syzbot


Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
kernel BUG in __es_remove_extent (2) C 2 276d 431d 2/2 274d d0083459e2b6 ext4: fix bug_on in __es_tree_search
KASAN: use-after-free Read in get_max_inline_xattr_value_size ext4 C 20 759d 838d 2/2 685d 8aad0253b5e6 ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop
kernel BUG in ext4_write_inline_data C 3 861d 899d 2/2 748d 21086923c1e6 UPSTREAM: ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
KASAN: use-after-free Read in do_garbage_collect C 4 885d 915d 2/2 749d e5142a4935c1 f2fs: fix to do sanity check on i_extra_isize in is_alive()
kernel BUG in __skb_gso_segment C 1 860d 860d 2/2 755d de2ea2a0ad51 net/af_packet: make sure to pull mac header
kernel BUG in ext4_write_inline_data_end C 4 1012d 1146d 2/2 938d 18881d7e5171 ext4: fix race condition between ext4_write and ext4_convert_inline_data
kernel BUG in notify_change C 18 972d 1515d 2/2 945d def19b1cf16c ANDROID: incfs: Add check for ATTR_KILL_SUID and ATTR_MODE in incfs_setattr
kernel BUG in ext4_ind_remove_space C 1 1189d 1189d 2/2 1049d 259dc49deaa2 ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
general protection fault in incfs_kill_sb C 2965 1139d 1173d 2/2 1099d b730087e9a5d ANDROID: incremental-fs: limit mount stack depth
KASAN: use-after-free Read in firmware_fallback_sysfs C 2349 1279d 1830d 1/2 1279d d09639528b66 firmware_loader: fix use-after-free in firmware_fallback_sysfs
BUG: unable to handle kernel paging request in csum_partial C 5 1334d 1915d 1/2 1279d 53b480e68c1c ip_gre: add validation for csum_start
KASAN: slab-out-of-bounds Write in snd_usb_mixer_interrupt C 4 1758d 1768d 1/2 1287d 25e1bb1e6c36 ALSA: usb-audio: Fix OOB access of mixer element list
KASAN: use-after-free Read in ax88172a_unbind C 38 1730d 1845d 1/2 1287d d0d394c71604 ax88172a: fix ax88172a_unbind() failures
KASAN: use-after-free Read in usbhid_close syz 1 1836d 1836d 1/2 1287d 613045bfc63d HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
KASAN: slab-out-of-bounds Write in hiddev_ioctl_usage C 4 1821d 1841d 1/2 1287d 851d0813ab80 HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage()
general protection fault in path_openat syz 26 1903d 1909d 1/2 1288d 2c38e6140126 vfs: fix do_last() regression
general protection fault in nf_ct_netns_do_get C 10 1928d 1929d 1/2 1288d 503ff0dcfba7 netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
KASAN: use-after-free Read in locks_delete_block C 3 1875d 1928d 1/2 1288d 384e15fc4226 locks: fix a potential use-after-free problem when wakeup a waiter
general protection fault in inet6_set_link_af C 1 1904d 1904d 1/2 1288d 036ecba2eb99 ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
BUG: unable to handle kernel paging request in do_xdp_generic C 189 1890d 1920d 1/2 1288d 747d5bcb97eb tun: correct header offsets in napi frags mode
KASAN: use-after-free Read in eth_header_parse_protocol C 532 1468d 1497d 1/2 1288d 599200ad44e7 net: ensure mac header is set in virtio_net_hdr_to_skb()
KASAN: use-after-free Write in smsc95xx_mdio_read syz 2 1776d 1776d 1/2 1748d ab9ee18f4646 usbnet: smsc95xx: Fix use-after-free after removal