syzbot


Applied filters: Label=subsystems:can (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KCSAN: data-race in can_send / can_send (5) can 56 90d 100d 28/28 6d23h 80b5f90158d1 can: statistics: use atomic access in hot path
WARNING in ucan_probe can C done 143 89d 120d 28/28 6d23h 1d22a122ffb1 can: ucan: fix out of bound read in strscpy() source
WARNING: refcount bug in sk_skb_reason_drop can C done 8107 190d 256d 28/28 42d a8c695005bfe can: j1939: j1939_session_new(): fix skb reference counting
WARNING in remove_proc_entry (6) can C done 377 256d 286d 28/28 238d 94b0818fa635 can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().
INFO: task hung in cangw_pernet_exit_batch (3) can 33 343d 359d 26/28 342d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
KMSAN: kernel-infoleak in raw_recvmsg can C 121 368d 417d 26/28 342d b7cdf1dd5d2a net: can: j1939: Initialize unused data in j1939_send_one()
possible deadlock in j1939_sk_queue_drop_all can C error done 281 505d 1378d 25/28 447d 6cdedc18ba7b can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
possible deadlock in j1939_sk_errqueue (2) can C done 24 487d 714d 25/28 447d 6cdedc18ba7b can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
possible deadlock in j1939_session_activate can C done done 67 499d 1334d 25/28 447d 6cdedc18ba7b can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
KASAN: use-after-free Read in raw_release can 1 685d 685d 23/28 614d 11c9027c983e can: raw: fix lockdep issue in raw_release()
possible deadlock in raw_bind can 4535 686d 699d 23/28 614d 11c9027c983e can: raw: fix lockdep issue in raw_release()
KASAN: use-after-free Write in j1939_sock_pending_del can syz done error 17 2039d 2051d 23/28 677d fd81ebfe7975 can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
WARNING in j1939_session_deactivate_activate_next can C error done 502 805d 1210d 22/28 740d d0553680f94c can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
possible deadlock in j1939_sk_errqueue can C unreliable 227 811d 1348d 22/28 740d d1366b283d94 can: j1939: prevent deadlock by moving j1939_sk_errqueue()
KMSAN: uninit-value in can_send can C 630 939d 956d 22/28 844d 3eb3d283e857 can: j1939: j1939_send_one(): fix missing CAN header initialization
WARNING in netif_rx can 2 1210d 1210d 22/28 844d 167053f8dd0e net: Correct wrong BH disable in hard-interrupt.
memory leak in gs_usb_probe can usb C 1 1180d 1176d 22/28 844d 50d34a0d151d can: gs_usb: gs_make_candev(): fix memory leak for devices with extended bit timing configuration
WARNING in mcba_usb_probe/usb_submit_urb usb can C error 537 1174d 2169d 22/28 844d 136bed0bfd3b can: mcba_usb: properly check endpoint type
WARNING in isotp_tx_timer_handler (2) can C 1416 870d 1192d 22/28 844d 3ea566422cbd can: isotp: sanitize CAN ID checks in isotp_bind() d73497081710 can: isotp: stop timeout monitoring when no first frame was sent
BUG: unable to handle kernel paging request in can_rcv_filter can C 5 926d 923d 22/28 844d 0acc442309a0 can: af_can: fix NULL pointer dereference in can_rcv_filter
WARNING: refcount bug in j1939_netdev_start (2) can syz error error 51 1335d 1982d 20/28 1196d d9d52a3ebd28 can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
WARNING in isotp_tx_timer_handler can C error 1553 1197d 1639d 20/28 1196d 9acf636215a6 can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
memory leak in pcan_usb_fd_init usb can C 19 1579d 1648d 20/28 1315d a0b96b4a6274 drivers: net: fix memory leak in peak_usb_create_dev
WARNING: ODEBUG bug in __sk_destruct (2) can C done done 62 1325d 1522d 20/28 1315d 14a4696bc311 can: isotp: isotp_release(): omit unintended hrtimer restart on socket release
KASAN: use-after-free Read in bcm_rx_handler can syz done 2 1467d 1497d 20/28 1315d d5f9023fa61e can: bcm: delay release of struct bcm_op after synchronize_rcu()
KASAN: use-after-free Write in j1939_can_recv can 2 1544d 1578d 20/28 1315d 22c696fed25c can: j1939: j1939_sk_init(): set SOCK_RCU_FREE to call sk_destruct() after RCU is done
KASAN: use-after-free Read in j1939_xtp_rx_dat_one (2) can 3 1429d 1492d 20/28 1315d 2030043e616c can: j1939: fix Use-after-Free, hold skb ref while in use
INFO: task hung in register_netdevice_notifier (2) can wireless syz done 10555 1459d 2064d 20/28 1315d 8d0caedb7596 can: bcm/raw/isotp: use per module netdevice notifier
INFO: task hung in unregister_netdevice_notifier (3) can syz error error 184 2127d 2312d 20/28 1315d 8d0caedb7596 can: bcm/raw/isotp: use per module netdevice notifier
general protection fault in j1939_netdev_notify (2) can C done 19 1582d 1640d 20/28 1529d 4e096a18867a net: introduce CAN specific pointer in the struct net_device
BUG: receive list entry not found for dev vxcan1, id 003, mask C00007FF can C unreliable 2 1665d 1664d 19/28 1560d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
BUG: receive list entry not found for dev vcan0, id 002, mask C00007FF can C unreliable 5 1664d 1664d 19/28 1560d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
BUG: receive list entry not found for dev vcan0, id 001, mask C00007FF can C unreliable 5 1667d 1667d 19/28 1560d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
KMSAN: uninit-value in number (2) can C 168 1561d 1940d 19/28 1560d c8c958a58fc6 can: af_can: prevent potential access of uninitialized member in can_rcv() 9aa9379d8f86 can: af_can: prevent potential access of uninitialized member in canfd_rcv()
BUG: receive list entry not found for dev vxcan1, id 002, mask C00007FF can C unreliable 3 1665d 1667d 19/28 1560d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
KMSAN: uninit-value in can_receive (2) can C 2060 1678d 1772d 15/28 1674d e009f95b1543 can: j1935: j1939_tp_tx_dat_new(): fix missing initialization of skbcnt
KASAN: use-after-free Read in j1939_tp_txtimer can C done error 5 1801d 1999d 15/28 1734d cd3b3636c99f can: j1939: transport: j1939_session_tx_dat(): fix use-after-free read in j1939_tp_txtimer()
general protection fault in j1939_netdev_start can C done 8 1787d 1938d 15/28 1734d af804b782635 can: j1939: socket: j1939_sk_bind(): make sure ml_priv is allocated
KASAN: use-after-free Read in raw_notifier can 3 1947d 1948d 15/28 1888d 44bfa9c5e5f0 net: rtnetlink: fix bugs in rtnl_alt_ifname()
KASAN: use-after-free Read in vsscanf can 2 1945d 1947d 15/28 1888d e08ad80551b4 net: add strict checks in netdev_name_node_alt_destroy()
KASAN: use-after-free Read in slcan_open can C done 2 2025d 2023d 15/28 1923d 9ebd796e2400 can: slcan: Fix use-after-free Read in slcan_open
KMSAN: uninit-value in can_receive can C 14 1949d 2037d 15/28 1946d e7153bf70c34 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
KASAN: null-ptr-deref Write in queue_work_on can C done error 5 2130d 2126d 15/28 1946d 0ace17d56824 can, slip: Protect tty->disc_data in write_wakeup and close with RCU
general protection fault in j1939_jsk_del (2) can syz 21 2009d 2026d 15/28 1950d 00d4e14d2e4c can: j1939: j1939_sk_bind(): take priv after lock is held
KASAN: use-after-free Read in j1939_xtp_rx_abort_one can C done done 11 2044d 2051d 15/28 1976d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
general protection fault in j1939_netdev_notify can syz done 11 2039d 2051d 14/28 2026d c48c8c1e2e81 can: j1939: main: j1939_ndev_to_priv(): avoid crash if can_ml_priv is NULL
KASAN: use-after-free Read in j1939_sk_recv can C done 2 2045d 2045d 14/28 2026d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
KASAN: use-after-free Read in j1939_session_deactivate can syz done 1 2048d 2047d 14/28 2026d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
KASAN: use-after-free Read in j1939_session_get_by_addr_locked can C done 1 2045d 2045d 14/28 2026d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
WARNING: refcount bug in j1939_netdev_start can syz done 6 2029d 2050d 14/28 2026d fd81ebfe7975 can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
KASAN: use-after-free Read in mcba_usb_disconnect can usb C 2 2054d 2086d 14/28 2026d 4d6636498c41 can: mcba_usb: fix use-after-free on disconnect
memory leak in raw_sendmsg can C 2 2193d 2205d 12/28 2168d fd704bd5ee74 can: purge socket error queue on sock destruct
INFO: task hung in unregister_netdevice_notifier (2) can 1 2450d 2450d 11/28 2441d 0e1d6eca5113 rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
INFO: task hung in rollback_registered_many can 4 2444d 2451d 11/28 2441d 0e1d6eca5113 rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
WARNING in can_rcv can C 5 2709d 2708d 4/28 2703d 8cb68751c115 can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once
WARNING in canfd_rcv can C 4 2710d 2708d 4/28 2703d d4689846881d can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once