[Bug 314701] Re: ecryptfs Oops
This bug was filed against a series that is no longer supported and so is being marked as Won't Fix. If this issue still exists in a supported series, please file a new bug. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/314701 Title: ecryptfs Oops To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/314701/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 314701] Re: ecryptfs Oops
I've intermittently seen the same stack trace in jaunty and karmic. Triggered by a cronjob that runs daily (although not triggering the oops every time) accessing a ~/Private directory mounted with ecryptfs over ext3. Jul 6 19:30:10 nimitz kernel: [ 3276.627422] Jul 6 19:30:10 nimitz kernel: [ 3276.627551] BUG: unable to handle kernel NULL pointer dereference at 0004 Jul 6 19:30:10 nimitz kernel: [ 3276.627555] IP: [c028683c] decrypt_scatterlist+0x3c/0xe0 Jul 6 19:30:10 nimitz kernel: [ 3276.627564] *pdpt = 3094b001 *pde = Jul 6 19:30:10 nimitz kernel: [ 3276.627568] Oops: [#1] SMP Jul 6 19:30:10 nimitz kernel: [ 3276.627571] last sysfs file: /sys/devices/virtual/net/tun1/statistics/collisions Jul 6 19:30:10 nimitz kernel: [ 3276.627574] Modules linked in: aes_i586 aes_generic ecb binfmt_misc radeon bridge stp bnep kvm_intel kvm tun sbp2 ieee1394 lp snd_hda_codec_atihdmi snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_usb_audio snd_pcm_oss snd_mixer_oss snd_pcm snd_usb_lib snd_seq_dummy snd_seq_oss iTCO_wdt snd_seq_midi pl2303 ppdev pcspkr iTCO_vendor_support snd_rawmidi snd_seq_midi_event parport_pc parport snd_hwdep snd_seq snd_timer snd_seq_device snd snd_page_alloc soundcore usbhid r8169 mii floppy raid10 raid456 raid6_pq async_xor async_memcpy async_tx xor raid1 raid0 multipath linear fbcon tileblit font bitblit softcursor i915 drm i2c_algo_bit video output intel_agp agpgart Jul 6 19:30:10 nimitz kernel: [ 3276.627630] Jul 6 19:30:10 nimitz kernel: [ 3276.627633] Pid: 5516, comm: gnucash-bin Not tainted (2.6.30-9-server #10-Ubuntu) EP35-DS3R Jul 6 19:30:10 nimitz kernel: [ 3276.627636] EIP: 0060:[c028683c] EFLAGS: 00010286 CPU: 1 Jul 6 19:30:10 nimitz kernel: [ 3276.627640] EIP is at decrypt_scatterlist+0x3c/0xe0 Jul 6 19:30:10 nimitz kernel: [ 3276.627642] EAX: fffc EBX: f307c678 ECX: 0010 EDX: f307c6c4 Jul 6 19:30:10 nimitz kernel: [ 3276.627645] ESI: fffc EDI: f307c730 EBP: f30c9c6c ESP: f30c9c40 Jul 6 19:30:10 nimitz kernel: [ 3276.627647] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 Jul 6 19:30:10 nimitz kernel: [ 3276.627650] Process gnucash-bin (pid: 5516, ti=f30c8000 task=f3348c70 task.ti=f30c8000) Jul 6 19:30:10 nimitz kernel: [ 3276.627652] Stack: Jul 6 19:30:10 nimitz kernel: [ 3276.627654] f30c9cb0 f30c9c98 fffc f30c9cc8 0200 Jul 6 19:30:10 nimitz kernel: [ 3276.627660] 1000 f30c9ce8 c02873f7 1000 f30c9cc8 c053da88 Jul 6 19:30:10 nimitz kernel: [ 3276.627667] eec855c4 c1640700 c1ee4ea0 f307c678 c1ee4ea2 Jul 6 19:30:10 nimitz kernel: [ 3276.627675] Call Trace: Jul 6 19:30:10 nimitz kernel: [ 3276.627677] [c02873f7] ? ecryptfs_decrypt_extent+0xf7/0x250 Jul 6 19:30:10 nimitz kernel: [ 3276.627682] [c053da88] ? _spin_lock+0x8/0x10 Jul 6 19:30:10 nimitz kernel: [ 3276.627687] [c0287df4] ? ecryptfs_decrypt_page+0x94/0x170 Jul 6 19:30:10 nimitz kernel: [ 3276.627691] [c01b0308] ? __inc_zone_page_state+0x18/0x20 Jul 6 19:30:10 nimitz kernel: [ 3276.627696] [c02850f7] ? ecryptfs_readpage+0xd7/0x130 Jul 6 19:30:10 nimitz kernel: [ 3276.627700] [c019efe4] ? add_to_page_cache_lru+0x44/0x70 Jul 6 19:30:10 nimitz kernel: [ 3276.627704] [c01a7127] ? read_pages+0xa7/0xc0 Jul 6 19:30:10 nimitz kernel: [ 3276.627707] [c01a72b8] ? __do_page_cache_readahead+0x178/0x1b0 Jul 6 19:30:10 nimitz kernel: [ 3276.627712] [c01a7500] ? ondemand_readahead+0xd0/0x150 Jul 6 19:30:10 nimitz kernel: [ 3276.627715] [c01a7628] ? page_cache_sync_readahead+0x28/0x30 Jul 6 19:30:10 nimitz kernel: [ 3276.627719] [c01a086e] ? T.865+0x30e/0x4b0 Jul 6 19:30:10 nimitz kernel: [ 3276.627723] [c01a0ad3] ? generic_file_aio_read+0xc3/0x270 Jul 6 19:30:10 nimitz kernel: [ 3276.627727] [c0282090] ? ecryptfs_open+0x120/0x280 Jul 6 19:30:10 nimitz kernel: [ 3276.627730] [c0281e8c] ? ecryptfs_read_update_atime+0x2c/0x70 Jul 6 19:30:10 nimitz kernel: [ 3276.627734] [c01d1a12] ? do_sync_read+0xd2/0x110 Jul 6 19:30:10 nimitz kernel: [ 3276.627739] [c01b919f] ? __vma_link+0x3f/0x80 Jul 6 19:30:10 nimitz kernel: [ 3276.627743] [c01566a0] ? autoremove_wake_function+0x0/0x40 Jul 6 19:30:10 nimitz kernel: [ 3276.627748] [c02a59ef] ? security_file_permission+0xf/0x20 Jul 6 19:30:10 nimitz kernel: [ 3276.627753] [c01d1ab3] ? rw_verify_area+0x63/0xd0 Jul 6 19:30:10 nimitz kernel: [ 3276.627756] [c01d1d29] ? vfs_read+0x99/0x170 Jul 6 19:30:10 nimitz kernel: [ 3276.627760] [c01d1940] ? do_sync_read+0x0/0x110 Jul 6 19:30:10 nimitz kernel: [ 3276.627763] [c01d2631] ? sys_read+0x41/0x70 Jul 6 19:30:10 nimitz kernel: [ 3276.627767] [c010939b] ? sysenter_do_call+0x12/0x28 Jul 6 19:30:10 nimitz kernel: [ 3276.627771] Code: 00 00 00 89 4d e0 8b 40 24 c7 45 f0 00 02 00 00 89 45 e8 8b 45 0c 89 45 ec 89 f8 e8 1f 5e 2b 00 8b 73 24 8d 53 4c 8b 4b 14 89 f0 ff 56 08 85 c0 75 75 8b 45 08 c7 44 24 04 55 7a 55 c0
[Bug 314701] Re: ecryptfs Oops
Unfortunately it seems this bug is still an issue. Can you confirm this issue exists with the most recent Jaunty Jackalope 9.04 release - http://www.ubuntu.com/news/ubuntu-9.04-desktop . If the issue remains in Jaunty, Please run the following command from a Terminal (Applications-Accessories-Terminal). It will automatically gather and attach updated debug information to this report. apport-collect -p linux-image-2.6.28-11-generic 314701 If you could also test the latest upstream kernel available that would be great. It will allow additional upstream developers to examine this issue. Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Once you've tested the upstream kernel, please remove the 'needs-upstream- testing' tag. This can be done by clicking on the yellow pencil icon next to the tag located at the bottom of the bug description and deleting the 'needs-upstream-testing' text. Please let us know your results. Thanks in advance. -JFo ** Changed in: linux (Ubuntu) Status: New = Incomplete ** Tags added: needs-kernel-logs needs-upstream-testing -- ecryptfs Oops https://bugs.launchpad.net/bugs/314701 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 314701] Re: ecryptfs Oops
This is a me too - kind of. I have linux-generic 2.6.27.11.14. Instead of reiser I use ext3. Like Thomas wrote: Everything is fine if I open the file with e.g. wc _before_ I open it with Emacs (I use emacs as it comes with Intrepid). The oops is triggered if I open it with emacs immediately. Kind regards Gerd ** Attachment added: dmesg.neu http://launchpadlibrarian.net/22470340/dmesg.neu -- ecryptfs Oops https://bugs.launchpad.net/bugs/314701 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs