syzbot


Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
kernel BUG in __es_remove_extent (2) -1 C 2 470d 625d 2/2 468d d0083459e2b6 ext4: fix bug_on in __es_tree_search
KASAN: use-after-free Read in get_max_inline_xattr_value_size ext4 19 C 20 953d 1032d 2/2 879d 8aad0253b5e6 ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop
kernel BUG in ext4_write_inline_data -1 C 3 1055d 1093d 2/2 942d 21086923c1e6 UPSTREAM: ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
KASAN: use-after-free Read in do_garbage_collect 19 C 4 1079d 1109d 2/2 943d e5142a4935c1 f2fs: fix to do sanity check on i_extra_isize in is_alive()
kernel BUG in __skb_gso_segment -1 C 1 1054d 1054d 2/2 950d de2ea2a0ad51 net/af_packet: make sure to pull mac header
kernel BUG in ext4_write_inline_data_end -1 C 4 1206d 1340d 2/2 1132d 18881d7e5171 ext4: fix race condition between ext4_write and ext4_convert_inline_data
kernel BUG in notify_change -1 C 18 1166d 1709d 2/2 1139d def19b1cf16c ANDROID: incfs: Add check for ATTR_KILL_SUID and ATTR_MODE in incfs_setattr
kernel BUG in ext4_ind_remove_space -1 C 1 1383d 1383d 2/2 1243d 259dc49deaa2 ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
general protection fault in incfs_kill_sb 2 C 2965 1333d 1368d 2/2 1294d b730087e9a5d ANDROID: incremental-fs: limit mount stack depth
KASAN: use-after-free Read in firmware_fallback_sysfs 19 C 2349 1474d 2024d 1/2 1473d d09639528b66 firmware_loader: fix use-after-free in firmware_fallback_sysfs
BUG: unable to handle kernel paging request in csum_partial 8 C 5 1528d 2110d 1/2 1473d 53b480e68c1c ip_gre: add validation for csum_start
KASAN: slab-out-of-bounds Write in snd_usb_mixer_interrupt 23 C 4 1952d 1962d 1/2 1481d 25e1bb1e6c36 ALSA: usb-audio: Fix OOB access of mixer element list
KASAN: use-after-free Read in ax88172a_unbind 19 C 38 1924d 2039d 1/2 1481d d0d394c71604 ax88172a: fix ax88172a_unbind() failures
KASAN: use-after-free Read in usbhid_close 19 syz 1 2030d 2030d 1/2 1481d 613045bfc63d HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
KASAN: slab-out-of-bounds Write in hiddev_ioctl_usage 23 C 4 2016d 2035d 1/2 1481d 851d0813ab80 HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage()
general protection fault in path_openat 2 syz 26 2097d 2104d 1/2 1482d 2c38e6140126 vfs: fix do_last() regression
general protection fault in nf_ct_netns_do_get 2 C 10 2122d 2123d 1/2 1482d 503ff0dcfba7 netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
KASAN: use-after-free Read in locks_delete_block 19 C 3 2069d 2122d 1/2 1482d 384e15fc4226 locks: fix a potential use-after-free problem when wakeup a waiter
general protection fault in inet6_set_link_af 2 C 1 2098d 2098d 1/2 1482d 036ecba2eb99 ipv6/addrconf: fix potential NULL deref in inet6_set_link_af()
BUG: unable to handle kernel paging request in do_xdp_generic 8 C 189 2084d 2115d 1/2 1482d 747d5bcb97eb tun: correct header offsets in napi frags mode
KASAN: use-after-free Read in eth_header_parse_protocol 19 C 532 1662d 1691d 1/2 1482d 599200ad44e7 net: ensure mac header is set in virtio_net_hdr_to_skb()
KASAN: use-after-free Write in smsc95xx_mdio_read 24 syz 2 1970d 1970d 1/2 1942d ab9ee18f4646 usbnet: smsc95xx: Fix use-after-free after removal