kernel BUG at extent-tree.c:3162 (get_restripe_target)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I'm consistently hitting the BUG_ON in the new get_restripe_target
function that was added by "[PATCH 4/8] Btrfs: add
get_restripe_target() helper" when trying to initially mount a btrfs
partition.

Lines fs/btrfs/extent-tree.c:3161-3162:

	BUG_ON(!mutex_is_locked(&fs_info->volume_mutex) &&
	       !spin_is_locked(&fs_info->balance_lock));

The kernel is a 3.3.1 kernel merged with the for-linus branch (for the
3.4_rc kernel) of Chris Mason's git repo.

If I boot with an older 3.2.10 kernel (which was merged with the
3.3_rc for-linus branch), the partition mounts without error, and
btrfsck reports no errors.

The partition seems to behave normally under use on the 3.2.10 kernel.

This computer has gone through a few hard reboots recently.  I'm not
sure if the hard reboots have left some inconsistencies, but if so,
they are not showing up on the 3.2.10 kernel.

[   66.233463] device fsid 43129e18-c745-476c-ba48-c6bea0d71e56 devid
1 transid 151 /dev/sdc1
[   66.235090] btrfs: force lzo compression
[   66.235097] btrfs: enabling auto defrag
[   66.235099] btrfs: disk space caching is enabled
[   66.310693] ------------[ cut here ]------------
[   66.310802] kernel BUG at fs/btrfs/extent-tree.c:3162!
[   66.310905] invalid opcode: 0000 [#1]
[   66.311042] Modules linked in:
[   66.311178]
[   66.311274] Pid: 2993, comm: mount Not tainted 3.3.1-git-local+ #1
  /MS-6570
[   66.311549] EIP: 0060:[<c12db3f6>] EFLAGS: 00010246 CPU: 0
[   66.311573] EIP is at get_restripe_target+0x86/0x90
[   66.311573] EAX: 00000001 EBX: 00000001 ECX: 00000000 EDX: 00000001
[   66.311573] ESI: 00010000 EDI: f6227780 EBP: f4d9dc80 ESP: f4d9dc7c
[   66.311573]  DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[   66.311573] Process mount (pid: 2993, ti=f4d9c000 task=f5f5e180
task.ti=f4d9c000)
[   66.311573] Stack:
[   66.311573]  00000001 f4d9dca4 c12e1693 00000000 00000000 00000001
00000000 f6379000
[   66.311573]  f31d0000 f61b5400 f4d9dcb0 c12e1797 00000001 f4d9dd38
c12e8a3a f31d0000
[   66.311573]  00000000 00000000 00000000 f4d9dd28 f31d0000 f61b5400
00000033 f61b5510
[   66.311573] Call Trace:
[   66.311573]  [<c12e1693>] btrfs_reduce_alloc_profile+0x43/0xe0
[   66.311573]  [<c12e1797>] get_alloc_profile+0x67/0x70
[   66.311573]  [<c12e8a3a>] btrfs_read_block_groups+0x4fa/0x650
[   66.311573]  [<c12f40d0>] open_ctree+0x10e0/0x18b0
[   66.311573]  [<c12d2271>] btrfs_mount+0x501/0x8e0
[   66.311573]  [<c10a5055>] ? free_pages_prepare+0xc5/0x120
[   66.311573]  [<c10a6815>] ? __free_pages+0x25/0x30
[   66.311573]  [<c10a684f>] ? free_pages+0x2f/0x40
[   66.311573]  [<c10d67d5>] mount_fs+0x35/0x180
[   66.311573]  [<c10b540e>] ? kstrdup+0x3e/0x50
[   66.311573]  [<c10eab4b>] vfs_kern_mount+0x4b/0xb0
[   66.311573]  [<c10ead09>] do_kern_mount+0x39/0xd0
[   66.311573]  [<c10ec48a>] do_mount+0x58a/0x670
[   66.311573]  [<c10a6066>] ? __get_free_pages+0x26/0x30
[   66.311573]  [<c10ebde9>] ? copy_mount_options+0x39/0x110
[   66.311573]  [<c10ec5f6>] sys_mount+0x66/0xa0
[   66.311573]  [<c1789293>] sysenter_do_call+0x12/0x22
[   66.311573] Code: b6 00 00 00 00 31 c0 31 d2 83 e3 04 74 cc f6 81
cd 00 00 00 01 74 c3 8b 99 c4 00 00 00 8b 91 c8 00 00 00 89 d8 83 c8
04 5b 5d c3 <0f> 0b 90 8d b4 26 00 00 00 00 55 8d 88 f0 fe ff ff 89 e5
53 8b
[   66.311573] EIP: [<c12db3f6>] get_restripe_target+0x86/0x90 SS:ESP
0068:f4d9dc7c
[   66.318545] ---[ end trace 0c923804dee2b085 ]---
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Filesystem Development]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux