Kernel Panic in mntget() while using overlay2 on a RHEL 7
Issue
- Kernel panic with the following call traces:
BUG: unable to handle kernel paging request at ffff93f751ec8001
IP: [<ffffffff8586c2b5>] mntget+0x15/0x20
PGD c67671067 PUD 0
Oops: 0002 [#1] SMP
Modules linked in: falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_lsm_pinned_9205(E) sch_ingress veth nf_conntrack_netlink nfnetlink xlan ip6_udp_tunnel udp_tunnel openvswitch nf_conntrack_ipv6 nf_nat_ipv6 f_defrag_ipv6 br_netfilter bridge stp llc rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache scsi_transport_iscsi vmw_vsock_vmci_transport vsock xt_statistic xt_nat ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_recent iptable_nat nf_nat_ipv4 nf_nat ipt_REJECT nf_reject_ipv4 nf_conntrack_ipv4 nf_defrag_ipv4 xt_comment xt_mark xt_addrtype xt_conntrack overlay(T) nf_conntrack iptable_filter sunrpc falcon_lsm_pinned_9003(E) sb_edac ppdev iosf_mbi crc32_pclmul vmw_balloon ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr sg vmw_vmci i2c_piix4 parport_pc parport dm_multipath binfmt_misc tcp_htcp ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper sd_mod crc_t10dif crct10dif_generic syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix crct10dif_pclmul crct10dif_common libata nfit crc32c_intel serio_raw vmxnet3 libnvdimm vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod [last unloaded: falcon_lsm_serviceable]
CPU: 10 PID: 53569 Comm: java Kdump: loaded Tainted: P E ------------ T 3.10.0-1062.12.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/19/2018
task: ffff93f5f23dc1c0 ti: ffff93f29c4c8000 task.ti: ffff93f29c4c8000
RIP: 0010:[<ffffffff8586c2b5>] [<ffffffff8586c2b5>] mntget+0x15/0x20
RSP: 0018:ffff93f29c4cbb40 EFLAGS: 00010286
RAX: ffff93e79d672ea0 RBX: ffff93f4d9278410 RCX: 0000000000000001
RDX: 0000000012248001 RSI: ffff93ee4a75ae40 RDI: ffff93e79d672ea0
RBP: ffff93f29c4cbb40 R08: 0000000000000000 R09: ffff93e79d672ea0
R10: ffff93e7aae43440 R11: 0000000000000000 R12: ffff93ee4a75ae40
R13: ffff93f6d6a9cd80 R14: 0000000000058800 R15: ffff93f4d9278410
FS: 00007fd64b1bd700(0000) GS:ffff93f73fc80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff93f751ec8001 CR3: 0000000f2baec000 CR4: 00000000001607e0
Call Trace:
[<ffffffff858556c5>] path_get+0x15/0x30
[<ffffffff85847f73>] do_dentry_open+0x53/0x2c0
[<ffffffff8584827a>] vfs_open+0x5a/0xb0
[<ffffffff85848319>] dentry_open+0x49/0xc0
[<ffffffffc0641934>] ovl_path_open+0x24/0x30 [overlay]
[<ffffffffc0646681>] ovl_dir_open+0x61/0xe0 [overlay]
[<ffffffff85848136>] do_dentry_open+0x216/0x2c0
[<ffffffff859042b2>] ? security_inode_permission+0x22/0x30
[<ffffffffc0646620>] ? ovl_fill_real+0x120/0x120 [overlay]
[<ffffffff8584827a>] vfs_open+0x5a/0xb0
[<ffffffff85858fa6>] do_last+0x1f6/0x1290
[<ffffffff8585be3d>] path_openat+0xcd/0x5a0
[<ffffffff85711c48>] ? get_futex_key+0x1c8/0x2c0
[<ffffffff8585d7ad>] do_filp_open+0x4d/0xb0
[<ffffffff8586b287>] ? __alloc_fd+0x47/0x170
[<ffffffff85849704>] do_sys_open+0x124/0x220
[<ffffffff8584981e>] SyS_open+0x1e/0x20
[<ffffffff85d8e172>] tracesys+0xa6/0xcc
Code: 01 48 89 d0 5d c3 48 3b 7f 18 48 c7 c0 fe ff ff ff 74 ea 5d c3 90 0f 1f 44 00 00 55 48 85 ff 48 89 f8 48 89 e5 74 07 48 8b 57 28 <65> ff 02 5d c3 66 0f 1f 44 00 00 0f 1f 44 00 00 55 48 83 ee 68
RIP [<ffffffff8586c2b5>] mntget+0x15/0x20
RSP <ffff93f29c4cbb40>
CR2: ffff93f751ec8001
Environment
- Red Hat Enterprise Linux 7
- kernel- 3.10.0-1062.12.1.el7
- docker-1.13.1-109.gitcccb291.el7_7
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.