syzbot


Applied filters: Label=subsystems:wireguard (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
general protection fault in veth_xdp_rcv wireguard 2 12 290d 295d 29/29 230d 9337c54401a5 veth: prevent NULL pointer dereference in veth_xdp_rcv
WARNING in kthread_unpark (2) wireguard gfs2 -1 syz done 35 536d 682d 28/29 497d 214e01ad4ed7 kthread: unpark only parked kthread
INFO: task hung in wg_netns_pre_exit (4) wireguard 1 127 624d 664d 26/29 623d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
INFO: task hung in wg_destruct wireguard 1 207 626d 665d 26/29 623d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll (2) wireguard 6 721 734d 1506d 25/29 714d bba045dc4d99 wireguard: receive: annotate data-race around receiving_counter.counter
KCSAN: data-race in wg_xmit / wg_xmit (4) wireguard 6 1 866d 861d 25/29 793d 93da8d75a665 wireguard: use DEV_STATS_INC()
KMSAN: uninit-value in __netif_receive_skb_core wireguard wireless 19 C done 353 934d 2904d 23/29 894d dc644b540a2d tcx: Fix splat in ingress_destroy upon tcx_entry_free
net-next test error: WARNING in __napi_schedule wireguard -1 110 1464d 1467d 22/29 1124d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
linux-next test error: WARNING in set_peer wireguard -1 39 1281d 1288d 22/29 1124d 26c013108c12 wireguard: netlink: avoid variable-sized memcpy on sockaddr
linux-next test error: WARNING in __napi_schedule wireguard -1 15 1468d 1467d 22/29 1124d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
kernel panic: corrupted stack end in cleanup_net wireguard 2 2 1182d 1402d 22/29 1124d b81d591386c3 riscv: Increase stack size under KASAN
WARNING: suspicious RCU usage in wg_ratelimiter_gc_entries wireguard 4 5 1747d 1822d 20/29 1596d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in wg_index_hashtable_replace wireguard 2 2 2013d 2024d 15/29 1992d 9179ba31367b wireguard: noise: take lock when removing handshake entry from table
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu wireguard 17 1 2095d 2094d 15/29 2074d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu wireguard 19 C error 17 2083d 2094d 15/29 2074d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name wireguard 19 C 4 2089d 2094d 15/29 2074d bf64ff4c2aac genetlink: get rid of family->attrbuf
divide error in wg_packet_encrypt_worker wireguard 2 C done 12 2223d 2231d 15/29 2169d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
divide error in encrypt_packet wireguard 2 C done 89 2223d 2231d 15/29 2169d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
possible deadlock in wg_noise_handshake_create_initiation wireguard 4 C done 11 2238d 2241d 15/29 2204d ec31c2676a10 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in root_remove_peer_lists wireguard 19 C done 2 2243d 2243d 15/29 2226d 9981159fc3b6 wireguard: allowedips: fix use-after-free in root_remove_peer_lists