Hi, I got an oops this morning with btrfs on the Ubuntu 2.6.31 kernel. I mounted with compress and thread_pool=4. This is on a 64 bit quad AMD machine.
Sep 18 04:00:07 caper kernel: [614439.131866] BUG: unable to handle kernel NULL pointer dereference at 0000000000000004 Sep 18 04:00:07 caper kernel: [614439.131882] IP: [<ffffffff81161de1>] posix_acl_equiv_mode+0x1/0xa0 Sep 18 04:00:07 caper kernel: [614439.131900] PGD 126d98067 PUD 11e572067 PMD 0 Sep 18 04:00:07 caper kernel: [614439.131911] Oops: 0000 [#4] SMP Sep 18 04:00:07 caper kernel: [614439.131918] last sysfs file: /sys/devices/virtual/net/pan0/statistics/collisions Sep 18 04:00:07 caper kernel: [614439.131925] CPU 1 Sep 18 04:00:07 caper kernel: [614439.131928] Modules linked in: joydev hid_gaff ff_memless btrfs zlib_deflate crc32c libcrc32c isofs udf crc_itu_t nls_iso8859_1 nls_cp437 vfat fat usb_storage binfmt_misc ppdev bnep ipt_MASQUERADE iptabl e_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_tcpudp iptable_filter ip_tables x_tables bridge stp kvm_amd kvm tun video output nfsd nfs lockd nfs_acl auth_rpcgss sunrpc it87 hwmon_vid lp parport snd_hd a_codec_realtek snd_hda_intel snd_hda_codec snd_usb_audio snd_usb_lib snd_hwdep snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device uvcvideo usblp pcspk r amd64_edac_mod edac_core i2c_piix4 snd soundcore snd_page_alloc videodev v4l1_compat v4l2_compat_ioctl32 nvidia(P) xfs exportfs ohci1394 ieee1394 r8169 mii usbhid Sep 18 04:00:07 caper kernel: [614439.132057] Pid: 23795, comm: rdiff-backup Tainted: P D W 2.6.31-020631-generic #020631 GA-MA790GP-UD4H Sep 18 04:00:07 caper kernel: [614439.132064] RIP: 0010:[<ffffffff81161de1>] [<ffffffff81161de1>] posix_acl_equiv_mode+0x1/0xa0 Sep 18 04:00:07 caper kernel: [614439.132077] RSP: 0018:ffff88007cc61c58 EFLAGS: 00010246 Sep 18 04:00:07 caper kernel: [614439.132082] RAX: 0000000000008180 RBX: 00000000ffffffea RCX: 0000000000000004 Sep 18 04:00:07 caper kernel: [614439.132088] RDX: 0000000000008000 RSI: ffff88007cc61c8c RDI: 0000000000000000 Sep 18 04:00:07 caper kernel: [614439.132094] RBP: ffff88007cc61cb8 R08: 0000000000000000 R09: ffffffffa0f5e9a0 Sep 18 04:00:07 caper kernel: [614439.132099] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 Sep 18 04:00:07 caper kernel: [614439.132104] R13: 0000000000008000 R14: ffff88005aa4b9b0 R15: 0000000000008000 Sep 18 04:00:07 caper kernel: [614439.132112] FS: 00007fc423a2e6f0(0000) GS:ffff88002803f000(0000) knlGS:00000000f72c1750 Sep 18 04:00:07 caper kernel: [614439.132117] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Sep 18 04:00:07 caper kernel: [614439.132123] CR2: 0000000000000004 CR3: 000000011b806000 CR4: 00000000000006a0 Sep 18 04:00:07 caper kernel: [614439.132129] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Sep 18 04:00:07 caper kernel: [614439.132134] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Sep 18 04:00:07 caper kernel: [614439.132141] Process rdiff-backup (pid: 23795, threadinfo ffff88007cc60000, task ffff88007f432d60) Sep 18 04:00:07 caper kernel: [614439.132146] Stack: Sep 18 04:00:07 caper kernel: [614439.132149] ffff88007cc61cb8 ffffffffa0f3c157 ffff88007cc61ce8 0000000000000008 Sep 18 04:00:07 caper kernel: [614439.132158] <0> 0000000000000eb6 ffff88003e0af110 000081807cc61c98 0000000000000000 Sep 18 04:00:07 caper kernel: [614439.132168] <0> 0000000000000004 0000000000008000 ffff88005aa4b9b0 ffff880079484240 Sep 18 04:00:07 caper kernel: [614439.132178] Call Trace: Sep 18 04:00:07 caper kernel: [614439.132228] [<ffffffffa0f3c157>] ? btrfs_set_acl+0x87/0x230 [btrfs] Sep 18 04:00:07 caper kernel: [614439.132266] [<ffffffffa0f3c384>] btrfs_xattr_set_acl+0x84/0xa0 [btrfs] Sep 18 04:00:07 caper kernel: [614439.132300] [<ffffffffa0f3c3be>] btrfs_xattr_acl_access_set+0xe/0x10 [btrfs] Sep 18 04:00:07 caper kernel: [614439.132311] [<ffffffff81133d5f>] generic_setxattr+0x6f/0x90 Sep 18 04:00:07 caper kernel: [614439.132349] [<ffffffffa0f25d3a>] btrfs_setxattr+0x4a/0xa0 [btrfs] Sep 18 04:00:07 caper kernel: [614439.132359] [<ffffffff8113470e>] vfs_setxattr+0xbe/0x210 Sep 18 04:00:07 caper kernel: [614439.132368] [<ffffffff81134915>] setxattr+0xb5/0x110 Sep 18 04:00:07 caper kernel: [614439.132375] [<ffffffff811202ac>] ? path_put+0x2c/0x40 Sep 18 04:00:07 caper kernel: [614439.132383] [<ffffffff81120931>] ? putname+0x31/0x50 Sep 18 04:00:07 caper kernel: [614439.132390] [<ffffffff81122419>] ? user_path_at+0x59/0x90 Sep 18 04:00:07 caper kernel: [614439.132400] [<ffffffff81265a7d>] ? _atomic_dec_and_lock+0x4d/0x70 Sep 18 04:00:07 caper kernel: [614439.132407] [<ffffffff811202ac>] ? path_put+0x2c/0x40 Sep 18 04:00:07 caper kernel: [614439.132415] [<ffffffff81115881>] ? sys_fchmodat+0x71/0xe0 Sep 18 04:00:07 caper kernel: [614439.132423] [<ffffffff81265a7d>] ? _atomic_dec_and_lock+0x4d/0x70 Sep 18 04:00:07 caper kernel: [614439.132432] [<ffffffff81134b72>] sys_setxattr+0x92/0xa0 Sep 18 04:00:07 caper kernel: [614439.132442] [<ffffffff81011f82>] system_call_fastpath+0x16/0x1b Sep 18 04:00:07 caper kernel: [614439.132447] Code: 08 0f 85 6a ff ff ff 85 ff 90 0f 85 61 ff ff ff e9 77 ff ff ff 31 c0 85 c9 90 0f 85 51 ff ff ff c9 c3 0f 1f 84 00 00 00 00 00 55 <8b> 47 04 48 8d 57 08 31 c9 45 31 c0 48 89 e5 48 8d 7c c7 08 48 Sep 18 04:00:07 caper kernel: [614439.132515] RIP [<ffffffff81161de1>] posix_acl_equiv_mode+0x1/0xa0 Sep 18 04:00:07 caper kernel: [614439.132524] RSP <ffff88007cc61c58> Sep 18 04:00:07 caper kernel: [614439.132527] CR2: 0000000000000004 Sep 18 04:00:07 caper kernel: [614439.132566] ---[ end trace c082b72bca0dff79 ]--- -J -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html