Kernel panic in kfree function due to involvement of third party kernel modules bmhook and tmhook

Solution Verified - Updated -

Issue

  • The server got panicked with message "BUG: unable to handle kernel paging request" at kfree() function.
  • Below or similar information can be seen in the logs:
[4960079.382405] BUG: unable to handle kernel paging request at fffff3852e4d6248
[4960079.382445] PGD 0 P4D 0 
[4960079.382456] Oops: 0000 [#1] SMP NOPTI
[4960079.382470] CPU: 4 PID: 3679065 Comm: ls Kdump: loaded Tainted: P           OE    --------- -  - 4.18.0-477.27.1.el8_8.x86_64 #1
[4960079.382503] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[4960079.382537] RIP: 0010:kfree+0x66/0x250
[4960079.382552] Code: 80 4c 01 ed 0f 82 f2 01 00 00 48 c7 c0 00 00 00 80 48 2b 05 44 a7 08 01 48 01 c5 48 c1 ed 0c 48 c1 e5 06 48 03 2d 22 a7 08 01 <48> 8b 45 08 48 8d 50 ff a8 01 48 0f 45 ea 48 8b 55 08 48 8d 42 ff
[4960079.382616] RSP: 0018:ffffb99e5353fce8 EFLAGS: 00010282
[4960079.382637] RAX: 00006e6cc0000000 RBX: ffff9195669cabe0 RCX: 0000000393897d3d
[4960079.382668] RDX: 0000000393897d3c RSI: 44c0f5c3e66a2cd5 RDI: ffffb99e53589000
[4960079.382703] RBP: fffff3852e4d6240 R08: 0000000080000000 R09: ffff919afffd5000
[4960079.382729] R10: 0000000000000000 R11: 0000000000000009 R12: ffffffffc0d9a154
[4960079.382757] R13: ffffb99e53589000 R14: dead000000000200 R15: dead000000000100
[4960079.382782] FS:  0000000000000000(0000) GS:ffff919addf00000(0000) knlGS:0000000000000000
[4960079.382809] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4960079.382829] CR2: fffff3852e4d6248 CR3: 000000072202e001 CR4: 00000000007706e0
[4960079.382884] PKRU: 55555554
[4960079.382925] Call Trace:
[4960079.382938]  bmhook_cleanup_object+0x264/0x3f0 [bmhook]
[4960079.382983]  bmhook_free_object+0x13/0x40 [bmhook]
[4960079.383023]  bmhook_put_data+0x2c/0x50 [bmhook]
[4960079.383062]  bmhook_cleanup_data+0x153/0x1d0 [bmhook]
[4960079.383104]  bmhook_posthook_handler+0x13e/0x2c0 [bmhook]
[4960079.383141]  tmhook_invoke_posthooks+0x38/0xc0 [tmhook]
[4960079.383164]  tmhook_handler+0x1ba/0x210 [tmhook]
[4960079.383186]  ? do_syscall_64+0x5b/0x1b0
[4960079.383204]  do_syscall_64+0x5b/0x1b0
[4960079.383221]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[4960079.383245] RIP: 0033:0x7f9335ff3c80
[4960079.383271] Code: Unable to access opcode bytes at RIP 0x7f9335ff3c56.
[4960079.383296] RSP: 002b:00007ffca94b9120 EFLAGS: 00000200 ORIG_RAX: 000000000000003b
[4960079.383325] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000
[4960079.383349] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[4960079.383369] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[4960079.383393] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[4960079.383415] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000

Environment

  • Red Hat Enterprise Linux
  • Third-party kernel module [bmhook] and [tmhook]

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content