[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

fs corruption after docker usage



Hello,

after some usage of docker with overlayfs on an ext4 partition we ran
into this bug on the linux-image-4.8.0-0.bpo.2-amd64 package:

Jan 31 09:37:01 testhost1 kernel: [422944.349735] kernel BUG at
/build/linux-aPrr8L/linux-4.8.15/fs/inode.c:1502!
Jan 31 09:37:01 testhost1 kernel: [422944.352149] invalid opcode: 0000
[#14] SMP
Jan 31 09:37:01 testhost1 kernel: [422944.354546] Modules linked in:
xt_nat xt_tcpudp veth ipt_MASQUERADE nf_nat_masquerade_ipv4 xfrm_user
xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_
addrtype iptable_filter ip_tables xt_conntrack x_tables nf_nat
nf_conntrack br_netfilter bridge stp llc overlay fuse btrfs xor raid6_pq
ufs qnx4 hfsplus hfs minix ntfs vfat msdos fat jfs xfs libcrc32c crc
32c_generic intel_rapl sb_edac edac_core x86_pkg_temp_thermal
intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul
crc32_pclmul ghash_clmulni_intel intel_cstate intel_uncore ipmi_devintf dcd
bas mxm_wmi iTCO_wdt iTCO_vendor_support mgag200 ttm drm_kms_helper
evdev drm intel_rapl_perf tpm_tis tpm_tis_core i2c_algo_bit mei_me
ipmi_si pcspkr tpm lpc_ich acpi_power_meter mei ipmi_msghandler mfd_c
ore button shpchp wmi autofs4 ext4 crc16 jbd2 fscrypto mbcache
scsi_dh_emc dm_service_time dm_multipath sd_mod dm_mod sg sr_mod cdrom
uas usb_storage hid_generic usbhid hid crc32c_intel aesni_intel aes_x8
6_64 glue_helper lrw gf128mul ablk_helper cryptd qla2xxx ahci libahci
ehci_pci ehci_hcd libata tg3 scsi_transport_fc usbcore ptp scsi_mod
pps_core usb_common libphy fjes
Jan 31 09:37:01 testhost1 kernel: [422944.376041] CPU: 46 PID: 130563
Comm: rm Tainted: G      D W       4.8.0-0.bpo.2-amd64 #1 Debian
4.8.15-2~bpo8+2
Jan 31 09:37:01 testhost1 kernel: [422944.378881] Hardware name: Dell
Inc. PowerEdge R830/XXXXXX, BIOS 1.X.X XX/XX/201X
Jan 31 09:37:01 testhost1 kernel: [422944.381747] task: ffff98b68bfbf080
task.stack: ffff98b7f897c000
Jan 31 09:37:01 testhost1 kernel: [422944.384601] RIP:
0010:[<ffffffff88c1a7b4>]  [<ffffffff88c1a7b4>] iput+0x1a4/0x1f0
Jan 31 09:37:01 testhost1 kernel: [422944.387470] RSP:
0018:ffff98b7f897fed0  EFLAGS: 00010202
Jan 31 09:37:01 testhost1 kernel: [422944.390325] RAX: ffff98dc4342a8c0
RBX: 00000000ffffff8b RCX: 0000000100000000
Jan 31 09:37:01 testhost1 kernel: [422944.393193] RDX: ffffffff00000001
RSI: 0000000000000001 RDI: ffff98c63cdad3a8
Jan 31 09:37:01 testhost1 kernel: [422944.396050] RBP: ffff98f6a0ca6000
R08: 0000000005a20aeb R09: ffff98c5d47350d0
Jan 31 09:37:01 testhost1 kernel: [422944.398903] R10: ffff9907a7086400
R11: 0000000000000b48 R12: 0000000000000000
Jan 31 09:37:01 testhost1 kernel: [422944.401750] R13: 0000000000000000
R14: ffff98c63cdad3a8 R15: 0000000000000006
Jan 31 09:37:01 testhost1 kernel: [422944.404554] FS:
00007efe49f49700(0000) GS:ffff9907bf4c0000(0000) knlGS:0000000000000000
Jan 31 09:37:01 testhost1 kernel: [422944.407327] CS:  0010 DS: 0000 ES:
0000 CR0: 0000000080050033
Jan 31 09:37:01 testhost1 kernel: [422944.410091] CR2: 0000000001bec618
CR3: 000000501b81c000 CR4: 00000000003406e0
Jan 31 09:37:01 testhost1 kernel: [422944.412875] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Jan 31 09:37:01 testhost1 kernel: [422944.415657] DR3: 0000000000000000
DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 31 09:37:01 testhost1 kernel: [422944.418425] Stack:
Jan 31 09:37:01 testhost1 kernel: [422944.421170]  ffffffff88c0df48
0000000001becf38 ffff98c44b2fbc00 00000000731cf180
Jan 31 09:37:01 testhost1 kernel: [422944.423956]  0000000000000000
ffff9907ae99b060 ffff98dc4348f780 0000001d2169bb74
Jan 31 09:37:01 testhost1 kernel: [422944.426698]  ffff98f6a0ca601c
00000000b06cf18d 0000000001bece30 0000000000000000
Jan 31 09:37:01 testhost1 kernel: [422944.429400] Call Trace:
Jan 31 09:37:01 testhost1 kernel: [422944.432028]  [<ffffffff88c0df48>]
? do_unlinkat+0x148/0x300
Jan 31 09:37:01 testhost1 kernel: [422944.434626]  [<ffffffff88feccf6>]
? system_call_fast_compare_end+0xc/0x96
Jan 31 09:37:01 testhost1 kernel: [422944.437168] Code: c6 07 00 0f 1f
40 00 5b 48 89 ef 5d 41 5c 41 5d e9 92 f4 ff ff be b2 05 00 00 48 c7 c7
78 3e 20 89 e8 f1 c3 e5 ff e9 3c ff ff ff <0f> 0b 48 81 8d a0 00 0
0 00 00 01 00 00 48 89 ef e8 f7 fd ff ff
Jan 31 09:37:01 testhost1 kernel: [422944.442381] RIP
[<ffffffff88c1a7b4>] iput+0x1a4/0x1f0
Jan 31 09:37:01 testhost1 kernel: [422944.444860]  RSP <ffff98b7f897fed0>
Jan 31 09:37:01 testhost1 kernel: [422944.457154] ---[ end trace
f7897724d9df1184 ]---

After the first occurence every other action (rm, umount) on the ext4 fs
would result in triggering this bug and the only option for us was to
reboot the system.
-- 
Stephan Kirsten
Diplom-Ingenieur (BA)
Senior Berater
Development Network&Client Security
Public Authorities
secunet Security Networks AG


Phone: +49-201-54 54 - 3637 , Fax: +49-201-54 54 - 1323
E-Mail: stephan.kirsten@secunet.com
Ammonstrasse 74, 01067, Dresden, Germany
www.secunet.com

______________________________________________________________________

Registered at: Kurfürstenstraße 58, 45138 Essen, Deutschland
Amtsgericht Essen HRB 13615
Management Board: Dr Rainer Baumgart (CEO), Thomas Pleines
Chairman of Supervisory Board: Dr Peter Zattler
______________________________________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature


Reply to: