*** This bug is a duplicate of bug 1450442 *** https://bugs.launchpad.net/bugs/1450442
The fix from 3.13.0-52.85 changes behavior (now SSH login working also after first OOPS) but fix might be incomplete or there are two very similar bugs. New trace when using proposed: [ 31.077681] BUG: unable to handle kernel paging request at fffc0000 [ 31.078064] IP: [<c12ff732>] strlen+0x12/0x20 [ 31.078382] *pdpt = 0000000001aa1001 *pde = 0000000001aa8067 *pte = 0000000000000000 [ 31.078996] Oops: 0000 [#10] SMP [ 31.079287] Modules linked in: nf_conntrack_netlink dm_crypt xt_hashlimit ppdev ipt_REJECT xt_tcpudp xt_NFLOG nfnetlink_log nfnetlink xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle ip_tables x_tables serio_raw parport_pc i2c_piix4 parport mac_hid ahci psmouse libahci pata_acpi [ 31.081304] CPU: 0 PID: 1155 Comm: lesspipe Tainted: G D 3.13.0-52-generic #85-Ubuntu [ 31.081304] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 [ 31.081304] task: df195b00 ti: dbfe6000 task.ti: dbfe6000 [ 31.081304] EIP: 0060:[<c12ff732>] EFLAGS: 00010246 CPU: 0 [ 31.081304] EIP is at strlen+0x12/0x20 [ 31.081304] EAX: 00000000 EBX: fffc0000 ECX: ffffffff EDX: fffc0000 [ 31.081304] ESI: dab4a9c0 EDI: fffc0000 EBP: dbfe7e94 ESP: dbfe7e90 [ 31.081304] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 [ 31.081304] CR0: 8005003b CR2: fffc0000 CR3: 1bacc000 CR4: 000006f0 [ 31.081304] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [ 31.081304] DR6: fffe0ff0 DR7: 00000400 [ 31.081304] Stack: [ 31.081304] 00000000 dbfe7ea4 c10d4ad5 dab4a9c0 dc3580e0 dbfe7eec c10d5f0c dab4a9c0 [ 31.081304] c1845731 00000002 00000008 00000001 000081ed 00000000 00000000 00000000 [ 31.081304] 00000000 dc358000 00000000 dbfe7eec dc3580e0 dc3581d4 00000003 dbfe7f78 [ 31.081304] Call Trace: [ 31.081304] [<c10d4ad5>] audit_log_untrustedstring+0x15/0x30 [ 31.081304] [<c10d5f0c>] audit_log_name+0x24c/0x2d0 [ 31.081304] [<c10d830b>] audit_log_exit+0x3ab/0xb30 [ 31.081304] [<c10d9424>] ? audit_filter_rules.isra.5+0x6d4/0xd30 [ 31.081304] [<c10d9afc>] ? audit_filter_syscall+0x7c/0xc0 [ 31.081304] [<c10da5cf>] __audit_syscall_exit+0x21f/0x270 [ 31.081304] [<c101a095>] syscall_trace_leave+0x65/0xb0 [ 31.081304] [<c1180f06>] ? SyS_execve+0x36/0x50 [ 31.081304] [<c165e15e>] syscall_exit_work+0x1a/0x1f [ 31.081304] Code: f7 be 01 00 00 00 89 f0 48 5e 5d c3 8d b6 00 00 00 00 8d bc 27 00 00 00 00 55 89 e5 57 3e 8d 74 26 00 b9 ff ff ff ff 89 c7 31 c0 <f2> ae b8 fe ff ff ff 29 c8 5f 5d c3 66 90 55 89 e5 57 3e 8d 74 [ 31.081304] EIP: [<c12ff732>] strlen+0x12/0x20 SS:ESP 0068:dbfe7e90 [ 31.081304] CR2: 00000000fffc0000 [ 31.081304] ---[ end trace ff334322094381f6 ]--- -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451360 Title: Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs