syzbot


Applied filters: Label=subsystems:crypto (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
inconsistent lock state in padata_do_parallel (2) crypto 2 50d 50d 23/26 never 58329c431203 padata: Disable BH when taking works lock on MT path
KMSAN: uninit-value in des3_ede_decrypt crypto 1 95d 91d 26/26 54d 7cfc2ab3f025 crypto: lskcipher - Copy IV in lskcipher glue code always
KMSAN: uninit-value in af_alg_free_sg (2) crypto 1 134d 128d 26/26 56d 24c890dd712f crypto: algif_hash - Remove bogus SGL free on zero-length error path
KASAN: invalid-access Read in neon_aes_ctr_encrypt arm crypto C 3 83d 94d 26/26 56d 1c0cf6d19690 crypto: arm64/neonbs - fix out-of-bounds access on short input
BUG: unable to handle kernel NULL pointer dereference in crypto_arc4_crypt crypto C done 4 114d 113d 26/26 57d 69fba378edca crypto: cbc - Ensure statesize is zero
general protection fault in scatterwalk_copychunks (5) crypto C done 2920 140d 147d 26/26 112d 744e1885922a crypto: scomp - fix req->dst buffer overflow
KASAN: slab-out-of-bounds Read in arc4_crypt crypto C done 6 144d 155d 26/26 112d 37c6fc323a81 crypto: skcipher - Pass statesize for simple lskcipher instances
INFO: task hung in hwrng_fillfn crypto C error 27 114d 178d 26/26 112d 78aafb3884f6 hwrng: core - Fix page fault dead lock on mmap-ed hwrng
general protection fault in scatterwalk_copychunks (4) net crypto C done done 1341 151d 1162d 25/26 151d cfaa80c91f6f net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()
KCSAN: data-race in random_recv_done / virtio_read (3) crypto 13 331d 396d 23/26 222d ac52578d6e8d hwrng: virtio - Fix race on data_avail and actual data
KMSAN: uninit-value in af_alg_free_resources crypto C 156 274d 312d 23/26 222d 080aa61e370b crypto: fix uninit-value in af_alg_free_resources
KASAN: slab-out-of-bounds Read in extract_iter_to_sg crypto C done 13 339d 344d 23/26 235d 4380499218c6 crypto: Fix af_alg_sendmsg(MSG_SPLICE_PAGES) sglist limit b6d972f68983 crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
general protection fault in shash_async_final crypto C done 13 336d 344d 23/26 236d b6d972f68983 crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
general protection fault in crypto_shash_final crypto C done 2 347d 344d 23/26 236d b6d972f68983 crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
WARNING in extract_iter_to_sg crypto 1 321d 321d 23/26 236d 3fc40265ae2b iov_iter: Kill ITER_PIPE
general protection fault in shash_async_update crypto C done done 12 335d 333d 23/26 236d b6d972f68983 crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
general protection fault in shash_ahash_update crypto C done done 5 337d 337d 23/26 236d b6d972f68983 crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
general protection fault in shash_async_export crypto C done 25 338d 344d 23/26 236d b6d972f68983 crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
general protection fault in cryptd_hash_export crypto C done done 12 336d 344d 23/26 236d b6d972f68983 crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
general protection fault in crypto_shash_finup crypto C done 6 336d 344d 23/26 236d b6d972f68983 crypto: af_alg/hash: Fix recvmsg() after sendmsg(MSG_MORE)
general protection fault in __aria_aesni_avx_gfni_crypt_16way crypto C 49 362d 379d 22/26 325d 6ab39f99927e crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
net boot error: INFO: task hung in add_early_randomness crypto 18 705d 711d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
memory leak in crypto_create_tfm_node ext4 crypto C 3 582d 587d 22/26 452d ccd30a476f8e fscrypt: fix keyring memory leak on mount failure
inconsistent lock state in padata_do_serial (2) crypto 1 615d 611d 22/26 452d 34c3a47d20ae padata: Always leave BHs disabled when running ->parallel()
usb-testing boot error: INFO: task hung in add_early_randomness crypto 7 708d 714d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
net-next boot error: INFO: task hung in add_early_randomness crypto 23 704d 711d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
upstream boot error: INFO: task hung in hwrng_register crypto 23 710d 717d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
bpf boot error: INFO: task hung in add_early_randomness crypto 13 703d 711d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
riscv/fixes boot error: INFO: task hung in add_early_randomness crypto 8 654d 704d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
linux-next boot error: WARNING in kthread_should_stop crypto 6 560d 560d 22/26 452d db516da95ce4 hw_random: use add_hwgenerator_randomness() for early entropy
KASAN: use-after-free Write in null_skcipher_crypt crypto C done 3 809d 1008d 22/26 452d ebe48d368e97 esp: Fix possible buffer overflow in ESP transformation
linux-next boot error: INFO: task hung in add_early_randomness (2) crypto 14 713d 719d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
INFO: task hung in add_early_randomness (2) usb crypto C done 182 500d 718d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
upstream boot error: INFO: task hung in add_early_randomness crypto 125 709d 717d 22/26 452d 228432551bd8 virtio-rng: make device ready before making request
KASAN: use-after-free Read in __crypto_xor crypto C done 9 960d 991d 20/26 805d 68b6dea802ce crypto: pcrypt - Delay write to padata->info da353fac65fe net/tls: Fix flipped sign in tls_err_abort() calls
INFO: task hung in set_current_rng crypto usb C unreliable done 1 931d 1049d 20/26 805d 2bb31abdbe55 hwrng: virtio - don't wait on cleanup
INFO: task hung in hwrng_register crypto usb syz unreliable done 1 951d 1007d 20/26 805d 2bb31abdbe55 hwrng: virtio - don't wait on cleanup
general protection fault in crypto_destroy_tfm crypto syz unreliable 57 1137d 1178d 20/26 923d 83681f2bebb3 crypto: api - check for ERR pointers in crypto_destroy_tfm()
UBSAN: array-index-out-of-bounds in alg_bind crypto C error 700 1253d 1313d 19/26 1168d 92eb6c3060eb crypto: af_alg - avoid undefined behavior accessing salg_name
INFO: rcu detected stall in sys_open (2) crypto C done done 42 1288d 1639d 15/26 1245d 1d0e850a49a5 afs: Fix cell removal
inconsistent lock state in padata_do_parallel crypto 9 1337d 1357d 15/26 1319d 1b0df11fde0f padata: fix possible padata_works_lock deadlock
WARNING: refcount bug in crypto_mod_get crypto C done 2 1469d 1481d 15/26 1404d 6603523bf5e4 crypto: api - Fix use-after-free and race in crypto_spawn_alg
BUG: unable to handle kernel NULL pointer dereference in mpihelp_addmul_1 crypto 1 1434d 1434d 15/26 1404d 3021e69219e2 kcov: check kcov_softirq in kcov_remote_stop()
memory leak in crypto_create_tfm crypto C 14 1431d 1448d 15/26 1404d 819966c06b75 crypto: drbg - always try to free Jitter RNG instance
WARNING: refcount bug in crypto_destroy_tfm crypto C done 4 1483d 1506d 15/26 1404d 6603523bf5e4 crypto: api - Fix use-after-free and race in crypto_spawn_alg
KASAN: use-after-free Read in chaoskey_disconnect crypto usb C 44 1636d 1665d 15/26 1432d 93ddb1f56ae1 USB: chaoskey: fix use-after-free on release
WARNING in af_alg_make_sg crypto C done 13 1503d 1504d 15/26 1472d ae46d2aa6a7f mm/gup: Let __get_user_pages_locked() return -EINTR for fatal signal
general protection fault in gcmaes_crypt_by_sg (2) crypto C error done 28 1583d 1630d 15/26 1531d db885e66d268 net/tls: fix async operation
INFO: task hung in aead_recvmsg crypto C done 11991 1580d 2354d 15/26 1554d bbefa1dd6a6d crypto: pcrypt - Avoid deadlock by using per-instance padata queues
KMSAN: uninit-value in __crc32c_le_base crypto syz 567 1595d 1641d 15/26 1558d b6f3320b1d52 sctp: fully initialize v4 addr in some functions
KMSAN: uninit-value in gf128mul_4k_lle (3) crypto C 2958 1640d 2005d 14/26 1635d 683916f6a840 net/tls: fix sk_msg trim on fallback to copy mode
KMSAN: uninit-value in aesti_encrypt crypto C 54 1689d 1790d 14/26 1635d 683916f6a840 net/tls: fix sk_msg trim on fallback to copy mode
KASAN: use-after-free Read in crypto_gcm_init_common crypto C done done 14 1957d 2022d 13/26 1656d 9354544cbccf net/tls: fix page double free on TX cleanup
memory leak in mpihelp_mul_karatsuba_case crypto C 2 1792d 1793d 12/26 1758d c8ea9fce2baf lib/mpi: Fix karactx leak in mpi_powm
BUG: sleeping function called from invalid context at crypto/skcipher.c:LINE crypto 1 1865d 1864d 12/26 1821d 44427c0fbc09 crypto: xts - Fix atomic sleep when walking skcipher
general protection fault in crypto_remove_spawns (2) crypto 2 1948d 1954d 11/26 1903d 6db43410179b crypto: adiantum - initialize crypto_spawn::inst
general protection fault in gcmaes_crypt_by_sg crypto 3 2045d 2054d 11/26 1910d d829e9c4112b tls: convert to generic sk_msg interface
KASAN: use-after-free Read in skcipher_recvmsg crypto 6 2003d 2028d 11/26 1957d f7d76e05d058 crypto: user - fix use_after_free of struct xxx_request
BUG: sleeping function called from invalid context at mm/slab.h:LINE (4) crypto C 36 1982d 2143d 11/26 1957d f9c9bdb5131e crypto: x86/chacha - avoid sleeping under kernel_fpu_begin()
BUG: unable to handle kernel NULL pointer dereference in sha256_mb_mgr_get_comp_job_avx2 crypto 1 2050d 2050d 11/26 2016d ab8085c130ed crypto: x86 - remove SHA multibuffer routines and mcryptd
KASAN: use-after-free Read in sha_complete_job crypto 1 2056d 2054d 11/26 2016d ab8085c130ed crypto: x86 - remove SHA multibuffer routines and mcryptd
KASAN: use-after-free Read in sha512_ctx_mgr_resubmit crypto C 4 2056d 2106d 11/26 2016d ab8085c130ed crypto: x86 - remove SHA multibuffer routines and mcryptd
BUG: unable to handle kernel NULL pointer dereference in sha1_mb_mgr_get_comp_job_avx2 crypto 1 2064d 2064d 11/26 2016d ab8085c130ed crypto: x86 - remove SHA multibuffer routines and mcryptd
KASAN: slab-out-of-bounds Write in crypto_dh_encode_key crypto C 1401 2115d 2143d 8/26 2093d 35f7d5225ffc crypto: dh - fix calculating encoded key size
KASAN: slab-out-of-bounds Write in vmac_final crypto C 2 2170d 2166d 8/26 2093d bb2964810233 crypto: vmac - separate tfm and request context
KMSAN: uninit-value in af_alg_free_areq_sgls crypto C 640 2128d 2235d 8/26 2114d 2546da99212f crypto: af_alg - Initialize sg_num_bytes in error code path
KASAN: slab-out-of-bounds Write in sha512_final crypto C 21 2155d 2173d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in rmd320_final crypto C 44 2155d 2174d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Read in crypto_morus640_decrypt_chunk crypto C 8 2162d 2169d 8/26 2143d a81ae8095712 crypto: morus640 - Fix out-of-bounds access
KASAN: slab-out-of-bounds Write in tgr192_final crypto C 30 2155d 2173d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in wp384_final crypto C 27 2155d 2174d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in crypto_sha3_final crypto C 68 2155d 2174d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in sha1_finup crypto C 119 2155d 2175d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in sha1_final crypto C 201 2155d 2174d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KASAN: slab-out-of-bounds Write in tgr160_final crypto C 55 2155d 2174d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KASAN: use-after-free Read in crypto_morus640_decrypt_chunk crypto C 3 2169d 2169d 8/26 2143d a81ae8095712 crypto: morus640 - Fix out-of-bounds access
KASAN: slab-out-of-bounds Write in sha512_finup crypto C 25 2155d 2172d 8/26 2143d 3619dec5103d dh key: fix rounding up KDF output length
KMSAN: uninit-value in alg_bind crypto C 1950 2205d 2236d 5/26 2205d a466856e0b7a crypto: af_alg - fix possible uninit-value in alg_bind()
BUG: unable to handle kernel NULL pointer dereference in sha512_mb_mgr_get_comp_job_avx2 crypto syz 32 2307d 2361d 4/26 2275d eff84b379089 crypto: sha512-mb - initialize pending lengths correctly
KASAN: slab-out-of-bounds Write in sha3_update (2) crypto C 49 2302d 2342d 4/26 2301d 9fa68f620041 crypto: hash - prevent using keyed hashes without setting key
BUG: sleeping function called from invalid context at net/core/sock.c:LINE (2) crypto 185 2365d 2363d 4/26 2301d 7d2c3f54e6f6 crypto: af_alg - remove locking in async callback
general protection fault in crypto_remove_spawns crypto C 85 2328d 2367d 3/26 2314d 9a00674213a3 crypto: algapi - fix NULL dereference in crypto_remove_spawns()
KASAN: wild-memory-access Write in scatterwalk_copychunks crypto C 15 2328d 2354d 3/26 2322d e57121d08c38 crypto: chacha20poly1305 - validate the digest size
general protection fault in skcipher_walk_done crypto C 8 2325d 2344d 3/26 2322d e57121d08c38 crypto: chacha20poly1305 - validate the digest size
general protection fault in scatterwalk_copychunks (2) crypto C 141 2328d 2355d 3/26 2322d e57121d08c38 crypto: chacha20poly1305 - validate the digest size
BUG: unable to handle kernel NULL pointer dereference in blkcipher_walk_done crypto C 2 2350d 2350d 3/26 2322d e57121d08c38 crypto: chacha20poly1305 - validate the digest size
KASAN: use-after-free Read in __list_del_entry_valid (2) crypto C 11 2344d 2346d 3/26 2322d d76c68109f37 crypto: pcrypt - fix freeing pcrypt instances
BUG: unable to handle kernel NULL pointer dereference in scatterwalk_copychunks crypto C 3 2349d 2350d 3/26 2322d e57121d08c38 crypto: chacha20poly1305 - validate the digest size
KASAN: use-after-free Write in aead_recvmsg crypto C 21 2343d 2360d 3/26 2330d d53c51357923 crypto: af_alg - fix race accessing cipher request
general protection fault in crypto_chacha20_crypt crypto C 2374 2334d 2366d 3/26 2330d 2b4f27c36bcd crypto: skcipher - set walk.iv for zero-length inputs
KASAN: global-out-of-bounds Read in crypto_chacha20_crypt crypto C 74 2344d 2347d 3/26 2330d 2b4f27c36bcd crypto: skcipher - set walk.iv for zero-length inputs
general protection fault in blkcipher_walk_first crypto C 7 2342d 2353d 3/26 2330d 11edb555966e crypto: af_alg - wait for data at beginning of recvmsg
general protection fault in blkcipher_walk_done crypto C 47 2331d 2367d 3/26 2330d 11edb555966e crypto: af_alg - wait for data at beginning of recvmsg
possible deadlock (2) crypto 2 2351d 2353d 3/26 2330d 2b4f27c36bcd crypto: skcipher - set walk.iv for zero-length inputs
KASAN: use-after-free in aead_recvmsg crypto 2 2355d 2355d 3/26 2337d b32a7dc8aef1 crypto: algif_aead - fix reference counting of null skcipher
general protection fault in kfree crypto 13 2354d 2363d 3/26 2343d ecaaab564978 crypto: salsa20 - fix blkcipher_walk API usage
KASAN: use-after-free Read in aead_recvmsg crypto C 4338 2347d 2367d 3/26 2343d b32a7dc8aef1 crypto: algif_aead - fix reference counting of null skcipher
KASAN: stack-out-of-bounds Write in sha3_update crypto C 5 2370d 2366d 3/26 2343d af3ff8045bbf crypto: hmac - require that the underlying hash algorithm is unkeyed
general protection fault in af_alg_free_areq_sgls crypto C 2916 2347d 2367d 3/26 2343d 887207ed9e58 crypto: af_alg - fix NULL pointer dereference in
general protection fault in strcmp crypto keyrings 1 2364d 2363d 3/26 2343d 18026d866801 KEYS: reject NULL restriction string when type is specified
general protection fault in ___cache_free crypto 1 2354d 2349d 3/26 2343d ecaaab564978 crypto: salsa20 - fix blkcipher_walk API usage
general protection fault in scatterwalk_copychunks crypto C 414 2356d 2366d 3/26 2356d 8e1fa89aa8bc crypto: algif_aead - skip SGL entries with NULL page
KASAN: use-after-free Read in mpi_free crypto C 27 2376d 2384d 3/26 2366d 12d41a023efb crypto: dh - Fix double free of ctx->p
BUG: sleeping function called from invalid context at net/core/sock.c:LINE crypto C 407 2367d 2406d 3/26 2367d 829385f08ae9 strparser: Use delayed work instead of timer for msg timeout
general protection fault in asn1_ber_decoder crypto keyrings C 5009 2383d 2388d 3/26 2376d 624f5ab8720b KEYS: fix NULL pointer dereference during ASN.1 parsing [ver #2]
KASAN: slab-out-of-bounds Read in asn1_ber_decoder keyrings crypto C 17 2384d 2389d 3/26 2383d 2eb9eabf1e86 KEYS: fix out-of-bounds read during ASN.1 parsing