syzbot


Applied filters: Label=subsystems:selinux (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
WARNING in hashtab_init selinux -1 C 872 7m 35d 2/29 never selinux: add __GFP_NOWARN to hashtab_init() allocations
KASAN: slab-out-of-bounds Read in selinux_ip_output selinux 19 C done 1490 229d 239d 28/29 78d eedcad2f2a37 selinux: use sk_to_full_sk() in selinux_ip_output()
KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open selinux 6 1 334d 334d 28/29 274d 2571bb9d553b selinux: annotate false positive data race to avoid KCSAN warnings
KASAN: invalid-free in security_tun_dev_free_security selinux 22 syz error error 346 1308d 1650d 20/29 1233d 158b515f703e tun: avoid double free in tun_free_netdev
general protection fault in selinux_socket_recvmsg selinux 2 C done 4 1887d 1887d 15/29 1832d 0a82e230c688 mptcp: avoid NULL-ptr derefence on fallback
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user selinux 17 C done 1 1942d 1941d 15/29 1900d a1a7e3a36e01 xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
possible deadlock in sidtab_sid2str_put selinux 4 C done 1382 1986d 2003d 15/29 1925d 39a706fbcf26 selinux: fix sidtab string cache locking
general protection fault in ebitmap_destroy (2) selinux 2 C done 36 2315d 2322d 11/29 2305d 6a1afffb08ce selinux: fix NULL dereference in policydb_destroy()
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt selinux 19 1 2366d 2365d 11/29 2331d 63346650c1a9 netrom: switch to sock timer API
general protection fault in ebitmap_destroy selinux 2 syz 1 2387d 2387d 11/29 2331d 5b0e7310a2a3 selinux: fix GPF on invalid policy
WARNING: kmalloc bug in str_read selinux -1 C 11 2467d 2511d 11/29 2444d 4458bba09788 selinux: Add __GFP_NOWARN to allocation at str_read()
general protection fault in sidtab_search_core selinux 2 syz 1306 2785d 2791d 4/29 2729d 4b14752ec4e0 selinux: skip bounded transition processing if the policy isn't loaded
KASAN: slab-out-of-bounds Read in strcmp selinux 17 C 150 2785d 2794d 4/29 2729d ef28df55ac27 selinux: ensure the context is NUL terminated in security_context_to_sid_core()
general protection fault in __lock_acquire selinux 2 5 2839d 2891d 3/29 2829d 383143f31d7d ipv6: reset fn->rr_ptr when replacing route