Bug 684275 - kernel: BUG: warning at drivers/char/tty_audit.c:55/tty_audit_buf_free() [rhel-6.0.z]
kernel: BUG: warning at drivers/char/tty_audit.c:55/tty_audit_buf_free() [rhe...
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel (Show other bugs)
6.0
x86_64 Linux
urgent Severity high
: rc
: ---
Assigned To: Frantisek Hrbata
Eryu Guan
: ZStream
Depends On: 680126
Blocks:
  Show dependency treegraph
 
Reported: 2011-03-11 11:36 EST by RHEL Product and Program Management
Modified: 2011-05-10 14:13 EDT (History)
10 users (show)

See Also:
Fixed In Version: kernel-2.6.32-71.26.1.el6
Doc Type: Bug Fix
Doc Text:
Using the pam_tty_audit.so module (which enables or disables TTY auditing for specified users) in the /etc/pam.d/sudo file and in the /etc/pam.d/system-auth file when the audit package is not installed resulted in soft lock-ups on CPUs. As a result, the kernel became unresponsive. This was due to the kernel exiting immediately after TTY auditing was disabled, without emptying the buffer, which caused the kernel to spin in a loop, copying 0 bytes at each iteration and attempting to push each time without any effect. With this update, a locking mechanism is introduced to prevent the aforementioned behavior.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-05-10 14:13:16 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description RHEL Product and Program Management 2011-03-11 11:36:52 EST
This bug has been copied from bug #680126 and has been proposed
to be backported to 6.0 z-stream (EUS).
Comment 5 KernelOops Bot 2011-04-26 01:16:09 EDT
 with this guiltyfunc:  bug 680126
Comment 7 Martin Prpic 2011-05-05 04:58:08 EDT
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Using the pam_tty_audit.so module (which enables or disables TTY auditing for specified users) in the /etc/pam.d/sudo file and in the /etc/pam.d/system-auth file when the audit package is not installed resulted in soft lock-ups on CPUs. As a result, the kernel became unresponsive. This was due to the kernel exiting immediately after TTY auditing was disabled, without emptying the buffer, which caused the kernel to spin in a loop, copying 0 bytes at each iteration and attempting to push each time without any effect. With this update, a locking mechanism is introduced to prevent the aforementioned behavior.
Comment 8 errata-xmlrpc 2011-05-10 14:13:16 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0498.html

Note You need to log in before you can comment on or make changes to this bug.