Kernel panic at d_path due to third party module sisevt, sisap
Issue
- Kernel panics with the following messages:
[1301343.972413] SISAP[pid 141464/141578]) uc_scanner_ok: scanner task not running. pid 2679, state 0x102, signal flags 0x0
[1301343.972582] SISAP[pid 278062/278197]) uc_scanner_ok: scanner task not running. pid 2679, state 0x102, signal flags 0x0
[1301343.973158] SISAP[pid 141464/141578]) uc_scanner_ok: scanner task not running. pid 2679, state 0x102, signal flags 0x0
[1301343.973162] SISAP[pid 141464/141578]) sisap_uc_uevent: fp was DELETED 00000000438cccf8, pid 141464, fid 2094dc2 leaving with ret=2, waiting=3, nsq=1, wait_scan=1, filename=noname
[1301343.974996] SISAP[pid 278062/278197]) uc_scanner_ok: scanner task not running. pid 2679, state 0x102, signal flags 0x0
[1301343.975413] SISAP[pid 278062/278197]) sisap_uc_uevent: fp was DELETED 00000000438cccf8, pid 278062, fid 2094dc2 leaving with ret=2, waiting=2, nsq=1, wait_scan=1, filename=noname
[1301380.201457] general protection fault: 0000 [#1] SMP PTI
[1301380.202052] CPU: 4 PID: 2679 Comm: sisamddaemon Kdump: loaded Tainted: P OE --------- - - 4.18.0-372.13.1.el8_6.x86_64 #1
[1301380.202586] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[1301380.203067] RIP: 0010:d_path+0x3d/0x140
[1301380.203525] Code: 7f 08 89 54 24 04 65 48 8b 04 25 28 00 00 00 48 89 44 24 20 31 c0 48 63 c2 48 01 f0 48 89 44 24 08 48 8b 47 60 48 85 c0 74 37 <48> 8b 40 48 48 85 c0 74 2e 48 3b 7f 18 74 20 e8 5f 70 88 00 48 8b
[1301380.204521] RSP: 0018:ffffab6407a73df8 EFLAGS: 00010286
[1301380.205050] RAX: a8fdcbc8cf5e94d1 RBX: ffffab6407a73e38 RCX: 0000000000000000
[1301380.205587] RDX: 0000000000001000 RSI: ffff932515390000 RDI: ffff93257ab0dc00
[1301380.206100] RBP: ffffab6407a73e28 R08: ffffab6407a73df0 R09: 0000000000000000
[1301380.206607] R10: ffffab6407a73ed0 R11: 0000000000000002 R12: ffff9327e9e8f780
[1301380.207159] R13: ffff93240ec54e40 R14: 00007fa43b7fcb70 R15: ffffab6407a73f08
[1301380.207697] FS: 00007fa43b7fe700(0000) GS:ffff933301f00000(0000) knlGS:0000000000000000
[1301380.208226] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1301380.208764] CR2: 00007f619c3cfa70 CR3: 00000001328d6005 CR4: 00000000007706e0
[1301380.209337] PKRU: 55555554
[1301380.209885] Call Trace:
[1301380.210464] sisevt_evgetfname+0x8e/0x2c0 [sisevt]
[1301380.211041] ? sisap_uc_read+0x5ad/0xa90 [sisap]
[1301380.211598] ? sisap_read+0xd7/0x390 [sisap]
[1301380.212148] ? vfs_read+0x91/0x140
[1301380.212692] ? ksys_read+0x4f/0xb0
[1301380.213284] ? do_syscall_64+0x5b/0x1a0
[1301380.213877] ? entry_SYSCALL_64_after_hwframe+0x65/0xca
[--]
or
[427005.523463] BUG: unable to handle kernel NULL pointer dereference at 0000000000000041
[427005.532649] IP: [<ffffffffaa06967d>] d_path+0x3d/0x150
[427005.537717] PGD 80000000b8038067 PUD b8039067 PMD 0
[427005.542772] Oops: 0000 [#1] SMP
[427005.547127] Modules linked in: veth ext4 mbcache jbd2 xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack br_netfilter bridge stp llc falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_pinned_13207(E) sisap(POE) overlay(T) sisevt(PE) nfit libnvdimm iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel ppdev lrw gf128mul glue_helper ablk_helper parport_pc cryptd parport i2c_piix4 pcspkr binfmt_misc ip_tables xfs libcrc32c nvme crct10dif_pclmul crct10dif_common crc32c_intel ena nvme_core serio_raw dm_mirror dm_region_hash dm_log dm_mod
[427005.670745] CPU: 1 PID: 2811 Comm: sisamddaemon Kdump: loaded Tainted: P OE ------------ T 3.10.0-1160.59.1.el7.x86_64 #1
[427005.681209] Hardware name: Amazon EC2 m5d.large/, BIOS 1.0 10/16/2017
[427005.686704] task: ffff89b76995a100 ti: ffff89b5d89d0000 task.ti: ffff89b5d89d0000
[427005.695477] RIP: 0010:[<ffffffffaa06967d>] [<ffffffffaa06967d>] d_path+0x3d/0x150
[427005.704347] RSP: 0018:ffff89b5d89d3e08 EFLAGS: 00010202
[427005.709378] RAX: ffff89b5e82d8000 RBX: ffff89b5d89d3e48 RCX: 0000000000000001
[427005.718046] RDX: 0000000000001000 RSI: ffff89b5e82d7000 RDI: ffff89b5498df9c0
[427005.726736] RBP: ffff89b5d89d3e38 R08: 000000000001f1a0 R09: ffff89b6bfc01300
[427005.735369] R10: ffffffffc04cd866 R11: 0000000000000293 R12: ffff89b6c048c9c0
[427005.744024] R13: ffff89b5d89d3f18 R14: 0000000000001020 R15: 0000000000000000
[427005.752688] FS: 00007fea46ffd700(0000) GS:ffff89b772700000(0000) knlGS:0000000000000000
[427005.761718] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[427005.766898] CR2: 0000000000000041 CR3: 00000000ba726000 CR4: 00000000007606e0
[427005.775580] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[427005.784223] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[427005.792852] PKRU: 55555554
[427005.796886] Call Trace:
[427005.800790] [<ffffffffc04cd763>] sisevt_evgetfname+0x83/0x2d0 [sisevt] <<-----
[427005.806328] [<ffffffffc0537518>] ? sisap_uc_read+0x5a8/0xb50 [sisap] <<-----
[427005.811710] [<ffffffffc052ba45>] ? sisap_read+0x185/0x450 [sisap]
[427005.817064] [<ffffffffc052ba6f>] ? sisap_read+0x1af/0x450 [sisap]
[427005.822377] [<ffffffffaa04e3ff>] ? vfs_read+0x9f/0x170
[427005.827331] [<ffffffffaa04f27f>] ? SyS_read+0x7f/0xf0
[427005.832259] [<ffffffffaa599f92>] ? system_call_fastpath+0x25/0x2a
[427005.837576] Code: fb 48 83 ec 28 65 48 8b 3c 25 28 00 00 00 48 89 7c 24 20 31 ff 48 8b 7b 08 89 54 24 04 48 89 44 24 08 48 8b 4f 60 48 85 c9 74 43 <48> 8b 49 40 48 85 c9 74 3a 48 3b 7f 18 74 24 e8 0f e9 12 00 48
[427005.856322] RIP [<ffffffffaa06967d>] d_path+0x3d/0x150
[427005.861277] RSP <ffff89b5d89d3e08>
[427005.865579] CR2: 0000000000000041
Environment
- Red Hat Enterprise Linux 7
- Red Hat Enterprise Linux 8
- Unsigned (U) Kernel modules:-
sisevt
,sisap
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.