Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp758080ybx; Wed, 30 Oct 2019 04:40:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqz/x9iIc3FmR3ROFYg4Vch9URpTrEtE45k9m7FBVAYP08yyAWmOiHVqGN4vsxe5bcKA32ji X-Received: by 2002:a50:ff12:: with SMTP id a18mr12894776edu.200.1572435602893; Wed, 30 Oct 2019 04:40:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572435602; cv=none; d=google.com; s=arc-20160816; b=FsTw17DkWYA9+QtZ6sHXaVjpfzfemUx098h5ROkNPkTTMtI1UwIcuFYmEsppa+EqHM owWtNSXlDHkPSCf6RaykHmb0u2XI9i/SxufouXdaZZpyVh/cOpfhvatxDR3Z+WNKgPeE roraozgXWBKQIHMfLaKi8zBg6laOS4uVzkxh4Y4v0wEYIAWGwrj8ZrCNpJxI0omSjX4k wvI7kgDzUKnSAzIhpp0oVyKS/3YO/wt7MNUxlAztYUD0CBEmtLJymcXxxGMW6VS/UJtu 4rhVySInVcjaY3Oa4O3xsUn6Bhyqy4/p2RlTeBjBe2rjnKiDzS54Z88/NwtbiQcoBBkI jg1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=SkOS9Kb52Whq2eQgEjJ2jDHEx1bcfB0QDUzxDvDEf1Y=; b=NzR+uo888hcqPONxEcd2Zjj6dP4PxBXY6PwA5WL9IGiIh02JWXpTGnijm0x2MK3T2M yq4WQy+vjV4SmGgFhZAki0RKTPiVgqqKFKCBTYUY/zjVDMDLshFYZBU9ksiM/jIa5vN1 nP3SsI1wUfKg6+G/LXJjkFAc6VDFq3/TtnYu/BE1QasUQ6hyFxCBSSTTNs6PJGPyrBX8 o7kWr91xadeGi6CrRZry4kno9LZ13VV49KAH9u2hr/VMrsX8SkcAkUpW+UKDWhlpxIT1 /b0DxrHYELe+AnDZBfBVcFnCUbrw/4pJXZ3zPohDhUiIghvxgspNGhHlulbMYbjAP+FF VOAg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 17si980729ejt.403.2019.10.30.04.39.30; Wed, 30 Oct 2019 04:40:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726102AbfJ3LjV (ORCPT + 99 others); Wed, 30 Oct 2019 07:39:21 -0400 Received: from mx2.suse.de ([195.135.220.15]:54354 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726065AbfJ3LjU (ORCPT ); Wed, 30 Oct 2019 07:39:20 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 25AE7B116; Wed, 30 Oct 2019 11:39:19 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 98DD51E485C; Wed, 30 Oct 2019 12:39:18 +0100 (CET) Date: Wed, 30 Oct 2019 12:39:18 +0100 From: Jan Kara To: Matthew Bobrowski Cc: "Theodore Y. Ts'o" , jack@suse.cz, adilger.kernel@dilger.ca, linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org, hch@infradead.org, david@fromorbit.com, darrick.wong@oracle.com Subject: Re: [PATCH v6 00/11] ext4: port direct I/O to iomap infrastructure Message-ID: <20191030113918.GG28525@quack2.suse.cz> References: <20191029233159.GA8537@mit.edu> <20191029233401.GB8537@mit.edu> <20191030020022.GA7392@bobrowski> <20191030112652.GF28525@quack2.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191030112652.GF28525@quack2.suse.cz> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Wed 30-10-19 12:26:52, Jan Kara wrote: > On Wed 30-10-19 13:00:24, Matthew Bobrowski wrote: > > On Tue, Oct 29, 2019 at 07:34:01PM -0400, Theodore Y. Ts'o wrote: > > > On Tue, Oct 29, 2019 at 07:31:59PM -0400, Theodore Y. Ts'o wrote: > > > > Hi Matthew, it looks like there are a number of problems with this > > > > patch series when using the ext3 backwards compatibility mode (e.g., > > > > no extents enabled). > > > > > > > > So the following configurations are failing: > > > > > > > > kvm-xfstests -c ext3 generic/091 generic/240 generic/263 > > > > This is one mode that I didn't get around to testing. Let me take a > > look at the above and get back to you. > > If I should guess, I'd start looking at what that -ENOTBLK fallback from > direct IO ends up doing as we seem to be hitting that path... Hum, actually no. This write from fsx output: 24( 24 mod 256): WRITE 0x23000 thru 0x285ff (0x5600 bytes) should have allocated blocks to where the failed write was going (0x24000). But still I'd expect some interaction between how buffered writes to holes interact with following direct IO writes... One of the subtle differences we have introduced with iomap conversion is that the old code in __generic_file_write_iter() did fsync & invalidate written range after buffered write fallback and we don't seem to do that now (probably should be fixed regardless of relation to this bug). Honza -- Jan Kara SUSE Labs, CR