[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1316781869.4051.7.camel@cumari>
Date: Fri, 23 Sep 2011 15:44:29 +0300
From: Luciano Coelho <coelho@...com>
To: ecryptfs@...r.kernel.org, tyhicks@...ux.vnet.ibm.com,
kirkland@...onical.com
Cc: linux-kernel@...r.kernel.org
Subject: Oops in ecryptfs (apparently) with 3.1-rc6
Hi,
I just got this oops on my PC, while running 3.1-rc6 normally:
[255264.517298] Oops: 0000 [#1] SMP
[255264.517301] CPU 4
[255264.517303] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat dm_crypt pl2303 ftdi_sio usbserial cryptd aes_x86_64 aes_generic binfmt_misc snd_hda_codec_analog nvidia(P) snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi psmouse snd_rawmidi snd_seq_midi_event snd_seq snd_timer dell_wmi nfsd exportfs snd_seq_device serio_raw nfs sparse_keymap snd soundcore snd_page_alloc i7core_edac edac_core ppdev lp dcdbas lockd fscache auth_rpcgss nfs_acl sunrpc parport_pc parport usb_storage usbhid hid tg3
[255264.517341]
[255264.517343] Pid: 18110, comm: cat Tainted: P 3.1.0-rc6-custom #2 Dell Inc. Precision WorkStation T3500 /09KPNV
[255264.517348] RIP: 0010:[<ffffffff8125dddd>] [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
[255264.517353] RSP: 0018:ffff88031c03db78 EFLAGS: 00010246
[255264.517356] RAX: 0000000000000000 RBX: ffff88031c03db88 RCX: 0000000000000000
[255264.517358] RDX: 0000000000000010 RSI: ffff880170bd1ae0 RDI: 0000000000000000
[255264.517361] RBP: ffff88031c03dc38 R08: 0000000000000000 R09: ffff88031c03db88
[255264.517363] R10: 0000000000000000 R11: 0000000000000000 R12: ffff880170bd1a70
[255264.517366] R13: 0000000000001000 R14: ffffea0008351cc0 R15: ffff880170bd1b60
[255264.517369] FS: 00002b38b966bb20(0000) GS:ffff880333280000(0000) knlGS:0000000000000000
[255264.517372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[255264.517374] CR2: 0000000000000010 CR3: 000000010b9e6000 CR4: 00000000000006e0
[255264.517377] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[255264.517379] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[255264.517382] Process cat (pid: 18110, threadinfo ffff88031c03c000, task ffff88005f920000)
[255264.517385] Stack:
[255264.517386] 0000000000000000 0000000000000000 ffffea0008351cc2 0000100000000000
[255264.517391] 0000000000000000 0000000000000000 ffffea000964c302 0000100000000000
[255264.517395] 0000000000000000 0000000000000000 0000000000000000 ffff88031c03dbe8
[255264.517399] Call Trace:
[255264.517406] [<ffffffff81163f35>] ? vfs_read+0xc5/0x190
[255264.517409] [<ffffffff8125e0b2>] ecryptfs_decrypt_page+0xb2/0x190
[255264.517413] [<ffffffff8125bb08>] ecryptfs_readpage+0xd8/0x120
[255264.517418] [<ffffffff8110daf4>] generic_file_aio_read+0x234/0x740
[255264.517424] [<ffffffff8125863c>] ecryptfs_read_update_atime+0x1c/0x60
[255264.517428] [<ffffffff811637fa>] do_sync_read+0xda/0x120
[255264.517434] [<ffffffff81286a3b>] ? security_file_permission+0x8b/0x90
[255264.517438] [<ffffffff81163f35>] vfs_read+0xc5/0x190
[255264.517441] [<ffffffff81164101>] sys_read+0x51/0x90
[255264.517446] [<ffffffff815dc082>] system_call_fastpath+0x16/0x1b
[255264.517448] Code: 98 41 0f af c5 89 85 58 ff ff ff 49 8b 44 24 40 48 89 45 90 e8 c5 4d 37 00 49 8b 44 24 40 49 8b 54 24 20 49 8d 74 24 70 48 89 c7 <ff> 50 10 85 c0 0f 85 40 01 00 00 31 c0 44 89 ea 48 c7 c6 50 cf
[255264.517481] RIP [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
[255264.517485] RSP <ffff88031c03db78>
[255264.517487] CR2: 0000000000000010
[255264.517490] ---[ end trace 6beaa9aa4bd67546 ]---
My machine is a Dell Precision T3500 with an Intel Xeon quadcore,
running Ubuntu 10.10.
I didn't do anything different from what I usually do. This happened
while I started a cross-compilation of a kernel for ARM. I had been
running this kernel for about 8 days without a problem, until this
happened.
--
Cheers,
Luca.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists