[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#631976: kernel BUG when mounting btrfs volume



Package: linux-image-2.6.32-5-486

I'm seeing a kernel bug when trying to mount a btrfs volume.

I see the same bug when i boot with 2.6.39-2-686-pae, fwiw, though i
have only been able to transcribe it thus far with 2.6.32-5-486.  This
is on standard x86 hardware (a Dell Dimension 4500S desktop machine):

[  277.859243] device fsid 79440663a654fc14-ff2c4fbce89e5eb5 devid 1 transid 90154 /dev/sda2
[  279.295469] ------------[ cut here ]------------
[  279.298762] kernel BUG at /build/buildd-linux-2.6_2.6.32-30-i386-UYhWt7/linux-2.6-2.6.32/debian/build/source_i386_none/fs/btrfs/tree-log.c:809!
[  279.298762] invalid opcode: 0000 [#1] 
[  279.298762] last sysfs file: /sys/devices/virtual/bdi/btrfs-1/uevent
[  279.298762] Modules linked in: nls_utf8 nls_cp437 vfat fat usb_storage btrfs zlib_deflate crc32c libcrc32c ftdi_sio usbserial usbhid hid dm_crypt dm_mod sg sr_mod cdrom sd_mod crc_t10dif snd_intel8x0 ata_generic e100 i915 snd_ac97_codec tulip mii ac97_bus drm_kms_helper snd_pcm uhci_hcd snd_timer drm ata_piix i2c_algo_bit evdev snd libata shpchp i2c_i801 soundcore parport_pc video parport button dcdbas processor psmouse serio_raw ehci_hcd thermal pcspkr scsi_mod snd_page_alloc i2c_core rng_core pci_hotplug usbcore nls_base thermal_sys output
[  279.298762] 
[  279.298762] Pid: 1215, comm: mount Not tainted (2.6.32-5-486 #1) Dimension 4500S              
[  279.298762] EIP: 0060:[<f8aadbdf>] EFLAGS: 00010246 CPU: 0
[  279.298762] EIP is at add_inode_ref+0x4d/0x3a2 [btrfs]
[  279.298762] EAX: 00000000 EBX: 00000097 ECX: c10a21af EDX: 0000008d
[  279.298762] ESI: c5049d80 EDI: c5049ee8 EBP: c5651800 ESP: c5453c80
[  279.298762]  DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[  279.298762] Process mount (pid: 1215, ti=c5452000 task=c550cc30 task.ti=c5452000)
[  279.298762] Stack:
[  279.298762]  c5651400 c504e000 c505a56c 00000000 c5453cb4 00000011 c5049ee8 000000ac
[  279.298762] <0> f8a96649 00000002 00000097 c5049d80 c5049ee8 00000002 f8aaeb9b c504b0e0
[  279.298762] <0> c5049ee8 00000002 c5453ce7 c5453d94 c5651400 00000009 c504b0e0 c5651800
[  279.298762] Call Trace:
[  279.298762]  [<f8a96649>] ? btrfs_item_size+0x93/0x9d [btrfs]
[  279.298762]  [<f8aaeb9b>] ? replay_one_buffer+0x1c9/0x24d [btrfs]
[  279.298762]  [<f8aac688>] ? walk_down_log_tree+0x13e/0x3a3 [btrfs]
[  279.298762]  [<f8aac95f>] ? walk_log_tree+0x72/0x178 [btrfs]
[  279.298762]  [<f8aad6fc>] ? btrfs_recover_log_trees+0x158/0x23e [btrfs]
[  279.298762]  [<f8aae9d2>] ? replay_one_buffer+0x0/0x24d [btrfs]
[  279.298762]  [<f8a87770>] ? open_ctree+0xddf/0x1045 [btrfs]
[  279.298762]  [<c1113870>] ? strlcpy+0x11/0x3d
[  279.298762]  [<f8a712b5>] ? btrfs_get_sb+0x22c/0x3c4 [btrfs]
[  279.298762]  [<c1091845>] ? __kmalloc_track_caller+0x11f/0x12b
[  279.298762]  [<c107b3d6>] ? kstrdup+0x24/0x3e
[  279.298762]  [<c10958d0>] ? vfs_kern_mount+0x85/0x11c
[  279.298762]  [<c10959a5>] ? do_kern_mount+0x2f/0xb8
[  279.298762]  [<c10a5ba3>] ? do_mount+0x588/0x5de
[  279.298762]  [<c1115ebf>] ? copy_from_user+0x27/0x10e
[  279.298762]  [<c10a5c5f>] ? sys_mount+0x66/0x97
[  279.298762]  [<c100314c>] ? syscall_call+0x7/0xb
[  279.298762] Code: 44 24 08 b8 fe ff ff ff 83 7c 24 08 00 0f 84 65 03 00 00 8b 44 24 48 8b 10 8b 48 04 89 e8 e8 8e ee ff ff 85 c0 89 44 24 0c 75 04 <0f> 0b eb fe 6b 44 24 44 19 8d 58 65 8b 44 24 40 89 da e8 5d 8a 
[  279.298762] EIP: [<f8aadbdf>] add_inode_ref+0x4d/0x3a2 [btrfs] SS:ESP 0068:c5453c80
[  279.563984] ---[ end trace 161cef534dc1a9ad ]---


Regards,

           --dkg



Reply to: