[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
** Changed in: linux (Ubuntu) Importance: Undecided => Low ** Changed in: linux (Ubuntu Trusty) Importance: Undecided => Low ** Changed in: linux (Ubuntu Utopic) Importance: Undecided => Low -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt->label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
This bug was fixed in the package linux - 3.13.0-32.57 --- linux (3.13.0-32.57) trusty; urgency=low [ Upstream Kernel Changes ] * l2tp: Privilege escalation in ppp over l2tp sockets - LP: #1341472 - CVE-2014-4943 linux (3.13.0-32.56) trusty; urgency=low [ Luis Henriques ] * Merged back Ubuntu-3.13.0-30.55 security release * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699) - LP: #1337339 * Release Tracking Bug - LP: #1338524 [ Upstream Kernel Changes ] * ptrace,x86: force IRET path after a ptrace_stop() - LP: #1337339 - CVE-2014-4699 * hpsa: add new Smart Array PCI IDs (May 2014) - LP: #1337516 linux (3.13.0-31.55) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1336278 [ Andy Whitcroft ] * [Config] switch hyper-keyboard to virtual - LP: #1325306 * [Packaging] linux-udeb-flavour -- standardise on linux prefix [ dann frazier ] * [Config] CONFIG_GPIO_DWAPB=m - LP: #1334823 [ Feng Kan ] * SAUCE: (no-up) arm64: dts: Add Designware GPIO dts binding to APM X-Gene platform - LP: #1334823 [ John Johansen ] * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message - LP: #1308761 [ Kamal Mostafa ] * [Config] updateconfigs ACPI_PROCFS_POWER=y after v3.13.11.4 rebase [ Loc Ho ] * SAUCE: (no-up) phy-xgene: Use correct tuning for Mustang - LP: #1335636 [ Michael Ellerman ] * SAUCE: (no-up) powerpc/perf: Ensure all EBB register state is cleared on fork() - LP: #1328914 [ Ming Lei ] * Revert SAUCE: (no-up) rtc: Add X-Gene SoC Real Time Clock Driver - LP: #1274305 [ Suman Tripathi ] * SAUCE: (no-up) libahci: Implement the function ahci_restart_engine to restart the port dma engine. - LP: #1335645 * SAUCE: (no-up) ata: Fix the dma state machine lockup for the IDENTIFY DEVICE PIO mode command. - LP: #1335645 [ Tim Gardner ] * [Config] CONFIG_POWERNV_CPUFREQ=y for powerpc, ppc64el - LP: #1324571 * [Debian] Add UTS_UBUNTU_RELEASE_ABI to utsrelease.h - LP: #1327619 * [Config] CONFIG_HAVE_MEMORYLESS_NODES=y - LP: #1332063 * [Config] CONFIG_HID_RMI=m - LP: #1305522 [ Upstream Kernel Changes ] * Revert offb: Add palette hack for little endian - LP: #1333430 * Revert net: mvneta: fix usage as a module on RGMII configurations - LP: #1333837 * Revert USB: serial: add usbid for dell wwan card to sierra.c - LP: #1333837 * Revert macvlan : fix checksums error when we are in bridge mode - LP: #1333838 * serial: uart: add hw flow control support configuration - LP: #1328295 * mm/numa: Remove BUG_ON() in __handle_mm_fault() - LP: #1323165 * Tools: hv: Handle the case when the target file exists correctly - LP: #1306215 * Documentation/devicetree/bindings: add documentation for the APM X-Gene SoC RTC DTS binding - LP: #1274305 * drivers/rtc: add APM X-Gene SoC RTC driver - LP: #1274305 * arm64: add APM X-Gene SoC RTC DTS entry - LP: #1274305 * powerpc/perf: Add Power8 cache TLB events - LP: #1328914 * powerpc/perf: Configure BHRB filter before enabling PMU interrupts - LP: #1328914 * powerpc/perf: Define perf_event_print_debug() to print PMU register values - LP: #1328914 * powerpc: Add a cpu feature CPU_FTR_PMAO_BUG - LP: #1328914 * powerpc/perf: Add lost exception workaround - LP: #1328914 * powerpc/perf: Reject EBB events which specify a sample_type - LP: #1328914 * powerpc/perf: Clean up the EBB hash defines a little - LP: #1328914 * powerpc/perf: Avoid mutating event in power8_get_constraint() - LP: #1328914 * powerpc/perf: Add BHRB constraint and IFM MMCRA handling for EBB - LP: #1328914 * powerpc/perf: Enable BHRB access for EBB events - LP: #1328914 * powerpc/perf: Fix handling of L3 events with bank == 1 - LP: #1328914 * Bluetooth: Add support for Intel Bluetooth device [8087:0a2a] - LP: #1329184 * iwlwifi: mvm: disable beacon filtering - LP: #1293569 * SUNRPC: Ensure that call_connect times out correctly - LP: #1322407 * SUNRPC: Ensure call_connect_status() deals correctly with SOFTCONN tasks - LP: #1322407 * bitops: Fix signedness of compile-time hweight implementations - LP: #1321791 * cpumask.h: silence warning with -Wsign-compare - LP: #1321791 * fbdev/fb.h: silence warning with -Wsign-compare - LP: #1321791 * rtlwifi: make MSI support a module parameter - LP: #1296591 * rtlwifi: rtl8188ee: add msi module parameter - LP: #1296591 * rtlwifi: rtl8723be: add msi module parameter - LP: #1296591 * net: avoid dependency of net_get_random_once on nop patching - LP: #1330671 * x86-64, modify_ldt: Make support for 16-bit segments a runtime option - LP: #1328965 * ALSA: usb-audio: Prevent printk ratelimiting from spamming kernel log while DEBUG not defined
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- trusty' to 'verification-done-trusty'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
I have been running this for a few hours and it seems to be working ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
** Branch linked: lp:~ubuntu-branches/ubuntu/utopic/linux-flo/utopic- proposed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
** Changed in: linux (Ubuntu Trusty) Status: Confirmed = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Fix Committed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
John, are there any plans to SRU this to Trusty? Thanks -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Confirmed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
When this fixed in 14.04 Trusty Tahr for 14.04.1 (24 July)? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Confirmed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
This bug was fixed in the package linux - 3.15.0-4.8 --- linux (3.15.0-4.8) utopic; urgency=low [ Andy Whitcroft ] * Release Tracking Bug - LP: #1324107 * [Config] enable SECURITY_APPARMOR_UNCONFINED_INIT [ Javier Martinez Canillas ] * SAUCE: (no-up) apparmor: fix bug that constantly spam the console - LP: #1323526 [ John Johansen ] * SAUCE: (no-up) apparmor: Sync to apparmor3 - alpha6 snapshot - LP: #1323528 * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message - LP: #1308761 * SAUCE: (no-up) apparmor: fix refcount bug in apparmor pivotroot - LP: #1308765 * SAUCE: (no-up): apparmor: fix apparmor refcount bug in apparmor_kill - LP: #1308764 * SAUCE: (no-up): apparmor: use custom write_is_locked macro - LP: #1323530 [ Kamal Mostafa ] * [Config] add debian/gbp.conf [ Tim Gardner ] * [Config] CONFIG_SATA_AHCI=m for ppc64el - LP: #1323980 -- Andy Whitcroft a...@canonical.com Wed, 28 May 2014 12:47:17 +0100 ** Changed in: linux (Ubuntu Utopic) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Fix Released Status in “linux” source package in Trusty: Confirmed Status in “linux” source package in Utopic: Fix Released Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help :
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
** Also affects: linux (Ubuntu Utopic) Importance: Undecided Assignee: John Johansen (jjohansen) Status: Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: Confirmed Status in “linux” source package in Utopic: Confirmed Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 5 05:16:45 cormac kernel: [66784.479855] [8130e92c] apparmor_unix_may_send+0x16c/0x180 Apr 5 05:16:45 cormac kernel: [66784.479859] [812cf446] security_unix_may_send+0x16/0x20 Apr 5 05:16:45 cormac kernel: [66784.479863] [816b1435] unix_dgram_sendmsg+0x2a5/0x620 Apr 5 05:16:45 cormac kernel: [66784.479868] [81601f3b] sock_sendmsg+0x8b/0xc0 Apr 5 05:16:45 cormac kernel: [66784.479872] [8104f28f] ? kvm_clock_read+0x1f/0x30 Apr 5 05:16:45 cormac kernel: [66784.479875] [816020e1] SYSC_sendto+0x121/0x1c0 Apr 5 05:16:45 cormac kernel: [66784.479901] [8109dd74] ? vtime_account_user+0x54/0x60 Apr 5 05:16:45 cormac kernel: [66784.479907] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 5 05:16:45 cormac kernel: [66784.479909] [81602bee] SyS_sendto+0xe/0x10 Apr 5 05:16:45 cormac kernel: [66784.479913] [817254ff] tracesys+0xe1/0xe6 Apr 5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
Hi all, here i have the same problem [2559611.578826] [ cut here ] [2559611.578832] WARNING: CPU: 0 PID: 18649 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() [2559611.578835] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): [2559611.578837] Modules linked in: btrfs(F) ufs(F) qnx4(F) hfsplus(F) hfs(F) minix(F) ntfs(F) msdos(F) jfs(F) xfs(F) libcrc32c(F) dm_crypt lrw gf128mul glue_helper ablk_helper cryptd aes_x86_64 xt_conntrack ipt_MASQUERADE iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp ip6table_filter ip6_tables iptable_filter ip_tables x_tables gpio_ich coretemp kvm_intel kvm psmouse serio_raw joydev lp lpc_ich parport i3200_edac mac_hid edac_core raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx hid_generic xor raid6_pq ses enclosure usbhid raid1 e1000e hid raid0 ahci ptp multipath floppy e1000 usb_storage libahci pps_core linear [2559611.578902] CPU: 0 PID: 18649 Comm: dhcpd Tainted: GF W I 3.13.0-24-generic #46-Ubuntu [2559611.578904] Hardware name: Intel Corporation S3210SH/S3210SH, BIOS S3200X38.86B.00.00.0042.042820081723 04/28/2008 [2559611.578907] 0009 8800d83d9bd0 81715a64 8800d83d9c18 [2559611.578912] 8800d83d9c08 810676bd 88011b00c430 8801190f9b80 [2559611.578917] 8800362e6ff0 880119182800 8800cb0c2fe0 8800d83d9c68 [2559611.578921] Call Trace: [2559611.578926] [81715a64] dump_stack+0x45/0x56 [2559611.578931] [810676bd] warn_slowpath_common+0x7d/0xa0 [2559611.578935] [8106772c] warn_slowpath_fmt+0x4c/0x50 [2559611.578940] [8130ed5c] apparmor_unix_may_send+0x16c/0x180 [2559611.578944] [812cf876] security_unix_may_send+0x16/0x20 [2559611.578948] [816b2575] unix_dgram_sendmsg+0x2a5/0x620 [2559611.578953] [816024eb] sock_sendmsg+0x8b/0xc0 [2559611.578958] [8109df6d] ? vtime_common_task_switch+0x3d/0x40 [2559611.578962] [81719a11] ? __schedule+0x381/0x7d0 [2559611.578967] [8101b763] ? native_sched_clock+0x13/0x80 [2559611.578971] [81602691] SYSC_sendto+0x121/0x1c0 [2559611.578976] [8109dd84] ? vtime_account_user+0x54/0x60 [2559611.578980] [81020d35] ? syscall_trace_enter+0x145/0x250 [2559611.578985] [8160319e] SyS_sendto+0xe/0x10 [2559611.578989] [8172663f] tracesys+0xe1/0xe6 [2559611.578992] ---[ end trace 4a4dfa3d4cf5d4b7 ]--- -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1308761 Title: apparmor spams log with warning message Status in “linux” package in Ubuntu: Confirmed Status in “linux” source package in Trusty: Confirmed Bug description: The apparmor kernel module will spam the dmesg log with a stack trace and warning when the label on a unix socket does not match the label on the task sending the message. This happens when a socket is delegated to another task Example Message in the log Apr 5 05:16:45 cormac kernel: [66784.479777] [ cut here ] Apr 5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt i2c_piix4 floppy Apr 5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd Tainted: GW3.13.0-22-generic #44-Ubuntu Apr 5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Apr 5 05:16:45 cormac kernel: [66784.479832] 0009 8800d5d25bd0 81714914 8800d5d25c18 Apr 5 05:16:45 cormac kernel: [66784.479834] 8800d5d25c08 810676bd 8800d67a3c30 880138147b80 Apr 5 05:16:45 cormac kernel: [66784.479836] 88003681cb40 880138147680 8801384217f0 8800d5d25c68 Apr 5 05:16:45 cormac kernel: [66784.479839] Call Trace: Apr 5 05:16:45 cormac kernel: [66784.479846] [81714914] dump_stack+0x45/0x56 Apr 5 05:16:45 cormac kernel: [66784.479851] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 5 05:16:45 cormac kernel: [66784.479853]
[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message
For me I have a similar issues... the log says: Apr 17 02:29:36 trusty-01 kernel: [70827.909934] [ cut here ] Apr 17 02:29:36 trusty-01 kernel: [70827.909960] WARNING: CPU: 0 PID: 2985 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 17 02:29:36 trusty-01 kernel: [70827.909964] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 17 02:29:36 trusty-01 kernel: [70827.909968] Modules linked in: kvm_intel kvm cirrus snd_hda_intel ttm snd_hda_codec drm_kms_helper snd_hwdep psmouse serio_raw snd_pcm drm snd_page_alloc snd_timer syscopyarea snd soundcore sysfillrect sysimgblt i2c_piix4 lp parport mac_hid 8139too 8139cp mii floppy Apr 17 02:29:36 trusty-01 kernel: [70827.910014] CPU: 0 PID: 2985 Comm: dhcpd Tainted: GW3.13.0-24-generic #46-Ubuntu Apr 17 02:29:36 trusty-01 kernel: [70827.910018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Apr 17 02:29:36 trusty-01 kernel: [70827.910022] 0009 88063bd0 81715a64 88063c18 Apr 17 02:29:36 trusty-01 kernel: [70827.910030] 88063c08 810676bd 88003e00a430 88003d618000 Apr 17 02:29:36 trusty-01 kernel: [70827.910036] 88003b33f010 88003d70f400 88003c1a8000 88063c68 Apr 17 02:29:36 trusty-01 kernel: [70827.910043] Call Trace: Apr 17 02:29:36 trusty-01 kernel: [70827.910056] [81715a64] dump_stack+0x45/0x56 Apr 17 02:29:36 trusty-01 kernel: [70827.910066] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 17 02:29:36 trusty-01 kernel: [70827.910072] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 17 02:29:36 trusty-01 kernel: [70827.910080] [8130ed5c] apparmor_unix_may_send+0x16c/0x180 Apr 17 02:29:36 trusty-01 kernel: [70827.910089] [812cf876] security_unix_may_send+0x16/0x20 Apr 17 02:29:36 trusty-01 kernel: [70827.910097] [816b2575] unix_dgram_sendmsg+0x2a5/0x620 Apr 17 02:29:36 trusty-01 kernel: [70827.910108] [816024eb] sock_sendmsg+0x8b/0xc0 Apr 17 02:29:36 trusty-01 kernel: [70827.910116] [81602691] SYSC_sendto+0x121/0x1c0 Apr 17 02:29:36 trusty-01 kernel: [70827.910125] [8109dd84] ? vtime_account_user+0x54/0x60 Apr 17 02:29:36 trusty-01 kernel: [70827.910137] [81020d35] ? syscall_trace_enter+0x145/0x250 Apr 17 02:29:36 trusty-01 kernel: [70827.910145] [8160319e] SyS_sendto+0xe/0x10 Apr 17 02:29:36 trusty-01 kernel: [70827.910154] [8172663f] tracesys+0xe1/0xe6 Apr 17 02:29:36 trusty-01 kernel: [70827.910158] ---[ end trace 0b1a05a3a90a9dc7 ]--- Apr 17 02:29:46 trusty-01 kernel: [70838.210778] [ cut here ] Apr 17 02:29:46 trusty-01 kernel: [70838.210791] WARNING: CPU: 0 PID: 2985 at /build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 apparmor_unix_may_send+0x16c/0x180() Apr 17 02:29:46 trusty-01 kernel: [70838.210793] AppArmor WARN apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): Apr 17 02:29:46 trusty-01 kernel: [70838.210794] Modules linked in: kvm_intel kvm cirrus snd_hda_intel ttm snd_hda_codec drm_kms_helper snd_hwdep psmouse serio_raw snd_pcm drm snd_page_alloc snd_timer syscopyarea snd soundcore sysfillrect sysimgblt i2c_piix4 lp parport mac_hid 8139too 8139cp mii floppy Apr 17 02:29:46 trusty-01 kernel: [70838.210817] CPU: 0 PID: 2985 Comm: dhcpd Tainted: GW3.13.0-24-generic #46-Ubuntu Apr 17 02:29:46 trusty-01 kernel: [70838.210818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Apr 17 02:29:46 trusty-01 kernel: [70838.210820] 0009 88063bd0 81715a64 88063c18 Apr 17 02:29:46 trusty-01 kernel: [70838.210823] 88063c08 810676bd 88003e00a430 88003d618000 Apr 17 02:29:46 trusty-01 kernel: [70838.210826] 88003b33f010 88003d70f400 88003c1a8000 88063c68 Apr 17 02:29:46 trusty-01 kernel: [70838.210829] Call Trace: Apr 17 02:29:46 trusty-01 kernel: [70838.210835] [81715a64] dump_stack+0x45/0x56 Apr 17 02:29:46 trusty-01 kernel: [70838.210840] [810676bd] warn_slowpath_common+0x7d/0xa0 Apr 17 02:29:46 trusty-01 kernel: [70838.210842] [8106772c] warn_slowpath_fmt+0x4c/0x50 Apr 17 02:29:46 trusty-01 kernel: [70838.210846] [8130ed5c] apparmor_unix_may_send+0x16c/0x180 Apr 17 02:29:46 trusty-01 kernel: [70838.210850] [812cf876] security_unix_may_send+0x16/0x20 Apr 17 02:29:46 trusty-01 kernel: [70838.210854] [816b2575] unix_dgram_sendmsg+0x2a5/0x620 Apr 17 02:29:46 trusty-01 kernel: [70838.210860] [816024eb] sock_sendmsg+0x8b/0xc0 Apr 17 02:29:46 trusty-01 kernel: [70838.210863] [81602691] SYSC_sendto+0x121/0x1c0 Apr 17 02:29:46 trusty-01 kernel: [70838.210867] [8109dd84] ? vtime_account_user+0x54/0x60 Apr 17 02:29:46 trusty-01 kernel: [70838.210873]