syzbot


Applied filters: Label=subsystems:wireguard (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
INFO: task hung in wg_netns_pre_exit (5) wireguard 1 C done 397 29d 594d 28/29 never 60a25ef8dacb wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit
general protection fault in veth_xdp_rcv wireguard 2 12 339d 345d 29/29 280d 9337c54401a5 veth: prevent NULL pointer dereference in veth_xdp_rcv
WARNING in kthread_unpark (2) wireguard gfs2 -1 syz done 35 585d 731d 28/29 546d 214e01ad4ed7 kthread: unpark only parked kthread
INFO: task hung in wg_netns_pre_exit (4) wireguard 1 127 674d 713d 26/29 673d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
INFO: task hung in wg_destruct wireguard 1 207 676d 714d 26/29 673d d864319871b0 net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll (2) wireguard 6 721 783d 1555d 25/29 763d bba045dc4d99 wireguard: receive: annotate data-race around receiving_counter.counter
KCSAN: data-race in wg_xmit / wg_xmit (4) wireguard 6 1 915d 910d 25/29 842d 93da8d75a665 wireguard: use DEV_STATS_INC()
KMSAN: uninit-value in __netif_receive_skb_core wireguard wireless 19 C done 353 983d 2953d 23/29 944d dc644b540a2d tcx: Fix splat in ingress_destroy upon tcx_entry_free
net-next test error: WARNING in __napi_schedule wireguard -1 110 1514d 1516d 22/29 1174d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
linux-next test error: WARNING in set_peer wireguard -1 39 1330d 1337d 22/29 1174d 26c013108c12 wireguard: netlink: avoid variable-sized memcpy on sockaddr
linux-next test error: WARNING in __napi_schedule wireguard -1 15 1517d 1516d 22/29 1174d 351bdbb6419c net: Revert the softirq will run annotation in ____napi_schedule().
kernel panic: corrupted stack end in cleanup_net wireguard 2 2 1232d 1451d 22/29 1174d b81d591386c3 riscv: Increase stack size under KASAN
WARNING: suspicious RCU usage in wg_ratelimiter_gc_entries wireguard 4 5 1796d 1871d 20/29 1645d 3066820034b5 rcu: Reject RCU_LOCKDEP_WARN() false positives
general protection fault in wg_index_hashtable_replace wireguard 2 2 2062d 2073d 15/29 2041d 9179ba31367b wireguard: noise: take lock when removing handshake entry from table
KASAN: vmalloc-out-of-bounds Read in netdev_name_node_lookup_rcu wireguard 17 1 2144d 2144d 15/29 2123d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in netdev_name_node_lookup_rcu wireguard 19 C error 17 2132d 2143d 15/29 2123d bf64ff4c2aac genetlink: get rid of family->attrbuf
KASAN: use-after-free Read in dev_get_by_name wireguard 19 C 4 2138d 2143d 15/29 2123d bf64ff4c2aac genetlink: get rid of family->attrbuf
divide error in wg_packet_encrypt_worker wireguard 2 C done 12 2273d 2280d 15/29 2219d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
divide error in encrypt_packet wireguard 2 C done 89 2272d 2280d 15/29 2219d 175f1ca9a9ed wireguard: send: account for mtu=0 devices
possible deadlock in wg_noise_handshake_create_initiation wireguard 4 C done 11 2287d 2291d 15/29 2253d ec31c2676a10 wireguard: noise: reject peers with low order public keys
KASAN: use-after-free Read in root_remove_peer_lists wireguard 19 C done 2 2293d 2293d 15/29 2276d 9981159fc3b6 wireguard: allowedips: fix use-after-free in root_remove_peer_lists