syzbot


Applied filters: Label=subsystems:lsm (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
INFO: task hung in process_measurement (2) integrity lsm C done 580 5d08h 524d 27/28 never a5324b3a488d exfat: fix the infinite loop in __exfat_free_cluster()
KMSAN: uninit-value in ima_add_template_entry (2) integrity lsm C 109 28d 136d 27/28 never 98e2fb26d1a9 exfat: fix the new buffer was not zeroed before writing
WARNING in current_check_refer_path lsm C 90 34d 218d 27/28 never 49440290a093 landlock: Handle weird files
WARNING in get_mode_access lsm C inconclusive 12 33d 91d 27/28 never 49440290a093 landlock: Handle weird files
WARNING in handle_policy_update lsm C 61 40d 61d 27/28 never f09ff307c729 safesetid: check size of policy writes
possible deadlock in process_measurement (4) integrity lsm C done 7976 102d 140d 28/28 92d 58a039e679fe mm: split critical region in remap_file_pages() and invoke LSMs in between
general protection fault in hook_inode_free_security lsm 12 215d 282d 28/28 115d 63dff3e48871 lsm: add the inode_free_security_rcu() LSM implementation hook
WARNING in collect_domain_accesses lsm C done 3 268d 280d 25/28 249d 88da52ccd66e landlock: Fix d_parent walk
WARNING in __mod_timer keyrings lsm 2 684d 719d 22/28 617d 63a759694eed debugobject: Prevent init race with static objects
memory leak in keyctl_watch_key keyrings lsm C 1 1066d 1062d 22/28 721d 3d8dcf278b1e watch_queue: Actually free the watch
BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission lsm C 1 828d 824d 22/28 721d 578b565b240a 9p/fd: Fix write overflow in p9_read_work
kernel panic: stack is corrupted in __kmalloc sctp integrity lsm 4 726d 980d 22/28 721d b81d591386c3 riscv: Increase stack size under KASAN
KASAN: use-after-free Read in netlbl_catmap_walk net lsm C inconclusive 1 1269d 1269d 20/28 1074d 0817534ff9ea smackfs: Fix use-after-free in netlbl_catmap_walk()
KASAN: use-after-free Read in cipso_v4_doi_add lsm net 1 1219d 1215d 20/28 1074d 0934ad42bb2c smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
kernel panic: smack: Failed to initialize cipso DOI. lsm C done error 128 1201d 1782d 20/28 1074d f91488ee15bd smackfs: use __GFP_NOFAIL for smk_cipso_doi()
KASAN: use-after-free Read in cipso_v4_genopt lsm net C inconclusive 5 1444d 1445d 20/28 1193d ad5d07f4a9cd cipso,calipso: resolve a number of problems with the DOI refcounts 1165affd4848 net: mac802154: Fix general protection fault
BUG: unable to handle kernel paging request in cap_capable lsm C unreliable 4 1290d 1290d 20/28 1193d 9384eacd80f3 net: core: don't call SIOCBRADD/DELIF for non-bridge devices
UBSAN: array-index-out-of-bounds in ima_inode_setxattr integrity lsm C unreliable 6 1274d 1275d 20/28 1193d cb181da16196 IMA: reject unknown hash algorithms in ima_get_hash_algo
WARNING in smk_set_cipso (2) lsm C inconclusive 24 1327d 1405d 20/28 1193d 49ec114a6e62 smackfs: restrict bytes count in smk_set_cipso()
WARNING in memdup_user_nul lsm C inconclusive 2 1492d 1492d 20/28 1407d 7ef4c19d245f smackfs: restrict bytes count in smackfs write functions
possible deadlock in process_measurement (2) integrity lsm C done done 56 1534d 1901d 15/28 1501d 15a8d68e9dc2 mm/hugetlb: a page from buddy is not on any list
KASAN: slab-out-of-bounds Read in vsscanf (2) lsm C error 5 1655d 1668d 15/28 1612d a6bd4f6d9b07 Smack: fix another vsscanf out of bounds
KASAN: use-after-free Read in smk_write_relabel_self lsm C done 2 1716d 1712d 15/28 1612d beb4ee6770a8 Smack: fix use-after-free in smk_write_relabel_self()
KASAN: slab-out-of-bounds Read in vsscanf lsm C done 61 1683d 1786d 15/28 1673d 84e99e58e8d1 Smack: slab-out-of-bounds in vsscanf
general protection fault in ima_free_template_entry integrity lsm C done 3 1696d 1716d 15/28 1673d 42413b49804b ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr lsm net C done 8 1807d 1817d 15/28 1766d dc24f8b4ecd3 mptcp: add dummy icsk_sync_mss()
kernel BUG at security/keys/keyring.c:LINE! keyrings lsm C 12 2225d 2324d 11/28 2173d ede0fa98a900 KEYS: always initialize keyring_index_key::desc_len
KASAN: use-after-free Read in task_is_descendant lsm C 27 2221d 2309d 11/28 2173d 9474f4e7cd71 Yama: Check for pid death before checking ancestry
general protection fault in keyctl_pkey_params_get keyrings lsm C 85 2236d 2295d 11/28 2222d 57b0e3145320 KEYS: fix parsing invalid pkey info string 94c13f66e13c security: don't use a negative Opt_err token index
KASAN: stack-out-of-bounds Read in keyctl_pkey_params_get keyrings lsm 2 2236d 2235d 11/28 2222d 57b0e3145320 KEYS: fix parsing invalid pkey info string
general protection fault in rb_erase integrity lsm C 79836 2293d 2334d 11/28 2286d 18aded174920 ext4: fix EXT4_IOC_SWAP_BOOT
KASAN: slab-out-of-bounds Read in cap_inode_getsecurity lsm C 11 2597d 2598d 3/28 2592d dc32b5c3e6e2 capabilities: fix buffer overread on very short xattr
KASAN: slab-out-of-bounds Read in cap_convert_nscap lsm C 4148 2597d 2600d 3/28 2592d dc32b5c3e6e2 capabilities: fix buffer overread on very short xattr