Kernel panics at strcmp() function due to third party module hipsec.

Solution Unverified - Updated -

Issue

  • Kernel panics at strcmp() function of third party module hipsec.
BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [<ffffffff812a2f6b>] strcmp+0xb/0x30
PGD 12f5c7067 PUD 166b01067 PMD 0 
Oops: 0000 [#1] SMP 
last sysfs file: /sys/devices/system/cpu/online
CPU 0 
Modules linked in: dm_snapshot dm_bufio hipsec(U) schook(U) 8021q garp stp llc vsock(U) dm_multipath ppdev parport_pc parport microcode vmware_balloon vmci(U) i2c_piix4 sg shpchp ext4 jbd2 mbcache crc32c_intel be2iscsi bnx2i cnic uio cxgb4i sd_mod crc_t10dif iw_cxgb4 iw_cm sr_mod cxgb4 cdrom cxgb3i libcxgbi iw_cxgb3 vmxnet3 ib_core ib_addr vmw_pvscsi ipv6 pata_acpi cxgb3 ata_generic mdio ata_piix libiscsi_tcp qla4xxx iscsi_boot_sysfs libiscsi scsi_transport_iscsi vmwgfx ttm drm_kms_helper drm i2c_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib]

Pid: 14342, comm: bash Not tainted 2.6.32-696.1.1.el6.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform
RIP: 0010:[<ffffffff812a2f6b>]  [<ffffffff812a2f6b>] strcmp+0xb/0x30
RSP: 0018:ffff88012a253d08  EFLAGS: 00010282
RAX: 0000000000000062 RBX: ffff8801320eae80 RCX: 0000000000000000
RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffff8801023186b8
RBP: ffff88012a253d08 R08: 0000000000000065 R09: 6c6f632f642e656c
R10: 632f642e656c6966 R11: 6f72702f6374652f R12: ffff8801023186b8
R13: ffff8801320eae80 R14: ffffffffa05d4d10 R15: ffff880105382000
FS:  00007fca840e5700(0000) GS:ffff880028200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000012209c000 CR4: 00000000000407f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process bash (pid: 14342, threadinfo ffff88012a250000, task ffff880102318040)
Stack:
 ffff88012a253d38 ffffffffa05d2a9a 0000000000000003 ffff88012a253dc8
<d> ffff880235da0000 0000000000000000 ffff88012a253d88 ffffffffa05d3384
<d> 0000000063cc064f 0000000000000000 ffff88012a253d88 0000000000000000
Call Trace:
 [<ffffffffa05d2a9a>] hip_search_exclusion_list+0x4a/0x60 [hipsec]
 [<ffffffffa05d3384>] hip_access_authorize+0x254/0x2d0 [hipsec]
 [<ffffffffa05d42f7>] hip_sys_openat+0xe7/0x4e0 [hipsec]
 [<ffffffff8106c480>] ? default_wake_function+0x0/0x20
 [<ffffffff81196bc0>] ? sys_open+0x0/0x30
 [<ffffffffa05d470a>] hip_sys_open+0x1a/0x22 [hipsec]
 [<ffffffffa05ca39d>] schook_stub_open+0x5d/0xb0 [schook]
 [<ffffffff8100b0d2>] system_call_fastpath+0x16/0x1b
Code: 84 ff 40 88 39 74 0d 48 83 c1 01 48 83 ea 01 75 e7 c6 01 00 c9 c3 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 0f 1f 40 00 0f b6 07 <0f> b6 16 48 83 c7 01 48 83 c6 01 38 d0 75 0e 84 c0 75 ea 31 c0 
RIP  [<ffffffff812a2f6b>] strcmp+0xb/0x30
 RSP <ffff88012a253d08>
CR2: 0000000000000000

Environment

  • Red Hat Enterprise Linux 7
  • Red Hat Enterprise Linux 6
  • Third party kernel module [hipsec]

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content