> -----Original Message-----
> From: Amir Goldstein <amir7...@gmail.com>
> Sent: Tuesday, June 3, 2025 6:57 PM
> To: wangtao <tao.wang...@honor.com>
> Cc: sumit.sem...@linaro.org; christian.koe...@amd.com;
> kra...@redhat.com; vivek.kasire...@intel.com; v...@zeniv.linux.org.uk;
> brau...@kernel.org; hu...@google.com; a...@linux-foundation.org;
> benjamin.gaign...@collabora.com; brian.star...@arm.com;
> jstu...@google.com; tjmerc...@google.com; j...@suse.cz;
> baolin.w...@linux.alibaba.com; linux-me...@vger.kernel.org; dri-
> de...@lists.freedesktop.org; linaro-mm-...@lists.linaro.org; linux-
> ker...@vger.kernel.org; linux-fsde...@vger.kernel.org; linux-
> m...@kvack.org; wangbintian(BintianWang) <bintian.w...@honor.com>;
> yipengxiang <yipengxi...@honor.com>; liulu 00013167
> <liulu....@honor.com>; hanfeng 00012985 <feng....@honor.com>
> Subject: Re: [PATCH v4 1/4] fs: allow cross-FS copy_file_range for memory
> file with direct I/O
> 
> On Tue, Jun 3, 2025 at 11:53 AM wangtao <tao.wang...@honor.com> wrote:
> >
> > Memory files can optimize copy performance via copy_file_range callbacks:
> > -Compared to mmap&read: reduces GUP (get_user_pages) overhead
> > -Compared to sendfile/splice: eliminates one memory copy -Supports
> > dma-buf direct I/O zero-copy implementation
> >
> > Suggested by: Christian König <christian.koe...@amd.com> Suggested by:
> > Amir Goldstein <amir7...@gmail.com>
> > Signed-off-by: wangtao <tao.wang...@honor.com>
> > ---
> >  fs/read_write.c    | 64 +++++++++++++++++++++++++++++++++++++-----
> ----
> >  include/linux/fs.h |  2 ++
> >  2 files changed, 54 insertions(+), 12 deletions(-)
> >
> > diff --git a/fs/read_write.c b/fs/read_write.c index
> > bb0ed26a0b3a..ecb4f753c632 100644
> > --- a/fs/read_write.c
> > +++ b/fs/read_write.c
> > @@ -1469,6 +1469,31 @@ COMPAT_SYSCALL_DEFINE4(sendfile64, int,
> out_fd,
> > int, in_fd,  }  #endif
> >
> > +static const struct file_operations *memory_copy_file_ops(
> > +                       struct file *file_in, struct file *file_out) {
> > +       if ((file_in->f_op->fop_flags & FOP_MEMORY_FILE) &&
> > +           (file_in->f_mode & FMODE_CAN_ODIRECT) &&
> > +           file_in->f_op->copy_file_range && file_out->f_op->write_iter)
> > +               return file_in->f_op;
> > +       else if ((file_out->f_op->fop_flags & FOP_MEMORY_FILE) &&
> > +                (file_out->f_mode & FMODE_CAN_ODIRECT) &&
> > +                file_in->f_op->read_iter && 
> > file_out->f_op->copy_file_range)
> > +               return file_out->f_op;
> > +       else
> > +               return NULL;
> > +}
> > +
> > +static int essential_file_rw_checks(struct file *file_in, struct file
> > +*file_out) {
> > +       if (!(file_in->f_mode & FMODE_READ) ||
> > +           !(file_out->f_mode & FMODE_WRITE) ||
> > +           (file_out->f_flags & O_APPEND))
> > +               return -EBADF;
> > +
> > +       return 0;
> > +}
> > +
> >  /*
> >   * Performs necessary checks before doing a file copy
> >   *
> > @@ -1484,9 +1509,16 @@ static int generic_copy_file_checks(struct file
> *file_in, loff_t pos_in,
> >         struct inode *inode_out = file_inode(file_out);
> >         uint64_t count = *req_count;
> >         loff_t size_in;
> > +       bool splice = flags & COPY_FILE_SPLICE;
> > +       const struct file_operations *mem_fops;
> >         int ret;
> >
> > -       ret = generic_file_rw_checks(file_in, file_out);
> > +       /* The dma-buf file is not a regular file. */
> > +       mem_fops = memory_copy_file_ops(file_in, file_out);
> > +       if (splice || mem_fops == NULL)
> 
> nit: use !mem_fops please
> 
> Considering that the flag COPY_FILE_SPLICE is not allowed from userspace
> and is only called by nfsd and ksmbd I think we should assert and deny the
> combination of mem_fops && splice because it is very much unexpected.
> 
> After asserting this, it would be nicer to write as:
>         if (mem_fops)
>                ret = essential_file_rw_checks(file_in, file_out);
>         else
>                ret = generic_file_rw_checks(file_in, file_out);
> 
Got it. Thanks.
> > +       else
> > +               ret = essential_file_rw_checks(file_in, file_out);
> >         if (ret)
> >                 return ret;
> >
> > @@ -1500,8 +1532,10 @@ static int generic_copy_file_checks(struct file
> *file_in, loff_t pos_in,
> >          * and several different sets of file_operations, but they all end 
> > up
> >          * using the same ->copy_file_range() function pointer.
> >          */
> > -       if (flags & COPY_FILE_SPLICE) {
> > +       if (splice) {
> >                 /* cross sb splice is allowed */
> > +       } else if (mem_fops != NULL) {
> 
> With the assertion that splice && mem_fops is not allowed if (splice ||
> mem_fops) {
> 
> would go well together because they both allow cross-fs copy not only cross
> sb.
> 
Git it.

> > +               /* cross-fs copy is allowed for memory file. */
> >         } else if (file_out->f_op->copy_file_range) {
> >                 if (file_in->f_op->copy_file_range !=
> >                     file_out->f_op->copy_file_range) @@ -1554,6
> > +1588,7 @@ ssize_t vfs_copy_file_range(struct file *file_in, loff_t pos_in,
> >         ssize_t ret;
> >         bool splice = flags & COPY_FILE_SPLICE;
> >         bool samesb = file_inode(file_in)->i_sb ==
> > file_inode(file_out)->i_sb;
> > +       const struct file_operations *mem_fops;
> >
> >         if (flags & ~COPY_FILE_SPLICE)
> >                 return -EINVAL;
> > @@ -1574,18 +1609,27 @@ ssize_t vfs_copy_file_range(struct file *file_in,
> loff_t pos_in,
> >         if (len == 0)
> >                 return 0;
> >
> > +       if (splice)
> > +               goto do_splice;
> > +
> >         file_start_write(file_out);
> >
> 
> goto do_splice needs to be after file_start_write
> 
> Please wait for feedback from vfs maintainers before posting another
> version addressing my review comments.
> 
Are you asking whether both the goto do_splice and the do_splice label should
be enclosed between file_start_write and file_end_write?

Regards,
Wangtao.
> Thanks,
> Amir.

Reply via email to