The problem was resolved in #86, not #85
--
David J. Andruczyk
Systems Administrator
University IT - Enterprise Applications
44 Celebration Drive, Suite 3-100
Rochester, NY 14627
E-mail: david.andruc...@rochester.edu
Office: 585-275-9106
-Original Message-
From: boun...@canonical.com
On 05/15/2015 11:55 AM, Pete Cheslock wrote:
I'm still able to recreate this issue with kernel version
3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64
x86_64 x86_64 GNU/Linux
The fix landed in the kernel (#86) right after the one you are running
(#85).
--
You received
I'm still able to recreate this issue with kernel version
3.13.0-52-generic #85-Ubuntu SMP Wed Apr 29 16:44:17 UTC 2015 x86_64
x86_64 x86_64 GNU/Linux
It looks like a different set of audit rules causes the same issue.
To replicate:
Install 3.13.0-52-generic kernel
apt-get install auditd
in
Ah - crap - sorry about that. You are right. Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
David,
Woo hoo. Thanks and sorry about the confusion regarding kernel versions earlier.
** Tags added: verification-done
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
This kernel has the patches that fix the issue:
https://launchpad.net/ubuntu/+source/linux/3.13.0-52.86
If you can please verify this this kernel and post the results to this bug.
Thanks,
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
3.13.0-52.86 DOES work and no longer exhibits the crash/oops when
booted.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL
Right, the fix is in 3.13.0-52.86, not 3.13.0-52.85.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
3.13.0.52-85 still has the same panic related to the audit
subsystem
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL
Janne, good point. There's another possible workaround in certain
circumstances. You can also clear the auditd rules which should allow
you to continue working on a running system. This would be done by
issuing an auditctl -D, after which you should be able to use the
running system, albeit
Janne, good point. There's another possible workaround in certain
circumstances. You can also clear the auditd rules which should allow
you to continue working on a running system. This would be done by
issuing an auditctl -D, after which you should be able to use the
running system, albeit
This bug was fixed in the package linux - 3.16.0-37.51
---
linux (3.16.0-37.51) utopic; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1451489
[ Upstream Kernel Changes ]
* Fix a broken backport causing boot failure on gen8 Intel
- LP: #1449401
-- Brad
This bug was fixed in the package linux - 3.13.0-52.86
---
linux (3.13.0-52.86) trusty; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1451288
[ Upstream Kernel Changes ]
* audit: create private file name copies when auditing inodes
- LP: #1450442
--
This bug was fixed in the package linux - 3.16.0-37.51
---
linux (3.16.0-37.51) utopic; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1451489
[ Upstream Kernel Changes ]
* Fix a broken backport causing boot failure on gen8 Intel
- LP: #1449401
-- Brad
This bug was fixed in the package linux - 3.13.0-52.86
---
linux (3.13.0-52.86) trusty; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1451288
[ Upstream Kernel Changes ]
* audit: create private file name copies when auditing inodes
- LP: #1450442
--
I encountered this issue on a Hetzner VPS. It is a KVM based virtual
server, not VMware. After rebooting I was unable to login through ssh.
Accessing the system from console was possible thugh running many
commands resulted in Killed. The kernel stack trace was the same as in
the original bug
I spoke too soon. We're still seeing the occasional Oops on some
machines:
[ 88.174304] BUG: unable to handle kernel NULL pointer dereference at
(null)
[ 88.174377] IP: [8136cbb0] strlen+0x0/0x30
[ 88.174445] PGD 79545067 PUD 7b108067 PMD 0
[ 88.174478] Oops: [#1]
Scratch that last comment...
I see (from http://kernel.ubuntu.com/git/ubuntu/ubuntu-trusty.git/log/)
that the fix is not in Ubuntu 3.13.0-52.85. We'll need to wait for
3.13.0-52.86...
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
What's the ETA for trusty?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
(null); Call Trace:
The fix is currently in the -proposed kernel. (3.13.0-52.85)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360 is marked
as duplicate. The fix from here changes the behaviour of the duplicate
(SSH login now working again, but still kernel OOPS).
So if both have common cause (very likely), then 3.13.0-52.85 is only
incomplete fix.
--
You
** Changed in: linux (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer
Hi Chris, thanks for the speedy response to this.
To add another confirmation: I've tested your build on a couple of our
servers, and I'm no longer seeing the Oops, so this looks to have
addressed the issue.
thanks,
Alex
--
You received this bug notification because you are a member of Kernel
** Attachment added: lspci-vvnn.log
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+attachment/4388281/+files/lspci-vvnn.log
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I suspect commit 4a92843601ad0f5067f441d2f0dca55bbe18c076.
Commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b is also needed to fix
that, I'll build a test kernel with this in it so you can verify.
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in:
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Utopic)
Assignee: (unassigned) = Chris J Arges (arges)
** Changed in: linux (Ubuntu Trusty)
Status: Confirmed = In Progress
** Changed in: linux (Ubuntu Trusty)
Alex,
Can you test the following build to see if it fixes your issue?
http://people.canonical.com/~arges/lp1450442/
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
** Description changed:
[Impact]
Ubuntu VMWare instances running 3.13.0-51 will crash with the following
backtrace:
[ 12.357276] BUG: unable to handle kernel NULL pointer dereference at
(null)
[ 12.357886] IP: [8136cb80] strlen+0x0/0x30
[ 12.358457] PGD
Sent patches for 3.13/3.16 to kernel team ML for review.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
** Changed in: linux (Ubuntu Trusty)
Importance: Medium = Critical
** Changed in: linux (Ubuntu Utopic)
Importance: Medium = Critical
** Description changed:
- After upgrading to kernel 3.13.0-51 we've been seeing kernel Oops on all
- our machines during boot.
-
- Example from one of our
** Tags added: regression-update
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
(null); Call Trace:
I've tested the build from http://people.canonical.com/~arges/lp1450442/
- and i'm no longer able to replicate this issue. This looks like it
works for me.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
It looks like this might be related?
https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1450643
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops -
33 matches
Mail list logo