lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <67199e48.050a0220.10f4f4.01d5.GAE@google.com>
Date: Wed, 23 Oct 2024 18:09:28 -0700
From: syzbot <syzbot+9fc4dac4775d07bcfe34@...kaller.appspotmail.com>
To: lizhi.xu@...driver.com
Cc: lizhi.xu@...driver.com, syzkaller-bugs@...glegroups.com, 
	linux-kernel@...r.kernel.org
Subject: Re: [syzbot] [bcachefs?] KASAN: slab-use-after-free Read in bch2_reconstruct_alloc

>
> #syz test: upstream

want either no args or 2 args (repo, branch), got 5

>
> diff --git a/fs/bcachefs/recovery.c b/fs/bcachefs/recovery.c
> index 55e1504a8130..717c1a80de20 100644
> --- a/fs/bcachefs/recovery.c
> +++ b/fs/bcachefs/recovery.c
> @@ -95,9 +95,9 @@ static void bch2_reconstruct_alloc(struct bch_fs *c)
>  	c->sb.compat &= ~(1ULL << BCH_COMPAT_alloc_info);
>  
>  	bch2_write_super(c);
> -	mutex_unlock(&c->sb_lock);
>  
>  	c->opts.recovery_passes |= bch2_recovery_passes_from_stable(le64_to_cpu(ext->recovery_passes_required[0]));
> +	mutex_unlock(&c->sb_lock);
>  
>  
>  	bch2_shoot_down_journal_keys(c, BTREE_ID_alloc,

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ