On Sun, 2014-08-03 at 20:27 -0700, Nikolaus Rath wrote:
> Package: src:linux
> Version: 3.14.13-2
> Severity: normal
> File: /boot/vmlinuz-3.14-2-amd64
> 
> I was peacefully transferring a big file to my external USB harddisk
> formatted with btrfs, when the kernel brutally lashed out with the BUG
> below, preventing all further access to the disk:

Is it possible that you filled up the disk?

> -- Package-specific info:
> ** Version:
> Linux version 3.14-2-amd64 (debian-ker...@lists.debian.org) (gcc version 
> 4.8.3 (Debian 4.8.3-5) ) #1 SMP Debian 3.14.13-2 (2014-07-24)
> 
> ** Command line:
> BOOT_IMAGE=/vmlinuz-3.14-2-amd64 root=/dev/mapper/vg0-debian ro quiet 
> init=/bin/systemd
> 
> ** Tainted: D (128)
>  * Kernel has oopsed before.
> 
> ** Kernel log:
> [ 5659.098451] BTRFS info (device dm-9): disk space caching is enabled
> [ 7516.376999] BTRFS: device fsid 8742472d-a9b0-4ab6-b67a-5d21f14f7a38 devid 
> 1 transid 164974 /dev/mapper/vg0-nikratio_crypt
> [ 8239.129310] ------------[ cut here ]------------
> [ 8239.129328] kernel BUG at 
> /build/linux-C0Ywsc/linux-3.14.13/fs/btrfs/ctree.c:3215!
[...]

This is the same file/line as in
<http://comments.gmane.org/gmane.comp.file-systems.btrfs/32938> and it
is claimed that it might be fixed by
<https://git.kernel.org/linus/fc19c5e73645f95d3eca12b4e91e7b56faf1e4a4>.
That fix hasn't been backported onto 3.14 yet.

(Of course, there may be several different bugs that can result in that
same message.)

Ben.

-- 
Ben Hutchings
To err is human; to really foul things up requires a computer.

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to