syzbot


Applied filters: WithRepro (drop) Label=subsystems:can (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
INFO: trying to register non-static key in bcm_can_tx can -1 C error 5 81d 92d 29/29 13d c35636e91e39 can: bcm: fix locking for bcm_op runtime updates
KMSAN: uninit-value in em_canid_match can net 7 C 7 174d 175d 29/29 133d 0c922106d7a5 net/sched: em_canid: fix uninit-value in em_canid_match
WARNING in ucan_probe can -1 C done 143 426d 457d 28/29 343d 1d22a122ffb1 can: ucan: fix out of bound read in strscpy() source
WARNING: refcount bug in sk_skb_reason_drop can 13 C done 8107 527d 593d 28/29 379d a8c695005bfe can: j1939: j1939_session_new(): fix skb reference counting
WARNING in remove_proc_entry (6) can -1 C done 377 593d 623d 28/29 575d 94b0818fa635 can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().
KMSAN: kernel-infoleak in raw_recvmsg can 9 C 121 705d 754d 26/29 679d b7cdf1dd5d2a net: can: j1939: Initialize unused data in j1939_send_one()
possible deadlock in j1939_sk_queue_drop_all can 4 C error done 281 842d 1715d 25/29 784d 6cdedc18ba7b can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
possible deadlock in j1939_sk_errqueue (2) can 4 C done 24 824d 1051d 25/29 784d 6cdedc18ba7b can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
possible deadlock in j1939_session_activate can 4 C done done 67 836d 1671d 25/29 784d 6cdedc18ba7b can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
KASAN: use-after-free Write in j1939_sock_pending_del can 22 syz done error 17 2376d 2388d 23/29 1014d fd81ebfe7975 can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
WARNING in j1939_session_deactivate_activate_next can -1 C error done 502 1142d 1547d 22/29 1077d d0553680f94c can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
possible deadlock in j1939_sk_errqueue can 4 C unreliable 227 1148d 1685d 22/29 1077d d1366b283d94 can: j1939: prevent deadlock by moving j1939_sk_errqueue()
KMSAN: uninit-value in can_send can 7 C 630 1276d 1293d 22/29 1181d 3eb3d283e857 can: j1939: j1939_send_one(): fix missing CAN header initialization
memory leak in gs_usb_probe can usb 3 C 1 1517d 1513d 22/29 1181d 50d34a0d151d can: gs_usb: gs_make_candev(): fix memory leak for devices with extended bit timing configuration
WARNING in mcba_usb_probe/usb_submit_urb usb can -1 C error 537 1511d 2506d 22/29 1181d 136bed0bfd3b can: mcba_usb: properly check endpoint type
WARNING in isotp_tx_timer_handler (2) can -1 C 1416 1207d 1529d 22/29 1181d 3ea566422cbd can: isotp: sanitize CAN ID checks in isotp_bind() d73497081710 can: isotp: stop timeout monitoring when no first frame was sent
BUG: unable to handle kernel paging request in can_rcv_filter can 8 C 5 1263d 1260d 22/29 1181d 0acc442309a0 can: af_can: fix NULL pointer dereference in can_rcv_filter
WARNING: refcount bug in j1939_netdev_start (2) can 13 syz error error 51 1672d 2319d 20/29 1533d d9d52a3ebd28 can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
WARNING in isotp_tx_timer_handler can -1 C error 1553 1534d 1976d 20/29 1533d 9acf636215a6 can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
memory leak in pcan_usb_fd_init usb can 3 C 19 1916d 1985d 20/29 1652d a0b96b4a6274 drivers: net: fix memory leak in peak_usb_create_dev
WARNING: ODEBUG bug in __sk_destruct (2) can -1 C done done 62 1662d 1859d 20/29 1652d 14a4696bc311 can: isotp: isotp_release(): omit unintended hrtimer restart on socket release
KASAN: use-after-free Read in bcm_rx_handler can 19 syz done 2 1804d 1834d 20/29 1652d d5f9023fa61e can: bcm: delay release of struct bcm_op after synchronize_rcu()
INFO: task hung in register_netdevice_notifier (2) can wireless 1 syz done 10555 1796d 2401d 20/29 1652d 8d0caedb7596 can: bcm/raw/isotp: use per module netdevice notifier
INFO: task hung in unregister_netdevice_notifier (3) can 1 syz error error 184 2464d 2649d 20/29 1652d 8d0caedb7596 can: bcm/raw/isotp: use per module netdevice notifier
general protection fault in j1939_netdev_notify (2) can 2 C done 19 1919d 1977d 20/29 1866d 4e096a18867a net: introduce CAN specific pointer in the struct net_device
BUG: receive list entry not found for dev vxcan1, id 003, mask C00007FF can -1 C unreliable 2 2002d 2001d 19/29 1897d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
BUG: receive list entry not found for dev vcan0, id 002, mask C00007FF can -1 C unreliable 5 2001d 2001d 19/29 1897d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
BUG: receive list entry not found for dev vcan0, id 001, mask C00007FF can -1 C unreliable 5 2004d 2004d 19/29 1897d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
KMSAN: uninit-value in number (2) can 7 C 168 1898d 2277d 19/29 1897d c8c958a58fc6 can: af_can: prevent potential access of uninitialized member in can_rcv() 9aa9379d8f86 can: af_can: prevent potential access of uninitialized member in canfd_rcv()
BUG: receive list entry not found for dev vxcan1, id 002, mask C00007FF can -1 C unreliable 3 2002d 2004d 19/29 1897d d73ff9b7c4ea can: af_can: can_rx_unregister(): remove WARN() statement from list operation sanity check
KMSAN: uninit-value in can_receive (2) can 7 C 2060 2015d 2109d 15/29 2011d e009f95b1543 can: j1935: j1939_tp_tx_dat_new(): fix missing initialization of skbcnt
KASAN: use-after-free Read in j1939_tp_txtimer can 19 C done error 5 2138d 2336d 15/29 2071d cd3b3636c99f can: j1939: transport: j1939_session_tx_dat(): fix use-after-free read in j1939_tp_txtimer()
general protection fault in j1939_netdev_start can 2 C done 8 2124d 2275d 15/29 2071d af804b782635 can: j1939: socket: j1939_sk_bind(): make sure ml_priv is allocated
KASAN: use-after-free Read in slcan_open can 19 C done 2 2362d 2360d 15/29 2260d 9ebd796e2400 can: slcan: Fix use-after-free Read in slcan_open
KMSAN: uninit-value in can_receive can 7 C 14 2286d 2374d 15/29 2283d e7153bf70c34 can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs
KASAN: null-ptr-deref Write in queue_work_on can 12 C done error 5 2467d 2463d 15/29 2283d 0ace17d56824 can, slip: Protect tty->disc_data in write_wakeup and close with RCU
general protection fault in j1939_jsk_del (2) can 2 syz 21 2346d 2363d 15/29 2287d 00d4e14d2e4c can: j1939: j1939_sk_bind(): take priv after lock is held
KASAN: use-after-free Read in j1939_xtp_rx_abort_one can 19 C done done 11 2381d 2388d 15/29 2313d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
general protection fault in j1939_netdev_notify can 2 syz done 11 2376d 2388d 14/29 2363d c48c8c1e2e81 can: j1939: main: j1939_ndev_to_priv(): avoid crash if can_ml_priv is NULL
KASAN: use-after-free Read in j1939_sk_recv can 19 C done 2 2382d 2382d 14/29 2363d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
KASAN: use-after-free Read in j1939_session_deactivate can 19 syz done 1 2385d 2384d 14/29 2363d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
KASAN: use-after-free Read in j1939_session_get_by_addr_locked can 19 C done 1 2382d 2382d 14/29 2363d ddeeb7d4822e can: j1939: j1939_can_recv(): add priv refcounting
WARNING: refcount bug in j1939_netdev_start can 13 syz done 6 2366d 2387d 14/29 2363d fd81ebfe7975 can: j1939: socket: rework socket locking for j1939_sk_release() and j1939_sk_sendmsg()
KASAN: use-after-free Read in mcba_usb_disconnect usb can 19 C 2 2391d 2423d 14/29 2363d 4d6636498c41 can: mcba_usb: fix use-after-free on disconnect
memory leak in raw_sendmsg can 3 C 2 2530d 2542d 12/29 2505d fd704bd5ee74 can: purge socket error queue on sock destruct
WARNING in can_rcv can -1 C 5 3046d 3045d 4/29 3040d 8cb68751c115 can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once
WARNING in canfd_rcv can -1 C 4 3047d 3045d 4/29 3040d d4689846881d can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once