[ 194.964704] Pid: 3751, comm: epsxe Tainted: P D (2.6.31-14-generic #48-Ubuntu) System Product Name [ 194.964711] EIP: 0060:[] EFLAGS: 00010246 CPU: 1 [ 194.964720] EIP is at apparmor_bprm_set_creds+0x370/0x400 [ 194.964725] EAX: fffffffe EBX: f3bedf00 ECX: f30e3f00 EDX: f30047e2 [ 194.964730] ESI: 00000000 EDI: f5ae6be0 EBP: f30e3f44 ESP: f30e3eb4 [ 194.964736] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 [ 194.964742] Process epsxe (pid: 3751, ti=f30e2000 task=f66b4b60 task.ti=f30e2000) [ 194.964747] Stack: [ 194.964750] f30e3f00 00000000 00000000 f30e3ed0 c01ce8b0 f30bc160 f7004040 f30e3eec [ 194.964763] <0> c01ce8ff 00000000 00000000 f30bc160 00000000 f30bc160 00000000 000000d0 [ 194.964777] <0> fffffffe c070715a 00000000 f30047e2 00000000 00000000 00000000 00000000 [ 194.964792] Call Trace: [ 194.964803] [] ? __vma_link_rb+0x30/0x40 [ 194.964811] [] ? __vma_link+0x3f/0x80 [ 194.964822] [] ? security_bprm_set_creds+0xc/0x10 [ 194.964832] [] ? prepare_binprm+0xa1/0xf0 [ 194.964840] [] ? T.626+0x3b/0x50 [ 194.964848] [] ? do_execve+0x17e/0x2c0 [ 194.964856] [] ? strncpy_from_user+0x35/0x60 [ 194.964865] [] ? sys_execve+0x28/0x60 [ 194.964872] [] ? syscall_call+0x7/0xb [ 194.964877] Code: 24 8b 44 24 18 e8 71 f4 ff ff 3d 00 f0 ff ff 89 c1 76 a7 0f b7 44 24 60 f6 c4 40 74 50 c7 44 24 48 5f 71 70 c0 e9 98 fe ff ff 90 46 40 08 0f 84 e6 fe ff ff e9 d9 fe ff ff 90 8b 54 24 4c 8b [ 194.964951] EIP: [] apparmor_bprm_set_creds+0x370/0x400 SS:ESP 0068:f30e3eb4 [ 194.964963] CR2: 0000000000000040 [ 194.964969] ---[ end trace 0840ac12540286b9 ]---