syzbot


general protection fault in path_openat

Status: premoderation: reported C repro on 2025/08/28 16:04
Bug presence: origin:downstream
[Documentation on labels]
Reported-by: syzbot+93c0566975df9afc5c69@syzkaller.appspotmail.com
First crash: 170d, last: 16h17m
Bug presence (3)
Date Name Commit Repro Result
2025/08/31 android16-6.12 (ToT) 6879524e1c5a C [report] general protection fault in path_openat
2025/08/31 lts (merge base) 259f4977409c C Didn't crash
2025/08/31 upstream (ToT) c8bc81a52d5a C Didn't crash
Similar bugs (8)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: unable to handle kernel paging request in path_openat reiserfs 8 C error inconclusive 52 774d 1171d 0/29 auto-obsoleted due to no activity on 2024/04/12 10:28
android-5-10 general protection fault in path_openat 2 C done 43 8d22h 1001d 0/2 upstream: reported C repro on 2023/05/21 01:33
linux-4.19 general protection fault in path_openat 2 C done 13 2202d 2208d 1/1 fixed on 2020/03/06 08:34
upstream general protection fault in path_openat ext4 2 C done 7 2206d 2206d 15/29 fixed on 2020/02/18 14:31
linux-4.14 general protection fault in path_openat 2 C done 40 2202d 2208d 1/1 fixed on 2020/03/06 21:15
android-5-15 general protection fault in path_openat origin:downstream 2 C done 16 7d07h 1001d 0/2 upstream: reported C repro on 2023/05/21 01:53
android-6-1 general protection fault in path_openat origin:downstream 2 C done error 13 20d 1001d 0/2 upstream: reported C repro on 2023/05/21 01:53
android-54 general protection fault in path_openat 2 syz 26 2201d 2208d 1/2 fixed on 2021/10/12 13:38
Last patch testing requests (2)
Created Duration User Patch Repo Result
2026/01/19 18:42 32m retest repro android16-6.12 error
2025/11/09 17:37 3m retest repro android16-6.12 error

Sample crash report:
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 UID: 0 PID: 382 Comm: syz.2.17 Not tainted syzkaller #0 a14c28d9e62c02dc866229d1d178db2aa7df2752
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026
RIP: 0010:__d_entry_type include/linux/dcache.h:414 [inline]
RIP: 0010:d_is_miss include/linux/dcache.h:419 [inline]
RIP: 0010:d_is_negative include/linux/dcache.h:465 [inline]
RIP: 0010:atomic_open fs/namei.c:3479 [inline]
RIP: 0010:lookup_open fs/namei.c:3574 [inline]
RIP: 0010:open_last_lookups fs/namei.c:3702 [inline]
RIP: 0010:path_openat+0x1553/0x34f0 fs/namei.c:3938
Code: f3 ff ff ff 44 8b 6c 24 24 4c 89 e7 e8 36 b0 02 00 4c 63 e3 e9 9d f5 ff ff e8 e9 f2 99 ff 4c 8b 74 24 30 4c 89 e0 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 8f 0e 00 00 41 8b 1c 24 be 00 00 70 00
RSP: 0018:ffffc90001aff9c0 EFLAGS: 00010202
RAX: 0000000000000001 RBX: ffff888113f272c8 RCX: ffff888108b0a600
RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff888110f0ac30
RBP: ffffc90001affbd0 R08: ffff8881f6e50bc7 R09: 1ffff1103edca178
R10: dffffc0000000000 R11: ffffed103edca179 R12: 0000000000000008
R13: 0000000000000000 R14: ffff888108b0aef8 R15: dffffc0000000000
FS:  00007f0542f9f6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0542f7ed58 CR3: 0000000115b78000 CR4: 00000000003526b0
Call Trace:
 <TASK>
 do_filp_open+0x1f5/0x440 fs/namei.c:3968
 do_sys_openat2+0x134/0x1d0 fs/open.c:1440
 do_sys_open fs/open.c:1455 [inline]
 __do_sys_openat fs/open.c:1471 [inline]
 __se_sys_openat fs/open.c:1466 [inline]
 __x64_sys_openat+0x13a/0x170 fs/open.c:1466
 x64_sys_call+0xe69/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:258
 do_syscall_x64 arch/x86/entry/common.c:47 [inline]
 do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:78
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f054219bf79
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f0542f9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007f0542415fa0 RCX: 00007f054219bf79
RDX: 0000000000040000 RSI: 0000200000000140 RDI: ffffffffffffff9c
RBP: 00007f05422327e0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f0542416038 R14: 00007f0542415fa0 R15: 00007fff374d71c8
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__d_entry_type include/linux/dcache.h:414 [inline]
RIP: 0010:d_is_miss include/linux/dcache.h:419 [inline]
RIP: 0010:d_is_negative include/linux/dcache.h:465 [inline]
RIP: 0010:atomic_open fs/namei.c:3479 [inline]
RIP: 0010:lookup_open fs/namei.c:3574 [inline]
RIP: 0010:open_last_lookups fs/namei.c:3702 [inline]
RIP: 0010:path_openat+0x1553/0x34f0 fs/namei.c:3938
Code: f3 ff ff ff 44 8b 6c 24 24 4c 89 e7 e8 36 b0 02 00 4c 63 e3 e9 9d f5 ff ff e8 e9 f2 99 ff 4c 8b 74 24 30 4c 89 e0 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 8f 0e 00 00 41 8b 1c 24 be 00 00 70 00
RSP: 0018:ffffc90001aff9c0 EFLAGS: 00010202
RAX: 0000000000000001 RBX: ffff888113f272c8 RCX: ffff888108b0a600
RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff888110f0ac30
RBP: ffffc90001affbd0 R08: ffff8881f6e50bc7 R09: 1ffff1103edca178
R10: dffffc0000000000 R11: ffffed103edca179 R12: 0000000000000008
R13: 0000000000000000 R14: ffff888108b0aef8 R15: dffffc0000000000
FS:  00007f0542f9f6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0542f7ed58 CR3: 0000000115b78000 CR4: 00000000003526b0
----------------
Code disassembly (best guess), 3 bytes skipped:
   0:	ff 44 8b 6c          	incl   0x6c(%rbx,%rcx,4)
   4:	24 24                	and    $0x24,%al
   6:	4c 89 e7             	mov    %r12,%rdi
   9:	e8 36 b0 02 00       	call   0x2b044
   e:	4c 63 e3             	movslq %ebx,%r12
  11:	e9 9d f5 ff ff       	jmp    0xfffff5b3
  16:	e8 e9 f2 99 ff       	call   0xff99f304
  1b:	4c 8b 74 24 30       	mov    0x30(%rsp),%r14
  20:	4c 89 e0             	mov    %r12,%rax
  23:	48 c1 e8 03          	shr    $0x3,%rax
* 27:	42 0f b6 04 38       	movzbl (%rax,%r15,1),%eax <-- trapping instruction
  2c:	84 c0                	test   %al,%al
  2e:	0f 85 8f 0e 00 00    	jne    0xec3
  34:	41 8b 1c 24          	mov    (%r12),%ebx
  38:	be 00 00 70 00       	mov    $0x700000,%esi

Crashes (4):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/02/14 21:20 android16-6.12 837ec018b485 1e62d198 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci2-android-6-12-rust general protection fault in path_openat
2025/08/28 16:03 android16-6.12 cbb0a15dcc1e e12e5ba4 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci2-android-6-12-rust general protection fault in path_openat
2026/02/14 20:27 android16-6.12 837ec018b485 1e62d198 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-6-12-rust general protection fault in path_openat
2025/09/09 15:16 android16-6.12 7471f5c09c55 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-6-12-rust general protection fault in path_openat
* Struck through repros no longer work on HEAD.