kernel BUG in kvfree
|
C |
done |
|
1 |
31d |
31d
|
0/2 |
never |
ext4: fix invalid free tracking in ext4_xattr_move_to_block()
|
kernel BUG in ext4_write_inline_data_end (2)
|
C |
error |
|
1 |
344d |
344d
|
2/2 |
never |
91f90b571f1a
ext4: fix race condition between ext4_write and ext4_convert_inline_data
|
KASAN: use-after-free Read in free_netdev
|
C |
error |
|
2 |
322d |
354d
|
2/2 |
never |
bec1be0a745a
net: tun: unlink NAPI from device on destruction
|
general protection fault in ext4_xattr_set_entry (4)
|
C |
error |
|
60 |
53m |
28d
|
0/2 |
never |
ext4: fix use-after-free in ext4_xattr_set_entry
|
KASAN: slab-out-of-bounds Read in ext4_group_desc_csum
ext4
|
C |
error |
inconclusive |
11 |
3d06h |
104d
|
0/2 |
never |
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
|
BUG: corrupted list in insert_work
|
C |
done |
done |
9 |
325d |
425d
|
2/2 |
never |
d007f49ab789
percpu_ref_init(): clean ->percpu_count_ref on failure
|
KASAN: slab-out-of-bounds Read in exfat_clear_bitmap
|
C |
error |
|
2 |
416d |
416d
|
2/2 |
never |
82f723b8a5ad
exfat: check if cluster num is valid
|
BUG: corrupted list in process_one_work
|
C |
error |
done |
2 |
338d |
423d
|
2/2 |
never |
d007f49ab789
percpu_ref_init(): clean ->percpu_count_ref on failure
|
kernel BUG in tun_attach
|
C |
error |
|
31 |
312d |
354d
|
2/2 |
never |
bec1be0a745a
net: tun: unlink NAPI from device on destruction
|
KASAN: use-after-free Read in compute_effective_progs (2)
|
C |
error |
|
11 |
303d |
430d
|
2/2 |
never |
3527e3cbb84d
bpf: Fix KASAN use-after-free Read in compute_effective_progs
|
general protection fault in chrdev_open
|
C |
error |
|
1 |
364d |
363d
|
0/2 |
never |
9p: missing chunk of "fs/9p: Don't update file type when
|
kernel BUG in blk_mq_dispatch_rq_list (4)
fat
|
C |
error |
|
13 |
3d21h |
226d
|
0/2 |
never |
block: set .bi_max_vecs as actual allocated vector number
|
KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size
ext4
|
C |
error |
|
4 |
72d |
152d
|
0/2 |
never |
3967d330baf2
ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop
|
KASAN: use-after-free Read in ext4_ext_rm_leaf
ext4
|
C |
error |
inconclusive |
1 |
136d |
136d
|
2/2 |
14d |
3967d330baf2
ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop
|
KASAN: use-after-free Read in ext4_rename_dir_prepare (3)
|
C |
error |
|
4 |
38d |
38d
|
2/2 |
29d |
dd887f83ea54
BACKPORT: ext4: fix use-after-free in ext4_rename_dir_prepare
|
general protection fault in ext4_xattr_set_entry (3)
|
C |
error |
|
9 |
30d |
33d
|
2/2 |
29d |
bb8592efcf8e
ext4: fix use-after-free in ext4_xattr_set_entry
|
kernel BUG in ext4_write_inline_data
ext4
|
C |
error |
inconclusive |
3 |
115d |
213d
|
2/2 |
33d |
3392d67af0a4
UPSTREAM: ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
|
kernel BUG in __skb_gso_segment
|
C |
error |
|
1 |
174d |
174d
|
2/2 |
33d |
25dbd87379f8
net/af_packet: make sure to pull mac header
|
general protection fault in em_cmp_match
|
C |
error |
|
1 |
178d |
178d
|
2/2 |
33d |
5c544c7c6afa
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
general protection fault in fscrypt_limit_io_blocks
|
C |
error |
|
5 |
155d |
219d
|
2/2 |
33d |
a41d63f20471
ext4: don't allow journal inode to have encrypt flag
|
kernel BUG in ext4_free_blocks (2)
ext4
|
C |
error |
|
25 |
36d |
338d
|
2/2 |
33d |
beda74302101
UPSTREAM: ext4: block range must be validated before use in ext4_mb_clear_bb()
7550aade9783
ext4: block range must be validated before use in ext4_mb_clear_bb()
|
general protection fault in ext4_xattr_set_entry (2)
ext4
|
C |
error |
|
423 |
35d |
235d
|
2/2 |
34d |
bb8592efcf8e
ext4: fix use-after-free in ext4_xattr_set_entry
|
KASAN: use-after-free Read in ext4_rename_dir_prepare (2)
|
C |
error |
inconclusive |
3 |
104d |
104d
|
2/2 |
70d |
dd887f83ea54
BACKPORT: ext4: fix use-after-free in ext4_rename_dir_prepare
|
kernel BUG in add_grec (2)
|
C |
error |
inconclusive |
1039 |
195d |
195d
|
2/2 |
103d |
44affe7ede59
ipv6: ensure sane device mtu in tunnels
|
KASAN: use-after-free Read in ext4_rename_dir_prepare
|
C |
error |
|
2 |
166d |
201d
|
2/2 |
140d |
dd887f83ea54
BACKPORT: ext4: fix use-after-free in ext4_rename_dir_prepare
|
kernel BUG in ext4_writepages
|
C |
error |
|
5 |
231d |
393d
|
2/2 |
202d |
fb98cb61efff
ext4: avoid crash when inline data creation follows DIO write
|
KASAN: use-after-free Read in gc_data_segment
|
C |
error |
|
4 |
206d |
229d
|
2/2 |
202d |
4a8e8bf28070
f2fs: fix to do sanity check on summary info
|
KASAN: use-after-free Read in mon_bin_flush
|
C |
error |
|
2 |
262d |
264d
|
2/2 |
231d |
1b257f97fec4
usb: mon: make mmapped memory read only
|
kernel BUG in notify_change (3)
|
C |
error |
|
2 |
288d |
288d
|
2/2 |
246d |
bcf6dddd9746
ANDROID: incfs: Add check for ATTR_KILL_SUID and ATTR_MODE in incfs_setattr
|
kernel BUG in ext4_ind_remove_space
|
C |
error |
|
55 |
392d |
503d
|
2/2 |
390d |
22c450d39f89
ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
|
kernel BUG in vhost_get_vq_desc
|
C |
error |
done |
19 |
450d |
494d
|
2/2 |
390d |
698dc7d13c4e
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
BUG: stack guard page was hit in sys_open (5)
|
|
|
|
4 |
404d |
409d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_lsetxattr (2)
|
|
|
|
2 |
460d |
463d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
general protection fault in incfs_kill_sb
|
C |
done |
|
380 |
466d |
468d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in security_file_open
|
|
|
|
2 |
409d |
462d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_mkdirat
|
syz |
error |
|
3 |
392d |
425d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_chmod
|
|
|
|
1 |
436d |
436d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_chown
|
|
|
|
2 |
421d |
456d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_mknodat
|
|
|
|
1 |
419d |
419d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_chdir (4)
|
|
|
|
1 |
432d |
432d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_unlink (8)
|
|
|
|
1 |
431d |
431d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_listxattr
|
|
|
|
1 |
431d |
431d
|
2/2 |
391d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
kernel BUG in mpage_prepare_extent_to_map
|
C |
error |
|
254 |
413d |
581d
|
2/2 |
412d |
330d0e44fc5a
ext4: don't BUG if someone dirty pages without asking ext4 first
|
KASAN: use-after-free Write in paging64_update_accessed_dirty_bits
|
C |
error |
|
16 |
469d |
577d
|
2/2 |
412d |
e90518d10c7d
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
|
kernel BUG in add_grec
|
C |
error |
|
83 |
435d |
509d
|
2/2 |
435d |
ae8ec5eabb1a
net: ipv6: fix skb_over_panic in __ip6_append_data
|
kernel BUG in iput
|
C |
error |
|
2 |
444d |
444d
|
2/2 |
435d |
9eeaa2d7d58a
exfat: avoid incorrectly releasing for root inode
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
|
C |
error |
|
1 |
451d |
451d
|
2/2 |
440d |
70b7b3c055fd
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
KASAN: use-after-free Write in null_skcipher_crypt
|
|
|
|
1 |
501d |
501d
|
2/2 |
440d |
9248694dac20
esp: Fix possible buffer overflow in ESP transformation
|
BUG: stack guard page was hit in file_open
|
C |
error |
|
25 |
458d |
537d
|
2/2 |
458d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
kernel BUG in notify_change
|
C |
error |
|
3 |
475d |
534d
|
2/2 |
458d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
KASAN: invalid-free in bitmap_free
|
C |
error |
done |
1 |
542d |
542d
|
2/2 |
458d |
7da349f07e45
net/packet: rx_owner_map depends on pg_vec
|
general protection fault in pending_reads_dispatch_ioctl
|
C |
error |
|
4 |
491d |
522d
|
2/2 |
466d |
4b1862e4fc69
ANDROID: incremental-fs: fix GPF in pending_reads_dispatch_ioctl
|
KASAN: use-after-free Read in hardware_disable
|
C |
error |
done |
5 |
497d |
500d
|
2/2 |
466d |
080dbe7e9b86
KVM: x86: Forcibly leave nested virt when SMM state is toggled
|
BUG: Dentry still in use in unmount
|
C |
done |
|
1184 |
469d |
481d
|
2/2 |
467d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
general protection fault in reweight_entity
|
C |
done |
|
2 |
478d |
536d
|
1/2 |
469d |
4c47eaa7c828
BACKPORT: sched/fair: Fix fault in reweight_entity
|
kernel BUG in kvm_mmu_notifier_invalidate_range_end
|
C |
error |
done |
167 |
505d |
592d
|
1/2 |
469d |
2fc2c66b9ce4
ANDROID: percpu-rwsem: enable percpu_sem destruction in atomic context
|
general protection fault in tipc_crypto_key_distr
|
|
|
|
1 |
577d |
577d
|
1/2 |
488d |
a7d91625863d
tipc: check for null after calling kmemdup
|
KASAN: slab-out-of-bounds Write in legacy_parse_param
|
C |
error |
|
1 |
522d |
522d
|
1/2 |
495d |
eadde287a62e
vfs: fs_context: fix up param length parsing in legacy_parse_param
|
kernel BUG in cdc_ncm_fill_tx_frame
|
C |
error |
|
40 |
528d |
593d
|
1/2 |
525d |
385ffd31ebdb
net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero
|
general protection fault in klist_iter_exit
|
C |
error |
|
5 |
543d |
579d
|
1/2 |
533d |
c602863ad28e
nfc: fix segfault in nfc_genl_dump_devices_done
|
KASAN: null-ptr-deref Write in prepare_to_wait
|
C |
error |
|
2 |
585d |
585d
|
1/2 |
552d |
748786564a35
Revert "io_uring: reinforce cancel on flush during exit"
|
general protection fault in scsi_queue_rq
|
C |
error |
|
3 |
560d |
585d
|
1/2 |
552d |
06cc8187dbb6
scsi: core: Remove command size deduction from scsi_setup_scsi_cmnd()
|
BUG: Dentry still in use [unmount of ramfs ramfs]
|
C |
error |
|
3 |
592d |
593d
|
1/2 |
552d |
aee113fcef3a
ANDROID: Incremental fs: Fix dentry get/put imbalance on vfs_mkdir() failure
|
KASAN: use-after-free Write in ext4_stop_mmpd
|
C |
done |
|
3 |
589d |
591d
|
1/2 |
574d |
b663890d8544
ext4: fix possible UAF when remounting r/o a mmp-protected file system
|
divide error in genelink_tx_fixup
|
C |
error |
|
8 |
585d |
590d
|
1/2 |
574d |
017718dfbb6f
usbnet: fix error return code in usbnet_probe()
|
KASAN: invalid-free in io_commit_cqring
|
C |
error |
|
3 |
580d |
591d
|
1/2 |
580d |
3f2c12ec8a3f
io_uring: don't take uring_lock during iowq cancel
|