Kernel panic at ec_mem_cache_get() function due to involvement of third party module from cbsensor.

Solution Verified - Updated -

Issue

  • Kernel panic with logs:
BUG: unable to handle kernel paging request at ffffffffffffffaf
IP: [<ffffffffc0cb15da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1061973]
PGD 52c4814067 PUD 52c4816067 PMD 0 
Oops: 0000 [#1] SMP 
systemd-journald[888]: /dev/kmsg buffer overrun, some messages lost.
Modules linked in: cbsensor_2_5_1061973(OE) talpa_vfshook(OE) talpa_pedconnector(OE) talpa_vcdevice(OE) talpa_core(OE) talpa_linux(OE) talpa_syscallhook(OE) tcp_diag inet_diag talpa_pedevice(OE) xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter devlink ext4 mbcache jbd2 iscsi_tcp libiscsi_tcp rpcrdma sunrpc ib_isert iscsi_target_mod ib_iser libiscsi scsi_transport_iscsi ib_srpt target_core_mod ib_srp scsi_transport_srp ib_ipoib rdma_ucm ib_uverbs ib_umad rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support mxm_wmi sb_edac intel_powerclamp coretemp intel_rapl iosf_mbi kvm_intel
systemd-journald[888]: /dev/kmsg buffer overrun, some messages lost.
kvm irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper dm_service_time cryptd ib_core pcspkr joydev sg ipmi_ssif lpc_ich ipmi_si ipmi_devintf wmi ipmi_msghandler acpi_power_meter dm_multipath binfmt_misc ip_tables xfs libcrc32c sd_mod crc_t10dif crct10dif_generic mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fnic fb_sys_fops ttm drm libfcoe crct10dif_pclmul crct10dif_common crc32c_intel libfc megaraid_sas scsi_transport_fc enic drm_panel_orientation_quirks scsi_tgt dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: cbsensor]
CPU: 7 PID: 30914 Comm: ir_agent Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.81.1.el7.x86_64 #1
Hardware name: Cisco Systems Inc UCSB-B200-M4/UCSB-B200-M4, BIOS B200M4.3.1.3f.0.110320162243 11/03/2016
task: ffff9a31bee45280 ti: ffff9a2e007fc000 task.ti: ffff9a2e007fc000
RIP: 0010:[<ffffffffc0cb15da>]  [<ffffffffc0cb15da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1061973]
RSP: 0018:ffff9a2e007ffca0  EFLAGS: 00010082
RAX: ffff9a2fcbdbc530 RBX: ffffffffffffffff RCX: 0000000000000000
RDX: ffff9a2e007ffec0 RSI: ffff9a2e007ffec0 RDI: ffffffffffffffdf
RBP: ffff9a2e007ffcd0 R08: ffffffff83c3587c R09: ffffffff83c8a280
R10: 00000000000ab640 R11: 0000000000100000 R12: ffffffffc0ccfb80
R13: ffff9a2e007ffec0 R14: ffffffffffffffdf R15: ffffaa8c31fb68e0
FS:  00007fd8627fc700(0000) GS:ffff9a31bfdc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffaf CR3: 0000003f7f6c2000 CR4: 00000000001607e0
Call Trace:
[<ffffffffc0cc04e6>] ? ec_hashtbl_get+0x36/0xa0 [cbsensor_2_5_1061973]
[<ffffffffc0cb47a3>] ec_path_cache_get+0x23/0x60 [cbsensor_2_5_1061973]
[<ffffffff833b1bec>] ? dump_stack+0x19/0x1f
[<ffffffffc0cbd680>] __ec_process_tracking_get_path_data+0x30/0x80 [cbsensor_2_5_1061973]
[<ffffffffc0cbdb5c>] ? ec_process_tracking_get_exec_identity_ref+0x1c/0x50 [cbsensor_2_5_1061973]
[<ffffffffc0cbe01d>] ec_process_exec_handle_set_exec_identity+0x3d/0x60 [cbsensor_2_5_1061973]
[<ffffffffc0cbe113>] ec_process_handle_alloc+0x63/0x90 [cbsensor_2_5_1061973]
[<ffffffffc0cbba6e>] ec_hashtbl_handle_callback+0xe/0x10 [cbsensor_2_5_1061973]
[<ffffffffc0cc0501>] ec_hashtbl_get+0x51/0xa0 [cbsensor_2_5_1061973]
[<ffffffffc0cc0780>] ec_hashtbl_find+0x230/0x2c0 [cbsensor_2_5_1061973]
[<ffffffffc0cbcbfd>] ec_get_procinfo_and_create_process_start_if_needed+0x3d/0xa0 [cbsensor_2_5_1061973]
[<ffffffffc0cb3402>] __ec_do_generic_file_event+0x102/0x120 [cbsensor_2_5_1061973]
[<ffffffffc0cb3200>] ? __ec_call_orig_sys_unlink+0x20/0x20 [cbsensor_2_5_1061973]
[<ffffffffc0cb3c41>] __ec_sys_unlink+0x91/0xc0 [cbsensor_2_5_1061973]
[<ffffffffc0cb4416>] ec_sys_unlinkat+0x86/0xd0 [cbsensor_2_5_1061973]
[<ffffffff833c539a>] system_call_fastpath+0x25/0x2a
Code: a2 6f c2 eb d6 48 8d 70 5c 48 89 da 48 c7 c7 e0 8e cc c0 31 c0 e8 76 a2 6f c2 eb cf 0f 1f 44 00 00 0f 1f 44 00 00 48 85 ff 74 22 <81> 7f d0 ef be ad de 75 06 f0 48 ff 47 f0 c3 f6 05 40 e5 01 00 
RIP  [<ffffffffc0cb15da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1061973]
RSP <ffff9a2e007ffca0>
CR2: ffffffffffffffaf
BUG: unable to handle kernel paging request at ffffffffffffffaf
IP: [<ffffffffc04d95da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
PGD 2276214067 PUD 2276216067 PMD 0 
Oops: 0000 [#1] SMP 
Modules linked in: cbsensor_2_5_1230541(OE) oracleacfs(POE) oracleadvm(POE) oracleoks(POE) nfsv3 nfs_acl ip6table_filter ip6_tables xt_comment iptable_filter rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache twnotify(OE) oracleasm(O) vmw_vsock_vmci_transport vsock sunrpc ppdev vmw_balloon iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr joydev vmw_vmci sg i2c_piix4 parport_pc parport binfmt_misc ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ahci ata_piix crct10dif_pclmul libahci drm crct10dif_common nfit crc32c_intel libata libnvdimm serio_raw vmxnet3 vmw_pvscsi drm_panel_orientation_quirks
dm_mirror dm_region_hash dm_log dm_mod fuse
CPU: 19 PID: 9529 Comm: WdCappingTimer Kdump: loaded Tainted: P           OE  ------------   3.10.0-1160.90.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
task: ffff9967c35a5280 ti: ffff9967c5bcc000 task.ti: ffff9967c5bcc000
RIP: 0010:[<ffffffffc04d95da>]  [<ffffffffc04d95da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
RSP: 0018:ffff9967c5bcfbf8  EFLAGS: 00010082
RAX: ffff9954fda8fa30 RBX: ffffffffffffffff RCX: 0000000000000006
RDX: ffff9967c5bcfe20 RSI: ffff9967c5bcfe20 RDI: ffffffffffffffdf
RBP: ffff9967c5bcfc28 R08: 747361665f6c6c61 R09: 3278302b68746170
R10: 0000000000002cfb R11: 613278302f353278 R12: ffffffffc04f7b80
R13: ffff9967c5bcfe20 R14: ffffffffffffffdf R15: ffffbc59f30a1d20
FS:  00007ff1f4bf2700(0000) GS:ffff9967ceac0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffaf CR3: 0000005a7ba0c000 CR4: 00000000007607e0
PKRU: 55555554
Call Trace:
[<ffffffffc04e84e6>] ? ec_hashtbl_get+0x36/0xa0 [cbsensor_2_5_1230541]
[<ffffffffc04dc7a3>] ec_path_cache_get+0x23/0x60 [cbsensor_2_5_1230541]
[<ffffffffa2bb1bec>] ? dump_stack+0x19/0x1f
[<ffffffffc04e5680>] __ec_process_tracking_get_path_data+0x30/0x80 [cbsensor_2_5_1230541]
[<ffffffffc04e5b5c>] ? ec_process_tracking_get_exec_identity_ref+0x1c/0x50 [cbsensor_2_5_1230541]
[<ffffffffc04e601d>] ec_process_exec_handle_set_exec_identity+0x3d/0x60 [cbsensor_2_5_1230541]
[<ffffffffc04e6113>] ec_process_handle_alloc+0x63/0x90 [cbsensor_2_5_1230541]
[<ffffffffc04e3a6e>] ec_hashtbl_handle_callback+0xe/0x10 [cbsensor_2_5_1230541]
[<ffffffffc04e8501>] ec_hashtbl_get+0x51/0xa0 [cbsensor_2_5_1230541]
[<ffffffffc04e8780>] ec_hashtbl_find+0x230/0x2c0 [cbsensor_2_5_1230541]
[<ffffffffc04e3bc2>] ec_process_tracking_get_handle+0x32/0x50 [cbsensor_2_5_1230541]
[<ffffffffc04e5d24>] ec_is_process_tracked+0x14/0x30 [cbsensor_2_5_1230541]
[<ffffffffc04dfcfb>] ec_sys_clone+0xfb/0x1b0 [cbsensor_2_5_1230541]
[<ffffffffa24e38d1>] ? sched_move_task+0x101/0x270
[<ffffffffc04dfea7>] ec_sched_process_fork_probe+0xf7/0x100 [cbsensor_2_5_1230541]
[<ffffffffa249e863>] do_fork+0x163/0x340
[<ffffffffa249eae6>] SyS_clone+0x16/0x20
[<ffffffffa2bc5774>] stub_clone+0x44/0x70
[<ffffffffa2bc539a>] ? system_call_fastpath+0x25/0x2a
Code: 22 6d e2 eb d6 48 8d 70 5c 48 89 da 48 c7 c7 e0 0e 4f c0 31 c0 e8 76 22 6d e2 eb cf 0f 1f 44 00 00 0f 1f 44 00 00 48 85 ff 74 22 <81> 7f d0 ef be ad de 75 06 f0 48 ff 47 f0 c3 f6 05 40 e5 01 00 
RIP  [<ffffffffc04d95da>] ec_mem_cache_get+0xa/0x50 [cbsensor_2_5_1230541]
RSP <ffff9967c5bcfbf8>
CR2: ffffffffffffffaf

Environment

  • Red Hat Enterprise Linux 7
  • cbsensor module

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content