Hi, this is happening mostly every night. I can't reproduce it right now. vanilla kernel 2.6.38.4
Apr 27 03:41:54 mainframe kernel: ------------[ cut here ]------------ Apr 27 03:41:54 mainframe kernel: WARNING: at fs/btrfs/inode.c:6488 btrfs_truncate+0x49/0x580() Apr 27 03:41:54 mainframe kernel: Hardware name: System Product Name Apr 27 03:41:54 mainframe kernel: Modules linked in: md4 cifs hwmon_vid coretemp vboxnetadp vboxnetflt vboxdrv firewire_ohci firewire_core i915 asus_atk0110 hwmon drm_kms_helper video backlight Apr 27 03:41:54 mainframe kernel: Pid: 32572, comm: updatedb Not tainted 2.6.38.4 #1 Apr 27 03:41:54 mainframe kernel: Call Trace: Apr 27 03:41:54 mainframe kernel: [<ffffffff8103f59b>] ? warn_slowpath_common+0x7b/0xc0 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124a1d9>] ? btrfs_truncate+0x49/0x580 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124a863>] ? btrfs_iget+0x53/0x4a0 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124af09>] ? btrfs_orphan_cleanup+0x259/0x340 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124a863>] ? btrfs_iget+0x53/0x4a0 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124b3f8>] ? btrfs_lookup_dentry+0x408/0x480 Apr 27 03:41:54 mainframe kernel: [<ffffffff81263123>] ? set_extent_bit+0x143/0x520 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124b479>] ? btrfs_lookup+0x9/0x20 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f628c>] ? d_alloc_and_lookup+0x3c/0x90 Apr 27 03:41:54 mainframe kernel: [<ffffffff811006ae>] ? d_lookup+0x2e/0x60 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f8002>] ? do_lookup+0x1a2/0x2e0 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f921a>] ? link_path_walk+0x53a/0xa30 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f6e22>] ? path_init_rcu+0xa2/0x200 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f99d6>] ? do_path_lookup+0x56/0x130 Apr 27 03:41:54 mainframe kernel: [<ffffffff810fa75a>] ? user_path_at+0x5a/0xb0 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f99e1>] ? do_path_lookup+0x61/0x130 Apr 27 03:41:54 mainframe kernel: [<ffffffff810effb0>] ? cp_new_stat+0xe0/0x100 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f00b0>] ? vfs_fstatat+0x40/0x80 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f017f>] ? sys_newlstat+0x1f/0x50 Apr 27 03:41:54 mainframe kernel: [<ffffffff81002e7b>] ? system_call_fastpath+0x16/0x1b Apr 27 03:41:54 mainframe kernel: ---[ end trace 71530b801e4a68c0 ]--- Apr 27 03:41:54 mainframe kernel: ------------[ cut here ]------------ Apr 27 03:41:54 mainframe kernel: kernel BUG at fs/btrfs/inode.c:2271! Apr 27 03:41:54 mainframe kernel: invalid opcode: 0000 [#1] PREEMPT SMP Apr 27 03:41:54 mainframe kernel: last sysfs file: /sys/devices/pci0000:00/0000:00:1f.2/host2/target2:0:0/2:0:0:0/block/sdd/sdd2/stat Apr 27 03:41:54 mainframe kernel: CPU 1 Apr 27 03:41:54 mainframe kernel: Modules linked in: md4 cifs hwmon_vid coretemp vboxnetadp vboxnetflt vboxdrv firewire_ohci firewire_core i915 asus_atk0110 hwmon drm_kms_helper video backlight Apr 27 03:41:54 mainframe kernel: Apr 27 03:41:54 mainframe kernel: Pid: 32572, comm: updatedb Tainted: G W 2.6.38.4 #1 System manufacturer System Product Name/V-P5G45 Apr 27 03:41:54 mainframe kernel: RIP: 0010:[<ffffffff81246006>] [<ffffffff81246006>] btrfs_orphan_del+0xe6/0xf0 Apr 27 03:41:54 mainframe kernel: RSP: 0018:ffff8801ad615ab8 EFLAGS: 00010282 Apr 27 03:41:54 mainframe kernel: RAX: 00000000fffffffe RBX: ffff880170fe9d60 RCX: ffff88022f84abd0 Apr 27 03:41:54 mainframe kernel: RDX: ffff8800c7a95ce8 RSI: ffff88022f84aea0 RDI: ffff88022f84aea0 Apr 27 03:41:54 mainframe kernel: RBP: 0000000000000000 R08: 0000000000000000 R09: ffff8801ad615930 Apr 27 03:41:54 mainframe kernel: R10: 0000000000000025 R11: 0000000000000000 R12: ffff88022b40bc80 Apr 27 03:41:54 mainframe kernel: R13: ffff88022ef06000 R14: ffff88022ef06330 R15: 0000000000000001 Apr 27 03:41:54 mainframe kernel: FS: 00007f4f36914700(0000) GS:ffff8800c7a80000(0000) knlGS:0000000000000000 Apr 27 03:41:54 mainframe kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b Apr 27 03:41:54 mainframe kernel: CR2: 00000000006ff228 CR3: 00000001bfc26000 CR4: 00000000000406e0 Apr 27 03:41:54 mainframe kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Apr 27 03:41:54 mainframe kernel: DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Apr 27 03:41:54 mainframe kernel: Process updatedb (pid: 32572, threadinfo ffff8801ad614000, task ffff880217171350) Apr 27 03:41:54 mainframe kernel: Stack: Apr 27 03:41:54 mainframe kernel: ffff88022ef06000 ffff88022ef06000 ffff88022f84ac60 ffff88022ef06330 Apr 27 03:41:54 mainframe kernel: ffff88022ef06338 ffff8801ad615b58 ffff8801ad615b18 ffffffff8124aed0 Apr 27 03:41:54 mainframe kernel: ffff8801ad615b88 ffff880170fe9d60 ffff88022b40bc80 000000015014c5fa Apr 27 03:41:54 mainframe kernel: Call Trace: Apr 27 03:41:54 mainframe kernel: [<ffffffff8124aed0>] ? btrfs_orphan_cleanup+0x220/0x340 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124a863>] ? btrfs_iget+0x53/0x4a0 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124b3f8>] ? btrfs_lookup_dentry+0x408/0x480 Apr 27 03:41:54 mainframe kernel: [<ffffffff81263123>] ? set_extent_bit+0x143/0x520 Apr 27 03:41:54 mainframe kernel: [<ffffffff8124b479>] ? btrfs_lookup+0x9/0x20 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f628c>] ? d_alloc_and_lookup+0x3c/0x90 Apr 27 03:41:54 mainframe kernel: [<ffffffff811006ae>] ? d_lookup+0x2e/0x60 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f8002>] ? do_lookup+0x1a2/0x2e0 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f921a>] ? link_path_walk+0x53a/0xa30 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f6e22>] ? path_init_rcu+0xa2/0x200 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f99d6>] ? do_path_lookup+0x56/0x130 Apr 27 03:41:54 mainframe kernel: [<ffffffff810fa75a>] ? user_path_at+0x5a/0xb0 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f99e1>] ? do_path_lookup+0x61/0x130 Apr 27 03:41:54 mainframe kernel: [<ffffffff810effb0>] ? cp_new_stat+0xe0/0x100 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f00b0>] ? vfs_fstatat+0x40/0x80 Apr 27 03:41:54 mainframe kernel: [<ffffffff810f017f>] ? sys_newlstat+0x1f/0x50 Apr 27 03:41:54 mainframe kernel: [<ffffffff81002e7b>] ? system_call_fastpath+0x16/0x1b Apr 27 03:41:54 mainframe kernel: Code: 4c 8b 6c 24 20 4c 8b 74 24 28 4c 8b 7c 24 30 48 83 c4 38 c3 90 48 8b 93 a8 00 00 00 4c 89 ee 4c 89 e7 e8 ee f5 02 00 85 c0 74 b8 <0f> 0b eb fe 66 0f 1f 44 00 00 53 48 8d 86 38 03 00 00 48 89 f3 Apr 27 03:41:54 mainframe kernel: RIP [<ffffffff81246006>] btrfs_orphan_del+0xe6/0xf0 Apr 27 03:41:54 mainframe kernel: RSP <ffff8801ad615ab8> Apr 27 03:41:54 mainframe kernel: ---[ end trace 71530b801e4a68c1 ]--- -marco-- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html