Public bug reported:

Description:    Ubuntu 14.04.3 LTS
Release:        14.04
linux-image-3.16.0-50-generic:
  Installed: 3.16.0-50.67~14.04.1

At or during accessing the filesystem on an external USB drive, the kernel bug 
(see below) occured.
Afterwards, an "ls" did not react, i.e. hangs until closing the terminal.
The drive itself seems to be ok, since it passes a SMART check.
The filesystem was created by using the standard Ubuntu 14.04 encryption 
mechanism (LUKS).

[667249.607538] ------------[ cut here ]------------
[667249.607567] kernel BUG at 
/build/linux-lts-utopic-PySpCy/linux-lts-utopic-3.16.0/fs/inode.c:507!
[667249.607600] invalid opcode: 0000 [#1] SMP 
[667249.607617] Modules linked in: btrfs(E) xor(E) raid6_pq(E) ufs(E) qnx4(E) 
hfsplus(E) hfs(E) minix(E) ntfs(E) msdos(E) jfs(E) xfs(E) libcrc32c(E) d
es_generic md4 nls_utf8 cifs xts gf128mul pci_stub vboxpci(OE) vboxnetadp(OE) 
vboxnetflt(OE) vboxdrv(OE) bnep rfcomm bluetooth 6lowpan_iphc binfmt_misc nfsd 
auth_rpcgss nfs_acl nf
s lockd sunrpc fscache dm_crypt joydev snd_hda_codec_analog 
snd_hda_codec_generic gpio_ich hp_wmi sparse_keymap coretemp kvm_intel kvm 
serio_raw snd_hda_intel snd_hda_controller s
nd_hda_codec snd_hwdep snd_pcm lpc_ich snd_seq_midi snd_seq_midi_event 
snd_rawmidi snd_seq snd_seq_device snd_timer shpchp snd soundcore tpm_infineon 
mei_me mei parport_pc mac_hid
 ppdev lp parport hid_generic hid_microsoft usbhid hid psmouse uas usb_storage 
i915 i2c_algo_bit video wmi drm_kms_helper e1000e drm pata_acpi ptp pps_core
[667249.607979] CPU: 1 PID: 42 Comm: kswapd0 Tainted: G           OE 
3.16.0-50-generic #66~14.04.1-Ubuntu
[667249.608004] task: ffff8801154ad180 ti: ffff8800d5c44000 task.ti: 
ffff8800d5c44000
[667249.608004] RIP: 0010:[<ffffffff811ee559>]  [<ffffffff811ee559>] 
clear_inode+0xc9/0xf0
[667249.608004] RSP: 0018:ffff8800d5c47b60  EFLAGS: 00010002
[667249.608004] RAX: 0000000040e840e8 RBX: ffff8800080773f0 RCX: 
0000000000000000
[667249.608004] RDX: 00000000000040e8 RSI: ffff8800d5c479c8 RDI: 
ffff880008077558
[667249.608004] RBP: ffff8800d5c47b70 R08: 0000000000011001 R09: 
0000000000040000
[667249.608004] R10: 0000000000000000 R11: 0000000000000220 R12: 
ffff880008077558
[667249.608004] R13: ffffffff81835820 R14: 0000000000000070 R15: 
0000000000000000
[667249.608004] FS:  0000000000000000(0000) GS:ffff88011bc80000(0000) 
knlGS:0000000000000000
[667249.608004] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[667249.608004] CR2: 0000000001dbeb10 CR3: 00000000bbc77000 CR4: 
00000000000007e0
[667249.608004] Stack:
[667249.608004]  ffff8800080773f0 ffff8800080773f0 ffff8800d5c47b88 
ffffffff812735fa
[667249.608004]  ffff880008077540 ffff8800d5c47ba8 ffffffff8125a4b8 
ffff8800080773f0
[667249.608004]  ffff8800080774f8 ffff8800d5c47bd0 ffffffff811ef454 
ffff8800d5c47c00
[667249.608004] Call Trace:
[667249.608004]  [<ffffffff812735fa>] ext4_clear_inode+0x1a/0x90
[667249.608004]  [<ffffffff8125a4b8>] ext4_evict_inode+0x88/0x4d0
[667249.608004]  [<ffffffff811ef454>] evict+0xb4/0x180
[667249.608004]  [<ffffffff811ef559>] dispose_list+0x39/0x50
[667249.608004]  [<ffffffff811f0467>] prune_icache_sb+0x47/0x60
[667249.608004]  [<ffffffff811d7e05>] super_cache_scan+0x105/0x170
[667249.608004]  [<ffffffff811720a8>] shrink_slab_node+0x138/0x290
[667249.608004]  [<ffffffff81173bab>] shrink_slab+0x8b/0x160
[667249.608004]  [<ffffffff81177612>] balance_pgdat+0x3f2/0x620
[667249.608004]  [<ffffffff8117799b>] kswapd+0x15b/0x3f0
[667249.608004]  [<ffffffff810b50b0>] ? prepare_to_wait_event+0x100/0x100
[667249.608004]  [<ffffffff81177840>] ? balance_pgdat+0x620/0x620
[667249.608004]  [<ffffffff81091572>] kthread+0xd2/0xf0
[667249.608004]  [<ffffffff810914a0>] ? kthread_create_on_node+0x1c0/0x1c0
[667249.608004]  [<ffffffff8176ed18>] ret_from_fork+0x58/0x90
[667249.608004]  [<ffffffff810914a0>] ? kthread_create_on_node+0x1c0/0x1c0
[667249.608004] Code: 74 ac 89 c2 8d 40 02 66 89 c2 89 d1 81 e1 ff ff fe ff 89 
c8 c1 e8 10 66 39 c1 74 19 0f b7 f2 4c 89 e7 66 66 66 90 66 66 90 eb 83 <0f> 0b 
0f 0b 0f 0b 0f 0b 0f 0b 89 d0 f0 0f b1 8b 68 01 00 00 39 
[667249.608004] RIP  [<ffffffff811ee559>] clear_inode+0xc9/0xf0
[667249.608004]  RSP <ffff8800d5c47b60>
[667249.608004] ---[ end trace 8332c22fbfe53045 ]---

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.16.0-50-generic 3.16.0-50.67~14.04.1
ProcVersionSignature: Ubuntu 3.16.0-50.66~14.04.1-generic 3.16.7-ckt16
Uname: Linux 3.16.0-50-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.15
Architecture: amd64
CurrentDesktop: Unity
Date: Tue Oct 13 10:05:04 2015
InstallationDate: Installed on 2015-03-05 (221 days ago)
InstallationMedia: Ubuntu 14.04.2 LTS "Trusty Tahr" - Release amd64 (20150218.1)
SourcePackage: linux-lts-utopic
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: linux-lts-utopic (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1505558

Title:
  Unable to access filesystem (LUKS, USB HDD)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-utopic/+bug/1505558/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to