*** This bug is a duplicate of bug 1450442 *** https://bugs.launchpad.net/bugs/1450442
Sorry, was too fast. The patch works with some audit rulesets, but not all. And here is also the new OOPS for amd64: [ 424.803949] BUG: unable to handle kernel NULL pointer dereference at 0000000000000030 [ 424.804735] IP: [<ffffffff8136cbb0>] strlen+0x0/0x30 [ 424.804735] PGD 3905c067 PUD 3b49b067 PMD 0 [ 424.804735] Oops: 0000 [#1] SMP [ 424.804735] Modules linked in: dm_crypt xt_hashlimit xt_LOG ipt_REJECT xt_tcpudp xt_NFLOG nfnetlink_log nfnetlink xt_conntrack ppdev iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle ip_tables x_tables serio_raw parport_pc i2c_piix4 parport mac_hid psmouse ahci libahci pata_acpi [ 424.804735] CPU: 0 PID: 1343 Comm: augenrules Not tainted 3.13.0-52-generic #85-Ubuntu [ 424.804735] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 [ 424.804735] task: ffff8800374b8000 ti: ffff880039206000 task.ti: ffff880039206000 [ 424.804735] RIP: 0010:[<ffffffff8136cbb0>] [<ffffffff8136cbb0>] strlen+0x0/0x30 [ 424.804735] RSP: 0018:ffff880039207d90 EFLAGS: 00010286 [ 424.804735] RAX: ffff880039207d88 RBX: 0000000000000030 RCX: 0000000000000000 [ 424.804735] RDX: 0000000000000036 RSI: 0000000000000030 RDI: 0000000000000030 [ 424.804735] RBP: ffff880039207da8 R08: 0000000000000000 R09: 000000000000fffe [ 424.804735] R10: 0000000000000000 R11: ffff880039207ba6 R12: ffff8800396ad0c0 [ 424.804735] R13: 0000000000000000 R14: ffff8800392f0c00 R15: 0000000000000001 [ 424.804735] FS: 0000000000000000(0000) GS:ffff88003fc00000(0000) knlGS:0000000000000000 [ 424.804735] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [ 424.804735] CR2: 0000000000000030 CR3: 000000003751b000 CR4: 00000000000006f0 [ 424.804735] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 424.804735] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 424.804735] Stack: [ 424.804735] ffffffff810f7fda ffff8800396ad0c0 ffff8800392f0cc0 ffff880039207e18 [ 424.804735] ffffffff810f9581 0000000000000000 ffffffff00000000 ffff880000000000 [ 424.804735] 0000000000000000 ffff880039207e90 ffff880039207e00 ffffffff810f6b93 [ 424.804735] Call Trace: [ 424.804735] [<ffffffff810f7fda>] ? audit_log_untrustedstring+0x1a/0x30 [ 424.804735] [<ffffffff810f9581>] audit_log_name+0x281/0x320 [ 424.804735] [<ffffffff810f6b93>] ? audit_buffer_free+0x73/0xa0 [ 424.804735] [<ffffffff810fbe37>] audit_log_exit+0x3d7/0xb90 [ 424.804735] [<ffffffff810fe5bf>] __audit_syscall_exit+0x27f/0x2e0 [ 424.804735] [<ffffffff810212c2>] syscall_trace_leave+0xb2/0x110 [ 424.804735] [<ffffffff8173339f>] int_check_syscall_exit_work+0x34/0x3d [ 424.804735] Code: 89 f8 48 89 e5 f6 82 40 c7 84 81 20 74 15 0f 1f 44 00 00 48 83 c0 01 0f b6 10 f6 82 40 c7 84 81 20 75 f0 5d c3 66 0f 1f 44 00 00 <80> 3f 00 55 48 89 e5 74 15 48 89 f8 0f 1f 40 00 48 83 c0 01 80 [ 424.804735] RIP [<ffffffff8136cbb0>] strlen+0x0/0x30 [ 424.804735] RSP <ffff880039207d90> [ 424.804735] CR2: 0000000000000030 [ 424.833327] ---[ end trace b570aac2eeb41772 ]--- -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451360 Title: Kernel OOPS in 3.13.0-51 due to NULL pointer after kernel upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451360/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs