syzbot


Applied filters: Label=subsystems:wireguard (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
INFO: task hung in wg_netns_pre_exit (5) wireguard 1 C done 397 5d09h 571d 25/29 never 60a25ef8dacb wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit
general protection fault in veth_xdp_rcv wireguard 2 12 316d 321d 29/29 256d 9337c54401a5 veth: prevent NULL pointer dereference in veth_xdp_rcv
WARNING in kthread_unpark (2) wireguard gfs2 -1 syz done 35 561d 708d 28/29 523d 214e01ad4ed7 kthread: unpark only parked kthread
INFO: task hung in wg_netns_pre_exit (4) wireguard 1 127 650d 689d 26/29 649d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
INFO: task hung in wg_destruct wireguard 1 207 652d 691d 26/29 649d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll (2) wireguard 6 721 759d 1531d 25/29 740d bba045dc4d99 wireguard: receive: annotate data-race around receiving_counter.counter
KCSAN: data-race in wg_xmit / wg_xmit (4) wireguard 6 1 892d 886d 25/29 819d 93da8d75a665 wireguard: use DEV_STATS_INC()
KMSAN: uninit-value in __netif_receive_skb_core wireguard wireless 19 C done 353 960d 2929d 23/29 920d dc644b540a2d tcx: Fix splat in ingress_destroy upon tcx_entry_free
net-next test error: WARNING in __napi_schedule wireguard -1 110 1490d 1493d 22/29 1150d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
linux-next test error: WARNING in set_peer wireguard -1 39 1307d 1314d 22/29 1150d 26c013108c12 wireguard: netlink: avoid variable-sized memcpy on sockaddr
linux-next test error: WARNING in __napi_schedule wireguard -1 15 1493d 1492d 22/29 1150d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
kernel panic: corrupted stack end in cleanup_net wireguard 2 2 1208d 1427d 22/29 1150d b81d591386c3 riscv: Increase stack size under KASAN
WARNING: suspicious RCU usage in wg_ratelimiter_gc_entries wireguard 4 5 1772d 1847d 20/29 1622d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in wg_index_hashtable_replace wireguard 2 2 2039d 2050d 15/29 2018d 9179ba31367b wireguard: noise: take lock when removing handshake entry from table
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu wireguard 17 1 2120d 2120d 15/29 2099d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu wireguard 19 C error 17 2109d 2120d 15/29 2099d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name wireguard 19 C 4 2114d 2120d 15/29 2099d bf64ff4c2aac genetlink: get rid of family->attrbuf
divide error in wg_packet_encrypt_worker wireguard 2 C done 12 2249d 2256d 15/29 2195d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
divide error in encrypt_packet wireguard 2 C done 89 2248d 2257d 15/29 2195d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
possible deadlock in wg_noise_handshake_create_initiation wireguard 4 C done 11 2263d 2267d 15/29 2230d ec31c2676a10 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in root_remove_peer_lists wireguard 19 C done 2 2269d 2269d 15/29 2252d 9981159fc3b6 wireguard: allowedips: fix use-after-free in root_remove_peer_lists