Kernel panic in ec_mem_cache_get() of the third-party kernel module [event_collector_3_1_2244956].
Issue
- The kernel crashed in the
ec_mem_cache_get()
function of the third-party kernel module [event_collector_3_1_2244956
] with the following call traces.
[1646147.839393] BUG: unable to handle kernel paging request at ffffffffffffffaf
[1646147.839436] IP: [<ffffffffc094764a>] ec_mem_cache_get+0xa/0x60 [event_collector_3_1_2244956]
[1646147.839484] PGD 1253c14067 PUD 1253c16067 PMD 0
[1646147.839516] Oops: 0000 [#1] SMP
[1646147.839542] Modules linked in: event_collector_3_1_2244956(OE) ip6table_filter ip6_tables iptable_filter vsock_diag unix_diag af_packet_diag netlink_diag udp_diag tcp_diag inet_diag nfs
v3 nfs_acl rpcsec_gss_krb5 nfsv4 dns_resolver nfs lockd grace fscache vmw_vsock_vmci_transport vsock iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk
_helper cryptd vmw_balloon pcspkr joydev sg vmw_vmci i2c_piix4 parport_pc parport auth_rpcgss sunrpc binfmt_misc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx sd_mod crc_t10dif crct10dif_generic drm_kms_helper syscopyarea crct10dif_pclmul crct10dif_common sysfillrect crc32c_intel sysimgblt fb_sys_fops ttm ahci serio_raw drm ata_piix libahci libata nfit libnvdimm vmxnet3 vmw_pvscsi drm_panel_orientation_quirks
[1646147.840046] floppy dm_mirror dm_region_hash dm_log dm_mod fuse
[1646147.840085] CPU: 4 PID: 54352 Comm: java Kdump: loaded Tainted: G OE ------------ 3.10.0-1160.114.2.el7.x86_64 #1
[1646147.840140] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[1646147.840196] task: ffff9e0ec3170000 ti: ffff9e1670ecc000 task.ti: ffff9e1670ecc000
[1646147.840220] RIP: 0010:[<ffffffffc094764a>] [<ffffffffc094764a>] ec_mem_cache_get+0xa/0x60 [event_collector_3_1_2244956]
[1646147.840260] RSP: 0018:ffff9e1670ecfc70 EFLAGS: 00010082
[1646147.840278] RAX: ffff9e18ad6eb230 RBX: ffffffffffffffff RCX: 0000000000000006
[1646147.840300] RDX: ffff9e1670ecfec0 RSI: ffff9e1670ecfec0 RDI: ffffffffffffffdf
[1646147.840322] RBP: ffff9e1670ecfca0 R08: 6170747361665f6c R09: 2f353278302b6874
[1646147.840343] R10: 000000000000114d R11: 613278302f353278 R12: ffffffffc0966b80
[1646147.840395] R13: ffff9e1670ecfec0 R14: ffffffffffffffdf R15: ffffb9aa0c567540
[1646147.840417] FS: 00007f96e8d47700(0000) GS:ffff9e1a65700000(0000) knlGS:0000000000000000
[1646147.840442] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1646147.840460] CR2: ffffffffffffffaf CR3: 000000156da88000 CR4: 00000000007607e0
[1646147.840506] PKRU: 55555554
[1646147.840516] Call Trace:
[1646147.840531] [<ffffffffc09563c6>] ? ec_hashtbl_get+0x36/0xa0 [event_collector_3_1_2244956]
[1646147.841575] [<ffffffffc094a8f3>] ec_path_cache_get+0x23/0x60 [event_collector_3_1_2244956]
[1646147.842796] [<ffffffffa49b1bec>] ? dump_stack+0x19/0x1f
[1646147.844100] [<ffffffffc09535a0>] __ec_process_tracking_get_path_data+0x30/0x80 [event_collector_3_1_2244956]
[1646147.845479] [<ffffffffc0953a7c>] ? ec_process_tracking_get_exec_identity_ref+0x1c/0x50 [event_collector_3_1_2244956]
[1646147.846832] [<ffffffffc0953ecd>] ec_process_exec_handle_set_exec_identity+0x3d/0x60 [event_collector_3_1_2244956]
[1646147.848209] [<ffffffffc0954003>] ec_process_handle_alloc+0x63/0x90 [event_collector_3_1_2244956]
[1646147.849597] [<ffffffffc095195e>] ec_hashtbl_handle_callback+0xe/0x10 [event_collector_3_1_2244956]
[1646147.851032] [<ffffffffc09563e1>] ec_hashtbl_get+0x51/0xa0 [event_collector_3_1_2244956]
[1646147.852471] [<ffffffffc0956660>] ec_hashtbl_find+0x230/0x2c0 [event_collector_3_1_2244956]
[1646147.853926] [<ffffffffc0951b82>] ec_process_tracking_get_handle+0x32/0x50 [event_collector_3_1_2244956]
[1646147.855403] [<ffffffffc094967c>] __ec_do_file_event+0xfc/0x400 [event_collector_3_1_2244956]
[1646147.856899] [<ffffffffc0949b36>] __ec_sys_open+0xb6/0x100 [event_collector_3_1_2244956]
[1646147.858415] [<ffffffffc094a2d1>] ec_sys_open+0x91/0xe0 [event_collector_3_1_2244956]
[1646147.859962] [<ffffffffa49c539a>] system_call_fastpath+0x25/0x2a
[1646147.861482] Code: e4 eb c8 48 8d 70 5c 48 89 da 48 c7 c7 a0 f0 95 c0 31 c0 e8 08 42 06 e4 eb ca 0f 1f 80 00 00 00 00 0f 1f 44 00 00 48 85 ff 74 2d <8b> 4f d0 81 f9 ef be ad de 75 06 f0 48 ff 47 f0 c3 f6 05 ce f4
[1646147.864795] RIP [<ffffffffc094764a>] ec_mem_cache_get+0xa/0x60 [event_collector_3_1_2244956]
[1646147.866477] RSP <ffff9e1670ecfc70>
[1646147.867987] CR2: ffffffffffffffaf
Environment
- RHEL 7
- Third-Party kernel module [
event_collector_3_1_2244956
]
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.