Kernel panic occurred during module load due to 'kernfs_node_cache' corruption caused by third-party modules seccrypto and secfs2.

Solution Unverified - Updated -

Issue

  • Kernel panic while loading a kernel module using modprobe with the following messages:
[ 8796.184373] BUG: kernel NULL pointer dereference, address: 0000000000000000
[ 8796.184375] #PF: supervisor write access in kernel mode
[ 8796.184376] #PF: error_code(0x0002) - not-present page
[ 8796.184377] PGD 0 P4D 0
[ 8796.184379] Oops: 0002 [#1] PREEMPT SMP NOPTI
[ 8796.184380] CPU: 1 PID: 87823 Comm: modprobe Kdump: loaded Tainted: P        W  OE      ------  ---  5.14.0-611.35.1.el9_7.x86_64 #1
[ 8796.184382] Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.24504846.B64.2501180334 01/18/2025
[ 8796.184383] RIP: 0010:rb_erase+0x1bc/0x380
[ 8796.184388] Code: a7 01 00 00 48 3b 51 10 0f 84 ba 01 00 00 48 89 41 08 e9 47 1a 67 00 48 8b 70 10 48 89 d1 48 83 c9 01 48 89 72 08 48 89 50 10 <48> 89 0e 48 8b 0a 48 89 08 48 89 02 48 83 e1 fc 74 3b 48 3b 51 10
[ 8796.184389] RSP: 0018:ffffc14922757af0 EFLAGS: 00010286
[ 8796.184390] RAX: ffff9d0d9b140918 RBX: ffff9d0d9b140780 RCX: ffff9d0d9b140e99
[ 8796.184391] RDX: ffff9d0d9b140e98 RSI: 0000000000000000 RDI: ffff9d0d9b140798
[ 8796.184392] RBP: ffff9d0d9b140798 R08: ffff9d0d9b140d48 R09: ffff9d0d8029a310
[ 8796.184392] R10: ffffc14922757ad8 R11: ffffc14922757ae0 R12: ffff9d0d9b140780
[ 8796.184393] R13: ffffffffaf8b9326 R14: 0000000000000000 R15: 0000000000000001
[ 8796.184394] FS:  00007fa1f5bc5740(0000) GS:ffff9d10ade40000(0000) knlGS:0000000000000000
[ 8796.184395] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 8796.184396] CR2: 0000000000000000 CR3: 00000001f02ec003 CR4: 0000000000770ef0
[ 8796.184418] PKRU: 55555554
[ 8796.184419] Call Trace:
[ 8796.184421]  <TASK>
[ 8796.184433]  ? show_trace_log_lvl+0x1c4/0x2df
[ 8796.184438]  ? show_trace_log_lvl+0x1c4/0x2df
[ 8796.184445]  ? kernfs_unlink_sibling+0x7b/0x90
[ 8796.184451]  ? __die_body.cold+0x8/0xd
[ 8796.184454]  ? page_fault_oops+0x132/0x170
[ 8796.184461]  ? exc_page_fault+0x61/0x150
[ 8796.184465]  ? asm_exc_page_fault+0x22/0x30
[ 8796.184477]  ? rb_erase+0x1bc/0x380
[ 8796.184480]  kernfs_unlink_sibling+0x7b/0x90
[ 8796.184482]  __kernfs_remove.part.0+0xfb/0x230
[ 8796.184485]  kernfs_remove_by_name_ns+0x72/0xc0
[ 8796.184491]  module_remove_modinfo_attrs+0x48/0xa0
[ 8796.184496]  module_add_modinfo_attrs+0xfc/0x140
[ 8796.184500]  mod_sysfs_setup+0x1b4/0x2d0
[ 8796.184506]  load_module+0x89f/0x9a0
[ 8796.184515]  ? kernel_read_file+0x244/0x2a0
[ 8796.184521]  ? init_module_from_file+0x8b/0xd0
[ 8796.184524]  init_module_from_file+0x8b/0xd0
[ 8796.184533]  idempotent_init_module+0x17e/0x230
[ 8796.184540]  __x64_sys_finit_module+0x5a/0xb0
[ 8796.184544]  osnoise_arch_unregister+0x210/0x210
[ 8796.184549]  ? audit_reset_context.part.0.constprop.0+0x273/0x2e0
[ 8796.184554]  ? syscall_exit_work+0xff/0x130
[ 8796.184556]  ? syscall_exit_to_user_mode+0x19/0x40
[ 8796.184558]  ? do_syscall_64+0x6b/0xe0
[ 8796.184561]  ? clear_bhb_loop+0x40/0x90
[ 8796.184562]  ? clear_bhb_loop+0x40/0x90
[ 8796.184563]  ? clear_bhb_loop+0x40/0x90
[ 8796.184564]  ? clear_bhb_loop+0x40/0x90
[ 8796.184565]  ? clear_bhb_loop+0x40/0x90
[ 8796.184566]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 8796.184569] RIP: 0033:0x7fa1f53087fd

Environment

  • Red Hat Enterprise Linux 9

  • Third party modules:- seccrypto and secfs2

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content