[RAMEN9610-8702][COMMON] diskcipher: support f2fs
[GitHub/LineageOS/android_kernel_motorola_exynos9610.git] / fs / ext4 / page-io.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
bd2d0210
TT
2/*
3 * linux/fs/ext4/page-io.c
4 *
5 * This contains the new page_io functions for ext4
6 *
7 * Written by Theodore Ts'o, 2010.
8 */
9
bd2d0210
TT
10#include <linux/fs.h>
11#include <linux/time.h>
bd2d0210
TT
12#include <linux/highuid.h>
13#include <linux/pagemap.h>
14#include <linux/quotaops.h>
15#include <linux/string.h>
16#include <linux/buffer_head.h>
17#include <linux/writeback.h>
18#include <linux/pagevec.h>
19#include <linux/mpage.h>
20#include <linux/namei.h>
21#include <linux/uio.h>
22#include <linux/bio.h>
23#include <linux/workqueue.h>
24#include <linux/kernel.h>
25#include <linux/slab.h>
1ae48a63 26#include <linux/mm.h>
c9af28fd 27#include <linux/backing-dev.h>
bd2d0210
TT
28
29#include "ext4_jbd2.h"
30#include "xattr.h"
31#include "acl.h"
bd2d0210 32
0058f965 33static struct kmem_cache *io_end_cachep;
bd2d0210 34
5dabfc78 35int __init ext4_init_pageio(void)
bd2d0210 36{
bd2d0210 37 io_end_cachep = KMEM_CACHE(ext4_io_end, SLAB_RECLAIM_ACCOUNT);
0058f965 38 if (io_end_cachep == NULL)
bd2d0210 39 return -ENOMEM;
bd2d0210
TT
40 return 0;
41}
42
5dabfc78 43void ext4_exit_pageio(void)
bd2d0210
TT
44{
45 kmem_cache_destroy(io_end_cachep);
bd2d0210
TT
46}
47
b0857d30
JK
48/*
49 * Print an buffer I/O error compatible with the fs/buffer.c. This
50 * provides compatibility with dmesg scrapers that look for a specific
51 * buffer I/O error message. We really need a unified error reporting
52 * structure to userspace ala Digital Unix's uerf system, but it's
53 * probably not going to happen in my lifetime, due to LKML politics...
54 */
55static void buffer_io_error(struct buffer_head *bh)
56{
a1c6f057
DM
57 printk_ratelimited(KERN_ERR "Buffer I/O error on device %pg, logical block %llu\n",
58 bh->b_bdev,
b0857d30
JK
59 (unsigned long long)bh->b_blocknr);
60}
61
62static void ext4_finish_bio(struct bio *bio)
63{
64 int i;
2c30c71b 65 struct bio_vec *bvec;
b0857d30 66
2c30c71b 67 bio_for_each_segment_all(bvec, bio, i) {
b0857d30 68 struct page *page = bvec->bv_page;
2058f83a
MH
69#ifdef CONFIG_EXT4_FS_ENCRYPTION
70 struct page *data_page = NULL;
2058f83a 71#endif
b0857d30
JK
72 struct buffer_head *bh, *head;
73 unsigned bio_start = bvec->bv_offset;
74 unsigned bio_end = bio_start + bvec->bv_len;
75 unsigned under_io = 0;
76 unsigned long flags;
77
78 if (!page)
79 continue;
80
2058f83a
MH
81#ifdef CONFIG_EXT4_FS_ENCRYPTION
82 if (!page->mapping) {
83 /* The bounce data pages are unmapped. */
84 data_page = page;
a7550b30 85 fscrypt_pullback_bio_page(&page, false);
2058f83a
MH
86 }
87#endif
88
4e4cbee9 89 if (bio->bi_status) {
b0857d30 90 SetPageError(page);
5114a97a 91 mapping_set_error(page->mapping, -EIO);
b0857d30
JK
92 }
93 bh = head = page_buffers(page);
94 /*
95 * We check all buffers in the page under BH_Uptodate_Lock
96 * to avoid races with other end io clearing async_write flags
97 */
98 local_irq_save(flags);
99 bit_spin_lock(BH_Uptodate_Lock, &head->b_state);
100 do {
101 if (bh_offset(bh) < bio_start ||
102 bh_offset(bh) + bh->b_size > bio_end) {
103 if (buffer_async_write(bh))
104 under_io++;
105 continue;
106 }
107 clear_buffer_async_write(bh);
4e4cbee9 108 if (bio->bi_status)
b0857d30
JK
109 buffer_io_error(bh);
110 } while ((bh = bh->b_this_page) != head);
111 bit_spin_unlock(BH_Uptodate_Lock, &head->b_state);
112 local_irq_restore(flags);
2058f83a
MH
113 if (!under_io) {
114#ifdef CONFIG_EXT4_FS_ENCRYPTION
a7550b30
JK
115 if (data_page)
116 fscrypt_restore_control_page(data_page);
2058f83a 117#endif
b0857d30 118 end_page_writeback(page);
2058f83a 119 }
b0857d30
JK
120 }
121}
122
97a851ed 123static void ext4_release_io_end(ext4_io_end_t *io_end)
bd2d0210 124{
b0857d30
JK
125 struct bio *bio, *next_bio;
126
97a851ed
JK
127 BUG_ON(!list_empty(&io_end->list));
128 BUG_ON(io_end->flag & EXT4_IO_END_UNWRITTEN);
6b523df4 129 WARN_ON(io_end->handle);
97a851ed 130
b0857d30
JK
131 for (bio = io_end->bio; bio; bio = next_bio) {
132 next_bio = bio->bi_private;
133 ext4_finish_bio(bio);
134 bio_put(bio);
135 }
97a851ed
JK
136 kmem_cache_free(io_end_cachep, io_end);
137}
138
a115f749
JK
139/*
140 * Check a range of space and convert unwritten extents to written. Note that
141 * we are protected from truncate touching same part of extent tree by the
142 * fact that truncate code waits for all DIO to finish (thus exclusion from
143 * direct IO is achieved) and also waits for PageWriteback bits. Thus we
144 * cannot get to ext4_ext_truncate() before all IOs overlapping that range are
145 * completed (happens from ext4_free_ioend()).
146 */
28a535f9 147static int ext4_end_io(ext4_io_end_t *io)
bd2d0210
TT
148{
149 struct inode *inode = io->inode;
150 loff_t offset = io->offset;
151 ssize_t size = io->size;
6b523df4 152 handle_t *handle = io->handle;
bd2d0210
TT
153 int ret = 0;
154
155 ext4_debug("ext4_end_io_nolock: io 0x%p from inode %lu,list->next 0x%p,"
156 "list->prev 0x%p\n",
157 io, inode->i_ino, io->list.next, io->list.prev);
158
6b523df4
JK
159 io->handle = NULL; /* Following call will use up the handle */
160 ret = ext4_convert_unwritten_extents(handle, inode, offset, size);
0db1ff22 161 if (ret < 0 && !ext4_forced_shutdown(EXT4_SB(inode->i_sb))) {
b82e384c
TT
162 ext4_msg(inode->i_sb, KERN_EMERG,
163 "failed to convert unwritten extents to written "
164 "extents -- potential data loss! "
165 "(inode %lu, offset %llu, size %zd, error %d)",
166 inode->i_ino, offset, size, ret);
bd2d0210 167 }
97a851ed
JK
168 ext4_clear_io_unwritten_flag(io);
169 ext4_release_io_end(io);
bd2d0210
TT
170 return ret;
171}
172
2e8fa54e 173static void dump_completed_IO(struct inode *inode, struct list_head *head)
28a535f9
DM
174{
175#ifdef EXT4FS_DEBUG
176 struct list_head *cur, *before, *after;
177 ext4_io_end_t *io, *io0, *io1;
28a535f9 178
2e8fa54e 179 if (list_empty(head))
28a535f9 180 return;
28a535f9 181
2e8fa54e
JK
182 ext4_debug("Dump inode %lu completed io list\n", inode->i_ino);
183 list_for_each_entry(io, head, list) {
28a535f9
DM
184 cur = &io->list;
185 before = cur->prev;
186 io0 = container_of(before, ext4_io_end_t, list);
187 after = cur->next;
188 io1 = container_of(after, ext4_io_end_t, list);
189
190 ext4_debug("io 0x%p from inode %lu,prev 0x%p,next 0x%p\n",
191 io, inode->i_ino, io0, io1);
192 }
193#endif
194}
195
196/* Add the io_end to per-inode completed end_io list. */
97a851ed 197static void ext4_add_complete_io(ext4_io_end_t *io_end)
bd2d0210 198{
28a535f9 199 struct ext4_inode_info *ei = EXT4_I(io_end->inode);
78371a45 200 struct ext4_sb_info *sbi = EXT4_SB(io_end->inode->i_sb);
28a535f9
DM
201 struct workqueue_struct *wq;
202 unsigned long flags;
203
7b7a8665
CH
204 /* Only reserved conversions from writeback should enter here */
205 WARN_ON(!(io_end->flag & EXT4_IO_END_UNWRITTEN));
78371a45 206 WARN_ON(!io_end->handle && sbi->s_journal);
d73d5046 207 spin_lock_irqsave(&ei->i_completed_io_lock, flags);
78371a45 208 wq = sbi->rsv_conversion_wq;
7b7a8665
CH
209 if (list_empty(&ei->i_rsv_conversion_list))
210 queue_work(wq, &ei->i_rsv_conversion_work);
211 list_add_tail(&io_end->list, &ei->i_rsv_conversion_list);
28a535f9
DM
212 spin_unlock_irqrestore(&ei->i_completed_io_lock, flags);
213}
d73d5046 214
2e8fa54e
JK
215static int ext4_do_flush_completed_IO(struct inode *inode,
216 struct list_head *head)
28a535f9
DM
217{
218 ext4_io_end_t *io;
002bd7fa 219 struct list_head unwritten;
28a535f9
DM
220 unsigned long flags;
221 struct ext4_inode_info *ei = EXT4_I(inode);
222 int err, ret = 0;
223
28a535f9 224 spin_lock_irqsave(&ei->i_completed_io_lock, flags);
2e8fa54e
JK
225 dump_completed_IO(inode, head);
226 list_replace_init(head, &unwritten);
28a535f9
DM
227 spin_unlock_irqrestore(&ei->i_completed_io_lock, flags);
228
229 while (!list_empty(&unwritten)) {
230 io = list_entry(unwritten.next, ext4_io_end_t, list);
231 BUG_ON(!(io->flag & EXT4_IO_END_UNWRITTEN));
232 list_del_init(&io->list);
233
234 err = ext4_end_io(io);
235 if (unlikely(!ret && err))
236 ret = err;
28a535f9
DM
237 }
238 return ret;
239}
240
241/*
2e8fa54e 242 * work on completed IO, to convert unwritten extents to extents
28a535f9 243 */
2e8fa54e
JK
244void ext4_end_io_rsv_work(struct work_struct *work)
245{
246 struct ext4_inode_info *ei = container_of(work, struct ext4_inode_info,
247 i_rsv_conversion_work);
248 ext4_do_flush_completed_IO(&ei->vfs_inode, &ei->i_rsv_conversion_list);
249}
250
bd2d0210
TT
251ext4_io_end_t *ext4_init_io_end(struct inode *inode, gfp_t flags)
252{
b17b35ec 253 ext4_io_end_t *io = kmem_cache_zalloc(io_end_cachep, flags);
bd2d0210 254 if (io) {
f7ad6d2e 255 io->inode = inode;
bd2d0210 256 INIT_LIST_HEAD(&io->list);
97a851ed 257 atomic_set(&io->count, 1);
bd2d0210
TT
258 }
259 return io;
260}
261
97a851ed
JK
262void ext4_put_io_end_defer(ext4_io_end_t *io_end)
263{
264 if (atomic_dec_and_test(&io_end->count)) {
265 if (!(io_end->flag & EXT4_IO_END_UNWRITTEN) || !io_end->size) {
266 ext4_release_io_end(io_end);
267 return;
268 }
269 ext4_add_complete_io(io_end);
270 }
271}
272
273int ext4_put_io_end(ext4_io_end_t *io_end)
274{
275 int err = 0;
276
277 if (atomic_dec_and_test(&io_end->count)) {
278 if (io_end->flag & EXT4_IO_END_UNWRITTEN) {
6b523df4
JK
279 err = ext4_convert_unwritten_extents(io_end->handle,
280 io_end->inode, io_end->offset,
281 io_end->size);
282 io_end->handle = NULL;
97a851ed
JK
283 ext4_clear_io_unwritten_flag(io_end);
284 }
285 ext4_release_io_end(io_end);
286 }
287 return err;
288}
289
290ext4_io_end_t *ext4_get_io_end(ext4_io_end_t *io_end)
291{
292 atomic_inc(&io_end->count);
293 return io_end;
294}
295
822dbba3 296/* BIO completion function for page writeback */
4246a0b6 297static void ext4_end_bio(struct bio *bio)
bd2d0210
TT
298{
299 ext4_io_end_t *io_end = bio->bi_private;
4f024f37 300 sector_t bi_sector = bio->bi_iter.bi_sector;
72d622b4 301 char b[BDEVNAME_SIZE];
bd2d0210 302
72d622b4 303 if (WARN_ONCE(!io_end, "io_end is NULL: %s: sector %Lu len %u err %d\n",
74d46992 304 bio_devname(bio, b),
72d622b4
TT
305 (long long) bio->bi_iter.bi_sector,
306 (unsigned) bio_sectors(bio),
4e4cbee9 307 bio->bi_status)) {
72d622b4
TT
308 ext4_finish_bio(bio);
309 bio_put(bio);
310 return;
311 }
bd2d0210 312 bio->bi_end_io = NULL;
0058f965 313
4e4cbee9 314 if (bio->bi_status) {
b0857d30
JK
315 struct inode *inode = io_end->inode;
316
9503c67c 317 ext4_warning(inode->i_sb, "I/O error %d writing to inode %lu "
f7ad6d2e 318 "(offset %llu size %ld starting block %llu)",
4e4cbee9 319 bio->bi_status, inode->i_ino,
f7ad6d2e
TT
320 (unsigned long long) io_end->offset,
321 (long) io_end->size,
322 (unsigned long long)
d50bdd5a 323 bi_sector >> (inode->i_blkbits - 9));
4e4cbee9
CH
324 mapping_set_error(inode->i_mapping,
325 blk_status_to_errno(bio->bi_status));
f7ad6d2e 326 }
822dbba3
JK
327
328 if (io_end->flag & EXT4_IO_END_UNWRITTEN) {
329 /*
330 * Link bio into list hanging from io_end. We have to do it
331 * atomically as bio completions can be racing against each
332 * other.
333 */
334 bio->bi_private = xchg(&io_end->bio, bio);
335 ext4_put_io_end_defer(io_end);
336 } else {
337 /*
338 * Drop io_end reference early. Inode can get freed once
339 * we finish the bio.
340 */
341 ext4_put_io_end_defer(io_end);
342 ext4_finish_bio(bio);
343 bio_put(bio);
344 }
bd2d0210
TT
345}
346
347void ext4_io_submit(struct ext4_io_submit *io)
348{
349 struct bio *bio = io->io_bio;
350
351 if (bio) {
95fe6c1a 352 int io_op_flags = io->io_wbc->sync_mode == WB_SYNC_ALL ?
70fd7614 353 REQ_SYNC : 0;
0127251c 354 io->io_bio->bi_write_hint = io->io_end->inode->i_write_hint;
5bd17036
MH
355 if (io->io_flags & EXT4_IO_ENCRYPTED)
356 io_op_flags |= REQ_NOENCRYPT;
95fe6c1a 357 bio_set_op_attrs(io->io_bio, REQ_OP_WRITE, io_op_flags);
bb32a122
BK
358 if (ext4_encrypted_inode(io->io_end->inode) &&
359 S_ISREG(io->io_end->inode->i_mode)) {
49e3bbe3 360 fscrypt_set_bio(io->io_end->inode, io->io_bio, 0);
bb32a122
BK
361 crypto_diskcipher_debug(FS_PAGEIO, io->io_bio->bi_opf);
362 }
4e49ea4a 363 submit_bio(io->io_bio);
bd2d0210 364 }
7dc57615 365 io->io_bio = NULL;
97a851ed
JK
366}
367
368void ext4_io_submit_init(struct ext4_io_submit *io,
369 struct writeback_control *wbc)
370{
5bd17036 371 io->io_flags = 0;
5a33911f 372 io->io_wbc = wbc;
97a851ed 373 io->io_bio = NULL;
7dc57615 374 io->io_end = NULL;
bd2d0210
TT
375}
376
97a851ed
JK
377static int io_submit_init_bio(struct ext4_io_submit *io,
378 struct buffer_head *bh)
bd2d0210 379{
bd2d0210
TT
380 struct bio *bio;
381
b54ffb73 382 bio = bio_alloc(GFP_NOIO, BIO_MAX_PAGES);
a1d8d9a7
TT
383 if (!bio)
384 return -ENOMEM;
001e4a87 385 wbc_init_bio(io->io_wbc, bio);
4f024f37 386 bio->bi_iter.bi_sector = bh->b_blocknr * (bh->b_size >> 9);
74d46992 387 bio_set_dev(bio, bh->b_bdev);
bd2d0210 388 bio->bi_end_io = ext4_end_bio;
97a851ed 389 bio->bi_private = ext4_get_io_end(io->io_end);
bd2d0210 390 io->io_bio = bio;
bd2d0210
TT
391 io->io_next_block = bh->b_blocknr;
392 return 0;
393}
394
395static int io_submit_add_bh(struct ext4_io_submit *io,
bd2d0210 396 struct inode *inode,
2058f83a 397 struct page *page,
bd2d0210
TT
398 struct buffer_head *bh)
399{
bd2d0210
TT
400 int ret;
401
bd2d0210
TT
402 if (io->io_bio && bh->b_blocknr != io->io_next_block) {
403submit_and_retry:
404 ext4_io_submit(io);
405 }
406 if (io->io_bio == NULL) {
97a851ed 407 ret = io_submit_init_bio(io, bh);
bd2d0210
TT
408 if (ret)
409 return ret;
0127251c 410 io->io_bio->bi_write_hint = inode->i_write_hint;
bd2d0210 411 }
2058f83a 412 ret = bio_add_page(io->io_bio, page, bh->b_size, bh_offset(bh));
97a851ed
JK
413 if (ret != bh->b_size)
414 goto submit_and_retry;
001e4a87 415 wbc_account_io(io->io_wbc, page, bh->b_size);
bd2d0210 416 io->io_next_block++;
bd2d0210
TT
417 return 0;
418}
419
420int ext4_bio_write_page(struct ext4_io_submit *io,
421 struct page *page,
422 int len,
1c8349a1
NJ
423 struct writeback_control *wbc,
424 bool keep_towrite)
bd2d0210 425{
2058f83a 426 struct page *data_page = NULL;
bd2d0210 427 struct inode *inode = page->mapping->host;
18017479 428 unsigned block_start;
bd2d0210
TT
429 struct buffer_head *bh, *head;
430 int ret = 0;
0058f965 431 int nr_submitted = 0;
937d7b84 432 int nr_to_submit = 0;
bd2d0210 433
d50bdd5a 434 BUG_ON(!PageLocked(page));
bd2d0210 435 BUG_ON(PageWriteback(page));
bd2d0210 436
1c8349a1
NJ
437 if (keep_towrite)
438 set_page_writeback_keepwrite(page);
439 else
440 set_page_writeback(page);
a54aa761 441 ClearPageError(page);
bd2d0210 442
eeece469 443 /*
f8409abd 444 * Comments copied from block_write_full_page:
eeece469
JK
445 *
446 * The page straddles i_size. It must be zeroed out on each and every
447 * writepage invocation because it may be mmapped. "A file is mapped
448 * in multiples of the page size. For a file that is not a multiple of
449 * the page size, the remaining memory is zeroed when mapped, and
450 * writes to that region are not written out to the file."
451 */
09cbfeaf
KS
452 if (len < PAGE_SIZE)
453 zero_user_segment(page, len, PAGE_SIZE);
0058f965
JK
454 /*
455 * In the first loop we prepare and mark buffers to submit. We have to
456 * mark all buffers in the page before submitting so that
457 * end_page_writeback() cannot be called from ext4_bio_end_io() when IO
458 * on the first buffer finishes and we are still working on submitting
459 * the second buffer.
460 */
461 bh = head = page_buffers(page);
462 do {
463 block_start = bh_offset(bh);
bd2d0210
TT
464 if (block_start >= len) {
465 clear_buffer_dirty(bh);
466 set_buffer_uptodate(bh);
467 continue;
468 }
8a850c3f
JK
469 if (!buffer_dirty(bh) || buffer_delay(bh) ||
470 !buffer_mapped(bh) || buffer_unwritten(bh)) {
471 /* A hole? We can safely clear the dirty bit */
472 if (!buffer_mapped(bh))
473 clear_buffer_dirty(bh);
474 if (io->io_bio)
475 ext4_io_submit(io);
476 continue;
477 }
0058f965
JK
478 if (buffer_new(bh)) {
479 clear_buffer_new(bh);
e64855c6 480 clean_bdev_bh_alias(bh);
0058f965
JK
481 }
482 set_buffer_async_write(bh);
937d7b84 483 nr_to_submit++;
0058f965
JK
484 } while ((bh = bh->b_this_page) != head);
485
0058f965 486 bh = head = page_buffers(page);
2058f83a 487
937d7b84 488 if (ext4_encrypted_inode(inode) && S_ISREG(inode->i_mode) &&
bb32a122 489 nr_to_submit && !fscrypt_disk_encrypted(inode)) {
c9af28fd
TT
490 gfp_t gfp_flags = GFP_NOFS;
491
492 retry_encrypt:
9c4bb8a3
DG
493 data_page = fscrypt_encrypt_page(inode, page, PAGE_SIZE, 0,
494 page->index, gfp_flags);
2058f83a
MH
495 if (IS_ERR(data_page)) {
496 ret = PTR_ERR(data_page);
4762cc3f 497 if (ret == -ENOMEM && wbc->sync_mode == WB_SYNC_ALL) {
c9af28fd
TT
498 if (io->io_bio) {
499 ext4_io_submit(io);
500 congestion_wait(BLK_RW_ASYNC, HZ/50);
501 }
502 gfp_flags |= __GFP_NOFAIL;
503 goto retry_encrypt;
504 }
2058f83a
MH
505 data_page = NULL;
506 goto out;
507 }
508 }
509
510 /* Now submit buffers to write */
0058f965
JK
511 do {
512 if (!buffer_async_write(bh))
513 continue;
5bd17036
MH
514 if (data_page)
515 io->io_flags |= EXT4_IO_ENCRYPTED;
2058f83a
MH
516 ret = io_submit_add_bh(io, inode,
517 data_page ? data_page : page, bh);
bd2d0210
TT
518 if (ret) {
519 /*
520 * We only get here on ENOMEM. Not much else
521 * we can do but mark the page as dirty, and
522 * better luck next time.
523 */
bd2d0210
TT
524 break;
525 }
0058f965 526 nr_submitted++;
1ae48a63 527 clear_buffer_dirty(bh);
0058f965
JK
528 } while ((bh = bh->b_this_page) != head);
529
530 /* Error stopped previous loop? Clean up buffers... */
531 if (ret) {
2058f83a
MH
532 out:
533 if (data_page)
a7550b30 534 fscrypt_restore_control_page(data_page);
2058f83a
MH
535 printk_ratelimited(KERN_ERR "%s: ret = %d\n", __func__, ret);
536 redirty_page_for_writepage(wbc, page);
0058f965
JK
537 do {
538 clear_buffer_async_write(bh);
539 bh = bh->b_this_page;
540 } while (bh != head);
bd2d0210
TT
541 }
542 unlock_page(page);
0058f965
JK
543 /* Nothing submitted - we have to end page writeback */
544 if (!nr_submitted)
545 end_page_writeback(page);
bd2d0210
TT
546 return ret;
547}