Kernel crashed in hip_fop_read() function of an unsigned kernel module [hipsec].
Issue
- Kernel crashed in hip_fop_read() function of an unsigned kernel module [hipsec].
[ 66.506730] BUG: unable to handle kernel paging request at 00000000099ad480
[ 66.506735] IP: [<ffffffffa0558ca3>] hip_fop_read+0x23/0x40 [hipsec]
[ 66.506740] PGD 341bfb067 PUD 341bf4067 PMD 3f97ad067 PTE 800000041d580867
[ 66.506744] Oops: 0001 [#1] SMP
[ 66.506746] Modules linked in: hipsec(OE) binfmt_misc isofs fuse xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter schook(OE) vmw_vsock_vmci_transport vsock intel_powerclamp coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev vmw_balloon pcspkr vmw_vmci sg shpchp i2c_piix4 parport_pc parport nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt crct10dif_pclmul crct10dif_common fb_sys_fops
[ 66.506780] crc32c_intel ttm drm serio_raw ata_piix vmw_pvscsi vmxnet3 libata i2c_core floppy fjes dm_mirror dm_region_hash dm_log dm_mod [last unloaded: hipsec]
[ 66.506789] CPU: 2 PID: 4745 Comm: hipus Tainted: G OE ------------ 3.10.0-514.10.2.el7.x86_64 #1
[ 66.506791] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[ 66.506793] task: ffff88038c664e70 ti: ffff88009ed5c000 task.ti: ffff88009ed5c000
[ 66.506794] RIP: 0010:[<ffffffffa0558ca3>] [<ffffffffa0558ca3>] hip_fop_read+0x23/0x40 [hipsec]
[ 66.506797] RSP: 0018:ffff88009ed5fea8 EFLAGS: 00010246
[ 66.506798] RAX: 0000000000000000 RBX: 00000000099ad470 RCX: 0000000000000000
[ 66.506799] RDX: ffff880034480008 RSI: 0000000000000286 RDI: 0000000000000286
[ 66.506800] RBP: ffff88009ed5feb0 R08: 0000000000000286 R09: ffff88043fbd40c0
[ 66.506801] R10: 00000000000000a0 R11: 0000000000000000 R12: 00000000099ad470
[ 66.506802] R13: ffff88009ed5ff00 R14: 0000000000001000 R15: 0000000000001000
[ 66.506804] FS: 0000000000000000(0000) GS:ffff88043fc80000(0063) knlGS:00000000f77e9b70
[ 66.506805] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
[ 66.506806] CR2: 00000000099ad480 CR3: 0000000341beb000 CR4: 00000000003407e0
[ 66.506843] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 66.506859] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 66.506860] Stack:
[ 66.506861] ffff8800b5f3e600 ffff88009ed5fee8 ffffffff811fe19e ffff8800b5f3e600
[ 66.506863] 0000000000000001 00000000099ad470 0000000000001000 0000000000001000
[ 66.506865] ffff88009ed5ff30 ffffffff811fed6f 0000000000000000 0000000000000000
[ 66.506867] Call Trace:
[ 66.506871] [<ffffffff811fe19e>] vfs_read+0x9e/0x170
[ 66.506873] [<ffffffff811fed6f>] SyS_read+0x7f/0xe0
[ 66.506875] [<ffffffff811fecf0>] ? __kernel_write+0x140/0x140
[ 66.506879] [<ffffffffa04214c4>] schook_stub_read+0xa4/0xb0 [schook]
[ 66.506884] [<ffffffff8111efe6>] ? __audit_syscall_exit+0x1e6/0x280
[ 66.506888] [<ffffffff81698a0c>] sysenter_dispatch+0x7/0x21
[ 66.506889] Code: 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 83 c7 40 89 d1 48 89 e5 53 48 89 f3 48 8b 77 68 48 89 da e8 b1 f7 ff ff 85 c0 78 0d <8b> 43 10 5b 5d c3 0f 1f 80 00 00 00 00 5b 48 98 5d c3 66 66 2e
[ 66.506909] RIP [<ffffffffa0558ca3>] hip_fop_read+0x23/0x40 [hipsec]
[ 66.506912] RSP <ffff88009ed5fea8>
[ 66.506913] CR2: 00000000099ad480
Environment
- Red Hat Enterprise Linux 7
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
