lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 17 Oct 2012 21:47:50 +0800
From:	yan yan <clouds.yan@...il.com>
To:	john.johansen@...onical.com, james.l.morris@...cle.com,
	viro@...iv.linux.org.uk, eparis@...hat.com
Cc:	linux-kernel@...r.kernel.org, linux-security-module@...r.kernel.org
Subject: [BUG] Oops caused by audit code in 3.7.0-rc1

Hi, all:

This oops keep appearing, fault address and register dump are always the same.

Attachment is the config file.

[  896.957678] BUG: unable to handle kernel paging request at 72747461
[  896.957824] IP: [<c12db352>] strlen+0x12/0x20
[  896.957928] *pdpt = 00000000346bc001 *pde = 0000000000000000
[  896.958054] Oops: 0000 [#1] SMP
[  896.958128] Modules linked in: bnep parport_pc rfcomm
snd_hda_codec_realtek ppdev snd_hda_codec_hdmi snd_hda_intel
snd_hda_codec snd_hwdep arc4 rt2800pci rt2800lib snd_pcm crc_ccitt
rt2x00pci rt2x00lib snd_seq_midi mac80211 snd_rawmidi
snd_seq_midi_event snd_seq btusb bluetooth kvm_amd snd_timer kvm
snd_seq_device joydev hid_generic snd cfg80211 psmouse ideapad_laptop
i2c_piix4 soundcore snd_page_alloc acer_wmi k10temp serio_raw
sparse_keymap eeprom_93cx6 mac_hid lp parport usbhid hid btrfs
zlib_deflate libcrc32c radeon ttm drm_kms_helper drm i2c_algo_bit
r8169 video wmi
[  896.959340] Pid: 1079, comm: cupsd Tainted: G          I
3.7.0-rc1+ #10 LENOVO Sabine/Torpedo
[  896.959519] EIP: 0060:[<c12db352>] EFLAGS: 00010246 CPU: 1
[  896.959634] EIP is at strlen+0x12/0x20
[  896.959714] EAX: 00000000 EBX: f65216e0 ECX: ffffffff EDX: 72747461
[  896.959843] ESI: 72747461 EDI: 72747461 EBP: f4625e20 ESP: f4625e1c
[  896.959972]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[  896.960084] CR0: 80050033 CR2: 72747461 CR3: 347d9000 CR4: 000007f0
[  896.960214] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[  896.960343] DR6: ffff0ff0 DR7: 00000400
[  896.960425] Process cupsd (pid: 1079, ti=f4624000 task=f32352c0
task.ti=f4624000)
[  896.960577] Stack:
[  896.960620]  f4625ee8 f4625e30 c10bdcbc f65216e0 f4625ee8 f4625e48
c1292e16 f65216e0
[  896.960802]  c1787a64 f65216e0 f32352c0 f4625e80 c1285563 f65216e0
c1786ce4 00000024
[  896.960982]  00000001 f6d60d10 f6d60d00 f4625e70 c1292de0 f4625eb4
f4625ee8 00000000
[  896.961162] Call Trace:
[  896.961222]  [<c10bdcbc>] audit_log_untrustedstring+0x1c/0x40
[  896.961346]  [<c1292e16>] audit_cb+0x36/0x40
[  896.961440]  [<c1285563>] common_lsm_audit+0x83/0x6e0
[  896.961550]  [<c1292de0>] ? aa_audit+0x150/0x150
[  896.961558]  [<c1292c8d>] aa_audit_msg+0x1d/0x20
[  896.961558]  [<c1292ced>] aa_audit+0x5d/0x150
[  896.961558]  [<c1292f53>] aa_capable+0x133/0x220
[  896.961558]  [<c1292de0>] ? aa_audit+0x150/0x150
[  896.961558]  [<c10a1e3c>] ? lock_release_holdtime.part.22+0xbc/0xf0
[  896.961558]  [<c1298b47>] apparmor_capable+0x67/0x80
[  896.961558]  [<c126384c>] security_capable+0x1c/0x30
[  896.961558]  [<c105567e>] ns_capable+0x2e/0x60
[  896.961558]  [<c10556c4>] capable+0x14/0x20
[  896.961558]  [<c1194d1a>] sys_epoll_ctl+0xba/0x800
[  896.961558]  [<c14d4212>] ? sys_socketcall+0x1a2/0x2e0
[  896.968187]  [<c15d8ccd>] sysenter_do_call+0x12/0x33
[  896.968187] Code: f7 be 01 00 00 00 89 f0 48 5e 5d c3 8d b6 00 00
00 00 8d bc 27 00 00 00 00 55 89 e5 57 3e 8d 74 26 00 b9 ff ff ff ff
89 c7 31 c0 <f2> ae f7 d1 8d 41 ff 5f 5d c3 8d 74 26 00 55 89 e5 57 3e
8d 74
[  896.968187] EIP: [<c12db352>] strlen+0x12/0x20 SS:ESP 0068:f4625e1c
[  896.968187] CR2: 0000000072747461
[  897.026203] ---[ end trace f37c02b32d3bdf40 ]---

Download attachment "config" of type "application/octet-stream" (111145 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ