[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
Ubuntu 23.10 (Mantic Minotaur) has reached end of life, so this bug will not be fixed for that specific release. ** Changed in: linux (Ubuntu Mantic) Status: Fix Committed => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Fix Released Status in linux source package in Mantic: Won't Fix Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic kernel: aa_path_perm+0xf1/0x1c0 Sep 27 22:48:14 ubuntu-mantic kernel: apparmor_file_open+0x1bb/0x2e0 Sep 27 22:48:14 ubuntu-mantic kernel: security_file_open+0x2e/0x60 Sep 27 22:48:14 ubuntu-mantic kernel: do_dentry_open+0x10d/0x530 Sep 27 22:48:14 ubuntu-mantic kernel: vfs_open+0x33/0x50 Sep 27 22:48:14 ubuntu-mantic kernel: do_open+0x2ed/0x470 Sep 27 22:48:14 ubuntu-mantic kernel: ? path_init+0x59/0x3d0 Sep 27 22:48:14 ubuntu-mantic kernel: path_openat+0x135/0x2d0 Sep 27 22:48:14 ubuntu-mantic kernel: ? _raw_spin_unlock+0xe/0x40 Sep 27 22:48:14 ubuntu-mantic kernel: do_
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
** Changed in: linux (Ubuntu) Status: Incomplete => Invalid ** Changed in: linux (Ubuntu Mantic) Status: Incomplete => Fix Committed ** Changed in: linux (Ubuntu Mantic) Assignee: (unassigned) => John Johansen (jjohansen) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Invalid Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic kernel: aa_path_perm+0xf1/0x1c0 Sep 27 22:48:14 ubuntu-mantic kernel: apparmor_file_open+0x1bb/0x2e0 Sep 27 22:48:14 ubuntu-mantic kernel: security_file_open+0x2e/0x60 Sep 27 22:48:14 ubuntu-mantic kernel: do_dentry_open+0x10d/0x530 Sep 27 22:48:14 ubuntu-mantic kernel: vfs_open+0x33/0x50 Sep 27 22:48:14 ubuntu-mantic kernel: do_open+0x2ed/0x470 Sep 27 22:48:14 ubuntu-mantic kernel: ? path_init+0x59/0x3d0 Sep 27 22:48:14 ubuntu-mantic kernel: path_openat+0x135/0x2d0 Sep 27 22:48:14 ubuntu-mantic kernel: ? _raw_spin_unlock+0xe/
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
This bug is awaiting verification that the linux/6.5.0-12.12 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-mantic-linux' to 'verification-done-mantic-linux'. If the problem still exists, change the tag 'verification-needed-mantic- linux' to 'verification-failed-mantic-linux'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-mantic-linux-v2 verification-needed-mantic-linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Invalid Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic kernel: aa_path_perm+0xf1/0x1c0 Sep 27 22:48:14 ubuntu-mantic kernel:
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
Tested and the assert is now gone. ** Tags removed: verification-needed-mantic-linux ** Tags added: verification-done-mantic-linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Invalid Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic kernel: aa_path_perm+0xf1/0x1c0 Sep 27 22:48:14 ubuntu-mantic kernel: apparmor_file_open+0x1bb/0x2e0 Sep 27 22:48:14 ubuntu-mantic kernel: security_file_open+0x2e/0x60 Sep 27 22:48:14 ubuntu-mantic kernel: do_dentry_open+0x10d/0x530 Sep 27 22:48:14 ubuntu-mantic kernel: vfs_open+0x33/0x50 Sep 27 22:48:14 ubuntu-mantic kernel: do_open+0x2ed/0x470 Sep 27 22:48:14 ubuntu-mantic kernel: ? path_init+0x59/0x3d0 Sep 27 22:48:14 ubuntu-mantic kernel: path_openat+0x135/0x2d0 Sep 27 22:48:14 ubuntu-mantic kernel: ? _raw_spin_unlock+0xe/0x40 Sep 27 22:48:14 ubuntu-mantic kernel: do_filp_open+0xaf/0x170 Sep 27 22:48:14 ubuntu-mantic kernel:
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
This bug was fixed in the package linux - 6.6.0-14.14 --- linux (6.6.0-14.14) noble; urgency=medium * noble/linux: 6.6.0-14.14 -proposed tracker (LP: #2045243) * Noble update: v6.6.3 upstream stable release (LP: #2045244) - locking/ww_mutex/test: Fix potential workqueue corruption - btrfs: abort transaction on generation mismatch when marking eb as dirty - lib/generic-radix-tree.c: Don't overflow in peek() - x86/retpoline: Make sure there are no unconverted return thunks due to KCSAN - perf/core: Bail out early if the request AUX area is out of bound - srcu: Fix srcu_struct node grpmask overflow on 64-bit systems - selftests/lkdtm: Disable CONFIG_UBSAN_TRAP in test config - clocksource/drivers/timer-imx-gpt: Fix potential memory leak - clocksource/drivers/timer-atmel-tcb: Fix initialization on SAM9 hardware - srcu: Only accelerate on enqueue time - smp,csd: Throw an error if a CSD lock is stuck for too long - cpu/hotplug: Don't offline the last non-isolated CPU - workqueue: Provide one lock class key per work_on_cpu() callsite - x86/mm: Drop the 4 MB restriction on minimal NUMA node memory size - wifi: plfxlc: fix clang-specific fortify warning - wifi: ath12k: Ignore fragments from uninitialized peer in dp - wifi: mac80211_hwsim: fix clang-specific fortify warning - wifi: mac80211: don't return unset power in ieee80211_get_tx_power() - atl1c: Work around the DMA RX overflow issue - bpf: Detect IP == ksym.end as part of BPF program - wifi: ath9k: fix clang-specific fortify warnings - wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats() - wifi: ath10k: fix clang-specific fortify warning - wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps() - ACPI: APEI: Fix AER info corruption when error status data has multiple sections - net: sfp: add quirk for Fiberstone GPON-ONU-34-20BI - wifi: mt76: mt7921e: Support MT7992 IP in Xiaomi Redmibook 15 Pro (2023) - wifi: mt76: fix clang-specific fortify warnings - net: annotate data-races around sk->sk_tx_queue_mapping - net: annotate data-races around sk->sk_dst_pending_confirm - wifi: ath12k: mhi: fix potential memory leak in ath12k_mhi_register() - wifi: ath10k: Don't touch the CE interrupt registers after power up - net: sfp: add quirk for FS's 2.5G copper SFP - vsock: read from socket's error queue - bpf: Ensure proper register state printing for cond jumps - wifi: iwlwifi: mvm: fix size check for fw_link_id - Bluetooth: btusb: Add date->evt_skb is NULL check - Bluetooth: Fix double free in hci_conn_cleanup - ACPI: EC: Add quirk for HP 250 G7 Notebook PC - tsnep: Fix tsnep_request_irq() format-overflow warning - gpiolib: acpi: Add a ignore interrupt quirk for Peaq C1010 - platform/chrome: kunit: initialize lock for fake ec_dev - of: address: Fix address translation when address-size is greater than 2 - platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e - drm/gma500: Fix call trace when psb_gem_mm_init() fails - drm/amdkfd: ratelimited SQ interrupt messages - drm/komeda: drop all currently held locks if deadlock happens - drm/amd/display: Blank phantom OTG before enabling - drm/amd/display: Don't lock phantom pipe on disabling - drm/amd/display: add seamless pipe topology transition check - drm/edid: Fixup h/vsync_end instead of h/vtotal - md: don't rely on 'mddev->pers' to be set in mddev_suspend() - drm/amdgpu: not to save bo in the case of RAS err_event_athub - drm/amdkfd: Fix a race condition of vram buffer unref in svm code - drm/amdgpu: update retry times for psp vmbx wait - drm/amd: Update `update_pcie_parameters` functions to use uint8_t arguments - drm/amd/display: use full update for clip size increase of large plane source - string.h: add array-wrappers for (v)memdup_user() - kernel: kexec: copy user-array safely - kernel: watch_queue: copy user-array safely - drm_lease.c: copy user-array safely - drm: vmwgfx_surface.c: copy user-array safely - drm/msm/dp: skip validity check for DP CTS EDID checksum - drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 - drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga - drm/amdgpu: Fix potential null pointer derefernce - drm/panel: fix a possible null pointer dereference - drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference - drm/radeon: fix a possible null pointer dereference - drm/amdgpu/vkms: fix a possible null pointer dereference - drm/panel: st7703: Pick different reset sequence - drm/amdkfd: Fix shift out-of-bounds issue - drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL - drm/amd: Disable PP_PCIE_DPM_MASK when dynamic speed switching not supported - drm/amd/d
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
This bug is awaiting verification that the linux-lowlatency- hwe-6.5/6.5.0-14.14.1~22.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux- lowlatency-hwe-6.5' to 'verification-done-jammy-linux-lowlatency- hwe-6.5'. If the problem still exists, change the tag 'verification- needed-jammy-linux-lowlatency-hwe-6.5' to 'verification-failed-jammy- linux-lowlatency-hwe-6.5'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-jammy-linux-lowlatency-hwe-6.5-v2 verification-needed-jammy-linux-lowlatency-hwe-6.5 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Fix Released Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-m
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
Verification passed for linux azure. I ran the AppArmor QA Regression Tests [1] and the specific prompting tests [2] which were able to reproduce the issue before. georgia@sec-mantic-amd64:~$ uname -a Linux sec-mantic-amd64 6.5.0-1010-azure #10-Ubuntu SMP Mon Nov 20 20:14:42 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux georgia@sec-mantic-amd64:~/apparmor/tests/regression/apparmor$ sudo ./prompt.sh xpass: PROMPT (allow (rule link file l)) - root xpass: PROMPT (allow (flag link file l)) - root xpass: PROMPT (allow (rule mmap_exec file rwm)) - root xpass: PROMPT (allow (flag mmap_exec file rwm)) - root xpass: PROMPT (allow (rule lock file rwk)) - root xpass: PROMPT (allow (flag lock file rwk)) - root xpass: PROMPT (allow (rule exec file rix)) - root xpass: PROMPT (allow (flag exec file rix)) - root xpass: PROMPT (allow (rule exec file ux)) - root xpass: PROMPT (allow (flag exec file ux)) - root georgia@sec-mantic-amd64:~/qrt-test-apparmor$ sudo ./test-apparmor.py . -- Ran 62 tests in 1300.394s OK (skipped=3) [1] https://launchpad.net/qa-regression-testing [2] https://gitlab.com/georgiag/apparmor/-/tree/prompt-regression-tests ** Tags removed: verification-needed-mantic-linux-azure ** Tags added: verification-done-mantic-linux-azure -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Fix Released Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
Verification passed for linux gcp. I ran the AppArmor QA Regression Tests [1] and the specific prompting tests [2] which were able to reproduce the issue before. georgia@sec-mantic-amd64:~$ uname -a Linux sec-mantic-amd64 6.5.0-1010-gcp #10-Ubuntu SMP Fri Nov 17 21:33:36 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux georgia@sec-mantic-amd64:~/apparmor/tests/regression/apparmor$ sudo ./prompt.sh xpass: PROMPT (allow (rule link file l)) - root xpass: PROMPT (allow (flag link file l)) - root xpass: PROMPT (allow (rule mmap_exec file rwm)) - root xpass: PROMPT (allow (flag mmap_exec file rwm)) - root xpass: PROMPT (allow (rule lock file rwk)) - root xpass: PROMPT (allow (flag lock file rwk)) - root xpass: PROMPT (allow (rule exec file rix)) - root xpass: PROMPT (allow (flag exec file rix)) - root xpass: PROMPT (allow (rule exec file ux)) - root xpass: PROMPT (allow (flag exec file ux)) - root georgia@sec-mantic-amd64:~/qrt-test-apparmor$ sudo ./test-apparmor.py . -- Ran 62 tests in 1325.124s OK (skipped=3) [1] https://launchpad.net/qa-regression-testing [2] https://gitlab.com/georgiag/apparmor/-/tree/prompt-regression-tests ** Tags removed: verification-needed-mantic-linux-gcp ** Tags added: verification-done-mantic-linux-gcp -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Fix Released Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_fi
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
Verification passed for jammy-linux-hwe-6.5. I ran the AppArmor QA Regression Tests [1] and the specific prompting tests [2] which were able to reproduce the issue before. georgia@sec-jammy-amd64:~$ uname -a Linux sec-jammy-amd64 6.5.0-14-generic #14~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Mon Nov 20 18:15:30 UTC 2 x86_64 x86_64 x86_64 GNU/Linux georgia@sec-jammy-amd64:~/apparmor/tests/regression/apparmor$ sudo ./prompt.sh xpass: PROMPT (allow (rule link file l)) - root xpass: PROMPT (allow (flag link file l)) - root xpass: PROMPT (allow (rule mmap_exec file rwm)) - root xpass: PROMPT (allow (flag mmap_exec file rwm)) - root xpass: PROMPT (allow (rule lock file rwk)) - root xpass: PROMPT (allow (flag lock file rwk)) - root xpass: PROMPT (allow (rule exec file rix)) - root xpass: PROMPT (allow (flag exec file rix)) - root xpass: PROMPT (allow (rule exec file ux)) - root xpass: PROMPT (allow (flag exec file ux)) - root georgia@sec-jammy-amd64:~/qrt-test-apparmor$ sudo ./test-apparmor.py . -- Ran 62 tests in 1360.734s OK (skipped=2) [1] https://launchpad.net/qa-regression-testing [2] https://gitlab.com/georgiag/apparmor/-/tree/prompt-regression-tests ** Tags removed: verification-needed-jammy-linux-hwe-6.5 ** Tags added: verification-done-jammy-linux-hwe-6.5 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Fix Released Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 u
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
Verification passed for jammy-linux-lowlatency-hwe-6.5. I ran the AppArmor QA Regression Tests [1] and the specific prompting tests [2] which were able to reproduce the issue before. georgia@sec-jammy-amd64:~$ uname -a Linux sec-jammy-amd64 6.5.0-14-lowlatency #14.1~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 22 16:24:11 UTC x86_64 x86_64 x86_64 GNU/Linux georgia@sec-jammy-amd64:~/apparmor/tests/regression/apparmor$ sudo ./prompt.sh [sudo] password for georgia: xpass: PROMPT (allow (rule link file l)) - root xpass: PROMPT (allow (flag link file l)) - root xpass: PROMPT (allow (rule mmap_exec file rwm)) - root xpass: PROMPT (allow (flag mmap_exec file rwm)) - root xpass: PROMPT (allow (rule lock file rwk)) - root xpass: PROMPT (allow (flag lock file rwk)) - root xpass: PROMPT (allow (rule exec file rix)) - root xpass: PROMPT (allow (flag exec file rix)) - root xpass: PROMPT (allow (rule exec file ux)) - root xpass: PROMPT (allow (flag exec file ux)) - root georgia@sec-jammy-amd64:~/qrt-test-apparmor$ sudo ./test-apparmor.py . -- Ran 62 tests in 1366.317s OK (skipped=2) [1] https://launchpad.net/qa-regression-testing [2] https://gitlab.com/georgiag/apparmor/-/tree/prompt-regression-tests ** Tags removed: verification-needed-jammy-linux-lowlatency-hwe-6.5 ** Tags added: verification-done-jammy-linux-lowlatency-hwe-6.5 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Fix Released Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
Verification passed for jammy-linux-nvidia-6.5. I ran the AppArmor QA Regression Tests [1] and the specific prompting tests [2] which were able to reproduce the issue before. georgia@sec-jammy-amd64:~$ uname -a Linux sec-jammy-amd64 6.5.0-1007-nvidia #7-Ubuntu SMP PREEMPT_DYNAMIC Wed Dec 6 01:27:37 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux georgia@sec-jammy-amd64:~/apparmor/tests/regression/apparmor$ sudo ./prompt.sh xpass: PROMPT (allow (rule link file l)) - root xpass: PROMPT (allow (flag link file l)) - root xpass: PROMPT (allow (rule mmap_exec file rwm)) - root xpass: PROMPT (allow (flag mmap_exec file rwm)) - root xpass: PROMPT (allow (rule lock file rwk)) - root xpass: PROMPT (allow (flag lock file rwk)) - root xpass: PROMPT (allow (rule exec file rix)) - root xpass: PROMPT (allow (flag exec file rix)) - root xpass: PROMPT (allow (rule exec file ux)) - root xpass: PROMPT (allow (flag exec file ux)) - root georgia@sec-jammy-amd64:~/qrt-test-apparmor$ sudo ./test-apparmor.py . -- Ran 62 tests in 1435.853s OK (skipped=2) [1] https://launchpad.net/qa-regression-testing [2] https://gitlab.com/georgiag/apparmor/-/tree/prompt-regression-tests ** Tags removed: verification-needed-jammy-linux-nvidia-6.5 ** Tags added: verification-done-jammy-linux-nvidia-6.5 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Fix Released Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:1
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
Verification passed for mantic-linux-laptop. I ran the AppArmor QA Regression Tests [1] and the specific prompting tests [2] which were able to reproduce the issue before. The QA Regression Tests that failed were due to a timeout because I'm emulating in my machine, but they pass when the timeout is increased. georgia@sec-mantic-arm64:~$ uname -a Linux sec-mantic-arm64 6.5.0-1007-laptop #10-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 22 20:27:28 UTC 2023 aarch64 aarch64 aarch64 GNU/Linux georgia@sec-mantic-arm64:~/apparmor/tests/regression/apparmor$ sudo ./prompt.sh xpass: PROMPT (allow (rule link file l)) - root xpass: PROMPT (allow (flag link file l)) - root xpass: PROMPT (allow (rule mmap_exec file rwm)) - root xpass: PROMPT (allow (flag mmap_exec file rwm)) - root xpass: PROMPT (allow (rule lock file rwk)) - root xpass: PROMPT (allow (flag lock file rwk)) - root xpass: PROMPT (allow (rule exec file rix)) - root xpass: PROMPT (allow (flag exec file rix)) - root xpass: PROMPT (allow (rule exec file ux)) - root xpass: PROMPT (allow (flag exec file ux)) - root georgia@sec-mantic-arm64:~/qrt-test-apparmor$ sudo ./test-apparmor.py ERROR: test_dbus (__main__.ApparmorTest.test_dbus) Test dbus apparmor activation from dbus-tests -- Traceback (most recent call last): File "/home/georgia/qrt-test-apparmor/./test-apparmor.py", line 719, in test_dbus rc, report = testlib.cmd(['/usr/lib/dbus-1.0/installed-tests/dbus/test-apparmor-activation.sh'], ^^^ File "/home/georgia/qrt-test-apparmor/testlib.py", line 471, in cmd out, outerr = sp.communicate(input, timeout=timeout) ^^ File "/usr/lib/python3.11/subprocess.py", line 1209, in communicate stdout, stderr = self._communicate(input, endtime, timeout) ^^ File "/usr/lib/python3.11/subprocess.py", line 2109, in _communicate self._check_timeout(endtime, orig_timeout, stdout, stderr) File "/usr/lib/python3.11/subprocess.py", line 1253, in _check_timeout raise TimeoutExpired( subprocess.TimeoutExpired: Command '['/usr/lib/dbus-1.0/installed-tests/dbus/test-apparmor-activation.sh']' timed out after 5 seconds - running attach_disconnected Fatal Error (unix_fd_server): Unable to run test sub-executable PASSED: aa_exec access at_secure introspect capabilities changeprofile onexec changehat changehat_fork changehat_misc chdir clone coredump deleted e2e environ exec exec_qual fchdir fd_inheritance fork i18n link link_subset mkdir mmap mount mult_mount named_pipe namespaces net_raw open openat pipe pivot_root posix_ipc ptrace pwrite query_label regex rename readdir rw socketpair swap sd_flags setattr symlink syscall sysv_ipc tcp unix_fd_server unix_socket_pathname unix_socket_abstract unix_socket_unnamed unix_socket_autobind unlink userns xattrs xattrs_profile longpath nfs dbus_eavesdrop dbus_message dbus_service dbus_unrequested_reply io_uring aa_policy_cache exec_stack nnp stackonexec stackprofile FAILED: attach_disconnected make: *** [Makefile:402: alltests] Error 1 - ERROR: test_0 (__main__.TestLogprof.test_0) test 'ping' -- Traceback (most recent call last): File "/tmp/testlib2jc8hiih/source/mantic/apparmor-4.0.0~alpha2/utils/test/common_test.py", line 90, in stub_test self._run_test(test_data, expected) File "/tmp/testlib2jc8hiih/source/mantic/apparmor-4.0.0~alpha2/utils/test/test-logprof.py", line 99, in _run_test self.process.wait(timeout=0.2) File "/usr/lib/python3.11/subprocess.py", line 1264, in wait return self._wait(timeout=timeout) ^^^ File "/usr/lib/python3.11/subprocess.py", line 2038, in _wait raise TimeoutExpired(self.args, timeout) subprocess.TimeoutExpired: Command '['/usr/bin/python3', '../aa-logprof', '--json', '--configdir', './', '-f', './logprof/ping.auditlog', '-d', '/tmp/aa-test-tkkg1ex3/profiles', '--no-check-mountpoint']' timed out after 0.2 seconds -- Ran 62 tests in 43542.817s FAILED (failures=3, errors=1, skipped=3) Rerunning failing tests increasing the timeout georgia@sec-mantic-arm64:~/qrt-test-apparmor$ sudo ./test-apparmor.py ApparmorTest.test_dbus Skipping private tests . -- Ran 1 test in 19.786s OK georgia@sec-mantic-arm64:~/apparmor-4.0.0~alpha2/tests/regression/apparmor$ sudo bash ./attach_disconnected.sh georgia@sec-mantic-arm64:~/apparmor-4.0.0~alpha2/tests/regression/apparmor$ echo $? 0 georgia@sec-mantic-arm
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
This bug is awaiting verification that the linux-azure/6.5.0-1010.10 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-mantic-linux-azure' to 'verification-done- mantic-linux-azure'. If the problem still exists, change the tag 'verification-needed-mantic-linux-azure' to 'verification-failed-mantic- linux-azure'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-mantic-linux-azure-v2 verification-needed-mantic-linux-azure -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Invalid Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic kernel: aa_path_perm+0xf1/0
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
This bug is awaiting verification that the linux- hwe-6.5/6.5.0-14.14~22.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux- hwe-6.5' to 'verification-done-jammy-linux-hwe-6.5'. If the problem still exists, change the tag 'verification-needed-jammy-linux-hwe-6.5' to 'verification-failed-jammy-linux-hwe-6.5'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-jammy-linux-hwe-6.5-v2 verification-needed-jammy-linux-hwe-6.5 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Invalid Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic kernel: aa_pa
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
This bug is awaiting verification that the linux-laptop/6.5.0-1007.10 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-mantic-linux-laptop' to 'verification-done- mantic-linux-laptop'. If the problem still exists, change the tag 'verification-needed-mantic-linux-laptop' to 'verification-failed- mantic-linux-laptop'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-mantic-linux-laptop-v2 verification-needed-mantic-linux-laptop -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Invalid Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic kernel: aa_path_perm
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
This bug is awaiting verification that the linux-gcp/6.5.0-1010.10 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-mantic-linux-gcp' to 'verification-done-mantic- linux-gcp'. If the problem still exists, change the tag 'verification- needed-mantic-linux-gcp' to 'verification-failed-mantic-linux-gcp'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-mantic-linux-gcp-v2 verification-needed-mantic-linux-gcp -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Invalid Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic kernel: aa_path_perm+0xf1/0x1c0 Sep 27
[Kernel-packages] [Bug 2040192] Re: AppArmor spams kernel log with assert when auditing
This bug is awaiting verification that the linux-nvidia-6.5/6.5.0-1007.7 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-nvidia-6.5' to 'verification-done- jammy-linux-nvidia-6.5'. If the problem still exists, change the tag 'verification-needed-jammy-linux-nvidia-6.5' to 'verification-failed- jammy-linux-nvidia-6.5'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-jammy-linux-nvidia-6.5-v2 verification-needed-jammy-linux-nvidia-6.5 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2040192 Title: AppArmor spams kernel log with assert when auditing Status in linux package in Ubuntu: Invalid Status in linux source package in Mantic: Fix Committed Bug description: A reply to a prompt request that denies all permissions requested will throw the following warning, because the auditing code does not expect the request field to be empty when generating the audit message. Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotification:{MsgHeader:{Length:0 Version:0} NotificationType:APPARMOR_NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4} Sep 27 22:48:14 ubuntu-mantic kernel: [ cut here ] Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)): Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/file.c:268 aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_transport virtio_input vmw_vsock_virtio_transport_common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5-Ubuntu Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022 Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5 Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:b66a82b57968 EFLAGS: 00010246 Sep 27 22:48:14 ubuntu-mantic kernel: RAX: RBX: b66a82b57b24 RCX: Sep 27 22:48:14 ubuntu-mantic kernel: RDX: RSI: RDI: Sep 27 22:48:14 ubuntu-mantic kernel: RBP: b66a82b57a30 R08: R09: Sep 27 22:48:14 ubuntu-mantic kernel: R10: R11: R12: Sep 27 22:48:14 ubuntu-mantic kernel: R13: 8b160239d800 R14: b66a82b57970 R15: 0001 Sep 27 22:48:14 ubuntu-mantic kernel: FS: 7f1f7d3b3380() GS:8b17778c() knlGS: Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: ES: CR0: 80050033 Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 55d4482063f0 CR3: 000137e64000 CR4: 00750ee0 Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 5554 Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace: Sep 27 22:48:14 ubuntu-mantic kernel: Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/0x1b0 Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/0xa0 Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/0x80 Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_op+0x1b/0x20 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/0x310 Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/0x130 Sep 27 22:48:14 ubuntu-mantic