general protection fault in bpf_get_attach_cookie_tracing
bpf
trace
|
C |
error |
|
2 |
23h46m |
20h22m
|
|
KASAN: slab-use-after-free Read in htab_map_alloc (2)
bpf
|
|
|
|
222 |
3d06h |
2d02h
|
|
WARNING in bpf_map_lookup_percpu_elem
bpf
|
C |
done |
|
181 |
26m |
6d16h
|
|
WARNING in group_send_sig_info
bpf
trace
|
|
|
|
1 |
12d |
8d20h
|
💬 1 [6d18h] |
KMSAN: uninit-value in htab_map_delete_elem
bpf
|
syz |
|
|
3 |
9d02h |
9d04h
|
|
possible deadlock in stack_depot_save_flags
bpf
|
|
|
|
3 |
3d07h |
10d
|
|
WARNING in skb_ensure_writable
bpf
net
|
C |
done |
|
1557 |
1h22m |
13d
|
💬 2 [13d] |
possible deadlock in __stack_map_get
bpf
|
C |
error |
|
7 |
2d08h |
17d
|
💬 2 [16d] |
possible deadlock in queue_stack_map_push_elem
bpf
|
C |
error |
|
17 |
3h12m |
18d
|
|
possible deadlock in __send_signal_locked
bpf
trace
|
|
|
|
14 |
5d03h |
19d
|
|
WARNING in __xdp_reg_mem_model
bpf
net
|
C |
done |
|
41 |
2h24m |
19d
|
|
KMSAN: uninit-value in htab_lru_percpu_map_lookup_percpu_elem
bpf
|
C |
|
|
2 |
6d23h |
19d
|
|
possible deadlock in sock_hash_update_common
bpf
net
|
|
|
|
16 |
6h39m |
20d
|
|
possible deadlock in get_page_from_freelist
bpf
|
|
|
|
3 |
21d |
21d
|
|
KMSAN: uninit-value in htab_percpu_map_lookup_elem
bpf
|
C |
|
|
6 |
6h37m |
22d
|
|
possible deadlock in __sock_map_delete
bpf
net
|
C |
|
|
12 |
2d13h |
22d
|
|
possible deadlock in __queue_map_get
bpf
|
C |
error |
|
47 |
1d12h |
23d
|
PATCH [2d00h] |
KMSAN: uninit-value in sock_hash_delete_elem
bpf
net
|
C |
|
|
5 |
1d20h |
23d
|
|
WARNING in sock_map_close
bpf
net
|
C |
|
|
66 |
7m |
27d
|
|
possible deadlock in sock_map_unref
bpf
net
|
|
|
|
7 |
1d06h |
27d
|
|
BUG: unable to handle kernel NULL pointer dereference in dev_map_generic_redirect
bpf
net
|
|
|
|
7 |
25d |
28d
|
|
BUG: unable to handle kernel paging request in jhash
bpf
|
C |
|
|
14 |
10d |
29d
|
|
KASAN: stack-out-of-bounds Read in hash
bpf
|
C |
|
|
5 |
22d |
29d
|
💬 3 [28d] |
WARNING in __schedule
block
bpf
|
|
|
|
4 |
23d |
31d
|
|
possible deadlock in trie_update_elem
bpf
|
|
|
|
30 |
4h00m |
39d
|
|
INFO: rcu detected stall in kauditd_thread (4)
audit
bpf
|
C |
|
|
5 |
10d |
39d
|
💬 6 [36d] |
possible deadlock in sk_psock_drop
bpf
net
|
|
|
|
19 |
13h15m |
40d
|
|
general protection fault in bpf_check (2)
bpf
|
C |
done |
|
7 |
33d |
44d
|
💬 1 [43d] |
possible deadlock in trie_delete_elem
bpf
|
C |
done |
|
15033 |
21m |
47d
|
💬 1 [25d] |
possible deadlock in sock_hash_delete_elem (2)
net
bpf
|
C |
|
|
660 |
38m |
47d
|
💬 2 [9d03h] |
WARNING in __sock_map_delete
bpf
net
|
C |
|
|
34 |
31d |
48d
|
|
possible deadlock in sock_map_delete_elem
bpf
net
|
C |
|
|
353 |
1h05m |
48d
|
|
UBSAN: array-index-out-of-bounds in bpf_prog_select_runtime
bpf
|
C |
done |
|
5 |
12d |
52d
|
PATCH [13h17m] |
possible deadlock in __bpf_ringbuf_reserve
bpf
|
C |
error |
|
11 |
1d00h |
54d
|
💬 6 [54d] |
KASAN: slab-out-of-bounds Read in btf_datasec_check_meta
bpf
|
C |
done |
|
6304 |
8m |
56d
|
PATCH [55d] |
KMSAN: uninit-value in bpf_prog_test_run_xdp
bpf
net
|
C |
|
|
2 |
43d |
57d
|
|
KMSAN: uninit-value in ___bpf_prog_run (4)
bpf
|
C |
|
|
130 |
10h01m |
131d
|
|
WARNING in format_decode (3)
bpf
trace
|
C |
done |
|
532 |
21h25m |
166d
|
PATCH [160d] |
inconsistent lock state in __lock_task_sighand
bpf
trace
|
C |
done |
|
752 |
168d |
172d
|
|
INFO: rcu detected stall in sys_unshare (9)
bpf
|
C |
inconclusive |
|
3 |
63d |
177d
|
💬 1 [56d] |
BUG: unable to handle kernel NULL pointer dereference in sk_msg_recvmsg
net
bpf
|
C |
|
|
67 |
1d19h |
192d
|
💬 1 [20d] |
possible deadlock in task_fork_fair
bpf
|
C |
done |
|
8618 |
5h41m |
211d
|
💬 1 [25d] |
possible deadlock in console_flush_all (2)
trace
bpf
|
C |
error |
|
52456 |
13m |
211d
|
💬 14 [39d] |