Kernel panic at vnlayer_get_root_mnt+21 due to a null pointer dereference

Solution Unverified - Updated -

Issue

  • Kernel panic at vnlayer_get_root_mnt+21 due to a null pointer dereference with the following call traces:
[2677496.953705] BUG: unable to handle kernel NULL pointer dereference at 0000000000000018
[2677496.953879] PGD 40f021b067 P4D 40f021b067 PUD 4191d2d067 PMD 0 
[2677496.953959] Oops: 0000 [#1] SMP NOPTI
[2677496.954034] CPU: 14 PID: 3990356 Comm: java Kdump: loaded Tainted: PWOEX ----------- 4.18.0-425.10.1.el8_7.x86_64 #1
[2677496.954187] Hardware name: HPE ProLiant DL385 Gen10 Plus/ProLiant DL385 Gen10 Plus, BIOS A42 02/06/2023
[2677496.954268] RIP: 0010:vnlayer_get_root_mnt+0x15/0x1e [mvfs]
[2677496.954363] Code: 00 48 8b 80 18 0b 00 00 48 8b 40 20 48 8b 40 30 e9 a6 f6 51 ed 0f 1f 44 00 00 65 48 8b 04 25 40 5c 01 00 48 8b 80 18 0b 00 00 <48> 8b 78 18 e9 d8 d0 c9 ec 0f 1f 44 00 00 65 48 8b 04 25 40 5c 01
[2677496.954539] RSP: 0018:ffffac85f6c137e8 EFLAGS: 00010246
[2677496.954627] RAX: 0000000000000000 RBX: ffff916546703c00 RCX: 0000000000000000
[2677496.954719] RDX: ffff9141f5aedac0 RSI: ffffac85f6c13848 RDI: 0000000000000000
[2677496.954812] RBP: ffffac85f6c137f0 R08: 0038034986daabfd R09: ffffffffc10946b0
[2677496.954907] R10: 0000000000000000 R11: 0000000000000100 R12: ffffac85f6c13848
[2677496.955003] R13: ffffac85f6c13998 R14: 0000000000000000 R15: ffffac85f6c13910
[2677496.955100] FS:  0000000000000000(0000) GS:ffff915cfeb80000(0000) knlGS:0000000000000000
[2677496.955202] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[2677496.955300] CR2: 0000000000000018 CR3: 0000004623c48000 CR4: 0000000000350ee0
[2677496.955403] Call Trace:
[2677496.955503]  mvop_linux_lookup_storage_file+0x47/0xe2 [mvfs]
[2677496.955621]  mfs_getcleartext+0x6a4/0xd75 [mvfs]
[2677496.955735]  ? rpc_destroy_wait_queue+0x10/0x10 [sunrpc]
[2677496.955856]  ? _copy_to_iter+0x14f/0x3d0
[2677496.955963]  mvfs_pre_rdwr+0x170/0x28d [mvfs]
[2677496.956075]  mvfs_rdwr_ctx+0x68/0x575 [mvfs]
[2677496.956188]  vnode_fop_rdwr_iter+0x12b/0x179 [mvfs]
[2677496.956305]  new_sync_read+0x10f/0x160
[2677496.956414]  0xffffffffc098dc95
[2677496.956523]  ? 0xffffffffc098db01
[2677496.956632]  ? cshook_systemcalltable_pre_compat_sys_ioctl+0x293d8/0x312f0 [falcon_lsm_serviceable]
[2677496.956749]  ? _ZdlPv+0x3cdef/0x3e200 [falcon_lsm_serviceable]
[2677496.956862]  ? _ZdlPv+0x3cfe1/0x3e200 [falcon_lsm_serviceable]
[2677496.956974]  ? cshook_systemcalltable_pre_compat_sys_ioctl+0x28b5d/0x312f0 [falcon_lsm_serviceable]
[2677496.957094]  ? __kmalloc+0x113/0x250
[2677496.957207]  ? _ZdlPv+0x3d16a/0x3e200 [falcon_lsm_serviceable]
[2677496.957324]  ? _ZdlPv+0x3d217/0x3e200 [falcon_lsm_serviceable]
[2677496.957440]  ? cshook_security_file_free_security+0x135/0x51c0 [falcon_lsm_serviceable]
[2677496.957565]  ? pinnedhook_security_file_free_security+0x37/0x50 [falcon_lsm_pinned_14812]
[2677496.957692]  ? security_file_free+0x22/0x60
[2677496.957811]  ? __fput+0x12c/0x250
[2677496.957927]  ? task_work_run+0x8a/0xb0
[2677496.958045]  ? do_exit+0x34d/0xb10
[2677496.958163]  ? do_group_exit+0x3a/0xa0
[2677496.958278]  ? get_signal+0x158/0x870
[2677496.958394]  ? do_futex+0x2f9/0x4d0
[2677496.958512]  ? do_signal+0x36/0x690
[2677496.958632]  ? audit_filter_inodes+0x2e/0x100
[2677496.958750]  ? audit_reset_context.part.16+0x29f/0x2f0
[2677496.958866]  ? exit_to_usermode_loop+0x89/0x100
[2677496.958982]  ? do_syscall_64+0x19c/0x1b0
[2677496.959094]  ? entry_SYSCALL_64_after_hwframe+0x61/0xc6

Environment

  • Red Hat Enterprise Linux 8
  • IBM: out-of-tree (O) kernel module: [mvfs]
  • CrowdStrike: out-of-tree (O) kernel module: [falcon_lsm_pinned_14812]

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content