syzbot


Applied filters: Label=subsystems:rdma (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KFENCE: invalid free in gid_table_release_one rdma 24 C error 5478 9d22h 22d 22/29 never 973403ca3553 RDMA/core: Fix memory free for GID table
KMSAN: uninit-value in ib_nl_handle_ip_res_resp rdma 7 C 8 153d 204d 29/29 87d a7b8e876e0ef RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly
WARNING in gid_table_release_one (3) rdma -1 C done 455 110d 345d 29/29 87d 57f3cb6c8415 RDMA/cm: Fix leaking the multicast GID table reference
WARNING in rxe_skb_tx_dtor rdma -1 C 11 244d 356d 29/29 196d 3c3e9a9f2972 RDMA/rxe: Flush delayed SKBs while releasing RXE resources
KASAN: slab-use-after-free Read in ib_register_device rdma 19 1 362d 358d 29/29 289d d0706bfd3ee4 RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
INFO: trying to register non-static key in rxe_qp_do_cleanup rdma -1 7 328d 370d 29/29 289d 1c7eec4d5f3b RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug
KASAN: slab-use-after-free Read in nla_put (2) rdma 19 1 416d 411d 28/29 316d 1d6a9e7449e2 RDMA/core: Fix use-after-free when rename device name
KASAN: slab-use-after-free Read in dev_get_flags rdma 19 7 517d 503d 28/29 351d 2ac5415022d1 RDMA/rxe: Remove the direct link to net_device 16b87037b488 RDMA/siw: Remove direct link to net_device
WARNING in gid_table_release_one (2) rdma -1 1 602d 598d 28/29 546d 1403c8b14765 IB/core: Fix ib_cache_setup_one error flow cleanup
general protection fault in rxe_completer rdma 2 281 958d 1038d 23/29 924d 5993b75d0bc7 RDMA/rxe: Fix unsafe drain work queue code
INFO: trying to register non-static key in skb_dequeue (2) rdma -1 syz error 123 1042d 1086d 23/29 937d 2a62b6210ce8 RDMA/rxe: Fix the use-before-initialization error of resp_pkts
INFO: trying to register non-static key in rxe_cleanup_task (2) rdma -1 148 1083d 1149d 22/29 1049d b2b1ddc45745 RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
possible deadlock in worker_thread rdma 4 1 1536d 1532d 22/29 1154d 081bdc9fe05b RDMA/ib_srp: Fix a deadlock bf23747ee053 loop: revert "make autoclear operation asynchronous"
KASAN: use-after-free Read in ucma_destroy_private_ctx rdma 19 1 1576d 1570d 22/29 1154d 36e8169ec973 RDMA/ucma: Protect mc during concurrent multicast leaves
BUG: sleeping function called from invalid context in smc_pnet_apply_ib rdma 5 C inconclusive 92 1518d 1525d 22/29 1154d 7ff57e98fb78 net/smc: Use a mutex for locking "struct smc_pnettable"
INFO: trying to register non-static key in rxe_cleanup_task rdma -1 syz 299 1155d 1431d 22/29 1154d fd5382c5805c RDMA/rxe: Fix error unwind in rxe_create_qp()
WARNING: refcount bug in nldev_newlink rdma 13 C 33 1227d 1232d 22/29 1154d e42f9c2e6aad RDMA: Add missed netdev_put() for the netdevice_tracker
WARNING: refcount bug in free_netdevs rdma 13 3 1227d 1231d 22/29 1154d e42f9c2e6aad RDMA: Add missed netdev_put() for the netdevice_tracker
BUG: unable to handle kernel NULL pointer dereference in __rxe_do_task rdma 10 syz 120 1280d 1349d 22/29 1154d a625ca30eff8 RDMA/rxe: Fix "kernel NULL pointer dereference" error
BUG: corrupted list in rdma_listen (2) rdma 19 C inconclusive 5 1534d 1601d 22/29 1154d 22e9f71072fa RDMA/cma: Do not change route.addr.src_addr outside state checks
WARNING: refcount bug in put_gid_ndev rdma 13 3 1230d 1231d 22/29 1154d e42f9c2e6aad RDMA: Add missed netdev_put() for the netdevice_tracker
upstream boot error: WARNING in alloc_workqueue net rdma -1 1 1348d 1348d 22/29 1154d 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
KMSAN: kernel-infoleak in ucma_init_qp_attr rdma 9 1 1580d 1570d 20/29 1506d b35a0f4dd544 RDMA/core: Don't infoleak GRH fields
general protection fault in nldev_stat_set_doit (2) rdma 2 12 1612d 1620d 20/29 1506d d821f7c13ca0 RDMA/nldev: Check stat attribute before accessing it
KASAN: use-after-free Read in rxe_queue_cleanup rdma 19 65 1589d 1616d 20/29 1506d 84b01721e804 RDMA: Fix use-after-free in rxe_queue_cleanup
WARNING: refcount bug in rxe_qp_do_cleanup rdma 13 1 1811d 1809d 20/29 1625d 67f29896fdc8 RDMA/rxe: Clear all QP fields if creation failed
BUG: sleeping function called from invalid context in rxe_alloc_nl rdma 5 C done 475 1906d 1919d 20/29 1839d c4369575b2bc RDMA/rxe: Fix bug in rxe_alloc()
possible deadlock in _destroy_id rdma 4 C unreliable 28 1974d 1982d 19/29 1870d dd37d2f59eb8 RDMA/cma: Fix deadlock on &lock in rdma_cma_listen_on_all() error unwind
KASAN: use-after-free Read in ucma_close (2) rdma 19 syz done 1 2051d 2051d 15/29 1984d f5449e74802c RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
KASAN: use-after-free Write in addr_resolve rdma 22 1 2145d 2142d 15/29 2044d f6a9d47ae685 RDMA/cma: Execute rdma_cm destruction from a handler properly
KASAN: use-after-free Read in addr_handler (2) rdma 19 2 2099d 2142d 15/29 2044d f6a9d47ae685 RDMA/cma: Execute rdma_cm destruction from a handler properly
WARNING in ib_unregister_device_queued rdma -1 2 2176d 2188d 15/29 2044d 0cb42c026583 RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued()
KMSAN: uninit-value in ucma_connect rdma 7 C 138 2049d 2101d 15/29 2044d 31142a4ba617 RDMA/cm: Add min length checks to user structure copies
KMSAN: uninit-value in xa_load rdma 7 C 208 2045d 2101d 15/29 2044d 31142a4ba617 RDMA/cm: Add min length checks to user structure copies
KASAN: use-after-free Read in addr_handler rdma 19 syz done 12 2206d 2687d 15/29 2174d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KASAN: use-after-free Read in cma_cancel_operation rdma 19 C done 617 2262d 2942d 15/29 2174d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KASAN: use-after-free Read in rdma_listen (2) rdma 19 C done 354 2212d 2581d 15/29 2174d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KASAN: use-after-free Read in __list_del_entry_valid (4) rdma 19 C done 16 2262d 2950d 15/29 2174d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
general protection fault in rdma_listen (2) rdma 2 syz done 104 2212d 2723d 15/29 2174d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
possible deadlock in cma_netdev_callback rdma 4 C done 1399 2206d 2248d 15/29 2174d 33fb27fd5446 RDMA/siw: Fix passive connection establishment
BUG: corrupted list in rdma_listen rdma 8 C 202 2346d 2925d 15/29 2174d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
INFO: trying to register non-static key in xa_destroy rdma -1 C done 46 2222d 2249d 15/29 2198d 12e5eef0f4d8 RDMA/siw: Fix failure handling during device creation
general protection fault in nldev_stat_set_doit rdma 2 C done 8 2232d 2249d 15/29 2198d 78f34a16c286 RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing
KMSAN: use-after-free in rdma_listen rdma 18 C 26 2240d 2385d 15/29 2219d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen rdma 7 C 28 2397d 2761d 15/29 2219d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
WARNING in cma_exit_net rdma -1 25 2577d 2578d 12/29 2504d 061ccb52d23c RDMA/cma: Set proper port number as index
KASAN: use-after-free Read in rdma_listen rdma 19 C 1548 2583d 2943d 11/29 2583d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
KASAN: use-after-free Read in alloc_workqueue rdma 19 C 37 2595d 2607d 11/29 2583d 009bb421b6ce workqueue, lockdep: Fix an alloc_workqueue() error path
KASAN: use-after-free Read in rdma_resolve_addr rdma 19 1 2766d 2765d 11/29 2618d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in cma_acquire_dev rdma 19 1 2848d 2847d 11/29 2618d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in wait_for_completion rdma 19 1 2741d 2741d 11/29 2618d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in __list_add_valid (5) rdma 19 C 16 2944d 2950d 11/29 2618d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
general protection fault in addr_resolve rdma 2 C 32 2754d 2771d 11/29 2718d fe33507ec38a RDMA/core: Check error status of rdma_find_ndev_for_src_ip_rcu
KASAN: use-after-free Write in ucma_put_ctx rdma 22 syz 11 2766d 2785d 11/29 2750d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in cma_bind_port rdma 19 syz 2 2780d 2785d 11/29 2750d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
INFO: task hung in ucma_destroy_id rdma 1 C 46 2926d 2963d 5/29 2849d ef95a90ae6f4 RDMA/ucma: ucma_context reference leak in error path
WARNING: kmalloc bug in memdup_user (2) rdma -1 1 2949d 2949d 5/29 2901d 5f3e3b85cc0a RDMA/ucma: Correct option size check using optlen
general protection fault in rdma_addr_size rdma 2 C 2 2959d 2952d 5/29 2901d e8980d67d601 RDMA/ucma: Ensure that CM_ID exists prior to access it
general protection fault in ucma_set_ib_path (2) rdma 2 C 6 2934d 2941d 5/29 2906d 8435168d50e6 RDMA/ucma: Don't allow setting RDMA_OPTION_IB_PATH without an RDMA device
kernel BUG at lib/string.c:LINE! (3) rdma -1 C 5 2947d 2948d 5/29 2938d 84652aefb347 RDMA/ucma: Introduce safer rdma_addr_size() variants
general protection fault in rdma_init_qp_attr (2) rdma 2 C 753 2946d 2952d 5/29 2938d 4b658d1bbc16 RDMA/ucma: Check that device is connected prior to access it
general protection fault in rdma_notify rdma 2 C 3 2955d 2952d 5/29 2938d c8d3bcbfc5ea RDMA/ucma: Check that device exists prior to accessing it
general protection fault in rdma_init_qp_attr rdma 2 C 2096 2952d 2968d 4/29 2952d a5880b844303 RDMA/ucma: Check that user doesn't overflow QP state
KASAN: use-after-free Read in ucma_close rdma 19 C 176 2955d 2969d 4/29 2952d ed65a4dc2208 RDMA/ucma: Fix use-after-free access in ucma_close
general protection fault in rdma_join_multicast rdma 2 C 258 2955d 2969d 4/29 2952d 7688f2c3bbf5 RDMA/ucma: Fix access to non-initialized CM_ID object
WARNING: kmalloc bug in memdup_user rdma -1 C 441 2953d 2969d 4/29 2952d 6a21dfc0d0db RDMA/ucma: Limit possible option size
KASAN: null-ptr-deref Write in rdma_resolve_addr rdma 12 C 66 2955d 2966d 4/29 2952d 2975d5de6428 RDMA/ucma: Check AF family prior resolving address
general protection fault in ucma_connect rdma 2 C 2 2960d 2959d 4/29 2952d e8980d67d601 RDMA/ucma: Ensure that CM_ID exists prior to access it
kernel BUG at lib/string.c:LINE! (2) rdma -1 syz 2 2963d 2963d 4/29 2952d 0c81ffc60d52 RDMA/ucma: Don't allow join attempts for unsupported AF family