Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753229AbcC1BOO (ORCPT ); Sun, 27 Mar 2016 21:14:14 -0400 Received: from arcturus.aphlor.org ([188.246.204.175]:38768 "EHLO arcturus.aphlor.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751961AbcC1BOM (ORCPT ); Sun, 27 Mar 2016 21:14:12 -0400 Date: Sun, 27 Mar 2016 21:14:00 -0400 From: Dave Jones To: Linux Kernel , Chris Mason , Josef Bacik , David Sterba , linux-btrfs@vger.kernel.org Subject: Re: btrfs_destroy_inode WARN_ON. Message-ID: <20160328011400.GA19000@codemonkey.org.uk> Mail-Followup-To: Dave Jones , Linux Kernel , Chris Mason , Josef Bacik , David Sterba , linux-btrfs@vger.kernel.org References: <20160324225411.GA1612@codemonkey.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20160324225411.GA1612@codemonkey.org.uk> User-Agent: Mutt/1.5.24 (2015-08-30) X-Spam-Score: -2.9 (--) X-Spam-Report: Spam detection software, running on the system "arcturus.aphlor.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: On Thu, Mar 24, 2016 at 06:54:11PM -0400, Dave Jones wrote: > Just hit this on a tree from earlier this morning, v4.5-11140 or so. > > WARNING: CPU: 2 PID: 32570 at fs/btrfs/inode.c:9261 btrfs_destroy_inode+0x389/0x3f0 [btrfs] > CPU: 2 PID: 32570 Comm: rm Not tainted 4.5.0-think+ #14 > ffffffffc039baf9 00000000ef721ef0 ffff88025966fc08 ffffffff8957bcdb > 0000000000000000 0000000000000000 ffff88025966fc50 ffffffff890b41f1 > ffff88045d918040 0000242d4eed6048 ffff88024eed6048 ffff88024eed6048 > Call Trace: > [] ? btrfs_destroy_inode+0x389/0x3f0 [btrfs] > [] dump_stack+0x68/0x9d > [] __warn+0x111/0x130 > [] warn_slowpath_null+0x1d/0x20 > [] btrfs_destroy_inode+0x389/0x3f0 [btrfs] > [] destroy_inode+0x67/0x90 > [] evict+0x1b7/0x240 > [] iput+0x3ae/0x4e0 > [] ? dput+0x20e/0x460 > [] do_unlinkat+0x256/0x440 > [] ? do_rmdir+0x350/0x350 > [] ? syscall_trace_enter_phase1+0x87/0x260 > [] ? enter_from_user_mode+0x50/0x50 > [] ? __lock_is_held+0x25/0xd0 > [] ? mark_held_locks+0x22/0xc0 > [] ? syscall_trace_enter_phase2+0x12d/0x3d0 > [] ? SyS_rmdir+0x20/0x20 > [] SyS_unlinkat+0x1b/0x30 > [] do_syscall_64+0xf4/0x240 > [] entry_SYSCALL64_slow_path+0x25/0x25 > ---[ end trace a48ce4e6a1b5e409 ]--- > > > That's WARN_ON(BTRFS_I(inode)->csum_bytes); > > *maybe* it's a bad disk, but there's no indication in dmesg of anything awry. > Spinning rust on SATA, nothing special. [...] Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3404 Lines: 68 On Thu, Mar 24, 2016 at 06:54:11PM -0400, Dave Jones wrote: > Just hit this on a tree from earlier this morning, v4.5-11140 or so. > > WARNING: CPU: 2 PID: 32570 at fs/btrfs/inode.c:9261 btrfs_destroy_inode+0x389/0x3f0 [btrfs] > CPU: 2 PID: 32570 Comm: rm Not tainted 4.5.0-think+ #14 > ffffffffc039baf9 00000000ef721ef0 ffff88025966fc08 ffffffff8957bcdb > 0000000000000000 0000000000000000 ffff88025966fc50 ffffffff890b41f1 > ffff88045d918040 0000242d4eed6048 ffff88024eed6048 ffff88024eed6048 > Call Trace: > [] ? btrfs_destroy_inode+0x389/0x3f0 [btrfs] > [] dump_stack+0x68/0x9d > [] __warn+0x111/0x130 > [] warn_slowpath_null+0x1d/0x20 > [] btrfs_destroy_inode+0x389/0x3f0 [btrfs] > [] destroy_inode+0x67/0x90 > [] evict+0x1b7/0x240 > [] iput+0x3ae/0x4e0 > [] ? dput+0x20e/0x460 > [] do_unlinkat+0x256/0x440 > [] ? do_rmdir+0x350/0x350 > [] ? syscall_trace_enter_phase1+0x87/0x260 > [] ? enter_from_user_mode+0x50/0x50 > [] ? __lock_is_held+0x25/0xd0 > [] ? mark_held_locks+0x22/0xc0 > [] ? syscall_trace_enter_phase2+0x12d/0x3d0 > [] ? SyS_rmdir+0x20/0x20 > [] SyS_unlinkat+0x1b/0x30 > [] do_syscall_64+0xf4/0x240 > [] entry_SYSCALL64_slow_path+0x25/0x25 > ---[ end trace a48ce4e6a1b5e409 ]--- > > > That's WARN_ON(BTRFS_I(inode)->csum_bytes); > > *maybe* it's a bad disk, but there's no indication in dmesg of anything awry. > Spinning rust on SATA, nothing special. Same WARN_ON is reachable from umount too.. WARNING: CPU: 2 PID: 20092 at fs/btrfs/inode.c:9261 btrfs_destroy_inode+0x40c/0x480 [btrfs] CPU: 2 PID: 20092 Comm: umount Tainted: G W 4.5.0-think+ #1 00000000ffffffff 00000000a32c482b ffff8803cd187b60 ffffffff9d63af84 0000000000000000 0000000000000000 ffffffffc05c5e40 ffffffffc04d316c ffff8803cd187ba8 ffffffff9d0c4c27 ffff880460d80040 0000242dcd187bb0 Call Trace: [] dump_stack+0x95/0xe1 [] ? btrfs_destroy_inode+0x40c/0x480 [btrfs] [] __warn+0x147/0x170 [] warn_slowpath_null+0x31/0x40 [] btrfs_destroy_inode+0x40c/0x480 [btrfs] [] ? btrfs_test_destroy_inode+0x40/0x40 [btrfs] [] destroy_inode+0x77/0xb0 [] evict+0x20e/0x2c0 [] dispose_list+0x70/0xb0 [] evict_inodes+0x26f/0x2c0 [] ? inode_add_lru+0x60/0x60 [] ? fsnotify_unmount_inodes+0x215/0x2c0 [] generic_shutdown_super+0x76/0x1c0 [] kill_anon_super+0x29/0x40 [] btrfs_kill_super+0x31/0x130 [btrfs] [] deactivate_locked_super+0x6f/0xb0 [] deactivate_super+0x99/0xb0 [] cleanup_mnt+0x70/0xd0 [] __cleanup_mnt+0x1b/0x20 [] task_work_run+0xef/0x130 [] exit_to_usermode_loop+0xf9/0x100 [] do_syscall_64+0x238/0x2b0 [] entry_SYSCALL64_slow_path+0x25/0x25