syzbot


Applied filters: Label=subsystems:input (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
WARNING in asus_remove input usb -1 C 59 58m 37d 2/29 never HID: asus: Add check for cancelling fn_lock_sync_work
KASAN: stack-out-of-bounds Read in cp2112_xfer input 17 C error 8 144d 173d 29/29 110d 362f21536966 HID: cp2112: Add parameter validation to data length
KASAN: slab-out-of-bounds Read in mcp2221_raw_event input usb 19 C 1144 150d 456d 29/29 150d b56cc41a3ae7 hid: fix I2C read buffer overflow in raw_event() for mcp2221
WARNING in follow_page_pte input usb mm -1 C done 6 214d 214d 29/29 150d cf1b80dc31a1 mm: pass page directly instead of using folio_page
UBSAN: shift-out-of-bounds in s32ton (2) input usb -1 C 4 229d 236d 29/29 184d a6b87bfc2ab5 HID: core: Harden s32ton() against conversion to 0 bits
UBSAN: shift-out-of-bounds in __kfifo_alloc input usb -1 C 33349 274d 342d 29/29 243d 6bf8ab7774a2 HID: wacom: fix shift OOB in kfifo allocation for zero pktlen
KASAN: slab-use-after-free Read in steam_input_open input usb 19 C done 5 365d 378d 28/29 270d e53fc232a65f HID: hid-steam: Fix use-after-free when detaching device
WARNING in input_mt_init_slots input -1 C inconclusive 14301 572d 1882d 28/29 503d 99d3bf5f7377 Input: MT - limit max slots 206f533a0a7c Input: uinput - reject requests with unreasonable number of slots
KASAN: slab-out-of-bounds Read in cougar_report_fixup input usb 17 C 31 551d 585d 28/29 520d a6e9c391d45b HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
WARNING in implement input usb -1 C error done 960 635d 2364d 26/29 584d 4aa2dcfbad53 HID: core: remove unnecessary WARN_ON() in implement()
WARNING in hid_output_report usb input -1 C error 3 651d 671d 26/29 606d 4aa2dcfbad53 HID: core: remove unnecessary WARN_ON() in implement() fba383985354 net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings
KMSAN: uninit-value in asus_report_fixup input usb 17 C done 35 628d 652d 26/29 606d 89e1ee118d6f hid: asus: asus_report_fixup: fix potential read out of bounds
WARNING in bcm5974_start_traffic/usb_submit_urb input -1 C error 41 716d 2312d 25/29 711d 2b9c3eb32a69 Input: bcm5974 - check endpoint type before starting traffic
KASAN: use-after-free Read in powermate_config_complete (4) input 19 syz done unreliable 14 912d 1284d 25/29 808d 5c15c60e7be6 Input: powermate - fix use-after-free in powermate_config_complete
KASAN: slab-use-after-free Read in input_dev_uevent input 19 C done 7 918d 929d 23/29 878d dd613a4e45f8 HID: uclogic: Correct devm device reference for hidinput input_dev name
INFO: rcu detected stall in uinput_write input 1 1 958d 958d 23/29 878d 8c21ab1bae94 net/sched: fq_pie: avoid stalls in fq_pie_timer()
WARNING in pegasus_open/usb_submit_urb input usb -1 C 7 1084d 2095d 22/29 1003d b3d80fd27a3c Input: pegasus-notetaker - check pipe type when probing
KASAN: slab-out-of-bounds Read in thrustmaster_probe usb input 17 C unreliable 92 1453d 1476d 22/29 1108d fc3ef2e3297b HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts
UBSAN: shift-out-of-bounds in hid_report_raw_event (2) input usb -1 C error 1 1212d 1208d 22/29 1108d ec61b4191858 HID: core: fix shift-out-of-bounds in hid_report_raw_event
KMSAN: uninit-value in iforce_init_device (2) input 7 3 1243d 1217d 22/29 1108d b8ebf250997c Input: iforce - invert valid length check when fetching device IDs
memory leak in hidraw_report_event input usb 3 C 1 1383d 1382d 22/29 1108d a5623a203cff HID: hidraw: fix memory leak in hidraw_release()
WARNING in driver_unregister input usb -1 C 1 1385d 1381d 22/29 1108d f2d8c2606825 usb: gadget: Fix non-unique driver names in raw-gadget driver
WARNING in aiptek_open/usb_submit_urb usb input -1 C error 2380 1444d 2466d 22/29 1108d 5600f6986628 Input: aiptek - properly check endpoint type
INFO: task hung in __input_unregister_device (4) usb input 1 C done 924 1280d 1345d 22/29 1108d 98e01215708b Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag
KASAN: slab-out-of-bounds Write in betop_probe input usb 21 C unreliable 9 1661d 2217d 20/29 1452d 689e453a9b9c HID: betop: fix slab-out-of-bounds Write in betop_probe HID: betop: fix slab-out-of-bounds Write in betop_probe
WARNING in atp_close (3) input -1 C 125 1524d 1617d 20/29 1460d 9f3ccdc3f6ef Input: appletouch - initialize work before device registration
WARNING: ODEBUG bug in corrupted (2) usb input -1 C error 2 1530d 1741d 20/29 1460d 33812fc7c8d7 HID: magicmouse: Fix an error handling path in magicmouse_probe()
WARNING in hid_submit_ctrl/usb_submit_urb input usb -1 C done 38 1645d 1693d 20/29 1579d 0a824efdb724 HID: usbhid: Fix warning caused by 0-length input reports
general protection fault in magicmouse_remove usb input 2 C 47 1729d 1756d 20/29 1579d 4b4f6cecca44 HID: magicmouse: fix NULL-deref on disconnect
memory leak in __usbhid_submit_report input usb 3 C 129 1649d 1943d 20/29 1579d f7744fa16b96 HID: usbhid: free raw_report buffers in usbhid_stop
KMSAN: kernel-usb-infoleak in hid_submit_ctrl input usb 9 C 839 1753d 2361d 20/29 1579d 6be388f4a35d HID: usbhid: fix info leak in hid_submit_ctrl
WARNING in input_register_device input usb -1 C error done 11 1796d 1948d 20/29 1579d b4104180a2ef kobject_uevent: remove warning in init_uevent_argv()
UBSAN: shift-out-of-bounds in snto32 input usb -1 C error 58 1838d 1910d 20/29 1793d a0312af1f94d HID: core: detect and skip invalid inputs to snto32()
unexpected kernel reboot (3) input usb -1 C error error 21132 1793d 2794d 20/29 1793d c8e2fe13d1d1 x86/perf: Use RET0 as default for guest_get_msrs to handle "no PMU" case
memory leak in wacom_probe input usb 3 C 26 1887d 1941d 19/29 1824d 37309f47e2f5 HID: wacom: Fix memory leakage caused by kfifo_alloc
WARNING in cm109_input_ev/usb_submit_urb input usb -1 C unreliable 8 1913d 1933d 19/29 1824d 82e060904732 Input: cm109 - do not stomp on control URB
INFO: trying to register non-static key in uhid_dev_destroy input -1 C unreliable done 40 2020d 2192d 15/29 1938d bce1305c0ece HID: core: Correctly handle ReportSize being zero
KASAN: slab-out-of-bounds Write in hiddev_ioctl_usage input usb 21 C 279 2017d 2361d 15/29 1990d 25a097f52046 HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage()
BUG: corrupted list in mousedev_release input 8 syz done 5 2013d 2015d 15/29 1990d 77f4689de17c fix regression in "epoll: Keep a reference on files added to the check list"
INFO: task hung in locks_remove_posix fs input usb 1 syz 2231 2095d 2117d 15/29 2059d 187b96db5ca7 x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks
KASAN: use-after-free Read in usbhid_close (3) input usb 19 C 6 2133d 2160d 15/29 2059d 0ed08faded1d HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
KASAN: use-after-free Write in hiddev_disconnect input usb 22 20 2180d 2245d 15/29 2152d 5c02c447eaed HID: hiddev: Fix race in in hiddev_disconnect()
general protection fault in timer_is_static_object input 2 C 2 2293d 2291d 15/29 2209d cb222aed03d7 Input: add safety guards to input_set_keycode()
BUG: spinlock already unlocked in input_set_keycode input 4 C 2 2303d 2301d 15/29 2209d cb222aed03d7 Input: add safety guards to input_set_keycode()
KASAN: slab-out-of-bounds Read in hid_field_extract input usb 17 C 6 2250d 2284d 15/29 2209d 8ec321e96e05 HID: Fix slab-out-of-bounds read in hid_field_extract
KASAN: global-out-of-bounds Write in kbd_event usb serial input 21 C 6 2291d 2313d 15/29 2277d b2b2dd71e085 tty: vt: keyboard: reject invalid keycodes
WARNING: ODEBUG bug in input_ff_destroy input usb -1 C 6 2299d 2307d 14/29 2290d fa3a5a1880c9 Input: ff-memless - kill timer in destroy()
KMSAN: uninit-value in lg4ff_set_autocenter_default input usb 7 C 1 2323d 2323d 13/29 2293d d9d4b1e46d95 HID: Fix assumption that devices have inputs
KASAN: slab-out-of-bounds Write in ga_probe input 21 C 5 2343d 2365d 13/29 2314d d9d4b1e46d95 HID: Fix assumption that devices have inputs
general protection fault in pk_probe input usb 2 C 2 2381d 2378d 13/29 2335d 98375b86c791 HID: prodikeys: Fix general protection fault during probe
WARNING: ODEBUG bug in usbhid_disconnect (2) input usb -1 C 48 2355d 2378d 13/29 2335d 2bcdacb70327 HID: sony: Fix memory corruption issue on cleanup.
general protection fault in __pm_runtime_resume input usb pm 2 C 197 2356d 2419d 13/29 2335d 5f9242775bb6 HID: logitech: Fix general protection fault caused by Logitech driver
KASAN: slab-out-of-bounds Read in hidraw_ioctl input 17 C 104 2362d 2413d 13/29 2335d 416dacb819f5 HID: hidraw: Fix invalid read in hidraw_ioctl
WARNING in __iforce_usb_xmit/usb_submit_urb input usb -1 C 3 2402d 2407d 12/29 2374d 849f5ae3a513 Input: iforce - add sanity checks
WARNING in usbtouch_open input usb -1 C 768 2400d 2413d 12/29 2374d b55d996f057b Input: usbtouchscreen - initialize PM mutex before using it
general protection fault in holtek_kbd_input_event input 2 C 67 2405d 2418d 12/29 2384d 01ec0a5f19c8 HID: holtek: test for sanity of intfdata
KASAN: use-after-free Read in hiddev_release input usb 19 C 11 2395d 2410d 12/29 2384d 9c09b214f30e HID: hiddev: avoid opening a disconnected device 6d4472d7bec3 HID: hiddev: do cleanup in failure of opening a device
KASAN: use-after-free Read in string input 19 C 247 2503d 2742d 12/29 2458d c03a0fd0b609 kobject: Don't trigger kobject_uevent(KOBJ_REMOVE) twice.
BUG: GPF in non-whitelisted uaccess (non-canonical address?) input -1 C 10 2666d 2673d 11/29 2648d 8c01db7619f0 HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges
KMSAN: uninit-value in synaptics_detect input 7 C 137 2672d 2725d 11/29 2672d f39f8688888a Input: synaptics - avoid using uninitialized variable when probing
WARNING: kmalloc bug in input_mt_init_slots input -1 C 54 2691d 2724d 11/29 2672d 61448479a9f2 mm: don't warn about large allocations for slab
INFO: rcu detected stall in mousedev_write input 1 18 2739d 2753d 11/29 2697d f74c371fe72a Input: mousedev - add a schedule point in mousedev_write()
WARNING in input_alloc_absinfo input -1 C 318 2751d 2824d 8/29 2748d 100294cee9a9 Input: do not use WARN() in input_alloc_absinfo()
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected input -1 C 2126 2861d 2876d 5/29 2860d 6c1e851c4edc random: fix possible sleeping allocation from irq context