syzbot


KASAN: user-memory-access Write in __destroy_inode

Status: upstream: reported C repro on 2023/06/03 22:53
Bug presence: origin:upstream
[Documentation on labels]
Reported-by: syzbot+4b3efe8571247bba411d@syzkaller.appspotmail.com
First crash: 550d, last: 39d
Bug presence (1)
Date Name Commit Repro Result
2023/06/04 upstream (ToT) 5e89d62ec101 C [report] KASAN: user-memory-access Write in __destroy_inode
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 KASAN: user-memory-access Write in __destroy_inode origin:upstream C error 163 10d 556d 0/3 upstream: reported C repro on 2023/05/28 20:49
upstream KASAN: user-memory-access Write in __destroy_inode jfs C error 2565 1d17h 581d 0/28 upstream: reported C repro on 2023/05/04 09:32
Fix bisection attempts (9)
Created Duration User Patch Repo Result
2024/09/13 08:49 1h46m bisect fix linux-6.1.y OK (0) job log log
2024/04/11 07:47 2h04m bisect fix linux-6.1.y OK (0) job log log
2024/03/10 03:26 1h08m bisect fix linux-6.1.y OK (0) job log log
2024/01/31 18:10 1h14m bisect fix linux-6.1.y OK (0) job log log
2023/12/28 18:44 1h06m bisect fix linux-6.1.y OK (0) job log log
2023/11/26 17:46 1h07m bisect fix linux-6.1.y OK (0) job log log
2023/10/25 18:55 1h20m bisect fix linux-6.1.y OK (0) job log log
2023/09/20 03:34 1h05m bisect fix linux-6.1.y OK (0) job log log
2023/07/07 22:37 2h27m bisect fix linux-6.1.y OK (0) job log log

Sample crash report:
ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 5
ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 6
ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 7
==================================================================
BUG: KASAN: user-memory-access in instrument_atomic_read_write include/linux/instrumented.h:102 [inline]
BUG: KASAN: user-memory-access in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]
BUG: KASAN: user-memory-access in __refcount_sub_and_test include/linux/refcount.h:272 [inline]
BUG: KASAN: user-memory-access in __refcount_dec_and_test include/linux/refcount.h:315 [inline]
BUG: KASAN: user-memory-access in refcount_dec_and_test include/linux/refcount.h:333 [inline]
BUG: KASAN: user-memory-access in posix_acl_release include/linux/posix_acl.h:57 [inline]
BUG: KASAN: user-memory-access in __destroy_inode+0x427/0x5e0 fs/inode.c:296
Write of size 4 at addr 0000000b00000000 by task syz-executor251/3542

CPU: 1 PID: 3542 Comm: syz-executor251 Not tainted 6.1.31-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
 print_report+0xe6/0x4f0 mm/kasan/report.c:398
 kasan_report+0x136/0x160 mm/kasan/report.c:495
 kasan_check_range+0x27f/0x290 mm/kasan/generic.c:189
 instrument_atomic_read_write include/linux/instrumented.h:102 [inline]
 atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]
 __refcount_sub_and_test include/linux/refcount.h:272 [inline]
 __refcount_dec_and_test include/linux/refcount.h:315 [inline]
 refcount_dec_and_test include/linux/refcount.h:333 [inline]
 posix_acl_release include/linux/posix_acl.h:57 [inline]
 __destroy_inode+0x427/0x5e0 fs/inode.c:296
 destroy_inode fs/inode.c:307 [inline]
 evict+0x51b/0x620 fs/inode.c:679
 dispose_list fs/inode.c:697 [inline]
 evict_inodes+0x601/0x6a0 fs/inode.c:747
 generic_shutdown_super+0x94/0x340 fs/super.c:480
 kill_block_super+0x7a/0xe0 fs/super.c:1450
 deactivate_locked_super+0xa0/0x110 fs/super.c:332
 cleanup_mnt+0x490/0x520 fs/namespace.c:1186
 task_work_run+0x246/0x300 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0x6fb/0x2300 kernel/exit.c:869
 do_group_exit+0x202/0x2b0 kernel/exit.c:1019
 __do_sys_exit_group kernel/exit.c:1030 [inline]
 __se_sys_exit_group kernel/exit.c:1028 [inline]
 __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1028
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7faac0b51a59
Code: Unable to access opcode bytes at 0x7faac0b51a2f.
RSP: 002b:00007ffe5d0c5a98 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007faac0bcc330 RCX: 00007faac0b51a59
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007faac0bc6e40
R10: 00007faac0bc6e40 R11: 0000000000000246 R12: 00007faac0bcc330
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
 </TASK>
==================================================================

Crashes (259):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/06/03 22:53 linux-6.1.y d2869ace6eeb a4ae4f42 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/26 21:24 linux-6.1.y 7ec6f9fa3d97 65e8686b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/26 08:05 linux-6.1.y 7ec6f9fa3d97 65e8686b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/25 18:16 linux-6.1.y 7ec6f9fa3d97 045e728d .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/25 05:07 linux-6.1.y 7ec6f9fa3d97 c79b8ca5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/25 05:02 linux-6.1.y 7ec6f9fa3d97 c79b8ca5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/24 18:31 linux-6.1.y 7ec6f9fa3d97 0d144d1a .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/23 07:30 linux-6.1.y 7ec6f9fa3d97 15fa2979 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/22 19:36 linux-6.1.y 7ec6f9fa3d97 a93682b3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/22 08:34 linux-6.1.y 54d90d17e8ce a93682b3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/22 08:28 linux-6.1.y 54d90d17e8ce a93682b3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/21 17:19 linux-6.1.y 54d90d17e8ce f1e4447c .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/19 01:12 linux-6.1.y 54d90d17e8ce cd6fc0a3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/17 19:50 linux-6.1.y 54d90d17e8ce 666f77ed .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/16 22:20 linux-6.1.y aa4cd140bba5 666f77ed .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/16 22:14 linux-6.1.y aa4cd140bba5 666f77ed .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/16 08:22 linux-6.1.y aa4cd140bba5 bde2d81c .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/15 13:58 linux-6.1.y aa4cd140bba5 7eb57b4a .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/15 08:14 linux-6.1.y aa4cd140bba5 b01b6661 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/15 01:50 linux-6.1.y aa4cd140bba5 b01b6661 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/15 01:41 linux-6.1.y aa4cd140bba5 b01b6661 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/12 10:00 linux-6.1.y aa4cd140bba5 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/12 09:42 linux-6.1.y aa4cd140bba5 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/12 09:38 linux-6.1.y aa4cd140bba5 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/08/11 15:16 linux-6.1.y 36790ef5e00b 6f4edef4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/10 08:23 linux-6.1.y 48d525b0e463 6f4edef4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/09 18:57 linux-6.1.y 48d525b0e463 a83d9288 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/08 18:55 linux-6.1.y 48d525b0e463 61405512 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/08 06:54 linux-6.1.y 48d525b0e463 de12cf65 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/08 06:54 linux-6.1.y 48d525b0e463 de12cf65 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/07 19:44 linux-6.1.y 48d525b0e463 109d2082 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/06 23:00 linux-6.1.y 48d525b0e463 1ef9fe42 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/06 01:31 linux-6.1.y 48d525b0e463 e1bdb00a .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/05 11:56 linux-6.1.y 48d525b0e463 e35c337f .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/03 08:33 linux-6.1.y 48d525b0e463 1786a2a8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/03 08:31 linux-6.1.y 48d525b0e463 1786a2a8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/02 05:05 linux-6.1.y c1cec4dad96b 1e9c4cf3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/08/01 02:42 linux-6.1.y c1cec4dad96b 1e9c4cf3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/30 23:52 linux-6.1.y c1cec4dad96b 6fde257d .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/29 11:41 linux-6.1.y c1cec4dad96b 5187fc86 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/27 10:26 linux-6.1.y c1cec4dad96b 46eb10b7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/26 15:58 linux-6.1.y c18e82d3ee44 46eb10b7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/26 05:38 linux-6.1.y c18e82d3ee44 3f86dfed .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/25 13:01 linux-6.1.y c18e82d3ee44 466a14e5 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/24 22:33 linux-6.1.y 9b3f9a5b12dc d1a1b0ca .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/24 22:32 linux-6.1.y 9b3f9a5b12dc d1a1b0ca .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/07/24 06:45 linux-6.1.y 9b3f9a5b12dc 57b2edb1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
* Struck through repros no longer work on HEAD.