Kernel panic in __list_add() due to third-party kernel module seos
Issue
- Kernel crashed due to a NULL pointer dereference in the
__list_add()
function:
[1016682.861319] BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
[1016682.861904] IP: [<ffffffffa75bd1df>] __list_add+0xf/0xc0
[1016682.862453] PGD 0
[1016682.862931] Oops: 0000 [#1] SMP
[1016682.863416] Modules linked in: rpcsec_gss_krb5 nfsv4 nfs lockd grace fscache cmac arc4 md4 nls_utf8 cifs ccm dns_resolver unix_diag seos_1410_40_102(POE) vmw_vsock_vmci_transport vsock xfs libcrc32c sb_edac iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper ppdev cryptd joydev pcspkr vmw_balloon i2c_piix4 vmw_vmci sg parport_pc parport binfmt_misc auth_rpcgss sunrpc ip_tables ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper sd_mod syscopyarea sysfillrect crc_t10dif sysimgblt fb_sys_fops crct10dif_generic ttm ata_piix drm libata nfit libnvdimm crct10dif_pclmul crct10dif_common crc32c_intel serio_raw vmxnet3 drm_panel_orientation_quirks vmw_pvscsi floppy dm_mirror dm_region_hash dm_log dm_mod fuse
[1016682.866257] CPU: 3 PID: 26092 Comm: crond Kdump: loaded Tainted: POE ------------ T 3.10.0-1160.135.1.el7.x86_64 #1
[1016682.867194] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[1016682.868280] task: ffff9e1e37ec4200 ti: ffff9e2602ff4000 task.ti: ffff9e2602ff4000
[1016682.869395] RIP: 0010:[<ffffffffa75bd1df>] [<ffffffffa75bd1df>] __list_add+0xf/0xc0
[1016682.870520] RSP: 0018:ffff9e2602ff7c88 EFLAGS: 00010046
[1016682.871639] RAX: 0000000000000246 RBX: ffffffffc0ac40d8 RCX: 0000000000000000
[1016682.872764] RDX: 0000000000000000 RSI: ffffffffc0ac40e0 RDI: ffff9e2602ff7d20
[1016682.873884] RBP: ffff9e2602ff7ca0 R08: ffffffffa7a1e920 R09: ffff9e1e37ec4200
[1016682.874530] R10: 0000000000000001 R11: 0001606a28b55fcc R12: 0000000000000000
[1016682.875153] R13: ffffffffc0ac40e0 R14: 0000000000000000 R15: ffff9e1e37ec4200
[1016682.875772] FS: 00007f8dde6328c0(0000) GS:ffff9e29bfcc0000(0000) knlGS:0000000000000000
[1016682.876404] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1016682.877013] CR2: 00007fdef85ca000 CR3: 00000002a8654000 CR4: 00000000001607e0
[1016682.877662] Call Trace:
[1016682.878308] [<ffffffffa72cc1c1>] add_wait_queue+0x31/0x50
[1016682.878948] [<ffffffffc0866f00>] SEOS_wait_event+0x140/0x1e0 [seos_1410_40_102]
[1016682.879578] [<ffffffffa72d8f93>] ? __wake_up+0x13/0x20
[1016682.880212] [<ffffffffc0866c0d>] ? SEOS_md_notify_event+0x2d/0x30 [seos_1410_40_102]
[1016682.880846] [<ffffffffa72e1190>] ? wake_up_state+0x20/0x20
[1016682.881493] [<ffffffffc085d9b3>] eAC_give_seosd+0xe3/0x1a0 [seos_1410_40_102]
[1016682.882135] [<ffffffffc085e449>] eAC_route_event+0x69/0x100 [seos_1410_40_102]
[1016682.882778] [<ffffffffc086106b>] SEOS_int_route+0x11b/0x190 [seos_1410_40_102]
[1016682.883549] [<ffffffffc0861fa0>] SEOS_setuid+0xf0/0x150 [seos_1410_40_102]
[1016682.884368] [<ffffffffc0868a86>] my_setreuid+0x1c6/0x250 [seos_1410_40_102]
[1016682.885012] [<ffffffffa79c539f>] system_call_fastpath+0x25/0x2a
[1016682.885637] Code: 63 e7 ff b8 f4 ff ff ff e9 33 ff ff ff b8 f4 ff ff ff e9 29 ff ff ff 0f 1f 44 00 00 55 48 89 e5 41 55 49 89 f5 41 54 49 89 d4 53 <4c> 8b 42 08 48 89 fb 49 39 f0 75 2e 4d 8b 45 00 4d 39 c4 75 6c
[1016682.887056] RIP [<ffffffffa75bd1df>] __list_add+0xf/0xc0
[1016682.887740] RSP <ffff9e2602ff7c88>
[1016682.888395] CR2: 0000000000000008
Environment
- Red Hat Enterprise Linux 7
- Proprietary kernel module:
seos
- Symantec Privileged Access Manager Server Control
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.