Kernel panic due to a general protection fault in __kmalloc_node() caused by third-party bmsensor kernel module.
Issue
- Kernel panic occurred at
__kmalloc_node
function due to 3rd party module[bmsensor]
. - Kernel panics with following messages:
[54627435.199227] general protection fault: 0000 [#1] SMP
[54627435.199953] Modules linked in: bmsensor(OE) dsa_filter(POE) dsa_filter_hook(OE) falcon_lsm_serviceable(PE) falcon_nf_netcontain(E) falcon_kal(E) falcon_lsm_pinned_18003(E) falcon_lsm_pinned_17804(E) falcon
_lsm_pinned_17706(E) falcon_lsm_pinned_17607(E) falcon_lsm_pinned_17507(E) falcon_lsm_pinned_17405(E) falcon_lsm_pinned_17308(E) falcon_lsm_pinned_17306(E) falcon_lsm_pinned_17219(E) tcp_diag udp_diag inet_diag
falcon_lsm_pinned_17129(E) falcon_lsm_pinned_17011(E) falcon_lsm_pinned_17005(E) falcon_lsm_pinned_16903(E) falcon_lsm_pinned_16803(E) falcon_lsm_pinned_16703(E) falcon_lsm_pinned_16604(E) falcon_lsm_pinned_1640
7(E) falcon_lsm_pinned_16206(E) falcon_lsm_pinned_16108(E) falcon_lsm_pinned_16004(E) nf_conntrack_netlink xt_addrtype br_netfilter overlay(T) falcon_lsm_pinned_15907(E) tmhook(OE)
[54627435.204038] xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack libcrc32c ipt_REJECT nf_reject_ipv4 t
un bridge stp llc ebtable_filter ebtables devlink ip6_tables iptable_filter nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache bonding sunrpc skx_edac nfit libnvdimm intel_power
clamp coretemp intel_rapl iosf_mbi kvm_intel kvm ipmi_ssif irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr ses enclosure sg mei_me mei hpwdt hpilo
lpc_ich ipmi_si wmi ipmi_devintf ipmi_msghandler acpi_power_meter binfmt_misc ip_tables ext4 mbcache jbd2 dm_service_time dm_round_robin sd_mod crc_t10dif crct10dif_generic qla2xxx
[54627435.208348] mgag200 dm_multipath drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm crct10dif_pclmul crct10dif_common i40e igb crc32c_intel serio_raw nvme_fc nvme_fabrics smartpqi nvme_c
ore scsi_transport_fc dca scsi_transport_sas i2c_algo_bit scsi_tgt ptp pps_core drm_panel_orientation_quirks uas usb_storage dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: bmhook]
[54627435.211321] CPU: 23 PID: 8590 Comm: gnome-shell Kdump: loaded Tainted: P OE ------------ T 3.10.0-1160.102.1.el7.x86_64 #1
[54627435.212953] Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 01/23/2021
[54627435.213745] task: ffff9e63ddbfa100 ti: ffff9e6399e48000 task.ti: ffff9e6399e48000
[54627435.214583] RIP: 0010:[<ffffffff8da35a23>] [<ffffffff8da35a23>] __kmalloc_node+0x193/0x2b0
[54627435.215390] RSP: 0018:ffff9e6399e4b2b8 EFLAGS: 00010246
[54627435.216151] RAX: 0000000000000000 RBX: 00000000000000d0 RCX: 0000000320149f3f
[54627435.216922] RDX: 0000000320149f3e RSI: 0000000000000000 RDI: 000000000001f120
[54627435.217685] RBP: ffff9e6399e4b2f8 R08: ffff9e63deb5f120 R09: ffff9dd64fc03700
[54627435.218445] R10: ffff9dd64fc03700 R11: ffffffff8d9e9fd5 R12: 00000000000000d0
[54627435.219204] R13: 0000000000000100 R14: ff33636d53447138 R15: 00000000ffffffff
[54627435.219965] FS: 00007f47b4cbaa80(0000) GS:ffff9e63deb40000(0000) knlGS:0000000000000000
[54627435.220728] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[54627435.221485] CR2: 00007f473c477000 CR3: 00000046d8bf0000 CR4: 00000000007607e0
[54627435.222244] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[54627435.223004] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[54627435.223757] PKRU: 55555554
[54627435.224499] Call Trace:
[54627435.225241] [<ffffffff8d9e9fd5>] ? kvmalloc_node+0x95/0xe0
[54627435.225983] [<ffffffff8d9e9fd5>] kvmalloc_node+0x95/0xe0
[54627435.226730] [<ffffffffc10e4455>] bmhook_get_tls+0x45/0x90 [bmsensor] <====
[54627435.227469] [<ffffffffc10d471e>] tmbpf_get_tls+0xe/0x20 [bmsensor]
[54627435.228205] [<ffffffff8da75d29>] ? dput+0x29/0x1b0
[54627435.228942] [<ffffffffc10e5ae3>] ? bmhook_cleanup_data+0x53/0x180 [bmsensor]
[54627435.229683] [<ffffffffc10e5d27>] ? bmhook_posthook_handler+0x117/0x3c0 [bmsensor]
[54627435.230420] [<ffffffffc0ce3c13>] ? tmhook_invoke_posthooks+0x43/0xc0 [tmhook]
[54627435.231152] [<ffffffffc0ce3fa8>] ? tmhook_handler+0x1b8/0x2d0 [tmhook]
[54627435.231890] [<ffffffffc11073e3>] ? HistogramBaseEntryAccumulate+0x13/0x20 [bmsensor]
[54627435.232628] [<ffffffff8dfb7112>] ? down_read+0x12/0x40
[54627435.233364] [<ffffffffc0cc0cac>] ? unload_network_ops_symbols+0x93bc/0x99d0 [falcon_lsm_pinned_15907]
[54627435.234109] [<ffffffffc0d9194c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16004]
[54627435.234835] [<ffffffffc0fb894c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16108]
[54627435.235543] [<ffffffffc0fd794c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16206]
[54627435.236231] [<ffffffffc0ff6c0c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16407]
[54627435.236901] [<ffffffffc1015c0c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16604]
[54627435.237578] [<ffffffffc1035c0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_16703]
[54627435.238269] [<ffffffffc1055c0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_16803]
[54627435.238908] [<ffffffffc0d0ac0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_16903]
[54627435.239497] [<ffffffffc0d2ac0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_17005]
[54627435.240070] [<ffffffffc0d4ac0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_17011]
[54627435.240621] [<ffffffffc0e23542>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17308]
[54627435.241156] [<ffffffffc0e71542>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17405]
[54627435.241672] [<ffffffffc0e914a2>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17507]
[54627435.242169] [<ffffffffc0f174a2>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17607]
[54627435.242647] [<ffffffffc0f374a2>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17706]
[54627435.243105] [<ffffffffc0f68492>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17804]
[54627435.243544] [<ffffffffc0f88492>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_18003]
[54627435.243961] [<ffffffff8dfc539a>] ? system_call_fastpath+0x25/0x2a
[54627435.244364] Code: 4c 89 4d d0 e8 6f 43 01 00 4c 8b 4d d0 49 89 c2 4c 8b 5d c8 e9 eb fe ff ff 0f 1f 80 00 00 00 00 49 63 42 20 48 8d 4a 01 49 8b 3a <49> 8b 1c 06 4c 89 f0 65 48 0f c7 0f 0f 94 c0 84 c0 0f 84 c2 fe
[54627435.245235] RIP [<ffffffff8da35a23>] __kmalloc_node+0x193/0x2b0
[54627435.245643] RSP <ffff9e6399e4b2b8>
Environment
- Red Hat Enterprise Linux 7.9
- Trend Micro kernel module: [
bmsensor
]
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.