syzbot


KASAN: use-after-free Write in ocfs2_write_end_nolock

Status: upstream: reported on 2026/04/02 10:40
Subsystems: ocfs2
Labels: actionable
[Documentation on labels]
Reported-by: syzbot+62c1793956716ea8b28a@syzkaller.appspotmail.com
Fix commit: 7bc5da4842be ocfs2: fix out-of-bounds write in ocfs2_write_end_inline
Patched on: [ci-qemu-gce-upstream-auto ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-qemu2-riscv64 ci-snapshot-upstream-root ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-leak ci-upstream-kasan-badwrites-root ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce-386-root ci-upstream-kmsan-gce-root ci-upstream-linux-next-kasan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci-upstream-rust-kasan-gce ci2-upstream-fs ci2-upstream-kcsan-gce ci2-upstream-usb], missing on: [ci-qemu-native-arm64-kvm ci-upstream-gce-arm64]
First crash: 35d, last: 2d18h
✨ AI Jobs (1)
ID Workflow Result Correct Bug Created Started Finished Revision Error
ebe1e268-331b-4095-9d1d-2456fd3ebd5e moderation Actionable: ✅  Confident: ✅  KASAN: use-after-free Write in ocfs2_write_end_nolock 2026/04/01 00:02 2026/04/01 00:02 2026/04/01 01:06 aeea1c7238ce8309f33041dd38ccef93fffa0d3c
Discussions (2)
Title Replies (including bot) Last reply
[PATCH] ocfs2: fix out-of-bounds write in ocfs2_write_end_inline 2 (2) 2026/04/07 14:26
[syzbot] [ocfs2?] KASAN: use-after-free Write in ocfs2_write_end_nolock 1 (2) 2026/04/02 12:44

Sample crash report:
loop0: detected capacity change from 0 to 32768
=======================================================
WARNING: The mand mount option has been deprecated and
         and is ignored by this kernel. Remove the mand
         option from the mount to silence this warning.
=======================================================
JBD2: Ignoring recovery information on journal
ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode.
(syz.0.0,5320,0):ocfs2_check_set_options:1244 ERROR: Invalid heartbeat mount options
loop0: detected capacity change from 32768 to 32767
OCFS2: ERROR (device loop0): int ocfs2_validate_inode_block(struct super_block *, struct buffer_head *): Invalid dinode #17058: signature = ɂ
On-disk corruption discovered. Please run fsck.ocfs2 once the filesystem is unmounted.
OCFS2: File system is now read-only.
(syz.0.0,5320,0):ocfs2_assign_bh:2417 ERROR: status = -30
(syz.0.0,5320,0):ocfs2_inode_lock_full_nested:2512 ERROR: status = -30
(syz.0.0,5320,0):ocfs2_reflink_inodes_lock:4747 ERROR: status = -30
==================================================================
BUG: KASAN: use-after-free in memcpy_from_folio include/linux/highmem.h:586 [inline]
BUG: KASAN: use-after-free in ocfs2_write_end_inline fs/ocfs2/aops.c:1917 [inline]
BUG: KASAN: use-after-free in ocfs2_write_end_nolock+0xbd9/0x18c0 fs/ocfs2/aops.c:1951
Write of size 4086 at addr ffff8880569b14d2 by task syz.0.0/5320

CPU: 0 UID: 0 PID: 5320 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
 print_address_description+0x55/0x1e0 mm/kasan/report.c:378
 print_report+0x58/0x70 mm/kasan/report.c:482
 kasan_report+0x117/0x150 mm/kasan/report.c:595
 check_region_inline mm/kasan/generic.c:-1 [inline]
 kasan_check_range+0x264/0x2c0 mm/kasan/generic.c:200
 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106
 memcpy_from_folio include/linux/highmem.h:586 [inline]
 ocfs2_write_end_inline fs/ocfs2/aops.c:1917 [inline]
 ocfs2_write_end_nolock+0xbd9/0x18c0 fs/ocfs2/aops.c:1951
 ocfs2_write_end+0x58/0x90 fs/ocfs2/aops.c:2061
 generic_perform_write+0x620/0x8f0 mm/filemap.c:4346
 ocfs2_file_write_iter+0x1663/0x1e70 fs/ocfs2/file.c:2476
 iter_file_splice_write+0x9a1/0x10f0 fs/splice.c:736
 do_splice_from fs/splice.c:936 [inline]
 direct_splice_actor+0x101/0x160 fs/splice.c:1159
 splice_direct_to_actor+0x53a/0xc70 fs/splice.c:1103
 do_splice_direct_actor fs/splice.c:1202 [inline]
 do_splice_direct+0x195/0x290 fs/splice.c:1228
 vfs_copy_file_range+0xb02/0x1370 fs/read_write.c:1634
 __do_sys_copy_file_range fs/read_write.c:1683 [inline]
 __se_sys_copy_file_range+0x2fb/0x480 fs/read_write.c:1650
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6e3379cdd9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f6e3466dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000146
RAX: ffffffffffffffda RBX: 00007f6e33a15fa0 RCX: 00007f6e3379cdd9
RDX: 0000000000000009 RSI: 00002000000001c0 RDI: 000000000000000a
RBP: 00007f6e33832d69 R08: ffffffffa003e45b R09: 0700000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f6e33a16038 R14: 00007f6e33a15fa0 R15: 00007ffd30625228
 </TASK>

The buggy address belongs to the physical page:
page: refcount:2 mapcount:0 mapping:ffff88801cc25940 index:0x854 pfn:0x569b1
memcg:ffff8880340fc080
aops:def_blk_aops ino:700000 dentry name(?):""
flags: 0x4fff38000004024(referenced|lru|private|node=1|zone=1|lastcpupid=0x7ff)
raw: 04fff38000004024 ffffea0000ee73c8 ffff8880304489e0 ffff88801cc25940
raw: 0000000000000854 ffff888047636570 00000002ffffffff ffff8880340fc080
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Movable, gfp_mask 0x148c48(GFP_NOFS|__GFP_MOVABLE|__GFP_NOFAIL|__GFP_COMP|__GFP_HARDWALL), pid 5320, tgid 5319 (syz.0.0), ts 85064812771, free_ts 85023361086
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x231/0x280 mm/page_alloc.c:1858
 prep_new_page mm/page_alloc.c:1866 [inline]
 get_page_from_freelist+0x24ba/0x2540 mm/page_alloc.c:3946
 __alloc_frozen_pages_noprof+0x18d/0x380 mm/page_alloc.c:5226
 alloc_pages_mpol+0x235/0x490 mm/mempolicy.c:2490
 alloc_frozen_pages_noprof mm/mempolicy.c:2561 [inline]
 alloc_pages_noprof+0xac/0x2a0 mm/mempolicy.c:2581
 folio_alloc_noprof+0x1e/0x30 mm/mempolicy.c:2591
 filemap_alloc_folio_noprof+0x111/0x470 mm/filemap.c:1014
 __filemap_get_folio_mpol+0x3fc/0xb00 mm/filemap.c:2012
 __filemap_get_folio include/linux/pagemap.h:763 [inline]
 grow_dev_folio fs/buffer.c:954 [inline]
 grow_buffers fs/buffer.c:1020 [inline]
 __getblk_slow fs/buffer.c:1038 [inline]
 bdev_getblk+0x1f6/0x6e0 fs/buffer.c:1358
 __getblk include/linux/buffer_head.h:380 [inline]
 sb_getblk include/linux/buffer_head.h:386 [inline]
 ocfs2_read_blocks+0x56d/0x1530 fs/ocfs2/buffer_head_io.c:236
 ocfs2_read_inode_block_full fs/ocfs2/inode.c:1745 [inline]
 ocfs2_read_inode_block+0xec/0x1d0 fs/ocfs2/inode.c:1759
 ocfs2_assign_bh fs/ocfs2/dlmglue.c:2415 [inline]
 ocfs2_inode_lock_full_nested+0x2ac/0x1bd0 fs/ocfs2/dlmglue.c:2510
 ocfs2_reflink_inodes_lock+0x489/0xc20 fs/ocfs2/refcounttree.c:4743
 ocfs2_remap_file_range+0x236/0x6f0 fs/ocfs2/file.c:2721
 vfs_copy_file_range+0xd80/0x1370 fs/read_write.c:1600
 __do_sys_copy_file_range fs/read_write.c:1683 [inline]
 __se_sys_copy_file_range+0x2fb/0x480 fs/read_write.c:1650
page last free pid 5320 tgid 5319 stack trace:
 reset_page_owner include/linux/page_owner.h:25 [inline]
 __free_pages_prepare mm/page_alloc.c:1402 [inline]
 free_unref_folios+0xcec/0x1480 mm/page_alloc.c:3004
 folios_put_refs+0x9ff/0xb40 mm/swap.c:1008
 folio_batch_release include/linux/folio_batch.h:101 [inline]
 mapping_try_invalidate+0x3c2/0x4c0 mm/truncate.c:579
 loop_set_status+0x29b/0xe40 drivers/block/loop.c:1246
 loop_set_status_old drivers/block/loop.c:1362 [inline]
 lo_ioctl+0xce6/0x1fb0 drivers/block/loop.c:1551
 blkdev_ioctl+0x5e3/0x740 block/ioctl.c:797
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Memory state around the buggy address:
 ffff8880569b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff8880569b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff8880569b2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                   ^
 ffff8880569b2080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff8880569b2100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================

Crashes (18):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/04/28 15:57 upstream 3b3bea6d4b9c 340bcdf0 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/27 12:38 upstream 254f49634ee1 0f700595 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/27 00:29 upstream 14479877c1ec 9c2d0995 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/26 19:32 upstream 897d54018cc9 9c2d0995 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/26 04:32 upstream 897d54018cc9 9c2d0995 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/25 21:46 upstream 27d128c1cff6 9c2d0995 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/25 20:19 upstream 27d128c1cff6 9c2d0995 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/25 15:20 upstream 27d128c1cff6 9c2d0995 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/19 20:25 upstream faeab166167f 303e2802 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/15 09:00 upstream 508fed679541 362d1323 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/10 23:22 upstream 7c6c4ed80b87 38c8e246 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/07 09:34 upstream bfe62a454542 4440e7c2 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/06 02:07 upstream 1791c390149f 4440e7c2 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/04 15:11 upstream 631919fb12fe 4440e7c2 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/02 10:21 upstream 9147566d8016 0cb124d5 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/04/02 06:50 upstream 9147566d8016 0cb124d5 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/03/28 15:03 upstream be762d8b6dd7 b5ceaad2 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
2026/03/27 04:47 upstream 46b513250491 50cdcaa1 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root KASAN: use-after-free Write in ocfs2_write_end_nolock
* Struck through repros no longer work on HEAD.