Marc MERLIN posted on Sun, 23 Feb 2014 22:58:47 -0800 as excerpted:
> On Mon, Feb 24, 2014 at 06:42:30AM +, Duncan wrote:
>> [S]ee the /var/lib/btrfs/scrub.status.* files. That's
>> where scrub state is stored, and manually blowing away the appropriate
>> file should clear btrfs' memory of th
On 02/24/2014 02:58 PM, Marc MERLIN wrote:
On Mon, Feb 24, 2014 at 06:42:30AM +, Duncan wrote:
I believe there's a fix coming (a cancel that blows away the tracking
file if it finds it and no actual running scrub is the most obvious fix),
but meanwhile, see the /var/lib/btrfs/scrub.status.*
On Mon, Feb 24, 2014 at 06:42:30AM +, Duncan wrote:
> I believe there's a fix coming (a cancel that blows away the tracking
> file if it finds it and no actual running scrub is the most obvious fix),
> but meanwhile, see the /var/lib/btrfs/scrub.status.* files. That's where
> scrub state is
Marc MERLIN posted on Sun, 23 Feb 2014 22:17:14 -0800 as excerpted:
> Mmmh, this bug might be part of the problem:
> gargamel:/mnt# btrfs scrub start btrfs_pool2
> ERROR: scrub is already running.
> gargamel:/mnt# btrfs scrub cancel btrfs_pool2
> ERROR: scrub cancel failed on btrfs_pool2: not run
On Mon, Feb 24, 2014 at 02:27:46PM +0800, Wang Shilong wrote:
> >Note that it says running for 5 seconds, but it started 4H ago.
> >
> >Any idea what's going on here?
> What is dmesg output?
>
> Did it output something like "Skip abort transaction"? Also
> what is your mount option? did you enable
Marc MERLIN posted on Sun, 23 Feb 2014 21:51:03 -0800 as excerpted:
> In the end I pinned it down to this:
> 3.13.5's kernel/userland interface fails if my kernel is 64bit and my
> userland 32bit.
This is a known issue. There's patches in the pipeline for 32-bit
userspace on a 64-bit kernel, al
On 02/24/2014 02:17 PM, Marc MERLIN wrote:
On Sun, Feb 23, 2014 at 10:14:26PM -0800, Marc MERLIN wrote:
Does someone know how I can debug further why this is hanging?
It seems that accessing a certain directory on one of my btrfs filesystems
causes this.
The rest of my system seems ok, as long
On Sun, Feb 23, 2014 at 10:14:26PM -0800, Marc MERLIN wrote:
> Does someone know how I can debug further why this is hanging?
>
> It seems that accessing a certain directory on one of my btrfs filesystems
> causes this.
>
> The rest of my system seems ok, as long as I'm not touching this filesyst
Does someone know how I can debug further why this is hanging?
It seems that accessing a certain directory on one of my btrfs filesystems
causes this.
The rest of my system seems ok, as long as I'm not touching this filesystem.
Is this a bug, or a performance problem?
[ 1930.287192] INFO: task
I was trying to make sense out of this:
gargamel:~# lsattr
lsattr: Inappropriate ioctl for device While reading flags on ./satapmtool
lsattr: Inappropriate ioctl for device While reading flags on ./usbreset
As well as the btrfs send issue I reported:
gargamel:/mnt/btrfs_pool1# btrfs send media_ro
On Fri, Feb 21, 2014 at 12:02:56AM +, Filipe David Borba Manana wrote:
> Regression test for a btrfs incremental send issue where invalid paths for
> utimes, chown and chmod operations were sent to the send stream, causing
> btrfs receive to fail.
>
> If a directory had a move/rename operation
On Wed, Feb 19, 2014 at 02:32:32PM +, Filipe David Borba Manana wrote:
> Regression test for btrfs incremental send issue where a rmdir instruction
> is sent against an orphan directory inode which is not empty yet, causing
> btrfs receive to fail when it attempts to remove the directory.
>
>
Hi together,
I'm new to the list and hope to be at the right place for the following
issue:
The wiki page
https://btrfs.wiki.kernel.org/index.php/Btrfs_source_repositories#btrfs_kernel_module_git_repository
talks about integrating an existing local kernel clone ("instance") by
adding it as a git r
Got this with 3.14-rc3:
[525983.966567] [ cut here ]
[525983.966645] kernel BUG at fs/btrfs/ctree.c:3215!
[525983.966705] invalid opcode: [#1] SMP
[525983.966765] Modules linked in: ipt_MASQUERADE iptable_nat nf_conntrack_ipv4
nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conn
14 matches
Mail list logo