[CentOS] CentOS 7.4 paniced when running LTP tests

Tue Apr 17 09:25:51 UTC 2018
wuzhouhui <wuzhouhui14 at mails.ucas.ac.cn>

LTP version: ltp-full-20180118
Kernel version: 3.10.0-693.el7.x86_64
Reproduce procedure:
    1. cd ltp-full-20180118; ./configure; make && make install
    2. cd /opt/ltp; ./runltp
Trace:
[  377.516270] BUG: unable to handle kernel NULL pointer dereference at           (null)
[  377.521746] IP: [<ffffffff813510a7>] asn1_ber_decoder+0x327/0xd30
[  377.525865] PGD 9c6ea067 PUD 66831067 PMD 0 
[  377.529043] Oops: 0000 [#1] SMP 
[  377.531454] Modules linked in: ext4 mbcache jbd2 loop ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter snd_seq_midi snd_seq_midi_event sb_edac edac_core coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm dm_mod pcspkr joydev snd_timer nfit sg snd vmw_vmci libnvdimm soundcore
[  377.592112]  shpchp i2c_piix4 parport_pc parport ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common drm crc32c_intel ata_piix mptspi libata scsi_transport_spi e1000 mptscsih serio_raw mptbase i2c_core
[  377.618291] CPU: 1 PID: 32027 Comm: add_key02 Not tainted 3.10.0-693.el7.x86_64 #1
[  377.624130] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015
[  377.632341] task: ffff880134c8bf40 ti: ffff8800b04c8000 task.ti: ffff8800b04c8000
[  377.638459] RIP: 0010:[<ffffffff813510a7>]  [<ffffffff813510a7>] asn1_ber_decoder+0x327/0xd30
[  377.645145] RSP: 0018:ffff8800b04cbcc0  EFLAGS: 00010206
[  377.648925] RAX: 000000000000003f RBX: 0000000000000000 RCX: 0000000000000040
[  377.653499] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000070
[  377.659151] RBP: ffff8800b04cbda8 R08: 0000000000019bc0 R09: 0000000000000000
[  377.663875] R10: 0000000000000002 R11: 0000000000000040 R12: 0000000000000000
[  377.668679] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  377.673414] FS:  00007f57fc60f740(0000) GS:ffff880139640000(0000) knlGS:0000000000000000
[  377.678827] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  377.682732] CR2: 0000000000000000 CR3: 00000000a9a11000 CR4: 00000000001407e0
[  377.687576] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  377.692430] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[  377.698824] Stack:
[  377.701875]  ffff880139003be8 0000000000000206 0000000000000202 0000000000000202
[  377.708840]  ffff8800b0535080 ffffffff817167c0 ffff8801356da200 000000000000001c
[  377.716247]  ffff8801356da200 ffff8800b04cbd00 0000000000000070 ffffffff81716740
[  377.723168] Call Trace:
[  377.726482]  [<ffffffff811df8c6>] ? kmem_cache_alloc_trace+0x1d6/0x200
[  377.732479]  [<ffffffff812eeea1>] x509_cert_parse+0x91/0x120
[  377.738012]  [<ffffffff812efb86>] x509_key_preparse+0x26/0x280
[  377.743543]  [<ffffffff812ee45b>] asymmetric_key_preparse+0x5b/0xd0
[  377.749370]  [<ffffffff812a57a6>] key_create_or_update+0x146/0x460
[  377.755015]  [<ffffffff812a71a9>] SyS_add_key+0x119/0x240
[  377.760142]  [<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b
[  377.765606] Code: e0 01 88 85 48 ff ff ff 74 0d 4c 3b 9d 78 ff ff ff 0f 84 99 fd ff ff 48 8b b5 78 ff ff ff 49 8d 43 ff 48 39 f0 0f 86 90 06 00 00 <41> 0f b6 04 34 48 8d 7e 01 48 89 bd 60 ff ff ff 88 45 86 83 e0 
[  377.788713] RIP  [<ffffffff813510a7>] asn1_ber_decoder+0x327/0xd30
[  377.794403]  RSP <ffff8800b04cbcc0>
[  377.798198] CR2: 0000000000000000