Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp388770pxk; Thu, 24 Sep 2020 08:03:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxfKAkv39C5vFkp/NCw9FEH4mYMwFBz7cshiejQAKTT2o6WU6vyNDg4jZqUzwXWBO+GbLMq X-Received: by 2002:a05:6402:17da:: with SMTP id s26mr299150edy.221.1600959784894; Thu, 24 Sep 2020 08:03:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600959784; cv=none; d=google.com; s=arc-20160816; b=xJUNDmO5clCaMjMA47wG2zmIqGZziwa6LNbfK6A7P4C8DIQaVI25EsnvZg9M8lLJio RJDTR8F+HQxfcuRKn+8fxqh7/wGTbbAvEqAXHfJEPP33cxldY89jcPauclOloUVG1wtY QevN3pR5HnATfVJ7BA+8oZnyDPsxiMV52TbnXKuOdWNyA+zktpPeYnAR4bQBFZxd6LmE Cp7TSAUSwNIhH2fWrn1U2DzyvyMAcguS97z4ujrpGg+t+x1ygq7/1Oq2Qmx6DnPaqOMQ AbPXMXLHcRDmlLY9zLq/LEbLvSJq3SKwSqqjPSl1xPYJaBbqvG9sUdkkod1bwRQawkqd AmQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=8BXNa4DJSPmzflnTk6bLiiNu2D83qNN0iJcJs8VZ7lg=; b=LRJul1hkeUc3OrX5SIS8PldS/C9MzYXCAi1bpLOwWUCj5YGECiDq90dvK9uSuu52FT FPfNfQS9IsAIHKu0nWctLe++3et95OLYAK56OeatinQD6PROJtp9Pp9RayqWh0z1ekK0 N17wLsHIY9pdGZ9hmX0FLGDyXki6IuojMlx2VGREnQFFrBsdY3gIVCDZh2ehVeE8LbI7 8kA+DupJWN9FBiwCAjAqQMgF3hsv0chmMh6TIob3ZF+z8eQCeDOfqJ2fy8qeY7O81lBv USHov36kiB5PsjGvFkT+mHmTTHHgAZmHPsxMzKWn5v86ZOMIib+q3Ktxg768LALAf5q5 sL0w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b19si2316382edy.519.2020.09.24.08.02.40; Thu, 24 Sep 2020 08:03:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728490AbgIXO66 (ORCPT + 99 others); Thu, 24 Sep 2020 10:58:58 -0400 Received: from mx2.suse.de ([195.135.220.15]:52322 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728478AbgIXO65 (ORCPT ); Thu, 24 Sep 2020 10:58:57 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 5A17EB052; Thu, 24 Sep 2020 14:58:56 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 071071E12DD; Thu, 24 Sep 2020 16:58:56 +0200 (CEST) Date: Thu, 24 Sep 2020 16:58:56 +0200 From: Jan Kara To: Hao Li Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, david@fromorbit.com, ira.weiny@intel.com, linux-xfs@vger.kernel.org, viro@zeniv.linux.org.uk, y-goto@fujitsu.com Subject: Re: [PATCH v2] fs: Kill DCACHE_DONTCACHE dentry even if DCACHE_REFERENCED is set Message-ID: <20200924145856.GB3361@quack2.suse.cz> References: <20200924055958.825515-1-lihao2018.fnst@cn.fujitsu.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200924055958.825515-1-lihao2018.fnst@cn.fujitsu.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 24-09-20 13:59:58, Hao Li wrote: > If DCACHE_REFERENCED is set, fast_dput() will return true, and then > retain_dentry() have no chance to check DCACHE_DONTCACHE. As a result, > the dentry won't be killed and the corresponding inode can't be evicted. > In the following example, the DAX policy can't take effects unless we > do a drop_caches manually. > > # DCACHE_LRU_LIST will be set > echo abcdefg > test.txt > > # DCACHE_REFERENCED will be set and DCACHE_DONTCACHE can't do anything > xfs_io -c 'chattr +x' test.txt > > # Drop caches to make DAX changing take effects > echo 2 > /proc/sys/vm/drop_caches > > What this patch does is preventing fast_dput() from returning true if > DCACHE_DONTCACHE is set. Then retain_dentry() will detect the > DCACHE_DONTCACHE and will return false. As a result, the dentry will be > killed and the inode will be evicted. In this way, if we change per-file > DAX policy, it will take effects automatically after this file is closed > by all processes. > > I also add some comments to make the code more clear. > > Signed-off-by: Hao Li The patch looks good to me. You can add: Reviewed-by: Jan Kara Honza > --- > v1 is split into two standalone patch as discussed in [1], and the first > patch has been reviewed in [2]. This is the second patch. > > [1]: https://lore.kernel.org/linux-fsdevel/20200831003407.GE12096@dread.disaster.area/ > [2]: https://lore.kernel.org/linux-fsdevel/20200906214002.GI12131@dread.disaster.area/ > > fs/dcache.c | 9 ++++++++- > 1 file changed, 8 insertions(+), 1 deletion(-) > > diff --git a/fs/dcache.c b/fs/dcache.c > index ea0485861d93..97e81a844a96 100644 > --- a/fs/dcache.c > +++ b/fs/dcache.c > @@ -793,10 +793,17 @@ static inline bool fast_dput(struct dentry *dentry) > * a reference to the dentry and change that, but > * our work is done - we can leave the dentry > * around with a zero refcount. > + * > + * Nevertheless, there are two cases that we should kill > + * the dentry anyway. > + * 1. free disconnected dentries as soon as their refcount > + * reached zero. > + * 2. free dentries if they should not be cached. > */ > smp_rmb(); > d_flags = READ_ONCE(dentry->d_flags); > - d_flags &= DCACHE_REFERENCED | DCACHE_LRU_LIST | DCACHE_DISCONNECTED; > + d_flags &= DCACHE_REFERENCED | DCACHE_LRU_LIST | > + DCACHE_DISCONNECTED | DCACHE_DONTCACHE; > > /* Nothing to do? Dropping the reference was all we needed? */ > if (d_flags == (DCACHE_REFERENCED | DCACHE_LRU_LIST) && !d_unhashed(dentry)) > -- > 2.28.0 > > > -- Jan Kara SUSE Labs, CR