In testing I have not been able to reproduce. But from the oops it looks either like potentially like memory corruption, or corruption of the cred. The oops reports invalid opcode: 0000 [#1] SMP
however the piece of code triggering this is used all the time, so the more likely scenario is that the cred does not have the correct security labeling which would trigger an oops. The oops would not normally be an invalid opcode, but its possible the handling within the oops is triggering the invalid opcode. The line of code triggering this oops is BUG_ON(!ctx || !ctx->label); which going with the bad cred hypothesis means the actual problem is else where. Tracing down the conditions that cause the bad cred may be difficult. With this being reported as fine in 14.04.5 with all 4.4.x kernels, and without further input to help trace down the conditions that cause this, I am inclined to close this bug as fixed. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1626984 Title: kernel BUG at /build/linux-lts-xenial-_hWfOZ/linux-lts- xenial-4.4.0/security/apparmor/include/context.h:69! Status in linux package in Ubuntu: Confirmed Bug description: I am runing sosreport on ubuntu 14.04.4 LTS which has upgrade the kernel to 4.4.0-38-generic, it get oops while copying /sys/module/apparmor/parameters/audit. and it also can be triggered with cat /sys/module/apparmor/parameters/audit. [ 213.174092] ------------[ cut here ]------------ [ 213.174130] kernel BUG at /build/linux-lts-xenial-_hWfOZ/linux-lts-xenial-4.4.0/security/apparmor/include/context.h:69! [ 213.174187] invalid opcode: 0000 [#1] SMP [ 213.174215] Modules linked in: ppdev lp joydev serio_raw parport_pc parport psmouse virtio_scsi floppy [ 213.174283] CPU: 0 PID: 2246 Comm: cat Not tainted 4.4.0-38-generic #57~14.04.1-Ubuntu [ 213.174324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.8.2-0-g33fbe13 by qemu-project.org 04/01/2014 [ 213.174380] task: ffff880037b15780 ti: ffff8800399c4000 task.ti: ffff8800399c4000 [ 213.174419] RIP: 0010:[<ffffffff813888a1>] [<ffffffff813888a1>] aa_current_raw_label.part.6+0x4/0x6 [ 213.174478] RSP: 0018:ffff8800399c7d60 EFLAGS: 00010246 [ 213.174506] RAX: 0000000000000000 RBX: ffff88003a426000 RCX: ffff88003e3802a0 [ 213.174542] RDX: ffff88003a426000 RSI: ffffffff81ddc0d8 RDI: ffff88003a426000 [ 213.174578] RBP: ffff8800399c7d60 R08: ffff88003e3802a0 R09: 0000000000000000 [ 213.174614] R10: 0000000000001000 R11: 0000000000000246 R12: ffffffff81e44ae0 [ 213.174658] R13: ffff88003e3802a0 R14: ffffffff81e4c220 R15: ffff88003c2b2e40 [ 213.174702] FS: 00007f7bea106740(0000) GS:ffff88003fc00000(0000) knlGS:0000000000000000 [ 213.174743] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 213.174781] CR2: 0000000000a40038 CR3: 000000003cdfa000 CR4: 00000000000006f0 [ 213.174819] Stack: [ 213.174832] ffff8800399c7d88 ffffffff8136d58a ffff88003a426000 ffff88003a426000 [ 213.174885] ffff88003e3802a0 ffff8800399c7da0 ffffffff8136fda2 ffff88003e39c5f0 [ 213.174928] ffff8800399c7dd0 ffffffff8109a7e4 ffff88003c2b2e40 ffffffff81a170c0 [ 213.174971] Call Trace: [ 213.174996] [<ffffffff8136d58a>] policy_view_capable+0x1ba/0x220 [ 213.175030] [<ffffffff8136fda2>] param_get_audit+0x12/0x50 [ 213.175062] [<ffffffff8109a7e4>] param_attr_show+0x54/0xa0 [ 213.175092] [<ffffffff8109a20d>] module_attr_show+0x1d/0x30 [ 213.175130] [<ffffffff8127a6e2>] sysfs_kf_seq_show+0xc2/0x1a0 [ 213.175162] [<ffffffff81278f73>] kernfs_seq_show+0x23/0x30 [ 213.175199] [<ffffffff81220d55>] seq_read+0xe5/0x350 [ 213.175227] [<ffffffff8127970d>] kernfs_fop_read+0x10d/0x170 [ 213.176170] [<ffffffff811fda18>] __vfs_read+0x18/0x40 [ 213.177101] [<ffffffff811fdfcf>] vfs_read+0x7f/0x130 [ 213.178016] [<ffffffff811feda6>] SyS_read+0x46/0xa0 [ 213.178932] [<ffffffff817fa336>] entry_SYSCALL_64_fastpath+0x16/0x75 [ 213.179814] Code: 80 3d 1a 7f b8 00 00 75 1d 55 be 2e 00 00 00 48 c7 c7 f0 2f cb 81 48 89 e5 e8 7c 50 cf ff 5d c6 05 fb 7e b8 00 01 c3 55 48 89 e5 <0f> 0b b8 01 00 00 00 3e 0f c1 07 ff c0 ff c8 7f 26 80 3d df 7e [ 213.182634] RIP [<ffffffff813888a1>] aa_current_raw_label.part.6+0x4/0x6 [ 213.183528] RSP <ffff8800399c7d60> To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1626984/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp