Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp288071ybk; Tue, 19 May 2020 22:58:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy2ZvRq2KEZrk2AhyA4vTT9DRM780Yr10eeiAvhovaqKvWNVwg1qtWg+IUW7lnZvJegc9S8 X-Received: by 2002:a17:906:2dc8:: with SMTP id h8mr2578944eji.108.1589954317333; Tue, 19 May 2020 22:58:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589954317; cv=none; d=google.com; s=arc-20160816; b=G+1HjWXnt7DQFghH5QzWWTPm86IOms2+KPtlf2Za+gTgwBBJVccsMDmh9qkTnIqjiz 2zsfaWuCZe0qv+Wm50hQ6QrmeigHDebUseSmHibyQphGRttAx6JYYQIJwUFzqmFQo5pl e8kX3YwTsrHdgFh371ooWuOPmuQGEjJWEoozn622P9OALhj33oKkZKtPT6sO85iLHKD8 oLGcVgWcRgWf9z0gBdK0XFn5gyoRcknwcfePY/ewn7GPvQ9mB7qqndpXPygdWtoA6dp8 Nc1Pwug4qbN0yqOM16WCeTOUDQLM7XOsxhuarViITYt2PwQqUt7xfsU7mbR+/e/putXz JLKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=skjY4b7+zu2axakSTZQTwveI89WGYj7c/sSFfhtuT4Y=; b=LbnhDioBS1He5MPtBlgqtN/yLMotxg90ZlVZAbdJ+iJkeKflIMRe2c+dduiiFiQD9+ EwBnFlzZlLCgWOewESbrrL42FAXtPZ0cWNdIlKZffLGaT+pcmSF3lKK435A3AHPJdBDn 4BCmGF+86wH//p6vQUnNOBMacx7nNkw1xHiC9p4Og9FXt9rYgwoL/ChRLS46RdWqZrdk zzODWN7sM4S0UUMb7dvKS1F/gMZ2v2roIFWoQxld7VjlmDWDYxwNhqz7k0muJuwBUpFx kmCU3fVcLmtIf8QQoIbPi/1oMLevAPnpqod7j/DDxFi9CVySCYN7BZENFoRk/5TnkZSP g3BA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h1si844211edq.501.2020.05.19.22.58.04; Tue, 19 May 2020 22:58:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726369AbgETF55 (ORCPT + 99 others); Wed, 20 May 2020 01:57:57 -0400 Received: from mga09.intel.com ([134.134.136.24]:55135 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725998AbgETF54 (ORCPT ); Wed, 20 May 2020 01:57:56 -0400 IronPort-SDR: NRerxWQn3JZ7nq7XxrX2N7tNIF8Naa7WPiGXdeAqmWR7qH/KGvNDR58AUKkmFbPorwwJltnAMW J1FhFcaIjXLA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 May 2020 22:57:56 -0700 IronPort-SDR: yWLipC+hmd5lakfByb0Vq9XwPzKj4cmS+tJjAAirb7gYf7UDH2V+4CWg/XOL3iIIoJ5yVrN8Pw rF1mqJUHJbcg== X-IronPort-AV: E=Sophos;i="5.73,412,1583222400"; d="scan'208";a="282570629" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 May 2020 22:57:55 -0700 From: ira.weiny@intel.com To: linux-ext4@vger.kernel.org, Andreas Dilger , "Theodore Y. Ts'o" , Jan Kara , Eric Biggers Cc: Ira Weiny , "Darrick J. Wong" , Dan Williams , Dave Chinner , Christoph Hellwig , linux-xfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, Al Viro , Jeff Moyer , linux-kernel@vger.kernel.org Subject: [PATCH V3 0/8] Enable ext4 support for per-file/directory DAX operations Date: Tue, 19 May 2020 22:57:45 -0700 Message-Id: <20200520055753.3733520-1-ira.weiny@intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org From: Ira Weiny Changes from V2: Rework DAX exclusivity with verity and encryption based on feedback from Eric Enable the same per file DAX support in ext4 as was done for xfs. This series builds and depends on the V11 series for xfs.[1] This passes the same xfstests test as XFS. The only issue is that this modifies the old mount option parsing code rather than waiting for the new parsing code to be finalized. This series starts with 3 fixes which include making Verity and Encrypt truly mutually exclusive from DAX. I think these first 3 patches should be picked up for 5.8 regardless of what is decided regarding the mount parsing. [1] https://lore.kernel.org/lkml/20200428002142.404144-1-ira.weiny@intel.com/ To: linux-kernel@vger.kernel.org Cc: "Darrick J. Wong" Cc: Dan Williams Cc: Dave Chinner Cc: Christoph Hellwig Cc: "Theodore Y. Ts'o" Cc: Jan Kara Cc: linux-ext4@vger.kernel.org Cc: linux-xfs@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org Ira Weiny (8): fs/ext4: Narrow scope of DAX check in setflags fs/ext4: Disallow verity if inode is DAX fs/ext4: Change EXT4_MOUNT_DAX to EXT4_MOUNT_DAX_ALWAYS fs/ext4: Update ext4_should_use_dax() fs/ext4: Only change S_DAX on inode load fs/ext4: Make DAX mount option a tri-state fs/ext4: Introduce DAX inode flag Documentation/dax: Update DAX enablement for ext4 Documentation/filesystems/dax.txt | 6 +- Documentation/filesystems/ext4/verity.rst | 3 + fs/ext4/ext4.h | 22 +++++-- fs/ext4/ialloc.c | 2 +- fs/ext4/inode.c | 25 +++++-- fs/ext4/ioctl.c | 41 ++++++++++-- fs/ext4/super.c | 80 ++++++++++++++++++----- fs/ext4/verity.c | 5 +- include/uapi/linux/fs.h | 1 + 9 files changed, 148 insertions(+), 37 deletions(-) -- 2.25.1