Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp264016ybk; Tue, 12 May 2020 22:44:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzLFV24pG5DbC86aAvA0fGtticTe4ZpSPTsfU4J6iVgAvh+WP6I7Sf7vzwMoXp+MSt0ASBa X-Received: by 2002:a17:906:8695:: with SMTP id g21mr8984103ejx.192.1589348655009; Tue, 12 May 2020 22:44:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589348655; cv=none; d=google.com; s=arc-20160816; b=DjYbsmU6WDKxhM5jcKjX/p+DySdlBD3MeORqXq+RQ5VDx8NsAiNleT+KfRDFdD0KGs ap0g3WqjA9a4gTKyK9SyWNOI+Gr9C6trqZGo6bkBrYmA3H5LiCcuqccpRrRNMgNlmbQ5 jTdBR2Pm6Vm1atpqO9VvzYFB0fo3YLdVT0UQmTahhaENRHbE0jGA0U4Op1CxF5uvBSD0 MBCE763570uYq6/u5l48fZfNWWqZ0LDmShGSuKM9z279jbFhEM6orPa1oIQQfZF0PT0T FMOC9i/lcQ7zh76AC1lht+lh5L9z7aQhuM8MEu/Of38CMpVxNSkLjOPxiDBAG8XEsWIx 5uow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=4dB9uPSVM9+MdOknKqEpwyueYXkH5jOKXhmEkSZ329s=; b=hsXOfUosAscMDLMYy07ktvih8bH7gjxVT93cJhuZZTgovJ8qro6FVMhg6AVtDrGfOe yJCmiWndX+jHvKdnOrFX+PG02Ott+wEvfQH+HPNNOoNvmy71cjO6rghrsfzAo5bYitl9 mCAUqh7gXoMjgzGl9Tu/roR2qGWb/cVYdp2qAkQlL8RbNEHeeXn81ZxqWR+Zp7B7GzYW H1836NQeHCm89DmhDL1PU4LBG0WY60LZdm77iTLa5LYxIGtFFQthTbohamxVw5tOL56N HK/H/JvomyJXC8Yqa4L/W/N1YzJ6gavn/fvRm6kxjg6oVFeWoPKbnQ4j0WvGzUvHXNM/ gbaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v13si6544603ejo.418.2020.05.12.22.43.41; Tue, 12 May 2020 22:44:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728962AbgEMFna (ORCPT + 99 others); Wed, 13 May 2020 01:43:30 -0400 Received: from mga05.intel.com ([192.55.52.43]:40375 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728097AbgEMFn3 (ORCPT ); Wed, 13 May 2020 01:43:29 -0400 IronPort-SDR: qGgY2PZKhs7nps/88OPZ8JI/v9pjVb6CYa00n/H4ZWhzaqA5OFW0eJiP1GhULS6wv4s6M43z64 n1uKKcuqg6WA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 May 2020 22:43:29 -0700 IronPort-SDR: SK59B42UbMYq2ls4ncVnwTImTJhK0cVzDiqBcnn6kBo26zDsrhp8LgIuVowGEwKjJKfpHifoyn Ls586/o5KqSg== X-IronPort-AV: E=Sophos;i="5.73,386,1583222400"; d="scan'208";a="265754104" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 May 2020 22:43:28 -0700 From: ira.weiny@intel.com To: linux-ext4@vger.kernel.org, Andreas Dilger , "Theodore Y. Ts'o" , Jan Kara Cc: Ira Weiny , "Darrick J. Wong" , Dan Williams , Dave Chinner , Christoph Hellwig , linux-xfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, Al Viro , Jeff Moyer , linux-kernel@vger.kernel.org Subject: [PATCH 0/9] Enable ext4 support for per-file/directory DAX operations Date: Tue, 12 May 2020 22:43:15 -0700 Message-Id: <20200513054324.2138483-1-ira.weiny@intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org From: Ira Weiny Enable the same per file DAX support in ext4 as was done for xfs. This series builds and depends on the V11 series for xfs.[1] This passes the same xfstests test as XFS. The only issue is that this modifies the old mount option parsing code rather than waiting for the new parsing code to be finalized. This series starts with 3 fixes which include making Verity and Encrypt truly mutually exclusive from DAX. I think these first 3 patches should be picked up for 5.8 regardless of what is decided regarding the mount parsing. [1] https://lore.kernel.org/lkml/20200428002142.404144-1-ira.weiny@intel.com/ To: linux-kernel@vger.kernel.org Cc: "Darrick J. Wong" Cc: Dan Williams Cc: Dave Chinner Cc: Christoph Hellwig Cc: "Theodore Y. Ts'o" Cc: Jan Kara Cc: linux-ext4@vger.kernel.org Cc: linux-xfs@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org Ira Weiny (9): fs/ext4: Narrow scope of DAX check in setflags fs/ext4: Disallow verity if inode is DAX fs/ext4: Disallow encryption if inode is DAX fs/ext4: Change EXT4_MOUNT_DAX to EXT4_MOUNT_DAX_ALWAYS fs/ext4: Update ext4_should_use_dax() fs/ext4: Only change S_DAX on inode load fs/ext4: Make DAX mount option a tri-state fs/ext4: Introduce DAX inode flag Documentation/dax: Update DAX enablement for ext4 Documentation/filesystems/dax.txt | 6 +- Documentation/filesystems/ext4/verity.rst | 7 +++ Documentation/filesystems/fscrypt.rst | 4 +- fs/ext4/ext4.h | 20 ++++--- fs/ext4/ialloc.c | 2 +- fs/ext4/inode.c | 27 +++++++-- fs/ext4/ioctl.c | 32 +++++++++-- fs/ext4/super.c | 67 +++++++++++++++-------- fs/ext4/verity.c | 5 +- 9 files changed, 125 insertions(+), 45 deletions(-) -- 2.25.1