| BUG: bad usercopy in raw_getsockopt
					hardening
					mm | -1 | C | done |  | 4 | 618d | 618d | 25/29 | 568d | c8fba5d6df5e
		
		can: raw: fix getsockopt() for new CAN_RAW_XL_VCID_OPTS | 
	
		
			
			| net-next boot error: BUG: bad usercopy in qrtr_sendmsg
					hardening
					mm | -1 |  |  |  | 30 | 994d | 996d | 22/29 | 875d | 0b34d68049b0
		
		net: enable usercopy for skb_small_head_cache | 
	
		
			
			| BUG: bad usercopy in con_font_op
					hardening
					mm | -1 | C | done |  | 1 | 972d | 972d | 22/29 | 875d | 18365ebf23f3
		
		tty: vt: protect KD_FONT_OP_GET_TALL from unbound access | 
	
		
			
			| BUG: bad usercopy in put_cmsg
					hardening
					mm | -1 | C |  |  | 3 | 990d | 992d | 22/29 | 875d | 2558b8039d05
		
		net: use a bounce buffer for copying skb->mark | 
	
		
			
			| BUG: bad usercopy in bpf_prog_get_info_by_fd
					mm
					hardening | -1 |  |  |  | 1 | 1252d | 1252d | 22/29 | 979d | 10f3b29c65bb
		
		bpf, arm64: Clear prog->jited_len along prog->jited | 
	
		
			
			| BUG: bad usercopy in read_rio
					mm
					hardening | -1 |  |  |  | 2 | 2210d | 2213d | 13/29 | 2195d | 015664d15270
		
		USB: rio500: Remove Rio 500 kernel driver | 
	
		
			
			| KASAN: slab-out-of-bounds Write in validate_chain
					hardening
					mm | 23 | syz | done |  | 6 | 2308d | 2323d | 12/29 | 2256d | 95fa145479fb
		
		bpf: sockmap/tls, close can race with map free | 
	
		
			
			| KASAN: slab-out-of-bounds Read in corrupted (2)
					mm
					hardening | 17 | syz | done |  | 3 | 2289d | 2338d | 12/29 | 2256d | 95fa145479fb
		
		bpf: sockmap/tls, close can race with map free | 
	
		
			
			| BUG: bad usercopy in __check_heap_object (3)
					hardening
					mm | -1 | C |  |  | 287 | 2602d | 2673d | 12/29 | 2334d | 1f4aace60b0e
		
		fs/seq_file.c: simplify seq_file iteration code and interface | 
	
		
			
			| WARNING: bad usercopy in fanotify_read
					mm
					hardening | -1 | C | done |  | 5 | 2425d | 2425d | 11/29 | 2405d | b2d22b6bb33a
		
		fanotify: Allow copying of file handle to userspace | 
	
		
			
			| KASAN: stack-out-of-bounds in do_raw_spin_lock
					mm
					hardening | 17 | C |  |  | 1 | 2491d | 2491d | 11/29 | 2431d | 44039e00171b
		
		fou6: Prevent unbounded recursion in GUE error handler | 
	
		
			
			| KASAN: out-of-bounds Read in update_curr
					hardening
					mm | 17 | syz |  |  | 1 | 2491d | 2491d | 11/29 | 2431d | 44039e00171b
		
		fou6: Prevent unbounded recursion in GUE error handler | 
	
		
			
			| WARNING: bad usercopy in __kvm_write_guest_page
					mm
					hardening | -1 | C |  |  | 4 | 2721d | 2714d | 8/29 | 2624d | 0a06d4256674
		
		KVM: vmx: use local variable for current_vmptr when emulating VMPTRST | 
	
		
			
			| kernel BUG at mm/slab.c:LINE! (2)
					hardening
					mm | -1 | C |  |  | 701 | 2656d | 2671d | 8/29 | 2641d | 6e6fddc78323
		
		bpf: fix panic due to oob in bpf_prog_test_run_skb | 
	
		
			
			| BUG: bad usercopy in __check_object_size
					hardening
					mm | -1 |  |  |  | 1 | 2734d | 2734d | 5/29 | 2724d | 2c5d5b13c6eb
		
		llc: better deal with too small mtu | 
	
		
			
			| WARNING in usercopy_warn
					mm
					hardening | -1 | C |  |  | 171 | 2823d | 2841d | 4/29 | 2817d | 79a8a642bf05
		
		net: Whitelist the skbuff_head_cache "cb" field | 
	
		
			
			| WARNING in __check_heap_object
					mm
					hardening | -1 | C |  |  | 5173 | 2842d | 2914d | 4/29 | 2825d | ab9ee8e38b29
		
		sctp: Define usercopy region in SCTP proto slab cache | 
	
		
			
			| BUG: bad usercopy in rw_copy_check_uvector
					hardening
					mm | -1 |  |  |  | 7 | 2853d | 2869d | 3/29 | 2850d | d76c68109f37
		
		crypto: pcrypt - fix freeing pcrypt instances | 
	
		
			
			| BUG: bad usercopy in strncpy_from_user
					hardening
					mm | -1 |  |  |  | 1 | 2864d | 2860d | 3/29 | 2850d | d76c68109f37
		
		crypto: pcrypt - fix freeing pcrypt instances | 
	
		
			
			| BUG: bad usercopy in do_syslog
					hardening
					mm | -1 |  |  |  | 1 | 2859d | 2856d | 3/29 | 2850d | d76c68109f37
		
		crypto: pcrypt - fix freeing pcrypt instances | 
	
		
			
			| BUG: bad usercopy in alg_setsockopt
					hardening
					mm | -1 |  |  |  | 5 | 2857d | 2855d | 3/29 | 2850d | d76c68109f37
		
		crypto: pcrypt - fix freeing pcrypt instances |