Activity log for bug #1378123

Date Who What changed Old value New value Message
2014-10-06 22:38:01 Tyler Hicks bug added bug
2014-10-07 18:59:30 Tyler Hicks description Running the unix_socket_abstract.sh regression test script in a loop results in an AppArmor WARN message in the logs. Here's the script I used: --- #!/bin/sh dmesg -C while ! dmesg -c | grep "AppArmor WARN"; do bash unix_socket_abstract.sh done --- The following back trace is emitted in the logs: [ 1365.017477] ------------[ cut here ]------------ [ 1365.017486] WARNING: CPU: 0 PID: 26026 at /build/buildd/linux-3.16.0/security/apparmor/label.c:1767 __aa_labelset_update_all+0x6f5/0x7f0() [ 1365.017487] AppArmor WARN __label_update: ((__aa_label_remove_and_insert((&(((label)->ent[(label)->size - 1])->ns)->labels), label, l) != l)): [ 1365.017489] Modules linked in: bnep rfcomm bluetooth 6lowpan_iphc kvm_intel kvm vmwgfx ttm drm_kms_helper serio_raw drm i2c_piix4 pvpanic parport_pc ppdev mac_hid lp parport psmouse pata_acpi floppy [ 1365.017505] CPU: 0 PID: 26026 Comm: apparmor_parser Tainted: G W 3.16.0-20-generic #27-Ubuntu [ 1365.017507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 [ 1365.017509] 0000000000000009 ffff88002dd23d88 ffffffff8177f053 ffff88002dd23dd0 [ 1365.017511] ffff88002dd23dc0 ffffffff8106fcfd ffff880036602900 0000000000000000 [ 1365.017513] ffff88003acaed00 0000000000000002 ffff88003e02a0a0 ffff88002dd23e20 [ 1365.017516] Call Trace: [ 1365.017522] [<ffffffff8177f053>] dump_stack+0x45/0x56 [ 1365.017527] [<ffffffff8106fcfd>] warn_slowpath_common+0x7d/0xa0 [ 1365.017530] [<ffffffff8106fd6c>] warn_slowpath_fmt+0x4c/0x50 [ 1365.017533] [<ffffffff8133f00e>] ? __aa_label_remove_and_insert+0x7e/0x1a0 [ 1365.017536] [<ffffffff81342c95>] __aa_labelset_update_all+0x6f5/0x7f0 [ 1365.017539] [<ffffffff812fc5ca>] ? securityfs_remove+0x9a/0xb0 [ 1365.017542] [<ffffffff81338213>] aa_remove_profiles+0x143/0x4f0 [ 1365.017545] [<ffffffff8132f43e>] profile_remove+0x3e/0x70 [ 1365.017550] [<ffffffff811e02c7>] vfs_write+0xb7/0x1f0 [ 1365.017552] [<ffffffff811df439>] ? do_sys_open+0x1b9/0x280 [ 1365.017555] [<ffffffff811e0e76>] SyS_write+0x46/0xb0 [ 1365.017558] [<ffffffff817870ad>] system_call_fastpath+0x1a/0x1f [ 1365.017560] ---[ end trace 1e09e2c565d9ef95 ]--- This occurs in an amd64 utopic vm: $ uname -a Linux sec-utopic-amd64 3.16.0-20-generic #27-Ubuntu SMP Wed Oct 1 17:35:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Running the unix_socket_abstract.sh regression test script in a loop results in an AppArmor WARN message in the logs. On my test system, it typically takes between 1 and 3 runs of unix_socket_abstract.sh before the WARN is hit. It does not seem to occur with the unix_socket_pathname.sh or unix_socket_unnamed.sh tests. Here's the script I used: --- #!/bin/sh dmesg -C while ! dmesg -c | grep "AppArmor WARN"; do         bash unix_socket_abstract.sh done --- The following back trace is emitted in the logs: [ 1365.017477] ------------[ cut here ]------------ [ 1365.017486] WARNING: CPU: 0 PID: 26026 at /build/buildd/linux-3.16.0/security/apparmor/label.c:1767 __aa_labelset_update_all+0x6f5/0x7f0() [ 1365.017487] AppArmor WARN __label_update: ((__aa_label_remove_and_insert((&(((label)->ent[(label)->size - 1])->ns)->labels), label, l) != l)): [ 1365.017489] Modules linked in: bnep rfcomm bluetooth 6lowpan_iphc kvm_intel kvm vmwgfx ttm drm_kms_helper serio_raw drm i2c_piix4 pvpanic parport_pc ppdev mac_hid lp parport psmouse pata_acpi floppy [ 1365.017505] CPU: 0 PID: 26026 Comm: apparmor_parser Tainted: G W 3.16.0-20-generic #27-Ubuntu [ 1365.017507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 [ 1365.017509] 0000000000000009 ffff88002dd23d88 ffffffff8177f053 ffff88002dd23dd0 [ 1365.017511] ffff88002dd23dc0 ffffffff8106fcfd ffff880036602900 0000000000000000 [ 1365.017513] ffff88003acaed00 0000000000000002 ffff88003e02a0a0 ffff88002dd23e20 [ 1365.017516] Call Trace: [ 1365.017522] [<ffffffff8177f053>] dump_stack+0x45/0x56 [ 1365.017527] [<ffffffff8106fcfd>] warn_slowpath_common+0x7d/0xa0 [ 1365.017530] [<ffffffff8106fd6c>] warn_slowpath_fmt+0x4c/0x50 [ 1365.017533] [<ffffffff8133f00e>] ? __aa_label_remove_and_insert+0x7e/0x1a0 [ 1365.017536] [<ffffffff81342c95>] __aa_labelset_update_all+0x6f5/0x7f0 [ 1365.017539] [<ffffffff812fc5ca>] ? securityfs_remove+0x9a/0xb0 [ 1365.017542] [<ffffffff81338213>] aa_remove_profiles+0x143/0x4f0 [ 1365.017545] [<ffffffff8132f43e>] profile_remove+0x3e/0x70 [ 1365.017550] [<ffffffff811e02c7>] vfs_write+0xb7/0x1f0 [ 1365.017552] [<ffffffff811df439>] ? do_sys_open+0x1b9/0x280 [ 1365.017555] [<ffffffff811e0e76>] SyS_write+0x46/0xb0 [ 1365.017558] [<ffffffff817870ad>] system_call_fastpath+0x1a/0x1f [ 1365.017560] ---[ end trace 1e09e2c565d9ef95 ]--- This occurs in an amd64 utopic vm: $ uname -a Linux sec-utopic-amd64 3.16.0-20-generic #27-Ubuntu SMP Wed Oct 1 17:35:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
2015-05-25 10:36:44 Laurent Salle bug added subscriber Laurent Salle
2015-05-26 14:21:18 Tyler Hicks tags apparmor aa-kernel apparmor
2016-07-01 18:46:44 Dave Chiluk bug added subscriber Dave Chiluk
2016-07-01 18:46:58 Dave Chiluk tags aa-kernel apparmor aa-kernel apparmor sts
2016-07-01 20:30:01 Tyler Hicks nominated for series Ubuntu Xenial
2016-07-01 20:30:01 Tyler Hicks bug task added linux (Ubuntu Xenial)
2016-07-01 20:30:01 Tyler Hicks nominated for series Ubuntu Wily
2016-07-01 20:30:01 Tyler Hicks bug task added linux (Ubuntu Wily)
2016-07-01 20:30:01 Tyler Hicks nominated for series Ubuntu Vivid
2016-07-01 20:30:01 Tyler Hicks bug task added linux (Ubuntu Vivid)
2016-07-01 20:30:20 Tyler Hicks linux (Ubuntu Vivid): status New Confirmed
2016-07-01 20:30:23 Tyler Hicks linux (Ubuntu Wily): status New Confirmed
2016-07-01 20:30:26 Tyler Hicks linux (Ubuntu Xenial): status New Fix Released
2016-07-01 20:30:36 Tyler Hicks linux (Ubuntu): status Confirmed Fix Released
2016-07-07 21:30:17 Dave Chiluk linux (Ubuntu Wily): status Confirmed Won't Fix
2016-07-07 21:30:20 Dave Chiluk linux (Ubuntu Vivid): status Confirmed Won't Fix