Kernel crashed in hip_fop_read() function of an unsigned kernel module [hipsec].
Issue
- Kernel crashed in hip_fop_read() function of an unsigned kernel module [hipsec].
[ 66.506730] BUG: unable to handle kernel paging request at 00000000099ad480
[ 66.506735] IP: [<ffffffffa0558ca3>] hip_fop_read+0x23/0x40 [hipsec]
[ 66.506740] PGD 341bfb067 PUD 341bf4067 PMD 3f97ad067 PTE 800000041d580867
[ 66.506744] Oops: 0001 [#1] SMP
[ 66.506746] Modules linked in: hipsec(OE) binfmt_misc isofs fuse xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter schook(OE) vmw_vsock_vmci_transport vsock intel_powerclamp coretemp iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ppdev vmw_balloon pcspkr vmw_vmci sg shpchp i2c_piix4 parport_pc parport nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif crct10dif_generic ata_generic pata_acpi vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt crct10dif_pclmul crct10dif_common fb_sys_fops
[ 66.506780] crc32c_intel ttm drm serio_raw ata_piix vmw_pvscsi vmxnet3 libata i2c_core floppy fjes dm_mirror dm_region_hash dm_log dm_mod [last unloaded: hipsec]
[ 66.506789] CPU: 2 PID: 4745 Comm: hipus Tainted: G OE ------------ 3.10.0-514.10.2.el7.x86_64 #1
[ 66.506791] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[ 66.506793] task: ffff88038c664e70 ti: ffff88009ed5c000 task.ti: ffff88009ed5c000
[ 66.506794] RIP: 0010:[<ffffffffa0558ca3>] [<ffffffffa0558ca3>] hip_fop_read+0x23/0x40 [hipsec]
[ 66.506797] RSP: 0018:ffff88009ed5fea8 EFLAGS: 00010246
[ 66.506798] RAX: 0000000000000000 RBX: 00000000099ad470 RCX: 0000000000000000
[ 66.506799] RDX: ffff880034480008 RSI: 0000000000000286 RDI: 0000000000000286
[ 66.506800] RBP: ffff88009ed5feb0 R08: 0000000000000286 R09: ffff88043fbd40c0
[ 66.506801] R10: 00000000000000a0 R11: 0000000000000000 R12: 00000000099ad470
[ 66.506802] R13: ffff88009ed5ff00 R14: 0000000000001000 R15: 0000000000001000
[ 66.506804] FS: 0000000000000000(0000) GS:ffff88043fc80000(0063) knlGS:00000000f77e9b70
[ 66.506805] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
[ 66.506806] CR2: 00000000099ad480 CR3: 0000000341beb000 CR4: 00000000003407e0
[ 66.506843] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 66.506859] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 66.506860] Stack:
[ 66.506861] ffff8800b5f3e600 ffff88009ed5fee8 ffffffff811fe19e ffff8800b5f3e600
[ 66.506863] 0000000000000001 00000000099ad470 0000000000001000 0000000000001000
[ 66.506865] ffff88009ed5ff30 ffffffff811fed6f 0000000000000000 0000000000000000
[ 66.506867] Call Trace:
[ 66.506871] [<ffffffff811fe19e>] vfs_read+0x9e/0x170
[ 66.506873] [<ffffffff811fed6f>] SyS_read+0x7f/0xe0
[ 66.506875] [<ffffffff811fecf0>] ? __kernel_write+0x140/0x140
[ 66.506879] [<ffffffffa04214c4>] schook_stub_read+0xa4/0xb0 [schook]
[ 66.506884] [<ffffffff8111efe6>] ? __audit_syscall_exit+0x1e6/0x280
[ 66.506888] [<ffffffff81698a0c>] sysenter_dispatch+0x7/0x21
[ 66.506889] Code: 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 83 c7 40 89 d1 48 89 e5 53 48 89 f3 48 8b 77 68 48 89 da e8 b1 f7 ff ff 85 c0 78 0d <8b> 43 10 5b 5d c3 0f 1f 80 00 00 00 00 5b 48 98 5d c3 66 66 2e
[ 66.506909] RIP [<ffffffffa0558ca3>] hip_fop_read+0x23/0x40 [hipsec]
[ 66.506912] RSP <ffff88009ed5fea8>
[ 66.506913] CR2: 00000000099ad480
Environment
- Red Hat Enterprise Linux 7
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.