Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
After update, desktop and production machines, both using i386 and amd64 kernels fail.
The crash may only occur after loading of syscall audit rules, hence boot up to initrd is still possible.
Login is still possible but many integral functions fail, e.g. sending signals to processes. Also sudo is not working any more
[ 64.447838] BUG: unable to handle kernel NULL pointer dereference at 000000000000068f
[ 64.448715] IP: [<ffffffff8136c
[ 64.449533] PGD 0
[ 64.450315] Oops: 0000 [#15] SMP
[ 64.451069] Modules linked in: pci_stub vboxpci(OX) vboxnetadp(OX) vboxnetflt(OX) vboxdrv(OX) nf_conntrack_
[ 64.456682] CPU: 1 PID: 1506 Comm: sudo Tainted: G D OX 3.13.0-51-generic #84-Ubuntu
[ 64.457483] Hardware name: Dell Inc.
[ 64.458281] task: ffff880037251800 ti: ffff8800368c4000 task.ti: ffff8800368c4000
[ 64.459095] RIP: 0010:[<
[ 64.459901] RSP: 0018:ffff880036
[ 64.460707] RAX: ffff8800368c5d40 RBX: 000000000000068f RCX: 0000000000000000
[ 64.461522] RDX: 0000000000000037 RSI: 000000000000068f RDI: 000000000000068f
[ 64.462331] RBP: ffff8800368c5e08 R08: 0000000000000000 R09: 000000000000fffe
[ 64.463141] R10: 0000000000000000 R11: ffff8800368c5c06 R12: ffff8800379c6680
[ 64.463951] R13: 0000000000000000 R14: ffff8802121a8000 R15: 0000000000000000
[ 64.464753] FS: 00007fa9c5d7384
[ 64.465558] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 64.466367] CR2: 000000000000068f CR3: 00000000379b8000 CR4: 00000000001407e0
[ 64.467189] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 64.468003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 64.468803] Stack:
[ 64.469596] ffffffff810f7fda ffff8800379c6680 ffff8802121a8060 ffff8800368c5e78
[ 64.470410] ffffffff810f9581 0000000000000246 ffffffff81c55740 ffff8800368c5e60
[ 64.471217] 0000000000000246 ffff8800368c5ef0 ffff8800368c5e60 ffffffff810f6b93
[ 64.472024] Call Trace:
[ 64.472829] [<ffffffff810f7
[ 64.473643] [<ffffffff810f9
[ 64.474454] [<ffffffff810f6
[ 64.475267] [<ffffffff810fb
[ 64.476079] [<ffffffff810fe
[ 64.476889] [<ffffffff81733
[ 64.477680] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 <80> 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80
[ 64.479363] RIP [<ffffffff8136c
[ 64.480169] RSP <ffff8800368c5df0>
[ 64.480975] CR2: 000000000000068f
[ 64.481784] ---[ end trace 267143d269f88f24 ]---
# cat /proc/version_
failed, but should have reported latest Ubuntu Trusty kernel
# lspci -v
Completely different systems (vmware guest, vbox guest, various hardware). Quite likely not related
$ lsb_release -rd
Description: Ubuntu 14.04.2 LTS
Release: 14.04
$ apt-cache policy linux-image-
linux-image-
Installed: 3.13.0-51.84
Candidate: 3.13.0-51.84
Version table:
*** 3.13.0-51.84 0
500 http://
500 http://
100 /var/lib/
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:
apport-collect 1451360
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.