Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4121183ybx; Mon, 4 Nov 2019 08:10:36 -0800 (PST) X-Google-Smtp-Source: APXvYqyHO4k85CfT95+3WhsKQWBbq1jTsWDxPausYDFpYHcmWKYIavXBMTRF6Mxpym/7/TY1JcMO X-Received: by 2002:a17:907:2070:: with SMTP id qp16mr6934053ejb.115.1572883836177; Mon, 04 Nov 2019 08:10:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572883836; cv=none; d=google.com; s=arc-20160816; b=dOdvnic6zLB4TZn9mHm5N8mYR1QBNNWFTmCyxTykRlXNj+FDru8ZbdAdwQEwrr6qqQ ujUshfJx2Vu7S3fIwkrGd0t+NmCU4tscsnLOcuB+tgHYdI3vfQ5o8sD/aKZ+BEM44Sxt RiVZUhJZQd/W6uM7/ymQweJ+i1A/Nb1Q1VGOhazfVkMmM1l7BNp5Mt2KjsXobvEaLStl r0tCf+9ryT6n12tnszaL8fxX9b0hV/6XaN8k+9yNOGu/NM2BUd7udcBSA9FBY/Chfn1c BAkwde32C9tch8nMUiLAsAqTTmvnYD7BF2f0HxrPbBO0NID/WxJg1n/KfGDxkZnrT40C dZsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=R23hzz3yGS4GuEDwlstRnDYBRY8GJalqe+5l93k3XTU=; b=DWwrQnB7NDf/g/pgwHa3x2ddxkZjReNq098wciXehNY5UWybkYVujwtNmp9aY2vLWQ bCWR+LtfrHmsEtwPUqbrpDQrvTuY5WIAa7bkVb1IIZvOmS/6xNcbcOyPKNJ8e0DB8pJ2 vVaMLWcvWnEsAnRIxHR6cfLefh82HlVoJOwL58m8/vFPiVuB2q3VDunQxxZP19y2iWNw puGr05vZV5PN1XMTAoQIgwrBFgZtqhk7eroomvyHFCc2CrXv2aH127JlDYwmc09GgTn2 4zjka18KIbFCm0027aNsnfmWj5joXIK/Q5g0GZlHMnV3WhC4KQC7eb1Qd3qdJB23jG09 0MuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q3si5421659ejx.346.2019.11.04.08.10.06; Mon, 04 Nov 2019 08:10:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728287AbfKDQKA (ORCPT + 99 others); Mon, 4 Nov 2019 11:10:00 -0500 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:54168 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728012AbfKDQKA (ORCPT ); Mon, 4 Nov 2019 11:10:00 -0500 Received: from callcc.thunk.org (ip-12-2-52-196.nyc.us.northamericancoax.com [196.52.2.12]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id xA4G8QEQ010632 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 4 Nov 2019 11:08:27 -0500 Received: by callcc.thunk.org (Postfix, from userid 15806) id 05B81420311; Mon, 4 Nov 2019 11:08:23 -0500 (EST) Date: Mon, 4 Nov 2019 11:08:23 -0500 From: "Theodore Y. Ts'o" To: Matthew Bobrowski Cc: Ritesh Harjani , jack@suse.cz, linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [RFC 0/5] Ext4: Add support for blocksize < pagesize for dioread_nolock Message-ID: <20191104160823.GI28764@mit.edu> References: <20191016073711.4141-1-riteshh@linux.ibm.com> <20191023232614.GB1124@mit.edu> <20191029071925.60AABA405B@b06wcsmtp001.portsmouth.uk.ibm.com> <20191103191606.GB8037@mit.edu> <20191104101623.GB27115@bobrowski> <20191104103759.4085C4C046@d06av22.portsmouth.uk.ibm.com> <20191104104913.GC27115@bobrowski> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191104104913.GC27115@bobrowski> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, Nov 04, 2019 at 09:49:14PM +1100, Matthew Bobrowski wrote: > > It sure may be giving a merge conflict (due to io_end structure). > > But this dioread_nolock series was not dependent over iomap series. > > Uh ha. Well, there's been a chunk of code injected into > ext4_end_io_dio() here and by me removing it, I'm not entirely sure > what the downstream effects will be for this specific change... Yeah, that was probably my failure to do the merge correctly; I'm hoping that Ritesh will be able to fix that up. If not we can throw an "experimental" config to enable dioread_nolock on subpage blocksizes, just to warn people that under some extreme workloads, they might end up corrupting their allocation bitmap, which then might lead to data loss. I suspect it would actually work fine for most users; but out of paranoia, if we can't figure out the generic/270 failure before the merge window, we can just make dioread_nolock_1k experimental for now. - Ted