syzbot


Applied filters: Label=subsystems:smc (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
KASAN: null-ptr-deref Read in smc_tcp_syn_recv_sock smc 11 C error inconclusive 24 10d 354d 23/29 never 6d5e4538364b net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock()
general protection fault in __smc_diag_dump (4) smc 2 C done 6 148d 184d 29/29 123d f584239a9ed2 net/smc: fix general protection fault in __smc_diag_dump
KASAN: use-after-free Read in __pnet_find_base_ndev smc 19 2 178d 191d 29/29 142d 3d3466878afd smc: Fix use-after-free in __pnet_find_base_ndev().
possible deadlock in smc_diag_dump_proto smc 4 C error 113 196d 199d 29/29 142d 5d6b58c932ec net: lockless sock_i_ino()
possible deadlock in smc_shutdown (3) smc 4 2 175d 203d 29/29 142d 9f7c02e03157 nbd: restrict sockets to TCP and UDP
general protection fault in __smc_diag_dump (3) smc 2 C error 102 205d 498d 29/29 197d 60ada4fe644e smc: Fix various oops due to inet_sock type confusion.
possible deadlock in smc_switch_to_fallback (2) smc 4 C error done 27435 326d 634d 29/29 259d 752e2217d789 smc: Fix lockdep false-positive for IPPROTO_SMC.
general protection fault in __smc_diag_dump (2) smc 2 14 515d 569d 28/29 514d 98d4435efcbf net/smc: prevent NULL pointer dereference in txopt_get
BUG: MAX_LOCK_DEPTH too low! (3) smc -1 C done 18 1492d 1501d 22/29 1120d 1de9770d121e net/smc: Avoid overwriting the copies of clcsock callback functions
KASAN: slab-out-of-bounds Read in smc_fback_error_report smc 19 C error 72 1423d 1499d 22/29 1120d 0558226cebee net/smc: Fix slab-out-of-bounds issue in fallback
inconsistent lock state in smc_fback_state_change smc 4 C error 7 1212d 1218d 22/29 1120d af295e854a4e l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
general protection fault in smc_pnet_add (2) smc 2 C inconclusive 590 1436d 1451d 22/29 1120d d22f4f977236 net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
WARNING: refcount bug in smc_pnet_add smc 13 C done 98 1490d 1504d 22/29 1120d 28f922213886 net/smc: fix ref_tracker issue in smc_pnet_add()
memory leak in smc_sysctl_net_init smc 3 C 8 1452d 1457d 22/29 1120d 5ae6acf1d00b net/smc: fix a memory leak in smc_sysctl_net_exit()
memory leak in smc_create (2) smc 3 C 2 1457d 1453d 22/29 1120d 1a74e9932374 net/smc: Fix sock leak when release after smc_shutdown()
general protection fault in smc_pnet_add smc 2 578 1473d 1529d 20/29 1473d 7b9b1d449a7c net/smc: fix possible NULL deref in smc_pnet_add_eth()
possible deadlock in smc_switch_to_fallback smc 4 43575 1562d 1582d 20/29 1473d 7a61432dc813 net/smc: Avoid warning of possible recursive locking
general protection fault in smc_tx_sendmsg smc 2 C done 6369 1726d 1734d 20/29 1592d 17081633e22d net/smc: Ensure correct state of the socket in send path
KASAN: global-out-of-bounds Read in smc_nl_get_sys_info smc 17 C error 27 1889d 1916d 19/29 1837d 25fe2c9c4cd2 smc: fix out of bound access in smc_nl_get_sys_info()
KASAN: slab-out-of-bounds Read in smc_nl_handle_smcr_dev smc 17 1 1920d 1916d 19/29 1837d 995433b795ce net/smc: fix access to parent of an ib device
BUG: unable to handle kernel paging request in smc_nl_handle_smcr_dev smc 8 C 16 1906d 1928d 19/29 1837d 995433b795ce net/smc: fix access to parent of an ib device
WARNING: refcount bug in smc_release (3) smc 13 1 2031d 2020d 15/29 2003d 5fb8642a17aa net/smc: fix sock refcounting in case of termination
WARNING: ODEBUG bug in smc_ib_remove_dev smc -1 52 2196d 2210d 15/29 2165d ece0d7bd7461 net/smc: cancel event worker during device removal
general protection fault in smc_ib_remove_dev smc 2 C done 98 2205d 2217d 15/29 2165d a2f2ef4a54c0 net/smc: check for valid ib_client_data
WARNING: refcount bug in smc_release (2) smc 13 C done 9 2284d 2307d 15/29 2227d 86434744fedf net/smc: add fallback check to connect()
WARNING in smc_unhash_sk (3) smc -1 C done 362 2307d 2397d 14/29 2303d 8204df72bea1 net/smc: fix fastopen for non-blocking connect()
memory leak in smc_create smc 3 C 19 2316d 2329d 14/29 2303d 6d6dd528d5af net/smc: fix refcount non-blocking connect() -part 2
WARNING: refcount bug in smc_release smc 13 C done 8 2316d 2340d 13/29 2310d 301428ea3708 net/smc: fix refcounting for non-blocking connect()
WARNING: ODEBUG bug in __sk_destruct smc -1 C 2855 2417d 2882d 12/29 2397d f9cedf1a9b1c net/smc: do not schedule tx_work in SMC_CLOSED state
memory leak in new_inode_pseudo smc 3 C 136 2446d 2494d 12/29 2445d 355e8d26f719 io_uring: fix memory leak of UNIX domain socket inode
KASAN: use-after-free Read in __smc_diag_dump smc 19 syz 34 2622d 2634d 11/29 2572d 26d92e951fe0 smc: move unhash as early as possible in smc_release()
KASAN: use-after-free Read in kernel_accept smc 19 C 19 2654d 2804d 11/29 2572d 78abe3d0dfad net/smc: fix TCP fallback socket release 26d92e951fe0 smc: move unhash as early as possible in smc_release()
general protection fault in kernel_accept smc 2 C 280 2648d 2809d 11/29 2572d 78abe3d0dfad net/smc: fix TCP fallback socket release 26d92e951fe0 smc: move unhash as early as possible in smc_release()
general protection fault in smc_ioctl (3) smc 2 C 15 2780d 2782d 8/29 2761d 7311d665ca68 net/smc: move sock lock in smc_ioctl()
general protection fault in smc_tx_prepared_sends smc 2 C 7 2786d 2787d 8/29 2761d 7311d665ca68 net/smc: move sock lock in smc_ioctl()
WARNING: refcount bug in smc_tcp_listen_work smc 13 1 2844d 2844d 8/29 2782d e1bbdd570474 net/smc: reduce sock_put() for fallback sockets
general protection fault in smc_ioctl (2) smc 2 C 43 2782d 2805d 8/29 2782d 1992d99882af net/smc: take sock lock in smc_ioctl()
WARNING in smc_unhash_sk smc -1 C 155731 2785d 2947d 8/29 2782d e1bbdd570474 net/smc: reduce sock_put() for fallback sockets
general protection fault in smc_ioctl smc 2 C 5214 2833d 2863d 8/29 2811d 2351abe6f873 net/smc: return 0 for ioctl calls in states INIT and CLOSED
WARNING: ODEBUG bug in del_timer (2) smc -1 C 6 2864d 2865d 8/29 2811d be7f3e59997b net/smc: init conn.tx_work & conn.send_lock sooner
general protection fault in kernel_sock_shutdown smc 2 C 3329 2889d 2947d 5/29 2816d 1255fcb2a655 net/smc: fix shutdown in state SMC_LISTEN
BUG: unable to handle kernel paging request in smc_ib_remember_port_attr smc 8 C 112 2860d 2917d 5/29 2843d d49baa7e12ee net/smc: check for missing nlattrs in SMC_PNETID messages
general protection fault in smc_getname smc 2 C 44 2878d 2942d 5/29 2865d 070204a34884 net/smc: keep clcsock reference in smc_tcp_listen_work()
general protection fault in smc_set_keepalive smc 2 C 6 2881d 2887d 5/29 2865d 070204a34884 net/smc: keep clcsock reference in smc_tcp_listen_work()
general protection fault in smc_setsockopt smc 2 C 504 2878d 2942d 5/29 2865d 070204a34884 net/smc: keep clcsock reference in smc_tcp_listen_work()
general protection fault in smc_getsockopt smc 2 C 577 2878d 2938d 5/29 2865d 070204a34884 net/smc: keep clcsock reference in smc_tcp_listen_work()
WARNING: ODEBUG bug in del_timer smc -1 C 200 2866d 2882d 5/29 2865d 784813aed6ba net/smc: restrict non-blocking connect finish
BUG: unable to handle kernel NULL pointer dereference in smc_getsockopt smc 10 C 9 2866d 2871d 5/29 2865d 070204a34884 net/smc: keep clcsock reference in smc_tcp_listen_work()
possible deadlock in smc_close_non_accepted smc 4 C 4 2940d 2941d 5/29 2876d 3d502067599f net/smc: simplify wait when closing listen socket
general protection fault in smc_create smc 2 C 2 2944d 2944d 4/29 2936d a5dcb73b96a9 net/smc: fix NULL pointer dereference on sock_create_kern() error path