Steve Grubb wrote:
Hi,
The lspp.31 kernel has been published to the lspp yum repo at:
http://people.redhat.com/sgrubb/files/lspp
The changes are:
- New netlabel patch from Paul
- Added patch to fix NULL ptr deref from Amy.
Please let me know if this kernel has any problems.
The following scenario does not work on my machine (it results in an OOPS):
1. reboot
2. login as root
3. auditctl -l (until you get no rules, running under MLS so I'm still
seeing the Error permission denied problem).
4. auditctl -a exit,always -S chmod -F path=/root/file
5. auditctl -l (confirm rule added)
6. auditctl -D << oops
[this also happens with the auditctl -d style delete]
The following is the dump:
BUG: unable to handle kernel paging request at virtual address 6b6b6b6b
printing eip:
c04473cd
*pde = 00000000
Oops: 0000 [#1]
SMP
last sysfs file: /block/hda/hda1/size
Modules linked in: ipv6 autofs4 hidp rfcomm l2cap bluetooth sunrpc
ip_conntrack_netbios_ns ipt_REJECT xt_state ip_conntrack nfnetlink
xt_tcpudp iptable_filter ip_tables x_tables dm_mirror dm_mod video
button battery ac lp parport_pc parport floppy ehci_hcd uhci_hcd e100
mii snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_seq_dummy i2c_i801
snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss
snd_mixer_oss snd_pcm snd_timer snd soundcore ide_cd cdrom
snd_page_alloc i2c_i810 i2c_algo_bit i2c_core ext3 jbd
CPU: 0
EIP: 0060:[<c04473cd>] Not tainted VLI
EFLAGS: 00010246 (2.6.16-1.2212.2.4_FC6.lspp.31 #1)
EIP is at audit_inotify_unregister+0x21/0x2f
eax: 00000000 ebx: d2e3cd24 ecx: 00000000 edx: 00000002
esi: 6b6b6b6b edi: d434dcd0 ebp: d2e3ca68 esp: d434dc74
ds: 007b es: 007b ss: 0068
Process auditctl (pid: 4060, threadinfo=d434d000 task=c168faa0)
Stack: d2e3cbe4 c173ad84 d2e3cd14 c0448131 d434d000 d434dccc c044579c
c0438507
c044579c 00000000 00000002 d434dcd8 00000fdc d434dccc d434dccc
c168faa0
d2e3cc00 00000000 d3762494 c04be424 00800000 d434dcd4 00000202
d2e3cd14
Call Trace:
<c0448131> audit_receive_filter+0xa1c/0xec2 <c044579c>
audit_receive+0x13/0x975
<c0438507> debug_mutex_add_waiter+0x97/0xa9 <c044579c>
audit_receive+0x13/0x975
<c04be424> avc_has_perm+0x4e/0x58 <c0445f8e> audit_receive+0x805/0x975
<c04c17f0> selinux_netlink_send+0x113/0x123 <c05c42c4>
netlink_sendmsg+0x157/0x280
<c05c43ff> netlink_data_ready+0x12/0x52 <c05c3375>
netlink_sendskb+0x1c/0x33
<c05c43e1> netlink_sendmsg+0x274/0x280 <c05a803b> sock_sendmsg+0xd4/0xef
<c0435144> autoremove_wake_function+0x0/0x35 <c0465b77>
cache_alloc_debugcheck_after+0xcd/0x13e
<c044ad44> audit_sockaddr+0x31/0x74 <c044ad44> audit_sockaddr+0x31/0x74
<c0466ac6> __kmalloc+0xbc/0xc6 <c044ad44> audit_sockaddr+0x31/0x74
<c044ad44> audit_sockaddr+0x31/0x74 <c05a92f1> sys_sendto+0x116/0x140
<c0451e31> __alloc_pages+0x6d/0x2c2 <c0466ccc> kmem_cache_alloc+0x84/0x8e
<c045e2f0> anon_vma_prepare+0x55/0xc1 <c0465b77>
cache_alloc_debugcheck_after+0xcd/0x13e
<c045a9fd> __vma_link+0x5e/0x6b <c05a9cf0> sys_socketcall+0x17b/0x261
<c0403e1f> syscall_call+0x7/0xb
Code: 83 c4 20 89 d8 5b 5e 5f 5d c3 57 89 c7 56 53 8b 30 eb 18 a1 a4 31
7f c0 8d 5e 10 89 da e8 17 79 04 00 89 d8 e8 46 78 04 00 8b 36 <8b> 06
0f 18 00 90 39 fe 75 de 5b 5e 5f c3 55 57 56 89 c6 53 8b
EIP: [<c04473cd>] audit_inotify_unregister+0x21/0x2f SS:ESP 0068:d434dc74
BUG: auditctl/4060, lock held at task exit time!
[c06c7f00] {audit_cmd_mutex}
.. held by: auditctl: 4060 [c168faa0, 121]
... acquired at: audit_receive+0x13/0x975
--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp