Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp694291ybz; Wed, 15 Apr 2020 16:54:31 -0700 (PDT) X-Google-Smtp-Source: APiQypKNrGzjWSAkRtXI8gzOBrDK0AVbhpwH5YGor5BjcLTchuzUoeKdg6i2mZtKi/3PyQlXHFUW X-Received: by 2002:a05:6402:120a:: with SMTP id c10mr7337966edw.15.1586994871699; Wed, 15 Apr 2020 16:54:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586994871; cv=none; d=google.com; s=arc-20160816; b=jFvqgdR7h8bK1Lg1rkxoiT8w6IBfAGV6rL7x4KWwaQuA7pWHtIYuc9f15yscISpt4g ptAPCI1wjBb9fXYzyh3/BOjJPVh4qeLVS3QRhARNR7mT+hriAdYSmDB26/vHJ0CmF1LB biURs5Lm0GcBOREZeokcNk/gUt+m2dKvFFyW1OSGXabpKLQbwYMxvmthPFQ6WnP4UHXO kQjoNxHN2C+C02bCzeOEJPxYT34vfk1wkGhXhq1vNH4cy2EL8UAyWq1+FPsUjSMavlXZ ELKx/cw3Uy3w0SyJ+/4TOSpBOQ5EmRKChs1iYarC4lko8vHFq8XF8PwAwIWQtObL47zg iMRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=wwg0/qxQKDYgRsCaL+Gs8WuEIZKeF3tzsiDDKPHmFsA=; b=DyNR0xSjKaep4Fb1YxxdZEgslf36vqPkSvg696vZVuyq0GFIMxI76LzfCGZXN/Lxgp 0cb8OvFBCgXautEQnXt6iARkGSTd1jqfY2BUqSFSZ9SAFMyWdASyo+ptqdSDVxAgRifU oYB689lyx5mBPpuCeJ02x1QJbL3a6A3HHQKkaCXQVUWtqsUUd7NH/hSqVVgauq9FoV/K TkpV9+bXqI/RqcbhLiPqfBW2Dtdri8OnDqnYOVtmwg0e0XWibz0cyZ1vytCDK6eeobNH maDysHNNsuWrDUHI+5eIp+QcvpgHkoE5OlJGFopWifbQhf3jXwqcYh95PXEKyc7wj+0x Aw+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m12si8963984edq.510.2020.04.15.16.54.08; Wed, 15 Apr 2020 16:54:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S370502AbgDOMv4 (ORCPT + 99 others); Wed, 15 Apr 2020 08:51:56 -0400 Received: from mx2.suse.de ([195.135.220.15]:34220 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S370492AbgDOMvv (ORCPT ); Wed, 15 Apr 2020 08:51:51 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 27143AC11; Wed, 15 Apr 2020 12:51:49 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id DE49C1E1250; Wed, 15 Apr 2020 14:51:47 +0200 (CEST) Date: Wed, 15 Apr 2020 14:51:47 +0200 From: Jan Kara To: ira.weiny@intel.com Cc: linux-kernel@vger.kernel.org, Jan Kara , "Darrick J. Wong" , Dan Williams , Dave Chinner , Christoph Hellwig , "Theodore Y. Ts'o" , Jeff Moyer , linux-ext4@vger.kernel.org, linux-xfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH RFC 5/8] fs/ext4: Make DAX mount option a tri-state Message-ID: <20200415125147.GH6126@quack2.suse.cz> References: <20200414040030.1802884-1-ira.weiny@intel.com> <20200414040030.1802884-6-ira.weiny@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200414040030.1802884-6-ira.weiny@intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon 13-04-20 21:00:27, ira.weiny@intel.com wrote: > From: Ira Weiny > > We add 'always', 'never', and 'inode' (default). '-o dax' continue to > operate the same. > > Specifically we introduce a 2nd DAX mount flag EXT4_MOUNT_NODAX and set > it and EXT4_MOUNT_DAX appropriately. > > We also force EXT4_MOUNT_NODAX if !CONFIG_FS_DAX. > > https://lore.kernel.org/lkml/20200405061945.GA94792@iweiny-DESK2.sc.intel.com/ > > Signed-off-by: Ira Weiny ... > @@ -2303,6 +2325,13 @@ static int _ext4_show_options(struct seq_file *seq, struct super_block *sb, > if (DUMMY_ENCRYPTION_ENABLED(sbi)) > SEQ_OPTS_PUTS("test_dummy_encryption"); > > + if (test_opt2(sb, NODAX)) > + SEQ_OPTS_PUTS("dax=never"); > + else if (test_opt(sb, DAX)) > + SEQ_OPTS_PUTS("dax=always"); > + else > + SEQ_OPTS_PUTS("dax=inode"); > + We try to show only mount options that were explicitely set by the user, or that are different from defaults - e.g., see how 'data=' mount option printing is handled. > ext4_show_quota_options(seq, sb); > return 0; > } > @@ -5424,6 +5453,12 @@ static int ext4_remount(struct super_block *sb, int *flags, char *data) > sbi->s_mount_opt ^= EXT4_MOUNT_DAX; > } > > + if ((sbi->s_mount_opt2 ^ old_opts.s_mount_opt2) & EXT4_MOUNT2_NODAX) { > + ext4_msg(sb, KERN_WARNING, "warning: refusing change of " > + "non-dax flag with busy inodes while remounting"); > + sbi->s_mount_opt2 ^= EXT4_MOUNT2_NODAX; > + } > + > if (sbi->s_mount_flags & EXT4_MF_FS_ABORTED) > ext4_abort(sb, "Abort forced by user"); I'd just merge this with the check whether EXT4_MOUNT_DAX changed. Honza -- Jan Kara SUSE Labs, CR