You are not logged in.

#1 2023-07-21 21:46:59

uwuster
Member
Registered: 2023-07-20
Posts: 6

Random fails on auth 'free():invalid pointer'

After entering correct password for root screen stucks with _ for  ~15 seconds and  give 'free():invalid pointer' error.  Randomly. I may login as it should be for first try, but usually it take 2-5 tryes. : (
From journalctl:

Jul 21 22:21:05 t60 audit[358]: USER_AUTH pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 kernel: kauditd_printk_skb: 13 callbacks suppressed
Jul 21 22:21:05 t60 kernel: audit: type=1100 audit(1689978065.063:25): pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 audit[358]: USER_ACCT pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 kernel: audit: type=1101 audit(1689978065.066:26): pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 audit[358]: CRED_ACQ pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 audit[358]: SYSCALL arch=40000003 syscall=4 success=yes exit=1 a0=4 a1=bff4f5ca a2=1 a3=b7ec2e54 items=0 ppid=1 pid=358 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=1 comm="login" exe="/usr/bin/login" key=(null)
Jul 21 22:21:05 t60 audit: PROCTITLE proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 21 22:21:05 t60 login[358]: pam_unix(login:session): session opened for user root(uid=0) by LOGIN(uid=0)
Jul 21 22:21:05 t60 kernel: audit: type=1103 audit(1689978065.069:27): pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 kernel: audit: type=1006 audit(1689978065.069:28): pid=358 uid=0 old-auid=4294967295 auid=0 tty=tty1 old-ses=4294967295 ses=1 res=1
Jul 21 22:21:05 t60 kernel: audit: type=1300 audit(1689978065.069:28): arch=40000003 syscall=4 success=yes exit=1 a0=4 a1=bff4f5ca a2=1 a3=b7ec2e54 items=0 ppid=1 pid=358 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=1 comm="login" exe="/usr/bin/login" key=(null)
Jul 21 22:21:05 t60 kernel: audit: type=1327 audit(1689978065.069:28): proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 21 22:21:05 t60 login[358]: pam_systemd(login:session): Failed to create session: Input/output error
Jul 21 22:21:05 t60 iwd[252]: hardware_rekey not supported
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: carrier acquired
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: connected to Access Point:
Jul 21 22:21:05 t60 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: 
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: IAID conflicts with one assigned to wlan1
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: adding address 
Jul 21 22:21:06 t60 dhcpcd[256]: wlan0: rebinding lease of 
Jul 21 22:21:06 t60 dhcpcd[256]: wlan0: probing address 
Jul 21 22:21:06 t60 dhcpcd[256]: wlan0: soliciting an IPv6 router
Jul 21 22:21:08 t60 systemd[1]: systemd-rfkill.service: Deactivated successfully.
Jul 21 22:21:08 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-rfkill comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:08 t60 kernel: audit: type=1131 audit(1689978068.069:29): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-rfkill comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:11 t60 dhcpcd[256]: wlan0:  for 3600 seconds
Jul 21 22:21:11 t60 dhcpcd[256]: wlan0: adding route to 
Jul 21 22:21:11 t60 dhcpcd[256]: wlan0: adding default route via 
Jul 21 22:21:18 t60 dhcpcd[256]: wlan0: no IPv6 Routers available
Jul 21 22:21:30 t60 audit[358]: USER_START pid=358 uid=0 auid=0 ses=1 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 audit[358]: CRED_REFR pid=358 uid=0 auid=0 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1105 audit(1689978090.079:30): pid=358 uid=0 auid=0 ses=1 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1110 audit(1689978090.079:31): pid=358 uid=0 auid=0 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 login[358]: ROOT LOGIN ON tty1
Jul 21 22:21:30 t60 audit[422]: ANOM_ABEND auid=0 uid=0 gid=0 ses=1 pid=422 comm="login" exe="/usr/bin/login" sig=6 res=1
Jul 21 22:21:30 t60 kernel: audit: type=1701 audit(1689978090.086:32): auid=0 uid=0 gid=0 ses=1 pid=422 comm="login" exe="/usr/bin/login" sig=6 res=1
Jul 21 22:21:30 t60 systemd[1]: Created slice Slice /system/systemd-coredump.
Jul 21 22:21:30 t60 systemd[1]: Started Process Core Dump (PID 423/UID 0).
Jul 21 22:21:30 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-423-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1130 audit(1689978090.149:33): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-423-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 systemd-coredump[424]: Process 422 (login) of user 0 dumped core.
                                           
                                           Stack trace of thread 422:
                                           #0  0x00000000b7efb549 __kernel_vsyscall (linux-gate.so.1 + 0x549)
                                           #1  0x00000000b7d5dbb7 n/a (libc.so.6 + 0x89bb7)
                                           #2  0x00000000b7d09e07 raise (libc.so.6 + 0x35e07)
                                           #3  0x00000000b7cf2126 abort (libc.so.6 + 0x1e126)
                                           #4  0x00000000b7cf3040 n/a (libc.so.6 + 0x1f040)
                                           #5  0x00000000b7d6951d n/a (libc.so.6 + 0x9551d)
                                           #6  0x00000000b7d6b473 n/a (libc.so.6 + 0x97473)
                                           #7  0x00000000b7d6ddf7 __libc_free (libc.so.6 + 0x99df7)
                                           #8  0x00000000b7c72b8b n/a (pam_systemd_home.so + 0x44b8b)
                                           #9  0x00000000b7c72c49 n/a (pam_systemd_home.so + 0x44c49)
                                           #10 0x00000000b7c3d148 n/a (pam_systemd_home.so + 0xf148)
                                           #11 0x00000000b7ed5511 n/a (libpam.so.0 + 0x2511)
                                           #12 0x00000000b7ed6092 pam_end (libpam.so.0 + 0x3092)
                                           #13 0x00000000004d5108 n/a (login + 0x4108)
                                           #14 0x00000000b7cf3629 n/a (libc.so.6 + 0x1f629)
                                           #15 0x00000000b7cf36ed __libc_start_main (libc.so.6 + 0x1f6ed)
                                           #16 0x00000000004d5beb n/a (login + 0x4beb)
                                           ELF object binary architecture: Intel 80386
Jul 21 22:21:30 t60 login[358]: pam_unix(login:session): session closed for user root
Jul 21 22:21:30 t60 kernel: audit: type=1104 audit(1689978090.379:34): pid=358 uid=0 auid=0 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1106 audit(1689978090.379:35): pid=358 uid=0 auid=0 ses=1 msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1701 audit(1689978090.383:36): auid=0 uid=0 gid=0 ses=1 pid=358 comm="login" exe="/usr/bin/login" sig=6 res=1
Jul 21 22:21:30 t60 kernel: audit: type=1131 audit(1689978090.386:37): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-423-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[358]: CRED_DISP pid=358 uid=0 auid=0 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 audit[358]: USER_END pid=358 uid=0 auid=0 ses=1 msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 audit[358]: ANOM_ABEND auid=0 uid=0 gid=0 ses=1 pid=358 comm="login" exe="/usr/bin/login" sig=6 res=1
Jul 21 22:21:30 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-423-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 systemd[1]: systemd-coredump@0-423-0.service: Deactivated successfully.
Jul 21 22:21:30 t60 systemd[1]: Started Process Core Dump (PID 427/UID 0).
Jul 21 22:21:30 t60 kernel: audit: type=1130 audit(1689978090.419:38): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@1-427-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@1-427-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 systemd-coredump[431]: Process 358 (login) of user 0 dumped core.
                                           
                                           Stack trace of thread 358:
                                           #0  0x00000000b7efb549 __kernel_vsyscall (linux-gate.so.1 + 0x549)
                                           #1  0x00000000b7d5dbb7 n/a (libc.so.6 + 0x89bb7)
                                           #2  0x00000000b7d09e07 raise (libc.so.6 + 0x35e07)
                                           #3  0x00000000b7cf2126 abort (libc.so.6 + 0x1e126)
                                           #4  0x00000000b7cf3040 n/a (libc.so.6 + 0x1f040)
                                           #5  0x00000000b7d6951d n/a (libc.so.6 + 0x9551d)
                                           #6  0x00000000b7d6b473 n/a (libc.so.6 + 0x97473)
                                           #7  0x00000000b7d6ddf7 __libc_free (libc.so.6 + 0x99df7)
                                           #8  0x00000000b7c72b8b n/a (pam_systemd_home.so + 0x44b8b)
                                           #9  0x00000000b7c72c49 n/a (pam_systemd_home.so + 0x44c49)
                                           #10 0x00000000b7c3d148 n/a (pam_systemd_home.so + 0xf148)
                                           #11 0x00000000b7ed5511 n/a (libpam.so.0 + 0x2511)
                                           #12 0x00000000b7ed6092 pam_end (libpam.so.0 + 0x3092)
                                           #13 0x00000000004d4c4e n/a (login + 0x3c4e)
                                           #14 0x00000000b7cf3629 n/a (libc.so.6 + 0x1f629)
                                           #15 0x00000000b7cf36ed __libc_start_main (libc.so.6 + 0x1f6ed)
                                           #16 0x00000000004d5beb n/a (login + 0x4beb)
                                           ELF object binary architecture: Intel 80386
Jul 21 22:21:30 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1131 audit(1689978090.586:39): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@1-427-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 systemd[1]: getty@tty1.service: Deactivated successfully.
Jul 21 22:21:30 t60 systemd[1]: systemd-coredump@1-427-0.service: Deactivated successfully.
Jul 21 22:21:30 t60 systemd[1]: getty@tty1.service: Scheduled restart job, restart counter is at 1.
Jul 21 22:21:30 t60 systemd[1]: Stopped Getty on tty1.
Jul 21 22:21:30 t60 systemd[1]: Started Getty on tty1.
Jul 21 22:21:30 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 audit[437]: USER_AUTH pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 audit[437]: USER_ACCT pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 audit[437]: CRED_ACQ pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 kernel: kauditd_printk_skb: 4 callbacks suppressed
Jul 21 22:21:37 t60 kernel: audit: type=1100 audit(1689978097.863:44): pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1101 audit(1689978097.863:45): pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1103 audit(1689978097.863:46): pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1006 audit(1689978097.863:47): pid=437 uid=0 old-auid=4294967295 auid=0 tty=tty1 old-ses=4294967295 ses=2 res=1
Jul 21 22:21:37 t60 kernel: audit: type=1300 audit(1689978097.863:47): arch=40000003 syscall=4 success=yes exit=1 a0=4 a1=bfc35f3a a2=1 a3=b7f3ae54 items=0 ppid=1 pid=437 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=2 comm="login" exe="/usr/bin/login" key=(null)
Jul 21 22:21:37 t60 kernel: audit: type=1327 audit(1689978097.863:47): proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 21 22:21:37 t60 audit[437]: SYSCALL arch=40000003 syscall=4 success=yes exit=1 a0=4 a1=bfc35f3a a2=1 a3=b7f3ae54 items=0 ppid=1 pid=437 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=2 comm="login" exe="/usr/bin/login" key=(null)
Jul 21 22:21:37 t60 audit: PROCTITLE proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 21 22:21:37 t60 login[437]: pam_unix(login:session): session opened for user root(uid=0) by LOGIN(uid=0)
Jul 21 22:21:37 t60 systemd[1]: Created slice User Slice of UID 0.
Jul 21 22:21:37 t60 systemd[1]: Starting User Runtime Directory /run/user/0...
Jul 21 22:21:37 t60 systemd-logind[253]: New session 2 of user root.
Jul 21 22:21:37 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1130 audit(1689978097.923:48): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 systemd[1]: Finished User Runtime Directory /run/user/0.
Jul 21 22:21:37 t60 systemd[1]: Starting User Manager for UID 0...
Jul 21 22:21:37 t60 audit[441]: USER_ACCT pid=441 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 systemd[441]: pam_warn(systemd-user:setcred): function=[pam_sm_setcred] flags=0x8002 service=[systemd-user] terminal=[] user=[root] ruser=[<unknown>] rhost=[<unknown>]
Jul 21 22:21:37 t60 audit[441]: CRED_ACQ pid=441 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 21 22:21:37 t60 kernel: audit: type=1101 audit(1689978097.939:49): pid=441 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1103 audit(1689978097.939:50): pid=441 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 21 22:21:37 t60 audit[441]: SYSCALL arch=40000003 syscall=4 success=yes exit=1 a0=9 a1=bff6dcba a2=1 a3=b7963e54 items=0 ppid=1 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 21 22:21:37 t60 audit: PROCTITLE proctitle="(systemd)"
Jul 21 22:21:37 t60 systemd[441]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0)
Jul 21 22:21:37 t60 kernel: audit: type=1006 audit(1689978097.943:51): pid=441 uid=0 old-auid=4294967295 auid=0 tty=(none) old-ses=4294967295 ses=3 res=1
Jul 21 22:21:37 t60 audit[441]: USER_START pid=441 uid=0 auid=0 ses=3 msg='op=PAM:session_open grantors=pam_loginuid,pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 audit: BPF prog-id=2 op=LOAD
Jul 21 22:21:37 t60 audit[441]: SYSCALL arch=40000003 syscall=357 success=yes exit=8 a0=5 a1=bfc4e3a8 a2=74 a3=0 items=0 ppid=1 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="systemd" exe="/usr/lib/systemd/systemd" key=(null)
Jul 21 22:21:37 t60 audit: PROCTITLE proctitle="(systemd)"
Jul 21 22:21:37 t60 audit: BPF prog-id=2 op=UNLOAD
Jul 21 22:21:38 t60 systemd[441]: Queued start job for default target Main User Target.
Jul 21 22:21:38 t60 systemd[441]: Created slice User Application Slice.
Jul 21 22:21:38 t60 systemd[441]: Reached target Paths.
Jul 21 22:21:38 t60 systemd[441]: Reached target Timers.
Jul 21 22:21:38 t60 systemd[441]: Starting D-Bus User Message Bus Socket...
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG network certificate management daemon.
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers).
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG cryptographic agent and passphrase cache (restricted).
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG cryptographic agent (ssh-agent emulation).
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG cryptographic agent and passphrase cache.
Jul 21 22:21:38 t60 systemd[441]: Listening on p11-kit server.
Jul 21 22:21:38 t60 systemd[441]: Sound System was skipped because of an unmet condition check (ConditionUser=!root).
Jul 21 22:21:38 t60 systemd[441]: Listening on D-Bus User Message Bus Socket.
Jul 21 22:21:38 t60 systemd[441]: Reached target Sockets.
Jul 21 22:21:38 t60 systemd[441]: Reached target Basic System.
Jul 21 22:21:38 t60 systemd[1]: Started User Manager for UID 0.
Jul 21 22:21:38 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:38 t60 systemd[441]: Reached target Main User Target.
Jul 21 22:21:38 t60 systemd[441]: Startup finished in 484ms.
Jul 21 22:21:38 t60 systemd[1]: Started Session 2 of User root.
Jul 21 22:21:38 t60 audit[437]: USER_START pid=437 uid=0 auid=0 ses=2 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:38 t60 audit[437]: CRED_REFR pid=437 uid=0 auid=0 ses=2 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:38 t60 login[437]: ROOT LOGIN ON tty1 

What i can do with that? Is there is a way to at least disable pam_auth somehow?

Last edited by uwuster (2023-07-24 00:38:47)

Offline

#2 2023-07-23 00:57:36

uwuster
Member
Registered: 2023-07-20
Posts: 6

Re: Random fails on auth 'free():invalid pointer'

It does not affect users or sudo. Is this kind of system limitations?

Offline

#3 2023-07-23 14:58:37

abaumann
Administrator
From: Zurich
Registered: 2019-11-14
Posts: 990
Website

Re: Random fails on auth 'free():invalid pointer'

I rather suspect a bug in pam_systemd. :->
This can be disabled in /etc/pam.d/system-auth and /etc/pam.d/system-login.
Per default they are prefixed with a '-' (ignore PAM result), just try to comment them out (all of them!)

Offline

#4 2023-07-23 19:05:07

uwuster
Member
Registered: 2023-07-20
Posts: 6

Re: Random fails on auth 'free():invalid pointer'

abaumann wrote:

just try to comment them out (all of them!)

Well, now it works, thank you!

Offline

#5 2023-07-24 00:38:25

uwuster
Member
Registered: 2023-07-20
Posts: 6

Re: Random fails on auth 'free():invalid pointer'

Well...
It didnt change anything. How annoying... ;(

Because i did it wrong, lol.
So i change all -auth and -login to #-auth and #-login and problem is gone, but now i unable to startxfce4 under user profile 'Cannot open /dev/tty0 (Permission denied)' and if i use sudo or su xfce load my root session. Is it because of me who installed xfce under root?

Last edited by uwuster (2023-07-24 01:46:29)

Offline

Board footer

Powered by FluxBB