Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1710575imm; Tue, 22 May 2018 08:11:03 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqXIOOF8Xd7H9TkmF3dQodo8p6ySmmd0Ebt+Dt/H074qppxOp7zZU3QbM0WYt10+wh+CZZf X-Received: by 2002:a63:6285:: with SMTP id w127-v6mr10148996pgb.164.1527001863157; Tue, 22 May 2018 08:11:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527001863; cv=none; d=google.com; s=arc-20160816; b=PzS1z1qDzE3Xc+JIPsQISrOVGtHh5VcHl2JQXOq+s9dWa2Gkip1rvX4eFrQqMXzPqQ 2cSJ9h05Xn4qC6r5qN/j4Elp1j1NK9zJwhK4TVTOzIA/vo47D0B/+uXimiQHEaSm7Wjc RBKKAAQJQQlc61wME2vOOBTre1IfBVXH84C4pUnHUoxf5WyHXAcuHSnma2ILHZcRVkQE ZKayJgMJ7sdyD7MqwoougCEkRJJNN/9zMI2RHgQJyJNwXRfZa/Zcao+obWH3cGZ+NCu/ e/j8YxkM0xlmL4hGsa4RdUVTDDHPVKsujE08vRteZfnluRtVX+6ChhNN/NnAaGwrkRhF vPXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=N/4byYSSLliv78JMXSBMYf7oIzfp8huq7aRC2UA5TA0=; b=eIu4Bkjv7zyYGwQ2vQimqUtdfnzrk1LDeccF3ba++AnwrVqjKTXLt36sITiFbjAGPf e7dShC+oBMwL7924nuNIqCbTq6e/ynqRGBETa5nOYeRf0mZlzDvaJeCCoRyGEFeEEq5k 1CNpo/CmAjcM6CdF+/k2IS60rm7+XNE3LtCZy+BZ2DSZk7+nm9ZsAgz+8EGviofJEuT0 4o8m6v7tWSO5bmilBvmn54rubMTYBqTODHVoGTeDxcH8Fxaoxp6CPphKiIqK3nT6KmJt NAEfbZQdPFsbglrE1waDrP7v0EBjYkP9a0x7JYhW/1VmOX48xjrLCfIvvhXKoU9YQ3i6 5meg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@wdc.com header.s=dkim.wdc.com header.b=jPIvUhMP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r6-v6si3049766pgp.482.2018.05.22.08.10.26; Tue, 22 May 2018 08:11:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@wdc.com header.s=dkim.wdc.com header.b=jPIvUhMP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752672AbeEVPJT (ORCPT + 99 others); Tue, 22 May 2018 11:09:19 -0400 Received: from esa6.hgst.iphmx.com ([216.71.154.45]:26472 "EHLO esa6.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752133AbeEVPH4 (ORCPT ); Tue, 22 May 2018 11:07:56 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1527001677; x=1558537677; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=xD9vQvnDnoL2ME+tPwa11Zq891diAkzgDE/0NRpKnhQ=; b=jPIvUhMPLz5ZAvpw1tjKdMikFWCXeuDFydj8adyqaYg8Jgo5+C+5//PI R3xPelp9CnjD/69T8RhtMD1BFNluFrNXuQ/u8qReVkRYi/mA1ihuq6G4M MBbxRaCbjCie+9PpdtNJPepfJglavyBRWAhv/Mf4SztbLDeFhph130u63 yde3RCWBbBnVQjHGfCucEK9hLPHzAedkCO85Li/gALi+vH/ddQORaV7en RF+l25emI3K8q4TcefIOjj6JxIeJjPwI6kWrqIN7Y/J47iZUzKhdK3ipw CFrAZFnYKjqcEhGQwq6t1g9f2nw/Zc+Z/mUDcB/3JRWTOxvt1lKJ32BGd A==; X-IronPort-AV: E=Sophos;i="5.49,430,1520870400"; d="scan'208";a="79548768" Received: from h199-255-45-14.hgst.com (HELO uls-op-cesaep01.wdc.com) ([199.255.45.14]) by ob1.hgst.iphmx.com with ESMTP; 22 May 2018 23:07:55 +0800 Received: from uls-op-cesaip02.wdc.com ([10.248.3.37]) by uls-op-cesaep01.wdc.com with ESMTP; 22 May 2018 07:58:50 -0700 Received: from penguito-adamm.sdcorp.global.sandisk.com ([10.11.47.13]) by uls-op-cesaip02.wdc.com with ESMTP; 22 May 2018 08:07:55 -0700 From: adam.manzanares@wdc.com To: viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, axboe@kernel.dk, bcrl@kvack.org Cc: tglx@linutronix.de, mingo@kernel.org, pombredanne@nexb.com, kstewart@linuxfoundation.org, gregkh@linuxfoundation.org, bigeasy@linutronix.de, jack@suse.cz, darrick.wong@oracle.com, rgoldwyn@suse.com, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-aio@kvack.org, linux-api@vger.kernel.org, hch@infradread.org, jmoyer@redhat.com, Adam Manzanares Subject: [PATCH v6 3/5] fs: Add aio iopriority support Date: Tue, 22 May 2018 08:07:35 -0700 Message-Id: <20180522150737.9893-4-adam.manzanares@wdc.com> X-Mailer: git-send-email 2.15.1 In-Reply-To: <20180522150737.9893-1-adam.manzanares@wdc.com> References: <20180522150737.9893-1-adam.manzanares@wdc.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Adam Manzanares This is the per-I/O equivalent of the ioprio_set system call. When IOCB_FLAG_IOPRIO is set on the iocb aio_flags field, then we set the newly added kiocb ki_ioprio field to the value in the iocb aio_reqprio field. This patch depends on block: add ioprio_check_cap function. Signed-off-by: Adam Manzanares Reviewed-by: Jeff Moyer Reviewed-by: Christoph Hellwig --- drivers/block/loop.c | 3 +++ fs/aio.c | 16 ++++++++++++++++ include/linux/fs.h | 3 +++ include/uapi/linux/aio_abi.h | 1 + 4 files changed, 23 insertions(+) diff --git a/drivers/block/loop.c b/drivers/block/loop.c index 5d4e31655d96..dd98dfd97f5e 100644 --- a/drivers/block/loop.c +++ b/drivers/block/loop.c @@ -76,6 +76,8 @@ #include #include #include +#include + #include "loop.h" #include @@ -559,6 +561,7 @@ static int lo_rw_aio(struct loop_device *lo, struct loop_cmd *cmd, cmd->iocb.ki_filp = file; cmd->iocb.ki_complete = lo_rw_aio_complete; cmd->iocb.ki_flags = IOCB_DIRECT; + cmd->iocb.ki_ioprio = IOPRIO_PRIO_VALUE(IOPRIO_CLASS_NONE, 0); if (cmd->css) kthread_associate_blkcg(cmd->css); diff --git a/fs/aio.c b/fs/aio.c index 755d3f57bcc8..8225013f70f0 100644 --- a/fs/aio.c +++ b/fs/aio.c @@ -1451,6 +1451,22 @@ static int aio_prep_rw(struct kiocb *req, struct iocb *iocb) if (iocb->aio_flags & IOCB_FLAG_RESFD) req->ki_flags |= IOCB_EVENTFD; req->ki_hint = file_write_hint(req->ki_filp); + if (iocb->aio_flags & IOCB_FLAG_IOPRIO) { + /* + * If the IOCB_FLAG_IOPRIO flag of aio_flags is set, then + * aio_reqprio is interpreted as an I/O scheduling + * class and priority. + */ + ret = ioprio_check_cap(iocb->aio_reqprio); + if (ret) { + pr_debug("aio ioprio check cap error\n"); + return -EINVAL; + } + + req->ki_ioprio = iocb->aio_reqprio; + } else + req->ki_ioprio = IOPRIO_PRIO_VALUE(IOPRIO_CLASS_NONE, 0); + ret = kiocb_set_rw_flags(req, iocb->aio_rw_flags); if (unlikely(ret)) fput(req->ki_filp); diff --git a/include/linux/fs.h b/include/linux/fs.h index 50de40dbbb85..73b749ed3ea1 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -36,6 +36,7 @@ #include #include #include +#include #include #include @@ -302,6 +303,7 @@ struct kiocb { void *private; int ki_flags; u16 ki_hint; + u16 ki_ioprio; /* See linux/ioprio.h */ } __randomize_layout; static inline bool is_sync_kiocb(struct kiocb *kiocb) @@ -1942,6 +1944,7 @@ static inline void init_sync_kiocb(struct kiocb *kiocb, struct file *filp) .ki_filp = filp, .ki_flags = iocb_flags(filp), .ki_hint = ki_hint_validate(file_write_hint(filp)), + .ki_ioprio = IOPRIO_PRIO_VALUE(IOPRIO_CLASS_NONE, 0), }; } diff --git a/include/uapi/linux/aio_abi.h b/include/uapi/linux/aio_abi.h index 2c0a3415beee..d4e768d55d14 100644 --- a/include/uapi/linux/aio_abi.h +++ b/include/uapi/linux/aio_abi.h @@ -55,6 +55,7 @@ enum { * is valid. */ #define IOCB_FLAG_RESFD (1 << 0) +#define IOCB_FLAG_IOPRIO (1 << 1) /* read() from /dev/aio returns these structures. */ struct io_event { -- 2.15.1