On 09.04.2012 23:58, Leho Kraav wrote:
On 09.04.2012 17:54, Daniel J Blueman wrote:
On 9 April 2012 22:44, Leho Kraav<l...@kraav.com> wrote:
And is the previous filesystem still hosed for good then? Or mounting
the
images with -discard might help?
It seems like the kernel caught and prevented the discard after the
end of the partition, so the data should be fine; scrubbing will tell
you.
Without the patch at least, it's BUG time. This is what happens when
mounting the image.
It is also BUG time WITH the patch. Mount succeeds, but "btrfs fi
balance HOME" gives us:
Apr 10 00:24:18 server sudo: pam_unix(sudo:session): session opened for
user root by (uid=1000)
Apr 10 00:24:18 server kernel: [ 363.839105] ------------[ cut here
]------------
Apr 10 00:24:18 server kernel: [ 363.839163] kernel BUG at
fs/btrfs/volumes.c:2733!
Apr 10 00:24:18 server kernel: [ 363.839220] invalid opcode: 0000 [#1]
PREEMPT SMP
Apr 10 00:24:18 server kernel: [ 363.839258] Modules linked in: btrfs
zlib_deflate rfcomm bnep ext4 jbd2 snd_dummy loop fuse crc32c_intel
nvidia(PO) snd_hda_codec_realtek snd_hda_intel snd_hda_c
odec snd_pcm dvb_usb_dib0700 dvb_usb dib0070 dib7000p dibx000_common
imon dvb_core hid_logitech_dj btusb bluetooth hid_logitech rc_core skge
snd_page_alloc snd_timer processor snd r8168(O) butto
n i2c_i801 rtc_cmos usbhid sr_mod cdrom firewire_ohci firewire_core
crc_itu_t uhci_hcd pata_jmicron
Apr 10 00:24:18 server kernel: [ 363.839609]
Apr 10 00:24:18 server kernel: [ 363.839619] Pid: 4682, comm: btrfs
Tainted: P O 3.3.1-vs2.3.3.2+pf #1 Gigabyte Technology Co.,
Ltd. P55M-UD2/P55M-UD2
Apr 10 00:24:18 server kernel: [ 363.839677] EIP: 0060:[<f4f4deff>]
EFLAGS: 00210246 CPU: 1
Apr 10 00:24:18 server kernel: [ 363.839709] EIP is at
btrfs_balance+0xe7f/0xed0 [btrfs]
Apr 10 00:24:18 server kernel: [ 363.839732] EAX: ffffff00 EBX:
ffffffef ECX: 00000003 EDX: 00000303
Apr 10 00:24:18 server kernel: [ 363.839758] ESI: eb868e00 EDI:
00000000 EBP: 00000000 ESP: e8ebbdd8
Apr 10 00:24:18 server kernel: [ 363.839785] DS: 007b ES: 007b FS:
00d8 GS: 0033 SS: 0068
Apr 10 00:24:18 server kernel: [ 363.839809] Process btrfs (pid: 4682,
ti=e8eba000 task=eb2c8ab0 task.ti=e8eba000)
Apr 10 00:24:18 server kernel: [ 363.839839] Stack:
Apr 10 00:24:18 server kernel: [ 363.839850] 00000040 00000001
00000000 00000000 00000000 e8ebbe30 e8ece000 ec713bb4
Apr 10 00:24:18 server kernel: [ 363.839914] 00000097 eb945000
00000097 0000000e 00000000 00000002 00000000 f2f2d3b0
Apr 10 00:24:18 server kernel: [ 363.839987] ec0cdd34 f3153b00
e9240600 ec0cde00 c1094152 c10cbb6b eac98b00 00000001
Apr 10 00:24:18 server kernel: [ 363.840090] Call Trace:
Apr 10 00:24:18 server kernel: [ 363.840109] [<c1094152>] ?
filemap_fault+0x82/0x420
Apr 10 00:24:18 server kernel: [ 363.840132] [<c10cbb6b>] ?
__mem_cgroup_try_charge+0x28b/0x4c0
Apr 10 00:24:18 server kernel: [ 363.840160] [<c10aa619>] ?
__do_fault+0x3c9/0x510
Apr 10 00:24:18 server kernel: [ 363.840183] [<c10c2865>] ?
kmem_cache_alloc+0x75/0x90
Apr 10 00:24:18 server kernel: [ 363.840212] [<f4f53f19>] ?
btrfs_ioctl_balance.isra.52+0x379/0x390 [btrfs]
Apr 10 00:24:18 server kernel: [ 363.840246] [<f4f56230>] ?
update_ioctl_balance_args+0x2e0/0x2e0 [btrfs]
Apr 10 00:24:18 server kernel: [ 363.840280] [<f4f568a1>] ?
btrfs_ioctl+0x671/0x1200 [btrfs]
Apr 10 00:24:18 server kernel: [ 363.840306] [<c10ae1b4>] ?
handle_mm_fault+0x124/0x260
Apr 10 00:24:18 server kernel: [ 363.840334] [<f4f56230>] ?
update_ioctl_balance_args+0x2e0/0x2e0 [btrfs]
Apr 10 00:24:18 server kernel: [ 363.840363] [<c10e01ea>] ?
do_vfs_ioctl+0x7a/0x580
Apr 10 00:24:18 server kernel: [ 363.840386] [<c1020a10>] ?
vmalloc_sync_all+0x10/0x10
Apr 10 00:24:18 server kernel: [ 363.840409] [<c1020b95>] ?
do_page_fault+0x185/0x3d0
Apr 10 00:24:18 server kernel: [ 363.840432] [<c10cf15f>] ?
do_sys_open+0x15f/0x1b0
Apr 10 00:24:18 server kernel: [ 363.840453] [<c10df1e2>] ?
do_fcntl+0x232/0x470
Apr 10 00:24:18 server kernel: [ 363.840475] [<c10e071e>] ?
sys_ioctl+0x2e/0x60
Apr 10 00:24:18 server kernel: [ 363.840497] [<c13c0a4c>] ?
sysenter_do_call+0x12/0x22
Apr 10 00:24:18 server kernel: [ 363.840519] Code: c7 02 e9 ee fe ff ff
c6 07 00 66 ba ff 03 8b 7c 24 60 83 c7 01 e9 cf fe ff ff 31 db e9 70 fe
ff ff 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b <0f> 0b 8b 74 24 7c c7 04 24 9c f7
f7 f4 89 74 24 04 e8 dc ce 46
Apr 10 00:24:18 server kernel: [ 363.840933] EIP: [<f4f4deff>]
btrfs_balance+0xe7f/0xed0 [btrfs] SS:ESP 0068:e8ebbdd8
Apr 10 00:24:18 server kernel: [ 363.841023] ---[ end trace
8be1f61ebfe6132a ]---
~
--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html