public inbox for linux-ext4@vger.kernel.org
 help / color / mirror / Atom feed
* 4.1-rc2 kvm-xfstests regressions for ext3 test config
@ 2015-05-11 21:37 Eric Whitney
  2015-05-12  9:20 ` Lukáš Czerner
  0 siblings, 1 reply; 2+ messages in thread
From: Eric Whitney @ 2015-05-11 21:37 UTC (permalink / raw)
  To: linux-ext4; +Cc: tytso, dccitaliano

I've got six new test failures in the ext3 test configuration when
running a 4.1-rc2 kernel on x86_64 with the latest version of
kvm-xfstests.

The new failures include generic/075, generic/091, generic/112,
generic/127, generic/231, and generic/263.  All also fail on ARM
(Pandaboard) when running a 4.1-rc2 kernel on bare metal.

Reverting an -rc2 patch corrects all these failures:
ext4: move check under lock scope to close a race (280227a75b56)

All the failed tests use fsx, all fail when attempting to perform a
COLLAPSE_RANGE, and fsx uses this statement to determine whether a
particular fallocate mode is supported (and then doesn't use it if not):

	if (fallocate(fd, mode, 0, 1) && errno == EOPNOTSUPP)

In -rc1, ext4_fallocate()/extents.c returns EOPNOTSUPP, and in -rc2,
EINVAL.  What's happened is that we no longer immediately fail a
COLLAPSE_RANGE request for a block-mapped file with EOPNOTSUPP.  Instead,
we now first check to see if the COLLAPSE_RANGE request is cluster-aligned
and sized in ext4_collapse_range()/extents.c, and return EINVAL if not.
(There's still a check for block-mapped files, but it's applied later in
ext4_collapse_range().)

I think we'd want to return EOPNOTSUPP first in this case.

Eric




^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2015-05-12  9:20 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-05-11 21:37 4.1-rc2 kvm-xfstests regressions for ext3 test config Eric Whitney
2015-05-12  9:20 ` Lukáš Czerner

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox