Kernel panics in amf_prexec_hook() on module [amf]

Solution Verified - Updated -

Issue

  • Kernel panic in amf_prexec_hook() function due to the involvement of a third-party kernel module [amf].
  • Kernel panics with the following messages:
[421355.005836] BUG: unable to handle kernel paging request at ffff981cc05b5e43
[421355.006659] PGD afd002067 P4D afd002067 PUD 11b993063 PMD 140403063 PTE 80000001405b5061
[421355.007478] Oops: 0003 [#1] SMP NOPTI
[421355.008301] CPU: 10 PID: 2498527 Comm: perl Kdump: loaded Tainted: P           OE    --------- -  - 4.18.0-477.27.1.el8_8.x86_64 #1
[421355.009198] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[421355.010138] RIP: 0010:amf_prexec_hook+0x32b/0x8b0 [amf] <-----------
[421355.011128] Code: 45 01 cd 41 81 fd ff 1f 00 00 75 c3 80 7c 24 3b 00 4c 8b 24 24 ba fe 1f 00 00 74 09 29 c2 48 63 d2 48 83 ea 01 48 8b 44 24 40 <c6> 04 10 00 48 8b 44 24 30 48 89 c5 4c 8d 68 18 48 8b 5d 00 48 85
[421355.013083] RSP: 0018:ffffbd5f2ac6fd28 EFLAGS: 00010202
[421355.013526] RAX: ffff981cc05b2000 RBX: 0000000000001ff9 RCX: 0000000000000003
[421355.013996] RDX: 0000000000003e43 RSI: 0000000000000000 RDI: ffff981d930b7d20
[421355.014468] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000001ffa
[421355.014945] R10: 00000000000008d8 R11: 0000000000000000 R12: ffff981f7240f400
[421355.015429] R13: 0000000000003e44 R14: 0000000000002000 R15: 0000000000000002
[421355.015912] FS:  00007fd0c6699740(0000) GS:ffff98278b480000(0000) knlGS:0000000000000000
[421355.016408] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[421355.016908] CR2: ffff981cc05b5e43 CR3: 00000002c7d1e003 CR4: 00000000007706e0
[421355.017453] PKRU: 55555554
[421355.017981] Call Trace:
[421355.018499]  ? cshook_security_bprm_check_security+0x70/0xe0 [falcon_lsm_serviceable]
[421355.019042]  search_binary_handler+0x119/0x3a0
[421355.019584]  do_execveat_common.isra.39+0x5b7/0x980
[421355.020142]  ? __audit_getname+0x2d/0x50
[421355.020689]  __x64_sys_execve+0x32/0x40
[421355.021234]  do_syscall_64+0x5b/0x1b0
[421355.021778]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[421355.022331] RIP: 0033:0x7fd0c4ef3e7b
[421355.022883] Code: c0 75 03 5f ff e7 c3 48 8b 0d 09 60 38 00 f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 80 00 00 00 00 f3 0f 1e fa b8 3b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d dd 5f 38 00 f7 d8 64 89 01 48
[421355.023880] RSP: 002b:00007fffe6e828e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
[421355.024395] RAX: ffffffffffffffda RBX: 00007fffe6e82910 RCX: 00007fd0c4ef3e7b
[421355.024914] RDX: 00005640562112b0 RSI: 00007fffe6e828f0 RDI: 00007fd0c6248788
[421355.025439] RBP: 00007fffe6e82970 R08: 00007fffe6e82980 R09: 00007fffe6e82910
[421355.025973] R10: 0000000000000001 R11: 0000000000000202 R12: 00007fd0c6479be8
[421355.026504] R13: 00007fd0c6248d80 R14: 00007fd0c6248788 R15: 00007fffe6e82990

Environment

  • Red Hat Enterprise Linux 8

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content