All of lore.kernel.org
 help / color / mirror / Atom feed
From: Matthew Wilcox <willy@linux.intel.com>
To: Jan Kara <jack@suse.cz>
Cc: Matthew Wilcox <matthew.r.wilcox@intel.com>,
	linux-fsdevel@vger.kernel.org, linux-mm@kvack.org,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH v7 07/22] Replace the XIP page fault handler with the DAX page fault handler
Date: Tue, 29 Jul 2014 17:23:33 -0400	[thread overview]
Message-ID: <20140729212333.GO6754@linux.intel.com> (raw)
In-Reply-To: <20140729210457.GA17807@quack.suse.cz>

On Tue, Jul 29, 2014 at 11:04:57PM +0200, Jan Kara wrote:
> > Path 1:
> > 
> > ext4_fallocate ->
> >  ext4_punch_hole ->
> >   ext4_inode_attach_jinode() -> ... ->
> >     lock_map_acquire(&handle->h_lockdep_map);
> >   truncate_pagecache_range() ->
> >    unmap_mapping_range() ->
> >     mutex_lock(&mapping->i_mmap_mutex);
>   This is strange. I don't see how ext4_inode_attach_jinode() can ever lead
> to lock_map_acquire(&handle->h_lockdep_map). Can you post a full trace for
> this?

Unfortunately, lockdep finds the inversion in the other order, so I
have the backtraces of this path hitting the i_mmap_mutex while already
holding jbd_mutex:

 ======================================================
 [ INFO: possible circular locking dependency detected ]
 3.16.0-rc6+ #91 Tainted: G        W    
 -------------------------------------------------------
 fstest/31836 is trying to acquire lock:
  (jbd2_handle){+.+.+.}, at: [<ffffffffa00f5333>] start_this_handle+0x193/0x630 [jbd2]
 
 but task is already holding lock:
  (&mapping->i_mmap_mutex){+.+...}, at: [<ffffffff8124c0a0>] do_dax_fault+0x4e0/0x640
 
 which lock already depends on the new lock.
 
 
 the existing dependency chain (in reverse order) is:
 
 -> #1 (&mapping->i_mmap_mutex){+.+...}:
        [<ffffffff810cfa22>] lock_acquire+0xb2/0x1f0
        [<ffffffff815cad15>] mutex_lock_nested+0x75/0x420
        [<ffffffff811acf4b>] unmap_mapping_range+0x6b/0x180
        [<ffffffff811901ba>] truncate_pagecache_range+0x4a/0x60
        [<ffffffffa020af41>] ext4_punch_hole+0x4d1/0x530 [ext4]
        [<ffffffffa0235356>] ext4_fallocate+0x156/0xb70 [ext4]
        [<ffffffff811f3c19>] do_fallocate+0x119/0x1b0
        [<ffffffff811f3cf3>] SyS_fallocate+0x43/0x70
        [<ffffffff815cf8a9>] system_call_fastpath+0x16/0x1b
 
 -> #0 (jbd2_handle){+.+.+.}:
        [<ffffffff810ce9e1>] __lock_acquire+0x1d01/0x1eb0
        [<ffffffff810cfa22>] lock_acquire+0xb2/0x1f0
        [<ffffffffa00f538e>] start_this_handle+0x1ee/0x630 [jbd2]
        [<ffffffffa00f5c04>] jbd2__journal_start+0xd4/0x260 [jbd2]
        [<ffffffffa0235f6d>] __ext4_journal_start_sb+0x6d/0x190 [ext4]
        [<ffffffffa0206fca>] _ext4_get_block+0x16a/0x1c0 [ext4]
        [<ffffffffa0207036>] ext4_get_block+0x16/0x20 [ext4]
        [<ffffffff8124c199>] do_dax_fault+0x5d9/0x640
        [<ffffffff8124c23f>] dax_fault+0x3f/0x90
        [<ffffffffa01ff975>] ext4_dax_fault+0x15/0x20 [ext4]
        [<ffffffff811ab6d1>] __do_fault+0x41/0xd0
        [<ffffffff811ae7f5>] do_shared_fault.isra.56+0x35/0x220
        [<ffffffff811af983>] handle_mm_fault+0x303/0xf70
        [<ffffffff81062d2c>] __do_page_fault+0x1ec/0x5b0
        [<ffffffff81063112>] do_page_fault+0x22/0x30
        [<ffffffff815d18b8>] page_fault+0x28/0x30
 
 other info that might help us debug this:
 
  Possible unsafe locking scenario:
 
        CPU0                    CPU1
        ----                    ----
   lock(&mapping->i_mmap_mutex);
                                lock(jbd2_handle);
                                lock(&mapping->i_mmap_mutex);
   lock(jbd2_handle);
 
  *** DEADLOCK ***
 
 3 locks held by fstest/31836:
  #0:  (&mm->mmap_sem){++++++}, at: [<ffffffff81062cc2>] __do_page_fault+0x182/0x5b0
  #1:  (sb_pagefaults){++++..}, at: [<ffffffff8124c27a>] dax_fault+0x7a/0x90
  #2:  (&mapping->i_mmap_mutex){+.+...}, at: [<ffffffff8124c0a0>] do_dax_fault+0x4e0/0x640
 
 stack backtrace:
 CPU: 6 PID: 31836 Comm: fstest Tainted: G        W     3.16.0-rc6+ #91
 Hardware name: Gigabyte Technology Co., Ltd. To be filled by O.E.M./Q87M-D2H, BIOS F6 08/03/2013
  ffffffff825e63e0 ffff8800a0fc78c0 ffffffff815c6bc3 ffffffff825e63e0
  ffff8800a0fc7900 ffffffff815c4e59 ffff8800a0fc7970 ffff8800a88f4a50
  ffff8800a88f4af8 ffff8800a88f5280 0000000000000003 ffff8800a88f5248
 Call Trace:
  [<ffffffff815c6bc3>] dump_stack+0x4d/0x66
  [<ffffffff815c4e59>] print_circular_bug+0x201/0x20f
  [<ffffffff810ce9e1>] __lock_acquire+0x1d01/0x1eb0
  [<ffffffff81023b00>] ? cyc2ns_read_end+0x20/0x20
  [<ffffffff810cfa22>] lock_acquire+0xb2/0x1f0
  [<ffffffffa00f5333>] ? start_this_handle+0x193/0x630 [jbd2]
  [<ffffffffa00f538e>] start_this_handle+0x1ee/0x630 [jbd2]
  [<ffffffffa00f5333>] ? start_this_handle+0x193/0x630 [jbd2]
  [<ffffffffa00f5020>] ? new_handle+0x20/0x60 [jbd2]
  [<ffffffffa00f5c04>] jbd2__journal_start+0xd4/0x260 [jbd2]
  [<ffffffffa0206fca>] ? _ext4_get_block+0x16a/0x1c0 [ext4]
  [<ffffffffa0235f6d>] __ext4_journal_start_sb+0x6d/0x190 [ext4]
  [<ffffffffa0206fca>] _ext4_get_block+0x16a/0x1c0 [ext4]
  [<ffffffffa0207036>] ext4_get_block+0x16/0x20 [ext4]
  [<ffffffff8124c199>] do_dax_fault+0x5d9/0x640
  [<ffffffffa0207020>] ? _ext4_get_block+0x1c0/0x1c0 [ext4]
  [<ffffffffa0207020>] ? _ext4_get_block+0x1c0/0x1c0 [ext4]
  [<ffffffff8124c23f>] dax_fault+0x3f/0x90
  [<ffffffffa01ff975>] ext4_dax_fault+0x15/0x20 [ext4]
  [<ffffffff811ab6d1>] __do_fault+0x41/0xd0
  [<ffffffff811ae7f5>] do_shared_fault.isra.56+0x35/0x220
  [<ffffffff811af983>] handle_mm_fault+0x303/0xf70
  [<ffffffff810ca676>] ? __lock_is_held+0x56/0x80
  [<ffffffff81062d2c>] __do_page_fault+0x1ec/0x5b0
  [<ffffffff8119dc3c>] ? vm_mmap_pgoff+0x9c/0xc0
  [<ffffffff810c80cf>] ? up_write+0x1f/0x40
  [<ffffffff8119dc3c>] ? vm_mmap_pgoff+0x9c/0xc0
  [<ffffffff8133e1ea>] ? trace_hardirqs_off_thunk+0x3a/0x3c
  [<ffffffff81063112>] do_page_fault+0x22/0x30
  [<ffffffff815d18b8>] page_fault+0x28/0x30


WARNING: multiple messages have this Message-ID (diff)
From: Matthew Wilcox <willy@linux.intel.com>
To: Jan Kara <jack@suse.cz>
Cc: Matthew Wilcox <matthew.r.wilcox@intel.com>,
	linux-fsdevel@vger.kernel.org, linux-mm@kvack.org,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH v7 07/22] Replace the XIP page fault handler with the DAX page fault handler
Date: Tue, 29 Jul 2014 17:23:33 -0400	[thread overview]
Message-ID: <20140729212333.GO6754@linux.intel.com> (raw)
In-Reply-To: <20140729210457.GA17807@quack.suse.cz>

On Tue, Jul 29, 2014 at 11:04:57PM +0200, Jan Kara wrote:
> > Path 1:
> > 
> > ext4_fallocate ->
> >  ext4_punch_hole ->
> >   ext4_inode_attach_jinode() -> ... ->
> >     lock_map_acquire(&handle->h_lockdep_map);
> >   truncate_pagecache_range() ->
> >    unmap_mapping_range() ->
> >     mutex_lock(&mapping->i_mmap_mutex);
>   This is strange. I don't see how ext4_inode_attach_jinode() can ever lead
> to lock_map_acquire(&handle->h_lockdep_map). Can you post a full trace for
> this?

Unfortunately, lockdep finds the inversion in the other order, so I
have the backtraces of this path hitting the i_mmap_mutex while already
holding jbd_mutex:

 ======================================================
 [ INFO: possible circular locking dependency detected ]
 3.16.0-rc6+ #91 Tainted: G        W    
 -------------------------------------------------------
 fstest/31836 is trying to acquire lock:
  (jbd2_handle){+.+.+.}, at: [<ffffffffa00f5333>] start_this_handle+0x193/0x630 [jbd2]
 
 but task is already holding lock:
  (&mapping->i_mmap_mutex){+.+...}, at: [<ffffffff8124c0a0>] do_dax_fault+0x4e0/0x640
 
 which lock already depends on the new lock.
 
 
 the existing dependency chain (in reverse order) is:
 
 -> #1 (&mapping->i_mmap_mutex){+.+...}:
        [<ffffffff810cfa22>] lock_acquire+0xb2/0x1f0
        [<ffffffff815cad15>] mutex_lock_nested+0x75/0x420
        [<ffffffff811acf4b>] unmap_mapping_range+0x6b/0x180
        [<ffffffff811901ba>] truncate_pagecache_range+0x4a/0x60
        [<ffffffffa020af41>] ext4_punch_hole+0x4d1/0x530 [ext4]
        [<ffffffffa0235356>] ext4_fallocate+0x156/0xb70 [ext4]
        [<ffffffff811f3c19>] do_fallocate+0x119/0x1b0
        [<ffffffff811f3cf3>] SyS_fallocate+0x43/0x70
        [<ffffffff815cf8a9>] system_call_fastpath+0x16/0x1b
 
 -> #0 (jbd2_handle){+.+.+.}:
        [<ffffffff810ce9e1>] __lock_acquire+0x1d01/0x1eb0
        [<ffffffff810cfa22>] lock_acquire+0xb2/0x1f0
        [<ffffffffa00f538e>] start_this_handle+0x1ee/0x630 [jbd2]
        [<ffffffffa00f5c04>] jbd2__journal_start+0xd4/0x260 [jbd2]
        [<ffffffffa0235f6d>] __ext4_journal_start_sb+0x6d/0x190 [ext4]
        [<ffffffffa0206fca>] _ext4_get_block+0x16a/0x1c0 [ext4]
        [<ffffffffa0207036>] ext4_get_block+0x16/0x20 [ext4]
        [<ffffffff8124c199>] do_dax_fault+0x5d9/0x640
        [<ffffffff8124c23f>] dax_fault+0x3f/0x90
        [<ffffffffa01ff975>] ext4_dax_fault+0x15/0x20 [ext4]
        [<ffffffff811ab6d1>] __do_fault+0x41/0xd0
        [<ffffffff811ae7f5>] do_shared_fault.isra.56+0x35/0x220
        [<ffffffff811af983>] handle_mm_fault+0x303/0xf70
        [<ffffffff81062d2c>] __do_page_fault+0x1ec/0x5b0
        [<ffffffff81063112>] do_page_fault+0x22/0x30
        [<ffffffff815d18b8>] page_fault+0x28/0x30
 
 other info that might help us debug this:
 
  Possible unsafe locking scenario:
 
        CPU0                    CPU1
        ----                    ----
   lock(&mapping->i_mmap_mutex);
                                lock(jbd2_handle);
                                lock(&mapping->i_mmap_mutex);
   lock(jbd2_handle);
 
  *** DEADLOCK ***
 
 3 locks held by fstest/31836:
  #0:  (&mm->mmap_sem){++++++}, at: [<ffffffff81062cc2>] __do_page_fault+0x182/0x5b0
  #1:  (sb_pagefaults){++++..}, at: [<ffffffff8124c27a>] dax_fault+0x7a/0x90
  #2:  (&mapping->i_mmap_mutex){+.+...}, at: [<ffffffff8124c0a0>] do_dax_fault+0x4e0/0x640
 
 stack backtrace:
 CPU: 6 PID: 31836 Comm: fstest Tainted: G        W     3.16.0-rc6+ #91
 Hardware name: Gigabyte Technology Co., Ltd. To be filled by O.E.M./Q87M-D2H, BIOS F6 08/03/2013
  ffffffff825e63e0 ffff8800a0fc78c0 ffffffff815c6bc3 ffffffff825e63e0
  ffff8800a0fc7900 ffffffff815c4e59 ffff8800a0fc7970 ffff8800a88f4a50
  ffff8800a88f4af8 ffff8800a88f5280 0000000000000003 ffff8800a88f5248
 Call Trace:
  [<ffffffff815c6bc3>] dump_stack+0x4d/0x66
  [<ffffffff815c4e59>] print_circular_bug+0x201/0x20f
  [<ffffffff810ce9e1>] __lock_acquire+0x1d01/0x1eb0
  [<ffffffff81023b00>] ? cyc2ns_read_end+0x20/0x20
  [<ffffffff810cfa22>] lock_acquire+0xb2/0x1f0
  [<ffffffffa00f5333>] ? start_this_handle+0x193/0x630 [jbd2]
  [<ffffffffa00f538e>] start_this_handle+0x1ee/0x630 [jbd2]
  [<ffffffffa00f5333>] ? start_this_handle+0x193/0x630 [jbd2]
  [<ffffffffa00f5020>] ? new_handle+0x20/0x60 [jbd2]
  [<ffffffffa00f5c04>] jbd2__journal_start+0xd4/0x260 [jbd2]
  [<ffffffffa0206fca>] ? _ext4_get_block+0x16a/0x1c0 [ext4]
  [<ffffffffa0235f6d>] __ext4_journal_start_sb+0x6d/0x190 [ext4]
  [<ffffffffa0206fca>] _ext4_get_block+0x16a/0x1c0 [ext4]
  [<ffffffffa0207036>] ext4_get_block+0x16/0x20 [ext4]
  [<ffffffff8124c199>] do_dax_fault+0x5d9/0x640
  [<ffffffffa0207020>] ? _ext4_get_block+0x1c0/0x1c0 [ext4]
  [<ffffffffa0207020>] ? _ext4_get_block+0x1c0/0x1c0 [ext4]
  [<ffffffff8124c23f>] dax_fault+0x3f/0x90
  [<ffffffffa01ff975>] ext4_dax_fault+0x15/0x20 [ext4]
  [<ffffffff811ab6d1>] __do_fault+0x41/0xd0
  [<ffffffff811ae7f5>] do_shared_fault.isra.56+0x35/0x220
  [<ffffffff811af983>] handle_mm_fault+0x303/0xf70
  [<ffffffff810ca676>] ? __lock_is_held+0x56/0x80
  [<ffffffff81062d2c>] __do_page_fault+0x1ec/0x5b0
  [<ffffffff8119dc3c>] ? vm_mmap_pgoff+0x9c/0xc0
  [<ffffffff810c80cf>] ? up_write+0x1f/0x40
  [<ffffffff8119dc3c>] ? vm_mmap_pgoff+0x9c/0xc0
  [<ffffffff8133e1ea>] ? trace_hardirqs_off_thunk+0x3a/0x3c
  [<ffffffff81063112>] do_page_fault+0x22/0x30
  [<ffffffff815d18b8>] page_fault+0x28/0x30

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

  reply	other threads:[~2014-07-29 21:23 UTC|newest]

Thread overview: 180+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-03-23 19:08 [PATCH v7 00/22] Support ext4 on NV-DIMMs Matthew Wilcox
2014-03-23 19:08 ` Matthew Wilcox
2014-03-23 19:08 ` [PATCH v7 01/22] Fix XIP fault vs truncate race Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-03-29 15:57   ` Jan Kara
2014-03-29 15:57     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 02/22] Allow page fault handlers to perform the COW Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-08 16:34   ` Jan Kara
2014-04-08 16:34     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 03/22] axonram: Fix bug in direct_access Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-03-29 16:22   ` Jan Kara
2014-03-29 16:22     ` Jan Kara
2014-04-02 19:24     ` Matthew Wilcox
2014-04-02 19:24       ` Matthew Wilcox
2014-03-23 19:08 ` [PATCH v7 04/22] Change direct_access calling convention Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-03-29 16:30   ` Jan Kara
2014-03-29 16:30     ` Jan Kara
2014-04-02 19:27     ` Matthew Wilcox
2014-04-02 19:27       ` Matthew Wilcox
2014-03-23 19:08 ` [PATCH v7 05/22] Introduce IS_DAX(inode) Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-08 15:32   ` Jan Kara
2014-04-08 15:32     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 06/22] Replace XIP read and write with DAX I/O Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-08 17:56   ` Jan Kara
2014-04-08 17:56     ` Jan Kara
2014-04-08 20:21     ` Matthew Wilcox
2014-04-08 20:21       ` Matthew Wilcox
2014-04-09  9:14       ` Jan Kara
2014-04-09  9:14         ` Jan Kara
2014-04-09 15:19         ` Matthew Wilcox
2014-04-09 15:19           ` Matthew Wilcox
2014-04-09 20:55           ` Jan Kara
2014-04-09 20:55             ` Jan Kara
2014-04-13 18:05             ` Matthew Wilcox
2014-04-13 18:05               ` Matthew Wilcox
2014-04-09 12:04   ` Jan Kara
2014-04-09 12:04     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 07/22] Replace the XIP page fault handler with the DAX page fault handler Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-08 22:05   ` Jan Kara
2014-04-08 22:05     ` Jan Kara
2014-04-09 20:48     ` Matthew Wilcox
2014-04-09 20:48       ` Matthew Wilcox
2014-04-09 21:12       ` Jan Kara
2014-04-09 21:12         ` Jan Kara
2014-04-13 11:21         ` Matthew Wilcox
2014-04-13 11:21           ` Matthew Wilcox
2014-04-14 16:04           ` Jan Kara
2014-04-14 16:04             ` Jan Kara
2014-04-09 10:27   ` Jan Kara
2014-04-09 10:27     ` Jan Kara
2014-04-09 20:51     ` Matthew Wilcox
2014-04-09 20:51       ` Matthew Wilcox
2014-04-09 21:43       ` Jan Kara
2014-04-09 21:43         ` Jan Kara
2014-04-13 18:03         ` Matthew Wilcox
2014-04-13 18:03           ` Matthew Wilcox
2014-07-29 12:12         ` Matthew Wilcox
2014-07-29 12:12           ` Matthew Wilcox
2014-07-29 21:04           ` Jan Kara
2014-07-29 21:04             ` Jan Kara
2014-07-29 21:23             ` Matthew Wilcox [this message]
2014-07-29 21:23               ` Matthew Wilcox
2014-07-30  9:52               ` Jan Kara
2014-07-30  9:52                 ` Jan Kara
2014-07-30 21:02                 ` Matthew Wilcox
2014-07-30 21:02                   ` Matthew Wilcox
2014-08-09 11:00                 ` Matthew Wilcox
2014-08-09 11:00                   ` Matthew Wilcox
2014-08-11  8:51                   ` Jan Kara
2014-08-11  8:51                     ` Jan Kara
2014-08-11 14:13                     ` Matthew Wilcox
2014-08-11 14:13                       ` Matthew Wilcox
2014-08-11 14:35                       ` Jan Kara
2014-08-11 14:35                         ` Jan Kara
2014-08-11 15:02                         ` Matthew Wilcox
2014-08-11 15:02                           ` Matthew Wilcox
2014-08-11 15:25                           ` Jan Kara
2014-08-11 15:25                             ` Jan Kara
2014-05-21 20:35   ` Toshi Kani
2014-05-21 20:35     ` Toshi Kani
2014-06-05 22:38     ` Toshi Kani
2014-06-05 22:38       ` Toshi Kani
2014-03-23 19:08 ` [PATCH v7 08/22] Replace xip_truncate_page with dax_truncate_page Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-08 22:17   ` Jan Kara
2014-04-08 22:17     ` Jan Kara
2014-04-09  9:26     ` Jan Kara
2014-04-09  9:26       ` Jan Kara
2014-04-13 19:07       ` Matthew Wilcox
2014-04-13 19:07         ` Matthew Wilcox
2014-03-23 19:08 ` [PATCH v7 09/22] Remove mm/filemap_xip.c Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-08 18:21   ` Jan Kara
2014-04-08 18:21     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 10/22] Remove get_xip_mem Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-08 18:20   ` Jan Kara
2014-04-08 18:20     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 11/22] Replace ext2_clear_xip_target with dax_clear_blocks Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09  9:46   ` Jan Kara
2014-04-09  9:46     ` Jan Kara
2014-04-10 14:16     ` Matthew Wilcox
2014-04-10 14:16       ` Matthew Wilcox
2014-04-10 18:31       ` Jan Kara
2014-04-10 18:31         ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 12/22] ext2: Remove ext2_xip_verify_sb() Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09  9:52   ` Jan Kara
2014-04-09  9:52     ` Jan Kara
2014-04-10 14:22     ` Matthew Wilcox
2014-04-10 14:22       ` Matthew Wilcox
2014-04-10 18:35       ` Jan Kara
2014-04-10 18:35         ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 13/22] ext2: Remove ext2_use_xip Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09  9:55   ` Jan Kara
2014-04-09  9:55     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 14/22] ext2: Remove xip.c and xip.h Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09  9:59   ` Jan Kara
2014-04-09  9:59     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 15/22] Remove CONFIG_EXT2_FS_XIP and rename CONFIG_FS_XIP to CONFIG_FS_DAX Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09  9:59   ` Jan Kara
2014-04-09  9:59     ` Jan Kara
2014-04-10 14:23     ` Matthew Wilcox
2014-04-10 14:23       ` Matthew Wilcox
2014-03-23 19:08 ` [PATCH v7 16/22] ext2: Remove ext2_aops_xip Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09 10:02   ` Jan Kara
2014-04-09 10:02     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 17/22] Get rid of most mentions of XIP in ext2 Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09 10:04   ` Jan Kara
2014-04-09 10:04     ` Jan Kara
2014-04-10 14:26     ` Matthew Wilcox
2014-04-10 14:26       ` Matthew Wilcox
2014-04-10 18:40       ` Jan Kara
2014-04-10 18:40         ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 18/22] xip: Add xip_zero_page_range Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09 10:15   ` Jan Kara
2014-04-09 10:15     ` Jan Kara
2014-04-10 14:27     ` Matthew Wilcox
2014-04-10 14:27       ` Matthew Wilcox
2014-04-10 18:43       ` Jan Kara
2014-04-10 18:43         ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 19/22] ext4: Make ext4_block_zero_page_range static Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-03-24 19:11   ` tytso
2014-03-24 19:11     ` tytso
2014-03-23 19:08 ` [PATCH v7 20/22] ext4: Add DAX functionality Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09 12:17   ` Jan Kara
2014-04-09 12:17     ` Jan Kara
2014-03-23 19:08 ` [PATCH v7 21/22] ext4: Fix typos Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-03-24 19:16   ` tytso
2014-03-24 19:16     ` tytso
2014-03-23 19:08 ` [PATCH v7 22/22] brd: Rename XIP to DAX Matthew Wilcox
2014-03-23 19:08   ` Matthew Wilcox
2014-04-09 10:07   ` Jan Kara
2014-04-09 10:07     ` Jan Kara
2014-05-18 14:58 ` [PATCH v7 00/22] Support ext4 on NV-DIMMs Boaz Harrosh
2014-05-18 14:58   ` Boaz Harrosh
2014-05-18 23:24   ` Matthew Wilcox
2014-05-18 23:24     ` Matthew Wilcox
2014-06-17 18:11 ` Boaz Harrosh
2014-06-17 18:11   ` Boaz Harrosh
2014-06-17 18:19   ` Matthew Wilcox
2014-06-17 18:19     ` Matthew Wilcox
2014-06-17 18:39     ` Boaz Harrosh
2014-06-17 18:39       ` Boaz Harrosh

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140729212333.GO6754@linux.intel.com \
    --to=willy@linux.intel.com \
    --cc=jack@suse.cz \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=matthew.r.wilcox@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.