Kernel panic at d_path+144 due to a null pointer dereference

Solution Unverified - Updated -

Issue

  • Kernel panic at d_path+144 due to a null pointer dereference with the following call traces:
[843028.053645] BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
[843028.054263] IP: [<ffffffffa1469480>] d_path+0x90/0x150
[843028.054740] PGD 0 
[843028.055218] Oops: 0000 [#1] SMP 
[843028.055473] Modules linked in: falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) unix_diag tcp_diag udp_diag inet_diag iptable_filter nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache secvm2(POE) secfs2(POE) mfe_aac_100709144(OE) falcon_lsm_pinned_14006(E) vmw_vsock_vmci_transport vsock sunrpc iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel vmw_balloon lrw gf128mul glue_helper ablk_helper cryptd sg joydev pcspkr vmw_vmci i2c_piix4 parport_pc parport binfmt_misc ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul crct10dif_common syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crc32c_intel drm serio_raw ata_piix libata nfit vmxnet3 libnvdimm vmw_pvscsi
[843028.057299]  drm_panel_orientation_quirks floppy dm_mirror dm_region_hash dm_log dm_mod [last unloaded: falcon_kal]
[843028.057706] CPU: 3 PID: 24031 Comm: ksh Kdump: loaded Tainted: POE  ------------   3.10.0-1160.66.1.el7.x86_64 #1
[843028.058142] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[843028.058585] task: ffff982f9c4ea100 ti: ffff982f8e230000 task.ti: ffff982f8e230000
[843028.059077] RIP: 0010:[<ffffffffa1469480>]  [<ffffffffa1469480>] d_path+0x90/0x150
[843028.059548] RSP: 0018:ffff982f8e233210  EFLAGS: 00010246
[843028.060012] RAX: ffff982f9c4ea100 RBX: ffff982f8e233260 RCX: 0000000000000000
[843028.060496] RDX: 0000000000001000 RSI: ffff982d83f26000 RDI: ffff982f86424cc0
[843028.061032] RBP: ffff982f8e233240 R08: ffffffffa1c8f36f R09: fffffae6980fc9c0
[843028.061571] R10: 0000000000004b2a R11: 00017868e079b05b R12: 0000000000001000
[843028.062173] R13: 0000000000000000 R14: ffff982d83f26000 R15: ffff982f99d5a7a0
[843028.062728] FS:  0000000000000000(0000) GS:ffff982fbfd80000(0000) knlGS:0000000000000000
[843028.064501] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[843028.066188] CR2: 0000000000000008 CR3: 0000000757010000 CR4: 00000000003607e0
[843028.068024] Call Trace:
[843028.069931]  [<ffffffffc064686f>] sf_dentry_path+0x11f/0x1d0 [secfs2]
[843028.071748]  [<ffffffffc067a11a>] vm_os_get_proc_path+0x7a/0x180 [secfs2]
[843028.073185]  [<ffffffffc077606c>] ? _vmsdk_zalloc+0x8c/0xa0 [secfs2]
[843028.074677]  [<ffffffffc07a22bf>] add_backprocess+0x5f/0x1b0 [secfs2]
[843028.076183]  [<ffffffffc07a2718>] ? vpo_audit+0x308/0xfd0 [secfs2]
[843028.077711]  [<ffffffffc0775f9b>] ? _vmsdk_malloc+0x2b/0x70 [secfs2]
[843028.079234]  [<ffffffffc0775f9b>] ? _vmsdk_malloc+0x2b/0x70 [secfs2]
[843028.080702]  [<ffffffffc07892d4>] ? po_chk_acc+0x6b4/0xe90 [secfs2]
[843028.082107]  [<ffffffffa198a812>] ? mutex_lock+0x12/0x2f
[843028.083111]  [<ffffffffc07299e2>] ? cache_store+0xf2/0x120 [secfs2]
[843028.084191]  [<ffffffffc077fc5b>] ? get_name+0x29b/0x320 [secfs2]
[843028.086267]  [<ffffffffc06b137c>] ? vm_lpo_chk+0xc2c/0x1280 [secfs2]
[843028.088402]  [<ffffffffc06a9bd0>] ? kpr_cleanup_keys+0x110/0x110 [secfs2]
[843028.090353]  [<ffffffffc06aa320>] ? kpr_write_file+0xe0/0xe0 [secfs2]
[843028.092288]  [<ffffffffc06a9c40>] ? kpr_is_kp_enabled+0x30/0x30 [secfs2]
[843028.094078]  [<ffffffffc06a9dc0>] ? kpr_rkey_preprocess_key+0x180/0x180 [secfs2]
[843028.096090]  [<ffffffffc073b7d0>] ? do_aria_speed_test+0x370/0x370 [secfs2]
[843028.098016]  [<ffffffffc06ae5a0>] ? sig_file_read+0x220/0x220 [secfs2]
[843028.099911]  [<ffffffffc06acf30>] ? cache_hash_cb+0x50/0x50 [secfs2]
[843028.101768]  [<ffffffffc06ad080>] ? vm_lpo_get_tag+0x40/0x40 [secfs2]
[843028.103102]  [<ffffffffc06acf60>] ? policyname+0x30/0x30 [secfs2]
[843028.104281]  [<ffffffffc06ad040>] ? vm_get_key_type+0x60/0x60 [secfs2]
[843028.105488]  [<ffffffffc0726340>] ? vm_tag_event_worker+0x3e0/0x3e0 [secfs2]
[843028.106697]  [<ffffffffc06b5a24>] ? check_access_r2v2+0x114/0x180 [secfs2]
[843028.108002]  [<ffffffffc06ddc2b>] ? vmfs_po_xfable+0x4b/0x160 [secfs2]
[843028.109189]  [<ffffffffc06ddda3>] ? vmfs_rekey_check_access+0x63/0x110 [secfs2]
[843028.110413]  [<ffffffffc06be8de>] ? check_access+0x178e/0x1b20 [secfs2]
[843028.111614]  [<ffffffffc06c1479>] ? vmfs_acc_op+0xd9/0x140 [secfs2]
[843028.112740]  [<ffffffffc06c1505>] ? vmfs_acc_inode+0x25/0x40 [secfs2]
[843028.113466]  [<ffffffffc0646f47>] ? sfdentry_access+0xe7/0x1d0 [secfs2]
[843028.114154]  [<ffffffffc064c5dc>] ? sffile_access+0xdc/0x150 [secfs2]
[843028.114822]  [<ffffffffc0651507>] ? op_file_read+0x567/0xdd0 [secfs2]
[843028.115448]  [<ffffffffc089804c>] ? 0xffffffffc089804b
[843028.116058]  [<ffffffffc0898176>] ? 0xffffffffc0898175
[843028.116632]  [<ffffffffc0937208>] ? cshook_systemcalltable_pre_ia32_pread64+0x250b8/0x2d060 [falcon_lsm_serviceable]
[843028.117254]  [<ffffffffc08d9ca2>] ? _ZdlPv+0x37832/0x38c30 [falcon_lsm_serviceable]
[843028.117825]  [<ffffffffc08d9e95>] ? _ZdlPv+0x37a25/0x38c30 [falcon_lsm_serviceable]
[843028.118404]  [<ffffffffc0690dbc>] ? lsys_free+0x5c/0x60 [secfs2]
[843028.118981]  [<ffffffffa1428b55>] ? __kmalloc+0x55/0x230
[843028.119532]  [<ffffffffc08975be>] ? 0xffffffffc08975bd
[843028.120071]  [<ffffffffc08da01a>] ? _ZdlPv+0x37baa/0x38c30 [falcon_lsm_serviceable]
[843028.120614]  [<ffffffffc08da0c7>] ? _ZdlPv+0x37c57/0x38c30 [falcon_lsm_serviceable]
[843028.121152]  [<ffffffffc08dc8cf>] ? cshook_security_file_free_security+0x11f/0x7200 [falcon_lsm_serviceable]
[843028.121702]  [<ffffffffc04ac91b>] ? pinnedhook_security_file_free_security+0x3b/0x60 [falcon_lsm_pinned_14006]
[843028.122287]  [<ffffffffa15091ec>] ? security_file_free+0x1c/0x20
[843028.122836]  [<ffffffffa1450614>] ? __fput+0xf4/0x230
[843028.123312]  [<ffffffffa145083e>] ? ____fput+0xe/0x10
[843028.123769]  [<ffffffffa12c2acb>] ? task_work_run+0xbb/0xe0
[843028.124221]  [<ffffffffa12a1ae4>] ? do_exit+0x2d4/0xa30
[843028.124667]  [<ffffffffa1994678>] ? __do_page_fault+0x238/0x500
[843028.125101]  [<ffffffffa12a22bf>] ? do_group_exit+0x3f/0xa0
[843028.125539]  [<ffffffffa12a2334>] ? SyS_exit_group+0x14/0x20
[843028.125972]  [<ffffffffa1999f92>] ? system_call_fastpath+0x25/0x2a
[843028.126401] Code: 00 48 83 c4 28 5b 5d c3 0f 1f 00 48 8b 03 48 3b 38 75 d4 0f 1f 84 00 00 00 00 00 65 48 8b 04 25 c0 0e 01 00 48 8b 88 50 07 00 00 <8b> 71 08 40 f6 c6 01 0f 85 a9 00 00 00 48 8b 41 18 48 8b 51 20 
[843028.127420] RIP  [<ffffffffa1469480>] d_path+0x90/0x150
[843028.127901]  RSP <ffff982f8e233210>
[843028.128374] CR2: 0000000000000008

Environment

  • Red Hat Enterprise Linux 7
  • Vormetric: out-of-tree (O) kernel module: [secfs2]
  • CrowdStrike: out-of-tree (O) kernel module: [falcon_lsm_pinned_14006]

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content