[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4A716F41.80903@linux.vnet.ibm.com>
Date: Thu, 30 Jul 2009 15:30:33 +0530
From: Nageswara R Sastry <rnsastry@...ux.vnet.ibm.com>
To: linux-ext4 <linux-ext4@...r.kernel.org>
CC: rnsastry@...ux.vnet.ibm.com,
sachin p sant <sachinp@...ux.vnet.ibm.com>,
linux-s390 <linux-s390@...r.kernel.org>,
Ramon <rcvalle@...ux.vnet.ibm.com>, kamalesh@...ux.vnet.ibm.com
Subject: [Bug] kernel oops with 'fsfuzzer ecryptfs' at crypto_destroy_tfm+0x60/0x84
Hi,
Kernel Version - 2.6.31-rc4
Architecture - s390
Unable to handle kernel pointer dereference at virtual kernel address (null)
Oops: 0004 [#1] SMP
Modules linked in: cbc md5 aes_s390 aes_generic ecb ecryptfs loop
autofs4 lockd
sunrpc ipv6 qeth_l2 qeth qdio ccwgroup dm_round_robin dm_multipath scsi_dh
sd_mod scsi_mod multipath dm_snapshot dm_zero dm_mirror dm_region_hash
dm_log
dm_mod dasd_fba_mod dasd_eckd_mod dasd_mod ext3 jbd
CPU: 3 Not tainted 2.6.31-rc4 #1
Process umount (pid: 2976, task: 000000007ecf6770, ksp: 0000000078cf3e20)
Krnl PSW : 0704100180000000 00000000001adca6 (crypto_mod_put+0x2e/0x68)
R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:0 CC:1 PM:0 EA:3
Krnl GPRS: 0000000000000008 0000000000000001 0000000000000000
00000000ffffffff
000003e000000001 0000000000000000 000000007139f800
0000000000000000
0000000000000000 000000007ee58400 fffffffffffffffe
0000000000000000
0000000000000000 0000000000310a08 0000000078cf3c70
0000000078cf3c40
Krnl Code: 00000000001adc9e: 58502034 l %r5,52(%r2)
00000000001adca2: 1835 lr %r3,%r5
00000000001adca4: 1b31 sr %r3,%r1
>00000000001adca6: ba532034 cs %r5,%r3,52(%r2)
00000000001adcaa: a744fffc brc 4,1adca2
00000000001adcae: 5050f0a4 st %r5,164(%r15)
00000000001adcb2: 5030f0a0 st %r3,160(%r15)
00000000001adcb6: 5810f0a0 l %r1,160(%r15)
Call Trace:
([<0000000071367110>] 0x71367110)
[<00000000001add46>] crypto_destroy_tfm+0x66/0x84
[<000003e002acdf9e>] ecryptfs_destroy_crypt_stat+0x46/0xe0 [ecryptfs]
[<000003e002aca4d6>] ecryptfs_destroy_inode+0x102/0x120 [ecryptfs]
[<00000000000fe71a>] shrink_dcache_for_umount_subtree+0x27a/0x2e8
[<00000000000ff342>] shrink_dcache_for_umount+0x76/0x94
[<00000000000eccb0>] generic_shutdown_super+0x40/0x12c
[<00000000000ed34c>] deactivate_super+0xa0/0xc8
[<0000000000106690>] SyS_umount+0x324/0x384
[<00000000000267e6>] sysc_noemu+0x10/0x16
[<000002000013bec2>] 0x2000013bec2
Last Breaking-Event-Address:
[<00000000001add40>] crypto_destroy_tfm+0x60/0x84
---[ end trace 12da3f026a0e1321 ]---
*P.S. If you need any information please let me know. Please cc me as I
am not subscribed to the list.
Thanks and Regards
R.Nageswara Sastry
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists