Kernel panicked in "SendBuffAddReq" function of kav4fs_oas(U) module in Red Hat Enterprise Linux.

Solution Unverified - Updated -

Issue

  • Kernel panicked in SendBuffAddReq function of kav4fs_oas module.
[8260891.796342] BUG: unable to handle kernel NULL pointer dereference at           (null)
[8260891.796375] IP: [<ffffffffa06b2217>] SendBuffAddReq+0x2c7/0x790 [kav4fs_oas]
[8260891.796401] PGD 314e79e067 PUD 219c3e4067 PMD 0 
[8260891.796418] Oops: 0002 [#1] SMP 
[8260891.796432] Modules linked in: udf crc_itu_t nls_utf8 isofs kav4fs_oas(OE) redirfs(OE) binfmt_misc fuse xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bonding vfat fat ipmi_ssif iTCO_wdt iTCO_vendor_support intel_powerclamp coretemp intel_rapl iosf_mbi kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr sb_edac sg edac_core i2c_i801 hpilo hpwdt lpc_ich ipmi_si ipmi_msghandler wmi shpchp acpi_power_meter nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sd_mod crc_t10dif sr_mod crct10dif_generic cdrom crct10dif_pclmul
[8260891.796684]  mgag200 crct10dif_common crc32c_intel drm_kms_helper syscopyarea sysfillrect sysimgblt ahci fb_sys_fops libahci ttm libata drm igb tg3 dca ptp pps_core i2c_algo_bit hpsa i2c_core scsi_transport_sas fjes dm_mirror dm_region_hash dm_log dm_mod [last unloaded: kav4fs_oas]
[8260891.796787] CPU: 29 PID: 32278 Comm: oas Tainted: G           OE  ------------   3.10.0-514.16.1.el7.x86_64 #1
[8260891.796815] Hardware name: HP ProLiant DL380 Gen9/ProLiant DL380 Gen9, BIOS P89 02/17/2017
[8260891.796838] task: ffff883e922c8000 ti: ffff880105c98000 task.ti: ffff880105c98000
[8260891.796859] RIP: 0010:[<ffffffffa06b2217>]  [<ffffffffa06b2217>] SendBuffAddReq+0x2c7/0x790 [kav4fs_oas]
[8260891.796887] RSP: 0018:ffff880105c9bdf0  EFLAGS: 00010287
[8260891.796903] RAX: 000000008c000000 RBX: 0000000000020000 RCX: 0000000000020000
[8260891.796923] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[8260891.796942] RBP: ffff880105c9be80 R08: ffffc9001e6ed653 R09: 0000000000000090
[8260891.796962] R10: 0000000000000090 R11: 0000000000020000 R12: 000000000000008c
[8260891.796982] R13: ffff8826ddc85200 R14: ffffc9001e083000 R15: ffff883ffbb0fe40
[8260891.797002] FS:  0000000000000000(0000) GS:ffff883fff540000(0063) knlGS:00000000f74bd700
[8260891.797024] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[8260891.797041] CR2: 0000000000000000 CR3: 000000272936c000 CR4: 00000000003407e0
[8260891.797061] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[8260891.797080] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[8260891.797100] Stack:
[8260891.797108]  0000000000000042 0000000005c9bf48 0000518e00006cf0 0000fd0800000000
[8260891.797132]  00000000e0f3ac28 00000000598c9e49 00000000000021d5 ffff881600000413
[8260891.797155]  000000000000008c 000000018c000000 0000000000000001 0000000000000000
[8260891.797178] Call Trace:
[8260891.797190]  [<ffffffffa06b2ae9>] monitor_daemon_read+0xc9/0x270 [kav4fs_oas]
[8260891.797213]  [<ffffffff812a9274>] ? security_file_permission+0x84/0xa0
[8260891.797234]  [<ffffffff811fe61e>] vfs_read+0x9e/0x170
[8260891.797250]  [<ffffffff811ff1ef>] SyS_read+0x7f/0xe0
[8260891.797268]  [<ffffffff8169908c>] sysenter_dispatch+0x7/0x21
[8260891.797284] Code: 00 ff 15 c5 96 00 00 48 8b 4d a8 8b 15 6f 97 00 00 48 89 0d 5c 97 00 00 48 89 ce 48 89 0d 62 97 00 00 89 1d 54 97 00 00 8b 45 b8 <89> 04 16 8b 05 4c 97 00 00 44 89 e2 4c 89 f6 8d 78 04 89 3d 3d 
[8260891.797379] RIP  [<ffffffffa06b2217>] SendBuffAddReq+0x2c7/0x790 [kav4fs_oas]
[8260891.797401]  RSP <ffff880105c9bdf0>
[8260891.797413] CR2: 0000000000000000
  • Kernel panicked in memmove function which was invoked from kav4fs_oas module.
<1>BUG: unable to handle kernel paging request at ffffc90008e53f2c
<1>IP: [<ffffffff81298697>] memmove+0x37/0x1a0
<4>PGD 81f815067 PUD 41febf067 PMD 415ecd067 PTE 0
<4>Oops: 0000 [#1] SMP
<4>last sysfs file: /sys/devices/pci0000:00/0000:00:08.0/0000:0b:00.0/host3/rport-3:0-1/target3:0:1/3:0:1:0/state
<4>CPU 5
<4>Modules linked in: kav4fs_oas(U) redirfs(U) target_core_iblock target_core_file target_core_pscsi target_core_mod configfs bnx2fc cnic uio fcoe libfcoe libfc cpufreq_ondemand freq_table pcc_cpufreq cachefiles fscache(T) bonding 8021q garp stp llc ipv6 dm_round_robin scsi_dh_emc dm_multipath uinput ipmi_devintf microcode power_meter acpi_ipmi ipmi_si ipmi_msghandler iTCO_wdt iTCO_vendor_support sg lpc_ich mfd_core hpilo hpwdt bnx2 i7core_edac edac_core shpchp ext4 jbd2 mbcache sr_mod cdrom sd_mod crc_t10dif qla2xxx scsi_transport_fc scsi_tgt pata_acpi ata_generic ata_piix hpsa radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
<4>
<4>Pid: 6037, comm: kesl Tainted: G           ---------------  T 2.6.32-504.el6.x86_64 #1 HP ProLiant DL380 G7
<4>RIP: 0010:[<ffffffff81298697>]  [<ffffffff81298697>] memmove+0x37/0x1a0
<4>RSP: 0018:ffff88040f623dc0  EFLAGS: 00010202
<4>RAX: 0000000000000000 RBX: ffff8804dbe9f740 RCX: 00000000000000c4
<4>RDX: 0000000000000026 RSI: ffffc90008e53f2c RDI: 0000000000000000
<4>RBP: ffff88040f623ee8 R08: ffffc90008e53f92 R09: 0000000000001000
<4>R10: 000000000000005e R11: 0000000000001000 R12: 0000000000000001
<4>R13: 0000000000001000 R14: ffff8805c0f1a500 R15: ffffc9000c03a000
<4>FS:  00007fbeaac00700(0000) GS:ffff88042e440000(0000) knlGS:0000000000000000
<4>CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
<4>CR2: ffffc90008e53f2c CR3: 0000000819acf000 CR4: 00000000000007e0
<4>DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
<4>DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
<4>Process kesl (pid: 6037, threadinfo ffff88040f622000, task ffff880414ca9500)
<4>Stack:
<4> ffffffffa05dab11 0000000000000d8c 0000000000000003 0000000000000d8c
<4><d> 0000000000000010 ffff88040000005a ffff880414ca9500 00007fbed400bb30
<4><d> ffff88040f623e90 ffff880414ca9500 ffff880418d518c0 000000005a9a94dc
<4>Call Trace:
<4> [<ffffffffa05dab11>] ? monitor_daemon_read+0x6c1/0xb30 [kav4fs_oas]
<4> [<ffffffff811022d3>] ? trace_nowake_buffer_unlock_commit+0x43/0x60
<4> [<ffffffff8118e855>] vfs_read+0xb5/0x1a0
<4> [<ffffffff8118e991>] sys_read+0x51/0x90
<4> [<ffffffff8100b288>] tracesys+0xd9/0xde
<4>Code: 00 48 39 fe 7d 0f 49 89 f0 49 01 d0 49 39 f8 0f 8f 9f 00 00 00 48 81 fa a8 02 00 00 72 05 40 38 fe 74 41 48 83 ea 20 48 83 ea 20 <4c> 8b 1e 4c 8b 56 08 4c 8b 4e 10 4c 8b 46 18 48 8d 76 20 4c 89
<1>RIP  [<ffffffff81298697>] memmove+0x37/0x1a0
<4> RSP <ffff88040f623dc0>
<4>CR2: ffffc90008e53f2c

Environment

  • Red Hat Enterprise Linux 7
  • 3rd party Kaspersky Anti-Virus Monitor Module for Linux

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content