From patchwork Sun Apr 20 14:04:55 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Filipe Manana X-Patchwork-Id: 4021451 Return-Path: X-Original-To: patchwork-linux-btrfs@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.19.201]) by patchwork2.web.kernel.org (Postfix) with ESMTP id 44AD4BFF02 for ; Sun, 20 Apr 2014 13:05:13 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 5DE7D2021A for ; Sun, 20 Apr 2014 13:05:12 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 6EE0520218 for ; Sun, 20 Apr 2014 13:05:11 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755352AbaDTNFJ (ORCPT ); Sun, 20 Apr 2014 09:05:09 -0400 Received: from mail-we0-f178.google.com ([74.125.82.178]:42668 "EHLO mail-we0-f178.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755196AbaDTNFG (ORCPT ); Sun, 20 Apr 2014 09:05:06 -0400 Received: by mail-we0-f178.google.com with SMTP id u56so2989212wes.9 for ; Sun, 20 Apr 2014 06:05:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=ZfVaT6Rpby6oBXxBvhoq4saPcZn+78SATifEq7Qcusg=; b=w/3ei7ol2Zp1wMsaLDeQpTWZcL51KQ+vTphNMcCmjGE8Mr+HAa6udEIDNXUWVLoQYl LoDN6jZOD8hpcPYfi7iZViX2rMqYi0FftGv9YmsMeYXQaVlBXCCaJCfmAp5hEdbt2ztS zCZ+yWDe3VsjEgkh7dy9bvCSBn0oxEvvkzKWofZC6BBnus4zlzu28axE4+l537HrZLR5 9bFXKMUsPPyJ1U/IECoxGs6tWx9KYkrS75Ak6uZy+PdtgnITtaUv2Xfgzg5HDySGfygW Ca9CmmEoqdYrIqXDzUbwM8Iizbe/PLes5dO93+vT1/ajzfU3qKwS8CFXG7UJuq2NPTxz PAHQ== X-Received: by 10.194.191.133 with SMTP id gy5mr24807370wjc.34.1397999105166; Sun, 20 Apr 2014 06:05:05 -0700 (PDT) Received: from debian-vm3.lan (bl9-92-48.dsl.telepac.pt. [85.242.92.48]) by mx.google.com with ESMTPSA id ez5sm52506005wjd.9.2014.04.20.06.05.03 for (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sun, 20 Apr 2014 06:05:04 -0700 (PDT) From: Filipe David Borba Manana To: linux-btrfs@vger.kernel.org Cc: Filipe David Borba Manana Subject: [PATCH 3/6 v4] Btrfs: send, use fallocate command to punch holes Date: Sun, 20 Apr 2014 15:04:55 +0100 Message-Id: <1398002695-10084-1-git-send-email-fdmanana@gmail.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1397659726-30615-3-git-send-email-fdmanana@gmail.com> References: <1397659726-30615-3-git-send-email-fdmanana@gmail.com> Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org X-Spam-Status: No, score=-7.4 required=5.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED, FREEMAIL_FROM, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, T_DKIM_INVALID, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Instead of sending a write command with a data buffer filled with 0 value bytes, use the fallocate command, introduced in the send stream version 2, to tell the receiver to punch a file hole using the fallocate system call. Signed-off-by: Filipe David Borba Manana --- V2: A v2 stream is now only produced if the send ioctl caller passes in one of the new flags (BTRFS_SEND_FLAG_CALCULATE_DATA_SIZE | BTRFS_SEND_FLAG_SUPPORT_FALLOCATE) to avoid breaking old clients. V3: Added missing path allocation, messed up rebase. V4: Removed BTRFS_SEND_FLAG_SUPPORT_FALLOCATE and added BTRFS_SEND_FLAG_STREAM_V2, added commands for inode set flags and otime. fs/btrfs/send.c | 55 ++++++++++++++++++++++++++++++++++++++++++++++++++++--- fs/btrfs/send.h | 4 ++++ 2 files changed, 56 insertions(+), 3 deletions(-) diff --git a/fs/btrfs/send.c b/fs/btrfs/send.c index 2a52cc9..e57000b 100644 --- a/fs/btrfs/send.c +++ b/fs/btrfs/send.c @@ -564,6 +564,7 @@ static int tlv_put(struct send_ctx *sctx, u16 attr, const void *data, int len) return tlv_put(sctx, attr, &__tmp, sizeof(__tmp)); \ } +TLV_PUT_DEFINE_INT(32) TLV_PUT_DEFINE_INT(64) static int tlv_put_string(struct send_ctx *sctx, u16 attr, @@ -4482,18 +4483,59 @@ out: return ret; } +static int send_fallocate(struct send_ctx *sctx, u32 flags, + u64 offset, u64 len) +{ + struct fs_path *p = NULL; + int ret = 0; + + ASSERT(sctx->flags & BTRFS_SEND_FLAG_STREAM_V2); + + if (sctx->phase == SEND_PHASE_COMPUTE_DATA_SIZE) { + sctx->total_data_size += len; + return 0; + } + + p = fs_path_alloc(); + if (!p) + return -ENOMEM; + ret = get_cur_path(sctx, sctx->cur_ino, sctx->cur_inode_gen, p); + if (ret < 0) + goto out; + + ret = begin_cmd(sctx, BTRFS_SEND_C_FALLOCATE); + if (ret < 0) + goto out; + TLV_PUT_PATH(sctx, BTRFS_SEND_A_PATH, p); + TLV_PUT_U32(sctx, BTRFS_SEND_A_FALLOCATE_FLAGS, flags); + TLV_PUT_U64(sctx, BTRFS_SEND_A_FILE_OFFSET, offset); + TLV_PUT_U64(sctx, BTRFS_SEND_A_SIZE, len); + ret = send_cmd(sctx); + +tlv_put_failure: +out: + fs_path_free(p); + return ret; +} + static int send_hole(struct send_ctx *sctx, u64 end) { struct fs_path *p = NULL; u64 offset = sctx->cur_inode_last_extent; - u64 len; + u64 len = end - offset; int ret = 0; if (sctx->phase == SEND_PHASE_COMPUTE_DATA_SIZE) { - sctx->total_data_size += end - offset; + sctx->total_data_size += len; return 0; } + if (sctx->flags & BTRFS_SEND_FLAG_STREAM_V2) + return send_fallocate(sctx, + BTRFS_SEND_PUNCH_HOLE_FALLOC_FLAGS, + offset, + len); + p = fs_path_alloc(); if (!p) return -ENOMEM; @@ -4550,7 +4592,8 @@ static int send_write_or_clone(struct send_ctx *sctx, len = btrfs_file_extent_num_bytes(path->nodes[0], ei); } - if (offset + len > sctx->cur_inode_size) + if (offset < sctx->cur_inode_size && + offset + len > sctx->cur_inode_size) len = sctx->cur_inode_size - offset; if (len == 0) { ret = 0; @@ -4567,6 +4610,12 @@ static int send_write_or_clone(struct send_ctx *sctx, ret = send_clone(sctx, offset, len, clone_root); } else if (sctx->flags & BTRFS_SEND_FLAG_NO_FILE_DATA) { ret = send_update_extent(sctx, offset, len); + } else if (btrfs_file_extent_disk_bytenr(path->nodes[0], ei) == 0 && + type != BTRFS_FILE_EXTENT_INLINE && + (sctx->flags & BTRFS_SEND_FLAG_STREAM_V2) && + offset < sctx->cur_inode_size) { + ret = send_fallocate(sctx, BTRFS_SEND_PUNCH_HOLE_FALLOC_FLAGS, + offset, len); } else { while (pos < len) { l = len - pos; diff --git a/fs/btrfs/send.h b/fs/btrfs/send.h index 96f583c..987936c 100644 --- a/fs/btrfs/send.h +++ b/fs/btrfs/send.h @@ -148,6 +148,10 @@ enum { #define BTRFS_SEND_A_FALLOCATE_FLAG_KEEP_SIZE (1 << 0) #define BTRFS_SEND_A_FALLOCATE_FLAG_PUNCH_HOLE (1 << 1) +#define BTRFS_SEND_PUNCH_HOLE_FALLOC_FLAGS \ + (BTRFS_SEND_A_FALLOCATE_FLAG_KEEP_SIZE | \ + BTRFS_SEND_A_FALLOCATE_FLAG_PUNCH_HOLE) + #ifdef __KERNEL__ long btrfs_ioctl_send(struct file *mnt_file, void __user *arg); #endif