I recently had a power failure, and ever since I have been unable to mount one of my btrfs drives (data is the one that is failing to mount, store is fine). I’m running:
jkeane@bet:~$ uname -a Linux bet 3.8.0-33-generic #48-Ubuntu SMP Wed Oct 23 09:16:58 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux jkeane@bet:~$ btrfs --version Btrfs v3.12 jkeane@bet:~$ sudo btrfs fi show -d Label: 'store' uuid: 91f14b43-16d6-4411-9f0c-48b7959c6e48 Total devices 2 FS bytes used 684.82GiB devid 1 size 1.82TiB used 688.03GiB path /dev/sdd devid 2 size 1.82TiB used 688.01GiB path /dev/sde Label: 'data' uuid: f526f5d4-591a-4983-90e8-57ec5d991951 Total devices 2 FS bytes used 1.72TiB devid 1 size 3.64TiB used 1.73TiB path /dev/sdb devid 2 size 3.64TiB used 1.73TiB path /dev/sdc Btrfs v3.12 When I try and mount the drive, I get the following errors: Sep 9 10:11:38 bet kernel: [ 1487.751656] device label data devid 1 transid 42367 /dev/sdb Sep 9 10:11:38 bet kernel: [ 1487.776604] btrfs: enabling auto recovery Sep 9 10:11:38 bet kernel: [ 1487.776618] btrfs: disabling disk space caching Sep 9 10:11:38 bet sec[1462]: Feeding event 'Wed Sep 9 10:11:38 2015: Sep 9 10:11:38 bet kernel: [ 1487.776604] btrfs: enabling auto recovery' to shell command '/usr/bin/mail -s "sec: Btrfs unexpected log" root' Sep 9 10:11:38 bet sec[1462]: Child 5492 created for command '/usr/bin/mail -s "sec: Btrfs unexpected log" root' Sep 9 10:11:38 bet postfix/pickup[2127]: F36183606EF: uid=0 from=<root@bet> Sep 9 10:11:39 bet postfix/cleanup[5498]: F36183606EF: message-id=<20150909151138.F36183606EF@bet.localdomain> Sep 9 10:11:39 bet postfix/qmgr[2128]: F36183606EF: from=<root@bet.localdomain>, size=455, nrcpt=1 (queue active) Sep 9 10:11:39 bet postfix/local[5500]: warning: dict_nis_init: NIS domain name not set - NIS lookups disabled Sep 9 10:11:39 bet postfix/local[5500]: F36183606EF: to=<root@bet.localdomain>, orig_to=<root@bet>, relay=local, delay=0.06, delays=0.03/0.02/0/0, dsn=2.0.0, status=sent (delivered to mailbox) Sep 9 10:11:39 bet postfix/qmgr[2128]: F36183606EF: removed Sep 9 10:12:06 bet kernel: [ 1515.313696] ------------[ cut here ]------------ Sep 9 10:12:06 bet kernel: [ 1515.313708] Kernel BUG at ffffffffa01472c7 [verbose debug info unavailable] Sep 9 10:12:06 bet kernel: [ 1515.313714] invalid opcode: 0000 [#1] SMP Sep 9 10:12:06 bet kernel: [ 1515.313721] Modules linked in: rfcomm bnep binfmt_misc(F) snd_hda_codec_hdmi hid_generic kvm_amd(F) kvm(F) microcode(F) serio_raw(F) k10temp edac_core edac_mce_amd usbhid hid sp5100_tco i2c_piix4 snd_hda_codec_via btusb snd_hda_intel snd_hda_codec bluetooth snd_hwdep(F) snd_pcm(F) snd_page_alloc(F) snd_seq_midi(F) snd_seq_midi_event(F) snd_rawmidi(F) snd_seq(F) snd_seq_device(F) snd_timer(F) snd(F) nvidia(POF) drm soundcore(F) asus_atk0110 wmi mac_hid parport_pc(F) ppdev(F) shpchp lp(F) parport(F) btrfs(F) zlib_deflate(F) libcrc32c(F) raid10(F) raid456(F) async_raid6_recov(F) async_memcpy(F) async_pq(F) async_xor(F) xor(F) async_tx(F) pata_acpi psmouse(F) pata_atiixp r8169 raid6_pq(F) raid1(F) raid0(F) ahci(F) libahci(F) multipath(F) linear(F) Sep 9 10:12:06 bet kernel: [ 1515.313808] CPU 1 Sep 9 10:12:06 bet kernel: [ 1515.313818] Pid: 5477, comm: mount Tainted: PF O 3.8.0-33-generic #48-Ubuntu System manufacturer System Product Name/M4A77TD Sep 9 10:12:06 bet kernel: [ 1515.313824] RIP: 0010:[<ffffffffa01472c7>] [<ffffffffa01472c7>] remove_from_bitmap+0x1b7/0x1c0 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.313873] RSP: 0018:ffff88011b6df7a8 EFLAGS: 00010287 Sep 9 10:12:06 bet kernel: [ 1515.313878] RAX: 000001a061e3a000 RBX: ffff880111d5fdc0 RCX: ffff880106c352e4 Sep 9 10:12:06 bet kernel: [ 1515.313883] RDX: 000000000000a000 RSI: 0000000000008000 RDI: 0000000000003dc0 Sep 9 10:12:06 bet kernel: [ 1515.313887] RBP: ffff88011b6df7f0 R08: ffff8801190ad850 R09: 0000000000004240 Sep 9 10:12:06 bet kernel: [ 1515.313892] R10: ffffea0004c5d2c0 R11: ffffffffa00f3044 R12: ffff880106c352c0 Sep 9 10:12:06 bet kernel: [ 1515.313896] R13: ffff88011b6df810 R14: ffff88011b6df808 R15: 000001a065c00000 Sep 9 10:12:06 bet kernel: [ 1515.313902] FS: 00007f2bad846880(0000) GS:ffff880137c40000(0000) knlGS:00000000f73a8700 Sep 9 10:12:06 bet kernel: [ 1515.313907] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b Sep 9 10:12:06 bet kernel: [ 1515.313911] CR2: 00007f2ca5144000 CR3: 0000000119699000 CR4: 00000000000007e0 Sep 9 10:12:06 bet kernel: [ 1515.313916] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Sep 9 10:12:06 bet kernel: [ 1515.313921] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Sep 9 10:12:06 bet kernel: [ 1515.313926] Process mount (pid: 5477, threadinfo ffff88011b6de000, task ffff88012dab45c0) Sep 9 10:12:06 bet kernel: [ 1515.313929] Stack: Sep 9 10:12:06 bet kernel: [ 1515.313933] 0000000000000000 ffff880106c352e4 000001a061e3c000 000000000000a000 Sep 9 10:12:06 bet kernel: [ 1515.313942] ffff880106c352c0 ffff880106c352e4 0000000000000001 ffff880121da6200 Sep 9 10:12:06 bet kernel: [ 1515.313949] ffff8801090a8000 ffff88011b6df840 ffffffffa0148c03 ffffffff8107df00 Sep 9 10:12:06 bet kernel: [ 1515.313957] Call Trace: Sep 9 10:12:06 bet kernel: [ 1515.314000] [<ffffffffa0148c03>] btrfs_remove_free_space+0x53/0x280 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314010] [<ffffffff8107df00>] ? finish_wait+0x80/0x80 Sep 9 10:12:06 bet kernel: [ 1515.314043] [<ffffffffa00faff7>] btrfs_alloc_logged_file_extent+0x1b7/0x1d0 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314082] [<ffffffffa01431a7>] replay_one_extent+0x657/0x6c0 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314122] [<ffffffffa0143efb>] replay_one_buffer+0x2ab/0x350 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314161] [<ffffffffa0129ff7>] ? alloc_extent_buffer+0x97/0x400 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314200] [<ffffffffa0124d8c>] ? check_buffer_tree_ref+0x3c/0x50 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314239] [<ffffffffa013f962>] walk_down_log_tree+0x212/0x400 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314277] [<ffffffffa013fbed>] walk_log_tree+0x9d/0x1f0 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314313] [<ffffffffa0108093>] ? btrfs_read_fs_root_no_name+0x1d3/0x310 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314352] [<ffffffffa0145d85>] btrfs_recover_log_trees+0x215/0x390 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314391] [<ffffffffa0143c50>] ? fixup_inode_link_counts+0x150/0x150 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314427] [<ffffffffa010aadc>] open_ctree+0x171c/0x1da0 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314438] [<ffffffff8133275a>] ? disk_name+0xba/0xc0 Sep 9 10:12:06 bet kernel: [ 1515.314465] [<ffffffffa00e3a83>] btrfs_mount+0x613/0x750 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314476] [<ffffffff81173e68>] ? alloc_pages_current+0xb8/0x180 Sep 9 10:12:06 bet kernel: [ 1515.314488] [<ffffffff811985e3>] mount_fs+0x43/0x1b0 Sep 9 10:12:06 bet kernel: [ 1515.314498] [<ffffffff811b2fb4>] vfs_kern_mount+0x74/0x110 Sep 9 10:12:06 bet kernel: [ 1515.314506] [<ffffffff811b5501>] do_mount+0x211/0xa40 Sep 9 10:12:06 bet kernel: [ 1515.314516] [<ffffffff811b5dbe>] sys_mount+0x8e/0xe0 Sep 9 10:12:06 bet kernel: [ 1515.314525] [<ffffffff816d5f5d>] system_call_fastpath+0x1a/0x1f Sep 9 10:12:06 bet kernel: [ 1515.314528] Code: 0f 1f 40 00 31 c0 48 83 7b 20 00 75 e4 48 89 de 4c 89 e7 89 45 b8 e8 39 fb ff ff 8b 45 b8 eb d1 0f 1f 40 00 b8 ea ff ff ff eb c6 <0f> 0b 0f 1f 80 00 00 00 00 66 66 66 66 90 55 48 89 e5 41 57 41 Sep 9 10:12:06 bet kernel: [ 1515.314599] RIP [<ffffffffa01472c7>] remove_from_bitmap+0x1b7/0x1c0 [btrfs] Sep 9 10:12:06 bet kernel: [ 1515.314635] RSP <ffff88011b6df7a8> Sep 9 10:12:06 bet kernel: [ 1515.314641] ---[ end trace 4e44f84737630072 ]--- Many of these look similar to the ones described at https://btrfs.wiki.kernel.org/index.php/Btrfs-zero-log I have not yet tried zeroing the log, because I’m not seeing all of the messages that are specific on the FAQ. I suspect that is what I need to do, but I wanted to check here first. Please let me know if there is any more information I can provide to help track this down. Thanks! -Jon -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html