Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp1119175pxb; Wed, 6 Apr 2022 09:09:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxzvH9ZuUvmJwBKwueUZOQ+/rOH29/0RA/r/EFMEXq0U+VNUbA1VAO41GOzwQGreg8/U9Xl X-Received: by 2002:a05:6638:339e:b0:323:697b:9404 with SMTP id h30-20020a056638339e00b00323697b9404mr4620666jav.260.1649261356612; Wed, 06 Apr 2022 09:09:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649261356; cv=none; d=google.com; s=arc-20160816; b=Iekw/lcWE25ovNu0Es/fm5arY2NKsg3yldfod3CPI8/RV0JvY1PPX/wUMN3wXOOb6k 1sDJQFIRqJ7KLzLC5oWrHoOfi7NsAFDM9sDuonlbdd1KyvXaaRwglwSIaVVgiEgwP9Hn jNtkeZsCTUo4JIuU6k/06Gc2aTJvHMrsHVSWmeCBqLTUQa/kV3jaqeABgEQ7ElCQfwtl kE9/AjJWy/D+KZ1G507S7jGBjGotJ5GE4fZOX3xfxq5urdWJkr+O+mP4AIM2vIWOo/WL OpuzX4saa2vBCLkKXo8y4Ibhmyz0/MArCCeVFKkjX17gzbY6EPW21pHuED8rE1Ln3Zsp iciw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=CLEUfzP7V1U1D4TPRCoAdSvmcyEwuTYxfJcwrVTrZLs=; b=aztljFC2JrGr9F9DQZSTn5hO0jEmerPjw22R+hJCuILT8hunNKu6LGdDY2VOEix/8D Kg7a/5zk/hlYmSwDwuY5A/y9n2L2y5rRh4Kyoh9DqQgpV+24xKYwMAGn/LsaSZvNnz6G 9JdBC/sfaJbSJFpathf3q/0IXSICYW7qouRps2S3t1YXVelB4XQpUOMyKLxC4sQ8ZGG2 2OkXebX/S4t8lo8ieHtkXrTJZqnOR3Bqtwsrm5yjosybuNtJltkjHFVCuuOFcNl8eM9C Poywj1JUDopohYydWJX3yIBAOekTToavRlOQUebFiXiE3vos38B1Y8O/6AbOleqCpJ5g zq0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=cXIhCfoa; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id h10-20020a926c0a000000b002c82bce17c9si8099499ilc.45.2022.04.06.09.09.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 09:09:16 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=cXIhCfoa; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 7A1634C1696; Wed, 6 Apr 2022 07:32:07 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235010AbiDFOd5 (ORCPT + 99 others); Wed, 6 Apr 2022 10:33:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57902 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235060AbiDFOdm (ORCPT ); Wed, 6 Apr 2022 10:33:42 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 42FF95A6290 for ; Wed, 6 Apr 2022 03:57:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1649242632; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=CLEUfzP7V1U1D4TPRCoAdSvmcyEwuTYxfJcwrVTrZLs=; b=cXIhCfoavPk3yTtu2aIpLVQRywwxFt4m8cSnn3yM8oezvJyniRTEbiabaFy/7XjqwwQssg vhiq+SPGMljwt+0icESQ+EjZ647A3Tb2aTho6v9+VkkVA2qYhZh/S5WuCiioa/gt7MItDw S5c/K5JrvIp7UAVI7Mtnsz903lbXmrw= Received: from mail-pj1-f70.google.com (mail-pj1-f70.google.com [209.85.216.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-664-IGO3JEaXOn6q2LYR5X7fqg-1; Wed, 06 Apr 2022 06:57:12 -0400 X-MC-Unique: IGO3JEaXOn6q2LYR5X7fqg-1 Received: by mail-pj1-f70.google.com with SMTP id w3-20020a17090ac98300b001b8b914e91aso1499238pjt.0 for ; Wed, 06 Apr 2022 03:57:11 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=CLEUfzP7V1U1D4TPRCoAdSvmcyEwuTYxfJcwrVTrZLs=; b=xhcplPGrgIpr5Y8WsJCortfcGLF+OcciCjGxZHTqdRG4C2dje/mH9KTVIpR9lNZckH iykSqsuGBnFKRSH8LeSlOyemxtXZwTkk5yjDrOdN5hnSOiVjMGIrBQqFQLnYMq+zakcG mYHe2bOmstjITUPRjZrQ/Le6PNbZoZPBOymorhziwHTzLvTfPEIUdA6vb7adD3ggESUw meAwn96fPm81ritGDGUcRELPb3iBI/mmIAHTnVfEduXhw07Bl7nKLSE2OiA1EXigFFo4 +qG0RnxB2WRl7wdlEWXha4ZWBb8VEZA3Frj2U9ZCJFiSuxWo72ve1EgHU+qkm0pZFc7X MLCg== X-Gm-Message-State: AOAM5306fLYRtDJ1PJkGEI7P/BdXOeaqZ8rhA6iOQ2q06Tpoiirpmh4P 5/P+5cgx33/NXvfLN3GhDHYTac9Q+Yr+C4Kp05uMP3+ZAQfmZAHrHxqYrZILZusS3PcvSaBgCb1 0xo72M5Ga/O/c+IXgsw5lwGXDnnsk6hyLklXD6nWcpZNHwQ1p8rF21XFNALH9/PvFGEr/qWlzeg == X-Received: by 2002:a17:902:c94c:b0:154:45c6:fbea with SMTP id i12-20020a170902c94c00b0015445c6fbeamr8070320pla.117.1649242630617; Wed, 06 Apr 2022 03:57:10 -0700 (PDT) X-Received: by 2002:a17:902:c94c:b0:154:45c6:fbea with SMTP id i12-20020a170902c94c00b0015445c6fbeamr8070295pla.117.1649242630261; Wed, 06 Apr 2022 03:57:10 -0700 (PDT) Received: from [10.72.13.31] ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id y2-20020a056a00190200b004fa865d1fd3sm18859324pfi.86.2022.04.06.03.57.05 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 06 Apr 2022 03:57:09 -0700 (PDT) Subject: Re: [PATCH v2] ceph: invalidate pages when doing DIO in encrypted inodes To: =?UTF-8?Q?Lu=c3=ads_Henriques?= Cc: Jeff Layton , Ilya Dryomov , ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org References: <20220401133243.1075-1-lhenriques@suse.de> <5146f7a8-94c1-a7aa-db2d-d3ae98c5b83a@redhat.com> <87fsmqa3jj.fsf@brahms.olymp> From: Xiubo Li Message-ID: <6d8df20e-d99a-0f80-f3e1-3c661351759c@redhat.com> Date: Wed, 6 Apr 2022 18:57:02 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: <87fsmqa3jj.fsf@brahms.olymp> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,RDNS_NONE,SPF_HELO_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/6/22 6:50 PM, Luís Henriques wrote: > Xiubo Li writes: > >> On 4/1/22 9:32 PM, Luís Henriques wrote: >>> When doing DIO on an encrypted node, we need to invalidate the page cache in >>> the range being written to, otherwise the cache will include invalid data. >>> >>> Signed-off-by: Luís Henriques >>> --- >>> fs/ceph/file.c | 11 ++++++++++- >>> 1 file changed, 10 insertions(+), 1 deletion(-) >>> >>> Changes since v1: >>> - Replaced truncate_inode_pages_range() by invalidate_inode_pages2_range >>> - Call fscache_invalidate with FSCACHE_INVAL_DIO_WRITE if we're doing DIO >>> >>> Note: I'm not really sure this last change is required, it doesn't really >>> affect generic/647 result, but seems to be the most correct. >>> >>> diff --git a/fs/ceph/file.c b/fs/ceph/file.c >>> index 5072570c2203..b2743c342305 100644 >>> --- a/fs/ceph/file.c >>> +++ b/fs/ceph/file.c >>> @@ -1605,7 +1605,7 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, >>> if (ret < 0) >>> return ret; >>> - ceph_fscache_invalidate(inode, false); >>> + ceph_fscache_invalidate(inode, (iocb->ki_flags & IOCB_DIRECT)); >>> ret = invalidate_inode_pages2_range(inode->i_mapping, >>> pos >> PAGE_SHIFT, >>> (pos + count - 1) >> PAGE_SHIFT); >>> @@ -1895,6 +1895,15 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, >>> req->r_inode = inode; >>> req->r_mtime = mtime; >>> + if (IS_ENCRYPTED(inode) && (iocb->ki_flags & IOCB_DIRECT)) { >>> + ret = invalidate_inode_pages2_range( >>> + inode->i_mapping, >>> + write_pos >> PAGE_SHIFT, >>> + (write_pos + write_len - 1) >> PAGE_SHIFT); >>> + if (ret < 0) >>> + dout("invalidate_inode_pages2_range returned %d\n", ret); >>> + } >> Shouldn't we fail it if the 'invalidate_inode_pages2_range()' fails here ? > Yeah, I'm not really sure. I'm simply following the usual pattern where > an invalidate_inode_pages2_range() failure is logged and ignored. And > this is not ceph-specific, other filesystems seem to do the same thing. I think it should be they are using this to invalidate the range only, do not depend on it to writeback the dirty pages. Such as they may will call 'filemap_fdatawrite_range()', etc. I saw in the beginning of the 'ceph_sync_write()', it will do 'filemap_write_and_wait_range()' too. So the dirty pages should have already flushed. -- Xiubo > Cheers,