[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+G9fYvB5KmpJmwu+gkM4UiWFTwFVuRFZvAj7Kojw0o-raCezA@mail.gmail.com>
Date: Mon, 4 Jul 2022 15:51:44 +0530
From: Naresh Kamboju <naresh.kamboju@...aro.org>
To: open list <linux-kernel@...r.kernel.org>,
LTP List <ltp@...ts.linux.it>, regressions@...ts.linux.dev,
lkft-triage@...ts.linaro.org
Cc: Andy Lutomirski <luto@...capital.net>,
Thomas Gleixner <tglx@...utronix.de>,
Peter Zijlstra <peterz@...radead.org>
Subject: 5.19.0-rc5: qemu-i386: traps: PANIC: double fault, error_code: 0x0
Following kernel crash noticed on qemu-i386 while running LTP cve tests
Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>
metadata:
git_ref: master
git_repo: https://gitlab.com/Linaro/lkft/mirrors/torvalds/linux-mainline
git_sha: 88084a3df1672e131ddc1b4e39eeacfd39864acf
git_describe: v5.19-rc5
kernel_version: 5.19.0-rc5
kernel-config: https://builds.tuxbuild.com/2BSF0Azg4qZOVFsPdPsWOT0KBzM/config
artifact-location: https://builds.tuxbuild.com/2BSF0Azg4qZOVFsPdPsWOT0KBzM/
System.map: https://builds.tuxbuild.com/2BSF0Azg4qZOVFsPdPsWOT0KBzM/System.map
vmlinux.xz: https://builds.tuxbuild.com/2BSF0Azg4qZOVFsPdPsWOT0KBzM/vmlinux.xz
steps to reproduce:
cd /opt/ltp
./runltp -p -q -f cve
cve-2014-0196.c:125: TPASS: Nothing bad happened, probably.
Summary:
passed 1
failed 0
broken 0
skipped 0
warnings 0
gethostbyname_r01 1 TPASS : not vulnerable
tst_test.c:1433: TINFO: Timeout per run is 0h 15m 00s
<47>[ 916.714682] systemd-journald[195]: Sent WATCHDOG=1 notification.
<47>[ 916.915653] systemd-journald[195]: Successfully sent stream
file descriptor to service manager.
<0>[ 920.086226] traps: PANIC: double fault, error_code: 0x0
<4>[ 920.087343] double fault: 0000 [#1] PREEMPT SMP
<4>[ 920.087914] CPU: 1 PID: 15074 Comm: keyctl02 Not tainted 5.19.0-rc5 #1
<4>[ 920.088131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009),
BIOS 1.14.0-2 04/01/2014
<4>[ 920.088484] EIP: atomic64_add_return_cx8+0x21/0x2c
<4>[ 920.088700] Code: 90 f0 0f c7 0e 75 fa c3 90 55 53 56 57 89 c6
89 d7 89 cd 89 d8 89 ca f0 0f c7 09 89 c3 89 d1 01 f3 11 f9 f0 0f c7
4d 00 75 f1 <89> d8 89 ca 5f 5e 5b 5d c3 90 90 55 53 56 57 89 c6 89 d7
89 cd 89
<4>[ 920.088700] EAX: 00000011 EBX: 00000010 ECX: 00000000 EDX: 00000000
<4>[ 920.088700] ESI: ffffffff EDI: ffffffff EBP: c1df3bb0 ESP: c3479eb0
<4>[ 920.088700] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: ffffffff
<4>[ 920.088700] CR0: 80050033 CR2: 01f17320 CR3: 0a126000 CR4: 000006d0
<4>[ 920.088700] Call Trace:
<4>[ 920.088700] ? pids_release+0x32/0x50
<4>[ 920.088700] ? cgroup_release+0x41/0xe0
<4>[ 920.088700] ? release_task+0x61/0x640
<4>[ 920.088700] ? trace_preempt_on+0x28/0x30
<4>[ 920.088700] ? _raw_write_unlock_irq+0x1b/0x30
<4>[ 920.088700] ? preempt_count_sub+0x7a/0xe0
<4>[ 920.088700] ? do_exit+0x50a/0x910
<4>[ 920.088700] ? syscall_enter_from_user_mode_work+0x135/0x150
<4>[ 920.088700] ? __ia32_sys_exit+0x15/0x20
<4>[ 920.088700] ? __do_fast_syscall_32+0x86/0xd0
<4>[ 920.088700] ? __this_cpu_preempt_check+0xf/0x11
<4>[ 920.088700] ? fpregs_restore_userregs+0x71/0xf0
<4>[ 920.088700] ? syscall_exit_to_user_mode+0x3c/0x60
<4>[ 920.088700] ? ret_from_fork+0x10/0x28
<4>[ 920.088700] ? do_fast_syscall_32+0x29/0x60
<4>[ 920.088700] ? do_SYSENTER_32+0x12/0x20
<4>[ 920.088700] ? entry_SYSENTER_32+0x98/0xf1
<4>[ 920.088700] Modules linked in:
<4>[ 920.088700] ---[ end trace 0000000000000000 ]---
<4>[ 920.088700] EIP: atomic64_add_return_cx8+0x21/0x2c
<4>[ 920.088700] Code: 90 f0 0f c7 0e 75 fa c3 90 55 53 56 57 89 c6
89 d7 89 cd 89 d8 89 ca f0 0f c7 09 89 c3 89 d1 01 f3 11 f9 f0 0f c7
4d 00 75 f1 <89> d8 89 ca 5f 5e 5b 5d c3 90 90 55 53 56 57 89 c6 89 d7
89 cd 89
<4>[ 920.088700] EAX: 00000011 EBX: 00000010 ECX: 00000000 EDX: 00000000
<4>[ 920.088700] ESI: ffffffff EDI: ffffffff EBP: c1df3bb0 ESP: c3479eb0
<4>[ 920.088700] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: ffffffff
<4>[ 920.088700] CR0: 80050033 CR2: 01f17320 CR3: 0a126000 CR4: 000006d0
<0>[ 920.088700] Kernel panic - not syncing: Fatal exception in interrupt
<0>[ 920.088700] Kernel Offset: disabled
links,
https://qa-reports.linaro.org/lkft/linux-mainline-master/build/v5.19-rc5/testrun/10489457/suite/log-parser-test/tests/
--
Linaro LKFT
https://lkft.linaro.org
Powered by blists - more mailing lists