syzbot


KASAN: use-after-free Read in ext4_find_extent

Status: upstream: reported C repro on 2022/12/26 07:59
Subsystems: ext4
[Documentation on labels]
Reported-by: syzbot+212b805f83aa4e82c10a@syzkaller.appspotmail.com
First crash: 958d, last: 5d14h
Cause bisection: failed (error log, bisect log)
  
Fix bisection the fix commit could be any of (bisect log):
  003c389455eb Merge 5.10.160 into android12-5.10-lts
  bf760358eac3 Merge branch 'android12-5.10' into android12-5.10-lts
  
Similar bugs (11)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-54 KASAN: use-after-free Read in ext4_find_extent 19 C 2 58d 156d 0/2 upstream: reported C repro on 2025/02/13 21:05
android-6-1 KASAN: use-after-free Read in ext4_find_extent missing-backport 19 C error done 3 265d 762d 0/2 auto-obsoleted due to no activity on 2025/02/04 04:57
linux-5.15 KASAN: use-after-free Read in ext4_find_extent origin:lts-only 19 C inconclusive 7 7d07h 731d 0/3 upstream: reported C repro on 2023/07/19 14:49
upstream KASAN: use-after-free Read in ext4_find_extent ext4 19 2 1368d 1429d 0/29 auto-closed as invalid on 2022/02/17 05:19
android-6-1 KASAN: use-after-free Read in ext4_find_extent (2) origin:lts 19 C 2 19d 49d 0/2 upstream: reported C repro on 2025/05/31 08:45
linux-6.1 KASAN: use-after-free Read in ext4_find_extent origin:upstream missing-backport 19 C done 43 3d09h 670d 0/3 upstream: reported C repro on 2023/09/19 00:11
android-5-15 KASAN: use-after-free Read in ext4_find_extent ext4 origin:lts 19 C error 15 5d16h 936d 0/2 upstream: reported C repro on 2022/12/26 07:59
upstream KASAN: use-after-free Read in ext4_find_extent (2) ext4 19 C error 2 807d 931d 22/29 fixed on 2023/06/08 14:41
upstream KASAN: use-after-free Read in ext4_find_extent (4) ext4 19 C done 73 4h15m 201d 0/29 upstream: reported C repro on 2024/12/30 20:06
upstream KASAN: use-after-free Read in ext4_find_extent (3) prio:low ext4 19 C error done 31 571d 753d 25/29 fixed on 2024/01/30 23:26
android-54 KASAN: slab-out-of-bounds Read in ext4_find_extent ext4 17 C 1 750d 936d 0/2 auto-obsoleted due to no activity on 2023/10/08 03:20
Last patch testing requests (10)
Created Duration User Patch Repo Result
2025/06/19 01:39 6m retest repro android13-5.10-lts report log
2025/06/19 01:39 5m retest repro android13-5.10-lts report log
2025/06/19 01:39 8m retest repro android13-5.10-lts report log
2025/06/19 01:39 6m retest repro android13-5.10-lts report log
2025/06/19 01:39 7m retest repro android13-5.10-lts report log
2025/05/17 22:04 6m retest repro android13-5.10-lts report log
2025/05/17 22:04 6m retest repro android13-5.10-lts report log
2025/05/17 22:04 6m retest repro android13-5.10-lts report log
2025/05/17 22:04 1h10m retest repro android13-5.10-lts report log
2025/05/17 22:04 6m retest repro android13-5.10-lts report log

Sample crash report:
==================================================================
BUG: KASAN: use-after-free in ext4_ext_binsearch fs/ext4/extents.c:826 [inline]
BUG: KASAN: use-after-free in ext4_find_extent+0xbeb/0xe20 fs/ext4/extents.c:945
Read of size 4 at addr ffff8881227d86f4 by task syz-executor220/282

CPU: 1 PID: 282 Comm: syz-executor220 Not tainted 5.10.238-syzkaller-00008-g59e9a7228857 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 __dump_stack+0x21/0x24 lib/dump_stack.c:77
 dump_stack_lvl+0x169/0x1d8 lib/dump_stack.c:118
 print_address_description+0x7f/0x2c0 mm/kasan/report.c:248
 __kasan_report mm/kasan/report.c:435 [inline]
 kasan_report+0xe2/0x130 mm/kasan/report.c:452
 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report_generic.c:308
 ext4_ext_binsearch fs/ext4/extents.c:826 [inline]
 ext4_find_extent+0xbeb/0xe20 fs/ext4/extents.c:945
 ext4_ext_remove_space+0x306/0x4910 fs/ext4/extents.c:2826
 ext4_punch_hole+0x6f8/0xad0 fs/ext4/inode.c:4217
 ext4_fallocate+0x271/0x1a70 fs/ext4/extents.c:4756
 vfs_fallocate+0x4b4/0x590 fs/open.c:310
 madvise_remove mm/madvise.c:880 [inline]
 madvise_vma_behavior mm/madvise.c:904 [inline]
 madvise_walk_vmas mm/madvise.c:1131 [inline]
 do_madvise+0x12cf/0x1df0 mm/madvise.c:1308
 __do_sys_madvise mm/madvise.c:1322 [inline]
 __se_sys_madvise mm/madvise.c:1320 [inline]
 __x64_sys_madvise+0xa9/0xc0 mm/madvise.c:1320
 do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f576266bbb9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc91a9fee8 EFLAGS: 00000246 ORIG_RAX: 000000000000001c
RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f576266bbb9
RDX: 0000000000000009 RSI: 0000000000600002 RDI: 0000200000000000
RBP: 00007f57626de610 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001
R13: 00007ffc91aa00c8 R14: 0000000000000001 R15: 0000000000000001

The buggy address belongs to the page:
page:ffffea000489f600 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x1 pfn:0x1227d8
flags: 0x4000000000000000()
raw: 4000000000000000 ffffea0004804108 ffffea0004831308 0000000000000000
raw: 0000000000000001 0000000000000002 00000000ffffff7f 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x8100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|0x8000000), pid 284, ts 20910812020, free_ts 20911291023
 set_page_owner include/linux/page_owner.h:35 [inline]
 post_alloc_hook mm/page_alloc.c:2456 [inline]
 prep_new_page+0x179/0x180 mm/page_alloc.c:2462
 get_page_from_freelist+0x2235/0x23d0 mm/page_alloc.c:4254
 __alloc_pages_nodemask+0x268/0x5f0 mm/page_alloc.c:5357
 __alloc_pages include/linux/gfp.h:544 [inline]
 __alloc_pages_node include/linux/gfp.h:557 [inline]
 alloc_pages_node include/linux/gfp.h:571 [inline]
 alloc_pages include/linux/gfp.h:590 [inline]
 do_anonymous_page mm/memory.c:3963 [inline]
 handle_pte_fault+0x1719/0x3750 mm/memory.c:4786
 __handle_mm_fault mm/memory.c:4944 [inline]
 handle_mm_fault+0xf3f/0x16a0 mm/memory.c:5358
 do_user_addr_fault+0x5a2/0xc80 arch/x86/mm/fault.c:1362
 handle_page_fault arch/x86/mm/fault.c:1428 [inline]
 exc_page_fault+0x5a/0xc0 arch/x86/mm/fault.c:1484
 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:571
page last free stack trace:
 reset_page_owner include/linux/page_owner.h:28 [inline]
 free_pages_prepare mm/page_alloc.c:1349 [inline]
 free_pcp_prepare mm/page_alloc.c:1421 [inline]
 free_unref_page_prepare+0x2b7/0x2d0 mm/page_alloc.c:3336
 free_unref_page_list+0x12e/0x9b0 mm/page_alloc.c:3443
 release_pages+0xe38/0xe80 mm/swap.c:1103
 free_pages_and_swap_cache+0x86/0xa0 mm/swap_state.c:356
 tlb_batch_pages_flush mm/mmu_gather.c:49 [inline]
 tlb_flush_mmu_free mm/mmu_gather.c:240 [inline]
 tlb_flush_mmu mm/mmu_gather.c:247 [inline]
 tlb_finish_mmu+0x175/0x300 mm/mmu_gather.c:326
 unmap_region+0x32c/0x380 mm/mmap.c:2799
 __do_munmap+0x63c/0x850 mm/mmap.c:3029
 __vm_munmap mm/mmap.c:3082 [inline]
 __do_sys_munmap mm/mmap.c:3108 [inline]
 __se_sys_munmap+0x127/0x1b0 mm/mmap.c:3104
 __x64_sys_munmap+0x5b/0x70 mm/mmap.c:3104
 do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x61/0xcb

Memory state around the buggy address:
 ffff8881227d8580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff8881227d8600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff8881227d8680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                             ^
 ffff8881227d8700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff8881227d8780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
------------[ cut here ]------------
kernel BUG at fs/ext4/extents.c:3180!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 282 Comm: syz-executor220 Tainted: G    B             5.10.238-syzkaller-00008-g59e9a7228857 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:ext4_split_extent_at+0xe6e/0xe90 fs/ext4/extents.c:3180
Code: 48 89 df 48 89 74 24 68 e8 2f 8c d3 ff 48 8b 74 24 68 e9 5a fb ff ff e8 00 9c 99 ff 0f 0b e8 f9 9b 99 ff 0f 0b e8 f2 9b 99 ff <0f> 0b e8 eb 9b 99 ff 0f 0b e8 e4 9b 99 ff 0f 0b e8 dd 9b 99 ff 0f
RSP: 0018:ffffc90000b774a0 EFLAGS: 00010293
RAX: ffffffff81c9f81e RBX: 0000000000000000 RCX: ffff888106dee2c0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000002a
RBP: ffffc90000b77610 R08: 0000000000000000 R09: 0000000050000028
R10: fffffbfff0d8e448 R11: 1ffffffff0d8e448 R12: 0000000000000000
R13: 0000000000000000 R14: 1ffff110244fbbff R15: 0000000000000000
FS:  000055556438b380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f256175f000 CR3: 00000001213c2000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 ext4_force_split_extent_at fs/ext4/extents.c:318 [inline]
 ext4_ext_remove_space+0x677/0x4910 fs/ext4/extents.c:2873
 ext4_punch_hole+0x6f8/0xad0 fs/ext4/inode.c:4217
 ext4_fallocate+0x271/0x1a70 fs/ext4/extents.c:4756
 vfs_fallocate+0x4b4/0x590 fs/open.c:310
 madvise_remove mm/madvise.c:880 [inline]
 madvise_vma_behavior mm/madvise.c:904 [inline]
 madvise_walk_vmas mm/madvise.c:1131 [inline]
 do_madvise+0x12cf/0x1df0 mm/madvise.c:1308
 __do_sys_madvise mm/madvise.c:1322 [inline]
 __se_sys_madvise mm/madvise.c:1320 [inline]
 __x64_sys_madvise+0xa9/0xc0 mm/madvise.c:1320
 do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f576266bbb9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 61 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc91a9fee8 EFLAGS: 00000246 ORIG_RAX: 000000000000001c
RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f576266bbb9
RDX: 0000000000000009 RSI: 0000000000600002 RDI: 0000200000000000
RBP: 00007f57626de610 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001
R13: 00007ffc91aa00c8 R14: 0000000000000001 R15: 0000000000000001
Modules linked in:
---[ end trace 2d7c96c617f901c8 ]---
RIP: 0010:ext4_split_extent_at+0xe6e/0xe90 fs/ext4/extents.c:3180
Code: 48 89 df 48 89 74 24 68 e8 2f 8c d3 ff 48 8b 74 24 68 e9 5a fb ff ff e8 00 9c 99 ff 0f 0b e8 f9 9b 99 ff 0f 0b e8 f2 9b 99 ff <0f> 0b e8 eb 9b 99 ff 0f 0b e8 e4 9b 99 ff 0f 0b e8 dd 9b 99 ff 0f
RSP: 0018:ffffc90000b774a0 EFLAGS: 00010293
RAX: ffffffff81c9f81e RBX: 0000000000000000 RCX: ffff888106dee2c0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000002a
RBP: ffffc90000b77610 R08: 0000000000000000 R09: 0000000050000028
R10: fffffbfff0d8e448 R11: 1ffffffff0d8e448 R12: 0000000000000000
R13: 0000000000000000 R14: 1ffff110244fbbff R15: 0000000000000000
FS:  000055556438b380(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f256175f000 CR3: 00000001213c2000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

Crashes (39):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/07/11 06:10 android13-5.10-lts 59e9a7228857 3cda49cf .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/07/06 08:53 android13-5.10-lts 59e9a7228857 4f67c4ae .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/06/04 13:09 android13-5.10-lts cf6ed0f1511d e565f08d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/05/28 19:07 android13-5.10-lts cf6ed0f1511d 3d2f584d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/04/18 21:12 android13-5.10-lts ba8b8b193394 2a20f901 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/02/10 01:47 android13-5.10-lts 6686f2996d23 ef44b750 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/04/01 05:47 android12-5.10-lts 416c4356f372 f325deb0 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/03/19 01:42 android12-5.10-lts 416c4356f372 7939252e .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/03/15 07:32 android13-5.10-lts fc9aa81462ee e2826670 .config console log report syz / log [disk image] [vmlinux] [kernel image] [mounted in repro (clean fs)] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2022/12/21 09:05 android12-5.10-lts 003c389455eb d3e76707 .config strace log report syz [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2022/12/12 16:05 android12-5.10-lts f3226d86f8ce 67be1ae7 .config strace log report syz [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2022/12/04 17:23 android12-5.10-lts 25af5a11f1da e080de16 .config strace log report syz [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2022/12/26 07:48 android12-5.10-lts 003c389455eb 9da18ae8 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/07/14 10:51 android13-5.10-lts 59e9a7228857 d8fc7335 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/05/03 01:25 android13-5.10-lts ab07aeb2c93d b0714e37 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/05/03 01:25 android13-5.10-lts ab07aeb2c93d b0714e37 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/05/03 01:25 android13-5.10-lts ab07aeb2c93d b0714e37 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/04/28 05:45 android13-5.10-lts ba8b8b193394 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/03/25 20:48 android13-5.10-lts 094fc3778d6b 875573af .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2025/02/10 01:03 android13-5.10-lts 6686f2996d23 ef44b750 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2024/11/23 21:22 android13-5.10-lts b14940b90491 68da6d95 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2024/10/08 01:40 android13-5.10-lts e5e5644ea27f d7906eff .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2024/10/05 09:57 android13-5.10-lts e5e5644ea27f d7906eff .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2024/09/02 16:32 android13-5.10-lts 1c5354a314ea 1eda0d14 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/09/10 01:17 android13-5.10-lts a27512601c2d 6654cf89 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/09/09 20:25 android13-5.10-lts a27512601c2d 6654cf89 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/06/12 10:23 android13-5.10-lts 43c801dc3325 49519f06 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/05/22 05:46 android13-5.10-lts 43c801dc3325 4bce1a3e .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/04/26 09:25 android12-5.10-lts 416c4356f372 65320f8e .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/04/06 18:08 android12-5.10-lts 416c4356f372 08707520 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/04/04 06:55 android12-5.10-lts 416c4356f372 41147e3e .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/03/28 08:43 android12-5.10-lts 416c4356f372 47f3aaf1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/03/27 18:47 android12-5.10-lts 416c4356f372 f8f96aa9 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/03/16 12:53 android12-5.10-lts 416c4356f372 18b58603 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/03/14 03:54 android12-5.10-lts 416c4356f372 026e2200 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/03/11 04:18 android12-5.10-lts 416c4356f372 5205ef30 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/02/24 17:51 android12-5.10-lts 416c4356f372 ee50e71c .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2022/12/14 02:10 android12-5.10-lts 202ee063496e f6511626 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: use-after-free Read in ext4_find_extent
2023/03/03 01:51 android12-5.10-lts 416c4356f372 f8902b57 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 KASAN: slab-out-of-bounds Read in ext4_find_extent
* Struck through repros no longer work on HEAD.