You can triggered a general protection fault by running the
ubuntu_docker_smoke_test, the test passed with older Eoan kernel in
-updates, but failed with this one in proposed.


[  101.715152] general protection fault: 0000 [#1] SMP PTI
[  101.717403] CPU: 1 PID: 1236 Comm: dockerd Not tainted 5.3.0-52-generic 
#46-Ubuntu
[  101.720424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 
1.10.2-1ubuntu1 04/01/2014
[  101.723856] RIP: 0010:ovl_open_realfile+0x4a/0x150 [overlay]
[  101.725826] Code: 44 8b 6f 40 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 
49 8b 7e 28 41 81 cd 00 00 04 04 e8 cd d4 ff ff 49 89 c7 48 8b 45 c8 <48> 8b 40 
68 48 81 78 60 62 6a 65 6a 0f 84 a6 00 00 00 65 48 8b 04
[  101.731311] RSP: 0018:ffffaa28406afc08 EFLAGS: 00010202
[  101.732773] RAX: 044555892ac42800 RBX: ffff9af67a149ea8 RCX: 0000000000000001
[  101.734759] RDX: 0000000000008000 RSI: ffff9af67a149ea8 RDI: ffff9af67b3d9000
[  101.736866] RBP: ffffaa28406afc50 R08: ffff9af67b031240 R09: 0000000000000000
[  101.738854] R10: ffff9af67a7d6900 R11: 0000000000000000 R12: ffff9af6799a1d00
[  101.740883] R13: 0000000004048001 R14: ffff9af67a1a4818 R15: ffff9af67b031240
[  101.742902] FS:  00007f58a57fa700(0000) GS:ffff9af67db00000(0000) 
knlGS:0000000000000000
[  101.745194] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  101.746798] CR2: 0000000001178b78 CR3: 000000007b060000 CR4: 00000000000006e0
[  101.748817] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  101.750798] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  101.752804] Call Trace:
[  101.753502]  ? ovl_llseek+0x120/0x120 [overlay]
[  101.754770]  ovl_open+0x57/0x90 [overlay]
[  101.755951]  do_dentry_open+0x143/0x3a0
[  101.757013]  vfs_open+0x2d/0x30
[  101.757949]  do_last+0x194/0x8f0
[  101.758843]  path_openat+0x8d/0x270
[  101.759908]  ? __switch_to_asm+0x40/0x70
[  101.760984]  ? __switch_to_asm+0x34/0x70
[  101.762099]  do_filp_open+0x91/0x100
[  101.763088]  ? __alloc_fd+0x46/0x150
[  101.764171]  do_sys_open+0x17e/0x290
[  101.765168]  __x64_sys_openat+0x20/0x30
[  101.766297]  do_syscall_64+0x5a/0x130
[  101.767512]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  101.768932] RIP: 0033:0x56465af612ba
[  101.769922] Code: e8 8b 3d f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 
20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 
f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48
[  101.775167] RSP: 002b:000000c0009567a0 EFLAGS: 00000202 ORIG_RAX: 
0000000000000101
[  101.777440] RAX: ffffffffffffffda RBX: 000000c00005e500 RCX: 000056465af612ba
[  101.779553] RDX: 0000000000080241 RSI: 000000c000814e00 RDI: ffffffffffffff9c
[  101.781538] RBP: 000000c000956818 R08: 0000000000000000 R09: 0000000000000000
[  101.783650] R10: 00000000000001a4 R11: 0000000000000202 R12: ffffffffffffffff
[  101.785789] R13: 0000000000000039 R14: 0000000000000038 R15: 0000000000000080
[  101.787887] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 bpfilter 
br_netfilter bridge stp llc aufs overlay dm_multipath scsi_dh_rdac scsi_dh_emc 
scsi_dh_alua kvm_intel kvm irqbypass joydev input_leds serio_raw mac_hid 
qemu_fw_cfg sch_fq_codel ip_tables x_tables autofs4 btrfs zstd_compress raid10 
raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
libcrc32c raid1 raid0 multipath linear cirrus drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops drm virtio_net net_failover psmouse failover 
virtio_blk i2c_piix4 pata_acpi floppy
[  101.808815] ---[ end trace ef14f7485e54a2a6 ]---
[  101.811218] RIP: 0010:ovl_open_realfile+0x4a/0x150 [overlay]
[  101.814009] Code: 44 8b 6f 40 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 
49 8b 7e 28 41 81 cd 00 00 04 04 e8 cd d4 ff ff 49 89 c7 48 8b 45 c8 <48> 8b 40 
68 48 81 78 60 62 6a 65 6a 0f 84 a6 00 00 00 65 48 8b 04
[  101.821593] RSP: 0018:ffffaa28406afc08 EFLAGS: 00010202
[  101.823778] RAX: 044555892ac42800 RBX: ffff9af67a149ea8 RCX: 0000000000000001
[  101.826528] RDX: 0000000000008000 RSI: ffff9af67a149ea8 RDI: ffff9af67b3d9000
[  101.829350] RBP: ffffaa28406afc50 R08: ffff9af67b031240 R09: 0000000000000000
[  101.831910] R10: ffff9af67a7d6900 R11: 0000000000000000 R12: ffff9af6799a1d00
[  101.834825] R13: 0000000004048001 R14: ffff9af67a1a4818 R15: ffff9af67b031240
[  101.837606] FS:  00007f58a57fa700(0000) GS:ffff9af67db00000(0000) 
knlGS:0000000000000000
[  101.840678] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  101.842914] CR2: 0000000001178b78 CR3: 000000007b060000 CR4: 00000000000006e0
[  101.845479] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  101.848015] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876645

Title:
  Unable to handle kernel pointer dereference in virtual kernel address
  space on Eoan

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1876645/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to