From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2EA04C83F0F for ; Tue, 8 Jul 2025 11:20:24 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id AEF7C6B02A5; Tue, 8 Jul 2025 07:20:23 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id AA0076B0326; Tue, 8 Jul 2025 07:20:23 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 98ED46B0327; Tue, 8 Jul 2025 07:20:23 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 7F7E36B02A5 for ; Tue, 8 Jul 2025 07:20:23 -0400 (EDT) Received: from smtpin22.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id EE25080527 for ; Tue, 8 Jul 2025 11:20:22 +0000 (UTC) X-FDA: 83640853884.22.C1A7D8F Received: from mail-io1-f80.google.com (mail-io1-f80.google.com [209.85.166.80]) by imf27.hostedemail.com (Postfix) with ESMTP id 7A2BE40005 for ; Tue, 8 Jul 2025 11:20:21 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=none; spf=pass (imf27.hostedemail.com: domain of 39P5saAkbAO8jpqbRccViRggZU.XffXcVljViTfekVek.Tfd@M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com designates 209.85.166.80 as permitted sender) smtp.mailfrom=39P5saAkbAO8jpqbRccViRggZU.XffXcVljViTfekVek.Tfd@M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com; dmarc=fail reason="SPF not aligned (relaxed), No valid DKIM" header.from=appspotmail.com (policy=none) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1751973621; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references; bh=V4jwJDk9+fb1D744gtKwKpYIN3SPWzXzCEtc01LObtA=; b=xVNL2GCQsrvxT5gkbzIH00W0PB4B/OPkjSDsEgzUYB5HJihgvv28JZtcfub3Tdd+Gx95xQ jXPuVeaGEzl5cRS2/rr4vYE/stkj9Ot+JOVVm8n5ojxTnUSTvr1Cx0cTx5fKSROM5KAcji Xkanh66LJzkqSQ+ecZW2reqg4agayvA= ARC-Authentication-Results: i=1; imf27.hostedemail.com; dkim=none; spf=pass (imf27.hostedemail.com: domain of 39P5saAkbAO8jpqbRccViRggZU.XffXcVljViTfekVek.Tfd@M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com designates 209.85.166.80 as permitted sender) smtp.mailfrom=39P5saAkbAO8jpqbRccViRggZU.XffXcVljViTfekVek.Tfd@M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com; dmarc=fail reason="SPF not aligned (relaxed), No valid DKIM" header.from=appspotmail.com (policy=none) ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1751973621; a=rsa-sha256; cv=none; b=YkQNDXGyM0SUeGGG/9QwZ7Ua7Sae1VLMbz9imTY91VH09+/a3pgpTTOtiA/yqyXYaGCAqt 0NpPX0XofUh/hZ0VwDDssI1Fu1LwRBKZHE237hG5lkkxcz7cmCZh7Zl6lejqn0KfLv2YvF 4Sc5f4afWwjXHELRFcZGjNN+tCY6lVc= Received: by mail-io1-f80.google.com with SMTP id ca18e2360f4ac-87326a81ceaso432062439f.1 for ; Tue, 08 Jul 2025 04:20:21 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1751973620; x=1752578420; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=V4jwJDk9+fb1D744gtKwKpYIN3SPWzXzCEtc01LObtA=; b=XZmkuYkv19CEII6gY6LNWRL2Ri4Qpv5gA5Yg7j4103CF6oWsbB6POm2/in/fwigjuf 9zshU7I2I/dxjq4a0/thUBI1vKdenShM72h3yFTeMihXMR/gohCvQgrAlwNpov8XWDE9 N7yIgJ/fyBjsLSnml69lZZT7LVL4fKYZZZR3APbXXQRYN6wWSEnipk/6CB8gzVErNywM Bsdk1FXitkEyUA/f1V40yXpVWfgfAq5OXxJjEgp2mE/rQClNTMmlL86lkHFUMZdcdWtk TpclfI1eaE4Q9mMPHsf6QMpJ9oFDNC451Dv5NBYVPuNbcDJH89P+9CE+FGE5NTrBgOvm RrZA== X-Forwarded-Encrypted: i=1; AJvYcCX2/GBg7Pxa5D0LWT/6iBMsH6eMyip0JqZSp8x3wOdnPU1l9sLOdKJbrTqWVQDDrcoLXjDTZ0eP+A==@kvack.org X-Gm-Message-State: AOJu0YwxQqyLowJXHeb/kDW7heODn5X8yCNxpfEurubeQDvdfY1E9mNz k8aCbcJfthT25uOuZAYrt/qaiI7XIrJWC+zRTEBMNgQaYYvafzfZdElGJ2kW2E86b9qriYi5GfL 5/RojCmI1lRIqeC48HG0wzvzapem8v9yJnrDY3VmS0bAgNsN5gQEtgikgzYU= X-Google-Smtp-Source: AGHT+IE3+Xbx6kumHcQzi57OseAc+hdd9dAh9xuTI9FtJbn4l/F9tZQTK095s+JOstboMvmqqJ5oOcf2/zWt9IDBdG74/N+djjdC MIME-Version: 1.0 X-Received: by 2002:a05:6e02:4516:20b0:3dc:7b3d:6a45 with SMTP id e9e14a558f8ab-3e154ed0b14mr15131155ab.0.1751973620423; Tue, 08 Jul 2025 04:20:20 -0700 (PDT) Date: Tue, 08 Jul 2025 04:20:20 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <686cfef4.050a0220.1ffab7.0005.GAE@google.com> Subject: [syzbot] [gfs2] KASAN: slab-use-after-free Read in move_to_new_folio (4) From: syzbot To: akpm@linux-foundation.org, apopple@nvidia.com, byungchul@sk.com, david@redhat.com, gfs2@lists.linux.dev, gourry@gourry.net, joshua.hahnjy@gmail.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, matthew.brost@intel.com, rakie.kim@sk.com, syzkaller-bugs@googlegroups.com, ying.huang@linux.alibaba.com, ziy@nvidia.com Content-Type: text/plain; charset="UTF-8" X-Stat-Signature: 83c16cc5k49daahded1xy5kmsoh5nu1x X-Rspamd-Queue-Id: 7A2BE40005 X-Rspamd-Server: rspam11 X-Rspam-User: X-HE-Tag: 1751973621-927229 X-HE-Meta: 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 TfYmYRpY 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hello, syzbot found the following issue on: HEAD commit: d7b8f8e20813 Linux 6.16-rc5 git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=15daabd4580000 kernel config: https://syzkaller.appspot.com/x/.config?x=f6cfc97245100778 dashboard link: https://syzkaller.appspot.com/bug?extid=9f0d09a59e1e92ee7b43 compiler: Debian clang version 20.1.7 (++20250616065708+6146a88f6049-1~exp1~20250616065826.132), Debian LLD 20.1.7 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=156df28c580000 Downloadable assets: disk image (non-bootable): https://storage.googleapis.com/syzbot-assets/d900f083ada3/non_bootable_disk-d7b8f8e2.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/88e0e9607487/vmlinux-d7b8f8e2.xz kernel image: https://storage.googleapis.com/syzbot-assets/c0e31868d902/bzImage-d7b8f8e2.xz mounted in repro: https://storage.googleapis.com/syzbot-assets/c8cd0473f7ee/mount_7.gz fsck result: failed (log: https://syzkaller.appspot.com/x/fsck.log?x=111d4a8c580000) IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+9f0d09a59e1e92ee7b43@syzkaller.appspotmail.com ================================================================== BUG: KASAN: slab-use-after-free in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: slab-use-after-free in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: slab-use-after-free in mapping_inaccessible include/linux/pagemap.h:336 [inline] BUG: KASAN: slab-use-after-free in move_to_new_folio+0x182/0x7a0 mm/migrate.c:983 Read of size 8 at addr ffff8880429ac910 by task kcompactd1/30 CPU: 0 UID: 0 PID: 30 Comm: kcompactd1 Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xd2/0x2b0 mm/kasan/report.c:521 kasan_report+0x118/0x150 mm/kasan/report.c:634 check_region_inline mm/kasan/generic.c:-1 [inline] kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] mapping_inaccessible include/linux/pagemap.h:336 [inline] move_to_new_folio+0x182/0x7a0 mm/migrate.c:983 migrate_folio_move mm/migrate.c:1301 [inline] migrate_folios_move mm/migrate.c:1653 [inline] migrate_pages_batch+0x1c34/0x2830 mm/migrate.c:1900 migrate_pages_sync mm/migrate.c:1930 [inline] migrate_pages+0x1bcc/0x2930 mm/migrate.c:2039 compact_zone+0x23f4/0x4ad0 mm/compaction.c:2683 compact_node+0x1d2/0x280 mm/compaction.c:2952 kcompactd+0xbc8/0x1290 mm/compaction.c:3250 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Allocated by task 5644: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4148 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4204 gfs2_glock_get+0x263/0xec0 fs/gfs2/glock.c:1183 gfs2_inode_lookup+0x215/0xb10 fs/gfs2/inode.c:135 gfs2_dir_search+0x168/0x220 fs/gfs2/dir.c:1667 gfs2_lookupi+0x3d9/0x5a0 fs/gfs2/inode.c:340 gfs2_jindex_hold fs/gfs2/ops_fstype.c:574 [inline] init_journal+0x54a/0x2260 fs/gfs2/ops_fstype.c:716 init_inodes+0xdb/0x320 fs/gfs2/ops_fstype.c:851 gfs2_fill_super+0x1939/0x20e0 fs/gfs2/ops_fstype.c:1253 get_tree_bdev_flags+0x40b/0x4d0 fs/super.c:1681 gfs2_get_tree+0x51/0x1e0 fs/gfs2/ops_fstype.c:1335 vfs_get_tree+0x92/0x2b0 fs/super.c:1804 do_new_mount+0x24a/0xa40 fs/namespace.c:3902 do_mount fs/namespace.c:4239 [inline] __do_sys_mount fs/namespace.c:4450 [inline] __se_sys_mount+0x317/0x410 fs/namespace.c:4427 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 15: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2381 [inline] slab_free mm/slub.c:4643 [inline] kmem_cache_free+0x18f/0x400 mm/slub.c:4745 rcu_do_batch kernel/rcu/tree.c:2576 [inline] rcu_core+0xca8/0x1710 kernel/rcu/tree.c:2832 handle_softirqs+0x286/0x870 kernel/softirq.c:579 run_ksoftirqd+0x9b/0x100 kernel/softirq.c:968 smpboot_thread_fn+0x53f/0xa60 kernel/smpboot.c:164 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Last potentially related work creation: kasan_save_stack+0x3e/0x60 mm/kasan/common.c:47 kasan_record_aux_stack+0xbd/0xd0 mm/kasan/generic.c:548 __call_rcu_common kernel/rcu/tree.c:3094 [inline] call_rcu+0x157/0x9c0 kernel/rcu/tree.c:3214 __gfs2_glock_free+0xb44/0xc90 fs/gfs2/glock.c:172 gfs2_glock_free+0x3c/0xa0 fs/gfs2/glock.c:178 gfs2_glock_put_eventually fs/gfs2/super.c:1185 [inline] gfs2_evict_inode+0xae7/0x1000 fs/gfs2/super.c:1460 evict+0x501/0x9c0 fs/inode.c:810 gfs2_jindex_free+0x39c/0x440 fs/gfs2/super.c:79 init_journal+0x8f1/0x2260 fs/gfs2/ops_fstype.c:833 init_inodes+0xdb/0x320 fs/gfs2/ops_fstype.c:851 gfs2_fill_super+0x1939/0x20e0 fs/gfs2/ops_fstype.c:1253 get_tree_bdev_flags+0x40b/0x4d0 fs/super.c:1681 gfs2_get_tree+0x51/0x1e0 fs/gfs2/ops_fstype.c:1335 vfs_get_tree+0x92/0x2b0 fs/super.c:1804 do_new_mount+0x24a/0xa40 fs/namespace.c:3902 do_mount fs/namespace.c:4239 [inline] __do_sys_mount fs/namespace.c:4450 [inline] __se_sys_mount+0x317/0x410 fs/namespace.c:4427 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Second to last potentially related work creation: kasan_save_stack+0x3e/0x60 mm/kasan/common.c:47 kasan_record_aux_stack+0xbd/0xd0 mm/kasan/generic.c:548 insert_work+0x3d/0x330 kernel/workqueue.c:2183 __queue_work+0xcfc/0xfe0 kernel/workqueue.c:2341 queue_delayed_work_on+0x18b/0x280 kernel/workqueue.c:2561 queue_delayed_work include/linux/workqueue.h:677 [inline] gfs2_glock_queue_work fs/gfs2/glock.c:250 [inline] do_xmote+0xce0/0x1220 fs/gfs2/glock.c:839 glock_work_func+0x2a8/0x580 fs/gfs2/glock.c:1096 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 The buggy address belongs to the object at ffff8880429ac548 which belongs to the cache gfs2_glock(aspace) of size 1224 The buggy address is located 968 bytes inside of freed 1224-byte region [ffff8880429ac548, ffff8880429aca10) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff8880429acfd8 pfn:0x429ac head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0x4fff00000000040(head|node=1|zone=1|lastcpupid=0x7ff) page_type: f5(slab) raw: 04fff00000000040 ffff8880327f2640 ffffea000110bf00 0000000000000002 raw: ffff8880429acfd8 00000000000c0008 00000000f5000000 0000000000000000 head: 04fff00000000040 ffff8880327f2640 ffffea000110bf00 0000000000000002 head: ffff8880429acfd8 00000000000c0008 00000000f5000000 0000000000000000 head: 04fff00000000002 ffffea00010a6b01 00000000ffffffff 00000000ffffffff head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5547, tgid 5547 (syz.0.16), ts 128645082054, free_ts 128606732548 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1704 prep_new_page mm/page_alloc.c:1712 [inline] get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3669 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:4959 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2419 alloc_slab_page mm/slub.c:2451 [inline] allocate_slab+0x8a/0x3b0 mm/slub.c:2619 new_slab mm/slub.c:2673 [inline] ___slab_alloc+0xbfc/0x1480 mm/slub.c:3859 __slab_alloc mm/slub.c:3949 [inline] __slab_alloc_node mm/slub.c:4024 [inline] slab_alloc_node mm/slub.c:4185 [inline] kmem_cache_alloc_noprof+0x283/0x3c0 mm/slub.c:4204 gfs2_glock_get+0x263/0xec0 fs/gfs2/glock.c:1183 gfs2_inode_lookup+0x215/0xb10 fs/gfs2/inode.c:135 gfs2_lookup_root fs/gfs2/ops_fstype.c:425 [inline] init_sb+0xa30/0x12c0 fs/gfs2/ops_fstype.c:494 gfs2_fill_super+0x1605/0x20e0 fs/gfs2/ops_fstype.c:1220 get_tree_bdev_flags+0x40b/0x4d0 fs/super.c:1681 gfs2_get_tree+0x51/0x1e0 fs/gfs2/ops_fstype.c:1335 vfs_get_tree+0x92/0x2b0 fs/super.c:1804 do_new_mount+0x24a/0xa40 fs/namespace.c:3902 do_mount fs/namespace.c:4239 [inline] __do_sys_mount fs/namespace.c:4450 [inline] __se_sys_mount+0x317/0x410 fs/namespace.c:4427 page last free pid 5547 tgid 5547 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1248 [inline] __free_frozen_pages+0xc71/0xe70 mm/page_alloc.c:2706 stack_depot_save_flags+0x445/0x900 lib/stackdepot.c:678 kasan_save_stack mm/kasan/common.c:48 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4148 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4204 __kernfs_new_node+0xd7/0x7e0 fs/kernfs/dir.c:637 kernfs_new_node+0x102/0x210 fs/kernfs/dir.c:713 kernfs_create_dir_ns+0x44/0x130 fs/kernfs/dir.c:1083 sysfs_create_dir_ns+0x123/0x280 fs/sysfs/dir.c:59 create_dir lib/kobject.c:73 [inline] kobject_add_internal+0x59f/0xb40 lib/kobject.c:240 kobject_add_varg lib/kobject.c:374 [inline] kobject_init_and_add+0x125/0x190 lib/kobject.c:457 gfs2_sys_fs_add+0x234/0x450 fs/gfs2/sys.c:737 gfs2_fill_super+0x13d6/0x20e0 fs/gfs2/ops_fstype.c:1206 get_tree_bdev_flags+0x40b/0x4d0 fs/super.c:1681 gfs2_get_tree+0x51/0x1e0 fs/gfs2/ops_fstype.c:1335 vfs_get_tree+0x92/0x2b0 fs/super.c:1804 Memory state around the buggy address: ffff8880429ac800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8880429ac880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff8880429ac900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8880429ac980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8880429aca00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. If the report is already addressed, let syzbot know by replying with: #syz fix: exact-commit-title If you want syzbot to run the reproducer, reply with: #syz test: git://repo/address.git branch-or-commit-hash If you attach or paste a git patch, syzbot will apply it before testing. If you want to overwrite report's subsystems, reply with: #syz set subsystems: new-subsystem (See the list of subsystem names on the web dashboard) If the report is a duplicate of another one, reply with: #syz dup: exact-subject-of-another-report If you want to undo deduplication, reply with: #syz undup