Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #512080
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-02-16
Last occurrence
2021-02-16
Unique reports
1
Quality
-32

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
kfree
vmlinux 0xb3
2
kfree
vmlinux 0xb3
3
? kfree
vmlinux 0xb3
4
? kfree
vmlinux 0xb3
5
kfree
vmlinux 0xb3
6
? kfree
vmlinux 0xb3
7
kfree
vmlinux 0xb3
8
? kfree
vmlinux 0xb3
9
? kfree
vmlinux 0xb3
10
kfree
vmlinux 0xb3
11
kfree
vmlinux 0xb3
12
kfree
vmlinux 0xb3
13
kfree
vmlinux 0xb3
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0 
Oops: 0000 [#1] SMP PTI
CPU: 0 PID: 188530 Comm: load_policy Tainted: G S                5.10.13-200.fc33.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
RIP: 0010:hashtab_map+0x27/0x70
Code: 00 00 00 0f 1f 44 00 00 8b 47 08 85 c0 74 60 41 56 45 31 f6 41 55 49 89 fd 41 54 49 89 d4 55 48 89 f5 53 49 8b 55 00 44 89 f0 <48> 8b 1c c2 48 85 db 75 0b eb 25 48 8b 5b 10 48 85 db 74 1c 48 8b
RSP: 0018:ffffa79ec3a17c08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000003
RDX: 0000000000000000 RSI: ffffffff83557420 RDI: ffff963c13f51e08
RBP: ffffffff83557420 R08: ffffea32c0530108 R09: ffffea32c0530108
R10: 0000000000000001 R11: 00000000000303c0 R12: 0000000000000000
R13: ffff963c13f51e08 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f9639ad5800(0000) GS:ffff963cbbc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000a6d2e002 CR4: 00000000001706f0
Call Trace:
 policydb_destroy+0x2da/0x360
 policydb_read+0x34c/0x1fb0
 ? kmem_cache_alloc_trace+0xef/0x1e0
 ? security_load_policy+0x80/0x400
 security_load_policy+0x80/0x400
 ? copy_user_generic_unrolled+0x32/0xc0
 sel_write_load+0x11b/0xac0
 ? inode_security+0x22/0x60
 ? selinux_file_permission+0xe2/0x120
 vfs_write+0xc3/0x270
 ksys_write+0x4f/0xc0
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f9639c8c4e7
Code: 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
RSP: 002b:00007ffdd64754c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 00007f9639c8c4e7
RDX: 00000000007eb1a4 RSI: 00007f96392e9000 RDI: 0000000000000004
RBP: 0000000000000004 R08: 00007f9639d23040 R09: 00007ffdd6475360
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96392e9000
R13: 00000000007eb1a4 R14: 000000000000000f R15: 0000000000000003
Modules linked in: binfmt_misc uinput nls_utf8 isofs xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nf_tables rfkill nfnetlink ip6table_filter ip6_tables iptable_filter vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc pktcdvd intel_rapl_msr intel_rapl_common sb_edac rapl vmw_balloon pcspkr joydev vmw_vmci i2c_piix4 zram ip_tables vmwgfx drm_kms_helper cec crct10dif_pclmul crc32_pclmul ttm crc32c_intel drm ghash_clmulni_intel serio_raw vmxnet3 ata_generic pata_acpi vmw_pvscsi fuse
CR2: 0000000000000000