syzbot


Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
kernel BUG in __es_remove_extent (2) -1 C 2 588d 742d 2/2 586d d0083459e2b6 ext4: fix bug_on in __es_tree_search
KASAN: use-after-free Read in get_max_inline_xattr_value_size ext4 19 C 20 1070d 1149d 2/2 997d 8aad0253b5e6 ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop
kernel BUG in ext4_write_inline_data -1 C 3 1173d 1210d 2/2 1060d 21086923c1e6 UPSTREAM: ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
KASAN: use-after-free Read in do_garbage_collect 19 C 4 1197d 1227d 2/2 1061d e5142a4935c1 f2fs: fix to do sanity check on i_extra_isize in is_alive()
kernel BUG in __skb_gso_segment -1 C 1 1172d 1172d 2/2 1067d de2ea2a0ad51 net/af_packet: make sure to pull mac header
kernel BUG in ext4_write_inline_data_end -1 C 4 1324d 1457d 2/2 1250d 18881d7e5171 ext4: fix race condition between ext4_write and ext4_convert_inline_data
kernel BUG in notify_change -1 C 18 1283d 1827d 2/2 1257d def19b1cf16c ANDROID: incfs: Add check for ATTR_KILL_SUID and ATTR_MODE in incfs_setattr
kernel BUG in ext4_ind_remove_space -1 C 1 1500d 1500d 2/2 1361d 259dc49deaa2 ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
general protection fault in incfs_kill_sb 2 C 2965 1451d 1485d 2/2 1411d b730087e9a5d ANDROID: incremental-fs: limit mount stack depth
KASAN: use-after-free Read in firmware_fallback_sysfs 19 C 2349 1591d 2141d 1/2 1591d d09639528b66 firmware_loader: fix use-after-free in firmware_fallback_sysfs
BUG: unable to handle kernel paging request in csum_partial 8 C 5 1646d 2227d 1/2 1591d 53b480e68c1c ip_gre: add validation for csum_start
KASAN: slab-out-of-bounds Write in snd_usb_mixer_interrupt 21 C 4 2070d 2080d 1/2 1599d 25e1bb1e6c36 ALSA: usb-audio: Fix OOB access of mixer element list
KASAN: use-after-free Read in ax88172a_unbind 19 C 38 2042d 2157d 1/2 1599d d0d394c71604 ax88172a: fix ax88172a_unbind() failures
KASAN: use-after-free Read in usbhid_close 19 syz 1 2148d 2148d 1/2 1599d 613045bfc63d HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
KASAN: slab-out-of-bounds Write in hiddev_ioctl_usage 21 C 4 2133d 2153d 1/2 1599d 851d0813ab80 HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage()
general protection fault in path_openat 2 syz 26 2214d 2221d 1/2 1600d 2c38e6140126 vfs: fix do_last() regression
general protection fault in nf_ct_netns_do_get 2 C 10 2240d 2240d 1/2 1600d 503ff0dcfba7 netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
KASAN: use-after-free Read in locks_delete_block 19 C 3 2187d 2240d 1/2 1600d 384e15fc4226 locks: fix a potential use-after-free problem when wakeup a waiter
general protection fault in inet6_set_link_af 2 C 1 2215d 2215d 1/2 1600d 036ecba2eb99 ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
BUG: unable to handle kernel paging request in do_xdp_generic 8 C 189 2202d 2232d 1/2 1600d 747d5bcb97eb tun: correct header offsets in napi frags mode
KASAN: use-after-free Read in eth_header_parse_protocol 19 C 532 1779d 1809d 1/2 1600d 599200ad44e7 net: ensure mac header is set in virtio_net_hdr_to_skb()
KASAN: use-after-free Write in smsc95xx_mdio_read 22 syz 2 2087d 2087d 1/2 2060d ab9ee18f4646 usbnet: smsc95xx: Fix use-after-free after removal