On Sat, Apr 13, 2019 at 12:46:28AM +0200, Christoph Anton Mitterer wrote:
> On Wed, 2019-03-20 at 10:59 +0100, Johannes Thumshirn wrote:
> > First of all, have you tried a more recent kernel than the Debian
> > kernels you referenced? E.g. Linus' current master or David's misc-
> > next
> > branch? Just so we don't try to hunt down a bug that's already fixed.
> 
> I haven't and that's a bit difficult for me unless it's packaged by the
> distro (policy reasons).
> 
> 
> Also giving out the image is a bit problematic as it's huge (8TB).
> 
> > Also if you can still reproduce the bug, please activate tracing in
> > btrfs and send the trace output.
> 
> How would I do that?
> 
> 
> In the meantime, I think I can reproduce it with fresh images so could
> you try the following:
> 
> # truncate --size 1G image
> # mkfs.btrfs image
> 
> # mount -o compress image /mnt
> # cd /mnt
> 
> # # create some data e.g.:
> # tar xaf /usr/src/linux-source-4.19.tar.xz
> # cd
> # umount /mnt
> 
> # losetup -r -f image
> # mount -o compress /dev/loop0 /mnt
> 
> # find /mnt -type f -exec filefrag -v {} \;
> 

I'll give it a try.


> 
> And there your kernel log will explode ;-)
> 
> The culprit seems to be the device itself being read-only i.e.
> losetup's -r, respectively blockdev --setro DEVICE which I've used
> previously.
> 
> If you repeat the above from the losetup point, but with -r ...
> everything works fine.
> Haven't checked whether -o compress actually makes a difference.
> 
> 
> Cheers,
> Chris.
> 
> 

-- 
Johannes Thumshirn                            SUSE Labs Filesystems
jthumsh...@suse.de                                +49 911 74053 689
SUSE LINUX GmbH, Maxfeldstr. 5, 90409 Nürnberg
GF: Felix Imendörffer, Mary Higgins, Sri Rasiah
HRB 21284 (AG Nürnberg)
Key fingerprint = EC38 9CAB C2C4 F25D 8600 D0D0 0393 969D 2D76 0850

Reply via email to