Decoded stacktrace for 6.14.0-1008-gcp:

$ ./scripts/decode_stacktrace.sh /usr/lib/debug/boot/vmlinux-6.14.0-1008-gcp < 
~/660\ 386885\ BUG\ kernel.txt
[  660.386885] BUG: kernel NULL pointer dereference, address: 0000000000000028
[  660.394066] #PF: supervisor read access in kernel mode
[  660.394068] #PF: error_code(0x0000) - not-present page
[  660.394070] PGD 0 P4D 0
[  660.394074] Oops: Oops: 0000 [#1] SMP NOPTI
[  660.394081] Hardware name: Google Google Compute Engine/Google Compute 
Engine, BIOS Google 05/07/2025
[  660.394083] RIP: 0010:alloc_fs_context (fs/fs_context.c:294 (discriminator 
1)) 
[ 660.394089] Code: 49 89 47 28 48 8b 82 80 0c 00 00 48 85 c0 74 0f c7 80 a8 00 
00 00 00 00 00 00 f0 48 83 00 01 49 89 47 58 48 8b 82 e8 0c 00 00 <4c> 8b 70 28 
b8 01 00 00 00 49 8d be 8c 00 00 00 f0 41 0f c1 86 8c
All code
========
   0:    49 89 47 28              mov    %rax,0x28(%r15)
   4:    48 8b 82 80 0c 00 00     mov    0xc80(%rdx),%rax
   b:    48 85 c0                 test   %rax,%rax
   e:    74 0f                    je     0x1f
  10:    c7 80 a8 00 00 00 00     movl   $0x0,0xa8(%rax)
  17:    00 00 00 
  1a:    f0 48 83 00 01           lock addq $0x1,(%rax)
  1f:    49 89 47 58              mov    %rax,0x58(%r15)
  23:    48 8b 82 e8 0c 00 00     mov    0xce8(%rdx),%rax
  2a:*    4c 8b 70 28              mov    0x28(%rax),%r14        <-- trapping 
instruction
  2e:    b8 01 00 00 00           mov    $0x1,%eax
  33:    49 8d be 8c 00 00 00     lea    0x8c(%r14),%rdi
  3a:    f0                       lock
  3b:    41                       rex.B
  3c:    0f                       .byte 0xf
  3d:    c1                       .byte 0xc1
  3e:    86                       .byte 0x86
  3f:    8c                       .byte 0x8c

Code starting with the faulting instruction
===========================================
   0:    4c 8b 70 28              mov    0x28(%rax),%r14
   4:    b8 01 00 00 00           mov    $0x1,%eax
   9:    49 8d be 8c 00 00 00     lea    0x8c(%r14),%rdi
  10:    f0                       lock
  11:    41                       rex.B
  12:    0f                       .byte 0xf
  13:    c1                       .byte 0xc1
  14:    86                       .byte 0x86
  15:    8c                       .byte 0x8c
[  660.394092] RSP: 0018:ffffb53380a1fb08 EFLAGS: 00010202
[  660.394094] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  660.394096] RDX: ffff8f864a01d300 RSI: 0000000000000000 RDI: 0000000000000000
[  660.394097] RBP: ffffb53380a1fb38 R08: 0000000000000000 R09: 0000000000000000
[  660.394099] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffa02ae940
[  660.394100] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8f8647eded80
[  660.394104] FS:  0000000000000000(0000) GS:ffff8f896fd80000(0000) 
knlGS:0000000000000000
[  660.394106] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  660.394108] CR2: 0000000000000028 CR3: 000000005f440005 CR4: 0000000000370ef0
[  660.394111] Call Trace:
[  660.394113]  <TASK>
[  660.394117] fs_context_for_mount (fs/fs_context.c:334) 
[  660.394121] vfs_kern_mount.part.0 (fs/namespace.c:1291) 
[  660.394125] vfs_kern_mount (fs/namespace.c:1307) 
[  660.394128] efivarfs_pm_notify (fs/efivarfs/super.c:529 (discriminator 1)) 
[  660.394131] ? __pfx_efivarfs_actor (fs/efivarfs/super.c:404) 
[  660.394135] notifier_call_chain (kernel/notifier.c:87) 
[  660.394139] blocking_notifier_call_chain (kernel/notifier.c:381 
kernel/notifier.c:368) 
[  660.394142] pm_notifier_call_chain (kernel/power/main.c:110) 
[  660.394145] snapshot_release (kernel/power/user.c:127) 
[  660.394148] __fput (fs/file_table.c:465 (discriminator 1)) 
[  660.394152] ____fput (fs/file_table.c:493) 
[  660.394155] task_work_run (arch/x86/include/asm/jump_label.h:36 
include/linux/livepatch_sched.h:18 include/linux/sched.h:2095 
kernel/task_work.c:230) 
[  660.394159] do_exit (kernel/exit.c:939) 
[  660.394163] do_group_exit (kernel/exit.c:1069) 
[  660.394166] __x64_sys_exit_group (kernel/exit.c:1098) 
[  660.394170] x64_sys_call (arch/x86/entry/syscall_64.c:32) 
[  660.394173] do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1) 
arch/x86/entry/common.c:83 (discriminator 1)) 
[  660.394176] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394179] ? arch_exit_to_user_mode_prepare.isra.0 
(arch/x86/include/asm/entry-common.h:58 arch/x86/include/asm/entry-common.h:65) 
[  660.394183] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394185] ? syscall_exit_to_user_mode 
(arch/x86/include/asm/jump_label.h:36 
include/linux/context_tracking_state.h:108 include/linux/context_tracking.h:41 
include/linux/entry-common.h:364 kernel/entry/common.c:220) 
[  660.394188] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394190] ? do_syscall_64 (arch/x86/include/asm/cpufeature.h:172 
arch/x86/entry/common.c:98) 
[  660.394193] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394195] ? count_memcg_events.constprop.0 
(arch/x86/include/asm/irqflags.h:158 (discriminator 1) 
include/linux/memcontrol.h:970 (discriminator 1)) 
[  660.394199] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394201] ? handle_mm_fault (mm/memory.c:6071 mm/memory.c:6224) 
[  660.394205] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394207] ? do_user_addr_fault (arch/x86/mm/fault.c:1341) 
[  660.394211] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394213] ? arch_exit_to_user_mode_prepare.isra.0 
(arch/x86/include/asm/entry-common.h:57 (discriminator 1) 
arch/x86/include/asm/entry-common.h:65 (discriminator 1)) 
[  660.394215] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394217] ? irqentry_exit_to_user_mode 
(arch/x86/include/asm/jump_label.h:36 
include/linux/context_tracking_state.h:108 include/linux/context_tracking.h:41 
include/linux/entry-common.h:364 kernel/entry/common.c:233) 
[  660.394220] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394222] ? irqentry_exit (kernel/entry/common.c:367) 
[  660.394224] ? srso_alias_return_thunk (arch/x86/lib/retpoline.S:182) 
[  660.394226] ? exc_page_fault (arch/x86/mm/fault.c:1542) 
[  660.394229] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2113990

Title:
  NULL pointer dereference caught by ubuntu_stress_smoke_test:sut-scan

Status in linux package in Ubuntu:
  Invalid
Status in linux-gcp package in Ubuntu:
  Invalid
Status in linux source package in Plucky:
  New
Status in linux-gcp source package in Plucky:
  New

Bug description:
  SRU cycle 2025.05.19 regression test results showed a kernel panic
  caused by test ubuntu_stress_smoke_test:sut-scan for plucky:linux-gcp
  6.14.0-1008.8

  The failure was subsequently determined to affect the generic kernel
  as well.

  R2IP: 0010:alloc_fs_context+0x98/0x2c0
  [  657.299494] Code: 49 89 47 28 48 8b 82 80 0c 00 00 48 85 c0 74 0f c7 80 a8 
00 00 00 00 00 00 00 f0 48 83 00 01 49 89 47 58 48 8b 82 e8 0c 00 00 <4c> 8b 70 
28 b8 01 00 00 00 49 8d be 8c 00 00 00 f0 41 0f c1 86 8c
  148T36212]: 3R0:SP: 0018:ff3ecfe6c0e2f9e8 EFLAGS: 00010202
  [  657.323687] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 
0000000000000000
  93+009201:0]0 R DX: ff2f619768b20000 RSI: 0000000000000000 RDI: 
0000000000000000
  [  657.338157] RBP: ff3ecfe6c0e2fa18 R08: 0000000000000000 R09: 
0000000000000000
  4c5p3-960-]1 4R-10: 0000000000000000 R11: 0000000000000000 R12: 
ffffffff99cae940
  [  657.352621] R13: 0000000000000000 R14: 0000000000000000 R15: 
ff2f6196c030f480
  5-9s9t4r1e]s sF-S:  0000000000000000(0000) GS:ff2f6199b0c80000(0000) 
knlGS:0000000000000000
  [  657.368129] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
   7k3e9r8n9e]l :CR2: 0000000000000028 CR3: 000000024c840001 CR4: 
0000000000371ef0
  [  657.381315] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
  8 8r5e4p7e]a tDeR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 
0000000000000400
  [  657.395782] Call Trace:
  s9:8 3[3 1d]e v <TASK>
  ice-mapper: ioct[  657.400532]  fs_context_for_mount+0x17/0x30
  [  657.406199]  vfs_kern_mount.part.0+0x19/0xd0
  i1d05 d7a6t]a   vfs_kern_mount+0x13/0x40
  [  657.414338]  efivarfs_pm_notify+0xfe/0x130
  1t8h5e3 6i]o c t? __pfx_efivarfs_actor+0x10/0x10
  [  657.422994]  notifier_call_chain+0x5e/0xc0
  u2r7e1:9 44]2  9blocking_notifier_call_chain+0x41/0x70
  [  657.432171]  pm_notifier_call_chain+0x1a/0x30

  3
  62604255]- 0 snapshot_release+0x71/0xb0
  [  657.440577]  __fput+0xea/0x2d0
  43307:3331]. 9 2____fput+0x15/0x20
  [  657.447148]  task_work_run+0x61/0xb0
  0500 8p2-5l]g  cdo_exit+0x26e/0x4b0
  [  657.454153]  ? do_syscall_64+0x8a/0x170
  1548-0c940s]t d do_group_exit+0x34/0x90
  [  657.461766]  __x64_sys_exit_group+0x18/0x20
  s6s6-0s6m6k]- t x64_sys_call+0x141e/0x2310
  [  657.470019]  do_syscall_64+0x7e/0x170
  e7l3:7 8e0f]i v ? do_read_fault+0xeb/0x1e0
  [  657.477715]  ? do_fault+0x151/0x210
  s8y1n3c4i1n]g   ? handle_pte_fault+0x97/0x1f0
  [  657.485541]  ? __handle_mm_fault+0x3d2/0x7a0
   8s9t9a1t0e]

   ? __count_memcg_events+0xd8/0x1a0
  [  657.494454]  ? count_memcg_events.constprop.0+0x2a/0x50
  90947T7292]: 3 0? handle_mm_fault+0x1b1/0x2d0
  [  657.503978]  ? do_user_addr_fault+0x5af/0x7b0
  0098+40306:] 00 ? arch_exit_to_user_mode_prepare.isra.0+0x22/0xd0
  [  657.515410]  ? irqentry_exit_to_user_mode+0x2d/0x1d0
  2g0c4p75-6] - 14? irqentry_exit+0x21/0x40
  [  657.524324]  ? clear_bhb_loop+0x15/0x70
  2u-8s2t6r4e]s s ? clear_bhb_loop+0x15/0x70
  [  657.532199]  ? clear_bhb_loop+0x15/0x70
  3t6 1k3e4r]n e lentry_SYSCALL_64_after_hwframe+0x76/0x7e
  [  657.541287] RIP: 0033:0x7676cf8f668d
  4e4r9n7e9l]  NCUode: Unable to access opcode bytes at 0x7676cf8f6663.
  [  657.551257] RSP: 002b:00007ffd4c78a648 EFLAGS: 00000246 ORIG_RAX: 
00000000000000e7
  5e8r9 2d7e]r eRfAX: ffffffffffffffda RBX: 0000000000000800 RCX: 
00007676cf8f668d
  [  657.566178] RDX: 00000000000000e7 RSI: ffffffffffffff80 RDI: 
0000000000000000
  ,4 1a3d]d rRess:BP: 0000000000000000 R08: 0000000000000000 R09: 
0000000000000000
  [  657.580649] R10: 0000000000000000 R11: 0000000000000246 R12: 
0000000059682f00
  070808020]0 0R0213: 0000000000000001 R14: 00006373fc42ac80 R15: 
00007676cfbb43b0
  [  657.595119]  </TASK>
  8
  2025-06-04T22[  657.597402] Modules linked in: vfio_iommu_type1 vfio iommufd 
vhost_vsock vhost_net snd_seq vhost snd_seq_device snd_timer snd vhost_iotlb 
tap soundcore zfs(PO) spl(O) cuse dccp_ipv4 dccp atm sm3_generic sm3_avx_x86_64 
sm3 poly1305_generic poly1305_x86_64 nhpoly1305_avx2 nhpoly1305_sse2 nhpoly1305 
libpoly1305 michael_mic md4 streebog_generic rmd160 crc32_generic cmac 
algif_rng twofish_generic twofish_avx_x86_64 twofish_x86_64_3way twofish_x86_64 
twofish_common serpent_avx2 serpent_avx_x86_64 serpent_sse2_x86_64 
serpent_generic fcrypt cast6_avx_x86_64 cast6_generic cast5_avx_x86_64 
cast5_generic cast_common camellia_generic camellia_aesni_avx2 
camellia_aesni_avx_x86_64 camellia_x86_64 blowfish_generic blowfish_x86_64 
blowfish_common ecrdsa_generic algif_skcipher algif_hash 
aria_gfni_avx512_x86_64 aria_aesni_avx2_x86_64 aria_aesni_avx_x86_64 
aria_generic sm4_generic sm4_aesni_avx2_x86_64 sm4_aesni_avx_x86_64 sm4 ccm 
des3_ede_x86_64 des_generic libdes authenc aegis128 aegis128_aesni algif_aead 
af_alg binfmt_misc 8021q
  :30:31.928010+00[  657.597470]  garp mrp stp llc nls_iso8859_1 input_leds 
sch_fq_codel nvme_fabrics efi_pstore dm_multipath vsock_loopback 
vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock vmw_vmci 
dmi_sysfs ip_tables x_tables autofs4 btrfs blake2b_generic raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
raid0 linear polyval_clmulni polyval_generic ghash_clmulni_intel sha256_ssse3 
psmouse sha1_ssse3 serio_raw gve virtio_rng aesni_intel crypto_simd cryptd
  :00 p-lgcp-gcp-6[  657.734115] CR2: 0000000000000028
  [  657.738915] ---[ end trace 0000000000000000 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2113990/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to