From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751267AbbGaMSe (ORCPT ); Fri, 31 Jul 2015 08:18:34 -0400 Received: from mx.gnuher.de ([144.76.235.56]:56039 "EHLO mx.gnuher.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750780AbbGaMSc (ORCPT ); Fri, 31 Jul 2015 08:18:32 -0400 X-Greylist: delayed 2156 seconds by postgrey-1.27 at vger.kernel.org; Fri, 31 Jul 2015 08:18:32 EDT Date: Fri, 31 Jul 2015 13:42:30 +0200 From: Sven Geggus To: linux-kernel@vger.kernel.org Cc: ebiederm@xmission.com, trond.myklebust@primarydata.com Subject: nfs-root: destructive call to __detach_mounts /dev Message-ID: <20150731114230.GA31037@geggus.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-MimeOLE: Produced By Exchange Microsoft V6.6.6 User-Agent: Mutt/1.5.21 (2010-09-15) X-remote-host: Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, I have a couple of machines running Debian GNU/Linux 8 using an NFS-ro-mounted root filesystem. The systems seem to get bitten by VFS changes in some (unfortunaly somewhat difficult to reproduce) circumstances. The effect is, that /dev (dectmpfs) gets unmounted for some strange reason. I added the following debug code to fs/namespace.c printk(KERN_DEBUG "%s: %s\n", __func__, dentry->d_name.name); dump_stack(); And this is what I get if one of those events happen: __detach_mounts: dev CPU: 1 PID: 5551 Comm: modtrack Not tainted 4.1.3-debug-00287-g0fe8050-dirty #1 Hardware name: Dell Inc. Precision WorkStation T3400 /0TP412, BIOS A03 01/31/2008 ffff880127183c18 ffff880127183bc8 ffffffff815605f8 ffff88012bc4fcb0 ffff880126c16198 ffff880127183bf8 ffffffff81106cf7 000000000000000f ffff880126c16198 ffff880127183c18 ffff880127183d00 ffff880127183c48 Call Trace: [] dump_stack+0x4c/0x6e [] __detach_mounts+0x2b/0x12c [] d_invalidate+0x9a/0xc8 [] lookup_fast+0x1f5/0x26f [] do_last.isra.43+0xd6/0x9fb [] path_openat+0x1d1/0x53e [] ? user_path_at_empty+0x63/0x93 [] do_filp_open+0x35/0x85 [] ? find_next_zero_bit+0x17/0x1d [] ? __alloc_fd+0xdd/0xef [] do_sys_open+0x146/0x1d5 [] SyS_openat+0xf/0x11 [] system_call_fastpath+0x12/0x6a Regards Sven P.S.: Kernel is vanilla 4.1.3 with aufs patches, but aufs is not related in this problem. -- Der "normale Bürger" ist nicht an der TU Dresden und schreibt auch nicht mit mutt. (Ulli Kuhnle in de.comp.os.unix.discussion) /me is giggls@ircnet, http://sven.gegg.us/ on the Web