Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp900613pxb; Tue, 9 Feb 2021 16:04:48 -0800 (PST) X-Google-Smtp-Source: ABdhPJysCH7bpo2luksP7xFwkmr3+69GtOghRZhknTprnuhv2nULmMe8vZvZN2sBExEn0ctez7GQ X-Received: by 2002:a50:9f4e:: with SMTP id b72mr719785edf.4.1612915488265; Tue, 09 Feb 2021 16:04:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612915488; cv=none; d=google.com; s=arc-20160816; b=GvGaxutzb7DXeDYpxfOcsWlzy6bOSxH/xtmG12PwcsC62xCbRLLkApPO1ZdPK+SN9m Kh2vhyAofEecC+JKUx911JxMjSB/PvsibgJg58JsgHDiNmPrLZajE8GIcET9qUE2huHd GHoI51fFGLwX0V/E1VmMPcagrXvAfTrvdnmvEHJRatucVF6qBxr6o9x5JeA8OnfUpcXK sc1IV8NGUVe1vXqknAtQLmSVyCOxOTSXjesZBvFR2txAAv+4LvDPA4oPzzEh6otZxnbP zU+8mqpC8KEwxZicMZPGboYeylF9k3FlmksvThlXzOkAAPLRZUGEs9+W3a8ITdHcrpBc LpvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=KBYkXt82f/1bFmzTmst2qwcRobVSa7T/8qXnCBgQRaU=; b=ayHVrdK998CFjKBWstsgJYEoe5mObKEqJgvFBn7UZWPZ9gUDoDzkClS0mlcv2Tgibk QOemX9mdAzB7P6y0WsDbngZbOfEBeZSTTj16pN5kRTfBuVLCW5sUqgFTF/x1iNVvBoYF pcrlKKXE6NfsmlIPm9BG7Q/ANucA+62GFLBifd4dt6EDePD9B2azGOsm4LNtXk7oESGy t3H7cUoA709oaHy9Fi9HJc2+5S0ci28MjSi2j+LT6t00neJ8Ce0mGMD2kaFG7ZW2arcs hTUqnU8U1JDkqhREBvMEIdlCovfWD5zNa6QKXslrJRFretqwBhE96b+S4EblGd82LuwX kSlg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cq1si251765edb.13.2021.02.09.16.04.25; Tue, 09 Feb 2021 16:04:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234695AbhBJACP (ORCPT + 99 others); Tue, 9 Feb 2021 19:02:15 -0500 Received: from mx2.suse.de ([195.135.220.15]:45416 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233712AbhBIUgg (ORCPT ); Tue, 9 Feb 2021 15:36:36 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 49802B146; Tue, 9 Feb 2021 20:31:27 +0000 (UTC) From: Michal Rostecki To: Chris Mason , Josef Bacik , David Sterba , linux-btrfs@vger.kernel.org (open list:BTRFS FILE SYSTEM), linux-kernel@vger.kernel.org (open list) Cc: Michal Rostecki Subject: [PATCH RFC 5/6] btrfs: sysfs: Add directory for read policies Date: Tue, 9 Feb 2021 21:30:39 +0100 Message-Id: <20210209203041.21493-6-mrostecki@suse.de> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210209203041.21493-1-mrostecki@suse.de> References: <20210209203041.21493-1-mrostecki@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michal Rostecki Before this change, raid1 read policy could be selected by using the /sys/fs/btrfs/[fsid]/read_policy file. Change it to /sys/fs/btrfs/[fsid]/read_policies/policy. The motivation behing creating the read_policies directory is that the next changes and new read policies are going to intruduce settings specific to read policies. Signed-off-by: Michal Rostecki --- fs/btrfs/sysfs.c | 51 +++++++++++++++++++++++++++++++++------------- fs/btrfs/volumes.h | 1 + 2 files changed, 38 insertions(+), 14 deletions(-) diff --git a/fs/btrfs/sysfs.c b/fs/btrfs/sysfs.c index 19b9fffa2c9c..a8f528eb4e50 100644 --- a/fs/btrfs/sysfs.c +++ b/fs/btrfs/sysfs.c @@ -896,6 +896,19 @@ static ssize_t btrfs_generation_show(struct kobject *kobj, } BTRFS_ATTR(, generation, btrfs_generation_show); +static const struct attribute *btrfs_attrs[] = { + BTRFS_ATTR_PTR(, label), + BTRFS_ATTR_PTR(, nodesize), + BTRFS_ATTR_PTR(, sectorsize), + BTRFS_ATTR_PTR(, clone_alignment), + BTRFS_ATTR_PTR(, quota_override), + BTRFS_ATTR_PTR(, metadata_uuid), + BTRFS_ATTR_PTR(, checksum), + BTRFS_ATTR_PTR(, exclusive_operation), + BTRFS_ATTR_PTR(, generation), + NULL, +}; + /* * Look for an exact string @string in @buffer with possible leading or * trailing whitespace @@ -920,7 +933,7 @@ static const char * const btrfs_read_policy_name[] = { "pid" }; static ssize_t btrfs_read_policy_show(struct kobject *kobj, struct kobj_attribute *a, char *buf) { - struct btrfs_fs_devices *fs_devices = to_fs_devs(kobj); + struct btrfs_fs_devices *fs_devices = to_fs_devs(kobj->parent); ssize_t ret = 0; int i; @@ -944,7 +957,7 @@ static ssize_t btrfs_read_policy_store(struct kobject *kobj, struct kobj_attribute *a, const char *buf, size_t len) { - struct btrfs_fs_devices *fs_devices = to_fs_devs(kobj); + struct btrfs_fs_devices *fs_devices = to_fs_devs(kobj->parent); int i; for (i = 0; i < BTRFS_NR_READ_POLICY; i++) { @@ -961,19 +974,10 @@ static ssize_t btrfs_read_policy_store(struct kobject *kobj, return -EINVAL; } -BTRFS_ATTR_RW(, read_policy, btrfs_read_policy_show, btrfs_read_policy_store); +BTRFS_ATTR_RW(read_policies, policy, btrfs_read_policy_show, btrfs_read_policy_store); -static const struct attribute *btrfs_attrs[] = { - BTRFS_ATTR_PTR(, label), - BTRFS_ATTR_PTR(, nodesize), - BTRFS_ATTR_PTR(, sectorsize), - BTRFS_ATTR_PTR(, clone_alignment), - BTRFS_ATTR_PTR(, quota_override), - BTRFS_ATTR_PTR(, metadata_uuid), - BTRFS_ATTR_PTR(, checksum), - BTRFS_ATTR_PTR(, exclusive_operation), - BTRFS_ATTR_PTR(, generation), - BTRFS_ATTR_PTR(, read_policy), +static const struct attribute *read_policies_attrs[] = { + BTRFS_ATTR_PTR(read_policies, policy), NULL, }; @@ -1112,6 +1116,12 @@ void btrfs_sysfs_remove_mounted(struct btrfs_fs_info *fs_info) sysfs_remove_link(fsid_kobj, "bdi"); + if (fs_info->fs_devices->read_policies_kobj) { + sysfs_remove_files(fs_info->fs_devices->read_policies_kobj, + read_policies_attrs); + kobject_del(fs_info->fs_devices->read_policies_kobj); + kobject_put(fs_info->fs_devices->read_policies_kobj); + } if (fs_info->space_info_kobj) { sysfs_remove_files(fs_info->space_info_kobj, allocation_attrs); kobject_del(fs_info->space_info_kobj); @@ -1658,6 +1668,19 @@ int btrfs_sysfs_add_mounted(struct btrfs_fs_info *fs_info) if (error) goto failure; + fs_devs->read_policies_kobj = kobject_create_and_add("read_policies", + fsid_kobj); + + if (!fs_devs->read_policies_kobj) { + error = -ENOMEM; + goto failure; + } + + error = sysfs_create_files(fs_devs->read_policies_kobj, + read_policies_attrs); + if (error) + goto failure; + return 0; failure: btrfs_sysfs_remove_mounted(fs_info); diff --git a/fs/btrfs/volumes.h b/fs/btrfs/volumes.h index 594f1207281c..ee050fd48042 100644 --- a/fs/btrfs/volumes.h +++ b/fs/btrfs/volumes.h @@ -287,6 +287,7 @@ struct btrfs_fs_devices { struct kobject fsid_kobj; struct kobject *devices_kobj; struct kobject *devinfo_kobj; + struct kobject *read_policies_kobj; struct completion kobj_unregister; enum btrfs_chunk_allocation_policy chunk_alloc_policy; -- 2.30.0