From: Wang Yugui <wangyugui@e16-tech.com>
To: linux-btrfs@vger.kernel.org, Qu Wenruo <quwenruo.btrfs@gmx.com>
Subject: Re: fstests btrfs/042 triggle 'qgroup reserved space leaked'
Date: Sat, 24 Sep 2022 10:11:06 +0800 [thread overview]
Message-ID: <20220924101103.5AEA.409509F4@e16-tech.com> (raw)
In-Reply-To: <ade04177-80ad-b5a2-b2eb-ce409a1b8e30@gmx.com>
Hi,
>
> On 2022/9/24 07:43, Wang Yugui wrote:
> > Hi,
> >
> > fstests btrfs/042 triggle 'qgroup reserved space leaked'
> >
> > kernel source: btrfs misc-next
>
> Which commit HEAD?
>
> As I can not reproduce using a somewhat older misc-next.
>
> The HEAD I'm on is 2d1aef6504bf8bdd7b6ca9fa4c0c5ab32f4da2a8 ("btrfs: stop tracking failed reads in the I/O tree").
>
> If it's a regression it can be much easier to pin down.
>
> > kernel config:
> > memory debug: CONFIG_KASAN/CONFIG_DEBUG_KMEMLEAK/...
> > lock debug: CONFIG_PROVE_LOCKING/...
>
> And any reproducibility? 16 runs no reproduce.
btrfs source version: misc-next: bf940dd88f48,
plus some minor local patch(no qgroup related)
kernel: 6.0-rc6
reproduce rate:
1) 100%(3/3) when local debug config **1
2) 0% (0/3) when local release config
**1:local debug config, about 100x slow than release config
a) memory debug
CONFIG_KASAN/CONFIG_DEBUG_KMEMLEAK/...
b) lockdep debug
CONFIG_PROVE_LOCKING/...
c) btrfs debug
CONFIG_BTRFS_FS_CHECK_INTEGRITY=y
CONFIG_BTRFS_FS_RUN_SANITY_TESTS=y
CONFIG_BTRFS_DEBUG=y
CONFIG_BTRFS_ASSERT=y
CONFIG_BTRFS_FS_REF_VERIFY=y
From source:
fs/btrfs/disk-io.c:4668
if (btrfs_check_quota_leak(fs_info)) {
L4668 WARN_ON(IS_ENABLED(CONFIG_BTRFS_DEBUG));
btrfs_err(fs_info, "qgroup reserved space leaked");
}
This problem will triggle fstests btrfs/042 to failure only when
CONFIG_BTRFS_DEBUG=y ?
maybe related issue:
when lockdep debug is enabled, the following issue become very easy to
reproduce too.
https://lore.kernel.org/linux-nfs/3E21DFEA-8DF7-484B-8122-D578BFF7F9E0@oracle.com/
so there maybe some lockdep debug related , but not btrfs related
problem in kernel 6.0.
more test(remove some minor local patch(no qgroup related)) will be done,
and then I will report the result.
Best Regards
Wang Yugui (wangyugui@e16-tech.com)
2022/09/24
>
> Thanks,
> Qu
> >
> > dmesg output:
> >
> > [15788.980873] run fstests btrfs/042 at 2022-09-24 00:40:24
> > [15803.880347] BTRFS info (device sdb1): using crc32c (crc32c-intel) checksum algorithm
> > [15803.897721] BTRFS info (device sdb1): using free space tree
> > [15803.932525] BTRFS info (device sdb1): enabling ssd optimizations
> > [15818.525145] BTRFS: device fsid b255009c-2a39-49ed-b230-b4e26befd321 devid 1 transid 6 /dev/sdb2 scanned by systemd-udevd (310493)
> > [15818.791882] BTRFS info (device sdb2): using crc32c (crc32c-intel) checksum algorithm
> > [15818.808805] BTRFS info (device sdb2): using free space tree
> > [15818.837770] BTRFS info (device sdb2): enabling ssd optimizations
> > [15818.847176] BTRFS info (device sdb2): checking UUID tree
> > [15818.911997] BTRFS info (device sdb2): qgroup scan completed (inconsistency flag cleared)
> > [15838.397073] BTRFS warning (device sdb2): qgroup 1/1 has unreleased space, type 0 rsv 12288
> > [15838.406954] BTRFS warning (device sdb2): qgroup 0/260 has unreleased space, type 0 rsv 4096
> > [15838.416728] BTRFS warning (device sdb2): qgroup 0/259 has unreleased space, type 0 rsv 4096
> > [15838.426511] BTRFS warning (device sdb2): qgroup 0/257 has unreleased space, type 0 rsv 4096
> > [15838.436351] ------------[ cut here ]------------
> > [15838.442380] WARNING: CPU: 0 PID: 310592 at fs/btrfs/disk-io.c:4668 close_ctree (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/include/trace/events/btrfs.h:749 (discriminator 14)) btrfs
> >
> > fs/btrfs/disk-io.c:4668
> > if (btrfs_check_quota_leak(fs_info)) {
> > L4668 WARN_ON(IS_ENABLED(CONFIG_BTRFS_DEBUG));
> > btrfs_err(fs_info, "qgroup reserved space leaked");
> > }
> >
> > [15838.452948] Modules linked in: ext4 mbcache jbd2 loop rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill ib_core sunrpc dm_multipath amdgpu iommu_v2 gpu_sched drm_buddy intel_rapl_msr intel_rapl_common btrfs sb_edac snd_hda_codec_realtek x86_pkg_temp_thermal snd_hda_codec_generic radeon intel_powerclamp snd_hda_codec_hdmi ledtrig_audio coretemp blake2b_generic snd_hda_intel xor dcdbas kvm_intel mei_wdt raid6_pq snd_intel_dspcfg i2c_algo_bit iTCO_wdt iTCO_vendor_support zstd_compress dell_smm_hwmon snd_intel_sdw_acpi drm_display_helper kvm snd_hda_codec cec snd_hda_core drm_ttm_helper irqbypass snd_hwdep rapl ttm intel_cstate snd_seq dm_mod snd_seq_device drm_kms_helper intel_uncore snd_pcm pcspkr syscopyarea mei_me snd_timer sysfillrect i2c_i801 snd sysimgblt i2c_smbus lpc_ich mei fb_sys_fops soundcore fuse drm xfs sd_mod t10_pi sr_mod cdrom sg crct10dif_pclmul crc32_pclmul bnx2x crc32c_intel ahci libahci ghash_clmulni_intel mdio libata mpt3sas e10
> > 00e
> > [15838.453270] raid_class scsi_transport_sas wmi i2c_dev ipmi_devintf ipmi_msghandler
> > [15838.551107] Unloaded tainted modules: acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1
> > [15838.560649] pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 fjes():1 acpi_cpufreq():1 pcc_cpufreq():1 pcc_cpufreq():1 fjes():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 fjes():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 fjes():1 pcc_cpufreq():1 acpi_cpufreq():1 fjes():1 pcc_cpufreq():1 acpi_cpufreq():1
> > [15838.659255] pcc_cpufreq():1 acpi_cpufreq():1 fjes():1 pcc_cpufreq():1 acpi_cpufreq():1 pcc_cpufreq():1 acpi_cpufreq():1 acpi_cpufreq():1 fjes():1 fjes():1 fjes():1 fjes():1 fjes():1 fjes():1
> > [15838.779406] CPU: 0 PID: 310592 Comm: umount Not tainted 6.0.0-7.0.debug.el7.x86_64 #1
> > [15838.789287] Hardware name: Dell Inc. Precision T7610/0NK70N, BIOS A18 09/11/2019
> > [15838.798748] RIP: 0010:close_ctree (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/include/trace/events/btrfs.h:749 (discriminator 14)) btrfs
> > [15838.805988] Code: c7 00 9b 2f c3 e8 1c e7 ff ff 48 8b 3c 24 be 08 00 00 00 e8 2f 78 70 db f0 41 80 4f 10 02 4c 89 ff e8 31 46 f4 ff 84 c0 74 11 <0f> 0b 48 c7 c6 60 9b 2f c3 4c 89 ff e8 b0 8c ff ff 4c 89 ff 49 8d
> > All code
> > ========
> > 0: c7 00 9b 2f c3 e8 movl $0xe8c32f9b,(%rax)
> > 6: 1c e7 sbb $0xe7,%al
> > 8: ff (bad)
> > 9: ff 48 8b decl -0x75(%rax)
> > c: 3c 24 cmp $0x24,%al
> > e: be 08 00 00 00 mov $0x8,%esi
> > 13: e8 2f 78 70 db callq 0xffffffffdb707847
> > 18: f0 41 80 4f 10 02 lock orb $0x2,0x10(%r15)
> > 1e: 4c 89 ff mov %r15,%rdi
> > 21: e8 31 46 f4 ff callq 0xfffffffffff44657
> > 26: 84 c0 test %al,%al
> > 28: 74 11 je 0x3b
> > 2a:* 0f 0b ud2 <-- trapping instruction
> > 2c: 48 c7 c6 60 9b 2f c3 mov $0xffffffffc32f9b60,%rsi
> > 33: 4c 89 ff mov %r15,%rdi
> > 36: e8 b0 8c ff ff callq 0xffffffffffff8ceb
> > 3b: 4c 89 ff mov %r15,%rdi
> > 3e: 49 rex.WB
> > 3f: 8d .byte 0x8d
> >
> > Code starting with the faulting instruction
> > ===========================================
> > 0: 0f 0b ud2
> > 2: 48 c7 c6 60 9b 2f c3 mov $0xffffffffc32f9b60,%rsi
> > 9: 4c 89 ff mov %r15,%rdi
> > c: e8 b0 8c ff ff callq 0xffffffffffff8cc1
> > 11: 4c 89 ff mov %r15,%rdi
> > 14: 49 rex.WB
> > 15: 8d .byte 0x8d
> > [15838.829023] RSP: 0018:ffff88810b7bfb98 EFLAGS: 00010202
> > [15838.836422] RAX: 0000000000000001 RBX: ffff88828ee54d58 RCX: 0000000000000000
> > [15838.845734] RDX: 1ffff11064bd1ad3 RSI: 0000000000000008 RDI: ffff888325e8d6a0
> > [15838.855015] RBP: ffff88828ee54fd0 R08: ffffed13f39c7a21 R09: 0000000000000000
> > [15838.864347] R10: ffffed1418ee9840 R11: ffff88a0c774c200 R12: ffff88824b4487b0
> > [15838.873690] R13: ffff88828ee55130 R14: ffff88819ea76ec0 R15: ffff88828ee54000
> > [15838.883005] FS: 00007f41e8aaa500(0000) GS:ffff889f9ce00000(0000) knlGS:0000000000000000
> > [15838.893294] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > [15838.901224] CR2: 00007fa141b622d8 CR3: 00000001e2a34003 CR4: 00000000001706f0
> > [15838.910553] Call Trace:
> > [15838.915219] <TASK>
> > [15838.919527] ? fsnotify_destroy_marks (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/notify/mark.c:839)
> > [15838.926367] ? btrfs_cleanup_one_transaction.cold.75 (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/include/linux/perf_event.h:1189 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/include/trace/events/btrfs.h:720) btrfs
> > [15838.935255] ? fsnotify_sb_delete (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/arch/x86/include/asm/atomic64_64.h:22 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/include/linux/atomic/atomic-long.h:29 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/include/linux/atomic/atomic-instrumented.h:1266 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/notify/fsnotify.c:95)
> > [15838.941822] ? __fsnotify_vfsmount_delete (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/notify/fsnotify.c:91)
> > [15838.948905] ? evict_inodes (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/inode.c:713)
> > [15838.954918] ? dispose_list (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/inode.c:713)
> > [15838.960947] ? btrfs_sync_fs (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/btrfs/super.c:1570) btrfs
> > [15838.967745] generic_shutdown_super (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/super.c:491)
> > [15838.974445] kill_anon_super (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/super.c:1072 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/super.c:1086)
> > [15838.980345] btrfs_kill_super (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/btrfs/super.c:2551) btrfs
> > [15838.987130] deactivate_locked_super (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/super.c:332)
> > [15838.993736] cleanup_mnt (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/fs/namespace.c:1187)
> > [15838.999417] task_work_run (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/task_work.c:177 (discriminator 1))
> > [15839.005185] exit_to_user_mode_prepare (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/include/linux/resume_user_mode.h:49 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/entry/common.c:169 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/entry/common.c:201)
> > [15839.012112] syscall_exit_to_user_mode (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/entry/common.c:128 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/entry/common.c:296)
> > [15839.018875] do_syscall_64 (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/arch/x86/entry/common.c:87)
> > [15839.024600] ? lockdep_hardirqs_on_prepare (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/locking/lockdep.c:4260 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/locking/lockdep.c:4319 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/locking/lockdep.c:4271)
> > [15839.031881] ? do_syscall_64 (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/arch/x86/entry/common.c:87)
> > [15839.037753] ? lockdep_hardirqs_on_prepare (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/locking/lockdep.c:4260 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/locking/lockdep.c:4319 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/locking/lockdep.c:4271)
> > [15839.045010] entry_SYSCALL_64_after_hwframe (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/arch/x86/entry/entry_64.S:120)
> > [15839.052194] RIP: 0033:0x7f41e8953a6b
> > [15839.057913] Code: 0f 1e fa 48 89 fe 31 ff e9 72 08 00 00 66 90 f3 0f 1e fa 31 f6 e9 05 00 00 00 0f 1f 44 00 00 f3 0f 1e fa b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 8b 15 89 63 0a 00 f7 d8
> > All code
> > ========
> > 0: 0f 1e fa nop %edx
> > 3: 48 89 fe mov %rdi,%rsi
> > 6: 31 ff xor %edi,%edi
> > 8: e9 72 08 00 00 jmpq 0x87f
> > d: 66 90 xchg %ax,%ax
> > f: f3 0f 1e fa endbr64
> > 13: 31 f6 xor %esi,%esi
> > 15: e9 05 00 00 00 jmpq 0x1f
> > 1a: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
> > 1f: f3 0f 1e fa endbr64
> > 23: b8 a6 00 00 00 mov $0xa6,%eax
> > 28: 0f 05 syscall
> > 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction
> > 30: 77 05 ja 0x37
> > 32: c3 retq
> > 33: 0f 1f 40 00 nopl 0x0(%rax)
> > 37: 48 8b 15 89 63 0a 00 mov 0xa6389(%rip),%rdx # 0xa63c7
> > 3e: f7 d8 neg %eax
> >
> > Code starting with the faulting instruction
> > ===========================================
> > 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax
> > 6: 77 05 ja 0xd
> > 8: c3 retq
> > 9: 0f 1f 40 00 nopl 0x0(%rax)
> > d: 48 8b 15 89 63 0a 00 mov 0xa6389(%rip),%rdx # 0xa639d
> > 14: f7 d8 neg %eax
> > [15839.081093] RSP: 002b:00007fff313c23d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
> > [15839.090894] RAX: 0000000000000000 RBX: 000055d74a755540 RCX: 00007f41e8953a6b
> > [15839.100242] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055d74a75a550
> > [15839.109546] RBP: 000055d74a755310 R08: 0000000000000000 R09: 000055d74a754010
> > [15839.118783] R10: 00007f41e89faaa0 R11: 0000000000000246 R12: 0000000000000000
> > [15839.128016] R13: 000055d74a75a550 R14: 000055d74a755420 R15: 000055d74a755310
> > [15839.137246] </TASK>
> > [15839.141444] irq event stamp: 36915
> > [15839.146842] hardirqs last enabled at (36929): __up_console_sem (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/arch/x86/include/asm/irqflags.h:45 (discriminator 1) /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/arch/x86/include/asm/irqflags.h:80 (discriminator 1) /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/arch/x86/include/asm/irqflags.h:138 (discriminator 1) /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/printk/printk.c:264 (discriminator 1))
> > [15839.157472] hardirqs last disabled at (36942): __up_console_sem (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/printk/printk.c:262 (discriminator 1))
> > [15839.168059] softirqs last enabled at (34740): __do_softirq (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/arch/x86/include/asm/preempt.h:27 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/softirq.c:415 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/softirq.c:600)
> > [15839.178441] softirqs last disabled at (34701): irq_exit_rcu (/usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/softirq.c:445 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/softirq.c:650 /usr/src/debug/kernel-6.0-rc6/linux-6.0.0-7.0.debug.el7.x86_64/kernel/softirq.c:662)
> > [15839.188788] ---[ end trace 0000000000000000 ]---
> > [15839.195355] BTRFS error (device sdb2): qgroup reserved space leaked
> > [15839.544913] BTRFS info (device sdb2): using crc32c (crc32c-intel) checksum algorithm
> > [15839.563333] BTRFS info (device sdb2): using free space tree
> > [15839.597640] BTRFS info (device sdb2): enabling ssd optimizations
> >
> >
> > Best Regards
> > Wang Yugui (wangyugui@e16-tech.com)
> > 2022/09/24
> >
> >
next prev parent reply other threads:[~2022-09-24 2:11 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-23 23:43 fstests btrfs/042 triggle 'qgroup reserved space leaked' Wang Yugui
2022-09-24 1:06 ` Qu Wenruo
2022-09-24 1:53 ` Qu Wenruo
2022-09-24 2:11 ` Wang Yugui [this message]
2022-09-24 2:17 ` Qu Wenruo
2022-09-24 4:07 ` Wang Yugui
2022-09-24 4:44 ` Qu Wenruo
2022-09-24 6:41 ` Wang Yugui
2022-09-24 7:22 ` Qu Wenruo
2022-09-24 7:57 ` Wang Yugui
2022-09-24 9:02 ` Su Yue
2022-09-24 10:25 ` Wang Yugui
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220924101103.5AEA.409509F4@e16-tech.com \
--to=wangyugui@e16-tech.com \
--cc=linux-btrfs@vger.kernel.org \
--cc=quwenruo.btrfs@gmx.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).