From patchwork Tue Jul 2 19:17:18 2013 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Josef Bacik X-Patchwork-Id: 2814311 Return-Path: X-Original-To: patchwork-linux-btrfs@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.19.201]) by patchwork2.web.kernel.org (Postfix) with ESMTP id D742BBF4A1 for ; Tue, 2 Jul 2013 19:17:29 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 0191620140 for ; Tue, 2 Jul 2013 19:17:29 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 319D0200EC for ; Tue, 2 Jul 2013 19:17:26 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753064Ab3GBTRW (ORCPT ); Tue, 2 Jul 2013 15:17:22 -0400 Received: from dkim1.fusionio.com ([66.114.96.53]:57682 "EHLO dkim1.fusionio.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751498Ab3GBTRV (ORCPT ); Tue, 2 Jul 2013 15:17:21 -0400 Received: from mx2.fusionio.com (unknown [10.101.1.160]) by dkim1.fusionio.com (Postfix) with ESMTP id 20C527C0692 for ; Tue, 2 Jul 2013 13:17:21 -0600 (MDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fusionio.com; s=default; t=1372792641; bh=7PT/rrNOPbKNczllYizQ6jAK6Ig/zjW7s6JIU1bGlLk=; h=From:To:Subject:Date; b=mQwsm1z4iO+dMIDhTUejFH5cOb1jGRLG904amlKbcetj/of4Gj4QTbOSKrPRXllSW ZxjZoMPTmuPBaeV8Mr7tloz34/aJpEPeF4D5Hd9dueNX9hAi2KqqglGWv3nb+73+wB n3l+PXpUiVOkqDQjUM+fz2JD1ID6J56TCf4XWCO0= X-ASG-Debug-ID: 1372792640-0421b5021fb7100001-6jHSXT Received: from CAS2.int.fusionio.com (cas2.int.fusionio.com [10.101.1.41]) by mx2.fusionio.com with ESMTP id H5KKjFFj3AxHD2C0 (version=TLSv1 cipher=AES128-SHA bits=128 verify=NO); Tue, 02 Jul 2013 13:17:20 -0600 (MDT) X-Barracuda-Envelope-From: JBacik@fusionio.com Received: from localhost (10.101.1.160) by mail.fusionio.com (10.101.1.41) with Microsoft SMTP Server (TLS) id 14.3.123.3; Tue, 2 Jul 2013 13:17:20 -0600 From: Josef Bacik To: , Subject: [PATCH] xfstests: make the scratch device for generic/256 slightly larger Date: Tue, 2 Jul 2013 15:17:18 -0400 X-ASG-Orig-Subj: [PATCH] xfstests: make the scratch device for generic/256 slightly larger Message-ID: <1372792638-23957-1-git-send-email-jbacik@fusionio.com> X-Mailer: git-send-email 1.7.7.6 MIME-Version: 1.0 X-Originating-IP: [10.101.1.160] X-Barracuda-Connect: cas2.int.fusionio.com[10.101.1.41] X-Barracuda-Start-Time: 1372792640 X-Barracuda-Encrypted: AES128-SHA X-Barracuda-URL: http://10.101.1.181:8000/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at fusionio.com X-Barracuda-Spam-Score: 0.60 X-Barracuda-Spam-Status: No, SCORE=0.60 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests=MARKETING_SUBJECT X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.2.135619 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.60 MARKETING_SUBJECT Subject contains popular marketing words Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP This is similar to a previous fix I sent. 1 gig makes us do mixed file block groups for btrfs, so these enospc tests will usually fail because we don't have space for metadata, which is the case for this test. So jack the size up to 1.5gig so that btrfs can do its normal thing and pass the test. Thanks, Signed-off-by: Josef Bacik Reviewed-by: Ben Myers --- tests/generic/256 | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/tests/generic/256 b/tests/generic/256 index 4a53da8..cfe7237 100755 --- a/tests/generic/256 +++ b/tests/generic/256 @@ -165,7 +165,7 @@ _test_full_fs_punch() # Make a small file system to fill umount $SCRATCH_DEV &> /dev/null -_scratch_mkfs_sized $(( 1024 * 1024 * 1024 )) &> /dev/null +_scratch_mkfs_sized $(( 1536 * 1024 * 1024 )) &> /dev/null _scratch_mount # Test must be able to write files with non-root permissions chmod 777 $SCRATCH_MNT