lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110929143058.GA15933@boyd>
Date:	Thu, 29 Sep 2011 09:30:58 -0500
From:	Tyler Hicks <tyhicks@...onical.com>
To:	Luciano Coelho <coelho@...com>
Cc:	ecryptfs@...r.kernel.org, kirkland@...onical.com,
	linux-kernel@...r.kernel.org
Subject: Re: Oops in ecryptfs (apparently) with 3.1-rc6

On 2011-09-28 21:50:15, Luciano Coelho wrote:
> On Fri, 2011-09-23 at 15:44 +0300, Luciano Coelho wrote: 
> > I just got this oops on my PC, while running 3.1-rc6 normally:
> > 
> > [255264.517298] Oops: 0000 [#1] SMP 
> > [255264.517301] CPU 4 
> > [255264.517303] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat dm_crypt pl2303 ftdi_sio usbserial cryptd aes_x86_64 aes_generic binfmt_misc snd_hda_codec_analog nvidia(P) snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi psmouse snd_rawmidi snd_seq_midi_event snd_seq snd_timer dell_wmi nfsd exportfs snd_seq_device serio_raw nfs sparse_keymap snd soundcore snd_page_alloc i7core_edac edac_core ppdev lp dcdbas lockd fscache auth_rpcgss nfs_acl sunrpc parport_pc parport usb_storage usbhid hid tg3
> > [255264.517341] 
> > [255264.517343] Pid: 18110, comm: cat Tainted: P            3.1.0-rc6-custom #2 Dell Inc. Precision WorkStation T3500  /09KPNV
> > [255264.517348] RIP: 0010:[<ffffffff8125dddd>]  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
> > [255264.517353] RSP: 0018:ffff88031c03db78  EFLAGS: 00010246
> > [255264.517356] RAX: 0000000000000000 RBX: ffff88031c03db88 RCX: 0000000000000000
> > [255264.517358] RDX: 0000000000000010 RSI: ffff880170bd1ae0 RDI: 0000000000000000
> > [255264.517361] RBP: ffff88031c03dc38 R08: 0000000000000000 R09: ffff88031c03db88
> > [255264.517363] R10: 0000000000000000 R11: 0000000000000000 R12: ffff880170bd1a70
> > [255264.517366] R13: 0000000000001000 R14: ffffea0008351cc0 R15: ffff880170bd1b60
> > [255264.517369] FS:  00002b38b966bb20(0000) GS:ffff880333280000(0000) knlGS:0000000000000000
> > [255264.517372] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > [255264.517374] CR2: 0000000000000010 CR3: 000000010b9e6000 CR4: 00000000000006e0
> > [255264.517377] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > [255264.517379] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> > [255264.517382] Process cat (pid: 18110, threadinfo ffff88031c03c000, task ffff88005f920000)
> > [255264.517385] Stack:
> > [255264.517386]  0000000000000000 0000000000000000 ffffea0008351cc2 0000100000000000
> > [255264.517391]  0000000000000000 0000000000000000 ffffea000964c302 0000100000000000
> > [255264.517395]  0000000000000000 0000000000000000 0000000000000000 ffff88031c03dbe8
> > [255264.517399] Call Trace:
> > [255264.517406]  [<ffffffff81163f35>] ? vfs_read+0xc5/0x190
> > [255264.517409]  [<ffffffff8125e0b2>] ecryptfs_decrypt_page+0xb2/0x190
> > [255264.517413]  [<ffffffff8125bb08>] ecryptfs_readpage+0xd8/0x120
> > [255264.517418]  [<ffffffff8110daf4>] generic_file_aio_read+0x234/0x740
> > [255264.517424]  [<ffffffff8125863c>] ecryptfs_read_update_atime+0x1c/0x60
> > [255264.517428]  [<ffffffff811637fa>] do_sync_read+0xda/0x120
> > [255264.517434]  [<ffffffff81286a3b>] ? security_file_permission+0x8b/0x90
> > [255264.517438]  [<ffffffff81163f35>] vfs_read+0xc5/0x190
> > [255264.517441]  [<ffffffff81164101>] sys_read+0x51/0x90
> > [255264.517446]  [<ffffffff815dc082>] system_call_fastpath+0x16/0x1b
> > [255264.517448] Code: 98 41 0f af c5 89 85 58 ff ff ff 49 8b 44 24 40 48 89 45 90 e8 c5 4d 37 00 49 8b 44 24 40 49 8b 54 24 20 49 8d 74 24 70 48 89 c7 <ff> 50 10 85 c0 0f 85 40 01 00 00 31 c0 44 89 ea 48 c7 c6 50 cf 
> > [255264.517481] RIP  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
> > [255264.517485]  RSP <ffff88031c03db78>
> > [255264.517487] CR2: 0000000000000010
> > [255264.517490] ---[ end trace 6beaa9aa4bd67546 ]---
> 
> Did anyone else get a similar oops? Or does anyone have any clue what
> this is about? I haven't seen any fix that could be related to this, so
> I'm still really wary of using 3.1-rc*. ;)

I haven't seen that one. Was your kernel build using more than one job?

I'll take a closer look and try to reproduce it here. Thanks for the
report!

Tyler

> 
> -- 
> Cheers,
> Luca.
> 
> --
> To unsubscribe from this list: send the line "unsubscribe ecryptfs" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ