Hello bpf maintainers/developers, This is a 31-day syzbot report for the bpf subsystem. All related reports/information can be found at: https://syzkaller.appspot.com/upstream/s/bpf During the period, 11 new issues were detected and 4 were fixed. In total, 53 issues are still open and 252 have been fixed so far. Some of the still happening issues: Ref Crashes Repro Title <1> 8630 Yes possible deadlock in task_fork_fair https://syzkaller.appspot.com/bug?extid=1a93ee5d329e97cfbaff <2> 8113 Yes KASAN: slab-out-of-bounds Read in btf_datasec_check_meta https://syzkaller.appspot.com/bug?extid=cc32304f6487ebff9b70 <3> 869 Yes possible deadlock in sock_map_delete_elem https://syzkaller.appspot.com/bug?extid=4ac2fe2b496abca8fa4b <4> 733 Yes WARNING in bpf_map_lookup_percpu_elem https://syzkaller.appspot.com/bug?extid=dce5aae19ae4d6399986 <5> 385 Yes possible deadlock in __bpf_ringbuf_reserve https://syzkaller.appspot.com/bug?extid=850aaf14624dc0c6d366 <6> 165 Yes KMSAN: uninit-value in ___bpf_prog_run (4) https://syzkaller.appspot.com/bug?extid=853242d9c9917165d791 <7> 153 Yes general protection fault in dev_map_enqueue (2) https://syzkaller.appspot.com/bug?extid=cca39e6e84a367a7e6f6 <8> 136 Yes possible deadlock in __queue_map_get https://syzkaller.appspot.com/bug?extid=8bdfc2c53fb2b63e1871 <9> 89 Yes WARNING in __xdp_reg_mem_model https://syzkaller.appspot.com/bug?extid=f534bd500d914e34b59e <10> 88 Yes BUG: unable to handle kernel NULL pointer dereference in sk_msg_recvmsg https://syzkaller.appspot.com/bug?extid=84f695756ed0c4bb3aba --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@xxxxxxxxxxxxxxxx. To disable reminders for individual bugs, reply with the following command: #syz set <Ref> no-reminders To change bug's subsystems, reply with: #syz set <Ref> subsystems: new-subsystem You may send multiple commands in a single email message.