Kernel panicked in "SendBuffAddReq" function of kav4fs_oas(U) module in Red Hat Enterprise Linux.
Issue
- Kernel panicked in SendBuffAddReq function of kav4fs_oas module.
[8260891.796342] BUG: unable to handle kernel NULL pointer dereference at (null)
[8260891.796375] IP: [<ffffffffa06b2217>] SendBuffAddReq+0x2c7/0x790 [kav4fs_oas]
[8260891.796401] PGD 314e79e067 PUD 219c3e4067 PMD 0
[8260891.796418] Oops: 0002 [#1] SMP
[8260891.796432] Modules linked in: udf crc_itu_t nls_utf8 isofs kav4fs_oas(OE) redirfs(OE) binfmt_misc fuse xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bonding vfat fat ipmi_ssif iTCO_wdt iTCO_vendor_support intel_powerclamp coretemp intel_rapl iosf_mbi kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr sb_edac sg edac_core i2c_i801 hpilo hpwdt lpc_ich ipmi_si ipmi_msghandler wmi shpchp acpi_power_meter nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sd_mod crc_t10dif sr_mod crct10dif_generic cdrom crct10dif_pclmul
[8260891.796684] mgag200 crct10dif_common crc32c_intel drm_kms_helper syscopyarea sysfillrect sysimgblt ahci fb_sys_fops libahci ttm libata drm igb tg3 dca ptp pps_core i2c_algo_bit hpsa i2c_core scsi_transport_sas fjes dm_mirror dm_region_hash dm_log dm_mod [last unloaded: kav4fs_oas]
[8260891.796787] CPU: 29 PID: 32278 Comm: oas Tainted: G OE ------------ 3.10.0-514.16.1.el7.x86_64 #1
[8260891.796815] Hardware name: HP ProLiant DL380 Gen9/ProLiant DL380 Gen9, BIOS P89 02/17/2017
[8260891.796838] task: ffff883e922c8000 ti: ffff880105c98000 task.ti: ffff880105c98000
[8260891.796859] RIP: 0010:[<ffffffffa06b2217>] [<ffffffffa06b2217>] SendBuffAddReq+0x2c7/0x790 [kav4fs_oas]
[8260891.796887] RSP: 0018:ffff880105c9bdf0 EFLAGS: 00010287
[8260891.796903] RAX: 000000008c000000 RBX: 0000000000020000 RCX: 0000000000020000
[8260891.796923] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[8260891.796942] RBP: ffff880105c9be80 R08: ffffc9001e6ed653 R09: 0000000000000090
[8260891.796962] R10: 0000000000000090 R11: 0000000000020000 R12: 000000000000008c
[8260891.796982] R13: ffff8826ddc85200 R14: ffffc9001e083000 R15: ffff883ffbb0fe40
[8260891.797002] FS: 0000000000000000(0000) GS:ffff883fff540000(0063) knlGS:00000000f74bd700
[8260891.797024] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
[8260891.797041] CR2: 0000000000000000 CR3: 000000272936c000 CR4: 00000000003407e0
[8260891.797061] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[8260891.797080] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[8260891.797100] Stack:
[8260891.797108] 0000000000000042 0000000005c9bf48 0000518e00006cf0 0000fd0800000000
[8260891.797132] 00000000e0f3ac28 00000000598c9e49 00000000000021d5 ffff881600000413
[8260891.797155] 000000000000008c 000000018c000000 0000000000000001 0000000000000000
[8260891.797178] Call Trace:
[8260891.797190] [<ffffffffa06b2ae9>] monitor_daemon_read+0xc9/0x270 [kav4fs_oas]
[8260891.797213] [<ffffffff812a9274>] ? security_file_permission+0x84/0xa0
[8260891.797234] [<ffffffff811fe61e>] vfs_read+0x9e/0x170
[8260891.797250] [<ffffffff811ff1ef>] SyS_read+0x7f/0xe0
[8260891.797268] [<ffffffff8169908c>] sysenter_dispatch+0x7/0x21
[8260891.797284] Code: 00 ff 15 c5 96 00 00 48 8b 4d a8 8b 15 6f 97 00 00 48 89 0d 5c 97 00 00 48 89 ce 48 89 0d 62 97 00 00 89 1d 54 97 00 00 8b 45 b8 <89> 04 16 8b 05 4c 97 00 00 44 89 e2 4c 89 f6 8d 78 04 89 3d 3d
[8260891.797379] RIP [<ffffffffa06b2217>] SendBuffAddReq+0x2c7/0x790 [kav4fs_oas]
[8260891.797401] RSP <ffff880105c9bdf0>
[8260891.797413] CR2: 0000000000000000
- Kernel panicked in memmove function which was invoked from kav4fs_oas module.
<1>BUG: unable to handle kernel paging request at ffffc90008e53f2c
<1>IP: [<ffffffff81298697>] memmove+0x37/0x1a0
<4>PGD 81f815067 PUD 41febf067 PMD 415ecd067 PTE 0
<4>Oops: 0000 [#1] SMP
<4>last sysfs file: /sys/devices/pci0000:00/0000:00:08.0/0000:0b:00.0/host3/rport-3:0-1/target3:0:1/3:0:1:0/state
<4>CPU 5
<4>Modules linked in: kav4fs_oas(U) redirfs(U) target_core_iblock target_core_file target_core_pscsi target_core_mod configfs bnx2fc cnic uio fcoe libfcoe libfc cpufreq_ondemand freq_table pcc_cpufreq cachefiles fscache(T) bonding 8021q garp stp llc ipv6 dm_round_robin scsi_dh_emc dm_multipath uinput ipmi_devintf microcode power_meter acpi_ipmi ipmi_si ipmi_msghandler iTCO_wdt iTCO_vendor_support sg lpc_ich mfd_core hpilo hpwdt bnx2 i7core_edac edac_core shpchp ext4 jbd2 mbcache sr_mod cdrom sd_mod crc_t10dif qla2xxx scsi_transport_fc scsi_tgt pata_acpi ata_generic ata_piix hpsa radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
<4>
<4>Pid: 6037, comm: kesl Tainted: G --------------- T 2.6.32-504.el6.x86_64 #1 HP ProLiant DL380 G7
<4>RIP: 0010:[<ffffffff81298697>] [<ffffffff81298697>] memmove+0x37/0x1a0
<4>RSP: 0018:ffff88040f623dc0 EFLAGS: 00010202
<4>RAX: 0000000000000000 RBX: ffff8804dbe9f740 RCX: 00000000000000c4
<4>RDX: 0000000000000026 RSI: ffffc90008e53f2c RDI: 0000000000000000
<4>RBP: ffff88040f623ee8 R08: ffffc90008e53f92 R09: 0000000000001000
<4>R10: 000000000000005e R11: 0000000000001000 R12: 0000000000000001
<4>R13: 0000000000001000 R14: ffff8805c0f1a500 R15: ffffc9000c03a000
<4>FS: 00007fbeaac00700(0000) GS:ffff88042e440000(0000) knlGS:0000000000000000
<4>CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
<4>CR2: ffffc90008e53f2c CR3: 0000000819acf000 CR4: 00000000000007e0
<4>DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
<4>DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
<4>Process kesl (pid: 6037, threadinfo ffff88040f622000, task ffff880414ca9500)
<4>Stack:
<4> ffffffffa05dab11 0000000000000d8c 0000000000000003 0000000000000d8c
<4><d> 0000000000000010 ffff88040000005a ffff880414ca9500 00007fbed400bb30
<4><d> ffff88040f623e90 ffff880414ca9500 ffff880418d518c0 000000005a9a94dc
<4>Call Trace:
<4> [<ffffffffa05dab11>] ? monitor_daemon_read+0x6c1/0xb30 [kav4fs_oas]
<4> [<ffffffff811022d3>] ? trace_nowake_buffer_unlock_commit+0x43/0x60
<4> [<ffffffff8118e855>] vfs_read+0xb5/0x1a0
<4> [<ffffffff8118e991>] sys_read+0x51/0x90
<4> [<ffffffff8100b288>] tracesys+0xd9/0xde
<4>Code: 00 48 39 fe 7d 0f 49 89 f0 49 01 d0 49 39 f8 0f 8f 9f 00 00 00 48 81 fa a8 02 00 00 72 05 40 38 fe 74 41 48 83 ea 20 48 83 ea 20 <4c> 8b 1e 4c 8b 56 08 4c 8b 4e 10 4c 8b 46 18 48 8d 76 20 4c 89
<1>RIP [<ffffffff81298697>] memmove+0x37/0x1a0
<4> RSP <ffff88040f623dc0>
<4>CR2: ffffc90008e53f2c
Environment
- Red Hat Enterprise Linux 7
- 3rd party Kaspersky Anti-Virus Monitor Module for Linux
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.