BUG: unable to handle kernel NULL pointer dereference at 0000000000000010 IP: [] decrypt_scatterlist+0x54/0xeb [ecryptfs] PGD 1b89b067 PUD 1db47067 PMD 0 Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC CPU 0 Modules linked in: ecryptfs cryptd aes_x86_64 aes_generic sha256_generic encrypted ecryptfs_format trusted nfs nfsd lockd nfs_acl auth_rpcgss sunrpc virtio_console virtio_net virtio_balloon ext4 mbcache jbd2 virtio_blk virtio_pci virtio_ring virtio [last unloaded: ecryptfs] Pid: 10635, comm: python Tainted: G W 3.0.0+ #27 Bochs Bochs RIP: 0010:[] [] decrypt_scatterlist+0x54/0xeb [ecryptfs] RSP: 0018:ffff88001d94daf8 EFLAGS: 00010296 RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000003 RDX: 0000000000000010 RSI: ffff880003118eb0 RDI: 0000000000000000 RBP: ffff88001d94db48 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffa029ebac R11: ffff880003119030 R12: ffff88001d94db78 R13: ffff880003118e40 R14: ffff880003118fb8 R15: ffff88001d94dba0 FS: 00007f3759ff1720(0000) GS:ffff88003ca00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000010 CR3: 000000001aed0000 CR4: 00000000000006b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process python (pid: 10635, threadinfo ffff88001d94c000, task ffff880003240000) Stack: 0000000000000000 0000000000000000 ffff88001d94dbc8 0000000000000200 1c464254d604cf97 ffff880003118e40 ffffea0000d2fd88 0000000000000000 0000000000000000 0000000000001000 ffff88001d94dc08 ffffffffa029f3f7 Call Trace: [] ecryptfs_decrypt_extent+0x17d/0x23d [ecryptfs] [] ecryptfs_decrypt_page+0x123/0x18c [ecryptfs] [] ecryptfs_readpage+0xb5/0x111 [ecryptfs] [] do_generic_file_read.constprop.15+0x298/0x3c0 [] generic_file_aio_read+0x1d8/0x23d [] ecryptfs_read_update_atime+0x1c/0x58 [ecryptfs] [] ? local_clock+0x14/0x4c [] do_sync_read+0xbf/0xff [] ? security_file_permission+0x2e/0x33 [] ? rw_verify_area+0xb6/0xd3 [] vfs_read+0xac/0xf3 [] ? fget_light+0x3a/0xa1 [] sys_read+0x4d/0x74 [] ? vma_adjust+0x1cb/0x34a [] system_call_fastpath+0x16/0x1b Code: 49 89 d4 89 cb 4c 89 f7 48 89 45 b8 4c 89 45 c0 c7 45 c8 00 02 00 00 e8 75 44 07 e1 49 8b 45 40 49 8b 55 20 49 8d 75 70 48 89 c7 50 10 85 c0 74 27 89 c2 48 c7 c6 a0 69 2a a0 48 c7 c7 6d 8f RIP [] decrypt_scatterlist+0x54/0xeb [ecryptfs] RSP CR2: 0000000000000010 ---[ end trace f51d8b8dc850fa89 ]---