Folks,

I can sometimes trigger the following bug

[  244.493534] ------------[ cut here ]------------
[  244.493624] WARNING: CPU: 16 PID: 17257 at fs/btrfs/inode.c:9261 
btrfs_destroy_inode+0x288/0x2b0 [btrfs]
[  244.493626] Kernel panic - not syncing: panic_on_warn set ...

[  244.493629] CPU: 16 PID: 17257 Comm: dwz Not tainted 4.6.0-rc3+ #56
[  244.493631]        000000fb3d8a3790 000000fb3d8a3820 0000000000000002 
0000000000000000 
       000000fb3d8a38c0 000000fb3d8a3838 000000fb3d8a3838 0000000000239364 
       0000000000528488 000000000080e46e 00000000007f02c8 000000000000000b 
       000000fb3d8a3880 000000fb3d8a3820 0000000000000000 0000000000000000 
       040003ff8185a39e 0000000000113c1e 000000fb3d8a3820 000000fb3d8a3880 
[  244.493641] Call Trace:
[  244.493646] ([<0000000000113b0a>] show_trace+0x62/0x78)
[  244.493647] ([<0000000000113bd2>] show_stack+0x72/0xf0)
[  244.493650] ([<000000000040a8ca>] dump_stack+0x9a/0xd8)
[  244.493652] ([<0000000000238b9e>] panic+0xf6/0x230)
[  244.493656] ([<00000000001398e2>] __warn+0x11a/0x120)
[  244.493657] ([<000000000040a010>] report_bug+0x90/0xf8)
[  244.493658] ([<0000000000100a4a>] do_report_trap+0xea/0x108)
[  244.493660] ([<0000000000100bcc>] illegal_op+0xd4/0x150)
[  244.493662] ([<000000000067b760>] pgm_check_handler+0x15c/0x1a4)
[  244.493678] ([<000003ff817d0ff0>] btrfs_destroy_inode+0x288/0x2b0 [btrfs])
[  244.493680] ([<000000fb42aff1c8>] 0xfb42aff1c8)
[  244.493683] ([<00000000002de5b6>] __dentry_kill+0x1c6/0x238)
[  244.493684] ([<00000000002de7fc>] dput+0x1d4/0x298)
[  244.493687] ([<00000000002c6d24>] __fput+0x144/0x1e8)
[  244.493689] ([<000000000015a806>] task_work_run+0xc6/0xe8)
[  244.493714] ([<000000000010923a>] do_notify_resume+0x5a/0x60)
[  244.493715] ([<000000000067b45c>] system_call+0xdc/0x24c)

The WARN_ON is
        WARN_ON(BTRFS_I(inode)->csum_bytes);

The file system is shared on 4 multipath target on scsi disks.
In seem to be able to reproduce it on kvm/next (4.6.0-rc3+) but 4.5.0 seems 
fine.
Any ideas?

Christian

--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to