syzbot


Instances [tested repos]:
Name Last active Uptime Corpus Coverage 🛈 Crashes Execs Kernel build syzkaller build Bugs
Commit Config Freshness Status Commit Freshness Status All Only
ci-upstream-gce-arm64 now 5h02m 69850 540393 390 260649 ca3a5c08a5ef .config 16h52m 6b856513 13h05m all only
Applied filters: Manager=ci-upstream-gce-arm64 (drop) Label=subsystems:net (drop)
open (36):
Title Repro Cause bisect Fix bisect Count Last Reported Discussions
KASAN: slab-use-after-free Read in page_pool_put_unrefed_netmem bpf net 1 30d 26d
INFO: task hung in genl_rcv_msg (4) net C done 58 12d 37d
INFO: task hung in new_device_store (5) net syz inconclusive 81 6d04h 43d 💬 7 [30d]
possible deadlock in gtp_encap_enable_socket net C error 3 34d 46d PATCH [18d]
WARNING in l2tp_exit_net net syz 113 6m 57d PATCH [1d10h]
WARNING in sock_map_destroy bpf net C error 6 6d02h 73d PATCH [42d]
possible deadlock in rtnl_lock (8) net C 48 2d01h 82d 💬 5 [58d]
Unable to handle kernel execute from non-executable memory at virtual address ADDR net s390 C 8 1d17h 87d
INFO: task hung in netlink_dump (5) net 123 47d 106d
WARNING: suspicious RCU usage in dev_deactivate_queue net C error 4940 1h09m 114d 💬 1 [4d19h]
possible deadlock in do_ip_getsockopt (3) net 486 6h04m 121d
WARNING: suspicious RCU usage in dev_activate net C error 273 27m 128d PATCH [112d]
possible deadlock in do_ip_setsockopt (4) net C done 3212 1h24m 135d PATCH [47d]
possible deadlock in smc_switch_to_fallback (2) net s390 C error 5225 6m 137d
possible deadlock in team_del_slave (3) net C error 211816 now 196d PATCH [124d]
possible deadlock in hsr_dev_xmit (2) net C done 492 9h27m 225d 💬 2 [187d]
KASAN: slab-use-after-free Read in __ethtool_get_link_ksettings net syz done 2714 1h51m 231d PATCH [214d]
possible deadlock in team_port_change_check (2) net C done 2030 30m 253d 💬 5 [36d]
KASAN: slab-use-after-free Read in handle_tx (2) net 31 1d00h 261d 💬 1 [261d]
possible deadlock in smc_release net s390 C error done 31 6d04h 280d 💬 2 [62d]
WARNING in call_rcu (3) net C 3 224d 326d
KASAN: slab-use-after-free Read in taprio_dump net C error 54 12d 326d 💬 4 [3d07h]
WARNING in inet_sock_destruct (4) net C done 3810 now 504d 💬 4 [4d19h]
unregister_netdevice: waiting for DEV to become free (8) net C done 27935 now 518d PATCH [270d]
INFO: task hung in rfkill_unregister (3) net nfc C 211 14h39m 520d 💬 1 [52d]
INFO: task hung in synchronize_rcu (4) fs net C done error 757 4h37m 555d 💬 6 [98d]
INFO: task hung in del_device_store net syz error 1298 11h00m 614d
INFO: task hung in rfkill_sync_work net nfc C done 33 8d08h 683d PATCH [627d]
INFO: task hung in nfc_rfkill_set_block net nfc C done done 251 1d16h 724d
WARNING in ip_rt_bug (2) net C done error 291 11h27m 758d 💬 3 [134d]
BUG: MAX_LOCKDEP_KEYS too low! (2) no-reminders net nfc C unreliable 4050 14h16m 1269d PATCH [506d]
general protection fault in skb_release_data (2) net bluetooth C done error 694 5d16h 1521d
INFO: rcu detected stall in addrconf_dad_work (5) net C done inconclusive 13 6d03h 1523d
INFO: rcu detected stall in tc_modify_qdisc net C done 532 3d05h 1563d 💬 13 [130d]
WARNING in kcm_write_msgs net C done 615 8d07h 1695d 💬 5 [98d]
possible deadlock in __dev_queue_xmit (3) net C done inconclusive 1012 121d 1802d 💬 5 [130d]
moderation (2):
Title Repro Cause bisect Fix bisect Count Last Reported Discussions
BUG: unable to handle kernel NULL pointer dereference in netlbl_sock_setattr lsm net 2 34d 42d
corrupted report (2) net mm 748319 now 2403d