Comment 5 for bug 1508737

Revision history for this message
Roman Fiedler (roman-fiedler-deactivatedaccount) wrote :

Rediscovered also on our systems, then found this bug report.

Reproducer for Ubuntu Trusty LTS:

auditctl -a always,exit -F arch=b64 -S bind

#!/usr/bin/python2 -BEsSt
import socket
testSocket=socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
testSocket.bind('sock')

# dmesg -c
[ 145.499064] BUG: unable to handle kernel NULL pointer dereference at 0000000000000060
[ 145.499522] IP: [<ffffffff811d8024>] d_path+0x24/0x120
[ 145.499815] PGD 3bfe8067 PUD 3d080067 PMD 0
[ 145.500236] Oops: 0000 [#1] SMP
[ 145.500539] Modules linked in: nf_conntrack_netlink xt_multiport ppdev xt_hashlimit ipt_REJECT xt_tcpudp xt_NFLOG nfnetlink_log xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat serio_raw nf_conntrack iptable_mangle ip_tables x_tables parport_pc i2c_piix4 parport video nfnetlink_acct mac_hid nfnetlink psmouse ahci libahci pata_acpi
[ 145.502264] CPU: 0 PID: 1128 Comm: crash Not tainted 3.13.0-86-generic #130-Ubuntu
[ 145.502264] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
[ 145.502264] task: ffff88003a0cc800 ti: ffff88003d0d4000 task.ti: ffff88003d0d4000
[ 145.502264] RIP: 0010:[<ffffffff811d8024>] [<ffffffff811d8024>] d_path+0x24/0x120
[ 145.502264] RSP: 0018:ffff88003d0d5db8 EFLAGS: 00010286
[ 145.502264] RAX: ffff88003795d00b RBX: ffff88003b937660 RCX: 00000000000005b5
[ 145.502264] RDX: 000000000000100b RSI: ffff88003795c000 RDI: 0000000000000000
[ 145.502264] RBP: ffff88003d0d5de0 R08: 0000000000016040 R09: ffff88003e001200
[ 145.502264] R10: ffffffff810fb1d6 R11: ffff88003d0d5c06 R12: ffff88003b6420c0
[ 145.502264] R13: ffff88003b937660 R14: ffff88003b937400 R15: 0000000000000000
[ 145.502264] FS: 00007f0280520740(0000) GS:ffff88003fc00000(0000) knlGS:0000000000000000
[ 145.502264] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 145.502264] CR2: 0000000000000060 CR3: 000000003cf68000 CR4: 00000000000006f0
[ 145.502264] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 145.502264] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 145.502264] Stack:
[ 145.502264] 0000100b3b6420c0 ffff88003795d00b ffff88003b937660 ffff88003b937400
[ 145.502264] ffff88003795c000 ffff88003d0d5e08 ffffffff810fb1ee ffff88003b6420c0
[ 145.502264] ffff88003b937460 0000000000000000 ffff88003d0d5e78 ffffffff810fc658
[ 145.502264] Call Trace:
[ 145.502264] [<ffffffff810fb1ee>] audit_log_d_path+0x5e/0xd0
[ 145.502264] [<ffffffff810fc658>] audit_log_name+0x1b8/0x320
[ 145.502264] [<ffffffff810f9d33>] ? audit_buffer_free+0x73/0xa0
[ 145.502264] [<ffffffff810fefc7>] audit_log_exit+0x3d7/0xb90
[ 145.502264] [<ffffffff81101747>] __audit_syscall_exit+0x277/0x2d0
[ 145.502264] [<ffffffff8173b144>] sysret_audit+0x17/0x21
[ 145.502264] Code: ff ff 0f 1f 44 00 00 0f 1f 44 00 00 55 48 63 c2 48 01 f0 48 89 e5 53 48 89 fb 48 83 ec 20 48 8b 7f 08 89 54 24 04 48 89 44 24 08 <48> 8b 4f 60 48 85 c9 74 23 48 8b 49 40 48 85 c9 74 1a 48 3b 7f
[ 145.502264] RIP [<ffffffff811d8024>] d_path+0x24/0x120
[ 145.502264] RSP <ffff88003d0d5db8>
[ 145.502264] CR2: 0000000000000060
[ 145.527823] ---[ end trace 0c532c3c01bea0ff ]---

# lsb_release -rd
Description: Ubuntu 14.04.4 LTS
Release: 14.04

# cat /proc/version
Linux version 3.13.0-86-generic (buildd@lgw01-19) (gcc version 4.8.2 (Ubuntu 4.8.2-19ubuntu1) ) #130-Ubuntu SMP Mon Apr 18 18:27:15 UTC 2016
root@localhost:~# apt-cache policy linux-image-3.13.0-86-generic
linux-image-3.13.0-86-generic:
  Installed: 3.13.0-86.130
  Candidate: 3.13.0-86.130
  Version table:
 *** 3.13.0-86.130 0
        500 http://ubuntu-proxy-ehealth.d03.arc.local/ubuntu/ trusty-updates/main amd64 Packages
        500 http://ubuntu-proxy-ehealth.d03.arc.local/ubuntu/ trusty-security/main amd64 Packages
        100 /var/lib/dpkg/status