Kernel panic at d_path+144 due to a null pointer dereference
Issue
- Kernel panic at
d_path+144
due to anull
pointer dereference with the following call traces:
[843028.053645] BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
[843028.054263] IP: [<ffffffffa1469480>] d_path+0x90/0x150
[843028.054740] PGD 0
[843028.055218] Oops: 0000 [#1] SMP
[843028.055473] Modules linked in: falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) unix_diag tcp_diag udp_diag inet_diag iptable_filter nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache secvm2(POE) secfs2(POE) mfe_aac_100709144(OE) falcon_lsm_pinned_14006(E) vmw_vsock_vmci_transport vsock sunrpc iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel vmw_balloon lrw gf128mul glue_helper ablk_helper cryptd sg joydev pcspkr vmw_vmci i2c_piix4 parport_pc parport binfmt_misc ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul crct10dif_common syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crc32c_intel drm serio_raw ata_piix libata nfit vmxnet3 libnvdimm vmw_pvscsi
[843028.057299] drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod [last unloaded: falcon_kal]
[843028.057706] CPU: 3 PID: 24031 Comm: ksh Kdump: loaded Tainted: POE ------------ 3.10.0-1160.66.1.el7.x86_64 #1
[843028.058142] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[843028.058585] task: ffff982f9c4ea100 ti: ffff982f8e230000 task.ti: ffff982f8e230000
[843028.059077] RIP: 0010:[<ffffffffa1469480>] [<ffffffffa1469480>] d_path+0x90/0x150
[843028.059548] RSP: 0018:ffff982f8e233210 EFLAGS: 00010246
[843028.060012] RAX: ffff982f9c4ea100 RBX: ffff982f8e233260 RCX: 0000000000000000
[843028.060496] RDX: 0000000000001000 RSI: ffff982d83f26000 RDI: ffff982f86424cc0
[843028.061032] RBP: ffff982f8e233240 R08: ffffffffa1c8f36f R09: fffffae6980fc9c0
[843028.061571] R10: 0000000000004b2a R11: 00017868e079b05b R12: 0000000000001000
[843028.062173] R13: 0000000000000000 R14: ffff982d83f26000 R15: ffff982f99d5a7a0
[843028.062728] FS: 0000000000000000(0000) GS:ffff982fbfd80000(0000) knlGS:0000000000000000
[843028.064501] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[843028.066188] CR2: 0000000000000008 CR3: 0000000757010000 CR4: 00000000003607e0
[843028.068024] Call Trace:
[843028.069931] [<ffffffffc064686f>] sf_dentry_path+0x11f/0x1d0 [secfs2]
[843028.071748] [<ffffffffc067a11a>] vm_os_get_proc_path+0x7a/0x180 [secfs2]
[843028.073185] [<ffffffffc077606c>] ? _vmsdk_zalloc+0x8c/0xa0 [secfs2]
[843028.074677] [<ffffffffc07a22bf>] add_backprocess+0x5f/0x1b0 [secfs2]
[843028.076183] [<ffffffffc07a2718>] ? vpo_audit+0x308/0xfd0 [secfs2]
[843028.077711] [<ffffffffc0775f9b>] ? _vmsdk_malloc+0x2b/0x70 [secfs2]
[843028.079234] [<ffffffffc0775f9b>] ? _vmsdk_malloc+0x2b/0x70 [secfs2]
[843028.080702] [<ffffffffc07892d4>] ? po_chk_acc+0x6b4/0xe90 [secfs2]
[843028.082107] [<ffffffffa198a812>] ? mutex_lock+0x12/0x2f
[843028.083111] [<ffffffffc07299e2>] ? cache_store+0xf2/0x120 [secfs2]
[843028.084191] [<ffffffffc077fc5b>] ? get_name+0x29b/0x320 [secfs2]
[843028.086267] [<ffffffffc06b137c>] ? vm_lpo_chk+0xc2c/0x1280 [secfs2]
[843028.088402] [<ffffffffc06a9bd0>] ? kpr_cleanup_keys+0x110/0x110 [secfs2]
[843028.090353] [<ffffffffc06aa320>] ? kpr_write_file+0xe0/0xe0 [secfs2]
[843028.092288] [<ffffffffc06a9c40>] ? kpr_is_kp_enabled+0x30/0x30 [secfs2]
[843028.094078] [<ffffffffc06a9dc0>] ? kpr_rkey_preprocess_key+0x180/0x180 [secfs2]
[843028.096090] [<ffffffffc073b7d0>] ? do_aria_speed_test+0x370/0x370 [secfs2]
[843028.098016] [<ffffffffc06ae5a0>] ? sig_file_read+0x220/0x220 [secfs2]
[843028.099911] [<ffffffffc06acf30>] ? cache_hash_cb+0x50/0x50 [secfs2]
[843028.101768] [<ffffffffc06ad080>] ? vm_lpo_get_tag+0x40/0x40 [secfs2]
[843028.103102] [<ffffffffc06acf60>] ? policyname+0x30/0x30 [secfs2]
[843028.104281] [<ffffffffc06ad040>] ? vm_get_key_type+0x60/0x60 [secfs2]
[843028.105488] [<ffffffffc0726340>] ? vm_tag_event_worker+0x3e0/0x3e0 [secfs2]
[843028.106697] [<ffffffffc06b5a24>] ? check_access_r2v2+0x114/0x180 [secfs2]
[843028.108002] [<ffffffffc06ddc2b>] ? vmfs_po_xfable+0x4b/0x160 [secfs2]
[843028.109189] [<ffffffffc06ddda3>] ? vmfs_rekey_check_access+0x63/0x110 [secfs2]
[843028.110413] [<ffffffffc06be8de>] ? check_access+0x178e/0x1b20 [secfs2]
[843028.111614] [<ffffffffc06c1479>] ? vmfs_acc_op+0xd9/0x140 [secfs2]
[843028.112740] [<ffffffffc06c1505>] ? vmfs_acc_inode+0x25/0x40 [secfs2]
[843028.113466] [<ffffffffc0646f47>] ? sfdentry_access+0xe7/0x1d0 [secfs2]
[843028.114154] [<ffffffffc064c5dc>] ? sffile_access+0xdc/0x150 [secfs2]
[843028.114822] [<ffffffffc0651507>] ? op_file_read+0x567/0xdd0 [secfs2]
[843028.115448] [<ffffffffc089804c>] ? 0xffffffffc089804b
[843028.116058] [<ffffffffc0898176>] ? 0xffffffffc0898175
[843028.116632] [<ffffffffc0937208>] ? cshook_systemcalltable_pre_ia32_pread64+0x250b8/0x2d060 [falcon_lsm_serviceable]
[843028.117254] [<ffffffffc08d9ca2>] ? _ZdlPv+0x37832/0x38c30 [falcon_lsm_serviceable]
[843028.117825] [<ffffffffc08d9e95>] ? _ZdlPv+0x37a25/0x38c30 [falcon_lsm_serviceable]
[843028.118404] [<ffffffffc0690dbc>] ? lsys_free+0x5c/0x60 [secfs2]
[843028.118981] [<ffffffffa1428b55>] ? __kmalloc+0x55/0x230
[843028.119532] [<ffffffffc08975be>] ? 0xffffffffc08975bd
[843028.120071] [<ffffffffc08da01a>] ? _ZdlPv+0x37baa/0x38c30 [falcon_lsm_serviceable]
[843028.120614] [<ffffffffc08da0c7>] ? _ZdlPv+0x37c57/0x38c30 [falcon_lsm_serviceable]
[843028.121152] [<ffffffffc08dc8cf>] ? cshook_security_file_free_security+0x11f/0x7200 [falcon_lsm_serviceable]
[843028.121702] [<ffffffffc04ac91b>] ? pinnedhook_security_file_free_security+0x3b/0x60 [falcon_lsm_pinned_14006]
[843028.122287] [<ffffffffa15091ec>] ? security_file_free+0x1c/0x20
[843028.122836] [<ffffffffa1450614>] ? __fput+0xf4/0x230
[843028.123312] [<ffffffffa145083e>] ? ____fput+0xe/0x10
[843028.123769] [<ffffffffa12c2acb>] ? task_work_run+0xbb/0xe0
[843028.124221] [<ffffffffa12a1ae4>] ? do_exit+0x2d4/0xa30
[843028.124667] [<ffffffffa1994678>] ? __do_page_fault+0x238/0x500
[843028.125101] [<ffffffffa12a22bf>] ? do_group_exit+0x3f/0xa0
[843028.125539] [<ffffffffa12a2334>] ? SyS_exit_group+0x14/0x20
[843028.125972] [<ffffffffa1999f92>] ? system_call_fastpath+0x25/0x2a
[843028.126401] Code: 00 48 83 c4 28 5b 5d c3 0f 1f 00 48 8b 03 48 3b 38 75 d4 0f 1f 84 00 00 00 00 00 65 48 8b 04 25 c0 0e 01 00 48 8b 88 50 07 00 00 <8b> 71 08 40 f6 c6 01 0f 85 a9 00 00 00 48 8b 41 18 48 8b 51 20
[843028.127420] RIP [<ffffffffa1469480>] d_path+0x90/0x150
[843028.127901] RSP <ffff982f8e233210>
[843028.128374] CR2: 0000000000000008
Environment
- Red Hat Enterprise Linux 7
- Vormetric: out-of-tree (O) kernel module: [
secfs2
] - CrowdStrike: out-of-tree (O) kernel module: [
falcon_lsm_pinned_14006
]
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.