KASAN: slab-use-after-free Read in ib_register_device
rdma
|
19 |
|
|
|
1 |
81d |
77d
|
29/29 |
8d13h |
d0706bfd3ee4
RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
|
INFO: trying to register non-static key in rxe_qp_do_cleanup
rdma
|
-1 |
|
|
|
7 |
47d |
89d
|
29/29 |
8d13h |
1c7eec4d5f3b
RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug
|
KASAN: slab-use-after-free Read in nla_put (2)
rdma
|
19 |
|
|
|
1 |
135d |
130d
|
28/29 |
35d |
1d6a9e7449e2
RDMA/core: Fix use-after-free when rename device name
|
KASAN: slab-use-after-free Read in dev_get_flags
rdma
|
19 |
|
|
|
7 |
236d |
222d
|
28/29 |
70d |
2ac5415022d1
RDMA/rxe: Remove the direct link to net_device
16b87037b488
RDMA/siw: Remove direct link to net_device
|
WARNING in gid_table_release_one (2)
rdma
|
-1 |
|
|
|
1 |
321d |
317d
|
28/29 |
265d |
1403c8b14765
IB/core: Fix ib_cache_setup_one error flow cleanup
|
general protection fault in rxe_completer
rdma
|
2 |
|
|
|
281 |
677d |
757d
|
23/29 |
643d |
5993b75d0bc7
RDMA/rxe: Fix unsafe drain work queue code
|
INFO: trying to register non-static key in skb_dequeue (2)
rdma
|
-1 |
syz |
error |
|
123 |
761d |
805d
|
23/29 |
656d |
2a62b6210ce8
RDMA/rxe: Fix the use-before-initialization error of resp_pkts
|
INFO: trying to register non-static key in rxe_cleanup_task (2)
rdma
|
-1 |
|
|
|
148 |
802d |
868d
|
22/29 |
768d |
b2b1ddc45745
RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
|
possible deadlock in worker_thread
rdma
|
4 |
|
|
|
1 |
1255d |
1251d
|
22/29 |
873d |
081bdc9fe05b
RDMA/ib_srp: Fix a deadlock
bf23747ee053
loop: revert "make autoclear operation asynchronous"
|
KASAN: use-after-free Read in ucma_destroy_private_ctx
rdma
|
19 |
|
|
|
1 |
1295d |
1289d
|
22/29 |
873d |
36e8169ec973
RDMA/ucma: Protect mc during concurrent multicast leaves
|
BUG: sleeping function called from invalid context in smc_pnet_apply_ib
rdma
|
5 |
C |
inconclusive |
|
92 |
1237d |
1244d
|
22/29 |
873d |
7ff57e98fb78
net/smc: Use a mutex for locking "struct smc_pnettable"
|
INFO: trying to register non-static key in rxe_cleanup_task
rdma
|
-1 |
syz |
|
|
299 |
874d |
1150d
|
22/29 |
873d |
fd5382c5805c
RDMA/rxe: Fix error unwind in rxe_create_qp()
|
WARNING: refcount bug in nldev_newlink
rdma
|
13 |
C |
|
|
33 |
946d |
951d
|
22/29 |
873d |
e42f9c2e6aad
RDMA: Add missed netdev_put() for the netdevice_tracker
|
WARNING: refcount bug in free_netdevs
rdma
|
13 |
|
|
|
3 |
946d |
950d
|
22/29 |
873d |
e42f9c2e6aad
RDMA: Add missed netdev_put() for the netdevice_tracker
|
BUG: unable to handle kernel NULL pointer dereference in __rxe_do_task
rdma
|
10 |
syz |
|
|
120 |
999d |
1068d
|
22/29 |
873d |
a625ca30eff8
RDMA/rxe: Fix "kernel NULL pointer dereference" error
|
BUG: corrupted list in rdma_listen (2)
rdma
|
19 |
C |
inconclusive |
|
5 |
1253d |
1320d
|
22/29 |
873d |
22e9f71072fa
RDMA/cma: Do not change route.addr.src_addr outside state checks
|
WARNING: refcount bug in put_gid_ndev
rdma
|
13 |
|
|
|
3 |
949d |
950d
|
22/29 |
873d |
e42f9c2e6aad
RDMA: Add missed netdev_put() for the netdevice_tracker
|
upstream boot error: WARNING in alloc_workqueue
rdma
|
-1 |
|
|
|
1 |
1067d |
1067d
|
22/29 |
873d |
9993a4f989c7
virtio: Revert "virtio: find_vqs() add arg sizes"
|
KMSAN: kernel-infoleak in ucma_init_qp_attr
rdma
|
9 |
|
|
|
1 |
1299d |
1289d
|
20/29 |
1225d |
b35a0f4dd544
RDMA/core: Don't infoleak GRH fields
|
general protection fault in nldev_stat_set_doit (2)
rdma
|
2 |
|
|
|
12 |
1331d |
1339d
|
20/29 |
1225d |
d821f7c13ca0
RDMA/nldev: Check stat attribute before accessing it
|
KASAN: use-after-free Read in rxe_queue_cleanup
rdma
|
19 |
|
|
|
65 |
1308d |
1335d
|
20/29 |
1225d |
84b01721e804
RDMA: Fix use-after-free in rxe_queue_cleanup
|
WARNING: refcount bug in rxe_qp_do_cleanup
rdma
|
13 |
|
|
|
1 |
1530d |
1528d
|
20/29 |
1344d |
67f29896fdc8
RDMA/rxe: Clear all QP fields if creation failed
|
BUG: sleeping function called from invalid context in rxe_alloc_nl
rdma
|
5 |
C |
done |
|
475 |
1625d |
1638d
|
20/29 |
1558d |
c4369575b2bc
RDMA/rxe: Fix bug in rxe_alloc()
|
possible deadlock in _destroy_id
rdma
|
4 |
C |
unreliable |
|
28 |
1693d |
1701d
|
19/29 |
1589d |
dd37d2f59eb8
RDMA/cma: Fix deadlock on &lock in rdma_cma_listen_on_all() error unwind
|
KASAN: use-after-free Read in ucma_close (2)
rdma
|
19 |
syz |
done |
|
1 |
1770d |
1770d
|
15/29 |
1703d |
f5449e74802c
RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
|
KASAN: use-after-free Write in addr_resolve
rdma
|
24 |
|
|
|
1 |
1864d |
1861d
|
15/29 |
1763d |
f6a9d47ae685
RDMA/cma: Execute rdma_cm destruction from a handler properly
|
KASAN: use-after-free Read in addr_handler (2)
rdma
|
19 |
|
|
|
2 |
1818d |
1861d
|
15/29 |
1763d |
f6a9d47ae685
RDMA/cma: Execute rdma_cm destruction from a handler properly
|
WARNING in ib_unregister_device_queued
rdma
|
-1 |
|
|
|
2 |
1895d |
1907d
|
15/29 |
1763d |
0cb42c026583
RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued()
|
KMSAN: uninit-value in ucma_connect
rdma
|
7 |
C |
|
|
138 |
1768d |
1820d
|
15/29 |
1763d |
31142a4ba617
RDMA/cm: Add min length checks to user structure copies
|
KMSAN: uninit-value in xa_load
rdma
|
7 |
C |
|
|
208 |
1764d |
1820d
|
15/29 |
1763d |
31142a4ba617
RDMA/cm: Add min length checks to user structure copies
|
KASAN: use-after-free Read in addr_handler
rdma
|
19 |
syz |
done |
|
12 |
1925d |
2406d
|
15/29 |
1893d |
7c11910783a1
RDMA/ucma: Put a lock around every call to the rdma_cm layer
|
KASAN: use-after-free Read in cma_cancel_operation
rdma
|
19 |
C |
done |
|
617 |
1981d |
2661d
|
15/29 |
1893d |
7c11910783a1
RDMA/ucma: Put a lock around every call to the rdma_cm layer
|
KASAN: use-after-free Read in rdma_listen (2)
rdma
|
19 |
C |
done |
|
354 |
1931d |
2300d
|
15/29 |
1893d |
7c11910783a1
RDMA/ucma: Put a lock around every call to the rdma_cm layer
|
KASAN: use-after-free Read in __list_del_entry_valid (4)
rdma
|
19 |
C |
done |
|
16 |
1981d |
2669d
|
15/29 |
1893d |
7c11910783a1
RDMA/ucma: Put a lock around every call to the rdma_cm layer
|
general protection fault in rdma_listen (2)
rdma
|
2 |
syz |
done |
|
104 |
1931d |
2442d
|
15/29 |
1893d |
7c11910783a1
RDMA/ucma: Put a lock around every call to the rdma_cm layer
|
possible deadlock in cma_netdev_callback
rdma
|
4 |
C |
done |
|
1399 |
1925d |
1967d
|
15/29 |
1893d |
33fb27fd5446
RDMA/siw: Fix passive connection establishment
|
BUG: corrupted list in rdma_listen
rdma
|
8 |
C |
|
|
202 |
2065d |
2644d
|
15/29 |
1893d |
7c11910783a1
RDMA/ucma: Put a lock around every call to the rdma_cm layer
|
INFO: trying to register non-static key in xa_destroy
rdma
|
-1 |
C |
done |
|
46 |
1941d |
1968d
|
15/29 |
1917d |
12e5eef0f4d8
RDMA/siw: Fix failure handling during device creation
|
general protection fault in nldev_stat_set_doit
rdma
|
2 |
C |
done |
|
8 |
1951d |
1968d
|
15/29 |
1917d |
78f34a16c286
RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing
|
KMSAN: use-after-free in rdma_listen
rdma
|
18 |
C |
|
|
26 |
1959d |
2104d
|
15/29 |
1938d |
5fc01fb846bc
RDMA/cma: Rollback source IP address if failing to acquire device
|
KMSAN: uninit-value in rdma_listen
rdma
|
7 |
C |
|
|
28 |
2116d |
2480d
|
15/29 |
1938d |
5fc01fb846bc
RDMA/cma: Rollback source IP address if failing to acquire device
|
WARNING in cma_exit_net
rdma
|
-1 |
|
|
|
25 |
2296d |
2297d
|
12/29 |
2223d |
061ccb52d23c
RDMA/cma: Set proper port number as index
|
KASAN: use-after-free Read in rdma_listen
rdma
|
19 |
C |
|
|
1548 |
2302d |
2662d
|
11/29 |
2302d |
5fc01fb846bc
RDMA/cma: Rollback source IP address if failing to acquire device
|
KASAN: use-after-free Read in alloc_workqueue
rdma
|
19 |
C |
|
|
37 |
2314d |
2326d
|
11/29 |
2302d |
009bb421b6ce
workqueue, lockdep: Fix an alloc_workqueue() error path
|
KASAN: use-after-free Read in rdma_resolve_addr
rdma
|
19 |
|
|
|
1 |
2485d |
2485d
|
11/29 |
2337d |
5fe23f262e05
ucma: fix a use-after-free in ucma_resolve_ip()
|
KASAN: use-after-free Read in cma_acquire_dev
rdma
|
19 |
|
|
|
1 |
2567d |
2566d
|
11/29 |
2337d |
5fe23f262e05
ucma: fix a use-after-free in ucma_resolve_ip()
|
KASAN: use-after-free Read in wait_for_completion
rdma
|
19 |
|
|
|
1 |
2460d |
2460d
|
11/29 |
2337d |
5fe23f262e05
ucma: fix a use-after-free in ucma_resolve_ip()
|
KASAN: use-after-free Read in __list_add_valid (5)
rdma
|
19 |
C |
|
|
16 |
2663d |
2669d
|
11/29 |
2337d |
5fe23f262e05
ucma: fix a use-after-free in ucma_resolve_ip()
|
general protection fault in addr_resolve
rdma
|
2 |
C |
|
|
32 |
2473d |
2490d
|
11/29 |
2437d |
fe33507ec38a
RDMA/core: Check error status of rdma_find_ndev_for_src_ip_rcu
|
KASAN: use-after-free Write in ucma_put_ctx
rdma
|
24 |
syz |
|
|
11 |
2485d |
2504d
|
11/29 |
2469d |
5fe23f262e05
ucma: fix a use-after-free in ucma_resolve_ip()
|
KASAN: use-after-free Read in cma_bind_port
rdma
|
19 |
syz |
|
|
2 |
2499d |
2504d
|
11/29 |
2469d |
5fe23f262e05
ucma: fix a use-after-free in ucma_resolve_ip()
|
INFO: task hung in ucma_destroy_id
rdma
|
1 |
C |
|
|
46 |
2645d |
2682d
|
5/29 |
2568d |
ef95a90ae6f4
RDMA/ucma: ucma_context reference leak in error path
|
WARNING: kmalloc bug in memdup_user (2)
rdma
|
-1 |
|
|
|
1 |
2668d |
2668d
|
5/29 |
2620d |
5f3e3b85cc0a
RDMA/ucma: Correct option size check using optlen
|
general protection fault in rdma_addr_size
rdma
|
2 |
C |
|
|
2 |
2678d |
2671d
|
5/29 |
2620d |
e8980d67d601
RDMA/ucma: Ensure that CM_ID exists prior to access it
|
general protection fault in ucma_set_ib_path (2)
rdma
|
2 |
C |
|
|
6 |
2653d |
2660d
|
5/29 |
2625d |
8435168d50e6
RDMA/ucma: Don't allow setting RDMA_OPTION_IB_PATH without an RDMA device
|
general protection fault in rdma_notify
rdma
|
2 |
C |
|
|
3 |
2674d |
2671d
|
5/29 |
2657d |
c8d3bcbfc5ea
RDMA/ucma: Check that device exists prior to accessing it
|
general protection fault in rdma_init_qp_attr (2)
rdma
|
2 |
C |
|
|
753 |
2665d |
2671d
|
5/29 |
2657d |
4b658d1bbc16
RDMA/ucma: Check that device is connected prior to access it
|
kernel BUG at lib/string.c:LINE! (3)
rdma
|
-1 |
C |
|
|
5 |
2666d |
2667d
|
5/29 |
2657d |
84652aefb347
RDMA/ucma: Introduce safer rdma_addr_size() variants
|
general protection fault in ucma_connect
rdma
|
2 |
C |
|
|
2 |
2679d |
2678d
|
4/29 |
2671d |
e8980d67d601
RDMA/ucma: Ensure that CM_ID exists prior to access it
|
kernel BUG at lib/string.c:LINE! (2)
rdma
|
-1 |
syz |
|
|
2 |
2682d |
2682d
|
4/29 |
2671d |
0c81ffc60d52
RDMA/ucma: Don't allow join attempts for unsupported AF family
|
KASAN: null-ptr-deref Write in rdma_resolve_addr
rdma
|
12 |
C |
|
|
66 |
2674d |
2685d
|
4/29 |
2671d |
2975d5de6428
RDMA/ucma: Check AF family prior resolving address
|
general protection fault in rdma_join_multicast
rdma
|
2 |
C |
|
|
258 |
2674d |
2688d
|
4/29 |
2671d |
7688f2c3bbf5
RDMA/ucma: Fix access to non-initialized CM_ID object
|
KASAN: use-after-free Read in ucma_close
rdma
|
19 |
C |
|
|
176 |
2674d |
2688d
|
4/29 |
2671d |
ed65a4dc2208
RDMA/ucma: Fix use-after-free access in ucma_close
|
WARNING: kmalloc bug in memdup_user
rdma
|
-1 |
C |
|
|
441 |
2672d |
2688d
|
4/29 |
2671d |
6a21dfc0d0db
RDMA/ucma: Limit possible option size
|
general protection fault in rdma_init_qp_attr
rdma
|
2 |
C |
|
|
2096 |
2671d |
2687d
|
4/29 |
2671d |
a5880b844303
RDMA/ucma: Check that user doesn't overflow QP state
|