From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from out-186.mta0.migadu.com (out-186.mta0.migadu.com [91.218.175.186]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3A5A92C0286 for ; Fri, 12 Sep 2025 20:01:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.186 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757707295; cv=none; b=sRNHwQKXda97BO7BtNHLn0SbTOjhz7ltXmVcbdf1V3sX5CmURpyAJUcRcx+OODUCPf0JNKZ+HL3SoI/9benw/Y+IPL2j6FNX0zm0v7KR77K9vYfuxvhJLrDEEHRxdeHCQAancEUTiYgDIt3aGYJAlzSybIDLrorcCzh92ScmcwU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757707295; c=relaxed/simple; bh=2tUKl+8kzS9h12P8LQQ2md4UQEjQWSngkh1BZ76TGlU=; h=Message-ID:Date:MIME-Version:Subject:From:To:References: In-Reply-To:Content-Type; b=DPEeAzIB4nKmxcwTQ5L7MoOsYqfdkb4c/osfvnZP7RkwRR9kQzcCgGVlFrCYEzK/Si02iwmgzmDLBrXn2Ia5vfC+YTrq47w/HRL/nvh+uDe9Yi71a6ccmnPyKKzOti5NmQHjlT2UthCF1QqdhyGahVZU95U+9lx0UPUvYpgkT2M= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=b5GjGF39; arc=none smtp.client-ip=91.218.175.186 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="b5GjGF39" Message-ID: <691d3ecd-7960-46bb-b41e-be223e320d33@linux.dev> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1757707279; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=hteSQ5La1a1bnjrdYMX9ISKonmrqjcqnGCeh/pREnv4=; b=b5GjGF39cCzB8ZzlBCuOdwy71z2ykNjKiiPKPkYzf1A/xvQZfYojHT9loWLTMdFvoSWP4f Dvl6LYX7lrqRlEpFeFtO0l0cDApobx7EkXuRoDwPDIFUHNbNgbETuo/UkejNi9CODGWwLO suC8CfLbfOjEW4MTKLfGjfZ+NTQAEik= Date: Fri, 12 Sep 2025 13:01:13 -0700 Precedence: bulk X-Mailing-List: linux-rdma@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Subject: Re: [syzbot] [rdma?] WARNING in gid_table_release_one (3) X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: "Yanjun.Zhu" To: syzbot , edwards@nvidia.com, hdanton@sina.com, jgg@ziepe.ca, leon@kernel.org, leonro@nvidia.com, linux-kernel@vger.kernel.org, linux-rdma@vger.kernel.org, syzkaller-bugs@googlegroups.com References: <68c3a49a.a70a0220.3543fc.0031.GAE@google.com> <6f3b9149-2a2d-4532-b38f-946b98e72000@linux.dev> Content-Language: en-US In-Reply-To: <6f3b9149-2a2d-4532-b38f-946b98e72000@linux.dev> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT On 9/12/25 12:38 PM, yanjun.zhu wrote: > On 9/11/25 9:42 PM, syzbot wrote: >> syzbot has bisected this issue to: >> >> commit a92fbeac7e94a420b55570c10fe1b90e64da4025 >> Author: Leon Romanovsky >> Date:   Tue May 28 12:52:51 2024 +0000 >> >>      RDMA/cache: Release GID table even if leak is detected > > Maybe this commit just detects ref leaks and reports ref leak. > Even though this commit is reverted, this ref leak still occurs. > > The root cause is not in this commit. > > " > GID entry ref leak for dev syz1 index 2 ref=615 > " > > Ref leaks in dev syz1. In this link: https://syzkaller.appspot.com/x/log.txt?x=157dab12580000 " [ 184.209420][ T6164] infiniband syz1: set active [ 184.215960][ T6164] infiniband syz1: added syz_tun [ 184.222514][ T6001] veth0_macvtap: entered promiscuous mode [ 184.231935][ T42] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 184.239777][ T42] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 184.256962][ T6001] veth1_macvtap: entered promiscuous mode [ 184.276479][ T6164] syz1: rxe_create_cq: returned err = -12 < -- rxe_create_cq failed, the test should not continue. [ 184.288430][ T6008] veth0_vlan: entered promiscuous mode " err = -12, is -ENOMEM. It means that memory allocation fails. Zhu Yanjun > > Zhu Yanjun > >> >> bisection log:  https://syzkaller.appspot.com/x/bisect.txt? >> x=13fc9642580000 >> start commit:   5f540c4aade9 Add linux-next specific files for 20250910 >> git tree:       linux-next >> final oops:     https://syzkaller.appspot.com/x/report.txt? >> x=10029642580000 >> console output: https://syzkaller.appspot.com/x/log.txt?x=17fc9642580000 >> kernel config:  https://syzkaller.appspot.com/x/.config? >> x=5ed48faa2cb8510d >> dashboard link: https://syzkaller.appspot.com/bug? >> extid=b0da83a6c0e2e2bddbd4 >> syz repro:      https://syzkaller.appspot.com/x/repro.syz? >> x=15b52362580000 >> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=16b41642580000 >> >> Reported-by: syzbot+b0da83a6c0e2e2bddbd4@syzkaller.appspotmail.com >> Fixes: a92fbeac7e94 ("RDMA/cache: Release GID table even if leak is >> detected") >> >> For information about bisection process see: https://goo.gl/ >> tpsmEJ#bisection >