general protection fault in bpf_get_attach_cookie_tracing
bpf
trace
|
C |
error |
|
2 |
5d14h |
5d10h
|
💬 1 [3d05h] |
KASAN: slab-use-after-free Read in htab_map_alloc (2)
bpf
|
|
|
|
224 |
8h57m |
6d16h
|
|
WARNING in bpf_map_lookup_percpu_elem
bpf
|
C |
done |
|
228 |
23m |
11d
|
|
WARNING in group_send_sig_info
bpf
trace
|
|
|
|
1 |
17d |
13d
|
💬 1 [11d] |
KMSAN: uninit-value in htab_map_delete_elem
bpf
|
syz |
|
|
3 |
13d |
13d
|
|
possible deadlock in stack_depot_save_flags
bpf
|
|
|
|
3 |
7d21h |
15d
|
|
WARNING in skb_ensure_writable
bpf
net
|
C |
done |
|
1598 |
22h32m |
18d
|
💬 2 [18d] |
possible deadlock in __stack_map_get
bpf
|
C |
error |
|
9 |
12h24m |
22d
|
💬 2 [21d] |
possible deadlock in queue_stack_map_push_elem
bpf
|
C |
error |
|
26 |
1h06m |
23d
|
|
possible deadlock in __send_signal_locked
bpf
trace
|
|
|
|
14 |
9d18h |
23d
|
|
WARNING in __xdp_reg_mem_model
bpf
net
|
C |
done |
|
51 |
15h15m |
23d
|
💬 1 [4d12h] |
KMSAN: uninit-value in htab_lru_percpu_map_lookup_percpu_elem
bpf
|
C |
|
|
2 |
11d |
24d
|
|
possible deadlock in sock_hash_update_common
bpf
net
|
|
|
|
20 |
1d04h |
25d
|
|
possible deadlock in get_page_from_freelist
bpf
|
|
|
|
4 |
4d08h |
26d
|
|
KMSAN: uninit-value in htab_percpu_map_lookup_elem
bpf
|
C |
|
|
6 |
4d21h |
26d
|
|
possible deadlock in __sock_map_delete
bpf
net
|
C |
|
|
12 |
7d03h |
26d
|
|
possible deadlock in __queue_map_get
bpf
|
C |
error |
|
50 |
2d01h |
27d
|
PATCH [6d14h] |
KMSAN: uninit-value in sock_hash_delete_elem
bpf
net
|
C |
|
|
5 |
6d11h |
28d
|
|
WARNING in sock_map_close
bpf
net
|
C |
error |
|
90 |
2h08m |
32d
|
|
possible deadlock in sock_map_unref
bpf
net
|
|
|
|
8 |
2d17h |
32d
|
|
BUG: unable to handle kernel NULL pointer dereference in dev_map_generic_redirect
bpf
net
|
|
|
|
7 |
29d |
32d
|
|
BUG: unable to handle kernel paging request in jhash
bpf
|
C |
|
|
14 |
15d |
33d
|
|
KASAN: stack-out-of-bounds Read in hash
bpf
|
C |
|
|
5 |
27d |
34d
|
💬 3 [33d] |
WARNING in __schedule
block
bpf
|
|
|
|
4 |
27d |
36d
|
|
possible deadlock in trie_update_elem
bpf
|
|
|
|
39 |
1d03h |
44d
|
|
INFO: rcu detected stall in kauditd_thread (4)
audit
bpf
|
C |
|
|
6 |
3d20h |
44d
|
💬 6 [40d] |
possible deadlock in sk_psock_drop
bpf
net
|
|
|
|
31 |
16h53m |
45d
|
|
general protection fault in bpf_check (2)
bpf
|
C |
done |
|
7 |
38d |
49d
|
💬 1 [47d] |
possible deadlock in trie_delete_elem
bpf
|
C |
done |
|
15420 |
2h12m |
51d
|
💬 1 [29d] |
possible deadlock in sock_hash_delete_elem (2)
net
bpf
|
C |
|
|
758 |
1h57m |
52d
|
💬 2 [13d] |
WARNING in __sock_map_delete
bpf
net
|
C |
|
|
34 |
36d |
53d
|
|
possible deadlock in sock_map_delete_elem
bpf
net
|
C |
|
|
453 |
3h45m |
53d
|
|
UBSAN: array-index-out-of-bounds in bpf_prog_select_runtime
bpf
|
C |
done |
|
5 |
17d |
57d
|
PATCH [4d03h] |
possible deadlock in __bpf_ringbuf_reserve
bpf
|
C |
error |
|
42 |
9h00m |
59d
|
💬 6 [58d] |
KASAN: slab-out-of-bounds Read in btf_datasec_check_meta
bpf
|
C |
done |
|
6484 |
45m |
60d
|
PATCH [60d] |
KMSAN: uninit-value in bpf_prog_test_run_xdp
bpf
net
|
C |
|
|
2 |
47d |
61d
|
|
KMSAN: uninit-value in ___bpf_prog_run (4)
bpf
|
C |
|
|
135 |
1h51m |
136d
|
|
WARNING in format_decode (3)
bpf
trace
|
C |
done |
|
539 |
14h23m |
171d
|
PATCH [165d] |
inconsistent lock state in __lock_task_sighand
bpf
trace
|
C |
done |
|
752 |
172d |
176d
|
|
INFO: rcu detected stall in sys_unshare (9)
bpf
|
C |
inconclusive |
|
3 |
68d |
182d
|
💬 1 [60d] |
BUG: unable to handle kernel NULL pointer dereference in sk_msg_recvmsg
net
bpf
|
C |
|
|
67 |
6d09h |
197d
|
💬 1 [25d] |
possible deadlock in task_fork_fair
bpf
|
C |
done |
|
8620 |
6h44m |
215d
|
💬 1 [29d] |
possible deadlock in console_flush_all (2)
trace
bpf
|
C |
error |
|
52468 |
2h44m |
215d
|
💬 14 [44d] |