syzbot


KASAN: user-memory-access Write in __destroy_inode

Status: upstream: reported C repro on 2023/06/03 22:53
Bug presence: origin:upstream
[Documentation on labels]
Reported-by: syzbot+4b3efe8571247bba411d@syzkaller.appspotmail.com
First crash: 328d, last: 9h04m
Bug presence (2)
Date Name Commit Repro Result
2023/06/04 upstream (ToT) 5e89d62ec101 C [report] KASAN: user-memory-access Write in __destroy_inode
2024/04/17 upstream (ToT) 96fca68c4fbf C Failed due to an error; will retry later
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 KASAN: user-memory-access Write in __destroy_inode origin:upstream C 5 2d03h 334d 0/3 upstream: reported C repro on 2023/05/28 20:49
upstream KASAN: user-memory-access Write in __destroy_inode jfs C error 304 1h03m 359d 0/26 upstream: reported C repro on 2023/05/04 09:32
Fix bisection attempts (8)
Created Duration User Patch Repo Result
2024/04/11 07:47 2h04m bisect fix linux-6.1.y job log (0) log
2024/03/10 03:26 1h08m bisect fix linux-6.1.y job log (0) log
2024/01/31 18:10 1h14m bisect fix linux-6.1.y job log (0) log
2023/12/28 18:44 1h06m bisect fix linux-6.1.y job log (0) log
2023/11/26 17:46 1h07m bisect fix linux-6.1.y job log (0) log
2023/10/25 18:55 1h20m bisect fix linux-6.1.y job log (0) log
2023/09/20 03:34 1h05m bisect fix linux-6.1.y job log (0) log
2023/07/07 22:37 2h27m bisect fix linux-6.1.y job log (0) log

Sample crash report:
ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 5
ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 6
ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 7
==================================================================
BUG: KASAN: user-memory-access in instrument_atomic_read_write include/linux/instrumented.h:102 [inline]
BUG: KASAN: user-memory-access in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]
BUG: KASAN: user-memory-access in __refcount_sub_and_test include/linux/refcount.h:272 [inline]
BUG: KASAN: user-memory-access in __refcount_dec_and_test include/linux/refcount.h:315 [inline]
BUG: KASAN: user-memory-access in refcount_dec_and_test include/linux/refcount.h:333 [inline]
BUG: KASAN: user-memory-access in posix_acl_release include/linux/posix_acl.h:57 [inline]
BUG: KASAN: user-memory-access in __destroy_inode+0x427/0x5e0 fs/inode.c:296
Write of size 4 at addr 0000000b00000000 by task syz-executor251/3542

CPU: 1 PID: 3542 Comm: syz-executor251 Not tainted 6.1.31-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
 print_report+0xe6/0x4f0 mm/kasan/report.c:398
 kasan_report+0x136/0x160 mm/kasan/report.c:495
 kasan_check_range+0x27f/0x290 mm/kasan/generic.c:189
 instrument_atomic_read_write include/linux/instrumented.h:102 [inline]
 atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]
 __refcount_sub_and_test include/linux/refcount.h:272 [inline]
 __refcount_dec_and_test include/linux/refcount.h:315 [inline]
 refcount_dec_and_test include/linux/refcount.h:333 [inline]
 posix_acl_release include/linux/posix_acl.h:57 [inline]
 __destroy_inode+0x427/0x5e0 fs/inode.c:296
 destroy_inode fs/inode.c:307 [inline]
 evict+0x51b/0x620 fs/inode.c:679
 dispose_list fs/inode.c:697 [inline]
 evict_inodes+0x601/0x6a0 fs/inode.c:747
 generic_shutdown_super+0x94/0x340 fs/super.c:480
 kill_block_super+0x7a/0xe0 fs/super.c:1450
 deactivate_locked_super+0xa0/0x110 fs/super.c:332
 cleanup_mnt+0x490/0x520 fs/namespace.c:1186
 task_work_run+0x246/0x300 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0x6fb/0x2300 kernel/exit.c:869
 do_group_exit+0x202/0x2b0 kernel/exit.c:1019
 __do_sys_exit_group kernel/exit.c:1030 [inline]
 __se_sys_exit_group kernel/exit.c:1028 [inline]
 __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1028
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7faac0b51a59
Code: Unable to access opcode bytes at 0x7faac0b51a2f.
RSP: 002b:00007ffe5d0c5a98 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007faac0bcc330 RCX: 00007faac0b51a59
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007faac0bc6e40
R10: 00007faac0bc6e40 R11: 0000000000000246 R12: 00007faac0bcc330
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
 </TASK>
==================================================================

Crashes (7):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/06/03 22:53 linux-6.1.y d2869ace6eeb a4ae4f42 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/04/14 04:14 linux-6.1.y cd5d98c0556c c8349e48 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan KASAN: user-memory-access Write in __destroy_inode
2024/04/27 01:38 linux-6.1.y 6741e066ec76 059e9963 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/04/27 01:36 linux-6.1.y 6741e066ec76 059e9963 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/04/27 01:33 linux-6.1.y 6741e066ec76 059e9963 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/04/27 01:31 linux-6.1.y 6741e066ec76 059e9963 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/04/25 12:14 linux-6.1.y 6741e066ec76 8bdc0f22 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
* Struck through repros no longer work on HEAD.