[ 504.505697] eth0: link up, 100Mbps, full-duplex [ 514.732227] eth0: no IPv6 routers present [ 990.751928] CIFS VFS: Error connecting to socket. Aborting operation [ 990.751951] CIFS VFS: cifs_mount failed w/return code = -512 [ 1314.144815] CIFS VFS: Server requests plain text password but client support disabled [ 1314.153812] Status code returned 0xc000006d NT_STATUS_LOGON_FAILURE [ 1314.153830] CIFS VFS: Send error in SessSetup = -13 [ 1314.153913] CIFS VFS: cifs_mount failed w/return code = -13 [ 1758.742908] CIFS VFS: Server requests plain text password but client support disabled [ 1758.765724] Status code returned 0xc000006d NT_STATUS_LOGON_FAILURE [ 1758.765736] CIFS VFS: Send error in SessSetup = -13 [ 1758.765753] CIFS VFS: cifs_mount failed w/return code = -13 [ 2857.015784] eth0: link down [ 2863.012810] eth0: link up, 100Mbps, full-duplex [ 3444.008263] general protection fault: 0000 [#1] SMP [ 3444.009755] last sysfs file: /sys/devices/LNXSYSTM:00/device:00/PNP0A03:00/PNP0C0A:00/power_supply/BAT0/energy_full [ 3444.012062] CPU 0 [ 3444.012062] Modules linked in: nls_cp437 cifs binfmt_misc vboxvfs vboxvideo drm snd_intel8x0 snd_ac97_codec ac97_bus snd_pcm_oss snd_mixer_oss iptable_filter snd_pcm ip_tables x_tables snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer ppdev snd_seq_device i2c_piix4 psmouse serio_raw snd parport_pc vboxadd soundcore snd_page_alloc lp parport floppy pcnet32 mii [ 3444.012062] Pid: 1624, comm: indicator-apple Not tainted 2.6.31-14-generic #48-Ubuntu VirtualBox [ 3444.012062] RIP: 0010:[] [] __d_lookup+0x84/0x150 [ 3444.012062] RSP: 0018:ffff88002c199c28 EFLAGS: 00010202 [ 3444.012062] RAX: 662f6c656e72656b RBX: 662f6c656e72656b RCX: 0000000000000011 [ 3444.012062] RDX: 018721e010bbc6cb RSI: ffff88002c199d08 RDI: ffff880023875011 [ 3444.012062] RBP: ffff88002c199c78 R08: 0000000000000000 R09: 0000000000000000 [ 3444.109684] R10: 0000000000000000 R11: 0000000000000246 R12: 662f6c656e726553 [ 3444.109684] R13: ffff880035c01e40 R14: 000000001192d652 R15: ffff88002c199d18 [ 3444.109684] FS: 00007f3910a187d0(0000) GS:ffff8800019ee000(0000) knlGS:0000000000000000 [ 3444.109684] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3444.109684] CR2: 00007fa147fd0b24 CR3: 000000002c0c2000 CR4: 00000000000006f0 [ 3444.109684] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3444.109684] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 3444.109684] Process indicator-apple (pid: 1624, threadinfo ffff88002c198000, task ffff8800301e96b0) [ 3444.109684] Stack: [ 3444.109684] ffff880023875011 00000005811adb70 0000000000000005 ffff88002c199d08 [ 3444.109684] <0> ffff88002c199c78 ffff88002c199d18 ffff88002c199dd8 ffff88002c199d08 [ 3444.109684] <0> ffff880030063c00 ffff88002c199d18 ffff88002c199cc8 ffffffff81129dc1 [ 3444.109684] Call Trace: [ 3444.109684] [] do_lookup+0x31/0xe0 [ 3444.109684] [] __link_path_walk+0x155/0xdc0 [ 3444.109684] [] ? filldir+0x0/0xe0 [ 3444.109684] [] path_walk+0x57/0xb0 [ 3444.109684] [] do_path_lookup+0x53/0xa0 [ 3444.109684] [] user_path_at+0x52/0xa0 [ 3444.109684] [] ? ext4_readdir+0x83/0x4a0 [ 3444.109684] [] ? free_rb_tree_fname+0x74/0xd0 [ 3444.109684] [] ? _spin_lock+0x9/0x10 [ 3444.109684] [] ? _atomic_dec_and_lock+0x55/0x80 [ 3444.109684] [] vfs_fstatat+0x37/0x70 [ 3444.109684] [] ? __fput+0x194/0x210 [ 3444.109684] [] vfs_stat+0x16/0x20 [ 3444.109684] [] sys_newstat+0x1f/0x50 [ 3444.109684] [] ? fput+0x1d/0x30 [ 3444.109684] [] ? filp_close+0x58/0x90 [ 3444.109684] [] ? sys_close+0xb9/0x110 [ 3444.109684] [] system_call_fastpath+0x16/0x1b [ 3444.109684] Code: c1 e0 03 48 03 05 8d c2 6e 00 48 8b 18 8b 45 bc 48 85 db 48 89 45 c0 75 0e eb 78 0f 1f 40 00 48 8b 1b 48 85 db 74 6c 4c 8d 63 e8 <48> 8b 03 45 39 74 24 30 0f 18 08 75 e7 4d 39 6c 24 28 75 e0 4d [ 3444.109684] RIP [] __d_lookup+0x84/0x150 [ 3444.109684] RSP [ 3444.199406] ---[ end trace e767652c10b22653 ]--- [ 3490.663794] atkbd.c: Spurious NAK on isa0060/serio0. Some program might be trying access hardware directly.