Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp6768791rwr; Tue, 25 Apr 2023 03:35:18 -0700 (PDT) X-Google-Smtp-Source: AKy350Z6rFn+MMJZy6geS/U4eEn7uYSFi9H2UtQpPnPR1hgeibwDlftGTf/kGITcmrmP6mFKaNi/ X-Received: by 2002:a17:903:32d0:b0:1a6:370c:ce79 with SMTP id i16-20020a17090332d000b001a6370cce79mr22908294plr.22.1682418918223; Tue, 25 Apr 2023 03:35:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682418918; cv=none; d=google.com; s=arc-20160816; b=xjeuIPVJeR5kbz/H4kELIwhtmhTecYfcCuzOs9bvRE8jSXFq715Af70F/Z6r1mQPyW 4gC5GTS7Gic23cU385lwCDs9hZS3h9x5ouhDY9J2+ZAZd10NQ19Mn79tcRRp9Ow15YLI OgscH0eSpBknXbsWnZVVOm4XaLpsQNaneEYyNDlZ+rgKZlMrt1LG73vd7+2JN0QphM4I uY1SklQd/L2eq+KXHgDX+Tp3ILTagg+3ZqxanspU0zZi889lh5pX2adggw8bHQolXXJC egWp4h8kjocqES9AUx+zbIgpirjPjgj/gBHn/LgXQIBZYGwmH/1ULzXGWPkRo2jdapYh OBAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:reply-to:message-id:subject:cc:to:from:date :dkim-signature:dkim-signature; bh=n5Pl854vOoDZtv0CHQa6qbCgSEDBT3YwmdX581qycGk=; b=OyabFNhvKBWW7dXYDavA4ovCYwsg0sghkQ+9oO22LfifPp8SUJgYK0zns+dLoXa/32 0slKmcsm3N+MLFYS4VwMv8HRAqWCRiEWpcTm2XA5NtVAQSUAqJUq3LyLWuo583ci4lo5 6VwWAi1+OFkHq4dHqXWa4Y4gIMeI/AkIOiO5VaoaCZTmrCzERHkSBjOEaGgkScP6afLL lELjw8yulno4hIgNmrE48Vjak7XXtSx8Zvfpdu0fcw6eAD5w2fx9u9wtKCgfsBuzY63/ /cq6ymSIHkPL1T1qwpJoERdOim3XOhk8oOguL5X8d2iJo2VKppSeo7G9YubBQJVG2Rk2 YfLA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=tYKjIJj2; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=vWAT59+u; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c9-20020a170902b68900b001a986ca38easi2242182pls.15.2023.04.25.03.34.54; Tue, 25 Apr 2023 03:35:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=tYKjIJj2; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=vWAT59+u; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233238AbjDYKaD (ORCPT + 99 others); Tue, 25 Apr 2023 06:30:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36652 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233709AbjDYKaB (ORCPT ); Tue, 25 Apr 2023 06:30:01 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B5544CC3D for ; Tue, 25 Apr 2023 03:29:59 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 549D81FDA6; Tue, 25 Apr 2023 10:29:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1682418598; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=n5Pl854vOoDZtv0CHQa6qbCgSEDBT3YwmdX581qycGk=; b=tYKjIJj2SR1PVZ9e18mJeFjWWdvSHLdVd86WGrXt0AxhjW8QBSpE8YxHnfW/8er+FgWvcE DRtjjkhzs/Z80/2Amy9lwrOhJe6TeLA2IK7NP/eT5r1+71h4QwK+VvVarDag3Jsfd+Zh16 GAaQdTEhBOC1TILqk7NvrNmgcqNgNm4= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1682418598; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=n5Pl854vOoDZtv0CHQa6qbCgSEDBT3YwmdX581qycGk=; b=vWAT59+umvjQyPAjmMZiOoMO/HXOErnAe0klbQpT3izRDKWBWIGwpUuNAw5mO23lX082eu Am9ErGbkPC0nDlCA== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 08D12138E3; Tue, 25 Apr 2023 10:29:58 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id ri8VAaarR2R8KgAAMHmgww (envelope-from ); Tue, 25 Apr 2023 10:29:58 +0000 Date: Tue, 25 Apr 2023 12:30:06 +0200 From: Petr Vorel To: ltp@lists.linux.it Cc: NeilBrown , Cyril Hrubis , linux-nfs@vger.kernel.org, Steve Dickson , Jeff Layton , Chuck Lever , Trond Myklebust Subject: Re: [PATCH v3 3/3] nfs: Run on all filesystems Message-ID: <20230425103006.GA2926981@pevik> Reply-To: Petr Vorel References: <20230424210818.2885479-1-pvorel@suse.cz> <20230424210818.2885479-4-pvorel@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230424210818.2885479-4-pvorel@suse.cz> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi all, unfortunately nfs05.sh fails for some reason (the only test which fails). It works on various filesystems: nfs05 1 TINFO: using not default LTP netns: 'tst_ns_exec 31811 net,mnt' nfs05 1 TINFO: initialize 'lhost' 'ltp_ns_veth2' interface nfs05 1 TINFO: add local addr 10.0.0.2/24 nfs05 1 TINFO: add local addr fd00:1:1:1::2/64 nfs05 1 TINFO: initialize 'rhost' 'ltp_ns_veth1' interface nfs05 1 TINFO: add remote addr 10.0.0.1/24 nfs05 1 TINFO: add remote addr fd00:1:1:1::1/64 nfs05 1 TINFO: Network config (local -- remote): nfs05 1 TINFO: ltp_ns_veth2 -- ltp_ns_veth1 nfs05 1 TINFO: 10.0.0.2/24 -- 10.0.0.1/24 nfs05 1 TINFO: fd00:1:1:1::2/64 -- fd00:1:1:1::1/64 tst_device.c:96: TINFO: Found free device 0 '/dev/loop0' tst_supported_fs_types.c:90: TINFO: Kernel supports ext2 tst_supported_fs_types.c:55: TINFO: mkfs.ext2 does exist tst_supported_fs_types.c:90: TINFO: Kernel supports ext3 tst_supported_fs_types.c:55: TINFO: mkfs.ext3 does exist tst_supported_fs_types.c:90: TINFO: Kernel supports ext4 tst_supported_fs_types.c:55: TINFO: mkfs.ext4 does exist tst_supported_fs_types.c:90: TINFO: Kernel supports xfs tst_supported_fs_types.c:55: TINFO: mkfs.xfs does exist tst_supported_fs_types.c:90: TINFO: Kernel supports btrfs tst_supported_fs_types.c:55: TINFO: mkfs.btrfs does exist tst_supported_fs_types.c:90: TINFO: Kernel supports vfat tst_supported_fs_types.c:55: TINFO: mkfs.vfat does exist tst_supported_fs_types.c:157: TINFO: Skipping exfat as requested by the test tst_supported_fs_types.c:120: TINFO: FUSE does support ntfs tst_supported_fs_types.c:55: TINFO: mkfs.ntfs does exist tst_supported_fs_types.c:90: TINFO: Kernel supports tmpfs tst_supported_fs_types.c:42: TINFO: mkfs is not needed for tmpfs nfs05 1 TINFO: === Testing on ext2 === nfs05 1 TINFO: Formatting ext2 with opts='/dev/loop0' nfs05 1 TINFO: Mounting device: mount -t ext2 /dev/loop0 /tmp/LTP_nfs05.BXqm4Onw7z/mntpoint nfs05 1 TINFO: timeout per run is 0h 10m 0s nfs05 1 TINFO: mount.nfs: (linux nfs-utils 2.6.2) nfs05 1 TINFO: setup NFSv4, socket type tcp nfs05 1 TINFO: Mounting NFS: mount -v -t nfs -o proto=tcp,vers=4 10.0.0.2:/tmp/LTP_nfs05.BXqm4Onw7z/mntpoint/4/tcp /tmp/LTP_nfs05.BXqm4Onw7z/4/0 nfs05 1 TINFO: start nfs05_make_tree -d 10 -f 30 -t 8 tst_test.c:1558: TINFO: Timeout per run is 0h 11m 00s nfs05_make_tree.c:211: TPASS: 'make' successfully build and clean all targets Summary: passed 1 failed 0 broken 0 skipped 0 warnings 0 nfs05 1 TPASS: test finished nfs05 2 TINFO: Cleaning up testcase nfs05 2 TINFO: === Testing on ext3 === ... But later it fails for btrfs: nfs05 5 TINFO: === Testing on btrfs === nfs05 5 TINFO: Formatting btrfs with opts='/dev/loop0' nfs05 5 TINFO: Mounting device: mount -t btrfs /dev/loop0 /tmp/LTP_nfs05.BXqm4Onw7z/mntpoint nfs05 5 TINFO: timeout per run is 0h 10m 0s nfs05 5 TINFO: mount.nfs: (linux nfs-utils 2.6.2) nfs05 5 TINFO: setup NFSv4, socket type tcp nfs05 5 TINFO: Mounting NFS: mount -v -t nfs -o proto=tcp,vers=4 10.0.0.2:/tmp/LTP_nfs05.BXqm4Onw7z/mntpoint/4/tcp /tmp/LTP_nfs05.BXqm4Onw7z/4/0 nfs05 5 TINFO: start nfs05_make_tree -d 10 -f 30 -t 8 tst_test.c:1558: TINFO: Timeout per run is 0h 11m 00s /usr/lib64/gcc/x86_64-suse-linux/13/../../../../x86_64-suse-linux/bin/ld: 1021.2.5: final close failed: No space left on device collect2: error: ld returned 1 exit status make[2]: *** [makefile:7: 1021.2.5] Error 1 make[1]: *** [makefile:9: dir] Error 2 make: *** [makefile:9: dir] Error 2 tst_cmd.c:121: TBROK: 'make' exited with a non-zero code 2 at tst_cmd.c:121 Summary: passed 0 failed 0 broken 1 skipped 0 warnings 0 nfs05 5 TBROK: nfs05_make_tree -d 10 -f 30 -t 8 failed nfs05 5 TINFO: Cleaning up testcase /usr/lib64/gcc/x86_64-suse-linux/13/../../../../x86_64-suse-linux/bin/ld: 1015.2.9: final close failed: No space left on device I expect the problem is not with btrfs itself, but with somehow broken cleanup of the space. Kind regards, Petr