Re: [linux-next:master] [fs] becb2cae42: BUG:kernel_NULL_pointer_dereference,address

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Mar 04, 2025 at 02:14:55PM +0800, kernel test robot wrote:
> 
> 
> Hello,
> 
> kernel test robot noticed "BUG:kernel_NULL_pointer_dereference,address" on:
> 
> commit: becb2cae42ea9092ad4fca06c85328e1f7f7312b ("fs: record sequence number of origin mount namespace")
> https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

Should now be fixed, thanks!

> 
> [test failed on linux-next/master c0eb65494e59d9834af7cbad983629e9017b25a1]
> 
> in testcase: trinity
> version: trinity-x86_64-ba2360ed-1_20241228
> with following parameters:
> 
> 	runtime: 300s
> 	group: group-00
> 	nr_groups: 5
> 
> 
> 
> config: x86_64-randconfig-075-20250228
> compiler: clang-19
> test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
> 
> (please refer to attached dmesg/kmsg for entire log/backtrace)
> 
> 
> +---------------------------------------------------------------------------+------------+------------+
> |                                                                           | 822c115925 | becb2cae42 |
> +---------------------------------------------------------------------------+------------+------------+
> | BUG:kernel_NULL_pointer_dereference,address                               | 0          | 6          |
> | Oops                                                                      | 0          | 6          |
> | RIP:__se_sys_open_tree                                                    | 0          | 6          |
> | Kernel_panic-not_syncing:Fatal_exception                                  | 0          | 6          |
> +---------------------------------------------------------------------------+------------+------------+
> 
> 
> If you fix the issue in a separate patch/commit (i.e. not just a new version of
> the same patch/commit), kindly add following tags
> | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
> | Closes: https://lore.kernel.org/oe-lkp/202503041421.38b0d0c-lkp@xxxxxxxxx
> 
> 
> [  133.969970][ T4356] BUG: kernel NULL pointer dereference, address: 0000000000000000
> [  133.971269][ T4356] #PF: supervisor read access in kernel mode
> [  133.972087][ T4356] #PF: error_code(0x0000) - not-present page
> [  133.972943][ T4356] PGD 800000016ebda067 P4D 800000016ebda067 PUD 0
> [  133.973896][ T4356] Oops: Oops: 0000 [#1] PREEMPT SMP PTI
> [  133.974732][ T4356] CPU: 1 UID: 65534 PID: 4356 Comm: trinity-c2 Tainted: G                T  6.14.0-rc1-00005-gbecb2cae42ea #1
> [  133.976486][ T4356] Tainted: [T]=RANDSTRUCT
> [  133.977174][ T4356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
> [ 133.978731][ T4356] RIP: 0010:__se_sys_open_tree (fs/mount.h:152 fs/namespace.c:2873 fs/namespace.c:2943 fs/namespace.c:2905) 
> [ 133.979644][ T4356] Code: 01 f0 ff ff 72 0a e8 62 8a c4 ff e9 59 02 00 00 4c 89 64 24 10 48 c7 c7 78 e5 6e 84 e8 8c c8 82 01 48 8b 44 24 08 4c 8b 68 d0 <4d> 8b 65 00 31 ff 4c 89 e6 e8 f5 8f c4 ff 4d 85 e4 74 07 e8 2b 8a
> All code
> ========
>    0:	01 f0                	add    %esi,%eax
>    2:	ff                   	(bad)
>    3:	ff 72 0a             	push   0xa(%rdx)
>    6:	e8 62 8a c4 ff       	call   0xffffffffffc48a6d
>    b:	e9 59 02 00 00       	jmp    0x269
>   10:	4c 89 64 24 10       	mov    %r12,0x10(%rsp)
>   15:	48 c7 c7 78 e5 6e 84 	mov    $0xffffffff846ee578,%rdi
>   1c:	e8 8c c8 82 01       	call   0x182c8ad
>   21:	48 8b 44 24 08       	mov    0x8(%rsp),%rax
>   26:	4c 8b 68 d0          	mov    -0x30(%rax),%r13
>   2a:*	4d 8b 65 00          	mov    0x0(%r13),%r12		<-- trapping instruction
>   2e:	31 ff                	xor    %edi,%edi
>   30:	4c 89 e6             	mov    %r12,%rsi
>   33:	e8 f5 8f c4 ff       	call   0xffffffffffc4902d
>   38:	4d 85 e4             	test   %r12,%r12
>   3b:	74 07                	je     0x44
>   3d:	e8                   	.byte 0xe8
>   3e:	2b                   	.byte 0x2b
>   3f:	8a                   	.byte 0x8a
> 
> Code starting with the faulting instruction
> ===========================================
>    0:	4d 8b 65 00          	mov    0x0(%r13),%r12
>    4:	31 ff                	xor    %edi,%edi
>    6:	4c 89 e6             	mov    %r12,%rsi
>    9:	e8 f5 8f c4 ff       	call   0xffffffffffc49003
>    e:	4d 85 e4             	test   %r12,%r12
>   11:	74 07                	je     0x1a
>   13:	e8                   	.byte 0xe8
>   14:	2b                   	.byte 0x2b
>   15:	8a                   	.byte 0x8a
> [  133.982199][ T4356] RSP: 0018:ffff88819bff7eb8 EFLAGS: 00010202
> [  133.983064][ T4356] RAX: ffff88819a47c338 RBX: 00000000000001b7 RCX: 0000000000000000
> [  133.984255][ T4356] RDX: ffff88819a650000 RSI: 0000000000000000 RDI: 0000000000000000
> [  133.985462][ T4356] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
> [  133.986638][ T4356] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88819a650000
> [  133.987842][ T4356] R13: 0000000000000000 R14: ffff88819bd68e00 R15: 0000000000000001
> [  133.989130][ T4356] FS:  00007f0d165f6740(0000) GS:ffff88842fd00000(0000) knlGS:0000000000000000
> [  133.990567][ T4356] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [  133.991590][ T4356] CR2: 0000000000000000 CR3: 000000019bc54000 CR4: 00000000000406f0
> [  133.992731][ T4356] Call Trace:
> [  133.993247][ T4356]  <TASK>
> [ 133.993714][ T4356] ? __die_body (arch/x86/kernel/dumpstack.c:421) 
> [ 133.994395][ T4356] ? page_fault_oops (arch/x86/mm/fault.c:710) 
> [ 133.995182][ T4356] ? do_user_addr_fault (arch/x86/mm/fault.c:?) 
> [ 133.996009][ T4356] ? exc_page_fault (arch/x86/mm/fault.c:? arch/x86/mm/fault.c:1538) 
> [ 133.996790][ T4356] ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:623) 
> [ 133.997605][ T4356] ? __se_sys_open_tree (fs/mount.h:152 fs/namespace.c:2873 fs/namespace.c:2943 fs/namespace.c:2905) 
> [ 133.998433][ T4356] ? __se_sys_open_tree (fs/namespace.c:2872 fs/namespace.c:2943 fs/namespace.c:2905) 
> [ 133.999267][ T4356] ? do_syscall_64 (arch/x86/entry/common.c:83) 
> [ 133.999925][ T4356] ? do_int80_emulation (arch/x86/entry/common.c:257) 
> [ 134.000690][ T4356] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
> [  134.001567][ T4356]  </TASK>
> [  134.002006][ T4356] Modules linked in: af_key ieee802154_socket ieee802154 caif_socket caif crc_ccitt rxrpc bluetooth rfkill pptp gre pppoe pppox ppp_generic slhc crypto_user scsi_transport_iscsi xfrm_user sctp dccp_ipv4 dccp ipmi_devintf ipmi_msghandler sr_mod cdrom sg ata_generic ata_piix libata sha1_ssse3 aesni_intel scsi_mod scsi_common input_leds serio_raw stm_p_basic
> [  134.007226][ T4356] CR2: 0000000000000000
> [  134.008040][ T4356] ---[ end trace 0000000000000000 ]---
> [ 134.013890][ T4356] RIP: 0010:__se_sys_open_tree (fs/mount.h:152 fs/namespace.c:2873 fs/namespace.c:2943 fs/namespace.c:2905) 
> [ 134.015705][ T4356] Code: 01 f0 ff ff 72 0a e8 62 8a c4 ff e9 59 02 00 00 4c 89 64 24 10 48 c7 c7 78 e5 6e 84 e8 8c c8 82 01 48 8b 44 24 08 4c 8b 68 d0 <4d> 8b 65 00 31 ff 4c 89 e6 e8 f5 8f c4 ff 4d 85 e4 74 07 e8 2b 8a
> All code
> ========
>    0:	01 f0                	add    %esi,%eax
>    2:	ff                   	(bad)
>    3:	ff 72 0a             	push   0xa(%rdx)
>    6:	e8 62 8a c4 ff       	call   0xffffffffffc48a6d
>    b:	e9 59 02 00 00       	jmp    0x269
>   10:	4c 89 64 24 10       	mov    %r12,0x10(%rsp)
>   15:	48 c7 c7 78 e5 6e 84 	mov    $0xffffffff846ee578,%rdi
>   1c:	e8 8c c8 82 01       	call   0x182c8ad
>   21:	48 8b 44 24 08       	mov    0x8(%rsp),%rax
>   26:	4c 8b 68 d0          	mov    -0x30(%rax),%r13
>   2a:*	4d 8b 65 00          	mov    0x0(%r13),%r12		<-- trapping instruction
>   2e:	31 ff                	xor    %edi,%edi
>   30:	4c 89 e6             	mov    %r12,%rsi
>   33:	e8 f5 8f c4 ff       	call   0xffffffffffc4902d
>   38:	4d 85 e4             	test   %r12,%r12
>   3b:	74 07                	je     0x44
>   3d:	e8                   	.byte 0xe8
>   3e:	2b                   	.byte 0x2b
>   3f:	8a                   	.byte 0x8a
> 
> Code starting with the faulting instruction
> ===========================================
>    0:	4d 8b 65 00          	mov    0x0(%r13),%r12
>    4:	31 ff                	xor    %edi,%edi
>    6:	4c 89 e6             	mov    %r12,%rsi
>    9:	e8 f5 8f c4 ff       	call   0xffffffffffc49003
>    e:	4d 85 e4             	test   %r12,%r12
>   11:	74 07                	je     0x1a
>   13:	e8                   	.byte 0xe8
>   14:	2b                   	.byte 0x2b
>   15:	8a                   	.byte 0x8a
> 
> 
> The kernel config and materials to reproduce are available at:
> https://download.01.org/0day-ci/archive/20250304/202503041421.38b0d0c-lkp@xxxxxxxxx
> 
> 
> 
> -- 
> 0-DAY CI Kernel Test Service
> https://github.com/intel/lkp-tests/wiki
> 




[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [NTFS 3]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [NTFS 3]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux