public inbox for linux-btrfs@vger.kernel.org
 help / color / mirror / Atom feed
From: Zygo Blaxell <ce3g8jdj@umail.furryterror.org>
To: linux-btrfs@vger.kernel.org
Subject: kernel BUG at fs/btrfs/tree-mod-log.c:675, now in 5.18+
Date: Sun, 21 Aug 2022 02:08:17 -0400	[thread overview]
Message-ID: <YwHL0Qsbox4bHrCQ@hungrycats.org> (raw)
In-Reply-To: <YiucTG6FXYRpZgO9@hungrycats.org>

On Fri, Mar 11, 2022 at 02:00:28PM -0500, Zygo Blaxell wrote:

This BUG_ON seems to have been merged into 5.18.  It has been masked by
some other bugs that popped up in 5.18+ kernels, but now that the other
bugs are fixed and out of the way, this bug is back at the top of my
most-frequent crash-cause stats.  Here's a recent example from 5.19.2:

	[   89.243829][ T3299] BTRFS info (device dm-2): checking UUID tree
	[  378.608877][ T3603] ------------[ cut here ]------------
	[  378.617942][ T3603] kernel BUG at fs/btrfs/tree-mod-log.c:675!
	[  378.630522][ T3603] invalid opcode: 0000 [#1] PREEMPT SMP PTI
	[  378.639850][ T3603] CPU: 2 PID: 3603 Comm: task_consumer Not tainted 5.19.2-8b6b6b6d11a8+ #2 8b409685367862a78b253ee4ea7615669c8428cd
	[  378.656120][ T3603] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
	[  378.670898][ T3603] RIP: 0010:tree_mod_log_rewind+0x3f4/0x400
	[  378.677777][ T3603] Code: ff e9 9e fd ff ff 41 83 ee 01 e9 95 fd ff ff 4d 8d 6c 24 2c 4c 89 ef e8 8a 25 95 ff 49 63 44 24 2c 44 39 f0 0f 83 de fc ff ff <0f> 0b 0f 0b 0f 1f 84 00 00 00 00 00 66 0f 1f 00 0f 1f 44 00 00 55
	[  378.694058][ T3603] RSP: 0000:ffffb94f0231f858 EFLAGS: 00010297
	[  378.697985][ T3603] RAX: 0000000000000000 RBX: ffff95bacd9df430 RCX: 0000000000000000
	[  378.703595][ T3603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
	[  378.711017][ T3603] RBP: ffffb94f0231f8a8 R08: 0000000000000000 R09: 0000000000000000
	[  378.717249][ T3603] R10: 0000000000000000 R11: 0000000000000000 R12: ffff95ba8b228680
	[  378.722741][ T3603] R13: ffff95ba8b2286ac R14: 000000000000019b R15: ffff95bac2801d98
	[  378.727693][ T3603] FS:  00007f948bc23640(0000) GS:ffff95baf7600000(0000) knlGS:0000000000000000
	[  378.732455][ T3603] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
	[  378.736348][ T3603] CR2: 00005563866af660 CR3: 000000010c5be004 CR4: 0000000000170ee0
	[  378.744644][ T3603] Call Trace:
	[  378.745990][ T3603]  <TASK>
	[  378.747121][ T3603]  btrfs_get_old_root+0x484/0x6e0
	[  378.749297][ T3603]  btrfs_search_old_slot+0x105/0x550
	[  378.751436][ T3603]  ? free_extent_buffer+0x126/0x1b0
	[  378.753870][ T3603]  find_parent_nodes+0xccf/0x2bf0
	[  378.756174][ T3603]  btrfs_find_all_roots_safe+0x104/0x1a0
	[  378.760659][ T3603]  ? btrfs_flush_workqueue+0x40/0x40
	[  378.764361][ T3603]  iterate_extent_inodes+0x22b/0x3e0
	[  378.767594][ T3603]  ? release_extent_buffer+0x1ff/0x2e0
	[  378.772764][ T3603]  iterate_inodes_from_logical+0xd7/0x120
	[  378.780035][ T3603]  ? iterate_inodes_from_logical+0xd7/0x120
	[  378.788120][ T3603]  ? btrfs_flush_workqueue+0x40/0x40
	[  378.794323][ T3603]  btrfs_ioctl_logical_to_ino+0x1e1/0x270
	[  378.799587][ T3603]  btrfs_ioctl+0x1725/0x3c60
	[  378.802880][ T3603]  ? find_held_lock+0x38/0xa0
	[  378.805698][ T3603]  ? __this_cpu_preempt_check+0x17/0x30
	[  378.809905][ T3603]  ? do_vfs_ioctl+0x9a/0xc90
	[  378.810870][ T3603]  __x64_sys_ioctl+0xe1/0x110
	[  378.813858][ T3603]  ? btrfs_ioctl_get_supported_features+0x60/0x60
	[  378.819340][ T3603]  ? __x64_sys_ioctl+0xe1/0x110
	[  378.822101][ T3603]  do_syscall_64+0x63/0xd0
	[  378.824305][ T3603]  ? syscall_exit_to_user_mode+0x3b/0x50
	[  378.827912][ T3603]  ? do_syscall_64+0x70/0xd0
	[  378.829363][ T3603]  ? do_syscall_64+0x70/0xd0
	[  378.830855][ T3603]  ? do_syscall_64+0x70/0xd0
	[  378.832395][ T3603]  ? sysvec_apic_timer_interrupt+0x5b/0xe0
	[  378.834540][ T3603]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
	[  378.836719][ T3603] RIP: 0033:0x7f948d517397
	[  378.837844][ T3603] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48
	[  378.843790][ T3603] RSP: 002b:00007f948bc1f2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
	[  378.846399][ T3603] RAX: ffffffffffffffda RBX: 0000558e77377dd0 RCX: 00007f948d517397
	[  378.853315][ T3603] RDX: 00007f948bc1f698 RSI: 00000000c038943b RDI: 0000000000000003
	[  378.857528][ T3603] RBP: 00007f948bc1f4d0 R08: 0000000000000000 R09: 00007f948bc1f780
	[  378.860448][ T3603] R10: 00007f9480035e80 R11: 0000000000000246 R12: 00007f948bc1f690
	[  378.863715][ T3603] R13: 0000000000000003 R14: 00007f948bc1f698 R15: 00007f948bc1f538
	[  378.870968][ T3603]  </TASK>
	[  378.871446][ T3603] Modules linked in:
	[  378.873559][ T3603] ---[ end trace 0000000000000000 ]---
	[  378.875002][ T3603] RIP: 0010:tree_mod_log_rewind+0x3f4/0x400
	[  378.878728][ T3603] Code: ff e9 9e fd ff ff 41 83 ee 01 e9 95 fd ff ff 4d 8d 6c 24 2c 4c 89 ef e8 8a 25 95 ff 49 63 44 24 2c 44 39 f0 0f 83 de fc ff ff <0f> 0b 0f 0b 0f 1f 84 00 00 00 00 00 66 0f 1f 00 0f 1f 44 00 00 55
	[  378.885948][ T3603] RSP: 0000:ffffb94f0231f858 EFLAGS: 00010297
	[  378.887600][ T3603] RAX: 0000000000000000 RBX: ffff95bacd9df430 RCX: 0000000000000000
	[  378.891530][ T3603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
	[  378.895229][ T3603] RBP: ffffb94f0231f8a8 R08: 0000000000000000 R09: 0000000000000000
	[  378.897254][ T3603] R10: 0000000000000000 R11: 0000000000000000 R12: ffff95ba8b228680
	[  378.899226][ T3603] R13: ffff95ba8b2286ac R14: 000000000000019b R15: ffff95bac2801d98
	[  378.903452][ T3603] FS:  00007f948bc23640(0000) GS:ffff95baf7600000(0000) knlGS:0000000000000000
	[  378.905994][ T3603] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
	[  378.909562][ T3603] CR2: 00005563866af660 CR3: 000000010c5be004 CR4: 0000000000170ee0

	tree_mod_log_rewind+0x3f4/0x400:

	tree_mod_log_rewind at fs/btrfs/tree-mod-log.c:675 (discriminator 1)
	 670                     * the modification. As we're going backwards, we do the
	 671                     * opposite of each operation here.
	 672                     */
	 673                    switch (tm->op) {
	 674                    case BTRFS_MOD_LOG_KEY_REMOVE_WHILE_FREEING:
	>675<                           BUG_ON(tm->slot < n);
	 676                            fallthrough;
	 677                    case BTRFS_MOD_LOG_KEY_REMOVE_WHILE_MOVING:
	 678                    case BTRFS_MOD_LOG_KEY_REMOVE:
	 679                            btrfs_set_node_key(eb, &tm->key, tm->slot);
	 680                            btrfs_set_node_blockptr(eb, tm->slot, tm->blockptr);

The details of the stack traces vary, but they always have
btrfs_ioctl_logical_to_ino in there somewhere.

> On Thu, Mar 10, 2022 at 12:29:06AM -0500, Zygo Blaxell wrote:
> > On Fri, Feb 25, 2022 at 01:23:16PM -0500, Zygo Blaxell wrote:
> > > This BUG has popped up at the top of the "reasons why the bees test VM
> > > crashes" list for recent misc-next kernels:
> > 
> > This hasn't happened on misc-next since February 24 (e9a9bca06a61
> 
> Oops, happened again on misc-next yesterday (695e8113f409 "btrfs: fix
> qgroup reserve overflow the qgroup limit").  That build is from last
> Monday, so I guess it sometimes takes a while to get to the BUG_ON.
> 
> > "btrfs: fix relocation crash due to premature return from
> > btrfs_commit_transaction()"), but it still happens on for-next
> > (77848115626f "Merge branch 'for-next-current-v5.16-20220308' into
> > for-next-20220308)").
> > 
> > Same stack trace give or take a few bytes.  Happens a few times a day.
> > 
> > > 	tree_mod_log_rewind at fs/btrfs/tree-mod-log.c:675 (discriminator 1)
> > > 	 670                     * the modification. As we're going backwards, we do the
> > > 	 671                     * opposite of each operation here.
> > > 	 672                     */
> > > 	 673                    switch (tm->op) {
> > > 	 674                    case BTRFS_MOD_LOG_KEY_REMOVE_WHILE_FREEING:
> > > 	>675<                           BUG_ON(tm->slot < n);
> > > 	 676                            fallthrough;
> > > 	 677                    case BTRFS_MOD_LOG_KEY_REMOVE_WHILE_MOVING:
> > > 	 678                    case BTRFS_MOD_LOG_KEY_REMOVE:
> > > 	 679                            btrfs_set_node_key(eb, &tm->key, tm->slot);
> > > 	 680                            btrfs_set_node_blockptr(eb, tm->slot, tm->blockptr);
> > > 
> > > 	[ 7416.656802][ T7997] ------------[ cut here ]------------
> > > 	[ 7416.657693][ T7997] kernel BUG at fs/btrfs/tree-mod-log.c:675!
> > > 	[ 7416.658650][ T7997] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
> > > 	[ 7416.666264][ T7997] CPU: 3 PID: 7997 Comm: task_consumer Not tainted 5.17.0-d1488a11d91d-misc-next+ #152 eb204dc08d2451c7ad8df3b8b5e78e07ac47b04e
> > > 	[ 7416.669261][ T7997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
> > > 	[ 7416.671103][ T7997] RIP: 0010:tree_mod_log_rewind+0x3d8/0x3e0
> > > 	[ 7416.672150][ T7997] Code: ff e9 b1 fd ff ff 41 83 ee 01 e9 a8 fd ff ff 4d 8d 6c 24 2c 4c 89 ef e8 c6 7b b0 ff 49 63 44 24 2c 44 39 f0 0f 83 f1 fc ff ff <0f> 0b 0f 0b 0f 1f 40 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 4c
> > > 	[ 7416.675084][ T7997] RSP: 0018:ffffc90007b1f2b0 EFLAGS: 00010293
> > > 	[ 7416.675939][ T7997] RAX: 0000000000000000 RBX: ffff88813a353ae0 RCX: dffffc0000000000
> > > 	[ 7416.677060][ T7997] RDX: 0000000000000007 RSI: 0000000000000008 RDI: ffff88811988102c
> > > 	[ 7416.678199][ T7997] RBP: ffffc90007b1f300 R08: ffffffff99a7e72a R09: ffff88800b67b085
> > > 	[ 7416.679359][ T7997] R10: ffffed10016cf610 R11: 0000000000000001 R12: ffff888119881000
> > > 	[ 7416.680523][ T7997] R13: ffff88811988102c R14: 0000000000000002 R15: ffff8881b400cd18
> > > 	[ 7416.681652][ T7997] FS:  00007f324ae58640(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
> > > 	[ 7416.682920][ T7997] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > > 	[ 7416.683939][ T7997] CR2: 00007f72df25f2c0 CR3: 0000000124eb0001 CR4: 0000000000170ee0
> > > 	[ 7416.685136][ T7997] Call Trace:
> > > 	[ 7416.685600][ T7997]  <TASK>
> > > 	[ 7416.686020][ T7997]  btrfs_get_old_root+0x3d9/0x640
> > > 	[ 7416.686729][ T7997]  ? lock_downgrade+0x420/0x420
> > > 	[ 7416.687452][ T7997]  ? rcu_read_lock_sched_held+0x16/0x80
> > > 	[ 7416.688250][ T7997]  btrfs_search_old_slot+0x190/0x540
> > > 	[ 7416.689019][ T7997]  ? release_extent_buffer+0x1d2/0x290
> > > 	[ 7416.689794][ T7997]  ? btrfs_search_slot+0x1420/0x1420
> > > 	[ 7416.690522][ T7997]  ? free_extent_buffer.part.0+0xd3/0x140
> > > 	[ 7416.691476][ T7997]  ? free_extent_buffer+0x13/0x20
> > > 	[ 7416.692195][ T7997]  find_parent_nodes+0xcdd/0x2860
> > > 	[ 7416.692977][ T7997]  ? __stack_depot_save+0x36/0x490
> > > 	[ 7416.693697][ T7997]  ? kasan_save_stack+0x3a/0x50
> > > 	[ 7416.694379][ T7997]  ? add_prelim_ref.part.0+0x140/0x140
> > > 	[ 7416.696069][ T7997]  ? finish_task_switch.isra.0+0x251/0x580
> > > 	[ 7416.698276][ T7997]  ? entry_SYSCALL_64_after_hwframe+0x44/0xae
> > > 	[ 7416.699244][ T7997]  ? lock_release+0xcf/0x8b0
> > > 	[ 7416.701147][ T7997]  ? fs_reclaim_acquire+0x67/0xf0
> > > 	[ 7416.703322][ T7997]  ? lock_downgrade+0x420/0x420
> > > 	[ 7416.704034][ T7997]  ? io_schedule_timeout+0xd0/0xd0
> > > 	[ 7416.704778][ T7997]  ? __might_resched+0x129/0x1c0
> > > 	[ 7416.705516][ T7997]  ? trace_kmalloc+0x2e/0xd0
> > > 	[ 7416.706188][ T7997]  ? kmem_cache_alloc_trace+0x220/0x470
> > > 	[ 7416.707034][ T7997]  btrfs_find_all_roots_safe+0x14c/0x1f0
> > > 	[ 7416.707841][ T7997]  ? find_parent_nodes+0x2860/0x2860
> > > 	[ 7416.708619][ T7997]  ? ulist_free+0x95/0xb0
> > > 	[ 7416.709242][ T7997]  ? btrfs_flush_workqueue+0x60/0x60
> > > 	[ 7416.710008][ T7997]  iterate_extent_inodes+0x27e/0x450
> > > 	[ 7416.710782][ T7997]  ? tree_backref_for_extent+0x240/0x240
> > > 	[ 7416.711589][ T7997]  ? do_raw_spin_unlock+0xad/0x110
> > > 	[ 7416.712332][ T7997]  ? preempt_count_sub+0x18/0xc0
> > > 	[ 7416.713038][ T7997]  ? _raw_spin_unlock+0x2d/0x50
> > > 	[ 7416.713718][ T7997]  ? release_extent_buffer+0x1d2/0x290
> > > 	[ 7416.714499][ T7997]  ? free_extent_buffer.part.0+0x8d/0x140
> > > 	[ 7416.715308][ T7997]  ? free_extent_buffer+0x13/0x20
> > > 	[ 7416.716030][ T7997]  iterate_inodes_from_logical+0x12f/0x180
> > > 	[ 7416.716868][ T7997]  ? btrfs_flush_workqueue+0x60/0x60
> > > 	[ 7416.717613][ T7997]  ? iterate_extent_inodes+0x450/0x450
> > > 	[ 7416.718404][ T7997]  ? __vmalloc_node+0x91/0xa0
> > > 	[ 7416.719081][ T7997]  ? paths_from_inode+0x450/0x510
> > > 	[ 7416.719798][ T7997]  ? kvmalloc_node+0x73/0x80
> > > 	[ 7416.720461][ T7997]  btrfs_ioctl_logical_to_ino+0x1b1/0x240
> > > 	[ 7416.721281][ T7997]  btrfs_ioctl+0x2a96/0x3ed0
> > > 	[ 7416.721939][ T7997]  ? rcu_read_lock_sched_held+0x16/0x80
> > > 	[ 7416.722739][ T7997]  ? lock_release+0xcf/0x8b0
> > > 	[ 7416.723392][ T7997]  ? __might_fault+0x62/0xd0
> > > 	[ 7416.724053][ T7997]  ? btrfs_ioctl_get_supported_features+0x30/0x30
> > > 	[ 7416.725038][ T7997]  ? do_vfs_ioctl+0x5a8/0xcc0
> > > 	[ 7416.725698][ T7997]  ? vfs_fileattr_set+0x520/0x520
> > > 	[ 7416.726421][ T7997]  ? rcu_read_lock_sched_held+0x16/0x80
> > > 	[ 7416.727343][ T7997]  ? lock_release+0xcf/0x8b0
> > > 	[ 7416.728159][ T7997]  ? __fget_files+0x14f/0x230
> > > 	[ 7416.729011][ T7997]  ? lock_downgrade+0x420/0x420
> > > 	[ 7416.729914][ T7997]  ? getrusage+0xa00/0xa00
> > > 	[ 7416.730733][ T7997]  ? __fget_files+0x167/0x230
> > > 	[ 7416.731612][ T7997]  ? __fget_light+0x72/0x100
> > > 	[ 7416.732469][ T7997]  __x64_sys_ioctl+0xc3/0x100
> > > 	[ 7416.733166][ T7997]  do_syscall_64+0x5c/0xc0
> > > 	[ 7416.733796][ T7997]  ? do_syscall_64+0x69/0xc0
> > > 	[ 7416.734446][ T7997]  ? lockdep_hardirqs_on_prepare+0x13/0x240
> > > 	[ 7416.735289][ T7997]  ? syscall_exit_to_user_mode+0x20/0x50
> > > 	[ 7416.736093][ T7997]  ? do_syscall_64+0x69/0xc0
> > > 	[ 7416.736743][ T7997]  ? rcu_read_lock_sched_held+0x16/0x80
> > > 	[ 7416.737535][ T7997]  ? syscall_exit_to_user_mode+0x20/0x50
> > > 	[ 7416.738338][ T7997]  ? lockdep_hardirqs_on_prepare+0x13/0x240
> > > 	[ 7416.739181][ T7997]  ? syscall_exit_to_user_mode+0x3b/0x50
> > > 	[ 7416.739983][ T7997]  ? do_syscall_64+0x69/0xc0
> > > 	[ 7416.740633][ T7997]  ? sysvec_call_function_single+0x57/0xc0
> > > 	[ 7416.741510][ T7997]  ? asm_sysvec_call_function_single+0xa/0x20
> > > 	[ 7416.742382][ T7997]  entry_SYSCALL_64_after_hwframe+0x44/0xae
> > > 	[ 7416.743228][ T7997] RIP: 0033:0x7f324b755a97
> > > 	[ 7416.743862][ T7997] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 93 0c 00 f7 d8 64 89 01 48
> > > 	[ 7416.746656][ T7997] RSP: 002b:00007f324ae542f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
> > > 	[ 7416.747861][ T7997] RAX: ffffffffffffffda RBX: 000055a4c3234dd0 RCX: 00007f324b755a97
> > > 	[ 7416.748997][ T7997] RDX: 00007f324ae54698 RSI: 00000000c038943b RDI: 0000000000000003
> > > 	[ 7416.750134][ T7997] RBP: 00007f324ae544d0 R08: 0000000000000000 R09: 00007f324ae54780
> > > 	[ 7416.751272][ T7997] R10: 00007f32381b6e10 R11: 0000000000000246 R12: 00007f324ae54690
> > > 	[ 7416.752411][ T7997] R13: 0000000000000003 R14: 00007f324ae54698 R15: 00007f324ae54538
> > > 	[ 7416.753555][ T7997]  </TASK>
> > > 	[ 7416.753988][ T7997] Modules linked in:
> > > 	[ 7416.754621][ T7997] ---[ end trace 0000000000000000 ]---
> > > 	[ 7416.755469][ T7997] RIP: 0010:tree_mod_log_rewind+0x3d8/0x3e0
> > > 	[ 7416.756333][ T7997] Code: ff e9 b1 fd ff ff 41 83 ee 01 e9 a8 fd ff ff 4d 8d 6c 24 2c 4c 89 ef e8 c6 7b b0 ff 49 63 44 24 2c 44 39 f0 0f 83 f1 fc ff ff <0f> 0b 0f 0b 0f 1f 40 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 4c
> > > 	[ 7416.759158][ T7997] RSP: 0018:ffffc90007b1f2b0 EFLAGS: 00010293
> > > 	[ 7416.760054][ T7997] RAX: 0000000000000000 RBX: ffff88813a353ae0 RCX: dffffc0000000000
> > > 	[ 7416.761209][ T7997] RDX: 0000000000000007 RSI: 0000000000000008 RDI: ffff88811988102c
> > > 	[ 7416.762393][ T7997] RBP: ffffc90007b1f300 R08: ffffffff99a7e72a R09: ffff88800b67b085
> > > 	[ 7416.763936][ T7997] R10: ffffed10016cf610 R11: 0000000000000001 R12: ffff888119881000
> > > 	[ 7416.765346][ T7997] R13: ffff88811988102c R14: 0000000000000002 R15: ffff8881b400cd18
> > > 	[ 7416.766568][ T7997] FS:  00007f324ae58640(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
> > > 	[ 7416.767923][ T7997] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > > 	[ 7416.768916][ T7997] CR2: 00007f72df25f2c0 CR3: 0000000124eb0001 CR4: 0000000000170ee0
> > > 

      reply	other threads:[~2022-08-21  6:08 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-02-25 18:23 misc-next e9a9bca06a61: kernel BUG at fs/btrfs/tree-mod-log.c:675 Zygo Blaxell
2022-03-10  5:29 ` Zygo Blaxell
2022-03-11 19:00   ` Zygo Blaxell
2022-08-21  6:08     ` Zygo Blaxell [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YwHL0Qsbox4bHrCQ@hungrycats.org \
    --to=ce3g8jdj@umail.furryterror.org \
    --cc=linux-btrfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox