Kernel panic occurred during module load due to 'kernfs_node_cache' corruption caused by third-party modules seccrypto and secfs2.
Issue
- Kernel panic while loading a kernel module using
modprobewith the following messages:
[ 8796.184373] BUG: kernel NULL pointer dereference, address: 0000000000000000
[ 8796.184375] #PF: supervisor write access in kernel mode
[ 8796.184376] #PF: error_code(0x0002) - not-present page
[ 8796.184377] PGD 0 P4D 0
[ 8796.184379] Oops: 0002 [#1] PREEMPT SMP NOPTI
[ 8796.184380] CPU: 1 PID: 87823 Comm: modprobe Kdump: loaded Tainted: P W OE ------ --- 5.14.0-611.35.1.el9_7.x86_64 #1
[ 8796.184382] Hardware name: VMware, Inc. VMware7,1/440BX Desktop Reference Platform, BIOS VMW71.00V.24504846.B64.2501180334 01/18/2025
[ 8796.184383] RIP: 0010:rb_erase+0x1bc/0x380
[ 8796.184388] Code: a7 01 00 00 48 3b 51 10 0f 84 ba 01 00 00 48 89 41 08 e9 47 1a 67 00 48 8b 70 10 48 89 d1 48 83 c9 01 48 89 72 08 48 89 50 10 <48> 89 0e 48 8b 0a 48 89 08 48 89 02 48 83 e1 fc 74 3b 48 3b 51 10
[ 8796.184389] RSP: 0018:ffffc14922757af0 EFLAGS: 00010286
[ 8796.184390] RAX: ffff9d0d9b140918 RBX: ffff9d0d9b140780 RCX: ffff9d0d9b140e99
[ 8796.184391] RDX: ffff9d0d9b140e98 RSI: 0000000000000000 RDI: ffff9d0d9b140798
[ 8796.184392] RBP: ffff9d0d9b140798 R08: ffff9d0d9b140d48 R09: ffff9d0d8029a310
[ 8796.184392] R10: ffffc14922757ad8 R11: ffffc14922757ae0 R12: ffff9d0d9b140780
[ 8796.184393] R13: ffffffffaf8b9326 R14: 0000000000000000 R15: 0000000000000001
[ 8796.184394] FS: 00007fa1f5bc5740(0000) GS:ffff9d10ade40000(0000) knlGS:0000000000000000
[ 8796.184395] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 8796.184396] CR2: 0000000000000000 CR3: 00000001f02ec003 CR4: 0000000000770ef0
[ 8796.184418] PKRU: 55555554
[ 8796.184419] Call Trace:
[ 8796.184421] <TASK>
[ 8796.184433] ? show_trace_log_lvl+0x1c4/0x2df
[ 8796.184438] ? show_trace_log_lvl+0x1c4/0x2df
[ 8796.184445] ? kernfs_unlink_sibling+0x7b/0x90
[ 8796.184451] ? __die_body.cold+0x8/0xd
[ 8796.184454] ? page_fault_oops+0x132/0x170
[ 8796.184461] ? exc_page_fault+0x61/0x150
[ 8796.184465] ? asm_exc_page_fault+0x22/0x30
[ 8796.184477] ? rb_erase+0x1bc/0x380
[ 8796.184480] kernfs_unlink_sibling+0x7b/0x90
[ 8796.184482] __kernfs_remove.part.0+0xfb/0x230
[ 8796.184485] kernfs_remove_by_name_ns+0x72/0xc0
[ 8796.184491] module_remove_modinfo_attrs+0x48/0xa0
[ 8796.184496] module_add_modinfo_attrs+0xfc/0x140
[ 8796.184500] mod_sysfs_setup+0x1b4/0x2d0
[ 8796.184506] load_module+0x89f/0x9a0
[ 8796.184515] ? kernel_read_file+0x244/0x2a0
[ 8796.184521] ? init_module_from_file+0x8b/0xd0
[ 8796.184524] init_module_from_file+0x8b/0xd0
[ 8796.184533] idempotent_init_module+0x17e/0x230
[ 8796.184540] __x64_sys_finit_module+0x5a/0xb0
[ 8796.184544] osnoise_arch_unregister+0x210/0x210
[ 8796.184549] ? audit_reset_context.part.0.constprop.0+0x273/0x2e0
[ 8796.184554] ? syscall_exit_work+0xff/0x130
[ 8796.184556] ? syscall_exit_to_user_mode+0x19/0x40
[ 8796.184558] ? do_syscall_64+0x6b/0xe0
[ 8796.184561] ? clear_bhb_loop+0x40/0x90
[ 8796.184562] ? clear_bhb_loop+0x40/0x90
[ 8796.184563] ? clear_bhb_loop+0x40/0x90
[ 8796.184564] ? clear_bhb_loop+0x40/0x90
[ 8796.184565] ? clear_bhb_loop+0x40/0x90
[ 8796.184566] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 8796.184569] RIP: 0033:0x7fa1f53087fd
Environment
-
Red Hat Enterprise Linux 9
-
Third party modules:-
seccryptoandsecfs2
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.