*** This bug is a duplicate of bug 1450442 ***
    https://bugs.launchpad.net/bugs/1450442

The fix from 3.13.0-52.85 changes behavior (now SSH login working also
after first OOPS) but fix might be incomplete or there are two very
similar bugs.

New trace when using proposed:

[   31.077681] BUG: unable to handle kernel paging request at fffc0000
[   31.078064] IP: [<c12ff732>] strlen+0x12/0x20
[   31.078382] *pdpt = 0000000001aa1001 *pde = 0000000001aa8067 *pte = 
0000000000000000 
[   31.078996] Oops: 0000 [#10] SMP 
[   31.079287] Modules linked in: nf_conntrack_netlink dm_crypt xt_hashlimit 
ppdev ipt_REJECT xt_tcpudp xt_NFLOG nfnetlink_log nfnetlink xt_conntrack 
iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat 
nf_conntrack iptable_mangle ip_tables x_tables serio_raw parport_pc i2c_piix4 
parport mac_hid ahci psmouse libahci pata_acpi
[   31.081304] CPU: 0 PID: 1155 Comm: lesspipe Tainted: G      D       
3.13.0-52-generic #85-Ubuntu
[   31.081304] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS 
VirtualBox 12/01/2006
[   31.081304] task: df195b00 ti: dbfe6000 task.ti: dbfe6000
[   31.081304] EIP: 0060:[<c12ff732>] EFLAGS: 00010246 CPU: 0
[   31.081304] EIP is at strlen+0x12/0x20
[   31.081304] EAX: 00000000 EBX: fffc0000 ECX: ffffffff EDX: fffc0000
[   31.081304] ESI: dab4a9c0 EDI: fffc0000 EBP: dbfe7e94 ESP: dbfe7e90
[   31.081304]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[   31.081304] CR0: 8005003b CR2: fffc0000 CR3: 1bacc000 CR4: 000006f0
[   31.081304] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   31.081304] DR6: fffe0ff0 DR7: 00000400
[   31.081304] Stack:
[   31.081304]  00000000 dbfe7ea4 c10d4ad5 dab4a9c0 dc3580e0 dbfe7eec c10d5f0c 
dab4a9c0
[   31.081304]  c1845731 00000002 00000008 00000001 000081ed 00000000 00000000 
00000000
[   31.081304]  00000000 dc358000 00000000 dbfe7eec dc3580e0 dc3581d4 00000003 
dbfe7f78
[   31.081304] Call Trace:
[   31.081304]  [<c10d4ad5>] audit_log_untrustedstring+0x15/0x30
[   31.081304]  [<c10d5f0c>] audit_log_name+0x24c/0x2d0
[   31.081304]  [<c10d830b>] audit_log_exit+0x3ab/0xb30
[   31.081304]  [<c10d9424>] ? audit_filter_rules.isra.5+0x6d4/0xd30
[   31.081304]  [<c10d9afc>] ? audit_filter_syscall+0x7c/0xc0
[   31.081304]  [<c10da5cf>] __audit_syscall_exit+0x21f/0x270
[   31.081304]  [<c101a095>] syscall_trace_leave+0x65/0xb0
[   31.081304]  [<c1180f06>] ? SyS_execve+0x36/0x50
[   31.081304]  [<c165e15e>] syscall_exit_work+0x1a/0x1f
[   31.081304] Code: f7 be 01 00 00 00 89 f0 48 5e 5d c3 8d b6 00 00 00 00 8d 
bc 27 00 00 00 00 55 89 e5 57 3e 8d 74 26 00 b9 ff ff ff ff 89 c7 31 c0 <f2> ae 
b8 fe ff ff ff 29 c8 5f 5d c3 66 90 55 89 e5 57 3e 8d 74
[   31.081304] EIP: [<c12ff732>] strlen+0x12/0x20 SS:ESP 0068:dbfe7e90
[   31.081304] CR2: 00000000fffc0000
[   31.081304] ---[ end trace ff334322094381f6 ]---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451360

Title:
  Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to