From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.5 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D6EFDC2D0C0 for ; Sun, 22 Dec 2019 10:53:45 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 6406420665 for ; Sun, 22 Dec 2019 10:53:45 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=gmx.net header.i=@gmx.net header.b="L95cUhql" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726189AbfLVKxo (ORCPT ); Sun, 22 Dec 2019 05:53:44 -0500 Received: from mout.gmx.net ([212.227.17.22]:56459 "EHLO mout.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726139AbfLVKxo (ORCPT ); Sun, 22 Dec 2019 05:53:44 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1577012017; bh=dJDXVPB8nXwf0c+vfl344YVopsMwzOWLJviIqX6u5cU=; h=X-UI-Sender-Class:Date:From:To:Cc:In-Reply-To:References:Subject; b=L95cUhql405oFkzp4sDqtu2CcIa71MERR0/6KD5Wwz4N0OgMhJfyeSISp55BNO8R+ Cebh1PClkdHdFypRSwwhYYQAzoAru2Dl1Zc3H1zzOFzMG4OXjXF1oOyoVPHAXlGeA3 QOxef6XvqNw8P/DEOiUP9yPW0AHtJJjQts0z7YlM= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [10.1.10.1] ([46.93.61.118]) by mail.gmx.com (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MZCbB-1iDtD73z6X-00V6MU; Sun, 22 Dec 2019 11:53:37 +0100 Date: Sun, 22 Dec 2019 11:53:35 +0100 From: jollemeyer@gmx.de To: Qu Wenruo Cc: linux-btrfs@vger.kernel.org Message-ID: <28eb20ed-be62-45a2-8abf-ad85a0482ce6.maildroid@localhost> In-Reply-To: <993a1765-6825-bccc-c645-1a89985b5113@gmx.com> References: <249711d9-5cbc-b56c-2226-33a9d42af521@gmx.com> <3512999.4HXIEJrTBV@bukephalos> <993a1765-6825-bccc-c645-1a89985b5113@gmx.com> Subject: Re: read time block corruption on root partition, Not booting MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Mailer: MailDroid/4.91 (Android 8.0.0) User-Agent: MailDroid/4.91 (Android 8.0.0) X-Provags-ID: V03:K1:UIdEFlQqab7bYCux8RxloGiJL/bv52ZgZikCpIr2W8Fzj/agYQA kixhFAS8g4XMgaw77+vCN2xPlX30XROK0oWLvaRDZBgJFuDRGpXesw1C8HDZGBceV50hfqk 1LNKHJWnOm0EyQEpK2zWV67z7eernXIch/fsLm1ASGBV2EMU+AGWoNx78RlXB2i+gfanfp9 fqCNXH3aPnDaSHlzdSrxQ== X-UI-Out-Filterresults: notjunk:1;V03:K0:YJ+6aee8HHM=:GHGYhvFt3FKXyWz3pIxVR2 F4qpnI0sn/hHA0KueNc+KdqqZBFwD0jIGWnrLakXxQZN9dUlOi/wT89/fKCofm72febqzOb2Y MSHPRtSa0uzlpLlIZGuXBSVQ1RzrZz+Ndhn5wrqOtImcwqLlSxXAoQcehpCuhLDKPEZYjO0L4 D6+Qm6aRxZ4DHCjbBJqJ1hC/CIYyGAnZ/AMeX1PGBeKZkeYHwc1m/cj5SNJHfQ3P35/Qnihuh zlGxJau49DQdfZhk76ZEpc9htNEYQhEMl4+r4/gL8o6dOz+Z8J8AUAVWCXRtaBf2BycFOLZXJ W25jzOEeb9uXaNKkJH+mLmH0a80k7Etx+DYmpa0tFoHxyyCLWvFS2EuT6y22iNFUPYWEfRqMP w0R91qyRTFCJVmIBudVP5EoptHtrYKumjA6yxTngYB4WHPLGHBbh+TF4rUGWE+FiXULexzwtx a1N3IJiwm5VzvaPMMrcvHbQT+sj9QipV/Y7d1fa6lFficj1q+LaicyIRKTk3pDrounP6MBP9i PPKlcOb6f2/23sdWiQspB5aBk7Iis4Q/K3afsY2VLcw3qyITR62AtNtgz6VGMTCNSxbHJmmCr IC9xSjx8D4/ji8KqQLbIWP90oU1Yc3URPs5U3WqISjbhsA2NyFv9Fgt6KHwGXtfH09Ln4fKuX zmL+CPvUz42F1P9Bf4jG+eBYn8LZ5UuivhIF4Gdz4f/481HinjA/NUaxNwa5mH3aBS56iJKV7 UEJljUkBiM3UBa00WFKpr7sf9BHK0hkGz9ppBVQ2kwsZQ8iK6sYDLv6m3gTgJJPXfc0laCqSq Rj/8VMvrJhJqk/6mMGedA33i29BcZzX6EJMK/S3GulQ80w0hTikIfphq0JlJ3mP+dLjFX3tL8 53F1crEpV5qqELdAbbYQjVh1uN8SNzTo47Cw75JGNOpDzAAaKCrH9OyZR2in0ySnbpuQp2uvr G5/47a+LKsENZPQKs9MwRmdQ9i5XA+hoFXUovbeZ/XUUWKqXKo2tSxT54qe+KNG4hBg4pQsWv IH8FCuaXVfH7l6gz+cx7c+0i5knLBdUjmLucQQ+kyHCj9bEINf4SHYTrEnYVKGp3k6TFgtlj5 V0Grvj1bMjFJLDSV0aP3BZ6KG+LGNyMgRDd8gvbn5UpdvPg4f8Osm3xPSOcdwobBg6WXoaQ5b xP3CUJP085NBOabn8VkJDpxQh/p5lKEKCE8/cvXsEQzUpVzl99qHA7EEQnq5ykYZO5ESM5rPN 6d2DTYV5ea3hxqyF2p92RNlDLOTY3pV3cISKf+RrO8gtrceHcOaKDLVuc6P0= Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org Dear Qu, Memtest is still running but did already find failures. I will go for the b= trfs check - repair route and reinstall the system in case it screws up my = fs. No need to spent more time on this. All important stuff is in backup an= yway.=20 Again, many thanks for your help. You are a hero.=20 Regards, J=C3=B6rg=20 -----Original Message----- From: Qu Wenruo To: jollemeyer@gmx.de Cc: linux-btrfs@vger.kernel.org Sent: So., 22 Dez. 2019 11:13 Subject: Re: read time block corruption on root partition, Not booting On 2019/12/22 =E4=B8=8B=E5=8D=886:03, jollemeyer@gmx.de wrote: > Dear Qu, >=20 > I had a typo in my previous "btrfs dump tree" command (/dev/sda1 instead = of / > dev/sda). Now I got the output below: No wonder. >=20 > btrfs-progs v5.4=20 > leaf 2089035464704 items 145 free space 4973 generation 75450 owner=20 > EXTENT_TREE > leaf 2089035464704 flags 0x1(WRITTEN) backref revision 1 > fs uuid 014bdf0a-bcb3-4a7c-b58d-c1fc17281f7e > chunk uuid d4aae6e9-9832-4da5-a269-0a46e54a4e33 [...] > =09item 85 key (1937096425472 EXTENT_ITEM 4096) itemoff 11725 itemsize=20 > 53 > =09=09refs 1 gen 41267 flags DATA > =09=09extent data backref root FS_TREE objectid 17045 offset=20 > 212492288 count 1048577 I can't be more proud of the tree-checker, it's always right to catch memory bit flip. That extent item has only 1 ref ("refs 1"), but its inlined data ref has a count of 1048577. Note that 1048577, it's 0x100001. It's almost 100% sure it's a bit flip in your memory. A full memtest run is highly recommended. Since the extra check is only introduced in v5.4, btrfs didn't detect it earlier. If could craft a dirty hack to fix your problem, but it may need some time (several hours), and you need to compile btrfs-progs. (The safest way) Or you can try btrfs check --repair, the possibility to screw up the fs should be pretty low. (The fastest way) Thanks, Qu >=20 >=20 > The full output of "btrfs check --readonly /dev/sda" command is as below: >=20 > [1/7] checking root items > [2/7] checking extents > incorrect local backref count on 1937096425472 root 5 owner 17045 offset= =20 > 212492288 found 1 wanted 1048577 back 0x55f258caa470 > backpointer mismatch on [1937096425472 4096] > ERROR: errors found in extent allocation tree or chunk allocation > [3/7] checking free space cache > [4/7] checking fs roots > [5/7] checking only csums items (without verifying data) > [6/7] checking root refs > [7/7] checking quota groups skipped (not enabled on this FS) > Opening filesystem to check... > Checking filesystem on /dev/sda > UUID: 014bdf0a-bcb3-4a7c-b58d-c1fc17281f7e > found 1386975199232 bytes used, error(s) found > total csum bytes: 1352697008 > total tree bytes: 1508327424 > total fs tree bytes: 61161472 > total extent tree bytes: 37421056 > btree space waste bytes: 55303865 > file data blocks allocated: 1388605296640 > referenced 1385670742016 >=20 >=20 > I did "btrfs rescue zero-log /dev/sda" but that did not change the output= of=20 > "btrfs check" performed afterwards. >=20 > regards, >=20 > J=C3=B6rg >=20 > Am Sonntag, 22. Dezember 2019, 01:59:16 CET schrieben Sie: >> On 2019/12/21 =E4=B8=8B=E5=8D=8810:55, jollemeyer@gmx.de wrote: >>> Dear Qu, >>> >>> the output is as follows: >>> #btrfs ins dump-tree - b 2089035464704 /dev/sda1 >>> btrfs-progs v5.4 >>> No mapping for 2089035464704 - 2089035481088 >>> Couldn't map the block 2089035464704 >>> Couldn't map the block 2089035464704 >>> Bad tree Block 2089035464704, bytenr mismatch, want 2089035464704, have= 0 >>> ERROR: failed to read tree Block 2089035464704 >> >> That's strange. The tree block isn't even mapped. >> >> But from the dmesg, it shows there is an extent item in log tree, which >> doesn't look sane. >> >> BTW, what's the stderr from `btrfs check` I guess you have only patesd >> the stdout thus no real error message. >> >> Anyway, you can solve it by `btrfs rescue zero-log`, but I doubt there >> are more problems than we expect. >> >> Thanks, >> Qu >> >>> Many thanks. >>> >>> J=C3=B6rg >>> >>> -----Original Message----- >>> From: Qu Wenruo >>> To: jollemeyer@gmx.de, linux-btrfs@vger.kernel.org >>> Sent: Sa., 21 Dez. 2019 15:19 >>> Subject: Re: read time block corruption on root partition, Not booting >>> >>> On 2019/12/21 =E4=B8=8B=E5=8D=8810:06, jollemeyer@gmx.de wrote: >>>> Dear all, >>>> >>>> on my BTRFS root partition (/dev/sda), a "read time block corruption" = was >>>> detected. The system refuses to boot. Current kernel is 5.4.2-1-Manjar= o. >>>> >>>> Systemd's journalctl generated the following output: >>>> >>>> Dez 21 10:46:41 Phoenix kernel: BTRFS critical (device sda): corrupt >>>> leaf: block=3D2089035464704 slot=3D85 extent bytenr=3D1937096425472 le= n=3D4096 >>>> invalid extent refs, have 1 expect >=3D inline 1048577 Dez 21 10:46:41 >>>> Phoenix kernel: BTRFS error (device sda): block=3D2089035464704 read t= ime >>>> tree block corruption detected Dez 21 10:46:41 Phoenix kernel: BTRFS >>>> critical (device sda): corrupt leaf: block=3D2089035464704 slot=3D85 e= xtent >>>> bytenr=3D1937096425472 len=3D4096 invalid extent refs, have 1 expect >= =3D >>>> inline 1048577 Dez 21 10:46:41 Phoenix kernel: BTRFS error (device sda= ): >>>> block=3D2089035464704 read time tree block corruption detected Dez 21 >>>> 10:46:41 Phoenix kernel: BTRFS critical (device sda): corrupt leaf: >>>> block=3D2089035464704 slot=3D85 extent bytenr=3D1937096425472 len=3D40= 96 invalid >>>> extent refs, have 1 expect >=3D inline 1048577 Dez 21 10:46:41 Phoenix >>>> kernel: BTRFS error (device sda): block=3D2089035464704 read time tree >>>> block corruption detected Dez 21 10:46:41 Phoenix kernel: BTRFS critic= al >>>> (device sda): corrupt leaf: block=3D2089035464704 slot=3D85 extent >>>> bytenr=3D1937096425472 len=3D4096 invalid extent refs, have 1 expect >= =3D >>>> inline 1048577 Dez 21 10:46:41 Phoenix kernel: BTRFS error (device sda= ): >>>> block=3D2089035464704 read time tree block corruption detected Dez 21 >>>> 10:46:41 Phoenix kernel: BTRFS: error (device sda) in >>>> btrfs_replay_log:2293: errno=3D-5 IO failure (Failed to recover log tr= ee)>=20 >>> "btrfs ins dump-tree -b 2089035464704 /dev/sda" output please. >>> >>> Thanks, >>> Qu >>> >>>> Dez 21 10:46:41 Phoenix kernel: ------------[ cut here ]------------ >>>> Dez 21 10:46:41 Phoenix kernel: WARNING: CPU: 7 PID: 621 at >>>> fs/btrfs/block-group.c:132 btrfs_put_block_group+0x42/0x50 [btrfs] Dez >>>> 21 10:46:41 Phoenix kernel: Modules linked in: usblp snd_hda_codec_hdm= i >>>> intel_rapl_msr snd_hda_codec_realtek intel_rapl_common >>>> snd_hda_codec_generic ext4 ledtrig_audio x86_pkg_temp_thermal >>>> intel_powerclamp coretemp crc16 kvm_intel mbcache i915 jbd2 kvm >>>> snd_hda_intel snd_intel_nhlt i2c_algo_bit irqbypass drm_kms_helper >>>> snd_hda_codec crct10dif_pclmul crc32_pclmul snd_hda_core mousedev >>>> ghash_clmulni_intel drm snd_hwdep snd_pcm aesni_intel crypto_simd cryp= td >>>> glue_helper mei_hdcp intel_cstate iTCO_wdt intel_gtt snd_timer >>>> iTCO_vendor_support intel_uncore mei_me intel_rapl_perf input_leds >>>> agpgart i2c_i801 snd syscopyarea mei sysfillrect lpc_ich r8168(OE) >>>> sysimgblt soundcore fb_sys_fops evdev ie31200_edac mac_hid vboxpci(OE) >>>> vboxnetflt(OE) vboxnetadp(OE) vboxdrv(OE) sg crypto_user ip_tables >>>> x_tables hid_generic usbhid hid btrfs libcrc32c crc32c_generic xor uas >>>> usb_storage raid6_pq sr_mod cdrom sd_mod ahci serio_raw atkbd libahci >>>> libps2 libata xhci_pci scsi_mod xhci_hcd ehci_pci crc32c_intel ehci_hc= d >>>> i8042 serio Dez 21 10:46:41 Phoenix kernel: CPU: 7 PID: 621 Comm: moun= t >>>> Tainted: G OE 5.4.2-1-MANJARO #1 Dez 21 10:46:41 Phoenix >>>> kernel: Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./H= 77 >>>> Pro4/MVP, BIOS P1.40 09/04/2012 Dez 21 10:46:41 Phoenix kernel: RIP: >>>> 0010:btrfs_put_block_group+0x42/0x50 [btrfs] Dez 21 10:46:41 Phoenix >>>> kernel: Code: 2d 48 83 7d 50 00 75 22 48 8b 85 e8 01 00 00 48 85 c0 75 >>>> 1e 48 8b bd d8 00 00 00 e8 a8 08 66 d9 48 89 ef 5d e9 9f 08 66 d9 c3 >>>> <0f> 0b eb da 0f 0b eb cf 0f 0b eb de 66 90 0f 1f 44 00 00 31 d2 e9 De= z >>>> 21 10:46:41 Phoenix kernel: RSP: 0018:ffffa95900f47ae8 EFLAGS: 0001020= 6 >>>> Dez 21 10:46:41 Phoenix kernel: RAX: 0000000000000001 RBX: >>>> ffff8a1eb7bfe0e0 RCX: 0000000000000000 Dez 21 10:46:41 Phoenix kernel: >>>> RDX: 0000000000000001 RSI: ffff8a1ecf5f0250 RDI: ffff8a1eb7bfe000 Dez = 21 >>>> 10:46:41 Phoenix kernel: RBP: ffff8a1eb7bfe000 R08: 0000000000000000 >>>> R09: 0000000000000001 Dez 21 10:46:41 Phoenix kernel: R10: >>>> 00000000003f6c00 R11: 0000000000000000 R12: ffff8a1ec81b0080 Dez 21 >>>> 10:46:41 Phoenix kernel: R13: ffff8a1ec81b0090 R14: ffff8a1eb7bfe000 >>>> R15: dead000000000100 Dez 21 10:46:41 Phoenix kernel: FS:=20 >>>> 00007f77003d7500(0000) GS:ffff8a1ecf5c0000(0000) knlGS:000000000000000= 0 >>>> Dez 21 10:46:41 Phoenix kernel: CS: 0010 DS: 0000 ES: 0000 CR0: >>>> 0000000080050033 Dez 21 10:46:41 Phoenix kernel: CR2: 0000559652364460 >>>> CR3: 00000003fbaec005 CR4: 00000000001606e0 Dez 21 10:46:41 Phoenix >>>> kernel: Call Trace: >>>> Dez 21 10:46:41 Phoenix kernel: btrfs_free_block_groups+0x11c/0x260 >>>> [btrfs] Dez 21 10:46:41 Phoenix kernel: open_ctree+0x187a/0x1bc0 >>>> [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: btrfs_mount_root+0x57b/0x670 [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: legacy_get_tree+0x27/0x40 >>>> Dez 21 10:46:41 Phoenix kernel: vfs_get_tree+0x25/0xb0 >>>> Dez 21 10:46:41 Phoenix kernel: fc_mount+0xe/0x30 >>>> Dez 21 10:46:41 Phoenix kernel: vfs_kern_mount.part.0+0x71/0x90 >>>> Dez 21 10:46:41 Phoenix kernel: btrfs_mount+0x18e/0x930 [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: ? filename_lookup+0x105/0x190 >>>> Dez 21 10:46:41 Phoenix kernel: ? legacy_get_tree+0x27/0x40 >>>> Dez 21 10:46:41 Phoenix kernel: ? btrfs_remount+0x4d0/0x4d0 [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: legacy_get_tree+0x27/0x40 >>>> Dez 21 10:46:41 Phoenix kernel: vfs_get_tree+0x25/0xb0 >>>> Dez 21 10:46:41 Phoenix kernel: do_mount+0x77a/0xa30 >>>> Dez 21 10:46:41 Phoenix kernel: ksys_mount+0x7e/0xc0 >>>> Dez 21 10:46:41 Phoenix kernel: __x64_sys_mount+0x21/0x30 >>>> Dez 21 10:46:41 Phoenix kernel: do_syscall_64+0x4e/0x140 >>>> Dez 21 10:46:41 Phoenix kernel: entry_SYSCALL_64_after_hwframe+0x44/0= xa9 >>>> Dez 21 10:46:41 Phoenix kernel: RIP: 0033:0x7f770055ae4e >>>> Dez 21 10:46:41 Phoenix kernel: Code: 48 8b 0d 35 00 0c 00 f7 d8 64 89= 01 >>>> 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b= 8 >>>> a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 02 00 0c 00 f7 >>>> d8 64 89 01 48 Dez 21 10:46:41 Phoenix kernel: RSP: >>>> 002b:00007ffedb3135c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 Dez = 21 >>>> 10:46:41 Phoenix kernel: RAX: ffffffffffffffda RBX: 00007f7700681204 >>>> RCX: 00007f770055ae4e Dez 21 10:46:41 Phoenix kernel: RDX: >>>> 000055d9705f5650 RSI: 000055d9705f56f0 RDI: 000055d9705f73d0 Dez 21 >>>> 10:46:41 Phoenix kernel: RBP: 000055d9705f5440 R08: 000055d9705f5670 >>>> R09: 0000000000000000 Dez 21 10:46:41 Phoenix kernel: R10: >>>> 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 Dez 21 >>>> 10:46:41 Phoenix kernel: R13: 000055d9705f73d0 R14: 000055d9705f5650 >>>> R15: 000055d9705f5440 Dez 21 10:46:41 Phoenix kernel: ---[ end trace >>>> 71465d442bb4c509 ]--- Dez 21 10:46:41 Phoenix kernel: ------------[ cu= t >>>> here ]------------ Dez 21 10:46:41 Phoenix kernel: WARNING: CPU: 0 PID= : >>>> 621 at fs/btrfs/block-group.c:3166 btrfs_free_block_groups+0x1ea/0x260 >>>> [btrfs] Dez 21 10:46:41 Phoenix kernel: Modules linked in: usblp >>>> snd_hda_codec_hdmi intel_rapl_msr snd_hda_codec_realtek >>>> intel_rapl_common snd_hda_codec_generic ext4 ledtrig_audio >>>> x86_pkg_temp_thermal intel_powerclamp coretemp crc16 kvm_intel mbcache >>>> i915 jbd2 kvm snd_hda_intel snd_intel_nhlt i2c_algo_bit irqbypass >>>> drm_kms_helper snd_hda_codec crct10dif_pclmul crc32_pclmul snd_hda_cor= e >>>> mousedev ghash_clmulni_intel drm snd_hwdep snd_pcm aesni_intel >>>> crypto_simd cryptd glue_helper mei_hdcp intel_cstate iTCO_wdt intel_gt= t >>>> snd_timer iTCO_vendor_support intel_uncore mei_me intel_rapl_perf >>>> input_leds agpgart i2c_i801 snd syscopyarea mei sysfillrect lpc_ich >>>> r8168(OE) sysimgblt soundcore fb_sys_fops evdev ie31200_edac mac_hid >>>> vboxpci(OE) vboxnetflt(OE) vboxnetadp(OE) vboxdrv(OE) sg crypto_user >>>> ip_tables x_tables hid_generic usbhid hid btrfs libcrc32c crc32c_gener= ic >>>> xor uas usb_storage raid6_pq sr_mod cdrom sd_mod ahci serio_raw atkbd >>>> libahci libps2 libata xhci_pci scsi_mod xhci_hcd ehci_pci crc32c_intel >>>> ehci_hcd i8042 serio Dez 21 10:46:41 Phoenix kernel: CPU: 0 PID: 621 >>>> Comm: mount Tainted: G W OE 5.4.2-1-MANJARO #1 Dez 21 >>>> 10:46:41 Phoenix kernel: Hardware name: To Be Filled By O.E.M. To Be >>>> Filled By O.E.M./H77 Pro4/MVP, BIOS P1.40 09/04/2012 Dez 21 10:46:41 >>>> Phoenix kernel: RIP: 0010:btrfs_free_block_groups+0x1ea/0x260 [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: Code: 49 bd 22 01 00 00 00 00 ad de e8 >>>> 51 13 d1 d9 e8 0c d3 4e d9 48 89 ef e8 64 9b ff ff 48 8b 85 00 10 00 0= 0 >>>> 49 39 c4 75 3c eb 5f <0f> 0b 31 c9 31 d2 4c 89 fe 48 89 ef e8 55 85 ff >>>> ff 48 8b 43 08 48 Dez 21 10:46:41 Phoenix kernel: RSP: >>>> 0018:ffffa95900f47af8 EFLAGS: 00010206 Dez 21 10:46:41 Phoenix kernel: >>>> RAX: ffff8a1eca367488 RBX: ffff8a1eca367488 RCX: 0000000000000000 Dez = 21 >>>> 10:46:41 Phoenix kernel: RDX: 0000000000000001 RSI: ffff8a1eca364200 >>>> RDI: 00000000ffffffff Dez 21 10:46:41 Phoenix kernel: RBP: >>>> ffff8a1ec81b0000 R08: 0000000000000000 R09: 0000000020000000 Dez 21 >>>> 10:46:41 Phoenix kernel: R10: 0000000000000005 R11: ffffffffffd5ce37 >>>> R12: ffff8a1ec81b1000 Dez 21 10:46:41 Phoenix kernel: R13: >>>> dead000000000122 R14: dead000000000100 R15: ffff8a1eca367400 Dez 21 >>>> 10:46:41 Phoenix kernel: FS: 00007f77003d7500(0000) >>>> GS:ffff8a1ecf400000(0000) knlGS:0000000000000000 Dez 21 10:46:41 Phoen= ix >>>> kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Dez 21 >>>> 10:46:41 Phoenix kernel: CR2: 0000559006e55d68 CR3: 00000003fbaec006 >>>> CR4: 00000000001606f0 Dez 21 10:46:41 Phoenix kernel: Call Trace: >>>> Dez 21 10:46:41 Phoenix kernel: open_ctree+0x187a/0x1bc0 [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: btrfs_mount_root+0x57b/0x670 [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: legacy_get_tree+0x27/0x40 >>>> Dez 21 10:46:41 Phoenix kernel: vfs_get_tree+0x25/0xb0 >>>> Dez 21 10:46:41 Phoenix kernel: fc_mount+0xe/0x30 >>>> Dez 21 10:46:41 Phoenix kernel: vfs_kern_mount.part.0+0x71/0x90 >>>> Dez 21 10:46:41 Phoenix kernel: btrfs_mount+0x18e/0x930 [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: ? filename_lookup+0x105/0x190 >>>> Dez 21 10:46:41 Phoenix kernel: ? legacy_get_tree+0x27/0x40 >>>> Dez 21 10:46:41 Phoenix kernel: ? btrfs_remount+0x4d0/0x4d0 [btrfs] >>>> Dez 21 10:46:41 Phoenix kernel: legacy_get_tree+0x27/0x40 >>>> Dez 21 10:46:41 Phoenix kernel: vfs_get_tree+0x25/0xb0 >>>> Dez 21 10:46:41 Phoenix kernel: do_mount+0x77a/0xa30 >>>> Dez 21 10:46:41 Phoenix kernel: ksys_mount+0x7e/0xc0 >>>> Dez 21 10:46:41 Phoenix kernel: __x64_sys_mount+0x21/0x30 >>>> Dez 21 10:46:41 Phoenix kernel: do_syscall_64+0x4e/0x140 >>>> Dez 21 10:46:41 Phoenix kernel: entry_SYSCALL_64_after_hwframe+0x44/0= xa9 >>>> Dez 21 10:46:41 Phoenix kernel: RIP: 0033:0x7f770055ae4e >>>> Dez 21 10:46:41 Phoenix kernel: Code: 48 8b 0d 35 00 0c 00 f7 d8 64 89= 01 >>>> 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b= 8 >>>> a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 02 00 0c 00 f7 >>>> d8 64 89 01 48 Dez 21 10:46:41 Phoenix kernel: RSP: >>>> 002b:00007ffedb3135c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 Dez = 21 >>>> 10:46:41 Phoenix kernel: RAX: ffffffffffffffda RBX: 00007f7700681204 >>>> RCX: 00007f770055ae4e Dez 21 10:46:41 Phoenix kernel: RDX: >>>> 000055d9705f5650 RSI: 000055d9705f56f0 RDI: 000055d9705f73d0 Dez 21 >>>> 10:46:41 Phoenix kernel: RBP: 000055d9705f5440 R08: 000055d9705f5670 >>>> R09: 0000000000000000 Dez 21 10:46:41 Phoenix kernel: R10: >>>> 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 Dez 21 >>>> 10:46:41 Phoenix kernel: R13: 000055d9705f73d0 R14: 000055d9705f5650 >>>> R15: 000055d9705f5440 Dez 21 10:46:41 Phoenix kernel: ---[ end trace >>>> 71465d442bb4c50a ]--- Dez 21 10:46:41 Phoenix kernel: BTRFS info (devi= ce >>>> sda): space_info 1 has 733175808 free, is not full Dez 21 10:46:41 >>>> Phoenix kernel: BTRFS info (device sda): space_info total=3D1386200694= 784, >>>> used=3D1385467318272, pinned=3D0, reserved=3D4096, may_use=3D0, readon= ly=3D196608 >>>> Dez 21 10:46:41 Phoenix kernel: BTRFS info (device sda): >>>> global_block_rsv: size 0 reserved 0 Dez 21 10:46:41 Phoenix kernel: >>>> BTRFS info (device sda): trans_block_rsv: size 0 reserved 0 Dez 21 >>>> 10:46:41 Phoenix kernel: BTRFS info (device sda): chunk_block_rsv: siz= e >>>> 0 reserved 0 Dez 21 10:46:41 Phoenix kernel: BTRFS info (device sda): >>>> delayed_block_rsv: size 0 reserved 0 Dez 21 10:46:41 Phoenix kernel: >>>> BTRFS info (device sda): delayed_refs_rsv: size 0 reserved 0 Dez 21 >>>> 10:46:41 Phoenix kernel: BTRFS error (device sda): open_ctree failed -= - >>>> Subject: Unit process exited >>>> -- Defined-By: systemd >>>> >>>> Btrfs check --readonly /dev/sda also found errors: >>>> >>>> Opening filesystem to check... >>>> Checking filesystem on /dev/sda >>>> UUID: 014bdf0a-bcb3-4a7c-b58d-c1fc17281f7e >>>> found 1386975199232 bytes used, error(s) found >>>> total csum bytes: 1352697008 >>>> total tree bytes: 1508327424 >>>> total fs tree bytes: 61161472 >>>> total extent tree bytes: 37421056 >>>> btree space waste bytes: 55303865 >>>> file data blocks allocated: 1388605296640 >>>> >>>> referenced 1385670742016 >>>> >>>> Btrfs scrub does not recognize any errors. >>>> >>>> Kindly help me to recover this error. >>>> >>>> many thanks, >>>> >>>> J=C3=B6rg Meyer >=20 >=20 >=20 >=20