Hello, after some usage of docker with overlayfs on an ext4 partition we ran into this bug on the linux-image-4.8.0-0.bpo.2-amd64 package: Jan 31 09:37:01 testhost1 kernel: [422944.349735] kernel BUG at /build/linux-aPrr8L/linux-4.8.15/fs/inode.c:1502! Jan 31 09:37:01 testhost1 kernel: [422944.352149] invalid opcode: 0000 [#14] SMP Jan 31 09:37:01 testhost1 kernel: [422944.354546] Modules linked in: xt_nat xt_tcpudp veth ipt_MASQUERADE nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_ addrtype iptable_filter ip_tables xt_conntrack x_tables nf_nat nf_conntrack br_netfilter bridge stp llc overlay fuse btrfs xor raid6_pq ufs qnx4 hfsplus hfs minix ntfs vfat msdos fat jfs xfs libcrc32c crc 32c_generic intel_rapl sb_edac edac_core x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel intel_cstate intel_uncore ipmi_devintf dcd bas mxm_wmi iTCO_wdt iTCO_vendor_support mgag200 ttm drm_kms_helper evdev drm intel_rapl_perf tpm_tis tpm_tis_core i2c_algo_bit mei_me ipmi_si pcspkr tpm lpc_ich acpi_power_meter mei ipmi_msghandler mfd_c ore button shpchp wmi autofs4 ext4 crc16 jbd2 fscrypto mbcache scsi_dh_emc dm_service_time dm_multipath sd_mod dm_mod sg sr_mod cdrom uas usb_storage hid_generic usbhid hid crc32c_intel aesni_intel aes_x8 6_64 glue_helper lrw gf128mul ablk_helper cryptd qla2xxx ahci libahci ehci_pci ehci_hcd libata tg3 scsi_transport_fc usbcore ptp scsi_mod pps_core usb_common libphy fjes Jan 31 09:37:01 testhost1 kernel: [422944.376041] CPU: 46 PID: 130563 Comm: rm Tainted: G D W 4.8.0-0.bpo.2-amd64 #1 Debian 4.8.15-2~bpo8+2 Jan 31 09:37:01 testhost1 kernel: [422944.378881] Hardware name: Dell Inc. PowerEdge R830/XXXXXX, BIOS 1.X.X XX/XX/201X Jan 31 09:37:01 testhost1 kernel: [422944.381747] task: ffff98b68bfbf080 task.stack: ffff98b7f897c000 Jan 31 09:37:01 testhost1 kernel: [422944.384601] RIP: 0010:[<ffffffff88c1a7b4>] [<ffffffff88c1a7b4>] iput+0x1a4/0x1f0 Jan 31 09:37:01 testhost1 kernel: [422944.387470] RSP: 0018:ffff98b7f897fed0 EFLAGS: 00010202 Jan 31 09:37:01 testhost1 kernel: [422944.390325] RAX: ffff98dc4342a8c0 RBX: 00000000ffffff8b RCX: 0000000100000000 Jan 31 09:37:01 testhost1 kernel: [422944.393193] RDX: ffffffff00000001 RSI: 0000000000000001 RDI: ffff98c63cdad3a8 Jan 31 09:37:01 testhost1 kernel: [422944.396050] RBP: ffff98f6a0ca6000 R08: 0000000005a20aeb R09: ffff98c5d47350d0 Jan 31 09:37:01 testhost1 kernel: [422944.398903] R10: ffff9907a7086400 R11: 0000000000000b48 R12: 0000000000000000 Jan 31 09:37:01 testhost1 kernel: [422944.401750] R13: 0000000000000000 R14: ffff98c63cdad3a8 R15: 0000000000000006 Jan 31 09:37:01 testhost1 kernel: [422944.404554] FS: 00007efe49f49700(0000) GS:ffff9907bf4c0000(0000) knlGS:0000000000000000 Jan 31 09:37:01 testhost1 kernel: [422944.407327] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Jan 31 09:37:01 testhost1 kernel: [422944.410091] CR2: 0000000001bec618 CR3: 000000501b81c000 CR4: 00000000003406e0 Jan 31 09:37:01 testhost1 kernel: [422944.412875] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Jan 31 09:37:01 testhost1 kernel: [422944.415657] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Jan 31 09:37:01 testhost1 kernel: [422944.418425] Stack: Jan 31 09:37:01 testhost1 kernel: [422944.421170] ffffffff88c0df48 0000000001becf38 ffff98c44b2fbc00 00000000731cf180 Jan 31 09:37:01 testhost1 kernel: [422944.423956] 0000000000000000 ffff9907ae99b060 ffff98dc4348f780 0000001d2169bb74 Jan 31 09:37:01 testhost1 kernel: [422944.426698] ffff98f6a0ca601c 00000000b06cf18d 0000000001bece30 0000000000000000 Jan 31 09:37:01 testhost1 kernel: [422944.429400] Call Trace: Jan 31 09:37:01 testhost1 kernel: [422944.432028] [<ffffffff88c0df48>] ? do_unlinkat+0x148/0x300 Jan 31 09:37:01 testhost1 kernel: [422944.434626] [<ffffffff88feccf6>] ? system_call_fast_compare_end+0xc/0x96 Jan 31 09:37:01 testhost1 kernel: [422944.437168] Code: c6 07 00 0f 1f 40 00 5b 48 89 ef 5d 41 5c 41 5d e9 92 f4 ff ff be b2 05 00 00 48 c7 c7 78 3e 20 89 e8 f1 c3 e5 ff e9 3c ff ff ff <0f> 0b 48 81 8d a0 00 0 0 00 00 01 00 00 48 89 ef e8 f7 fd ff ff Jan 31 09:37:01 testhost1 kernel: [422944.442381] RIP [<ffffffff88c1a7b4>] iput+0x1a4/0x1f0 Jan 31 09:37:01 testhost1 kernel: [422944.444860] RSP <ffff98b7f897fed0> Jan 31 09:37:01 testhost1 kernel: [422944.457154] ---[ end trace f7897724d9df1184 ]--- After the first occurence every other action (rm, umount) on the ext4 fs would result in triggering this bug and the only option for us was to reboot the system. -- Stephan Kirsten Diplom-Ingenieur (BA) Senior Berater Development Network&Client Security Public Authorities secunet Security Networks AG Phone: +49-201-54 54 - 3637 , Fax: +49-201-54 54 - 1323 E-Mail: stephan.kirsten@secunet.com Ammonstrasse 74, 01067, Dresden, Germany www.secunet.com ______________________________________________________________________ Registered at: Kurfürstenstraße 58, 45138 Essen, Deutschland Amtsgericht Essen HRB 13615 Management Board: Dr Rainer Baumgart (CEO), Thomas Pleines Chairman of Supervisory Board: Dr Peter Zattler ______________________________________________________________________
Attachment:
signature.asc
Description: OpenPGP digital signature