syzbot


general protection fault in current_umask (2)

Status: premoderation: reported on 2026/02/10 03:00
Reported-by: syzbot+8480089d3bee9fd43588@syzkaller.appspotmail.com
First crash: 1d18h, last: 1d18h
Similar bugs (2)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-10 general protection fault in current_umask 2 C unreliable 5 302d 512d 0/2 auto-obsoleted due to no activity on 2025/07/24 17:05
android-6-12 general protection fault in current_umask 2 4 132d 208d 0/1 auto-obsoleted due to no activity on 2025/12/31 04:57

Sample crash report:
UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy
misc raw-gadget: fail, usb_gadget_register_driver returned -16
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 UID: 0 PID: 3224 Comm: syz.1.987 Not tainted syzkaller #0 79a81a3ed2cf63e2a306eb4bbf59144c10c9503d
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026
RIP: 0010:current_umask+0x4d/0x80 fs/fs_struct.c:158
Code: 81 c3 78 08 00 00 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 61 8b e5 ff 48 8b 1b 48 83 c3 0c 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 75 0c 8b 03 5b 41 5e 5d e9 ff 32 a7 03 cc 89
RSP: 0018:ffffc9000b4bf4d8 EFLAGS: 00010203
RAX: 0000000000000001 RBX: 000000000000000c RCX: ffff888106b58000
RDX: 0000000000000000 RSI: ffffffff876ec0e0 RDI: 0000000000000000
RBP: ffffc9000b4bf4e8 R08: ffff888106b58000 R09: 0000000000000002
R10: ffffffffffffffa1 R11: 0000000000000000 R12: 1ffff92001697eab
R13: ffff88810bbff480 R14: dffffc0000000000 R15: 1ffff1102177fe90
FS:  0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0607617dac CR3: 00000000074a8000 CR4: 00000000003526b0
Call Trace:
 <TASK>
 posix_acl_create+0x18a/0x3e0 fs/posix_acl.c:649
 simple_acl_create+0x3e/0x1c0 fs/posix_acl.c:1041
 shmem_mknod+0x83/0x200 mm/shmem.c:3601
 vfs_mknod+0x607/0x6d0 fs/namei.c:4143
 vfs_whiteout include/linux/fs.h:1983 [inline]
 ovl_do_whiteout fs/overlayfs/overlayfs.h:382 [inline]
 ovl_whiteout fs/overlayfs/dir.c:78 [inline]
 ovl_cleanup_and_whiteout+0x215/0x6d0 fs/overlayfs/dir.c:118
 ovl_remove_and_whiteout fs/overlayfs/dir.c:791 [inline]
 ovl_do_remove+0x91a/0xda0 fs/overlayfs/dir.c:914
 ovl_rmdir+0x1e/0x30 fs/overlayfs/dir.c:945
 vfs_rmdir+0x3e3/0x560 fs/namei.c:4348
 incfs_kill_sb+0x109/0x230 fs/incfs/vfs.c:1968
 deactivate_locked_super+0xd5/0x2a0 fs/super.c:476
 deactivate_super+0xb8/0xe0 fs/super.c:509
 cleanup_mnt+0x406/0x4a0 fs/namespace.c:1380
 __cleanup_mnt+0x1d/0x40 fs/namespace.c:1387
 task_work_run+0x1e5/0x260 kernel/task_work.c:246
 exit_task_work include/linux/task_work.h:43 [inline]
 do_exit+0x9e3/0x2650 kernel/exit.c:953
 do_group_exit+0x229/0x2f0 kernel/exit.c:1095
 get_signal+0x1398/0x14e0 kernel/signal.c:2933
 arch_do_signal_or_restart+0xbc/0x760 arch/x86/kernel/signal.c:337
 exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
 syscall_exit_to_user_mode+0x57/0xb0 kernel/entry/common.c:218
 do_syscall_64+0x63/0xf0 arch/x86/entry/common.c:84
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fac9b19af79
Code: Unable to access opcode bytes at 0x7fac9b19af4f.
RSP: 002b:00007fac9bfd70e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 00007fac9b415fa8 RCX: 00007fac9b19af79
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fac9b415fac
RBP: 00007fac9b415fa0 R08: 7fffffffffffffff R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
R13: 00007fac9b416038 R14: 00007ffff00b4da0 R15: 00007ffff00b4e88
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:current_umask+0x4d/0x80 fs/fs_struct.c:158
Code: 81 c3 78 08 00 00 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 61 8b e5 ff 48 8b 1b 48 83 c3 0c 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 75 0c 8b 03 5b 41 5e 5d e9 ff 32 a7 03 cc 89
RSP: 0018:ffffc9000b4bf4d8 EFLAGS: 00010203
RAX: 0000000000000001 RBX: 000000000000000c RCX: ffff888106b58000
RDX: 0000000000000000 RSI: ffffffff876ec0e0 RDI: 0000000000000000
RBP: ffffc9000b4bf4e8 R08: ffff888106b58000 R09: 0000000000000002
R10: ffffffffffffffa1 R11: 0000000000000000 R12: 1ffff92001697eab
R13: ffff88810bbff480 R14: dffffc0000000000 R15: 1ffff1102177fe90
FS:  0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f06075e4198 CR3: 000000010ebe8000 CR4: 00000000003526b0
----------------
Code disassembly (best guess):
   0:	81 c3 78 08 00 00    	add    $0x878,%ebx
   6:	48 89 d8             	mov    %rbx,%rax
   9:	48 c1 e8 03          	shr    $0x3,%rax
   d:	42 80 3c 30 00       	cmpb   $0x0,(%rax,%r14,1)
  12:	74 08                	je     0x1c
  14:	48 89 df             	mov    %rbx,%rdi
  17:	e8 61 8b e5 ff       	call   0xffe58b7d
  1c:	48 8b 1b             	mov    (%rbx),%rbx
  1f:	48 83 c3 0c          	add    $0xc,%rbx
  23:	48 89 d8             	mov    %rbx,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 0f b6 04 30       	movzbl (%rax,%r14,1),%eax <-- trapping instruction
  2f:	84 c0                	test   %al,%al
  31:	75 0c                	jne    0x3f
  33:	8b 03                	mov    (%rbx),%eax
  35:	5b                   	pop    %rbx
  36:	41 5e                	pop    %r14
  38:	5d                   	pop    %rbp
  39:	e9 ff 32 a7 03       	jmp    0x3a7333d
  3e:	cc                   	int3
  3f:	89                   	.byte 0x89

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/02/10 02:59 android16-6.12 3b54985e1263 4ab09a02 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-6-12-rust general protection fault in current_umask
* Struck through repros no longer work on HEAD.