kernel crashed at kernel/cred.c:423

Solution Verified - Updated -

Issue

  • The system panic was occured due to BUG_ON when load ELF binary by 3rd party module.
  • The panic log:
[27492761.066047] ------------[ cut here ]------------
[27492761.066171] kernel BUG at kernel/cred.c:423!
[27492761.066260] invalid opcode: 0000 [#1] SMP
[27492761.066349] Modules linked in: iptable_filter tcp_lp fuse secvm2(POE) secfs2(POE) macsec binfmt_misc tcp_diag udp_diag inet_diag unix_diag af_packet_diag netlink_diag sunrpc ppdev crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr sg virtio_balloon parport_pc parport virtio_net i2c_piix4 ip_tables xfs libcrc32c sd_mod sr_mod crc_t10dif crct10dif_generic cdrom ata_generic pata_acpi virtio_scsi bochs_drm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm crct10dif_pclmul crct10dif_common ata_piix crc32c_intel drm libata serio_raw drm_panel_orientation_quirks virtio_pci virtio_ring virtio floppy dm_mirror dm_region_hash dm_log dm_mod
[27492761.067052] CPU: 1 PID: 50194 Comm: vmd Kdump: loaded Tainted: P           OE  ------------ T 3.10.0-1062.el7.x86_64 #1
[27492761.067153] Hardware name: Nutanix AHV, BIOS 1.9.1-5.el6 04/01/2014
[27492761.067257] task: ffffa0df31251070 ti: ffffa0dde4d3c000 task.ti: ffffa0dde4d3c000
[27492761.067349] RIP: 0010:[<ffffffffaa4cc274>]  [<ffffffffaa4cc274>] commit_creds+0x224/0x260
[27492761.067455] RSP: 0018:ffffa0dde4d3fd58  EFLAGS: 00010287
[27492761.067548] RAX: 0000000000000001 RBX: ffffa0dd75aa35c0 RCX: 0000000000200000
[27492761.067644] RDX: ffffffff00000001 RSI: ffffa0dd632dd1d8 RDI: ffffa0dd60e0ad80
[27492761.067738] RBP: ffffa0dde4d3fd78 R08: ffffa0dd632dc2a8 R09: 00007ffece748000
[27492761.067835] R10: 0000000800000000 R11: ffffeb49044e4a00 R12: ffffa0dd60e0ad80
[27492761.067928] R13: ffffa0df31251070 R14: 00007fbe18c65140 R15: 0000000000000000
[27492761.068025] FS:  0000000000000000(0000) GS:ffffa0dff1a40000(0000) knlGS:0000000000000000
[27492761.068119] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[27492761.068209] CR2: 00007fbe18e86f78 CR3: 000000017acbe000 CR4: 00000000003606e0
[27492761.068312] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[27492761.068406] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[27492761.068503] Call Trace:
[27492761.068588]  [<ffffffffaa64f23e>] install_exec_creds+0x1e/0x80
[27492761.068683]  [<ffffffffaa6ae7d5>] load_elf_binary+0xa65/0xd90
[27492761.068773]  [<ffffffffaa64faca>] search_binary_handler+0x9a/0x1c0
[27492761.068867]  [<ffffffffaa6511c6>] do_execve_common.isra.24+0x616/0x880
[27492761.068971]  [<ffffffffaa6516c9>] SyS_execve+0x29/0x30
[27492761.069064]  [<ffffffffaab8c478>] stub_execve+0x48/0x80
[27492761.069152] Code: 5f fe ff ff 48 89 d1 48 8b 91 c8 00 00 00 48 39 d6 75 e4 3b 81 d0 00 00 00 0f 84 66 fe ff ff 48 89 f2 eb d3 e8 5e e3 fc ff 0f 0b <0f> 0b 48 8b 4b 30 48 89 d6 48 c1 ee 20 48 89 c8 f7 d1 48 c1 e8
[27492761.069423] RIP  [<ffffffffaa4cc274>] commit_creds+0x224/0x260
[27492761.069517]  RSP <ffffa0dde4d3fd58>

Environment

  • Red Hat Enterprize Linux
  • Seen on Security module secfs2 6.2.0.116 / 6.3.1.38 / 6.3.1.78

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content