Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.0 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6E3F2C04EB9 for ; Mon, 3 Dec 2018 17:58:28 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 2675820672 for ; Mon, 3 Dec 2018 17:58:28 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="lBqr/F5f" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 2675820672 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726615AbeLCR63 (ORCPT ); Mon, 3 Dec 2018 12:58:29 -0500 Received: from mail-ua1-f68.google.com ([209.85.222.68]:42155 "EHLO mail-ua1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726014AbeLCR63 (ORCPT ); Mon, 3 Dec 2018 12:58:29 -0500 Received: by mail-ua1-f68.google.com with SMTP id d21so4745562uap.9; Mon, 03 Dec 2018 09:58:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=o1OLVLFJA3brp+hYWtKoFZ7N/rYlMDkbKUr5VGkltss=; b=lBqr/F5fdAsqH6BvH+0wiByTIj6ITvBDbtxNA94kAUIPewU69oy87ybjq3KwuGqJev yN/KHojmnUVZldSAaHN1hF7Irza8IuBMdIoWA/o1OF/G6p+3yBearHcczsjbazPl2Pog vdI67khjiivC43ziIG+7OuK4hIOPBlmxwHVf3H0mmriEGidrsqSa3zUn/S2M3uEobaSl KyUD5K+V3c7dydK7a1rZQL9hDiFt1Le+fTeEo71ofkHw+M52QNxlZhTFzZdpJIgm2E0v WJ0WU2c8jVP+5FZ0TzWfR2Q/JJlQQ2XoLlv3SXxJ7grUpO4yTjRAQHM+CBkTNd5Kqcq9 pnBQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=o1OLVLFJA3brp+hYWtKoFZ7N/rYlMDkbKUr5VGkltss=; b=jk4jWkUiVCDyWy0O72DfUl/X0R/h5ZT+RSIRtUjRDZdjUUpwbpNw10CmNfCLRqZX76 bRq/9urNzVZ+vqoBwHKALMO9STYuJX20hjkQxaaT97zxRcissIXUwJrC7etXZRpdzeeJ ZhEBCC7QImRQk9iV+GTvv5J4tTDlzlK1CYg/G2CEKUu9P9Hrkcj9ilfoTzmaW0mrQpli g78Er3qKftYtkWcMNvBOinxLH4u+0GYo5IVnLmAB1D8Rg9/ysTdkVQOSauqSNr/raIMS BbVix8zpYvak1fMnJKD00PNQH0yV9SRovbZtJwudmwn+1E52Xv6OnEFJviF/LjyCQJCC vv1Q== X-Gm-Message-State: AA+aEWaJL/M2GLDGJLhEXj5TOpny9GdJZiAhVupcn5rF199NXo4ve6X4 Vfvw1cWq3rTCsO4ehYBy7KFLpenI1ab+vw9QhMoP3A== X-Google-Smtp-Source: AFSGD/XWTtOuGWH4zyCDDqgnElfL6K3DIsisYNMrNqQ5LKNMs7oLKk4/7hzrlRbVQU0uAfeACiaUv8cPIadYicuqEhA= X-Received: by 2002:ab0:aa:: with SMTP id 39mr7385655uaj.120.1543859901582; Mon, 03 Dec 2018 09:58:21 -0800 (PST) MIME-Version: 1.0 References: <20181203083416.28978-1-david@fromorbit.com> <20181203083416.28978-10-david@fromorbit.com> In-Reply-To: <20181203083416.28978-10-david@fromorbit.com> From: Olga Kornievskaia Date: Mon, 3 Dec 2018 12:58:09 -0500 Message-ID: Subject: Re: [PATCH 09/11] vfs: push copy_file_ranges -EXDEV checks down To: david@fromorbit.com Cc: linux-fsdevel@vger.kernel.org, linux-xfs@vger.kernel.org, linux-nfs , linux-unionfs@vger.kernel.org, ceph-devel@vger.kernel.org, linux-cifs@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Mon, Dec 3, 2018 at 3:34 AM Dave Chinner wrote: > > From: Dave Chinner > > We want to enable cross-filesystem copy_file_range functionality > where possible, so push the "same superblock only" checks down to > the individual filesystem callouts so they can make their own > decisions about cross-superblock copy offload. > > Signed-off-by: Dave Chinner Overall VFS/NFS bits look good to me. I'm re-basing my client and server patch series on top of this and will test it out. Thank you. > --- > fs/ceph/file.c | 4 +++- > fs/cifs/cifsfs.c | 8 +++++++- > fs/fuse/file.c | 5 ++++- > fs/nfs/nfs4file.c | 16 ++++++++++------ > fs/overlayfs/file.c | 10 +++++++++- > fs/read_write.c | 10 ++++------ > 6 files changed, 37 insertions(+), 16 deletions(-) > > diff --git a/fs/ceph/file.c b/fs/ceph/file.c > index cf29f0410dcb..eb876e19c1dc 100644 > --- a/fs/ceph/file.c > +++ b/fs/ceph/file.c > @@ -1905,6 +1905,8 @@ static ssize_t __ceph_copy_file_range(struct file *src_file, loff_t src_off, > > if (src_inode == dst_inode) > return -EINVAL; > + if (src_inode->i_sb != dst_inode->i_sb) > + return -EXDEV; > if (ceph_snap(dst_inode) != CEPH_NOSNAP) > return -EROFS; > > @@ -2105,7 +2107,7 @@ static ssize_t ceph_copy_file_range(struct file *src_file, loff_t src_off, > ret = __ceph_copy_file_range(src_file, src_off, dst_file, dst_off, > len, flags); > > - if (ret == -EOPNOTSUPP) > + if (ret == -EOPNOTSUPP || ret == -EXDEV) > ret = generic_copy_file_range(src_file, src_off, dst_file, > dst_off, len, flags); > return ret; > diff --git a/fs/cifs/cifsfs.c b/fs/cifs/cifsfs.c > index 5ef4baec6234..03e4b9eacbd1 100644 > --- a/fs/cifs/cifsfs.c > +++ b/fs/cifs/cifsfs.c > @@ -1072,6 +1072,12 @@ ssize_t cifs_file_copychunk_range(unsigned int xid, > goto out; > } > > + if (src_inode->i_sb != target_inode->i_sb) { > + rc = -EXDEV; > + goto out; > + } > + > + > if (!src_file->private_data || !dst_file->private_data) { > rc = -EBADF; > cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); > @@ -1142,7 +1148,7 @@ static ssize_t cifs_copy_file_range(struct file *src_file, loff_t off, > len, flags); > free_xid(xid); > > - if (rc == -EOPNOTSUPP) > + if (rc == -EOPNOTSUPP || rc == -EXDEV) > rc = generic_copy_file_range(src_file, off, dst_file, > destoff, len, flags); > return rc; > diff --git a/fs/fuse/file.c b/fs/fuse/file.c > index b86fb0298739..0758f831a4eb 100644 > --- a/fs/fuse/file.c > +++ b/fs/fuse/file.c > @@ -3053,6 +3053,9 @@ static ssize_t __fuse_copy_file_range(struct file *file_in, loff_t pos_in, > if (fc->no_copy_file_range) > return -EOPNOTSUPP; > > + if (file_inode(file_in)->i_sb != file_inode(file_out)->i_sb) > + return -EXDEV; > + > inode_lock(inode_out); > > if (fc->writeback_cache) { > @@ -3109,7 +3112,7 @@ static ssize_t fuse_copy_file_range(struct file *src_file, loff_t src_off, > ret = __fuse_copy_file_range(src_file, src_off, dst_file, dst_off, > len, flags); > > - if (ret == -EOPNOTSUPP) > + if (ret == -EOPNOTSUPP || ret == -EXDEV) > ret = generic_copy_file_range(src_file, src_off, dst_file, > dst_off, len, flags); > return ret; > diff --git a/fs/nfs/nfs4file.c b/fs/nfs/nfs4file.c > index d7766a6eb0f4..4783c0c1c49e 100644 > --- a/fs/nfs/nfs4file.c > +++ b/fs/nfs/nfs4file.c > @@ -133,16 +133,20 @@ static ssize_t nfs4_copy_file_range(struct file *file_in, loff_t pos_in, > struct file *file_out, loff_t pos_out, > size_t count, unsigned int flags) > { > - ssize_t ret; > + ssize_t ret = -EXDEV; > > if (file_inode(file_in) == file_inode(file_out)) > return -EINVAL; > -retry: > - ret = nfs42_proc_copy(file_in, pos_in, file_out, pos_out, count); > - if (ret == -EAGAIN) > - goto retry; > > - if (ret == -EOPNOTSUPP) > + /* only offload copy if superblock is the same */ > + if (file_inode(file_in)->i_sb == file_inode(file_out)->i_sb) { > + do { > + ret = nfs42_proc_copy(file_in, pos_in, file_out, > + pos_out, count); > + } while (ret == -EAGAIN); > + } > + > + if (ret == -EOPNOTSUPP || ret == -EXDEV) > ret = generic_copy_file_range(file_in, pos_in, file_out, > pos_out, count, flags); > return ret; > diff --git a/fs/overlayfs/file.c b/fs/overlayfs/file.c > index 68736e5d6a56..34fb0398d016 100644 > --- a/fs/overlayfs/file.c > +++ b/fs/overlayfs/file.c > @@ -443,6 +443,14 @@ static loff_t ovl_copyfile(struct file *file_in, loff_t pos_in, > const struct cred *old_cred; > loff_t ret; > > + /* > + * Temporary. Cross device copy checks should be left to the copy file > + * call on the real inodes, but existing behaviour checks the upper > + * files only. > + */ > + if (file_inode(file_in)->i_sb != file_inode(file_out)->i_sb) > + return -EXDEV; > + > ret = ovl_real_fdget(file_out, &real_out); > if (ret) > return ret; > @@ -491,7 +499,7 @@ static ssize_t ovl_copy_file_range(struct file *file_in, loff_t pos_in, > ret = ovl_copyfile(file_in, pos_in, file_out, pos_out, len, flags, > OVL_COPY); > > - if (ret == -EOPNOTSUPP) > + if (ret == -EOPNOTSUPP || ret == -EXDEV) > ret = generic_copy_file_range(file_in, pos_in, file_out, > pos_out, len, flags); > return ret; > diff --git a/fs/read_write.c b/fs/read_write.c > index 174cf92eea1d..4e0666de0d69 100644 > --- a/fs/read_write.c > +++ b/fs/read_write.c > @@ -1565,6 +1565,10 @@ ssize_t generic_copy_file_range(struct file *file_in, loff_t pos_in, > struct file *file_out, loff_t pos_out, > size_t len, unsigned int flags) > { > + /* Temporary, do_splice_direct supports cross-sb copies */ > + if (file_inode(file_in)->i_sb != file_inode(file_out)->i_sb) > + return -EXDEV; > + > return do_splice_direct(file_in, &pos_in, file_out, &pos_out, > len > MAX_RW_COUNT ? MAX_RW_COUNT : len, 0); > } > @@ -1611,17 +1615,11 @@ ssize_t vfs_copy_file_range(struct file *file_in, loff_t pos_in, > struct file *file_out, loff_t pos_out, > size_t len, unsigned int flags) > { > - struct inode *inode_in = file_inode(file_in); > - struct inode *inode_out = file_inode(file_out); > ssize_t ret; > > if (flags != 0) > return -EINVAL; > > - /* this could be relaxed once a method supports cross-fs copies */ > - if (inode_in->i_sb != inode_out->i_sb) > - return -EXDEV; > - > ret = generic_copy_file_checks(file_in, pos_in, file_out, pos_out, &len, > flags); > if (ret < 0) > -- > 2.19.1 >