syzbot


Applied filters: Label=subsystems:lsm (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
WARNING in handle_policy_update lsm C 61 22d 44d 23/28 never f09ff307c729 safesetid: check size of policy writes
INFO: task hung in process_measurement (2) integrity lsm C done 579 7d13h 507d 25/28 never a5324b3a488d exfat: fix the infinite loop in __exfat_free_cluster()
KMSAN: uninit-value in ima_add_template_entry (2) integrity lsm C 109 11d 118d 25/28 never 98e2fb26d1a9 exfat: fix the new buffer was not zeroed before writing
WARNING in current_check_refer_path lsm C 90 16d 201d 20/28 never 49440290a093 landlock: Handle weird files
WARNING in get_mode_access lsm C inconclusive 12 16d 74d 20/28 never 49440290a093 landlock: Handle weird files
possible deadlock in process_measurement (4) integrity lsm C done 7976 85d 122d 28/28 75d 58a039e679fe mm: split critical region in remap_file_pages() and invoke LSMs in between
general protection fault in hook_inode_free_security lsm 12 198d 265d 28/28 98d 63dff3e48871 lsm: add the inode_free_security_rcu() LSM implementation hook
WARNING in collect_domain_accesses lsm C done 3 251d 263d 25/28 231d 88da52ccd66e landlock: Fix d_parent walk
WARNING in __mod_timer keyrings lsm 2 667d 701d 22/28 600d 63a759694eed debugobject: Prevent init race with static objects
memory leak in keyctl_watch_key keyrings lsm C 1 1048d 1044d 22/28 704d 3d8dcf278b1e watch_queue: Actually free the watch
BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission lsm C 1 810d 806d 22/28 704d 578b565b240a 9p/fd: Fix write overflow in p9_read_work
kernel panic: stack is corrupted in __kmalloc sctp integrity lsm 4 709d 963d 22/28 704d b81d591386c3 riscv: Increase stack size under KASAN
KASAN: use-after-free Read in netlbl_catmap_walk net lsm C inconclusive 1 1252d 1252d 20/28 1057d 0817534ff9ea smackfs: Fix use-after-free in netlbl_catmap_walk()
KASAN: use-after-free Read in cipso_v4_doi_add lsm net 1 1201d 1197d 20/28 1057d 0934ad42bb2c smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
kernel panic: smack: Failed to initialize cipso DOI. lsm C done error 128 1184d 1765d 20/28 1057d f91488ee15bd smackfs: use __GFP_NOFAIL for smk_cipso_doi()
KASAN: use-after-free Read in cipso_v4_genopt lsm net C inconclusive 5 1427d 1428d 20/28 1175d ad5d07f4a9cd cipso,calipso: resolve a number of problems with the DOI refcounts 1165affd4848 net: mac802154: Fix general protection fault
BUG: unable to handle kernel paging request in cap_capable lsm C unreliable 4 1272d 1273d 20/28 1175d 9384eacd80f3 net: core: don't call SIOCBRADD/DELIF for non-bridge devices
UBSAN: array-index-out-of-bounds in ima_inode_setxattr integrity lsm C unreliable 6 1256d 1258d 20/28 1175d cb181da16196 IMA: reject unknown hash algorithms in ima_get_hash_algo
WARNING in smk_set_cipso (2) lsm C inconclusive 24 1309d 1387d 20/28 1175d 49ec114a6e62 smackfs: restrict bytes count in smk_set_cipso()
WARNING in memdup_user_nul lsm C inconclusive 2 1475d 1475d 20/28 1390d 7ef4c19d245f smackfs: restrict bytes count in smackfs write functions
possible deadlock in process_measurement (2) integrity lsm C done done 56 1517d 1884d 15/28 1483d 15a8d68e9dc2 mm/hugetlb: a page from buddy is not on any list
KASAN: slab-out-of-bounds Read in vsscanf (2) lsm C error 5 1637d 1651d 15/28 1594d a6bd4f6d9b07 Smack: fix another vsscanf out of bounds
KASAN: use-after-free Read in smk_write_relabel_self lsm C done 2 1698d 1695d 15/28 1594d beb4ee6770a8 Smack: fix use-after-free in smk_write_relabel_self()
KASAN: slab-out-of-bounds Read in vsscanf lsm C done 61 1666d 1768d 15/28 1656d 84e99e58e8d1 Smack: slab-out-of-bounds in vsscanf
general protection fault in ima_free_template_entry integrity lsm C done 3 1679d 1699d 15/28 1656d 42413b49804b ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr lsm net C done 8 1789d 1799d 15/28 1749d dc24f8b4ecd3 mptcp: add dummy icsk_sync_mss()
kernel BUG at security/keys/keyring.c:LINE! keyrings lsm C 12 2207d 2307d 11/28 2155d ede0fa98a900 KEYS: always initialize keyring_index_key::desc_len
KASAN: use-after-free Read in task_is_descendant lsm C 27 2204d 2291d 11/28 2155d 9474f4e7cd71 Yama: Check for pid death before checking ancestry
general protection fault in keyctl_pkey_params_get keyrings lsm C 85 2218d 2278d 11/28 2204d 57b0e3145320 KEYS: fix parsing invalid pkey info string 94c13f66e13c security: don't use a negative Opt_err token index
KASAN: stack-out-of-bounds Read in keyctl_pkey_params_get keyrings lsm 2 2219d 2218d 11/28 2205d 57b0e3145320 KEYS: fix parsing invalid pkey info string
general protection fault in rb_erase integrity lsm C 79836 2276d 2316d 11/28 2269d 18aded174920 ext4: fix EXT4_IOC_SWAP_BOOT
KASAN: slab-out-of-bounds Read in cap_inode_getsecurity lsm C 11 2580d 2581d 3/28 2574d dc32b5c3e6e2 capabilities: fix buffer overread on very short xattr
KASAN: slab-out-of-bounds Read in cap_convert_nscap lsm C 4148 2579d 2583d 3/28 2574d dc32b5c3e6e2 capabilities: fix buffer overread on very short xattr