apparmor spam log with warning on non-SMP kernels
Bug #1323530 reported by
John Johansen
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux-goldfish (Ubuntu) |
Fix Released
|
Undecided
|
John Johansen | ||
Utopic |
Fix Released
|
Undecided
|
John Johansen |
Bug Description
non-smp kernels are tripping the AA_BUG(
summary: |
- apparmor spam log with warning on none SMP kernels + apparmor spam log with warning on non-SMP kernels |
description: | updated |
affects: | linux (Ubuntu Utopic) → linux-goldfish (Ubuntu Utopic) |
Changed in linux-goldfish (Ubuntu Utopic): | |
status: | Confirmed → In Progress |
To post a comment you must log in.
This bug was fixed in the package linux-goldfish - 3.4.0-3.17
---------------
linux-goldfish (3.4.0-3.17) utopic; urgency=low
[ Javier Martinez Canillas ]
* SAUCE: (no-up) apparmor: fix bug that constantly spam the console
- LP: #1323526
[ John Johansen ]
* Revert "SAUCE: (no-up) apparmor: fix backtrace on non-smp, kernels."
* Revert "SAUCE: apparmor: fix bad lock balance when introspecting
policy"
* Revert "SAUCE: apparmor: fix memleak of replacedby struct"
* Revert "SAUCE: apparmor: fix memleak of the profile hash"
* Revert "SAUCE: apparmor: allocate path lookup buffers during init"
* Revert "SAUCE: apparmor: fix unix domain sockets to be mediated on
connection"
* Revert "SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 4 snapshot"
* SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 6 snapshot
* SAUCE: (no-up) apparmor: update configs for apparmor 3 alpha 6
* SAUCE: (no-up) apparmor: fix apparmor spams log with warning message
- LP: #1308761
* SAUCE: (no-up) apparmor: fix refcount bug in apparmor pivotroot
- LP: #1308765
* SAUCE: (no-up) apparmor: fix apparmor refcount bug in apparmor_kill
- LP: #1308764
* SAUCE: (no-up) apparmor: use custom write_is_locked macro
- LP: #1323530
* SAUCE: (no-up) apparmor fix: remove unused cxt var for unix_sendmsg
* SAUCE: (no-up) apparmor: fix disconnected bind mnts reconnection
- LP: #1319984
[ Tyler Hicks ]
* [Config] CONFIG_ECRYPT_FS=y DEFAULT_ MMAP_MIN_ ADDR varies by arch KEYS_DEBUG_ PROC_KEYS= n
* [Config] CONFIG_
* [Config] Sync LSM config options
* [Config] CONFIG_
* [Config] CONFIG_COMPAT_BRK=n
* [Config] Sync crypto config options
* [Config] Sync IPsec config options
[ Upstream Kernel Changes ]
* kernel/sys.c: fix stack memory content leak via UNAME26 wake_up_ state() and ptrace_ signal_ wake_up( ) ptrace_ request can never race with SIGKILL map_hw_ event() requeue_ pi() requeue_ pi()
- CVE-2012-0957
* use clamp_t in UNAME26 fix
- CVE-2012-0957
* ptrace: introduce signal_
- CVE-2013-0871
* ptrace: ensure arch_ptrace/
- CVE-2013-0871
* wake_up_process() should be never used to wakeup a TASK_STOPPED/TRACED
task
- CVE-2013-0871
* net: fix incorrect credentials passing
- CVE-2013-1979
* perf: Treat attr.config as u64 in perf_swevent_init()
- CVE-2013-2094
* iscsi-target: fix heap buffer overflow on error
- CVE-2013-2850
* ARM: 7809/1: perf: fix event validation for software group leaders
- CVE-2013-4254
* ARM: 7810/1: perf: Fix array out of bounds access in
armpmu_
- CVE-2013-4254
* n_tty: Fix n_tty_write crash when echoing in raw mode
- CVE-2014-0196
* floppy: ignore kernel-only members in FDRAWCMD ioctl input
- CVE-2014-1737
* floppy: don't write kernel-only members to FDRAWCMD ioctl output
- CVE-2014-1738
* futex: Test for pi_mutex on fault in futex_wait_
- CVE-2014-3153
* futex: Fix bug in WARN_ON for NULL q.pi_state
- CVE-2014-3153
* futex: Forbid uaddr == uaddr2 in futex_wait_
- CVE-2014-3153
* futex: Handle futex_pi OWNER_DIED take over correctly
- CVE-2014-3153
* futex: avoid wake_futex() for a PI futex_...