syzbot


KASAN: use-after-free Read in ocfs2_listxattr

Status: upstream: reported C repro on 2025/12/01 05:16
Bug presence: origin:upstream
[Documentation on labels]
Reported-by: syzbot+55a6d34a3a95c58633df@syzkaller.appspotmail.com
First crash: 3d08h, last: 3d07h
Bug presence (1)
Date Name Commit Repro Result
2025/12/03 upstream (ToT) 3f9f0252130e C [report] KASAN: use-after-free Read in ocfs2_listxattr
Similar bugs (1)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KASAN: use-after-free Read in ocfs2_listxattr ocfs2 19 C 5 11d 23d 2/29 upstream: reported C repro on 2025/11/10 18:09

Sample crash report:
JBD2: Ignoring recovery information on journal
ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode.
==================================================================
BUG: KASAN: use-after-free in ocfs2_xattr_get_type fs/ocfs2/ocfs2_fs.h:1113 [inline]
BUG: KASAN: use-after-free in ocfs2_xattr_list_entries fs/ocfs2/xattr.c:938 [inline]
BUG: KASAN: use-after-free in ocfs2_xattr_ibody_list fs/ocfs2/xattr.c:986 [inline]
BUG: KASAN: use-after-free in ocfs2_listxattr+0x408/0xa74 fs/ocfs2/xattr.c:1048
Read of size 1 at addr ffff0000eab2b007 by task syz.0.17/4531

CPU: 1 PID: 4531 Comm: syz.0.17 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025
Call trace:
 dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
 __dump_stack+0x30/0x40 lib/dump_stack.c:88
 dump_stack_lvl+0xf8/0x160 lib/dump_stack.c:106
 print_address_description+0x88/0x218 mm/kasan/report.c:316
 print_report+0x50/0x68 mm/kasan/report.c:420
 kasan_report+0xa8/0x100 mm/kasan/report.c:524
 __asan_report_load1_noabort+0x2c/0x38 mm/kasan/report_generic.c:348
 ocfs2_xattr_get_type fs/ocfs2/ocfs2_fs.h:1113 [inline]
 ocfs2_xattr_list_entries fs/ocfs2/xattr.c:938 [inline]
 ocfs2_xattr_ibody_list fs/ocfs2/xattr.c:986 [inline]
 ocfs2_listxattr+0x408/0xa74 fs/ocfs2/xattr.c:1048
 vfs_listxattr fs/xattr.c:457 [inline]
 listxattr+0x29c/0x3cc fs/xattr.c:804
 path_listxattr+0xdc/0x1b4 fs/xattr.c:828
 __do_sys_listxattr fs/xattr.c:840 [inline]
 __se_sys_listxattr fs/xattr.c:837 [inline]
 __arm64_sys_listxattr+0x80/0x94 fs/xattr.c:837
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140
 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204
 el0_svc+0x58/0x138 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585

The buggy address belongs to the physical page:
page:0000000089fbd4da refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x12ab2b
flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff)
raw: 05ffc00000000000 fffffc0003a97348 fffffc0003adc488 0000000000000000
raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff0000eab2af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff0000eab2af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff0000eab2b000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                   ^
 ffff0000eab2b080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff0000eab2b100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/12/01 06:18 linux-6.1.y f6e38ae624cf d6526ea3 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (clean fs)] ci2-linux-6-1-kasan-arm64 KASAN: use-after-free Read in ocfs2_listxattr
2025/12/01 05:51 linux-6.1.y f6e38ae624cf d6526ea3 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (clean fs)] ci2-linux-6-1-kasan-arm64 KASAN: use-after-free Read in ocfs2_listxattr
2025/12/01 05:15 linux-6.1.y f6e38ae624cf d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: use-after-free Read in ocfs2_listxattr
* Struck through repros no longer work on HEAD.