syzbot


Applied filters: Label=subsystems:bluetooth (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KASAN: invalid-free in hci_req_sync_complete bluetooth syz 179 97d 171d 1/28 never Bluetooth: Fix double free in hci_req_sync_complete
KASAN: slab-use-after-free Read in l2cap_connect (2) bluetooth C done 8 18d 107d 9/28 never Bluetooth: L2CAP: Fix uaf in l2cap_connect
possible deadlock in rfcomm_sk_state_change bluetooth C done 22637 3h38m 1123d 1/28 never Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
WARNING in hci_conn_timeout bluetooth C done 5801 14h57m 1530d 1/28 never Bluetooth: hci_conn: Use disable_delayed_work_sync
BUG: workqueue leaked atomic, lock or RCU: kworker/u33:NUM[NUM] bluetooth C 13 63d 76d 28/28 6d22h c531e63871c0 Bluetooth: l2cap: always unlock channel in l2cap_conless_channel()
WARNING in __hci_cmd_sync_sk bluetooth syz 36 77d 93d 27/28 54d f1a8f402f13f Bluetooth: L2CAP: Fix deadlock
WARNING in btusb_submit_intr_urb/usb_submit_urb usb bluetooth C error 2 95d 106d 27/28 57d a368ecde8a50 USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
general protection fault in l2cap_sock_recv_cb bluetooth C inconclusive 8 99d 125d 26/28 65d 89e856e124f9 bluetooth/l2cap: sync sock recv cb and release
possible deadlock in __flush_workqueue bluetooth 1456 67d 267d 26/28 65d 0d151a103775 Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
WARNING in hci_conn_del bluetooth C done 10497 93d 225d 26/28 65d 015d79c96d62 Bluetooth: Ignore too large handle values in BIG 1cc18c2ab2e8 bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX
BUG: soft lockup in hci_cmd_timeout bluetooth usb C 1 124d 120d 26/28 92d 22f008128625 USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
general protection fault in btintel_read_version bluetooth C error 5 256d 267d 25/28 183d b79e04091010 Bluetooth: btintel: Fix null ptr deref in btintel_read_version
KASAN: slab-use-after-free Write in __hci_acl_create_connection_sync bluetooth C done 87 234d 245d 25/28 183d 5f641f03abcc Bluetooth: hci_conn: Fix UAF Write in __hci_acl_create_connection_sync
memory leak in corrupted bluetooth syz 536 196d 268d 25/28 195d 0a186b49bba5 batman-adv: mcast: fix memory leak on deleting a batman-adv interface
KASAN: null-ptr-deref Read in ida_free (4) bluetooth C done done 29 291d 330d 25/28 238d af73483f4e8b ida: Fix crash in ida_free when the bitmap is empty
possible deadlock in hci_rfkill_set_block bluetooth C done 3391 279d 352d 25/28 248d 769bf60e17ee Bluetooth: Fix deadlock in vhci_send_frame
KASAN: slab-out-of-bounds Read in create_monitor_event bluetooth C done 952 352d 367d 25/28 294d 18f547f3fc07 Bluetooth: hci_sock: fix slab oob read in create_monitor_event
BUG: sleeping function called from invalid context in __hci_cmd_sync_sk bluetooth C done 34 363d 481d 25/28 294d acab8ff29a2a Bluetooth: ISO: Fix invalid context error
general protection fault in sco_conn_add bluetooth C done 4 449d 459d 23/28 364d b4066eb04bb6 Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link
KASAN: slab-use-after-free Write in sco_chan_del bluetooth C done 19 380d 514d 23/28 364d 3344d318337d Bluetooth: hci_conn: fail SCO/ISO via hci_conn_failed if ACL gone early
INFO: rcu detected stall in hci_cmd_timeout bluetooth 1 426d 426d 23/28 364d 8c21ab1bae94 net/sched: fq_pie: avoid stalls in fq_pie_timer()
KASAN: slab-use-after-free Read in hci_conn_del bluetooth 7 503d 527d 22/28 466d ca1fd42e7dbf Bluetooth: Fix potential double free caused by hci_conn_unlink
possible deadlock in sco_conn_del bluetooth C done done 279 513d 916d 22/28 466d a2ac591cb4d8 Bluetooth: Fix UAF in hci_conn_hash_flush again
KASAN: slab-use-after-free Read in hci_conn_hash_flush bluetooth C error 3511 492d 586d 22/28 466d a2ac591cb4d8 Bluetooth: Fix UAF in hci_conn_hash_flush again ca1fd42e7dbf Bluetooth: Fix potential double free caused by hci_conn_unlink
INFO: task hung in rfcomm_process_sessions (2) bluetooth C error done 14 651d 925d 22/28 489d 1d80d57ffcb5 Bluetooth: Fix possible deadlock in rfcomm_sk_state_change
WARNING: bad unlock balance in l2cap_recv_frame bluetooth 75 532d 544d 22/28 489d 25e97f7b1866 Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp
KASAN: use-after-free Read in mgmt_pending_remove bluetooth C unreliable 9 765d 785d 22/28 593d 3cfbc6ac22d6 Bluetooth: hci_sync: fix double mgmt_pending_free() in remove_adv_monitor() Bluetooth: hci_sync: fix double mgmt_pending_free() in remove_adv_monitor()
WARNING: ODEBUG bug in mgmt_index_removed bluetooth 1 767d 763d 22/28 593d f74ca25d6d66 Bluetooth: avoid hci_dev_test_and_set_flag() in mgmt_init_hdev()
KASAN: use-after-free Write in sco_sock_timeout bluetooth C done 272 868d 1140d 22/28 593d 7aa1e7d15f8a Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout
INFO: task hung in hci_dev_close_sync bluetooth C unreliable 2366 735d 890d 22/28 593d e36bea6e78ab Bluetooth: core: Fix deadlock on hci_power_on_sync.
BUG: corrupted list in hci_conn_add_sysfs bluetooth C error done 9 748d 747d 22/28 593d 448a496f7606 Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times
WARNING: ODEBUG bug in __cancel_work bluetooth C inconclusive 1 787d 783d 22/28 593d 2d2cb3066f2c Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create()
upstream test error: WARNING: ODEBUG bug in mgmt_index_removed bluetooth 551 790d 798d 22/28 593d 3f2893d3c142 Bluetooth: don't try to cancel uninitialized works at mgmt_index_removed()
memory leak in vhci_write bluetooth C 1 786d 782d 22/28 593d 7c9524d92964 Bluetooth: L2CAP: Fix memory leak in vhci_write
INFO: trying to register non-static key in hci_uart_flush (2) bluetooth syz error error 37 721d 1863d 22/28 593d 3124d320c22f Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure
WARNING: ODEBUG bug in bt_host_release bluetooth syz done done 7 1276d 1529d 22/28 751d e2cb6b891ad2 bluetooth: eliminate the potential race condition when removing the HCI controller
general protection fault in hci_inquiry_result_with_rssi_evt bluetooth C done 17 1007d 1032d 20/28 875d 72279d17df54 Bluetooth: hci_event: Rework hci_inquiry_result_with_rssi_evt
KASAN: slab-out-of-bounds Read in add_adv_patterns_monitor bluetooth C error done 5 1330d 1350d 20/28 881d b4a221ea8a1f Bluetooth: advmon offload MSFT add rssi support
INFO: trying to register non-static key in l2cap_sock_teardown_cb bluetooth C done done 88 1075d 1378d 20/28 946d 1bff51ea59a9 Bluetooth: fix use-after-free error in lock_sock_nested()
KASAN: null-ptr-deref Write in l2cap_chan_put bluetooth syz done done 7 1079d 1524d 20/28 946d 1bff51ea59a9 Bluetooth: fix use-after-free error in lock_sock_nested()
memory leak in mgmt_cmd_complete bluetooth C 3 1142d 1242d 20/28 946d 709fca500067 Bluetooth: hci_sock: purge socket queues in the destruct() callback
KASAN: slab-out-of-bounds Read in hci_le_meta_evt (2) bluetooth C inconclusive 2 1075d 1074d 20/28 946d 3a56ef719f0b Bluetooth: stop proccessing malicious adv data
BUG: sleeping function called from invalid context in lock_sock_nested (2) bluetooth C done error 19391 1156d 1691d 20/28 1065d e04480920d1e Bluetooth: defer cleanup of resources in hci_unregister_dev() Bluetooth: defer cleanup of resources in hci_unregister_dev()
INFO: trying to register non-static key in l2cap_chan_del bluetooth syz inconclusive 73 1308d 1526d 20/28 1065d 3af70b39fa2d Bluetooth: check for zapped sk before connecting
inconsistent lock state in sco_sock_timeout bluetooth C done 16 1170d 1514d 20/28 1065d ba316be1b6a0 Bluetooth: schedule SCO timeouts with delayed_work
general protection fault in hci_release_dev bluetooth C done 41 1144d 1165d 20/28 1065d e04480920d1e Bluetooth: defer cleanup of resources in hci_unregister_dev()
INFO: trying to register non-static key in skb_dequeue bluetooth C error 28951 1250d 1531d 20/28 1065d be8597239379 Bluetooth: initialize skb_queue_head at l2cap_chan_create()
BUG: corrupted list in kobject_add_internal (3) bluetooth C inconclusive 3 1101d 1205d 20/28 1065d 92fe24a7db75 Bluetooth: skip invalid hci_sync_conn_complete_evt
KASAN: use-after-free Read in hci_send_acl bluetooth C done 2 1319d 1529d 20/28 1065d 5c4c8c954409 Bluetooth: verify AMP hci_chan before amp_destroy
INFO: task hung in hci_req_sync bluetooth C inconclusive 1 1159d 1155d 20/28 1065d f41a4b2b5eb7 Bluetooth: add timeout sanity check to hci_inquiry
KASAN: null-ptr-deref Write in amp_read_loc_assoc_final_data bluetooth C done 185 1330d 1531d 20/28 1279d e8bd76ede155 Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
KASAN: slab-out-of-bounds Read in hci_le_meta_evt bluetooth C error error 45 1408d 1528d 19/28 1310d f7e0e8b2f1b0 Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
memory leak in h5_rx_pkt_start bluetooth C 5 1507d 1850d 19/28 1310d 70f259a3f427 Bluetooth: hci_h5: close serdev device and free hu in h5_close 855af2d74c87 Bluetooth: hci_h5: fix memory leak in h5_close
KASAN: use-after-free Write in __sco_sock_close bluetooth C done done 10 1431d 1529d 19/28 1310d 6dfccd13db2f Bluetooth: Fix null pointer dereference in hci_event_packet()
general protection fault in hci_event_packet bluetooth C done 25 1476d 1529d 19/28 1310d 6dfccd13db2f Bluetooth: Fix null pointer dereference in hci_event_packet()
BUG: corrupted list in kobject_add_internal bluetooth C done done 9 1461d 1524d 15/28 1424d a46b7ed4d52d Bluetooth: Fix auto-creation of hci_conn at Conn Complete event
WARNING: refcount bug in do_enable_set bluetooth C inconclusive done 8 1526d 1636d 15/28 1424d b83764f9220a Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
KASAN: use-after-free Write in refcount_warn_saturate bluetooth C inconclusive done 2 1527d 1686d 15/28 1424d b83764f9220a Bluetooth: Fix kernel oops triggered by hci_adv_monitors_clear()
memory leak in read_adv_mon_features bluetooth C 2 1493d 1516d 15/28 1424d cafd472a10ff Bluetooth: Fix memory leak in read_adv_mon_features()
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt bluetooth C 16 1528d 1555d 15/28 1484d 51c19bf3d5cf Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt bluetooth C error 9 1529d 1549d 15/28 1484d 629b49c848ee Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
WARNING: ODEBUG bug in rfcomm_dev_ioctl bluetooth 1 1678d 1678d 15/28 1614d 71811cac8532 Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
linux-next test error: KASAN: use-after-free Read in l2cap_sock_release bluetooth 12 1708d 1710d 15/28 1614d 2a154903cec2 Bluetooth: prefetch channel before killing sock
KASAN: use-after-free Write in hci_sock_bind bluetooth 4 1697d 1730d 15/28 1695d 11eb85ec42dc Bluetooth: Fix race condition in hci_release_sock()
KMSAN: use-after-free in kfree_skb bluetooth syz 34 1780d 1828d 15/28 1763d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
KMSAN: use-after-free in skb_dequeue bluetooth C 1 1823d 1823d 15/28 1763d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
KASAN: invalid-free in skb_free_head bluetooth C done 1 1805d 1804d 15/28 1763d cf94da6f502d Bluetooth: Fix invalid-free in bcsp_close()
general protection fault in qca_setup bluetooth C done done 6 2068d 2067d 13/28 1796d b36a1552d731 Bluetooth: hci_uart: check for missing tty operations
BUG: unable to handle kernel NULL pointer dereference in hci_uart_set_flow_control bluetooth C done 7 2029d 2029d 12/28 1884d b36a1552d731 Bluetooth: hci_uart: check for missing tty operations
memory leak in bcsp_recv bluetooth C 3 1937d 1964d 12/28 1892d 4ce9146e0370 Bluetooth: hci_bcsp: Fix memory leak in rx_skb
WARNING in lockdep_unregister_key bluetooth C done 214 2026d 2039d 11/28 2019d 82efcab3b9f3 workqueue: Only unregister a registered lockdep key
general protection fault in hci_uart_write_work bluetooth C 84 2047d 2095d 11/28 2023d 32a7b4cbe93b Bluetooth: hci_ldisc: Initialize hci_dev before open()
KASAN: use-after-free Read in h5_reset_rx bluetooth 2 2053d 2059d 11/28 2023d 56897b217a1d Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
BUG: unable to handle kernel paging request in h4_recv_buf bluetooth C 203 2046d 2108d 11/28 2023d 1dc2d785156c Bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf()