[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202509171502.9b679aa8-lkp@intel.com>
Date: Wed, 17 Sep 2025 15:39:58 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Christian Brauner <brauner@...nel.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <netdev@...r.kernel.org>,
<oliver.sang@...el.com>
Subject: [linux-next:master] [net] ec016f0a7d:
BUG:kernel_NULL_pointer_dereference,address
Hello,
kernel test robot noticed "BUG:kernel_NULL_pointer_dereference,address" on:
commit: ec016f0a7d8dd03ecdb19906da9ec617981aab93 ("net: support ns lookup")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
[test failed on linux-next/master c3067c2c38316c3ef013636c93daa285ee6aaa2e]
in testcase: boot
config: x86_64-randconfig-073-20250916
compiler: gcc-14
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+---------------------------------------------------+------------+------------+
| | 29ff7e9e30 | ec016f0a7d |
+---------------------------------------------------+------------+------------+
| boot_successes | 10 | 0 |
| BUG:kernel_NULL_pointer_dereference,address | 0 | 10 |
| Oops | 0 | 10 |
| RIP:__ns_tree_add_raw | 0 | 10 |
| Kernel_panic-not_syncing:Fatal_exception | 0 | 10 |
+---------------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202509171502.9b679aa8-lkp@intel.com
[ 1.560130][ T0] BUG: kernel NULL pointer dereference, address: 0000000000000028
[ 1.560931][ T0] #PF: supervisor read access in kernel mode
[ 1.560931][ T0] #PF: error_code(0x0000) - not-present page
[ 1.560931][ T0] PGD 0 P4D 0
[ 1.560931][ T0] Oops: Oops: 0000 [#1] SMP
[ 1.560931][ T0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G T 6.17.0-rc1-00021-gec016f0a7d8d #1 PREEMPTLAZY
[ 1.560931][ T0] Tainted: [T]=RANDSTRUCT
[ 1.560931][ T0] RIP: 0010:__ns_tree_add_raw (kernel/nstree.c:95 (discriminator 1))
[ 1.560931][ T0] Code: 89 f4 53 48 89 fb 48 83 7f 18 00 75 04 90 0f 0b 90 4d 8d 74 24 18 4c 89 f7 e8 05 ff ff ff 48 8b 43 08 41 8b 94 24 a0 00 00 00 <39> 50 28 74 04 90 0f 0b 90 49 89 df ba 00 00 00 00 4c 89 e0 49 83
All code
========
0: 89 f4 mov %esi,%esp
2: 53 push %rbx
3: 48 89 fb mov %rdi,%rbx
6: 48 83 7f 18 00 cmpq $0x0,0x18(%rdi)
b: 75 04 jne 0x11
d: 90 nop
e: 0f 0b ud2
10: 90 nop
11: 4d 8d 74 24 18 lea 0x18(%r12),%r14
16: 4c 89 f7 mov %r14,%rdi
19: e8 05 ff ff ff call 0xffffffffffffff23
1e: 48 8b 43 08 mov 0x8(%rbx),%rax
22: 41 8b 94 24 a0 00 00 mov 0xa0(%r12),%edx
29: 00
2a:* 39 50 28 cmp %edx,0x28(%rax) <-- trapping instruction
2d: 74 04 je 0x33
2f: 90 nop
30: 0f 0b ud2
32: 90 nop
33: 49 89 df mov %rbx,%r15
36: ba 00 00 00 00 mov $0x0,%edx
3b: 4c 89 e0 mov %r12,%rax
3e: 49 rex.WB
3f: 83 .byte 0x83
Code starting with the faulting instruction
===========================================
0: 39 50 28 cmp %edx,0x28(%rax)
3: 74 04 je 0x9
5: 90 nop
6: 0f 0b ud2
8: 90 nop
9: 49 89 df mov %rbx,%r15
c: ba 00 00 00 00 mov $0x0,%edx
11: 4c 89 e0 mov %r12,%rax
14: 49 rex.WB
15: 83 .byte 0x83
[ 1.560931][ T0] RSP: 0000:ffffffff83a03e70 EFLAGS: 00010202
[ 1.560931][ T0] RAX: 0000000000000000 RBX: ffffffff85498f40 RCX: ffffffff84bee420
[ 1.560931][ T0] RDX: 0000000040000000 RSI: 0000000000000002 RDI: ffffffff8503bbe8
[ 1.560931][ T0] RBP: ffffffff83a03e98 R08: 0000000000000008 R09: ffffffff84bee420
[ 1.560931][ T0] R10: ffffffff84bdd7f0 R11: 0000000000400000 R12: ffffffff83a89ac0
[ 1.560931][ T0] R13: ffffffff83a03ea8 R14: ffffffff83a89ad8 R15: 71f2107931861b27
[ 1.560931][ T0] FS: 0000000000000000(0000) GS:ffff8884ab11b000(0000) knlGS:0000000000000000
[ 1.560931][ T0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1.560931][ T0] CR2: 0000000000000028 CR3: 0000000003a40000 CR4: 00000000000406b0
[ 1.560931][ T0] Call Trace:
[ 1.560931][ T0] <TASK>
[ 1.560931][ T0] net_ns_init (net/core/net_namespace.c:1312 (discriminator 1))
[ 1.560931][ T0] start_kernel (init/main.c:1079)
[ 1.560931][ T0] x86_64_start_reservations (arch/x86/kernel/head64.c:307)
[ 1.560931][ T0] x86_64_start_kernel (??:?)
[ 1.560931][ T0] common_startup_64 (arch/x86/kernel/head_64.S:419)
[ 1.560931][ T0] </TASK>
[ 1.560931][ T0] Modules linked in:
[ 1.560931][ T0] CR2: 0000000000000028
[ 1.560931][ T0] ---[ end trace 0000000000000000 ]---
[ 1.560931][ T0] RIP: 0010:__ns_tree_add_raw (kernel/nstree.c:95 (discriminator 1))
[ 1.560931][ T0] Code: 89 f4 53 48 89 fb 48 83 7f 18 00 75 04 90 0f 0b 90 4d 8d 74 24 18 4c 89 f7 e8 05 ff ff ff 48 8b 43 08 41 8b 94 24 a0 00 00 00 <39> 50 28 74 04 90 0f 0b 90 49 89 df ba 00 00 00 00 4c 89 e0 49 83
All code
========
0: 89 f4 mov %esi,%esp
2: 53 push %rbx
3: 48 89 fb mov %rdi,%rbx
6: 48 83 7f 18 00 cmpq $0x0,0x18(%rdi)
b: 75 04 jne 0x11
d: 90 nop
e: 0f 0b ud2
10: 90 nop
11: 4d 8d 74 24 18 lea 0x18(%r12),%r14
16: 4c 89 f7 mov %r14,%rdi
19: e8 05 ff ff ff call 0xffffffffffffff23
1e: 48 8b 43 08 mov 0x8(%rbx),%rax
22: 41 8b 94 24 a0 00 00 mov 0xa0(%r12),%edx
29: 00
2a:* 39 50 28 cmp %edx,0x28(%rax) <-- trapping instruction
2d: 74 04 je 0x33
2f: 90 nop
30: 0f 0b ud2
32: 90 nop
33: 49 89 df mov %rbx,%r15
36: ba 00 00 00 00 mov $0x0,%edx
3b: 4c 89 e0 mov %r12,%rax
3e: 49 rex.WB
3f: 83 .byte 0x83
Code starting with the faulting instruction
===========================================
0: 39 50 28 cmp %edx,0x28(%rax)
3: 74 04 je 0x9
5: 90 nop
6: 0f 0b ud2
8: 90 nop
9: 49 89 df mov %rbx,%r15
c: ba 00 00 00 00 mov $0x0,%edx
11: 4c 89 e0 mov %r12,%rax
14: 49 rex.WB
15: 83 .byte 0x83
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250917/202509171502.9b679aa8-lkp@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists