On Sun, 2014-08-03 at 20:27 -0700, Nikolaus Rath wrote: > Package: src:linux > Version: 3.14.13-2 > Severity: normal > File: /boot/vmlinuz-3.14-2-amd64 > > I was peacefully transferring a big file to my external USB harddisk > formatted with btrfs, when the kernel brutally lashed out with the BUG > below, preventing all further access to the disk:
Is it possible that you filled up the disk? > -- Package-specific info: > ** Version: > Linux version 3.14-2-amd64 (debian-ker...@lists.debian.org) (gcc version > 4.8.3 (Debian 4.8.3-5) ) #1 SMP Debian 3.14.13-2 (2014-07-24) > > ** Command line: > BOOT_IMAGE=/vmlinuz-3.14-2-amd64 root=/dev/mapper/vg0-debian ro quiet > init=/bin/systemd > > ** Tainted: D (128) > * Kernel has oopsed before. > > ** Kernel log: > [ 5659.098451] BTRFS info (device dm-9): disk space caching is enabled > [ 7516.376999] BTRFS: device fsid 8742472d-a9b0-4ab6-b67a-5d21f14f7a38 devid > 1 transid 164974 /dev/mapper/vg0-nikratio_crypt > [ 8239.129310] ------------[ cut here ]------------ > [ 8239.129328] kernel BUG at > /build/linux-C0Ywsc/linux-3.14.13/fs/btrfs/ctree.c:3215! [...] This is the same file/line as in <http://comments.gmane.org/gmane.comp.file-systems.btrfs/32938> and it is claimed that it might be fixed by <https://git.kernel.org/linus/fc19c5e73645f95d3eca12b4e91e7b56faf1e4a4>. That fix hasn't been backported onto 3.14 yet. (Of course, there may be several different bugs that can result in that same message.) Ben. -- Ben Hutchings To err is human; to really foul things up requires a computer.
signature.asc
Description: This is a digitally signed message part