Bug 975506 - [abrt] kernel BUG at fs/btrfs/free-space-cache.c:1567!
[abrt] kernel BUG at fs/btrfs/free-space-cache.c:1567!
Status: CLOSED DUPLICATE of bug 953443
Product: Fedora
Classification: Fedora
Component: kernel (Show other bugs)
18
x86_64 Unspecified
unspecified Severity unspecified
: ---
: ---
Assigned To: Kernel Maintainer List
Fedora Extras Quality Assurance
abrt_hash:06b8b2ba63b91fea26b1a179d28...
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2013-06-18 11:51 EDT by Bob McCarthy
Modified: 2013-07-01 09:31 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-07-01 09:31:32 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
File: dmesg (92.62 KB, text/plain)
2013-06-18 11:51 EDT, Bob McCarthy
no flags Details

  None (edit)
Description Bob McCarthy 2013-06-18 11:51:19 EDT
Description of problem:
Reboot system, cannot mount volume

Additional info:
reporter:       libreport-2.1.5
kernel BUG at fs/btrfs/free-space-cache.c:1567!
invalid opcode: 0000 [#1] SMP 
Modules linked in: joydev tcp_lp ip6table_filter ip6_tables ebtable_nat ebtables fuse ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack xt_CHECKSUM iptable_mangle bnep lockd bridge sunrpc bluetooth stp rfkill llc be2iscsi iscsi_boot_sysfs bnx2i cnic uio cxgb4i cxgb4 cxgb3i cxgb3 mdio libcxgbi ib_iser rdma_cm ib_addr iw_cm ib_cm ib_sa ib_mad ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ses bnx2 shpchp iTCO_wdt iTCO_vendor_support mperf coretemp i7300_edac edac_core serio_raw enclosure lpc_ich mfd_core dcdbas microcode vhost_net tun macvtap macvlan kvm_intel kvm uinput binfmt_misc btrfs zlib_deflate raid6_pq libcrc32c xor radeon i2c_algo_bit drm_kms_helper ttm drm i2c_core megaraid_sas
CPU 9 <4>[ 9206.259162] Pid: 7342, comm: mount Not tainted 3.9.5-201.fc18.x86_64 #1 Dell Inc. PowerEdge R900/0X947H
RIP: 0010:[<ffffffffa01f6b27>]  [<ffffffffa01f6b27>] remove_from_bitmap+0x1b7/0x1d0 [btrfs]
RSP: 0018:ffff880fe57836e8  EFLAGS: 00010287
RAX: 0000000e12159000 RBX: ffff880f2d0edcc0 RCX: ffff880fe5e69424
RDX: 0000000000002000 RSI: 0000000000008000 RDI: 0000000000007a80
RBP: ffff880fe5783738 R08: ffff880fcb0a00b0 R09: 0000000000000580
R10: ffff880f2d0ecea0 R11: ffff880fdfc95ffc R12: ffff880fe5e69400
R13: ffff880fe5783760 R14: ffff880fe5783758 R15: 0000000e19c00000
FS:  00007f41c2e21840(0000) GS:ffff880fff320000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000001d66ae0 CR3: 0000000f257b6000 CR4: 00000000000007e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process mount (pid: 7342, threadinfo ffff880fe5782000, task ffff880fb39c1770)
Stack:
 ffff880fe1a9c6c0 ffff880fe5e69424 0000000e12181000 0000000000002000
 ffff880fe5783738 ffff880fe5e69400 ffff880fe5e69424 0000000000000000
 ffff880fba4f2b00 ffff880fd7db3000 ffff880fe5783788 ffffffffa01f8923
Call Trace:
 [<ffffffffa01f8923>] btrfs_remove_free_space+0x53/0x280 [btrfs]
 [<ffffffffa01a725f>] btrfs_alloc_logged_file_extent+0x1bf/0x1e0 [btrfs]
 [<ffffffffa01933ea>] ? btrfs_free_path+0x2a/0x40 [btrfs]
 [<ffffffffa01f21e7>] replay_one_extent+0x627/0x6a0 [btrfs]
 [<ffffffffa01c9ed4>] ? btrfs_destroy_inode+0x1c4/0x2e0 [btrfs]
 [<ffffffffa01f2fcb>] replay_one_buffer+0x2db/0x3a0 [btrfs]
 [<ffffffffa01d3591>] ? mark_extent_buffer_accessed+0x51/0x70 [btrfs]
 [<ffffffffa01eec5b>] walk_up_log_tree+0xcb/0x230 [btrfs]
 [<ffffffffa01ef261>] walk_log_tree+0xb1/0x1e0 [btrfs]
 [<ffffffffa01f5abb>] btrfs_recover_log_trees+0x21b/0x3a0 [btrfs]
 [<ffffffffa01f2cf0>] ? fixup_inode_link_counts+0x150/0x150 [btrfs]
 [<ffffffffa01b72e8>] open_ctree+0x1808/0x1f00 [btrfs]
 [<ffffffff812eaa91>] ? disk_name+0x61/0xc0
 [<ffffffffa018fadc>] btrfs_mount+0x62c/0x770 [btrfs]
 [<ffffffff8118a0d5>] ? __kmalloc_track_caller+0x55/0x250
 [<ffffffff811a3bf3>] mount_fs+0x43/0x1b0
 [<ffffffff811562c0>] ? __alloc_percpu+0x10/0x20
 [<ffffffff811bd26f>] vfs_kern_mount+0x6f/0x100
 [<ffffffff811bf6b9>] do_mount+0x259/0xa20
 [<ffffffff811506cb>] ? memdup_user+0x4b/0x90
 [<ffffffff8115076b>] ? strndup_user+0x5b/0x80
 [<ffffffff811bff0e>] sys_mount+0x8e/0xe0
 [<ffffffff8166a2d9>] system_call_fastpath+0x16/0x1b
Code: 86 0f 1f 00 31 c0 48 83 7b 20 00 75 ce 48 89 de 4c 89 e7 89 45 b0 e8 09 fe ff ff 8b 45 b0 eb bb 0f 1f 40 00 b8 ea ff ff ff eb b0 <0f> 0b e8 3a b9 02 00 e8 2f b9 02 00 66 66 66 66 2e 0f 1f 84 00 
RIP  [<ffffffffa01f6b27>] remove_from_bitmap+0x1b7/0x1d0 [btrfs]
 RSP <ffff880fe57836e8>
Comment 1 Bob McCarthy 2013-06-18 11:51:24 EDT
Created attachment 762547 [details]
File: dmesg
Comment 2 Josh Boyer 2013-07-01 09:31:32 EDT

*** This bug has been marked as a duplicate of bug 953443 ***

Note You need to log in before you can comment on or make changes to this bug.