Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-08-30
Last occurrence
2021-08-30
Unique reports
1
Quality
-28

Statistics

Operating system Unique / Total count
Fedora 34 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock_irq
vmlinux 0x21
2
_raw_spin_lock_irq
vmlinux 0x21
3
? _raw_spin_lock_irq
vmlinux 0x21
4
? _raw_spin_lock_irq
vmlinux 0x21
5
_raw_spin_lock_irq
vmlinux 0x21
6
? _raw_spin_lock_irq
vmlinux 0x21
7
_raw_spin_lock_irq
vmlinux 0x21
8
? _raw_spin_lock_irq
vmlinux 0x21
9
_raw_spin_lock_irq
vmlinux 0x21
10
_raw_spin_lock_irq
vmlinux 0x21
11
_raw_spin_lock_irq
vmlinux 0x21
12
_raw_spin_lock_irq
vmlinux 0x21
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP NOPTI
CPU: 0 PID: 28167 Comm: load_policy Not tainted 5.11.12-300.fc34.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:hashtab_map+0x27/0x70
Code: 00 00 00 0f 1f 44 00 00 8b 47 08 85 c0 74 60 41 56 45 31 f6 41 55 49 89 fd 41 54 49 89 d4 55 48 89 f5 53 49 8b 55 00 44 89 f0 <48> 8b 1c c2 48 85 db 75 0b eb 25 48 8b 5b 10 48 85 db 74 1c 48 8b
RSP: 0018:ffffb7fbc2d17c08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000004
RDX: 0000000000000000 RSI: ffffffffba564d40 RDI: ffff9a48a333f208
RBP: ffffffffba564d40 R08: fffff5d4c0b7bc08 R09: fffff5d4c0b7bc08
R10: 000000000002de10 R11: 0000000000000000 R12: 0000000000000000
R13: ffff9a48a333f208 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f0acead5200(0000) GS:ffff9a48fdc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000001e324005 CR4: 00000000003706f0
Call Trace:
 policydb_destroy+0x2da/0x360
 policydb_read+0x34f/0x1f90
 ? kmem_cache_alloc_trace+0xef/0x1e0
 ? security_load_policy+0x80/0x4b0
 security_load_policy+0x80/0x4b0
 ? copy_user_generic_unrolled+0x32/0xc0
 sel_write_load+0x11b/0xac0
 ? selinux_file_permission+0x104/0x150
 vfs_write+0xbf/0x270
 ksys_write+0x4f/0xc0
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f0acec65387
Code: 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
RSP: 002b:00007ffe3d7f19d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000021 RCX: 00007f0acec65387
RDX: 000000000035e1cc RSI: 00007f0ace775000 RDI: 0000000000000004
RBP: 0000000000000004 R08: 0000000000000000 R09: 00007ffe3d7f1870
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000035e1cc
R13: 00007f0ace775000 R14: 00007f0aced6c1a0 R15: 0000000000000003
Modules linked in: nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security nf_tables ip6table_filter ip6_tables iptable_filter ip_tables uinput nls_utf8 isofs snd_seq_dummy snd_hrtimer snd_seq snd_seq_device snd_timer snd soundcore ip_set rfkill nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc intel_rapl_msr intel_rapl_common vmw_balloon rapl joydev pcspkr vmw_vmci i2c_piix4 zram vmwgfx drm_kms_helper cec ttm drm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel serio_raw vmxnet3 vmw_pvscsi ata_generic pata_acpi fuse [last unloaded: ip_tables]
CR2: 0000000000000000