syzbot


Applied filters: Label=subsystems:wireguard (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KCSAN: data-race in wg_xmit / wg_xmit (4) wireguard 1 108d 103d 25/26 35d 93da8d75a665 wireguard: use DEV_STATS_INC()
KMSAN: uninit-value in __netif_receive_skb_core wireguard wireless C done 353 176d 2146d 23/26 136d dc644b540a2d tcx: Fix splat in ingress_destroy upon tcx_entry_free
net-next test error: WARNING in __napi_schedule wireguard 110 706d 709d 22/26 366d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
linux-next test error: WARNING in set_peer wireguard 39 523d 530d 22/26 366d 26c013108c12 wireguard: netlink: avoid variable-sized memcpy on sockaddr
linux-next test error: WARNING in __napi_schedule wireguard 15 710d 709d 22/26 366d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
kernel panic: corrupted stack end in cleanup_net wireguard 2 424d 644d 22/26 366d b81d591386c3 riscv: Increase stack size under KASAN
WARNING: suspicious RCU usage in wg_ratelimiter_gc_entries wireguard 5 988d 1064d 20/26 838d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in wg_index_hashtable_replace wireguard 2 1255d 1266d 15/26 1234d 9179ba31367b wireguard: noise: take lock when removing handshake entry from table
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu wireguard 1 1337d 1336d 15/26 1316d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu wireguard C error 17 1325d 1336d 15/26 1316d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name wireguard C 4 1331d 1336d 15/26 1316d bf64ff4c2aac genetlink: get rid of family->attrbuf
divide error in wg_packet_encrypt_worker wireguard C done 12 1465d 1473d 15/26 1411d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
divide error in encrypt_packet wireguard C done 89 1464d 1473d 15/26 1411d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
possible deadlock in wg_noise_handshake_create_initiation wireguard C done 11 1480d 1483d 15/26 1446d ec31c2676a10 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in root_remove_peer_lists wireguard C done 2 1485d 1485d 15/26 1468d 9981159fc3b6 wireguard: allowedips: fix use-after-free in root_remove_peer_lists