Bug 141996
Summary: | CAN-2004-1237 instant kernel panic from one line perl program - BAD | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | ara howard <ara.t.howard> |
Component: | kernel | Assignee: | Peter Martuccelli <peterm> |
Status: | CLOSED ERRATA | QA Contact: | Brian Brock <bbrock> |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | CC: | bressers, juanino, petrides, riel, security-response-team, tao |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2004-12-07 21:28:59 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
ara howard
2004-12-06 16:51:39 UTC
I reproduced this crash under 2.4.21-27.EL (U4) by queuing the cron job using the "crontab -u $user -l" command (and waiting for the minute to roll over). The oops is in the "audit" module at __audit_get_target+0x1ee. The logical bottom-of-stack is syscall_trace_leave+0x58. If you don't heed the advice of scheduling the cron job for a specific time (for a "one-shot" run), then your test system will continue to panic during each reboot. In order to recover, boot with "init=/bin/bash" added to the kernel args, use "fsck" to fix up file systems, remount the root file system (presuming it contains /var) read-write (with the command "mount -n -o remount,rw /"), and then run "crontab -u $user -r" to recover (and then reboot). The oops would be from EIP __audit_get_target+0x1f6 in a Beehive-built kernel. The +0x1ee offset I wrote in comment #1 was from a test build using my local (older) compiler. A fix for this problem has already been committed to the RHEL3 U5 patch pool on 15-Nov-2004 (in kernel version 2.4.21-25.1.EL). To work around this problem before U5 is released (a few months from now), please disable auditing with the following commands: chkconfig audit off service audit stop *** This bug has been marked as a duplicate of 132245 *** *** Bug 143866 has been marked as a duplicate of this bug. *** An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-043.html |