kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #115551
[Bug 1450643] Re: Installing linux-image-3.13.0-51-generic with auditd causes inability to ssh into the system
*** This bug is a duplicate of bug 1450442 ***
https://bugs.launchpad.net/bugs/1450442
I can confirm that I have this same issue. It also affects
3.16.0-36-generic.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1450643
Title:
Installing linux-image-3.13.0-51-generic with auditd causes inability
to ssh into the system
Status in linux-lts-trusty package in Ubuntu:
Confirmed
Bug description:
When installing linux kernel 3.13.0-51 onto a system that has auditd
installed with at least one rule enabled, the following stacktrace
occurs when various processes occur (pretty much anything by root).
[ 41.813593] type=1305 audit(1430428709.300:28): audit_pid=0 old=880 auid=4294967295 ses=4294967295 res=1
[ 41.830177] type=1305 audit(1430428709.316:29): audit_enabled=1 old=1 auid=900 ses=1 res=1
[ 41.830184] type=1305 audit(1430428709.316:30): audit_pid=1238 old=0 auid=900 ses=1 res=1
[ 51.377064] BUG: unable to handle kernel NULL pointer dereference at 0000000000000023
[ 51.377243] IP: [<ffffffff8136cb80>] strlen+0x0/0x30
[ 51.377312] PGD 0
[ 51.377358] Oops: 0000 [#1] SMP
[ 51.377428] Modules linked in: vmw_vsock_vmci_transport vsock dm_crypt ppdev crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper vmw_balloon cryptd psmouse serio_raw nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache vmw_vmci parport_pc lp parport vmw_pvscsi vmxnet3 e1000 mptspi mptscsih mptbase floppy
[ 51.378232] CPU: 0 PID: 1281 Comm: sshd Not tainted 3.13.0-51-generic #84-Ubuntu
[ 51.378285] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/20/2014
[ 51.378355] task: ffff880015979800 ti: ffff8800158f6000 task.ti: ffff8800158f6000
[ 51.378429] RIP: 0010:[<ffffffff8136cb80>] [<ffffffff8136cb80>] strlen+0x0/0x30
[ 51.378496] RSP: 0018:ffff8800158f7d60 EFLAGS: 00010216
[ 51.378537] RAX: 000000000000000a RBX: 000000000000000a RCX: 00000000001e0e67
[ 51.378587] RDX: 0000000000000014 RSI: 0000000000000023 RDI: 0000000000000023
[ 51.378637] RBP: ffff8800158f7d90 R08: ffff88001549c248 R09: ffff880017c197e0
[ 51.378736] R10: ffffffff81288580 R11: ffffea0000020ac0 R12: 0000000000000014
[ 51.378823] R13: 0000000000000023 R14: ffff88000f1661b8 R15: ffff88001549c060
[ 51.378910] FS: 00007fee7e146840(0000) GS:ffff880017c00000(0000) knlGS:0000000000000000
[ 51.379038] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 51.379118] CR2: 0000000000000023 CR3: 00000000175f4000 CR4: 00000000001407f0
[ 51.379238] Stack:
[ 51.379299] ffffffff810fb39b 0000000000000000 0000000000000004 ffff88000f1633e8
[ 51.379523] ffff88001549c000 ffff88001549c060 ffff8800158f7df8 ffffffff810fdb36
[ 51.379827] 00000000000008e6 0000000400000023 ffff88000f166180 ffff88000f1637c0
[ 51.380015] Call Trace:
[ 51.380085] [<ffffffff810fb39b>] ? audit_compare_dname_path+0x2b/0xa0
[ 51.380170] [<ffffffff810fdb36>] __audit_inode_child+0xb6/0x330
[ 51.380254] [<ffffffff811ca060>] vfs_mknod+0x110/0x160
[ 51.380350] [<ffffffff816bf475>] unix_bind+0x2a5/0x360
[ 51.380449] [<ffffffff810ff142>] ? __audit_sockaddr+0x42/0x80
[ 51.380538] [<ffffffff8160d4c0>] SYSC_bind+0xe0/0x120
[ 51.380617] [<ffffffff8160e4de>] SyS_bind+0xe/0x10
[ 51.380777] [<ffffffff817330bd>] system_call_fastpath+0x1a/0x1f
[ 51.380943] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 <80> 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
[ 51.382310] RIP [<ffffffff8136cb80>] strlen+0x0/0x30
[ 51.382432] RSP <ffff8800158f7d60>
[ 51.382518] CR2: 0000000000000023
[ 51.382654] ---[ end trace b5e4e75ed1093ea0 ]---
To Replicate:
apt-get install auditd
echo "-w /etc/test" >>/etc/audit/audit.rules
/etc/init.d/auditd restart
apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic
reboot
attempt to login or ssh into the host - you'll get a similar stacktrace.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1450643/+subscriptions
References