syzbot


Applied filters: Label=subsystems:rdma (drop)
Title Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
general protection fault in rxe_completer rdma 281 240d 320d 23/26 205d 5993b75d0bc7 RDMA/rxe: Fix unsafe drain work queue code
INFO: trying to register non-static key in skb_dequeue (2) rdma syz error 123 324d 368d 23/26 219d 2a62b6210ce8 RDMA/rxe: Fix the use-before-initialization error of resp_pkts
INFO: trying to register non-static key in rxe_cleanup_task (2) rdma 148 365d 431d 22/26 331d b2b1ddc45745 RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
possible deadlock in worker_thread rdma 1 818d 814d 22/26 435d 081bdc9fe05b RDMA/ib_srp: Fix a deadlock bf23747ee053 loop: revert "make autoclear operation asynchronous"
KASAN: use-after-free Read in ucma_destroy_private_ctx rdma 1 858d 852d 22/26 435d 36e8169ec973 RDMA/ucma: Protect mc during concurrent multicast leaves
BUG: sleeping function called from invalid context in smc_pnet_apply_ib rdma C inconclusive 92 799d 807d 22/26 435d 7ff57e98fb78 net/smc: Use a mutex for locking "struct smc_pnettable"
INFO: trying to register non-static key in rxe_cleanup_task rdma syz 299 437d 712d 22/26 435d fd5382c5805c RDMA/rxe: Fix error unwind in rxe_create_qp()
WARNING: refcount bug in nldev_newlink rdma C 33 509d 514d 22/26 435d e42f9c2e6aad RDMA: Add missed netdev_put() for the netdevice_tracker
WARNING: refcount bug in free_netdevs rdma 3 509d 513d 22/26 435d e42f9c2e6aad RDMA: Add missed netdev_put() for the netdevice_tracker
BUG: unable to handle kernel NULL pointer dereference in __rxe_do_task rdma syz 120 562d 631d 22/26 435d a625ca30eff8 RDMA/rxe: Fix "kernel NULL pointer dereference" error
BUG: corrupted list in rdma_listen (2) rdma C inconclusive 5 816d 883d 22/26 435d 22e9f71072fa RDMA/cma: Do not change route.addr.src_addr outside state checks
WARNING: refcount bug in put_gid_ndev rdma 3 512d 513d 22/26 435d e42f9c2e6aad RDMA: Add missed netdev_put() for the netdevice_tracker
upstream boot error: WARNING in alloc_workqueue rdma 1 630d 630d 22/26 435d 9993a4f989c7 virtio: Revert "virtio: find_vqs() add arg sizes"
KMSAN: kernel-infoleak in ucma_init_qp_attr rdma 1 862d 852d 20/26 788d b35a0f4dd544 RDMA/core: Don't infoleak GRH fields
general protection fault in nldev_stat_set_doit (2) rdma 12 894d 902d 20/26 788d d821f7c13ca0 RDMA/nldev: Check stat attribute before accessing it
KASAN: use-after-free Read in rxe_queue_cleanup rdma 65 870d 898d 20/26 788d 84b01721e804 RDMA: Fix use-after-free in rxe_queue_cleanup
WARNING: refcount bug in rxe_qp_do_cleanup rdma 1 1093d 1090d 20/26 907d 67f29896fdc8 RDMA/rxe: Clear all QP fields if creation failed
BUG: sleeping function called from invalid context in rxe_alloc_nl rdma C done 475 1187d 1201d 20/26 1121d c4369575b2bc RDMA/rxe: Fix bug in rxe_alloc()
possible deadlock in _destroy_id rdma C unreliable 28 1256d 1264d 19/26 1152d dd37d2f59eb8 RDMA/cma: Fix deadlock on &lock in rdma_cma_listen_on_all() error unwind
KASAN: use-after-free Read in ucma_close (2) rdma syz done 1 1333d 1332d 15/26 1265d f5449e74802c RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
KASAN: use-after-free Write in addr_resolve rdma 1 1427d 1424d 15/26 1326d f6a9d47ae685 RDMA/cma: Execute rdma_cm destruction from a handler properly
KASAN: use-after-free Read in addr_handler (2) rdma 2 1381d 1424d 15/26 1326d f6a9d47ae685 RDMA/cma: Execute rdma_cm destruction from a handler properly
WARNING in ib_unregister_device_queued rdma 2 1458d 1469d 15/26 1326d 0cb42c026583 RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued()
KMSAN: uninit-value in ucma_connect rdma C 138 1331d 1383d 15/26 1326d 31142a4ba617 RDMA/cm: Add min length checks to user structure copies
KMSAN: uninit-value in xa_load rdma C 208 1327d 1383d 15/26 1326d 31142a4ba617 RDMA/cm: Add min length checks to user structure copies
KASAN: use-after-free Read in addr_handler rdma syz done 12 1487d 1969d 15/26 1456d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KASAN: use-after-free Read in cma_cancel_operation rdma C done 617 1543d 2224d 15/26 1456d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KASAN: use-after-free Read in rdma_listen (2) rdma C done 354 1494d 1863d 15/26 1456d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
KASAN: use-after-free Read in __list_del_entry_valid (4) rdma C done 16 1544d 2232d 15/26 1456d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
general protection fault in rdma_listen (2) rdma syz done 104 1494d 2005d 15/26 1456d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
possible deadlock in cma_netdev_callback rdma C done 1399 1488d 1530d 15/26 1456d 33fb27fd5446 RDMA/siw: Fix passive connection establishment
BUG: corrupted list in rdma_listen rdma C 202 1628d 2207d 15/26 1456d 7c11910783a1 RDMA/ucma: Put a lock around every call to the rdma_cm layer
INFO: trying to register non-static key in xa_destroy rdma C done 46 1503d 1531d 15/26 1480d 12e5eef0f4d8 RDMA/siw: Fix failure handling during device creation
general protection fault in nldev_stat_set_doit rdma C done 8 1514d 1531d 15/26 1480d 78f34a16c286 RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing
KMSAN: use-after-free in rdma_listen rdma C 26 1522d 1667d 15/26 1501d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
KMSAN: uninit-value in rdma_listen rdma C 28 1678d 2043d 15/26 1501d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
WARNING in cma_exit_net rdma 25 1859d 1860d 12/26 1786d 061ccb52d23c RDMA/cma: Set proper port number as index
KASAN: use-after-free Read in rdma_listen rdma C 1548 1865d 2225d 11/26 1864d 5fc01fb846bc RDMA/cma: Rollback source IP address if failing to acquire device
KASAN: use-after-free Read in alloc_workqueue rdma C 37 1877d 1889d 11/26 1864d 009bb421b6ce workqueue, lockdep: Fix an alloc_workqueue() error path
KASAN: use-after-free Read in rdma_resolve_addr rdma 1 2048d 2047d 11/26 1900d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in cma_acquire_dev rdma 1 2130d 2129d 11/26 1900d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in wait_for_completion rdma 1 2023d 2023d 11/26 1900d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in __list_add_valid (5) rdma C 16 2226d 2232d 11/26 1900d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
general protection fault in addr_resolve rdma C 32 2036d 2053d 11/26 2000d fe33507ec38a RDMA/core: Check error status of rdma_find_ndev_for_src_ip_rcu
KASAN: use-after-free Write in ucma_put_ctx rdma syz 11 2048d 2067d 11/26 2032d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
KASAN: use-after-free Read in cma_bind_port rdma syz 2 2062d 2067d 11/26 2032d 5fe23f262e05 ucma: fix a use-after-free in ucma_resolve_ip()
INFO: task hung in ucma_destroy_id rdma C 46 2208d 2245d 5/26 2131d ef95a90ae6f4 RDMA/ucma: ucma_context reference leak in error path
WARNING: kmalloc bug in memdup_user (2) rdma 1 2231d 2231d 5/26 2183d 5f3e3b85cc0a RDMA/ucma: Correct option size check using optlen
general protection fault in rdma_addr_size rdma C 2 2241d 2234d 5/26 2183d e8980d67d601 RDMA/ucma: Ensure that CM_ID exists prior to access it
general protection fault in ucma_set_ib_path (2) rdma C 6 2216d 2223d 5/26 2188d 8435168d50e6 RDMA/ucma: Don't allow setting RDMA_OPTION_IB_PATH without an RDMA device
general protection fault in rdma_notify rdma C 3 2237d 2234d 5/26 2220d c8d3bcbfc5ea RDMA/ucma: Check that device exists prior to accessing it
kernel BUG at lib/string.c:LINE! (3) rdma C 5 2229d 2230d 5/26 2220d 84652aefb347 RDMA/ucma: Introduce safer rdma_addr_size() variants
general protection fault in rdma_init_qp_attr (2) rdma C 753 2228d 2234d 5/26 2220d 4b658d1bbc16 RDMA/ucma: Check that device is connected prior to access it
KASAN: null-ptr-deref Write in rdma_resolve_addr rdma C 66 2237d 2248d 4/26 2234d 2975d5de6428 RDMA/ucma: Check AF family prior resolving address
kernel BUG at lib/string.c:LINE! (2) rdma syz 2 2245d 2245d 4/26 2234d 0c81ffc60d52 RDMA/ucma: Don't allow join attempts for unsupported AF family
KASAN: use-after-free Read in ucma_close rdma C 176 2237d 2251d 4/26 2234d ed65a4dc2208 RDMA/ucma: Fix use-after-free access in ucma_close
general protection fault in rdma_join_multicast rdma C 258 2237d 2251d 4/26 2234d 7688f2c3bbf5 RDMA/ucma: Fix access to non-initialized CM_ID object
WARNING: kmalloc bug in memdup_user rdma C 441 2235d 2251d 4/26 2234d 6a21dfc0d0db RDMA/ucma: Limit possible option size
general protection fault in ucma_connect rdma C 2 2242d 2241d 4/26 2234d e8980d67d601 RDMA/ucma: Ensure that CM_ID exists prior to access it
general protection fault in rdma_init_qp_attr rdma C 2096 2234d 2250d 4/26 2234d a5880b844303 RDMA/ucma: Check that user doesn't overflow QP state