I should have mentioned some more. I'm using 2.6.30.10 + aufs 2-standalone.tree-30-20100308 A r/w ubifs partition and another r/o ubifs partition constitute my aufs partition.
Thanks, Joonwoo On Fri, May 21, 2010 at 9:59 AM, Joonwoo Park <[email protected]> wrote: > Hi, > > I've got following errors from r/w UBIFS partition and mounting aufs > is failing with kernel oops. > Do you have any thoughts? > > # ls -al /mnt/ | grep wh > UBIFS error (pid 213): ubifs_read_node: bad node type (255 but expected 0) > UBIFS error (pid 213): ubifs_read_node: bad node at LEB 46:176752 > UBIFS error (pid 213): ubifs_iget: failed to read inode 66, error -22 > UBIFS error (pid 213): ubifs_lookup: dead directory entry > '.wh..wh.plnk', error -22 > ls: /mnt/.wh..wh.plnk: Invalid argument > -r--r--r-- 6 0 0 0 Jan 1 00:08 .wh..wh.aufs > drwx------ 2 0 0 160 Jan 1 00:08 .wh..wh.orph > # > > Note there is not .wh.wh.plnk > Do you have any thoughts? > > Accessing /mnt usually makes kernel oops like this > ------------[ cut here ]------------ > kernel BUG at include/linux/dcache.h:334! > invalid opcode: 0000 [#3] > last sysfs file: /sys/devices/virtual/ubi/ubi0/ubi0_3/data_bytes > Modules linked in: omg(P) > > Pid: 212, comm: exe Tainted: P D (2.6.30-303 #1) > EIP: 0060:[<c0157b4e>] EFLAGS: 00010246 CPU: 0 > EIP is at __follow_mount+0x46/0x64 > EAX: 00000000 EBX: df00d8a0 ECX: 00000001 EDX: dec1f694 > ESI: 00000000 EDI: df35be70 EBP: df35be08 ESP: df35bdfc > DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 > Process exe (pid: 212, ti=df35a000 task=df36f880 task.ti=df35a000) > Stack: > dec20e34 de817005 dec15054 df35be30 c0157c4a df35be70 df35be5c df35becc > df00d7a0 00000000 df35becc de817005 dec15054 df35be84 c01590fe de817007 > 00000000 df35be94 c015935f de81700e 00000101 c13e4d80 dec0eeb4 df26c000 > Call Trace: > [<c0157c4a>] ? do_lookup+0x4f/0x14e > [<c01590fe>] ? __link_path_walk+0x6a7/0xa3c > [<c015935f>] ? __link_path_walk+0x908/0xa3c > [<c0161ec9>] ? mntput_no_expire+0x19/0x8d > [<c015960b>] ? path_walk+0x4d/0xa0 > [<c01597c9>] ? do_path_lookup+0x11c/0x136 > [<c0158a24>] ? getname+0x62/0x95 > [<c0159fdd>] ? user_path_at+0x3c/0x67 > [<c01346a3>] ? unlock_page+0x3d/0x40 > [<c0141903>] ? __do_fault+0x2b5/0x2e8 > [<c01544f3>] ? vfs_fstatat+0x2d/0x54 > [<c015455e>] ? vfs_lstat+0x16/0x18 > [<c015459c>] ? sys_newlstat+0x14/0x28 > [<c010ea7b>] ? do_page_fault+0x187/0x1a8 > [<c0102795>] ? syscall_call+0x7/0xb > Code: 04 e8 af 5e 00 00 85 f6 74 12 8b 07 85 c0 74 0c c7 40 6c 00 00 00 00 e8 > 71 a3 00 00 89 1f 8b 53 10 85 d2 74 0c 8b 02 85 c0 75 04 <0f> 0b eb fe ff 02 > 89 > 57 04 be 01 00 00 00 > EIP: [<c0157b4e>] __follow_mount+0x46/0x64 SS:ESP 0068:df35bdfc > ---[ end trace e480363b6a97956e ]--- > > Thanks, > Joonwoo > ------------------------------------------------------------------------------
