Steve Grubb wrote:
Hi,

The lspp.31 kernel has been published to the lspp yum repo at: http://people.redhat.com/sgrubb/files/lspp

The changes are:

- New netlabel patch from Paul

- Added patch to fix NULL ptr deref from Amy.

Please let me know if this kernel has any problems.

The following scenario does not work on my machine (it results in an OOPS):

1. reboot
2. login as root
3. auditctl -l (until you get no rules, running under MLS so I'm still seeing the Error permission denied problem).
4. auditctl -a exit,always -S chmod -F path=/root/file
5. auditctl -l (confirm rule added)
6. auditctl -D << oops
   [this also happens with the auditctl -d style delete]

The following is the dump:
BUG: unable to handle kernel paging request at virtual address 6b6b6b6b
 printing eip:
c04473cd
*pde = 00000000
Oops: 0000 [#1]
SMP
last sysfs file: /block/hda/hda1/size
Modules linked in: ipv6 autofs4 hidp rfcomm l2cap bluetooth sunrpc ip_conntrack_netbios_ns ipt_REJECT xt_state ip_conntrack nfnetlink xt_tcpudp iptable_filter ip_tables x_tables dm_mirror dm_mod video button battery ac lp parport_pc parport floppy ehci_hcd uhci_hcd e100 mii snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_seq_dummy i2c_i801 snd_seq_oss snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd soundcore ide_cd cdrom snd_page_alloc i2c_i810 i2c_algo_bit i2c_core ext3 jbd
CPU:    0
EIP:    0060:[<c04473cd>]    Not tainted VLI
EFLAGS: 00010246   (2.6.16-1.2212.2.4_FC6.lspp.31 #1)
EIP is at audit_inotify_unregister+0x21/0x2f
eax: 00000000   ebx: d2e3cd24   ecx: 00000000   edx: 00000002
esi: 6b6b6b6b   edi: d434dcd0   ebp: d2e3ca68   esp: d434dc74
ds: 007b   es: 007b   ss: 0068
Process auditctl (pid: 4060, threadinfo=d434d000 task=c168faa0)
Stack: d2e3cbe4 c173ad84 d2e3cd14 c0448131 d434d000 d434dccc c044579c c0438507 c044579c 00000000 00000002 d434dcd8 00000fdc d434dccc d434dccc c168faa0 d2e3cc00 00000000 d3762494 c04be424 00800000 d434dcd4 00000202 d2e3cd14
Call Trace:
<c0448131> audit_receive_filter+0xa1c/0xec2 <c044579c> audit_receive+0x13/0x975 <c0438507> debug_mutex_add_waiter+0x97/0xa9 <c044579c> audit_receive+0x13/0x975
 <c04be424> avc_has_perm+0x4e/0x58  <c0445f8e> audit_receive+0x805/0x975
<c04c17f0> selinux_netlink_send+0x113/0x123 <c05c42c4> netlink_sendmsg+0x157/0x280 <c05c43ff> netlink_data_ready+0x12/0x52 <c05c3375> netlink_sendskb+0x1c/0x33
 <c05c43e1> netlink_sendmsg+0x274/0x280  <c05a803b> sock_sendmsg+0xd4/0xef
<c0435144> autoremove_wake_function+0x0/0x35 <c0465b77> cache_alloc_debugcheck_after+0xcd/0x13e
 <c044ad44> audit_sockaddr+0x31/0x74  <c044ad44> audit_sockaddr+0x31/0x74
 <c0466ac6> __kmalloc+0xbc/0xc6  <c044ad44> audit_sockaddr+0x31/0x74
 <c044ad44> audit_sockaddr+0x31/0x74  <c05a92f1> sys_sendto+0x116/0x140
 <c0451e31> __alloc_pages+0x6d/0x2c2  <c0466ccc> kmem_cache_alloc+0x84/0x8e
<c045e2f0> anon_vma_prepare+0x55/0xc1 <c0465b77> cache_alloc_debugcheck_after+0xcd/0x13e
 <c045a9fd> __vma_link+0x5e/0x6b  <c05a9cf0> sys_socketcall+0x17b/0x261
 <c0403e1f> syscall_call+0x7/0xb
Code: 83 c4 20 89 d8 5b 5e 5f 5d c3 57 89 c7 56 53 8b 30 eb 18 a1 a4 31 7f c0 8d 5e 10 89 da e8 17 79 04 00 89 d8 e8 46 78 04 00 8b 36 <8b> 06 0f 18 00 90 39 fe 75 de 5b 5e 5f c3 55 57 56 89 c6 53 8b
EIP: [<c04473cd>] audit_inotify_unregister+0x21/0x2f SS:ESP 0068:d434dc74
 BUG: auditctl/4060, lock held at task exit time!
 [c06c7f00] {audit_cmd_mutex}
.. held by:          auditctl: 4060 [c168faa0, 121]
... acquired at:               audit_receive+0x13/0x975

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to