Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp125753ybm; Tue, 26 May 2020 12:24:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz0FKFq6qFhlluPB3mT3PgyPHd4/v6NGLRiX4y4k9ejqBTSZQE57GA2xp+mqXI7sTQZharp X-Received: by 2002:a05:6402:14d5:: with SMTP id f21mr21633545edx.327.1590521096655; Tue, 26 May 2020 12:24:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590521096; cv=none; d=google.com; s=arc-20160816; b=X2fIr3zZwY+OAI5kSrRyuPTk7jPhh5Hdu2TuAOlZS5X/sI+au3E0kjAIP8aGdRNq3c LweG2kUZ+sGopW9J8kbjyNVaa9jKB+UWOUV2/FGI7+/399l6tbQWVuEWET3SAdsCfw9C G3pwq4Ps7OzwGK5b5dBPJLx+Q4UxympN2rE/tB3MR0lLDbMPH9N8AIl/XKfm/sMGnQD4 lemiubWVGp9WuDLKiZ5cQlEgG5b5Oh2wgzrCeXhQN+D7kroKo26QAN2IS5M5vBpPvlym nGZTEVGBKMJL0Rp6ClVGqPtIBkb01Q1mEowiCuPGrQeyiqpWfIY7gThP0jxzVT7YQYQG +9vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=2c/LcpSKUHhYivWTNJbWHRFxgshHTi8IKbtgskRaPp8=; b=Ri9TMw2QIlTCeP0rnY2kX8ykdJ8yQt4AFm7pHCNoeFTdfd6nNUb9wtJaym5W1p2ObR 8EVgbRhB2QlaqPQOKe0zzhlxKqvyxB0M1xdzc+xmz2jmlSM/l8K4OrMqkCfFMltTxXi8 GRh1ACAFPfFtz5wAGLPG+yhagxIWDNGHFG4ODIC+t/MOBpx0tkaP28E6q1mcH98sb3x0 fGKVVwor6BLaIOEnuHP3OnWYWeE7ejAgAHf6L+JvKU5orBM50fJhl+KDkHJrZfAdaP7Q q5UsxnyEEipPCdaFQcIpFQ8PkG6LEfBqsEYKrDDjF6gsJfo6K/jFc93WtqGvEJFVibSm IE9A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AlB5ZTOx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b34si451860edf.411.2020.05.26.12.24.33; Tue, 26 May 2020 12:24:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AlB5ZTOx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404473AbgEZTVz (ORCPT + 99 others); Tue, 26 May 2020 15:21:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:40404 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392034AbgEZTLG (ORCPT ); Tue, 26 May 2020 15:11:06 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0A367208A7; Tue, 26 May 2020 19:11:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590520265; bh=L0QoRAgWtQseVlwB82qHXXUrftjn7bHptGI3PhND3X4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AlB5ZTOxHiD5FL7+6QVddGEz94eUhBZyo7WzpjMHR38Y5IAeT4h6EysNxtmMePSar HzdmScxifGwB/eAeudyCubR1KfMXnY6l6EbY2H4jeUOTSxRS3n2P25h3va0Df/B50G ahTBd16esq3gF+G0QwQbOZiiu7sX4WZcNaOxn+Tg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christoph Hellwig , Richard Weinberger , Sasha Levin Subject: [PATCH 5.6 012/126] ubifs: remove broken lazytime support Date: Tue, 26 May 2020 20:52:29 +0200 Message-Id: <20200526183938.597411064@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183937.471379031@linuxfoundation.org> References: <20200526183937.471379031@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christoph Hellwig [ Upstream commit ecf84096a526f2632ee85c32a3d05de3fa60ce80 ] When "ubifs: introduce UBIFS_ATIME_SUPPORT to ubifs" introduced atime support to ubifs, it also added lazytime support. As far as I can tell the lazytime support is terminally broken, as it causes mark_inode_dirty_sync to be called from __writeback_single_inode, which will then trigger the locking assert in ubifs_dirty_inode. Just remove the broken lazytime support for now, it can be added back later, especially as some infrastructure changes should make that easier soon. Fixes: 8c1c5f263833 ("ubifs: introduce UBIFS_ATIME_SUPPORT to ubifs") Signed-off-by: Christoph Hellwig Signed-off-by: Richard Weinberger Signed-off-by: Sasha Levin --- fs/ubifs/file.c | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/fs/ubifs/file.c b/fs/ubifs/file.c index 743928efffc1..49fe062ce45e 100644 --- a/fs/ubifs/file.c +++ b/fs/ubifs/file.c @@ -1375,7 +1375,6 @@ int ubifs_update_time(struct inode *inode, struct timespec64 *time, struct ubifs_info *c = inode->i_sb->s_fs_info; struct ubifs_budget_req req = { .dirtied_ino = 1, .dirtied_ino_d = ALIGN(ui->data_len, 8) }; - int iflags = I_DIRTY_TIME; int err, release; if (!IS_ENABLED(CONFIG_UBIFS_ATIME_SUPPORT)) @@ -1393,11 +1392,8 @@ int ubifs_update_time(struct inode *inode, struct timespec64 *time, if (flags & S_MTIME) inode->i_mtime = *time; - if (!(inode->i_sb->s_flags & SB_LAZYTIME)) - iflags |= I_DIRTY_SYNC; - release = ui->dirty; - __mark_inode_dirty(inode, iflags); + __mark_inode_dirty(inode, I_DIRTY_SYNC); mutex_unlock(&ui->ui_mutex); if (release) ubifs_release_budget(c, &req); -- 2.25.1