From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Yan, Zheng " Subject: Re: Kernel BUG in tree-log.c on mount Date: Fri, 16 Oct 2009 10:07:19 +0800 Message-ID: <3d0408630910151907y2748c5bdv3000a38a982aa25d@mail.gmail.com> References: Mime-Version: 1.0 Content-Type: multipart/mixed; boundary=001636b42e1f1c1f86047603db86 Cc: linux-btrfs@vger.kernel.org To: David Pflug Return-path: In-Reply-To: List-ID: --001636b42e1f1c1f86047603db86 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable On Thu, Oct 15, 2009 at 11:48 AM, David Pflug wrote: > I don't know if there's any useful data in this dump, for you guys. I > can get you the output of btrfs-debug-tree as well, if it'd be > helpful. We never saw this bug before, please send the output of btrfs-debug-tree. Recovering data from this is easy. You can use the attached patch to disabl= e log recovery. mount the FS with modified btrfs driver, then umount. Yan, Zheng > > No idea what caused this. I thought it went through a normal shutdown > and unmount, and btrfsck doesn't report any issues. > > Btrfs loaded > device label archstick devid 1 transid 4802 /dev/sdb2 > btrfs: unlinked 1 orphans > ------------[ cut here ]------------ > kernel BUG at fs/btrfs/tree-log.c:800! > invalid opcode: 0000 [#1] PREEMPT SMP > last sysfs file: /sys/devices/pci0000:00/0000:00:04.0/net/eth0/operstate > Modules linked in: btrfs zlib_deflate crc32c libcrc32c sr_mod cdrom > usb_storage tun ipv6 snd_seq_dummy snd_wavefront snd_seq_oss battery > snd_seq_midi_event snd_cs4236 snd_intel8x0 snd_wss_lib snd_opl3_lib > analog snd_seq snd_ac97_codec ac97_bus snd_pcm_oss snd_hwdep snd_pcm > snd_mixer_oss ppdev snd_timer i2c_sis96x ohci_hcd lp ac ns558 pcspkr > gameport parport_pc snd_mpu401 snd_mpu401_uart ehci_hcd shpchp > snd_rawmidi snd_seq_device sis_agp snd i2c_core fan psmouse usbcore > serio_raw parport evdev soundcore snd_page_alloc pci_hotplug sg button > thermal sis900 processor agpgart mii rtc_cmos rtc_core rtc_lib ext4 > mbcache jbd2 crc16 sd_mod ata_generic pata_acpi pata_sis libata > scsi_mod floppy > > Pid: 1709, comm: mount Not tainted (2.6.31-ARCH #1) > EIP: 0060:[] EFLAGS: 00010246 CPU: 0 > EIP is at add_inode_ref+0x497/0x4b0 [btrfs] > EAX: 00000000 EBX: 00000097 ECX: de59c810 EDX: 00000000 > ESI: de59c3ec EDI: de5a2af0 EBP: ed0ffd2c ESP: ed0ffbb8 > =A0DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 > Process mount (pid: 1709, ti=3Ded0fe000 task=3Dece30c60 task.ti=3Ded0fe00= 0) > Stack: > =A0bdada5e8 00000000 00000000 ed0ffc10 ed0ffc0c ed0ffc04 00000004 bdada5e= 8 > <0> ed0ffc63 bdada5e8 ecd83800 f6d650e0 ecd80800 ed0ffc10 ed0ffc0c ed0ffc= 08 > <0> de59c3ec de5a2af0 de5a7000 00000000 00000000 eadc1000 00000002 bdada5= e8 > Call Trace: > =A0[] ? replay_one_buffer+0x26f/0x3b0 [btrfs] > =A0[] ? walk_down_log_tree+0x3c4/0x570 [btrfs] > =A0[] ? replay_one_buffer+0x0/0x3b0 [btrfs] > =A0[] ? walk_log_tree+0xb7/0x200 [btrfs] > =A0[] ? btrfs_recover_log_trees+0x244/0x330 [btrfs] > =A0[] ? replay_one_buffer+0x0/0x3b0 [btrfs] > =A0[] ? open_ctree+0xe9a/0x13a0 [btrfs] > =A0[] ? strlcpy+0x2b/0x80 > =A0[] ? btrfs_get_sb+0x3b1/0x480 [btrfs] > =A0[] ? pcpu_alloc+0x455/0x490 > =A0[] ? alloc_vfsmnt+0x8a/0x150 > =A0[] ? alloc_vfsmnt+0xef/0x150 > =A0[] ? vfs_kern_mount+0x75/0x160 > =A0[] ? do_kern_mount+0x56/0x120 > =A0[] ? do_mount+0x257/0x7a0 > =A0[] ? copy_mount_options+0x61/0x160 > =A0[] ? sys_mount+0x9b/0x100 > =A0[] ? sysenter_do_call+0x12/0x28 > Code: 44 24 4c e8 8c 49 9e c8 31 c0 8b 54 24 5c 65 33 15 14 00 00 00 > 75 24 83 c4 60 5b 5e 5f 5d c3 0f 0b eb fe 0f 0b eb fe 0f 0b eb fe <0f> > 0b eb fe 0f 0b eb fe 0f 0b eb fe 0f 0b eb fe e8 a4 28 92 c8 > EIP: [] add_inode_ref+0x497/0x4b0 [btrfs] SS:ESP 0068:ed0ffbb8 > ---[ end trace 535e961ea446e6c7 ]--- > -- > To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at =A0http://vger.kernel.org/majordomo-info.html > --001636b42e1f1c1f86047603db86 Content-Type: application/octet-stream; name=patch Content-Disposition: attachment; filename=patch Content-Transfer-Encoding: base64 X-Attachment-Id: f_g0uat4g80 ZGlmZiAtdXJwIDEvZnMvYnRyZnMvZGlzay1pby5jIDIvZnMvYnRyZnMvZGlzay1pby5jCi0tLSAx L2ZzL2J0cmZzL2Rpc2staW8uYwkyMDA5LTEwLTE1IDA5OjMzOjE3LjgxMTQyMzc1NCArMDgwMAor KysgMi9mcy9idHJmcy9kaXNrLWlvLmMJMjAwOS0xMC0xNiAwOTo1Mzo0Mi45MzY0ODY1NjkgKzA4 MDAKQEAgLTE5NDMsNyArMTk0Myw3IEBAIHN0cnVjdCBidHJmc19yb290ICpvcGVuX2N0cmVlKHN0 cnVjdCBzdXAKIAkJYnRyZnNfc2V0X29wdChmc19pbmZvLT5tb3VudF9vcHQsIFNTRCk7CiAJfQog Ci0JaWYgKGJ0cmZzX3N1cGVyX2xvZ19yb290KGRpc2tfc3VwZXIpICE9IDApIHsKKwlpZiAoMCAm JiBidHJmc19zdXBlcl9sb2dfcm9vdChkaXNrX3N1cGVyKSAhPSAwKSB7CiAJCXU2NCBieXRlbnIg PSBidHJmc19zdXBlcl9sb2dfcm9vdChkaXNrX3N1cGVyKTsKIAogCQlpZiAoZnNfZGV2aWNlcy0+ cndfZGV2aWNlcyA9PSAwKSB7Cg== --001636b42e1f1c1f86047603db86--