Kernel panic at d_path due to third party module sisevt, sisap

Solution Verified - Updated -

Issue

  • Kernel panics with the following messages:
[1301343.972413] SISAP[pid 141464/141578]) uc_scanner_ok: scanner task not running. pid 2679, state 0x102, signal flags 0x0
[1301343.972582] SISAP[pid 278062/278197]) uc_scanner_ok: scanner task not running. pid 2679, state 0x102, signal flags 0x0
[1301343.973158] SISAP[pid 141464/141578]) uc_scanner_ok: scanner task not running. pid 2679, state 0x102, signal flags 0x0
[1301343.973162] SISAP[pid 141464/141578]) sisap_uc_uevent: fp was DELETED 00000000438cccf8, pid 141464, fid 2094dc2 leaving with ret=2, waiting=3, nsq=1, wait_scan=1, filename=noname
[1301343.974996] SISAP[pid 278062/278197]) uc_scanner_ok: scanner task not running. pid 2679, state 0x102, signal flags 0x0
[1301343.975413] SISAP[pid 278062/278197]) sisap_uc_uevent: fp was DELETED 00000000438cccf8, pid 278062, fid 2094dc2 leaving with ret=2, waiting=2, nsq=1, wait_scan=1, filename=noname
[1301380.201457] general protection fault: 0000 [#1] SMP PTI
[1301380.202052] CPU: 4 PID: 2679 Comm: sisamddaemon Kdump: loaded Tainted: P           OE    --------- -  - 4.18.0-372.13.1.el8_6.x86_64 #1
[1301380.202586] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[1301380.203067] RIP: 0010:d_path+0x3d/0x140
[1301380.203525] Code: 7f 08 89 54 24 04 65 48 8b 04 25 28 00 00 00 48 89 44 24 20 31 c0 48 63 c2 48 01 f0 48 89 44 24 08 48 8b 47 60 48 85 c0 74 37 <48> 8b 40 48 48 85 c0 74 2e 48 3b 7f 18 74 20 e8 5f 70 88 00 48 8b
[1301380.204521] RSP: 0018:ffffab6407a73df8 EFLAGS: 00010286
[1301380.205050] RAX: a8fdcbc8cf5e94d1 RBX: ffffab6407a73e38 RCX: 0000000000000000
[1301380.205587] RDX: 0000000000001000 RSI: ffff932515390000 RDI: ffff93257ab0dc00
[1301380.206100] RBP: ffffab6407a73e28 R08: ffffab6407a73df0 R09: 0000000000000000
[1301380.206607] R10: ffffab6407a73ed0 R11: 0000000000000002 R12: ffff9327e9e8f780
[1301380.207159] R13: ffff93240ec54e40 R14: 00007fa43b7fcb70 R15: ffffab6407a73f08
[1301380.207697] FS:  00007fa43b7fe700(0000) GS:ffff933301f00000(0000) knlGS:0000000000000000
[1301380.208226] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1301380.208764] CR2: 00007f619c3cfa70 CR3: 00000001328d6005 CR4: 00000000007706e0
[1301380.209337] PKRU: 55555554
[1301380.209885] Call Trace:
[1301380.210464]  sisevt_evgetfname+0x8e/0x2c0 [sisevt]
[1301380.211041]  ? sisap_uc_read+0x5ad/0xa90 [sisap]
[1301380.211598]  ? sisap_read+0xd7/0x390 [sisap]
[1301380.212148]  ? vfs_read+0x91/0x140
[1301380.212692]  ? ksys_read+0x4f/0xb0
[1301380.213284]  ? do_syscall_64+0x5b/0x1a0
[1301380.213877]  ? entry_SYSCALL_64_after_hwframe+0x65/0xca
[--]

or

[427005.523463] BUG: unable to handle kernel NULL pointer dereference at 0000000000000041
[427005.532649] IP: [<ffffffffaa06967d>] d_path+0x3d/0x150
[427005.537717] PGD 80000000b8038067 PUD b8039067 PMD 0 
[427005.542772] Oops: 0000 [#1] SMP 
[427005.547127] Modules linked in: veth ext4 mbcache jbd2 xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack br_netfilter bridge stp llc falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_pinned_13207(E) sisap(POE) overlay(T) sisevt(PE) nfit libnvdimm iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel ppdev lrw gf128mul glue_helper ablk_helper parport_pc cryptd parport i2c_piix4 pcspkr binfmt_misc ip_tables xfs libcrc32c nvme crct10dif_pclmul crct10dif_common crc32c_intel ena nvme_core serio_raw dm_mirror dm_region_hash dm_log dm_mod
[427005.670745] CPU: 1 PID: 2811 Comm: sisamddaemon Kdump: loaded Tainted: P           OE  ------------ T 3.10.0-1160.59.1.el7.x86_64 #1
[427005.681209] Hardware name: Amazon EC2 m5d.large/, BIOS 1.0 10/16/2017
[427005.686704] task: ffff89b76995a100 ti: ffff89b5d89d0000 task.ti: ffff89b5d89d0000
[427005.695477] RIP: 0010:[<ffffffffaa06967d>]  [<ffffffffaa06967d>] d_path+0x3d/0x150
[427005.704347] RSP: 0018:ffff89b5d89d3e08  EFLAGS: 00010202
[427005.709378] RAX: ffff89b5e82d8000 RBX: ffff89b5d89d3e48 RCX: 0000000000000001
[427005.718046] RDX: 0000000000001000 RSI: ffff89b5e82d7000 RDI: ffff89b5498df9c0
[427005.726736] RBP: ffff89b5d89d3e38 R08: 000000000001f1a0 R09: ffff89b6bfc01300
[427005.735369] R10: ffffffffc04cd866 R11: 0000000000000293 R12: ffff89b6c048c9c0
[427005.744024] R13: ffff89b5d89d3f18 R14: 0000000000001020 R15: 0000000000000000
[427005.752688] FS:  00007fea46ffd700(0000) GS:ffff89b772700000(0000) knlGS:0000000000000000
[427005.761718] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[427005.766898] CR2: 0000000000000041 CR3: 00000000ba726000 CR4: 00000000007606e0
[427005.775580] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[427005.784223] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[427005.792852] PKRU: 55555554
[427005.796886] Call Trace:
[427005.800790]  [<ffffffffc04cd763>] sisevt_evgetfname+0x83/0x2d0 [sisevt]  <<-----
[427005.806328]  [<ffffffffc0537518>] ? sisap_uc_read+0x5a8/0xb50 [sisap]  <<-----
[427005.811710]  [<ffffffffc052ba45>] ? sisap_read+0x185/0x450 [sisap]
[427005.817064]  [<ffffffffc052ba6f>] ? sisap_read+0x1af/0x450 [sisap]
[427005.822377]  [<ffffffffaa04e3ff>] ? vfs_read+0x9f/0x170
[427005.827331]  [<ffffffffaa04f27f>] ? SyS_read+0x7f/0xf0
[427005.832259]  [<ffffffffaa599f92>] ? system_call_fastpath+0x25/0x2a
[427005.837576] Code: fb 48 83 ec 28 65 48 8b 3c 25 28 00 00 00 48 89 7c 24 20 31 ff 48 8b 7b 08 89 54 24 04 48 89 44 24 08 48 8b 4f 60 48 85 c9 74 43 <48> 8b 49 40 48 85 c9 74 3a 48 3b 7f 18 74 24 e8 0f e9 12 00 48 
[427005.856322] RIP  [<ffffffffaa06967d>] d_path+0x3d/0x150
[427005.861277]  RSP <ffff89b5d89d3e08>
[427005.865579] CR2: 0000000000000041

Environment

  • Red Hat Enterprise Linux 7
  • Red Hat Enterprise Linux 8
  • Unsigned (U) Kernel modules:- sisevt, sisap

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content