Comment 5 for bug 446164

Revision history for this message
John Dong (jdong) wrote :

This still happens and is readily reproducible in Karmic final...

http://www.epsxe.com/download.php

Unzip the Linux binary distribution and run ./epsxe, you'll see Killed on the terminal, and the backtrace looks like

[18118.395977] BUG: unable to handle kernel NULL pointer dereference at 0000000000000068
[18118.395987] IP: [<ffffffff8141c9a0>] apparmor_bprm_set_creds+0x340/0x430
[18118.396291] PGD 259c4067 PUD 5f5fe067 PMD 0
[18118.396296] Oops: 0000 [#1] SMP
[18118.396302] last sysfs file: /sys/devices/virtual/block/dm-0/uevent
[18118.396354] CPU 1
[18118.396379] Modules linked in: ecb vmblock vsock vmmemctl vmhgfs pvscsi acpiphp binfmt_misc sha256_generic cryptd aes_x86_64 aes_generic cbc snd_ens1371 gameport dm_crypt snd_ac97_codec ac97_bus snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer iptable_filter lp snd_seq_device ip_tables ppdev snd psmouse soundcore x_tables i2c_piix4 serio_raw snd_page_alloc parport_pc shpchp parport vmci vmxnet btrfs zlib_deflate crc32c libcrc32c floppy e1000 mptspi mptscsih mptbase scsi_transport_spi intel_agp
[18118.396536] Pid: 5813, comm: epsxe Not tainted 2.6.31-14-generic #48-Ubuntu VMware Virtual Platform
[18118.396539] RIP: 0010:[<ffffffff8141c9a0>] [<ffffffff8141c9a0>] apparmor_bprm_set_creds+0x340/0x430
[18118.396543] RSP: 0018:ffff88001b40bdc8 EFLAGS: 00010246
[18118.396545] RAX: 00000000fffffffe RBX: ffff88005bd6cd00 RCX: ffff88001b40bdf8
[18118.396547] RDX: ffff88003d8f9fe2 RSI: ffffffff81798480 RDI: 0000000000000004
[18118.396549] RBP: ffff88001b40be78 R08: ffffffff816e6154 R09: 00000000000000e2
[18118.396551] R10: 00000000000000f5 R11: 0000000000000000 R12: ffff88002ed43ee0
[18118.396553] R13: 0000000000000000 R14: ffff88001b40bdd8 R15: ffff88001b40be28
[18118.396569] FS: 0000000000000000(0000) GS:ffff880001a12000(0000) knlGS:0000000000000000
[18118.396571] CS: 0010 DS: 002b ES: 002b CR0: 000000008005003b
[18118.396573] CR2: 0000000000000068 CR3: 0000000031882000 CR4: 00000000000006e0
[18118.396618] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[18118.396644] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[18118.396646] Process epsxe (pid: 5813, threadinfo ffff88001b40a000, task ffff880025840000)
[18118.396648] Stack:
[18118.396649] 0000000000000000 ffff880062c07000 0000000000000000 fffffffe000000d0
[18118.396653] <0> ffffffff81723992 0000000000000000 ffff88003d8f9fe2 0000000000000000
[18118.396656] <0> 0000000000000000 0000000000000000 0000000100000000 ffff88001b40be28
[18118.396660] Call Trace:
[18118.396842] [<ffffffff8107cf19>] ? up_write+0x9/0x10
[18118.396996] [<ffffffff812201be>] security_bprm_set_creds+0xe/0x10
[18118.397091] [<ffffffff81125045>] prepare_binprm+0xb5/0x110
[18118.397165] [<ffffffff8116030c>] compat_do_execve+0x28c/0x400
[18118.397238] [<ffffffff81042ee5>] sys32_execve+0x45/0x70
[18118.397242] [<ffffffff81042cc5>] ia32_ptregs_common+0x25/0x50
[18118.397243] Code: 0f 1f 00 4c 89 fe 65 48 8b 3c 25 c0 c6 00 00 e8 d7 f6 ff ff 85 c0 89 85 6c ff ff ff 0f 85 15 fe ff ff e9 de fe ff ff 0f 1f 40 00 <41> f6 45 68 08 0f 84 eb fd ff ff 0f 1f 44 00 00 e9 d7 fd ff ff
[18118.397272] RIP [<ffffffff8141c9a0>] apparmor_bprm_set_creds+0x340/0x430
[18118.397275] RSP <ffff88001b40bdc8>
[18118.397277] CR2: 0000000000000068
[18118.397327] ---[ end trace 23e3dcee61151481 ]---