kernel crashes in set_rodata_ptr+0x3a/0xb0 [ktap_88469] with BUG: unable to handle kernel paging request at ffffffff816b7590
Issue
- System crashes with the following messages.
[ 3488.131415] BUG: unable to handle kernel paging request at ffffffff816b7590
[ 3488.131471] IP: [<ffffffffa032f48a>] set_rodata_ptr+0x3a/0xb0 [ktap_88469]
[ 3488.131542] PGD 190d067 PUD 190e063 PMD 16001e1
[ 3488.131579] Oops: 0003 [#1] SMP
[ 3488.131600] Modules linked in: splxmod(OF) ktap_88469(OF) ipt_REJECT nf_log_ipv4 nf_log_common xt_LOG nf_conntrack_ipv4 nf_defrag_ipv4 xt_iprange xt_multiport xt_conntrack nf_conntrack iptable_filter coretemp crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd vmw_balloon serio_raw pcspkr sg parport_pc parport i2c_piix4 shpchp vmw_vmci uinput ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_common vmwgfx drm_kms_helper ttm ata_piix drm libata vmxnet3 i2c_core vmw_pvscsi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: splxmod]
[ 3488.131962] CPU: 0 PID: 2807 Comm: guard_stap Tainted: GF O-------------- 3.10.0-229.el7.x86_64 #1
[ 3488.132023] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/21/2015
[ 3488.132070] task: ffff8800363bf1c0 ti: ffff88051f9d8000 task.ti: ffff88051f9d8000
[ 3488.132110] RIP: 0010:[<ffffffffa032f48a>] [<ffffffffa032f48a>] set_rodata_ptr+0x3a/0xb0 [ktap_88469]
[ 3488.132183] RSP: 0018:ffff88051f9dbc00 EFLAGS: 00010002
[ 3488.132207] RAX: 0000000000040770 RBX: ffffffff816b7590 RCX: 0000000000000001
[ 3488.132236] RDX: 00000000000407f0 RSI: 0000000000000600 RDI: 0000000000000002
[ 3488.132277] RBP: ffff88051f9dbc18 R08: 0000000000000000 R09: 0000000000000000
[ 3488.132321] R10: ffff88051c11bd70 R11: ffff88051e244f10 R12: ffffffff8159f610
[ 3488.132357] R13: 0000000000030a00 R14: ffff88051dfca000 R15: ffff88051e45dc20
[ 3488.132384] FS: 0000000000000000(0000) GS:ffff88052b200000(0000) knlGS:0000000000000000
[ 3488.132413] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3488.132434] CR2: ffffffff816b7590 CR3: 000000000190a000 CR4: 00000000000407f0
[ 3488.132492] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 3488.132532] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 3488.132558] Stack:
[ 3488.132567] ffffffff8159f610 0000000000000010 ffff88051c11bd70 ffff88051f9dbc30
[ 3488.132599] ffffffffa03419c6 0000000000000000 ffff88051f9dbc40 ffffffffa0330f98
[ 3488.132629] ffff88051f9dbc58 ffffffffa0331098 ffff88051e244f00 ffff88051f9dbca0
[ 3488.132660] Call Trace:
[ 3488.132674] [<ffffffff8159f610>] ? unix_socketpair+0x80/0x80
[ 3488.132709] [<ffffffffa03419c6>] unhook_un_sock+0x126/0x130 [ktap_88469]
[ 3488.132744] [<ffffffffa0330f98>] unhook_syscalls+0x18/0x60 [ktap_88469]
[ 3488.132777] [<ffffffffa0331098>] ktap_release+0xb8/0xd0 [ktap_88469]
[ 3488.132802] [<ffffffff811c81b9>] __fput+0xe9/0x270
[ 3488.132822] [<ffffffff811c847e>] ____fput+0xe/0x10
[ 3488.132843] [<ffffffff81093b54>] task_work_run+0xc4/0xe0
[ 3488.132865] [<ffffffff810745bb>] do_exit+0x2cb/0xa60
[ 3488.132886] [<ffffffff8156f9e4>] ? inet_sendmsg+0x64/0xb0
[ 3488.132907] [<ffffffff81074dcf>] do_group_exit+0x3f/0xa0
[ 3488.132928] [<ffffffff810850c0>] get_signal_to_deliver+0x1d0/0x6d0
[ 3488.132954] [<ffffffff81013407>] do_signal+0x57/0x6c0
[ 3488.132975] [<ffffffff81208ec1>] ? fsnotify+0x251/0x350
[ 3488.132997] [<ffffffff810c8c9c>] ? ktime_get_ts+0x4c/0xf0
[ 3488.133019] [<ffffffff811da5fc>] ? poll_select_copy_remaining+0xfc/0x150
[ 3488.134224] [<ffffffff81013ad9>] do_notify_resume+0x69/0xb0
[ 3488.135430] [<ffffffff8161405d>] int_signal+0x12/0x17
[ 3488.136635] Code: f4 53 48 89 fb e8 27 f2 ff ff e8 b2 f6 04 00 ba 12 00 00 00 41 89 c5 be 06 00 00 00 bf 02 00 00 00 e8 ab f6 04 00 41 39 c5 7d 4e <4c> 89 23 e8 8e f6 04 00 ba 12 00 00 00 89 c3 be 06 00 00 00 bf
[ 3488.139250] RIP [<ffffffffa032f48a>] set_rodata_ptr+0x3a/0xb0 [ktap_88469]
[ 3488.140343] RSP <ffff88051f9dbc00>
[ 3488.141456] CR2: ffffffff816b7590
Environment
- Red Hat Enterprise Linux 7
ktap_884693rd party module
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.