Decoded stacktrace for 6.14.0-1008-gcp: $ ./scripts/decode_stacktrace.sh /usr/lib/debug/boot/vmlinux-6.14.0-1008-gcp < ~/660\ 386885\ BUG\ kernel.txt [ 660.386885] BUG: kernel NULL pointer dereference, address: 0000000000000028 [ 660.394066] #PF: supervisor read access in kernel mode [ 660.394068] #PF: error_code(0x0000) - not-present page [ 660.394070] PGD 0 P4D 0 [ 660.394074] Oops: Oops: 0000 [#1] SMP NOPTI [ 660.394081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 660.394083] RIP: 0010:alloc_fs_context (fs/fs_context.c:294 (discriminator 1)) [ 660.394089] Code: 49 89 47 28 48 8b 82 80 0c 00 00 48 85 c0 74 0f c7 80 a8 00 00 00 00 00 00 00 f0 48 83 00 01 49 89 47 58 48 8b 82 e8 0c 00 00 <4c> 8b 70 28 b8 01 00 00 00 49 8d be 8c 00 00 00 f0 41 0f c1 86 8c All code ======== 0: 49 89 47 28 mov %rax,0x28(%r15) 4: 48 8b 82 80 0c 00 00 mov 0xc80(%rdx),%rax b: 48 85 c0 test %rax,%rax e: 74 0f je 0x1f 10: c7 80 a8 00 00 00 00 movl $0x0,0xa8(%rax) 17: 00 00 00 1a: f0 48 83 00 01 lock addq $0x1,(%rax) 1f: 49 89 47 58 mov %rax,0x58(%r15) 23: 48 8b 82 e8 0c 00 00 mov 0xce8(%rdx),%rax 2a:* 4c 8b 70 28 mov 0x28(%rax),%r14 <-- trapping instruction 2e: b8 01 00 00 00 mov $0x1,%eax 33: 49 8d be 8c 00 00 00 lea 0x8c(%r14),%rdi 3a: f0 lock 3b: 41 rex.B 3c: 0f .byte 0xf 3d: c1 .byte 0xc1 3e: 86 .byte 0x86 3f: 8c .byte 0x8c
Code starting with the faulting instruction =========================================== 0: 4c 8b 70 28 mov 0x28(%rax),%r14 4: b8 01 00 00 00 mov $0x1,%eax 9: 49 8d be 8c 00 00 00 lea 0x8c(%r14),%rdi 10: f0 lock 11: 41 rex.B 12: 0f .byte 0xf 13: c1 .byte 0xc1 14: 86 .byte 0x86 15: 8c .byte 0x8c [ 660.394092] RSP: 0018:ffffb53380a1fb08 EFLAGS: 00010202 [ 660.394094] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 660.394096] RDX: ffff8f864a01d300 RSI: 0000000000000000 RDI: 0000000000000000 [ 660.394097] RBP: ffffb53380a1fb38 R08: 0000000000000000 R09: 0000000000000000 [ 660.394099] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffa02ae940 [ 660.394100] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8f8647eded80 [ 660.394104] FS: 0000000000000000(0000) GS:ffff8f896fd80000(0000) knlGS:0000000000000000 [ 660.394106] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 660.394108] CR2: 0000000000000028 CR3: 000000005f440005 CR4: 0000000000370ef0 [ 660.394111] Call Trace: [ 660.394113] <TASK> [ 660.394117] fs_context_for_mount (fs/fs_context.c:334) [ 660.394121] vfs_kern_mount.part.0 (fs/namespace.c:1291) [ 660.394125] vfs_kern_mount (fs/namespace.c:1307) [ 660.394128] efivarfs_pm_notify (fs/efivarfs/super.c:529 (discriminator 1)) [ 660.394131] ? __pfx_efivarfs_actor (fs/efivarfs/super.c:404) [ 660.394135] notifier_call_chain (kernel/notifier.c:87) [ 660.394139] blocking_notifier_call_chain (kernel/notifier.c:381 kernel/notifier.c:368) [ 660.394142] pm_notifier_call_chain (kernel/power/main.c:110) [ 660.394145] snapshot_release (kernel/power/user.c:127) [ 660.394148] __fput (fs/file_table.c:465 (discriminator 1)) [ 660.394152] ____fput (fs/file_table.c:493) [ 660.394155] task_work_run (arch/x86/include/asm/jump_label.h:36 include/linux/livepatch_sched.h:18 include/linux/sched.h:2095 kernel/task_work.c:230) [ 660.394159] do_exit (kernel/exit.c:939) [ 660.394163] do_group_exit (kernel/exit.c:1069) [ 660.394166] __x64_sys_exit_group (kernel/exit.c:1098) [ 660.394170] x64_sys_call (arch/x86/entry/syscall_64.c:32) [ 660.394173] do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1) arch/x86/entry/common.c:83 (discriminator 1)) [ 660.394176] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394179] ? arch_exit_to_user_mode_prepare.isra.0 (arch/x86/include/asm/entry-common.h:58 arch/x86/include/asm/entry-common.h:65) [ 660.394183] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394185] ? syscall_exit_to_user_mode (arch/x86/include/asm/jump_label.h:36 include/linux/context_tracking_state.h:108 include/linux/context_tracking.h:41 include/linux/entry-common.h:364 kernel/entry/common.c:220) [ 660.394188] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394190] ? do_syscall_64 (arch/x86/include/asm/cpufeature.h:172 arch/x86/entry/common.c:98) [ 660.394193] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394195] ? count_memcg_events.constprop.0 (arch/x86/include/asm/irqflags.h:158 (discriminator 1) include/linux/memcontrol.h:970 (discriminator 1)) [ 660.394199] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394201] ? handle_mm_fault (mm/memory.c:6071 mm/memory.c:6224) [ 660.394205] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394207] ? do_user_addr_fault (arch/x86/mm/fault.c:1341) [ 660.394211] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394213] ? arch_exit_to_user_mode_prepare.isra.0 (arch/x86/include/asm/entry-common.h:57 (discriminator 1) arch/x86/include/asm/entry-common.h:65 (discriminator 1)) [ 660.394215] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394217] ? irqentry_exit_to_user_mode (arch/x86/include/asm/jump_label.h:36 include/linux/context_tracking_state.h:108 include/linux/context_tracking.h:41 include/linux/entry-common.h:364 kernel/entry/common.c:233) [ 660.394220] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394222] ? irqentry_exit (kernel/entry/common.c:367) [ 660.394224] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) [ 660.394226] ? exc_page_fault (arch/x86/mm/fault.c:1542) [ 660.394229] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2113990 Title: NULL pointer dereference caught by ubuntu_stress_smoke_test:sut-scan To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2113990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs