syzbot


Instances [tested repos]:
Name Last active Uptime Corpus Coverage 🛈 Crashes Execs Kernel build syzkaller build Bugs
Commit Config Freshness Status Commit Freshness Status All Only
ci-qemu-upstream-386 now 6h55m 46110 631775 184 306438 5cdb2c77c4c3 .config 13h11m fa44301a 7h10m all only
Applied filters: Manager=ci-qemu-upstream-386 (drop) Label=subsystems:net (drop)
open (37):
Title Repro Cause bisect Fix bisect Count Last Reported Discussions
KASAN: slab-use-after-free Read in fib6_add net 7 48m 2d02h
general protection fault in ip6_ins_rt net 1 7d23h 3d19h
KASAN: global-out-of-bounds Read in in_dev_finish_destroy net 7 3d07h 10d
KASAN: global-out-of-bounds Read in fib6_ifup net 10 1d10h 18d
KASAN: global-out-of-bounds Read in fib6_ifdown (2) net syz 27 1d23h 19d
KASAN: global-out-of-bounds Read in __find_rr_leaf (2) net 7 8d18h 21d
WARNING: suspicious RCU usage in __fib6_update_sernum_upto_root net 11 7d02h 21d 💬 1 [21d]
possible deadlock in team_vlan_rx_kill_vid net 107 35d 45d
general protection fault in addrconf_add_ifaddr net C done error 21081 38d 45d PATCH [45d]
BUG: sleeping function called from invalid context in dev_set_allmulti net 3332 4h34m 72d
general protection fault in __fib6_drop_pcpu_from (6) net 228 7d13h 107d
KASAN: slab-use-after-free Read in sock_def_readable bluetooth net 3 99d 115d
BUG: Bad page state in skb_pp_cow_data net C done 34 6h50m 164d 💬 2 [162d]
BUG: unable to handle kernel paging request in dst_dev_put (2) net syz 1545 8h47m 169d
possible deadlock in sockopt_lock_sock net C 3397 35d 280d
WARNING: suspicious RCU usage in dev_deactivate_queue net C error 7829 10d 309d 💬 1 [10d]
BUG: sleeping function called from invalid context in synchronize_net net C done 54 114d 315d 💬 2 [306d]
possible deadlock in do_ip_getsockopt (3) net 1131 35d 316d
possible deadlock in do_ipv6_setsockopt (4) net C error 3730 27d 316d 💬 1 [43d]
possible deadlock in ip_mroute_setsockopt net C done 3119 35d 316d
possible deadlock in ip_mc_drop_socket (2) net 174 36d 318d
WARNING: suspicious RCU usage in dev_activate net C error 789 8d11h 323d PATCH [307d]
possible deadlock in do_ip_setsockopt (4) net C done 12508 27d 330d PATCH [242d]
WARNING in dev_deactivate_many net C 213 2d04h 332d
UBSAN: array-index-out-of-bounds in llc_conn_state_process (2) net 19 3d18h 353d 💬 1 [13d]
possible deadlock in team_device_event (3) net C error 8769 28m 378d PATCH [292d]
possible deadlock in team_del_slave (3) net C error 341685 now 391d PATCH [1d04h]
possible deadlock in hsr_dev_xmit (2) net C done 854 4d10h 420d 💬 2 [382d]
KASAN: slab-use-after-free Read in __ethtool_get_link_ksettings net syz done 7460 now 426d PATCH [409d]
KASAN: slab-use-after-free Read in handle_tx (2) net C 367 3d00h 456d 💬 2 [124d]
WARNING in inet_sock_destruct (4) net C done 6454 57m 699d 💬 4 [10d]
unregister_netdevice: waiting for DEV to become free (8) net C done 318609 5m 713d PATCH [465d]
WARNING in ip_rt_bug (2) net C done error 364 1d21h 953d 💬 3 [329d]
BUG: MAX_LOCKDEP_KEYS too low! (2) no-reminders net C unreliable 5118 47m 1464d PATCH [701d]
general protection fault in skb_release_data (2) net bluetooth C done error 703 52d 1716d
possible deadlock in __dev_queue_xmit (3) net C done inconclusive 1023 4d09h 1997d 💬 5 [325d]
WARNING in rcu_check_gp_start_stall net C done error 2555 1d16h 2281d 💬 7 [199d]