kernel crashes in set_rodata_ptr+0x3a/0xb0 [ktap_88469] with BUG: unable to handle kernel paging request at ffffffff816b7590

Solution Unverified - Updated -

Issue

  • System crashes with the following messages.
[ 3488.131415] BUG: unable to handle kernel paging request at ffffffff816b7590
[ 3488.131471] IP: [<ffffffffa032f48a>] set_rodata_ptr+0x3a/0xb0 [ktap_88469]
[ 3488.131542] PGD 190d067 PUD 190e063 PMD 16001e1 
[ 3488.131579] Oops: 0003 [#1] SMP 
[ 3488.131600] Modules linked in: splxmod(OF) ktap_88469(OF) ipt_REJECT nf_log_ipv4 nf_log_common xt_LOG nf_conntrack_ipv4 nf_defrag_ipv4 xt_iprange xt_multiport xt_conntrack nf_conntrack iptable_filter coretemp crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon serio_raw pcspkr sg parport_pc parport i2c_piix4 shpchp vmw_vmci uinput ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_common vmwgfx drm_kms_helper ttm ata_piix drm libata vmxnet3 i2c_core vmw_pvscsi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: splxmod]
[ 3488.131962] CPU: 0 PID: 2807 Comm: guard_stap Tainted: GF          O--------------   3.10.0-229.el7.x86_64 #1
[ 3488.132023] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[ 3488.132070] task: ffff8800363bf1c0 ti: ffff88051f9d8000 task.ti: ffff88051f9d8000
[ 3488.132110] RIP: 0010:[<ffffffffa032f48a>]  [<ffffffffa032f48a>] set_rodata_ptr+0x3a/0xb0 [ktap_88469]
[ 3488.132183] RSP: 0018:ffff88051f9dbc00  EFLAGS: 00010002
[ 3488.132207] RAX: 0000000000040770 RBX: ffffffff816b7590 RCX: 0000000000000001
[ 3488.132236] RDX: 00000000000407f0 RSI: 0000000000000600 RDI: 0000000000000002
[ 3488.132277] RBP: ffff88051f9dbc18 R08: 0000000000000000 R09: 0000000000000000
[ 3488.132321] R10: ffff88051c11bd70 R11: ffff88051e244f10 R12: ffffffff8159f610
[ 3488.132357] R13: 0000000000030a00 R14: ffff88051dfca000 R15: ffff88051e45dc20
[ 3488.132384] FS:  0000000000000000(0000) GS:ffff88052b200000(0000) knlGS:0000000000000000
[ 3488.132413] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3488.132434] CR2: ffffffff816b7590 CR3: 000000000190a000 CR4: 00000000000407f0
[ 3488.132492] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 3488.132532] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 3488.132558] Stack:
[ 3488.132567]  ffffffff8159f610 0000000000000010 ffff88051c11bd70 ffff88051f9dbc30
[ 3488.132599]  ffffffffa03419c6 0000000000000000 ffff88051f9dbc40 ffffffffa0330f98
[ 3488.132629]  ffff88051f9dbc58 ffffffffa0331098 ffff88051e244f00 ffff88051f9dbca0
[ 3488.132660] Call Trace:
[ 3488.132674]  [<ffffffff8159f610>] ? unix_socketpair+0x80/0x80
[ 3488.132709]  [<ffffffffa03419c6>] unhook_un_sock+0x126/0x130 [ktap_88469]
[ 3488.132744]  [<ffffffffa0330f98>] unhook_syscalls+0x18/0x60 [ktap_88469]
[ 3488.132777]  [<ffffffffa0331098>] ktap_release+0xb8/0xd0 [ktap_88469]
[ 3488.132802]  [<ffffffff811c81b9>] __fput+0xe9/0x270
[ 3488.132822]  [<ffffffff811c847e>] ____fput+0xe/0x10
[ 3488.132843]  [<ffffffff81093b54>] task_work_run+0xc4/0xe0
[ 3488.132865]  [<ffffffff810745bb>] do_exit+0x2cb/0xa60
[ 3488.132886]  [<ffffffff8156f9e4>] ? inet_sendmsg+0x64/0xb0
[ 3488.132907]  [<ffffffff81074dcf>] do_group_exit+0x3f/0xa0
[ 3488.132928]  [<ffffffff810850c0>] get_signal_to_deliver+0x1d0/0x6d0
[ 3488.132954]  [<ffffffff81013407>] do_signal+0x57/0x6c0
[ 3488.132975]  [<ffffffff81208ec1>] ? fsnotify+0x251/0x350
[ 3488.132997]  [<ffffffff810c8c9c>] ? ktime_get_ts+0x4c/0xf0
[ 3488.133019]  [<ffffffff811da5fc>] ? poll_select_copy_remaining+0xfc/0x150
[ 3488.134224]  [<ffffffff81013ad9>] do_notify_resume+0x69/0xb0
[ 3488.135430]  [<ffffffff8161405d>] int_signal+0x12/0x17
[ 3488.136635] Code: f4 53 48 89 fb e8 27 f2 ff ff e8 b2 f6 04 00 ba 12 00 00 00 41 89 c5 be 06 00 00 00 bf 02 00 00 00 e8 ab f6 04 00 41 39 c5 7d 4e <4c> 89 23 e8 8e f6 04 00 ba 12 00 00 00 89 c3 be 06 00 00 00 bf 
[ 3488.139250] RIP  [<ffffffffa032f48a>] set_rodata_ptr+0x3a/0xb0 [ktap_88469]
[ 3488.140343]  RSP <ffff88051f9dbc00>
[ 3488.141456] CR2: ffffffff816b7590

Environment

  • Red Hat Enterprise Linux 7
  • ktap_88469 3rd party module

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.