All of lore.kernel.org
 help / color / mirror / Atom feed
* Oops in ecryptfs (apparently) with 3.1-rc6
@ 2011-09-23 12:44 Luciano Coelho
  2011-09-28 18:50 ` Luciano Coelho
  0 siblings, 1 reply; 5+ messages in thread
From: Luciano Coelho @ 2011-09-23 12:44 UTC (permalink / raw)
  To: ecryptfs, tyhicks, kirkland; +Cc: linux-kernel

Hi,

I just got this oops on my PC, while running 3.1-rc6 normally:

[255264.517298] Oops: 0000 [#1] SMP 
[255264.517301] CPU 4 
[255264.517303] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat dm_crypt pl2303 ftdi_sio usbserial cryptd aes_x86_64 aes_generic binfmt_misc snd_hda_codec_analog nvidia(P) snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi psmouse snd_rawmidi snd_seq_midi_event snd_seq snd_timer dell_wmi nfsd exportfs snd_seq_device serio_raw nfs sparse_keymap snd soundcore snd_page_alloc i7core_edac edac_core ppdev lp dcdbas lockd fscache auth_rpcgss nfs_acl sunrpc parport_pc parport usb_storage usbhid hid tg3
[255264.517341] 
[255264.517343] Pid: 18110, comm: cat Tainted: P            3.1.0-rc6-custom #2 Dell Inc. Precision WorkStation T3500  /09KPNV
[255264.517348] RIP: 0010:[<ffffffff8125dddd>]  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
[255264.517353] RSP: 0018:ffff88031c03db78  EFLAGS: 00010246
[255264.517356] RAX: 0000000000000000 RBX: ffff88031c03db88 RCX: 0000000000000000
[255264.517358] RDX: 0000000000000010 RSI: ffff880170bd1ae0 RDI: 0000000000000000
[255264.517361] RBP: ffff88031c03dc38 R08: 0000000000000000 R09: ffff88031c03db88
[255264.517363] R10: 0000000000000000 R11: 0000000000000000 R12: ffff880170bd1a70
[255264.517366] R13: 0000000000001000 R14: ffffea0008351cc0 R15: ffff880170bd1b60
[255264.517369] FS:  00002b38b966bb20(0000) GS:ffff880333280000(0000) knlGS:0000000000000000
[255264.517372] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[255264.517374] CR2: 0000000000000010 CR3: 000000010b9e6000 CR4: 00000000000006e0
[255264.517377] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[255264.517379] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[255264.517382] Process cat (pid: 18110, threadinfo ffff88031c03c000, task ffff88005f920000)
[255264.517385] Stack:
[255264.517386]  0000000000000000 0000000000000000 ffffea0008351cc2 0000100000000000
[255264.517391]  0000000000000000 0000000000000000 ffffea000964c302 0000100000000000
[255264.517395]  0000000000000000 0000000000000000 0000000000000000 ffff88031c03dbe8
[255264.517399] Call Trace:
[255264.517406]  [<ffffffff81163f35>] ? vfs_read+0xc5/0x190
[255264.517409]  [<ffffffff8125e0b2>] ecryptfs_decrypt_page+0xb2/0x190
[255264.517413]  [<ffffffff8125bb08>] ecryptfs_readpage+0xd8/0x120
[255264.517418]  [<ffffffff8110daf4>] generic_file_aio_read+0x234/0x740
[255264.517424]  [<ffffffff8125863c>] ecryptfs_read_update_atime+0x1c/0x60
[255264.517428]  [<ffffffff811637fa>] do_sync_read+0xda/0x120
[255264.517434]  [<ffffffff81286a3b>] ? security_file_permission+0x8b/0x90
[255264.517438]  [<ffffffff81163f35>] vfs_read+0xc5/0x190
[255264.517441]  [<ffffffff81164101>] sys_read+0x51/0x90
[255264.517446]  [<ffffffff815dc082>] system_call_fastpath+0x16/0x1b
[255264.517448] Code: 98 41 0f af c5 89 85 58 ff ff ff 49 8b 44 24 40 48 89 45 90 e8 c5 4d 37 00 49 8b 44 24 40 49 8b 54 24 20 49 8d 74 24 70 48 89 c7 <ff> 50 10 85 c0 0f 85 40 01 00 00 31 c0 44 89 ea 48 c7 c6 50 cf 
[255264.517481] RIP  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
[255264.517485]  RSP <ffff88031c03db78>
[255264.517487] CR2: 0000000000000010
[255264.517490] ---[ end trace 6beaa9aa4bd67546 ]---

My machine is a Dell Precision T3500 with an Intel Xeon quadcore,
running Ubuntu 10.10.

I didn't do anything different from what I usually do.  This happened
while I started a cross-compilation of a kernel for ARM.  I had been
running this kernel for about 8 days without a problem, until this
happened.

-- 
Cheers,
Luca.


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Oops in ecryptfs (apparently) with 3.1-rc6
  2011-09-23 12:44 Oops in ecryptfs (apparently) with 3.1-rc6 Luciano Coelho
@ 2011-09-28 18:50 ` Luciano Coelho
  2011-09-28 19:14   ` Dustin Kirkland
  2011-09-29 14:30   ` Tyler Hicks
  0 siblings, 2 replies; 5+ messages in thread
From: Luciano Coelho @ 2011-09-28 18:50 UTC (permalink / raw)
  To: ecryptfs; +Cc: tyhicks, kirkland, linux-kernel

On Fri, 2011-09-23 at 15:44 +0300, Luciano Coelho wrote: 
> I just got this oops on my PC, while running 3.1-rc6 normally:
> 
> [255264.517298] Oops: 0000 [#1] SMP 
> [255264.517301] CPU 4 
> [255264.517303] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat dm_crypt pl2303 ftdi_sio usbserial cryptd aes_x86_64 aes_generic binfmt_misc snd_hda_codec_analog nvidia(P) snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi psmouse snd_rawmidi snd_seq_midi_event snd_seq snd_timer dell_wmi nfsd exportfs snd_seq_device serio_raw nfs sparse_keymap snd soundcore snd_page_alloc i7core_edac edac_core ppdev lp dcdbas lockd fscache auth_rpcgss nfs_acl sunrpc parport_pc parport usb_storage usbhid hid tg3
> [255264.517341] 
> [255264.517343] Pid: 18110, comm: cat Tainted: P            3.1.0-rc6-custom #2 Dell Inc. Precision WorkStation T3500  /09KPNV
> [255264.517348] RIP: 0010:[<ffffffff8125dddd>]  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
> [255264.517353] RSP: 0018:ffff88031c03db78  EFLAGS: 00010246
> [255264.517356] RAX: 0000000000000000 RBX: ffff88031c03db88 RCX: 0000000000000000
> [255264.517358] RDX: 0000000000000010 RSI: ffff880170bd1ae0 RDI: 0000000000000000
> [255264.517361] RBP: ffff88031c03dc38 R08: 0000000000000000 R09: ffff88031c03db88
> [255264.517363] R10: 0000000000000000 R11: 0000000000000000 R12: ffff880170bd1a70
> [255264.517366] R13: 0000000000001000 R14: ffffea0008351cc0 R15: ffff880170bd1b60
> [255264.517369] FS:  00002b38b966bb20(0000) GS:ffff880333280000(0000) knlGS:0000000000000000
> [255264.517372] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [255264.517374] CR2: 0000000000000010 CR3: 000000010b9e6000 CR4: 00000000000006e0
> [255264.517377] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [255264.517379] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [255264.517382] Process cat (pid: 18110, threadinfo ffff88031c03c000, task ffff88005f920000)
> [255264.517385] Stack:
> [255264.517386]  0000000000000000 0000000000000000 ffffea0008351cc2 0000100000000000
> [255264.517391]  0000000000000000 0000000000000000 ffffea000964c302 0000100000000000
> [255264.517395]  0000000000000000 0000000000000000 0000000000000000 ffff88031c03dbe8
> [255264.517399] Call Trace:
> [255264.517406]  [<ffffffff81163f35>] ? vfs_read+0xc5/0x190
> [255264.517409]  [<ffffffff8125e0b2>] ecryptfs_decrypt_page+0xb2/0x190
> [255264.517413]  [<ffffffff8125bb08>] ecryptfs_readpage+0xd8/0x120
> [255264.517418]  [<ffffffff8110daf4>] generic_file_aio_read+0x234/0x740
> [255264.517424]  [<ffffffff8125863c>] ecryptfs_read_update_atime+0x1c/0x60
> [255264.517428]  [<ffffffff811637fa>] do_sync_read+0xda/0x120
> [255264.517434]  [<ffffffff81286a3b>] ? security_file_permission+0x8b/0x90
> [255264.517438]  [<ffffffff81163f35>] vfs_read+0xc5/0x190
> [255264.517441]  [<ffffffff81164101>] sys_read+0x51/0x90
> [255264.517446]  [<ffffffff815dc082>] system_call_fastpath+0x16/0x1b
> [255264.517448] Code: 98 41 0f af c5 89 85 58 ff ff ff 49 8b 44 24 40 48 89 45 90 e8 c5 4d 37 00 49 8b 44 24 40 49 8b 54 24 20 49 8d 74 24 70 48 89 c7 <ff> 50 10 85 c0 0f 85 40 01 00 00 31 c0 44 89 ea 48 c7 c6 50 cf 
> [255264.517481] RIP  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
> [255264.517485]  RSP <ffff88031c03db78>
> [255264.517487] CR2: 0000000000000010
> [255264.517490] ---[ end trace 6beaa9aa4bd67546 ]---

Did anyone else get a similar oops? Or does anyone have any clue what
this is about? I haven't seen any fix that could be related to this, so
I'm still really wary of using 3.1-rc*. ;)

-- 
Cheers,
Luca.


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Oops in ecryptfs (apparently) with 3.1-rc6
  2011-09-28 18:50 ` Luciano Coelho
@ 2011-09-28 19:14   ` Dustin Kirkland
  2011-09-29 14:30   ` Tyler Hicks
  1 sibling, 0 replies; 5+ messages in thread
From: Dustin Kirkland @ 2011-09-28 19:14 UTC (permalink / raw)
  To: Luciano Coelho, Tyler Hicks; +Cc: ecryptfs, tyhicks, linux-kernel

On Wed, Sep 28, 2011 at 2:50 PM, Luciano Coelho <coelho@ti.com> wrote:
> On Fri, 2011-09-23 at 15:44 +0300, Luciano Coelho wrote:
>> I just got this oops on my PC, while running 3.1-rc6 normally:
>>
>> [255264.517298] Oops: 0000 [#1] SMP
>> [255264.517301] CPU 4
>> [255264.517303] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat dm_crypt pl2303 ftdi_sio usbserial cryptd aes_x86_64 aes_generic binfmt_misc snd_hda_codec_analog nvidia(P) snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi psmouse snd_rawmidi snd_seq_midi_event snd_seq snd_timer dell_wmi nfsd exportfs snd_seq_device serio_raw nfs sparse_keymap snd soundcore snd_page_alloc i7core_edac edac_core ppdev lp dcdbas lockd fscache auth_rpcgss nfs_acl sunrpc parport_pc parport usb_storage usbhid hid tg3
>> [255264.517341]
>> [255264.517343] Pid: 18110, comm: cat Tainted: P            3.1.0-rc6-custom #2 Dell Inc. Precision WorkStation T3500  /09KPNV
>> [255264.517348] RIP: 0010:[<ffffffff8125dddd>]  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
>> [255264.517353] RSP: 0018:ffff88031c03db78  EFLAGS: 00010246
>> [255264.517356] RAX: 0000000000000000 RBX: ffff88031c03db88 RCX: 0000000000000000
>> [255264.517358] RDX: 0000000000000010 RSI: ffff880170bd1ae0 RDI: 0000000000000000
>> [255264.517361] RBP: ffff88031c03dc38 R08: 0000000000000000 R09: ffff88031c03db88
>> [255264.517363] R10: 0000000000000000 R11: 0000000000000000 R12: ffff880170bd1a70
>> [255264.517366] R13: 0000000000001000 R14: ffffea0008351cc0 R15: ffff880170bd1b60
>> [255264.517369] FS:  00002b38b966bb20(0000) GS:ffff880333280000(0000) knlGS:0000000000000000
>> [255264.517372] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>> [255264.517374] CR2: 0000000000000010 CR3: 000000010b9e6000 CR4: 00000000000006e0
>> [255264.517377] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>> [255264.517379] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>> [255264.517382] Process cat (pid: 18110, threadinfo ffff88031c03c000, task ffff88005f920000)
>> [255264.517385] Stack:
>> [255264.517386]  0000000000000000 0000000000000000 ffffea0008351cc2 0000100000000000
>> [255264.517391]  0000000000000000 0000000000000000 ffffea000964c302 0000100000000000
>> [255264.517395]  0000000000000000 0000000000000000 0000000000000000 ffff88031c03dbe8
>> [255264.517399] Call Trace:
>> [255264.517406]  [<ffffffff81163f35>] ? vfs_read+0xc5/0x190
>> [255264.517409]  [<ffffffff8125e0b2>] ecryptfs_decrypt_page+0xb2/0x190
>> [255264.517413]  [<ffffffff8125bb08>] ecryptfs_readpage+0xd8/0x120
>> [255264.517418]  [<ffffffff8110daf4>] generic_file_aio_read+0x234/0x740
>> [255264.517424]  [<ffffffff8125863c>] ecryptfs_read_update_atime+0x1c/0x60
>> [255264.517428]  [<ffffffff811637fa>] do_sync_read+0xda/0x120
>> [255264.517434]  [<ffffffff81286a3b>] ? security_file_permission+0x8b/0x90
>> [255264.517438]  [<ffffffff81163f35>] vfs_read+0xc5/0x190
>> [255264.517441]  [<ffffffff81164101>] sys_read+0x51/0x90
>> [255264.517446]  [<ffffffff815dc082>] system_call_fastpath+0x16/0x1b
>> [255264.517448] Code: 98 41 0f af c5 89 85 58 ff ff ff 49 8b 44 24 40 48 89 45 90 e8 c5 4d 37 00 49 8b 44 24 40 49 8b 54 24 20 49 8d 74 24 70 48 89 c7 <ff> 50 10 85 c0 0f 85 40 01 00 00 31 c0 44 89 ea 48 c7 c6 50 cf
>> [255264.517481] RIP  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
>> [255264.517485]  RSP <ffff88031c03db78>
>> [255264.517487] CR2: 0000000000000010
>> [255264.517490] ---[ end trace 6beaa9aa4bd67546 ]---
>
> Did anyone else get a similar oops? Or does anyone have any clue what
> this is about? I haven't seen any fix that could be related to this, so
> I'm still really wary of using 3.1-rc*. ;)

I see that Tyler's former ibm.com email address is CC'd.  I'm copying
in Tyler's new email.  I think he'll be sending a merge request for an
update to the Maintainers file shortly...

-- 
:-Dustin

Dustin Kirkland
Manager, Systems Integration
Corporate Services
Canonical, LTD

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Oops in ecryptfs (apparently) with 3.1-rc6
  2011-09-28 18:50 ` Luciano Coelho
  2011-09-28 19:14   ` Dustin Kirkland
@ 2011-09-29 14:30   ` Tyler Hicks
  2011-09-29 19:28     ` Luciano Coelho
  1 sibling, 1 reply; 5+ messages in thread
From: Tyler Hicks @ 2011-09-29 14:30 UTC (permalink / raw)
  To: Luciano Coelho; +Cc: ecryptfs, kirkland, linux-kernel

[-- Attachment #1: Type: text/plain, Size: 4164 bytes --]

On 2011-09-28 21:50:15, Luciano Coelho wrote:
> On Fri, 2011-09-23 at 15:44 +0300, Luciano Coelho wrote: 
> > I just got this oops on my PC, while running 3.1-rc6 normally:
> > 
> > [255264.517298] Oops: 0000 [#1] SMP 
> > [255264.517301] CPU 4 
> > [255264.517303] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat dm_crypt pl2303 ftdi_sio usbserial cryptd aes_x86_64 aes_generic binfmt_misc snd_hda_codec_analog nvidia(P) snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi psmouse snd_rawmidi snd_seq_midi_event snd_seq snd_timer dell_wmi nfsd exportfs snd_seq_device serio_raw nfs sparse_keymap snd soundcore snd_page_alloc i7core_edac edac_core ppdev lp dcdbas lockd fscache auth_rpcgss nfs_acl sunrpc parport_pc parport usb_storage usbhid hid tg3
> > [255264.517341] 
> > [255264.517343] Pid: 18110, comm: cat Tainted: P            3.1.0-rc6-custom #2 Dell Inc. Precision WorkStation T3500  /09KPNV
> > [255264.517348] RIP: 0010:[<ffffffff8125dddd>]  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
> > [255264.517353] RSP: 0018:ffff88031c03db78  EFLAGS: 00010246
> > [255264.517356] RAX: 0000000000000000 RBX: ffff88031c03db88 RCX: 0000000000000000
> > [255264.517358] RDX: 0000000000000010 RSI: ffff880170bd1ae0 RDI: 0000000000000000
> > [255264.517361] RBP: ffff88031c03dc38 R08: 0000000000000000 R09: ffff88031c03db88
> > [255264.517363] R10: 0000000000000000 R11: 0000000000000000 R12: ffff880170bd1a70
> > [255264.517366] R13: 0000000000001000 R14: ffffea0008351cc0 R15: ffff880170bd1b60
> > [255264.517369] FS:  00002b38b966bb20(0000) GS:ffff880333280000(0000) knlGS:0000000000000000
> > [255264.517372] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > [255264.517374] CR2: 0000000000000010 CR3: 000000010b9e6000 CR4: 00000000000006e0
> > [255264.517377] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > [255264.517379] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> > [255264.517382] Process cat (pid: 18110, threadinfo ffff88031c03c000, task ffff88005f920000)
> > [255264.517385] Stack:
> > [255264.517386]  0000000000000000 0000000000000000 ffffea0008351cc2 0000100000000000
> > [255264.517391]  0000000000000000 0000000000000000 ffffea000964c302 0000100000000000
> > [255264.517395]  0000000000000000 0000000000000000 0000000000000000 ffff88031c03dbe8
> > [255264.517399] Call Trace:
> > [255264.517406]  [<ffffffff81163f35>] ? vfs_read+0xc5/0x190
> > [255264.517409]  [<ffffffff8125e0b2>] ecryptfs_decrypt_page+0xb2/0x190
> > [255264.517413]  [<ffffffff8125bb08>] ecryptfs_readpage+0xd8/0x120
> > [255264.517418]  [<ffffffff8110daf4>] generic_file_aio_read+0x234/0x740
> > [255264.517424]  [<ffffffff8125863c>] ecryptfs_read_update_atime+0x1c/0x60
> > [255264.517428]  [<ffffffff811637fa>] do_sync_read+0xda/0x120
> > [255264.517434]  [<ffffffff81286a3b>] ? security_file_permission+0x8b/0x90
> > [255264.517438]  [<ffffffff81163f35>] vfs_read+0xc5/0x190
> > [255264.517441]  [<ffffffff81164101>] sys_read+0x51/0x90
> > [255264.517446]  [<ffffffff815dc082>] system_call_fastpath+0x16/0x1b
> > [255264.517448] Code: 98 41 0f af c5 89 85 58 ff ff ff 49 8b 44 24 40 48 89 45 90 e8 c5 4d 37 00 49 8b 44 24 40 49 8b 54 24 20 49 8d 74 24 70 48 89 c7 <ff> 50 10 85 c0 0f 85 40 01 00 00 31 c0 44 89 ea 48 c7 c6 50 cf 
> > [255264.517481] RIP  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
> > [255264.517485]  RSP <ffff88031c03db78>
> > [255264.517487] CR2: 0000000000000010
> > [255264.517490] ---[ end trace 6beaa9aa4bd67546 ]---
> 
> Did anyone else get a similar oops? Or does anyone have any clue what
> this is about? I haven't seen any fix that could be related to this, so
> I'm still really wary of using 3.1-rc*. ;)

I haven't seen that one. Was your kernel build using more than one job?

I'll take a closer look and try to reproduce it here. Thanks for the
report!

Tyler

> 
> -- 
> Cheers,
> Luca.
> 
> --
> To unsubscribe from this list: send the line "unsubscribe ecryptfs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 836 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Oops in ecryptfs (apparently) with 3.1-rc6
  2011-09-29 14:30   ` Tyler Hicks
@ 2011-09-29 19:28     ` Luciano Coelho
  0 siblings, 0 replies; 5+ messages in thread
From: Luciano Coelho @ 2011-09-29 19:28 UTC (permalink / raw)
  To: Tyler Hicks; +Cc: ecryptfs, kirkland, linux-kernel

On Thu, 2011-09-29 at 09:30 -0500, Tyler Hicks wrote: 
> On 2011-09-28 21:50:15, Luciano Coelho wrote:
> > On Fri, 2011-09-23 at 15:44 +0300, Luciano Coelho wrote: 
> > > [255264.517399] Call Trace:
> > > [255264.517406]  [<ffffffff81163f35>] ? vfs_read+0xc5/0x190
> > > [255264.517409]  [<ffffffff8125e0b2>] ecryptfs_decrypt_page+0xb2/0x190
> > > [255264.517413]  [<ffffffff8125bb08>] ecryptfs_readpage+0xd8/0x120
> > > [255264.517418]  [<ffffffff8110daf4>] generic_file_aio_read+0x234/0x740
> > > [255264.517424]  [<ffffffff8125863c>] ecryptfs_read_update_atime+0x1c/0x60
> > > [255264.517428]  [<ffffffff811637fa>] do_sync_read+0xda/0x120
> > > [255264.517434]  [<ffffffff81286a3b>] ? security_file_permission+0x8b/0x90
> > > [255264.517438]  [<ffffffff81163f35>] vfs_read+0xc5/0x190
> > > [255264.517441]  [<ffffffff81164101>] sys_read+0x51/0x90
> > > [255264.517446]  [<ffffffff815dc082>] system_call_fastpath+0x16/0x1b
> > > [255264.517448] Code: 98 41 0f af c5 89 85 58 ff ff ff 49 8b 44 24 40 48 89 45 90 e8 c5 4d 37 00 49 8b 44 24 40 49 8b 54 24 20 49 8d 74 24 70 48 89 c7 <ff> 50 10 85 c0 0f 85 40 01 00 00 31 c0 44 89 ea 48 c7 c6 50 cf 
> > > [255264.517481] RIP  [<ffffffff8125dddd>] ecryptfs_decrypt_extent+0x13d/0x360
> > > [255264.517485]  RSP <ffff88031c03db78>
> > > [255264.517487] CR2: 0000000000000010
> > > [255264.517490] ---[ end trace 6beaa9aa4bd67546 ]---
> > 
> > Did anyone else get a similar oops? Or does anyone have any clue what
> > this is about? I haven't seen any fix that could be related to this, so
> > I'm still really wary of using 3.1-rc*. ;)
> 
> I haven't seen that one. Was your kernel build using more than one job?

Yes, I always build my kernel using 20 jobs on my quadcore with 8
threads.


> I'll take a closer look and try to reproduce it here. Thanks for the
> report!

You're welcome.  Let me know if you need any more info.  As I said
originally, I had been using the kernel for about a week before this
happened, so I'm not sure it's easily reproducible.

-- 
Cheers,
Luca.


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2011-09-29 19:28 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2011-09-23 12:44 Oops in ecryptfs (apparently) with 3.1-rc6 Luciano Coelho
2011-09-28 18:50 ` Luciano Coelho
2011-09-28 19:14   ` Dustin Kirkland
2011-09-29 14:30   ` Tyler Hicks
2011-09-29 19:28     ` Luciano Coelho

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.