On 12 April 2011 00:07, Daniel J Blueman <daniel.blue...@gmail.com> wrote:
> On 11 April 2011 23:32, Josef Bacik <jo...@redhat.com> wrote:
>> On 04/10/2011 04:29 AM, Daniel J Blueman wrote:
>>>
>>> When rebooting from a crash, thus during log replay on 2.6.29-rc2,
>>> btrfs_insert_dir_item caused an assertion failure [1]. The fs was
>>> being mounted clear_cache on an SSD.
>>>
>>> Probably it's not so easy to reproduce, but better to report it...
>>>
>>
>> Do you still have this fs, and does it still panic the same way on mount?
>>  Thanks,
>
> I still have this fs, though it didn't panic at next mount. I guess
> this creates a case for cooking a script that eg logically disconnects
> a block device during activity (hdparm or echo 1 >delete) then
> reconnects it for remount...let me know if interested.

I've hit this a few times recently following a crash in 2.6.39-rc (eg
with -rc6 [1]) and have found the only way to access the data is mount
-o ro,notreelog.

I guess btrfs_insert_dir_item is failing due to corruption of the
directory inode. The only solution here would be to gracefully discard
the log item being replayed and print a warning that the filesystem
has corruption, right?

Daniel

--- [1]

kernel BUG at fs/btrfs/inode.c:4676!
invalid opcode: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
last sysfs file: /sys/devices/virtual/bdi/btrfs-2/uevent
CPU 1
Modules linked in: binfmt_misc kvm_intel kvm arc4 ecb uvcvideo
videodev v4l2_compat_ioctl32 microcode i915 iwlagn sdhci_pci sdhci
drm_kms_helper mac80211 drm i2c_algo_bit mmc_core video

Pid: 1372, comm: mount Tainted: G   M        2.6.39-rc6-330cd+ #3 Dell
Inc. Latitude E5420/0H5TG2
RIP: 0010:[<ffffffff812a3262>]  [<ffffffff812a3262>] btrfs_add_link+0x132/0x190
RSP: 0018:ffff8802102fd7b8  EFLAGS: 00010282
RAX: 00000000ffffffef RBX: ffff880212594860 RCX: 0000000000000040
RDX: 00000000ffffffef RSI: 0000000000000000 RDI: ffffffff8112e413
RBP: ffff8802102fd828 R08: 0000000000000000 R09: ffff88022d732090
R10: 0000000000000025 R11: 0000000000000000 R12: ffff8802124cd010
R13: ffff88020dc48000 R14: 000000000000000f R15: ffff88021dcbc000
FS:  00007f58dc76b800(0000) GS:ffff88022ec20000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00007f7a5adeb110 CR3: 000000020e2e9000 CR4: 00000000000406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process mount (pid: 1372, threadinfo ffff8802102fc000, task ffff88021e5ec020)
Stack:
 ffff880200000001 0000000000001ab8 ffff8802102fd958 0000000000001ab8
 000000000015d5c1 0000000000000001 0000000000001000 0000000000000000
 ffff88020dc25000 0000000000000000 000000000000007e ffff8802102fdac8
Call Trace:
 [<ffffffff812cd595>] add_inode_ref+0x2f5/0x3b0
 [<ffffffff81059261>] ? get_parent_ip+0x11/0x50
 [<ffffffff812cea46>] replay_one_buffer+0x2c6/0x3a0
 [<ffffffff8112d126>] ? init_object+0x46/0x80
 [<ffffffff81059261>] ? get_parent_ip+0x11/0x50
 [<ffffffff812cb3c8>] walk_up_log_tree+0x168/0x320
 [<ffffffff812ce780>] ? replay_one_dir_item+0xe0/0xe0
 [<ffffffff812cbbd8>] walk_log_tree+0xe8/0x290
 [<ffffffff8109a59d>] ? trace_hardirqs_on+0xd/0x10
 [<ffffffff812d0a50>] btrfs_recover_log_trees+0x220/0x320
 [<ffffffff812ce780>] ? replay_one_dir_item+0xe0/0xe0
 [<ffffffff81295ca1>] open_ctree+0x1301/0x16b0
 [<ffffffff81332504>] ? snprintf+0x34/0x40
 [<ffffffff81270873>] btrfs_fill_super.clone.14+0x73/0x130
 [<ffffffff811a4ebf>] ? disk_name+0x5f/0xc0
 [<ffffffff8132f9c7>] ? strlcpy+0x47/0x60
 [<ffffffff81270cdf>] btrfs_mount+0x3af/0x450
 [<ffffffff811442eb>] mount_fs+0x1b/0xd0
 [<ffffffff8116027e>] vfs_kern_mount+0x5e/0xd0
 [<ffffffff8116080f>] do_kern_mount+0x4f/0x100
 [<ffffffff81162264>] do_mount+0x1e4/0x220
 [<ffffffff8116264b>] sys_mount+0x8b/0xe0
 [<ffffffff8170927b>] system_call_fastpath+0x16/0x1b
Code: 4c 89 d2 44 89 f1 4c 89 ee 4c 89 1c 24 4c 89 55 a8 4c 89 5d a0
e8 df c4 fe ff 4c 8b 5d a0 4c 8b 55 a8 85 c0 75 bc e9 31 ff ff ff <0f>
0b 48 8b b2 d0 fc ff ff 48 8d 7d b0 b9 11 00 00 00 4d 89 d9
RIP  [<ffffffff812a3262>] btrfs_add_link+0x132/0x190
 RSP <ffff8802102fd7b8>
-- 
Daniel J Blueman
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to