*** This bug is a duplicate of bug 1450442 ***
    https://bugs.launchpad.net/bugs/1450442

Sorry, was too fast. The patch works with some audit rulesets, but not
all.

And here is also the new OOPS for amd64:

[  424.803949] BUG: unable to handle kernel NULL pointer dereference at 
0000000000000030
[  424.804735] IP: [<ffffffff8136cbb0>] strlen+0x0/0x30
[  424.804735] PGD 3905c067 PUD 3b49b067 PMD 0 
[  424.804735] Oops: 0000 [#1] SMP 
[  424.804735] Modules linked in: dm_crypt xt_hashlimit xt_LOG ipt_REJECT 
xt_tcpudp xt_NFLOG nfnetlink_log nfnetlink xt_conntrack ppdev iptable_filter 
iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack 
iptable_mangle ip_tables x_tables serio_raw parport_pc i2c_piix4 parport 
mac_hid psmouse ahci libahci pata_acpi
[  424.804735] CPU: 0 PID: 1343 Comm: augenrules Not tainted 3.13.0-52-generic 
#85-Ubuntu
[  424.804735] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS 
VirtualBox 12/01/2006
[  424.804735] task: ffff8800374b8000 ti: ffff880039206000 task.ti: 
ffff880039206000
[  424.804735] RIP: 0010:[<ffffffff8136cbb0>]  [<ffffffff8136cbb0>] 
strlen+0x0/0x30
[  424.804735] RSP: 0018:ffff880039207d90  EFLAGS: 00010286
[  424.804735] RAX: ffff880039207d88 RBX: 0000000000000030 RCX: 0000000000000000
[  424.804735] RDX: 0000000000000036 RSI: 0000000000000030 RDI: 0000000000000030
[  424.804735] RBP: ffff880039207da8 R08: 0000000000000000 R09: 000000000000fffe
[  424.804735] R10: 0000000000000000 R11: ffff880039207ba6 R12: ffff8800396ad0c0
[  424.804735] R13: 0000000000000000 R14: ffff8800392f0c00 R15: 0000000000000001
[  424.804735] FS:  0000000000000000(0000) GS:ffff88003fc00000(0000) 
knlGS:0000000000000000
[  424.804735] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[  424.804735] CR2: 0000000000000030 CR3: 000000003751b000 CR4: 00000000000006f0
[  424.804735] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  424.804735] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  424.804735] Stack:
[  424.804735]  ffffffff810f7fda ffff8800396ad0c0 ffff8800392f0cc0 
ffff880039207e18
[  424.804735]  ffffffff810f9581 0000000000000000 ffffffff00000000 
ffff880000000000
[  424.804735]  0000000000000000 ffff880039207e90 ffff880039207e00 
ffffffff810f6b93
[  424.804735] Call Trace:
[  424.804735]  [<ffffffff810f7fda>] ? audit_log_untrustedstring+0x1a/0x30
[  424.804735]  [<ffffffff810f9581>] audit_log_name+0x281/0x320
[  424.804735]  [<ffffffff810f6b93>] ? audit_buffer_free+0x73/0xa0
[  424.804735]  [<ffffffff810fbe37>] audit_log_exit+0x3d7/0xb90
[  424.804735]  [<ffffffff810fe5bf>] __audit_syscall_exit+0x27f/0x2e0
[  424.804735]  [<ffffffff810212c2>] syscall_trace_leave+0xb2/0x110
[  424.804735]  [<ffffffff8173339f>] int_check_syscall_exit_work+0x34/0x3d
[  424.804735] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 
48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 <80> 3f 
00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 
[  424.804735] RIP  [<ffffffff8136cbb0>] strlen+0x0/0x30
[  424.804735]  RSP <ffff880039207d90>
[  424.804735] CR2: 0000000000000030
[  424.833327] ---[ end trace b570aac2eeb41772 ]---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451360

Title:
  Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to