Hi, I recently updated to kernel version 2.6.36 and UnionFS 2.5.6, and I get a kernel BUG which seems to be due to UnionFS.
I was able to reproduce the bug whenever I stopped sshd. To isolate which filesystem was at fault, I created a TmpFS-based chroot environment, in which sshd worked fine. When I then added a UnionFS overlay to "/var", starting & stopping sshd results in the dump below. Also, I'm unable to unmount my overlayed "/var" afterward, although that may just be a consequence of the BUG_ON(). This is reproducible 100% of the time on my KVM image, if you need me to test any patches, etc. Thanks! Oct 26 21:17:04 kernel: kernel BUG at fs/inode.c:1244! Oct 26 21:17:04 kernel: invalid opcode: 0000 [#2] SMP Oct 26 21:17:04 kernel: last sysfs file: Oct 26 21:17:04 kernel: CPU 0 Oct 26 21:17:04 kernel: Pid: 1187, comm: sshd Tainted: G D 2.6.36 #1 / Oct 26 21:17:04 kernel: RIP: 0010:[<ffffffff810ae13d>] [<ffffffff810ae13d>] iput+0x239/0x24c Oct 26 21:17:04 kernel: RSP: 0018:ffff880004821e78 EFLAGS: 00000283 Oct 26 21:17:04 kernel: RAX: ffff88000184f3c0 RBX: ffff880007589fb8 RCX: 0000000000000039 Oct 26 21:17:04 kernel: RDX: 0000000000000003 RSI: ffff88000758a188 RDI: ffff88000184f3b8 Oct 26 21:17:04 kernel: RBP: ffff880004821e98 R08: ffffffff8166e5c0 R09: ffff880004821df8 Oct 26 21:17:04 kernel: R10: ffff880004821cc8 R11: ffff880007589fb8 R12: ffffffff8183b340 Oct 26 21:17:04 kernel: R13: 0000000000000000 R14: 0000000000000004 R15: 0000000000000000 Oct 26 21:17:04 kernel: FS: 00007f05d11ea6f0(0000) GS:ffff880001a00000(0000) knlGS:0000000000000000 Oct 26 21:17:04 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Oct 26 21:17:04 kernel: CR2: 00007f05cfb556e0 CR3: 000000000480e000 CR4: 00000000000006b0 Oct 26 21:17:04 kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Oct 26 21:17:04 kernel: DR3: 0000000000000000 DR6: 0000000000000000 DR7: 0000000000000000 Oct 26 21:17:04 kernel: Process sshd (pid: 1187, threadinfo ffff880004820000, task ffff88000704cc50) Oct 26 21:17:04 kernel: Stack: Oct 26 21:17:04 kernel: ffff880004821e98 ffffffff810aba35 ffff880007589fb8 ffff8800075b7080 Oct 26 21:17:04 kernel: <0> ffff880004821f68 ffffffff810a6a4f ffff880007a2ed00 ffff88000749cc00 Oct 26 21:17:04 kernel: <0> 00000008509e1423 ffff88000486a009 0000000000000000 ffff880007405b00 Oct 26 21:17:04 kernel: Call Trace: Oct 26 21:17:04 kernel: [<ffffffff810aba35>] ? dput+0x2f/0x191 Oct 26 21:17:04 kernel: [<ffffffff810a6a4f>] do_unlinkat+0x103/0x15d Oct 26 21:17:04 kernel: [<ffffffff810201fe>] ? do_page_fault+0x204/0x232 Oct 26 21:17:04 kernel: [<ffffffff810a6aba>] sys_unlink+0x11/0x13 Oct 26 21:17:04 kernel: [<ffffffff81002982>] system_call_fastpath+0x16/0x1b Oct 26 21:17:04 kernel: Code: 00 00 00 4c 89 e7 e8 73 e5 f6 ff 66 90 0f ae f0 48 8d bb d0 01 00 00 be 03 00 00 00 e8 be aa f9 ff 48 83 bb d0 01 00 00 60 74 04 <0f> 0b eb fe 48 89 df e8 70 f7 ff ff 59 5b 5b 41 5c c9 c3 55 48 Oct 26 21:17:04 kernel: RIP [<ffffffff810ae13d>] iput+0x239/0x24c Oct 26 21:17:04 kernel: RSP <ffff880004821e78> -- Matthew L. Creech _______________________________________________ unionfs mailing list: http://unionfs.filesystems.org/ [email protected] http://www.fsl.cs.sunysb.edu/mailman/listinfo/unionfs
