Re: [Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread David Andruczyk
The problem was resolved in #86,  not #85

--
David J. Andruczyk
Systems Administrator
University IT - Enterprise Applications
44 Celebration Drive, Suite 3-100
Rochester, NY 14627
E-mail: david.andruc...@rochester.edu
Office: 585-275-9106


-Original Message-
From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf Of Pete 
Cheslock
Sent: Friday, May 15, 2015 11:55 AM
To: Andruczyk, David
Subject: [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer 
dereference at (null); Call Trace: [810fb39b] ? 
audit_compare_dname_path+0x2b/0xa0

I'm still able to recreate this issue with kernel version 3.13.0-52-generic 
#85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64
x86_64 x86_64 GNU/Linux

It looks like a different set of audit rules causes the same issue.

To replicate:
Install 3.13.0-52-generic kernel
apt-get install auditd

in /etc/audit/audit.rules
---
-D
-b 5000
-f 0
-r 15000
-a exit,always -F arch=b64 -S execve -S exit -S exit_group -S fork -S clone -S 
vfork -S accept -S accept4 -S connect -S bind -S listen
---

restart auditd
below stacktrace happens.


Stacktrace:

[  186.897309] BUG: unable to handle kernel NULL pointer dereference at 
0690
[  186.897322] IP: [8136cbb0] strlen+0x0/0x30
[  186.897331] PGD 0
[  186.897334] Oops:  [#1] SMP
[  186.897339] Modules linked in: dm_crypt crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel isofs aesni_intel aes_x86_64 glue_helper lrw gf128mul 
ablk_helper cryptd
[  186.897357] CPU: 0 PID: 2206 Comm: sudo Not tainted 3.13.0-52-generic 
#85-Ubuntu
[  186.897363] task: 880003286000 ti: 880002a04000 task.ti: 
880002a04000
[  186.897368] RIP: e030:[8136cbb0]  [8136cbb0] 
strlen+0x0/0x30
[  186.897375] RSP: e02b:880002a05df0  EFLAGS: 00010286
[  186.897379] RAX: 880002a05d40 RBX: 0690 RCX: 
[  186.897382] RDX: 0036 RSI: 0690 RDI: 0690
[  186.897385] RBP: 880002a05e08 R08:  R09: fffe
[  186.897389] R10:  R11: 880002a05c06 R12: 8801d298f340
[  186.897393] R13:  R14: 8801d0fa2000 R15: 
[  186.897401] FS:  7f4a94370840() GS:8801dee0() 
knlGS:
[  186.897408] CS:  e033 DS:  ES:  CR0: 8005003b
[  186.897412] CR2: 0690 CR3: 031f5000 CR4: 2660
[  186.897418] Stack:
[  186.897420]  810f7fda 8801d298f340 8801d0fa2060 
880002a05e78
[  186.897425]  810f9581 8172a480 81c55740 
880002a05e60
[  186.897430]  8172a480 880002a05ef0 880002a05e60 
810f6b93
[  186.897435] Call Trace:
[  186.897441]  [810f7fda] ? audit_log_untrustedstring+0x1a/0x30
[  186.897445]  [810f9581] audit_log_name+0x281/0x320
[  186.897451]  [8172a480] ? _raw_spin_unlock_irqrestore+0x20/0x40
[  186.897455]  [8172a480] ? _raw_spin_unlock_irqrestore+0x20/0x40
[  186.897459]  [810f6b93] ? audit_buffer_free+0x73/0xa0
[  186.897463]  [810fbe37] audit_log_exit+0x3d7/0xb90
[  186.897467]  [810fe5bf] __audit_syscall_exit+0x27f/0x2e0
[  186.897472]  [81733224] sysret_audit+0x17/0x21
[  186.897474] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
[  186.897508] RIP  [8136cbb0] strlen+0x0/0x30
[  186.897511]  RSP 880002a05df0
[  186.897513] CR2: 0690
[  186.897516] ---[ end trace 2626030fc35ecb54 ]---

-- 
You received this bug notification because you are subscribed to a
duplicate bug report (1450504).
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables 

Re: [Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread Simon Déziel
On 05/15/2015 11:55 AM, Pete Cheslock wrote:
 I'm still able to recreate this issue with kernel version
 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64
 x86_64 x86_64 GNU/Linux

The fix landed in the kernel (#86) right after the one you are running
(#85).

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread Pete Cheslock
I'm still able to recreate this issue with kernel version
3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64
x86_64 x86_64 GNU/Linux

It looks like a different set of audit rules causes the same issue.

To replicate:
Install 3.13.0-52-generic kernel
apt-get install auditd

in /etc/audit/audit.rules
---
-D
-b 5000
-f 0
-r 15000
-a exit,always -F arch=b64 -S execve -S exit -S exit_group -S fork -S clone -S 
vfork -S accept -S accept4 -S connect -S bind -S listen
---

restart auditd 
below stacktrace happens.


Stacktrace:

[  186.897309] BUG: unable to handle kernel NULL pointer dereference at 
0690
[  186.897322] IP: [8136cbb0] strlen+0x0/0x30
[  186.897331] PGD 0
[  186.897334] Oops:  [#1] SMP
[  186.897339] Modules linked in: dm_crypt crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel isofs aesni_intel aes_x86_64 glue_helper lrw gf128mul 
ablk_helper cryptd
[  186.897357] CPU: 0 PID: 2206 Comm: sudo Not tainted 3.13.0-52-generic 
#85-Ubuntu
[  186.897363] task: 880003286000 ti: 880002a04000 task.ti: 
880002a04000
[  186.897368] RIP: e030:[8136cbb0]  [8136cbb0] 
strlen+0x0/0x30
[  186.897375] RSP: e02b:880002a05df0  EFLAGS: 00010286
[  186.897379] RAX: 880002a05d40 RBX: 0690 RCX: 
[  186.897382] RDX: 0036 RSI: 0690 RDI: 0690
[  186.897385] RBP: 880002a05e08 R08:  R09: fffe
[  186.897389] R10:  R11: 880002a05c06 R12: 8801d298f340
[  186.897393] R13:  R14: 8801d0fa2000 R15: 
[  186.897401] FS:  7f4a94370840() GS:8801dee0() 
knlGS:
[  186.897408] CS:  e033 DS:  ES:  CR0: 8005003b
[  186.897412] CR2: 0690 CR3: 031f5000 CR4: 2660
[  186.897418] Stack:
[  186.897420]  810f7fda 8801d298f340 8801d0fa2060 
880002a05e78
[  186.897425]  810f9581 8172a480 81c55740 
880002a05e60
[  186.897430]  8172a480 880002a05ef0 880002a05e60 
810f6b93
[  186.897435] Call Trace:
[  186.897441]  [810f7fda] ? audit_log_untrustedstring+0x1a/0x30
[  186.897445]  [810f9581] audit_log_name+0x281/0x320
[  186.897451]  [8172a480] ? _raw_spin_unlock_irqrestore+0x20/0x40
[  186.897455]  [8172a480] ? _raw_spin_unlock_irqrestore+0x20/0x40
[  186.897459]  [810f6b93] ? audit_buffer_free+0x73/0xa0
[  186.897463]  [810fbe37] audit_log_exit+0x3d7/0xb90
[  186.897467]  [810fe5bf] __audit_syscall_exit+0x27f/0x2e0
[  186.897472]  [81733224] sysret_audit+0x17/0x21
[  186.897474] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
[  186.897508] RIP  [8136cbb0] strlen+0x0/0x30
[  186.897511]  RSP 880002a05df0
[  186.897513] CR2: 0690
[  186.897516] ---[ end trace 2626030fc35ecb54 ]---

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-15 Thread Pete Cheslock
Ah - crap - sorry about that.  You are right.  Thanks!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Chris J Arges
David,
Woo hoo. Thanks and sorry about the confusion regarding kernel versions earlier.

** Tags added: verification-done

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Chris J Arges
This kernel has the patches that fix the issue:
https://launchpad.net/ubuntu/+source/linux/3.13.0-52.86

If you can please verify this this kernel and post the results to this bug.
Thanks,

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread David Andruczyk
3.13.0-52.86 DOES work and no longer exhibits the crash/oops when
booted.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Adam Conrad
Right, the fix is in 3.13.0-52.86, not 3.13.0-52.85.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread David Andruczyk
3.13.0.52-85  still has the same panic related to the audit
subsystem

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Jinn Ko
Janne, good point.  There's another possible workaround in certain
circumstances.  You can also clear the auditd rules which should allow
you to continue working on a running system.  This would be done by
issuing an auditctl -D, after which you should be able to use the
running system, albeit without any auditing.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Jeroen Pulles
 Janne, good point. There's another possible workaround in certain
circumstances. You can also clear the auditd rules which should allow
you to continue working on a running system. This would be done by
issuing an auditctl -D, after which you should be able to use the
running system, albeit without any auditing.

 I have various systems with auditing that trigger the null reference
without audit rules on the specific pieces.  Ie. `chmod 0755
/run/foobar` hangs, even though a system only has a fs write rule for
/etc/something; I am not sure that clearing the rules is enough. Like
you said: possible and certain circumstances.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.16.0-37.51

---
linux (3.16.0-37.51) utopic; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1451489

  [ Upstream Kernel Changes ]

  * Fix a broken backport causing boot failure on gen8 Intel
- LP: #1449401

 -- Brad Figg brad.f...@canonical.com  Mon, 04 May 2015 09:42:43 -0700

** Changed in: linux (Ubuntu Utopic)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-52.86

---
linux (3.13.0-52.86) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1451288

  [ Upstream Kernel Changes ]

  * audit: create private file name copies when auditing inodes
- LP: #1450442

 -- Brad Figg brad.f...@canonical.com  Sun, 03 May 2015 18:36:19 -0700

** Changed in: linux (Ubuntu Utopic)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.16.0-37.51

---
linux (3.16.0-37.51) utopic; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1451489

  [ Upstream Kernel Changes ]

  * Fix a broken backport causing boot failure on gen8 Intel
- LP: #1449401

 -- Brad Figg brad.f...@canonical.com  Mon, 04 May 2015 09:42:43 -0700

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-52.86

---
linux (3.13.0-52.86) trusty; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1451288

  [ Upstream Kernel Changes ]

  * audit: create private file name copies when auditing inodes
- LP: #1450442

 -- Brad Figg brad.f...@canonical.com  Sun, 03 May 2015 18:36:19 -0700

** Changed in: linux (Ubuntu Trusty)
   Status: In Progress = Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-06 Thread Janne Snabb
I encountered this issue on a Hetzner VPS. It is a KVM based virtual
server, not VMware. After rebooting I was unable to login through ssh.
Accessing the system from console was possible thugh running many
commands resulted in Killed. The kernel stack trace was the same as in
the original bug report.

There is no quick and dirty workaround documented yet on this bug
report, so I add it.

Do the following to get your system quickly back to usable state while
waiting for the patched kernel:

1) disable starting auditd at boot (for example chmod 000
/etc/init.d/auditd is an easy and ugly way to do it)

2) reboot the system (in my case the reboot command did not work, I
had to hard-reset the system)

Done.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-05 Thread Alex Tomlins
I spoke too soon.  We're still seeing the occasional Oops on some
machines:

[   88.174304] BUG: unable to handle kernel NULL pointer dereference at 
  (null)
[   88.174377] IP: [8136cbb0] strlen+0x0/0x30
[   88.174445] PGD 79545067 PUD 7b108067 PMD 0
[   88.174478] Oops:  [#1] SMP
[   88.174502] Modules linked in: tcp_diag vmw_vsock_vmci_transport inet_diag 
vsock ip6t_REJECT xt_hl ip6t_rt ppdev nf_conntrack_ipv6 nf_defrag_ipv6 
ipt_REJECT xt_LOG xt_multiport xt_limit xt_tcpudp xt_addrtype crct10dif_pclmul 
crc32_pclmul nf_conntrack_ipv4 ghash_clmulni_intel nf_defrag_ipv4 aesni_intel 
vmw_balloon xt_conntrack aes_x86_64 lrw ip6table_filter gf128mul ip6_tables 
glue_helper nf_conntrack_netbios_ns nf_conntrack_broadcast ablk_helper 
nf_nat_ftp cryptd nf_nat serio_raw nf_conntrack_ftp nf_conntrack iptable_filter 
ip_tables x_tables vmwgfx ttm parport_pc drm i2c_piix4 vmw_vmci shpchp mac_hid 
lp parport psmouse mptspi mptscsih e1000 floppy vmw_pvscsi vmxnet3 mptbase
[   88.174962] CPU: 0 PID: 1742 Comm: rsyslogd Not tainted 3.13.0-52-generic 
#85-Ubuntu
[   88.175004] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
[   88.175060] task: 88007953e000 ti: 88007b5dc000 task.ti: 
88007b5dc000
[   88.175100] RIP: 0010:[8136cbb0]  [8136cbb0] 
strlen+0x0/0x30
[   88.175142] RSP: 0018:88007b5ddd60  EFLAGS: 00010206
[   88.175175] RAX: 0003 RBX: 0003 RCX: 0401
[   88.175212] RDX: 0005 RSI:  RDI: 
[   88.175250] RBP: 88007b5ddd90 R08: 88007b929e48 R09: 88007b5ddd60
[   88.175288] R10: 0002 R11: 88007bb32e00 R12: 0005
[   88.175325] R13:  R14: 88007af55578 R15: 88007b929c60
[   88.175372] FS:  7f8dd1056780() GS:88007fc0() 
knlGS:
[   88.175414] CS:  0010 DS:  ES:  CR0: 80050033
[   88.175444] CR2:  CR3: 7b107000 CR4: 000407f0
[   88.175528] Stack:
[   88.175543]  810fb39b  0004 
88007c502058
[   88.175591]  88007b929c00 88007b929c60 88007b5dddf8 
810fdb36
[   88.175639]  811d5710 00047c502058 88007af55540 
88003642f2b8
[   88.175687] Call Trace:
[   88.175733]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
[   88.175771]  [810fdb36] __audit_inode_child+0xb6/0x330
[   88.175819]  [811d5710] ? d_instantiate+0x50/0x70
[   88.176851]  [811ca090] vfs_mknod+0x110/0x160
[   88.177895]  [816bf4a5] unix_bind+0x2a5/0x360
[   88.178903]  [810ff142] ? __audit_sockaddr+0x42/0x80
[   88.179984]  [8160d4f0] SYSC_bind+0xe0/0x120
[   88.181090]  [8160e50e] SyS_bind+0xe/0x10
[   88.182224]  [817330fd] system_call_fastpath+0x1a/0x1f
[   88.183332] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
[   88.186941] RIP  [8136cbb0] strlen+0x0/0x30
[   88.188053]  RSP 88007b5ddd60
[   88.189135] CR2: 
[   88.190247] ---[ end trace e08453bad3880683 ]---

/proc/version_signature:
Ubuntu 3.13.0-52.85-generic 3.13.11-ckt18

uname -a:
Linux logs-cdn-1 3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-05 Thread Alex Tomlins
Scratch that last comment...

I see (from http://kernel.ubuntu.com/git/ubuntu/ubuntu-trusty.git/log/)
that the fix is not in Ubuntu 3.13.0-52.85.  We'll need to wait for
3.13.0-52.86...

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-04 Thread Philipp Kern
What's the ETA for trusty?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-04 Thread Chris J Arges
The fix is currently in the -proposed kernel. (3.13.0-52.85)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-04 Thread Roman Fiedler
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360 is marked
as duplicate. The fix from here changes the behaviour of the duplicate
(SSH login now working again, but still kernel OOPS).

So if both have common cause (very likely), then 3.13.0-52.85 is only
incomplete fix.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-01 Thread Chris J Arges
** Changed in: linux (Ubuntu)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-05-01 Thread Alex Tomlins
Hi Chris, thanks for the speedy response to this.

To add another confirmation:  I've tested your build on a couple of our
servers, and I'm no longer seeing the Oops, so this looks to have
addressed the issue.

thanks,
Alex

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Alex Tomlins
** Attachment added: lspci-vvnn.log
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+attachment/4388281/+files/lspci-vvnn.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  New

Bug description:
  After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on
  all our machines during boot.

  Example from one of our trusty machines:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Chris J Arges
I suspect commit 4a92843601ad0f5067f441d2f0dca55bbe18c076.

Commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b is also needed to fix
that, I'll build a test kernel with this in it so you can verify.

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Trusty)
 Assignee: (unassigned) = Chris J Arges (arges)

** Changed in: linux (Ubuntu Trusty)
   Status: New = Confirmed

** Changed in: linux (Ubuntu)
   Status: Confirmed = New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  New
Status in linux source package in Trusty:
  Confirmed

Bug description:
  After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on
  all our machines during boot.

  Example from one of our trusty machines:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Chris J Arges
** Also affects: linux (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Utopic)
 Assignee: (unassigned) = Chris J Arges (arges)

** Changed in: linux (Ubuntu Trusty)
   Status: Confirmed = In Progress

** Changed in: linux (Ubuntu Trusty)
   Importance: Undecided = Medium

** Changed in: linux (Ubuntu Utopic)
   Status: New = In Progress

** Changed in: linux (Ubuntu Utopic)
   Importance: Undecided = Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  New
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on
  all our machines during boot.

  Example from one of our trusty machines:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Chris J Arges
Alex,
Can you test the following build to see if it fixes your issue?
http://people.canonical.com/~arges/lp1450442/

Thanks

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on
  all our machines during boot.

  Example from one of our trusty machines:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Chris J Arges
** Description changed:

  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:
  
  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---
  
  We've also seen this on our precise machines that are running the
  backported trusty kernel.
  
  When reverting to kernel 3.13.0-49 this no longer occurs.
  
  [Test Case]
- Run an Ubuntu VMWare instance with the affected kernel. See crash on boot.
+ 1) Run an Ubuntu VMWare instance with the affected kernel.
+ 
+ apt-get install auditd
+ echo -w /etc/test /etc/audit/audit.rules
+ /etc/init.d/auditd restart
+ apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
+ reboot
+ attempt to login or ssh into the host - you'll get a similar stacktrace.
+ 
  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream
  
  --
  
- 
  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux
  
  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Chris J Arges
Sent patches for 3.13/3.16 to kernel team ML for review.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  1) Run an Ubuntu VMWare instance with the affected kernel.

  apt-get install auditd
  echo -w /etc/test /etc/audit/audit.rules
  /etc/init.d/auditd restart
  apt-get install linux-headers-3.13.0-51 linux-headers-3.13.0-51-generic 
linux-image-3.13.0-51-generic
  reboot
  attempt to login or ssh into the host - you'll get a similar stacktrace.

  
  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --

  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Chris J Arges
** Changed in: linux (Ubuntu Trusty)
   Importance: Medium = Critical

** Changed in: linux (Ubuntu Utopic)
   Importance: Medium = Critical

** Description changed:

- After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on all
- our machines during boot.
- 
- Example from one of our trusty machines:
+ [Impact]
+ Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:
  
  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---
  
  We've also seen this on our precise machines that are running the
  backported trusty kernel.
  
  When reverting to kernel 3.13.0-49 this no longer occurs.
  
+ [Test Case]
+ Run an Ubuntu VMWare instance with the affected kernel. See crash on boot.
+ 
+ [Fix]
+ commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream
+ 
+ --
+ 
+ 
  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux
  
  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Christopher M. Penalver
** Tags added: regression-update

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  Run an Ubuntu VMWare instance with the affected kernel. See crash on boot.

  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --


  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Pete Cheslock
I've tested the build from http://people.canonical.com/~arges/lp1450442/
- and i'm no longer able to replicate this issue.  This looks like it
works for me.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  Run an Ubuntu VMWare instance with the affected kernel. See crash on boot.

  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --


  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : 

[Kernel-packages] [Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [ffffffff810fb39b] ? audit_compare_dname_path+0x2b/0xa0

2015-04-30 Thread Pete Cheslock
It looks like this might be related?
https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1450643

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442

Title:
  Kernel Oops - unable to handle kernel NULL pointer dereference at
  (null);  Call Trace: [810fb39b] ?
  audit_compare_dname_path+0x2b/0xa0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress

Bug description:
  [Impact]
  Ubuntu VMWare instances running 3.13.0-51 will crash with the following 
backtrace:

  [   12.357276] BUG: unable to handle kernel NULL pointer dereference at   
(null)
  [   12.357886] IP: [8136cb80] strlen+0x0/0x30
  [   12.358457] PGD 230fe9067 PUD 230d5c067 PMD 0
  [   12.359034] Oops:  [#1] SMP
  [   12.359590] Modules linked in: tcp_diag inet_diag vmw_vsock_vmci_transport 
vsock ip6t_REJECT xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT 
xt_LOG xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 
xt_conntrack ip6table_filter ip6_tables nf_conntrack_netbios_ns 
nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack 
crct10dif_pclmul iptable_filter crc32_pclmul ip_tables ghash_clmulni_intel 
aesni_intel aes_x86_64 ppdev lrw x_tables gf128mul vmwgfx glue_helper 
ablk_helper cryptd ttm drm vmw_balloon serio_raw shpchp parport_pc lp i2c_piix4 
parport mac_hid vmw_vmci psmouse mptspi vmw_pvscsi e1000 mptscsih floppy 
vmxnet3 mptbase
  [   12.364773] CPU: 2 PID: 1718 Comm: fail2ban-server Not tainted 
3.13.0-51-generic #84-Ubuntu
  [   12.365587] Hardware name: VMware, Inc. VMware Virtual Platform/440BX 
Desktop Reference Platform, BIOS 6.00 04/14/2014
  [   12.367276] task: 880230fc3000 ti: 8802308c4000 task.ti: 
8802308c4000
  [   12.368159] RIP: 0010:[8136cb80]  [8136cb80] 
strlen+0x0/0x30
  [   12.369073] RSP: 0018:8802308c5d60  EFLAGS: 00010212
  [   12.369963] RAX: 000d RBX: 000d RCX: 
2df0
  [   12.370973] RDX: 0012 RSI:  RDI: 

  [   12.372005] RBP: 8802308c5d90 R08: 8800b9218648 R09: 
8802308c5d60
  [   12.372988] R10: 0002 R11: 88023082e180 R12: 
0012
  [   12.373901] R13:  R14: 880231f1b3f8 R15: 
8800b9218460
  [   12.374827] FS:  7f196f84c740() GS:88023fd0() 
knlGS:
  [   12.375752] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.376667] CR2:  CR3: 000230872000 CR4: 
000407e0
  [   12.377684] Stack:
  [   12.378612]  810fb39b  0004 
88022ff74838
  [   12.379559]  8800b9218400 8800b9218460 8802308c5df8 
810fdb36
  [   12.380516]  811d56e0 00042ff74838 880231f1b3c0 
88022febecf8
  [   12.381506] Call Trace:
  [   12.382630]  [810fb39b] ? audit_compare_dname_path+0x2b/0xa0
  [   12.383784]  [810fdb36] __audit_inode_child+0xb6/0x330
  [   12.384912]  [811d56e0] ? d_instantiate+0x50/0x70
  [   12.386013]  [811ca060] vfs_mknod+0x110/0x160
  [   12.387145]  [816bf475] unix_bind+0x2a5/0x360
  [   12.388207]  [810ff142] ? __audit_sockaddr+0x42/0x80
  [   12.389250]  [8160d4c0] SYSC_bind+0xe0/0x120
  [   12.390297]  [8172e9fa] ? do_page_fault+0x1a/0x70
  [   12.391303]  [8160e4de] SyS_bind+0xe/0x10
  [   12.392426]  [817330bd] system_call_fastpath+0x1a/0x1f
  [   12.393581] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 80 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
  [   12.396831] RIP  [8136cb80] strlen+0x0/0x30
  [   12.397812]  RSP 8802308c5d60
  [   12.398769] CR2: 
  [   12.399743] ---[ end trace 2c5a33d31a03347e ]---

  We've also seen this on our precise machines that are running the
  backported trusty kernel.

  When reverting to kernel 3.13.0-49 this no longer occurs.

  [Test Case]
  Run an Ubuntu VMWare instance with the affected kernel. See crash on boot.

  [Fix]
  commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b upstream

  --


  uname -a:
  Linux search-2 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 
x86_64 x86_64 x86_64 GNU/Linux

  cat /proc/version_signature:
  Ubuntu 3.13.0-51.84-generic 3.13.11-ckt18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp