syzbot


Instances [tested repos]:
Name Last active Uptime Corpus Coverage 🛈 Crashes Execs Kernel build syzkaller build Bugs
Commit Config Freshness Status Commit Freshness Status All Only
ci-qemu-upstream-386 now 4h21m 46030 667157 117 311009 24ea63ea3877 .config 13h14m 1804e95e 8h57m all only
Applied filters: Manager=ci-qemu-upstream-386 (drop) Label=subsystems:net (drop)
open (32):
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Discussions
WARNING in virtio_transport_send_pkt_info kvm net virt -1 C 24 3d09h 3d09h 💬 4 [1d12h]
KASAN: use-after-free Read in __xfrm_state_insert net 19 278 now 16d
KASAN: slab-use-after-free Write in __xfrm_state_delete net 24 965 now 16d
WARNING in rt_set_nexthop net -1 C error done 141 37d 34d 💬 1 [6d06h]
WARNING in __linkwatch_sync_dev (2) net -1 C done 680 3h54m 64d PATCH [10d]
possible deadlock in dev_set_promiscuity net 4 17 25d 73d 💬 1 [73d]
KASAN: slab-out-of-bounds Read in cache_clean nfs net 17 2 73d 86d 💬 2 [86d]
general protection fault in ip6_ins_rt net 2 2 78d 87d
KASAN: use-after-free Read in __linkwatch_run_queue net 19 syz 41 4d10h 92d
WARNING in nsim_fib_event_nb net -1 C done 336 16h47m 105d PATCH [2d20h]
KASAN: global-out-of-bounds Read in __find_rr_leaf (2) net 17 14 69d 105d
KASAN: global-out-of-bounds Read in fib6_clean_node (2) net 17 62 66d 105d
WARNING: suspicious RCU usage in __fib6_update_sernum_upto_root net 4 24 69d 105d 💬 1 [105d]
BUG: sleeping function called from invalid context in dev_set_allmulti net 5 3361 69d 156d
general protection fault in __fib6_drop_pcpu_from (6) net 17 230 18d 191d
BUG: Bad page state in skb_pp_cow_data net -1 C done 42 12d 248d 💬 2 [246d]
BUG: unable to handle kernel paging request in dst_dev_put (2) net 8 syz 1550 22d 253d
WARNING: suspicious RCU usage in dev_deactivate_queue net 4 C error 7829 17d 393d 💬 1 [31d]
BUG: sleeping function called from invalid context in synchronize_net net 5 C done 54 198d 399d 💬 2 [390d]
WARNING: suspicious RCU usage in dev_activate net 4 C error error 789 62d 407d PATCH [391d]
WARNING in dev_deactivate_many net -1 C 220 2d07h 416d
UBSAN: array-index-out-of-bounds in llc_conn_state_process (2) net 15 23 19d 437d 💬 1 [97d]
possible deadlock in hsr_dev_xmit (2) net 4 C done 897 3d03h 504d 💬 2 [466d]
KASAN: slab-use-after-free Read in __ethtool_get_link_ksettings net 19 syz done 10044 19m 510d PATCH [493d]
KASAN: slab-use-after-free Read in handle_tx (2) net 19 C 459 5d13h 540d 💬 2 [208d]
unregister_netdevice: waiting for DEV to become free (8) net 2 C done 370491 6m 797d PATCH [549d]
WARNING in ip_rt_bug (2) net -1 C done error 368 44m 1037d 💬 3 [413d]
BUG: "hc->tx_t_ipi == NUM" holds (exception!) at net/dccp/ccids/ccid3.c:LINE/ccid3_update_send_interval() net -1 C inconclusive error 64 72d 1312d 💬 1 [210d]
general protection fault in skb_release_data (2) net bluetooth 24 C done error 703 135d 1800d
BUG: workqueue lockup (5) net 1 C done 13112 5h07m 2039d
possible deadlock in __dev_queue_xmit (3) net 4 C done inconclusive 1034 5d21h 2081d 💬 5 [409d]
WARNING in rcu_check_gp_start_stall net -1 C done error 2639 8d19h 2365d 💬 7 [15h52m]