BUG: unable to handle kernel NULL pointer dereference at 000000000000001c [selinux_inode_getsecid+0x10] in Red Hat Enterprise Linux 6
Issue
- Kernel crashed with the following stack :
BUG: unable to handle kernel NULL pointer dereference at 000000000000001c
IP: [<ffffffff812424b0>] selinux_inode_getsecid+0x10/0x20
PGD 2b899b067 PUD 2300b3067 PMD 0
Oops: 0000 [#1] SMP
last sysfs file: /sys/devices/system/cpu/online
CPU 3
Modules linked in: arc4 ecb md4 nls_utf8 cifs nfs lockd fscache auth_rpcgss nfs_acl sunrpc autofs4 ipv6 ext3 jbd ppdev parport_pc parport vmware_balloon i2c_piix4 sg shpchp ext4 jbd2 mbcache sd_mod crc_t10dif sr_mod cdrom vmxnet3 vmw_pvscsi pata_acpi ata_generic ata_piix vmwgfx ttm drm_kms_helper drm i2c_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
Pid: 17973, comm: find Not tainted 2.6.32-642.15.1.el6.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform
RIP: 0010:[<ffffffff812424b0>] [<ffffffff812424b0>] selinux_inode_getsecid+0x10/0x20
RSP: 0018:ffff880129d33cb8 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff8801151e7460 RCX: 0000000000000000
RDX: ffff88024d507100 RSI: ffff8801151e7494 RDI: ffff88024d507100
RBP: ffff880129d33cb8 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000000007b0 R11: 0000000000000001 R12: ffff88024b724500
R13: ffff8801151e7400 R14: ffff88024d507100 R15: 0000000000000000
FS: 00007f8816a347a0(0000) GS:ffff880031260000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000001c CR3: 00000002b9a0d000 CR4: 00000000000007e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process find (pid: 17973, threadinfo ffff880129d30000, task ffff8802b8b78ab0)
Stack:
ffff880129d33cc8 ffffffff8123ac26 ffff880129d33d08 ffffffff810eaf44
<d> ffff8801151e7400 ffff8802b5b6bd50 ffff880129d33d18 ffffffff811bca80
<d> ffff8801151e7460 ffff88024b724500 ffff880129d33d68 ffffffff810eb3fe
Call Trace:
[<ffffffff8123ac26>] security_inode_getsecid+0x16/0x20
[<ffffffff810eaf44>] audit_copy_inode+0x54/0xc0
[<ffffffff811bca80>] ? mntput_no_expire+0x30/0x110
[<ffffffff810eb3fe>] __audit_inode+0x11e/0x350
[<ffffffff811a8771>] ? path_put+0x31/0x40
[<ffffffff811a780d>] audit_inode+0x3d/0x40
[<ffffffff811ab62a>] filename_lookup+0xaa/0xc0
[<ffffffff811ac717>] user_path_at+0x57/0xa0
[<ffffffff81299b55>] ? _atomic_dec_and_lock+0x55/0x80
[<ffffffff811bca80>] ? mntput_no_expire+0x30/0x110
[<ffffffff810ebc78>] ? audit_filter_rules+0x378/0xdd0
[<ffffffff8119fac0>] vfs_fstatat+0x50/0xa0
[<ffffffff8119fb34>] sys_newfstatat+0x24/0x50
[<ffffffff810ee647>] ? audit_syscall_entry+0x1d7/0x200
[<ffffffff810ee43e>] ? __audit_syscall_exit+0x25e/0x290
[<ffffffff8100b0d2>] system_call_fastpath+0x16/0x1b
Code: 8b 5d d8 4c 8b 65 e0 4c 8b 6d e8 4c 8b 75 f0 4c 8b 7d f8 c9 c3 90 90 90 90 90 90 55 48 89 e5 0f 1f 44 00 00 48 8b 87 30 02 00 00 <8b> 40 1c 89 06 c9 c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 0f
RIP [<ffffffff812424b0>] selinux_inode_getsecid+0x10/0x20
RSP <ffff880129d33cb8>
CR2: 000000000000001c
Environment
- Red Hat Enterprise Linux 6
- kernel-2.6.32-642.15.1
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.