Received: by 10.223.176.5 with SMTP id f5csp641371wra; Tue, 30 Jan 2018 17:03:15 -0800 (PST) X-Google-Smtp-Source: AH8x226gOmi79SRnGe6h846P+sq85EWzyTGGSbKprLBhZ4MMsgli9oljNECtekqWeZ1V2N1kU3VP X-Received: by 2002:a17:902:6b82:: with SMTP id p2-v6mr27763539plk.30.1517360595005; Tue, 30 Jan 2018 17:03:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517360594; cv=none; d=google.com; s=arc-20160816; b=O6eqhsbAUG7NfyVKmsFKjIlBR31tbFDlhucrFzO/jsNAIfA/QumLVyOxE5Te7qZuXu TJXyk7ILRTAhwOHvkBIT5Qnlbi02mvkb/OAo3SDHix4TLomWvVDBW1NWGf8HDvg9Rj9E 8Zbr9ppltiB94CR0wZPNCDK6yy1DXOHlStXuiiSBOVzN/l9Hn9WScafs3KjeWVuX6sYX iH7eziNi63Bs9YrFcg3eAKdZS+kovzrylcpEK5o8OX4BiU9wZ27FQBRYnarjI/LOSgTS Y5D2Hr5CdGaRc3XJ3IVw7YNLXsa8dCi6+M8wv56TVM1Gc5H2lOdqpWZ1ndNEDZ4bOQ2m epWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dmarc-filter:arc-authentication-results; bh=oB4U7GL+n5gO0gtG8gM1tkPSib5wPKECpLq9L8WBHxQ=; b=PglVzOO2CM7m4FxV40w0ad+ORmZztBLyAzrkV6IwEPOFIHE/Fb2d80CvGlkLIPf/Xp sUQPoDZ+hCAPISs2WaBvgAI8Z+s6wkLIE7U5KZicgoXOWXumeqBd9D3cBjVBCgpxwA+7 72e0uoInpYnjL32MthNjmDJNgWUKk8Ibcrmqnv48Xdbufi0Pn3A/dp9tflovvq0Z3rDH RToAmWXGoYTNUKYP/r3ifpDhNCRGMFnOUqOVf5IyBmi/wt6BPH4opLJwO9OreSJLKFtL UiRlp6mH5LpkeYFRp0Kp/57XFfgXywTddjcL0WRjH6Cig3+yi5oiB2ztGpOrGobN/5Ue 6dmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s8-v6si12609189plp.33.2018.01.30.17.03.00; Tue, 30 Jan 2018 17:03:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754371AbeAaAZi (ORCPT + 99 others); Tue, 30 Jan 2018 19:25:38 -0500 Received: from mail.kernel.org ([198.145.29.99]:51074 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754355AbeAaAZg (ORCPT ); Tue, 30 Jan 2018 19:25:36 -0500 Received: from localhost (unknown [104.132.0.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1E1902173F; Wed, 31 Jan 2018 00:25:36 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 1E1902173F Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=jaegeuk@kernel.org Date: Tue, 30 Jan 2018 16:25:35 -0800 From: Jaegeuk Kim To: Stephen Rothwell Cc: Linus Torvalds , Linux F2FS Dev Mailing List , Linux Kernel Mailing List , Chris Mason , Josef Bacik , Yufen Yu , Tejun Heo Subject: Re: [GIT PULL] f2fs update for 4.16-rc1 Message-ID: <20180131002535.GD65489@jaegeuk-macbookpro.roam.corp.google.com> References: <20180130223220.GB65489@jaegeuk-macbookpro.roam.corp.google.com> <20180131095446.443670dc@canb.auug.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180131095446.443670dc@canb.auug.org.au> User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/31, Stephen Rothwell wrote: > Hi all, > > On Tue, 30 Jan 2018 14:32:20 -0800 Jaegeuk Kim wrote: > > > > Could you please consider the below pull request? > > > > Thanks, > > > > The following changes since commit ace52288edf0cb5e7a52b681f057f86224c49c27: > > > > Merge tag 'for-linus-20171218' of git://git.infradead.org/linux-mtd (2017-12-18 16:18:01 -0800) > > > > are available in the Git repository at: > > > > git://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs.git tags/f2fs-for-4.16-rc1 > > > > for you to fetch changes up to 1c1d35df71104c76a4a2e25862926f22c334c9d6: > > > > f2fs: support inode creation time (2018-01-25 14:10:39 -0800) > > This has an interesting conflict with the btrfs tree: > > ----------------------------------------------------------------------- > After merging the f2fs tree, today's linux-next build (x86_64 > allmodconfig) failed like this: > > /home/sfr/next/next/fs/f2fs/super.c: In function 'f2fs_fill_super': > /home/sfr/next/next/fs/f2fs/super.c:2563:18: error: 'SB_I_CGROUPWB' undeclared (first use in this function); did you mean 'S_CGROUPWB'? > sb->s_iflags |= SB_I_CGROUPWB; > ^~~~~~~~~~~~~ > S_CGROUPWB > > Caused by commit > > 578c647879f7 ("f2fs: implement cgroup writeback support") > > interacting with commit > > 34934189a3dd ("cgroup, writeback: replace SB_I_CGROUPWB with per-inode S_CGROUPWB" > > from the btrfs tree. > > I have reverted the f2fs tree commit for today, but a better resolution > would be appreciated. > ----------------------------------------------------------------------- > > I have seen no response to the above email and have been reverting that > commit since Jan 18. I think this can be addressed by: diff --git a/fs/f2fs/inode.c b/fs/f2fs/inode.c index 89c838bfb067..c743b73976d0 100644 --- a/fs/f2fs/inode.c +++ b/fs/f2fs/inode.c @@ -48,9 +48,10 @@ void f2fs_set_inode_flags(struct inode *inode) new_fl |= S_DIRSYNC; if (f2fs_encrypted_inode(inode)) new_fl |= S_ENCRYPTED; + new_fl |= S_CGROUPWB; inode_set_flags(inode, new_fl, S_SYNC|S_APPEND|S_IMMUTABLE|S_NOATIME|S_DIRSYNC| - S_ENCRYPTED); + S_ENCRYPTED|S_CGROUPWB); } static void __get_inode_rdev(struct inode *inode, struct f2fs_inode *ri) diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c index 8173ae688814..ebcd58476fc7 100644 --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -2560,7 +2560,6 @@ static int f2fs_fill_super(struct super_block *sb, void *data, int silent) sb->s_flags = (sb->s_flags & ~SB_POSIXACL) | (test_opt(sbi, POSIX_ACL) ? SB_POSIXACL : 0); memcpy(&sb->s_uuid, raw_super->uuid, sizeof(raw_super->uuid)); - sb->s_iflags |= SB_I_CGROUPWB; /* init f2fs-specific super block info */ sbi->valid_super_block = valid_super_block;