Hi,

The following session was on Fedora 8 (kernel-2.6.23.1-42.fc8,
ecryptfs-utils-18-1.fc8):

[EMAIL PROTECTED] ~]# mkdir secret
[EMAIL PROTECTED] ~]# mount -t ecryptfs /root/secret /root/secret
Select key type to use for newly created files:
 1) openssl
 2) passphrase
Selection: 2
Passphrase:
Verify Passphrase:
Cipher
1) Triple-DES
2) AES-128
3) AES-192
4) AES-256
5) CAST6
6) Blowfish
7) CAST5
8) Twofish
Selection [AES-128]:
Enable plaintext passthrough (y/n): y
Attempting to mount with the following options:
  ecryptfs_passthrough
  ecryptfs_cipher=aes
  ecryptfs_key_bytes=16
  ecryptfs_sig=27aa52467bde3b5d
WARNING: Based on the contents of [/root/.ecryptfs/sig-cache.txt],
it looks like you have never mounted with this key
before. This could mean that you have typed your
passphrase wrong.

Would you like to proceed with the mount (yes/no)? yes
Would you like to append sig [27aa52467bde3b5d] to
[/root/.ecryptfs/sig-cache.txt]
in order to avoid this warning in the future (yes/no)? no
Not adding sig to user sig cache file; continuing with mount.
Mounted eCryptfs
[EMAIL PROTECTED] ~]# cd secret
[EMAIL PROTECTED] secret]# ls
[EMAIL PROTECTED] secret]# touch junk
[EMAIL PROTECTED] secret]# cat > junk
Segmentation fault
[EMAIL PROTECTED] secret]#
Message from [EMAIL PROTECTED] at Nov  9 00:31:23 ...
 kernel: ------------[ cut here ]------------

Message from [EMAIL PROTECTED] at Nov  9 00:31:23 ...
 kernel: invalid opcode: 0000 [1] SMP

[EMAIL PROTECTED] secret]# echo hello > junk
[EMAIL PROTECTED] ~]$
Message from [EMAIL PROTECTED] at Nov  9 00:31:39 ...
 kernel: ------------[ cut here ]------------

Message from [EMAIL PROTECTED] at Nov  9 00:31:39 ...
 kernel: invalid opcode: 0000 [2] SMP

At this point, dmesg shows the following:

SELinux: initialized (dev ecryptfs, type ecryptfs), uses xattr
Error opening lower file for lower_dentry [0xffff81004e995270],
lower_mnt [0xffff810037fece00], and flags [0x8003]
ecryptfs_open: Error opening lower file
------------[ cut here ]------------
kernel BUG at include/linux/dcache.h:322!
invalid opcode: 0000 [1] SMP
CPU 1
Modules linked in: cbc aes ecryptfs i915 drm nf_conntrack_ipv4
ipt_REJECT iptable_filter ip_tables nf_conntrack_ipv6 xt_state
nf_conntrack nfnetlink ip6t_REJECT ip6table_filter ip6_tables x_tables
ipv6 cpufreq_ondemand acpi_cpufreq dm_mirror dm_multipath dm_mod arc4
ecb blkcipher snd_hda_intel snd_seq_dummy snd_seq_oss firewire_ohci
snd_seq_midi_event firewire_core snd_seq iwl3945 snd_seq_device
snd_pcm_oss sdhci b44 snd_mixer_oss mmc_core ssb mac80211 ac video
button battery iTCO_wdt crc_itu_t iTCO_vendor_support output i2c_i801
mii snd_pcm joydev i2c_core cfg80211 snd_timer snd_page_alloc
snd_hwdep snd soundcore sr_mod sg cdrom ata_generic ata_piix libata
sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd
Pid: 3445, comm: bash Not tainted 2.6.23.1-42.fc8 #1
RIP: 0010:[<ffffffff8836f1a4>]  [<ffffffff8836f1a4>]
:ecryptfs:ecryptfs_open_lower_file+0x1d/0x83
RSP: 0018:ffff81004eb2bdd8  EFLAGS: 00010246
RAX: ffff81007d6afa98 RBX: ffff81004e995270 RCX: 0000000000000003
RDX: ffff810037fece00 RSI: ffff81004e995270 RDI: ffff81004eb2be28
RBP: ffff810037fece00 R08: ffff81004eb2bd88 R09: 0000000000000000
R10: ffff81004eb2bb78 R11: 00000000000c000c R12: ffff81004e4685b8
R13: ffff81004eb2be28 R14: ffff810037fece00 R15: ffff81004e9951a0
FS:  00002aaaaaac1f50(0000) GS:ffff810037cd8300(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000000004873b0 CR3: 000000004eb88000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process bash (pid: 3445, threadinfo ffff81004eb2a000, task ffff810078092810)
Stack:  ffff8100523dd500 ffff81004e468380 ffff8100523dd500 ffff81004e4685b8
 ffff81004e4686d8 ffffffff8836f545 ffff81004e468380 ffff810053b50e08
 ffff81004e995270 0000000000000000 0000000000000000 ffff8100523dd500
Call Trace:
 [<ffffffff8836f545>] :ecryptfs:ecryptfs_open+0x12a/0x28b
 [<ffffffff8836f41b>] :ecryptfs:ecryptfs_open+0x0/0x28b
 [<ffffffff8109a0e8>] __dentry_open+0xf4/0x1c5
 [<ffffffff8109a26d>] do_filp_open+0x2a/0x38
 [<ffffffff81099f40>] get_unused_fd_flags+0x72/0x11f
 [<ffffffff8109a2c1>] do_sys_open+0x46/0xc3
 [<ffffffff8100bd45>] tracesys+0xd5/0xda


Code: 0f 0b eb fe f0 ff 06 48 85 ed 74 07 f0 ff 85 c0 00 00 00 41
RIP  [<ffffffff8836f1a4>] :ecryptfs:ecryptfs_open_lower_file+0x1d/0x83
 RSP <ffff81004eb2bdd8>
------------[ cut here ]------------
kernel BUG at include/linux/dcache.h:322!
invalid opcode: 0000 [2] SMP
CPU 1
Modules linked in: cbc aes ecryptfs i915 drm nf_conntrack_ipv4
ipt_REJECT iptable_filter ip_tables nf_conntrack_ipv6 xt_state
nf_conntrack nfnetlink ip6t_REJECT ip6table_filter ip6_tables x_tables
ipv6 cpufreq_ondemand acpi_cpufreq dm_mirror dm_multipath dm_mod arc4
ecb blkcipher snd_hda_intel snd_seq_dummy snd_seq_oss firewire_ohci
snd_seq_midi_event firewire_core snd_seq iwl3945 snd_seq_device
snd_pcm_oss sdhci b44 snd_mixer_oss mmc_core ssb mac80211 ac video
button battery iTCO_wdt crc_itu_t iTCO_vendor_support output i2c_i801
mii snd_pcm joydev i2c_core cfg80211 snd_timer snd_page_alloc
snd_hwdep snd soundcore sr_mod sg cdrom ata_generic ata_piix libata
sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd
Pid: 3322, comm: bash Tainted: G      D 2.6.23.1-42.fc8 #1
RIP: 0010:[<ffffffff8836f1a4>]  [<ffffffff8836f1a4>]
:ecryptfs:ecryptfs_open_lower_file+0x1d/0x83
RSP: 0018:ffff8100502f7dd8  EFLAGS: 00010246
RAX: ffff81007d6afa98 RBX: ffff81004e995270 RCX: 0000000000000003
RDX: ffff810037fece00 RSI: ffff81004e995270 RDI: ffff8100502f7e28
RBP: ffff810037fece00 R08: ffff8100502f7d88 R09: 0000000000000000
R10: ffff8100502f7b78 R11: 00000000000c000c R12: ffff81004e4685b8
R13: ffff8100502f7e28 R14: ffff810037fece00 R15: ffff81004e9951a0
FS:  00002aaaaaac1f50(0000) GS:ffff810037cd8300(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000000008d47c0 CR3: 000000004e8df000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process bash (pid: 3322, threadinfo ffff8100502f6000, task ffff81005b0eb020)
Stack:  ffff81004fe24400 ffff81004e468380 ffff81004fe24400 ffff81004e4685b8
 ffff81004e4686d8 ffffffff8836f545 ffff81004e468380 ffff810053b50e08
 ffff81004e995270 0000000000000000 0000000000000000 ffff81004fe24400
Call Trace:
 [<ffffffff8836f545>] :ecryptfs:ecryptfs_open+0x12a/0x28b
 [<ffffffff8836f41b>] :ecryptfs:ecryptfs_open+0x0/0x28b
 [<ffffffff8109a0e8>] __dentry_open+0xf4/0x1c5
 [<ffffffff8109a26d>] do_filp_open+0x2a/0x38
 [<ffffffff81099f40>] get_unused_fd_flags+0x72/0x11f
 [<ffffffff8109a2c1>] do_sys_open+0x46/0xc3
 [<ffffffff8100bd45>] tracesys+0xd5/0xda


Code: 0f 0b eb fe f0 ff 06 48 85 ed 74 07 f0 ff 85 c0 00 00 00 41
RIP  [<ffffffff8836f1a4>] :ecryptfs:ecryptfs_open_lower_file+0x1d/0x83
 RSP <ffff8100502f7dd8>

At this point, it's impossible to umount the ecryptfs stack mount:
[EMAIL PROTECTED] jgu]# umount /root/secret
umount: /root/secret: device is busy
umount: /root/secret: device is busy

Best wishes,
Jonathan

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
eCryptfs-devel mailing list
eCryptfs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ecryptfs-devel

Reply via email to