Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp2848397pxu; Mon, 7 Dec 2020 18:15:46 -0800 (PST) X-Google-Smtp-Source: ABdhPJyiUSepYinBjG9jPzvZ52cFpscrB0aFVeZLFZn5+k49XZREQA0Tc3kaoqOIkCNw/GMPZPy/ X-Received: by 2002:a17:907:2122:: with SMTP id qo2mr19206410ejb.539.1607393746041; Mon, 07 Dec 2020 18:15:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607393746; cv=none; d=google.com; s=arc-20160816; b=Q66vgCZZA7EyRZzC6Nde2jxViEcGVD3itiYVAmuCT/nM1oMwjwcwyM8kk62vPckJZM r0uvFPlAkIcVE/WYPOdCjCP5N9Hgbc42+r90y7jZvDMN5ZB91hpefuZvZp2DQVVW4EzM YJOeyr+OZ5JZcKGwahw1tWRooBTWQKtYMc6Fv1U4hAkd2PhHM5SJMVlw9RyTGLN8KMPl HxX8pvXyVACuNySFq8UshtdxrFEIOCyKRM7uG6s8S2X7rdR91uhxK65v+cWjHSTMxd9w dKGbK9BcJbHTGeXXn4463UixcIoUGJd9ABpurmQ4Q231hpRoBctvEt0lW3cE+qe34rOF W17Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=mIn5JHEeV0dpM2MiqXa4KRXqGAYFy/0GuoRmbaFU09o=; b=wPLq0t5cT+Z/JjLOupR8olnU7J6kBBJsKeLZRJl+1RYqWtEH5zFoxNwK3eHt0Uz5rN 6ZavfCnjqr3siVKjYg4c+yVVGME3/G5imK/6ufFEKSGYEEFVTWN8UEAZDbfLQdYBa+bC qeiBRQkKefUHkkROO4rCth25sw50rt3TBahJr50QWB1X6aRSP58gCJ2AkMtpAWlnm658 ApMqRLcjiwQ6e5Vg06emMaUXlX5rP+fzxJTQHY4uUNpVrpA+lFb5+YMGT3UvW+/NikTF MRJ5BL6IQ2EJ/doFptgzx6j65hZFwA90PN/HF0yL7RoyL3wRxMLYN0Oy2zPdVqLvhdh5 TYCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hr1si8071709ejc.474.2020.12.07.18.15.08; Mon, 07 Dec 2020 18:15:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727705AbgLHCLw (ORCPT + 99 others); Mon, 7 Dec 2020 21:11:52 -0500 Received: from mail.cn.fujitsu.com ([183.91.158.132]:1340 "EHLO heian.cn.fujitsu.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726830AbgLHCLw (ORCPT ); Mon, 7 Dec 2020 21:11:52 -0500 X-IronPort-AV: E=Sophos;i="5.78,401,1599494400"; d="scan'208";a="102156329" Received: from unknown (HELO cn.fujitsu.com) ([10.167.33.5]) by heian.cn.fujitsu.com with ESMTP; 08 Dec 2020 10:10:57 +0800 Received: from G08CNEXMBPEKD04.g08.fujitsu.local (unknown [10.167.33.201]) by cn.fujitsu.com (Postfix) with ESMTP id D5FD24CE5CF8; Tue, 8 Dec 2020 10:10:51 +0800 (CST) Received: from G08CNEXCHPEKD06.g08.fujitsu.local (10.167.33.205) by G08CNEXMBPEKD04.g08.fujitsu.local (10.167.33.201) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 8 Dec 2020 10:10:50 +0800 Received: from localhost.localdomain (10.167.225.206) by G08CNEXCHPEKD06.g08.fujitsu.local (10.167.33.209) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Tue, 8 Dec 2020 10:10:50 +0800 From: Hao Li To: , CC: , , , , Subject: [PATCH] fs: Kill DCACHE_DONTCACHE dentry even if DCACHE_REFERENCED is set Date: Tue, 8 Dec 2020 10:10:50 +0800 Message-ID: <20201208021050.3846-1-lihao2018.fnst@cn.fujitsu.com> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-yoursite-MailScanner-ID: D5FD24CE5CF8.A07CA X-yoursite-MailScanner: Found to be clean X-yoursite-MailScanner-From: lihao2018.fnst@cn.fujitsu.com X-Spam-Status: No Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If DCACHE_REFERENCED is set, fast_dput() will return true, and then retain_dentry() have no chance to check DCACHE_DONTCACHE. As a result, the dentry won't be killed and the corresponding inode can't be evicted. In the following example, the DAX policy can't take effects unless we do a drop_caches manually. # DCACHE_LRU_LIST will be set echo abcdefg > test.txt # DCACHE_REFERENCED will be set and DCACHE_DONTCACHE can't do anything xfs_io -c 'chattr +x' test.txt # Drop caches to make DAX changing take effects echo 2 > /proc/sys/vm/drop_caches What this patch does is preventing fast_dput() from returning true if DCACHE_DONTCACHE is set. Then retain_dentry() will detect the DCACHE_DONTCACHE and will return false. As a result, the dentry will be killed and the inode will be evicted. In this way, if we change per-file DAX policy, it will take effects automatically after this file is closed by all processes. I also add some comments to make the code more clear. Signed-off-by: Hao Li Reviewed-by: Jan Kara Reviewed-by: Ira Weiny --- This patch may have been forgotten. Original patch: https://lore.kernel.org/linux-fsdevel/20200924055958.825515-1-lihao2018.fnst@cn.fujitsu.com/ fs/dcache.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/fs/dcache.c b/fs/dcache.c index ea0485861d93..97e81a844a96 100644 --- a/fs/dcache.c +++ b/fs/dcache.c @@ -793,10 +793,17 @@ static inline bool fast_dput(struct dentry *dentry) * a reference to the dentry and change that, but * our work is done - we can leave the dentry * around with a zero refcount. + * + * Nevertheless, there are two cases that we should kill + * the dentry anyway. + * 1. free disconnected dentries as soon as their refcount + * reached zero. + * 2. free dentries if they should not be cached. */ smp_rmb(); d_flags = READ_ONCE(dentry->d_flags); - d_flags &= DCACHE_REFERENCED | DCACHE_LRU_LIST | DCACHE_DISCONNECTED; + d_flags &= DCACHE_REFERENCED | DCACHE_LRU_LIST | + DCACHE_DISCONNECTED | DCACHE_DONTCACHE; /* Nothing to do? Dropping the reference was all we needed? */ if (d_flags == (DCACHE_REFERENCED | DCACHE_LRU_LIST) && !d_unhashed(dentry)) -- 2.28.0