Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3510405ybz; Mon, 27 Apr 2020 17:23:38 -0700 (PDT) X-Google-Smtp-Source: APiQypKOvga4yrnGxAIbw2ii22vZDJeaa55c5yVO1ggwXftGDYi/JWp34Zh7Z6IlmPsHztQHFQE/ X-Received: by 2002:a17:907:2168:: with SMTP id rl8mr21231071ejb.360.1588033418110; Mon, 27 Apr 2020 17:23:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588033418; cv=none; d=google.com; s=arc-20160816; b=ntnlSrnCn2AvWi7kS4BhiCBqqZAkSGfAM8p2BPnvpIsVrhr50/LkEgfBFjHJDVYfSg 16OGeIzrd+G7AGt2IoLK+bXMCepmzsU6EM1pVm2Qv12Ld0T/1jYOWsaMs+tKxGDI5F0R gf9lzds8LHggFRcykc6G6rxx9KCM+Q6k96VHr+Lm9XOvII4uKRhUF5+0OFtr5I1iXYgY J7Cx/3wDzPLkL+IwGNmcfR7dPC6IV/DsYP7zk+gtBy4o/IbkzVlbd1zYlco1IZxon7tS fD9/HcT7Cq+SwWbNPSpxejtzI7PS2aSZ5moGwYt9xzVQSjhp3wd99vGnCblvAvOJ4ZXu cGyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=FxuuzNzgrPuIs/7yLX4lMLyngyD5OyPQjusw6xrcrlA=; b=WmG6PI/TFVrooqvKfV87s2US1AZe9O3edkshux30rw0MWKlXvRM8ITG57Xcv5Y9XeY jVHQCe/EakN5pHQP3QnvnRVULTF8xpjTbD+imsPhkOiCivixb10FmxaE/FhVhMW10JjW 9FAnLdRmMYjhtfwLdwdYlmh4ECzj7cFIy0cOA2XIgYiS8GvOnQ+uFEV9cMtCl78nvhuy Ylxvq3AvFXz0FksvT3UWV+uNfMVcGfRDMzpEiTQiq/h2YpEAIQLYLKA6A8anBaGDPtnV yfOryH9DefHcrhqOzmb+Oc4IWzjaXuwJiJYkozu8kFXcZ5E2axXfKn2ngKZEVdhrVhPm QSPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g16si608949edr.382.2020.04.27.17.23.14; Mon, 27 Apr 2020 17:23:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726469AbgD1AVv (ORCPT + 99 others); Mon, 27 Apr 2020 20:21:51 -0400 Received: from mga06.intel.com ([134.134.136.31]:25937 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726437AbgD1AVt (ORCPT ); Mon, 27 Apr 2020 20:21:49 -0400 IronPort-SDR: lxeA3nddhOyj3TpVgPZrZADMcByzzPZANcMjVYlpKaCQEbtIpnfXQYfFjfF5NKuRxMoeokIFWb T33oMnu9BRmg== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Apr 2020 17:21:48 -0700 IronPort-SDR: BbR0PGu6WVS4hJkrnhrV8J087o4SM0ZVukT2QA2I6ye/QNUrtFChOb0DDwKEL4jVba1zBGtV9D TtZ9PYNWwsFQ== X-IronPort-AV: E=Sophos;i="5.73,325,1583222400"; d="scan'208";a="247559446" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by fmsmga007-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Apr 2020 17:21:48 -0700 From: ira.weiny@intel.com To: linux-kernel@vger.kernel.org, linux-xfs@vger.kernel.org, "Darrick J. Wong" Cc: Ira Weiny , Dave Chinner , Jan Kara , Al Viro , Dan Williams , Dave Chinner , Christoph Hellwig , "Theodore Y. Ts'o" , Jeff Moyer , linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-api@vger.kernel.org Subject: [PATCH V11 03/11] fs/stat: Define DAX statx attribute Date: Mon, 27 Apr 2020 17:21:34 -0700 Message-Id: <20200428002142.404144-4-ira.weiny@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200428002142.404144-1-ira.weiny@intel.com> References: <20200428002142.404144-1-ira.weiny@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ira Weiny In order for users to determine if a file is currently operating in DAX state (effective DAX). Define a statx attribute value and set that attribute if the effective DAX flag is set. To go along with this we propose the following addition to the statx man page: STATX_ATTR_DAX The file is in the DAX (cpu direct access) state. DAX state attempts to minimize software cache effects for both I/O and memory mappings of this file. It requires a file system which has been configured to support DAX. DAX generally assumes all accesses are via cpu load / store instructions which can minimize overhead for small accesses, but may adversely affect cpu utilization for large transfers. File I/O is done directly to/from user-space buffers and memory mapped I/O may be performed with direct memory mappings that bypass kernel page cache. While the DAX property tends to result in data being transferred synchronously, it does not give the same guarantees of O_SYNC where data and the necessary metadata are transferred together. A DAX file may support being mapped with the MAP_SYNC flag, which enables a program to use CPU cache flush instructions to persist CPU store operations without an explicit fsync(2). See mmap(2) for more information. Reviewed-by: Dave Chinner Reviewed-by: Jan Kara Reviewed-by: Darrick J. Wong Signed-off-by: Ira Weiny --- Changes from V2: Update man page text with comments from Darrick, Jan, Dan, and Dave. --- fs/stat.c | 3 +++ include/uapi/linux/stat.h | 1 + 2 files changed, 4 insertions(+) diff --git a/fs/stat.c b/fs/stat.c index 030008796479..894699c74dde 100644 --- a/fs/stat.c +++ b/fs/stat.c @@ -79,6 +79,9 @@ int vfs_getattr_nosec(const struct path *path, struct kstat *stat, if (IS_AUTOMOUNT(inode)) stat->attributes |= STATX_ATTR_AUTOMOUNT; + if (IS_DAX(inode)) + stat->attributes |= STATX_ATTR_DAX; + if (inode->i_op->getattr) return inode->i_op->getattr(path, stat, request_mask, query_flags); diff --git a/include/uapi/linux/stat.h b/include/uapi/linux/stat.h index ad80a5c885d5..e5f9d5517f6b 100644 --- a/include/uapi/linux/stat.h +++ b/include/uapi/linux/stat.h @@ -169,6 +169,7 @@ struct statx { #define STATX_ATTR_ENCRYPTED 0x00000800 /* [I] File requires key to decrypt in fs */ #define STATX_ATTR_AUTOMOUNT 0x00001000 /* Dir: Automount trigger */ #define STATX_ATTR_VERITY 0x00100000 /* [I] Verity protected file */ +#define STATX_ATTR_DAX 0x00002000 /* [I] File is DAX */ #endif /* _UAPI_LINUX_STAT_H */ -- 2.25.1