[Bug 314701] Re: ecryptfs Oops

2011-07-18 Thread Brad Figg
This bug was filed against a series that is no longer supported and so
is being marked as Won't Fix. If this issue still exists in a supported
series, please file a new bug.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: Incomplete = Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/314701

Title:
  ecryptfs Oops

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/314701/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 314701] Re: ecryptfs Oops

2009-07-09 Thread Tristan Hill
I've intermittently seen the same stack trace in jaunty and karmic.
Triggered by a cronjob that runs daily (although not triggering the oops
every time) accessing a ~/Private directory mounted with ecryptfs over
ext3.

Jul  6 19:30:10 nimitz kernel: [ 3276.627422] 
Jul  6 19:30:10 nimitz kernel: [ 3276.627551] BUG: unable to handle kernel NULL 
pointer dereference at 0004
Jul  6 19:30:10 nimitz kernel: [ 3276.627555] IP: [c028683c] 
decrypt_scatterlist+0x3c/0xe0
Jul  6 19:30:10 nimitz kernel: [ 3276.627564] *pdpt = 3094b001 *pde = 
 
Jul  6 19:30:10 nimitz kernel: [ 3276.627568] Oops:  [#1] SMP 
Jul  6 19:30:10 nimitz kernel: [ 3276.627571] last sysfs file: 
/sys/devices/virtual/net/tun1/statistics/collisions
Jul  6 19:30:10 nimitz kernel: [ 3276.627574] Modules linked in: aes_i586 
aes_generic ecb binfmt_misc radeon bridge stp bnep kvm_intel kvm tun sbp2 
ieee1394 lp snd_hda_codec_atihdmi snd_hda_codec_realtek snd_hda_intel 
snd_hda_codec snd_usb_audio snd_pcm_oss snd_mixer_oss snd_pcm snd_usb_lib 
snd_seq_dummy snd_seq_oss iTCO_wdt snd_seq_midi pl2303 ppdev pcspkr 
iTCO_vendor_support snd_rawmidi snd_seq_midi_event parport_pc parport snd_hwdep 
snd_seq snd_timer snd_seq_device snd snd_page_alloc soundcore usbhid r8169 mii 
floppy raid10 raid456 raid6_pq async_xor async_memcpy async_tx xor raid1 raid0 
multipath linear fbcon tileblit font bitblit softcursor i915 drm i2c_algo_bit 
video output intel_agp agpgart
Jul  6 19:30:10 nimitz kernel: [ 3276.627630] 
Jul  6 19:30:10 nimitz kernel: [ 3276.627633] Pid: 5516, comm: gnucash-bin Not 
tainted (2.6.30-9-server #10-Ubuntu) EP35-DS3R
Jul  6 19:30:10 nimitz kernel: [ 3276.627636] EIP: 0060:[c028683c] EFLAGS: 
00010286 CPU: 1
Jul  6 19:30:10 nimitz kernel: [ 3276.627640] EIP is at 
decrypt_scatterlist+0x3c/0xe0
Jul  6 19:30:10 nimitz kernel: [ 3276.627642] EAX: fffc EBX: f307c678 ECX: 
0010 EDX: f307c6c4
Jul  6 19:30:10 nimitz kernel: [ 3276.627645] ESI: fffc EDI: f307c730 EBP: 
f30c9c6c ESP: f30c9c40
Jul  6 19:30:10 nimitz kernel: [ 3276.627647]  DS: 007b ES: 007b FS: 00d8 GS: 
00e0 SS: 0068
Jul  6 19:30:10 nimitz kernel: [ 3276.627650] Process gnucash-bin (pid: 5516, 
ti=f30c8000 task=f3348c70 task.ti=f30c8000)
Jul  6 19:30:10 nimitz kernel: [ 3276.627652] Stack:
Jul  6 19:30:10 nimitz kernel: [ 3276.627654]     
f30c9cb0 f30c9c98 fffc f30c9cc8 0200
Jul  6 19:30:10 nimitz kernel: [ 3276.627660]    1000 
f30c9ce8 c02873f7 1000 f30c9cc8 c053da88
Jul  6 19:30:10 nimitz kernel: [ 3276.627667]   eec855c4 c1640700 
 c1ee4ea0 f307c678 c1ee4ea2 
Jul  6 19:30:10 nimitz kernel: [ 3276.627675] Call Trace:
Jul  6 19:30:10 nimitz kernel: [ 3276.627677]  [c02873f7] ? 
ecryptfs_decrypt_extent+0xf7/0x250
Jul  6 19:30:10 nimitz kernel: [ 3276.627682]  [c053da88] ? 
_spin_lock+0x8/0x10
Jul  6 19:30:10 nimitz kernel: [ 3276.627687]  [c0287df4] ? 
ecryptfs_decrypt_page+0x94/0x170
Jul  6 19:30:10 nimitz kernel: [ 3276.627691]  [c01b0308] ? 
__inc_zone_page_state+0x18/0x20
Jul  6 19:30:10 nimitz kernel: [ 3276.627696]  [c02850f7] ? 
ecryptfs_readpage+0xd7/0x130
Jul  6 19:30:10 nimitz kernel: [ 3276.627700]  [c019efe4] ? 
add_to_page_cache_lru+0x44/0x70
Jul  6 19:30:10 nimitz kernel: [ 3276.627704]  [c01a7127] ? 
read_pages+0xa7/0xc0
Jul  6 19:30:10 nimitz kernel: [ 3276.627707]  [c01a72b8] ? 
__do_page_cache_readahead+0x178/0x1b0
Jul  6 19:30:10 nimitz kernel: [ 3276.627712]  [c01a7500] ? 
ondemand_readahead+0xd0/0x150
Jul  6 19:30:10 nimitz kernel: [ 3276.627715]  [c01a7628] ? 
page_cache_sync_readahead+0x28/0x30
Jul  6 19:30:10 nimitz kernel: [ 3276.627719]  [c01a086e] ? T.865+0x30e/0x4b0
Jul  6 19:30:10 nimitz kernel: [ 3276.627723]  [c01a0ad3] ? 
generic_file_aio_read+0xc3/0x270
Jul  6 19:30:10 nimitz kernel: [ 3276.627727]  [c0282090] ? 
ecryptfs_open+0x120/0x280
Jul  6 19:30:10 nimitz kernel: [ 3276.627730]  [c0281e8c] ? 
ecryptfs_read_update_atime+0x2c/0x70
Jul  6 19:30:10 nimitz kernel: [ 3276.627734]  [c01d1a12] ? 
do_sync_read+0xd2/0x110
Jul  6 19:30:10 nimitz kernel: [ 3276.627739]  [c01b919f] ? 
__vma_link+0x3f/0x80
Jul  6 19:30:10 nimitz kernel: [ 3276.627743]  [c01566a0] ? 
autoremove_wake_function+0x0/0x40
Jul  6 19:30:10 nimitz kernel: [ 3276.627748]  [c02a59ef] ? 
security_file_permission+0xf/0x20
Jul  6 19:30:10 nimitz kernel: [ 3276.627753]  [c01d1ab3] ? 
rw_verify_area+0x63/0xd0
Jul  6 19:30:10 nimitz kernel: [ 3276.627756]  [c01d1d29] ? 
vfs_read+0x99/0x170
Jul  6 19:30:10 nimitz kernel: [ 3276.627760]  [c01d1940] ? 
do_sync_read+0x0/0x110
Jul  6 19:30:10 nimitz kernel: [ 3276.627763]  [c01d2631] ? sys_read+0x41/0x70
Jul  6 19:30:10 nimitz kernel: [ 3276.627767]  [c010939b] ? 
sysenter_do_call+0x12/0x28
Jul  6 19:30:10 nimitz kernel: [ 3276.627771] Code: 00 00 00 89 4d e0 8b 40 24 
c7 45 f0 00 02 00 00 89 45 e8 8b 45 0c 89 45 ec 89 f8 e8 1f 5e 2b 00 8b 73 24 
8d 53 4c 8b 4b 14 89 f0 ff 56 08 85 c0 75 75 8b 45 08 c7 44 24 04 55 7a 55 c0 

[Bug 314701] Re: ecryptfs Oops

2009-07-08 Thread Jeremy Foshee
Unfortunately it seems this bug is still an issue.  Can you confirm this
issue exists with the most recent Jaunty Jackalope 9.04 release -
http://www.ubuntu.com/news/ubuntu-9.04-desktop .  If the issue remains
in Jaunty, Please run the following command from a Terminal
(Applications-Accessories-Terminal).  It will automatically gather and
attach updated debug information to this report.

apport-collect -p linux-image-2.6.28-11-generic 314701

If you could also test the latest upstream kernel available that would
be great.  It will allow additional upstream developers to examine this
issue.  Refer to https://wiki.ubuntu.com/KernelMainlineBuilds .  Once
you've tested the upstream kernel, please remove the 'needs-upstream-
testing' tag.  This can be done by clicking on the yellow pencil icon
next to the tag located at the bottom of the bug description and
deleting the 'needs-upstream-testing' text.  Please let us know your
results.

Thanks in advance.

-JFo

** Changed in: linux (Ubuntu)
   Status: New = Incomplete

** Tags added: needs-kernel-logs needs-upstream-testing

-- 
ecryptfs Oops
https://bugs.launchpad.net/bugs/314701
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 314701] Re: ecryptfs Oops

2009-02-10 Thread Gerd Bavendiek
This is a me too - kind of.

I have linux-generic  2.6.27.11.14. Instead of reiser I use ext3. Like
Thomas wrote: Everything is fine if I open the file with e.g. wc
_before_ I open it with Emacs (I use emacs as it comes with Intrepid).

The oops is triggered if I open it with emacs immediately.

Kind regards

Gerd

** Attachment added: dmesg.neu
   http://launchpadlibrarian.net/22470340/dmesg.neu

-- 
ecryptfs Oops
https://bugs.launchpad.net/bugs/314701
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs