syzbot


Instances [tested repos]:
Name Last active Uptime Corpus Coverage 🛈 Crashes Execs Kernel build syzkaller build Bugs
Commit Config Freshness Status Commit Freshness Status All Only
ci-upstream-kasan-badwrites-root now 2h51m 48062 828392 300 782690 24770983ccfe .config 4h05m ed3e87f7 1d07h all only
Applied filters: Manager=ci-upstream-kasan-badwrites-root (drop) Label=subsystems:net (drop)
open (39):
Title Repro Cause bisect Fix bisect Count Last Reported Discussions
WARNING in __linkwatch_sync_dev (2) net C 154 2h43m 7d17h PATCH [2d02h]
general protection fault in ip6_mc_clear_src (2) net 12 1d06h 15d
WARNING: refcount bug in sk_skb_reason_drop (2) net 1 21d 16d
KASAN: slab-use-after-free Read in fib6_add net 12 17d 29d
KASAN: use-after-free Read in __linkwatch_run_queue net syz 18 2d02h 36d
general protection fault in mld_clear_delrec net 21 1d07h 42d
KASAN: global-out-of-bounds Read in fib6_ifdown (2) net syz 39 17d 47d
KASAN: global-out-of-bounds Read in __find_rr_leaf (2) net 14 13d 49d
WARNING in rt6_multipath_rebalance (2) net 29 1h09m 49d
general protection fault in addrconf_add_ifaddr net C done error 21081 66d 73d PATCH [73d]
BUG: sleeping function called from invalid context in dev_set_allmulti net 3361 13d 100d
WARNING in depot_fetch_stack net 10 12d 106d
general protection fault in __fib6_drop_pcpu_from (6) net 228 35d 135d
BUG: Bad page state in skb_pp_cow_data net C done 38 8h55m 192d 💬 2 [190d]
BUG: unable to handle kernel paging request in dst_dev_put (2) net syz 1548 7d17h 197d
KASAN: slab-use-after-free Read in cfusbl_device_notify net 133 3d07h 225d
possible deadlock in sockopt_lock_sock net C 3397 63d 308d
WARNING: suspicious RCU usage in dev_deactivate_queue net C error 7829 24d 336d 💬 1 [38d]
possible deadlock in do_ip_getsockopt (3) net 1131 63d 343d
possible deadlock in do_ipv6_setsockopt (4) net C error 3730 54d 344d 💬 1 [71d]
possible deadlock in ip_mroute_setsockopt net C done 3119 63d 344d
possible deadlock in ip_mc_drop_socket (2) net 174 63d 346d
WARNING: suspicious RCU usage in dev_activate net C error 789 5d18h 351d PATCH [335d]
possible deadlock in do_ip_setsockopt (4) net C done done 12508 54d 358d PATCH [269d]
UBSAN: array-index-out-of-bounds in llc_conn_state_process (2) net 20 8d03h 381d 💬 1 [41d]
possible deadlock in team_device_event (3) net C error 16828 now 406d PATCH [320d]
possible deadlock in team_del_slave (3) net C error 355605 now 419d PATCH [28d]
possible deadlock in hsr_dev_xmit (2) net C done 866 2h57m 448d 💬 2 [410d]
KASAN: slab-use-after-free Read in __ethtool_get_link_ksettings net syz done 8399 7m 454d PATCH [437d]
INFO: rcu detected stall in sys_recvmmsg (3) net 161 4d17h 548d
WARNING in inet_sock_destruct (4) net C done 6525 1d07h 727d 💬 4 [6d07h]
unregister_netdevice: waiting for DEV to become free (8) net C done 334995 now 740d PATCH [493d]
INFO: task hung in nfc_rfkill_set_block net nfc C done done 435 11h08m 947d
WARNING in ip_rt_bug (2) net C done error 364 15d 981d 💬 3 [357d]
BUG: MAX_LOCKDEP_KEYS too low! (2) no-reminders net nfc C unreliable 5270 2h37m 1492d PATCH [729d]
general protection fault in skb_release_data (2) net bluetooth C done error 703 79d 1744d
WARNING in kcm_write_msgs net C done 620 9d10h 1918d 💬 5 [321d]
possible deadlock in __dev_queue_xmit (3) net C done inconclusive 1025 3d09h 2025d 💬 5 [353d]
WARNING in rcu_check_gp_start_stall net C done error 2589 1d06h 2309d 💬 7 [6d07h]