18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
28c2ecf20Sopenharmony_ci/*
38c2ecf20Sopenharmony_ci * linux/fs/ext4/page-io.c
48c2ecf20Sopenharmony_ci *
58c2ecf20Sopenharmony_ci * This contains the new page_io functions for ext4
68c2ecf20Sopenharmony_ci *
78c2ecf20Sopenharmony_ci * Written by Theodore Ts'o, 2010.
88c2ecf20Sopenharmony_ci */
98c2ecf20Sopenharmony_ci
108c2ecf20Sopenharmony_ci#include <linux/fs.h>
118c2ecf20Sopenharmony_ci#include <linux/time.h>
128c2ecf20Sopenharmony_ci#include <linux/highuid.h>
138c2ecf20Sopenharmony_ci#include <linux/pagemap.h>
148c2ecf20Sopenharmony_ci#include <linux/quotaops.h>
158c2ecf20Sopenharmony_ci#include <linux/string.h>
168c2ecf20Sopenharmony_ci#include <linux/buffer_head.h>
178c2ecf20Sopenharmony_ci#include <linux/writeback.h>
188c2ecf20Sopenharmony_ci#include <linux/pagevec.h>
198c2ecf20Sopenharmony_ci#include <linux/mpage.h>
208c2ecf20Sopenharmony_ci#include <linux/namei.h>
218c2ecf20Sopenharmony_ci#include <linux/uio.h>
228c2ecf20Sopenharmony_ci#include <linux/bio.h>
238c2ecf20Sopenharmony_ci#include <linux/workqueue.h>
248c2ecf20Sopenharmony_ci#include <linux/kernel.h>
258c2ecf20Sopenharmony_ci#include <linux/slab.h>
268c2ecf20Sopenharmony_ci#include <linux/mm.h>
278c2ecf20Sopenharmony_ci#include <linux/backing-dev.h>
288c2ecf20Sopenharmony_ci
298c2ecf20Sopenharmony_ci#include "ext4_jbd2.h"
308c2ecf20Sopenharmony_ci#include "xattr.h"
318c2ecf20Sopenharmony_ci#include "acl.h"
328c2ecf20Sopenharmony_ci
338c2ecf20Sopenharmony_cistatic struct kmem_cache *io_end_cachep;
348c2ecf20Sopenharmony_cistatic struct kmem_cache *io_end_vec_cachep;
358c2ecf20Sopenharmony_ci
368c2ecf20Sopenharmony_ciint __init ext4_init_pageio(void)
378c2ecf20Sopenharmony_ci{
388c2ecf20Sopenharmony_ci	io_end_cachep = KMEM_CACHE(ext4_io_end, SLAB_RECLAIM_ACCOUNT);
398c2ecf20Sopenharmony_ci	if (io_end_cachep == NULL)
408c2ecf20Sopenharmony_ci		return -ENOMEM;
418c2ecf20Sopenharmony_ci
428c2ecf20Sopenharmony_ci	io_end_vec_cachep = KMEM_CACHE(ext4_io_end_vec, 0);
438c2ecf20Sopenharmony_ci	if (io_end_vec_cachep == NULL) {
448c2ecf20Sopenharmony_ci		kmem_cache_destroy(io_end_cachep);
458c2ecf20Sopenharmony_ci		return -ENOMEM;
468c2ecf20Sopenharmony_ci	}
478c2ecf20Sopenharmony_ci	return 0;
488c2ecf20Sopenharmony_ci}
498c2ecf20Sopenharmony_ci
508c2ecf20Sopenharmony_civoid ext4_exit_pageio(void)
518c2ecf20Sopenharmony_ci{
528c2ecf20Sopenharmony_ci	kmem_cache_destroy(io_end_cachep);
538c2ecf20Sopenharmony_ci	kmem_cache_destroy(io_end_vec_cachep);
548c2ecf20Sopenharmony_ci}
558c2ecf20Sopenharmony_ci
568c2ecf20Sopenharmony_cistruct ext4_io_end_vec *ext4_alloc_io_end_vec(ext4_io_end_t *io_end)
578c2ecf20Sopenharmony_ci{
588c2ecf20Sopenharmony_ci	struct ext4_io_end_vec *io_end_vec;
598c2ecf20Sopenharmony_ci
608c2ecf20Sopenharmony_ci	io_end_vec = kmem_cache_zalloc(io_end_vec_cachep, GFP_NOFS);
618c2ecf20Sopenharmony_ci	if (!io_end_vec)
628c2ecf20Sopenharmony_ci		return ERR_PTR(-ENOMEM);
638c2ecf20Sopenharmony_ci	INIT_LIST_HEAD(&io_end_vec->list);
648c2ecf20Sopenharmony_ci	list_add_tail(&io_end_vec->list, &io_end->list_vec);
658c2ecf20Sopenharmony_ci	return io_end_vec;
668c2ecf20Sopenharmony_ci}
678c2ecf20Sopenharmony_ci
688c2ecf20Sopenharmony_cistatic void ext4_free_io_end_vec(ext4_io_end_t *io_end)
698c2ecf20Sopenharmony_ci{
708c2ecf20Sopenharmony_ci	struct ext4_io_end_vec *io_end_vec, *tmp;
718c2ecf20Sopenharmony_ci
728c2ecf20Sopenharmony_ci	if (list_empty(&io_end->list_vec))
738c2ecf20Sopenharmony_ci		return;
748c2ecf20Sopenharmony_ci	list_for_each_entry_safe(io_end_vec, tmp, &io_end->list_vec, list) {
758c2ecf20Sopenharmony_ci		list_del(&io_end_vec->list);
768c2ecf20Sopenharmony_ci		kmem_cache_free(io_end_vec_cachep, io_end_vec);
778c2ecf20Sopenharmony_ci	}
788c2ecf20Sopenharmony_ci}
798c2ecf20Sopenharmony_ci
808c2ecf20Sopenharmony_cistruct ext4_io_end_vec *ext4_last_io_end_vec(ext4_io_end_t *io_end)
818c2ecf20Sopenharmony_ci{
828c2ecf20Sopenharmony_ci	BUG_ON(list_empty(&io_end->list_vec));
838c2ecf20Sopenharmony_ci	return list_last_entry(&io_end->list_vec, struct ext4_io_end_vec, list);
848c2ecf20Sopenharmony_ci}
858c2ecf20Sopenharmony_ci
868c2ecf20Sopenharmony_ci/*
878c2ecf20Sopenharmony_ci * Print an buffer I/O error compatible with the fs/buffer.c.  This
888c2ecf20Sopenharmony_ci * provides compatibility with dmesg scrapers that look for a specific
898c2ecf20Sopenharmony_ci * buffer I/O error message.  We really need a unified error reporting
908c2ecf20Sopenharmony_ci * structure to userspace ala Digital Unix's uerf system, but it's
918c2ecf20Sopenharmony_ci * probably not going to happen in my lifetime, due to LKML politics...
928c2ecf20Sopenharmony_ci */
938c2ecf20Sopenharmony_cistatic void buffer_io_error(struct buffer_head *bh)
948c2ecf20Sopenharmony_ci{
958c2ecf20Sopenharmony_ci	printk_ratelimited(KERN_ERR "Buffer I/O error on device %pg, logical block %llu\n",
968c2ecf20Sopenharmony_ci		       bh->b_bdev,
978c2ecf20Sopenharmony_ci			(unsigned long long)bh->b_blocknr);
988c2ecf20Sopenharmony_ci}
998c2ecf20Sopenharmony_ci
1008c2ecf20Sopenharmony_cistatic void ext4_finish_bio(struct bio *bio)
1018c2ecf20Sopenharmony_ci{
1028c2ecf20Sopenharmony_ci	struct bio_vec *bvec;
1038c2ecf20Sopenharmony_ci	struct bvec_iter_all iter_all;
1048c2ecf20Sopenharmony_ci
1058c2ecf20Sopenharmony_ci	bio_for_each_segment_all(bvec, bio, iter_all) {
1068c2ecf20Sopenharmony_ci		struct page *page = bvec->bv_page;
1078c2ecf20Sopenharmony_ci		struct page *bounce_page = NULL;
1088c2ecf20Sopenharmony_ci		struct buffer_head *bh, *head;
1098c2ecf20Sopenharmony_ci		unsigned bio_start = bvec->bv_offset;
1108c2ecf20Sopenharmony_ci		unsigned bio_end = bio_start + bvec->bv_len;
1118c2ecf20Sopenharmony_ci		unsigned under_io = 0;
1128c2ecf20Sopenharmony_ci		unsigned long flags;
1138c2ecf20Sopenharmony_ci
1148c2ecf20Sopenharmony_ci		if (!page)
1158c2ecf20Sopenharmony_ci			continue;
1168c2ecf20Sopenharmony_ci
1178c2ecf20Sopenharmony_ci		if (fscrypt_is_bounce_page(page)) {
1188c2ecf20Sopenharmony_ci			bounce_page = page;
1198c2ecf20Sopenharmony_ci			page = fscrypt_pagecache_page(bounce_page);
1208c2ecf20Sopenharmony_ci		}
1218c2ecf20Sopenharmony_ci
1228c2ecf20Sopenharmony_ci		if (bio->bi_status) {
1238c2ecf20Sopenharmony_ci			SetPageError(page);
1248c2ecf20Sopenharmony_ci			mapping_set_error(page->mapping, -EIO);
1258c2ecf20Sopenharmony_ci		}
1268c2ecf20Sopenharmony_ci		bh = head = page_buffers(page);
1278c2ecf20Sopenharmony_ci		/*
1288c2ecf20Sopenharmony_ci		 * We check all buffers in the page under b_uptodate_lock
1298c2ecf20Sopenharmony_ci		 * to avoid races with other end io clearing async_write flags
1308c2ecf20Sopenharmony_ci		 */
1318c2ecf20Sopenharmony_ci		spin_lock_irqsave(&head->b_uptodate_lock, flags);
1328c2ecf20Sopenharmony_ci		do {
1338c2ecf20Sopenharmony_ci			if (bh_offset(bh) < bio_start ||
1348c2ecf20Sopenharmony_ci			    bh_offset(bh) + bh->b_size > bio_end) {
1358c2ecf20Sopenharmony_ci				if (buffer_async_write(bh))
1368c2ecf20Sopenharmony_ci					under_io++;
1378c2ecf20Sopenharmony_ci				continue;
1388c2ecf20Sopenharmony_ci			}
1398c2ecf20Sopenharmony_ci			clear_buffer_async_write(bh);
1408c2ecf20Sopenharmony_ci			if (bio->bi_status) {
1418c2ecf20Sopenharmony_ci				set_buffer_write_io_error(bh);
1428c2ecf20Sopenharmony_ci				buffer_io_error(bh);
1438c2ecf20Sopenharmony_ci			}
1448c2ecf20Sopenharmony_ci		} while ((bh = bh->b_this_page) != head);
1458c2ecf20Sopenharmony_ci		spin_unlock_irqrestore(&head->b_uptodate_lock, flags);
1468c2ecf20Sopenharmony_ci		if (!under_io) {
1478c2ecf20Sopenharmony_ci			fscrypt_free_bounce_page(bounce_page);
1488c2ecf20Sopenharmony_ci			end_page_writeback(page);
1498c2ecf20Sopenharmony_ci		}
1508c2ecf20Sopenharmony_ci	}
1518c2ecf20Sopenharmony_ci}
1528c2ecf20Sopenharmony_ci
1538c2ecf20Sopenharmony_cistatic void ext4_release_io_end(ext4_io_end_t *io_end)
1548c2ecf20Sopenharmony_ci{
1558c2ecf20Sopenharmony_ci	struct bio *bio, *next_bio;
1568c2ecf20Sopenharmony_ci
1578c2ecf20Sopenharmony_ci	BUG_ON(!list_empty(&io_end->list));
1588c2ecf20Sopenharmony_ci	BUG_ON(io_end->flag & EXT4_IO_END_UNWRITTEN);
1598c2ecf20Sopenharmony_ci	WARN_ON(io_end->handle);
1608c2ecf20Sopenharmony_ci
1618c2ecf20Sopenharmony_ci	for (bio = io_end->bio; bio; bio = next_bio) {
1628c2ecf20Sopenharmony_ci		next_bio = bio->bi_private;
1638c2ecf20Sopenharmony_ci		ext4_finish_bio(bio);
1648c2ecf20Sopenharmony_ci		bio_put(bio);
1658c2ecf20Sopenharmony_ci	}
1668c2ecf20Sopenharmony_ci	ext4_free_io_end_vec(io_end);
1678c2ecf20Sopenharmony_ci	kmem_cache_free(io_end_cachep, io_end);
1688c2ecf20Sopenharmony_ci}
1698c2ecf20Sopenharmony_ci
1708c2ecf20Sopenharmony_ci/*
1718c2ecf20Sopenharmony_ci * Check a range of space and convert unwritten extents to written. Note that
1728c2ecf20Sopenharmony_ci * we are protected from truncate touching same part of extent tree by the
1738c2ecf20Sopenharmony_ci * fact that truncate code waits for all DIO to finish (thus exclusion from
1748c2ecf20Sopenharmony_ci * direct IO is achieved) and also waits for PageWriteback bits. Thus we
1758c2ecf20Sopenharmony_ci * cannot get to ext4_ext_truncate() before all IOs overlapping that range are
1768c2ecf20Sopenharmony_ci * completed (happens from ext4_free_ioend()).
1778c2ecf20Sopenharmony_ci */
1788c2ecf20Sopenharmony_cistatic int ext4_end_io_end(ext4_io_end_t *io_end)
1798c2ecf20Sopenharmony_ci{
1808c2ecf20Sopenharmony_ci	struct inode *inode = io_end->inode;
1818c2ecf20Sopenharmony_ci	handle_t *handle = io_end->handle;
1828c2ecf20Sopenharmony_ci	int ret = 0;
1838c2ecf20Sopenharmony_ci
1848c2ecf20Sopenharmony_ci	ext4_debug("ext4_end_io_nolock: io_end 0x%p from inode %lu,list->next 0x%p,"
1858c2ecf20Sopenharmony_ci		   "list->prev 0x%p\n",
1868c2ecf20Sopenharmony_ci		   io_end, inode->i_ino, io_end->list.next, io_end->list.prev);
1878c2ecf20Sopenharmony_ci
1888c2ecf20Sopenharmony_ci	io_end->handle = NULL;	/* Following call will use up the handle */
1898c2ecf20Sopenharmony_ci	ret = ext4_convert_unwritten_io_end_vec(handle, io_end);
1908c2ecf20Sopenharmony_ci	if (ret < 0 && !ext4_forced_shutdown(EXT4_SB(inode->i_sb))) {
1918c2ecf20Sopenharmony_ci		ext4_msg(inode->i_sb, KERN_EMERG,
1928c2ecf20Sopenharmony_ci			 "failed to convert unwritten extents to written "
1938c2ecf20Sopenharmony_ci			 "extents -- potential data loss!  "
1948c2ecf20Sopenharmony_ci			 "(inode %lu, error %d)", inode->i_ino, ret);
1958c2ecf20Sopenharmony_ci	}
1968c2ecf20Sopenharmony_ci	ext4_clear_io_unwritten_flag(io_end);
1978c2ecf20Sopenharmony_ci	ext4_release_io_end(io_end);
1988c2ecf20Sopenharmony_ci	return ret;
1998c2ecf20Sopenharmony_ci}
2008c2ecf20Sopenharmony_ci
2018c2ecf20Sopenharmony_cistatic void dump_completed_IO(struct inode *inode, struct list_head *head)
2028c2ecf20Sopenharmony_ci{
2038c2ecf20Sopenharmony_ci#ifdef	EXT4FS_DEBUG
2048c2ecf20Sopenharmony_ci	struct list_head *cur, *before, *after;
2058c2ecf20Sopenharmony_ci	ext4_io_end_t *io_end, *io_end0, *io_end1;
2068c2ecf20Sopenharmony_ci
2078c2ecf20Sopenharmony_ci	if (list_empty(head))
2088c2ecf20Sopenharmony_ci		return;
2098c2ecf20Sopenharmony_ci
2108c2ecf20Sopenharmony_ci	ext4_debug("Dump inode %lu completed io list\n", inode->i_ino);
2118c2ecf20Sopenharmony_ci	list_for_each_entry(io_end, head, list) {
2128c2ecf20Sopenharmony_ci		cur = &io_end->list;
2138c2ecf20Sopenharmony_ci		before = cur->prev;
2148c2ecf20Sopenharmony_ci		io_end0 = container_of(before, ext4_io_end_t, list);
2158c2ecf20Sopenharmony_ci		after = cur->next;
2168c2ecf20Sopenharmony_ci		io_end1 = container_of(after, ext4_io_end_t, list);
2178c2ecf20Sopenharmony_ci
2188c2ecf20Sopenharmony_ci		ext4_debug("io 0x%p from inode %lu,prev 0x%p,next 0x%p\n",
2198c2ecf20Sopenharmony_ci			    io_end, inode->i_ino, io_end0, io_end1);
2208c2ecf20Sopenharmony_ci	}
2218c2ecf20Sopenharmony_ci#endif
2228c2ecf20Sopenharmony_ci}
2238c2ecf20Sopenharmony_ci
2248c2ecf20Sopenharmony_ci/* Add the io_end to per-inode completed end_io list. */
2258c2ecf20Sopenharmony_cistatic void ext4_add_complete_io(ext4_io_end_t *io_end)
2268c2ecf20Sopenharmony_ci{
2278c2ecf20Sopenharmony_ci	struct ext4_inode_info *ei = EXT4_I(io_end->inode);
2288c2ecf20Sopenharmony_ci	struct ext4_sb_info *sbi = EXT4_SB(io_end->inode->i_sb);
2298c2ecf20Sopenharmony_ci	struct workqueue_struct *wq;
2308c2ecf20Sopenharmony_ci	unsigned long flags;
2318c2ecf20Sopenharmony_ci
2328c2ecf20Sopenharmony_ci	/* Only reserved conversions from writeback should enter here */
2338c2ecf20Sopenharmony_ci	WARN_ON(!(io_end->flag & EXT4_IO_END_UNWRITTEN));
2348c2ecf20Sopenharmony_ci	WARN_ON(!io_end->handle && sbi->s_journal);
2358c2ecf20Sopenharmony_ci	spin_lock_irqsave(&ei->i_completed_io_lock, flags);
2368c2ecf20Sopenharmony_ci	wq = sbi->rsv_conversion_wq;
2378c2ecf20Sopenharmony_ci	if (list_empty(&ei->i_rsv_conversion_list))
2388c2ecf20Sopenharmony_ci		queue_work(wq, &ei->i_rsv_conversion_work);
2398c2ecf20Sopenharmony_ci	list_add_tail(&io_end->list, &ei->i_rsv_conversion_list);
2408c2ecf20Sopenharmony_ci	spin_unlock_irqrestore(&ei->i_completed_io_lock, flags);
2418c2ecf20Sopenharmony_ci}
2428c2ecf20Sopenharmony_ci
2438c2ecf20Sopenharmony_cistatic int ext4_do_flush_completed_IO(struct inode *inode,
2448c2ecf20Sopenharmony_ci				      struct list_head *head)
2458c2ecf20Sopenharmony_ci{
2468c2ecf20Sopenharmony_ci	ext4_io_end_t *io_end;
2478c2ecf20Sopenharmony_ci	struct list_head unwritten;
2488c2ecf20Sopenharmony_ci	unsigned long flags;
2498c2ecf20Sopenharmony_ci	struct ext4_inode_info *ei = EXT4_I(inode);
2508c2ecf20Sopenharmony_ci	int err, ret = 0;
2518c2ecf20Sopenharmony_ci
2528c2ecf20Sopenharmony_ci	spin_lock_irqsave(&ei->i_completed_io_lock, flags);
2538c2ecf20Sopenharmony_ci	dump_completed_IO(inode, head);
2548c2ecf20Sopenharmony_ci	list_replace_init(head, &unwritten);
2558c2ecf20Sopenharmony_ci	spin_unlock_irqrestore(&ei->i_completed_io_lock, flags);
2568c2ecf20Sopenharmony_ci
2578c2ecf20Sopenharmony_ci	while (!list_empty(&unwritten)) {
2588c2ecf20Sopenharmony_ci		io_end = list_entry(unwritten.next, ext4_io_end_t, list);
2598c2ecf20Sopenharmony_ci		BUG_ON(!(io_end->flag & EXT4_IO_END_UNWRITTEN));
2608c2ecf20Sopenharmony_ci		list_del_init(&io_end->list);
2618c2ecf20Sopenharmony_ci
2628c2ecf20Sopenharmony_ci		err = ext4_end_io_end(io_end);
2638c2ecf20Sopenharmony_ci		if (unlikely(!ret && err))
2648c2ecf20Sopenharmony_ci			ret = err;
2658c2ecf20Sopenharmony_ci	}
2668c2ecf20Sopenharmony_ci	return ret;
2678c2ecf20Sopenharmony_ci}
2688c2ecf20Sopenharmony_ci
2698c2ecf20Sopenharmony_ci/*
2708c2ecf20Sopenharmony_ci * work on completed IO, to convert unwritten extents to extents
2718c2ecf20Sopenharmony_ci */
2728c2ecf20Sopenharmony_civoid ext4_end_io_rsv_work(struct work_struct *work)
2738c2ecf20Sopenharmony_ci{
2748c2ecf20Sopenharmony_ci	struct ext4_inode_info *ei = container_of(work, struct ext4_inode_info,
2758c2ecf20Sopenharmony_ci						  i_rsv_conversion_work);
2768c2ecf20Sopenharmony_ci	ext4_do_flush_completed_IO(&ei->vfs_inode, &ei->i_rsv_conversion_list);
2778c2ecf20Sopenharmony_ci}
2788c2ecf20Sopenharmony_ci
2798c2ecf20Sopenharmony_ciext4_io_end_t *ext4_init_io_end(struct inode *inode, gfp_t flags)
2808c2ecf20Sopenharmony_ci{
2818c2ecf20Sopenharmony_ci	ext4_io_end_t *io_end = kmem_cache_zalloc(io_end_cachep, flags);
2828c2ecf20Sopenharmony_ci
2838c2ecf20Sopenharmony_ci	if (io_end) {
2848c2ecf20Sopenharmony_ci		io_end->inode = inode;
2858c2ecf20Sopenharmony_ci		INIT_LIST_HEAD(&io_end->list);
2868c2ecf20Sopenharmony_ci		INIT_LIST_HEAD(&io_end->list_vec);
2878c2ecf20Sopenharmony_ci		atomic_set(&io_end->count, 1);
2888c2ecf20Sopenharmony_ci	}
2898c2ecf20Sopenharmony_ci	return io_end;
2908c2ecf20Sopenharmony_ci}
2918c2ecf20Sopenharmony_ci
2928c2ecf20Sopenharmony_civoid ext4_put_io_end_defer(ext4_io_end_t *io_end)
2938c2ecf20Sopenharmony_ci{
2948c2ecf20Sopenharmony_ci	if (atomic_dec_and_test(&io_end->count)) {
2958c2ecf20Sopenharmony_ci		if (!(io_end->flag & EXT4_IO_END_UNWRITTEN) ||
2968c2ecf20Sopenharmony_ci				list_empty(&io_end->list_vec)) {
2978c2ecf20Sopenharmony_ci			ext4_release_io_end(io_end);
2988c2ecf20Sopenharmony_ci			return;
2998c2ecf20Sopenharmony_ci		}
3008c2ecf20Sopenharmony_ci		ext4_add_complete_io(io_end);
3018c2ecf20Sopenharmony_ci	}
3028c2ecf20Sopenharmony_ci}
3038c2ecf20Sopenharmony_ci
3048c2ecf20Sopenharmony_ciint ext4_put_io_end(ext4_io_end_t *io_end)
3058c2ecf20Sopenharmony_ci{
3068c2ecf20Sopenharmony_ci	int err = 0;
3078c2ecf20Sopenharmony_ci
3088c2ecf20Sopenharmony_ci	if (atomic_dec_and_test(&io_end->count)) {
3098c2ecf20Sopenharmony_ci		if (io_end->flag & EXT4_IO_END_UNWRITTEN) {
3108c2ecf20Sopenharmony_ci			err = ext4_convert_unwritten_io_end_vec(io_end->handle,
3118c2ecf20Sopenharmony_ci								io_end);
3128c2ecf20Sopenharmony_ci			io_end->handle = NULL;
3138c2ecf20Sopenharmony_ci			ext4_clear_io_unwritten_flag(io_end);
3148c2ecf20Sopenharmony_ci		}
3158c2ecf20Sopenharmony_ci		ext4_release_io_end(io_end);
3168c2ecf20Sopenharmony_ci	}
3178c2ecf20Sopenharmony_ci	return err;
3188c2ecf20Sopenharmony_ci}
3198c2ecf20Sopenharmony_ci
3208c2ecf20Sopenharmony_ciext4_io_end_t *ext4_get_io_end(ext4_io_end_t *io_end)
3218c2ecf20Sopenharmony_ci{
3228c2ecf20Sopenharmony_ci	atomic_inc(&io_end->count);
3238c2ecf20Sopenharmony_ci	return io_end;
3248c2ecf20Sopenharmony_ci}
3258c2ecf20Sopenharmony_ci
3268c2ecf20Sopenharmony_ci/* BIO completion function for page writeback */
3278c2ecf20Sopenharmony_cistatic void ext4_end_bio(struct bio *bio)
3288c2ecf20Sopenharmony_ci{
3298c2ecf20Sopenharmony_ci	ext4_io_end_t *io_end = bio->bi_private;
3308c2ecf20Sopenharmony_ci	sector_t bi_sector = bio->bi_iter.bi_sector;
3318c2ecf20Sopenharmony_ci	char b[BDEVNAME_SIZE];
3328c2ecf20Sopenharmony_ci
3338c2ecf20Sopenharmony_ci	if (WARN_ONCE(!io_end, "io_end is NULL: %s: sector %Lu len %u err %d\n",
3348c2ecf20Sopenharmony_ci		      bio_devname(bio, b),
3358c2ecf20Sopenharmony_ci		      (long long) bio->bi_iter.bi_sector,
3368c2ecf20Sopenharmony_ci		      (unsigned) bio_sectors(bio),
3378c2ecf20Sopenharmony_ci		      bio->bi_status)) {
3388c2ecf20Sopenharmony_ci		ext4_finish_bio(bio);
3398c2ecf20Sopenharmony_ci		bio_put(bio);
3408c2ecf20Sopenharmony_ci		return;
3418c2ecf20Sopenharmony_ci	}
3428c2ecf20Sopenharmony_ci	bio->bi_end_io = NULL;
3438c2ecf20Sopenharmony_ci
3448c2ecf20Sopenharmony_ci	if (bio->bi_status) {
3458c2ecf20Sopenharmony_ci		struct inode *inode = io_end->inode;
3468c2ecf20Sopenharmony_ci
3478c2ecf20Sopenharmony_ci		ext4_warning(inode->i_sb, "I/O error %d writing to inode %lu "
3488c2ecf20Sopenharmony_ci			     "starting block %llu)",
3498c2ecf20Sopenharmony_ci			     bio->bi_status, inode->i_ino,
3508c2ecf20Sopenharmony_ci			     (unsigned long long)
3518c2ecf20Sopenharmony_ci			     bi_sector >> (inode->i_blkbits - 9));
3528c2ecf20Sopenharmony_ci		mapping_set_error(inode->i_mapping,
3538c2ecf20Sopenharmony_ci				blk_status_to_errno(bio->bi_status));
3548c2ecf20Sopenharmony_ci	}
3558c2ecf20Sopenharmony_ci
3568c2ecf20Sopenharmony_ci	if (io_end->flag & EXT4_IO_END_UNWRITTEN) {
3578c2ecf20Sopenharmony_ci		/*
3588c2ecf20Sopenharmony_ci		 * Link bio into list hanging from io_end. We have to do it
3598c2ecf20Sopenharmony_ci		 * atomically as bio completions can be racing against each
3608c2ecf20Sopenharmony_ci		 * other.
3618c2ecf20Sopenharmony_ci		 */
3628c2ecf20Sopenharmony_ci		bio->bi_private = xchg(&io_end->bio, bio);
3638c2ecf20Sopenharmony_ci		ext4_put_io_end_defer(io_end);
3648c2ecf20Sopenharmony_ci	} else {
3658c2ecf20Sopenharmony_ci		/*
3668c2ecf20Sopenharmony_ci		 * Drop io_end reference early. Inode can get freed once
3678c2ecf20Sopenharmony_ci		 * we finish the bio.
3688c2ecf20Sopenharmony_ci		 */
3698c2ecf20Sopenharmony_ci		ext4_put_io_end_defer(io_end);
3708c2ecf20Sopenharmony_ci		ext4_finish_bio(bio);
3718c2ecf20Sopenharmony_ci		bio_put(bio);
3728c2ecf20Sopenharmony_ci	}
3738c2ecf20Sopenharmony_ci}
3748c2ecf20Sopenharmony_ci
3758c2ecf20Sopenharmony_civoid ext4_io_submit(struct ext4_io_submit *io)
3768c2ecf20Sopenharmony_ci{
3778c2ecf20Sopenharmony_ci	struct bio *bio = io->io_bio;
3788c2ecf20Sopenharmony_ci
3798c2ecf20Sopenharmony_ci	if (bio) {
3808c2ecf20Sopenharmony_ci		int io_op_flags = io->io_wbc->sync_mode == WB_SYNC_ALL ?
3818c2ecf20Sopenharmony_ci				  REQ_SYNC : 0;
3828c2ecf20Sopenharmony_ci		io->io_bio->bi_write_hint = io->io_end->inode->i_write_hint;
3838c2ecf20Sopenharmony_ci		bio_set_op_attrs(io->io_bio, REQ_OP_WRITE, io_op_flags);
3848c2ecf20Sopenharmony_ci		submit_bio(io->io_bio);
3858c2ecf20Sopenharmony_ci	}
3868c2ecf20Sopenharmony_ci	io->io_bio = NULL;
3878c2ecf20Sopenharmony_ci}
3888c2ecf20Sopenharmony_ci
3898c2ecf20Sopenharmony_civoid ext4_io_submit_init(struct ext4_io_submit *io,
3908c2ecf20Sopenharmony_ci			 struct writeback_control *wbc)
3918c2ecf20Sopenharmony_ci{
3928c2ecf20Sopenharmony_ci	io->io_wbc = wbc;
3938c2ecf20Sopenharmony_ci	io->io_bio = NULL;
3948c2ecf20Sopenharmony_ci	io->io_end = NULL;
3958c2ecf20Sopenharmony_ci}
3968c2ecf20Sopenharmony_ci
3978c2ecf20Sopenharmony_cistatic void io_submit_init_bio(struct ext4_io_submit *io,
3988c2ecf20Sopenharmony_ci			       struct buffer_head *bh)
3998c2ecf20Sopenharmony_ci{
4008c2ecf20Sopenharmony_ci	struct bio *bio;
4018c2ecf20Sopenharmony_ci
4028c2ecf20Sopenharmony_ci	/*
4038c2ecf20Sopenharmony_ci	 * bio_alloc will _always_ be able to allocate a bio if
4048c2ecf20Sopenharmony_ci	 * __GFP_DIRECT_RECLAIM is set, see comments for bio_alloc_bioset().
4058c2ecf20Sopenharmony_ci	 */
4068c2ecf20Sopenharmony_ci	bio = bio_alloc(GFP_NOIO, BIO_MAX_PAGES);
4078c2ecf20Sopenharmony_ci	fscrypt_set_bio_crypt_ctx_bh(bio, bh, GFP_NOIO);
4088c2ecf20Sopenharmony_ci	bio->bi_iter.bi_sector = bh->b_blocknr * (bh->b_size >> 9);
4098c2ecf20Sopenharmony_ci	bio_set_dev(bio, bh->b_bdev);
4108c2ecf20Sopenharmony_ci	bio->bi_end_io = ext4_end_bio;
4118c2ecf20Sopenharmony_ci	bio->bi_private = ext4_get_io_end(io->io_end);
4128c2ecf20Sopenharmony_ci	io->io_bio = bio;
4138c2ecf20Sopenharmony_ci	io->io_next_block = bh->b_blocknr;
4148c2ecf20Sopenharmony_ci	wbc_init_bio(io->io_wbc, bio);
4158c2ecf20Sopenharmony_ci}
4168c2ecf20Sopenharmony_ci
4178c2ecf20Sopenharmony_cistatic void io_submit_add_bh(struct ext4_io_submit *io,
4188c2ecf20Sopenharmony_ci			     struct inode *inode,
4198c2ecf20Sopenharmony_ci			     struct page *pagecache_page,
4208c2ecf20Sopenharmony_ci			     struct page *bounce_page,
4218c2ecf20Sopenharmony_ci			     struct buffer_head *bh)
4228c2ecf20Sopenharmony_ci{
4238c2ecf20Sopenharmony_ci	int ret;
4248c2ecf20Sopenharmony_ci
4258c2ecf20Sopenharmony_ci	if (io->io_bio && (bh->b_blocknr != io->io_next_block ||
4268c2ecf20Sopenharmony_ci			   !fscrypt_mergeable_bio_bh(io->io_bio, bh))) {
4278c2ecf20Sopenharmony_cisubmit_and_retry:
4288c2ecf20Sopenharmony_ci		ext4_io_submit(io);
4298c2ecf20Sopenharmony_ci	}
4308c2ecf20Sopenharmony_ci	if (io->io_bio == NULL) {
4318c2ecf20Sopenharmony_ci		io_submit_init_bio(io, bh);
4328c2ecf20Sopenharmony_ci		io->io_bio->bi_write_hint = inode->i_write_hint;
4338c2ecf20Sopenharmony_ci	}
4348c2ecf20Sopenharmony_ci	ret = bio_add_page(io->io_bio, bounce_page ?: pagecache_page,
4358c2ecf20Sopenharmony_ci			   bh->b_size, bh_offset(bh));
4368c2ecf20Sopenharmony_ci	if (ret != bh->b_size)
4378c2ecf20Sopenharmony_ci		goto submit_and_retry;
4388c2ecf20Sopenharmony_ci	wbc_account_cgroup_owner(io->io_wbc, pagecache_page, bh->b_size);
4398c2ecf20Sopenharmony_ci	io->io_next_block++;
4408c2ecf20Sopenharmony_ci}
4418c2ecf20Sopenharmony_ci
4428c2ecf20Sopenharmony_ciint ext4_bio_write_page(struct ext4_io_submit *io,
4438c2ecf20Sopenharmony_ci			struct page *page,
4448c2ecf20Sopenharmony_ci			int len,
4458c2ecf20Sopenharmony_ci			struct writeback_control *wbc,
4468c2ecf20Sopenharmony_ci			bool keep_towrite)
4478c2ecf20Sopenharmony_ci{
4488c2ecf20Sopenharmony_ci	struct page *bounce_page = NULL;
4498c2ecf20Sopenharmony_ci	struct inode *inode = page->mapping->host;
4508c2ecf20Sopenharmony_ci	unsigned block_start;
4518c2ecf20Sopenharmony_ci	struct buffer_head *bh, *head;
4528c2ecf20Sopenharmony_ci	int ret = 0;
4538c2ecf20Sopenharmony_ci	int nr_submitted = 0;
4548c2ecf20Sopenharmony_ci	int nr_to_submit = 0;
4558c2ecf20Sopenharmony_ci
4568c2ecf20Sopenharmony_ci	BUG_ON(!PageLocked(page));
4578c2ecf20Sopenharmony_ci	BUG_ON(PageWriteback(page));
4588c2ecf20Sopenharmony_ci
4598c2ecf20Sopenharmony_ci	if (keep_towrite)
4608c2ecf20Sopenharmony_ci		set_page_writeback_keepwrite(page);
4618c2ecf20Sopenharmony_ci	else
4628c2ecf20Sopenharmony_ci		set_page_writeback(page);
4638c2ecf20Sopenharmony_ci	ClearPageError(page);
4648c2ecf20Sopenharmony_ci
4658c2ecf20Sopenharmony_ci	/*
4668c2ecf20Sopenharmony_ci	 * Comments copied from block_write_full_page:
4678c2ecf20Sopenharmony_ci	 *
4688c2ecf20Sopenharmony_ci	 * The page straddles i_size.  It must be zeroed out on each and every
4698c2ecf20Sopenharmony_ci	 * writepage invocation because it may be mmapped.  "A file is mapped
4708c2ecf20Sopenharmony_ci	 * in multiples of the page size.  For a file that is not a multiple of
4718c2ecf20Sopenharmony_ci	 * the page size, the remaining memory is zeroed when mapped, and
4728c2ecf20Sopenharmony_ci	 * writes to that region are not written out to the file."
4738c2ecf20Sopenharmony_ci	 */
4748c2ecf20Sopenharmony_ci	if (len < PAGE_SIZE)
4758c2ecf20Sopenharmony_ci		zero_user_segment(page, len, PAGE_SIZE);
4768c2ecf20Sopenharmony_ci	/*
4778c2ecf20Sopenharmony_ci	 * In the first loop we prepare and mark buffers to submit. We have to
4788c2ecf20Sopenharmony_ci	 * mark all buffers in the page before submitting so that
4798c2ecf20Sopenharmony_ci	 * end_page_writeback() cannot be called from ext4_bio_end_io() when IO
4808c2ecf20Sopenharmony_ci	 * on the first buffer finishes and we are still working on submitting
4818c2ecf20Sopenharmony_ci	 * the second buffer.
4828c2ecf20Sopenharmony_ci	 */
4838c2ecf20Sopenharmony_ci	bh = head = page_buffers(page);
4848c2ecf20Sopenharmony_ci	do {
4858c2ecf20Sopenharmony_ci		block_start = bh_offset(bh);
4868c2ecf20Sopenharmony_ci		if (block_start >= len) {
4878c2ecf20Sopenharmony_ci			clear_buffer_dirty(bh);
4888c2ecf20Sopenharmony_ci			set_buffer_uptodate(bh);
4898c2ecf20Sopenharmony_ci			continue;
4908c2ecf20Sopenharmony_ci		}
4918c2ecf20Sopenharmony_ci		if (!buffer_dirty(bh) || buffer_delay(bh) ||
4928c2ecf20Sopenharmony_ci		    !buffer_mapped(bh) || buffer_unwritten(bh)) {
4938c2ecf20Sopenharmony_ci			/* A hole? We can safely clear the dirty bit */
4948c2ecf20Sopenharmony_ci			if (!buffer_mapped(bh))
4958c2ecf20Sopenharmony_ci				clear_buffer_dirty(bh);
4968c2ecf20Sopenharmony_ci			if (io->io_bio)
4978c2ecf20Sopenharmony_ci				ext4_io_submit(io);
4988c2ecf20Sopenharmony_ci			continue;
4998c2ecf20Sopenharmony_ci		}
5008c2ecf20Sopenharmony_ci		if (buffer_new(bh))
5018c2ecf20Sopenharmony_ci			clear_buffer_new(bh);
5028c2ecf20Sopenharmony_ci		set_buffer_async_write(bh);
5038c2ecf20Sopenharmony_ci		nr_to_submit++;
5048c2ecf20Sopenharmony_ci	} while ((bh = bh->b_this_page) != head);
5058c2ecf20Sopenharmony_ci
5068c2ecf20Sopenharmony_ci	bh = head = page_buffers(page);
5078c2ecf20Sopenharmony_ci
5088c2ecf20Sopenharmony_ci	/*
5098c2ecf20Sopenharmony_ci	 * If any blocks are being written to an encrypted file, encrypt them
5108c2ecf20Sopenharmony_ci	 * into a bounce page.  For simplicity, just encrypt until the last
5118c2ecf20Sopenharmony_ci	 * block which might be needed.  This may cause some unneeded blocks
5128c2ecf20Sopenharmony_ci	 * (e.g. holes) to be unnecessarily encrypted, but this is rare and
5138c2ecf20Sopenharmony_ci	 * can't happen in the common case of blocksize == PAGE_SIZE.
5148c2ecf20Sopenharmony_ci	 */
5158c2ecf20Sopenharmony_ci	if (fscrypt_inode_uses_fs_layer_crypto(inode) && nr_to_submit) {
5168c2ecf20Sopenharmony_ci		gfp_t gfp_flags = GFP_NOFS;
5178c2ecf20Sopenharmony_ci		unsigned int enc_bytes = round_up(len, i_blocksize(inode));
5188c2ecf20Sopenharmony_ci
5198c2ecf20Sopenharmony_ci		/*
5208c2ecf20Sopenharmony_ci		 * Since bounce page allocation uses a mempool, we can only use
5218c2ecf20Sopenharmony_ci		 * a waiting mask (i.e. request guaranteed allocation) on the
5228c2ecf20Sopenharmony_ci		 * first page of the bio.  Otherwise it can deadlock.
5238c2ecf20Sopenharmony_ci		 */
5248c2ecf20Sopenharmony_ci		if (io->io_bio)
5258c2ecf20Sopenharmony_ci			gfp_flags = GFP_NOWAIT | __GFP_NOWARN;
5268c2ecf20Sopenharmony_ci	retry_encrypt:
5278c2ecf20Sopenharmony_ci		bounce_page = fscrypt_encrypt_pagecache_blocks(page, enc_bytes,
5288c2ecf20Sopenharmony_ci							       0, gfp_flags);
5298c2ecf20Sopenharmony_ci		if (IS_ERR(bounce_page)) {
5308c2ecf20Sopenharmony_ci			ret = PTR_ERR(bounce_page);
5318c2ecf20Sopenharmony_ci			if (ret == -ENOMEM &&
5328c2ecf20Sopenharmony_ci			    (io->io_bio || wbc->sync_mode == WB_SYNC_ALL)) {
5338c2ecf20Sopenharmony_ci				gfp_flags = GFP_NOFS;
5348c2ecf20Sopenharmony_ci				if (io->io_bio)
5358c2ecf20Sopenharmony_ci					ext4_io_submit(io);
5368c2ecf20Sopenharmony_ci				else
5378c2ecf20Sopenharmony_ci					gfp_flags |= __GFP_NOFAIL;
5388c2ecf20Sopenharmony_ci				congestion_wait(BLK_RW_ASYNC, HZ/50);
5398c2ecf20Sopenharmony_ci				goto retry_encrypt;
5408c2ecf20Sopenharmony_ci			}
5418c2ecf20Sopenharmony_ci
5428c2ecf20Sopenharmony_ci			printk_ratelimited(KERN_ERR "%s: ret = %d\n", __func__, ret);
5438c2ecf20Sopenharmony_ci			redirty_page_for_writepage(wbc, page);
5448c2ecf20Sopenharmony_ci			do {
5458c2ecf20Sopenharmony_ci				clear_buffer_async_write(bh);
5468c2ecf20Sopenharmony_ci				bh = bh->b_this_page;
5478c2ecf20Sopenharmony_ci			} while (bh != head);
5488c2ecf20Sopenharmony_ci			goto unlock;
5498c2ecf20Sopenharmony_ci		}
5508c2ecf20Sopenharmony_ci	}
5518c2ecf20Sopenharmony_ci
5528c2ecf20Sopenharmony_ci	/* Now submit buffers to write */
5538c2ecf20Sopenharmony_ci	do {
5548c2ecf20Sopenharmony_ci		if (!buffer_async_write(bh))
5558c2ecf20Sopenharmony_ci			continue;
5568c2ecf20Sopenharmony_ci		io_submit_add_bh(io, inode, page, bounce_page, bh);
5578c2ecf20Sopenharmony_ci		nr_submitted++;
5588c2ecf20Sopenharmony_ci		clear_buffer_dirty(bh);
5598c2ecf20Sopenharmony_ci	} while ((bh = bh->b_this_page) != head);
5608c2ecf20Sopenharmony_ci
5618c2ecf20Sopenharmony_ciunlock:
5628c2ecf20Sopenharmony_ci	unlock_page(page);
5638c2ecf20Sopenharmony_ci	/* Nothing submitted - we have to end page writeback */
5648c2ecf20Sopenharmony_ci	if (!nr_submitted)
5658c2ecf20Sopenharmony_ci		end_page_writeback(page);
5668c2ecf20Sopenharmony_ci	return ret;
5678c2ecf20Sopenharmony_ci}
568