syzbot


Applied filters: Label=subsystems:wireguard (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
INFO: task hung in wg_netns_pre_exit (5) wireguard 1 C done 397 10d 576d 26/29 never 60a25ef8dacb wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit
general protection fault in veth_xdp_rcv wireguard 2 12 321d 326d 29/29 261d 9337c54401a5 veth: prevent NULL pointer dereference in veth_xdp_rcv
WARNING in kthread_unpark (2) wireguard gfs2 -1 syz done 35 566d 713d 28/29 528d 214e01ad4ed7 kthread: unpark only parked kthread
INFO: task hung in wg_netns_pre_exit (4) wireguard 1 127 655d 694d 26/29 654d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
INFO: task hung in wg_destruct wireguard 1 207 657d 696d 26/29 654d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll (2) wireguard 6 721 764d 1536d 25/29 745d bba045dc4d99 wireguard: receive: annotate data-race around receiving_counter.counter
KCSAN: data-race in wg_xmit / wg_xmit (4) wireguard 6 1 897d 891d 25/29 824d 93da8d75a665 wireguard: use DEV_STATS_INC()
KMSAN: uninit-value in __netif_receive_skb_core wireguard wireless 19 C done 353 965d 2934d 23/29 925d dc644b540a2d tcx: Fix splat in ingress_destroy upon tcx_entry_free
net-next test error: WARNING in __napi_schedule wireguard -1 110 1495d 1498d 22/29 1155d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
linux-next test error: WARNING in set_peer wireguard -1 39 1312d 1319d 22/29 1155d 26c013108c12 wireguard: netlink: avoid variable-sized memcpy on sockaddr
linux-next test error: WARNING in __napi_schedule wireguard -1 15 1498d 1497d 22/29 1155d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
kernel panic: corrupted stack end in cleanup_net wireguard 2 2 1213d 1432d 22/29 1155d b81d591386c3 riscv: Increase stack size under KASAN
WARNING: suspicious RCU usage in wg_ratelimiter_gc_entries wireguard 4 5 1777d 1852d 20/29 1627d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in wg_index_hashtable_replace wireguard 2 2 2044d 2055d 15/29 2023d 9179ba31367b wireguard: noise: take lock when removing handshake entry from table
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu wireguard 17 1 2125d 2125d 15/29 2104d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu wireguard 19 C error 17 2114d 2125d 15/29 2104d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name wireguard 19 C 4 2119d 2125d 15/29 2104d bf64ff4c2aac genetlink: get rid of family->attrbuf
divide error in wg_packet_encrypt_worker wireguard 2 C done 12 2254d 2261d 15/29 2200d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
divide error in encrypt_packet wireguard 2 C done 89 2253d 2262d 15/29 2200d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
possible deadlock in wg_noise_handshake_create_initiation wireguard 4 C done 11 2268d 2272d 15/29 2235d ec31c2676a10 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in root_remove_peer_lists wireguard 19 C done 2 2274d 2274d 15/29 2257d 9981159fc3b6 wireguard: allowedips: fix use-after-free in root_remove_peer_lists