Hi,

I recently updated to kernel version 2.6.36 and UnionFS 2.5.6, and I
get a kernel BUG which seems to be due to UnionFS.

I was able to reproduce the bug whenever I stopped sshd.  To isolate
which filesystem was at fault, I created a TmpFS-based chroot
environment, in which sshd worked fine.  When I then added a UnionFS
overlay to "/var", starting & stopping sshd results in the dump below.
 Also, I'm unable to unmount my overlayed "/var" afterward, although
that may just be a consequence of the BUG_ON().

This is reproducible 100% of the time on my KVM image, if you need me
to test any patches, etc.  Thanks!


Oct 26 21:17:04 kernel: kernel BUG at fs/inode.c:1244!
Oct 26 21:17:04 kernel: invalid opcode: 0000 [#2] SMP
Oct 26 21:17:04 kernel: last sysfs file:
Oct 26 21:17:04 kernel: CPU 0
Oct 26 21:17:04 kernel: Pid: 1187, comm: sshd Tainted: G      D     2.6.36 #1 /
Oct 26 21:17:04 kernel: RIP: 0010:[<ffffffff810ae13d>]
[<ffffffff810ae13d>] iput+0x239/0x24c
Oct 26 21:17:04 kernel: RSP: 0018:ffff880004821e78  EFLAGS: 00000283
Oct 26 21:17:04 kernel: RAX: ffff88000184f3c0 RBX: ffff880007589fb8
RCX: 0000000000000039
Oct 26 21:17:04 kernel: RDX: 0000000000000003 RSI: ffff88000758a188
RDI: ffff88000184f3b8
Oct 26 21:17:04 kernel: RBP: ffff880004821e98 R08: ffffffff8166e5c0
R09: ffff880004821df8
Oct 26 21:17:04 kernel: R10: ffff880004821cc8 R11: ffff880007589fb8
R12: ffffffff8183b340
Oct 26 21:17:04 kernel: R13: 0000000000000000 R14: 0000000000000004
R15: 0000000000000000
Oct 26 21:17:04 kernel: FS:  00007f05d11ea6f0(0000)
GS:ffff880001a00000(0000) knlGS:0000000000000000
Oct 26 21:17:04 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Oct 26 21:17:04 kernel: CR2: 00007f05cfb556e0 CR3: 000000000480e000
CR4: 00000000000006b0
Oct 26 21:17:04 kernel: DR0: 0000000000000000 DR1: 0000000000000000
DR2: 0000000000000000
Oct 26 21:17:04 kernel: DR3: 0000000000000000 DR6: 0000000000000000
DR7: 0000000000000000
Oct 26 21:17:04 kernel: Process sshd (pid: 1187, threadinfo
ffff880004820000, task ffff88000704cc50)
Oct 26 21:17:04 kernel: Stack:
Oct 26 21:17:04 kernel:  ffff880004821e98 ffffffff810aba35
ffff880007589fb8 ffff8800075b7080
Oct 26 21:17:04 kernel: <0> ffff880004821f68 ffffffff810a6a4f
ffff880007a2ed00 ffff88000749cc00
Oct 26 21:17:04 kernel: <0> 00000008509e1423 ffff88000486a009
0000000000000000 ffff880007405b00
Oct 26 21:17:04 kernel: Call Trace:
Oct 26 21:17:04 kernel:  [<ffffffff810aba35>] ? dput+0x2f/0x191
Oct 26 21:17:04 kernel:  [<ffffffff810a6a4f>] do_unlinkat+0x103/0x15d
Oct 26 21:17:04 kernel:  [<ffffffff810201fe>] ? do_page_fault+0x204/0x232
Oct 26 21:17:04 kernel:  [<ffffffff810a6aba>] sys_unlink+0x11/0x13
Oct 26 21:17:04 kernel:  [<ffffffff81002982>] system_call_fastpath+0x16/0x1b
Oct 26 21:17:04 kernel: Code: 00 00 00 4c 89 e7 e8 73 e5 f6 ff 66 90
0f ae f0 48 8d bb d0 01 00 00 be 03 00 00 00 e8 be aa f9 ff 48 83 bb
d0 01 00 00 60 74 04 <0f> 0b eb fe 48 89 df e8 70 f7 ff ff 59 5b 5b 41
5c c9 c3 55 48
Oct 26 21:17:04 kernel: RIP  [<ffffffff810ae13d>] iput+0x239/0x24c
Oct 26 21:17:04 kernel:  RSP <ffff880004821e78>

-- 
Matthew L. Creech
_______________________________________________
unionfs mailing list: http://unionfs.filesystems.org/
[email protected]
http://www.fsl.cs.sunysb.edu/mailman/listinfo/unionfs

Reply via email to