Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2145604pxk; Sat, 5 Sep 2020 10:05:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxJ5G6WzDHRhsZwEdwb+/8XaEiX7dAJyIxff5Y2kod7QOHb5H0b7sWBrVf/DoFDVE/C7VTj X-Received: by 2002:a17:907:118c:: with SMTP id uz12mr2240166ejb.321.1599325526686; Sat, 05 Sep 2020 10:05:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599325526; cv=none; d=google.com; s=arc-20160816; b=ZduTPI3mPBFf+w0GlDrUws5Dzb3hxkA/Sa+cKx7Fw1IvNx+PK4aalP0JLxTxGqHT5w gtz4T/y7iCn+gtlvJfzlcJj4NI7ZTkUeuALSzV2hoqqzQhgfCZ4OhVOfDMhuvrvbT9zd cXeT2A5bTyuMsYl+KHGsDMo1zSlK38YZKWQ6KZUcWrC/AGcjzeGCQUE+o/8US5wv9fdi HgKkZ3NOHe9CEd2ME++wbsgfgJeB569cYf9oZTntufz229oQqDcxRR8hwVlyht/k8I/L BQdiuhV13pkgZ+RxtwYT1GPP0rm3ZP5eAYSH8d7mejwx0NqIuEs6HG6wKP9u4Y1/RLuq QwrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=bBI7if0KCVvWvaBOwMDsnEtZiJjjihsjAtqSgtT6RaA=; b=Iil1MtxiVJ5FMMKmuxAU5F0cv1G5UPkxKhsoDndPZkOtwKwVFqK71sfXsxAG3MRvDB StmMirroMgKFhW/6rfg3Rn4p1SrxLFfPTFpSf4kDNUvwuO7Jb6AUL+1Qi3V4FMQeH2mG xUCeUHJxgKr22fwSrw0Rd+9VvI50cz/jgj5ikkz+Z3KRJQcJqqqd4TWM7XhIPuyHEjDE 6WBnNZb5enwsoDLjPCM4GWVlFMtoeuo2ejAPBQU2F9JHNHQxR80QlPD/CFJ33R1LVhQA HeTuGIysfR6UzyhzS4Znye75EtpgJ86Sb/pXIke7zqBVB1/RMDbJgfXaWIWPmyRwX/WZ PW5g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=NFbwmKVH; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s7si6205992edj.515.2020.09.05.10.05.02; Sat, 05 Sep 2020 10:05:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=NFbwmKVH; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728442AbgIERE4 (ORCPT + 99 others); Sat, 5 Sep 2020 13:04:56 -0400 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:39815 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726590AbgIEREz (ORCPT ); Sat, 5 Sep 2020 13:04:55 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1599325493; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=bBI7if0KCVvWvaBOwMDsnEtZiJjjihsjAtqSgtT6RaA=; b=NFbwmKVH3vZGkrcPEeNcGfc0xURcGIWV0gwG5koE+UzlVLPKCRuE9J5BDCjhbWFcVvQYTj ixnNLhuqIlL/2ZCA1yAyiwTKUdyDsUJBrcoMwybQXHfii/Se5BaRjILVxW5ESSASENjFsi roFkSc75VKXV3BZsuroJ1MTgyVrFsfA= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-286-mgO_poxTNXWtVk_hTdv0qg-1; Sat, 05 Sep 2020 13:04:51 -0400 X-MC-Unique: mgO_poxTNXWtVk_hTdv0qg-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 82964185A0F8; Sat, 5 Sep 2020 17:04:49 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (file01.intranet.prod.int.rdu2.redhat.com [10.11.5.7]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 5831F7ED60; Sat, 5 Sep 2020 17:04:46 +0000 (UTC) Received: from file01.intranet.prod.int.rdu2.redhat.com (localhost [127.0.0.1]) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4) with ESMTP id 085H4jOV003056; Sat, 5 Sep 2020 13:04:45 -0400 Received: from localhost (mpatocka@localhost) by file01.intranet.prod.int.rdu2.redhat.com (8.14.4/8.14.4/Submit) with ESMTP id 085H4jxR003052; Sat, 5 Sep 2020 13:04:45 -0400 X-Authentication-Warning: file01.intranet.prod.int.rdu2.redhat.com: mpatocka owned process doing -bs Date: Sat, 5 Sep 2020 13:04:45 -0400 (EDT) From: Mikulas Patocka X-X-Sender: mpatocka@file01.intranet.prod.int.rdu2.redhat.com To: "Darrick J. Wong" cc: Linus Torvalds , Jan Kara , Dave Chinner , Jann Horn , Christoph Hellwig , Oleg Nesterov , Kirill Shutemov , "Theodore Ts'o" , Andrea Arcangeli , Matthew Wilcox , Andrew Morton , Dan Williams , Linux-MM , Linux Kernel Mailing List , linux-nvdimm , Ext4 Developers List , linux-xfs Subject: [PATCH 2/2 v2] xfs: don't update mtime on COW faults In-Reply-To: Message-ID: References: User-Agent: Alpine 2.02 (LRH 1266 2009-07-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org When running in a dax mode, if the user maps a page with MAP_PRIVATE and PROT_WRITE, the xfs filesystem would incorrectly update ctime and mtime when the user hits a COW fault. This breaks building of the Linux kernel. How to reproduce: 1. extract the Linux kernel tree on dax-mounted xfs filesystem 2. run make clean 3. run make -j12 4. run make -j12 - at step 4, make would incorrectly rebuild the whole kernel (although it was already built in step 3). The reason for the breakage is that almost all object files depend on objtool. When we run objtool, it takes COW page fault on its .data section, and these faults will incorrectly update the timestamp of the objtool binary. The updated timestamp causes make to rebuild the whole tree. Signed-off-by: Mikulas Patocka Cc: stable@vger.kernel.org --- fs/xfs/xfs_file.c | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) Index: linux-2.6/fs/xfs/xfs_file.c =================================================================== --- linux-2.6.orig/fs/xfs/xfs_file.c 2020-09-05 18:48:54.000000000 +0200 +++ linux-2.6/fs/xfs/xfs_file.c 2020-09-05 18:56:48.000000000 +0200 @@ -1223,14 +1223,21 @@ __xfs_filemap_fault( return ret; } +static inline bool +xfs_is_shared_dax_write_fault( + struct vm_fault *vmf) +{ + return IS_DAX(file_inode(vmf->vma->vm_file)) && + vmf->flags & FAULT_FLAG_WRITE && vmf->vma->vm_flags & VM_SHARED; +} + static vm_fault_t xfs_filemap_fault( struct vm_fault *vmf) { /* DAX can shortcut the normal fault path on write faults! */ return __xfs_filemap_fault(vmf, PE_SIZE_PTE, - IS_DAX(file_inode(vmf->vma->vm_file)) && - (vmf->flags & FAULT_FLAG_WRITE)); + xfs_is_shared_dax_write_fault(vmf)); } static vm_fault_t @@ -1243,7 +1250,7 @@ xfs_filemap_huge_fault( /* DAX can shortcut the normal fault path on write faults! */ return __xfs_filemap_fault(vmf, pe_size, - (vmf->flags & FAULT_FLAG_WRITE)); + xfs_is_shared_dax_write_fault(vmf)); } static vm_fault_t