After a lockup requiring a hard reset, the btrfs could not be mounted, throwing the following error: [ 75.969198] device label shine-root devid 1 transid 1204626 /dev/sdb3 [ 75.972211] btrfs: disk space caching is enabled [ 80.118478] ------------[ cut here ]------------ [ 80.118611] kernel BUG at fs/btrfs/extent-tree.c:6185! [ 80.118737] invalid opcode: 0000 [#1] PREEMPT SMP [ 80.118884] Modules linked in: btrfs crc32c libcrc32c zlib_deflate act_police sch_ingress cls_u32 cls_fw sch_sfb sch_htb sit tunnel4 pppoe pppox xt_mark iptable_mangle ipt_REJECT iptable_filter ipt_MASQUERADE ip6table_raw iptable_nat nf_nat_ipv4 xt_sctp nf_conntrack_pptp nf_conntrack_proto_gre ip6t_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 xt_LOG ppp_generic slhc xt_tcpudp nf_conntrack_ipv6 nf_defrag_ipv6 xt_CT ip6t_rt iptable_raw xt_conntrack ip_tables ip6table_filter ip6_tables x_tables arc4 rt2800pci rt2800lib snd_hda_codec_realtek rt2x00pci rt2x00lib eeprom_93cx6 eeepc_laptop mac80211 sparse_keymap cfg80211 i915 snd_hda_intel rfkill snd_hda_codec snd_hwdep snd_pcm drm_kms_helper snd_page_alloc drm crc_ccitt snd_timer snd iTCO_wdt iTCO_vendor_support ums_realtek intel_agp intel_gtt agpgart r8169 [ 80.121214] pci_hotplug uas lpc_ich i2c_i801 joydev coretemp soundcore evdev i2c_algo_bit microcode psmouse serio_raw pcspkr i2c_core mii hid_microsoft button video bridge stp llc tun nf_nat_irc nf_conntrack_irc nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntrack acpi_cpufreq mperf processor ext4 crc16 jbd2 mbcache usbhid hid usb_storage sd_mod ata_generic pata_acpi uhci_hcd ata_piix libata scsi_mod ehci_hcd usbcore usb_common [ 80.121437] Pid: 694, comm: mount Not tainted 3.7.0-0.1-zen #1 ASUSTeK Computer INC. B202/P5LD2EB-DHS [ 80.121437] EIP: 0060:[<f89d4c72>] EFLAGS: 00010286 CPU: 0 [ 80.121437] EIP is at btrfs_alloc_logged_file_extent+0x252/0x260 [btrfs] [ 80.121437] EAX: fffffff5 EBX: 000a9000 ECX: 00000000 EDX: 00000000 [ 80.121437] ESI: 00000000 EDI: 00000000 EBP: f403bacc ESP: f403ba68 [ 80.121437] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 [ 80.121437] CR0: 8005003b CR2: b7769000 CR3: 32924000 CR4: 000007c0 [ 80.121437] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [ 80.121437] DR6: ffff0ff0 DR7: 00000400 [ 80.121437] Process mount (pid: 694, ti=f403a000 task=f3361fe0 task.ti=f403a000) [ 80.121437] Stack: [ 80.121437] 00000000 00000000 f8a063ae f89c0bb0 f89c0bb0 f482a2a0 00000001 f568e800 [ 80.121437] f403ba94 f89c0bb0 f482a2a0 f403bacc f54c4a80 f482a2a0 00000000 f4b42000 [ 80.121437] 000a9000 00000000 00000000 f568e800 ff84f000 0000002b f403bc02 f4b8cb9c [ 80.121437] Call Trace: [ 80.121437] [<f8a063ae>] ? free_extent_buffer+0x2e/0x80 [btrfs] [ 80.121437] [<f89c0bb0>] ? btrfs_free_path+0x20/0x30 [btrfs] [ 80.121437] [<f89c0bb0>] ? btrfs_free_path+0x20/0x30 [btrfs] [ 80.121437] [<f89c0bb0>] ? btrfs_free_path+0x20/0x30 [btrfs] [ 80.121437] [<f8a1d37b>] replay_one_extent+0x75b/0x810 [btrfs] [ 80.121437] [<c02547a1>] ? destroy_inode+0x31/0x50 [ 80.121437] [<c02548ac>] ? evict+0xec/0x170 [ 80.121437] [<f8a1e3a7>] replay_one_buffer+0x2c7/0x3a0 [btrfs] [ 80.121437] [<f8a1aef9>] walk_down_log_tree+0x209/0x390 [btrfs] [ 80.121437] [<f8a1b0f4>] walk_log_tree+0x74/0x1c0 [btrfs] [ 80.121437] [<f8a21405>] btrfs_recover_log_trees+0x1e5/0x370 [btrfs] [ 80.121437] [<f8a1e0e0>] ? replay_one_dir_item+0xd0/0xd0 [btrfs] [ 80.121437] [<f89e4897>] open_ctree+0x1407/0x19c0 [btrfs] [ 80.121437] [<c03010f9>] ? strlcpy+0x39/0x50 [ 80.121437] [<f89bda45>] btrfs_mount+0x775/0x8b0 [btrfs] [ 80.121437] [<c04e4f7d>] ? mutex_unlock+0xd/0x10 [ 80.121437] [<c020cef4>] ? pcpu_alloc+0x754/0x830 [ 80.121437] [<c02fcaa6>] ? ida_get_new_above+0x196/0x1e0 [ 80.121437] [<c022f6a3>] ? __kmalloc_track_caller+0x73/0x150 [ 80.121437] [<c02415b6>] mount_fs+0x36/0x180 [ 80.121437] [<c020cfdf>] ? __alloc_percpu+0xf/0x20 [ 80.121437] [<c02582ce>] vfs_kern_mount+0x4e/0xe0 [ 80.121437] [<c02586fc>] do_kern_mount+0x3c/0xf0 [ 80.121437] [<c0259f68>] do_mount+0x308/0x730 [ 80.121437] [<c0208429>] ? strndup_user+0x49/0x70 [ 80.121437] [<c025a3fb>] sys_mount+0x6b/0xa0 [ 80.121437] [<c04ed84d>] sysenter_do_call+0x12/0x28 [ 80.121437] Code: a5 5d ff ff 85 c0 74 29 8b 5d dc 8b 75 e0 8b 55 ec 8b 4d f0 8b 45 cc 89 1c 24 89 74 24 04 e8 36 fc 04 00 85 c0 0f 84 c2 fe ff ff <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 8d 74 26 00 55 89 e5 57 56 53 83 [ 80.121437] EIP: [<f89d4c72>] btrfs_alloc_logged_file_extent+0x252/0x260 [btrfs] SS:ESP 0068:f403ba68 [ 80.331077] ---[ end trace 79ea8a12340fc4c5 ]--- Bug affected at least 3.6.10, 3.7.0, i686 and x86_64. btrfs-zero-log made the FS mountable again. -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Fri, Dec 14, 2012 at 03:04:08PM -0700, Jan Steffens wrote:> After a lockup requiring a hard reset, the btrfs could not be mounted, > throwing the following error: >Could you tell me what line this comes out to? Give me a few lines of context so I can figure out where it''s happening. Thanks, Josef -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Tue, Dec 18, 2012 at 2:40 PM, Josef Bacik <jbacik@fusionio.com> wrote:> On Fri, Dec 14, 2012 at 03:04:08PM -0700, Jan Steffens wrote: >> After a lockup requiring a hard reset, the btrfs could not be mounted, >> throwing the following error: >> > > Could you tell me what line this comes out to? Give me a few lines of context > so I can figure out where it''s happening. Thanks, > > JosefSure, here: caching_ctl = get_caching_control(block_group); if (!caching_ctl) { BUG_ON(!block_group_cache_done(block_group)); ret = btrfs_remove_free_space(block_group, start, num_bytes); BUG_ON(ret); /* -ENOMEM */ // <<< 6185 } else { mutex_lock(&caching_ctl->mutex); if (start >= caching_ctl->progress) { ret = add_excluded_extent(root, start, num_bytes); -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Tue, Dec 18, 2012 at 03:10:24PM +0100, Jan Steffens wrote:> if (!caching_ctl) { > BUG_ON(!block_group_cache_done(block_group)); > ret = btrfs_remove_free_space(block_group, start, num_bytes); > BUG_ON(ret); /* -ENOMEM */ // <<< 6185The actual value of ret is = -11 = -EAGAIN (EAX: fffffff5 in the report)> } else { > mutex_lock(&caching_ctl->mutex); > > if (start >= caching_ctl->progress) { > ret = add_excluded_extent(root, start, num_bytes);-- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Friday 14 December 2012 23:04:08 Jan Steffens wrote:> After a lockup requiring a hard reset, the btrfs could not be mounted, > throwing the following error: >> Bug affected at least 3.6.10, 3.7.0, i686 and x86_64. > > btrfs-zero-log made the FS mountable again.I''ve just encountered the same problem after a hard reset on kernel 3.7.1. Had to use btrfs-zero-log to get the fs mounted again. I dont know if the following traces provide any new information, but in my case the BUG was preceded by two warnings in fs/inode.c [ 3.626537] ------------[ cut here ]------------ [ 3.626544] WARNING: at fs/inode.c:336 inc_nlink+0x36/0x50() [ 3.626546] Hardware name: 2768WZP [ 3.626547] Modules linked in: btrfs crc32c libcrc32c zlib_deflate sr_mod cdrom sd_mod ata_generic uhci_hcd pata_acpi ata_piix libata firewire_ohci scsi_mod firewire_core crc_itu_t ehci_hcd usbcore usb_common [ 3.626561] Pid: 101, comm: mount Not tainted 3.7.1-2-ARCH #1 [ 3.626562] Call Trace: [ 3.626567] [<ffffffff8105742f>] warn_slowpath_common+0x7f/0xc0 [ 3.626569] [<ffffffff8105748a>] warn_slowpath_null+0x1a/0x20 [ 3.626572] [<ffffffff8119c5c6>] inc_nlink+0x36/0x50 [ 3.626588] [<ffffffffa01b5af0>] link_to_fixup_dir+0xc0/0xf0 [btrfs] [ 3.626597] [<ffffffffa01b87cf>] replay_one_buffer+0x1df/0x3a0 [btrfs] [ 3.626606] [<ffffffffa01b5292>] walk_down_log_tree+0x212/0x400 [btrfs] [ 3.626615] [<ffffffffa01b551d>] walk_log_tree+0x9d/0x1f0 [btrfs] [ 3.626624] [<ffffffffa01bb89b>] btrfs_recover_log_trees+0x21b/0x3a0 [btrfs] [ 3.626633] [<ffffffffa01b85f0>] ? replay_one_dir_item+0xf0/0xf0 [btrfs] [ 3.626643] [<ffffffffa01819d7>] open_ctree+0x1587/0x1ba0 [btrfs] [ 3.626646] [<ffffffff8124f3a1>] ? disk_name+0x61/0xc0 [ 3.626653] [<ffffffffa015aae3>] btrfs_mount+0x633/0x770 [btrfs] [ 3.626657] [<ffffffff81165280>] ? alloc_pages_current+0xb0/0x120 [ 3.626659] [<ffffffff81187353>] mount_fs+0x43/0x1b0 [ 3.626662] [<ffffffff811a1af4>] vfs_kern_mount+0x74/0x110 [ 3.626669] [<ffffffffa015a63a>] btrfs_mount+0x18a/0x770 [btrfs] [ 3.626679] [<ffffffff81165280>] ? alloc_pages_current+0xb0/0x120 [ 3.626681] [<ffffffff81187353>] mount_fs+0x43/0x1b0 [ 3.626683] [<ffffffff811a1af4>] vfs_kern_mount+0x74/0x110 [ 3.626686] [<ffffffff811a2054>] do_kern_mount+0x54/0x110 [ 3.626688] [<ffffffff811a3cd5>] do_mount+0x315/0x8e0 [ 3.626691] [<ffffffff81124ade>] ? __get_free_pages+0xe/0x50 [ 3.626693] [<ffffffff811a382a>] ? copy_mount_options+0x3a/0x180 [ 3.626696] [<ffffffff811a432e>] sys_mount+0x8e/0xe0 [ 3.626699] [<ffffffff814aa49d>] system_call_fastpath+0x1a/0x1f [ 3.626701] ---[ end trace de80422f3d9139a8 ]--- [ 3.635863] ------------[ cut here ]------------ [ 3.635866] WARNING: at fs/inode.c:336 inc_nlink+0x36/0x50() [ 3.635867] Hardware name: 2768WZP [ 3.635868] Modules linked in: btrfs crc32c libcrc32c zlib_deflate sr_mod cdrom sd_mod ata_generic uhci_hcd pata_acpi ata_piix libata firewire_ohci scsi_mod firewire_core crc_itu_t ehci_hcd usbcore usb_common [ 3.635878] Pid: 101, comm: mount Tainted: G W 3.7.1-2-ARCH #1 [ 3.635879] Call Trace: [ 3.635882] [<ffffffff8105742f>] warn_slowpath_common+0x7f/0xc0 [ 3.635884] [<ffffffff8105748a>] warn_slowpath_null+0x1a/0x20 [ 3.635886] [<ffffffff8119c5c6>] inc_nlink+0x36/0x50 [ 3.635895] [<ffffffffa01b5af0>] link_to_fixup_dir+0xc0/0xf0 [btrfs] [ 3.635903] [<ffffffffa01b87cf>] replay_one_buffer+0x1df/0x3a0 [btrfs] [ 3.635912] [<ffffffffa01b5292>] walk_down_log_tree+0x212/0x400 [btrfs] [ 3.635921] [<ffffffffa01b551d>] walk_log_tree+0x9d/0x1f0 [btrfs] [ 3.635930] [<ffffffffa01bb89b>] btrfs_recover_log_trees+0x21b/0x3a0 [btrfs] [ 3.635939] [<ffffffffa01b85f0>] ? replay_one_dir_item+0xf0/0xf0 [btrfs] [ 3.635948] [<ffffffffa01819d7>] open_ctree+0x1587/0x1ba0 [btrfs] [ 3.635950] [<ffffffff8124f3a1>] ? disk_name+0x61/0xc0 [ 3.635958] [<ffffffffa015aae3>] btrfs_mount+0x633/0x770 [btrfs] [ 3.635960] [<ffffffff81165280>] ? alloc_pages_current+0xb0/0x120 [ 3.635963] [<ffffffff81187353>] mount_fs+0x43/0x1b0 [ 3.635965] [<ffffffff811a1af4>] vfs_kern_mount+0x74/0x110 [ 3.635972] [<ffffffffa015a63a>] btrfs_mount+0x18a/0x770 [btrfs] [ 3.635974] [<ffffffff81165280>] ? alloc_pages_current+0xb0/0x120 [ 3.635977] [<ffffffff81187353>] mount_fs+0x43/0x1b0 [ 3.635979] [<ffffffff811a1af4>] vfs_kern_mount+0x74/0x110 [ 3.635981] [<ffffffff811a2054>] do_kern_mount+0x54/0x110 [ 3.635983] [<ffffffff811a3cd5>] do_mount+0x315/0x8e0 [ 3.635986] [<ffffffff81124ade>] ? __get_free_pages+0xe/0x50 [ 3.635988] [<ffffffff811a382a>] ? copy_mount_options+0x3a/0x180 [ 3.635990] [<ffffffff811a432e>] sys_mount+0x8e/0xe0 [ 3.635993] [<ffffffff814aa49d>] system_call_fastpath+0x1a/0x1f [ 3.635994] ---[ end trace de80422f3d9139a9 ]--- [ 3.720010] usb 6-2: new low-speed USB device number 2 using uhci_hcd [ 3.904094] usbcore: registered new interface driver usbhid [ 3.904097] usbhid: USB HID core driver [ 3.904696] input: Logitech USB-PS/2 Optical Mouse as /devices/pci0000:00/0000:00:1d.0/usb6/6-2/6-2:1.0/input/input1 [ 3.905020] hid-generic 0003:046D:C03E.0001: input,hidraw0: USB HID v1.10 Mouse [Logitech USB-PS/2 Optical Mouse] on usb-0000:00:1d.0-2/input0 [ 5.233306] ------------[ cut here ]------------ [ 5.233365] kernel BUG at fs/btrfs/extent-tree.c:6185! [ 5.233417] invalid opcode: 0000 [#1] PREEMPT SMP [ 5.233607] Modules linked in: hid_generic usbhid hid btrfs crc32c libcrc32c zlib_deflate sr_mod cdrom sd_mod ata_generic uhci_hcd pata_acpi ata_piix libata firewire_ohci scsi_mod firewire_core crc_itu_t ehci_hcd usbcore usb_common [ 5.234738] CPU 1 [ 5.234789] Pid: 101, comm: mount Tainted: G W 3.7.1-2-ARCH #1 LENOVO 2768WZP/2768WZP [ 5.234890] RIP: 0010:[<ffffffffa01720a7>] [<ffffffffa01720a7>] btrfs_alloc_logged_file_extent+0x1c7/0x1e0 [btrfs] [ 5.235009] RSP: 0018:ffff88013141d5e8 EFLAGS: 00010286 [ 5.235061] RAX: 00000000fffffff5 RBX: ffff8801348b1200 RCX: 0000000180400033 [ 5.235115] RDX: 0000000180400034 RSI: 0000000080400033 RDI: ffff8801348c69c0 [ 5.235168] RBP: ffff88013141d668 R08: ffff88013141dfd8 R09: ffff880135b4fb00 [ 5.235221] R10: ffffffffa01be91c R11: ffff88013141dfd8 R12: ffff88013141d733 [ 5.235280] R13: 0000000000000000 R14: 0000000048f65000 R15: ffff880131481000 [ 5.235339] FS: 00007f23b536f780(0000) GS:ffff88013bc80000(0000) knlGS:0000000000000000 [ 5.235403] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [ 5.235460] CR2: 00007fe808929000 CR3: 0000000134a71000 CR4: 00000000000407e0 [ 5.235518] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 5.235577] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 5.235636] Process mount (pid: 101, threadinfo ffff88013141c000, task ffff880134b0a8a0) [ 5.235699] Stack: [ 5.235753] 0000000000000001 0000000000002000 ffff88013141d618 ffffffffa015e1ea [ 5.236001] 000000000003c000 00000000000003ff 0000000000000101 ffff880131db3000 [ 5.236249] 0000000000002000 00ff880131dfcac0 a80000000048f650 ffff880131481000 [ 5.236497] Call Trace: [ 5.236559] [<ffffffffa015e1ea>] ? btrfs_free_path+0x2a/0x40 [btrfs] [ 5.236615] [<ffffffffa01b7840>] replay_one_extent+0x620/0x690 [btrfs] [ 5.236615] [<ffffffffa01b6e78>] ? add_inode_ref+0x638/0x9e0 [btrfs] [ 5.236615] [<ffffffffa0192940>] ? btrfs_destroy_inode+0x1c0/0x2e0 [btrfs] [ 5.236615] [<ffffffffa01a1f73>] ? read_extent_buffer+0xc3/0x120 [btrfs] [ 5.236615] [<ffffffffa01b88cb>] replay_one_buffer+0x2db/0x3a0 [btrfs] [ 5.236615] [<ffffffffa01a086d>] ? alloc_extent_buffer+0x9d/0x490 [btrfs] [ 5.236615] [<ffffffffa01b5292>] walk_down_log_tree+0x212/0x400 [btrfs] [ 5.236615] [<ffffffffa01b551d>] walk_log_tree+0x9d/0x1f0 [btrfs] [ 5.236615] [<ffffffffa01bb89b>] btrfs_recover_log_trees+0x21b/0x3a0 [btrfs] [ 5.236615] [<ffffffffa01b85f0>] ? replay_one_dir_item+0xf0/0xf0 [btrfs] [ 5.236615] [<ffffffffa01819d7>] open_ctree+0x1587/0x1ba0 [btrfs] [ 5.236615] [<ffffffff8124f3a1>] ? disk_name+0x61/0xc0 [ 5.236615] [<ffffffffa015aae3>] btrfs_mount+0x633/0x770 [btrfs] [ 5.236615] [<ffffffff81165280>] ? alloc_pages_current+0xb0/0x120 [ 5.236615] [<ffffffff81187353>] mount_fs+0x43/0x1b0 [ 5.236615] [<ffffffff811a1af4>] vfs_kern_mount+0x74/0x110 [ 5.236615] [<ffffffffa015a63a>] btrfs_mount+0x18a/0x770 [btrfs] [ 5.236615] [<ffffffff81165280>] ? alloc_pages_current+0xb0/0x120 [ 5.236615] [<ffffffff81187353>] mount_fs+0x43/0x1b0 [ 5.236615] [<ffffffff811a1af4>] vfs_kern_mount+0x74/0x110 [ 5.236615] [<ffffffff811a2054>] do_kern_mount+0x54/0x110 [ 5.236615] [<ffffffff811a3cd5>] do_mount+0x315/0x8e0 [ 5.236615] [<ffffffff81124ade>] ? __get_free_pages+0xe/0x50 [ 5.236615] [<ffffffff811a382a>] ? copy_mount_options+0x3a/0x180 [ 5.236615] [<ffffffff811a432e>] sys_mount+0x8e/0xe0 [ 5.236615] [<ffffffff814aa49d>] system_call_fastpath+0x1a/0x1f [ 5.236615] Code: 0b 0f 1f 00 48 8d bb 80 00 00 00 e8 c4 68 ff ff 85 c0 74 1d 48 8b 55 c0 4c 89 f6 48 89 df e8 b1 c6 04 00 85 c0 0f 84 29 ff ff ff <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 66 66 66 66 66 66 2e 0f 1f 84 00 [ 5.236615] RIP [<ffffffffa01720a7>] btrfs_alloc_logged_file_extent+0x1c7/0x1e0 [btrfs] [ 5.236615] RSP <ffff88013141d5e8> [ 5.241501] ---[ end trace de80422f3d9139aa ]--- -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Tue, Dec 18, 2012 at 07:10:24AM -0700, Jan Steffens wrote:> On Tue, Dec 18, 2012 at 2:40 PM, Josef Bacik <jbacik@fusionio.com> wrote: > > On Fri, Dec 14, 2012 at 03:04:08PM -0700, Jan Steffens wrote: > >> After a lockup requiring a hard reset, the btrfs could not be mounted, > >> throwing the following error: > >> > > > > Could you tell me what line this comes out to? Give me a few lines of context > > so I can figure out where it''s happening. Thanks, > > > > Josef > > Sure, here: >I posted a patch for this before I left for Christmas vacation, it is here http://git.kernel.org/?p=linux/kernel/git/josef/btrfs-next.git;a=commit;h=ee2399d8a7dd1d49b0996beaaaada5b728b35bf1 in btrfs-next. Can you give it a whirl and let me know if it fixes your problem? Thanks, Josef -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wed, Jan 2, 2013 at 6:32 PM, Josef Bacik <jbacik@fusionio.com> wrote:> I posted a patch for this before I left for Christmas vacation, it is here > > http://git.kernel.org/?p=linux/kernel/git/josef/btrfs-next.git;a=commit;h=ee2399d8a7dd1d49b0996beaaaada5b728b35bf1 > > in btrfs-next. Can you give it a whirl and let me know if it fixes your > problem? Thanks, > > JosefI''ll try it when I encounter the problem again (remember I used btrfs-zero-log). I think I already told you that: We talked on Freenode, if I recall correctly. Jan -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wed, Jan 02, 2013 at 10:36:36AM -0700, Jan Steffens wrote:> On Wed, Jan 2, 2013 at 6:32 PM, Josef Bacik <jbacik@fusionio.com> wrote: > > I posted a patch for this before I left for Christmas vacation, it is here > > > > http://git.kernel.org/?p=linux/kernel/git/josef/btrfs-next.git;a=commit;h=ee2399d8a7dd1d49b0996beaaaada5b728b35bf1 > > > > in btrfs-next. Can you give it a whirl and let me know if it fixes your > > problem? Thanks, > > > > Josef > > I''ll try it when I encounter the problem again (remember I used > btrfs-zero-log). I think I already told you that: We talked on > Freenode, if I recall correctly. >Yes thanks, vacation brain :). Josef -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html