← Back to team overview

kernel-packages team mailing list archive

[Bug 1451360] Re: Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade

 

*** This bug is a duplicate of bug 1450442 ***
    https://bugs.launchpad.net/bugs/1450442

Roman,
Marked this as a duplicate. We've already identified a fix and it is in the -proposed kernel. (3.13.0-52.85)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1451360

Title:
  Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After update, desktop and production machines, both using i386 and
  amd64 kernels fail.

  The crash may only occur after loading of syscall audit rules, hence
  boot up to initrd is still possible.

  Login is still possible but many integral functions fail, e.g. sending
  signals to processes. Also sudo is not working any more

  
  [   64.447838] BUG: unable to handle kernel NULL pointer dereference at 000000000000068f
  [   64.448715] IP: [<ffffffff8136cb80>] strlen+0x0/0x30
  [   64.449533] PGD 0 
  [   64.450315] Oops: 0000 [#15] SMP 
  [   64.451069] Modules linked in: pci_stub vboxpci(OX) vboxnetadp(OX) vboxnetflt(OX) vboxdrv(OX) nf_conntrack_netlink snd_hda_codec_hdmi xt_multiport arc4 xt_hashlimit ipt_REJECT xt_tcpudp xt_NFLOG nfnetlink_log nfnetlink xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle ip_tables x_tables dell_wmi sparse_keymap ppdev dell_laptop dcdbas cdc_mbim cdc_wdm cdc_ncm btusb bluetooth usbnet mii uvcvideo iwlmvm videobuf2_vmalloc videobuf2_memops videobuf2_core mac80211 videodev snd_hda_codec_realtek intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm joydev serio_raw i915 iwlwifi drm_kms_helper snd_hda_intel snd_hda_codec snd_hwdep snd_pcm cfg80211 snd_page_alloc lpc_ich mei_me mei shpchp drm i2c_algo_bit snd_timer snd soundcore wmi parport_pc parport video mac_hid dm_crypt hid_generic usbhid hid crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd psmouse ahci libahci sdhci_pci sdhci e1000e ptp pps_core
  [   64.456682] CPU: 1 PID: 1506 Comm: sudo Tainted: G      D    OX 3.13.0-51-generic #84-Ubuntu
  [   64.457483] Hardware name: Dell Inc.
  [   64.458281] task: ffff880037251800 ti: ffff8800368c4000 task.ti: ffff8800368c4000
  [   64.459095] RIP: 0010:[<ffffffff8136cb80>]  [<ffffffff8136cb80>] strlen+0x0/0x30
  [   64.459901] RSP: 0018:ffff8800368c5df0  EFLAGS: 00010286
  [   64.460707] RAX: ffff8800368c5d40 RBX: 000000000000068f RCX: 0000000000000000
  [   64.461522] RDX: 0000000000000037 RSI: 000000000000068f RDI: 000000000000068f
  [   64.462331] RBP: ffff8800368c5e08 R08: 0000000000000000 R09: 000000000000fffe
  [   64.463141] R10: 0000000000000000 R11: ffff8800368c5c06 R12: ffff8800379c6680
  [   64.463951] R13: 0000000000000000 R14: ffff8802121a8000 R15: 0000000000000000
  [   64.464753] FS:  00007fa9c5d73840(0000) GS:ffff88021ea80000(0000) knlGS:0000000000000000
  [   64.465558] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [   64.466367] CR2: 000000000000068f CR3: 00000000379b8000 CR4: 00000000001407e0
  [   64.467189] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  [   64.468003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  [   64.468803] Stack:
  [   64.469596]  ffffffff810f7fda ffff8800379c6680 ffff8802121a8060 ffff8800368c5e78
  [   64.470410]  ffffffff810f9581 0000000000000246 ffffffff81c55740 ffff8800368c5e60
  [   64.471217]  0000000000000246 ffff8800368c5ef0 ffff8800368c5e60 ffffffff810f6b93
  [   64.472024] Call Trace:
  [   64.472829]  [<ffffffff810f7fda>] ? audit_log_untrustedstring+0x1a/0x30
  [   64.473643]  [<ffffffff810f9581>] audit_log_name+0x281/0x320
  [   64.474454]  [<ffffffff810f6b93>] ? audit_buffer_free+0x73/0xa0
  [   64.475267]  [<ffffffff810fbe37>] audit_log_exit+0x3d7/0xb90
  [   64.476079]  [<ffffffff810fe5bf>] __audit_syscall_exit+0x27f/0x2e0
  [   64.476889]  [<ffffffff817331e4>] sysret_audit+0x17/0x21
  [   64.477680] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 <80> 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 
  [   64.479363] RIP  [<ffffffff8136cb80>] strlen+0x0/0x30
  [   64.480169]  RSP <ffff8800368c5df0>
  [   64.480975] CR2: 000000000000068f
  [   64.481784] ---[ end trace 267143d269f88f24 ]---

  # cat /proc/version_signature > version.log

  failed, but should have reported latest Ubuntu Trusty kernel

  # lspci -v

  Completely different systems (vmware guest, vbox guest, various
  hardware). Quite likely not related

  $ lsb_release -rd
  Description:    Ubuntu 14.04.2 LTS
  Release:        14.04

  
  $ apt-cache policy linux-image-3.13.0-51-generic
  linux-image-3.13.0-51-generic:
    Installed: 3.13.0-51.84
    Candidate: 3.13.0-51.84
    Version table:
   *** 3.13.0-51.84 0
          500 http://archive.ubuntu.com/ubuntu/ trusty-updates/main i386 Packages
          500 http://archive.ubuntu.com/ubuntu/ trusty-security/main i386 Packages
          100 /var/lib/dpkg/status

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360/+subscriptions


References