Kernel panic in __list_add() due to third-party kernel module seos

Solution Unverified - Updated -

Issue

  • Kernel crashed due to a NULL pointer dereference in the __list_add() function:
[1016682.861319] BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
[1016682.861904] IP: [<ffffffffa75bd1df>] __list_add+0xf/0xc0
[1016682.862453] PGD 0 
[1016682.862931] Oops: 0000 [#1] SMP 
[1016682.863416] Modules linked in: rpcsec_gss_krb5 nfsv4 nfs lockd grace fscache cmac arc4 md4 nls_utf8 cifs ccm dns_resolver unix_diag seos_1410_40_102(POE) vmw_vsock_vmci_transport vsock xfs libcrc32c sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper ppdev cryptd joydev pcspkr vmw_balloon i2c_piix4 vmw_vmci sg parport_pc parport binfmt_misc auth_rpcgss sunrpc ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper sd_mod syscopyarea sysfillrect crc_t10dif sysimgblt fb_sys_fops crct10dif_generic ttm ata_piix drm libata nfit libnvdimm crct10dif_pclmul crct10dif_common crc32c_intel serio_raw vmxnet3 drm_panel_orientation_quirks vmw_pvscsi floppy dm_mirror dm_region_hash dm_log dm_mod fuse
[1016682.866257] CPU: 3 PID: 26092 Comm: crond Kdump: loaded Tainted: POE  ------------ T 3.10.0-1160.135.1.el7.x86_64 #1
[1016682.867194] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[1016682.868280] task: ffff9e1e37ec4200 ti: ffff9e2602ff4000 task.ti: ffff9e2602ff4000
[1016682.869395] RIP: 0010:[<ffffffffa75bd1df>]  [<ffffffffa75bd1df>] __list_add+0xf/0xc0
[1016682.870520] RSP: 0018:ffff9e2602ff7c88  EFLAGS: 00010046
[1016682.871639] RAX: 0000000000000246 RBX: ffffffffc0ac40d8 RCX: 0000000000000000
[1016682.872764] RDX: 0000000000000000 RSI: ffffffffc0ac40e0 RDI: ffff9e2602ff7d20
[1016682.873884] RBP: ffff9e2602ff7ca0 R08: ffffffffa7a1e920 R09: ffff9e1e37ec4200
[1016682.874530] R10: 0000000000000001 R11: 0001606a28b55fcc R12: 0000000000000000
[1016682.875153] R13: ffffffffc0ac40e0 R14: 0000000000000000 R15: ffff9e1e37ec4200
[1016682.875772] FS:  00007f8dde6328c0(0000) GS:ffff9e29bfcc0000(0000) knlGS:0000000000000000
[1016682.876404] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1016682.877013] CR2: 00007fdef85ca000 CR3: 00000002a8654000 CR4: 00000000001607e0
[1016682.877662] Call Trace:
[1016682.878308]  [<ffffffffa72cc1c1>] add_wait_queue+0x31/0x50
[1016682.878948]  [<ffffffffc0866f00>] SEOS_wait_event+0x140/0x1e0 [seos_1410_40_102]
[1016682.879578]  [<ffffffffa72d8f93>] ? __wake_up+0x13/0x20
[1016682.880212]  [<ffffffffc0866c0d>] ? SEOS_md_notify_event+0x2d/0x30 [seos_1410_40_102]
[1016682.880846]  [<ffffffffa72e1190>] ? wake_up_state+0x20/0x20
[1016682.881493]  [<ffffffffc085d9b3>] eAC_give_seosd+0xe3/0x1a0 [seos_1410_40_102]
[1016682.882135]  [<ffffffffc085e449>] eAC_route_event+0x69/0x100 [seos_1410_40_102]
[1016682.882778]  [<ffffffffc086106b>] SEOS_int_route+0x11b/0x190 [seos_1410_40_102]
[1016682.883549]  [<ffffffffc0861fa0>] SEOS_setuid+0xf0/0x150 [seos_1410_40_102]
[1016682.884368]  [<ffffffffc0868a86>] my_setreuid+0x1c6/0x250 [seos_1410_40_102]
[1016682.885012]  [<ffffffffa79c539f>] system_call_fastpath+0x25/0x2a
[1016682.885637] Code: 63 e7 ff b8 f4 ff ff ff e9 33 ff ff ff b8 f4 ff ff ff e9 29 ff ff ff 0f 1f 44 00 00 55 48 89 e5 41 55 49 89 f5 41 54 49 89 d4 53 <4c> 8b 42 08 48 89 fb 49 39 f0 75 2e 4d 8b 45 00 4d 39 c4 75 6c 
[1016682.887056] RIP  [<ffffffffa75bd1df>] __list_add+0xf/0xc0
[1016682.887740]  RSP <ffff9e2602ff7c88>
[1016682.888395] CR2: 0000000000000008

Environment

  • Red Hat Enterprise Linux 7
  • Proprietary kernel module: seos
  • Symantec Privileged Access Manager Server Control

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content