Re: kernel BUG at fs/ecryptfs/read_write.c:47!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Aug 3, 2011 at 5:35 AM, Tomasz Chmielewski <mangoo@xxxxxxxx> wrote:
> I'm seeing this every few weeks on a system using ecryptfs for /home, with 3.0.0 kernel (saw it with 3.0.0 rc kernels as well).

Hi Tomasz,

We're getting a couple of similar reports about this.  Tyler Hicks is
trying to reproduce it now.

There's at least these two bugs in Launchpad, which you may or may not
wish to track:
 * https://bugs.launchpad.net/bugs/813146
 * https://bugs.launchpad.net/bugs/816387

> The device is a laptop, generally not rebooted, but suspended.
>
>
> [107817.958549] ecryptfs_encrypt_page: Error attempting to write lower page; rc = [-28]
> [107817.958562] ecryptfs_writepage: Error encrypting page (upper index [0x0000000000000127])
> [107817.982311] ecryptfs_encrypt_page: Error attempting to write lower page; rc = [-28]
> [107817.982329] ecryptfs_writepage: Error encrypting page (upper index [0x0000000000000128])
> [107818.172803] ecryptfs_encrypt_page: Error attempting to write lower page; rc = [-28]
> [107818.172821] ecryptfs_writepage: Error encrypting page (upper index [0x0000000000000005])
> [107849.184605] EXT4-fs (sda1): re-mounted. Opts: errors=remount-ro,discard,commit=0
> [108247.492737] ------------[ cut here ]------------
> [108247.496027] kernel BUG at /home/kernel-ppa/COD/linux/fs/ecryptfs/read_write.c:47!
> [108247.496027] invalid opcode: 0000 [#1] SMP
> [108247.496027] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat usb_storage uas binfmt_misc parport_pc ppdev sha256_generic cryptd aes_i586 aes_generic dm_crypt snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep joydev snd_pcm arc4 snd_seq_midi samsung_laptop snd_rawmidi ath9k mac80211 ath9k_common snd_seq_midi_event ath9k_hw snd_seq snd_timer snd_seq_device uvcvideo snd ath videodev cfg80211 psmouse serio_raw soundcore snd_page_alloc lp parport i915 drm_kms_helper drm r8169 i2c_algo_bit video
> [108247.496027]
> [108247.496027] Pid: 1538, comm: flush-ecryptfs- Not tainted 3.0.0-0300-generic #201107220917 SAMSUNG ELECTRONICS CO., LTD. N130                       /N130
> [108247.496027] EIP: 0060:[<c11ffd51>] EFLAGS: 00010246 CPU: 0
> [108247.496027] EIP is at ecryptfs_write_lower+0x61/0x70
> [108247.496027] EAX: ebc4ac80 EBX: f556ab80 ECX: 00000000 EDX: ec297000
> [108247.496027] ESI: 00000000 EDI: ebc4ac80 EBP: de92fd18 ESP: de92fd08
> [108247.496027]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
> [108247.496027] Process flush-ecryptfs- (pid: 1538, ti=de92e000 task=de931960 task.ti=de92e000)
> [108247.496027] Stack:
> [108247.496027]  00000000 f556ab80 ebc4ac80 00001000 de92fd5c c1202431 0012b000 00000000
> [108247.496027]  00001000 f556ab80 ebc4adfc ec297000 f51bd2e0 00000000 00000000 00000000
> [108247.496027]  0012b000 00000000 f556ab80 00000000 00000000 de92fd78 c11ff2c7 00000282
> [108247.496027] Call Trace:
> [108247.496027]  [<c1202431>] ecryptfs_encrypt_page+0xf1/0x1a0
> [108247.496027]  [<c11ff2c7>] ecryptfs_writepage+0x47/0x80
> [108247.496027]  [<c10e7ff0>] __writepage+0x10/0x40
> [108247.496027]  [<c10e95dd>] write_cache_pages+0x20d/0x370
> [108247.496027]  [<c10e7fe0>] ? __set_page_dirty_no_writeback+0x30/0x30
> [108247.496027]  [<c10e9780>] generic_writepages+0x40/0x60
> [108247.496027]  [<c10e97cc>] do_writepages+0x2c/0x40
> [108247.496027]  [<c114c5be>] writeback_single_inode+0xce/0x1e0
> [108247.496027]  [<c1141ab7>] ? iput_final+0x67/0x110
> [108247.496027]  [<c114c91a>] writeback_sb_inodes+0xba/0x150
> [108247.496027]  [<c114cad6>] writeback_inodes_wb+0xa6/0xd0
> [108247.496027]  [<c114ccd0>] wb_writeback+0x1d0/0x2f0
> [108247.496027]  [<c152e7df>] ? _raw_spin_lock_irqsave+0x2f/0x50
> [108247.496027]  [<c1056b4a>] ? lock_timer_base+0x2a/0x50
> [108247.496027]  [<c11412dd>] ? get_nr_dirty_inodes+0xd/0x20
> [108247.496027]  [<c114ce7d>] wb_check_old_data_flush+0x8d/0xa0
> [108247.496027]  [<c114cf84>] wb_do_writeback+0x74/0xc0
> [108247.496027]  [<c114d051>] bdi_writeback_thread+0x81/0x200
> [108247.496027]  [<c114cfd0>] ? wb_do_writeback+0xc0/0xc0
> [108247.496027]  [<c1067425>] kthread+0x75/0x80
> [108247.496027]  [<c10673b0>] ? kthread_bind+0x80/0x80
> [108247.496027]  [<c153603e>] kernel_thread_helper+0x6/0x10
> [108247.496027] Code: 24 8b 4d 10 e8 d1 b9 f2 ff ba 01 00 00 00 89 c3 89 e0 25 00 e0 ff ff 89 70 18 89 f8 e8 69 c5 f4 ff 89 d8 83 c4 04 5b 5e 5f 5d c3 <0f> 0b eb fe 8d 74 26 00 8d bc 27 00 00 00 00 55 89 e5 56 53 83
> [108247.496027] EIP: [<c11ffd51>] ecryptfs_write_lower+0x61/0x70 SS:ESP 0068:de92fd08
> [108247.752350] ---[ end trace 09d43839c5968eab ]---

I've seen a similar panic around writeback too.  I showed it to Tyler yesterday.

-- 
:-Dustin

Dustin Kirkland
Ubuntu Core Developer
--
To unsubscribe from this list: send the line "unsubscribe ecryptfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Crypto]     [Device Mapper Crypto]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux