System crashed with "BUG: unable to handle kernel NULL pointer dereference" in path_init()
Issue
-
Kernel panic with
BUG: unable to handle kernel NULL pointer dereferencein path_init(). -
Kernel panic with below messages in the kernel ring buffer.
[950058.721837] BUG: unable to handle kernel NULL pointer dereference at 0000000000000041
[950058.721872] IP: [<ffffffffa286b38f>] path_init+0x1f/0x3f0
[950058.722692] PGD 8000000515367067 PUD 5bc95c067 PMD 0
[950058.723386] Oops: 0002 [#1] SMP
[950058.724000] Modules linked in: iptable_nat nf_nat_ipv4 nf_nat tcp_diag udp_diag inet_diag binfmt_misc bridge stp llc gsch(OE) redirfs(OE) bmho
ok(OE) tmhook(OE) nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack iptable_filter vmw_vsock_vmci_transport vsock sb_edac ppdev iosf_mbi
crc32_pclmul ghash_clmulni_intel aesni_intel vmw_balloon lrw gf128mul glue_helper ablk_helper cryptd joydev sg pcspkr parport_pc parport i2c_piix4
vmw_vmci auth_rpcgss sunrpc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic vmwgfx drm_kms_helper
syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix drm mptsas crct10dif_pclmul libata crct10dif_common crc32c_intel nfit scsi_transport_sas mptscsih libnvdimm mptbase serio_raw vmxnet3 drm_panel_orientation_quirks dm_mirror
[950058.727546] dm_region_hash dm_log dm_mod fuse
[950058.728279] CPU: 4 PID: 72879 Comm: expr Kdump: loaded Tainted: G OE ------------ 3.10.0-1160.99.1.el7.x86_64 #1
[950058.729026] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[950058.729788] task: ffff905151415280 ti: ffff905015e14000 task.ti: ffff905015e14000
[950058.730563] RIP: 0010:[<ffffffffa286b38f>] [<ffffffffa286b38f>] path_init+0x1f/0x3f0
[950058.731365] RSP: 0018:ffff905015e17c10 EFLAGS: 00010246
[950058.732139] RAX: 0000000000001051 RBX: 0000000000000001 RCX: 0000000000000001
[950058.732916] RDX: 0000000000000051 RSI: ffff90542ab9c020 RDI: 00000000ffffff9c
[950058.733670] RBP: ffff905015e17c48 R08: ffff905015e17c88 R09: 0000000000000000
[950058.734412] R10: ffff905415e17c00 R11: 0000000000000009 R12: ffff905415e17c00
[950058.735135] R13: ffff90542ab9c000 R14: ffff905015e17dd4 R15: 00000000ffffff9c
[950058.735854] FS: 0000000000000000(0000) GS:ffff90545d700000(0000) knlGS:0000000000000000
[950058.736594] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[950058.737324] CR2: 0000000000000041 CR3: 000000050c410000 CR4: 00000000003607e0
[950058.738052] Call Trace:
[950058.738757] [<ffffffffa291b2fc>] ? security_file_alloc+0x1c/0x30
[950058.739448] [<ffffffffa286dada>] path_openat+0x8a/0x5a0
[950058.740143] [<ffffffffc07fa4ce>] ? gsch_user_path+0xe/0x10 [gsch]
[950058.740834] [<ffffffffc07fcb79>] ? lookup_and_notify+0x69/0x150 [gsch]
[950058.741526] [<ffffffffa286f4dd>] do_filp_open+0x4d/0xc0
[950058.742213] [<ffffffffa284ea46>] ? mem_cgroup_update_page_stat+0x16/0x50
[950058.742906] [<ffffffffa280d9fc>] ? page_add_file_rmap+0x8c/0xc0
[950058.743625] [<ffffffffa287dd47>] ? __alloc_fd+0x47/0x180
[950058.744320] [<ffffffffa285aba4>] do_sys_open+0x124/0x220
[950058.745011] [<ffffffffa285acbe>] SyS_open+0x1e/0x30
[950058.745709] [<ffffffffc06bc0d5>] tmhook_invoke.isra.16+0x45/0x90 [tmhook]
[950058.746421] [<ffffffffc06bc2b1>] tmhook_handler+0x191/0x2f0 [tmhook]
[950058.747119] [<ffffffffa2dc539a>] system_call_fastpath+0x25/0x2a
[950058.747841] Code: ff 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 89 d0 80 cc 10 48 89 e5 41 56 41 55 41 54 53 48 89 cb 48 83 ec 18 f6 c6 20 <c7> 41 40 01 00 00 00 89 41 38 c7 41 44 00 00 00 00 74 6e 80 3e
[950058.749383] RIP [<ffffffffa286b38f>] path_init+0x1f/0x3f0
[950058.750145] RSP <ffff905015e17c10>
[950058.750888] CR2: 0000000000000041
Environment
- Red Hat Enterprise Linux
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.