On Sun, 12 Nov 2006, Steve Wills wrote:
> I thought I'd try out the new audit support in 6.2-PRE and discovered
that
> having quota enabled causes:
>
> Fatal trap 12: page fault while in kernel mode
> fault virtual address = 0x0
> fault code = supervisor read, page not present
> instruction pointer = 0x20:0xc0695278
> stack pointer = 0x28:0xce19ac34
> frame pointer = 0x28:0xce19ac3c
> code segment = base 0x0, limit 0xfffff, type 0x1b
> = DPL 0, pres 1, def32 1, gran 1
> processor eflags = resume, IOPL = 0
> current process = 564 (auditd)
> trap number = 12
> panic: page fault
>
> when trying to start auditd. I can provide backtrace, but it seems pretty
> reproducible.
A backtrace would be helpful.
Are you using quotas on the file system targeted by the audit trail, or just
on the system in general? Is compiling quotas in sufficient to reproduce the
problem, or must quotas be enabled on at least one file system?
Thanks,
Robert N M Watson
Computer Laboratory
University of Cambridge