[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2015-11-06 Thread Mathew Hodson
** Changed in: linux (Ubuntu)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu Trusty)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu Utopic)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt->label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-07-16 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-32.57

---
linux (3.13.0-32.57) trusty; urgency=low

  [ Upstream Kernel Changes ]

  * l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943

linux (3.13.0-32.56) trusty; urgency=low

  [ Luis Henriques ]

  * Merged back Ubuntu-3.13.0-30.55 security release
  * Revert x86_64,ptrace: Enforce RIP = TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
  * Release Tracking Bug
- LP: #1338524

  [ Upstream Kernel Changes ]

  * ptrace,x86: force IRET path after a ptrace_stop()
- LP: #1337339
- CVE-2014-4699
  * hpsa: add new Smart Array PCI IDs (May 2014)
- LP: #1337516

linux (3.13.0-31.55) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1336278

  [ Andy Whitcroft ]

  * [Config] switch hyper-keyboard to virtual
- LP: #1325306
  * [Packaging] linux-udeb-flavour -- standardise on linux prefix

  [ dann frazier ]

  * [Config] CONFIG_GPIO_DWAPB=m
- LP: #1334823

  [ Feng Kan ]

  * SAUCE: (no-up) arm64: dts: Add Designware GPIO dts binding to APM
X-Gene platform
- LP: #1334823

  [ John Johansen ]

  * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message
- LP: #1308761

  [ Kamal Mostafa ]

  * [Config] updateconfigs ACPI_PROCFS_POWER=y after v3.13.11.4 rebase

  [ Loc Ho ]

  * SAUCE: (no-up) phy-xgene: Use correct tuning for Mustang
- LP: #1335636

  [ Michael Ellerman ]

  * SAUCE: (no-up) powerpc/perf: Ensure all EBB register state is cleared
on fork()
- LP: #1328914

  [ Ming Lei ]

  * Revert SAUCE: (no-up) rtc: Add X-Gene SoC Real Time Clock Driver
- LP: #1274305

  [ Suman Tripathi ]

  * SAUCE: (no-up) libahci: Implement the function ahci_restart_engine to
restart the port dma engine.
- LP: #1335645
  * SAUCE: (no-up) ata: Fix the dma state machine lockup for the IDENTIFY
DEVICE PIO mode command.
- LP: #1335645

  [ Tim Gardner ]

  * [Config] CONFIG_POWERNV_CPUFREQ=y for powerpc, ppc64el
- LP: #1324571
  * [Debian] Add UTS_UBUNTU_RELEASE_ABI to utsrelease.h
- LP: #1327619
  * [Config] CONFIG_HAVE_MEMORYLESS_NODES=y
- LP: #1332063
  * [Config] CONFIG_HID_RMI=m
- LP: #1305522

  [ Upstream Kernel Changes ]

  * Revert offb: Add palette hack for little endian
- LP: #1333430
  * Revert net: mvneta: fix usage as a module on RGMII configurations
- LP: #1333837
  * Revert USB: serial: add usbid for dell wwan card to sierra.c
- LP: #1333837
  * Revert macvlan : fix checksums error when we are in bridge mode
- LP: #1333838
  * serial: uart: add hw flow control support configuration
- LP: #1328295
  * mm/numa: Remove BUG_ON() in __handle_mm_fault()
- LP: #1323165
  * Tools: hv: Handle the case when the target file exists correctly
- LP: #1306215
  * Documentation/devicetree/bindings: add documentation for the APM X-Gene
SoC RTC DTS binding
- LP: #1274305
  * drivers/rtc: add APM X-Gene SoC RTC driver
- LP: #1274305
  * arm64: add APM X-Gene SoC RTC DTS entry
- LP: #1274305
  * powerpc/perf: Add Power8 cache  TLB events
- LP: #1328914
  * powerpc/perf: Configure BHRB filter before enabling PMU interrupts
- LP: #1328914
  * powerpc/perf: Define perf_event_print_debug() to print PMU register
values
- LP: #1328914
  * powerpc: Add a cpu feature CPU_FTR_PMAO_BUG
- LP: #1328914
  * powerpc/perf: Add lost exception workaround
- LP: #1328914
  * powerpc/perf: Reject EBB events which specify a sample_type
- LP: #1328914
  * powerpc/perf: Clean up the EBB hash defines a little
- LP: #1328914
  * powerpc/perf: Avoid mutating event in power8_get_constraint()
- LP: #1328914
  * powerpc/perf: Add BHRB constraint and IFM MMCRA handling for EBB
- LP: #1328914
  * powerpc/perf: Enable BHRB access for EBB events
- LP: #1328914
  * powerpc/perf: Fix handling of L3 events with bank == 1
- LP: #1328914
  * Bluetooth: Add support for Intel Bluetooth device [8087:0a2a]
- LP: #1329184
  * iwlwifi: mvm: disable beacon filtering
- LP: #1293569
  * SUNRPC: Ensure that call_connect times out correctly
- LP: #1322407
  * SUNRPC: Ensure call_connect_status() deals correctly with SOFTCONN
tasks
- LP: #1322407
  * bitops: Fix signedness of compile-time hweight implementations
- LP: #1321791
  * cpumask.h: silence warning with -Wsign-compare
- LP: #1321791
  * fbdev/fb.h: silence warning with -Wsign-compare
- LP: #1321791
  * rtlwifi: make MSI support a module parameter
- LP: #1296591
  * rtlwifi: rtl8188ee: add msi module parameter
- LP: #1296591
  * rtlwifi: rtl8723be: add msi module parameter
- LP: #1296591
  * net: avoid dependency of net_get_random_once on nop patching
- LP: #1330671
  * x86-64, modify_ldt: Make support for 16-bit segments a runtime option
- LP: #1328965
  * ALSA: usb-audio: Prevent printk ratelimiting from spamming kernel log
while DEBUG not defined
   

[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-07-11 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-07-10 Thread Luis Henriques
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-07-10 Thread John Johansen
I have been running this for a few hours and it seems to be working


** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-07-07 Thread Launchpad Bug Tracker
** Branch linked: lp:~ubuntu-branches/ubuntu/utopic/linux-flo/utopic-
proposed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-07-03 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-06-17 Thread Tim Gardner
** Changed in: linux (Ubuntu Trusty)
   Status: Confirmed = Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-06-10 Thread Simon Déziel
John, are there any plans to SRU this to Trusty? Thanks

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Confirmed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-06-10 Thread CSRedRat
When this fixed in 14.04 Trusty Tahr for 14.04.1 (24 July)?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Confirmed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-05-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.15.0-4.8

---
linux (3.15.0-4.8) utopic; urgency=low

  [ Andy Whitcroft ]

  * Release Tracking Bug
- LP: #1324107
  * [Config] enable SECURITY_APPARMOR_UNCONFINED_INIT

  [ Javier Martinez Canillas ]

  * SAUCE: (no-up) apparmor: fix bug that constantly spam the console
- LP: #1323526

  [ John Johansen ]

  * SAUCE: (no-up) apparmor: Sync to apparmor3 - alpha6 snapshot
- LP: #1323528
  * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message
- LP: #1308761
  * SAUCE: (no-up) apparmor: fix refcount bug in apparmor pivotroot
- LP: #1308765
  * SAUCE: (no-up): apparmor: fix apparmor refcount bug in apparmor_kill
- LP: #1308764
  * SAUCE: (no-up): apparmor: use custom write_is_locked macro
- LP: #1323530

  [ Kamal Mostafa ]

  * [Config] add debian/gbp.conf

  [ Tim Gardner ]

  * [Config] CONFIG_SATA_AHCI=m for ppc64el
- LP: #1323980
 -- Andy Whitcroft a...@canonical.com   Wed, 28 May 2014 12:47:17 +0100

** Changed in: linux (Ubuntu Utopic)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Confirmed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : 

[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-05-28 Thread Andy Whitcroft
** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
 Assignee: John Johansen (jjohansen)
   Status: Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Confirmed
Status in “linux” source package in Trusty:
  Confirmed
Status in “linux” source package in Utopic:
  Confirmed

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
  Apr  5 05:16:45 cormac kernel: [66784.479855]  [8130e92c] 
apparmor_unix_may_send+0x16c/0x180
  Apr  5 05:16:45 cormac kernel: [66784.479859]  [812cf446] 
security_unix_may_send+0x16/0x20
  Apr  5 05:16:45 cormac kernel: [66784.479863]  [816b1435] 
unix_dgram_sendmsg+0x2a5/0x620
  Apr  5 05:16:45 cormac kernel: [66784.479868]  [81601f3b] 
sock_sendmsg+0x8b/0xc0
  Apr  5 05:16:45 cormac kernel: [66784.479872]  [8104f28f] ? 
kvm_clock_read+0x1f/0x30
  Apr  5 05:16:45 cormac kernel: [66784.479875]  [816020e1] 
SYSC_sendto+0x121/0x1c0
  Apr  5 05:16:45 cormac kernel: [66784.479901]  [8109dd74] ? 
vtime_account_user+0x54/0x60
  Apr  5 05:16:45 cormac kernel: [66784.479907]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
  Apr  5 05:16:45 cormac kernel: [66784.479909]  [81602bee] 
SyS_sendto+0xe/0x10
  Apr  5 05:16:45 cormac kernel: [66784.479913]  [817254ff] 
tracesys+0xe1/0xe6
  Apr  5 05:16:45 cormac kernel: [66784.479915] ---[ end trace c4dfb167bafcc341 
]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1308761/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-05-26 Thread Luca
Hi all, here i have the same problem

[2559611.578826] [ cut here ]
[2559611.578832] WARNING: CPU: 0 PID: 18649 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
[2559611.578835] AppArmor WARN apparmor_unix_may_send: 
((!aa_label_is_subset(cxt-label, label))):
[2559611.578837] Modules linked in: btrfs(F) ufs(F) qnx4(F) hfsplus(F) hfs(F) 
minix(F) ntfs(F) msdos(F) jfs(F) xfs(F) libcrc32c(F) dm_crypt lrw gf128mul 
glue_helper ablk_helper cryptd aes_x86_64 xt_conntrack ipt_MASQUERADE 
iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack 
xt_tcpudp ip6table_filter ip6_tables iptable_filter ip_tables x_tables gpio_ich 
coretemp kvm_intel kvm psmouse serio_raw joydev lp lpc_ich parport i3200_edac 
mac_hid edac_core raid10 raid456 async_raid6_recov async_memcpy async_pq 
async_xor async_tx hid_generic xor raid6_pq ses enclosure usbhid raid1 e1000e 
hid raid0 ahci ptp multipath floppy e1000 usb_storage libahci pps_core linear
[2559611.578902] CPU: 0 PID: 18649 Comm: dhcpd Tainted: GF   W I  
3.13.0-24-generic #46-Ubuntu
[2559611.578904] Hardware name: Intel Corporation S3210SH/S3210SH, BIOS 
S3200X38.86B.00.00.0042.042820081723 04/28/2008
[2559611.578907]  0009 8800d83d9bd0 81715a64 
8800d83d9c18
[2559611.578912]  8800d83d9c08 810676bd 88011b00c430 
8801190f9b80
[2559611.578917]  8800362e6ff0 880119182800 8800cb0c2fe0 
8800d83d9c68
[2559611.578921] Call Trace:
[2559611.578926]  [81715a64] dump_stack+0x45/0x56
[2559611.578931]  [810676bd] warn_slowpath_common+0x7d/0xa0
[2559611.578935]  [8106772c] warn_slowpath_fmt+0x4c/0x50
[2559611.578940]  [8130ed5c] apparmor_unix_may_send+0x16c/0x180
[2559611.578944]  [812cf876] security_unix_may_send+0x16/0x20
[2559611.578948]  [816b2575] unix_dgram_sendmsg+0x2a5/0x620
[2559611.578953]  [816024eb] sock_sendmsg+0x8b/0xc0
[2559611.578958]  [8109df6d] ? vtime_common_task_switch+0x3d/0x40
[2559611.578962]  [81719a11] ? __schedule+0x381/0x7d0
[2559611.578967]  [8101b763] ? native_sched_clock+0x13/0x80
[2559611.578971]  [81602691] SYSC_sendto+0x121/0x1c0
[2559611.578976]  [8109dd84] ? vtime_account_user+0x54/0x60
[2559611.578980]  [81020d35] ? syscall_trace_enter+0x145/0x250
[2559611.578985]  [8160319e] SyS_sendto+0xe/0x10
[2559611.578989]  [8172663f] tracesys+0xe1/0xe6
[2559611.578992] ---[ end trace 4a4dfa3d4cf5d4b7 ]---

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1308761

Title:
  apparmor spams log with warning message

Status in “linux” package in Ubuntu:
  Confirmed
Status in “linux” source package in Trusty:
  Confirmed

Bug description:
  The apparmor kernel module will spam the dmesg log with a stack trace
  and warning when the label on a unix socket does not match the label
  on the task sending the message.

  This happens when a socket is delegated to another task

  Example Message in the log
  Apr  5 05:16:45 cormac kernel: [66784.479777] [ cut here 
]
  Apr  5 05:16:45 cormac kernel: [66784.479791] WARNING: CPU: 0 PID: 21866 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
  Apr  5 05:16:45 cormac kernel: [66784.479793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))):
  Apr  5 05:16:45 cormac kernel: [66784.479794] Modules linked in: xt_hl 
ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype ppdev nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_ftp nf_nat nf_conntrack_ftp iptable_filter ip_tables kvm_intel kvm 
cirrus psmouse serio_raw ip6t_REJECT xt_LOG ttm ip6t_rt nf_conntrack_ipv6 
nf_defrag_ipv6 nf_conntrack parport_pc ip6table_filter ip6_tables x_tables 
drm_kms_helper drm lp parport mac_hid syscopyarea sysfillrect sysimgblt 
i2c_piix4 floppy
  Apr  5 05:16:45 cormac kernel: [66784.479828] CPU: 0 PID: 21866 Comm: sshd 
Tainted: GW3.13.0-22-generic #44-Ubuntu
  Apr  5 05:16:45 cormac kernel: [66784.479829] Hardware name: Bochs Bochs, 
BIOS Bochs 01/01/2011
  Apr  5 05:16:45 cormac kernel: [66784.479832]  0009 
8800d5d25bd0 81714914 8800d5d25c18
  Apr  5 05:16:45 cormac kernel: [66784.479834]  8800d5d25c08 
810676bd 8800d67a3c30 880138147b80
  Apr  5 05:16:45 cormac kernel: [66784.479836]  88003681cb40 
880138147680 8801384217f0 8800d5d25c68
  Apr  5 05:16:45 cormac kernel: [66784.479839] Call Trace:
  Apr  5 05:16:45 cormac kernel: [66784.479846]  [81714914] 
dump_stack+0x45/0x56
  Apr  5 05:16:45 cormac kernel: [66784.479851]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
  Apr  5 05:16:45 cormac kernel: [66784.479853]  

[Kernel-packages] [Bug 1308761] Re: apparmor spams log with warning message

2014-04-17 Thread Stephan Adig
For me I have a similar issues...

the log says:

Apr 17 02:29:36 trusty-01 kernel: [70827.909934] [ cut here 
]
Apr 17 02:29:36 trusty-01 kernel: [70827.909960] WARNING: CPU: 0 PID: 2985 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
Apr 17 02:29:36 trusty-01 kernel: [70827.909964] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): 
Apr 17 02:29:36 trusty-01 kernel: [70827.909968] Modules linked in: kvm_intel 
kvm cirrus snd_hda_intel ttm snd_hda_codec drm_kms_helper snd_hwdep psmouse 
serio_raw snd_pcm drm snd_page_alloc snd_timer syscopyarea snd soundcore 
sysfillrect sysimgblt i2c_piix4 lp parport mac_hid 8139too 8139cp mii floppy
Apr 17 02:29:36 trusty-01 kernel: [70827.910014] CPU: 0 PID: 2985 Comm: dhcpd 
Tainted: GW3.13.0-24-generic #46-Ubuntu
Apr 17 02:29:36 trusty-01 kernel: [70827.910018] Hardware name: QEMU Standard 
PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
Apr 17 02:29:36 trusty-01 kernel: [70827.910022]  0009 
88063bd0 81715a64 88063c18
Apr 17 02:29:36 trusty-01 kernel: [70827.910030]  88063c08 
810676bd 88003e00a430 88003d618000
Apr 17 02:29:36 trusty-01 kernel: [70827.910036]  88003b33f010 
88003d70f400 88003c1a8000 88063c68
Apr 17 02:29:36 trusty-01 kernel: [70827.910043] Call Trace:
Apr 17 02:29:36 trusty-01 kernel: [70827.910056]  [81715a64] 
dump_stack+0x45/0x56
Apr 17 02:29:36 trusty-01 kernel: [70827.910066]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
Apr 17 02:29:36 trusty-01 kernel: [70827.910072]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
Apr 17 02:29:36 trusty-01 kernel: [70827.910080]  [8130ed5c] 
apparmor_unix_may_send+0x16c/0x180
Apr 17 02:29:36 trusty-01 kernel: [70827.910089]  [812cf876] 
security_unix_may_send+0x16/0x20
Apr 17 02:29:36 trusty-01 kernel: [70827.910097]  [816b2575] 
unix_dgram_sendmsg+0x2a5/0x620
Apr 17 02:29:36 trusty-01 kernel: [70827.910108]  [816024eb] 
sock_sendmsg+0x8b/0xc0
Apr 17 02:29:36 trusty-01 kernel: [70827.910116]  [81602691] 
SYSC_sendto+0x121/0x1c0
Apr 17 02:29:36 trusty-01 kernel: [70827.910125]  [8109dd84] ? 
vtime_account_user+0x54/0x60
Apr 17 02:29:36 trusty-01 kernel: [70827.910137]  [81020d35] ? 
syscall_trace_enter+0x145/0x250
Apr 17 02:29:36 trusty-01 kernel: [70827.910145]  [8160319e] 
SyS_sendto+0xe/0x10
Apr 17 02:29:36 trusty-01 kernel: [70827.910154]  [8172663f] 
tracesys+0xe1/0xe6
Apr 17 02:29:36 trusty-01 kernel: [70827.910158] ---[ end trace 
0b1a05a3a90a9dc7 ]---
Apr 17 02:29:46 trusty-01 kernel: [70838.210778] [ cut here 
]
Apr 17 02:29:46 trusty-01 kernel: [70838.210791] WARNING: CPU: 0 PID: 2985 at 
/build/buildd/linux-3.13.0/security/apparmor/lsm.c:839 
apparmor_unix_may_send+0x16c/0x180()
Apr 17 02:29:46 trusty-01 kernel: [70838.210793] AppArmor WARN 
apparmor_unix_may_send: ((!aa_label_is_subset(cxt-label, label))): 
Apr 17 02:29:46 trusty-01 kernel: [70838.210794] Modules linked in: kvm_intel 
kvm cirrus snd_hda_intel ttm snd_hda_codec drm_kms_helper snd_hwdep psmouse 
serio_raw snd_pcm drm snd_page_alloc snd_timer syscopyarea snd soundcore 
sysfillrect sysimgblt i2c_piix4 lp parport mac_hid 8139too 8139cp mii floppy
Apr 17 02:29:46 trusty-01 kernel: [70838.210817] CPU: 0 PID: 2985 Comm: dhcpd 
Tainted: GW3.13.0-24-generic #46-Ubuntu
Apr 17 02:29:46 trusty-01 kernel: [70838.210818] Hardware name: QEMU Standard 
PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
Apr 17 02:29:46 trusty-01 kernel: [70838.210820]  0009 
88063bd0 81715a64 88063c18
Apr 17 02:29:46 trusty-01 kernel: [70838.210823]  88063c08 
810676bd 88003e00a430 88003d618000
Apr 17 02:29:46 trusty-01 kernel: [70838.210826]  88003b33f010 
88003d70f400 88003c1a8000 88063c68
Apr 17 02:29:46 trusty-01 kernel: [70838.210829] Call Trace:
Apr 17 02:29:46 trusty-01 kernel: [70838.210835]  [81715a64] 
dump_stack+0x45/0x56
Apr 17 02:29:46 trusty-01 kernel: [70838.210840]  [810676bd] 
warn_slowpath_common+0x7d/0xa0
Apr 17 02:29:46 trusty-01 kernel: [70838.210842]  [8106772c] 
warn_slowpath_fmt+0x4c/0x50
Apr 17 02:29:46 trusty-01 kernel: [70838.210846]  [8130ed5c] 
apparmor_unix_may_send+0x16c/0x180
Apr 17 02:29:46 trusty-01 kernel: [70838.210850]  [812cf876] 
security_unix_may_send+0x16/0x20
Apr 17 02:29:46 trusty-01 kernel: [70838.210854]  [816b2575] 
unix_dgram_sendmsg+0x2a5/0x620
Apr 17 02:29:46 trusty-01 kernel: [70838.210860]  [816024eb] 
sock_sendmsg+0x8b/0xc0
Apr 17 02:29:46 trusty-01 kernel: [70838.210863]  [81602691] 
SYSC_sendto+0x121/0x1c0
Apr 17 02:29:46 trusty-01 kernel: [70838.210867]  [8109dd84] ? 
vtime_account_user+0x54/0x60
Apr 17 02:29:46 trusty-01 kernel: [70838.210873]