* [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
@ 2025-05-28 10:08 syzbot
2025-07-23 20:49 ` syzbot
` (2 more replies)
0 siblings, 3 replies; 9+ messages in thread
From: syzbot @ 2025-05-28 10:08 UTC (permalink / raw)
To: agruenba, gfs2, linux-kernel, syzkaller-bugs
Hello,
syzbot found the following issue on:
HEAD commit: 01c6df60d5d4 Add linux-next specific files for 20250411
git tree: linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=13deaa3f980000
kernel config: https://syzkaller.appspot.com/x/.config?x=db03cefa26ecf825
dashboard link: https://syzkaller.appspot.com/bug?extid=42a37bf8045847d8f9d2
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/928246b3f3d5/disk-01c6df60.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/79a68c4e1134/vmlinux-01c6df60.xz
kernel image: https://storage.googleapis.com/syzbot-assets/9caf8c293819/bzImage-01c6df60.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+42a37bf8045847d8f9d2@syzkaller.appspotmail.com
==================================================================
BUG: KASAN: slab-use-after-free in instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
BUG: KASAN: slab-use-after-free in atomic_dec_and_test include/linux/atomic/atomic-instrumented.h:1383 [inline]
BUG: KASAN: slab-use-after-free in gfs2_qd_dealloc+0x83/0xf0 fs/gfs2/quota.c:112
Write of size 4 at addr ffff888033e98a80 by task kworker/u8:3/53
CPU: 1 UID: 0 PID: 53 Comm: kworker/u8:3 Not tainted 6.15.0-rc1-next-20250411-syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: bat_events batadv_tt_purge
Call Trace:
<IRQ>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:408 [inline]
print_report+0x16e/0x5b0 mm/kasan/report.c:521
kasan_report+0x143/0x180 mm/kasan/report.c:634
check_region_inline mm/kasan/generic.c:-1 [inline]
kasan_check_range+0x28f/0x2a0 mm/kasan/generic.c:189
instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
atomic_dec_and_test include/linux/atomic/atomic-instrumented.h:1383 [inline]
gfs2_qd_dealloc+0x83/0xf0 fs/gfs2/quota.c:112
rcu_do_batch kernel/rcu/tree.c:2546 [inline]
rcu_core+0xaac/0x17a0 kernel/rcu/tree.c:2802
handle_softirqs+0x2d6/0x9b0 kernel/softirq.c:579
do_softirq+0x11f/0x1e0 kernel/softirq.c:480
</IRQ>
<TASK>
__local_bh_enable_ip+0x1be/0x200 kernel/softirq.c:407
spin_unlock_bh include/linux/spinlock.h:396 [inline]
batadv_tt_local_purge+0x2a0/0x340 net/batman-adv/translation-table.c:1315
batadv_tt_purge+0x35/0xa40 net/batman-adv/translation-table.c:3509
process_one_work kernel/workqueue.c:3238 [inline]
process_scheduled_works+0xac3/0x18e0 kernel/workqueue.c:3319
worker_thread+0x870/0xd50 kernel/workqueue.c:3400
kthread+0x7b7/0x940 kernel/kthread.c:464
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
</TASK>
Allocated by task 6071:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0x9d/0xb0 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__kmalloc_cache_noprof+0x236/0x370 mm/slub.c:4362
kmalloc_noprof include/linux/slab.h:905 [inline]
kzalloc_noprof include/linux/slab.h:1039 [inline]
init_sbd fs/gfs2/ops_fstype.c:77 [inline]
gfs2_fill_super+0x13e/0x27b0 fs/gfs2/ops_fstype.c:1140
get_tree_bdev_flags+0x490/0x5c0 fs/super.c:1686
gfs2_get_tree+0x54/0x220 fs/gfs2/ops_fstype.c:1330
vfs_get_tree+0x90/0x2b0 fs/super.c:1809
do_new_mount+0x2cf/0xb70 fs/namespace.c:3879
do_mount fs/namespace.c:4219 [inline]
__do_sys_mount fs/namespace.c:4430 [inline]
__se_sys_mount+0x38c/0x400 fs/namespace.c:4407
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Freed by task 6071:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2389 [inline]
slab_free mm/slub.c:4646 [inline]
kfree+0x198/0x430 mm/slub.c:4845
free_sbd fs/gfs2/ops_fstype.c:69 [inline]
gfs2_fill_super+0x14bf/0x27b0 fs/gfs2/ops_fstype.c:1313
get_tree_bdev_flags+0x490/0x5c0 fs/super.c:1686
gfs2_get_tree+0x54/0x220 fs/gfs2/ops_fstype.c:1330
vfs_get_tree+0x90/0x2b0 fs/super.c:1809
do_new_mount+0x2cf/0xb70 fs/namespace.c:3879
do_mount fs/namespace.c:4219 [inline]
__do_sys_mount fs/namespace.c:4430 [inline]
__se_sys_mount+0x38c/0x400 fs/namespace.c:4407
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
The buggy address belongs to the object at ffff888033e98000
which belongs to the cache kmalloc-8k of size 8192
The buggy address is located 2688 bytes inside of
freed 8192-byte region [ffff888033e98000, ffff888033e9a000)
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x33e98
head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
page_type: f5(slab)
raw: 00fff00000000040 ffff88801b042280 dead000000000100 dead000000000122
raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
head: 00fff00000000040 ffff88801b042280 dead000000000100 dead000000000122
head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
head: 00fff00000000003 ffffea0000cfa601 00000000ffffffff 00000000ffffffff
head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5487, tgid 5487 (run-parts), ts 55699630622, free_ts 55641758587
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x1f4/0x240 mm/page_alloc.c:1718
prep_new_page mm/page_alloc.c:1726 [inline]
get_page_from_freelist+0x360a/0x37a0 mm/page_alloc.c:3700
__alloc_frozen_pages_noprof+0x211/0x5b0 mm/page_alloc.c:4982
alloc_pages_mpol+0x339/0x690 mm/mempolicy.c:2301
alloc_slab_page mm/slub.c:2459 [inline]
allocate_slab+0x8f/0x3a0 mm/slub.c:2623
new_slab mm/slub.c:2676 [inline]
___slab_alloc+0xc3b/0x1500 mm/slub.c:3862
__slab_alloc+0x58/0xa0 mm/slub.c:3952
__slab_alloc_node mm/slub.c:4027 [inline]
slab_alloc_node mm/slub.c:4188 [inline]
__kmalloc_cache_noprof+0x26a/0x370 mm/slub.c:4357
kmalloc_noprof include/linux/slab.h:905 [inline]
kzalloc_noprof include/linux/slab.h:1039 [inline]
tomoyo_print_bprm security/tomoyo/audit.c:26 [inline]
tomoyo_init_log+0x121e/0x2150 security/tomoyo/audit.c:264
tomoyo_supervisor+0x3c0/0x18b0 security/tomoyo/common.c:2198
tomoyo_audit_env_log security/tomoyo/environ.c:36 [inline]
tomoyo_env_perm+0x17b/0x220 security/tomoyo/environ.c:63
tomoyo_environ security/tomoyo/domain.c:672 [inline]
tomoyo_find_next_domain+0x1497/0x1dd0 security/tomoyo/domain.c:888
tomoyo_bprm_check_security+0x11a/0x180 security/tomoyo/tomoyo.c:102
security_bprm_check+0x86/0x250 security/security.c:1302
search_binary_handler fs/exec.c:1768 [inline]
exec_binprm fs/exec.c:1810 [inline]
bprm_execve+0x903/0x1430 fs/exec.c:1862
do_execveat_common+0x57c/0x710 fs/exec.c:1968
page last free pid 5485 tgid 5485 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1262 [inline]
__free_frozen_pages+0xde8/0x10a0 mm/page_alloc.c:2725
__slab_free+0x2c6/0x390 mm/slub.c:4557
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286
__kasan_slab_alloc+0x23/0x80 mm/kasan/common.c:329
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4151 [inline]
slab_alloc_node mm/slub.c:4200 [inline]
__do_kmalloc_node mm/slub.c:4330 [inline]
__kmalloc_noprof+0x238/0x4d0 mm/slub.c:4343
kmalloc_noprof include/linux/slab.h:909 [inline]
tomoyo_add_entry security/tomoyo/common.c:2132 [inline]
tomoyo_supervisor+0xc94/0x18b0 security/tomoyo/common.c:2204
tomoyo_audit_path_log security/tomoyo/file.c:168 [inline]
tomoyo_path_permission+0x243/0x360 security/tomoyo/file.c:587
tomoyo_check_open_permission+0x309/0x4f0 security/tomoyo/file.c:777
security_file_open+0xac/0x250 security/security.c:3114
do_dentry_open+0x320/0x1960 fs/open.c:933
vfs_open+0x3b/0x370 fs/open.c:1086
do_open fs/namei.c:3849 [inline]
path_openat+0x2caf/0x35d0 fs/namei.c:4008
do_filp_open+0x284/0x4e0 fs/namei.c:4035
do_sys_openat2+0x12b/0x1d0 fs/open.c:1429
do_sys_open fs/open.c:1444 [inline]
__do_sys_openat fs/open.c:1460 [inline]
__se_sys_openat fs/open.c:1455 [inline]
__x64_sys_openat+0x249/0x2a0 fs/open.c:1455
Memory state around the buggy address:
ffff888033e98980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff888033e98a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff888033e98a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff888033e98b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff888033e98b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup
^ permalink raw reply [flat|nested] 9+ messages in thread* Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
2025-05-28 10:08 [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3) syzbot
@ 2025-07-23 20:49 ` syzbot
2025-07-24 11:38 ` Andrew Price
2026-04-30 11:25 ` Forwarded: " syzbot
2026-04-30 22:30 ` syzbot
2 siblings, 1 reply; 9+ messages in thread
From: syzbot @ 2025-07-23 20:49 UTC (permalink / raw)
To: agruenba, gfs2, linux-kernel, syzkaller-bugs
syzbot has found a reproducer for the following issue on:
HEAD commit: 01a412d06bc5 Merge tag 'pull-ufs-fix' of git://git.kernel...
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=150e6fd4580000
kernel config: https://syzkaller.appspot.com/x/.config?x=8adfe52da0de2761
dashboard link: https://syzkaller.appspot.com/bug?extid=42a37bf8045847d8f9d2
compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=132aff22580000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=144380a2580000
Downloadable assets:
disk image (non-bootable): https://storage.googleapis.com/syzbot-assets/d900f083ada3/non_bootable_disk-01a412d0.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/8229e4edb67d/vmlinux-01a412d0.xz
kernel image: https://storage.googleapis.com/syzbot-assets/8e07d86da9da/bzImage-01a412d0.xz
mounted in repro: https://storage.googleapis.com/syzbot-assets/5c2db4a05d12/mount_0.gz
fsck result: failed (log: https://syzkaller.appspot.com/x/fsck.log?x=110e6fd4580000)
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+42a37bf8045847d8f9d2@syzkaller.appspotmail.com
==================================================================
BUG: KASAN: slab-use-after-free in instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
BUG: KASAN: slab-use-after-free in atomic_dec_and_test include/linux/atomic/atomic-instrumented.h:1383 [inline]
BUG: KASAN: slab-use-after-free in gfs2_qd_dealloc+0x81/0xe0 fs/gfs2/quota.c:112
Write of size 4 at addr ffff888036404a80 by task pool_workqueue_/3
CPU: 0 UID: 0 PID: 3 Comm: pool_workqueue_ Not tainted 6.16.0-rc7-syzkaller-00018-g01a412d06bc5 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
<IRQ>
dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0xca/0x230 mm/kasan/report.c:480
kasan_report+0x118/0x150 mm/kasan/report.c:593
check_region_inline mm/kasan/generic.c:-1 [inline]
kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:189
instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
atomic_dec_and_test include/linux/atomic/atomic-instrumented.h:1383 [inline]
gfs2_qd_dealloc+0x81/0xe0 fs/gfs2/quota.c:112
rcu_do_batch kernel/rcu/tree.c:2576 [inline]
rcu_core+0xca5/0x1710 kernel/rcu/tree.c:2832
handle_softirqs+0x286/0x870 kernel/softirq.c:579
__do_softirq kernel/softirq.c:613 [inline]
invoke_softirq kernel/softirq.c:453 [inline]
__irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lockdep_unregister_key+0x2c5/0x310 kernel/locking/lockdep.c:6619
Code: 65 48 8b 05 3d 20 02 11 48 3b 44 24 10 0f 84 26 fe ff ff e8 fd 17 d1 09 e8 28 19 d1 09 41 f7 c7 00 02 00 00 74 bd fb 40 84 ed <75> bc eb cd 90 0f 0b 90 e9 19 ff ff ff 90 0f 0b 90 e9 2a ff ff ff
RSP: 0018:ffffc90000157c00 EFLAGS: 00000246
RAX: de469ecdd1056e00 RBX: ffff8880408f6538 RCX: de469ecdd1056e00
RDX: ffffffff93643318 RSI: ffffffff8d9ace67 RDI: ffffffff8be29ec0
RBP: ffff8880408f6500 R08: 0000000000000000 R09: ffffffff81ab49a8
R10: dffffc0000000000 R11: fffffbfff1f43f5f R12: 0000000000000000
R13: 0000000000001000 R14: 0000000000000001 R15: 0000000000000202
wq_unregister_lockdep kernel/workqueue.c:4818 [inline]
pwq_release_workfn+0x6d5/0x870 kernel/workqueue.c:5114
kthread_worker_fn+0x504/0xb60 kernel/kthread.c:1010
kthread+0x70e/0x8a0 kernel/kthread.c:464
ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
</TASK>
Allocated by task 5598:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359
kmalloc_noprof include/linux/slab.h:905 [inline]
kzalloc_noprof include/linux/slab.h:1039 [inline]
init_sbd fs/gfs2/ops_fstype.c:78 [inline]
gfs2_fill_super+0x11c/0x20e0 fs/gfs2/ops_fstype.c:1128
get_tree_bdev_flags+0x40b/0x4d0 fs/super.c:1681
gfs2_get_tree+0x51/0x1e0 fs/gfs2/ops_fstype.c:1335
vfs_get_tree+0x92/0x2b0 fs/super.c:1804
do_new_mount+0x24a/0xa40 fs/namespace.c:3902
do_mount fs/namespace.c:4239 [inline]
__do_sys_mount fs/namespace.c:4450 [inline]
__se_sys_mount+0x317/0x410 fs/namespace.c:4427
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Freed by task 5598:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2381 [inline]
slab_free mm/slub.c:4643 [inline]
kfree+0x18e/0x440 mm/slub.c:4842
free_sbd fs/gfs2/ops_fstype.c:71 [inline]
gfs2_fill_super+0x153d/0x20e0 fs/gfs2/ops_fstype.c:1319
get_tree_bdev_flags+0x40b/0x4d0 fs/super.c:1681
gfs2_get_tree+0x51/0x1e0 fs/gfs2/ops_fstype.c:1335
vfs_get_tree+0x92/0x2b0 fs/super.c:1804
do_new_mount+0x24a/0xa40 fs/namespace.c:3902
do_mount fs/namespace.c:4239 [inline]
__do_sys_mount fs/namespace.c:4450 [inline]
__se_sys_mount+0x317/0x410 fs/namespace.c:4427
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
The buggy address belongs to the object at ffff888036404000
which belongs to the cache kmalloc-8k of size 8192
The buggy address is located 2688 bytes inside of
freed 8192-byte region [ffff888036404000, ffff888036406000)
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x36400
head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
anon flags: 0x4fff00000000040(head|node=1|zone=1|lastcpupid=0x7ff)
page_type: f5(slab)
raw: 04fff00000000040 ffff88801a442280 0000000000000000 0000000000000001
raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
head: 04fff00000000040 ffff88801a442280 0000000000000000 0000000000000001
head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
head: 04fff00000000003 ffffea0000d90001 00000000ffffffff 00000000ffffffff
head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5553, tgid 5553 (syz.0.17), ts 108777604926, free_ts 108757444960
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1704
prep_new_page mm/page_alloc.c:1712 [inline]
get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3669
__alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:4959
alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2419
alloc_slab_page mm/slub.c:2451 [inline]
allocate_slab+0x8a/0x3b0 mm/slub.c:2619
new_slab mm/slub.c:2673 [inline]
___slab_alloc+0xbfc/0x1480 mm/slub.c:3859
__slab_alloc mm/slub.c:3949 [inline]
__slab_alloc_node mm/slub.c:4024 [inline]
slab_alloc_node mm/slub.c:4185 [inline]
__kmalloc_cache_noprof+0x296/0x3d0 mm/slub.c:4354
kmalloc_noprof include/linux/slab.h:905 [inline]
kzalloc_noprof include/linux/slab.h:1039 [inline]
init_sbd fs/gfs2/ops_fstype.c:78 [inline]
gfs2_fill_super+0x11c/0x20e0 fs/gfs2/ops_fstype.c:1128
get_tree_bdev_flags+0x40b/0x4d0 fs/super.c:1681
gfs2_get_tree+0x51/0x1e0 fs/gfs2/ops_fstype.c:1335
vfs_get_tree+0x92/0x2b0 fs/super.c:1804
do_new_mount+0x24a/0xa40 fs/namespace.c:3902
do_mount fs/namespace.c:4239 [inline]
__do_sys_mount fs/namespace.c:4450 [inline]
__se_sys_mount+0x317/0x410 fs/namespace.c:4427
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 5562 tgid 5562 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1248 [inline]
__free_frozen_pages+0xc71/0xe70 mm/page_alloc.c:2706
discard_slab mm/slub.c:2717 [inline]
__put_partials+0x161/0x1c0 mm/slub.c:3186
put_cpu_partial+0x17c/0x250 mm/slub.c:3261
__slab_free+0x2f7/0x400 mm/slub.c:4513
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286
__kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:329
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4148 [inline]
slab_alloc_node mm/slub.c:4197 [inline]
kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4204
vm_area_alloc+0x24/0x140 mm/vma_init.c:31
__mmap_new_vma mm/vma.c:2452 [inline]
__mmap_region mm/vma.c:2622 [inline]
mmap_region+0xcc7/0x1f30 mm/vma.c:2692
do_mmap+0xc45/0x10d0 mm/mmap.c:561
vm_mmap_pgoff+0x31b/0x4c0 mm/util.c:579
ksys_mmap_pgoff+0x51f/0x760 mm/mmap.c:607
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Memory state around the buggy address:
ffff888036404980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff888036404a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff888036404a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff888036404b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff888036404b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
----------------
Code disassembly (best guess):
0: 65 48 8b 05 3d 20 02 mov %gs:0x1102203d(%rip),%rax # 0x11022045
7: 11
8: 48 3b 44 24 10 cmp 0x10(%rsp),%rax
d: 0f 84 26 fe ff ff je 0xfffffe39
13: e8 fd 17 d1 09 call 0x9d11815
18: e8 28 19 d1 09 call 0x9d11945
1d: 41 f7 c7 00 02 00 00 test $0x200,%r15d
24: 74 bd je 0xffffffe3
26: fb sti
27: 40 84 ed test %bpl,%bpl
* 2a: 75 bc jne 0xffffffe8 <-- trapping instruction
2c: eb cd jmp 0xfffffffb
2e: 90 nop
2f: 0f 0b ud2
31: 90 nop
32: e9 19 ff ff ff jmp 0xffffff50
37: 90 nop
38: 0f 0b ud2
3a: 90 nop
3b: e9 2a ff ff ff jmp 0xffffff6a
---
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.
^ permalink raw reply [flat|nested] 9+ messages in thread* Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
2025-07-23 20:49 ` syzbot
@ 2025-07-24 11:38 ` Andrew Price
2025-07-24 11:57 ` syzbot
0 siblings, 1 reply; 9+ messages in thread
From: Andrew Price @ 2025-07-24 11:38 UTC (permalink / raw)
To: syzbot; +Cc: agruenba, gfs2, linux-kernel, syzkaller-bugs
On 23/07/2025 21:49, syzbot wrote:
> syzbot has found a reproducer for the following issue on:
>
> HEAD commit: 01a412d06bc5 Merge tag 'pull-ufs-fix' of git://git.kernel...
> git tree: upstream
> console output: https://syzkaller.appspot.com/x/log.txt?x=150e6fd4580000
> kernel config: https://syzkaller.appspot.com/x/.config?x=8adfe52da0de2761
> dashboard link: https://syzkaller.appspot.com/bug?extid=42a37bf8045847d8f9d2
> compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7
> syz repro: https://syzkaller.appspot.com/x/repro.syz?x=132aff22580000
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=144380a2580000
>
> Downloadable assets:
> disk image (non-bootable): https://storage.googleapis.com/syzbot-assets/d900f083ada3/non_bootable_disk-01a412d0.raw.xz
> vmlinux: https://storage.googleapis.com/syzbot-assets/8229e4edb67d/vmlinux-01a412d0.xz
> kernel image: https://storage.googleapis.com/syzbot-assets/8e07d86da9da/bzImage-01a412d0.xz
> mounted in repro: https://storage.googleapis.com/syzbot-assets/5c2db4a05d12/mount_0.gz
> fsck result: failed (log: https://syzkaller.appspot.com/x/fsck.log?x=110e6fd4580000)
>
> IMPORTANT: if you fix the issue, please add the following tag to the commit:
> Reported-by: syzbot+42a37bf8045847d8f9d2@syzkaller.appspotmail.com
>
> ==================================================================
> BUG: KASAN: slab-use-after-free in instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
> BUG: KASAN: slab-use-after-free in atomic_dec_and_test include/linux/atomic/atomic-instrumented.h:1383 [inline]
> BUG: KASAN: slab-use-after-free in gfs2_qd_dealloc+0x81/0xe0 fs/gfs2/quota.c:112
> Write of size 4 at addr ffff888036404a80 by task pool_workqueue_/3
>
> CPU: 0 UID: 0 PID: 3 Comm: pool_workqueue_ Not tainted 6.16.0-rc7-syzkaller-00018-g01a412d06bc5 #0 PREEMPT(full)
> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
> Call Trace:
> <IRQ>
> dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
> print_address_description mm/kasan/report.c:378 [inline]
> print_report+0xca/0x230 mm/kasan/report.c:480
> kasan_report+0x118/0x150 mm/kasan/report.c:593
> check_region_inline mm/kasan/generic.c:-1 [inline]
> kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:189
> instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
> atomic_dec_and_test include/linux/atomic/atomic-instrumented.h:1383 [inline]
> gfs2_qd_dealloc+0x81/0xe0 fs/gfs2/quota.c:112
> rcu_do_batch kernel/rcu/tree.c:2576 [inline]
> rcu_core+0xca5/0x1710 kernel/rcu/tree.c:2832
> handle_softirqs+0x286/0x870 kernel/softirq.c:579
> __do_softirq kernel/softirq.c:613 [inline]
> invoke_softirq kernel/softirq.c:453 [inline]
> __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
> irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
> instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
> sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050
> </IRQ>
#syz test
--- a/fs/gfs2/ops_fstype.c
+++ b/fs/gfs2/ops_fstype.c
@@ -66,6 +66,8 @@ void free_sbd(struct gfs2_sbd *sdp)
{
struct super_block *sb = sdp->sd_vfs;
+ /* Wait for rcu_call(gfs2_qd_dealloc) */
+ rcu_barrier();
free_percpu(sdp->sd_lkstats);
sb->s_fs_info = NULL;
kfree(sdp);
^ permalink raw reply [flat|nested] 9+ messages in thread* Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
2025-07-24 11:38 ` Andrew Price
@ 2025-07-24 11:57 ` syzbot
2025-07-24 12:11 ` Andrew Price
0 siblings, 1 reply; 9+ messages in thread
From: syzbot @ 2025-07-24 11:57 UTC (permalink / raw)
To: agruenba, anprice, gfs2, linux-kernel, syzkaller-bugs
Hello,
syzbot has tested the proposed patch but the reproducer is still triggering an issue:
WARNING in move_to_new_folio
------------[ cut here ]------------
gfs2_meta_aops does not implement migrate_folio
WARNING: CPU: 0 PID: 30 at mm/migrate.c:944 fallback_migrate_folio mm/migrate.c:942 [inline]
WARNING: CPU: 0 PID: 30 at mm/migrate.c:944 move_to_new_folio+0x696/0x7a0 mm/migrate.c:996
Modules linked in:
CPU: 0 UID: 0 PID: 30 Comm: kcompactd1 Not tainted 6.16.0-rc7-syzkaller-g25fae0b93d1d-dirty #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:fallback_migrate_folio mm/migrate.c:942 [inline]
RIP: 0010:move_to_new_folio+0x696/0x7a0 mm/migrate.c:996
Code: 0d 01 90 42 80 7c 3d 00 00 74 0a 48 8b 7c 24 20 e8 2f 53 fe ff 48 8b 44 24 20 48 8b 30 48 c7 c7 20 bb 97 8b e8 bb b7 5e ff 90 <0f> 0b 90 90 49 bf 00 00 00 00 00 fc ff df e9 7e fd ff ff e8 62 d2
RSP: 0018:ffffc90000516fd0 EFLAGS: 00010246
RAX: daec11f2299abc00 RBX: ffffea000100abc0 RCX: ffff888030f88000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002
RBP: 1ffff1100887b921 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffffbfff1bfaa6c R12: ffffea00014e3d40
R13: ffff8880443dc7e8 R14: ffffea000100abc8 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff88808d218000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fce2e39a000 CR3: 0000000057fda000 CR4: 0000000000352ef0
Call Trace:
<TASK>
migrate_folio_move mm/migrate.c:1301 [inline]
migrate_folios_move mm/migrate.c:1653 [inline]
migrate_pages_batch+0x1c34/0x2830 mm/migrate.c:1900
migrate_pages_sync mm/migrate.c:1930 [inline]
migrate_pages+0x1bcc/0x2930 mm/migrate.c:2039
compact_zone+0x23f4/0x4ad0 mm/compaction.c:2683
compact_node+0x1d2/0x280 mm/compaction.c:2952
kcompactd+0xbc8/0x1290 mm/compaction.c:3250
kthread+0x70e/0x8a0 kernel/kthread.c:464
ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
</TASK>
Tested on:
commit: 25fae0b9 Merge tag 'drm-fixes-2025-07-24' of https://g..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=12eac0a2580000
kernel config: https://syzkaller.appspot.com/x/.config?x=8adfe52da0de2761
dashboard link: https://syzkaller.appspot.com/bug?extid=42a37bf8045847d8f9d2
compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7
patch: https://syzkaller.appspot.com/x/patch.diff?x=118ee0a2580000
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
2025-07-24 11:57 ` syzbot
@ 2025-07-24 12:11 ` Andrew Price
0 siblings, 0 replies; 9+ messages in thread
From: Andrew Price @ 2025-07-24 12:11 UTC (permalink / raw)
To: syzbot, agruenba, gfs2, linux-kernel, syzkaller-bugs
On 24/07/2025 12:57, syzbot wrote:
> Hello,
>
> syzbot has tested the proposed patch but the reproducer is still triggering an issue:
> WARNING in move_to_new_folio
>
> ------------[ cut here ]------------
> gfs2_meta_aops does not implement migrate_folio
This is a separate issue, fixed in for-next.
Andy
> WARNING: CPU: 0 PID: 30 at mm/migrate.c:944 fallback_migrate_folio mm/migrate.c:942 [inline]
> WARNING: CPU: 0 PID: 30 at mm/migrate.c:944 move_to_new_folio+0x696/0x7a0 mm/migrate.c:996
> Modules linked in:
> CPU: 0 UID: 0 PID: 30 Comm: kcompactd1 Not tainted 6.16.0-rc7-syzkaller-g25fae0b93d1d-dirty #0 PREEMPT(full)
> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
> RIP: 0010:fallback_migrate_folio mm/migrate.c:942 [inline]
> RIP: 0010:move_to_new_folio+0x696/0x7a0 mm/migrate.c:996
> Code: 0d 01 90 42 80 7c 3d 00 00 74 0a 48 8b 7c 24 20 e8 2f 53 fe ff 48 8b 44 24 20 48 8b 30 48 c7 c7 20 bb 97 8b e8 bb b7 5e ff 90 <0f> 0b 90 90 49 bf 00 00 00 00 00 fc ff df e9 7e fd ff ff e8 62 d2
> RSP: 0018:ffffc90000516fd0 EFLAGS: 00010246
> RAX: daec11f2299abc00 RBX: ffffea000100abc0 RCX: ffff888030f88000
> RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002
> RBP: 1ffff1100887b921 R08: 0000000000000003 R09: 0000000000000004
> R10: dffffc0000000000 R11: fffffbfff1bfaa6c R12: ffffea00014e3d40
> R13: ffff8880443dc7e8 R14: ffffea000100abc8 R15: dffffc0000000000
> FS: 0000000000000000(0000) GS:ffff88808d218000(0000) knlGS:0000000000000000
> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: 00007fce2e39a000 CR3: 0000000057fda000 CR4: 0000000000352ef0
> Call Trace:
> <TASK>
> migrate_folio_move mm/migrate.c:1301 [inline]
> migrate_folios_move mm/migrate.c:1653 [inline]
> migrate_pages_batch+0x1c34/0x2830 mm/migrate.c:1900
> migrate_pages_sync mm/migrate.c:1930 [inline]
> migrate_pages+0x1bcc/0x2930 mm/migrate.c:2039
> compact_zone+0x23f4/0x4ad0 mm/compaction.c:2683
> compact_node+0x1d2/0x280 mm/compaction.c:2952
> kcompactd+0xbc8/0x1290 mm/compaction.c:3250
> kthread+0x70e/0x8a0 kernel/kthread.c:464
> ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
> ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
> </TASK>
>
>
> Tested on:
>
> commit: 25fae0b9 Merge tag 'drm-fixes-2025-07-24' of https://g..
> git tree: upstream
> console output: https://syzkaller.appspot.com/x/log.txt?x=12eac0a2580000
> kernel config: https://syzkaller.appspot.com/x/.config?x=8adfe52da0de2761
> dashboard link: https://syzkaller.appspot.com/bug?extid=42a37bf8045847d8f9d2
> compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7
> patch: https://syzkaller.appspot.com/x/patch.diff?x=118ee0a2580000
>
^ permalink raw reply [flat|nested] 9+ messages in thread
* Forwarded: Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
2025-05-28 10:08 [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3) syzbot
2025-07-23 20:49 ` syzbot
@ 2026-04-30 11:25 ` syzbot
2026-04-30 22:30 ` syzbot
2 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-04-30 11:25 UTC (permalink / raw)
To: linux-kernel, syzkaller-bugs
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com.
***
Subject: Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
Author: tristmd@gmail.com
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
>From bcb810e8bbe744753bc43fd4f3cb5946a3ae91ee Mon Sep 17 00:00:00 2001
From: Tristan Madani <tristan@talencesecurity.com>
Date: Thu, 30 Apr 2026 11:05:04 +0000
Subject: [PATCH] gfs2: fix use-after-free in gfs2_qd_dealloc
gfs2_qd_dealloc(), called as an RCU callback from gfs2_qd_dispose(),
accesses the superblock object sdp through qd->qd_sbd after freeing qd.
It does so to decrement sd_quota_count and wake up sd_kill_wait.
However, by the time the RCU callback runs, gfs2_put_super() may have
already freed sdp via free_sbd(). This can happen when
gfs2_quota_cleanup() is called during unmount: it disposes of quota
objects via call_rcu() and then waits on sd_kill_wait with a 60-second
timeout. If the timeout expires, or if gfs2_gl_hash_clear() triggers
additional qd_put() calls that schedule more RCU callbacks after the
wait completes, gfs2_put_super() will proceed to free the superblock
while RCU callbacks referencing it are still pending.
Add an rcu_barrier() before free_sbd() in gfs2_put_super() to ensure
all pending RCU callbacks (including gfs2_qd_dealloc) have completed
before the superblock is freed.
Fixes: a475c5dd16e5 ("gfs2: Free quota data objects synchronously")
Cc: stable@vger.kernel.org
Signed-off-by: Tristan Madani <tristan@talencesecurity.com>
---
fs/gfs2/super.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/fs/gfs2/super.c b/fs/gfs2/super.c
index a2ea121331f18..4d854556b5299 100644
--- a/fs/gfs2/super.c
+++ b/fs/gfs2/super.c
@@ -643,6 +643,7 @@ static void gfs2_put_super(struct super_block *sb)
gfs2_delete_debugfs_file(sdp);
gfs2_sys_fs_del(sdp);
+ rcu_barrier();
free_sbd(sdp);
}
--
2.47.3
^ permalink raw reply related [flat|nested] 9+ messages in thread* Forwarded: Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
2025-05-28 10:08 [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3) syzbot
2025-07-23 20:49 ` syzbot
2026-04-30 11:25 ` Forwarded: " syzbot
@ 2026-04-30 22:30 ` syzbot
2 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-04-30 22:30 UTC (permalink / raw)
To: linux-kernel, syzkaller-bugs
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com.
***
Subject: Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
Author: tristmd@gmail.com
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
>From bcb810e8bbe744753bc43fd4f3cb5946a3ae91ee Mon Sep 17 00:00:00 2001
From: Tristan Madani <tristan@talencesecurity.com>
Date: Thu, 30 Apr 2026 11:05:04 +0000
Subject: [PATCH] gfs2: fix use-after-free in gfs2_qd_dealloc
gfs2_qd_dealloc(), called as an RCU callback from gfs2_qd_dispose(),
accesses the superblock object sdp through qd->qd_sbd after freeing qd.
It does so to decrement sd_quota_count and wake up sd_kill_wait.
However, by the time the RCU callback runs, gfs2_put_super() may have
already freed sdp via free_sbd(). This can happen when
gfs2_quota_cleanup() is called during unmount: it disposes of quota
objects via call_rcu() and then waits on sd_kill_wait with a 60-second
timeout. If the timeout expires, or if gfs2_gl_hash_clear() triggers
additional qd_put() calls that schedule more RCU callbacks after the
wait completes, gfs2_put_super() will proceed to free the superblock
while RCU callbacks referencing it are still pending.
Add an rcu_barrier() before free_sbd() in gfs2_put_super() to ensure
all pending RCU callbacks (including gfs2_qd_dealloc) have completed
before the superblock is freed.
Fixes: a475c5dd16e5 ("gfs2: Free quota data objects synchronously")
Cc: stable@vger.kernel.org
Signed-off-by: Tristan Madani <tristan@talencesecurity.com>
---
fs/gfs2/super.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/fs/gfs2/super.c b/fs/gfs2/super.c
index a2ea121331f18..4d854556b5299 100644
--- a/fs/gfs2/super.c
+++ b/fs/gfs2/super.c
@@ -643,6 +643,7 @@ static void gfs2_put_super(struct super_block *sb)
gfs2_delete_debugfs_file(sdp);
gfs2_sys_fs_del(sdp);
+ rcu_barrier();
free_sbd(sdp);
}
--
2.47.3
^ permalink raw reply related [flat|nested] 9+ messages in thread
[parent not found: <177754835224.2147696.8354228851433174481@gmail.com>]
* Re: [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3)
[not found] <177754835224.2147696.8354228851433174481@gmail.com>
@ 2026-04-30 12:51 ` syzbot
0 siblings, 0 replies; 9+ messages in thread
From: syzbot @ 2026-04-30 12:51 UTC (permalink / raw)
To: linux-kernel, syzkaller-bugs, tristmd
Hello,
syzbot tried to test the proposed patch but the build/boot failed:
SYZFAIL: failed to recv rpc
SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)
Warning: Permanently added '10.128.1.172' (ED25519) to the list of known hosts.
2026/04/30 12:49:26 parsed 1 programs
[ 78.581168][ T5617] cgroup: Unknown subsys name 'net'
[ 78.678493][ T5617] cgroup: Unknown subsys name 'cpuset'
[ 78.687690][ T5617] cgroup: Unknown subsys name 'rlimit'
Setting up swapspace version 1, size = 127995904 bytes
[ 80.032556][ T5617] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 82.943242][ T5630] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 83.062281][ T50] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 83.076191][ T50] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 83.085325][ T50] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 83.094576][ T50] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 83.104084][ T50] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 84.199482][ T5654] bridge0: port 1(bridge_slave_0) entered blocking state
[ 84.207733][ T5654] bridge0: port 1(bridge_slave_0) entered disabled state
[ 84.216747][ T5654] bridge_slave_0: entered allmulticast mode
[ 84.223809][ T5654] bridge_slave_0: entered promiscuous mode
[ 84.233002][ T5654] bridge0: port 2(bridge_slave_1) entered blocking state
[ 84.240220][ T5654] bridge0: port 2(bridge_slave_1) entered disabled state
[ 84.247416][ T5654] bridge_slave_1: entered allmulticast mode
[ 84.254439][ T5654] bridge_slave_1: entered promiscuous mode
[ 84.282622][ T5654] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 84.294237][ T5654] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 84.323883][ T5654] team0: Port device team_slave_0 added
[ 84.332696][ T5654] team0: Port device team_slave_1 added
[ 84.359292][ T5654] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 84.366295][ T5654] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 84.392330][ T5654] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 84.404754][ T5654] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 84.411770][ T5654] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 84.438023][ T5654] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 84.478401][ T5654] hsr_slave_0: entered promiscuous mode
[ 84.484735][ T5654] hsr_slave_1: entered promiscuous mode
[ 84.608498][ T5654] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 84.620785][ T5654] 8021q: adding VLAN 0 to HW filter on device netdevsim0
[ 84.628610][ T5654] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 84.639884][ T5654] 8021q: adding VLAN 0 to HW filter on device netdevsim1
[ 84.647927][ T5654] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 84.659025][ T5654] 8021q: adding VLAN 0 to HW filter on device netdevsim2
[ 84.666877][ T5654] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 84.678430][ T5654] 8021q: adding VLAN 0 to HW filter on device netdevsim3
[ 84.708761][ T5654] bridge0: port 2(bridge_slave_1) entered blocking state
[ 84.716402][ T5654] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 84.724347][ T5654] bridge0: port 1(bridge_slave_0) entered blocking state
[ 84.731895][ T5654] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 84.784036][ T5654] 8021q: adding VLAN 0 to HW filter on device bond0
[ 84.804490][ T58] bridge0: port 1(bridge_slave_0) entered disabled state
[ 84.813934][ T58] bridge0: port 2(bridge_slave_1) entered disabled state
[ 84.831679][ T5654] 8021q: adding VLAN 0 to HW filter on device team0
[ 84.844859][ T519] bridge0: port 1(bridge_slave_0) entered blocking state
[ 84.852286][ T519] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 84.866396][ T79] bridge0: port 2(bridge_slave_1) entered blocking state
[ 84.873572][ T79] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 85.154771][ T5654] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 85.198499][ T5654] veth0_vlan: entered promiscuous mode
[ 85.210385][ T5654] veth1_vlan: entered promiscuous mode
[ 85.244602][ T5654] veth0_macvtap: entered promiscuous mode
[ 85.254209][ T5654] veth1_macvtap: entered promiscuous mode
[ 85.273388][ T5654] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 85.287887][ T5654] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 85.303085][ T519] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 85.313495][ T519] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 85.324141][ T519] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 85.334774][ T519] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 85.490249][ T79] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 85.573851][ T79] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 85.676103][ T79] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 85.771539][ T79] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 86.835963][ T10] cfg80211: failed to load regulatory.db
[ 87.316370][ T3344] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 87.324743][ T3344] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 87.350286][ T58] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 87.359386][ T58] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 87.851968][ T79] bridge_slave_1: left allmulticast mode
[ 87.865300][ T79] bridge_slave_1: left promiscuous mode
[ 87.886744][ T79] bridge0: port 2(bridge_slave_1) entered disabled state
[ 87.900702][ T79] bridge_slave_0: left allmulticast mode
[ 87.908697][ T79] bridge_slave_0: left promiscuous mode
[ 87.915377][ T79] bridge0: port 1(bridge_slave_0) entered disabled state
2026/04/30 12:49:38 executed programs: 0
[ 88.103597][ T4938] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 88.114089][ T4938] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 88.122041][ T4938] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 88.130307][ T4938] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 88.139480][ T4938] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 88.153169][ T79] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 88.167922][ T79] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 88.178737][ T79] bond0 (unregistering): Released all slaves
[ 88.321105][ T79] hsr_slave_0: left promiscuous mode
[ 88.338092][ T79] hsr_slave_1: left promiscuous mode
[ 88.355972][ T79] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 88.375542][ T79] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 88.393217][ T79] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 88.401729][ T79] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 88.424969][ T79] veth1_macvtap: left promiscuous mode
[ 88.431510][ T79] veth0_macvtap: left promiscuous mode
[ 88.437686][ T79] veth1_vlan: left promiscuous mode
[ 88.443055][ T79] veth0_vlan: left promiscuous mode
[ 88.712941][ T79] team0 (unregistering): Port device team_slave_1 removed
[ 88.734406][ T79] team0 (unregistering): Port device team_slave_0 removed
[ 88.823217][ T5283] 8021q: adding VLAN 0 to HW filter on device eth1
[ 89.417167][ T5283] 8021q: adding VLAN 0 to HW filter on device eth2
[ 89.784159][ T5744] bridge0: port 1(bridge_slave_0) entered blocking state
[ 89.792012][ T5744] bridge0: port 1(bridge_slave_0) entered disabled state
[ 89.799424][ T5744] bridge_slave_0: entered allmulticast mode
[ 89.807280][ T5744] bridge_slave_0: entered promiscuous mode
[ 89.819396][ T5744] bridge0: port 2(bridge_slave_1) entered blocking state
[ 89.827997][ T5744] bridge0: port 2(bridge_slave_1) entered disabled state
[ 89.835690][ T5744] bridge_slave_1: entered allmulticast mode
[ 89.848008][ T5744] bridge_slave_1: entered promiscuous mode
[ 89.940194][ T5744] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 90.048674][ T5744] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 90.099125][ T5744] team0: Port device team_slave_0 added
[ 90.108074][ T5744] team0: Port device team_slave_1 added
[ 90.186048][ T50] Bluetooth: hci0: command tx timeout
[ 90.213279][ T5744] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 90.220519][ T5744] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 90.247468][ T5744] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 90.265774][ T5744] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 90.276621][ T5744] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 90.303922][ T5744] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 90.469408][ T5744] hsr_slave_0: entered promiscuous mode
[ 90.481812][ T5744] hsr_slave_1: entered promiscuous mode
[ 90.681880][ T5283] 8021q: adding VLAN 0 to HW filter on device eth3
[ 91.138311][ T5744] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 91.152779][ T5744] 8021q: adding VLAN 0 to HW filter on device netdevsim0
[ 91.162541][ T5744] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 91.182054][ T5744] 8021q: adding VLAN 0 to HW filter on device netdevsim1
[ 91.193977][ T5744] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 91.208510][ T5744] 8021q: adding VLAN 0 to HW filter on device netdevsim2
[ 91.218476][ T5744] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 91.231736][ T5744] 8021q: adding VLAN 0 to HW filter on device netdevsim3
[ 91.336798][ T5744] 8021q: adding VLAN 0 to HW filter on device bond0
[ 91.369870][ T5744] 8021q: adding VLAN 0 to HW filter on device team0
[ 91.386212][ T519] bridge0: port 1(bridge_slave_0) entered blocking state
[ 91.393493][ T519] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 91.411832][ T519] bridge0: port 2(bridge_slave_1) entered blocking state
[ 91.419160][ T519] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 91.908716][ T5744] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 91.978101][ T5744] veth0_vlan: entered promiscuous mode
[ 91.994318][ T5744] veth1_vlan: entered promiscuous mode
[ 92.035783][ T5744] veth0_macvtap: entered promiscuous mode
[ 92.047946][ T5744] veth1_macvtap: entered promiscuous mode
[ 92.079050][ T5744] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 92.097856][ T5744] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 92.121401][ T58] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 92.141194][ T58] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 92.162525][ T58] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 92.198589][ T519] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 92.251556][ T519] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 92.260991][ T50] Bluetooth: hci0: command tx timeout
[ 92.267206][ T519] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 92.301651][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 92.309879][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)
syzkaller build log:
go env (err=<nil>)
AR='ar'
CC='gcc'
CGO_CFLAGS='-O2 -g'
CGO_CPPFLAGS=''
CGO_CXXFLAGS='-O2 -g'
CGO_ENABLED='1'
CGO_FFLAGS='-O2 -g'
CGO_LDFLAGS='-O2 -g'
CXX='g++'
GCCGO='gccgo'
GO111MODULE='auto'
GOAMD64='v1'
GOARCH='amd64'
GOAUTH='netrc'
GOBIN=''
GOCACHE='/syzkaller/.cache/go-build'
GOCACHEPROG=''
GODEBUG=''
GOENV='/syzkaller/.config/go/env'
GOEXE=''
GOEXPERIMENT=''
GOFIPS140='off'
GOFLAGS=''
GOGCCFLAGS='-fPIC -m64 -pthread -Wl,--no-gc-sections -fmessage-length=0 -ffile-prefix-map=/tmp/go-build2958903999=/tmp/go-build -gno-record-gcc-switches'
GOHOSTARCH='amd64'
GOHOSTOS='linux'
GOINSECURE=''
GOMOD='/syzkaller/jobs/linux/gopath/src/github.com/google/syzkaller/go.mod'
GOMODCACHE='/syzkaller/jobs/linux/gopath/pkg/mod'
GONOPROXY=''
GONOSUMDB=''
GOOS='linux'
GOPATH='/syzkaller/jobs/linux/gopath'
GOPRIVATE=''
GOPROXY='https://proxy.golang.org,direct'
GOROOT='/usr/local/go'
GOSUMDB='sum.golang.org'
GOTELEMETRY='local'
GOTELEMETRYDIR='/syzkaller/.config/go/telemetry'
GOTMPDIR=''
GOTOOLCHAIN='auto'
GOTOOLDIR='/usr/local/go/pkg/tool/linux_amd64'
GOVCS=''
GOVERSION='go1.26.0'
GOWORK=''
PKG_CONFIG='pkg-config'
git status (err=<nil>)
HEAD detached at d6526ea3e6a
nothing to commit, working tree clean
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
go list -f '{{.Stale}}' -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115" ./sys/syz-sysgen | grep -q false || go install -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115" ./sys/syz-sysgen
make .descriptions
tput: No value for $TERM and no -T specified
tput: No value for $TERM and no -T specified
Makefile:31: run command via tools/syz-env for best compatibility, see:
Makefile:32: https://github.com/google/syzkaller/blob/master/docs/contributing.md#using-syz-env
bin/syz-sysgen
touch .descriptions
GOOS=linux GOARCH=amd64 go build -ldflags="-s -w -X github.com/google/syzkaller/prog.GitRevision=d6526ea3e6ad9081c902859bbb80f9f840377cb4 -X github.com/google/syzkaller/prog.gitRevisionDate=20251126-113115" -o ./bin/linux_amd64/syz-execprog github.com/google/syzkaller/tools/syz-execprog
mkdir -p ./bin/linux_amd64
g++ -o ./bin/linux_amd64/syz-executor executor/executor.cc \
-m64 -O2 -pthread -Wall -Werror -Wparentheses -Wunused-const-variable -Wframe-larger-than=16384 -Wno-stringop-overflow -Wno-array-bounds -Wno-format-overflow -Wno-unused-but-set-variable -Wno-unused-command-line-argument -static-pie -std=c++17 -I. -Iexecutor/_include -DGOOS_linux=1 -DGOARCH_amd64=1 \
-DHOSTGOOS_linux=1 -DGIT_REVISION=\"d6526ea3e6ad9081c902859bbb80f9f840377cb4\"
/usr/bin/ld: /tmp/cceLaIYh.o: in function `Connection::Connect(char const*, char const*)':
executor.cc:(.text._ZN10Connection7ConnectEPKcS1_[_ZN10Connection7ConnectEPKcS1_]+0x386): warning: Using 'gethostbyname' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking
./tools/check-syzos.sh 2>/dev/null
Tested on:
commit: e75a43c7 Merge tag 'trace-v7.1-rc1' of git://git.kerne..
git tree: upstream
kernel config: https://syzkaller.appspot.com/x/.config?x=39862773faeb52a2
dashboard link: https://syzkaller.appspot.com/bug?extid=42a37bf8045847d8f9d2
compiler: Debian clang version 21.1.8 (++20251221033036+2078da43e25a-1~exp1~20251221153213.50), Debian LLD 21.1.8
patch: https://syzkaller.appspot.com/x/patch.diff?x=15365348580000
^ permalink raw reply [flat|nested] 9+ messages in thread
[parent not found: <177758824329.163667.6298575861470288172@gmail.com>]
end of thread, other threads:[~2026-04-30 23:05 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-05-28 10:08 [syzbot] [gfs2?] KASAN: slab-use-after-free Write in gfs2_qd_dealloc (3) syzbot
2025-07-23 20:49 ` syzbot
2025-07-24 11:38 ` Andrew Price
2025-07-24 11:57 ` syzbot
2025-07-24 12:11 ` Andrew Price
2026-04-30 11:25 ` Forwarded: " syzbot
2026-04-30 22:30 ` syzbot
[not found] <177754835224.2147696.8354228851433174481@gmail.com>
2026-04-30 12:51 ` syzbot
[not found] <177758824329.163667.6298575861470288172@gmail.com>
2026-04-30 23:05 ` syzbot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox