Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2344981pxb; Fri, 5 Feb 2021 15:52:21 -0800 (PST) X-Google-Smtp-Source: ABdhPJzKFJPllHZsd5kGqi/0pB4qUwCTFlK1sxr7J7PsY27vhboXUrXjxxOF+Fa8Y+MnSdRHA+dQ X-Received: by 2002:a17:906:25db:: with SMTP id n27mr6344314ejb.552.1612569141153; Fri, 05 Feb 2021 15:52:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612569141; cv=none; d=google.com; s=arc-20160816; b=q0VCYxQnM9vKPMSbTqJZ4byVjfwE47EEMvgWQ062zXd3c6hvenAfEGlWCGOB1hbMph 1uO5mYoVBo7oYPWkoaHvVkXPpIdCajRNOva5rsR6QajYmuXrCspNx4O21eaMW38g6RLg EwR7RuGfr/gSUc2DwdH+9CIxUnDt6gDlsZlkQcsLoRSrjawZ9dlb7eMOT/2uhqbzaAdI 75TgIzy/FJ92GI0qFaM4vXn+gzsSSQp1Y8m6JDfVQ4LJpmJnQLbMLnf3105YBAndqdc/ 2dhrk4gS6lscgJBeIlw9nM6dAPnd/o1v2Q2fplxvzml1EkcPNSNajqt/kNOrQzFcqnVS I9Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:mail-followup-to:reply-to:message-id :subject:cc:to:from:date; bh=ch+gm5649Bq+lJs4d/Ka1Z+mPfuWApPGLt8bshtra18=; b=qKad2b4/BTLjRqaMY4HiYbR6JAmFG7FMRcJKgo5qhcwIccwv3HjBCEIvUL4mFNjTtu iRpfMZSFcqNLBT3CHMtA5f2PFg8tZu9wxdRyhzVT+ekLMjnerITApfU/BCQj2rYPCr0s Trx76TERjiyFsG3YHxLGrmrp+nocmBR3IsFBTlLtHHYun46N5j7gu2qisfGeN3p99h7F IU7rC6xxij/rSFN94e11v2+VxxPj5Kv200fuXeSR8HOVRjoyuxWQYGzAXGnI7cqOyEMW f1GkfLIzB8nNqQiWEPEv4D8Ws/kVKmDkyf3LSrBgBLj/CnklJkUWja1ZecuMQ5na8qgd qKhg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w7si6575193edd.560.2021.02.05.15.51.56; Fri, 05 Feb 2021 15:52:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231451AbhBEXuq (ORCPT + 99 others); Fri, 5 Feb 2021 18:50:46 -0500 Received: from mx2.suse.de ([195.135.220.15]:42534 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232374AbhBEOQJ (ORCPT ); Fri, 5 Feb 2021 09:16:09 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 46DE7B126; Fri, 5 Feb 2021 15:36:34 +0000 (UTC) Received: by ds.suse.cz (Postfix, from userid 10065) id 8C5D4DA6E9; Fri, 5 Feb 2021 16:34:42 +0100 (CET) Date: Fri, 5 Feb 2021 16:34:41 +0100 From: David Sterba To: Ira Weiny Cc: dsterba@suse.cz, clm@fb.com, josef@toxicpanda.com, dsterba@suse.com, Miao Xie , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH] fs/btrfs: Fix raid6 qstripe kmap'ing Message-ID: <20210205153441.GK1993@twin.jikos.cz> Reply-To: dsterba@suse.cz Mail-Followup-To: dsterba@suse.cz, Ira Weiny , clm@fb.com, josef@toxicpanda.com, dsterba@suse.com, Miao Xie , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org References: <20210128061503.1496847-1-ira.weiny@intel.com> <20210203155648.GE1993@suse.cz> <20210204152608.GF1993@suse.cz> <20210205035236.GB5033@iweiny-DESK2.sc.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210205035236.GB5033@iweiny-DESK2.sc.intel.com> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 04, 2021 at 07:52:36PM -0800, Ira Weiny wrote: > On Thu, Feb 04, 2021 at 04:26:08PM +0100, David Sterba wrote: > > On Wed, Feb 03, 2021 at 04:56:48PM +0100, David Sterba wrote: > > > On Wed, Jan 27, 2021 at 10:15:03PM -0800, ira.weiny@intel.com wrote: > > > > From: Ira Weiny > > > Changelog is good, thanks. I've added stable tags as the missing unmap > > > is a potential problem. > > > > There are lots of tests faling, stack traces like below. I haven't seen > > anything obvious in the patch so that needs a closer look and for the > > time being I can't add the patch to for-next. > > :-( > > I think I may have been off by 1 on the raid6 kmap... > > Something like this should fix it... > > diff --git a/fs/btrfs/raid56.c b/fs/btrfs/raid56.c > index b8a39dad0f00..dbf52f1a379d 100644 > --- a/fs/btrfs/raid56.c > +++ b/fs/btrfs/raid56.c > @@ -2370,7 +2370,7 @@ static noinline void finish_parity_scrub(struct btrfs_raid_bio *rbio, > goto cleanup; > } > SetPageUptodate(q_page); > - pointers[rbio->real_stripes] = kmap(q_page); > + pointers[rbio->real_stripes - 1] = kmap(q_page); Oh right and tests agree it works. > } > > atomic_set(&rbio->error, 0); > > Let me roll a new version. No need to, I'll fold the fixup. Thanks.