Re: [Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
The problem was resolved in #86, not #85 -- David J. Andruczyk Systems Administrator University IT - Enterprise Applications 44 Celebration Drive, Suite 3-100 Rochester, NY 14627 E-mail: david.andruc...@rochester.edu Office: 585-275-9106 -Original Message- From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf Of Pete Cheslock Sent: Friday, May 15, 2015 11:55 AM To: Andruczyk, David Subject: [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 I'm still able to recreate this issue with kernel version 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux It looks like a different set of audit rules causes the same issue. To replicate: Install 3.13.0-52-generic kernel apt-get install auditd in /etc/audit/audit.rules --- -D -b 5000 -f 0 -r 15000 -a exit,always -F arch=b64 -S execve -S exit -S exit_group -S fork -S clone -S vfork -S accept -S accept4 -S connect -S bind -S listen --- restart auditd below stacktrace happens. Stacktrace: [ 186.897309] BUG: unable to handle kernel NULL pointer dereference at 0690 [ 186.897322] IP: [8136cbb0] strlen+0x0/0x30 [ 186.897331] PGD 0 [ 186.897334] Oops: [#1] SMP [ 186.897339] Modules linked in: dm_crypt crct10dif_pclmul crc32_pclmul ghash_clmulni_intel isofs aesni_intel aes_x86_64 glue_helper lrw gf128mul ablk_helper cryptd [ 186.897357] CPU: 0 PID: 2206 Comm: sudo Not tainted 3.13.0-52-generic #85-Ubuntu [ 186.897363] task: 880003286000 ti: 880002a04000 task.ti: 880002a04000 [ 186.897368] RIP: e030:[8136cbb0] [8136cbb0] strlen+0x0/0x30 [ 186.897375] RSP: e02b:880002a05df0 EFLAGS: 00010286 [ 186.897379] RAX: 880002a05d40 RBX: 0690 RCX: [ 186.897382] RDX: 0036 RSI: 0690 RDI: 0690 [ 186.897385] RBP: 880002a05e08 R08: R09: fffe [ 186.897389] R10: R11: 880002a05c06 R12: 8801d298f340 [ 186.897393] R13: R14: 8801d0fa2000 R15: [ 186.897401] FS: 7f4a94370840() GS:8801dee0() knlGS: [ 186.897408] CS: e033 DS: ES: CR0: 8005003b [ 186.897412] CR2: 0690 CR3: 031f5000 CR4: 2660 [ 186.897418] Stack: [ 186.897420] 810f7fda 8801d298f340 8801d0fa2060 880002a05e78 [ 186.897425] 810f9581 8172a480 81c55740 880002a05e60 [ 186.897430] 8172a480 880002a05ef0 880002a05e60 810f6b93 [ 186.897435] Call Trace: [ 186.897441] [810f7fda] ? audit_log_untrustedstring+0x1a/0x30 [ 186.897445] [810f9581] audit_log_name+0x281/0x320 [ 186.897451] [8172a480] ? _raw_spin_unlock_irqrestore+0x20/0x40 [ 186.897455] [8172a480] ? _raw_spin_unlock_irqrestore+0x20/0x40 [ 186.897459] [810f6b93] ? audit_buffer_free+0x73/0xa0 [ 186.897463] [810fbe37] audit_log_exit+0x3d7/0xb90 [ 186.897467] [810fe5bf] __audit_syscall_exit+0x27f/0x2e0 [ 186.897472] [81733224] sysret_audit+0x17/0x21 [ 186.897474] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 186.897508] RIP [8136cbb0] strlen+0x0/0x30 [ 186.897511] RSP 880002a05df0 [ 186.897513] CR2: 0690 [ 186.897516] ---[ end trace 2626030fc35ecb54 ]--- -- You received this bug notification because you are subscribed to a duplicate bug report (1450504). https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables
Re: [Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
On 05/15/2015 11:55 AM, Pete Cheslock wrote: I'm still able to recreate this issue with kernel version 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux The fix landed in the kernel (#86) right after the one you are running (#85). -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
I'm still able to recreate this issue with kernel version 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux It looks like a different set of audit rules causes the same issue. To replicate: Install 3.13.0-52-generic kernel apt-get install auditd in /etc/audit/audit.rules --- -D -b 5000 -f 0 -r 15000 -a exit,always -F arch=b64 -S execve -S exit -S exit_group -S fork -S clone -S vfork -S accept -S accept4 -S connect -S bind -S listen --- restart auditd below stacktrace happens. Stacktrace: [ 186.897309] BUG: unable to handle kernel NULL pointer dereference at 0690 [ 186.897322] IP: [8136cbb0] strlen+0x0/0x30 [ 186.897331] PGD 0 [ 186.897334] Oops: [#1] SMP [ 186.897339] Modules linked in: dm_crypt crct10dif_pclmul crc32_pclmul ghash_clmulni_intel isofs aesni_intel aes_x86_64 glue_helper lrw gf128mul ablk_helper cryptd [ 186.897357] CPU: 0 PID: 2206 Comm: sudo Not tainted 3.13.0-52-generic #85-Ubuntu [ 186.897363] task: 880003286000 ti: 880002a04000 task.ti: 880002a04000 [ 186.897368] RIP: e030:[8136cbb0] [8136cbb0] strlen+0x0/0x30 [ 186.897375] RSP: e02b:880002a05df0 EFLAGS: 00010286 [ 186.897379] RAX: 880002a05d40 RBX: 0690 RCX: [ 186.897382] RDX: 0036 RSI: 0690 RDI: 0690 [ 186.897385] RBP: 880002a05e08 R08: R09: fffe [ 186.897389] R10: R11: 880002a05c06 R12: 8801d298f340 [ 186.897393] R13: R14: 8801d0fa2000 R15: [ 186.897401] FS: 7f4a94370840() GS:8801dee0() knlGS: [ 186.897408] CS: e033 DS: ES: CR0: 8005003b [ 186.897412] CR2: 0690 CR3: 031f5000 CR4: 2660 [ 186.897418] Stack: [ 186.897420] 810f7fda 8801d298f340 8801d0fa2060 880002a05e78 [ 186.897425] 810f9581 8172a480 81c55740 880002a05e60 [ 186.897430] 8172a480 880002a05ef0 880002a05e60 810f6b93 [ 186.897435] Call Trace: [ 186.897441] [810f7fda] ? audit_log_untrustedstring+0x1a/0x30 [ 186.897445] [810f9581] audit_log_name+0x281/0x320 [ 186.897451] [8172a480] ? _raw_spin_unlock_irqrestore+0x20/0x40 [ 186.897455] [8172a480] ? _raw_spin_unlock_irqrestore+0x20/0x40 [ 186.897459] [810f6b93] ? audit_buffer_free+0x73/0xa0 [ 186.897463] [810fbe37] audit_log_exit+0x3d7/0xb90 [ 186.897467] [810fe5bf] __audit_syscall_exit+0x27f/0x2e0 [ 186.897472] [81733224] sysret_audit+0x17/0x21 [ 186.897474] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 186.897508] RIP [8136cbb0] strlen+0x0/0x30 [ 186.897511] RSP 880002a05df0 [ 186.897513] CR2: 0690 [ 186.897516] ---[ end trace 2626030fc35ecb54 ]--- -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80]
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
Ah - crap - sorry about that. You are right. Thanks! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list:
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
David, Woo hoo. Thanks and sorry about the confusion regarding kernel versions earlier. ** Tags added: verification-done -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to:
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
This kernel has the patches that fix the issue: https://launchpad.net/ubuntu/+source/linux/3.13.0-52.86 If you can please verify this this kernel and post the results to this bug. Thanks, -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
3.13.0-52.86 DOES work and no longer exhibits the crash/oops when booted. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions --
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
Right, the fix is in 3.13.0-52.86, not 3.13.0-52.85. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list:
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
3.13.0.52-85 still has the same panic related to the audit subsystem -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions --
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
Janne, good point. There's another possible workaround in certain circumstances. You can also clear the auditd rules which should allow you to continue working on a running system. This would be done by issuing an auditctl -D, after which you should be able to use the running system, albeit without any auditing. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
Janne, good point. There's another possible workaround in certain circumstances. You can also clear the auditd rules which should allow you to continue working on a running system. This would be done by issuing an auditctl -D, after which you should be able to use the running system, albeit without any auditing. I have various systems with auditing that trigger the null reference without audit rules on the specific pieces. Ie. `chmod 0755 /run/foobar` hangs, even though a system only has a fs write rule for /etc/something; I am not sure that clearing the rules is enough. Like you said: possible and certain circumstances. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
This bug was fixed in the package linux - 3.16.0-37.51 --- linux (3.16.0-37.51) utopic; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1451489 [ Upstream Kernel Changes ] * Fix a broken backport causing boot failure on gen8 Intel - LP: #1449401 -- Brad Figg brad.f...@canonical.com Mon, 04 May 2015 09:42:43 -0700 ** Changed in: linux (Ubuntu Utopic) Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
This bug was fixed in the package linux - 3.13.0-52.86 --- linux (3.13.0-52.86) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1451288 [ Upstream Kernel Changes ] * audit: create private file name copies when auditing inodes - LP: #1450442 -- Brad Figg brad.f...@canonical.com Sun, 03 May 2015 18:36:19 -0700 ** Changed in: linux (Ubuntu Utopic) Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
This bug was fixed in the package linux - 3.16.0-37.51 --- linux (3.16.0-37.51) utopic; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1451489 [ Upstream Kernel Changes ] * Fix a broken backport causing boot failure on gen8 Intel - LP: #1449401 -- Brad Figg brad.f...@canonical.com Mon, 04 May 2015 09:42:43 -0700 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
This bug was fixed in the package linux - 3.13.0-52.86 --- linux (3.13.0-52.86) trusty; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1451288 [ Upstream Kernel Changes ] * audit: create private file name copies when auditing inodes - LP: #1450442 -- Brad Figg brad.f...@canonical.com Sun, 03 May 2015 18:36:19 -0700 ** Changed in: linux (Ubuntu Trusty) Status: In Progress = Fix Released ** Changed in: linux (Ubuntu Trusty) Status: In Progress = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Utopic: Fix Released Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
I encountered this issue on a Hetzner VPS. It is a KVM based virtual server, not VMware. After rebooting I was unable to login through ssh. Accessing the system from console was possible thugh running many commands resulted in Killed. The kernel stack trace was the same as in the original bug report. There is no quick and dirty workaround documented yet on this bug report, so I add it. Do the following to get your system quickly back to usable state while waiting for the patched kernel: 1) disable starting auditd at boot (for example chmod 000 /etc/init.d/auditd is an easy and ugly way to do it) 2) reboot the system (in my case the reboot command did not work, I had to hard-reset the system) Done. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
I spoke too soon. We're still seeing the occasional Oops on some machines: [ 88.174304] BUG: unable to handle kernel NULL pointer dereference at (null) [ 88.174377] IP: [8136cbb0] strlen+0x0/0x30 [ 88.174445] PGD 79545067 PUD 7b108067 PMD 0 [ 88.174478] Oops: [#1] SMP [ 88.174502] Modules linked in: tcp_diag vmw_vsock_vmci_transport inet_diag vsock ip6t_REJECT xt_hl ip6t_rt ppdev nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_multiport xt_limit xt_tcpudp xt_addrtype crct10dif_pclmul crc32_pclmul nf_conntrack_ipv4 ghash_clmulni_intel nf_defrag_ipv4 aesni_intel vmw_balloon xt_conntrack aes_x86_64 lrw ip6table_filter gf128mul ip6_tables glue_helper nf_conntrack_netbios_ns nf_conntrack_broadcast ablk_helper nf_nat_ftp cryptd nf_nat serio_raw nf_conntrack_ftp nf_conntrack iptable_filter ip_tables x_tables vmwgfx ttm parport_pc drm i2c_piix4 vmw_vmci shpchp mac_hid lp parport psmouse mptspi mptscsih e1000 floppy vmw_pvscsi vmxnet3 mptbase [ 88.174962] CPU: 0 PID: 1742 Comm: rsyslogd Not tainted 3.13.0-52-generic #85-Ubuntu [ 88.175004] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 88.175060] task: 88007953e000 ti: 88007b5dc000 task.ti: 88007b5dc000 [ 88.175100] RIP: 0010:[8136cbb0] [8136cbb0] strlen+0x0/0x30 [ 88.175142] RSP: 0018:88007b5ddd60 EFLAGS: 00010206 [ 88.175175] RAX: 0003 RBX: 0003 RCX: 0401 [ 88.175212] RDX: 0005 RSI: RDI: [ 88.175250] RBP: 88007b5ddd90 R08: 88007b929e48 R09: 88007b5ddd60 [ 88.175288] R10: 0002 R11: 88007bb32e00 R12: 0005 [ 88.175325] R13: R14: 88007af55578 R15: 88007b929c60 [ 88.175372] FS: 7f8dd1056780() GS:88007fc0() knlGS: [ 88.175414] CS: 0010 DS: ES: CR0: 80050033 [ 88.175444] CR2: CR3: 7b107000 CR4: 000407f0 [ 88.175528] Stack: [ 88.175543] 810fb39b 0004 88007c502058 [ 88.175591] 88007b929c00 88007b929c60 88007b5dddf8 810fdb36 [ 88.175639] 811d5710 00047c502058 88007af55540 88003642f2b8 [ 88.175687] Call Trace: [ 88.175733] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 88.175771] [810fdb36] __audit_inode_child+0xb6/0x330 [ 88.175819] [811d5710] ? d_instantiate+0x50/0x70 [ 88.176851] [811ca090] vfs_mknod+0x110/0x160 [ 88.177895] [816bf4a5] unix_bind+0x2a5/0x360 [ 88.178903] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 88.179984] [8160d4f0] SYSC_bind+0xe0/0x120 [ 88.181090] [8160e50e] SyS_bind+0xe/0x10 [ 88.182224] [817330fd] system_call_fastpath+0x1a/0x1f [ 88.183332] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 88.186941] RIP [8136cbb0] strlen+0x0/0x30 [ 88.188053] RSP 88007b5ddd60 [ 88.189135] CR2: [ 88.190247] ---[ end trace e08453bad3880683 ]--- /proc/version_signature: Ubuntu 3.13.0-52.85-generic 3.13.11-ckt18 uname -a: Linux logs-cdn-1 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
Scratch that last comment... I see (from http://kernel.ubuntu.com/git/ubuntu/ubuntu-trusty.git/log/) that the fix is not in Ubuntu 3.13.0-52.85. We'll need to wait for 3.13.0-52.86... -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
What's the ETA for trusty? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list:
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
The fix is currently in the -proposed kernel. (3.13.0-52.85) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list:
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360 is marked as duplicate. The fix from here changes the behaviour of the duplicate (SSH login now working again, but still kernel OOPS). So if both have common cause (very likely), then 3.13.0-52.85 is only incomplete fix. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
** Changed in: linux (Ubuntu) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions --
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
Hi Chris, thanks for the speedy response to this. To add another confirmation: I've tested your build on a couple of our servers, and I'm no longer seeing the Oops, so this looks to have addressed the issue. thanks, Alex -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
** Attachment added: lspci-vvnn.log https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+attachment/4388281/+files/lspci-vvnn.log -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: New Bug description: After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on all our machines during boot. Example from one of our trusty machines: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
I suspect commit 4a92843601ad0f5067f441d2f0dca55bbe18c076. Commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b is also needed to fix that, I'll build a test kernel with this in it so you can verify. ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Trusty) Assignee: (unassigned) = Chris J Arges (arges) ** Changed in: linux (Ubuntu Trusty) Status: New = Confirmed ** Changed in: linux (Ubuntu) Status: Confirmed = New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: New Status in linux source package in Trusty: Confirmed Bug description: After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on all our machines during boot. Example from one of our trusty machines: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list:
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
** Also affects: linux (Ubuntu Utopic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Utopic) Assignee: (unassigned) = Chris J Arges (arges) ** Changed in: linux (Ubuntu Trusty) Status: Confirmed = In Progress ** Changed in: linux (Ubuntu Trusty) Importance: Undecided = Medium ** Changed in: linux (Ubuntu Utopic) Status: New = In Progress ** Changed in: linux (Ubuntu Utopic) Importance: Undecided = Medium -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: New Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on all our machines during boot. Example from one of our trusty machines: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
Alex, Can you test the following build to see if it fixes your issue? http://people.canonical.com/~arges/lp1450442/ Thanks -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on all our machines during boot. Example from one of our trusty machines: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
** Description changed: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] - Run an Ubuntu VMWare instance with the affected kernel. See crash on boot. + 1) Run an Ubuntu VMWare instance with the affected kernel. + + apt-get install auditd + echo -w /etc/test /etc/audit/audit.rules + /etc/init.d/auditd restart + apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic + reboot + attempt to login or ssh into the host - you'll get a similar stacktrace. + [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- - uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
Sent patches for 3.13/3.16 to kernel team ML for review. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] 1) Run an Ubuntu VMWare instance with the affected kernel. apt-get install auditd echo -w /etc/test /etc/audit/audit.rules /etc/init.d/auditd restart apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic linux-image-3.13.0-51-generic reboot attempt to login or ssh into the host - you'll get a similar stacktrace. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list:
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
** Changed in: linux (Ubuntu Trusty) Importance: Medium = Critical ** Changed in: linux (Ubuntu Utopic) Importance: Medium = Critical ** Description changed: - After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on all - our machines during boot. - - Example from one of our trusty machines: + [Impact] + Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. + [Test Case] + Run an Ubuntu VMWare instance with the affected kernel. See crash on boot. + + [Fix] + commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream + + -- + + uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
** Tags added: regression-update -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] Run an Ubuntu VMWare instance with the affected kernel. See crash on boot. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
I've tested the build from http://people.canonical.com/~arges/lp1450442/ - and i'm no longer able to replicate this issue. This looks like it works for me. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] Run an Ubuntu VMWare instance with the affected kernel. See crash on boot. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help :
[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0
It looks like this might be related? https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1450643 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Bug description: [Impact] Ubuntu VMWare instances running 3.13.0-51 will crash with the following backtrace: [ 12.357276] BUG: unable to handle kernel NULL pointer dereference at (null) [ 12.357886] IP: [8136cb80] strlen+0x0/0x30 [ 12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0 [ 12.359034] Oops: [#1] SMP [ 12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy vmxnet3 mptbase [ 12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 3.13.0-51-generic #84-Ubuntu [ 12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/14/2014 [ 12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 8802308c4000 [ 12.368159] RIP: 0010:[8136cb80] [8136cb80] strlen+0x0/0x30 [ 12.369073] RSP: 0018:8802308c5d60 EFLAGS: 00010212 [ 12.369963] RAX: 000d RBX: 000d RCX: 2df0 [ 12.370973] RDX: 0012 RSI: RDI: [ 12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 8802308c5d60 [ 12.372988] R10: 0002 R11: 88023082e180 R12: 0012 [ 12.373901] R13: R14: 880231f1b3f8 R15: 8800b9218460 [ 12.374827] FS: 7f196f84c740() GS:88023fd0() knlGS: [ 12.375752] CS: 0010 DS: ES: CR0: 80050033 [ 12.376667] CR2: CR3: 000230872000 CR4: 000407e0 [ 12.377684] Stack: [ 12.378612] 810fb39b 0004 88022ff74838 [ 12.379559] 8800b9218400 8800b9218460 8802308c5df8 810fdb36 [ 12.380516] 811d56e0 00042ff74838 880231f1b3c0 88022febecf8 [ 12.381506] Call Trace: [ 12.382630] [810fb39b] ? audit_compare_dname_path+0x2b/0xa0 [ 12.383784] [810fdb36] __audit_inode_child+0xb6/0x330 [ 12.384912] [811d56e0] ? d_instantiate+0x50/0x70 [ 12.386013] [811ca060] vfs_mknod+0x110/0x160 [ 12.387145] [816bf475] unix_bind+0x2a5/0x360 [ 12.388207] [810ff142] ? __audit_sockaddr+0x42/0x80 [ 12.389250] [8160d4c0] SYSC_bind+0xe0/0x120 [ 12.390297] [8172e9fa] ? do_page_fault+0x1a/0x70 [ 12.391303] [8160e4de] SyS_bind+0xe/0x10 [ 12.392426] [817330bd] system_call_fastpath+0x1a/0x1f [ 12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 12.396831] RIP [8136cb80] strlen+0x0/0x30 [ 12.397812] RSP 8802308c5d60 [ 12.398769] CR2: [ 12.399743] ---[ end trace 2c5a33d31a03347e ]--- We've also seen this on our precise machines that are running the backported trusty kernel. When reverting to kernel 3.13.0-49 this no longer occurs. [Test Case] Run an Ubuntu VMWare instance with the affected kernel. See crash on boot. [Fix] commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream -- uname -a: Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux cat /proc/version_signature: Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp