syzbot


Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
kernel BUG in __es_remove_extent (2) -1 C 2 443d 597d 2/2 441d d0083459e2b6 ext4: fix bug_on in __es_tree_search
KASAN: use-after-free Read in get_max_inline_xattr_value_size ext4 19 C 20 925d 1005d 2/2 852d 8aad0253b5e6 ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop
kernel BUG in ext4_write_inline_data -1 C 3 1028d 1065d 2/2 915d 21086923c1e6 UPSTREAM: ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
KASAN: use-after-free Read in do_garbage_collect 19 C 4 1052d 1082d 2/2 916d e5142a4935c1 f2fs: fix to do sanity check on i_extra_isize in is_alive()
kernel BUG in __skb_gso_segment -1 C 1 1027d 1027d 2/2 922d de2ea2a0ad51 net/af_packet: make sure to pull mac header
kernel BUG in ext4_write_inline_data_end -1 C 4 1179d 1313d 2/2 1105d 18881d7e5171 ext4: fix race condition between ext4_write and ext4_convert_inline_data
kernel BUG in notify_change -1 C 18 1139d 1682d 2/2 1112d def19b1cf16c ANDROID: incfs: Add check for ATTR_KILL_SUID and ATTR_MODE in incfs_setattr
kernel BUG in ext4_ind_remove_space -1 C 1 1356d 1356d 2/2 1216d 259dc49deaa2 ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
general protection fault in incfs_kill_sb 2 C 2965 1306d 1340d 2/2 1266d b730087e9a5d ANDROID: incremental-fs: limit mount stack depth
KASAN: use-after-free Read in firmware_fallback_sysfs 19 C 2349 1446d 1997d 1/2 1446d d09639528b66 firmware_loader: fix use-after-free in firmware_fallback_sysfs
BUG: unable to handle kernel paging request in csum_partial 8 C 5 1501d 2082d 1/2 1446d 53b480e68c1c ip_gre: add validation for csum_start
KASAN: slab-out-of-bounds Write in snd_usb_mixer_interrupt 23 C 4 1925d 1935d 1/2 1454d 25e1bb1e6c36 ALSA: usb-audio: Fix OOB access of mixer element list
KASAN: use-after-free Read in ax88172a_unbind 19 C 38 1897d 2012d 1/2 1454d d0d394c71604 ax88172a: fix ax88172a_unbind() failures
KASAN: use-after-free Read in usbhid_close 19 syz 1 2003d 2003d 1/2 1454d 613045bfc63d HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
KASAN: slab-out-of-bounds Write in hiddev_ioctl_usage 23 C 4 1988d 2008d 1/2 1454d 851d0813ab80 HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage()
general protection fault in path_openat 2 syz 26 2069d 2076d 1/2 1455d 2c38e6140126 vfs: fix do_last() regression
general protection fault in nf_ct_netns_do_get 2 C 10 2095d 2096d 1/2 1455d 503ff0dcfba7 netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
KASAN: use-after-free Read in locks_delete_block 19 C 3 2042d 2095d 1/2 1455d 384e15fc4226 locks: fix a potential use-after-free problem when wakeup a waiter
general protection fault in inet6_set_link_af 2 C 1 2070d 2070d 1/2 1455d 036ecba2eb99 ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
BUG: unable to handle kernel paging request in do_xdp_generic 8 C 189 2057d 2087d 1/2 1455d 747d5bcb97eb tun: correct header offsets in napi frags mode
KASAN: use-after-free Read in eth_header_parse_protocol 19 C 532 1635d 1664d 1/2 1455d 599200ad44e7 net: ensure mac header is set in virtio_net_hdr_to_skb()
KASAN: use-after-free Write in smsc95xx_mdio_read 24 syz 2 1943d 1943d 1/2 1915d ab9ee18f4646 usbnet: smsc95xx: Fix use-after-free after removal