syzbot


Applied filters: Label=subsystems:selinux (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
WARNING in hashtab_init selinux -1 C 490 1h15m 21d 2/29 never selinux: add __GFP_NOWARN to hashtab_init() allocations
KASAN: slab-out-of-bounds Read in selinux_ip_output selinux 19 C done 1490 215d 225d 28/29 64d eedcad2f2a37 selinux: use sk_to_full_sk() in selinux_ip_output()
KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open selinux 6 1 321d 321d 28/29 260d 2571bb9d553b selinux: annotate false positive data race to avoid KCSAN warnings
KASAN: invalid-free in security_tun_dev_free_security selinux 22 syz error error 346 1295d 1637d 20/29 1219d 158b515f703e tun: avoid double free in tun_free_netdev
general protection fault in selinux_socket_recvmsg selinux 2 C done 4 1874d 1874d 15/29 1818d 0a82e230c688 mptcp: avoid NULL-ptr derefence on fallback
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user selinux 17 C done 1 1928d 1927d 15/29 1886d a1a7e3a36e01 xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
possible deadlock in sidtab_sid2str_put selinux 4 C done 1382 1973d 1990d 15/29 1911d 39a706fbcf26 selinux: fix sidtab string cache locking
general protection fault in ebitmap_destroy (2) selinux 2 C done 36 2301d 2309d 11/29 2291d 6a1afffb08ce selinux: fix NULL dereference in policydb_destroy()
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt selinux 19 1 2352d 2352d 11/29 2318d 63346650c1a9 netrom: switch to sock timer API
general protection fault in ebitmap_destroy selinux 2 syz 1 2373d 2373d 11/29 2318d 5b0e7310a2a3 selinux: fix GPF on invalid policy
WARNING: kmalloc bug in str_read selinux -1 C 11 2453d 2497d 11/29 2431d 4458bba09788 selinux: Add __GFP_NOWARN to allocation at str_read()
general protection fault in sidtab_search_core selinux 2 syz 1306 2771d 2777d 4/29 2715d 4b14752ec4e0 selinux: skip bounded transition processing if the policy isn't loaded
KASAN: slab-out-of-bounds Read in strcmp selinux 17 C 150 2771d 2781d 4/29 2715d ef28df55ac27 selinux: ensure the context is NUL terminated in security_context_to_sid_core()
general protection fault in __lock_acquire selinux 2 5 2826d 2878d 3/29 2816d 383143f31d7d ipv6: reset fn->rr_ptr when replacing route