Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp1032459pxb; Wed, 6 Apr 2022 07:09:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw1KLgVWsgZeWkrXycidLSN2R5X0VWXxHtMQcq9D4n81EDoHbhZSkZmYRmf7mIJ3jXERCBa X-Received: by 2002:a17:902:ce04:b0:156:3be:8a86 with SMTP id k4-20020a170902ce0400b0015603be8a86mr9064643plg.152.1649254148909; Wed, 06 Apr 2022 07:09:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649254148; cv=none; d=google.com; s=arc-20160816; b=LoiJ2T1BNh+9gG+2uN+6I6ngaO7OAJfyHnQhw2ESGoYhtnkAMaa5yxqKXuuyXbpxhy /Z5imJKx7Wbw52We+zlDiXVevYND9aftBlMrqZhU/M3DxL+UMXXMpkeuM+/IgAf9Ztib 5XKcI46BAnSKERozFzaSW10oOLYWpzddXucQvzM96XANKFOc3EF4ES72E66EeZq/XOvY 3SprQpxw/EtsMdpWDgpr3aE0dXncDr02QZsqoMCoewdU7ICLgh9Fd6fwRRKZzAhxumbh V+t5tH8MR/0MiwV8MmwsThCknJ6jxMoEAt3m8AN1Lus+VzPAYolwwZfPAJhF+IsXU8Jc UIhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=huf2PKqN+sIoLvexLuqlbsgpQJkarDnuScbIKuVkilk=; b=CA3qMtWsZVk6dCKgxpMPkyRiV40x6w2oywz6LjISB3reTwPWZlG4lHXIjnEhkGLTnj i9exmpSqsOUmytr9o/OxB6LNtlMJanRi3ZeWiOYvUv2L8kr4ov1/i6EzxB3MiSkAJ0K1 zzfjAoXmJOnH+URXM566Bsrc72X90tWFOpcSzSWzAZqkrUHt2NbvFvNoY1r0IzBLAUyR NhnT5byuOzLlNQoF7ddo33dSKd4KoqC1wjyLekrE+e+Og4HCWzPe9iOrRbXGhosJCCbS 7kQbM+1BsCD9XOKZ+vHCKh+ewScxTtC+W/0KGTbm/2l/9SoBUgkaNTpDYaP9yMvRPSgE lr/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Rhn4qTtM; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id e22-20020a62ee16000000b004fa3a8e007fsi12968867pfi.310.2022.04.06.07.09.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 07:09:08 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Rhn4qTtM; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A1905203A6A; Wed, 6 Apr 2022 04:56:10 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234741AbiDFHHw (ORCPT + 99 others); Wed, 6 Apr 2022 03:07:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35332 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232673AbiDFGZU (ORCPT ); Wed, 6 Apr 2022 02:25:20 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id BE7AA4A51D0 for ; Tue, 5 Apr 2022 22:24:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1649222682; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=huf2PKqN+sIoLvexLuqlbsgpQJkarDnuScbIKuVkilk=; b=Rhn4qTtML6bPwFh++s6QBJnOOGNrUKEFoq75dm++v4qxQ6hBPv4TaTU2oJCipvnHOMLc1o KoQCsSym9sa5YbEizWuCUR7d4ommWCeBQ2FT+fs0smeV2g+ggQSmrUi3HJGp4gOP2AJpU0 /hXebR8tjcnCqfkQmhBeRbSwAu+QMlw= Received: from mail-pj1-f71.google.com (mail-pj1-f71.google.com [209.85.216.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-60-PKEESI0ZMsySipjdBIilMQ-1; Wed, 06 Apr 2022 01:24:41 -0400 X-MC-Unique: PKEESI0ZMsySipjdBIilMQ-1 Received: by mail-pj1-f71.google.com with SMTP id oj16-20020a17090b4d9000b001c7552b7546so3092363pjb.8 for ; Tue, 05 Apr 2022 22:24:41 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=huf2PKqN+sIoLvexLuqlbsgpQJkarDnuScbIKuVkilk=; b=QDe8hdDl1QALipedVS4kLGWi8LcGZq1E6cn4EMe+S8GIt3Oaiucf2L/L+xPsgCva2e +2sNkSp4W0vlAIkHmpMqLlCjDKtkIeFXS7HbMmlDQxXeTe924fLsTQS0E1osXp7qY2XP bSHLci6njGbi5DW7muWin4j/Tp9+pAW0KNyAkDPAVWgoraDVfGz0NVuAfnE/icbzR9t+ AYM4oeNoofMv8v1yOWGDvEvinvca9NbQLphPKRYsR63CEklBdzi1hLUfbtxbY4aNwU1d jTxWOVBSs9u1cTrGhQjhdLEWGWBkK8tA8lhmyGe9DWtuMGuL3GKjWjVWhyoHtmRsKMcO h8OA== X-Gm-Message-State: AOAM5308wJKL6Bv50t/tqT+dvCDZtOSMtkdyTsJK5genzewq8vFZ/t7c 0JGJiQ9wzOlW3DRxJ65/JhDOw373GF8hX1mf1NyXmOW6TI/ZUBgiBEKh6ssRXw6zrwB8sU6Q2jl CSP8w/DZRwUvYtAy5zlVaKc3pQAj7TNHg3py4q9RDan8sDGaxdjP7qFzcjz9elfnfa+IxY9Xc2w == X-Received: by 2002:a63:6a88:0:b0:398:54fb:85ba with SMTP id f130-20020a636a88000000b0039854fb85bamr5779114pgc.88.1649222680384; Tue, 05 Apr 2022 22:24:40 -0700 (PDT) X-Received: by 2002:a63:6a88:0:b0:398:54fb:85ba with SMTP id f130-20020a636a88000000b0039854fb85bamr5779095pgc.88.1649222680048; Tue, 05 Apr 2022 22:24:40 -0700 (PDT) Received: from [10.72.13.31] ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id w22-20020a17090aea1600b001ca91b7542esm3873061pjy.51.2022.04.05.22.24.36 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 05 Apr 2022 22:24:39 -0700 (PDT) Subject: Re: [PATCH v2] ceph: invalidate pages when doing DIO in encrypted inodes To: =?UTF-8?Q?Lu=c3=ads_Henriques?= , Jeff Layton , Ilya Dryomov Cc: ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org References: <20220401133243.1075-1-lhenriques@suse.de> From: Xiubo Li Message-ID: <5146f7a8-94c1-a7aa-db2d-d3ae98c5b83a@redhat.com> Date: Wed, 6 Apr 2022 13:24:33 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: <20220401133243.1075-1-lhenriques@suse.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,RDNS_NONE,SPF_HELO_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/1/22 9:32 PM, Luís Henriques wrote: > When doing DIO on an encrypted node, we need to invalidate the page cache in > the range being written to, otherwise the cache will include invalid data. > > Signed-off-by: Luís Henriques > --- > fs/ceph/file.c | 11 ++++++++++- > 1 file changed, 10 insertions(+), 1 deletion(-) > > Changes since v1: > - Replaced truncate_inode_pages_range() by invalidate_inode_pages2_range > - Call fscache_invalidate with FSCACHE_INVAL_DIO_WRITE if we're doing DIO > > Note: I'm not really sure this last change is required, it doesn't really > affect generic/647 result, but seems to be the most correct. > > diff --git a/fs/ceph/file.c b/fs/ceph/file.c > index 5072570c2203..b2743c342305 100644 > --- a/fs/ceph/file.c > +++ b/fs/ceph/file.c > @@ -1605,7 +1605,7 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, > if (ret < 0) > return ret; > > - ceph_fscache_invalidate(inode, false); > + ceph_fscache_invalidate(inode, (iocb->ki_flags & IOCB_DIRECT)); > ret = invalidate_inode_pages2_range(inode->i_mapping, > pos >> PAGE_SHIFT, > (pos + count - 1) >> PAGE_SHIFT); > @@ -1895,6 +1895,15 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, > req->r_inode = inode; > req->r_mtime = mtime; > > + if (IS_ENCRYPTED(inode) && (iocb->ki_flags & IOCB_DIRECT)) { > + ret = invalidate_inode_pages2_range( > + inode->i_mapping, > + write_pos >> PAGE_SHIFT, > + (write_pos + write_len - 1) >> PAGE_SHIFT); > + if (ret < 0) > + dout("invalidate_inode_pages2_range returned %d\n", ret); > + } Shouldn't we fail it if the 'invalidate_inode_pages2_range()' fails here ? -- Xiubo > + > /* Set up the assertion */ > if (rmw) { > /* >