syzbot


KASAN: user-memory-access Write in __destroy_inode

Status: upstream: reported C repro on 2023/05/28 20:49
Bug presence: origin:upstream
[Documentation on labels]
Reported-by: syzbot+8cc84e9be19865da71db@syzkaller.appspotmail.com
First crash: 1043d, last: 35d
Fix bisection: failed (error log, bisect log)
  
Bug presence (1)
Date Name Commit Repro Result
2023/05/28 upstream (ToT) 7877cb91f108 C [report] KASAN: user-memory-access Write in __destroy_inode
Similar bugs (2)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KASAN: user-memory-access Write in __destroy_inode jfs 21 C error done 3472 119d 1068d 0/29 auto-obsoleted due to no activity on 2026/03/04 16:01
linux-6.1 KASAN: user-memory-access Write in __destroy_inode origin:upstream missing-backport 21 C error 356 77d 1037d 0/3 upstream: reported C repro on 2023/06/03 22:53
Last patch testing requests (10)
Created Duration User Patch Repo Result
2026/03/15 21:29 10m retest repro linux-5.15.y error
2026/03/15 21:29 10m retest repro linux-5.15.y error
2026/03/15 21:29 17m retest repro linux-5.15.y error
2026/02/23 03:58 9m retest repro linux-5.15.y report log
2026/02/09 00:59 19m retest repro linux-5.15.y report log
2026/02/09 00:59 11m retest repro linux-5.15.y report log
2025/12/16 04:19 9m retest repro linux-5.15.y report log
2025/12/16 04:19 9m retest repro linux-5.15.y report log
2025/11/30 17:24 10m retest repro linux-5.15.y report log
2025/11/30 17:24 10m retest repro linux-5.15.y report log
Fix bisection attempts (9)
Created Duration User Patch Repo Result
2024/05/27 20:14 0m bisect fix linux-5.15.y error job log
2024/03/27 04:10 1h44m bisect fix linux-5.15.y OK (0) job log log
2024/02/25 18:37 55m bisect fix linux-5.15.y OK (0) job log log
2024/01/17 16:21 1h26m bisect fix linux-5.15.y OK (0) job log log
2023/12/17 19:49 2h03m bisect fix linux-5.15.y OK (0) job log log
2023/11/17 12:39 2h28m bisect fix linux-5.15.y OK (0) job log log
2023/10/17 05:09 1h43m bisect fix linux-5.15.y OK (0) job log log
2023/09/12 20:14 1h47m bisect fix linux-5.15.y OK (0) job log log
2023/06/29 00:30 1h09m bisect fix linux-5.15.y OK (0) job log log

Sample crash report:
==================================================================
BUG: KASAN: user-memory-access in instrument_atomic_read_write include/linux/instrumented.h:101 [inline]
BUG: KASAN: user-memory-access in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:167 [inline]
BUG: KASAN: user-memory-access in __refcount_sub_and_test include/linux/refcount.h:272 [inline]
BUG: KASAN: user-memory-access in __refcount_dec_and_test include/linux/refcount.h:315 [inline]
BUG: KASAN: user-memory-access in refcount_dec_and_test include/linux/refcount.h:333 [inline]
BUG: KASAN: user-memory-access in posix_acl_release include/linux/posix_acl.h:57 [inline]
BUG: KASAN: user-memory-access in __destroy_inode+0x43c/0x5f0 fs/inode.c:298
Write of size 4 at addr 0000000b00000000 by task syz-executor/4341

CPU: 1 PID: 4341 Comm: syz-executor Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
 <TASK>
 dump_stack_lvl+0x188/0x250 lib/dump_stack.c:106
 __kasan_report mm/kasan/report.c:438 [inline]
 kasan_report+0xd5/0x130 mm/kasan/report.c:451
 check_region_inline mm/kasan/generic.c:-1 [inline]
 kasan_check_range+0x235/0x290 mm/kasan/generic.c:189
 instrument_atomic_read_write include/linux/instrumented.h:101 [inline]
 atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:167 [inline]
 __refcount_sub_and_test include/linux/refcount.h:272 [inline]
 __refcount_dec_and_test include/linux/refcount.h:315 [inline]
 refcount_dec_and_test include/linux/refcount.h:333 [inline]
 posix_acl_release include/linux/posix_acl.h:57 [inline]
 __destroy_inode+0x43c/0x5f0 fs/inode.c:298
 destroy_inode fs/inode.c:309 [inline]
 evict+0x78d/0x8d0 fs/inode.c:662
 dispose_list fs/inode.c:680 [inline]
 evict_inodes+0x60c/0x6a0 fs/inode.c:734
 generic_shutdown_super+0x93/0x300 fs/super.c:454
 kill_block_super+0x7c/0xe0 fs/super.c:1427
 deactivate_locked_super+0x93/0xf0 fs/super.c:335
 cleanup_mnt+0x42d/0x4e0 fs/namespace.c:1148
 task_work_run+0x125/0x1a0 kernel/task_work.c:188
 exit_task_work include/linux/task_work.h:33 [inline]
 do_exit+0x626/0x20c0 kernel/exit.c:883
 do_group_exit+0x12e/0x300 kernel/exit.c:997
 get_signal+0x6ca/0x12c0 kernel/signal.c:2900
 arch_do_signal_or_restart+0xe7/0x12c0 arch/x86/kernel/signal.c:867
 handle_signal_work kernel/entry/common.c:154 [inline]
 exit_to_user_mode_loop+0x9e/0x130 kernel/entry/common.c:178
 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:214
 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
 syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:307
 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f06f7698abc
Code: Unable to access opcode bytes at RIP 0x7f06f7698a92.
RSP: 002b:00007ffef1c1ddc0 EFLAGS: 00000206 ORIG_RAX: 0000000000000101
RAX: 0000000000000003 RBX: 00007f06f772ef90 RCX: 00007f06f7698abc
RDX: 0000000000090800 RSI: 00007ffef1c1ef70 RDI: 00000000ffffff9c
RBP: 00007ffef1c1ef5c R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 00007ffef1c1ef70
R13: 00007f06f772ef90 R14: 0000000000012fce R15: 00007ffef1c1efb0
 </TASK>
==================================================================

Crashes (254):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/03/01 21:15 linux-5.15.y 3330a8d33e08 43249bac .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/10/28 15:31 linux-5.15.y ac56c046adf4 fd2207e7 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/12 17:52 linux-5.15.y 3a5928702e71 084d8178 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2023/05/28 20:49 linux-5.15.y 1fe619a7d252 cf184559 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/04/10 10:35 linux-5.15.y 0c935c049b5c 988b336c .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/04/21 06:11 linux-5.15.y c52b9710c83d af24b050 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2026/01/18 03:44 linux-5.15.y 68efe5a6c16a 20d37d28 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/16 11:33 linux-5.15.y cc5ec8769306 f7988ea4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/15 19:34 linux-5.15.y cc5ec8769306 f7988ea4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/15 15:23 linux-5.15.y cc5ec8769306 f7988ea4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/14 18:40 linux-5.15.y cc5ec8769306 f7988ea4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/14 16:11 linux-5.15.y cc5ec8769306 f7988ea4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/12 18:25 linux-5.15.y cc5ec8769306 07e030de .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/12 18:19 linux-5.15.y cc5ec8769306 07e030de .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/12 06:35 linux-5.15.y cc5ec8769306 4e1406b4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/11 05:42 linux-5.15.y cc5ec8769306 4e1406b4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/11 05:25 linux-5.15.y cc5ec8769306 4e1406b4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/11 05:14 linux-5.15.y cc5ec8769306 4e1406b4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/11/04 03:49 linux-5.15.y cc5ec8769306 686bf657 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/10/28 13:24 linux-5.15.y ac56c046adf4 fd2207e7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/10/25 14:08 linux-5.15.y ac56c046adf4 c0460fcd .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/10/13 04:00 linux-5.15.y 29e53a5b1c4f ff1712fe .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/07/22 06:48 linux-5.15.y c79648372d02 1555463b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/06/14 06:35 linux-5.15.y 1c700860e8bc 0e8da31f .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/06/04 03:51 linux-5.15.y 98f47d0e9b8c a30356b7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/12/29 17:15 linux-5.15.y 91786f140358 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/12/28 13:28 linux-5.15.y 91786f140358 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/11/05 17:36 linux-5.15.y 72244eab0dad da38b4c9 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/11/04 22:49 linux-5.15.y 72244eab0dad 509da429 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/11/03 18:12 linux-5.15.y 72244eab0dad f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/11/01 21:51 linux-5.15.y 72244eab0dad f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/11/01 10:24 linux-5.15.y 72244eab0dad 96eb609f .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/11/01 06:55 linux-5.15.y 72244eab0dad 96eb609f .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/11/01 06:53 linux-5.15.y 72244eab0dad 96eb609f .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/31 06:03 linux-5.15.y 74cdd62cb470 96eb609f .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/30 18:14 linux-5.15.y 74cdd62cb470 fb888278 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/29 19:51 linux-5.15.y 74cdd62cb470 66aeb999 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/29 09:37 linux-5.15.y 74cdd62cb470 66aeb999 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/29 00:49 linux-5.15.y 74cdd62cb470 9efb3cc7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/29 00:46 linux-5.15.y 74cdd62cb470 9efb3cc7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/28 20:28 linux-5.15.y 74cdd62cb470 9efb3cc7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/28 11:57 linux-5.15.y 74cdd62cb470 65e8686b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2024/10/28 10:08 linux-5.15.y 74cdd62cb470 65e8686b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan KASAN: user-memory-access Write in __destroy_inode
2025/07/31 04:05 linux-5.15.y c79648372d02 f8f2b4da .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/07/31 01:50 linux-5.15.y c79648372d02 f8f2b4da .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/07/19 21:17 linux-5.15.y c79648372d02 7117feec .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/20 02:07 linux-5.15.y a68c15152131 b84f0537 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/16 20:56 linux-5.15.y 3b8db0e4f263 cfde8269 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/04/21 05:02 linux-5.15.y f7347f400572 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/01/19 06:04 linux-5.15.y 4735586da88e f2cb035c .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/11/11 01:54 linux-5.15.y 3c17fc483905 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/11/07 04:46 linux-5.15.y 72244eab0dad df3dc63b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/11/07 04:45 linux-5.15.y 72244eab0dad df3dc63b .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/11/03 22:26 linux-5.15.y 72244eab0dad f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/11/03 14:49 linux-5.15.y 72244eab0dad f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 KASAN: user-memory-access Write in __destroy_inode
* Struck through repros no longer work on HEAD.