Kernel panic due to a general protection fault in __kmalloc_node() caused by third-party bmsensor kernel module.

Solution Unverified - Updated -

Issue

  • Kernel panic occurred at __kmalloc_node function due to 3rd party module [bmsensor].
  • Kernel panics with following messages:
[54627435.199227] general protection fault: 0000 [#1] SMP 
[54627435.199953] Modules linked in: bmsensor(OE) dsa_filter(POE) dsa_filter_hook(OE) falcon_lsm_serviceable(PE) falcon_nf_netcontain(E) falcon_kal(E) falcon_lsm_pinned_18003(E) falcon_lsm_pinned_17804(E) falcon
_lsm_pinned_17706(E) falcon_lsm_pinned_17607(E) falcon_lsm_pinned_17507(E) falcon_lsm_pinned_17405(E) falcon_lsm_pinned_17308(E) falcon_lsm_pinned_17306(E) falcon_lsm_pinned_17219(E) tcp_diag udp_diag inet_diag 
falcon_lsm_pinned_17129(E) falcon_lsm_pinned_17011(E) falcon_lsm_pinned_17005(E) falcon_lsm_pinned_16903(E) falcon_lsm_pinned_16803(E) falcon_lsm_pinned_16703(E) falcon_lsm_pinned_16604(E) falcon_lsm_pinned_1640
7(E) falcon_lsm_pinned_16206(E) falcon_lsm_pinned_16108(E) falcon_lsm_pinned_16004(E) nf_conntrack_netlink xt_addrtype br_netfilter overlay(T) falcon_lsm_pinned_15907(E) tmhook(OE)
[54627435.204038]  xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack libcrc32c ipt_REJECT nf_reject_ipv4 t
un bridge stp llc ebtable_filter ebtables devlink ip6_tables iptable_filter nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache bonding sunrpc skx_edac nfit libnvdimm intel_power
clamp coretemp intel_rapl iosf_mbi kvm_intel kvm ipmi_ssif irqbypass crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr ses enclosure sg mei_me mei hpwdt hpilo
 lpc_ich ipmi_si wmi ipmi_devintf ipmi_msghandler acpi_power_meter binfmt_misc ip_tables ext4 mbcache jbd2 dm_service_time dm_round_robin sd_mod crc_t10dif crct10dif_generic qla2xxx
[54627435.208348]  mgag200 dm_multipath drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm crct10dif_pclmul crct10dif_common i40e igb crc32c_intel serio_raw nvme_fc nvme_fabrics smartpqi nvme_c
ore scsi_transport_fc dca scsi_transport_sas i2c_algo_bit scsi_tgt ptp pps_core drm_panel_orientation_quirks uas usb_storage dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: bmhook]
[54627435.211321] CPU: 23 PID: 8590 Comm: gnome-shell Kdump: loaded Tainted: P           OE  ------------ T 3.10.0-1160.102.1.el7.x86_64 #1
[54627435.212953] Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 01/23/2021
[54627435.213745] task: ffff9e63ddbfa100 ti: ffff9e6399e48000 task.ti: ffff9e6399e48000
[54627435.214583] RIP: 0010:[<ffffffff8da35a23>]  [<ffffffff8da35a23>] __kmalloc_node+0x193/0x2b0
[54627435.215390] RSP: 0018:ffff9e6399e4b2b8  EFLAGS: 00010246
[54627435.216151] RAX: 0000000000000000 RBX: 00000000000000d0 RCX: 0000000320149f3f
[54627435.216922] RDX: 0000000320149f3e RSI: 0000000000000000 RDI: 000000000001f120
[54627435.217685] RBP: ffff9e6399e4b2f8 R08: ffff9e63deb5f120 R09: ffff9dd64fc03700
[54627435.218445] R10: ffff9dd64fc03700 R11: ffffffff8d9e9fd5 R12: 00000000000000d0
[54627435.219204] R13: 0000000000000100 R14: ff33636d53447138 R15: 00000000ffffffff
[54627435.219965] FS:  00007f47b4cbaa80(0000) GS:ffff9e63deb40000(0000) knlGS:0000000000000000
[54627435.220728] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[54627435.221485] CR2: 00007f473c477000 CR3: 00000046d8bf0000 CR4: 00000000007607e0
[54627435.222244] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[54627435.223004] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[54627435.223757] PKRU: 55555554
[54627435.224499] Call Trace:
[54627435.225241]  [<ffffffff8d9e9fd5>] ? kvmalloc_node+0x95/0xe0
[54627435.225983]  [<ffffffff8d9e9fd5>] kvmalloc_node+0x95/0xe0
[54627435.226730]  [<ffffffffc10e4455>] bmhook_get_tls+0x45/0x90 [bmsensor] <====
[54627435.227469]  [<ffffffffc10d471e>] tmbpf_get_tls+0xe/0x20 [bmsensor]
[54627435.228205]  [<ffffffff8da75d29>] ? dput+0x29/0x1b0
[54627435.228942]  [<ffffffffc10e5ae3>] ? bmhook_cleanup_data+0x53/0x180 [bmsensor]
[54627435.229683]  [<ffffffffc10e5d27>] ? bmhook_posthook_handler+0x117/0x3c0 [bmsensor]
[54627435.230420]  [<ffffffffc0ce3c13>] ? tmhook_invoke_posthooks+0x43/0xc0 [tmhook]
[54627435.231152]  [<ffffffffc0ce3fa8>] ? tmhook_handler+0x1b8/0x2d0 [tmhook]
[54627435.231890]  [<ffffffffc11073e3>] ? HistogramBaseEntryAccumulate+0x13/0x20 [bmsensor]
[54627435.232628]  [<ffffffff8dfb7112>] ? down_read+0x12/0x40
[54627435.233364]  [<ffffffffc0cc0cac>] ? unload_network_ops_symbols+0x93bc/0x99d0 [falcon_lsm_pinned_15907]
[54627435.234109]  [<ffffffffc0d9194c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16004]
[54627435.234835]  [<ffffffffc0fb894c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16108]
[54627435.235543]  [<ffffffffc0fd794c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16206]
[54627435.236231]  [<ffffffffc0ff6c0c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16407]
[54627435.236901]  [<ffffffffc1015c0c>] ? unload_network_ops_symbols+0xa05c/0xa670 [falcon_lsm_pinned_16604]
[54627435.237578]  [<ffffffffc1035c0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_16703]
[54627435.238269]  [<ffffffffc1055c0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_16803]
[54627435.238908]  [<ffffffffc0d0ac0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_16903]
[54627435.239497]  [<ffffffffc0d2ac0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_17005]
[54627435.240070]  [<ffffffffc0d4ac0c>] ? unload_network_ops_symbols+0xb05c/0xb670 [falcon_lsm_pinned_17011]
[54627435.240621]  [<ffffffffc0e23542>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17308]
[54627435.241156]  [<ffffffffc0e71542>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17405]
[54627435.241672]  [<ffffffffc0e914a2>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17507]
[54627435.242169]  [<ffffffffc0f174a2>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17607]
[54627435.242647]  [<ffffffffc0f374a2>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17706]
[54627435.243105]  [<ffffffffc0f68492>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_17804]
[54627435.243544]  [<ffffffffc0f88492>] ? unload_network_ops_symbols+0xb8e2/0xbf80 [falcon_lsm_pinned_18003]
[54627435.243961]  [<ffffffff8dfc539a>] ? system_call_fastpath+0x25/0x2a
[54627435.244364] Code: 4c 89 4d d0 e8 6f 43 01 00 4c 8b 4d d0 49 89 c2 4c 8b 5d c8 e9 eb fe ff ff 0f 1f 80 00 00 00 00 49 63 42 20 48 8d 4a 01 49 8b 3a <49> 8b 1c 06 4c 89 f0 65 48 0f c7 0f 0f 94 c0 84 c0 0f 84 c2 fe 
[54627435.245235] RIP  [<ffffffff8da35a23>] __kmalloc_node+0x193/0x2b0
[54627435.245643]  RSP <ffff9e6399e4b2b8>

Environment

  • Red Hat Enterprise Linux 7.9
  • Trend Micro kernel module: [bmsensor]

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content