* [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 @ 2025-06-04 4:38 Luka 2025-06-04 4:21 ` [Bug] kernel BUG in may_delete in linux " Luka 0 siblings, 1 reply; 9+ messages in thread From: Luka @ 2025-06-04 4:38 UTC (permalink / raw) To: Alexander Viro, Christian Brauner; +Cc: Jan Kara, linux-fsdevel, linux-kernel Dear Kernel Maintainers, I am writing to report a potential vulnerability identified in the upstream Linux Kernel version v6.12, corresponding to the following commit in the mainline repository: Git Commit: adc218676eef25575469234709c2d87185ca223a (tag: v6.12) This issue was discovered during the testing of the Android 16 AOSP kernel, which is based on Linux kernel version 6.12, specifically from the AOSP kernel branch: AOSP kernel branch: android16-6.12 Manifest path: kernel/common.git Source URL: https://android.googlesource.com/kernel/common/+/refs/heads/android16-6.12 Although this kernel branch is used in Android 16 development, its base is aligned with the upstream Linux v6.12 release. I observed this issue while conducting stability and fuzzing tests on the Android 16 platform and identified that the root cause lies in the upstream codebase. Bug Location: vfs_rmdir+0x118/0x488 fs/namei.c:4329 Bug Report: https://hastebin.com/share/vobatolola.bash Entire Log: https://hastebin.com/share/efajodumuh.perl Thank you very much for your time and attention. I sincerely apologize that I am currently unable to provide a reproducer for this issue. However, I am actively working on reproducing the problem, and I will make sure to share any findings or reproducing steps with you as soon as they are available. I greatly appreciate your efforts in maintaining the Linux kernel and your attention to this matter. Best regards, Luka ^ permalink raw reply [flat|nested] 9+ messages in thread
* [Bug] kernel BUG in may_delete in linux kernel v6.12 @ 2025-06-04 4:21 ` Luka 2025-06-04 4:12 ` [BUG] task hung in fs_bdev_sync in linux v6.12 Luka 0 siblings, 1 reply; 9+ messages in thread From: Luka @ 2025-06-04 4:21 UTC (permalink / raw) To: Alexander Viro, Christian Brauner; +Cc: Jan Kara, linux-fsdevel, linux-kernel Dear Kernel Maintainers, I am writing to report a potential vulnerability identified in the upstream Linux Kernel version v6.12, corresponding to the following commit in the mainline repository: Git Commit: adc218676eef25575469234709c2d87185ca223a (tag: v6.12) This issue was discovered during the testing of the Android 16 AOSP kernel, which is based on Linux kernel version 6.12, specifically from the AOSP kernel branch: AOSP kernel branch: android16-6.12 Manifest path: kernel/common.git Source URL: https://android.googlesource.com/kernel/common/+/refs/heads/android16-6.12 Although this kernel branch is used in Android 16 development, its base is aligned with the upstream Linux v6.12 release. I observed this issue while conducting stability and fuzzing tests on the Android 16 platform and identified that the root cause lies in the upstream codebase. Bug Location: may_delete+0x72c/0x730 fs/namei.c:3066 Bug Report: https://hastebin.com/share/amuhawituy.scss Entire Log: https://hastebin.com/share/oponarusih.perl Thank you very much for your time and attention. I sincerely apologize that I am currently unable to provide a reproducer for this issue. However, I am actively working on reproducing the problem, and I will make sure to share any findings or reproducing steps with you as soon as they are available. I greatly appreciate your efforts in maintaining the Linux kernel and your attention to this matter. Best regards, Luka ^ permalink raw reply [flat|nested] 9+ messages in thread
* [BUG] task hung in fs_bdev_sync in linux v6.12 @ 2025-06-04 4:12 ` Luka 2025-06-04 7:45 ` [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 Christian Brauner 0 siblings, 1 reply; 9+ messages in thread From: Luka @ 2025-06-04 4:12 UTC (permalink / raw) To: Alexander Viro, Christian Brauner; +Cc: Jan Kara, linux-fsdevel, linux-kernel Dear Kernel Maintainers, I am writing to report a potential vulnerability identified in the upstream Linux Kernel version v6.12, corresponding to the following commit in the mainline repository: Git Commit: adc218676eef25575469234709c2d87185ca223a (tag: v6.12) This issue was discovered during the testing of the Android 16 AOSP kernel, which is based on Linux kernel version 6.12, specifically from the AOSP kernel branch: AOSP kernel branch: android16-6.12 Manifest path: kernel/common.git Source URL: https://android.googlesource.com/kernel/common/+/refs/heads/android16-6.12 Although this kernel branch is used in Android 16 development, its base is aligned with the upstream Linux v6.12 release. I observed this issue while conducting stability and fuzzing tests on the Android 16 platform and identified that the root cause lies in the upstream codebase. Bug Location: fs_bdev_sync+0x2c/0x68 fs/super.c:1434 Bug Report: https://hastebin.com/share/pihohaniwi.bash Entire Log: https://hastebin.com/share/orufevoquj.perl Thank you very much for your time and attention. I sincerely apologize that I am currently unable to provide a reproducer for this issue. However, I am actively working on reproducing the problem, and I will make sure to share any findings or reproducing steps with you as soon as they are available. I greatly appreciate your efforts in maintaining the Linux kernel and your attention to this matter. Best regards, Luka ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 2025-06-04 4:12 ` [BUG] task hung in fs_bdev_sync in linux v6.12 Luka @ 2025-06-04 7:45 ` Christian Brauner 2025-06-04 14:45 ` Konstantin Ryabitsev 0 siblings, 1 reply; 9+ messages in thread From: Christian Brauner @ 2025-06-04 7:45 UTC (permalink / raw) To: Konstantin Ryabitsev Cc: Alexander Viro, Jan Kara, linux-fsdevel, linux-kernel, Luka Konstantin, this looks actively malicious. Can we do something about this list-wise? On Wed, Jun 04, 2025 at 12:38:36PM +0800, Luka wrote: > Dear Kernel Maintainers, > > I am writing to report a potential vulnerability identified in the > upstream Linux Kernel version v6.12, corresponding to the following > commit in the mainline repository: > > Git Commit: adc218676eef25575469234709c2d87185ca223a (tag: v6.12) > > This issue was discovered during the testing of the Android 16 AOSP > kernel, which is based on Linux kernel version 6.12, specifically from > the AOSP kernel branch: > > AOSP kernel branch: android16-6.12 > Manifest path: kernel/common.git > Source URL: https://android.googlesource.com/kernel/common/+/refs/heads/android16-6.12 > > Although this kernel branch is used in Android 16 development, its > base is aligned with the upstream Linux v6.12 release. I observed this > issue while conducting stability and fuzzing tests on the Android 16 > platform and identified that the root cause lies in the upstream > codebase. > > > Bug Location: vfs_rmdir+0x118/0x488 fs/namei.c:4329 > > Bug Report: https://hastebin.com/share/vobatolola.bash > > Entire Log: https://hastebin.com/share/efajodumuh.perl > > > Thank you very much for your time and attention. I sincerely apologize > that I am currently unable to provide a reproducer for this issue. > However, I am actively working on reproducing the problem, and I will > make sure to share any findings or reproducing steps with you as soon > as they are available. > > I greatly appreciate your efforts in maintaining the Linux kernel and > your attention to this matter. > > Best regards, > Luka On Wed, Jun 04, 2025 at 12:21:40PM +0800, Luka wrote: > Dear Kernel Maintainers, > > I am writing to report a potential vulnerability identified in the > upstream Linux Kernel version v6.12, corresponding to the following > commit in the mainline repository: > > Git Commit: adc218676eef25575469234709c2d87185ca223a (tag: v6.12) > > This issue was discovered during the testing of the Android 16 AOSP > kernel, which is based on Linux kernel version 6.12, specifically from > the AOSP kernel branch: > > AOSP kernel branch: android16-6.12 > Manifest path: kernel/common.git > Source URL: https://android.googlesource.com/kernel/common/+/refs/heads/android16-6.12 > > Although this kernel branch is used in Android 16 development, its > base is aligned with the upstream Linux v6.12 release. I observed this > issue while conducting stability and fuzzing tests on the Android 16 > platform and identified that the root cause lies in the upstream > codebase. > > > Bug Location: may_delete+0x72c/0x730 fs/namei.c:3066 > > Bug Report: https://hastebin.com/share/amuhawituy.scss > > Entire Log: https://hastebin.com/share/oponarusih.perl > > > Thank you very much for your time and attention. I sincerely apologize > that I am currently unable to provide a reproducer for this issue. > However, I am actively working on reproducing the problem, and I will > make sure to share any findings or reproducing steps with you as soon > as they are available. > > I greatly appreciate your efforts in maintaining the Linux kernel and > your attention to this matter. > > Best regards, > Luka On Wed, Jun 04, 2025 at 12:12:26PM +0800, Luka wrote: > Dear Kernel Maintainers, > > I am writing to report a potential vulnerability identified in the > upstream Linux Kernel version v6.12, corresponding to the following > commit in the mainline repository: > > Git Commit: adc218676eef25575469234709c2d87185ca223a (tag: v6.12) > > This issue was discovered during the testing of the Android 16 AOSP > kernel, which is based on Linux kernel version 6.12, specifically from > the AOSP kernel branch: > > AOSP kernel branch: android16-6.12 > Manifest path: kernel/common.git > Source URL: https://android.googlesource.com/kernel/common/+/refs/heads/android16-6.12 > > Although this kernel branch is used in Android 16 development, its > base is aligned with the upstream Linux v6.12 release. I observed this > issue while conducting stability and fuzzing tests on the Android 16 > platform and identified that the root cause lies in the upstream > codebase. > > > Bug Location: fs_bdev_sync+0x2c/0x68 fs/super.c:1434 > > Bug Report: https://hastebin.com/share/pihohaniwi.bash > > Entire Log: https://hastebin.com/share/orufevoquj.perl > > > Thank you very much for your time and attention. I sincerely apologize > that I am currently unable to provide a reproducer for this issue. > However, I am actively working on reproducing the problem, and I will > make sure to share any findings or reproducing steps with you as soon > as they are available. > > I greatly appreciate your efforts in maintaining the Linux kernel and > your attention to this matter. > > Best regards, > Luka ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 2025-06-04 7:45 ` [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 Christian Brauner @ 2025-06-04 14:45 ` Konstantin Ryabitsev 2025-06-04 15:44 ` Jan Kara 0 siblings, 1 reply; 9+ messages in thread From: Konstantin Ryabitsev @ 2025-06-04 14:45 UTC (permalink / raw) To: Christian Brauner Cc: Alexander Viro, Jan Kara, linux-fsdevel, linux-kernel, Luka On Wed, Jun 04, 2025 at 09:45:23AM +0200, Christian Brauner wrote: > Konstantin, this looks actively malicious. > Can we do something about this list-wise? Malicious in what sense? Is it just junk, or is it attempting to have maintainers perform some potentially dangerous operation? -K ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 2025-06-04 14:45 ` Konstantin Ryabitsev @ 2025-06-04 15:44 ` Jan Kara 2025-06-04 20:11 ` Konstantin Ryabitsev 0 siblings, 1 reply; 9+ messages in thread From: Jan Kara @ 2025-06-04 15:44 UTC (permalink / raw) To: Konstantin Ryabitsev Cc: Christian Brauner, Alexander Viro, Jan Kara, linux-fsdevel, linux-kernel, Luka On Wed 04-06-25 10:45:49, Konstantin Ryabitsev wrote: > On Wed, Jun 04, 2025 at 09:45:23AM +0200, Christian Brauner wrote: > > Konstantin, this looks actively malicious. > > Can we do something about this list-wise? > > Malicious in what sense? Is it just junk, or is it attempting to have > maintainers perform some potentially dangerous operation? Well, useless it is for certain but links like: Bug Report: https://hastebin.com/share/pihohaniwi.bash Entire Log: https://hastebin.com/share/orufevoquj.perl are rather suspicious and suggest there's more in there than just a lack of knowledge (but now that I've tried the suffixes seem to be automatically added by some filetype detection logic in the hastebin.com site itself so more likely this is not malicious after all). FWIW I've downloaded one of the files through wget and looked into it and it seems to have a reasonable content and does not seem malicious but it is difficult to be sure in the maze of HTML and JS... Honza -- Jan Kara <jack@suse.com> SUSE Labs, CR ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 2025-06-04 15:44 ` Jan Kara @ 2025-06-04 20:11 ` Konstantin Ryabitsev 2025-06-04 20:39 ` Matthew Wilcox 0 siblings, 1 reply; 9+ messages in thread From: Konstantin Ryabitsev @ 2025-06-04 20:11 UTC (permalink / raw) To: Jan Kara Cc: Christian Brauner, Alexander Viro, linux-fsdevel, linux-kernel, Luka On Wed, Jun 04, 2025 at 05:44:22PM +0200, Jan Kara wrote: > > Malicious in what sense? Is it just junk, or is it attempting to have > > maintainers perform some potentially dangerous operation? > > Well, useless it is for certain but links like: > > Bug Report: https://hastebin.com/share/pihohaniwi.bash > > Entire Log: https://hastebin.com/share/orufevoquj.perl > > are rather suspicious and suggest there's more in there than just a lack of > knowledge (but now that I've tried the suffixes seem to be automatically > added by some filetype detection logic in the hastebin.com site itself so > more likely this is not malicious after all). FWIW I've downloaded one of > the files through wget and looked into it and it seems to have a reasonable > content and does not seem malicious but it is difficult to be sure in the > maze of HTML and JS... Yes, hence my question. I think it's just a bad medium. It's actually the kind of thing that bugzilla is okay to use for -- create a bug with attachments and report it to the list, so maybe the original author can use that instead of pastebin sites? -K ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 2025-06-04 20:11 ` Konstantin Ryabitsev @ 2025-06-04 20:39 ` Matthew Wilcox 2025-06-04 21:11 ` Al Viro 0 siblings, 1 reply; 9+ messages in thread From: Matthew Wilcox @ 2025-06-04 20:39 UTC (permalink / raw) To: Konstantin Ryabitsev Cc: Jan Kara, Christian Brauner, Alexander Viro, linux-fsdevel, linux-kernel, Luka On Wed, Jun 04, 2025 at 04:11:21PM -0400, Konstantin Ryabitsev wrote: > Yes, hence my question. I think it's just a bad medium. It's actually the kind > of thing that bugzilla is okay to use for -- create a bug with attachments and > report it to the list, so maybe the original author can use that instead of > pastebin sites? The "author" looks to be a bot, frankly. At best yet-another-incompetent user of "my modified version of syzkaller". There's no signal here, would recommend just banning. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 2025-06-04 20:39 ` Matthew Wilcox @ 2025-06-04 21:11 ` Al Viro 0 siblings, 0 replies; 9+ messages in thread From: Al Viro @ 2025-06-04 21:11 UTC (permalink / raw) To: Matthew Wilcox Cc: Konstantin Ryabitsev, Jan Kara, Christian Brauner, linux-fsdevel, linux-kernel, Luka On Wed, Jun 04, 2025 at 09:39:20PM +0100, Matthew Wilcox wrote: > On Wed, Jun 04, 2025 at 04:11:21PM -0400, Konstantin Ryabitsev wrote: > > Yes, hence my question. I think it's just a bad medium. It's actually the kind > > of thing that bugzilla is okay to use for -- create a bug with attachments and > > report it to the list, so maybe the original author can use that instead of > > pastebin sites? > > The "author" looks to be a bot, frankly. At best yet-another-incompetent > user of "my modified version of syzkaller". There's no signal here, > would recommend just banning. FWIW, I suspect that we ought to document that *anything* (bug reports, patches, etc.) sent should be reachable without the need to run javascript or any similar crap. Not sure what would be the best place for that, though... Seriously, this is pretty much on the same level as "don't send me a binary as reproducer - I'm not going to run it". Folks on these lists are fairly tempting as targets; betting on the sandbox quality in chromium/firepox/whatnot... sorry, no. *IF* hastebin really produces crap that can't be accessed without interpreter of some sort, just bounce any mail that contains such links with the obvious explanation. ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2025-06-04 21:11 UTC | newest] Thread overview: 9+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2025-06-04 4:38 [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 Luka 2025-06-04 4:21 ` [Bug] kernel BUG in may_delete in linux " Luka 2025-06-04 4:12 ` [BUG] task hung in fs_bdev_sync in linux v6.12 Luka 2025-06-04 7:45 ` [Bug] possible deadlock in vfs_rmdir in Linux kernel v6.12 Christian Brauner 2025-06-04 14:45 ` Konstantin Ryabitsev 2025-06-04 15:44 ` Jan Kara 2025-06-04 20:11 ` Konstantin Ryabitsev 2025-06-04 20:39 ` Matthew Wilcox 2025-06-04 21:11 ` Al Viro
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).