Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp5197919imm; Wed, 12 Sep 2018 02:32:36 -0700 (PDT) X-Google-Smtp-Source: ANB0VdaFFF2wEi8HOnMZAb02qffEYPssTDR8q+4mSdkWmdZZ34U7tjig6/KRBcSR/jEbtCWqxT05 X-Received: by 2002:a63:c60:: with SMTP id 32-v6mr1168172pgm.155.1536744756296; Wed, 12 Sep 2018 02:32:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536744756; cv=none; d=google.com; s=arc-20160816; b=z6q298v22H+3R0dbq4VIWPGfaYNl/lBX8F1e3n+WNs6wDJs1zo2czne099gy6IIQnF f5u0yCkXtXLrIIRtto2EmaJP+SY44mBzxWfG2g/EGQRqn3tfYSvC9MGC5iFf3kNc0e0W n7CWiZVeMDH2zKwIbUvY40KU+RB+WScXeRxab1s3CdV833GYPKZSu3CvnHyzSNApJbYO wiVLF4jqXbNjZH/8gegPbz+c8TaZ6um8mbVMQMLdSRrCQhAQomBL96c6ZLUaOd60ivi9 4D6vBBMfS2h3sbDTi4OL0+KNaRpNxm2LI6I6o63c+h6RFvd0wVjMi+UzuI0tSZXNNcS0 VnDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=TQjT2CM4CJWNAMUOv0ppcC1U7CqdXxlE+i/t4K4STys=; b=cLsD4qzrb6m3LqJ1kfLlCCDWevUy72vdLVaH6npDyfNEHn+hZLQr2mkhM/0n5M2l+z 7Of0bqMpf4hzhntT/wXwpMFUBsGuKlVC+Fe8cziVLPe9nPD0LL5D/Z6PcpAaC+JsMoti EoOqyvoAQlmoYFCfMxnHj4/A1ut7hQer1G8ZhpkKOuu36L1zHhUKSq49q6S5VKjmQrIT ywNuuXCRDIoqGzDu5mf810z54Bxj2Gz7y6tXvHEIVE+KGWEVcQtbU3XThiB+/N23/DV6 4elSeG+FD6Bpak+mP2GLjewCta+CTsPb5o3pZGtXVMpTHC/mxjuEOYggH0WDsLoiblb0 NFUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u10-v6si436661plu.506.2018.09.12.02.32.20; Wed, 12 Sep 2018 02:32:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728010AbeILOfZ (ORCPT + 99 others); Wed, 12 Sep 2018 10:35:25 -0400 Received: from mx2.suse.de ([195.135.220.15]:53098 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727616AbeILOfZ (ORCPT ); Wed, 12 Sep 2018 10:35:25 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 9770FAF3B; Wed, 12 Sep 2018 09:31:41 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id E1B9B1E3613; Wed, 12 Sep 2018 11:31:40 +0200 (CEST) Date: Wed, 12 Sep 2018 11:31:40 +0200 From: Jan Kara To: Dan Williams Cc: Toshi Kani , Jan Kara , Theodore Ts'o , Andreas Dilger , linux-ext4 , linux-nvdimm , Linux Kernel Mailing List Subject: Re: [PATCH 2/2] ext4, dax: set ext4_dax_aops for dax files Message-ID: <20180912093140.GB7782@quack2.suse.cz> References: <20180911154246.6844-1-toshi.kani@hpe.com> <20180911154246.6844-3-toshi.kani@hpe.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 11-09-18 11:15:18, Dan Williams wrote: > On Tue, Sep 11, 2018 at 8:42 AM, Toshi Kani wrote: > > Sync syscall to an existing DAX file needs to flush processor cache, > > but it does not currently. This is because 'ext4_da_aops' is set to > > address_space_operations of existing DAX files, instead of 'ext4_dax_aops', > > since S_DAX flag is set after ext4_set_aops() in the open path. > > > > New file > > -------- > > lookup_open > > ext4_create > > __ext4_new_inode > > ext4_set_inode_flags // Set S_DAX flag > > ext4_set_aops // Set aops to ext4_dax_aops > > > > Existing file > > ------------- > > lookup_open > > ext4_lookup > > ext4_iget > > ext4_set_aops // Set aops to ext4_da_aops > > ext4_set_inode_flags // Set S_DAX flag > > > > Change ext4_iget() to call ext4_set_inode_flags() before ext4_set_aops(). > > > > Fixes: 5f0663bb4a64f588f0a2dd6d1be68d40f9af0086 > > Same format nit: > > Fixes: 5f0663bb4a64 ("ext4, dax: introduce ext4_dax_aops") > Cc: > > > > Signed-off-by: Toshi Kani > > Cc: Jan Kara > > Cc: Dan Williams > > Cc: "Theodore Ts'o" > > Cc: Andreas Dilger > > --- > > fs/ext4/inode.c | 3 ++- > > 1 file changed, 2 insertions(+), 1 deletion(-) > > > > diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c > > index 775cd9b4af55..93cbbb859c40 100644 > > --- a/fs/ext4/inode.c > > +++ b/fs/ext4/inode.c > > @@ -4998,6 +4998,8 @@ struct inode *ext4_iget(struct super_block *sb, unsigned long ino) > > if (ret) > > goto bad_inode; > > > > + ext4_set_inode_flags(inode); > > + > > Hmm, does this have unintended behavior changes? > > I notice that there are some checks for flags "IS_APPEND(inode) || > IS_IMMUTABLE(inode)" *before* the call to ext4_set_inode_flags(). I > didn't look too much deeper at whether those checks are bogus, but it > would seem safer to do something like this for a lower risk fix. > > Thoughts? Well, safer but it would leave the landmine around for others to hit. Toshi, please move the ext4_set_inode_flags() call to be just after the assignment: ei->i_flags = le32_to_cpu(raw_inode->i_flags); in ext4_iget(). That way people won't introduce checks for i_flags that can never hit... And yes, it fixes also other bugs (mostly in sanity checks AFAICS) than the DAX issue. Honza > > diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c > index d0dd585add6a..1e9ab445c777 100644 > --- a/fs/ext4/inode.c > +++ b/fs/ext4/inode.c > @@ -4999,7 +4999,6 @@ struct inode *ext4_iget(struct super_block *sb, > unsigned long ino) > if (S_ISREG(inode->i_mode)) { > inode->i_op = &ext4_file_inode_operations; > inode->i_fop = &ext4_file_operations; > - ext4_set_aops(inode); > } else if (S_ISDIR(inode->i_mode)) { > inode->i_op = &ext4_dir_inode_operations; > inode->i_fop = &ext4_dir_operations; > @@ -5042,6 +5041,12 @@ struct inode *ext4_iget(struct super_block *sb, > unsigned long ino) > } > brelse(iloc.bh); > ext4_set_inode_flags(inode); > + /* > + * Now that we have determined whether DAX is enabled, set the > + * proper address spaces operations > + */ > + if (S_ISREG(inode->i_mode)) > + ext4_set_aops(inode); > > unlock_new_inode(inode); > return inode; -- Jan Kara SUSE Labs, CR