Kernel panic in kfree function due to involvement of third party kernel modules bmhook and tmhook
Issue
- The server got panicked with message "BUG: unable to handle kernel paging request" at
kfree()
function. - Below or similar information can be seen in the logs:
[4960079.382405] BUG: unable to handle kernel paging request at fffff3852e4d6248
[4960079.382445] PGD 0 P4D 0
[4960079.382456] Oops: 0000 [#1] SMP NOPTI
[4960079.382470] CPU: 4 PID: 3679065 Comm: ls Kdump: loaded Tainted: P OE --------- - - 4.18.0-477.27.1.el8_8.x86_64 #1
[4960079.382503] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[4960079.382537] RIP: 0010:kfree+0x66/0x250
[4960079.382552] Code: 80 4c 01 ed 0f 82 f2 01 00 00 48 c7 c0 00 00 00 80 48 2b 05 44 a7 08 01 48 01 c5 48 c1 ed 0c 48 c1 e5 06 48 03 2d 22 a7 08 01 <48> 8b 45 08 48 8d 50 ff a8 01 48 0f 45 ea 48 8b 55 08 48 8d 42 ff
[4960079.382616] RSP: 0018:ffffb99e5353fce8 EFLAGS: 00010282
[4960079.382637] RAX: 00006e6cc0000000 RBX: ffff9195669cabe0 RCX: 0000000393897d3d
[4960079.382668] RDX: 0000000393897d3c RSI: 44c0f5c3e66a2cd5 RDI: ffffb99e53589000
[4960079.382703] RBP: fffff3852e4d6240 R08: 0000000080000000 R09: ffff919afffd5000
[4960079.382729] R10: 0000000000000000 R11: 0000000000000009 R12: ffffffffc0d9a154
[4960079.382757] R13: ffffb99e53589000 R14: dead000000000200 R15: dead000000000100
[4960079.382782] FS: 0000000000000000(0000) GS:ffff919addf00000(0000) knlGS:0000000000000000
[4960079.382809] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4960079.382829] CR2: fffff3852e4d6248 CR3: 000000072202e001 CR4: 00000000007706e0
[4960079.382884] PKRU: 55555554
[4960079.382925] Call Trace:
[4960079.382938] bmhook_cleanup_object+0x264/0x3f0 [bmhook]
[4960079.382983] bmhook_free_object+0x13/0x40 [bmhook]
[4960079.383023] bmhook_put_data+0x2c/0x50 [bmhook]
[4960079.383062] bmhook_cleanup_data+0x153/0x1d0 [bmhook]
[4960079.383104] bmhook_posthook_handler+0x13e/0x2c0 [bmhook]
[4960079.383141] tmhook_invoke_posthooks+0x38/0xc0 [tmhook]
[4960079.383164] tmhook_handler+0x1ba/0x210 [tmhook]
[4960079.383186] ? do_syscall_64+0x5b/0x1b0
[4960079.383204] do_syscall_64+0x5b/0x1b0
[4960079.383221] entry_SYSCALL_64_after_hwframe+0x61/0xc6
[4960079.383245] RIP: 0033:0x7f9335ff3c80
[4960079.383271] Code: Unable to access opcode bytes at RIP 0x7f9335ff3c56.
[4960079.383296] RSP: 002b:00007ffca94b9120 EFLAGS: 00000200 ORIG_RAX: 000000000000003b
[4960079.383325] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000
[4960079.383349] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[4960079.383369] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[4960079.383393] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[4960079.383415] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
Environment
- Red Hat Enterprise Linux
- Third-party kernel module
[bmhook]
and[tmhook]
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.