syzbot


Applied filters: Label=subsystems:selinux (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
WARNING in hashtab_init selinux -1 C 606 35m 27d 2/29 never selinux: add __GFP_NOWARN to hashtab_init() allocations
KASAN: slab-out-of-bounds Read in selinux_ip_output selinux 19 C done 1490 221d 231d 28/29 70d eedcad2f2a37 selinux: use sk_to_full_sk() in selinux_ip_output()
KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open selinux 6 1 326d 326d 28/29 266d 2571bb9d553b selinux: annotate false positive data race to avoid KCSAN warnings
KASAN: invalid-free in security_tun_dev_free_security selinux 22 syz error error 346 1300d 1642d 20/29 1225d 158b515f703e tun: avoid double free in tun_free_netdev
general protection fault in selinux_socket_recvmsg selinux 2 C done 4 1879d 1879d 15/29 1824d 0a82e230c688 mptcp: avoid NULL-ptr derefence on fallback
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user selinux 17 C done 1 1934d 1933d 15/29 1892d a1a7e3a36e01 xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
possible deadlock in sidtab_sid2str_put selinux 4 C done 1382 1979d 1995d 15/29 1917d 39a706fbcf26 selinux: fix sidtab string cache locking
general protection fault in ebitmap_destroy (2) selinux 2 C done 36 2307d 2315d 11/29 2297d 6a1afffb08ce selinux: fix NULL dereference in policydb_destroy()
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt selinux 19 1 2358d 2358d 11/29 2323d 63346650c1a9 netrom: switch to sock timer API
general protection fault in ebitmap_destroy selinux 2 syz 1 2379d 2379d 11/29 2323d 5b0e7310a2a3 selinux: fix GPF on invalid policy
WARNING: kmalloc bug in str_read selinux -1 C 11 2459d 2503d 11/29 2437d 4458bba09788 selinux: Add __GFP_NOWARN to allocation at str_read()
general protection fault in sidtab_search_core selinux 2 syz 1306 2777d 2783d 4/29 2721d 4b14752ec4e0 selinux: skip bounded transition processing if the policy isn't loaded
KASAN: slab-out-of-bounds Read in strcmp selinux 17 C 150 2777d 2786d 4/29 2721d ef28df55ac27 selinux: ensure the context is NUL terminated in security_context_to_sid_core()
general protection fault in __lock_acquire selinux 2 5 2832d 2883d 3/29 2821d 383143f31d7d ipv6: reset fn->rr_ptr when replacing route