Jeff Layton wrote:
> Correct. We'd lose some fidelity in currently stored timestamps, but as
> Linus and Ted pointed out, anything below ~100ns granularity is
> effectively just noise, as that's the floor overhead for calling into
> the kernel. It's hard to argue that any application needs that
Provide a splice_read wrapper for f2fs. This does some checks and tracing
before calling filemap_splice_read() and will update the iostats
afterwards. Direct I/O is handled by the caller.
Signed-off-by: David Howells
cc: Christoph Hellwig
cc: Al Viro
cc: Jens Axboe
cc: Jaegeuk Kim
cc: Chao
Provide a splice_read stub for f2fs. This does some checks and tracing
before calling filemap_splice_read() and will update the iostats
afterwards. Direct I/O is handled by the caller.
Signed-off-by: David Howells
cc: Christoph Hellwig
cc: Al Viro
cc: Jens Axboe
cc: Jaegeuk Kim
cc: Chao Yu
filemap_splice_read() as direct_splice_read() will call
f2fs_file_read_iter().]
Signed-off-by: David Howells
cc: Christoph Hellwig
cc: Al Viro
cc: Jens Axboe
cc: Jaegeuk Kim
cc: Chao Yu
cc: linux-f2fs-devel@lists.sourceforge.net
cc: linux-fsde...@vger.kernel.org
cc: linux-bl...@vger.kernel.org
cc: linux
Signed-off-by: Vishal Moola (Oracle)
Tested-by: David Howells
___
Linux-f2fs-devel mailing list
Linux-f2fs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel
I have a couple of patches that add ACLs to keyrings, that you can find at the
top of the branch here:
https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-acl
I have other patches that allow tags to be used as subjects in the ACL, with a
container supplying
Jan Kara wrote:
> The callback doesn't ever get called. Remove it.
Hmmm... I should perhaps be calling this. I'm not sure why I never did.
At the moment, it doesn't strictly matter as ops on pages marked with
PG_fscache get ignored if the cache has suffered an I/O error or has been
withdrawn
Merge the type-specific data with the payload data into one four-word chunk
as it seems pointless to keep them separate.
Use user_key_payload() for accessing the payloads of overloaded
user-defined keys.
Signed-off-by: David Howells
cc: linux-c...@vger.kernel.org
cc: ecryp...@vger.kernel.org
cc