linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [linux-next:master] [fs]  becb2cae42: BUG:kernel_NULL_pointer_dereference,address
@ 2025-03-04  6:14 kernel test robot
  2025-03-04  8:32 ` Christian Brauner
  0 siblings, 1 reply; 3+ messages in thread
From: kernel test robot @ 2025-03-04  6:14 UTC (permalink / raw)
  To: Christian Brauner; +Cc: oe-lkp, lkp, linux-fsdevel, oliver.sang



Hello,

kernel test robot noticed "BUG:kernel_NULL_pointer_dereference,address" on:

commit: becb2cae42ea9092ad4fca06c85328e1f7f7312b ("fs: record sequence number of origin mount namespace")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

[test failed on linux-next/master c0eb65494e59d9834af7cbad983629e9017b25a1]

in testcase: trinity
version: trinity-x86_64-ba2360ed-1_20241228
with following parameters:

	runtime: 300s
	group: group-00
	nr_groups: 5



config: x86_64-randconfig-075-20250228
compiler: clang-19
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+---------------------------------------------------------------------------+------------+------------+
|                                                                           | 822c115925 | becb2cae42 |
+---------------------------------------------------------------------------+------------+------------+
| BUG:kernel_NULL_pointer_dereference,address                               | 0          | 6          |
| Oops                                                                      | 0          | 6          |
| RIP:__se_sys_open_tree                                                    | 0          | 6          |
| Kernel_panic-not_syncing:Fatal_exception                                  | 0          | 6          |
+---------------------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202503041421.38b0d0c-lkp@intel.com


[  133.969970][ T4356] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  133.971269][ T4356] #PF: supervisor read access in kernel mode
[  133.972087][ T4356] #PF: error_code(0x0000) - not-present page
[  133.972943][ T4356] PGD 800000016ebda067 P4D 800000016ebda067 PUD 0
[  133.973896][ T4356] Oops: Oops: 0000 [#1] PREEMPT SMP PTI
[  133.974732][ T4356] CPU: 1 UID: 65534 PID: 4356 Comm: trinity-c2 Tainted: G                T  6.14.0-rc1-00005-gbecb2cae42ea #1
[  133.976486][ T4356] Tainted: [T]=RANDSTRUCT
[  133.977174][ T4356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 133.978731][ T4356] RIP: 0010:__se_sys_open_tree (fs/mount.h:152 fs/namespace.c:2873 fs/namespace.c:2943 fs/namespace.c:2905) 
[ 133.979644][ T4356] Code: 01 f0 ff ff 72 0a e8 62 8a c4 ff e9 59 02 00 00 4c 89 64 24 10 48 c7 c7 78 e5 6e 84 e8 8c c8 82 01 48 8b 44 24 08 4c 8b 68 d0 <4d> 8b 65 00 31 ff 4c 89 e6 e8 f5 8f c4 ff 4d 85 e4 74 07 e8 2b 8a
All code
========
   0:	01 f0                	add    %esi,%eax
   2:	ff                   	(bad)
   3:	ff 72 0a             	push   0xa(%rdx)
   6:	e8 62 8a c4 ff       	call   0xffffffffffc48a6d
   b:	e9 59 02 00 00       	jmp    0x269
  10:	4c 89 64 24 10       	mov    %r12,0x10(%rsp)
  15:	48 c7 c7 78 e5 6e 84 	mov    $0xffffffff846ee578,%rdi
  1c:	e8 8c c8 82 01       	call   0x182c8ad
  21:	48 8b 44 24 08       	mov    0x8(%rsp),%rax
  26:	4c 8b 68 d0          	mov    -0x30(%rax),%r13
  2a:*	4d 8b 65 00          	mov    0x0(%r13),%r12		<-- trapping instruction
  2e:	31 ff                	xor    %edi,%edi
  30:	4c 89 e6             	mov    %r12,%rsi
  33:	e8 f5 8f c4 ff       	call   0xffffffffffc4902d
  38:	4d 85 e4             	test   %r12,%r12
  3b:	74 07                	je     0x44
  3d:	e8                   	.byte 0xe8
  3e:	2b                   	.byte 0x2b
  3f:	8a                   	.byte 0x8a

Code starting with the faulting instruction
===========================================
   0:	4d 8b 65 00          	mov    0x0(%r13),%r12
   4:	31 ff                	xor    %edi,%edi
   6:	4c 89 e6             	mov    %r12,%rsi
   9:	e8 f5 8f c4 ff       	call   0xffffffffffc49003
   e:	4d 85 e4             	test   %r12,%r12
  11:	74 07                	je     0x1a
  13:	e8                   	.byte 0xe8
  14:	2b                   	.byte 0x2b
  15:	8a                   	.byte 0x8a
[  133.982199][ T4356] RSP: 0018:ffff88819bff7eb8 EFLAGS: 00010202
[  133.983064][ T4356] RAX: ffff88819a47c338 RBX: 00000000000001b7 RCX: 0000000000000000
[  133.984255][ T4356] RDX: ffff88819a650000 RSI: 0000000000000000 RDI: 0000000000000000
[  133.985462][ T4356] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
[  133.986638][ T4356] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88819a650000
[  133.987842][ T4356] R13: 0000000000000000 R14: ffff88819bd68e00 R15: 0000000000000001
[  133.989130][ T4356] FS:  00007f0d165f6740(0000) GS:ffff88842fd00000(0000) knlGS:0000000000000000
[  133.990567][ T4356] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  133.991590][ T4356] CR2: 0000000000000000 CR3: 000000019bc54000 CR4: 00000000000406f0
[  133.992731][ T4356] Call Trace:
[  133.993247][ T4356]  <TASK>
[ 133.993714][ T4356] ? __die_body (arch/x86/kernel/dumpstack.c:421) 
[ 133.994395][ T4356] ? page_fault_oops (arch/x86/mm/fault.c:710) 
[ 133.995182][ T4356] ? do_user_addr_fault (arch/x86/mm/fault.c:?) 
[ 133.996009][ T4356] ? exc_page_fault (arch/x86/mm/fault.c:? arch/x86/mm/fault.c:1538) 
[ 133.996790][ T4356] ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:623) 
[ 133.997605][ T4356] ? __se_sys_open_tree (fs/mount.h:152 fs/namespace.c:2873 fs/namespace.c:2943 fs/namespace.c:2905) 
[ 133.998433][ T4356] ? __se_sys_open_tree (fs/namespace.c:2872 fs/namespace.c:2943 fs/namespace.c:2905) 
[ 133.999267][ T4356] ? do_syscall_64 (arch/x86/entry/common.c:83) 
[ 133.999925][ T4356] ? do_int80_emulation (arch/x86/entry/common.c:257) 
[ 134.000690][ T4356] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
[  134.001567][ T4356]  </TASK>
[  134.002006][ T4356] Modules linked in: af_key ieee802154_socket ieee802154 caif_socket caif crc_ccitt rxrpc bluetooth rfkill pptp gre pppoe pppox ppp_generic slhc crypto_user scsi_transport_iscsi xfrm_user sctp dccp_ipv4 dccp ipmi_devintf ipmi_msghandler sr_mod cdrom sg ata_generic ata_piix libata sha1_ssse3 aesni_intel scsi_mod scsi_common input_leds serio_raw stm_p_basic
[  134.007226][ T4356] CR2: 0000000000000000
[  134.008040][ T4356] ---[ end trace 0000000000000000 ]---
[ 134.013890][ T4356] RIP: 0010:__se_sys_open_tree (fs/mount.h:152 fs/namespace.c:2873 fs/namespace.c:2943 fs/namespace.c:2905) 
[ 134.015705][ T4356] Code: 01 f0 ff ff 72 0a e8 62 8a c4 ff e9 59 02 00 00 4c 89 64 24 10 48 c7 c7 78 e5 6e 84 e8 8c c8 82 01 48 8b 44 24 08 4c 8b 68 d0 <4d> 8b 65 00 31 ff 4c 89 e6 e8 f5 8f c4 ff 4d 85 e4 74 07 e8 2b 8a
All code
========
   0:	01 f0                	add    %esi,%eax
   2:	ff                   	(bad)
   3:	ff 72 0a             	push   0xa(%rdx)
   6:	e8 62 8a c4 ff       	call   0xffffffffffc48a6d
   b:	e9 59 02 00 00       	jmp    0x269
  10:	4c 89 64 24 10       	mov    %r12,0x10(%rsp)
  15:	48 c7 c7 78 e5 6e 84 	mov    $0xffffffff846ee578,%rdi
  1c:	e8 8c c8 82 01       	call   0x182c8ad
  21:	48 8b 44 24 08       	mov    0x8(%rsp),%rax
  26:	4c 8b 68 d0          	mov    -0x30(%rax),%r13
  2a:*	4d 8b 65 00          	mov    0x0(%r13),%r12		<-- trapping instruction
  2e:	31 ff                	xor    %edi,%edi
  30:	4c 89 e6             	mov    %r12,%rsi
  33:	e8 f5 8f c4 ff       	call   0xffffffffffc4902d
  38:	4d 85 e4             	test   %r12,%r12
  3b:	74 07                	je     0x44
  3d:	e8                   	.byte 0xe8
  3e:	2b                   	.byte 0x2b
  3f:	8a                   	.byte 0x8a

Code starting with the faulting instruction
===========================================
   0:	4d 8b 65 00          	mov    0x0(%r13),%r12
   4:	31 ff                	xor    %edi,%edi
   6:	4c 89 e6             	mov    %r12,%rsi
   9:	e8 f5 8f c4 ff       	call   0xffffffffffc49003
   e:	4d 85 e4             	test   %r12,%r12
  11:	74 07                	je     0x1a
  13:	e8                   	.byte 0xe8
  14:	2b                   	.byte 0x2b
  15:	8a                   	.byte 0x8a


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250304/202503041421.38b0d0c-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2025-03-05  4:54 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-03-04  6:14 [linux-next:master] [fs] becb2cae42: BUG:kernel_NULL_pointer_dereference,address kernel test robot
2025-03-04  8:32 ` Christian Brauner
2025-03-05  4:54   ` Oliver Sang

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).