Kernel panic due to unsigned kernel module gsch

Solution In Progress - Updated -

Issue

  • Kernel ring buffer
BUG: unable to handle kernel paging request at ffffffffffffffdc
IP: [<ffffffff812837ec>] strncpy_from_user+0x5c/0x90
PGD 1a87067 PUD 1a88067 PMD 0 
Oops: 0002 [#1] SMP 
last sysfs file: /sys/devices/system/cpu/online
CPU 1 
Modules linked in: gsch(U) redirfs(U) vsock(U) vmci(U) acdc(P)(U) autofs4 nfs lockd fscache auth_rpcgss nfs_acl sunrpc ipv6 ppdev parport_pc parport vmware_balloon microcode vmxnet3 i2c_piix4 i2c_core shpchp sg ext4 mbcache jbd2 sd_mod crc_t10dif sr_mod cdrom vmw_pvscsi pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib]

Pid: 5069, comm: ksh Tainted: P           ---------------    2.6.32-358.el6.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform
RIP: 0010:[<ffffffff812837ec>]  [<ffffffff812837ec>] strncpy_from_user+0x5c/0x90
RSP: 0018:ffff880015235e98  EFLAGS: 00010206
RAX: 000000000000002f RBX: 0000000000001000 RCX: 0000000000001000
RDX: 0000000000000000 RSI: 00000000013a2979 RDI: ffffffffffffffdc
RBP: ffff880015235eb8 R08: 000000000000000f R09: 00000000013a25c4
R10: 0000000000000008 R11: 0000000000000246 R12: 00000000013a2978
R13: 0000000000001000 R14: fffffffffffffff6 R15: 00000000013a26c8
FS:  00007f4ccbce3700(0000) GS:ffff88002f620000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffffffffffdc CR3: 00000000151e0000 CR4: 00000000000007e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process ksh (pid: 5069, threadinfo ffff880015234000, task ffff88001525c080)
Stack:
 00000000013a2978 ffffffffffffffdc 00000000013a2978 fffffffffffffff4
<d> ffff880015235ee8 ffffffffa031e74c 0000000000000040 ffff88001525c6f8
<d> 00000000013a2978 00000000000013cd ffff880015235f28 ffffffffa03225fb
Call Trace:
 [<ffffffffa031e74c>] gsch_getname+0x4c/0x90 [gsch]
 [<ffffffffa03225fb>] gsch_sys_execve_handler_fn+0xab/0x1b0 [gsch]
 [<ffffffffa031f432>] gsch_stub_execve_hook_fn+0x12/0x1b [gsch]
 [<ffffffff8100b072>] ? system_call_fastpath+0x16/0x1b
Code: c9 48 39 82 48 e0 ff ff 48 83 d9 00 48 85 c9 49 89 f4 75 38 e8 96 a8 28 00 48 89 df 4c 89 e6 4c 89 eb 4c 89 e9 48 85 c9 74 0e ac <aa> 84 c0 74 05 48 ff c9 75 f5 48 29 cb 48 89 da 48 89 d0 48 8b 
RIP  [<ffffffff812837ec>] strncpy_from_user+0x5c/0x90
 RSP <ffff880015235e98>
CR2: ffffffffffffffdc

Environment

  • Red Hat Enterprise Linux 6.4
  • gsch third party kernel module

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content