Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp822986imu; Fri, 11 Jan 2019 09:38:31 -0800 (PST) X-Google-Smtp-Source: ALg8bN7dhu3gZpgQECglVfHiii66Dg+3/J2MWciHYxltGOzZuZPrIRuk/1TmK+fkx/aqJCwVnT1I X-Received: by 2002:a62:5793:: with SMTP id i19mr15541164pfj.49.1547228311329; Fri, 11 Jan 2019 09:38:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547228311; cv=none; d=google.com; s=arc-20160816; b=lhaPWEejVGt9iYG8//QxNQoNhwph9nYcYfF9Smm0Se/vfr1SSWB+0HXPd8/5NBB5+F lMri+LsKt0D+hWb1OPwfPrsqqWFGXJHAXcs86n90EbQH3qzTtPhsu2YTNp9Mth1CmpLd KHe6dU75JL3YAvC6XoxbKExiQJt6KjniFIKixmg3kc813xLgzQUq94LZBpcADcfZtxhS L5/lNZD7+JLD44TeaIIK0Tz9cTEoFpzb/zJ220Q2O2vuBfA0hEy6uy+VC/Ek8qLdq/55 RC3rGJK9X1/cjqILt/VZ+4vfrNI9IyGdy4rSZsvE1wzLiBKFBdtEMGNjj1/CAbxmgDdh hUDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0JRp+aF6EqubWsDpzvb3BOtgfKzEY4H+0BAuOJOEHsc=; b=E+RED6VmZmH5Z7IQdAKJR2XSyZeSTAdzf528clka8+zYD6pY1U4GG03iCdxMPMGMHx Zb1uwbGfeU8Y3/XFTOGDT/5YPM6QfnyvvpwQMmWBgcCxNoPNzf1VWyRd/cAdwecxewHa a5MM+NdThhBdhUDn+CICbZ7tuVv5qIQ1jZGIGKlJ3UFaES46SXy76ZqK88LkclkWgl+a aXE5LdBDmAFmjmJ8X7EX5iznhYEybFNvaSD6ga5oAo6+Eby84m0Y5KJhk4dtAWQPj10Z Cx8YZv6pDXnXuZJPAbp16W9/gmGHCnOuZ04+dAkibOnnzz3ZdFJ/w+spYCX4b2pT74Ql lDSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CxnwrPSN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a3si23688367pld.252.2019.01.11.09.38.15; Fri, 11 Jan 2019 09:38:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CxnwrPSN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731366AbfAKOTB (ORCPT + 99 others); Fri, 11 Jan 2019 09:19:01 -0500 Received: from mail.kernel.org ([198.145.29.99]:35426 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731153AbfAKOSz (ORCPT ); Fri, 11 Jan 2019 09:18:55 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D67C42177B; Fri, 11 Jan 2019 14:18:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1547216335; bh=+PIoLzQ0S276/AIWUMqM+2exYd3Fq/BhHt6KOhSdjVo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CxnwrPSNgm5AIk90KPMo+UG4WCJAcFYicXM/vwPHuOJyzeUI9sILmM1sqgyyXtIAd SOo1izkc/p9XH+Nhc6DkZEGrUKdnvhlfdrz3nijOJVhxjvkSzrCngnS/H3VBmwuV9p MF/zQox952TysQ0h2ncLYbsyl3Wuob3zieGHstgU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Theodore Tso , stable@kernel.org Subject: [PATCH 4.4 45/88] ext4: force inode writes when nfsd calls commit_metadata() Date: Fri, 11 Jan 2019 15:08:14 +0100 Message-Id: <20190111131052.829386396@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190111131045.137499039@linuxfoundation.org> References: <20190111131045.137499039@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Theodore Ts'o commit fde872682e175743e0c3ef939c89e3c6008a1529 upstream. Some time back, nfsd switched from calling vfs_fsync() to using a new commit_metadata() hook in export_operations(). If the file system did not provide a commit_metadata() hook, it fell back to using sync_inode_metadata(). Unfortunately doesn't work on all file systems. In particular, it doesn't work on ext4 due to how the inode gets journalled --- the VFS writeback code will not always call ext4_write_inode(). So we need to provide our own ext4_nfs_commit_metdata() method which calls ext4_write_inode() directly. Google-Bug-Id: 121195940 Signed-off-by: Theodore Ts'o Cc: stable@kernel.org Signed-off-by: Greg Kroah-Hartman --- fs/ext4/super.c | 11 +++++++++++ include/trace/events/ext4.h | 20 ++++++++++++++++++++ 2 files changed, 31 insertions(+) --- a/fs/ext4/super.c +++ b/fs/ext4/super.c @@ -1049,6 +1049,16 @@ static struct dentry *ext4_fh_to_parent( ext4_nfs_get_inode); } +static int ext4_nfs_commit_metadata(struct inode *inode) +{ + struct writeback_control wbc = { + .sync_mode = WB_SYNC_ALL + }; + + trace_ext4_nfs_commit_metadata(inode); + return ext4_write_inode(inode, &wbc); +} + /* * Try to release metadata pages (indirect blocks, directories) which are * mapped via the block device. Since these pages could have journal heads @@ -1143,6 +1153,7 @@ static const struct export_operations ex .fh_to_dentry = ext4_fh_to_dentry, .fh_to_parent = ext4_fh_to_parent, .get_parent = ext4_get_parent, + .commit_metadata = ext4_nfs_commit_metadata, }; enum { --- a/include/trace/events/ext4.h +++ b/include/trace/events/ext4.h @@ -223,6 +223,26 @@ TRACE_EVENT(ext4_drop_inode, (unsigned long) __entry->ino, __entry->drop) ); +TRACE_EVENT(ext4_nfs_commit_metadata, + TP_PROTO(struct inode *inode), + + TP_ARGS(inode), + + TP_STRUCT__entry( + __field( dev_t, dev ) + __field( ino_t, ino ) + ), + + TP_fast_assign( + __entry->dev = inode->i_sb->s_dev; + __entry->ino = inode->i_ino; + ), + + TP_printk("dev %d,%d ino %lu", + MAJOR(__entry->dev), MINOR(__entry->dev), + (unsigned long) __entry->ino) +); + TRACE_EVENT(ext4_mark_inode_dirty, TP_PROTO(struct inode *inode, unsigned long IP),