Kernel Panic in mntget() while using overlay2 on a RHEL 7

Solution Unverified - Updated -

Issue

  • Kernel panic with the following call traces:
BUG: unable to handle kernel paging request at ffff93f751ec8001
IP: [<ffffffff8586c2b5>] mntget+0x15/0x20
PGD c67671067 PUD 0
Oops: 0002 [#1] SMP
Modules linked in: falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_lsm_pinned_9205(E) sch_ingress veth nf_conntrack_netlink nfnetlink  xlan ip6_udp_tunnel udp_tunnel openvswitch nf_conntrack_ipv6 nf_nat_ipv6 f_defrag_ipv6 br_netfilter bridge stp llc rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache scsi_transport_iscsi vmw_vsock_vmci_transport vsock xt_statistic xt_nat ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_recent iptable_nat nf_nat_ipv4 nf_nat ipt_REJECT nf_reject_ipv4 nf_conntrack_ipv4 nf_defrag_ipv4 xt_comment xt_mark xt_addrtype xt_conntrack overlay(T) nf_conntrack iptable_filter sunrpc falcon_lsm_pinned_9003(E) sb_edac ppdev iosf_mbi crc32_pclmul vmw_balloon ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev pcspkr sg vmw_vmci i2c_piix4 parport_pc parport dm_multipath binfmt_misc tcp_htcp ip_tables xfs libcrc32c sr_mod cdrom ata_generic pata_acpi vmwgfx drm_kms_helper sd_mod crc_t10dif crct10dif_generic syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm ata_piix crct10dif_pclmul crct10dif_common libata nfit crc32c_intel serio_raw vmxnet3 libnvdimm vmw_pvscsi drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod [last unloaded: falcon_lsm_serviceable]
CPU: 10 PID: 53569 Comm: java Kdump: loaded Tainted: P            E  ------------ T 3.10.0-1062.12.1.el7.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/19/2018
task: ffff93f5f23dc1c0 ti: ffff93f29c4c8000 task.ti: ffff93f29c4c8000
RIP: 0010:[<ffffffff8586c2b5>]  [<ffffffff8586c2b5>] mntget+0x15/0x20
RSP: 0018:ffff93f29c4cbb40  EFLAGS: 00010286
RAX: ffff93e79d672ea0 RBX: ffff93f4d9278410 RCX: 0000000000000001
RDX: 0000000012248001 RSI: ffff93ee4a75ae40 RDI: ffff93e79d672ea0
RBP: ffff93f29c4cbb40 R08: 0000000000000000 R09: ffff93e79d672ea0
R10: ffff93e7aae43440 R11: 0000000000000000 R12: ffff93ee4a75ae40
R13: ffff93f6d6a9cd80 R14: 0000000000058800 R15: ffff93f4d9278410
FS:  00007fd64b1bd700(0000) GS:ffff93f73fc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff93f751ec8001 CR3: 0000000f2baec000 CR4: 00000000001607e0
Call Trace:
 [<ffffffff858556c5>] path_get+0x15/0x30
 [<ffffffff85847f73>] do_dentry_open+0x53/0x2c0
 [<ffffffff8584827a>] vfs_open+0x5a/0xb0
 [<ffffffff85848319>] dentry_open+0x49/0xc0
 [<ffffffffc0641934>] ovl_path_open+0x24/0x30 [overlay]
 [<ffffffffc0646681>] ovl_dir_open+0x61/0xe0 [overlay]
 [<ffffffff85848136>] do_dentry_open+0x216/0x2c0
 [<ffffffff859042b2>] ? security_inode_permission+0x22/0x30
 [<ffffffffc0646620>] ? ovl_fill_real+0x120/0x120 [overlay]
 [<ffffffff8584827a>] vfs_open+0x5a/0xb0
 [<ffffffff85858fa6>] do_last+0x1f6/0x1290
 [<ffffffff8585be3d>] path_openat+0xcd/0x5a0
 [<ffffffff85711c48>] ? get_futex_key+0x1c8/0x2c0
 [<ffffffff8585d7ad>] do_filp_open+0x4d/0xb0
 [<ffffffff8586b287>] ? __alloc_fd+0x47/0x170
 [<ffffffff85849704>] do_sys_open+0x124/0x220
 [<ffffffff8584981e>] SyS_open+0x1e/0x20
 [<ffffffff85d8e172>] tracesys+0xa6/0xcc
Code: 01 48 89 d0 5d c3 48 3b 7f 18 48 c7 c0 fe ff ff ff 74 ea 5d c3 90 0f 1f 44 00 00 55 48 85 ff 48 89 f8 48 89 e5 74 07 48 8b 57 28 <65> ff 02 5d c3 66 0f 1f 44 00 00 0f 1f 44 00 00 55 48 83 ee 68
RIP  [<ffffffff8586c2b5>] mntget+0x15/0x20
 RSP <ffff93f29c4cbb40>
CR2: ffff93f751ec8001

Environment

  • Red Hat Enterprise Linux 7
  • kernel- 3.10.0-1062.12.1.el7
  • docker-1.13.1-109.gitcccb291.el7_7

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content