Decoded stacktrace for 6.14.0-1008-gcp:

$ ./scripts/decode_stacktrace.sh /usr/lib/debug/boot/vmlinux-6.14.0-1008-gcp < 
~/660\ 386885\ BUG\ kernel.txt
[  660.386885] BUG: kernel NULL pointer dereference, address: 0000000000000028
[  660.394066] #PF: supervisor read access in kernel mode
[  660.394068] #PF: error_code(0x0000) - not-present page
[  660.394070] PGD 0 P4D 0
[  660.394074] Oops: Oops: 0000 [#1] SMP NOPTI
[  660.394081] Hardware name: Google Google Compute Engine/Google Compute 
Engine, BIOS Google 05/07/2025
[  660.394083] RIP: 0010:alloc_fs_context (fs/fs_context.c:294 (discriminator 
1)) 
[ 660.394089] Code: 49 89 47 28 48 8b 82 80 0c 00 00 48 85 c0 74 0f c7 80 a8 00 
00 00 00 00 00 00 f0 48 83 00 01 49 89 47 58 48 8b 82 e8 0c 00 00 <4c> 8b 70 28 
b8 01 00 00 00 49 8d be 8c 00 00 00 f0 41 0f c1 86 8c
All code
========
   0:    49 89 47 28              mov    %rax,0x28(%r15)
   4:    48 8b 82 80 0c 00 00     mov    0xc80(%rdx),%rax
   b:    48 85 c0                 test   %rax,%rax
   e:    74 0f                    je     0x1f
  10:    c7 80 a8 00 00 00 00     movl   $0x0,0xa8(%rax)
  17:    00 00 00 
  1a:    f0 48 83 00 01           lock addq $0x1,(%rax)
  1f:    49 89 47 58              mov    %rax,0x58(%r15)
  23:    48 8b 82 e8 0c 00 00     mov    0xce8(%rdx),%rax
  2a:*    4c 8b 70 28              mov    0x28(%rax),%r14        <-- trapping 
instruction
  2e:    b8 01 00 00 00           mov    $0x1,%eax
  33:    49 8d be 8c 00 00 00     lea    0x8c(%r14),%rdi
  3a:    f0                       lock
  3b:    41                       rex.B
  3c:    0f                       .byte 0xf
  3d:    c1                       .byte 0xc1
  3e:    86                       .byte 0x86
  3f:    8c                       .byte 0x8c

Code starting with the faulting instruction
===========================================
   0:    4c 8b 70 28              mov    0x28(%rax),%r14
   4:    b8 01 00 00 00           mov    $0x1,%eax
   9:    49 8d be 8c 00 00 00     lea    0x8c(%r14),%rdi
  10:    f0                       lock
  11:    41                       rex.B
  12:    0f                       .byte 0xf
  13:    c1                       .byte 0xc1
  14:    86                       .byte 0x86
  15:    8c                       .byte 0x8c
[  660.394092] RSP: 0018:ffffb53380a1fb08 EFLAGS: 00010202
[  660.394094] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  660.394096] RDX: ffff8f864a01d300 RSI: 0000000000000000 RDI: 0000000000000000
[  660.394097] RBP: ffffb53380a1fb38 R08: 0000000000000000 R09: 0000000000000000
[  660.394099] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffa02ae940
[  660.394100] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8f8647eded80
[  660.394104] FS:  0000000000000000(0000) GS:ffff8f896fd80000(0000) 
knlGS:0000000000000000
[  660.394106] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  660.394108] CR2: 0000000000000028 CR3: 000000005f440005 CR4: 0000000000370ef0
[  660.394111] Call Trace:
[  660.394113]  <TASK>
[  660.394117] fs_context_for_mount (fs/fs_context.c:334) 
[  660.394121] vfs_kern_mount.part.0 (fs/namespace.c:1291) 
[  660.394125] vfs_kern_mount (fs/namespace.c:1307) 
[  660.394128] efivarfs_pm_notify (fs/efivarfs/super.c:529 (discriminator 1)) 
[  660.394131] ? __pfx_efivarfs_actor (fs/efivarfs/super.c:404) 
[  660.394135] notifier_call_chain (kernel/notifier.c:87) 
[  660.394139] blocking_notifier_call_chain (kernel/notifier.c:381 
kernel/notifier.c:368) 
[  660.394142] pm_notifier_call_chain (kernel/power/main.c:110) 
[  660.394145] snapshot_release (kernel/power/user.c:127) 
[  660.394148] __fput (fs/file_table.c:465 (discriminator 1)) 
[  660.394152] ____fput (fs/file_table.c:493) 
[  660.394155] task_work_run (arch/x86/include/asm/jump_label.h:36 
include/linux/livepatch_sched.h:18 include/linux/sched.h:2095 
kernel/task_work.c:230) 
[  660.394159] do_exit (kernel/exit.c:939) 
[  660.394163] do_group_exit (kernel/exit.c:1069) 
[  660.394166] __x64_sys_exit_group (kernel/exit.c:1098) 
[  660.394170] x64_sys_call (arch/x86/entry/syscall_64.c:32) 
[  660.394173] do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1) 
arch/x86/entry/common.c:83 (discriminator 1)) 
[  660.394176] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394179] ? arch_exit_to_user_mode_prepare.isra.0 
(arch/x86/include/asm/entry-common.h:58 arch/x86/include/asm/entry-common.h:65) 
[  660.394183] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394185] ? syscall_exit_to_user_mode 
(arch/x86/include/asm/jump_label.h:36 
include/linux/context_tracking_state.h:108 include/linux/context_tracking.h:41 
include/linux/entry-common.h:364 kernel/entry/common.c:220) 
[  660.394188] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394190] ? do_syscall_64 (arch/x86/include/asm/cpufeature.h:172 
arch/x86/entry/common.c:98) 
[  660.394193] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394195] ? count_memcg_events.constprop.0 
(arch/x86/include/asm/irqflags.h:158 (discriminator 1) 
include/linux/memcontrol.h:970 (discriminator 1)) 
[  660.394199] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394201] ? handle_mm_fault (mm/memory.c:6071 mm/memory.c:6224) 
[  660.394205] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394207] ? do_user_addr_fault (arch/x86/mm/fault.c:1341) 
[  660.394211] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394213] ? arch_exit_to_user_mode_prepare.isra.0 
(arch/x86/include/asm/entry-common.h:57 (discriminator 1) 
arch/x86/include/asm/entry-common.h:65 (discriminator 1)) 
[  660.394215] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394217] ? irqentry_exit_to_user_mode 
(arch/x86/include/asm/jump_label.h:36 
include/linux/context_tracking_state.h:108 include/linux/context_tracking.h:41 
include/linux/entry-common.h:364 kernel/entry/common.c:233) 
[  660.394220] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394222] ? irqentry_exit (kernel/entry/common.c:367) 
[  660.394224] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394226] ? exc_page_fault (arch/x86/mm/fault.c:1542) 
[  660.394229] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2113990

Title:
  NULL pointer dereference caught by ubuntu_stress_smoke_test:sut-scan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2113990/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to