kernel crashed at kernel/cred.c:423
Issue
- The system panic was occured due to
BUG_ON
when load ELF binary by 3rd party module. - The panic log:
[27492761.066047] ------------[ cut here ]------------
[27492761.066171] kernel BUG at kernel/cred.c:423!
[27492761.066260] invalid opcode: 0000 [#1] SMP
[27492761.066349] Modules linked in: iptable_filter tcp_lp fuse secvm2(POE) secfs2(POE) macsec binfmt_misc tcp_diag udp_diag inet_diag unix_diag af_packet_diag netlink_diag sunrpc ppdev crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr sg virtio_balloon parport_pc parport virtio_net i2c_piix4 ip_tables xfs libcrc32c sd_mod sr_mod crc_t10dif crct10dif_generic cdrom ata_generic pata_acpi virtio_scsi bochs_drm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common ata_piix crc32c_intel drm libata serio_raw drm_panel_orientation_quirks virtio_pci virtio_ring virtio floppy dm_mirror dm_region_hash dm_log dm_mod
[27492761.067052] CPU: 1 PID: 50194 Comm: vmd Kdump: loaded Tainted: P OE ------------ T 3.10.0-1062.el7.x86_64 #1
[27492761.067153] Hardware name: Nutanix AHV, BIOS 1.9.1-5.el6 04/01/2014
[27492761.067257] task: ffffa0df31251070 ti: ffffa0dde4d3c000 task.ti: ffffa0dde4d3c000
[27492761.067349] RIP: 0010:[<ffffffffaa4cc274>] [<ffffffffaa4cc274>] commit_creds+0x224/0x260
[27492761.067455] RSP: 0018:ffffa0dde4d3fd58 EFLAGS: 00010287
[27492761.067548] RAX: 0000000000000001 RBX: ffffa0dd75aa35c0 RCX: 0000000000200000
[27492761.067644] RDX: ffffffff00000001 RSI: ffffa0dd632dd1d8 RDI: ffffa0dd60e0ad80
[27492761.067738] RBP: ffffa0dde4d3fd78 R08: ffffa0dd632dc2a8 R09: 00007ffece748000
[27492761.067835] R10: 0000000800000000 R11: ffffeb49044e4a00 R12: ffffa0dd60e0ad80
[27492761.067928] R13: ffffa0df31251070 R14: 00007fbe18c65140 R15: 0000000000000000
[27492761.068025] FS: 0000000000000000(0000) GS:ffffa0dff1a40000(0000) knlGS:0000000000000000
[27492761.068119] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[27492761.068209] CR2: 00007fbe18e86f78 CR3: 000000017acbe000 CR4: 00000000003606e0
[27492761.068312] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[27492761.068406] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[27492761.068503] Call Trace:
[27492761.068588] [<ffffffffaa64f23e>] install_exec_creds+0x1e/0x80
[27492761.068683] [<ffffffffaa6ae7d5>] load_elf_binary+0xa65/0xd90
[27492761.068773] [<ffffffffaa64faca>] search_binary_handler+0x9a/0x1c0
[27492761.068867] [<ffffffffaa6511c6>] do_execve_common.isra.24+0x616/0x880
[27492761.068971] [<ffffffffaa6516c9>] SyS_execve+0x29/0x30
[27492761.069064] [<ffffffffaab8c478>] stub_execve+0x48/0x80
[27492761.069152] Code: 5f fe ff ff 48 89 d1 48 8b 91 c8 00 00 00 48 39 d6 75 e4 3b 81 d0 00 00 00 0f 84 66 fe ff ff 48 89 f2 eb d3 e8 5e e3 fc ff 0f 0b <0f> 0b 48 8b 4b 30 48 89 d6 48 c1 ee 20 48 89 c8 f7 d1 48 c1 e8
[27492761.069423] RIP [<ffffffffaa4cc274>] commit_creds+0x224/0x260
[27492761.069517] RSP <ffffa0dde4d3fd58>
Environment
- Red Hat Enterprize Linux
- Seen on Security module secfs2
6.2.0.116
/6.3.1.38
/6.3.1.78
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.