syzbot


Applied filters: Label=subsystems:ocfs2 (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KASAN: use-after-free Read in ocfs2_check_dir_entry ocfs2 19 C error 6 24d 52d 2/29 never ocfs2: validate inline data i_size during inode read
kernel BUG in ocfs2_remove_refcount_tree ocfs2 -1 C error 6 56d 55d 2/29 never ocfs2: validate i_refcount_loc when refcount flag is set
UBSAN: array-index-out-of-bounds in __ocfs2_find_path ocfs2 15 C inconclusive 10 16d 48d 2/29 never ocfs2: fix oob in __ocfs2_find_path
KASAN: use-after-free Read in ocfs2_search_dirblock ocfs2 19 C inconclusive 14 387d 534d 1/29 never ocfs2: fix directory entry check in ocfs2_search_dirblock()
possible deadlock in ocfs2_acquire_dquot ocfs2 4 C 71841 47d 489d 2/29 never ocfs2: fix circular locking dependency in ocfs2_acquire_dquot
UBSAN: array-index-out-of-bounds in ocfs2_xa_remove_entry ocfs2 15 C 58 7h31m 52d 2/29 never ocfs2: adjust ocfs2_xa_remove_entry() to match UBSAN boundary checks
kernel BUG in ocfs2_write_block ocfs2 -1 C inconclusive 29 26d 500d 2/29 never ocfs2: add validate function for slot map blocks
kernel BUG in ocfs2_move_extents ocfs2 -1 C 122 56m 45d 2/29 never ocfs2: add check for free bits before allocation in ocfs2_move_extent()
possible deadlock in dqget ocfs2 ext4 4 C error 100357 34d 488d 29/29 25d 524c3853831c jbd2: use a per-journal lock_class_key for jbd2_trans_commit_key
general protection fault in ocfs2_prepare_dir_for_insert (2) ocfs2 8 C error 20 57d 237d 29/29 25d aa5b6a72ccd9 ocfs2: add directory size check to ocfs2_find_dir_space_id()
KASAN: use-after-free Read in ocfs2_dir_foreach_blk ocfs2 19 C error 115 51d 492d 29/29 25d 390ac56cf0f6 ocfs2: add boundary check to ocfs2_check_dir_entry()
KASAN: use-after-free Read in ocfs2_claim_suballoc_bits ocfs2 19 C inconclusive 326 55d 528d 29/29 25d e1c70505ee81 ocfs2: add extra consistency checks for chain allocator dinodes
kernel BUG in ocfs2_truncate_file ocfs2 -1 C 179 52d 496d 29/29 25d 58b6fcd2ab34 ocfs2: mark inode bad upon validation failure during read
UBSAN: array-index-out-of-bounds in ocfs2_block_group_fill ocfs2 15 C done 6 108d 109d 29/29 25d e1c70505ee81 ocfs2: add extra consistency checks for chain allocator dinodes
kernel BUG in __ocfs2_move_extent ocfs2 -1 C 16 103d 117d 29/29 25d 8a7d58845fae ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()
kernel BUG in ocfs2_commit_truncate ocfs2 -1 C inconclusive 8 71d 413d 29/29 25d a2b1c419ff72 ocfs2: add inline inode consistency check to ocfs2_validate_inode_block()
KASAN: use-after-free Read in ocfs2_dx_dir_lookup_rec ocfs2 19 C 14 69d 126d 29/29 25d 1b34743c31fe ocfs2: add extra consistency check to ocfs2_dx_dir_lookup_rec()
kernel BUG in ocfs2_remove_btree_range (2) ocfs2 -1 C 5 60d 66d 29/29 25d 4ac577ae741e ocfs2: check tl_used after reading it from trancate log inode
WARNING in ocfs2_unlink ocfs2 -1 C inconclusive 139 50d 383d 29/29 25d 7efb45f9685f ocfs2: invalidate inode if i_mode is zero after block read
memory leak in ocfs2_new_path_from_path ocfs2 3 C 5 51d 86d 29/29 25d 2214ec4bf89d ocfs2: fix memory leak in ocfs2_merge_rec_left()
kernel BUG in ocfs2_claim_suballoc_bits ocfs2 -1 C inconclusive 1706 48d 528d 29/29 25d 039bef30e320 ocfs2: fix kernel BUG in ocfs2_find_victim_chain
KASAN: use-after-free Read in ocfs2_listxattr ocfs2 19 C 5 70d 82d 29/29 25d 2a4f33430e96 ocfs2: validate inline xattr size and entry count in ocfs2_xattr_ibody_list
divide error in ocfs2_block_group_fill (3) ocfs2 2 C 3 98d 105d 29/29 25d 93ce0ff117b0 ocfs2: validate cl_bpc in allocator inodes to prevent divide-by-zero
kernel BUG in ocfs2_refcount_cal_cow_clusters ocfs2 -1 C 8 102d 120d 29/29 75d 78a63493f8e3 ocfs2: clear extent cache after moving/defragmenting extents
KASAN: use-after-free Read in ocfs2_get_system_file_inode ocfs2 19 C done 5 161d 160d 29/29 94d fe7a283b3916 ocfs2: add suballoc slot check in ocfs2_validate_inode_block()
general protection fault in ocfs2_evict_inode (2) ocfs2 2 C error 68 159d 166d 29/29 94d f46e8ef8bb7b ocfs2: prevent release journal inode after journal shutdown
INFO: task hung in ocfs2_page_mkwrite (2) ocfs2 1 C error 4 164d 164d 29/29 94d 04100f775c2e ocfs2: fix recursive semaphore deadlock in fiemap call
BUG: unable to handle kernel paging request in ocfs2_unlock_and_free_folios ocfs2 8 C 141 174d 231d 29/29 150d 2ae826799932 ocfs2: reset folio to NULL when get folio fails
possible deadlock in __ocfs2_flush_truncate_log ocfs2 4 C inconclusive 3410 174d 323d 29/29 150d 08eabe4b9e98 ocfs2: avoid potential ABBA deadlock by reordering tl_inode lock
KASAN: slab-out-of-bounds Read in ocfs2_dx_dir_lookup_rec ocfs2 19 C 76 150d 430d 29/29 150d 44acc46d182f ocfs2: avoid NULL pointer dereference in dx_dir_lookup_rec()
possible deadlock in deactivate_super (2) ocfs2 4 C inconclusive done 8072 266d 364d 29/29 192d fcaf3b2683b0 ocfs2: stop quota recovery before disabling quotas
KASAN: use-after-free Read in __ocfs2_find_path ocfs2 19 C inconclusive 65 321d 479d 28/29 236d a406aff8c051 ocfs2: validate l_tree_depth to avoid out-of-bounds access
KMSAN: uninit-value in ocfs2_file_read_iter ocfs2 7 C 3 465d 461d 28/29 271d adc77b19f62d ocfs2: fix uninitialized value in ocfs2_file_read_iter()
general protection fault in ocfs2_prepare_dir_for_insert ocfs2 8 C inconclusive 1072 281d 530d 28/29 271d b0fce54b8c0d ocfs2: check dir i_size in ocfs2_find_entry
KASAN: slab-use-after-free Read in ocfs2_lock_global_qf ocfs2 19 C inconclusive 11 396d 447d 28/29 271d 5f3fd772d152 ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
KASAN: use-after-free Read in ocfs2_search_extent_list ocfs2 19 C inconclusive 3 389d 418d 28/29 271d 34bb50c42335 ocfs2: check el->l_next_free_rec in ocfs2_get_clusters_nocache
kernel BUG in ocfs2_truncate_log_append ocfs2 -1 C 4 398d 452d 28/29 271d 01676ecd0b5c ocfs2: check tl->count of truncate log inode in ocfs2_get_truncate_log_info
UBSAN: shift-out-of-bounds in ocfs2_fill_super (2) ocfs2 -1 C 81 442d 462d 28/29 412d 23aab037106d ocfs2: fix UBSAN warning in ocfs2_verify_volume()
kernel BUG in ocfs2_set_new_buffer_uptodate ocfs2 -1 C inconclusive 55 420d 532d 28/29 412d 737f34137844 ocfs2: uncache inode which has failed entering the group
general protection fault in ocfs2_xa_block_wipe_namevalue ocfs2 2 C 4 466d 462d 28/29 416d 0b63c0e01fba ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()
kernel BUG in ocfs2_truncate_inline ocfs2 -1 C inconclusive 3 466d 480d 28/29 444d bc0a2f3a73fc ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
KMSAN: uninit-value in from_kuid (2) ocfs2 7 C 75 467d 499d 28/29 445d 15f343474816 fs: Fix uninitialized value issue in from_kuid and from_kgid
WARNING: bad unlock balance in ocfs2_read_blocks ocfs2 4 C 240 499d 532d 28/29 467d c03a82b4a0c9 ocfs2: remove unreasonable unlock in ocfs2_read_blocks
possible deadlock in ocfs2_get_system_file_inode ocfs2 4 C done 14785 485d 535d 28/29 467d 7bf1823e010e ocfs2: fix deadlock in ocfs2_get_system_file_inode
WARNING: ODEBUG bug in ocfs2_local_read_info ocfs2 -1 C inconclusive 7 485d 517d 28/29 467d 35fccce29feb ocfs2: cancel dqi_sync_work before freeing oinfo
KMSAN: uninit-value in ocfs2_get_block ocfs2 7 C 5 498d 494d 28/29 467d 2af148ef8549 ocfs2: fix uninit-value in ocfs2_get_block()
UBSAN: shift-out-of-bounds in ocfs2_fill_super ocfs2 -1 C 199 468d 535d 28/29 467d 7f86b2942791 ocfs2: fix shift-out-of-bounds UBSAN bug in ocfs2_verify_volume()