syzbot


BUG: corrupted list in list_lru_add

Status: upstream: reported syz repro on 2024/11/22 12:30
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+092ef2e75c24d23f33c4@syzkaller.appspotmail.com
First crash: 278d, last: 2d05h
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [bcachefs?] [mm?] BUG: corrupted list in list_lru_add 0 (1) 2024/11/22 12:30
Similar bugs (3)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-10 BUG: Dentry still in use in unmount -1 C done 1184 1277d 1290d 2/2 fixed on 2022/02/25 03:20
upstream BUG: unable to handle kernel paging request in list_lru_add mm 10 C done done 11367 406d 719d 27/29 fixed on 2024/08/28 10:02
upstream general protection fault in list_lru_add mm 8 C done 1125 960d 1249d 22/29 fixed on 2023/02/24 13:51
Last patch testing requests (3)
Created Duration User Patch Repo Result
2025/04/27 03:06 19m retest repro upstream OK log
2025/02/10 13:15 20m retest repro upstream report log
2024/12/02 12:28 13m retest repro upstream report log

Sample crash report:
 slab gfs2_quotad start ffff88804fec57e0 pointer offset 120 size 272
list_add corruption. prev->next should be next (ffff88814044f800), but was ffff88804fec5858. (prev=ffff88804fec5858).
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:32!
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 17171 Comm: syz.1.2418 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:__list_add_valid_or_report+0x12b/0x190 lib/list_debug.c:32
Code: 00 00 00 00 fc ff df 48 89 f2 48 c1 ea 03 80 3c 02 00 75 5a 48 8b 16 48 89 f1 48 c7 c7 80 31 16 8c 48 89 ee e8 c6 54 b1 fc 90 <0f> 0b 48 89 f2 48 89 e9 4c 89 e6 48 c7 c7 00 32 16 8c e8 ae 54 b1
RSP: 0018:ffffc9000b667380 EFLAGS: 00010286
RAX: 0000000000000075 RBX: ffff88804fec5858 RCX: ffffc90014717000
RDX: 0000000000000000 RSI: ffffffff819aca66 RDI: 0000000000000005
RBP: ffff88814044f800 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000002 R11: 6464615f7473696c R12: ffff88804fec5858
R13: ffff88814044f808 R14: ffff88814044f800 R15: ffff88814044f818
FS:  00007f70c95206c0(0000) GS:ffff8881246bd000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fd1ab82413a CR3: 00000000729c3000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 __list_add_valid include/linux/list.h:88 [inline]
 __list_add include/linux/list.h:150 [inline]
 list_add_tail include/linux/list.h:183 [inline]
 list_lru_add+0xf6/0x2e0 mm/list_lru.c:171
 list_lru_add_obj+0x1ad/0x320 mm/list_lru.c:193
 qd_put+0x119/0x190 fs/gfs2/quota.c:342
 qdsb_put fs/gfs2/quota.c:500 [inline]
 gfs2_quota_unhold+0x1be/0x370 fs/gfs2/quota.c:653
 punch_hole+0xc71/0x37d0 fs/gfs2/bmap.c:1978
 gfs2_iomap_end+0x422/0x780 fs/gfs2/bmap.c:1178
 iomap_iter+0x308/0xf20 fs/iomap/iter.c:79
 iomap_file_buffered_write+0x240/0xac0 fs/iomap/buffered-io.c:1065
 gfs2_file_buffered_write+0x405/0xad0 fs/gfs2/file.c:1061
 gfs2_file_write_iter+0x9d8/0x11a0 fs/gfs2/file.c:1166
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x7d3/0x11d0 fs/read_write.c:686
 ksys_write+0x12a/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f70c878ebe9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f70c9520038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f70c89b6090 RCX: 00007f70c878ebe9
RDX: 000000000208e24b RSI: 0000200000000040 RDI: 0000000000000007
RBP: 00007f70c8811e19 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f70c89b6128 R14: 00007f70c89b6090 R15: 00007ffea4cf3478
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__list_add_valid_or_report+0x12b/0x190 lib/list_debug.c:32
Code: 00 00 00 00 fc ff df 48 89 f2 48 c1 ea 03 80 3c 02 00 75 5a 48 8b 16 48 89 f1 48 c7 c7 80 31 16 8c 48 89 ee e8 c6 54 b1 fc 90 <0f> 0b 48 89 f2 48 89 e9 4c 89 e6 48 c7 c7 00 32 16 8c e8 ae 54 b1
RSP: 0018:ffffc9000b667380 EFLAGS: 00010286
RAX: 0000000000000075 RBX: ffff88804fec5858 RCX: ffffc90014717000
RDX: 0000000000000000 RSI: ffffffff819aca66 RDI: 0000000000000005
RBP: ffff88814044f800 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000002 R11: 6464615f7473696c R12: ffff88804fec5858
R13: ffff88814044f808 R14: ffff88814044f800 R15: ffff88814044f818
FS:  00007f70c95206c0(0000) GS:ffff8881246bd000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fd1ab82413a CR3: 00000000729c3000 CR4: 0000000000350ef0

Crashes (16):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/08/21 21:52 upstream 32b7144f806e 0b9605c8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: corrupted list in list_lru_add
2025/08/21 05:40 upstream 41cd3fd15263 0b9605c8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: corrupted list in list_lru_add
2025/05/09 20:17 upstream 9c69f8884904 bb813bcc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: corrupted list in list_lru_add
2025/05/04 18:07 upstream e8ab83e34bdc b0714e37 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: corrupted list in list_lru_add
2024/11/18 12:21 upstream adc218676eef e7bb5d6e .config console log report syz / log [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root BUG: corrupted list in list_lru_add
2025/07/27 15:56 upstream ec2df4364666 fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: slab-use-after-free Read in list_lru_add
2025/07/11 19:01 upstream bc9ff192a6c9 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: slab-use-after-free Read in list_lru_add
2025/07/11 18:49 upstream bc9ff192a6c9 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: slab-use-after-free Read in list_lru_add
2025/06/27 11:23 upstream e34a79b96ab9 803ce19b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root KASAN: slab-use-after-free Read in list_lru_add
2025/06/14 07:59 upstream 02adc1490e6d 0e8da31f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: slab-use-after-free Read in list_lru_add
2025/06/12 10:31 upstream 2c4a1f3fe03e 98683f8f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root KASAN: slab-use-after-free Read in list_lru_add
2025/06/06 21:04 upstream e271ed52b344 f61267d4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: slab-use-after-free Read in list_lru_add
2025/05/11 15:30 upstream 3ce9925823c7 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root KASAN: slab-use-after-free Read in list_lru_add
2025/05/09 08:50 upstream 9c69f8884904 bb813bcc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: slab-use-after-free Read in list_lru_add
2025/04/13 02:52 upstream ecd5d67ad602 0bd6db41 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: slab-use-after-free Read in list_lru_add
2025/07/06 01:10 linux-next 26ffb3d6f02c 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: slab-use-after-free Read in list_lru_add
* Struck through repros no longer work on HEAD.