1. Please describe the problem: During CKI tests we've hit kernel oops and this message is shown [12313.383197] restraintd[3202]: ** Fetching task: 128836175 [/mnt/tests/gitlab.com/cki-project/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/socket/fuzz] [12314.836237] restraintd[3202]: ** Preparing metadata [12315.352908] restraintd[3202]: ** Refreshing peer role hostnames: Retries 0 [12315.891257] restraintd[3202]: ** Updating env vars [12315.891390] restraintd[3202]: ** Updating external watchdog: 3360 seconds [12316.559514] restraintd[3202]: ** Installing dependencies [12324.068371] restraintd[3202]: ** Running task: 128836175 [Networking socket: fuzz] [12326.163960] NET: Registered PF_KEY protocol family [12326.243961] kernel tried to execute exec-protected page (c00800001067a698) - exploit attempt? (uid: 0) [12326.244004] BUG: Unable to handle kernel instruction fetch [12326.244018] Faulting instruction address: 0xc00800001067a698 [12326.244035] Oops: Kernel access of bad area, sig: 11 [#1] [12326.244048] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV [12326.244066] Modules linked in: ib_core af_key sctp ip6_udp_tunnel udp_tunnel mlx4_en mlx4_core md4 cifs libdes libarc4 dns_resolver nls_utf8 isofs kvm_hv kvm vfio_iommu_spapr_tce vfio_spapr_eeh vfio vhost_net tap vhost_vsock vhost vhost_iotlb snd_seq_dummy minix binfmt_misc can_raw can nfsv3 nfs_acl nfs lockd grace fscache netfs tun brd overlay exfat vfat fat loop vsock_loopback vmw_vsock_virtio_transport_common vsock n_gsm pps_ldisc ppp_synctty mkiss ax25 ppp_async ppp_generic serport slcan slip slhc snd_hrtimer snd_seq snd_seq_device snd_timer snd soundcore pcrypt crypto_user n_hdlc rfkill sunrpc joydev i40e ses enclosure scsi_transport_sas crct10dif_vpmsum at24 regmap_i2c ofpart tpm_i2c_nuvoton ipmi_powernv ipmi_devintf powernv_flash ipmi_msghandler mtd opal_prd rtc_opal i2c_opal fuse zram ip_tables xfs ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec drm_ttm_helper ttm drm vmx_crypto crc32c_vpmsum i2c_core aacraid [12326.244215] drm_panel_orientation_quirks [last unloaded: dummy] [12326.244372] CPU: 36 PID: 7 Comm: kworker/u256:0 Not tainted 5.14.0-0.rc1.20210714git40226a3d96ef.18.test.fc35.ppc64le #1 [12326.244397] Workqueue: gid-cache-wq netdevice_event_work_handler [ib_core] [12326.244443] NIP: c00800001067a698 LR: c00800001067a698 CTR: c000000000552490 [12326.244462] REGS: c00000001291b950 TRAP: 0400 Not tainted (5.14.0-0.rc1.20210714git40226a3d96ef.18.test.fc35.ppc64le) [12326.244484] MSR: 9000000040009033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 44002288 XER: 2004002d [12326.244516] CFAR: c000000000552724 IRQMASK: 0 [12326.244516] GPR00: c00800001067a698 c00000001291bbf0 c000000002a88b00 0000000000000000 [12326.244516] GPR04: 0000000000000000 00000000c0000000 c000000016887ce0 e07c8816000000c0 [12326.244516] GPR08: 0000000000000001 0000000000000000 0000000000000000 c0080000106a5a50 [12326.244516] GPR12: 0000000084002288 c0000007fffb8a00 c000000000199fe8 c000000004041300 [12326.244516] GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [12326.244516] GPR20: 0000000000000000 0000000000000000 c000000002b8ba40 c0000000044b1e6c [12326.244516] GPR24: c000000002ae0a30 0000000000000000 c000000002ae03c0 c000200035bd5800 [12326.244516] GPR28: c000000016887d30 0000000000000001 c000000016887c80 c000000016887d30 [12326.244681] NIP [c00800001067a698] netdevice_event_work_handler+0xc0/0xf0 [ib_core] [12326.244724] LR [c00800001067a698] netdevice_event_work_handler+0xc0/0xf0 [ib_core] [12326.244767] Call Trace: [12326.244776] [c00000001291bbf0] [c00800001067a698] netdevice_event_work_handler+0xc0/0xf0 [ib_core] (unreliable) [12326.244825] [c00000001291bc30] [c00000000018b058] process_one_work+0x368/0x840 [12326.244849] [c00000001291bd10] [c00000000018b5d8] worker_thread+0xa8/0x540 [12326.244869] [c00000001291bda0] [c00000000019a180] kthread+0x1a0/0x1b0 [12326.244888] [c00000001291be10] [c00000000000cfd4] ret_from_kernel_thread+0x5c/0x64 [12326.244908] Instruction dump: [12326.244920] e90d0030 e92905f8 3bff0020 7d49402e 394affff 7d49412e 4802a279 e8410018 [12326.244948] 7c3fe040 4082ff88 7fc3f378 4802b3bd <e8410018> 38210040 e8010010 eb81ffe0 [12326.244977] ---[ end trace 6653f7b648816896 ]--- [12326.285967] NET: Registered PF_SMC protocol family [12326.325230] NET: Registered PF_KCM protocol family [12326.334207] can: request_module (can-proto-0) failed. [12326.448865] NET: Registered PF_RXRPC protocol family [12326.448885] Key type rxrpc registered [12326.448898] Key type rxrpc_s registered [12326.482435] NET: Registered PF_PPPOX protocol family [12326.513052] can: request_module (can-proto-0) failed. [12327.246335] [12327.246358] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [12327.246378] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 7, name: kworker/u256:0 [12327.246396] INFO: lockdep is turned off. [12327.246407] irq event stamp: 7836392 [12327.246417] hardirqs last enabled at (7836391): [<c0000000012cd5a4>] _raw_spin_unlock_irq+0x44/0x80 [12327.246441] hardirqs last disabled at (7836392): [<c0000000012c13e0>] __schedule+0x140/0x1d30 [12327.246465] softirqs last enabled at (7836160): [<c00000000108403c>] netlink_release+0x53c/0xc80 [12327.246487] softirqs last disabled at (7836158): [<c00000000108403c>] netlink_release+0x53c/0xc80 [12327.246509] CPU: 36 PID: 7 Comm: kworker/u256:0 Tainted: G D --------- --- 5.14.0-0.rc1.20210714git40226a3d96ef.18.test.fc35.ppc64le #1 [12327.246537] Workqueue: gid-cache-wq netdevice_event_work_handler [ib_core] [12327.246581] Call Trace: [12327.246589] [c00000001291b610] [c000000000b115b4] dump_stack_lvl+0x98/0xe0 (unreliable) [12327.246612] [c00000001291b650] [c0000000001ab1ec] ___might_sleep+0x2dc/0x300 [12327.246633] [c00000001291b6e0] [c00000000017843c] exit_signals+0x4c/0x490 [12327.246654] [c00000001291b730] [c000000000162394] do_exit+0xf4/0xe50 [12327.246674] [c00000001291b7f0] [c00000000002a460] oops_end+0x1b0/0x1e0 [12327.246694] [c00000001291b870] [c00000000008f2a4] __bad_page_fault+0x174/0x190 [12327.246715] [c00000001291b8e0] [c000000000008cf8] instruction_access_common_virt+0x198/0x1a0 [12327.246740] --- interrupt: 400 at netdevice_event_work_handler+0xc0/0xf0 [ib_core] [12327.246781] NIP: c00800001067a698 LR: c00800001067a698 CTR: c000000000552490 [12327.246798] REGS: c00000001291b950 TRAP: 0400 Tainted: G D --------- --- (5.14.0-0.rc1.20210714git40226a3d96ef.18.test.fc35.ppc64le) [12327.246825] MSR: 9000000040009033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 44002288 XER: 2004002d [12327.246855] CFAR: c000000000552724 IRQMASK: 0 [12327.246855] GPR00: c00800001067a698 c00000001291bbf0 c000000002a88b00 0000000000000000 [12327.246855] GPR04: 0000000000000000 00000000c0000000 c000000016887ce0 e07c8816000000c0 [12327.246855] GPR08: 0000000000000001 0000000000000000 0000000000000000 c0080000106a5a50 [12327.246855] GPR12: 0000000084002288 c0000007fffb8a00 c000000000199fe8 c000000004041300 [12327.246855] GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [12327.246855] GPR20: 0000000000000000 0000000000000000 c000000002b8ba40 c0000000044b1e6c [12327.246855] GPR24: c000000002ae0a30 0000000000000000 c000000002ae03c0 c000200035bd5800 [12327.246855] GPR28: c000000016887d30 0000000000000001 c000000016887c80 c000000016887d30 [12327.247019] NIP [c00800001067a698] netdevice_event_work_handler+0xc0/0xf0 [ib_core] [12327.247060] LR [c00800001067a698] netdevice_event_work_handler+0xc0/0xf0 [ib_core] [12327.247102] --- interrupt: 400 [12327.247113] [c00000001291bc30] [c00000000018b058] process_one_work+0x368/0x840 [12327.247135] [c00000001291bd10] [c00000000018b5d8] worker_thread+0xa8/0x540 [12327.247154] [c00000001291bda0] [c00000000019a180] kthread+0x1a0/0x1b0 [12327.247173] [c00000001291be10] [c00000000000cfd4] ret_from_kernel_thread+0x5c/0x64 [12327.576493] Bluetooth: Core ver 2.22 [12327.576654] NET: Registered PF_BLUETOOTH protocol family [12327.576670] Bluetooth: HCI device and connection manager initialized [12327.576691] Bluetooth: HCI socket layer initialized [12327.576707] Bluetooth: L2CAP socket layer initialized [12327.576731] Bluetooth: SCO socket layer initialized [12327.703317] NET: Registered PF_IEEE802154 protocol family [12327.850720] can: request_module (can-proto-0) failed. [12328.010416] can: request_module (can-proto-0) failed. [12328.218596] can: request_module (can-proto-0) failed. 2. What is the Version-Release number of the kernel: kernel-5.14.0-0.rc1.20210714git40226a3d96ef.18.test.fc35.ppc64le We've seen similar message running the following tests: https://gitlab.com/cki-project/kernel-tests/-/tree/main/networking/socket/fuzz https://gitlab.com/cki-project/kernel-tests/-/tree/main/filesystems/general/pjd-fstest