From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net [23.128.96.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B6F767E for ; Thu, 4 May 2023 12:46:03 +0000 (UTC) Received: from mail-io1-f70.google.com (mail-io1-f70.google.com [209.85.166.70]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 237B06585 for ; Thu, 4 May 2023 05:45:58 -0700 (PDT) Received: by mail-io1-f70.google.com with SMTP id ca18e2360f4ac-760718e6878so51324039f.1 for ; Thu, 04 May 2023 05:45:58 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683204357; x=1685796357; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=+14X7h/e+XMhMcUDURsY0MOkjOh1QQgkL0DcudAyawk=; b=BYyh1fwSD6XrHvIc10qM2kQHmrLtQd4IGkokgao46ueFeg8vJ4pF+Ouim9D3/3uF+v 9YU4laDchZ8KIIy26Ox1z0w5gcXVjNq/GwObW1ICkzJ9Su+Ad4WyhEhYzRFBEPHEx0Xf TfnqutRs44QCOnGc+mfnlYQMPypWsnwEb5zY7ZRuY+wkKhLQZ9gBrQaenYmx/oR74UfJ r6M9u4lMzvoJ0OJXWvWMe1+Evh2pF1rG/zluw53pjgHXG4rbOoTiAaL1n288sgFUtUxu SRZpBX02KhThXJjWSi9K0nBJYZsE4njzPAVeG7tWPV58yUpR75pFrBx6SBi8FG4vNhp3 g96Q== X-Gm-Message-State: AC+VfDyK4yNDBeovXb1E+zIc1rZbjY1ob+7ywPFevoxpTSCrHRBuctrM xoSF7B/vVhG2gwpDwgbal1ROFhBnuzKZr2Mob7CMV9xgC2QR X-Google-Smtp-Source: ACHHUZ5FTNV73V8waMafqVjRwE7qAPZcfNff1eUOvau/1qBqett/eHJPgDMrmb3ONJ50GBHFMOZAULNMhiSldmRsoF45/T41Kl5A Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Received: by 2002:a02:a14a:0:b0:40f:99ae:dba8 with SMTP id m10-20020a02a14a000000b0040f99aedba8mr11586301jah.1.1683204357479; Thu, 04 May 2023 05:45:57 -0700 (PDT) Date: Thu, 04 May 2023 05:45:57 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000cfe36f05fadd8def@google.com> Subject: [syzbot] Monthly nfc report (May 2023) From: syzbot To: linux-kernel@vger.kernel.org, linux-nfc@lists.01.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Hello nfc maintainers/developers, This is a 31-day syzbot report for the nfc subsystem. All related reports/information can be found at: https://syzkaller.appspot.com/upstream/s/nfc During the period, 0 new issues were detected and 0 were fixed. In total, 9 issues are still open and 17 have been fixed so far. Some of the still happening issues: Ref Crashes Repro Title <1> 70 Yes BUG: corrupted list in nfc_llcp_unregister_device https://syzkaller.appspot.com/bug?extid=81232c4a81a886e2b580 <2> 50 Yes INFO: task hung in nfc_rfkill_set_block https://syzkaller.appspot.com/bug?extid=3e3c2f8ca188e30b1427 <3> 45 Yes KASAN: use-after-free Read in nfc_llcp_find_local https://syzkaller.appspot.com/bug?extid=e7ac69e6a5d806180b40 <4> 41 Yes BUG: corrupted list in nfc_llcp_register_device https://syzkaller.appspot.com/bug?extid=c1d0a03d305972dbbe14 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. To disable reminders for individual bugs, reply with the following command: #syz set no-reminders To change bug's subsystems, reply with: #syz set subsystems: new-subsystem You may send multiple commands in a single email message.