get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2215969/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2215969,
    "url": "http://patchwork.ozlabs.org/api/patches/2215969/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/ltp/patch/20260325-infiniband_rdma-v1-2-9c1bd3e69d29@suse.com/",
    "project": {
        "id": 59,
        "url": "http://patchwork.ozlabs.org/api/projects/59/?format=api",
        "name": "Linux Test Project development",
        "link_name": "ltp",
        "list_id": "ltp.lists.linux.it",
        "list_email": "ltp@lists.linux.it",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260325-infiniband_rdma-v1-2-9c1bd3e69d29@suse.com>",
    "list_archive_url": null,
    "date": "2026-03-25T15:25:35",
    "name": "[2/2] device-drivers/rdma: Add ucma_uaf01 test",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "62bcb453466bf877e995d988f03bcf9bbc137db4",
    "submitter": {
        "id": 83220,
        "url": "http://patchwork.ozlabs.org/api/people/83220/?format=api",
        "name": "Andrea Cervesato",
        "email": "andrea.cervesato@suse.de"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/ltp/patch/20260325-infiniband_rdma-v1-2-9c1bd3e69d29@suse.com/mbox/",
    "series": [
        {
            "id": 497464,
            "url": "http://patchwork.ozlabs.org/api/series/497464/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/ltp/list/?series=497464",
            "date": "2026-03-25T15:25:33",
            "name": "Add infiniband testing suite",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/497464/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2215969/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2215969/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "ltp@lists.linux.it"
        ],
        "Delivered-To": [
            "patchwork-incoming@legolas.ozlabs.org",
            "ltp@picard.linux.it"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=suse.de header.i=@suse.de header.a=rsa-sha256\n header.s=susede2_rsa header.b=J5XTFK8d;\n\tdkim=fail reason=\"signature verification failed\" header.d=suse.de\n header.i=@suse.de header.a=ed25519-sha256 header.s=susede2_ed25519\n header.b=IIGy+kQg;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key)\n header.d=suse.de header.i=@suse.de header.a=rsa-sha256 header.s=susede2_rsa\n header.b=J5XTFK8d;\n\tdkim=neutral header.d=suse.de header.i=@suse.de header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=IIGy+kQg;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=213.254.12.146; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)",
            "smtp-out1.suse.de;\n\tnone"
        ],
        "Received": [
            "from picard.linux.it (picard.linux.it [213.254.12.146])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fgrNG4nQlz1y1K\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 26 Mar 2026 02:26:22 +1100 (AEDT)",
            "from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id ABF243E552E\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 25 Mar 2026 16:26:20 +0100 (CET)",
            "from in-7.smtp.seeweb.it (in-7.smtp.seeweb.it [217.194.8.7])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1))\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id 4B5E83E5C7A\n for <ltp@lists.linux.it>; Wed, 25 Mar 2026 16:25:46 +0100 (CET)",
            "from smtp-out1.suse.de (smtp-out1.suse.de\n [IPv6:2a07:de40:b251:101:10:150:64:1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-7.smtp.seeweb.it (Postfix) with ESMTPS id AC14D20116B\n for <ltp@lists.linux.it>; Wed, 25 Mar 2026 16:25:45 +0100 (CET)",
            "from imap1.dmz-prg2.suse.org (unknown [10.150.64.97])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-out1.suse.de (Postfix) with ESMTPS id 5C6784D244;\n Wed, 25 Mar 2026 15:25:35 +0000 (UTC)",
            "from imap1.dmz-prg2.suse.org (localhost [127.0.0.1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 4009344483;\n Wed, 25 Mar 2026 15:25:35 +0000 (UTC)",
            "from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167])\n by imap1.dmz-prg2.suse.org with ESMTPSA id 0IHrDW/+w2nhBAAAD6G6ig\n (envelope-from <andrea.cervesato@suse.de>); Wed, 25 Mar 2026 15:25:35 +0000"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de;\n s=susede2_rsa;\n t=1774452335;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=lpLgrW++8iuqCubIwxfNamBOdOGZK/B5FR3Ua2Wsrr4=;\n b=J5XTFK8dolaqgzOBuwY3bq4CKnT/EDJBM31+eKGi0vVQtFbUWg28hLItnkl9aC4GF/gLZ7\n u29DoE8llC1Cu7EY/GtJxKMHoBp4KvaXKEQHZAoH+eCfbDKbdb/7dzDcv/us4f3jVhuD60\n 0uzXY1UJD+Pw+OuMsC3KkTKbSSmOcLg=",
            "v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de;\n s=susede2_ed25519; t=1774452335;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=lpLgrW++8iuqCubIwxfNamBOdOGZK/B5FR3Ua2Wsrr4=;\n b=IIGy+kQg9LO2d5vYm8UpavA/vyxvo72hDyQtaKcwmPRFvNwcprMniFEr8rwb8sIjUioa8T\n Zgj0WJUTJVIwxiBA==",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de;\n s=susede2_rsa;\n t=1774452335;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=lpLgrW++8iuqCubIwxfNamBOdOGZK/B5FR3Ua2Wsrr4=;\n b=J5XTFK8dolaqgzOBuwY3bq4CKnT/EDJBM31+eKGi0vVQtFbUWg28hLItnkl9aC4GF/gLZ7\n u29DoE8llC1Cu7EY/GtJxKMHoBp4KvaXKEQHZAoH+eCfbDKbdb/7dzDcv/us4f3jVhuD60\n 0uzXY1UJD+Pw+OuMsC3KkTKbSSmOcLg=",
            "v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de;\n s=susede2_ed25519; t=1774452335;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=lpLgrW++8iuqCubIwxfNamBOdOGZK/B5FR3Ua2Wsrr4=;\n b=IIGy+kQg9LO2d5vYm8UpavA/vyxvo72hDyQtaKcwmPRFvNwcprMniFEr8rwb8sIjUioa8T\n Zgj0WJUTJVIwxiBA=="
        ],
        "From": "Andrea Cervesato <andrea.cervesato@suse.de>",
        "Date": "Wed, 25 Mar 2026 16:25:35 +0100",
        "MIME-Version": "1.0",
        "Message-Id": "<20260325-infiniband_rdma-v1-2-9c1bd3e69d29@suse.com>",
        "References": "<20260325-infiniband_rdma-v1-0-9c1bd3e69d29@suse.com>",
        "In-Reply-To": "<20260325-infiniband_rdma-v1-0-9c1bd3e69d29@suse.com>",
        "To": "Linux Test Project <ltp@lists.linux.it>",
        "X-Mailer": "b4 0.14.2",
        "X-Developer-Signature": "v=1; a=ed25519-sha256; t=1774452334; l=7236;\n i=andrea.cervesato@suse.com; s=20251210; h=from:subject:message-id;\n bh=t6TRpxCohboi/szgSf5UcaFzTXKd9T//Kagx+pEsr/0=;\n b=8MW698TtApFPo952jlJX9uIh4EvlCudldP0vcxz25IqkCVqVORo8+HOOJ3lfhDPpiyHnbNnF2\n riR2lDF3z84BJtM8I4g5Dp6qQegRo5fo8/aisIS+3FD2MFzAmPB2EH4",
        "X-Developer-Key": "i=andrea.cervesato@suse.com; a=ed25519;\n pk=zKY+6GCauOiuHNZ//d8PQ/UL4jFCTKbXrzXAOQSLevI=",
        "X-Spamd-Result": "default: False [-4.30 / 50.00]; BAYES_HAM(-3.00)[100.00%];\n NEURAL_HAM_LONG(-1.00)[-1.000];\n NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain];\n FUZZY_RATELIMITED(0.00)[rspamd.com];\n RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[];\n RCPT_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[];\n DKIM_SIGNED(0.00)[suse.de:s=susede2_rsa,suse.de:s=susede2_ed25519];\n TO_DN_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; MIME_TRACE(0.00)[0:+];\n FROM_EQ_ENVFROM(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[];\n RCVD_COUNT_TWO(0.00)[2];\n DBL_BLOCKED_OPENRESOLVER(0.00)[imap1.dmz-prg2.suse.org:helo, suse.com:mid,\n suse.com:email]",
        "X-Spam-Score": "-4.30",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS shortcircuit=no\n autolearn=disabled version=4.0.1",
        "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on in-7.smtp.seeweb.it",
        "X-Virus-Scanned": "clamav-milter 1.0.9 at in-7.smtp.seeweb.it",
        "X-Virus-Status": "Clean",
        "Subject": "[LTP] [PATCH 2/2] device-drivers/rdma: Add ucma_uaf01 test",
        "X-BeenThere": "ltp@lists.linux.it",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "Linux Test Project <ltp.lists.linux.it>",
        "List-Unsubscribe": "<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>",
        "List-Archive": "<http://lists.linux.it/pipermail/ltp/>",
        "List-Post": "<mailto:ltp@lists.linux.it>",
        "List-Help": "<mailto:ltp-request@lists.linux.it?subject=help>",
        "List-Subscribe": "<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it",
        "Sender": "\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"
    },
    "content": "From: Andrea Cervesato <andrea.cervesato@suse.com>\n\nTest for use-after-free in RDMA UCMA triggered by racing CREATE_ID,\nBIND_IP, and LISTEN operations. Three threads concurrently issue\nthese commands to /dev/infiniband/rdma_cm and the test checks for\nkernel taint (KASAN use-after-free detection).\n\nThe bug was fixed by kernel commit 5fe23f262e05\n(\"ucma: fix a use-after-free in ucma_resolve_ip()\").\n\nSigned-off-by: Andrea Cervesato <andrea.cervesato@suse.com>\n---\n runtest/kernel_misc                               |   1 +\n testcases/kernel/device-drivers/Makefile          |   1 +\n testcases/kernel/device-drivers/rdma/.gitignore   |   1 +\n testcases/kernel/device-drivers/rdma/Makefile     |   7 +\n testcases/kernel/device-drivers/rdma/ucma_uaf01.c | 208 ++++++++++++++++++++++\n 5 files changed, 218 insertions(+)",
    "diff": "diff --git a/runtest/kernel_misc b/runtest/kernel_misc\nindex 78f00d305fea10367fb4fd2845f25dd151a833ea..dcc3c0a44fb52a968f91a52758dbd43a3ce7a9ec 100644\n--- a/runtest/kernel_misc\n+++ b/runtest/kernel_misc\n@@ -3,6 +3,7 @@ kmsg01 kmsg01\n fw_load fw_load\n rtc01 rtc01\n rtc02 rtc02\n+ucma_uaf01 ucma_uaf01\n block_dev block_dev\n tpci tpci\n tbio tbio\ndiff --git a/testcases/kernel/device-drivers/Makefile b/testcases/kernel/device-drivers/Makefile\nindex 229a50683f5f629904ff591daa6fcd4f1c35fdf1..538df555395bf21062906ffa4125da4c767c1e24 100644\n--- a/testcases/kernel/device-drivers/Makefile\n+++ b/testcases/kernel/device-drivers/Makefile\n@@ -11,6 +11,7 @@ SUBDIRS\t\t:= acpi \\\n \t\t   locking \\\n \t\t   pci \\\n \t\t   rcu \\\n+\t\t   rdma \\\n \t\t   rtc \\\n \t\t   tbio \\\n \t\t   uaccess \\\ndiff --git a/testcases/kernel/device-drivers/rdma/.gitignore b/testcases/kernel/device-drivers/rdma/.gitignore\nnew file mode 100644\nindex 0000000000000000000000000000000000000000..399ea290e4f9abd6b66800b21f4aea3eb33d3799\n--- /dev/null\n+++ b/testcases/kernel/device-drivers/rdma/.gitignore\n@@ -0,0 +1 @@\n+/ucma_uaf01\ndiff --git a/testcases/kernel/device-drivers/rdma/Makefile b/testcases/kernel/device-drivers/rdma/Makefile\nnew file mode 100644\nindex 0000000000000000000000000000000000000000..5df01972aeab257b6ef24a928204b6b722c1cdef\n--- /dev/null\n+++ b/testcases/kernel/device-drivers/rdma/Makefile\n@@ -0,0 +1,7 @@\n+# SPDX-License-Identifier: GPL-2.0-or-later\n+# Copyright (c) 2026 Linux Test Project\n+\n+top_srcdir\t\t?= ../../../..\n+\n+include $(top_srcdir)/include/mk/testcases.mk\n+include $(top_srcdir)/include/mk/generic_leaf_target.mk\ndiff --git a/testcases/kernel/device-drivers/rdma/ucma_uaf01.c b/testcases/kernel/device-drivers/rdma/ucma_uaf01.c\nnew file mode 100644\nindex 0000000000000000000000000000000000000000..313e2aee0ea0114ce37f006eca93ea66d86ddeea\n--- /dev/null\n+++ b/testcases/kernel/device-drivers/rdma/ucma_uaf01.c\n@@ -0,0 +1,208 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (c) 2026 Linux Test Project\n+ */\n+\n+/*\\\n+ * Test for use-after-free in RDMA UCMA triggered by concurrent CREATE_ID,\n+ * BIND_IP, and LISTEN operations via /dev/infiniband/rdma_cm.\n+ *\n+ * Requires root to open /dev/infiniband/rdma_cm.\n+ *\n+ * Three threads race to create, bind, and listen on RDMA connection manager\n+ * IDs. On vulnerable kernels, this triggers a use-after-free in\n+ * cma_listen_on_all() detected by KASAN.\n+ *\n+ * Based on a syzbot reproducer:\n+ * syzbot+db1c219466daac1083df@syzkaller.appspotmail.com\n+ *\n+ * Fixed in:\n+ *\n+ *  commit 5fe23f262e05\n+ *  ucma: fix a use-after-free in ucma_resolve_ip()\n+ */\n+\n+#include \"tst_test.h\"\n+#include \"tst_safe_pthread.h\"\n+#include \"lapi/rdma_user_cm.h\"\n+\n+#define RDMA_CM_DEV \"/dev/infiniband/rdma_cm\"\n+\n+static int cmfd = -1;\n+static volatile uint32_t shared_id;\n+static volatile int stop_threads;\n+\n+static void destroy_id(uint32_t id)\n+{\n+\tssize_t ret;\n+\n+\tstruct {\n+\t\tstruct rdma_ucm_cmd_hdr hdr;\n+\t\tstruct rdma_ucm_destroy_id destroy;\n+\t} msg = {\n+\t\t.hdr = {\n+\t\t\t.cmd = RDMA_USER_CM_CMD_DESTROY_ID,\n+\t\t\t.out = sizeof(struct rdma_ucm_create_id_resp),\n+\t\t},\n+\t\t.destroy = {\n+\t\t\t.id = id,\n+\t\t},\n+\t};\n+\tstruct rdma_ucm_create_id_resp resp;\n+\n+\tmsg.destroy.response = (uintptr_t)&resp;\n+\n+\t/* Errors expected due to racing with stale IDs */\n+\tret = write(cmfd, &msg, sizeof(msg));\n+\t(void)ret;\n+}\n+\n+static void *thread_create(void *arg)\n+{\n+\tuint32_t id, prev_id = 0;\n+\tint has_prev = 0;\n+\n+\twhile (!stop_threads) {\n+\t\tstruct {\n+\t\t\tstruct rdma_ucm_cmd_hdr hdr;\n+\t\t\tstruct rdma_ucm_create_id create;\n+\t\t} msg = {\n+\t\t\t.hdr = {\n+\t\t\t\t.cmd = RDMA_USER_CM_CMD_CREATE_ID,\n+\t\t\t\t.out = sizeof(id),\n+\t\t\t},\n+\t\t\t.create = {\n+\t\t\t\t.response = (uintptr_t)&id,\n+\t\t\t\t.ps = RDMA_PS_IPOIB,\n+\t\t\t},\n+\t\t};\n+\n+\t\tif (write(cmfd, &msg, sizeof(msg)) > 0) {\n+\t\t\tif (has_prev)\n+\t\t\t\tdestroy_id(prev_id);\n+\t\t\tprev_id = id;\n+\t\t\thas_prev = 1;\n+\t\t\tshared_id = id;\n+\t\t}\n+\t}\n+\n+\tif (has_prev)\n+\t\tdestroy_id(prev_id);\n+\n+\treturn arg;\n+}\n+\n+static void *thread_bind(void *arg)\n+{\n+\tssize_t ret;\n+\n+\twhile (!stop_threads) {\n+\t\tstruct {\n+\t\t\tstruct rdma_ucm_cmd_hdr hdr;\n+\t\t\tstruct rdma_ucm_bind_ip bind;\n+\t\t} msg = {\n+\t\t\t.hdr = {\n+\t\t\t\t.cmd = RDMA_USER_CM_CMD_BIND_IP,\n+\t\t\t},\n+\t\t\t.bind = {\n+\t\t\t\t.addr = {\n+\t\t\t\t\t.sin6_family = AF_INET6,\n+\t\t\t\t\t.sin6_addr = {\n+\t\t\t\t\t\t.s6_addr = { 0xff },\n+\t\t\t\t\t},\n+\t\t\t\t},\n+\t\t\t\t.id = shared_id,\n+\t\t\t},\n+\t\t};\n+\n+\t\t/* Errors expected due to racing with stale IDs */\n+\t\tret = write(cmfd, &msg, sizeof(msg));\n+\t\t(void)ret;\n+\t}\n+\n+\treturn arg;\n+}\n+\n+static void *thread_listen(void *arg)\n+{\n+\tssize_t ret;\n+\n+\twhile (!stop_threads) {\n+\t\tstruct {\n+\t\t\tstruct rdma_ucm_cmd_hdr hdr;\n+\t\t\tstruct rdma_ucm_listen listen;\n+\t\t} msg = {\n+\t\t\t.hdr = {\n+\t\t\t\t.cmd = RDMA_USER_CM_CMD_LISTEN,\n+\t\t\t},\n+\t\t\t.listen = {\n+\t\t\t\t.id = shared_id,\n+\t\t\t},\n+\t\t};\n+\n+\t\t/* Errors expected due to racing with stale IDs */\n+\t\tret = write(cmfd, &msg, sizeof(msg));\n+\t\t(void)ret;\n+\t}\n+\n+\treturn arg;\n+}\n+\n+static void setup(void)\n+{\n+\tcmfd = open(RDMA_CM_DEV, O_WRONLY);\n+\tif (cmfd < 0) {\n+\t\tif (errno == ENOENT || errno == ENXIO)\n+\t\t\ttst_brk(TCONF, RDMA_CM_DEV \" not available\");\n+\t\ttst_brk(TBROK | TERRNO, \"open(\" RDMA_CM_DEV \")\");\n+\t}\n+}\n+\n+static void cleanup(void)\n+{\n+\tif (cmfd != -1)\n+\t\tSAFE_CLOSE(cmfd);\n+}\n+\n+static void run(void)\n+{\n+\tpthread_t threads[3];\n+\n+\tstop_threads = 0;\n+\n+\tSAFE_PTHREAD_CREATE(&threads[0], NULL, thread_create, NULL);\n+\tSAFE_PTHREAD_CREATE(&threads[1], NULL, thread_bind, NULL);\n+\tSAFE_PTHREAD_CREATE(&threads[2], NULL, thread_listen, NULL);\n+\n+\twhile (tst_remaining_runtime())\n+\t\tsleep(1);\n+\n+\tstop_threads = 1;\n+\n+\tSAFE_PTHREAD_JOIN(threads[0], NULL);\n+\tSAFE_PTHREAD_JOIN(threads[1], NULL);\n+\tSAFE_PTHREAD_JOIN(threads[2], NULL);\n+\n+\tif (tst_taint_check())\n+\t\ttst_res(TFAIL, \"Kernel is vulnerable (use-after-free in UCMA)\");\n+\telse\n+\t\ttst_res(TPASS, \"No kernel taint detected\");\n+}\n+\n+static struct tst_test test = {\n+\t.test_all = run,\n+\t.setup = setup,\n+\t.cleanup = cleanup,\n+\t.runtime = 300,\n+\t.needs_root = 1,\n+\t.taint_check = TST_TAINT_W | TST_TAINT_D,\n+\t.needs_kconfigs = (const char *[]) {\n+\t\t\"CONFIG_INFINIBAND\",\n+\t\t\"CONFIG_INFINIBAND_USER_ACCESS\",\n+\t\tNULL\n+\t},\n+\t.tags = (const struct tst_tag[]) {\n+\t\t{\"linux-git\", \"5fe23f262e05\"},\n+\t\t{}\n+\t},\n+};\n",
    "prefixes": [
        "2/2"
    ]
}