syzbot


Applied filters: Label=subsystems:wireguard (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
INFO: task hung in wg_netns_pre_exit (5) wireguard 1 C done 397 15d 581d 26/29 never 60a25ef8dacb wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit
general protection fault in veth_xdp_rcv wireguard 2 12 325d 331d 29/29 266d 9337c54401a5 veth: prevent NULL pointer dereference in veth_xdp_rcv
WARNING in kthread_unpark (2) wireguard gfs2 -1 syz done 35 571d 718d 28/29 532d 214e01ad4ed7 kthread: unpark only parked kthread
INFO: task hung in wg_netns_pre_exit (4) wireguard 1 127 660d 699d 26/29 659d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
INFO: task hung in wg_destruct wireguard 1 207 662d 700d 26/29 659d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll (2) wireguard 6 721 769d 1541d 25/29 749d bba045dc4d99 wireguard: receive: annotate data-race around receiving_counter.counter
KCSAN: data-race in wg_xmit / wg_xmit (4) wireguard 6 1 901d 896d 25/29 828d 93da8d75a665 wireguard: use DEV_STATS_INC()
KMSAN: uninit-value in __netif_receive_skb_core wireguard wireless 19 C done 353 970d 2939d 23/29 930d dc644b540a2d tcx: Fix splat in ingress_destroy upon tcx_entry_free
net-next test error: WARNING in __napi_schedule wireguard -1 110 1500d 1502d 22/29 1160d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
linux-next test error: WARNING in set_peer wireguard -1 39 1317d 1324d 22/29 1160d 26c013108c12 wireguard: netlink: avoid variable-sized memcpy on sockaddr
linux-next test error: WARNING in __napi_schedule wireguard -1 15 1503d 1502d 22/29 1160d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
kernel panic: corrupted stack end in cleanup_net wireguard 2 2 1218d 1437d 22/29 1160d b81d591386c3 riscv: Increase stack size under KASAN
WARNING: suspicious RCU usage in wg_ratelimiter_gc_entries wireguard 4 5 1782d 1857d 20/29 1631d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in wg_index_hashtable_replace wireguard 2 2 2048d 2060d 15/29 2027d 9179ba31367b wireguard: noise: take lock when removing handshake entry from table
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu wireguard 17 1 2130d 2130d 15/29 2109d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu wireguard 19 C error 17 2119d 2129d 15/29 2109d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name wireguard 19 C 4 2124d 2129d 15/29 2109d bf64ff4c2aac genetlink: get rid of family->attrbuf
divide error in wg_packet_encrypt_worker wireguard 2 C done 12 2259d 2266d 15/29 2205d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
divide error in encrypt_packet wireguard 2 C done 89 2258d 2266d 15/29 2205d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
possible deadlock in wg_noise_handshake_create_initiation wireguard 4 C done 11 2273d 2277d 15/29 2240d ec31c2676a10 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in root_remove_peer_lists wireguard 19 C done 2 2279d 2279d 15/29 2262d 9981159fc3b6 wireguard: allowedips: fix use-after-free in root_remove_peer_lists