From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751845AbcDTWJU (ORCPT ); Wed, 20 Apr 2016 18:09:20 -0400 Received: from arcturus.aphlor.org ([188.246.204.175]:46034 "EHLO arcturus.aphlor.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751325AbcDTWJT (ORCPT ); Wed, 20 Apr 2016 18:09:19 -0400 Date: Wed, 20 Apr 2016 18:09:11 -0400 From: Dave Jones To: Linux Kernel , Chris Mason , Josef Bacik , David Sterba , linux-btrfs@vger.kernel.org Subject: BTRFS: assertion failed: num_extents, file: fs/btrfs/extent-tree.c, line: 5584 Message-ID: <20160420220911.GA10235@codemonkey.org.uk> Mail-Followup-To: Dave Jones , Linux Kernel , Chris Mason , Josef Bacik , David Sterba , linux-btrfs@vger.kernel.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-Spam-Flag: skipped (authorised relay user) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Don't think I've reported this one before. It's on the same box I've been seeing the btrfs_destroy_inode WARN_ON's on though. Dave BTRFS: assertion failed: num_extents, file: fs/btrfs/extent-tree.c, line: 5584 ------------[ cut here ]------------ kernel BUG at fs/btrfs/ctree.h:4320! invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN CPU: 1 PID: 9320 Comm: trinity-c21 Not tainted 4.6.0-rc4-think+ #5 task: ffff880453bdb7c0 ti: ffff880458930000 task.ti: ffff880458930000 RIP: 0010:[] [] assfail.constprop.88+0x1c/0x1e [btrfs] RSP: 0000:ffff880458937860 EFLAGS: 00010282 RAX: 000000000000004e RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffed008b126f02 RBP: ffff880458937860 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000003 R11: 0000000000000001 R12: ffff88045ef14548 R13: ffff88045066e048 R14: ffff88045066dc58 R15: 000000000000008f FS: 00007f6465c7b700(0000) GS:ffff880468800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f6465c81000 CR3: 0000000454e05000 CR4: 00000000001406e0 Stack: ffff8804589378a0 ffffffffc02407f3 000000000000008f 0000000000000000 ffff88045ef14548 ffff88045066e048 ffff88045066dc58 000000000000008f ffff8804589378f0 ffffffffc0253a3c ffff880453bdc048 ffff880453bdb7c0 Call Trace: [] drop_outstanding_extent+0x153/0x1a0 [btrfs] [] btrfs_delalloc_release_metadata+0x9c/0x5d0 [btrfs] [] btrfs_delalloc_release_space+0x1f/0x50 [btrfs] [] __btrfs_buffered_write+0xb05/0xea0 [btrfs] [] ? btrfs_dirty_pages+0x2d0/0x2d0 [btrfs] [] ? local_clock+0x1c/0x20 [] ? local_clock+0x1c/0x20 [] ? debug_lockdep_rcu_enabled+0x77/0x90 [] ? btrfs_file_write_iter+0xa07/0x1570 [btrfs] [] btrfs_file_write_iter+0x631/0x1570 [btrfs] [] ? __might_fault+0x166/0x1b0 [] ? __might_fault+0xcb/0x1b0 [] do_iter_readv_writev+0x134/0x230 [] ? vfs_iter_read+0x260/0x260 [] ? rcu_sync_lockdep_assert+0x78/0xb0 [] ? percpu_down_read+0x5c/0xa0 [] ? __sb_start_write+0xb4/0xf0 [] do_readv_writev+0x39c/0x6a0 [] ? btrfs_sync_file+0xd00/0xd00 [btrfs] [] ? vfs_write+0x4a0/0x4a0 [] ? local_clock+0x1c/0x20 [] ? __context_tracking_exit.part.6+0x52/0x220 [] ? enter_from_user_mode+0x50/0x50 [] vfs_writev+0x75/0xb0 [] do_pwritev+0x12a/0x170 [] ? SyS_pwritev+0x20/0x20 [] SyS_pwritev2+0x17/0x30 [] do_syscall_64+0x19b/0x4a0 [] ? trace_hardirqs_on_thunk+0x1b/0x1d [] entry_SYSCALL64_slow_path+0x25/0x25 Code: d3 0f 0b 55 48 89 e5 0f 0b 55 48 89 e5 0f 0b 55 89 f1 48 c7 c2 e0 c0 43 c0 48 89 fe 48 89 e5 48 c7 c7 20 c4 43 c0 e8 92 06 01 d3 <0f> 0b 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 18 48 89