BUG: unable to handle kernel NULL pointer dereference at 000000000000001c [selinux_inode_getsecid+0x10] in Red Hat Enterprise Linux 6

Solution In Progress - Updated -

Issue

  • Kernel crashed with the following stack :
BUG: unable to handle kernel NULL pointer dereference at 000000000000001c
IP: [<ffffffff812424b0>] selinux_inode_getsecid+0x10/0x20
PGD 2b899b067 PUD 2300b3067 PMD 0 
Oops: 0000 [#1] SMP 
last sysfs file: /sys/devices/system/cpu/online
CPU 3 
Modules linked in: arc4 ecb md4 nls_utf8 cifs nfs lockd fscache auth_rpcgss nfs_acl sunrpc autofs4 ipv6 ext3 jbd ppdev parport_pc parport vmware_balloon i2c_piix4 sg shpchp ext4 jbd2 mbcache sd_mod crc_t10dif sr_mod cdrom vmxnet3 vmw_pvscsi pata_acpi ata_generic ata_piix vmwgfx ttm drm_kms_helper drm i2c_core dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]

Pid: 17973, comm: find Not tainted 2.6.32-642.15.1.el6.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform
RIP: 0010:[<ffffffff812424b0>]  [<ffffffff812424b0>] selinux_inode_getsecid+0x10/0x20
RSP: 0018:ffff880129d33cb8  EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff8801151e7460 RCX: 0000000000000000
RDX: ffff88024d507100 RSI: ffff8801151e7494 RDI: ffff88024d507100
RBP: ffff880129d33cb8 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000000007b0 R11: 0000000000000001 R12: ffff88024b724500
R13: ffff8801151e7400 R14: ffff88024d507100 R15: 0000000000000000
FS:  00007f8816a347a0(0000) GS:ffff880031260000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000001c CR3: 00000002b9a0d000 CR4: 00000000000007e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process find (pid: 17973, threadinfo ffff880129d30000, task ffff8802b8b78ab0)
Stack:
 ffff880129d33cc8 ffffffff8123ac26 ffff880129d33d08 ffffffff810eaf44
<d> ffff8801151e7400 ffff8802b5b6bd50 ffff880129d33d18 ffffffff811bca80
<d> ffff8801151e7460 ffff88024b724500 ffff880129d33d68 ffffffff810eb3fe
Call Trace:
 [<ffffffff8123ac26>] security_inode_getsecid+0x16/0x20
 [<ffffffff810eaf44>] audit_copy_inode+0x54/0xc0
 [<ffffffff811bca80>] ? mntput_no_expire+0x30/0x110
 [<ffffffff810eb3fe>] __audit_inode+0x11e/0x350
 [<ffffffff811a8771>] ? path_put+0x31/0x40
 [<ffffffff811a780d>] audit_inode+0x3d/0x40
 [<ffffffff811ab62a>] filename_lookup+0xaa/0xc0
 [<ffffffff811ac717>] user_path_at+0x57/0xa0
 [<ffffffff81299b55>] ? _atomic_dec_and_lock+0x55/0x80
 [<ffffffff811bca80>] ? mntput_no_expire+0x30/0x110
 [<ffffffff810ebc78>] ? audit_filter_rules+0x378/0xdd0
 [<ffffffff8119fac0>] vfs_fstatat+0x50/0xa0
 [<ffffffff8119fb34>] sys_newfstatat+0x24/0x50
 [<ffffffff810ee647>] ? audit_syscall_entry+0x1d7/0x200
 [<ffffffff810ee43e>] ? __audit_syscall_exit+0x25e/0x290
 [<ffffffff8100b0d2>] system_call_fastpath+0x16/0x1b
Code: 8b 5d d8 4c 8b 65 e0 4c 8b 6d e8 4c 8b 75 f0 4c 8b 7d f8 c9 c3 90 90 90 90 90 90 55 48 89 e5 0f 1f 44 00 00 48 8b 87 30 02 00 00 <8b> 40 1c 89 06 c9 c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 0f 
RIP  [<ffffffff812424b0>] selinux_inode_getsecid+0x10/0x20
 RSP <ffff880129d33cb8>
CR2: 000000000000001c

Environment

  • Red Hat Enterprise Linux 6
  • kernel-2.6.32-642.15.1

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.