audit.66 kernel

Steve Grubb sgrubb at redhat.com
Wed Jun 22 20:01:47 UTC 2005


On Wednesday 22 June 2005 12:39, David Woodhouse wrote:
> Nothing particularly exciting here -- mostly just a few patches cleaned
> up for sending them upstream.

This Oopsed in about 5 minutes of testing.

Jun 22 15:39:21 localhost kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000000
Jun 22 15:39:21 localhost kernel:  printing eip:
Jun 22 15:39:21 localhost kernel: c01430b1
Jun 22 15:39:21 localhost kernel: *pde = 00000000
Jun 22 15:39:21 localhost kernel: Oops: 0000 [#1]
Jun 22 15:39:21 localhost kernel: Modules linked in: tun parport_pc lp parport autofs4 i2c_dev i2c_core ipt_REJECT ipt_state ip_conntrack iptable_filter ip_tables dm_mod button battery ac md5 ipv6 uhci_hcd snd_emu10k1 snd_rawmidi snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_seq_device snd_ac97_codec snd_page_alloc snd_util_mem snd_hwdep snd soundcore 3c59x floppy ext3 jbd
Jun 22 15:39:21 localhost kernel: CPU:    0
Jun 22 15:39:21 localhost kernel: EIP:    0060:[<c01430b1>]    Not tainted VLI
Jun 22 15:39:21 localhost kernel: EFLAGS: 00210246   (2.6.9-11.EL.audit.66)
Jun 22 15:39:21 localhost kernel: EIP is at auditfs_attach_wdata+0x2c6/0x401
Jun 22 15:39:21 localhost kernel: eax: 0000000f   ebx: db44af3c   ecx: 00200246   edx: e1cc73e8
Jun 22 15:39:21 localhost kernel: esi: 00000000   edi: e57aea04   ebp: e1cc73e8   esp: d9c4aea0
Jun 22 15:39:21 localhost kernel: ds: 007b   es: 007b   ss: 0068
Jun 22 15:39:21 localhost kernel: Process auditctl (pid: 29062, threadinfo=d9c4a000 task=e14278b0)
Jun 22 15:39:21 localhost kernel: Stack: dd586498 00000001 da4bfe14 ee8ca408 da4bfe08 ee8ca408 00000001 d9c4af60
Jun 22 15:39:21 localhost kernel:        c014538f fffffff5 ee8ca408 00000001 c0175c18 fffffff5 ee8ca408 0024a603
Jun 22 15:39:21 localhost kernel:        d9c4af60 c01763db 00000000 c014d4a7 5a6ea9e0 ef6a2000 00000401 00000000
Jun 22 15:39:21 localhost kernel: Call Trace:
Jun 22 15:39:21 localhost kernel:  [<c014538f>] audit_notify_watch+0x47/0x55
Jun 22 15:39:21 localhost kernel:  [<c0175c18>] permission+0xf/0x4f
Jun 22 15:39:21 localhost kernel:  [<c01763db>] link_path_walk+0x12c/0xd98
Jun 22 15:39:21 localhost kernel:  [<c014d4a7>] poison_obj+0x1d/0x3d
Jun 22 15:39:21 localhost kernel:  [<c01772c7>] path_lookup+0x104/0x135
Jun 22 15:39:21 localhost kernel:  [<c017740c>] __user_walk+0x21/0x51
Jun 22 15:39:21 localhost kernel:  [<c0165bc0>] sys_access+0x8f/0x134
Jun 22 15:39:21 localhost kernel:  [<c010b757>] do_syscall_trace+0xc0/0xc9
Jun 22 15:39:21 localhost kernel:  [<c030797f>] syscall_call+0x7/0xb
Jun 22 15:39:21 localhost kernel: Code: e9 38 fe ff ff 89 e8 e8 80 0b 00 00 8b 54 24 08 8b 32 85 f6 74 0e 8b 06 0f 18 00 90 8b 5f 08 8d 6e ec eb d8 89 e8 e8 61 0b 00 00 <8b> 36 85 f6 0f 85 ff fd ff ff 81 3d c8 69 35 c0 3c 4b 24 1d 74
Jun 22 15:39:21 localhost kernel:  <0>Fatal exception: panic in 5 seconds




More information about the Linux-audit mailing list