WARNING: refcount bug in ip6_tnl_dev_uninit
net
|
13 |
C |
done |
|
16 |
1874d |
1879d
|
20/29 |
1652d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
|
memory leak in garp_request_join
net
|
3 |
C |
|
|
414 |
1781d |
2304d
|
20/29 |
1652d |
42ca63f98084
net/802/garp: fix memleak in garp_request_join()
|
|
KMSAN: uninit-value in virtio_net_hdr_to_skb
net
|
7 |
C |
|
|
325 |
1769d |
1828d
|
20/29 |
1652d |
61431a5907fc
net: ensure mac header is set in virtio_net_hdr_to_skb()
|
|
kernel BUG in llc_sap_action_send_xid_c
net
|
-1 |
C |
error |
|
61 |
1652d |
1866d
|
20/29 |
1652d |
c7c9d2102c9c
net: llc: fix skb_over_panic
|
|
BUG: unable to handle kernel NULL pointer dereference in htb_select_queue
net
|
10 |
syz |
done |
|
8 |
1882d |
1897d
|
20/29 |
1652d |
fb3a3e37de33
sch_htb: Fix offload cleanup in htb_destroy on htb_init failure
93bde210c434
sch_htb: Fix select_queue for non-offload mode
|
|
KASAN: use-after-free Write in sk_psock_stop
bpf
net
|
22 |
syz |
done |
|
74 |
1850d |
1869d
|
20/29 |
1652d |
aadb2bb83ff7
sock_map: Fix a potential use-after-free in sock_map_close()
|
|
INFO: rcu detected stall in wg_packet_tx_worker (3)
net
|
1 |
C |
inconclusive |
|
5 |
1737d |
1720d
|
20/29 |
1652d |
c7c5e6ff533f
fq_codel: reject silly quantum parameters
|
|
WARNING: refcount bug in vti6_dev_uninit
net
|
13 |
C |
|
|
26 |
1875d |
1879d
|
20/29 |
1652d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
|
general protection fault in unix_dgram_connect
net
|
2 |
C |
done |
|
2 |
1726d |
1726d
|
20/29 |
1652d |
dc56ad7028c5
af_unix: fix potential NULL deref in unix_dgram_connect()
|
|
memory leak in xfrm_user_rcv_msg
net
|
3 |
C |
|
|
1 |
1796d |
1792d
|
20/29 |
1652d |
7c1a80e80cde
net: xfrm: fix memory leak in xfrm_user_rcv_msg
|
|
divide error in __tcp_select_window (2)
net
|
2 |
C |
done |
|
4 |
1865d |
1867d
|
20/29 |
1652d |
a7150e382267
Revert "tcp: Reset tcp connections in SYN-SENT state"
|
|
KMSAN: uninit-value in ip_rcv_core
net
|
7 |
C |
|
|
141 |
1768d |
2802d
|
20/29 |
1652d |
6628ddfec758
net: geneve: check skb is large enough for IPv4/IPv6 header
|
|
WARNING in slave_kobj_release
net
|
-1 |
C |
done |
|
3 |
1829d |
1918d
|
20/29 |
1652d |
35d96e631860
bonding: init notify_work earlier to avoid uninitialized use
|
|
KASAN: use-after-free Read in eth_header_parse_protocol
net
|
19 |
C |
done |
|
1453 |
1850d |
1896d
|
20/29 |
1652d |
61431a5907fc
net: ensure mac header is set in virtio_net_hdr_to_skb()
|
|
WARNING: refcount bug in ip6gre_tunnel_uninit
net
|
13 |
C |
error |
|
10 |
1876d |
1879d
|
20/29 |
1652d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
|
BUG: using smp_processor_id() in preemptible code in radix_tree_node_alloc
net
arm-msm
|
4 |
C |
done |
done |
544 |
1838d |
2174d
|
20/29 |
1652d |
3cbf7530a163
qrtr: Convert qrtr_ports from IDR to XArray
|
|
memory leak in qrtr_create
arm-msm
net
|
3 |
C |
|
|
3 |
1755d |
1926d
|
20/29 |
1652d |
52f3456a96c0
net: qrtr: fix memory leaks
|
|
memory leak in virtio_transport_send_pkt_info
virt
kvm
net
|
3 |
C |
|
|
2 |
1863d |
1926d
|
20/29 |
1652d |
8432b8114957
vsock/virtio: free queued packets when closing socket
|
|
UBSAN: shift-out-of-bounds in choke_change (2)
net
|
-1 |
C |
done |
|
7 |
1866d |
1882d
|
20/29 |
1652d |
3a87571f0ffc
sch_red: fix off-by-one checks in red_check_params()
|
|
UBSAN: shift-out-of-bounds in xprt_calc_majortimeo
net
nfs
|
-1 |
C |
unreliable |
|
149 |
1852d |
1981d
|
20/29 |
1652d |
c09f11ef3595
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
|
|
INFO: rcu detected stall in tx
net
|
1 |
C |
error |
unreliable |
3 |
1718d |
1856d
|
20/29 |
1652d |
30fad76ce4e9
USB: usbtmc: Fix RCU stall warning
|
|
general protection fault in kcm_sendmsg
net
|
19 |
C |
done |
|
7957 |
1786d |
1807d
|
20/29 |
1652d |
a47c397bb29f
revert "net: kcm: fix memory leak in kcm_sendmsg"
|
|
WARNING in sk_stream_kill_queues (6)
net
|
-1 |
C |
|
|
11376 |
1652d |
1866d
|
20/29 |
1652d |
144748eb0c44
bpf, sockmap: Fix incorrect fwd_alloc accounting
|
|
BUG: MAX_LOCKDEP_CHAINS too low! (2)
net
|
-1 |
C |
error |
|
84838 |
1652d |
2128d
|
20/29 |
1652d |
5dc33592e955
lockdep: Allow tuning tracing capacity constants.
|
|
memory leak in cfserl_create
net
|
3 |
C |
|
|
13 |
2371d |
2540d
|
20/29 |
1652d |
b53558a950a8
net: caif: fix memory leak in caif_device_notify
|
|
memory leak in radix_tree_insert
arm-msm
net
|
3 |
C |
|
|
1 |
1876d |
1876d
|
20/29 |
1652d |
8a03dd925786
net: qrtr: Fix memory leak on qrtr_tx_wait failure
|
|
KASAN: use-after-free Read in nfc_llcp_put_ssap
net
nfc
|
19 |
syz |
done |
|
4 |
1837d |
1844d
|
20/29 |
1652d |
c61760e6940d
net/nfc: fix use-after-free llcp_sock_bind/connect
|
|
WARNING: suspicious RCU usage in tcp_bpf_update_proto
bpf
net
|
4 |
C |
done |
|
539 |
1850d |
1870d
|
20/29 |
1652d |
51e0158a5432
skmsg: Pass psock pointer to ->psock_update_sk_prot()
|
|
BUG: sleeping function called from invalid context in __ipv6_dev_mc_dec
net
|
5 |
C |
done |
|
21 |
1785d |
1842d
|
20/29 |
1652d |
a100243d95a6
rtnetlink: avoid RCU read lock when holding RTNL
|
|
WARNING: refcount bug in in_dev_finish_destroy
net
|
13 |
C |
unreliable |
|
463 |
1652d |
1879d
|
20/29 |
1652d |
0d7a7b2014b1
ipv6: remove extra dev_hold() for fallback tunnels
|
|
WARNING: suspicious RCU usage in vxlan_xmit
net
|
4 |
C |
error |
|
1 |
1793d |
1793d
|
20/29 |
1652d |
85e8b032d6eb
vxlan: add missing rcu_read_lock() in neigh_reduce()
|
|
possible deadlock in br_ioctl_call
net
|
4 |
C |
unreliable |
|
4161 |
1742d |
1752d
|
20/29 |
1652d |
893b19587534
net: bridge: fix ioctl locking
|
|
BUG: sleeping function called from invalid context in _copy_to_iter
net
|
5 |
C |
done |
|
60 |
1737d |
1745d
|
20/29 |
1652d |
876c14ad014d
af_unix: fix holding spinlock in oob handling
|
|
memory leak in tcindex_set_parms
net
|
3 |
C |
|
|
94 |
1811d |
2296d
|
20/29 |
1652d |
f5051bcece50
net: sched: fix memory leak in tcindex_partial_destroy_work
|
|
general protection fault in sock_from_file
net
io-uring
|
2 |
C |
inconclusive |
|
78 |
1716d |
1723d
|
20/29 |
1652d |
c6d3d9cbd659
io_uring: fix queueing half-created requests
|
|
WARNING: ODEBUG bug in net_dm_cmd_trace
net
|
-1 |
syz |
unreliable |
|
2 |
1902d |
1898d
|
20/29 |
1652d |
9398e9c0b1d4
drop_monitor: Perform cleanup upon probe registration failure
|
|
WARNING in xfrm_alloc_compat (2)
net
|
-1 |
C |
done |
|
47 |
1867d |
1877d
|
20/29 |
1652d |
ef19e111337f
xfrm/compat: Cleanup WARN()s that can be user-triggered
|
|
KMSAN: uninit-value in caif_seqpkt_sendmsg
net
|
7 |
C |
|
|
2365 |
1698d |
2115d
|
20/29 |
1652d |
991e634360f2
net: fix uninit-value in caif_seqpkt_sendmsg
|
|
memory leak in mrp_request_join
net
|
3 |
C |
|
|
215 |
1792d |
2310d
|
20/29 |
1652d |
996af62167d0
net/802/mrp: fix memleak in mrp_request_join()
|
|
memory leak in tcp_cdg_init
net
|
3 |
syz |
|
|
6 |
1816d |
1956d
|
20/29 |
1652d |
be5d1b61a2ad
tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
|
|
WARNING: refcount bug in sk_psock_get
net
|
13 |
C |
done |
|
8 |
1838d |
1866d
|
20/29 |
1652d |
8621436671f3
smc: disallow TCP_ULP in smc_setsockopt()
|
|
WARNING: refcount bug in ipip6_tunnel_uninit
net
|
13 |
C |
done |
|
199 |
1874d |
1879d
|
20/29 |
1652d |
6289a98f0817
sit: proper dev_{hold|put} in ndo_[un]init methods
|
|
WARNING: refcount bug in register_netdevice
net
|
13 |
C |
unreliable |
|
97 |
1873d |
1879d
|
20/29 |
1652d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
|
WARNING: refcount bug in ip6erspan_tunnel_uninit
net
|
13 |
C |
error |
|
11 |
1876d |
1879d
|
20/29 |
1652d |
7f700334be9a
ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
|
|
UBSAN: shift-out-of-bounds in xfrm_set_default
net
|
-1 |
C |
unreliable |
|
79 |
1747d |
1757d
|
20/29 |
1652d |
5d8dbb7fb82b
net: xfrm: fix shift-out-of-bounce
|
|
KMSAN: kernel-infoleak in _copy_to_iter (5)
net
|
9 |
C |
|
|
23883 |
1761d |
2197d
|
20/29 |
1652d |
08c27f3322fe
batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field
|
|
KMSAN: uninit-value in __dev_mc_add
net
|
7 |
C |
|
|
213 |
2596d |
2792d
|
20/29 |
1652d |
cca8ea3b05c9
net: tun: set tun->dev->addr_len during TUNSETLINK processing
|
|
memory leak in kcm_sendmsg
net
|
3 |
C |
|
|
2 |
2147d |
2287d
|
20/29 |
1652d |
c47cc304990a
net: kcm: fix memory leak in kcm_sendmsg
|
|
UBSAN: shift-out-of-bounds in qdisc_get_rtab
net
|
-1 |
C |
unreliable |
done |
521 |
1945d |
1989d
|
20/29 |
1799d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
|
memory leak in qrtr_tun_open
arm-msm
net
|
3 |
C |
|
|
4 |
1957d |
2001d
|
20/29 |
1866d |
fc0494ead639
net: qrtr: Fix memory leak in qrtr_tun_open
|
|
KASAN: null-ptr-deref Read in tcf_idrinfo_destroy
net
|
11 |
C |
|
|
115 |
1869d |
2059d
|
20/29 |
1866d |
396d7f23adf9
net: sched: fix police ext initialization
|
|
INFO: task hung in tcf_action_init_1
net
|
1 |
C |
done |
|
30 |
1925d |
2059d
|
20/29 |
1866d |
d349f9976868
net_sched: fix RTNL deadlock again caused by request_module()
|
|
KASAN: slab-out-of-bounds Read in skb_segment
net
|
17 |
C |
error |
|
311 |
1944d |
1948d
|
20/29 |
1866d |
00b229f762b0
net: fix GSO for SG-enabled devices
|
|
INFO: task can't die in connmark_exit_net
net
|
1 |
syz |
error |
|
1 |
1988d |
1984d
|
20/29 |
1866d |
d349f9976868
net_sched: fix RTNL deadlock again caused by request_module()
|
|
WARNING in __alloc_skb
arm-msm
net
|
-1 |
C |
error |
|
24 |
1897d |
1909d
|
20/29 |
1866d |
093b036aa94e
net/qrtr: fix __netdev_alloc_skb call
|
|
WARNING in sk_stream_kill_queues (5)
net
|
-1 |
C |
done |
|
4684 |
1866d |
1996d
|
20/29 |
1866d |
097b9146c0e2
net: fix up truesize of cloned skb in skb_prepare_for_shift()
|
|
WARNING in dst_release
net
|
-1 |
syz |
done |
|
2 |
1918d |
1917d
|
20/29 |
1866d |
e0be4931f3fe
mptcp: reset last_snd on subflow close
|
|
KASAN: use-after-free Read in skb_segment
net
|
19 |
C |
error |
|
55 |
1944d |
1948d
|
20/29 |
1866d |
00b229f762b0
net: fix GSO for SG-enabled devices
|
|
UBSAN: shift-out-of-bounds in tcf_police_init
net
|
-1 |
C |
unreliable |
|
8 |
1946d |
1982d
|
20/29 |
1895d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
|
UBSAN: shift-out-of-bounds in est_timer
net
|
-1 |
C |
unreliable |
|
73 |
1905d |
1979d
|
20/29 |
1895d |
dd5e073381f2
net_sched: gen_estimator: support large ewma log
|
|
memory leak in xskq_create
bpf
net
|
3 |
C |
|
|
7 |
1962d |
1983d
|
19/29 |
1896d |
8bee68338408
xsk: Fix memory leak for failed bind
|
|
UBSAN: shift-out-of-bounds in __detect_linklayer
net
|
-1 |
C |
unreliable |
done |
31 |
1945d |
1951d
|
19/29 |
1896d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
|
UBSAN: shift-out-of-bounds in tcindex_set_parms
net
|
-1 |
C |
unreliable |
done |
45 |
1945d |
1980d
|
19/29 |
1896d |
bcd0cf19ef82
net_sched: avoid shift-out-of-bounds in tcindex_set_parms()
|
|
general protection fault in taprio_dequeue_soft
net
|
2 |
C |
done |
|
2 |
1981d |
1981d
|
19/29 |
1896d |
44d4775ca518
net/sched: sch_taprio: reset child qdiscs before freeing them
|
|
kernel BUG at net/core/dev.c:NUM!
net
|
-1 |
C |
done |
|
35 |
1951d |
1952d
|
19/29 |
1896d |
47e4bb147a96
net: sit: unregister_netdevice on newlink's error path
|
|
KASAN: use-after-free Read in decode_session6
net
|
19 |
C |
done |
|
152 |
1943d |
2150d
|
19/29 |
1896d |
0356010d825e
sctp: bring inet(6)_skb_parm back to sctp_input_cb
|
|
divide error in __tcp_select_window
net
|
2 |
C |
done |
|
1119 |
2000d |
2005d
|
19/29 |
1896d |
fd8976790a6c
mptcp: be careful on MPTCP-level ack.
|
|
UBSAN: shift-out-of-bounds in choke_enqueue
net
|
-1 |
C |
inconclusive |
|
3853 |
1896d |
1989d
|
19/29 |
1896d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
|
WARNING: suspicious RCU usage in tcp_disconnect
net
|
4 |
C |
done |
|
25 |
1951d |
1952d
|
19/29 |
1896d |
13a9499e8333
mptcp: fix locking in mptcp_disconnect()
|
|
KMSAN: uninit-value in __nla_validate_parse (2)
net
|
7 |
C |
|
|
2 |
1958d |
1954d
|
19/29 |
1896d |
c96adff95619
cls_flower: call nla_ok() before nla_next()
|
|
general protection fault in xsk_recvmsg
bpf
net
|
2 |
C |
done |
unreliable |
1800 |
1981d |
1951d
|
19/29 |
1896d |
3546b9b8eced
xsk: Validate socket state in xsk_recvmsg, prior touching socket members
|
|
UBSAN: shift-out-of-bounds in sfq_init
net
|
-1 |
C |
unreliable |
|
8 |
1960d |
1974d
|
19/29 |
1896d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
|
KMSAN: uninit-value in gre_parse_header
net
|
7 |
C |
|
|
9283 |
1924d |
2522d
|
19/29 |
1896d |
085c7c4e1c0e
erspan: fix version 1 check in gre_parse_header()
|
|
UBSAN: shift-out-of-bounds in red_adaptative_timer
net
|
-1 |
C |
unreliable |
|
260 |
1897d |
1989d
|
19/29 |
1896d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
|
KASAN: slab-out-of-bounds Write in xfrm_attr_cpy32
net
|
21 |
C |
done |
|
106 |
1986d |
2034d
|
19/29 |
1896d |
d1949d045fd6
xfrm/compat: memset(0) 64-bit padding at right place
|
|
UBSAN: shift-out-of-bounds in __red_change
net
|
-1 |
C |
unreliable |
|
24 |
1900d |
1988d
|
19/29 |
1896d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
|
UBSAN: shift-out-of-bounds in gred_change
net
|
-1 |
C |
unreliable |
|
5 |
1910d |
1965d
|
19/29 |
1896d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
|
memory leak in rxrpc_lookup_local
net
afs
|
3 |
C |
|
|
1415 |
1936d |
2401d
|
19/29 |
1896d |
b8323f7288ab
rxrpc: Fix memory leak in rxrpc_lookup_local
|
|
WARNING in xfrm_alloc_compat
net
|
-1 |
C |
done |
|
130 |
1909d |
2031d
|
19/29 |
1896d |
dbd7ae5154d5
xfrm/compat: Translate by copying XFRMA_UNSPEC attribute
|
|
UBSAN: shift-out-of-bounds in red_enqueue
net
|
-1 |
C |
unreliable |
|
4906 |
1897d |
1989d
|
19/29 |
1896d |
bd1248f1ddbc
net: sched: prevent invalid Scell_log shift count
|
|
KMSAN: kernel-infoleak in move_addr_to_user (4)
net
|
9 |
C |
|
|
59 |
1903d |
1955d
|
19/29 |
1896d |
b42b3a2744b3
can: isotp: isotp_getname(): fix kernel information leak
|
|
UBSAN: shift-out-of-bounds in strset_parse_request
net
|
-1 |
C |
done |
|
16 |
1960d |
1983d
|
19/29 |
1896d |
efb796f5571f
ethtool: fix string set id check
|
|
UBSAN: shift-out-of-bounds in cbq_dequeue
net
|
-1 |
C |
unreliable |
|
27 |
1945d |
1989d
|
19/29 |
1896d |
e4bedf48aaa5
net_sched: reject silly cell_log in qdisc_get_rtab()
|
|
KASAN: stack-out-of-bounds Write in bitmap_from_arr32
net
|
21 |
C |
done |
|
2 |
2000d |
1996d
|
19/29 |
1896d |
a770bf515613
ethtool: fix stack overflow in ethnl_parse_bitset()
|
|
KASAN: use-after-free Read in dump_schedule
net
|
19 |
C |
done |
done |
7 |
1973d |
2084d
|
19/29 |
1896d |
cc00bcaa5899
netfilter: x_tables: Switch synchronization to RCU
|
|
KASAN: use-after-free Read in eth_type_trans
net
|
19 |
C |
done |
error |
3 |
2196d |
2339d
|
15/29 |
1973d |
96aa1b22bd6b
tun: correct header offsets in napi frags mode
|
|
BUG: MAX_LOCKDEP_KEYS too low!
net
|
-1 |
C |
done |
error |
3496 |
2152d |
2396d
|
15/29 |
1987d |
1a33e10e4a95
net: partially revert dynamic lockdep key changes
|
|
general protection fault in xsk_release
bpf
net
|
2 |
C |
done |
|
2 |
2062d |
2062d
|
15/29 |
2010d |
1fd17c8cd0aa
xsk: Fix possible crash in socket_release when out-of-memory
|
|
KASAN: use-after-free Write in tcindex_change
net
|
22 |
C |
done |
done |
4 |
2253d |
2254d
|
15/29 |
2010d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
possible deadlock in cleanup_net
net
|
4 |
C |
done |
|
281 |
2079d |
2087d
|
15/29 |
2010d |
d966ddcc3821
tipc: fix a deadlock when flushing scheduled work
|
|
KMSAN: uninit-value in ip_tunnel_xmit (2)
net
|
7 |
C |
|
|
11778 |
2014d |
2839d
|
15/29 |
2010d |
fdafed459998
ip_gre: set dev->hard_header_len and dev->needed_headroom properly
|
|
INFO: rcu detected stall in ip_list_rcv
net
|
1 |
C |
error |
done |
3 |
2058d |
2084d
|
15/29 |
2010d |
1d0e850a49a5
afs: Fix cell removal
|
|
general protection fault in tcf_generic_walker
net
|
2 |
syz |
|
|
9 |
2057d |
2059d
|
15/29 |
2010d |
580e4273d7a8
net_sched: check error pointer in tcf_dump_walker()
|
|
KMSAN: uninit-value in unix_find_other
net
|
7 |
C |
|
|
57 |
2055d |
2871d
|
15/29 |
2010d |
7ca1db21ef8e
net: 9p: initialize sun_server.sun_path to have addr's value only when addr is valid
|
|
INFO: task hung in ctrl_getfamily
net
|
1 |
syz |
done |
done |
22 |
2103d |
2716d
|
15/29 |
2010d |
47733f9daf4f
tipc: fix uninit skb->data in tipc_nl_compat_dumpit()
|
|
WARNING: suspicious RCU usage in qrtr_ns_worker
arm-msm
net
|
4 |
C |
done |
|
1 |
2091d |
2154d
|
15/29 |
2010d |
a7809ff90ce6
net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
|
|
WARNING in rxrpc_recvmsg
afs
net
|
-1 |
C |
error |
done |
5 |
2145d |
2146d
|
15/29 |
2010d |
65550098c1c4
rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
|
|
KASAN: use-after-free Read in tcf_action_init
net
|
19 |
C |
done |
|
1 |
2062d |
2059d
|
15/29 |
2010d |
0fedc63fadf0
net_sched: commit action insertions together
|
|
KASAN: slab-out-of-bounds Read in strset_parse_request
net
|
17 |
C |
error |
|
141 |
2049d |
2049d
|
15/29 |
2010d |
db972e532518
ethtool: strset: allow ETHTOOL_A_STRSET_COUNTS_ONLY attr
|
|
BUG: unable to handle kernel paging request in tcf_action_dump_terse
net
|
8 |
C |
done |
|
15 |
2053d |
2059d
|
15/29 |
2010d |
580e4273d7a8
net_sched: check error pointer in tcf_dump_walker()
|
|
INFO: task hung in lock_sock_nested (3)
net
|
1 |
C |
done |
|
5 |
2054d |
2055d
|
15/29 |
2010d |
d9fb8c507d42
mptcp: fix infinite loop on recvmsg()/worker() race.
|
|
kernel BUG at net/rxrpc/conn_object.c:LINE!
net
afs
|
-1 |
C |
done |
|
855 |
2012d |
2077d
|
15/29 |
2010d |
546a42410bf7
rxrpc: Fix conn bundle leak in net-namespace exit
|
|
possible deadlock in dev_uc_sync
net
|
4 |
C |
done |
|
3 |
2045d |
2143d
|
15/29 |
2010d |
0e8b8d6a2d85
net: core: use list_del_init() instead of list_del() in netdev_run_todo()
|
|
general protection fault in rt6_fill_node
net
|
2 |
C |
done |
done |
3 |
2095d |
2092d
|
15/29 |
2010d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
|
memory leak in __team_options_register
net
|
3 |
C |
|
|
1 |
2080d |
2080d
|
15/29 |
2010d |
9a9e77495958
net: team: fix memory leak in __team_options_register
|
|
general protection fault in nexthop_is_blackhole
net
|
2 |
C |
done |
done |
1 |
2095d |
2092d
|
15/29 |
2010d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
|
KASAN: use-after-free Write in xp_put_pool
bpf
net
|
22 |
C |
done |
|
50 |
2063d |
2085d
|
15/29 |
2010d |
83cf5c68d663
xsk: Fix use-after-free in failed shared_umem bind
|
|
WARNING in nla_get_range_unsigned
net
|
-1 |
C |
done |
|
63 |
2085d |
2087d
|
15/29 |
2010d |
c30a3c957c88
netlink: policy: correct validation type check
|
|
general protection fault in xsk_is_setup_for_bpf_map
net
bpf
|
2 |
C |
error |
|
294 |
2063d |
2085d
|
15/29 |
2010d |
968be23ceaca
xsk: Fix possible segfault at xskmap entry insertion
|
|
inconsistent lock state in icmp_send
net
|
4 |
syz |
done |
done |
1 |
2218d |
2715d
|
15/29 |
2010d |
1378817486d6
tipc: block BH before using dst_cache
|
|
KASAN: use-after-free Write in rxrpc_put_bundle
afs
net
|
22 |
C |
done |
|
229 |
2048d |
2071d
|
15/29 |
2010d |
f3af4ad1e08a
rxrpc: Fix bundle counting for exclusive connections
|
|
KASAN: use-after-free Read in tcf_action_destroy
net
|
19 |
C |
done |
|
8 |
2052d |
2067d
|
15/29 |
2010d |
0fedc63fadf0
net_sched: commit action insertions together
|
|
memory leak in xdp_umem_create
bpf
net
|
3 |
C |
|
|
17 |
2014d |
2034d
|
15/29 |
2010d |
e5e1a4bc916d
xsk: Fix possible memory leak at socket close
|
|
general protection fault in xsk_diag_dump (2)
bpf
net
|
2 |
C |
|
|
354 |
2067d |
2085d
|
15/29 |
2010d |
53ea2076d851
xsk: Fix possible segfault in xsk umem diagnostics
|
|
general protection fault in tcf_action_destroy (2)
net
|
2 |
C |
done |
done |
29 |
2048d |
2261d
|
15/29 |
2010d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
WARNING: suspicious RCU usage in ctrl_cmd_new_lookup
net
arm-msm
|
4 |
C |
done |
done |
10 |
2065d |
2154d
|
15/29 |
2010d |
a7809ff90ce6
net: qrtr: ns: Protect radix_tree_deref_slot() using rcu read locks
|
|
KMSAN: uninit-value in __inet_diag_dump
net
|
7 |
C |
|
|
37 |
2049d |
2066d
|
15/29 |
2047d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
|
INFO: task hung in tcf_ife_init
net
|
1 |
C |
done |
|
4 |
2080d |
2084d
|
15/29 |
2047d |
cc8e58f8325c
act_ife: load meta modules before tcf_idr_check_alloc()
|
|
KMSAN: uninit-value in inet_diag_cmd_exact
net
|
7 |
C |
|
|
31 |
2049d |
2060d
|
15/29 |
2047d |
d5e4d0a5e692
inet_diag: validate INET_DIAG_REQ_PROTOCOL attribute
|
|
general protection fault in free_netdev
net
|
2 |
C |
error |
done |
3605 |
2123d |
2158d
|
15/29 |
2056d |
46ef5b89ec0e
ip6_gre: fix null-ptr-deref in ip6gre_init_net()
|
|
KMSAN: kernel-infoleak in move_addr_to_user (3)
net
|
9 |
C |
|
|
79 |
2071d |
2105d
|
15/29 |
2059d |
38ba8b9241f5
can: j1939: fix kernel-infoleak in j1939_sk_sock2sockaddr_can()
|
|
WARNING: refcount bug in red_destroy
net
|
13 |
C |
done |
|
1 |
2093d |
2092d
|
15/29 |
2063d |
5438dd45831e
net_sched: fix error path in red_init()
|
|
WARNING: refcount bug in qdisc_put (2)
net
|
13 |
C |
done |
|
7 |
2093d |
2092d
|
15/29 |
2063d |
5438dd45831e
net_sched: fix error path in red_init()
|
|
KASAN: use-after-free Write in __linkwatch_run_queue
net
|
22 |
C |
error |
|
24 |
2126d |
2127d
|
15/29 |
2071d |
c75d1d5248c0
bonding: check return value of register_netdevice() in bond_newlink()
|
|
KASAN: use-after-free Read in sock_def_write_space (2)
arm-msm
net
|
19 |
C |
error |
|
29 |
2071d |
2128d
|
15/29 |
2071d |
af9f691f0f5b
qrtr: orphan socket in qrtr_release()
|
|
kernel BUG at net/rxrpc/recvmsg.c:LINE!
afs
net
|
-1 |
C |
error |
|
10 |
2117d |
2146d
|
15/29 |
2071d |
65550098c1c4
rxrpc: Fix race between recvmsg and sendmsg on immediate call failure
|
|
WARNING in idr_alloc
arm-msm
net
|
-1 |
C |
done |
|
65 |
2080d |
2154d
|
15/29 |
2071d |
8dfddfb79653
net: qrtr: fix usage of idr in port assignment to socket
|
|
general protection fault in fib_dump_info (2)
net
|
2 |
C |
done |
|
16 |
2095d |
2097d
|
15/29 |
2071d |
eeaac3634ee0
net: nexthop: don't allow empty NHA_GROUP
|
|
KMSAN: uninit-value in netlink_policy_dump_start
net
|
7 |
C |
|
|
31 |
2076d |
2079d
|
15/29 |
2071d |
d1fb55592909
netlink: fix state reallocation in policy export
|
|
KASAN: use-after-free Read in devlink_health_reporter_destroy
net
|
19 |
C |
error |
|
1188 |
2135d |
2136d
|
15/29 |
2071d |
5d037b4d3df7
devlink: Fix use-after-free when destroying health reporters
|
|
kernel BUG at net/core/dev.c:LINE! (3)
net
|
-1 |
C |
done |
|
979 |
2085d |
2229d
|
15/29 |
2071d |
832707021666
bonding: fix a potential double-unregister
|
|
general protection fault in vsock_poll
net
virt
|
2 |
syz |
done |
|
15 |
2115d |
2128d
|
15/29 |
2071d |
1980c0584483
vsock: fix potential null pointer dereference in vsock_poll()
|
|
KMSAN: uninit-value in geneve_xmit
net
|
7 |
C |
|
|
163 |
2074d |
2127d
|
15/29 |
2071d |
32818c075c54
geneve: fix an uninitialized value in geneve_changelink()
|
|
KASAN: use-after-free Read in __xfrm6_tunnel_spi_lookup
net
|
19 |
C |
error |
|
12 |
2129d |
2134d
|
15/29 |
2071d |
8b404f46dd6a
xfrm: interface: not xfrmi_ipv6/ipip_handler twice
|
|
INFO: trying to register non-static key in red_destroy
net
|
-1 |
C |
error |
|
318 |
2122d |
2144d
|
15/29 |
2071d |
608b4adab178
net_sched: initialize timer earlier in red_init()
|
|
KASAN: wild-memory-access Read in ip_setsockopt
net
|
17 |
C |
|
|
2 |
2105d |
2105d
|
15/29 |
2071d |
519a8a6cf91d
net: Revert "net: optimize the sockptr_t for unified kernel/user address spaces"
|
|
possible deadlock in dev_mc_unsync
net
|
4 |
C |
error |
done |
78 |
2137d |
2153d
|
15/29 |
2100d |
be74294ffa24
net: get rid of lockdep_set_class_and_subclass()
|
|
WARNING: locking bug in try_to_grab_pending
net
|
4 |
syz |
error |
done |
1 |
2189d |
2652d
|
15/29 |
2100d |
1378817486d6
tipc: block BH before using dst_cache
|
|
general protection fault in qrtr_endpoint_post
net
arm-msm
|
2 |
C |
done |
done |
54 |
2137d |
2155d
|
15/29 |
2106d |
8ff41cc21714
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
|
|
WARNING in xfrm_policy_insert
net
|
-1 |
C |
inconclusive |
done |
6 |
2163d |
3016d
|
15/29 |
2121d |
ed17b8d377ea
xfrm: fix a warning in xfrm_policy_insert_list
|
|
KASAN: use-after-free Read in sock_def_write_space
arm-msm
net
|
19 |
C |
done |
|
67 |
2130d |
2495d
|
15/29 |
2129d |
a9b111016235
llc: make sure applications use ARPHRD_ETHER
|
|
KASAN: slab-out-of-bounds Read in qrtr_endpoint_post
arm-msm
net
|
17 |
C |
|
|
8 |
2152d |
2152d
|
15/29 |
2129d |
8ff41cc21714
net: qrtr: Fix an out of bounds read qrtr_endpoint_post()
|
|
memory leak in qdisc_create_dflt
net
|
3 |
C |
|
|
1 |
2148d |
2144d
|
15/29 |
2129d |
306381aec7c2
net_sched: fix a memory leak in atm_tc_init()
|
|
WARNING in hsr_dev_finalize
net
|
-1 |
C |
error |
|
1546 |
2137d |
2153d
|
15/29 |
2129d |
ccfc9df1352b
hsr: fix interface leak in error path of hsr_dev_finalize()
|
|
kernel BUG at net/l2tp/l2tp_core.c:LINE!
net
|
-1 |
C |
|
|
10 |
2154d |
2149d
|
15/29 |
2129d |
c9a368f1c0fb
bpf: net: Avoid incorrect bpf_sk_reuseport_detach call
|
|
KASAN: use-after-free Read in devlink_get_from_attrs
net
|
19 |
C |
|
|
25 |
2137d |
2150d
|
15/29 |
2129d |
bf64ff4c2aac
genetlink: get rid of family->attrbuf
|
|
KASAN: use-after-free Read in ip_icmp_error
net
|
19 |
C |
done |
|
14 |
2183d |
2184d
|
15/29 |
2132d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
|
KASAN: slab-out-of-bounds Read in ip_icmp_error
net
|
17 |
C |
done |
|
13 |
2183d |
2184d
|
15/29 |
2132d |
239174945dac
tcp: tcp_v4_err() icmp skb is named icmp_skb
|
|
WARNING: proc registration bug in snmp6_register_dev
net
|
-1 |
C |
done |
|
14 |
2159d |
2225d
|
15/29 |
2132d |
de0083c7ed7d
hsr: avoid to create proc file after unregister
|
|
KASAN: use-after-free Read in inet_diag_bc_sk
net
|
19 |
C |
done |
|
30 |
2207d |
2209d
|
15/29 |
2132d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
|
general protection fault in fq_codel_enqueue
net
|
2 |
C |
done |
|
25 |
2137d |
2221d
|
15/29 |
2132d |
9274124f023b
net: stricter validation of untrusted gso packets
|
|
general protection fault in put_cmsg
net
|
2 |
C |
done |
|
3 |
2197d |
2198d
|
15/29 |
2132d |
1b2f08df0a88
ipv6: set msg_control_is_user in do_ipv6_getsockopt
|
|
KASAN: slab-out-of-bounds Read in inet_diag_bc_sk
net
|
17 |
C |
done |
|
45 |
2207d |
2209d
|
15/29 |
2132d |
ee1bd483cc06
inet_diag: bc: read cgroup id only for full sockets
|
|
general protection fault in erspan_validate
net
|
2 |
C |
done |
|
520 |
2198d |
2205d
|
15/29 |
2132d |
51fa960d3b51
erspan: Check IFLA_GRE_ERSPAN_VER is set.
|
|
general protection fault in inet_unhash
net
|
2 |
C |
done |
|
40 |
2153d |
2182d
|
15/29 |
2132d |
02c71b144c81
l2tp: do not use inet_hash()/inet_unhash()
|
|
KASAN: use-after-free Read in rpc_net_ns
net
nfs
|
19 |
syz |
done |
|
10 |
2197d |
2203d
|
15/29 |
2132d |
31e9a7f35352
SUNRPC: fix use-after-free in rpc_free_client_work()
|
|
memory leak in genl_rcv_msg
net
|
3 |
C |
|
|
116 |
2167d |
2357d
|
15/29 |
2132d |
c36f05559104
genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()
|
|
KASAN: slab-out-of-bounds Read in fl6_update_dst
net
|
17 |
C |
done |
|
43 |
2153d |
2199d
|
15/29 |
2132d |
bb986a50421a
seg6: fix seg6_validate_srh() to avoid slab-out-of-bounds
|
|
KASAN: slab-out-of-bounds Read in skb_gso_transport_seglen
net
|
17 |
C |
done |
|
4 |
2202d |
2221d
|
15/29 |
2132d |
9274124f023b
net: stricter validation of untrusted gso packets
|
|
WARNING: locking bug in dev_mc_seq_show
net
|
4 |
C |
done |
|
3 |
2173d |
2184d
|
15/29 |
2132d |
845e0ebb4408
net: change addr_list_lock back to static key
|
|
KMSAN: uninit-value in skbprio_enqueue
net
|
7 |
syz |
|
|
11 |
2146d |
2210d
|
15/29 |
2132d |
2761121af87d
net_sched: sch_skbprio: add message validation to skbprio_change()
|
|
INFO: rcu detected stall in wg_packet_tx_worker
net
|
1 |
C |
done |
|
24 |
2161d |
2214d
|
15/29 |
2132d |
df4953e4e997
sch_sfq: validate silly quantum values
|
|
WARNING in sk_stream_kill_queues (4)
net
|
-1 |
C |
done |
done |
6 |
2271d |
2275d
|
15/29 |
2149d |
b6f6118901d1
ipv6: restrict IPV6_ADDRFORM operation
|
|
WARNING in kfree (2)
net
|
-1 |
syz |
done |
done |
1 |
2262d |
2261d
|
15/29 |
2151d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
KASAN: use-after-free Write in tcindex_set_parms
net
|
22 |
C |
done |
|
13 |
2241d |
2261d
|
15/29 |
2200d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
KASAN: use-after-free Read in tcindex_dump
net
|
19 |
syz |
|
|
1 |
2263d |
2261d
|
15/29 |
2200d |
b1be2e8cd290
net_sched: hold rtnl lock in tcindex_partial_destroy_work()
|
|
general protection fault in macsec_upd_offload
net
|
2 |
C |
done |
|
5 |
2239d |
2238d
|
15/29 |
2200d |
aa81700cf232
macsec: fix NULL dereference in macsec_upd_offload()
|
|
WARNING in geneve_exit_batch_net (2)
net
|
-1 |
C |
done |
|
9 |
2247d |
2271d
|
15/29 |
2200d |
0fda7600c2e1
geneve: move debug check after netdev unregister
|
|
KASAN: invalid-free in tcf_exts_destroy
net
|
24 |
C |
done |
|
1 |
2263d |
2263d
|
15/29 |
2200d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
general protection fault in do_tcp_getsockopt (2)
net
|
2 |
C |
done |
|
1 |
2253d |
2253d
|
15/29 |
2200d |
6cd6cbf593bf
net-backports: tcp: repair: fix TCP_QUEUE_SEQ implementation
|
|
WARNING: refcount bug in __tcf_action_put
net
|
13 |
syz |
|
|
1 |
2262d |
2261d
|
15/29 |
2200d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
general protection fault in ethnl_parse_header
net
|
2 |
C |
done |
|
9 |
2247d |
2252d
|
15/29 |
2200d |
55b474c41e58
netlink: check for null extack in cookie helpers
|
|
WARNING: ODEBUG bug in __init_work
net
|
-1 |
syz |
done |
|
1 |
2249d |
2248d
|
15/29 |
2200d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
|
WARNING in call_rcu
net
|
-1 |
C |
done |
|
8 |
2254d |
2261d
|
15/29 |
2200d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
|
WARNING: ODEBUG bug in tcf_queue_work
net
|
-1 |
C |
done |
|
30 |
2266d |
2266d
|
15/29 |
2200d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
|
general protection fault in qdisc_hash_add
net
|
2 |
C |
done |
|
47 |
2259d |
2259d
|
15/29 |
2200d |
7c4046b1c53b
Revert "net: sched: make newly activated qdiscs visible"
|
|
WARNING: refcount bug in tcindex_data_put
net
|
13 |
C |
done |
|
27 |
2237d |
2238d
|
15/29 |
2200d |
a8eab6d35e22
net_sched: fix a missing refcnt in tcindex_init()
|
|
KASAN: use-after-free Read in route4_get
net
|
19 |
C |
|
|
8 |
2229d |
2258d
|
15/29 |
2200d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
|
general protection fault in erspan_netlink_parms
net
|
2 |
C |
done |
|
5 |
2255d |
2256d
|
15/29 |
2200d |
32ca98feab8c
net: ip_gre: Accept IFLA_INFO_DATA-less configuration
|
|
KMSAN: uninit-value in tcf_exts_change
net
|
7 |
C |
|
|
5 |
2251d |
2261d
|
15/29 |
2200d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
BUG: sleeping function called from invalid context in kmem_cache_alloc_node_trace
net
|
5 |
C |
done |
|
364 |
2262d |
2264d
|
15/29 |
2200d |
138470a9b2cc
net/sched: act_ct: fix lockdep splat in tcf_ct_flow_table_get
|
|
WARNING: ODEBUG bug in tcindex_destroy_work (3)
net
|
-1 |
syz |
done |
|
13 |
2239d |
2275d
|
15/29 |
2200d |
304e024216a8
net_sched: add a temporary refcnt for struct tcindex_data
|
|
WARNING: refcount bug in igmp_start_timer
net
|
13 |
syz |
done |
done |
19 |
2465d |
2831d
|
15/29 |
2223d |
323ebb61e32b
net: use listified RX for handling GRO_NORMAL skbs
|
|
possible deadlock in sch_direct_xmit
net
|
4 |
C |
done |
done |
1548 |
2366d |
3045d
|
15/29 |
2223d |
323ebb61e32b
net: use listified RX for handling GRO_NORMAL skbs
|
|
KMSAN: uninit-value in __iptunnel_pull_header
net
|
7 |
C |
|
|
12 |
2256d |
2265d
|
15/29 |
2225d |
17c25cafd4d3
gre: fix uninit-value in __iptunnel_pull_header
|
|
KMSAN: uninit-value in slhc_compress
net
|
7 |
C |
|
|
3 |
2268d |
2267d
|
15/29 |
2225d |
110a40dfb708
slip: make slhc_compress() more robust against malicious packets
|
|
BUG: unable to handle kernel NULL pointer dereference in inet_release
net
|
10 |
syz |
|
|
3 |
2274d |
2275d
|
15/29 |
2225d |
b6f6118901d1
ipv6: restrict IPV6_ADDRFORM operation
|
|
BUG: unable to handle kernel paging request in ethnl_update_bitset32
net
|
8 |
C |
|
|
168 |
2265d |
2276d
|
15/29 |
2225d |
e34f1753eebc
ethtool: limit bitset size
|
|
KMSAN: use-after-free in find_match
net
|
18 |
C |
|
|
52 |
2255d |
2284d
|
15/29 |
2225d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
|
KMSAN: uninit-value in bond_alb_xmit
net
|
7 |
syz |
|
|
3 |
2266d |
2267d
|
15/29 |
2225d |
b7469e83d2ad
bonding/alb: make sure arp header is pulled before accessing it
|
|
KMSAN: use-after-free in ip6_dst_destroy
net
|
18 |
C |
|
|
2 |
2258d |
2270d
|
15/29 |
2225d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
|
possible deadlock in inet_csk_accept
net
|
4 |
C |
done |
|
992 |
2259d |
2261d
|
15/29 |
2225d |
06669ea346e4
net: memcg: fix lockdep splat in inet_csk_accept()
|
|
KASAN: slab-out-of-bounds Read in ethnl_update_bitset32
net
|
17 |
syz |
|
|
2 |
2271d |
2276d
|
15/29 |
2225d |
e34f1753eebc
ethtool: limit bitset size
|
|
possible deadlock in bond_get_stats (3)
net
|
4 |
syz |
done |
|
2 |
2279d |
2279d
|
15/29 |
2225d |
b3e80d44f5b1
bonding: fix lockdep warning in bond_get_stats()
|
|
KMSAN: uninit-value in kstrdup
net
|
7 |
C |
|
|
8 |
2261d |
2288d
|
15/29 |
2225d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
|
KASAN: use-after-free Read in ethnl_update_bitset32
net
|
19 |
C |
done |
|
6 |
2269d |
2276d
|
15/29 |
2225d |
e34f1753eebc
ethtool: limit bitset size
|
|
KASAN: use-after-free Read in ip6_dst_destroy
net
|
19 |
C |
done |
|
1 |
2285d |
2285d
|
15/29 |
2225d |
44bfa9c5e5f0
net: rtnetlink: fix bugs in rtnl_alt_ifname()
|
|
KASAN: use-after-free Read in l3mdev_master_ifindex_rcu
net
|
19 |
C |
done |
done |
13 |
2281d |
2286d
|
15/29 |
2225d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
|
kernel panic: stack is corrupted in vhost_net_ioctl
kvm
net
virt
|
2 |
C |
done |
|
2 |
2285d |
2372d
|
15/29 |
2225d |
42d84c8490f9
vhost: Check docket sk_family instead of call getname
|
|
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
lsm
net
|
10 |
C |
done |
|
8 |
2265d |
2275d
|
15/29 |
2225d |
dc24f8b4ecd3
mptcp: add dummy icsk_sync_mss()
|
|
INFO: task hung in lock_sock_nested (2)
net
virt
kvm
|
1 |
C |
done |
|
418 |
2265d |
2278d
|
15/29 |
2225d |
3f74957fcbea
vsock: fix potential deadlock in transport->release()
|
|
KMSAN: use-after-free in l3mdev_master_ifindex_rcu
net
|
18 |
C |
|
|
5 |
2255d |
2279d
|
15/29 |
2225d |
e08ad80551b4
net: add strict checks in netdev_name_node_alt_destroy()
|
|
KASAN: use-after-free Read in mld_in_v1_mode
net
|
19 |
C |
done |
|
3 |
2284d |
2286d
|
15/29 |
2225d |
e08ad80551b4
net-backports: net: add strict checks in netdev_name_node_alt_destroy()
|
|
BUG: unable to handle kernel paging request in slhc_free
net
|
8 |
C |
done |
done |
177 |
2581d |
2698d
|
15/29 |
2260d |
baf76f0c58ae
slip: make slhc_free() silently accept an error pointer
|
|
KMSAN: uninit-value in setup_udp_tunnel_sock
net
|
7 |
C |
|
|
1 |
2310d |
2310d
|
15/29 |
2282d |
940ba1498665
net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
|
KMSAN: uninit-value in rsvp_change
net
|
7 |
C |
|
|
4 |
2302d |
2303d
|
15/29 |
2282d |
cb3c0e6bdf64
cls_rsvp: fix rsvp_policy
|
|
INFO: rcu detected stall in addrconf_rs_timer (3)
net
|
1 |
C |
inconclusive |
done |
81 |
2342d |
2338d
|
15/29 |
2282d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock (2)
net
|
21 |
C |
done |
|
8 |
2308d |
2310d
|
15/29 |
2282d |
940ba1498665
net-backports: gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
|
BUG: sleeping function called from invalid context in lock_sock_nested
net
bpf
|
5 |
C |
|
|
1232 |
2282d |
2357d
|
15/29 |
2282d |
37f96694cf73
crypto: af_alg - Use bh_lock_sock in sk_destruct
|
|
memory leak in vlan_dev_set_egress_priority
net
|
3 |
C |
|
|
1 |
2324d |
2324d
|
15/29 |
2282d |
9bbd917e0bec
vlan: fix memory leak in vlan_dev_set_egress_priority
|
|
KMSAN: uninit-value in macvlan_broadcast
net
|
7 |
C |
|
|
2 |
2325d |
2325d
|
15/29 |
2282d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
|
WARNING in tcp_ack
net
|
-1 |
C |
done |
|
3 |
2323d |
2323d
|
15/29 |
2282d |
90d72256addf
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
|
memory leak in em_nbyte_change
net
|
3 |
C |
|
|
1 |
2307d |
2307d
|
15/29 |
2282d |
55cd9f67f1e4
net_sched: ematch: reject invalid TCF_EM_SIMPLE
|
|
KASAN: slab-out-of-bounds Read in macvlan_broadcast
net
|
17 |
C |
done |
|
10 |
2322d |
2325d
|
15/29 |
2282d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
|
KASAN: slab-out-of-bounds Read in nla_put_nohdr
net
|
17 |
C |
done |
|
1 |
2310d |
2309d
|
15/29 |
2282d |
61678d28d4a4
net_sched: fix datalen for ematch
|
|
KASAN: use-after-free Read in tcp_fastretrans_alert
net
|
19 |
C |
done |
|
1 |
2313d |
2313d
|
15/29 |
2282d |
2bec445f9bf3
net-backports: tcp: do not leave dangling pointers in tp->highest_sack
|
|
BUG: unable to handle kernel paging request in rhashtable_jhash2
net
|
8 |
C |
done |
|
6 |
2315d |
2316d
|
15/29 |
2282d |
41cdc741048b
netdevsim: fix nsim_fib6_rt_create() error path
|
|
memory leak in tcf_ctinfo_init
net
|
3 |
C |
|
|
2 |
2312d |
2313d
|
15/29 |
2282d |
09d4f10a5e78
net: sched: act_ctinfo: fix memory leak
|
|
KASAN: slab-out-of-bounds Read in __nla_put_nohdr
net
|
17 |
C |
done |
|
4 |
2310d |
2310d
|
15/29 |
2282d |
61678d28d4a4
net_sched: fix datalen for ematch
|
|
INFO: rcu detected stall in br_handle_frame (2)
net
|
1 |
C |
done |
|
2 |
2342d |
2338d
|
15/29 |
2282d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
|
INFO: rcu detected stall in netlink_sendmsg (3)
net
|
1 |
C |
done |
|
6 |
2289d |
2342d
|
15/29 |
2282d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
|
WARNING in cbq_destroy_class
net
|
-1 |
C |
done |
|
7 |
2287d |
2310d
|
15/29 |
2282d |
2e24cd755552
net_sched: fix ops->bind_class() implementations
|
|
WARNING in cbq_destroy
net
|
-1 |
C |
done |
|
1 |
2309d |
2309d
|
15/29 |
2282d |
2e24cd755552
net_sched: fix ops->bind_class() implementations
|
|
KASAN: use-after-free Read in tcp_check_sack_reordering
net
|
19 |
C |
done |
|
2 |
2304d |
2313d
|
15/29 |
2282d |
2bec445f9bf3
net-backports: tcp: do not leave dangling pointers in tp->highest_sack
|
|
KASAN: use-after-free Read in macvlan_broadcast
net
|
19 |
C |
done |
|
12 |
2323d |
2325d
|
15/29 |
2282d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
|
WARNING: bad unlock balance in gtp_encap_enable_socket
net
|
4 |
C |
done |
|
8 |
2321d |
2325d
|
15/29 |
2282d |
90d72256addf
net-backports: gtp: fix bad unlock balance in gtp_encap_enable_socket
|
|
WARNING: bad unlock balance in sch_direct_xmit
net
|
4 |
C |
done |
|
35 |
2312d |
2359d
|
15/29 |
2282d |
53d374979ef1
net: avoid updating qdisc_xmit_lock_key in netdev_update_lockdep_key()
|
|
general protection fault in inet6_set_link_af
net
|
2 |
C |
done |
|
8 |
2291d |
2295d
|
15/29 |
2282d |
db3fa271022d
ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
|
|
general protection fault in tcf_ife_cleanup
net
|
2 |
C |
done |
|
111 |
2296d |
2320d
|
15/29 |
2282d |
44c23d71599f
net/sched: act_ife: initalize ife->metalist earlier
|
|
KASAN: use-after-free Write in __alloc_skb (2)
net
|
22 |
C |
done |
|
7 |
2333d |
2349d
|
15/29 |
2282d |
d836f5c69d87
net-backports: net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
|
|
KASAN: slab-out-of-bounds Read in tcf_exts_destroy
net
|
17 |
C |
done |
error |
8 |
2405d |
2308d
|
15/29 |
2282d |
599be01ee567
net_sched: fix an OOB access in cls_tcindex
|
|
inconsistent lock state in rxrpc_put_client_connection_id
afs
net
|
4 |
C |
done |
|
473 |
2291d |
2296d
|
15/29 |
2282d |
963485d436cc
rxrpc: Fix call RCU cleanup using non-bh-safe locks
|
|
KASAN: null-ptr-deref Read in tcf_generic_walker
net
|
11 |
C |
done |
|
6 |
2286d |
2304d
|
15/29 |
2282d |
760d228e322e
net_sched: walk through all child classes in tc_bind_tclass()
|
|
WARNING in tcp_enter_loss (2)
net
|
-1 |
C |
done |
unreliable |
4 |
2940d |
2990d
|
15/29 |
2282d |
16ae6aa17052
tcp: ignore Fast Open on repair mode
|
|
KASAN: slab-out-of-bounds Read in hsr_debugfs_rename
net
|
17 |
C |
done |
|
18 |
2325d |
2334d
|
15/29 |
2287d |
04b69426d846
hsr: fix slab-out-of-bounds Read in hsr_debugfs_rename()
|
|
kernel BUG at include/linux/mm.h:LINE! (5)
net
|
-1 |
C |
done |
done |
129 |
2563d |
2633d
|
15/29 |
2324d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
|
KASAN: slab-out-of-bounds Read in bpf_prog_create
net
bpf
|
17 |
C |
done |
|
447 |
2354d |
2436d
|
15/29 |
2324d |
0033b34a03ec
ppp: fix out-of-bounds access in bpf_prog_create()
|
|
memory leak in register_netdevice
net
|
3 |
C |
|
|
19 |
2355d |
2360d
|
15/29 |
2324d |
42c17fa69f98
net: fix a leak in register_netdevice()
|
|
WARNING: refcount bug in skb_set_owner_w
net
|
13 |
C |
done |
|
2 |
2360d |
2360d
|
15/29 |
2324d |
501a90c94510
net-backports: inet: protect against too small mtu values.
|
|
KMSAN: use-after-free in netlink_recvmsg
net
|
18 |
C |
|
|
1 |
2379d |
2379d
|
15/29 |
2350d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
|
KMSAN: use-after-free in __skb_try_recv_from_queue
net
|
18 |
C |
|
|
4 |
2378d |
2402d
|
15/29 |
2350d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
|
general protection fault in ip_sublist_rcv
net
|
2 |
C |
done |
|
287 |
2392d |
2402d
|
15/29 |
2350d |
51210ad5a558
inet: do not call sublist_rcv on empty list
|
|
kernel BUG at include/linux/scatterlist.h:LINE!
net
|
-1 |
C |
done |
|
307 |
2360d |
2554d
|
15/29 |
2350d |
d10523d0b3d7
net/tls: free the record on encryption error
|
|
general protection fault in ip6_sublist_rcv
net
|
2 |
C |
done |
|
327 |
2392d |
2395d
|
15/29 |
2350d |
51210ad5a558
inet: do not call sublist_rcv on empty list
|
|
general protection fault in devlink_get_from_attrs
net
|
2 |
C |
|
|
7 |
2417d |
2416d
|
15/29 |
2350d |
82a843de41d4
net: devlink: fix reporter dump dumpit
|
|
general protection fault in veth_get_stats64
net
|
2 |
C |
done |
|
2 |
2421d |
2421d
|
15/29 |
2350d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
|
KASAN: use-after-free Read in slip_open
net
|
19 |
C |
done |
|
3 |
2368d |
2369d
|
15/29 |
2350d |
e58c19124189
slip: Fix use-after-free Read in slip_open
|
|
WARNING in __rtnl_newlink
net
|
-1 |
C |
done |
|
2 |
2420d |
2420d
|
15/29 |
2350d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
|
WARNING: ODEBUG bug in free_netdev
net
|
-1 |
C |
done |
|
2 |
2418d |
2418d
|
15/29 |
2350d |
11fc7d5a0a2d
tun: fix memory leak in error path
|
|
general protection fault in ip6_tnl_ioctl
net
|
2 |
C |
done |
|
7 |
2409d |
2420d
|
15/29 |
2350d |
9077f052abd5
net: propagate errors correctly in register_netdevice()
|
|
KMSAN: use-after-free in copyout
net
|
18 |
C |
|
|
1 |
2415d |
2415d
|
15/29 |
2350d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
|
general protection fault in virtio_transport_release
kvm
net
virt
|
2 |
C |
done |
|
7 |
2372d |
2373d
|
15/29 |
2350d |
039fcccaed33
vsock: avoid to assign transport if its initialization fails
|
|
BUG: spinlock recursion in release_sock
net
|
4 |
C |
done |
|
116 |
2490d |
2491d
|
13/29 |
2365d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
|
WARNING in sk_stream_kill_queues (3)
net
|
-1 |
C |
done |
|
622 |
2537d |
2896d
|
13/29 |
2366d |
9354544cbccf
net/tls: fix page double free on TX cleanup
|
|
INFO: trying to register non-static key in bond_3ad_update_lacp_rate
net
|
-1 |
C |
done |
|
26 |
2393d |
2395d
|
13/29 |
2369d |
ad9bd8daf2f9
bonding: fix using uninitialized mode_lock
|
|
INFO: trying to register non-static key in bond_3ad_update_ad_actor_settings
net
|
-1 |
C |
done |
|
69 |
2392d |
2395d
|
13/29 |
2369d |
ad9bd8daf2f9
bonding: fix using uninitialized mode_lock
|
|
BUG: MAX_LOCK_DEPTH too low! (2)
net
|
-1 |
C |
|
done |
5 |
2867d |
2898d
|
13/29 |
2381d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
|
inconsistent lock state in ila_xlat_nl_cmd_del_mapping
net
|
4 |
C |
|
unreliable |
2496 |
2829d |
2835d
|
13/29 |
2381d |
7494de0454af
mfd: da9063: Replace regmap_add_irq_chip with devm counterpart
|
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (5)
net
|
17 |
C |
|
done |
654 |
2667d |
2969d
|
13/29 |
2381d |
32bf94fb5c2e
xfrm: validate template mode
|
|
KASAN: use-after-free Read in _decode_session4
net
|
19 |
C |
|
done |
3 |
2972d |
2972d
|
13/29 |
2381d |
c6741fbed6dc
vti6: Properly adjust vti6 MTU from MTU of lower device
|
|
general protection fault in tcp_cleanup_ulp
net
|
2 |
syz |
done |
done |
6 |
2797d |
2812d
|
13/29 |
2381d |
5607fff30363
bpf: sockmap only allow ESTABLISHED sock state
|
|
general protection fault in tcp_splice_read
net
|
2 |
C |
done |
done |
23 |
2597d |
2707d
|
13/29 |
2383d |
07603b230895
net/smc: propagate file from SMC to TCP socket
|
|
kernel BUG at net/ipv4/ip_output.c:LINE!
net
|
-1 |
C |
|
done |
28225 |
2676d |
2867d
|
13/29 |
2384d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
|
suspicious RCU usage at ./include/net/inet_sock.h:LINE
net
|
-1 |
C |
|
done |
171 |
3027d |
3117d
|
13/29 |
2384d |
3f32d0be6c16
tipc: lock wakeup & inputq at tipc_link_reset()
|
|
KASAN: use-after-free Read in _decode_session6
net
|
19 |
C |
|
done |
4 |
2744d |
2812d
|
13/29 |
2385d |
e7c87bd6cc4e
bpf: in __bpf_redirect_no_mac pull mac only if present
|
|
BUG: unable to handle kernel NULL pointer dereference in xsk_poll
bpf
net
|
10 |
C |
done |
|
10 |
2405d |
2423d
|
13/29 |
2388d |
df551058f7a3
xsk: Fix crash in poll when device does not support ndo_xsk_wakeup
|
|
KASAN: use-after-free Read in rxrpc_release_call
afs
net
|
19 |
syz |
done |
|
13 |
2406d |
2461d
|
13/29 |
2388d |
91fcfbe8852e
rxrpc: Fix call crypto state cleanup
|
|
KASAN: use-after-free Read in rxrpc_send_keepalive
afs
net
|
19 |
C |
error |
|
694 |
2403d |
2475d
|
13/29 |
2388d |
c48fc11b69e9
rxrpc: Fix call ref leak
|
|
memory leak in llc_ui_sendmsg
net
|
3 |
C |
|
|
125 |
2404d |
2555d
|
13/29 |
2388d |
c6ee11c39fcc
llc: fix sk_buff leak in llc_sap_state_process()
|
|
INFO: task hung in addrconf_verify_work (2)
net
|
1 |
C |
|
|
22 |
2409d |
2409d
|
13/29 |
2388d |
39f13ea2f61b
net: avoid potential infinite loop in tc_ctl_action()
|
|
KASAN: use-after-free Read in rxrpc_put_peer
afs
net
|
19 |
C |
error |
|
38 |
2404d |
2456d
|
13/29 |
2388d |
55f6c98e3674
rxrpc: Fix trace-after-put looking at the put peer record
9ebeddef58c4
rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record
|
|
memory leak in llc_conn_ac_send_sabme_cmd_p_set_x
net
|
3 |
C |
|
|
225 |
2403d |
2555d
|
13/29 |
2388d |
b74555de21ac
llc: fix sk_buff leak in llc_conn_service()
|
|
general protection fault in rxrpc_error_report
net
afs
|
2 |
C |
done |
|
6 |
2404d |
2416d
|
13/29 |
2388d |
f0308fb07080
rxrpc: Fix possible NULL pointer access in ICMP handling
|
|
WARNING: suspicious RCU usage in xfrm_alloc_userspi
net
|
4 |
C |
done |
error |
86 |
2616d |
2618d
|
13/29 |
2389d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
|
general protection fault in get_work_pool
net
|
2 |
C |
|
done |
24 |
2596d |
2999d
|
13/29 |
2389d |
07bf7908950a
xfrm: Validate address prefix lengths in the xfrm selector.
|
|
general protection fault in xfrm_init_replay
net
|
2 |
syz |
inconclusive |
done |
2 |
2986d |
2986d
|
13/29 |
2389d |
d97ca5d714a5
xfrm_user: uncoditionally validate esn replay attribute struct
|
|
WARNING: suspicious RCU usage in xfrm_get_spdinfo
net
|
4 |
C |
done |
error |
46 |
2616d |
2618d
|
13/29 |
2389d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
|
WARNING: suspicious RCU usage in xfrm_get_sadinfo
net
|
4 |
C |
done |
error |
28 |
2617d |
2618d
|
13/29 |
2389d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
|
WARNING: suspicious RCU usage in xfrm_get_policy
net
|
4 |
syz |
done |
error |
8 |
2618d |
2618d
|
13/29 |
2389d |
f10e0010fae8
net: xfrm: Add '_rcu' tag for rcu protected pointer in netns_xfrm
|
|
KMSAN: uninit-value in inet_ehash_insert
net
|
7 |
C |
|
|
7 |
2416d |
2423d
|
13/29 |
2408d |
6af1799aaf3f
net-backports: ipv6: drop incoming packets having a v4mapped source address
|
|
general protection fault in xsk_poll
net
bpf
|
2 |
C |
done |
|
430 |
2437d |
2465d
|
13/29 |
2408d |
42fddcc7c64b
xsk: use state member for socket synchronization
|
|
BUG: sleeping function called from invalid context in tcf_chain0_head_change_cb_del
net
|
5 |
C |
done |
|
187 |
2423d |
2437d
|
13/29 |
2408d |
e3ae1f96accd
net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
|
|
INFO: rcu detected stall in pie_timer
net
|
1 |
C |
|
|
19 |
2408d |
2444d
|
13/29 |
2408d |
4ce70b4aed57
net-backports: net: sched: sch_htb: don't call qdisc_put() while holding tree lock
|
|
KASAN: use-after-free Read in cbq_enqueue
net
|
19 |
C |
done |
|
4 |
2416d |
2417d
|
13/29 |
2408d |
e9789c7cc182
sch_cbq: validate TCA_CBQ_WRROPT to avoid crash
|
|
general protection fault in dsmark_init
net
|
2 |
C |
done |
|
3 |
2416d |
2419d
|
13/29 |
2408d |
474f0813a300
sch_dsmark: fix potential NULL deref in dsmark_init()
|
|
possible deadlock in pie_timer
net
|
4 |
C |
done |
|
2 |
2425d |
2425d
|
13/29 |
2408d |
e3ae1f96accd
net: sched: sch_sfb: don't call qdisc_put() while holding tree lock
|
|
general protection fault in dev_map_hash_update_elem
net
bpf
|
2 |
C |
done |
|
4 |
2441d |
2448d
|
13/29 |
2408d |
af58e7ee6a8d
xdp: Fix race in dev_map_hash_update_elem() when replacing element
|
|
INFO: rcu detected stall in sys_sendmsg
net
|
1 |
C |
done |
|
2 |
2439d |
2440d
|
13/29 |
2414d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
|
general protection fault in addrconf_f6i_alloc
net
|
2 |
C |
|
|
305 |
2437d |
2448d
|
13/29 |
2414d |
8652f17c658d
ipv6: addrconf_f6i_alloc - fix non-null pointer check to !IS_ERR()
|
|
general protection fault in tls_sk_proto_close (2)
net
|
2 |
syz |
error |
|
246 |
2438d |
2456d
|
13/29 |
2414d |
44580a0118d3
net: sock_map, fix missing ulp check in sock hash case
|
|
BUG: soft lockup in addrconf_dad_work
net
|
1 |
C |
done |
|
1 |
2442d |
2442d
|
13/29 |
2414d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
|
INFO: rcu detected stall in igmp_ifc_timer_expire
net
|
1 |
C |
|
|
57 |
2438d |
2696d
|
13/29 |
2414d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
|
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass
net
|
10 |
C |
done |
|
61 |
2437d |
2445d
|
13/29 |
2414d |
8b142a00edcf
net_sched: check cops->tcf_block in tc_bind_tclass()
|
|
KMSAN: uninit-value in capi_write
net
|
7 |
C |
|
|
445 |
2414d |
2654d
|
13/29 |
2414d |
fe163e534e5e
isdn/capi: check message length in capi_write()
|
|
general protection fault in requeue_rx_msgs
net
|
2 |
syz |
done |
inconclusive |
1 |
2911d |
2910d
|
13/29 |
2419d |
eb7f54b90bd8
kcm: Fix use-after-free caused by clonned sockets
|
|
WARNING in cbs_dequeue_soft
net
|
-1 |
C |
done |
|
13 |
2438d |
2445d
|
12/29 |
2437d |
1c6c09a0ae62
net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate
|
|
general protection fault in packet_lookup_frame
net
|
2 |
C |
done |
|
7 |
2470d |
2471d
|
12/29 |
2447d |
32d3182cd2cd
net/packet: fix race in tpacket_snd()
|
|
memory leak in ip6_mc_add_src
net
|
3 |
C |
|
|
1 |
2457d |
2457d
|
12/29 |
2447d |
a84d01647989
mld: fix memory leak in mld_del_delrec()
|
|
KASAN: use-after-free Read in rxrpc_queue_local
afs
net
|
19 |
C |
done |
|
1 |
2472d |
2472d
|
12/29 |
2447d |
06d9532fa6b3
rxrpc: Fix read-after-free in rxrpc_queue_local()
|
|
general protection fault in tls_write_space
net
|
2 |
syz |
|
|
33 |
2465d |
2475d
|
12/29 |
2447d |
57c722e932cf
net/tls: swap sk_write_space on close
|
|
KMSAN: uninit-value in rtm_new_nexthop
net
|
7 |
C |
|
|
8 |
2463d |
2463d
|
12/29 |
2447d |
d00ee64e1dcf
netlink: Fix nlmsg_parse as a wrapper for strict message parsing
|
|
kernel BUG at net/rxrpc/local_object.c:LINE!
net
afs
|
-1 |
C |
done |
|
11167 |
2450d |
2517d
|
12/29 |
2447d |
730c5fd42c1e
rxrpc: Fix local endpoint refcounting
|
|
KMSAN: uninit-value in rtm_dump_nexthop
net
|
7 |
C |
|
|
6 |
2457d |
2473d
|
12/29 |
2447d |
d00ee64e1dcf
netlink: Fix nlmsg_parse as a wrapper for strict message parsing
|
|
KASAN: slab-out-of-bounds Read in usbnet_generic_cdc_bind
net
usb
|
17 |
C |
|
|
2 |
2470d |
2472d
|
12/29 |
2447d |
54364278fb3c
USB: CDC: fix sanity checks in CDC union parser
|
|
BUG: corrupted list in rxrpc_local_processor
net
afs
|
8 |
C |
done |
|
1679 |
2467d |
2475d
|
12/29 |
2447d |
b00df840fb40
rxrpc: Fix local endpoint replacement
|
|
general protection fault in tls_trim_both_msgs
net
|
2 |
C |
done |
|
36 |
2479d |
2490d
|
12/29 |
2457d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
|
BUG: unable to handle kernel paging request in tls_prots
net
bpf
|
8 |
syz |
done |
|
1 |
2519d |
2519d
|
12/29 |
2457d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
|
memory leak in create_ctx
net
|
3 |
syz |
|
|
1 |
2537d |
2537d
|
12/29 |
2457d |
95fa145479fb
bpf: sockmap/tls, close can race with map free
|
|
general protection fault in tls_setsockopt
net
|
2 |
syz |
done |
|
7 |
2485d |
2499d
|
12/29 |
2457d |
5d92e631b8be
net/tls: partially revert fix transition through disconnect with close
|
|
possible deadlock in xsk_notifier
net
bpf
|
4 |
C |
done |
|
495 |
2496d |
2507d
|
12/29 |
2470d |
5464c3a0e9a0
xdp: fix potential deadlock on socket mutex
|
|
KASAN: stack-out-of-bounds Read in hfcsusb_probe
usb
net
|
17 |
C |
|
|
634 |
2486d |
2592d
|
12/29 |
2470d |
f384e62a82ba
ISDN: hfcsusb: checking idx of ep configuration
|
|
general protection fault in send_hsr_supervision_frame
net
|
2 |
C |
done |
|
1395 |
2500d |
2507d
|
12/29 |
2479d |
311633b60406
hsr: switch ->dellink() to ->ndo_uninit()
|
|
memory leak in ip_mc_add_src (2)
net
|
3 |
C |
|
|
7 |
2490d |
2518d
|
12/29 |
2479d |
e5b1c6c6277d
igmp: fix memory leak in igmpv3_del_delrec()
|
|
general protection fault in ip6_datagram_dst_update
net
|
2 |
C |
done |
|
12 |
2503d |
2505d
|
12/29 |
2479d |
8975a3abc303
ipv6: fix potential crash in ip6_datagram_dst_update()
|
|
KMSAN: uninit-value in bond_start_xmit (2)
net
|
7 |
C |
|
|
2309 |
2479d |
2803d
|
12/29 |
2479d |
9d1bc24b52fb
bonding: validate ip header before check IPPROTO_IGMP
|
|
memory leak in pfkey_xfrm_policy2msg_prep
net
|
3 |
C |
|
|
4 |
2520d |
2551d
|
12/29 |
2479d |
7c80eb1c7e2b
af_key: fix leaks in key_pol_get_resp and dump_sp.
|
|
KASAN: use-after-free Read in kfree_skb_list
net
|
19 |
C |
done |
|
383 |
2525d |
2544d
|
12/29 |
2479d |
b7034146756b
net: fix use-after-free in kfree_skb_list
|
|
memory leak in __ip6_append_data
net
|
3 |
C |
|
|
10 |
2522d |
2548d
|
12/29 |
2479d |
dc93f46bc4e0
inet: frags: fix use-after-free read in inet_frag_destroy_rcu
|
|
KASAN: use-after-free Write in xfrm_hash_rebuild
net
|
22 |
syz |
done |
|
8 |
2512d |
2560d
|
12/29 |
2479d |
fd709721352d
xfrm: policy: fix bydst hlist corruption on hash rebuild
|
|
WARNING: suspicious RCU usage in in_dev_dump_addr
net
|
4 |
C |
done |
|
107 |
2540d |
2542d
|
12/29 |
2479d |
d3e6e285fff3
net: ipv4: fix rcu lockdep splat due to wrong annotation
|
|
general protection fault in tcp_v6_send_reset
net
|
2 |
C |
done |
|
353 |
2534d |
2539d
|
12/29 |
2479d |
392096736a06
ipv6: tcp: fix potential NULL deref in tcp_v6_send_reset()
|
|
KASAN: use-after-free Read in inet_frag_destroy_rcu
net
|
19 |
C |
done |
|
61 |
2546d |
2549d
|
12/29 |
2479d |
dc93f46bc4e0
inet: frags: fix use-after-free read in inet_frag_destroy_rcu
|
|
general protection fault in rxrpc_connect_call
afs
net
|
2 |
C |
done |
|
15 |
2528d |
2673d
|
12/29 |
2479d |
e835ada07091
rxrpc: Fix send on a connected, but unbound socket
|
|
WARNING: suspicious RCU usage in fib_dump_info_fnhe
net
|
4 |
C |
done |
|
7 |
2519d |
2519d
|
12/29 |
2479d |
3b525691529b
ipv6: fix suspicious RCU usage in rt6_dump_route()
|
|
memory leak in hsr_create_self_node
net
|
3 |
C |
|
|
5 |
2518d |
2549d
|
12/29 |
2479d |
b9a1e627405d
hsr: implement dellink to clean up resources
|
|
general protection fault in call_fib6_multipath_entry_notifiers
net
|
2 |
C |
done |
|
94 |
2521d |
2526d
|
12/29 |
2479d |
9eee3b4913d7
ipv6: Error when route does not have any valid nexthops
|
|
memory leak in packet_set_ring
net
|
3 |
C |
|
|
2 |
2518d |
2523d
|
12/29 |
2486d |
55655e3d1197
net/packet: fix memory leak in packet_set_ring()
|
|
general protection fault in inet_accept
net
|
2 |
C |
|
|
131 |
2707d |
2869d
|
12/29 |
2504d |
07603b230895
net/smc: propagate file from SMC to TCP socket
|
|
KMSAN: uninit-value in tcp_create_openreq_child
net
|
7 |
C |
|
|
4000 |
2505d |
2526d
|
12/29 |
2505d |
85f9aa7565bd
inet: clear num_timeout reqsk_alloc()
|
|
KASAN: use-after-free Read in pneigh_get_next
net
|
19 |
syz |
done |
|
2 |
2530d |
2530d
|
12/29 |
2505d |
f3e92cb8e2eb
neigh: fix use-after-free read in pneigh_get_next
|
|
memory leak in inet6_create
net
|
3 |
C |
|
|
2 |
2536d |
2539d
|
12/29 |
2505d |
522924b58308
net: correct udp zerocopy refcnt also when zerocopy only on append
|
|
KASAN: use-after-free Read in sprintf
net
|
19 |
syz |
done |
|
2 |
2530d |
2530d
|
12/29 |
2505d |
f3e92cb8e2eb
neigh: fix use-after-free read in pneigh_get_next
|
|
general protection fault in dst_dev_put (2)
net
|
2 |
C |
done |
|
442 |
2526d |
2716d
|
12/29 |
2505d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
|
KASAN: use-after-free Read in rt_cache_valid
net
|
19 |
syz |
done |
|
5 |
2537d |
2653d
|
12/29 |
2505d |
c3bcde026684
tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb
|
|
memory leak in packet_setsockopt
net
|
3 |
C |
|
|
10 |
2538d |
2555d
|
12/29 |
2525d |
afa0925c6fcc
packet: unconditionally free po->rollover
|
|
memory leak in ip_mc_add_src
net
|
3 |
C |
|
|
14 |
2531d |
2555d
|
12/29 |
2527d |
3580d04aa674
ipv4/igmp: fix another memory leak in igmpv3_del_delrec()
|
|
memory leak in llc_ui_create
net
|
3 |
C |
|
|
4 |
2536d |
2549d
|
12/29 |
2527d |
8fb44d60d414
llc: fix skb leak in llc_build_and_send_ui_pkt()
|
|
memory leak in inet_create
net
|
3 |
C |
|
|
2 |
2541d |
2555d
|
12/29 |
2527d |
100f6d8e0990
net: correct zerocopy refcnt with udp MSG_MORE
|
|
KASAN: use-after-free Read in __dev_map_entry_free
bpf
net
|
19 |
C |
|
|
473 |
2609d |
2890d
|
12/29 |
2527d |
2baae3545327
bpf: devmap: fix use-after-free Read in __dev_map_entry_free
|
|
BUG: assuming atomic context at net/core/flow_dissector.c:LINE
net
|
-1 |
syz |
|
|
19 |
2561d |
2566d
|
12/29 |
2531d |
b1c17a9a3538
flow_dissector: disable preemption around BPF calls
|
|
general protection fault in __handle_mm_fault
net
|
2 |
C |
error |
|
17 |
2773d |
2783d
|
12/29 |
2534d |
ff09d7ec9786
mm/memory.c: recheck page table entry with page table lock held
|
|
WARNING in xfrm_state_fini (2)
net
|
-1 |
C |
|
|
37510 |
2573d |
3026d
|
12/29 |
2549d |
dbb2483b2a46
xfrm: clean up xfrm protocol checks
|
|
KMSAN: uninit-value in rtnl_stats_dump
net
|
7 |
syz |
|
|
14 |
2579d |
2594d
|
12/29 |
2549d |
69f23a09daf9
rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
|
|
KASAN: slab-out-of-bounds Read in skb_gro_receive (2)
net
|
17 |
C |
done |
|
5 |
2575d |
2575d
|
12/29 |
2549d |
4dd2b82d5adf
udp: fix GRO packet of death
|
|
KASAN: stack-out-of-bounds Write in __ip_options_echo
net
|
21 |
syz |
done |
|
8 |
2583d |
2586d
|
12/29 |
2549d |
20ff83f10f11
ipv4: add sanity checks in ipv4_link_failure()
|
|
KMSAN: uninit-value in rtnl_stats_get
net
|
7 |
C |
|
|
5 |
2586d |
2594d
|
12/29 |
2549d |
69f23a09daf9
rtnetlink: fix rtnl_valid_stats_req() nlmsg_len check
|
|
kernel BUG at net/core/net-sysfs.c:LINE!
net
|
-1 |
C |
done |
|
890 |
2578d |
2614d
|
12/29 |
2549d |
8ed633b9baf9
Revert "net-sysfs: Fix memory leak in netdev_register_kobject"
|
|
INFO: task hung in vhost_net_stop_vq
net
virt
kvm
|
1 |
C |
done |
|
136 |
2589d |
2727d
|
12/29 |
2549d |
813dbeb656d6
vhost: reject zero size iova range
|
|
WARNING: locking bug in icmp_send
net
|
4 |
syz |
done |
|
1 |
2646d |
2646d
|
12/29 |
2566d |
9926cb5f8b0f
tipc: change to check tipc_own_id to return in tipc_net_stop
|
|
KMSAN: uninit-value in ip6_compressed_string
nfs
net
|
7 |
C |
|
|
9024 |
2577d |
2729d
|
12/29 |
2577d |
7c2bd9a39845
NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
|
|
BUG: corrupted list in rhashtable_walk_enter
net
|
8 |
syz |
error |
|
3 |
2613d |
2612d
|
12/29 |
2594d |
b5f9bd15b885
ila: Fix rhashtable walker list corruption
|
|
WARNING: lock held when returning to user space in tun_get_user
net
|
4 |
C |
done |
|
55 |
2621d |
2621d
|
12/29 |
2596d |
9180bb4f0460
tun: add a missing rcu_read_unlock() in error path
|
|
general protection fault in fib6_purge_rt
net
|
2 |
C |
done |
|
60 |
2598d |
2715d
|
12/29 |
2596d |
9926cb5f8b0f
tipc: change to check tipc_own_id to return in tipc_net_stop
|
|
general protection fault in tc_ctl_chain
net
|
2 |
C |
|
|
21 |
2644d |
2652d
|
11/29 |
2609d |
af736bf071e8
net: sched: potential NULL dereference in tcf_block_find()
|
|
KASAN: use-after-free Read in unix_dgram_poll
net
|
19 |
syz |
|
|
2 |
2638d |
2634d
|
11/29 |
2609d |
84c4e1f89fef
aio: simplify - and fix - fget/fput for io_submit()
|
|
KMSAN: uninit-value in gue6_err (2)
net
|
7 |
C |
|
|
2826 |
2609d |
2631d
|
11/29 |
2609d |
5355ed6388e2
fou, fou6: avoid uninit-value in gue_err() and gue6_err()
|
|
KMSAN: kernel-infoleak in move_addr_to_user (2)
net
|
9 |
C |
|
|
8 |
2610d |
2625d
|
11/29 |
2609d |
163d1c3d6f17
l2tp: fix infoleak in l2tp_ip6_recvmsg()
|
|
general protection fault in xsk_diag_dump
net
bpf
|
2 |
C |
|
|
5 |
2627d |
2632d
|
11/29 |
2609d |
915905f8b1d4
xsk: fix potential crash in xsk_diag_put_umem()
|
|
KMSAN: uninit-value in gue_err (2)
net
|
7 |
C |
|
|
1617 |
2609d |
2631d
|
11/29 |
2609d |
5355ed6388e2
fou, fou6: avoid uninit-value in gue_err() and gue6_err()
|
|
KASAN: use-after-free Write in __xfrm_policy_unlink
net
|
22 |
C |
|
|
254 |
2634d |
2862d
|
11/29 |
2631d |
1548bc4e0512
xfrm: policy: delete inexact policies from inexact list on hash rebuild
|
|
WARNING in __skb_flow_dissect (3)
net
|
-1 |
syz |
|
|
224 |
2681d |
2770d
|
11/29 |
2631d |
0b7959b62573
tun: publish tfile after it's fully initialized
|
|
BUG: unable to handle kernel paging request in depot_save_stack
net
|
8 |
C |
|
|
1 |
2692d |
2692d
|
11/29 |
2631d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
|
WARNING in tcp_send_loss_probe
net
|
-1 |
C |
|
|
9 |
2642d |
2693d
|
11/29 |
2631d |
bf50b606cfd8
tcp: repaired skbs must init their tso_segs
|
|
KASAN: stack-out-of-bounds Read in pick_next_task_fair
net
|
17 |
C |
|
|
1 |
2692d |
2691d
|
11/29 |
2631d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
|
general protection fault in icmp6_send
net
|
2 |
syz |
|
|
2 |
2692d |
2692d
|
11/29 |
2631d |
8d9336704521
ipv6: make icmp6_send() robust against null skb->dev
|
|
general protection fault in team_nl_cmd_options_set
net
|
2 |
C |
|
|
7 |
2701d |
2659d
|
11/29 |
2631d |
2fdeee254923
team: avoid complex list operations in team_nl_cmd_options_set()
|
|
KASAN: stack-out-of-bounds Read in gue_err_proto_handler
net
|
17 |
C |
|
|
1 |
2689d |
2689d
|
11/29 |
2631d |
44039e00171b
fou6: Prevent unbounded recursion in GUE error handler
|
|
KMSAN: uninit-value in gue_err
net
|
7 |
C |
|
|
4686 |
2631d |
2685d
|
11/29 |
2631d |
26fc181e6cac
fou, fou6: do not assume linear skbs
|
|
general protection fault in ip6erspan_set_version
net
|
2 |
C |
|
|
39 |
2640d |
2646d
|
11/29 |
2631d |
efcc9bcaf77c
net: ip6_gre: fix possible NULL pointer dereference in ip6erspan_set_version
|
|
WARNING in xfrm6_tunnel_net_exit (2)
net
|
-1 |
C |
|
|
48816 |
2641d |
2922d
|
11/29 |
2631d |
f75a2804da39
xfrm: destroy xfrm_state synchronously on net exit path
|
|
WARNING: bad unlock balance in rxrpc_recvmsg
afs
net
|
4 |
C |
|
|
9 |
2657d |
2661d
|
11/29 |
2631d |
6dce3c20ac42
rxrpc: bad unlock balance in rxrpc_recvmsg
|
|
KMSAN: uninit-value in gue6_err
net
|
7 |
C |
|
|
8359 |
2631d |
2685d
|
11/29 |
2631d |
26fc181e6cac
fou, fou6: do not assume linear skbs
|
|
general protection fault in finish_wait
net
|
2 |
C |
|
|
22 |
2656d |
2871d
|
11/29 |
2638d |
78abe3d0dfad
net/smc: fix TCP fallback socket release
|
|
KASAN: out-of-bounds Write in tls_push_record
net
|
21 |
C |
|
|
10 |
2772d |
2873d
|
11/29 |
2639d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
|
kernel BUG at include/linux/mm.h:LINE! (2)
net
|
-1 |
C |
|
|
1009 |
2639d |
2902d
|
11/29 |
2639d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
|
KASAN: use-after-free Write in tls_push_record (2)
net
|
22 |
C |
|
|
64 |
2766d |
2869d
|
11/29 |
2639d |
d829e9c4112b
tls: convert to generic sk_msg interface
|
|
WARNING in __debug_object_init (3)
bpf
net
|
-1 |
C |
|
|
1557 |
2759d |
2760d
|
11/29 |
2675d |
2cb494a36c98
bpf: add tests for direct packet access from CGROUP_SKB
|
|
general protection fault in encode_rpcb_string
net
nfs
|
2 |
C |
|
|
6 |
2858d |
2954d
|
11/29 |
2681d |
81c88b18de1f
sunrpc: handle ENOMEM in rpcb_getport_async
|
|
KMSAN: uninit-value in vti6_tnl_xmit
net
|
7 |
syz |
|
|
60 |
2686d |
2709d
|
11/29 |
2681d |
cb9f1b783850
ip: validate header length on virtual device xmit
|
|
KASAN: invalid-free in x25_asy_free
net
|
24 |
C |
|
|
67 |
2692d |
2699d
|
11/29 |
2681d |
d5c7c745f254
net/wan: fix a double free in x25_asy_open_tty()
|
|
KMSAN: uninit-value in check_6rd
net
|
7 |
C |
|
|
81 |
2687d |
2709d
|
11/29 |
2681d |
cb9f1b783850
ip: validate header length on virtual device xmit
|
|
KASAN: slab-out-of-bounds Read in tun_net_xmit (2)
net
|
17 |
C |
|
|
10 |
2697d |
2864d
|
11/29 |
2681d |
aff6db454599
ptr_ring: wrap back ->producer in __ptr_ring_swap_queue()
|
|
KMSAN: kernel-infoleak in capi_unlocked_ioctl
net
|
9 |
C |
|
|
109 |
2686d |
2696d
|
11/29 |
2681d |
d63967e475ae
isdn: fix kernel-infoleak in capi_unlocked_ioctl
|
|
BUG: corrupted list in ___neigh_create
net
|
8 |
C |
|
|
706 |
2714d |
2717d
|
11/29 |
2686d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
|
BUG: corrupted list in neigh_mark_dead
net
|
8 |
C |
|
|
4117 |
2714d |
2717d
|
11/29 |
2686d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
|
KMSAN: uninit-value in __inet6_bind
net
|
7 |
C |
|
|
56 |
2687d |
2717d
|
11/29 |
2686d |
fb2427454631
ipv6: explicitly initialize udp6_addr in udp_sock_create6()
|
|
general protection fault in inet_lhash2_lookup
net
|
2 |
C |
|
|
1137 |
2709d |
2712d
|
11/29 |
2686d |
eedbbb0d98b2
net: dccp: initialize (addr,port) listening hashtable
|
|
general protection fault in inet6_lhash2_lookup
net
|
2 |
C |
|
|
718 |
2709d |
2712d
|
11/29 |
2686d |
eedbbb0d98b2
net: dccp: initialize (addr,port) listening hashtable
|
|
KASAN: use-after-free Read in neigh_mark_dead
net
|
19 |
C |
|
|
858 |
2714d |
2717d
|
11/29 |
2686d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
|
general protection fault in __ipv6_sock_mc_join
net
|
2 |
C |
|
|
9 |
2713d |
2717d
|
11/29 |
2686d |
fb83ed496b9a
tipc: compare remote and local protocols in tipc_udp_enable()
|
|
KASAN: use-after-free Read in ___neigh_create
net
|
19 |
C |
|
|
164 |
2714d |
2717d
|
11/29 |
2686d |
8cc196d6ef86
neighbor: gc_list changes should be protected by table lock
|
|
KASAN: use-after-free Read in vhost_transport_send_pkt
kvm
net
virt
|
19 |
syz |
|
|
36 |
2723d |
2850d
|
11/29 |
2709d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KMSAN: kernel-infoleak in _copy_to_iter (4)
net
|
9 |
C |
|
|
56 |
2724d |
2728d
|
11/29 |
2709d |
688838934c23
rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices
|
|
KASAN: use-after-free Read in vhost_work_queue
kvm
net
virt
|
19 |
syz |
|
|
30 |
2721d |
2821d
|
11/29 |
2709d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KASAN: use-after-free Read in vhost_transport_cancel_pkt
kvm
net
virt
|
19 |
syz |
|
|
17 |
2748d |
2792d
|
11/29 |
2709d |
834e772c8db0
vhost/vsock: fix use-after-free in network stack callers
|
|
KMSAN: uninit-value in dev_mc_add_excl
net
|
7 |
C |
|
|
13 |
2750d |
2762d
|
11/29 |
2745d |
da71577545a5
rtnetlink: Disallow FDB configuration for non-Ethernet device
|
|
KMSAN: uninit-value in dev_uc_add_excl
net
|
7 |
C |
|
|
20 |
2756d |
2798d
|
11/29 |
2745d |
da71577545a5
rtnetlink: Disallow FDB configuration for non-Ethernet device
|
|
KASAN: use-after-free Read in tcf_block_find
net
|
19 |
C |
|
|
27 |
2786d |
2792d
|
11/29 |
2745d |
460b360104d5
net_sched: fix a crash in tc_new_tfilter()
|
|
general protection fault in __skb_flow_dissect (2)
net
|
2 |
C |
|
|
11 |
2793d |
2800d
|
11/29 |
2745d |
d0e13a1488ad
flow_dissector: lookup netns by skb->sk if skb->dev is NULL
|
|
KMSAN: uninit-value in ip_tunnel_lookup (2)
net
|
7 |
C |
|
|
2 |
2763d |
2763d
|
11/29 |
2745d |
b0350d51f001
ip_gre: fix parsing gre header in ipgre_err
|
|
WARNING in tcp_cleanup_ulp
net
|
-1 |
syz |
|
|
16 |
2771d |
2772d
|
11/29 |
2745d |
aadd4355918f
tcp, ulp: remove socket lock assertion on ULP cleanup
|
|
general protection fault in dev_gro_receive (2)
net
|
2 |
syz |
|
|
4 |
2769d |
2777d
|
11/29 |
2745d |
ece23711dd95
net: Properly unlink GRO packets on overflow.
|
|
WARNING in tcp_close
net
|
-1 |
syz |
|
|
284 |
2766d |
2866d
|
11/29 |
2745d |
8873c064d1de
tcp: do not release socket ownership in tcp_close()
|
|
KMSAN: kernel-infoleak in _copy_to_iter (3)
net
|
9 |
C |
|
|
36 |
2759d |
2770d
|
11/29 |
2759d |
b06f9d9f1a90
tipc: fix info leak from kernel tipc_event
|
|
KASAN: slab-out-of-bounds Read in _decode_session6
net
|
17 |
C |
|
|
35 |
2759d |
2816d
|
11/29 |
2759d |
9f7e43da6ae4
net/xfrm: fix out-of-bounds packet access
|
|
kernel BUG at net/core/dev.c:LINE! (2)
net
|
-1 |
syz |
|
|
2 |
2778d |
2778d
|
11/29 |
2770d |
52b5d6f5dcf0
net: make skb_partial_csum_set() more robust against overflows
|
|
WARNING in __skb_flow_dissect
net
|
-1 |
syz |
|
|
3 |
2778d |
2779d
|
11/29 |
2777d |
af3fb24eecb2
tun: napi flags belong to tfile
|
|
general protection fault in dev_gro_receive
net
|
2 |
syz |
|
|
8 |
2779d |
2791d
|
11/29 |
2777d |
af3fb24eecb2
tun: napi flags belong to tfile
|
|
possible deadlock in flush_workqueue
net
|
4 |
C |
|
|
73762 |
2784d |
2826d
|
11/29 |
2777d |
d4859d749aa7
net-backports: bonding: avoid possible dead-lock
|
|
KASAN: use-after-free Read in rawv6_sendmsg
net
|
19 |
C |
|
|
84 |
2778d |
2810d
|
11/29 |
2777d |
a688caa34beb
net-backports: ipv6: take rcu lock in rawv6_send_hdrinc()
|
|
KASAN: use-after-free Read in ip_cmsg_recv_offset
net
|
19 |
C |
|
|
9 |
2787d |
2789d
|
11/29 |
2777d |
64199fc0a46b
net-backports: ipv4: fix use-after-free in ip_cmsg_recv_dstaddr()
|
|
possible deadlock in team_vlan_rx_add_vid
net
|
4 |
syz |
|
|
5 |
2807d |
2841d
|
11/29 |
2777d |
471b83bd8bbe
team: Forbid enslaving team device to itself
|
|
KMSAN: uninit-value in ip6_tnl_start_xmit
net
|
7 |
C |
|
|
69 |
2791d |
2801d
|
11/29 |
2777d |
76c0ddd8c3a6
ip6_tunnel: be careful when accessing the inner header
|
|
KMSAN: uninit-value in pppoe_rcv
net
|
7 |
C |
|
|
2 |
2936d |
2806d
|
11/29 |
2777d |
8540827ebac6
pppoe: fix reception of frames with no mac header
|
|
WARNING: suspicious RCU usage in inet_csk_route_req
net
|
4 |
C |
|
|
43 |
2784d |
3019d
|
11/29 |
2777d |
1ad98e9d1bdf
tcp/dccp: fix lockdep issue when SYN is backlogged
|
|
KMSAN: kernel-infoleak in _copy_to_iter (2)
net
|
9 |
C |
|
|
7 |
2785d |
2813d
|
11/29 |
2780d |
45c180bc29ba
xfrm_user: prevent leaking 2 bytes of kernel memory
|
|
KMSAN: uninit-value in memcmp (2)
net
|
7 |
C |
|
|
131 |
2806d |
2797d
|
10/29 |
2795d |
77d36398d99f
net: fix uninit-value in __hw_addr_add_ex()
|
|
KASAN: use-after-free Read in ip6_hold_safe
net
|
19 |
C |
|
|
1 |
2847d |
2847d
|
8/29 |
2821d |
6d37fa49da1e
l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
|
|
WARNING: refcount bug in llc_sap_find
net
|
13 |
C |
|
|
18 |
2840d |
2842d
|
8/29 |
2821d |
0dcb82254d65
llc: use refcount_inc_not_zero() for llc_sap_find()
|
|
possible deadlock in rhashtable_lookup_insert_fast
net
|
4 |
C |
|
|
28 |
2832d |
2835d
|
8/29 |
2821d |
ff93bca76992
ila: make lockdep happy again
|
|
KASAN: use-after-free Write in ip6_hold_safe
net
|
22 |
C |
|
|
25 |
2844d |
2855d
|
8/29 |
2821d |
6d37fa49da1e
l2tp: use sk_dst_check() to avoid race on sk->sk_dst_cache
|
|
KASAN: slab-out-of-bounds Write in eth_header_parse
net
|
21 |
C |
|
|
7 |
2839d |
2852d
|
8/29 |
2821d |
4576cd469d98
packet: refine ring v3 block size test to hold one frame
|
|
WARNING: ODEBUG bug in vsock_stream_connect
net
virt
|
-1 |
C |
|
|
42 |
2841d |
2850d
|
8/29 |
2821d |
455f05ecd2b2
vsock: split dwork to avoid reinitializations
|
|
WARNING in refcount_inc (3)
net
|
-1 |
C |
|
|
7 |
2970d |
2971d
|
8/29 |
2825d |
8e04944f0ea8
mm,vmscan: Allow preallocating memory for register_shrinker().
|
|
kernel BUG at net/ipv6/route.c:LINE!
net
|
-1 |
C |
|
|
197 |
2843d |
2865d
|
8/29 |
2841d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
|
possible deadlock in bond_get_stats
net
|
4 |
C |
|
|
11 |
2847d |
2851d
|
8/29 |
2841d |
7e2556e40026
bonding: avoid lockdep confusion in bond_get_stats()
|
|
WARNING in __ip6_make_skb
net
|
-1 |
C |
|
|
1 |
2865d |
2865d
|
8/29 |
2841d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
|
WARNING in ip6_sk_dst_lookup_flow
net
|
-1 |
C |
|
|
2 |
2846d |
2864d
|
8/29 |
2841d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
|
WARNING in ip6_setup_cork
net
|
-1 |
C |
|
|
4 |
2846d |
2865d
|
8/29 |
2841d |
e873e4b9cc7e
ipv6: use fib6_info_hold_safe() when necessary
|
|
KMSAN: kernel-infoleak in put_cmsg
net
|
9 |
C |
|
|
3 |
2873d |
2863d
|
8/29 |
2841d |
2efd4fca703a
ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull
|
|
KASAN: use-after-free Write in dst_release (2)
net
|
22 |
C |
|
|
3 |
2846d |
2848d
|
8/29 |
2841d |
e6aed040eafb
Revert "net/ipv6: fix metrics leak"
|
|
KMSAN: kernel-infoleak in _copy_to_iter
net
|
9 |
C |
|
|
285 |
2856d |
2892d
|
8/29 |
2841d |
45c180bc29ba
xfrm_user: prevent leaking 2 bytes of kernel memory
|
|
KASAN: slab-out-of-bounds Read in ipv6_gso_pull_exthdrs
net
|
17 |
C |
|
|
4 |
2880d |
2896d
|
8/29 |
2842d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
|
INFO: rcu detected stall in vprintk_emit
net
nfc
|
1 |
syz |
|
|
2 |
2878d |
2885d
|
8/29 |
2842d |
3bc53be9db21
net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL.
|
|
WARNING in set_precision
net
|
-1 |
C |
|
|
140 |
2861d |
2902d
|
8/29 |
2842d |
c604cb767049
KEYS: DNS: fix parsing multiple options
|
|
KASAN: use-after-free Read in ipv6_gso_pull_exthdrs
net
|
19 |
C |
|
|
5 |
2860d |
2892d
|
8/29 |
2842d |
bab2c80e5a6c
nsh: set mac len based on inner packet
|
|
WARNING in iov_iter_revert
net
|
-1 |
C |
|
|
74 |
2862d |
2928d
|
8/29 |
2842d |
32da12216e46
tls: Stricter error checking in zerocopy sendmsg path
|
|
general protection fault in do_tcp_getsockopt
net
|
2 |
C |
|
|
9 |
2861d |
2873d
|
8/29 |
2842d |
6508b6781be0
tcp: cleanup copied_seq and urg_data in tcp_disconnect
|
|
KASAN: use-after-free Read in bpf_test_finish
bpf
net
|
19 |
C |
|
|
1211 |
2857d |
2871d
|
8/29 |
2842d |
6e6fddc78323
bpf: fix panic due to oob in bpf_prog_test_run_skb
|
|
KASAN: use-after-free Write in skb_release_data
net
|
22 |
C |
|
|
1903 |
2916d |
2969d
|
8/29 |
2842d |
993675a3100b
packet: reset network header if packet shorter than ll reserved space
|
|
kernel BUG at net/packet/af_packet.c:LINE! (3)
net
|
-1 |
syz |
|
|
5 |
2992d |
3039d
|
8/29 |
2851d |
a6361f0ca4b2
packet: fix bitfield update race
|
|
KMSAN: uninit-value in ip_tunnel_xmit
net
|
7 |
C |
|
|
2594 |
2863d |
2950d
|
8/29 |
2863d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
|
WARNING: suspicious RCU usage in fib6_info_alloc
net
|
4 |
syz |
|
|
2 |
2953d |
2953d
|
8/29 |
2871d |
27b10608a2fe
net/ipv6: Fix gfp_flags arg to addrconf_prefix_route
|
|
WARNING in bpf_int_jit_compile
bpf
net
|
-1 |
syz |
|
|
11 |
2879d |
2915d
|
8/29 |
2871d |
9facc336876f
bpf: reject any prog that failed read-only lock
|
|
possible deadlock in __might_fault (2)
net
|
4 |
C |
|
|
20 |
2941d |
2944d
|
8/29 |
2871d |
05255b823a61
tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
|
|
KMSAN: uninit-value in _copy_to_iter (2)
kvm
net
virt
|
7 |
C |
|
|
226 |
2903d |
2948d
|
8/29 |
2871d |
670ae9caaca4
vhost: fix info leak due to uninitialized memory
|
|
KASAN: slab-out-of-bounds Read in bpf_csum_update
bpf
net
|
17 |
C |
|
|
2 |
2909d |
2907d
|
8/29 |
2871d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
possible deadlock in tcp_mmap
net
|
4 |
C |
|
|
1908 |
2941d |
2944d
|
8/29 |
2871d |
05255b823a61
tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
|
|
KASAN: use-after-free Write in prb_fill_curr_block
net
|
22 |
C |
|
|
2 |
2909d |
2909d
|
8/29 |
2871d |
eb73190f4fbe
net/packet: refine check for priv area size
|
|
WARNING in skb_warn_bad_offload (2)
net
|
-1 |
C |
|
|
6 |
2943d |
2943d
|
8/29 |
2871d |
a8c744a8b437
udp: disable gso with no_check_tx
|
|
KASAN: slab-out-of-bounds Read in bpf_skb_vlan_push
bpf
net
|
17 |
syz |
|
|
2 |
2897d |
2897d
|
8/29 |
2871d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
KASAN: use-after-free Read in skb_ensure_writable
net
bpf
|
19 |
C |
|
|
4 |
2900d |
2907d
|
8/29 |
2871d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
WARNING: kmalloc bug in xdp_umem_create
net
bpf
|
-1 |
C |
|
|
7 |
2895d |
2901d
|
8/29 |
2871d |
a343993c518c
xsk: silence warning on memory allocation failure
|
|
KASAN: use-after-free Write in tls_push_record
net
|
22 |
C |
|
|
24 |
2871d |
2916d
|
8/29 |
2871d |
a447da7d0041
tls: fix use-after-free in tls_push_record
|
|
WARNING: lock held when returning to user space! (2)
net
|
4 |
C |
|
|
9 |
2931d |
2932d
|
8/29 |
2871d |
9e5750106630
net/ipv6: fix lock imbalance in ip6_route_del()
|
|
INFO: rcu detected stall in corrupted
net
|
1 |
syz |
|
|
1 |
2920d |
2920d
|
8/29 |
2871d |
1d88ba1ebb27
sctp: not allow transport timeout value less than HZ/5 for hb_timer
|
|
BUG: unable to handle kernel NULL pointer dereference in corrupted
net
|
10 |
C |
|
|
5 |
2902d |
2902d
|
8/29 |
2871d |
c0129a061442
smc: convert to ->poll_mask
|
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto
net
bpf
|
17 |
C |
|
|
2 |
2900d |
2900d
|
8/29 |
2871d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
WARNING: possible circular locking dependency detected (4)
net
|
-1 |
C |
|
|
27 |
2944d |
2952d
|
8/29 |
2871d |
05255b823a61
tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive
|
|
KASAN: slab-out-of-bounds Read in ip6_xmit (3)
net
|
17 |
C |
|
|
69 |
2876d |
2919d
|
8/29 |
2871d |
9901c5d77e96
bpf: sockmap, fix crash when ipv6 sock is added
|
|
KASAN: slab-out-of-bounds Read in skb_ensure_writable
bpf
net
|
17 |
C |
|
|
9 |
2897d |
2907d
|
8/29 |
2871d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
KASAN: use-after-free Read in bpf_csum_update
bpf
net
|
19 |
C |
|
|
1 |
2909d |
2907d
|
8/29 |
2871d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
BUG: unable to handle kernel paging request in bpf_int_jit_compile
bpf
net
|
8 |
syz |
|
|
2 |
2883d |
2886d
|
8/29 |
2871d |
85782e037f8a
bpf: undo prog rejection on read-only lock failure
|
|
KASAN: slab-out-of-bounds Write in prb_fill_curr_block
net
|
21 |
C |
|
|
2 |
2909d |
2909d
|
8/29 |
2871d |
eb73190f4fbe
net/packet: refine check for priv area size
|
|
KMSAN: uninit-value in rtnetlink_put_metrics
net
|
7 |
syz |
|
|
3 |
2905d |
2906d
|
8/29 |
2871d |
5b5e7a0de2bb
net: metrics: add proper netlink validation
|
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_head
net
bpf
|
17 |
C |
|
|
2 |
2897d |
2897d
|
8/29 |
2871d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
KASAN: use-after-free Read in ip6_route_mpath_notify
net
|
19 |
C |
|
|
25 |
2904d |
2909d
|
8/29 |
2871d |
f7225172f25a
net/ipv6: prevent use after free in ip6_route_mpath_notify
|
|
KASAN: null-ptr-deref Write in xdp_umem_unaccount_pages
bpf
net
|
12 |
C |
|
|
25 |
2899d |
2903d
|
8/29 |
2871d |
c09290c56376
bpf, xdp: fix crash in xdp_umem_unaccount_pages
|
|
WARNING: suspicious RCU usage in rt6_remove_exception_rt
net
|
4 |
syz |
|
|
1761 |
2946d |
2947d
|
8/29 |
2871d |
091311debcf0
net/ipv6: fix LOCKDEP issue in rt6_remove_exception_rt()
|
|
KASAN: use-after-free Read in skb_dequeue
net
|
19 |
C |
|
|
4 |
2889d |
2889d
|
8/29 |
2871d |
945d015ee0c3
net/packet: fix use-after-free
|
|
KASAN: null-ptr-deref Read in refcount_sub_and_test
net
|
11 |
C |
|
|
4 |
2951d |
2952d
|
8/29 |
2871d |
263243d6c257
net/ipv6: Fix ip6_convert_metrics() bug
|
|
INFO: trying to register non-static key in tun_do_read
net
|
-1 |
C |
|
|
28 |
2927d |
2933d
|
5/29 |
2892d |
7063efd33bb1
tuntap: fix use after free during release
|
|
KASAN: use-after-free Read in iptunnel_handle_offloads
net
|
19 |
C |
|
|
133 |
2917d |
2963d
|
5/29 |
2892d |
9aad13b087ab
packet: fix reserve calculation
|
|
KASAN: use-after-free Read in __dev_queue_xmit (2)
net
|
19 |
C |
|
|
2 |
2921d |
2921d
|
5/29 |
2903d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
|
BUG: soft lockup in _decode_session6
net
|
1 |
C |
|
|
1 |
2929d |
2929d
|
5/29 |
2903d |
d9f92772e8ec
xfrm6: avoid potential infinite loop in _decode_session6()
|
|
kernel BUG at net/ipv4/tcp_output.c:LINE! (2)
net
|
-1 |
syz |
|
|
23 |
2935d |
3040d
|
5/29 |
2903d |
7f582b248d0a
tcp: purge write queue in tcp_connect_init()
|
|
BUG: spinlock bad magic in tun_do_read
net
|
4 |
syz |
|
|
1 |
2933d |
2933d
|
5/29 |
2903d |
b196d88aba8a
tun: fix use after free for ptr_ring
|
|
KASAN: use-after-free Read in skb_copy_datagram_iter
net
|
19 |
C |
|
|
7 |
2939d |
2977d
|
5/29 |
2903d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
|
WARNING in kcm_exit_net (3)
net
|
-1 |
syz |
|
|
5 |
2910d |
2910d
|
5/29 |
2903d |
eb7f54b90bd8
kcm: Fix use-after-free caused by clonned sockets
|
|
KASAN: use-after-free Read in copyout
net
|
19 |
C |
|
|
11 |
2920d |
2977d
|
5/29 |
2903d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
|
WARNING in xfrm6_tunnel_net_exit
net
|
-1 |
syz |
|
|
14002 |
2927d |
3057d
|
5/29 |
2924d |
b48c05ab5d32
xfrm: Fix warning in xfrm6_tunnel_net_exit.
|
|
KASAN: use-after-free Read in tls_sk_proto_close (2)
net
|
19 |
C |
|
|
297 |
2929d |
2936d
|
5/29 |
2924d |
98f0a39529e5
tls: fix use after free in tls_sk_proto_close
|
|
KASAN: slab-out-of-bounds Read in pfkey_add
net
|
17 |
C |
|
|
835 |
2930d |
3076d
|
5/29 |
2924d |
4b66af2d6356
af_key: Always verify length of provided sadb_key
|
|
KMSAN: uninit-value in move_addr_to_user (2)
net
|
7 |
C |
|
|
44 |
2925d |
2932d
|
5/29 |
2924d |
09c8b9718a7a
tipc: fix one byte leak in tipc_sk_set_orig_addr()
|
|
WARNING in tcp_sacktag_write_queue
net
|
-1 |
C |
|
|
8 |
2941d |
3013d
|
5/29 |
2925d |
bf2acc943a45
tcp: fix TCP_REPAIR_QUEUE bound checking
|
|
KMSAN: uninit-value in rt6_multipath_hash
net
|
7 |
C |
|
|
3 |
2926d |
2943d
|
5/29 |
2925d |
cea67a2dd6b2
ipv6: fix uninit-value in ip6_multipath_l3_keys()
|
|
WARNING in tcp_mark_head_lost
net
|
-1 |
C |
|
|
18 |
2934d |
3016d
|
5/29 |
2925d |
16ae6aa17052
net-backports: tcp: ignore Fast Open on repair mode
|
|
KMSAN: uninit-value in put_cmsg
net
|
7 |
C |
|
|
2 |
2939d |
2939d
|
5/29 |
2925d |
eb80ca476ec1
rds: do not leak kernel memory to user land
|
|
KASAN: use-after-free Read in __dev_queue_xmit
net
|
19 |
C |
|
|
10 |
2939d |
3057d
|
5/29 |
2932d |
d0c081b49137
flow_dissector: properly cap thoff field
|
|
KASAN: use-after-free Read in ip6_xmit
net
|
19 |
C |
|
|
5174 |
2979d |
3057d
|
5/29 |
2932d |
c113187d38ff
tls: Use correct sk->sk_prot for IPV6
|
|
KMSAN: uninit-value in inet_getpeer
net
|
7 |
C |
|
|
54 |
2933d |
2962d
|
5/29 |
2933d |
b6a37e5e2541
inetpeer: fix uninit-value in inet_getpeer
|
|
KASAN: stack-out-of-bounds Write in ipip6_tunnel_locate
net
|
21 |
C |
|
|
33 |
2958d |
2966d
|
5/29 |
2933d |
b95211e066fc
ipv6: sit: better validate user provided tunnel names
|
|
KASAN: use-after-free Read in pppol2tp_connect (3)
net
|
19 |
C |
|
|
22 |
2959d |
2977d
|
5/29 |
2933d |
6b9f34239b00
l2tp: fix races in tunnel creation
|
|
KMSAN: uninit-value in move_addr_to_user
net
|
7 |
C |
|
|
74 |
2933d |
2964d
|
5/29 |
2933d |
6780db244d6b
sctp: do not leak kernel memory to user space
|
|
WARNING in strp_done
net
|
-1 |
C |
|
|
2336 |
2967d |
3016d
|
5/29 |
2933d |
dff8baa26117
kcm: Call strp_stop before strp_done in kcm_attach
|
|
KMSAN: uninit-value in __skb_try_recv_from_queue
net
|
7 |
C |
|
|
108 |
2933d |
2964d
|
5/29 |
2933d |
b13dda9f9aa7
net: initialize skb->peeked when cloning
|
|
possible deadlock in rtnl_lock (5)
net
|
4 |
C |
|
|
1009 |
2946d |
2975d
|
5/29 |
2933d |
5c64576a7789
ipvs: fix rtnl_lock lockups caused by start_sync_thread
|
|
KMSAN: uninit-value in fib_create_info
net
|
7 |
C |
|
|
19 |
2958d |
2964d
|
5/29 |
2933d |
b1993a2de12c
net: fix rtnh_ok()
|
|
KASAN: stack-out-of-bounds Write in __ip_tunnel_create
net
|
21 |
C |
|
|
29 |
2960d |
2966d
|
5/29 |
2933d |
9cb726a212a8
ip_tunnel: better validate user provided tunnel names
|
|
KMSAN: uninit-value in tcp_parse_options
net
|
7 |
C |
|
|
38 |
2934d |
2960d
|
5/29 |
2933d |
721230326891
tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
|
|
KASAN: null-ptr-deref Read in refcount_inc_not_zero
net
|
11 |
C |
|
|
2352 |
2947d |
2949d
|
5/29 |
2933d |
3a04ce7130a7
llc: fix NULL pointer deref for SOCK_ZAPPED
|
|
kernel BUG at drivers/vhost/vhost.c:LINE! (2)
virt
kvm
net
|
-1 |
C |
|
|
139 |
2934d |
2965d
|
5/29 |
2933d |
d14d2b78090c
vhost: fix vhost_vq_access_ok() log check
|
|
KMSAN: uninit-value in inet_csk_bind_conflict
net
|
7 |
C |
|
|
446 |
2933d |
2964d
|
5/29 |
2933d |
3099a5291893
soreuseport: initialise timewait reuseport field
|
|
KMSAN: uninit-value in netlink_sendmsg
net
|
7 |
C |
|
|
2493 |
2933d |
2964d
|
5/29 |
2933d |
6091f09c2f79
netlink: fix uninit-value in netlink_sendmsg
|
|
WARNING: kobject bug in netdev_queue_update_kobjects
net
|
-1 |
C |
|
|
27 |
2935d |
2997d
|
5/29 |
2933d |
3e14c6abbfb5
kobject: don't use WARN for registration failures
|
|
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (3)
net
|
-1 |
C |
|
|
234 |
3010d |
3013d
|
5/29 |
2933d |
26736a08ee0f
tipc: don't call sock_release() in atomic context
|
|
KMSAN: uninit-value in netif_skb_features
net
|
7 |
C |
|
|
119 |
2933d |
2959d
|
5/29 |
2933d |
7ce2367254e8
vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
|
|
KMSAN: uninit-value in packet_set_ring
net
|
7 |
C |
|
|
6 |
2939d |
2956d
|
5/29 |
2933d |
5171b37d9596
net: af_packet: fix race in PACKET_{R|T}X_RING
|
|
KMSAN: uninit-value in neigh_dump_info
net
|
7 |
C |
|
|
6 |
2946d |
2960d
|
5/29 |
2933d |
7dd07c143a4b
net: validate attribute sizes in neigh_dump_table()
|
|
KMSAN: uninit-value in inet6_rtm_delroute
net
|
7 |
C |
|
|
9 |
2952d |
2964d
|
5/29 |
2933d |
b1993a2de12c
net: fix rtnh_ok()
|
|
BUG: corrupted list in team_nl_cmd_options_set
net
|
8 |
C |
|
|
2 |
2956d |
2960d
|
5/29 |
2933d |
4fb0534fb7bb
team: avoid adding twice the same option to the event list
|
|
KASAN: use-after-free Write in dst_release
net
|
22 |
C |
|
|
832 |
2959d |
2969d
|
5/29 |
2933d |
bfacfb457b36
pptp: remove a buggy dst release in pptp_connect()
|
|
KASAN: stack-out-of-bounds Write in ip6gre_tunnel_locate
net
|
21 |
C |
|
|
923 |
2958d |
2966d
|
5/29 |
2933d |
5f42df013b8b
ip6_gre: better validate user provided tunnel names
|
|
KMSAN: uninit-value in memcmp
net
|
7 |
C |
|
|
30 |
2935d |
2964d
|
5/29 |
2933d |
77d36398d99f
net: fix uninit-value in __hw_addr_add_ex()
|
|
KMSAN: uninit-value in fib6_new_table
net
|
7 |
C |
|
|
3 |
2949d |
2950d
|
5/29 |
2933d |
aa8f8778493c
ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
|
|
KMSAN: uninit-value in strlcpy
net
|
7 |
C |
|
|
2 |
2935d |
2935d
|
5/29 |
2933d |
537b361fbcbc
vti6: better validate user provided tunnel names
|
|
KMSAN: uninit-value in pppol2tp_connect
net
|
7 |
C |
|
|
13 |
2933d |
2948d
|
5/29 |
2933d |
eb1c28c05894
l2tp: check sockaddr length in pppol2tp_connect()
|
|
KASAN: slab-out-of-bounds Write in tcp_v6_syn_recv_sock
net
|
21 |
C |
|
|
1063 |
3041d |
3059d
|
5/29 |
2947d |
d91c3e17f75f
net/tls: Only attach to sockets in ESTABLISHED state
|
|
KASAN: use-after-free Read in perf_trace_lock_acquire (2)
kvm
net
virt
|
19 |
C |
|
|
188 |
3028d |
3100d
|
5/29 |
2947d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
WARNING in skb_warn_bad_offload
net
|
-1 |
C |
|
|
6527 |
2997d |
3121d
|
5/29 |
2962d |
8d74e9f88d65
net: avoid skb_warn_bad_offload on IS_ERR
|
|
BUG: unable to handle kernel (2)
net
|
-1 |
syz |
|
|
1 |
2975d |
2975d
|
5/29 |
2965d |
c769accdf3d8
vlan: Fix vlan insertion for packets without ethernet header
|
|
BUG: unable to handle kernel paging request in netdev_queue_update_kobjects
net
|
8 |
syz |
|
|
1 |
2975d |
2975d
|
5/29 |
2965d |
c769accdf3d8
vlan: Fix vlan insertion for packets without ethernet header
|
|
possible deadlock in handle_rx
virt
kvm
net
|
4 |
C |
|
|
4 |
2977d |
2977d
|
5/29 |
2965d |
aaa3149bbee9
vhost_net: add missing lock nesting notation
|
|
kernel BUG at ./include/linux/skbuff.h:LINE! (2)
net
|
-1 |
C |
|
|
5 |
3002d |
2980d
|
5/29 |
2965d |
10b8a3de603d
ipv6: the entire IPv6 header chain must fit the first fragment
|
|
BUG: corrupted list in remove_wait_queue
virt
kvm
net
|
8 |
C |
|
|
5 |
2978d |
2981d
|
5/29 |
2965d |
dc6455a71c7f
vhost: correctly remove wait queue during poll failure
|
|
KASAN: use-after-free Read in worker_thread (2)
net
|
19 |
syz |
|
|
6 |
3105d |
3114d
|
5/29 |
2965d |
581e7226a5d4
kcm: Only allow TCP sockets to be attached to a KCM mux
|
|
kernel BUG at drivers/vhost/vhost.c:LINE!
kvm
net
virt
|
-1 |
C |
|
|
152 |
2965d |
2983d
|
5/29 |
2965d |
d65026c6c62e
vhost: validate log when IOTLB is enabled
|
|
WARNING: kmalloc bug in xfrm_add_sa
net
|
-1 |
C |
|
|
109 |
2979d |
3018d
|
4/29 |
2979d |
d97ca5d714a5
xfrm_user: uncoditionally validate esn replay attribute struct
|
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock
net
|
21 |
C |
|
|
4 |
2996d |
2996d
|
4/29 |
2979d |
17cfe79a65f9
l2tp: do not accept arbitrary sockets
|
|
KASAN: use-after-free Read in pfifo_fast_enqueue
net
|
19 |
C |
|
|
20 |
2981d |
3045d
|
4/29 |
2979d |
cce6294cc2ea
net: sched: fix uses after free
|
|
general protection fault in dccp_write_xmit
net
|
2 |
C |
|
|
5 |
2996d |
3032d
|
4/29 |
2979d |
67f93df79aee
dccp: check sk for closed state in dccp_sendmsg()
|
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (4)
net
|
17 |
C |
|
|
102 |
2979d |
3030d
|
4/29 |
2979d |
19d7df69fdb2
xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems
|
|
KASAN: slab-out-of-bounds Read in ip6_xmit (2)
net
|
17 |
C |
|
|
259 |
2982d |
2995d
|
4/29 |
2979d |
b954f94023dc
l2tp: fix races with ipv4-mapped ipv6 addresses
|
|
KASAN: use-after-free Read in pppol2tp_connect (2)
net
|
19 |
C |
|
|
10 |
2979d |
2995d
|
4/29 |
2979d |
17cfe79a65f9
l2tp: do not accept arbitrary sockets
|
|
KASAN: use-after-free Read in strp_data_ready
net
|
19 |
C |
|
|
204 |
3036d |
3129d
|
4/29 |
2990d |
581e7226a5d4
kcm: Only allow TCP sockets to be attached to a KCM mux
|
|
general protection fault in pppol2tp_connect
net
|
2 |
C |
|
|
1025 |
2996d |
3045d
|
4/29 |
2996d |
28f5bfb81919
l2tp: fix tunnel lookup use-after-free race
|
|
KASAN: use-after-free Read in inet_shutdown
net
|
19 |
C |
|
|
22 |
2998d |
3045d
|
4/29 |
2996d |
28f5bfb81919
l2tp: fix tunnel lookup use-after-free race
|
|
KASAN: use-after-free Read in pppol2tp_connect
net
|
19 |
C |
|
|
25 |
2996d |
3045d
|
4/29 |
2996d |
28f5bfb81919
l2tp: fix tunnel lookup use-after-free race
|
|
WARNING in debug_print_object
net
|
-1 |
C |
|
|
2 |
3029d |
3029d
|
4/29 |
2996d |
28f5bfb81919
l2tp: fix tunnel lookup use-after-free race
|
|
KASAN: slab-out-of-bounds Read in ip6_xmit
net
|
17 |
C |
|
|
156 |
2997d |
3048d
|
4/29 |
2996d |
c113187d38ff
tls: Use correct sk->sk_prot for IPV6
|
|
possible deadlock in rtnl_lock (4)
net
|
4 |
C |
|
|
73333 |
3006d |
3023d
|
4/29 |
3004d |
01ea306f2ac2
netfilter: drop outermost socket lock in getsockopt()
|
|
WARNING in kmalloc_slab (3)
net
|
-1 |
C |
|
|
1901 |
3005d |
3089d
|
4/29 |
3004d |
88913bd8ea2a
kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE
|
|
WARNING in kvmalloc_node
net
bpf
|
-1 |
C |
|
|
513 |
3011d |
3017d
|
4/29 |
3004d |
7fc17e909edf
bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
|
|
WARNING: kmalloc bug in cpu_map_update_elem
bpf
net
|
-1 |
C |
|
|
2677 |
3004d |
3015d
|
4/29 |
3004d |
7fc17e909edf
bpf: cpumap: use GFP_KERNEL instead of GFP_ATOMIC in __cpu_map_entry_alloc()
|
|
WARNING: kmalloc bug in tun_device_event
net
|
-1 |
C |
|
|
15 |
3021d |
3024d
|
4/29 |
3018d |
6e6e41c31122
ptr_ring: fail early if queue occupies more than KMALLOC_MAX_SIZE
0bf7800f1799
ptr_ring: try vmalloc() when kmalloc() fails
|
|
possible deadlock in rtnl_lock (3)
net
|
4 |
C |
|
|
3633 |
3023d |
3024d
|
4/29 |
3023d |
3f34cfae1238
netfilter: on sockopt() acquire sock lock only in the required scope
|
|
WARNING: bad unlock balance in ipmr_mfc_seq_stop
net
|
4 |
C |
|
|
286 |
3030d |
3076d
|
4/29 |
3024d |
4adfa79fc254
ip6mr: fix stale iterator
|
|
WARNING in reuseport_add_sock
net
|
-1 |
C |
|
|
7 |
3038d |
3049d
|
4/29 |
3026d |
4db428a7c9ab
soreuseport: fix mem leak in reuseport_add_sock()
|
|
suspicious RCU usage at ./include/linux/inetdevice.h:LINE (2)
net
|
-1 |
C |
|
|
4 |
3029d |
3029d
|
4/29 |
3026d |
e7aadb27a541
net: igmp: add a missing rcu locking section
|
|
possible deadlock in rtnl_lock (2)
net
|
4 |
C |
|
|
10369 |
3026d |
3029d
|
4/29 |
3026d |
3f34cfae1238
netfilter: on sockopt() acquire sock lock only in the required scope
|
|
INFO: trying to register non-static key in pfifo_fast_reset
net
|
-1 |
C |
|
|
4 |
3073d |
3075d
|
4/29 |
3026d |
1df94c3c5dad
net_sched: properly check for empty skb array on error path
|
|
suspicious RCU usage at net/ipv6/ip6_fib.c:LINE
net
|
-1 |
C |
|
|
56 |
3036d |
3059d
|
4/29 |
3028d |
4512c43eac7e
ipv6: remove null_entry before adding default route
|
|
KASAN: double-free or invalid-free in skb_free_head
net
virt
|
24 |
C |
|
|
13 |
3068d |
3074d
|
4/29 |
3029d |
d76c68109f37
crypto: pcrypt - fix freeing pcrypt instances
|
|
general protection fault in __netlink_ns_capable
net
|
2 |
C |
|
|
74 |
3052d |
3059d
|
4/29 |
3029d |
f428fe4a04cc
rtnetlink: give a user socket to get_target_net()
|
|
KASAN: use-after-free Read in __xfrm_state_lookup
net
|
19 |
C |
|
|
7 |
3122d |
3121d
|
4/29 |
3029d |
cb79a180f2e7
xfrm: defer daddr pointer assignment after spi parsing
|
|
general protection fault in tun_queue_purge
net
|
2 |
C |
|
|
4 |
3035d |
3037d
|
4/29 |
3029d |
9fb582b67072
Revert "net: ptr_ring: otherwise safe empty checks can overrun array bounds"
|
|
WARNING in vhost_dev_cleanup
net
virt
kvm
|
-1 |
C |
|
|
4 |
3031d |
3036d
|
4/29 |
3029d |
4cd879515d68
vhost_net: stop device during reset owner
|
|
general protection fault in fib6_add (2)
net
|
2 |
C |
|
|
3143 |
3052d |
3059d
|
4/29 |
3029d |
7bbfe00e0252
ipv6: fix general protection fault in fib6_add()
|
|
KASAN: slab-out-of-bounds Read in xfrm_hash_rebuild
net
|
17 |
C |
|
|
18 |
3047d |
3115d
|
4/29 |
3029d |
862591bf4f51
xfrm: skip policies marked as dead while rehashing
|
|
inconsistent lock state in est_fetch_counters
net
|
4 |
C |
|
|
5829 |
3029d |
3034d
|
4/29 |
3029d |
40ca54e3a686
net_sched: gen_estimator: fix lockdep splat
|
|
KASAN: use-after-free Read in erspan_xmit
net
|
19 |
C |
|
|
68 |
3036d |
3039d
|
4/29 |
3029d |
b423d13c08a6
net: erspan: fix use-after-free
|
|
KASAN: use-after-free Read in erspan_build_header
net
|
19 |
C |
|
|
60 |
3029d |
3039d
|
4/29 |
3029d |
b423d13c08a6
net: erspan: fix use-after-free
|
|
KASAN: slab-out-of-bounds Read in erspan_build_header
net
|
17 |
C |
|
|
30 |
3030d |
3038d
|
4/29 |
3029d |
b423d13c08a6
net: erspan: fix use-after-free
|
|
KASAN: slab-out-of-bounds Read in erspan_xmit
net
|
17 |
C |
|
|
51 |
3036d |
3039d
|
4/29 |
3029d |
b423d13c08a6
net: erspan: fix use-after-free
|
|
WARNING in xdp_rxq_info_unreg
bpf
net
|
-1 |
C |
|
|
198 |
3038d |
3039d
|
4/29 |
3029d |
c13da21cdb80
tun: avoid calling xdp_rxq_info_unreg() twice
|
|
possible deadlock in rtnl_lock
net
|
4 |
C |
|
|
15711 |
3029d |
3086d
|
4/29 |
3029d |
124da8f6118b
tuntap: fix possible deadlock when fail to register netdev
|
|
WARNING in xfrm_state_fini
net
|
-1 |
C |
|
|
2231 |
3046d |
3101d
|
4/29 |
3031d |
6a53b7593233
xfrm: check id proto in validate_tmpl()
|
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (3)
net
|
17 |
C |
|
|
10353 |
3035d |
3102d
|
4/29 |
3031d |
732706afe1cc
xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.
|
|
possible deadlock in vhost_chr_write_iter
kvm
net
virt
|
4 |
C |
|
|
25952 |
3036d |
3039d
|
4/29 |
3032d |
e9cb4239134c
vhost: use mutex_lock_nested() in vhost_dev_lock_vqs()
|
|
KASAN: slab-out-of-bounds Read in __dev_queue_xmit
net
|
17 |
C |
|
|
6 |
3054d |
3043d
|
4/29 |
3032d |
7c68d1a6b4db
net: qdisc_pkt_len_init() should be more robust
|
|
kernel BUG at net/l2tp/l2tp_ppp.c:LINE!
net
|
-1 |
C |
|
|
22 |
3036d |
3058d
|
4/29 |
3032d |
e5571240236c
kcm: Check if sk_user_data already set in kcm_attach
|
|
kernel BUG at net/core/skbuff.c:LINE! (2)
net
|
-1 |
C |
|
|
562 |
3034d |
3123d
|
4/29 |
3032d |
02612bb05e51
pppoe: take ->needed_headroom of lower device into account on xmit
|
|
KASAN: use-after-free Read in psock_write_space
net
|
19 |
C |
|
|
6 |
3041d |
3052d
|
4/29 |
3032d |
581e7226a5d4
kcm: Only allow TCP sockets to be attached to a KCM mux
|
|
KASAN: use-after-free Read in fib6_add_1
net
|
19 |
C |
|
|
4 |
3046d |
3048d
|
4/29 |
3036d |
591ff9ea51ce
net-backports: ipv6: don't let tb6_root node share routes with other node
|
|
WARNING in netlink_ack (2)
net
|
-1 |
C |
|
|
6 |
3051d |
3051d
|
4/29 |
3039d |
cbbdf8433a5f
netlink: extack needs to be reset each time through loop
|
|
suspicious RCU usage at ./include/linux/rcupdate.h:LINE (2)
net
|
-1 |
C |
|
|
174 |
3040d |
3120d
|
4/29 |
3039d |
2f10a61cee8f
xfrm: fix rcu usage in xfrm_get_type_offload
|
|
KASAN: use-after-free Read in tls_sk_proto_close
net
|
19 |
C |
|
|
9 |
3044d |
3052d
|
4/29 |
3039d |
d91c3e17f75f
net/tls: Only attach to sockets in ESTABLISHED state
|
|
general protection fault in strlen
net
|
2 |
C |
|
|
53 |
3041d |
3043d
|
4/29 |
3039d |
cd443f1e91ca
netlink: reset extack earlier in netlink_rcv_skb
|
|
kernel BUG at ./include/linux/skbuff.h:LINE!
net
|
-1 |
C |
|
|
4502 |
3044d |
3057d
|
4/29 |
3039d |
374d1b5a81f7
esp: Fix GRO when the headers not fully in the linear part of the skb.
|
|
KASAN: stack-out-of-bounds Read in __nla_put
net
|
17 |
C |
|
|
57 |
3041d |
3045d
|
4/29 |
3039d |
cd443f1e91ca
netlink: reset extack earlier in netlink_rcv_skb
|
|
KASAN: use-after-free Read in fib6_ifup (2)
net
|
19 |
C |
|
|
18 |
3046d |
3042d
|
4/29 |
3039d |
591ff9ea51ce
ipv6: don't let tb6_root node share routes with other node
|
|
KASAN: use-after-free Read in fib6_ifdown
net
|
19 |
C |
|
|
26 |
3046d |
3050d
|
3/29 |
3043d |
4512c43eac7e
ipv6: remove null_entry before adding default route
|
|
WARNING in strp_data_ready
net
|
-1 |
C |
|
|
59034 |
3059d |
3129d
|
3/29 |
3044d |
d66fa9ec53c4
strparser: Call sock_owned_by_user_nocheck
|
|
WARNING in netlink_ack
net
|
-1 |
C |
|
|
6 |
3069d |
3070d
|
3/29 |
3065d |
48044eb490be
netlink: fix netlink_ack() extack race
|
|
kernel BUG at net/core/dev.c:LINE!
net
|
-1 |
C |
|
|
5 |
3096d |
3100d
|
3/29 |
3084d |
15fe076edea7
net-backports: net/packet: fix a race in packet_bind() and packet_notifier()
|
|
BUG: unable to handle kernel paging request in vsock_diag_dump
net
virt
|
8 |
C |
|
|
6 |
3126d |
3129d
|
3/29 |
3094d |
c1eef220c176
vsock: always call vsock_init_tables()
|
|
KASAN: use-after-free Read in free_netdev
net
|
19 |
C |
|
|
42 |
3112d |
3135d
|
3/29 |
3094d |
aec72f3392b1
net-tun: fix panics at dismantle time
|
|
WARNING in tun_get_user
net
|
-1 |
C |
|
|
17398 |
3111d |
3136d
|
3/29 |
3094d |
010f245b9dd7
net-backports: tun: relax check on eth_get_headlen() return value
|
|
KASAN: use-after-free Write in detach_if_pending
net
|
22 |
C |
|
|
4169 |
3131d |
3126d
|
3/29 |
3094d |
ee74d9967b82
tun: do not arm flow_gc_timer in tun_flow_init()
|
|
WARNING in fib6_add
net
|
-1 |
C |
|
|
8225 |
3112d |
3135d
|
3/29 |
3094d |
2ea2352ede9d
ipv6: prevent user from adding cached routes
|
|
INFO: trying to register non-static key. (2)
net
|
-1 |
C |
|
|
8624 |
3113d |
3115d
|
3/29 |
3094d |
9eba9353388d
tcp: fix a lockdep issue in tcp_fastopen_reset_cipher()
|
|
KASAN: stack-out-of-bounds Read in xfrm_state_find (2)
net
|
17 |
C |
|
|
93 |
3112d |
3121d
|
3/29 |
3104d |
c9f3f813d462
xfrm: Fix stack-out-of-bounds read in xfrm_state_find.
|
|
WARNING in reuseport_alloc
net
|
-1 |
C |
|
|
408 |
3112d |
3135d
|
3/29 |
3111d |
1b5f962e71bf
soreuseport: fix initialization race
|
|
INFO: rcu detected stall (2)
net
|
-1 |
C |
|
|
56 |
3111d |
3123d
|
3/29 |
3111d |
93161922c658
net-backports: tun/tap: sanitize TUNSETSNDBUF input
|
|
KASAN: use-after-free Read in packet_getsockopt (2)
net
|
19 |
syz |
|
|
12 |
3125d |
3134d
|
3/29 |
3111d |
509c7a1ecc86
packet: avoid panic in packet_getsockopt()
|
|
WARNING in kmalloc_slab
net
|
-1 |
C |
|
|
22353 |
3129d |
3202d
|
3/29 |
3129d |
81fbfe8adaf3
ptr_ring: use kmalloc_array()
|