From patchwork Wed Oct 10 00:13:15 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Darrick J. Wong" X-Patchwork-Id: 10633561 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 0B11817E3 for ; Wed, 10 Oct 2018 00:13:23 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id EB5F0284C9 for ; Wed, 10 Oct 2018 00:13:22 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id DF11028C31; Wed, 10 Oct 2018 00:13:22 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 14F14284C9 for ; Wed, 10 Oct 2018 00:13:22 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 9FA0D6B0279; Tue, 9 Oct 2018 20:13:20 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id 97F8B6B027A; Tue, 9 Oct 2018 20:13:20 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7FBAA6B027B; Tue, 9 Oct 2018 20:13:20 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from mail-pf1-f199.google.com (mail-pf1-f199.google.com [209.85.210.199]) by kanga.kvack.org (Postfix) with ESMTP id 3533A6B0279 for ; Tue, 9 Oct 2018 20:13:20 -0400 (EDT) Received: by mail-pf1-f199.google.com with SMTP id f4-v6so3240763pff.2 for ; Tue, 09 Oct 2018 17:13:20 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:dkim-signature:subject:from:to:cc:date :message-id:in-reply-to:references:user-agent:mime-version :content-transfer-encoding; bh=neB4kQpFJgnl2vzLhhe4wDul9sX90AxeByw/6GBvuH8=; b=NZV5E7n0rygnuT9ad1pinscZXyprpp/bW5NRNhkBS0PwaUijiGSMWLZ1HFuVAm7Zxe 0CmR/UGB3gx1za++J9t52DWf5Qa825Mpfot8Vukj6foqjjY9MH/rEEF+8jaFNFN6C8hC 9LsB2gM/bOxEokSwO8etEwS1hnwiX+fWpKNsXn1q0bpHp4x5gFFJnXQNy7SecgRGVMr7 XzZ5EwcrgXgcT5CWz7uR4R2rGvzzPepRb62s4ZcoVAp9GgZAUOKqV+sHt9lhRJg+ITqv 2Sgtcl8h1VuACjQ90IAcvCuK+1iWbpU2QwLcM+o6mAfrpY+lGa+fZ2qIBqoHLq7pbzeb TtBg== X-Gm-Message-State: ABuFfoiL/vll3hX7xoR+RDj9qklXKsdPhGmJWTMnZ0iMS/VVwdDJmtg3 /law8Fmh6sEX5SF/ab5Np8wak41Q6qJoNA/N2o2L1exwWbgQgjYPUjGq0pHZPCIpDg3auioHlAs WavMNO4aq/EpxAYU27VwZmKouVhClxN+V9Lf/JUEhWnwPpSGTDtTPtFMmsDrCfrxHWQ== X-Received: by 2002:a63:ac56:: with SMTP id z22-v6mr27799412pgn.444.1539130399825; Tue, 09 Oct 2018 17:13:19 -0700 (PDT) X-Google-Smtp-Source: ACcGV62rziKrVRtr/c1qV5ActcnYj+Wg3iwVxc4rNXgXA671gp0gdBAebO9jRbdjXzJJRYGroLah X-Received: by 2002:a63:ac56:: with SMTP id z22-v6mr27799342pgn.444.1539130398806; Tue, 09 Oct 2018 17:13:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539130398; cv=none; d=google.com; s=arc-20160816; b=mkGzWLmTKlJqqmiMj5ObhhBfHbyZbtN8yD0MfK++RgYK0C32HBw8xR883WAGn1GQt+ 0JtgPFpmGUtFvJsj1pSvKy+iqIpxNt0aKmP4WFRD/eIYL3u80tLNwBTOsIuUuqOmnaBQ QN+LEbNN5t7eM+ydTLvsZkiz7ZNudAMBv2UI3ZNdPXOZ9/8WBn3e1dVR3fiik2eBcXrG 3jUrXn78/XTS9Az5z8J4P18Z2dLE+B1yvxWT6eUnu+/SHJe9ddueiWOtLrdZA+A3ofjL MiwI1BbPyy+6lY4RFc1LGr6u2eey9hdRgSbHS8maTUQxseiBY7BHK3iLVMzA4frz0JNb kVYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:user-agent:references :in-reply-to:message-id:date:cc:to:from:subject:dkim-signature; bh=neB4kQpFJgnl2vzLhhe4wDul9sX90AxeByw/6GBvuH8=; b=M/dlftuCE99zZZ4lwxH1AxMGfY1cmkkHnNORtUw1UYo8wXtsaUhY3Y0CHhrLlnib2U KQW5/maV+LSus4elOR6WLxDNn1fSZHv/wThiYXv2+A9PhBFfpbQDqp/ARgjqTE7R0E8q NOBY4V7/ifAvYw4aJ6ah+K55+DJe8eKRofU6jKFeq0JhUpyWXAOzi5u4E00pDN+QIXHf D0L0aw6ouMNl5V9H9b+89i1BZyEDEi1A7mCqoM/CNLZVSJ2xeBTyCbxJUbtcDuIQAp7t hxdKB9BVHKs/DHzC/vpdIeGr2stQJq6MuFXBTixzD8LEeYlCVLJmGY1oZA1oP1jkv/PH 7zqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b=kTu3TOIy; spf=pass (google.com: domain of darrick.wong@oracle.com designates 156.151.31.86 as permitted sender) smtp.mailfrom=darrick.wong@oracle.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from userp2130.oracle.com (userp2130.oracle.com. [156.151.31.86]) by mx.google.com with ESMTPS id w18-v6si5814963pfg.70.2018.10.09.17.13.18 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 09 Oct 2018 17:13:18 -0700 (PDT) Received-SPF: pass (google.com: domain of darrick.wong@oracle.com designates 156.151.31.86 as permitted sender) client-ip=156.151.31.86; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b=kTu3TOIy; spf=pass (google.com: domain of darrick.wong@oracle.com designates 156.151.31.86 as permitted sender) smtp.mailfrom=darrick.wong@oracle.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w9A08irK119775; Wed, 10 Oct 2018 00:13:18 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : from : to : cc : date : message-id : in-reply-to : references : mime-version : content-type : content-transfer-encoding; s=corp-2018-07-02; bh=neB4kQpFJgnl2vzLhhe4wDul9sX90AxeByw/6GBvuH8=; b=kTu3TOIyPNzDLWrJ2HB1cStUwxbF5jCW2hd7eAVLBPGm253NlxZPTKmXlGMc0ujVW5m9 RzczClO3Zrj/qfvYc0k89LoUA8xOuEaOvypP3Vyx5R/5FNTD2XAuKxBDur2skYzVyb91 CPJ/sxVAOTSf7Rd/O6ri5qix46X9ZHVjUYTakWPoC1YC4+QyHSHdhpgvZLeetyz8PTds CeGdrx0k6UJhj+3ECh7E0ypNt5YAbhFDElYgssjfHHOHf0wHptM9OB3QgmsjU8oQwly1 1iPJR73j3b8wwURfpPy5QXr20kFbeCmV11LwIb5p5Ap4WpB97k+CGlmtQE5JM3Mgo6Hl CQ== Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp2130.oracle.com with ESMTP id 2mxmftrvnw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 10 Oct 2018 00:13:18 +0000 Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w9A0DGan003420 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 10 Oct 2018 00:13:17 GMT Received: from abhmp0010.oracle.com (abhmp0010.oracle.com [141.146.116.16]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w9A0DG62005491; Wed, 10 Oct 2018 00:13:16 GMT Received: from localhost (/10.159.249.114) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 10 Oct 2018 00:13:16 +0000 Subject: [PATCH 12/25] vfs: pass remap flags to generic_remap_file_range_prep From: "Darrick J. Wong" To: david@fromorbit.com, darrick.wong@oracle.com Cc: sandeen@redhat.com, linux-nfs@vger.kernel.org, linux-cifs@vger.kernel.org, linux-unionfs@vger.kernel.org, linux-xfs@vger.kernel.org, linux-mm@kvack.org, linux-btrfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, ocfs2-devel@oss.oracle.com Date: Tue, 09 Oct 2018 17:13:15 -0700 Message-ID: <153913039499.32295.9599862851836900251.stgit@magnolia> In-Reply-To: <153913023835.32295.13962696655740190941.stgit@magnolia> References: <153913023835.32295.13962696655740190941.stgit@magnolia> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9041 signatures=668706 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1810100000 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: X-Virus-Scanned: ClamAV using ClamSMTP From: Darrick J. Wong Plumb the remap flags through the filesystem from the vfs function dispatcher all the way to the prep function to prepare for behavior changes in subsequent patches. Signed-off-by: Darrick J. Wong --- fs/ocfs2/file.c | 2 +- fs/ocfs2/refcounttree.c | 6 +++--- fs/ocfs2/refcounttree.h | 2 +- fs/read_write.c | 10 ++++++---- fs/xfs/xfs_file.c | 2 +- fs/xfs/xfs_reflink.c | 15 ++++++++------- fs/xfs/xfs_reflink.h | 3 ++- include/linux/fs.h | 5 +++-- 8 files changed, 25 insertions(+), 20 deletions(-) diff --git a/fs/ocfs2/file.c b/fs/ocfs2/file.c index 5da278edf189..ca41e69c8e68 100644 --- a/fs/ocfs2/file.c +++ b/fs/ocfs2/file.c @@ -2535,7 +2535,7 @@ static int ocfs2_remap_file_range(struct file *file_in, unsigned int flags) { return ocfs2_reflink_remap_range(file_in, pos_in, file_out, pos_out, - len, flags & RFR_IDENTICAL_DATA); + len, flags); } const struct inode_operations ocfs2_file_iops = { diff --git a/fs/ocfs2/refcounttree.c b/fs/ocfs2/refcounttree.c index ee1ed11379b3..270a5b1919f6 100644 --- a/fs/ocfs2/refcounttree.c +++ b/fs/ocfs2/refcounttree.c @@ -4825,7 +4825,7 @@ int ocfs2_reflink_remap_range(struct file *file_in, struct file *file_out, loff_t pos_out, u64 len, - bool is_dedupe) + unsigned int remap_flags) { struct inode *inode_in = file_inode(file_in); struct inode *inode_out = file_inode(file_out); @@ -4851,7 +4851,7 @@ int ocfs2_reflink_remap_range(struct file *file_in, goto out_unlock; ret = generic_remap_file_range_prep(file_in, pos_in, file_out, pos_out, - &len, is_dedupe); + &len, remap_flags); if (ret <= 0) goto out_unlock; @@ -4859,7 +4859,7 @@ int ocfs2_reflink_remap_range(struct file *file_in, * Update inode timestamps and remove security privileges before we * take the ilock. */ - ret = generic_remap_file_range_touch(file_out, is_dedupe); + ret = generic_remap_file_range_touch(file_out, remap_flags); if (ret) goto out_unlock; diff --git a/fs/ocfs2/refcounttree.h b/fs/ocfs2/refcounttree.h index 4af55bf4b35b..d2c5f526edff 100644 --- a/fs/ocfs2/refcounttree.h +++ b/fs/ocfs2/refcounttree.h @@ -120,6 +120,6 @@ int ocfs2_reflink_remap_range(struct file *file_in, struct file *file_out, loff_t pos_out, u64 len, - bool is_dedupe); + unsigned int remap_flags); #endif /* OCFS2_REFCOUNTTREE_H */ diff --git a/fs/read_write.c b/fs/read_write.c index 020bb7fdf431..47174785a94f 100644 --- a/fs/read_write.c +++ b/fs/read_write.c @@ -1712,18 +1712,20 @@ static int remap_verify_area(struct file *file, loff_t pos, u64 len, bool write) /* * Check that the two inodes are eligible for cloning, the ranges make * sense, and then flush all dirty data. Caller must ensure that the - * inodes have been locked against any other modifications. + * inodes have been locked against any other modifications. This function + * takes RFR_* flags in remap_flags. * * Returns: 0 for "nothing to clone", 1 for "something to clone", or * the usual negative error code. */ int generic_remap_file_range_prep(struct file *file_in, loff_t pos_in, struct file *file_out, loff_t pos_out, - u64 *len, bool is_dedupe) + u64 *len, unsigned int remap_flags) { struct inode *inode_in = file_inode(file_in); struct inode *inode_out = file_inode(file_out); loff_t isize; + bool is_dedupe = (remap_flags & RFR_IDENTICAL_DATA); bool same_inode = (inode_in == inode_out); int ret; @@ -1791,12 +1793,12 @@ int generic_remap_file_range_prep(struct file *file_in, loff_t pos_in, EXPORT_SYMBOL(generic_remap_file_range_prep); /* Update inode timestamps and remove security privileges when remapping. */ -int generic_remap_file_range_touch(struct file *file, bool is_dedupe) +int generic_remap_file_range_touch(struct file *file, unsigned int remap_flags) { int ret; /* If can't alter the file contents, we're done. */ - if (is_dedupe) + if (remap_flags & RFR_IDENTICAL_DATA) return 0; /* Update the timestamps, since we can alter file contents. */ diff --git a/fs/xfs/xfs_file.c b/fs/xfs/xfs_file.c index 74ad73231ea4..4c0ae1efb63f 100644 --- a/fs/xfs/xfs_file.c +++ b/fs/xfs/xfs_file.c @@ -929,7 +929,7 @@ xfs_file_remap_range( unsigned int flags) { return xfs_reflink_remap_range(file_in, pos_in, file_out, pos_out, - len, flags & RFR_IDENTICAL_DATA); + len, flags); } STATIC int diff --git a/fs/xfs/xfs_reflink.c b/fs/xfs/xfs_reflink.c index 0d67b2d0b3d4..4f5e3923d9c2 100644 --- a/fs/xfs/xfs_reflink.c +++ b/fs/xfs/xfs_reflink.c @@ -921,10 +921,11 @@ xfs_reflink_update_dest( struct xfs_inode *dest, xfs_off_t newlen, xfs_extlen_t cowextsize, - bool is_dedupe) + unsigned int remap_flags) { struct xfs_mount *mp = dest->i_mount; struct xfs_trans *tp; + bool is_dedupe = (remap_flags & RFR_IDENTICAL_DATA); int error; if (is_dedupe && newlen <= i_size_read(VFS_I(dest)) && cowextsize == 0) @@ -1274,7 +1275,7 @@ xfs_reflink_remap_prep( struct file *file_out, loff_t pos_out, u64 *len, - bool is_dedupe) + unsigned int remap_flags) { struct inode *inode_in = file_inode(file_in); struct xfs_inode *src = XFS_I(inode_in); @@ -1304,7 +1305,7 @@ xfs_reflink_remap_prep( goto out_unlock; ret = generic_remap_file_range_prep(file_in, pos_in, file_out, pos_out, - len, is_dedupe); + len, remap_flags); if (ret <= 0) goto out_unlock; @@ -1334,7 +1335,7 @@ xfs_reflink_remap_prep( * Update inode timestamps and remove security privileges before we * take the ilock. */ - ret = generic_remap_file_range_touch(file_out, is_dedupe); + ret = generic_remap_file_range_touch(file_out, remap_flags); if (ret) goto out_unlock; @@ -1354,7 +1355,7 @@ xfs_reflink_remap_range( struct file *file_out, loff_t pos_out, u64 len, - bool is_dedupe) + unsigned int remap_flags) { struct inode *inode_in = file_inode(file_in); struct xfs_inode *src = XFS_I(inode_in); @@ -1374,7 +1375,7 @@ xfs_reflink_remap_range( /* Prepare and then clone file data. */ ret = xfs_reflink_remap_prep(file_in, pos_in, file_out, pos_out, - &len, is_dedupe); + &len, remap_flags); if (ret <= 0) return ret; @@ -1401,7 +1402,7 @@ xfs_reflink_remap_range( cowextsize = src->i_d.di_cowextsize; ret = xfs_reflink_update_dest(dest, pos_out + len, cowextsize, - is_dedupe); + remap_flags); out_unlock: xfs_reflink_remap_unlock(file_in, file_out); diff --git a/fs/xfs/xfs_reflink.h b/fs/xfs/xfs_reflink.h index c585ad9552b2..6f82d628bf17 100644 --- a/fs/xfs/xfs_reflink.h +++ b/fs/xfs/xfs_reflink.h @@ -28,7 +28,8 @@ extern int xfs_reflink_end_cow(struct xfs_inode *ip, xfs_off_t offset, xfs_off_t count); extern int xfs_reflink_recover_cow(struct xfs_mount *mp); extern int xfs_reflink_remap_range(struct file *file_in, loff_t pos_in, - struct file *file_out, loff_t pos_out, u64 len, bool is_dedupe); + struct file *file_out, loff_t pos_out, u64 len, + unsigned int remap_flags); extern int xfs_reflink_inode_has_shared_extents(struct xfs_trans *tp, struct xfs_inode *ip, bool *has_shared); extern int xfs_reflink_clear_inode_flag(struct xfs_inode *ip, diff --git a/include/linux/fs.h b/include/linux/fs.h index 661b9ef32d2b..0d9bdef0b4ea 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -1832,8 +1832,9 @@ extern ssize_t vfs_copy_file_range(struct file *, loff_t , struct file *, loff_t, size_t, unsigned int); extern int generic_remap_file_range_prep(struct file *file_in, loff_t pos_in, struct file *file_out, loff_t pos_out, - u64 *count, bool is_dedupe); -extern int generic_remap_file_range_touch(struct file *file, bool is_dedupe); + u64 *count, unsigned int remap_flags); +extern int generic_remap_file_range_touch(struct file *file, + unsigned int remap_flags); extern int do_clone_file_range(struct file *file_in, loff_t pos_in, struct file *file_out, loff_t pos_out, u64 len); extern int vfs_clone_file_range(struct file *file_in, loff_t pos_in,