syzbot


KASAN: user-memory-access Write in __destroy_inode

Status: upstream: reported C repro on 2023/05/04 09:32
Subsystems: jfs
[Documentation on labels]
Reported-by: syzbot+dcc068159182a4c31ca3@syzkaller.appspotmail.com
First crash: 819d, last: 5m
Cause bisection: failed (error log, bisect log)
  
Discussions (16)
Title Replies (including bot) Last reply
[syzbot] Monthly jfs report (Jun 2025) 0 (1) 2025/06/23 07:31
[syzbot] Monthly jfs report (May 2025) 0 (1) 2025/05/21 14:56
[syzbot] Monthly jfs report (Apr 2025) 0 (1) 2025/04/22 10:11
[syzbot] Monthly jfs report (Mar 2025) 0 (1) 2025/03/19 21:29
[syzbot] Monthly jfs report (Feb 2025) 0 (1) 2025/02/16 21:54
[syzbot] Monthly jfs report (Jan 2025) 0 (1) 2025/01/16 10:11
[syzbot] Monthly jfs report (Dec 2024) 0 (1) 2024/12/16 09:45
[syzbot] Monthly jfs report (Nov 2024) 0 (1) 2024/11/15 10:49
[syzbot] Monthly jfs report (Oct 2024) 0 (1) 2024/10/14 19:37
[syzbot] Monthly jfs report (Sep 2024) 0 (1) 2024/09/13 10:03
[syzbot] Monthly jfs report (Aug 2024) 0 (1) 2024/08/13 08:52
[syzbot] Monthly jfs report (Jul 2024) 0 (1) 2024/07/12 12:56
[syzbot] Monthly jfs report (Jun 2024) 0 (1) 2024/06/11 08:27
[syzbot] Monthly jfs report (Mar 2024) 0 (1) 2024/03/06 22:08
[syzbot] Monthly jfs report (Feb 2024) 0 (1) 2024/02/04 13:30
[syzbot] [jfs?] KASAN: user-memory-access Write in __destroy_inode 0 (1) 2023/05/04 09:32
Similar bugs (2)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 KASAN: user-memory-access Write in __destroy_inode origin:upstream 23 C error 176 31d 778d 0/3 upstream: reported C repro on 2023/05/28 20:49
linux-6.1 KASAN: user-memory-access Write in __destroy_inode origin:upstream 23 C error 261 102d 772d 0/3 upstream: reported C repro on 2023/06/03 22:53
Last patch testing requests (7)
Created Duration User Patch Repo Result
2024/04/01 06:25 26m retest repro upstream error
2024/04/01 06:25 23m retest repro upstream error
2024/03/25 18:39 21m retest repro upstream error
2024/03/25 18:39 47m retest repro upstream error
2023/11/18 23:20 15m retest repro upstream report log
2023/11/18 23:20 13m retest repro upstream report log
2023/11/18 22:32 20m retest repro linux-next OK log

Sample crash report:
ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 5
ERROR: (device loop0): jfs_readdir: JFS:Dtree error: ino = 2, bn=0, index = 6
==================================================================
BUG: KASAN: user-memory-access in instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
BUG: KASAN: user-memory-access in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:400 [inline]
BUG: KASAN: user-memory-access in __refcount_sub_and_test include/linux/refcount.h:389 [inline]
BUG: KASAN: user-memory-access in __refcount_dec_and_test include/linux/refcount.h:432 [inline]
BUG: KASAN: user-memory-access in refcount_dec_and_test include/linux/refcount.h:450 [inline]
BUG: KASAN: user-memory-access in posix_acl_release include/linux/posix_acl.h:62 [inline]
BUG: KASAN: user-memory-access in __destroy_inode+0x496/0x670 fs/inode.c:383
Write of size 4 at addr 0000000b00000000 by task syz-executor217/5840

CPU: 0 UID: 0 PID: 5840 Comm: syz-executor217 Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 kasan_report+0x118/0x150 mm/kasan/report.c:634
 check_region_inline mm/kasan/generic.c:-1 [inline]
 kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:189
 instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
 atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:400 [inline]
 __refcount_sub_and_test include/linux/refcount.h:389 [inline]
 __refcount_dec_and_test include/linux/refcount.h:432 [inline]
 refcount_dec_and_test include/linux/refcount.h:450 [inline]
 posix_acl_release include/linux/posix_acl.h:62 [inline]
 __destroy_inode+0x496/0x670 fs/inode.c:383
 destroy_inode fs/inode.c:394 [inline]
 evict+0x797/0x9c0 fs/inode.c:834
 dispose_list fs/inode.c:852 [inline]
 evict_inodes+0x636/0x6c0 fs/inode.c:906
 generic_shutdown_super+0x9a/0x2c0 fs/super.c:628
 kill_block_super+0x44/0x90 fs/super.c:1755
 deactivate_locked_super+0xb9/0x130 fs/super.c:474
 cleanup_mnt+0x425/0x4c0 fs/namespace.c:1417
 task_work_run+0x1d4/0x260 kernel/task_work.c:227
 exit_task_work include/linux/task_work.h:40 [inline]
 do_exit+0x6b5/0x22e0 kernel/exit.c:964
 do_group_exit+0x21c/0x2d0 kernel/exit.c:1105
 __do_sys_exit_group kernel/exit.c:1116 [inline]
 __se_sys_exit_group kernel/exit.c:1114 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1114
 x64_sys_call+0x21ba/0x21c0 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fdbae9ac6c9
Code: Unable to access opcode bytes at 0x7fdbae9ac69f.
RSP: 002b:00007ffe62256bc8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fdbae9ac6c9
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 00007fdbaea2e370 R08: ffffffffffffffb8 R09: 0000000000000000
R10: 0000000000000100 R11: 0000000000000246 R12: 00007fdbaea2e370
R13: 0000000000000000 R14: 00007fdbaea2f0e0 R15: 00007fdbae97a670
 </TASK>
==================================================================

Crashes (3249):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/07/08 09:15 upstream d7b8f8e20813 4f67c4ae .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/08 07:30 upstream d7b8f8e20813 4f67c4ae .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/08 05:45 upstream d7b8f8e20813 4f67c4ae .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/08 04:01 upstream d7b8f8e20813 4f67c4ae .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/08 01:33 upstream d7b8f8e20813 4f67c4ae .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro (corrupt fs)] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/01/15 13:37 upstream 619f0b6fad52 7315a7cf .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/01/10 13:35 upstream 643e2e259c2b 67d7ec0a .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/01/03 23:02 upstream 0bc21e701a6f f3558dbf .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/12/28 18:31 upstream fd0584d220fe d3ccff63 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/10/31 11:13 upstream 4236f913808c 96eb609f .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/10/27 04:27 upstream 850925a8133c 65e8686b .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-badwrites-root KASAN: user-memory-access Write in __destroy_inode
2024/10/08 09:20 upstream 87d6aab2389e 402f1df0 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/10/03 18:17 upstream 7ec462100ef9 d7906eff .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/06/19 18:59 upstream 2ccbdf43d5e7 41b7e219 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/06/19 17:31 upstream 2ccbdf43d5e7 41b7e219 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/06/19 15:57 upstream 2ccbdf43d5e7 41b7e219 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/05/04 19:23 upstream 7367539ad4b0 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/05/03 04:49 upstream 49a73b1652c5 ddfc15a1 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/05/03 03:53 upstream 49a73b1652c5 ddfc15a1 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-selinux-root KASAN: user-memory-access Write in __destroy_inode
2024/05/02 12:39 upstream 0106679839f7 3ba885bc .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/05/02 11:46 upstream 0106679839f7 3ba885bc .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/05/02 10:48 upstream 0106679839f7 3ba885bc .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/05/02 09:46 upstream 0106679839f7 3ba885bc .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/04/26 23:31 upstream c942a0cd3603 059e9963 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/04/23 04:08 upstream 4d2008430ce8 21339d7b .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2024/04/22 17:41 upstream ed30a4a51bb1 36c961ad .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/04/21 07:21 upstream 977b1ef51866 af24b050 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2024/04/08 20:43 upstream fe46a7dd189e 53df08b6 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2023/12/30 13:57 upstream f016f7547aee fb427a07 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2023/09/20 23:55 upstream 5d2f53532ecc 0b6a67ac .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-smack-root KASAN: user-memory-access Write in __destroy_inode
2023/06/17 00:59 upstream 40f71e7cd3c6 f3921d4d .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2023/05/04 09:31 upstream fa31fc82fb77 5b7ff9dd .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2024/10/07 08:47 upstream 2a130b7e1fcd d7906eff .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-snapshot-upstream-root KASAN: user-memory-access Write in __destroy_inode
2024/06/25 13:04 upstream 55027e689933 c2e07261 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-qemu-upstream KASAN: user-memory-access Write in __destroy_inode
2024/05/01 15:23 upstream 18daea77cca6 3ba885bc .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] [mounted in repro] ci-qemu-upstream KASAN: user-memory-access Write in __destroy_inode
2024/07/14 22:48 linux-next 3fe121b62282 eaeb5c15 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2024/07/14 20:54 linux-next 3fe121b62282 eaeb5c15 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2024/07/14 18:59 linux-next 3fe121b62282 eaeb5c15 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2024/07/14 16:57 linux-next 3fe121b62282 eaeb5c15 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2024/04/08 20:09 linux-next 11cb68ad52ac 53df08b6 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2024/09/19 04:13 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 5f5673607153 c673ca06 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/04/24 09:36 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 6a71d2909427 21339d7b .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2023/07/23 13:57 linux-next ae867bc97b71 27cbe77f .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2025/07/15 13:29 upstream 155a3c003e55 03fcfc4b .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/15 05:00 upstream 155a3c003e55 03fcfc4b .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/15 00:50 upstream 347e9f5043c8 d8fc7335 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/12 14:15 upstream 379f604cc3dc 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/11 12:48 upstream bc9ff192a6c9 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/06 12:40 upstream 1f988d0788f5 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/04 05:20 upstream 17bbde2e1716 76ad128c .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/03 09:54 upstream b4911fb0b060 115ceea7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/07/02 19:30 upstream b4911fb0b060 bc80e4f0 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/06/26 03:48 upstream 92ca6c498a5e 26d77996 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/06/17 07:55 upstream 9afe652958c3 cfebc887 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/06/06 11:47 upstream e271ed52b344 9fa58bba .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/06/06 11:40 upstream e271ed52b344 9fa58bba .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/06/06 11:39 upstream e271ed52b344 9fa58bba .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/05/31 03:50 upstream 8477ab143069 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/05/25 01:08 upstream b1427432d3b6 ed351ea7 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/05/20 18:11 upstream a5806cd506af b47f9e02 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/05/17 16:49 upstream 172a9d94339c f41472b0 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/05/16 23:25 upstream 3c21441eeffc f41472b0 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/05/15 22:37 upstream 088d13246a46 cfde8269 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/05/13 16:58 upstream e9565e23cd89 7344edeb .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/05/10 13:43 upstream 0e1329d4045c 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/04/21 11:03 upstream 9d7a0577c9db 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/04/20 17:38 upstream 119009db2674 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/04/20 06:36 upstream 119009db2674 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/04/17 14:35 upstream cfb2e2c57aef 229db4cf .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/03/13 04:53 upstream 0fed89a961ea 1a5d9317 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2024/12/28 16:24 upstream fd0584d220fe d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root KASAN: user-memory-access Write in __destroy_inode
2024/06/19 04:47 upstream 2ccbdf43d5e7 639d6cdf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root KASAN: user-memory-access Write in __destroy_inode
2024/06/05 12:04 upstream 32f88d65f01b e1e2c66e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root KASAN: user-memory-access Write in __destroy_inode
2024/06/26 10:21 upstream 55027e689933 dec8bc94 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream KASAN: user-memory-access Write in __destroy_inode
2023/04/17 19:14 upstream 6a8f57ae2eb0 c6ec7083 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs KASAN: user-memory-access Write in __destroy_inode
2025/06/28 14:42 linux-next 2aeda9592360 fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2025/06/16 06:34 linux-next bc6e0ba6c9ba 5f4b362d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2025/06/14 19:59 linux-next bc6e0ba6c9ba 5f4b362d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2025/06/14 19:57 linux-next bc6e0ba6c9ba 5f4b362d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: user-memory-access Write in __destroy_inode
2025/07/07 21:00 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 7482bb149b9f 4f67c4ae .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/30 15:17 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci d7fa1af5b33e 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/15 06:00 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c919f08732cc a4fa04ef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/15 05:56 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c919f08732cc a4fa04ef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/14 05:34 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c32f8dc5aaf9 7344edeb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/13 06:19 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c32f8dc5aaf9 f6671af7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/13 01:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c32f8dc5aaf9 f6671af7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/11 11:56 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c32f8dc5aaf9 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/08 16:32 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e0f4c8dd9d2d dbf35fa1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/07 09:58 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e0f4c8dd9d2d 350f4ffc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/05/03 03:32 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e0f4c8dd9d2d b0714e37 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/04/28 03:53 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c72692105976 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/04/27 19:28 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c72692105976 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/04/26 20:28 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c72692105976 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/04/19 07:06 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c72692105976 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/04/18 15:23 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c72692105976 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2025/04/14 14:44 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2fe2b96c3818 0bd6db41 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: user-memory-access Write in __destroy_inode
2024/06/23 01:02 upstream 563a50672d8a c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 KASAN: wild-memory-access Write in __destroy_inode
2024/06/22 12:45 upstream 35bb670d65fc c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 KASAN: wild-memory-access Write in __destroy_inode
* Struck through repros no longer work on HEAD.