From: "Chuck Lever" <cel@kernel.org>
To: "Jeff Layton" <jlayton@kernel.org>,
"Misbah Anjum N" <misanjum@linux.ibm.com>,
"Linux Kernel" <linux-kernel@vger.kernel.org>,
"Linux Nfs" <linux-nfs@vger.kernel.org>
Cc: "Linuxppc Dev" <linuxppc-dev@lists.ozlabs.org>,
"Chuck Lever" <chuck.lever@oracle.com>,
venkat88@linux.ibm.com, "Linux Next" <linux-next@vger.kernel.org>
Subject: Re: [BUG] [powerpc] [next-20260216/17] nfsd: use-after-free in cache_check_rcu() triggered by sosreport on ppc64le
Date: Fri, 01 May 2026 08:44:01 -0400 [thread overview]
Message-ID: <8e8847fb-0eff-46b0-97dc-fe683c706db3@app.fastmail.com> (raw)
In-Reply-To: <d6701b40b8b7c143f87ecec0afb08af8a2867358.camel@kernel.org>
On Fri, May 1, 2026, at 3:06 AM, Jeff Layton wrote:
> On Fri, 2026-05-01 at 02:15 +0530, Misbah Anjum N wrote:
>> Hi,
>>
>> Following up on my bug report, I have completed a git bisect and have
>> critical new findings to report.
>> Ref:
>> https://lore.kernel.org/linux-next/dcd371d3a95815a84ba7de52cef447b8@linux.ibm.com/T/#u
>>
>> Current Status: Bug Has Propagated from linux-next to Mainline.
>> First Bad commit identified: da6b5aae84beb0917ecb0c9fbc71169d145397ff
>>
>> The use-after-free bug in cache_check_rcu() that I originally reported
>> in linux-next (6.19.0-next-20260216/17) has now propagated into mainline
>> and is confirmed present in:
>> - mainline (Tested on Latest kernel as of 2026-04-30 - commit
>> 08d0d3466664)
>> - linux-next (Tested on Latest kernel as of 2026-04-30)
>>
>> This bug is causing failures on ppc64le systems:
>> 1. Kernel panics: 100% reproducible crashes when sosreport runs
>> 2. CI/Testing failures: All automated Avocado-vt KVM testing on ppc64le
>> is failing
>> 3. Use-after-free corruption: Memory corruption with corrupted pointers
>> containing
>> ASCII strings ("libz.so.", "export_cap") or poison patterns
>> (0xcccccccccccccccc)
>>
>
> Thanks for the bug report. I must have missed your earlier email.
You didn’t miss it. We responded to that report in February with
a fix that you and Neil both reviewed and it is in v7.0 now.
That fix addressed one instance of this problem; there are actually
several more, all in the same UAF class. I have a patch series nearly
complete to address these issues.
The issue Misbah reports here is not the same as the February issue,
though it is very similar.
> The commit you landed on is a merge commit and is not likely to be the
> cause, particularly since that merge was for x86 drivers and you're
> seeing this on PPC. Is this reproducible on other architectures?
We have an internal bug reporting the same stack trace on ARM64. Now
that we have both a reproducer and a platform that is easily accessible
it will be straightforward to confirm these issues are fully addressed
before we merge the new fixes.
--
Chuck Lever
prev parent reply other threads:[~2026-05-01 12:44 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-19 13:27 [BUG] [powerpc] [next-20260216/17] nfsd: use-after-free in cache_check_rcu() triggered by sosreport on ppc64le Misbah Anjum N
2026-04-30 20:45 ` Misbah Anjum N
2026-05-01 7:06 ` Jeff Layton
2026-05-01 12:44 ` Chuck Lever [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=8e8847fb-0eff-46b0-97dc-fe683c706db3@app.fastmail.com \
--to=cel@kernel.org \
--cc=chuck.lever@oracle.com \
--cc=jlayton@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-next@vger.kernel.org \
--cc=linux-nfs@vger.kernel.org \
--cc=linuxppc-dev@lists.ozlabs.org \
--cc=misanjum@linux.ibm.com \
--cc=venkat88@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox