Public bug reported: Binary package hint: linux-source-2.6.20
I get the following kernel oops while using cryptsetup (Luks) to add keys, remove them or just opening the device - almost every time. Sometimes the system just freezes without any further trace. The crucial point - I think - is that the machine is running with its root filesystem mounted over nfs (netboot). For testing purposes, I installed feisty on hda and no crashes occured. I also mounted a nfs share and generated some load (cp & find); No crashes, but the system lagged a lot (mouse hanging for a second or so). [ 158.264302] BUG: unable to handle kernel paging request at virtual address 9e885450 [ 158.284140] printing eip: [ 158.303589] c01eef7a [ 158.303590] *pde = 00000000 [ 158.322941] Oops: 0000 [#1] [ 158.342067] SMP [ 158.360952] Modules linked in: binfmt_misc rfcomm l2cap bluetooth ipv6 nbd ppdev lp cpufreq_userspace cpufreq_ondemand cpufreq_stats freq_table cpufreq_powersave cpufreq_conservative pcc_acpi dev_acpi tc1100_wmi sony_acpi battery dock sbs video asus_acpi button container ac i2c_ec backlight ext3 jbd mbcache sg sd_mod cbc blkcipher sha256 aes_i586 dm_crypt dm_mod w83627hf hwmon_vid i2c_isa eeprom fuse ide_cd cdrom ide_disk ata_generic snd_via82xx gameport snd_pcm_oss snd_ice1724 snd_ice17xx_ak4xxx snd_mixer_oss snd_ak4114 snd_via82xx_modem snd_ak4xxx_adda snd_ac97_codec ac97_bus snd_pcm snd_seq_dummy snd_seq_oss usb_storage snd_mpu401_uart snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq libusual snd_timer snd_seq_device parport_pc parport via82cxxx snd k8temp psmouse serio_raw generic amd64_agp agpgart i2c_viapro i2c_core snd_page_alloc sata_via libata scsi_mod soundcore sk98lin shpchp pci_hotplug evdev tsdev usbhid hid af_packet nfs lockd sunrpc ehci_hcd uhci_hcd usbcore skge thermal processor fan capability commoncap vesafb fbcon tileblit font bitblit softcursor [ 158.514391] CPU: 0 [ 158.514392] EIP: 0060:[radix_tree_gang_lookup_tag+74/512] Not tainted VLI [ 158.514394] EFLAGS: 00010202 (2.6.20-16-generic #2) [ 158.582876] EIP is at radix_tree_gang_lookup_tag+0x4a/0x200 [ 158.605633] eax: f792d070 ebx: f7a0725c ecx: 00000015 edx: f7a0725c [ 158.628427] esi: 00000000 edi: 00000001 ebp: ffffffff esp: f796bdd0 [ 158.651039] ds: 007b es: 007b ss: 0068 [ 158.673531] Process cryptsetup (pid: 5812, ti=f796a000 task=dfa52560 task.ti=f796a000) [ 158.674067] Stack: 00000000 f796be6c f796be6c f796be2c f796be2c f792d154 c015e2ca 00000001 [ 158.697071] f7a0725c 00000001 00000000 c015cc8d 00000000 00000000 f792cf88 f796be8c [ 158.720205] ffffffff f8e48c1e 00000001 00000001 f792d06c 00000000 f792d058 00000000 [ 158.743441] Call Trace: [ 158.788927] [pagevec_lookup_tag+42/64] pagevec_lookup_tag+0x2a/0x40 [ 158.812064] [generic_writepages+253/816] generic_writepages+0xfd/0x330 [ 158.834888] [<f8e48c1e>] nfs_wait_on_requests_locked+0x9e/0xc0 [nfs] [ 158.857642] [<f8e49420>] nfs_sync_mapping_wait+0xb0/0x260 [nfs] [ 158.880282] [<f8e49e2e>] nfs_sync_mapping_range+0x8e/0xc0 [nfs] [ 158.902914] [<f8e41fc6>] nfs_getattr+0x46/0xc0 [nfs] [ 158.925403] [<f8e41f80>] nfs_getattr+0x0/0xc0 [nfs] [ 158.947713] [vfs_getattr+76/112] vfs_getattr+0x4c/0x70 [ 158.969874] [vfs_stat_fd+55/96] vfs_stat_fd+0x37/0x60 [ 158.991877] [sys_stat64+15/48] sys_stat64+0xf/0x30 [ 159.013720] [__fput+293/400] __fput+0x125/0x190 [ 159.035433] [mntput_no_expire+36/160] mntput_no_expire+0x24/0xa0 [ 159.057098] [filp_close+71/128] filp_close+0x47/0x80 [ 159.078644] [sys_close+107/208] sys_close+0x6b/0xd0 [ 159.100056] [sysenter_past_esp+105/169] sysenter_past_esp+0x69/0xa9 [ 159.121475] ======================= [ 159.142703] Code: 04 0f 84 04 01 00 00 8b 5b 08 85 db 89 5c 24 20 0f 84 f5 00 00 00 f6 c3 01 0f 85 00 01 00 00 8b 54 24 20 8b 7c 24 48 8b 02 85 ff <8b> 0c 85 90 12 3d c0 89 4c 24 18 0f 84 cf 00 00 00 39 ce c7 44 [ 159.188142] EIP: [radix_tree_gang_lookup_tag+74/512] radix_tree_gang_lookup_tag+0x4a/0x200 SS:ESP 0068:f796bdd0 Further information: Linux 2.6.20-16-generic #2 SMP Wed May 23 01:46:23 UTC 2007 i686 GNU/Linux cryptsetup luksDump /dev/hdd gives the following output: LUKS header information for /dev/hdd Version: 1 Cipher name: aes Cipher mode: cbc-essiv:sha256 Hash spec: sha1 Payload offset: 2056 MK bits: 256 /dev/hdd is a DVD-RAM drive, but the oops also happens when using a file (on nfs filesystem) mapped with losetup. md5sums of all kernel modules and the kernel itself are identical, only the initrd.img differs (because of netboot). The system running from netboot is a bootstrapped edgy which later was upgraded to feisty, so it's not exactly a standard installation - some daemons are not running, but that should not produce a kernel oops. Swap is disabled, but there is plenty of free RAM left (1GB installed). Memtest does not reveal any errors, the system runs stable without me trying to find that error. Thanks for your help. :) ** Affects: linux-source-2.6.20 (Ubuntu) Importance: Undecided Status: Unconfirmed -- kernel oops while using cryptsetup https://bugs.launchpad.net/bugs/119020 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs