I've intermittently seen the same stack trace in jaunty and karmic. Triggered by a cronjob that runs daily (although not triggering the oops every time) accessing a ~/Private directory mounted with ecryptfs over ext3.
Jul 6 19:30:10 nimitz kernel: [ 3276.627422] Jul 6 19:30:10 nimitz kernel: [ 3276.627551] BUG: unable to handle kernel NULL pointer dereference at 00000004 Jul 6 19:30:10 nimitz kernel: [ 3276.627555] IP: [<c028683c>] decrypt_scatterlist+0x3c/0xe0 Jul 6 19:30:10 nimitz kernel: [ 3276.627564] *pdpt = 000000003094b001 *pde = 0000000000000000 Jul 6 19:30:10 nimitz kernel: [ 3276.627568] Oops: 0000 [#1] SMP Jul 6 19:30:10 nimitz kernel: [ 3276.627571] last sysfs file: /sys/devices/virtual/net/tun1/statistics/collisions Jul 6 19:30:10 nimitz kernel: [ 3276.627574] Modules linked in: aes_i586 aes_generic ecb binfmt_misc radeon bridge stp bnep kvm_intel kvm tun sbp2 ieee1394 lp snd_hda_codec_atihdmi snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_usb_audio snd_pcm_oss snd_mixer_oss snd_pcm snd_usb_lib snd_seq_dummy snd_seq_oss iTCO_wdt snd_seq_midi pl2303 ppdev pcspkr iTCO_vendor_support snd_rawmidi snd_seq_midi_event parport_pc parport snd_hwdep snd_seq snd_timer snd_seq_device snd snd_page_alloc soundcore usbhid r8169 mii floppy raid10 raid456 raid6_pq async_xor async_memcpy async_tx xor raid1 raid0 multipath linear fbcon tileblit font bitblit softcursor i915 drm i2c_algo_bit video output intel_agp agpgart Jul 6 19:30:10 nimitz kernel: [ 3276.627630] Jul 6 19:30:10 nimitz kernel: [ 3276.627633] Pid: 5516, comm: gnucash-bin Not tainted (2.6.30-9-server #10-Ubuntu) EP35-DS3R Jul 6 19:30:10 nimitz kernel: [ 3276.627636] EIP: 0060:[<c028683c>] EFLAGS: 00010286 CPU: 1 Jul 6 19:30:10 nimitz kernel: [ 3276.627640] EIP is at decrypt_scatterlist+0x3c/0xe0 Jul 6 19:30:10 nimitz kernel: [ 3276.627642] EAX: fffffffc EBX: f307c678 ECX: 00000010 EDX: f307c6c4 Jul 6 19:30:10 nimitz kernel: [ 3276.627645] ESI: fffffffc EDI: f307c730 EBP: f30c9c6c ESP: f30c9c40 Jul 6 19:30:10 nimitz kernel: [ 3276.627647] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 Jul 6 19:30:10 nimitz kernel: [ 3276.627650] Process gnucash-bin (pid: 5516, ti=f30c8000 task=f3348c70 task.ti=f30c8000) Jul 6 19:30:10 nimitz kernel: [ 3276.627652] Stack: Jul 6 19:30:10 nimitz kernel: [ 3276.627654] 00000000 00000000 00000000 f30c9cb0 f30c9c98 fffffffc f30c9cc8 00000200 Jul 6 19:30:10 nimitz kernel: [ 3276.627660] 00000000 00000000 00001000 f30c9ce8 c02873f7 00001000 f30c9cc8 c053da88 Jul 6 19:30:10 nimitz kernel: [ 3276.627667] 00000000 eec855c4 c1640700 00000000 c1ee4ea0 f307c678 c1ee4ea2 00000000 Jul 6 19:30:10 nimitz kernel: [ 3276.627675] Call Trace: Jul 6 19:30:10 nimitz kernel: [ 3276.627677] [<c02873f7>] ? ecryptfs_decrypt_extent+0xf7/0x250 Jul 6 19:30:10 nimitz kernel: [ 3276.627682] [<c053da88>] ? _spin_lock+0x8/0x10 Jul 6 19:30:10 nimitz kernel: [ 3276.627687] [<c0287df4>] ? ecryptfs_decrypt_page+0x94/0x170 Jul 6 19:30:10 nimitz kernel: [ 3276.627691] [<c01b0308>] ? __inc_zone_page_state+0x18/0x20 Jul 6 19:30:10 nimitz kernel: [ 3276.627696] [<c02850f7>] ? ecryptfs_readpage+0xd7/0x130 Jul 6 19:30:10 nimitz kernel: [ 3276.627700] [<c019efe4>] ? add_to_page_cache_lru+0x44/0x70 Jul 6 19:30:10 nimitz kernel: [ 3276.627704] [<c01a7127>] ? read_pages+0xa7/0xc0 Jul 6 19:30:10 nimitz kernel: [ 3276.627707] [<c01a72b8>] ? __do_page_cache_readahead+0x178/0x1b0 Jul 6 19:30:10 nimitz kernel: [ 3276.627712] [<c01a7500>] ? ondemand_readahead+0xd0/0x150 Jul 6 19:30:10 nimitz kernel: [ 3276.627715] [<c01a7628>] ? page_cache_sync_readahead+0x28/0x30 Jul 6 19:30:10 nimitz kernel: [ 3276.627719] [<c01a086e>] ? T.865+0x30e/0x4b0 Jul 6 19:30:10 nimitz kernel: [ 3276.627723] [<c01a0ad3>] ? generic_file_aio_read+0xc3/0x270 Jul 6 19:30:10 nimitz kernel: [ 3276.627727] [<c0282090>] ? ecryptfs_open+0x120/0x280 Jul 6 19:30:10 nimitz kernel: [ 3276.627730] [<c0281e8c>] ? ecryptfs_read_update_atime+0x2c/0x70 Jul 6 19:30:10 nimitz kernel: [ 3276.627734] [<c01d1a12>] ? do_sync_read+0xd2/0x110 Jul 6 19:30:10 nimitz kernel: [ 3276.627739] [<c01b919f>] ? __vma_link+0x3f/0x80 Jul 6 19:30:10 nimitz kernel: [ 3276.627743] [<c01566a0>] ? autoremove_wake_function+0x0/0x40 Jul 6 19:30:10 nimitz kernel: [ 3276.627748] [<c02a59ef>] ? security_file_permission+0xf/0x20 Jul 6 19:30:10 nimitz kernel: [ 3276.627753] [<c01d1ab3>] ? rw_verify_area+0x63/0xd0 Jul 6 19:30:10 nimitz kernel: [ 3276.627756] [<c01d1d29>] ? vfs_read+0x99/0x170 Jul 6 19:30:10 nimitz kernel: [ 3276.627760] [<c01d1940>] ? do_sync_read+0x0/0x110 Jul 6 19:30:10 nimitz kernel: [ 3276.627763] [<c01d2631>] ? sys_read+0x41/0x70 Jul 6 19:30:10 nimitz kernel: [ 3276.627767] [<c010939b>] ? sysenter_do_call+0x12/0x28 Jul 6 19:30:10 nimitz kernel: [ 3276.627771] Code: 00 00 00 89 4d e0 8b 40 24 c7 45 f0 00 02 00 00 89 45 e8 8b 45 0c 89 45 ec 89 f8 e8 1f 5e 2b 00 8b 73 24 8d 53 4c 8b 4b 14 89 f0 <ff> 56 08 85 c0 75 75 8b 45 08 c7 44 24 04 55 7a 55 c0 c7 04 24 Jul 6 19:30:10 nimitz kernel: [ 3276.627810] EIP: [<c028683c>] decrypt_scatterlist+0x3c/0xe0 SS:ESP 0068:f30c9c40 Jul 6 19:30:10 nimitz kernel: [ 3276.627815] CR2: 0000000000000004 Jul 6 19:30:10 nimitz kernel: [ 3276.627818] ---[ end trace fd313b345333b63e ]--- Also seen stack trace at http://lkml.indiana.edu/hypermail/linux/kernel/0610.1/0915.html and https://bugzilla.redhat.com/show_bug.cgi?id=491645 ** Bug watch added: Red Hat Bugzilla #491645 https://bugzilla.redhat.com/show_bug.cgi?id=491645 -- ecryptfs Oops https://bugs.launchpad.net/bugs/314701 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
