Kernel panic in ec_mem_cache_get() of the third-party kernel module [event_collector_3_1_2244956].

Solution Unverified - Updated -

Issue

  • The kernel crashed in the ec_mem_cache_get() function of the third-party kernel module [event_collector_3_1_2244956] with the following call traces.
[1646147.839393] BUG: unable to handle kernel paging request at ffffffffffffffaf
[1646147.839436] IP: [<ffffffffc094764a>] ec_mem_cache_get+0xa/0x60 [event_collector_3_1_2244956]
[1646147.839484] PGD 1253c14067 PUD 1253c16067 PMD 0 
[1646147.839516] Oops: 0000 [#1] SMP 
[1646147.839542] Modules linked in: event_collector_3_1_2244956(OE) ip6table_filter ip6_tables iptable_filter vsock_diag unix_diag af_packet_diag netlink_diag udp_diag tcp_diag inet_diag nfs
v3 nfs_acl rpcsec_gss_krb5 nfsv4 dns_resolver nfs lockd grace fscache vmw_vsock_vmci_transport vsock iosf_mbi crc32_pclmul ghash_clmulni_intel ppdev aesni_intel lrw gf128mul glue_helper ablk
_helper cryptd vmw_balloon pcspkr joydev sg vmw_vmci i2c_piix4 parport_pc parport auth_rpcgss sunrpc binfmt_misc ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx sd_mod crc_t10dif crct10dif_generic drm_kms_helper syscopyarea crct10dif_pclmul crct10dif_common sysfillrect crc32c_intel sysimgblt fb_sys_fops ttm ahci serio_raw drm ata_piix libahci libata nfit libnvdimm vmxnet3 vmw_pvscsi drm_panel_orientation_quirks
[1646147.840046]  floppy dm_mirror dm_region_hash dm_log dm_mod fuse
[1646147.840085] CPU: 4 PID: 54352 Comm: java Kdump: loaded Tainted: G           OE  ------------   3.10.0-1160.114.2.el7.x86_64 #1
[1646147.840140] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[1646147.840196] task: ffff9e0ec3170000 ti: ffff9e1670ecc000 task.ti: ffff9e1670ecc000
[1646147.840220] RIP: 0010:[<ffffffffc094764a>]  [<ffffffffc094764a>] ec_mem_cache_get+0xa/0x60 [event_collector_3_1_2244956]
[1646147.840260] RSP: 0018:ffff9e1670ecfc70  EFLAGS: 00010082
[1646147.840278] RAX: ffff9e18ad6eb230 RBX: ffffffffffffffff RCX: 0000000000000006
[1646147.840300] RDX: ffff9e1670ecfec0 RSI: ffff9e1670ecfec0 RDI: ffffffffffffffdf
[1646147.840322] RBP: ffff9e1670ecfca0 R08: 6170747361665f6c R09: 2f353278302b6874
[1646147.840343] R10: 000000000000114d R11: 613278302f353278 R12: ffffffffc0966b80
[1646147.840395] R13: ffff9e1670ecfec0 R14: ffffffffffffffdf R15: ffffb9aa0c567540
[1646147.840417] FS:  00007f96e8d47700(0000) GS:ffff9e1a65700000(0000) knlGS:0000000000000000
[1646147.840442] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1646147.840460] CR2: ffffffffffffffaf CR3: 000000156da88000 CR4: 00000000007607e0
[1646147.840506] PKRU: 55555554
[1646147.840516] Call Trace:
[1646147.840531]  [<ffffffffc09563c6>] ? ec_hashtbl_get+0x36/0xa0 [event_collector_3_1_2244956]
[1646147.841575]  [<ffffffffc094a8f3>] ec_path_cache_get+0x23/0x60 [event_collector_3_1_2244956]
[1646147.842796]  [<ffffffffa49b1bec>] ? dump_stack+0x19/0x1f
[1646147.844100]  [<ffffffffc09535a0>] __ec_process_tracking_get_path_data+0x30/0x80 [event_collector_3_1_2244956]
[1646147.845479]  [<ffffffffc0953a7c>] ? ec_process_tracking_get_exec_identity_ref+0x1c/0x50 [event_collector_3_1_2244956]
[1646147.846832]  [<ffffffffc0953ecd>] ec_process_exec_handle_set_exec_identity+0x3d/0x60 [event_collector_3_1_2244956]
[1646147.848209]  [<ffffffffc0954003>] ec_process_handle_alloc+0x63/0x90 [event_collector_3_1_2244956]
[1646147.849597]  [<ffffffffc095195e>] ec_hashtbl_handle_callback+0xe/0x10 [event_collector_3_1_2244956]
[1646147.851032]  [<ffffffffc09563e1>] ec_hashtbl_get+0x51/0xa0 [event_collector_3_1_2244956]
[1646147.852471]  [<ffffffffc0956660>] ec_hashtbl_find+0x230/0x2c0 [event_collector_3_1_2244956]
[1646147.853926]  [<ffffffffc0951b82>] ec_process_tracking_get_handle+0x32/0x50 [event_collector_3_1_2244956]
[1646147.855403]  [<ffffffffc094967c>] __ec_do_file_event+0xfc/0x400 [event_collector_3_1_2244956]
[1646147.856899]  [<ffffffffc0949b36>] __ec_sys_open+0xb6/0x100 [event_collector_3_1_2244956]
[1646147.858415]  [<ffffffffc094a2d1>] ec_sys_open+0x91/0xe0 [event_collector_3_1_2244956]
[1646147.859962]  [<ffffffffa49c539a>] system_call_fastpath+0x25/0x2a
[1646147.861482] Code: e4 eb c8 48 8d 70 5c 48 89 da 48 c7 c7 a0 f0 95 c0 31 c0 e8 08 42 06 e4 eb ca 0f 1f 80 00 00 00 00 0f 1f 44 00 00 48 85 ff 74 2d <8b> 4f d0 81 f9 ef be ad de 75 06 f0 48 ff 47 f0 c3 f6 05 ce f4 
[1646147.864795] RIP  [<ffffffffc094764a>] ec_mem_cache_get+0xa/0x60 [event_collector_3_1_2244956]
[1646147.866477]  RSP <ffff9e1670ecfc70>
[1646147.867987] CR2: ffffffffffffffaf

Environment

  • RHEL 7
  • Third-Party kernel module [event_collector_3_1_2244956]

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content