syzbot


Applied filters: Label=subsystems:rds (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
general protection fault in rds_tcp_accept_one rds 19 C 1334 7d07h 17d 26/29 never 6bf45704a92a net/rds: Fix NULL pointer dereference in rds_tcp_accept_one
WARNING in rds_conn_connect_if_down rds -1 C error 17 722d 1052d 25/29 688d c055fc00c07b net/rds: fix WARNING in rds_conn_connect_if_down
possible deadlock in rds_wake_sk_sleep (4) rds 4 C error 16 751d 1380d 25/29 701d f1acf1ac84d2 net:rds: Fix possible deadlock in rds_message_put
possible deadlock in rds_message_put rds 4 C done error 5 839d 1150d 25/29 701d f1acf1ac84d2 net:rds: Fix possible deadlock in rds_message_put
possible deadlock in rds_tcp_reset_callbacks rds 4 C error 1458 1208d 1286d 22/29 1099d a91b750fd662 net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks()
WARNING: refcount bug in rds_tcp_tune rds 13 166 1386d 1395d 22/29 1099d 6997fbd7a3da net: rds: use maybe_get_net() when acquiring refcount on TCP sockets
BUG: unable to handle kernel NULL pointer dereference in rds_bind rds 10 C done 51 2344d 2356d 13/29 2326d 05733434ee9a net/rds: Check laddr_check before calling it
general protection fault in rds_recv_rcvbuf_delta rds 2 C done 35 2437d 2664d 13/29 2333d c5c1a030a7db net/rds: An rds_sock is added too early to the hash table
KMSAN: uninit-value in rds_connect rds 7 C 952 2495d 2737d 12/29 2468d dd3ac9a68435 net/rds: Check address length before reading address family
KMSAN: uninit-value in rds_bind rds 7 C 6202 2495d 2737d 12/29 2468d dd3ac9a68435 net/rds: Check address length before reading address family
WARNING: refcount bug in rds_sock_addref rds 13 1 2584d 2584d 11/29 2550d 6fa19f5637a6 rds: fix refcount bug in rds_sock_addref
WARNING in rds_message_alloc_sgs rds -1 C 6 2642d 2676d 11/29 2604d ea010070d0a7 net/rds: fix warn in rds_message_alloc_sgs
KASAN: use-after-free Read in __rhashtable_lookup (2) rds 19 C 22 2724d 2745d 10/29 2710d cc4dfb7f70a3 rds: fix two RCU related problems
general protection fault in rds_ib_get_mr rds 2 C 9 2801d 2899d 8/29 2759d 9e630bcb7701 RDS: RDMA: Fix the NULL-ptr deref in rds_ib_get_mr
KASAN: use-after-free Read in rds_cong_queue_updates rds 19 C 18168 2795d 2927d 8/29 2789d f1693c63ab13 rds: avoid unenecessary cong_update in loop transport c809195f5523 rds: clean up loopback rds_connections on netns deletion
WARNING: suspicious RCU usage in rds_loop_conn_alloc rds 4 C 34303 2929d 2936d 5/29 2816d d4014d8cc6df rds: do not call ->conn_alloc with GFP_KERNEL
WARNING in __local_bh_enable_ip (2) rds -1 23 2896d 2906d 5/29 2851d 53d0e83f9329 rds: tcp: must use spin_lock_irq* and not spin_lock_bh with rds_tcp_conn_lock
general protection fault in rds_sendmsg rds 2 C 2 2926d 2926d 5/29 2851d 79a5b9727a1c rds: rds_msg_zcopy should return error of null rm->data.op_mmp_znotifier
KASAN: use-after-free Read in rds_find_bound rds 19 1 2985d 2981d 4/29 2934d ebeeb1ad9b8a rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
KASAN: use-after-free Read in rds_tcp_tune rds 19 12 2958d 2968d 4/29 2934d ebeeb1ad9b8a rds: tcp: use rds_destroy_pending() to synchronize netns/module teardown and rds connection/workq management
KASAN: use-after-free Read in rds_tcp_dev_event rds 19 1 3040d 3033d 4/29 2934d 681648e67d43 rds: tcp: correctly sequence cleanup on netns deletion.
KASAN: stack-out-of-bounds Read in rds_sendmsg rds 17 C 120 2978d 3002d 4/29 2948d 14e138a86f63 RDS: Check cmsg_len before dereferencing CMSG_DATA
general protection fault in __rds_rdma_map rds 2 C 12 3001d 3013d 4/29 2949d f3069c6d33f6 rds: Fix NULL pointer dereference in __rds_rdma_map
WARNING in rds_cmsg_rdma_args rds -1 C 6 2977d 2977d 3/29 2961d c095508770ae RDS: Heap OOB write in rds_message_alloc_sgs()