Return-Path: Received: from mail-ig0-f172.google.com ([209.85.213.172]:38141 "EHLO mail-ig0-f172.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752410AbbH0GR4 (ORCPT ); Thu, 27 Aug 2015 02:17:56 -0400 Received: by ignq3 with SMTP id q3so1804705ign.1 for ; Wed, 26 Aug 2015 23:17:55 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <20150826224853.GW714@dastard> References: <1440577010-122867-1-git-send-email-tao.peng@primarydata.com> <1440577010-122867-6-git-send-email-tao.peng@primarydata.com> <20150826224853.GW714@dastard> From: Peng Tao Date: Thu, 27 Aug 2015 14:17:36 +0800 Message-ID: Subject: Re: [PATCH-RFC-RESEND 5/9] nfs42: add .copy_range file operation To: Dave Chinner Cc: Devel FS Linux , Trond Myklebust , Anna Schumaker , Christoph Hellwig , Zach Brown , Darren Hart , Bruce Fields , Jeff Layton , Linux NFS Mailing List , "Darrick J. Wong" , linux-btrfs@vger.kernel.org Content-Type: text/plain; charset=UTF-8 Sender: linux-nfs-owner@vger.kernel.org List-ID: On Thu, Aug 27, 2015 at 6:48 AM, Dave Chinner wrote: > On Wed, Aug 26, 2015 at 04:16:46PM +0800, Peng Tao wrote: >> Signed-off-by: Peng Tao >> --- >> fs/nfs/nfs4file.c | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ >> 1 file changed, 50 insertions(+) >> >> diff --git a/fs/nfs/nfs4file.c b/fs/nfs/nfs4file.c >> index dcd39d4..c335cb0 100644 >> --- a/fs/nfs/nfs4file.c >> +++ b/fs/nfs/nfs4file.c >> @@ -4,6 +4,7 @@ >> * Copyright (C) 1992 Rick Sladkey >> */ >> #include >> +#include >> #include >> #include >> #include "internal.h" >> @@ -166,6 +167,54 @@ static long nfs42_fallocate(struct file *filep, int mode, loff_t offset, loff_t >> return nfs42_proc_deallocate(filep, offset, len); >> return nfs42_proc_allocate(filep, offset, len); >> } >> + >> +static noinline int >> +nfs42_file_clone_range(struct file *src_file, struct file *dst_file, >> + loff_t src_off, size_t dst_off, loff_t count) >> +{ >> + struct inode *dst_inode = file_inode(dst_file); >> + struct inode *src_inode = file_inode(src_file); >> + int ret; >> + >> + /* src and dst must be different files */ >> + if (src_inode == dst_inode) >> + return -EINVAL; >> + >> + /* XXX: do we lock at all? what if server needs CB_RECALL_LAYOUT? */ >> + if (dst_inode < src_inode) { >> + mutex_lock_nested(&dst_inode->i_mutex, I_MUTEX_PARENT); >> + mutex_lock_nested(&src_inode->i_mutex, I_MUTEX_CHILD); >> + } else { >> + mutex_lock_nested(&src_inode->i_mutex, I_MUTEX_PARENT); >> + mutex_lock_nested(&dst_inode->i_mutex, I_MUTEX_CHILD); >> + } > > Is that safe? Between two operations, the inode code be reclaimed > and re-instantiated, resulting in the second operation having a > different locking order for the same files compared to the > first operation... Both files are still open so I don't think we need to worry about inode going away. > >> +out_unlock: >> + if (dst_inode < src_inode) { >> + mutex_unlock(&src_inode->i_mutex); >> + mutex_unlock(&dst_inode->i_mutex); >> + } else { >> + mutex_unlock(&dst_inode->i_mutex); >> + mutex_unlock(&src_inode->i_mutex); >> + } > > You don't have to care about lock order on unlock. Good point! Thanks, Tao